Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
49
views
0
references
Top references
cited by
53
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,260
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Foundations and Practice of Security
HOL Light: A tutorial introduction
other
Author(s):
John Harrison
Publication date
(Online):
June 25 2005
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
An Introduction to SAXS
Author and book information
Book Chapter
Publication date (Print):
1996
Publication date (Online):
June 25 2005
Pages
: 265-269
DOI:
10.1007/BFb0031814
SO-VID:
33fc67ae-aaec-41bf-8052-7aba5c3f0d84
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Image-Based Low-Cost Systems for Automatic 3D Recording and Modelling of Archaeological Finds and Objects
pp. 1
The Quantum Inspired Modelling of Changing Attitudes and Self-organising Societies
pp. 1
Fully Abstract Characterization of Probabilistic May Testing
pp. 1
0. Introduction
pp. 1
Leveraging Multiple Mechanisms for Information Propagation
pp. 1
On the Malleability of Bitcoin Transactions
pp. 1
Data Clustering: A User’s Dilemma
pp. 1
Blow-Ups, Win/Win’s, and Crown Rules: Some New Directions in FPT
pp. 1
Second-Order Polynomial Models for Background Subtraction
pp. 1
Motion Coordination for Multi-agent Networks
pp. 1
Query Expansion in Folksonomies
pp. 1
Invariants and Well-Foundedness in Program Algebra
pp. 1
Reasoning as Search: Supporting Reasoning with Distributed Memory
pp. 1
The history of steganography
pp. 1
Let’s Get Physical: Models and Methods for Real-World Security Protocols
pp. 1
Learning with Configurable Operators and RL-Based Heuristics
pp. 1
Final universes of processes
pp. 1
Feature Selection Based on Iterative Canonical Correlation Analysis for Automatic Diagnosis of Parkinson’s Disease
pp. 1
Interacting with Context
pp. 1
Subspace Codes
pp. 1
A Gauge-Invariant Reversible Cellular Automaton
pp. 1
Correlation Clustering with Partial Information
pp. 1
Recent developments in practical examination timetabling
pp. 1
On the Revival of Dynamic Languages
pp. 1
Refining specifications to logic programs
pp. 3
Touchscreen Poetry: Analyzing Gestural Digital Poems
pp. 3
Deciphering Text from Touchscreen Key Taps
pp. 3
Evaluating Quality of Service Traffic Classes on the Megafly Network
pp. 3
Constant-Factor Approximation for Minimum-Weight (Connected) Dominating Sets in Unit Disk Graphs
pp. 3
Adversarial Image Synthesis for Unpaired Multi-modal Cardiac Data
pp. 3
Boosting Authenticated Encryption Robustness with Minimal Modifications
pp. 3
Exploring the Potential of User Modeling Based on Mind Maps
pp. 3
Quantum Homomorphic Encryption for Polynomial-Sized Circuits
pp. 3
Plan Indexing for State-Based Plans
pp. 3
GO-WAR: A Tool for Mining Weighted Association Rules from Gene Ontology Annotations
pp. 5
Active Learning of Extended Finite State Machines
pp. 5
Querying Trust in RDF Data with tSPARQL
pp. 5
1 Homing and Synchronizing Sequences
pp. 5
Involving Users in the Design of ICT Aimed to Improve Education, Work, and Leisure for Users with Intellectual Disabilities
pp. 7
Axiomatizing Weak Ready Simulation Semantics over BCCSP
pp. 7
Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best
pp. 9
Identifying Relationships in Functional and Structural Connectome Data Using a Hypergraph Learning Method
pp. 9
Modelling the Effects of Operating Conditions on Motor Power Consumption in Single Screw Extrusion
pp. 10
What Automata Can Provide a Medium for Life?
pp. 11
TrajSpark: A Scalable and Efficient In-Memory Management System for Big Trajectory Data
pp. 13
Philosophical Conceptions of Information
pp. 13
Deformable Image Registration of Follow-Up Breast Magnetic Resonance Images
pp. 13
Local Approximation Algorithms for the Uncapacitated Metric Facility Location Problem in Power-Aware Sensor Networks
pp. 13
Pairing-Based Cryptography at High Security Levels
pp. 13
Self-organizing data structures
pp. 13
Generic programming
pp. 14
Many-Objective Optimization: An Engineering Design Perspective
pp. 14
Cognitive maps, cognitive collages, and spatial mental models
pp. 15
A Macroscopic Privacy Model for Heterogeneous Robot Swarms
pp. 15
Face Authentication Using One-Class Support Vector Machines
pp. 16
SVC2004: First International Signature Verification Competition
pp. 16
Cross-Cultural Study on Facial Regions as Cues to Recognize Emotions of Virtual Agents
pp. 16
Building General Purpose Security Services on Trusted Computing
pp. 17
The Knowledge Model of Protégé-2000: Combining Interoperability and Flexibility
pp. 17
DroidSense: A Mobile Tool to Analyze Software Development Processes by Measuring Team Proximity
pp. 18
Unsupervised Learning of Models for Recognition
pp. 18
Influence and Passivity in Social Media
pp. 18
A Formal Specification for Organizational Adaptation
pp. 18
k2-Trees for Compact Web Graph Representation
pp. 18
Phrase-Based Statistical Machine Translation
pp. 19
Robust Recognition of Reading Activity in Transit Using Wearable Electrooculography
pp. 19
Rational control of reasoning in artificial intelligence
pp. 19
2. Synchronization
pp. 19
Treewidth: Algorithmic techniques and results
pp. 19
VLog: A Rule Engine for Knowledge Graphs
pp. 22
Predicting Online Extremism, Content Adopters, and Interaction Reciprocity
pp. 22
Query Evaluation via Tree-Decompositions
pp. 23
On Symmetric and Choiceless Computation
pp. 24
When You Can’t Read It, Listen to It! An Audio-Visual Interface for Book Reading
pp. 24
Using Evidences Based on Natural Language to Drive the Process of Fusing Multimodal Sources
pp. 24
Young-Elderly Travellers as Potential Users and Actual Users of Internet with Mobile Devices During Trips
pp. 25
Matching Ontologies in Open Networked Systems: Techniques and Applications
pp. 25
Interactive Conversion of Web Tables
pp. 27
A New Public-Key Cryptosystem
pp. 27
Distortion-Free Data Embedding for Images
pp. 28
The Marketcast Method for Aggregating Prediction Market Forecasts
pp. 29
Dataset Issues in Object Recognition
pp. 29
Boolean Networks: Beyond Generalized Asynchronicity
pp. 30
Modelling of Cancer Patient Records: A Structured Approach to Data Mining and Visual Analytics
pp. 31
Mutual Development: A Case Study in Customer-Initiated Software Product Development
pp. 31
Novel Local Shape-Adaptive Gyrification Index with Application to Brain Development
pp. 32
A Middleware Enforcing Location Privacy in Mobile Platform
pp. 32
Proving Termination of Integer Term Rewriting
pp. 32
Neural Networks Regression Inductive Conformal Predictor and Its Application to Total Electron Content Prediction
pp. 32
Beeping a Maximal Independent Set
pp. 33
Generation of efficient interprocedural analyzers with PAG
pp. 33
3. A case study in synchronization and proof techniques
pp. 33
Event2vec: Learning Representations of Events on Temporal Sequences
pp. 33
Towards a Common API for Structured Peer-to-Peer Overlays
pp. 34
Moderately exponential bound for graph isomorphism
pp. 34
Exact Algorithms for Set Multicover and Multiset Multicover Problems
pp. 34
Minimal weight k-SR representations
pp. 34
A Timely Endeavor: Theoretical, Behavioral, Bioimaging, and Clinical Perspectives on Time Perception
pp. 34
A New Algorithm for Long Integer Cube Computation with Some Insight into Higher Powers
pp. 36
Dependent Types and Fibred Computational Effects
pp. 36
30 Years of Modal Transition Systems: Survey of Extensions and Analysis
pp. 36
An Empirical Study on the Adoption of Online Household e-waste Collection Services in China
pp. 37
Approximating the Average Stretch Factor of Geometric Graphs
pp. 37
A QoS-Aware Web Service Composition Approach Based on Genetic Programming and Graph Databases
pp. 37
Correlation-Weighted Sparse Group Representation for Brain Network Construction in MCI Classification
pp. 38
Deep Learning for Emotion Recognition in Faces
pp. 39
Submodular Secretary Problem and Extensions
pp. 39
A Unified Approach for Measuring Precision and Generalization Based on Anti-alignments
pp. 39
Scalar Aggregation in FD-Inconsistent Databases
pp. 40
Orthogonal Direct Sum Masking
pp. 40
Active Trust Management for Autonomous Adaptive Survivable Systems (ATM’s for AAss’s)
pp. 40
Relational Presheaves as Labelled Transition Systems
pp. 41
Algebraic and Logical Emulations of Quantum Circuits
pp. 41
Interpretability in Intelligent Systems – A New Concept?
pp. 42
Fibrational Induction Meets Effects
pp. 42
Knowledge Discovery in Multi-label Phenotype Data
pp. 42
Cloud Computing and Big Data Analytics: What Is New from Databases Perspective?
pp. 43
On Practical Aspects of PCFG Password Cracking
pp. 43
On the Link between Gaussian Homotopy Continuation and Convex Envelopes
pp. 44
Segmentation and Recognition Using Structure from Motion Point Clouds
pp. 44
A Bayesian Algorithm for Reconstructing Two-Component Signaling Networks
pp. 45
Multimodal Learning Hub: A Tool for Capturing Customizable Multimodal Learning Experiences
pp. 45
Combinatorial Structure of Finite Fields with Two Dimensional Modulo Metrics⋆
pp. 46
Co-evolutionary constraint satisfaction
pp. 46
Scheduling, timetabling and rostering — A special relationship?
pp. 47
On Dataset Complexity for Case Base Maintenance
pp. 47
#Depression: Findings from a Literature Review of 10 Years of Social Media and Depression Research
pp. 48
On the Availability of Non-strict Quorum Systems
pp. 48
Perceptions of Teachers and Guardians on the Electronic Record in the School-Family Communication
pp. 48
On Berge Multiplication for Monotone Boolean Dualization
pp. 48
Predicting Personality Using Novel Mobile Phone-Based Metrics
pp. 49
Unsupervised Accent Modeling for Language Identification
pp. 49
On Optimal Timed Strategies
pp. 49
A Universal Client-Based Identity Management Tool
pp. 49
Patient Position Detection for SAR Optimization in Magnetic Resonance Imaging
pp. 50
Metric Space Searching Based on Random Bisectors and Binary Fingerprints
pp. 51
On Finitary Functors and Their Presentations
pp. 51
The Stixel World - A Compact Medium Level Representation of the 3D-World
pp. 51
Rapid Learning for Binary Programs
pp. 51
Adaptive Navigation Support and Adaptive Collaboration Support in WebDL
pp. 51
When Birds Die: Making Population Protocols Fault-Tolerant
pp. 52
ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector
pp. 52
On the Use of Gröbner Bases for Computing the Structure of Finite Abelian Groups
pp. 52
The Cog Project: Building a Humanoid Robot
pp. 53
ASTRAL-III: Increased Scalability and Impacts of Contracting Low Support Branches
pp. 53
Ant Colony Optimisation-Based Classification Using Two-Dimensional Polygons
pp. 53
Bridging Computational Features Toward Multiple Semantic Features with Multi-task Regression: A Study of CT Pulmonary Nodules
pp. 53
Machine learning for adaptive user interfaces
pp. 54
Human Robot Interaction and Fiction: A Contradiction
pp. 54
Single Sign-On Using Trusted Platforms
pp. 54
SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key
pp. 55
Integration of Unsupervised and Supervised Criteria for Deep Neural Networks Training
pp. 55
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics
pp. 56
Moral Values from Simple Game Play
pp. 57
Fast probabilistic algorithms
pp. 57
IR-n System, a Passage Retrieval Architecture
pp. 59
Constrained Connectivity and Transition Regions
pp. 59
Partial Order Methods for Statistical Model Checking and Simulation
pp. 60
External User Inclusion in Public e-Service Development: Exploring the Current Practice in Sweden
pp. 60
Reasoning about Non-terminating Loops Using Deadline Commands
pp. 60
A High Resolution Land Use/Cover Modelling Framework for Europe: Introducing the EU-ClueScanner100 Model
pp. 61
The Monoids of Order Eight and Nine
pp. 61
ADRES: An Architecture with Tightly Coupled VLIW Processor and Coarse-Grained Reconfigurable Matrix
pp. 61
Robust Cancer Treatment Outcome Prediction Dealing with Small-Sized and Imbalanced Data from FDG-PET Images
pp. 61
EnvSOM: A SOM Algorithm Conditioned on the Environment for Clustering and Visualization
pp. 61
Light Robustness
pp. 62
Logic Training through Algorithmic Problem Solving
pp. 62
Kleptography: Using Cryptography Against Cryptography
pp. 62
Efficient State-Based CRDTs by Delta-Mutation
pp. 62
Lower Bounds on Matrix Rigidity Via a Quantum Argument
pp. 63
Decidability Results for Restricted Models of Petri Nets with Name Creation and Replication
pp. 63
Return to Activities of Daily Life: Physiotherapy Rehabilitation with Serious Game
pp. 64
Bio-Discretization: Biometrics Authentication Featuring Face Data and Tokenised Random Number
pp. 64
Inter-organizational Integration in the AEC/FM Industry
pp. 64
TweetNaCl: A Crypto Library in 100 Tweets
pp. 65
5. Syntax and semantics of CCS
pp. 65
Completeness Theorems for Bi-Kleene Algebras and Series-Parallel Rational Pomset Languages
pp. 65
Elements of Good Route Directions in Familiar and Unfamiliar Environments
pp. 65
Key-Insulated Public Key Cryptosystems
pp. 65
An Agent-Based Model for Simultaneous Phone and SMS Traffic over Time
pp. 66
Cooperative Multi-agent Control Using Deep Reinforcement Learning
pp. 66
Element-Oriented Method of Assessing Landscape of Sightseeing Spots by Using Social Images
pp. 67
Using the TPTP Language for Writing Derivations and Finite Interpretations
pp. 67
Learning with Rejection
pp. 68
On Testing Expansion in Bounded-Degree Graphs
pp. 69
Training Hierarchical Feed-Forward Visual Recognition Models Using Transfer Learning from Pseudo-Tasks
pp. 69
RBAC-MAS and SODA: Experimenting RBAC in AOSE
pp. 69
A Closer Look at Database Replication Middleware Architectures for Enterprise Applications
pp. 70
Structured Sparse Kernel Learning for Imaging Genetics Based Alzheimer’s Disease Diagnosis
pp. 70
SAT-Based Model Checking without Unrolling
pp. 70
Accelerated Analysis of Biological Parameters Space Using GPUs
pp. 71
Structural Operational Semantics for Continuous State Probabilistic Processes
pp. 71
Prehension of an Anthropomorphic Metamorphic Robotic Hand Based on Opposition Space Model
pp. 71
What Does Classifying More Than 10,000 Image Categories Tell Us?
pp. 72
DBR: Depth-Based Routing for Underwater Sensor Networks
pp. 72
Cell-Probe Proofs and Nondeterministic Cell-Probe Complexity
pp. 72
Breast Imaging with 3D Ultrasound Computer Tomography: Results of a First In-vivo Study in Comparison to MRI Images
pp. 73
Covert channels—A context-based view
pp. 73
Improved Randomized Algorithms for 3-SAT
pp. 73
An ACO Approach to Planning
pp. 73
Inferring High-Level Behavior from Low-Level Sensors
pp. 73
Speed Records for NTRU
pp. 74
Cochlea Modelling: Clinical Challenges and Tubular Extraction
pp. 74
A Comparison of the Historical Entries in Wikipedia and Baidu Baike
pp. 75
Reconstructing Online Behaviors by Effort Minimization
pp. 75
Longitudinal Modeling of Multi-modal Image Contrast Reveals Patterns of Early Brain Growth
pp. 76
Data Weighting for Principal Component Noise Reduction in Contrast Enhanced Ultrasound
pp. 77
Automatic Construction of 3D Statistical Deformation Models Using Non-rigid Registration
pp. 78
Modelling and Evaluation of CCN-Caching Trees
pp. 79
Automatic Reference Selection for Quantitative EEG Component Interpretation: Cross Spectrum Analysis Based on Bipolar EEG
pp. 80
A Data Mining Library for miRNA Annotation and Analysis
pp. 80
The Effects of Regularization on Learning Facial Expressions with Convolutional Neural Networks
pp. 80
Conquering the Needle-in-a-Haystack: How Correlated Input Variables Beneficially Alter the Fitness Landscape for Neural Networks
pp. 81
A Systematic Review of Impediments Blocking Internet of Things Adoption by Governments
pp. 81
Attention-Based Two-Phase Model for Video Action Detection
pp. 81
Sentiments in Wikipedia Articles for Deletion Discussions
pp. 81
Loop Summarization and Termination Analysis
pp. 82
Finding the Maximal Pose Error in Robotic Mechanical Systems Using Constraint Programming
pp. 83
A structural co-induction theorem
pp. 84
Prediction of Brain Network Age and Factors of Delayed Maturation in Very Preterm Infants
pp. 84
Multi-directional Characterization for Pollen Tubes Based on a Nanorobotic Manipulation System
pp. 84
OLD resolution with tabulation
pp. 84
Shape Filtering for False Positive Reduction at Computed Tomography Colonography
pp. 84
On Temporally Connected Graphs of Small Cost
pp. 84
Greedy Approximation Algorithms for Finding Dense Components in a Graph
pp. 85
Secure Certificateless Proxy Re-encryption Without Pairing
pp. 85
Towards an Ethical Robot: Internal Models, Consequences and Ethical Action Selection
pp. 85
Improving the Development of Data Warehouses by Enriching Dimension Hierarchies with WordNet
pp. 86
The RC5 encryption algorithm
pp. 86
A Graph-Oriented Model for Articulation of Ontology Interdependencies
pp. 86
A Robust Optimization Approach to Supply Chain Management
pp. 86
Combining Bayesian Networks, k Nearest Neighbours Algorithm and Attribute Selection for Gene Expression Data Analysis
pp. 88
Security Bounds for the Design of Code-Based Cryptosystems
pp. 88
Querying Wikidata: Comparing SPARQL, Relational and Graph Databases
pp. 88
Secure Obfuscation of Authoring Style
pp. 88
Stability-Weighted Matrix Completion of Incomplete Multi-modal Data for Disease Diagnosis
pp. 88
FEMaLeCoP: Fairly Efficient Machine Learning Connection Prover
pp. 89
Compactness and Continuity, Constructively Revisited
pp. 90
Transformation: The Missing Link of MDA
pp. 90
On Finite Monoids of Cellular Automata
pp. 90
A Semantics for Every GSPN
pp. 90
A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement
pp. 90
Statistical Instance-Based Ensemble Pruning for Multi-class Problems
pp. 91
Gold Mining in a River of Internet Content Traffic
pp. 92
A Methodology to Specify Multiagent Systems
pp. 92
Optimal Use of Expert Knowledge in Ant Colony Optimization for the Analysis of Epistasis in Human Disease
pp. 92
A Regularization Scheme for Diffusion Tensor Magnetic Resonance Images
pp. 93
Analyzing Entities and Topics in News Articles Using Statistical Topic Models
pp. 95
Deep Projective 3D Semantic Segmentation
pp. 97
Architectural Modeling and Analysis for Safety Engineering
pp. 97
Decoding of Interleaved Reed Solomon Codes over Noisy Data
pp. 97
Dismantling MIFARE Classic
pp. 99
Cryptography from Learning Parity with Noise
pp. 99
Unsupervised Feature Learning for Human Activity Recognition Using Smartphone Sensors
pp. 99
Passive Testing with Asynchronous Communications
pp. 101
Generalized Rabin(1) Synthesis with Applications to Robust System Synthesis
pp. 101
A Fast Method of Generating Pharmacokinetic Maps from Dynamic Contrast-Enhanced Images of the Breast
pp. 103
Three metric domains of processes for bisimulation
pp. 103
Distractor-Aware Siamese Networks for Visual Object Tracking
pp. 104
Lazy Annotation for Program Testing and Verification
pp. 105
Time Durations of Phonemes in Polish Language for Speech and Speaker Recognition
pp. 106
Role-Based Access Control for Model-Driven Web Applications
pp. 106
Following the Blind Seer – Creating Better Performance Models Using Less Information
pp. 107
Context-Aware User Authentication – Supporting Proximity-Based Login in Pervasive Computing
pp. 107
An Algebraic Characterisation of Complexity for Valued Constraint
pp. 108
Laws of software evolution revisited
pp. 109
Trace Semantics via Determinization
pp. 110
Quotienting the Delay Monad by Weak Bisimilarity
pp. 110
Safe Parallel Programming with Session Java
pp. 111
Auto-alignment of Knee MR Scout Scans through Redundant, Adaptive and Hierarchical Anatomy Detection
pp. 111
8. Some proofs about data structures
pp. 111
Home Network or Access Link? Locating Last-Mile Downstream Throughput Bottlenecks
pp. 112
Computer Assisted Identification, Segmentation and Quantification of Synapses in the Cerebral Cortex
pp. 112
AutoPart: Parameter-Free Graph Partitioning and Outlier Detection
pp. 112
Lagrangian Relaxation
pp. 112
Word Sense Disambiguation: A Graph-Based Approach Using N-Cliques Partitioning Technique
pp. 113
Specification and Verification of Graph-Based Model Transformation Properties
pp. 113
Keyword Spotting with Convolutional Deep Belief Networks and Dynamic Time Warping
pp. 114
The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography
pp. 115
Modeling Adversaries in a Logic for Security Protocol Analysis
pp. 115
Affine Sessions
pp. 115
Security Requirements for the Deployment of Services Across Tactical SOA
pp. 115
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults
pp. 115
Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks
pp. 115
The Impact of Reader to Tag Collision on RFID Tag Identification
pp. 116
Efficient Compression on Real World Directed Graphs
pp. 116
On discerning words by automata
pp. 117
Engineering Route Planning Algorithms
pp. 120
Mass Preserving Mappings and Image Registration
pp. 121
Motion-Coherent Affinities for Hypergraph Based Motion Segmentation
pp. 121
Computational Advantages of Deep Prototype-Based Learning
pp. 121
Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment
pp. 121
Rainbow Domination and Related Problems on Some Classes of Perfect Graphs
pp. 122
Directly Addressable Variable-Length Codes
pp. 124
Testing for Distinguishing Repair Candidates in Spreadsheets – the Mussco Approach
pp. 125
Building Oblivious Transfer on Channel Delays
pp. 125
Call Center Stress Recognition with Person-Specific Models
pp. 126
SFMap: Inferring Services over Encrypted Web Flows Using Dynamical Domain Name Graphs
pp. 127
Automatic Landmark Estimation for Adolescent Idiopathic Scoliosis Assessment Using BoostNet
pp. 128
Deep Convolutional Neural Networks for Classifying Body Constitution
pp. 128
Route Planning and Map Inference with Global Positioning Traces
pp. 128
A Prototype Implementation of OpenMP Task Dependency Support
pp. 128
A Review of Quality Dimensions in e-Government Services
pp. 129
javaPlex: A Research Software Package for Persistent (Co)Homology
pp. 129
Graph Treewidth and Geometric Thickness Parameters
pp. 129
Implementing Gentry’s Fully-Homomorphic Encryption Scheme
pp. 129
Pattern Structures and Their Projections
pp. 129
MiRaGE: Inference of Gene Expression Regulation via MicroRNA Transfection II
pp. 130
Modeling Malware-driven Honeypots
pp. 131
A Hierarchy of Polynomial-Time Computable Simulations for Automata
pp. 132
Comprehending Ringads
pp. 132
Simulation Subsumption in Ramsey-Based Büchi Automata Universality and Inclusion Testing
pp. 132
Ephemeral Communication and Communication Places
pp. 132
On the random walk method for protocol testing
pp. 133
Closing Schemas in Object-Relational Databases
pp. 133
Differences between the EISPACK subroutines and the handbook Algol procedures
pp. 133
Networks Become Navigable as Nodes Move and Forget
pp. 133
Simultaneous Localization and Mapping for Event-Based Vision Systems
pp. 133
Time-Triggered Conversion of Guards for Reachability Analysis of Hybrid Automata
pp. 134
Encoding-Decoding Transitional Systems for Classes of P Systems
pp. 134
Finding Preimages in Full MD5 Faster Than Exhaustive Search
pp. 134
Pex–White Box Test Generation for .NET
pp. 136
Nonlinear Statistical Shape Modeling for Ankle Bone Segmentation Using a Novel Kernelized Robust PCA
pp. 136
An Adapted Lesk Algorithm for Word Sense Disambiguation Using WordNet
pp. 137
PHAT – Persistent Homology Algorithms Toolbox
pp. 137
The Performance Impact of Advance Reservation Meta-scheduling
pp. 138
Lagrangian Relaxation Realised in the NgMPPS Multi Actor Architecture
pp. 138
Polyglot: An Extensible Compiler Framework for Java
pp. 140
Convolutional Learning of Spatio-temporal Features
pp. 141
Service Composition (re)Binding Driven by Application–Specific QoS
pp. 141
Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials
pp. 143
User Data Management and Usage Model Acquisition in an Adaptive Educational Collaborative Environment
pp. 144
Testing the Foundations of Quantal Response Equilibrium
pp. 144
Automated Analysis of Multi Site MRI Phantom Data for the NIHPD Project
pp. 145
Towards an Ontology-Based Approach for Eliciting Possible Solutions to Non-Functional Requirements
pp. 146
A Real-World Benchmark Model for Testing Concurrent Real-Time Systems in the Automotive Domain
pp. 146
‘Who, When, and Where?’ Location Proof Assertion for Mobile Devices
pp. 146
Who Is Concerned about What? A Study of American, Chinese and Indian Users’ Privacy Concerns on Social Network Sites
pp. 147
Modelling Cloud Forensic-Enabled Services
pp. 147
Propagation via Kernelization: The Vertex Cover Constraint
pp. 148
Random Forests for Phase Detection in Surgical Workflow Analysis
pp. 150
An Alphabet-Friendly FM-Index
pp. 151
Trace Inclusion for One-Counter Nets Revisited
pp. 151
Improving Segmentation of the Left Ventricle Using a Two-Component Statistical Model
pp. 153
Induction of recursive Bayesian classifiers
pp. 154
How Many Trees in a Random Forest?
pp. 154
Towards an On-Line Analysis of Tweets Processing
pp. 156
ParCoLab: A Parallel Corpus for Serbian, French and English
pp. 156
Provably Secure Implicit Certificate Schemes
pp. 157
How to Achieve a McEliece-Based Digital Signature Scheme
pp. 157
A Semantic Theory of the Internet of Things
pp. 157
On Formulations of Firing Squad Synchronization Problems
pp. 158
DES and Differential Power Analysis The “Duplication” Method
pp. 158
A processors management system for PVM
pp. 159
RFID Systems: A Survey on Security Threats and Proposed Solutions
pp. 159
Software Implementation of Mathematical Model of Thermodynamic Processes in a Steam Turbine on High-Performance System
pp. 161
Integrating Statistical Prior Knowledge into Convolutional Neural Networks
pp. 161
An Ontology-Based Bayesian Network Approach for Representing Uncertainty in Clinical Practice Guidelines
pp. 161
Anisotropic Feature Extraction from Endoluminal Images for Detection of Intestinal Contractions
pp. 162
Using a Modelling Language to Describe the Quality of Life Goals of People Living with Dementia
pp. 162
Testing TLS Using Combinatorial Methods and Execution Framework
pp. 162
Graph-theoretic arguments in low-level complexity
pp. 162
Engineering a Performance Management System to Support Community Care Delivery
pp. 163
Response-Time Modeling of Controller Area Network (CAN)
pp. 163
A Model-Based Extension to HiP-HOPS for Dynamic Fault Propagation Studies
pp. 164
Discovering Consumer Health Expressions from Consumer-Contributed Content
pp. 165
Independent Vector Analysis: An Extension of ICA to Multivariate Components
pp. 165
The Traveling Percussionist
pp. 166
SpineNet: Automatically Pinpointing Classification Evidence in Spinal MRIs
pp. 166
Social Situated Agents in Virtual, Real and Mixed Reality Environments
pp. 167
DNA-based Cryptography
pp. 167
Breach, A Toolbox for Verification and Parameter Synthesis of Hybrid Systems
pp. 168
A Tool for Checking ANSI-C Programs
pp. 169
Clinical Evaluation of an Automatic Path Tracker for Virtual Colonoscopy
pp. 169
Experiences with QuickCheck: Testing the Hard Stuff and Staying Sane
pp. 169
Strategic Tabletop Negotiations
pp. 169
Semi-homomorphic Encryption and Multiparty Computation
pp. 169
The Database of the Cardiovascular System Related Signals
pp. 170
A New GreatSPN GUI for GSPN Editing and CSLTA Model Checking
pp. 170
Outlier Detection Using Replicator Neural Networks
pp. 170
Teaching Academic Concurrency to Amazing Students
pp. 170
From Transitions to Executions
pp. 171
A Learning-Based Approach for IP Geolocation
pp. 171
Estimating attributes: Analysis and extensions of RELIEF
pp. 171
Towards Self-aware Approach for Mobile Devices Security
pp. 173
Fine-Grained Access Control with Object-Sensitive Roles
pp. 173
Data Dependent Concentration Bounds for Sequential Prediction Algorithms
pp. 173
W-OTS+ – Shorter Signatures for Hash-Based Signature Schemes
pp. 175
Error-Free Affine, Unitary, and Probabilistic OBDDs
pp. 175
Induced Subgraphs of Bounded Degree and Bounded Treewidth
pp. 175
Patient-Centered Information Extraction for Effective Search on Healthcare Forum
pp. 176
Estimating Depth from RGB and Sparse Sensing
pp. 178
Towards Continuous Certification of Clinical Information Systems
pp. 180
A New Sharing Paradigm for the Personal Cloud
pp. 183
Recent Results in Speech Recognition for the Tatar Language
pp. 184
Quantum Entanglement and the Issue of Selective Influences in Psychology: An Overview
pp. 184
Pseudonym Systems
pp. 184
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm
pp. 184
Exploring the Impact of Search Interface Features on Search Tasks
pp. 185
LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks
pp. 185
Can Evaluation Patterns Enable End Users to Evaluate the Quality of an e-learning System? An Exploratory Study
pp. 186
Hybrid Systems with Finite Bisimulations
pp. 186
Improved Approximation Algorithms for Budgeted Allocations
pp. 187
A Fast SVM Training Algorithm Based on a Decision Tree Data Filter
pp. 188
Improving Multi-label Classifiers via Label Reduction with Association Rules
pp. 188
Monitoring Discrete Event Systems Using Petri Net Embeddings
pp. 188
An Improved Optimistic and Fault-Tolerant Replication Protocol
pp. 191
Parallel Object Oriented Monte Carlo Simulations
pp. 191
Comparison of Coarsening Schemes for Multilevel Graph Partitioning
pp. 192
Face Recognition Using Wavelet Transform and Non-negative Matrix Factorization
pp. 192
Sharemind: A Framework for Fast Privacy-Preserving Computations
pp. 193
Layer-Wise Relevance Propagation: An Overview
pp. 193
How Do E-Patients Connect Online? A Study of Social Support Roles in Health Social Networking
pp. 194
Automated Age Estimation from Hand MRI Volumes Using Deep Learning
pp. 194
Examining Community in the Digital Neighborhood: Early Results from Canada’s Wired Suburb
pp. 195
tLab: A System Enabling Malware Clustering Based on Suspicious Activity Trees
pp. 196
Reasoning about gradual changes of topological relationships
pp. 196
Multiple-Precision Residue-Based Arithmetic Library for Parallel CPU-GPU Architectures: Data Types and Features
pp. 196
The glory of the past
pp. 196
Experienced and Novice Driver Situation Awareness at Rail Level Crossings: An Exploratory On-Road Study
pp. 196
Safety Verification for Probabilistic Hybrid Systems
pp. 197
BcePred: Prediction of Continuous B-Cell Epitopes in Antigenic Sequences Using Physico-chemical Properties
pp. 197
Oblivious RAM with O((logN)3) Worst-Case Cost
pp. 197
Timing assumptions and verification of finite-state concurrent systems
pp. 198
The Travelling Salesman Problem in Bounded Degree Graphs
pp. 199
Thompson Sampling: An Asymptotically Optimal Finite-Time Analysis
pp. 200
A Tutorial on Uppaal
pp. 201
Pairing the Volcano
pp. 201
Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations
pp. 201
IKNOW: A Tool to Assist and Study the Creation, Maintenance, and Dissolution of Knowledge Networks
pp. 203
Learning and Incorporating Shape Models for Semantic Segmentation
pp. 203
A Deep Learning Method for Classification of EEG Data Based on Motor Imagery
pp. 204
Combining Passages in the Monolingual Task with the IR-n System
pp. 204
A Statistical Framework for Partial Volume Segmentation
pp. 204
Shared Ensemble Learning Using Multi-trees
pp. 204
Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context
pp. 206
Optimizing Egalitarian Performance in the Side-Effects Model of Colocation for Data Center Resource Management
pp. 206
Nonparametric Density Flows for MRI Intensity Normalisation
pp. 208
The Application of I-Voting for Estonian Parliamentary Elections of 2011
pp. 209
Multimodal Fusion and Fission within W3C Standards for Nonverbal Communication with Blind Persons
pp. 209
UML Modelling and Performance Analysis of Mobile Software Architectures
pp. 209
Atlas Guided Identification of Brain Structures by Combining 3D Segmentation and SVM Classification
pp. 210
Using Ant Colony Optimization to Build Cluster-Based Classification Systems
pp. 210
Learning to Detect Roads in High-Resolution Aerial Images
pp. 211
Timed Temporal Logics
pp. 211
Do Voting Advice Applications Have an Effect on Electoral Participation and Voter Turnout? Evidence from the 2007 Swiss Federal Elections
pp. 212
The simple semantics for Coppo-Dezani-Sallé types
pp. 213
Planarity for clustered graphs
pp. 213
VPR: a new packing, placement and routing tool for FPGA research
pp. 214
Deriving Inverse Operators for Modal Logic
pp. 214
Hierarchical Predicate Encryption for Inner-Products
pp. 214
A Tool Integrating Model Checking into a C Verification Toolset
pp. 215
Conceptual Model of Complex Multi-agent System Smart City 4.0
pp. 215
Deterministic Identity-Based Encryption from Lattices with More Compact Public Parameters
pp. 215
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
pp. 216
Comparison of Methods for Community Detection in Networks
pp. 216
A Complete Declarative Debugger for Maude
pp. 216
The (Thin) Bridges of AS Connectivity: Measuring Dependency Using AS Hegemony
pp. 217
A Generic yet Efficient Method for Secure Inner Product
pp. 220
An Application of Recurrent Neural Networks to Discriminative Keyword Spotting
pp. 221
Contributing to Current Challenges in Identity and Access Management with Visual Analytics
pp. 221
A Neural Approach to Blind Motion Deblurring
pp. 221
A Language and a Methodology for Prototyping User Interfaces for Control Systems
pp. 222
Towards a Quick Computation of Well-Spread Pareto-Optimal Solutions
pp. 222
The Independent Choice Logic and Beyond
pp. 223
Model-Driven Web Form Validation with UML and OCL
pp. 223
Arrays in Blitz++
pp. 223
An Analysis of Minutiae Matching Strength
pp. 223
DFA on LS-Designs with a Practical Implementation on SCREAM
pp. 224
Fundamentals of 3D halftoning
pp. 225
Fair Testing and Stubborn Sets
pp. 227
Watermarking document images with bounding box expansion
pp. 227
SSH – Somewhat Secure Host
pp. 228
Semi-numerical Solution of Stochastic Process Algebra Models
pp. 228
Comparing a Shipping Information Pipeline with a Thick Flow and a Thin Flow
pp. 229
Squerall: Virtual Ontology-Based Access to Heterogeneous and Large Data Sources
pp. 229
Optimizing Window Aggregate Functions via Random Sampling
pp. 230
SCTP, XTP and TCP as Transport Protocols for High Performance Computing on Multi-cluster Grid Environments
pp. 230
Dependently Typed Programming in Agda
pp. 231
Maximum Matching in Semi-streaming with Few Passes
pp. 231
Reflection and Preservation of Properties in Coalgebraic (bi)Simulations
pp. 231
Distinguisher and Related-Key Attack on the Full AES-256
pp. 232
A General Diagnosis Method for Ontologies
pp. 232
GRASPing the Examination Scheduling Problem
pp. 233
Automatic Generalization of a QA Answer Extraction Module Based on Semantic Roles
pp. 233
On spanning trees with low crossing numbers
pp. 233
Multi-scale line segmentation with automatic estimation of width, contrast and tangential direction in 2D and 3D medical images
pp. 234
Semi-supervised On-Line Boosting for Robust Tracking
pp. 234
Clustering and Hot Spot Detection in Socio-economic Spatio-temporal Data
pp. 235
Kernel Depth Measures for Functional Data with Application to Outlier Detection
pp. 236
Metacommunication Patterns in Online Communities
pp. 236
Cancer Metastasis Detection via Spatially Structured Deep Network
pp. 236
SpecDB: A Database for Storing and Managing Mass Spectrometry Proteomics Data
pp. 237
Towards Personalization of Diabetes Therapy Using Computerized Decision Support and Machine Learning: Some Open Problems and Challenges
pp. 237
Scholia, Scientometrics and Wikidata
pp. 238
Design of a Series Variable Stiffness Joint Based on Antagonistic Principle
pp. 238
Integrating Formal Predictions of Interactive System Behaviour with User Evaluation
pp. 238
Multimedia Search with Pseudo-relevance Feedback
pp. 238
An Evaluation Framework for Disseminating Context Information with Gossiping
pp. 238
An automata-theoretic approach to linear temporal logic
pp. 239
Undetachable Threshold Signatures
pp. 240
Implementing Computations in Automaton (Semi)groups
pp. 241
Motion Reconstruction of Swarm-Like Self-organized Motor Bike Traffic from Public Videos
pp. 241
Mining Communication Data in a Music Community: A Preliminary Analysis
pp. 243
Predestination: Inferring Destinations from Partial Trajectories
pp. 243
KT-IDEM: Introducing Item Difficulty to the Knowledge Tracing Model
pp. 243
Identifying the Affective Dimension of Data Mining Practice: An Exploratory Study
pp. 244
Automating the Choice of Decision Support System Architecture
pp. 245
From Plagiarism Detection to Bible Analysis: The Potential of Machine Learning for Grammar-Based Text Analysis
pp. 245
Fast Log Replication in Highly Available Data Store
pp. 246
Parametric Trace Slicing and Monitoring
pp. 247
On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records
pp. 248
EEG-Based Random Number Generators
pp. 249
A Taxonomy of Single Sign-On Systems
pp. 249
Adaptive Learning from Evolving Data Streams
pp. 249
Two-Phase Preference Disclosure in Attributed Social Networks
pp. 249
Efficient Timetable Information in the Presence of Delays
pp. 250
Type Assignment for Intersections and Unions in Call-by-Value Languages
pp. 250
Compositional Specification of Controllers for Batch Process Operations
pp. 250
Secure Two-Party Computation Is Practical
pp. 252
A Formal Template Language Enabling Metaproof
pp. 255
LifeCLEF 2017 Lab Overview: Multimedia Species Identification Challenges
pp. 256
Graphical Modeling of Ultrasound Propagation in Tissue for Automatic Bone Segmentation
pp. 256
Constraint Support in MDA Tools: A Survey
pp. 256
Playing “Air Instruments”: Mimicry of Sound-Producing Gestures by Novices and Experts
pp. 256
A Dataset for Web-Scale Knowledge Base Population
pp. 257
Eighth International Workshop on OCL Concepts and Tools
pp. 258
Using Case-Based Tests to Detect Gray Cygnets
pp. 259
Palmprint Biometric System Modeling by DBC and DLA Methods and Classifying by KNN and SVM Classifiers
pp. 260
User Modeling on Adaptive Web-Based Learning Communities
pp. 260
Elimination of Redundancy in Ontologies
pp. 261
A Scalable Framework for Quality Assessment of RDF Datasets
pp. 261
Analysis of a Proposed Hash-Based Signature Standard
pp. 261
Stochastic Semantic-Based Multi-objective Genetic Programming Optimisation for Classification of Imbalanced Data
pp. 261
Cross-Categorial Donkeys
pp. 262
A New Approach to Assess Defragmentation Strategies in Dynamically Reconfigurable FPGAs
pp. 263
Social Network for Education: What Are the Resources Desired by Students?
pp. 263
Compression and Information Leakage of Plaintext
pp. 263
On Cost-Effective Inter-LMA Domain Handover Scheme in NEMO-PMIPv6 Networks
pp. 263
Information and Knowledge Based Conceptual Study of 2008 Financial Crisis
pp. 264
From Individuals to Social and Vice-versa
pp. 265
HOL Light: A tutorial introduction
pp. 265
Bayesian Image Quality Transfer
pp. 265
Practical invisibility in digital communication
pp. 265
Automatic Recognition of Hand Gestures with Differential Evolution
pp. 266
Sliding Mode Control of Robot Based on Neural Network Model with Positive Definite Inertia Matrix
pp. 266
A Reduction of Logical Regulatory Graphs Preserving Essential Dynamical Properties
pp. 266
Reuse: From Components to Services
pp. 268
Improving the Reproducibility of PAN’s Shared Tasks:
pp. 270
Towards a Formalization of Individual Work Execution at Computer Workplaces
pp. 271
On the specification of elementary reactive behaviour
pp. 273
Ranking Entities Using Web Search Query Logs
pp. 274
Indexing Highly Repetitive Collections
pp. 274
Testing Speculative Work in a Lazy/Eager Parallel Functional Language
pp. 276
On the Expressiveness of Refinement Settings
pp. 276
Isogeny Volcanoes and the SEA Algorithm
pp. 277
Comparative Analysis of Effectiveness of Two Timing-Driven Design Approaches
pp. 277
Weighted Learning Vector Quantization to Cost-Sensitive Learning
pp. 277
On Solutions to the Key Escrow Problem
pp. 280
Bound Analysis of Imperative Programs with the Size-Change Abstraction
pp. 281
A Lightweight Regression Method to Infer Psycholinguistic Properties for Brazilian Portuguese
pp. 281
The Bitcoin Backbone Protocol: Analysis and Applications
pp. 281
Detecting Isodistance Hotspots on Spatial Networks: A Summary of Results
pp. 282
MOPED: A Multi-objective Parzen-Based Estimation of Distribution Algorithm for Continuous Problems
pp. 282
Object Segmentation by Long Term Analysis of Point Trajectories
pp. 282
A Debugger for Parallel Haskell Dialects
pp. 283
Quantum Security of NMAC and Related Constructions
pp. 283
Classification of Photo and Sketch Images Using Convolutional Neural Networks
pp. 284
CacheVisor: A Toolset for Visualizing Shared Caches in Multicore and Multithreaded Processors
pp. 286
Evolutionary Fuzzy Scheduler for Grid Computing
pp. 288
On the Foundations of Quantitative Information Flow
pp. 289
Measuring Similarity in Description Logics Using Refinement Operators
pp. 289
Managerial and Technical Barriers to the Adoption of Open Source Software
pp. 291
Resilient Optimistic Termination Detection for the Async-Finish Model
pp. 291
Reinforced Condition/Decision Coverage (RC/DC): A New Criterion for Software Testing
pp. 292
Categorical and Kripke Semantics for Constructive S4 Modal Logic
pp. 292
Reversible Communicating Systems
pp. 293
Sparklify: A Scalable Software Component for Efficient Evaluation of SPARQL Queries over Distributed RDF Datasets
pp. 293
Cross-View Action Recognition from Temporal Self-similarities
pp. 294
A Streaming Data Prediction Method Based on Evolving Bayesian Network
pp. 296
On Probabilistic Parallel Programs with Process Creation and Synchronisation
pp. 298
A Comparison of Market Approaches to Software Vulnerability Disclosure
pp. 298
All-But-Many Lossy Trapdoor Functions from Lattices and Applications
pp. 299
Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs
pp. 299
Verifying Progress in Timed Systems
pp. 299
Use Fewer Instances of the Letter “i”: Toward Writing Style Anonymization
pp. 300
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
pp. 300
A Methodology Based on MP Theory for Gene Expression Analysis
pp. 300
A Cross-Modality Neural Network Transform for Semi-automatic Medical Image Annotation
pp. 300
Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation
pp. 302
Detecting Partially Occluded Objects with an Implicit Shape Model Random Field
pp. 303
Replica-Aware Partitioning Design in Parallel Database Systems
pp. 303
Leveraging the Model-Driven Architecture for Service Choreography in Ubiquitous Systems
pp. 303
The Minimum Conflict-Free Row Split Problem Revisited
pp. 303
Extending the Petri Box Calculus with Time
pp. 303
A Relativistic Opinion Mining Approach to Detect Factual or Opinionated News Sources
pp. 304
Qubit Neural Network and Its Efficiency
pp. 304
Calculating multidimensional symmetric functions using Jacobi's formula
pp. 305
Person Name Discrimination in the Dossier–GPLSI at the University of Alicante
pp. 305
On-the-fly analysis of systems with unbounded, lossy FIFO channels
pp. 306
On-Line Algorithms in Machine Learning
pp. 307
Usability Analysis of Secure Pairing Methods
pp. 307
A Learning-Based Algorithm Selection Meta-Reasoner for the Real-Time MPE Problem
pp. 307
An Economic Model of User Rating in an Online Recommender System
pp. 307
A New Shadow Removal Method Using Color-Lines
pp. 308
Securely Accessing Shared Resources with Concurrent Constraint Programming
pp. 308
Using Reservoir Computing and Trend Information for Short-Term Streamflow Forecasting
pp. 309
MarUja: Virtual Assistant Prototype for the Computing Service Catalogue of the University of Jaén
pp. 313
A Reliability-Based Approach for Influence Maximization Using the Evidence Theory
pp. 313
An Open-Ended Computational Evolution Strategy for Evolving Parsimonious Solutions to Human Genetics Problems
pp. 313
TeslaML: Steering Machine Learning Automatically in Tencent
pp. 315
Instrumenting the City: Developing Methods for Observing and Understanding the Digital Cityscape
pp. 317
Interactive Programs in Dependent Type Theory
pp. 317
The Effect of Subharmonic Stimuli on Singing Voices
pp. 317
Tamper resistant software: an implementation
pp. 317
A Knowledge-Based Approach to Augment Applications with Interaction Traces
pp. 318
Applying Evolutionary Techniques to Debug Functional Programs
pp. 318
Rethinking Spatiotemporal Feature Learning: Speed-Accuracy Trade-offs in Video Classification
pp. 318
Multiple Incomplete Views Clustering via Weighted Nonnegative Matrix Factorization with $$L_{2,1}$$ Regularization
pp. 319
Object Recognition with Gradient-Based Learning
pp. 319
Better Key Sizes (and Attacks) for LWE-Based Encryption
pp. 319
Ellipse Detection for Visual Cyclists Analysis “In the Wild”
pp. 320
Improving Semantic Segmentation with Generalized Models of Local Context
pp. 320
The Local Nature of List Colorings for Graphs of High Girth
pp. 321
Design of a Neural Network for an Identification of a Robot Model with a Positive Definite Inertia Matrix
pp. 322
Learning Continuous-Time Information Diffusion Model for Social Behavioral Data Analysis
pp. 322
A Mimetic Finite-Difference Scheme for Convection of Multicomponent Fluid in a Porous Medium
pp. 323
Laconic and Precise Justifications in OWL
pp. 323
Verifying Linearisability with Potential Linearisation Points
pp. 323
Cautious Ordinal Classification by Binary Decomposition
pp. 324
A Fast and Automatic Method to Correct Intensity Inhomogeneity in MR Brain Images
pp. 324
Trusting and Adopting E-Government Services in Developing Countries? Privacy Concerns and Practices in Rwanda
pp. 325
Event structures
pp. 327
A Novel and Unifying View of Trustworthiness in Cyberphysical Systems
pp. 328
Session Types for Object-Oriented Languages
pp. 328
Modeling and In-Database Management of Relational, Data-Aware Processes
pp. 328
Tools for Supporting Hybrid Learning Strategies in Open Source Software Environments
pp. 329
Untrusted Business Process Monitoring and Execution Using Blockchain
pp. 330
Fuzzy Clustering of Short Time-Series and Unevenly Distributed Sampling Points
pp. 331
A Feedback Control Approach to Mitigating Mistreatment in Distributed Caching Groups
pp. 331
Web Accessibility in Africa: A Study of Three African Domains
pp. 331
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services
pp. 332
Visual Landmark Based 3D Road Course Estimation with Black Box Variational Inference
pp. 332
VirtualEMF: A Model Virtualization Tool
pp. 332
A Novel Modeling and Recognition Method for Underwater Sound Based on HMT in Wavelet Domain
pp. 333
A Global Constraint for Closed Frequent Pattern Mining
pp. 336
Multivariate Dynamic Kernels for Financial Time Series Forecasting
pp. 337
Complete Parsimony Haplotype Inference Problem and Algorithms
pp. 340
Discriminative Analysis of Early Alzheimer’s Disease Based on Two Intrinsically Anti-correlated Networks with Resting-State fMRI
pp. 341
Boosting Lazy Abstraction for SystemC with Partial Order Reduction
pp. 342
A Process for Driving Process Improvement in VSEs
pp. 343
A First Step Toward Quantifying the Climate’s Information Production over the Last 68,000 Years
pp. 344
Supporting Framework Use via Automatically Extracted Concept-Implementation Templates
pp. 346
Towards Aggregated Answers for Semistructured Data
pp. 347
Formally Testing Liveness by Means of Compression Rates
pp. 347
Structural Salience of Landmarks for Route Directions
pp. 350
Method for Polygonal Approximation through Dominant Points Deletion
pp. 351
Tetris is Hard, Even to Approximate
pp. 351
Neural Networks Compression for Language Modeling
pp. 352
Dynamically Balanced Online Random Forests for Interactive Scribble-Based Segmentation
pp. 353
Selecting the Optimal Sequence for Deformable Registration of Microscopy Image Sequences Using Two-Stage MST-based Clustering Algorithm
pp. 354
LTSmin: Distributed and Symbolic Reachability
pp. 354
Estimating Visual Comfort in Stereoscopic Displays Using Electroencephalography: A Proof-of-Concept
pp. 354
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum
pp. 354
Nonlinear Control of Omnidirectional Mobile Platforms
pp. 355
Diagnosing Performance Variations in HPC Applications Using Machine Learning
pp. 356
On the Reachability Analysis of Acyclic Networks of Pushdown Systems
pp. 356
The Computer Scientist Nightmare
pp. 357
Classification Rule Mining with an Improved Ant Colony Algorithm
pp. 357
X-ray Image Contrast Enhancement Using the Second Generation Curvelet Transform
pp. 357
A Smart Contract for Boardroom Voting with Maximum Voter Privacy
pp. 359
Multiple Classifier Systems for the Classification of Audio-Visual Emotional States
pp. 359
Verified LISP Implementations on ARM, x86 and PowerPC
pp. 359
Recognition and Segmentation of 3-D Human Action Using HMM and Multi-class AdaBoost
pp. 360
Video Mining with Frequent Itemset Configurations
pp. 361
Metamodel—Assisted Evolution Strategies
pp. 361
Mobile Terminals Haptic Interface: A Vibro-Tactile Finger Device for 3D Shape Rendering
pp. 362
JAK-STAT Signalling as Example for a Database-Supported Modular Modelling Concept
pp. 363
Mediated Population Protocols
pp. 365
Dynamic Regression for Partial Correlation and Causality Analysis of Functional Brain Networks
pp. 365
Space-Time Roll-up and Drill-down into Geo-Trend Stream Cubes
pp. 366
One Knowledge Graph to Rule Them All? Analyzing the Differences Between DBpedia, YAGO, Wikidata & co.
pp. 367
Localized Priors for the Precise Segmentation of Individual Vertebras from CT Volume Data
pp. 368
Mining Outliers with Ensemble of Heterogeneous Detectors on Random Subspaces
pp. 369
Spatiotemporal Integration of Optical Flow Vectors for Micro-expression Detection
pp. 370
High-Throughput Glomeruli Analysis of $$\mu $$ CT Kidney Images Using Tree Priors and Scalable Sparse Computation
pp. 371
A Model of Spatial Reference Frames in Language
pp. 371
Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance
pp. 372
Using Machine Learning Techniques to Recover Prismatic Cirrus Ice Crystal Size from 2-Dimensional Light Scattering Patterns
pp. 372
CADP 2010: A Toolbox for the Construction and Analysis of Distributed Processes
pp. 372
Bayesian Diffusion Tensor Estimation with Spatial Priors
pp. 372
Recovery of Liver Motion and Deformation Due to Respiration Using Laparoscopic Freehand 3D Ultrasound System
pp. 373
Brain-Computer Interface Games: Towards a Framework
pp. 373
Adaptive Multimodal Fusion
pp. 373
Kernel-Regularized ICA for Computing Functional Topography from Resting-State fMRI
pp. 374
Spelling approximate repeated or common motifs using a suffix tree
pp. 376
An Application of NLP Rules to Spoken Document Segmentation Task
pp. 377
Metaheuristic Hybridized Applied to Solve the Capacity Vehicle Routing Problem
pp. 377
A Registration Method for 3D Point Clouds with Convolutional Neural Network
pp. 378
Music Artist Similarity: An Exploratory Study on a Large-Scale Dataset of Online Streaming Services
pp. 380
25 Years of CNNs: Can We Compare to Human Abstraction Capabilities?
pp. 382
Mitotic Oscillators as MP Graphs
pp. 384
On Designing a GeoViz-Aware Database System - Challenges and Opportunities
pp. 388
Unsupervised Acquisition of Axioms to Paraphrase Noun Compounds and Genitives
pp. 389
Jump Number of Two-Directional Orthogonal Ray Graphs
pp. 391
Using Social Media for Word-of-Mouth Marketing
pp. 391
Labeling Color 2D Digital Images in Theoretical Near Logarithmic Time
pp. 392
Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations
pp. 393
A Survey of Single-Database Private Information Retrieval: Techniques and Applications
pp. 394
Program Metamorphosis
pp. 397
Streaming Algorithm for Euler Characteristic Curves of Multidimensional Images
pp. 399
MtNet: A Multi-Task Neural Network for Dynamic Malware Classification
pp. 399
Concurrent Kleene Algebra
pp. 401
Gamification of Education: A Review of Literature
pp. 402
Improving the Centered CUSUMS Statistic for Structural Break Detection in Time Series
pp. 402
Name Creation vs. Replication in Petri Net Systems
pp. 405
Advanced Parallel Robot with Extended RSUR Kinematic for a Circulating Working Principle
pp. 405
An Integrated Solar Database (ISD) with Extended Spatiotemporal Querying Capabilities
pp. 405
A Functionality Perspective on Digital Library Interoperability
pp. 407
Action versus state based logics for transition systems
pp. 408
Parallelization of Pricing Path-Dependent Financial Instruments on Bounded Trinomial Lattices
pp. 414
Investigating ID3-Induced Rules from Low-Dimensional Data Cleaned by Complete Case Analysis
pp. 416
Improving Functional MRI Registration Using Whole-Brain Functional Correlation Tensors
pp. 416
Sentiment Analysis of Products’ Reviews Containing English and Hindi Texts
pp. 416
An Empirical Study on Evolution of API Documentation
pp. 417
Personal Desktop-Level Jet Fighter Simulator for Training or Entertainment
pp. 421
Pattern Matching in Lempel-Ziv Compressed Strings: Fast, Simple, and Deterministic
pp. 425
TabEL: Entity Linking in Web Tables
pp. 426
On Memory-Bound Functions for Fighting Spam
pp. 427
Generating Fake but Realistic Headlines Using Deep Neural Networks
pp. 428
Families of Graph Algorithms: SSSP Case Study
pp. 430
Differences on How People Organize and Think about Personal Information
pp. 433
Multimodal Hyper-connectivity Networks for MCI Classification
pp. 433
Reconstructing Many Partitions Using Spectral Techniques
pp. 434
Emergence of Cooperation in Adaptive Social Networks with Behavioral Diversity
pp. 435
Rate-Based Transition Systems for Stochastic Process Calculi
pp. 437
Integrating Information of Films by a Multi-source Combining Framework
pp. 438
Preprocessing and Transmission for 3D Point Cloud Data
pp. 439
Agent coordination and control through logic theories
pp. 439
Improving Toponym Extraction and Disambiguation Using Feedback Loop
pp. 440
Hierarchical Identity Based Encryption with Constant Size Ciphertext
pp. 441
PRISM: A Tool for Automatic Verification of Probabilistic Systems
pp. 442
Affective, Behavioral, and Cognitive Aspects of Teen Perspectives on Personal Data in Social Media: A Model of Youth Data Literacy
pp. 442
Pancreas Segmentation in MRI Using Graph-Based Decision Fusion on Convolutional Neural Networks
pp. 445
Coverability Trees for Petri Nets with Unordered Data
pp. 445
How the Structuring of Domain Knowledge Helps Casual Process Modelers
pp. 446
Parallel Computing for Time-Consuming Multicriterial Optimization Problems
pp. 447
On the Complexity of Mixed Discriminants and Related Problems
pp. 447
Algorithms for ε-Approximations of Terrains
pp. 448
Higher-order logic programming
pp. 449
On approximation properties of the Independent set problem for degree 3 graphs
pp. 450
A Novel Approach to Network Security Situation Assessment Based on Attack Confidence
pp. 450
Knowledge Discovery Using Concept-Class Taxonomies
pp. 451
Increasing the capacity of a hopfield network without sacrificing functionality
pp. 452
Certificateless Public Key Cryptography
pp. 452
A Case Base Planning Approach for Dialogue Generation in Digital Movie Design
pp. 454
Universal quasi-prime algebraic domains
pp. 455
Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time
pp. 457
DeepRED – Rule Extraction from Deep Neural Networks
pp. 458
Zero-Knowledge Undeniable Signatures (extended abstract)
pp. 459
Air Quality Monitoring System and Benchmarking
pp. 459
A Functional Approach to Parallelizing Data Mining Algorithms in Java
pp. 460
Topology Aware Fully Convolutional Networks for Histology Gland Segmentation
pp. 460
Exploratory Matrix Factorization for PET Image Analysis
pp. 460
Population-Shrinkage of Covariance to Estimate Better Brain Functional Connectivity
pp. 461
Preserving the Fabric of Our Lives: A Survey of Web Preservation Initiatives
pp. 462
Learning the Grammar of Distant Change in the World-Wide Web
pp. 462
Hedging Public-Key Encryption in the Real World
pp. 462
Generation and Transformation of Compliant Process Collaboration Models to BPMN
pp. 463
Diagnostic Information for Control-Flow Analysis of Workflow Graphs (a.k.a. Free-Choice Workflow Nets)
pp. 463
Private Circuits: Securing Hardware against Probing Attacks
pp. 466
Using Multiple Clause Constructors in Inductive Logic Programming for Semantic Parsing
pp. 467
Mining process models from workflow logs
pp. 468
A Goal-Based Modeling Approach to Develop Requirements of an Adaptive System with Environmental Uncertainty
pp. 469
Face Recognition with Local Binary Patterns
pp. 469
HeMIS: Hetero-Modal Image Segmentation
pp. 471
A New Neural Model for Traffic Simulation
pp. 471
Taverna, Reloaded
pp. 474
Robust Human Action Recognition Using Dynamic Movement Features
pp. 476
Approximate Distance Labeling Schemes
pp. 476
Who Will Follow Whom? Exploiting Semantics for Link Prediction in Attention-Information Networks
pp. 476
Computational Complexity of Traffic Hijacking under BGP and S-BGP
pp. 478
A Submodular Approach to Create Individualized Parcellations of the Human Brain
pp. 479
Homotopy Type Theory in Lean
pp. 479
Part-Based Local Shape Models for Colon Polyp Detection
pp. 479
GameOfFlows: Process Instance Adaptation in Complex, Dynamic and Potentially Adversarial Domains
pp. 481
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family
pp. 482
Combining Edge, Region, and Shape Information to Segment the Left Ventricle in Cardiac MR Images
pp. 483
Application Areas of AIS: The Past, The Present and The Future
pp. 487
Creating the DISEQuA Corpus: A Test Set for Multilingual Question Answering
pp. 488
Multinomial Naive Bayes for Text Categorization Revisited
pp. 491
Key Design Properties for Shipping Information Pipeline
pp. 491
Mining the Web for Synonyms: PMI-IR versus LSA on TOEFL
pp. 494
Object, Scene and Actions: Combining Multiple Features for Human Action Recognition
pp. 494
PISA — A Platform and Programming Language Independent Interface for Search Algorithms
pp. 495
Supervised Discriminative EEG Brain Source Imaging with Graph Regularization
pp. 495
Complexity Bounds for Regular Games
pp. 498
Genetics of Anisotropy Asymmetry: Registration and Sample Size Effects
pp. 498
The Role of Self-efficacy in Cancer Information Avoidance
pp. 501
Recognition of Two-Dimensional Shapes Based on Dependence Vectors
pp. 502
Augmented Lagrangian Method, Dual Methods and Split Bregman Iteration for ROF Model
pp. 502
Convergence Time to Nash Equilibria
pp. 502
Oblivious RAM Revisited
pp. 506
Non-negative Kernel Sparse Coding for the Analysis of Motion Data
pp. 507
Robot Orientation with Histograms on MSL
pp. 508
A Notion of Glue Expressiveness for Component-Based Systems
pp. 509
The Conflict-Driven Answer Set Solver clasp: Progress Report
pp. 509
Blobworld: A System for Region-Based Image Indexing and Retrieval
pp. 510
Recurrent Fusion Network for Image Captioning
pp. 511
Optimized Batched Linear Algebra for Modern Architectures
pp. 514
Approximate Reachability for Linear Systems
pp. 516
Valmet: A New Validation Tool for Assessing and Improving 3D Object Segmentation
pp. 516
Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework
pp. 516
Feature Selection and Activity Recognition from Wearable Sensors
pp. 517
Terrier Information Retrieval Platform
pp. 517
Rehabilitation Training for Leg Based on EEG-EMG Fusion
pp. 517
Scene Classification Via pLSA
pp. 520
Bayesian Inference of Latent Causes in Gene Regulatory Dynamics
pp. 520
4D Shape Registration for Dynamic Electrophysiological Cardiac Mapping
pp. 521
MOCHA: Modularity in model checking
pp. 523
Dynamic Field Mapping and Motion Correction Using Interleaved Double Spin-Echo Diffusion MRI
pp. 523
Risk-Based Models of Attacker Behavior in Cybersecurity
pp. 525
The Beginning of a Beautiful Friendship? Intelligent Tutoring Systems and MOOCs
pp. 525
Policy Model for National and Academic Digital Collections
pp. 528
ReliefF-ML: An Extension of ReliefF Algorithm to Multi-label Learning
pp. 531
Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks
pp. 533
Multi-scale Improves Boundary Detection in Natural Images
pp. 534
Queuing Algorithms Performance against Buffer Size and Attack Intensities in DDOS Attacks
pp. 535
Enhancing Effectiveness of Outlier Detections for Low Density Patterns
pp. 540
Learn to Track: Deep Learning for Tractography
pp. 544
An Integrated Programming Environment for Teaching the Object-Oriented Programming Paradigm
pp. 544
Work that Enables Care: Understanding Tasks, Automation, and the National Health Service
pp. 545
Rank, Trace-Norm and Max-Norm
pp. 547
Proactive Process Adaptation Using Deep Learning Ensembles
pp. 549
A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems
pp. 550
A Conceptual Model for Multidimensional Analysis of Documents
pp. 551
Almost 2-SAT Is Fixed-Parameter Tractable (Extended Abstract)
pp. 552
PET: An Interactive Software Testing Tool
pp. 553
Eye Movements and Pupil Size Reveal Deception in Computer Administered Questionnaires
pp. 554
Image Registration Guided by Particle Filter
pp. 557
A New Method for the Registration of Cardiac PET and MR Images Using Deformable Model Based Segmentation of the Main Thorax Structures
pp. 562
New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction
pp. 566
An Assistive Vision System for the Blind That Helps Find Lost Things
pp. 567
Universal hashing and k-wise independent random variables via integer arithmetic without primes
pp. 569
Accurate Prediction of Financial Distress of Companies with Machine Learning Algorithms
pp. 570
A Review of Upper and Lower Limb Rehabilitation Training Robot
pp. 572
7T-Guided Learning Framework for Improving the Segmentation of 3T MR Images
pp. 573
Defining and Detecting Emergence in Complex Networks
pp. 576
Securing the Future — An Information Flow Analysis of a Distributed OO Language
pp. 577
Tracklet Descriptors for Action Modeling and Video Analysis
pp. 577
Ranking Outliers Using Symmetric Neighborhood Relationship
pp. 582
Improving the Robustness in Extracting 3D Point Landmarks from 3D Medical Images Using Parametric Deformable Models
pp. 583
A Temporal Object-Oriented Data Warehouse Model
pp. 587
Improving the Presentation of Argument Interpretations Based on User Trials
pp. 588
Specifying Web Service Compositions on the Basis of Natural Language Requests
pp. 589
Region Covariance: A Fast Descriptor for Detection and Classification
pp. 591
Color-Based Object Tracking in Multi-camera Environments
pp. 591
Joint Factorizational Topic Models for Cross-City Recommendation
pp. 592
Performative Metadata: Reliability Frameworks and Accounting Frameworks in Content Aggregation Data Models
pp. 596
Guiding Learners in Learning Management Systems through Recommendations
pp. 597
On Finding Dense Subgraphs
pp. 598
Massive Quasi-Clique Detection
pp. 602
A Sparse Bayesian Learning Algorithm for White Matter Parameter Estimation from Compressed Multi-shell Diffusion MRI
pp. 602
Robust Vessel Tree Modeling
pp. 604
Configurations with Few Crossings in Topological Graphs
pp. 605
Intention-Based Human Robot Collaboration
pp. 609
Automatic Table Detection in Document Images
pp. 610
Voice Code Verification Algorithm Using Competing Models for User Entrance Authentication
pp. 616
Revisiting Ackermann-Hardness for Lossy Counter Machines and Reset Petri Nets
pp. 617
Relational Differential Prediction
pp. 617
The Fast Bilateral Solver
pp. 618
Introduction to: The Myths of Object-Orientation
pp. 620
Revisiting the Sequence Constraint
pp. 620
Registering Histological and MR Images of Prostate for Image-Based Cancer Detection
pp. 624
Regularization and Semi-supervised Learning on Large Graphs
pp. 625
On Supervised Human Activity Analysis for Structured Environments
pp. 625
Block Matrix Multiplication in a Distributed Computing Environment: Experiments with NetSolve
pp. 626
An Evolutionary Algorithm for Adaptive Online Services in Dynamic Environment
pp. 629
Filtering h int Images for the Detection of Microcalcifications
pp. 637
Analytic Expressions for Fiducial and Surface Target Registration Error
pp. 639
Source Code Rejuvenation Is Not Refactoring
pp. 640
Subtype Cell Detection with an Accelerated Deep Convolution Neural Network
pp. 642
On the Road to an Abstract Architecture for Open Virtual Organizations
pp. 644
Automatic Nipple Detection Using Shape and Statistical Skin Color Information
pp. 647
Integration of Libnormaliz in CoCoALib and CoCoA 5
pp. 648
Supporting Concurrency in Private Data Outsourcing
pp. 648
Zoom Better to See Clearer: Human and Object Parsing with Hierarchical Auto-Zoom Net
pp. 649
Imaging Biomarker Discovery for Lung Cancer Survival Prediction
pp. 651
PRF-ODH: Relations, Instantiations, and Impossibility Results
pp. 653
On the Use of Implicit Shape Models for Recognition of Object Categories in 3D Data
pp. 656
Generating Applications from Object Role Models
pp. 656
A General Architecture for Grid-Based PSE Toolkits
pp. 658
A Grid Service Based on Suffix Trees for Pattern Extraction from Mass Spectrometry Proteomics Data
pp. 660
PARAM: A Model Checker for Parametric Markov Models
pp. 665
Where Are iSchools Heading?
pp. 667
Automatic Quantification of Fluorescence from Clustered Targets in Microscope Images
pp. 667
Malware Behavior Modeling with Colored Petri Nets
pp. 672
Denoising Moving Heart Wall Fibers Using Cartan Frames
pp. 674
Product Theorems Via Semidefinite Programming
pp. 674
Event-Based Stereo Matching Approaches for Frameless Address Event Stereo Data
pp. 675
Speeding Up Logistic Model Tree Induction
pp. 678
Physics-Based Elastic Image Registration Using Splines and Including Landmark Localization Uncertainties
pp. 681
Monadic Second-Order Logics with Cardinalities
pp. 681
Embedding Memoization to the Semantic Tree Search for Deciding QBFs
pp. 685
A Hierarchical Convolutional Neural Network for Mitosis Detection in Phase-Contrast Microscopy Images
pp. 687
Video Retrieval Based on Words-of-Interest Selection
pp. 690
VC-Dimension and Shortest Path Algorithms
pp. 692
A Relaxed K-SVD Algorithm for Spontaneous Micro-Expression Recognition
pp. 695
Interactive Simulation of Embolization Coils: Modeling and Experimental Validation
pp. 696
Kernel Codebooks for Scene Categorization
pp. 698
Approximative Methods for Monotone Systems of Min-Max-Polynomial Equations
pp. 699
Managing Process Model Collections with AProMoRe
pp. 700
Current Events: Identifying Webpages by Tapping the Electrical Outlet
pp. 706
Gait Analysis for Human Identification
pp. 706
Set Bounds and (Split) Set Domain Propagation Using ROBDDs
pp. 712
Audible Convergence for Optimal Base Melody Extension with Statistical Genre-Specific Interval Distance Evaluation
pp. 713
Developing Library Services for International Students in China’s Universities: What Does the Literature Tell Us?
pp. 717
Fast Guided Global Interpolation for Depth and Motion
pp. 718
User Friendly Decision Support Techniques in a Case-Based Reasoning System
pp. 721
Access Control Model for AWS Internet of Things
pp. 722
Finding Knees in Multi-objective Optimization
pp. 726
Intensity Gradient Based Registration and Fusion of Multi-modal Images
pp. 728
Towards Image-Guided Pancreas and Biliary Endoscopy: Automatic Multi-organ Segmentation on Abdominal CT with Dense Dilated Networks
pp. 734
Gait Shape Estimation for Identification
pp. 735
Distributed Formation Control of Autonomous Underwater Vehicles Based on Flocking and Consensus Algorithms
pp. 735
A Generative Approach for Image-Based Modeling of Tumor Growth
pp. 740
Kinematic Nonlinear Control of Aerial Mobile Manipulators
pp. 741
The Complexity of Counting Functions with Easy Decision Version
pp. 742
Natural Landmark Based Navigation
pp. 745
D-Width: A More Natural Measure for Directed Tree Width
pp. 747
Improving Surgical Training Phantoms by Hyperrealism: Deep Unpaired Image-to-Image Translation from Real Surgeries
pp. 748
Explicit Non-adaptive Combinatorial Group Testing Schemes
pp. 748
Alphabet-Independent Compressed Text Indexing
pp. 750
Multi-view Inverse Rendering Under Arbitrary Illumination and Albedo
pp. 751
Towards QoS-Awareness of Context-Aware Mobile Applications and Services
pp. 751
Global Grammar Constraints
pp. 765
Control of a Magnet-Driven Nano Positioning Stage with Long Stroke Based on Disturbance Observer
pp. 769
Multimeme Algorithms for Protein Structure Prediction
pp. 770
Shape Preserving Filament Enhancement Filtering
pp. 771
Groupwise Non-rigid Registration Using Polyharmonic Clamped-Plate Splines
pp. 773
Development of a $$\upmu $$ CT-based Patient-Specific Model of the Electrically Stimulated Cochlea
pp. 773
Impossibility of a Quantum Speed-Up with a Faulty Oracle
pp. 774
Replicated Ambient Petri Nets
pp. 778
Pattern Repulsion Revisited
pp. 792
A Convex Formulation of Continuous Multi-label Problems
pp. 803
Evaluation of Evolutionary Algorithms for Multi-objective Train Schedule Optimization
pp. 805
Combining Face and Iris Biometrics for Identity Verification
pp. 806
A Multilingual SVM-Based Question Classification System
pp. 809
Where Should Saliency Models Look Next?
pp. 811
Clustering Gene Expression Profiles with Memetic Algorithms
pp. 813
RETRACTED CHAPTER: The Summary of Underwater Gliders Control Strategies
pp. 819
Tri-Dexel Model Based Geometric Simulation of Multi-axis Additive Manufacturing
pp. 822
Multi-scale Patch Based Collaborative Representation for Face Recognition with Margin Distribution Optimization
pp. 823
Active Surface Approach for Extraction of the Human Cerebral Cortex from MRI
pp. 835
Deep Virtual Stereo Odometry: Leveraging Deep Depth Prediction for Monocular Direct Sparse Odometry
pp. 861
Solving Rotated Multi-objective Optimization Problems Using Differential Evolution
pp. 869
Feature-Based Diversity Optimization for Problem Instance Classification
pp. 873
Sub-structural Niching in Non-stationary Environments
pp. 875
Scalable Metric Learning via Weighted Approximate Rank Component Analysis
pp. 904
Segmentation of Neck Lymph Nodes in CT Datasets with Stable 3D Mass-Spring Models
pp. 910
A Negotiation Agent
pp. 925
Using UN/CEFACT’S Modelling Methodology (UMM) in e-Health Projects
pp. 937
MaSiMe: A Customized Similarity Measure and Its Application for Tag Cloud Refactoring
pp. 940
Calibration Method for Determining the Physical Location of the Ultrasound Image Plane
pp. 948
Flexible Camera Setup for Visual Based Registration on 2D Interaction Surface with Undefined Geometry Using Neural Network
pp. 948
Detecting Inconsistencies in the Gene Ontology Using Ontology Databases with Not-gadgets
pp. 948
Non-linear Local Registration of Functional Data
pp. 961
Image Processing of Finite Size Rat Retinal Ganglion Cells Using Multifractal and Local Connected Fractal Analysis
pp. 961
Random neural network recognition of shaped objects in strong clutter
pp. 991
A Bayesian Metric for Evaluating Machine Learning Algorithms
pp. 1022
Phase-Based User-Steered Image Segmentation
pp. 1030
A Synergy of Modelling for Constraint Problems
pp. 1040
Robust Segmentation of Medical Images Using Geometric Deformable Models and a Dynamic Speed Function
pp. 1055
Discovering Interesting Association Rules by Clustering
pp. 1075
Image Guided Radiotherapy of the Prostate
pp. 1088
Analysis of the (1 + 1) EA for a Noisy OneMax
pp. 1114
Optimization in Prostate Cancer Detection
pp. 1137
An Architecture for Simulating Needle-Based Surgical Procedures
pp. 1157
A Multimodal Navigation System for Interventional MRI
pp. 1166
Repeatability and Accuracy of Ankle Centre Location Estimates Using a Biaxial Joint Model
pp. 1174
Automatic Detection of Large Misregistrations of Multimodality Medical Images
pp. 1201
Modeling Dynamic Rules in ORM
pp. 1215
A Method for µCT Based Assessment of Root Canal Instrumentation in Endodontics Research
pp. 1235
Spherical Navigator Echoes for Full 3-D Rigid Body Motion Measurement in MRI
pp. 1237
Phase Unwrapping for Magnetic Resonance Thermometry
pp. 1250
Development of a New Image-Guided Prostate Biopsy System
pp. 1253
The Semipublic Encryption for Visual Cryptography Using Q’tron Neural Networks
pp. 1262
The T-Detectors Maturation Algorithm Based on Genetic Algorithm
pp. 1263
Real-Time Simulation of Minimally-Invasive Surgery with Cutting Based on Boundary Element Methods
pp. 1281
The Effect of Organ Motion and Image Artifacts on Monomodal Volume Registration
pp. 1293
The Importance of Partial Voluming in Multi-dimensional Medical Image Segmentation
pp. 1295
Learning a Procedure That Can Solve Hard Bin-Packing Problems: A New GA-Based Approach to Hyper-heuristics
pp. 1316
Advances in Active Constraints and Their Application to Minimally Invasive Surgery
pp. 1343
Bag-of-Particles Model for Simulating Tissue, Organs, and Flow
pp. 1356
Mutual Scale
pp. 1379
Implicit Snakes: Active Constrained Implicit Models
pp. 1391
Classification of Breast Tumors on Digital Mammograms Using Laws’ Texture Features
pp. 1401
Interactive Visualisation of MRI Vector and Tensor Fields
pp. 1430
A Modular Robotic System for Ultrasound Image Acquisition
pp. 1435
Optimal Port Placement in Robot-Assisted Coronary Artery Bypass Grafting
Similar content
3,260
PRocH: Proof Reconstruction for HOL Light
Authors:
Cezary Kaliszyk
,
Josef Urban
Importing HOL Light into Coq
Authors:
Chantal Keller
,
Benjamin Werner
Evaluating Winding Numbers and Counting Complex Roots Through Cauchy Indices in Isabelle/HOL
Authors:
Wenda Li
,
Lawrence Paulson
See all similar
Cited by
53
The HOL Light Theory of Euclidean Space
Authors:
John Harrison
Premise Selection for Mathematics by Corpus Analysis and Kernel Methods
Authors:
Jesse Alama
,
Tom Heskes
,
Daniel Kühlwein
…
A Proof-Producing Decision Procedure for Real Arithmetic
Authors:
Sean McLaughlin
,
John Harrison
See all cited by