Abstract. In this paper, we study the soundness amplification by repetition of cryptographic protocols. As a tool, we use the Chernoff Information. We specify the number of attempt...
Automated synthesis of monitors from high-level properties plays a significant role in assertion-based verification. We present here a methodology to synthesize assertion monitors...
The lack of an appropriate external data model is one of the reasons for the dearth of eective network management applications. Many network management computations over Managemen...
We present a new approach to information fusion of web data sources. It is based on peer-to-peer mappings between sources and utilizes correspondences between their instances. Suc...
Erhard Rahm, Andreas Thor, David Aumueller, Hong H...
— Team politics complicate software projects. They cause internal conflicts that can not only cost a software team time and money, but may also detract from the needs of the prod...
Jeremy T. Barksdale, Eric D. Ragan, D. Scott McCri...