-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
glen e. p. ropella wrote circa 11-05-09 02:12 PM:
> Similarly, we should come up with a suite of measures for openness.
> Obama's execution of bin Laden, interviews on 60 minutes, and keeping
> the pictures secret is a good example. We should pick mea
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Steve Smith wrote circa 11-05-09 12:16 PM:
> I challenge us (at Glen's urging) to come up with /Use Case Scenarios/
I _hate_ that word: "scenarios". It's jargonal and off-putting to me,
which perhaps relates to the accusation that I have more formal
d
collegiality are not necessarily linked.
Vlad,
*From:*friam-boun...@redfish.com [mailto:friam-boun...@redfish.com]
*On Behalf Of *Steve Smith
*Sent:* May-09-11 2:17 PM
*To:* The Friday Morning Applied Complexity Coffee Group
*Subject:* Re: [FRIAM] Modeling obfuscation (was - Terrorosity a
: [FRIAM] Modeling obfuscation (was - Terrorosity and it's Fruits)
Looking all the way back to Mohammed's original question which was nicely
concise:
Can we model/simulate how in a democracy that is inherently open (as
stated in the constitution: for the people, by the people etc..) the
Looking all the way back to Mohammed's original question which was
nicely concise:
/Can we model/simulate how in a democracy that is inherently open (as/
/stated in the constitution: for the people, by the people etc..) there/
/emerges "decision masking structures" emerge that active
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
As with any M&S project, one must start with the use cases. If you
don't start with your use cases, then you'll end up wandering around,
mixing things up and forgetting what you're doing. As they say "if you
don't know where you're going, you'll nev
or me is, how can we undo it if it
>is engineered as above?
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>Why is it hard to break it? Because the two principles
>representing the sufficient conditions for its emergence rely on social values!
>Any attempt to break it, will be met wi
>
>-Original Message-
>From: friam-boun...@redfish.com [mailto:friam-boun...@redfish.com] On Behalf
>Of Russell Standish
>Sent: May-08-11 7:26 PM
>To: The Friday Morning Applied Complexity Coffee Group
>Subject: Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it
-Original Message-
From: friam-boun...@redfish.com [mailto:friam-boun...@redfish.com] On Behalf
Of Russell Standish
Sent: May-08-11 7:26 PM
To: The Friday Morning Applied Complexity Coffee Group
Subject: Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's
Fruits)
On Sun, May 08, 20
On Sun, May 08, 2011 at 06:17:04PM -0500, Vladimyr Burachynsky wrote:
>
>
> It is an old joke , but the more people in the room the dumber it gets.
>
Having grown up on a sheep farm, I can say this definitely applies to
sheep. An individual sheep is quite difficult to control, and I have a
lot
Cell
From: friam-boun...@redfish.com [mailto:friam-boun...@redfish.com] On Behalf Of
ERIC P. CHARLES
Sent: May-08-11 4:00 PM
To: Mohammed El-Beltagy
Cc: The Friday Morning Applied Complexity Coffee Group
Subject: Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's Fruits)
I think
I think I know what you are talking about, but I'm not sure what the best way
to model it would be, or what we would gain from the modeling exercise. Are you
talking about something like this?
Institutional review boards (IRBs) oversee research that involves human
participants. This body was forme
04) 8016064 Cell
From: friam-boun...@redfish.com [mailto:friam-boun...@redfish.com] On Behalf
Of Mohammed El-Beltagy
Sent: May-08-11 5:56 AM
To: The Friday Morning Applied Complexity Coffee Group
Subject: Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's
Fruits)
Eri
Eric, Mohammed, et al.:
Alex Poddiakov, in Moscow, has done work that seems to me like it
*might* be related to this question; for instance, on what he calls
"Trojan horse learning". I refer you to his website, where various
manuscripts (some in Russian, some in Russglish) are available and
o
Eric,
Thats an interesting way of looking at it. As complex game of information
hiding.
I was thinking along the line of of having a schema for rule creation. The
schema here is like a constitution, and players can generate new rules based
on that schema to promote their self interest. For rules
I can't see that this posted, sorry if it is a duplicate
Mohammed,
Being totally unqualified to help you with this problem... it
seems interesting to me because most models I know of this sort (social systems
models) are about information acquisition and deployment. That is, the modeled
c
16 matches
Mail list logo