— This paper establishes the equivalence between cognitive medium access and the competitive multi-armed bandit problem. First, the scenario in which a single cognitive user wish...
Lifeng Lai, Hesham El Gamal, Hai Jiang, H. Vincent...
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
—We consider 3D brain structures as continuous parameterized surfaces and present a metric for their comparisons that is invariant to the way they are parameterized. Past compari...
Sebastian Kurtek, Eric Klassen, Zhaohua Ding, Sand...
Abstract—Electric power transmission systems are a key infrastructure, and blackouts of these systems have major consequences for the economy and national security. Analyses of b...
David E. Newman, Benjamin A. Carreras, Vickie E. L...
In this paper we present a case study in deriving an algorithm from a formal specification via FermaT transformations. The general method (which is presented in a separate paper)...