Yahoo España Búsqueda web

Search results

  1. Hace 20 horas · Cynthia Dwork, Nancy A. Lynch, and Larry J. Stockmeyer. 1988. Consensus in the presence of partial synchrony. Journal of the ACM 35, 2 (1988), 288--323. Google Scholar Digital Library; Neil Giridharan, Florian Suri-Payer, Ittai Abraham, Lorenzo Alvisi, and Natacha Crooks. 2024.

  2. Hace 1 día · Cynthia Dwork, Aaron Roth, et al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends® in Theoretical Computer Science 9, 3--4 (2014), 211--407.

  3. Hace 2 días · Dwork (2006) Cynthia Dwork. 2006. Differential privacy. In International colloquium on automata, languages, and programming, pages 1–12. Springer. Fan et al. (2023) Tao Fan, Yan Kang, Guoqiang Ma, Weijing Chen, Wenbin Wei, Lixin Fan, and Qiang Yang. 2023. Fate-llm: A industrial grade federated learning framework for large language models.

  4. Hace 20 horas · La professoressa di Harvard Cynthia Dwork ha fatto passi avanti fondamentali nell’equità algoritmica, nella privacy differenziale e nella crittografia. L’elenco delle donne influenti in questo campo è lungo e alcune di loro hanno guadagnato il Premio Turing – il Nobel dell’informatica – per il loro contributo nel settore.

  5. Hace 2 días · In the context of real-world applications, leveraging large language models (LLMs) for domain-specific tasks often faces two major challenges: domain-specific knowledge privacy and constrained ...

  6. dblp.org › db › confdblp: PODC

    Hace 3 días · Cynthia Dwork: Proceedings of the Ninth Annual ACM Symposium on Principles of Distributed Computing, Quebec City, Quebec, Canada, August 22-24, 1990. ACM 1990, ISBN 0-89791-404-X

  7. en.wikipedia.org › wiki › BitcoinBitcoin - Wikipedia

    Hace 1 día · Bitcoin (abbreviation: BTC; sign: ₿) is the first decentralized cryptocurrency. Nodes in the peer-to-peer bitcoin network verify transactions through cryptography and record them in a public distributed ledger, called a blockchain, without central oversight. Consensus between nodes is achieved using a computationally intensive process based on proof of work, called mining, that guarantees ...