Bio-terror events are accompanied by severe uncertainty: great disparity between the best available data and models, and the actual course of events. We model this uncertainty with...
We present a corpus-based approach for the automation of help-desk responses to users’ email requests. Automation is performed on the basis of the similarity between a request a...
Abstract—In recent years, cost-sensitive intrusion response has gained significant interest, mainly due to its emphasis on the balance between potential damage incurred by the i...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...
In this paper we present a structured methodology for evaluating cost of responses based on three factors: the response operational cost associated with the daily maintenance of t...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...
We consider distributed opportunistic scheduling (DOS) in wireless ad-hoc networks, where many links contend for the same channel using random access. In such networks, distribute...