To optimize network performance, cloud service providers have a number of options available to them, including co-locating production servers in well-connected Internet eXchange (...
Traditional agreement-based Byzantine fault-tolerant (BFT) systems process all requests on all replicas to ensure consistency. In addition to the overhead for BFT protocol and sta...
This paper presents results from experiments, mathematical analysis, and simulations of a network of static and mobile sensors for detecting threats on city streets and in open ar...
—This paper introduces a square-root velocity (SRV) representation for analyzing shapes of curves in Euclidean spaces under an elastic metric. Due to this SRV representation the ...
Anuj Srivastava, Eric Klassen, Shantanu H. Joshi, ...
Motivated by a machine learning perspective—that gametheoretic equilibria constraints should serve as guidelines for predicting agents’ strategies, we introduce maximum causal...