Sciweavers

2979 search results - page 343 / 596
» Modelling secure multiagent systems
Sort
View
ESEM
2010
ACM
15 years 3 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
EUROCRYPT
2010
Springer
15 years 8 months ago
Efficient Lattice (H)IBE in the Standard Model
We construct an efficient identity based encryption system based on the standard learning with errors (LWE) problem. Our security proof holds in the standard model. The key step in...
Shweta Agrawal, Dan Boneh, Xavier Boyen
BNCOD
2009
125views Database» more  BNCOD 2009»
15 years 2 months ago
The Adaptation Model of a Runtime Adaptable DBMS
Nowadays maintenance of database management systems (DBMSs) often requires offline operations for enhancement of functionality or security updates. This hampers the availability of...
Florian Irmert, Thomas Fischer, Frank Lauterwald, ...
CEEMAS
2003
Springer
15 years 9 months ago
On a Dynamical Analysis of Reinforcement Learning in Games: Emergence of Occam's Razor
Modeling learning agents in the context of Multi-agent Systems requires an adequate understanding of their dynamic behaviour. Usually, these agents are modeled similar to the di...
Karl Tuyls, Katja Verbeeck, Sam Maes
JAPLL
2007
88views more  JAPLL 2007»
15 years 4 months ago
Some comments on history based structures
History based models, introduced by Parikh and Ramanujam, provide a natural mathematical model of social interactive situations. These models offer a ”low level” description ...
Eric Pacuit