How do we build algorithms for agent interactions with human adversaries? Stackelberg games are natural models for many important applications that involve human interaction, such...
James Pita, Manish Jain, Milind Tambe, Fernando Or...
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Abstract— MobilitY and CollAboRative Work in European Vehicle Emergency NeTworks (MYCAREVENT) is an European Project of the 6th Framework Program [1], and aims to optimize the Eu...
Erik Weiss, M. Muehleisen, Carl-Herbert Rokitansky...
Middleware is often built using a layered architectural style. Layered design provides good separation of the different concerns of middleware, such as communication, marshaling, ...