This paper describes a project aiming at enhancing social tagging with reasoning and explanations. So as to keep with the ease of use characteristic of social media, simple explana...
This paper addresses a new threat to the security of integrated circuits (ICs). The migration of IC fabrication to untrusted foundries has made ICs vulnerable to malicious alterat...
Xiaoxiao Wang, Hassan Salmani, Mohammad Tehranipoo...
We introduce the notion of fault tolerant mechanism design, which extends the standard game theoretic framework of mechanism design to allow for uncertainty about execution. Speci...
Ryan Porter, Amir Ronen, Yoav Shoham, Moshe Tennen...
The rapid growth of the Internet has triggered an explosion in the number of applications that leverage its capabilities. Unfortunately, many are designed to burden o infrastructur...
Abstract—Recently, it has been shown that a simple, distributed CSMA algorithm is throughput-optimal. However, throughput-optimality is established under the perfect or ideal car...
Tae Hyun Kim 0001, Jian Ni, R. Srikant, Nitin H. V...