Skip to search formSkip to main contentSkip to account menu

Computationally bounded adversary

In information theory, the computationally bounded adversary problem is a different way of looking at the problem of sending data over a noisy… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Hands are primary vectors of many communicable diseases because they come in contact with a variety of surfaces and fluids. Acute… 
2017
2017
The capability to verify positions reported by devices is called secure location verification. The majority of the proposed… 
2014
2014
The classic Gibbard-Satterthwaite theorem says that every strategy-proof voting rule with at least three possible candidates must… 
2013
2013
Designing efficient Locally Decodable Codes with constant query complexity has been a central open problem in theoretical… 
2011
2011
We introduce the novel concept of knowledge states. The knowledge state approach can be used to construct competitive randomized… 
2011
2011
Cette these etudie deux aspects d'interaction entre deux joueurs dans le modele du calcul et de la communication quantique… 
2010
2010
This paper presents a minimum generation error (MGE) training method using weighted Euclidean distance measure on line spectral… 
1998
1998
We consider the problem of searching on $m$ current rays for a target of unknown location. It is well-known that the optimal…