منابع مشابه
A Seminar Report on BIOMETRIC AUTHENTICATION
Humans recognize each other according to their various characteristics for ages. We recognize others by their face when we meet them and by their voice as we speak to them. Identity verification (authentication) in computer systems has been traditionally based on something that one has (key, magnetic or chip card) or one knows (PIN, password). Things like keys or cards, however, tend to get sto...
متن کاملReport on Dagstuhl Seminar 10232
We analyze the Brandenburger-Keisler paradox in epistemic game theory, which is a ‘two-person version of Russell’s paradox’. Our aim is to understand how it relates to standard one-person arguments, and why the ‘believes-assumes’ modality used in the argument arises. We recast it as a fixpoint result, which can be carried out in any regular category, and show how it can be reduced to a relation...
متن کاملReport from Dagstuhl Seminar
This report describes the program and the results of Dagstuhl Seminar 17092 "Search as Learning", which brought together 26 researchers from diverse research backgrounds. The motivation for the seminar stems from the fact that modern Web search engines are largely engineered and optimized to fulfill lookup tasks instead of complex search tasks. The latter though are an essential component of in...
متن کاملTECHNICAL REPORT 95-1 On Implicit Arguments
A typechecker for a typed -calculus having implicit arguments is presented. The typechecker works in such a way that the uniqueness of implicit arguments is always preserved during reduction. Consequently, when it compares two terms by reduction, it can reduce them without inferring implicit arguments. Before describing the typechecker, we analyze various situations where the uniqueness of impl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of SHM
سال: 1995
ISSN: 1884-1198,0919-4398
DOI: 10.5104/jiep1993.11.2_29