Event Stream-Based Process Discovery using Abstract Representations [PDF]
The aim of process discovery, originating from the area of process mining, is to discover a process model based on business process execution data. A majority of process discovery techniques relies on an event log as an input.
van der Aalst, Wil M. P. +2 more
core +3 more sources
A Compact and Scalable Hardware/Software Co-design of SIKE
We present efficient and compact hardware/software co-design implementations of the Supersingular Isogeny Key Encapsulation (SIKE) protocol on field-programmable gate arrays (FPGAs).
Pedro Maat C. Massolino +3 more
doaj +1 more source
Ancestral inference from haplotypes and mutations
We consider inference about the history of a sample of DNA sequences, conditional upon the haplotype counts and the number of segregating sites observed at the present time.
Griffiths, Robert C., Tavaré, Simon
core +1 more source
Iterative Blind Deconvolution Algorithm for Deblurring a Single PSP/TSP Image of Rotating Surfaces
Imaging of pressure-sensitive paint (PSP) for pressure measurement on moving surfaces is problematic due to the movement of the object within the finite exposure time of the imager, resulting in the blurring of the blade edges.
Anshuman Pandey, James W. Gregory
doaj +1 more source
An Online Unsupervised Structural Plasticity Algorithm for Spiking Neural Networks
In this article, we propose a novel Winner-Take-All (WTA) architecture employing neurons with nonlinear dendrites and an online unsupervised structural plasticity rule for training it.
Basu, Arindam, Roy, Subhrajit
core +1 more source
Evaluating Architecture Implementation Alternatives based on Adaptibility Concerns [PDF]
Software is rarely designed for ultimate adaptability, performance or reusability but rather it is a compromise of multiple considerations. Even for a simple architecture specification, one may identify many alternative implementations.
Aksit, Mehmet, Tekinerdogan, Bedir
core +2 more sources
MYCN Amplification in RB1‐Inactivated Retinoblastoma: Association With High‐Risk Features
ABSTRACT Background MYCN amplification occurs in a subset of retinoblastoma cases, both with and without RB1 inactivation. It has been suggested that retinoblastomas with MYCN amplification represent a distinct entity with more aggressive clinical behavior.
Kyriaki Papaioannou +9 more
wiley +1 more source
Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve
We present the first hardware implementations of Diffie-Hellman key exchange based on the Kummer surface of Gaudry and Schost’s genus-2 curve targeting a 128-bit security level.
Philipp Koppermann +3 more
doaj +1 more source
Efficient Neural Network Implementations on Parallel Embedded Platforms Applied to Real-Time Torque-Vectoring Optimization Using Predictions for Multi-Motor Electric Vehicles [PDF]
The combination of machine learning and heterogeneous embedded platforms enables new potential for developing sophisticated control concepts which are applicable to the field of vehicle dynamics and ADAS.
Cosco, Francesco +4 more
core +2 more sources
Towards Efficient Verification of Constant-Time Cryptographic Implementations
Timing side-channel attacks exploit secret-dependent execution time to fully or partially recover secrets of cryptographic implementations, posing a severe threat to software security. Constant-time programming discipline is an effective software-based countermeasure against timing side-channel attacks, but developing constant-time implementations ...
Luwei Cai, Fu Song, Taolue Chen
openaire +2 more sources

