Filters








10 Hits in 6.3 sec

Computational Science, Demystified … the Future, Revealed … and CiSE, 2013

George K. Thiruvathukal
2013 Computing in science & engineering (Print)  
F r o m T h e E d i t o r s 4 Copublished by the IEEE CS and the AIP 1521-9615/13/$31.00  ...  Computational SCienCe, DemyStifieDthe future, revealeDanD CiSE, 2013 By George K.  ...  F r o m T h e E d i t o r s o ne of the things i truly had hoped to do as the incoming and now editor in chief of CiSE is deepen our connections to "computational science and engineering." we all know  ... 
doi:10.1109/mcse.2013.22 fatcat:ags45yu2qnaa3l5pwec4fg4hhq

SIENNA D4.3: Survey of REC approaches and codes for Artificial Intelligence & Robotics

Lisa Tambornino, Dirk Lanzerath, Rowena Rodrigues, David Wright
2019 Zenodo  
This report describes the outcome of task 4.3, Current coverage of ethical guidelines by professional organisations, ethics advisory groups, and research ethics committees for Artificial Intelligence and  ...  Furthermore, representatives of research ethics committees have been asked for the following information in an online survey: − to what extent are they aware of AI&R developments and ethical issues associated  ...  on ethical issues in computer science.  ... 
doi:10.5281/zenodo.4067990 fatcat:6wj5we6gnfgplbjjs6xopcppri

On the analysis of non-coding roles in open source development

Javier Luis Cánovas Izquierdo, Jordi Cabot
2021 Empirical Software Engineering  
to facilitate the migration and collaboration among the different roles.  ...  This paper aims to investigate whether this is actually the case by analyzing the frequency and diversity of non-coding contributions in OSS development.  ...  Javier Luis Cánovas Izquierdo received the B.Sc. and Ph.D. degrees in computer science from the University of Murcia.  ... 
doi:10.1007/s10664-021-10061-x fatcat:m2h4jobhtfgqxd4dfrmnqg6rxu

Label-Only Membership Inference Attacks [article]

Christopher A. Choquette-Choo, Florian Tramer, Nicholas Carlini, Nicolas Papernot
2021 arXiv   pre-print
Membership inference attacks are one of the simplest forms of privacy leakage for machine learning models: given a data point and model, determine whether the point was used to train the model.  ...  We find that training models with differential privacy and (strong) L2 regularization are the only known defense strategies that successfully prevents all attacks.  ...  Although we are focused on the 2013).  ... 
arXiv:2007.14321v3 fatcat:yrggxjox3faj7axb6hs6aalvdy

Volume 64.2 (2019)

2019 American Studies  
From the assumption of a "tropical south" (and the interpretation of Columbus as either a hero or a destroyer) Latin America emerged in the northern imagination as both "inferior and desirable " (55,  ...  their independence as nations, their features were retroactively projected onto the landscapes and people encountered by Columbus.  ...  But the song's initial and embracing "Hallelujah" of science is revealed to be unwarranted as it bears the risk of radical individualism: "[e]very man, every man for himself " (Anderson).  ... 
doi:10.33675/amst/2019/2/1 fatcat:rrsrylupy5bcdc7szab7it4ax4

Handbook on peace education

Dieter Luense, Mizzi Walker, Renate Grasse, Tina Ottman, Ruth Hayhoe
2013 Journal of Peace Education  
And there are issues related to the power relationship and the use and/or abuse of power.  ...  All peaceless situations where sovereign states compete for more powerwars, arms, races, etc.all revolutions and other sub-national conflicts where the power holders and the power aspirants compete belong  ...  du Nouy (1949),Teilhard de Chardin (1959) and others, does creep into future-oriented, social science (see John McHale, The Future of the Future, 19691, it seems useful to try incorporating a spiritual-intuitive  ... 
doi:10.1080/17400201.2013.780862 fatcat:2zupnfkycraglobxukgpi67mmi

Forced to live side by side. Power, privacy and conflict in the Tor network

Daniele Pizio
2021
developers interpret the concept of privacy and incorporate it into the platform, c) explores the politics and practices adopted by the Tor community to ensure the sustainability and the usability of  ...  , as well as the US State Department's digital diplomacy and the efforts made by Washington and Silicon Valley to secure the US digital infrastructures.The thesis analyses the material configuration of  ...  keywords=CFDA%2047.070&s ort=-relevance&index=&is_active=true&page=1 8 National Science Foundation. "Computer and Information Science and Engineering (CISE) Active Awards".  ... 
doi:10.25392/leicester.data.15155910.v1 fatcat:f66tdsjfjrezppt56k6flrtksi

Demonstration of chip-to-chip quantum teleportation

Y. Ding, D. Llewellyn, I. Faruque, S. Paesani, D. Bacco, R. Santagati, Y. Qian, Y. Li, Y. Xiao, M. Huber, M. Malik, G. Sinclair (+8 others)
2019 Conference on Lasers and Electro-Optics   unpublished
., USA Natalia Litchinitser, Univ. at Electrical and Computer Engineering, Univ. of Toronto, Canada; 2 School of Physics, Univ. of the Witwatersrand, South Africa.  ...  We engineer quasi 3D structured light fields in which the orbital angular momentum changes locally in both sign and magnitude along the beam's axis and explain how such transitions occur without violating  ...  Since 2013 she is member of the Leopoldina, National Academy of Science, and since 2018 OSA Fellow.  ... 
doi:10.1364/cleo_at.2019.jth5c.4 fatcat:ytixbvycv5e7tlcr5m74negtlu

PhilanthropyRoundtable.org (202) 822-8333 A Wise Giver's Guide to Strengthening a National Asset Catholic School Renaissance Catholic School Renaissance A Wise Giver's Guide to Strengthening a National Asset

Andy Smarick, Kelly Robson
unpublished
and local school-choice programs that leave Catholic schools in their best position for future success in more than 50 years.  ...  It is now possible to see the outlines of a signii cant Catholic-school renaissance. And it is donors who are leading the way.  ...  Dolan in 2013.  ... 
fatcat:u7z2bjzu2beklmgoerl2ptmm3y

Rational Inattention and a Causal Account of Program Security

Matvey Soloviev
2021
and interact with the real world, and computer science.  ...  In Proc 2013 ACM SIGSAC Conference on Computer & Communications Security, 2013. [21] A. Ibrahim, S. Kacianka, A. Pretschner, C. Hartsell, and G. Karsai.  ... 
doi:10.7298/75f2-kv86 fatcat:phmvho3smrcx5dxidlgmrmqnqy