منابع مشابه
Learning Consensus in Adversarial Environments
Due to the highly uncertain and dynamic nature of military conflict, enabling autonomous agents to gracefully adapt to mission and environmental changes is a very challenging task. These capabilities are necessary in the asymmetric battles waged against insurgencies, where enemy combatants quickly adapt to Army strategies and tactics. The United States Army, Air Force, and Navy have recently sh...
متن کاملRandomized Sensing in Adversarial Environments
How should we manage a sensor network to optimally guard security-critical infrastructure? How should we coordinate search and rescue helicopters to best locate survivors after a major disaster? In both applications, we would like to control sensing resources in uncertain, adversarial environments. In this paper, we introduce RSENSE, an efficient algorithm which guarantees near-optimal randomiz...
متن کاملBloom Filters in Adversarial Environments
A Bloom filter represents a set S of elements approximately, by using fewer bits than a precise representation. The price for succinctness is allowing some errors: for any x ∈ S it should always answer ‘Yes’, and for any x / ∈ S it should answer ‘Yes’ only with small probability. The latter are called false positive errors. In this work we study the possibility of Bloom filters in a stronger se...
متن کاملMulti-Agent Collaboration in Adversarial Environments∗
This paper presents a strategy for developing distributed algorithms for a class of problems by representing the problems as constrained optimizations and then employing a generic technique for deriving distributed optimization algorithms. In the distributed constrained optimization algorithm, multiple agents collaborate to optimize global, system-wide, objective functions while satisfying glob...
متن کاملNetwork Utility Maximization in Adversarial Environments
Stochastic models have been dominant in network optimization theory for over two decades, due to their analytical tractability. However, these models fail to capture non-stationary or even adversarial network dynamics which are of increasing importance for modeling the behavior of networks under malicious attacks or characterizing short-term transient behavior. In this paper, we consider the ne...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Automatic Control
سال: 2014
ISSN: 0018-9286,1558-2523
DOI: 10.1109/tac.2014.2351671