Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
We study the times to grow structures within the tile self-assembly model proposed by Winfree, and the possible shapes that can be achieved. Our earlier work was confined to the g...
Yuliy M. Baryshnikov, Edward G. Coffman Jr., Boons...
We present a novel classification of computer viruses using a formalised notion of reproductive models based on Gibson's theory of affordances. A computer virus reproduction ...
The integration of clusters of computers into computational grids has recently gained the attention of many computational scientists. While considerable progress has been made in ...
Clovis Chapman, Mirco Musolesi, Wolfgang Emmerich,...
The Exhibition Cybernetic Serendipity (London 1968) is often considered to be the first major exhibition of computer art. Nearly forgotten, is an exhibition in Zagreb that also to...