Informatics

Understanding the limitations and improving the relevance of SPICE simulations in side-channel security evaluations
Simulation is a very powerful tool for hardware designers. It generally allows the preliminary evaluation of a chip’s performance before its final tape out. As security against side-channel attacks is an increasingly important issue for cryptographic devices, simulation also becomes a desirable option for preliminary evaluation in this case. However, its relevance highly depends on the proper...


Crossmodal shaping of pain: a multisensory approach to nociception
Noxious stimuli in our environment are often accompanied by input from other sensory modalities that can affect the processing of these stimuli and the perception of pain. Stimuli from these other modalities may distract us from pain and reduce its perceived strength. Alternatively, they can enhance the saliency of the painful input, leading to an increased pain experience. We discuss factors t...
Revenue maximization in a Bayesian double auction market
We study double auction market design where the market maker wants to maximize its total revenue by buying low from the sellers and selling high to the buyers. We consider a Bayesian setting where buyers and sellers have independent probability distributions on the values of products on the market. For the simplest setting, each seller has one kind of indivisible good with a bounded (integer) a...


Approximating the maximum multiple RNA interaction problem
Rna interactions are fundamental in many cellular processes, where two or more rna molecules can be involved. Multiple rna interactions are also believed to be much more complex than pairwise interactions. Recently, multiple rna interaction prediction has been formulated as a maximization problem. Here we extensively examine this optimization problem under several biologically meaningful intera...
Efficient counting of square substrings in a tree
We give an algorithm which in O ( n log 2 n ) time counts all distinct squares in a labeled tree. There are two main obstacles to overcome. The first one is that the number of distinct squares in a tree is Ω ( n 4 / 3 ) (see Crochemore et al., CPM 2012), which differs substantially from the case of classical strings for which there are only linearly many distinct squares. We o...


Computing majority via multiple queries
We study the following combinatorial problem. Let B be the set of balls such that each ball is in one of two colors, and let k ≥ 2 be an integer. A query consists of selecting k balls from the set B and the answer to the query is either that (i) all balls have the same color, or (ii) there exist two balls of different colors and a pair of those is pointed out. The goal is to design a strate...
Popular and clan-popular b-matchings
Suppose that each member of a set of agents has a preference list of a subset of houses, possibly involving ties, and each agent and house has their capacity denoting the maximum number of houses/agents (respectively) that can be matched to him/her/it. We want to find a matching M, called popular, for which there is no other matching M ′ such that more agents prefer M ′ to M...

Analysis of Pull-In Instability of Geometrically Nonlinear Microbeam Using Radial Basis Artificial Neural Network Based on Couple Stress Theory
The static pull-in instability of beam-type microelectromechanical systems (MEMS) is theoretically investigated. Two engineering cases including cantilever and double cantilever microbeam are considered. Considering the midplane stretching as the source of the nonlinearity in the beam behavior, a nonlinear size-dependent Euler-Bernoulli beam model is used based on a modified couple stress theor...
A new approach for maintenance scheduling of generating units in electrical power systems based on their operational hours
Generator maintenance scheduling (GMS) determines the outage periods of generating units in a one-year or two-year planning horizon for regular safety inspection. This paper introduces a new practical GMS for centralized electrical power systems in which, in contrary to previous studies, the outage periods are scheduled based on operational hours of units. Predefined minimum and maximum operati...

Parallel Machine Scheduling Problem with Preemptive Jobs and Transportation Delay
In this research the parallel machine scheduling problem with preemption by considering a constant transportation delay for migrated jobs and minimization of makespan as the criterion i.e., P m pmtn(delay) C max is investigated. It is assumed that when a preempted job resumes on another machine, it is required a delay between the processing time of the job on these two machines. This delay i...
The Spammed Code Offset Method
Helper data schemes are a security primitive used for privacy-preserving biometric databases and physical unclonable functions. One of the oldest known helper data schemes is the code offset method (COM). We propose an extension of the COM: the helper data are accompanied by many instances of fake helper data that are drawn from the same distribution as the real one. While the adversary has no ...

3D Assisted Face Recognition: Dealing With Expression Variations
One of the most critical sources of variation in face recognition is facial expressions, especially in the frequent case where only a single sample per person is available for enrollment. that improve the accuracy in the presence of such variations are still required for a reliable authentication system. In this paper, we address this problem with an analysis-by-synthesis-based scheme, in which...
Adaptively Splitted GMM With Feedback Improvement for the Task of Background Subtraction
Per pixel adaptive Gaussian mixture models (GMMs) have become a popular choice for the detection of change in the video surveillance domain because of their ability to cope with many challenges characteristic for surveillance systems in real time with low memory requirements. Since their first introduction in the surveillance domain, GMM has been enhanced in many directions. In this paper, we p...
Sampling and series expansion for linear canonical transform
The linear canonical transform (LCT) has been shown to be a powerful tool for optics and signal processing. This paper investigates new sampling relations in the LCT domain. Firstly, the relationship between linear canonical series (LCS) and LCT is introduced. The LCS expansion coefficients are the sampled values of LCT. Then, based on the conventional Fourier series and LCS, two new sampling r...
Structural similarity classifier for facial expression recognition
A novel Gabor filter structural similarity algorithm (GFSSIM) is proposed for facial expression recognition (FER) on noisy images. Low-resolution facial images with low SNRs are specifically dealt with FER system. The features are extracted using 40 Gabor filters, and a feature subset is selected for classification. The test image is classified based on proposed GFSSIM algorithm. The experiment...