Sciweavers

5684 search results - page 325 / 1137
» Computing with active dendrites
Sort
View
EDBT
2000
ACM
15 years 8 months ago
A Data Model for Effectively Computable Functions
the research activities. This abstract is to introduce the approach of a data model - EP data model. Its data structure is able to store as a finite set of nodes arbitrary effectiv...
Kevin H. Xu
ACE
2004
182views Education» more  ACE 2004»
15 years 6 months ago
Facilitating Successful Online Computing Courses While Minimising Extra Tutor Workload
A key problem in facilitating a successful online course is the highly time -consuming nature of the administrative and pedagogical tasks involved. It is also difficult to achieve...
Stuart Young, Mae McSporran
157
Voted
IJCAI
1993
15 years 6 months ago
Action Representation and Purpose: Re-evaluating the Foundations of Computational Vision
The traditional goal of computer vision, to reconstruct, or recover properties of, the scene has recently been challenged by advocates of a new purposive approach in which the vis...
Michael J. Black, Yiannis Aloimonos, Christopher M...
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 5 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
IACR
2011
127views more  IACR 2011»
14 years 4 months ago
Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority
Secure multiparty computation (MPC) allows a set of n players to compute any public function, given as an arithmetic circuit, on private inputs, so that privacy of the inputs as we...
Eli Ben-Sasson, Serge Fehr, Rafail Ostrovsky