In his seminal result, Cleve [STOC’86] established that secure distributed computation— guaranteeing fairness—is impossible in the presence of dishonest majorities. A genero...
In this work, we use algebraic methods for studying distance computation and subgraph detection tasks in the congested clique model. Specifically, we adapt parallel matrix multipl...
Keren Censor-Hillel, Petteri Kaski, Janne H. Korho...
—Debugging is crucial for producing reliable software. One of the effective bug localization techniques is SpectralBased Fault Localization (SBFL). It locates a buggy statement b...
—Human-induced faults play a large role in systems reliability. In cloud platforms, system administrators may inadvertently make catastrophic mistakes, like deleting a virtual di...
An important architectural challenge is to recover traceability links between the software architecture and artifacts produced in the other activities of the development process, ...