Sciweavers

429 search results - page 27 / 86
» Noisy Turing Machines
Sort
View

Publication
152views
15 years 27 days ago
Expected loss analysis of thresholded authentication protocols in noisy conditions
A number of authentication protocols have been proposed recently, where at least some part of the authentication is performed during a phase, lasting $n$ rounds, with no error corr...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
CORR
2010
Springer
88views Education» more  CORR 2010»
14 years 7 months ago
Infinite Time Cellular Automata: A Real Computation Model
We define a new transfinite time model of computation, infinite time cellular automata. The model is shown to be as powerful than infinite time Turing machines, both on finite and ...
Fabien Givors, Grégory Lafitte, Nicolas Oll...
AI
2011
Springer
14 years 1 months ago
Subspace Mapping of Noisy Text Documents
Abstract. Subspace mapping methods aim at projecting high-dimensional data into a subspace where a specific objective function is optimized. Such dimension reduction allows the re...
Axel J. Soto, Marc Strickert, Gustavo E. Vazquez, ...
ALT
1998
Springer
15 years 1 months ago
Synthesizing Learners Tolerating Computable Noisy Data
An index for an r.e. class of languages (by definition) generates a sequence of grammars defining the class. An index for an indexed family of recursive languages (by definition) ...
John Case, Sanjay Jain
NC
2006
130views Neural Networks» more  NC 2006»
14 years 9 months ago
Dynamic self-assembly in living systems as computation
Biochemical reactions taking place in living systems that map different inputs to specific outputs are intuitively recognized as performing information processing. Conventional wis...
Ann M. Bouchard, Gordon C. Osbourn