Sciweavers

52 search results - page 3 / 11
» Belief function independence: I. The marginal case
Sort
View
TIT
2010
150views Education» more  TIT 2010»
13 years 2 months ago
Information-theoretic key agreement of multiple terminals: part I
This is the first part of a two-part paper on information-theoretically secure secret key agreement. In this part, we study the secrecy problem under the widely studied source mod...
Amin Aminzadeh Gohari, Venkat Anantharam
ATAL
2008
Springer
13 years 9 months ago
Simultaneously modeling humans' preferences and their beliefs about others' preferences
In strategic multiagent decision making, it is often the case that a strategic reasoner must hold beliefs about other agents and use these beliefs to inform its decision making. T...
Sevan G. Ficici, Avi Pfeffer
CEEMAS
2005
Springer
14 years 1 months ago
How Our Beliefs Contribute to Interpret Actions
Abstract. In update logic the interpretation of an action is often assumed to be independent from the agents’ beliefs about the situation (see [BMS04] or [Auc05]). In this paper ...
Guillaume Aucher
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 11 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
JMLR
2008
141views more  JMLR 2008»
13 years 7 months ago
Graphical Methods for Efficient Likelihood Inference in Gaussian Covariance Models
In graphical modelling, a bi-directed graph encodes marginal independences among random variables that are identified with the vertices of the graph. We show how to transform a bi...
Mathias Drton, Thomas S. Richardson