S. Picek
17 records found
1
Core-guided solvers and Implicit Hitting Set (IHS) solvers have become ubiquitous within the field of Maximum Satisfiability (MaxSAT). While both types of solvers iteratively increase the solution cost until a satisfiable solution is found, the manner in which this relaxation is
...
Reverse Engineering of Web Cookies
When is too late for your private data?
Nowadays, the online industry contributes to a multi-billion dollar business, facilitates most of the population's everyday activities, and processes vast amounts of data, including personal data. Current work aims to explore the inconsistency or consistency of the content obtain
...
Blockchain technology has proven to be a promising solution for decentralized systems in various industries. At the core of a blockchain system is the peer-to-peer (P2P) overlay, which facilitates communication be- tween parties in the blockchain system. Recently, there is increa
...
Explainable AI (XAI) has gained increasing attention from more and more researchers with an aim to improve human interaction with AI systems. In the context of human-agent teamwork (HAT), providing explainability to the agent helps to increase shared team knowledge and belief, th
...
Virtual robot soccer competitions have been rising in popularity in recent years, due to their easier accessibility than physical robot soccer. This is also the reason these virtual competitions were created. The goal is to compete in the AI world cup, one of the virtual soccer c
...
Robot soccer competitions have been around for a while and have been a great environment to develop AI algorithms in. One of these environments is the AI world cup. The AI world cup environment is a virtual environment where two teams with five robots each play a soccer match. Th
...
This work analyses context effect in the evaluation of music similarity performed by human annotators to better understand the impact of context effects in the current annotation protocol of Music Information Retrieval Evaluation eXchange (MIREX). Human annotators are known to be
...
In our increasingly digital society, we are making a growing amount of data available to computers, networks and third parties. As a consequence, our sensitive data is in danger of getting exposed. The field of multi-party computation attempts to mitigate this by studying protoco
...
Due to the rapid growth of diseases like diabetes, machine-learning (ML) advanced clinical decision support systems (CDSS) that support doctors or patients in their care might prove to be a valuable asset. In the battle to make healthcare more accessible, adopting ML techniques c
...
Online advertisement is a multi-billion dollar industry that constitutes a primary source of income for most publishers offering free content on the Web. Online behavioural advertisement refers to the practice of serving targeted ads to online users based on their potential inter
...
The value of data has increased enormously over the last couple of years. Many datasets contain valuable information that can, for example, be used to make forecasts. In this thesis, the dataset of a company in the self-storage industry is analyzed. The company offers customers
...
Privacy-preserving data aggregation protocols have been researched widely, but usually cannot guarantee correctness of the aggregate if users are malicious. These protocols can be extended with zero-knowledge proofs and commitments to work in the malicious model, but this incurs
...
Elliptic Curve Cryptography (ECC) performance is a major performance bottleneck when serving many VPN clients from a single server on a low-frequency FPGA softcore CPU. Using an area-efficient Elliptic Curve Point (ECP) multiplication accelerator core on the same FGPA, a much hig
...
Little or Large?
The effects of network size on AI explainability in Side-Channel Attacks
For a system to be able to interpret data, learn from it, and use those learnings to reach goals and perform tasks is what it means to be intelligent [1]. Since systems are not a product of nature, but rather made by humans they are called Artificial Intelligence (AI). The field
...
BGP security and the future
A meta-analysis of BGP threats and security to provide a new direction for practical BGP security
The Internet consists of many subnetworks, which are connected to each other. These subnetworks are the autonomous systems (ASes) that make up the Internet: each hosts a part of it. In order to successfully determine routes from one of these ASes to the other, the Border Gateway
...
Inter-Autonomous System (AS) route monitoring is the process of collecting the inter-AS routing information. This information flows on the Internet in the form of BGP UPDATE messages, and the BGP data are the messages obtained by the monitors. Existing methods of monitor placemen
...
In the past years, society has become increasingly more reliant on the Internet. Consequently, the security of the Internet became of critical importance. This thesis focusses on the security of one of the Internet's main protocols. This protocol, called the Border Gateway Proto
...