Sciweavers

978 search results - page 65 / 196
» Knowledge, Probability, and Adversaries
Sort
View
SIGMETRICS
2002
ACM
118views Hardware» more  SIGMETRICS 2002»
14 years 9 months ago
Robust traffic engineering: game theoretic perspective
On-line routing algorithms deal with requests as they arrive without assuming any knowledge of the underlying process that generates the streams of requests. By contrast, off-line...
Vladimir Marbukh
SEMWEB
2007
Springer
15 years 4 months ago
Approximate Measures of Semantic Dissimilarity under Uncertainty
Abstract. We propose semantic distance measures based on the criterion of approximate discernibility and on evidence combination. In the presence of incomplete knowledge, the dista...
Nicola Fanizzi, Claudia d'Amato, Floriana Esposito
TCC
2009
Springer
116views Cryptology» more  TCC 2009»
15 years 10 months ago
Simulation-Based Concurrent Non-malleable Commitments and Decommitments
Abstract. In this paper we consider commitment schemes that are secure against concurrent man-in-the-middle (cMiM) attacks. Under such attacks, two possible notions of security for...
Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
COCOON
2009
Springer
15 years 4 months ago
On Smoothed Analysis of Quicksort and Hoare's Find
We provide a smoothed analysis of Hoare’s find algorithm and we revisit the smoothed analysis of quicksort. Hoare’s find algorithm – often called quickselect – is an easy...
Mahmoud Fouz, Manfred Kufleitner, Bodo Manthey, Ni...
INFOCOM
2008
IEEE
15 years 4 months ago
A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks
—We develop a practical and comprehensive hybrid rogue access point (AP) detection framework for commodity WiFi networks. It is the first scheme that combines the distributed wi...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng