The current paper presents research that investigates those factors that affect the recruitment and retention of women and African Americans in the computing sciences. We begin by...
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private i...
Abstract. Trust Management is an approach to construct and interpret the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic cre...
Questions of healthcare inequities have been of continuing concern to health researchers, planners, and policymakers. The answers to such questions can be difficult to interpret, ...
Donald J. Berndt, John W. Fisher, Rama V. Rajendra...
Shaping can be an effective method for improving the learning rate in reinforcement systems. Previously, shaping has been heuristically motivated and implemented. We provide a for...