Sciweavers

1580 search results - page 188 / 316
» Non-Interference Through Determinism
Sort
View
AMEC
2003
Springer
15 years 10 months ago
Choosing Samples to Compute Heuristic-Strategy Nash Equilibrium
Auctions define games of incomplete information for which it is often too hard to compute the exact Bayesian-Nash equilibrium. Instead, the infinite strategy space is often popu...
William E. Walsh, David C. Parkes, Rajarshi Das
AP2PC
2003
Springer
15 years 10 months ago
Group Formation Among Peer-to-Peer Agents: Learning Group Characteristics
This paper examines the decentralized formation of groups within a peer-to-peer multi-agent system. More specifically, it frames group formation as a clustering problem, and exami...
Elth Ogston, Benno J. Overeinder, Maarten van Stee...
CCS
2003
ACM
15 years 10 months ago
k-anonymous message transmission
Informally, a communication protocol is sender k - anonymous if it can guarantee that an adversary, trying to determine the sender of a particular message, can only narrow down it...
Luis von Ahn, Andrew Bortz, Nicholas J. Hopper
CIKM
2003
Springer
15 years 10 months ago
Content-based retrieval in hybrid peer-to-peer networks
Hybrid peer-to-peer architectures use special nodes to provide directory services for regions of the network (“regional directory services”). Hybrid peer-to-peer architectures...
Jie Lu, James P. Callan
CTRSA
2003
Springer
96views Cryptology» more  CTRSA 2003»
15 years 10 months ago
Hardware Performance Characterization of Block Cipher Structures
In this paper, we present a general framework for evaluating the performance characteristics of block cipher structures composed of S-boxes and Maximum Distance Separable (MDS) ma...
Lu Xiao, Howard M. Heys