Abstract. We study the link between formal and cryptographic models for security protocols in the presence of passive and adaptive adversaries. We first describe the seminal resul...
— A novel black-box model for time series of prices analysis is proposed. It is constructed using the technique of “shaping filter”. The model identification is then propos...
— The idea of using evolutionary techniques to optimize the performance of neural networks is now widely used, but some approaches have been found to result in the evolution of r...
An inpainting technique for images and videos is introduced. The idea is to use fluid equations – the Navier-Stokes equations- as a PDE based method for the image processing. The...
This paper presents the results of a survey of requirements for attribute aggregation in authorisation systems, gathered from an international community of security professionals....