We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. On the Use of Deep Learning Models for Automatic Animal Classification of Native Species in the Amazon

    Camera trap image analysis, although critical for habitat and species conservation, is often a manual, time-consuming, and expensive task. Thus,...
    María-José Zurita, Daniel Riofrío, ... Maria Baldeon-Calisto in Applications of Computational Intelligence
    Conference paper 2024
  2. Complexity-Approximation Trade-Offs in Exchange Mechanisms: AMMs vs. LOBs

    This paper presents a general framework for the design and analysis of exchange mechanisms between two assets that unifies and enables comparisons...
    Jason Milionis, Ciamac C. Moallemi, Tim Roughgarden in Financial Cryptography and Data Security
    Conference paper 2024
  3. Eagle: Efficient Privacy Preserving Smart Contracts

    The proliferation of Decentralised Finance (DeFi) and Decentralised Autonomous Organisations (DAO), which in current form are exposed to...
    Carsten Baum, James Hsin-yu Chiang, ... Tore Kasper Frederiksen in Financial Cryptography and Data Security
    Conference paper 2024
  4. Provably Avoiding Geographic Regions for Tor’s Onion Services

    Tor, a peer-to-peer anonymous communication system, is one of the most effective tools in providing free and open communication online. Many of the...
    Arushi Arora, Raj Karra, ... Christina Garman in Financial Cryptography and Data Security
    Conference paper 2024
  5. Synchronous Perfectly Secure Message Transmission with Optimal Asynchronous Fallback Guarantees

    Secure message transmission (SMT) constitutes a fundamental network-layer building block for distributed protocols over incomplete networks. More...
    Giovanni Deligios, Chen-Da Liu-Zhang in Financial Cryptography and Data Security
    Conference paper 2024
  6. On the Correlation Complexity of MPC with Cheater Identification

    Composable protocols for Multi-Party Computation that provide security with Identifiable Abort against a dishonest majority require some form of...
    Nicholas Brandt, Sven Maier, ... Jörn Müller-Quade in Financial Cryptography and Data Security
    Conference paper 2024
  7. Spatial Shrinkage Prior: A Probabilistic Approach to Model for Categorical Variables with Many Levels

    One of the most commonly used methods to prevent overfitting and select relevant variables in regression models with many predictors is the penalized...
    Conference paper 2024
  8. Malleable APGAS Programs and Their Support in Batch Job Schedulers

    Malleability—the ability for applications to dynamically adjust their resource allocations at runtime—presents great potential to enhance the...
    Patrick Finnerty, Leo Takaoka, ... Jonas Posner in Euro-Par 2023: Parallel Processing Workshops
    Conference paper 2024
  9. Closing the Loop: Towards a Complete Metamorphic Testing Pipeline

    Metamorphic Testing (MT) address the test oracle problem, which arises when there are no practical means to verify the outputs of the System Under...
    Alejandra Duque-Torres, Dietmar Pfahl in Product-Focused Software Process Improvement
    Conference paper 2024
  10. Integration of Classical and Quantum Services Using an Enterprise Service Bus

    Early advancements in quantum computing have opened up new possibilities to tackle complex problems across various fields, including mathematics,...
    Javier Bonilla, Enrique Moguel, ... Carlos Canal in Product-Focused Software Process Improvement
    Conference paper 2024
  11. Quantum Algorithm Cards: Streamlining the Development of Hybrid Classical-Quantum Applications

    The emergence of quantum computing proposes a revolutionary paradigm that can radically transform numerous scientific and industrial application...
    Vlad Stirbu, Majid Haghparast in Product-Focused Software Process Improvement
    Conference paper 2024
  12. Simulation-Based Safety Testing of Automated Driving Systems

    An Automated Driving System (ADS) must undergo comprehensive safety testing before receiving a road permit. Since it is not clear what exactly...
    Fauzia Khan, Hina Anwar, Dietmar Pfahl in Product-Focused Software Process Improvement
    Conference paper 2024
  13. Speech Therapy Supported by AI and Smart Assistants

    Speech impairments can be extremely debilitating for individuals in many areas of their lives. Speech therapy is a field that aims to solve these...
    Miriana Calvano, Antonio Curci, ... Antonio Piccinno in Product-Focused Software Process Improvement
    Conference paper 2024
  14. Forecasting the Developer’s Impact in Managing the Technical Debt

    Technical debt is a collection of design decisions that, when taken together over time, make the system challenging to maintain and develop....
    Lerina Aversano, Mario Luca Bernardi, ... Martina Iammarino in Product-Focused Software Process Improvement
    Conference paper 2024
  15. The Importance of Knowing the Arrival Order in Combinatorial Bayesian Settings

    We study the measure of order-competitive ratio introduced by Ezra et al. [16] for online algorithms in Bayesian combinatorial settings. In our...
    Tomer Ezra, Tamar Garbuz in Web and Internet Economics
    Conference paper 2024
  16. Nash Stability in Fractional Hedonic Games with Bounded Size Coalitions

    We consider fractional hedonic games, a natural and succinct subclass of hedonic games able to model many real-world settings in which agents have to...
    Gianpiero Monaco, Luca Moscardelli in Web and Internet Economics
    Conference paper 2024
  17. Online Nash Welfare Maximization Without Predictions

    The maximization of Nash welfare, which equals the geometric mean of agents’ utilities, is widely studied because it balances efficiency and fairness...
    Zhiyi Huang, Minming Li, ... Tianze Wei in Web and Internet Economics
    Conference paper 2024
  18. Equilibrium Analysis of Customer Attraction Games

    We introduce a game model called “customer attraction game” to demonstrate the competition among online content providers. In this model, customers...
    **aotie Deng, Ningyuan Li, ... Qi Qi in Web and Internet Economics
    Conference paper 2024
  19. Target-Oriented Regret Minimization for Satisficing Monopolists

    We study a robust monopoly pricing problem where a seller aspires to sell an item to a buyer. We assume that the seller, unaware of the buyer’s...
    Napat Rujeerapaiboon, Yize Wei, Yilin Xue in Web and Internet Economics
    Conference paper 2024
  20. An Epistemological View of the Peano School Axiomatics

    The paper advocates an epistemological interpretation of the Peano School axiomatics. The construction of axiom systems is presented as a cognitive...
    Chapter 2024
Did you find what you were looking for? Share feedback.