Ronald L. Rivest - Böcker
Visar alla böcker från författaren Ronald L. Rivest. Handla med fri frakt och snabb leverans.
3 produkter
3 produkter
Machine Learning: From Theory to Applications
Cooperative Research at Siemens and MIT
Häftad, Engelska, 1993
552 kr
Skickas inom 10-15 vardagar
This volume includes some of the key research papers in thearea of machine learning produced at MIT and Siemens duringa three-year joint research effort. It includes papers onmany different styles of machine learning, organized intothree parts. Part I, theory, includes three papers on theoretical aspectsof machine learning. The first two use the theory ofcomputational complexity to derive some fundamental limitson what isefficiently learnable. The third provides anefficient algorithm for identifying finite automata. Part II, artificial intelligence and symbolic learningmethods, includes five papers giving an overview of thestate of the art and future developments in the field ofmachine learning, a subfield of artificial intelligencedealing with automated knowledge acquisition and knowledgerevision. Part III, neural and collective computation, includes fivepapers sampling the theoretical diversity and trends in thevigorous new research field of neural networks: massivelyparallel symbolic induction, task decomposition throughcompetition, phoneme discrimination, behavior-basedlearning, and self-repairing neural networks.
Advances in Cryptology - ASIACRYPT '91
International Conference on the Theory and Application of Cryptology, Fujiyoshida, Japan, November 11-14, 1991. Proceedings
Häftad, Engelska, 1993
536 kr
Skickas inom 10-15 vardagar
This volume contains the proceedings of ASIACRYPT '91, the first international conference on the theory and application of cryptology to be held in the Asian area. It was held at Fujiyoshida, near Mount Fuji in Japan, in November 1991. The conference was modeled after the very successful CRYTO and EUROCRYPT series of conferences sponsored by the International Association for Cryptologic Research (IACR). The IACR and the Institute of Electronics, Information and Communication Engineers were sponsors for ASIACRYPT '91. The papers from the conference were improved and corrected for inclusion in this volume. The papers are grouped into parts on: differential cryptanalysis and DES-like cryptosystems; hashing and signature schemes; secret sharing, threshold, and authentication codes; block ciphers - foundations and analysis; cryptanalysis and new ciphers; proof systems and interactive protocols; public key ciphers - foundations and analysis. Also included are four invited lectures and impromptu talks from the rump session.
552 kr
Skickas inom 10-15 vardagar
For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to the inclusion of the vote in the final tally. This state-of-the-art survey addresses the challenges faced in establishing a trustworthy electronic voting system. The 24 contributions included in the volume were carefully reviewed and selected from the presentations given during a series of workshops on trustworthy elections held over the last decade. Topics addresses range from foundational and theoretical aspects to algorithms and systems issues, as well as applications in various fields.