Samuel Mueller

Learn More
Regulatory compliance of business operations is a critical problem for enterprises. As enterprises increasingly use business process management systems to automate their business processes, technologies to automatically check compliance of process models against compliance rules are becoming important. In this paper, we present a method for improving the(More)
Recent years have seen a number of high-profile incidents of corporate accounting fraud, security violations, terrorist acts, and disruptions of major financial markets. This has led to a proliferation of new regulations that directly impact businesses. As a result, businesses, in particular publicly traded companies, face the daunting task of complying(More)
PURPOSE To determine the efficacy and tolerability of combining oxaliplatin with capecitabine in the treatment of advanced nonpretreated and pretreated colorectal cancer. PATIENTS AND METHODS Forty-three nonpretreated patients and 26 patients who had experienced one fluoropyrimidine-containing regimen for advanced colorectal cancer were treated with(More)
We introduce a novel approach to the runtime monitoring of complex system properties. In particular, we present an online algorithm for a safety fragment of metric first-order temporal logic that is considerably more expressive than the logics supported by prior monitoring methods. Our approach, based on automatic structures, allows the unrestricted use of(More)
The complexity and costs of conforming to regulatory objectives in large enterprises has drastically heightened the need for consistent and automated approaches to managing compliance. To uniformly describe and manage compliance policies in distributed and heterogeneous IT environments, we have proposed a compliance metamodel for formally capturing(More)
We present an approach to monitoring system policies. As a specification language, we use an expressive fragment of a temporal logic, which can be effectively monitored. We report on case studies in security and compliance monitoring and use these to show the adequacy of our specification language for naturally expressing complex, realistic policies and the(More)
OBJECTIVES The aims of this study were to (1) compare prospectively the clinical and radiographic changes in periodontal and peri-implant conditions, (2) investigate the association of changes in periodontal parameters and peri-implant conditions over a mean observation period of 10 years (8-12 years) after implant installation, and (3) evaluate patient(More)
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how a wide variety of security policies can be naturally formalized in this expressive logic, ranging from traditional policies like Chinese Wall and separation of duty to more(More)
Using commercially available microarray technology, we investigated a series of transcriptional adaptations caused by atrophy of rat m. soleus due to 35 days of hindlimb suspension. We detected 395 out of 1,200 tested transcripts, which reflected 1%-5% of totally expressed genes. From various cellular functional pathways, we detected multiple genes that(More)
OBJECTIVE To compare the complication rates and outcome of computer-assisted versus non-computer-assisted functional endoscopic sinus surgery. METHODS We reviewed retrospectively the medical records of 276 patients who had undergone sinus surgery for chronic rhinosinusitis with (n = 108) or without (n = 168) computer assistance, from 1996 to 2004, to(More)