Skip to main content

Showing 1–4 of 4 results for author: Aguilar, C

Searching in archive cs. Search in all archives.
.
  1. Classification via an Embedded Approach

    Authors: Jose de Jesus Rubio, Francisco Jacob Avila, Adolfo Melendez, Juan Manuel Stein, Jesus Alberto Meda, Carlos Aguilar

    Abstract: This paper presents the results of an automated volatile organic compound (VOC) classification process implemented by embedding a machine learning algorithm into an Arduino Uno board. An electronic nose prototype is constructed to detect VOCs from three different fruits. The electronic nose is constructed using an array of five tin dioxide (SnO2) gas sensors, an Arduino Uno board used as a data ac… ▽ More

    Submitted 15 May, 2019; originally announced May 2019.

    Comments: 16 Pages

    Journal ref: www.mdpi.com/journal/designs Designs 2017

  2. arXiv:1612.05572  [pdf, ps, other

    cs.CR cs.IT

    Efficient Encryption from Random Quasi-Cyclic Codes

    Authors: Carlos Aguilar, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Gilles Zémor

    Abstract: We propose a framework for constructing efficient code-based encryption schemes from codes that do not hide any structure in their public matrix. The framework is in the spirit of the schemes first proposed by Alekhnovich in 2003 and based on the difficulty of decoding random linear codes from random errors of low weight. We depart somewhat from Aleknovich's approach and propose an encryption sche… ▽ More

    Submitted 16 December, 2016; originally announced December 2016.

  3. arXiv:1607.00478  [pdf

    cs.SE

    Model Checking of BPMN Models for Reconfigurable Workflows

    Authors: Juan Carlos Polanco Aguilar, Koji Hasebe, Manuel Mazzara, Kazuhiko Kato

    Abstract: Nowadays, business enterprises often need to dynamically reconfigure their internal processes in order to improve the efficiency of the business flow. However, modifications of the workflow usually lead to several problems in terms of deadlock freedom, completeness and security. A solid solution to these problems consists in the application of model checking techniques in order to verify if specif… ▽ More

    Submitted 2 July, 2016; originally announced July 2016.

    Comments: Conference of Japan Society for Software Science and Technology, JSSST 2011

  4. arXiv:1111.1644  [pdf, ps, other

    cs.CR

    A new zero-knowledge code based identification scheme with reduced communication

    Authors: Carlos Aguilar, Philippe Gaborit, Julien Schrek

    Abstract: In this paper we present a new 5-pass identification scheme with asymptotic cheating probability 1/2 based on the syndrome decoding problem. Our protocol is related to the Stern identification scheme but has a reduced communication cost compared to previous code-based zero-knowledge schemes, moreover our scheme permits to obtain a very low size of public key and secret key. The contribution of thi… ▽ More

    Submitted 7 November, 2011; originally announced November 2011.