Abstract. We have designed and implemented an interprocedural algorithm to analyze symbolic value ranges that can be assumed by variables at any given point in a program. Our algor...
Without any assumption on the cover source, this paper presents a complete characterization of all perfectly secure stego-systems that employ mutually independent embedding operat...
Locking and timestamping are two popular approaches to concurrency control in databases systems. Although more than a dozen analytic performance studies of locking techniques have...
We derive optimal bidding strategies for a global bidder who participates in multiple, simultaneous second-price auctions with perfect substitutes. We first consider a model where...
Enrico Gerding, Rajdeep K. Dash, David C. K. Yuen,...
This paper presents an algebraic approach to construct M-band orthonormal wavelet bases with perfect reconstruction. We first derive the system of constraint equations of M-band f...