Sciweavers

ADHOC
2016
55views Database» more  ADHOC 2016»
10 years 15 days ago
Security of electrostatic field persistent routing: Attacks and defense mechanisms
—Electrostatic Field-based Routing (EFR) is a form of geographical multi-path routing where packets are routed along a collection of electrostatic field lines, defined by elect...
Oliviu C. Ghica, Cristina Nita-Rotaru, Goce Trajce...
ADHOC
2016
60views Database» more  ADHOC 2016»
10 years 15 days ago
Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags
RFID, which stands for Radio Frequency Identification, is a relatively new technology often envisioned as an enabler of the Internet of Things. The widespread use of this technol...
Tassos Dimitriou
ADCM
2016
70views Database» more  ADCM 2016»
10 years 15 days ago
Rank-1 lattice rules for multivariate integration in spaces of permutation-invariant functions - Error bounds and tractability
We study multivariate integration of functions that are invariant under permutations (of subsets) of their arguments. We find an upper bound for the nth minimal worst case error ...
Dirk Nuyens, Gowri Suryanarayana, Markus Weimar
ADAC
2016
10 years 15 days ago
Extreme logistic regression
With the recent popularity of electronic medical records, enormous amount of medical data is being generated every day at an exponential rate. Machine learning methods have been s...
Che Ngufor, Janusz Wojtusiak
ACSC
2016
IEEE
10 years 15 days ago
Mining autograding data in computer science education
In this paper we present an analysis of the impact of instant feedback and autograding in computer science education,
Vincent Gramoli, Michael A. Charleston, Bryn Jeffr...
ACSC
2016
IEEE
10 years 15 days ago
Finding state collisions in the authenticated encryption stream cipher ACORN
This paper analyzes the authenticated encryption algorithm ACORN, a candidate in the CAESAR cryptographic competition. We identify weaknesses in the state update function of ACORN ...
Md. Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Ba...
ACSC
2016
IEEE
10 years 15 days ago
Symmetry declarations for MiniZinc
Abstract. Underlying symmetries in constraint satisfaction and optimization problems can make the search for solutions or optimal solutions much harder. In contrast, when symmetrie...
Nathaniel Baxter, Geoffrey Chu, Peter J. Stuckey
ACS
2016
10 years 15 days ago
t-Structures are Normal Torsion Theories
Abstract. We characterize t-structures in stable ∞-categories as suitable quasicategorical factorization systems. More precisely we show that a t-structure t on a stable ∞-cate...
Domenico Fiorenza, Fosco Loregiàn
ACIIDS
2016
IEEE
61views Database» more  ACIIDS 2016»
10 years 15 days ago
Redhyte: Towards a Self-diagnosing, Self-correcting, and Helpful Analytic Platform
Abstract. We present a platform named Redhyte, short for an interactive platform for “Rapid exploration of data and hypothesis testing”. Redhyte aims to augment the conventiona...
Wei Zhong Toh, Kwok Pui Choi, Limsoon Wong