The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
We consider a setting in which a principal seeks to induce an adaptive agent to select a target action by providing incentives on one or more actions. The agent maintains a belief...
Yiling Chen, Jerry Kung, David C. Parkes, Ariel D....
Motivation – This research deals with the identification of collective production of a safe radiotherapy treatment and its potential assistance through computer-supported enviro...
Maria Isabel Munoz, Vanina Mollo, Flore Barcellini...
We propose a novel approach for modelling correlations
between activities in a busy public space captured by multiple
non-overlapping and uncalibrated cameras. In our approach,
...
Chen Change Loy (Queen Mary, University of London)...
A key feature of wireless communications is the spatial reuse. However, the spatial aspect is not yet well understood for the purpose of designing efficient spectrum sharing mecha...