Search
Search Results
-
Generalities
In this chapter we present all necessary definitions and preliminary results on cryptographic functions which are used throughout this book. -
Introduction to Data Science
So what is data science and why is it so topical? Is it just another fad that will fade away after the hype? We will start with a simple introduction... -
Quaternary cryptographic bent functions and their binary projection
The nonlinearity of sequences is one of the important security measures for stream cipher systems. Recently, in the study of vectorized stream cipher...
-
Gradient-based boosting for statistical relational learning: the Markov logic network and missing data cases
Recent years have seen a surge of interest in Statistical Relational Learning (SRL) models that combine logic with probabilities. One prominent and...
-
A New Approach to Optimization with Life Cycle Assessment: Combining Optimization with Detailed Process Simulation
In this paper we describe an approach that combines system optimization under environmental constraints with a detailed simulation of the processes... -
Construction of Highly Nonlinear Plateaued Resilient Functions with Disjoint Spectra
The nonlinearity of Boolean functions is one of the most important cryptographic criterion to provide protection against linear approximation attack.... -
Optimizing Base Rankers Using Clicks
We study the problem of optimizing an individual base ranker using clicks. Surprisingly, while there has been considerable attention for using clicks... -
Icebreakers
The amount and type of teacher–student interaction in a Puzzle-based Learning course can vary widely based on the number of students in the course.... -
Some New Domain Restrictions in Social Choice, and Their Consequences
Restricting the domains of definition of social choice functions is a classical method to test the robustness of impossibility results and to find... -
Introduction to Data Science
So what is data science and why is it so topical? Is it just another fad that will fade away after the hype? We will start with a simple introduction... -
Construction of rotation symmetric Boolean functions with optimal algebraic immunity and high nonlinearity
Recent research shows that the class of rotation symmetric Boolean functions is potentially rich in functions of cryptographic significance. In this...
-
Indexing Rich Internet Applications Using Components-Based Crawling
Automatic crawling of Rich Internet Applications (RIAs) is a challenge because client-side code modifies the client dynamically, fetching server-side... -
On semi-bent functions with Niho exponents
Semi-bent functions are a kind of Boolean functions with high nonlinearity. They have important applications in cryptography and communications. In...
-
Introducing User-Centered Systems Design
If designers and developers want to design better technologies that are intended for human use they need to have a good understanding of the people... -
Data Mining
Recommendation systems find and summarize patterns in the structure of some data or in how we visit that data. Such summarizing can be implemented by... -
On the practical use of the spectral homotopy analysis method and local linearisation method for unsteady boundary-layer flows caused by an impulsively stretching plate
This paper expands the ideas of the spectral homotopy analysis method to apply them, for the first time, on non-linear partial differential...
-
Semi-bent Functions with Multiple Trace Terms and Hyperelliptic Curves
Semi-bent functions with even number of variables are a class of important Boolean functions whose Hadamard transform takes three values. Semi-bent... -
High availability, elasticity, and strong consistency for massively parallel scans over relational data
An elastic and highly available data store is a key component of many cloud applications. Existing data stores with strong consistency guarantees are...
-
Construction of even-variable rotation symmetric Boolean functions with maximum algebraic immunity
Rotation symmetric Boolean functions (RSBFs) have been used as components of different cryptosystems. In this paper, we investigate n -variable ( n ...