Sciweavers

1895 search results - page 344 / 379
» Function learning from interpolation
Sort
View
ACNS
2004
Springer
106views Cryptology» more  ACNS 2004»
14 years 3 months ago
On the Security of Cryptosystems with All-or-Nothing Transform
We study the data privacy of cryptosystems with All-or-Nothing transform (AONT). An AONT is an efficient computable transform with two properties: Given all the bits of its output...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
COLT
2004
Springer
14 years 3 months ago
A Statistical Mechanics Analysis of Gram Matrix Eigenvalue Spectra
Abstract. The Gram matrix plays a central role in many kernel methods. Knowledge about the distribution of eigenvalues of the Gram matrix is useful for developing appropriate model...
David C. Hoyle, Magnus Rattray
PPSN
2004
Springer
14 years 3 months ago
A Neuroevolutionary Approach to Emergent Task Decomposition
A scalable architecture to facilitate emergent (self-organized) task decomposition using neural networks and evolutionary algorithms is presented. Various control system architectu...
Jekanthan Thangavelautham, Gabriele M. T. D'Eleute...
SAFECOMP
2004
Springer
14 years 3 months ago
Using Fuzzy Self-Organising Maps for Safety Critical Systems
This paper defines a type of constrained artificial neural network (ANN) that enables analytical certification arguments whilst retaining valuable performance characteristics. ...
Zeshan Kurd, Tim Kelly
HUC
2009
Springer
14 years 2 months ago
A spotlight on security and privacy risks with future household robots: attacks and lessons
Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to elder care robots to entertainment robots. While household r...
Tamara Denning, Cynthia Matuszek, Karl Koscher, Jo...