Sciweavers

267 search results - page 17 / 54
» his 2008
Sort
View
CJ
2006
123views more  CJ 2006»
13 years 10 months ago
Unconditionally Secure Anonymous Encryption and Group Authentication
Anonymous channels or similar techniques that can achieve sender's anonymity play important roles in many applications. However, they will be meaningless if cryptographic prim...
Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, H...
NIPS
2008
13 years 11 months ago
Weighted Sums of Random Kitchen Sinks: Replacing minimization with randomization in learning
Randomized neural networks are immortalized in this well-known AI Koan: In the days when Sussman was a novice, Minsky once came to him as he sat hacking at the PDP-6. "What a...
Ali Rahimi, Benjamin Recht
PST
2008
13 years 11 months ago
The Uncertainty of the Truth
Can we trust without any reliable truth information? Most trust architectures work in a similar way: a trustor makes some observations, rates the trustee, and makes recommendations...
Michel Deriaz
JCP
2008
114views more  JCP 2008»
13 years 10 months ago
Statistical Analysis and Data Analysis of Stock Market by Interacting Particle Models
The statistical analysis of Chinese stock market fluctuations modeled by the interacting particle systems has been done in this paper. The contact model and voter model of the inte...
Jun Wang, Bingli Fan, Tiansong Wang
COGSCI
2002
71views more  COGSCI 2002»
13 years 10 months ago
Spanning seven orders of magnitude: a challenge for cognitive modeling
Much of cognitive psychology focuses on effects measured in tens of milliseconds while significant educational outcomes take tens of hours to achieve. The task of bridging this ga...
John R. Anderson