This paper examines the investment behaviour of an incumbent and a potential entrant that are competing for a patent with a stochastic payo . We incorporate asymmetric information...
Abstract— This paper proposes a novel mechanism for protecting sensitive information inside big organisations against unauthorised disclosure by insider or outsider adversaries. ...
We apply sensitivity analysis to the design and control of a tendon transmission. With this approach, some prefered values for the system parameters and a feedback compensator can...
This research aims at reconciling web personalization with privacy constraints imposed by legal restrictions and by users’ privacy preferences. We propose a software product line...
Discovering frequent patterns from data is a popular exploratory technique in data mining. However, if the data are sensitive (e.g. patient health records, user behavior records) ...
Raghav Bhaskar, Srivatsan Laxman, Adam Smith, Abhr...