Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
43
views
0
references
Top references
cited by
80
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,286
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Foundations and Practice of Security
On the Importance of Checking Cryptographic Protocols for Faults
other
Author(s):
Dan Boneh
,
Richard A. DeMillo
,
Richard J. Lipton
Publication date
(Online):
July 13 2001
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
JMIR: Research Protocols
Author and book information
Book Chapter
Publication date (Print):
1997
Publication date (Online):
July 13 2001
Pages
: 37-51
DOI:
10.1007/3-540-69053-0_4
SO-VID:
736b0b72-9122-4d57-9ad0-5c45171703cf
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Interacting with Context
pp. 1
The history of steganography
pp. 1
The Quantum Inspired Modelling of Changing Attitudes and Self-organising Societies
pp. 1
Reasoning as Search: Supporting Reasoning with Distributed Memory
pp. 1
Subspace Codes
pp. 1
On the Revival of Dynamic Languages
pp. 1
Data Clustering: A User’s Dilemma
pp. 1
Invariants and Well-Foundedness in Program Algebra
pp. 1
Let’s Get Physical: Models and Methods for Real-World Security Protocols
pp. 1
Second-Order Polynomial Models for Background Subtraction
pp. 1
Feature Selection Based on Iterative Canonical Correlation Analysis for Automatic Diagnosis of Parkinson’s Disease
pp. 1
Recent developments in practical examination timetabling
pp. 1
Query Expansion in Folksonomies
pp. 1
0. Introduction
pp. 1
Image-Based Low-Cost Systems for Automatic 3D Recording and Modelling of Archaeological Finds and Objects
pp. 1
Blow-Ups, Win/Win’s, and Crown Rules: Some New Directions in FPT
pp. 1
Leveraging Multiple Mechanisms for Information Propagation
pp. 1
Motion Coordination for Multi-agent Networks
pp. 1
Refining specifications to logic programs
pp. 1
Learning with Configurable Operators and RL-Based Heuristics
pp. 1
Correlation Clustering with Partial Information
pp. 1
Final universes of processes
pp. 1
Fully Abstract Characterization of Probabilistic May Testing
pp. 3
GO-WAR: A Tool for Mining Weighted Association Rules from Gene Ontology Annotations
pp. 3
Evaluating Quality of Service Traffic Classes on the Megafly Network
pp. 3
Towards Sensor Database Systems
pp. 3
Exploring the Potential of User Modeling Based on Mind Maps
pp. 3
Constant-Factor Approximation for Minimum-Weight (Connected) Dominating Sets in Unit Disk Graphs
pp. 3
Touchscreen Poetry: Analyzing Gestural Digital Poems
pp. 3
Deciphering Text from Touchscreen Key Taps
pp. 3
Group Normalization
pp. 3
Adversarial Image Synthesis for Unpaired Multi-modal Cardiac Data
pp. 3
Plan Indexing for State-Based Plans
pp. 3
Boosting Authenticated Encryption Robustness with Minimal Modifications
pp. 5
Involving Users in the Design of ICT Aimed to Improve Education, Work, and Leisure for Users with Intellectual Disabilities
pp. 5
Active Learning of Extended Finite State Machines
pp. 5
1 Homing and Synchronizing Sequences
pp. 7
Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best
pp. 7
Axiomatizing Weak Ready Simulation Semantics over BCCSP
pp. 9
Modelling the Effects of Operating Conditions on Motor Power Consumption in Single Screw Extrusion
pp. 9
Identifying Relationships in Functional and Structural Connectome Data Using a Hypergraph Learning Method
pp. 10
What Automata Can Provide a Medium for Life?
pp. 11
Ransomware and the Legacy Crypto API
pp. 11
TrajSpark: A Scalable and Efficient In-Memory Management System for Big Trajectory Data
pp. 13
Pairing-Based Cryptography at High Security Levels
pp. 13
Deformable Image Registration of Follow-Up Breast Magnetic Resonance Images
pp. 13
An Apriori-Based Algorithm for Mining Frequent Substructures from Graph Data
pp. 13
Philosophical Conceptions of Information
pp. 13
Generic programming
pp. 13
Self-organizing data structures
pp. 13
A Bandwidth-Efficient Application Level Framing Protocol for H.264 Video Multicast over Wireless LANs
pp. 14
Many-Objective Optimization: An Engineering Design Perspective
pp. 15
A Macroscopic Privacy Model for Heterogeneous Robot Swarms
pp. 15
Face Authentication Using One-Class Support Vector Machines
pp. 16
SVC2004: First International Signature Verification Competition
pp. 16
Cross-Cultural Study on Facial Regions as Cues to Recognize Emotions of Virtual Agents
pp. 16
Building General Purpose Security Services on Trusted Computing
pp. 17
DroidSense: A Mobile Tool to Analyze Software Development Processes by Measuring Team Proximity
pp. 18
Unsupervised Learning of Models for Recognition
pp. 18
A Formal Specification for Organizational Adaptation
pp. 18
Finding minimally weighted subgraphs
pp. 18
Influence and Passivity in Social Media
pp. 18
Phrase-Based Statistical Machine Translation
pp. 18
k2-Trees for Compact Web Graph Representation
pp. 19
2. Synchronization
pp. 19
Robust Recognition of Reading Activity in Transit Using Wearable Electrooculography
pp. 19
Rational control of reasoning in artificial intelligence
pp. 19
Treewidth: Algorithmic techniques and results
pp. 19
VLog: A Rule Engine for Knowledge Graphs
pp. 23
On Symmetric and Choiceless Computation
pp. 24
When You Can’t Read It, Listen to It! An Audio-Visual Interface for Book Reading
pp. 24
Young-Elderly Travellers as Potential Users and Actual Users of Internet with Mobile Devices During Trips
pp. 24
Using Evidences Based on Natural Language to Drive the Process of Fusing Multimodal Sources
pp. 25
Interactive Conversion of Web Tables
pp. 25
Matching Ontologies in Open Networked Systems: Techniques and Applications
pp. 27
A New Public-Key Cryptosystem
pp. 27
Distortion-Free Data Embedding for Images
pp. 28
The Marketcast Method for Aggregating Prediction Market Forecasts
pp. 29
Extending the GHS Weil Descent Attack
pp. 29
Dataset Issues in Object Recognition
pp. 29
User Behaviour and Lexical Ambiguity in Cross-Language Image Retrieval
pp. 30
Modelling of Cancer Patient Records: A Structured Approach to Data Mining and Visual Analytics
pp. 31
Mutual Development: A Case Study in Customer-Initiated Software Product Development
pp. 31
Novel Local Shape-Adaptive Gyrification Index with Application to Brain Development
pp. 31
Encoding Context-Sensitivity in Reo into Non-Context-Sensitive Semantic Models
pp. 32
Neural Networks Regression Inductive Conformal Predictor and Its Application to Total Electron Content Prediction
pp. 32
Beeping a Maximal Independent Set
pp. 33
Generation of efficient interprocedural analyzers with PAG
pp. 33
Towards a Common API for Structured Peer-to-Peer Overlays
pp. 33
Event2vec: Learning Representations of Events on Temporal Sequences
pp. 33
3. A case study in synchronization and proof techniques
pp. 34
A New Algorithm for Long Integer Cube Computation with Some Insight into Higher Powers
pp. 34
Minimal weight k-SR representations
pp. 34
A Timely Endeavor: Theoretical, Behavioral, Bioimaging, and Clinical Perspectives on Time Perception
pp. 34
Moderately exponential bound for graph isomorphism
pp. 36
Diverse Image-to-Image Translation via Disentangled Representations
pp. 36
Dependent Types and Fibred Computational Effects
pp. 36
An Empirical Study on the Adoption of Online Household e-waste Collection Services in China
pp. 36
30 Years of Modal Transition Systems: Survey of Extensions and Analysis
pp. 37
Correlation-Weighted Sparse Group Representation for Brain Network Construction in MCI Classification
pp. 37
Approximating the Average Stretch Factor of Geometric Graphs
pp. 37
A QoS-Aware Web Service Composition Approach Based on Genetic Programming and Graph Databases
pp. 38
Deep Learning for Emotion Recognition in Faces
pp. 39
Scalar Aggregation in FD-Inconsistent Databases
pp. 39
A Unified Approach for Measuring Precision and Generalization Based on Anti-alignments
pp. 39
Submodular Secretary Problem and Extensions
pp. 40
Relational Presheaves as Labelled Transition Systems
pp. 40
Active Trust Management for Autonomous Adaptive Survivable Systems (ATM’s for AAss’s)
pp. 40
Orthogonal Direct Sum Masking
pp. 41
Algebraic and Logical Emulations of Quantum Circuits
pp. 41
Interpretability in Intelligent Systems – A New Concept?
pp. 42
Fibrational Induction Meets Effects
pp. 42
Knowledge Discovery in Multi-label Phenotype Data
pp. 42
Cloud Computing and Big Data Analytics: What Is New from Databases Perspective?
pp. 43
On Practical Aspects of PCFG Password Cracking
pp. 43
Detecting Computer Worms in the Cloud
pp. 43
On the Link between Gaussian Homotopy Continuation and Convex Envelopes
pp. 44
Protecting Mobile Agents Against Malicious Hosts
pp. 44
Segmentation and Recognition Using Structure from Motion Point Clouds
pp. 44
A Bayesian Algorithm for Reconstructing Two-Component Signaling Networks
pp. 45
Combinatorial Structure of Finite Fields with Two Dimensional Modulo Metrics⋆
pp. 45
Multimodal Learning Hub: A Tool for Capturing Customizable Multimodal Learning Experiences
pp. 46
Co-evolutionary constraint satisfaction
pp. 46
Scheduling, timetabling and rostering — A special relationship?
pp. 47
#Depression: Findings from a Literature Review of 10 Years of Social Media and Depression Research
pp. 47
On Dataset Complexity for Case Base Maintenance
pp. 48
On Berge Multiplication for Monotone Boolean Dualization
pp. 48
On the Availability of Non-strict Quorum Systems
pp. 48
Predicting Personality Using Novel Mobile Phone-Based Metrics
pp. 48
Perceptions of Teachers and Guardians on the Electronic Record in the School-Family Communication
pp. 49
A Universal Client-Based Identity Management Tool
pp. 49
Some probabilistic powerdomains in the category SFP
pp. 49
Unsupervised Accent Modeling for Language Identification
pp. 49
Patient Position Detection for SAR Optimization in Magnetic Resonance Imaging
pp. 50
Metric Space Searching Based on Random Bisectors and Binary Fingerprints
pp. 51
The Stixel World - A Compact Medium Level Representation of the 3D-World
pp. 51
Approximate Integer Common Divisors
pp. 51
Rapid Learning for Binary Programs
pp. 51
On Finitary Functors and Their Presentations
pp. 51
When Birds Die: Making Population Protocols Fault-Tolerant
pp. 51
Adaptive Navigation Support and Adaptive Collaboration Support in WebDL
pp. 52
The Cog Project: Building a Humanoid Robot
pp. 52
On the Use of Gröbner Bases for Computing the Structure of Finite Abelian Groups
pp. 53
Machine learning for adaptive user interfaces
pp. 53
Ant Colony Optimisation-Based Classification Using Two-Dimensional Polygons
pp. 53
Bridging Computational Features Toward Multiple Semantic Features with Multi-task Regression: A Study of CT Pulmonary Nodules
pp. 54
SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key
pp. 54
Human Robot Interaction and Fiction: A Contradiction
pp. 54
Single Sign-On Using Trusted Platforms
pp. 55
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics
pp. 55
Integration of Unsupervised and Supervised Criteria for Deep Neural Networks Training
pp. 56
Moral Values from Simple Game Play
pp. 56
Enhanced TLS Handshake Authentication with Blockchain and Smart Contract (Short Paper)
pp. 57
Fast probabilistic algorithms
pp. 57
IR-n System, a Passage Retrieval Architecture
pp. 59
On the Price of Anarchy and Stability of Correlated Equilibria of Linear Congestion Games,,
pp. 59
Constrained Connectivity and Transition Regions
pp. 59
Partial Order Methods for Statistical Model Checking and Simulation
pp. 60
External User Inclusion in Public e-Service Development: Exploring the Current Practice in Sweden
pp. 60
A High Resolution Land Use/Cover Modelling Framework for Europe: Introducing the EU-ClueScanner100 Model
pp. 61
Light Robustness
pp. 61
EnvSOM: A SOM Algorithm Conditioned on the Environment for Clustering and Visualization
pp. 61
Robust Cancer Treatment Outcome Prediction Dealing with Small-Sized and Imbalanced Data from FDG-PET Images
pp. 61
ADRES: An Architecture with Tightly Coupled VLIW Processor and Coarse-Grained Reconfigurable Matrix
pp. 62
Logic Training through Algorithmic Problem Solving
pp. 62
Efficient State-Based CRDTs by Delta-Mutation
pp. 62
Adversarial Examples for Malware Detection
pp. 62
Lower Bounds on Matrix Rigidity Via a Quantum Argument
pp. 63
Cryptocurrencies as a Disruption? Empirical Findings on User Adoption and Future Potential of Bitcoin and Co
pp. 63
Return to Activities of Daily Life: Physiotherapy Rehabilitation with Serious Game
pp. 63
Decidability Results for Restricted Models of Petri Nets with Name Creation and Replication
pp. 63
Measuring Statistical Dependence with Hilbert-Schmidt Norms
pp. 64
TweetNaCl: A Crypto Library in 100 Tweets
pp. 65
5. Syntax and semantics of CCS
pp. 65
Elements of Good Route Directions in Familiar and Unfamiliar Environments
pp. 65
An Agent-Based Model for Simultaneous Phone and SMS Traffic over Time
pp. 65
Key-Insulated Public Key Cryptosystems
pp. 65
Completeness Theorems for Bi-Kleene Algebras and Series-Parallel Rational Pomset Languages
pp. 66
Element-Oriented Method of Assessing Landscape of Sightseeing Spots by Using Social Images
pp. 67
Learning with Rejection
pp. 68
On Testing Expansion in Bounded-Degree Graphs
pp. 69
RBAC-MAS and SODA: Experimenting RBAC in AOSE
pp. 69
Network Discovery and Verification with Distance Queries
pp. 69
Training Hierarchical Feed-Forward Visual Recognition Models Using Transfer Learning from Pseudo-Tasks
pp. 69
LC-QuAD 2.0: A Large Dataset for Complex Question Answering over Wikidata and DBpedia
pp. 69
A Closer Look at Database Replication Middleware Architectures for Enterprise Applications
pp. 70
Structured Sparse Kernel Learning for Imaging Genetics Based Alzheimer’s Disease Diagnosis
pp. 70
Accelerated Analysis of Biological Parameters Space Using GPUs
pp. 71
Structural Operational Semantics for Continuous State Probabilistic Processes
pp. 71
A Common Basis for Agent Organisation in BDI Languages
pp. 72
DBR: Depth-Based Routing for Underwater Sensor Networks
pp. 72
Breast Imaging with 3D Ultrasound Computer Tomography: Results of a First In-vivo Study in Comparison to MRI Images
pp. 72
Cell-Probe Proofs and Nondeterministic Cell-Probe Complexity
pp. 72
Enhancing E-commerce Security Using GSM Authentication
pp. 73
Inferring High-Level Behavior from Low-Level Sensors
pp. 73
Covert channels—A context-based view
pp. 73
Improved Randomized Algorithms for 3-SAT
pp. 73
Speed Records for NTRU
pp. 73
An ACO Approach to Planning
pp. 74
A Comparison of the Historical Entries in Wikipedia and Baidu Baike
pp. 74
Cochlea Modelling: Clinical Challenges and Tubular Extraction
pp. 75
Incentives for Sharing in Peer-to-Peer Networks
pp. 75
Longitudinal Modeling of Multi-modal Image Contrast Reveals Patterns of Early Brain Growth
pp. 75
Reconstructing Online Behaviors by Effort Minimization
pp. 75
The Complexity of Satisfiability of Small Depth Circuits
pp. 76
Data Weighting for Principal Component Noise Reduction in Contrast Enhanced Ultrasound
pp. 77
Automatic Construction of 3D Statistical Deformation Models Using Non-rigid Registration
pp. 77
Approximation Algorithms for the Maximum Leaf Spanning Tree Problem on Acyclic Digraphs
pp. 78
Modelling and Evaluation of CCN-Caching Trees
pp. 79
Automatic Reference Selection for Quantitative EEG Component Interpretation: Cross Spectrum Analysis Based on Bipolar EEG
pp. 80
The Effects of Regularization on Learning Facial Expressions with Convolutional Neural Networks
pp. 80
A Data Mining Library for miRNA Annotation and Analysis
pp. 80
Conquering the Needle-in-a-Haystack: How Correlated Input Variables Beneficially Alter the Fitness Landscape for Neural Networks
pp. 81
Sentiments in Wikipedia Articles for Deletion Discussions
pp. 81
Loop Summarization and Termination Analysis
pp. 81
A Systematic Review of Impediments Blocking Internet of Things Adoption by Governments
pp. 81
Attention-Based Two-Phase Model for Video Action Detection
pp. 82
Finding the Maximal Pose Error in Robotic Mechanical Systems Using Constraint Programming
pp. 83
A structural co-induction theorem
pp. 84
OLD resolution with tabulation
pp. 84
On Temporally Connected Graphs of Small Cost
pp. 84
Multi-directional Characterization for Pollen Tubes Based on a Nanorobotic Manipulation System
pp. 84
Prediction of Brain Network Age and Factors of Delayed Maturation in Very Preterm Infants
pp. 84
Shape Filtering for False Positive Reduction at Computed Tomography Colonography
pp. 85
A CPS-translation of the λμ-calculus
pp. 85
Secure Certificateless Proxy Re-encryption Without Pairing
pp. 86
Combining Bayesian Networks, k Nearest Neighbours Algorithm and Attribute Selection for Gene Expression Data Analysis
pp. 86
Improved Harmony Search from Ensemble of Music Players
pp. 86
Evader Interdiction and Collateral Damage
pp. 86
A Robust Optimization Approach to Supply Chain Management
pp. 87
Predicting Phenotype from Genotype through Automatically Composed Petri Nets
pp. 88
Stability-Weighted Matrix Completion of Incomplete Multi-modal Data for Disease Diagnosis
pp. 88
FEMaLeCoP: Fairly Efficient Machine Learning Connection Prover
pp. 88
Security Bounds for the Design of Code-Based Cryptosystems
pp. 89
Compactness and Continuity, Constructively Revisited
pp. 90
A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement
pp. 90
On Finite Monoids of Cellular Automata
pp. 90
A Semantics for Every GSPN
pp. 91
Gold Mining in a River of Internet Content Traffic
pp. 91
mHealthDroid: A Novel Framework for Agile Development of Mobile Health Applications
pp. 91
Computing the Edit-Distance Between Unrooted Ordered Trees
pp. 91
Double description method revisited
pp. 92
User Interfaces for On-Line Diagram Recognition
pp. 92
Optimal Use of Expert Knowledge in Ant Colony Optimization for the Analysis of Epistasis in Human Disease
pp. 92
A Methodology to Specify Multiagent Systems
pp. 92
Evaluation of Pooling Operations in Convolutional Architectures for Object Recognition
pp. 92
A Regularization Scheme for Diffusion Tensor Magnetic Resonance Images
pp. 93
Analyzing Entities and Topics in News Articles Using Statistical Topic Models
pp. 95
Dilated Convolutional Neural Networks for Cardiovascular MR Segmentation in Congenital Heart Disease
pp. 95
Deep Projective 3D Semantic Segmentation
pp. 97
Architectural Modeling and Analysis for Safety Engineering
pp. 97
Decoding of Interleaved Reed Solomon Codes over Noisy Data
pp. 99
Passive Testing with Asynchronous Communications
pp. 99
Cryptography from Learning Parity with Noise
pp. 99
Unsupervised Feature Learning for Human Activity Recognition Using Smartphone Sensors
pp. 101
Generalized Rabin(1) Synthesis with Applications to Robust System Synthesis
pp. 101
A Fast Method of Generating Pharmacokinetic Maps from Dynamic Contrast-Enhanced Images of the Breast
pp. 103
Distractor-Aware Siamese Networks for Visual Object Tracking
pp. 103
Vision-Based Gesture Recognition: A Review
pp. 105
Time Durations of Phonemes in Polish Language for Speech and Speaker Recognition
pp. 106
Following the Blind Seer – Creating Better Performance Models Using Less Information
pp. 106
Role-Based Access Control for Model-Driven Web Applications
pp. 107
Context-Aware User Authentication – Supporting Proximity-Based Login in Pervasive Computing
pp. 107
An Algebraic Characterisation of Complexity for Valued Constraint
pp. 109
Trace Semantics via Determinization
pp. 109
Interaction Design: The Mobile Percussionist
pp. 110
Quotienting the Delay Monad by Weak Bisimilarity
pp. 111
Auto-alignment of Knee MR Scout Scans through Redundant, Adaptive and Hierarchical Anatomy Detection
pp. 111
Home Network or Access Link? Locating Last-Mile Downstream Throughput Bottlenecks
pp. 111
8. Some proofs about data structures
pp. 112
Word Sense Disambiguation: A Graph-Based Approach Using N-Cliques Partitioning Technique
pp. 112
AutoPart: Parameter-Free Graph Partitioning and Outlier Detection
pp. 112
Lagrangian Relaxation
pp. 112
Computer Assisted Identification, Segmentation and Quantification of Synapses in the Cerebral Cortex
pp. 113
Specification and Verification of Graph-Based Model Transformation Properties
pp. 113
Keyword Spotting with Convolutional Deep Belief Networks and Dynamic Time Warping
pp. 115
Modeling Adversaries in a Logic for Security Protocol Analysis
pp. 115
Security Requirements for the Deployment of Services Across Tactical SOA
pp. 115
Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks
pp. 115
Affine Sessions
pp. 116
On discerning words by automata
pp. 116
Efficient Compression on Real World Directed Graphs
pp. 117
Engineering Route Planning Algorithms
pp. 120
Mass Preserving Mappings and Image Registration
pp. 121
Computational Advantages of Deep Prototype-Based Learning
pp. 121
Motion-Coherent Affinities for Hypergraph Based Motion Segmentation
pp. 121
Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment
pp. 121
Rainbow Domination and Related Problems on Some Classes of Perfect Graphs
pp. 122
Directly Addressable Variable-Length Codes
pp. 124
Testing for Distinguishing Repair Candidates in Spreadsheets – the Mussco Approach
pp. 125
Building Oblivious Transfer on Channel Delays
pp. 125
Call Center Stress Recognition with Person-Specific Models
pp. 126
SFMap: Inferring Services over Encrypted Web Flows Using Dynamical Domain Name Graphs
pp. 127
Automatic Landmark Estimation for Adolescent Idiopathic Scoliosis Assessment Using BoostNet
pp. 128
Route Planning and Map Inference with Global Positioning Traces
pp. 128
A Review of Quality Dimensions in e-Government Services
pp. 128
Deep Convolutional Neural Networks for Classifying Body Constitution
pp. 129
Graph Treewidth and Geometric Thickness Parameters
pp. 129
MiRaGE: Inference of Gene Expression Regulation via MicroRNA Transfection II
pp. 129
Pattern Structures and Their Projections
pp. 129
javaPlex: A Research Software Package for Persistent (Co)Homology
pp. 130
Modeling Malware-driven Honeypots
pp. 132
Ephemeral Communication and Communication Places
pp. 132
Comprehending Ringads
pp. 132
Simulation Subsumption in Ramsey-Based Büchi Automata Universality and Inclusion Testing
pp. 133
Consumers’ Perceptions of Social Commerce Adoption in Saudi Arabia
pp. 133
Closing Schemas in Object-Relational Databases
pp. 133
Versatile Succinct Representations of the Bidirectional Burrows-Wheeler Transform
pp. 133
Networks Become Navigable as Nodes Move and Forget
pp. 133
Differences between the EISPACK subroutines and the handbook Algol procedures
pp. 134
Encoding-Decoding Transitional Systems for Classes of P Systems
pp. 136
An Adapted Lesk Algorithm for Word Sense Disambiguation Using WordNet
pp. 136
Nonlinear Statistical Shape Modeling for Ankle Bone Segmentation Using a Novel Kernelized Robust PCA
pp. 137
The Performance Impact of Advance Reservation Meta-scheduling
pp. 137
PHAT – Persistent Homology Algorithms Toolbox
pp. 138
Lagrangian Relaxation Realised in the NgMPPS Multi Actor Architecture
pp. 139
A Virtual Agent as Vocabulary Trainer: Iconic Gestures Help to Improve Learners’ Memory Performance
pp. 140
Convolutional Learning of Spatio-temporal Features
pp. 143
User Data Management and Usage Model Acquisition in an Adaptive Educational Collaborative Environment
pp. 144
Automated Analysis of Multi Site MRI Phantom Data for the NIHPD Project
pp. 144
Testing the Foundations of Quantal Response Equilibrium
pp. 145
Towards an Ontology-Based Approach for Eliciting Possible Solutions to Non-Functional Requirements
pp. 145
Categories: How I Learned to Stop Worrying and Love Two Sorts
pp. 145
Meta-heuristic and Constraint-Based Approaches for Single-Line Railway Timetabling
pp. 146
Who Is Concerned about What? A Study of American, Chinese and Indian Users’ Privacy Concerns on Social Network Sites
pp. 146
‘Who, When, and Where?’ Location Proof Assertion for Mobile Devices
pp. 146
A Real-World Benchmark Model for Testing Concurrent Real-Time Systems in the Automotive Domain
pp. 147
Modelling Cloud Forensic-Enabled Services
pp. 147
Accessing Touristic Knowledge Bases through a Natural Language Interface
pp. 147
Identifying SNPs without a Reference Genome by Comparing Raw Reads
pp. 148
Random Forests for Phase Detection in Surgical Workflow Analysis
pp. 149
3D Deeply Supervised Network for Automatic Liver Segmentation from CT Volumes
pp. 150
An Alphabet-Friendly FM-Index
pp. 151
Gait Recognition Using a View Transformation Model in the Frequency Domain
pp. 151
Improving Segmentation of the Left Ventricle Using a Two-Component Statistical Model
pp. 151
Trace Inclusion for One-Counter Nets Revisited
pp. 153
Induction of recursive Bayesian classifiers
pp. 154
Towards an On-Line Analysis of Tweets Processing
pp. 154
How Many Trees in a Random Forest?
pp. 156
Provably Secure Implicit Certificate Schemes
pp. 156
ParCoLab: A Parallel Corpus for Serbian, French and English
pp. 157
On Formulations of Firing Squad Synchronization Problems
pp. 157
A Semantic Theory of the Internet of Things
pp. 158
DES and Differential Power Analysis The “Duplication” Method
pp. 158
Undoing the Damage of Dataset Bias
pp. 158
Assembling Genomes and Mini-metagenomes from Highly Chimeric Reads
pp. 158
Optimal Succinctness for Range Minimum Queries
pp. 159
Software Implementation of Mathematical Model of Thermodynamic Processes in a Steam Turbine on High-Performance System
pp. 159
RFID Systems: A Survey on Security Threats and Proposed Solutions
pp. 161
An Ontology-Based Bayesian Network Approach for Representing Uncertainty in Clinical Practice Guidelines
pp. 161
Integrating Statistical Prior Knowledge into Convolutional Neural Networks
pp. 161
Anisotropic Feature Extraction from Endoluminal Images for Detection of Intestinal Contractions
pp. 162
Graph-theoretic arguments in low-level complexity
pp. 162
Engineering a Performance Management System to Support Community Care Delivery
pp. 162
Using a Modelling Language to Describe the Quality of Life Goals of People Living with Dementia
pp. 162
Testing TLS Using Combinatorial Methods and Execution Framework
pp. 163
Response-Time Modeling of Controller Area Network (CAN)
pp. 163
A Model-Based Extension to HiP-HOPS for Dynamic Fault Propagation Studies
pp. 164
Pre-processing and Indexing Techniques for Constellation Queries in Big Data
pp. 164
Discovering Consumer Health Expressions from Consumer-Contributed Content
pp. 165
Independent Vector Analysis: An Extension of ICA to Multivariate Components
pp. 166
SpineNet: Automatically Pinpointing Classification Evidence in Spinal MRIs
pp. 166
Social Situated Agents in Virtual, Real and Mixed Reality Environments
pp. 169
Strategic Tabletop Negotiations
pp. 169
The Database of the Cardiovascular System Related Signals
pp. 169
Experiences with QuickCheck: Testing the Hard Stuff and Staying Sane
pp. 169
Clinical Evaluation of an Automatic Path Tracker for Virtual Colonoscopy
pp. 169
Semi-homomorphic Encryption and Multiparty Computation
pp. 170
Teaching Academic Concurrency to Amazing Students
pp. 170
From Transitions to Executions
pp. 170
A New GreatSPN GUI for GSPN Editing and CSLTA Model Checking
pp. 170
Outlier Detection Using Replicator Neural Networks
pp. 171
Towards Self-aware Approach for Mobile Devices Security
pp. 173
Data Dependent Concentration Bounds for Sequential Prediction Algorithms
pp. 173
W-OTS+ – Shorter Signatures for Hash-Based Signature Schemes
pp. 173
Fine-Grained Access Control with Object-Sensitive Roles
pp. 175
Induced Subgraphs of Bounded Degree and Bounded Treewidth
pp. 176
Estimating Depth from RGB and Sparse Sensing
pp. 178
Towards Continuous Certification of Clinical Information Systems
pp. 180
A New Sharing Paradigm for the Personal Cloud
pp. 180
Improved Grammar-Based Compressed Indexes
pp. 182
Improved Primitives for Secure Multiparty Integer Computation
pp. 183
Recent Results in Speech Recognition for the Tatar Language
pp. 184
Quantum Entanglement and the Issue of Selective Influences in Psychology: An Overview
pp. 184
Exploring the Impact of Search Interface Features on Search Tasks
pp. 185
Can Evaluation Patterns Enable End Users to Evaluate the Quality of an e-learning System? An Exploratory Study
pp. 185
Exploring the Limits of Weakly Supervised Pretraining
pp. 186
Modular Redundancy for Theorem Proving
pp. 186
Improved Approximation Algorithms for Budgeted Allocations
pp. 186
Hybrid Systems with Finite Bisimulations
pp. 187
A Fast SVM Training Algorithm Based on a Decision Tree Data Filter
pp. 188
An Improved Optimistic and Fault-Tolerant Replication Protocol
pp. 188
Monitoring Discrete Event Systems Using Petri Net Embeddings
pp. 188
Improving Multi-label Classifiers via Label Reduction with Association Rules
pp. 188
An Effectiveness Measure for Ambiguous and Underspecified Queries
pp. 189
Bag-of-Words and Topic Modeling-Based Sport Video Analysis
pp. 190
Gesture Interaction in Cooperation Scenarios
pp. 191
Parallel Object Oriented Monte Carlo Simulations
pp. 191
Comparison of Coarsening Schemes for Multilevel Graph Partitioning
pp. 192
Using Simulation to Evaluate and Tune the Performance of Dynamic Load Balancing of an Over-Decomposed Geophysics Application
pp. 192
Face Recognition Using Wavelet Transform and Non-negative Matrix Factorization
pp. 193
Layer-Wise Relevance Propagation: An Overview
pp. 193
How Do E-Patients Connect Online? A Study of Social Support Roles in Health Social Networking
pp. 194
Automated Age Estimation from Hand MRI Volumes Using Deep Learning
pp. 194
Examining Community in the Digital Neighborhood: Early Results from Canada’s Wired Suburb
pp. 194
Robust Multi-scale Anatomical Landmark Detection in Incomplete 3D-CT Data
pp. 195
tLab: A System Enabling Malware Clustering Based on Suspicious Activity Trees
pp. 195
Formal Reasoning on Infinite Data Values: An Ongoing Quest
pp. 196
Reasoning about gradual changes of topological relationships
pp. 196
Constraint Satisfaction Problems with Infinite Templates
pp. 196
Experienced and Novice Driver Situation Awareness at Rail Level Crossings: An Exploratory On-Road Study
pp. 196
Multiple-Precision Residue-Based Arithmetic Library for Parallel CPU-GPU Architectures: Data Types and Features
pp. 196
Safety Verification for Probabilistic Hybrid Systems
pp. 197
Oblivious RAM with O((logN)3) Worst-Case Cost
pp. 197
BcePred: Prediction of Continuous B-Cell Epitopes in Antigenic Sequences Using Physico-chemical Properties
pp. 198
The Travelling Salesman Problem in Bounded Degree Graphs
pp. 199
Thompson Sampling: An Asymptotically Optimal Finite-Time Analysis
pp. 199
Recognition of Multiple Language Voice Navigation Queries in Traffic Situations
pp. 201
IKNOW: A Tool to Assist and Study the Creation, Maintenance, and Dissolution of Knowledge Networks
pp. 201
Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations
pp. 201
Pairing the Volcano
pp. 203
Learning and Incorporating Shape Models for Semantic Segmentation
pp. 203
A Deep Learning Method for Classification of EEG Data Based on Motor Imagery
pp. 204
A Statistical Framework for Partial Volume Segmentation
pp. 204
Shared Ensemble Learning Using Multi-trees
pp. 204
Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context
pp. 204
Combining Passages in the Monolingual Task with the IR-n System
pp. 205
DoS Amplification Attacks – Protocol-Agnostic Detection of Service Abuse in Amplifier Networks
pp. 205
Intelligent Systems in Long-Term Forecasting of the Extra-Virgin Olive Oil Price in the Spanish Market
pp. 206
Nonparametric Density Flows for MRI Intensity Normalisation
pp. 206
Optimizing Egalitarian Performance in the Side-Effects Model of Colocation for Data Center Resource Management
pp. 208
SymDIVINE: Tool for Control-Explicit Data-Symbolic State Space Exploration
pp. 208
The Application of I-Voting for Estonian Parliamentary Elections of 2011
pp. 209
Atlas Guided Identification of Brain Structures by Combining 3D Segmentation and SVM Classification
pp. 209
Multimodal Fusion and Fission within W3C Standards for Nonverbal Communication with Blind Persons
pp. 209
UML Modelling and Performance Analysis of Mobile Software Architectures
pp. 210
Using Ant Colony Optimization to Build Cluster-Based Classification Systems
pp. 211
Timed Temporal Logics
pp. 211
Do Voting Advice Applications Have an Effect on Electoral Participation and Voter Turnout? Evidence from the 2007 Swiss Federal Elections
pp. 213
3D multi-scale line filter for segmentation and visualization of curvilinear structures in medical images
pp. 213
Expert2Vec: Experts Representation in Community Question Answering for Question Routing
pp. 214
Hierarchical Predicate Encryption for Inner-Products
pp. 214
Deriving Inverse Operators for Modal Logic
pp. 215
Deterministic Identity-Based Encryption from Lattices with More Compact Public Parameters
pp. 215
Moments and Wavelets for Classification of Human Gestures Represented by Spatio-Temporal Templates
pp. 215
Conceptual Model of Complex Multi-agent System Smart City 4.0
pp. 215
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
pp. 216
A Complete Declarative Debugger for Maude
pp. 216
The (Thin) Bridges of AS Connectivity: Measuring Dependency Using AS Hegemony
pp. 216
Comparison of Methods for Community Detection in Networks
pp. 217
When Is “Nearest Neighbor” Meaningful?
pp. 217
A Generic yet Efficient Method for Secure Inner Product
pp. 218
NetCase: An Intelligent System to Assist Legal Services Providers in Transnational Legal Networks
pp. 218
Improved Competitive Ratios for Submodular Secretary Problems (Extended Abstract)
pp. 220
An Application of Recurrent Neural Networks to Discriminative Keyword Spotting
pp. 221
A Language and a Methodology for Prototyping User Interfaces for Control Systems
pp. 221
A Neural Approach to Blind Motion Deblurring
pp. 221
Contributing to Current Challenges in Identity and Access Management with Visual Analytics
pp. 222
The Independent Choice Logic and Beyond
pp. 222
Towards a Quick Computation of Well-Spread Pareto-Optimal Solutions
pp. 223
Model-Driven Web Form Validation with UML and OCL
pp. 223
Budgetary Data (in an Open Format) Benefits, Advantages, Obstacles and Inhibitory Factors in the View of the Intermediaries of this System: A Study in Latin American Countries
pp. 223
An Analysis of Minutiae Matching Strength
pp. 223
Arrays in Blitz++
pp. 224
Fundamentals of 3D halftoning
pp. 227
Watermarking document images with bounding box expansion
pp. 227
SSH – Somewhat Secure Host
pp. 227
De Novo Clustering of Long-Read Transcriptome Data Using a Greedy, Quality-Value Based Algorithm
pp. 228
Comparing a Shipping Information Pipeline with a Thick Flow and a Thin Flow
pp. 228
Semi-numerical Solution of Stochastic Process Algebra Models
pp. 229
Optimizing Window Aggregate Functions via Random Sampling
pp. 229
Squerall: Virtual Ontology-Based Access to Heterogeneous and Large Data Sources
pp. 229
An Artificial Agent for Anatomical Landmark Detection in Medical Images
pp. 230
Regressing Heatmaps for Multiple Landmark Localization Using CNNs
pp. 230
SCTP, XTP and TCP as Transport Protocols for High Performance Computing on Multi-cluster Grid Environments
pp. 230
A Flexible and Extensible Architecture for Device-Level Service Deployment
pp. 230
Dependently Typed Programming in Agda
pp. 231
Maximum Matching in Semi-streaming with Few Passes
pp. 232
A Structured Comparison of Social Engineering Intelligence Gathering Tools
pp. 232
GRASPing the Examination Scheduling Problem
pp. 232
A General Diagnosis Method for Ontologies
pp. 233
On spanning trees with low crossing numbers
pp. 233
Automatic Generalization of a QA Answer Extraction Module Based on Semantic Roles
pp. 233
Multi-scale line segmentation with automatic estimation of width, contrast and tangential direction in 2D and 3D medical images
pp. 234
Clustering and Hot Spot Detection in Socio-economic Spatio-temporal Data
pp. 234
Semi-supervised On-Line Boosting for Robust Tracking
pp. 235
Kernel Depth Measures for Functional Data with Application to Outlier Detection
pp. 235
Privacy-Preserving Face Recognition
pp. 236
Metacommunication Patterns in Online Communities
pp. 236
Cancer Metastasis Detection via Spatially Structured Deep Network
pp. 236
SpecDB: A Database for Storing and Managing Mass Spectrometry Proteomics Data
pp. 237
Towards Personalization of Diabetes Therapy Using Computerized Decision Support and Machine Learning: Some Open Problems and Challenges
pp. 238
An Evaluation Framework for Disseminating Context Information with Gossiping
pp. 238
Integrating Formal Predictions of Interactive System Behaviour with User Evaluation
pp. 238
Design of a Series Variable Stiffness Joint Based on Antagonistic Principle
pp. 239
Undetachable Threshold Signatures
pp. 240
A Faster Grammar-Based Self-index
pp. 240
Analysis of Multi-path Onion Routing-Based Anonymization Networks
pp. 241
Motion Reconstruction of Swarm-Like Self-organized Motor Bike Traffic from Public Videos
pp. 241
Mining Communication Data in a Music Community: A Preliminary Analysis
pp. 243
Predestination: Inferring Destinations from Partial Trajectories
pp. 243
KT-IDEM: Introducing Item Difficulty to the Knowledge Tracing Model
pp. 243
Identifying the Affective Dimension of Data Mining Practice: An Exploratory Study
pp. 244
Automating the Choice of Decision Support System Architecture
pp. 245
Fast Log Replication in Highly Available Data Store
pp. 246
Parametric Trace Slicing and Monitoring
pp. 247
On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records
pp. 247
Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis
pp. 248
EEG-Based Random Number Generators
pp. 249
Efficient Timetable Information in the Presence of Delays
pp. 249
Two-Phase Preference Disclosure in Attributed Social Networks
pp. 249
Adaptive Learning from Evolving Data Streams
pp. 249
A Taxonomy of Single Sign-On Systems
pp. 250
Two-Degree-of-Freedom Mechanisms Design Based on Parasitic Motion Maximization
pp. 250
Compositional Specification of Controllers for Batch Process Operations
pp. 250
Type Assignment for Intersections and Unions in Call-by-Value Languages
pp. 251
Local Reject Option for Deterministic Multi-class SVM
pp. 251
The Challenge of Accelerating Greek Judicial Procedure
pp. 252
A Formal Template Language Enabling Metaproof
pp. 256
Ninth International Workshop on the Pragmatics of OCL and Other Textual Specification Languages
pp. 256
Graphical Modeling of Ultrasound Propagation in Tissue for Automatic Bone Segmentation
pp. 256
Constraint Support in MDA Tools: A Survey
pp. 256
Playing “Air Instruments”: Mimicry of Sound-Producing Gestures by Novices and Experts
pp. 256
A Dataset for Web-Scale Knowledge Base Population
pp. 257
Eighth International Workshop on OCL Concepts and Tools
pp. 258
Monoaural Audio Source Separation Using Deep Convolutional Neural Networks
pp. 258
Using Case-Based Tests to Detect Gray Cygnets
pp. 259
Palmprint Biometric System Modeling by DBC and DLA Methods and Classifying by KNN and SVM Classifiers
pp. 260
Elimination of Redundancy in Ontologies
pp. 260
User Modeling on Adaptive Web-Based Learning Communities
pp. 261
Analysis of a Proposed Hash-Based Signature Standard
pp. 261
Stochastic Semantic-Based Multi-objective Genetic Programming Optimisation for Classification of Imbalanced Data
pp. 261
Cross-Categorial Donkeys
pp. 262
A New Approach to Assess Defragmentation Strategies in Dynamically Reconfigurable FPGAs
pp. 263
Social Network for Education: What Are the Resources Desired by Students?
pp. 263
On Cost-Effective Inter-LMA Domain Handover Scheme in NEMO-PMIPv6 Networks
pp. 263
Compression and Information Leakage of Plaintext
pp. 263
Information and Knowledge Based Conceptual Study of 2008 Financial Crisis
pp. 264
From Individuals to Social and Vice-versa
pp. 265
Practical invisibility in digital communication
pp. 265
Bayesian Image Quality Transfer
pp. 266
Reuse: From Components to Services
pp. 266
Sliding Mode Control of Robot Based on Neural Network Model with Positive Definite Inertia Matrix
pp. 266
SVF-Net: Learning Deformable Image Registration Using Shape Matching
pp. 266
A Reduction of Logical Regulatory Graphs Preserving Essential Dynamical Properties
pp. 267
Discovering Opinion Spammer Groups by Network Footprints
pp. 268
Improving the Reproducibility of PAN’s Shared Tasks:
pp. 268
The Join Calculus: A Language for Distributed Mobile Programming
pp. 270
Towards a Formalization of Individual Work Execution at Computer Workplaces
pp. 271
On the specification of elementary reactive behaviour
pp. 273
Ranking Entities Using Web Search Query Logs
pp. 274
Indexing Highly Repetitive Collections
pp. 275
A Large Deformation Diffeomorphic Approach to Registration of CLARITY Images via Mutual Information
pp. 276
On the Expressiveness of Refinement Settings
pp. 276
Similarity Search on Time Series Based on Threshold Queries
pp. 276
Isogeny Volcanoes and the SEA Algorithm
pp. 277
Comparative Analysis of Effectiveness of Two Timing-Driven Design Approaches
pp. 277
On Solutions to the Key Escrow Problem
pp. 277
Weighted Learning Vector Quantization to Cost-Sensitive Learning
pp. 278
Robust and Accurate Shape Model Fitting Using Random Forest Regression Voting
pp. 281
Detecting Isodistance Hotspots on Spatial Networks: A Summary of Results
pp. 281
A Lightweight Regression Method to Infer Psycholinguistic Properties for Brazilian Portuguese
pp. 282
MOPED: A Multi-objective Parzen-Based Estimation of Distribution Algorithm for Continuous Problems
pp. 283
Quantum Security of NMAC and Related Constructions
pp. 283
Classification of Photo and Sketch Images Using Convolutional Neural Networks
pp. 286
Evolutionary Fuzzy Scheduler for Grid Computing
pp. 289
Managerial and Technical Barriers to the Adoption of Open Source Software
pp. 289
Measuring Similarity in Description Logics Using Refinement Operators
pp. 291
Reinforced Condition/Decision Coverage (RC/DC): A New Criterion for Software Testing
pp. 291
Resilient Optimistic Termination Detection for the Async-Finish Model
pp. 292
Particle Filtering for Nonlinear BOLD Signal Analysis
pp. 293
Cross-View Action Recognition from Temporal Self-similarities
pp. 293
Towards a Shared Vocabulary for Interactive Digital Storytelling
pp. 294
A Streaming Data Prediction Method Based on Evolving Bayesian Network
pp. 296
On Probabilistic Parallel Programs with Process Creation and Synchronisation
pp. 297
Orthogonal Drawings with Few Layers
pp. 298
All-But-Many Lossy Trapdoor Functions from Lattices and Applications
pp. 298
A Comparison of Market Approaches to Software Vulnerability Disclosure
pp. 299
Verifying Progress in Timed Systems
pp. 300
A Cross-Modality Neural Network Transform for Semi-automatic Medical Image Annotation
pp. 300
A Methodology Based on MP Theory for Gene Expression Analysis
pp. 300
Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation
pp. 302
Compact E-Cash
pp. 302
Detecting Partially Occluded Objects with an Implicit Shape Model Random Field
pp. 303
The Minimum Conflict-Free Row Split Problem Revisited
pp. 303
Replica-Aware Partitioning Design in Parallel Database Systems
pp. 303
A Relativistic Opinion Mining Approach to Detect Factual or Opinionated News Sources
pp. 304
Calculating multidimensional symmetric functions using Jacobi's formula
pp. 304
Qubit Neural Network and Its Efficiency
pp. 305
Person Name Discrimination in the Dossier–GPLSI at the University of Alicante
pp. 305
On-the-fly analysis of systems with unbounded, lossy FIFO channels
pp. 306
On-Line Algorithms in Machine Learning
pp. 307
A Learning-Based Algorithm Selection Meta-Reasoner for the Real-Time MPE Problem
pp. 307
A New Shadow Removal Method Using Color-Lines
pp. 307
An Economic Model of User Rating in an Online Recommender System
pp. 308
Securely Accessing Shared Resources with Concurrent Constraint Programming
pp. 308
Using Reservoir Computing and Trend Information for Short-Term Streamflow Forecasting
pp. 309
User Engagement in Research Data Curation
pp. 309
MarUja: Virtual Assistant Prototype for the Computing Service Catalogue of the University of Jaén
pp. 313
A Reliability-Based Approach for Influence Maximization Using the Evidence Theory
pp. 313
TeslaML: Steering Machine Learning Automatically in Tencent
pp. 313
An Open-Ended Computational Evolution Strategy for Evolving Parsimonious Solutions to Human Genetics Problems
pp. 315
Instrumenting the City: Developing Methods for Observing and Understanding the Digital Cityscape
pp. 317
Tamper resistant software: an implementation
pp. 317
A Knowledge-Based Approach to Augment Applications with Interaction Traces
pp. 317
The Effect of Subharmonic Stimuli on Singing Voices
pp. 318
Rethinking Spatiotemporal Feature Learning: Speed-Accuracy Trade-offs in Video Classification
pp. 318
Multiple Incomplete Views Clustering via Weighted Nonnegative Matrix Factorization with $$L_{2,1}$$ Regularization
pp. 319
Better Key Sizes (and Attacks) for LWE-Based Encryption
pp. 319
Ellipse Detection for Visual Cyclists Analysis “In the Wild”
pp. 319
Object Recognition with Gradient-Based Learning
pp. 320
Improving Semantic Segmentation with Generalized Models of Local Context
pp. 320
The Local Nature of List Colorings for Graphs of High Girth
pp. 321
Design of a Neural Network for an Identification of a Robot Model with a Positive Definite Inertia Matrix
pp. 322
Learning Continuous-Time Information Diffusion Model for Social Behavioral Data Analysis
pp. 322
A Mimetic Finite-Difference Scheme for Convection of Multicomponent Fluid in a Porous Medium
pp. 323
Cautious Ordinal Classification by Binary Decomposition
pp. 323
Laconic and Precise Justifications in OWL
pp. 323
Verifying Linearisability with Potential Linearisation Points
pp. 323
The 2016 Signal Separation Evaluation Campaign
pp. 324
A Fast and Automatic Method to Correct Intensity Inhomogeneity in MR Brain Images
pp. 324
Trusting and Adopting E-Government Services in Developing Countries? Privacy Concerns and Practices in Rwanda
pp. 325
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups
pp. 327
A Novel and Unifying View of Trustworthiness in Cyberphysical Systems
pp. 328
Session Types for Object-Oriented Languages
pp. 328
Tools for Supporting Hybrid Learning Strategies in Open Source Software Environments
pp. 328
Modeling and In-Database Management of Relational, Data-Aware Processes
pp. 329
Untrusted Business Process Monitoring and Execution Using Blockchain
pp. 330
Fuzzy Clustering of Short Time-Series and Unevenly Distributed Sampling Points
pp. 331
A Feedback Control Approach to Mitigating Mistreatment in Distributed Caching Groups
pp. 331
Web Accessibility in Africa: A Study of Three African Domains
pp. 331
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services
pp. 332
VirtualEMF: A Model Virtualization Tool
pp. 332
A Novel Modeling and Recognition Method for Underwater Sound Based on HMT in Wavelet Domain
pp. 332
Visual Landmark Based 3D Road Course Estimation with Black Box Variational Inference
pp. 333
A Global Constraint for Closed Frequent Pattern Mining
pp. 336
Multivariate Dynamic Kernels for Financial Time Series Forecasting
pp. 337
Complete Parsimony Haplotype Inference Problem and Algorithms
pp. 338
Comparing Twitter and Traditional Media Using Topic Models
pp. 340
Discriminative Analysis of Early Alzheimer’s Disease Based on Two Intrinsically Anti-correlated Networks with Resting-State fMRI
pp. 341
Boosting Lazy Abstraction for SystemC with Partial Order Reduction
pp. 342
Robust Accurate Extrinsic Calibration of Static Non-overlapping Cameras
pp. 342
A Process for Driving Process Improvement in VSEs
pp. 343
Contour tracking by stochastic propagation of conditional density
pp. 343
A First Step Toward Quantifying the Climate’s Information Production over the Last 68,000 Years
pp. 344
Automated Segmentation of Knee MRI Using Hierarchical Classifiers and Just Enough Interaction Based Learning: Data from Osteoarthritis Initiative
pp. 344
Supporting Framework Use via Automatically Extracted Concept-Implementation Templates
pp. 346
Towards Aggregated Answers for Semistructured Data
pp. 347
Formally Testing Liveness by Means of Compression Rates
pp. 348
Rawdata-Based Detection of the Optimal Reconstruction Phase in ECG-Gated Cardiac Image Reconstruction
pp. 350
Method for Polygonal Approximation through Dominant Points Deletion
pp. 351
Neural Networks Compression for Language Modeling
pp. 351
Tetris is Hard, Even to Approximate
pp. 352
Dynamically Balanced Online Random Forests for Interactive Scribble-Based Segmentation
pp. 353
Selecting the Optimal Sequence for Deformable Registration of Microscopy Image Sequences Using Two-Stage MST-based Clustering Algorithm
pp. 354
Do We Need a New Narratology for Interactive Digital Storytelling? A Workshop on Theory at ICIDS 2009
pp. 354
Estimating Visual Comfort in Stereoscopic Displays Using Electroencephalography: A Proof-of-Concept
pp. 354
Nonlinear Control of Omnidirectional Mobile Platforms
pp. 354
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum
pp. 355
Fireworks Algorithm for Optimization
pp. 355
Diagnosing Performance Variations in HPC Applications Using Machine Learning
pp. 357
Classification Rule Mining with an Improved Ant Colony Algorithm
pp. 357
X-ray Image Contrast Enhancement Using the Second Generation Curvelet Transform
pp. 357
A Smart Contract for Boardroom Voting with Maximum Voter Privacy
pp. 359
CNN-Based Background Subtraction for Long-Term In-Vial FIM Imaging
pp. 359
Verified LISP Implementations on ARM, x86 and PowerPC
pp. 359
Recognition and Segmentation of 3-D Human Action Using HMM and Multi-class AdaBoost
pp. 360
Video Mining with Frequent Itemset Configurations
pp. 361
Mobile Terminals Haptic Interface: A Vibro-Tactile Finger Device for 3D Shape Rendering
pp. 361
Metamodel—Assisted Evolution Strategies
pp. 362
JAK-STAT Signalling as Example for a Database-Supported Modular Modelling Concept
pp. 363
Mediated Population Protocols
pp. 365
Dynamic Regression for Partial Correlation and Causality Analysis of Functional Brain Networks
pp. 366
One Knowledge Graph to Rule Them All? Analyzing the Differences Between DBpedia, YAGO, Wikidata & co.
pp. 367
Localized Priors for the Precise Segmentation of Individual Vertebras from CT Volume Data
pp. 368
Mining Outliers with Ensemble of Heterogeneous Detectors on Random Subspaces
pp. 369
Spatiotemporal Integration of Optical Flow Vectors for Micro-expression Detection
pp. 369
Reachability in Succinct and Parametric One-Counter Automata
pp. 370
High-Throughput Glomeruli Analysis of $$\mu $$ CT Kidney Images Using Tree Priors and Scalable Sparse Computation
pp. 371
A Model of Spatial Reference Frames in Language
pp. 372
Bayesian Diffusion Tensor Estimation with Spatial Priors
pp. 372
CADP 2010: A Toolbox for the Construction and Analysis of Distributed Processes
pp. 372
Recovery of Liver Motion and Deformation Due to Respiration Using Laparoscopic Freehand 3D Ultrasound System
pp. 372
Using Machine Learning Techniques to Recover Prismatic Cirrus Ice Crystal Size from 2-Dimensional Light Scattering Patterns
pp. 373
Brain-Computer Interface Games: Towards a Framework
pp. 373
Kernel-Regularized ICA for Computing Functional Topography from Resting-State fMRI
pp. 373
Adaptive Multimodal Fusion
pp. 374
Spelling approximate repeated or common motifs using a suffix tree
pp. 376
An Application of NLP Rules to Spoken Document Segmentation Task
pp. 377
Metaheuristic Hybridized Applied to Solve the Capacity Vehicle Routing Problem
pp. 377
A Registration Method for 3D Point Clouds with Convolutional Neural Network
pp. 378
Music Artist Similarity: An Exploratory Study on a Large-Scale Dataset of Online Streaming Services
pp. 380
25 Years of CNNs: Can We Compare to Human Abstraction Capabilities?
pp. 382
Mitotic Oscillators as MP Graphs
pp. 383
Dual Structured Light 3D Using a 1D Sensor
pp. 384
Fully-Dynamic All-Pairs Shortest Paths: Faster and Allowing Negative Cycles
pp. 384
On Designing a GeoViz-Aware Database System - Challenges and Opportunities
pp. 386
The Universal Composable Security of Quantum Key Distribution
pp. 386
Photo and Video Quality Evaluation: Focusing on the Subject
pp. 387
Security Proofs for Signature Schemes
pp. 389
Jump Number of Two-Directional Orthogonal Ray Graphs
pp. 390
An evolved circuit, intrinsic in silicon, entwined with physics
pp. 391
Using Social Media for Word-of-Mouth Marketing
pp. 391
Labeling Color 2D Digital Images in Theoretical Near Logarithmic Time
pp. 393
A Survey of Single-Database Private Information Retrieval: Techniques and Applications
pp. 397
Streaming Algorithm for Euler Characteristic Curves of Multidimensional Images
pp. 399
MtNet: A Multi-Task Neural Network for Dynamic Malware Classification
pp. 399
Concurrent Kleene Algebra
pp. 401
Wayfinding Strategies in Behavior and Language: A Symmetric and Interdisciplinary Approach to Cognitive Processes
pp. 401
Gamification of Education: A Review of Literature
pp. 402
Name Creation vs. Replication in Petri Net Systems
pp. 402
Improving the Centered CUSUMS Statistic for Structural Break Detection in Time Series
pp. 405
An Integrated Solar Database (ISD) with Extended Spatiotemporal Querying Capabilities
pp. 405
Advanced Parallel Robot with Extended RSUR Kinematic for a Circulating Working Principle
pp. 407
Action versus state based logics for transition systems
pp. 408
Parallelization of Pricing Path-Dependent Financial Instruments on Bounded Trinomial Lattices
pp. 414
Investigating ID3-Induced Rules from Low-Dimensional Data Cleaned by Complete Case Analysis
pp. 414
The T. albipennis Sand Painting Artists
pp. 416
Improving Functional MRI Registration Using Whole-Brain Functional Correlation Tensors
pp. 416
An Empirical Study on Evolution of API Documentation
pp. 417
Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates
pp. 419
Symbolic Techniques for Parametric Reasoning about Counter and Clock Systems
pp. 421
Pattern Matching in Lempel-Ziv Compressed Strings: Fast, Simple, and Deterministic
pp. 425
TabEL: Entity Linking in Web Tables
pp. 426
On Memory-Bound Functions for Fighting Spam
pp. 428
Families of Graph Algorithms: SSSP Case Study
pp. 430
Differences on How People Organize and Think about Personal Information
pp. 431
Improving MDLSTM for Offline Arabic Handwriting Recognition Using Dropout at Different Positions
pp. 433
Multimodal Hyper-connectivity Networks for MCI Classification
pp. 433
Reconstructing Many Partitions Using Spectral Techniques
pp. 434
Emergence of Cooperation in Adaptive Social Networks with Behavioral Diversity
pp. 435
On Optimizing Nearest Neighbor Queries in High-Dimensional Data Spaces
pp. 437
Integrating Information of Films by a Multi-source Combining Framework
pp. 438
Preprocessing and Transmission for 3D Point Cloud Data
pp. 439
Improving Toponym Extraction and Disambiguation Using Feedback Loop
pp. 439
Application Research on Network Attacks and Defenses with Zachman Framework
pp. 439
Agent coordination and control through logic theories
pp. 442
Affective, Behavioral, and Cognitive Aspects of Teen Perspectives on Personal Data in Social Media: A Model of Youth Data Literacy
pp. 445
Coverability Trees for Petri Nets with Unordered Data
pp. 445
Loci: Simple Thread-Locality for Java
pp. 445
How the Structuring of Domain Knowledge Helps Casual Process Modelers
pp. 446
Parallel Computing for Time-Consuming Multicriterial Optimization Problems
pp. 447
Algorithms for ε-Approximations of Terrains
pp. 447
On the Complexity of Mixed Discriminants and Related Problems
pp. 448
Higher-order logic programming
pp. 449
On approximation properties of the Independent set problem for degree 3 graphs
pp. 450
A Novel Approach to Network Security Situation Assessment Based on Attack Confidence
pp. 450
Dexterous Hand Motion Classification and Recognition Based on Multimodal Sensing
pp. 450
Knowledge Discovery Using Concept-Class Taxonomies
pp. 451
Data Mining Methods for Quality Assurance in an Environmental Monitoring Network
pp. 452
A Case Base Planning Approach for Dialogue Generation in Digital Movie Design
pp. 454
Universal quasi-prime algebraic domains
pp. 455
Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time
pp. 456
Dining Cryptographers Revisited
pp. 457
DeepRED – Rule Extraction from Deep Neural Networks
pp. 459
Air Quality Monitoring System and Benchmarking
pp. 460
Exploratory Matrix Factorization for PET Image Analysis
pp. 460
Topology Aware Fully Convolutional Networks for Histology Gland Segmentation
pp. 460
Population-Shrinkage of Covariance to Estimate Better Brain Functional Connectivity
pp. 461
Preserving the Fabric of Our Lives: A Survey of Web Preservation Initiatives
pp. 462
Hedging Public-Key Encryption in the Real World
pp. 463
Diagnostic Information for Control-Flow Analysis of Workflow Graphs (a.k.a. Free-Choice Workflow Nets)
pp. 467
Mining process models from workflow logs
pp. 468
A Goal-Based Modeling Approach to Develop Requirements of an Adaptive System with Environmental Uncertainty
pp. 469
HeMIS: Hetero-Modal Image Segmentation
pp. 471
A New Neural Model for Traffic Simulation
pp. 474
Flat Acceleration in Symbolic Model Checking
pp. 474
Robust Human Action Recognition Using Dynamic Movement Features
pp. 475
Mining Maximal Frequent ItemSets Using Combined FP-Tree
pp. 476
Approximate Distance Labeling Schemes
pp. 476
Who Will Follow Whom? Exploiting Semantics for Link Prediction in Attention-Information Networks
pp. 476
Computational Complexity of Traffic Hijacking under BGP and S-BGP
pp. 479
Part-Based Local Shape Models for Colon Polyp Detection
pp. 479
Homotopy Type Theory in Lean
pp. 479
GameOfFlows: Process Instance Adaptation in Complex, Dynamic and Potentially Adversarial Domains
pp. 481
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family
pp. 482
Combining Edge, Region, and Shape Information to Segment the Left Ventricle in Cardiac MR Images
pp. 483
Application Areas of AIS: The Past, The Present and The Future
pp. 486
Creating Subjective and Objective Sentence Classifiers from Unannotated Texts
pp. 487
Creating the DISEQuA Corpus: A Test Set for Multilingual Question Answering
pp. 488
Multinomial Naive Bayes for Text Categorization Revisited
pp. 490
The Blockchain and Kudos: A Distributed System for Educational Record, Reputation and Reward
pp. 491
Key Design Properties for Shipping Information Pipeline
pp. 494
Object, Scene and Actions: Combining Multiple Features for Human Action Recognition
pp. 495
Supervised Discriminative EEG Brain Source Imaging with Graph Regularization
pp. 495
Complexity Bounds for Regular Games
pp. 498
Genetics of Anisotropy Asymmetry: Registration and Sample Size Effects
pp. 498
The Role of Self-efficacy in Cancer Information Avoidance
pp. 500
Fine-Tuning Word Embeddings for Aspect-Based Sentiment Analysis
pp. 501
Recognition of Two-Dimensional Shapes Based on Dependence Vectors
pp. 502
Augmented Lagrangian Method, Dual Methods and Split Bregman Iteration for ROF Model
pp. 502
Convergence Time to Nash Equilibria
pp. 502
Oblivious RAM Revisited
pp. 506
Non-negative Kernel Sparse Coding for the Analysis of Motion Data
pp. 507
Robot Orientation with Histograms on MSL
pp. 509
The Conflict-Driven Answer Set Solver clasp: Progress Report
pp. 509
Blobworld: A System for Region-Based Image Indexing and Retrieval
pp. 510
Recurrent Fusion Network for Image Captioning
pp. 511
Optimized Batched Linear Algebra for Modern Architectures
pp. 516
Valmet: A New Validation Tool for Assessing and Improving 3D Object Segmentation
pp. 516
Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework
pp. 516
Feature Selection and Activity Recognition from Wearable Sensors
pp. 517
Scene Classification Via pLSA
pp. 517
Rehabilitation Training for Leg Based on EEG-EMG Fusion
pp. 520
4D Shape Registration for Dynamic Electrophysiological Cardiac Mapping
pp. 520
Bayesian Inference of Latent Causes in Gene Regulatory Dynamics
pp. 521
Information Behavior and Filipino Values: An Exploratory Study
pp. 521
MOCHA: Modularity in model checking
pp. 523
Risk-Based Models of Attacker Behavior in Cybersecurity
pp. 523
Dynamic Field Mapping and Motion Correction Using Interleaved Double Spin-Echo Diffusion MRI
pp. 525
Policy Model for National and Academic Digital Collections
pp. 528
ReliefF-ML: An Extension of ReliefF Algorithm to Multi-label Learning
pp. 531
Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks
pp. 533
Multi-scale Improves Boundary Detection in Natural Images
pp. 534
Queuing Algorithms Performance against Buffer Size and Attack Intensities in DDOS Attacks
pp. 535
Enhancing Effectiveness of Outlier Detections for Low Density Patterns
pp. 540
Learn to Track: Deep Learning for Tractography
pp. 544
Cosmology Inspired Design of Biomimetic Tissue Engineering Templates with Gaussian Random Fields
pp. 544
Work that Enables Care: Understanding Tasks, Automation, and the National Health Service
pp. 544
An Integrated Programming Environment for Teaching the Object-Oriented Programming Paradigm
pp. 545
Rank, Trace-Norm and Max-Norm
pp. 547
Proactive Process Adaptation Using Deep Learning Ensembles
pp. 548
Blind Decomposition of Spectral Imaging Microscopy: A Study on Artificial and Real Test Data
pp. 549
A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems
pp. 550
A Conceptual Model for Multidimensional Analysis of Documents
pp. 551
Almost 2-SAT Is Fixed-Parameter Tractable (Extended Abstract)
pp. 552
PET: An Interactive Software Testing Tool
pp. 553
Eye Movements and Pupil Size Reveal Deception in Computer Administered Questionnaires
pp. 554
Image Registration Guided by Particle Filter
pp. 557
A New Method for the Registration of Cardiac PET and MR Images Using Deformable Model Based Segmentation of the Main Thorax Structures
pp. 562
New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction
pp. 566
An Assistive Vision System for the Blind That Helps Find Lost Things
pp. 569
Accurate Prediction of Financial Distress of Companies with Machine Learning Algorithms
pp. 570
A Review of Upper and Lower Limb Rehabilitation Training Robot
pp. 572
7T-Guided Learning Framework for Improving the Segmentation of 3T MR Images
pp. 573
Defining and Detecting Emergence in Complex Networks
pp. 575
Category Independent Object Proposals
pp. 576
Securing the Future — An Information Flow Analysis of a Distributed OO Language
pp. 577
Tracklet Descriptors for Action Modeling and Video Analysis
pp. 577
Ranking Outliers Using Symmetric Neighborhood Relationship
pp. 582
Improving the Robustness in Extracting 3D Point Landmarks from 3D Medical Images Using Parametric Deformable Models
pp. 583
A Temporal Object-Oriented Data Warehouse Model
pp. 583
Kernel principal component analysis
pp. 587
Improving the Presentation of Argument Interpretations Based on User Trials
pp. 588
Specifying Web Service Compositions on the Basis of Natural Language Requests
pp. 589
Region Covariance: A Fast Descriptor for Detection and Classification
pp. 591
Color-Based Object Tracking in Multi-camera Environments
pp. 591
Joint Factorizational Topic Models for Cross-City Recommendation
pp. 592
Performative Metadata: Reliability Frameworks and Accounting Frameworks in Content Aggregation Data Models
pp. 596
Guiding Learners in Learning Management Systems through Recommendations
pp. 598
Massive Quasi-Clique Detection
pp. 602
A Sparse Bayesian Learning Algorithm for White Matter Parameter Estimation from Compressed Multi-shell Diffusion MRI
pp. 602
Robust Vessel Tree Modeling
pp. 604
Configurations with Few Crossings in Topological Graphs
pp. 605
Intention-Based Human Robot Collaboration
pp. 609
Automatic Table Detection in Document Images
pp. 610
Voice Code Verification Algorithm Using Competing Models for User Entrance Authentication
pp. 616
Revisiting Ackermann-Hardness for Lossy Counter Machines and Reset Petri Nets
pp. 617
The Fast Bilateral Solver
pp. 617
Relational Differential Prediction
pp. 618
Introduction to: The Myths of Object-Orientation
pp. 620
q-Space Upsampling Using x-q Space Regularization
pp. 620
Registering Histological and MR Images of Prostate for Image-Based Cancer Detection
pp. 620
Revisiting the Sequence Constraint
pp. 624
Regularization and Semi-supervised Learning on Large Graphs
pp. 625
Block Matrix Multiplication in a Distributed Computing Environment: Experiments with NetSolve
pp. 625
On Supervised Human Activity Analysis for Structured Environments
pp. 626
An Evolutionary Algorithm for Adaptive Online Services in Dynamic Environment
pp. 635
Kernel Bounds for Disjoint Cycles and Disjoint Paths
pp. 637
Analytic Expressions for Fiducial and Surface Target Registration Error
pp. 639
Source Code Rejuvenation Is Not Refactoring
pp. 640
Type-Constrained Representation Learning in Knowledge Graphs
pp. 640
Subtype Cell Detection with an Accelerated Deep Convolution Neural Network
pp. 642
On the Road to an Abstract Architecture for Open Virtual Organizations
pp. 644
Automatic Nipple Detection Using Shape and Statistical Skin Color Information
pp. 647
Integration of Libnormaliz in CoCoALib and CoCoA 5
pp. 648
Supporting Concurrency in Private Data Outsourcing
pp. 648
Zoom Better to See Clearer: Human and Object Parsing with Hierarchical Auto-Zoom Net
pp. 649
Imaging Biomarker Discovery for Lung Cancer Survival Prediction
pp. 652
Active Learning for Dialogue Act Labelling
pp. 653
On the Use of Implicit Shape Models for Recognition of Object Categories in 3D Data
pp. 656
Generating Applications from Object Role Models
pp. 658
A Grid Service Based on Suffix Trees for Pattern Extraction from Mass Spectrometry Proteomics Data
pp. 660
PARAM: A Model Checker for Parametric Markov Models
pp. 667
Malware Behavior Modeling with Colored Petri Nets
pp. 667
Cache-Timing Template Attacks
pp. 667
Automatic Quantification of Fluorescence from Clustered Targets in Microscope Images
pp. 672
Denoising Moving Heart Wall Fibers Using Cartan Frames
pp. 674
Product Theorems Via Semidefinite Programming
pp. 675
Speeding Up Logistic Model Tree Induction
pp. 678
Physics-Based Elastic Image Registration Using Splines and Including Landmark Localization Uncertainties
pp. 681
TBS: Tensor-Based Supervoxels for Unfolding the Heart
pp. 681
Embedding Memoization to the Semantic Tree Search for Deciding QBFs
pp. 682
HiDDeN: Hiding Data With Deep Networks
pp. 685
A Hierarchical Convolutional Neural Network for Mitosis Detection in Phase-Contrast Microscopy Images
pp. 687
Video Retrieval Based on Words-of-Interest Selection
pp. 690
VC-Dimension and Shortest Path Algorithms
pp. 692
A Relaxed K-SVD Algorithm for Spontaneous Micro-Expression Recognition
pp. 695
Interactive Simulation of Embolization Coils: Modeling and Experimental Validation
pp. 696
Kernel Codebooks for Scene Categorization
pp. 697
Using Google Analytics to Evaluate the Usability of E-Commerce Sites
pp. 698
Approximative Methods for Monotone Systems of Min-Max-Polynomial Equations
pp. 699
Managing Process Model Collections with AProMoRe
pp. 700
Current Events: Identifying Webpages by Tapping the Electrical Outlet
pp. 706
Set Bounds and (Split) Set Domain Propagation Using ROBDDs
pp. 706
Gait Analysis for Human Identification
pp. 713
Developing Library Services for International Students in China’s Universities: What Does the Literature Tell Us?
pp. 717
Fast Guided Global Interpolation for Depth and Motion
pp. 718
User Friendly Decision Support Techniques in a Case-Based Reasoning System
pp. 720
Automatic Quality Control of Cardiac MRI Segmentation in Large-Scale Population Imaging
pp. 721
Motion Analysis of Wave Glider Based on Multibody Dynamic Theory
pp. 721
Access Control Model for AWS Internet of Things
pp. 722
Finding Knees in Multi-objective Optimization
pp. 726
Intensity Gradient Based Registration and Fusion of Multi-modal Images
pp. 728
Towards Image-Guided Pancreas and Biliary Endoscopy: Automatic Multi-organ Segmentation on Abdominal CT with Dense Dilated Networks
pp. 734
Gait Shape Estimation for Identification
pp. 735
A Generative Approach for Image-Based Modeling of Tumor Growth
pp. 735
Distributed Formation Control of Autonomous Underwater Vehicles Based on Flocking and Consensus Algorithms
pp. 740
Kinematic Nonlinear Control of Aerial Mobile Manipulators
pp. 741
The Complexity of Counting Functions with Easy Decision Version
pp. 742
Natural Landmark Based Navigation
pp. 745
D-Width: A More Natural Measure for Directed Tree Width
pp. 747
Improving Surgical Training Phantoms by Hyperrealism: Deep Unpaired Image-to-Image Translation from Real Surgeries
pp. 748
Explicit Non-adaptive Combinatorial Group Testing Schemes
pp. 748
Alphabet-Independent Compressed Text Indexing
pp. 750
Multi-view Inverse Rendering Under Arbitrary Illumination and Albedo
pp. 751
Towards QoS-Awareness of Context-Aware Mobile Applications and Services
pp. 765
Control of a Magnet-Driven Nano Positioning Stage with Long Stroke Based on Disturbance Observer
pp. 769
Multimeme Algorithms for Protein Structure Prediction
pp. 770
Shape Preserving Filament Enhancement Filtering
pp. 771
Groupwise Non-rigid Registration Using Polyharmonic Clamped-Plate Splines
pp. 773
Development of a $$\upmu $$ CT-based Patient-Specific Model of the Electrically Stimulated Cochlea
pp. 773
Impossibility of a Quantum Speed-Up with a Faulty Oracle
pp. 774
Replicated Ambient Petri Nets
pp. 778
Pattern Repulsion Revisited
pp. 786
FCNN: Fourier Convolutional Neural Networks
pp. 792
A Convex Formulation of Continuous Multi-label Problems
pp. 803
Evaluation of Evolutionary Algorithms for Multi-objective Train Schedule Optimization
pp. 805
Combining Face and Iris Biometrics for Identity Verification
pp. 806
A Multilingual SVM-Based Question Classification System
pp. 809
Where Should Saliency Models Look Next?
pp. 811
Clustering Gene Expression Profiles with Memetic Algorithms
pp. 819
Tri-Dexel Model Based Geometric Simulation of Multi-axis Additive Manufacturing
pp. 822
Multi-scale Patch Based Collaborative Representation for Face Recognition with Margin Distribution Optimization
pp. 823
Active Surface Approach for Extraction of the Human Cerebral Cortex from MRI
pp. 835
Deep Virtual Stereo Odometry: Leveraging Deep Depth Prediction for Monocular Direct Sparse Odometry
pp. 854
Size Independent Active Contour Model for Blood Vessel Lumen Quantification in High-Resolution Magnetic Resonance Images
pp. 861
Solving Rotated Multi-objective Optimization Problems Using Differential Evolution
pp. 869
Feature-Based Diversity Optimization for Problem Instance Classification
pp. 873
Sub-structural Niching in Non-stationary Environments
pp. 875
Scalable Metric Learning via Weighted Approximate Rank Component Analysis
pp. 904
Segmentation of Neck Lymph Nodes in CT Datasets with Stable 3D Mass-Spring Models
pp. 910
A Negotiation Agent
pp. 925
Using UN/CEFACT’S Modelling Methodology (UMM) in e-Health Projects
pp. 937
MaSiMe: A Customized Similarity Measure and Its Application for Tag Cloud Refactoring
pp. 940
Calibration Method for Determining the Physical Location of the Ultrasound Image Plane
pp. 948
Detecting Inconsistencies in the Gene Ontology Using Ontology Databases with Not-gadgets
pp. 948
Non-linear Local Registration of Functional Data
pp. 948
Flexible Camera Setup for Visual Based Registration on 2D Interaction Surface with Undefined Geometry Using Neural Network
pp. 961
Random neural network recognition of shaped objects in strong clutter
pp. 961
Image Processing of Finite Size Rat Retinal Ganglion Cells Using Multifractal and Local Connected Fractal Analysis
pp. 991
A Bayesian Metric for Evaluating Machine Learning Algorithms
pp. 1017
A Toolbox for Learning from Relational Data with Propositional and Multi-instance Learners
pp. 1022
Phase-Based User-Steered Image Segmentation
pp. 1030
A Synergy of Modelling for Constraint Problems
pp. 1040
Robust Segmentation of Medical Images Using Geometric Deformable Models and a Dynamic Speed Function
pp. 1055
Discovering Interesting Association Rules by Clustering
pp. 1075
Image Guided Radiotherapy of the Prostate
pp. 1088
Analysis of the (1 + 1) EA for a Noisy OneMax
pp. 1114
Optimization in Prostate Cancer Detection
pp. 1115
The correlation ratio as a new similarity measure for multimodal image registration
pp. 1137
An Architecture for Simulating Needle-Based Surgical Procedures
pp. 1147
Intra-operative Transfer of Planned Zygomatic Fixtures by Personalized Templates: A Cadaver Validation Study
pp. 1157
A Multimodal Navigation System for Interventional MRI
pp. 1166
Repeatability and Accuracy of Ankle Centre Location Estimates Using a Biaxial Joint Model
pp. 1174
Automatic Detection of Large Misregistrations of Multimodality Medical Images
pp. 1194
A Comparative Analysis of Fuzzy System Modelling Approaches: A Case in Mining Medical Diagnostic Rules
pp. 1201
Anisotropic Volume Rendering Using Intensity Interpolation
pp. 1215
A Method for µCT Based Assessment of Root Canal Instrumentation in Endodontics Research
pp. 1219
Immune Clonal Selection Algorithm for Multiuser Detection in DS-CDMA Systems
pp. 1235
Spherical Navigator Echoes for Full 3-D Rigid Body Motion Measurement in MRI
pp. 1237
Phase Unwrapping for Magnetic Resonance Thermometry
pp. 1250
Development of a New Image-Guided Prostate Biopsy System
pp. 1253
The Semipublic Encryption for Visual Cryptography Using Q’tron Neural Networks
pp. 1262
The T-Detectors Maturation Algorithm Based on Genetic Algorithm
pp. 1263
Real-Time Simulation of Minimally-Invasive Surgery with Cutting Based on Boundary Element Methods
pp. 1273
The Continuous Tabu Search as an Optimizer for 2D-to-3D Biomedical Image Registration
pp. 1279
Two-Step Registration of Subacute to Hyperacute Stroke MRIs
pp. 1281
The Effect of Organ Motion and Image Artifacts on Monomodal Volume Registration
pp. 1283
A Maximum Likelihood Approach for 2-D to 3-D Registration
pp. 1293
The Importance of Partial Voluming in Multi-dimensional Medical Image Segmentation
pp. 1295
Learning a Procedure That Can Solve Hard Bin-Packing Problems: A New GA-Based Approach to Hyper-heuristics
pp. 1316
Advances in Active Constraints and Their Application to Minimally Invasive Surgery
pp. 1343
Bag-of-Particles Model for Simulating Tissue, Organs, and Flow
pp. 1356
Mutual Scale
pp. 1379
Implicit Snakes: Active Constrained Implicit Models
pp. 1391
Classification of Breast Tumors on Digital Mammograms Using Laws’ Texture Features
pp. 1401
Interactive Visualisation of MRI Vector and Tensor Fields
pp. 1430
A Modular Robotic System for Ultrasound Image Acquisition
pp. 1435
Optimal Port Placement in Robot-Assisted Coronary Artery Bypass Grafting
Similar content
2,286
Yarrow-160: Notes on the design and analysis of the yarrow cryptographic pseudorandom number generator
Authors:
J. KELSEY
,
B. SCHNEIER
A practical hybrid quantum-safe cryptographic scheme between data centers
Authors:
Universally composable security: A new paradigm for cryptographic protocols
Authors:
R. Canetti
See all similar
Cited by
80
Physically Observable Cryptography
Authors:
Silvio Micali
,
Leonid Reyzin
Public-Key Cryptosystems Resilient to Key Leakage
Authors:
Moni Naor
,
Gil Segev
Introduction to differential power analysis
Authors:
Paul Köcher
,
Joshua Jaffe
,
Benjamin Jun
…
See all cited by