Internet users are often victimized by malicious attackers. Some attackers infect and use innocent users’ machines to launch large‐scale attacks without the users’ knowledge. One…
The increasing traffic volume and new requirements of highly scalable and efficient distribution of contents exceed the capabilities of the current Internet architecture. Information centric…
We identify new astrophysical signatures of dark matter that implodes neutron stars (NSs), which could decisively test whether NS-imploding dark matter is responsible for missing…
Predictive resource allocation (PRA) has gained momentum in the network research community as a way to cope with the exponential increase in video traffic. Existing…
How well can a cryptocurrency serve as a means of payment? We study the optimal design of cryptocurrencies and assess quantitatively how well such currencies…
In a unified form, this monograph presents fundamental results on the approximation of centralized and decentralized stochastic control problems, with uncountable state, measurement, and action…
Networked control systems are increasingly ubiquitous today, with applications ranging from vehicle communication and adaptive power grids to space exploration and economics. The optimal design…
In this title, we leap into a novel paradigm of scalability and cost-effectiveness, on the basis of resource reuse. In a world with much abundance…
This is a collaborative project funded by IBM and the CIMVHR. Academic collaborators in this project are the Schools of Family Medicine at both the University…
Several next-generation experiments aim to make the first measurement of the neutrino flux from the Carbon-Nitrogen-Oxygen (CNO) solar fusion cycle. We calculate how much time…