The current software development process in common use within industry is inefficient, in that the time required to incorporate results from competitive, beta, and previous releas...
The DNS infrastructure is a key component of the Internet and is thus used by a multitude of services, both legitimate and malicious. Recently, several works demonstrated that mali...
Persons may perform an activity in many different styles, or noise may cause an identical activity to have different temporal structures. We present a robust methodology for recog...
Epileptic seizures are characterized by repetitive synchronous neuronal bursting activity. To study external influences on this activity, a simple model of a chain loop of neurona...
Pawel Kudela, Piotr J. Franaszczuk, Gregory K. Ber...
—We consider an agent interacting with an unmodeled environment. At each time, the agent makes an observation, takes an action, and incurs a cost. Its actions can influence futu...
Vivek F. Farias, Ciamac Cyrus Moallemi, Tsachy Wei...