We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
In recent years, we have developed an icon-based communication interface to represent concepts and ideas. Users can create messages to communicate with others using a spatial arran...
— Management of power and other resources that effect field life is an important consideration in sensor networks. This paper presents and compares alternative agent paradigms ap...
For the World Wide Web, the Transmission Control Protocol (TCP) and the HyperText Transfer Protocol (HTTP) are two important protocols. However, interactions between these two pro...
Hybrid system modeling refers to the construction of system models combining both continuous and discrete dynamics. These models can greatly reduce the complexity of a phystem mod...