Sciweavers

179 search results - page 20 / 36
» Adversarial Leakage in Games
Sort
View
ESA
2005
Springer
140views Algorithms» more  ESA 2005»
14 years 3 months ago
Bucket Game with Applications to Set Multicover and Dynamic Page Migration
We present a simple two-person Bucket Game, based on throwing balls into buckets, and we discuss possible players’ strategies. We use these strategies to create an approximation ...
Marcin Bienkowski, Jaroslaw Byrka
JURIX
2007
13 years 11 months ago
Success chances in argument games: a probabilistic approach to legal disputes
The outcome of a legal dispute, namely, the decision of its adjudicator, is uncertain, and both parties develop their strategies on the basis of their appreciation of the probabili...
Régis Riveret, Antonino Rotolo, Giovanni Sa...
ATAL
2010
Springer
13 years 11 months ago
Path disruption games
We propose Path Disruption Games (PDGs), which consider collaboration between agents attempting stop an adversary from travelling from a source node to a target node in a graph. P...
Yoram Bachrach, Ely Porat
TRUST
2010
Springer
14 years 2 months ago
SBAP: Software-Based Attestation for Peripherals
Abstract. Recent research demonstrates that adversaries can inject malicious code into a peripheral’s firmware during a firmware update, which can result in password leakage or...
Yanlin Li, Jonathan M. McCune, Adrian Perrig
EDBT
2010
ACM
180views Database» more  EDBT 2010»
14 years 1 months ago
k-symmetry model for identity anonymization in social networks
With more and more social network data being released, protecting the sensitive information within social networks from leakage has become an important concern of publishers. Adve...
Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zh...