Sciweavers

107 search results - page 14 / 22
» When Random Play is Optimal Against an Adversary
Sort
View
97
Voted
AAMAS
2007
Springer
15 years 17 days ago
Reaching pareto-optimality in prisoner's dilemma using conditional joint action learning
We consider a repeated Prisoner’s Dilemma game where two independent learning agents play against each other. We assume that the players can observe each others’ action but ar...
Dipyaman Banerjee, Sandip Sen
100
Voted
STOC
2004
ACM
150views Algorithms» more  STOC 2004»
16 years 22 days ago
Typical properties of winners and losers in discrete optimization
We present a probabilistic analysis for a large class of combinatorial optimization problems containing, e.g., all binary optimization problems defined by linear constraints and a...
René Beier, Berthold Vöcking
CORR
2011
Springer
143views Education» more  CORR 2011»
14 years 4 months ago
Non-malleable extractors via character sums
In studying how to communicate over a public channel with an active adversary, Dodis and Wichs introduced the notion of a non-malleable extractor. A non-malleable extractor dramat...
Trevor D. Wooley, David Zuckerman
117
Voted
ALGORITHMICA
2011
14 years 7 months ago
Knowledge State Algorithms
We introduce the concept of knowledge states; many well-known algorithms can be viewed as knowledge state algorithms. The knowledge state approach can be used to to construct comp...
Wolfgang W. Bein, Lawrence L. Larmore, John Noga, ...
105
Voted
IWSEC
2009
Springer
15 years 7 months ago
ID-Based Group Password-Authenticated Key Exchange
Abstract—Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret key used for authentication is a human-memorable password. In this pa...
Xun Yi, Raylin Tso, Eiji Okamoto