Sciweavers

9785 search results - page 1929 / 1957
» Open Agent Systems
Sort
View
ICALP
2011
Springer
12 years 11 months ago
New Algorithms for Learning in Presence of Errors
We give new algorithms for a variety of randomly-generated instances of computational problems using a linearization technique that reduces to solving a system of linear equations...
Sanjeev Arora, Rong Ge
NAR
2011
203views Computer Vision» more  NAR 2011»
12 years 10 months ago
Laminin database: a tool to retrieve high-throughput and curated data for studies on laminins
The Laminin(LM)-database, hosted at http://www .lm.lncc.br, is the first database focusing a noncollagenous extracellular matrix protein family, the LMs. Part of the knowledge ava...
Daiane C. F. Golbert, Leandra Linhares-Lacerda, Lu...
PLDI
2011
ACM
12 years 10 months ago
Caisson: a hardware description language for secure information flow
Information flow is an important security property that must be incorporated from the ground up, including at hardware design time, to provide a formal basis for a system’s roo...
Xun Li 0001, Mohit Tiwari, Jason Oberg, Vineeth Ka...
CICC
2011
106views more  CICC 2011»
12 years 8 months ago
A 45nm CMOS neuromorphic chip with a scalable architecture for learning in networks of spiking neurons
Efforts to achieve the long-standing dream of realizing scalable learning algorithms for networks of spiking neurons in silicon have been hampered by (a) the limited scalability of...
Jae-sun Seo, Bernard Brezzo, Yong Liu, Benjamin D....
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
12 years 7 months ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters
« Prev « First page 1929 / 1957 Last » Next »