![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Minds and Machines, Volume 29
Volume 29, Number 1, March 2019
- Mariarosaria Taddeo:
The Civic Role of Online Service Providers. 1-7 - Michael Resch, Andreas Kaminski:
The Epistemic Importance of Technology in Computer Simulation and Machine Learning. 9-17 - Johannes Lenhard
, Uwe Küster:
Reproducibility and the Concept of Numerical Solution. 19-36 - John Symons
, Ramón Alvarado:
Epistemic Entitlements and the Practice of Computer Simulation. 37-60 - Tudor B. Ionescu:
Simulation, Epistemic Opacity, and 'Envirotechnical Ignorance' in Nuclear Crisis. 61-86 - Michael T. Stuart
, Nancy J. Nersessian:
Peeking Inside the Black Box: A New Kind of Scientific Visualization. 87-107 - Edoardo Datteri
, Viola Schiaffonati
:
Robotic Simulations, Simulations of Robots. 109-125 - Giuseppe Primiero
:
A Minimalist Epistemology for Agent-Based Simulations in the Artificial Sciences. 127-148 - Julie Jebeile
, Vincent Ardourel
:
Verification and Validation of Simulations Against Holism. 149-168 - Vitaly Pronskikh
:
Computer Modeling and Simulation: Increasing Reliability by Disentangling Verification and Validation. 169-186
Volume 29, Number 2, June 2019
- Mariarosaria Taddeo:
Three Ethical Challenges of Applications of Artificial Intelligence in Cybersecurity. 187-191 - Neal G. Anderson
:
Information Processing Artifacts. 193-225 - William J. Rapaport:
Computers Are Syntax All the Way Down: Reply to Bozşahin. 227-237 - Russ Abbott
:
The Bit (and Three Other Abstractions) Define the Borderline Between Hardware and Software. 239-285 - Paul Schweizer
:
Triviality Arguments Reconsidered. 287-308 - Alex Morgan
:
Pictures, Plants, and Propositions. 309-329 - Carl Öhman
, Robert Gorwa
, Luciano Floridi
:
Prayer-Bots and Religious Worship on Twitter: A Call for a Wider Research Agenda. 331-338 - Yasser Qureshy:
Reply to "Prayer-Bots and Religious Worship on Twitter: A Call for a Wider Research Agenda Islamic". 339-340 - Yaqub Chaudhary:
Delegating Religious Practices to Autonomous Machines, A Reply to "Prayer-Bots and Religious Worship on Twitter: A Call for a Wider Research Agenda". 341-347
Volume 29, Number 3, September 2019
- Mariarosaria Taddeo:
Is Cybersecurity a Public Good? 349-354 - Luciano Floridi
, Christoph Luetge
, Ugo Pagallo
, Burkhard Schafer, Peggy Valcke
, Effy Vayena, Janet Addison, Nigel Hughes, Nathan Lea, Caroline Sage, Bart Vannieuwenhuyse, Dipak Kalra:
Key Ethical Challenges in the European Medical Information Framework. 355-371 - Timothy J. Fuller
:
Cognitive Architecture, Holistic Inference and Bayesian Networks. 373-395 - Nicola Angius
:
Qualitative Models in Computational Simulative Sciences: Representation, Confirmation, Experimentation. 397-416 - David S. Watson
:
The Rhetoric and Reality of Anthropomorphism in Artificial Intelligence. 417-440 - Andrés Páez
:
The Pragmatic Turn in Explainable Artificial Intelligence (XAI). 441-459 - Christopher Burr
, Nello Cristianini:
Can Machines Read our Minds? 461-494
Volume 29, Number 4, December 2019
- Scott Robbins
:
A Misdirected Principle with a Catch: Explicability for AI. 495-514 - Alessio Plebe
, Giorgio M. Grasso
:
The Unbearable Shallow Understanding of Deep Learning. 515-553 - John Zerilli
, Alistair Knott
, James MacLaurin, Colin Gavaghan:
Algorithmic Decision-Making and the Control Problem. 555-578 - Eleonora Bassi, Nicoletta Bloise, Jacopo Dirutigliano
, Gian Piero Fici, Ugo Pagallo
, Stefano Primatesta
, Fulvia Quagliotti:
The Design of GDPR-Abiding Drones Through Flight Operation Maps: A Win-Win Approach to Data Protection, Aerospace Engineering, and Risk Management. 579-601 - Joan Casas-Roma
, M. Elena Rodríguez
, Antonia Huertas
:
A Common Frame for Formal Imagination. 603-634 - Paul Timmers
:
Ethics of AI and Cybersecurity When Sovereignty is at Stake. 635-645
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.