Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric key setting. Information theoretic bounds on the success probability...
Abstract. Traditional workflow enactment systems and workflow design processes view the workflow as a one-time interaction with the various data sources, executing a series of step...
Panayiotis Neophytou, Panos K. Chrysanthis, Alexan...
Background: Many commonly used genome browsers display sequence annotations and related attributes as horizontal data tracks that can be toggled on and off according to user prefe...
Mary E. Dolan, Constance C. Holden, M. Kate Beard,...
Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Abstract. Data stream systems execute a dynamic workload of longrunning and one-time queries, with the streaming inputs typically bounded by sliding windows. For efficiency, window...