DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT : P




.


DATABASE SEARCH RESULTS FOR

 COMPUTER AND INFORMATION SCIENCE CONTENT :

 P



.

GOOGLE SITES CIS RESEARCH GUIDE SITE MAP DATABASES

 

AMOUNT OF CIS CONTENT IN A WIDE RANGE OF DATABASES 
WITH CONTENT SAMPLES FOR SOME

 

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE 
FROM SELECTED SEARCH ENGINES DISCOVERY TOOLS

http://tinyurl.com/ya4oggx9

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   A THROUGH  B

http://tinyurl.com/ydg8z52h

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   C   PART ONE

http://tinyurl.com/y9my4ppp

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   C    PART TWO

http://tinyurl.com/yc4sfdta

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT:   D

http://tinyurl.com/yay8pkc3

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT:   E    PART ONE

http://tinyurl.com/ydamheob

 


DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT:    E    PART TWO

http://tinyurl.com/y72w6xq6

 


DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT:     F THROUGH G

http://tinyurl.com/ydbxj5o7

 


DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT: 
H THROUGH INGENTA
 

http://tinyurl.com/y9vj85y6

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :    INSPEC THROUGH  L

http://tinyurl.com/yaxurho3

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :    M THROUGH MLA

http://tinyurl.com/yct8k9o9

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :    MLA THROUGH N

http://tinyurl.com/ydeyt2d7

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   O

http://tinyurl.com/y8kh4r5u

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   P   PART ONE

http://tinyurl.com/ybe63hl7

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   P   PART TWO
POLLUTION THROUGH PROQUEST STATISTICAL INSIGHT

http://tinyurl.com/y9s24mth

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :    PSY THROUGH PZ

http://tinyurl.com/ydgwy6zp

 

 

DATABASES USEFUL FOR COMPUTER SCIENCE AND INFORMATION SCIENCE RESEARCH:   R

http://tinyurl.com/yapzpw7a

 

 

DATABASES USEFUL FOR COMPUTER SCIENCE AND INFORMATION SCIENCE RESEARCH:    S THROUGH SCOPUS

http://tinyurl.com/ydylk7f2

 

 

DATABASES USEFUL FOR COMPUTER SCIENCE AND INFORMATION SCIENCE RESEARCH:
SEARCH.BIOPREPRINT THROUGH SZ

http://tinyurl.com/y8aajt3x

 

 

DATABASES USEFUL FOR COMPUTER SCIENCE AND INFORMATION SCIENCE RESEARCH:     T THROUGH Z

http://tinyurl.com/ya2qprg5

 

 

 



.


DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT : P


.

"computer science" OR "information science" OR "computer programming" OR informatics OR "data management" OR "information security" OR "network security" OR forensics OR "visual computing" OR "data mining" OR "machine learning" OR "multimedia databases" OR "artificial intelligence"


.

PAIS International 
7,423 Results


Content Sample

  • Legal evidence and advanced computing techniques for combatting crime: an overview

    Nissan, Ephraim. Information & Communications Technology Law22.3 (January 2013).

    ...hitdata hitmining, a class of techniques which has been applied to legal databases as
    ...in 'AI & Law' (hitartificial hitintelligence for law), itself a burgeoning domain

     

  • 2

    Artificial intelligence and human institutions

    Ennals, Richard. Springer, 1991. xii+181 pp, xii+181. Springer, April 1991.

    ...hitcomputer hitprogramming methods in the humanities, teaching, labor training, human

    Cited by (‎1)    



  • 3

    Herbert Simon, artificial intelligence pioneer, died on February 9th, aged 84

    Economist358.8210 (February 24, 2001): 91.

    ...the Noble Prize-winning economist and proponent of "AI" hitcomputer hitprogramming



  • 4

    Minds in the making: a survey of artificial intelligence

    Browning, John. Economist322 (March 14, 1992): 62.

    Cited by (‎1)    




  • 5

    Information Security Resources: A Selected Annotated Bibliography

    Dotson, Daniel S. Science & Technology Libraries27.3 (0, 2007): 29-51.

    ...hitinformation hitsecurity and its related topics, covering the majority of resources

    Cited by (‎1)    


  • 6

    Law, computer science, and artificial intelligence

    Narayanan, Ajit; Bennun, Mervyn. Ablex Publishing Corporation, 1991. x+265 pp, x+265. Ablex Publishing Corporation, 0, 1991.




    • 7

      Information Security Management: A Case Study in a Portuguese Military Organization

      Martins, José; dos Santos, Henrique; Rosinha, António; Valente, Agostinho.
       
      International Journal of Cyber Warfare and Terrorism; Hershey3.3 (Jul-Sep 2013): n/a.

      ...hit
      hitsecurity controls applied in military organizations? (2) What are


       

    • 8

      Coaxing meaning out of raw data: software can now find patterns never seen before

      Verity, John W. Business Week (February 3, 1997): 134.

      ..."hitdata-hitmining" software and technology, that sifts through immense collections of




    • 9

      Neural networks: here, there, and everywhere--an examination of available intellectual property protection for neural networks in Europe and the United States

      Rao, Dana S. George Washington Journal of International Law and Economics30.2/3 (0, 1996): 509-539.

      ...and software-implemented neural networks, including hitartificial hitintelligence,


    • 10

      Virtual Library: Computing

      .

      ...including hitartificial hitintelligence, cryptography, electronic commerce, logic




    • 11

      Data mining: A key contribution to e-business

      Nordine Melab. Information & Communications Technology Law; Abingdon10.3 (Oct 2001): 309-318.

      ...business decisions to be taken. This paper shows how 



    • hitdata hitmining is integrated
      ...through an integrated architecture how hitdata hitmining can contribute to e-business
      ... hitData

    • 12

      El Derecho constitucional ante la era de Ultrón: la informática y la inteligencia artificial como objeto constitucional

      Sánchez Barrilao, Juan Francisco. Estudios de Deusto; Bilbao64.2 (Jul-Dec 2016): 225.

      ...hitcomputer hitscience, in general, and hitartificial hitintelligence, in particular. The
      ...risks that humanity can pose hitartificial hitintelligence, but this without




    • 13

      Trends in Informatics Education

      Rodrigues, A J; Getao, K W. Higher Education Policy, suppl. Organizing Higher Education for the 21st Century; Basingstoke8.4 (Dec 1995): 33-37.

      ... We then analyse three model curricula in hitcomputer hitscience and highlight some
      ...Final Report of the Seminar on hitInformatics in the Service of
      ...aspects were discussed, namely: - hitinformatics as a subject to be taught



    • 14

      Artificial intelligence

      Andrews, Kenneth R. Business and Economic Review33 (September 1987): 19-22.

    • 15

      Out With the Old and in With the New? An Empirical Comparison of Supervised Learning Algorithms to Predict Recidivism

      Duwe, Grant; Kim, KiDeuk. Criminal Justice Policy Review; Indiana28.6 (Jul 2017): 570-600.

      ...hitmachine hitlearning algorithms outperform older, more traditional methods such as
      ...base rates, and number of predictors in the data set. The newer hitmachine hitlearning
      ...we examined. The results suggest that multiple methods, including hitmachine



    • 16

      Special report: Smart programs go to work: how applied-intelligence software makes decisions for the real world

      Schwartz, Evan I; and others. Business Week (March 2, 1992): 96-100.


    • 17

      Research Data Management: Principles, Practices, and Prospects

      Halbert, Martin. Council on Library and Information Resources, Nov 2013, 99 pp,
    •  Council on Library and Information Resources, November 2013.

      ...examines how research institutions are responding to hitdata hitmanagement
      ...and the library and hitinformation hitscience profession should have in supporting



    • 18

      Research Data Management: Principles, Practices, and Prospects

      Asher, Andrew; Deards, Kiyomi; Esteva, Maria; Halbert, Martin; Jahnke, Lori; et al.
       
      Council on Library and Information Resources, Nov 2013, 108 pp,
      Council on Library and Information Resources, November 2013.

      ...examines how research institutions are responding to hitdata hitmanagement
      ...and the library and hitinformation hitscience profession should have in supporting



    • 19

      Information Security: Progress Reported, but Weaknesses at Federal Agencies Persist

      Wilshusen, Gregory C. United States Government Accountability Office, Mar 12 2008, 31 pp, 31p-31p.
       United States Government Accountability Office, March 12, 2008.

      hitInformation hitSecurity Management Act (FISMA) of 2002, which permanently

       

    • 20

      How Should Health Data Be Used?

      KAPLAN, BONNIE. Cambridge Quarterly of Healthcare Ethics : CQ; New York25.2 (Apr 2016): 312-329.

      ...records, data sharing, big data, hitdata hitmining, and secondary use are enabling




    • 21

      Data Mining: DHS Needs to Improve Executive Oversight of Systems Supporting Counterterrorism

      Powner, David A. United States Government Accountability Office, Sep 2011, iii+69 pp, United States Government Accountability Office, September 2011.

      ...hitData hitmining -- a technique for extracting useful information from large volumes
      ...While hitdata-hitmining systems offer a number of promising benefits, their use also
      ...of hitdata-hitmining systems used for counterterrorism, (2) assess DHS agencies'




      22

    • Reviewing person's value of privacy of online social networking

      Hugl, Ulrike. Internet Research21.4 (0, 2011): 384-407.

      ...hitdata hitmining and profiling, pre-recruiting information as well as economic

      Cited by (‎14)    

       
    • 23

      From information science to informatics: a terminological investigation

      Wellisch, Hans. Journal of Librarianship4 (July 1972): 157-187.


    • 24

      The Federal Information Security Management Act of 2002: A Potemkin Village

      White, Daniel M. Fordham Law Review79.1 (October 2010): 369-405.

      ...hitinformation hitsecurity, Congress passed the Federal hitInformation hitSecurity
      ...hitinformation hitsecurity, primarily because FISMA treats hitinformation hitsecurity as a

      Cited by (‎1)    


       
    • 25

      Artificial intelligence in project management

      Foster, Alden T. Cost Engineering30 (June 1988): 21-24.

      Cited by (‎1)    



    *

    272,656 Results
    http://tinyurl.com/mlvdkob

    Content Sample



    1.Human Factors Issues in Information Security: What are They and Do They Matter? 
    Author: McCauley-Bell, P. R.; Crumpton, L. L. In: Human Factors and Ergonomics Society; p. 439-443; HFES; 1998 Libraries Worldwide: 682 


    2.Learning multiple languages in groups 
    Author: Jain, S.; Kinber, E. In: Jain, S.; Simon, H.U.; Tomita, E.; Algorithmic learning theory; p. 67-76; ELSEVIER; 2007 Libraries Worldwide: 822 

    3.Network Security 
    Author: Snow, D.; Chang, W. In: National telesystems; p. 15-13-15-16; IEEE; 1992 Libraries Worldwide: 673 
      

    4.Types of Planning: Can Artificial Intelligence Yield Insights into Prefrontal Function? 
    Author: Hendler, J. A. In: Grafman, J.; Holyoak, K. J.; Boller, F.; Structure and functions of the prefrontal cortex; p. 265-276; New York Academy of Sciences; 1995 Libraries Worldwide: 1338   


    5.Online Dynamic Programming Speedups 
    Author: Bar-Noy, A.; Golin, M.J.; Zhang, Y. In: Erlebach, T.; Kaklamanis, C.; Workshop on approximation and online algorithms; p. 429-445; Berlin; Springer; c2006 Libraries Worldwide: 1345
       
    6.The Ambiguous Bioinformatics Domain: A Conceptual Map of Information Science Applications for Molecular Biology 
    Author: Denn, S. O.; MacMullen, W. J. In: Toms, E. G.; American Society for Information Science and Technology; ASIST 2002 information connections and community; p. 556-558; Information Today; 2002 Libraries Worldwide: 613 

      
    7.Rasiowa--Sikorski deduction systems in computer science applications 
    Author: Konikowska, B. In: Fiadeiro, J. L.; Algebraic development techniques; p. 323-366; Berlin; New York; Springer-Verlag; 1999 Libraries Worldwide: 822   

    8.Advances in Biomedical Informatics for the Management of Cancer 
    Author: Haque, S.; Mital, D.; Srinivasan, S. In: Valafar, F.; International conference on mathematics and engineering techniques in medicine and biological sciences; p. 287-297; New York, N.Y.; The New York Academy of Sciences; 2002 Libraries Worldwide: 1338   



    9.School informatics: the vision, the learning, the information, the technology and the need for research 
    Author: Herring, J. E. In: Shoham, S.; Yitzhaki, M.; International Association of School Librarianship; Education for all culture, reading and information; p. 91-102; Department of Information Studies and Librarianship, Bar-Ilan University; 1998 Libraries Worldwide: 123    



    10.Health Informatics in Zimbabwe 
    Author: Mbiriza, J. C.; Nyazema, N. Z. In: HELINA 93; p. 14-16; Excerpta medica; 1993 Libraries Worldwide: 694    


    11.Advances in Biomedical Informatics for the Management of Cancer 
    Author: Haque, S.; Mital, D.; Srinivasan, S. In: Valafar, F.; International conference on mathematics and engineering techniques in medicine and biological sciences; p. 287-297; New York, N.Y.; The New York Academy of Sciences; 2002 Libraries Worldwide: 1338   


    12.Non-asymptotic calibration and resolution 
    Author: Vovk, V. In: Jain, S.; Simon, H.U.; Tomita, E.; Algorithmic learning theory; p. 77-89; ELSEVIER; 2007 Libraries Worldwide: 822   

    13.School informatics: the vision, the learning, the information, the technology and the need for research 
    Author: Herring, J. E. In: Shoham, S.; Yitzhaki, M.; International Association of School Librarianship; Education for all culture, reading and information; p. 91-102; Department of Information Studies and Librarianship, Bar-Ilan University; 1998 Libraries Worldwide: 123    



    14.Health Informatics in Zimbabwe 
    Author: Mbiriza, J. C.; Nyazema, N. Z. In: HELINA 93; p. 14-16; Excerpta medica; 1993 Libraries Worldwide: 694    
    |
    15.Use of Microcomputers in Data Management in AIDS and HIV related research in a Developing country 
    Author: Lutalo, T. In: HELINA 93; p. 150-154; Excerpta medica; 1993 Libraries Worldwide: 694    

    16.Charting a New Course: Development and Delivery of a Doctoral Survey Course in Health Informatics 
    Author: Self, P.; Clement, D. G.; Calarco, P. V., and others In: Aversa, E.; Manley, C.; American Society for Information Science and Technology; ASIST 2001; p. 654; Information Today; 2001 Libraries Worldwide: 613  
    17.Modelling co-transcriptional cleavage in the synthesis of yeast pre-rRNA 
    Author: Ciocchetta, F.; Hillston, J.; Kos, M., and others In: Calder, M.; Gilmore, S.; Computational methods in systems biology; p. 41-54; Elsevier; 2008 Libraries Worldwide: 822   


    18.Social Epistemology and Information Science (SIG HFIS) 
    Author: Budd, J.; Fallis, D.; Furner, J., and others In: Aversa, E.; Manley, C.; American Society for Information Science and Technology; ASIST 2001; p. 633-634; Information Today; 2001 Libraries Worldwide: 613    

    19.WAOA 2006 Special Issue of TOCS 
    Author: Erlebach, T.; Kaklamanis, C. In: Erlebach, T.; Kaklamanis, C.; Workshop on approximation and online algorithms; p. 427-428; Berlin; Springer; c2006 Libraries Worldwide: 1345   


    20.Charting a New Course: Development and Delivery of a Doctoral Survey Course in Health Informatics 
    Author: Self, P. C. In: Bakken, S.; American Medical Informatics Association; Annual symposium of the American Medical Informatics Association/visions of the future and lessons from the past/a medical informatics odyssey; p. 834; Hanley and Belfus; 2001 Libraries Worldwide: 1007  


    *

    Periodicals Archive Online (PAO) 
    3,270 Results


    Content Sample

    • 1

      The Organization and Use of Information: Contributions of Information Science, Computational Linguistics, and Artificial Intelligence

      Walker, D E. Journal of the American Society for Information Science; New York, N.Y.32.5 (Sep 1, 1981): 347.


    • 2

      Social Informatics in Information Science: An Introduction

      Kling, Rob; Rosenbaum, Howard; Hert, Carol. Journal of the American Society for Information Science; New York, N.Y.49.12 (Oct 1, 1998): 1047.

      Cited by (‎12)    


    • 3

      Museum Informatics and Collaborative Technologies: The Emerging Socio-Technological Dimension of Information Science in Museum Environments

      Marty, Paul F. Journal of the American Society for Information Science; New York, N.Y.50.12 (Oct 1, 1999): 1083.


    • 4

      NATO Advanced Study Institutes of Information Science and Foundations of Information Science

      Debons, Anthony; Horne, Esther E. Journal of the American Society for Information Science; New York, N.Y.48.9 (Sep 1, 1997): 794.

      Cited by (‎1)    



    • 5

      The Landscape of Information Science: The American Society for Information Science at 62

      Buckland, Michael. Journal of the American Society for Information Science; New York, N.Y.50.11 (Sep 1, 1999): 970.

      Cited by (‎53)    



    • 6

      Donn B. Parker, "Ethical Conflicts in Computer Science and Technology" and "Ethical Conflicts in Computer Science and Technology Workbook" (Book Review)

      Burkholder, L. Journal of Business Ethics; Dordrecht3.1 (Feb 1, 1984): 61.

    • 7

      Artificial Intelligence: A Selected Bibliography

      Journal of the American Society for Information Science; New York, N.Y.35.5 (Sep 1, 1984): 317.

    • 8

      Information Science Education: Curriculum Development and Evaluation - Conference Proceedings of the Curriculum Committee of the ASIS Special Interest Group on Education in Information Science
      GARWIG, P L. American Documentation; New York, N.Y.20.4 (Oct 1, 1969): 325.

      •  
    • 9

      Association for Library and Information Science Education, "Directory of the Association for Library and Information Science Education: 1995-96" (Book Review)

      Seavey, Charles A. The Library Quarterly; Chicago67.2 (Apr 1, 1997): 184

    • 10

      Artificial Intelligence: Concepts, Techniques, Applications, Promise

      Lunin, L F; Smith, L C. Journal of the American Society for Information Science; New York, N.Y.35.5 (Sep 1, 1984): 277.
       
    • 11

      Artificial Intelligence: Underlying Assumptions and Basic Objectives

      Cercone, N; McCalla, G. Journal of the American Society for Information Science; New York, N.Y.35.5 (Sep 1, 1984): 280.
       

    • 12

      The Role of Artificial Intelligence in Information Retrieval

      Jones, Karen Sparck. Journal of the American Society for Information Science; New York, N.Y.42.8 (Sep 1, 1991): 558.
       
    • 13

      Approaches to Machine Learning

      Langley, P; Carbonell, J G. Journal of the American Society for Information Science; New York, N.Y.35.5 (Sep 1, 1984): 306.
       

    • 14

      Expertise, Task Complexity, and Artificial Intelligence: A Conceptual Framework

      Buckland, Michael K; Florian, Doris. Journal of the American Society for Information Science; New York, N.Y.42.9 (Oct 1, 1991): 635.

    • 15

      Mapping Change in Scientific Specialties: A Scientometric Reconstruction of the Development of Artificial Intelligence

      Besselaar, Peter van den; Leydesdorff, Loet. Journal of the American Society for Information Science; New York, N.Y.47.6 (Jun 1, 1996): 415.

      Cited by (‎5)    


    • 17

      "ASIS 50th Anniversary, 1937-1938 - 1987-1988: Happy Anniversary to the American Society for Information Science," Journal of the American Society for Information Science 38/5 (Book Review)

      Jackson, Eugene B. Libraries and Culture; Austin, Tex.24.4 (Fall 1989): 509.

    • 18

      Philosophical Logic and Artificial Intelligence 
      Thomason, Richmond. Journal of Philosophical Logic; Dordrecht17.4 (Nov 1, 1988): 321.



    • 19

      Artificial Intelligence and Piagetian Theory

      Boden, Margaret A. Synthese; Dordrecht38.3 (Jul 1, 1978): 389.


    • 20

      Acting, Intending, and Artificial Intelligence  Hauser, Larry. 
      Behavior and Philosophy; Cambridge, Mass.22.1 (Spring 1994): 23.



    • 21

      Rhetoric and Artificial Intelligence

      Hunter, Lynette. Rhetorica; Berkeley, Calif.9.4 (Fall 1991): 317.

      Cited by (‎1)    




    • 22

      Artificial Intelligence and the Dialogica Shotter, John. 
      The American Behavioral Scientist; Princeton, N.J.40.6 (May 1, 1997): 813.

       

    • 23

      Artificial Intelligence and Personal Identity

      Cole, David. Synthese; Dordrecht88.3 (Sep 1, 1991): 399.

      Cited by (‎5)    



    • 24

      Artificial Intelligence: Art or Science?

      Bundy, Alan. RSA Journal; London136.5384 (Jul 1, 1988): 557.
       

    • 25

      Computer Programming in a Spatial Analysis Course

      Gesler, Wilber; Kaplan, Abram. Journal of Geography; Macomb, Ill., etc.92.3 (May 1, 1993): 139.

    • Artificial Intelligence and Philosophers


      Clark, Gary. 
      Philosophy Today; Celina, Ohio29.4 (Winter 1985): 326.


    • 27

      Instruction in Economics Through Simulated Computer Programming

      Scheraga, Joel D. The Journal of Economic Education; Washington, D.C., etc.17.2 (Spring 1986): 129.

      Cited by (‎2)    


    • 28

      Natural Problems and Artificial Intelligence
      Henley, Tracy. Behavior and Philosophy; Cambridge, Mass.18.2 (Fall 1990): 43.



       

    • 29

      Lotka's Law and Computer Science Literature

      Radhakrishnan, T; Kernizan, R. Journal of the American Society for Information Science; New York, N.Y.30.1 (Jan 1, 1979): 51.

      Cited by (‎2)    


    • 30

      On the Impossibility of Artificial IntelligenceWeiss, Paul. 
      Review of Metaphysics; Washington, etc.44.2 (Dec 1, 1990): 335.

       

    *

    Periodicals Index Online
    9,597 Results

     

    Content Sample


    • 1

      Artificial Intelligence: A Challenge for Information Science Education
      Hurd, Julie M. Bulletin of the American Society for Information Science; Washington, etc.14.6 (Aug 1, 1988): 21.

       

    • 2

      Organizational Informatics in Computer ScienceKling, Rob. 
      Bulletin of the American Society for Information Science; Washington, etc.19.5 (Jun 1, 1993): 17.

       

    • 3

      "Formalism in Artificial Intelligence and Computer Science" by Philip Leith (Book Review)

      Giansante, Louis. Rutgers Computer and Technology Law Journal; Newark, N.J.17.2 (Jan 1, 1991): 555.

    • 4

      ARTIFICIAL INTELLIGENCE - "Artificial Intelligence is Coming"

      Pena, Fernando. European Management Journal; London6.2 (Summer 1988): 173.

      ...hitartificial hitintelligence products like expert systems in providing decision



    • 5

      The Organization and Use of Information: Contributions of Information Science, Computational Linguistics, and Artificial Intelligence

      Walker, D E. Journal of the American Society for Information Science; New York, N.Y.32.5 (Sep 1, 1981): 347.
    • 6

      From information science to informatics

      Brookes, B C. Journal of Librarianship; London4.4 (Oct 1, 1972): 272.
       

    • 7

      From information science to informatics
      Gibbons, Frank. Journal of Librarianship; London5.1 (Jan 1, 1973): 78.





        • 8
          Social 
          Informatics in Information Science:
          An Introduction


      •  





        Kling, Rob; Rosenbaum, Howard; Hert, Carol. 
        Journal of the
        American Society for Information Science; New York, N.Y.49.12 (Oct 1, 1998): 1047.

        Cited by (‎12)    



      • 9

        A Review of Information Science and Computer Science Literature to Support Archival Work with Electronic Records

        Ruller, Thomas J. American Archivist; Washington56.3 (Summer 1993): 546.

        Cited by (‎2)    


      • 10

        From information science to informatics: a terminological investigation

        Wellisch, Hans. Journal of Librarianship; London4.3 (Jul 1, 1972): 157.
         

      • 12

        HOW ARTIFICIAL IS ARTIFICIAL INTELLIGENCE? (review of F. J. Crosson ("ed".) "Human and Artificial Intelligence")
        (Book Review)

        Boden, M. The British Journal for the Philosophy of Science; Oxford24 (Jan 1, 1973): 61.


      • 13

        Incorporating Social Informatics into the Curriculum for Library and Information Science Professionals

        Lavagnino, Merri Beth; Bowker, Geoffrey C; Heidorn, P Bryan; Basi, Mindy Miron. Libri; København48.1 (Jan 1, 1998): 13.
         

      • 14

        Museum Informatics and Collaborative Technologies: The Emerging Socio-Technological Dimension of Information Science in Museum Environments

        Marty, Paul F. Journal of the American Society for Information Science; New York, N.Y.50.12 (Oct 1, 1999): 1083


         

      • 15

        The Landscape of Information Science: The American Society for Information Science at 62

        Buckland, Michael. Journal of the American Society for Information Science; New York, N.Y.50.11 (Sep 1, 1999): 970.

        Cited by (‎53)    



      • 16

        NATO Advanced Study Institutes of Information Science and Foundations of Information Science

        Debons, Anthony; Horne, Esther E. Journal of the American Society for Information Science; New York, N.Y.48.9 (Sep 1, 1997): 794.

        Cited by (‎1)    


      • 17

        The foundations of information science. Part IV. Information science: the changing paradigm

        Brookes, B C. Journal of Information Science; Amsterdam3.1 (Feb 1, 1981): 3.

      • 18

        Report on the ECAI Workshop on Artificial Intelligence and Music, held during the 9th European Conference on Artificial Intelligence (ECAI-90), Stockholm, Sweden, August 6-10, 1990

        Widmer, Gerhard. Interface; Lisse, Netherlands19.4 (Jan 1, 1990): 293.


      • 19

        Donn B. Parker, "Ethical Conflicts in Computer Science and Technology" and "Ethical Conflicts in Computer Science and Technology Workbook" (Book Review)

        Burkholder, L. Journal of Business Ethics; Dordrecht3.1 (Feb 1, 1984): 61.


      • 20

        A Separate Degree Program in Information Science: the Degree "Master of Science" in Information Science at UCLA

        Horn, Andrew H. Libri; København18 (Jan 1, 1968): 283.
         

      • 21

        Broadening Computer  

          Bulletin of the American Society for Information Science; Washington, etc.19.5 (Jun 1, 1993): 12.

      • 22

        Artificial Intelligence

        Smith, Linda C (ed.). Bulletin of the American Society for Information Science; Washington, etc.14.6 (Aug 1, 1988): 12.


      • 23

        The Current State of Computer Science

        Kling, Rob. Bulletin of the American Society for Information Science; Washington, etc.19.5 (Jun 1, 1993): 11.


      • 24

        Artificial Intelligence: A Selected Bibliography

        Journal of the American Society for Information Science; New York, N.Y.35.5 (Sep 1, 1984): 317.
         

      • 25

        NOrtheast Artificial Intelligence Consortium

        Gondek, Donald. Bulletin of the American Society for Information Science; Washington, etc.15.5 (Jun 1, 1989): 23.


      • 26

        Artificial Intelligence for the Layman

        Milevski, Sandra N. Bulletin of the American Society for Information Science; Washington, etc.12.4 (Apr 1, 1986): 12.
         

      • 27

        Forensics Shock: Making Forensics Relevant to Tomorrow's Higher Education

        Thomas, David A. Speech Teacher; Falls Church, Va.23.3 (Sep 1, 1974): 235.

        ...debate over the role of hitforensics in departments of speech communication takes
        ...which support hitforensics. Directors of hitforensics should therefore re-examine
        ...curricular ties, hitforensics directors should consider undertaking more research


         

      • 28

        Association for Library and Information Science Education, "Directory of the Association for Library and Information Science Education: 1995-96" (Book Review Seavey, Charles A. 
        The Library Quarterly; Chicago67.2 (Apr 1, 1997): 184.


      • 29

        NSF's New Information Science Program; A Conversation with Dr. Howard L. Resnikoff, Director of the Division of Information Science and Technology

        Lunin, Lois F. Bulletin of the American Society for Information Science; Washington, etc.5.2 (Dec 1, 1978): 27.

      • 30

        Information Science Education: Curriculum Development and Evaluation - Conference Proceedings of the Curriculum Committee of the ASIS Special Interest Group on Education in Information Science

        GARWIG, P L. American Documentation; New York, N.Y.20.4 (Oct 1, 1969): 325.


      • 31

        The Macro-literalization of the Artificial Intelligence Metaphor

        Cremmins, Edward T. Bulletin of the American Society for Information Science; Washington, etc.11.5 (Jun 1, 1985): 30.


      • 32

        The Superficial Cognitive Authority of Artificial Intelligence

        Cremmins, Edward T. Bulletin of the American Society for Information Science; Washington, etc.10.6 (Aug 1, 1984): 27.


      • 33

        Artificial Intelligence: Concepts, Techniques, Applications, Promise

        Lunin, L F; Smith, L C. Journal of the American Society for Information Science; New York, N.Y.35.5 (Sep 1, 1984): 277.


      • 34

        Artificial Intelligence: Underlying Assumptions and Basic Objectives



      • 35

        Artificial Intelligence and the User Interface

        Warner, Amy J. Bulletin of the American Society for Information Science; Washington, etc.15.4 (Apr 1, 1989): 17.Full text - PDF (304 KB)‎

      • 36

        The Role of Artificial Intelligence in Information Retrieval Jones, Karen Sparck. Journal of the American Society for Information Science; New York, N.Y.42.8 (Sep 1, 1991): 558.


         

      • 37

        Machine learning systems

        Forsyth, Richard. ASLIB Proceedings; London36 (Jan 1, 1984): 219.

      • 38

        Computer Science

        Atchison, William F. Bulletin of the American Society for Information Science; Washington, etc.2.1 (Jun 1, 1975): 43.


      • 39

        Approaches to Machine Learning

        Langley, P; Carbonell, J G. Journal of the American Society for Information Science; New York, N.Y.35.5 (Sep 1, 1984): 306.
         

      • 40

        Artificial Intelligence

        Koch, Kenneth. PN Review; Manchester20.2 (Nov 1, 1993): 32.



      *

      Provides full-text online versions of back issues of selected French journals 
      in the humanities and social sciences.
      2,169 Results
      http://www.persee.fr/

      *

      714 Results

      *

      3,357 Results

      *

      395 Results

      Content Sample

      1.Ling, Maurice HT (2012) Re-creating the Philosopher’s Mind: Artificial Life from Artificial Intelligence. Human-Level Intelligence, 3. p. 1. ISSN 2219-5173
      2.Sterrett, S. G. (2014) Turing on the Integration of Human and Machine Intelligence.[Preprint]
      3.Wheeler, Gregory (2013) Models, Models, and Models. Metaphilosophy.
      4.Taddeo, Mariarosaria and Floridi, Luciano (2005) Solving the Symbol Grounding Problem: a Critical Review of Fifteen Years of Research. [Preprint]
      5.Kovalerchuk, Boris and Perlovsky, Leonid and Wheeler, Gregory (2011) Modeling of Phenomena and Dynamic Logic of Phenomena. [Preprint]
      6.Saint-Mont, Uwe (2016) Roads to Consciousness: Crucial steps in mental development.[Preprint]
      7.Dawidowicz, Edward and Jackson, Vairzora and Bryant, Thomas E and Adams, Martin (2003)The Right Information… and Intelligent Nodes. In: UNSPECIFIED.
      8.Glymour, Clark (2000) Bayes Nets and Graphical Causal Models in Psychology.UNSPECIFIED. (In Press)
      9.Pietsch, Wolfgang (2013) Big Data – The New Science of Complexity. In: UNSPECIFIED.
      10.Pietsch, Wolfgang (2014) Aspects of theory-ladenness in data-intensive science. In: UNSPECIFIED.
      11.Sterrett, S. G. (2012) Bringing Up Turing's 'Child-Machine' (revised). [Preprint]
      12.Eberhardt, Frederick and Scheines, Richard (2006) Interventions and Causal Inference. In: UNSPECIFIED.
      13.Danks, David (2014) The Mathematics of Causal Capacities. In: UNSPECIFIED.
      14.Kuorikoski, Jaakko and Pöyhönen, Samuli (2012) Understanding non-modular functionality – lessons from genetic algorithms. In: UNSPECIFIED.
      15.Floridi, Luciano (2005) Is Information Meaningful Data? [Preprint]
      16.Van Benthem, Johan (2007) Abduction at the interface of Logic and Philosophy of Science.THEORIA. An International Journal for Theory, History and Foundations of Science, 22 (3). pp. 271-273. ISSN 2171-679X
      17.Floridi, Luciano (2008) Understanding Epistemic Relevance. [Preprint]
      18.Piccinini, Gualtiero (2004) Computation Without Representation. UNSPECIFIED. (Unpublished)
      19.Floridi, Luciano (2005) Consciousness, Agents and the Knowledge Game. [Preprint]
      20.Aaronson, Scott (2011) Why Philosophers Should Care About Computational Complexity.[Preprint]


      *

      1,038 Results

      Content Sample

      • 1

        Development and validation of a machine learning algorithm and hybrid system to predict the need for life-saving interventions in trauma patients

        Liu, Nehemiah T; Holcomb, John B; Wade, Charles E; Batchinsky, Andriy I; Cancio, Leopoldo C; et al. Medical and Biological Engineering and Computing; Heidelberg52.2(Feb 2014): 193-203.

        ...P, Witten IH (2009) The WEKA hitdata hitmining software: an update. SIGKDD Explor
        ...hitmachine hitlearning algorithmand hybrid system to predict the need for life-saving
        ...hitmachine hitlearning algorithm and system capable of predicting the need for

         

      • 2

        Pitch Sequence Complexity and Long-Term Pitcher Performance

        Bock, Joel R. Sports; Basel3.1 (2015): 40-55.

        ...hitmachine hitlearning; sequence complexity; sports analytics; performance prediction
        ...central element of this approach is hitmachine hitlearning. Prediction of the next
        ...hitmachine hitlearning problem as a binary decision, i.e., predicting whether or not

        Cited by (‎1)    References (‎23)    



      • 3

        Mortality prediction of rats in acute hemorrhagic shock using machine learning techniques

        Kim, Kyung-ah; Choi, Joon Yul; Yoo, Tae Keun; Kim, Sung Kean; Chung, Kilsoo; et al. Medical and Biological Engineering and Computing; Heidelberg51.9 (Sep 2013): 1059-67.

        ...hemorrhagic shock using hitmachine hitlearning techniques Kyung-Ah Kim Joon Yul
        ...from trauma. To achieve this aim, various hitmachine hitlearning techniques were
        ...Mortality hitMachine hitlearning Support vector machine 1

        Cited by (‎4)    References (‎33)    


      • Select result item4

        Prediction of pediatric HIV/AIDS survival in Nigeria using Naïve Bayes' Approach

        Idowu, Peter A, PhD; Aladekomo, Theophlus A, MBBS; Agbelusi, Olutola, MPhil; Alaba, Olumuyiwa B, PhD; Balogun, Jeremiah A, MSc. International Journal of Child Health and Human Development; Hauppauge10.2 (2017): 131-142.

        ... hitMachine hitlearning is a branch of hitartificial hitintelligence that allows computers
        ...hitData hitMining Approach. The aim of the research was to describe the feasibility of



      • 5

        Machine Learning and the Profession of Medicine

        Darcy, Alison M, PhD; Louie, Alan K, MD; Roberts, Laura Weiss, MD, MA. JAMA: The Journal of the American Medical Association; Chicago315.6 (Feb 9, 2016): 551.

        ...hitmachine hitlearning, in which computational algorithms learn from raw data, without

        Cited by (‎4)    References (‎9)    


         

      • 6

        A centralized informatics infrastructure for the National Institute on Drug Abuse Clinical Trials Network

        Pan, Jeng-Jong; Nahm, Meredith; Wakim, Paul; Cushing, Carol; Poole, Lori; et al. Clinical Trials; London6.1 (Feb 2009): 67-75.

        ...CTN transitioned from a distributed hitdata hitmanagement model to a centralized
        ...as data quality while decreasing the hitdata hitmanagement costs. Establishing an
        ...cost-benefit analysis showed a 50% reduction in hitdata hitmanagement cost per study



      • 7

        Analysis on the Application of Artificial Intelligence Technology in Modern Physical Education

        Jiang, Yipai. Information Technology Journal13.3 (0, 2014): 477.

        ...study, the hitartificial hitintelligence and modem technology of physical education
        ...and development. As people all know, hitartificial hitintelligence belongs to
        ...hitArtificial hitintelligence has many advantages in the application of teaching

        References (‎11)    



         

      • 8

        Development of a Computer-Based Clinical Decision Support Tool for Selecting Appropriate Rehabilitation Interventions for Injured Workers

        Gross, Douglas P; Zhang, Jing; Steenstra, Ivan; Barnsley, Susan; Haws, Calvin; et al. Journal of Occupational Rehabilitation; New York23.4 (Dec 2013): 597-609.

        ...time loss benets or undergoing repeat programs). hitMachine hitlearning, concerned
        ...performance for hitmachine hitlearning techniques outperformed the clinician
        ...hitmachine hitlearning classication techniques appears to have resulted in


      • 9

        Artificial Intelligence in Sports on the Example of Weight Training

        Novatchkov, Hristo; Baca, Arnold. Journal of Sports Science & Medicine12.1 (Mar 2013): 27-37.

        ...development of intelligent methods adapted from conventional hitmachine hitlearning
        ...potential of hitartificial hitintelligence (AI) techniques in sports on the example




      • 10

        Are you bleeding? Validation of a machine-learning algorithm for determination of blood volume status: application to remote triage

        Rickards, Caroline A; Vyas, Nisarg; Ryan, Kathy L; Ward, Kevin R; Andre, David; et al. Journal of Applied Physiology; Bethesda116.5 (Mar 1, 2014): 486.

        ...be used to develop a hitmachine-hitlearning algorithm for tracking changes in central
        ...to develop a hitmachine-hitlearning algorithm to predict changes in SV as an index of
        ...hitmachine-hitlearning algorithm was able to distinguish between LBNP and exercise

        Cited by (‎2)    




      • 11

        machine-learning approach for computation of fractional flow reserve from coronary computed tomography

        Itu, Lucian; Rapaka, Saikiran; Passerini, Tiziano; Georgescu, Bogdan; Schwemmer, Chris; et al. Journal of Applied Physiology; Bethesda121.1 (Jul 1, 2016): 42.

        ...their clinical adoption. In this paper, we present a hitmachine-hitlearning-based
        ...38 lesions out of 125 and was predicted by the hitmachine-hitlearning algorithm with a
        ...the CFD model to ~2.4 ± 0.44 s for the hitmachine-hitlearning model on a workstation


         
      • 12

        Machine learning approach to model sport training

        Me, Edward; zyk, zyk; Unold, Olgierd. Computers in Human Behavior27.5 (Sep 2011): 1499-1506.

        ...hitmachine hitlearning approach combining fuzzy modeling with an immune algorithm to

        Cited by (‎1)    References (‎32)    



      • 13

        Spatial characteristics of professional tennis serves with implications for serving aces: A machine learning approach

        Whiteside, David; Reid, Machar. Journal of Sports Sciences; Abingdon35.7 (Apr 2017): 648-654.

        ...professional tennis serves with implications for serving aces: A hitmachine



      • 14

        Applications of Artificial Intelligence Systems in the Analysis of Epidemiological Data

        Flouris, Andreas D; Duffy, Jack. European Journal of Epidemiology; Dordrecht21.3 (Mar 2006): 167-70.

        ... deductive models may miss.Key words: Algorithm, hitData hitmining, Epidemiology
        ...breast cancer survivability: A comparison of three hitdata hitmining methods
        ... Statistical Learning: hitData hitMining, Inference, and Prediction. New York

        Cited by (‎5)    



         

      • 16

        RAIRS2 a new expert system for diagnosing tuberculosis with real-world tournament selection mechanism inside artificial immune recognition system

        Saybani, Mahmoud Reza; Shamshirband, Shahaboddin; Golzari, Shahram; Wah, Teh Ying; Saeed, Aghabozorgi; et al. Medical and Biological Engineering and Computing; Heidelberg54.2-3 (Mar 2016): 385-399.

        ...Articial immune recognition system Tuberculosis diagnosis Classication hitData
        ...WEKA [20] hitdata hitmining software. Tables 3, 4, 5, 6, 7, 8, 9, and 10 show values
        ...this study is to diagnose tuberculosis using a hitmachine hitlearning method. Articial

        References (‎105)    



      • 17

        Comparing data mining methods with logistic regression in childhood obesity prediction

        Zhang, Shaoyan; Tjortjis, Christos; Zeng, Xiaojun; Qiao, Hong; Buchan, Iain; et al. Information Systems Frontiers11.4 (Sep 2009): 449-460.

        ...hitdata hitmining techniques. The contributions of this paper are as follows: a) a
        ...hitdata hitmining techniques are becoming sufficiently well established to offer the



      • 18

        Support vector machine for classification of walking conditions using miniature kinematic sensors

        Lau, Hong-yin; Tong, Kai-yu; Zhu, Hailong. Medical and Biological Engineering and Computing; Heidelberg46.6 (Jun 2008): 563-73.

        ...angular velocity measured from the shank and foot segments. A hitmachine hitlearning
        ...other hitmachine hitlearning methods such as articial neural network (ANN), radial
        ...Gait analysis Kinematic hitMachine hitlearning Sensors

        Cited by (‎15)    

         
      • 19

        Research on the Application of Data Mining in the Guidance of Sports Training

        Huang, Qian; Shi, Yong. Journal of Guangzhou Physical Education Institute29.6 (Nov 2009): 106-110.

        ...hitData hitmining is the techniques of finding the potential law from the data by
        ...the application principle of the hitdata hitmining technology in sports training, and
        ...ability. It shows a broad application space of the use of hitdata hitmining technology



      • 20

        machine learning approach for automated recognition of movement patterns using basic, kinetic and kinematic gait data

        Begg, R.; Kamruzzaman, J.. Journal of Biomechanics; Kidlington38.3 (2005): 401-8.

        ...   This paper investigated application of a hitmachine hitlearning



         

      • 21

        Analysis of mass spectrometry data from the secretome of an explant model of articular cartilage exposed to pro-inflammatory and anti-inflammatory stimuli using machine learning

        Swan, Anna L; Hillier, Kirsty L; Smith, Julia R; Allaway, David; Liddell, Susan; et al. BMC Musculoskeletal Disorders; London14 (2013): 349.

        ...E, Hall MIn hitData hitmining: practical hitmachine hitlearning tools and techniques San
        ...hitlearning: a review of classification techniques IOS Press: Emerging hitArtificial
        ...5RD, UK 6-School of hitComputer hitScience, University of Nottingham, Jubilee

        Cited by (‎2)    References (‎60)    

         

      • 22

        Medical Informatics/Computers in Medicine

        Lindberg, Donald A B. JAMA: The Journal of the American Medical Association; Chicago256.15 (Oct 17, 1986): 2120.

        ...on medical decision making are analyzed. It is determined that hitartificial


      • 23

        Methods to estimate aspects of physical activity and sedentary behavior from high-frequency wrist accelerometer measurements

        Staudenmayer, John; He, Shai; Hickey, Amanda; Sasaki, Jeffer; Freedson, Patty. Journal of Applied Physiology; Bethesda119.4 (Aug 15, 2015): 396.

        ...develop and assess both hitmachine-hitlearning and simpler models with fewer unknown
        ...decision tree: 96% correct) nearly as well or better than the hitmachine-hitlearning

        Cited by (‎7)    


      • 24

        A comparison of accuracy of fall detection algorithms (threshold-based vs. machine learning) using waist-mounted tri-axial accelerometer signals from a comprehensive set of falls and non-fall trials

        Aziz, Omar; Musngi, Magnus; Park, Edward J; Mori, Greg; Robinovitch, Stephen N. Medical and Biological Engineering and Computing; Heidelberg55.1 (Jan 2017): 45-55.

        ...of accuracy of fall detection algorithms (thresholdbased vs. hitmachine hitlearning)
        .... Keywords Older adults Falls Wearable sensors hitMachine hitlearning
        ...most systems described to date incorporate threshold-based algorithms, hitmachine

        References (‎40)    



      • 25

        Using machine learning to draw inferences from pass location data in soccer

        Brooks, Joel; Kerr, Matthew; Guttag, John. Statistical Analysis and Data Mining9.5 (October 2016): 338-349.

        ...Analysis and hitData hitMining: The ASA Data Science Journal, 2016





      *

      PILOTS Database (Published International Literature On Traumatic Stress)

      PILOTS Database (Published International Literature on Traumatic Stress) is an
      interdisciplinary bibliographical database and includes citations to literature on
      Post-Traumatic Stress Disorder (PTSD) without disciplinary, linguistic, or
      geographical limitations. The database includes citations and abstracts to journal
      articles, books, book chapters, dissertations, and government documents.
      50 Results


      Content Sample

      • 1

        Case study of post sentencing forensics: evaluating new possibilities

        Meacham, Mike. Forensic Examiner10.3/4 (March/April 2001): 15-19.

        ...hitForensics becomes important as soon as a crime is committed and it is the
        ...is about post-sentencing hitforensics and how it, too, may prove important to
        ...in unsavory activity or divulge too much to the wrong people. hitForensics then may

        References (‎20)    



      • 2

        Quantitative forecasting of PTSD from early trauma responses: a Machine Learning application

        Galatzer-Levy, Isaac R; Karstoft, Karen-Inge; Statnikov, Alexander; Shalev, Arieh Y. Journal of Psychiatric Research59 (December 2014): 68-76.

        ...and clinical risk indicators. This work evaluates the ability of hitMachine
        ...and prognosis; early prediction; forecasting; hitMachine hitLearning; Markov boundary

        Cited by (‎17)    References (‎48)    




      • 3

        Posttraumatic stress disorder: diagnostic data analysis by data mining methodology

        Marinic, Igor; Supek, Fran; Kovacic, Zrnka; Rukavina, Lea; Jendricko, Tihana; et al. Croatian Medical Journal48.2 (April 2007): 185-197.

        ...hitdata hitmining methods in assessing diagnostic symptoms in PTSD. METHODS: The study
        ...applicability of hitdata hitmining methods for the analysis of structured psychiatric

        Cited by (‎9)    



      • 4

        Bridging a translational gap: using machine learning to improve the prediction of PTSD

        Karstoft, Karen-Inge; Galatzer-Levy, Isaac R; Statnikov, Alexander; Li, Zhiguo; Shalev, Arieh Y; et al. BMC Psychiatry15 (16 March 2015): Article 30.

        ...hitmachine hitlearning (ML) to uncover interchangeable, maximally predictive
        ...Abstract] KEY WORDS: PTSD; hitmachine hitlearning; early prediction; risk factors;

        Cited by (‎10)    References (‎45)    

         

      • 5

        Gender differences in machine learning models of trauma and suicidal ideation in veterans of the Iraq and Afghanistan wars

        Gradus, Jaimie L; King, Matthew W; Galatzer-Levy, Isaac; Street, Amy E. Journal of Traumatic Stress (25 July 2017).

        ...hitmachine hitlearning to examine gender-specific associations between predeployment
        ...with good accuracy, with associations that varied by gender. The use of hitmachine




      • 6

        Sexual involvement with therapists: patient assessment, subsequent therapy, forensics

        Pope, Kenneth S. Washington: American Psychological Association, 1994. xii, 249 pp, xii, 249. Washington: American Psychological Association, 1994.

        Cited by (‎1)    




      • 7

        Recovered memories of abuse: assessment, therapy, forensics (1st ed.)

        Pope, Kenneth S; Brown, Laura S. Washington: American Psychological Association, 1996. ix, 315 pp, ix, 315. Washington: American Psychological Association, 1996.


      • 8

        Predicting non-familial major physical violent crime perpetration in the US Army from administrative data

        Rosellini, Anthony J; Monahan, John; Street, Amy Elisabeth; Heeringa, Steven G; Hill, Eric D; et al. Psychological Medicine46.2 (January 2016): 303-316.

        ...an actuarial model for these crimes separately among men and women using hitmachine
        ...model; crime perpetration; hitmachine hitlearning; military violence; physical
        ...We report the results of an attempt to develop an actuarial model using hitmachine

        Cited by (‎3)    References (‎128)    

         

      • 9

        Retraction: suicide after natural disasters [letter]

        Krug, Etienne G; Kresnow, Marcie-Jo; Peddicord, John P; Dahlberg, Linda L; Powell, Kenneth E; et al. New England Journal of Medicine340.2 (January 14 1999): 148-149.

        ...hitcomputer hitprogramming, a new analysis of data on suicide rates among Americans


      • 10

        How well can post-traumatic stress disorder be predicted from pre-trauma risk factors? An exploratory study in the WHO World Mental Health Surveys

        Kessler, Ronald C; Rose, Sherri; Koenen, Karestan Chase; Karam, Élie George; Stang, Paul E; et al. World Psychiatry13.3 (October 2014): 265-274.

        ...[Author Abstract] KEY WORDS: PTSD; predictive modeling; hitmachine hitlearning;
        ...in 24 countries. hitMachine hitlearning methods (random forests, penalized regression,

        Cited by (‎29)    


      *

      PLI Plus This link opens in a new window


      PLI Plus from the Practising Law Institute,
      a national provider of continuing legal education (CLE) programs,
      provides unlimited access to practice-oriented
      legal treatises, course handbooks, and answer books,
      in addition to legal forms and program transcripts.
      1,158 Results 


      Content Sample

      • 1.
        CHB Chapter
        Title: Think Like a Lawyer, Talk Like a Geek 2017: Get Fluent in Technology
        Author(s): Jonathan T. Kaplan, Michael Karasick, Peter Brown
        Published: Sep 2017
         
        ... Defining Artificial Intelligence An Artificial Intelligence is not a sentient agent or a conscience, it is simply a man-made system that behaves intelligently. In the book Artificial Intelligence , authors and computer scienceprofessors David L. Poole and Alan K. Mackworth David L. Poole and Alan K. Mackworth, Artificial Intelligence ...
        ... Edwin Cartlidge, The challenges of Artificial Intelligence: The double-edged promise of AI (Technologist Jan. 9, 2017), http://www.technologist.eu/the-challenges-of-artificial-intelligence/ (accessed July 11, 2011). Deep Learning is a specific kind of machine learning: Deep Learning is a special type of Machine Learning ...
        ... Machine Learning, Deep Learning and Artificial Neural Networks One of the key aspects of an intelligent system is the ability to learn from experience. “Machine learning” is a term that refers to algorithms that can improve with the application of more data. Machine learning can be achieved in many different ways. ...
      • 2.
        CHB Chapter
        Title: Think Like a Lawyer, Talk Like a Geek 2016: Get Fluent in Technology
        Author(s): Jonathan T. Kaplan, Chris Osterwood, Peter Brown
        Published: Nov 2016
         
        ... Aug. 10, 2016). . Artificial Intelligence An Artificial Intelligence does not need to be a sentient agent, or something that can be described as having consciousness; it is simply a man-made system that behaves intelligently. In the book Artificial Intelligence , authors and computer science ...
        ... This has, in turn, lowered the monetary and physical cost of incorporating machine learning and adaptive software into robots and, more significantly, into mobile robots. Just within the last decade or so, it has become possible to build a mobile robot that includes, at a commercially-viable price, state-of-the-art machine learning, computer vision, and autonomy technology. ...
        ... Mackworth, Alan. Artificial Intelligence § 1.1 “What Is Artificial Intelligence” (Cambridge University Press, 2010) (hereinafter “Mackworth and Poole”). The full text is available online under a Creative Commons Attribution-Noncommercial-No Derivative Works 2.5 Canada License, at http://artint.info/html/ArtInt.html (accessed Aug. 23, 2016). ...
      • 3.
        CHB Chapter
        Title: International Employment Law 2017
        Author(s): Gerlind Wisskirchen
        Published: Jun 2017
         
        ... Categories of Artificial Intelligence in the economic field Deep Learning : machine learning based on a set of algorithms that attempt to model high-level abstractions in data. ...
        ... Categories of Artificial Intelligence in the economic field The Impact on the Labor Market Artificial Intelligenceand Its Impact on Competition in the World ...
        ... Computers and software simplify everyday tasks, and it is impossible to imagine how most of the steps of a procedure could be managed without them. But the use of artificial intelligence and robotics is accelerating. Thus, the question arise is what the future world of work will look like and how long it will take for this to happen. Will the future world of work be a world where humans do not have to spend so much time working to subsist? ...
      • 4.
        CHB Chapter
        Title: Employment Law Institute 2015
        Author(s): Tamika L. Tremaglio
        Published: Oct 2015
         
        ... Deloitte, Digital Forensics in the Mobile, BYOD, and Cloud Era ...
      • 5.
        CHB Chapter
        Title: Think Like a Lawyer, Talk Like a Geek 2014: Get Fluent in Technology
        Author(s): Joseph J. Lewczak
        Published: Nov 2014
         
        ... take adequate measures to monitor and assess whether the third-party vendor employed measures to appropriately protect personal information under the circumstances; and request or review relevant information about the third-party vendor’s security practices, such as written information security program or audits or assessments it may have had of its computer network. ...
        ... prohibited from misrepresenting in any manner, expressly or by implication, the extent to which GMR uses, maintains, and protects the privacy, confidentiality, security, or integrity of personal information collected from or about consumers, to establish a comprehensive information security program that would be “reasonably designed” to protect the security, confidentiality, and integrity of consumers’ sensitive personal information, including information the company provided to independent service providers, and ...
        ... Advertising, Interactive Marketing and Data Mining ...
      • 6.
        CHB Chapter
        Title: Advertising Law Institute 2016
        Author(s): Liisa M. Thomas
        Published: Sep 2016
         
        ... Big Data and the FCRA: Aggregating Data, Data Analytics, Data Mining, and Privacy Rights ...
      • 7.
        CHB Chapter
        Title: Hot Topics in Child Custody and Visitation for New York Practitioners 2017
        Author(s): Hal Silverman
        Published: May 2017
         
        ... Using Forensics and COIs in Custody and Visitation Proceedings (Substantive Outline) (March 31, 2017) ...
      • 8.
        CHB Chapter
        Title: Cybersecurity 2015: Managing the Risk
        Author(s): Emily Stapf
        Published: Sep 2015
         
        ... “Information security is a risk issue, not an IT issue,” Sotto says. “Information security should be a distinct function, with a separate governance structure and a separate budget so that appropriate resources are given to information security. ...
        ... Another explanation could be that more targeted security practices has enabled organizations to strategically optimize spending. “I think we are heading toward a paradigm shift in the way we spend on information security,” says Fernando Camarotti, chief information security officer of Vale, a global metals and mining company based in Rio de Janeiro. “In the past, the big spending projects tended to lock down all the data, but that’s no longer seen as effective. In addition to traditional information security ...
        ... South America was the only region to show a decline in the detection of compromises: The number of incidents dipped 9%. It’s worth noting that information security spending dropped 24% in South America, significantly more than other regions. Figure 4 Information security ...
      • 9.
        CHB Chapter
        Title: Hot Topics in Child Custody and Visitation for New York Practitioners 2017
        Author(s): Tracey A. Bing
        Published: May 2017
         
        ... Using Forensics and COIs in Custody and Visitation Hearings (Substantive Outline) (March 27, 2017) ...
      • 10.
        CHB Chapter
        Title: Corporate Counsel Institute 2015
        Author(s): Daniel Martin Katz 
        Published: Oct 2015
         
        ... http://www.telegraph.co.uk/technology/7963311/10-ways-data-is-changing-how-we-live.html . Increases in computing power and decreases in data storage costs—taken together with significant improvements in machinelearning and artificial intelligence— threaten to disrupt white-collar industries in much the manner that process engineering and automation reset the labor-versus-capital tradeoff in blue-collar industries. ...
        ... In particular, the diagnostic plots and fit statistics for this hold-out schema differed minimally . . . . Id. at 504–06 (emphasis added). Both of these validation steps outlined by the authors are critical to demonstrating that their model is robust and does not “overfit” the respective data. Overfitting is a serious problem in data mining and machinelearning ...
        ... See Robert Emmett Mueller, The Leonardo Paradox: Imagining the Ultimately Creative Computer , 23 L eonardo 427, 427 (1990) (highlighting the distinction between “hard” and “soft” artificial intelligence). It turns out that we still have only a very limited understanding of the human brain, and thus the direct artificial intelligence attempts to model its internal processes have borne little fruit. ... 




























































































      • 11.
        CHB Chapter
        Title: Sixteenth Annual Institute on Privacy and Data Security Law
        Author(s): Lisa J. Sotto
        Published: Jul 2015
         
        ... Earlier in the week, on December 8, the Senate passed by voice vote and without debate the Federal InformationSecurity Modernization Act of 2014 , which overhauls the 12 year-old Federal Information Security Management Act (“FISMA”). ...
        ... Specifically, it directs the National Cybersecurity and Communications Integration Center at DHS (“NCCIC”) to engage in continuous, collaborative and inclusive coordination with ISAOs with respect to sharing cybersecurity information, addressing cyber risks and incidents, and strengthening information security systems. The Executive Order addresses privacy concerns by ensuring that ISAOs agree to abide by a common set of privacy standards, and that agencies collaborating with ISAOs coordinate their activities with senior privacy officials and ensure the incorporation of appropriate privacy protections. ...
        ... This legislation replaces FISMA’s current requirement that agencies must file annual checklists that show the steps they have taken to secure their IT systems, and puts the Department of Homeland Security (“DHS”) in charge of “compiling and analyzing data on agency information security” and helping agencies install tools “to continuously diagnose and mitigate against cyber threats and vulnerabilities, with or without reimbursement.” ...
      • 12.
        CHB Chapter
        Title: Cybersecurity 2015: Managing the Risk
        Author(s): Lisa J. Sotto
        Published: Sep 2015
         
        ... Earlier in the week, on December 8, the Senate passed by voice vote and without debate the Federal InformationSecurity Modernization Act of 2014 , which overhauls the 12 year-old Federal Information Security Management Act (“FISMA”). ...
        ... Specifically, it directs the National Cybersecurity and Communications Integration Center at DHS (“NCCIC”) to engage in continuous, collaborative and inclusive coordination with ISAOs with respect to sharing cybersecurity information, addressing cyber risks and incidents, and strengthening information security systems. The Executive Order addresses privacy concerns by ensuring that ISAOs agree to abide by a common set of privacy standards, and that agencies collaborating with ISAOs coordinate their activities with senior privacy officials and ensure the incorporation of appropriate privacy protections. ...
        ... This legislation replaces FISMA’s current requirement that agencies must file annual checklists that show the steps they have taken to secure their IT systems, and puts the Department of Homeland Security (“DHS”) in charge of “compiling and analyzing data on agency information security” and helping agencies install tools “to continuously diagnose and mitigate against cyber threats and vulnerabilities, with or without reimbursement.” ...
      • 13.
        CHB Chapter
        Title: Cybersecurity 2017: Managing Cybersecurity Incidents
        Author(s): Lisa J. Sotto
        Published: Sep 2017
         
        ... Where information must be shared, ensure that comprehensive requirements for encryption, access to information, password management, handling of sensitive information and physical and network security are clearly laid out in your contract. Require cybersecurity insurance. ...
        ... Hunton & Williams LLP Privacy & Information Security Law Blog: Global Privacy and Cybersecurity Law Updates and Analysis ...
      • 14.
        CHB Chapter
        Title: Cybersecurity 2017: Managing Cybersecurity Incidents
        Author(s): Paul M. Tiao
        Published: Sep 2017
         
        ... Pursuant to the Measures, critical network products and services used in network and information systems relating to national security are subject to a network security review. Any network product or service purchased by operators of key information infrastructure will also be subject to a network security review, if such product or service might affect national security. ...
        ... The Cyberspace Administration of China will establish a network security review commission which will cooperate with experts and third-party institutions to evaluate the foregoing risks. ...
        ... the definition of private information under New York’s state breach notification law; adding “asset inventory and device management” to the list of required components of a covered entity’s cybersecurity policy; permitting a covered entity’s Chief Information Security ...
      • 15.
        CHB Chapter
        Title: Coping with U.S. Export Controls and Sanctions 2015
        Author(s): Julia Court Ryan, Benjamin H. Flowe, Jeffrey Schwartz
        Published: Dec 2015
         
        ... Cloud Computing/Best Practices for Data Management (December 12, 2014) ...
      • 16.
        CHB Chapter
        Title: Cybersecurity 2014: Managing the Risk
        Author(s): Lisa J. Sotto
        Published: Sep 2014
         
        ... The Policy Statement highlights three main points: the sharing of cyber threat information can improve efficiency and network security, thereby serving a valuable purpose; the information shared is typically technical in nature. It generally does not involve competitively sensitive information, such as current or future prices; and the exchange of cyber threat information is limited in scope and unlikely to harm competition. ...
        ... In an article published in Intelligent Utility Update , Hunton & Williams partner Paul M. Tiao discusses the effects of the leak on national security and on the relationship between the energy industry and the government. European Parliament Adopts Network and Information Security Directive ...
        ... March 13, 2014 On March 13, 2014, the European Parliament voted to adopt the draft directive on measures to ensure a uniform level of network and information security (“NIS Directive”). The NIS Directive was proposed by the European Commission on February 7, 2013 as part of its cybersecurity strategy for the European Union. The NIS Directive aims to ensure a uniform level of cybersecurity across the EU. The European Par ...
      • 17.
        CHB Chapter
        Title: Cybersecurity 2016: Managing Cybersecurity Incidents
        Author(s): Emily Stapf
        Published: Sep 2016
         
        ... They also are implementing awareness programs to help educate employees and executives about cybersecurity fundamentals and human vulnerabilities like spear phishing, which remains a very successful attack technique. Another notable measure of progress is a willingness to invest in cybersecurity. This year, respondents to The Global State of Information Security® Survey 2016 reported they have boosted information security spending significantly, and many are gearing up to tackle the cybersecurity juggernaut head on. (For details on incidents, impacts and costs, see Appendix A). ...
        ... European Commission, Network and Information Security (NIS) Directive, March 16, 2015 The Directive requires that organizations in certain critical infrastructure sectors adopt risk-management practices and report major incidents to national authorities. It also calls for the European Network and Information Security Agency (ENISA) to work with standardization bodies and relevant stakeholders to develop specifications for incident reporting. ...
        ... “But I think as more and more information on cyber comes out, companies are expanding their technology-centered view to include people and processes.” When it comes to cybersecurity, there is no more pivotal player than the top information security officer, typically the Chief Information Security Officer (CISO) or Chief Security Officer (CSO). ...
      • 18.
        CHB Chapter
        Title: Cybersecurity 2017: Managing Cybersecurity Incidents
        Author(s): Emily Stapf
        Published: Sep 2017
         
        ... European Commission, Network and Information Security (NIS) Directive , March 16, 2015 The Directive requires that organizations in certain critical infrastructure sectors adopt risk-management practices and report major incidents to national authorities. It also calls for the European Network and Information Security Agency (ENISA) to work with standardization bodies and relevant stakeholders to develop specifications for incident reporting. ...
        ... “But I think as more and more information on cyber comes out, companies are expanding their technology-centered view to include people and processes.” When it comes to cybersecurity, there is no more pivotal player than the top information security officer, typically the Chief Information Security Officer (CISO) or Chief Security Officer (CSO). ...
        ... Risk-based frameworks also can help businesses design, measure and monitor goals toward an improved cybersecurity program that centers around the safety and security of client and organizational information. The Canadian Imperial Bank of Commerce (CIBC),for instance, has developed a scorecard based on framework controls that it uses to measure the maturity of its security program, according to Joe LoBianco, vice president of informationsecurity for the Toronto-based bank. ...
      • 19.
        CHB Chapter
        Title: Hot Topics for In-House Counsel 2016
        Author(s): Kenneth P. Mortensen
        Published: Oct 2016
         
        ... They also are implementing awareness programs to help educate employees and executives about cybersecurity fundamentals and human vulnerabilities like spear phishing, which remains a very successful attack technique. Another notable measure of progress is a willingness to invest in cybersecurity. This year, respondents to The Global State of Information Security® Survey 2016 reported they have boosted information security spending significantly, and many are gearing up to tackle the cybersecurity juggernaut head on. (For details on incidents, impacts and costs, see Appendix A). ...
        ... European Commission, Network and Information Security (NIS) Directive, March 16, 2015 The Directive requires that organizations in certain critical infrastructure sectors adopt risk-management practices and report major incidents to national authorities. It also calls for the European Network and Information Security Agency (ENISA) to work with standardization bodies and relevant stakeholders to develop specifications for incident reporting. ...
        ... When it comes to cybersecurity, there is no more pivotal player than the top information security officer, typically the Chief Information Security Officer (CISO) or Chief Security Officer (CSO). It is a role whose responsibilities and competencies have become increasingly visible and critical. ...
      • 20.
        CHB Chapter
        Title: Seventeenth Annual Institute on Privacy and Data Security Law
        Author(s): Lisa J. Sotto
        Published: Jul 2016
         
        ... of their digital security.” The CNAP includes an action to modernize government information technology and transform how the government manages cybersecurity through the proposal of a $3.1 billion Information Technology Modernization Fund, which will include the formation of a Federal Chief Information Security Officer position. ...
        ... European Negotiators Close Deal on First EU Rules on Cybersecurity December 9, 2015 On December 7, 2015, European negotiators reached an agreement on the draft text of the Network and Information Security Directive (the “NIS Directive”), the first pan-EU rules on cybersecurity. ...
        ... It will be greater still if network security remains foremost in mind. ... 
























































































































      *


      POIESIS 

      Search for: "computer science" OR "information science" OR "computer programming"
      OR informatics OR "data management" OR "information security" OR "network security"
      OR forensics OR "visual computing" OR "data mining" OR "machine learning" OR
      "multimedia databases" OR "artificial intelligence" Finds

      1,722 Results

      POIESIS is a searchable and browseable database of scholarly philosophy journals

      Content Sample

      Displaying: 1-10 of 1722 documents

      Show all hits (2628 documents)

      2.153 sec
      Mark/Clear All Documents on Page

      1.

      Volume > 20 > Issue: 9/10 
      Andrew Targowski
      The Cognitive Informatics Approach towards Wisdom
      Dialogue and Universalism
      vol. 20, no. 9/10, pages 51 - 82,  2010, DOI: 10.5840/du2010209/1015
      ... , artificial intelligence and cognitive informatics really ready ... Cognitive Informatics versus Computer Science and Information ... informatics just wanted to emphasize that it is not computer science ...

      2.

      Volume > 28 > Issue: 4 
      William J. Rapaport 
      Philosophy of Computer Science: An Introductory Course
      Teaching Philosophy
      vol. 28, no. 4, pages 319 - 341,  2005, DOI: 10.5840/teachphil200528443
      ... ”). The philosophy of computer science is not the philosophy of artificial intelligence (AI ... in computer science in general and artificial intelligence in particular. My colleague ... Philosophy of Computer Science ...

      3.

      Volume > 22 > Issue: 3 
      Andrew Targowski
      Teaching for Wisdom
      Dialogue and Universalism
      vol. 22, no. 3, pages 93 - 114,  2012, DOI: 10.5840/du201222320
      ... others. 3 The application of data mining allows ... build “thinking machines” using artificial intelligence. Furthermore... as “optimal” or “wise” are generated by artificial intelligence. Another ...

      4.

      Volume > 4 > Issue: 3/4 
      Raymond S. Nickerson
      Computer programming as a vehicle for teaching thinking skills
      Thinking: The Journal of Philosophy for Children
      vol. 4, no. 3/4, pages 42 - 48,  1983, DOI: 10.5840/thinking19834310
      ... Computer programming as a vehicle for teaching thinking skills ... Page 42 Computer Programming as a Vehicle for Teaching Thinking Skills, Raymond ... Computer programming as a vehicle for teaching thinking skills ...

      5.

      Volume > 17 > Issue: 3 
      Sanda Monica Tataram
      Visual Computer Programming: Semiotic and Cognitive Aspects
      The American Journal of Semiotics
      vol. 17, no. 3, pages 157 - 173,  2001, DOI: 10.5840/ajs200117336
      ... Visual Computer Programming: Semiotic and Cognitive Aspects ... VISUAL COMPUTER PROGRAMMING: Semiotic and Cognitive Aspects Sanda Monica ... Tartaram Bucharest University, Romania 1. Introduction Computerprogramming ...

      6.

      Volume > 32 
      Gerard Casey 
      Artificial Intelligence and Wittgenstein
      Philosophical Studies
      vol. 32, pages 156 - 175,  1988/1990, DOI: 10.5840/philstudies19883239
      ... and Edward Feigenbaum “Artificial Intelligence is the part of computer science concerned ... Artificial Intelligenceand Wittgenstein ... interested in artificial intelligence. After all, Wittgenstein died in 1951 and the term ...

      7.

      Volume > 2 > Issue: 2/3 
      Automated Analysis of Legal Texts (Logic, Informatics, Law)
      Theoria. Revista de Teoría, Historia y Fundamentos de la Ciencia
      vol. 2, no. 2/3, pages 681 - 686,  1987
      ... : ARTIFICIAL INTELLIGENCE AND EXPERT SYSTEMS IN LAW: METHODOLOGY AND APPLICATIONS System ...PROCESSING Legal Information Science, an International Discipline: Prospects ... Automated Analysis of Legal Texts (Logic, Informatics, Law) ...

      8.

      Volume > 16 > Issue: 3/4 
      Roman Kulikowski, Maciej Krawczak
      Warsaw School of Information Technology
      Dialogue and Universalism
      vol. 16, no. 3/4, pages 21 - 22,  2006, DOI: 10.5840/du2006163/450
      ... of Computer Science (major: Computer Science) and Faculty of Computer Techniques ... -hardware engineering. WIT’s Faculty of Computer Science is the only one in Poland ... specialisations: computer science in business, design and management ...

      9.

      Volume > 15 > Issue: 3 
      Granville C. Henry, Michael G. Geertsen
      Whiteheadian Philosophy and Prolog Computer Programming
      Process Studies
      vol. 15, no. 3, pages 181 - 191,  1986, DOI: 10.5840/process198615338
      ... Whiteheadian Philosophy and Prolog Computer Programming ... Whiteheadian Philosophy and Prolog ComputerProgramming Granville C. Henry ... analysis, expert sys tems, and projects in artificial intelligence. It has been ...

      10.

      Volume > 39 > Issue: 4 
      Ralf Müller 
      A Companion to Cognitive Science
      International Philosophical Quarterly
      vol. 39, no. 4, pages 486 - 487,  1999, DOI: 10.5840/ipq199939460
      ... research areas (like “artificial intelligence”). Part IV covers seven different stances ... -sided. Forty-five come from psychology departments, but only six from computer science ... , for instance, reports on “brain mapping,” Thagard on “machine learning”). The essays ...

      11.

      Volume > 12 > Issue: 2 
      Marianne Ryan
      Federal Ethics Regulations Governing Internet Research: New Educational Challenges For Universities
      Teaching Ethics
      vol. 12, no. 2, pages 127 - 136,  2012, DOI: 10.5840/tej201212218
      ... anonymity of deidentified datamanagement of public ... Society for Information Science & Technology included a session ... note that many computer science students either were unaware ...

      12.

      Volume > 20 > Issue: 4 
      James McGray
      Logic and Prolog
      Teaching Philosophy
      vol. 20, no. 4, pages 447 - 455,  1997, DOI: 10.5840/teachphil199720453
      ... enough logic and Prolog to treat issues in artificial intelligence in a practical ... to artificial intelligence. Automated reasoning is exemplified by Wang's Algorithm as well ... . The text might work for a course on automated reasoning or artificial intelligence ...

      13.

      Volume > 16 > Issue: 3 
      Donald Gillies, Yuxin Zheng
      Dynamic Interactions with the Philosophy of Mathematics
      Theoria. Revista de Teoría, Historia y Fundamentos de la Ciencia
      vol. 16, no. 3, pages 437 - 459,  2001
      ... of mathematics. The first is with philosophy of scicnce, and thc sccond with computer science ... with computerscience. The analysis cnables Lakatos to be charactcrised as thc first ... fields: philosophy of science and computerscience. The first of these inter ...

      14.

      Volume > 46 
      Ouyang Kang
      On the Emergence and the Research Outline of Social Information Science
      Proceedings of the XXII World Congress of Philosophy
      vol. 46, pages 37 - 52,  2008
      ... Social Information Science (or Social Informatics) is a new and interdiscipline ... information science (or socialinformatics) research that will soon ... of the informatics. 2. The social information science is a generalization ...

      15.

      Volume > 20 > Issue: 1 
      Michael Falgoust
      Data Science and Designing for Privacy
      Techné: Research in Philosophy and Technology
      vol. 20, no. 1, pages 51 - 68,  2016, DOI: 10.5840/techne201632446
      ... science, it is a branch of information science. Successful data science requires ... , machine learning, and the social sciences, the enhanced ability to identify ... information from data mining. By nature, innovations in data science will make ...

      16.

      Volume > 10 > Issue: 2 
      Contributors
      Teaching Ethics
      vol. 10, no. 2, pages 109 - 112,  2010, DOI: 10.5840/tej201010220
      ... o f the Computer Science Technology department at Saint Louis ... has conducted research in the areas o f Information Security ... in the areas o f informatics, application development and in the social ...

      17.

      Volume > 1 > Issue: 4 
      Alfreda Baker
      Perkins, Pascal, and the Power of Critical Thinking
      Inquiry: Critical Thinking Across the Disciplines
      vol. 1, no. 4, pages 5 - 5,  1988, DOI: 10.5840/inquiryctnews19881463
      ... of Computer Science I, a class mainly composed for majors in that field. The fact ... that skillful individuals in fields as different as chess, geometry, physics, computer ... programming, sociology, and biology retain abstract grinciples in their domain ...

      18.

      Volume > 3 > Issue: 2 
      Janice Moulton,  Jane Voytek 
      Can Humans Think Machines Think?
      Teaching Philosophy
      vol. 3, no. 2, pages 153 - 167,  1979, DOI: 10.5840/teachphil19793224
      ... to treat philosophically. Many science fiction fans and computer science majors ... in artificial intelligence. They were not intended to represent the working of the human ... , much closer than Turing and other researchers in artificialintelligence would have ...

      19.

      Volume > 19 > Issue: 1/2 
      Gaetano Aurelio Lanzarone
      Computational Reflection, Machines and Minds
      Dialogue and Universalism
      vol. 19, no. 1/2, pages 9 - 30,  2009, DOI: 10.5840/du2009191/273
      ... of Computer Science and Artificial Intelligence of the last decades must be taken ... in Computer Science and Artificial Intelligence occurred in the last decades ... Science and Artificial Intelligence of the last decades must be taken into account ...

      20.

      Year > 2004 > Issue: 28 
      Joanna Bryson
      Now for the tricky bit...
      The Philosophers' Magazine
      no. 28, pages 70 - 72,  2004, DOI: 10.5840/tpm20042818
      ... for the tricky bit... artificial intelligence ... in the department of computer science at the University of Bath ... 71artificial intelligence ...




        David Dillard


        NET-GOLD

        http://groups.yahoo.com/group/net-gold

         

        https://groups.io/org/groupsio/net-gold/archives

        http://net-gold.3172864.n2.nabble.com/

         

        Research Guides

        https://sites.google.com/site/researchguidesonsites/

         

         

        Research Paper Writing

        https://sites.google.com/site/howtowriteasuperresearchpaper/
        Employment

        https://sites.google.com/site/employmentsources/

        Internships

        https://sites.google.com/site/internshipsarticles/

        Hospitality

        https://sites.google.com/site/hospitalitydatabasesandtools/

        Disabilities And Employment

        https://sites.google.com/site/disabilitynetsources/Home/employment-and-disabilities

        Indoor Gardening

        https://groups.yahoo.com/neo/groups/indoorgardeningurban/info

        Educator-Gold

        http://groups.yahoo.com/group/educator-gold/

        K12ADMINLIFE

        http://groups.yahoo.com/group/k12adminlife/

         

        Blog

        https://educatorgold.wordpress.com/

         

        Research Guide:

        Information Literacy

        http://tinyurl.com/78a4shn

         

        Twitter: davidpdillard

         

        Bushell, R. & Sheldon, P. (Eds),

        Wellness and Tourism: Mind, Body, Spirit,

        Place, New York: Cognizant Communication Books.

        Wellness Tourism: Bibliographic and Webliographic Essay

        David P. Dillard

        http://tinyurl.com/p63whl

         

        Railtram Discussion Group

        from the union pacific to britrail and beyond

        https://groups.yahoo.com/neo/groups/railtram/info

         

        Indoor Gardening

        improve your chances for indoor gardening success

        http://tech.groups.yahoo.com/group/indoorgardeningurban/

         

        Sport-Med

        https://www.jiscmail.ac.uk/lists/sport-med.html

        http://groups.yahoo.com/group/sports-med/


         

        Health Diet Fitness Recreation Sports Tourism

        https://groups.yahoo.com/neo/groups/healthrecsport/info


         

         

         

         

         

         

        .

         

        .

         

        Please Ignore All Links to JIGLU

        in search results for Net-Gold and related lists.

        The Net-Gold relationship with JIGLU has

        been terminated by JIGLU and these are dead links.

        http://groups.yahoo.com/group/Net-Gold/message/30664

        http://health.groups.yahoo.com/group/healthrecsport/message/145


         

        .

         

        .

         












































































































































































































































































































































































































        Comments