Sciweavers

1653 search results - page 215 / 331
» Computer science and game theory
Sort
View
SIGMOD
2012
ACM
278views Database» more  SIGMOD 2012»
13 years 1 months ago
Differential privacy in data publication and analysis
Data privacy has been an important research topic in the security, theory and database communities in the last few decades. However, many existing studies have restrictive assumpt...
Yin Yang, Zhenjie Zhang, Gerome Miklau, Marianne W...
STOC
2003
ACM
122views Algorithms» more  STOC 2003»
15 years 11 months ago
Learning juntas
We consider a fundamental problem in computational learning theory: learning an arbitrary Boolean function which depends on an unknown set of k out of n Boolean variables. We give...
Elchanan Mossel, Ryan O'Donnell, Rocco A. Servedio
CSCW
2010
ACM
15 years 5 months ago
The roles that make the domestic work
This paper builds on earlier CSCW studies of domestic technologies, looking at the frequent maintenance required by new security technologies that households are adopting to provi...
Jennifer A. Rode
COMPLEX
2009
Springer
15 years 5 months ago
Differential Forms: A New Tool in Economics
Investors would like to calculate profits in advance, “ex ante”, like the path of a flying ball. But income can only be given “ex post”, after the money is earned. The pro...
Jürgen Mimkes
TLCA
2005
Springer
15 years 4 months ago
Call-by-Name and Call-by-Value as Token-Passing Interaction Nets
Two common misbeliefs about encodings of the λ-calculus in interaction nets (INs) are that they are good only for strategies that are not very well understood (e.g. optimal reduct...
François-Régis Sinot