Sciweavers

TIT
2010
107views Education» more  TIT 2010»
12 years 11 months ago
Optimal Error Correction for Computationally Bounded Noise
For adversarial but computationally bounded models of error, we construct appealingly simple and efficient cryptographic encoding and unique decoding schemes whose error-correctio...
Silvio Micali, Chris Peikert, Madhu Sudan, David A...
JMLR
2010
128views more  JMLR 2010»
12 years 12 months ago
Optimal Allocation Strategies for the Dark Pool Problem
We study the problem of allocating stocks to dark pools. We propose and analyze an optimal approach for allocations, if continuousvalued allocations are allowed. We also propose a...
Alekh Agarwal, Peter L. Bartlett, Max Dama
CCS
2008
ACM
13 years 7 months ago
Open problems in the security of learning
Machine learning has become a valuable tool for detecting and preventing malicious activity. However, as more applications employ machine learning techniques in adversarial decisi...
Marco Barreno, Peter L. Bartlett, Fuching Jack Chi...
IPTPS
2004
Springer
13 years 10 months ago
Robust Distributed Name Service
This paper suggests a method called Trust-but-Verify that may turn DHT-based peer-to-peer systems into systems that are provably robust against even massive adversarial attacks.
Baruch Awerbuch, Christian Scheideler
ATAL
2007
Springer
13 years 11 months ago
An adversarial environment model for bounded rational agents in zero-sum interactions
Multiagent environments are often not cooperative nor collaborative; in many cases, agents have conflicting interests, leading to adversarial interactions. This paper presents a ...
Inon Zuckerman, Sarit Kraus, Jeffrey S. Rosenschei...