Acceso abierto

Is Brain Emulation Dangerous?

Journal of Artificial General Intelligence's Cover Image
Journal of Artificial General Intelligence
Brain Emulation and Connectomics: a Convergence of Neuroscience and Artificial General Intelligence, Editors: Randal Koene and Diana Deca

Cite

Alhazmi, O. H.; Malaiya, Y. K; Ray, I. 2007. Measuring, analyzing and predicting security vulnerabilities in software systems, Computers & Security, 26(3): 219-228.Search in Google Scholar

Anderson, R. 2002. Security in Open versus Closed Systems - the Dance of Boltzmann, Coase, and Moore. In Proceedings of Open Source Software Economics, Toulouse 2002.Search in Google Scholar

Anderson, R; Bond, M.; Clulow, J.; Skorobogatov, S. 2005. Cryptographic processors - a survey, University of Cambridge Computer Laboratory Technical Report UCAM-CL-TR-641 ,2005.Search in Google Scholar

Annas, G. J.; Andrews, L. B.; Isasi, R. M. 2002. Protecting the endangered human: toward an international treaty prohibiting cloning and inheritable alterations. Am J Law Med. 28(2-3):151-78.10.1017/S009885880001162XSearch in Google Scholar

Armstrong, S. 2011. World funds: implement free mitigations, November 10 2011. http://blog.practicalethics.ox.ac.uk/2011/11/world-funds-implement-free-mitigations/ Search in Google Scholar

Bostrom, N. 2004. The future of human evolution. In Death and Anti-Death: Two Hundred Years After Kant, Fifty Years After Turing, ed. Charles Tandy. Ria University Press: Palo Alto , California, 339-371. Available at http://www.nickbostrom.com/fut/evolution.html Bostrom, N. 2013. Existential Risk Prevention as Global Priority. Global Policy . 4(1): 15-31.10.1111/1758-5899.12002Search in Google Scholar

Bostrom, N. 2014. Superintelligence: Paths, Dangers, Strategies. Oxford University Press.Search in Google Scholar

Buchanan, A. 2009. Moral Status and Human Enhancement. Philosophy & Public Affairs. 37(4): 346-381.10.1111/j.1088-4963.2009.01166.xSearch in Google Scholar

Cederman, L-E. 2003. Modeling the Size of Wars: From Billiard Balls to Sandpiles. The American Political Science Review , 97(1):135-150.10.1017/S0003055403000571Search in Google Scholar

Chalmers, D.J. 2010. The Singularity: A Philosophical Analysis. The Journal of Consciousness Studies 17:7-65.Search in Google Scholar

Chang R.T.; Talwalkar, N.; Yue, C. P.; Wong, S. S. 2003 Near Speed-of-Light Signalling Over On-Chip Electrical Interconnects, IEEE Journal of Solid-State Circuits, 38(5):834-83810.1109/JSSC.2003.810060Search in Google Scholar

Ditto, W. L. 2003. Chaos in Neural Systems: From Epilepsy to Neurocomputing. In Proceedings of the 25th Annual international Conference of the IEEE EMBS, Cancun, Mexico September 17-21, 2003 3830-3833.Search in Google Scholar

Douglas, R. J.; Martin, K. A. C. 2004, Neuronal Circuits of the Neocortex. Annu Rev Neurosci. 27:419-51.10.1146/annurev.neuro.27.070203.14415215217339Search in Google Scholar

Drexler, E. K. 2013. Radical Abundance: How a Revolution in Nanotechnology Will Change Civilization. Public Affairs. Chapter 16. Search in Google Scholar

van Evera, S. 2013. Causes of War: Power and the Roots of Conflict. Cornell University Press.Search in Google Scholar

Floreano, D.; Mattiussi, C. 2008. Bio-Inspired Artificial Intelligence: Theories, Methods, and Technologies. MIT Press. Section 3.1.3Search in Google Scholar

Hawkins, J.; Blakeslee, S. 2005. On Intelligence. St. Martin's Griffin.Search in Google Scholar

Hansen, M.; Köhntopp, K.; Pfitzmann, A. 2002. The Open Source approach - opportunities and limitations with respect to security and privacy, Computers & Security, 21(5):461-471.Search in Google Scholar

Hanson, R. 1998. Burning the Cosmic Commons: Evolutionary Strategies for Interstellar Colonization. Available at http://hanson.gmu.edu/filluniv.pdf Hanson, R. 2008. Economics of the singularity. IEEE Spectrum, June 2008:37-42.Search in Google Scholar

Humphreys, M. 2002. Economics and Violent Conflict. Working paper UNICEF.Search in Google Scholar

Kurzweil, R. 2012. How to Create a Mind: The Secret of Human Thought Revealed, Viking Adult.Search in Google Scholar

Levy, J. S.; Thompson, W. R. 2009. Causes of War. John Wiley & Sons.Search in Google Scholar

Mockus, A.; Fielding, R. T.; Hebsleb, J. D. 2002. Two case studies of open source software development: Apache and Mozilla. ACM Transactions on Software Engineering and Methodology. 11(3):309-346. 10.1145/567793.567795Search in Google Scholar

Muehlhauser, L.; Salamon, A. 2012. Intelligence Explosion: Evidence and Import. In Singularity Hypotheses: A Scientific and Philosophical Assessment, ed. A. Eden, J. Søraker, J. H. Moor, and E. Steinhart. Berlin: Springer.Search in Google Scholar

Omohundro, S. 2008. The basic AI drives. In Proceedings of the First AGI Conference . Ed B. G. P. Wang. Frontiers in Artificial Intelligence and Applications, IOS Press.Search in Google Scholar

Pinker, S. 2011. The Better Angels of Our Nature: Why Violence Has Declined Viking Books.Search in Google Scholar

Rawls, J. 1971. A Theory of Justice, Belknap.10.4159/9780674042605Search in Google Scholar

Raymond, E. S. 1999. The Cathedral and the Bazaar. O‘Reilly Media.10.5210/fm.v3i2.578Search in Google Scholar

Richardson, L. F. 1948. Variation of the Frequency of Fatal Quarrels With Magnitude. Journal of the American Statistical Association . 43(244): 523-546.10.1080/01621459.1948.10483278Search in Google Scholar

Ryan, M. D. 2013. Cloud computing security: The scientific challenge, and a survey of solutions, Journal of Systems and Software. 86(9):2263-2268.10.1016/j.jss.2012.12.025Search in Google Scholar

Sandberg, A. 2013. Feasibility of Whole Brain Emulation, in Philosophy and Theory of Artificial Intelligence, ed. Vincent Müller, SAPERE 5, 251-264.Search in Google Scholar

Sandberg, A. 2014. Ethics of brain emulations. Journal of Experimental & Theoretical Artificial Intelligence, special issue edited by Vincent C. Müller, forthcoming.10.1080/0952813X.2014.895113Search in Google Scholar

Sandberg, A.; Bostrom, N. 2008. Whole Brain Emulation: A Roadmap, Technical Report #2008-3, Future of Humanity Institute, Oxford University. Available at http://www.fhi.ox.ac.uk/__data/assets/pdf_file/0019/3853/brain-emulation-roadmap-report.pdf Search in Google Scholar

Schneier, B. 1998. Security pitfalls in cryptography, Information Management & Computer Security. 6(3):133-13710.1108/09685229810225038Search in Google Scholar

Schneier, B. 2012. How Changing Technology Affects Security, IEEE Security & Privacy, 10(2): 104.Search in Google Scholar

Shulman, C. 2010. Whole Brain Emulation and the Evolution of Superorganisms, report of The Singularity Institute, San Francisco, CA. Available at intelligence.org files WBE-Superorgs.pdf Search in Google Scholar

Shulman, C.; Sandberg, A. 2010. Implications of a Software-Limited Singularity. In ECAP10: VIII European Conference on Computing and Philosophy, Munich. ed. Klaus Mainzer. Available at http://intelligence.org/files/SoftwareLimited.pdf Search in Google Scholar

Smith S. W.; Weingart S.; 1999. Building a high-performance, programmable secure coprocessor, Computer Networks 31:831-86010.1016/S1389-1286(98)00019-XSearch in Google Scholar

Siegelmann, H. T.; Sontag, E. D. 1991. Turing computability with neural nets. Applied Mathematics Letters, 4(6):77-80. Steriade M.; Timofeev, I.; Durmuller, N.; Grenier, F. 1998. Dynamic properties of corticothalamic neurons and local circuit interneurons generating fast rhythmic (30-40 Hz) spike bursts. J Neurophysiol 79:483-490.10.1016/0893-9659(91)90080-FSearch in Google Scholar

Swadlow, H. A.; Waxman, S. G. 2012. Axonal conduction delays. Scholarpedia, 7(6):1451. Available at http://www.scholarpedia.org/article/Axonal_conduction_delays 10.4249/scholarpedia.1451Search in Google Scholar

Tridgell A.; Mackerras, P. 1996. The rsync algorithm, Australian National University Technical Report TR-CS-96-05Search in Google Scholar

Wallace, M. D.; Crissey, B. L.; Sennott, L. I. 1986. Accidental Nuclear War: A Risk Assessment. Journal of Peace Research 23: 9-27.10.1177/002234338602300102Search in Google Scholar

White, M. 2012. Atrocitology: Humanity's 100 Deadliest Achievements. Cannongate Books.Search in Google Scholar

Yudkowsky, E. 2008. Artificial Intelligence as a positive and negative factor in global risk. In Global Catastrophic Risks, eds. Nick Bostrom and Milan Cirkovic, 308-345. Oxford University Press. 10.1093/oso/9780198570509.003.0021Search in Google Scholar

eISSN:
1946-0163
Idioma:
Inglés
Calendario de la edición:
2 veces al año
Temas de la revista:
Computer Sciences, Artificial Intelligence