Sciweavers

164 search results - page 14 / 33
» Selecting Robust Strategies Based on Abstracted Game Models
Sort
View
128
Voted
ICIP
2005
IEEE
16 years 6 months ago
Game-theoretic analysis of a semi-fragile watermarking scheme based on SCS
Semi-fragile watermarking can be used to detect illegal and local manipulation of images, while being robust towards legal manipulations such as lossy compression. This paper desc...
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...
ATAL
2008
Springer
15 years 6 months ago
GS3 and Tartanian: game theory-based heads-up limit and no-limit Texas Hold'em poker-playing programs
We demonstrate two game theory-based programs for headsup limit and no-limit Texas Hold'em poker. The first player, GS3, is designed for playing limit Texas Hold'em, in ...
Andrew Gilpin, Tuomas Sandholm, Troels Bjerre S&os...
ISAMI
2010
15 years 2 months ago
GRASP for Instance Selection in Medical Data Sets
Abstract Medical data sets consist of a huge amount of data organized in instances, where each one contains several attributes. The quality of the models obtained from a database s...
Alfonso Fernández, Abraham Duarte, Rosa Her...
160
Voted
LCN
2007
IEEE
15 years 11 months ago
A Game-Theoretic Framework for Bandwidth Attacks and Statistical Defenses
Abstract—We introduce a game-theoretic framework for reasoning about bandwidth attacks, a common form of distributed denial of service (DDoS) attacks. In particular, our traffic...
Mark E. Snyder, Ravi Sundaram, Mayur Thakur
ACOM
2006
Springer
15 years 10 months ago
Experiments in Selective Overhearing of Hierarchical Organizations
Abstract. Lately, overhearing has gained interest in monitoring multi-agent settings. Previous investigations provided an extensive set of techniques using overhearing. However, mo...
Gery Gutnik, Gal A. Kaminka