Sciweavers

528 search results - page 29 / 106
» What Can We Learn Privately
Sort
View
SKG
2006
IEEE
14 years 1 months ago
Simulate Grid Resource Trading via Cognitive Agent: A Case Study
In this paper, we explore the market-based grid resource trading system from the social perspective and the collaborative computing perspective. We firstly introduce a novel fram...
Yuhui Qiu, Zhixing Huang
EUROCRYPT
2005
Springer
14 years 1 months ago
Fuzzy Identity-Based Encryption
We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. ...
Amit Sahai, Brent Waters
GECCO
2010
Springer
153views Optimization» more  GECCO 2010»
13 years 11 months ago
Multi-task evolutionary shaping without pre-specified representations
Shaping functions can be used in multi-task reinforcement learning (RL) to incorporate knowledge from previously experienced tasks to speed up learning on a new task. So far, rese...
Matthijs Snel, Shimon Whiteson
IAT
2008
IEEE
14 years 2 months ago
Negotiation in Semi-cooperative Agreement Problems
In this paper we introduce the Semi-Cooperative Extended Incremental Multiagent Agreement Problem with Preferences (SC-EIMAPP). In SC-EIMAPPs, variables arise over time. For each ...
Elisabeth Crawford, Manuela M. Veloso
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
Receipt-Free Universally-Verifiable Voting with Everlasting Privacy
We present the first universally verifiable voting scheme that can be based on a general assumption (existence of a non-interactive commitment scheme). Our scheme is also the first...
Tal Moran, Moni Naor