In this work, we develop a secret sharing based compiler solution to achieve confidentiality, integrity and availability (intrusion tolerance) of critical data together, rather th...
We present a Mutation-based Validation Paradigm (MVP) technology that can handle complete high-level microprocessor implementations and is based on explicit design error modeling, ...
We conducted a 6-month project with a physical therapy clinic, involving equal parts ethnographic fieldwork and rapid prototyping. It differed from most reported user-informed des...
“Don’t put all your eggs in one basket” is common wisdom with respect to financial portfolio theory. The configuration of customer portfolios with regard to appropriate risk...
The paper presents the first empirical investigation of the relationship between present value of net revenue from a revolving credit account and times to default and to second pu...