Is Brain Emulation Dangerous?
暂无分享,去创建一个
[1] Mark Ryan,et al. Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..
[2] Bruce Schneier. How Changing Technology Affects Security , 2012, IEEE Secur. Priv..
[3] Russell Powell,et al. The Future of Human Evolution , 2012, The British Journal for the Philosophy of Science.
[4] Bruce Schneier,et al. SECURITY PITFALLS IN CRYPTOGRAPHY , 1998 .
[5] S. Wong,et al. Near speed-of-light signaling over on-chip electrical interconnects , 2003 .
[6] Macartan Humphreys,et al. Economics and Violent Conflict , 2003 .
[7] Nick Bostrom,et al. Superintelligence: Paths, Dangers, Strategies , 2014 .
[8] L. Cederman. Modeling the Size of Wars: From Billiard Balls to Sandpiles , 2003, American Political Science Review.
[9] D. Chalmers. The Singularity: a Philosophical Analysis , 2010 .
[10] Indrajit Ray,et al. Measuring, analyzing and predicting security vulnerabilities in software systems , 2007, Comput. Secur..
[11] Paul Mackerras,et al. The rsync algorithm , 1996 .
[12] N. Bostrom. The Future of Human Evolution , 2001 .
[13] Dario Floreano,et al. Bio-Inspired Artificial Intelligence: Theories, Methods, and Technologies , 2008 .
[14] Eliezer Yukdowsky. Artificial Intelligence as a Positive and Negative Factor in Global Risk , 2008 .
[15] Anders Sandberg,et al. Ethics of brain emulations , 2014, J. Exp. Theor. Artif. Intell..
[16] M. Steriade,et al. Dynamic properties of corticothalamic neurons and local cortical interneurons generating fast rhythmic (30-40 Hz) spike bursts. , 1998, Journal of neurophysiology.
[17] Michael D. Wallace,et al. Accidental Nuclear War: A Risk Assessment , 1986 .
[18] Mike Bond,et al. Cryptographic Processors-A Survey , 2006, Proceedings of the IEEE.
[19] Ross J. Anderson,et al. Security in open versus closed systems - the dance of Boltzmann , 2002 .
[20] J. Cordeiro. Radical Abundance: How a Revolution In Nanotechnology Will Change Civilization , 2014 .
[21] William L. Ditto. Chaos in neural systems: from epilepsy to neurocomputing , 2003, Proceedings of the 25th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (IEEE Cat. No.03CH37439).
[22] Luke Muehlhauser,et al. Intelligence Explosion: Evidence and Import , 2012 .
[23] J. Hawkins,et al. On Intelligence , 2004 .
[24] Geoffrey W. Sutton,et al. The Better Angels of Our Nature: Why Violence Has Declined , 2012 .
[25] Eduardo Sontag,et al. Turing computability with neural nets , 1991 .
[26] George J Annas,et al. Protecting the endangered human: toward an international treaty prohibiting cloning and inheritable alterations. , 2002, American journal of law & medicine.
[27] Anders Sandberg,et al. Feasibility of Whole Brain Emulation , 2011, PT-AI.
[28] Harvey Swadlow,et al. Axonal conduction delays , 2012, Scholarpedia.
[29] A. Buchanan,et al. Moral Status and Human Enhancement , 2009 .
[30] R. Hanson. Economics of the singularity , 2008, IEEE Spectrum.
[31] Van Evera,et al. The Causes of War , 2021, Encyclopedia of Evolutionary Psychological Science.
[32] R. Kurzweil. How to Create a Mind: The Secret of Human Thought Revealed , 2012 .
[33] John Mark Bishop,et al. Philosophy and Theory of Artificial Intelligence , 2013 .
[34] Carl Shulman. The Singularity Institute Whole Brain Emulation and the Evolution of Superorganisms , 2012 .
[35] Nick Bostrom,et al. Existential Risk Prevention as Global Priority , 2013 .
[36] Marit Hansen,et al. The Open Source approach opportunities and limitations with respect to security and privacy , 2002, Comput. Secur..
[37] L. Richardson. Variation of the Frequency of Fatal Quarrels with Magnitude , 1948 .
[38] David Sobek. The Causes of War , 2008 .
[39] Sean W. Smith,et al. Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.
[40] A. Jose,et al. Near speed-of-light on-chip interconnects using pulsed current-mode signalling , 2005, Digest of Technical Papers. 2005 Symposium on VLSI Circuits, 2005..
[41] Stephen M. Omohundro,et al. The Basic AI Drives , 2008, AGI.
[42] J. Herbsleb,et al. Two case studies of open source software development: Apache and Mozilla , 2002, TSEM.
[43] Anders Sandberg,et al. Implications of a Software-Limited Singularity , 2013 .
[44] C. Guarneri. Cornell University Press , 1991 .
[45] Bruce Schneier. Security pitfalls in cryptographic design , 1998, Inf. Manag. Comput. Secur..