We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. ASTSDL: predicting the functionality of incomplete programming code via an AST-sequence-based deep learning model

    Code recommendation systems have been widely used in hel** developers implement unfamiliar programming tasks. Many existing code recommenders or...

    Yaoshen Yu, Zhiqiu Huang, ... Yichao Shao in Science China Information Sciences
    Article 27 December 2023
  2. Recent Advancements on Functionality and Performance

    In this chapter, we will continue our journey to introduce recent advancements of searchable encryption on functionality and performance. We will...
    Kui Ren, Cong Wang in Searchable Encryption
    Chapter 2023
  3. Exact and sampling methods for mining higher-order motifs in large hypergraphs

    Network motifs are recurrent, small-scale patterns of interactions observed frequently in a system. They shed light on the interplay between the...

    Quintino Francesco Lotito, Federico Musciotto, ... Alberto Montresor in Computing
    Article Open access 20 October 2023
  4. CoVaMaT: Functionality for Variety Reuse Through a Supporting Tool

    Develo** reusable Big Data Systems (BDSs) implies dealing with modeling variety as reusable assets. Conceptually speaking, these assets might be...
    Líam Osycka, Alejandra Cechich, ... Angel Muñoz in Cloud Computing, Big Data & Emerging Topics
    Conference paper 2023
  5. Exact Query in Multi-version Key Encrypted Database via Bloom Filters

    As people become more privacy conscious, the security requirements of databases are increasing, and thus the technology of encrypted databases is...
    Guohao Duan, Siyuan Ma, Yanlong Wen in Web Information Systems and Applications
    Conference paper 2023
  6. Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation

    Figuring out whether a particular semantic functionality exists in a binary program is challenging. While pattern-matching-based detection is...
    Sebastian Schrittwieser, Patrick Kochberger, ... Edgar R. Weippl in Secure IT Systems
    Conference paper 2022
  7. Exact Security Analysis of ASCON

    The Ascon cipher suite, offering both authenticated encryption with associated data (AEAD) and hashing functionality, has recently emerged as the...
    Bishwajit Chakraborty, Chandranan Dhar, Mridul Nandi in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  8. Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs

    In this work, we study hybrid exact/relaxed zero-knowledge proofs from lattices, where the proved relation is exact in one part and relaxed in the...
    Muhammed F. Esgin, Ron Steinfeld, ... Sushmita Ruj in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  9. Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality

    Multi-input functional encryption, MIFE, is a powerful generalization of functional encryption that allows computation on encrypted data coming from...
    Shweta Agrawal, Rishab Goyal, Junichi Tomida in Theory of Cryptography
    Conference paper 2022
  10. Towards the X-Theory: An Evaluation of the Perceived Quality and Functionality of DEMO’s Process Model

    The Design and Engineering Methodology for Organizations (DEMO) comprises a set of models and diagrams to represent an organization. A proposal for a...
    Dulce Pacheco, David Aveiro, ... Bernardo Gouveia in Advances in Enterprise Engineering XV
    Conference paper 2022
  11. On the Exact Round Complexity of Secure Three-Party Computation

    We settle the exact round complexity of three-party computation (3PC) in honest-majority setting, for a range of security notions such as selective...

    Arpita Patra, Divya Ravi in Journal of Cryptology
    Article 18 August 2021
  12. Prognosis of Clinical Depression with Resting State Functionality Connectivity using Machine Learning

    Major Depressive Disorder (MDD) is a most prevalent psychiatric disease which causes functional disabilities resulting in social problems. There is...
    Conference paper 2022
  13. Enabling fast and energy-efficient FM-index exact matching using processing-near-memory

    Memory bandwidth and latency constitutes a major performance bottleneck for many data-intensive applications. While high-locality access patterns...

    Jose M. Herruzo, Ivan Fernandez, ... Oscar Plata in The Journal of Supercomputing
    Article 02 March 2021
  14. Improving the Withdrawal Functionality on ATM Using a UCD Framework. A Case Study

    Nowadays, the use of electronic payment methods has increased due to the COVID-19 pandemic. The use of cash has been limited to reduce interactions;...
    Conference paper 2021
  15. RDFtex in-depth: knowledge exchange between LATEX-based research publications and Scientific Knowledge Graphs

    For populating Scientific Knowledge Graphs (SciKGs), research publications pose a central information source. However, typical forms of research...

    Leon Martin, Andreas Henrich in International Journal on Digital Libraries
    Article Open access 31 July 2023
  16. Building and Evaluating a WebApp for Effortless Deep Learning Model Deployment

    In the field of deep learning, particularly Natural Language Processing (NLP), model deployment is a key process for public testing and analysis....
    Ruikun Wu, Jiaxuan Han, ... Aldo Lipani in Advances in Information Retrieval
    Conference paper 2024
  17. Bitcoin as a Transaction Ledger: A Composable Treatment

    Bitcoin is one of the most prominent examples of a distributed cryptographic protocol that is extensively used in reality. Nonetheless, existing...

    Christian Badertscher, Ueli Maurer, ... Vassilis Zikas in Journal of Cryptology
    Article Open access 04 April 2024
  18. ExaSU: a mathematical model for selecting the structured or unstructured resource discovery mechanism in distributed exascale computing environments

    In this article, the function used for the functionality of the resource discovery in the equilibrium state analysis for operation describing the...

    Pouria Fakhri, Ehsan Mousavi Khaneghah, ... Araz R. Aliev in CCF Transactions on High Performance Computing
    Article 24 October 2022
  19. Power side-channel leakage assessment and locating the exact sources of leakage at the early stages of ASIC design process

    Power Side-channel attacks are a serious class of attacks which targets the vulnerabilities in physical implementation of a design. One of the main...

    Vahhab Samadi Bokharaie, Ali Jahanian in The Journal of Supercomputing
    Article 28 June 2021
  20. LoRaWAN Infrastructure Design and Implementation for Soil Moisture Monitoring: A Real-World Practical Case

    The application of Internet of Things technology in the agricultural sector has allowed to achieve a significant improvement in the process of...
    Erika Pamela Silva Gómez, Sang Guun Yoo in Computational Science – ICCS 2024
    Conference paper 2024
Did you find what you were looking for? Share feedback.