We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 10,000 results
  1. An Evaluation Model for the Optimization of Property Sales in Auction Markets

    This paper proposes a logical-deductive model for the estimate of forced sale value, in support of individuals involved in real estate auctions. This...
    Francesco Tajani, Pierluigi Morano, ... Carmelo Maria Torre in Computational Science and Its Applications – ICCSA 2021
    Conference paper 2021
  2. Towards Real-World Private Computations with Homomorphic Encryption: Current Solutions and Open Challenges

    There is an increasing need to share sensitive information within and beyond organisations. Protecting this information is vital for commercial and...
    Michela Iezzi, Carsten Maple, Andrea Leonetti in Computer Security. ESORICS 2023 International Workshops
    Conference paper 2024
  3. Automatic Formal Verification of RISC-V Pipelined Microprocessors with Fault Tolerance by Spatial Redundancy at a High Level of Abstraction

    Presented are abstraction techniques for efficient modeling of pipelined microprocessors of the RISC-V architecture, including designs with fault...
    Miroslav N. Velev in Integrated Formal Methods
    Conference paper 2024
  4. PROUD: PaRetO-gUided diffusion model for multi-objective generation

    Recent advancements in the realm of deep generative models focus on generating samples that satisfy multiple desired properties. However, prevalent...

    Yinghua Yao, Yuangang Pan, ... **n Yao in Machine Learning
    Article 02 July 2024
  5. SDK4ED: a platform for building energy efficient, dependable, and maintainable embedded software

    Develo** embedded software applications is a challenging task, chiefly due to the limitations that are imposed by the hardware devices or platforms...

    Miltiadis Siavvas, Dimitrios Tsoukalas, ... Dimitrios Tzovaras in Automated Software Engineering
    Article 11 June 2024
  6. Accelerating the design of compositionally complex materials via physics-informed artificial intelligence

    The chemical space for designing materials is practically infinite. This makes disruptive progress by traditional physics-based modeling alone...

    Dierk Raabe, Jaber Rezaei Mianroodi, Jörg Neugebauer in Nature Computational Science
    Article 31 March 2023
  7. Property-Directed Verified Monitoring of Signal Temporal Logic

    Signal Temporal Logic monitoring over numerical simulation traces has emerged as an effective approach to approximate verification of continuous and...
    Thomas Wright, Ian Stark in Runtime Verification
    Conference paper 2020
  8. Functional Sensitivity Applications

    The concept of functional sensitivity was mentioned in Chap. 3 . Now, let us discuss this kind of analysis...
    Stanislaw Raczynski in Models for Research and Understanding
    Chapter 2022
  9. A language and a pattern system for temporal property specification: advanced metering infrastructure case study

    Ensuring the satisfaction of security requirements is one of the most vital needs in develo** different types of systems. Therefore, it is...

    Tina Tavizi, Mehdi Shajari in International Journal of Information Security
    Article 09 January 2020
  10. Scaffolding Process-Aware Information Systems with the AKIP Platform

    Business Process Automation (BPA) refers to the automation of business processes through technology, with the goal of improving efficiency, reducing...
    Ulisses Telemaco Neto, Toacy Oliveira, ... Glaucia Melo in Web Information Systems and Technologies
    Conference paper 2023
  11. On a Variational Problem with a Nonstandard Growth Functional and Its Applications to Image Processing

    We propose a new variational model in Sobolev–Orlicz spaces with non-standard growth conditions of the objective functional and discuss its...

    Ciro D’Apice, Peter I. Kogut, ... Rosanna Manzo in Journal of Mathematical Imaging and Vision
    Article Open access 16 November 2022
  12. Software with Certified Deletion

    Is it possible to prove the deletion of a computer program after having executed it? While this task is clearly impossible using classical...
    James Bartusek, Vipul Goyal, ... Bhaskar Roberts in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  13. An entropy-weighted local intensity clustering-based model for segmenting intensity inhomogeneous images

    This paper proposes an entropy-weighted local intensity clustering-based model for segmenting intensity inhomogeneous images caused by the bias...

    Wei-Ting Liao, Suh-Yuh Yang, Cheng-Shu You in Multimedia Systems
    Article 29 January 2024
  14. Covariance Kernel Learning Schemes for Gaussian Process Based Prediction Using Markov Chain Monte Carlo

    Probabilistic supervised learning within the Bayesian paradigm typically use Gaussian Processes (GPs) to model the sought function, and provide a...
    Gargi Roy, Kane Warrior, Dalia Chakrabarty in Progress in Artificial Intelligence
    Conference paper 2023
  15. On Black-Box Knowledge-Sound Commit-And-Prove SNARKs

    Gentry and Wichs proved that adaptively sound SNARGs for hard languages need non-falsifiable assumptions. Lipmaa and Pavlyk claimed Gentry-Wichs is...
    Conference paper 2023
  16. Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More

    We study certified everlasting secure functional encryption (FE) and many other cryptographic primitives in this work. Certified everlasting security...
    Taiga Hiroka, Fuyuki Kitagawa, ... Takashi Yamakawa in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  17. Unveiling the Potential Use of Euler Equations in the Utility Additive Analysis for Mass Appraisal

    Using mass appraisal techniques has become strategically important in case of plans property assets, investments in technical and economic renewals,...
    Francesco Tajani, Francesco Sica, ... Rossana Ranieri in Computational Science and Its Applications – ICCSA 2023 Workshops
    Conference paper 2023
  18. SLAP: Succinct Lattice-Based Polynomial Commitments from Standard Assumptions

    Recent works on lattice-based extractable polynomial commitments can be grouped into two classes: (i) non-interactive constructions that stem from...
    Martin R. Albrecht, Giacomo Fenzi, ... Ngoc Khanh Nguyen in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  19. AWEDD: a descriptor simultaneously encoding multiscale extrinsic and intrinsic shape features

    We construct a novel descriptor called anisotropic wavelet energy decomposition descriptor (AWEDD) for non-rigid shape analysis, based on anisotropic...

    Shengjun Liu, Feifan Luo, ... Ling Hu in The Visual Computer
    Article 10 July 2023
  20. Flood Adventures: Evaluation Study of Final Prototype

    It is vital that individuals of all ages know what preparations to make prior to a flooding event and what actions to take during an actual flood...
    Robson Araujo-Junior, Zilong Pan, ... Jessica Vogel in Immersive Learning Research Network
    Conference paper 2024
Did you find what you were looking for? Share feedback.