Abstract. In this paper, we test some of the most commonly used classifiers to identify which ones are the most robust to changing environments. The environment may change over tim...
Houman Abbasian, Chris Drummond, Nathalie Japkowic...
The most widely used technique for IP geolocation consists in building a database to keep the mapping between IP blocks and a geographic location. Several databases are available ...
This paper considers the problem of matrix completion, when some number of the columns are arbitrarily corrupted, potentially by a malicious adversary. It is well-known that stand...
A 3D pendulum consists of a rigid body, supported at a fixed pivot, with three rotational degrees of freedom. The pendulum is acted on by a gravitational force. Symmetry assumptio...
Nalin A. Chaturvedi, Taeyoung Lee, Melvin Leok, N....
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...