Adversary model

Results: 85



#Item
51Computer science / Mathematics / Scheduling algorithms / Parallel computing / Operations research / Speedup / Adversary model / Scheduling / Competitive analysis / Analysis of algorithms / Online algorithms / Applied mathematics

Online parallel scheduling of non-uniform tasks: Trading failures for energy

Add to Reading List

Source URL: www.cs.ucy.ac.cy

Language: English - Date: 2015-01-23 01:11:03
52Mathematics / Theoretical computer science / Operations research / Planning / Scheduling / Distributed computing / Algorithm / Distributed algorithm / Adversary model / Scheduling algorithms / Computing / Applied mathematics

Performing Dynamically Injected Tasks on Processes Prone to Crashes and Restarts Chryssis Georgiou∗ Department of Computer Science, University of Cyprus [removed]

Add to Reading List

Source URL: www.cs.ucy.ac.cy

Language: English - Date: 2011-09-05 06:01:37
53Analysis of algorithms / Complexity classes / Human communication / Probabilistic complexity theory / Gossip protocol / Consensus / Adversary model / Randomized algorithm / Distributed computing / Theoretical computer science / Computational complexity theory / Applied mathematics

Meeting the Deadline: On the Complexity of Fault-Tolerant Continuous Gossip∗ Chryssis Georgiou† Seth Gilbert‡

Add to Reading List

Source URL: www.cs.ucy.ac.cy

Language: English - Date: 2011-10-13 04:45:49
54Problem solving / Stackelberg competition / Minimax / Nash equilibrium / Adversary model / Supervised learning / Support vector machine / Mathematical optimization / Normal-form game / Game theory / Mathematics / Algebra

Mach Learn: 69–83 DOIs10994Mining adversarial patterns via regularized loss minimization Wei Liu · Sanjay Chawla

Add to Reading List

Source URL: www.cmcrc.com

Language: English - Date: 2013-08-20 22:22:50
55Applied mathematics / Mathematics / Mathematical optimization / Operations research / Estimation theory / Competitive analysis / Symbol / Adversary model / M-estimator / Analysis of algorithms / Online algorithms / Statistics

Repeated Games against Budgeted Adversaries Manfred K. Warmuth† Department of Computer Science UC Santa Cruz [removed]

Add to Reading List

Source URL: papers.nips.cc

Language: English - Date: 2014-02-24 03:39:46
56Finance / Black–Scholes / Futures contract / Put option / Myron Scholes / Call option / Risk-neutral measure / Binomial options pricing model / Financial economics / Options / Mathematical finance

How to Hedge an Option Against an Adversary: Black-Scholes Pricing is Minimax Optimal Jacob Abernethy University of Michigan [removed]

Add to Reading List

Source URL: papers.nips.cc

Language: English - Date: 2014-11-26 14:13:18
57Applied mathematics / Detection theory / Game theory / Minimax / Adversary model / Mathematics / Game artificial intelligence / Search algorithms

Minimax Policies for Combinatorial Prediction Games S´ebastien Bubeck1 joint work with Jean-Yves Audibert2,3 and G´ abor Lugosi4

Add to Reading List

Source URL: www.princeton.edu

Language: English - Date: 2011-10-05 04:54:04
58Computer security / Dolev-Yao model / RSA / Adversary model / Cryptography / Cryptographic protocols / Public-key cryptography

NRL Release Number[removed]Dolev-Yao is no better than Machiavelli Paul Syverson, Catherine Meadows Center for High Assurance Computer Systems

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 11:52:34
59Game theory / NP-complete problems / Rendezvous problem / Algorithm / Graph coloring / Adversary model / Mathematics / Theoretical computer science / Applied mathematics

Carleton University Honours Project Knowledge in Rendezvous of Agents with Different Speeds Evan Huus [removed] Supervised by Professor E. Kranakis,

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
60Computing / Cryptography / Communications protocol / Adversary model / Cryptographic nonce / Turing machine / Memory / Bounded set / Cryptographic protocols / Data / Information

Bounded Memory Protocols Max Kanovich1 , Tajana Ban Kirigin2 , Vivek Nigam3 , Andre Scedrov4 Abstract It is well-known that the Dolev-Yao adversary is a powerful adversary. Besides acting as the network, intercepting, de

Add to Reading List

Source URL: bib.irb.hr

Language: English - Date: 2014-08-21 13:21:17
UPDATE