Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
57
views
0
references
Top references
cited by
50
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,868
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Foundations and Practice of Security
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
other
Author(s):
Jacques Patarin
Publication date
(Online):
July 13 2001
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Numerical Algebra, Matrix Theory, Differential-Algebraic Equations, and Control Theory
Author and book information
Book Chapter
Publication date (Print):
1996
Publication date (Online):
July 13 2001
Pages
: 33-48
DOI:
10.1007/3-540-68339-9_4
SO-VID:
871e61fc-aebf-4ac5-a5e2-c53eb6eea0b8
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
The Concept of Recoverable Robustness, Linear Programming Recovery, and Railway Applications
pp. 1
Programs as Paths: An Approach to Timing Constraint Analysis
pp. 1
Blackouts in Power Transmission Networks Due to Spatially Localized Load Anomalies
pp. 1
Alan Turing: Founder of Computer Science
pp. 1
Exact Detection of Information Leakage: Decidability and Complexity
pp. 1
Where the Streets Have Known Names
pp. 1
An Evaluation Framework for Controlled Natural Languages
pp. 1
Floor Fields for Tracking in High Density Crowd Scenes
pp. 1
Generating RSA Moduli with a Predetermined Portion
pp. 1
Deep Learning of Representations: Looking Forward
pp. 1
Extremal Optimization Dynamics in Neutral Landscapes: The Royal Road Case
pp. 1
Management and Analysis of Protein-to-Protein Interaction Data
pp. 1
A Practical Approach to Recognizing Physical Activities
pp. 1
Expressive Power of SQL
pp. 1
Privacy Vulnerabilities in Encrypted HTTP Streams
pp. 1
A Reversible Abstract Machine and Its Space Overhead
pp. 1
Graph Structure and Monadic Second-Order Logic: Language Theoretical Aspects
pp. 1
Patient Flow Monitoring Systems: Investigation of Alternatives
pp. 1
Introduction
pp. 2
Difference and Union of Models
pp. 2
Coinductive Type Systems for Object-Oriented Languages
pp. 3
Video Description Using Bidirectional Recurrent Neural Networks
pp. 3
Pareto Optimality in House Allocation Problems
pp. 3
Direct and Reverse Rewriting in Data Interoperability
pp. 3
Partial Evaluation of Order-Sorted Equational Programs Modulo Axioms
pp. 3
Foundational (Co)datatypes and (Co)recursion for Higher-Order Logic
pp. 3
Thunderella: Blockchains with Optimistic Instant Confirmation
pp. 3
Generating k-Anonymous Microdata by Fuzzy Possibilistic Clustering
pp. 3
Transition Invariants and Transition Predicate Abstraction for Program Termination
pp. 3
MPI at Exascale: Challenges for Data Structures and Algorithms
pp. 3
Deploying Search Based Software Engineering with Sapienz at Facebook
pp. 3
Secure Computation Based on Leaky Correlations: High Resilience Setting
pp. 3
Automatic Expansion of a Food Image Dataset Leveraging Existing Categories with Domain Adaptation
pp. 3
Multi-user Itinerary Planning for Optimal Group Preference
pp. 3
A Bearing-Only Pattern Formation Algorithm for Swarm Robotics
pp. 3
New CBC-MAC Forgery Attacks
pp. 5
Challenges for Business Process Intelligence: Discussions at the BPI Workshop 2007
pp. 6
Structure Mapping for Jeopardy! Clues
pp. 8
Privacy in Data Publishing
pp. 9
Real-Time Visual Tracking of the Surgeon’s Face for Laparoscopic Surgery
pp. 9
Some Improvements to a Parallel Decomposition Technique for Training Support Vector Machines
pp. 10
Extending Wide-Area Replication Support with Mobility and Improved Recovery
pp. 11
Parent Training Resource Allocation Optimization Using an Agent-Based Model of Child Maltreatment
pp. 11
Ontologies and Similarity
pp. 11
Spatially-Localized Compressed Sensing and Routing in Multi-hop Sensor Networks
pp. 12
The Weierstrass Semigroup of an m-tuple of Collinear Points on a Hermitian Curve
pp. 12
Balancing Potential and Risk: The Living Lab Approach in Mobile Participation Research
pp. 12
Exploring Gyral Patterns of Infant Cortical Folding Based on Multi-view Curvature Information
pp. 13
SEEDS: Superpixels Extracted via Energy-Driven Sampling
pp. 13
Synthetic Evidential Study as Augmented Collective Thought Process – Preliminary Report
pp. 13
Adoption of Mobile Banking in Jordan: Exploring Demographic Differences on Customers’ Perceptions
pp. 13
An Implementation of Key-Based Digital Signal Steganography
pp. 13
Burning a Graph as a Model of Social Contagion
pp. 13
A Unified Definition of a Smart City
pp. 13
Limits to Anonymity When Using Credentials (Transcript of Discussion)
pp. 13
Clonal Selection Algorithms: A Comparative Case Study Using Effective Mutation Potentials
pp. 14
A Multiagent Architecture for Privacy-Preserving ID-Based Service in Ubiquitous Computing Environment
pp. 14
Identifying Correlated Bots in Twitter
pp. 15
Dementia Games: A Literature Review of Dementia-Related Serious Games
pp. 15
Sequential Non-Rigid Structure-from-Motion with the 3D-Implicit Low-Rank Shape Model
pp. 15
Fast Outlier Detection in High Dimensional Spaces
pp. 16
A Semantics for Concurrent Separation Logic
pp. 16
Fine-Grained Disclosure of Access Policies
pp. 16
A Compact Representation for Cross-Domain Short Text Clustering
pp. 16
UTP by Example: Designs
pp. 16
Relational Mining in Spatial Domains: Accomplishments and Challenges
pp. 16
Enabling Cloud Interoperability with COMPSs
pp. 16
Revisiting Glue Expressiveness in Component-Based Systems
pp. 17
Eigen-PEP for Video Face Recognition
pp. 17
Prostate Segmentation in 2D Ultrasound Images Using Image Warping and Ellipse Fitting
pp. 17
Automated Diffusion? Bots and Their Influence During the 2016 U.S. Presidential Election
pp. 17
Hardness Amplification of Weakly Verifiable Puzzles
pp. 17
Groups and Monoids of Cellular Automata
pp. 18
vmBBThrPred: A Black-Box Throughput Predictor for Virtual Machines in Cloud Environments
pp. 18
May-Happen-in-Parallel Analysis for Priority-Based Scheduling
pp. 18
Promoting free Dialog Video Corpora: The IFADV Corpus Example
pp. 19
Influence and Power in Group Interactions
pp. 19
Improving the Generalized Feistel
pp. 19
Quantitative Program Logic and Performance in Probabilistic Distributed Algorithms
pp. 19
QAestro – Semantic-Based Composition of Question Answering Pipelines
pp. 20
Is Entity Authentication Necessary?
pp. 20
Statistical Analysis of Perinatal Risk Factors for Emergency Caesarean Section
pp. 20
DeepPainter: Painter Classification Using Deep Convolutional Autoencoders
pp. 20
Developing Semantic Rich Internet Applications with the Sm4RIA Extension for OIDE
pp. 21
Applying Machine Translation Evaluation Techniques to Textual CBR
pp. 22
The Geography of Taste: Analyzing Cell-Phone Mobility and Social Events
pp. 22
Specializing Narrowing for Timetable Generation: A Case Study
pp. 23
Data-Driven Statistical Learning of Temporal Logic Properties
pp. 25
Unsupervised Stability-Based Ensembles to Discover Reliable Structures in Complex Bio-molecular Data
pp. 25
Why Amazon Chose TLA +
pp. 25
The evolution of the unix time-sharing system
pp. 26
Towards an AADL-Based Definition of App Architecture for Medical Application Platforms
pp. 27
A Local-Global LDA Model for Discovering Geographical Topics from Social Media
pp. 28
The AMI Meeting Corpus: A Pre-announcement
pp. 29
Revisiting Deep Convolutional Neural Networks for RGB-D Based Object Recognition
pp. 29
Big Five Personality Recognition from Multiple Text Genres
pp. 29
On the symmetry of sequentiality
pp. 29
A Middleware Architecture for Supporting Adaptable Replication of Enterprise Application Data
pp. 29
The softassign Procrustes matching algorithm
pp. 31
Authoring Adaptive Learning Designs Using IMS LD
pp. 32
Lazy Execution of Model-to-Model Transformations
pp. 32
Conflation Confers Concurrency
pp. 32
On-Line Adaptive Algorithms in Autonomic Restart Control
pp. 32
Representation and Discovery of Vertical Patterns in Music
pp. 32
On the Computational Complexity of Sensor Network Localization
pp. 32
Bing-CF-IDF+: A Semantics-Driven News Recommender System
pp. 33
Preserving Contexts for Soft Conformance Relation
pp. 33
On Parameter Tuning in Search Based Software Engineering
pp. 33
Integrating Fault-Tolerant Techniques into the Design of Critical Systems
pp. 35
The Corona Limit of Penrose Tilings Is a Regular Decagon
pp. 36
ArCo: The Italian Cultural Heritage Knowledge Graph
pp. 36
Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols
pp. 36
Pose Estimation with Mismatching Region Detection in Robot Bin Picking
pp. 36
Segmental Spatiotemporal CNNs for Fine-Grained Action Segmentation
pp. 36
A New Image Contrast Enhancement Algorithm Using Exposure Fusion Framework
pp. 37
Efficient Model Selection for Large-Scale Nearest-Neighbor Data Mining
pp. 37
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications
pp. 37
Understanding Interactions Between Municipal Police Departments and the Public on Twitter
pp. 38
Design, Development, and Testing of an Automated Laparoscopic Grasper with 3-D Force Measurement Capability
pp. 38
Sample Selection Bias Correction Theory
pp. 39
Landscape Dynamics in Multi–agent Simulation Combat Systems
pp. 39
Constraints on the Use of Boundary-Scan for Fault Injection
pp. 39
Superstring Graph: A New Approach for Genome Assembly
pp. 39
ExCuSe: Robust Pupil Detection in Real-World Scenarios
pp. 41
Towards an Information Theoretic Metric for Anonymity
pp. 41
Self-indexing Based on LZ77
pp. 42
Using OCL for Automatically Producing Multidimensional Models and ETL Processes
pp. 42
Evaluating the Quality of Clustering Algorithms Using Cluster Path Lengths
pp. 43
An Asymmetric Fingerprinting Scheme Based on Tardos Codes
pp. 43
Attribute Dynamics in Rough Sets
pp. 43
On Clusters in Markov Chains
pp. 45
Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme
pp. 45
Deep Learning over Multi-field Categorical Data
pp. 46
Context-Aware Self-adaptations: From Requirements Specification to Code Generation
pp. 47
Reducing the Computational Cost of Computing Approximated Median Strings
pp. 47
The Delaunay triangulation closely approximates the complete Euclidean graph
pp. 48
Methodological Framework to Guide the Development of Continual Evolution Methods
pp. 49
SODA: A Roadmap to Artefacts
pp. 49
Progress as Compositional Lock-Freedom
pp. 49
Approximating Minimum Manhattan Networks in Higher Dimensions
pp. 49
The Group of Reversible Turing Machines
pp. 49
Cuckoo Cycle: A Memory Bound Graph-Theoretic Proof-of-Work
pp. 49
Anomaly Detection and Mitigation at Internet Scale: A Survey
pp. 50
A Secure Electronic Payment Scheme for Charity Donations
pp. 51
Functional Adaptivity for Digital Library Services in e-Infrastructures: The gCube Approach
pp. 52
Deep Learning Based Counter–Forensic Image Classification for Camera Model Identification
pp. 52
Evaluation of Dynamic Instantiation in CPRM-Based Systems
pp. 53
Fast LTL to Büchi Automata Translation
pp. 54
Stable Feature Extraction with the Help of Stochastic Information Measure
pp. 54
From Data Mining to User Models in Evolutionary Databases
pp. 55
Understanding Neural Networks via Feature Visualization: A Survey
pp. 57
Quantifying Location Privacy: The Case of Sporadic Location Exposure
pp. 57
4D Infant Cortical Surface Atlas Construction Using Spherical Patch-Based Sparse Representation
pp. 58
An Agent-Based Inter-organizational Collaboration Framework: OperA+
pp. 59
Fast Computation of the Multi-Points Expected Improvement with Applications in Batch Selection
pp. 59
MiniZinc with Strings
pp. 61
A Formal Semantics for Agent (Re)Organization
pp. 61
That’s My DNA: Detecting Malicious Tampering of Synthesized DNA
pp. 62
Transient fault detectors
pp. 62
Passage Retrieval vs. Document Retrieval in the CLEF 2006 Ad Hoc Monolingual Tasks with the IR-n System
pp. 63
When Bitcoin Mining Pools Run Dry
pp. 65
Sphinx: Empowering Impala for Efficient Execution of SQL Queries on Big Spatial Data
pp. 65
Enforcing Structural Invariants Using Dynamic Frames
pp. 65
Towards Vulnerability Prevention in Autonomic Networks and Systems
pp. 65
What Energy Functions Can Be Minimized via Graph Cuts?
pp. 65
Combined Fault and Side-Channel Attack on Protected Implementations of AES
pp. 66
Quora Question Answer Dataset
pp. 66
Developmental Patterns Based Individualized Parcellation of Infant Cortical Surface
pp. 66
Message Franking via Committing Authenticated Encryption
pp. 66
Deformable Organisms for Automatic Medical Image Analysis
pp. 67
Towards Understanding Cross-Cultural Crowd Sentiment Using Social Media
pp. 68
Derivational minimalism
pp. 68
Virtual Rapport 2.0
pp. 69
Multipurpose Public-Key Encryption
pp. 70
“Comply or Die” Is Dead: Long Live Security-Aware Principal Agents
pp. 71
Straight-line complexity and integer factorization
pp. 72
Self-testing of Quantum Circuits
pp. 72
Fast Streaming 3D Level Set Segmentation on the GPU for Smooth Multi-phase Segmentation
pp. 73
Using Dominators for Solving Constrained Path Problems
pp. 73
Simplifying Questions in Maude Declarative Debugger by Transforming Proof Trees
pp. 74
Towards an Affective Aware Home
pp. 74
From P to MP Systems
pp. 75
Automatic Extraction of Clusters from Hierarchical Clustering Representations
pp. 76
Examination timetabling in British Universities: A survey
pp. 76
Soft Constraints for Dependable Service Oriented Architectures
pp. 77
Stretchable sEMG Electrodes Conformally Laminated on Skin for Continuous Electrophysiological Monitoring
pp. 77
Communication Diversity in Particle Swarm Optimizers
pp. 77
A Hybrid Feature Model for Seam Carving Detection
pp. 77
Modular Reduction in GF(2 n ) without Pre-computational Phase
pp. 79
An Operational Semantics of BPEL Orchestrations Integrating Web Services Resource Framework
pp. 80
Quantum Programming
pp. 81
Zooming Multi-Agent Systems
pp. 83
Adversarial Sampling Attacks Against Phishing Detection
pp. 83
Information Security as a Credence Good
pp. 84
Superposition Modulo Linear Arithmetic SUP(LA)
pp. 84
Hints in Unification
pp. 84
Constructing Efficient Dictionaries in Close to Sorting Time
pp. 85
OFLOPS: An Open Framework for OpenFlow Switch Evaluation
pp. 85
Dynamically Detecting Faults via Integrity Constraints
pp. 85
Incentive-Compatible Robust Line Planning
pp. 85
Improved Bounds on the Planar Branchwidth with Respect to the Largest Grid Minor Size
pp. 86
Limitations on Quantum Dimensionality Reduction
pp. 87
Creating Visualisations for Digital Document Indexing
pp. 88
Terabytes of Tobler: Evaluating the First Law in a Massive, Domain-Neutral Representation of World Knowledge
pp. 88
Deletion of (26,6)-Simple Points as Multivalued Retractions
pp. 88
Learning Objects Quality: Moodle HEODAR Implementation
pp. 88
Fast Library for Number Theory: An Introduction
pp. 89
Continuous Time Gathering of Agents with Limited Visibility and Bearing-only Sensing
pp. 89
Single Trial Classification of EEG and Peripheral Physiological Signals for Recognition of Emotions Induced by Music Videos
pp. 89
Predicting the Outcome of Appeal Decisions in Germany’s Tax Law
pp. 90
Adaptable Processes (Extended Abstract)
pp. 90
SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge
pp. 90
Communication-Optimal Parallel 2.5D Matrix Multiplication and LU Factorization Algorithms
pp. 91
Electromechanical Coupling Dynamic Model and Speed Response Characteristics of the Flexible Robotic Manipulator
pp. 91
BChain: Byzantine Replication with High Throughput and Embedded Reconfiguration
pp. 91
iCrawl: A Visual High Interaction Web Crawler
pp. 92
Riemannian Geometry in Sleep Stage Classification
pp. 92
The Impact of Encumbrance on Mobile Interactions
pp. 92
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
pp. 93
Evaluation of Texture Features for Analysis of Ovarian Follicular Development
pp. 96
From Requirements to Code: Model Based Development of a Medical Cyber Physical System
pp. 97
Improving Personal Credit Scoring with HLVQ-C
pp. 98
Scaling CFL-Reachability-Based Points-To Analysis Using Context-Sensitive Must-Not-Alias Analysis
pp. 98
Medical Image Vector Quantizer Using Wavelet Transform and Enhanced SOM Algorithm
pp. 99
MyTrace: A Mobile Phone-Based Tourist Spatial-Temporal Behavior Record and Analysis System
pp. 100
Business Provenance – A Technology to Increase Traceability of End-to-End Operations
pp. 100
Good codes based on very sparse matrices
pp. 100
A Template Analysis Methodology to Improve the Efficiency of Fast Matching Algorithms
pp. 100
Data-Driven Policy Making: The Policy Lab Approach
pp. 100
Dynamics and Secure Information Flow for a Higher-Order Pi-Calculus
pp. 101
Efficient Algorithms for Network Localization Using Cores of Underlying Graphs
pp. 101
A Parallel Implementation of the Jacobi-Davidson Eigensolver and Its Application in a Plasma Turbulence Code
pp. 102
More Precise Yet Efficient Type Inference for Logic Programs
pp. 103
Analysis of Pulmonary Nodule Evolutions Using a Sequence of Three-Dimensional Thoracic CT Images
pp. 103
A Semantical and Operational Account of Call-by-Value Solvability
pp. 104
A PolyTime Functional Language from Light Linear Logic
pp. 104
Self-Testing Graph States
pp. 104
DET-ABE: A Java API for Data Confidentiality and Fine-Grained Access Control from Attribute Based Encryption
pp. 105
A Study of Bluetooth Propagation Using Accurate Indoor Location Mapping
pp. 105
Hartmanis-Stearns Conjecture on Real Time and Transcendence
pp. 106
Project Lachesis: Parsing and Modeling Location Histories
pp. 107
A Case-Based Approach to Open-Ended Collective Agreement with Rational Ignorance
pp. 107
Conceptualising and Exploring User Activities in Social Media
pp. 107
Data Journalism in 2017: A Summary of Results from the Global Data Journalism Survey
pp. 108
Learning-Based Multi-atlas Segmentation of the Lungs and Lobes in Proton MR Images
pp. 108
Efficient CNF Encoding of Boolean Cardinality Constraints
pp. 109
Online Geometric Optimization in the Bandit Setting Against an Adaptive Adversary
pp. 111
Tate Pairing Implementation for Hyperelliptic Curves y 2 = x p – x + d
pp. 111
Intensity-Based Non-rigid Registration Using Adaptive Multilevel Free-Form Deformation with an Incompressibility Constraint
pp. 112
Invariant Management in the Presence of Failures
pp. 112
A Systematic Literature Review of the Relationships Between Policy Analysis and Information Technologies: Understanding and Integrating Multiple Conceptualizations
pp. 114
lpopt: A Rule Optimization Tool for Answer Set Programming
pp. 115
Some Domain Theory and Denotational Semantics in Coq
pp. 115
Minimizing Average Interference through Topology Control
pp. 115
Anonymous addresses and confidentiality of location
pp. 116
Place Lab: Device Positioning Using Radio Beacons in the Wild
pp. 116
Permuting Web Graphs
pp. 117
Generalisation Operators for Lists Embedded in a Metric Space
pp. 119
Finitely Branching Labelled Transition Systems from Reaction Semantics for Process Calculi
pp. 119
Compositional Action System Derivation Using Enforced Properties
pp. 119
A Bicriteria Approach for Robust Timetabling
pp. 119
An Empirical Study of Branching Heuristics Through the Lens of Global Learning Rate
pp. 120
Text Punctuation: An Inter-annotator Agreement Study
pp. 120
Adaptive Enhancing of Fingerprint Image with Image Characteristics Analysis
pp. 120
Enhancing Critical Infrastructure Resilience Through Information-Sharing: Recommendations for European Critical Infrastructure Operators
pp. 120
Diversity Promotion: Is Reordering Top-Ranked Documents Sufficient?
pp. 120
Physical Field-Enhanced Intelligent Space with Temperature-Based Human Motion Detection for Visually Impaired Users
pp. 121
Layout-Aware Embedding for Quantum Annealing Processors
pp. 121
Inform-Consult-Empower: A Three-Tiered Approach to eParticipation
pp. 121
Securing XML Documents
pp. 122
Amalgam-Based Reuse for Multiagent Case-Based Reasoning
pp. 123
NePaLTM: Design and Implementation of Nested Parallelism for Transactional Memory Systems
pp. 125
Accurate Airway Wall Estimation Using Phase Congruency
pp. 125
Human-Robot Swarm Interaction with Limited Situational Awareness
pp. 126
Noninterference for Operating System Kernels
pp. 126
A Probabilistic Approach to Robust Matrix Factorization
pp. 128
Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps
pp. 128
Brain Tumor Segmentation and Tractographic Feature Extraction from Structural MR Images for Overall Survival Prediction
pp. 129
Parallelizing the Data Cube
pp. 130
EFIC: Edge Based Foreground Background Segmentation and Interior Classification for Dynamic Camera Viewpoints
pp. 131
Symbolic Execution and Thresholding for Efficiently Tuning Fuzzy Logic Programs
pp. 131
Improving Recovery in Weak-Voting Data Replication
pp. 133
How to Fool an Unbounded Adversary with a Short Key
pp. 133
Realistic, Mathematically Tractable Graph Generation and Evolution, Using Kronecker Multiplication
pp. 135
Feedback Dynamic between Emotional Reinforcement and Healthy Eating: An Application of the Reciprocal Markov Model
pp. 135
Documentation and source listings
pp. 136
Monitoring Neurological Disease in Phonation
pp. 136
Feature Extractor Based Deep Method to Enhance Online Arabic Handwritten Recognition System
pp. 137
A Microsurgery Simulation System
pp. 137
Mobile Devices and Mobile Applications Used in Parkinson’s Disease
pp. 137
Kolmogorov Complexity with Error
pp. 137
The 4 Diabetes Support System: A Case Study in CBR Research and Development
pp. 137
Monotonicity in Ant Colony Classification Algorithms
pp. 137
Exploiting Unlabeled Data for Question Classification
pp. 138
Recruitment Framework for Participatory Sensing Data Collections
pp. 138
Gender Classification in Human Gait Using Support Vector Machine
pp. 139
The Theory of Stabilisation Monoids and Regular Cost Functions
pp. 139
Scalable Simulation of Cellular Signaling Networks
pp. 140
An Investigation into Applying Support Vector Machines to Pixel Classification in Image Processing
pp. 141
Extracting Structured Subject Information from Digital Document Archives
pp. 142
Designing a Rank Metric Based McEliece Cryptosystem
pp. 142
An automata-theoretic approach to branching-time model checking (Extended abstract)
pp. 143
Network Anomaly Detection Based on an Ensemble of Adaptive Binary Classifiers
pp. 143
Auto-Vectorization of Loops on Intel 64 and Intel Xeon Phi: Analysis and Evaluation
pp. 143
Efficient Interpolant Generation in Satisfiability Modulo Linear Integer Arithmetic
pp. 143
An investigation into functions as processes
pp. 144
Listing Maximal Independent Sets with Minimal Space and Bounded Delay
pp. 145
On Higher Order Computations and Synaptic Meta-Plasticity in the Human Brain
pp. 145
Kodo: An Open and Research Oriented Network Coding Library
pp. 145
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM
pp. 145
Exploration of Online Health Support Groups Through the Lens of Sentiment Analysis
pp. 145
On the Stratification of Multi-label Data
pp. 146
The Multiparty Communication Complexity of Exact-T: Improved Bounds and New Problems
pp. 147
The iLand of Madeira Location Aware Multimedia Stories
pp. 147
Improvements for Truthful Mechanisms with Verifiable One-Parameter Selfish Agents
pp. 147
Secure Remote Authentication Using Biometric Data
pp. 148
IMPRECO: A Tool for Improving the Prediction of Protein Complexes
pp. 148
Deploying Wireless Networks with Beeps
pp. 149
Constant Acceleration Theorem for Extended von Neumann Neighbourhoods
pp. 149
Semantic Matching Strategies for Job Recruitment: A Comparison of New and Known Approaches
pp. 150
Identifying References to Datasets in Publications
pp. 150
Predicting Learners’ Emotions in Mobile MOOC Learning via a Multimodal Intelligent Tutor
pp. 150
Personality and Persuasive Technology: An Exploratory Study on Health-Promoting Mobile Applications
pp. 150
Reducing Distortion in Phylogenetic Networks
pp. 151
Approximate Frequent Itemset Discovery from Data Stream
pp. 152
A Parallel Operator for Real-Time Processes with Predicate Transformer Semantics
pp. 152
Representative Patch-based Active Appearance Models Generated from Small Training Populations
pp. 153
Compression of Deep Neural Networks on the Fly
pp. 154
Modeling the Social Response to a Disease Outbreak
pp. 156
Extending OWL with Custom Relations for Knowledge-Driven Intelligent Agents
pp. 158
Sensitive Error Correcting Output Codes
pp. 158
Deep Neural Networks for Fast Segmentation of 3D Medical Images
pp. 159
Mining Structural Databases: An Evolutionary Multi-Objetive Conceptual Clustering Methodology
pp. 159
A Survey of Models of the Web Graph
pp. 160
An MDE-Based Approach for Solving Configuration Problems: An Application to the Eclipse Platform
pp. 161
Continuous Monitoring in the Dynamic Sensor Field Model
pp. 161
Depth Boundedness in Multiset Rewriting Systems with Name Binding
pp. 161
Optimising Darwinian Data Structures on Google Guava
pp. 161
Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques
pp. 162
Adaptive Testing of Deterministic Implementations Specified by Nondeterministic FSMs
pp. 163
Making Sense of Numerical Data - Semantic Labelling of Web Tables
pp. 163
A Unifying View of Genome Rearrangements
pp. 163
An Ontology Evolution-Based Framework for Semantic Information Retrieval
pp. 163
People Tracking Algorithm for Human Height Mounted Cameras
pp. 163
Stochastic Local Search for SMT: Combining Theory Solvers with WalkSAT
pp. 163
On Constructor Rewrite Systems and the Lambda-Calculus
pp. 164
Think Locally, Act Globally: Highly Balanced Graph Partitioning
pp. 165
Enumeration and Decidable Properties of Automatic Sequences
pp. 166
PTAS for Weighted Set Cover on Unit Squares
pp. 166
Social Network Analysis of 45,000 Schools: A Case Study of Technology Enhanced Learning in Europe
pp. 169
Modeling cryptographic protocols and their collusion analysis
pp. 169
Gradient-Based Attribution Methods
pp. 170
Real-Time Program Refinement Using Auxiliary Variables
pp. 171
Caption Detection and Removal in a TV Scene
pp. 171
Single Image Deblurring Using Motion Density Functions
pp. 172
Quantified Data Automata on Skinny Trees: An Abstract Domain for Lists
pp. 172
Optimal Selection of Microarray Analysis Methods Using a Conceptual Clustering Algorithm
pp. 173
Specification-Based Program Repair Using SAT
pp. 174
Heuristics to optimize the speed-up of parallel programs
pp. 174
Parliament Archives Used for Automatic Training of Multi-lingual Automatic Speech Recognition Systems
pp. 174
On Upper-Confidence Bound Policies for Switching Bandit Problems
pp. 174
A RuleML Study on Integrating Geographical and Health Information
pp. 174
A Crisp Representation for Fuzzy $\cal SHOIN$ with Fuzzy Nominals and General Concept Inclusions
pp. 175
Architecture Performance Prediction Using Evolutionary Artificial Neural Networks
pp. 175
How to Assess Cloud Service Contracts?
pp. 176
Analysis on the Viewpoint Dependency in 3-D Object Recognition by Support Vector Machines
pp. 176
Ontology–Based Visualization of Characters’ Intentions
pp. 176
A Deep Learning Approach for Semantic Segmentation in Histology Tissue Images
pp. 176
LEAP: A Next-Generation Client VPN and Encrypted Email Provider
pp. 177
Multi-platform Chatbot Modeling and Deployment with the Jarvis Framework
pp. 177
Analysis of Privacy Policies to Enhance Informed Consent
pp. 177
Evaluation of Diffusion Techniques for Improved Vessel Visualization and Quantification in Three-Dimensional Rotational Angiography
pp. 179
A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks
pp. 180
To Infinity and Beyond: On ICA over Hilbert Spaces
pp. 180
Performance Analysis of Fuzzy Aggregation Operations for Combining Classifiers for Natural Textures in Images
pp. 181
Multi-modal Brain Tumor Segmentation Using Stacked Denoising Autoencoders
pp. 181
On the Periods of Spatially Periodic Preimages in Linear Bipermutive Cellular Automata
pp. 181
Permuted Longest-Common-Prefix Array
pp. 182
The Functional Programming Language R and the Paradigm of Dynamic Scientific Programming
pp. 182
A Comparison of Two Proof Critics: Power vs. Robustness
pp. 182
Event-Based Monitoring of Process Execution Violations
pp. 182
smid: A Black-Box Program Driver
pp. 183
Modeling Data Flow Execution in a Parallel Environment
pp. 183
Finite and Infinite Computations and a Classification of Two-Dimensional Cellular Automata Using Infinite Computations
pp. 184
Controlling for Population Variances in Health and Exposure Risk Using Randomized Matrix Based Mathematical Modeling
pp. 184
Entangled Decision Forests and Their Application for Semantic Segmentation of CT Images
pp. 184
One Year of the OpenCitations Corpus
pp. 185
Efficient Unbound Docking of Rigid Molecules
pp. 185
Exact Algorithms for NP-Hard Problems: A Survey
pp. 185
Exploiting Multimodality in Video Hyperlinking to Improve Target Diversity
pp. 185
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks
pp. 186
Improving Children’s Writing Ability
pp. 187
Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s
pp. 187
A Practical Attack on Some Braid Group Based Cryptographic Primitives
pp. 187
Information Hiding Using CAVLC: Misconceptions and a Detection Strategy
pp. 187
A Simple Linear-Time Modular Decomposition Algorithm for Graphs, Using Order Extension
pp. 188
Modeling and Verification of a Dual Chamber Implantable Pacemaker
pp. 188
The Weak Aggregating Algorithm and Weak Mixability
pp. 189
Basic Principles of Learning Bayesian Logic Programs
pp. 189
On-the-Fly Model Checking for Extended Action-Based Probabilistic Operators
pp. 190
Shadow Removal in Outdoor Video Sequences by Automatic Thresholding of Division Images
pp. 190
New statistical models for randoms-precorrected PET scans
pp. 190
KPCA vs. PCA Study for an Age Classification of Speakers
pp. 191
Tracing the Man in the Middle in Monoidal Categories
pp. 192
Efficient Compilers for Authenticated Group Key Exchange
pp. 192
Adaptive Security in Identity-Based Authenticated Key Agreement with Multiple Private Key Generators
pp. 193
Considering Context and Users in Interactive Systems Analysis
pp. 195
Edge Preserving Regularization and Tracking for Diffusion Tensor Imaging
pp. 195
Knowledge Component Suggestion for Untagged Content in an Intelligent Tutoring System
pp. 195
Potentials of Smart Breathalyzer: Interventions for Excessive Drinking Among College Students
pp. 195
Practical API Protocol Checking with Access Permissions
pp. 196
Automated Incremental Pairwise Testing of Software Product Lines
pp. 196
Metabolic P System Flux Regulation by Artificial Neural Networks
pp. 199
Bi-Modal Deep Boltzmann Machine Based Musical Emotion Classification
pp. 200
Discriminative Tracking by Metric Learning
pp. 201
The Lambda Calculus: Practice and Principle
pp. 202
Information Systems Strategic Planning for a Naval Hospital
pp. 203
A Multiagent Approach to Obtain Open and Flexible User Models in Adaptive Learning Communities
pp. 205
Deep Learning of Local RGB-D Patches for 3D Object Detection and 6D Pose Estimation
pp. 205
Mediation, ODR, and the Web 2.0: A Case for Relational Justice
pp. 205
Predicate Generation for Learning-Based Quantifier-Free Loop Invariant Inference
pp. 205
Automatic Text Summarization Using a Machine Learning Approach
pp. 205
Detecting Multiple Stochastic Network Motifs in Network Data
pp. 205
Using EMV Cards for Single Sign-On
pp. 207
I Got Plenty o’ Nuttin’
pp. 207
A Hybrid Algorithm for the Examination Timetabling Problem
pp. 208
Scalable Data Management in Distributed Information Systems
pp. 210
Precise Data Access on Distributed Log-Structured Merge-Tree
pp. 210
Treewidth Computation and Extremal Combinatorics
pp. 211
User Satisfaction in Long Term Group Recommendations
pp. 211
A Novel Artificial Hydrocarbon Networks Based Value Function Approximation in Hierarchical Reinforcement Learning
pp. 211
LA-LDA: A Limited Attention Topic Model for Social Recommendation
pp. 212
Immersive Molecular Virtual Reality Based on X3D and Web Services
pp. 212
Mobility Detection Using Everyday GSM Traces
pp. 212
A Certified Data Race Analysis for a Java-like Language
pp. 212
Goal-Equivalent Secure Business Process Re-engineering
pp. 213
Feature selection using rough sets theory
pp. 213
Entropy-Optimized Texture Models
pp. 214
Using PVSio-web to Demonstrate Software Issues in Medical User Interfaces
pp. 214
Evaluating Surgical Skills from Kinematic Data Using Convolutional Neural Networks
pp. 215
Axiomatising real-timed processes
pp. 215
A Fine-Grained Parallel Particle Swarm Optimization on Many-core and Multi-core Architectures
pp. 218
Adoption of Cloud Computing in Hotel Industry as Emerging Services
pp. 218
A Violence Detection Approach Based on Spatio-temporal Hypergraph Transition
pp. 218
Information Seeking by Humanities Scholars
pp. 220
Next Generation LearnLib
pp. 221
Graph Formation Effects on Social Welfare and Inequality in a Networked Resource Game
pp. 222
Choosing Data Integration Approaches Based on Data Source Characterization
pp. 223
Training CNNs for Image Registration from Few Samples with Model-based Data Augmentation
pp. 224
From Obfuscation to the Security of Fiat-Shamir for Proofs
pp. 224
Applying CEGAR to the Petri Net State Equation
pp. 224
Efficient Online Timed Pattern Matching by Automata-Based Skipping
pp. 224
Computable Versions of Baire’s Category Theorem
pp. 225
Fast and Accurate Connectivity Analysis Between Functional Regions Based on DT-MRI
pp. 225
Succinct de Bruijn Graphs
pp. 225
Image Quality Transfer via Random Forest Regression: Applications in Diffusion MRI
pp. 225
A Robust Evolutionary Optimisation Approach for Parameterising a Neural Mass Model
pp. 225
Using Semantic Classes as Document Keywords
pp. 226
Program Repair as a Game
pp. 226
Enhancing the Debugging of Maude Specifications
pp. 226
Research and Development of Ball-Picking Robot Technology
pp. 226
Anagram: A Content Anomaly Detector Resistant to Mimicry Attack
pp. 227
Effective learning in dynamic environments by explicit context tracking
pp. 227
Personal Authenticator on the Basis of Two-Factors: Palmprint Features and Tokenized Random Data
pp. 228
Dense Depth Maps from Low Resolution Time-of-Flight Depth and High Resolution Color Views
pp. 231
Quantum Information Splitting Using GHZ-Type and W-Type States
pp. 232
A General-Purpose CRN-to-DSD Compiler with Formal Verification, Optimization, and Simulation Capabilities
pp. 233
Randomization Can’t Stop BPF JIT Spray
pp. 233
High-Level Modeling of Component-Based CSPs
pp. 234
Riemannian Graph Diffusion for DT-MRI Regularization
pp. 234
Handling Preferences in the ”Pre-conflicting” Phase of Decision Making Processes under Multiple Criteria
pp. 235
The Computational Geometry of Comparing Shapes
pp. 237
Practical Gaze Point Computing Method by 3D Position Estimation of Facial and Eye Features
pp. 238
A Lexical Database of Portuguese Multiword Expressions
pp. 238
Improved Parameterized Upper Bounds for Vertex Cover
pp. 239
Credulous and Sceptical Argument Games for Preferred Semantics
pp. 239
Biased Model Checking Using Flows
pp. 239
Dimensionality Reductions That Preserve Volumes and Distance to Affine Spaces, and Their Algorithmic Applications
pp. 240
An Improved Approximation Algorithm for the Metric Uncapacitated Facility Location Problem
pp. 240
A Hiking Trip Through the Orders of Magnitude: Deriving Efficient Generators for Closed Simply-Typed Lambda Terms and Normal Forms
pp. 240
Multimodal Image Registration with Deep Context Reinforcement Learning
pp. 240
Augmented Reality Guidance for Needle Biopsies: A Randomized, Controlled Trial in Phantoms
pp. 241
Dynamic Resource Matching for Multi-clusters Based on an Ontology-Fuzzy Approach
pp. 243
High-Dimensional White Matter Atlas Generation and Group Analysis
pp. 243
Factoring User Experience into the Design of Ambient and Mobile Systems
pp. 244
The HOL-Omega Logic
pp. 245
Globally Optimal Tumor Segmentation in PET-CT Images: A Graph-Based Co-segmentation Method
pp. 246
Evaluation of Dictionary Creating Methods for Under-Resourced Languages
pp. 246
A PTAS for Static Priority Real-Time Scheduling with Resource Augmentation
pp. 246
List.MID: A MIDI-Based Benchmark for Evaluating RDF Lists
pp. 249
From Transition Systems to Variability Models and from Lifted Model Checking Back to UPPAAL
pp. 249
Robotic Kidney and Spine Percutaneous Procedures Using a New Laser-Based CT Registration Method
pp. 249
A Note on the Number of Empty Triangles
pp. 249
Refinement Calculus for Logic Programming in Isabelle/HOL
pp. 249
A System to Measure Gap Distance between Two Vehicles Using License Plate Character Height
pp. 250
Compositional process semantics of Petri Boxes
pp. 250
Image Super-Resolution with Fast Approximate Convolutional Sparse Coding
pp. 250
A Grey-Box Approach for Automated GUI-Model Generation of Mobile Applications
pp. 250
Water Cycle Algorithm with Fuzzy Logic for Dynamic Adaptation of Parameters
pp. 250
Mining Twitter for Suicide Prevention
pp. 251
Two FCA-Based Methods for Mining Gene Expression Data
pp. 253
Gradient-Based Vs. Propagation-Based Explanations: An Axiomatic Comparison
pp. 253
Data Retrieval = Text Retrieval?
pp. 254
Classifier Chains for Multi-label Classification
pp. 255
Optimal Broadcasting in Metropolitan MANETs Using Multiobjective Scatter Search
pp. 255
A First Look at QUIC in the Wild
pp. 255
Human-in-the-Loop Control Processes in Gas Turbine Maintenance
pp. 256
Indoor Localization of JADE Agents Without a Dedicated Infrastructure
pp. 257
Blind decoding, blind undeniable signatures, and their applications to privacy protection
pp. 260
HEPPA: Highly Efficient Privacy Preserving Authentication for ITS
pp. 260
Comparison of User Performance in Mixed 2D-3D Multi-Display Environments
pp. 260
A Purely Definitional Universal Domain
pp. 260
New Algorithms for Enumerating All Maximal Cliques
pp. 261
Learning Bayesian Networks by Genetic Algorithms: A case study in the prediction of survival in malignant skin melanoma
pp. 261
Improving Traceability Links Recovery in Process Models Through an Ontological Expansion of Requirements
pp. 261
Resource Management for Running HPC Applications in Container Clouds
pp. 262
Flatness Is Not a Weakness
pp. 262
Testing Container Classes: Random or Systematic?
pp. 263
A User Interface for a Game-Based Protocol Verification Tool
pp. 263
A Game-Theoretic Approach to Credit Card Fraud Detection
pp. 264
Access Control Policies for Relational Databases in Data Exchange Process
pp. 264
A threshold for unsatisfiability
pp. 265
dipSPAdes: Assembler for Highly Polymorphic Diploid Genomes
pp. 267
A Database of Elliptic Curves — First Report
pp. 267
Performance Metrics for Coverage of Cleaning Robots with MoCap System
pp. 267
A Hierarchy of Equivalences for Probabilistic Processes
pp. 268
Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation
pp. 269
Firm Deadline Checking of Safety-Critical Java Applications with Statistical Model Checking
pp. 269
Grow and Serve: Growing Django Citation Services Using SBSE
pp. 269
Fast and Easy Blind Deblurring Using an Inverse Filter and PROBE
pp. 269
Modular Visitor Components
pp. 271
Formal Analysis of the Estonian Mobile-ID Protocol
pp. 271
Processor Sharing Flows in the Internet
pp. 273
Stealing Items More Efficiently with Ants: A Swarm Intelligence Approach to the Travelling Thief Problem
pp. 273
The Impact of Input Error on the Scheduling of Task Graphs with Imprecise Computations in Heterogeneous Distributed Real-Time Systems
pp. 273
Integrating Robust Railway Network Design and Line Planning under Failures
pp. 274
The Planar k-Means Problem is NP-Hard
pp. 274
Wavelet Appearance Pyramids for Landmark Detection and Pathology Classification: Application to Lumbar Spinal Stenosis
pp. 275
Cluster Ensembles Optimization Using Coral Reefs Optimization Algorithm
pp. 275
Enabling Flexible IT Services by Crowdsourcing: A Method for Estimating Crowdsourcing Participants
pp. 276
Controlled English for Reasoning on the Semantic Web
pp. 276
Abstractions and Pattern Databases: The Quest for Succinctness and Accuracy
pp. 277
Theoretical Analysis of XL over Small Fields
pp. 277
Attention Prediction in Egocentric Video Using Motion and Visual Saliency
pp. 278
Geo-Textual Relevance Ranking to Improve a Text-Based Retrieval for Geographic Queries
pp. 278
Ranking and Selecting Services
pp. 278
Driving Forces and Design of the TTÜ e-Governance Technologies and Services Master’s Program
pp. 278
Improving University Quality of Services through Mobile Devices: The Case of the Technological University of Panama
pp. 281
Mobile Devices for the Visit of “Anfiteatro Campano” in Santa Maria Capua Vetere
pp. 282
Computing with Multi-membranes
pp. 282
The Development of an Undergraduate Data Curriculum: A Model for Maximizing Curricular Partnerships and Opportunities
pp. 282
Fileteller: Paying and Getting Paid for File Storage
pp. 282
Authorship Identification of Source Codes
pp. 282
VCL, a Visual Language for Modelling Software Systems Formally
pp. 283
Correction of Probe Pressure Artifacts in Freehand 3D Ultrasound
pp. 284
Arithmetical Metabolic P Systems
pp. 284
A Hybrid Classification Approach to Ultrasonic Shaft Signals
pp. 285
Energy Based Acoustic Source Localization
pp. 285
Equitable Coloring Extends Chernoff-Hoeffding Bounds
pp. 285
Visual Scene Understanding for Autonomous Driving Using Semantic Segmentation
pp. 285
The ISOcat Registry Reloaded
pp. 286
Laying the Foundations for a Formal Theory of Drama
pp. 286
An Analysis of New Expert Knowledge Scaling Methods for Biologically Inspired Computing
pp. 287
On the estimation of join result sizes
pp. 287
The Weighted Spanning Tree Constraint Revisited
pp. 287
System Description: Teyjus—A Compiler and Abstract Machine Based Implementation of λProlog
pp. 288
Steganalysis Based on Statistical Properties of the Encrypted Messages
pp. 288
The REVERE Project: Experiments with the Application of Probabilistic NLP to Systems Engineering
pp. 289
Software Citation in Theory and Practice
pp. 290
Time Delay Neural Networks Designed Using Genetic Algorithms for Short Term Inter-City Traffic Forecasting
pp. 290
Linux Server Monitoring and Self-healing System Using Nagios
pp. 290
Explicit Deterministic Constructions for Membership in the Bitprobe Model
pp. 291
Quantum Search on Bounded-Error Inputs
pp. 291
Unsupervised Learning of Mutagenesis Molecules Structure Based on an Evolutionary-Based Features Selection in DARA
pp. 292
Data Visualization Revisited
pp. 293
Effective Allocation of Fleet Frequencies by Reducing Intermediate Stops and Short Turning in Transit Systems
pp. 294
Composable Oblivious Extended Permutations
pp. 294
Symbolic Execution Enhanced System Testing
pp. 295
Strabon: A Semantic Geospatial DBMS
pp. 295
A Greedy Approach for the Efficient Repair of Stochastic Models
pp. 296
Retrieval of Similar Electronic Health Records Using UMLS Concept Graphs
pp. 296
A Landmarker Selection Algorithm Based on Correlation and Efficiency Criteria
pp. 299
Security Assessment of Cryptographic Algorithms
pp. 299
A Comparable Study on Model Averaging, Ensembling and Reranking in NMT
pp. 299
isl: An Integer Set Library for the Polyhedral Model
pp. 300
Anatomically Informed Convolution Kernels for the Projection of fMRI Data on the Cortical Surface
pp. 301
Impedance Control of a Pneumatic Muscles-Driven Ankle Rehabilitation Robot
pp. 303
Data Augmentation for Skin Lesion Analysis
pp. 303
Performance Analysis of Cloud Computing Infrastructure
pp. 303
A Comparative Study of Social Media and Traditional Polling in the Egyptian Uprising of 2011
pp. 304
Effects of Experience, Training and Expertise on Multisensory Perception: Investigating the Link between Brain and Behavior
pp. 305
Security Analysis of Some Proxy Signatures
pp. 305
An extensible framework for the development of coordinated applications
pp. 305
On the Role of Fitness, Precision, Generalization and Simplicity in Process Discovery
pp. 308
Sub-category Classifiers for Multiple-instance Learning and Its Application to Retinal Nerve Fiber Layer Visibility Classification
pp. 308
A Context-Aware Inter-organizational Collaboration Model Applied to International Trade
pp. 309
Iterative Machine-Learning Chinese Term Extraction
pp. 309
Active Learning Based Weak Supervision for Textual Survey Response Classification
pp. 309
SCALPP: A Safe Methodology to Robotize Skin Harvesting
pp. 310
Applying Evolutionary Computation Methods to Formal Testing and Model Checking
pp. 310
Efficient Identity Based Signature Schemes Based on Pairings
pp. 311
Quantum-Chemical Insights from Interpretable Atomistic Neural Networks
pp. 311
Confluence Reduction for Probabilistic Systems
pp. 311
Hashtag Lifespan and Social Networks during the London Riots
pp. 313
Gait Recognition Using GA-SVM Method Based on Electromyography Signal
pp. 313
Bitcoin Transaction Malleability and MtGox
pp. 314
Proactive Transparency and Open Data: A Tentative Analysis
pp. 316
Automated Topology Correction for Human Brain Segmentation
pp. 317
The Distortion of Cardinal Preferences in Voting
pp. 318
MAPO: Mining and Recommending API Usage Patterns
pp. 319
Fast Subgraph Isomorphism Detection for Graph-Based Retrieval
pp. 319
A Novel Clustering Algorithm Based on Immune Network with Limited Resource
pp. 319
Inductive Theorem Proving and Computer Algebra in the MathWeb Software Bus
pp. 320
Sequential functions on indexed domains and full abstraction for a sub-language of PCF
pp. 322
Implementing a Real-Time Hough Transform on a Mobile Robot
pp. 322
Featureless Pattern Recognition in an Imaginary Hilbert Space and Its Application to Protein Fold Classification
pp. 326
Deformable Registration of a Preoperative 3D Liver Volume to a Laparoscopy Image Using Contour and Shading Cues
pp. 326
On Multilingual Training of Neural Dependency Parsers
pp. 329
Detecting and Resolving Conflicts of Mutual-Exclusion and Binding Constraints in a Business Process Context
pp. 330
Finepoints: Partitioned Multithreaded MPI Communication
pp. 330
Silver Gaming: Serious Fun for Seniors?
pp. 331
Stock Portfolio Construction Using Evolved Bat Algorithm
pp. 331
Subsumption for XML Types
pp. 332
All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE
pp. 332
Violence Detection in Video Using Computer Vision Techniques
pp. 332
Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering
pp. 332
Hyponymy Extraction and Web Search Behavior Analysis Based on Query Reformulation
pp. 332
A Digital Pediatric Brain Structure Atlas from T1-Weighted MR Images
pp. 333
Resurrecting My Revolution
pp. 333
Hybrid Potential Field Swarm Optimization Based Novel Targeted Drug Delivery System Using Drug Loaded Nano Carriers
pp. 334
Modelling Timeouts without Timelocks
pp. 335
Digital Angioplasty Balloon Inflation Device for Interventional Cardiovascular Procedures
pp. 335
Towards a Refinement Calculus for Concurrent Real-Time Programs
pp. 337
Hybrid Intelligent Systems for Stock Market Analysis
pp. 337
The Contribution of Multimodal Adaptation Techniques to the GUIDE Interface
pp. 338
CASFinder: Detecting Common Attack Surface
pp. 341
Discovering Patterns in Social Networks with Graph Matching Algorithms
pp. 341
Evaluating Evaluation Methods for Generation in the Presence of Variation
pp. 342
Dynamic Representations of Sparse Graphs
pp. 344
BayesTH-MCRDR Algorithm for Automatic Classification of Web Document
pp. 345
Deadline-Aware Deployment for Time Critical Applications in Clouds
pp. 345
A Modeling Tool for Service-Oriented Open Multiagent Systems
pp. 346
Formalising Simple Codecharts
pp. 347
Information hiding terminology
pp. 349
A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks
pp. 349
Application of Adaptive Fuzzy Control in the Variable Speed Wind Turbines
pp. 349
Termination and Cost Analysis of Loops with Concurrent Interleavings
pp. 350
Critiquing Text Analysis in Social Modeling: Best Practices, Limitations, and New Frontiers
pp. 351
A New Learning Algorithm for Mean Field Boltzmann Machines
pp. 352
STATS - A Point Access Method for Multidimensional Clusters
pp. 355
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
pp. 355
Solution of an Inverse Problem in Raman Spectroscopy of Multi-component Solutions of Inorganic Salts by Artificial Neural Networks
pp. 356
Sensorless Reconstruction of Freehand 3D Ultrasound Data
pp. 358
Aesthetic Patterns from the Perturbed Orbits of Discrete Dynamical Systems
pp. 359
Mechanizing logical relations
pp. 359
Which Targets to Contact First to Maximize Influence over Social Network
pp. 360
libalf: The Automata Learning Framework
pp. 361
Semantic analyzer of modula-programs
pp. 362
A Service for Supporting Virtual Views of Large Heterogeneous Digital Libraries
pp. 362
Fair Reviewer Assignment Considering Academic Social Network
pp. 363
The State-of-the-Art in IC Reverse Engineering
pp. 364
Motion-Compensated MR Valve Imaging with COMB Tag Tracking and Super-Resolution Enhancement
pp. 367
Communication Platform to Enable Collaborative Tourism Applications
pp. 367
A Branding Strategy for Business Types
pp. 367
Leaf Recognition for Plant Classification Based on Wavelet Entropy and Back Propagation Neural Network
pp. 367
Multi-label Poster Classification into Genres Using Different Problem Transformation Methods
pp. 369
Rescheduling Dense Train Traffic over Complex Station Interlocking Areas
pp. 369
A Formal and Empirical Study of Unsupervised Signal Combination for Textual Similarity Tasks
pp. 369
Sentiment Classification over Opinionated Data Streams Through Informed Model Adaptation
pp. 370
Randomized Self-assembly for Approximate Shapes
pp. 372
An Efficient Communication Aware Heuristic for Multiple Cloud Application Placement
pp. 373
Text Segmentation for Efficient Information Retrieval
pp. 374
Sorting, Searching, and Simulation in the MapReduce Framework
pp. 374
Advanced Safety Sensor for Gate Automation
pp. 376
Performance Scaling of Multi-objective Evolutionary Algorithms
pp. 379
A Surface Patch-Based Segmentation Method for Hippocampal Subfields
pp. 379
Hybrid Cascade Model for Face Detection in the Wild Based on Normalized Pixel Difference and a Deep Convolutional Neural Network
pp. 380
Patterns of Influence in a Recommendation Network
pp. 381
Online Malware Detection in Cloud Auto-scaling Systems Using Shallow Convolutional Neural Networks
pp. 384
Unsupervised Citation Sentence Identification Based on Similarity Measurement
pp. 385
Energy-Driven Straggler Mitigation in MapReduce
pp. 385
On Consensus Clustering Validation
pp. 386
Removing the Blinkers: What a Process View Learns About G2G Information Systems in Flanders (Part 2)
pp. 386
Analytical Methods to Investigate the Effects of External Influence on Socio-Cultural Opinion Evolution
pp. 386
Learning Category-Specific Mesh Reconstruction from Image Collections
pp. 387
Online Train Disposition: To Wait or Not to Wait?
pp. 388
GameTime: A Toolkit for Timing Analysis of Software
pp. 388
The Recursive Union of Some Gradual Types
pp. 389
Voting Between Multiple Data Representations for Text Chunking
pp. 389
A Synchronisation Mechanism for Replicated Objects
pp. 390
Automatic Cup-to-Disc Ratio Estimation Using Active Contours and Color Clustering in Fundus Images for Glaucoma Diagnosis
pp. 390
Improving the User-System Interaction in a Web Multi-agent System Using Fuzzy Multi-granular Linguistic Information
pp. 391
Solving Manufacturing Cell Design Problems Using the Black Hole Algorithm
pp. 392
Application of SOM-Based Visualization Maps for Time-Response Analysis of Industrial Processes
pp. 393
Representative Sampling for Text Classification Using Support Vector Machines
pp. 393
A Corpus Balancing Method for Language Model Construction
pp. 396
Experimental Evaluation of Classical Automata Constructions
pp. 398
A Visual Uptake on the Digital Divide
pp. 399
Disruption Management in Passenger Railway Transportation
pp. 400
Another Approach to Pairing Computation in Edwards Coordinates
pp. 402
Can Word Embedding Help Term Mismatch Problem? – A Result Analysis on Clinical Retrieval Tasks
pp. 402
The Impact of Inaccurate Phonetic Annotations on Speech Recognition Performance
pp. 403
Regular Model Checking
pp. 405
Conceptual Search for Arabic Web Content
pp. 405
Maximum Mutual Information Principle for Dynamic Sensor Query Problems
pp. 405
HRT-UML: Taking HRT-HOOD onto UML
pp. 407
Robust Key Extraction from Physical Uncloneable Functions
pp. 407
High availability support in CORBA environments
pp. 408
Integration of Sequence Learning and CBR for Complex Equipment Failure Prediction
pp. 408
On the Reverse Engineering of the Citadel Botnet
pp. 409
Knowledge Discovery of Complex Data Using Gaussian Mixture Models
pp. 409
Scheduling for Speed Bounded Processors
pp. 410
Fault Severity Estimation in Rotating Mechanical Systems Using Feature Based Fusion and Self-Organizing Maps
pp. 412
Stationary Points for the Family of Fermat–Torricelli–Coulomb-Like Potential Functions
pp. 412
A complete proof system for timed observations
pp. 414
Multi-view Matching for Unordered Image Sets, or “How Do I Organize My Holiday Snaps?”
pp. 415
AVEC 2011–The First International Audio/Visual Emotion Challenge
pp. 416
A Generalized Representer Theorem
pp. 421
Beyond Lamport’s Happened-Before: On the Role of Time Bounds in Synchronous Systems
pp. 421
Faster Algorithms for Incremental Topological Ordering
pp. 423
SMS Spam Filtering Using Probabilistic Topic Modelling and Stacked Denoising Autoencoder
pp. 424
Optimized Mining of Potential Positive and Negative Association Rules
pp. 424
sharpSAT – Counting Models with Advanced Component Caching and Implicit BCP
pp. 424
Situational Evaluation of Method Fragments: An Evidence-Based Goal-Oriented Approach
pp. 425
RATSY – A New Requirements Analysis Tool with Synthesis
pp. 425
A Robot Architecture of Hierarchical Finite State Machine for Autonomous Mobile Manipulator
pp. 429
Predicting the Effects of Deep Brain Stimulation with Diffusion Tensor Based Electric Field Models
pp. 430
Deriving and Combining Mixed Graphs from Regulatory Documents Based on Constraint Relations
pp. 431
Using Network Information to Perform Meta-scheduling in Advance in Grids
pp. 432
An Empirical Study of Long-Lived Code Clones
pp. 433
ITS Tools for Natural Language Dialogue: A Domain-Independent Parser and Planner
pp. 433
Certifying Data in Multiparty Session Types
pp. 433
Extracting Non-redundant Correlated Purchase Behaviors by Utility Measure
pp. 434
Methodology of Precise Skull Model Creation
pp. 434
Exposing Heterogeneous Data Sources as SPARQL Endpoints through an Object-Oriented Abstraction
pp. 434
FBD: A Function Block Designer for Distributed and Collaborative Process Planning
pp. 435
Serendipity with Music Streaming Services: The Mediating Role of User and Task Characteristics
pp. 436
Value-Driven Characters for Storytelling and Drama
pp. 438
A Comparison of On-Line Computer Science Citation Databases
pp. 441
Conflict-Based Selection of Branching Rules
pp. 442
New Regularized Algorithms for Transductive Learning
pp. 444
Evaluation Measures for TCBR Systems
pp. 446
A Method to Improve the Early Stages of the Robotic Process Automation Lifecycle
pp. 448
Multi-Parametric Toolbox (MPT)
pp. 449
A Software Framework for Creating Patient Specific Geometric Models from Medical Imaging Data for Simulation Based Medical Planning of Vascular Surgery
pp. 451
Statistical Learning of Spatiotemporal Patterns from Longitudinal Manifold-Valued Networks
pp. 451
Towards Minimizing k-Submodular Functions
pp. 453
On Oblique Random Forests
pp. 455
Object Tracking in Nonuniform Illumination Using Space-Variant Correlation Filters
pp. 457
BitIodine: Extracting Intelligence from the Bitcoin Network
pp. 457
An Intelligent Technique for Forecasting Spatially Correlated Time Series
pp. 463
StegFS: A Steganographic File System for Linux
pp. 464
Experimental Study on Load Characteristics of Macro-Micro Dual-Drive Precision Positioning Mechanism
pp. 467
LIFT: Learned Invariant Feature Transform
pp. 467
Lightweight Verification of Executable Models
pp. 467
Successful Performance via Decision Generalisation in No Limit Texas Hold’em
pp. 468
Tight Bounds for Classical and Quantum Coin Flipping
pp. 469
Testing Geometric Convexity
pp. 469
Decentralised Authoring, Annotations and Notifications for a Read-Write Web with dokieli
pp. 470
GLT: A Unified API for Lightweight Thread Libraries
pp. 472
Spanish Question Answering Evaluation
pp. 472
Recognition of Transitive Actions with Hierarchical Neural Network Learning
pp. 473
Homogeneous Population Solving the Minimal Perturbation Problem in Dynamic Scheduling of Surgeries
pp. 474
Holomorphic models of exponential types in linear logic
pp. 474
Recent Advances on Multi-agent Patrolling
pp. 475
On drawing lines on a map
pp. 477
Pajek— Analysis and Visualization of Large Networks
pp. 480
Local Verification of Global Invariants in Concurrent Programs
pp. 482
Rule-Based Impact Propagation for Trace Replay
pp. 483
Graphviz— Open Source Graph Drawing Tools
pp. 484
Learning a Predictable and Generative Vector Representation for Objects
pp. 484
Active appearance models
pp. 486
An Efficient Parallel Solution of Complex Toeplitz Linear Systems,
pp. 486
Thesaurus Project: Design of New Autonomous Underwater Vehicles for Documentation and Protection of Underwater Archaeological Sites
pp. 487
An Analysis of Early Studies Released by the Lung Imaging Database Consortium (LIDC)
pp. 489
Improving Robustness of Slow Feature Analysis Based Localization Using Loop Closure Events
pp. 492
Trust-Aware Collaborative Filtering for Recommender Systems
pp. 492
Reweighted Random Walks for Graph Matching
pp. 494
Fast and Exact Primal-Dual Iterations for Variational Problems in Computer Vision
pp. 496
Tree Pattern Relaxation
pp. 496
Classifying Human Body Acceleration Patterns Using a Hierarchical Temporal Memory
pp. 496
Gland Instance Segmentation by Deep Multichannel Side Supervision
pp. 497
Security Vulnerability Information Service with Natural Language Query Support
pp. 497
Self-Organizing Map for the Curvature-Constrained Traveling Salesman Problem
pp. 500
A Comparative Analysis of RANSAC Techniques Leading to Adaptive Real-Time Random Sample Consensus
pp. 500
The Effect of Attribute Scaling on the Performance of Support Vector Machines
pp. 501
Tensor Factorization Using Auxiliary Information
pp. 501
Permutation Tests for Classification
pp. 503
Geographic Profiling of Criminal Groups for Military Cordon and Search
pp. 504
A Boosting Cascade for Automated Detection of Prostate Cancer from Digitized Histology
pp. 504
Modern Computational Techniques for Environmental Data; Application to the Global Ozone Layer
pp. 508
How Much Should Agents Remember? The Role of Memory Size on Convention Emergence Efficiency
pp. 509
The Perception of Sound Movements as Expressive Gestures
pp. 511
Top-k Pattern Matching Using an Information-Theoretic Criterion over Probabilistic Data Streams
pp. 512
Combination of Multiple Features in Support Vector Machine with Principal Component Analysis in Application for Alzheimer’s Disease Diagnosis
pp. 512
Collective Motion of a Swarm of Simulated Quadrotors Using Repulsion, Attraction and Orientation Rules
pp. 513
Towards Efficient Imputation by Nearest-Neighbors: A Clustering-Based Approach
pp. 514
Planar spanners and approximate shortest path queries among obstacles in the plane
pp. 515
Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
pp. 515
A BCI Platform Supporting AAL Applications
pp. 516
Comparing Source Sets and Persistent Sets for Partial Order Reduction
pp. 518
An Adapter-Based Approach to Co-evolve Generated SQL in Model-to-Text Transformations
pp. 518
Meteorology and Hydrology in Yosemite National Park: A Sensor Network Application
pp. 519
Laplacian Pyramid Reconstruction and Refinement for Semantic Segmentation
pp. 520
Designing the Web-Community for Self-managed Training of Runners
pp. 520
Efficient Proofs of Secure Erasure
pp. 520
Type-Based Object Immutability with Flexible Initialization
pp. 523
Intelligent Speech-Based Interactive Communication Between Mobile Cranes and Their Human Operators
pp. 524
Computational Proof as Experiment: Probabilistic Algorithms from a Thermodynamic Perspective
pp. 525
The Implementation of Regional Atmospheric Model Numerical Algorithms for CBEA-Based Clusters
pp. 526
Univariate and Multivariate Linear Regression Methods to Predict Interval-Valued Features
pp. 527
An Expansion Tester for Bounded Degree Graphs
pp. 527
Assessing Digital Skills of Refugee Migrants During Job Orientation in Germany
pp. 527
Probabilistic Automata on Finite Words: Decidable and Undecidable Problems
pp. 528
Inclusive Block Chain Protocols
pp. 528
Privacy-Preserving Datamining on Vertically Partitioned Databases
pp. 529
MediAssist: Using Content-Based Analysis and Context to Manage Personal Photo Collections
pp. 532
A Novel Anatomically-Constrained Global Tractography Approach to Monitor Sharp Turns in Gyri
pp. 533
Meta-model Assisted Evolutionary Optimization of Cellular Automata: An Application to the SCIARA Model
pp. 535
TENOR: A Lexical Normalisation Tool for Spanish Web 2.0 Texts
pp. 537
Robust Multiple Structures Estimation with J-Linkage
pp. 538
Lazy Parallel Kronecker Algebra-Operations on Heterogeneous Multicores
pp. 539
Property Testing on k-Vertex-Connectivity of Graphs
pp. 540
Evolving Gaits for Physical Robots with the HyperNEAT Generative Encoding: The Benefits of Simulation
pp. 541
Elastic Matching Using a Deformation Sphere
pp. 542
Collective Inference for Handling Autocorrelation in Network Regression
pp. 547
Joint Segmentation and CT Synthesis for MRI-only Radiotherapy Treatment Planning
pp. 547
Context Switching versus Context Permeability in Multiple Social Networks
pp. 552
Automata for the modal μ-calculus and related results
pp. 552
A Novel Approach for the Implementation of Large Scale Spiking Neural Networks on FPGA Hardware
pp. 553
Generalized Symbolic Execution for Model Checking and Testing
pp. 559
Battery-Aware Scheduling in Low Orbit: The GomX–3 Case
pp. 562
Multi-subject Dictionary Learning to Segment an Atlas of Brain Spontaneous Activity
pp. 562
Combined Word-Spacing Method for Disambiguating Korean Texts
pp. 564
Videogames and Virtual Reality as Effective Edutainment Tools
pp. 567
Category of Δ-functors
pp. 570
Graph Regularized Transductive Classification on Heterogeneous Information Networks
pp. 572
A General Testability Theory
pp. 577
On Mobility Analysis of Functional Sites from Time Lapse Microscopic Image Sequences of Living Cell Nucleus
pp. 578
Centrally Governed Blockchains: Optimizing Security, Cost, and Availability
pp. 579
Cloud@Home: Performance Management Components
pp. 579
Efficient Discovery of Compact Maximal Behavioral Patterns from Event Logs
pp. 581
Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs
pp. 584
FOD Restoration for Enhanced Mapping of White Matter Lesion Connectivity
pp. 585
Quantifier Elimination by Lazy Model Enumeration
pp. 587
Symbolic Computations on Rings of Rational Functions and Applications in Control Engineering
pp. 589
Fast Fully Automatic Segmentation of the Human Placenta from Motion Corrupted MRI
pp. 591
Integration and Clinical Evaluation of an Interactive Controllable Robotic System for Anaplastology
pp. 592
Pedagogical Agent Design: The Impact of Agent Realism, Gender, Ethnicity, and Instructional Role
pp. 595
Remote Batch Invocation for Compositional Object Services
pp. 598
Search Personalization with Embeddings
pp. 598
Earth Science Data Management: Mapping Actual Tasks to Conceptual Actions in the Curation Lifecycle Model
pp. 598
Multi-organ Segmentation Using Vantage Point Forests and Binary Context Features
pp. 599
All Your Voices are Belong to Us: Stealing Voices to Fool Humans and Machines
pp. 601
Content Search through Comparisons
pp. 603
A High-Order Solution for the Distribution of Target Registration Error in Rigid-Body Point-Based Registration
pp. 607
Multiple Object Segmentation and Tracking by Bayes Risk Minimization
pp. 610
Aligning Gaussian-Topic with Embedding Network for Summarization Ranking
pp. 610
Event Modeling and Recognition Using Markov Logic Networks
pp. 611
Syntactic Semiring of a Language
pp. 612
Fast Elastic Registration for Adaptive Radiotherapy
pp. 613
Emotion-Based Music Information Retrieval Using Lyrics
pp. 614
Development of a High Resolution 3D Infant Stomach Model for Surgical Planning
pp. 616
Crowd-Algorithm Collaboration for Large-Scale Endoscopic Image Annotation with Confidence
pp. 622
All-Pairs Shortest Paths with a Sublinear Additive Error
pp. 624
Emphysema Quantification on Cardiac CT Scans Using Hidden Markov Measure Field Model: The MESA Lung Study
pp. 626
Creating Digital Collections: Museum Content and the Public
pp. 627
Solution Patterns for Machine Learning
pp. 629
Affine Registration of Diffusion Tensor MR Images
pp. 631
Dynamic Facial Expression Recognition Using Longitudinal Facial Expression Atlases
pp. 632
Cutting Out the Middleman: Measuring Nuclear Area in Histopathology Slides Without Segmentation
pp. 634
A Protocol for Reconciling Recovery and High-Availability in Replicated Databases
pp. 636
Distributed Event-Triggered Consensus Control of Neutrally Stable Linear Multi-agent Systems
pp. 636
A New Neighborhood Based on Improvement Graph for Robust Graph Coloring Problem
pp. 637
Using Optical Flow Fields for Polyp Detection in Virtual Colonoscopy
pp. 640
Formalising a Hazard Warning Communication Protocol with Timed Automata
pp. 646
Improved scheduling algorithms for minsum criteria
pp. 646
Range Extension Attacks on Contactless Smart Cards
pp. 646
An Extension of the H-Search Algorithm for Artificial Hex Players
pp. 653
2D/3D Registration for Measurement of Implant Alignment After Total Hip Replacement
pp. 662
On the Hardness of Losing Weight
pp. 662
3D/2D Model-to-Image Registration Applied to TIPS Surgery
pp. 666
Classification of SPECT Images of Normal Subjects versus Images of Alzheimer’s Disease Patients
pp. 667
Detection of Differentiated vs. Undifferentiated Colonies of iPS Cells Using Random Forests Modeled with the Multivariate Polya Distribution
pp. 671
Drawing the “Big Picture” Concerning Digital 3D Technologies for Humanities Research and Education
pp. 676
Detecting 10,000 Cells in One Second
pp. 677
An Exploration of Design Cues for Heuristic-Based Decision-Making About Information Sharing
pp. 679
Collaborative Filtering with the Simple Bayesian Classifier
pp. 683
Magnified Real-Time Tomographic Reflection
pp. 685
Cognition is not computation; Evolution is not optimisation
pp. 685
Utilizing Staging Tables in Data Integration to Load Data into Materialized Views
pp. 685
An Evaluation of Computational Imaging Techniques for Heterogeneous Inverse Scattering
pp. 685
Security and Privacy Issues of Fog Computing: A Survey
pp. 686
Sound 3-Query PCPPs Are Long
pp. 694
$$\mu $$ Shield
pp. 694
On Possibilistic Case-Based Reasoning for Selecting Partners in Multi-agent Negotiation
pp. 697
Solving Deep Memory POMDPs with Recurrent Policy Gradients
pp. 703
Boundaries, Third Spaces and Public Libraries
pp. 704
Modelling the Evolution of Linguistic Diversity
pp. 709
A factorization based algorithm for multi-image projective structure and motion
pp. 710
To Distribute or Not to Distribute: The Question of Load Balancing for Performance or Energy
pp. 717
Two-Stage Convolutional Neural Network for Breast Cancer Histology Image Classification
pp. 717
Novel Algorithms for Robust Registration of Fiducials in CT and MRI
pp. 718
Biomechanically Based Elastic Breast Registration Using Mass Tensor Simulation
pp. 719
Brain-Computer Interaction
pp. 722
Approximating the Generalized Minimum Manhattan Network Problem
pp. 723
Multi-label, Multi-class Classification Using Polylingual Embeddings
pp. 724
Complementation, Disambiguation, and Determinization of Büchi Automata Unified
pp. 726
Studying the Influence of Network-Aware Grid Scheduling on the Performance Received by Users
pp. 726
Who Would Pay for Facebook? Self Esteem as a Predictor of User Behavior, Identity Construction and Valuation of Virtual Possessions
pp. 728
A Machine Learning Methodology for Enzyme Functional Classification Combining Structural and Protein Sequence Descriptors
pp. 729
An Iterative Calculation Method for Solve the Inverse Kinematics of a 7-DOF Robot with Link Offset
pp. 736
Tree Projections: Hypergraph Games and Minimality
pp. 736
Fancy a Drink in Canary Wharf?: A User Study on Location-Based Mobile Search
pp. 737
Holistic Segmentation of Intermuscular Adipose Tissues on Thigh MRI
pp. 741
Effective Emission Tomography Image Reconstruction Algorithms for SPECT Data
pp. 747
Bi-Real Net: Enhancing the Performance of 1-Bit CNNs with Improved Representational Capability and Advanced Training Algorithm
pp. 752
EMORBFN: An Evolutionary Multiobjetive Optimization Algorithm for RBFN Design
pp. 754
A Novel Approach for Simplifying Neural Networks by Identifying Decoupling Inputs
pp. 765
Spatiotemporal Compression Techniques for Moving Point Objects
pp. 765
Memetic algorithms and the fitness landscape of the graph bi-partitioning problem
pp. 774
Fast and Robust Semi-automatic Liver Segmentation with Haptic Interaction
pp. 778
An ACO Algorithm for the Most Probable Explanation Problem
pp. 779
UUV-Six Degrees of Freedom Positioning Method Based on Optical Vision
pp. 784
Improved Approximations for k-Exchange Systems
pp. 791
Designing a Morphogenetic System for Evolvable Hardware
pp. 796
Grid Refinement in Adaptive Non-rigid Registration
pp. 796
The Speed of Convergence in Congestion Games under Best-Response Dynamics
pp. 801
Tools for Procedural Generation of Plants in Virtual Scenes
pp. 803
Inver-over operator for the TSP
pp. 803
Limits to the Accuracy of 3D Thickness Measurement in Magnetic Resonance Images
pp. 806
A Logic for the Statistical Model Checking of Dynamic Software Architectures
pp. 807
Bioinformatics’ Challenges to Computer Science: Bioinformatics Tools and Biomedical Modeling
pp. 815
Multiclassifier Fusion in Human Brain MR Segmentation: Modelling Convergence
pp. 820
Bayesian Combinatorial Auctions
pp. 824
DOA Detection from HOS by FOD Beamforming and Joint-Process Estimation
pp. 831
Integrated Graph Cuts for Brain MRI Segmentation
pp. 837
Q-MAF Shape Decomposition
pp. 845
Vessel Axis Determination Using Wave Front Propagation Analysis
pp. 862
Segmentation of Single-Figure Objects by Deformable M-reps
pp. 872
Robust 3D Action Recognition with Random Occupancy Patterns
pp. 883
The Semigroups of Order 10
pp. 889
Cardiac Motion Analysis from Ultrasound Sequences Using Non-rigid Registration
pp. 912
Supervised Probabilistic Segmentation of Pulmonary Nodules in CT Scans
pp. 917
Agent Services-Driven Plug-and-Play in F-TRADE
pp. 920
MR Image Segmentation Using Phase Information and a Novel Multiscale Scheme
pp. 923
Applying Multi-medians Location and Steiner Tree Methods into Agents Distributed Blackboard Architecture Construction
pp. 924
Integrity Dangers in Certification-Based Replication Protocols
pp. 928
Multi-resolution Vessel Segmentation Using Normalized Cuts in Retinal Images
pp. 930
Meta-game Equilibrium for Multi-agent Reinforcement Learning
pp. 933
Informing the Detection of the Students’ Motivational State: An Empirical Study
pp. 934
Augmented reality visualization for laparoscopic surgery
pp. 934
Recursive Program Synthesis
pp. 937
Simulation of Local and Global Atrophy in Alzheimer’s Disease Studies
pp. 949
Effective Approach for Detecting Digital Image Watermarking via Independent Component Analysis
pp. 966
A Model for Relations Between Needle Deflection, Force, and Thickness on Needle Penetration
pp. 982
Investigating a Parallel Breeder Genetic Algorithm on the inverse Aerodynamic design
pp. 983
Patient-Specific Simulation of Internal Defibrillation
pp. 984
A First Approach to a Data Quality Model for Web Portals
pp. 991
Registration of 3D Photographs with Spiral CT Images for Soft Tissue Simulation in Maxillofacial Surgery
pp. 1015
Real-Time Surgical Simulation with Haptic Sensation as Collaborated Works between Japan and Germany
pp. 1024
An Improvement to Unscented Transformation
pp. 1062
Exploiting Maximal Emerging Patterns for Classification
pp. 1067
Unsupervised and Adaptive Segmentation of Multispectral 3D Magnetic Resonance Images of Human Brain: A Generic Approach
pp. 1069
Feature Extraction for Learning to Classify Questions
pp. 1089
Hardware Implementation Study of the SCFQ-CA and DRR-CA Scheduling Algorithms
pp. 1099
Interface Design and Evaluation for CAS Systems
pp. 1107
Independent Registration and Virtual Controlled Reduction of Pelvic Ring Fractures
pp. 1108
Radar Emitter Signal Recognition Based on Feature Selection Algorithm
pp. 1122
Automated Identification and B-spline Approximation of a Profiling Coil Centerline from Magnetic Resonance Images
pp. 1127
Influential Nodes in a Diffusion Model for Social Networks
pp. 1149
A PVA-C Brain Phantom Derived from a High Quality 3D MR Data Set
pp. 1159
A Biomechanical Model of Muscle Contraction
pp. 1162
A Framework for Patient-Specific Physics-Based Simulation and Interactive Visualization of Cardiac Dynamics
pp. 1168
A Whole Body Atlas Based Segmentation for Delineation of Organs in Radiation Therapy Planning
pp. 1174
A Formal Method Toward Reasoning About Continuous Change
pp. 1181
Solving the Robots Gathering Problem
pp. 1189
Analysis of 3D Deformation Fields for Appearance-Based Segmentation
pp. 1197
Volume Visualization Using Gradient-Based Distance among Voxels
pp. 1204
MRI Inter-slice Reconstruction Using Super-Resolution
pp. 1207
Assessment of Center of Rotation of the Glenohumeral Joint
pp. 1213
Ant Colonies Discover Knight’s Tours
pp. 1224
Automatic Analysis of the Left Ventricle in the Time Sequences of 3D Echo-Cardiographic Images
pp. 1226
Intrusion Detection Based on Immune Clonal Selection Algorithms
pp. 1226
Displacement Field Estimation from CSPAMM Images without Segmentation of the Myocardium
pp. 1261
Dental Implant Planning in Easy Vision
pp. 1275
Modally Controlled Free Form Deformation for Non-rigid Registration in Image-Guided Liver Surgery
pp. 1295
Volume Definition Tools for Medical Imaging Applications
pp. 1304
Feasibility of Laparoscopic Surgery Assisted by a Robotic Telemanipulation System
pp. 1308
A Supervising System for Robot Application in Surgery
pp. 1312
Reduction of Insertion Resistance by Means of Vibration for Catheters and Endoscopes
pp. 1314
Collecting, Analyzing and Interpreting Data for User Model Acquisition in Open Web-Based Adaptive Collaborative Environment
pp. 1352
Surface Based Atlas Matching of the Brain Using Deformable Surfaces and Volumetric Finite Elements
pp. 1366
Accuracy Validation of Cone-Beam CT Based Registration
pp. 1382
Towards a Robust Path Growing Algorithm for Semi-automatic MRI Segmentation
pp. 1409
Registration and Visualization of Transcranial Magnetic Stimulation on MR Images
pp. 1412
Automated Image Rectification in Video-Endoscopy
pp. 1419
Virtual Fixtures for Robotic Cardiac Surgery
pp. 1421
The Clinical Use of Multi-modal Resources (2D/3D/Statistics) for Robot Assisted Functional Neurosurgery
pp. 1426
Performance Evaluation of a Cooperative Manipulation Microsurgical Assistant Robot Applied to Stapedotomy
Similar content
2,868
Penetrance of Hemochromatosis in HFE Genotypes Resulting in p.Cys282Tyr and p.[Cys282Tyr];[His63Asp] in the eMERGE Network
Authors:
Carlos J. Gallego
,
Amber Burt
,
Agnes S. Sundaresan
…
Oxidation of isomorphic U alloys: UNi5, UCu5 and UPt5
Authors:
D.D. Sarma
,
F.U. Hillebrecht
,
M Campagna
Constructing Number Field Isomorphisms from *-Isomorphisms of Certain Crossed Product C*-Algebras
Authors:
Chris Bruce
,
Takuya Takeishi
See all similar
Cited by
50
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization
Authors:
Aviad Kipnis
,
Adi Shamir
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases
Authors:
Jean-Charles Faugère
,
Antoine Joux
Essential Algebraic Structure within the AES
Authors:
Sean Murphy
,
Matthew Robshaw
See all cited by