We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
The Double Vector Quantization (DVQ) method, a long-term forecasting method based on the self-organizing maps algorithm, has been used to predict the 100 missing values of the CAT...
Geoffroy Simon, John Aldo Lee, Marie Cottrell, Mic...
—This paper describes a study of predicting machine availabilities and user presence in a pool of desktop computers. The study is based on historical traces collected from 32 mac...
Time series data is common in many settings including scientific and financial applications. In these applications, the amount of data is often very large. We seek to support pred...
Prepaid customers in mobile telecommunications are not bound by a contract and can therefore change operators (‘churn’) at their convenience and without notification. This make...
Dejan Radosavljevik, Peter van der Putten, Kim Kyl...