We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
— Behavioural theory is typically developed on the double time axis. On the other hand it is known that there are intrinsic difficulties with double time axis theorems in the in...
—We propose a new approach to evaluate the ultimate performance limit of time synchronization in wireless sensor networks based on the estimation theory. In particular the lower ...
We present a randomised polynomial time algorithm for approximating the volume of a convex body K in n-dimensional Euclidean space. The proof of correctness of the algorithm relie...
Identifying and controlling bias is a key problem in empirical sciences. Causal diagram theory provides graphical criteria for deciding whether and how causal effects can be iden...