Sciweavers

1888 search results - page 234 / 378
» Proof theory and computational analysis
Sort
View
232
Voted

Lecture Notes
404views
16 years 12 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
STOC
2005
ACM
110views Algorithms» more  STOC 2005»
16 years 2 months ago
Key agreement from weak bit agreement
Assume that Alice and Bob, given an authentic channel, have a protocol where they end up with a bit SA and SB, respectively, such that with probability 1+ 2 these bits are equal. ...
Thomas Holenstein
ATAL
2009
Springer
15 years 8 months ago
Modeling billiards games
Two-player games of billiards, of the sort seen in recent Computer Olympiads held by the International Computer Games Association, are an emerging area with unique challenges for ...
Christopher Archibald, Yoav Shoham
104
Voted
GECCO
2009
Springer
148views Optimization» more  GECCO 2009»
15 years 8 months ago
Multiplicative approximations and the hypervolume indicator
Indicator-based algorithms have become a very popular approach to solve multi-objective optimization problems. In this paper, we contribute to the theoretical understanding of alg...
Tobias Friedrich, Christian Horoba, Frank Neumann
SIGECOM
2009
ACM
114views ECommerce» more  SIGECOM 2009»
15 years 8 months ago
Policy teaching through reward function learning
Policy teaching considers a Markov Decision Process setting in which an interested party aims to influence an agent’s decisions by providing limited incentives. In this paper, ...
Haoqi Zhang, David C. Parkes, Yiling Chen