Sciweavers

2913 search results - page 488 / 583
» How Much to Copy
Sort
View
EUROCRYPT
2008
Springer
15 years 5 months ago
Almost-Everywhere Secure Computation
Secure multi-party computation (MPC) is a central problem in cryptography. Unfortunately, it is well known that MPC is possible if and only if the underlying communication network...
Juan A. Garay, Rafail Ostrovsky
123
Voted
COMMA
2008
15 years 4 months ago
Modelling Judicial Context in Argumentation Frameworks
Abstract. Much work using argumnentation frameworks treats arguments as enbstract, related by a uniform attack relation which always succeeds unless the attacker can itself be defe...
Adam Zachary Wyner, Trevor J. M. Bench-Capon
116
Voted
DGO
2007
124views Education» more  DGO 2007»
15 years 4 months ago
Assessing capability for justice information sharing
Enhanced information sharing among criminal justice agencies is a critical concern and a goal of much IT investment. Understanding agencies’ capabilities to achieve this goal is...
Anthony M. Cresswell, Theresa A. Pardo, Shahidul H...
128
Voted
NIPS
2007
15 years 4 months ago
Learning and using relational theories
Much of human knowledge is organized into sophisticated systems that are often called intuitive theories. We propose that intuitive theories are mentally represented in a logical ...
Charles Kemp, Noah Goodman, Joshua B. Tenenbaum
134
Voted
NIPS
2007
15 years 4 months ago
A neural network implementing optimal state estimation based on dynamic spike train decoding
It is becoming increasingly evident that organisms acting in uncertain dynamical environments often employ exact or approximate Bayesian statistical calculations in order to conti...
Omer Bobrowski, Ron Meir, Shy Shoham, Yonina C. El...