Search Results - "Vaccaro, Ugo"
-
1
Entropic Bounds on the Average Length of Codes with a Space
Published in Entropy (Basel, Switzerland) (01-04-2024)“…We consider the problem of constructing prefix-free codes in which a designated symbol, a , can only appear at the end of codewords. We provide a linear-time…”
Get full text
Journal Article -
2
A note on equivalent conditions for majorization
Published in AIMS mathematics (01-01-2024)“…In this paper, we introduced novel characterizations of the classical concept of majorization in terms of upper triangular (resp., lower triangular)…”
Get full text
Journal Article -
3
Latency-bounded target set selection in social networks
Published in Theoretical computer science (22-05-2014)“…Motivated by applications in sociology, economy and medicine, we study variants of the Target Set Selection problem, first proposed by Kempe, Kleinberg and…”
Get full text
Journal Article -
4
On the approximability and exact algorithms for vector domination and related problems in graphs
Published in Discrete Applied Mathematics (01-04-2013)“…We consider two graph optimization problems called vector domination and total vector domination. In vector domination one seeks a small subset S of vertices…”
Get full text
Journal Article -
5
Bounds and algorithms for generalized superimposed codes
Published in Information processing letters (01-08-2023)“…We introduce a class of generalized superimposed codes that include several cases already studied in the literature. We give bounds on their size and…”
Get full text
Journal Article -
6
Perfectly Secure Key Distribution for Dynamic Conferences
Published in Information and computation (10-10-1998)“…In this paper we analyze perfectly secure key distribution schemes for dynamic conferences. In this setting,anymember of a group oftusers can compute a common…”
Get full text
Journal Article -
7
Minimum-Entropy Couplings and Their Applications
Published in IEEE transactions on information theory (01-06-2019)“…Given two discrete random variables <inline-formula> <tex-math notation="LaTeX">X </tex-math></inline-formula> and <inline-formula> <tex-math…”
Get full text
Journal Article -
8
Bounds on the Entropy of a Function of a Random Variable and Their Applications
Published in IEEE transactions on information theory (01-04-2018)“…It is well known that the entropy <inline-formula> <tex-math notation="LaTeX">H(X) </tex-math></inline-formula> of a discrete random variable <inline-formula>…”
Get full text
Journal Article -
9
Bounds and Algorithms for Alphabetic Codes and Binary Search Trees
Published in IEEE transactions on information theory (01-10-2024)“…Alphabetic codes and binary search trees are combinatorial structures that abstract search procedures in ordered sets endowed with probability distributions…”
Get full text
Journal Article -
10
epsilon -Almost Selectors and Their Applications to Multiple-Access Communication
Published in IEEE transactions on information theory (01-11-2017)“…Consider a group of stations connected through a multiple-access channel, with the constraint that if at a time instant exactly one station transmits a…”
Get full text
Journal Article -
11
Improved Algorithms and Bounds for List Union-Free Families
Published in IEEE transactions on information theory (01-04-2024)“…List union-free families are basic combinatorial structures that appear in different application scenarios, most notably in one-bit compressed sensing. In this…”
Get full text
Journal Article -
12
An efficient algorithm for group testing with runlength constraints
Published in Discrete Applied Mathematics (15-01-2025)“…In this paper, we provide an efficient algorithm to construct almost optimal (k,n,d)-superimposed codes with runlength constraints. A (k,n,d)-superimposed code…”
Get full text
Journal Article -
13
Evangelism in social networks: Algorithms and complexity
Published in Networks (01-06-2018)“…We consider a population of interconnected individuals that, with respect to a piece of information, at each time instant can be subdivided into three…”
Get full text
Journal Article -
14
Discovering Small Target Sets in Social Networks: A Fast and Effective Algorithm
Published in Algorithmica (01-06-2018)“…Given a network represented by a graph G = ( V , E ) , we consider a dynamical process of influence diffusion in G that evolves as follows: Initially only the…”
Get full text
Journal Article -
15
Spread of influence in weighted networks under time and budget constraints
Published in Theoretical computer science (27-06-2015)“…Given a network represented by a weighted directed graph G, we consider the problem of finding a bounded cost set of nodes S such that the influence spreading…”
Get full text
Journal Article -
16
Influence diffusion in social networks under time window constraints
Published in Theoretical computer science (13-06-2015)“…We study a combinatorial model of the spread of influence in networks that generalizes existing schemata recently proposed in the literature. In our model,…”
Get full text
Journal Article -
17
On the information rate of secret sharing schemes
Published in Theoretical computer science (05-02-1996)“…We derive new limitations on the information rate and the average information rate of secret sharing schemes for access structure represented by graphs. We…”
Get full text
Journal Article -
18
Partial Covering Arrays: Algorithms and Asymptotics
Published in Theory of computing systems (01-08-2018)“…A covering array CA( N ; t , k , v ) is an N × k array with entries in {1,2,…, v }, for which every N × t subarray contains each t -tuple of {1,2,…, v } t…”
Get full text
Journal Article -
19
Android Malware Detection Based on Hypergraph Neural Networks
Published in Applied sciences (01-12-2023)“…Android has been the most widely used operating system for mobile phones over the past few years. Malicious attacks against android are a major privacy and…”
Get full text
Journal Article -
20
A Note on Equivalent Conditions for Majorization
Published 13-05-2024“…AIMS Mathematics 2024, 9(4), 8641-8660 In this paper, we introduce novel characterizations of the classical concept of majorization in terms of upper…”
Get full text
Journal Article