Search results for "Cryptography"

showing 10 items of 657 documents

Strengthened splitting methods for computing resolvents

2021

In this work, we develop a systematic framework for computing the resolvent of the sum of two or more monotone operators which only activates each operator in the sum individually. The key tool in the development of this framework is the notion of the “strengthening” of a set-valued operator, which can be viewed as a type of regularisation that preserves computational tractability. After deriving a number of iterative schemes through this framework, we demonstrate their application to best approximation problems, image denoising and elliptic PDEs. FJAA and RC were partially supported by the Ministry of Science, Innovation and Universities of Spain and the European Regional Development Fund …

Splitting algorithmControl and Optimization0211 other engineering and technologies47H05 90C30 65K05Elliptic pdesMonotonic function02 engineering and technology01 natural sciencesMonotone operatorOperator (computer programming)Development (topology)Estadística e Investigación OperativaFOS: Mathematics0101 mathematicsImage denoisingResolventMathematics - Optimization and ControlMathematicsResolvent021103 operations researchApplied Mathematics010102 general mathematicsAlgebraComputational MathematicsMonotone polygonOptimization and Control (math.OC)StrengtheningKey (cryptography)Computational Optimization and Applications
researchProduct

VLPZ: The Vehicular Location Privacy Zone

2016

International audience; One of the key challenges in the success of vehicular ad hoc networks (VANETs) is to consider the location privacy of drivers. Although, the pseudonym changing approach is suggested by standardization development organizations such as IEEE and ETSI, the development of an effective pseudonym changing strategy is still an open issue. The existing pseudonym changing strategies are either not effective to protect against the pseudonyms linking attacks or can have a negative impact on the VANETs’ applications. To address these issues, this paper proposes a new pseudonym changing strategy based on the Vehicular Location Privacy Zone (VLPZ), which is a roadside infrastructu…

StandardizationComputer scienceWireless ad hoc networkSecurity.02 engineering and technologyPseudonymComputer securitycomputer.software_genre[SPI]Engineering Sciences [physics]0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringVANETsGeneral Environmental ScienceLocation privacybiologybusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020302 automobile design & engineering020206 networking & telecommunicationsPseudonym ChangingTollMetric (mathematics)biology.proteinKey (cryptography)SecurityGeneral Earth and Planetary SciencesComputingMilieux_COMPUTERSANDSOCIETYbusinesscomputerAnonymityComputer network
researchProduct

FLP estimation of semi-parametric models for space-time point processes and diagnostic tools

2015

Abstract The conditional intensity function of a space–time branching model is defined by the sum of two main components: the long-run term intensity and short-run term one. Their simultaneous estimation is a complex issue that usually requires the use of hard computational techniques. This paper deals with a new mixed estimation approach for a particular space–time branching model, the Epidemic Type Aftershock Sequence model. This approach uses a simultaneous estimation of the different model components, alternating a parametric step for estimating the induced component by Maximum Likelihood and a non-parametric estimation step, for the background intensity, by FLP (Forward Predictive Like…

Statistics and ProbabilityComputer scienceSpace timeR packageProbability and statisticsManagement Monitoring Policy and LawSpace-time point processePoint processSemiparametric modelTerm (time)ETAS modelComputers in Earth ScienceComponent (UML)StatisticsCode (cryptography)Computers in Earth SciencesAlgorithmEtasFLPParametric statistics
researchProduct

Adaptive reference-free compression of sequence quality scores

2014

Motivation: Rapid technological progress in DNA sequencing has stimulated interest in compressing the vast datasets that are now routinely produced. Relatively little attention has been paid to compressing the quality scores that are assigned to each sequence, even though these scores may be harder to compress than the sequences themselves. By aggregating a set of reads into a compressed index, we find that the majority of bases can be predicted from the sequence of bases that are adjacent to them and hence are likely to be less informative for variant calling or other applications. The quality scores for such bases are aggressively compressed, leaving a relatively small number at full reso…

Statistics and ProbabilityFOS: Computer and information sciencesComputer sciencemedia_common.quotation_subjectReference-freecomputer.software_genreBiochemistryDNA sequencingSet (abstract data type)Redundancy (information theory)BWTComputer Science - Data Structures and AlgorithmsCode (cryptography)AnimalsHumansQuality (business)Data Structures and Algorithms (cs.DS)Quantitative Biology - GenomicsCaenorhabditis elegansMolecular Biologymedia_commonGenomics (q-bio.GN)SequenceGenomeSettore INF/01 - Informaticareference-free compressionHigh-Throughput Nucleotide SequencingGenomicsSequence Analysis DNAData CompressioncompressionComputer Science ApplicationsComputational MathematicsComputational Theory and MathematicsFOS: Biological sciencesData miningquality scoreMetagenomicscomputerBWT; compression; quality score; reference-free compressionAlgorithmsReference genome
researchProduct

M-Centrality: identifying key nodes based on global position and local degree variation

2023

Identifying influential nodes in a network is a major issue due to the great deal of applications concerned, such as disease spreading and rumor dynamics. That is why, a plethora of centrality measures has emerged over the years in order to rank nodes according to their topological importance in the network. Local metrics such as degree centrality make use of a very limited information and are easy to compute. Global metrics such as betweenness centrality exploit the information of the whole network structure at the cost of a very high computational complexity. Recent works have shown that combining multiple metrics is a promising strategy to quantify the node's influential ability. Our wor…

Statistics and ProbabilitySocial and Information Networks (cs.SI)FOS: Computer and information sciencesComputer scienceStatistical and Nonlinear PhysicsComputer Science - Social and Information Networks01 natural sciencesDegree (music)010305 fluids & plasmasVariation (linguistics)Position (vector)0103 physical sciencesStatisticsKey (cryptography)Statistics Probability and Uncertainty010306 general physicsCentrality
researchProduct

THE KEY ROLE OF LIQUIDITY FLUCTUATIONS IN DETERMINING LARGE PRICE CHANGES

2005

Recent empirical analyses have shown that liquidity fluctuations are important for understanding large price changes of financial assets. These liquidity fluctuations are quantified by gaps in the order book, corresponding to blocks of adjacent price levels containing no quotes. Here we study the statistical properties of the state of the limit order book for 16 stocks traded at the London Stock Exchange (LSE). We show that the time series of the first three gaps are characterized by fat tails in the probability distribution and are described by long memory processes.

Stock exchangeGeneral MathematicsFinancial marketEconometricsOrder bookKey (cryptography)EconomicsGeneral Physics and AstronomyProbability distributionLiquidity crisisPrice levelMarket liquidityFluctuation and Noise Letters
researchProduct

Talking Blockchains: The Perspective of a Database Researcher

2021

There are few topics out there, that seem to create as much confusion and discussion as blockchains. This has a multitude of reasons: (1) A large number of drastically different concepts and systems are unified under the very broad term "blockchain". (2) The topic touches a variety of different fields, including databases, distributed processing, networks, cryptography, and even economics. (3) There exists a large number of different applications of the technology.The goal of this paper is to simplify and structure the discussion of blockchain technology. We first introduce a simple formalization of the basic components, that appear again and again in a variety of blockchain systems. Second…

Structure (mathematical logic)BlockchainDatabaseDistributed databaseTransaction processingComputer sciencebusiness.industryExistential quantification010102 general mathematicsCryptography0102 computer and information sciencescomputer.software_genre01 natural sciencesVariety (cybernetics)Workflow010201 computation theory & mathematics0101 mathematicsbusinesscomputer2021 IEEE 37th International Conference on Data Engineering Workshops (ICDEW)
researchProduct

2015

Abstract. The coupling of Earth system model components, which work on different grids, into an Earth System Model (ESM) provokes the necessity to transfer data from one grid to another. Additionally, each of these model components might require data import onto its specific grid. Usually, one of two approaches is used: Either all input data is preprocessed to the employed grid, or the imported data is interpolated on-line, i.e. during model integration to the required grid. For the former, each change in the model resolution requires the re-preprocessing of all data. The latter option implies that in each model integration computing time is required for the grid mapping. If all components …

Structure (mathematical logic)Interface (Java)business.industryComputer scienceDistributed computingModular designcomputer.software_genreGridSoftwareCode (cryptography)Data miningTime seriesbusinesscomputerInterpolationGeoscientific Model Development Discussions
researchProduct

Optimal Adaptive Inspection Planning Process in Service of Fatigued Aircraft Structures

2009

In this paper, a control theory is used for planning inspections in service of fatigue-sensitive aircraft structure components under crack propagation. One of the most important features of control theory is its great generality, enabling one to analyze diverse systems within one unified framework. A key idea, which has emerged from this study, is the necessity of viewing the process of planning in-service inspections as an adaptive control process. Adaptation means the ability of self-modification and self-adjustment in accordance with varying conditions of environment. The adaptive control of inspection planning process in service of fatigued aircraft structures differs from ordinary stoc…

Structure (mathematical logic)Stochastic controlService (systems architecture)Adaptive controlControl theoryComputer scienceProcess (engineering)Key (cryptography)Adaptation (computer science)Industrial engineeringSimulation
researchProduct

Applying Finite State Process Algebra to Formally Specify a Computational Model of Security Requirements in the Key2phone-Mobile Access Solution

2015

Key2phone is a mobile access solution which turns mobile phone into a key for electronic locks, doors and gates. In this paper, we elicit and analyse the essential and necessary safety and security requirements that need to be considered for the Key2phone interaction system. The paper elaborates on suggestions/solutions for the realisation of safety and security concerns considering the Internet of Things (IoT) infrastructure. The authors structure these requirements and illustrate particular computational solutions by deploying the Labelled Transition System Analyser (LTSA), a modelling tool that supports a process algebra notation called Finite State Process (FSP). While determining an in…

Structure (mathematical logic)Theoretical computer scienceFinite-state machineComputer sciencebusiness.industryMobile phoneRealisationProcess calculusTransition systemKey (cryptography)Software engineeringbusinessNotation
researchProduct