Knowledge-based programs provide an abstract level of description of protocols in which agent actions are related to their states of knowledge. The paper describes how epistemic mo...
We consider minimal-rate sampling schemes for streams of delayed and weighted versions of a known pulse shape. Such signals belong to the class of finite rate of innovation (FRI) m...
Compressed sensing is a recent technique by which signals can be measured at a rate proportional to their information content, combining the important task of compression directly ...
Jeffrey D. Blanchard, Coralia Cartis, Jared Tanner
A polynomial identity testing algorithm must determine whether an input polynomial (given for instance by an arithmetic circuit) is identically equal to 0. In this paper, we show ...
: Visual Cryptography is a secret sharing scheme that uses the human visual system to perform computations. This paper presents a recursive hiding scheme for 3 out of 5 secret shar...
This paper looks at what happens when Communities of Practice are used as a tool for Knowledge Management. The original concept of a Community of Practice appears to have very lit...
Abstract--The question of polynomial learnability of probability distributions, particularly Gaussian mixture distributions, has recently received significant attention in theoreti...