Results 81 to 90 of about 39,214 (275)
Personalized Differential Privacy for Ridge Regression Under Output Perturbation
ABSTRACT The increased application of machine learning (ML) in sensitive domains requires protecting the training data through privacy frameworks, such as differential privacy (DP). Traditional DP enforces a uniform privacy level ε$$ \varepsilon $$, which bounds the maximum privacy loss that each data point in the dataset is allowed to incur.
Krishna Acharya +3 more
wiley +1 more source
A Novel Two‐Stage Flexible Flow Shop Batch Scheduling Model for Grinding Workshops
ABSTRACT The growing need for data storage in data centers has increased the demand for mechanical hard disks due to their low cost and high reliability. Aluminum substrates are the most popular base plates for mechanical hard disks because of their high hardness and low cost.
Jun Xu +4 more
wiley +1 more source
A Contradiction Separation Dynamic Deduction Algorithm Based on Optimized Proof Search
Most of the advanced first-order logic automated theorem proving (ATP) systems adopt binary resolution methods as the core inference mechanism, where only two clauses are involved and a complementary pair of literals are eliminated during each deduction ...
Feng Cao +4 more
doaj +1 more source
OTTER Experiments in a System of Combinatory Logic
This paper describes some experiments involving the automated theorem-proving program OTTER in the system TRC of illative combinatory logic. We show how OTTER can be steered to find a contradiction in an inconsistent variant of TRC, and present some ...
Jech, Thomas
core +1 more source
Theorem Proving Modulo Revised Version [PDF]
Deduction modulo is a way to remove computational arguments from proofs by reasoning modulo a congruence on propositions. Such a technique, issued from automated theorem proving, is of general interest because it permits to separate computations and ...
Dowek, Gilles +2 more
core +1 more source
Simulating Quantum State Transfer Between Distributed Devices Using Noisy Interconnects
Noisy connections challenge future networked quantum computers. This work presents a practical method to address this by simulating an ideal state transfer over noisy interconnects. The approach reduces the high sampling cost of previous methods, an advantage that improves as interconnect quality gets better.
Marvin Bechtold +3 more
wiley +1 more source
ABSTRACT This paper develops a framework for designing output feedback controllers for constrained linear parameter‐varying systems that experience persistent disturbances. We specifically propose an incremental parameter‐varying output feedback control law to address control rate constraints, as well as state and control amplitude constraints.
Jackson G. Ernesto +2 more
wiley +1 more source
Proof Support for Common Logic [PDF]
We present an extension of the Heterogeneous Tool Set HETS that enables proof support for Common Logic. This is achieved via logic translations that relate Common Logic and some of its sublogics to already supported logics and automated theorem proving ...
Christoph Lange +4 more
core
Initial State Privacy of Nonlinear Systems on Riemannian Manifolds
ABSTRACT In this paper, we investigate initial state privacy protection for discrete‐time nonlinear closed systems. By capturing Riemannian geometric structures inherent in such privacy challenges, we refine the concept of differential privacy through the introduction of an initial state adjacency set based on Riemannian distances.
Le Liu, Yu Kawano, Antai Xie, Ming Cao
wiley +1 more source
Exploration of new wildlife surveying methodologies that leverage advances in sensor technology and machine learning has led to tentative research into the application of seismology techniques. This, most commonly, involves the deployment of a footfall trap – a seismic sensor and data logger customised for wildlife footfall.
Benjamin J. Blackledge +4 more
wiley +1 more source

