Adversary model

Results: 85



#Item
1Online algorithms / Analysis of algorithms / Computer science / Applied mathematics / Computer programming / K-server problem / Metrical task system / Adversary model / Competitive analysis / List update problem / Algorithm / Randomized algorithm

Competitive Online Algorithms Susanne Albers Overview arrive one by one and must be scheduled immediately

Add to Reading List

Source URL: www14.in.tum.de

Language: English - Date: 2013-11-25 11:09:17
2Analysis of algorithms / Academia / Online algorithms / Computer science / Probabilistic complexity theory / Randomized algorithm / Adversary model / Algorithm / Data binning / Labeling theory / Mathematics

Charles University in Prague Faculty of Mathematics and Physics DOCTORAL THESIS Jan Bul´anek

Add to Reading List

Source URL: iuuk.mff.cuni.cz

Language: English - Date: 2014-07-29 07:02:19
3Online algorithms / Analysis of algorithms / Computer science / Applied mathematics / Mathematics / Competitive analysis / Cache replacement policies / List update problem / Algorithm / K-server problem / Time complexity / Adversary model

Online Algorithms: A Study of Graph-Theoretic Concepts Susanne Albers Max-Planck-Institut fur Informatik, Im Stadtwald, 66123 Saarbrucken, Germany. , http://www.mpi-sb.mpg.de/~ albers/

Add to Reading List

Source URL: www14.in.tum.de

Language: English - Date: 2013-11-25 11:05:02
4Road traffic management / Mathematical physics / Road transport / Law / Privacy / Adversary model / Traffic flow / Internet privacy / Applied mathematics / Business / Academia

C:/Users/Bin Zan/Dropbox/typeinst/IEEE6page.dvi

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2011-07-31 11:03:34
5Technology / Electronics / Electromagnetism / Computer networking / Sensor node / Wireless sensor network / Signal-to-interference-plus-noise ratio / Radar / Adversary model / Beamforming / Computer network / Throughput

The 2011 Military Communications Conference - Track 3 - Cyber Security and Network Operations Multi-node Coordinated Jamming for Location Privacy Protection Sangho Oh

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2012-01-16 23:23:23
6Cryptography / Secret sharing / Public-key cryptography / Proactive secret sharing / Commitment scheme / Ciphertext indistinguishability / Adversary model / Digital signature / Encryption / Information-theoretic security

The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:37:31
7Analysis of algorithms / Online algorithms / Adversary model / Algorithm / Mathematics

Algorithms and Data Structures (WS15/16) Example Solutions for Unit 3 Problem 1 Algorithm: for the simplicity let’s assume that n = 2k, algorithm can be easily modified if n = 2k + 1 by using one additional comparison

Add to Reading List

Source URL: www-tcs.cs.uni-sb.de

Language: English - Date: 2016-03-02 15:13:55
8Network performance / TCP congestion control / Throughput / Adversary model / Support / Mathematics

Dynamic Internet Congestion with Bursts Stefan Schmid1 and Roger Wattenhofer2 1 2

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:53
9Analysis of algorithms / Computer science / Mathematics / Theoretical computer science / Applied mathematics / Online algorithms / Probabilistic complexity theory / Randomized algorithms / Adversary model / Algorithm / Pseudorandomness / Unique sink orientation

Randomized Algorithms An Introduction through Unique Sink Orientations Lecture Notes Bernd G¨artner, ETH Z¨urich February 13, 2004

Add to Reading List

Source URL: people.inf.ethz.ch

Language: English - Date: 2016-06-20 11:55:28
10Game theory / Mathematics / Applied mathematics / Stackelberg competition / Nash equilibrium / Adversary model / Support vector machine / Minimax / Mathematical optimization / Supervised learning / Best response

Mach Learn: 69–83 DOIs10994Mining adversarial patterns via regularized loss minimization Wei Liu · Sanjay Chawla

Add to Reading List

Source URL: pmg.it.usyd.edu.au

Language: English - Date: 2011-03-12 02:03:54
UPDATE