منابع مشابه
Computationalism under Attack
Since the early eighties, computationalism in the study of the mind has been “under attack” by several critics of the so-called “classic” or “symbolic” approaches in AI and cognitive science. Computationalism was generically identified with such approaches. For example, it was identified with both Allen Newell and Herbert Simon’s Physical Symbol System Hypothesis and Jerry Fodor’s theory of Lan...
متن کاملThe family under attack.
Over dinner one night at one of the recent major heart meetings, some colleagues and I discussed a wide range of issues—from the Florida vote recount to the new American College of Cardiology Foundation. Much of our discussion, however, centered on our families and the challenges of marriage and raising children. Initially, we brought each other up to date on where our children were and what th...
متن کاملMuscle cells under attack
The rare brain disorder Nasu-Hakola disease is a fatal neurodegenerative syndrome that has been linked to mutations in immune signaling proteins, but the mechanism had not been explored. In a study on page 647, Takahashi et al. connect this disease to defects in phagocytic cells that are required for removal of apoptotic cells and suppression of inflammation in the brain. The link to disease in...
متن کاملIntracellular pathogens under attack
T he immune system provides a formidable barrier that prevents us from being overwhelmed by the numerous microbial pathogens that we encounter every day. However, many pathogens manage to escape the immune system by invading cells and replicating within them. To counter these pathogens immune cells produce a powerful cytokine called interferon-g that reprograms the invaded cells to express hund...
متن کاملAttack-Aware Cooperative Spectrum Sensing in Cognitive Radio Networks under Byzantine Attack
Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature Medicine
سال: 2012
ISSN: 1078-8956,1546-170X
DOI: 10.1038/nm.2975