Keyphrases
Cake Cutting
94%
Fair Division
89%
NP-hard
83%
Two-party
81%
Maximin Share
72%
Huffman Coding
68%
Hypergraph
61%
Job Rejection
60%
Machine Learning
60%
Secure multi-party Computation
59%
Rainbow
58%
Tight
58%
Dishonest Majority
56%
Metric Space
51%
Dimensionality Reduction
51%
Fibonacci Codes
51%
Processing Time
50%
Wavelet Tree
50%
Compression Performance
50%
Cryptographic
47%
Adversary
45%
Secure Computation
44%
Ridesharing
44%
Envy-freeness
44%
Fair Allocation
43%
Evasion Attack
43%
Coin Flipping
43%
Huffman
43%
Drone
41%
Reinforcement Learning
40%
Coin-flipping Protocols
40%
Secure Two-party Computation
40%
Social Networks
39%
Envy-free
37%
Dense Graphs
37%
HTTP Adaptive Streaming
37%
Quality of Experience
36%
Alphabet Size
35%
Rewriting Codes
35%
Deep Learning
35%
Polynomial Time
35%
Polynomial-time Algorithm
35%
Natural Language
35%
Encrypted Traffic
35%
Antenna
34%
Fairness Notion
33%
Attacker
33%
Huffman Tree
32%
Semi-honest
31%
Smartphone
31%
Dynamic Programming Algorithm
31%
Network Traffic Classification
31%
Three-party
31%
GNSS Device
31%
Quality of Service
31%
Number of Parties
30%
Huffman Encoding
30%
Single Machine
30%
Pseudo-polynomial
29%
Mobile Devices
29%
Euclidean Space
29%
Tight Bounds
28%
Random Access
28%
User Satisfaction
28%
Student Abstracts
28%
Scoring Rules
28%
Star Tracker
28%
Navigation Framework
28%
Manipulator
28%
Hurt
28%
Natural numbers
28%
Mobile Ad Hoc Network (MANET)
28%
Coalitional Manipulation
28%
Secret Sharing Scheme
28%
Wi-Fi
28%
Hyperedge
27%
UAV
27%
Leakage Resilience
27%
Differentially Private
27%
Malware Detection
26%
Coin Tossing
26%
Dynamic Programming
26%
Latency
26%
Pareto Optimal
26%
Approximation Algorithms
26%
Multi-party Computation
26%
Machine Learning Approach
26%
Compression Algorithms
26%
Hemoglobin
26%
Coalition Formation
26%
Rejection Cost
25%
Realistic Scenario
25%
Secure Protocol
25%
Hypervisor
25%
Fair Coin
25%
AI-based Methods
25%
Allocation of Indivisible Goods
25%
Malware
25%
Proportionate Flowshop
25%
Buffer Management
25%
Computer Science
Machine Learning
100%
Learning System
92%
secure multiparty computation
91%
Approximation (Algorithm)
90%
Polynomial Time
78%
Compression Performance
66%
Artificial Intelligence
63%
Processing Time
59%
Efficient Algorithm
58%
Malware
54%
Traffic Classification
52%
Experimental Result
52%
secret sharing scheme
51%
Reinforcement Learning
50%
Proportionality
50%
Huffman Coding
46%
Metric Space
46%
Approximation Algorithms
46%
Attackers
46%
Deep Learning Method
45%
Quality of Service
45%
Convolutional Neural Network
44%
Social Network
43%
Quality-of-Experience
43%
Random Access
43%
Flash Memory
43%
Secret Sharing
40%
Compressed File
39%
Video Streaming
36%
Cryptology
35%
polynomial-time algorithm
34%
Secure Protocol
34%
Field Experiment
32%
Arithmetic Coding
32%
Compression Efficiency
31%
Security Parameter
30%
Security Properties
28%
Signal Strength
28%
Buffer Management
28%
Wi-Fi
28%
Internet Traffic
28%
Coalition Formation
27%
Hypervisor
26%
Space Complexity
26%
Malware Detection
26%
Manipulator
26%
Broadcast Channel
26%
Compressed Form
26%
Neighbour Search
25%
Autonomous Agent
25%
Machine Learning Algorithm
25%
Open Source
24%
Android Malware
24%
Compression Algorithm
24%
Android
23%
Unmanned Aerial Vehicle
23%
Wireless Sensor Network
23%
Detection Rate
22%
Heuristic Solution
21%
Criticality
21%
Sampling Algorithm
21%
Finding Problem
21%
Decoding Error
21%
Control Plane
21%
Software Defined Networking
21%
Private Set Intersection
21%
Data Type
21%
Computational Efficiency
21%
Bipartite Graph
21%
Dynamic Programming
21%
mobile ad-hoc network
21%
Matching Algorithm
21%
Neural Network
19%
Machine Learning Approach
19%
Time Complexity
19%
Cyber Attack
19%
Deep Packet Inspection
19%
Network Topology
18%
Cryptography
18%
Feature Extraction
18%
Feature Selection
18%
Compression Scheme
17%
cooperative game theory
17%
Tracking Algorithm
17%
Access Structure
17%
Learning Agent
17%
Single Machine
17%
Network Infrastructure
17%
Utility Function
17%
Desired Property
17%
Directed Graphs
17%
Mobile Device
17%
Internet-Of-Things
17%
Wireless Network
17%
Fundamental Problem
17%
Coalition Structure
16%
Real-World Problem
16%
Case Study
16%
Simulation Experiment
16%
Sensor Networks
16%