-
Privacy-Aware MMSE Estimation
We investigate the problem of the predictability of random variable $Y$ under a privacy constraint dictated by random variable $X$, correlated with $Y$, where both predictability and privacy are assessed in terms of the minimum ... Read More >
-
QRKE: Resistance to Attacks using the Inverse of the Cosine Representation of Ch ...
We've been able to show recently that Permutable Chebyshev polynomials (T polynomials) defined over the field of real numbers can be used to create a Diffie-Hellman-like key exchange algorithm and certificates. The cryptosystem ... Read More >
-
Location Games on Networks: Existence and Efficiency of Equilibria
We consider a game where a finite number of retailers choose a location, given that their potential consumers are distributed on a network. Retailers do not compete on price but only on location, therefore each consumer shops at ... Read More >
-
Multi-Object Reasoning with Constrained Goal Models
Goal models have been widely used in Computer Science to represent software requirements, business objectives, and design qualities. Existing goal modelling techniques, however, have shown limitations of expressiveness and/or tr ... Read More >
-
Improving virtual host efficiency through resource and interference aware schedu ...
Modern Infrastructure-as-a-Service Clouds operate in a competitive environment that caters to any user's requirements for computing resources. The sharing of the various types of resources by diverse applications poses a series ... Read More >
-
On the Degrees-of-Freedom of the K-user Distributed Broadcast Channel
We study the Degrees-of-Freedom (DoF) in a wireless setting in which K Transmitters (TXs) aim at jointly serving K users. The performance is studied when the TXs are faced with a distributed Channel State Information (CSI) confi ... Read More >
-
Nmag micromagnetic simulation tool - software engineering lessons learned
We review design and development decisions and their impact for the open source code Nmag from a software engineering in computational science point of view. We summarise lessons learned and recommendations for future computatio ... Read More >
-
Monitoring in the Clouds: Comparison of ECO2Clouds and EXCESS Monitoring Approac ...
With the increasing adoption of private cloud infrastructures by providers and enterprises, the monitoring of these infrastructures is becoming crucial. The rationale behind monitoring is manifold: reasons include saving energy, ... Read More >
-
CoVer-ability: Consistent Versioning for Concurrent Objects
An object type characterizes the domain space and the operations that can be invoked on an object of that type. In this paper we introduce a new property for concurrent objects, we call coverability, that aims to provide precise ... Read More >
-
Providing Probabilistic Robustness Guarantee for Crowdsensing
Due to its flexible and pervasive sensing ability, crowdsensing has been extensively studied recently in research communities. However, the fundamental issue of how to meet the requirement of sensing robustness in crowdsensing r ... Read More >