Sciweavers

1792 search results - page 61 / 359
» What Are We Arguing About
Sort
View
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
12 years 10 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
ISM
2008
IEEE
127views Multimedia» more  ISM 2008»
14 years 4 months ago
To Be or Not to Be a Behaviorist? Facial Recognition Systems and Critical Knowledge
In this paper, we assess the possibility of a critical knowledge of technology. In the case of facial recognition systems, ‘FRS’, we argue that behaviorism underlies this tech...
Mathieu Cornélis, Nathalie Grandjean, Clair...
AAAI
1998
13 years 11 months ago
Cooperating with people: the Intelligent Classroom
People frequently complain that it is too difficult to figure out how to get computers to do what they want. However, with a computer system that actually tries to understand what...
David Franklin
ICAIL
2005
ACM
14 years 3 months ago
Temporalised Normative Positions in Defeasible Logic
We propose a computationally oriented non-monotonic multi-modal logic arising from the combination of temporalised agency and temporalised normative positions. We argue about the ...
Guido Governatori, Antonino Rotolo, Giovanni Sarto...
DEON
2004
Springer
14 years 3 months ago
Defeasible Logic: Agency, Intention and Obligation
We propose a computationally oriented non-monotonic multi-modal logic arising from the combination of agency, intention and obligation. We argue about the defeasible nature of thes...
Guido Governatori, Antonino Rotolo