Traditional approaches to secure computation begin by representing the function f being computed as a circuit. For any function f that depends on each of its inputs, this implies ...
S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov,...
Seeing the Earth crust as criss-crossed by faults filled with fluid at close to lithostatic pressures, we develop a model in which its elastic modulii are different in net tension...
We show how to route on very large public transportation networks (up to half a billion arcs) with average query times of a few milliseconds. We take into account many realistic fe...
Hannah Bast, Erik Carlsson, Arno Eigenwillig, Robe...
Abstract--Memory accesses are a major cause of energy consumption for embedded systems and the stack is a frequent target for data accesses. This paper presents a fully software te...
We obtain explicit formulas for normalized doubly coprime factorizations of the transfer functions of the following class of linear systems: the input and output operators are vec...