Sciweavers

197 search results - page 27 / 40
» Is attack better than defense
Sort
View
AAAI
1997
13 years 8 months ago
Intelligent Agents for the Synthetic Battlefield: A Company of Rotary Wing Aircraft
1 We have constructed a team of intelligent agents that perform the tasks of an attack helicopter company for a synthetic battlefield environment used for running largescale milita...
Randall W. Hill Jr., Johnny Chen, Jonathan Gratch,...
ISI
2006
Springer
13 years 7 months ago
Measures to Detect Word Substitution in Intercepted Communication
Abstract. Those who want to conceal the content of their communications can do so by replacing words that might trigger attention by other words or locutions that seem more ordinar...
SzeWang Fong, David B. Skillicorn, Dmitri Roussino...
INTERNET
2008
134views more  INTERNET 2008»
13 years 7 months ago
Multilanguage Programming
more abstractly to the tools, tactics, and techniques pertinent to each profession. Top basketball players know multiple ways to help their teams with scoring, passing, and defense...
Steve Vinoski
ICIP
2004
IEEE
14 years 9 months ago
Non-uniform quantizer design for image data hiding
Most quantizer based data hiding schemes use uniform quantizer, which is not optimal if the host signal is not uniformly distributed. In this paper, we design a quantizer that is ...
Ning Liu, Koduvayur P. Subbalakshmi
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
14 years 1 months ago
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model
Abstract. In this paper, we propose a 2/3-rate double length compression function and study its security in the black-box model. We prove that to get a collision attack for the com...
Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin ...