We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 1,870 results
  1. Basics

    This chapter introduces the basic concepts of linear algebra, probability theory, and Bayesian networks. Readers familiar with these concepts may...
    Di Jiang, Chen Zhang, Yuanfeng Song in Probabilistic Topic Models
    Chapter 2023
  2. Uncertain Machine Ethical Decisions Using Hypothetical Retrospection

    We propose the use of the hypothetical retrospection argumentation procedure, developed by Sven Ove Hansson to improve existing approaches to machine...
    Conference paper 2023
  3. Statistics

    In this chapter we turn to another indispensable tool in data analysis: statistics. Statistical analysis enables us to gain insight from data, and we...
    Liang Wang, Jianxin Zhao, Richard Mortier in OCaml Scientific Computing
    Chapter 2022
  4. Monte Carlo tree search algorithms for risk-aware and multi-objective reinforcement learning

    In many risk-aware and multi-objective reinforcement learning settings, the utility of the user is derived from a single execution of a policy. In...

    Conor F. Hayes, Mathieu Reymond, ... Patrick Mannion in Autonomous Agents and Multi-Agent Systems
    Article Open access 28 April 2023
  5. Early Protocols

    In this chapter, I introduce early protocols. First, we start with a background on distributed transactions and relevant protocols, such as the...
    Imran Bashir in Blockchain Consensus
    Chapter 2022
  6. Counting Wins and Losses

    Introducing a reward system in your game can make it more interesting and exciting to play. The challenge of leveling up while collecting coins and...
    Chapter 2022
  7. What’s Math Got To Do With It? The Power of Probability Distributions

    A “probability distribution” is one of the most significant concepts ever devised in mathematics. In an uncertain context, we can’t predict the...
    Stylianos Kampakis in Predicting the Unknown
    Chapter 2023
  8. Quantum Machine Learning

    Maria Schuld, Francesco Petruccione in Encyclopedia of Machine Learning and Data Science
    Living reference work entry 2023
  9. Heuristics for Opinion Diffusion via Local Elections

    Most research on influence maximization considers asimple diffusion model, in which binary information is being diffused (i.e., vertices –...
    Rica Gonen, Martin Koutecký, ... Nimrod Talmon in SOFSEM 2023: Theory and Practice of Computer Science
    Conference paper 2023
  10. Some Structural Complexity

    We develop some general results on computational complexity. We show that normal methods which relativize are insufficient to decide many natural...
    Chapter 2024
  11. FTX Collapse: A Ponzi Story

    FTX used to be the third-largest centralized exchange (CEX) in crypto space, managing over $10B in daily trading volume before its downfall. Such a...
    Conference paper 2024
  12. More Drawing

    There are also lots more drawing functions for formatting text, and for drawing sprites. This chapter will introduce you to them.
    Ben Tyers in GameMaker Fundamentals
    Chapter 2023
  13. Probabilities

    Christopher M. Bishop, Hugh Bishop in Deep Learning
    Chapter 2024
  14. Secure Sampling with Sublinear Communication

    Random sampling from specified distributions is an important tool with wide applications for analysis of large-scale data. In this paper we study how...
    Seung Geol Choi, Dana Dachman-Soled, ... Arkady Yerukhimovich in Theory of Cryptography
    Conference paper 2022
  15. A Review of the Non-Fungible Tokens (NFT): Challenges and Opportunities

    Non-Fungible Token (NFT) is an emerging blockchain-based technology. These tokens can represent digital assets, as it has proof of ownership built...
    Mwrwan Abubakar, Nilupulee A. Gunathilake, ... Brian O’Reilly in Big Data Technologies and Applications
    Conference paper 2024
  16. Card-Based Covert Lottery

    Before starting to play a two-player board game such as Chess and Shogi (namely, Japanese chess), we have to determine who makes the first move....
    Yuto Shinoda, Daiki Miyahara, ... Hideaki Sone in Innovative Security Solutions for Information Technology and Communications
    Conference paper 2021
  17. Differential privacy: a privacy cloak for preserving utility in heterogeneous datasets

    Data has become an integral part of day-to-day human life. Users leave behind a trail of digital footprint that includes their personal and...

    Saurabh Gupta, Arun Balaji Buduru, Ponnurangam Kumaraguru in CSI Transactions on ICT
    Article 01 March 2022
  18. In-order sliding-window aggregation in worst-case constant time

    Sliding-window aggregation is a widely-used approach for extracting insights from the most recent portion of a data stream. While aggregations of...

    Kanat Tangwongsan, Martin Hirzel, Scott Schneider in The VLDB Journal
    Article 03 June 2021
  19. The Philosophy of Quantum Computing

    From the philosopher’s perspective, the interest in quantum computation stems primarily from the way that it combines fundamental concepts from two...
    Chapter 2022
  20. Correctness by Construction for Probabilistic Programs

    The “correct by construction” paradigm is an important component of modern Formal Methods, and here we use the probabilistic Guarded-Command Language...
    Conference paper 2020
Did you find what you were looking for? Share feedback.