Sciweavers

3229 search results - page 158 / 646
» Theories with the Independence Property
Sort
View
115
Voted
CTRSA
2008
Springer
197views Cryptology» more  CTRSA 2008»
15 years 2 months ago
Legally-Enforceable Fairness in Secure Two-Party Computation
In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computation should...
Andrew Y. Lindell
92
Voted
ORL
2006
72views more  ORL 2006»
15 years 23 days ago
A note on two-person zero-sum communicating stochastic games
For undiscounted two-person zero-sum communicating stochastic games with finite state and action spaces, a solution procedure is proposed that exploits the communication property,...
Zeynep Müge Avsar, Melike Baykal-Gursoy
217
Voted
AAECC
2011
Springer
380views Algorithms» more  AAECC 2011»
14 years 7 months ago
The generalized road coloring problem and periodic digraphs
A proof of the Generalized Road Coloring Problem, independent of the recent work by Beal and Perrin, is presented, using both semigroup methods and Trakhtman’s algorithm. Algebra...
G. Budzban, Ph. Feinsilver
WG
2009
Springer
15 years 7 months ago
Chordal Digraphs
Chordal graphs, also called triangulated graphs, are important in algorithmic graph theory. In this paper we generalise the definition of chordal graphs to the class of directed ...
Daniel Meister, Jan Arne Telle
97
Voted
CEC
2008
IEEE
15 years 7 months ago
An approach to intrusion detection by means of idiotypic networks paradigm
Abstract— In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDIS), that aims at dealing with large scale network attacks feat...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...