We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
— Simulation is frequently used in the study of multi-agent systems. Unfortunately, in many cases, it is not necessarily clear how faithfully the details of the simulated model r...
Christopher M. Cianci, Jim Pugh, Alcherio Martinol...
Abstract. This paper argues that the driving task exhibits the properties of complex systems. Driving behavior emerges from the intricate and complex interactions between the drive...
Abstract—Analysis and verification environments for nextgeneration nano-scale RFIC designs must be able to cope with increasing design complexity and to account for new effects,...
Jorge Fernandez Villena, Wil H. A. Schilders, L. M...
We believe that with regard to the information technology applications in education, one student one computing device will be the future and long-term trend. Many related studies ...