 |
|
|
|
|
 Lectures in Game Theory for Computer Scientists
Game playing is a powerful metaphor that fits many situations where interaction
between autonomous agents plays a central role. Numerous tasks
in computer science, such as design, synthesis, verification, testing, query
evaluation, planning, etc. can be formulated in game-theoretic terms. Viewing
them abstractly as games reveals the... |  |  The History of Information Security: A Comprehensive Handbook
Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.
... |  |  |
|
|
|
|
Result Page: 4 3 2 1 |