Measuring Interdisciplinary Research Categories and Knowledge Transfer: A Case Study of Connections between Cognitive Science and Education.Alan L. Porter,Stephen F.Carley,Caitlin Cassidy,Jan Youtie,David J. Schoeneck,Seokbeom Kwon &Gregg E. A. Solomon -2019 -Perspectives on Science 27 (4):582-618.detailsThis is a “bottom-up” paper in the sense that it draws lessons in defining disciplinary categories under study from a series of empirical studies of interdisciplinarity. In particular, we are in the process of studying the interchange of research-based knowledge between Cognitive Science and Educational Research. This has posed a set of design decisions that we believe warrant consideration as others study cross-disciplinary research processes.
Principles of Financial Economics.Stephen F. LeRoy,Jan Werner &Stephen A. Ross -2004 - Cambridge University Press.detailsFinancial economics, and the calculations of time and uncertainty derived from it, are playing an increasingly important role in non-finance areas, such as monetary and environmental economics. In this 2001 book, Professors Le Roy and Werner supply a rigorous yet accessible graduate-level introduction to this subfield of microeconomic theory and general equilibrium theory. Since students often find the link between financial economics and equilibrium theory hard to grasp, they devote less attention to purely financial topics such as calculation of derivatives, (...) while aiming to make the connection explicit and clear in each stage of the exposition. Emphasis is placed on detailed study of two-date models, because almost all of the key ideas in financial economics can be developed in the two-date setting. In addition to rigorous analysis, substantial sections of discussion and examples are included to make the ideas readily understandable. (shrink)
Mobile ATM Buffer Capacity Analysis.Stephen Bush,Evans F.,B. Joseph &Victor Frost -1996 -Acm-Baltzer Mobile Networks and Nomadic Applications 1 (1):67--73.detailsThis paper extends a stochastic theory for buffer fill distribution for multiple “on‘ and “off‘ sources to a mobile environment. Queue fill distribution is described by a set of differential equations assuming sources alternate asynchronously between exponentially distributed periods in “on‘ and “off‘ states. This paper includes the probabilities that mobile sources have links to a given queue. The sources represent mobile user nodes, and the queue represents the capacity of a switch. This paper presents a method of analysis which (...) uses mobile parameters such as speed, call rates per unit area, cell area, and call duration and determines queue fill distribution at the ATM cell level. The analytic results are compared with simulation results. (shrink)
Export citation
Bookmark
Smart Grid: Communication-Enabled Intelligence for the Electric Power Grid.Stephen F. Bush -2014 - Wiley-Ieee Press.detailsThis book bridges the divide between the fields of power systems engineering and computer communication through the new field of power system information theory. Written by an expert with vast experience in the field, this book explores the smart grid from generation to consumption, both as it is planned today and how it will evolve tomorrow. The book focuses upon what differentiates the smart grid from the "traditional" power grid as it has been known for the last century. Furthermore, the (...) author provides the reader with a fundamental understanding of both power systems and communication networking. It shows the complexity and operational requirements of the evolving power grid, the so-called "smart grid," to the communication networking engineer; and similarly, it shows the complexity and operational requirements for communications to the power systems engineer. The book is divided into three parts. Part One discusses the basic operation of the electric power grid, covering fundamental knowledge that is assumed in Parts Two and Three. Part Two introduces communications and networking, which are critical enablers for the smart grid. It also considers how communication and networking will evolve as technology develops. This lays the foundation for Part Three, which utilizes communication within the power grid. Part Three draws heavily upon both the embedded intelligence within the power grid and current research, anticipating how and where computational intelligence will be implemented within the smart grid. Each part is divided into chapters and each chapter has a set of questions useful for exercising the readers' understanding of the material in that chapter. Key Features: Bridges the gap between power systems and communications experts Addresses the smart grid from generation to consumption, both as it is planned today and how it will likely evolve tomorrow Explores the smart grid from the perspective of traditional power systems as well as from communications Discusses power systems, communications, and machine learning that all define the smart grid It introduces the new field of power system information theory. (shrink)
(1 other version)Active Networks and Active Network Management: A Proactive Management Framework.Stephen F. Bush &Amit B. Kulkarni -2001 - Springer.detailsActive networking is an exciting new paradigm in digital networking that has the potential to revolutionize the manner in which communication takes place. It is an emerging technology, one in which new ideas are constantly being formulated and new topics of research are springing up even as this book is being written. This technology is very likely to appeal to a broad spectrum of users from academia and industry. Therefore, this book was written in a way that enables all these (...) groups to understand the impact of active networking in their sphere of interest. Information services managers, network administrators, and e-commerce developers would like to know the potential benefits of the new technology to their businesses, networks, and applications. The book introduces the basic active networking paradigm and its potential impacts on the future of information handling in general and on communications in particular. This is useful for forward-looking businesses that wish to actively participate in the development of active networks and ensure a head start in the integration of the technology in their future products, be they applications or networks. Areas in which active networking is likely to make significant impact are identified, and the reader is pointed to any related ongoing research efforts in the area. The book also provides a deeper insight into the active networking model for students and researchers, who seek challenging topics that define or extend frontiers of the technology. It describes basic components of the model, explains some of the terms used by the active networking community, and provides the reader with taxonomy of the research being conducted at the time this book was written. Current efforts are classified based on typical research areas such as mobility, security, and management. The intent is to introduce the serious reader to the background regarding some of the models adopted by the community, to outline outstanding issues concerning active networking, and to provide a snapshot of the fast-changing landscape in active networking research. Management is a very important issue in active networks because of its open nature. The latter half of the book explains the architectural concepts of a model for managing active networks and the motivation for a reference model that addresses limitations of the current network management framework by leveraging the powerful features of active networking to develop an integrated framework. It also describes a novel application enabled by active network technology called the Active Virtual Network Management Prediction (AVNMP) algorithm. AVNMP is a pro-active management system; in other words, it provides the ability to solve a potential problem before it impacts the system by modeling network devices within the network itself and running that model ahead of real time. (shrink)
No categories
Wireless ad hoc nanoscale networking.Stephen F. Bush -2009 -Ieee Wireless Communications 16 (5):6--7.detailsWireless ad hoc communication on the nanoscale will require thinking outside of the traditional radio spectrum. New applications will utilize new forms of wireless communication channels. For example, nanoscale communication will enable precise mechanisms for directly interacting with cells in vivo. Information may be sent to and from specific cells within the body, allowing detection and healing of diseases on the cellular scale. From a medical standpoint, the use of current wireless techniques to communicate with implants is unacceptable for many (...) reasons, including bulky size, inability to use magnetic resonance imaging after implantation, potential radiation damage, surgical invasiveness, need to recharge/replace power, post-operative pain and long recovery times, and reduced quality of life for the patient. Better, more humane in vivo implant communication is needed. Development of both biological and engineered nanomachines is progressing; such machines will need to communicate [1]. Unfortunately, networking vast collections of nanoscale sensors and robots using current techniques, including wireless techniques, is not possible without communication mechanisms that exceed nanoscale volumes. (shrink)
(1 other version)Historical dictionary of medieval philosophy and theology.Stephen F. Brown -2007 - Lanham, Md.: Scarecrow Press. Edited by Juan Carlos Flores.detailsThe Middle Ages is often viewed as a period of low intellectual achievement. The name itself refers to the time between the high philosophical and literary accomplishments of the Greco-Roman world and the technological advances that were achieved and philosophical and theological alternatives that were formulated in the modern world that followed. However, having produced such great philosophers as Anselm, Peter Abelard, John Duns Scotus, William of Ockham, Peter Lombard, and the towering Thomas Aquinas, it hardly seems fair to label (...) the medieval period as such. Examining the influence of ancient Greek philosophy as well as of the Arabian and Hebrew scholars who transmitted it, the Historical Dictionary of Medieval Philosophy and Theology presents the philosophy of the Christian West from the 9th to the early 17th century. This is accomplished through a chronology, an introduction, appendixes, a bibliography, and hundreds of cross-referenced dictionary entries on the philosophers, concepts, issues, institutions, and events, making this an important reference for the study of the progression of human thought. (shrink)
Medieval Philosophy and Modern Times.Stephen F. Brown -2000 - Springer Verlag.detailsModern developments in philosophy have provided us with tools, logical and methodological, that were not available to Medieval thinkers - a development that has its dangers as well as opportunities. Modern tools allow one to penetrate old texts and analyze old problems in new ways, offering interpretations that the old thinkers could not have known. But unless one remains sensitive to the fact that language has undergone changes, bringing with it a shift in the meaning of terminology, one can easily (...) perpetrate an anachronism. Yet there is a growing need to bring modern tools and to bear on the struggle for greater understanding of the problems studied and the solutions found by the ancient scholars. If we remain sensitive to the dangers, this openness to new methods can be expected to widen our perspectives and deepen our knowledge of old material. The focus in the present volume is on problems in Medieval and contemporary philosophy of religion. (shrink)
Philosophical Debates at Paris in the Early Fourteenth Century.Stephen F. Brown,Thomas Dewender &Theo Kobusch (eds.) -2009 - Brill.detailsFocusing on Meister Eckhart, John Duns Scotus, Hervaeus Natalis, Durandus of St.-PourAain, Walter Burley and Petrus Aureoli, this volume investigates the nature ...
Philosophy and theology in the long middle ages: a tribute toStephen F. Brown.Kent Emery,Russell L. Friedman,Andreas Speer,Maxime Mauriege &Stephen F. Brown (eds.) -2011 - Boston: Brill.detailsThe title of this Festschrift toStephen Brown points to the understanding of medieval philosophy and theology in the longue durée of their traditions and discourses.
What Counts as Buddhist Historiography and Why Does It Matter?Stephen F. Teiser -2024 -Journal of the American Oriental Society 144 (2):427-439.detailsThis review article argues that John Kieschnick’s Buddhist Historiography in China (2022) constitutes a landmark in the field. The book covers a large swath of original sources, analyzes authorial strategies, and assesses the place of writing about the Buddhist past within the Sinocentric tradition of court-focused historiography. I point up the strengths of the book, identify its most significant chapters, and probe its interpretation of Buddhist historiography. I also suggest that, by including a broader range of genres within the ambit (...) of Buddhist historiography, future scholarship might add perspectives that diverge from those of the centralized state and the Saṃgha. (shrink)
What Does Value Matter? The Interest-Relational Theory of the Semantics and Metaphysics of Value.Stephen F. Finlay -2001 - Dissertation, University of Illinois at Urbana-ChampaigndetailsValue and reasons for action are often cited by rationalists and moral realists as providing a desire-independent foundation for normativity. Those maintaining instead that normativity is dependent upon motivation often deny that anything called "value" or "reasons" exists. According to the interest-relational theory, something has value relative to some perspective of desire just in case it satisfies those desires, and a consideration is a reason for some action just in case it indicates that something of value will be accomplished by (...) that action. Value judgements therefore describe real properties of objects and actions, but have no normative significance independent of desires. ;It is argued that only the interest-relational theory accounts for the practical significance of value and reasons. Against the Kantian hypothesis of prescriptive rational norms, I attack the alleged instrumental norm or hypothetical imperative, showing that the normative force for taking the means to our ends is explicable in terms of our desire for the end, and not as a command of reason. This analysis also provides a solution to the puzzle concerning the connection between value judgement and motivation. While it is possible to hold value judgements without motivation, the connection is more than accidental. This is because value judgements are usually but not always made from the perspective of desires that actually motivate the speaker. In the normal case judgement entails motivation. But often we conversationally borrow external perspectives of desire, and subsequent judgements do not entail motivation. ;This analysis drives a critique of a common practice as a misuse of normative language. The "absolutist" attempts to use and, as philosopher, analyze normative language in such a way as to justify the imposition of certain interests over others. But these uses and analyses are incoherent---in denying relativity to particular desires they conflict with the actual meaning of these utterances, which is always indexed to some particular set of desires. (shrink)
Biological models of security for virus propagation in computer networks.Sanjay Goel &Stephen F. S. F. Bush -2004 -Login, December 29 (6):49--56.detailsThis aricle discusses the similarity between the propagation of pathogens (viruses and worms) on computer networks and the proliferation of pathogens in cellular organisms (organisms with genetic material contained within a membrane-encased nucleus). It introduces several biological mechanisms which are used in these organisms to protect against such pathogens and presents security models for networked computers inspired by several biological paradigms, including genomics (RNA interference), proteomics (pathway mapping), and physiology (immune system). In addition, the study of epidemiological models for disease (...) control can inspire methods for controlling the spread of pathogens across multiple nodes of a network. It also presents results based on the authorsâ research in immune system modeling. (shrink)
Person and Polis: Max Scheler's Personalism as Political Theory.Stephen F. Schneck -1987 - SUNY Press.detailsMartin Heidegger cited him as “the most potent philosophical power... in all of contemporary philosophy.” Ortega y Gasset called him “the first man of genius, the Adam of the new Paradise.” Writing at a crucial time in intellectual history, his influence has extended to persons as diverse as Dietrich von Hildebrand, Maurice Merleau-Ponty, Karol Wojtyla, Jurgen Habermas, Ernst Bloch, and members of the generation of thinkers that developed in the German universities during the Weimar years. Despite this far-reaching impact, the (...) social theory and philosophy of Max Scheler have never been examined for the significance of their political thought. This book opens the possibility of deriving a contemporary political theory from Scheler’s philosophy and social theory, based on his understanding of the person, the community, and the significant new directions these elements suggest. Standing at some distance from modern liberalism, conservatism, and Marxism, both in their bourgeois and Enlightenment varieties, Scheler’s personalism has its roots in the rich admixture of life philosophy and phenomenology that gave rise to Martin Heidegger’s early philosophy. It is a philosophical anthropology founded on Scheler’s own realist phenomenology, sociology of knowledge, and non-formal ethics. The book considers Scheler’s many works and includes translations and reviews of unpublished materials. It includes an extensive bibliography of primary and secondary name sources. (shrink)
On Faith and Reason.Stephen F. Brown (ed.) -1999 - Hackett Publishing Company.detailsThe selections included in this anthology, drawn from a variety of Aquinas' works, focus on the roles of reason and faith in philosophy and theology. Expanding on these themes are Aquinas' discussions of the nature and domain of theology; the knowledge of God and of God's attributes attainable through natural reason; the life of God, including God’s will, justice, mercy, and providence; and the principal Christian mysteries treated in theology properly speaking--the Trinity and the Incarnation.
Philosophy and Language.Stephen F. Brown -2010 -Proceedings of the American Catholic Philosophical Association 84:57-64.detailsWilliam of Ockham discussed the fallacy of amphiboly twice in his writings. The first treatment was in his Expositio super libros Elenchorum, where he simply presents Aristotle’s treatment, updates it with some Latin examples, and tells us it is not too important, since we do not often run into cases of ambiguity of thiskind. Later, in his Summa logicae, however, he extends his treatment appreciably. He here includes under ambiguous statements philosophical and theological sentences which are improperly stated. Led by (...) Aristotle, Augustine and Anselm, Ockham finds that in their writings they give us instances of improper statements which need to be restated properly before they can be evaluated as true or false. These leads provide for Ockham a key to unlocking the teaching treasures of the Ancients. (shrink)
The Patristic Background.Stephen F. Brown -2003 - In Jorge J. E. Gracia & Timothy B. Noone,A Companion to Philosophy in the Middle Ages. Malden, MA: Wiley-Blackwell. pp. 23–31.detailsThis chapter contains sections titled: The Catholic Fathers facing grammatical and logical precision The Fathers and the challenges of Aristotelian philosophy Varying interpretations of the same text.
No categories
A Simple Metric for Ad Hoc Network Adaptation.Stephen F. S. F. Bush -2005 -Ieee Journal on Selected Areas in Communications Journal 23 (12):2272--2287.detailsThis paper examines flexibility in ad hoc networks and suggests that, even with cross-layer design as a mechanism to improve adaptation, a fundamental limitation exists in the ability of a single optimization function, defined a priori, to adapt the network to meet all quality-of-service requirements. Thus, code implementing multiple algorithms will have to be positioned within the network. Active networking and programmable networking enable unprecedented autonomy and flexibility for ad hoc communication networks. However, in order to best leverage the results (...) of active and programmable networking, metrics that indicate the nature and location of required flexibility need to be developed. The primary contribution of this paper is to propose a metric that couples network topological rate of change with the ability of a generic service to move itself to an optimal location in concert with the changing network. This metric points to a fundamental tradeoff among adaptation (changing service location), performance (sophistication or estimated minimum code size of the service), and the networkâs ability to tune itself to a changing ad hoc network topology. (shrink)
No categories
Brittle System Analysis.Stephen F. Bush,John Hershey &Kirby Vosburgh -forthcoming -Arxiv Preprint Cs/9904016.detailsThe goal of this paper is to define and analyze systems which exhibit brittle behavior. This behavior is characterized by a sudden and steep decline in performance as the system approaches the limits of tolerance. This can be due to input parameters which exceed a specified input, or environmental conditions which exceed specified operating boundaries. An analogy is made between brittle commmunication systems in particular and materials science.
No categories
Genetically induced communication network fault tolerance.Stephen F. Bush -2003 -Complexity 9 (2):19-33.detailsThis paper presents the architecture and initial feasibility results of a proto-type communication network that utilizes genetic programming to evolve services and protocols as part of network operation. The network evolves responses to environmental conditions in a manner that could not be preprogrammed within legacy network nodes a priori. A priori in this case means before network operation has begun. Genetic material is exchanged, loaded, and run dynamically within an active network. The transfer and execution of code in support of (...) the evolution of network protocols and services would not be possible without the active network environment. Rapid generation of network service code occurs via a genetic programming paradigm. Complexity and Algorithmic Information Theory play a key role in understanding and guiding code evolution within the network. (shrink)
No categories
Reasoning about Information Assurance Policy with Uncertainty using the Semantic Web.Stephen F. Bush -forthcoming -Annual Symposium on Information Assurance:1--7.detailsThis is a brief letter outlining speculative ideas for semantic web reasoning about information assurance. Much work has been done on the development of semantic web applications for reasoning about information assurance. A significant portion of this work is focused upon semantic web ontologies and reasoning about security policies and the underlying implementation of those policies. While numerous semantic web-based security policy ontologies and reasoners exist, both academically and commercially, I will briefly focus on ideas related to solutions to the (...) problem of managing semantic web rules using algorithmic information theory. (shrink)
Export citation
Bookmark