Publications
Multimodal Location Estimation.
1245-1251.
(2010). Asymmetric Cost Sharing Mechanisms.
Games and Economic Behavior. 75(1), 139-151.
(2012). An Experiment on Learning with Limited Information: Nonconvergence, Experimentation Cascades, and the Advantage of Being Slow.
Games and Economic Behavior. 47(2), 325-352.
(2004).
(2015). Stochastic Geometric Network Models for Groups of Functional and Structural Connectomes.
NeuroImage. 101,
(2014). Edge correlations in spatial networks.
Journal of Complex Networks. 1-14.
(2016). Fair and Efficient Memory Sharing: Confronting Free Riders.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence.
(2019).
(2015). Directed Progression Brain Networks in Alzheimer's Disease: Properties and Classification.
Brain Connectivity. 4(5), 384-393.
(2014).
(2015).
(2014). Analysis of Diversity-Preserving Mechanisms for Global Exploration.
Evolutionary Computation. 17(4), 455-476.
(2009). Approximating Covering Problems by Randomized Search Heuristics using Multi-Objective Models.
Evolutionary Computation. 18(4), 617-633.
(2010).
(2009). Smoothed Analysis of Balancing Networks.
472-483.
(2009). Smoothed Analysis of Balancing Networks.
In Random Structures and Algorithms. 39(1), 115-138.
(2010). Quasirandom Load Balancing.
1620-1629.
(2010). When to Use Bit-Wise Neutrality.
Natural Computing. 9(1), 283-294.
(2010).
(2009). Plateaus Can Be Harder in Multi-Objective Optimization.
Theoretical Computer Science. 411(6), 854-864.
(2010).
(2008). When is the assignment bound tight for the asymmetric traveling-salesman problem?.
SIAM Journal on Computing. 24(3), 484-493.
(1995).
(1992). A Promise Is A Promise: The Effect Of Commitment Devices On Computer Security Intentions.
Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2019).
(2019). Privacy and Security Threat Models and Mitigation Strategies of Older Adults.
Proceedings of SOUPS '19.
(2019).