For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Fractional anisotropy (FA), a widely used measure of fiber integrity based on diffusion tensor imaging (DTI), is theoretically confounded by several other quantities including the...
J. J. GadElkarim, Liang Zhan, S. L. Yang, A. F. Zh...
We present a model checker for verifying distributed programs written in the Erlang programming language. Providing a model checker for Erlang is especially rewarding since the la...
— We define the concept of approximate domain optimizer for deterministic and expected value optimization criteria. Roughly speaking, a candidate optimizer is an approximate dom...
Andrea Lecchini-Visintini, John Lygeros, Jan M. Ma...
We provide several new sampling-based estimators of the number of distinct values of an attribute in a relation. We compare these new estimators to estimators from the database an...
Peter J. Haas, Jeffrey F. Naughton, S. Seshadri, L...