Many non-cooperative settings that could potentially be studied using game theory are characterized by having very large strategy spaces and payoffs that are costly to compute. Be...
This paper presents a new hierarchical simulation algorithm allowing the calculation of radiosity solutions for time-dependent scenes where all motion is known a priori. Such solut...
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under...
We present ADSandbox, an analysis system for malicious websites that focusses on detecting attacks through JavaScript. Since, in contrast to Java, JavaScript does not have any bui...
During persistent surveillance of a given population in a conflict situation, data management can quickly become unwieldy due to the inundation of low-level information from many, ...
Colleen L. Phillips, Norman D. Geddes, Justin T. S...