Sciweavers

400 search results - page 25 / 80
» Moving Proofs-As-Programs into Practice
Sort
View
IH
2001
Springer
13 years 12 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
CP
2000
Springer
13 years 12 months ago
Analysis of Random Noise and Random Walk Algorithms
Random Noise and Random Walk algorithms are local search strategies that have been used for the problem of satisfiability testing (SAT). We present a Markov-chain based analysis o...
Bhaskar Krishnamachari, Xi Xie, Bart Selman, Steph...
CN
1999
91views more  CN 1999»
13 years 7 months ago
On the Security of Pay-per-Click and Other Web Advertising Schemes
We present a hit inflation attack on pay-per-click Web advertising schemes. Our attack is virtually impossible for the program provider to detect conclusively, regardless of wheth...
Vinod Anupam, Alain J. Mayer, Kobbi Nissim, Benny ...
ICRA
2010
IEEE
69views Robotics» more  ICRA 2010»
13 years 6 months ago
Probabilistic shadow information spaces
— This paper introduces a Bayesian filter that is specifically designed for counting targets that move outside of the field of view while performing a sensor sweep. Informatio...
Jingjin Yu, Steven M. LaValle
NICSO
2010
Springer
13 years 6 months ago
Partial Imitation Rule in Iterated Prisoner Dilemma Game on a Square Lattice
t] A realistic replacement of the general imitation rule in the Iterated Prisoner Dilemma (IPD) is investigated with simulation on square lattice, whereby the player, with finite m...
Degang Wu, Mathis Antony, Kwok Yip Szeto