Anomaly detection holds great potential for detecting previously unknown attacks. In order to be effective in a practical environment, anomaly detection systems have to be capable...
Routing is a black art in today's Internet. End users and ISPs alike have little control over how their packets are handled outside of their networks, stemming in part from l...
The rise of computer-based online learning represents either the most exciting and versatile educational technology ever or the first stage of an unrelenting boom and bust cycle (...
This paper presents the design and pricing of financial contracts for the supply and procurement of interruptible electricity service. While the contract forms and pricing methodo...
Abstract— We introduce a method for fast and accurate registration of multiple horizontal laser scans obtained by a mobile robot. The method is based on novel representation of t...