Non-identity, Sufficiency and Exploitation

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Events are Not Simple: Identity, Non-Identity, and Quasi-Identity

Despite considerable theoretical and computational work on coreference, deciding when two entities or events are identical is very difficult. In a project to build corpora containing coreference links between events, we have identified three levels of event identity (full, partial, and none). Event coreference annotation on two corpora was performed to validate the findings. 1 The Problem of Id...

متن کامل

Φ - Divergences , Sufficiency , Bayes Sufficiency , and Deficiency

The paper studies the relations between φ-divergences and fundamental concepts of decision theory such as sufficiency, Bayes sufficiency, and LeCam’s deficiency. A new and considerably simplified approach is given to the spectral representation of φ-divergences already established in Österreicher and Feldman [28] under restrictive conditions and in Liese and Vajda [22], [23] in the general form...

متن کامل

Computing Efficiency, Sufficiency, and Self-sufficiency: A Model for Sustainability?

Computing is an activity that is based on natural resources like any other human activity. Technological progress has made it possible to perform more and more computations with less material and energy input. This paper looks at this development through the lens of the three concepts of efficiency, sufficiency, and self-sufficiency, asking the question of whether it could lead to a state of se...

متن کامل

The Douglas-Peucker Algorithm: Sufficiency Conditions for Non-Self-Intersections

The classic Douglas-Peucker line-simplification algorithm is recognized as the one that delivers the best perceptual representations of the original lines. It may, however, produce simplified polyline that is not topologically equivalent to the original one consisting of all vertex samples. On the basis of properties of the polyline hulls, Saalfeld devised a simple rule for detecting topologica...

متن کامل

Non-Intrusive Identity Management

This paper presents a novel architecture for digital identity management. The proposed architecture is highly secure and scales seamlessly across organizational boundaries, while at the same time protecting the privacy interests of individuals and organizations. To achieve these properties, the architecture heavily relies on Digital Credentials, a cryptographic authentication technology specifi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Political Philosophy

سال: 2010

ISSN: 0963-8016

DOI: 10.1111/j.1467-9760.2010.00378.x