Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Not sure. But I think this follows logically from the definition of intelligence he is using. Also, see II.2.2 in the paper.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: