Manish Jain

According to our database1, Manish Jain authored at least 67 papers between 2002 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
CoFFEE: Corrections For Formation Energy and Eigenvalues for charged defect simulations.
Computer Physics Communications, 2018

PASTA: Python Algorithms for Searching Transition stAtes.
Computer Physics Communications, 2018

2016
Heterogeneous 3-D circuits: Integrating free-space optics with CMOS.
Microelectronics Journal, 2016

Keeping Pace with Criminals: An Extended Study of Designing Patrol Allocation against Adaptive Opportunistic Criminals.
Games, 2016

Modeling HTTP/2 Speed from HTTP/1 Traces.
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016

2015
Efficient solutions for joint activity based security games: fast algorithms, results and a field experiment on a transit system.
Autonomous Agents and Multi-Agent Systems, 2015

The Importance of Being Isolated: An Empirical Study on Chromium Reviews.
Proceedings of the 2015 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2015

Learning, Predicting and Planning against Crime: Demonstration Based on Real Urban Crime Data (Demonstration).
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Information Disclosure as a Means to Security.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

2014
Computational Game Theory for Security and Sustainability.
JIP, 2014

Reports of the 2014 AAAI Spring Symposium Series.
AI Magazine, 2014

Dynamic allocation of security resources for protecting public events.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

Game-Theoretic Resource Allocation for Protecting Large Public Events.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
Security Games Applied to Real-World: Research Contributions and Challenges.
Proceedings of the Moving Target Defense II, 2013

A Unique Coupled Common Fixed Point Theorem for Symmetric (φ, ψ)-Contractive Mappings in Ordered G-Metric Spaces with Applications.
J. Applied Mathematics, 2013

Mitigating multi-path fading in a mobile mesh network.
Ad Hoc Networks, 2013

Efficiently Solving Joint Activity Based Security Games.
Proceedings of the IJCAI 2013, 2013

Security scheduling for real-world networks.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

2012
A Tri-Modal 20-Gbps/Link Differential/DDR3/GDDR5 Memory Interface.
J. Solid-State Circuits, 2012

A 12.8-Gb/s/link Tri-Modal Single-Ended Memory Interface.
J. Solid-State Circuits, 2012

Coupled Fixed Point Theorems for a Pair of Weakly Compatible Maps along with CLRg Property in Fuzzy Metric Spaces.
J. Applied Mathematics, 2012

BerkeleyGW: A massively parallel computer package for the calculation of the quasiparticle and optical properties of materials and nanostructures.
Computer Physics Communications, 2012

An Overview of Recent Application Trends at the AAMAS Conference: Security, Sustainability and Safety.
AI Magazine, 2012

Reports of the AAAI 2012 Spring Symposia.
AI Magazine, 2012

Game theory for security: Key algorithmic principles, deployed systems, lessons learned.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

Game-theoretic resource allocation for malicious packet detection in computer networks.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

A Study of Phase Transitions in Security Games.
Proceedings of the Game Theory for Security, 2012

The Deployment-to-Saturation Ratio in Security Games.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

2011
Distributed on-Line Multi-Agent Optimization under Uncertainty: Balancing Exploration and Exploitation.
Advances in Complex Systems, 2011

Parameter Estimation and Tracking in Physical Layer Network Coding.
Proceedings of the Global Communications Conference, 2011

An output structure for a bi-modal 6.4-Gbps GDDR5 and 2.4-Gbps DDR3 compatible memory interface.
Proceedings of the 2011 IEEE Custom Integrated Circuits Conference, 2011

A double oracle algorithm for zero-sum security games on graphs.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

Securing networks using game theory: algorithms and applications.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

Game Theory and Human Behavior: Challenges in Security and Sustainability.
Proceedings of the Algorithmic Decision Theory - Second International Conference, 2011

Mixed-Initiative Optimization in Security Games: A Preliminary Report.
Proceedings of the Help Me Help You: Bridging the Gaps in Human-Agent Collaboration, 2011

Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty.
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011

Addressing Execution and Observation Error in Security Games.
Proceedings of the Applied Adversarial Reasoning and Risk Modeling, 2011

2010
Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service.
Interfaces, 2010

Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition.
Artif. Intell., 2010

An intra-chip free-space optical interconnect.
Proceedings of the 37th International Symposium on Computer Architecture (ISCA 2010), 2010

A Case for WiFi Relay: Improving VoIP Quality for WiFi Users.
Proceedings of IEEE International Conference on Communications, 2010

Hybrid Window and Rate Based Congestion Control for Delay Sensitive Applications.
Proceedings of the Global Communications Conference, 2010

When should there be a "Me" in "Team"?: distributed multi-agent optimization under uncertainty.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

Security Games with Arbitrary Schedules: A Branch and Price Approach.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

2009
Security applications: lessons of real-world deployment.
SIGecom Exchanges, 2009

Using Game Theory for Los Angeles Airport Security.
AI Magazine, 2009

Reduction of Current Mismatch in PLL Charge Pump.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2009

DCOPs Meet the Real World: Exploring Unknown Reward Matrices with Applications to Mobile Sensor Networks.
Proceedings of the IJCAI 2009, 2009

Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

Computing optimal randomized resource allocations for massive security games.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

2008
Bayesian stackelberg games and their application for security at Los Angeles international airport.
SIGecom Exchanges, 2008

QoS-guaranteed path selection algorithm for service composition.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008

Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

On k-optimal distributed constraint optimization algorithms: new bounds and algorithms.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

ARMOR Security for Los Angeles International Airport.
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, 2008

2007
Efficient first-principles calculations of the electronic structure of periodic systems.
Computer Physics Communications, 2007

A 2.5Gbps Quad CMOS Transceiver Cell Using Regulated Supply Low Jitter PLL.
Proceedings of the 20th International Conference on VLSI Design (VLSI Design 2007), 2007

Path Selection Using Available Bandwidth Estimation in Overlay-Based Video Streaming.
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007

Towards simulating billions of agents in thousands of seconds.
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007

2006
QoS-Guaranteed Path Selection Algorithm for Service Composition.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

2005
End-to-end estimation of the available bandwidth variation range.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2005

2004
Effects of Interrupt Coalescence on Network Measurements.
Proceedings of the Passive and Active Network Measurement, 5th International Workshop, 2004

Ten fallacies and pitfalls on end-to-end available bandwidth estimation.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

OnlineEducator 2.0: A Complete ITPlatform to Create, Administer, Analyze, and Transmit Online Exams.
Proceedings of the 7th IASTED International Conference on Computers and Advanced Technology in Education, 2004

2003
Socket Buffer Auto-Sizing for High-Performance Data Transfers.
J. Grid Comput., 2003

2002
End-to-end available bandwidth: measurement methodology, dynamics, and relation with TCP throughput.
Proceedings of the ACM SIGCOMM 2002 Conference on Applications, 2002


  Loading...