Chu and Ho’s recent paper in Artificial Life is riddled with errors. In particular, they use a wrong definition of Robert Rosen’s mechanism. This renders their “critical asse...
The computational potential of artificial living systems can be studied without knowing the algorithms that govern their behavior. Modeling single organisms by means of socalled c...
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
Almost all attempts to monetize internet applications targeted at individuals to date have focused on natural extensions of traditional media or traditional retailing. Most are ei...
How do we build multiagent algorithms for agent interactions with human adversaries? Stackelberg games are natural models for many important applications that involve human intera...