Sciweavers

253 search results - page 42 / 51
» Learning with whom to communicate using relational reinforce...
Sort
View
TCC
2007
Springer
170views Cryptology» more  TCC 2007»
15 years 3 months ago
Secure Linear Algebra Using Linearly Recurrent Sequences
In this work we present secure two-party protocols for various core problems in linear algebra. Our main result is a protocol to obliviously decide singularity of an encrypted matr...
Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew...
BC
2006
124views more  BC 2006»
14 years 9 months ago
Motor-maps, navigation and implicit space representation in the hippocampus
Abstract Multiple sensory-motor maps located in the brainstem and the cortex are involved in spatial orientation. Guiding movements of eyes, head, neck and arms they provide an app...
Alexander Kaske, Gösta Winberg, Joakim Cö...
MANSCI
2011
14 years 4 months ago
Generating Ambiguity in the Laboratory
This article develops a method for drawing samples from which it is impossible to infer any quantile or moment of the underlying distribution. The method provides researchers with...
Jack Stecher, Timothy Shields, John Dickhaut
ICMLA
2009
14 years 7 months ago
Feature Extraction and Classification of EEG Signals for Rapid P300 Mind Spelling
The Mind Speller is a Brain-Computer Interface which enables subjects to spell text on a computer screen by detecting P300 Event-Related Potentials in their electroencephalograms....
Adrien Combaz, Nikolay V. Manyakov, Nikolay Chumer...
ICALT
2005
IEEE
15 years 3 months ago
ActiveTutor
In this paper we present an architecture dedicated to an intelligently assisted educational tool which integrates within a unified framework software rational agents both at the m...
Jean Pierre Fournier