Search Results - "Vaccaro, Ugo"

Refine Results
  1. 1

    Entropic Bounds on the Average Length of Codes with a Space by Bruno, Roberto, Vaccaro, Ugo

    Published in Entropy (Basel, Switzerland) (01-04-2024)
    “…We consider the problem of constructing prefix-free codes in which a designated symbol, a , can only appear at the end of codewords. We provide a linear-time…”
    Get full text
    Journal Article
  2. 2

    A note on equivalent conditions for majorization by Bruno, Roberto, Vaccaro, Ugo

    Published in AIMS mathematics (01-01-2024)
    “…In this paper, we introduced novel characterizations of the classical concept of majorization in terms of upper triangular (resp., lower triangular)…”
    Get full text
    Journal Article
  3. 3

    Latency-bounded target set selection in social networks by Cicalese, Ferdinando, Cordasco, Gennaro, Gargano, Luisa, Milanič, Martin, Vaccaro, Ugo

    Published in Theoretical computer science (22-05-2014)
    “…Motivated by applications in sociology, economy and medicine, we study variants of the Target Set Selection problem, first proposed by Kempe, Kleinberg and…”
    Get full text
    Journal Article
  4. 4

    On the approximability and exact algorithms for vector domination and related problems in graphs by Cicalese, Ferdinando, Milanič, Martin, Vaccaro, Ugo

    Published in Discrete Applied Mathematics (01-04-2013)
    “…We consider two graph optimization problems called vector domination and total vector domination. In vector domination one seeks a small subset S of vertices…”
    Get full text
    Journal Article
  5. 5

    Bounds and algorithms for generalized superimposed codes by Rescigno, Adele A., Vaccaro, Ugo

    Published in Information processing letters (01-08-2023)
    “…We introduce a class of generalized superimposed codes that include several cases already studied in the literature. We give bounds on their size and…”
    Get full text
    Journal Article
  6. 6

    Perfectly Secure Key Distribution for Dynamic Conferences by Blundo, Carlo, De Santis, Alfredo, Herzberg, Amir, Kutten, Shay, Vaccaro, Ugo, Yung, Moti

    Published in Information and computation (10-10-1998)
    “…In this paper we analyze perfectly secure key distribution schemes for dynamic conferences. In this setting,anymember of a group oftusers can compute a common…”
    Get full text
    Journal Article
  7. 7

    Minimum-Entropy Couplings and Their Applications by Cicalese, Ferdinando, Gargano, Luisa, Vaccaro, Ugo

    Published in IEEE transactions on information theory (01-06-2019)
    “…Given two discrete random variables <inline-formula> <tex-math notation="LaTeX">X </tex-math></inline-formula> and <inline-formula> <tex-math…”
    Get full text
    Journal Article
  8. 8

    Bounds on the Entropy of a Function of a Random Variable and Their Applications by Cicalese, Ferdinando, Gargano, Luisa, Vaccaro, Ugo

    Published in IEEE transactions on information theory (01-04-2018)
    “…It is well known that the entropy <inline-formula> <tex-math notation="LaTeX">H(X) </tex-math></inline-formula> of a discrete random variable <inline-formula>…”
    Get full text
    Journal Article
  9. 9

    Bounds and Algorithms for Alphabetic Codes and Binary Search Trees by Bruno, Roberto, De Prisco, Roberto, De Santis, Alfredo, Vaccaro, Ugo

    Published in IEEE transactions on information theory (01-10-2024)
    “…Alphabetic codes and binary search trees are combinatorial structures that abstract search procedures in ordered sets endowed with probability distributions…”
    Get full text
    Journal Article
  10. 10

    epsilon -Almost Selectors and Their Applications to Multiple-Access Communication by De Bonis, Annalisa, Vaccaro, Ugo

    Published in IEEE transactions on information theory (01-11-2017)
    “…Consider a group of stations connected through a multiple-access channel, with the constraint that if at a time instant exactly one station transmits a…”
    Get full text
    Journal Article
  11. 11

    Improved Algorithms and Bounds for List Union-Free Families by Rescigno, Adele A., Vaccaro, Ugo

    Published in IEEE transactions on information theory (01-04-2024)
    “…List union-free families are basic combinatorial structures that appear in different application scenarios, most notably in one-bit compressed sensing. In this…”
    Get full text
    Journal Article
  12. 12

    An efficient algorithm for group testing with runlength constraints by Dalai, Marco, Della Fiore, Stefano, Rescigno, Adele A., Vaccaro, Ugo

    Published in Discrete Applied Mathematics (15-01-2025)
    “…In this paper, we provide an efficient algorithm to construct almost optimal (k,n,d)-superimposed codes with runlength constraints. A (k,n,d)-superimposed code…”
    Get full text
    Journal Article
  13. 13

    Evangelism in social networks: Algorithms and complexity by Cordasco, Gennaro, Gargano, Luisa, Rescigno, Adele Anna, Vaccaro, Ugo

    Published in Networks (01-06-2018)
    “…We consider a population of interconnected individuals that, with respect to a piece of information, at each time instant can be subdivided into three…”
    Get full text
    Journal Article
  14. 14

    Discovering Small Target Sets in Social Networks: A Fast and Effective Algorithm by Cordasco, Gennaro, Gargano, Luisa, Mecchia, Marco, Rescigno, Adele A., Vaccaro, Ugo

    Published in Algorithmica (01-06-2018)
    “…Given a network represented by a graph G = ( V , E ) , we consider a dynamical process of influence diffusion in G that evolves as follows: Initially only the…”
    Get full text
    Journal Article
  15. 15

    Spread of influence in weighted networks under time and budget constraints by Cicalese, Ferdinando, Cordasco, Gennaro, Gargano, Luisa, Milanič, Martin, Peters, Joseph, Vaccaro, Ugo

    Published in Theoretical computer science (27-06-2015)
    “…Given a network represented by a weighted directed graph G, we consider the problem of finding a bounded cost set of nodes S such that the influence spreading…”
    Get full text
    Journal Article
  16. 16

    Influence diffusion in social networks under time window constraints by Gargano, Luisa, Hell, Pavol, Peters, Joseph G., Vaccaro, Ugo

    Published in Theoretical computer science (13-06-2015)
    “…We study a combinatorial model of the spread of influence in networks that generalizes existing schemata recently proposed in the literature. In our model,…”
    Get full text
    Journal Article
  17. 17

    On the information rate of secret sharing schemes by Blundo, Carlo, De Santis, Alfredo, Gargano, Luisa, Vaccaro, Ugo

    Published in Theoretical computer science (05-02-1996)
    “…We derive new limitations on the information rate and the average information rate of secret sharing schemes for access structure represented by graphs. We…”
    Get full text
    Journal Article
  18. 18

    Partial Covering Arrays: Algorithms and Asymptotics by Sarkar, Kaushik, Colbourn, Charles J., De Bonis, Annalisa, Vaccaro, Ugo

    Published in Theory of computing systems (01-08-2018)
    “…A covering array CA( N ; t , k , v ) is an N × k array with entries in {1,2,…, v }, for which every N × t subarray contains each t -tuple of {1,2,…, v } t…”
    Get full text
    Journal Article
  19. 19

    Android Malware Detection Based on Hypergraph Neural Networks by Zhang, Dehua, Wu, Xiangbo, He, Erlu, Guo, Xiaobo, Yang, Xiaopeng, Li, Ruibo, Li, Hao

    Published in Applied sciences (01-12-2023)
    “…Android has been the most widely used operating system for mobile phones over the past few years. Malicious attacks against android are a major privacy and…”
    Get full text
    Journal Article
  20. 20

    A Note on Equivalent Conditions for Majorization by Bruno, Roberto, Vaccaro, Ugo

    Published 13-05-2024
    “…AIMS Mathematics 2024, 9(4), 8641-8660 In this paper, we introduce novel characterizations of the classical concept of majorization in terms of upper…”
    Get full text
    Journal Article