We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
In chip multiprocessors (CMPs), data accesslatency dependson the memory hierarchy organization, the on-chip interconnect (NoC), and the running workload. Reducing data access late...
Numerous tools have been proposed to help developers fix software errors and inefficiencies. Widely-used techniques such as memory checking suffer from overheads that limit thei...
Joseph L. Greathouse, Hongyi Xin, Yixin Luo, Todd ...
Biological network analysis often aims at the target identification problem, which is to predict which molecule to inhibit (or activate) for a disease treatment to achieve optimu...
Huey-Eng Chua, Sourav S. Bhowmick, Lisa Tucker-Kel...
The organisational specification of a multi-agent system supports agents’ effectiveness in attaining their purpose, or prevent certain undesired behaviour from occurring. This r...
Huib Aldewereld, Virginia Dignum, Catholijn M. Jon...