Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Database application programs typically contain program units that use SQL statements to manipulate records in database instances. Testing the correctness of data manipulation by ...
Abstract--Recent works proposed the adoption of a natureinspired approach of chemistry for implementing service architectures suitable for pervasive applications [34]. In particula...
Elena Nardini, Mirko Viroli, Matteo Casadei, Andre...
In this work we examine the time-resolved, instantaneous current response for the spinless Falicov-Kimball model at half-filling, on both sides of the Mott-Hubbard metal-insulato...
Working within the decision-theoretic framework for causal inference, we study the properties of "sufficient covariates", which support causal inference from observation...