From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Game theory for security: Key algorithmic principles, deployed systems, lessons learned., , , и . Allerton Conference, стр. 1822-1829. IEEE, (2012)An output structure for a bi-modal 6.4-Gbps GDDR5 and 2.4-Gbps DDR3 compatible memory interface., , , , , и . CICC, стр. 1-4. IEEE, (2011)A Unique Coupled Common Fixed Point Theorem for Symmetric (φ, ψ)-Contractive Mappings in Ordered G-Metric Spaces with Applications., и . J. Appl. Math., (2013)Expanding impact of mobile health programs: SAHELI for maternal and child care., , , , , , , , , и 1 other автор(ы). AI Mag., 44 (4): 363-376 (декабря 2023)Mixed-Initiative Optimization in Security Games: A Preliminary Report., , , и . AAAI Spring Symposium: Help Me Help You: Bridging the Gaps in Human-Agent Collaboration, AAAI, (2011)Reliability of Hybrid Functionals in Predicting Band Gaps, , и . Phys. Rev. Lett., 107 (21): 216806 (ноября 2011)Securing networks using game theory: algorithms and applications.. AAMAS, стр. 1345-1346. IFAAMAS, (2011)Computing optimal randomized resource allocations for massive security games., , , , , и . AAMAS (1), стр. 689-696. IFAAMAS, (2009)End-to-end estimation of the available bandwidth variation range., и . SIGMETRICS, стр. 265-276. ACM, (2005)End-to-end available bandwidth: measurement methodology, dynamics, and relation with TCP throughput., и . SIGCOMM, стр. 295-308. ACM, (2002)