4,520 research outputs found

    ARPA Whitepaper

    Get PDF
    We propose a secure computation solution for blockchain networks. The correctness of computation is verifiable even under malicious majority condition using information-theoretic Message Authentication Code (MAC), and the privacy is preserved using Secret-Sharing. With state-of-the-art multiparty computation protocol and a layer2 solution, our privacy-preserving computation guarantees data security on blockchain, cryptographically, while reducing the heavy-lifting computation job to a few nodes. This breakthrough has several implications on the future of decentralized networks. First, secure computation can be used to support Private Smart Contracts, where consensus is reached without exposing the information in the public contract. Second, it enables data to be shared and used in trustless network, without disclosing the raw data during data-at-use, where data ownership and data usage is safely separated. Last but not least, computation and verification processes are separated, which can be perceived as computational sharding, this effectively makes the transaction processing speed linear to the number of participating nodes. Our objective is to deploy our secure computation network as an layer2 solution to any blockchain system. Smart Contracts\cite{smartcontract} will be used as bridge to link the blockchain and computation networks. Additionally, they will be used as verifier to ensure that outsourced computation is completed correctly. In order to achieve this, we first develop a general MPC network with advanced features, such as: 1) Secure Computation, 2) Off-chain Computation, 3) Verifiable Computation, and 4)Support dApps' needs like privacy-preserving data exchange

    Filling Knowledge Gaps in a Broad-Coverage Machine Translation System

    Full text link
    Knowledge-based machine translation (KBMT) techniques yield high quality in domains with detailed semantic models, limited vocabulary, and controlled input grammar. Scaling up along these dimensions means acquiring large knowledge resources. It also means behaving reasonably when definitive knowledge is not yet available. This paper describes how we can fill various KBMT knowledge gaps, often using robust statistical techniques. We describe quantitative and qualitative results from JAPANGLOSS, a broad-coverage Japanese-English MT system.Comment: 7 pages, Compressed and uuencoded postscript. To appear: IJCAI-9

    Steering Capital: Optimizing Financial Support for Innovation in Public Education

    Get PDF
    Examines efforts to align capital to education innovation and calls for clarity and agreement on problems, goals, and metrics; an effective R&D system; an evidence-based culture of continuous improvement; and transparent, comparable, and useful data

    Advances in optimal routing through computer networks

    Get PDF
    The optimal routing problem is defined. Progress in solving the problem during the previous decade is reviewed, with special emphasis on technical developments made during the last few years. The relationships between the routing, the throughput, and the switching technology used are discussed and their future trends are reviewed. Economic aspects are also briefly considered. Modern technical approaches for handling the routing problems and, more generally, the flow control problems are reviewed

    Using Data Envelopment Analysis to Evaluate Environmentally Conscious Tourism Management

    Get PDF
    This paper discusses a methodology to assess the performances of tourism management of local governments when economic and environmental aspects are considered as equally relevant. In particular, the focus is on the comparison and efficiency assessment of Italian municipalities located on the costal areas. In order to assess the efficiency status of the considered management units, Data Envelopment Analysis (DEA), a methodology for evaluating the relative efficiency of decision making units, is applied. The efficiency index measure used in DEA analysis accounts for both environmental and economic features correlated to the tourism industry. Further, potential managerial improvements for those areas resulting far from the efficiency frontier can be investigated.Data envelopment analysis, Sustainable tourism

    Research on speech understanding and related areas at SRI

    Get PDF
    Research capabilities on speech understanding, speech recognition, and voice control are described. Research activities and the activities which involve text input rather than speech are discussed

    Supporting and Scaling Change: Lessons From the First Round of the Investing in Innovation (i3) Program

    Get PDF
    Assesses the degree to which the i3 program helped advance innovation in public education. Outlines takeaways, challenges, and recommendations for the Education Department and grantmakers, including optimizing support for different stages of innovation

    Marginalization of end-use technologies in energy innovation for climate protection

    Get PDF
    Mitigating climate change requires directed innovation efforts to develop and deploy energy technologies. Innovation activities are directed towards the outcome of climate protection by public institutions, policies and resources that in turn shape market behaviour. We analyse diverse indicators of activity throughout the innovation system to assess these efforts. We find efficient end-use technologies contribute large potential emission reductions and provide higher social returns on investment than energy-supply technologies. Yet public institutions, policies and financial resources pervasively privilege energy-supply technologies. Directed innovation efforts are strikingly misaligned with the needs of an emissions-constrained world. Significantly greater effort is needed to develop the full potential of efficient end-use technologies

    Collaborative research and development (R&D) for climate technology transfer and uptake in developing countries: Towards a needs driven approach

    Get PDF
    While international cooperation to facilitate the transfer and uptake of climate technologies in developing countries is an ongoing part of climate policy conversations, international collaborative R&D has received comparatively little attention. Collaborative R&D, however, could be a potentially important contributor to facilitating the transfer and uptake of climate technologies in developing countries. But the complexities of international collaborative R&D options and their distributional consequences have been given little attention to date. This paper develops a systematic approach to informing future empirical research and policy analysis on this topic. Building on insights from relevant literature and analysis of empirical data based on a sample of existing international climate technology R&D initiatives, three contributions are made. First, the paper analyses the coverage of existing collaborative R&D efforts in relation to climate technologies, highlighting some important concerns, such as a lack of coverage of lower-income countries or adaptation technologies. Second, it provides a starting point for further systematic research and policy thinking via the development of a taxonomic approach for analysing collaborative designs. Finally, it matches characteristics of R&D collaborations against developing countries’ climate technology needs to provide policymakers with guidance on how to Configure R&D collaborations to meet these needs

    The Beginnings and Prospective Ending of “End-to-End”: An Evolutionary Perspective On the Internet’s Architecture

    Get PDF
    The technology of “the Internet” is not static. Although its “end-to- end” architecture has made this “connection-less” communications system readily “extensible,” and highly encouraging to innovation both in hardware and software applications, there are strong pressures for engineering changes. Some of these are wanted to support novel transport services (e.g. voice telephony, real-time video); others would address drawbacks that appeared with opening of the Internet to public and commercial traffic - e.g., the difficulties of blocking delivery of offensive content, suppressing malicious actions (e.g. “denial of service” attacks), pricing bandwidth usage to reduce congestion. The expected gains from making “improvements” in the core of the network should be weighed against the loss of the social and economic benefits that derive from the “end-to-end” architectural design. Even where technological “fixes” can be placed at the networks’ edges, the option remains to search for alternative, institutional mechanisms of governing conduct in cyberspace.
    corecore