|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 704 occurrences of 484 keywords
|
|
|
Results
Found 28621 publication records. Showing 28621 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
63 | Andrew L. Cohen, Debra Cash, Michael J. Muller |
Designing to support adversarial collaboration. |
CSCW |
2000 |
DBLP DOI BibTeX RDF |
adversarial collaboration, cooperative collaboration, lawyers, privacy, design, documents, collaborative writing, secrecy, collaborative editing |
57 | Michael Langberg |
Private Codes or Succinct Random Codes That Are (Almost) Perfect. |
FOCS |
2004 |
DBLP DOI BibTeX RDF |
|
57 | Marco Barreno, Peter L. Bartlett, Fuching Jack Chi, Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, Udam Saini, J. Doug Tygar |
Open problems in the security of learning. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
adversarial learning, secure learning, machine learning, computer security, security metrics |
53 | Carme Àlvarez, Maria J. Blesa, Josep Díaz, Antonio Fernández 0001, Maria J. Serna |
Adversarial Models for Priority-Based Networks. |
MFCS |
2003 |
DBLP DOI BibTeX RDF |
|
53 | David Gamarnik |
Stability of Adversarial Queues via Fluid Models. |
FOCS |
1998 |
DBLP DOI BibTeX RDF |
scheduling, networks, stability, fluid models |
53 | Gaston L'Huillier, Richard Weber 0002, Nicolás Figueroa |
Online phishing classification using adversarial data mining and signaling games. |
KDD Workshop on CyberSecurity and Intelligence Informatics |
2009 |
DBLP DOI BibTeX RDF |
adversarial classification, games of incomplete information, spam and phishing detection, data mining, game theory, email filtering |
53 | Yi Wang 0035, Shyam Kapadia, Bhaskar Krishnamachari |
Infection spread in wireless networks with random and adversarial node mobilities. |
MobilityModels |
2008 |
DBLP DOI BibTeX RDF |
infection spread, wireless network, random, adversarial, node mobility |
53 | Michal Pechoucek, Jan Tozicka, Martin Rehák |
Towards formal model of adversarial action in multi-agent systems. |
AAMAS |
2006 |
DBLP DOI BibTeX RDF |
adversarial action, cooperation, formal model, competitiveness |
53 | Daniel Lowd, Christopher Meek |
Adversarial learning. |
KDD |
2005 |
DBLP DOI BibTeX RDF |
adversarial classification, spam, linear classifiers |
48 | Baruch Awerbuch, Christian Scheideler |
Towards a scalable and robust DHT. |
SPAA |
2006 |
DBLP DOI BibTeX RDF |
robustness, overlay networks, peer-to-peer systems |
48 | Christophe Tartary |
Ensuring Authentication of Digital Information Using Cryptographic Accumulators. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
Adversarial Channel, Cryptographic Accumulator, Stream Authentication, Polynomial Reconstruction, Erasure Channel |
44 | Cormac Flanagan, Stephen N. Freund |
Adversarial memory for detecting destructive races. |
PLDI |
2010 |
DBLP DOI BibTeX RDF |
concurrency, dynamic analysis, race conditions, relaxed memory models |
44 | Thomas P. Hayes, Jared Saia, Amitabh Trehan |
The forgiving graph: a distributed data structure for low stretch under adversarial attack. |
PODC |
2009 |
DBLP DOI BibTeX RDF |
half-full tree, peer-to-peer, network, data structure, distributed, reconfigurable, self-healing, responsive, stretch, degree |
44 | Andrew W. Eckford, Scott E. T. Hadley |
On Estimating the Topology of an Adversarial Wireless Network. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Ilya Mironov, Moni Naor, Gil Segev 0001 |
Sketching in adversarial environments. |
STOC |
2008 |
DBLP DOI BibTeX RDF |
data stream model., sketch model, massive data sets |
44 | Inon Zuckerman, Sarit Kraus, Jeffrey S. Rosenschein, Gal A. Kaminka |
An adversarial environment model for bounded rational agents in zero-sum interactions. |
AAMAS |
2007 |
DBLP DOI BibTeX RDF |
agents, multiagent systems, modal logic |
44 | Gabriel Istrate, Madhav V. Marathe, S. S. Ravi |
Adversarial Scheduling Analysis of Game-Theoretic Models of Norm Diffusion. |
CiE |
2008 |
DBLP DOI BibTeX RDF |
adversarial scheduling, Markov chains, evolutionary games |
44 | Kerstin Lemke-Rust, Christof Paar |
An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices. |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
Tamper-Proof Hardware, Fault Analysis, Physical Security, Adversarial Model, Tampering, Implementation Attack |
44 | Jay Sethuraman, Chung-Piaw Teo |
Effective Routing and Scheduling in Adversarial Queueing Networks. |
Algorithmica |
2005 |
DBLP DOI BibTeX RDF |
Adversarial networks, Scheduling, Congestion, Multicommodity flow, Fluid model |
41 | Muhammad Aurangzeb Ahmad, Brian Keegan, Sophia D. Sullivan, Dmitri Williams, Jaideep Srivastava, Noshir S. Contractor |
Towards Analyzing Adversarial Behavior in Clandestine Networks. |
Applied Adversarial Reasoning and Risk Modeling |
2011 |
DBLP BibTeX RDF |
|
41 | Boris A. Galitsky, Josep Lluís de la Rosa |
Learning Adversarial Reasoning Patterns in Customer Complaints. |
Applied Adversarial Reasoning and Risk Modeling |
2011 |
DBLP BibTeX RDF |
|
38 | Fredrik Manne, Morten Mjelde, Laurence Pilard, Sébastien Tixeuil |
A New Self-stabilizing Maximal Matching Algorithm. |
SIROCCO |
2007 |
DBLP DOI BibTeX RDF |
|
38 | David Gamarnik |
On deciding stability of constrained random walks and queueing systems. |
SIGMETRICS Perform. Evaluation Rev. |
2001 |
DBLP DOI BibTeX RDF |
|
38 | Fabien Mathieu |
Upper Bounds for Stabilization in Acyclic Preference-Based Systems. |
SSS |
2007 |
DBLP DOI BibTeX RDF |
Preference-based systems, adversarial and round robin daemons, round robin, acyclicity, b-matching |
38 | Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi |
Physical Security Bounds Against Tampering. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
Tamper-Proof Hardware, Fault Prevention, Fault Detection, Error Detection, Fault Analysis, Physical Security, Adversarial Model, Implementation Attack |
38 | Nathaniel Gemelli, Robert Wright, James Lawton, Andrew Boes |
Asynchronous chess competition. |
AAMAS |
2006 |
DBLP DOI BibTeX RDF |
adversarial environments, real-time reasoning, intelligent agents |
36 | Hamidreza Tavafoghi, Yi Ouyang 0002, Demosthenis Teneketzis, Michael P. Wellman |
Game Theoretic Approaches to Cyber Security: Challenges, Results, and Open Problems. |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense |
2019 |
DBLP DOI BibTeX RDF |
|
36 | George Cybenko, Michael P. Wellman, Peng Liu 0005, Minghui Zhu |
Overview of Control and Game Theory in Adaptive Cyber Defenses. |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Massimiliano Albanese, Sushil Jajodia, Sridhar Venkatesan, George Cybenko, Thanh Hong Nguyen |
Adaptive Cyber Defenses for Botnet Detection and Mitigation. |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Benjamin W. Priest, George Cybenko, Satinder Singh 0001, Massimiliano Albanese, Peng Liu 0005 |
Online and Scalable Adaptive Cyber Defense. |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Michael P. Wellman, Thanh Hong Nguyen, Mason Wright |
Empirical Game-Theoretic Methods for Adaptive Cyber-Defense. |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Zhisheng Hu, Ping Chen 0003, Minghui Zhu, Peng Liu 0005 |
Reinforcement Learning for Adaptive Cyber Defense Against Zero-Day Attacks. |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Massimiliano Albanese, Warren Connell, Sridhar Venkatesan, George Cybenko |
Moving Target Defense Quantification. |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Rajesh Ganesan, Ankit Shah 0002, Sushil Jajodia, Hasan Cam |
Optimizing Alert Data Management Processes at a Cyber Security Operations Center. |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Erik Miehling, Mohammad Rasouli 0001, Demosthenis Teneketzis |
Control-Theoretic Approaches to Cyber-Security. |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Ping Chen 0003, Zhisheng Hu, Jun Xu 0024, Minghui Zhu, Rob Erbacher, Sushil Jajodia, Peng Liu 0005 |
MTD Techniques for Memory Protection Against Zero-Day Attacks. |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense |
2019 |
DBLP DOI BibTeX RDF |
|
36 | |
Applied Adversarial Reasoning and Risk Modeling, Papers from the 2011 AAAI Workshop, San Francisco, California, USA, August 7, 2011 |
Applied Adversarial Reasoning and Risk Modeling |
2011 |
DBLP BibTeX RDF |
|
36 | Sam Ganzfried, Tuomas Sandholm, Kevin Waugh |
Strategy Purification. |
Applied Adversarial Reasoning and Risk Modeling |
2011 |
DBLP BibTeX RDF |
|
36 | Octavio Lerma, Vladik Kreinovich, Christopher Kiekintveld |
Linear-Time Resource Allocation in Security Games with Identical Fully Protective Resources. |
Applied Adversarial Reasoning and Risk Modeling |
2011 |
DBLP BibTeX RDF |
|
36 | Manish Jain, Zhengyu Yin, Milind Tambe, Fernando Ordóñez |
Addressing Execution and Observation Error in Security Games. |
Applied Adversarial Reasoning and Risk Modeling |
2011 |
DBLP BibTeX RDF |
|
36 | James Pita, Rong Yang, Milind Tambe, Richard John |
Toward Addressing Human Behavior with Observational Uncertainty in Security Games. |
Applied Adversarial Reasoning and Risk Modeling |
2011 |
DBLP BibTeX RDF |
|
36 | Oswaldo Aguirre, Nicolas Lopez, Eric Gutierrez, Heidi A. Taboada, Jose Epiritu, Christopher Kiekintveld |
Towards the Integration of Multi-Attribute Optimization and Game Theory for Border Security Patrolling Strategies. |
Applied Adversarial Reasoning and Risk Modeling |
2011 |
DBLP BibTeX RDF |
|
36 | Joshua Letchford, Yevgeniy Vorobeychik |
Computing Randomized Security Strategies in Networked Domains. |
Applied Adversarial Reasoning and Risk Modeling |
2011 |
DBLP BibTeX RDF |
|
36 | Maciej M. Latek, Seyed M. Mussavi Rizi |
Robust Decision Making under Strategic Uncertainty in Multiagent Environments. |
Applied Adversarial Reasoning and Risk Modeling |
2011 |
DBLP BibTeX RDF |
|
36 | Thomas J. Walsh 0001, Javad Taheri, Jeremy B. Wright, Paul R. Cohen |
Leadership Games and their Application in Super-Peer Networks. |
Applied Adversarial Reasoning and Risk Modeling |
2011 |
DBLP BibTeX RDF |
|
36 | Daniel Keep, Rachel Bunder, Ian Piper, Anthony Green |
Application of Microsimulation Towards Modelling of Behaviours in Complex Environments. |
Applied Adversarial Reasoning and Risk Modeling |
2011 |
DBLP BibTeX RDF |
|
34 | Marcos A. Kiwi |
Adversarial Queueing Theory Revisited. |
IFIP TCS |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Jay Sethuraman, Chung-Piaw Teo |
Effective Routing and Scheduling in Adversarial Queueing Networks. |
RANDOM-APPROX |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Maria J. Blesa, Daniel Calzada, Antonio Fernández 0001, Luis López, Andrés L. Martínez, Agustín Santos, Maria J. Serna, Christopher Thraves |
Adversarial Queueing Model for Continuous Network Dynamics. |
Theory Comput. Syst. |
2009 |
DBLP DOI BibTeX RDF |
Adversarial queueing theory, Stability of networks, Stability of queueing policies, Packet-switched networks |
34 | Justin King, Kiran Lakkaraju, Adam J. Slagell |
A taxonomy and adversarial model for attacks against network log anonymization. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
network logs, anonymization, taxonomy, adversarial model |
34 | Noa Agmon, Sarit Kraus, Gal A. Kaminka |
Uncertainties in adversarial patrol. |
AAMAS (2) |
2009 |
DBLP BibTeX RDF |
adversarial/game domains, formal models of multi-robot plans, multi-robotics |
34 | Carlos Castillo 0001, Kumar Chellapilla, Dennis Fetterly |
Fourth international workshop on adversarial information retrieval on the web (AIRWeb 2008). |
WWW |
2008 |
DBLP DOI BibTeX RDF |
adversarial information retrieval, search engine spam, spamdexing, web spam |
34 | Jane Holt, Simon Lock |
MARPLE investigates: an 'adversarial' approach to evaluating user experience. |
BCS HCI (2) |
2007 |
DBLP DOI BibTeX RDF |
evaluation, interactive, user experience, subjective, adversarial |
34 | Adi Rosén, Michael S. Tsirkin |
On delivery times in packet networks under adversarial traffic. |
SPAA |
2004 |
DBLP DOI BibTeX RDF |
adversarial queuing theory, delivery time, protocols, stability, packet networks |
34 | Baruch Awerbuch, André Brinkmann, Christian Scheideler |
Anycasting in Adversarial Systems: Routing and Admission Control. |
ICALP |
2003 |
DBLP DOI BibTeX RDF |
Adversarial routing, load balancing, online algorithms, dynamic networks, anycasting |
34 | Zvi Lotker, Boaz Patt-Shamir, Adi Rosén |
New stability results for adversarial queuing. |
SPAA |
2002 |
DBLP DOI BibTeX RDF |
adversarial queuing theory |
34 | Carme Àlvarez, Maria J. Blesa, Maria J. Serna |
Universal stability of undirected graphs in the adversarial queueing model. |
SPAA |
2002 |
DBLP DOI BibTeX RDF |
adversarial queueing, greedy protocols, packet switched networks, network stability |
29 | Baruch Awerbuch, Christian Scheideler |
Towards a Scalable and Robust DHT. |
Theory Comput. Syst. |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Martin Hoefer 0001, Lars Olbrich, Alexander Skopalik |
Doing Good with Spam Is Hard. |
SAGT |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Stefan Zickler, Manuela M. Veloso |
Efficient physics-based planning: sampling search via non-deterministic tactics and skills. |
AAMAS (1) |
2009 |
DBLP BibTeX RDF |
kinodynamic, physics-based, robot, planning, control, behavioral, rigid body, tactics |
29 | Svetlana Radosavac, George V. Moustakides, John S. Baras, Iordanis Koutsopoulos |
An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
min-max robust detection, protocol misbehavior, Wireless networks, MAC layer |
29 | Payman Mohassel, Enav Weinreb |
Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Yinian Mao, Min Wu 0001 |
Tracing Malicious Relays in Cooperative Wireless Communications. |
IEEE Trans. Inf. Forensics Secur. |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Matthew Andrews, Kyomin Jung, Alexander L. Stolyar |
Stability of the max-weight routing and scheduling protocol in dynamic networks and at critical loads. |
STOC |
2007 |
DBLP DOI BibTeX RDF |
scheduling, routing, stability |
29 | Vitaly Feldman, Parikshit Gopalan, Subhash Khot, Ashok Kumar Ponnuswami |
New Results for Learning Noisy Parities and Halfspaces. |
FOCS |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Farzad Parvaresh, Alexander Vardy |
Correcting Errors Beyond the Guruswami-Sudan Radius in Polynomial Time. |
FOCS |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Dimitrios Koukopoulos |
The Impact of Dynamic Link Slowdowns on Network Stability. |
ISPAN |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Avrim Blum, Prasad Chalasani |
Learning Switching Concepts. |
COLT |
1992 |
DBLP DOI BibTeX RDF |
|
29 | Pavel Laskov, Marius Kloft |
A framework for quantitative security analysis of machine learning. |
AISec |
2009 |
DBLP DOI BibTeX RDF |
adversarial learning, centroid anomaly detection, machine learning, intrusion detection, computer security |
29 | Dimitrios Koukopoulos, Stavros D. Nikolopoulos, Leonidas Palios, Paul G. Spirakis |
Optimal Algorithms for Detecting Network Stability. |
WALCOM |
2008 |
DBLP DOI BibTeX RDF |
Packet-switched communication networks, adversarial queueing theory, intrusion detection, graph theory, network stability, linear algorithms |
29 | Bogdan S. Chlebus, Dariusz R. Kowalski, Mariusz A. Rokicki |
Stability of the Multiple-Access Channel Under Maximum Broadcast Loads. |
SSS |
2007 |
DBLP DOI BibTeX RDF |
deterministic broadcast, adversarial queuing, stability, fairness, latency, multiple-access channel |
29 | Sudipto Guha, Andrew McGregor 0001 |
Approximate quantiles and the order of the stream. |
PODS |
2006 |
DBLP DOI BibTeX RDF |
adversarial order, random order, data streams, quantiles |
29 | Venkatesan Guruswami, Piotr Indyk |
Linear time encodable and list decodable codes. |
STOC |
2003 |
DBLP DOI BibTeX RDF |
adversarial noise model, linear time computation, expander graphs, list decoding, spectral partitioning |
29 | Matthew Andrews, Baruch Awerbuch, Antonio Fernández 0001, Frank Thomson Leighton, Zhiyong Liu, Jon M. Kleinberg |
Universal-stability results and performance bounds for greedy contention-resolution protocols. |
J. ACM |
2001 |
DBLP DOI BibTeX RDF |
adversarial queuing theory, packet scheduling, end-to-end delay, network stability |
29 | Osman Abul, Faruk Polat, Reda Alhajj |
Function approximation based multi-agent reinforcement learning. |
ICTAI |
2000 |
DBLP DOI BibTeX RDF |
multi-agent based domain independent coordination mechanisms, coordination information, reward distribution, region-wide joint rewards, Adversarial Food-Collecting World, multi-agent environments, multi-agent systems, learning (artificial intelligence), function approximation, function approximation, state transitions, multi-agent reinforcement learning |
25 | Timothy Jones 0001, Ramesh S. Sankaranarayana, David Hawking, Nick Craswell |
Nullification test collections for web spam and SEO. |
AIRWeb |
2009 |
DBLP DOI BibTeX RDF |
evaluation, test collections, web spam |
25 | Maurice Herlihy, Flavio Paiva Junqueira, Keith Marzullo, Lucia Draque Penso |
Optimizing Threshold Protocols in Adversarial Structures. |
DISC |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Anand D. Sarwate, Michael Gastpar |
Adversarial interference models for multiantenna cooperative systems. |
CISS |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Battista Biggio, Giorgio Fumera, Fabio Roli |
Adversarial Pattern Classification Using Multiple Classifiers and Randomisation. |
SSPR/SPR |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Adam D. Smith |
Scrambling adversarial errors using few random bits, optimal information reconciliation, and better private codes. |
SODA |
2007 |
DBLP BibTeX RDF |
|
25 | Adi Rosén, Michael S. Tsirkin |
On Delivery Times in Packet Networks under Adversarial Traffic. |
Theory Comput. Syst. |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Charu C. Aggarwal, Jian Pei, Bo Zhang 0002 |
On privacy preservation against adversarial data mining. |
KDD |
2006 |
DBLP DOI BibTeX RDF |
data mining, association rules, privacy preservation |
25 | Pierre-Alain Fouque, Antoine Joux, Guillaume Poupard |
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes. |
Selected Areas in Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Allan Borodin, Jon M. Kleinberg, Prabhakar Raghavan, Madhu Sudan 0001, David P. Williamson |
Adversarial queuing theory. |
J. ACM |
2001 |
DBLP DOI BibTeX RDF |
stability, packet routing, scheduling protocols |
25 | J. D. Tygar |
Adversarial Machine Learning. |
IEEE Internet Comput. |
2011 |
DBLP DOI BibTeX RDF |
adversarial machine learning, spam email, machine learning, intrusion detection, computer security |
25 | Deepak Chinavle, Pranam Kolari, Tim Oates 0001, Tim Finin |
Ensembles in adversarial classification for spam. |
CIKM |
2009 |
DBLP DOI BibTeX RDF |
adversarial classification, retraining, spam, ensembles, weblogs, nonstationarity |
25 | Bogdan S. Chlebus, Dariusz R. Kowalski, Mariusz A. Rokicki |
Adversarial queuing on the multiple-access channel. |
PODC |
2006 |
DBLP DOI BibTeX RDF |
adversarial queuing, continuous packet injection, stability, broadcast, multiple-access channel |
19 | Mark Sandler 0002, S. Muthukrishnan 0001 |
Monitoring algorithms for negative feedback systems. |
WWW |
2010 |
DBLP DOI BibTeX RDF |
negative feedback systems, user reputation, probabilistic analysis |
19 | Moshe Babaioff, Liad Blumrosen, Aaron Roth 0001 |
Auctions with online supply. |
EC |
2010 |
DBLP DOI BibTeX RDF |
online supply, truthful auction, approximation, mechanism design |
19 | Wen Ming Liu, Lingyu Wang 0001, Lei Zhang 0004 |
k-jump strategy for preserving privacy in micro-data disclosure. |
ICDT |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Di Ma, Claudio Soriente, Gene Tsudik |
New adversary and new threats: security in unattended sensor networks. |
IEEE Netw. |
2009 |
DBLP DOI BibTeX RDF |
|
19 | David Stynes, Kenneth N. Brown |
Value ordering for quantified CSPs. |
Constraints An Int. J. |
2009 |
DBLP DOI BibTeX RDF |
Value ordering, Quantified CSPs, Backtracking search |
19 | Ji Young Chun, Yong Ho Kim, Jung Yeon Hwang, Dong Hoon Lee 0001 |
Security Enhancing Compiler for Localization Schemes in Pervasive Sensor Networks. |
ACIS-ICIS |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Sudipto Guha, Zhiyi Huang 0002 |
Revisiting the Direct Sum Theorem and Space Lower Bounds in Random Order Streams. |
ICALP (1) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson |
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
Self-Recoverability, Ad Hoc Networks, Authentication, Recognition, Cryptographic Protocols, Pervasive Networks |
19 | Vibhor Rastogi, Michael Hay, Gerome Miklau, Dan Suciu |
Relationship privacy: output perturbation for queries with joins. |
PODS |
2009 |
DBLP DOI BibTeX RDF |
output perturbation, social networks, sensitivity, privacy preserving data mining, join queries, private data analysis |
19 | Shu Chen, Yingying Chen 0001, Wade Trappe |
Exploiting environmental properties for wireless localization. |
ACM SIGMOBILE Mob. Comput. Commun. Rev. |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee |
Alert propagation in mobile ad hoc networks. |
ACM SIGMOBILE Mob. Comput. Commun. Rev. |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Tracey Ho, Ben Leong, Ralf Koetter, Muriel Médard, Michelle Effros, David R. Karger |
Byzantine Modification Detection in Multicast Networks With Random Network Coding. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Yu Zhang, Zang Li, Wade Trappe |
Evaluation of Localization Attacks on Power-Modulated Challenge-Response Systems. |
IEEE Trans. Inf. Forensics Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 28621 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|