Sciweavers

145 search results - page 8 / 29
» Adversarial learning
Sort
View
FLAIRS
1998
13 years 9 months ago
DFA Learning of Opponent Strategies
This work studies the control of robots in the adversarial world of "Hunt the Wumpus". The hybrid learning algorithm which controls the robots behavior is a combination ...
Gilbert L. Peterson, Diane J. Cook
NETWORKING
2007
13 years 9 months ago
Reinforcement Learning-Based Load Shared Sequential Routing
We consider event dependent routing algorithms for on-line explicit source routing in MPLS networks. The proposed methods are based on load shared sequential routing in which load ...
Fariba Heidari, Shie Mannor, Lorne Mason
COLT
2010
Springer
13 years 5 months ago
Regret Minimization With Concept Drift
In standard online learning, the goal of the learner is to maintain an average loss that is "not too big" compared to the loss of the best-performing function in a fixed...
Koby Crammer, Yishay Mansour, Eyal Even-Dar, Jenni...
FOCS
2007
IEEE
14 years 1 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak
ACNS
2007
Springer
87views Cryptology» more  ACNS 2007»
13 years 9 months ago
Privacy-Preserving Set Union
Recently there has been a significant amount of work on privacy-preserving set operations, including: set intersection [14, 6, 21, 9], testing set disjointness [17], multi-set ope...
Keith B. Frikken