The description of software architectures has always been concerned with the definition of the appropriate languages for designing the various architectural artifacts. Over the pa...
In this paper, we propose an adaptive collusion attack to a block oriented watermarking scheme [1]. In this attack, traitors conspire to selectively manipulate watermarked blocks t...
Abstract A divide-and-conquer algorithm for computing the parametric yield of large analog circuits is presented. The algorithm targets applications whose performance spreads could...
Graphical models are usually learned without regard to the cost of doing inference with them. As a result, even if a good model is learned, it may perform poorly at prediction, be...
: We consider two mechanisms to procure differentiated goods: the request for quote and an English auction with bidding credits. In the request for quote, each seller submits a pri...