We study multivariate integration of functions that are invariant under permutations (of subsets) of their arguments. We find an upper bound for the nth minimal worst case error ...
With the recent popularity of electronic medical records, enormous amount of medical data is being generated every day at an exponential rate. Machine learning methods have been s...
This paper analyzes the authenticated encryption algorithm ACORN, a candidate in the CAESAR cryptographic competition. We identify weaknesses in the state update function of ACORN ...
Md. Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Ba...
Abstract. Underlying symmetries in constraint satisfaction and optimization problems can make the search for solutions or optimal solutions much harder. In contrast, when symmetrie...
Abstract. We characterize t-structures in stable ∞-categories as suitable quasicategorical factorization systems. More precisely we show that a t-structure t on a stable ∞-cate...
Abstract. We present a platform named Redhyte, short for an interactive platform for “Rapid exploration of data and hypothesis testing”. Redhyte aims to augment the conventiona...
—Bilateral teleoperation systems with haptic feedback allow human users to interact with objects or perform complex tasks in remote or inaccessible environments. Communication de...
Xiao Xu, Burak Cizmeci, Clemens Schuwerk, Eckehard...