The growing number of distributed information systems such as the internet has created a need for security in data sharing. When several autonomous parties attempt to share data, t...
Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thur...
We consider opportunistic spectrum access (OSA) strategies for a transmitter in a multichannel wireless system, where a channel may or may not be available and the transmitter must...
The execution time of a large query depends mainly on the memory utilization which should avoid disk accesses for intermediate results. Poor memory management can hurt performance ...
Predicting visual search behavior in human-computer interaction is a challenging problem. It is important for predictive modeling of human-computer interaction to integrate the vi...
We describe a system that successfully transfers value function knowledge across multiple subdomains of realtime strategy games in the context of multiagent reinforcement learning....