Abstract. The complexity of distributed algorithms, such as state machine replication, motivates the use of formal methods to assist correctness verification. The design of the for...
Abstract. In this paper, we present the design of gVault, a cryptographic network file system that utilizes the data storage provided by Gmail’s web-based email service. Such a ...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
Abstract. We present results of a new approach to detect destructive article revisions, so-called vandalism, in Wikipedia. Vandalism detection is a one-class classification problem...
Abstract. We describe the results of an empirical study comparing an interactive Information Visualization (InfoVis) technique called Gravi++ (GRAVI), Exploratory Data Analysis (ED...
Markus Rester, Margit Pohl, Sylvia Wiltner, Klaus ...
Abstract. Face perception and text reading are two of the most developed visual perceptual skills in humans. Understanding which features in the respective visual patterns make the...
Dingyun Zhu, B. Sumudu U. Mendis, Tom Gedeon, Aksh...