Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (9)
  • 2015-2019  (9)
  • Computer science
  • Computer Science  (8)
  • Law  (1)
Material
Language
Years
Year
  • 1
    ISBN: 9783662540336
    Language: English
    Pages: 1 Online-Ressource (xii, 261 Seiten)
    Series Statement: The Frontiers Collection
    Parallel Title: Erscheint auch als The technological singularity
    Parallel Title: Print version Callaghan, Victor The Technological Singularity : Managing the Journey
    DDC: 100
    RVK:
    Keywords: Computer science ; Electronic books ; Einzigkeit ; Technischer Fortschritt ; Wissenschaftsethik ; Künstliche Intelligenz ; Risikomanagement
    Abstract: Foreword -- References -- Acknowledgements -- Contents -- 1 Introduction to the Technological Singularity -- 1.1 Why the "Singularity" Is Important -- 1.2 Superintelligence, Superpowers -- 1.3 Danger, Danger! -- 1.4 Uncertainties and Safety -- References -- Risks of, and Responses to, the Journey to the Singularity -- 2 Risks of the Journey to the Singularity -- 2.1 Introduction -- 2.2 Catastrophic AGI Risk -- 2.2.1 Most Tasks Will Be Automated -- 2.2.2 AGIs Might Harm Humans -- 2.2.3 AGIs May Become Powerful Quickly -- 2.2.3.1 Hardware Overhang -- 2.2.3.2 Speed Explosion -- 2.2.3.3 Intelligence Explosion -- References -- 3 Responses to the Journey to the Singularity -- 3.1 Introduction -- 3.2 Post-Superintelligence Responses -- 3.3 Societal Proposals -- 3.3.1 Do Nothing -- 3.3.1.1 AI Is Too Distant to Be Worth Our Attention -- 3.3.1.2 Little Risk, no Action Needed -- 3.3.1.3 Let Them Kill Us -- 3.3.1.4 "Do Nothing" Proposals-Our View -- 3.3.2 Integrate with Society -- 3.3.2.1 Legal and Economic Controls -- 3.3.2.2 Foster Positive Values -- 3.3.2.3 "Integrate with Society" Proposals-Our View -- 3.3.3 Regulate Research -- 3.3.3.1 Review Boards -- 3.3.3.2 Encourage Research into Safe AGI -- 3.3.3.3 Differential Technological Progress -- 3.3.3.4 International Mass Surveillance -- 3.3.3.5 "Regulate Research" Proposals-Our View -- 3.3.4 Enhance Human Capabilities -- 3.3.4.1 Would We Remain Human? -- 3.3.4.2 Would Evolutionary Pressures Change Us? -- 3.3.4.3 Would Uploading Help? -- 3.3.4.4 "Enhance Human Capabilities" Proposals-Our View -- 3.3.5 Relinquish Technology -- 3.3.5.1 Outlaw AGI -- 3.3.5.2 Restrict Hardware -- 3.3.5.3 "Relinquish Technology" Proposals-Our View -- 3.4 External AGI Constraints -- 3.4.1 AGI Confinement -- 3.4.1.1 Safe Questions -- 3.4.1.2 Virtual Worlds -- 3.4.1.3 Resetting the AGI -- 3.4.1.4 Checks and Balances
    Abstract: 3.4.1.5 "AI Confinement" Proposals-Our View -- 3.4.2 AGI Enforcement -- 3.4.2.1 "AGI Enforcement" Proposals-Our View -- 3.5 Internal Constraints -- 3.5.1 Oracle AI -- 3.5.1.1 Oracles Are Likely to Be Released -- 3.5.1.2 Oracles Will Become Authorities -- 3.5.1.3 "Oracle AI" Proposals-Our View -- 3.5.2 Top-Down Safe AGI -- 3.5.2.1 Three Laws -- 3.5.2.2 Categorical Imperative -- 3.5.2.3 Principle of Voluntary Joyous Growth -- 3.5.2.4 Utilitarianism -- 3.5.2.5 Value Learning -- 3.5.2.6 Approval-Directed Agents -- 3.5.2.7 "Top-Down Safe AGI" Proposals-Our View -- 3.5.3 Bottom-up and Hybrid Safe AGI -- 3.5.3.1 Evolutionary Invariants -- 3.5.3.2 Evolved Morality -- 3.5.3.3 Reinforcement Learning -- 3.5.3.4 Human-like AGI -- 3.5.3.5 "Bottom-up and Hybrid Safe AGI" Proposals-Our View -- 3.5.4 AGI Nanny -- 3.5.4.1 "AGI Nanny" Proposals-Our View -- 3.5.5 Motivational Scaffolding -- 3.5.6 Formal Verification -- 3.5.6.1 "Formal Verification" Proposals-Our View -- 3.5.7 Motivational Weaknesses -- 3.5.7.1 High Discount Rates -- 3.5.7.2 Easily Satiable Goals -- 3.5.7.3 Calculated Indifference -- 3.5.7.4 Programmed Restrictions -- 3.5.7.5 Legal Machine Language -- 3.5.7.6 "Motivational Weaknesses" Proposals-Our View -- 3.6 Conclusion -- Acknowledgementss -- References -- Managing the Singularity Journey -- 4 How Change Agencies Can Affect Our Path Towards a Singularity -- 4.1 Introduction -- 4.2 Pre-singularity: The Dynamic Process of Technological Change -- 4.2.1 Paradigm Shifts -- 4.2.2 Technological Change and Innovation Adoption -- 4.2.3 The Change Agency Perspective -- 4.2.3.1 Business Organisations as Agents of Change in Innovation Practice -- 4.2.3.2 Social Networks as Agents of Change -- 4.2.3.3 The Influence of Entrepreneurs as Agents of Change -- 4.2.3.4 Nation States as Agents of Change -- 4.3 Key Drivers of Technology Research and Their Impact
    Abstract: 4.4 The Anti-singularity Postulate -- 4.5 Conclusions -- References -- 5 Agent Foundations for Aligning Machine Intelligence with Human Interests: A Technical Research Agenda -- 5.1 Introduction -- 5.1.1 Why These Problems? -- 5.2 Highly Reliable Agent Designs -- 5.2.1 Realistic World-Models -- 5.2.2 Decision Theory -- 5.2.3 Logical Uncertainty -- 5.2.4 Vingean Reflection -- 5.3 Error-Tolerant Agent Designs -- 5.4 Value Specification -- 5.5 Discussion -- 5.5.1 Toward a Formal Understanding of the Problem -- 5.5.2 Why Start Now? -- References -- 6 Risk Analysis and Risk Management for the Artificial Superintelligence Research and Development Process -- 6.1 Introduction -- 6.2 Key ASI R&D Risk and Decision Issues -- 6.3 Risk Analysis Methods -- 6.3.1 Fault Trees -- 6.3.2 Event Trees -- 6.3.3 Estimating Parameters for Fault Trees and Event Trees -- 6.3.4 Elicitation of Expert Judgment -- 6.3.5 Aggregation of Data Sources -- 6.4 Risk Management Decision Analysis Methods -- 6.5 Evaluating Opportunities for Future Research -- 6.6 Concluding Thoughts -- Acknowledgements -- References -- 7 Diminishing Returns and Recursive Self Improving Artificial Intelligence -- 7.1 Introduction -- 7.2 Self-improvement -- 7.2.1 Evolutionary Algorithms -- 7.2.2 Learning Algorithms -- 7.3 Limits of Recursively Improving Intelligent Algorithms -- 7.3.1 Software Improvements -- 7.3.2 Hardware Improvements -- 7.4 The Takeaway -- References -- 8 Energy, Complexity, and the Singularity -- 8.1 A Contradiction -- 8.2 Challenges -- 8.2.1 Climate Change -- 8.2.2 Biodiversity and Ecosystem Services -- 8.2.3 Energy-or, Where's My Jetsons Car? -- 8.2.4 The Troubles with Science -- 8.3 Energy and Complexity -- 8.4 Exponentials and Feedbacks -- 8.5 Ingenuity, not Data Processing -- 8.6 In Summary -- Acknowledgements -- References
    Abstract: 9 Computer Simulations as a Technological Singularity in the Empirical Sciences -- 9.1 Introduction -- 9.2 The Anthropocentric Predicament -- 9.3 The Reliability of Computer Simulations -- 9.3.1 Verification and Validation Methods -- 9.4 Final Words -- References -- 10 Can the Singularity Be Patented? (And Other IP Conundrums for Converging Technologies) -- 10.1 Introduction -- 10.2 A Singular Promise -- 10.3 Intellectual Property -- 10.3.1 Some General IP Problems in Converging Technologies -- 10.3.2 Some Gaps in IP Relating to the Singularity -- 10.4 Limits to Ownership and Other Monopolies -- 10.5 Owning the Singularity -- 10.6 Ethics, Patents and Artificial Agents -- 10.7 The Open Alternative -- References -- 11 The Emotional Nature of Post-Cognitive Singularities -- 11.1 Technological Singularity: Key Concepts -- 11.1.1 Tools and Methods -- 11.1.2 Singularity: Main Hypotheses -- 11.1.3 Implications of Post-singularity Entities with Advanced, Meta-cognitive Intelligence Ruled by Para-emotions -- 11.2 Post-cognitive Singularity Entities and their Physical Nature -- 11.2.1 Being a Singularity Entity -- 11.2.1.1 Super-intelligent Entities -- 11.2.1.2 Transhumans -- 11.2.2 Post Singularity Entities as Living Systems? -- 11.3 Para-emotional Systems -- 11.4 Conclusions -- Acknowledgements -- References -- 12 A Psychoanalytic Approach to the Singularity: Why We Cannot Do Without Auxiliary Constructions -- 12.1 Introduction -- 12.2 AI and Intelligence -- 12.3 Consciousness -- 12.4 Reason and Emotion -- 12.5 Psychoanalysis -- 12.6 Conclusion -- References -- Reflections on the Journey -- 13 Reflections on the Singularity Journey -- 13.1 Introduction -- 13.2 Eliezer Yudkowsky -- 13.2.1 The Event Horizon -- 13.2.2 Accelerating Change -- 13.2.3 The Intelligence Explosion -- 13.2.4 MIRI and LessWrong -- 13.3 Scott Aaronson -- 13.4 Stuart Armstrong
    Abstract: 13.5 Too Far in the Future -- 13.6 Scott Siskind -- 13.6.1 Wireheading -- 13.6.2 Work on AI Safety Now -- 14 Singularity Blog Insights -- 14.1 Three Major Singularity Schools -- 14.2 AI Timeline Predictions: Are We Getting Better? -- 14.3 No Time Like the Present for AI Safety Work -- 14.4 The Singularity Is Far -- Appendix -- The Coming Technological Singularity: How to Survive in the Post-human Era (reprint) -- References -- References -- Titles in this Series
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9781107446984
    Language: English
    Pages: 1 Online-Ressource (xv, 535 Seiten) , Diagramme
    Parallel Title: Erscheint auch als
    DDC: 302/.130285
    RVK:
    RVK:
    RVK:
    Keywords: Informatik ; Social choice ; Interdisciplinary research ; Computer science ; Kollektiventscheidung ; Computerunterstütztes Verfahren ; Public-Choice-Theorie ; Informatik ; Kollektiventscheidung ; Public-Choice-Theorie ; Computerunterstütztes Verfahren ; Kollektiventscheidung ; Informatik
    Note: Auf der Frontpage: "Online publication date: May 2016" , Title from publisher's bibliographic system (viewed on 05 May 2016)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9781137400529
    Language: English
    Pages: 1 Online-Ressource (XIII, 222 Seiten)
    Edition: Springer eBook Collection. Political Science and International Studies
    Series Statement: New security challenges series
    Parallel Title: Erscheint auch als Christou, George, 1973 - Cybersecurity in the European Union
    DDC: 005.8
    RVK:
    RVK:
    Keywords: Computer science ; Political science ; European Union ; International relations ; Politics and war ; Computer security ; Computer science ; Political science ; European Union ; International relations ; Politics and war ; Computer security ; Außenpolitik ; Politische Wissenschaft ; Computersicherheit ; Europäische Union ; Internet ; Internetkriminalität ; Politik ; Sicherheit
    Abstract: Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future.
    Abstract: Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9781107060432
    Language: English
    Pages: xv, 535 Seiten , Diagramme
    DDC: 302/.130285
    RVK:
    RVK:
    RVK:
    Keywords: Informatik ; Social choice ; Interdisciplinary research ; Computer science ; Public-Choice-Theorie ; Computerunterstütztes Verfahren ; Kollektiventscheidung ; Informatik ; Aufsatzsammlung ; Aufsatzsammlung ; Kollektiventscheidung ; Public-Choice-Theorie ; Computerunterstütztes Verfahren ; Kollektiventscheidung ; Informatik
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Book
    Book
    New York, NY : Apress, Springer Science+Business Media
    ISBN: 9781484220580
    Language: English
    Pages: xxv, 279 Seiten , Illustrationen , 184 x 254 x 19
    Series Statement: Books for professionals by professionals
    Parallel Title: Erscheint auch als Hicks, Richard M. Implementing DirectAccess with Windows Server 2016
    Parallel Title: Erscheint auch als Hicks, Richard M. Implementing DirectAccess with Windows Server 2016
    RVK:
    Keywords: Computer science ; Computer system failures ; Operating systems (Computers) ; Datenbankverwaltung ; Windows Server 2016
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9783319219547
    Language: English
    Pages: Online-Ressource
    Edition: Springer eBook Collection. Computer Science
    Series Statement: Human-Computer Interaction Series
    DDC: 005.437
    RVK:
    RVK:
    Keywords: Computer science ; User interfaces (Computer systems) ; Application software ; Social sciences ; Ethnomethodologie ; Design Thinking ; Wissenschaftskritik
    Abstract: This book aims to deconstruct ethnography to alert systems designers, and other stakeholders, to the issues presented by new approaches that move beyond the studies of ‘work’ and ‘work practice’ within the social sciences (in particular anthropology and sociology). The theoretical and methodological apparatus of the social sciences distort the social and cultural world as lived in and understood by ordinary members, whose common-sense understandings shape the actual milieu into which systems are placed and used.  In Deconstructing Ethnography the authors show how ‘new’ calls are returning systems design to ‘old’ and problematic ways of understanding the social. They argue that systems design can be appropriately grounded in the social through the ordinary methods that members use to order their actions and interactions.  This work is written for post-graduate students and researchers alike, as well as design practitioners who have an interest in bringing the social to bear on design in a systematic rather than a piecemeal way. This is not a ‘how to’ book, but instead elaborates the foundations upon which the social can be systematically built into the design of ubiquitous and interactive systems
    Description / Table of Contents: IntroductionBuilding the Social into System Design -- Ethnography as Cultural Theory -- ‘New’ Ethnography and Ubiquitous Computing -- Interpretation, Reflexivity and Objectivity -- The Missing What of Ethnographic Studies -- Ethnography, Ethnomethodology and Design -- Members’ Not Ethnographers’ Methods.
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Cham : Springer
    ISBN: 9783319227351
    Language: English
    Pages: Online-Ressource (xiii, 126 pages) , illustrations (some color)
    Edition: 1st ed. 2015
    Edition: Online-Ausg. Springer eBook Collection. Computer Science
    DDC: 302.30285
    RVK:
    Keywords: Computer science ; Application software ; Graph theory ; Soziales Netzwerk ; Informatik ; Graphentheorie ; Anwender-Software ; Empfehlungssystem ; Verhaltensforschung
    Abstract: This book introduces novel techniques and algorithms necessary to support the formation of social networks. Concepts such as link prediction, graph patterns, recommendation systems based on user reputation, strategic partner selection, collaborative systems and network formation based on ‘social brokers’ are presented. Chapters cover a wide range of models and algorithms, including graph models and a personalized PageRank model. Extensive experiments and scenarios using real world datasets from GitHub, Facebook, Twitter, Google Plus and the European Union ICT research collaborations serve to enhance reader understanding of the material with clear applications. Each chapter concludes with an analysis and detailed summary. Social Network-Based Recommender Systems is designed as a reference for professionals and researchers working in social network analysis and companies working on recommender systems. Advanced-level students studying computer science, statistics or mathematics will also find this books useful as a secondary text
    Description / Table of Contents: Overview of Social Recommender SystemsLink Prediction for Directed Graphs -- Follow Recommendation in Communities -- Partner Recommendation -- Social Broker Recommendation -- Conclusion.
    Note: Includes bibliographical references at the end of each chapters
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9789401793858
    Language: English
    Pages: Online-Ressource (XX, 406 p. 30 illus., 16 illus. in color, online resource)
    Series Statement: Law, Governance and Technology Series 20
    Series Statement: SpringerLink
    Series Statement: Bücher
    Series Statement: Springer eBook Collection
    Series Statement: Humanities, Social Sciences and Law
    Parallel Title: Druckausg. Reforming European data protection law
    RVK:
    RVK:
    Keywords: Technology Philosophy ; Data protection ; Computer science ; Computers Law and legislation ; Law ; Konferenzschrift 2014 ; Konferenzschrift ; Europäische Union ; Datenschutz
    Abstract: This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014. The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights and values. Next, the book looks at preventing privacy risks and harms through impact assessments. It contains discussions on the tools and methodologies for impact assessments as well as case studies. The book then goes on to cover the purported trade-off between privacy and security, ways to support privacy and data protection, and the controversial right to be forgotten, which offers individuals a means to oppose the often persistent digital memory of the web. Written during the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission, this interdisciplinary book presents both daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9783319279329
    Language: English
    Pages: 1 Online-Ressource ( XII, 208 Seiten)
    Series Statement: Lecture notes in computer science 9398
    DDC: 025.04
    RVK:
    Keywords: Computer Science ; Computer science ; Database management ; Information storage and retrieval ; Multimedia information systems ; Text processing (Computer science) ; User interfaces (Computer systems) ; Informatik ; Semantic Web ; Information Retrieval ; Künstliche Intelligenz ; Maschinelles Lernen ; Natürliche Sprache
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...