In this paper, we present a framework for mining diverging patterns, a new type of contrast patterns whose frequency changes significantly differently in two data sets, e.g., it c...
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Coalmine gas disaster is one of the severe natural disasters that restrict the safety production of coalmines. Timely monitoring and alarming of coalmine gas is an important part o...
Abstract--Memory accesses are a major cause of energy consumption for embedded systems and the stack is a frequent target for data accesses. This paper presents a fully software te...
Abstract. Scheduling staff shift work in a hospital ward is a well-known problem in the operation research field but, as such, it is very often studied from the algorithmic point o...
Carmelo Ardito, Paolo Buono, Maria Francesca Costa...