Search
Search Results
-
On the Use of Deep Learning Models for Automatic Animal Classification of Native Species in the Amazon
Camera trap image analysis, although critical for habitat and species conservation, is often a manual, time-consuming, and expensive task. Thus,... -
Complexity-Approximation Trade-Offs in Exchange Mechanisms: AMMs vs. LOBs
This paper presents a general framework for the design and analysis of exchange mechanisms between two assets that unifies and enables comparisons... -
Eagle: Efficient Privacy Preserving Smart Contracts
The proliferation of Decentralised Finance (DeFi) and Decentralised Autonomous Organisations (DAO), which in current form are exposed to... -
Provably Avoiding Geographic Regions for Tor’s Onion Services
Tor, a peer-to-peer anonymous communication system, is one of the most effective tools in providing free and open communication online. Many of the... -
Synchronous Perfectly Secure Message Transmission with Optimal Asynchronous Fallback Guarantees
Secure message transmission (SMT) constitutes a fundamental network-layer building block for distributed protocols over incomplete networks. More... -
On the Correlation Complexity of MPC with Cheater Identification
Composable protocols for Multi-Party Computation that provide security with Identifiable Abort against a dishonest majority require some form of... -
Spatial Shrinkage Prior: A Probabilistic Approach to Model for Categorical Variables with Many Levels
One of the most commonly used methods to prevent overfitting and select relevant variables in regression models with many predictors is the penalized... -
Conclusions
This book aimed to introduce to the reader how heterogeneous hardware acceleration is changing the programming landscape, while posing a number of... -
Introduction
This chapter aims to provide an introduction to both heterogeneous execution and managed runtime environments by discussing the current trends in... -
Malleable APGAS Programs and Their Support in Batch Job Schedulers
Malleability—the ability for applications to dynamically adjust their resource allocations at runtime—presents great potential to enhance the... -
Comparative Analysis of Uppaal SMC, ns-3 and MATLAB/Simulink
IoT networks connect everyday devices to the internet to communicate with one another and humans. It is more cost-effective to analyse and verify the... -
Machine Learning Data Suitability and Performance Testing Using Fault Injection Testing Framework
Creating resilient machine learning (ML) systems has become necessary to ensure production-ready ML systems that acquire user confidence seamlessly.... -
Closing the Loop: Towards a Complete Metamorphic Testing Pipeline
Metamorphic Testing (MT) address the test oracle problem, which arises when there are no practical means to verify the outputs of the System Under... -
Integration of Classical and Quantum Services Using an Enterprise Service Bus
Early advancements in quantum computing have opened up new possibilities to tackle complex problems across various fields, including mathematics,... -
Quantum Algorithm Cards: Streamlining the Development of Hybrid Classical-Quantum Applications
The emergence of quantum computing proposes a revolutionary paradigm that can radically transform numerous scientific and industrial application... -
Simulation-Based Safety Testing of Automated Driving Systems
An Automated Driving System (ADS) must undergo comprehensive safety testing before receiving a road permit. Since it is not clear what exactly... -
Speech Therapy Supported by AI and Smart Assistants
Speech impairments can be extremely debilitating for individuals in many areas of their lives. Speech therapy is a field that aims to solve these... -
Forecasting the Developer’s Impact in Managing the Technical Debt
Technical debt is a collection of design decisions that, when taken together over time, make the system challenging to maintain and develop.... -
A Literature Survey of Assertions in Software Testing
Assertions are one of the most useful automated techniques for checking program’s behaviour and hence have been used for different verification and... -
Formalization and Verification of MQTT-SN Communication Using CSP
The MQTT-SN protocol is a lightweight version of the MQTT protocol and is customized for Wireless Sensor Networks (WSN). It removes the need for the...