Adversary model

Results: 85



#Item
11Online algorithms / Analysis of algorithms / Adversary model / List update problem / K-server problem / Algorithm / Randomized algorithm / Competitive analysis / Metrical task system

Mathemati al Programming manus ript No. (will be inserted by the editor) Susanne Albers Online Algorithms: A Survey

Add to Reading List

Source URL: www14.in.tum.de

Language: English - Date: 2013-11-25 11:03:55
12Online algorithms / Analysis of algorithms / Competitive analysis / Adversary model / List update problem / Metrical task system / K-server problem / Randomized algorithm / Algorithm / Page replacement algorithm / Ski rental problem

Online Algorithms Susanne Albers University of Freiburg, Germany 1 Introduction This book chapter reviews fundamental concepts and results in the area of

Add to Reading List

Source URL: www14.in.tum.de

Language: English - Date: 2013-11-25 11:02:53
13Pickup trucks / Outlier / Statistical analysis / Adversary model / Truck / Ram Trucks

C:/Users/Bin/Dropbox/forINFO/INFOR12.dvi

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2013-04-18 00:24:09
14Online algorithms / Analysis of algorithms / Theoretical computer science / Metrical task system / K-server problem / Adversary model / Algorithm / Competitive analysis / Randomized algorithm / Approximation algorithm / Computational learning theory

Online Algorithms Susanne Albers Stefano Leonardiy Over the past twelve years, online algorithms have received considerable research interest. Online

Add to Reading List

Source URL: www14.in.tum.de

Language: English - Date: 2013-11-25 11:05:41
15Analysis of algorithms / Online algorithms / Adversary model

Adversary Gain vs. Defender Loss in Quantified Information Flow Piotr Mardziel,† Mário S. Alvim,‡ and Michael Hicks,† † University of Maryland, College Park ‡ Universidade Federal de Minas Gerais

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2014-07-17 09:25:53
16Online algorithms / Analysis of algorithms / Computer science / Mathematics / Applied mathematics / Competitive analysis / List update problem / Algorithm / Permutation / Adversary model / Homography

Optimal Projective Algorithms for the List Update Problem Christoph Amb¨uhl1 , Bernd G¨artner1 , and Bernhard von Stengel2 1 Institute for Theoretical Computer Science, ETH Z¨urich, 8092 Z¨urich, Switzerland.

Add to Reading List

Source URL: www.maths.lse.ac.uk

Language: English - Date: 2010-01-11 12:21:35
17Online algorithms / Analysis of algorithms / List update problem / Competitive analysis / Adversary model / Algorithm / K-server problem

Theoretical Computer Science–16 www.elsevier.com/locate/tcs A new lower bound for the list update problem in the partial cost model

Add to Reading List

Source URL: www.maths.lse.ac.uk

Language: English - Date: 2002-11-18 18:10:24
18Computational complexity theory / Analysis of algorithms / Online algorithms / Computer science / Theory of computation / Competitive analysis / List update problem / Adversary model / Algorithm / Randomized algorithm / Travelling salesman problem / Time complexity

3 Scientific Information 3.1

Add to Reading List

Source URL: www.ite.ethz.ch

Language: English - Date: 2008-10-23 07:56:18
19

An Information-Theoretic Model for Steganography∗ Christian Cachin† March 3, 2004 Abstract An information-theoretic model for steganography with a passive adversary is proposed.

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2004-03-04 03:32:53
    20Electronic warfare / Hacking / Military technology / Counter-intelligence / Military intelligence / Cyberwarfare / Counterintelligence / Adversary model / Computer security / Espionage / Security / Military science

    Microsoft Word - gosler.doc

    Add to Reading List

    Source URL: dnnpro.outer.jhuapl.edu

    Language: English - Date: 2012-09-27 16:53:20
    UPDATE