Sciweavers

976 search results - page 24 / 196
» Evaluating Adversarial Partitions
Sort
View
DCOSS
2006
Springer
14 years 1 months ago
The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study
In this paper, we examine several localization algorithms and evaluate their robustness to attacks where an adversary attenuates or amplifies the signal strength at one or more lan...
Yingying Chen, Konstantinos Kleisouris, Xiaoyan Li...
EOR
2007
99views more  EOR 2007»
13 years 9 months ago
Learning lexicographic orders
The purpose of this paper is to learn the order of criteria of lexicographic decision under various reasonable assumptions. We give a sample evaluation and an oracle based algorit...
József Dombi, Csanád Imreh, Ná...
JDM
1998
101views more  JDM 1998»
13 years 9 months ago
Fault-Tolerant Quorum Consensus Scheme for Replication Control in Mobile Distributed Database Systems
We propose a new replication control scheme for multiple-copy consistency in mobile distributed database systems. Replicating data at multiple sites could contribute to enhance th...
Siwoo Byun, Songchun Moon
DASFAA
2007
IEEE
163views Database» more  DASFAA 2007»
14 years 4 months ago
Protecting Individual Information Against Inference Attacks in Data Publishing
In many data-publishing applications, the data owner needs to protect sensitive information pertaining to individuals. Meanwhile, certain information is required to be published. T...
Chen Li, Houtan Shirani-Mehr, Xiaochun Yang
IJNSEC
2006
84views more  IJNSEC 2006»
13 years 9 months ago
Security on Generalized Feistel Scheme with SP Round Function
This paper studies the security against differential/linear cryptanalysis and the pseudorandomness for a class of generalized Feistel scheme with SP round function called GFSP. We ...
Wenling Wu, Wentao Zhang, Dongdai Lin