Can learning algorithms find a Nash equilibrium? This is a natural question for several reasons. Learning algorithms resemble the behavior of players in many naturally arising gam...
Constantinos Daskalakis, Rafael Frongillo, Christo...
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
In battery powered systems such as wireless sensor networks, energy efficiency is one of the most important system design goals. In this paper, energy efficiency is examined fro...
Context-aware applications use context information, like location or identification of nearby objects of interest, to adapt their behavior to the current situation of the user. The...
Tom Broens, Dick A. C. Quartel, Marten van Sindere...
The increasing popularity of XML Web services motivates us to examine if it is feasible to substitute one vendor service for another when using a Web-based application, assuming th...