- This paper proposes a novel technique for preventing a wide range of data errors from corrupting the execution of applications. The proposed technique enables automated derivatio...
Karthik Pattabiraman, Giacinto Paolo Saggese, Dani...
Abstract. Changing a consistent ontology may turn the ontology into an inconsistent state. It is the task of an approach supporting ontology evolution to ensure an ontology evolves...
The purpose of algebraic attacks on stream and block ciphers is to recover the secret key by solving an overdefined system of multivariate algebraic equations. They become very eff...
Wedescribe a case study in data miningfor personal loan evaluation, performed at the ABNAMRObank in the Netherlands. Historical data of clients and their pay-backbehaviourare used...
A. J. Feelders, A. J. F. le Loux, J. W. van't Zand
We introduce the notion of sofic tree-shifts which corresponds to symbolic dynamical systems of infinite trees accepted by finite tree automata. We show that, contrary to shifts of...