Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
16
views
26
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,553
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
LATIN 2000: Theoretical Informatics : 4th Latin American Symposium, Punta del Este, Uruguay, April 10-14, 2000 Proceedings
The Multi-user Security of Double Encryption
other
Author(s):
Viet Tung Hoang
,
Stefano Tessaro
Publication date
(Online):
April 01 2017
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Security and Safety (S&S)
Most cited references
26
Record
: found
Abstract
: not found
Book Chapter
: not found
Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements
Mihir Bellare
,
Alexandra Boldyreva
,
Silvio Micali
(2000)
0
comments
Cited
45
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
“Balls into Bins” — A Simple and Tight Analysis
Martin Raab
,
Angelika Steger
(1998)
0
comments
Cited
41
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Indistinguishability of Random Systems
Ueli Maurer
(2002)
0
comments
Cited
32
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2017
Publication date (Online):
April 01 2017
Pages
: 381-411
DOI:
10.1007/978-3-319-56614-6_13
SO-VID:
5a2aed5c-c61c-41ab-a951-acc51c3016cb
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Learning-Based Pseudo-Relevance Feedback for Patent Retrieval
pp. 1
Multimodal Shape Tracking with Point Distribution Models
pp. 1
Methodologies for Automated Telephone Answering
pp. 1
Dependency Structures Derived from Minimalist Grammars
pp. 1
System specification and refinement in temporal logic
pp. 1
Automatic Ontology Population from Product Catalogs
pp. 1
The SAHARA Model for Service Composition across Multiple Providers
pp. 1
A Constrained Semi-supervised Learning Approach to Data Association
pp. 1
Automated Innovization for Simultaneous Discovery of Multiple Rules in Bi-objective Problems
pp. 1
Note on the Convergence of the Implicit Euler Method
pp. 1
Integration of Ant Colony SOM and K-Means for Clustering Analysis
pp. 1
Organizational Transformation Through E-Government: Myth or Reality?
pp. 1
Intruder Theories (Ongoing Work)
pp. 1
Some History of Functional Programming Languages
pp. 1
Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning
pp. 1
Latency and User Behaviour on a Multiplayer Game Server
pp. 1
Cumulative Effects and Emergent Properties of Multiple-Use Natural Resources
pp. 1
Discrete Pulse Transform of Images
pp. 1
Odd Perfect Sequences and Sets of Spreading Sequences with Zero or Low Odd Periodic Correlation Zone
pp. 1
Transaction Processing Performance Council (TPC): Twenty Years Later – A Look Back, a Look Ahead
pp. 1
Audition of Web Services for Testing Conformance to Open Specified Protocols
pp. 1
The complexity of manipulating hierarchically defined sets of rectangles
pp. 3
Technical Foundation and Calibration Methods for Time-of-Flight Cameras
pp. 3
Foothill: A Quasiconvex Regularization for Edge Computing of Deep Neural Networks
pp. 3
Fundamentals of Inclusive HCI Design
pp. 11
Complexity of quantifier elimination in the theory of ordinary differential equations
pp. 13
The evolution of GSM
pp. 13
The Temporal Explorer Who Returns to the Base
pp. 14
Effects of Global and Local Processing on Visuospatial Working Memory
pp. 16
The CLEF Monolingual Grid of Points
pp. 16
Enhancing Particle Filters Using Local Likelihood Sampling
pp. 16
ProvGen: Generating Synthetic PROV Graphs with Predictable Structure
pp. 17
Constructive Roofs from Solid Building Primitives
pp. 17
Publishing Time-Series Data under Preservation of Privacy and Distance Orders
pp. 17
Matrix Multiplication on High-Density Multi-GPU Architectures: Theoretical and Experimental Investigations
pp. 18
On the Complexity of Universal Programs
pp. 18
A Context Model for Personal Knowledge Management Applications
pp. 19
Inspection Coming Due! How to Determine the Service Interval of Your Processes!
pp. 2
On the economy of doing Mathematics
pp. 20
A Ruleset Reduction Algorithm for the XCS Learning Classifier System
pp. 20
Symbolic Computation and Automated Reasoning for Program Analysis
pp. 24
Mining Databases and Data Streams with Query Languages and Rules
pp. 3
Efficient spatial point location
pp. 8
Data Privacy
pp. 9
Evolving Multi-label Classification Rules with Gene Expression Programming: A Preliminary Study
pp. 13
Requirements Engineering: Problem Analysis and Solution Specification (Extended Abstract)
pp. 16
Building Applications for Ubiquitous Computing Environments
pp. 18
The Art of Building a Good Benchmark
pp. 20
Event Handoff Unobservability in WSN
pp. 21
Evolutionary Search of Thresholds for Robust Feature Set Selection: Application to the Analysis of Microarray Data
pp. 21
Emotions and Personality in Agent Design and Modeling
pp. 22
CCTV Video Analytics: Recent Advances and Limitations
pp. 22
Tabu Search Method for Determining Sequences of Amino Acids in Long Polypeptides
pp. 25
The Computer-Aided Discovery of Scientific Knowledge
pp. 26
Arrival Process-Controlled Adaptive Media Playout for Video Streaming
pp. 26
Next Generation HPC Clouds: A View for Large-Scale Scientific and Data-Intensive Applications
pp. 27
Least fixed points revisited
pp. 27
An Enhanced Multi-Agent System with Evolution Mechanism to Approximate Physarum Transport Networks
pp. 28
Tracking Real-World Phenomena with Smart Dust
pp. 3
Automatic Verification of Data-Centric Business Processes
pp. 33
Complexity of algebraic specifications
pp. 33
Round-Optimal Perfectly Secret Message Transmission with Linear Communication Complexity
pp. 34
Access Control in Multi-party Wireless Sensor Networks
pp. 35
3. Orthogonal Distance Fitting of Implicit Curves and Surfaces
pp. 35
Image-schemata-based spatial inferences: The container-surface algebra
pp. 40
Efficient management of backtracking in AND-Parallelism
pp. 40
The Topological Profile of a Model of Protein Network Evolution Can Direct Model Improvement
pp. 46
Investigating Scaling of an Abstracted LCS Utilising Ternary and S-Expression Alphabets
pp. 52
Analysis of Cray XC30 Performance Using Trinity-NERSC-8 Benchmarks and Comparison with Cray XE6 and IBM BG/Q
pp. 59
Timed Process Algebra (With a Focus on Explicit Termination and Relative-Timing)
pp. 13
Attaining Human–Competitive Game Playing with Genetic Programming
pp. 17
Empowerment by Digital Media of People with Disabilities
pp. 23
Efficient Algorithms for Detecting Regular Point Configurations
pp. 25
PeerAssist: A P2P Platform Supporting Virtual Communities to Assist Independent Living of Senior Citizens
pp. 26
ASASP: Automated Symbolic Analysis of Security Policies
pp. 27
Find the Missing Element! Haptic Identification of Incomplete Pictures by Sighted and Visually Impaired Children
pp. 31
Analysing Warranty Claims of Automobiles
pp. 33
Variations on Instant Insanity
pp. 33
Improved Algorithms for Sparse MAX-SAT and MAX-k-CSP
pp. 34
Ontology Matching with Word Embeddings
pp. 35
Inferring POP-Level ISP Topology through End-to-End Delay Measurement
pp. 37
Hidden Markov Modelling Techniques for Haplotype Analysis
pp. 38
Sub-tree Swapping Crossover and Arity Histogram Distributions
pp. 39
Reversibility of Elementary Cellular Automata under Fully Asynchronous Update
pp. 4
Mean-Variance Analysis: A New Document Ranking Theory in Information Retrieval
pp. 4
Towards Urban Vehicular Networking
pp. 44
Parameter Estimators of Sparse Random Intersection Graphs with Thinned Communities
pp. 44
Networked Slepian-Wolf: Theory and Algorithms
pp. 46
An $O(\sqrt n)$ Space Bound for Obstruction-Free Leader Election
pp. 47
On Type Checking Delta-Oriented Product Lines
pp. 47
Improving ABT Performance by Adding Synchronization Points
pp. 49
Regularization Techniques to Improve Generalization
pp. 49
Multi-Agent Systems: Modeling and Verification Using Hybrid Automata
pp. 50
A Knowledge-Based Approach for Designing Robust Business Processes
pp. 51
Enabling Minimal Dominating Set in Highly Dynamic Distributed Systems
pp. 53
Input/Output Stochastic Automata
pp. 53
Verification and Validation of Agent-Based Simulations Using Approximate Model Checking
pp. 53
Designing and implementing inter-client communication in the O 2 object-oriented database management system
pp. 58
Reducing Complexity Assumptions for Statistically-Hiding Commitment
pp. 59
Learning Hybrid Process Models from Events
pp. 61
Dynamic Sparse-Matrix Allocation on GPUs
pp. 91
Using the Spec# Language, Methodology, and Tools to Write Bug-Free Programs
pp. 105
Segment Abstraction for Worst-Case Execution Time Analysis
pp. 28
SMT-Based Bisimulation Minimisation of Markov Models
pp. 39
On Scoping Stakeholders and Artifacts in Software Process
pp. 44
Analysis of Paris Metro Pricing Strategy for QoS with a Single Service Provider
pp. 45
Defining Proficiency Levels of High School Students in Computer Science by an Empirical Task Analysis Results of the MoKoM Project
pp. 49
Computing ray class groups, conductors and discriminants
pp. 49
Deep Structure of Images in Populations Via Geometric Models in Populations
pp. 49
Early-Stopping k-Set Agreement in Synchronous Systems Prone to Any Number of Process Crashes
pp. 51
Design Space Exploration for Massively Parallel Processor Arrays
pp. 52
Efficient Local Alignment Discovery amongst Noisy Long Reads
pp. 54
Question Generation from a Knowledge Base
pp. 57
Further Algebraic Algorithms in the Congested Clique Model and Applications to Graph-Theoretic Problems
pp. 57
Improving Automatic Image Annotation Based on Word Co-occurrence
pp. 61
A Pattern Matching Compiler for Multiple Target Languages
pp. 63
On the Logical Content of Computational Type Theory: A Solution to Curry’s Problem
pp. 69
Finding Relevant Items: Attentional Guidance Improves Visual Selection Processes
pp. 71
Local Patterns: Theory and Practice of Constraint-Based Relational Subgroup Discovery
pp. 71
More Efficient Algorithms for Mining High-Utility Itemsets with Multiple Minimum Utility Thresholds
pp. 74
Monitoring Learning Activities in PLE Using Semantic Modelling of Learner Behaviour
pp. 79
Price-Based Resource Allocation in Wireless Ad Hoc Networks
pp. 85
Mutually supervised learning in multiagent systems
pp. 103
Quantitative Information Flow in Boolean Programs
pp. 29
Reinforcement Learning and Apprenticeship Learning for Robotic Control
pp. 35
Improving the Re-digitisation Process by Using Software with Automatic Metadata Detection
pp. 47
A (4n − 4)-Bit Representation of a Rectangular Drawing or Floorplan
pp. 48
Propositional Distances and Preference Representation
pp. 50
Closing the Gap Between Deep and Conventional Image Registration Using Probabilistic Dense Displacement Networks
pp. 55
Completeness Results for Counting Problems with Easy Decision
pp. 57
Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges
pp. 59
Ensemble Techniques for Parallel Genetic Programming Based Classifiers
pp. 64
D-Case Communicator: A Web Based GSN Editor for Multiple Stakeholders
pp. 68
Efficient Indexed Alignment of Contigs to Optical Maps
pp. 69
Analysis of Peer-to-Peer Traffic on ADSL
pp. 71
Non-destructive depth-dependent crossover for genetic programming
pp. 83
Geometrically deformable templates for shape-based segmentation and tracking in cardiac MR images
pp. 83
SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks
pp. 88
Type Reconstruction for the Linear π-Calculus with Composite and Equi-Recursive Types
pp. 88
The Finite Graph Problem for Two-Way Alternating Automata
pp. 89
Making Explicit the Formalism Underlying Evaluation in Music Information Retrieval Research: A Look at the MIREX Automatic Mood Classification Task
pp. 96
Utilizing Online Social Network and Location-Based Data to Recommend Products and Categories in Online Marketplaces
pp. 100
Conceptual Modeling for Distributed Ontology Environments
pp. 33
The Isabelle Framework
pp. 33
“Technology Should Be Smarter Than This!”: A Vision for Overcoming the Great Authentication Fatigue
pp. 42
On Compiling CNF into Decision-DNNF
pp. 51
Tangible Programming Gimmick Using RFID Systems Considering the Use of Visually Impairments
pp. 54
Applying ICA Mixture Analysis for Segmenting Liver from Multi-phase Abdominal CT Images
pp. 59
Basic Object Oriented Genetic Programming
pp. 61
An Open Market-Based Architecture for Distributed Computing
pp. 62
Voronoi Diagrams for Moving Disks and Applications
pp. 73
PAC-Learning with General Class Noise Models
pp. 74
An Improved Exact Algorithm for TSP in Degree-4 Graphs
pp. 75
ParaShares: Finding the Important Basic Blocks in Multithreaded Programs
pp. 76
Strategic Analysis in Telecommunication Project Management System
pp. 77
Frugal Streaming for Estimating Quantiles
pp. 80
A Survey of Discriminant Counting
pp. 81
Privacy-Aware Collaborative Access Control in Web-Based Social Networks
pp. 82
Compositional Runtime Enforcement
pp. 92
Common Topic Group Mining for Web Service Discovery
pp. 94
Virtual Environments for Motor Fine Skills Rehabilitation with Force Feedback
pp. 94
An Experience in Ada Multicore Programming: Parallelisation of a Model Checking Engine
pp. 95
A new approach to control flow analysis
pp. 96
Exploration of Finite 2D Square Grid by a Metamorphic Robotic System
pp. 96
Oblivious Transfer with Access Control : Realizing Disjunction without Duplication
pp. 100
Applied Games – In Search of a New Definition
pp. 101
Formalizing FreeRTOS: First Steps
pp. 109
sPAC (Web Services Performance Analysis Center): Performance Analysis and Estimation Tool of Web Services
pp. 109
A Note on Redundant Rules in Rule-Based Constraint Programming
pp. 109
The Kell Calculus: Operational Semantics and Type System
pp. 111
A Depth-First Branch and Bound Algorithm for Learning Optimal Bayesian Networks
pp. 111
Compact Translations of Non-disjunctive Answer Set Programs to Propositional Clauses
pp. 111
Incrementing Multi-objective Evolutionary Algorithms: Performance Studies and Comparisons
pp. 114
Opportunistic Packet Scheduling in Body Area Networks
pp. 120
Automated Reasoning Service for HOL Light
pp. 120
Bluetooth Tracking without Discoverability
pp. 121
A Boyer-Moore Type Algorithm for Timed Pattern Matching
pp. 123
Upper Bounds on the Size of One-Way Quantum Finite Automata
pp. 123
Translating Orc Features into Petri Nets and the Join Calculus
pp. 123
Soft genetic operators in Evolutionary Algorithms
pp. 125
Applying Geometric Function on Sensors 3D Gait Data for Human Identification
pp. 219
Inflectional Morphology Analyzer for Sanskrit
pp. 378
Operational Semantics and Program Equivalence
pp. 42
Default Conceptual Graph Rules, Atomic Negation and Tic-Tac-Toe
pp. 59
Spatial Graphs for Intra-cranial Vascular Network Characterization, Generation, and Discrimination
pp. 70
Cooperative Ant Colonies for Optimizing Resource Allocation in Transportation
pp. 72
Fast Film Genres Classification Combining Poster and Synopsis
pp. 75
Randomized Parallel Proof-Number Search
pp. 78
Evolution of an Efficient Search Algorithm for the Mate-In-N Problem in Chess
pp. 79
Square Kufic Pattern Formation by Asynchronous Cellular Automata
pp. 81
N-gram Based Approach for Opinion Mining of Punjabi Text
pp. 81
Users as Smart Sensors: A Mobile Platform for Sensing Public Transport Incidents
pp. 83
Explaining Bayesian Networks Using Argumentation
pp. 84
A Global Characterization of Envy-Free Truthful Scheduling of Two Tasks
pp. 87
Multiple Sclerosis Detection via Wavelet Entropy and Feedforward Neural Network Trained by Adaptive Genetic Algorithm
pp. 92
Implementation of Nondeterministic Finite Automata for Approximate Pattern Matching
pp. 103
Mechanizing verification of arithmetic circuits: SRT division
pp. 106
Extracting Dependency Trees from Sanskrit Texts
pp. 106
On the V γ Dimension for Regression in Reproducing Kernel Hilbert Spaces
pp. 1065
Garbage Collection in the Presence of Remote Objects: An Empirical Study
pp. 110
Basis Expansion in Natural Actor Critic Methods
pp. 111
Computing Longest Common Subsequences with the B-Cell Algorithm
pp. 114
Region-Based Segmentation on Evolving Surfaces with Application to 3D Reconstruction of Shape and Piecewise Constant Radiance
pp. 115
Number of Shortest Paths in Triangular Grid for 1- and 2-Neighborhoods
pp. 116
Machine Learning for Performance Enhancement of Molecular Dynamics Simulations
pp. 118
CSP with Hierarchical State
pp. 122
LUTE (Local Unpruned Tuple Expansion): Accurate Continuously Flexible Protein Design with General Energy Functions and Rigid-rotamer-like Efficiency
pp. 129
Directed Transitive Signature Scheme
pp. 130
Integrating Object-Oriented and Ontological Representations: A Case Study in Java and OWL
pp. 131
Designing Good Semi-structured Databases
pp. 141
Adaptation of Open Component-Based Systems
pp. 17
State Management Issues and Grid Services
pp. 46
The Value of Multimodal Data in Classification of Social and Emotional Aspects of Tutoring
pp. 65
Forecasting Corporate Bankruptcy with an Ensemble of Classifiers
pp. 84
Deep Ranking Model for Person Re-identification with Pairwise Similarity Comparison
pp. 84
Genes Related with Alzheimer’s Disease: A Comparison of Evolutionary Search, Statistical and Integer Programming Approaches
pp. 85
Research and Simulation on Virtual Movement Based on Kinect
pp. 86
Improved Combinatorial Group Testing for Real-World Problem Sizes
pp. 91
Design and implementation of object-oriented views
pp. 99
Generation and Exploration of Architectural Form Using a Composite Cellular Automata
pp. 99
Using Symbolic Model Checking to Verify the Railway Stations of Hoorn-Kersenboogerd and Heerhugowaard
pp. 104
Propagation and leader election in a multihop broadcast environment
pp. 106
Physics and the new computation
pp. 107
Image Deblurring in the Presence of Salt-and-Pepper Noise
pp. 111
Aligator.jl – A Julia Package for Loop Invariant Generation
pp. 113
Synchronized Dancing of Oblivious Chameleons
pp. 114
Looking for an analogue of Rice's Theorem in circuit complexity theory
pp. 115
Semi-dynamic Connectivity in the Plane
pp. 119
Causal Camera Motion Estimation by Condensation and Robust Statistics Distance Measures
pp. 119
OMEN: Faster Password Guessing Using an Ordered Markov Enumerator
pp. 119
Directions of motion fields are hardly ever ambiguous
pp. 121
New Methods for Passive Estimation of TCP Round-Trip Times
pp. 125
Monitoring and Reputation Mechanisms for Service Level Agreements
pp. 125
Relational Association Rules: Getting Warmer
pp. 128
Sometimes travelling is easy: The master tour problem
pp. 130
Distributed fault location in networks using mobile agents
pp. 132
A Single-Enqueuer Wait-Free Queue Implementation
pp. 132
Towards Mathematical AI via a Model of the Content and Process of Mathematical Question and Answer Dialogues
pp. 134
Generic Multiversion STM
pp. 137
The Aleph Toolkit: Support for Scalable Distributed Shared Objects
pp. 139
Automatic Evaluation of Context-Free Grammars (System Description)
pp. 145
Identity-Based Multi-signatures from RSA
pp. 145
Abstract Machines of Systems Biology
pp. 146
Interoperability on XML Data
pp. 146
Completeness and Decidability Results for Hybrid(ised) Logics
pp. 148
Type-Indexed Data Types
pp. 152
The twisted cube
pp. 154
Argumentation Strategies for Collaborative Plan Resourcing
pp. 170
A Calculus for Interaction Nets
pp. 173
Some algorithmic and proof-theoretical aspects of coercive subtyping
pp. 185
Digital Concept Maps for Managing Knowledge and Information
pp. 200
On questions of fairness and temporal logic for conflict-free Petri nets
pp. 207
Gesture Interfaces with Depth Sensors
pp. 215
A Clear Picture of Lens Laws
pp. 73
R-fuzzy automata with a time-variant structure
pp. 78
Using Visualization Process Graphs to Improve Visualization Exploration
pp. 80
Sample Size Estimation for Statistical Comparative Test of Training by Using Augmented Reality via Theoretical Formula and OCC Graphs: Aeronautical Case of a Component Assemblage
pp. 82
On set systems with restricted intersections modulo a composite number
pp. 85
Uniqueness Filtering for Local Feature Descriptors in Urban Building Recognition
pp. 97
List Decoding of Binary Codes–A Brief Survey of Some Recent Results
pp. 107
Document Provenance in the Cloud: Constraints and Challenges
pp. 109
STAR — A multimedia database system for trademark registration
pp. 115
On the Scalability of Routing Integrated Time Synchronization
pp. 117
Boolean reasoning for feature extraction problems
pp. 126
Briviesca in the 15th c.: A Virtual Reality Environment for Teaching Purposes
pp. 127
Modeling Negative Affect Detector of Novice Programming Students Using Keyboard Dynamics and Mouse Behavior
pp. 128
Information Theoretic Security Based on Bounded Observability
pp. 133
A characterization of recognizable picture languages
pp. 136
Variable Metric Reinforcement Learning Methods Applied to the Noisy Mountain Car Problem
pp. 142
Lock-Free Dynamically Resizable Arrays
pp. 142
A cellular-programming approach to pattern classification
pp. 151
Inferring Identity Using Accelerometers in Television Remote Controls
pp. 152
The Aircraft Sequencing Problem
pp. 157
Breaking Symmetries in Graphs: The Nauty Way
pp. 160
Correction and Extension of WordNet 1.7
pp. 173
Zooming in on Ontologies: Minimal Modules and Best Excerpts
pp. 180
There Is a Reason for Everything (Probably): On the Application of Maxent to Induction
pp. 184
Time-Specific Encryption from Forward-Secure Encryption
pp. 186
Data Poisoning Attacks in Contextual Bandits
pp. 188
Sampling semantics of Duration Calculus
pp. 56
Handling Inconsistency with Preference-Based Argumentation
pp. 67
An Adaptive Prequential Learning Framework for Bayesian Network Classifiers
pp. 81
Towards a parallel C++ programming language based on commodity object-oriented technologies
pp. 83
Elastic Registration of 3D Ultrasound Images
pp. 97
VR-Based Simulation for the Learning of Gynaecological Examination
pp. 110
Visualizing Elements of Sha[3] in Genus 2 Jacobians
pp. 113
ACO Beats EA on a Dynamic Pseudo-Boolean Function
pp. 124
Adaptation Layer and Group Communication Server for Reliable Multipoint services in ATM networks
pp. 130
Evolving Finite State Transducers: Some Initial Explorations
pp. 133
Improved Algorithms for Computing k-Sink on Dynamic Flow Path Networks
pp. 133
Online Control Message Aggregation in Chain Networks
pp. 133
Self Modifying Cartesian Genetic Programming: Fibonacci, Squares, Regression and Summing
pp. 134
Discrete Choice Models of Bidder Behavior in Sponsored Search
pp. 139
Cartesian GP in Optimization of Combinational Circuits with Hundreds of Inputs and Thousands of Gates
pp. 145
Extraction of Semantic Dynamic Content from Videos with Probabilistic Motion Models
pp. 152
Approximation Algorithms for Wavelength Assignment
pp. 160
Optimal Issuing of Perishables with a Short Fixed Shelf Life
pp. 165
RAGE Reusable Game Software Components and Their Integration into Serious Game Engines
pp. 167
The SCAM Framework: Helping Semantic Web Applications to Store and Access Metadata
pp. 176
Progress on the State Explosion Problem in Model Checking
pp. 178
Using Semantic Distances for Reasoning with Inconsistent Ontologies
pp. 184
Compositional modeling and verification of workflow processes
pp. 184
Block-Deterministic Regular Languages
pp. 199
New structural invariants for Petri nets analysis
pp. 203
Weakest Precondition Synthesis for Compiler Optimizations
pp. 219
Database Replication: A Tutorial
pp. 251
On the Modeling, Refinement and Integration of Decentralized Agent Coordination
pp. 83
Parallelization via constrained storage mapping optimization
pp. 88
Plug and Play Approach to Validation of Particle-Based Algorithms
pp. 90
User Behavior Shift Detection in Intelligent Environments
pp. 94
Mobile Personal Health Care System for Patients with Diabetes
pp. 108
Growth Optimal Investment with Transaction Costs
pp. 119
Online load balancing of temporary tasks
pp. 120
Can Gender Be Predicted from Near-Infrared Face Images?
pp. 128
Immune-Based Framework for Exploratory Bio-information Retrieval from the Semantic Web
pp. 139
Model Generation for Distributed Java Programs
pp. 142
Marker guided registration of electromagnetic dipole data with tomographic images
pp. 142
Design Issues of Information and Communication Systems for New Generation Industrial Enterprises
pp. 143
GP-Robocode: Using Genetic Programming to Evolve Robocode Players
pp. 144
Partitioning and Vectorizing Binary Applications for a Reconfigurable Vector Computer
pp. 145
Assigning Unique Keys to Chemical Compounds for Data Integration: Some Interesting Counter Examples
pp. 156
Decision Trees: More Theoretical Justification for Practical Algorithms
pp. 162
A characterization of Floyd-provable programs
pp. 165
Color Correction: A Novel Weighted Von Kries Model Based on Memory Colors
pp. 166
Generalized ATM Fraud Detection
pp. 172
Prediction of Communication Latency over Complex Network Behaviors on SMP Clusters
pp. 172
Using 3D Line Segments for Robust and Efficient Change Detection from Multiple Noisy Images
pp. 195
Statistical Learning for Inductive Query Answering on OWL Ontologies
pp. 207
SofTOA: Software Ranging for TOA-Based Positioning of WLAN Terminals
pp. 220
Weak Transitivity in Coercive Subtyping
pp. 240
Efficient Semantic Service Discovery in Pervasive Computing Environments
pp. 247
Specification and refinement of finite dataflow networks — a relational approach
pp. 106
A Two-Stage Pretraining Algorithm for Deep Boltzmann Machines
pp. 108
Categorized EEG Neurofeedback Performance Unveils Simultaneous fMRI Deep Brain Activation
pp. 109
Skin Patch Detection in Real-World Images
pp. 124
Automatic Modeling of Dominance Effects Using Granger Causality
pp. 126
Crowdsourced Emphysema Assessment
pp. 131
Connected domination and steiner set on asteroidal triple-free graphs
pp. 132
Variation in Artificial Immune Systems: Hypermutations with Mutation Potential
pp. 135
The SCIFF Abductive Proof-Procedure
pp. 150
Root Cause Analysis and Gap Analysis – A Tale of Two Methods
pp. 155
Incorporating Learning Probabilistic Context-Sensitive Grammar in Genetic Programming for Efficient Evolution and Adaptation of Snakebot
pp. 156
Shortest Path Problems on a Polyhedral Surface
pp. 157
Crochemore Factorization of Sturmian and Other Infinite Words
pp. 170
A Feature-Based Approach for Determining Dense Long Range Correspondences
pp. 173
Generalizations of Hedberg’s Theorem
pp. 176
Making Apps Useable on Multiple Different Mobile Platforms: On Interoperability for Business Application Development on Smartphones
pp. 188
A Pragmatic Approach for Building a User-Friendly and Flexible UML Model Repository
pp. 197
SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-on Platforms
pp. 197
Near-Optimal Distributed Tree Embedding
pp. 198
Automated Verification of Chapel Programs Using Model Checking and Symbolic Execution
pp. 217
Dealing with Changes of Time-Aware Processes
pp. 231
Unified Syntax for Abstract State Machines
pp. 234
Formal derivation of a loadable asynchronous counter
pp. 313
On Teaching Fast Adder Designs: Revisiting Ladner & Fischer
pp. 82
Modeling and Reasoning about Service Behaviors and Their Compositions
pp. 114
Fisher Kernels for Relational Data
pp. 124
Multiple-Classifier Fusion Using Spatial Features for Partially Occluded Handwritten Digit Recognition
pp. 127
The RedBlue Adaptive Universal Constructions
pp. 138
On-Line Probability, Complexity and Randomness
pp. 145
LocalRank: Ranking Web Pages Considering Geographical Locality by Integrating Web and Databases
pp. 157
Multimodal Interaction Concepts for Mobile Augmented Reality Applications
pp. 178
Total Variation Restoration of Images Corrupted by Poisson Noise with Iterated Conditional Expectations
pp. 179
A Unified Tool for Performance Modelling and Prediction
pp. 187
An evolutionary hybrid metaheuristic for solving the vehicle routing problem with heterogeneous fleet
pp. 190
Belief Functions: A Revision of Plausibility Conflict and Pignistic Conflict
pp. 192
Evolving Turing Machines for Biosequence Recognition and Analysis
pp. 198
Expert Feature-Engineering vs. Deep Neural Networks: Which Is Better for Sensor-Free Affect Detection?
pp. 201
Coupling and Self-stabilization
pp. 202
Practically Efficient Multi-party Sorting Protocols from Comparison Sort Algorithms
pp. 205
Aerial Scene Understanding Using Deep Wavelet Scattering Network and Conditional Random Field
pp. 220
Disperse or Unite? A Mathematical Model of Coordinated Attack
pp. 220
Compiling SA-C Programs to FPGAs: Performance Results
pp. 221
Trust Games as a Model for Requests
pp. 226
Abstract state machines: Designing distributed systems with state machines and B
pp. 229
Modeling Documents by Combining Semantic Concepts with Unsupervised Statistical Learning
pp. 283
User centered knowledge-based system design: a formal modelling approach
pp. 285
LEO: A Concept Map Based Course Visualization Tool for Instructors and Students
pp. 415
Numerical Method for Comparison on Homomorphically Encrypted Numbers
pp. 124
GEOFF — A geometrical editor for fold formation
pp. 124
Biological Indexes Based Reflectional Asymmetry for Classifying Cutaneous Lesions
pp. 132
MDA Applied: From Sequence Diagrams to Web Service Choreography
pp. 145
A Taxonomy of Cyber Awareness Questions for the User-Centered Design of Cyber Situation Awareness
pp. 145
Characters in Search of an Author: AI-Based Virtual Storytelling
pp. 151
A Fingerprint Authentication System Based on Mobile Phone
pp. 151
Application of the Laplacian Pyramid Decomposition to the Enhancement of Digital Dental Radiographic Images for the Automatic Person Identification
pp. 153
Scene Understanding through Autonomous Interactive Perception
pp. 162
Remarks on a Sequence of Minimal Niven Numbers
pp. 163
Revisiting the Minimum Breakpoint Linearization Problem
pp. 169
Towards a Better Understanding of Incremental Learning
pp. 181
On the transfer of control between contexts
pp. 181
Risk Assessment of End-to-End Disconnection in IP Networks due to Network Failures
pp. 183
Exploring Grammatical Evolution for Horse Gait Optimisation
pp. 192
Online Grocery Shopping: Identifying Change in Consumption Practices
pp. 195
Two Constant-Factor-Optimal Realizations of Adaptive Heapsort
pp. 202
A Parametric Polynomial Deterministic Algorithm for #2SAT
pp. 207
Stuttering Mostly Speeds Up Solving Parity Games
pp. 207
On the Extent and Nature of Software Reuse in Open Source Java Projects
pp. 209
Application of RFID Technology at the Entrance Gate of Container Terminals
pp. 210
Information Scent, Searching and Stopping
pp. 221
Boosting Design Space Explorations with Existing or Automatically Learned Knowledge
pp. 252
A Sound and Complete Shared-Variable Concurrency Model for Multi-threaded Java Programs
pp. 259
Knowledge Acquisition from Multiple Experts Based on Semantics of Concepts
pp. 300
INAM2: InfiniBand Network Analysis and Monitoring with MPI
pp. 307
The Simeck Family of Lightweight Block Ciphers
pp. 317
Experience with Z developing a control program for a radiation therapy machine
pp. 102
Reducing the Integration of Public Administration Databases to Approximate Tree Matching
pp. 136
Boosting Convolutional Filters with Entropy Sampling for Optic Cup and Disc Image Segmentation from Fundus Images
pp. 136
Mining Query Logs of USPTO Patent Examiners
pp. 156
A Systematic Review of Technologies Designed to Improve and Assist Cognitive Decline for Both the Current and Future Aging Populations
pp. 157
FACERET: An Interactive Face Retrieval System Based on Self-Organizing Maps
pp. 157
Attribute Reduction in Concept Lattice Based on Discernibility Matrix
pp. 162
Stable model semantics for probabilistic deductive databases
pp. 163
Efficient Similar Trajectory-Based Retrieval for Moving Objects in Video Databases
pp. 168
Argumentation Theory for Decision Support in Health-Care: A Comparison with Machine Learning
pp. 172
Automatic Bridge Detection in High-Resolution Satellite Images
pp. 179
BayesianBand: Jam Session System Based on Mutual Prediction by User and System
pp. 181
Online Regression Competitive with Changing Predictors
pp. 184
A Comparison of Size Estimation Techniques Applied Early in the Life Cycle
pp. 185
A Surface Defect Detection Based on Convolutional Neural Network
pp. 186
Space Efficient Suffix Trees
pp. 189
A Formal Quantifier Elimination for Algebraically Closed Fields
pp. 190
Conceptual Integration of Flow-Based and Packet-Based Network Intrusion Detection
pp. 192
Dance in the World of Data and Objects
pp. 195
ubiSOAP: A Service Oriented Middleware for Seamless Networking
pp. 196
Computational Surface Flattening: A Voxel-Based Approach
pp. 198
Internal Clustering Evaluation of Data Streams
pp. 202
Coordination, Conventions and the Self-organisation of Sustainable Institutions
pp. 212
Phase-Correlation Guided Search for Realtime Stereo Vision
pp. 214
E-Textile Couch: Towards Smart Garments Integrated Furniture
pp. 217
Dynamic and Contextualised Behavioural Knowledge in Autonomic Communications
pp. 218
Design of nonlinear lag-lead compensators by extended linearization using symbolic computation techniques
pp. 227
Certified Higher-Order Recursive Path Ordering
pp. 233
Collusion-Free Policy-Based Encryption
pp. 238
Efficient Symmetry Breaking in Multi-Channel Radio Networks
pp. 240
First-Order Formative Rules
pp. 240
Symbolic Rule Extraction from the DIMLP Neural Network
pp. 241
Nondeterministic Light Logics and NP-Time
pp. 246
On Two Models of Noninterference: Rushby and Greve, Wilding, and Vanfleet
pp. 247
Incorporating user preferences in multimedia queries
pp. 257
Optimal Dynamic Range Searching inNon-replicating Index Structures
pp. 307
The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection
pp. 137
Approximate Reducts and Association Rules
pp. 161
A Scalable Solution for Adaptive Problem Sequencing and Its Evaluation
pp. 186
Error Bounds Between Marginal Probabilities and Beliefs of Loopy Belief Propagation Algorithm
pp. 197
Partially Additive Categories and Fully Complete Models of Linear Logic
pp. 197
Bagging Prediction for Censored Data: Application for Theatre Demand
pp. 204
Simulation of Heterogeneous Catalytic Reaction by Asynchronous Cellular Automata on Multicomputer
pp. 210
Formal Development and Assessment of a Reconfigurable On-board Satellite System
pp. 226
Service Discovery and Provision for Autonomic Mobile Computing
pp. 241
Recursive Function Definition for Types with Binders
pp. 250
Stable Models of Elliptic Curves, Ring Class Fields, and Complex Multiplication
pp. 268
Enumeration of Totally Real Number Fields of Bounded Root Discriminant
pp. 325
Rewriting P Systems with Conditional Communication
pp. 330
Solving Nonlinear Integer Arithmetic with MCSAT
pp. 344
Dynamic clustering in object databases exploiting effective use of relationships between objects
pp. 163
Mobile Interfaces for Better Living: Supporting Awareness in a Smart Home Environment
pp. 163
Range-Consistent Answers of Aggregate Queries under Aggregate Constraints
pp. 171
Partial Evaluation for Common Intermediate Language
pp. 179
Metrics for Uncertainty Analysis and Visualization of Diffusion Tensor Images
pp. 183
Does the Average Path Length Grow in the Internet?
pp. 187
Uncovering Artifacts of Flow Measurement Tools
pp. 189
A Vector Space Model for Ranking Entities and Its Application to Expert Search
pp. 197
Applications of Gibbs Measure Theory to Loopy Belief Propagation Algorithm
pp. 201
A Linear Grammar Approach to Mathematical Formula Recognition from PDF
pp. 205
Using UML and XMI for Generating Adaptive Navigation Sequences in Web-Based Systems
pp. 213
Profile-Based Optimal Matchings in the Student/Project Allocation Problem
pp. 216
Evaluating Feature Selection Algorithms
pp. 228
Perfect Sorting by Reversals Is Not Always Difficult
pp. 240
Analysis of the Insecurity of ECMQV with Partially Known Nonces
pp. 241
An Intelligent Hotel Room
pp. 241
Unsupervised Case Memory Organization: Analysing Computational Time and Soft Computing Capabilities
pp. 246
A GP Artificial Ant for image processing: preliminary experiments with EASEA.
pp. 253
Detection of unstable predicates in distributed programs
pp. 256
On Coalitions and Stable Winners in Plurality
pp. 263
An Algorithm for Computing Isomorphisms of Algebraic Function Fields
pp. 266
Clustering and Visualization in a Multi-lingual Multi-document Summarization System
pp. 275
The Weak Gap Property in Metric Spaces of Bounded Doubling Dimension
pp. 290
The DAML-S Virtual Machine
pp. 312
Subgraph Search over Massive Disk Resident Graphs
pp. 323
Abaris: Evaluating Automated Capture Applied to Structured Autism Interventions
pp. 116
New Testing Method for the Dyslexic and the Newly Blind with a Digital Audio Player and Document Structure Diagrams
pp. 179
Optimal Numerical Realization of the Energy Balance Equation for Wind Wave Models
pp. 184
How to Cut a Graph into Many Pieces
pp. 194
The GCA-w Massively Parallel Model
pp. 201
Topic Classification in Social Media Using Metadata from Hyperlinked Objects
pp. 205
An Investigation of Compact and Efficient Number Representations in the Pure Lambda Calculus
pp. 216
Hierarchical Clustering Analysis: The Best-Performing Approach at PAN 2017 Author Clustering Task
pp. 217
Limit Set Reachability in Asynchronous Graph Dynamical Systems
pp. 222
Strongly Stable Matchings in Time O(nm) and Extension to the Hospitals-Residents Problem
pp. 224
Cloud Computing Boosts Business Intelligence of Telecommunication Industry
pp. 245
Backwarding: An Overfitting Control for Genetic Programming in a Remote Sensing Application
pp. 253
Partitioning Real-Time Systems on Multiprocessors with Shared Resources
pp. 268
A Framework for Chosen IV Statistical Analysis of Stream Ciphers
pp. 274
Brain-Computer Interface as Networking Entity in Body Area Networks
pp. 275
Generalizing Labeled and Unlabeled Sample Compression to Multi-label Concept Classes
pp. 284
A Design and Planning Support System for Walkability and Pedestrian Accessibility
pp. 315
Revisiting Epistemic Specifications
pp. 315
Actors with Multi-headed Message Receive Patterns
pp. 372
Advanced Network Fingerprinting
pp. 385
On syntactic and semantic action refinement
pp. 391
Heterogeneous Design in Functional DIF
pp. 183
Informatics as Semiotics Engineering: Lessons Learned from Design, Development and Evaluation of Ambient Assisted Living Applications for Elderly People
pp. 198
CNN-LSTM Neural Network Model for Quantitative Strategy Analysis in Stock Markets
pp. 199
Reduction algorithms for constructing solutions in graphs with small treewidth
pp. 202
Effective Load-Balancing via Migration and Replication in Spatial Grids
pp. 205
Tiered Vectors: Efficient Dynamic Arrays for Rank-Based Sequences
pp. 221
Designing a Free Style, Indirect, and Interactive Storytelling Application for People with Aphasia
pp. 231
On the Correctness of an Intrusion-Tolerant Group Communication Protocol
pp. 245
A Study on the Influence of Caching: Sequences of Dense Linear Algebra Kernels
pp. 245
Using Mediated Identity-Based Cryptography to Support Role-Based Access Control
pp. 271
Completeness Analysis for Incomplete Object-Oriented Programs
pp. 275
Analysis and Support of Lifestyle via Emotions Using Social Media
pp. 276
Curves, Hypersurfaces, and Good Pairs of Adjacency Relations
pp. 276
Immunity from Spam: An Analysis of an Artificial Immune System for Junk Email Detection
pp. 278
Variational Time-Implicit Multiphase Level-Sets
pp. 281
A Framework for Outdoor Mobile Augmented Reality and Its Application to Mountain Peak Detection
pp. 282
On the Reformulation of Vehicle Routing Problems and Scheduling Problems
pp. 297
Tractable disjunctions of linear constraints
pp. 299
On Barriers and the Gap between Active and Passive Replication
pp. 307
A Semantic Approach to Interpolation
pp. 312
Computing L-Series of Hyperelliptic Curves
pp. 198
Discovery by Genetic Algorithm of Cellular Automata Rules for Pattern Reconstruction Task
pp. 199
Information Marginalization on Subgraphs
pp. 200
Centreline-Based Shape Descriptors of the Left Atrial Appendage in Relation with Thrombus Formation
pp. 210
Improved Throughput Bounds for Interference-Aware Routing in Wireless Networks
pp. 214
A GRASP Algorithm for Clustering
pp. 225
Parallel Homotopy Algorithms to Solve Polynomial Systems
pp. 234
The Max k-Cut Game and Its Strong Equilibria
pp. 239
What Feels Parallel Strongly Depends on Hand Orientation
pp. 243
Quality in Conceptual Modeling – New Research Directions
pp. 248
Finding Connected Dense \(k\)-Subgraphs
pp. 251
On the Performance of Approximate Equilibria in Congestion Games
pp. 260
Person Authentication by Air-Writing Using 3D Sensor and Time Order Stroke Context
pp. 260
Cross-Language Pseudo-Relevance Feedback Techniques for Informal Text
pp. 274
Estimating Intrinsic Images from Image Sequences with Biased Illumination
pp. 285
Space-time statistical model for functional MRI image sequences
pp. 285
Identification and Counter Abstraction for Full Virtual Symmetry
pp. 305
Certifying Machine Code Safety: Shallow Versus Deep Embedding
pp. 308
Exploiting the use of DAC in MAX-CSP
pp. 319
Contracting planar graphs efficiently in parallel
pp. 169
Clustering Supermarket Customers Using Rough Set Based Kohonen Networks
pp. 173
Scale-space boundary evolution initialized by cores
pp. 197
Evaluation of Features for Leaf Discrimination
pp. 207
Systematic Approach in Optimizing Numerical Memory-Bound Kernels on GPU
pp. 226
Efficient Algorithm for Linear Systems Arising in Solutions of Eigenproblems and Its Application to Electronic-Structure Calculations
pp. 227
tNote: A Social Network of Vehicles under Internet of Things
pp. 236
Clustering Data and Vague Concepts Using Prototype Theory Interpreted Label Semantics
pp. 245
A Real-Time Mesh Animation Framework Using Kinect
pp. 250
Formalising Ontologies and Their Relations
pp. 251
Computing the Visibility Map of Fat Objects
pp. 278
Tempus Fugit
pp. 286
Rich Words Containing Two Given Factors
pp. 288
A Quality Assurance Workflow for Ontologies Based on Semantic Regularities
pp. 307
Cryptographic protocols and voting
pp. 320
Pinch: An Interface That Relates Applications on Multiple Touch-Screen by ‘Pinching’ Gesture
pp. 321
CrowdFlow: Efficient Information Flow Security
pp. 331
Forgetting-Based Inconsistency Measure
pp. 340
Paraconsistent logic programming
pp. 341
Analyzing the Performance of Lock-Free Data Structures: A Conflict-Based Model
pp. 342
Efficient Hyperelliptic Arithmetic Using Balanced Representation for Divisors
pp. 352
Proof of separability A verification technique for a class of security kernels
pp. 355
Modified Affine Arithmetic Is More Accurate than Centered Interval Arithmetic or Affine Arithmetic
pp. 358
Specifying and Composing Interaction Protocols for Service-Oriented System Modelling
pp. 425
New Improvements of Davies-Murphy Cryptanalysis
pp. 156
Adaptive Control for Induction Servo Motor Based on Wavelet Neural Networks
pp. 192
CA Models of Myxobacteria Swarming
pp. 207
Classification of DNA Microarrays Using Artificial Bee Colony (ABC) Algorithm
pp. 223
Tracking Changing User Interests through Prior-Learning of Context
pp. 224
Network Intrusion Detection Using Wavelet Analysis
pp. 228
Using Multicast Transfers in the Replica Migration Problem: Formulation and Scheduling Heuristics
pp. 234
On the design of deadlock-free adaptive routing algorithms for multicomputers: Theoretical aspects
pp. 236
Line Matching Using Appearance Similarities and Geometric Constraints
pp. 242
Agents, Distributed Algorithms, and Stabilization
pp. 256
Pseudonyms in Cost-Sharing Games
pp. 264
On the Power of Nodes of Degree Four in the Local Max-Cut Problem
pp. 264
Hierarchical ER Diagrams (HERD) – The Method and Experimental Evaluation
pp. 273
Locating Multiple Gene Duplications through Reconciled Trees
pp. 297
Fast Techniques for Monocular Visual Odometry
pp. 306
Comparison of Public End-to-End Bandwidth Estimation Tools on High-Speed Links
pp. 310
Graph Based Family Relationship Recognition from a Single Image
pp. 313
Learning Classifiers Using Hierarchically Structured Class Taxonomies
pp. 317
Usage Control in Inter-organisational Collaborative Environments – A Case Study from an Industry Perspective
pp. 322
A Unified Framework for Atlas Matching Using Active Appearance Models
pp. 335
LaTeXML 2012 - A Year of LaTeXML
pp. 344
Tabu-Based Exploratory Evolutionary Algorithm for Effective Multi-objective Optimization
pp. 351
Evolutionary Inference of Attribute-Based Access Control Policies
pp. 357
The CVS algorithm for view synchronization in evolvable large-scale information systems
pp. 363
Synthetic domain theory in type theory: Another logic of computable functions
pp. 369
DrScheme: A pedagogic programming environment for scheme
pp. 394
Connectivity algorithms using rubber bands
pp. 434
Synthesis for Polynomial Lasso Programs
pp. 131
A Scalable Consent, Transparency and Compliance Architecture
pp. 198
Evaluating the Role of Vision and Force Feedback in Minimally Invasive Surgery: New Automated Laparoscopic Grasper and A Case Study
pp. 221
Parameterized Complexity of Coloring Problems: Treewidth versus Vertex Cover
pp. 240
Two-compartment stochastic model of a neuron with periodic input
pp. 242
Towards Ontology-Based Safety Information Management in the Aviation Industry
pp. 244
Agent-Based Simulation Replication: A Model Driven Architecture Approach
pp. 245
An Evolutionary Framework for Colorimetric Characterization of Scanners
pp. 255
Proactive Assistive Technology: An Empirical Study
pp. 281
3D Vessel Segmentation Using Random Walker with Oriented Flux Analysis and Direction Coherence
pp. 301
Overview of the CLEF-2019 CheckThat! Lab: Automatic Identification and Verification of Claims
pp. 301
Straight-Line Drawability of a Planar Graph Plus an Edge
pp. 368
Formal Stability Analysis of Optical Resonators
pp. 385
A Semantic E-Wallet to Reconcile Privacy and Context Awareness
pp. 158
Data Mining by Navigation – An Experience with Systems Biology
pp. 203
The role of abstraction in high-performance computing
pp. 207
Fitting a Least Absolute Deviation Regression Model on Interval-Valued Data
pp. 212
Modeling, Measuring and Monitoring the Quality of Information
pp. 223
Using User Profiles in Intelligent Information Retrieval
pp. 224
Dynamization of decomposable searching problems yielding good worst-case bounds
pp. 234
Game Description Language Compiler Construction
pp. 235
Cooperative Integrated Web-Based Negotiation and Decision Support System for Real Estate
pp. 240
The Provenance Store prOOst for the Open Provenance Model
pp. 243
Aligning Concave and Convex Shapes
pp. 252
A Practical Set of Culture Dimensions for Global User-Interface Development
pp. 255
Image Filter Design with Evolvable Hardware
pp. 263
Exploratory Trajectory Clustering with Distance Geometry
pp. 275
Revisiting Robust Visual Tracking Using Pixel-Wise Posteriors
pp. 278
From Ontology to Relational Databases
pp. 319
Risk Assessment in Drinking Water Production Using Belief Functions
pp. 336
Gabor-Eigen-Whiten-Cosine: A Robust Scheme for Face Recognition
pp. 354
A Lambda Calculus for Quantum Computation with Classical Control
pp. 354
Adaptive Software Transactional Memory
pp. 162
Towards Accessible Interactions with Pervasive Interfaces, Based on Human Capabilities
pp. 214
Model of a Vascular C-Arm for 3D Augmented Fluoroscopy in Interventional Radiology
pp. 217
Missing Value Imputation Using a Semi-supervised Rank Aggregation Approach
pp. 238
Efficient Algorithms for Approximating a Multi-dimensional Voxel Terrain by a Unimodal Terrain
pp. 254
A construction for enumerating k-coloured Motzkin paths
pp. 264
Photoconsistent Relative Pose Estimation between a PMD 2D3D-Camera and Multiple Intensity Cameras
pp. 265
Integration of Broadband and Broadcasting Wireless Technologies at the UMTS Radio Access Level
pp. 266
Better Polynomial Algorithms on Graphs of Bounded Rank-Width
pp. 267
Hybrid One-Class Collaborative Filtering for Job Recommendation
pp. 269
Overview of INEX 2013
pp. 273
Genetic Algorithm Based Routing Method for Efficient Data Transmission in Sensor Networks
pp. 307
The Traveling Salesman Problem for Cubic Graphs
pp. 316
Two-Stage Transfer Learning of End-to-End Convolutional Neural Networks for Webpage Saliency Prediction
pp. 339
Power Attack on Small RSA Public Exponent
pp. 348
Beagle + + : Semantically Enhanced Searching and Ranking on the Desktop
pp. 350
Two-Dimensional Non-negative Matrix Factorization for Face Representation and Recognition
pp. 365
Approximability of Two Variants of Multiple Knapsack Problems
pp. 493
Reasoning about Privacy Properties of Biometric Systems Architectures in the Presence of Information Leakage
pp. 583
Interprocedural Exception Analysis for C++
pp. 185
Teaching English to Deaf Adults: “SignOnOne” – An Online Course for Beginners
pp. 226
Parallel MRI Noise Correction: An Extension of the LMMSE to Non Central χ Distributions
pp. 265
High Performance Distributed Simulation for Interactive Simulated Vascular Reconstruction
pp. 300
Towards Adaptive, Resilient and Self-organizing Peer-to-Peer Systems
pp. 334
Semi-supervised Adversarial Image-to-Image Translation
pp. 414
Categorical completeness results for the simply-typed lambda-calculus
pp. 436
A MAP Estimation Algorithm Using IIR Recursive Filters
pp. 449
Why Provable Security Matters?
pp. 469
Ascender II, a Visual Framework for 3D Reconstruction
pp. 228
Learning-Based 2D/3D Rigid Registration Using Jensen-Shannon Divergence for Image-Guided Surgery
pp. 240
Connection establishment for multi-party real-time communication
pp. 258
Driving Distraction Analysis by ECG Signals: An Entropy Analysis
pp. 268
Evaluation of Multiple Voxel-Based Morphometry Approaches and Applications in the Analysis of White Matter Changes in Temporal Lobe Epilepsy
pp. 274
Registration of Free-Breathing Abdominal 3D Contrast-Enhanced CT
pp. 275
Normalization in a Rough Relational Database
pp. 279
Virtual Telemetry for Dynamic Data-Driven Application Simulations
pp. 280
Determining the Optimal Contrast for Secret Sharing Schemes in Visual Cryptography
pp. 289
Planar Biconnectivity Augmentation with Fixed Embedding
pp. 298
Deriving Genetic Programming Fitness Properties by Static Analysis
pp. 314
CBR Method for Web Service Composition
pp. 316
MDS polar : A New Approach for Dimension Reduction to Visualize High Dimensional Data
pp. 340
Lemmings Is PSPACE-Complete
pp. 379
Point Counting on Genus 3 Non Hyperelliptic Curves
pp. 295
An Effective Data Dissemination in Vehicular Ad-Hoc Network
pp. 296
Arguing for Software Quality in an IEC 62304 Compliant Development Process
pp. 341
IT Auditing in E-Government
pp. 363
Power consumption in packet radio networks
pp. 364
The Web Geometry Laboratory Project
pp. 380
Evaluation of Image Fusion Performance with Visible Differences
pp. 396
On the Power of Anonymous One-Way Communication
pp. 719
Towards Semantic Navigation in Mobile Robotics
pp. 244
A Neighborhood Incorporated Method in Image Registration
pp. 253
Learning to Find Graph Pre-images
pp. 282
DropAll: Generalization of Two Convolutional Neural Network Regularization Methods
pp. 284
Computing Communities in Large Networks Using Random Walks
pp. 302
An Evolutionary Algorithm for the Maximum Weight Trace Formulation of the Multiple Sequence Alignment Problem
pp. 315
Real-Time Video Dehazing Based on Spatio-Temporal MRF
pp. 319
The Computational Complexity of the Kakuro Puzzle, Revisited
pp. 348
Action Research on Visualization Learning of Mathematical Concepts Under Personalized Education Idea: Take Learning of Geometrical Concepts of Elementary Math for Example
pp. 353
Planar Packing of Binary Trees
pp. 407
Tree-Decompositions with Connected Clusters for Solving Constraint Networks
pp. 408
Segmentation Conditional Random Fields (SCRFs): A New Approach for Protein Fold Recognition
pp. 410
Handling Faults in Decentralized Orchestration of Composite Web Services
pp. 443
Computing hierarchies of clusters from the euclidean minimum spanning tree in linear time
pp. 475
Computing the Number of Goldbach Partitions up to 5 108
pp. 566
A Simple Threshold Authenticated Key Exchange from Short Secrets
pp. 169
Automatic Short Answer Grading via Multiway Attention Networks
pp. 239
Partitioning sparse rectangular matrices for parallel computations of Ax and A T v
pp. 268
Stability Analysis of Harvesting Strategies in a Cellular Automata Based Predator-Prey Model
pp. 276
Adaptive User Profiles in Pervasive Advertising Environments
pp. 289
Unsupervised Anomaly Localization Using Variational Auto-Encoders
pp. 300
Characterization of CA Rules for SACA Targeting Detection of Faulty Nodes in WSN
pp. 315
Efficient execution replay technique for distributed memory architectures
pp. 337
A periodicity theorem on words and applications
pp. 349
On the Treewidth of Dynamic Graphs
pp. 362
Browsing Personal Images Using Episodic Memory (Time + Location)
pp. 370
Towards MKM in the Large: Modular Representation and Scalable Software Architecture
pp. 376
Real-time lip tracking for audio-visual speech recognition applications
pp. 376
Parameterized Algorithms for Module Map Problems
pp. 381
Efficient Multiplicative Homomorphic E-Voting
pp. 392
How to Smooth Entropy?
pp. 413
A Generative Shape Regularization Model for Robust Face Alignment
pp. 441
Automated Generation of Buffer Overflow Quick Fixes Using Symbolic Execution and SMT
pp. 1466
Ontology-Based Spatial Query Expansion in Information Retrieval
pp. 205
Learning Age and Gender of Blogger from Stylistic Variation
pp. 259
Hierarchical Extraction of Independent Subspaces of Unknown Dimensions
pp. 277
A Cellular Automata Model for Species Competition and Evolution
pp. 319
Selection of Decision Stumps in Bagging Ensembles
pp. 361
Undirected Training of Run Transferable Libraries
pp. 386
Horoball Hulls and Extents in Positive Definite Space
pp. 257
Analysis of Customer Satisfaction on the Stiffness of Outside Panels of Passenger Cars
pp. 289
The Maximum Flow Problem with Conflict and Forcing Conditions
pp. 393
In-place calculation of minimum-redundancy codes
pp. 395
Programmability and Performance of Parallel ECS-Based Simulation of Multi-agent Exploration Models
pp. 396
Classifying Twitter Users Based on User Profile and Followers Distribution
pp. 430
Increasing the Output Length of Zero-Error Dispersers
pp. 432
A Visual Analytics Toolkit for Cluster-Based Classification of Mobility Data
pp. 442
Applying the Clonal Selection Principle to Find Flexible Job-Shop Schedules
pp. 460
The centroid of points with approximate weights
pp. 529
CoverSize: A Global Constraint for Frequency-Based Itemset Mining
pp. 555
Self-adaptation with End-User Preferences: Using Run-Time Models and Constraint Solving
pp. 701
Secure Computation from Leaky Correlated Randomness
pp. 252
An Investigation of Cloning in Web Applications
pp. 262
Combining Independent Component Analysis and Self-Organizing Maps for Cell Image Classification
pp. 265
Fast Fluid Registration of medical images
pp. 285
Connectivity-Informed fMRI Activation Detection
pp. 290
Designing 3-D Nonlinear Diffusion Filters for High Performance Cluster Computing
pp. 297
Combination of the Cellular Potts Model and Lattice Gas Cellular Automata for Simulating the Avascular Cancer Growth
pp. 311
A Practical Analysis of Smartphone Security
pp. 320
Repetition Complexity of Words
pp. 325
Biologically-Inspired Supervised Vasculature Segmentation in SLO Retinal Fundus Images
pp. 333
Improved non-approximability results for vertex cover with density constraints
pp. 408
Approximating the \(k\) -Set Packing Problem by Local Improvements
pp. 429
Image compression by multilevel polynomial interpolation and wavelet texture coding
pp. 433
ABS: A High-Level Modeling Language for Cloud-Aware Programming
pp. 523
A Parallel Rendering Algorithm Based on Hierarchical Radiosity
pp. 535
A Novel Abundance-Based Algorithm for Binning Metagenomic Sequences Using l-Tuples
pp. 323
Grid Coevolution for Adaptive Simulations: Application to the Building of Opening Books in the Game of Go
pp. 368
An O(n)-Time Algorithm for the Paired-Domination Problem on Permutation Graphs
pp. 374
A New Model of Parallel Distributed Genetic Algorithms for Cluster Systems: Dual Individual DGAs
pp. 375
An Enriched ePub eBook for Screen Reader Users
pp. 432
Efficient K-Nearest Neighbor Search in Time-Dependent Spatial Networks
pp. 465
Creative Design: Exploring Value Propositions with Urban Nepalese Children
pp. 480
jSMTLIB: Tutorial, Validation and Adapter Tools for SMT-LIBv2
pp. 586
A Framework to Benchmark NoSQL Data Stores for Large-Scale Model Persistence
pp. 589
Cognitive Similarity Grounded by Tree Distance from the Analysis of K.265/300e
pp. 662
Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs
pp. 298
Rigid Motion Compensation in Interventional C-arm CT Using Consistency Measure on Projection Data
pp. 307
Using Population Based Algorithms for Initializing Nonnegative Matrix Factorization
pp. 359
Visualising Class Distribution on Self-organising Maps
pp. 409
Reasoning in Description Logics with Typicalities and Probabilities of Exceptions
pp. 515
Innovation Detection Based on User-Interest Ontology of Blog Community
pp. 550
Subapical bracketed L-systems
pp. 664
CellFlood: Attacking Tor Onion Routers on the Cheap
pp. 1553
An Ontology- and Resources-Based Approach to Evolution and Reactivity in the Semantic Web
pp. 303
A Unified Approach to Adaptive Hypermedia Personalisation and Adaptive Service Composition
pp. 324
User Interaction with User-Adaptive Information Filters
pp. 345
The Numerical Solution of the Boundary Function Inverse Problem for the Tidal Models
pp. 374
Fixed-parameter intractability II (extended abstract)
pp. 381
Complexity of Model Checking by Iterative Improvement: The Pseudo-Boolean Framework
pp. 429
Computation of efficient patient specific models from 3-D medical images: Use in virtual endoscopy and surgery rehearsal
pp. 452
A Hierarchical Approach to Optimal Transport
pp. 452
Estimation of Separating Planes between Touching 3D Objects Using Power Watershed
pp. 313
Learning-Based Meta-Algorithm for MRI Brain Extraction
pp. 330
Data Confidentiality Versus Chase
pp. 358
A Logical Inference Approach to Query Expansion with Social Tags
pp. 375
Rapid Real-Time Interdisciplinary Ocean Forecasting Using Adaptive Sampling and Adaptive Modeling and Legacy Codes: Component Encapsulation Using XML
pp. 377
Constructive disjunction revisited
pp. 394
Video Retrieval of Human Interactions Using Model-Based Motion Tracking and Multi-layer Finite State Automata
pp. 396
An Adaptive Pre-copy Strategy for Virtual Machine Live Migration
pp. 399
CLEAR: An Efficient Context and Location-Based Dynamic Replication Scheme for Mobile-P2P Networks
pp. 419
Engaging Students with Profound and Multiple Disabilities Using Humanoid Robots
pp. 486
Multiscale Texture Orientation Analysis Using Spectral Total-Variation Decomposition
pp. 317
Novel Phase Encoded Mel Filterbank Energies for Environmental Sound Classification
pp. 408
Accelerating the evolutionary-gradient-search procedure: Individual step sizes
pp. 475
A (5/3 + ε)-Approximation for Strip Packing
pp. 480
An Information Geometric Perspective on Active Learning
pp. 541
Scene Segmentation Using the Wisdom of Crowds
pp. 222
Multi-tasking Agile Projects: The Focal Point
pp. 355
To Develop Viable Human Factors Engineering Methods for Improved Industrial Use
pp. 373
New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation
pp. 388
Human Action Recognition by Inference of Stochastic Regular Grammars
pp. 422
Towards Context-Aware Data Management for Ambient Intelligence
pp. 328
Automated Tongue Segmentation Based on 2D Gabor Filters and Fast Marching
pp. 339
Adaption of 3D Models to 2D X-Ray Images during Endovascular Abdominal Aneurysm Repair
pp. 430
On a deterministic subclass of context-free languages
pp. 449
What Do My Colleagues Know? Dealing with Cognitive Complexity in Organizations Through Visualizations
pp. 495
Imposing hard constraints on soft snakes
pp. 504
A Deeper Look at Dataset Bias
pp. 510
A replication schema to support weak connectivity in mobile information systems
pp. 530
Characterising Emergent Semantics in Twitter Lists
pp. 555
Intentional Modeling to Support Identity Management
pp. 333
Making Sense of the Sensory Data – Coordinate Systems by Hierarchical Decomposition
pp. 360
Dynamic Comprehensive Evaluation of Manufacturing Capability for a Job Shop
pp. 366
Packet Error Probability of Multi-carrier CDMA System in Fast/Slow Correlated Fading Plus Interference Channel
pp. 412
A New Feature Weighted Fuzzy Clustering Algorithm
pp. 416
A Combined Classifier of Cry Units with New Acoustic Attributes
pp. 420
Quantum Noisy Rational Function Reconstruction
pp. 449
Batch Classification with Applications in Computer Aided Diagnosis
pp. 449
Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64
pp. 487
Colouring Random Graphs in Expected Polynomial Time
pp. 501
Displacing Random Sensors to Avoid Interference
pp. 548
Unique Covering Problems with Geometric Sets
pp. 621
High-Fidelity Multidisciplinary Design Optimization of Wing Shape for Regional Jet Aircraft
pp. 351
Effective Intensity-Based 2D/3D Rigid Registration between Fluoroscopic X-Ray and CT
pp. 384
A Systematic Evaluation of the Communicability of Online Privacy Mechanisms with Respect to Communication Privacy Management
pp. 423
DIF: An Interchange Format for Dataflow-Based Design Tools
pp. 460
A Framework for Robust and Incremental Self-Localization of a Mobile Robot
pp. 467
Recyclable Waste Paper Sorting Using Template Matching
pp. 507
Branch and Recharge: Exact Algorithms for Generalized Domination
pp. 527
A taxonomy of forgetting automata
pp. 540
The 5W Structure for Sentiment Summarization-Visualization-Tracking
pp. 574
The Price of Anarchy for Polynomial Social Cost
pp. 608
Time-Dependent Simple Temporal Networks
pp. 475
No Free Lunch, Program Induction and Combinatorial Problems
pp. 518
New Cross/Augmented Reality Experiences for the Virtual Museums of the Future
pp. 519
Integer Programming: Optimization and Evaluation Are Equivalent
pp. 624
Improved Bounded Max-Sum for Distributed Constraint Optimization
pp. 721
Constraining Redundancy to Improve Protein Docking
pp. 302
Web Accessibility through Adaptation
pp. 306
Development of a Mobile Tourist Information System for People with Functional Limitations: User Behaviour Concept and Specification of Content Requirements
pp. 361
Three dimensional MR-based morphometric comparison of schizophrenic and normal cerebral ventricles
pp. 441
A Study on the Global Convergence Time Complexity of Estimation of Distribution Algorithms
pp. 479
Query Difficulty Guided Image Retrieval System
pp. 501
Modeling of subjective interpretation for street landscape image
pp. 542
DASH: Data Structures and Algorithms with Support for Hierarchical Locality
pp. 573
The Role of Linked Data in Content Selection
pp. 621
Fast Segmentation of High-Resolution Satellite Images Using Watershed Transform Combined with an Efficient Region Merging Approach
pp. 645
A Logical Approach to Web User Interface Adaptation
pp. 316
Assistive Technologies as Effective Mediators in Interpersonal Social Interactions for Persons with Visual Disability
pp. 443
Towards Music Fitness Evaluation with the Hierarchical SOM
pp. 472
Classification of a Class of Counting Problems Using Holographic Reductions
pp. 519
Evaluating MapReduce on Virtual Machines: The Hadoop Case
pp. 560
Scheduling Data Flow Program in XKaapi: A New Affinity Based Algorithm for Heterogeneous Architectures
pp. 662
Multiobjective Evolutionary Algorithms Applied to the Rehabilitation of a Water Distribution System: A Comparative Study
pp. 747
Enrichment and Ranking of the YouTube Tag Space and Integration with the Linked Data Cloud
pp. 337
Face Recognition Using Probabilistic Two-Dimensional Principal Component Analysis and Its Mixture Model
pp. 425
Hand Gesture-Based Manipulation of a Personalized Avatar Robot in Remote Communication
pp. 455
A Cellular Automaton Model for Crowd Evacuation and Its Auto-Defined Obstacle Avoidance Attribute
pp. 461
MEA Based Nonlinearity Correction Algorithm for the VCO of LFMCW Radar Level Gauge
pp. 481
Towards Communicative Face Occlusions: Machine Detection of Hand-over-Face Gestures
pp. 501
To Relive a Valuable Experience of the World at the Digital Museum
pp. 509
Subspace Metric Ensembles for Semi-supervised Clustering of High Dimensional Data
pp. 540
Music Puzzle: An Audio-Based Computer Game That Inspires to Train Listening Abilities
pp. 560
Statistical feature modelling for active contours
pp. 581
Kernel-Based Manifold Learning for Statistical Analysis of Diffusion Tensor Images
pp. 673
Requirements of Indoor Navigation System from Blind Users
pp. 432
Interactive Evolutionary Evaluation through Spatial Partitioning of Fitness Zones
pp. 462
Color Image Segmentation Based on an Iterative Graph Cut Algorithm Using Time-of-Flight Cameras
pp. 541
Secure Document Service for Cloud Computing
pp. 414
Fast Single-Link Clustering Method Based on Tolerance Rough Set Model
pp. 493
On-Line Multi-view Forests for Tracking
pp. 567
WeatherUSI: User-Based Weather Crowdsourcing on Public Displays
pp. 583
New Mathematical Optimization Approaches for LID Systems
pp. 591
Exploration / Exploitation Trade-Off in Mobile Context-Aware Recommender Systems
pp. 400
An Improved Particle Swarm Pareto Optimizer with Local Search and Clustering
pp. 471
Principal Component Analysis for Distributed Data Sets with Updating
pp. 491
Dependency Bagging
pp. 504
A fast non-commutative algorithm for matrix multiplication
pp. 506
A Cost-Aware Parallel Workload Allocation Approach Based on Machine Learning Techniques
pp. 532
Learning, Learning Analytics, Activity Visualisation and Open Learner Model: Confusing?
pp. 540
Role and Request Based Conceptual Modeling – A Methodology and a CASE Tool
pp. 563
Augmenting Planar Straight Line Graphs to 2-Edge-Connectivity
pp. 629
A Dense Pipeline for 3D Reconstruction from Image Sequences
pp. 377
Support System for Lecture Captioning Using Keyword Detection by Automatic Speech Recognition
pp. 519
Spatial compounding of 3-D ultrasound images
pp. 528
Fast and Space-Efficient Location of Heavy or Dense Segments in Run-Length Encoded Sequences
pp. 579
Informative Labeling Schemes for Graphs
pp. 600
A Phrase-Based Context-Dependent Joint Probability Model for Named Entity Translation
pp. 608
The Price of Truth: Frugality in Truthful Mechanisms
pp. 361
Convergence of Web and TV Broadcast Data for Adaptive Content Access and Navigation
pp. 367
Methods for the Visually Impaired to Retrieve Audio Information Efficiently
pp. 479
Computational Steering Strategy to Calibrate Input Variables in a Dynamic Data Driven Genetic Algorithm for Forest Fire Spread Prediction
pp. 614
Automated Layer Segmentation of 3D Macular Images Using Hybrid Methods
pp. 705
Video Cataloging System for Real-Time Scene Change Detection of News Video
pp. 451
Deformable Segmentation via Sparse Shape Representation
pp. 623
Algebraic Structures for Bipolar Constraint-Based Reasoning
pp. 626
Intrinsic Image Decomposition: A Comprehensive Review
pp. 420
Context-Dependent Help for the DynaLearn Modelling and Simulation Workbench
pp. 495
Brain Activities Supporting Finger Operations, Analyzed by Neuro-NIRS
pp. 543
A Hybrid Discrete-Continuum Model for 3-D Skeletogenesis of the Vertebrate Limb
pp. 624
Out-of-Order Event Processing in Kinetic Data Structures
pp. 644
A Lower Bound on the Competitive Ratio of Truthful Auctions
pp. 538
Multi-fault Diagnosis of Roller Bearings Using Support Vector Machines with an Improved Decision Strategy
pp. 548
A New Prime Edge Length Crystallographic FFT
pp. 562
The Taylor Center for PCs: Exploring, Graphing and Integrating ODEs with the Ultimate Accuracy
pp. 586
Neighborhood Graphs for Semi-automatic Annotation of Large Image Databases
pp. 658
An Extremely Flexible, Energy, and Spectral Effective Green PHY-MAC for Profitable Ubiquitous Rural and Remote 5G/B5GIoT/M2M Communications
pp. 472
BIP: A new protocol designed for high performance networking on Myrinet
pp. 502
Cellular Automata and Its Application to the Modeling of Vehicular Traffic in the City of Caracas
pp. 510
The Web of Data for E-Commerce in Brief
pp. 525
Encoder/Decoder for Privacy Protection Video with Privacy Region Detection and Scrambling
pp. 577
Vision Based Facial Action Recognition System for People with Disabilities
pp. 586
On syntactic congruences for ω—languages
pp. 683
Improved Approximation Algorithms for Projection Games
pp. 535
Scalable Continuous Multiobjective Optimization with a Neural Network–Based Estimation of Distribution Algorithm
pp. 704
High Performance Pseudo-analytical Simulation of Multi-Object Adaptive Optics over Multi-GPU Systems
pp. 831
Continuous Casting Scheduling with Constraint Programming
pp. 322
TipsC: Tips and Corrections for programming MOOCs
pp. 466
Real-Time System for Counting the Number of Passing People Using a Single Camera
pp. 485
GEDAS: A Data Management System for Data Grid Environments
pp. 785
Brief Announcement: Towards Secure Cloud Computing
pp. 454
Connectionists and statisticians, friends or foes?
pp. 500
Hybrid Decision Support System for Endovascular Aortic Aneurysm Repair Follow-Up
pp. 574
Probabilistic Reversible Automata and Quantum Automata
pp. 598
Hole Filling Algorithm Using Spatial-Temporal Background Depth Map for View Synthesis in Free View Point Television
pp. 603
Techniques for Estimating the Computation and Communication Costs of Distributed Data Mining
pp. 415
On Necessity of a New Method to Read Out Math Contents Properly in DAISY
pp. 577
Incorporating Pageview Weight into an Association-Rule-Based Web Recommendation System
pp. 623
Evaluating the Potential of Explicit Phrases for Retrieval Quality
pp. 337
Exploring Online Course Sociograms Using Cohesion Network Analysis
pp. 425
Adaptive Support for Cross-Language Text Retrieval
pp. 509
Visual Tracking of Multiple Targets by Multi-Bernoulli Filtering of Background Subtracted Image Data
pp. 523
Solving Vehicle Assignment Problem Using Evolutionary Computation
pp. 663
In Support of Mesodata in Database Management Systems
pp. 755
Lagrangian Duality in Online Scheduling with Resource Augmentation and Speed Scaling
pp. 873
Fusion of Feature- and Area-Based Information for Urban Buildings Modeling from Aerial Imagery
pp. 566
Semidefinite programming and its applications to NP problems
pp. 617
Assortative Mating in Genetic Algorithms for Dynamic Problems
pp. 730
Storing a Compressed Function with Constant Time Access
pp. 759
An Efficient Quantum Algorithm for the Hidden Subgroup Problem in Nil-2 Groups
pp. 555
Flexible Reconstruction and Correction of Unpredictable Motion from Stacks of 2D Images
pp. 761
Multi-document Summarization Based on Cluster Using Non-negative Matrix Factorization
pp. 454
Visual System to Help Blind People to Cross the Street
pp. 511
Artificial Immune System for Personal Identification with Finger Vein Pattern
pp. 551
Toward Robotized Beating Heart TECABG: Assessment of the Heart Dynamics Using High-Speed Vision
pp. 675
Multilingual Log Analysis: LogCLEF
pp. 677
Post Nonlinear Independent Subspace Analysis
pp. 792
Global Path-Based Refinement of Noisy Graphs Applied to Verb Semantics
pp. 678
Cellular Automata in the Hyperbolic Plane: Proposal for a New Environment
pp. 444
User Testing of Google Reader and RIA Complexity – A Warning
pp. 589
A Hybrid of Particle Swarm Optimization and Local Search for Multimodal Functions
pp. 750
Controlling Information Aggregation for Complex Question Answering
pp. 675
Social Context Games
pp. 752
Integrating Techniques from Statistical Ranking into Evolutionary Algorithms
pp. 506
Java-Powered Braille Slate Talker
pp. 604
Improving Prepositional Phrase Attachment Disambiguation Using the Web as Corpus
pp. 714
Fault-tolerant message routing for multiprocessors
pp. 718
GARCH Processes with Non-parametric Innovations for Market Risk Estimation
pp. 545
Sound Quality Evaluation Based on Artificial Neural Network
pp. 687
Learning by e-Learning: Breaking Down Barriers and Creating Opportunities for the Visually-Impaired
pp. 619
Content-Based Retrieval Using Color, Texture, and Shape Information
pp. 839
A Generic Approach to Object Matching and Tracking
pp. 643
Robust PET Motion Correction Using Non-local Spatio-temporal Priors
pp. 739
Parametric Versus Non-parametric Models of Driving Behavior Signals for Driver Identification
pp. 682
Conservative Finite-Difference Scheme for Computer Simulation of Field Optical Bistability
pp. 685
Stochastic Local Search Techniques with Unimodal Continuous Distributions: A Survey
pp. 696
A Generic and Configurable Source-Code Instrumentation Component
pp. 898
OntoComP: A Protégé Plugin for Completing OWL Ontologies
pp. 932
Methods to Determine the Branching Attribute in Bayesian Multinets Classifiers
pp. 492
Institutional Conditions for the Implementation of Accessible Lifelong Learning (ALL) Based on the EU4ALL Approach
pp. 406
Accessible Interface Design: Adaptive Multimedia Information System (AMIS)
pp. 605
Second-order recurrent neural networks can learn regular grammars from noisy strings
pp. 657
Brain Surface Parameterization Using Riemann Surface Structure
pp. 767
On the Computation of Mass Fluxes for Eulerian Transport Models from Spectral Meteorological Fields
pp. 828
XG: A Data-Driven Computation Grid for Enterprise-Scale Mining
pp. 421
Comparison of Various Interface Modalities for a Locomotion Assistance Device
pp. 845
A heuristic combination method for solving job-shop scheduling problems
pp. 560
A Device to Evaluate Broadcast Background Sound Balance Using Loudness for Elderly Listeners
pp. 666
Evaluation of a Meta-tutor for Constructing Models of Dynamic Systems
pp. 813
Characterization of Reachable/Nonreachable Cellular Automata States
pp. 866
Maximum Throughput and Minimum Delay in IEEE 802.15.4
pp. 972
Load Balancing for Imbalanced Data Sets: Classifying Scientific Artefacts for Evidence Based Medicine
pp. 803
A Semantic Accessibility Assessment Environment for Design and Development for the Web
pp. 544
Easy-to-Use Social Network Service
pp. 746
My First Search User Interface
pp. 880
Tool-Wear Monitoring Based on Continuous Hidden Markov Models
pp. 502
Access by Blind Students and Professionals to Mainstream Math and Science
pp. 942
A Self-adaptive Neural Learning Classifier System with Constructivism for Mobile Robot Control
pp. 664
Towards a Universal Maths Conversion Library
pp. 808
A Genetic Algorithm for Solving Portfolio Optimization Problems with Transaction Costs and Minimum Transaction Lots
pp. 557
Managing the Educational Dataset Lifecycle with DataShop
pp. 683
Captioning for Deaf and Hard of Hearing People by Editing Automatic Speech Recognition in Real Time
pp. 1000
ODEs and Redefining the Concept of Elementary Functions
pp. 739
A General-Purpose Forward Deduction Engine for Modal Logics
pp. 1014
Parallel Calculating of the Goal Function in Metaheuristics Using GPU
pp. 639
A Novel Symmetric Cryptography Based on Chaotic Signal Generator and a Clipped Neural Network
pp. 857
Political Hashtag Trends
pp. 705
Cognitive Abilities of Functionally Illiterate Persons Relevant to ICT Use
pp. 812
New Design of PMU for Real-Time Security Monitoring and Control of Wide Area Intelligent System
pp. 893
A Theoretical Model for the Dengue Epidemic Using Delayed Differential Equations: Numerical Approaches
pp. 801
A New Audio Testing System for the Newly Blind and the Learning Disabled to Take the National Center Test for University Admissions
pp. 993
The Computational Power of Complex-Valued Neuron
pp. 903
On Parallel Immune Quantum Evolutionary Algorithm Based on Learning Mechanism and Its Convergence
pp. 901
Proposal of Impression Mining from News Articles
pp. 1029
Optimal Group Testing Strktegies with Interval Queries and Their Application to Splice Site Detection
pp. 1017
Combined Kernel Function Approach in SVM for Diagnosis of Cancer
pp. 914
On the Design of Ambient Intelligent Systems in the Context of Assistive Technologies
pp. 1083
SBEAVER: A Tool for Modeling Business Vocabularies and Business Rules
pp. 1139
G.711-Based Adaptive Speech Information Hiding Approach
pp. 739
Developing Academic Skills among Print Disabled Students: IT Based Austrian-Wide Network for Service Provision
pp. 753
Learning from Each Other: Comparing the Service Provision for Blind and Visually-Impaired Students in Post-secondary Education in Japan and Europe
pp. 1145
On Evolutionary Optimization of Large Problems Using Small Populations
pp. 1259
Robust Character Recognition Using a Hierarchical Bayesian Network
pp. 1229
Content Modeling in Intelligent Instructional Environments
pp. 1065
Detection of mobile phone fraud using supervised neural networks: A first prototype
pp. 173
On the Competitive Theory and Practice of Portfolio Selection (Extended Abstract)
Similar content
1,553
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey
Authors:
Asma A. Aloufi
,
Peizhao Hu
,
Yongsoo Song
…
An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps
Authors:
Sameh S. Askar
,
Abdel Karawia
,
Abdulrahman Al-Khedhairi
…
Introducing smartcards to remote authenticate passwords using public key encryption
Authors:
A. Badra
,
P. Urien
See all similar
Cited by
2
Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange
Authors:
Kristian Gjøsteen
,
Tibor Jager
Beyond Birthday Bound Secure MAC in Faulty Nonce Model
Authors:
Avijit Dutta
,
Mridul Nandi
,
Suprita Talnikar
See all cited by