Many tasks in text and speech processing and computational biology require estimating functions mapping strings to real numbers. A broad class of such functions can be defined by...
In this paper, we extend the method of Scott and Barreto and present an explicit and simple algorithm to generate families of generalized MNT elliptic curves. Our algorithm allows ...
Abstract. Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms. In particular, they have been used to create an ABE system with multi authorities, b...
Riccardo Longo, Chiara Marcolla, Massimiliano Sala
An important attack on multi-power RSA (N = pr q) was introduced by Sarkar in 2014, by extending the small private exponent attack of Boneh and Durfee on classical RSA. In particul...
Muhammed F. Esgin, Mehmet Sabir Kiraz, Osmanbey Uz...
Along with the proliferation of the Smart Grid, power load disaggregation is a research area that is lately gaining a lot of popularity due to the interest of energy distribution c...
Abstract. In this paper we analyse the problem of probabilistic inference in CLG networks when evidence comes in streams. In such situations, fast and scalable algorithms, able to ...
Abstract. This paper presents the software Omnigram Explorer, a visualization tool developed for interactive exploration of relations between variables in a complex system. Its obj...
Given an undirected and connected graph, the maximum leaf spanning tree problem consists in finding a spanning tree with as many leaves as possible. This NP-hard problem has pract...
—In many multi-core architectures, inclusive shared caches are used to reduce cache coherence complexity. However, the enforcement of the inclusion property can cause invalidatio...
—In this paper, we present the design and evaluation of a platform that can be used for time synchronization and indoor positioning of mobile devices. The platform uses the Time-...
Patrick Lazik, Niranjini Rajagopal, Bruno Sinopoli...