Abstractions are good for brains and machines: A commentary on Ambridge (2020)

2020 ◽  
Vol 40 (5-6) ◽  
pp. 631-635
Author(s):  
Kathryn D. Schuler ◽  
Jordan Kodner ◽  
Spencer Caplan

In ‘Against Stored Abstractions,’ Ambridge uses neural and computational evidence to make his case against abstract representations. He argues that storing only exemplars is more parsimonious – why bother with abstraction when exemplar models with on-the-fly calculation can do everything abstracting models can and more – and implies that his view is well supported by neuroscience and computer science. We argue that there is substantial neural, experimental, and computational evidence to the contrary: while both brains and machines can store exemplars, forming categories and storing abstractions is a fundamental part of what they do.

2017 ◽  
Vol 01 (01) ◽  
pp. 1630001 ◽  
Author(s):  
Hossein Fani ◽  
Ebrahim Bagheri

Online social networks have become a fundamental part of the global online experience. They facilitate different modes of communication and social interactions, enabling individuals to play social roles that they regularly undertake in real social settings. In spite of the heterogeneity of the users and interactions, these networks exhibit common properties. For instance, individuals tend to associate with others who share similar interests, a tendency often known as homophily, leading to the formation of communities. This entry aims to provide an overview of the definitions for an online community and review different community detection methods in social networks. Finding communities are beneficial since they provide summarization of network structure, highlighting the main properties of the network. Moreover, it has applications in sociology, biology, marketing and computer science which help scientists identify and extract actionable insight.


Author(s):  
Ángel Pisco Gómez ◽  
Yanina Holanda Campozano Pilay ◽  
Jimmy Leonardo Gutiérrez García ◽  
Mario Javier Marcillo Merino ◽  
Robards Javier Lima Pisco

La investigación realizada presenta una perspectiva de Análisis de las principales técnicas de hacking para la Universidad Estatal del Sur de Manabí. Actualmente las universidades, organizaciones y compañías están expuestas  a numerosas amenazas  que violan sus sistemas informáticos, ya que esto pone en riesgo la integridad de la información. Un  hacker es  una persona con grandes conocimientos de informática que se dedica a acceder ilegalmente a sistemas informáticos ajenos y a manipularlos. Ya que uno de los métodos para lograr mitigar eficazmente los impactos provocados por un ataque informático, es precisamente tener conocimiento de la manera como estos atacan y conocer los posibles puntos débiles de un sistema comúnmente explotados y en los cuales se debe hacer especial énfasis al momento de concentrar los esfuerzos de seguridad propensos a la prevención de los mismos. La metodología que se utilizo fue la cualitativa la cual nos ayudó a describir de forma minuciosa los hechos, situaciones, comportamientos, interacciones que se observan mediante la investigación realizada. Ya que la información representa un papel muy importante dentro de las instituciones pues es la parte más primordial y día a día se encuentra expuesta a sufrir modificaciones y en muchos casos a ser hacheada  en su totalidad y es por eso importante asegurar la integridad de la  información. Por lo tanto, es necesario determinar que herramientas utilizar, y las técnicas fundamentales para probar la vulnerabilidad de los sistemas de información y de las redes instaladas. PALABRAS CLAVE: herramientas; información; seguridad; técnicas; vulnerabilidades. ANALYSIS OF THE MAIN HACKING TECHNIQUES FOR THE SOUTHERN MANABI STATE UNIVERSITY ABSTRACT The research carried out presents an analysis perspective of the main hacking techniques for the State University of the South of Manabí. Currently universities, organizations and companies are exposed to numerous threats that violate their computer systems, as this puts the integrity of the information at risk. A hacker is a person with great knowledge of computer science that is dedicated to illegally accessing foreign computer systems and manipulating them. The methodology that was used was the qualitative one which helped us to describe in a thorough way the facts, situations, behaviors, interactions that are observed through the research carried out. Since one of the methods to achieve effectively mitigate the impacts caused by a computer attack, is precisely to have knowledge of how they attack and know the possible weaknesses of a system commonly exploited and in which special emphasis should be made at the time to concentrate security efforts prone to the prevention of them. Since the information represents a very important role within the institutions because it is the most fundamental part and day to day is exposed to undergo modifications and in many cases to be hacked in its entirety and it is therefore important to ensure the integrity of the information . Therefore, it is necessary to determine which tools to use, and the fundamental techniques to test the vulnerability of the information systems and the installed networks. KEY WORDS: techniques; tools; vulnerabilities; information; security


2020 ◽  
Vol 40 (5-6) ◽  
pp. 576-580 ◽  
Author(s):  
Sara Finley

In this commentary, I discuss why, despite the existence of gradience in phonetics and phonology, there is still a need for abstract representations. Most proponents of exemplar models assume multiple levels of abstraction, allowing for an integration of the gradient and the categorical. Ben Ambridge’s dismissal of generative models such as Optimality Theory (OT) is problematic because OT not only allows for the abstract, but can also handle a variety of phenomena, including gradient representations, and similarity among output forms.


2020 ◽  
Vol 43 ◽  
Author(s):  
Valerie F. Reyna ◽  
David A. Broniatowski

Abstract Gilead et al. offer a thoughtful and much-needed treatment of abstraction. However, it fails to build on an extensive literature on abstraction, representational diversity, neurocognition, and psychopathology that provides important constraints and alternative evidence-based conceptions. We draw on conceptions in software engineering, socio-technical systems engineering, and a neurocognitive theory with abstract representations of gist at its core, fuzzy-trace theory.


2020 ◽  
Vol 43 ◽  
Author(s):  
Chris Fields ◽  
James F. Glazebrook

Abstract Gilead et al. propose an ontology of abstract representations based on folk-psychological conceptions of cognitive architecture. There is, however, no evidence that the experience of cognition reveals the architecture of cognition. Scale-free architectural models propose that cognition has the same computational architecture from sub-cellular to whole-organism scales. This scale-free architecture supports representations with diverse functions and levels of abstraction.


1997 ◽  
Vol 161 ◽  
pp. 711-717 ◽  
Author(s):  
John W. Dreher ◽  
D. Kent Cullers

AbstractWe develop a figure of merit for SETI observations which is anexplicitfunction of the EIRP of the transmitters, which allows us to treat sky surveys and targeted searches on the same footing. For each EIRP, we calculate the product of terms measuring the number of stars within detection range, the range of frequencies searched, and the number of independent observations for each star. For a given set of SETI observations, the result is a graph of merit versus transmitter EIRP. We apply this technique to several completed and ongoing SETI programs. The results provide a quantitative confirmation of the expected qualitative difference between sky surveys and targeted searches: the Project Phoenix targeted search is good for finding transmitters in the 109to 1014W range, while the sky surveys do their best at higher powers. Current generation optical SETI is not yet competitive with microwave SETI.


2006 ◽  
Vol 40 (12) ◽  
pp. 53
Author(s):  
SHARON WORCESTER
Keyword(s):  

2005 ◽  
Vol 36 (5) ◽  
pp. 26
Author(s):  
Michele G. Sullivan
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document