Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
In this paper, we assess the possibility of a critical knowledge of technology. In the case of facial recognition systems, ‘FRS’, we argue that behaviorism underlies this tech...
People frequently complain that it is too difficult to figure out how to get computers to do what they want. However, with a computer system that actually tries to understand what...
We propose a computationally oriented non-monotonic multi-modal logic arising from the combination of temporalised agency and temporalised normative positions. We argue about the ...
Guido Governatori, Antonino Rotolo, Giovanni Sarto...
We propose a computationally oriented non-monotonic multi-modal logic arising from the combination of agency, intention and obligation. We argue about the defeasible nature of thes...