This paper provides a novel algorithm to automatically detect the hidden hierarchy in terrorist networks. The algorithm is based on centrality measures used in social network analy...
Nasrullah Memon, Henrik Legind Larsen, David L. Hi...
— Close relationships between guessing functions and length functions are established. Good length functions lead to good guessing functions. In particular, guessing in the incre...
Performance Engineering is concerned with the reliable prediction and estimation of the performance of scientific and engineering applications on a variety of parallel and distrib...
Anonymous credential system promise efficient, ubiquitous access to digital services while preserving user privacy. However, their diffusion is impaired by the lack of efficient re...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente
We find a system of two polynomial equations in two unknowns, whose solution allows us to give an explicit expression of the conformal representation of a simply connected three-sh...