Skip to main content

Showing 1–50 of 50 results for author: Nascimento, A

  1. arXiv:2403.19935  [pdf, other

    cs.CV

    CP HDR: A feature point detection and description library for LDR and HDR images

    Authors: Artur Santos Nascimento, Valter Guilherme Silva de Souza, Daniel Oliveira Dantas, Beatriz Trinchão Andrade

    Abstract: In computer vision, characteristics refer to image regions with unique properties, such as corners, edges, textures, or areas with high contrast. These regions can be represented through feature points (FPs). FP detection and description are fundamental steps to many computer vision tasks. Most FP detection and description methods use low dynamic range (LDR) images, sufficient for most application… ▽ More

    Submitted 28 March, 2024; originally announced March 2024.

    MSC Class: 68T45 ACM Class: I.4.0

  2. arXiv:2305.08600  [pdf, other

    cs.LG

    Evaluating Splitting Approaches in the Context of Student Dropout Prediction

    Authors: Bruno de M. Barros, Hugo A. D. do Nascimento, Raphael Guedes, Sandro E. Monsueto

    Abstract: The prediction of academic dropout, with the aim of preventing it, is one of the current challenges of higher education institutions. Machine learning techniques are a great ally in this task. However, attention is needed in the way that academic data are used by such methods, so that it reflects the reality of the prediction problem under study and allows achieving good results. In this paper, we… ▽ More

    Submitted 15 May, 2023; originally announced May 2023.

    Comments: 11 pages, 3 figures, 3 tables, FECS'21 - The 17th International Conference on Frontiers in Education: Computer Science and Computer Engineering, Transactions on Computational Science and Computational Intelligence

    MSC Class: 68T09 ACM Class: I.2.5

  3. Feature point detection in HDR images based on coefficient of variation

    Authors: Artur Santos Nascimento, Welerson Augusto Lino de Jesus Melo, Daniel Oliveira Dantas, Beatriz Trinchão Andrade

    Abstract: Feature point (FP) detection is a fundamental step of many computer vision tasks. However, FP detectors are usually designed for low dynamic range (LDR) images. In scenes with extreme light conditions, LDR images present saturated pixels, which degrade FP detection. On the other hand, high dynamic range (HDR) images usually present no saturated pixels but FP detection algorithms do not take advant… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

    ACM Class: I.4.0

  4. arXiv:2303.13529  [pdf, other

    cs.NI cs.LG

    Enhancing Peak Network Traffic Prediction via Time-Series Decomposition

    Authors: Tucker Stewart, Bin Yu, Anderson Nascimento, Juhua Hu

    Abstract: For network administration and maintenance, it is critical to anticipate when networks will receive peak volumes of traffic so that adequate resources can be allocated to service requests made to servers. In the event that sufficient resources are not allocated to servers, they can become prone to failure and security breaches. On the contrary, we would waste a lot of resources if we always alloca… ▽ More

    Submitted 9 March, 2023; originally announced March 2023.

  5. arXiv:2210.07332  [pdf, other

    cs.CR cs.LG

    Secure Multiparty Computation for Synthetic Data Generation from Distributed Data

    Authors: Mayana Pereira, Sikha Pentyala, Anderson Nascimento, Rafael T. de Sousa Jr., Martine De Cock

    Abstract: Legal and ethical restrictions on accessing relevant data inhibit data science research in critical domains such as health, finance, and education. Synthetic data generation algorithms with privacy guarantees are emerging as a paradigm to break this data logjam. Existing approaches, however, assume that the data holders supply their raw data to a trusted curator, who uses it as fuel for synthetic… ▽ More

    Submitted 28 October, 2022; v1 submitted 13 October, 2022; originally announced October 2022.

  6. arXiv:2209.02384  [pdf, other

    physics.geo-ph cs.DB cs.LG

    Data Centred Intelligent Geosciences: Research Agenda and Opportunities, Position Paper

    Authors: Aderson Farias do Nascimento, Martin A. Musicante, Umberto Souza da Costa, Bruno M. Carvalho, Marcus Alexandre Nunes, Genoveva Vargas-Solar

    Abstract: This paper describes and discusses our vision to develop and reason about best practices and novel ways of curating data-centric geosciences knowledge (data, experiments, models, methods, conclusions, and interpretations). This knowledge is produced from applying statistical modelling, Machine Learning, and modern data analytics methods on geo-data collections. The problems address open methodolog… ▽ More

    Submitted 20 August, 2022; originally announced September 2022.

  7. arXiv:2206.01826  [pdf, other

    stat.ME cs.CV eess.IV math.ST physics.data-an

    The Gamma Generalized Normal Distribution: A Descriptor of SAR Imagery

    Authors: G. M. Cordeiro, R. J. Cintra, L. C. Rêgo, A. D. C. Nascimento

    Abstract: We propose a new four-parameter distribution for modeling synthetic aperture radar (SAR) imagery named the gamma generalized normal (GGN) by combining the gamma and generalized normal distributions. A mathematical characterization of the new distribution is provided by identifying the limit behavior and by calculating the density and moment expansions. The GGN model performance is evaluated on bot… ▽ More

    Submitted 3 June, 2022; originally announced June 2022.

    Comments: 21 pages, 6 figures, 6 tables

    Journal ref: Journal of Computational and Applied Mathematics, vol. 347, pages 257-272, February 2019

  8. arXiv:2205.11584  [pdf, other

    cs.LG cs.CR

    PrivFairFL: Privacy-Preserving Group Fairness in Federated Learning

    Authors: Sikha Pentyala, Nicola Neophytou, Anderson Nascimento, Martine De Cock, Golnoosh Farnadi

    Abstract: Group fairness ensures that the outcome of machine learning (ML) based decision making systems are not biased towards a certain group of people defined by a sensitive attribute such as gender or ethnicity. Achieving group fairness in Federated Learning (FL) is challenging because mitigating bias inherently requires using the sensitive attribute values of all clients, while FL is aimed precisely at… ▽ More

    Submitted 26 August, 2022; v1 submitted 23 May, 2022; originally announced May 2022.

  9. arXiv:2204.09518  [pdf

    eess.SP cs.AI

    Simulation of machine learning-based 6G systems in virtual worlds

    Authors: Ailton Oliveira, Felipe Bastos, Isabela Trindade, Walter Frazao, Arthur Nascimento, Diego Gomes, Francisco Muller, Aldebaro Klautau

    Abstract: Digital representations of the real world are being used in many applications, such as augmented reality. 6G systems will not only support use cases that rely on virtual worlds but also benefit from their rich contextual information to improve performance and reduce communication overhead. This paper focuses on the simulation of 6G systems that rely on a 3D representation of the environment, as ca… ▽ More

    Submitted 15 April, 2022; originally announced April 2022.

    Journal ref: ITU Journal on Future and Evolving Technologies, Volume 2 (2021), Issue 4 - AI and machine learning solutions in 5G and future networks, Pages 113-123

  10. arXiv:2202.02625  [pdf, other

    cs.CR cs.LG

    Training Differentially Private Models with Secure Multiparty Computation

    Authors: Sikha Pentyala, Davis Railsback, Ricardo Maia, Rafael Dowsley, David Melanson, Anderson Nascimento, Martine De Cock

    Abstract: We address the problem of learning a machine learning model from training data that originates at multiple data owners while providing formal privacy guarantees regarding the protection of each owner's data. Existing solutions based on Differential Privacy (DP) achieve this at the cost of a drop in accuracy. Solutions based on Secure Multiparty Computation (MPC) do not incur such accuracy loss but… ▽ More

    Submitted 1 September, 2022; v1 submitted 5 February, 2022; originally announced February 2022.

  11. arXiv:2112.03213  [pdf, other

    cs.CL

    Zero-shot hashtag segmentation for multilingual sentiment analysis

    Authors: Ruan Chaves Rodrigues, Marcelo Akira Inuzuka, Juliana Resplande Sant'Anna Gomes, Acquila Santos Rocha, Iacer Calixto, Hugo Alexandre Dantas do Nascimento

    Abstract: Hashtag segmentation, also known as hashtag decomposition, is a common step in preprocessing pipelines for social media datasets. It usually precedes tasks such as sentiment analysis and hate speech detection. For sentiment analysis in medium to low-resourced languages, previous research has demonstrated that a multilingual approach that resorts to machine translation can be competitive or superio… ▽ More

    Submitted 6 December, 2021; originally announced December 2021.

    Comments: 12 pages, 5 figures, 5 tables

    ACM Class: I.2.7

  12. arXiv:2106.02769  [pdf, other

    cs.CR cs.LG

    Privacy-Preserving Training of Tree Ensembles over Continuous Data

    Authors: Samuel Adams, Chaitali Choudhary, Martine De Cock, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen

    Abstract: Most existing Secure Multi-Party Computation (MPC) protocols for privacy-preserving training of decision trees over distributed data assume that the features are categorical. In real-life applications, features are often numerical. The standard ``in the clear'' algorithm to grow decision trees on data with continuous values requires sorting of training examples for each feature in the quest for an… ▽ More

    Submitted 4 June, 2021; originally announced June 2021.

  13. arXiv:2103.11240  [pdf, ps, other

    cs.CR cs.LG

    Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines

    Authors: Rafael Dowsley, Caleb Horst, Anderson C. A. Nascimento

    Abstract: We propose protocols for obliviously evaluating finite-state machines, i.e., the evaluation is shared between the provider of the finite-state machine and the provider of the input string in such a manner that neither party learns the other's input, and the states being visited are hidden from both. For alphabet size $|Σ|$, number of states $|Q|$, and input length $n$, previous solutions have eith… ▽ More

    Submitted 6 January, 2022; v1 submitted 20 March, 2021; originally announced March 2021.

  14. A new interpretable unsupervised anomaly detection method based on residual explanation

    Authors: David F. N. Oliveira, Lucio F. Vismari, Alexandre M. Nascimento, Jorge R. de Almeida Jr, Paulo S. Cugnasca, Joao B. Camargo Jr, Leandro Almeida, Rafael Gripp, Marcelo Neves

    Abstract: Despite the superior performance in modeling complex patterns to address challenging problems, the black-box nature of Deep Learning (DL) methods impose limitations to their application in real-world critical domains. The lack of a smooth manner for enabling human reasoning about the black-box decisions hinder any preventive action to unexpected events, in which may lead to catastrophic consequenc… ▽ More

    Submitted 14 March, 2021; originally announced March 2021.

    Comments: 8 pages

    ACM Class: I.2.6; I.2.1

  15. arXiv:2101.07365  [pdf, other

    cs.CR cs.LG

    Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation

    Authors: Amanda Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha

    Abstract: We propose a privacy-preserving Naive Bayes classifier and apply it to the problem of private text classification. In this setting, a party (Alice) holds a text message, while another party (Bob) holds a classifier. At the end of the protocol, Alice will only learn the result of the classifier applied to her text input and Bob learns nothing. Our solution is based on Secure Multiparty Computation… ▽ More

    Submitted 8 June, 2021; v1 submitted 18 January, 2021; originally announced January 2021.

  16. arXiv:2008.11705  [pdf, other

    cs.DB

    Towards A Personal Shopper's Dilemma: Time vs Cost

    Authors: Samiul Anwar, Francesco Lettich, Mario A. Nascimento

    Abstract: Consider a customer who needs to fulfill a shopping list, and also a personal shopper who is willing to buy and resell to customers the goods in their shopping lists. It is in the personal shopper's best interest to find (shopping) routes that (i) minimize the time serving a customer, in order to be able to serve more customers, and (ii) minimize the price paid for the goods, in order to maximize… ▽ More

    Submitted 25 September, 2020; v1 submitted 26 August, 2020; originally announced August 2020.

    Comments: An abridged version of this paper will appear at The 28th ACM SIGSPATIAL Intl Conf. on Advances in Geographic Information Systems 2020 (ACM SIGSPATIAL 2020), Seattle, Washington, USA, November 3-6, 2020

    ACM Class: H.2.4

  17. arXiv:2003.14348  [pdf, ps, other

    cs.CV cs.LG

    UniformAugment: A Search-free Probabilistic Data Augmentation Approach

    Authors: Tom Ching LingChen, Ava Khonsari, Amirreza Lashkari, Mina Rafi Nazari, Jaspreet Singh Sambee, Mario A. Nascimento

    Abstract: Augmenting training datasets has been shown to improve the learning effectiveness for several computer vision tasks. A good augmentation produces an augmented dataset that adds variability while retaining the statistical properties of the original dataset. Some techniques, such as AutoAugment and Fast AutoAugment, have introduced a search phase to find a set of suitable augmentation policies for a… ▽ More

    Submitted 31 March, 2020; originally announced March 2020.

  18. arXiv:2003.05703  [pdf, other

    cs.CR stat.ML

    Inline Detection of DGA Domains Using Side Information

    Authors: Raaghavi Sivaguru, Jonathan Peck, Femi Olumofin, Anderson Nascimento, Martine De Cock

    Abstract: Malware applications typically use a command and control (C&C) server to manage bots to perform malicious activities. Domain Generation Algorithms (DGAs) are popular methods for generating pseudo-random domain names that can be used to establish a communication between an infected bot and the C&C server. In recent years, machine learning based systems have been widely used to detect DGAs. There ar… ▽ More

    Submitted 12 March, 2020; originally announced March 2020.

  19. arXiv:2002.05377  [pdf, other

    cs.CR cs.LG

    High Performance Logistic Regression for Privacy-Preserving Genome Analysis

    Authors: Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen, Ariel Todoki

    Abstract: In this paper, we present a secure logistic regression training protocol and its implementation, with a new subprotocol to securely compute the activation function. To the best of our knowledge, we present the fastest existing secure Multi-Party Computation implementation for training logistic regression models on high dimensional genome data distributed across a local area network.

    Submitted 3 March, 2020; v1 submitted 13 February, 2020; originally announced February 2020.

  20. arXiv:1907.01586  [pdf, other

    cs.CR cs.LG

    Protecting Privacy of Users in Brain-Computer Interface Applications

    Authors: Anisha Agarwal, Rafael Dowsley, Nicholas D. McKinney, Dongrui Wu, Chin-Teng Lin, Martine De Cock, Anderson C. A. Nascimento

    Abstract: Machine learning (ML) is revolutionizing research and industry. Many ML applications rely on the use of large amounts of personal data for training and inference. Among the most intimate exploited data sources is electroencephalogram (EEG) data, a kind of data that is so rich with information that application developers can easily gain knowledge beyond the professed scope from unprotected EEG sign… ▽ More

    Submitted 2 July, 2019; originally announced July 2019.

  21. arXiv:1906.02325  [pdf, other

    cs.CR cs.IR cs.LG

    Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection

    Authors: Devin Reich, Ariel Todoki, Rafael Dowsley, Martine De Cock, Anderson C. A. Nascimento

    Abstract: Classification of personal text messages has many useful applications in surveillance, e-commerce, and mental health care, to name a few. Giving applications access to personal texts can easily lead to (un)intentional privacy violations. We propose the first privacy-preserving solution for text classification that is provably secure. Our method, which is based on Secure Multiparty Computation (SMC… ▽ More

    Submitted 12 March, 2021; v1 submitted 5 June, 2019; originally announced June 2019.

  22. arXiv:1905.10921  [pdf, ps, other

    cs.CR cs.IT

    On the Commitment Capacity of Unfair Noisy Channels

    Authors: Claude Crépeau, Rafael Dowsley, Anderson C. A. Nascimento

    Abstract: Noisy channels are a valuable resource from a cryptographic point of view. They can be used for exchanging secret-keys as well as realizing other cryptographic primitives such as commitment and oblivious transfer. To be really useful, noisy channels have to be consider in the scenario where a cheating party has some degree of control over the channel characteristics. Damgård et al. (EUROCRYPT 1999… ▽ More

    Submitted 26 May, 2019; originally announced May 2019.

  23. arXiv:1905.01078  [pdf, other

    cs.LG cs.CR stat.ML

    CharBot: A Simple and Effective Method for Evading DGA Classifiers

    Authors: Jonathan Peck, Claire Nie, Raaghavi Sivaguru, Charles Grumer, Femi Olumofin, Bin Yu, Anderson Nascimento, Martine De Cock

    Abstract: Domain generation algorithms (DGAs) are commonly leveraged by malware to create lists of domain names which can be used for command and control (C&C) purposes. Approaches based on machine learning have recently been developed to automatically detect generated domain names in real-time. In this work, we present a novel DGA called CharBot which is capable of producing large numbers of unregistered d… ▽ More

    Submitted 30 May, 2019; v1 submitted 3 May, 2019; originally announced May 2019.

  24. arXiv:1904.02697  [pdf

    cs.CY cs.AI

    A Systematic Literature Review about the impact of Artificial Intelligence on Autonomous Vehicle Safety

    Authors: A. M. Nascimento, L. F. Vismari, C. B. S. T. Molina, P. S. Cugnasca, J. B. Camargo Jr., J. R. de Almeida Jr., R. Inam, E. Fersman, M. V. Marquezini, A. Y. Hata

    Abstract: Autonomous Vehicles (AV) are expected to bring considerable benefits to society, such as traffic optimization and accidents reduction. They rely heavily on advances in many Artificial Intelligence (AI) approaches and techniques. However, while some researchers in this field believe AI is the core element to enhance safety, others believe AI imposes new challenges to assure the safety of these new… ▽ More

    Submitted 4 April, 2019; originally announced April 2019.

    Comments: 32 pages, 5 figures, 9 Tables

  25. arXiv:1809.05234  [pdf, other

    cs.DB

    In-Route Task Selection in Crowdsourcing

    Authors: Camila F. Costa, Mario A. Nascimento

    Abstract: One important problem in crowdsourcing is that of assigning tasks to workers. We consider a scenario where a worker is traveling on a preferred/typical path (e.g., from school to home) and there is a set of tasks available to be performed. Furthermore, we assume that: each task yields a positive reward, the worker has the skills necessary to perform all available tasks and he/she is willing to pos… ▽ More

    Submitted 13 September, 2018; originally announced September 2018.

    Comments: An abridged version of this manuscript has been accepted for publication as a short paper at ACM SIGSPATIAL 2018

  26. arXiv:1808.10151  [pdf, other

    cs.CR cs.LG

    VirtualIdentity: Privacy-Preserving User Profiling

    Authors: Sisi Wang, Wing-Sea Poon, Golnoosh Farnadi, Caleb Horst, Kebra Thompson, Michael Nickels, Rafael Dowsley, Anderson C. A. Nascimento, Martine De Cock

    Abstract: User profiling from user generated content (UGC) is a common practice that supports the business models of many social media companies. Existing systems require that the UGC is fully exposed to the module that constructs the user profiles. In this paper we show that it is possible to build user profiles without ever accessing the user's original data, and without exposing the trained machine learn… ▽ More

    Submitted 30 August, 2018; originally announced August 2018.

  27. arXiv:1808.10145  [pdf, ps, other

    cs.CR

    On the Composability of Statistically Secure Random Oblivious Transfer

    Authors: Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento

    Abstract: We show that stand-alone statistically secure random oblivious transfer protocols based on two-party stateless primitives are statistically universally composable. I.e. they are simulatable secure with an unlimited adversary, an unlimited simulator and an unlimited environment machine. Our result implies that several previous oblivious transfer protocols in the literature which were proven secure… ▽ More

    Submitted 30 August, 2018; originally announced August 2018.

  28. arXiv:1807.00071  [pdf

    cs.GL cs.DL

    GOTO Rankings Considered Helpful

    Authors: Emery Berger, Stephen M. Blackburn, Carla Brodley, H. V. Jagadish, Kathryn S. McKinley, Mario A. Nascimento, Minjeong Shin, Lexing Xie

    Abstract: Rankings are a fact of life. Whether or not one likes them, they exist and are influential. Within academia, and in computer science in particular, rankings not only capture our attention but also widely influence people who have a limited understanding of computing science research, including prospective students, university administrators, and policy-makers. In short, rankings matter. This posit… ▽ More

    Submitted 24 April, 2019; v1 submitted 29 June, 2018; originally announced July 2018.

    Comments: Accepted, to appear in Communications of the ACM

  29. arXiv:1805.06589  [pdf, ps, other

    cs.CR

    Supersingular Isogeny Oblivious Transfer (SIOT)

    Authors: Paulo Barreto, Anderson Nascimento, Glaucio Oliveira, Waldyr Benits

    Abstract: We present an oblivious transfer (OT) protocol that combines the OT scheme of Chou and Orlandi together with thesupersingular isogeny Diffie-Hellman (SIDH) primitive of De Feo, Jao, and Plût. Our construction is a candidate for post-quantum secure OT and demonstrates that SIDH naturally supports OT functionality. We consider the protocol in the simplest configuration of $\binom{2}{1}$-OT and analy… ▽ More

    Submitted 12 January, 2021; v1 submitted 16 May, 2018; originally announced May 2018.

    Comments: 26 pages, 4 figures, Submitted

    MSC Class: 11T71

  30. Detecting Changes in Fully Polarimetric SAR Imagery with Statistical Information Theory

    Authors: Abraão D. C. Nascimento, Alejandro C. Frery, Renato J. Cintra

    Abstract: Images obtained from coherent illumination processes are contaminated with speckle. A prominent example of such imagery systems is the polarimetric synthetic aperture radar (PolSAR). For such remote sensing tool the speckle interference pattern appears in the form of a positive definite Hermitian matrix, which requires specialized models and makes change detection a hard task. The scaled complex W… ▽ More

    Submitted 16 September, 2018; v1 submitted 26 January, 2018; originally announced January 2018.

    Comments: IEEE Transactions on Geoscience and Remote Sensing, 2018

  31. A Characterization of Mobility Management in User-centric Networks

    Authors: Andrea Nascimento, Rute Sofia, Tiago Condeixa, Susana Sargento

    Abstract: Mobility management is a key aspect to consider in future Internet architectures, as these architectures include a highly nomadic end-user which often relies on services provided by multi-access networks. In contrast, today's mobility management solutions were designed having in mind simpler scenarios and requirements from the network and where roaming could often be taken care of with previously… ▽ More

    Submitted 10 November, 2017; originally announced November 2017.

    Comments: New2AN 2011

  32. arXiv:1710.08256  [pdf, ps, other

    cs.CR cs.IT

    A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM

    Authors: Paulo S. L. M. Barreto, Bernardo David, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento

    Abstract: Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation. We construct a round-optimal (2 rounds) universally composable (UC) protocol for oblivious transfer secure against active adaptive adversaries from any OW-CPA secure public-key encryption scheme with certain pr… ▽ More

    Submitted 23 October, 2017; originally announced October 2017.

  33. arXiv:1709.04545  [pdf, other

    cs.DB

    Efficient Computation of Multiple Density-Based Clustering Hierarchies

    Authors: Antonio Cavalcante Araujo Neto, Joerg Sander, Ricardo J. G. B. Campello, Mario A. Nascimento

    Abstract: HDBSCAN*, a state-of-the-art density-based hierarchical clustering method, produces a hierarchical organization of clusters in a dataset w.r.t. a parameter mpts. While the performance of HDBSCAN* is robust w.r.t. mpts in the sense that a small change in mpts typically leads to only a small or no change in the clustering structure, choosing a "good" mpts value can be challenging: depending on the d… ▽ More

    Submitted 7 June, 2018; v1 submitted 13 September, 2017; originally announced September 2017.

    Comments: A short version of this paper appears at IEEE ICDM 2017. Corrected typos. Revised abstract

  34. arXiv:1510.06623  [pdf, other

    cs.CR cs.IT

    Commitment and Oblivious Transfer in the Bounded Storage Model with Errors

    Authors: Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento

    Abstract: The bounded storage model restricts the memory of an adversary in a cryptographic protocol, rather than restricting its computational power, making information theoretically secure protocols feasible. We present the first protocols for commitment and oblivious transfer in the bounded storage model with errors, i.e., the model where the public random sources available to the two parties are not exa… ▽ More

    Submitted 24 October, 2017; v1 submitted 22 October, 2015; originally announced October 2015.

  35. arXiv:1509.01881  [pdf, other

    cs.DB cs.SI

    Optimal Time-dependent Sequenced Route Queries in Road Networks

    Authors: Camila F. Costa, Mario A. Nascimento, Jose A. F. Macedo, Yannis Theodoridis, Nikos Pelekis, Javam Machado

    Abstract: In this paper we present an algorithm for optimal processing of time-dependent sequenced route queries in road networks, i.e., given a road network where the travel time over an edge is time-dependent and a given ordered list of categories of interest, we find the fastest route between an origin and destination that passes through a sequence of points of interest belonging to each of the specified… ▽ More

    Submitted 6 September, 2015; originally announced September 2015.

    Comments: 10 pages, 12 figures To be published as a short paper in the 23rd ACM SIGSPATIAL

    ACM Class: H.2.4

  36. Agile governance in Information and Communication Technologies: shifting paradigms

    Authors: Alexandre J. H. de O. Luna, Cleyverson P. Costa, Hermano P. de Moura, Magdala A. Novaes, Cesar A. D. C. do Nascimento

    Abstract: This paper presents the basis of the Agile Governance in Information and Communication Technology (ICT), which is based on Agile Software Engineering Methodologies principles and values. Its development was done through a systematic review process, supported by Bibliometrics and Scientometrics methods and techniques, where the Critical Success Factors (CSF) of ICT Governance projects and the princ… ▽ More

    Submitted 10 November, 2014; originally announced November 2014.

    Comments: Journal of Information Systems and Technology Management (JISTEM), Vol 7, No 2, August 2010

    ACM Class: K.6; K.6.1; K.6.4; D.2; D.2.9

  37. arXiv:1410.4876  [pdf, other

    cs.DC

    A GPU-based parallel algorithm for enumerating all chordless cycles in graphs

    Authors: Elisângela Silva Dias, Diane Castonguay, Humberto Longo, Walid Abdala Rfaei Jradi, Hugo A. D. do Nascimento

    Abstract: In a finite undirected simple graph, a chordless cycle is an induced subgraph which is a cycle. We propose a GPU parallel algorithm for enumerating all chordless cycles of such a graph. The algorithm, implemented in OpenCL, is based on a previous sequential algorithm developed by the current authors for the same problem. It uses a more compact data structure for solution representation which is su… ▽ More

    Submitted 25 June, 2015; v1 submitted 17 October, 2014; originally announced October 2014.

    Comments: 15 pages

  38. arXiv:1410.2862  [pdf, ps, other

    cs.CR cs.IT

    On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries

    Authors: Rafael Dowsley, Anderson C. A. Nascimento

    Abstract: Noisy channels are a powerful resource for cryptography as they can be used to obtain information-theoretically secure key agreement, commitment and oblivious transfer protocols, among others. Oblivious transfer (OT) is a fundamental primitive since it is complete for secure multi-party computation, and the OT capacity characterizes how efficiently a channel can be used for obtaining string oblivi… ▽ More

    Submitted 10 October, 2014; originally announced October 2014.

  39. Towards Knowledge-Enriched Path Computation

    Authors: Georgios Skoumas, Klaus Arthur Schmid, Gregor Jossé, Andreas Züfle, Mario A. Nascimento, Matthias Renz, Dieter Pfoser

    Abstract: Directions and paths, as commonly provided by navigation systems, are usually derived considering absolute metrics, e.g., finding the shortest path within an underlying road network. With the aid of crowdsourced geospatial data we aim at obtaining paths that do not only minimize distance but also lead through more popular areas using knowledge generated by users. We extract spatial relations such… ▽ More

    Submitted 9 September, 2014; originally announced September 2014.

    Comments: Accepted as a short paper at ACM SIGSPATIAL GIS 2014

    ACM Class: H.2.8

  40. Bias Correction and Modified Profile Likelihood under the Wishart Complex Distribution

    Authors: Abraão D. C. Nascimento, Alejandro C. Frery, Renato J. Cintra

    Abstract: This paper proposes improved methods for the maximum likelihood (ML) estimation of the equivalent number of looks $L$. This parameter has a meaningful interpretation in the context of polarimetric synthetic aperture radar (PolSAR) images. Due to the presence of coherent illumination in their processing, PolSAR systems generate images which present a granular noise called speckle. As a potential so… ▽ More

    Submitted 18 April, 2014; originally announced April 2014.

    Journal ref: IEEE Transactions on Geoscience and Remote Sensing, vol. 52, issue 8, August, pages 4932--4941, 2014

  41. arXiv:1310.8232  [pdf, other

    cs.DC

    Improving Memory Hierarchy Utilisation for Stencil Computations on Multicore Machines

    Authors: Alexandre Sena, Aline Nascimento, Cristina Boeres, Vinod E. F. Rebello, André Bulcão

    Abstract: Although modern supercomputers are composed of multicore machines, one can find scientists that still execute their legacy applications which were developed to monocore cluster where memory hierarchy is dedicated to a sole core. The main objective of this paper is to propose and evaluate an algorithm that identify an efficient blocksize to be applied on MPI stencil computations on multicore machin… ▽ More

    Submitted 30 October, 2013; originally announced October 2013.

  42. arXiv:1310.7469  [pdf, other

    cs.SE

    Mining the Temporal Evolution of the Android Bug Reporting Community via Sliding Windows

    Authors: Feng Jiang, Jiemin Wang, Abram Hindle, Mario A. Nascimento

    Abstract: The open source development community consists of both paid and volunteer developers as well as new and experienced users. Previous work has applied social network analysis (SNA) to open source communities and has demonstrated value in expertise discovery and triaging. One problem with applying SNA directly to the data of the entire project lifetime is that the impact of local activities will be d… ▽ More

    Submitted 28 October, 2013; originally announced October 2013.

    Report number: TR13-07

  43. arXiv:1306.2003  [pdf, other

    math.ST cs.CV eess.IV

    Comparing Edge Detection Methods based on Stochastic Entropies and Distances for PolSAR Imagery

    Authors: Abraão D. C. Nascimento, Michelle M. Horta, Alejandro C. Frery, Renato J. Cintra

    Abstract: Polarimetric synthetic aperture radar (PolSAR) has achieved a prominent position as a remote imaging method. However, PolSAR images are contaminated by speckle noise due to the coherent illumination employed during the data acquisition. This noise provides a granular aspect to the image, making its processing and analysis (such as in edge detection) hard tasks. This paper discusses seven methods f… ▽ More

    Submitted 9 June, 2013; originally announced June 2013.

    Comments: 12 pages, 14 figures

  44. Hypothesis Testing in Speckled Data with Stochastic Distances

    Authors: Abraão D. C. Nascimento, Renato J. Cintra, Alejandro C. Frery

    Abstract: Images obtained with coherent illumination, as is the case of sonar, ultrasound-B, laser and Synthetic Aperture Radar -- SAR, are affected by speckle noise which reduces the ability to extract information from the data. Specialized techniques are required to deal with such imagery, which has been modeled by the G0 distribution and under which regions with different degrees of roughness and mean br… ▽ More

    Submitted 12 July, 2012; originally announced July 2012.

    Journal ref: IEEE Transactions on Geoscience and Remote Sensing, vol. 48, p. 373-385, 2010

  45. Parametric and Nonparametric Tests for Speckled Imagery

    Authors: Renato J. Cintra, Abraão D. C. Nascimento, Alejandro C. Frery

    Abstract: Synthetic aperture radar (SAR) has a pivotal role as a remote imaging method. Obtained by means of coherent illumination, SAR images are contaminated with speckle noise. The statistical modeling of such contamination is well described according with the multiplicative model and its implied G0 distribution. The understanding of SAR imagery and scene element identification is an important objective… ▽ More

    Submitted 10 July, 2012; originally announced July 2012.

    Comments: Accepted for publication in the Patter Analysis and Applications journal

  46. arXiv:1205.5224  [pdf, ps, other

    cs.CR

    A CCA2 Secure Variant of the McEliece Cryptosystem

    Authors: Nico Döttling, Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento

    Abstract: The McEliece public-key encryption scheme has become an interesting alternative to cryptosystems based on number-theoretical problems. Differently from RSA and ElGa- mal, McEliece PKC is not known to be broken by a quantum computer. Moreover, even tough McEliece PKC has a relatively big key size, encryption and decryption operations are rather efficient. In spite of all the recent results in codin… ▽ More

    Submitted 31 May, 2012; v1 submitted 23 May, 2012; originally announced May 2012.

  47. A Review of the Enviro-Net Project

    Authors: Gilberto Z. Pastorello, G. Arturo Sanchez-Azofeifa, Mario A. Nascimento

    Abstract: Ecosystems monitoring is essential to properly understand their development and the effects of events, both climatological and anthropological in nature. The amount of data used in these assessments is increasing at very high rates. This is due to increasing availability of sensing systems and the development of new techniques to analyze sensor data. The Enviro-Net Project encompasses several of s… ▽ More

    Submitted 30 June, 2011; v1 submitted 27 June, 2011; originally announced June 2011.

    Comments: v2: 29 pages, 5 figures, reflects changes addressing reviewers' comments v1: 38 pages, 8 figures

    Journal ref: G. Z. Pastorello, G. A. Sanchez-Azofeifa, M. A. Nascimento. Enviro-Net: From Networks of Ground-Based Sensor Systems to a Web Platform for Sensor Data Management. Sensors. 2011; 11(6):6454-6479

  48. A Fault Analytic Method against HB+

    Authors: Jose Carrijo, Rafael Tonicelli, Anderson C. A. Nascimento

    Abstract: The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols based on the LPN problem has been proposed: the so-called HB-family. Despite the rich literature regarding the cryptanalysis of these protocols, there are no published results about the impact of fault analysis over them. Th… ▽ More

    Submitted 4 October, 2010; originally announced October 2010.

  49. arXiv:0904.4041  [pdf, other

    cs.DB cs.IR

    Content-Based Sub-Image Retrieval with Relevance Feedback

    Authors: Jie Luo, Mario A. Nascimento

    Abstract: The typical content-based image retrieval problem is to find images within a database that are similar to a given query image. This paper presents a solution to a different problem, namely that of content based sub-image retrieval, i.e., finding images from a database that contains another image. Note that this is different from finding a region in a (segmented) image that is similar to another… ▽ More

    Submitted 26 April, 2009; originally announced April 2009.

    Comments: A preliminary version of this paper appeared in the Proceedings of the 1st ACM International Workshop on Multimedia Databases, p. 63-69. 2003

  50. arXiv:cs/0304014  [pdf, ps, other

    cs.CR quant-ph

    Commitment Capacity of Discrete Memoryless Channels

    Authors: Andreas Winter, Anderson C. A. Nascimento, Hideki Imai

    Abstract: In extension of the bit commitment task and following work initiated by Crepeau and Kilian, we introduce and solve the problem of characterising the optimal rate at which a discrete memoryless channel can be used for bit commitment. It turns out that the answer is very intuitive: it is the maximum equivocation of the channel (after removing trivial redundancy), even when unlimited noiseless bidi… ▽ More

    Submitted 10 April, 2003; originally announced April 2003.

    Comments: 20 pages, LaTeX2e

    ACM Class: E.3; H.1

    Journal ref: Proc. 9th Cirencester Crypto and Coding Conf., LNCS 2989, pp 35-51, Springer, Berlin 2003.