Sciweavers

84 search results - page 17 / 17
» Realistic Learning Activity is Not Enough
Sort
View
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
15 years 1 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
AAAI
1997
15 years 29 days ago
Intelligent Agents for the Synthetic Battlefield: A Company of Rotary Wing Aircraft
1 We have constructed a team of intelligent agents that perform the tasks of an attack helicopter company for a synthetic battlefield environment used for running largescale milita...
Randall W. Hill Jr., Johnny Chen, Jonathan Gratch,...
CORR
2010
Springer
110views Education» more  CORR 2010»
14 years 11 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
IMCSIT
2010
14 years 9 months ago
German subordinate clause word order in dialogue-based CALL.
We present a dialogue system for exercising the German subordinate clause word order. The pedagogical methodology we adopt is based on focused tasks: the targeted linguistic struct...
Magdalena Wolska, Sabrina Wilske