Game theory has been playing an increasingly visible role in computer science, in areas as diverse as artificial intelligence, theory, and distributed systems, among others. I tak...
We present a structural attack against the Sidelnikov cryptosystem [8]. The attack creates a private key from a given public key. Its running time is subexponential and is effecti...
After a decade of research into the area of Artificial Immune Systems, it is worthwhile to take a step back and reflect on the contributions that the paradigm has brought to the ...
■ Neuroaesthetics is gaining momentum. At this early juncture, it is worth taking stock of where the field is and what lies ahead. Here, I review writings that fall under the ru...
This paper analyzes the clustering of trades on the Australian Stock Exchange (ASX) with respect to the trade direction variable. The ASX is a limit order market operating an elec...