Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's Fruits)

2011-05-09 Thread glen e. p. ropella
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 As with any MS project, one must start with the use cases. If you don't start with your use cases, then you'll end up wandering around, mixing things up and forgetting what you're doing. As they say if you don't know where you're going, you'll

Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's Fruits)

2011-05-09 Thread Steve Smith
Looking all the way back to Mohammed's original question which was nicely concise: /Can we model/simulate how in a democracy that is inherently open (as/ /stated in the constitution: for the people, by the people etc..) there/ /emerges decision masking structures emerge that

Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's Fruits)

2011-05-09 Thread Steve Smith
are not necessarily linked. Vlad, *From:*friam-boun...@redfish.com [mailto:friam-boun...@redfish.com] *On Behalf Of *Steve Smith *Sent:* May-09-11 2:17 PM *To:* The Friday Morning Applied Complexity Coffee Group *Subject:* Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's Fruits

Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's Fruits)

2011-05-09 Thread glen e. p. ropella
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Steve Smith wrote circa 11-05-09 12:16 PM: I challenge us (at Glen's urging) to come up with /Use Case Scenarios/ I _hate_ that word: scenarios. It's jargonal and off-putting to me, which perhaps relates to the accusation that I have more formal

Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's Fruits)

2011-05-09 Thread glen e. p. ropella
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 glen e. p. ropella wrote circa 11-05-09 02:12 PM: Similarly, we should come up with a suite of measures for openness. Obama's execution of bin Laden, interviews on 60 minutes, and keeping the pictures secret is a good example. We should pick

Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's Fruits)

2011-05-08 Thread Mohammed El-Beltagy
Eric, Thats an interesting way of looking at it. As complex game of information hiding. I was thinking along the line of of having a schema for rule creation. The schema here is like a constitution, and players can generate new rules based on that schema to promote their self interest. For

Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's Fruits)

2011-05-08 Thread lrudolph
Eric, Mohammed, et al.: Alex Poddiakov, in Moscow, has done work that seems to me like it *might* be related to this question; for instance, on what he calls Trojan horse learning. I refer you to his website, where various manuscripts (some in Russian, some in Russglish) are available and

Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's Fruits)

2011-05-08 Thread Vladimyr Burachynsky
From: friam-boun...@redfish.com [mailto:friam-boun...@redfish.com] On Behalf Of Mohammed El-Beltagy Sent: May-08-11 5:56 AM To: The Friday Morning Applied Complexity Coffee Group Subject: Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's Fruits) Eric, Thats

Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's Fruits)

2011-05-08 Thread Vladimyr Burachynsky
: friam-boun...@redfish.com [mailto:friam-boun...@redfish.com] On Behalf Of ERIC P. CHARLES Sent: May-08-11 4:00 PM To: Mohammed El-Beltagy Cc: The Friday Morning Applied Complexity Coffee Group Subject: Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's Fruits) I think I know what

Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's Fruits)

2011-05-08 Thread Russell Standish
On Sun, May 08, 2011 at 06:17:04PM -0500, Vladimyr Burachynsky wrote: It is an old joke , but the more people in the room the dumber it gets. Having grown up on a sheep farm, I can say this definitely applies to sheep. An individual sheep is quite difficult to control, and I have a lot of

Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's Fruits)

2011-05-08 Thread ERIC P. CHARLES
Sent: May-08-11 7:26 PM To: The Friday Morning Applied Complexity Coffee Group Subject: Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's Fruits) On Sun, May 08, 2011 at 06:17:04PM -0500, Vladimyr Burachynsky wrote: It is an old joke , but the more people in the room the dumber

Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's Fruits)

2011-05-08 Thread ERIC P. CHARLES
...@redfish.com] On Behalf Of Vladimyr Burachynsky Sent: Monday, 9 May 2011 9:17 AM To: 'The Friday Morning Applied Complexity Coffee Group' Subject: Re: [FRIAM] Modeling obfuscation (was - Terrorosity and it's Fruits) Eric and Mohammed, I don’t think anyone can

[FRIAM] Modeling obfuscation (was - Terrorosity and it's Fruits)

2011-05-07 Thread ERIC P. CHARLES
I can't see that this posted, sorry if it is a duplicate Mohammed, Being totally unqualified to help you with this problem... it seems interesting to me because most models I know of this sort (social systems models) are about information acquisition and deployment. That is, the modeled