-
1
Tradeoffs in automated financial regulation of decentralized finance due to limits on mutable turing machines
Published 2025-01-01“…Our analysis demonstrates that the fundamental constraints of computation theory have direct implications for financial regulation. …”
Get full text
Article -
2
Calculation Model and Decoupling Coefficient Sensitivity Study of Periphery Hole for Eccentric Decoupled Charge in Highway Tunnels
Published 2018-01-01“…On the basis of the eccentric decoupled charge form on site and borehole concentric decoupled computational theory, the calculation model of eccentric decoupling charge would be established in the present study. …”
Get full text
Article -
3
The neuroscientific basis of flow: Learning progress guides task engagement and cognitive control
Published 2025-03-01“…The intrinsic factors driving such engagement and facilitating subjective feelings of flow remain unclear. Building on computational theories of intrinsic motivation, this study examines how learning progress predicts engagement and directs cognitive control. …”
Get full text
Article -
4
Review of privacy computing techniques for multi-party data fusion analysis
Published 2024-12-01“…There were still limitations for anonymity, scrambling, or access control-based traditional privacy desensitization measures, cryptography-based measures, and federated learning-based measures, while privacy computing theory provided a computational and information system framework for full-lifecycle protection, which needed to be combined with different application scenarios to implement full-lifecycle privacy information protection.…”
Get full text
Article