ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
4
views
0
references
Top references
cited by
10
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,040
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Foundations and Practice of Security
Multi-dimensional Function Approximation and Regression Estimation
other
Author(s):
Fernando Pérez-Cruz
,
Gustavo Camps-Valls
,
Emilio Soria-Olivas
,
Juan José Pérez-Ruixo
,
Aníbal R. Figueiras-Vidal
,
Antonio Artés-Rodríguez
Publication date
(Online):
August 21 2002
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Genomic Prediction: Relatedness Matrix Estimation
Author and book information
Book Chapter
Publication date (Print):
2002
Publication date (Online):
August 21 2002
Pages
: 757-762
DOI:
10.1007/3-540-46084-5_123
SO-VID:
6a8fcc29-3315-44f7-9dd7-8c9220429f05
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. E1
Erratum: Superpolynomial Speedups Based on Almost Any Quantum Circuit
pp. 1
How Unique and Traceable Are Usernames?
pp. 1
A Proposal for Task-Generating Loops in OpenMP*
pp. 1
Persuasive Technology for Human Well-Being: Setting the Scene
pp. 1
A Hybrid Approach for Robust Multilingual Toponym Extraction and Disambiguation
pp. 1
Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer
pp. 1
From Marriages to Coalitions: A Soft CSP Approach
pp. 1
A Brief Survey of Quantum Programming Languages
pp. 1
Spectral Sparsification in Dynamic Graph Streams
pp. 1
Secure and Privacy Preserving Outsourcing of Tree Structured Data
pp. 1
Automated Analysis of Asynchronously Communicating Systems
pp. 1
Counting Distinct Elements in a Data Stream
pp. 1
Probabilistic Inductive Logic Programming
pp. 1
Model Based Testing with Labelled Transition Systems
pp. 1
OpenDLibG: Extending OpenDLib by Exploiting a gLite Grid Infrastructure
pp. 1
BitBlaze: A New Approach to Computer Security via Binary Analysis
pp. 1
2D-3D Pose Tracking of Rigid Instruments in Minimally Invasive Surgery
pp. 1
Multiword Expressions: A Pain in the Neck for NLP
pp. 1
On-the-Fly Exact Computation of Bisimilarity Distances
pp. 1
Identifying and Filtering Near-Duplicate Documents
pp. 1
Sentiment Knowledge Discovery in Twitter Streaming Data
pp. 1
The genesis of attribute grammars
pp. 1
The Value of Information Visualization
pp. 1
Distributional Sentence Entailment Using Density Matrices
pp. 1
Emergence Versus Self-Organisation: Different Concepts but Promising When Combined
pp. 1
Abstract Scalars, Loops, and Free Traced and Strongly Compact Closed Categories
pp. 1
Type Grammar Revisited
pp. 1
Proving Program Invariance and Termination by Parametric Abstraction, Lagrangian Relaxation and Semidefinite Programming
pp. 1
A Framework for Point-Free Program Transformation
pp. 1
Epileptic Seizure Prediction and the Dimensionality Reduction Problem
pp. 2
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
pp. 3
The CLSA Model: A Novel Framework for Concept-Level Sentiment Analysis
pp. 3
HEVC Double Compression Detection Based on SN-PUPM Feature
pp. 3
Approximate Furthest Neighbor in High Dimensions
pp. 3
Combining Node Identifier Features and Community Priors for Within-Network Classification
pp. 3
A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels
pp. 3
Experimenting with a Context-Aware Language
pp. 3
Social Content Management: A Study on Issues and Challenges
pp. 5
How to use EISPACK
pp. 5
Towards Explainable Artificial Intelligence
pp. 5
A Sober Look at Clustering Stability
pp. 6
The APEX Framework: Prototyping of Ubiquitous Environments Based on Petri Nets
pp. 10
Comparative Analysis of Power Consumption in University Buildings Using envSOM
pp. 11
Lawvere Categories as Composed PROPs
pp. 11
Population-Based Incremental with Adaptive Learning Rate Strategy
pp. 11
Submodular Functions, Matroids, and Certain Polyhedra
pp. 11
Robust Real-Time Visual Odometry for Stereo Endoscopy Using Dense Quadrifocal Tracking
pp. 14
An Introduction to Restricted Boltzmann Machines
pp. 14
Trajectory and Force Generation with Multi-constraints for Robotic Belt Grinding
pp. 14
Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups
pp. 14
General-Purpose Digital Library Content Laboratory Systems
pp. 15
Worldwide Pose Estimation Using 3D Point Clouds
pp. 15
Computing the K Shortest Paths: A New Algorithm and an Experimental Comparison
pp. 15
Using OpenMP under Android
pp. 16
Robust Features for Snapshot Hyperspectral Terrain-Classification
pp. 17
Kernelization: New Upper and Lower Bound Techniques
pp. 17
Intrusion of Agent-Based Social Simulation in Economic Theory
pp. 17
Retrieval of Semantic Workflows with Knowledge Intensive Similarity Measures
pp. 18
Audio Story and AR Platform for Youth Engagement
pp. 18
Generating Maximal Domino Patterns by Cellular Automata Agents
pp. 19
Symbolic Game Semantics for Model Checking Program Families
pp. 19
Swept Volume Parameterization for Isogeometric Analysis
pp. 19
An Agent Architecture for Simulating Communication Dynamics in Social Media
pp. 19
Electronic Forms-Based Model of Public Administration Operations
pp. 20
Personality-Dependent Referring Expression Generation
pp. 20
BodyNet: Volumetric Inference of 3D Human Body Shapes
pp. 20
Defining Context-Free Power Series Coalgebraically
pp. 21
Holistic Mapping of Striatum Surfaces in the Laplace-Beltrami Embedding Space
pp. 21
The ASTREÉ Analyzer
pp. 21
Semi-Supervised Classification Using Tree-Based Self-Organizing Maps
pp. 23
Transparency: Motivations and Challenges
pp. 24
The Complexity of Boolean Formula Minimization
pp. 24
Shape versus Size: Improved Understanding of the Morphology of Brain Structures
pp. 25
A Hybrid Logic for Commonsense Spatial Reasoning
pp. 25
Distributivity of Implication Operations over t-Representable T-Norms Generated from Nilpotent T-Norms
pp. 25
Detection of Electrophysiology Catheters in Noisy Fluoroscopy Images
pp. 25
Design of Quadrotor Unmanned Aerial Vehicle
pp. 25
Efficient Large-Scale Stereo Matching
pp. 25
Towards a Capabilities Approach to Smart City Management
pp. 25
Finding Dense Subgraphs with Size Bounds
pp. 26
A Brief Tour of Theoretical Tile Self-Assembly
pp. 26
Compositionality Entails Sequentializability
pp. 26
This ‘Paper’ is a Demo
pp. 27
Recording and Playback of Camera Shake: Benchmarking Blind Deconvolution with a Real-World Database
pp. 27
Clustering Heuristics for Efficient t-closeness Anonymisation
pp. 28
A Convolutional Neural Network Approach for Post-Processing in HEVC Intra Coding
pp. 28
A Boosted Particle Filter: Multitarget Detection and Tracking
pp. 29
Exploiting Motion Capture to Enhance Avoidance Behaviour in Games
pp. 29
The Generalized PatchMatch Correspondence Algorithm
pp. 30
Managing Uncertainty in Databases and Scaling It Up to Concurrent Transactions
pp. 30
Using Virtual Reality to Examine Hazard Perception in Package Design
pp. 31
Proximity operators for qualitative spatial reasoning
pp. 31
Safe and Secure Networked Control Systems under Denial-of-Service Attacks
pp. 31
Maintaining the extent of a moving point set
pp. 31
Recaptured Image Forensics Based on Quality Aware and Histogram Feature
pp. 32
Csiszár’s Divergences for Non-negative Matrix Factorization: Family of New Algorithms
pp. 32
Accessible UI Design and Multimodal Interaction through Hybrid TV Platforms: Towards a Virtual-User Centered Design Framework
pp. 34
Establishing Qualitative Properties for Probabilistic Lossy Channel Systems
pp. 35
Mammographic Mass Segmentation with Online Learned Shape and Appearance Priors
pp. 35
The Role of MAS as a Decision Support Tool in a Water-Rights Market
pp. 36
The PlusCal Algorithm Language
pp. 36
Towards “Smart Governance” Through a Multidisciplinary Approach to E-government Integration, Interoperability and Information Sharing: A Case of the LMIP Project in South Africa
pp. 36
A Study on Bilingual Speech Recognition Involving a Minority Language
pp. 37
A Non-dominated Sorting Particle Swarm Optimizer for Multiobjective Optimization
pp. 37
Simulation of Collaborative Innovation System in Cluster Environment
pp. 37
Models and Meta Models for Transactions in Web Applications
pp. 38
Finding and Analyzing Evil Cities on the Internet
pp. 38
Verification of Time-Aware Business Processes Using Constrained Horn Clauses
pp. 39
A Technique for Agile and Automatic Interaction Testing for Product Lines
pp. 39
Optimal algorithms for List Indexing and Subset Rank
pp. 39
Consequences of Faster Alignment of Sequences
pp. 40
Notes on Triangular Sets and Triangulation-Decomposition Algorithms II: Differential Systems
pp. 41
Team-Oriented Task Planning in Spatial Crowdsourcing
pp. 41
Multi-label Testing for CO2RBFN: A First Approach to the Problem Transformation Methodology for Multi-label Classification
pp. 42
A Mixed-Method Approach on Digital Educational Games for K12: Gender, Attitudes and Performance
pp. 42
Adaptive Cruise Control: Hybrid, Distributed, and Now Formally Verified
pp. 42
S2D: Shared Distributed Datasets, Storing Shared Data for Multiple and Massive Queries Optimization in a Distributed Data Warehouse
pp. 43
AMPLE: A Novel Incentive Approach to Adaptive-Width Channel Allocation in Multi-hop, Non-cooperative Wireless Networks
pp. 44
Differential Dementia Diagnosis on Incomplete Data with Latent Trees
pp. 45
Self-assemblying Classes of Shapes with a Minimum Number of Tiles, and in Optimal Time
pp. 45
Synthesis of OCL Pre-conditions for Graph Transformation Rules
pp. 45
Manycore Parallelism through OpenMP
pp. 45
OpenAIRE LOD Services: Scholarly Communication Data as Linked Data
pp. 47
Defeating Software Mitigations Against Rowhammer: A Surgical Precision Hammer
pp. 47
Likely Scenarios of Intron Evolution
pp. 47
New Channels, New Possibilities: A Typology and Classification of Social Robots and Their Role in Multi-channel Public Service Delivery
pp. 48
Elementary Landscape Decomposition of the Test Suite Minimization Problem
pp. 48
Time and Exceptional Behavior in Multiparty Structured Interactions
pp. 49
Graph-Constrained Sparse Construction of Longitudinal Diffusion-Weighted Infant Atlases
pp. 50
Visualization-Driven Approach to Anomaly Detection in the Movement of Critical Infrastructure
pp. 50
Model-Connected Safety Cases
pp. 51
Reasoned Modelling with Event-B
pp. 52
Secure Human Identification Protocols
pp. 53
Enforcing Privacy in Cloud Databases
pp. 53
An Incremental Super-Linear Preferential Internet Topology Model
pp. 54
Implications of Graphics on Usability and Accessibility for the Voter
pp. 54
Self-stabilizing Robots in Highly Dynamic Environments
pp. 55
Symbolic verification with periodic sets
pp. 56
Counting Successes: Effects and Transformations for Non-deterministic Programs
pp. 57
Objects as Attributes for Scene Classification
pp. 57
A Preliminar Analysis of CO2RBFN in Imbalanced Problems
pp. 57
Using SPIN for the Optimized Scheduling of Discrete Event Systems in Manufacturing
pp. 57
Hierarchical Classification of HTML Documents with WebClassII
pp. 58
A Coalgebraic Perspective on Minimization and Determinization
pp. 58
Comparing Gestures and Traditional Interaction Modalities on Large Displays
pp. 59
Risk Modelling of Blockchain Ecosystem
pp. 60
Diagonal Circuit Identity Testing and Lower Bounds
pp. 60
Semantic Security and Indistinguishability in the Quantum World
pp. 60
Using Markov Chains for Link Prediction in Adaptive Web Sites
pp. 60
Hidden Markov Model Based 2D Shape Classification
pp. 61
SLOPE: Structural Locality-Aware Programming Model for Composing Array Data Analysis
pp. 61
Color Image Registration under Illumination Changes
pp. 61
OurGrid: An Approach to Easily Assemble Grids with Equitable Resource Sharing
pp. 61
Quantum Entanglement and the Communication Complexity of the Inner Product Function
pp. 62
An EMO Algorithm Using the Hypervolume Measure as Selection Criterion
pp. 63
Triphone Statistics for Polish Language
pp. 63
Exact Discretization of 3-Speed Rational Signal Machines into Cellular Automata
pp. 63
Testing Probabilistic Distributed Systems
pp. 64
Model Checking Normative Agent Organisations
pp. 65
MaxSAT-Based Scheduling of B2B Meetings
pp. 65
Large Scale Tag Recommendation Using Different Image Representations
pp. 67
Bioinformatics’ Challenges to Computer Science
pp. 67
Image Diffusion Using Saliency Bilateral Filter
pp. 68
Expressiveness Issues and Decision Problems for Active Database Event Queries
pp. 68
Recent Results on the Algebraic Approach to the CSP
pp. 69
Improved Indoor Positioning System Using BLE Beacons and a Compensated Gyroscope Sensor
pp. 70
Parkinson’s Disease Identification Using Restricted Boltzmann Machines
pp. 70
Reverse and Forward Post Processors for a Robot Machining System
pp. 71
What: Web-Based Haskell Adaptive Tutor
pp. 71
Evaluating OpenMP Tasking at Scale for the Computation of Graph Hyperbolicity
pp. 72
Analysis of Dropout Learning Regarded as Ensemble Learning
pp. 72
LiMoSense – Live Monitoring in Dynamic Sensor Networks
pp. 75
Traveling to Rome: QoS Specifications for Automated Storage System Management
pp. 75
A Web Proxy Cache Coherency and Replacement Approach
pp. 77
Interactive Animation Editing Based on Sketch Interaction
pp. 77
Making Sense of Large Heaps
pp. 78
River Basin Management with Spin
pp. 78
Quality Assessment of Business Process Models Based on Thresholds
pp. 78
FPGA-Based Prototyping for Product Definition
pp. 78
Specification and Testing of E-Commerce Agents Described by Using UIOLTSs
pp. 79
The Twelf Proof Assistant
pp. 80
Execution times for EISPACK
pp. 80
Induction for SMT Solvers
pp. 81
Modelling Metrics for Transparency in Medical Systems
pp. 81
Fair Computation with Rational Players
pp. 81
Classification of EEG in A Steady State Visual Evoked Potential Based Brain Computer Interface Experiment
pp. 81
A Near-Data Processing Server Architecture and Its Impact on Data Center Applications
pp. 81
Towards an Integrated Graph Algebra for Graph Pattern Matching with Gremlin
pp. 82
Multi-camera Scene Reconstruction via Graph Cuts
pp. 82
Specification of Genetic Search Directions in Cellular Multi-objective Genetic Algorithms
pp. 83
Learning Optical Flow
pp. 83
An Approach of Solid Waste Monitoring with Smart Dumpsters and Disposal
pp. 83
On the Security of Joint Signature and Encryption
pp. 84
FGb: A Library for Computing Gröbner Bases
pp. 84
Improving the Flexibility of the Deficit Table Scheduler
pp. 84
Online Multi-target Tracking with Strong and Weak Detections
pp. 84
ST-Hadoop: A MapReduce Framework for Spatio-Temporal Data
pp. 85
A Learning Method for Automated Polyp Detection
pp. 85
An Abstract Domain of Uninterpreted Functions
pp. 85
Computational Analysis of a Power Distribution System with Petri Nets
pp. 85
A Community-Aware Approach to Minimizing Dissemination in Graphs
pp. 86
Autonomous Self-deployment of Wireless Access Networks in an Airport Environment
pp. 87
Auto-Tracking Controversial Topics in Social-Media-Based Customer Dialog: A Case Study on Starbucks
pp. 87
MS-Celeb-1M: A Dataset and Benchmark for Large-Scale Face Recognition
pp. 88
A Comparative Study of Users’ Microblogging Behavior on Sina Weibo and Twitter
pp. 89
Multifocal: A Strategic Bidirectional Transformation Language for XML Schemas
pp. 90
Stream Automata Are Coalgebras
pp. 91
Improved Genetic Algorithm for Minimizing Periodic Preventive Maintenance Costs in Series-Parallel Systems
pp. 91
The Hidden Image of the City: Sensing Community Well-Being from Urban Mobility
pp. 91
A General Framework for Multiple Choice Question Answering Based on Mutual Information and Reinforced Co-occurrence
pp. 92
How Many Cases Do You Need? Assessing and Predicting Case-Base Coverage
pp. 92
Linguistic Restrictions in Automatic Translation from Written Spanish to Mexican Sign Language
pp. 93
Robust Precise Eye Location by Adaboost and SVM Techniques
pp. 94
Geographic Expansion of Queries to Improve the Geographic Information Retrieval Task
pp. 94
A CAD System for 3D Locating of Lesions in Mammogram
pp. 95
Online Lattice-Based Abstraction of User Groups
pp. 95
An Example of an Automatic Differentiation-Based Modelling System
pp. 95
Codeco: A Practical Notation for Controlled English Grammars in Predictive Editors
pp. 96
How Symbolic Animation Can Help Designing an Efficient Formal Model
pp. 96
ProbVerus: Probabilistic Symbolic Model Checking
pp. 96
Off-Line Test Selection with Test Purposes for Non-deterministic Timed Automata
pp. 96
Thwarting the Nigritude Ultramarine: Learning to Identify Link Spam
pp. 97
Augmented Complex Zonotopes for Computing Invariants of Affine Hybrid Systems
pp. 97
A Convolutional Network Model of the Primate Middle Temporal Area
pp. 98
What’s in a Name?
pp. 98
7. Observation equivalence and its properties
pp. 98
A proposed architecture for trusted third party services
pp. 99
Psi-calculi in Isabelle
pp. 99
NameNode and DataNode Coupling for a Power-Proportional Hadoop Distributed File System
pp. 99
The Behavior and Network Position of Peer Production Founders
pp. 99
Mixed Wavelet-Based Neural Network Model for Cyber Security Situation Prediction Using MODWT and Hurst Exponent Analysis
pp. 99
Designing Pervasive Games for Learning
pp. 99
Selecting Security Mechanisms in Secure Tropos
pp. 100
Evaluation of the Resource Requirements of SNMP Agents on Constrained Devices
pp. 100
Clustering-Based Leaders’ Selection in Multi-Objective Particle Swarm Optimisation
pp. 100
Information Retrieval Techniques for Corpus Filtering Applied to External Plagiarism Detection
pp. 101
Cyber-Physical Systems and Events
pp. 102
On the Construction of Side-Channel Attack Resilient S-boxes
pp. 102
Solving Connected Subgraph Problems in Wildlife Conservation
pp. 102
Ethnography, Ethnography or Ethnography? What Happens When the Same Word Means Different Things to Different People?
pp. 102
Using Imageability and Topic Chaining to Locate Metaphors in Linguistic Corpora
pp. 102
Machine Learning Approach to the Process of Question Generation
pp. 102
Automatically validating temporal safety properties of interfaces
pp. 103
A Secure and Optimally Efficient Multi-Authority Election Scheme
pp. 104
Autonomous Agent Behaviour Modelled in PRISM – A Case Study
pp. 104
Tabu Search Techniques for Examination Timetabling
pp. 105
Towards Scaling Fully Personalized PageRank
pp. 105
Adaptively Choosing Neighbourhood Bests Using Species in a Particle Swarm Optimizer for Multimodal Function Optimization
pp. 105
Approximate Vehicle Waiting Time Estimation Using Adaptive Video-Based Vehicle Tracking
pp. 105
Dynamic programming on graphs with bounded treewidth
pp. 105
Bayesian Network Models in Cyber Security: A Systematic Review
pp. 106
Procedural Graphics Model and Behavior Generation
pp. 106
Intra-patient Non-rigid Registration of 3D Vascular Cerebral Images
pp. 107
Towards a Conceptual Model of Talking to a Route Planner
pp. 107
SMOTEBoost: Improving Prediction of the Minority Class in Boosting
pp. 107
Supporting Human Activities — Exploring Activity-Centered Computing
pp. 107
A proposal for a set of parallel basic linear algebra subprograms
pp. 109
Proofs of Retrievability via Hardness Amplification
pp. 110
Java in the Safety-Critical Domain
pp. 111
The Online Tracking Horde: A View from Passive Measurements
pp. 111
Capturing the Uncertainty of Moving-Object Representations
pp. 111
Process Algebra with Probabilistic Choice
pp. 111
A Block-Free Distributed Ledger for P2P Energy Trading: Case with IOTA?
pp. 112
The Complexity of Solving Stochastic Games on Graphs
pp. 112
Quantitative Multi-objective Verification for Probabilistic Systems
pp. 113
Dynamic Task Partitioning for Foraging Robot Swarms
pp. 115
Action Patterns in Business Process Models
pp. 115
RFID-Tags for Anti-counterfeiting
pp. 116
Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts
pp. 116
A General Adaptive Cache Coherency-Replacement Scheme for Distributed Systems
pp. 117
Guiding User Adaptation in Serious Games
pp. 118
An Open Architecture for Service-Oriented Virtual Organizations
pp. 119
Probabilistic Public Key Encryption with Equality Test
pp. 119
Understanding the Determinants of Privacy-ABC Technologies Adoption by Service Providers
pp. 119
Bio-inspired Phonologic Processing: From Vowel Representation Spaces to Categories
pp. 119
The arrow distributed directory protocol
pp. 120
Protein Fold Recognition Based Upon the Amino Acid Occurrence
pp. 120
Partial Reversibility of One-Dimensional Cellular Automata
pp. 121
Edit distance for genome comparison based on non-local operations
pp. 121
How to Explore a Fast-Changing World (Cover Time of a Simple Random Walk on Evolving Graphs)
pp. 121
Cartesian Genetic Programming
pp. 121
Heavy-tailed distributions in combinatorial search
pp. 121
Cuckoo Hashing
pp. 122
Low-Attention Forwarding for Mobile Network Covert Channels
pp. 122
Taboo Evolutionary Programming Approach to Optimal Transfer from Earth to Mars
pp. 123
Automating Biomedical Data Science Through Tree-Based Pipeline Optimization
pp. 123
Predico: A System for What-if Analysis in Complex Data Center Applications
pp. 124
“Good” and “Bad” Diversity in Majority Vote Ensembles
pp. 124
Using an Agent-Supported Simulation Environment for Intelligent Manufacturing Systems
pp. 125
On the Ontological Status of Norms
pp. 125
Reachability in MDPs: Refining Convergence of Value Iteration
pp. 125
OntoFIS as a NLP Resource in the Drug-Therapy Domain: Design Issues and Solutions Applied
pp. 126
9. Translation into CCS
pp. 127
Benchmarks for Parity Games
pp. 127
Towards Participatory E-Government?: Learning from E-Government Project Evaluations
pp. 127
Efficient Guiding Strategies for Testing of Temporal Properties of Hybrid Systems
pp. 127
Computational Institutions for Modelling Norm-Regulated MAS: An Approach Based on Coordination Artifacts
pp. 128
Efficient CTMC Model Checking of Linear Real-Time Objectives
pp. 129
Real-Time Strategy Synthesis for Timed-Arc Petri Net Games via Discretization
pp. 130
An Alpha-Corecursion Principle for the Infinitary Lambda Calculus
pp. 131
Certification and availability of EISPACK
pp. 133
Kurosawa-Desmedt Meets Tight Security
pp. 133
UNO Is Hard, Even for a Single Player
pp. 134
Orchestrating Security and System Engineering for Evolving Systems
pp. 134
Anomaly Monitoring Framework Based on Intelligent Data Analysis
pp. 134
Simplified Reeb Graph as Effective Shape Descriptor for the Striatum
pp. 135
Generation of Curved Planar Reformations from Magnetic Resonance Images of the Spine
pp. 135
Robust Long-Term Aerial Video Mosaicking by Weighted Feature-Based Global Motion Estimation
pp. 135
Implementing Joins Using Extensible Pattern Matching
pp. 137
Hiding Routing information
pp. 138
10. Determinancy and confluence
pp. 140
Evacuating Robots from a Disk Using Face-to-Face Communication (Extended Abstract)
pp. 140
Efficient Detection of the Return-Oriented Programming Malicious Code
pp. 140
An Agent-Based Approach for the Dynamic and Decentralized Service Reconfiguration in Collaborative Production Scenarios
pp. 141
Towards Agents for Policy Making
pp. 141
An Active Contour Model without Edges
pp. 141
An Efficient OpenMP Loop Scheduler for Irregular Applications on Large-Scale NUMA Machines
pp. 141
The Equational Theory of Weak Complete Simulation Semantics over BCCSP
pp. 142
Organizational Learning to Leverage Benefits Realization Management; Evidence from a Municipal eHealth Effort
pp. 142
A Gender-Based Genetic Algorithm for the Automatic Configuration of Algorithms
pp. 143
Practical Private Set Intersection Protocols with Linear Complexity
pp. 143
Monitoring Internet Censorship with UBICA
pp. 144
Kernels and Regularization on Graphs
pp. 145
Efficient Multi-resolution Plane Segmentation of 3D Point Clouds
pp. 145
Distributed (Δ + 1)-Coloring in the Physical Model
pp. 146
Fast Automatic Heuristic Construction Using Active Learning
pp. 146
Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data
pp. 146
Maximum Likely Scale Estimation
pp. 147
Linking Operational Business Intelligence with Value-Based Business Requirements
pp. 147
Tax Compliance in a Simulated Heterogeneous Multi-agent Society
pp. 149
Coding Efficiency Preserving Steganography Based on HEVC Steganographic Channel Model
pp. 149
A Case for Abstract Cost Models for Distributed Execution of Analytics Operators
pp. 149
Observing the Effects of Overdesign in the Automatic Design of Control Software for Robot Swarms
pp. 150
Lax Extensions of Coalgebra Functors
pp. 151
Using VCL as an Aspect-Oriented Approach to Requirements Modelling
pp. 152
Performance Evaluation of Grid-Enabled Registration Algorithms Using Bronze-Standards
pp. 152
Dragging Proofs Out of Pictures
pp. 153
Scaling Java Points-to Analysis Using Spark
pp. 154
Security Model for Informational Privacy
pp. 154
The 1st Verified Software Competition: Experience Report
pp. 155
‘What Data?’ Records and Data Policy Coordination During Presidential Transitions
pp. 155
Certificate-Driven Grid Workflow Paradigm Based on Service Computing
pp. 156
Locality-Aware Task Scheduling and Data Distribution on NUMA Systems
pp. 157
A Model Based on Biological Invasions for Island Evolutionary Algorithms
pp. 157
Elliptic Curve Cryptography in Practice
pp. 158
Exercising Qualitative Control in Autonomous Adaptive Survivable Systems
pp. 158
Cardholder’s Reputation System for Contextual Risk Management in Payment Transactions
pp. 158
3D Reconstruction of a Moving Point from a Series of 2D Projections
pp. 159
Flexible Data Cubes for Online Aggregation
pp. 159
Algorithms for the Shortest and Closest Lattice Vector Problems
pp. 160
Operationalizing Data Governance via Multi-level Metadata Management
pp. 160
Time abstracted bisimulation: Implicit specifications and decidability
pp. 160
Least Channel Variation Multi-channel MAC (LCV-MMAC)
pp. 161
Using High-Dimensional Image Models to Perform Highly Undetectable Steganography
pp. 161
Social Context-Aware Trust Prediction: Methods for Identifying Fake News
pp. 161
Workflow Verification: Finding Control-Flow Errors Using Petri-Net-Based Techniques
pp. 162
A Multiobjective Evolutionary Algorithm for Numerical Parameter Space Characterization of Reaction Diffusion Systems
pp. 163
Distributed Contention Resolution in Wireless Networks
pp. 163
DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications
pp. 164
“When and Where Do You Want to Hide?” – Recommendation of Location Privacy Preferences with Local Differential Privacy
pp. 164
Extended First-Order Logic
pp. 164
Efficient Dynamic Pinning of Parallelized Applications by Reinforcement Learning with Applications
pp. 164
Quantum Walks on the Hypercube
pp. 165
Sensitivity Analysis for the Purposes of Parameter Identification of a S. cerevisiae Fed-Batch Cultivation
pp. 165
HiBB 2010: Workshop on High Performance Bioinformatics and Biomedicine
pp. 165
Schedulability Analysis of Distributed Real-Time Sensor Network Applications Using Actor-Based Model Checking
pp. 167
Plan Acquisition in a BDI Agent Framework Through Intentional Learning
pp. 167
Sparse Hidden Markov Models for Surgical Gesture Classification and Skill Evaluation
pp. 168
Scatter Search for Graph Coloring
pp. 169
Deep Multi-label Hashing for Large-Scale Visual Search Based on Semantic Graph
pp. 169
An Android Vulnerability Detection System
pp. 170
Finding Graph Matchings in Data Streams
pp. 171
Jtlv: A Framework for Developing Verification Algorithms
pp. 171
Introspective Knowledge Revision in Textual Case-Based Reasoning
pp. 172
Tracking Endocardial Boundary and Motion via Graph Cut Distribution Matching and Multiple Model Filtering
pp. 172
A Prolog processor based on a pattern matching memory device
pp. 172
In Search of Credible News
pp. 172
A Concurrency Control Protocol that Selects Accessible Replicated Pages to Avoid Latch Collisions for B-Trees in Manycore Environments
pp. 172
Comparing the Efficiency of Asynchronous Systems
pp. 173
A Lightweight Elastic Queue Middleware for Distributed Streaming Pipeline
pp. 173
Random Matrix Theory and Covariance Matrix Filtering for Cancer Gene Expression
pp. 173
Function Evaluation Via Linear Programming in the Priced Information Model
pp. 174
Newton Trees
pp. 175
Accurate Performance Estimation for Stochastic Marked Graphs by Bottleneck Regrowing
pp. 175
OGC® Sensor Web Enablement: Overview and High Level Architecture
pp. 177
Track & Trace System with Serialization Prototyping Methodology for Pharmaceutical Industry in EU
pp. 178
Improvement of the Protein–Protein Docking Prediction by Introducing a Simple Hydrophobic Interaction Model: An Application to Interaction Pathway Analysis
pp. 178
Interfaces for Eliciting New User Preferences in Recommender Systems
pp. 179
A Fault Diagnostic Tool Based on a First Principle Model Simulator
pp. 180
Hyperplane sections of fermat varieties in P 3 in char. 2 and some applications to cyclic codes
pp. 181
Combining Expert Knowledge and Learning from Demonstration in Real-Time Strategy Games
pp. 182
Online Stochastic Packing Applied to Display Ad Allocation
pp. 183
Improving Iterated Local Search Solution for the Linear Ordering Problem with Cumulative Costs (LOPCC)
pp. 183
Efficient E-Matching for SMT Solvers
pp. 183
Adaptive and Generic Corner Detection Based on the Accelerated Segment Test
pp. 184
Twin Deep Convolutional Neural Network for Example-Based Image Colorization
pp. 185
Random Walks in Swarm Robotics: An Experiment with Kilobots
pp. 185
A Java Supercompiler and Its Application to Verification of Cache-Coherence Protocols
pp. 185
Cellular Automata on Group Sets and the Uniform Curtis-Hedlund-Lyndon Theorem
pp. 186
Prediction Models for Short-Term Load and Production Forecasting in Smart Electrical Grids
pp. 186
Drawing Graphs with Vertices at Specified Positions and Crossings at Large Angles
pp. 187
A Review of the Norwegian Plain Language Policy
pp. 187
Action Recognition in Surveillance Video Using ConvNets and Motion History Image
pp. 188
Real-Time Video Streaming in Multi-hop Wireless Static Ad Hoc Networks
pp. 189
Optimal Base Encodings for Pseudo-Boolean Constraints
pp. 191
A Simple and Faster Branch-and-Bound Algorithm for Finding a Maximum Clique
pp. 191
Practical Keystroke Timing Attacks in Sandboxed JavaScript
pp. 193
Ontology-Guided Approach to Feature-Based Opinion Mining
pp. 193
A New Cortical Surface Parcellation Model and Its Automatic Implementation
pp. 194
On Detecting Abrupt Changes in Network Entropy Time Series
pp. 195
Enhancing Timetable Solutions with Local Search Methods
pp. 195
Automating DAML-S Web Services Composition Using SHOP2
pp. 196
Formal Certification of a Resource-Aware Language Implementation
pp. 196
On-line scheduling
pp. 197
Efficient Edge-Based Methods for Estimating Manhattan Frames in Urban Imagery
pp. 197
Synthesizing Rulesets for Programmable Robotic Self-assembly: A Case Study Using Floating Miniaturized Robots
pp. 198
A 3D+Time Spatio-temporal Model for Joint Segmentation and Registration of Sparse Cardiac Cine MR Image Stacks
pp. 198
Ranking Images Using Customized Fuzzy Dominant Color Descriptors
pp. 199
Simple and Tight Bounds for Information Reconciliation and Privacy Amplification
pp. 200
Big Data Analytics as a Service for Business Intelligence
pp. 201
A Variety-Sensitive ETL Processes
pp. 201
Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers
pp. 201
Automatic Preparation of Standard Arabic Phonetically Rich Written Corpora with Different Linguistic Units
pp. 201
OpenTM: Traffic Matrix Estimator for OpenFlow Networks
pp. 202
Multi-hop Routing and Scheduling in Wireless Networks in the SINR Model
pp. 202
System Description: Twelf — A Meta-Logical Framework for Deductive Systems
pp. 202
Statistical Model Checking of Black-Box Probabilistic Systems
pp. 203
Leader-Follower Formation Control Based on Artificial Potential Field and Sliding Mode Control
pp. 203
Real-Time Standard Scan Plane Detection and Localisation in Fetal Ultrasound Using Fully Convolutional Neural Networks
pp. 204
End-to-End Unsupervised Deformable Image Registration with a Convolutional Neural Network
pp. 204
Axiomatization of Frequent Sets
pp. 204
Improving Expert Meta-schedulers for Grid Computing through Weighted Rules Evolution
pp. 205
Privacy-Preserving Community-Aware Trending Topic Detection in Online Social Media
pp. 205
Designing Agents for Context-Rich Textual Information Tasks
pp. 206
A Comparative Study of Content Statistics of Coding Regions in an Evolutionary Computation Framework for Gene Prediction
pp. 206
Exploration of a Hybrid Design Based on EEG and Eye Movement
pp. 206
Generating Special-Purpose Stateless Propagators for Arbitrary Constraints
pp. 206
Adaptive Serious Games Using Agent Organizations
pp. 206
Interactive Visualization for OLAP
pp. 208
Approximating the complete Euclidean graph
pp. 209
PerfMemPlus: A Tool for Automatic Discovery of Memory Performance Problems
pp. 210
Developing a Decision Support Tool for Dam Management with SPIN
pp. 210
Formal Ontologies, Exemplars, Prototypes
pp. 211
Nonseparability of Shared Intentionality
pp. 211
Specifying Performance Measures for PEPA
pp. 212
3D Deep Learning for Multi-modal Imaging-Guided Survival Time Prediction of Brain Tumor Patients
pp. 213
From Sinograms to Surfaces: A Direct Approach to the Segmentation of Tomographic Data
pp. 213
Tight Thresholds for Cuckoo Hashing via XORSAT
pp. 213
CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs
pp. 213
Applications of Support Vector Machines for Pattern Recognition: A Survey
pp. 214
Deep Convolutional Neural Network Based Regression Approach for Estimation of Remaining Useful Life
pp. 214
A Mind Map for Brainstorming Sessions with Blind and Sighted Persons
pp. 214
Arrangements of curves in the plane — topology, combinatorics, and algorithms
pp. 215
Wireless Capacity with Arbitrary Gain Matrix
pp. 215
On the Security Expressiveness of REST-Based API Definition Languages
pp. 216
On the Optimal Placement of Mix Zones
pp. 216
Shape Analysis of Human Brain Interhemispheric Fissure Bending in MRI
pp. 217
A Formal Framework for E-Barter Based on Microeconomic Theory and Process Algebras
pp. 217
Lazy Explanations for Constraint Propagators
pp. 218
A Bayesian Approach to Model Checking Biological Systems
pp. 218
Learning from Positive and Unlabeled Examples with Different Data Distributions
pp. 218
Communications in Global Software Development: An Empirical Study Using GTK+ OSS Repository
pp. 219
On Answering Queries in the Presence of Limited Access Patterns
pp. 219
Ten Commandments Ten Years On: Lessons for ASM, B, Z and VSR-net
pp. 220
Generic Algorithms for Scheduling Applications on Hybrid Multi-core Machines
pp. 221
From Local to Global Random Regression Forests: Exploring Anatomical Landmark Localization
pp. 221
Top-k Taxi Recommendation in Realtime Social-Aware Ridesharing Services
pp. 223
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
pp. 223
Deep Learning 3D Shape Surfaces Using Geometry Images
pp. 223
Multi-agent Autonomous Decision Making in Smart Micro-Grids’ Energy Management: A Decentralized Approach
pp. 223
Genetic Operators Significance Assessment in Simple Genetic Algorithm
pp. 224
Thinking Inside the Box: Using Appearance Models and Context Based on Room Geometry
pp. 225
Parallel Pre-processing of Affymetrix Microarray Data
pp. 225
On the Capacity of Oblivious Powers
pp. 226
Privacy-Friendly Energy-Metering via Homomorphic Encryption
pp. 227
GPUMixer: Performance-Driven Floating-Point Tuning for GPU Scientific Applications
pp. 227
Degree Evaluation of NFSR-Based Cryptosystems
pp. 228
The MOSKitt4ME Approach: Providing Process Support in a Method Engineering Context
pp. 229
Fractional Frequency Reuse in Integrated Femtocell/Macrocell Environments
pp. 229
Efficient Privacy-Preserving Face Recognition
pp. 230
A Directional Identification Method Based on Position and Posture of Head for an Omni-directional Mobile Wheelchair Robot
pp. 230
Extracting Various Types of Informative Web Content via Fuzzy Sequential Pattern Mining
pp. 230
A Hub-Based Labeling Algorithm for Shortest Paths in Road Networks
pp. 230
A Pattern Language for Value Modeling in ArchiMate
pp. 231
Evolving Objects: A General Purpose Evolutionary Computation Library
pp. 231
Formally Verifying Isolation and Availability in an Idealized Model of Virtualization
pp. 231
Minimally Invasive Navigation for the Endovascular Treatment of Abdominal Aortic Aneurysm: Preclinical Validation of the Endovax System
pp. 232
Efficient Algorithms for Model Checking Pushdown Systems
pp. 232
The Treelike Assembly Classifier for Pedestrian Detection
pp. 233
Optimizing PolyACO Training with GPU-Based Parallelization
pp. 233
Towards Privacy-Preserving Record Linkage with Record-Wise Linkage Policy
pp. 234
Pointlessness is Better than Listlessness
pp. 234
Audio-Motor Synchronization: The Effect of Mapping Between Kinematics and Acoustic Cues on Geometric Motor Features
pp. 234
Integrating Cluster Analysis to the ARIMA Model for Forecasting Geosensor Data
pp. 235
Easy 4G/LTE IMSI Catchers for Non-Programmers
pp. 237
Intersecting Two Quadrics with GeoGebra
pp. 237
Accessibility of Brainstorming Sessions for Blind People
pp. 237
Trade-Off between Performance and Robustness: An Evolutionary Multiobjective Approach
pp. 239
Attacks and Improvements of QSDC Schemes Based on CSS Codes
pp. 240
Lock-Free and Practical Doubly Linked List-Based Deques Using Single-Word Compare-and-Swap
pp. 241
Analogy-Making for Solving IQ Tests: A Logical View
pp. 242
Regulation and Covering Problems in MP Systems
pp. 243
Nesterov Acceleration for the SMO Algorithm
pp. 243
Cokriging Areal Interpolation for Estimating Economic Activity Using Night-Time Light Satellite Data
pp. 246
Movement Sonification for the Diagnosis and the Rehabilitation of Graphomotor Disorders
pp. 246
Paving Ontological Foundation for Social Engineering Analysis
pp. 246
Constrained Non-monotone Submodular Maximization: Offline and Secretary Algorithms
pp. 247
Runtime-Assisted Shared Cache Insertion Policies Based on Re-reference Intervals
pp. 248
Efficient Büchi Automata from LTL Formulae
pp. 248
Valiant’s Holant Theorem and Matchgate Tensors
pp. 248
Query Languages for Constraint Databases: First-Order Logic, Fixed-Points, and Convex Hulls
pp. 249
On Heterogeneity in Foraging by Ant-Like Colony: How Local Affects Global and Vice Versa
pp. 249
Modelling Multimodal 3D Virtual Environments with Asynchronous Multi-Agent Abstract State Machine
pp. 249
From de Bruijn Graphs to Rectangle Graphs for Genome Assembly
pp. 249
Directional Averages for Motion Segmentation in Discontinuity Preserving Image Registration
pp. 249
Risk Stratification of Lung Nodules Using 3D CNN-Based Multi-task Learning
pp. 249
Habituation and Sensitisation Learning in ASMO Cognitive Architecture
pp. 250
Applying SAT Methods in Unbounded Symbolic Model Checking
pp. 251
Augmented Reality Training of Military Tasks: Reactions from Subject Matter Experts
pp. 252
On the Problem of Revenue Sharing in Multi-domain Federations
pp. 252
Fiber Bundle Estimation and Parameterization
pp. 253
Semi-supervised Learning for Network-Based Cardiac MR Image Segmentation
pp. 254
Facing the Archaeological Looting in Peru by Using Very High Resolution Satellite Imagery and Local Spatial Autocorrelation Statistics
pp. 254
Characterization of the Sick LMS511-20100Pro Laser Range Finder for Simultaneous Localization and Mapping
pp. 255
A Parallel Implementation of the Trace Minimization Eigensolver
pp. 256
Investigating Attachment Behavior of Nodes during Evolution of a Complex Social Network:
pp. 257
$$\ell _2$$ Similarity Metrics for Diffusion Multi-Compartment Model Images Registration
pp. 257
Brane Calculi
pp. 257
On Stochastic Broadcast Control of Swarms
pp. 258
Extracting Powers and Periods in a String from Its Runs Structure
pp. 260
Incremental Analysis of Evolving Administrative Role Based Access Control Policies
pp. 260
Improved Correspondence for DTI Population Studies Via Unbiased Atlas Building
pp. 261
Open Data Platforms and Their Usability: Proposing a Framework for Evaluating Citizen Intentions
pp. 261
Border Samples Detection for Data Mining Applications Using Non Convex Hulls
pp. 262
Büchi Store: An Open Repository of Büchi Automata
pp. 263
Dependency Analysis between CMMI Process Areas
pp. 264
Getting the Most Out of Leakage Detection
pp. 265
Route Assignment for Autonomous Vehicles
pp. 266
Unsupervised Named-Entity Recognition: Generating Gazetteers and Resolving Ambiguity
pp. 266
Sparrows and Owls: Characterisation of Expert Behaviour in StackOverflow
pp. 267
Leader Election Problem versus Pattern Formation Problem
pp. 267
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
pp. 268
A Method for Invariant Generation for Polynomial Continuous Systems
pp. 269
Formal Verification of Piece-Wise Linear Feed-Forward Neural Networks
pp. 270
Efficient Parallel Implementations of Controlled Optimization of Traffic Phases
pp. 270
Map-Based Filters for Fuzzy Entities in Geographical Information Retrieval
pp. 271
Parallel and Hybrid Models for Multi-objective Optimization: Application to the Vehicle Routing Problem
pp. 271
Towards an Evolutionary Procedure for Reverse-Engineering Biological Networks
pp. 272
All the Homes: Zillow and the Operational Context of Data
pp. 272
Constraint Satisfaction Problems and Finite Algebras
pp. 273
On the Practicality of Motion Based Keystroke Inference Attack
pp. 273
Differentially Private Graphical Degree Sequences and Synthetic Graphs
pp. 274
Testing Finitary Probabilistic Processes
pp. 274
Recommending Case Bases: Applications in Social Web Search
pp. 275
A Methodology to Validate MRI/SPECT Registration Methods Using Realistic Simulated SPECT Data
pp. 276
Big Data in the Public Sector. Linking Cities to Sensors
pp. 277
Formal Verification of a Power Controller Using the Real-Time Model Checker Uppaal
pp. 277
The Block Cipher Rijndael
pp. 277
QaldGen: Towards Microbenchmarking of Question Answering Systems over Knowledge Graphs
pp. 279
Functional Incremental Attribute Evaluation
pp. 280
SIA: A supervised inductive algorithm with genetic search for learning attributes based concepts
pp. 280
Natural Actor-Critic
pp. 280
Combinatorial Algorithms for Compressed Sensing
pp. 281
Variational Networks: Connecting Variational Methods and Deep Learning
pp. 282
Fast meldable priority queues
pp. 282
Mind the Gap: Towards Secure 1st-Order Masking in Software
pp. 283
A Learning-Free Approach to Whole Spine Vertebra Localization in MRI
pp. 284
Three-Dimensional Orthogonal Graph Drawing with Optimal Volume
pp. 284
Hippocampus-Specific fMRI Group Activation Analysis with Continuous M-Reps
pp. 285
Learning Models of Activities Involving Interacting Objects
pp. 286
Hierarchy of Surface Models and Irreducible Triangulation
pp. 287
Exact Algorithm for the Maximum Induced Planar Subgraph Problem
pp. 290
Search and Aggregation in XML Documents
pp. 290
Provably Authenticated Group Diffie-Hellman Key Exchange — The Dynamic Case
pp. 291
Personalized Keyword Boosting for Venue Suggestion Based on Multiple LBSNs
pp. 291
AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale
pp. 291
In-Vitro Validation of a Novel Model-Based Approach to the Measurement of Arterial Blood Flow Waveforms from Dynamic Digital X-ray Images
pp. 292
Vampire
pp. 292
IWSSA 2009 PC Co-chairs’ Message
pp. 292
Learning a Limited Text Space for Cross-Media Retrieval
pp. 292
A Reflection on Types
pp. 292
Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems
pp. 292
Adaptive Sampling and Fast Low-Rank Matrix Approximation
pp. 293
Sparsification and Sampling of Networks for Collective Classification
pp. 293
Acyclic Preferences and Existence of Sequential Nash Equilibria: A Formal and Constructive Equivalence
pp. 294
Debugging Method Names
pp. 295
Methods for Combining Statistical Models of Music
pp. 295
Instance Generators and Test Suites for the Multiobjective Quadratic Assignment Problem
pp. 295
Syntax-Motivated Context Windows of Morpho-Lexical Features for Recognizing Time and Event Expressions in Natural Language
pp. 295
Faceted Preference Matching in Recommender Systems
pp. 296
A Probabilistic Framework to Infer Brain Functional Connectivity from Anatomical Connections
pp. 296
Inherent Structure-Guided Multi-view Learning for Alzheimer’s Disease and Mild Cognitive Impairment Classification
pp. 297
Understanding Patch-Based Learning of Video Data by Explaining Predictions
pp. 299
Wait a Minute! A fast, Cross-VM Attack on AES
pp. 300
A Pragmatic Implementation of Non-blocking Linked-lists
pp. 301
License Plate Detection Based on Genetic Neural Networks, Morphology, and Active Contours
pp. 301
The Time Will Tell on You: Exploring Information Leaks in SSH Public Key Authentication
pp. 301
Integrality Gaps of Linear and Semi-Definite Programming Relaxations for Knapsack
pp. 301
Retrospective Correction of the Heel Effect in Hand Radiographs
pp. 302
Taxonomic Semantic Indexing for Textual Case-Based Reasoning
pp. 302
Fault-Tolerant Quantum Computation with Higher-Dimensional Systems
pp. 302
On-line Defragmentation for Run-Time Partially Reconfigurable FPGAs
pp. 303
Exploring on the Role of Open Government Data in Emergency Management
pp. 303
Mining Open Government Data Used in Scientific Research
pp. 306
The Randomized Coloring Procedure with Symmetry-Breaking
pp. 307
An Improved Adaptive Approach for Elitist Nondominated Sorting Genetic Algorithm for Many-Objective Optimization
pp. 308
A Landmark-Based Brain Conformal Parametrization with Automatic Landmark Tracking Technique
pp. 308
The Bose-Hubbard Model is QMA-complete
pp. 308
Morphosyntactic Annotation of Historical Texts. The Making of the Baroque Corpus of Polish
pp. 309
ClaimsKG: A Knowledge Graph of Fact-Checked Claims
pp. 310
Runtime Verification Logics A Language Design Perspective
pp. 310
On the b-Chromatic Number of Graphs
pp. 310
Formalising FinFuns – Generating Code for Functions as Data from Isabelle/HOL
pp. 310
Constraint Satisfaction, Bounded Treewidth, and Finite-Variable Logics
pp. 312
Friendly Human-Machine Interaction in an Adapted Robotized Kitchen
pp. 313
Optimizing proof search in model elimination
pp. 313
From Face Images and Attributes to Attributes
pp. 316
Why and Where: A Characterization of Data Provenance
pp. 316
Clustering with Interactive Feedback
pp. 317
Vision-Based Classification of Developmental Disorders Using Eye-Movements
pp. 318
Ultra-Resolving Face Images by Discriminative Generative Networks
pp. 319
Exploring the Accuracy of a Parallel Cooperative Model for Trajectory-Based Metaheuristics
pp. 319
Formalizing Hilbert’s Grundlagen in Isabelle/Isar
pp. 319
A Simplified Model for Simulating the Execution of a Workflow in Cloud
pp. 320
Modeling an Algebraic Stepper
pp. 321
A Text Cube Approach to Human, Social and Cultural Behavior in the Twitter Stream
pp. 321
Comparing Runtime Systems with Exascale Ambitions Using the Parallel Research Kernels
pp. 323
Updating the Energy Model for Future Exascale Systems
pp. 324
Biometrics to Enhance Smartcard Security
pp. 325
Analysis and Dynamical Simulation of Heart Rate Influence upon Physical Load
pp. 325
CoCoOn: Cloud Computing Ontology for IaaS Price and Performance Comparison
pp. 325
Evaluating 2-DNF Formulas on Ciphertexts
pp. 326
Scalable Unsupervised Domain Adaptation for Electron Microscopy
pp. 326
A Time Series Forecasting Model Based on Deep Learning Integrated Algorithm with Stacked Autoencoders and SVR for FX Prediction
pp. 326
Model Repair for Probabilistic Systems
pp. 326
Efficient Compliance Checking Using BPMN-Q and Temporal Logic
pp. 327
Sentiment Analysis on Twitter to Improve Time Series Contextual Anomaly Detection for Detecting Stock Market Manipulation
pp. 329
Fast Implementation of Curve25519 Using AVX2
pp. 329
New Methods for Splice Site Recognition
pp. 330
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive
pp. 333
Approximating List-Coloring on a Fixed Surface
pp. 334
A Scatter Search Approach for Solving the Automatic Cell Planning Problem
pp. 335
Parameter Sensitivity Analysis in Medical Image Registration Algorithms Using Polynomial Chaos Expansions
pp. 335
Oblivious key escrow
pp. 336
1ML with Special Effects
pp. 338
Integrated Gate and Bus Assignment at Amsterdam Airport Schiphol
pp. 338
Learning Convex Combinations of Continuously Parameterized Basic Kernels
pp. 339
A Ubiquitous Computing Environment for Language Learning
pp. 339
Solving Non-linear Arithmetic
pp. 342
A New Approach to Detect Splice-Sites Based on Support Vector Machines and a Genetic Algorithm
pp. 343
A Computer-Assisted Robotic Ultrasound-Guided Biopsy System for Video-Assisted Surgery
pp. 344
Multiple Reflection Symmetry Detection via Linear-Directional Kernel Density Estimation
pp. 345
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin
pp. 346
A Parallel Corpus Labeled Using Open and Restricted Domain Ontologies
pp. 346
D $$^2$$ 2 IA: Stream Analytics on User-Defined Event Intervals
pp. 347
A Hierarchical Methodology to Specify and Simulate Complex Computational Systems
pp. 348
Ontology-Aided Product Classification: A Nearest Neighbour Approach
pp. 349
MADIS: A Slim Middleware for Database Replication
pp. 350
Investigation of Phase Features of Movement Related Cortical Potentials for Upper-Limb Movement Intention Detection
pp. 353
Applying Trust, Reputation and Intuition Aspects to Support Virtual Communities of Practice
pp. 354
Mining Railway Delay Dependencies in Large-Scale Real-World Delay Data
pp. 354
Designing Viable Multi-sided Data Platforms: The Case of Context-Aware Mobile Travel Applications
pp. 356
Virtual Humans as Centaurs: Melding Real and Virtual
pp. 357
Design of Automatic Mapping System between DDC and CLC
pp. 357
Self-adapting TV Based Applications
pp. 357
The Smoothed Complexity of Edit Distance
pp. 358
A Qualitative Evaluation of Social Support by an Empathic Agent
pp. 360
Embedded Probabilistic Programming
pp. 361
Orthogonal Range Queries in OLAP
pp. 363
An End-to-End Semantic Platform for Nutritional Diseases Management
pp. 363
Inferring the Scope of Negation in Biomedical Documents
pp. 364
Towards Automatic Large-Scale Identification of Birds in Audio Recordings
pp. 364
What Is a Good Nearest Neighbors Algorithm for Finding Similar Patches in Images?
pp. 365
Symbolic Bounded Synthesis
pp. 365
Algorithmic Aspects of Scenario-Based Multi-stage Decision Process Optimization
pp. 365
Athena: Mining-Based Interactive Management of Text Databases
pp. 366
Sorting and searching on the word RAM
pp. 366
The Diet-Aware Dining Table: Observing Dietary Behaviors over a Tabletop Surface
pp. 367
Negligibility relations between real numbers and qualitative labels
pp. 368
Clustering Large Datasets Using Cobweb and K-Means in Tandem
pp. 369
DOI Links on Wikipedia
pp. 369
TheoryGuru: A Mathematica Package to Apply Quantifier Elimination Technology to Economics
pp. 370
Failure Detection and Reactive Teaming for Behavior-Based Subsumption
pp. 370
Second Order Subspace Analysis and Simple Decompositions
pp. 371
Interaction Design Principles in WYRED Platform
pp. 372
Cyclic Anticipation Scheduling in Grid VOs with Stakeholders Preferences
pp. 373
Using Support Vector Machines as Learning Algorithm for Video Categorization
pp. 375
Trace-Based Coinductive Operational Semantics for While
pp. 376
Novel Real-Time Tremor Transduction Technique for Microsurgery
pp. 377
Combining partial order reductions with on-the-fly model-checking
pp. 377
Viral Marketing for Digital Goods in Social Networks
pp. 377
Identifying Influential Twitter Users in the 2011 Egyptian Revolution
pp. 378
Understanding Public Value Creation in the Delivery of Electronic Services
pp. 379
ReaderBench, an Environment for Analyzing Text Complexity and Reading Strategies
pp. 379
MELO 2011 - 1st Workshop on Model-Driven Engineering, Logic and Optimization
pp. 380
A Propositional Approach to Textual Case Indexing
pp. 381
Man-Machine Interaction for an Unmanned Tower Crane Using Wireless Multi-Controller
pp. 383
Parallelizing the Design of Radial Basis Function Neural Networks by Means of Evolutionary Meta-algorithms
pp. 383
Research on the Synchronous Control of the Pneumatic Parallel Robot with Two DOF
pp. 385
Knowledge-Based Diagnosis of Process Systems Using Procedure HAZID Information
pp. 386
Electronic “Pockets of Effectiveness”: E-governance and Institutional Change in St. Petersburg, Russia
pp. 386
Will the Pedestrian Cross? Probabilistic Path Prediction Based on Learned Motion Features
pp. 387
MANETS: High Mobility Can Make Up for Low Transmission Power
pp. 388
A Similarity Measure for Intuitionistic Fuzzy Sets and Its Application in Supporting Medical Diagnostic Reasoning
pp. 388
A Combination Method for Reducing Dimensionality in Large Datasets
pp. 388
A Model-Based Decision Support Tool Using Fuzzy Optimization for Climate Change
pp. 388
Verification as Learning Geometric Concepts
pp. 388
Automatic Lymph Node Cluster Segmentation Using Holistically-Nested Neural Networks and Structured Optimization in CT Images
pp. 391
Position Based Cryptography
pp. 393
Web-Based Human Robot Interaction via Live Video Streaming and Voice
pp. 394
Who Shall We Follow in Twitter for Cyber Vulnerability?
pp. 395
Model Checking Timed UML State Machines and Collaborations
pp. 397
Using Registration Uncertainty Visualization in a User Study of a Simple Surgical Task
pp. 398
A Comparative Study of Three GPU-Based Metaheuristics
pp. 398
Discovering Frequent Closed Itemsets for Association Rules
pp. 398
Joint Representation of Connectome-Scale Structural and Functional Profiles for Identification of Consistent Cortical Landmarks in Human Brains
pp. 398
Redirecting Malware’s Target Selection with Decoy Processes
pp. 399
Dynamic Role Binding in Blockchain-Based Collaborative Business Processes
pp. 400
Grid Patterns and Cultural Expectations in Urban Wayfinding
pp. 401
Upper bound on the communication complexity of private information retrieval
pp. 403
What Is the Best Depth-Map Compression for Depth Image Based Rendering?
pp. 404
Granidt: Towards Gigabit Rate Network Intrusion Detection Technology
pp. 404
A Graphical Rule Authoring Tool for Defeasible Reasoning in the Semantic Web
pp. 404
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners
pp. 405
Object-Shape Recognition Based on Haptic Image
pp. 406
OpenCL Implementation of Particle Swarm Optimization: A Comparison between Multi-core CPU and GPU Performances
pp. 406
Temporal Integration Based Visual Cryptography Scheme and Its Application
pp. 408
Yet Another Survey on Image Segmentation: Region and Boundary Information Integration
pp. 408
Efficient Traversal of Beta-Sheet Protein Folding Pathways Using Ensemble Models
pp. 409
Research on the Semantic Measurement in Co-word Analysis
pp. 409
A Non-CT Based Total Knee Arthroplasty System Featuring Complete Soft-Tissue Balancing
pp. 410
Robustness in the Presence of Liveness
pp. 410
Probabilistic power domains, information systems, and locales
pp. 412
Real-Time Vision Tracking Algorithm
pp. 413
Studying the Evolution of Online Collective Action: Saudi Arabian Women’s ‘Oct26Driving’ Twitter Campaign
pp. 413
Data Mining in the Analysis of Ocean-Atmosphere Dynamics in Colombia’s Central Caribbean Ocean
pp. 415
3D Virtual World BPM Training Systems: Process Gateway Experimental Results
pp. 416
A Statistical Atlas of Prostate Cancer for Optimal Biopsy
pp. 418
Extending Sound Sample Descriptions through the Extraction of Community Knowledge
pp. 418
Formal Proof from UML Models
pp. 418
Solving Structured Sparsity Regularization with Proximal Methods
pp. 423
Adaptive Normative Modelling: A Case Study in the Public-Transport Domain
pp. 424
Fast Vision-Based Road Tunnel Detection
pp. 424
Synchronous Parallel Composition in a Process Calculus for Ecological Models
pp. 424
Multi-way Regression Reveals Backbone of Macaque Structural Brain Connectivity in Longitudinal Datasets
pp. 425
A New Approach to Cutting into Finite Element Models
pp. 426
IDBA – A Practical Iterative de Bruijn Graph De Novo Assembler
pp. 427
Visualization of Range-Constrained Optimal Density Clustering of Trajectories
pp. 428
Interactive Image Segmentation Using an Adaptive GMMRF Model
pp. 428
Object Triggered Egocentric Video Summarization
pp. 428
DigestJoin: Expediting Joins on Solid-State Drives
pp. 429
Deep Karaoke: Extracting Vocals from Musical Mixtures Using a Convolutional Deep Neural Network
pp. 432
Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy
pp. 433
Cultural Heritage and the Semantic Web
pp. 433
GPU Computation in Bioinspired Algorithms: A Review
pp. 435
Business Process as a Service (BPaaS)
pp. 436
Benefits of Bounded Model Checking at an Industrial Setting
pp. 438
Key Element Summarisation: Extracting Information from Company Announcements
pp. 438
Dense Point Trajectories by GPU-Accelerated Large Displacement Optical Flow
pp. 438
Linear domains and linear maps
pp. 440
3D Motion Consistency Analysis for Segmentation in 2D Video Projection
pp. 441
Medial Axis Seeding of a Guided Evolutionary Simulated Annealing (GESA) Algorithm for Automated Gamma Knife Radiosurgery Treatment Planning
pp. 442
A Learning-Rate Schedule for Stochastic Gradient Methods to Matrix Factorization
pp. 443
IT-Enabled Resilient, Seamless and Secure Global Supply Chains: Introduction, Overview and Research Topics
pp. 445
Combining Visual and Textual Systems within the Context of User Feedback
pp. 447
The Performance of a Biologically Plausible Model of Visual Attention to Localize Objects in a Virtual Reality
pp. 447
Could Emotions Be Beneficial for Interaction Quality Modelling in Human-Human Conversations?
pp. 448
Gabor Feature Based Sparse Representation for Face Recognition with Gabor Occlusion Dictionary
pp. 448
Experience in Developing an Open Source Scalable Software Infrastructure in Japan
pp. 449
Financial Crisis, Omori’s Law, and Negative Entropy Flow
pp. 451
Spatial Aggregation of Holistically-Nested Networks for Automated Pancreas Segmentation
pp. 453
Analyzing Political Information Network of the U.S. Partisan Public on Twitter
pp. 454
TS$$^{2}$$2C: Tight Box Mining with Surrounding Segmentation Context for Weakly Supervised Object Detection
pp. 454
Determining the Effects of Data Governance on the Performance and Compliance of Enterprises in the Logistics and Retail Sector
pp. 454
Generation and Application of a Probabilistic Breast Cancer Atlas
pp. 454
Star Shape Prior for Graph-Cut Image Segmentation
pp. 455
Space-Variant Gabor Decomposition for Filtering 3D Medical Images
pp. 456
Space-Time Pose Representation for 3D Human Action Recognition
pp. 456
Falsification of Cyber-Physical Systems Using Deep Reinforcement Learning
pp. 457
A Simulation Framework for Scheduling Performance Evaluation on CPU-GPU Heterogeneous System
pp. 459
The correction of stereotactic inaccuracy caused by brain shift using an intraoperative ultrasound device
pp. 460
Testing equivalence of morphisms on context-free languages
pp. 462
Shortest Paths in One-Counter Systems
pp. 462
Comparing Syntactic-Semantic Patterns and Passages in Interactive Cross Language Information Access (iCLEF at University of Alicante)
pp. 463
Learning V4 Curvature Cell Populations from Sparse Endstopped Cells
pp. 466
Predicting Mobile Call Behavior via Subspace Methods
pp. 467
Monte Carlo Simulations of Spin Glass Systems on the Cell Broadband Engine
pp. 469
Engineering Multilevel Graph Partitioning Algorithms
pp. 470
Failboxes: Provably Safe Exception Handling
pp. 472
Hardware Acceleration for Cryptography Algorithms by Hotspot Detection
pp. 472
Attentional Selection for Object Recognition — A Gentle Way
pp. 472
A Robotized Data Collection Approach for Convolutional Neural Networks
pp. 473
Directional Total Variation Based Image Deconvolution with Unknown Boundaries
pp. 475
Safe-Level-SMOTE: Safe-Level-Synthetic Minority Over-Sampling TEchnique for Handling the Class Imbalanced Problem
pp. 476
Modeling the Interaction between Emergency Communications and Behavior in the Aftermath of a Disaster
pp. 477
A Cultural Algorithm Applied in a Bi-Objective Uncapacitated Facility Location Problem
pp. 478
On High Dimensional Skylines
pp. 478
A Quadratic Edge-Finding Filtering Algorithm for Cumulative Resource Constraints
pp. 482
A Regular Language Membership Constraint for Finite Sequences of Variables
pp. 485
The Two-Edge Connectivity Survivable Network Problem in Planar Graphs
pp. 485
Respond-CAM: Analyzing Deep Models for 3D Imaging Data by Visualizations
pp. 486
Modeling the Dynamics of Dengue Fever
pp. 490
Timed processes of Timed Petri Nets
pp. 491
Rough Set Approach in Ultrasound Biomicroscopy Glaucoma Analysis
pp. 491
Vessel Segmentation for Visualization of MRA with Blood Pool Contrast Agent
pp. 492
Spatial Statistics for Tumor Cell Counting and Classification
pp. 495
Are We Ready for a Safer Construction Environment?
pp. 495
Improving Markov Chain Monte Carlo Estimation with Agent-Based Models
pp. 495
Evaluating Lava Flow Hazard at Mount Etna (Italy) by a Cellular Automata Based Methodology
pp. 496
A Semantic Structure for Digital Theses Collection Based on Domain Annotations
pp. 498
Difference Target Propagation
pp. 499
Segmenting Articulated Structures by Hierarchical Statistical Modeling of Shape, Appearance, and Topology
pp. 500
Stochastic Local Search for Falsification of Hybrid Systems
pp. 503
Taming Living Logic Using Formal Methods
pp. 505
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
pp. 506
Active Gait Rehabilitation Training System Based on Virtual Reality
pp. 507
Validation of Nonlinear Spatial Filtering to Improve Tissue Segmentation of MR Brain Images
pp. 507
Secure High-Rate Transaction Processing in Bitcoin
pp. 508
Detecting Symmetry and Symmetric Constellations of Features
pp. 511
Probabilistic Program Analysis with Martingales
pp. 511
Managing Multiple Isolation Levels in Middleware Database Replication Protocols
pp. 512
Optimal Sensor Placement for Predictive Cardiac Motion Modeling
pp. 513
Term orderings on the polynomial ring
pp. 515
Optimal Selfish Mining Strategies in Bitcoin
pp. 515
Testing Properties of Sets of Points in Metric Spaces
pp. 515
Building Understanding Between Users and Designers Through Participatory Design: The Bonded Design Approach
pp. 522
Mining Relational Association Rules for Propositional Classification
pp. 522
Ontologies Are Us: A Unified Model of Social Networks and Semantics
pp. 523
Authoring Tools for Collaborative Intelligent Tutoring System Environments
pp. 528
Estimation of Cardiac Electrical Propagation from Medical Image Sequence
pp. 532
Public-Key Encryption with Delegated Search
pp. 533
Adapting k-d Trees to Visual Retrieval
pp. 534
Passage Filtering for Open-Domain Question Answering
pp. 538
Using Classification to Evaluate the Output of Confidence-Based Association Rule Mining
pp. 541
Diversified Top-k Keyword Query Interpretation on Knowledge Graphs
pp. 544
Removing Bidirectionality from Nondeterministic Finite Automata
pp. 544
The asymmetric topology of computer science
pp. 544
Concealing IMSI in 5G Network Using Identity Based Encryption
pp. 545
Joint Face Alignment and 3D Face Reconstruction
pp. 545
Decentralised Ground Target Tracking with Heterogeneous Sensing Nodes on Multiple UAVs
pp. 546
Security Monitor Inlining for Multithreaded Java
pp. 549
An Ontology for Computer-Based Decision Support in Rehabilitation
pp. 550
Reckoning With: Information Use and Engaging with Strategic Decisions in High Tech Work
pp. 551
A Fast GPU-Based Motion Estimation Algorithm for H.264/AVC
pp. 551
Virtual Reconstruction of the Ancient State of a Ruined Church
pp. 552
First Stereo Audio Source Separation Evaluation Campaign: Data, Algorithms and Results
pp. 553
Performance Evaluation of Computation and Communication Kernels of the Fast Multipole Method on Intel Manycore Architecture
pp. 556
Regression Forest-Based Atlas Localization and Direction Specific Atlas Generation for Pancreas Segmentation
pp. 556
Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory
pp. 556
Supra-Threshold Fiber Cluster Statistics for Data-Driven Whole Brain Tractography Analysis
pp. 563
On Problems without Polynomial Kernels (Extended Abstract)
pp. 565
Face Recognition after Plastic Surgery: A Comprehensive Study
pp. 565
A Critical Assessment of Some Variants of Particle Swarm Optimization
pp. 565
A Formal Product Search Model with Ensembled Proximity
pp. 566
White Matter Fiber Representation Using Continuous Dictionary Learning
pp. 566
Key-Privacy in Public-Key Encryption
pp. 575
Covert Channels Implementation and Detection in Virtual Environments
pp. 577
Why Should I Pay for the Knowledge in Social Q&A Platforms?
pp. 580
On Dynamic Shortest Paths Problems
pp. 581
Multivariate Mixture Model for Cardiac Segmentation from Multi-Sequence MRI
pp. 585
Proofs of Space
pp. 587
Understanding the Complexity of Induced Subgraph Isomorphisms
pp. 587
A categorical interpretation of Landin's correspondence principle
pp. 589
A Tabu Search Heuristic Based on k-Diamonds for the Weighted Feedback Vertex Set Problem
pp. 589
An Optimal Online Algorithm for Weighted Bipartite Matching and Extensions to Combinatorial Auctions
pp. 589
Efficient Support for In-Place Metadata in Transactional Memory
pp. 589
Hough Transform and 3D SURF for Robust Three Dimensional Classification
pp. 592
Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption
pp. 594
Scalable Fine-Grained Metric-Based Remeshing Algorithm for Manycore/NUMA Architectures
pp. 595
In Use Parameter Estimation of Inertial Sensors by Detecting Multilevel Quasi-static States
pp. 595
Discovering Responsibilities with Dynamic Condition Response Graphs
pp. 595
Multi-way Clustering Using Super-Symmetric Non-negative Tensor Factorization
pp. 598
Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
pp. 599
Reliable Unseen Model Prediction for Vocabulary-Independent Speech Recognition
pp. 600
Bounded Underapproximations
pp. 603
An operational semantics for TOOPLE: A statically-typed object-oriented programming language
pp. 604
Supporting Moodle-Based Lesson through Visual Analysis
pp. 606
Multi-DOF Forceps Manipulator System for Laparoscopic Surgery – Mechanism Miniaturized & Evaluation of New Interface -
pp. 606
Finding, Counting and Listing All Triangles in Large Graphs, an Experimental Study
pp. 610
Employing Dynamic Object Offloading as a Design Breakthrough for SOA Adoption
pp. 610
Agent rendezvous: A dynamic symmetry-breaking problem
pp. 613
A Denial of Service Attack Method for IoT System in Photovoltaic Energy System
pp. 619
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
pp. 620
Semantic Mediation to Improve Reproducibility for Biomolecular NMR Analysis
pp. 623
Reinforcement Learning-Based Tuning Algorithm Applied to Fuzzy Identification
pp. 625
Addressing Volume and Latency Overheads in 1D-parallel Sparse Matrix-Vector Multiplication
pp. 632
Toward Identifying Values and Tensions in Designing a Historically-Sensitive Data Platform: A Case-Study on Urban Renewal
pp. 642
Acoustic Target Tracking Using Tiny Wireless Sensor Devices
pp. 643
Multiparty Computation from Somewhat Homomorphic Encryption
pp. 643
Analysis of the Blockchain Protocol in Asynchronous Networks
pp. 645
Goodness and Lacks of MAS Methodologies for Manufacturing Domains
pp. 650
The Practice of Showing ‘Who I am’: A Multimodal Analysis of Encounters between Science Communicator and Visitors at Science Museum
pp. 650
General Symmetry Breaking Constraints
pp. 662
EFIS: Evolvable-Neural-Based Fuzzy Inference System and Its Application for Adaptive Network Anomaly Detection
pp. 663
Automatic Attribute Discovery and Characterization from Noisy Web Data
pp. 664
Spoken Document Retrieval Experiments with IR-n System
pp. 667
Rough Sets-Based Identification of Heart Valve Diseases Using Heart Sounds
pp. 672
Inference of Gene Expression Regulation via microRNA Transfection
pp. 672
Coincer: Decentralised Trustless Platform for Exchanging Decentralised Cryptocurrencies
pp. 682
Nonintrusive AMR Asynchrony for Communication Optimization
pp. 684
An Improved Construction for Counting Bloom Filters
pp. 686
Piecewise-Quadrilateral Registration by Optical Flow – Applications in Contrast-Enhanced MR Imaging of the Breast
pp. 688
Reducing Fitness Evaluations Using Clustering Techniques and Neural Network Ensembles
pp. 693
Librarians as Information Intermediaries: Navigating Tensions Between Being Helpful and Being Liable
pp. 699
Computer-Aided Diagnosis of Alzheimer’s Disease Using Multiple Features with Artificial Neural Network
pp. 702
Diffeomorphic Registration Using B-Splines
pp. 707
A Head-Mounted Display System for Augmented Reality Image Guidance: Towards Clinical Evaluation for iMRI-guided Nuerosurgery
pp. 710
Recovery Strategies for Linear Replication
pp. 710
New Streaming Algorithms for Counting Triangles in Graphs
pp. 711
New Molecular Mechanism of Dextran Extension in Single Molecule AFM
pp. 711
Towards Automatic Semantic Segmentation in Volumetric Ultrasound
pp. 711
Recursive Stochastic Games with Positive Rewards
pp. 712
On the Use of Projected Gradients for Constrained Multiobjective Optimization Problems
pp. 734
Multisubject Non-rigid Registration of Brain MRI Using Intensity and Geometric Features
pp. 734
A Novel Approach for Image Alignment Using a Markov–Gibbs Appearance Model
pp. 736
Online Timed Pattern Matching Using Derivatives
pp. 737
Privacy Verification Chains for IoT
pp. 740
A Knuckles-and-Nodes Approach to the Integration of Microbiological Resource Data
pp. 746
Spatiotemporal Segmentation and Modeling of the Mitral Valve in Real-Time 3D Echocardiographic Images
pp. 754
Symmetric Log-Domain Diffeomorphic Registration: A Demons-Based Approach
pp. 757
Numerical Simulation Research in Flow Fields Recognition Method Based on the Autonomous Underwater Vehicle
pp. 758
Integrated Four Dimensional Registration and Segmentation of Dynamic Renal MR Images
pp. 759
Comparative Evaluation of Binary Features
pp. 763
A Study of Convergence Speed in Multi-objective Metaheuristics
pp. 764
Joint Reconstruction and Segmentation of 7T-like MR Images from 3T MRI Based on Cascaded Convolutional Neural Networks
pp. 766
Fast and Robust Clinical Triple-Region Image Segmentation Using One Level Set Function
pp. 766
Aggregation of Foraging Swarms
pp. 773
HMM: A Cluster Membership Service
pp. 781
Compresso: Efficient Compression of Segmentation Data for Connectomics
pp. 782
Superpolynomial Speedups Based on Almost Any Quantum Circuit
pp. 786
A Quantitative Vascular Analysis System for Evaluation of Atherosclerotic Lesions by MRI
pp. 816
Fuzzy Modeling Incorporated with Fuzzy D-S Theory and Fuzzy Naive Bayes
pp. 820
Inferring Vascular Structure from 2D and 3D Imagery
pp. 828
Genetic Algorithm Based K-Means Fast Learning Artificial Neural Network
pp. 833
Automatic Image Analysis of Histopathology Specimens Using Concave Vertex Graph
pp. 834
KIM – Semantic Annotation Platform
pp. 849
Webly-Supervised Video Recognition by Mutually Voting for Relevant Web Images and Web Video Frames
pp. 857
Finding Optimal Flows Efficiently
pp. 868
MARS: A Video Benchmark for Large-Scale Person Re-Identification
pp. 869
Using Efficient RBF Networks to Classify Transport Proteins Based on PSSM Profiles and Biochemical Properties
pp. 870
Non-negative Matrix Factorization with Quasi-Newton Optimization
pp. 872
A Comparison of Breast Tissue Classification Techniques
pp. 881
Analysis of Brain Functional MRI Time Series Based on Continuous Wavelet Transform and Stimulation-Response Coupling Distance
pp. 888
Towards an Integrative Computational Foundation for Applied Behavior Analysis in Early Autism Interventions
pp. 891
Recursive Markov Decision Processes and Recursive Stochastic Games
pp. 897
A Mean Curvature Based Primal Sketch to Study the Cortical Folding Process from Antenatal to Adult Brain
pp. 905
Adaptive Entropy Rates for fMRI Time-Series Analysis
pp. 923
A Novel Nonrigid Registration Algorithm and Applications
pp. 926
Synapsing Variable Length Crossover: An Algorithm for Crossing and Comparing Variable Length Genomes
pp. 943
Simple Linear Work Suffix Array Construction
pp. 957
Registration of Reconstructed Post Mortem Optical Data with MR Scans of the Same Patient
pp. 967
The DSC Algorithm for Edge Detection
pp. 975
In Vivo Data Acquisition Instrument for Solid Organ Mechanical Property Measurement
pp. 998
A Comparison of Text-Categorization Methods Applied to N-Gram Frequency Statistics
pp. 1002
A Parallel Framework for Computational Science
pp. 1004
A Global Search Algorithm for Attributes Reduction
pp. 1021
Evolving XSLT Stylesheets for Document Transformation
pp. 1030
Automatic Wrapper Generation for Metasearch Using Ordered Tree Structured Patterns
pp. 1053
Classification of Schistosomiasis Prevalence Using Fuzzy Case-Based Reasoning
pp. 1058
Segmentation of Dynamic N-D Data Sets via Graph Cuts Using Markov Models
pp. 1076
Mining Exceptions in Databases
pp. 1081
A Quantitative Comparison of Edges in 3D Intraoperative Ultrasound and Preoperative MR Images of the Brain
pp. 1082
MML Inference of Oblique Decision Trees
pp. 1089
Naive Bayes Classifiers That Perform Well with Continuous Variables
pp. 1122
Using Machine Learning Techniques to Combine Forecasting Methods
pp. 1128
Web Data Mining and Reasoning Model
pp. 1137
HyFIS-Yager-gDIC: A Self-organizing Hybrid Neural Fuzzy Inference System Realizing Yager Inference
pp. 1145
Computer-Aided Hepatic Tumour Ablation
pp. 1147
Domain-Adaptive Conversational Agent with Two-Stage Dialogue Management
pp. 1151
3D Ultrasound Image Acquisition Using a Magneto-optic Hybrid Sensor for Laparoscopic Surgery
pp. 1154
Minimally Invasive Excision of Deep Bone Tumors
pp. 1167
A Comparison of BDI Based Real-Time Reasoning and HTN Based Planning
pp. 1170
UNSHADES-1: An Advanced Tool for In-System Run-Time Hardware Debugging
pp. 1181
A Time and Energy Optimal Controller for Mobile Robots
pp. 1185
Collaborative Multi-agent IVUS Image Segmentation
pp. 1193
Long Bone Panoramas from Fluoroscopic X-ray Images
pp. 1218
Reconstruction of Subcortical Brain Activity by Spatially Filtered MEG During Epileptic Seizures
pp. 1222
Single Photon Emission Computed Tomography and 3 Dimensional Quantitative Evaluation in Renal Scintigraphy
pp. 1232
Using SPM to Detect Evolving MS Lesions
pp. 1233
Mapping Dryland Salinity Using Neural Networks
pp. 1239
Normalized RBF Neural Network for Real-Time Detection of Signal in the Noise
pp. 1240
A Simplified Field-of-View Calibration Technique for an Operating Microscope
pp. 1253
Intraoperative Tracking of Anatomical Structures Using Fluoroscopy and a Vascular Balloon Catheter
pp. 1258
Validation Methods for Soft Tissue Prediction in Maxillofacial Planning Environments
pp. 1271
Hierarchical BOA Solves Ising Spin Glasses and MAXSAT
pp. 1285
How to Trade Off between Regularization and Image Similarity in Non-rigid Registration ?
pp. 1298
Automated Hippocampal Segmentation by Regional Fluid Registration of Serial MRI: Validation and Application in Alzheimer.s Disease
pp. 1300
A 3D Statistical Shape Model for the Left Ventricle of the Heart
pp. 1302
Robot Assistant for Dental Implantology
pp. 1318
Motion Correction of MRI from Orthogonal k-Space Phase Difference
pp. 1328
Estimating the Motion of the LAD: A Simulation-Based Study
pp. 1341
Evaluation of Soft-Tissue Model Parameters
pp. 1347
Virtual Polypectomy
pp. 1349
Real-Time Interactions Using Virtual Tools
pp. 1354
Evaluation of Cost Functions for Gray Value Matching of 2D Images in Radiotherapy
pp. 1363
Fast Non-rigid Multimodal Image Registration Using Local Frequency Maps
pp. 1371
Grey-Level Morphology Based Segmentation of T1-MRI of the Human Cortex
pp. 1373
An Active Contour Model for Segmentation Based on Cubic B-splines and Gradient Vector Flow
pp. 1395
Ophthalmic Slitlamp-Based Computer-Aided Diagnosis: Image Processing Foundations
pp. 1424
Application of Compact Pneumatic Actuators to Laparoscopic Manipulator
Similar content
2,040
Lateral sharpening of cortical frequency tuning by approximately balanced inhibition.
Authors:
Bao Liu
,
L. Zhang
,
Huizhong W. Tao
…
A versatile ODE approximation to a network model for the spread of sexually transmitted diseases.
Authors:
C. Bauch
Optimal sustained attention is linked to the spectral content of background EEG activity: greater ongoing tonic alpha (approximately 10 Hz) power supports successful phasic goal activation.
Authors:
Paul M Dockree
,
Simon P Kelly
,
John J Foxe
…
See all similar
Cited by
10
Multi-step-ahead time series prediction using multiple-output support vector regression
Authors:
Yukun Bao
,
Tao Xiong
,
Zhongyi Hu
Energy Consumption Prediction for Fused Deposition Modelling 3D Printing Using Machine Learning
Authors:
Mohamed Achraf El youbi El idrissi
,
Loubna Laaouina
,
Adil Jeghal
…
Multiobjective Optimization of Injection Molding Process Parameters for the Precision Manufacturing of Plastic Optical Lens
Authors:
Xindu Chen
,
Shipu Diao
,
Zeqin Lin
…
See all cited by