"Experts algorithms" constitute a methodology for choosing actions repeatedly, when the rewards depend both on the choice of action and on the unknown current state of t...
We present a new technique for generating a formal proof that an access request satisfies accesscontrol policy, for use in logic-based access-control frameworks. Our approach is t...
This paper investigates the problem of how to improve TCP performance in multi-rate Ad-hoc networks with congested links. To improve network performance, different rate adaptation...
Timo Zauner, Luke Haslett, Wen Hu, Sanjay Jha, Cor...
This paper discusses further work on the authors’ “background music reactive games” concept, where background music is used to modify video game parameters and thus actions ...
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...