We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. On the Use of Deep Learning Models for Automatic Animal Classification of Native Species in the Amazon

    Camera trap image analysis, although critical for habitat and species conservation, is often a manual, time-consuming, and expensive task. Thus,...
    María-José Zurita, Daniel Riofrío, ... Maria Baldeon-Calisto in Applications of Computational Intelligence
    Conference paper 2024
  2. Complexity-Approximation Trade-Offs in Exchange Mechanisms: AMMs vs. LOBs

    This paper presents a general framework for the design and analysis of exchange mechanisms between two assets that unifies and enables comparisons...
    Jason Milionis, Ciamac C. Moallemi, Tim Roughgarden in Financial Cryptography and Data Security
    Conference paper 2024
  3. Eagle: Efficient Privacy Preserving Smart Contracts

    The proliferation of Decentralised Finance (DeFi) and Decentralised Autonomous Organisations (DAO), which in current form are exposed to...
    Carsten Baum, James Hsin-yu Chiang, ... Tore Kasper Frederiksen in Financial Cryptography and Data Security
    Conference paper 2024
  4. Provably Avoiding Geographic Regions for Tor’s Onion Services

    Tor, a peer-to-peer anonymous communication system, is one of the most effective tools in providing free and open communication online. Many of the...
    Arushi Arora, Raj Karra, ... Christina Garman in Financial Cryptography and Data Security
    Conference paper 2024
  5. Synchronous Perfectly Secure Message Transmission with Optimal Asynchronous Fallback Guarantees

    Secure message transmission (SMT) constitutes a fundamental network-layer building block for distributed protocols over incomplete networks. More...
    Giovanni Deligios, Chen-Da Liu-Zhang in Financial Cryptography and Data Security
    Conference paper 2024
  6. On the Correlation Complexity of MPC with Cheater Identification

    Composable protocols for Multi-Party Computation that provide security with Identifiable Abort against a dishonest majority require some form of...
    Nicholas Brandt, Sven Maier, ... Jörn Müller-Quade in Financial Cryptography and Data Security
    Conference paper 2024
  7. Spatial Shrinkage Prior: A Probabilistic Approach to Model for Categorical Variables with Many Levels

    One of the most commonly used methods to prevent overfitting and select relevant variables in regression models with many predictors is the penalized...
    Conference paper 2024
  8. Conclusions

    This book aimed to introduce to the reader how heterogeneous hardware acceleration is changing the programming landscape, while posing a number of...
    Juan Fumero, Athanasios Stratikopoulos, Christos Kotselidis in Programming Heterogeneous Hardware via Managed Runtime Systems
    Chapter 2024
  9. Introduction

    This chapter aims to provide an introduction to both heterogeneous execution and managed runtime environments by discussing the current trends in...
    Juan Fumero, Athanasios Stratikopoulos, Christos Kotselidis in Programming Heterogeneous Hardware via Managed Runtime Systems
    Chapter 2024
  10. Malleable APGAS Programs and Their Support in Batch Job Schedulers

    Malleability—the ability for applications to dynamically adjust their resource allocations at runtime—presents great potential to enhance the...
    Patrick Finnerty, Leo Takaoka, ... Jonas Posner in Euro-Par 2023: Parallel Processing Workshops
    Conference paper 2024
  11. Comparative Analysis of Uppaal  SMC, ns-3 and MATLAB/Simulink

    IoT networks connect everyday devices to the internet to communicate with one another and humans. It is more cost-effective to analyse and verify the...
    Muhammad Naeem, Michele Albano, ... Brian Nielsen in Engineering of Computer-Based Systems
    Conference paper 2024
  12. Machine Learning Data Suitability and Performance Testing Using Fault Injection Testing Framework

    Creating resilient machine learning (ML) systems has become necessary to ensure production-ready ML systems that acquire user confidence seamlessly....
    Manal Rahal, Bestoun S. Ahmed, Jörgen Samuelsson in Engineering of Computer-Based Systems
    Conference paper 2024
  13. Closing the Loop: Towards a Complete Metamorphic Testing Pipeline

    Metamorphic Testing (MT) address the test oracle problem, which arises when there are no practical means to verify the outputs of the System Under...
    Alejandra Duque-Torres, Dietmar Pfahl in Product-Focused Software Process Improvement
    Conference paper 2024
  14. Integration of Classical and Quantum Services Using an Enterprise Service Bus

    Early advancements in quantum computing have opened up new possibilities to tackle complex problems across various fields, including mathematics,...
    Javier Bonilla, Enrique Moguel, ... Carlos Canal in Product-Focused Software Process Improvement
    Conference paper 2024
  15. Quantum Algorithm Cards: Streamlining the Development of Hybrid Classical-Quantum Applications

    The emergence of quantum computing proposes a revolutionary paradigm that can radically transform numerous scientific and industrial application...
    Vlad Stirbu, Majid Haghparast in Product-Focused Software Process Improvement
    Conference paper 2024
  16. Simulation-Based Safety Testing of Automated Driving Systems

    An Automated Driving System (ADS) must undergo comprehensive safety testing before receiving a road permit. Since it is not clear what exactly...
    Fauzia Khan, Hina Anwar, Dietmar Pfahl in Product-Focused Software Process Improvement
    Conference paper 2024
  17. Speech Therapy Supported by AI and Smart Assistants

    Speech impairments can be extremely debilitating for individuals in many areas of their lives. Speech therapy is a field that aims to solve these...
    Miriana Calvano, Antonio Curci, ... Antonio Piccinno in Product-Focused Software Process Improvement
    Conference paper 2024
  18. Forecasting the Developer’s Impact in Managing the Technical Debt

    Technical debt is a collection of design decisions that, when taken together over time, make the system challenging to maintain and develop....
    Lerina Aversano, Mario Luca Bernardi, ... Martina Iammarino in Product-Focused Software Process Improvement
    Conference paper 2024
  19. A Literature Survey of Assertions in Software Testing

    Assertions are one of the most useful automated techniques for checking program’s behaviour and hence have been used for different verification and...
    Masoumeh Taromirad, Per Runeson in Engineering of Computer-Based Systems
    Conference paper 2024
  20. Formalization and Verification of MQTT-SN Communication Using CSP

    The MQTT-SN protocol is a lightweight version of the MQTT protocol and is customized for Wireless Sensor Networks (WSN). It removes the need for the...
    Wei Lin, Sini Chen, Huibiao Zhu in Engineering of Computer-Based Systems
    Conference paper 2024
Did you find what you were looking for? Share feedback.