Chasing Private Information
نویسندگان
چکیده
منابع مشابه
Information Seeking as Chasing Anticipated Prediction Errors
When faced with delayed, uncertain rewards, humans and other animals usually prefer to know the eventual outcomes in advance. This preference for cues providing advance information can lead to seemingly suboptimal choices, where less reward is preferred over more reward. Here, we introduce a reinforcement-learning model of this behavior, the anticipated prediction error (APE) model, based on th...
متن کاملChasing information to search in random environments
We discuss search strategies for finding sources of particles transported in a random environment and detected by the searcher(s). The mixing of the particles in the environment is supposed to be strong, so that strategies based on concentration-gradient ascent are not viable. These dilute conditions are common in natural environments typical of searches performed by insects and birds. The spar...
متن کاملThe Capacity of Private Information Retrieval with Private Side Information
The problem of private information retrieval with private side information (PIR-PSI) is recently introduced by Kadhe et al. In this problem, N replicated databases each store K messages, of which M are known to the user as side-information. The identity of these M messages is unknown to the databases. The user wishes to retrieve, as efficiently as possible, a new desired message without reveali...
متن کاملPrivate Information Retrieval with Partially Known Private Side Information
We consider the problem of private information retrieval (PIR) of a single message out of K messages from N replicated and non-colluding databases where a cache-enabled user of cache-size M messages possesses side information in the form of full messages that are partially known to the databases. In this model, the user and the databases engage in a two-phase scheme, namely, the prefetching pha...
متن کاملPrivate Personal Information Verification
Physical document verification is a necessary task in the process of reviewing applications for a variety of services, such as loans, insurance, and mortgages. This process consumes a large amount of time, money, and human resources, which leads to limited business throughput. Furthermore, physical document verification poses a critical risk to clients’ personal information, as they are require...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Review of Financial Studies
سال: 2019
ISSN: 0893-9454,1465-7368
DOI: 10.1093/rfs/hhz029