Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
We describe a method for the specification and verification of the dynamic behaviour of component systems. Building applications using a component framework allows the developers...
Regression problems on massive data sets are ubiquitous in many application domains including the Internet, earth and space sciences, and finances. In many cases, regression algori...
Real-scale Semantic Web applications, such as Knowledge Portals and E-Marketplaces, require the managementof large volumes of metadata, i.e., information describing the available ...
Gregory Karvounarakis, Sofia Alexaki, Vassilis Chr...
We define a simple collection of operations for creating and manipulating record structures, where records are intended as finite associations of values to labels. A second-order ...