Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
25
views
17
references
Top references
cited by
5
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
5,170
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology — CRYPTO’ 88 : Proceedings
A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box
other
Author(s):
Nele Mentens
,
Lejla Batina
,
Bart Preneel
,
Ingrid Verbauwhede
Publication date
(Print):
2005
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
REPO4EU WP2 Systematic Reviews
Most cited references
17
Record
: found
Abstract
: not found
Book
: not found
The Design of Rijndael
Joan Daemen
,
Vincent Rijmen
(2002)
0
comments
Cited
195
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A Compact Rijndael Hardware Architecture with S-Box Optimization
Akashi Satoh
,
Sumio Morioka
,
Kohji Takano
…
(2001)
0
comments
Cited
51
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Efficient Rijndael Encryption Implementation with Composite Field Arithmetic
Atri Rudra
,
Pradeep K. Dubey
,
Charanjit Jutla
…
(2001)
0
comments
Cited
20
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2005
Pages
: 323-333
DOI:
10.1007/978-3-540-30574-3_22
SO-VID:
25dc4eaa-1a92-4557-ba1d-f1fb9a66e79a
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Building Companionship through Human-Robot Collaboration
pp. 1
Specification and Verification of a Formal System for Structurally Recursive Functions
pp. 1
MicroRNA or Not MicroRNA?
pp. 1
Petri Nets as Token Objects
pp. 1
Rule Systems for Runtime Verification: A Short Tutorial
pp. 1
Adding Nesting Structure to Words
pp. 1
Tableau Algorithms for Description Logics
pp. 1
A Faster Scaling Algorithm for Minimizing Submodular Functions
pp. 1
ForNet: A Distributed Forensics Network
pp. 1
Fraenkel-Mostowski Sets with Non-homogeneous Atoms
pp. 1
From Z to B and then Event-B: Assigning Proofs to Meaningful Programs
pp. 1
The Well-Founded Semantics Is the Principle of Inductive Definition
pp. 1
Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256
pp. 1
Verifying MARTE/CCSL Mode Behaviors Using UPPAAL
pp. 3
Faster Algorithms for Feedback Arc Set Tournament, Kemeny Rank Aggregation and Betweenness Tournament
pp. 3
Exploring Control in Early Computing Education
pp. 3
Duality and Recognition
pp. 3
A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense
pp. 3
XML: Current Developments and Future Challenges for the Database Community
pp. 3
A Morphosyntactic Brill Tagger for Inflectional Languages
pp. 4
Extending Agile Methods: Postmortem Reviews as Extended Feedback
pp. 8
Limits on the Provable Consequences of One-way Permutations
pp. 10
Face Recognition Based on ICA Combined with FLD
pp. 12
Drawing with colors
pp. 13
HELIOS2012: RoboCup 2012 Soccer Simulation 2D League Champion
pp. 13
Variability Issues in Software Product Lines
pp. 14
Open Design Challenges for Interactive Emergent Narrative
pp. 14
MINERVA: A Tour-Guide Robot that Learns
pp. 15
Optimisation of Product’s Hand-Handle Interface Material Parameters for Improved Ergonomics
pp. 15
Optimal Control in Large Stochastic Multi-agent Systems
pp. 15
How to Become a Group Leader? or Modeling Author Types Based on Graph Mining
pp. 200
How To Sign Given Any Trapdoor Function
pp. 16
Monitoring Change: Characteristics of Dynamic Geo-spatial Phenomena for Visual Exploration
pp. 17
Termination Graphs for Java Bytecode
pp. 17
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages
pp. 18
Identifying Critical Attack Assets in Dependency Attack Graphs
pp. 18
Compiling Haskell by program transformation: A report from the trenches
pp. 19
Investigating the Use and Adoption of Self-service Technology in China
pp. 19
Guardian: Hypervisor as Security Foothold for Personal Computers
pp. 19
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
pp. 19
A Graph Transformation-Based Semantics for Deep Metamodelling
pp. 20
Normalizable Horn Clauses, Strongly Recognizable Relations, and Spi
pp. 21
TR Discover: A Natural Language Interface for Querying and Analyzing Interlinked Datasets
pp. 22
On the Accuracy and Usefulness of Analytic Energy Models for Contemporary Multicore Processors
pp. 22
A Case Study in Formal Verification of Register-Transfer Logic with ACL2: The Floating Point Adder of the AMD Athlon TM Processor
pp. 23
Narrative Serious Game Mechanics (NSGM) – Insights into the Narrative-Pedagogical Mechanism
pp. 24
A Deductive Proof System for CTL*
pp. 27
Generalized Secret Sharing and Monotone Functions
pp. 27
Model-Based Software Engineering and Process-Aware Information Systems
pp. 31
Generation of 3D Digital Phantoms of Colon Tissue
pp. 31
On the Use of Machine Learning and Search-Based Software Engineering for Ill-Defined Fitness Function: A Case Study on Software Refactoring
pp. 450
The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition
pp. 33
Towards computing distances between programs via Scott domains
pp. 33
Web Rules Need Two Kinds of Negation
pp. 35
An Empirical Comparison of Three Boosting Algorithms on Real Data Sets with Artificial Class Noise
pp. 36
UT Austin Villa 2012: Standard Platform League World Champions
pp. 36
Effective Neighborhood Structures for the Generalized Traveling Salesman Problem
pp. 37
Everything Provable is Provable in Zero-Knowledge
pp. 39
Characterising Petri Net Solvable Binary Words
pp. 41
Intensity Compensation within Series of Images
pp. 42
Spatial-Temporal Constraint for Segmentation of Serial Infant Brain MR Images
pp. 43
Knowledge-Based Query Expansion in Real-Time Microblog Search
pp. 47
Formal Analysis and Testing of Real-Time Automotive Systems Using UPPAAL Tools
pp. 47
Information-Theoretic Cryptography
pp. 49
Enhancing UDDI for Grid Service Discovery by Using Dynamic Parameters
pp. 50
A Unifying Approach to HTML Wrapper Representation and Learning
pp. 50
On Reachability-Related Games on Vector Addition Systems with States
pp. 50
Constraint-Based Analysis of Broadcast Protocols
pp. 52
Monocular Template-Based Reconstruction of Smooth and Inextensible Surfaces
pp. 52
A Comparison of Action Transitions in Individual and Collaborative Exploratory Web Search
pp. 53
When Shift Registers Clock Themselves
pp. 54
Call Center Customer Verification by Query-Directed Passwords
pp. 55
Relational Agents Improve Engagement and Learning in Science Museum Visitors
pp. 57
Automatic Identification and Classification of Misogynistic Language on Twitter
pp. 59
Usability Heuristics: Reinventing the Wheel?
pp. 61
Is It Worth the Hassle? Exploring the Added Value of Evaluating the Usability of Context-Aware Mobile Systems in the Field
pp. 63
Shape-Based Similarity Query for Trajectory of Mobile Objects
pp. 63
New Physics and Hypercomputation
pp. 64
Symbolic Counter Abstraction for Concurrent Software
pp. 64
Multidomain Voice Activity Detection during Human-Robot Interaction
pp. 65
From Usability to Playability: Introduction to Player-Centred Video Game Development Process
pp. 65
CkNN Query Processing over Moving Objects with Uncertain Speeds in Road Networks
pp. 66
DataScript- A Specification and Scripting Language for Binary Data
pp. 67
On Propositional QBF Expansions and Q-Resolution
pp. 71
A First Class Boolean Sort in First-Order Theorem Proving and TPTP
pp. 71
On the Security of the Schnorr Scheme using Preprocessing
pp. 71
Contraction of Timetable Networks with Realistic Transfers
pp. 71
Enhancing Declarative Debugging with Loop Expansion and Tree Compression
pp. 72
Stable models of typed λ-calculi
pp. 74
Human-Computer Confluence for Rehabilitation Purposes after Stroke
pp. 75
On the relation of programs and computations to models of temporal logic
pp. 76
Efficient Cryptosystems from 2 k -th Power Residue Symbols
pp. 77
Security of OS-Level Virtualization Technologies
pp. 78
Semantically Enriching VGI in Support of Implicit Feedback Analysis
pp. 78
From action calculi to linear logic
pp. 80
A Verified Compiler for Probability Density Functions
pp. 81
Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures
pp. 82
Automating Modular Verification
pp. 83
Sassy: A Language and Optimizing Compiler for Image Processing on Reconfigurable Computing Systems
pp. 83
Deconstructing Pokémon Go – An Empirical Study on Player Personality Characteristics
pp. 83
Detecting Adolescent Psychological Pressures from Micro-Blog
pp. 83
SentiCircles for Contextual and Conceptual Semantic Sentiment Analysis of Twitter
pp. 85
Using Hybrid Concurrent Constraint Programming to Model Dynamic Biological Systems
pp. 87
Genetically Improved CUDA C++ Software
pp. 88
Annotations: Enriching a Digital Library
pp. 89
An epistemic foundation for logic programming with uncertainty
pp. 89
Polynomial Analysis Algorithms for Free Choice Probabilistic Workflow Nets
pp. 92
Experimental Analysis of Pheromone-Based Heuristic Column Generation Using irace
pp. 92
Representing Transition Systems by Logic Programs
pp. 93
A Hierarchical Coarse-to-Fine Approach for Fundus Image Registration
pp. 94
A Family of Jacobians Suitable for Discrete Log Cryptosystems
pp. 94
Correlation of Intrusion Symptoms: An Application of Chronicles
pp. 94
Involution and Difference Schemes for the Navier–Stokes Equations
pp. 96
Symbolic bisimulation minimisation
pp. 96
Detection of 3D Spinal Geometry Using Iterated Marginal Space Learning
pp. 97
A decision algorithm for full propositional temporal logic
pp. 100
Efficient Real-Time Model Checking Using Tabled Logic Programming and Constraints
pp. 100
What are the gains of the theory of algorithms
pp. 102
Agent Based Approach in Disaster Rescue Simulation - From Test-Bed of Multiagent System to Practical Application
pp. 103
Reducing Ambiguities in Requirements Specifications Via Automatically Created Object-Oriented Models
pp. 103
Point-Free, Set-Free Concrete Linear Algebra
pp. 108
Peer Selection in Peer-to-Peer Networks with Semantic Topologies
pp. 110
Dijkstra’s Algorithm On-Line: An Empirical Case Study from Public Railroad Transport
pp. 111
Understanding the Bacterial Stringent Response Using Reachability Analysis of Hybrid Systems
pp. 111
Assessment of Myofiber Orientation in High Resolution Phase-Contrast CT Images
pp. 112
Improving the Upper Bound on the Maximum Average Linear Hull Probability for Rijndael
pp. 112
Rigorous Runtime Analysis of Inversely Fitness Proportional Mutation Rates
pp. 116
Genetic Algorithm for Materialized View Selection in Data Warehouse Environments
pp. 116
Privacy-Sensitive Information Flow with JML
pp. 116
Searching the World’s Herbaria: A System for Visual Identification of Plant Species
pp. 116
Metadata Analysis of Scholarly Events of Computer Science, Physics, Engineering, and Mathematics
pp. 117
Improving WPM2 for (Weighted) Partial MaxSAT
pp. 118
mjCoAP: An Open-Source Lightweight Java CoAP Library for Internet of Things Applications
pp. 118
Sequential Pattern Mining for Situation and Behavior Prediction in Simulated Robotic Soccer
pp. 119
Experiments with implementations of two theoretical constructions
pp. 120
Adaptive Particle Swarm Optimization Algorithm for Dynamic Environments
pp. 120
Lifelike Gesture Synthesis and Timing for Conversational Agents
pp. 122
Narrative Threads: A Tool to Support Young People in Creating Their Own Narrative-Based Computer Games
pp. 126
The Essence of JavaScript
pp. 126
Difficulties in Modeling SCADA Traffic: A Comparative Analysis
pp. 126
Verifying a protocol using relativized bisimulation
pp. 126
Quantum Search on Structured Problems
pp. 128
Extended Dynamic Subgraph Statistics Using h-Index Parameterized Data Structures
pp. 129
Why Do People Share News in Social Media?
pp. 129
An XML Log Standard and Tool for Digital Library Logging Analysis
pp. 129
On the Virtue of Patience: Minimizing Büchi Automata
pp. 130
Sanitizable and Deletable Signature
pp. 131
An Interactive Tool for Analyzing Embedded SQL Queries
pp. 131
Ranking Web News Via Homepage Visual Layout and Cross-Site Voting
pp. 132
Ambient Persuasive Technology Needs Little Cognitive Effort: The Differential Effects of Cognitive Load on Lighting Feedback versus Factual Feedback
pp. 132
MIKI: A Speech Enabled Intelligent Kiosk
pp. 136
Rewriting Models of Boolean Programs
pp. 138
Deriving Labels and Bisimilarity for Concurrent Constraint Programming
pp. 139
A family of trapdoor ciphers
pp. 140
Implementing in Prolog an Effective Cellular Solution to the Knapsack Problem
pp. 140
Selecting Near-Optimal Approximate State Representations in Reinforcement Learning
pp. 142
The Big Brother Database: Evaluating Face Recognition in Smart Home Environments
pp. 143
Preference-Based Inconsistency Assessment in Multi-Context Systems
pp. 143
BDI Agent Programming in AgentSpeak Using Jason
pp. 144
Rapid Parameterized Model Checking of Snoopy Cache Coherence Protocols
pp. 144
Variability in Wrist-Tilt Accelerometer Based Gesture Interfaces
pp. 145
System Description: GCLCprover + GeoThms
pp. 145
Bee Behaviour in Multi-agent Systems
pp. 146
Saturation-Based Symbolic Reachability Analysis Using Conjunctive and Disjunctive Partitioning
pp. 146
Automatic Veri.cation of Concurrent Ada Programs
pp. 147
Provably Weak Instances of Ring-LWE Revisited
pp. 147
Supervised Classification Using Balanced Training
pp. 147
Remarks on Separating Words
pp. 148
An ADL Recognition System on Smart Phone
pp. 149
Micropayments Revisited
pp. 150
A Modular Approach to MaxSAT Modulo Theories
pp. 150
Precondition Inference from Intermittent Assertions and Application to Contracts on Collections
pp. 150
Improving a Probabilistic 3-SAT Algorithm by Dynamic Search and Independent Clause Pairs
pp. 152
The Church-Turing Thesis: Breaking the Myth
pp. 154
Constraint Based Mining of First Order Sequences in SeqLog
pp. 155
Location-Aware Shopping Assistance: Evaluation of a Decision-Theoretic Approach
pp. 155
Using runtime measured workload characteristics in parallel processor scheduling
pp. 156
On the design of hybrid control systems using automata models
pp. 156
Obsidian: A Domain Specific Embedded Language for Parallel Programming of Graphics Processors
pp. 156
Uniform Constraint Satisfaction Problems and Database Theory
pp. 158
Motif Definition and Classification to Structure Non-linear Plots and to Control the Narrative Flow in Interactive Dramas
pp. 158
The Essence of Multitasking
pp. 159
Coloured Petri Nets extended with channels for synchronous communication
pp. 160
Semi-supervised Learning for Cyberbullying Detection in Social Networks
pp. 161
Knowledge-Based Information Extraction: A Case Study of Recognizing Emails of Nigerian Frauds
pp. 163
Post-Masking Optimization of the Tradeoff between Information Loss and Disclosure Risk in Masked Microdata Sets
pp. 163
Geometric Searching in Walkthrough Animations with Weak Spanners in Real Time
pp. 163
On The Randomness of Legendre and Jacobi Sequences
pp. 170
Early Fault Detection Using Design Models for Collision Prevention in Medical Equipment
pp. 171
Combining Datatypes and Effects
pp. 172
Amortized Resource Analysis with Polymorphic Recursion and Partial Big-Step Operational Semantics
pp. 172
Private Proximity Testing on Steroids: An NTRU-based Protocol
pp. 173
Goal-Directed Invariant Synthesis for Model Checking Modulo Theories
pp. 173
Conceptual Modeling for Data Integration
pp. 173
A User Experience Study of Airline Websites
pp. 173
A Comparison of Sampling Strategies for Parameter Estimation of a Robot Simulator
pp. 174
Fast Image Segmentation, Object Recognition and Localization in a RoboCup Scenario
pp. 174
Social Stairs: Taking the Piano Staircase towards Long-Term Behavioral Change
pp. 175
Adaptive Middleware for Data Replication
pp. 176
Safety Patterns — The Key to Formal Specification of Safety Requirements
pp. 177
Automated Termination Analysis for Logic Programs by Term Rewriting
pp. 178
Personalizing Delivered Information in a Software Reuse Environment
pp. 178
Maintaining Global Hull Consistency with Local Search for Continuous CSPs
pp. 178
Computation in Real Closed Infinitesimal and Transcendental Extensions of the Rationals
pp. 181
Simpler Linear-Time Kernelization for Planar Dominating Set
pp. 181
Word Sense Disambiguation for Exploiting Hierarchical Thesauri in Text Classification
pp. 182
When Clocks Fail: On Critical Paths and Clock Faults
pp. 184
DNA-Droid: A Real-Time Android Ransomware Detection Framework
pp. 185
Computing the Semantic Similarity of Resources in DBpedia for Recommendation Purposes
pp. 186
MD-jeep: An Implementation of a Branch and Prune Algorithm for Distance Geometry Problems
pp. 186
TY*SecureWS: An Integrated Web Service Security Solution Based on Java
pp. 186
On the Moments of Firing Numbers in Diffusion Neuronal Models with Refractoriness
pp. 187
An Ontology Design Pattern for Surface Water Features
pp. 187
Tally languages accepted by Monte Carlo pushdown automata
pp. 189
Group Analysis of Resting-State fMRI by Hierarchical Markov Random Fields
pp. 190
Diameter and Broadcast Time of Random Geometric Graphs in Arbitrary Dimensions
pp. 190
Abstract Specification of the UBIFS File System for Flash Memory
pp. 190
Certification of Distributed Algorithms Solving Problems with Optimal Substructure
pp. 191
On the approximation of shortest common supersequences and longest common subsequences
pp. 192
Encountered-Type Haptic Interface for Grasping Interaction with Round Variable Size Objects via Pneumatic Balloon
pp. 192
Timed Control with Observation Based and Stuttering Invariant Strategies
pp. 194
Multimodal Backchannels for Embodied Conversational Agents
pp. 195
INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery
pp. 195
Structured Errors in Optical Gigabit Ethernet Packets
pp. 196
Exploring Pervasive Entertainment Games to Construct Learning Paths
pp. 197
Visual cryptography II: Improving the contrast via the cover base
pp. 197
Undecidability of Weak Bisimilarity for PA-Processes
pp. 198
Gentzen-type systems and resolution rules part I propositional logic
pp. 198
Automatic Restoration of Diacritics for Igbo Language
pp. 199
Precise and Complete Propagation Based Local Search for Satisfiability Modulo Theories
pp. 199
Fine-Grained Provenance Collection over Scripts Through Program Slicing
pp. 200
ReFormat: Automatic Reverse Engineering of Encrypted Messages
pp. 201
Game Theoretic Model of Strategic Honeypot Selection in Computer Networks
pp. 206
A Skiplist-Based Concurrent Priority Queue with Minimal Memory Contention
pp. 207
Checking Properties Described by State Machines: On Synergy of Instrumentation, Slicing, and Symbolic Execution
pp. 207
Embedded SFE: Offloading Server and Network Using Hardware Tokens
pp. 207
Formal Verification of AADL Specifications in the Topcased Environment
pp. 208
Quantum Computing for Pattern Classification
pp. 208
Competition-Induced Preferential Attachment
pp. 209
Inductively defined types in the Calculus of Constructions
pp. 210
MalCrawler: A Crawler for Seeking and Crawling Malicious Websites
pp. 213
Large Scale Indexing and Searching Deep Convolutional Neural Network Features
pp. 216
A “Paradoxical” Indentity-Based Signature Scheme Resulting from Zero-Knowledge
pp. 217
Interpolation and Extrapolation in Conceptual Spaces: A Case Study in the Music Domain
pp. 218
Formal Verification of UML Statecharts with Real-Time Extensions
pp. 219
HTNSystem: Hypertension Information Extraction System for Unstructured Clinical Notes
pp. 219
Modular denotational semantics for compiler construction
pp. 219
On O-Minimal Hybrid Systems
pp. 219
Model Checking Agent Programs by Using the Program Interpreter
pp. 221
Petri nets, commutative context-free grammars, and basic parallel processes
pp. 223
A Proof Assistant Based Formalization of MDE Components
pp. 224
Provably Optimal and Human-Competitive Results in SBSE for Spectrum Based Fault Localisation
pp. 224
Coupled Geodesic Active Regions for Image Segmentation: A Level Set Approach
pp. 225
How Much Is Too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness
pp. 226
Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures
pp. 229
The Compass Filter: Search Engine Result Personalization Using Web Communities
pp. 230
Towards a UML Profile for Domain-Driven Design of Microservice Architectures
pp. 231
Translation Validation: From SIGNAL to C
pp. 232
A Modification of the Fiat-Shamir Scheme
pp. 233
An Authoring Tool for Informal and Formal Requirements Specifications
pp. 234
Algorithmic techniques for geometric optimization
pp. 234
A Memory-Efficient KinectFusion Using Octree
pp. 235
Nettle: Taking the Sting Out of Programming Network Routers
pp. 235
Completely Independent Spanning Trees in Maximal Planar Graphs
pp. 235
A Framework for Text Processing and Supporting Access to Collections of Digitized Historical Newspapers
pp. 236
Regular grammatical inference from positive and negative samples by genetic search: the GIG method
pp. 236
Understanding Multi-touch Manipulation for Surface Computing
pp. 239
Framester: A Wide Coverage Linguistic Linked Data Hub
pp. 240
A Lua-based Behavior Engine for Controlling the Humanoid Robot Nao
pp. 242
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs
pp. 242
Searching for Differential Paths in MD4
pp. 242
iData for the World Wide Web – Programming Interconnected Web Forms
pp. 242
An Introduction to Algebraic Semiotics, with Application to User Interface Design
pp. 243
Spark – A Generic Simulator for Physical Multi-agent Simulations
pp. 245
Mechanizing the Metatheory of Sledgehammer
pp. 246
Reversing Algebraic Process Calculi
pp. 246
Multiple Distribution Data Description Learning Algorithm for Novelty Detection
pp. 246
XML Schema, Tree Logic and Sheaves Automata
pp. 247
Incremental Hyperproperty Model Checking via Games
pp. 248
Modeling subobject-based inheritance
pp. 249
An Interactive Evolutionary Multiobjective Optimization Method: Interactive WASF-GA
pp. 252
MC-Tree: Improving Bayesian Anytime Classification
pp. 253
Verifying B Proof Rules Using Deep Embedding and Automated Theorem Proving
pp. 253
The Effect of Age and Font Size on Reading Text on Handheld Computers
pp. 254
Representation Learning: A Unified Deep Learning Framework for Automatic Prostate MR Segmentation
pp. 254
Cost of Virtual Machine Live Migration in Clouds: A Performance Evaluation
pp. 255
Predicting Numbers: An AI Approach to Solving Number Series
pp. 257
Mobile Cultural Heritage Guide: Location-Aware Semantic Search
pp. 257
Towards a Unifying Theory for Web Services Composition
pp. 257
Gestural Attributions as Semantics in User Interface Sound Design
pp. 258
On the complexity of verifying concurrent transition systems
pp. 259
Tracking line segments
pp. 261
Team-Partitioned, Opaque-Transition Reinforcement Learning
pp. 261
Automatically proving termination where simplification orderings fail
pp. 263
Observational Logic
pp. 264
Taint Analysis of Security Code in the KLEE Symbolic Execution Engine
pp. 264
GeO2: Why objects in a geographical DBMS?
pp. 265
Nondeterminism Analysis of Functional Logic Programs
pp. 267
Software Development by Refinement
pp. 267
Feedback Vertex Sets in Tournaments
pp. 270
Deriving Pretty-Big-Step Semantics from Small-Step Semantics
pp. 271
Resolving Conflicts in Authorization Delegations
pp. 272
Reactive Systems, Barbed Semantics, and the Mobile Ambients
pp. 272
ExpLOD: Summary-Based Exploration of Interlinking and RDF Usage in the Linked Open Data Cloud
pp. 273
Automatic Language-Specific Stemming in Information Retrieval
pp. 274
Quantization Mimic: Towards Very Tiny CNN for Object Detection
pp. 276
Barriers in Concurrent Separation Logic
pp. 276
Exception Handling in the BPEL4WS Language
pp. 278
Priority rewriting: Semantics, confluence, and conditionals
pp. 278
Interference Games in Wireless Networks
pp. 279
Integrating Web Services into Active Mathematical Documents
pp. 280
A Curry-Howard Isomorphism for Compilation and Program Execution
pp. 282
Towards an Infrastructure Model for Composing and Reconfiguring Cyber-Physical Systems
pp. 282
An overview of cooperative answering in databases
pp. 284
Intensional Sets in CLP
pp. 285
An Effective Branch-and-Bound Algorithm for Convex Quadratic Integer Programming
pp. 287
Efficient Conflict Analysis for Finding All Satisfying Assignments of a Boolean Circuit
pp. 289
Implementing Blocked Sparse Matrix-Vector Multiplication on NVIDIA GPUs
pp. 289
Pal k is Linear Recognizable Online
pp. 289
Comparing Probabilistic Models for Melodic Sequences
pp. 291
TVOC: A Translation Validator for Optimizing Compilers
pp. 291
Tracing lazy functional computations using redex trails
pp. 297
Wendy: A Tool to Synthesize Partners for Services
pp. 297
On Generating Solved Instances of Computational Problems
pp. 300
Measuring the Impact of Knowledge Gained from Playing FPS and RPG Games on Gameplay Performance
pp. 300
The Logical Abstract Machine: A Curry-Howard Isomorphism for Machine Code
pp. 301
Text Retrieval Methods for Item Ranking in Collaborative Filtering
pp. 305
Polynomiography via Ishikawa and Mann Iterations
pp. 305
Transparent support for wait-free transactions
pp. 309
High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive
pp. 309
Fine-Grained Access Control for HTML5-Based Mobile Applications in Android
pp. 309
The phase-transition niche for evolutionary algorithms in timetabling
pp. 309
A Comparison of the BTT and TTF Test-Generation Methods
pp. 312
Algorithmic Games for Full Ground References
pp. 314
Random Descent
pp. 314
Improved Greedy Algorithms for Constructing Sparse Geometric Spanners
pp. 317
Counting-Based Look-Ahead Schemes for Constraint Satisfaction
pp. 318
Robust Ellipse-Specific Fitting for Real-Time Machine Vision
pp. 319
Analysing Web Search Logs to Determine Session Boundaries for User-Oriented Learning
pp. 319
Untraceable Electronic Cash
pp. 323
A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box
pp. 324
An Integrated Specification and Verification Technique for Highly Concurrent Data Structures
pp. 325
On the Use of Domain and System Knowledge Modeling in Goal-Based Event-B Specifications
pp. 325
Approximating the number of error locations within a constant ratio is NP-complete
pp. 328
Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals
pp. 328
Relying Party Credentials Framework
pp. 329
The HOL/NuPRL Proof Translator
pp. 329
YaPPL - A Lightweight Privacy Preference Language for Legally Sufficient and Automated Consent Provision in IoT Scenarios
pp. 333
Accelerating the Computation of Elementary Modes Using Pattern Trees
pp. 334
GoRelations: An Intuitive Query System for DBpedia
pp. 335
Efficient Satisfiability Modulo Theories via Delayed Theory Combination
pp. 337
Ranking the Linked Data: The Case of DBpedia
pp. 338
Distributed Games
pp. 340
Hybrid Geo-spatial Query Methods on the Semantic Web with a Spatially-Enhanced Index of DBpedia
pp. 341
Verifying Linearizability on TSO Architectures
pp. 342
grlc Makes GitHub Taste Like Linked Data APIs
pp. 343
Complexity results for POMSET languages
pp. 345
Projection Approach Versus Gradient Descent for Network’s Flows Assignment Problem
pp. 346
traIXroute: Detecting IXPs in traceroute paths
pp. 346
Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation
pp. 347
Quadratic Time Algorithms for Finding Common Intervals in Two and More Sequences
pp. 348
Orientability of Random Hypergraphs and the Power of Multiple Choices
pp. 350
Trade-offs in true concurrency: Pomsets and mazurkiewicz traces
pp. 354
Reconstructing Mutational History in Multiply Sampled Tumors Using Perfect Phylogeny Mixtures
pp. 354
“It’s Just Easier with the Phone” – A Diary Study of Internet Access from Cell Phones
pp. 354
An Abstract Theory of Computer Viruses
pp. 355
Supporting Collaborative Layouting in Word Processing
pp. 357
Event-Driven Programming with Logical Execution Times
pp. 357
Learning from Erroneous Examples: When and How Do Students Benefit from Them?
pp. 357
AT Humboldt — Development, practice and theory
pp. 360
Reflective Haptics: Enhancing Stylus-Based Interactions on Touch Screens
pp. 361
Improved Competitive Guarantees for QoS Buffering
pp. 363
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
pp. 363
Towards Behaviometric Security Systems: Learning to Identify a Typist
pp. 364
Delayed Nondeterminism in Continuous-Time Markov Decision Processes
pp. 364
Admit Your Weakness: Verifying Correctness on TSO Architectures
pp. 365
Supporting full-text information retrieval with a persistent object store
pp. 368
Omnidirectional Locomotion for Quadruped Robots
pp. 368
Statecharts in use: structured analysis and object-orientation
pp. 369
Combinatorial Problems on Strings with Applications to Protein Folding
pp. 369
Web Server Farm in the Cloud: Performance Evaluation and Dynamic Architecture
pp. 372
Nelson-Oppen, Shostak and the Extended Canonizer: A Family Picture with a Newborn
pp. 372
A Hierarchical Bayesian Model for Multi-Site Diffeomorphic Image Atlases
pp. 372
Partial Information Extraction Approach to Lightweight Integration on the Web
pp. 373
Refinement of soccer agents' positions using reinforcement learning
pp. 373
Status Report on Software Verification
pp. 374
An Adaptive Mediation Framework for Mobile P2P Social Content Sharing
pp. 376
The PROBADO Project - Approach and Lessons Learned in Building a Digital Library System for Heterogeneous Non-textual Documents
pp. 376
SIGUE: Making Web Courses Adaptive
pp. 378
More on the Complexity of Quantifier-Free Fixed-Size Bit-Vector Logics with Binary Encoding
pp. 381
Modeling Traffic Flow at an Urban Unsignalized Intersection
pp. 381
ABSTAT: Ontology-Driven Linked Data Summaries with Pattern Minimalization
pp. 381
Development of a Unified Production System for Various Types of Accessible Textbooks
pp. 384
Arabic Event Detection in Social Media
pp. 385
Verifying Brahms Human-Robot Teamwork Models
pp. 387
Emotional Aware Clustering on Micro-blogging Sources
pp. 390
How to (Really) Share a Secret
pp. 391
Environments, continuation semantics and indexed categories
pp. 392
Boneh et al.’s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption
pp. 392
Determining Objects within Isochrones in Spatial Network Databases
pp. 396
Unbounded Symbolic Execution for Program Verification
pp. 399
Fuzzy-Pareto-Dominance and its Application in Evolutionary Multi-objective Optimization
pp. 400
New Heuristics to Solve the “CSOP” Railway Timetabling Problem
pp. 404
Data-Driven Joint Debugging of the DBpedia Mappings and Ontology
pp. 404
Performance Evaluation of NWChem Ab-Initio Molecular Dynamics (AIMD) Simulations on the Intel® Xeon Phi™ Processor
pp. 405
Correction of Movement Artifacts from 4-D Cardiac Short- and Long-Axis MR Data
pp. 407
Maude Action Tool: Using Reflection to Map Action Semantics to Rewriting Logic
pp. 408
Formal Models of Heavy-Tailed Behavior in Combinatorial Search
pp. 415
Using ASM Specifications for Compiler Testing
pp. 418
Romeo: A Tool for Analyzing Time Petri Nets
pp. 418
Strategies as Profunctors
pp. 419
New potentially ‘weak’ keys for DES amd LOK
pp. 425
Smart Cities, Ambient Intelligence and Universal Access
pp. 429
DNA Self-Assembly For Constructing 3D Boxes
pp. 431
Swarm Intelligent Surfing in the Web
pp. 431
Learning to Rank for Expert Search in Digital Libraries of Academic Publications
pp. 432
An Improved Histogram of Edge Local Orientations for Sketch-Based Image Retrieval
pp. 433
Enhancing Regression Models with Spatio-temporal Indicator Additions
pp. 434
Learning Statistical Structure for Object Detection
pp. 434
Usability of Display-Equipped RFID Tags for Security Purposes
pp. 444
Unlinkability of Sanitizable Signatures
pp. 447
RV-Match: Practical Semantics-Based Program Analysis
pp. 448
Robust Image Descriptors for Real-Time Inter-Examination Retargeting in Gastrointestinal Endoscopy
pp. 449
Computing Fuzzy Answer Sets Using dlvhex
pp. 452
The Essentials of the SAT 2003 Competition
pp. 453
D-Finder 2: Towards Efficient Correctness of Incremental Design
pp. 459
Gradual Typestate
pp. 459
New Approaches to Estimation of White Matter Connectivity in Diffusion Tensor MRI: Elliptic PDEs and Geodesics in a Tensor-Warped Space
pp. 462
Accurate and Efficient Computation of High Order Zernike Moments
pp. 462
Teachers’ Impressions on Robots for Therapeutic Applications
pp. 463
Fast Verification of Any Remote Procedure Call: Short Witness-Indistinguishable One-Round Proofs for NP
pp. 464
Logic Programs under Three-Valued Łukasiewicz Semantics
pp. 472
Residual Images Remove Illumination Artifacts!
pp. 482
An Algorithmic Interpretation of a Deep Inference System
pp. 483
Coevolutionary Method for Gene Selection and Parameter Optimization in Microarray Data Analysis
pp. 485
Learning Regular Languages over Large Alphabets
pp. 487
First Demonstration of a Musical Emotion BCI
pp. 489
Case-Based Reasoning for Autonomous Service Failure Diagnosis and Remediation in Software Systems
pp. 490
Breaking All Value Symmetries in Surjection Problems
pp. 491
Patient MoCap: Human Pose Estimation Under Blanket Occlusion for Hospital Monitoring Applications
pp. 496
A Spatial Analysis of Multiplayer Online Battle Arena Mobility Traces
pp. 496
VisDrone-VDT2018: The Vision Meets Drone Video Detection and Tracking Challenge Results
pp. 497
Speeding Up Secret Computations with Insecure Auxiliary Devices
pp. 498
A Recursion Combinator for Nominal Datatypes Implemented in Isabelle/HOL
pp. 498
Developing Fitness Functions for Pleasant Music: Zipf’s Law and Interactive Evolution Systems
pp. 503
Implementation of standard genetic algorithm on MIMD machines
pp. 509
MRI Compatibility of Robot Actuation Techniques – A Comparative Study
pp. 513
The Game World Is Flat: The Complexity of Nash Equilibria in Succinct Games
pp. 513
Uniform Derivation of Decision Procedures by Superposition
pp. 520
Problems Parameterized by Treewidth Tractable in Single Exponential Time: A Logical Approach
pp. 522
Differentiating Code from Data in x86 Binaries
pp. 522
A New Hand Shape Recognition Algorithm Unrelated to the Finger Root Contour
pp. 522
Open Source Historical OCR: The OCRopodium Project
pp. 524
Named Entity Recognition Experiments on Turkish Texts
pp. 535
Statistical and Machine Learning Methods for Electricity Demand Prediction
pp. 540
Secret Error-Correcting Codes (SECC)
pp. 542
Improved Algorithms for the Global Cardinality Constraint
pp. 544
Does Adding More Agents Make a Difference? A Case Study of Cover Time for the Rotor-Router
pp. 547
PNE: Label Embedding Enhanced Network Embedding
pp. 550
Hello World! – Experiencing Usability Methods without Usability Expertise
pp. 551
Visual Servoing for Intraoperative Positioning and Repositioning of Mobile C-arms
pp. 554
Adaptive Focused Crawling of Linked Data
pp. 558
The I of BCIs: Next Generation Interfaces for Brain–Computer Interface Systems That Adapt to Individual Users
pp. 559
RNC-approximation algorithms for the steiner problem
pp. 560
PRISM-Games 2.0: A Tool for Multi-objective Strategy Synthesis for Stochastic Games
pp. 565
Towards a theory of actor computation
pp. 569
Joint Face Detection and Alignment with a Deformable Hough Transform Model
pp. 572
An Interactive Workspace for Helping the Visually Impaired Learn Linear Algebra
pp. 576
Secure and efficient metering
pp. 582
Symmetric Positive-Definite Cartesian Tensor Orientation Distribution Functions (CT-ODF)
pp. 584
A Frustum-Based Ocean Rendering Algorithm
pp. 584
Herbrand Theorems for Substructural Logics
pp. 584
Predicting Student Exam’s Scores by Analyzing Social Network Data
pp. 587
Action-Rules: How to Increase Profit of a Company
pp. 589
Automatic generation of invariants and intermediate assertions
pp. 597
Daffodil: An Integrated Desktop for Supporting High-Level Search Activities in Federated Digital Libraries
pp. 607
An \(O(m\log n)\) Algorithm for Stuttering Equivalence and Branching Bisimulation
pp. 607
Using Autonomous Search for Generating Good Enumeration Strategy Blends in Constraint Programming
pp. 610
Dynamic Data Driven Applications Systems: New Capabilities for Application Simulations and Measurements
pp. 614
Round-Efficient Conference Key Agreement Protocols with Provable Security
pp. 617
Real Time Optical Flow Processing System
pp. 618
Recognizability equals monadic second-order definability for sets of graphs of bounded tree-width
pp. 625
Fostering Innovation Through Coopetition: The E015 Digital Ecosystem
pp. 633
Detecting Fraud in Health Insurance Data: Learning to Model Incomplete Benford’s Law Distributions
pp. 645
Secure Equality and Greater-Than Tests with Sublinear Online Complexity
pp. 662
Characterization of Lung Nodule Malignancy Using Hybrid Shape and Appearance Features
pp. 664
Resource-Restricted Indifferentiability
pp. 668
Lo mejor de dos idiomas – Cross-Lingual Linkage of Geotagged Wikipedia Articles
pp. 676
Efficient Temporal Coalescing Query Support in Relational Database Systems
pp. 681
A Generalized Multi-granulation Rough Set Approach
pp. 683
Crowd Dynamics Modeling in the Light of Proxemic Theories
pp. 692
An island model based ant system with lookahead for the shortest supersequence problem
pp. 694
SPARK: Adapting Keyword Query to Semantic Search
pp. 707
Incremental Maintenance of Materialized Ontologies
pp. 726
A Parallel PSPG Finite Element Method for Direct Simulation of Incompressible Flow
pp. 728
Fast Deformation Simulation of Breasts Using GPU-Based Dynamic Explicit Finite Element Method
pp. 732
Gaussian Mixture Model in Improved HLS Color Space for Human Silhouette Extraction
pp. 733
Formal Verification of a Descent Guidance Control Program of a Lunar Lander
pp. 750
Towards a Semantic Web of Relational Databases: A Practical Semantic Toolkit and an In-Use Case from Traditional Chinese Medicine
pp. 750
Prosodic Entrainment and Tutoring Dialogue Success
pp. 751
Algorithmic Aspects of Bandwidth Trading
pp. 751
Extreme User and Political Rumor Detection on Twitter
pp. 751
Gender Classification from Iris Images Using Fusion of Uniform Local Binary Patterns
pp. 752
Public Deployment of Semantic Service Matchmaker with UDDI Business Registry
pp. 777
Combination of Network Construction and Cluster Analysis and Its Application to Traditional Chinese Medicine
pp. 778
dipLODocus[RDF]—Short and Long-Tail RDF Analytics for Massive Webs of Data
pp. 781
Using WordNet to Disambiguate Word Senses for Text Classification
pp. 786
Combining Extreme Programming with ISO 9000
pp. 788
Performance of Evolutionary Algorithms on Random Decomposable Problems
pp. 842
JVM-Portable Sandboxing of Java’s Native Libraries
pp. 843
Ontology-Based Information Extraction for Business Intelligence
pp. 871
Convolutional Neural Networks as a Computational Model for the Underlying Processes of Aesthetics Perception
pp. 908
GeoCLEF: The CLEF 2005 Cross-Language Geographic Information Retrieval Track Overview
pp. 913
A Non-visual Approach to Improving Collaboration Between Blind and Sighted Internet Users
pp. 956
ECGSC: Elliptic Curve Based Generalized Signcryption
pp. 1123
Extracting Patterns in Music for Composition via Markov Chains
pp. 1167
An ACO Algorithm with Adaptive Volatility Rate of Pheromone Trail
pp. 1240
Enabling Peer-to-Peer Interactions for Scientific Applications on the Grid
Similar content
5,170
AES Proposal: Rijndael
Authors:
J. Daemen
,
V. Rijmen
,
Daemen
…
Efficient implementation of the Rijndael S-box
Authors:
V. Rijmen
A Novel Low-Cost Open-Hardware Platform for Monitoring Soil Water Content and Multiple Soil-Air-Vegetation Parameters
Authors:
Giovanni Bitella
,
Roberta Rossi
,
Rocco Bochicchio
…
See all similar
Cited by
5
A Very Compact S-Box for AES
Authors:
D. Canright
A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices
Authors:
Mathieu Renauld
,
François-Xavier Standaert
,
Nicolas Veyrat-Charvillon
…
On the Power of Bitslice Implementation on Intel Core2 Processor
Authors:
Mitsuru Matsui
,
Junko Nakajima
See all cited by