Search
Search Results
-
ASTSDL: predicting the functionality of incomplete programming code via an AST-sequence-based deep learning model
Code recommendation systems have been widely used in hel** developers implement unfamiliar programming tasks. Many existing code recommenders or...
-
Recent Advancements on Functionality and Performance
In this chapter, we will continue our journey to introduce recent advancements of searchable encryption on functionality and performance. We will... -
Exact and sampling methods for mining higher-order motifs in large hypergraphs
Network motifs are recurrent, small-scale patterns of interactions observed frequently in a system. They shed light on the interplay between the...
-
CoVaMaT: Functionality for Variety Reuse Through a Supporting Tool
Develo** reusable Big Data Systems (BDSs) implies dealing with modeling variety as reusable assets. Conceptually speaking, these assets might be... -
Exact Query in Multi-version Key Encrypted Database via Bloom Filters
As people become more privacy conscious, the security requirements of databases are increasing, and thus the technology of encrypted databases is... -
Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation
Figuring out whether a particular semantic functionality exists in a binary program is challenging. While pattern-matching-based detection is... -
Exact Security Analysis of ASCON
The Ascon cipher suite, offering both authenticated encryption with associated data (AEAD) and hashing functionality, has recently emerged as the... -
Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs
In this work, we study hybrid exact/relaxed zero-knowledge proofs from lattices, where the proved relation is exact in one part and relaxed in the... -
Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality
Multi-input functional encryption, MIFE, is a powerful generalization of functional encryption that allows computation on encrypted data coming from... -
Towards the X-Theory: An Evaluation of the Perceived Quality and Functionality of DEMO’s Process Model
The Design and Engineering Methodology for Organizations (DEMO) comprises a set of models and diagrams to represent an organization. A proposal for a... -
On the Exact Round Complexity of Secure Three-Party Computation
We settle the exact round complexity of three-party computation (3PC) in honest-majority setting, for a range of security notions such as selective...
-
Prognosis of Clinical Depression with Resting State Functionality Connectivity using Machine Learning
Major Depressive Disorder (MDD) is a most prevalent psychiatric disease which causes functional disabilities resulting in social problems. There is... -
Enabling fast and energy-efficient FM-index exact matching using processing-near-memory
Memory bandwidth and latency constitutes a major performance bottleneck for many data-intensive applications. While high-locality access patterns...
-
Improving the Withdrawal Functionality on ATM Using a UCD Framework. A Case Study
Nowadays, the use of electronic payment methods has increased due to the COVID-19 pandemic. The use of cash has been limited to reduce interactions;... -
RDFtex in-depth: knowledge exchange between LATEX-based research publications and Scientific Knowledge Graphs
For populating Scientific Knowledge Graphs (SciKGs), research publications pose a central information source. However, typical forms of research...
-
Building and Evaluating a WebApp for Effortless Deep Learning Model Deployment
In the field of deep learning, particularly Natural Language Processing (NLP), model deployment is a key process for public testing and analysis.... -
Bitcoin as a Transaction Ledger: A Composable Treatment
Bitcoin is one of the most prominent examples of a distributed cryptographic protocol that is extensively used in reality. Nonetheless, existing...
-
ExaSU: a mathematical model for selecting the structured or unstructured resource discovery mechanism in distributed exascale computing environments
In this article, the function used for the functionality of the resource discovery in the equilibrium state analysis for operation describing the...
-
Power side-channel leakage assessment and locating the exact sources of leakage at the early stages of ASIC design process
Power Side-channel attacks are a serious class of attacks which targets the vulnerabilities in physical implementation of a design. One of the main...
-
LoRaWAN Infrastructure Design and Implementation for Soil Moisture Monitoring: A Real-World Practical Case
The application of Internet of Things technology in the agricultural sector has allowed to achieve a significant improvement in the process of...