Language as an information system: redundancy and optimization
نویسندگان
چکیده
منابع مشابه
Information System Evolution as Language Evolution
In this article we look at the evolution of information systems from the perspective of the evolution of domain languages, and provide a report on some of our ongoing research activities. Many if not all analysis and design approaches for information systems base themselves on techniques involving some sort of natural language analysis. However, the view on language underlying these approaches ...
متن کاملLanguage as an evolutionary system
John Maynard Smith and Eörs Szathmáry argued that human language signified the eighth major transition in evolution: human language marked a new form of information transmission from one generation to another [Maynard Smith J, Szathmáry E. The major transitions in evolution. Oxford: Oxford Univ. Press; 1995]. According to this view language codes cultural information and as such forms the basis...
متن کاملLanguage as an emergent system
Human language is a biological system: All humans are neurologically predisposed to acquire whatever language they are exposed to in their early years. Language itself is socially transmitted. A rich interaction between genetic (brain) structures and social behavior gives rise to what linguists call a “grammar”, which is the knowledge (part innate, part learned) of language complexity found ins...
متن کاملLanguage as an Interaction System
The standard information flow view of cognition and language has environmental information being transduced at sensory surfaces, the encodings thereby generated being processed in internal cognition (whether of symbol manipulation or connectionist or neural net form, or all of the above), and further output encodings being generated for action, such as walking or eating. A special case of outpu...
متن کاملInformation-Theoretic Security as an Optimization Problem
Quantum key distribution is renowned for information-theoretic security on point-to-point connections, while it is by itself not directly capable of end-to-end security. Multipath transmission is known for perfect end-to-end security, provided that perfect point-to-point security is achievable. The marriage of the two is as natural as it is difficult to achieve in real life networks: secure mul...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sovremennye issledovaniya sotsialnykh problem
سال: 2015
ISSN: 2218-7405
DOI: 10.12731/2218-7405-2015-9-24