Author of the publication

Superintelligence cannot be contained: Lessons from Computability Theory

, , , , , and . (2016)cite arxiv:1607.00913Comment: 7 pages, 5 figures.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Iterated crowdsourcing dilemma game., , , and . CoRR, (2014)Towards a new social laboratory: An experimental study of search through community participation at Burning Man., , , , , , , , and . CoRR, (2019)Algorithmic Discrimination: Formulation and Exploration in Deep Learning-based Face Biometrics., , , , , and . CoRR, (2019)Social Media Fingerprints of Unemployment, , , and . PLOS ONE, 10 (5): e0128692+ (May 28, 2015)Acceleration of a procedure to generate fractal curves of a given dimension through the probabilistic analysis of execution time, , and . Intelligent Engineering Systems Through Artificial Neural Networks, 14, ASME Press, New York, (2004)How Did You Get to Know That? A Traceable Word-of-Mouth Algorithm., , , , and . CSE (4), page 292-297. IEEE Computer Society, (2009)Beyond Viral, , and . Commun. ACM, 59 (4): 36--39 (March 2016)Weather impacts expressed sentiment., , , , , , , and . CoRR, (2017)Investigating the potential of social network data for transport demand models., , , and . CoRR, (2017)Nightmare Machine: A Large-Scale Study to Induce Fear Using Artificial Intelligence., , , and . ICCC, page 72-81. Association for Computational Creativity (ACC), (2021)