Sciweavers

2913 search results - page 488 / 583
» How Much to Copy
Sort
View
EUROCRYPT
2008
Springer
13 years 11 months ago
Almost-Everywhere Secure Computation
Secure multi-party computation (MPC) is a central problem in cryptography. Unfortunately, it is well known that MPC is possible if and only if the underlying communication network...
Juan A. Garay, Rafail Ostrovsky
COMMA
2008
13 years 10 months ago
Modelling Judicial Context in Argumentation Frameworks
Abstract. Much work using argumnentation frameworks treats arguments as enbstract, related by a uniform attack relation which always succeeds unless the attacker can itself be defe...
Adam Zachary Wyner, Trevor J. M. Bench-Capon
DGO
2007
124views Education» more  DGO 2007»
13 years 10 months ago
Assessing capability for justice information sharing
Enhanced information sharing among criminal justice agencies is a critical concern and a goal of much IT investment. Understanding agencies’ capabilities to achieve this goal is...
Anthony M. Cresswell, Theresa A. Pardo, Shahidul H...
NIPS
2007
13 years 10 months ago
Learning and using relational theories
Much of human knowledge is organized into sophisticated systems that are often called intuitive theories. We propose that intuitive theories are mentally represented in a logical ...
Charles Kemp, Noah Goodman, Joshua B. Tenenbaum
NIPS
2007
13 years 10 months ago
A neural network implementing optimal state estimation based on dynamic spike train decoding
It is becoming increasingly evident that organisms acting in uncertain dynamical environments often employ exact or approximate Bayesian statistical calculations in order to conti...
Omer Bobrowski, Ron Meir, Shy Shoham, Yonina C. El...