Sciweavers

33 search results - page 2 / 7
» Secure Games with Polynomial Expressions
Sort
View
SIGECOM
2010
ACM
165views ECommerce» more  SIGECOM 2010»
13 years 9 months ago
Computing optimal strategies to commit to in extensive-form games
Computing optimal strategies to commit to in general normal-form or Bayesian games is a topic that has recently been gaining attention, in part due to the application of such algo...
Joshua Letchford, Vincent Conitzer
AAAI
2010
13 years 6 months ago
Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games
Recently, algorithms for computing game-theoretic solutions have been deployed in real-world security applications, such as the placement of checkpoints and canine units at Los An...
Dmytro Korzhyk, Vincent Conitzer, Ronald Parr
ICCV
2007
IEEE
13 years 6 months ago
Combined Support Vector Machines and Hidden Markov Models for Modeling Facial Action Temporal Dynamics
The analysis of facial expression temporal dynamics is of great importance for many real-world applications. Being able to automatically analyse facial muscle actions (Action Units...
Michel François Valstar, Maja Pantic
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
13 years 11 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
MOC
2010
12 years 11 months ago
Computation of conformal representations of compact Riemann surfaces
We find a system of two polynomial equations in two unknowns, whose solution allows us to give an explicit expression of the conformal representation of a simply connected three-sh...
Guillermo López Lagomasino, Domingo Pestana...