Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
The paper deals with the recording and the evaluation of a multi modal (audio/video) database of spontaneous emotions. Firstly, motivation for this work is given and different rec...
Rok Gajsek, Vitomir Struc, Bostjan Vesnicer, Anja ...
Service Level Agreements (SLA) include quality of service (QoS) constraints and bounds that have to be honoured by the service provider. To maximise the Service Provider revenue wh...
Mike J. Boniface, Stephen C. Phillips, Alfonso S&a...
In this paper, we investigate the security, in the Luby-Rackoff security paradigm, of blockcipher modes of operation allowing to expand a one-block input into a longer t-block ou...
From an engineering point of view, the problem of coordinating a set of autonomous, mobile robots for the purpose of cooperatively performing a task has been studied extensively o...
Paola Flocchini, Giuseppe Prencipe, Nicola Santoro...