Sciweavers

164 search results - page 14 / 33
» Selecting Robust Strategies Based on Abstracted Game Models
Sort
View
112
Voted
ICIP
2005
IEEE
16 years 3 months ago
Game-theoretic analysis of a semi-fragile watermarking scheme based on SCS
Semi-fragile watermarking can be used to detect illegal and local manipulation of images, while being robust towards legal manipulations such as lossy compression. This paper desc...
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...
ATAL
2008
Springer
15 years 3 months ago
GS3 and Tartanian: game theory-based heads-up limit and no-limit Texas Hold'em poker-playing programs
We demonstrate two game theory-based programs for headsup limit and no-limit Texas Hold'em poker. The first player, GS3, is designed for playing limit Texas Hold'em, in ...
Andrew Gilpin, Tuomas Sandholm, Troels Bjerre S&os...
ISAMI
2010
14 years 11 months ago
GRASP for Instance Selection in Medical Data Sets
Abstract Medical data sets consist of a huge amount of data organized in instances, where each one contains several attributes. The quality of the models obtained from a database s...
Alfonso Fernández, Abraham Duarte, Rosa Her...
130
Voted
LCN
2007
IEEE
15 years 8 months ago
A Game-Theoretic Framework for Bandwidth Attacks and Statistical Defenses
Abstract—We introduce a game-theoretic framework for reasoning about bandwidth attacks, a common form of distributed denial of service (DDoS) attacks. In particular, our traffic...
Mark E. Snyder, Ravi Sundaram, Mayur Thakur
120
Voted
ACOM
2006
Springer
15 years 8 months ago
Experiments in Selective Overhearing of Hierarchical Organizations
Abstract. Lately, overhearing has gained interest in monitoring multi-agent settings. Previous investigations provided an extensive set of techniques using overhearing. However, mo...
Gery Gutnik, Gal A. Kaminka