Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...ordan |first4=Michael |last5=Abbeel |first5=Pieter |date=2015-07-06 |title=Trust region policy optimization |url=https://dl.acm.org/doi/10.5555/3045118.3045 The pseudocode is as follows:<ref>{{Cite web |title=Trust Region Policy Optimization — Spinning Up documentation |url=https://spinnin ...
    17 KB (2,491 words) - 09:02, 10 February 2025
  • ...y of Luxembourg]]'s Interdisciplinary Centre for Security, Reliability and Trust (SnT) at the 2016 Network and Distributed System Security Symposium. The al .../ref> For every factor of <math>\frac{1}{q}</math> fewer entries per list, computational complexity of the algorithm scales proportional to <math>q^{\frac{k}{2}}</m ...
    6 KB (786 words) - 19:36, 15 November 2024
  • [[Category:Computational trust]] ...
    7 KB (1,080 words) - 17:44, 17 April 2023
  • Consider two remote players, connected by a channel, that don't trust each other. The problem of them agreeing on a random bit by exchanging mess ...]]), quantum coin flipping is a protocol used between two users who do not trust each other.<ref name="Heads or tails: Experimental quantum coin flipping cr ...
    24 KB (3,731 words) - 05:26, 7 November 2024
  • * [[Computational science|Scientific Computing]] * [[Algorithm|Algorithms]] and [[Computational complexity theory|Complexity]] ...
    19 KB (2,486 words) - 06:26, 1 March 2025
  • ...e an [[eavesdropper]], only Alice and Bob. Intuitively, it is this lack of trust that makes the problem hard. Unlike in [[quantum key distribution]], Alice ...se of quantum tools, most of these are [[Computational hardness assumption|computational assumptions]]. Such assumptions consists of two parts. First, one assumes t ...
    22 KB (3,003 words) - 01:14, 25 December 2024
  • ...8 |url=https://www.jstor.org/stable/3214117 |publisher=Applied Probability Trust|doi=10.2307/3214117 |jstor=3214117 |s2cid=222275620 }}</ref> ...s or minimums of the objective function) and on the other hand, to improve computational speed, as the number of iterations significantly depends on the selected in ...
    9 KB (1,242 words) - 17:13, 6 February 2025
  • ...thesis |last=Brust |first=J. J. |date=2018 |title=Large-Scale Quasi-Newton Trust-Region Methods: High-Accuracy Solvers, Dense Initializations, and Extension ...4= R.|title=Algorithm 1030: SC-SR1: MATLAB software for limited-memory SR1 trust-region methods|year=2022|journal= ACM Transactions on Mathematical Software ...
    24 KB (3,918 words) - 00:55, 15 January 2025
  • ...orcement Learning | place = University College London | publisher = Gatsby Computational Neuroscience Unit. | series = PhD Thesis | year = 2003 | url = http://www.i ...model-based reinforcement learning.<ref>{{cite arXiv |title=Model-ensemble trust-region policy optimization |author=Kurutach, Thanard and Clavera, Ignasi an ...
    14 KB (2,165 words) - 11:35, 22 February 2025
  • ...ing the internal workings of otherwise black box models, thereby fostering trust and transparency. In image classification tasks, for example, saliency maps ...to [0,255]. The frequencies is expressed in the form of histogram, and the computational time of histogram is {{tmath|O(N)}} time complexity. ...
    16 KB (2,344 words) - 20:32, 19 February 2025
  • ...unction. The main rationale was to diminish [[Timestamping authority|TSA]] trust requirements. ...>{{Cite book| doi = 10.1007/11751595_43| isbn = 978-3-540-34075-1| title = Computational Science and Its Applications - ICCSA 2006| year = 2006| last1 = Blibech| ch ...
    13 KB (1,730 words) - 04:20, 21 August 2023
  • ...t.com/article/new-alliance-promotes-the-blockchain-to-improve-iot-security-trust/|url-status=live}}</ref> and Mobility Open Blockchain Initiative (MOBI),<re ...54525546|hdl-access=free}}</ref> To avoid spam, every transaction requires computational resources based on Proof of Work (PoW) algorithms, to find the answer to a ...
    48 KB (6,045 words) - 01:34, 19 February 2025
  • ...ng the properties of phenomenal existence in physical terms. |journal=PLOS Computational Biology |date=October 2023 |volume=19 |issue=10 |pages=e1011465 |doi=10.137 ...0.1371/journal.pcbi.1004654|pmid = 26796119|volume=12|issue=1|journal=PLOS Computational Biology|page=e1004654|bibcode=2016PLSCB..12E4654O|pmc=4721632 | doi-access= ...
    38 KB (5,126 words) - 09:21, 23 February 2025
  • ...s determine the legitimacy of the leak alarms. Some systems have added the Computational Pipeline Monitoring System (CPM), whose main task is to detect leaks. These === API RP 1130 "Computational Pipeline Monitoring for Liquids" (US) === ...
    29 KB (4,314 words) - 17:40, 11 November 2024
  • ...as finite element analysis (FEA). FEA, as applied in [[engineering]], is a computational tool for performing [[engineering analysis]]. It includes the use of [[mesh ...e Finite Element Method: Birth, Evolution, and Future |journal=Archives of Computational Methods in Engineering |language=en |volume=29 |issue=6 |pages=4431–4453 |d ...
    61 KB (8,997 words) - 15:37, 17 February 2025
  • ...ement learning]] (RL) and [[deep learning]]. RL considers the problem of a computational agent learning to make decisions by trial and error. Deep RL incorporates d <ref name="schulman2015trpo">{{Cite conference|title=Trust Region Policy Optimization |last1=Schulman|first1=John|last2=Levine|first2= ...
    27 KB (3,772 words) - 14:36, 28 June 2024
  • ...=":9">{{Cite journal|last=Krumm|first=John|date=Aug 2009|title=A Survey of Computational Location Privacy |journal=Personal and Ubiquitous Computing|volume=13|issue ...risks<ref name=":42"/><ref name=":6" /> Second, the extent to which users trust the location anonymizers could be essential. If a fully trusted third party ...
    55 KB (7,739 words) - 07:36, 21 December 2024
  • ...ic planning in economic and mathematical terms, highlighting its primarily computational challenges.<ref>{{Cite book|last=Ellman|first=Michael|title=Planning Proble ...ast=Gorlizki |first=Yoram |date=2013 |title=Scandal in Riazan: Networks of Trust and the Social Dynamics of Deception |url=https://muse.jhu.edu/pub/28/artic ...
    37 KB (5,332 words) - 06:32, 20 January 2025
  • ...nal Linguistics: EMNLP 2023 |location=Singapore |publisher=Association for Computational Linguistics |pages=10374–10386 |doi=10.18653/v1/2023.findings-emnlp.696|doi ...| last4=State | first4=Laura | last5=Turini | first5=Franco | title=Can We Trust Fair-AI? | journal=Proceedings of the AAAI Conference on Artificial Intelli ...
    65 KB (9,643 words) - 04:00, 3 February 2025
  • ...[qubit]]s and quantum operations or specialized quantum systems to improve computational speed and data storage done by algorithms in a program.<ref name=":12">{{Ci ...hms based on amplitude encoding is to formulate quantum algorithms whose [[computational complexity|resources]] grow polynomially in the number of qubits <math>n</m ...
    89 KB (12,392 words) - 16:22, 26 February 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)