Issue 2017-1 August 2017
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
APA Newsletter on Philosophy and Computers, Vol. 18, No. 2 (Spring
NEWSLETTER | The American Philosophical Association Philosophy and Computers SPRING 2019 VOLUME 18 | NUMBER 2 FEATURED ARTICLE Jack Copeland and Diane Proudfoot Turing’s Mystery Machine ARTICLES Igor Aleksander Systems with “Subjective Feelings”: The Logic of Conscious Machines Magnus Johnsson Conscious Machine Perception Stefan Lorenz Sorgner Transhumanism: The Best Minds of Our Generation Are Needed for Shaping Our Future PHILOSOPHICAL CARTOON Riccardo Manzotti What and Where Are Colors? COMMITTEE NOTES Marcello Guarini Note from the Chair Peter Boltuc Note from the Editor Adam Briggle, Sky Croeser, Shannon Vallor, D. E. Wittkower A New Direction in Supporting Scholarship on Philosophy and Computers: The Journal of Sociotechnical Critique CALL FOR PAPERS VOLUME 18 | NUMBER 2 SPRING 2019 © 2019 BY THE AMERICAN PHILOSOPHICAL ASSOCIATION ISSN 2155-9708 APA NEWSLETTER ON Philosophy and Computers PETER BOLTUC, EDITOR VOLUME 18 | NUMBER 2 | SPRING 2019 Polanyi’s? A machine that—although “quite a simple” one— FEATURED ARTICLE thwarted attempts to analyze it? Turing’s Mystery Machine A “SIMPLE MACHINE” Turing again mentioned a simple machine with an Jack Copeland and Diane Proudfoot undiscoverable program in his 1950 article “Computing UNIVERSITY OF CANTERBURY, CHRISTCHURCH, NZ Machinery and Intelligence” (published in Mind). He was arguing against the proposition that “given a discrete- state machine it should certainly be possible to discover ABSTRACT by observation sufficient about it to predict its future This is a detective story. The starting-point is a philosophical behaviour, and this within a reasonable time, say a thousand discussion in 1949, where Alan Turing mentioned a machine years.”3 This “does not seem to be the case,” he said, and whose program, he said, would in practice be “impossible he went on to describe a counterexample: to find.” Turing used his unbreakable machine example to defeat an argument against the possibility of artificial I have set up on the Manchester computer a small intelligence. -
The Turing Guide
The Turing Guide Edited by Jack Copeland, Jonathan Bowen, Mark Sprevak, and Robin Wilson • A complete guide to one of the greatest scientists of the 20th century • Covers aspects of Turing’s life and the wide range of his intellectual activities • Aimed at a wide readership • This carefully edited resource written by a star-studded list of contributors • Around 100 illustrations This carefully edited resource brings together contributions from some of the world’s leading experts on Alan Turing to create a comprehensive guide that will serve as a useful resource for researchers in the area as well as the increasingly interested general reader. “The Turing Guide is just as its title suggests, a remarkably broad-ranging compendium of Alan Turing’s lifetime contributions. Credible and comprehensive, it is a rewarding exploration of a man, who in his life was appropriately revered and unfairly reviled.” - Vint Cerf, American Internet pioneer JANUARY 2017 | 544 PAGES PAPERBACK | 978-0-19-874783-3 “The Turing Guide provides a superb collection of articles £19.99 | $29.95 written from numerous different perspectives, of the life, HARDBACK | 978-0-19-874782-6 times, profound ideas, and enormous heritage of Alan £75.00 | $115.00 Turing and those around him. We find, here, numerous accounts, both personal and historical, of this great and eccentric man, whose life was both tragic and triumphantly influential.” - Sir Roger Penrose, University of Oxford Ordering Details ONLINE www.oup.com/academic/mathematics BY TELEPHONE +44 (0) 1536 452640 POSTAGE & DELIVERY For more information about postage charges and delivery times visit www.oup.com/academic/help/shipping/. -
Codebreaker in the Far East 1
CODEBREAKER o IN THE FAR EAST ALANSTRIPP With an Introduction by CHRISTOPHER ANDREW FRANK CASS First published in Greal Britain by FRANK CASS & CO. LTD. , Gainsborough House, Gainsborough Road, LoJldon Ell 1RS, England ~/() and in the United States ofAmerica by D FRANK CASS & CO. LTD. clo Biblio Distribution Center Contents C~% 81 Adams Drive, P.O. Box 327, Totowa, NJ 07511 6 Copyright tt> 1989 Alan Stripp List of illustrations vii S-t- Author's Note ix British Library Cataloguing in Publication Data I qq~9 Acknowledgments xi Stripp, Alan, 1924- Introduction by Christopher Andrew xiii Codebreaker in the Far East 1. World War 2. Military Cryptology I. Title 940.54'85 PART ONE: TOURS OF DUTY ISBN 0-7146-3363-1 A11408 737468 1. Cambridge, Bedford and Yorkshire 3 2. Bletchley Park 13 . --Library of Congress Cataloging-in-Publicatioll Data 3. Marc,ping Orders 29 Stripp, Alan, 1924- 4. Delhi 39 Codebreaker in the Far East p. cm. 5. Naini Tal, Agra and Abbottabad 48 Bibliography: p 58 Includes index. 6. Bangalore, Singapore and Cambridge ISBN 0-7146-3363-1 1. Stripp, AIan, 1924- .2. World War, 1939-1945-Cryptography. 3. World War, 1939-1945-Personal narratives, English. 4: World PART TWO: JAPANESE PUZZLES War, 1939-1945-Campaigns-Bunna. I. Title D81O.C88S76 1989 7. Japanese Codes and Ciphers: what were they like? 65 940.54'86'41-dcl9 89-741 80 CIP 8. What did they tell us? 9. How were they sent? 89 All rights reserved. No part of this publication may be repro 10. How were they intercepted? 93 duced in any form or by any means, electronic, mechanical photocopying, recording or otherwise, witho;lt the prio; 11. -
War Machines: Women's Computing Work and the Underpinnings of the Data-Driven State, 1930-1946
Programmed Inequality How Britain Discarded Women Technologists and Lost Its Edge in Computing Marie Hicks HD 6135 H53 2017 The Library Mt. St. Vincent Univ. Halifax, N.S. B3M 2J6 The MIT Press Cambridge, Massachusetts London, England 1 War Machines: Women's Computing Work and the Underpinnings of the Data-Driven State, 1930-1946 In recent years, the restoration of Bletchley Park has attracted worldwide attention. The country estate in Milton Keynes, United Kingdom, was the site of the most important codebreaking operations of World War II and home to the first digital, electronic, programmable computer: the Colossus. The British-designed and manufactured Colossus computers, of which there were ten in all by war's end, were critical to the conduct of Allied wartime operations. Unlike their better-known U.S. counter part, the ENIAC, the Colossus computers were actually deployed during the war, actively changing its outcome. Kept secret for decades, the full import of the developments at Bletchley has only recently become widely known.1 Yet while popular culture has begun to recognize the importance of Bletchley's wartime operations, misunderstandings persist about the nature of the information work performed there. The 2014 blockbuster The Imitation Game, for instance, cleaves the Colossus computers from the narrative entirely in favor of building a "great man" narrative for a single codebreaker.2 Hidden within the story of Bletchley is a less popular narrative that cannot leverage the appeal of a lone genius and his accomplishments. Thousands of women worked at Bletchley during the war-most in tech nical roles.3 Although it is generally accepted that the striking and wide ranging roles of the mostly women workers within Bletchley Park give lie to stereotypes about computing as a traditionally masculine field, the contributions of these women have not been analyzed as constitutive of larger trends in the history of computing. -
Formal Methods Specification and Verification Guidebook for Software and Computer Systems
OFFICE OF SAFETY AND MISSION ASSURANCE NASA-GB-002-95 RELEASE 1.0 FORMAL METHODS SPECIFICATION AND VERIFICATION GUIDEBOOK FOR SOFTWARE AND COMPUTER SYSTEMS VOLUME I: PLANNING AND TECHNOLOGY INSERTION JULY 1995 NATIONAL AERONAUTICS AND SPACE ADMINISTRATION WASHINGTON, DC 20546 NASA-GB-002-95 Release 1.0 FORMAL METHODS SPECIFICATION AND VERIFICATION GUIDEBOOK FOR SOFTWARE AND COMPUTER SYSTEMS VOLUME I" PLANNING AND TECHNOLOGY INSERTION FOREWORD The Formal Methods Specification and Verification Guidebook for Software and Computer Systems describes a set of techniques called Formal Methods (FM), and outlines their use in the specification and verification of computer systems and software. Development of increasingly complex systems has created a need for improved specification and verification techniques. NASA's Safety and Mission Quality Office has supported the investigation of techniques such as FM, which are now an accepted method for enhancing the quality of aerospace applications. The guidebook provides information for managers and practitioners who are interested in integrating FM into an existing systems development process. Information includes technical and administrative considerations that must be addressed when establishing the use of FM on a specific project. The guidebook is intended to aid decision makers in the successful application of FM to the development of high- quality systems at reasonable cost. This is the first volume of a planned two- volume set. The current volume focuses on administrative and planning considerations for the successful application of FM. Volume II will contain more technical information for the FM practitioner, and will be released at a later date. Major contributors to the guidebook include, from the Jet Propulsion Laboratory: Rick Covington (editor), John Kelly (task lead), and Robyn Lutz; from Johnson Space Center: David Hamilton (Loral) and Dan Bowman (Loral); from Langley Research Center: Ben DiVito (VIGYAN) and Judith Crow (SRI International); and from NASA HQ Code Q: Alice Robinson. -
The Engineering Council 2002 to 2010
The Engineering Council 2002 to 2010 A Review by Andrew Ramsay MA CEng FCIS Contents Foreword 3 Prologue 5 The Early Days of ECUK 7 Year by Year 15 International Recognition 30 Annex A: Timeline 41 Annex B: SARTOR 3 42 Annex C: Incorporated Engineer Title – a Summary 44 Engineering Council Board 2002 to 2010 46 PEIs 2002 and 2010 48 List of Acronyms 49 Index 51 Acknowledgements 55 Page | 2 Foreword This review of the progress of the Engineering Council offers an inevitably personal view of issues, events and people who contributed to what must be judged as a successful period. However, while the Engineering Council is never itself going to be the UK engineering profession, it certainly moved towards a more central and less controversial position in its work and profile during this time. I am indebted to the detailed and lucid account of the earlier years of the Engineering Council written by Colin Chapman and Professor Jack Levy. Entitled Chronicle: An Engine for Change, this was published by the Engineering Council in 2004 and at the time of writing is still available on their website (shortcut link http://bit.ly/IY4ZLf ). However, for the shorter timeframe of this review I have adopted a less episodic structure than that of the Chronicle. It seemed to me that the extraordinary events that led up to creation of a “new regulatory body” in 2002, and in the 21 months that followed, deserved particular examination. Similarly, the way in which the Council was able to influence important developments in international recognition of UK-registered engineers can only really be understood in a continuous narrative – hence a separate section for this. -
Computer Conservation Society
Issue Number 52 Autumn 2010 Computer Conservation Society Aims and objectives The Computer Conservation Society (CCS) is a co-operative venture between the British Computer Society (BCS), the Science Museum of London and the Museum of Science and Industry (MOSI) in Manchester. The CCS was constituted in September 1989 as a Specialist Group of the British Computer Society. It is thus covered by the Royal Charter and charitable status of the BCS. The aims of the CCS are: To promote the conservation of historic computers and to identify existing computers which may need to be archived in the future, To develop awareness of the importance of historic computers, To develop expertise in the conservation and restoration of historic computers, To represent the interests of Computer Conservation Society members with other bodies, To promote the study of historic computers, their use and the history of the computer industry, To publish information of relevance to these objectives for the information of Computer Conservation Society members and the wider public. Membership is open to anyone interested in computer conservation and the history of computing. The CCS is funded and supported by voluntary subscriptions from members, a grant from the BCS, fees from corporate membership, donations, and by the free use of the facilities of both museums. Some charges may be made for publications and attendance at seminars and conferences. There are a number of active Projects on specific computer restorations and early computer technologies and software. -
Colossus: the Missing Manual
Colossus: The Missing Manual Mark Priestley Research Fellow, The National Museum of Computing — Bletchley Park, UK Thomas Haigh University of Wisconsin—Milwaukee & Siegen University 1 serialized ciper text English Cipher text of one message plain text 1 0 0 1 1 (5 channel tape) 0 1 0 1 0 0 1 0 0 0 They were already 1 0 1 1 0 1 0 0 1 0 looking at him as approached in the distance, because he just stood out. He had quite an old face, 01101 11101 01011 0010 Knockolt Newmanry Newmanry Testery Testery Hut 3 Outstation Set Chi Wheels Generate Set Psi & Decrypt Translate Intercept, & Verify Counts “dechi” Motor Wheels Message Message Record & Verify Message (Colossus) (Tunny analog (Hand methods) (Tunny analog (Bilingual machine) machine) humans) dechi 1 0 0 1 1 0 27, 12, 30, 43, 8 Chi wheel 0 1 0 1 0 1 Psi & 55, 22 Sie sahen ihn schon 0 1 0 0 0 von weitem auf sich start posns. 1 0 1 1 0 1 0 0 1 0 motor start posns. zukommen, denn er for msg el auf. Er hatte ein 31, 3, 25, 18, 5 ganz altes Gesicht, aber wie er ging, German 1 0 0 1 1 0 0 1 0 1 0 1 0110001010... plain text 0 1 0 0 0 Newmanry 1 0 1 1 0 0011010100... 1 0 0 1 0 10011001001... 01100010110... 1 0 0 1 1 0 Break Chi 01011001101... 0 1 0 1 0 1 0110001010... 0 1 0 0 0 Wheels 1 0 1 1 0 Chi wheel 0011010100.. -
Fiendish Designs
Fiendish Designs A Software Engineering Odyssey © Tim Denvir 2011 1 Preface These are notes, incomplete but extensive, for a book which I hope will give a personal view of the first forty years or so of Software Engineering. Whether the book will ever see the light of day, I am not sure. These notes have come, I realise, to be a memoir of my working life in SE. I want to capture not only the evolution of the technical discipline which is software engineering, but also the climate of social practice in the industry, which has changed hugely over time. To what extent, if at all, others will find this interesting, I have very little idea. I mention other, real people by name here and there. If anyone prefers me not to refer to them, or wishes to offer corrections on any item, they can email me (see Contact on Home Page). Introduction Everybody today encounters computers. There are computers inside petrol pumps, in cash tills, behind the dashboard instruments in modern cars, and in libraries, doctors’ surgeries and beside the dentist’s chair. A large proportion of people have personal computers in their homes and may use them at work, without having to be specialists in computing. Most people have at least some idea that computers contain software, lists of instructions which drive the computer and enable it to perform different tasks. The term “software engineering” wasn’t coined until 1968, at a NATO-funded conference, but the activity that it stands for had been carried out for at least ten years before that. -
Developing Verified Sequential Programs with Event-B
UNIVERSITY OF SOUTHAMPTON Developing Verified Sequential Programs with Event-B by Mohammadsadegh Dalvandi A thesis submitted in partial fulfillment for the degree of Doctor of Philosophy in the Faculty of Physical Sciences and Engineering Electronics and Computer Science April 2018 UNIVERSITY OF SOUTHAMPTON ABSTRACT FACULTY OF PHYSICAL SCIENCES AND ENGINEERING ELECTRONICS AND COMPUTER SCIENCE Doctor of Philosophy by Mohammadsadegh Dalvandi The constructive approach to software correctness aims at formal modelling of the in- tended behaviour and structure of a system in different levels of abstraction and verifying properties of models. The target of analytical approach is to verify properties of the final program code. A high level look at these two approaches suggests that the con- structive and analytical approaches should complement each other well. The aim of this thesis is to build a link between Event-B (constructive approach) and Dafny (analytical approach) for developing sequential verified programs. The first contribution of this the- sis is a tool supported method for transforming Event-B models to simple Dafny code contracts (in the form of method pre- and post-conditions). Transformation of Event-B formal models to Dafny method declarations and code contracts is enabled by a set of transformation rules. Using this set of transformation rules, one can generate code contracts from Event-B models but not implementations. The generated code contracts must be seen as an interface that can be implemented. If there is an implementation that satisfies the generated contracts then it is considered to be a correct implementation of the abstract Event-B model. A tool for automatic transformation of Event-B models to simple Dafny code contracts is presented. -
The Enigma Behind the Good–Turing Formula
Snapshots of modern mathematics № 8/2021 from Oberwolfach The Enigma behind the Good–Turing formula Fadoua Balabdaoui • Yulia Kulagina Finding the total number of species in a population based on a finite sample is a difficult but practically important problem. In this snapshot, we will at- tempt to shed light on how during World War II, two cryptanalysts, Irving J. Good and Alan M. Turing, discovered one of the most widely applied formulas in statistics. The formula estimates the probability of missing some of the species in a sample drawn from a heterogeneous population. We will provide some intuition behind the formula, show its wide range of applications, and give a few technical details. 1 The species richness problem 1.1 Motivation and example Say we have a population comprising individuals drawn from K (possibly infinite) distinct species, among which a lot of species may be rare, andafew are very common. Our goal is to either estimate the frequencies of the species in the population based on the number of their occurrences in a finite sample, or simply to estimate the number of classes K in the population from the sample. 1 1 The term “population frequency” commonly refers to the true (unknown) proportion. It is usually contrasted with the word “empirical” that the reader will encounter later. 1 We use the word “species” in a broad sense. It may refer to flora and fauna, to types of errors in a software system, to celestial bodies in the universe, to word-types in a language, to connected components in a graph, and so on. -
Can Machines Think? the Controversy That Led to the Turing Test, 1946-1950
Can machines think? The controversy that led to the Turing test, 1946-1950 Bernardo Gonçalves1 Abstract Turing’s much debated test has turned 70 and is still fairly controversial. His 1950 paper is seen as a complex and multi-layered text and key questions remain largely unanswered. Why did Turing choose learning from experience as best approach to achieve machine intelligence? Why did he spend several years working with chess-playing as a task to illustrate and test for machine intelligence only to trade it off for conversational question-answering later in 1950? Why did Turing refer to gender imitation in a test for machine intelligence? In this article I shall address these questions directly by unveiling social, historical and epistemological roots of the so-called Turing test. I will draw attention to a historical fact that has been scarcely observed in the secondary literature so far, namely, that Turing's 1950 test came out of a controversy over the cognitive capabilities of digital computers, most notably with physicist and computer pioneer Douglas Hartree, chemist and philosopher Michael Polanyi, and neurosurgeon Geoffrey Jefferson. Seen from its historical context, Turing’s 1950 paper can be understood as essentially a reply to a series of challenges posed to him by these thinkers against his view that machines can think. Keywords: Alan Turing, Can machines think?, The imitation game, The Turing test, Mind-machine controversy, History of artificial intelligence. Robin Gandy (1919-1995) was one of Turing’s best friends and his only doctorate student. He received Turing’s mathematical books and papers when Turing died in 1954, and took over from Max Newman in 1963 the task of editing the papers for publication.1 Regarding Turing’s purpose in writing his 1950 paper and sending it for publication, Gandy offered a testimony previously brought forth by Jack Copeland which has not yet been commented about:2 It was intended not so much as a penetrating contribution to philosophy but as propaganda.