Many research studies adopt manually selected patterns for semantic relation extraction. However, manually identifying and discovering patterns is time consuming and it is difficu...
Wenbo Wang, Christopher Thomas, Amit P. Sheth, Vic...
The huge size of online social networks (OSNs) makes it prohibitively expensive to precisely measure any properties which require the knowledge of the entire graph. To estimate the...
We present a model of adaptive attacks which we combine with information-theoretic metrics to quantify the information revealed to an adaptive adversary. This enables us to expres...
The purpose of this article is to encourage research on the aspects of consumer behaviour, particularly as found in groups of consumers. For both researchers and practitioners, co...
Massimo Franco, Francesca Di Virgilio, Loredana Di...
—Single and double scalar multiplications are the most computational intensive operations in elliptic curve based cryptosystems. Improving the performance of these operations is ...
Jithra Adikari, Vassil S. Dimitrov, Laurent Imbert