We present a probabilistic program-transformation algorithm to render a given program tamper-resistant. In addition, we suggest a model to estimate the required effort for an atta...
Nenad Dedic, Mariusz H. Jakubowski, Ramarathnam Ve...
— This paper studies multicast application overlay networks in a repeated-game framework. In these overlays, users have both the motivation and the means to alter their position...
Abstract—We describe and analyze emergent behavior and its effect for a class of preypredators’ simulation models. The simulation uses rule-based agent behavior and follows a p...
Seongdong Kim, Christoph Hoffmann, Varun Ramachand...
We have created a math learning environment with game-like elements such as narrative, visual feedback, personalization, collection, etc. We made a study with four different versio...
A better understanding of strategies and behavior of successful searchers is crucial for improving the experience of all searchers. However, research of search behavior has been s...