—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
— Effective use of support vector machines (SVMs) in classification necessitates the appropriate choice of a kernel. Designing problem specific kernels involves the definition...
Steinn Gudmundsson, Thomas Philip Runarsson, Sven ...
: This paper discusses the user-centered location model used in comMotion. In this context, the location model refers to a set of learned places (destinations), which coincide to a...
This paper discusses a new work-scheduling algorithm for parallel search of single-agent state spaces, called Transposition-Table-Driven Work Scheduling, that places the transposit...
John W. Romein, Henri E. Bal, Jonathan Schaeffer, ...
This paper introduces the notion of witnessed presence arguing that the performative act of witnessing presence is fundamental to dynamics of negotiating trust and truth. As the a...