Search
Search Results
-
An Evaluation Model for the Optimization of Property Sales in Auction Markets
This paper proposes a logical-deductive model for the estimate of forced sale value, in support of individuals involved in real estate auctions. This... -
Towards Real-World Private Computations with Homomorphic Encryption: Current Solutions and Open Challenges
There is an increasing need to share sensitive information within and beyond organisations. Protecting this information is vital for commercial and... -
Automatic Formal Verification of RISC-V Pipelined Microprocessors with Fault Tolerance by Spatial Redundancy at a High Level of Abstraction
Presented are abstraction techniques for efficient modeling of pipelined microprocessors of the RISC-V architecture, including designs with fault... -
PROUD: PaRetO-gUided diffusion model for multi-objective generation
Recent advancements in the realm of deep generative models focus on generating samples that satisfy multiple desired properties. However, prevalent...
-
SDK4ED: a platform for building energy efficient, dependable, and maintainable embedded software
Develo** embedded software applications is a challenging task, chiefly due to the limitations that are imposed by the hardware devices or platforms...
-
Accelerating the design of compositionally complex materials via physics-informed artificial intelligence
The chemical space for designing materials is practically infinite. This makes disruptive progress by traditional physics-based modeling alone...
-
Property-Directed Verified Monitoring of Signal Temporal Logic
Signal Temporal Logic monitoring over numerical simulation traces has emerged as an effective approach to approximate verification of continuous and... -
Functional Sensitivity Applications
The concept of functional sensitivity was mentioned in Chap. 3 . Now, let us discuss this kind of analysis... -
A language and a pattern system for temporal property specification: advanced metering infrastructure case study
Ensuring the satisfaction of security requirements is one of the most vital needs in develo** different types of systems. Therefore, it is...
-
Scaffolding Process-Aware Information Systems with the AKIP Platform
Business Process Automation (BPA) refers to the automation of business processes through technology, with the goal of improving efficiency, reducing... -
On a Variational Problem with a Nonstandard Growth Functional and Its Applications to Image Processing
We propose a new variational model in Sobolev–Orlicz spaces with non-standard growth conditions of the objective functional and discuss its...
-
Software with Certified Deletion
Is it possible to prove the deletion of a computer program after having executed it? While this task is clearly impossible using classical... -
An entropy-weighted local intensity clustering-based model for segmenting intensity inhomogeneous images
This paper proposes an entropy-weighted local intensity clustering-based model for segmenting intensity inhomogeneous images caused by the bias...
-
Covariance Kernel Learning Schemes for Gaussian Process Based Prediction Using Markov Chain Monte Carlo
Probabilistic supervised learning within the Bayesian paradigm typically use Gaussian Processes (GPs) to model the sought function, and provide a... -
On Black-Box Knowledge-Sound Commit-And-Prove SNARKs
Gentry and Wichs proved that adaptively sound SNARGs for hard languages need non-falsifiable assumptions. Lipmaa and Pavlyk claimed Gentry-Wichs is... -
Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More
We study certified everlasting secure functional encryption (FE) and many other cryptographic primitives in this work. Certified everlasting security... -
Unveiling the Potential Use of Euler Equations in the Utility Additive Analysis for Mass Appraisal
Using mass appraisal techniques has become strategically important in case of plans property assets, investments in technical and economic renewals,... -
SLAP: Succinct Lattice-Based Polynomial Commitments from Standard Assumptions
Recent works on lattice-based extractable polynomial commitments can be grouped into two classes: (i) non-interactive constructions that stem from... -
AWEDD: a descriptor simultaneously encoding multiscale extrinsic and intrinsic shape features
We construct a novel descriptor called anisotropic wavelet energy decomposition descriptor (AWEDD) for non-rigid shape analysis, based on anisotropic...
-
Flood Adventures: Evaluation Study of Final Prototype
It is vital that individuals of all ages know what preparations to make prior to a flooding event and what actions to take during an actual flood...