paper.tex 36 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502
  1. \newif\ifSHOWPROOFS
  2. \documentclass{llncs}
  3. \SHOWPROOFSfalse
  4. \SHOWPROOFStrue
  5. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  6. \usepackage{a4,a4wide}
  7. \usepackage{xspace}
  8. \usepackage{url}
  9. \usepackage{amsmath,amssymb}
  10. % \usepackage{algorithm}
  11. % \usepackage{algorithmic}
  12. \usepackage{graphicx}
  13. \usepackage{pst-tree}
  14. \usepackage{pst-node}
  15. \usepackage{epstopdf}
  16. \usepackage{longtable}
  17. \usepackage[utf8]{inputenc}
  18. \newcommand{\grd}{\mathit{ground}}
  19. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  20. \newcommand{\naf}{\ensuremath{\mathrm{not}}\xspace}
  21. \newcommand{\sneg}[1]{\ensuremath{\neg#1}\xspace}
  22. \newcommand{\compl}[1]{\ensuremath{\bar{#1}}}
  23. \newcommand{\atomp}[1]{\ensuremath{\mathit{#1}\xspace}}
  24. \newcommand{\atom}[2]{\ensuremath{\mathtt{#1}{\rm(}\mathtt{#2}{\rm)}\xspace}}
  25. \renewcommand{\atom}[2]{\ensuremath{\mathit{#1}{(}{#2}{)}\xspace}}
  26. \newcommand{\gringo}{\texttt{Gringo}\xspace}
  27. \newcommand{\aspviz}{\texttt{ASPVIZ}\xspace}
  28. \newcommand{\idpdraw}{\texttt{IDPDraw}\xspace}
  29. \newcommand{\clasp}{\textsc{Clasp}\xspace}
  30. \newcommand{\dlv}{\texttt{DLV}\xspace}
  31. \newcommand{\nomore}{\texttt{noMoRe}\xspace}
  32. \newcommand{\inter}{\ensuremath{I}\xspace}
  33. \newcommand{\ninter}{\ensuremath{N}\xspace}
  34. \newcommand{\deltaR}{\ensuremath{{\mathit{R}_\Delta}}\xspace}
  35. \newcommand{\deltaI}{\ensuremath{{\mathit{I}_\Delta}}\xspace}
  36. \newcommand{\loopS}{\ensuremath{\Gamma}\xspace}
  37. \newcommand{\opsym}[1]{\ensuremath{\Upsilon_{#1}}\xspace}
  38. \newcommand{\op}[2]{\ensuremath{\opsym{#1}({#2})}\xspace}
  39. \newcommand{\statei}[1]{\ensuremath{\mathit{I}({#1})}\xspace}
  40. \renewcommand{\statei}[1]{\ensuremath{\mathit{Int}[{#1}]}\xspace}
  41. \newcommand{\stater}[1]{\ensuremath{\mathit{R}_{#1}}\xspace}
  42. \newcommand{\cset}{\ensuremath{C}\xspace}
  43. \newcommand{\state}{\ensuremath{S}\xspace}
  44. \newcommand{\facts}{\ensuremath{F}\xspace}
  45. \newcommand{\computation}{\ensuremath{\mathrm{C}}\xspace}
  46. \newcommand{\blockedLiterals}{\ensuremath{\mathfrak{B}}\xspace}
  47. \newcommand{\applrules}{\ensuremath{R}\xspace}
  48. \newcommand{\activatedRules}[2]{\ensuremath{\mathit{AR}_{#2}(#1)}\xspace}
  49. \newcommand{\sealion}{\texttt{SeaLion}\xspace}
  50. \newcommand{\kara}{\texttt{Kara}\xspace}
  51. \newcommand{\intconstraints}[1]{\ensuremath{\mathit{Con}_{#1}}\xspace}
  52. \newcommand{\activerules}[2]{\ensuremath{\mathit{Act}^{#1}({#2})}\xspace}
  53. \newcommand{\forbidden}{\ensuremath{\mathit{forbidden}}\xspace}
  54. \newcommand{\currentSupport}[1]{\ensuremath{\mathit{Sup}[{#1}]}\xspace}
  55. \newcommand{\pool}{\ensuremath{\mathit{pool}}\xspace}
  56. \newcommand{\hcpool}{\ensuremath{\mathit{pool^{HC}}}\xspace}
  57. \newcommand{\constraintset}{\ensuremath{\mathit{Con}}\xspace}
  58. \newcommand{\hclits}{\ensuremath{\mathbb{L}}\xspace}
  59. \newcommand{\Pol}{{\rm P}\xspace}
  60. \newcommand{\PNP}{\Pol^{\rm NP}\xspace}
  61. \newcommand{\NP}{\mbox{\rm NP}\xspace}
  62. \newcommand{\NPNP}{\NP^{\rm NP}\xspace}
  63. \newcommand{\CONP}{\mbox{\rm coNP}\xspace}
  64. \newcommand{\coNP}{\mbox{\rm coNP}\xspace}
  65. \newcommand{\SigmaP}[1]{\ensuremath{{\Sigma}_{#1}^{P}}\xspace}
  66. \newcommand{\PiP}[1]{\ensuremath{{\Pi}_{#1}^{P}}\xspace}
  67. \newcommand{\DeltaP}[1]{\ensuremath{{\Delta}_{#1}^{P}}\xspace}
  68. \newcommand{\lang}{\ensuremath{\mathcal{L}}\xspace}
  69. \newcommand{\alphabet}{\ensuremath{\mathcal{A}}\xspace}
  70. \newcommand{\visalphabet}{\ensuremath{\mathcal{A}_V}\xspace}
  71. \newcommand{\vispred}{\ensuremath{\mathcal{P}_v}\xspace}
  72. \newcommand{\abdpred}{\ensuremath{\mathcal{P}_a}\xspace}
  73. \newcommand{\intpred}{\ensuremath{\mathcal{P}_i}\xspace}
  74. \newcommand{\abddom}{\ensuremath{\mathcal{D}_a}\xspace}
  75. \newcommand{\la}{\ensuremath{\leftarrow}\xspace}
  76. \newcommand{\ra}{\ensuremath{\rightarrow}\xspace}
  77. \newcommand{\at}[1]{\ensuremath{\mathit{At}(#1)}\xspace}
  78. \newcommand{\subst}{\ensuremath{\vartheta}\xspace}
  79. \newcommand{\succeeds}[1]{\ensuremath{\succ_{#1}}\xspace}
  80. \renewcommand{\succeeds}[1]{\ensuremath{\prec_{#1}}\xspace}
  81. \newcommand{\result}[1]{\ensuremath{\mathit{res}({#1})}\xspace}
  82. \newcommand{\be}{\begin{compactenum}}
  83. \newcommand{\ee}{\end{compactenum}}
  84. \newcommand{\bi}{\begin{compactitem}}
  85. \newcommand{\ei}{\end{compactitem}}
  86. \newcommand{\AS}[1]{\ensuremath{\mathit{AS}(#1)}\xspace}
  87. \newcommand{\SM}[1]{\AS{#1}}
  88. \newcommand{\naturals}[0]{\ensuremath{\mathbb{N}}\xspace}
  89. \newcommand{\vhack}{\vspace{-8pt}}
  90. \newcommand{\vhackafter}{\vspace{-5.5pt}}
  91. \renewcommand{\vhack}{}
  92. \renewcommand{\vhackafter}{}
  93. \newcommand{\lit}[1]{\ensuremath{\mathit{L}(#1)}\xspace}
  94. \newcommand{\hcfuncsym}[2]{\ensuremath{f_{#1,#2}}\xspace}
  95. \newcommand{\hcfunc}[3]{\ensuremath{\hcfuncsym{#1}{#2}({#3})}\xspace}
  96. \newcommand{\viz}[0]{viz.\xspace}
  97. \newcommand{\wrt}[0]{with respect to\xspace}
  98. \newcommand{\iec}[0]{i.e.,\xspace}
  99. \newcommand{\Iec}[0]{I.e.,\xspace}
  100. \newcommand{\egc}[0]{e.g.,\xspace}
  101. \newcommand{\eg}[0]{e.g.\xspace}
  102. \newcommand{\resp}[0]{resp.,\xspace}
  103. \newcommand{\nop}[1]{}
  104. \newcommand{\body}[1]{\ensuremath{\mathrm{B(}{#1}\mathrm{)}}\xspace}
  105. \newcommand{\head}[1]{\ensuremath{\mathrm{H(}{#1}\mathrm{)}}\xspace}
  106. \newcommand{\pbody}[1]{\ensuremath{\mathrm{{B^+}(}{#1}\mathrm{)}}\xspace}
  107. \newcommand{\nbody}[1]{\ensuremath{\mathrm{{B^-}(}{#1}\mathrm{)}}\xspace}
  108. \newcommand{\gr}[1]{\ensuremath{\mathit{gr(}{#1}\mathit{)}}\xspace}
  109. \newcommand{\set}[1]{\ensuremath{\{{#1}\}}\xspace}
  110. \newcommand{\abs}[1]{\ensuremath{|{#1}|}\xspace}
  111. \newcommand{\selfsupp}[0]{self-supporting\xspace}
  112. \newcommand{\stable}[0]{stable\xspace}
  113. \newcommand{\trans}[2]{\ensuremath{\lambda{\rm(}{#1},{#2}{\rm)}}}
  114. \newcommand{\guesspart}[1]{\ensuremath{\mathit{guess}{\rm(}{#1}{\rm)}}}
  115. \renewcommand{\guesspart}[1]{\ensuremath{\mathsf{guess}{\rm(}{#1}{\rm)}}}
  116. \newcommand{\checkpart}[1]{\ensuremath{\mathit{check}{\rm(}{#1}{\rm)}}}
  117. \renewcommand{\checkpart}[1]{\ensuremath{\mathsf{check}{\rm(}{#1}{\rm)}}}
  118. \newcommand{\var}[1]{\ensuremath{\mathit{VAR}{\rm(}{#1}{\rm)}}}
  119. \newcommand{\dompart}[2]{\ensuremath{\mathit{dom}{\rm(}{#1},{#2}{\rm)}}}
  120. \renewcommand{\dompart}[2]{\ensuremath{\mathsf{dom}{\rm(}{#1},{#2}{\rm)}}}
  121. \newcommand{\ruleimp}{\mathtt{{:-}}}
  122. \renewcommand{\ruleimp}{:\!- \ }
  123. \newcommand{\nonrecdomo}[0]{\ensuremath{\mathtt{nonRecDom}}}
  124. \renewcommand{\nonrecdomo}[0]{\ensuremath{\mathit{nonRecDom}}}
  125. \newcommand{\nonrecdom}[1]{\ensuremath{\nonrecdomo(#1)}}
  126. \newcommand{\domo}[0]{\ensuremath{\mathtt{dom}}}
  127. \renewcommand{\domo}[0]{\ensuremath{\mathit{dom}}}
  128. \newcommand{\dom}[1]{\ensuremath{\domo(#1)}}
  129. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  130. \title{Current Trends in Computer Science\\
  131. Summary Report }
  132. \author{Name Surname}
  133. \institute{Matriculation number: 0123456 \\
  134. \email{email@email.com}
  135. }
  136. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  137. \begin{document}
  138. \maketitle
  139. %\begin{abstract}
  140. %Abstract goes here...
  141. %\end{abstract}
  142. \section{Introduction}
  143. The selection of talks for this report comprises talks from the 2022W and 2023S semesters in which Current Trends in Computer Science was offered.
  144. The first of these talks by Dines Bj\o{}rner on Domain Science \& Engineering, was held on May 4th, 2022.
  145. The second talk was held by Gordana Dodig-Crnković on teaching ethics to students was held on May 11th, 2023.
  146. The third, by Antonio Casilli, focuses on a counter-history of artificial intelligence and was held on May 12th, 2023.
  147. Because artificial intelligence is such a prominent theme of many of the talks offered within this course, the author of this report also proudly asserts that it was not written using the help of ChatGPT.
  148. \newpage
  149. \section{Domain Science \& Engineering - Dines Bj\o{}rner}
  150. Dines Bj\o{}rner has an impressive and impressively long track record consisting of work that has shaped multiple important technologies, methodologies and concepts used in Computer Science in general.
  151. To mention just a few, his early work were contributions to functional programming, query languages (that have evolved into the widely used standard SQL) and the Vienna Development Method (VDM).
  152. But his most significant contribution is to the field of domain science and engineering.
  153. In a project aiming to aid developing countries currently in the process of or planning to adopt computer systems, the need for a deeper understanding of domains seems to have come up almost out of necessity:
  154. The aim of this programme was to develop \textit{software for critical infrastructure}, using formal methods based on sound, scientific foundations.
  155. Some examples provided in the talk for critical infrastructure are railways, telecommunications, banking, fisheries, transport (sea/air/land), agriculture, manufacturing, mining, pipelines and e-government.
  156. The criticality of these domains underlines the need for domain-specificity of such software solutions.
  157. \subsection{Making Domains into a Science}
  158. To understand domains in more detail, these often vaguely used concept of a domain was refined and a calculus to tackle domains for purposes of verification and computing was constructed.
  159. The following definition of a domain was provided in the talk:
  160. \begin{quotation}
  161. By a \textit{domain} we shall understand: a \textit{rationally describable} segment of; a \textit{discrete dynamics} of; a \textit{human assisted reality}, i.e., of the world; its \textit{more-or-less related solid} or \textit{fluid entities} - \textit{natural} [``God-given''] and \textit{artefactual} [``man-made''] - and its \textit{living species entities}: \textit{plants} and \textit{animals} - including \textit{humans}
  162. \end{quotation}
  163. One can already get a sense that defining domains is not an easy task.
  164. There are endless combinations of entities, their behaviors and possibly interactions, coming together to form what we might understand as a domain.
  165. Another complication is the question which properties are important for a purposeful application of domain knowledge and what this application should be.
  166. In a sense, these are the deeper problems of abstraction.
  167. Given this definition of a domain, it is reasonable to define the \textit{description} of a domain, which is an association of \textit{abstract syntax} and \textit{semantics} and \textit{language} (\textit{nouns} and \textit{verbs}) spoken by \textit{practitioners}.
  168. There are multiple things to consider here, but the talk focuses on semantics.
  169. The semantics are broken down into more discrete entities: \textit{axioms} and \textit{laws} of syntactically defined \textit{endurants}; \textit{behaviors} that describe \textit{perdurants}.
  170. Endurants and perdurants are the driving forces of this approach to understanding domains, because their complex interplay can capture domains while still remaining formally describable.
  171. The following definition of an endurant is provided (with a citation to Vol. I, pg. 656 to The Shorter Oxford English Dictionary on Historical Principles, Clandon Press, Oxford, England, 1973, 1987, two vols. by W. Little, H.W. Fowler, J. Coulson, and C.T. Onions):
  172. \begin{quotation}
  173. Endurants are those quantities of domains that we can observe (see and touch), in space, as ``complete'' entities no matter which point in time; ``material'' entities that persists and endures.
  174. \end{quotation}
  175. Things which stay still and exist as part of something are endurants, for example.
  176. What happens when we model domain endurants in software?
  177. They typically become \textit{data}.
  178. As for perdurants, the following definition is provided (with another citation to the same source, this time Vol. II, pg. 1552):
  179. \begin{quotation}
  180. By a \textbf{perdurant}, we shall understand an entity: for which only a fragment exists if we look at or touch them at any given snapshot in time. Were we to freeze time we would only see or touch a fragment of the perdurant.
  181. \end{quotation}
  182. Clearly perdurants are in some way orthogonal to endurants.
  183. They describe things which do not stay still but still exist as a part of something, like for example objects that are in motion as part of some process.
  184. Thus it is concluded that domain perdurants modelled in software typically become procedures.
  185. Now these primitives can be used to construct a calculus that operates on a domain, or more specifically, the endurants and perdurants.
  186. Both of these are part of a more abstract group called an entity and we can model the types of an entity with predicates.
  187. Qualities of an entity might also be modelled using predicate.
  188. Richer analysis is possible using relations and functions, entities can also be grouped into aggregates or broken down into sets of entities.
  189. Suddenly there is a fascinating potential for accurate models by using this calculus to do some of the things which are now possible.
  190. For instance, the internal qualities of an entity might be formalized.
  191. We can also try to relate entities that exist as parts at different abstraction layers with each other, like for example comparing a part to the whole (the study of which is referred to as \textit{mereology}, first proposed by Polish mathematician/logician and philosopher Stanis\l{}aw Leśniewski (1886-1939)).
  192. The requirement for something to be a part is for it to have a unique identification.
  193. Another interesting potential is for deduction on the basis of this formalism to \textit{transcend} the domain itself.
  194. We are explicitly told in the talk that a key point of the domain science and engineering approach is to transcendentally deduce a unique behavior to every manifest part.
  195. What is meant by \textit{transcendental} is this:
  196. \begin{quotation}
  197. We shall understand the philosophical notion: the a priori or intuitive basis of knowledge, independent of experience.
  198. \end{quotation}
  199. As for a \textit{transcendental deduction}:
  200. \begin{quotation}
  201. We shall understand the philosophical notion: a transcendental `conversion' of one kind of knowledge into a seemingly different kind of knowledge.
  202. \end{quotation}
  203. Another way to look at transcendence in this framework is the process of ``injecting endurants into perdurants''.
  204. There exists a similar kind of relationship between endurants/perdurants and nouns/verbs and as we know from some languages, ``nouns can often be verbed''.
  205. The notion of transcendence seems almost an inevitability of this approach but it might still be surprising.
  206. Another concept is the concept of a \textit{channel}.
  207. Their inspiration is the communication of behaviors.
  208. To express them, Tony Hoare's \textit{Communicating Sequential Processes} (CSP) are used.
  209. All of these primitives combined can formalize the behavior of systems and within the talk, multiple examples are offered, where out of an specification in informal language, a formal domain specification is constructed.
  210. All of this is brought together at the end in what is called a domain initialisation, which ``amounts to the parallel composition of all manifest part behaviors.''
  211. One interesting thing to note is that this structure resembles VHDL, which is used to model digital logic for hardware.
  212. On one hand there are entities, which exist as instantiated objects on their own, but there is also a \textit{behavioral} description of the entities, which can be supplied for example by providing \textit{processes}.
  213. The difficulty for a programmer used to sequential thinking is to reason about the inherent parallelism of such hardware.
  214. With multiple processes in place, there are multiple things going on at the same time.
  215. One can see the similarity to the idea of a domain initialisation, or the ``parallel composition of all manifest part behaviors.''
  216. There is an interesting historical note here, VHDL as a language is based on Ada.
  217. As we will see, this domain-based approach was actually used to build an Ada compiler.
  218. \subsection{Motivation and Aftereffects of a Science of Domains}
  219. This kind of domain science \& engineering is widely applicable.
  220. It has been applied in a fully validated European Ada compiler developed by the Dansk Datamatik Center (based in Denmark), the inner workings of which was explained as part of the talk.
  221. Today, it is unthinkable not to make extensive use of domain-specific knowledge in solving a problem that involves software.
  222. The requirement to understand a domain appears wherever safety is a concern, but it is also relevant to other metrics of system performance.
  223. As such, it is certainly interesting to consider an approach based on formalisms about the domain itself.
  224. But within the talk, domain science \& engineering was motivated philosophically:
  225. we have seen a part of this while looking a transcendence, but it becomes more obvious when looking into the primer that has been written by Dines Bj\o{}rner titled ``Domain Science and Engineering, A Foundation for Software Development'' (a 2021 publication by Springer).
  226. In the primer, there is an entire chapter dedicated to philosophy and it revolves around the philosophy of Kai S\o{}rlander, partly inspired by and standing in contrast to the philosophy of Immanuel Kant.
  227. Quite naturally, the concepts and primitives that make up the domain formalism we have looked at seem to result from this philosophy and perhaps, this is the reason why Dines Bj\o{}rner's innovative approach to taming complexity is a success.
  228. \newpage
  229. \section{Research-based teaching ethics to engineering students: beyond compliance and on the way of digital humanism - Gordana Dodig-Crnković}
  230. In this talk Gordana Dodig-Crnković touched on the emerging and increasingly important topic of digital humanism, the center of which she remarked to lie in Vienna.
  231. Her track record with which the talk begins is impressive and shows a remarkable kind of focus on the intersection of computer science and ethics.
  232. Especially in such a rapidly evolving area as is computer science, constructively discussing ethics is not at all easy and sometimes even completely forsaken.
  233. \subsection{An Approach to Teaching}
  234. What makes this introduction unique is a focus on courses that were taught and even the underlying approach to some of these.
  235. To characterize her approach to teaching ethics to students, in particular to students of technology, she has quoted Peter Bowden who provided a description of a similar approach:
  236. \begin{quotation}
  237. The course was based on the assumption that \textit{identifying the major ethical issues in the discipline, and subsequently presenting and analysing them in the classroom, would provide the future professional with knowledge of the ethical problems that they were likely to face on graduation.}
  238. The student has then to be given the skills and knowledge to combat these concerns, should he/she wish to.
  239. These findings feed into several components of the course, such as the code of ethics, the role of a professional society or industry association and the role of ethical theory.
  240. The sources employed to identify the issues were surveys of the literature and case studies.
  241. \end{quotation}
  242. What is the rationale behind offering ethics courses to students from such a variety of different fields as computer science and engineering?
  243. The answer is simple:
  244. tech is becoming central to culture, or indeed everything!
  245. As such, a premise of the talk is that ``we must work to understand technologies we build.''
  246. Almost by definition, everything is connected to ethics, because ethical considerations can be made for and about everything we do.
  247. One of the goals of this talk was to highlight the lessons learned in a career geared towards the difficult problems of ethics and to equip students with tools to solve ethical problems they themselves are likely to face in their field.
  248. To identify topics with ethical relevance, the students of the speaker were tasked with the filling out of a questionnaire.
  249. Overall, the topics are categorizable in three groups:
  250. \textit{technology aspects}, \textit{methodology aspects} and \textit{social aspects}.
  251. The technology aspects are further categorizable into data-related and sustainability-related topics.
  252. It is quite instructive to consider what the students identified, very long lists of topics were offered.
  253. To summarize the data-related technology aspects, the identified topics were the provenance, confidentiality, privacy, quality, equality, and reproducibility of data.
  254. There were also answers about public understanding of technology, data-driven approaches and neutrality of data.
  255. As for the sustainability-related topics, the answers pertained to the fuel economy, emissions, environmental contributions of batteries (production, use and disposal), the impact of massive electronic production, the increasing demand of rare elements, a common lack of life cycle assessment and something called the rebound effect.
  256. The rebound effect can be explained by using a simple example, if a combustion-engine based car is made more efficient, it could lead to less emissions.
  257. But the same improvements may induce behavioral changes that offset any gains, if as a consequence the car is used more readily, to drive further or drive faster.
  258. There were even more topics for the methodology aspects.
  259. These pertain in part to possible methodological problems of the scientific process itself, such as reproducibility, open science, the review process (such as a lack of a double-blind review process), presentation of results, limits of modelling and what kinds of approaches could or should really be trusted.
  260. Finally, there were also many social aspects to consider.
  261. Some of the cited examples include the quality of life, codes of ethics, legal issues (such as issues related to copyright infringement), cultural diversity, gender equality, trusting machines to define culturally relevant spaces, interactions of technology with the job market, informing politics to make technology-aware decisions or even just the impact of technology on society at large.
  262. As one can see, there are countless examples to be had, examples which can and should be examined more closely.
  263. The talk takes a hopeful stance towards this issue by providing evidence that ethics is high on the agenda of the scientific community at large.
  264. \subsection{A Common Trope: Unintended Consequences of Technology}
  265. One common trope of many of the societal issues we face today because of the effects of technological innovations is that these problems come about as unintended consequences.
  266. This means that the consequences either weren't previously thought of or ignored.
  267. Even when the technology in question might be just one innovation, the unintended consequences can be manifold:
  268. if we take as an example autonomous cars, they might carry consequences related to the organization of roads, the many ways in which unfortunate accidents could occur, the psychological changes they might bring about, shifts in the car industry as a whole, as well as many more imaginable possibilities.
  269. Other technologies that raise questions were offered as examples, such as artificial general intelligence, nano-technology, biotechnology, internet of things and other autonomous software/systems.
  270. This problem of unintended consequences supports the goal of educating students by confronting them with the quite broad field of ethics, even if their chosen field might be entirely different.
  271. This problem is also the basis of a methodology to deal with ethical issues in technology.
  272. Besides teaching students, the methodology that is offered to avoid unintended consequences is to imbue values into the process of design, engineering and research.
  273. Values serve to encode what is important to us, or as is described in the talk:
  274. \begin{quotation}
  275. Values serve as a guide to action and knowledge.
  276. They are relevant to all aspects of scientific and engineering practice, including discovery, analysis and application.
  277. \end{quotation}
  278. \subsection{The Value of Values}
  279. What sort of values could be involved in the decision making and reasoning processes?
  280. These values are categorized in the talk as ethical values, aesthetic values, epistemic values and economic values, amongst others.
  281. A more sophisticated example of values that inform the reasoning process that comes to mind are \textit{simplicity} and \textit{elegance} in the field of physics.
  282. Acclaimed physicists such as Albert Einstein have used these values as a guide to judge the quality of their work, even though they are aesthetic values, which might or might not at first glance seem relevant to problems of physics.
  283. These values can also fill what is referred to as a policy vacuum.
  284. Policy vacuums are cited as a reason that technological consequences arise, by way of quoting Moor J. on computer ethics.
  285. It is argued that the new choices for action we are presented with by technology (or in particular computer technology) are unguided because there is a lack or policy or inadequate policies for how to conduct ourselves in these situations.
  286. Especially in the field of computer science and engineering, technology is evolving and emerging at so rapid a pace, that regulations might not be able to keep up, so it is reasonable to turn to values instead.
  287. But one danger of being too trusting of values is that we might fall prey to our inherent cognitive biases, which is one additional reason that a continuous dialogue on the topic might be desirable.
  288. Arguably, the role of ethics is increasingly becoming more important, as technology shapes more aspects of our lives.
  289. By now technology has already shaped the world we live in and the stakes seem bound to rise higher still.
  290. For this reason, mention is paid to the emerging field of digital humanism, which deals with ``digital technology development and policies based on human rights, democracy, inclusion and diversity.''
  291. The talk was finished by a hopeful outlook on the future of ethics in the classroom.
  292. The workshop in the city of Florence that young Leonardo da Vinci was taken to by his father to begin his apprenticeship, Andrea Verrocchio's studio, was one that supported (rather than stifled) his spirit of enthusiastic experimentation and developed other young apprentices working there to go on to become famous for their work.
  293. Keeping with this theme, the closing words of the presentation are as follows:
  294. \begin{quotation}
  295. The idealized picture of the roles of teacher and students in a research-based ethics course can be compared to the work of a renaissance art studio.
  296. It is definitely \textbf{beyond compliance} (the action of complying with a wish or command).
  297. \end{quotation}
  298. \newpage
  299. \section{A Counter-History of Artificial Intelligence: Computing factories and machinery (18th - 21st century) - Antonio Casilli}
  300. Within this talk, Antonio Casilli gives weight to a different side of the history of artificial intelligence that arguably has been neglected.
  301. The history of artificial intelligence is by and large a history of computing:
  302. breakthrough upon breakthrough has let us amass our capacities to calculate whatever is within the realms of our programming.
  303. This calculative ability has been the poster child of computer science, but with the rise of artificial intelligence, a different side that is an invaluable and necessary counterpart of computation presents itself.
  304. This counterpart is data itself, which particularly for artificial intelligence comprises much of where the intelligence comes from.
  305. Many are well familiar with the history of computing and the trajectory it has taken, but it is argued in this talk that this counterpart and its history in particular has been left out.
  306. Thus the talk concerns itself with providing this missing link by providing a counter-history, one that is not computing-centric, but data-centric.
  307. \subsection{Breakthroughs in Computing are Preceded By a Lot of Data}
  308. The era to which this counter-history is traced back to interestingly begins even before the first computers were made, to an era where computation was avoided by creating pre-computed tables used for calculations that are not easily resolved by hand.
  309. There were different tables used for different purposes, but each served to provide valuable information that can be used in specific contexts.
  310. In this case, the data that was generated to be used for the tables is equivalent to the human labor that was necessary to generate it.
  311. As such, the advance in the production of data has led to an advance in computation, for these tables reduced the need for computation and thus furthered what can feasibly be computed.
  312. It is argued within the talk that most breakthroughs in computation were accompanied by a lot of data.
  313. Artificial intelligence in particular has garnered much attention and there have been multiple breakthroughs that left their impressions upon the world.
  314. One such breakthrough was in the area of chess, where an artificial intelligence system ended up victorious over venerable chess player Garry Kasparov.
  315. Another impression was left upon the world by IBM Watson.
  316. More recently and perhaps most significantly, the entire world has seemingly turned its attention to ChatGPT.
  317. Each of these operates in a different space, but the proficiency these systems show to solve the task they are geared towards is impressive.
  318. What enabled this success?
  319. By now it should already be clear, this success was enabled by a lot of data.
  320. The chess result has been the culmination of very large datasets of chess games, without which there would presumably have been no victory for artificial intelligence.
  321. The same goes for IBM Watson, which was the result of a curation of Wikipedia tables, almost 10 million such tables constituted the knowledge base of the system.
  322. It is also no different for ChatGPT, which was trained by a staggering amount of natural language.
  323. It is clear that artificial intelligence is not just a computation, but a combination of a computation and a pre-computation.
  324. This pre-computation consists of its basic building block, data.
  325. \subsection{Machines, Human Labor and the Nature of Computation}
  326. The talk proceeds to ponder the nature of computation by going back to the original conception of a machine.
  327. Back when they were conceived, they were regarded as tricks, wonders or illusions.
  328. One example would be the mechanical turk, a machine that supposedly played chess automatically.
  329. It was in fact a mechanical illusion, because the machine was human-operated without the operator being visible.
  330. But the meaning of machines changed when they were researched for other useful mechanical applications.
  331. These new machines were meant to serve as an automatic replacement of human labor.
  332. Their semi-autonomous deterministic operation made them entities based on calculation.
  333. An interesting trend emerged which has set the tone, one that echoes even today.
  334. Even though the machines were intended to be largely autonomous, the need of their operation by humans could in many instances not be eliminated.
  335. This trend was to consider those operators as unskilled and unsophisticated workers.
  336. Understandably the operation of these machines was designed and refined to be very simple, which created a need for simple human labor.
  337. This human labor was the kind of simple computation necessary in order for the machine to fulfill its purpose.
  338. Often times, people (often female and young) less respected for their skills were employed for very little wages to do this ``unskilled'' and ``unsophisticated'' work.
  339. Another illustrative example of how this trend emerged is provided within the talk by mentioning Gaspard de Prony, who in 1791 was assigned to produce logarithmic and trigonometric tables.
  340. His idea was to mechanize these tedious calculations by using a scheme he has devised, a kind of computation factory.
  341. This scheme was a way to divide labor hierarchically:
  342. in a hierarchy resembling a tree, orders are given from the top and results are propagated from the bottom up.
  343. At the top of the hierarchy there was usually a scientist, a well-respected, sophisticated position to be in, who directed planners, who directed the workers sitting at the lowest level.
  344. One can naturally see by way of looking at this hierarchy how such a prejudiced view might have come about.
  345. \subsection{The Rise of Piece-Work}
  346. In fact, one can see the same kind of hierarchy centuries later still, by looking at the concerted British effort to decrypt messages by Nazi Germany.
  347. Many people are familiar with Alan Turing and his occupation during World War 2, where he famously computerized this task of acquiring intelligence over the enemy.
  348. The machine of our codebreakers was named the Colossus computer, but its actual purpose was not true decryption, but rather to pre-process encrypted messages into a different form that would then be decoded by human labor.
  349. Who was tasked with this labor?
  350. It was delegated to ``the girls''.
  351. It is no different today, in fact there is a flourishing industry of piece-work that has formed over the years.
  352. This piece-work is being offered at a cheap price particularly in developing countries, where poorer people have taken up piece-work as an alternative source of income.
  353. Such piece-work consists of relatively self-contained, not too complex tasks such as the labeling of data, which has become especially relevant today.
  354. The need for cleanly labeled data has become paramount for many kinds of artificial intelligence systems, whether it be an autonomous driving system, a face recognition system or any other such system.
  355. But there is also a need for the creation, aggregation and grouping of training data.
  356. In general, when there is a kind of bookkeeping to be done that cannot be entirely (reliably) automated, we fall back to human labor which is subsequently delegated.
  357. Besides the labeling of data, there is also the area of content moderation, which the very large online platforms of today cannot do without.
  358. The full automation of content moderation seems to have been controversial and not effective, so instead we fall back to human labor again.
  359. Because content moderation requires a human view, it seems as if this human labor is necessary whenever the computation should be guided in a human direction.
  360. The same can be argued for the labeling of data, where the intention is to imbue the artificial intelligence system with human values.
  361. In the talk, Gaspard de Prony's tree-like hierarchy for the division of labor is revisited and amended as is appropriate after the introduction of general purpose computers.
  362. The machines were inserted as a new layer, but where does this layer sit?
  363. When before there was a scientist, directing the planners, directing the workers, there is now still a scientist, directing the planners, directing general purpose computers, directing piece-workers.
  364. This view is held because the piece-workers are really doing a computation that is necessary for the general purpose computer but which it cannot do itself.
  365. Where is this piece-work orchestrated?
  366. The most prominent example mentioned in the talk is Amazon Mechanical Turk (MTurk), which is just one (large) crowdsourcing website for the (cheap) remote hire of on-demand tasks.
  367. Will we ever be able to do without such platforms?
  368. Perhaps as a society we should be more cognizant of such platforms, their impacts and whether we truly want them.
  369. A sign that we may not want to perpetuate this piece-work industry is the reminiscence of colonialist times, as it is argued in the talk.
  370. The countries that provide the most labor for any other particular Western country are those which have historically had colonialist relations.
  371. This may be due to economic dependencies or just a kind of inertia by history.
  372. Another interesting question that is posed is whether the work is considered unskilled because of low pay, or the other way around.
  373. But this is a complex area left to the social sciences.
  374. \subsection{Will All Human Labor Eventually Be Automated?}
  375. An interesting question that is posed by the talk is whether we would ever be able to do without such platforms.
  376. Ultimately, the question boils down to whether this bedrock human labor that always seems to become necessary to operate our machines is automatable (or automatically computable) or not.
  377. Historically, there has been an interesting debate between Ludwig Wittgenstein and Alan Turing on this question.
  378. According to the contents of the talk, Alan Turing has been a proponent of the view that it is possible, while Ludwig Wittgenstein took the opposing view.
  379. We will just have to see.
  380. \newpage
  381. \section{Conclusion}
  382. We have seen multiple very interesting talks in a lot of detail.
  383. All of these talks pertain to topics that our society struggles with, whether it be to design systems that fulfill our wishes and cause no harm, how to regard computation or even just how to find the right place for the gadgets we receive after opening yet another Pandora's box.
  384. Even though at first glance it might not be the case, each of these talks is arguably connected, not just by a common theme of computers and computation, but also through our intentions as a society.
  385. In the end, it is important to keep asking these questions as well as try to answer them by creating precise and formal formulations of our problems, so that we can design better and better systems and a better society.
  386. \end{document}