Sciweavers

13457 search results - page 20 / 2692
» Can we elect if we cannot compare
Sort
View
TCC
2005
Springer
108views Cryptology» more  TCC 2005»
14 years 1 months ago
Comparing Two Notions of Simulatability
In this work, relations between the security notions standard simulatability and universal simulatability for cryptographic protocols are investigated. A simulatability-based notio...
Dennis Hofheinz, Dominique Unruh
ATAL
2006
Springer
13 years 9 months ago
Can good learners always compensate for poor learners?
Can a good learner compensate for a poor learner when paired in a coordination game? Previous work has given an example where a special learning algorithm (FMQ) is capable of doin...
Keith Sullivan, Liviu Panait, Gabriel Catalin Bala...
SIAMCOMP
2011
12 years 10 months ago
A Quantitative Version of the Gibbard-Satterthwaite Theorem for Three Alternatives
The Gibbard-Satterthwaite theorem states that every non-dictatorial election rule among at least three alternatives can be strategically manipulated. We prove a quantitative versi...
Ehud Friedgut, Gil Kalai, Nathan Keller, Noam Nisa...
MM
2009
ACM
174views Multimedia» more  MM 2009»
14 years 2 months ago
Comparing fact finding tasks and user survey for evaluating a video browsing tool
There are still no established methods for the evaluation of browsing and exploratory search tools. In the (multimedia) information retrieval community evaluations following the C...
Werner Bailer, Herwig Rehatschek
DSN
2009
IEEE
14 years 2 months ago
Comparing anomaly-detection algorithms for keystroke dynamics
Keystroke dynamics—the analysis of typing rhythms to discriminate among users—has been proposed for detecting impostors (i.e., both insiders and external attackers). Since man...
Kevin S. Killourhy, Roy A. Maxion