Search
Search Results
-
Basics
This chapter introduces the basic concepts of linear algebra, probability theory, and Bayesian networks. Readers familiar with these concepts may... -
Uncertain Machine Ethical Decisions Using Hypothetical Retrospection
We propose the use of the hypothetical retrospection argumentation procedure, developed by Sven Ove Hansson to improve existing approaches to machine... -
Statistics
In this chapter we turn to another indispensable tool in data analysis: statistics. Statistical analysis enables us to gain insight from data, and we... -
Monte Carlo tree search algorithms for risk-aware and multi-objective reinforcement learning
In many risk-aware and multi-objective reinforcement learning settings, the utility of the user is derived from a single execution of a policy. In...
-
Early Protocols
In this chapter, I introduce early protocols. First, we start with a background on distributed transactions and relevant protocols, such as the... -
Counting Wins and Losses
Introducing a reward system in your game can make it more interesting and exciting to play. The challenge of leveling up while collecting coins and... -
What’s Math Got To Do With It? The Power of Probability Distributions
A “probability distribution” is one of the most significant concepts ever devised in mathematics. In an uncertain context, we can’t predict the... -
-
Heuristics for Opinion Diffusion via Local Elections
Most research on influence maximization considers asimple diffusion model, in which binary information is being diffused (i.e., vertices –... -
Some Structural Complexity
We develop some general results on computational complexity. We show that normal methods which relativize are insufficient to decide many natural... -
FTX Collapse: A Ponzi Story
FTX used to be the third-largest centralized exchange (CEX) in crypto space, managing over $10B in daily trading volume before its downfall. Such a... -
More Drawing
There are also lots more drawing functions for formatting text, and for drawing sprites. This chapter will introduce you to them. -
-
Secure Sampling with Sublinear Communication
Random sampling from specified distributions is an important tool with wide applications for analysis of large-scale data. In this paper we study how... -
A Review of the Non-Fungible Tokens (NFT): Challenges and Opportunities
Non-Fungible Token (NFT) is an emerging blockchain-based technology. These tokens can represent digital assets, as it has proof of ownership built... -
Card-Based Covert Lottery
Before starting to play a two-player board game such as Chess and Shogi (namely, Japanese chess), we have to determine who makes the first move.... -
Differential privacy: a privacy cloak for preserving utility in heterogeneous datasets
Data has become an integral part of day-to-day human life. Users leave behind a trail of digital footprint that includes their personal and...
-
In-order sliding-window aggregation in worst-case constant time
Sliding-window aggregation is a widely-used approach for extracting insights from the most recent portion of a data stream. While aggregations of...
-
The Philosophy of Quantum Computing
From the philosopher’s perspective, the interest in quantum computation stems primarily from the way that it combines fundamental concepts from two... -
Correctness by Construction for Probabilistic Programs
The “correct by construction” paradigm is an important component of modern Formal Methods, and here we use the probabilistic Guarded-Command Language...