Sciweavers

112 search results - page 5 / 23
» What agents can achieve under incomplete information
Sort
View
KDD
2007
ACM
186views Data Mining» more  KDD 2007»
15 years 9 months ago
An Ad Omnia Approach to Defining and Achieving Private Data Analysis
We briefly survey several privacy compromises in published datasets, some historical and some on paper. An inspection of these suggests that the problem lies with the nature of the...
Cynthia Dwork
ICC
2007
IEEE
146views Communications» more  ICC 2007»
15 years 3 months ago
Correlation Based Rate Adaptation via Insights from Incomplete Observations in 802.11 Networks
—Rate adaptation, as a challenging issue for wireless purpose. Relatively little attention has been paid on identifying network design, has been an active research topic for year...
Xia Zhou, Jun Zhao, Guang-Hua Yang
CRYPTO
2010
Springer
157views Cryptology» more  CRYPTO 2010»
14 years 10 months ago
Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability - (or: Quadratic Residuosity Strikes Ba
The main results of this work are new public-key encryption schemes that, under the quadratic residuosity (QR) assumption (or Paillier's decisional composite residuosity (DCR...
Zvika Brakerski, Shafi Goldwasser
SIGECOM
2003
ACM
122views ECommerce» more  SIGECOM 2003»
15 years 2 months ago
k-Implementation
This paper discusses an interested party who wishes to influence the behavior of agents in a game (multi-agent interaction), which is not under his control. The interested party ...
Dov Monderer, Moshe Tennenholtz
ATAL
2007
Springer
15 years 3 months ago
Multiagent reinforcement learning and self-organization in a network of agents
To cope with large scale, agents are usually organized in a network such that an agent interacts only with its immediate neighbors in the network. Reinforcement learning technique...
Sherief Abdallah, Victor R. Lesser