We present as-strong-as-possible definitions of privacy, and constructions achieving them, for public-key encryption schemes where the encryption algorithm is deterministic. We ob...
— This paper deals with output feedback impulse control under set-membership uncertainty where the control realization consists of a sequence of δ-impulses. It indicates solutio...
Alexander N. Daryin, Irina A. Digailova, Alexander...
We propose in this paper a general kernel framework to deal with database object retrieval embedded in images with heterogeneous background. We use local features computed on fuzz...
Philippe Henri Gosselin, Matthieu Cord, Sylvie Phi...
Several different techniques and softwares intend to improve the accuracy of results computed in a fixed finite precision. Here we focus on a method to improve the accuracy of ...
Flow control mechanisms in Network-on-Chip (NoC) architectures are critical for fast packet propagation across the network and for low idling of network resources. Buffer manageme...
Antonio Pullini, Federico Angiolini, Davide Bertoz...