— This paper compares implementations of elliptic and hyperelliptic curve cryptography (ECC and HECC) on an FPGA platform. We use the same low-level blocks to implement the basic...
Lejla Batina, Nele Mentens, Bart Preneel, Ingrid V...
The anomaly detection problem has important applications in the field of fraud detection, network robustness analysis and intrusion detection. This paper is concerned with the prob...
There is a growing interest for underwater sensor networks where long term monitoring of water masses around the world for scientific, environmental, commercial, and military reas...
— This contribution approaches the problem of scratch restoration in old movies as a optimisation’s problem. The functional based on the statistical properties of the image aro...
AbstractThis paper describes the evolution of controllers for racing a simulated radio-controlled car around a track, modelled on a real physical track. Five different controller a...