Sciweavers

976 search results - page 2 / 196
» Evaluating Adversarial Partitions
Sort
View
AAAI
2004
13 years 6 months ago
Synthetic Adversaries for Urban Combat Training
This paper describes requirements for synthetic adversaries for urban combat training and MOUTBots, a prototype application. The MOUTBots use a commercial computer game to define,...
Robert E. Wray, John E. Laird, Andrew Nuxoll, Devv...
NIPS
2007
13 years 6 months ago
Selecting Observations against Adversarial Objectives
In many applications, one has to actively select among a set of expensive observations before making an informed decision. Often, we want to select observations which perform well...
Andreas Krause, H. Brendan McMahan, Carlos Guestri...
PKC
2010
Springer
119views Cryptology» more  PKC 2010»
13 years 6 months ago
Efficient Set Operations in the Presence of Malicious Adversaries
We revisit the problem of constructing efficient secure two-party protocols for the problems of setintersection and set-union, focusing on the model of malicious parties. Our main...
Carmit Hazay, Kobbi Nissim
VLDB
2004
ACM
100views Database» more  VLDB 2004»
13 years 10 months ago
Online Balancing of Range-Partitioned Data with Applications to Peer-to-Peer Systems
We consider the problem of horizontally partitioning a dynamic relation across a large number of disks/nodes by the use of range partitioning. Such partitioning is often desirable...
Prasanna Ganesan, Mayank Bawa, Hector Garcia-Molin...
PET
2005
Springer
13 years 10 months ago
Message Splitting Against the Partial Adversary
We review threat models used in the evaluation of anonymity systems’ vulnerability to traffic analysis. We then suggest that, under the partial adversary model, if multiple packe...
Andrei Serjantov, Steven J. Murdoch