Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
88
views
0
references
Top references
cited by
129
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
761
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Security Protocols : 7th International Workshop, Cambridge, UK, April 19-21, 1999. Proceedings
Towards a Better Understanding of Context and Context-Awareness
other
Author(s):
Gregory D. Abowd
,
Anind K. Dey
,
Peter J. Brown
,
Nigel Davies
,
Mark Smith
,
Pete Steggles
Publication date
(Online):
November 9 2001
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Annual Reviews Breast Cancer Awareness
Author and book information
Book Chapter
Publication date (Print):
1999
Publication date (Online):
November 9 2001
Pages
: 304-307
DOI:
10.1007/3-540-48157-5_29
SO-VID:
cba1a833-210f-436c-8995-5a5b6c073821
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Early fault detection tools
pp. 1
Algebraic Specification and Program Development by Stepwise Refinement
pp. 1
DRFE: Dynamic Recursive Feature Elimination for Gene Identification Based on Random Forest
pp. 1
Introduction
pp. 1
The Web Operating System — WOS
pp. 1
Industry Standards for the Analytics Era: TPC Roadmap
pp. 1
Functional Link Artificial Neural Network for Multi-label Classification
pp. 1
Introduction
pp. 1
Bandwidth Management in Community Networks
pp. 1
Intervall — Mathematik Zum Karlsruher Symposium 1975
pp. 1
Three Syntactic Theories for Combinatory Graph Reduction
pp. 1
The Semantic Web: A Network of Understanding
pp. 1
Implicit coercions in type systems
pp. 1
Techniques for the Identification of Semantically-Equivalent Online Identities
pp. 1
E-Voting and the Need for Rigourous Software Engineering – The Past, Present and Future
pp. 1
SAT-Based Combinational and Sequential Dependency Computation
pp. 1
Rigorous System Design: The BIP Approach
pp. 1
Generalized default logic: minimal knowledge, autoepistemic and default reasoning reconciled
pp. 1
Distributed Process Discovery and Conformance Checking
pp. 1
The Immergence of Norms in Agent Worlds
pp. 1
Temporal Patterns in Artificial Reaction Networks
pp. 1
XP after Enron - Can It Survive?
pp. 1
Functional parsers
pp. 1
Biomodel Engineering – From Structure to Behavior
pp. 1
Using high-level petri nets in the field of intelligent networks
pp. 1
Proving Termination with (Boolean) Satisfaction
pp. 3
Image-Based Graph Visualization: Advances and Challenges
pp. 10
Perceived Complexity and Cognitive Stability in Human-Centered Design
pp. 12
Evaluation of an Automated Mechanism for Generating New Regulations
pp. 13
The Importance of Single-Source Engineering of Emergency and Process Shutdown Systems
pp. 13
Emerging Application Domains and the Computing Fabric
pp. 13
A 3D Simulator of Multiple Legged Robots Based on USARSim
pp. 14
Kleene algebra with tests and commutativity conditions
pp. 14
On Residuation
pp. 15
Identification of a 2-Additive Bi-Capacity by Using Mathematical Programming
pp. 16
A two-level approach towards lean proof-checking
pp. 16
Urban Computing and Smart Cities: Opportunities and Challenges in Modelling Large-Scale Aggregated Human Behavior
pp. 17
2 Model-Based Integration
pp. 17
Practical aspects of specialization of Algol-like programs
pp. 18
Asymptotic behavior of stochastic automata
pp. 19
Optimising Problem Formulation for Cylindrical Algebraic Decomposition
pp. 2
Keynote: Trustworthy Services and the Biological Analogy
pp. 2
Roles of Math Search in Mathematics
pp. 2
Using B Machines for Model-Based Testing of Smartcard Software
pp. 2
Neurodynamic Optimization and Its Applications in Robotics
pp. 2
Using Speculative Multithreading for General-Purpose Applications
pp. 21
Analysis of Air Traffic Track Data with the AutoBayes Synthesis System
pp. 22
Towards a JSON-Based Fast Policy Evaluation Framework
pp. 22
On the Power of the Randomized Iterate
pp. 22
A Data Sharing Agreement Framework
pp. 23
Clustered Planarity = Flat Clustered Planarity
pp. 23
Modeling Snapshot of Composite WS Execution by Colored Petri Nets
pp. 31
Mollified Zone Diagrams and Their Computation
pp. 4
Transformation from OWL Description to Resource Space Model
pp. 42
Effective numberings, completions, and control structures
pp. 6
Composing Security Properties
pp. 8
Strategies Emerging from Game Play: Experience from an Educational Game for Academic Career Design
pp. 9
Research Themes in the Case-Based Reasoning in Health Sciences Core Literature
pp. 16
Concept Sharing Through Interaction: The Effect of Information Visualization for Career Design
pp. 19
Semantic Views of Homogeneous Unstructured Data
pp. 19
A Novel Mapping Scheme for Steganalysis
pp. 20
Design, Implementation and Evaluations of a Direction Based Service System for Both Indoor and Outdoor
pp. 21
An Empirical Analysis of Under-Sampling Techniques to Balance a Protein Structural Class Dataset
pp. 22
A Multi-agent System for Incident Management Solutions on IT Infrastructures
pp. 23
Total Immersion: Designing for Affective Symbiosis in a Virtual Reality Game with Haptics, Biosensors, and Emotive Agents
pp. 23
Sparse Numerical Semigroups
pp. 23
Comparison of methods for detecting corner points from digital curves
pp. 25
A Design Science Framework for Designing and Assessing User Experience
pp. 25
Certainty-factor-like Structures in Bayesian Networks
pp. 29
A Tour of Recent Results on Word Transducers
pp. 29
The Complexity of Model Checking Concurrent Programs Against CTLK Specifications
pp. 3
Keynote: Distributed Algorithms and VLSI
pp. 3
The Design of Spacecraft On-Board Software
pp. 30
How to Put through Your Agenda in Collective Binary Decisions
pp. 30
Constraint Logic Programming Applied to Model Checking
pp. 30
Information Retention in Heterogeneous Majority Dynamics
pp. 33
Synchronization analyses for multiple recursion parameters
pp. 35
User interface management system embedded in a multimedia document editor framework
pp. 35
UBS-Graph rewriting systems — matching subgraphs in constant time
pp. 36
The greatest common divisor: A case study for program extraction from classical proofs
pp. 37
To be or not to be an “agent”
pp. 37
Password Exhaustion: Predicting the End of Password Usefulness
pp. 37
The Rationality of Round Interpretation
pp. 42
Blind Source Separation from Single Measurements Using Singular Spectrum Analysis
pp. 45
A Game Theoretic Approach for Resource Usage
pp. 77
A Language for Biochemical Systems: Design and Formal Specification
pp. 81
An outline of the SMoLCS approach
pp. 92
Dynamic Aspect-Oriented Programming in Java: The HotWave Experience
pp. 21
Jikzi: A New Framework for Secure Publishing
pp. 25
A Dynamic Field Architecture for the Generation of Hierarchically Organized Sequences
pp. 32
Market Self-organization under Limited Information
pp. 33
A Goal-Oriented Approach for Modelling Self-organising MAS
pp. 34
Innovative Information and Knowledge Infrastructures – How Do I Find What I Need?
pp. 35
A Betweenness Centrality Guided Clustering Algorithm and Its Applications to Cancer Diagnosis
pp. 37
Approximation Algorithms for Multiple Strip Packing
pp. 37
A Machine-Learning Framework for Hybrid Machine Translation
pp. 38
SOHAC: Efficient Storage of Tick Data That Supports Search and Analysis
pp. 39
Mutation in Genetic Programming: A Preliminary Study
pp. 4
A Distributed and Deterministic TDMA Algorithm for Write-All-With-Collision Model
pp. 4
Linear Discriminant Classifier (LDC) for Streaming Data with Concept Drift
pp. 43
A Declarative Compositional Timing Analysis for Multicores Using the Latency-Rate Abstraction
pp. 51
NP-Completeness of Grammars Based Upon Products of Free Pregroups
pp. 51
Certification of Bounds of Non-linear Functions: The Templates Method
pp. 56
Network Monitoring for Security and Forensics
pp. 56
LiQuate-Estimating the Quality of Links in the Linking Open Data Cloud
pp. 59
The SynchAADL2Maude Tool
pp. 69
A Synchronous-Based Code Generator for Explicit Hybrid Systems Languages
pp. 77
4 Semantics of UML Models for Dynamic Behavior
pp. 79
Characterizations of acceptability
pp. 97
Functional programming with overloading and higher-order polymorphism
pp. 107
5 Modeling and Simulation of TDL Applications
pp. 131
Parameter region for the proper operation of the IEEE 802.2 LLC type 3 protocol: A petri net approach
pp. 141
5. Representing Knowledge for Adaptation
pp. 144
CCS is an (augmented) contact free C/E system
pp. 19
Chorus Angelorum
pp. 33
Stochastic Techniques in Influence Diagrams for Learning Bayesian Network Structure
pp. 33
An OMDoc Primer
pp. 34
Modelling the Population Dynamics and the File Availability in a BitTorrent-Like P2P System with Decreasing Peer Arrival Rate
pp. 37
Auctions with Arbitrary Deals
pp. 37
Jikzi: A New Framework for Secure Publishing
pp. 38
XMask: An Enabled XML Management System
pp. 40
A Novelty Detection Approach for Foreground Region Detection in Videos with Quasi-stationary Backgrounds
pp. 42
Embodied Virtual Agents: An Affective and Attitudinal Approach of the Effects on Man-Machine Stickiness in a Product/Service Discovery
pp. 42
Semantically Inspired Electronic Healthcare Records
pp. 43
Quicksort and Large Deviations
pp. 44
Calibration Based Reliable Detector for Detecting LSB Matching Steganography
pp. 45
Planning with Regression Analysis in Transaction Logic
pp. 48
The Environment as an Argument
pp. 49
Position Tracking Using Infra-Red Signals for Museum Guiding System
pp. 49
Engineering Agent Organisations in a Business Environment
pp. 5
Detecting Underlying Stance Adopted When Human Construe Behavior of Entities
pp. 52
Electricity Consumption Time Series Profiling: A Data Mining Application in Energy Industry
pp. 57
Possible Winners in Approval Voting
pp. 57
Information Security in a Quantum World
pp. 66
Verifying a Plaftorm for Digital Imaging: A Multi-tool Strategy
pp. 67
Turning Cliques into Paths to Achieve Planarity
pp. 71
Reactive Synthesis for Robotic Swarms
pp. 73
Practical Guidelines for Developing Case-Based Reasoning Applications
pp. 73
Characterizing the Principle of Minimum Cross-Entropy
pp. 79
Specification and Efficient Monitoring Beyond STL
pp. 80
LUCAS microprogramming language
pp. 83
Round5: Compact and Fast Post-quantum Public-Key Encryption
pp. 83
Web Service Composition Based on Petri Nets: Review and Contribution
pp. 87
Prediction theory for stochastic automata
pp. 100
Multi-agent matchmaking
pp. 13
Motion and Emotional Behavior Design for Pet Robot Dog
pp. 161
Robot Manipulators
pp. 179
Conclusion
pp. 183
Constructing medium sized efficient functional programs in Clean
pp. 21
RDIM: A Self-adaptive and Balanced Distribution for Replicated Data in Scalable Storage Clusters
pp. 37
Service Oriented Architecture Pitfalls
pp. 41
The Mix-Matrix Method in the Problem of Binary Quadratic Optimization
pp. 48
Using Regular Grammars for Event-Based Testing
pp. 54
LSB Replacement Steganography Software Detection Based on Model Checking
pp. 55
Coarse-Grained Parallelization of Distance-Bound Smoothing for the Molecular Conformation Problem
pp. 61
An Iterative Approach for Searching an Equilibrium in Piecewise Linear Exchange Model
pp. 61
Developing of a Multimodal Interactive Training System in Therapeutic Calisthenics for Elderly People
pp. 62
Longest Wait First for Broadcast Scheduling [Extended Abstract]
pp. 65
Peer-to-Peer Overlay Network Based on Swarm Intelligence
pp. 67
A Modelling Framework for Cyber-Physical System Resilience
pp. 70
Improving Memory Latency Aware Fetch Policies for SMT Processors
pp. 71
Computational Aspects of Manipulation and Control in Judgment Aggregation
pp. 74
Graph Patterns, Reinforcement Learning and Models of Reputation for Improving Coalition Formation in Collaborative Multi-agent Systems
pp. 74
Coordination Mechanisms, Cost-Sharing, and Approximation Algorithms for Scheduling
pp. 76
An application of constructive completeness
pp. 82
A Universal Machine for Biform Theory Graphs
pp. 84
MikiBeta : A General GUI Library for Visualizing Proof Trees
pp. 86
Optimistic Anonymous Participation in Inter-organizational Workflow Instances
pp. 91
Perfect Timed Communication Is Hard
pp. 95
Compiler generation for interactive graphics using intermediate code
pp. 97
Semantic Caching in Location-Dependent Query Processing
pp. 98
VyPR2: A Framework for Runtime Verification of Python Web Services
pp. 108
On Persistency in Time Petri Nets
pp. 111
Analogical replay
pp. 115
Constraint-Based Monitoring of Hyperproperties
pp. 123
Single Base Modular Multiplication for Efficient Hardware RNS Implementations of ECC
pp. 149
Conventional definitions of fail-stop signature schemes and general reductions
pp. 169
CBR Applied to Planning
pp. 173
Rainfall Distribution Based on a Delaunay Triangulation Method
pp. 49
Justifications for the Event-B Modelling Notation
pp. 52
Realtime TRUS/MRI Fusion Targeted-Biopsy for Prostate Cancer: A Clinical Demonstration of Increased Positive Biopsy Rates
pp. 57
Advantage of Quantum Strategies in Random Symmetric XOR Games
pp. 60
Tracking of Individuals in Very Long Video Sequences
pp. 65
Semantic Wiki as a Lightweight Knowledge Management System
pp. 68
Agent Architectures for Compliance
pp. 69
Convex Hulls on Cellular Automata
pp. 75
The Routing Open Shop Problem: New Approximation Algorithms
pp. 77
Bus Bunching Detection by Mining Sequences of Headway Deviations
pp. 81
On the branching structure of languages
pp. 83
Recharging Probably Keeps Batteries Alive
pp. 89
When Agents Communicate Hypotheses in Critical Situations
pp. 93
Presence Interaction Management in SIP SOHO Architecture
pp. 99
Compositional CLP-Based Test Data Generation for Imperative Languages
pp. 105
A Fibred Tableau Calculus for Modal Logics of Agents
pp. 106
Visualizing the Template of a Chaotic Attractor
pp. 109
A Declarative-Friendly API for Web Document Manipulation
pp. 109
Linked Data and Ontology Reference Model for Infectious Disease Reporting Systems
pp. 117
Improving Priority Promotion for Parity Games
pp. 118
Specialising Finite Domain Programs Using Polyhedra
pp. 133
Learning to Trust
pp. 137
Deciding between Conflicting Influences
pp. 137
A roadmap to metacomputation by supercompilation
pp. 151
Exact and Approximated Data-Reuse Optimizations for Tiling with Parametric Sizes
pp. 171
Automated production of readable proofs for theorems in non-Euclidean geometries
pp. 49
Randomness and Determination, from Physics and Computing towards Biology
pp. 63
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
pp. 64
Automatic Translation from Combined B and CSP Specification to Java Programs
pp. 66
Wavelet Spectral Entropy for Indication of Epileptic Seizure in Extracranial EEG
pp. 69
The Effect of Animation Location and Timing on Visual Search Performance and Memory
pp. 72
Universal Witnesses for State Complexity of Basic Operations Combined with Reversal
pp. 73
Language Identification Based on the Variations in Intonation Using Multi-classifier Systems
pp. 74
Relating May and Must Testing Semantics for Discrete Timed Process Algebras
pp. 76
A Mathematical Model of the Competition between Acquired Immunity and Virus
pp. 79
Scenarios for Companions
pp. 83
Optimal Data Embedding in 3D Models for Extraction from 2D Views Using Perspective Invariants
pp. 84
Incorporating BDI Agents into Human-Agent Decision Making Research
pp. 84
Timed Automata Approach to Verification of Systems with Degradation
pp. 85
Avoiding Moving Persons by Using Simple Trajectory Prediction and Spatio Temporal Planning
pp. 89
Protocol Engineering for Multi-agent Interaction
pp. 90
An Improved Decision Procedure for Propositional Projection Temporal Logic
pp. 92
Detecting Abnormal Patterns in Call Graphs Based on the Aggregation of Relevant Vertex Measures
pp. 98
A Logical Investigation of Heterogeneous Reasoning with Graphs in Elementary Economics
pp. 104
Sobolev Space Preconditioning for Mixed Nonlinear Elliptic Boundary Value Problems
pp. 106
A Semantic Model for Service Composition with Coordination Time Delays
pp. 108
Optimizing Inequality Joins in Datalog with Approximated Constraint Propagation
pp. 111
Instead of a conclusion
pp. 116
An Evolutionary Algorithm for the Biobjective Capacitated m-Ring Star Problem
pp. 136
Roles of Program Extension
pp. 145
Weighted Branching Systems: Behavioural Equivalence, Behavioural Distance, and Their Logical Characterisations
pp. 145
Learning Mutual Trust
pp. 154
On the product form solution for Stochastic Petri Nets
pp. 171
Optgen: A Generator for Local Optimizations
pp. 232
COSTPN for Modeling and control of telecommunication systems
pp. 241
LUCAS as a dedicated processor for image processing
pp. 289
Constructions for one message block
pp. 59
A Development Graph for Elementary Algebra
pp. 65
Spectral Signal Unmixing with Interior-Point Nonnegative Matrix Factorization
pp. 74
A Resource Classification System for the WOS
pp. 80
Three-Level Object-Oriented Database Architecture Based on Virtual Updateable Views
pp. 82
Augmenting Social Interactions: Experiments in Socio-emotional Computing
pp. 82
Blowing Light: Green-Based Interaction Design
pp. 82
Neurobiologically-Inspired Soft Switching Control of Autonomous Vehicles
pp. 90
The Case for Virtualized Wireless Access Networks
pp. 98
Consideration of the Watermark Inversion Attack and Its Invalidation Framework
pp. 98
Finding Dense Subgraphs in G(n,1/2)
pp. 113
A Procedure for an Event-Condition-Transaction Language
pp. 113
Representation in Case-Based Reasoning Applied to Control Reconfiguration
pp. 115
Recent results on L systems
pp. 122
Compensable WorkFlow Nets
pp. 123
Symbolic Execution of Concurrent Objects in CLP
pp. 123
Human Reasoning with Proportional Quantifiers and Its Support by Diagrams
pp. 127
Field Array Compression in Data Caches for Dynamically Allocated Recursive Data Structures
pp. 130
Verified Resource Guarantees for Heap Manipulating Programs
pp. 132
Formally Analyzing Continuous Aspects of Cyber-Physical Systems Modeled by Homogeneous Linear Differential Equations
pp. 137
Compact Drawings of 1-Planar Graphs with Right-Angle Crossings and Few Bends
pp. 138
Annotation Algorithms for Unrestricted Independent And-Parallelism in Logic Programs
pp. 145
Socially Enabled Preference Learning from Implicit Feedback Data
pp. 159
Distributed Trust in Open Multi-agent Systems
pp. 160
A real-life experiment in creating an agent marketplace
pp. 162
Modeling Dynamical Phenomena in the Era of Big Data
pp. 162
Trace Relations and Logical Preservation for Markov Automata
pp. 169
Conclusion
pp. 169
Contradictions at the Borders
pp. 173
Obtaining deadlock-preserving skeletons for coloured nets
pp. 193
Towards a Scalable Framework for Context-Free Language Reachability
pp. 195
On Herbrand's theorem
pp. 208
Flat central configurations of four planet motions
pp. 55
Stochastic Text Models for Music Categorization
pp. 73
Hybrid Optimized Polynomial Neural Networks with Polynomial Neurons and Fuzzy Polynomial Neurons
pp. 82
Automatic Detection of Critical Epochs in coma-EEG Using Independent Component Analysis and Higher Order Statistics
pp. 90
Light Ray Concentration Reduces the Complexity of the Wavelength-Based Machine on PSPACE Languages
pp. 94
A Self-stabilizing $\frac{2}{3}$ -Approximation Algorithm for the Maximum Matching Problem
pp. 94
Using Model Trees and Their Ensembles for Imbalanced Data
pp. 95
Tracking Uncertainty in a Spatially Explicit Susceptible-Infected Epidemic Model
pp. 102
Real-Time Detection of Out-of-Plane Objects in Stereo Vision
pp. 106
Finding Important Vocabulary Within Ontology
pp. 109
Towards Nominal Context-Free Model-Checking
pp. 109
Self-Stabilizing Leader Election in Optimal Space
pp. 114
Prefix-Free Regular Languages: Closure Properties, Difference, and Left Quotient
pp. 119
Small Talk Is More than Chit-Chat
pp. 121
The Influence of Input and Output Measurement Noise on Batch-End Quality Prediction with Partial Least Squares
pp. 125
On-Line State Estimation of Maneuvering Objects by Sequential Monte Carlo Algorithm
pp. 138
Automatically Testing Web Services Choreography with Assertions
pp. 139
Extensions of Euler Diagrams in Peirce’s Four Manuscripts on Logical Graphs
pp. 141
Verwendung von Tschebyschew-Approximation und Ökonomisierungsverfahren bei der Vergröberung von Intervallpolynomen
pp. 143
Exploiting Preference Queries for Searching Learning Resources
pp. 161
A Particle Swarm-Based Approach for Semantic Similarity Computation
pp. 165
10. Developing Experience Factory Applications
pp. 166
Hash Functions: From Merkle-Damgård to Shoup
pp. 168
Determining Points on Handwritten Mathematical Symbols
pp. 193
P-superfairness in nets
pp. 197
Evaluation of Buffer Queries in Spatial Databases
pp. 208
Partial algebras, subsorting, and dependent types
pp. 297
11 The EAST-ADL Architecture Description Language for Automotive Embedded Software
pp. 73
Towards Humanlike Social Touch for Prosthetics and Sociable Robotics: Handshake Experiments and Finger Phalange Indentations
pp. 79
Framed Versus Unframed Two-Dimensional Languages
pp. 92
Sparse Bump Sonification: A New Tool for Multichannel EEG Diagnosis of Mental Disorders; Application to the Detection of the Early Stage of Alzheimer’s Disease
pp. 98
How Developers Anticipate User Behavior in the Design of Assistance Systems
pp. 112
Stereo Imaging with Uncalibrated Camera
pp. 112
Brain Memory Inspired Template Updating Modeling for Robust Moving Object Tracking Using Particle Filter
pp. 113
Secure Information Transmission Based on Physical Principles
pp. 114
On the Effectiveness of Distributed Learning on Different Class-Probability Distributions of Data
pp. 121
Integrating Geometric and Biomechanical Models of a Liver Tumour for Cryosurgery Simulation
pp. 123
Noise Injection Heuristics for Concurrency Testing
pp. 124
Tiara: A Self-stabilizing Deterministic Skip List
pp. 128
On the Additive Constant of the k-Server Work Function Algorithm
pp. 131
Clustering Based on Density Estimation with Sparse Grids
pp. 149
Automatic Generation of Affine IFS and Strongly Typed Genetic Programming
pp. 153
Palovca: Describing and Executing Graph Algorithms in Haskell
pp. 157
Hint, Instruction, and Practice: The Necessary Components for Promoting Spontaneous Diagram Use in Students’ Written Work?
pp. 165
A natural deduction approach to dynamic logic
pp. 177
Specification and Realization of Access Control in SPKI/SDSI
pp. 196
Making Mercury Programs Tail Recursive
pp. 229
Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA
pp. 233
Verifying Fast and Sparse SSA-Based Optimizations in Coq
pp. 235
Operational semantics of behavioural canons based on narrowing
pp. 253
Defense in Depth Formulation and Usage in Dynamic Access Control
pp. 257
Unfolding Groups, II
pp. 309
12 Fujaba4Eclipse Real-Time Tool Suite
pp. 41
Allowing Citizens to Self-compose Personalized Services: A Cloud Computing Model
pp. 80
Towards Humanlike Social Touch for Prosthetics and Sociable Robotics: Three-Dimensional Finite Element Simulations of Synthetic Finger Phalanges
pp. 89
Modeling of Spiking Analog Neural Circuits with Hebbian Learning, Using Amorphous Semiconductor Thin Film Transistors with Silicon Oxide Nitride Semiconductor Split Gates
pp. 93
Approximating Tree Edit Distance through String Edit Distance for Binary Tree Codes
pp. 114
Key Requirements for Integrating Usability Engineering and Software Engineering
pp. 117
A Non-abelian Group Based on Block Upper Triangular Matrices with Cryptographic Applications
pp. 122
Global Hand Pose Estimation by Multiple Camera Ellipse Tracking
pp. 124
The Open-End Argument for Private Computing
pp. 135
A (4 + ε)-Approximation for the Minimum-Weight Dominating Set Problem in Unit Disk Graphs
pp. 140
Time Constraint Patterns for Event B Development
pp. 143
Towards Interactional Symbiosis: Epistemic Balance and Co-presence in a Quantified Self Experiment
pp. 145
A Particle Swarm Optimization Metaheuristic for the Blocking Flow Shop Scheduling Problem: Total Tardiness Minimization
pp. 148
Self-tuned Refresh Rate in a Swarm Intelligence Path Management System
pp. 151
Improving Classifier Performance by Knowledge-Driven Data Preparation
pp. 152
Stochastic Modelling of Scientific Terms Distribution in Publications
pp. 152
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems
pp. 160
Einsatz der Intervallarithmetik bei der Numerischen Konvergenz von ALGOL-60 Programmen
pp. 167
Voting on Actions with Uncertain Outcomes
pp. 177
Sequential Deliberation for Social Choice
pp. 191
A Collaborative Framework to Realize Virtual Enterprises Using 3APL
pp. 200
A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory
pp. 211
Basic concepts of a fuzzy logic data browser with applications
pp. 214
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
pp. 215
A C++ binding for Penguin: a system for data sharing among heterogeneous object models
pp. 227
Tighter Security Proofs for Generic Key Encapsulation Mechanism in the Quantum Random Oracle Model
pp. 229
Environmentally-Friendly GR(1) Synthesis
pp. 249
The algebraic specification of semicomputable data types
pp. 317
13 AutoFocus 3 - A Scientific Tool Prototype for Model-Based Development of Component-Based, Reactive, Distributed Systems
pp. 87
Investigating the Effects of Gain and Loss of Esteem on Human-Robot Interaction
pp. 90
Performance Evaluation of a Self-organized Hierarchical Topology for Update of Replicas in a Large Distributed System
pp. 97
Agile Development Using Naked Objects
pp. 118
Design of a Fuzzy Takagi-Sugeno Controller to Vary the Joint Knee Angle of Paraplegic Patients
pp. 129
Optimization of Queries Invoking Views by Query Tail Absorption
pp. 133
Vision-Based Self-localization of Autonomous Guided Vehicle Using Landmarks of Colored Pentagons
pp. 133
FTT Algorithm of Web Pageviews for Personalized Recommendation
pp. 134
Learning Naive Bayes Models for Multiple-Instance Learning with Label Proportions
pp. 143
Parameterized Algorithms for Stochastic Steiner Tree Problems
pp. 146
Game-Theoretic Models of Information Overload in Social Networks
pp. 146
Approximate Matching between a Context-Free Grammar and a Finite-State Automaton
pp. 155
A fuzzy extension of Allen’s Interval Algebra
pp. 156
Plan Recognition by Program Execution in Continuous Temporal Domains
pp. 156
High Capacity Data Hiding for Halftone Image Authentication
pp. 157
Towards an Agent-Based Negotiation Scheme for Scheduling Electric Vehicles Charging
pp. 159
Knowledge-based segmentation for automatic map interpretation
pp. 162
Evolutionary Role Model for Multi-Agent Systems
pp. 166
CWFM: Closed Contingency Weighted Frequent Itemsets Mining
pp. 187
Using Diagrammatic Drawings to Understand Fictional Spaces: Exploring the Buendía House in Gabriel García Márquez’s One Hundred Years of Solitude
pp. 189
SPEC HPG Benchmarks for Large Systems
pp. 196
Attack-Resilient Multitree Data Distribution Topologies
pp. 200
The Queue-Number of Posets of Bounded Width or Height
pp. 207
A Modeling Framework for Generic Agent Interaction Protocols
pp. 211
NSS: An NTRU Lattice-Based Signature Scheme
pp. 225
Timed Condition/Event systems: A framework for modular discrete models of chemical plants and verification of their real-time discrete control
pp. 232
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
pp. 249
(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model
pp. 269
Improved Cryptanalysis of the DECT Standard Cipher
pp. 107
Activity Representation in Crowd
pp. 127
Characterization of Breast Abnormality Patterns in Digital Mammograms Using Auto-associator Neural Network
pp. 135
Panel: Change is Good. You Go First
pp. 139
Checking Violation Tolerance of Approaches to Database Integrity
pp. 140
D-FOAF: Distributed Identity Management with Access Rights Delegation
pp. 169
Coded Spread Spectrum Watermarking Scheme
pp. 171
Refinement of Statemachines Using Event B Semantics
pp. 172
Agreement Technologies Applied to Transmission Towers Maintenance
pp. 175
Extending Social Reasoning to Cope with Multiple Partner Coalitions
pp. 177
On-Demand Distributed Energy-Aware Routing with Limited Route Length
pp. 179
Automatic region labeling of the layered map
pp. 209
On the Complexity of Distributed Broadcasting and MDS Construction in Radio Networks
pp. 222
proSQLite: Prolog File Based Databases via an SQLite Interface
pp. 226
An Algorithm to Find Frequent Concepts of a Formal Context with Taxonomy
pp. 227
Compositional Testing of Communication Systems
pp. 229
The Bit Security of Paillier’s Encryption Scheme and Its Applications
pp. 230
Mathematics and the World Wide Web
pp. 247
Reducing page thrashing in recursive query processing
pp. 254
Lossy Channels in a Dataflow Model of Computation
pp. 255
Verification by Testing for Recursive Program Schemes
pp. 268
L-Completeness of the Lambek Calculus with the Reversal Operation Allowing Empty Antecedents
pp. 287
Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce Bits
pp. 329
15 Benefits of System Simulation for Automotive Applications
pp. 365
A Mathematical Theory of Architecture
pp. 98
Time-Lock Puzzle with Examinable Evidence of Unlocking Time
pp. 136
Panel: A Competition of Software Product Line Economic Models
pp. 141
Natural Specifications Yield Decidability for Distributed Synthesis of Asynchronous Systems
pp. 147
Using Brain Activity to Predict Task Performance and Operator Efficiency
pp. 154
Multipath Routing to Provide Quality of Service in Mobile Ad Hoc Networks
pp. 155
Unravelling the Yeast Cell Cycle Using the TriGen Algorithm
pp. 157
A reactive-deliberative model of dialogue agency
pp. 158
ActiveMap: A Visualization Tool for Location Awareness to Support Informal Interactions
pp. 168
Ciphertext-Only Attack on Gentry-Halevi Implementation of Somewhat Homomorphic Scheme
pp. 184
Enhancement of Method for Preventing Unauthorized Copying of Displayed Information Using Object Surface Reflection
pp. 190
The Snow Team Problem
pp. 190
Verification-based approach for automated text and feature extraction from raster-scanned maps
pp. 193
Adapting the Fitness Function in GP for Data Mining
pp. 194
$\mathcal{SHACUN}$ : Semi-supervised Hierarchical Active Clustering Based on Ranking Constraints
pp. 219
Design of an Optimal Frequency Reward Program in the Face of Competition
pp. 239
A Functional Program for Agents, Actions, and Deontic Specifications
pp. 264
Highways and jukeboxes: A revolution for data structures?
pp. 279
A Note on Multidimensional Dyck Languages
pp. 292
Multi-Agent Programming Contest 2013
pp. 109
Trust Management and Network Layer Security Protocols
pp. 126
An Efficient Implementation of the Backtesting of Trading Strategies
pp. 145
Ovarian Cancer Prognosis by Hemostasis and Complementary Learning
pp. 157
Interactive Style of 3D Display of Buildings on Touch Screen
pp. 161
Real-Time Rendering of Light Shafts on GPU
pp. 162
Behavioral Analysis Based on Relations in Weblogs
pp. 175
Tissue Cutting Using Finite Elements and Force Feedback
pp. 175
Monte Carlo Analysis of the Small-Signal Response of Charge Carriers
pp. 179
Introducing the FPGA-Based Hardware Architecture of Systemic Computation (HAoS)
pp. 180
Grover’s Algorithm with Errors
pp. 181
Brzozowski’s Minimization Algorithm—More Robust than Expected
pp. 187
On specific features of recognizable families of languages
pp. 203
An Application of Specification-Based Design of Self-stabilization to Tracking in Wireless Sensor Networks
pp. 203
A Dialectical Approach to Enable Decision Making in Online Trading
pp. 204
Software system design for paper map conversion
pp. 204
FO Model Checking on Map Graphs
pp. 214
Scanning with a Purpose – Supporting the Fair Information Principles in RFID Protocols
pp. 227
Virtualizing Real-World Objects in FRP
pp. 242
Identifying Opinion Drivers on Social Media
pp. 244
Parallel Performance of Declarative Programming Using a PGAS Model
pp. 262
On Adaptive vs. Non-adaptive Security of Multiparty Protocols
pp. 276
Machine intelligibility and the duality principle
pp. 319
SMADAS: A Team for MAPC Considering the Organization and the Environment as First-Class Abstractions
pp. 133
Mathematical Statements (Module ST)
pp. 137
Pair-Associate Learning with Modulated Spike-Time Dependent Plasticity
pp. 143
An Exploratory Analysis on User Behavior Regularity in the Mobile Internet
pp. 163
Using Cellular Automata on a Graph to Model the Exchanges of Cash and Goods
pp. 174
Prospects of Group-Based Communication in Mobile Ad hoc Networks
pp. 189
A rational agent as the kernel of a cooperative spoken dialogue system: Implementing a logical theory of interaction
pp. 194
Optimization Problems in Multiple Subtree Graphs
pp. 196
Parallel square root iterations
pp. 205
Improved Query Suggestion by Query Search
pp. 212
Object-process based segmentation and recognition of ANSI and ISO standard dimensioning texts
pp. 213
Cooperative Sign Language Tutoring: A Multiagent Approach
pp. 213
Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic Tools
pp. 216
Security Policy Enforcement Through Refinement Process
pp. 218
Our Brothers’ Keepers: Secure Routing with High Performance
pp. 228
A New Approach for Concurrent Program Slicing
pp. 249
A Classification of Stereotypes for Object-Oriented Modeling Languages
pp. 255
Applying Design by Contract to Feature-Oriented Programming
pp. 265
Optimized encodings of fragments of type theory in first order logic
pp. 306
Embedded Software Design Methodology Based on Formal Models of Computation
pp. 319
Effective Entailment Checking for Separation Logic with Inductive Definitions
pp. 331
A Categorial Type Logic
pp. 345
Compressing Multiresolution Triangle Meshes
pp. 357
A Physical Approach for Stochastic Modeling of TERO-Based TRNG
pp. 145
Associative Memory in Neuronal Networks of Spiking Neurons: Architecture and Storage Analysis
pp. 161
Intensional High Performance Computing
pp. 173
Montebello: A Metapopulation Based Model of Carcinogenesis
pp. 174
Defining a Work Support and Training Tool for Automation Design Engineers
pp. 174
Study of Phase Relationships in ECoG Signals Using Hilbert-Huang Transforms
pp. 179
New Commutative Semifields and Their Nuclei
pp. 180
Effects of Layer Partitioning in Collaborative 3D Visualizations
pp. 193
The Role of Connectivity in Supporting Context- Sensitive Applications
pp. 198
Geometric Methods for Analysing Quantum Speed Limits: Time-Dependent Controlled Quantum Systems with Constrained Control Functions
pp. 200
Towards User-Aware Multi-touch Interaction Layer for Group Collaborative Systems
pp. 205
Modelling social agents: Communication as action
pp. 205
Multi-Criteria TSP: Min and Max Combined
pp. 217
Knowledge-Base Revision Using Implications as Hypotheses
pp. 228
Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns
pp. 232
Integration of Security Policy into System Modeling
pp. 233
On the Facets of Combinatorial Polytopes
pp. 234
Argumentation-Based Hybrid Recommender System for Recommending Learning Objects
pp. 237
Managing Automatically Formed Mathematical Theories
pp. 243
Reducing Software Architecture Models Complexity: A Slicing and Abstraction Approach
pp. 244
Aggregating Conditionally Lexicographic Preferences Using Answer Set Programming Solvers
pp. 246
Safety Interfaces for Component-Based Systems
pp. 276
New Malicious Code Detection Using Variable Length n-grams
pp. 279
A survey of DBMS research issues in supporting very large tables
pp. 288
Three Years of DLMF: Web, Math and Search
pp. 313
Generic system support for deductive program development
pp. 326
The Number Field Sieve in the Medium Prime Case
pp. 328
Liveness and boundedness analysis for Petri nets with event graph modules
pp. 150
Online Adaptive Fault-Tolerant Routing in 2D Torus
pp. 153
Bifurcating Neurons with Filtered Base Signals
pp. 159
Remote Plug and Play USB Devices for Mobile Terminals
pp. 176
A Quantitative Diagnostic Method Based on Bayesian Networks in Traditional Chinese Medicine
pp. 177
Towards Generalized Measures Grasping CA Dynamics
pp. 191
GPU-Based Active Contour Segmentation Using Gradient Vector Flow
pp. 198
Memetic Algorithm Based on Global-Best Harmony Search and Hill Climbing for Part of Speech Tagging
pp. 226
Using the Hermite Regression Formula to Design a Neural Architecture with Automatic Learning of the “Hidden” Activation Functions
pp. 229
Improving Confidence of Dual Averaging Stochastic Online Learning via Aggregation
pp. 232
GOAL Agents Instantiate Intention Logic
pp. 234
Reducing Expression Size Using Rule-Based Integration
pp. 242
Detecting Removed Object from Video with Stationary Background
pp. 243
Redundant Dictionary Spaces as a General Concept for the Analysis of Non-vectorial Data
pp. 243
Decidable Weighted Expressions with Presburger Combinators
pp. 285
Combining Related Products into Product Lines
pp. 287
A Formal Verification Study on the Rotterdam Storm Surge Barrier
pp. 289
A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes
pp. 306
Symbolic and on the Fly Testing with Real-Time Observers
pp. 369
20 The Model-Integrated Computing Tool Suite
pp. 409
Program specialization via program slicing
pp. 414
Comparing the power of monadic NP games
pp. 166
SIP-Based Streaming Control Architecture for Mobile Personal Area Networks
pp. 173
Complex Theories (Modules CTH and DG)
pp. 195
On the Distribution of Nonlinear Congruential Pseudorandom Numbers of Higher Orders in Residue Rings
pp. 203
Push Less and Pull the Current Highest Demanded Data Item to Decrease the Waiting Time in Asymmetric Communication Environments
pp. 229
Minimal Cost Reconfiguration of Data Placement in Storage Area Network
pp. 236
ALIVE: A Framework for Flexible and Adaptive Service Coordination
pp. 238
XIG: Generating from Interchange Format using Mixed Representations
pp. 258
Human-Centered Text Mining: A New Software System
pp. 259
Approximating Coupled-Task Scheduling Problems with Equal Exact Delays
pp. 260
Reconstruction of 3D solid model from three orthographic views — Top-down approach
pp. 294
Scale Effects in Web Search
pp. 300
Node Sampling Using Random Centrifugal Walks
pp. 301
Tracing Your Maintenance Work – A Cross-Project Validation of an Automated Classification Dictionary for Commit Messages
pp. 310
Using MathML to Represent Units of Measurement for Improved Ontology Alignment
pp. 356
Prior State Reasoning in Multi-agent Systems and Graph-Theoretical Algorithms
pp. 357
Cryptanalysis of 2R− Schemes
pp. 416
Evaluation and Improvement of Generic-Emulating DPA Attacks
pp. 426
Linear constraint query languages expressive power and complexity
pp. 192
Improved Realtime Intrusion Detection System
pp. 204
Rooted Trees Searching for Cocyclic Hadamard Matrices over D 4t
pp. 207
Association-Rules Mining Based Broadcasting Approach for XML Data
pp. 212
Iterative Estimation of 3D Transformations for Object Alignment
pp. 212
Automatic Alignment of Ontology Eliminating the Probable Misalignments
pp. 214
An Adaptive Resource Reservation and Distributed Admission Control Scheme for Mobile Networks
pp. 218
Global Computing Systems
pp. 255
A Tool for Firewall Administration
pp. 267
A Novel Video Inter-frame Forgery Model Detection Scheme Based on Optical Flow Consistency
pp. 272
Routing Open Shop with Unrelated Travel Times
pp. 278
Performance of Network Intrusion Detection Cluster System
pp. 279
Probabilistic Argumentation, a Small Step for Uncertainty, a Giant Step for Complexity
pp. 292
Composition of Use Cases Using Synchronization and Model Checking
pp. 316
Cohesive and Isolated Development with Branches
pp. 366
Multi-Agent Programming Contest 2013: The Teams and the Design of Their Systems
pp. 373
Modelling and control of complex logistic systems for manufacturing
pp. 446
ML pattern match compilation and partial evaluation
pp. 88
ADI’10 - PC Co-chairs Message
pp. 174
An Evolutionary Multi-objective Neural Network Optimizer with Bias-Based Pruning Heuristic
pp. 180
XP with Acceptance-Test Driven Development: A Rewrite Project for a Resource Optimization System
pp. 181
Development and Evaluation of No-Record Chat System Against Screen Capture
pp. 187
Measuring the Similarity of Vector Fields Using Global Distributions
pp. 201
A Distributed Neural Network Learning Algorithm for Network Intrusion Detection System
pp. 217
CSDTM A Cost Sensitive Decision Tree Based Method
pp. 222
Temporal Alignment of Time Varying MRI Datasets for High Resolution Medical Visualization
pp. 228
Java for Large-Scale Scientific Computations?
pp. 229
A Framework for Mutant Genetic Generation for WS-BPEL
pp. 236
Definition einer Kahan-Arithmetik und ihre Implementierung
pp. 244
Evolutionary Programming Using Distribution-Based and Differential Mutation Operators
pp. 261
Designing and implementing a multi-agent architecture for business process management
pp. 263
Smart Matching
pp. 266
A CPS-Transform of Constructive Classical Logic
pp. 270
Concurrent Genetic Programming, Tartarus and Dancing Agents
pp. 286
How to win a dashed line detection contest
pp. 288
Constructing a Virtual Laboratory on the Internet: The ITBL Portal
pp. 330
Wait-Free Linked-Lists
pp. 330
The ForMaRE Project – Formal Mathematical Reasoning in Economics
pp. 333
On the Area-Universality of Triangulations
pp. 393
Cryptographic Protocols for Electronic Voting
pp. 189
A Customer Test Generator for Web-Based Systems
pp. 189
Home-Network of a Mutual Complement Communication System by Wired and Wireless
pp. 197
Virtual Door-Based Coverage Path Planning for Mobile Robot
pp. 213
Semantic-Based Affect and Metaphor Interpretation in Virtual Drama
pp. 222
Who Is Taking over Control? A Psychological Perspective in Examining Effects of Agent-Based Negotiation Support Technologies
pp. 233
Planning and Execution in a Personalised E-Learning Setting
pp. 237
Programs, computations and temporal features
pp. 240
Pattern Based Information Retrieval Approach to Discover Extremist Information on the Internet
pp. 246
The error in interval arithmetic
pp. 247
Normative Multi-Agent Organizations
pp. 277
Emotion-based attention shift in autonomous agents
pp. 290
Face Verification Using Color Sparse Representation
pp. 295
Modelling and Analysis of Network Security - a Probabilistic Value-passing CCS Approach
pp. 309
Computing Convex Coverage Sets for Multi-objective Coordination Graphs
pp. 330
UML-RT as a Candidate for Modeling Embedded Real-Time Systems in the Telecommunication Domain
pp. 345
Byzantine Chain Replication
pp. 347
Extracting Widget Descriptions from GUIs
pp. 369
Using Both Latent and Supervised Shared Topics for Multitask Learning
pp. 407
Cyber-Physical Systems Education: Explorations and Dreams
pp. 475
Multi-variate High-Order Attacks of Shuffled Tables Recomputation
pp. 193
Emergence of Connectivity Patterns from Long-Term and Short-Term Plasticities
pp. 217
Intrusion Alert Analysis Based on PCA and the LVQ Neural Network
pp. 223
A Framework for Experience Representation
pp. 243
Low Level Moving-Feature Extraction Via Heat Flow Analogy
pp. 244
A note on the automatic generation of inductive assertions
pp. 247
Object-Oriented Framework for Large Scale air Pollution Modeling
pp. 248
Computational Power of Protein Interaction Networks
pp. 251
Verbandstheoretische Grundlagen der Intervall-Mathematik
pp. 280
Deterministic Counter Machines and Parallel Matching Computations
pp. 293
An OpenMath Content Dictionary for Tensor Concepts
pp. 339
Modeling Hard Real Time Systems with UML The OOHARTS Approach
pp. 349
Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract)
pp. 354
Dynamic Pricing in Competitive Markets
pp. 389
The stubborn set method in practice
pp. 406
Hyper-bent Functions
pp. 409
Random Selection with an Adversarial Majority
pp. 201
Artificial Neural Networks and Data Compression Statistics for the Discrimination of Cultured Neuronal Activity
pp. 221
OMDoc Applications, Tools, and Projects
pp. 227
Gröbner Representations of Binary Matroids
pp. 241
Generating Cryptographically Suitable Non-linear Maximum Length Cellular Automata
pp. 247
Automatic Lung Nodule Detection Using Template Matching
pp. 256
Representing and Reasoning with Application Profiles Based on OWL and OWL/XDD
pp. 257
Performance Driven Routing in Distributed Environment
pp. 258
A Monitoring Infrastructure for the Digital on-demand Computing Organism (DodOrg)
pp. 266
A Generic Flash-Based Animation Engine for ProB
pp. 289
Visualising the Boolean Algebra \(\mathbb {B}_{4}\) in 3D
pp. 311
A Proof-Theoretic Approach to Deciding Subsumption and Computing Least Common Subsumer in $\cal EL$ w.r.t. Hybrid TBoxes
pp. 325
Facility Location in Unfair Competition
pp. 353
A Survey of Control-Flow Obfuscations
pp. 361
How to Fit a Tree in a Box
pp. 212
A Prototype of a Chat System Using Message Driven and Interactive Actions Character
pp. 223
OMDoc Resources
pp. 231
A Generalization of the Zig-Zag Graph Product by Means of the Sandwich Product
pp. 234
Color Image Watermarking Algorithm Using BPN Neural Networks
pp. 240
Time Scales of Sensorimotor Contingencies
pp. 251
Chaotic Cellular Automata with Cryptographic Application
pp. 252
Quantum Random Active Element Machine
pp. 254
MIGP: Medical Image Grid Platform Based on HL7 Grid Middleware
pp. 263
History Trees as Descriptors of Macromolecular Structures
pp. 284
In vitro Measurement of Mechanical Properties of Liver Tissue under Compression and Elongation Using a New Test Piece Holding Method with Surgical Glue
pp. 372
Extending EFSMs to Specify and Test Timed Systems with Action Durations and Timeouts
pp. 250
Analysis of Birefringent Characteristics of Photonic Crystal Fibers Filled Magnetic Fluid
pp. 255
Simulating Metabolic Processes Using an Architecture Based on Networks of Bio-inspired Processors
pp. 264
Theoretical and Methodological Considerations in the Comparison of Performance and Physiological Measures of Mental Workload
pp. 274
BRAMA: A New Graphic Animation Tool for B Models
pp. 278
Visualizing Defeasible Logic Rules for the Semantic Web
pp. 321
An Algorithm for Recruitment of Agents in Agency Design
pp. 331
Integrating Multiple Sources to Answer Questions in Algebraic Topology
pp. 334
On L k(Q) Types and Boundedness of IFP(Q) on Finite Structures
pp. 350
A Leader-Follower Hub Location Problem Under Fixed Markups
pp. 355
Listing All Fixed-Length Simple Cycles in Sparse Graphs in Optimal Time
pp. 361
Secure Itineraries Framework for Mobile Agent Systems
pp. 363
Trust, Negotiations and Virtual Currencies for a Sharing Economy
pp. 363
Comparative Preferences Induction Methods for Conversational Recommenders
pp. 368
Towards a Cyber Security Reporting System – A Quality Improvement Process
pp. 387
The Complexity of Drawing a Graph in a Polygonal Region
pp. 453
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
pp. 504
Augmenting State Models with Data Flow
pp. 212
Pictures Can’t Lie under Oath
pp. 239
An Upper Bound on Blocking Probability of Vertical Stacked Optical Benes Networks
pp. 239
Bounds on the Number of Users for Random 2-Secure Codes
pp. 251
A Gait Generation for an Unlocked Joint Failure of the Quadruped Robot with Balance Weight
pp. 257
On String Reading Stateless Multicounter 5′ → 3′ Watson-Crick Automata
pp. 259
A Lateral Inhibitory Spiking Neural Network for Sparse Representation in Visual Cortex
pp. 269
Results of a Tailored Communication Framework Through E-Health
pp. 274
Chat Mining for Gender Prediction
pp. 290
A Fast Technique for Assigning Wavelengths in WDM All-Optical Networks (AONs)
pp. 303
Adaptive Incentive-Compatible Sponsored Search Auction
pp. 344
Robust Median Filtering Detection Based on Filtered Residual
pp. 365
Malafide Intension Based Detection of Privacy Violation in Information System
pp. 399
Correct Realizations of Interface Constraints with OCL
pp. 425
Reduction of Test Suites Using Mutation
pp. 436
Reasoning about Safety and Progress Using Contracts
pp. 524
On the Road to Conviction: An Email Exchange with Edward Lee
pp. 231
A Novel Bifurcation-Based Synthesis of Asynchronous Cellular Automaton Based Neuron
pp. 252
It’s Elementary, My Dear Watson: Time-Optimal Sorting Algorithms on a Completely Overlapping Network
pp. 293
Empirical Evaluation of a Visual Interface for Exploring Message Boards
pp. 293
A Study of the Suitability of Evolutionary Computation in 3D Modeling of Forensic Remains
pp. 300
Design of 1-FT Communication Network under Budget Constraint
pp. 359
Ant Colony Optimization for the Ship Berthing Problem
pp. 360
Broadcast in a MANET Based on the Beneficial Area
pp. 418
A constraint-oriented Service Creation Environment
pp. 239
Biomimetic Binaural Sound Source Localisation with Ego-Noise Cancellation
pp. 241
The Interactive Feature Selection Method Development for an ANN Based Emotion Recognition System
pp. 272
An Improved Method for Real-Time 3D Construction of DTM
pp. 277
An axiomatic approach to information structures
pp. 285
JML2B: Checking JML Specifications with B Machines
pp. 288
The Effect of Traffic on Situation Awareness and Mental Workload: Simulator-Based Study
pp. 294
Knowledge Integration in Information Systems Education Through an (Inter)active Platform of Analysis and Modelling Case Studies
pp. 303
L-System-Driven Self-assembly for Swarm Robotics
pp. 312
Approximating the Range Sum of a Graph on CREW PRAM
pp. 356
On Plan Adaptation through Planning Graph Analysis
pp. 368
An Optimal Method for Coordinated En-route Web Object Caching
pp. 368
Optimal Histogram-Pair and Prediction-Error Based Image Reversible Data Hiding
pp. 369
swMATH – A New Information Service for Mathematical Software
pp. 373
Towards a Formal Specification Method for Enterprise Information System Security
pp. 395
Determinism and Computational Power of Real Measurement-Based Quantum Computation
pp. 399
Thompson Sampling for Bayesian Bandits with Resets
pp. 430
Formalising UML State Machines for Model Checking
pp. 455
A New Design Defects Classification: Marrying Detection and Correction
pp. 248
Supervised IAFC Neural Network Based on the Fuzzification of Learning Vector Quantization
pp. 282
Depth Estimation Using Variant of Depth of Field by Horizontal Planes of Sharp Focus
pp. 288
An Improved Single Neuron Adaptive PID Controller Based on Levenberg-Marquardt Algorithm
pp. 314
Wearable Information Appliances for the Emergency Services: HotHelmet
pp. 335
Improved Community Interaction Through Context Based Citation Analysis
pp. 376
An Improved Algorithm of Multicast Topology Inference from End-to-End Measurements
pp. 377
Recent Research on Privacy Preserving Data Mining
pp. 404
An Approach to Fractional Programming via D.C. Constraints Problem: Local Search
pp. 409
Busy Beaver Scores and Alphabet Size
pp. 471
Fine Slicing
pp. 529
Encryption Modes with Almost Free Message Integrity
pp. 255
Walking Pattern Analysis of Humanoid Robot Using Support Vector Regression
pp. 285
A RBF Network for Chinese Text Classification Based on Concept Feature Extraction
pp. 292
A Study on Stereo and Motion Data Accuracy for a Moving Platform
pp. 296
Variable Step Length Best Combination AEC Algorithm in IPC
pp. 312
Cellular Automata Applied in Remote Sensing to Implement Contextual Pseudo-fuzzy Classification
pp. 323
Facial Expression Transformations for Expression-Invariant Face Recognition
pp. 329
Ontology Driven Visualisation of Maps with SVG – Technical Aspects
pp. 333
Quick-Reference Table to the OMDoc Elements
pp. 340
Towards Patient-Specific Anatomical Model Generation for Finite Element-Based Surgical Simulation
pp. 348
Mining Informative Words from the Tweets for Detecting the Resources During Disaster
pp. 375
An Efficient Location Management by Optimal Location Area Partitioning in PCS Networks
pp. 379
The DeLiVerMATH Project
pp. 385
Chordal Topologies for Interconnection Networks
pp. 418
Automatic Kolmogorov Complexity and Normality Revisited
pp. 425
Possible Winner Problems on Partial Tournaments: A Parameterized Study
pp. 457
UML Behavior: Inheritance and Implementation in Current Object-Oriented Languages
pp. 486
System Dependence Graphs in Sequential Erlang
pp. 264
Classification of Distorted Patterns by Feed-Forward Spiking Neural Networks
pp. 298
A Fast and Scalable Conflict Detection Algorithm for Packet Classifiers
pp. 304
Stochastic Resonance in Excitable Neuronal System with Phase-Noise
pp. 316
A Mental Workload Predicator Model for the Design of Pre Alarm Systems
pp. 322
Impact of Coupling of Distributed Denial of Service Attack with Routing on Throughput of Packet Switching Network
pp. 393
Distributed Location of Shared Resources and Its Application to the Load Sharing Problem in Heterogeneous Distributed Systems
pp. 430
Multiple Cuts in Separating Plane Algorithms
pp. 501
A Domain-Specific Language for Scripting Refactorings in Erlang
pp. 570
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions
pp. 272
Spike Transmission on Diverging/Converging Neural Network and Its Implementation on a Multilevel Modeling Platform
pp. 311
Determination of Gender and Age Based on Pattern of Human Motion Using AdaBoost Algorithms
pp. 319
User-Oriented Accessibility Patterns for Smart Environments
pp. 337
Computer Simulation of the Air Flow and the Distribution of Combustion Generated Pollutants around Buildings
pp. 343
Light Simulation in a Distributed Driving Simulator
pp. 343
A Semantics-Based Protocol for Business Process Transactions
pp. 379
A Verification Technique Based on Syntactic Action Refinement in a TCSP-like Process Algebra and the Hennessy-Milner-Logic
pp. 411
Evidence Algorithm and System for Automated Deduction: A Retrospective View
pp. 280
Differential Entropy of Multivariate Neural Spike Trains
pp. 320
A Heuristic Routing Algorithm for Degree-Constrained Minimum Overall Latency Application Layer Multicast
pp. 321
A Comparative Study of Two Reference Estimation Methods in EEG Recording
pp. 331
Visual Hierarchy and Viewing Behavior: An Eye Tracking Study
pp. 344
A Network-Based Indexing Method for Trajectories of Moving Objects
pp. 344
On Multigrid Methods for the Compressible Navier-Stokes Equations
pp. 351
Fuzzy View-Based Semantic Search
pp. 353
Learning Cooperative TSK-0 Fuzzy Rules Using Fast Local Search Algorithms
pp. 509
Orthogonal and Smooth Orthogonal Layouts of 1-Planar Graphs with Low Edge Complexity
pp. 307
Extreme Makeover: Bending the Rules to Reduce Risk Rewriting Complex Systems
pp. 329
Single LFP Sorting for High-Resolution Brain-Chip Interfacing
pp. 329
Structure Is a Visual Class Invariant
pp. 354
Adaptive Enumeration Strategies and Metabacktracks for Constraint Solving
pp. 356
Efficient Circuit Construction in Brownian Cellular Automata Based on a New Building-Block for Delay-Insensitive Circuits
pp. 363
Weighted Tardiness Minimization in Job Shops with Setup Times by Hybrid Genetic Algorithm
pp. 565
Making the Right Cut in Model Checking Data-Intensive Timed Systems
pp. 211
Application-Services Integration among Multi-clouds for Small and Middle Scale Enterprises
pp. 365
A Cellular Automaton Controlled Shading for a Building Facade
pp. 373
Interval-Valued Fuzzy Sets for Color Image Super-Resolution
pp. 373
Accurate Extraction of Reciprocal Space Information from Transmission Electron Microscopy Images
pp. 401
Ontology-Based Competence Management for Team Configuration
pp. 413
$\mathcal{NP}$ -Hardness of Pure Nash Equilibrium in Scheduling and Connection Games
pp. 431
Parallel Matrix Multiplication and LU Factorization on Ethernet-Based Clusters
pp. 445
Prior Classification of Stego Containers as a New Approach for Enhancing Steganalyzers Accuracy
pp. 464
A Secret Enriched Visual Cryptography
pp. 341
Content-Based 3D Graphic Information Retrieval
pp. 345
A Flexible Implementation Method of Distributed ANN
pp. 359
Finding a Relationship between Internet Anxiety and Human Behavior
pp. 377
An Anycasting Protocol for Anonymous Access to a Group of Contents-Equivalent Servers in a Distributed System
pp. 383
GPU Accelerated Isosurface Extraction on Tetrahedral Grids
pp. 469
A p2p Framework for Interacting with Learning Objects
pp. 485
On the Security of Multi-secret Visual Cryptography Scheme with Ring Shares
pp. 550
Black and White Diamonds
pp. 371
A New Data Fusion Model of Intrusion Detection-IDSFP
pp. 450
Performance Study of a Whole Genome Comparison Tool on a Hyper-Threading Multiprocessor
pp. 495
An Image Super-Resolution Scheme Based on Compressive Sensing with PCA Sparse Representation
pp. 566
Interconnecting Objects via Contracts
pp. 325
Extreme Programming: A More Musical Approach to Software Development?
pp. 343
An Evaluation of WebTwig — A Site Outliner for Handheld Web Access
pp. 361
The Possibility of Using Simple Neuron Models to Design Brain-Like Computers
pp. 478
A De-anonymization Attack on Geo-Located Data Considering Spatio-temporal Influences
pp. 507
A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CA
pp. 579
Algorithms and Bounds for Drawing Directed Graphs
pp. 346
Human Factors of Multi-modal Ubiquitous Computing
pp. 370
A Brain-Inspired Cerebellar Associative Memory Approach to Option Pricing and Arbitrage Trading
pp. 379
Multidimensional Evaluation of Human Responses to the Workload
pp. 413
SAHN with SEP/COP and SPADE, to Build a General Web Navigation Adaptation System Using Server Log Information
pp. 461
The Simple Reachability Problem in Switch Graphs
pp. 468
Large Scale Structures of Turbulent Shear Flow via DNS
pp. 349
URCP: Experimental Support for Multi-modal Interfaces
pp. 382
Analysis of Pesticide Application Practices Using an Intelligent Agriculture Decision Support System (ADSS)
pp. 407
2L-MuRR: A Compact Register Renaming Scheme for SMT Processors
pp. 409
A Lagrange Multipliers/Fictitious Domain Approach for Particulate Flow
pp. 409
Coxeter Groups and Asynchronous Cellular Automata
pp. 421
Simulation of Diabetic Retinopathy Neovascularization in Color Digital Fundus Images
pp. 444
Exploring the Flexible Workflow Technology to Automate Service Composition
pp. 476
Molecular Dynamics Simulation of Prion Protein by Large Scale Cluster Computing
pp. 609
Graph Drawing Contest Report
pp. 662
A Pattern System to Support Refining Informal Ideas into Formal Expressions
pp. 433
Extended Precision Quality Measure for Recommender Systems
pp. 434
Mesh Optimisation Using Edge Information in Feature-Based Surface Reconstruction
pp. 459
Mediation Enabled Semantic Web Services Usage
pp. 563
Location, Pricing and the Problem of Apollonius
pp. 678
Specification Translation of State Machines from Equational Theories into Rewrite Theories
pp. 337
EnterpriseXP: Can the Combination of XP and DSDM Improve the Appeal of XP to the Business Community?
pp. 349
A Self-organising Sensing System for Structural Health Management
pp. 411
Multi-angle View, Illumination and Cosmetic Facial Image Database (MaVIC) and Quantitative Analysis of Facial Appearance
pp. 425
Wave Evolution of Heated Falling Films. Numerical Analysis Using Finite-Difference Method
pp. 474
Toward Automatic Discovery and Invocation of Information-Providing Web Services
pp. 279
Early Validation of Requirements in Distributed Product Development – An Industrial Case Study
pp. 431
Developing High-Performance Parallel Applications Using EPAS
pp. 366
Is Soft Computing in Technology and Medicine Human-Friendly?
pp. 371
An Effect of Short and Long Reciprocal Projections on Evolution of Hierarchical Neural Networks
pp. 385
One — one degrees of Turing machines decision problems
pp. 432
”How Do I Line Up?”: Reducing Mental Transformations to Improve Performance
pp. 347
Extreme Programming at Work
pp. 443
A Middleware Architecture for Designing TV-Based Adapted Applications for the Elderly
pp. 475
Strategies for Part-Based Shape Analysis Using Skeletons
pp. 501
Web Services Analysis: Making Use of Web Service Composition and Annotation
pp. 383
New Classifier Based on Fuzzy Level Set Subgrouping
pp. 467
Parallel Unstructured Quadrilateral Mesh Generation
pp. 516
WWW: WSMO, WSML, and WSMX in a Nutshell
pp. 540
OpenMP for Adaptive Master-Slave Message Passing Applications
pp. 390
Fast Shape Index Framework Based on Principle Component Analysis Using Edge Co-occurrence Matrix
pp. 404
On memory requirements of Strassen's algorithms
pp. 495
Real Time Hand Gesture Recognition Including Hand Segmentation and Tracking
pp. 552
OpenGR: A Directive-Based Grid Programming Environment
pp. 530
A Composition Oriented and Graph-Based Service Search Method
pp. 377
A Universal, Location-Aware Hoarding Mechanism
pp. 416
Generating control mechanisms by restrictions
pp. 489
On Mixtures of Linear SVMs for Nonlinear Classification
pp. 496
Phase Coexistence in Congested States of Pedestrian Dynamics
pp. 528
Viewpoint Selection for Angiographic Volume
pp. 366
Building Standard ERP Software Packages Using Self-developed Agile Methodologies
pp. 430
On some properties of cyclic automata and their extensions
pp. 488
Application of ICA in On-Line Verification of the Phase Difference of the Current Sensor
pp. 609
On Toda’s Theorem in Structural Communication Complexity
pp. 386
Ad-hoc Network Routing for Centralized Information Sharing Systems
pp. 504
The Development of a Cognitive Work Analysis Tool
pp. 530
MFLWQ: A Fair and Adaptive Queue Management Algorithm for Scavenger Service
pp. 548
Polyhedrization of Discrete Convex Volumes
pp. 512
Human Activity Modeling for Systems Design: A Trans-Disciplinary and Empirical Approach
pp. 517
Synchronization and Fluctuation of Rhythm in Musical Cooperative Performance
pp. 520
Combining Online Classification Approaches for Changing Environments
pp. 523
Excluded Volume Effect in a Pedestrian Queue
pp. 558
Automatic Camera Calibration and Scene Reconstruction with Scale-Invariant Features
pp. 588
Design of Semantically Interoperable Adverse Event Reporting Framework
pp. 633
Polylog Space Compression Is Incomparable with Lempel-Ziv and Pushdown Compression
pp. 530
Optimal Kernel in a Class of Kernels with an Invariant Metric
pp. 532
Simulation on Vehicle Emission by the Brake-Light Cellular Automata Model
pp. 569
Surface Fitting to Curves with Energy Control
pp. 645
A New Family of Regular Operators Fitting with the Position Automaton Computation
pp. 378
Semantic Similarity and Selection of Resources Published According to Linked Data Best Practice
pp. 531
“Investigating the Way National Grid Controllers Visualize the Electricity Transmission Grid Using a Neuro-Linguistic Programming (NLP) Approach”
pp. 564
A Hybrid Neural Network Approach to the Classification of Novel Attacks for Intrusion Detection
pp. 656
A Formal Model of Business Application Integration from Web Services (Position Paper)
pp. 589
Self-Calibration with Two Views Using the Scale-Invariant Feature Transform
pp. 599
Improved Face Recognition Using Extended Modular Principal Component Analysis
pp. 480
Multiband Radio Resource Allocation for Cognitive Radio Systems
pp. 482
A Dynamic Binding Mechanism for Retrieving and Unifying Complex Predicate-Logic Knowledge
pp. 553
Minimizing Makespan on Identical Parallel Machines Using Neural Networks
pp. 596
Grid Accounting Information Service with End-to-End User Identity
pp. 608
Shape Reconstruction by Line Voting in Discrete Space
pp. 482
Context-free programmed grammars and ETOL systems
pp. 487
Testing Online Navigation Recommendations in a Web Site
pp. 491
Estimation of Causal Orders in a Linear Non-Gaussian Acyclic Model: A Method Robust against Latent Confounders
pp. 618
Characterization of the Closest Discrete Approximation of a Line in the 3-Dimensional Space
pp. 639
A Comprehensive Study of Inappropriate Hierarchy in WordNet
pp. 424
ORM’10 - PC Co-chairs Message
pp. 497
An Overview of Agent Coordination and Cooperation
pp. 499
Reservoir Sizes and Feedback Weights Interact Non-linearly in Echo State Networks
pp. 572
Predication of Properties of Welding Joints Based on Uniform Designed Neural Network
pp. 620
An Accounting Services Model for ShanghaiGrid
pp. 414
Filleting XP for Educational Purposes
pp. 504
Innovations in Intelligent Agents and Web
pp. 581
Applying an Intelligent Neural System to Predicting Lot Output Time in a Semiconductor Fabrication Factory
pp. 588
Appearance Similarity Index for Medicinal Ampoule Labels
pp. 630
An Agent-Based Grid Computing Infrastructure
pp. 436
Real-Time Integration of Geo-data in ORM
pp. 503
Computational processes generated by programs with /recursive/ procedures and block structures
pp. 507
Robust Segmentation for Left Ventricle Based on Curve Evolution
pp. 598
A Novel Parallel Clustering Algorithm Based on Artificial Immune Network Using nVidia CUDA Framework
pp. 596
Neural-Network-Based Sliding Mode Control for Missile Electro-Hydraulic Servo Mechanism
pp. 682
A Semantic Reputation Mechanism in P2P Semantic Web
pp. 517
Degrees of parallelism in computations
pp. 523
Bayesian Decision Tree Averaging for the Probabilistic Interpretation of Solar Flare Occurrences
pp. 531
Learning Sequence Neighbourhood Metrics
pp. 609
Cognitive and Emotional Human Models Within a Multi-agent Framework
pp. 618
Improving the Usability of Hierarchical Representations for Interactively Labeling Large Image Data Sets
pp. 672
Optimal Parameterizations of Bézier Surfaces
pp. 464
A Fact-Based Meta Model for Standardization Documents
pp. 524
On adaptability of a system of programs
pp. 616
An AND-OR Fuzzy Neural Network Ship Controller Design
pp. 628
The Similarity Index of Character Shape of Medicine Names Based on Character Shape Similarity (II)
pp. 474
A Proposal for Folding in ORM Diagrams
pp. 637
ColoriT: Color Based Image Code Application to Aid in Memory Restoration of Offline Photo Artifacts
pp. 692
Immersing Tele-operators in Collaborative Augmented Reality
pp. 711
A Knowledge- and Workflow-Based System for Supporting Order Fulfillment Process in the Build-to-Order Supply Chains
pp. 484
A Basic Characterization of Relation Migration
pp. 561
A New Fault Detection and Diagnosis Method for Oil Pipeline Based on Rough Set and Neural Network
pp. 633
Clusters in the Helbing’s Improved Model
pp. 664
Supervised Principal Geodesic Analysis on Facial Surface Normals for Gender Classification
pp. 725
A Distributed IR Model Based on Semantic Web
pp. 563
The Spherical Hidden Markov Self Organizing Map for Learning Time Series Data
pp. 701
A Discrete Event System Model for Simulating Mobile Agent
pp. 712
Unsupervised Clustering of Shapes
pp. 732
Experimental Study of Semantic Contents Mining on Intra-university Enterprise Contents Management System for Knowledge Sharing
pp. 504
Mapping ORM to Datalog: An Overview
pp. 551
The influence of the data presentation on the computational power of machines
pp. 658
Analyzing Constraints to Support Computational Modeling of Air Traffic Controllers
pp. 579
The Counter-Change Model of Motion Perception: An Account Based on Dynamic Field Theory
pp. 664
H ∞ Neural Networks Control for Uncertain Nonlinear Switched Impulsive Systems
pp. 725
A Personalized and Scalable Service Broker for the Global Computing Environment
pp. 674
Reliable Robust Controller Design for Nonlinear State-Delayed Systems Based on Neural Networks
pp. 677
High-Quality Fast Image Upsampling Algorithm Based on CUDA
pp. 678
Experimental Thermal/Moisture Mapping of Industrial Safety Helmets
pp. 737
Distributed Network Computing on Transient Stability Analysis and Control
pp. 762
Networked Interactive Photo Annotation and Reminiscence Content Delivery
pp. 596
On-Line Processing of Grammatical Structure Using Reservoir Computing
pp. 684
Neural Network Applications in Advanced Aircraft Flight Control System, a Hybrid System, a Flight Test Demonstration
pp. 687
Common Work Space or How to Support Cooperative Activities Between Human Operators and Machine: Application to Air Traffic Control
pp. 714
Scale-Space Kernels for Additive Modeling
pp. 439
Extreme Advertised Bidding
pp. 588
The calculus of facts
pp. 761
3D Surface Reconstruction and Registration for Image Guided Medialization Laryngoplasty
pp. 606
A RDF-Based Framework for User Profile Creation and Management
pp. 702
Neural-Network Inverse Dynamic Online Learning Control on Physical Exoskeleton
pp. 705
Operator Assistance and Semi-autonomous Functions as Key Elements of Future Systems for Multiple Uav Guidance
pp. 771
Vision-Based User Interfaces for Health Applications: A Survey
pp. 602
A complete axiomatic characterization of algorithmic properties of block-structured programs with procedures
pp. 614
Integrated Document Browsing and Data Acquisition for Building Large Ontologies
pp. 623
A Workflow Modeling Framework Enhanced with Problem-Solving Knowledge
pp. 755
A Novel Coding Scheme for Indexing Fingerprint Patterns
pp. 637
Generating Motion Trajectories by Sparse Activation of Learned Motion Primitives
pp. 803
Graph-Based Multi-resolution Temporal-Based Face Reconstruction
pp. 804
Effective Resource Allocation in a JXTA-Based Grid Computing Platform JXTPIA
pp. 738
Synthesis of Desired Binary Cellular Automata Through the Genetic Algorithm
pp. 741
Evaluation of the Effects of Visual Field on Road Sign Recognition
pp. 813
Web-Based Interface for the Visualization of Microarray Data
pp. 827
A Workflow Management Mechanism for Peer-to-Peer Computing Platforms
pp. 661
Dynamic Stopping Improves the Speed and Accuracy of a P300 Speller
pp. 663
Utilization of NNs for Improving the Traditional Technical Analysis in the Financial Markets
pp. 669
Adaptive SVM-Based Classification Increases Performance of a MEG-Based Brain-Computer Interface (BCI)
pp. 841
Integration of Multiple Methods for Class and Specific Object Recognition
pp. 772
UEAS: A Novel United Evolutionary Algorithm Scheme
pp. 850
An Efficient Photon Mapping Algorithm for Rendering Light-Emitting Fluids
pp. 853
An Adaptive Web Caching Method Based on the Heterogeneity of Web Object
pp. 787
Classification of Blink Waveforms Toward the Assessment of Driver’s Arousal Levels - An EOG Approach and the Correlation with Physiological Measures
pp. 871
Adaptive Background Generation for Video Object Segmentation
pp. 635
Knowledge Representation with Autonomic Ontologies
pp. 701
Bi-objective Genetic Algorithm for Feature Selection in Ensemble Systems
pp. 806
Culture and Communication in the Philippine Aviation Industry
pp. 842
A Low Cost Incremental Biometric Fusion Strategy for a Handheld Device
pp. 890
A New Method of Network Data Link Troubleshooting
pp. 891
Real-Time GPU-Based Simulation of Dynamic Terrain
pp. 901
High-Resolution Video from Series of Still Photographs
pp. 665
Automatic Support for Product Based Workflow Design: Generation of Process Models from a Product Data Model
pp. 715
Construction and Evaluation of Text-Dialog Corpus with Emotion Tags Focusing on Facial Expression in Comics
pp. 675
OTMA’10 - PC Co-chairs Message
pp. 725
Human Support Network System Using Friendly Robot
pp. 860
A Research of Speech Signal of Fire Information Display Interface
pp. 866
Evolvable Viral Agent Modeling and Exploration
pp. 955
Cross-Layer Flow Control Based on Path Capacity Prediction for Multi-hop Ad Hoc Network
pp. 766
A Constrained Spreading Activation Approach to Collaborative Filtering
pp. 937
Classification and Automatic Annotation Extension of Images Using Bayesian Network
pp. 711
Automatic Exposure Control in Digital Mammography: Contrast-to-Noise Ratio Versus Average Glandular Dose
pp. 947
Selection of Suitable Set of Decision Rules Using Choquet Integral
pp. 812
Predicting Time Series Using Incremental Langrangian Support Vector Regression
pp. 789
Lessons from the Application of Domain-Independent Data Mining System for Discovering Web User Access Patterns
pp. 797
Application of Hybrid Recommendation in Web-Based Cooking Assistant
pp. 920
A Novel Constrained Genetic Algorithm for the Optimization of Active Bar Placement and Feedback Gains in Intelligent Truss Structures
pp. 928
A Double-Stage Genetic Optimization Algorithm for Portfolio Selection
pp. 820
Land Cover Classification from MODIS Satellite Data Using Probabilistically Optimal Ensemble of Artificial Neural Networks
pp. 1055
Next Generation Networks Architecture and Layered End-to-End QoS Control
pp. 954
The Hybrid Genetic Algorithm for Blind Signal Separation
pp. 1065
FairOM: Enforcing Proportional Contributions Among Peers in Internet-Scale Distributed Systems
pp. 964
Genetic Algorithm for Satellite Customer Assignment
pp. 1077
An Efficient QoS Framework with Distributed Adaptive Resource Management in IPv6 Networks
pp. 843
IdeaCrepe: Creativity Support Tool with History Layers
pp. 974
A Look-Ahead Fuzzy Back Propagation Network for Lot Output Time Series Prediction in a Wafer Fab
pp. 983
Extraction of Fuzzy Features for Detecting Brain Activation from Functional MR Time-Series
pp. 859
An Editing and Displaying System of Olfactory Information for the Home Video
pp. 875
Full Fuzzy-Logic-Based Vector Control for Permanent Magnet Synchronous Motors
pp. 883
Artificial Intelligent Application to Service Restoration Considering Load Balancing in Distribution Networks
pp. 1146
An Effective Cluster-Based Slot Allocation Mechanism in Ad Hoc Networks
pp. 1038
A Fuzzy LMS Neural Network Method for Evaluation of Importance of Indices in MADM
pp. 1055
A Study on Decision Model of Bottleneck Capacity Expansion with Fuzzy Demand
pp. 914
Rule-Based Expert System for Designing DC-DC Converters
pp. 922
DNA-Based Evolutionary Algorithm for Cable Trench Problem
pp. 956
Spatial Equilibrium Model on Regional Analysis for the Trade Liberalization of Fluid Milk in Taiwan
pp. 964
Analysing the Density of Subgroups in Valued Relationships Based on DNA Computing
pp. 1113
FPGA Discrete Wavelet Transform Encoder/Decoder Implementation
pp. 972
Structural Learning of Neural Networks for Forecasting Stock Prices
pp. 1122
Randomized Algorithm in Embedded Crypto Module
pp. 1004
An Approach to Resolving Semantic Conflicts of Temporally-Vague Observations in Artificial Cognitive Agent
pp. 1020
Towards a Computational Framework for Modeling Semantic Interactions in Large Multiagent Communities
pp. 1178
Towards Hardware Acceleration of Neuroevolution for Multimedia Processing Applications on Mobile Devices
pp. 1075
Design of DRM-LMS Model in M-Learning Environment
pp. 1092
A Semantic Recommender Engine Enabling an eTourism Scenario
pp. 1111
Evolutionary ANNs for Improving Accuracy and Efficiency in Document Classification Methods
pp. 1168
Distributed Face Recognition: A Multiagent Approach
pp. 1201
Autonomy and Intelligence – Opportunistic Service Delivery in Mobile Computing
pp. 1256
The Performance of LVQ Based Automatic Relevance Determination Applied to Spontaneous Biosignals
pp. 1264
Alertness Assessment Using Data Fusion and Discrimination Ability of LVQ-Networks
pp. 1272
Signal Reconstruction by Projection Filter with Preservation of Preferential Components
pp. E1
Comparison of Squall Line Positioning Methods Using Radar Data
Similar content
761
Knowledge Management in a Global Context
Authors:
Paul Bookhamer
,
Zuopeng (Justin) Zhang
Understanding trade pathways to target biosecurity surveillance
Authors:
Manuel Colunga-Garcia
,
Robert Haack
,
Roger Magarey
…
Minimizing UCB: a Better Local Search Strategy in Local Bayesian Optimization
Authors:
Zheyi Fan
,
Wenyu Wang
,
Szu Hui Ng
…
See all similar
Cited by
122
Consumer and Object Experience in the Internet of Things: An Assemblage Theory Approach
Authors:
Donna Hoffman
,
Thomas P. Novak
,
Eileen Fischer
…
Survey of Fog Computing: Fundamental, Network Applications, and Research Challenges
Authors:
Di Wang
,
Lei Shu
,
Mithun Mukherjee
Fog Computing for the Internet of Things
Authors:
Carlo Puliafito
,
Enzo Mingozzi
,
Francesco Longo
…
See all cited by