In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a comp...
There is an increasing need for various web-service, e-commerce and e-business sites to provide personalized recommendations to on-line customers. This paper proposes a new type o...
We extend the lower bounds on the complexity of computing Betti numbers proved in [6] to complex algebraic varieties. More precisely, we first prove that the problem of deciding ...
We consider submodular optimization problems, and provide a general way of translating oracle inapproximability results arising from the symmetry gap technique to computational co...
Situated design computing is an approach to the use of computers in design based on situated cognition. It is founded on two concepts: situatedness and constructive memory. These h...