Author of the publication

How to Learn an Unknown Environment (Extended Abstract)

, , and . FOCS, page 298-303. IEEE Computer Society, (1991)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algorithmic Aspects of the Core of Combinatorial Optimization Games., , and . Math. Oper. Res., 24 (3): 751-766 (1999)Totally balanced combinatorial optimization games., , , and . Math. Program., 87 (3): 441-452 (2000)Formal Analysis and Systematic Construction of Two-factor Authentication Scheme., , , and . IACR Cryptology ePrint Archive, (2006)Practical Fair Anonymous Undeniable Signatures., , , , and . International Conference on Computational Intelligence, page 510-515. International Computational Intelligence Society, (2004)A Provable Softmax Reputation-Based Protocol for Permissioned Blockchains., , , , , , , and . IEEE Trans. Cloud Comput., 11 (1): 1065-1077 (January 2023)Tight Bound on Incnetive Ratio for Sybil Attack in Resource Sharing System., , , , and . IEEE Trans. Cloud Comput., 10 (2): 913-924 (2022)Settling the complexity of computing two-player Nash equilibria., , and . J. ACM, 56 (3): 14:1-14:57 (2009)Safeguard against unicode attacks: generation and applications of UC-simlist., , , and . WWW, page 917-918. ACM, (2006)Non-clairvoyant Multiprocessor Scheduling of Jobs with Changing Execution Characteristics (Extended Abstract)., , , and . STOC, page 120-129. ACM, (1997)Exposing Homograph Obfuscation Intentions by Coloring Unicode Strings., , and . APWeb, volume 4976 of Lecture Notes in Computer Science, page 275-286. Springer, (2008)