首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   46篇
  免费   11篇
  国内免费   1篇
  2022年   2篇
  2021年   2篇
  2020年   2篇
  2019年   1篇
  2018年   5篇
  2017年   8篇
  2016年   1篇
  2014年   4篇
  2013年   5篇
  2011年   2篇
  2010年   2篇
  2009年   2篇
  2008年   4篇
  2005年   4篇
  2004年   4篇
  2002年   2篇
  2001年   1篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
  1996年   1篇
  1995年   1篇
  1987年   1篇
排序方式: 共有58条查询结果,搜索用时 15 毫秒
21.
A blockchain can be considered a technological phenomenon that is made up of different interconnected and autonomous systems. Such systems are referred to here as cyber‐physical systems: complex interconnections of cyber and physical components. When cyber‐physical systems are interconnected, a new whole consisting of a system of systems is created by the autonomous systems and their intercommunication and interaction. In a blockchain, individual systems can independently make decisions on joint information transactions. The decision‐making procedures needed for this are executed based on fault‐tolerant communication and voting and consensus procedures, while the results of these decision‐making procedures are stored in distributed ledgers. Due to the intercommunication, interaction, and independent decision making by autonomous systems, the new whole of a blockchain is a complex entity. Complexity science rather than the usual reductionist scientific approach can help us better understand the behaviour of the new and continuously developing whole of a blockchain as a technological phenomenon.  相似文献   
22.
This study investigated the relationship between cognitive mechanisms, applied by people to rationalize and justify harmful acts, and engagement in traditional peer and cyber aggression among school children. We examined the contribution of moral disengagement (MD), hostile attribution bias, and outcome expectancies, and we further explored the individual contribution of each MD mechanism. Our aim was to identify shared and unique cognitive factors of the two forms of aggression. Three hundred and thirty‐nine secondary school children completed self‐report measures that assessed MD, hostile attribution bias, outcome expectancies, and their roles and involvement in traditional and cyber aggression. We found that the MD total score positively related to both forms of peer‐directed aggression. Furthermore, traditional peer aggression positively related to children's moral justification, euphemistic language, displacement of responsibility and outcome expectancies, and negatively associated with hostile attribution bias. Moral justification also related positively to cyber aggression. Cyber aggression and cyber victimization were associated with high levels of traditional peer aggression and victimization, respectively. The results suggest that MD is a common feature of both traditional and cyber peer aggression, but it seems that traditional forms of aggression demand a higher level of rationalization or justification. Moreover, the data suggest that the expectation of positive outcomes from harmful behavior facilitates engagement in traditional peer aggression. The differential contribution of specific cognitive mechanisms indicates the need for future research to elaborate on the current findings, in order to advance theory and inform existing and future school interventions tackling aggression and bullying. Aggr. Behav. 36:81–94, 2010. © 2009 Wiley‐Liss, Inc.  相似文献   
23.
The topic of this paper is the question whether there is a logic which could be justly called the logic of inference. It may seem that at least since Prawitz, Dummett and others demonstrated the proof-theoretical prominency of intuitionistic logic, the forthcoming answer is that it is this logic that is the obvious choice for the accolade. Though there is little doubt that this choice is correct (provided that inference is construed as inherently single-conclusion and complying with the Gentzenian structural rules), I do not think that the usual justification of it is satisfactory. Therefore, I will first try to clarify what exactly is meant by the question, and then sketch a conceptual framework in which it can be reasonably handled. I will introduce the concept of ‘inferentially native’ logical operators (those which explicate inferential properties) and I will show that the axiomatization of these operators leads to the axiomatic system of intuitionistic logic. Finally, I will discuss what modifications of this answer enter the picture when more general notions of inference are considered. Presented by Hannes Leitgeb  相似文献   
24.
Ingvar Johansson 《Synthese》2008,163(2):217-225
The paper argues, that a direct formalization of the way common sense thinks about the numerical identity of enduring entities, requires that traditional predicate logic is developed. If everyday language mirrors the world, then persons, organisms, organs, cells, and ordinary material things can lose some parts but nonetheless remain numerically exactly the same entity. In order to formalize this view, two new logical operators are introduced; and they bring with them some non-standard syntax. One of the operators is called ‘the instantiation operator’; it is needed because the existential quantifier and its traditional relatives cannot do the job required. The other operator is called ‘the form-on-matter operator’, and it allows an individual (an instance of a form) to stay the same even though some of its parts (its constituting matter) is taken away from it. Also, a certain kind of predicates, called ‘nature terms’, is needed in order to represent what gives a particular its kind of identity. Both the operators and the nature terms introduced can be used in constructions of formal languages and formal systems, but no such constructions are made in the paper. The paper is structured as a comment on the philosophical problem called ‘the problem of the cats Tibbles and Tib’.  相似文献   
25.
We employ the Zermelo–Fränkel Axioms that characterize sets as mathematical primitives. The Anti-foundation Axiom plays a significant role in our development, since among other of its features, its replacement for the Axiom of Foundation in the Zermelo–Fränkel Axioms motivates Platonic interpretations. These interpretations also depend on such allied notions for sets as pictures, graphs, decorations, labelings and various mappings that we use. A syntax and semantics of operators acting on sets is developed. Such features enable construction of a theory of non-well-founded sets that we use to frame mathematical foundations of consciousness. To do this we introduce a supplementary axiomatic system that characterizes experience and consciousness as primitives. The new axioms proceed through characterization of so-called consciousness operators. The Russell operator plays a central role and is shown to be one example of a consciousness operator. Neural networks supply striking examples of non-well-founded graphs the decorations of which generate associated sets, each with a Platonic aspect. Employing our foundations, we show how the supervening of consciousness on its neural correlates in the brain enables the framing of a theory of consciousness by applying appropriate consciousness operators to the generated sets in question.  相似文献   
26.
27.
28.
Military operators in various environments such as cyber, remotely piloted aircraft, and image analysis are required to use sustained attention or vigilance for long periods. During this time they encounter lapses in attention attributable to the monotonous nature of their tasks. Mistakes during these tasks can have serious consequences. The purpose of this study was to investigate the use of an eye-tracker to detect changes in vigilance performance during a simulated cyber operator task. Twenty participants performed 4 sessions of a 40-min vigilance task while wearing an eye-tracker. Blink frequency, blink duration, PERCLOS (percentage of eye closure), pupil diameter, pupil eccentricity, pupil velocity, and signal detection all had a significant change over time (p < .05) during the task. The significant change of oculometric measurements indicates oculometrics could be used to detect changes in vigilance for military operators. Future research is needed to assess real-time effects of these oculometrics on performance, especially in a real-world setting.  相似文献   
29.
30.
This study explores high school students' beliefs and behaviors associated with cyberbullying. Specifically, it examines this new phenomenon from the following four perspectives: (a) What happens after students are cyberbullied? (b) What do students do when witnessing cyberbullying? (c) Why do victims not report the incidents? and (d) What are students' opinions about cyberbullying? Data were collected from 269 Grade 7 through 12 students in 5 Canadian schools. Several themes have emerged from the analysis, which uncovers some important patterns. One finding is that over 40% would do nothing if they were cyberbullied, and only about 1 in 10 would inform adults. Students feel reluctant to report cyberbullying incidents to adults in schools for various reasons, which are discussed in depth.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号