Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Model checking techniques have traditionally dealt with temporal logic languages and automata interpreted over -words, i.e., infinite in the future but finite in the past. However...
Matteo Pradella, Angelo Morzenti, Pierluigi San Pi...
We give the first proof of security for an identity-based encryption scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model ...
Mathematical modeling of the spread of infectious diseases is a well established field with high practical importance. Underlying most analytical approaches is the assumption of ...
Parameters used in physical models for nonrigid and articulated motion analysis are often not known with high precision. It has been recognized that commonly used assumptions abou...
Yong Zhang, Dmitry B. Goldgof, Sudeep Sarkar, Leon...