Sciweavers

658 search results - page 50 / 132
» Open problems in the security of learning
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
QSIC
2008
IEEE
14 years 4 months ago
Using Machine Learning to Refine Black-Box Test Specifications and Test Suites
In the context of open source development or software evolution, developers are often faced with test suites which have been developed with no apparent rationale and which may nee...
Lionel C. Briand, Yvan Labiche, Zaheer Bawar
ECAI
2010
Springer
13 years 11 months ago
The Dynamics of Multi-Agent Reinforcement Learning
Abstract. Infinite-horizon multi-agent control processes with nondeterminism and partial state knowledge have particularly interesting properties with respect to adaptive control, ...
Luke Dickens, Krysia Broda, Alessandra Russo
CRYPTO
2004
Springer
119views Cryptology» more  CRYPTO 2004»
14 years 3 months ago
Security of Random Feistel Schemes with 5 or More Rounds
We study cryptographic attacks on random Feistel schemes. We denote by m the number of plaintext/ciphertext pairs, and by k the number of rounds. In their famous paper [3], M. Luby...
Jacques Patarin
P2P
2008
IEEE
149views Communications» more  P2P 2008»
14 years 4 months ago
AREX: An Adaptive System for Secure Resource Access in Mobile P2P Systems
In open environments, such as mobile peer-to-peer systems, participants may need to access resources from unknown users. A critical security concern in such systems is the access ...
Brent Lagesse, Mohan Kumar, Matthew Wright