Results 221 to 230 of about 2,779 (283)
Representationalism and the Spatial Representational Contents of Afterimage Experiences
ABSTRACT Experiences of afterimages have often been cited as counterexamples to representationalism about vision, that is, as counterexamples to the thesis that the phenomenal character of a visual experience is completely determined by its representational content. In this paper, I discuss a possible counterexample to representationalism that is based
René Jagnow
wiley +1 more source
Dogmatism and Easy Knowledge: Avoiding the Dialectic?
ABSTRACT This paper analyzes and objects to the anti‐skeptical strategy endorsed by Epistemological Dogmatism. Dogmatism is a theory of epistemic justification that holds perceptual warrant for our beliefs is immediate, based on experiential seemings. Crucially, it rejects requests for higher‐order justification or active defense of the justification ...
Guido Tana
wiley +1 more source
An Analysis and Simulation of Security Risks in Radar Networks from the Perspective of Cybersecurity. [PDF]
Chen R, Zhang Y, Li X, Ran J.
europepmc +1 more source
ABSTRACT According to most readers of the Tractatus, Wittgenstein's logic is empty or contentless, since it consists of tautologies that do not picture reality. This view, however, does not explain how and why Wittgenstein's ‘logic of depiction’ is transcendental (T, 4.015 and 6.13), especially given that Kant introduced transcendental logic through ...
Simone Nota
wiley +1 more source
Bertrand Russell, Karin Costelloe‐Stephen, and Temporal Experience
Noûs, EarlyView.
Emily Thomas
wiley +1 more source
Metaethics and the Functions of Moral Language
ABSTRACT Metaethics has long included debates about the function of moral discourse. Some have argued that moral statements express our attitudes, others that they serve as prescriptions for how to act, still others that they describe moral facts or properties.
Amie L. Thomasson
wiley +1 more source
Trustworthy Localization in IoT Networks: A Survey of Localization Techniques, Threats, and Mitigation. [PDF]
Pettorru G, Pilloni V, Martalò M.
europepmc +1 more source
Detection of GPS Spoofing Attacks in UAVs Based on Adversarial Machine Learning Model. [PDF]
Alhoraibi L, Alghazzawi D, Alhebshi R.
europepmc +1 more source
Subway door fault prediction employing stacking ensemble learning. [PDF]
Song H +5 more
europepmc +1 more source

