Mobile devices are increasingly relied on but are used in contexts that put them at risk of physical damage, loss or theft. We consider a fault-tolerance approach that exploits sp...
Thefocus of this workis the computationof efficient strategies for commoditytrading in a multi-marketenvironment. In today's "global economy"commodities are often b...
Milos Hauskrecht, Luis E. Ortiz, Ioannis Tsochanta...
— Robots acting in populated environments must be capable of safe but also time efficient navigation. Trying to completely avoid regions resulting from worst case predictions of...
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Outsourcing of work to support software development and services is seen primarily as a transfer of labor to another shore. But intellectual property, as software, is transferred a...
Gio Wiederhold, Amar Gupta, Rajat Mittal, Erich J....