
Private reputation retrieval in public  a privacyaware announcement scheme for VANETs
An announcement scheme is a system that facilitates vehicles to broadcas...
read it

Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones
Interconnected objects, either via public or private networks are the n...
read it

On Singleton Arc Consistency for Natural CSPs Defined by Forbidden Patterns
Singleton arc consistency is an important type of local consistency whic...
read it

Inductive Conformal Martingales for ChangePoint Detection
We consider the problem of quickest changepoint detection in data strea...
read it

Sex as Gibbs Sampling: a probability model of evolution
We show that evolutionary computation can be implemented as standard Mar...
read it

Probabilistic Programming with Gaussian Process Memoization
Gaussian Processes (GPs) are widely used tools in statistics, machine le...
read it

Tractable Combinations of Global Constraints
We study the complexity of constraint satisfaction problems involving gl...
read it

Efficiency of conformalized ridge regression
Conformal prediction is a method of producing prediction sets that can b...
read it

A probabilistic methodology for multilabel classification
Multilabel classification is a relatively recent subfield of machine lea...
read it

The tractability of CSP classes defined by forbidden patterns
The constraint satisfaction problem (CSP) is a general problem central t...
read it

A Formal Framework of Virtual Organisations as Agent Societies
We propose a formal framework that supports a model of agentbased Virtu...
read it

Follow the Leader If You Can, Hedge If You Must
FollowtheLeader (FTL) is an intuitive sequential prediction strategy t...
read it

Tag Clouds for Displaying Semantics: The Case of Filmscripts
We relate tag clouds to other forms of visualization, including planar o...
read it

Online prediction of ovarian cancer
In this paper we apply computer learning methods to diagnosing ovarian c...
read it

Adaptive Hedge
Most methods for decisiontheoretic online learning are based on the Hed...
read it

Fast, Linear Time Hierarchical Clustering using the Baire Metric
The Baire metric induces an ultrametric on a dataset and is of linear co...
read it

Fast redshift clustering with the Baire (ultra) metric
The Baire metric induces an ultrametric on a dataset and is of linear co...
read it

A generalized risk approach to path inference based on hidden Markov models
Motivated by the unceasing interest in hidden Markov models (HMMs), this...
read it

Infinite Viterbi alignments in the two state hidden Markov models
Since the early days of digital communication, Hidden Markov Models (HMM...
read it

EmLog: TamperResistant System Logging for Constrained Devices with TEEs
Remote mobile and embedded devices are used to deliver increasingly impa...
read it

Generation of unstructured meshes in 2D, 3D, and spherical geometries with embedded high resolution subregions
We present 2D, 3D, and spherical mesh generators for the Finite Elemen...
read it

What Is Decidable about String Constraints with the ReplaceAll Function
Recently, it was shown that any theory of strings containing the string...
read it

An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks
Avionics networks rely on a set of stringent reliability and safety requ...
read it

Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks
The notion of Integrated Modular Avionics (IMA) refers to interconnecte...
read it

Searching for Maximum OutDegree Vertices in Tournaments
A vertex x in a tournament T is called a king if for every vertex y of T...
read it

Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect
Many millions of users routinely use their Google, Facebook and Microsof...
read it

Which NPHard SAT and CSP Problems Admit Exponentially Improved Algorithms?
We study the complexity of SAT(Γ) problems for potentially infinite lang...
read it

Lightweight Classification of IoT Malware based on Image Recognition
The Internet of Things (IoT) is an extension of the traditional Internet...
read it

Empirical Evaluation of Approximation Algorithms for Generalized Graph Coloring and Uniform QuasiWideness
The notions of bounded expansion and nowhere denseness not only offer ro...
read it

Strong Subgraph kconnectivity
Generalized connectivity introduced by Hager (1985) has been studied ext...
read it

Strong subgraph kconnectivity bounds
Let D=(V,A) be a digraph of order n, S a subset of V of size k and 2< k≤...
read it

Secure Remote Credential Management with Mutual Attestation for Constrained Sensing Platforms with TEEs
Trusted Execution Environments (TEEs) are rapidly emerging as the goto ...
read it

Strong subgraph karcconnectivity
Two previous papers, arXiv:1803.00284 and arXiv:1803.00281, introduced a...
read it

Lower and Upper Bound for Computing the Size of All Second Neighbourhoods
We consider the problem of computing the size of each rneighbourhood fo...
read it

Parity to Safety in Polynomial Time for Pushdown and Collapsible Pushdown Systems
We give a direct polynomialtime reduction from parity games played over...
read it

Consumer Centric Data Control, Tracking and Transparency  A Position Paper
Personal data related to a user's activities, preferences and services, ...
read it

Private Information Retrieval using ProductMatrix Minimum Storage Regenerating Codes
Private Information Retrieval (PIR) schemes allow a user to retrieve a r...
read it

An evaluation of the security of the Bitcoin Peerto Peer Network
Bitcoin is a decentralised digital currency that relies on cryptography ...
read it

Resolution with Counting: Lower Bounds over Different Moduli
Resolution over linear equations (introduced in [RT08]) emerged recently...
read it

On rSimple kPath and Related Problems Parameterized by k/r
Abasi et al. (2014) and Gabizon et al. (2015) studied the following prob...
read it

MultiMessage Private Information Retrieval using ProductMatrix MSR and MBR Codes
Multimessage private information retrieval (MPIR) is an interesting var...
read it

Strong Subgraph Connectivity of Digraphs: A Survey
In this survey we overview known results on the strong subgraph kconnec...
read it

Attacks Against BLE Devices by Colocated Mobile Applications
Bluetooth Low Energy (BLE) is a fastgrowing wireless technology with a ...
read it

Functional repair codes: a view from projective geometry
Storage codes are used to ensure reliable storage of data in distributed...
read it

Multibudgeted directed cuts
We study multibudgeted variants of the classic minimum cut problem and ...
read it

Inglenook Shunting Puzzles
An inglenook puzzle is a classic shunting (switching) puzzle often found...
read it

Partial Awareness
We develop a modal logic to capture partial awareness. The logic has thr...
read it

Deep Learning Application in Security and Privacy  Theory and Practice: A Position Paper
Technology is shaping our lives in a multitude of ways. This is fuelled ...
read it

Arcdisjoint strong spanning subdigraphs in compositions and products of digraphs
A digraph D=(V,A) has a good decomposition if A has two disjoint sets A_...
read it

Statistical Guarantees for the Robustness of Bayesian Neural Networks
We introduce a probabilistic robustness measure for Bayesian Neural Netw...
read it
Royal Holloway, University of London
Royal Holloway, University of London, formally incorporated as Royal Holloway and Bedford New College, is a public research university and a constituent college of the federal University of London.