Sciweavers

5948 search results - page 1 / 1190
» Computing Robust Counter-Strategies
Sort
View
NIPS
2007
13 years 6 months ago
Computing Robust Counter-Strategies
Adaptation to other initially unknown agents often requires computing an effective counter-strategy. In the Bayesian paradigm, one must find a good counterstrategy to the inferre...
Michael Johanson, Martin Zinkevich, Michael H. Bow...
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
13 years 10 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
CCE
2011
12 years 11 months ago
Computational energy-based redesign of robust proteins
The robustness of a system is a property that pervades all aspects of Nature. The ability of a system to adapt itself to perturbations due to internal and external agents, to agin...
Giovanni Stracquadanio, Giuseppe Nicosia
ICPP
2009
IEEE
13 years 2 months ago
Stochastic-Based Robust Dynamic Resource Allocation in a Heterogeneous Computing System
Abstract--This research investigates the problem of robust dynamic resource allocation for heterogeneous distributed computing systems operating under imposed constraints. Often, s...
Jay Smith, Edwin K. P. Chong, Anthony A. Maciejews...
MFCS
2010
Springer
13 years 3 months ago
Robust Computations with Dynamical Systems
Abstract. In this paper we discuss the computational power of Lipschitz dynamical systems which are robust to infinitesimal perturbations. Whereas the study in [1] was done only f...
Olivier Bournez, Daniel S. Graça, Emmanuel ...