Sciweavers

3451 search results - page 68 / 691
» Collaborative attack modeling
Sort
View
BIRTHDAY
2012
Springer
12 years 4 months ago
Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems
Finding efficient countermeasures for cryptosystems against fault attacks is challenged by a constant discovery of flaws in designs. Even elements, such as public keys, that do no...
Alexandre Berzati, Cécile Canovas-Dumas, Lo...
SDM
2007
SIAM
130views Data Mining» more  SDM 2007»
13 years 10 months ago
Towards Attack-Resilient Geometric Data Perturbation
Data perturbation is a popular technique for privacypreserving data mining. The major challenge of data perturbation is balancing privacy protection and data quality, which are no...
Keke Chen, Gordon Sun, Ling Liu
AIED
2009
Springer
14 years 3 months ago
Looking Into Collaborative Learning: Design from Macro- and Micro-Script Perspectives
Design of collaborative learning (CL) scenarios is a complex task, but necessary if the goal of the collaboration is learning. Creating well-thought-out CL scenarios requires exper...
Eloy D. Villasclaras-Fernández, Seiji Isota...
IJCAI
1993
13 years 10 months ago
A Scheme for Agent Collaboration in Open Multiagent Environments
In multiagent planning, an agent sometimes needs to collaborate with others to construct complex plans, or to accomplish large organizational tasks which it cannot do alone. Since...
Eiichi Osawa
ISOLA
2010
Springer
13 years 7 months ago
Towards Dynamic Adaptation of Probabilistic Systems
Dynamic system adaptation is modeled in the coordination language Paradigm as coordination of collaborating components. A special component McPal allows for addition of new behavio...
Suzana Andova, Luuk Groenewegen, Erik P. de Vink