Sciweavers

773 search results - page 46 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
131
Voted
APCSAC
2004
IEEE
15 years 5 months ago
Validating Word-Oriented Processors for Bit and Multi-word Operations
We examine secure computing paradigms to identify any new architectural challenges for future general-purpose processors. Some essential security functions can be provided by diffe...
Ruby B. Lee, Xiao Yang, Zhijie Shi
RECOMB
2008
Springer
16 years 2 months ago
A Bayesian Approach to Protein Inference Problem in Shotgun Proteomics
The protein inference problem represents a major challenge in shotgun proteomics. Here we describe a novel Bayesian approach to address this challenge that incorporates the predict...
Yong Fuga Li, Randy J. Arnold, Yixue Li, Predrag R...
AAAI
1998
15 years 3 months ago
A Framework for Reinforcement Learning on Real Robots
Learning on real robots in an real, unaltered environment provides an extremely challenging problem. Many of the simplifying assumptions made in other areas of learning cannot be ...
William D. Smart, Leslie Pack Kaelbling
98
Voted
AI
2007
Springer
15 years 2 months ago
Multi-agent learning for engineers
As suggested by the title of Shoham, Powers, and Grenager’s position paper [34], the ultimate lens through which the multi-agent learning framework should be assessed is “what...
Shie Mannor, Jeff S. Shamma
MOBISYS
2009
ACM
16 years 2 months ago
Wifi-reports: improving wireless network selection with collaboration
Wi-Fi clients can obtain much better performance at some commercial hotspots than at others. Unfortunately, there is currently no way for users to determine which hotspot access p...
Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Da...