Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
We want assurances that sensitive information will not be disclosed when aggregate data derived from a database is published. Differential privacy offers a strong statistical guar...
Content-Based Image Retrieval (CBIR) presents several challenges and has been subject to extensive research from many domains, such as image processing or database systems. Databa...
Ricardo da Silva Torres, Celmar G. Silva, Claudia ...
FACTOR/AIM (AIM) is a simulation system designed specifically for use in manufacturing decision support. AIM has been successfully applied to engineering design, scheduling, and p...
We describe a new algorithm for proving temporal properties expressed in LTL of infinite-state programs. Our approach takes advantage of the fact that LTL properties can often be...