Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
42
views
0
references
Top references
cited by
57
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,813
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Foundations and Practice of Security
Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems
other
Author(s):
Jean-Sébastien Coron
Publication date
(Online):
February 8 2002
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
X-AMR (cross-disciplinary antimicrobial resistance)
Author and book information
Book Chapter
Publication date (Print):
1999
Publication date (Online):
February 8 2002
Pages
: 292-302
DOI:
10.1007/3-540-48059-5_25
SO-VID:
d9ae8437-fbcd-4b85-a119-6065f61c0273
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Refining specifications to logic programs
pp. 1
Second-Order Polynomial Models for Background Subtraction
pp. 1
The Quantum Inspired Modelling of Changing Attitudes and Self-organising Societies
pp. 1
Learning with Configurable Operators and RL-Based Heuristics
pp. 1
Medical Image Synthesis for Data Augmentation and Anonymization Using Generative Adversarial Networks
pp. 1
Leveraging Multiple Mechanisms for Information Propagation
pp. 1
Blow-Ups, Win/Win’s, and Crown Rules: Some New Directions in FPT
pp. 1
Image-Based Low-Cost Systems for Automatic 3D Recording and Modelling of Archaeological Finds and Objects
pp. 1
Subspace Codes
pp. 1
Recent developments in practical examination timetabling
pp. 1
0. Introduction
pp. 1
Let’s Get Physical: Models and Methods for Real-World Security Protocols
pp. 1
Motion Coordination for Multi-agent Networks
pp. 1
A Gauge-Invariant Reversible Cellular Automaton
pp. 1
Query Expansion in Folksonomies
pp. 1
Invariants and Well-Foundedness in Program Algebra
pp. 1
Interacting with Context
pp. 1
Fully Abstract Characterization of Probabilistic May Testing
pp. 1
Correlation Clustering with Partial Information
pp. 1
Feature Selection Based on Iterative Canonical Correlation Analysis for Automatic Diagnosis of Parkinson’s Disease
pp. 1
Data Clustering: A User’s Dilemma
pp. 1
On the Revival of Dynamic Languages
pp. 1
On the synthesis of strategies in infinite games
pp. 1
Reasoning as Search: Supporting Reasoning with Distributed Memory
pp. 1
Final universes of processes
pp. 1
The history of steganography
pp. 3
Quantum Homomorphic Encryption for Polynomial-Sized Circuits
pp. 3
Touchscreen Poetry: Analyzing Gestural Digital Poems
pp. 3
Towards Sensor Database Systems
pp. 3
Plan Indexing for State-Based Plans
pp. 3
GO-WAR: A Tool for Mining Weighted Association Rules from Gene Ontology Annotations
pp. 3
Adversarial Image Synthesis for Unpaired Multi-modal Cardiac Data
pp. 3
Exploring the Potential of User Modeling Based on Mind Maps
pp. 3
Boosting Authenticated Encryption Robustness with Minimal Modifications
pp. 3
Constant-Factor Approximation for Minimum-Weight (Connected) Dominating Sets in Unit Disk Graphs
pp. 3
Evaluating Quality of Service Traffic Classes on the Megafly Network
pp. 3
Deciphering Text from Touchscreen Key Taps
pp. 5
1 Homing and Synchronizing Sequences
pp. 5
Involving Users in the Design of ICT Aimed to Improve Education, Work, and Leisure for Users with Intellectual Disabilities
pp. 5
Querying Trust in RDF Data with tSPARQL
pp. 5
Active Learning of Extended Finite State Machines
pp. 7
Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best
pp. 7
Axiomatizing Weak Ready Simulation Semantics over BCCSP
pp. 9
Modelling the Effects of Operating Conditions on Motor Power Consumption in Single Screw Extrusion
pp. 9
Identifying Relationships in Functional and Structural Connectome Data Using a Hypergraph Learning Method
pp. 10
What Automata Can Provide a Medium for Life?
pp. 11
TrajSpark: A Scalable and Efficient In-Memory Management System for Big Trajectory Data
pp. 13
Self-organizing data structures
pp. 13
A Bandwidth-Efficient Application Level Framing Protocol for H.264 Video Multicast over Wireless LANs
pp. 13
Local Approximation Algorithms for the Uncapacitated Metric Facility Location Problem in Power-Aware Sensor Networks
pp. 13
Pairing-Based Cryptography at High Security Levels
pp. 13
Philosophical Conceptions of Information
pp. 13
Generic programming
pp. 13
Deformable Image Registration of Follow-Up Breast Magnetic Resonance Images
pp. 13
An Apriori-Based Algorithm for Mining Frequent Substructures from Graph Data
pp. 14
Many-Objective Optimization: An Engineering Design Perspective
pp. 14
Cognitive maps, cognitive collages, and spatial mental models
pp. 15
Face Authentication Using One-Class Support Vector Machines
pp. 15
A Macroscopic Privacy Model for Heterogeneous Robot Swarms
pp. 16
SVC2004: First International Signature Verification Competition
pp. 16
Cross-Cultural Study on Facial Regions as Cues to Recognize Emotions of Virtual Agents
pp. 16
Building General Purpose Security Services on Trusted Computing
pp. 17
DroidSense: A Mobile Tool to Analyze Software Development Processes by Measuring Team Proximity
pp. 18
Influence and Passivity in Social Media
pp. 18
Unsupervised Learning of Models for Recognition
pp. 18
Phrase-Based Statistical Machine Translation
pp. 18
A Formal Specification for Organizational Adaptation
pp. 18
k2-Trees for Compact Web Graph Representation
pp. 19
Rational control of reasoning in artificial intelligence
pp. 19
Robust Recognition of Reading Activity in Transit Using Wearable Electrooculography
pp. 19
Treewidth: Algorithmic techniques and results
pp. 19
2. Synchronization
pp. 19
VLog: A Rule Engine for Knowledge Graphs
pp. 22
Predicting Online Extremism, Content Adopters, and Interaction Reciprocity
pp. 22
Query Evaluation via Tree-Decompositions
pp. 23
On Symmetric and Choiceless Computation
pp. 24
Using Evidences Based on Natural Language to Drive the Process of Fusing Multimodal Sources
pp. 24
When You Can’t Read It, Listen to It! An Audio-Visual Interface for Book Reading
pp. 25
Interactive Conversion of Web Tables
pp. 25
Matching Ontologies in Open Networked Systems: Techniques and Applications
pp. 27
Distortion-Free Data Embedding for Images
pp. 27
A New Public-Key Cryptosystem
pp. 28
The Marketcast Method for Aggregating Prediction Market Forecasts
pp. 29
Dataset Issues in Object Recognition
pp. 29
Boolean Networks: Beyond Generalized Asynchronicity
pp. 30
Modelling of Cancer Patient Records: A Structured Approach to Data Mining and Visual Analytics
pp. 31
Novel Local Shape-Adaptive Gyrification Index with Application to Brain Development
pp. 31
Encoding Context-Sensitivity in Reo into Non-Context-Sensitive Semantic Models
pp. 31
Mutual Development: A Case Study in Customer-Initiated Software Product Development
pp. 32
Neural Networks Regression Inductive Conformal Predictor and Its Application to Total Electron Content Prediction
pp. 32
Beeping a Maximal Independent Set
pp. 33
Event2vec: Learning Representations of Events on Temporal Sequences
pp. 33
Towards a Common API for Structured Peer-to-Peer Overlays
pp. 33
3. A case study in synchronization and proof techniques
pp. 34
Minimal weight k-SR representations
pp. 34
Exact Algorithms for Set Multicover and Multiset Multicover Problems
pp. 34
A New Algorithm for Long Integer Cube Computation with Some Insight into Higher Powers
pp. 34
Moderately exponential bound for graph isomorphism
pp. 36
30 Years of Modal Transition Systems: Survey of Extensions and Analysis
pp. 36
Dependent Types and Fibred Computational Effects
pp. 36
An Empirical Study on the Adoption of Online Household e-waste Collection Services in China
pp. 36
Privacy Preserving Data Mining
pp. 37
A QoS-Aware Web Service Composition Approach Based on Genetic Programming and Graph Databases
pp. 37
Correlation-Weighted Sparse Group Representation for Brain Network Construction in MCI Classification
pp. 37
Approximating the Average Stretch Factor of Geometric Graphs
pp. 38
Deep Learning for Emotion Recognition in Faces
pp. 39
Submodular Secretary Problem and Extensions
pp. 39
A Unified Approach for Measuring Precision and Generalization Based on Anti-alignments
pp. 39
Scalar Aggregation in FD-Inconsistent Databases
pp. 40
Orthogonal Direct Sum Masking
pp. 40
Active Trust Management for Autonomous Adaptive Survivable Systems (ATM’s for AAss’s)
pp. 40
Relational Presheaves as Labelled Transition Systems
pp. 41
Algebraic and Logical Emulations of Quantum Circuits
pp. 41
Interpretability in Intelligent Systems – A New Concept?
pp. 42
Fibrational Induction Meets Effects
pp. 42
Cloud Computing and Big Data Analytics: What Is New from Databases Perspective?
pp. 42
Knowledge Discovery in Multi-label Phenotype Data
pp. 43
On the Link between Gaussian Homotopy Continuation and Convex Envelopes
pp. 43
On Practical Aspects of PCFG Password Cracking
pp. 44
A Bayesian Algorithm for Reconstructing Two-Component Signaling Networks
pp. 44
Segmentation and Recognition Using Structure from Motion Point Clouds
pp. 45
Multimodal Learning Hub: A Tool for Capturing Customizable Multimodal Learning Experiences
pp. 45
Combinatorial Structure of Finite Fields with Two Dimensional Modulo Metrics⋆
pp. 46
Scheduling, timetabling and rostering — A special relationship?
pp. 46
Co-evolutionary constraint satisfaction
pp. 47
#Depression: Findings from a Literature Review of 10 Years of Social Media and Depression Research
pp. 47
On Dataset Complexity for Case Base Maintenance
pp. 48
Engineering Self-Adaptive Systems through Feedback Loops
pp. 48
Perceptions of Teachers and Guardians on the Electronic Record in the School-Family Communication
pp. 48
Predicting Personality Using Novel Mobile Phone-Based Metrics
pp. 48
On Berge Multiplication for Monotone Boolean Dualization
pp. 48
On the Availability of Non-strict Quorum Systems
pp. 49
Patient Position Detection for SAR Optimization in Magnetic Resonance Imaging
pp. 49
Some probabilistic powerdomains in the category SFP
pp. 49
Unsupervised Accent Modeling for Language Identification
pp. 49
A Universal Client-Based Identity Management Tool
pp. 50
Metric Space Searching Based on Random Bisectors and Binary Fingerprints
pp. 51
On Finitary Functors and Their Presentations
pp. 51
Adaptive Navigation Support and Adaptive Collaboration Support in WebDL
pp. 51
When Birds Die: Making Population Protocols Fault-Tolerant
pp. 51
The Stixel World - A Compact Medium Level Representation of the 3D-World
pp. 51
Rapid Learning for Binary Programs
pp. 52
Automatically Extracting Class Diagrams from Spreadsheets
pp. 52
On the Use of Gröbner Bases for Computing the Structure of Finite Abelian Groups
pp. 52
ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector
pp. 52
The Cog Project: Building a Humanoid Robot
pp. 53
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
pp. 53
Bridging Computational Features Toward Multiple Semantic Features with Multi-task Regression: A Study of CT Pulmonary Nodules
pp. 53
Machine learning for adaptive user interfaces
pp. 53
Ant Colony Optimisation-Based Classification Using Two-Dimensional Polygons
pp. 54
Single Sign-On Using Trusted Platforms
pp. 54
Sesame: A Generic Architecture for Storing and Querying RDF and RDF Schema
pp. 54
SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key
pp. 54
Human Robot Interaction and Fiction: A Contradiction
pp. 55
Integration of Unsupervised and Supervised Criteria for Deep Neural Networks Training
pp. 55
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics
pp. 56
Moral Values from Simple Game Play
pp. 57
Fast probabilistic algorithms
pp. 57
IR-n System, a Passage Retrieval Architecture
pp. 59
Constrained Connectivity and Transition Regions
pp. 59
Partial Order Methods for Statistical Model Checking and Simulation
pp. 60
External User Inclusion in Public e-Service Development: Exploring the Current Practice in Sweden
pp. 60
A High Resolution Land Use/Cover Modelling Framework for Europe: Introducing the EU-ClueScanner100 Model
pp. 61
ADRES: An Architecture with Tightly Coupled VLIW Processor and Coarse-Grained Reconfigurable Matrix
pp. 61
Light Robustness
pp. 61
Robust Cancer Treatment Outcome Prediction Dealing with Small-Sized and Imbalanced Data from FDG-PET Images
pp. 61
The Monoids of Order Eight and Nine
pp. 61
EnvSOM: A SOM Algorithm Conditioned on the Environment for Clustering and Visualization
pp. 62
Logic Training through Algorithmic Problem Solving
pp. 62
Lower Bounds on Matrix Rigidity Via a Quantum Argument
pp. 62
Efficient State-Based CRDTs by Delta-Mutation
pp. 63
Cryptocurrencies as a Disruption? Empirical Findings on User Adoption and Future Potential of Bitcoin and Co
pp. 63
Measuring Statistical Dependence with Hilbert-Schmidt Norms
pp. 63
Decidability Results for Restricted Models of Petri Nets with Name Creation and Replication
pp. 64
The Matita Interactive Theorem Prover
pp. 64
Inter-organizational Integration in the AEC/FM Industry
pp. 64
TweetNaCl: A Crypto Library in 100 Tweets
pp. 65
Elements of Good Route Directions in Familiar and Unfamiliar Environments
pp. 65
Key-Insulated Public Key Cryptosystems
pp. 65
An Agent-Based Model for Simultaneous Phone and SMS Traffic over Time
pp. 65
Completeness Theorems for Bi-Kleene Algebras and Series-Parallel Rational Pomset Languages
pp. 65
5. Syntax and semantics of CCS
pp. 66
Element-Oriented Method of Assessing Landscape of Sightseeing Spots by Using Social Images
pp. 67
Using the TPTP Language for Writing Derivations and Finite Interpretations
pp. 67
Learning with Rejection
pp. 68
On Testing Expansion in Bounded-Degree Graphs
pp. 68
Automatic verification of pipelined microprocessor control
pp. 69
A Closer Look at Database Replication Middleware Architectures for Enterprise Applications
pp. 69
LC-QuAD 2.0: A Large Dataset for Complex Question Answering over Wikidata and DBpedia
pp. 69
Training Hierarchical Feed-Forward Visual Recognition Models Using Transfer Learning from Pseudo-Tasks
pp. 69
Unsupervised Learning of Visual Representations by Solving Jigsaw Puzzles
pp. 70
SAT-Based Model Checking without Unrolling
pp. 70
Structured Sparse Kernel Learning for Imaging Genetics Based Alzheimer’s Disease Diagnosis
pp. 70
Accelerated Analysis of Biological Parameters Space Using GPUs
pp. 71
Prehension of an Anthropomorphic Metamorphic Robotic Hand Based on Opposition Space Model
pp. 71
Structural Operational Semantics for Continuous State Probabilistic Processes
pp. 72
Enhancing E-commerce Security Using GSM Authentication
pp. 72
Cell-Probe Proofs and Nondeterministic Cell-Probe Complexity
pp. 72
Efficient Selectivity and Backup Operators in Monte-Carlo Tree Search
pp. 72
Breast Imaging with 3D Ultrasound Computer Tomography: Results of a First In-vivo Study in Comparison to MRI Images
pp. 73
Speed Records for NTRU
pp. 73
An ACO Approach to Planning
pp. 73
Covert channels—A context-based view
pp. 73
Inferring High-Level Behavior from Low-Level Sensors
pp. 73
Improved Randomized Algorithms for 3-SAT
pp. 74
A Comparison of the Historical Entries in Wikipedia and Baidu Baike
pp. 74
Cochlea Modelling: Clinical Challenges and Tubular Extraction
pp. 75
Reconstructing Online Behaviors by Effort Minimization
pp. 75
Longitudinal Modeling of Multi-modal Image Contrast Reveals Patterns of Early Brain Growth
pp. 76
Data Weighting for Principal Component Noise Reduction in Contrast Enhanced Ultrasound
pp. 77
Automatic Construction of 3D Statistical Deformation Models Using Non-rigid Registration
pp. 78
Modelling and Evaluation of CCN-Caching Trees
pp. 79
Automatic Reference Selection for Quantitative EEG Component Interpretation: Cross Spectrum Analysis Based on Bipolar EEG
pp. 80
Conquering the Needle-in-a-Haystack: How Correlated Input Variables Beneficially Alter the Fitness Landscape for Neural Networks
pp. 80
The Effects of Regularization on Learning Facial Expressions with Convolutional Neural Networks
pp. 80
A Data Mining Library for miRNA Annotation and Analysis
pp. 81
Loop Summarization and Termination Analysis
pp. 81
Attention-Based Two-Phase Model for Video Action Detection
pp. 81
Sentiments in Wikipedia Articles for Deletion Discussions
pp. 81
A Systematic Review of Impediments Blocking Internet of Things Adoption by Governments
pp. 82
Finding the Maximal Pose Error in Robotic Mechanical Systems Using Constraint Programming
pp. 83
A structural co-induction theorem
pp. 84
On Temporally Connected Graphs of Small Cost
pp. 84
Multi-directional Characterization for Pollen Tubes Based on a Nanorobotic Manipulation System
pp. 84
Greedy Approximation Algorithms for Finding Dense Components in a Graph
pp. 84
Shape Filtering for False Positive Reduction at Computed Tomography Colonography
pp. 84
Prediction of Brain Network Age and Factors of Delayed Maturation in Very Preterm Infants
pp. 85
Improving the Development of Data Warehouses by Enriching Dimension Hierarchies with WordNet
pp. 85
Towards an Ethical Robot: Internal Models, Consequences and Ethical Action Selection
pp. 86
A Robust Optimization Approach to Supply Chain Management
pp. 86
Improved Harmony Search from Ensemble of Music Players
pp. 86
Evader Interdiction and Collateral Damage
pp. 86
Combining Bayesian Networks, k Nearest Neighbours Algorithm and Attribute Selection for Gene Expression Data Analysis
pp. 86
A Graph-Oriented Model for Articulation of Ontology Interdependencies
pp. 88
Security Bounds for the Design of Code-Based Cryptosystems
pp. 88
Secure Obfuscation of Authoring Style
pp. 88
Stability-Weighted Matrix Completion of Incomplete Multi-modal Data for Disease Diagnosis
pp. 88
Querying Wikidata: Comparing SPARQL, Relational and Graph Databases
pp. 88
FEMaLeCoP: Fairly Efficient Machine Learning Connection Prover
pp. 90
A Semantics for Every GSPN
pp. 90
On Finite Monoids of Cellular Automata
pp. 90
A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement
pp. 90
SpiderCNN: Deep Learning on Point Sets with Parameterized Convolutional Filters
pp. 90
Statistical Instance-Based Ensemble Pruning for Multi-class Problems
pp. 90
Transformation: The Missing Link of MDA
pp. 91
Gold Mining in a River of Internet Content Traffic
pp. 92
User Interfaces for On-Line Diagram Recognition
pp. 92
A Methodology to Specify Multiagent Systems
pp. 92
Optimal Use of Expert Knowledge in Ant Colony Optimization for the Analysis of Epistasis in Human Disease
pp. 92
A Regularization Scheme for Diffusion Tensor Magnetic Resonance Images
pp. 93
Analyzing Entities and Topics in News Articles Using Statistical Topic Models
pp. 93
The MathSAT5 SMT Solver
pp. 94
The Factor Structure of the System Usability Scale
pp. 95
Deep Projective 3D Semantic Segmentation
pp. 97
Dismantling MIFARE Classic
pp. 97
Architectural Modeling and Analysis for Safety Engineering
pp. 98
A Time and Sentiment Unification Model for Personalized Recommendation
pp. 99
Unsupervised Feature Learning for Human Activity Recognition Using Smartphone Sensors
pp. 99
Cryptography from Learning Parity with Noise
pp. 99
Passive Testing with Asynchronous Communications
pp. 101
A Fast Method of Generating Pharmacokinetic Maps from Dynamic Contrast-Enhanced Images of the Breast
pp. 101
Generalized Rabin(1) Synthesis with Applications to Robust System Synthesis
pp. 104
Lazy Annotation for Program Testing and Verification
pp. 106
Following the Blind Seer – Creating Better Performance Models Using Less Information
pp. 106
Role-Based Access Control for Model-Driven Web Applications
pp. 107
An Algebraic Characterisation of Complexity for Valued Constraint
pp. 107
Context-Aware User Authentication – Supporting Proximity-Based Login in Pervasive Computing
pp. 108
Laws of software evolution revisited
pp. 109
Interaction Design: The Mobile Percussionist
pp. 110
Quotienting the Delay Monad by Weak Bisimilarity
pp. 111
Home Network or Access Link? Locating Last-Mile Downstream Throughput Bottlenecks
pp. 111
Auto-alignment of Knee MR Scout Scans through Redundant, Adaptive and Hierarchical Anatomy Detection
pp. 111
8. Some proofs about data structures
pp. 112
Computer Assisted Identification, Segmentation and Quantification of Synapses in the Cerebral Cortex
pp. 112
Word Sense Disambiguation: A Graph-Based Approach Using N-Cliques Partitioning Technique
pp. 112
Lagrangian Relaxation
pp. 112
AutoPart: Parameter-Free Graph Partitioning and Outlier Detection
pp. 113
Keyword Spotting with Convolutional Deep Belief Networks and Dynamic Time Warping
pp. 113
Specification and Verification of Graph-Based Model Transformation Properties
pp. 115
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults
pp. 115
Security Requirements for the Deployment of Services Across Tactical SOA
pp. 115
Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks
pp. 115
The Impact of Reader to Tag Collision on RFID Tag Identification
pp. 115
Affine Sessions
pp. 115
Modeling Adversaries in a Logic for Security Protocol Analysis
pp. 116
Efficient Compression on Real World Directed Graphs
pp. 116
On discerning words by automata
pp. 117
Engineering Route Planning Algorithms
pp. 118
Trend Cluster Based Kriging Interpolation in Sensor Data Networks
pp. 120
Mass Preserving Mappings and Image Registration
pp. 121
Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment
pp. 121
Motion-Coherent Affinities for Hypergraph Based Motion Segmentation
pp. 121
Computational Advantages of Deep Prototype-Based Learning
pp. 122
Directly Addressable Variable-Length Codes
pp. 124
Testing for Distinguishing Repair Candidates in Spreadsheets – the Mussco Approach
pp. 125
Building Oblivious Transfer on Channel Delays
pp. 125
Call Center Stress Recognition with Person-Specific Models
pp. 126
SFMap: Inferring Services over Encrypted Web Flows Using Dynamical Domain Name Graphs
pp. 127
Automatic Landmark Estimation for Adolescent Idiopathic Scoliosis Assessment Using BoostNet
pp. 128
A Prototype Implementation of OpenMP Task Dependency Support
pp. 128
Deep Convolutional Neural Networks for Classifying Body Constitution
pp. 128
A Review of Quality Dimensions in e-Government Services
pp. 129
MiRaGE: Inference of Gene Expression Regulation via MicroRNA Transfection II
pp. 129
Pattern Structures and Their Projections
pp. 129
javaPlex: A Research Software Package for Persistent (Co)Homology
pp. 129
Implementing Gentry’s Fully-Homomorphic Encryption Scheme
pp. 129
Graph Treewidth and Geometric Thickness Parameters
pp. 130
Modeling Malware-driven Honeypots
pp. 132
On the random walk method for protocol testing
pp. 132
Simulation Subsumption in Ramsey-Based Büchi Automata Universality and Inclusion Testing
pp. 132
Comprehending Ringads
pp. 132
Ephemeral Communication and Communication Places
pp. 133
Closing Schemas in Object-Relational Databases
pp. 133
Differences between the EISPACK subroutines and the handbook Algol procedures
pp. 133
Networks Become Navigable as Nodes Move and Forget
pp. 133
Time-Triggered Conversion of Guards for Reachability Analysis of Hybrid Automata
pp. 134
Encoding-Decoding Transitional Systems for Classes of P Systems
pp. 134
Finding Preimages in Full MD5 Faster Than Exhaustive Search
pp. 134
Pex–White Box Test Generation for .NET
pp. 136
An Adapted Lesk Algorithm for Word Sense Disambiguation Using WordNet
pp. 136
Nonlinear Statistical Shape Modeling for Ankle Bone Segmentation Using a Novel Kernelized Robust PCA
pp. 137
The Performance Impact of Advance Reservation Meta-scheduling
pp. 137
PHAT – Persistent Homology Algorithms Toolbox
pp. 138
Lagrangian Relaxation Realised in the NgMPPS Multi Actor Architecture
pp. 138
Polyglot: An Extensible Compiler Framework for Java
pp. 140
Convolutional Learning of Spatio-temporal Features
pp. 141
Service Composition (re)Binding Driven by Application–Specific QoS
pp. 141
Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials
pp. 143
User Data Management and Usage Model Acquisition in an Adaptive Educational Collaborative Environment
pp. 144
Perfectly Secure Oblivious RAM without Random Oracles
pp. 144
Asymptotically Optimal Declustering Schemes for Range Queries
pp. 144
Automated Analysis of Multi Site MRI Phantom Data for the NIHPD Project
pp. 144
Testing the Foundations of Quantal Response Equilibrium
pp. 145
Towards an Ontology-Based Approach for Eliciting Possible Solutions to Non-Functional Requirements
pp. 146
Who Is Concerned about What? A Study of American, Chinese and Indian Users’ Privacy Concerns on Social Network Sites
pp. 146
A Real-World Benchmark Model for Testing Concurrent Real-Time Systems in the Automotive Domain
pp. 146
‘Who, When, and Where?’ Location Proof Assertion for Mobile Devices
pp. 147
Modelling Cloud Forensic-Enabled Services
pp. 148
Random Forests for Phase Detection in Surgical Workflow Analysis
pp. 150
An Alphabet-Friendly FM-Index
pp. 151
Trace Inclusion for One-Counter Nets Revisited
pp. 151
Improving Segmentation of the Left Ventricle Using a Two-Component Statistical Model
pp. 153
Induction of recursive Bayesian classifiers
pp. 154
Towards an On-Line Analysis of Tweets Processing
pp. 154
How Many Trees in a Random Forest?
pp. 156
Provably Secure Implicit Certificate Schemes
pp. 156
ParCoLab: A Parallel Corpus for Serbian, French and English
pp. 157
On Formulations of Firing Squad Synchronization Problems
pp. 157
How to Achieve a McEliece-Based Digital Signature Scheme
pp. 158
DES and Differential Power Analysis The “Duplication” Method
pp. 158
Optimal Succinctness for Range Minimum Queries
pp. 158
Assembling Genomes and Mini-metagenomes from Highly Chimeric Reads
pp. 159
Software Implementation of Mathematical Model of Thermodynamic Processes in a Steam Turbine on High-Performance System
pp. 159
RFID Systems: A Survey on Security Threats and Proposed Solutions
pp. 161
Anisotropic Feature Extraction from Endoluminal Images for Detection of Intestinal Contractions
pp. 161
Integrating Statistical Prior Knowledge into Convolutional Neural Networks
pp. 161
An Ontology-Based Bayesian Network Approach for Representing Uncertainty in Clinical Practice Guidelines
pp. 162
Graph-theoretic arguments in low-level complexity
pp. 162
Using a Modelling Language to Describe the Quality of Life Goals of People Living with Dementia
pp. 162
Testing TLS Using Combinatorial Methods and Execution Framework
pp. 162
Engineering a Performance Management System to Support Community Care Delivery
pp. 163
Response-Time Modeling of Controller Area Network (CAN)
pp. 163
A Model-Based Extension to HiP-HOPS for Dynamic Fault Propagation Studies
pp. 163
Quantum cryptanalysis of hash and claw-free functions
pp. 164
Discovering Consumer Health Expressions from Consumer-Contributed Content
pp. 165
Independent Vector Analysis: An Extension of ICA to Multivariate Components
pp. 166
SpineNet: Automatically Pinpointing Classification Evidence in Spinal MRIs
pp. 166
Social Situated Agents in Virtual, Real and Mixed Reality Environments
pp. 167
Breach, A Toolbox for Verification and Parameter Synthesis of Hybrid Systems
pp. 167
DNA-based Cryptography
pp. 168
A Tool for Checking ANSI-C Programs
pp. 169
Experiences with QuickCheck: Testing the Hard Stuff and Staying Sane
pp. 169
Semi-homomorphic Encryption and Multiparty Computation
pp. 169
The Database of the Cardiovascular System Related Signals
pp. 169
Strategic Tabletop Negotiations
pp. 169
Clinical Evaluation of an Automatic Path Tracker for Virtual Colonoscopy
pp. 170
Teaching Academic Concurrency to Amazing Students
pp. 170
DNN-Buddies: A Deep Neural Network-Based Estimation Metric for the Jigsaw Puzzle Problem
pp. 170
From Transitions to Executions
pp. 170
A New GreatSPN GUI for GSPN Editing and CSLTA Model Checking
pp. 171
A Learning-Based Approach for IP Geolocation
pp. 171
Towards Self-aware Approach for Mobile Devices Security
pp. 171
Estimating attributes: Analysis and extensions of RELIEF
pp. 173
W-OTS+ – Shorter Signatures for Hash-Based Signature Schemes
pp. 173
Fine-Grained Access Control with Object-Sensitive Roles
pp. 173
Data Dependent Concentration Bounds for Sequential Prediction Algorithms
pp. 175
Patient-Centered Information Extraction for Effective Search on Healthcare Forum
pp. 175
Error-Free Affine, Unitary, and Probabilistic OBDDs
pp. 175
Induced Subgraphs of Bounded Degree and Bounded Treewidth
pp. 176
Estimating Depth from RGB and Sparse Sensing
pp. 178
Towards Continuous Certification of Clinical Information Systems
pp. 180
A New Sharing Paradigm for the Personal Cloud
pp. 183
Recent Results in Speech Recognition for the Tatar Language
pp. 184
Exploring the Impact of Search Interface Features on Search Tasks
pp. 184
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm
pp. 184
Quantum Entanglement and the Issue of Selective Influences in Psychology: An Overview
pp. 184
Pseudonym Systems
pp. 185
LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks
pp. 185
Can Evaluation Patterns Enable End Users to Evaluate the Quality of an e-learning System? An Exploratory Study
pp. 186
Hybrid Systems with Finite Bisimulations
pp. 186
Improved Approximation Algorithms for Budgeted Allocations
pp. 188
An Improved Optimistic and Fault-Tolerant Replication Protocol
pp. 188
Monitoring Discrete Event Systems Using Petri Net Embeddings
pp. 188
Improving Multi-label Classifiers via Label Reduction with Association Rules
pp. 191
Parallel Object Oriented Monte Carlo Simulations
pp. 191
Comparison of Coarsening Schemes for Multilevel Graph Partitioning
pp. 192
Face Recognition Using Wavelet Transform and Non-negative Matrix Factorization
pp. 193
How Do E-Patients Connect Online? A Study of Social Support Roles in Health Social Networking
pp. 193
Layer-Wise Relevance Propagation: An Overview
pp. 194
Examining Community in the Digital Neighborhood: Early Results from Canada’s Wired Suburb
pp. 194
Automated Age Estimation from Hand MRI Volumes Using Deep Learning
pp. 195
Formal Reasoning on Infinite Data Values: An Ongoing Quest
pp. 195
tLab: A System Enabling Malware Clustering Based on Suspicious Activity Trees
pp. 196
The glory of the past
pp. 196
Constraint Satisfaction Problems with Infinite Templates
pp. 196
Experienced and Novice Driver Situation Awareness at Rail Level Crossings: An Exploratory On-Road Study
pp. 196
Reasoning about gradual changes of topological relationships
pp. 196
Safety Verification for Probabilistic Hybrid Systems
pp. 196
Multiple-Precision Residue-Based Arithmetic Library for Parallel CPU-GPU Architectures: Data Types and Features
pp. 197
Timing assumptions and verification of finite-state concurrent systems
pp. 197
BcePred: Prediction of Continuous B-Cell Epitopes in Antigenic Sequences Using Physico-chemical Properties
pp. 197
Oblivious RAM with O((logN)3) Worst-Case Cost
pp. 198
The Travelling Salesman Problem in Bounded Degree Graphs
pp. 199
Thompson Sampling: An Asymptotically Optimal Finite-Time Analysis
pp. 200
A Tutorial on Uppaal
pp. 201
IKNOW: A Tool to Assist and Study the Creation, Maintenance, and Dissolution of Knowledge Networks
pp. 201
Pairing the Volcano
pp. 201
Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations
pp. 203
Learning and Incorporating Shape Models for Semantic Segmentation
pp. 203
A Deep Learning Method for Classification of EEG Data Based on Motor Imagery
pp. 204
Combining Passages in the Monolingual Task with the IR-n System
pp. 204
Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context
pp. 204
Shared Ensemble Learning Using Multi-trees
pp. 204
A Statistical Framework for Partial Volume Segmentation
pp. 206
Optimizing Egalitarian Performance in the Side-Effects Model of Colocation for Data Center Resource Management
pp. 206
Nonparametric Density Flows for MRI Intensity Normalisation
pp. 209
UML Modelling and Performance Analysis of Mobile Software Architectures
pp. 209
Multimodal Fusion and Fission within W3C Standards for Nonverbal Communication with Blind Persons
pp. 209
Atlas Guided Identification of Brain Structures by Combining 3D Segmentation and SVM Classification
pp. 210
Using Ant Colony Optimization to Build Cluster-Based Classification Systems
pp. 211
Timed Temporal Logics
pp. 211
Do Voting Advice Applications Have an Effect on Electoral Participation and Voter Turnout? Evidence from the 2007 Swiss Federal Elections
pp. 212
The simple semantics for Coppo-Dezani-Sallé types
pp. 213
VPR: a new packing, placement and routing tool for FPGA research
pp. 213
3D multi-scale line filter for segmentation and visualization of curvilinear structures in medical images
pp. 213
Planarity for clustered graphs
pp. 214
Deriving Inverse Operators for Modal Logic
pp. 214
Hierarchical Predicate Encryption for Inner-Products
pp. 214
Piecewise testable events
pp. 215
Conceptual Model of Complex Multi-agent System Smart City 4.0
pp. 216
Comparison of Methods for Community Detection in Networks
pp. 216
A Complete Declarative Debugger for Maude
pp. 216
The (Thin) Bridges of AS Connectivity: Measuring Dependency Using AS Hegemony
pp. 217
A Generic yet Efficient Method for Secure Inner Product
pp. 220
An Application of Recurrent Neural Networks to Discriminative Keyword Spotting
pp. 221
A Neural Approach to Blind Motion Deblurring
pp. 221
Contributing to Current Challenges in Identity and Access Management with Visual Analytics
pp. 221
A Language and a Methodology for Prototyping User Interfaces for Control Systems
pp. 222
Interlinked Convolutional Neural Networks for Face Parsing
pp. 222
The Independent Choice Logic and Beyond
pp. 223
DFA on LS-Designs with a Practical Implementation on SCREAM
pp. 223
Model-Driven Web Form Validation with UML and OCL
pp. 223
An Analysis of Minutiae Matching Strength
pp. 223
Arrays in Blitz++
pp. 224
Fundamentals of 3D halftoning
pp. 225
Fair Testing and Stubborn Sets
pp. 227
SSH – Somewhat Secure Host
pp. 227
Watermarking document images with bounding box expansion
pp. 227
Cryptanalysis of a White Box AES Implementation
pp. 228
Semi-numerical Solution of Stochastic Process Algebra Models
pp. 228
Comparing a Shipping Information Pipeline with a Thick Flow and a Thin Flow
pp. 229
Squerall: Virtual Ontology-Based Access to Heterogeneous and Large Data Sources
pp. 229
Optimizing Window Aggregate Functions via Random Sampling
pp. 230
Regressing Heatmaps for Multiple Landmark Localization Using CNNs
pp. 230
SCTP, XTP and TCP as Transport Protocols for High Performance Computing on Multi-cluster Grid Environments
pp. 230
Dependently Typed Programming in Agda
pp. 230
A Flexible and Extensible Architecture for Device-Level Service Deployment
pp. 231
Reflection and Preservation of Properties in Coalgebraic (bi)Simulations
pp. 231
Maximum Matching in Semi-streaming with Few Passes
pp. 231
Distinguisher and Related-Key Attack on the Full AES-256
pp. 232
A General Diagnosis Method for Ontologies
pp. 232
GRASPing the Examination Scheduling Problem
pp. 233
On spanning trees with low crossing numbers
pp. 233
Multi-scale line segmentation with automatic estimation of width, contrast and tangential direction in 2D and 3D medical images
pp. 233
Automatic Generalization of a QA Answer Extraction Module Based on Semantic Roles
pp. 234
Semi-supervised On-Line Boosting for Robust Tracking
pp. 234
Clustering and Hot Spot Detection in Socio-economic Spatio-temporal Data
pp. 235
Privacy-Preserving Face Recognition
pp. 235
Kernel Depth Measures for Functional Data with Application to Outlier Detection
pp. 236
Metacommunication Patterns in Online Communities
pp. 236
Cancer Metastasis Detection via Spatially Structured Deep Network
pp. 236
SpecDB: A Database for Storing and Managing Mass Spectrometry Proteomics Data
pp. 237
Towards Personalization of Diabetes Therapy Using Computerized Decision Support and Machine Learning: Some Open Problems and Challenges
pp. 238
Design of a Series Variable Stiffness Joint Based on Antagonistic Principle
pp. 238
An Evaluation Framework for Disseminating Context Information with Gossiping
pp. 238
Integrating Formal Predictions of Interactive System Behaviour with User Evaluation
pp. 238
Multimedia Search with Pseudo-relevance Feedback
pp. 238
An automata-theoretic approach to linear temporal logic
pp. 239
Undetachable Threshold Signatures
pp. 240
Implementing Computations in Automaton (Semi)groups
pp. 241
Mining Communication Data in a Music Community: A Preliminary Analysis
pp. 241
Motion Reconstruction of Swarm-Like Self-organized Motor Bike Traffic from Public Videos
pp. 243
Predestination: Inferring Destinations from Partial Trajectories
pp. 243
Identifying the Affective Dimension of Data Mining Practice: An Exploratory Study
pp. 243
KT-IDEM: Introducing Item Difficulty to the Knowledge Tracing Model
pp. 244
Automating the Choice of Decision Support System Architecture
pp. 244
Bisimulation Algorithms for Stochastic Process Algebras and Their BDD-Based Implementation
pp. 244
IR-n: A Passage Retrieval System at CLEF-2001
pp. 244
A practical secret voting scheme for large scale elections
pp. 245
From Plagiarism Detection to Bible Analysis: The Potential of Machine Learning for Grammar-Based Text Analysis
pp. 245
Fast Log Replication in Highly Available Data Store
pp. 246
Parametric Trace Slicing and Monitoring
pp. 247
On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records
pp. 248
EEG-Based Random Number Generators
pp. 249
A Taxonomy of Single Sign-On Systems
pp. 249
Two-Phase Preference Disclosure in Attributed Social Networks
pp. 249
Efficient Timetable Information in the Presence of Delays
pp. 249
Adaptive Learning from Evolving Data Streams
pp. 250
Compositional Specification of Controllers for Batch Process Operations
pp. 250
Type Assignment for Intersections and Unions in Call-by-Value Languages
pp. 251
Local Reject Option for Deterministic Multi-class SVM
pp. 252
A Formal Template Language Enabling Metaproof
pp. 254
S-TaLiRo: A Tool for Temporal Logic Falsification for Hybrid Systems
pp. 256
Graphical Modeling of Ultrasound Propagation in Tissue for Automatic Bone Segmentation
pp. 256
Constraint Support in MDA Tools: A Survey
pp. 256
A Dataset for Web-Scale Knowledge Base Population
pp. 256
Ninth International Workshop on the Pragmatics of OCL and Other Textual Specification Languages
pp. 256
Playing “Air Instruments”: Mimicry of Sound-Producing Gestures by Novices and Experts
pp. 257
Eighth International Workshop on OCL Concepts and Tools
pp. 258
Using Case-Based Tests to Detect Gray Cygnets
pp. 259
Palmprint Biometric System Modeling by DBC and DLA Methods and Classifying by KNN and SVM Classifiers
pp. 260
User Modeling on Adaptive Web-Based Learning Communities
pp. 260
Elimination of Redundancy in Ontologies
pp. 261
Analysis of a Proposed Hash-Based Signature Standard
pp. 261
Stochastic Semantic-Based Multi-objective Genetic Programming Optimisation for Classification of Imbalanced Data
pp. 261
A Scalable Framework for Quality Assessment of RDF Datasets
pp. 261
Cross-Categorial Donkeys
pp. 262
A New Approach to Assess Defragmentation Strategies in Dynamically Reconfigurable FPGAs
pp. 263
Information and Knowledge Based Conceptual Study of 2008 Financial Crisis
pp. 263
Compression and Information Leakage of Plaintext
pp. 263
Social Network for Education: What Are the Resources Desired by Students?
pp. 263
On Cost-Effective Inter-LMA Domain Handover Scheme in NEMO-PMIPv6 Networks
pp. 264
From Individuals to Social and Vice-versa
pp. 265
Bayesian Image Quality Transfer
pp. 265
HOL Light: A tutorial introduction
pp. 266
Sliding Mode Control of Robot Based on Neural Network Model with Positive Definite Inertia Matrix
pp. 266
Reuse: From Components to Services
pp. 266
A Reduction of Logical Regulatory Graphs Preserving Essential Dynamical Properties
pp. 267
Discovering Opinion Spammer Groups by Network Footprints
pp. 267
The (Un)reliability of Saliency Methods
pp. 268
Improving the Reproducibility of PAN’s Shared Tasks:
pp. 268
The Join Calculus: A Language for Distributed Mobile Programming
pp. 270
Towards a Formalization of Individual Work Execution at Computer Workplaces
pp. 271
On the specification of elementary reactive behaviour
pp. 273
Privacy by Design — Principles of Privacy-Aware Ubiquitous Systems
pp. 274
Indexing Highly Repetitive Collections
pp. 276
Isogeny Volcanoes and the SEA Algorithm
pp. 276
On the Expressiveness of Refinement Settings
pp. 277
Comparative Analysis of Effectiveness of Two Timing-Driven Design Approaches
pp. 277
On Solutions to the Key Escrow Problem
pp. 277
Weighted Learning Vector Quantization to Cost-Sensitive Learning
pp. 280
Bound Analysis of Imperative Programs with the Size-Change Abstraction
pp. 281
A Lightweight Regression Method to Infer Psycholinguistic Properties for Brazilian Portuguese
pp. 281
Detecting Isodistance Hotspots on Spatial Networks: A Summary of Results
pp. 281
The Bitcoin Backbone Protocol: Analysis and Applications
pp. 282
A Debugger for Parallel Haskell Dialects
pp. 282
Object Segmentation by Long Term Analysis of Point Trajectories
pp. 282
MOPED: A Multi-objective Parzen-Based Estimation of Distribution Algorithm for Continuous Problems
pp. 283
Classification of Photo and Sketch Images Using Convolutional Neural Networks
pp. 283
Quantum Security of NMAC and Related Constructions
pp. 286
Evolutionary Fuzzy Scheduler for Grid Computing
pp. 288
On the Foundations of Quantitative Information Flow
pp. 289
Managerial and Technical Barriers to the Adoption of Open Source Software
pp. 289
Measuring Similarity in Description Logics Using Refinement Operators
pp. 291
Resilient Optimistic Termination Detection for the Async-Finish Model
pp. 291
Reinforced Condition/Decision Coverage (RC/DC): A New Criterion for Software Testing
pp. 292
Reversible Communicating Systems
pp. 292
FaCT++ Description Logic Reasoner: System Description
pp. 292
Particle Filtering for Nonlinear BOLD Signal Analysis
pp. 292
Categorical and Kripke Semantics for Constructive S4 Modal Logic
pp. 293
Cross-View Action Recognition from Temporal Self-similarities
pp. 294
A Streaming Data Prediction Method Based on Evolving Bayesian Network
pp. 296
On Probabilistic Parallel Programs with Process Creation and Synchronisation
pp. 298
A Comparison of Market Approaches to Software Vulnerability Disclosure
pp. 298
All-But-Many Lossy Trapdoor Functions from Lattices and Applications
pp. 299
Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs
pp. 299
Use Fewer Instances of the Letter “i”: Toward Writing Style Anonymization
pp. 299
Verifying Progress in Timed Systems
pp. 300
A Methodology Based on MP Theory for Gene Expression Analysis
pp. 300
Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation
pp. 300
A Cross-Modality Neural Network Transform for Semi-automatic Medical Image Annotation
pp. 301
The Dependency Pair Framework: Combining Techniques for Automated Termination Proofs
pp. 302
Detecting Partially Occluded Objects with an Implicit Shape Model Random Field
pp. 303
Leveraging the Model-Driven Architecture for Service Choreography in Ubiquitous Systems
pp. 303
Replica-Aware Partitioning Design in Parallel Database Systems
pp. 303
Extending the Petri Box Calculus with Time
pp. 303
A Relativistic Opinion Mining Approach to Detect Factual or Opinionated News Sources
pp. 303
The Minimum Conflict-Free Row Split Problem Revisited
pp. 304
Qubit Neural Network and Its Efficiency
pp. 304
Calculating multidimensional symmetric functions using Jacobi's formula
pp. 305
On-the-fly analysis of systems with unbounded, lossy FIFO channels
pp. 306
On-Line Algorithms in Machine Learning
pp. 307
A New Shadow Removal Method Using Color-Lines
pp. 307
Usability Analysis of Secure Pairing Methods
pp. 307
An Economic Model of User Rating in an Online Recommender System
pp. 307
A Learning-Based Algorithm Selection Meta-Reasoner for the Real-Time MPE Problem
pp. 308
Securely Accessing Shared Resources with Concurrent Constraint Programming
pp. 308
Using Reservoir Computing and Trend Information for Short-Term Streamflow Forecasting
pp. 309
MarUja: Virtual Assistant Prototype for the Computing Service Catalogue of the University of Jaén
pp. 312
Recurrent Instance Segmentation
pp. 313
A Reliability-Based Approach for Influence Maximization Using the Evidence Theory
pp. 313
An Open-Ended Computational Evolution Strategy for Evolving Parsimonious Solutions to Human Genetics Problems
pp. 315
Instrumenting the City: Developing Methods for Observing and Understanding the Digital Cityscape
pp. 317
Tamper resistant software: an implementation
pp. 317
A Knowledge-Based Approach to Augment Applications with Interaction Traces
pp. 317
Interactive Programs in Dependent Type Theory
pp. 318
Rethinking Spatiotemporal Feature Learning: Speed-Accuracy Trade-offs in Video Classification
pp. 318
Multiple Incomplete Views Clustering via Weighted Nonnegative Matrix Factorization with $$L_{2,1}$$ Regularization
pp. 318
Applying Evolutionary Techniques to Debug Functional Programs
pp. 319
Object Recognition with Gradient-Based Learning
pp. 319
Better Key Sizes (and Attacks) for LWE-Based Encryption
pp. 319
Ellipse Detection for Visual Cyclists Analysis “In the Wild”
pp. 320
Improving Semantic Segmentation with Generalized Models of Local Context
pp. 320
The Local Nature of List Colorings for Graphs of High Girth
pp. 321
Design of a Neural Network for an Identification of a Robot Model with a Positive Definite Inertia Matrix
pp. 322
A Mimetic Finite-Difference Scheme for Convection of Multicomponent Fluid in a Porous Medium
pp. 322
Learning Continuous-Time Information Diffusion Model for Social Behavioral Data Analysis
pp. 323
Cautious Ordinal Classification by Binary Decomposition
pp. 323
Laconic and Precise Justifications in OWL
pp. 324
A Fast and Automatic Method to Correct Intensity Inhomogeneity in MR Brain Images
pp. 324
Trusting and Adopting E-Government Services in Developing Countries? Privacy Concerns and Practices in Rwanda
pp. 325
Event structures
pp. 327
A Novel and Unifying View of Trustworthiness in Cyberphysical Systems
pp. 328
Tools for Supporting Hybrid Learning Strategies in Open Source Software Environments
pp. 328
Session Types for Object-Oriented Languages
pp. 328
Modeling and In-Database Management of Relational, Data-Aware Processes
pp. 329
Untrusted Business Process Monitoring and Execution Using Blockchain
pp. 329
A Conversational Agent as Museum Guide – Design and Evaluation of a Real-World Application
pp. 330
Fuzzy Clustering of Short Time-Series and Unevenly Distributed Sampling Points
pp. 331
Learning Assumptions for Compositional Verification
pp. 331
Mapping Cyber-Collective Action among Female Muslim Bloggers for the Women to Drive Movement
pp. 331
A Feedback Control Approach to Mitigating Mistreatment in Distributed Caching Groups
pp. 331
Web Accessibility in Africa: A Study of Three African Domains
pp. 331
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services
pp. 332
A Novel Modeling and Recognition Method for Underwater Sound Based on HMT in Wavelet Domain
pp. 332
VirtualEMF: A Model Virtualization Tool
pp. 332
Visual Landmark Based 3D Road Course Estimation with Black Box Variational Inference
pp. 333
Organizing a Global Coordinate System from Local Information on an Ad Hoc Sensor Network
pp. 333
A Global Constraint for Closed Frequent Pattern Mining
pp. 336
Multivariate Dynamic Kernels for Financial Time Series Forecasting
pp. 337
Complete Parsimony Haplotype Inference Problem and Algorithms
pp. 340
Discriminative Analysis of Early Alzheimer’s Disease Based on Two Intrinsically Anti-correlated Networks with Resting-State fMRI
pp. 341
Boosting Lazy Abstraction for SystemC with Partial Order Reduction
pp. 342
A Process for Driving Process Improvement in VSEs
pp. 343
A First Step Toward Quantifying the Climate’s Information Production over the Last 68,000 Years
pp. 344
Supporting Framework Use via Automatically Extracted Concept-Implementation Templates
pp. 345
A Probabilistic Interpretation of Precision, Recall and F-Score, with Implication for Evaluation
pp. 346
Towards Aggregated Answers for Semistructured Data
pp. 347
Formally Testing Liveness by Means of Compression Rates
pp. 347
Structural Salience of Landmarks for Route Directions
pp. 348
Rawdata-Based Detection of the Optimal Reconstruction Phase in ECG-Gated Cardiac Image Reconstruction
pp. 350
Method for Polygonal Approximation through Dominant Points Deletion
pp. 351
Tetris is Hard, Even to Approximate
pp. 351
Neural Networks Compression for Language Modeling
pp. 352
Dynamically Balanced Online Random Forests for Interactive Scribble-Based Segmentation
pp. 353
Selecting the Optimal Sequence for Deformable Registration of Microscopy Image Sequences Using Two-Stage MST-based Clustering Algorithm
pp. 354
Nonlinear Control of Omnidirectional Mobile Platforms
pp. 354
Estimating Visual Comfort in Stereoscopic Displays Using Electroencephalography: A Proof-of-Concept
pp. 354
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum
pp. 354
LTSmin: Distributed and Symbolic Reachability
pp. 354
Do We Need a New Narratology for Interactive Digital Storytelling? A Workshop on Theory at ICIDS 2009
pp. 355
Diagnosing Performance Variations in HPC Applications Using Machine Learning
pp. 356
The Computer Scientist Nightmare
pp. 356
On the Reachability Analysis of Acyclic Networks of Pushdown Systems
pp. 357
A Smart Contract for Boardroom Voting with Maximum Voter Privacy
pp. 357
X-ray Image Contrast Enhancement Using the Second Generation Curvelet Transform
pp. 357
Classification Rule Mining with an Improved Ant Colony Algorithm
pp. 359
Recognition and Segmentation of 3-D Human Action Using HMM and Multi-class AdaBoost
pp. 359
Multiple Classifier Systems for the Classification of Audio-Visual Emotional States
pp. 359
Verified LISP Implementations on ARM, x86 and PowerPC
pp. 360
Video Mining with Frequent Itemset Configurations
pp. 361
Metamodel—Assisted Evolution Strategies
pp. 361
Mobile Terminals Haptic Interface: A Vibro-Tactile Finger Device for 3D Shape Rendering
pp. 362
JAK-STAT Signalling as Example for a Database-Supported Modular Modelling Concept
pp. 363
Mediated Population Protocols
pp. 365
Space-Time Roll-up and Drill-down into Geo-Trend Stream Cubes
pp. 365
Dynamic Regression for Partial Correlation and Causality Analysis of Functional Brain Networks
pp. 366
One Knowledge Graph to Rule Them All? Analyzing the Differences Between DBpedia, YAGO, Wikidata & co.
pp. 367
Localized Priors for the Precise Segmentation of Individual Vertebras from CT Volume Data
pp. 368
Mining Outliers with Ensemble of Heterogeneous Detectors on Random Subspaces
pp. 369
Reachability in Succinct and Parametric One-Counter Automata
pp. 369
Spatiotemporal Integration of Optical Flow Vectors for Micro-expression Detection
pp. 370
High-Throughput Glomeruli Analysis of $$\mu $$ CT Kidney Images Using Tree Priors and Scalable Sparse Computation
pp. 371
A Model of Spatial Reference Frames in Language
pp. 372
Using Machine Learning Techniques to Recover Prismatic Cirrus Ice Crystal Size from 2-Dimensional Light Scattering Patterns
pp. 372
Recovery of Liver Motion and Deformation Due to Respiration Using Laparoscopic Freehand 3D Ultrasound System
pp. 372
Bayesian Diffusion Tensor Estimation with Spatial Priors
pp. 373
Kernel-Regularized ICA for Computing Functional Topography from Resting-State fMRI
pp. 373
Adaptive Multimodal Fusion
pp. 373
Brain-Computer Interface Games: Towards a Framework
pp. 374
Spelling approximate repeated or common motifs using a suffix tree
pp. 376
An Application of NLP Rules to Spoken Document Segmentation Task
pp. 377
A Registration Method for 3D Point Clouds with Convolutional Neural Network
pp. 377
Metaheuristic Hybridized Applied to Solve the Capacity Vehicle Routing Problem
pp. 380
25 Years of CNNs: Can We Compare to Human Abstraction Capabilities?
pp. 383
Dual Structured Light 3D Using a 1D Sensor
pp. 384
On Designing a GeoViz-Aware Database System - Challenges and Opportunities
pp. 386
Photo and Video Quality Evaluation: Focusing on the Subject
pp. 387
Security Proofs for Signature Schemes
pp. 388
Unsupervised Acquisition of Axioms to Paraphrase Noun Compounds and Genitives
pp. 389
Jump Number of Two-Directional Orthogonal Ray Graphs
pp. 390
An evolved circuit, intrinsic in silicon, entwined with physics
pp. 391
Labeling Color 2D Digital Images in Theoretical Near Logarithmic Time
pp. 391
Using Social Media for Word-of-Mouth Marketing
pp. 392
Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations
pp. 393
A Survey of Single-Database Private Information Retrieval: Techniques and Applications
pp. 394
Program Metamorphosis
pp. 397
Streaming Algorithm for Euler Characteristic Curves of Multidimensional Images
pp. 399
Concurrent Kleene Algebra
pp. 399
MtNet: A Multi-Task Neural Network for Dynamic Malware Classification
pp. 401
Gamification of Education: A Review of Literature
pp. 401
Wayfinding Strategies in Behavior and Language: A Symmetric and Interdisciplinary Approach to Cognitive Processes
pp. 402
Name Creation vs. Replication in Petri Net Systems
pp. 402
Improving the Centered CUSUMS Statistic for Structural Break Detection in Time Series
pp. 405
An Integrated Solar Database (ISD) with Extended Spatiotemporal Querying Capabilities
pp. 405
A Functionality Perspective on Digital Library Interoperability
pp. 405
Advanced Parallel Robot with Extended RSUR Kinematic for a Circulating Working Principle
pp. 407
Action versus state based logics for transition systems
pp. 408
Parallelization of Pricing Path-Dependent Financial Instruments on Bounded Trinomial Lattices
pp. 414
Investigating ID3-Induced Rules from Low-Dimensional Data Cleaned by Complete Case Analysis
pp. 416
An Empirical Study on Evolution of API Documentation
pp. 416
Sentiment Analysis of Products’ Reviews Containing English and Hindi Texts
pp. 416
Improving Functional MRI Registration Using Whole-Brain Functional Correlation Tensors
pp. 417
Personal Desktop-Level Jet Fighter Simulator for Training or Entertainment
pp. 421
Pattern Matching in Lempel-Ziv Compressed Strings: Fast, Simple, and Deterministic
pp. 424
Construction of Büchi Automata for LTL Model Checking Verified in Isabelle/HOL
pp. 425
TabEL: Entity Linking in Web Tables
pp. 426
On Memory-Bound Functions for Fighting Spam
pp. 427
Generating Fake but Realistic Headlines Using Deep Neural Networks
pp. 428
Families of Graph Algorithms: SSSP Case Study
pp. 430
Differences on How People Organize and Think about Personal Information
pp. 433
Reconstructing Many Partitions Using Spectral Techniques
pp. 433
Multimodal Hyper-connectivity Networks for MCI Classification
pp. 434
Emergence of Cooperation in Adaptive Social Networks with Behavioral Diversity
pp. 435
Rate-Based Transition Systems for Stochastic Process Calculi
pp. 437
Integrating Information of Films by a Multi-source Combining Framework
pp. 438
CFD Analysis Incorporating the Influence of Wall Motion: Application to Intracranial Aneurysms
pp. 438
Preprocessing and Transmission for 3D Point Cloud Data
pp. 439
Improving Toponym Extraction and Disambiguation Using Feedback Loop
pp. 439
Agent coordination and control through logic theories
pp. 441
PRISM: A Tool for Automatic Verification of Probabilistic Systems
pp. 442
Affective, Behavioral, and Cognitive Aspects of Teen Perspectives on Personal Data in Social Media: A Model of Youth Data Literacy
pp. 445
How the Structuring of Domain Knowledge Helps Casual Process Modelers
pp. 445
Coverability Trees for Petri Nets with Unordered Data
pp. 446
Parallel Computing for Time-Consuming Multicriterial Optimization Problems
pp. 447
On the Complexity of Mixed Discriminants and Related Problems
pp. 447
Algorithms for ε-Approximations of Terrains
pp. 448
Higher-order logic programming
pp. 449
On approximation properties of the Independent set problem for degree 3 graphs
pp. 450
A Novel Approach to Network Security Situation Assessment Based on Attack Confidence
pp. 450
Dexterous Hand Motion Classification and Recognition Based on Multimodal Sensing
pp. 450
Knowledge Discovery Using Concept-Class Taxonomies
pp. 454
Universal quasi-prime algebraic domains
pp. 455
Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time
pp. 456
An Efficient Solution to the Millionaires’ Problem Based on Homomorphic Encryption
pp. 458
Zero-Knowledge Undeniable Signatures (extended abstract)
pp. 459
A Functional Approach to Parallelizing Data Mining Algorithms in Java
pp. 459
Air Quality Monitoring System and Benchmarking
pp. 460
Topology Aware Fully Convolutional Networks for Histology Gland Segmentation
pp. 460
Population-Shrinkage of Covariance to Estimate Better Brain Functional Connectivity
pp. 460
Exploratory Matrix Factorization for PET Image Analysis
pp. 461
Preserving the Fabric of Our Lives: A Survey of Web Preservation Initiatives
pp. 462
Hedging Public-Key Encryption in the Real World
pp. 462
Learning the Grammar of Distant Change in the World-Wide Web
pp. 462
Generation and Transformation of Compliant Process Collaboration Models to BPMN
pp. 463
Diagnostic Information for Control-Flow Analysis of Workflow Graphs (a.k.a. Free-Choice Workflow Nets)
pp. 466
Using Multiple Clause Constructors in Inductive Logic Programming for Semantic Parsing
pp. 467
Mining process models from workflow logs
pp. 468
A Goal-Based Modeling Approach to Develop Requirements of an Adaptive System with Environmental Uncertainty
pp. 469
A Formalisation of Smallfoot in HOL
pp. 469
HeMIS: Hetero-Modal Image Segmentation
pp. 471
A New Neural Model for Traffic Simulation
pp. 471
Taverna, Reloaded
pp. 474
Robust Human Action Recognition Using Dynamic Movement Features
pp. 476
Approximate Distance Labeling Schemes
pp. 476
Who Will Follow Whom? Exploiting Semantics for Link Prediction in Attention-Information Networks
pp. 479
Homotopy Type Theory in Lean
pp. 479
GameOfFlows: Process Instance Adaptation in Complex, Dynamic and Potentially Adversarial Domains
pp. 479
Part-Based Local Shape Models for Colon Polyp Detection
pp. 481
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family
pp. 482
Combining Edge, Region, and Shape Information to Segment the Left Ventricle in Cardiac MR Images
pp. 483
Application Areas of AIS: The Past, The Present and The Future
pp. 487
Creating the DISEQuA Corpus: A Test Set for Multilingual Question Answering
pp. 488
Multinomial Naive Bayes for Text Categorization Revisited
pp. 491
Mining the Web for Synonyms: PMI-IR versus LSA on TOEFL
pp. 491
Key Design Properties for Shipping Information Pipeline
pp. 494
Object, Scene and Actions: Combining Multiple Features for Human Action Recognition
pp. 494
PISA — A Platform and Programming Language Independent Interface for Search Algorithms
pp. 495
Supervised Discriminative EEG Brain Source Imaging with Graph Regularization
pp. 495
Complexity Bounds for Regular Games
pp. 498
Genetics of Anisotropy Asymmetry: Registration and Sample Size Effects
pp. 498
The Role of Self-efficacy in Cancer Information Avoidance
pp. 501
Recognition of Two-Dimensional Shapes Based on Dependence Vectors
pp. 502
Augmented Lagrangian Method, Dual Methods and Split Bregman Iteration for ROF Model
pp. 506
Non-negative Kernel Sparse Coding for the Analysis of Motion Data
pp. 507
Robot Orientation with Histograms on MSL
pp. 508
A Notion of Glue Expressiveness for Component-Based Systems
pp. 509
The Conflict-Driven Answer Set Solver clasp: Progress Report
pp. 509
Blobworld: A System for Region-Based Image Indexing and Retrieval
pp. 510
Recurrent Fusion Network for Image Captioning
pp. 511
Optimized Batched Linear Algebra for Modern Architectures
pp. 514
Approximate Reachability for Linear Systems
pp. 516
Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework
pp. 516
Feature Selection and Activity Recognition from Wearable Sensors
pp. 516
Valmet: A New Validation Tool for Assessing and Improving 3D Object Segmentation
pp. 517
Terrier Information Retrieval Platform
pp. 517
Scene Classification Via pLSA
pp. 517
Rehabilitation Training for Leg Based on EEG-EMG Fusion
pp. 520
4D Shape Registration for Dynamic Electrophysiological Cardiac Mapping
pp. 520
Bayesian Inference of Latent Causes in Gene Regulatory Dynamics
pp. 521
MOCHA: Modularity in model checking
pp. 521
Information Behavior and Filipino Values: An Exploratory Study
pp. 523
Risk-Based Models of Attacker Behavior in Cybersecurity
pp. 523
Dynamic Field Mapping and Motion Correction Using Interleaved Double Spin-Echo Diffusion MRI
pp. 525
The Beginning of a Beautiful Friendship? Intelligent Tutoring Systems and MOOCs
pp. 525
Policy Model for National and Academic Digital Collections
pp. 528
ReliefF-ML: An Extension of ReliefF Algorithm to Multi-label Learning
pp. 531
Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks
pp. 533
Multi-scale Improves Boundary Detection in Natural Images
pp. 534
Queuing Algorithms Performance against Buffer Size and Attack Intensities in DDOS Attacks
pp. 535
Enhancing Effectiveness of Outlier Detections for Low Density Patterns
pp. 540
Learn to Track: Deep Learning for Tractography
pp. 544
Work that Enables Care: Understanding Tasks, Automation, and the National Health Service
pp. 544
An Integrated Programming Environment for Teaching the Object-Oriented Programming Paradigm
pp. 547
Proactive Process Adaptation Using Deep Learning Ensembles
pp. 549
A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems
pp. 550
A Conceptual Model for Multidimensional Analysis of Documents
pp. 550
Analyzing the Effect of Query Class on Document Retrieval Performance
pp. 551
Almost 2-SAT Is Fixed-Parameter Tractable (Extended Abstract)
pp. 552
PET: An Interactive Software Testing Tool
pp. 553
Eye Movements and Pupil Size Reveal Deception in Computer Administered Questionnaires
pp. 554
Image Registration Guided by Particle Filter
pp. 557
A New Method for the Registration of Cardiac PET and MR Images Using Deformable Model Based Segmentation of the Main Thorax Structures
pp. 562
New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction
pp. 566
An Assistive Vision System for the Blind That Helps Find Lost Things
pp. 569
Accurate Prediction of Financial Distress of Companies with Machine Learning Algorithms
pp. 570
A Review of Upper and Lower Limb Rehabilitation Training Robot
pp. 572
7T-Guided Learning Framework for Improving the Segmentation of 3T MR Images
pp. 573
Defining and Detecting Emergence in Complex Networks
pp. 576
Securing the Future — An Information Flow Analysis of a Distributed OO Language
pp. 576
Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation
pp. 577
Ranking Outliers Using Symmetric Neighborhood Relationship
pp. 577
Tracklet Descriptors for Action Modeling and Video Analysis
pp. 582
Improving the Robustness in Extracting 3D Point Landmarks from 3D Medical Images Using Parametric Deformable Models
pp. 583
A Temporal Object-Oriented Data Warehouse Model
pp. 583
Kernel principal component analysis
pp. 587
Improving the Presentation of Argument Interpretations Based on User Trials
pp. 588
Specifying Web Service Compositions on the Basis of Natural Language Requests
pp. 589
Region Covariance: A Fast Descriptor for Detection and Classification
pp. 591
Joint Factorizational Topic Models for Cross-City Recommendation
pp. 591
Color-Based Object Tracking in Multi-camera Environments
pp. 592
Performative Metadata: Reliability Frameworks and Accounting Frameworks in Content Aggregation Data Models
pp. 596
Guiding Learners in Learning Management Systems through Recommendations
pp. 597
On Finding Dense Subgraphs
pp. 598
Massive Quasi-Clique Detection
pp. 602
A Sparse Bayesian Learning Algorithm for White Matter Parameter Estimation from Compressed Multi-shell Diffusion MRI
pp. 602
Robust Vessel Tree Modeling
pp. 604
Configurations with Few Crossings in Topological Graphs
pp. 605
Intention-Based Human Robot Collaboration
pp. 609
Automatic Table Detection in Document Images
pp. 610
Voice Code Verification Algorithm Using Competing Models for User Entrance Authentication
pp. 616
Revisiting Ackermann-Hardness for Lossy Counter Machines and Reset Petri Nets
pp. 617
Making a Faster Cryptanalytic Time-Memory Trade-Off
pp. 617
The Fast Bilateral Solver
pp. 617
Relational Differential Prediction
pp. 618
Introduction to: The Myths of Object-Orientation
pp. 620
Revisiting the Sequence Constraint
pp. 620
Registering Histological and MR Images of Prostate for Image-Based Cancer Detection
pp. 624
Regularization and Semi-supervised Learning on Large Graphs
pp. 625
On Supervised Human Activity Analysis for Structured Environments
pp. 625
Block Matrix Multiplication in a Distributed Computing Environment: Experiments with NetSolve
pp. 626
An Evolutionary Algorithm for Adaptive Online Services in Dynamic Environment
pp. 629
Filtering h int Images for the Detection of Microcalcifications
pp. 637
Analytic Expressions for Fiducial and Surface Target Registration Error
pp. 640
Subtype Cell Detection with an Accelerated Deep Convolution Neural Network
pp. 642
On the Road to an Abstract Architecture for Open Virtual Organizations
pp. 644
Automatic Nipple Detection Using Shape and Statistical Skin Color Information
pp. 647
Integration of Libnormaliz in CoCoALib and CoCoA 5
pp. 648
Zoom Better to See Clearer: Human and Object Parsing with Hierarchical Auto-Zoom Net
pp. 649
Imaging Biomarker Discovery for Lung Cancer Survival Prediction
pp. 652
Active Learning for Dialogue Act Labelling
pp. 653
On the Use of Implicit Shape Models for Recognition of Object Categories in 3D Data
pp. 656
Generating Applications from Object Role Models
pp. 660
Query Specific Fusion for Image Retrieval
pp. 660
PARAM: A Model Checker for Parametric Markov Models
pp. 665
Where Are iSchools Heading?
pp. 667
Automatic Quantification of Fluorescence from Clustered Targets in Microscope Images
pp. 667
Malware Behavior Modeling with Colored Petri Nets
pp. 674
Product Theorems Via Semidefinite Programming
pp. 675
Speeding Up Logistic Model Tree Induction
pp. 678
Physics-Based Elastic Image Registration Using Splines and Including Landmark Localization Uncertainties
pp. 681
Embedding Memoization to the Semantic Tree Search for Deciding QBFs
pp. 681
Monadic Second-Order Logics with Cardinalities
pp. 685
A Hierarchical Convolutional Neural Network for Mitosis Detection in Phase-Contrast Microscopy Images
pp. 687
Video Retrieval Based on Words-of-Interest Selection
pp. 690
VC-Dimension and Shortest Path Algorithms
pp. 692
A Relaxed K-SVD Algorithm for Spontaneous Micro-Expression Recognition
pp. 695
Interactive Simulation of Embolization Coils: Modeling and Experimental Validation
pp. 696
Kernel Codebooks for Scene Categorization
pp. 697
Using Google Analytics to Evaluate the Usability of E-Commerce Sites
pp. 698
Approximative Methods for Monotone Systems of Min-Max-Polynomial Equations
pp. 699
Managing Process Model Collections with AProMoRe
pp. 706
Gait Analysis for Human Identification
pp. 706
Set Bounds and (Split) Set Domain Propagation Using ROBDDs
pp. 713
Developing Library Services for International Students in China’s Universities: What Does the Literature Tell Us?
pp. 717
Fast Guided Global Interpolation for Depth and Motion
pp. 718
User Friendly Decision Support Techniques in a Case-Based Reasoning System
pp. 721
Access Control Model for AWS Internet of Things
pp. 722
Finding Knees in Multi-objective Optimization
pp. 726
Intensity Gradient Based Registration and Fusion of Multi-modal Images
pp. 728
Towards Image-Guided Pancreas and Biliary Endoscopy: Automatic Multi-organ Segmentation on Abdominal CT with Dense Dilated Networks
pp. 734
Gait Shape Estimation for Identification
pp. 735
Distributed Formation Control of Autonomous Underwater Vehicles Based on Flocking and Consensus Algorithms
pp. 735
A Generative Approach for Image-Based Modeling of Tumor Growth
pp. 740
Kinematic Nonlinear Control of Aerial Mobile Manipulators
pp. 741
The Complexity of Counting Functions with Easy Decision Version
pp. 742
Natural Landmark Based Navigation
pp. 745
D-Width: A More Natural Measure for Directed Tree Width
pp. 747
Improving Surgical Training Phantoms by Hyperrealism: Deep Unpaired Image-to-Image Translation from Real Surgeries
pp. 748
Alphabet-Independent Compressed Text Indexing
pp. 748
Explicit Non-adaptive Combinatorial Group Testing Schemes
pp. 750
Multi-view Inverse Rendering Under Arbitrary Illumination and Albedo
pp. 751
Towards QoS-Awareness of Context-Aware Mobile Applications and Services
pp. 751
Global Grammar Constraints
pp. 757
Multi-dimensional Function Approximation and Regression Estimation
pp. 765
Control of a Magnet-Driven Nano Positioning Stage with Long Stroke Based on Disturbance Observer
pp. 769
Multimeme Algorithms for Protein Structure Prediction
pp. 770
Shape Preserving Filament Enhancement Filtering
pp. 771
Groupwise Non-rigid Registration Using Polyharmonic Clamped-Plate Splines
pp. 773
Impossibility of a Quantum Speed-Up with a Faulty Oracle
pp. 773
Development of a $$\upmu $$ CT-based Patient-Specific Model of the Electrically Stimulated Cochlea
pp. 774
Replicated Ambient Petri Nets
pp. 778
Pattern Repulsion Revisited
pp. 792
A Convex Formulation of Continuous Multi-label Problems
pp. 803
Evaluation of Evolutionary Algorithms for Multi-objective Train Schedule Optimization
pp. 805
Combining Face and Iris Biometrics for Identity Verification
pp. 806
A Multilingual SVM-Based Question Classification System
pp. 809
Where Should Saliency Models Look Next?
pp. 811
Clustering Gene Expression Profiles with Memetic Algorithms
pp. 819
Tri-Dexel Model Based Geometric Simulation of Multi-axis Additive Manufacturing
pp. 822
Multi-scale Patch Based Collaborative Representation for Face Recognition with Margin Distribution Optimization
pp. 823
Active Surface Approach for Extraction of the Human Cerebral Cortex from MRI
pp. 827
Towards an Optimal CNF Encoding of Boolean Cardinality Constraints
pp. 835
Deep Virtual Stereo Odometry: Leveraging Deep Depth Prediction for Monocular Direct Sparse Odometry
pp. 861
Solving Rotated Multi-objective Optimization Problems Using Differential Evolution
pp. 869
Feature-Based Diversity Optimization for Problem Instance Classification
pp. 873
Sub-structural Niching in Non-stationary Environments
pp. 875
Scalable Metric Learning via Weighted Approximate Rank Component Analysis
pp. 904
Segmentation of Neck Lymph Nodes in CT Datasets with Stable 3D Mass-Spring Models
pp. 910
A Negotiation Agent
pp. 925
Using UN/CEFACT’S Modelling Methodology (UMM) in e-Health Projects
pp. 937
MaSiMe: A Customized Similarity Measure and Its Application for Tag Cloud Refactoring
pp. 940
Calibration Method for Determining the Physical Location of the Ultrasound Image Plane
pp. 948
Flexible Camera Setup for Visual Based Registration on 2D Interaction Surface with Undefined Geometry Using Neural Network
pp. 948
Non-linear Local Registration of Functional Data
pp. 948
Detecting Inconsistencies in the Gene Ontology Using Ontology Databases with Not-gadgets
pp. 991
A Bayesian Metric for Evaluating Machine Learning Algorithms
pp. 999
A Verified Compiler from Isabelle/HOL to CakeML
pp. 1017
A Toolbox for Learning from Relational Data with Propositional and Multi-instance Learners
pp. 1022
Phase-Based User-Steered Image Segmentation
pp. 1030
A Synergy of Modelling for Constraint Problems
pp. 1040
Robust Segmentation of Medical Images Using Geometric Deformable Models and a Dynamic Speed Function
pp. 1055
Discovering Interesting Association Rules by Clustering
pp. 1075
Image Guided Radiotherapy of the Prostate
pp. 1088
Analysis of the (1 + 1) EA for a Noisy OneMax
pp. 1114
Optimization in Prostate Cancer Detection
pp. 1137
An Architecture for Simulating Needle-Based Surgical Procedures
pp. 1157
A Multimodal Navigation System for Interventional MRI
pp. 1166
Repeatability and Accuracy of Ankle Centre Location Estimates Using a Biaxial Joint Model
pp. 1174
Automatic Detection of Large Misregistrations of Multimodality Medical Images
pp. 1201
Anisotropic Volume Rendering Using Intensity Interpolation
pp. 1201
Modeling Dynamic Rules in ORM
pp. 1215
A Method for µCT Based Assessment of Root Canal Instrumentation in Endodontics Research
pp. 1235
Spherical Navigator Echoes for Full 3-D Rigid Body Motion Measurement in MRI
pp. 1237
Phase Unwrapping for Magnetic Resonance Thermometry
pp. 1250
Development of a New Image-Guided Prostate Biopsy System
pp. 1262
The T-Detectors Maturation Algorithm Based on Genetic Algorithm
pp. 1263
Real-Time Simulation of Minimally-Invasive Surgery with Cutting Based on Boundary Element Methods
pp. 1279
Two-Step Registration of Subacute to Hyperacute Stroke MRIs
pp. 1281
The Effect of Organ Motion and Image Artifacts on Monomodal Volume Registration
pp. 1293
The Importance of Partial Voluming in Multi-dimensional Medical Image Segmentation
pp. 1295
Learning a Procedure That Can Solve Hard Bin-Packing Problems: A New GA-Based Approach to Hyper-heuristics
pp. 1316
Advances in Active Constraints and Their Application to Minimally Invasive Surgery
pp. 1343
Bag-of-Particles Model for Simulating Tissue, Organs, and Flow
pp. 1356
Mutual Scale
pp. 1379
Implicit Snakes: Active Constrained Implicit Models
pp. 1391
Classification of Breast Tumors on Digital Mammograms Using Laws’ Texture Features
pp. 1401
Interactive Visualisation of MRI Vector and Tensor Fields
pp. 1430
A Modular Robotic System for Ultrasound Image Acquisition
pp. 1435
Optimal Port Placement in Robot-Assisted Coronary Artery Bypass Grafting
Similar content
3,813
Fast Decryption Algorithm for Paillier Homomorphic Cryptosystem
Authors:
Taiwo Ogunseyi
,
Tang Bo
Baptista-type chaotic cryptosystems: Problems and countermeasures
Authors:
,
,
…
Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems
Authors:
Roberto M. Avanzi
,
Simon Hoerder
,
Dan Page
…
See all similar
Cited by
57
Template Attacks
Authors:
Suresh T. Chari
,
Josyula Rao
,
Pankaj Rohatgi
ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart Cards
Authors:
Jean-Jacques Quisquater
,
David Samyde
Using Second-Order Power Analysis to Attack DPA Resistant Software
Authors:
Thomas S. Messerges
See all cited by