Learn More
The aim of this chapter is to summarise results that have been obtained for high conndence generalization error bounds for the Support Vector Machine (SVM) and other pattern classiiers related to the SVM. As a by-product of the analysis we argue that the margin and number of support vectors are both estimators of the degree to which the distribution(More)
We describe how the SV technique of solving linear operator equations can be applied to the problem of density estimation and how this method makes use of a special type of problem-speciic regularization. We present a new optimization procedure and set of kernels that guarantee the estimate to be a density (be non-negative everywhere and have an integral of(More)
Perceptron Decision Trees (also known as Linear Machine DTs, etc.) are analysed in order that data-dependent Structural Risk Minimization can be applied. Data-dependent analysis is performed which indicates that choosing the maximal margin hyperplanes at the decision nodes will improve the generalization. The analysis uses a novel technique to bound the(More)
We introduce a simple adaptive rule where agents choose a cooperative eeort on a grid. Agents can adjust this eeort step by step and Gains and Losses Adjust Directions. We show that this process converges to the cooperative outcome in a two-person Prisoners' Dilemma game, and we provide simulations showing that the results also holds with a larger number of(More)
This paper presents a general approach for analysis and veriication of authentication properties in CSP. It is illustrated by an examination of the Needham-Schroeder Public-Key protocol. The paper aims to develop a speciic theory appropriate to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach aims(More)
Traditional credential solutions have well-known drawbacks. Purely software-based credentials are vulnerable to many attacks, while hardware-based security tokens and smart cards are expensive to deploy and, due to their typical single-purpose nature, force users to carry multiple hardware credentials with them. Recently, general-purpose security elements(More)
The paper considers the problem of distributed key generation for shared-control RSA schemes. In particular: how can two parties generate a shared RSA key in such a way that neither party can cheat? The answer to this question would have signiicant applications to, for example, key escrow systems. Cocks has recently proposed protocols to solve this problem(More)
Integrated Modular Avionics (IMA) in existing deployments is a collection of inter-connected avionics equipment supported by wired technology, with stringent reliability and safety requirements. If the inter-connecting wires are physically secured so that a malicious user cannot access them directly, then this simplifies the security management of the(More)