In this paper, we describe a pervasive treasure hunting game: “Team exploration” based on the Transhumance ad hoc wifi platform. The testers of this game came up with innovati...
Annie Gentes, Aude Guyot-Mbodji, Isabelle M. Demeu...
In project management, most manufacturers (project managers) offer no delayed payment contracts under which each supplier (contractor) will receive a pre-specified payment when ...
H. Dharma Kwon, Steven A. Lippman, Kevin F. McCard...
Reinforcement learning models generally assume that a stimulus is presented that allows a learner to unambiguously identify the state of nature, and the reward received is drawn f...
Tobias Larsen, David S. Leslie, Edmund J. Collins,...
The Java language lacks the important notions of ownership (an object owns its representation to prevent unwanted aliasing) and immutability (the division into mutable, immutable,...
Yoav Zibin, Alex Potanin, Paley Li, Mahmood Ali, M...
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers ...