Abstract. We consider the question of adaptive security for two related cryptographic primitives: all-or-nothing transforms and exposureresilient functions. Both are concerned with...
Our goal is to optimize regularized image reconstruction methods for emission tomography with respect to the task of detecting small lesions of unknown location in the reconstruct...
— Metaheuristics such as Estimation of Distribution Algorithms and the Cross-Entropy method use probabilistic modelling and inference to generate candidate solutions in optimizat...
Marcus Gallagher, Ian Wood, Jonathan M. Keith, Geo...
Scheduling disk requests with service guarantees has to bring the demand to meet guarantees in line with the need to optimize disk utilization. This paper presents the design, imp...
Database support for multidimensional arrays is an area of growing importance; a variety of highvolume applications such as spatio-temporal data management and statistics/OLAP bec...
Peter Baumann, Andreas Dehmel, Paula Furtado, Rola...