Automated software verification and path-sensitive program analysis require the ability to distinguish executable program paths from those that are infeasible. To achieve this, pro...
We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-...
It is often possible to greatly improve the performance of a hardware system via the use of predictive (speculative) techniques. For example, the performance of out-of-order micro...
Alan Fern, Robert Givan, Babak Falsafi, T. N. Vija...
Coproduction systems, in which multiple products are produced simultaneously in a single production run, are prevalent in many industries. Such systems typically produce a random ...
This paper studies the impact of competition on a firm’s choice of technology (product-flexible or product-dedicated) and capacity investment decisions. Specifically, we mode...