From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Computing optimal randomized resource allocations for massive security games., , , , , и . AAMAS (1), стр. 689-696. IFAAMAS, (2009)Game theory for security: Key algorithmic principles, deployed systems, lessons learned., , , и . Allerton Conference, стр. 1822-1829. IEEE, (2012)An output structure for a bi-modal 6.4-Gbps GDDR5 and 2.4-Gbps DDR3 compatible memory interface., , , , , и . CICC, стр. 1-4. IEEE, (2011)Mixed-Initiative Optimization in Security Games: A Preliminary Report., , , и . AAAI Spring Symposium: Help Me Help You: Bridging the Gaps in Human-Agent Collaboration, AAAI, (2011)Securing networks using game theory: algorithms and applications.. AAMAS, стр. 1345-1346. IFAAMAS, (2011)Reliability of Hybrid Functionals in Predicting Band Gaps, , и . Phys. Rev. Lett., 107 (21): 216806 (ноября 2011)End-to-end estimation of the available bandwidth variation range., и . SIGMETRICS, стр. 265-276. ACM, (2005)End-to-end available bandwidth: measurement methodology, dynamics, and relation with TCP throughput., и . SIGCOMM, стр. 295-308. ACM, (2002)Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty., , , и . AAAI, стр. 758-763. AAAI Press, (2011)Information Disclosure as a Means to Security., , , и . AAMAS, стр. 645-653. ACM, (2015)