This survey studied the expectations of Software Engineering graduate students who took an HCI course, regarding the interaction of engineers and HCI practitioners in their future...
In this paper we consider privacy problems with anonymized transaction databases, i.e., transaction databases where the items are renamed in order to hide sensitive information. In...
Abstract. We describe OBDD-based symbolic model checking algorithms for simply-timed systems, i.e. finite state graphs where transitions carry a duration. These durations can be a...
In usual ICA methods, sources are typically estimated by maximizing a measure of their statistical independence. This paper explains how to perform non-linear ICA by preprocessing ...
We study the triangular representation of zero-dimensional varieties defined over the rational field (resp. a rational function field). We prove polynomial bounds in terms of i...