Software piracy and copyright infringement are rapidly growing. Historically, the spread of pirated software required the transfer of a physical copy (i.e. a disk), limiting the rate of illegal software distribution. However, recent increases in network transfer rates and ease of access have eliminated the need for physical media based piracy. To compound the problem, software is being legally distributed in platform independent formats, such as Java bytecode and Microsoft's Intermediate Language (MSIL). These formats closely resemble source code, which can easily be reverse engineered and manipulated. Thus it is much easier for software pirates to bypass license checks. In addition, unscrupulous programmers can steal algorithmic secrets, which decreases their own production time and allows them to gain an edge on the competition.
{"title":"Using software watermarking to discourage piracy","authors":"Ginger Myles","doi":"10.1145/1027321.1027323","DOIUrl":"https://doi.org/10.1145/1027321.1027323","url":null,"abstract":"Software piracy and copyright infringement are rapidly growing. Historically, the spread of pirated software required the transfer of a physical copy (i.e. a disk), limiting the rate of illegal software distribution. However, recent increases in network transfer rates and ease of access have eliminated the need for physical media based piracy. To compound the problem, software is being legally distributed in platform independent formats, such as Java bytecode and Microsoft's Intermediate Language (MSIL). These formats closely resemble source code, which can easily be reverse engineered and manipulated. Thus it is much easier for software pirates to bypass license checks. In addition, unscrupulous programmers can steal algorithmic secrets, which decreases their own production time and allows them to gain an edge on the competition.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115442183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The polymorphy described in the table above sits at the core of this discussion. To show this more clearly, a type of logic will be established, but instead of reasoning, and determining whether something is true or false, it will make moral judgments, telling whether something is good or bad. Some core thoughts of positivistic and teleological ethics will be formalized in this logic to give a computational model of telling right from wrong. A fictional artificial intelligence is discussed, using insights provided by metamathematics, and the bargaining problem, a philosophical question with wide-ranging implications, will be approached with game gheory. But before going into too much detail about how to approach these subjects from a computer scientist's point of view, it might be helpful to briefly review these ethical topics from a classical point of view.
{"title":"Ethical lessons learned from computer science","authors":"Richard Bergmair","doi":"10.1145/1027321.1027327","DOIUrl":"https://doi.org/10.1145/1027321.1027327","url":null,"abstract":"The polymorphy described in the table above sits at the core of this discussion. To show this more clearly, a type of logic will be established, but instead of reasoning, and determining whether something is true or false, it will make moral judgments, telling whether something is good or bad. Some core thoughts of positivistic and teleological ethics will be formalized in this logic to give a computational model of telling right from wrong. A fictional artificial intelligence is discussed, using insights provided by metamathematics, and the bargaining problem, a philosophical question with wide-ranging implications, will be approached with game gheory. But before going into too much detail about how to approach these subjects from a computer scientist's point of view, it might be helpful to briefly review these ethical topics from a classical point of view.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117047023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the recent rise and fall of Napster, the MP3 file format has become a source of ire for numerous corporations nationwide. The MP3 digital audio compression technology enables users to download a complete CD in under an hour via a broadband connection. This nascent technology has built new "doors" that can now be easily opened with a computer and a modem. Users have a great deal of raw computing power available to them, and this power increases year after year. But with this newfound power comes additional responsibilities, as never before have the opportunities for copyright infringement been so rampant.
{"title":"The effects of piracy in a university setting","authors":"J. Nyiri","doi":"10.1145/1027321.1027324","DOIUrl":"https://doi.org/10.1145/1027321.1027324","url":null,"abstract":"With the recent rise and fall of Napster, the MP3 file format has become a source of ire for numerous corporations nationwide. The MP3 digital audio compression technology enables users to download a complete CD in under an hour via a broadband connection. This nascent technology has built new \"doors\" that can now be easily opened with a computer and a modem. Users have a great deal of raw computing power available to them, and this power increases year after year. But with this newfound power comes additional responsibilities, as never before have the opportunities for copyright infringement been so rampant.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128996298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Although data mining and database security are common topics of conversation in the computer and information sciences, they do not often inspire furious articles from New York Times columnists and letters of outrage from readers. Yet, in the fall of 2002, high-profile newspapers began to run stories on the potential threats to privacy and civil liberties posed by Total Information Awareness (TIA). Total Information Awareness was a program created within the Information Awareness Office (IAO) of the United States Defense Advanced Research Projects Agency (DARPA) in February 2002. Total Information Awareness sought to develop and use technologies such as data mining and biometrics in order to monitor private communications and commercial transactions, process large amounts of data from different sources, and to look for patterns of behavior that might reveal terrorist activity [1].
{"title":"Multilevel security: privacy by design","authors":"S. Filimon","doi":"10.1145/1027321.1027325","DOIUrl":"https://doi.org/10.1145/1027321.1027325","url":null,"abstract":"Although data mining and database security are common topics of conversation in the computer and information sciences, they do not often inspire furious articles from New York Times columnists and letters of outrage from readers. Yet, in the fall of 2002, high-profile newspapers began to run stories on the potential threats to privacy and civil liberties posed by Total Information Awareness (TIA). Total Information Awareness was a program created within the Information Awareness Office (IAO) of the United States Defense Advanced Research Projects Agency (DARPA) in February 2002. Total Information Awareness sought to develop and use technologies such as data mining and biometrics in order to monitor private communications and commercial transactions, process large amounts of data from different sources, and to look for patterns of behavior that might reveal terrorist activity [1].","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123589932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Welcome to this special issue of Crossroads on cognitive science! Cognitive science is an incredibly dynamic and interesting field, but it can be a daunting task if you're looking for a quick overview. The goal of this issue of Crossroads is to make this task a bit easier for you. You'll find four articles to ease your way into cognitive science and introduce you to some of the exciting areas of research and application in this field.
{"title":"Cognitive science: at the crossroads of computers and the mind","authors":"R. Boring","doi":"10.1145/1027328.1027329","DOIUrl":"https://doi.org/10.1145/1027328.1027329","url":null,"abstract":"Welcome to this special issue of Crossroads on cognitive science! Cognitive science is an incredibly dynamic and interesting field, but it can be a daunting task if you're looking for a quick overview. The goal of this issue of Crossroads is to make this task a bit easier for you. You'll find four articles to ease your way into cognitive science and introduce you to some of the exciting areas of research and application in this field.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124515252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Introduction Gathering product information from large electronic catalogs on E-commerce (EC) sites can be a time-consuming and information-overloading process. User personalization, site content customization based upon a user's preferences and interests, is one mechanism of increasing the browsing efficiency of EC sites. Ideally, by increasing product navigation efficiency, EC sites will increase sales. This article briefly describes the main working objectives and perspectives regarding development of an EC site recommendation system. The article begins with a brief overview of systems. Next, we describe the importance of understanding consumers and their behavior and present a proposal for an agent-based architecture. We conclude with some thoughts about the field. This article is not intended to provide an in-depth explanation of the field, but instead demonstrates how a successful combination of marketing, Knowledge Discovery in Databases (KDD), user modeling, and Human Computer Interaction (HCI) lead to an effective technology in the decision support systems of EC. Recommendation systems suggest products and provide information to consumers to help them decide which items to purchase. Often, it is not possible for humans to make optimal purchasing decisions because there are too many factors involved. Technology can aid decision development by, for example, appropriately chunking information and thus structuring the user's valuation of products and allowing better human analogical reasoning. The recommender in the EC environment acts as a specialized seller for the customer. The recommenders mainly rely on user interfaces, techniques of marketing and large amounts of information about others customers and products to offer the right item to the right customer. The recommenders are the fundamental elements in sustaining usability and site confidence. EC recommenders are gradually becoming powerful tools for EC business. We classify the large number of recommenders [12,13] by the kind of information they use and by the way the recommendation system handles that information: 1. Collaborative-Social-filtering systems generate recommendations by aggregating consumer preferences. These systems group users based on similarity in behavioral or social patterns. The statistical analysis of data extraction or data mining and knowledge discovery in databases (KDD) techniques (monitoring the behavior of a user over the system, ratings over the products, purchase historical, etc.) builds the recommendation by analogies with many other users. Similarities between users are computed using the user-to-user correlation. This technique finds a set of "nearest neighbors" for each user in order to identify similar liking. Some collaborative filtering systems include Ringo [14] or …
{"title":"E-commerce recommenders: powerful tools for E-business","authors":"A. Gil, Francisco García","doi":"10.1145/1027328.1027334","DOIUrl":"https://doi.org/10.1145/1027328.1027334","url":null,"abstract":"Introduction Gathering product information from large electronic catalogs on E-commerce (EC) sites can be a time-consuming and information-overloading process. User personalization, site content customization based upon a user's preferences and interests, is one mechanism of increasing the browsing efficiency of EC sites. Ideally, by increasing product navigation efficiency, EC sites will increase sales. This article briefly describes the main working objectives and perspectives regarding development of an EC site recommendation system. The article begins with a brief overview of systems. Next, we describe the importance of understanding consumers and their behavior and present a proposal for an agent-based architecture. We conclude with some thoughts about the field. This article is not intended to provide an in-depth explanation of the field, but instead demonstrates how a successful combination of marketing, Knowledge Discovery in Databases (KDD), user modeling, and Human Computer Interaction (HCI) lead to an effective technology in the decision support systems of EC. Recommendation systems suggest products and provide information to consumers to help them decide which items to purchase. Often, it is not possible for humans to make optimal purchasing decisions because there are too many factors involved. Technology can aid decision development by, for example, appropriately chunking information and thus structuring the user's valuation of products and allowing better human analogical reasoning. The recommender in the EC environment acts as a specialized seller for the customer. The recommenders mainly rely on user interfaces, techniques of marketing and large amounts of information about others customers and products to offer the right item to the right customer. The recommenders are the fundamental elements in sustaining usability and site confidence. EC recommenders are gradually becoming powerful tools for EC business. We classify the large number of recommenders [12,13] by the kind of information they use and by the way the recommendation system handles that information: 1. Collaborative-Social-filtering systems generate recommendations by aggregating consumer preferences. These systems group users based on similarity in behavioral or social patterns. The statistical analysis of data extraction or data mining and knowledge discovery in databases (KDD) techniques (monitoring the behavior of a user over the system, ratings over the products, purchase historical, etc.) builds the recommendation by analogies with many other users. Similarities between users are computed using the user-to-user correlation. This technique finds a set of \"nearest neighbors\" for each user in order to identify similar liking. Some collaborative filtering systems include Ringo [14] or …","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114540951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Neural networking or Connectionist Theory dates back to 1943 with the researchers Warren S. McCulloch and William Pitts [5]. This article investigates the basic structure of neural networks and how they relate to associative memory. The article will also study the use of associative memory in construction of a competent computer opponent for the game Quarto. The computer opponent is trained using a modification of the classical Hebbian learning algorithm.
神经网络或联系主义理论可以追溯到1943年,由研究人员Warren S. McCulloch和William Pitts提出。本文探讨了神经网络的基本结构及其与联想记忆的关系。本文还将研究联想记忆在构建四开式游戏的合格计算机对手中的应用。计算机对手的训练使用经典的Hebbian学习算法的修改。
{"title":"Associative memory and the board game Quarto","authors":"Zachary A. Kissel","doi":"10.1145/1027328.1027332","DOIUrl":"https://doi.org/10.1145/1027328.1027332","url":null,"abstract":"Neural networking or Connectionist Theory dates back to 1943 with the researchers Warren S. McCulloch and William Pitts [5]. This article investigates the basic structure of neural networks and how they relate to associative memory. The article will also study the use of associative memory in construction of a competent computer opponent for the game Quarto. The computer opponent is trained using a modification of the classical Hebbian learning algorithm.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134480401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Department: I am vaguely associated with several departments at Indiana University, including Computer Science, Psychology, Philosophy, and Comparative Literature, but in truth I have very little to do with any of those departments. I teach seminars (for graduates and undergraduates alike) that have to do with my passions, and those passions range from alphabetic design to poetry translation to sexist language to Euclidean geometry to discovery in physics to the mechanisms of artistic creativity, and many other things besides. Here at IU, I'm more a floating faculty member than a member of any specific department or departments.
{"title":"A day in the life of ... Douglas Hofstadter","authors":"Douglas Hofstadter","doi":"10.1145/1027328.1027330","DOIUrl":"https://doi.org/10.1145/1027328.1027330","url":null,"abstract":"Department: I am vaguely associated with several departments at Indiana University, including Computer Science, Psychology, Philosophy, and Comparative Literature, but in truth I have very little to do with any of those departments. I teach seminars (for graduates and undergraduates alike) that have to do with my passions, and those passions range from alphabetic design to poetry translation to sexist language to Euclidean geometry to discovery in physics to the mechanisms of artistic creativity, and many other things besides. Here at IU, I'm more a floating faculty member than a member of any specific department or departments.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134020957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Over the last ten years, the increased availability of documents in digital form has contributed significantly to the immense volume of knowledge and information available to computer users. The World Wide Web has become the largest digital library available, with more than one billion unique indexable web pages [12]. Yet, due to their dynamic nature, fast growth rate, and unstructured format, it is increasingly difficult to identify and retrieve valuable information from these documents. More importantly, the usefulness of an unstructured document is dependent upon the ease and efficiency with which the information is retrieved [3]. In this paper, we define an unstructured document as a "general" document that is without a specific format e.g., plain text. Whereas, a document divided into sections or paragraph tags is referred to as semi-structured e.g., a formatted text document or a web page.
{"title":"Using perception in managing unstructured documents","authors":"C. K. Cheng, Xiaoshan Pan","doi":"10.1145/1027328.1027333","DOIUrl":"https://doi.org/10.1145/1027328.1027333","url":null,"abstract":"Over the last ten years, the increased availability of documents in digital form has contributed significantly to the immense volume of knowledge and information available to computer users. The World Wide Web has become the largest digital library available, with more than one billion unique indexable web pages [12]. Yet, due to their dynamic nature, fast growth rate, and unstructured format, it is increasingly difficult to identify and retrieve valuable information from these documents. More importantly, the usefulness of an unstructured document is dependent upon the ease and efficiency with which the information is retrieved [3]. In this paper, we define an unstructured document as a \"general\" document that is without a specific format e.g., plain text. Whereas, a document divided into sections or paragraph tags is referred to as semi-structured e.g., a formatted text document or a web page.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114805680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Project Gutenberg (PG), started in 1971 by Michael Hart at the University of Illinois, has long been demonstrating its value to the world community. The project is named after Johann Gutenberg, the celebrated father of the movable type printing press [3]. Likewise, Project Gutenberg embodies the revolution of the digital press. The project converts conventional books with expired copyrights into digital format; every book published before 1923 is currently eligible for PG (at least in the US). As of late 2002, the project already offered more than 6,000 full works [4].
{"title":"Literary freedom: project Gutenberg","authors":"Bryan K. Stroube","doi":"10.1145/973381.973384","DOIUrl":"https://doi.org/10.1145/973381.973384","url":null,"abstract":"Project Gutenberg (PG), started in 1971 by Michael Hart at the University of Illinois, has long been demonstrating its value to the world community. The project is named after Johann Gutenberg, the celebrated father of the movable type printing press [3]. Likewise, Project Gutenberg embodies the revolution of the digital press. The project converts conventional books with expired copyrights into digital format; every book published before 1923 is currently eligible for PG (at least in the US). As of late 2002, the project already offered more than 6,000 full works [4].","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121477383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}