
-
Human-in-the-loop Artificial Intelligence
Little by little, newspapers are revealing the bright future that Artifi...
read it
-
On a Model for Integrated Information
In this paper we give a thorough presentation of a model proposed by Ton...
read it
-
Parsing with CYK over Distributed Representations: "Classical" Syntactic Parsing in the Novel Era of Neural Networks
Syntactic parsing is a key task in natural language processing which has...
read it
-
Approximation of the truncated Zeta distribution and Zipf's law
Zipf's law appears in many application areas but does not have a closed ...
read it
-
Adaptive Performance Optimization under Power Constraint in Multi-thread Applications with Diverse Scalability
In modern data centers, energy usage represents one of the major factors...
read it
-
Enhancing Predicate Pairing with Abstraction for Relational Verification
Relational verification is a technique that aims at proving properties t...
read it
-
Predicate Pairing for Program Verification
It is well-known that the verification of partial correctness properties...
read it
-
Geographical Load Balancing across Green Datacenters
"Geographic Load Balancing" is a strategy for reducing the energy cost o...
read it
-
On a Stackelberg Subset Sum Game
This contribution deals with a two-level discrete decision problem, a so...
read it
-
Degrees of extensionality in the theory of Böhm trees and Sallé's conjecture
The main observational equivalences of the untyped lambda-calculus have ...
read it
-
CECT: Computationally Efficient Congestion-avoidance and Traffic Engineering in Software-defined Cloud Data Centers
The proliferation of cloud data center applications and network function...
read it
-
Estimation in emerging epidemics: biases and remedies
When analysing new emerging infectious disease outbreaks one typically h...
read it
-
Constrained maximum likelihood estimation of clusterwise linear regression models with unknown number of components
We consider an equivariant approach imposing data-driven bounds for the ...
read it
-
Solving Horn Clauses on Inductive Data Types Without Induction
We address the problem of verifying the satisfiability of Constrained Ho...
read it
-
Quantum Internet: from Communication to Distributed Computing!
In this invited paper, the authors discuss the exponential computing spe...
read it
-
Online Reciprocal Recommendation with Theoretical Performance Guarantees
A reciprocal recommendation problem is one where the goal of learning is...
read it
-
CuCoTrack: Cuckoo Filter Based Connection Tracking
This paper introduces CuCoTrack, a cuckoo hash based data structure desi...
read it
-
Decremental SPQR-trees for Planar Graphs
We present a decremental data structure for maintaining the SPQR-tree of...
read it
-
Joint Failure Recovery, Fault Prevention, and Energy-efficient Resource Management for Real-time SFC in Fog-supported SDN
In this paper, we focus on the problems of traffic engineering, failure ...
read it
-
Consensus Needs Broadcast in Noiseless Models but can be Exponentially Easier in the Presence of Noise
Consensus and Broadcast are two fundamental problems in distributed comp...
read it
-
Bounded Symbolic Execution for Runtime Error Detection of Erlang Programs
Dynamically typed languages, like Erlang, allow developers to quickly wr...
read it
-
SDN Architecture and Southbound APIs for IPv6 Segment Routing Enabled Wide Area Networks
The SRv6 architecture (Segment Routing based on IPv6 data plane) is a pr...
read it
-
Quantum Internet: Networking Challenges in Distributed Quantum Computing
By networking multiple quantum devices, the Quantum Internet builds up a...
read it
-
Coalition Resilient Outcomes in Max k-Cut Games
We investigate strong Nash equilibria in the max k-cut game, where we ar...
read it
-
Finding a Bounded-Degree Expander Inside a Dense One
It follows from the Marcus-Spielman-Srivastava proof of the Kadison-Sing...
read it
-
Dominating Sets and Connected Dominating Sets in Dynamic Graphs
In this paper we study the dynamic versions of two basic graph problems:...
read it
-
A Conceptual Framework for Assessing Anonymization-Utility Trade-Offs Based on Principal Component Analysis
An anonymization technique for databases is proposed that employs Princi...
read it
-
Segment Routing: A comprehensive survey of research activities, standardization efforts and implementation results
In this paper we present a comprehensive survey on SR technology analyzi...
read it
-
Proving Properties of Sorting Programs: A Case Study in Horn Clause Verification
The proof of a program property can be reduced to the proof of satisfiab...
read it
-
Asymptotics for Spherical Functional Autoregressions
In this paper, we investigate a class of spherical functional autoregres...
read it
-
Step-by-Step Community Detection for Volume-Regular Graphs
Spectral techniques have proved amongst the most effective approaches to...
read it
-
Lemma Generation for Horn Clause Satisfiability: A Preliminary Study
It is known that the verification of imperative, functional, and logic p...
read it
-
Explicit error estimates for spline approximation of arbitrary smoothness in isogeometric analysis
In a recent publication, explicit constants have been provided in a prio...
read it
-
Curvilinear Virtual Elements for 2D solid mechanics applications
In the present work we generalize the curvilinear Virtual Element techno...
read it
-
Teaching Performance Modeling in the era of millennials
Performance Modeling (PM) teaching started in the early 70s and reached ...
read it
-
Is It Safe Living in the Vicinity of Cellular Towers? Analysis of Long-Term Human EMF Exposure at Population Scale
We focus on the ElectroMagnetic Field (EMF) exposure safety for people l...
read it
-
Removing Algebraic Data Types from Constrained Horn Clauses Using Difference Predicates
We address the problem of proving the satisfiability of Constrained Horn...
read it
-
Cutting Bamboo Down to Size
This paper studies the problem of programming a robotic panda gardener t...
read it
-
Phase Transition of a Non-Linear Opinion Dynamics with Noisy Interactions
In several real Multi-Agent Systems (MAS), it has been observed that onl...
read it
-
Parallel Load Balancing on Constrained Client-Server Topologies
We study parallel Load Balancing protocols for a client-server distribut...
read it
-
Micro SIDs: a solution for Efficient Representation of Segment IDs in SRv6 Networks
The Segment Routing (SR) architecture is based on loose source routing. ...
read it
-
Best low-rank approximations and Kolmogorov n-widths
We relate the problem of best low-rank approximation in the spectral nor...
read it
-
Directional quantile classifiers
We introduce classifiers based on directional quantiles. We derive theor...
read it