We describe a mechanism to create fair and explainable incentives for
so...
This paper addresses the prevalent lack of tools to facilitate and empow...
Given a set of points in the Euclidean space ℝ^ℓ with ℓ>1,
the pairwise ...
Decisions are often based on imprecise, uncertain or vague information.
...
Advanced persistent threats (APT) combine a variety of different attack ...
The Internet of Vehicles (IoV), whereby interconnected vehicles communic...
We study the question of how well machine learning (ML) models trained o...
Robotics is becoming more and more ubiquitous, but the pressure to bring...
The reuse of technologies and inherent complexity of most robotic system...
With its growing use in industry, ROS is rapidly becoming a standard in
...
We consider network graphs G=(V,E) in which adjacent nodes share common
...
In recent years, noticeable progress has been made in the development of...
With more and more devices becoming connectable to the internet, the num...
The increasingly pervasive connectivity of today's information systems b...
When undertaking cyber security risk assessments, we must assign numeric...
The game-theoretic risk management framework put forth in the precursor
...