Basu, Samik Kasilingam, Ramesh
Published in
Forum Mathematicum
This paper deals with certain results on the number of smooth structures on quaternionic projective spaces, obtained through the computation of inertia groups and their analogues, which in turn are computed using techniques from stable homotopy theory. We show that the concordance inertia group is trivial in dimension 20, but there are many example...
Xiong, Xiaokun
Published in
Applied Mathematics and Nonlinear Sciences
Economic benefits continue to increase with the rapid development of the tourism industry. The level of tourism development is an indicator to measure the maturity of a country’s tourism industry. The article takes China’s coastal provinces as the research object and uses finite element ordinary differential mathematical equations to explore the in...
Barman, Ludovic Dacosta, Italo Zamani, Mahdi Zhai, Ennan Pyrgelis, Apostolos Ford, Bryan Feigenbaum, Joan Hubaux, Jean-Pierre
Published in
Proceedings on Privacy Enhancing Technologies
Organizational networks are vulnerable to trafficanalysis attacks that enable adversaries to infer sensitive information fromnetwork traffic—even if encryption is used. Typical anonymous communication networks are tailored to the Internet and are poorly suited for organizational networks.We present PriFi, an anonymous communication protocol for LAN...
Haack, Marie-Laurence
Published in
Etruscan and Italic Studies
Froelicher, David Troncoso-Pastoriza, Juan R. Pyrgelis, Apostolos Sav, Sinem Sousa, Joao Sa Bossuat, Jean-Philippe Hubaux, Jean-Pierre
Published in
Proceedings on Privacy Enhancing Technologies
In this paper, we address the problem of privacy-preserving distributed learning and the evaluation of machine-learning models by analyzing it in the widespread MapReduce abstraction that we extend with privacy constraints. We design spindle (Scalable Privacy-preservINg Distributed LEarning), the first distributed and privacy-preserving system that...
Lueks, Wouter Hampiholi, Brinda Alpár, Greg Troncoso, Carmela
Published in
Proceedings on Privacy Enhancing Technologies
Users’ devices, e.g., smartphones or laptops, are typically incapable of securely storing and processing cryptographic keys.We present Tandem, a novel set of protocols for securing cryptographic keys with support from a central server. Tandem uses one-time-use key-share tokens to preserve users’ privacy with respect to a malicious central server. A...
Smid, Stefan
Published in
Deutsche Zeitschrift für Wirtschafts- und Insolvenzrecht
Rücker, Andrea Zappa, Massimiliano Boss, Stefan Freyberg, Jana von
Published in
Journal of Hydrology and Hydromechanics
The contribution of snow meltwater to catchment streamflow can be quantified through hydrograph separation analyses for which stable water isotopes (18O, 2H) are used as environmental tracers. For this, the spatial and temporal variability of the isotopic composition of meltwater needs to be captured by the sampling method. This study compares an o...
Farges, Patrick Röseberg, Dorothee
Published in
SYMPOSIUM [email protected]
Farges, Patrick Röseberg, Dorothee Knopper, Françoise Mäder, Marie-Therese Moine, Caroline
Published in
SYMPOSIUM [email protected]