Search
Search Results
-
From Databases to Exchange Formats
This chapter addresses the question of how to transform relational database content into exchange formats in order to enable data interoperability... -
On the Use of Deep Learning Models for Automatic Animal Classification of Native Species in the Amazon
Camera trap image analysis, although critical for habitat and species conservation, is often a manual, time-consuming, and expensive task. Thus,... -
Process Orchestration: Conceptual Design
This chapter explains and discusses concepts for the conceptual design and formal verification of process orchestrations, employing notations such as... -
kNN Join for Dynamic High-Dimensional Data: A Parallel Approach
The k nearest neighbor (kNN) join operation is a fundamental task that combines two high-dimensional databases, enabling data points in the User... -
Multi-level Storage Optimization for Intermediate Data in AI Model Training
As Transformer-based large models become the mainstream of AI training, the development of hardware devices (e.g., GPUs) cannot keep up with the... -
Take a Close Look at the Optimization of Deep Kernels for Non-parametric Two-Sample Tests
The maximum mean discrepancy (MMD) test with deep kernel is a powerful method to distinguish whether two samples are drawn from the same... -
Balanced Hop-Constrained Path Enumeration in Signed Directed Graphs
Hop-constrained path enumeration, which aims to output all the paths from two distinct vertices within the given hops, is one of the fundamental... -
Probabilistic Reverse Top-k Query on Probabilistic Data
Reverse top-k queries have received much attention from research communities. The result of reverse top-k queries is a set of objects, which had the... -
Device Characterization for Opportunistic Networks
When implementing opportunistic networks in real applications, not only connectivity problems need to be addressed, but also device restrictions.... -
Simulation Tools for Opportunistic Networks
In this chapter, we start with an introduction to network simulators and especially to discrete event simulators. We explain how they work and what... -
Security in Opportunistic Networks
Security is of paramount importance in Opportunistic Networks (OppNets) due to its unique characteristics and operational challenges. OppNets are... -
Connectivity Technologies for Opportunistic Networks
This chapter explores the question of how to implement opportunistic networks in practice. The main part of this question considers the connectivity... -
Theoretical Models for Opportunistic Networks
In this chapter, we detail how to use theoretical modeling in opportunistic networks (OppNets) using mathematical and computational methods to... -
Data Dissemination in Opportunistic Networks
Data dissemination is the main research and implementation challenge in opportunistic networks. It addresses the question of how to forward data in a... -
Complexity-Approximation Trade-Offs in Exchange Mechanisms: AMMs vs. LOBs
This paper presents a general framework for the design and analysis of exchange mechanisms between two assets that unifies and enables comparisons... -
Eagle: Efficient Privacy Preserving Smart Contracts
The proliferation of Decentralised Finance (DeFi) and Decentralised Autonomous Organisations (DAO), which in current form are exposed to... -
Provably Avoiding Geographic Regions for Tor’s Onion Services
Tor, a peer-to-peer anonymous communication system, is one of the most effective tools in providing free and open communication online. Many of the... -
Smart Noise Detection for Statistical Disclosure Attacks
While anonymization systems like mix networks can provide privacy to their users by, e.g., hiding their communication relationships, several traffic... -
Synchronous Perfectly Secure Message Transmission with Optimal Asynchronous Fallback Guarantees
Secure message transmission (SMT) constitutes a fundamental network-layer building block for distributed protocols over incomplete networks. More... -
To Possess or Not to Possess - WhatsApp for Android Revisited with a Focus on Stickers
WhatsApp stickers are a popular hybrid of images and emoticons that can contain user-created content. Stickers are mostly sent for legitimate...