Filters








17,365 Hits in 8.7 sec

A Game-Theoretic Approach to Information-Flow Control via Protocol Composition

Mário Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi
2018 Entropy  
We then formalize the interplay between defender and attacker in a game-theoretic framework adapted to the specific issues of QIF, where the payoff is information leakage.  ...  In the inference attacks studied in Quantitative Information Flow (QIF), the attacker typically tries to interfere with the system in the attempt to increase its leakage of secret information.  ...  Case study: a safer, faster password-checker In this section we apply our game-theoretic, compositional approach to show how a defender can mitigate an attacker's typical timing side-channel attack, while  ... 
doi:10.3390/e20050382 pmid:33265472 fatcat:dj6iygs25bckjf6lync3jp7d2u

A Modular Decision-centric Approach for Reusable Design Processes

Jitesh H. Panchal, Marco Gero Fernández, Christiaan J. J. Paredis, Janet K. Allen, Farrokh Mistree
2009 Concurrent Engineering - Research and Applications  
activities, and (d) modeling interactions between decision makers using game theoretic protocols.  ...  The proposed approach is based on four foundations: (a) modeling design processes as hierarchical systems, (b) separation of declarative and procedural information, (c) modeling design processes as decision-centric  ...  a President's Fellowship from the Georgia Institute of Technology.  ... 
doi:10.1177/1063293x09102251 fatcat:v4mq35dckzf2va7dqwvrexgq2u

Coordinated Control and Estimation of Multiagent Systems with Engineering Applications

Housheng Su, Michael Z. Q. Chen, Qing Hui, Wei Zhang, Fanglai Zhu
2015 Mathematical Problems in Engineering  
Recently, coordinated control and estimation problems have attracted a great deal of attention in different fields especially in biology, physics, computer science, and control engineering.  ...  This special issue focuses on theoretical and technological achievements in cooperative multiagent Systems. It contains twenty-six papers, the contents of which are summarized below.  ...  Acknowledgments We would like to thank all the authors for their contributions and acknowledge all the reviewers for their time and effort in assessing the manuscripts. Housheng Su Michael Z. Q.  ... 
doi:10.1155/2015/105827 fatcat:ttccz6h36bbsjjj27vxy2mtife

2020 Index IEEE Transactions on Control of Network Systems Vol. 7

2020 IEEE Transactions on Control of Network Systems  
Adaptive Protocol Design For Distributed Tracking With Relative Output Information: A Distributed Fixed-Time Observer Approach.  ...  ., +, TCNS June 2020 842-854 Control nonlinearities Adaptive Protocol Design For Distributed Tracking With Relative Output Information: A Distributed Fixed-Time Observer Approach.  ... 
doi:10.1109/tcns.2020.3048651 fatcat:ydlonetqinfcpaxiy4itp7tsw4

Page 362 of Mathematical Reviews Vol. , Issue 85a [page]

1985 Mathematical Reviews  
In this paper an m-person game is considered with a specific protocol of information flow, viz. each player P; knows what the players P; with j > i are about to choose for their current control.  ...  This reviewer confesses to puzzlement since the concept of value essentially should hold for all protocols of information flow.  ... 

Autonomic Communications: Exploiting Advanced and Game Theoretical Techniques for RAT Selection and Protocol Reconfiguration [chapter]

Eleni Patouni, Sophie Gault, Markus Muck, Nancy Alonistioti, Konstantina Kominaki
2006 Lecture Notes in Computer Science  
Specifically, a game theoretical approach targeted to the definition of appropriate policies for distributed equipment elements is presented.  ...  To this end, this paper proposes an integrated framework that facilitates autonomic features to capture the needs for RAT selection and device reconfiguration in a Composite Radio Environment.  ...  The authors would like to acknowledge the contributions of their colleagues.  ... 
doi:10.1007/11880905_22 fatcat:fzobdjlknnf4dnsjd2g4pss4qu

Enforcing Ideal-World Leakage Bounds in Real-World Secret Sharing MPC Frameworks

Jose Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Hugo Pacheco, Vitor Pereira, Bernardo Portela
2018 2018 IEEE 31st Computer Security Foundations Symposium (CSF)  
We formalize protocol security using (distributed) probabilistic information-flow and prove security-preserving compilation: protocols only leak what is allowed by the source policy.  ...  and then apply a probabilistic preprocessing that brings leakage to the acceptable range. 1 It is possible to express oblivious control-flow by computing all possible outcomes and algebraically selecting  ...  A common approach to expose these constraints is via a standard information flow type system, with MPC-specific public control-flow restrictions (control-flow guards and array access expressions for imperative  ... 
doi:10.1109/csf.2018.00017 dblp:conf/csfw/AlmeidaBB0PP18 fatcat:ek4sejy3brfn7b34j3ozvowk44

Games and Decisions for Rigorous Systems Engineering (Dagstuhl Seminar 12461)

Nikolaj Bjorner, Krishnendu Chatterjee, Laura Kovacs, Rupak M. Majumdar, Marc Herbstritt
2013 Dagstuhl Reports  
The theme of the seminar was close in spirit to many events that have been held over the last decades.  ...  This report documents the program and the outcomes of the Dagstuhl Seminar 12461 "Games and Decisions for Rigorous Systems Engineering".  ...  Using PIA for both data abstraction and a new form of counter abstraction, we reduce the parameterized problem to finite-state model checking.  ... 
doi:10.4230/dagrep.2.11.45 dblp:journals/dagstuhl-reports/BjornerCKM12 fatcat:gs36midqlvfhzky6v7ebawumtq

A Bayesian Game-Theoretic Intrusion Detection System for Hypervisor-Based Software Defined Networks in Smart Grids

Rumaisa Aimen Niazi, Yasir Faheem
2019 IEEE Access  
the source of new flow requests potentially launching a DDoS attack, via compromised switches, as a non-cooperative dynamic Bayesian game of intrusion detection.  ...  Our game model enables a hypervisor to distribute its limited resources to monitor guest vSDN controllers optimally.  ...  In this sub-section, we highlight some of the game-theoretic controller assignment based approaches proposed for the security issues of the control layer in SDNs.  ... 
doi:10.1109/access.2019.2924968 fatcat:uwsha3k4u5bizekxlbcr5snvoq

Compositional Temporal Synthesis

Moshe Y. Vardi
2012 2012 Ninth International Conference on Quantitative Evaluation of Systems  
Theorem: Exponential translation from NWTL to NWBA Automata-Theoretic Approach to Controlflow Synthesis Key Idea Lustig+V, 2009 • Composition tree is bad if it enables a computation that violates  ...  Future Work • Connection to games with incomplete information • Tighter bounds • Better algorithms Software-module composition -exactly one component interacts with environment at one time; on reaching  ...  Controlflow Composition Questions: • If components are probabilistic why not allow probabilistic controlflow? • Is probabilistic controlflow more powerful than deterministic controlflow?  ... 
doi:10.1109/qest.2012.39 dblp:conf/qest/Vardi12 fatcat:7ytzkyl2argdfndnm44zkoly4m

From software verification to 'everyware' verification

Marta Kwiatkowska
2013 Computer Science - Research and Development  
The focus is on a advancing quantitative verification in new and previously unexplored directions, including game-based techniques, incorporation of continuous dynamics in addition to stochasticity, and  ...  online approaches.  ...  Game-theoretic approaches.  ... 
doi:10.1007/s00450-013-0249-1 fatcat:yijv5tfqwjb5rlopsnmy6gpsf4

Grammars for Games: A Gradient-Based, Game-Theoretic Framework for Optimization in Deep Learning

David Balduzzi
2016 Frontiers in Robotics and AI  
The main ingredients of the framework are, thus, unsurprisingly: (i) game theory, to formalize distributed optimization; and (ii) communication protocols, to track the flow of zeroth and first-order information  ...  protocols equipped with first-order convergence guarantees).  ...  Compositionality is formalized via distributed communication protocols and grammars. Grammars for Games Neural networks are constructed by composing a series of elementary operations.  ... 
doi:10.3389/frobt.2015.00039 fatcat:re4eibywmbb7xkcxti47coi5te

Semantics, Representations and Grammars for Deep Learning [article]

David Balduzzi
2015 arXiv   pre-print
The main ingredients of the framework are thus, unsurprisingly: (i) game theory, to formalize distributed optimization; and (ii) communication protocols, to track the flow of zeroth and first-order information  ...  protocols equipped with first-order convergence guarantees).  ...  I am grateful to Marcus Frean, JP Lewis and Brian McWilliams for useful comments and discussions.  ... 
arXiv:1509.08627v1 fatcat:u6tbkcdsafcbhbxlxvyvgtltt4

Non-Zero-Sum-Games and Control (Dagstuhl Seminar 15061)

Krishnendu Chatterjee, Stéphane Lafortune, Nicolas Markey, Wolfgang Thomas, Marc Herbstritt
2015 Dagstuhl Reports  
The area of non-zero-sum games is addressed in a wide range of topics: multi-player games, partial-observation games, quantitative game models, and -as a special focus -connections with control engineering  ...  In this report, the program, research issues, and results of Dagstuhl Seminar 15061 "Non-Zero-Sum-Games and Control" are described.  ...  Infinite games where several players seek to coordinate under imperfect information are known to be intractable, unless the information flow is severely restricted.  ... 
doi:10.4230/dagrep.5.2.1 dblp:journals/dagstuhl-reports/ChatterjeeLMT15 fatcat:3g2k4ej7n5hczbe33yhxrh3h5a

2020 Index IEEE Transactions on Services Computing Vol. 13

2021 IEEE Transactions on Services Computing  
Li, J., +, TSC May-June 2020 478-487 Game-Theoretic Resource Pricing and Provisioning Strategies in Cloud Systems.  ...  -Feb. 2020 172-185 Tendering Game-Theoretic Resource Pricing and Provisioning Strategies in Cloud Systems. Cardellini, V., +, TSC Jan.  ... 
doi:10.1109/tsc.2021.3055723 fatcat:eumbihmezvehxdfbmlp6ufzkwe
« Previous Showing results 1 — 15 out of 17,365 results