Sciweavers

89222 search results - page 17764 / 17845
» Which
Sort
View
ASIACRYPT
2011
Springer
14 years 3 months ago
Leakage-Resilient Cryptography from the Inner-Product Extractor
We present a generic method to secure various widely-used cryptosystems against arbitrary side-channel leakage, as long as the leakage adheres three restrictions: first, it is bou...
Stefan Dziembowski, Sebastian Faust
137
Voted
ATAL
2011
Springer
14 years 3 months ago
GUARDS: game theoretic security allocation on a national scale
Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...
ATAL
2011
Springer
14 years 3 months ago
Commitments with regulations: reasoning about safety and control in REGULA
Commitments provide a flexible means for specifying the business relationships among autonomous and heterogeneous agents, and lead to a natural way of enacting such relationships...
Elisa Marengo, Matteo Baldoni, Cristina Baroglio, ...
247
Voted
CADE
2011
Springer
14 years 3 months ago
Experimenting with Deduction Modulo
Deduction modulo is a generic framework to describe proofs in a theory better than using raw axioms. This is done by presenting the theory through rules rewriting terms and proposi...
Guillaume Burel
190
Voted
CANDC
2011
ACM
14 years 3 months ago
Understanding exploratory creativity in a visual domain
This paper describes a computerized aesthetic composition task that is based on a “creativity as search” metaphor. The technique collects detailed, moment-to-moment data about...
Kyle E. Jennings, Dean Keith Simonton, Stephen E. ...
« Prev « First page 17764 / 17845 Last » Next »