Blar i Department of Informatics på tittel
Viser treff 209-228 av 1199
-
Consistency of Heterogeneously Typed Behavioural Models: A Coalgebraic Approach
(Journal article; Peer reviewed, 2022)Systematic and formally underpinned consistency checking of heterogeneously typed interdependent behavioural models requires a common metamodel, into which the involved models can be translated. And, if additional system ... -
Consistency of LSO with syntactic equality
(Master thesis, 2023-06-01)LSO, Logic of Sentential Operators, is defined by extending first- order logic by sentential quantification and sentential operators. Its semantics is defined by a digraph, with kernels reflecting consistent valuations of ... -
Constructing APN functions through isotopic shifts
(Journal article; Peer reviewed, 2020)Almost perfect nonlinear (APN) functions over fields of characteristic 2 play an important role in cryptography, coding theory and, more generally, mathematics and information theory. In this paper we deduce a new method ... -
Construction of the circle in UniMath
(Journal article; Peer reviewed, 2021)We show that the type TZ of Z-torsors has the dependent universal property of the circle, which characterizes it up to a unique homotopy equivalence. The construction uses Voevodsky’s Univalence Axiom and propositional ... -
Continuous Levels-of-Detail and Visual Abstraction for Seamless Molecular Visualization
(Peer reviewed; Journal article, 2014-05-06)Molecular visualization is often challenged with rendering of large molecular structures in real time. We introduce a novel approach that enables us to show even large protein complexes. Our method is based on the ... -
A contrastive learning approach for individual re-identification in a wild fish population
(Journal article; Peer reviewed, 2023)In both terrestrial and marine ecology, physical tagging is a frequently used method to study population dynamics and behavior. However, such tagging techniques are increasingly being replaced by individual re-identification ... -
Convergence of Feedback Arc Set-Based Heuristics for Linear Structural Equation Models
(Journal article; Peer reviewed, 2022)Score-based structure learning in Bayesian networks, where local structures in the graph are given a score and one seeks to recover a high-scoring DAG from data, is an NP-hard problem. While the general learning problem ... -
Convexity, convolution and competitive equilibrium
(Journal article; Peer reviewed, 2023)This paper considers a chief interface between mathematical programming and economics, namely: money-based trade of perfectly divisible and transferable goods. Three important and related features are singled out here: ... -
Coset leaders of the first order Reed-Muller codes in the classes of Niho functions and Thershold functions
(Journal article; Peer reviewed, 2024)The notion of coset leader has applications in coding theory and cryptography. It has been studied in several papers. In this paper, we extend a recent study, made on the coset leaders of the first order Reed-Muller codes, ... -
Cost-sensitive ensemble learning: a unifying framework
(Journal article; Peer reviewed, 2022)Over the years, a plethora of cost-sensitive methods have been proposed for learning on data when different types of misclassification errors incur different costs. Our contribution is a unifying framework that provides a ... -
Counting Instances of Software Components
(Proceedings of LRPP'04: Workshop on Logics for Resources, Processes, and Programs, Turku, Finland, July 13, 2004, Conference lecture, 2004-07-13)Component software is software that has been assembled from various pieces of standardized, reusable computer programs, so-called components. Executing component software creates instances of these components. For several ... -
Counting research ⇒ directing research : the hazard of using simple metrics to evaluate scientific contributions : an EU experience
(Journal article; Peer reviewed, 2017)In many EU countries there is a requirement to count research, i.e., to measure and prove its value. These numbers, often produced automatically based on the impact of journals, are used to rank universities, to determine ... -
Covering Radius of Generalized Zetterberg Type Codes Over Finite Fields of Odd Characteristic
(Journal article; Peer reviewed, 2023)Let Fq0 be a finite field of odd characteristic. For an integer s≥1 , let Cs(q0) be the generalized Zetterberg code of length qs0+1 over Fq0 . If s is even, then we prove that the covering radius of Cs(q0) is 3. Put q=qs0 ... -
Covering Vectors by Spaces in Perturbed Graphic Matroids and Their Duals
(Peer reviewed; Journal article, 2019)Perturbed graphic matroids are binary matroids that can be obtained from a graphic matroid by adding a noise of small rank. More precisely, an r-rank perturbed graphic matroid M is a binary matroid that can be represented ... -
Creating a Virtual Reality Orchestral Concert Experience With 3D Audio
(Master thesis, 2020-06-16)With the emergence of Virtual Reality (VR) and recent advancements on both the hardware and software side, VR is now available to the masses and a plethora of new experiences can be made and explored by people and researchers. ... -
Creating Capture-the-Flag Challenges Inspired by Common Crypto Mistakes
(Master thesis, 2020-06-25) -
CRISPR Genome Editing Made Easy Through the CHOPCHOP Website
(Journal article; Peer reviewed, 2021)The design of optimal guide RNA (gRNA) sequences for CRISPR systems is challenged by the need to achieve highly efficient editing at the desired location (on-target editing) with minimal editing at unintended locations ... -
A critical view on Public Key Infrastructures
(Master thesis, 2004) -
Cross-Site Scripting Protection in Firefox. Creating a filter for Firefox protecting against Reflected cross-site scripting attacks
(Master thesis, 2018-08-21)One of the most dominant threats against web applications is the class of script injection attacks, also called cross-site scripting. This class of attacks affects the client-side of a web application, and is a critical ... -
Cryptanalysis of AES
(Master thesis, 2020-07-04)This thesis consists of an introductory part of how the symmetric cipher AES works in detail and how truncated differential cryptanalysis can be used to break some round reduced versions of AES. All the main attacks in ...