Sciweavers

528 search results - page 35 / 106
» What Can We Learn Privately
Sort
View
GECCO
2003
Springer
114views Optimization» more  GECCO 2003»
14 years 27 days ago
Learning the Ideal Evaluation Function
Abstract. Designing an adequate fitness function requiressubstantial knowledge of a problem and of features that indicate progress towards a solution. Coevolution takes the human ...
Edwin D. de Jong, Jordan B. Pollack
AIED
2007
Springer
14 years 1 months ago
Applying Learning Factors Analysis to Build Stereotypic Student Models
This paper demonstrates how stereotypic student groups can be created to enhance cognitive models in computer tutors. Computer tutors use cognitive models to track what skills stud...
Anna N. Rafferty, Michael Yudelson
ICMCS
2007
IEEE
228views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Dynamic Privacy in a Smart House Environment
— A smart house can be regarded as a surveillance environment in which the person being observed carries out activities that range from intimate to more public. What can be obser...
Simon Moncrieff, Svetha Venkatesh, Geoff A. W. Wes...
INFOCOM
2009
IEEE
14 years 2 months ago
Building Covert Channels over the Packet Reordering Phenomenon
Abstract—New modes of communication have shown themselves to be needed for more secure and private types of data. Steganography or data-hiding through covert channels can be high...
Adel El-Atawy, Ehab Al-Shaer
CRYPTO
2008
Springer
186views Cryptology» more  CRYPTO 2008»
13 years 9 months ago
Communication Complexity in Algebraic Two-Party Protocols
In cryptography, there has been tremendous success in building various two-party protocols with small communication complexity out of homomorphic semantically-secure encryption sc...
Rafail Ostrovsky, William E. Skeith III