Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Abstract-- This article describes the Candidate Design Environment we developed for efficient identification of promising drug candidates. Developing effective drugs from active mo...
M. Ihsan Ecemis, J. Wikel, C. Bingham, Eric Bonabe...
Abstract--We present an algorithm that coevolves fitness predictors, optimized for the solution population, which reduce fitness evaluation cost and frequency, while maintaining ev...
Abstract--In this paper, we introduce a novel approach to timeseries prediction realized both at the linguistic and numerical level. It exploits fuzzy cognitive maps (FCMs) along w...
Abstract--A new grid conversion method is proposed to resample between two 2-D periodic lattices with the same sampling density. The main feature of our approach is the symmetric r...
Laurent Condat, Dimitri Van De Ville, Brigitte For...