44,797 research outputs found

    EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity

    Full text link
    Electronic information is increasingly often shared among entities without complete mutual trust. To address related security and privacy issues, a few cryptographic techniques have emerged that support privacy-preserving information sharing and retrieval. One interesting open problem in this context involves two parties that need to assess the similarity of their datasets, but are reluctant to disclose their actual content. This paper presents an efficient and provably-secure construction supporting the privacy-preserving evaluation of sample set similarity, where similarity is measured as the Jaccard index. We present two protocols: the first securely computes the (Jaccard) similarity of two sets, and the second approximates it, using MinHash techniques, with lower complexities. We show that our novel protocols are attractive in many compelling applications, including document/multimedia similarity, biometric authentication, and genetic tests. In the process, we demonstrate that our constructions are appreciably more efficient than prior work.Comment: A preliminary version of this paper was published in the Proceedings of the 7th ESORICS International Workshop on Digital Privacy Management (DPM 2012). This is the full version, appearing in the Journal of Computer Securit

    Narrating and negotiating the repressed city: representations of Prague in Jiří Weil's work

    Get PDF
    No abstract available

    Emergent Predication Structure in Hidden State Vectors of Neural Readers

    Full text link
    A significant number of neural architectures for reading comprehension have recently been developed and evaluated on large cloze-style datasets. We present experiments supporting the emergence of "predication structure" in the hidden state vectors of these readers. More specifically, we provide evidence that the hidden state vectors represent atomic formulas Φ[c]\Phi[c] where Φ\Phi is a semantic property (predicate) and cc is a constant symbol entity identifier.Comment: Accepted for Repl4NLP: 2nd Workshop on Representation Learning for NL

    It’s a man’s world : barriers to gender transformation in the South African judiciary : perspectives from women advocates and attorneys

    No full text
    The judiciary in South Africa has made great strides in creating a diverse bench. However challenges continue as regards the appointment of women, some of which are attributable to the nature of the legal profession. Currently, there are 86 women judges in the Superior Courts nationally out of a total of 243. Judges are drawn from the professions of advocates, attorneys, magistracy and academia. Women in these areas of law are confronted with issues that have a bearing on any aspirations of future accession to the judicial bench. The aim of this article is to analyse two specific challenges faced by women advocates and attorneys that were identified over the course of the last three years through legal sector meetings. These are the unequal distribution of work and discriminatory perceptions of women's abilities. I argue that the two factors are directly related to the inadequate representation of women on the bench. My argument will be informed by, amongst others, dialogues from the legal sector meetings, observations of the judicial appointments process and desktop research. I conclude that failing to engage with the identified obstacles will negate any efforts to further increase the number of women judges
    • …
    corecore