Skip to main content

Showing 1–7 of 7 results for author: Andersson, E

Searching in archive cs. Search in all archives.
.
  1. Generating Semantic Graph Corpora with Graph Expansion Grammar

    Authors: Eric Andersson, Johanna Björklund, Frank Drewes, Anna Jonsson

    Abstract: We introduce Lovelace, a tool for creating corpora of semantic graphs. The system uses graph expansion grammar as a representational language, thus allowing users to craft a grammar that describes a corpus with desired properties. When given such grammar as input, the system generates a set of output graphs that are well-formed according to the grammar, i.e., a graph bank. The generation process… ▽ More

    Submitted 15 September, 2023; originally announced September 2023.

    Comments: In Proceedings NCMA 2023, arXiv:2309.07333

    ACM Class: F.4.3; I.2.7

    Journal ref: EPTCS 388, 2023, pp. 3-15

  2. arXiv:2306.06068  [pdf, other

    cs.CV cs.LG

    DeepStay: Stay Region Extraction from Location Trajectories using Weak Supervision

    Authors: Christian Löwens, Daniela Thyssens, Emma Andersson, Christina Jenkins, Lars Schmidt-Thieme

    Abstract: Nowadays, mobile devices enable constant tracking of the user's position and location trajectories can be used to infer personal points of interest (POIs) like homes, workplaces, or stores. A common way to extract POIs is to first identify spatio-temporal regions where a user spends a significant amount of time, known as stay regions (SRs). Common approaches to SR extraction are evaluated either… ▽ More

    Submitted 5 June, 2023; originally announced June 2023.

    Comments: Paper under peer review

  3. Unconditionally secure digital signatures implemented in an 8-user quantum network

    Authors: Yoann Pelet, Ittoop Vergheese Puthoor, Natarajan Venkatachalam, Sören Wengerowsky, Martin Lončarić, Sebastian Philipp Neumann, Bo Liu, Željko Samec, Mario Stipčević, Rupert Ursin, Erika Andersson, John G. Rarity, Djeylan Aktas, Siddarth Koduru Joshi

    Abstract: The ability to know and verifiably demonstrate the origins of messages can often be as important as encrypting the message itself. Here we present an experimental demonstration of an unconditionally secure digital signature (USS) protocol implemented for the first time, to the best of our knowledge, on a fully connected quantum network without trusted nodes. Our USS protocol is secure against forg… ▽ More

    Submitted 10 February, 2022; v1 submitted 9 February, 2022; originally announced February 2022.

    Comments: Preprint, 9 pages, 7 figures, 1 table

  4. arXiv:2003.13323  [pdf, other

    eess.SY cs.LG math.OC physics.flu-dyn stat.ML

    Adaptation of Engineering Wake Models using Gaussian Process Regression and High-Fidelity Simulation Data

    Authors: Leif Erik Andersson, Bart Doekemeijer, Daan van der Hoek, Jan-Willem van Wingerden, Lars Imsland

    Abstract: This article investigates the optimization of yaw control inputs of a nine-turbine wind farm. The wind farm is simulated using the high-fidelity simulator SOWFA. The optimization is performed with a modifier adaptation scheme based on Gaussian processes. Modifier adaptation corrects for the mismatch between plant and model and helps to converge to the actual plan optimum. In the case study the mod… ▽ More

    Submitted 30 March, 2020; originally announced March 2020.

    Comments: Initial submission to the Science of Making Torque from Wind (TORQUE) 2020 conference, 10 pages, 6 figures (16/6)

  5. arXiv:1508.01893  [pdf, other

    quant-ph cs.CR

    Unconditionally Secure Quantum Signatures

    Authors: Ryan Amiri, Erika Andersson

    Abstract: Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, bu… ▽ More

    Submitted 8 August, 2015; originally announced August 2015.

    Comments: 16 pages; an accessible short review paper in a special issue on Quantum Cryptography

    Journal ref: Entropy 2015, 17(8), 5635-5659

  6. arXiv:1505.07509  [pdf, other

    quant-ph cs.CR

    Multiparty Quantum Signature Schemes

    Authors: Juan Miguel Arrazola, Petros Wallden, Erika Andersson

    Abstract: Digital signatures are widely used in electronic communications to secure important tasks such as financial transactions, software updates, and legal contracts. The signature schemes that are in use today are based on public-key cryptography and derive their security from computational assumptions. However, it is possible to construct unconditionally secure signature protocols. In particular, usin… ▽ More

    Submitted 27 May, 2015; originally announced May 2015.

    Comments: 22 pages, 4 figures

    Journal ref: Quantum Inf. Comput. 6, 0435 (2016)

  7. arXiv:1006.1423  [pdf, ps, other

    quant-ph cs.CC

    Quantum algorithms for testing Boolean functions

    Authors: Dominik F. Floess, Erika Andersson, Mark Hillery

    Abstract: We discuss quantum algorithms, based on the Bernstein-Vazirani algorithm, for finding which variables a Boolean function depends on. There are 2^n possible linear Boolean functions of n variables; given a linear Boolean function, the Bernstein-Vazirani quantum algorithm can deterministically identify which one of these Boolean functions we are given using just one single function query. The same q… ▽ More

    Submitted 7 June, 2010; originally announced June 2010.

    Journal ref: EPTCS 26, 2010, pp. 101-108