48 Matching Annotations
  1. Jan 2023
    1. 个人学习可能取决于他人行为的主张突出了将学习环境视为一个涉及多个互动参与者的系统的重要性
  2. Nov 2022
    1. I also think being able to self-host and export parts of your data to share with others would be great.

      This might be achievable through Holochain application framework. One promising project built on Holochain is Neighbourhoods. Their "Social-Sensemaker Architecture" across "neighbourhoods" is intriguing

  3. Dec 2021
    1. Edge computing is an emerging new trend in cloud data storage that improves how we access and process data online. Businesses dealing with high-frequency transactions like banks, social media companies, and online gaming operators may benefit from edge computing.

      Edge Computing: What It Is and Why It Matters0 https://en.itpedia.nl/2021/12/29/edge-computing-what-it-is-and-why-it-matters/ Edge computing is an emerging new trend in cloud data storage that improves how we access and process data online. Businesses dealing with high-frequency transactions like banks, social media companies, and online gaming operators may benefit from edge computing.

  4. Oct 2021
  5. Sep 2021
  6. Jul 2021
    1. Leah Keating on Twitter: “This work with @DavidJPOS and @gleesonj is now on arXiv (https://t.co/hxjZnCmKcM): ‘A multi-type branching process method for modelling complex contagion on clustered networks’ Here is a quick overview of our paper: (1/6) https://t.co/3jQ2flhk71” / Twitter. (n.d.). Retrieved July 23, 2021, from https://twitter.com/leahakeating/status/1418150117106978816

  7. Mar 2021
  8. Sep 2020
  9. Aug 2020
  10. Jul 2020
  11. Jun 2020
  12. May 2020
  13. Apr 2020
    1. Our approach strikes a balance between privacy, computation overhead, and network latency. While single-party private information retrieval (PIR) and 1-out-of-N oblivious transfer solve some of our requirements, the communication overhead involved for a database of over 4 billion records is presently intractable. Alternatively, k-party PIR and hardware enclaves present efficient alternatives, but they require user trust in schemes that are not widely deployed yet in practice. For k-party PIR, there is a risk of collusion; for enclaves, there is a risk of hardware vulnerabilities and side-channels.
  14. Feb 2020
  15. Sep 2017
  16. Apr 2016
  17. Dec 2015