Institution
Aalto University
Education•Espoo, Finland•
About: Aalto University is a education organization based out in Espoo, Finland. It is known for research contribution in the topics: Computer science & Context (language use). The organization has 9969 authors who have published 32648 publications receiving 829626 citations. The organization is also known as: TKK & Aalto-korkeakoulu.
Papers published on a yearly basis
Papers
More filters
••
Purdue University1, University of Massachusetts Amherst2, University of Leeds3, Washington University in St. Louis4, Iowa State University5, University of California, Los Angeles6, University College Dublin7, Grinnell College8, Adler Planetarium9, Harvard University10, National University of Ireland, Galway11, University of Utah12, McGill University13, University of Chicago14, DePauw University15, Galway-Mayo Institute of Technology16, Cork Institute of Technology17, University of Michigan18, Aalto University19, University of Colorado Boulder20, Ohio University21, Ruhr University Bochum22
TL;DR: In this article, the authors report results from an intensive multi-wavelength monitoring campaign on the TeV blazar Mrk 421 over the period of 2003-2004, where the source was observed simultaneously at TeV energies with the Whipple 10 m telescope and at X-ray energies with Rossi X-Ray Timing Explorer (RXTE) during each clear night within Whipple observing windows.
Abstract: We report results from an intensive multiwavelength monitoring campaign on the TeV blazar Mrk 421 over the period of 2003-2004. The source was observed simultaneously at TeV energies with the Whipple 10 m telescope and at X-ray energies with the Rossi X-Ray Timing Explorer (RXTE) during each clear night within the Whipple observing windows. Supporting observations were also frequently carried out at optical and radio wavelengths to provide simultaneous or contemporaneous coverages. The large amount of simultaneous data has allowed us to examine the variability of Mrk 421 in detail, including cross-band correlation and broadband spectral variability, over a wide range of flux. The variabilities are generally correlated between the X-ray and gamma-ray bands, although the correlation appears to be fairly loose. The light curves show the presence of flares with varying amplitudes on a wide range of timescales at both X-ray and TeV energies. Of particular interest is the presence of TeV flares that have no coincident counterparts at longer wavelengths, because the phenomenon seems difficult to understand in the context of the proposed emission models for TeV blazars. We have also found that the TeV flux reached its peak days before the X-ray flux did during a giant flare (or outburst) in 2004 (with the peak flux reaching ~135 mcrab in X-rays, as seen by the RXTE ASM, and ~3 crab in gamma rays). Such a difference in the development of the flare presents a further challenge to both the leptonic and hadronic emission models. Mrk 421 varied much less at optical and radio wavelengths. Surprisingly, the normalized variability amplitude in the optical seems to be comparable to that in the radio, perhaps suggesting the presence of different populations of emitting electrons in the jet. The spectral energy distribution of Mrk 421 is seen to vary with flux, with the two characteristic peaks moving toward higher energies at higher fluxes. We have failed to fit the measured spectral energy distributions (SEDs) with a one-zone synchrotron self-Compton model; introducing additional zones greatly improves the fits. We have derived constraints on the physical properties of the X-ray/gamma-ray flaring regions from the observed variability (and SED) of the source. The implications of the results are discussed.
258 citations
••
TL;DR: Experiments clearly show that the new encodings in this paper improve performance of BMC con- siderably, particularly in the case of the incremental encoding, and that they are very competitive for finding bugs.
Abstract: We consider the problem of bounded model checking (BMC) for linear tempo- ral logic (LTL). We present several efficient encodings that have size linear in the bound. Furthermore, we show how the encodings can be extended to LTL with past operators (PLTL). The generalised encoding is still of linear size, but cannot detect minimal length counterexamples. By using the virtual unrolling technique minimal length counterexam- ples can be captured, however, the size of the encoding is quadratic in the specification. We also extend virtual unrolling to Buchi automata, enabling them to accept minimal length counterexamples. Our BMC encodings can be made incremental in order to benefit from incremental SAT technology. With fairly small modifications the incremental encoding can be further enhanced with a termination check, allowing us to prove properties with BMC. An analysis of the liveness-to-safety transformation reveals many similarities to the BMC encodings in this paper. We conduct experiments to determine the advantage of em- ploying dedicated BMC encodings for PLTL over combining more general but potentially less efficient approaches with BMC: the liveness-to-safety t with invariant checking and Buchi automata with fair cycle detection. Experiments clearly show that our new encodings improve performance of BMC con- siderably, particularly in the case of the incremental encoding, and that they are very competitive for finding bugs. Dedicated encodings seem to have an advantage over using more general methods with BMC. Using the liveness-to-safety translation with BDD-based invariant checking results in an efficient method to find shortest counterexamples that com- plements the BMC-based approach. For proving complex properties BDD-based methods still tend to perform better.
258 citations
••
TL;DR: In this paper, a special issue of the Journal of the Knowledge Economy focuses on how advanced European cities develop strategies towards becoming smart cities, based on the many possible innovative usages of network infrastructures and Internet-based applications, through the engagement of open innovation ecosystems.
Abstract: This Special Issue of the Journal of the Knowledge Economy focuses on how advanced European cities develop strategies towards becoming “smart cities”, based on the many possible innovative usages of network infrastructures and Internet-based applications, through the engagement of open innovation ecosystems. Part of these strategies is to develop new types of innovation approaches in urban areas, which are characterized, firstly, by a high level of citizen involvement in co-creating Internet-based applications in all sectors of the economy and society; secondly, by the emergence of new forms of collaboration among local governments, research institutes, universities, and companies. Such strategies and the resulting "innovation ecosystems" are becoming increasingly relevant given the growing economic and social issues and opportunities that cities are currently facing. This special issue investigates these smart city strategies through four smart city case studies and two papers addressing horizontal issues. The case studies aim to analyze the currently emerging strategies and policies related to identify how the opportunities of the Future Internet are being used for the socio-economic development of urban areas. The four cases also address how cities are redefining their innovation structures and how they started to experiment citizens involvement within the context of open innovation, and present lessons learned that are of interest to smart city stakeholders.
257 citations
••
12 Sep 2011TL;DR: This paper describes a timing attack vulnerability in OpenSSL's ladder implementation for curves over binary fields and uses this vulnerability to steal the private key of a TLS server where the server authenticates with ECDSA signatures.
Abstract: For over two decades, timing attacks have been an active area of research within applied cryptography. These attacks exploit cryptosystem or protocol implementations that do not run in constant time. When implementing an elliptic curve cryptosystem with a goal to provide side-channel resistance, the scalar multiplication routine is a critical component. In such instances, one attractive method often suggested in the literature is Montgomery's ladder that performs a fixed sequence of curve and field operations. This paper describes a timing attack vulnerability in OpenSSL's ladder implementation for curves over binary fields. We use this vulnerability to steal the private key of a TLS server where the server authenticates with ECDSA signatures. Using the timing of the exchanged messages, the messages themselves, and the signatures, we mount a lattice attack that recovers the private key. Finally, we describe and implement an effective countermeasure.
257 citations
••
TL;DR: In this article, the authors study transitions between non-renewable and renewable energy forms at different development stages of an economy and show that in the historical context the emphasis on energy production may evolve from renewables to nonrenewables and back to renewables, and an inverted-U relation between carbon emissions and income level may follow even without environmental policy.
257 citations
Authors
Showing all 10135 results
Name | H-index | Papers | Citations |
---|---|---|---|
John B. Goodenough | 151 | 1064 | 113741 |
Ashok Kumar | 151 | 5654 | 164086 |
Anne Lähteenmäki | 116 | 485 | 81977 |
Kalyanmoy Deb | 112 | 713 | 122802 |
Riitta Hari | 111 | 491 | 43873 |
Robin I. M. Dunbar | 111 | 586 | 47498 |
Andreas Richter | 110 | 769 | 48262 |
Mika Sillanpää | 96 | 1019 | 44260 |
Muhammad Farooq | 92 | 1341 | 37533 |
Ivo Babuška | 90 | 376 | 41465 |
Merja Penttilä | 87 | 303 | 22351 |
Andries Meijerink | 87 | 426 | 29335 |
T. Poutanen | 86 | 120 | 33158 |
Sajal K. Das | 85 | 1124 | 29785 |
Kalle Lyytinen | 84 | 426 | 27708 |