—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Abstract—In this contribution we present a numerical approach to evaluate the bit error rate and mutual information of OFDM links affected by transmitter nonlinearities, phase no...
Hofmann and Jost have presented a heap space analysis [1] that finds linear space bounds for many functional programs. It uses an amortised analysis: assigning hypothetical amount...
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
In many applications involving composite Web services, one or more component services may become unavailable. This presents us with the problem of identifying other components tha...