Sciweavers

1585 search results - page 35 / 317
» Automatically optimizing secure computation
Sort
View
GECCO
2003
Springer
111views Optimization» more  GECCO 2003»
14 years 1 months ago
Evolutionary Computing as a Tool for Grammar Development
Abstract. In this paper, an agent-based evolutionary computing technique is introduced, that is geared towards the automatic induction and optimization of grammars for natural lang...
Guy De Pauw
NSPW
2006
ACM
14 years 1 months ago
Dark application communities
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...
ICDCN
2010
Springer
13 years 11 months ago
On Communication Complexity of Secure Message Transmission in Directed Networks
Abstract. We re-visit the problem of perfectly secure message transmission (PSMT) in a directed network under the presence of a threshold adaptive Byzantine adversary, having unbou...
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
ALT
2010
Springer
13 years 9 months ago
Optimal Online Prediction in Adversarial Environments
: In many prediction problems, including those that arise in computer security and computational finance, the process generating the data is best modeled as an adversary with whom ...
Peter L. Bartlett
KIVS
2009
Springer
14 years 2 months ago
CLIO - A Cross-Layer Information Service for Overlay Network Optimization
New overlay-based services aim to provide properties like resilience, availability or QoS. To achieve this, automatic organization and optimization is required, which again demands...
Dirk Haage, Ralph Holz, Heiko Niedermayer, Pavel L...