Sciweavers

976 search results - page 68 / 196
» Evaluating Adversarial Partitions
Sort
View
IJCOMSYS
2006
99views more  IJCOMSYS 2006»
13 years 9 months ago
Distributed policy processing in active-service based infrastructures
More and more applications in the Internet are requiring an intelligent service infrastructure to provide customized services. In this paper, we present an infrastructure, which c...
Wei Yu, Sriram Chellappan, Dong Xuan, Wei Zhao
ICML
2008
IEEE
14 years 9 months ago
A worst-case comparison between temporal difference and residual gradient with linear function approximation
Residual gradient (RG) was proposed as an alternative to TD(0) for policy evaluation when function approximation is used, but there exists little formal analysis comparing them ex...
Lihong Li
DSN
2008
IEEE
14 years 3 months ago
Byzantine replication under attack
Existing Byzantine-resilient replication protocols satisfy two standard correctness criteria, safety and liveness, in the presence of Byzantine faults. In practice, however, fault...
Yair Amir, Brian A. Coan, Jonathan Kirsch, John La...
ICPADS
2007
IEEE
14 years 3 months ago
S/Kademlia: A practicable approach towards secure key-based routing
Security is a common problem in completely decentralized peer-to-peer systems. Although several suggestions exist on how to create a secure key-based routing protocol, a practicab...
Ingmar Baumgart, Sebastian Mies
CONEXT
2006
ACM
14 years 2 months ago
Secure sensor network routing: a clean-slate approach
The deployment of sensor networks in security- and safety-critical environments requires secure communication primitives. In this paper, we design, implement, and evaluate a new s...
Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig