Sciweavers

2371 search results - page 39 / 475
» Multivariable Utility Functions
Sort
View
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
15 years 9 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
126
Voted
CN
2008
140views more  CN 2008»
15 years 2 months ago
Congestion control in utility fair networks
This paper deals with a congestion control framework for elastic and real-time traffic, where the user's application is associated with a utility function. We allow users to ...
Tobias Harks, Tobias Poschwatta
97
Voted
UAI
2003
15 years 3 months ago
Cooperative Negotiation in Autonomic Systems using Incremental Utility Elicitation
Decentralized resource allocation is a key problem for large-scale autonomic (or self-managing) computing systems. Motivated by a data center scenario, we explore efficient techn...
Craig Boutilier, Rajarshi Das, Jeffrey O. Kephart,...
121
Voted
EUROCRYPT
2003
Springer
15 years 7 months ago
Algebraic Attacks on Stream Ciphers with Linear Feedback
A classical construction of stream ciphers is to combine several LFSRs and a highly non-linear Boolean function f. Their security is usually analysed in terms of correlation attack...
Nicolas Courtois, Willi Meier
95
Voted
UAI
2001
15 years 4 months ago
UCP-Networks: A Directed Graphical Representation of Conditional Utilities
We propose a directed graphical representation of utility functions, called UCP-networks, that combines aspects of two existing preference models: generalized additive models and ...
Craig Boutilier, Fahiem Bacchus, Ronen I. Brafman