—Although significant efforts have been made in developing nonnegative blind source separation techniques, accurate separation of positive yet dependent sources remains a challen...
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Abstract. We present a mathematical model for a study of the mechanical properties of endovascular stents in their expanded state. The model is based on the theory of slender curve...
Josip Tambaca, M. Kosor, Suncica Canic, D. Paniagu...
K¨orner and Malvenuto asked whether one can find n n/2 linear orderings (i.e., permutations) of the first n natural numbers such that any pair of them places two consecutive int...
— Systematic Luby Transform (SLT) codes constitute rateless codes, which are capable of adaptively adjusting their code rate depending on the channel quality without any explicit...
Hoang Anh Ngo, Tim Stevens, Robert G. Maunder, Laj...