-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
As with any MS project, one must start with the use cases. If you
don't start with your use cases, then you'll end up wandering around,
mixing things up and forgetting what you're doing. As they say if you
don't know where you're going, you'll
Looking all the way back to Mohammed's original question which was
nicely concise:
/Can we model/simulate how in a democracy that is inherently open (as/
/stated in the constitution: for the people, by the people etc..) there/
/emerges decision masking structures emerge that
are not necessarily linked.
Vlad,
*From:*friam-boun...@redfish.com [mailto:friam-boun...@redfish.com]
*On Behalf Of *Steve Smith
*Sent:* May-09-11 2:17 PM
*To:* The Friday Morning Applied Complexity Coffee Group
*Subject:* Re: [FRIAM] Modeling obfuscation (was - Terrorosity and
it's Fruits
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Steve Smith wrote circa 11-05-09 12:16 PM:
I challenge us (at Glen's urging) to come up with /Use Case Scenarios/
I _hate_ that word: scenarios. It's jargonal and off-putting to me,
which perhaps relates to the accusation that I have more formal
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
glen e. p. ropella wrote circa 11-05-09 02:12 PM:
Similarly, we should come up with a suite of measures for openness.
Obama's execution of bin Laden, interviews on 60 minutes, and keeping
the pictures secret is a good example. We should pick
Eric,
Thats an interesting way of looking at it. As complex game of information
hiding.
I was thinking along the line of of having a schema for rule creation. The
schema here is like a constitution, and players can generate new rules based
on that schema to promote their self interest. For
Eric, Mohammed, et al.:
Alex Poddiakov, in Moscow, has done work that seems to me like it
*might* be related to this question; for instance, on what he calls
Trojan horse learning. I refer you to his website, where various
manuscripts (some in Russian, some in Russglish) are available and
From: friam-boun...@redfish.com [mailto:friam-boun...@redfish.com] On Behalf
Of Mohammed El-Beltagy
Sent: May-08-11 5:56 AM
To: The Friday Morning Applied Complexity Coffee Group
Subject: Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's
Fruits)
Eric,
Thats
: friam-boun...@redfish.com [mailto:friam-boun...@redfish.com] On Behalf Of
ERIC P. CHARLES
Sent: May-08-11 4:00 PM
To: Mohammed El-Beltagy
Cc: The Friday Morning Applied Complexity Coffee Group
Subject: Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's Fruits)
I think I know what
On Sun, May 08, 2011 at 06:17:04PM -0500, Vladimyr Burachynsky wrote:
It is an old joke , but the more people in the room the dumber it gets.
Having grown up on a sheep farm, I can say this definitely applies to
sheep. An individual sheep is quite difficult to control, and I have a
lot of
Sent: May-08-11 7:26 PM
To: The Friday Morning Applied Complexity Coffee Group
Subject: Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's
Fruits)
On Sun, May 08, 2011 at 06:17:04PM -0500, Vladimyr Burachynsky wrote:
It is an old joke , but the more people in the room the dumber
...@redfish.com] On Behalf Of Vladimyr Burachynsky
Sent: Monday, 9 May 2011 9:17 AM
To: 'The Friday Morning Applied Complexity Coffee Group'
Subject: Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's Fruits)
Eric and Mohammed,
I don’t think anyone can
I can't see that this posted, sorry if it is a duplicate
Mohammed,
Being totally unqualified to help you with this problem... it
seems interesting to me because most models I know of this sort (social systems
models) are about information acquisition and deployment. That is, the modeled
13 matches
Mail list logo