Sciweavers

CODASPY
2016
10 years 12 days ago
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks
In recent years, simple password-based authentication systems have increasingly proven ineffective for many classes of real-world devices. As a result, many researchers have conc...
Valeriu-Daniel Stanciu, Riccardo Spolaor, Mauro Co...
CODASPY
2016
10 years 12 days ago
An Authorization Service for Collaborative Situation Awareness
In international military coalitions, situation awareness is achieved by gathering critical intel from different authorities. Authorities want to retain control over their data, a...
Alexandru Ionut Egner, Duc Luu, Jerry den Hartog, ...
CODASPY
2016
10 years 12 days ago
On the Origin of Mobile Apps: Network Provenance for Android Applications
Many mobile services consist of two components: a server providing an API, and an application running on smartphones and communicating with the API. An unresolved problem in this ...
Ryan Stevens, Jonathan Crussell, Hao Chen 0003
CODASPY
2016
10 years 12 days ago
Private Processing of Outsourced Network Functions: Feasibility and Constructions
Luca Melis, Hassan Jameel Asghar, Emiliano De Cris...
CODASPY
2016
10 years 12 days ago
JSLINQ: Building Secure Applications across Tiers
Musard Balliu, Benjamin Liebe, Daniel Schoepe, And...
38
Voted
COAP
2016
87views more  COAP 2016»
10 years 12 days ago
Bounded perturbation resilience of projected scaled gradient methods
Abstract We investigate projected scaled gradient (PSG) methods for convex minimization problems. These methods perform a descent step along a diagonally scaled gradient direction ...
Wenma Jin, Yair Censor, Ming Jiang
24
Voted
COAP
2016
42views more  COAP 2016»
10 years 12 days ago
Convergence conditions for Newton-type methods applied to complementarity systems with nonisolated solutions
Andreas Fischer 0004, Markus Herrich, Alexey F. Iz...
30
Voted
COAP
2016
47views more  COAP 2016»
10 years 12 days ago
Active-set prediction for interior point methods using controlled perturbations
We propose the use of controlled perturbations to address the challenging question of optimal active-set prediction for interior point methods. Namely, in the context of linear pr...
Coralia Cartis, Yiming Yan
34
Voted
COAP
2016
70views more  COAP 2016»
10 years 12 days ago
On the steepest descent algorithm for quadratic functions
The steepest descent algorithm with exact line searches (Cauchy algorithm) is inefficient, generating oscillating step lengths and a sequence of points converging to the span of t...
Clóvis C. Gonzaga, Ruana M. Schneider
30
Voted
COAP
2016
52views more  COAP 2016»
10 years 12 days ago
On the cone eigenvalue complementarity problem for higher-order tensors
Chen Ling, Hongjin He, Liqun Qi