Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. ...
Every campus department needs computer support, from ordering and setting up new computers to installing software and answering software questions. This is in addition to training...
We presented a paper in Denver that addressed our Remedy design process. At that time we talked about our current development process, but we hadn't implemented the product a...
In this work we use cryptography to solve a game-theoretic problem which arises naturally in the area of two party strategic games. The standard game-theoretic solution concept for...
Dynamic graph connectivity algorithms have been studied for many years, but typically in the most general possible setting, where the graph can evolve in completely arbitrary ways...