Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
Current stochastic model checkers do not make counterexamples for property violations readily available. In this paper we apply directed explicit state space search to discrete- a...
In this paper we present a new compressed sensing model and reconstruction method for multi-detector signal acquisition. We extend the concept of the famous single-pixel camera to...
Torsten Edeler, Kevin Ohliger, Stephan Hussmann, A...
People take more and more photos at different time and different events, however, these photos are often put into one giant folder and they are seldom annotated or organized. As t...
—When users submit new queries to a distributed stream processing system (DSPS), a query planner must allocate physical resources, such as CPU cores, memory and network bandwidth...