Author of the publication

PIE: A Data-Driven Payoff Inference Engine for Strategic Security Applications.

, , , , , , and . IEEE Trans. Comput. Soc. Syst., 7 (1): 42-57 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Frugal Auction Design for Set Systems: Vertex Cover and Knapsack., , and . EC, page 645-662. ACM, (2018)Exponential Speedup of Fixed-Parameter Algorithms on K3, 3-Minor-Free or K5-Minor-Free Graphs., , and . ISAAC, volume 2518 of Lecture Notes in Computer Science, page 262-273. Springer, (2002)Multi-VPN Optimization for Scalable Routing via Relaying., , , and . INFOCOM, page 2756-2760. IEEE, (2009)Length-constrained path-matchings in graphs., , , and . Networks, 39 (4): 210-215 (2002)A note on the Consecutive Ones Submatrix problem., and . Inf. Process. Lett., 83 (3): 163-166 (2002)Random MAX SAT, random MAX CUT, and their phase transitions., , , and . SODA, page 364-373. ACM/SIAM, (2003)Online client-server load balancing without global information., , , and . SODA, page 197-206. SIAM, (2005)The prize-collecting generalized steiner tree problem via a new approach of primal-dual schema., and . SODA, page 631-640. ACM Press, (2006)Combination can be hard: approximability of the unique coverage problem., , , and . SODA, page 162-171. ACM Press, (2006)Exponential Speedup of Fixed-Parameter Algorithms for Classes of Graphs Excluding Single-Crossing Graphs as Minors., , and . Algorithmica, 41 (4): 245-267 (2005)