scispace - formally typeset
Search or ask a question
Institution

Aalto University

EducationEspoo, Finland
About: Aalto University is a education organization based out in Espoo, Finland. It is known for research contribution in the topics: Computer science & Context (language use). The organization has 9969 authors who have published 32648 publications receiving 829626 citations. The organization is also known as: TKK & Aalto-korkeakoulu.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the authors report results from an intensive multi-wavelength monitoring campaign on the TeV blazar Mrk 421 over the period of 2003-2004, where the source was observed simultaneously at TeV energies with the Whipple 10 m telescope and at X-ray energies with Rossi X-Ray Timing Explorer (RXTE) during each clear night within Whipple observing windows.
Abstract: We report results from an intensive multiwavelength monitoring campaign on the TeV blazar Mrk 421 over the period of 2003-2004. The source was observed simultaneously at TeV energies with the Whipple 10 m telescope and at X-ray energies with the Rossi X-Ray Timing Explorer (RXTE) during each clear night within the Whipple observing windows. Supporting observations were also frequently carried out at optical and radio wavelengths to provide simultaneous or contemporaneous coverages. The large amount of simultaneous data has allowed us to examine the variability of Mrk 421 in detail, including cross-band correlation and broadband spectral variability, over a wide range of flux. The variabilities are generally correlated between the X-ray and gamma-ray bands, although the correlation appears to be fairly loose. The light curves show the presence of flares with varying amplitudes on a wide range of timescales at both X-ray and TeV energies. Of particular interest is the presence of TeV flares that have no coincident counterparts at longer wavelengths, because the phenomenon seems difficult to understand in the context of the proposed emission models for TeV blazars. We have also found that the TeV flux reached its peak days before the X-ray flux did during a giant flare (or outburst) in 2004 (with the peak flux reaching ~135 mcrab in X-rays, as seen by the RXTE ASM, and ~3 crab in gamma rays). Such a difference in the development of the flare presents a further challenge to both the leptonic and hadronic emission models. Mrk 421 varied much less at optical and radio wavelengths. Surprisingly, the normalized variability amplitude in the optical seems to be comparable to that in the radio, perhaps suggesting the presence of different populations of emitting electrons in the jet. The spectral energy distribution of Mrk 421 is seen to vary with flux, with the two characteristic peaks moving toward higher energies at higher fluxes. We have failed to fit the measured spectral energy distributions (SEDs) with a one-zone synchrotron self-Compton model; introducing additional zones greatly improves the fits. We have derived constraints on the physical properties of the X-ray/gamma-ray flaring regions from the observed variability (and SED) of the source. The implications of the results are discussed.

258 citations

Journal ArticleDOI
TL;DR: Experiments clearly show that the new encodings in this paper improve performance of BMC con- siderably, particularly in the case of the incremental encoding, and that they are very competitive for finding bugs.
Abstract: We consider the problem of bounded model checking (BMC) for linear tempo- ral logic (LTL). We present several efficient encodings that have size linear in the bound. Furthermore, we show how the encodings can be extended to LTL with past operators (PLTL). The generalised encoding is still of linear size, but cannot detect minimal length counterexamples. By using the virtual unrolling technique minimal length counterexam- ples can be captured, however, the size of the encoding is quadratic in the specification. We also extend virtual unrolling to Buchi automata, enabling them to accept minimal length counterexamples. Our BMC encodings can be made incremental in order to benefit from incremental SAT technology. With fairly small modifications the incremental encoding can be further enhanced with a termination check, allowing us to prove properties with BMC. An analysis of the liveness-to-safety transformation reveals many similarities to the BMC encodings in this paper. We conduct experiments to determine the advantage of em- ploying dedicated BMC encodings for PLTL over combining more general but potentially less efficient approaches with BMC: the liveness-to-safety t with invariant checking and Buchi automata with fair cycle detection. Experiments clearly show that our new encodings improve performance of BMC con- siderably, particularly in the case of the incremental encoding, and that they are very competitive for finding bugs. Dedicated encodings seem to have an advantage over using more general methods with BMC. Using the liveness-to-safety translation with BDD-based invariant checking results in an efficient method to find shortest counterexamples that com- plements the BMC-based approach. For proving complex properties BDD-based methods still tend to perform better.

258 citations

Journal ArticleDOI
TL;DR: In this paper, a special issue of the Journal of the Knowledge Economy focuses on how advanced European cities develop strategies towards becoming smart cities, based on the many possible innovative usages of network infrastructures and Internet-based applications, through the engagement of open innovation ecosystems.
Abstract: This Special Issue of the Journal of the Knowledge Economy focuses on how advanced European cities develop strategies towards becoming “smart cities”, based on the many possible innovative usages of network infrastructures and Internet-based applications, through the engagement of open innovation ecosystems. Part of these strategies is to develop new types of innovation approaches in urban areas, which are characterized, firstly, by a high level of citizen involvement in co-creating Internet-based applications in all sectors of the economy and society; secondly, by the emergence of new forms of collaboration among local governments, research institutes, universities, and companies. Such strategies and the resulting "innovation ecosystems" are becoming increasingly relevant given the growing economic and social issues and opportunities that cities are currently facing. This special issue investigates these smart city strategies through four smart city case studies and two papers addressing horizontal issues. The case studies aim to analyze the currently emerging strategies and policies related to identify how the opportunities of the Future Internet are being used for the socio-economic development of urban areas. The four cases also address how cities are redefining their innovation structures and how they started to experiment citizens involvement within the context of open innovation, and present lessons learned that are of interest to smart city stakeholders.

257 citations

Book ChapterDOI
12 Sep 2011
TL;DR: This paper describes a timing attack vulnerability in OpenSSL's ladder implementation for curves over binary fields and uses this vulnerability to steal the private key of a TLS server where the server authenticates with ECDSA signatures.
Abstract: For over two decades, timing attacks have been an active area of research within applied cryptography. These attacks exploit cryptosystem or protocol implementations that do not run in constant time. When implementing an elliptic curve cryptosystem with a goal to provide side-channel resistance, the scalar multiplication routine is a critical component. In such instances, one attractive method often suggested in the literature is Montgomery's ladder that performs a fixed sequence of curve and field operations. This paper describes a timing attack vulnerability in OpenSSL's ladder implementation for curves over binary fields. We use this vulnerability to steal the private key of a TLS server where the server authenticates with ECDSA signatures. Using the timing of the exchanged messages, the messages themselves, and the signatures, we mount a lattice attack that recovers the private key. Finally, we describe and implement an effective countermeasure.

257 citations

Journal ArticleDOI
TL;DR: In this article, the authors study transitions between non-renewable and renewable energy forms at different development stages of an economy and show that in the historical context the emphasis on energy production may evolve from renewables to nonrenewables and back to renewables, and an inverted-U relation between carbon emissions and income level may follow even without environmental policy.

257 citations


Authors

Showing all 10135 results

NameH-indexPapersCitations
John B. Goodenough1511064113741
Ashok Kumar1515654164086
Anne Lähteenmäki11648581977
Kalyanmoy Deb112713122802
Riitta Hari11149143873
Robin I. M. Dunbar11158647498
Andreas Richter11076948262
Mika Sillanpää96101944260
Muhammad Farooq92134137533
Ivo Babuška9037641465
Merja Penttilä8730322351
Andries Meijerink8742629335
T. Poutanen8612033158
Sajal K. Das85112429785
Kalle Lyytinen8442627708
Network Information
Related Institutions (5)
Georgia Institute of Technology
119K papers, 4.6M citations

95% related

Delft University of Technology
94.4K papers, 2.7M citations

94% related

École Polytechnique Fédérale de Lausanne
98.2K papers, 4.3M citations

94% related

Nanyang Technological University
112.8K papers, 3.2M citations

94% related

ETH Zurich
122.4K papers, 5.1M citations

93% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
2023101
2022342
20212,842
20203,030
20192,749
20182,719