Strong lattice reduction is the key element for most attacks against lattice-based cryptosystems. Between the strongest but impractical HKZ reduction and the weak but fast LLL redu...
In a component oriented approach, components are designed, developed and validated in order to be widely used. However one cannot always foresee which specific uses will be made o...
: As business transitions into the new economy, e-system successful use has become a strategic goal. Especially in business to consumer (e-commerce) applications, users highly eval...
Recent work demonstrates the potential for extracting patterns from users' behavior as detected by sensors. Since there is currently no generalized framework for reasoning abo...
Nasim Mahmud, Jo Vermeulen, Kris Luyten, Karin Con...
This paper puts to use concepts and tools introduced in Part I to address a wide spectrum of noncausal sampling and reconstruction problems. Particularly, we follow the systemtheor...