Sciweavers

2210 search results - page 411 / 442
» Information complexity of neural networks
Sort
View
SACRYPT
2009
Springer
130views Cryptology» more  SACRYPT 2009»
15 years 8 months ago
Format-Preserving Encryption
Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of identical format—for example, encrypting a valid credit-card number into a ...
Mihir Bellare, Thomas Ristenpart, Phillip Rogaway,...
109
Voted
PETRA
2009
ACM
15 years 8 months ago
Towards a social fabric for pervasive assistive environments
The digital divide refers to a lack of technological access, part of which involves exclusion from a blooming arena of social interaction. People without mobile phones or PCs cann...
Clare Owens, David E. Millard, Andrew Stanford-Cla...
SIGECOM
2009
ACM
114views ECommerce» more  SIGECOM 2009»
15 years 8 months ago
Policy teaching through reward function learning
Policy teaching considers a Markov Decision Process setting in which an interested party aims to influence an agent’s decisions by providing limited incentives. In this paper, ...
Haoqi Zhang, David C. Parkes, Yiling Chen
104
Voted
CDC
2008
IEEE
137views Control Systems» more  CDC 2008»
15 years 8 months ago
Decentralized cooperative collision avoidance for acceleration constrained vehicles
— Safety must be ensured in the deployment of multi-agent vehicle systems. This paper presents decentralized collision avoidance algorithms for systems with second order dynamics...
Gabriel Hoffmann, Claire J. Tomlin
115
Voted
CEC
2008
IEEE
15 years 8 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith