7 resultados para Numerical Computation
em University of Southampton, United Kingdom
Resumo:
Course notes for the Numerical Methods course (joint MATH3018 and MATH6111). Originally by Giampaolo d'Alessandro, modified by Ian Hawke. These contain only minimal examples and are distributed as is; examples are given in the lectures.
Resumo:
These are the slides used in the joint lectures for MATH3018/MATH6111. They focus on the examples that do not appear in the course notes (see related material). Each lecture comes with example Matlab files that generate the figures used in the lectures.
Resumo:
Crowdsourcing. Social Machines. Human computation. Co-construction Made Real
Resumo:
These worksheets are formative assessment for the Numerical Methods modules MATH3018 and MATH6111 (some material is only covered in MATH3018). Intended to back up both the theory and the coding (in Matlab) side
Resumo:
the introduction of this research paper (especially pg 2-4) and its list of references may be useful to clarify the notions of Bayesian learning applied to trust as explained in the lectures. This is optional reading
Resumo:
Speaker(s): Prof. David Evans Organiser: Dr Tim Chown Time: 22/05/2014 10:45-11:45 Location: B53/4025 Abstract Secure multi-party computation enables two (or more) participants to reliably compute a function that depends on both of their inputs, without revealing those inputs to the other party or needing to trust any other party. It could enable two people who meet at a conference to learn who they known in common without revealing any of their other contacts, or allow a pharmaceutical company to determine the correct dosage of a medication based on a patient’s genome without compromising the privacy of the patient. A general solution to this problem has been known since Yao's pioneering work in the 1980s, but only recently has it become conceivable to use this approach in practice. Over the past few years, my research group has worked towards making secure computation practical for real applications. In this talk, I'll provide a brief introduction to secure computation protocols, describe the techniques we have developed to design scalable and efficient protocols, and share some recent results on improving efficiency and how secure computing applications are developed.