We revisit the classical chase procedure, studying its properties as well as its applicability to standard database problems. We settle (in the negative) the open problem of decid...
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverâ€...
We show how to efï¬ciently evaluate generic map-ï¬lter-product queries, generalizations of select-project-join (SPJ) queries in relational algebra, based on a combination of two...
—Multi-agent systems are difï¬cult to develop. One reason for this is that agents are embedded in a society where all agents must agree to obey certain social norms in order for...
In the embedded domain, custom hardware in the form of ASICs is often used to implement critical parts of applications when performance and energy efï¬ciency goals cannot be met ...
Kevin Fan, Hyunchul Park, Manjunath Kudlur, Scott ...