Search
Search Results
-
Concrete Time/Memory Trade-Offs in Generalised Stern’s ISD Algorithm
The first contribution of this work is a generalisation of Stern’s information set decoding (ISD) algorithm. Stern’s algorithm, a variant of Stern’s... -
Patent Landscape in the field of Hash-Based Post-Quantum Signatures
Post-Quantum Cryptography (PQC) is one of the most fascinating topics of recent developments in cryptography. Following the ongoing standardization... -
Kummer and Hessian Meet in the Field of Characteristic 2
One can compute scalar multiplication on an ordinary short Weierstrass curve defined over a binary field. Also, one can move to the associated binary... -
Group Equivariant Networks Using Morphological Operators
With the increase of interest upon rotation invariance and equivariance for Convolutional Neural Network (CNN), a fair amount of papers have been... -
Training Morphological Neural Networks with Gradient Descent: Some Theoretical Insights
Morphological neural networks, or layers, can be a powerful tool to boost the progress in mathematical morphology, either on theoretical aspects such... -
Differential Maximum Euclidean Distance Transform Computation in Component Trees
The distance transform is an important binary image transformation that assigns to each foreground pixel the distance to the closest contour pixel.... -
A Survey on 2D Euclidean Curve Classes in Discrete Geometry with New Results
Classes of curves like par-regularity, \(\mu \)... -
Fitting Egg-Shapes to Discretized Object Boundaries
This paper presents a novel method for fitting egg-shapes to discrete sets of boundary points. Egg-shapes extend ellipses by assigning a positive... -
Elastic Analysis of Augmented Curves and Constrained Surfaces
The square root velocity transformation is crucial for efficiently employing the elastic approach in functional and shape data analysis of curves. We... -
End-to-End Ultrametric Learning for Hierarchical Segmentation
Hierarchical image segmentation aims to capture the structure of objects of different sizes at different scales and helps to understand the scene.... -
Out-of-Core Attribute Algorithms for Binary Partition Hierarchies
Binary Partition Hierarchies (BPHs) and Minimum Spanning Trees are key structures in hierarchical image analysis. However, the explosion in the size... -
Multi-scale Component-Tree: A Hierarchical Representation for Sparse Objects
Component-trees are hierarchical structures developed in the framework of mathematical morphology. They model images via the inclusion relationships... -
1-Attempt and Equivalent Thinning on the Hexagonal Grid
Thinning in 2D is an iterative object reduction to produce centerlines of discrete binary objects. A thinning algorithm is 1-attempt if whenever a... -
Network Embedding Exploration Tool (NEExT)
In this paper, we introduce NEExT(Network Embedding Exploration Tool) for embedding collections of graphs via user-defined node features. The... -
Efficient Computation of K-Edge Connected Components: An Empirical Analysis
Graphs play a pivotal role in representing complex relationships across various domains, such as social networks and bioinformatics. Key to many... -
Comparative Analysis of a Resource Loss System with the Finite Buffer and Different Service Disciplines
Fifth-generation (5G) networks are expected to revolutionize wireless communication by enabling faster and more reliable data transfer rates.... -
On the Variance Reduction Methods for Estimating the Reliability of the Multi-phase Gaussian Degradation System
We consider the Gaussian multi-phase degradation model. The primary target quantity is reliability defined as the tail distribution of the system... -
Batch Service Polling System: Mathematical Analysis and Simulation Modeling
In this paper, we study the mathematical and simulation models of the polling system with cyclic polling order and batch service. The service... -
Analyzing Reliability Metrics of All-Optical Switches
The reliability of all-optical switches based on new approach is analyzed. The proposed approach allows to take into account three main criteria... -
Utilization of Machine Learning Algorithms to Identify User Applications
Beamtracking is a critical functionality in modern millimeter wave (mmWave) 5G New Radio (NR) systems and is expected to become even more critical in...