Sciweavers

28888 search results - page 5606 / 5778
» Computability and complexity in analysis
Sort
View
ATAL
2010
Springer
15 years 4 months ago
Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mod...
Zhengyu Yin, Dmytro Korzhyk, Christopher Kiekintve...
125
Voted
ATAL
2010
Springer
15 years 4 months ago
Evolving policy geometry for scalable multiagent learning
A major challenge for traditional approaches to multiagent learning is to train teams that easily scale to include additional agents. The problem is that such approaches typically...
David B. D'Ambrosio, Joel Lehman, Sebastian Risi, ...
131
Voted
CLEF
2010
Springer
15 years 4 months ago
Fuzzy Semantic-Based String Similarity for Extrinsic Plagiarism Detection - Lab Report for PAN at CLEF 2010
This report explains our plagiarism detection method using fuzzy semantic-based string similarity approach. The algorithm was developed through four main stages. First is pre-proce...
Salha Alzahrani, Naomie Salim
MM
2010
ACM
185views Multimedia» more  MM 2010»
15 years 3 months ago
The virtual chocolate factory: mixed reality industrial collaboration and control
We show several aspects of a complex mixed reality system that we have built and deployed in a real-world factory setting. In our system, virtual worlds, augmented realities, and ...
Maribeth Back, Don Kimber, Eleanor G. Rieffel, Ant...
143
Voted
CCS
2010
ACM
15 years 3 months ago
Modeling attacks on physical unclonable functions
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PU...
Ulrich Rührmair, Frank Sehnke, Jan Sölte...
« Prev « First page 5606 / 5778 Last » Next »