"Computer Science (CS) Unplugged"is an educational method for introducing non-specialists to concepts of CS through hands-on activities that don't require the use o...
Our current understanding of human interaction with hybrid or augmented environments is very limited. Here we focus on `tangible interaction', denoting systems that rely on e...
Abstract. The outlier detection problem has important applications in the field of fraud detection, network robustness analysis, and intrusion detection. Most such applications are...
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
We consider a robust model proposed by Scarf, 1958, for stochastic optimization when only the marginal probabilities of (binary) random variables are given, and the correlation be...