We analyze the strategic interactions among endusers and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by endusers are strategic subst...
In today’s business environment, deception is commonplace. In hiring situations, successful deception by job candidates can lead to a poor fit between the candidate’s abilitie...
The management of shared caches in multicore processors is a critical and challenging task. Many hardware and OS-based methods have been proposed. However, they may be hardly adop...
Tiling is a crucial loop transformation for generating high performance code on modern architectures. Efficient generation of multilevel tiled code is essential for maximizing da...
Albert Hartono, Muthu Manikandan Baskaran, C&eacut...
This paper explores the impact of television advertisements on audience retention using data collected from television set-top boxes (STBs)1 . In particular, we discuss how the ac...
Yannet Interian, Sundar Dorai-Raj, Igor Naverniouk...