Sciweavers

TCIAIG
2016
10 years 15 days ago
How to Run a Successful Game-Based AI Competition
— Game-based competitions are commonly used within the Computational Intelligence (CI) and Artificial Intelligence (AI) in games community to benchmark algorithms and to attract...
Julian Togelius
TCCI
2016
10 years 15 days ago
Searching Web 2.0 Data Through Entity-Based Aggregation
Abstract. Entity-based searching has been introduced as a way of allowing users and applications to retrieve information about a specific real world object such as a person, an ev...
Ekaterini Ioannou, Yannis Velegrakis
TCC
2016
Springer
41views Cryptology» more  TCC 2016»
10 years 15 days ago
Two-Round Man-in-the-Middle Security from LPN
Secret-key authentication protocols have recently received a considerable amount of attention, and a long line of research has been devoted to devising efficient protocols with sec...
David Cash, Eike Kiltz, Stefano Tessaro
TCC
2016
Springer
50views Cryptology» more  TCC 2016»
10 years 15 days ago
Standard Security Does Imply Security Against Selective Opening for Markov Distributions
About three decades ago it was realized that implementing private channels between parties which can be adaptively corrupted requires an encryption scheme that is secure against s...
Georg Fuchsbauer, Felix Heuer, Eike Kiltz, Krzyszt...
TCC
2016
Springer
48views Cryptology» more  TCC 2016»
10 years 15 days ago
Lower Bounds on Assumptions Behind Indistinguishability Obfuscation
Since the seminal work of Garg et al. (FOCS’13) in which they proposed the first candidate construction for indistinguishability obfuscation (iO for short), iO has become a cent...
Mohammad Mahmoody, Ameer Mohammed, Soheil Nematiha...