The growing number of distributed information systems such as the internet has created a need for security in data sharing. When several autonomous parties attempt to share data, t...
Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thur...
Adaptation to other initially unknown agents often requires computing an effective counter-strategy. In the Bayesian paradigm, one must find a good counterstrategy to the inferre...
Michael Johanson, Martin Zinkevich, Michael H. Bow...
In the context of the emergence of alternative computing resources to address the challenge of the upcoming end of Moore’s law, we consider the feasibility of gathering computat...
A novel state-space model of a multi-node supply chain is presented, controlled via local proportional inventory-replenishment policies. The model is driven by a stochastic sequen...
We describe algorithms to implement fully dynamic and kinetic three-dimensional unconstrained Delaunay triangulations, where the time evolution of the triangulation is not only go...