This paper introduces a new paradigm in the electromagnetic (EM) analysis of largely inhomogeneous nanostructures. It is shown that the high degree of inhomogeneity may render the traditional discretisation of such to...
详细信息
This paper introduces a new paradigm in the electromagnetic (EM) analysis of largely inhomogeneous nanostructures. It is shown that the high degree of inhomogeneity may render the traditional discretisation of such topologies problematic. A new discretisation scheme that is much better matched to these topologies is proposed. The scheme involves a more adequate meshing and discretisation formalism, in conjunction with an original combination of dual space-time EM field quantities to be calculated. The pivotal field equations are elaborately discussed, with an emphasis on their computational implications.
This paper focuses on Book Marketing Campaigns, where the benefit of offering each book is calculated based on a bipartite graph (biclique). A quasi Biclique problem is assessed for obtaining the probabilities of succ...
详细信息
The Stixel World is a medium-level, compact representation of road scenes that abstracts millions of disparity pixels into hundreds or thousands of stixels. The goal of this work is to implement and evaluate a complet...
详细信息
ISBN:
(纸本)9781509048236
The Stixel World is a medium-level, compact representation of road scenes that abstracts millions of disparity pixels into hundreds or thousands of stixels. The goal of this work is to implement and evaluate a complete multistixel estimation pipeline on an embedded, energy-efficient, GPU-accelerated device. This work presents a full GPUaccelerated implementation of stixel estimation that produces reliable results at 26 frames per second (real-time) on the Tegra X1 for disparity images of 1024×440 pixels and stixel widths of 5 pixels, and achieves more than 400 frames per second on a high-end Titan X GPU card.
This paper presents an ongoing work on methods for usability evaluation of audio- and haptic-based video games for learners who are blind. We report a Standard Usability Problem List which we envision to be the basis ...
详细信息
In this paper, we introduce a new visualization tool for network-wide intrusion detection. It is based in multivariate anomaly detection with a combination between Principal Component Analysis (PCA) and a new variant ...
详细信息
The discovery of fuzzy associations comprises a collection of data mining methods used to extract knowledge from large data sets. Although there is an extensive catalog of specialized algorithms that cover different a...
详细信息
ISBN:
(纸本)9781509060351
The discovery of fuzzy associations comprises a collection of data mining methods used to extract knowledge from large data sets. Although there is an extensive catalog of specialized algorithms that cover different aspects of the problem, the most recent approaches are not yet packaged in mainstream software environments. This makes it difficult to incorporate novel association rules methods to the data mining workflow. In this paper an extension of the RKEEL package is described that allows calling from the programming language R to those association rules methods contained in KEEL, which is one of the most comprehensive open source software suites. The potential of the proposed tool is illustrated through a case study comprising seven real-world datasets.
Elliptic Curve Cryptography operations rely heavily on the strong security of scalar multiplication. However, this operation is vulnerable to side channel (SCA) and fault injection (FA) attacks. The use of alternative...
详细信息
ISBN:
(纸本)9781538622452
Elliptic Curve Cryptography operations rely heavily on the strong security of scalar multiplication. However, this operation is vulnerable to side channel (SCA) and fault injection (FA) attacks. The use of alternative arithmetic systems like Residue Number System (RNS) for all scalar multiplication underline operations has been proposed as an efficient countermeasure approach for the above attacks. In RNS, a number is represented as a set of smaller numbers, where each one is the result of the modular reduction with a given moduli basis. Under certain requirements, a number can be uniquely transformed from the integers to the RNS domain (and vice versa) and all arithmetic operations can be performed in RNS. This representation provides an inherent SCA and FA resistance to many attacks and can be further enhanced by additional RNS arithmetic manipulations or more traditional algorithmic countermeasures. In this paper, extending our previous work, we explore the potentials of RNS as an SCA and FA countermeasure. A description of RNS based SCA and FA resistance means is provided through appropriate scalar multiplication algorithmic variations, traces of the proposed algorithm are collected and the results are analyzed regarding the RNS countermeasure strength. More specifically, in this paper, a secure RNS based Montgomery Power Ladder based scalar multiplication algorithm is provided and is implemented on an ARM Cortex A7 processor. The implementation SCA-FA resistance is evaluated by collecting preliminary leakage trace results that validate our initial assumptions.
Reciprocal best match graphs (RBMGs) are vertex colored graphs whose vertices represent genes and the colors the species where the genes reside. Edges identify pairs of genes that are most closely related with respect...
详细信息
In the process of collectively inventing new words for new concepts in a population, conflicts can quickly become numerous, in the form of synonymy and homonymy. Remembering all of them could cost too much memory, and...
详细信息
Fitch graphs G = (X, E) are di-graphs that are explained by {⊗, 1}-edge-labeled rooted trees with leaf set X: there is an arc xy ∈ E if and only if the unique path in T that connects the least common ancestor lca(x, ...
详细信息
暂无评论