Showing 1 - 4 results of 4 for search '"computability theory"', query time: 0.06s Refine Results
  1. 1

    Tradeoffs in automated financial regulation of decentralized finance due to limits on mutable turing machines by Ben Charoenwong, Robert M. Kirby, Jonathan Reiter

    Published 2025-01-01
    “…Our analysis demonstrates that the fundamental constraints of computation theory have direct implications for financial regulation. …”
    Get full text
    Article
  2. 2

    Calculation Model and Decoupling Coefficient Sensitivity Study of Periphery Hole for Eccentric Decoupled Charge in Highway Tunnels by Yuanqing Wang, Junfeng Liu

    Published 2018-01-01
    “…On the basis of the eccentric decoupled charge form on site and borehole concentric decoupled computational theory, the calculation model of eccentric decoupling charge would be established in the present study. …”
    Get full text
    Article
  3. 3

    The neuroscientific basis of flow: Learning progress guides task engagement and cognitive control by Hairong Lu, Dimitri Van der Linden, Arnold B. Bakker

    Published 2025-03-01
    “…The intrinsic factors driving such engagement and facilitating subjective feelings of flow remain unclear. Building on computational theories of intrinsic motivation, this study examines how learning progress predicts engagement and directs cognitive control. …”
    Get full text
    Article
  4. 4

    Review of privacy computing techniques for multi-party data fusion analysis by LIU Shenglong, HUANG Xiuli, JIANG Yiwen, JIANG Jiawei, TIAN Yuechi, ZHOU Zejun, NIU Ben

    Published 2024-12-01
    “…There were still limitations for anonymity, scrambling, or access control-based traditional privacy desensitization measures, cryptography-based measures, and federated learning-based measures, while privacy computing theory provided a computational and information system framework for full-lifecycle protection, which needed to be combined with different application scenarios to implement full-lifecycle privacy information protection.…”
    Get full text
    Article