: In many prediction problems, including those that arise in computer security and computational finance, the process generating the data is best modeled as an adversary with whom ...
Composed Web service transactions executed in distributed networks often require an atomic execution. Guaranteeing atomicity in mobile networks involves a lot more challenges than ...
This paper presents an overview of the motivation for, and the use of time-series data mining in, a Geospatial Decision Support System (GDSS). Our approach is based on a combinati...
Dan Li, Sherri K. Harms, Steve Goddard, William J....
Determination of credit portfolio loss distributions is essential for the valuation and risk management of multiname credit derivatives such as CDOs. The default time model has re...
Poker is an interesting test-bed for artificial intelligence research. It is a game of imperfect knowledge, where multiple competing agents must deal with risk management, agent m...
Darse Billings, Denis Papp, Jonathan Schaeffer, Du...