Sciweavers

306 search results - page 3 / 62
» How do I model state
Sort
View
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
14 years 4 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
COGSCI
2010
107views more  COGSCI 2010»
13 years 9 months ago
Bootstrapping the Mind: Analogical Processes and Symbol Systems
Human cognition is striking in its brilliance and its adaptability. How do we get that way? How do we move from the nearly helpless state of infants to the cognitive proficiency t...
Dedre Gentner
KR
2010
Springer
14 years 2 months ago
I Don't Want to Think About it Now: Decision Theory with Costly Computation
Computation plays a major role in decision making. Even if an agent is willing to ascribe a probability to all states and a utility to all outcomes, and maximize expected utility,...
Joseph Y. Halpern
CORR
2011
Springer
209views Education» more  CORR 2011»
13 years 1 months ago
I Don't Want to Think About it Now:Decision Theory With Costly Computation
Computation plays a major role in decision making. Even if an agent is willing to ascribe a probability to all states and a utility to all outcomes, and maximize expected utility,...
Joseph Y. Halpern, Rafael Pass
USS
2008
13 years 12 months ago
Securing Provenance
Provenance describes how an object came to be in its present state. Intelligence dossiers, medical records and corporate financial reports capture provenance information. Many of ...
Uri Braun, Avraham Shinnar, Margo I. Seltzer