Articles tagged Two-column

Blockchain Multiparty Computation Markets at Scale
We explore ways of allowing for the offloading of computationally rigorous tasks from devices with slow logical processors onto a network of anonymous peer-processors. Recent advances in secret sharing schemes, decentralized consensus mechanisms, and multiparty computation (MPC) protocols are combined to create a P2P MPC market. Unlike other computational "clouds", ours is able to generically compute any arithmetic circuit, providing a viable platform for processing on the semantic web. Finally, we show that such a system works in a hostile environment, that it scales well, and that it adapts very easily to any future advances in the complexity theoretic cryptography used. Specifically, we show that the feasibility of our system can only improve, and is historically guaranteed to do so.
Charles Noyes

Laboratory 4 (LEX vs C)
Laboratory where LEX is compared to C
Jorge Adrian Padilla Velasco

Word Embeddings for Clinical Systems
In this paper, we evaluate a baseline word embedding model for a set of clinical notes derived from patient records. For our baseline, we extract features for this embedding using the Word2Vec module from the gensim package. We also build two models, a word2vec skipgram model with negative sampling and a positive point-wise mutual information (PPMI) model by training on the processed clinical notes. Our evaluation shows that both the PPMI and the skipgram models show improved results for medically-related terms when compared with the baseline model. PPMI shows the best result out of all three models.
Hathaitorn Rojnirun, Oluseye Bankole

Modelo Lista com gabarito
Lista de exercício com gabarito
germano

Base de datos NoSQL — Caso de estudio: Postgres como solución NoSQL
Las bases de datos relacionales han sido las herramientas por excelencia para el almacenamiento de la información en los sistemas informáticos. No obstante, las bases de datos NoSQL, como tendencia, han venido ganando espacio especialmente por la escalabilidad y velocidad en sus tiempos de respuestas. PostgreSQL ha incorporado algunas características de tipo NoSQL, como el almacenamiento efímero y el manejo de datos JSON; características que pueden aprovecharse para realizar acciones desde el gestor dándole mayor potencia. El objetivo de este artículo es evaluar, mediante toda la documentación encontrada, el comportamiento de las características NoSQL de PostgreSQL frente a un gestor NoSQL, comparandola con MongoDB, respecto a los tiempos de respuestas y dar a conocer las ventajas de uno con respecto al otro.
Palabras Claves: Características NoSQL en PostgreSQL, MongoDB, PostgreSQL
Jean Carlos

Jayanth Devulapally's Résumé
Created using the Deedy CV/Resume
XeLaTeX Template
Version 1.0 (5/5/2014)
jayanth devulapally

RADMAP: A Computational Proposal for Electromagnetic Field Pollution Maps in Colombia
In this paper we propose a first version for a computational proposal for Electromagnetic Field (EMF) Pollution for the construction of calculated maps, as a visualization tool for estimating the levels of human exposure to potentially harmful levels of electromagnetic radiation. The computational model includes the necessary mathematics for estimating levels of exposure in any two dimension space point in a map, given a massive set of emitters and its relevant parameters, but also contains adjust considerations using a data set of field measures that would allow the model to adapt to real environmental conditions. This combination of mathematical model and field data also will allow us to skip the use of interpolations an other statistical methods typically used in maps based exclusively on measures. The proposal also specifies the system main features and development methodology in order to achieve an interactive and flexible tool.
Osberth Cristhian De Castro Cuevas

Protocole IOT : vulnérabilités connues
L’Internet of Things (IoT), ou l’Internet des Objets (IdO), est considéré comme étant un concept moderne, et à même de révolutionner l’avenir proche. L’intérêt est de créer un environnement composé d’appareils et de systèmes intelligents, pouvant communiquer entre eux par le biais de réseaux informatiques. Ces échanges de données vont ainsi permettre de meilleures prises de décision dans un contexte de plus en plus complexe. Cependant, au fur et à mesure que les échanges se multiplient, la question de sécurité se pose, qui doit prendre en compte la faible puissance de calculs des appareils. Ce document a pour objectif de se focaliser sur les protocoles qui régissent ces échanges, et quelles sont les problématiques de sécurité qui en découlent.
Klight

알바예제
1509평가원B30
kimdeoksoo