Sciweavers

1094 search results - page 203 / 219
» On Computing Explanations in Argumentation
Sort
View
TCC
2009
Springer
130views Cryptology» more  TCC 2009»
14 years 10 months ago
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
In the setting of secure computation, a set of parties wish to securely compute some function of their inputs, in the presence of an adversary. The adversary in question may be st...
Yehuda Lindell, Hila Zarosim
KDD
2007
ACM
186views Data Mining» more  KDD 2007»
14 years 10 months ago
An Ad Omnia Approach to Defining and Achieving Private Data Analysis
We briefly survey several privacy compromises in published datasets, some historical and some on paper. An inspection of these suggests that the problem lies with the nature of the...
Cynthia Dwork
IROS
2009
IEEE
185views Robotics» more  IROS 2009»
14 years 4 months ago
Scalable and convergent multi-robot passive and active sensing
— A major barrier preventing the wide employment of mobile networks of robots in tasks such as exploration, mapping, surveillance, and environmental monitoring is the lack of ef...
Elias B. Kosmatopoulos, Lefteris Doitsidis, Konsta...
FOCS
2008
IEEE
14 years 4 months ago
Almost-Natural Proofs
Razborov and Rudich have shown that so-called natural proofs are not useful for separating P from NP unless hard pseudorandom number generators do not exist. This famous result is...
Timothy Y. Chow
WAPCV
2007
Springer
14 years 4 months ago
Embodied Active Vision in Language Learning and Grounding
Abstract. Most cognitive studies of language acquisition in both natural systems and artificial systems have focused on the role of purely linguistic information as the central co...
Chen Yu