Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2024
Seamlessly Transferring Assets through Layer-0 Bridges: An Empirical Analysis of Stargate Bridge's Architecture and Dynamics
WWW '24: Companion Proceedings of the ACM Web Conference 2024Pages 1776–1784https://doi.org/10.1145/3589335.3651964The increasing number of distinct blockchains has led to a growing need for data exchange and asset transfer across various isolated blockchains. To address this, cross-chain bridges have emerged as a critical mechanism for enabling interoperability and ...
- posterMay 2024
Cross-Chain Payments on Blockchain Networks: An Apartment Booking Use-Case
SAC '24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied ComputingPages 608–611https://doi.org/10.1145/3605098.3636137This article presents a solution that allows utilizing cross-chain payments for any use case. We chose to evaluate it on an apartment booking. Despite this, the solution allows users to rent anything they wish (ranging from power tools to cars or lands) ...
- research-articleMay 2024
Evaluation of bridge structure damage based on deep learning identification model
Journal of Computational Methods in Sciences and Engineering (JOCMSE), Volume 24, Issue 2Pages 1223–1236https://doi.org/10.3233/JCM-247331Safety monitoring is an important part of bridge engineering construction and operation. At present, there is room for promoting the health monitoring and evaluation of small and medium-sized concrete bridges. In view of this, the study first models the ...
- research-articleNovember 2022Best Paper
Maximum entropy bridgelets for trajectory completion
SIGSPATIAL '22: Proceedings of the 30th International Conference on Advances in Geographic Information SystemsArticle No.: 79, Pages 1–8https://doi.org/10.1145/3557915.3561015Location measurements from people and vehicles often have long temporal gaps between them. However, we would still like to reason about location behavior during these gaps. This paper presents a new method for filling these gaps that is both principled ...
- extended-abstractJune 2022
Seeds, Brains, and Bridges: Allegory of Venice, Arts, and Science for a Vision of the Future
C&C '22: Proceedings of the 14th Conference on Creativity and CognitionPages 649–651https://doi.org/10.1145/3527927.3531194What could the Venice of the future look like? A project for an ideal city can take off from an allegory: arts and sciences inside a seed of Lodoicea maldivica, whose bipartition reminds us of a human brain. From the seeds left by the past, we derive ...
-
- research-articleAugust 2021
Improving railway track coverage with mmWave bridges: A Measurement Campaign
5G-MeMU '21: Proceedings of the 1st Workshop on 5G Measurements, Modeling, and Use CasesPages 8–13https://doi.org/10.1145/3472771.3472774Bringing cellular capacity into modern trains is challenging because they act as Faraday cages. Building a radio frequency (RF) corridor along the railway tracks ensures a high signal-to-noise ratio and limits handovers. However, building such RF ...
- rfcJuly 2021
RFC 9071: RTP-Mixer Formatting of Multiparty Real-Time Text
This document provides enhancements of real-time text (as specified in RFC 4103) suitable for mixing in a centralized conference model, enabling source identification and rapidly interleaved transmission of text from different sources. The intended use is ...
- research-articleJanuary 2021
Number of Hamiltonian Cycles in Planar Triangulations
SIAM Journal on Discrete Mathematics (SIDMA), Volume 35, Issue 2Pages 1005–1021https://doi.org/10.1137/20M1366551Whitney proved in 1931 that 4-connected planar triangulations are Hamiltonian. Hakimi, Schmeichel, and Thomassen conjectured in 1979 that if $G$ is a 4-connected planar triangulation with $n$ vertices, then $G$ contains at least $2(n-2)(n-4)$ Hamiltonian ...
- research-articleNovember 2020
Bypassing Tor Exit Blocking with Exit Bridge Onion Services
CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications SecurityPages 3–16https://doi.org/10.1145/3372297.3417245Tor exit blocking, in which websites disallow clients arriving from Tor, is a growing and potentially existential threat to the anonymity network. This paper introduces HebTor, a new and robust architecture for exit bridges---short-lived proxies that ...
- research-articleOctober 2020
Breesse: bridging EMF, simulink and stateflow for model-based design of safety-critical systems
MODELS '20: Proceedings of the 23rd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems: Companion ProceedingsArticle No.: 38, Pages 1–10https://doi.org/10.1145/3417990.3421408Both the Eclipse platform and MathWorks have successfully provided entire ecosystems and tooling for Model-Driven Engineering (MDE). On the one hand, the Eclipse community has built a rich set of open source tools and applications to address different ...
- research-articleMay 2020
A Bridge between Polynomial Optimization and Games with Imperfect Recall
AAMAS '20: Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent SystemsPages 456–464We provide several positive and negative complexity results for solving games with imperfect recall. Using a one-to-one correspondence between these games on one side and multivariate polynomials on the other side, we show that solving games with ...
- research-articleFebruary 2017
A heuristic approach to output-only system identification under transient excitation
Expert Systems with Applications: An International Journal (EXWA), Volume 68, Issue CPages 11–20https://doi.org/10.1016/j.eswa.2016.10.007Output-only system identification under non-white-noise excitation is addressed.The classical approach consists in using long records.The white-noise excitation assumption is trivially validated during free-vibration.An algorithm is developed to ...
- articleOctober 2016
Oscillatory neural associative memories with synapses based on memristor bridges
Optical Memory and Neural Networks (SPOMNN), Volume 25, Issue 4Pages 219–227https://doi.org/10.3103/S1060992X16040068An approach to the implementation of electronic associative memories with tunable weights based on the resistor bridges containing memristors--a bidirectional associative memory (BAM) and an associative memory based on the Hopfield network--is proposed. ...
- research-articleNovember 2015
Two-way Communications in Cognitive Personal Area Networks
MSWiM '15: Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile SystemsPages 107–114https://doi.org/10.1145/2811587.2811617We describe a low-overhead two-way bridging scheme for cognitive personal area networks (CPANs) and analyze its performance through probabilistic analysis and renewal theory. We show that the CPANs are indeed decoupled in terms of synchronization, but ...
- ArticleJune 2014
Influence of X-Shaped Elastic-Plastic Steel Stop Block on Bridge Based on FEM
ISDEA '14: Proceedings of the 2014 Fifth International Conference on Intelligent Systems Design and Engineering ApplicationsPages 562–565https://doi.org/10.1109/ISDEA.2014.131To ascertain the influence of the X-shaped elastic-plastic steel stop block on the lateral seismic response of the bridge, the research has been done to analyze the effect of the yield strength of the steel stop block and the height of the pier based on ...
- research-articleNovember 2013
ScrambleSuit: a polymorphic network protocol to circumvent censorship
WPES '13: Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic societyPages 213–224https://doi.org/10.1145/2517840.2517856Deep packet inspection technology became a cornerstone of Internet censorship by facilitating cheap and effective filtering of what censors consider undesired information. Moreover, filtering is not limited to simple pattern matching but makes use of ...
- research-articleNovember 2013
Intelligent environment monitoring system based on Innovative Integration Technology via Programmable System On Chip platform and ZigBee network
IET Communications (CMU2), Volume 7, Issue 16Pages 1789–1801https://doi.org/10.1049/iet-com.2013.0266This work builds an intelligent environmental monitoring system for industrial production and safety concerns. There are a number of smart monitoring systems developed for smart grids, bridges or machine system management, temperature/humidity monitoring ...
- ArticleOctober 2013
Design of a RS485-to-1553B Bus Bridge
CYBERC '13: Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge DiscoveryPages 255–258https://doi.org/10.1109/CyberC.2013.50Based on the analysis on the characteristics of RS485 and 1553B bus, a bus system of 1553B protocol over RS485 transceivers is introduced, which can reduce the mass, size and power of spacecrafts when applied in space missions. Design of a RS485-to-...
- ArticleAugust 2012
Design Patterns Applied in Power System Analysis Software Package
ICICEE '12: Proceedings of the 2012 International Conference on Industrial Control and Electronics EngineeringPages 836–840https://doi.org/10.1109/ICICEE.2012.222Power System Analysis Software Package (PSASP) is widely used in power system simulation. The design of PSASP faces many changeable factors. Several design patterns in object-oriented programming are applied in the design of PSASP to reduce the ...
- ArticleMay 2012
Study on the Load Test of New Highway Bridge
ICETCE '12: Proceedings of the 2012 Second International Conference on Electric Technology and Civil EngineeringPages 2826–2829As we all know that the bridge may appear different diseases after years of operation. The static and dynamic tests are taken to understand the actual working condition and the bearing capacity of the bridge. This article describes the principle and ...