Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
47
views
0
references
Top references
cited by
21
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
5,631
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Foundations and Practice of Security
Bound Analysis of Imperative Programs with the Size-Change Abstraction
other
Author(s):
Florian Zuleger
,
Sumit Gulwani
,
Moritz Sinn
,
Helmut Veith
Publication date
(Print):
2011
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Language change
Author and book information
Book Chapter
Publication date (Print):
2011
Pages
: 280-297
DOI:
10.1007/978-3-642-23702-7_22
SO-VID:
6b70720c-622f-4ec6-9b40-85a35ac34c9b
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Second-Order Polynomial Models for Background Subtraction
pp. 1
The Quantum Inspired Modelling of Changing Attitudes and Self-organising Societies
pp. 1
Learning with Configurable Operators and RL-Based Heuristics
pp. 1
Leveraging Multiple Mechanisms for Information Propagation
pp. 1
Recent developments in practical examination timetabling
pp. 1
0. Introduction
pp. 1
Blow-Ups, Win/Win’s, and Crown Rules: Some New Directions in FPT
pp. 1
Motion Coordination for Multi-agent Networks
pp. 1
Subspace Codes
pp. 1
Image-Based Low-Cost Systems for Automatic 3D Recording and Modelling of Archaeological Finds and Objects
pp. 1
Query Expansion in Folksonomies
pp. 1
Feature Selection Based on Iterative Canonical Correlation Analysis for Automatic Diagnosis of Parkinson’s Disease
pp. 1
Data Clustering: A User’s Dilemma
pp. 1
Reasoning as Search: Supporting Reasoning with Distributed Memory
pp. 1
Let’s Get Physical: Models and Methods for Real-World Security Protocols
pp. 1
On the Malleability of Bitcoin Transactions
pp. 1
Final universes of processes
pp. 1
The history of steganography
pp. 1
Interacting with Context
pp. 1
Refining specifications to logic programs
pp. 1
A Gauge-Invariant Reversible Cellular Automaton
pp. 1
Fully Abstract Characterization of Probabilistic May Testing
pp. 1
Invariants and Well-Foundedness in Program Algebra
pp. 1
Correlation Clustering with Partial Information
pp. 3
Boosting Authenticated Encryption Robustness with Minimal Modifications
pp. 3
Towards Sensor Database Systems
pp. 3
Plan Indexing for State-Based Plans
pp. 3
GO-WAR: A Tool for Mining Weighted Association Rules from Gene Ontology Annotations
pp. 3
Exploring the Potential of User Modeling Based on Mind Maps
pp. 3
Constant-Factor Approximation for Minimum-Weight (Connected) Dominating Sets in Unit Disk Graphs
pp. 3
Deciphering Text from Touchscreen Key Taps
pp. 3
Evaluating Quality of Service Traffic Classes on the Megafly Network
pp. 5
Involving Users in the Design of ICT Aimed to Improve Education, Work, and Leisure for Users with Intellectual Disabilities
pp. 5
1 Homing and Synchronizing Sequences
pp. 5
Active Learning of Extended Finite State Machines
pp. 7
Axiomatizing Weak Ready Simulation Semantics over BCCSP
pp. 9
Modelling the Effects of Operating Conditions on Motor Power Consumption in Single Screw Extrusion
pp. 9
Identifying Relationships in Functional and Structural Connectome Data Using a Hypergraph Learning Method
pp. 10
What Automata Can Provide a Medium for Life?
pp. 11
Ransomware and the Legacy Crypto API
pp. 11
TrajSpark: A Scalable and Efficient In-Memory Management System for Big Trajectory Data
pp. 13
A Bandwidth-Efficient Application Level Framing Protocol for H.264 Video Multicast over Wireless LANs
pp. 13
Generic programming
pp. 13
Self-organizing data structures
pp. 13
Deformable Image Registration of Follow-Up Breast Magnetic Resonance Images
pp. 13
Local Approximation Algorithms for the Uncapacitated Metric Facility Location Problem in Power-Aware Sensor Networks
pp. 13
Pairing-Based Cryptography at High Security Levels
pp. 15
Face Authentication Using One-Class Support Vector Machines
pp. 15
A Macroscopic Privacy Model for Heterogeneous Robot Swarms
pp. 16
Cross-Cultural Study on Facial Regions as Cues to Recognize Emotions of Virtual Agents
pp. 16
Building General Purpose Security Services on Trusted Computing
pp. 16
SVC2004: First International Signature Verification Competition
pp. 17
The Knowledge Model of Protégé-2000: Combining Interoperability and Flexibility
pp. 17
DroidSense: A Mobile Tool to Analyze Software Development Processes by Measuring Team Proximity
pp. 18
Finding minimally weighted subgraphs
pp. 18
Unsupervised Learning of Models for Recognition
pp. 18
Influence and Passivity in Social Media
pp. 18
A Formal Specification for Organizational Adaptation
pp. 18
k2-Trees for Compact Web Graph Representation
pp. 19
Treewidth: Algorithmic techniques and results
pp. 19
VLog: A Rule Engine for Knowledge Graphs
pp. 19
Robust Recognition of Reading Activity in Transit Using Wearable Electrooculography
pp. 19
2. Synchronization
pp. 19
Rational control of reasoning in artificial intelligence
pp. 22
Predicting Online Extremism, Content Adopters, and Interaction Reciprocity
pp. 22
Query Evaluation via Tree-Decompositions
pp. 23
On Symmetric and Choiceless Computation
pp. 24
Using Evidences Based on Natural Language to Drive the Process of Fusing Multimodal Sources
pp. 24
When You Can’t Read It, Listen to It! An Audio-Visual Interface for Book Reading
pp. 25
Matching Ontologies in Open Networked Systems: Techniques and Applications
pp. 25
Interactive Conversion of Web Tables
pp. 27
Distortion-Free Data Embedding for Images
pp. 28
The Marketcast Method for Aggregating Prediction Market Forecasts
pp. 29
Boolean Networks: Beyond Generalized Asynchronicity
pp. 29
Dataset Issues in Object Recognition
pp. 29
User Behaviour and Lexical Ambiguity in Cross-Language Image Retrieval
pp. 29
Extending the GHS Weil Descent Attack
pp. 30
Modelling of Cancer Patient Records: A Structured Approach to Data Mining and Visual Analytics
pp. 31
Mutual Development: A Case Study in Customer-Initiated Software Product Development
pp. 31
Novel Local Shape-Adaptive Gyrification Index with Application to Brain Development
pp. 32
A Middleware Enforcing Location Privacy in Mobile Platform
pp. 32
Beeping a Maximal Independent Set
pp. 32
Neural Networks Regression Inductive Conformal Predictor and Its Application to Total Electron Content Prediction
pp. 33
Towards a Common API for Structured Peer-to-Peer Overlays
pp. 33
Event2vec: Learning Representations of Events on Temporal Sequences
pp. 33
Generation of efficient interprocedural analyzers with PAG
pp. 33
3. A case study in synchronization and proof techniques
pp. 34
A Timely Endeavor: Theoretical, Behavioral, Bioimaging, and Clinical Perspectives on Time Perception
pp. 34
Minimal weight k-SR representations
pp. 34
A New Algorithm for Long Integer Cube Computation with Some Insight into Higher Powers
pp. 34
Moderately exponential bound for graph isomorphism
pp. 36
30 Years of Modal Transition Systems: Survey of Extensions and Analysis
pp. 36
Diverse Image-to-Image Translation via Disentangled Representations
pp. 36
Dependent Types and Fibred Computational Effects
pp. 37
Approximating the Average Stretch Factor of Geometric Graphs
pp. 37
Correlation-Weighted Sparse Group Representation for Brain Network Construction in MCI Classification
pp. 37
A QoS-Aware Web Service Composition Approach Based on Genetic Programming and Graph Databases
pp. 38
Deep Learning for Emotion Recognition in Faces
pp. 39
Scalar Aggregation in FD-Inconsistent Databases
pp. 39
Submodular Secretary Problem and Extensions
pp. 39
A Unified Approach for Measuring Precision and Generalization Based on Anti-alignments
pp. 40
Active Trust Management for Autonomous Adaptive Survivable Systems (ATM’s for AAss’s)
pp. 40
Relational Presheaves as Labelled Transition Systems
pp. 40
Orthogonal Direct Sum Masking
pp. 41
Interpretability in Intelligent Systems – A New Concept?
pp. 41
Algebraic and Logical Emulations of Quantum Circuits
pp. 42
Fibrational Induction Meets Effects
pp. 42
Knowledge Discovery in Multi-label Phenotype Data
pp. 43
On the Link between Gaussian Homotopy Continuation and Convex Envelopes
pp. 43
Detecting Computer Worms in the Cloud
pp. 43
On Practical Aspects of PCFG Password Cracking
pp. 44
A Bayesian Algorithm for Reconstructing Two-Component Signaling Networks
pp. 44
Protecting Mobile Agents Against Malicious Hosts
pp. 45
Multimodal Learning Hub: A Tool for Capturing Customizable Multimodal Learning Experiences
pp. 46
Scheduling, timetabling and rostering — A special relationship?
pp. 46
Co-evolutionary constraint satisfaction
pp. 47
#Depression: Findings from a Literature Review of 10 Years of Social Media and Depression Research
pp. 47
On Dataset Complexity for Case Base Maintenance
pp. 48
On Berge Multiplication for Monotone Boolean Dualization
pp. 48
Predicting Personality Using Novel Mobile Phone-Based Metrics
pp. 48
Perceptions of Teachers and Guardians on the Electronic Record in the School-Family Communication
pp. 49
A Universal Client-Based Identity Management Tool
pp. 49
Patient Position Detection for SAR Optimization in Magnetic Resonance Imaging
pp. 49
On Optimal Timed Strategies
pp. 49
Unsupervised Accent Modeling for Language Identification
pp. 50
Metric Space Searching Based on Random Bisectors and Binary Fingerprints
pp. 51
When Birds Die: Making Population Protocols Fault-Tolerant
pp. 51
Adaptive Navigation Support and Adaptive Collaboration Support in WebDL
pp. 51
Approximate Integer Common Divisors
pp. 51
On Finitary Functors and Their Presentations
pp. 51
Rapid Learning for Binary Programs
pp. 51
The Stixel World - A Compact Medium Level Representation of the 3D-World
pp. 52
On the Use of Gröbner Bases for Computing the Structure of Finite Abelian Groups
pp. 52
Automatically Extracting Class Diagrams from Spreadsheets
pp. 53
ASTRAL-III: Increased Scalability and Impacts of Contracting Low Support Branches
pp. 53
Bridging Computational Features Toward Multiple Semantic Features with Multi-task Regression: A Study of CT Pulmonary Nodules
pp. 54
Single Sign-On Using Trusted Platforms
pp. 54
SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key
pp. 54
Human Robot Interaction and Fiction: A Contradiction
pp. 55
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics
pp. 55
Integration of Unsupervised and Supervised Criteria for Deep Neural Networks Training
pp. 56
Moral Values from Simple Game Play
pp. 56
Enhanced TLS Handshake Authentication with Blockchain and Smart Contract (Short Paper)
pp. 57
IR-n System, a Passage Retrieval Architecture
pp. 59
Constrained Connectivity and Transition Regions
pp. 59
Partial Order Methods for Statistical Model Checking and Simulation
pp. 59
On the Price of Anarchy and Stability of Correlated Equilibria of Linear Congestion Games,,
pp. 60
External User Inclusion in Public e-Service Development: Exploring the Current Practice in Sweden
pp. 60
A High Resolution Land Use/Cover Modelling Framework for Europe: Introducing the EU-ClueScanner100 Model
pp. 60
Reasoning about Non-terminating Loops Using Deadline Commands
pp. 61
EnvSOM: A SOM Algorithm Conditioned on the Environment for Clustering and Visualization
pp. 61
Robust Cancer Treatment Outcome Prediction Dealing with Small-Sized and Imbalanced Data from FDG-PET Images
pp. 61
The Monoids of Order Eight and Nine
pp. 61
Light Robustness
pp. 61
ADRES: An Architecture with Tightly Coupled VLIW Processor and Coarse-Grained Reconfigurable Matrix
pp. 62
Efficient State-Based CRDTs by Delta-Mutation
pp. 62
Adversarial Examples for Malware Detection
pp. 62
Lower Bounds on Matrix Rigidity Via a Quantum Argument
pp. 62
Logic Training through Algorithmic Problem Solving
pp. 62
Kleptography: Using Cryptography Against Cryptography
pp. 63
Measuring Statistical Dependence with Hilbert-Schmidt Norms
pp. 63
Decidability Results for Restricted Models of Petri Nets with Name Creation and Replication
pp. 63
Cryptocurrencies as a Disruption? Empirical Findings on User Adoption and Future Potential of Bitcoin and Co
pp. 64
The Matita Interactive Theorem Prover
pp. 64
TweetNaCl: A Crypto Library in 100 Tweets
pp. 64
Inter-organizational Integration in the AEC/FM Industry
pp. 64
Bio-Discretization: Biometrics Authentication Featuring Face Data and Tokenised Random Number
pp. 65
An Agent-Based Model for Simultaneous Phone and SMS Traffic over Time
pp. 65
5. Syntax and semantics of CCS
pp. 65
Elements of Good Route Directions in Familiar and Unfamiliar Environments
pp. 65
Key-Insulated Public Key Cryptosystems
pp. 65
Completeness Theorems for Bi-Kleene Algebras and Series-Parallel Rational Pomset Languages
pp. 66
Element-Oriented Method of Assessing Landscape of Sightseeing Spots by Using Social Images
pp. 66
Cooperative Multi-agent Control Using Deep Reinforcement Learning
pp. 67
Using the TPTP Language for Writing Derivations and Finite Interpretations
pp. 68
Automatic verification of pipelined microprocessor control
pp. 69
A Closer Look at Database Replication Middleware Architectures for Enterprise Applications
pp. 69
LC-QuAD 2.0: A Large Dataset for Complex Question Answering over Wikidata and DBpedia
pp. 69
Training Hierarchical Feed-Forward Visual Recognition Models Using Transfer Learning from Pseudo-Tasks
pp. 69
RBAC-MAS and SODA: Experimenting RBAC in AOSE
pp. 69
Network Discovery and Verification with Distance Queries
pp. 70
Structured Sparse Kernel Learning for Imaging Genetics Based Alzheimer’s Disease Diagnosis
pp. 70
SAT-Based Model Checking without Unrolling
pp. 70
Accelerated Analysis of Biological Parameters Space Using GPUs
pp. 71
A Common Basis for Agent Organisation in BDI Languages
pp. 71
What Does Classifying More Than 10,000 Image Categories Tell Us?
pp. 71
Prehension of an Anthropomorphic Metamorphic Robotic Hand Based on Opposition Space Model
pp. 71
Structural Operational Semantics for Continuous State Probabilistic Processes
pp. 72
Breast Imaging with 3D Ultrasound Computer Tomography: Results of a First In-vivo Study in Comparison to MRI Images
pp. 72
Enhancing E-commerce Security Using GSM Authentication
pp. 73
Covert channels—A context-based view
pp. 73
An ACO Approach to Planning
pp. 73
Inferring High-Level Behavior from Low-Level Sensors
pp. 73
Improved Randomized Algorithms for 3-SAT
pp. 74
Cochlea Modelling: Clinical Challenges and Tubular Extraction
pp. 74
A Comparison of the Historical Entries in Wikipedia and Baidu Baike
pp. 75
Longitudinal Modeling of Multi-modal Image Contrast Reveals Patterns of Early Brain Growth
pp. 75
Reconstructing Online Behaviors by Effort Minimization
pp. 75
Incentives for Sharing in Peer-to-Peer Networks
pp. 76
Data Weighting for Principal Component Noise Reduction in Contrast Enhanced Ultrasound
pp. 77
Automatic Construction of 3D Statistical Deformation Models Using Non-rigid Registration
pp. 77
Approximation Algorithms for the Maximum Leaf Spanning Tree Problem on Acyclic Digraphs
pp. 78
Modelling and Evaluation of CCN-Caching Trees
pp. 79
Automatic Reference Selection for Quantitative EEG Component Interpretation: Cross Spectrum Analysis Based on Bipolar EEG
pp. 80
A Data Mining Library for miRNA Annotation and Analysis
pp. 80
Conquering the Needle-in-a-Haystack: How Correlated Input Variables Beneficially Alter the Fitness Landscape for Neural Networks
pp. 80
The Effects of Regularization on Learning Facial Expressions with Convolutional Neural Networks
pp. 81
A Systematic Review of Impediments Blocking Internet of Things Adoption by Governments
pp. 81
Sentiments in Wikipedia Articles for Deletion Discussions
pp. 81
Loop Summarization and Termination Analysis
pp. 81
Attention-Based Two-Phase Model for Video Action Detection
pp. 82
Finding the Maximal Pose Error in Robotic Mechanical Systems Using Constraint Programming
pp. 83
A structural co-induction theorem
pp. 84
Multi-directional Characterization for Pollen Tubes Based on a Nanorobotic Manipulation System
pp. 84
On Temporally Connected Graphs of Small Cost
pp. 84
Greedy Approximation Algorithms for Finding Dense Components in a Graph
pp. 84
Shape Filtering for False Positive Reduction at Computed Tomography Colonography
pp. 84
OLD resolution with tabulation
pp. 84
Prediction of Brain Network Age and Factors of Delayed Maturation in Very Preterm Infants
pp. 85
Improving the Development of Data Warehouses by Enriching Dimension Hierarchies with WordNet
pp. 85
A CPS-translation of the λμ-calculus
pp. 85
Secure Certificateless Proxy Re-encryption Without Pairing
pp. 86
A Robust Optimization Approach to Supply Chain Management
pp. 86
Evader Interdiction and Collateral Damage
pp. 86
Improved Harmony Search from Ensemble of Music Players
pp. 86
Combining Bayesian Networks, k Nearest Neighbours Algorithm and Attribute Selection for Gene Expression Data Analysis
pp. 87
Predicting Phenotype from Genotype through Automatically Composed Petri Nets
pp. 88
Stability-Weighted Matrix Completion of Incomplete Multi-modal Data for Disease Diagnosis
pp. 88
Security Bounds for the Design of Code-Based Cryptosystems
pp. 89
Compactness and Continuity, Constructively Revisited
pp. 90
SpiderCNN: Deep Learning on Point Sets with Parameterized Convolutional Filters
pp. 90
A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement
pp. 90
A Semantics for Every GSPN
pp. 90
Statistical Instance-Based Ensemble Pruning for Multi-class Problems
pp. 91
Computing the Edit-Distance Between Unrooted Ordered Trees
pp. 91
Double description method revisited
pp. 91
Gold Mining in a River of Internet Content Traffic
pp. 92
A Regularization Scheme for Diffusion Tensor Magnetic Resonance Images
pp. 92
Optimal Use of Expert Knowledge in Ant Colony Optimization for the Analysis of Epistasis in Human Disease
pp. 92
A Methodology to Specify Multiagent Systems
pp. 92
Evaluation of Pooling Operations in Convolutional Architectures for Object Recognition
pp. 92
User Interfaces for On-Line Diagram Recognition
pp. 93
Analyzing Entities and Topics in News Articles Using Statistical Topic Models
pp. 93
The MathSAT5 SMT Solver
pp. 95
Deep Projective 3D Semantic Segmentation
pp. 97
Architectural Modeling and Analysis for Safety Engineering
pp. 97
Decoding of Interleaved Reed Solomon Codes over Noisy Data
pp. 98
A Time and Sentiment Unification Model for Personalized Recommendation
pp. 99
Passive Testing with Asynchronous Communications
pp. 99
Unsupervised Feature Learning for Human Activity Recognition Using Smartphone Sensors
pp. 99
Cryptography from Learning Parity with Noise
pp. 101
Generalized Rabin(1) Synthesis with Applications to Robust System Synthesis
pp. 101
A Fast Method of Generating Pharmacokinetic Maps from Dynamic Contrast-Enhanced Images of the Breast
pp. 103
Three metric domains of processes for bisimulation
pp. 103
Vision-Based Gesture Recognition: A Review
pp. 104
Lazy Annotation for Program Testing and Verification
pp. 105
Time Durations of Phonemes in Polish Language for Speech and Speaker Recognition
pp. 106
Role-Based Access Control for Model-Driven Web Applications
pp. 106
Following the Blind Seer – Creating Better Performance Models Using Less Information
pp. 107
Context-Aware User Authentication – Supporting Proximity-Based Login in Pervasive Computing
pp. 107
An Algebraic Characterisation of Complexity for Valued Constraint
pp. 109
Trace Semantics via Determinization
pp. 109
Interaction Design: The Mobile Percussionist
pp. 110
Safe Parallel Programming with Session Java
pp. 111
8. Some proofs about data structures
pp. 111
Auto-alignment of Knee MR Scout Scans through Redundant, Adaptive and Hierarchical Anatomy Detection
pp. 112
Word Sense Disambiguation: A Graph-Based Approach Using N-Cliques Partitioning Technique
pp. 112
Lagrangian Relaxation
pp. 112
Computer Assisted Identification, Segmentation and Quantification of Synapses in the Cerebral Cortex
pp. 112
AutoPart: Parameter-Free Graph Partitioning and Outlier Detection
pp. 113
Specification and Verification of Graph-Based Model Transformation Properties
pp. 113
Keyword Spotting with Convolutional Deep Belief Networks and Dynamic Time Warping
pp. 114
The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography
pp. 115
Modeling Adversaries in a Logic for Security Protocol Analysis
pp. 115
Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks
pp. 115
Affine Sessions
pp. 115
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults
pp. 116
On discerning words by automata
pp. 116
Efficient Compression on Real World Directed Graphs
pp. 117
Engineering Route Planning Algorithms
pp. 118
Trend Cluster Based Kriging Interpolation in Sensor Data Networks
pp. 119
The SPAR Ontologies
pp. 120
Mass Preserving Mappings and Image Registration
pp. 121
Rainbow Domination and Related Problems on Some Classes of Perfect Graphs
pp. 121
Motion-Coherent Affinities for Hypergraph Based Motion Segmentation
pp. 121
Computational Advantages of Deep Prototype-Based Learning
pp. 121
Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment
pp. 122
Directly Addressable Variable-Length Codes
pp. 124
Testing for Distinguishing Repair Candidates in Spreadsheets – the Mussco Approach
pp. 125
Call Center Stress Recognition with Person-Specific Models
pp. 126
SFMap: Inferring Services over Encrypted Web Flows Using Dynamical Domain Name Graphs
pp. 127
Automatic Landmark Estimation for Adolescent Idiopathic Scoliosis Assessment Using BoostNet
pp. 128
A Review of Quality Dimensions in e-Government Services
pp. 128
Deep Convolutional Neural Networks for Classifying Body Constitution
pp. 128
Route Planning and Map Inference with Global Positioning Traces
pp. 129
MiRaGE: Inference of Gene Expression Regulation via MicroRNA Transfection II
pp. 129
Graph Treewidth and Geometric Thickness Parameters
pp. 129
javaPlex: A Research Software Package for Persistent (Co)Homology
pp. 129
Pattern Structures and Their Projections
pp. 130
Modeling Malware-driven Honeypots
pp. 131
A Hierarchy of Polynomial-Time Computable Simulations for Automata
pp. 132
Ephemeral Communication and Communication Places
pp. 132
Simulation Subsumption in Ramsey-Based Büchi Automata Universality and Inclusion Testing
pp. 132
Comprehending Ringads
pp. 133
Closing Schemas in Object-Relational Databases
pp. 133
Consumers’ Perceptions of Social Commerce Adoption in Saudi Arabia
pp. 133
Simultaneous Localization and Mapping for Event-Based Vision Systems
pp. 133
Differences between the EISPACK subroutines and the handbook Algol procedures
pp. 133
Networks Become Navigable as Nodes Move and Forget
pp. 134
Encoding-Decoding Transitional Systems for Classes of P Systems
pp. 136
An Adapted Lesk Algorithm for Word Sense Disambiguation Using WordNet
pp. 136
Nonlinear Statistical Shape Modeling for Ankle Bone Segmentation Using a Novel Kernelized Robust PCA
pp. 138
Lagrangian Relaxation Realised in the NgMPPS Multi Actor Architecture
pp. 138
Polyglot: An Extensible Compiler Framework for Java
pp. 139
A Virtual Agent as Vocabulary Trainer: Iconic Gestures Help to Improve Learners’ Memory Performance
pp. 140
Convolutional Learning of Spatio-temporal Features
pp. 141
Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials
pp. 143
User Data Management and Usage Model Acquisition in an Adaptive Educational Collaborative Environment
pp. 144
Asymptotically Optimal Declustering Schemes for Range Queries
pp. 144
Automated Analysis of Multi Site MRI Phantom Data for the NIHPD Project
pp. 144
Testing the Foundations of Quantal Response Equilibrium
pp. 145
Towards an Ontology-Based Approach for Eliciting Possible Solutions to Non-Functional Requirements
pp. 145
Categories: How I Learned to Stop Worrying and Love Two Sorts
pp. 145
Meta-heuristic and Constraint-Based Approaches for Single-Line Railway Timetabling
pp. 145
Some Investigations on Robustness of Deep Learning in Limited Angle Tomography
pp. 146
A Real-World Benchmark Model for Testing Concurrent Real-Time Systems in the Automotive Domain
pp. 146
Who Is Concerned about What? A Study of American, Chinese and Indian Users’ Privacy Concerns on Social Network Sites
pp. 146
‘Who, When, and Where?’ Location Proof Assertion for Mobile Devices
pp. 147
Modelling Cloud Forensic-Enabled Services
pp. 147
Propagation via Kernelization: The Vertex Cover Constraint
pp. 148
Random Forests for Phase Detection in Surgical Workflow Analysis
pp. 149
3D Deeply Supervised Network for Automatic Liver Segmentation from CT Volumes
pp. 151
Improving Segmentation of the Left Ventricle Using a Two-Component Statistical Model
pp. 151
Trace Inclusion for One-Counter Nets Revisited
pp. 153
Induction of recursive Bayesian classifiers
pp. 154
Towards an On-Line Analysis of Tweets Processing
pp. 156
ParCoLab: A Parallel Corpus for Serbian, French and English
pp. 156
Provably Secure Implicit Certificate Schemes
pp. 157
On Formulations of Firing Squad Synchronization Problems
pp. 157
How to Achieve a McEliece-Based Digital Signature Scheme
pp. 158
A processors management system for PVM
pp. 158
DES and Differential Power Analysis The “Duplication” Method
pp. 159
RFID Systems: A Survey on Security Threats and Proposed Solutions
pp. 159
Software Implementation of Mathematical Model of Thermodynamic Processes in a Steam Turbine on High-Performance System
pp. 161
Anisotropic Feature Extraction from Endoluminal Images for Detection of Intestinal Contractions
pp. 161
Integrating Statistical Prior Knowledge into Convolutional Neural Networks
pp. 161
An Ontology-Based Bayesian Network Approach for Representing Uncertainty in Clinical Practice Guidelines
pp. 162
Using a Modelling Language to Describe the Quality of Life Goals of People Living with Dementia
pp. 162
Testing TLS Using Combinatorial Methods and Execution Framework
pp. 162
Engineering a Performance Management System to Support Community Care Delivery
pp. 162
Graph-theoretic arguments in low-level complexity
pp. 163
Response-Time Modeling of Controller Area Network (CAN)
pp. 163
A Model-Based Extension to HiP-HOPS for Dynamic Fault Propagation Studies
pp. 164
Pre-processing and Indexing Techniques for Constellation Queries in Big Data
pp. 164
Discovering Consumer Health Expressions from Consumer-Contributed Content
pp. 165
The Traveling Percussionist
pp. 165
Independent Vector Analysis: An Extension of ICA to Multivariate Components
pp. 166
SpineNet: Automatically Pinpointing Classification Evidence in Spinal MRIs
pp. 166
Social Situated Agents in Virtual, Real and Mixed Reality Environments
pp. 167
DNA-based Cryptography
pp. 167
Breach, A Toolbox for Verification and Parameter Synthesis of Hybrid Systems
pp. 168
A Tool for Checking ANSI-C Programs
pp. 169
Strategic Tabletop Negotiations
pp. 169
Clinical Evaluation of an Automatic Path Tracker for Virtual Colonoscopy
pp. 169
Experiences with QuickCheck: Testing the Hard Stuff and Staying Sane
pp. 169
The Database of the Cardiovascular System Related Signals
pp. 169
Semi-homomorphic Encryption and Multiparty Computation
pp. 170
A New GreatSPN GUI for GSPN Editing and CSLTA Model Checking
pp. 170
DNN-Buddies: A Deep Neural Network-Based Estimation Metric for the Jigsaw Puzzle Problem
pp. 170
Teaching Academic Concurrency to Amazing Students
pp. 170
From Transitions to Executions
pp. 171
A Learning-Based Approach for IP Geolocation
pp. 171
Towards Self-aware Approach for Mobile Devices Security
pp. 173
Data Dependent Concentration Bounds for Sequential Prediction Algorithms
pp. 173
Fine-Grained Access Control with Object-Sensitive Roles
pp. 173
W-OTS+ – Shorter Signatures for Hash-Based Signature Schemes
pp. 175
Patient-Centered Information Extraction for Effective Search on Healthcare Forum
pp. 175
Induced Subgraphs of Bounded Degree and Bounded Treewidth
pp. 175
Error-Free Affine, Unitary, and Probabilistic OBDDs
pp. 176
Estimating Depth from RGB and Sparse Sensing
pp. 178
Towards Continuous Certification of Clinical Information Systems
pp. 180
A New Sharing Paradigm for the Personal Cloud
pp. 180
Enhanced Importance Sampling: Unscented Auxiliary Particle Filtering for Visual Tracking
pp. 182
Improved Primitives for Secure Multiparty Integer Computation
pp. 183
Recent Results in Speech Recognition for the Tatar Language
pp. 184
Exploring the Impact of Search Interface Features on Search Tasks
pp. 184
Pseudonym Systems
pp. 184
Quantum Entanglement and the Issue of Selective Influences in Psychology: An Overview
pp. 185
Exploring the Limits of Weakly Supervised Pretraining
pp. 185
Can Evaluation Patterns Enable End Users to Evaluate the Quality of an e-learning System? An Exploratory Study
pp. 185
LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks
pp. 186
Hybrid Systems with Finite Bisimulations
pp. 186
Modular Redundancy for Theorem Proving
pp. 186
Improved Approximation Algorithms for Budgeted Allocations
pp. 187
A Fast SVM Training Algorithm Based on a Decision Tree Data Filter
pp. 188
Improving Multi-label Classifiers via Label Reduction with Association Rules
pp. 188
An Improved Optimistic and Fault-Tolerant Replication Protocol
pp. 188
An Effectiveness Measure for Ambiguous and Underspecified Queries
pp. 188
Monitoring Discrete Event Systems Using Petri Net Embeddings
pp. 189
Bag-of-Words and Topic Modeling-Based Sport Video Analysis
pp. 191
Comparison of Coarsening Schemes for Multilevel Graph Partitioning
pp. 191
Parallel Object Oriented Monte Carlo Simulations
pp. 192
Sharemind: A Framework for Fast Privacy-Preserving Computations
pp. 192
Using Simulation to Evaluate and Tune the Performance of Dynamic Load Balancing of an Over-Decomposed Geophysics Application
pp. 192
Face Recognition Using Wavelet Transform and Non-negative Matrix Factorization
pp. 193
How Do E-Patients Connect Online? A Study of Social Support Roles in Health Social Networking
pp. 194
On infinite transition graphs having a decidable monadic theory
pp. 194
Automated Age Estimation from Hand MRI Volumes Using Deep Learning
pp. 194
Robust Multi-scale Anatomical Landmark Detection in Incomplete 3D-CT Data
pp. 194
Examining Community in the Digital Neighborhood: Early Results from Canada’s Wired Suburb
pp. 195
tLab: A System Enabling Malware Clustering Based on Suspicious Activity Trees
pp. 196
Reasoning about gradual changes of topological relationships
pp. 196
Experienced and Novice Driver Situation Awareness at Rail Level Crossings: An Exploratory On-Road Study
pp. 196
Safety Verification for Probabilistic Hybrid Systems
pp. 196
Multiple-Precision Residue-Based Arithmetic Library for Parallel CPU-GPU Architectures: Data Types and Features
pp. 196
Constraint Satisfaction Problems with Infinite Templates
pp. 197
BcePred: Prediction of Continuous B-Cell Epitopes in Antigenic Sequences Using Physico-chemical Properties
pp. 198
The Travelling Salesman Problem in Bounded Degree Graphs
pp. 199
Thompson Sampling: An Asymptotically Optimal Finite-Time Analysis
pp. 199
Recognition of Multiple Language Voice Navigation Queries in Traffic Situations
pp. 201
Pairing the Volcano
pp. 201
IKNOW: A Tool to Assist and Study the Creation, Maintenance, and Dissolution of Knowledge Networks
pp. 201
Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations
pp. 203
Learning and Incorporating Shape Models for Semantic Segmentation
pp. 203
A Deep Learning Method for Classification of EEG Data Based on Motor Imagery
pp. 204
Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context
pp. 204
A Statistical Framework for Partial Volume Segmentation
pp. 204
Shared Ensemble Learning Using Multi-trees
pp. 205
DoS Amplification Attacks – Protocol-Agnostic Detection of Service Abuse in Amplifier Networks
pp. 206
Nonparametric Density Flows for MRI Intensity Normalisation
pp. 206
Optimizing Egalitarian Performance in the Side-Effects Model of Colocation for Data Center Resource Management
pp. 208
SymDIVINE: Tool for Control-Explicit Data-Symbolic State Space Exploration
pp. 209
UML Modelling and Performance Analysis of Mobile Software Architectures
pp. 209
Atlas Guided Identification of Brain Structures by Combining 3D Segmentation and SVM Classification
pp. 210
Using Ant Colony Optimization to Build Cluster-Based Classification Systems
pp. 210
Learning to Detect Roads in High-Resolution Aerial Images
pp. 211
Timed Temporal Logics
pp. 211
Do Voting Advice Applications Have an Effect on Electoral Participation and Voter Turnout? Evidence from the 2007 Swiss Federal Elections
pp. 213
Planarity for clustered graphs
pp. 213
VPR: a new packing, placement and routing tool for FPGA research
pp. 213
3D multi-scale line filter for segmentation and visualization of curvilinear structures in medical images
pp. 214
Piecewise testable events
pp. 214
Deriving Inverse Operators for Modal Logic
pp. 214
Hierarchical Predicate Encryption for Inner-Products
pp. 215
Conceptual Model of Complex Multi-agent System Smart City 4.0
pp. 215
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
pp. 215
Deterministic Identity-Based Encryption from Lattices with More Compact Public Parameters
pp. 216
Comparison of Methods for Community Detection in Networks
pp. 216
The (Thin) Bridges of AS Connectivity: Measuring Dependency Using AS Hegemony
pp. 217
When Is “Nearest Neighbor” Meaningful?
pp. 217
A Generic yet Efficient Method for Secure Inner Product
pp. 220
An Application of Recurrent Neural Networks to Discriminative Keyword Spotting
pp. 221
A Language and a Methodology for Prototyping User Interfaces for Control Systems
pp. 221
A Neural Approach to Blind Motion Deblurring
pp. 221
Contributing to Current Challenges in Identity and Access Management with Visual Analytics
pp. 222
The Independent Choice Logic and Beyond
pp. 222
Interlinked Convolutional Neural Networks for Face Parsing
pp. 222
Towards a Quick Computation of Well-Spread Pareto-Optimal Solutions
pp. 223
Arrays in Blitz++
pp. 223
DFA on LS-Designs with a Practical Implementation on SCREAM
pp. 223
An Analysis of Minutiae Matching Strength
pp. 223
Model-Driven Web Form Validation with UML and OCL
pp. 224
Fundamentals of 3D halftoning
pp. 227
Watermarking document images with bounding box expansion
pp. 227
SSH – Somewhat Secure Host
pp. 228
Semi-numerical Solution of Stochastic Process Algebra Models
pp. 228
Comparing a Shipping Information Pipeline with a Thick Flow and a Thin Flow
pp. 229
Squerall: Virtual Ontology-Based Access to Heterogeneous and Large Data Sources
pp. 229
Optimizing Window Aggregate Functions via Random Sampling
pp. 230
A Flexible and Extensible Architecture for Device-Level Service Deployment
pp. 230
SCTP, XTP and TCP as Transport Protocols for High Performance Computing on Multi-cluster Grid Environments
pp. 231
Maximum Matching in Semi-streaming with Few Passes
pp. 231
Reflection and Preservation of Properties in Coalgebraic (bi)Simulations
pp. 232
A General Diagnosis Method for Ontologies
pp. 232
A Structured Comparison of Social Engineering Intelligence Gathering Tools
pp. 232
GRASPing the Examination Scheduling Problem
pp. 233
On spanning trees with low crossing numbers
pp. 233
Automatic Generalization of a QA Answer Extraction Module Based on Semantic Roles
pp. 233
Multi-scale line segmentation with automatic estimation of width, contrast and tangential direction in 2D and 3D medical images
pp. 234
Clustering and Hot Spot Detection in Socio-economic Spatio-temporal Data
pp. 234
Semi-supervised On-Line Boosting for Robust Tracking
pp. 235
Kernel Depth Measures for Functional Data with Application to Outlier Detection
pp. 236
Cancer Metastasis Detection via Spatially Structured Deep Network
pp. 236
Metacommunication Patterns in Online Communities
pp. 236
SpecDB: A Database for Storing and Managing Mass Spectrometry Proteomics Data
pp. 237
Towards Personalization of Diabetes Therapy Using Computerized Decision Support and Machine Learning: Some Open Problems and Challenges
pp. 237
Scholia, Scientometrics and Wikidata
pp. 238
Design of a Series Variable Stiffness Joint Based on Antagonistic Principle
pp. 238
Multimedia Search with Pseudo-relevance Feedback
pp. 238
Integrating Formal Predictions of Interactive System Behaviour with User Evaluation
pp. 238
An Evaluation Framework for Disseminating Context Information with Gossiping
pp. 239
Undetachable Threshold Signatures
pp. 240
Implementing Computations in Automaton (Semi)groups
pp. 241
Motion Reconstruction of Swarm-Like Self-organized Motor Bike Traffic from Public Videos
pp. 241
Mining Communication Data in a Music Community: A Preliminary Analysis
pp. 243
Predestination: Inferring Destinations from Partial Trajectories
pp. 243
Identifying the Affective Dimension of Data Mining Practice: An Exploratory Study
pp. 243
KT-IDEM: Introducing Item Difficulty to the Knowledge Tracing Model
pp. 244
IR-n: A Passage Retrieval System at CLEF-2001
pp. 244
Automating the Choice of Decision Support System Architecture
pp. 244
A practical secret voting scheme for large scale elections
pp. 245
Fast Log Replication in Highly Available Data Store
pp. 246
Parametric Trace Slicing and Monitoring
pp. 247
On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records
pp. 247
Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis
pp. 248
EEG-Based Random Number Generators
pp. 249
Efficient Timetable Information in the Presence of Delays
pp. 249
Adaptive Learning from Evolving Data Streams
pp. 249
A Taxonomy of Single Sign-On Systems
pp. 249
Two-Phase Preference Disclosure in Attributed Social Networks
pp. 250
Type Assignment for Intersections and Unions in Call-by-Value Languages
pp. 250
Two-Degree-of-Freedom Mechanisms Design Based on Parasitic Motion Maximization
pp. 250
Compositional Specification of Controllers for Batch Process Operations
pp. 250
Secure Two-Party Computation Is Practical
pp. 251
The Challenge of Accelerating Greek Judicial Procedure
pp. 252
A Formal Template Language Enabling Metaproof
pp. 256
Ninth International Workshop on the Pragmatics of OCL and Other Textual Specification Languages
pp. 256
A Dataset for Web-Scale Knowledge Base Population
pp. 256
Constraint Support in MDA Tools: A Survey
pp. 256
Graphical Modeling of Ultrasound Propagation in Tissue for Automatic Bone Segmentation
pp. 256
Playing “Air Instruments”: Mimicry of Sound-Producing Gestures by Novices and Experts
pp. 257
Eighth International Workshop on OCL Concepts and Tools
pp. 258
Using Case-Based Tests to Detect Gray Cygnets
pp. 258
Monoaural Audio Source Separation Using Deep Convolutional Neural Networks
pp. 260
User Modeling on Adaptive Web-Based Learning Communities
pp. 261
Stochastic Semantic-Based Multi-objective Genetic Programming Optimisation for Classification of Imbalanced Data
pp. 261
Analysis of a Proposed Hash-Based Signature Standard
pp. 261
Cross-Categorial Donkeys
pp. 261
A Scalable Framework for Quality Assessment of RDF Datasets
pp. 263
On Cost-Effective Inter-LMA Domain Handover Scheme in NEMO-PMIPv6 Networks
pp. 263
Information and Knowledge Based Conceptual Study of 2008 Financial Crisis
pp. 263
Social Network for Education: What Are the Resources Desired by Students?
pp. 263
Compression and Information Leakage of Plaintext
pp. 264
From Individuals to Social and Vice-versa
pp. 265
HOL Light: A tutorial introduction
pp. 265
Bayesian Image Quality Transfer
pp. 266
Reuse: From Components to Services
pp. 266
A Reduction of Logical Regulatory Graphs Preserving Essential Dynamical Properties
pp. 266
Sliding Mode Control of Robot Based on Neural Network Model with Positive Definite Inertia Matrix
pp. 267
The (Un)reliability of Saliency Methods
pp. 267
Discovering Opinion Spammer Groups by Network Footprints
pp. 268
The Join Calculus: A Language for Distributed Mobile Programming
pp. 270
Towards a Formalization of Individual Work Execution at Computer Workplaces
pp. 271
On the specification of elementary reactive behaviour
pp. 273
Ranking Entities Using Web Search Query Logs
pp. 274
Indexing Highly Repetitive Collections
pp. 274
Testing Speculative Work in a Lazy/Eager Parallel Functional Language
pp. 276
Similarity Search on Time Series Based on Threshold Queries
pp. 276
On the Expressiveness of Refinement Settings
pp. 276
Isogeny Volcanoes and the SEA Algorithm
pp. 277
Comparative Analysis of Effectiveness of Two Timing-Driven Design Approaches
pp. 277
On Solutions to the Key Escrow Problem
pp. 277
Weighted Learning Vector Quantization to Cost-Sensitive Learning
pp. 278
Robust and Accurate Shape Model Fitting Using Random Forest Regression Voting
pp. 281
A Lightweight Regression Method to Infer Psycholinguistic Properties for Brazilian Portuguese
pp. 281
Detecting Isodistance Hotspots on Spatial Networks: A Summary of Results
pp. 282
MOPED: A Multi-objective Parzen-Based Estimation of Distribution Algorithm for Continuous Problems
pp. 282
Object Segmentation by Long Term Analysis of Point Trajectories
pp. 283
Classification of Photo and Sketch Images Using Convolutional Neural Networks
pp. 283
Quantum Security of NMAC and Related Constructions
pp. 286
Evolutionary Fuzzy Scheduler for Grid Computing
pp. 289
Measuring Similarity in Description Logics Using Refinement Operators
pp. 289
Managerial and Technical Barriers to the Adoption of Open Source Software
pp. 291
Reinforced Condition/Decision Coverage (RC/DC): A New Criterion for Software Testing
pp. 291
Resilient Optimistic Termination Detection for the Async-Finish Model
pp. 292
Categorical and Kripke Semantics for Constructive S4 Modal Logic
pp. 292
Particle Filtering for Nonlinear BOLD Signal Analysis
pp. 292
FaCT++ Description Logic Reasoner: System Description
pp. 293
Sparklify: A Scalable Software Component for Efficient Evaluation of SPARQL Queries over Distributed RDF Datasets
pp. 293
Cross-View Action Recognition from Temporal Self-similarities
pp. 294
A Streaming Data Prediction Method Based on Evolving Bayesian Network
pp. 296
On Probabilistic Parallel Programs with Process Creation and Synchronisation
pp. 297
Orthogonal Drawings with Few Layers
pp. 298
All-But-Many Lossy Trapdoor Functions from Lattices and Applications
pp. 298
A Comparison of Market Approaches to Software Vulnerability Disclosure
pp. 299
Use Fewer Instances of the Letter “i”: Toward Writing Style Anonymization
pp. 299
Verifying Progress in Timed Systems
pp. 300
A Cross-Modality Neural Network Transform for Semi-automatic Medical Image Annotation
pp. 300
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
pp. 300
Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation
pp. 300
A Methodology Based on MP Theory for Gene Expression Analysis
pp. 302
Detecting Partially Occluded Objects with an Implicit Shape Model Random Field
pp. 303
The Minimum Conflict-Free Row Split Problem Revisited
pp. 303
Leveraging the Model-Driven Architecture for Service Choreography in Ubiquitous Systems
pp. 303
Extending the Petri Box Calculus with Time
pp. 303
Replica-Aware Partitioning Design in Parallel Database Systems
pp. 304
Calculating multidimensional symmetric functions using Jacobi's formula
pp. 304
Qubit Neural Network and Its Efficiency
pp. 305
On-the-fly analysis of systems with unbounded, lossy FIFO channels
pp. 305
Person Name Discrimination in the Dossier–GPLSI at the University of Alicante
pp. 306
On-Line Algorithms in Machine Learning
pp. 307
An Economic Model of User Rating in an Online Recommender System
pp. 307
A Learning-Based Algorithm Selection Meta-Reasoner for the Real-Time MPE Problem
pp. 308
Using Reservoir Computing and Trend Information for Short-Term Streamflow Forecasting
pp. 308
Securely Accessing Shared Resources with Concurrent Constraint Programming
pp. 309
MarUja: Virtual Assistant Prototype for the Computing Service Catalogue of the University of Jaén
pp. 309
User Engagement in Research Data Curation
pp. 313
An Open-Ended Computational Evolution Strategy for Evolving Parsimonious Solutions to Human Genetics Problems
pp. 313
TeslaML: Steering Machine Learning Automatically in Tencent
pp. 313
A Reliability-Based Approach for Influence Maximization Using the Evidence Theory
pp. 317
Tamper resistant software: an implementation
pp. 317
A Knowledge-Based Approach to Augment Applications with Interaction Traces
pp. 317
The Effect of Subharmonic Stimuli on Singing Voices
pp. 318
Applying Evolutionary Techniques to Debug Functional Programs
pp. 318
Rethinking Spatiotemporal Feature Learning: Speed-Accuracy Trade-offs in Video Classification
pp. 319
Ellipse Detection for Visual Cyclists Analysis “In the Wild”
pp. 319
Object Recognition with Gradient-Based Learning
pp. 320
Improving Semantic Segmentation with Generalized Models of Local Context
pp. 320
The Local Nature of List Colorings for Graphs of High Girth
pp. 321
Design of a Neural Network for an Identification of a Robot Model with a Positive Definite Inertia Matrix
pp. 322
Learning Continuous-Time Information Diffusion Model for Social Behavioral Data Analysis
pp. 322
A Mimetic Finite-Difference Scheme for Convection of Multicomponent Fluid in a Porous Medium
pp. 323
Cautious Ordinal Classification by Binary Decomposition
pp. 323
Laconic and Precise Justifications in OWL
pp. 323
Verifying Linearisability with Potential Linearisation Points
pp. 324
Trusting and Adopting E-Government Services in Developing Countries? Privacy Concerns and Practices in Rwanda
pp. 324
A Fast and Automatic Method to Correct Intensity Inhomogeneity in MR Brain Images
pp. 325
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups
pp. 327
A Novel and Unifying View of Trustworthiness in Cyberphysical Systems
pp. 328
Tools for Supporting Hybrid Learning Strategies in Open Source Software Environments
pp. 328
Session Types for Object-Oriented Languages
pp. 328
Modeling and In-Database Management of Relational, Data-Aware Processes
pp. 329
A Conversational Agent as Museum Guide – Design and Evaluation of a Real-World Application
pp. 329
Untrusted Business Process Monitoring and Execution Using Blockchain
pp. 330
Fuzzy Clustering of Short Time-Series and Unevenly Distributed Sampling Points
pp. 331
Web Accessibility in Africa: A Study of Three African Domains
pp. 331
A Feedback Control Approach to Mitigating Mistreatment in Distributed Caching Groups
pp. 331
Mapping Cyber-Collective Action among Female Muslim Bloggers for the Women to Drive Movement
pp. 331
Learning Assumptions for Compositional Verification
pp. 331
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services
pp. 332
A Novel Modeling and Recognition Method for Underwater Sound Based on HMT in Wavelet Domain
pp. 332
VirtualEMF: A Model Virtualization Tool
pp. 332
Visual Landmark Based 3D Road Course Estimation with Black Box Variational Inference
pp. 333
Organizing a Global Coordinate System from Local Information on an Ad Hoc Sensor Network
pp. 333
A Global Constraint for Closed Frequent Pattern Mining
pp. 336
Multivariate Dynamic Kernels for Financial Time Series Forecasting
pp. 337
Complete Parsimony Haplotype Inference Problem and Algorithms
pp. 338
Comparing Twitter and Traditional Media Using Topic Models
pp. 340
Discriminative Analysis of Early Alzheimer’s Disease Based on Two Intrinsically Anti-correlated Networks with Resting-State fMRI
pp. 342
A Process for Driving Process Improvement in VSEs
pp. 342
Robust Accurate Extrinsic Calibration of Static Non-overlapping Cameras
pp. 343
Contour tracking by stochastic propagation of conditional density
pp. 343
A First Step Toward Quantifying the Climate’s Information Production over the Last 68,000 Years
pp. 344
Supporting Framework Use via Automatically Extracted Concept-Implementation Templates
pp. 344
Automated Segmentation of Knee MRI Using Hierarchical Classifiers and Just Enough Interaction Based Learning: Data from Osteoarthritis Initiative
pp. 345
A Probabilistic Interpretation of Precision, Recall and F-Score, with Implication for Evaluation
pp. 346
Towards Aggregated Answers for Semistructured Data
pp. 347
Formally Testing Liveness by Means of Compression Rates
pp. 348
Rawdata-Based Detection of the Optimal Reconstruction Phase in ECG-Gated Cardiac Image Reconstruction
pp. 350
Method for Polygonal Approximation through Dominant Points Deletion
pp. 351
Neural Networks Compression for Language Modeling
pp. 351
Tetris is Hard, Even to Approximate
pp. 352
Dynamically Balanced Online Random Forests for Interactive Scribble-Based Segmentation
pp. 353
Selecting the Optimal Sequence for Deformable Registration of Microscopy Image Sequences Using Two-Stage MST-based Clustering Algorithm
pp. 354
LTSmin: Distributed and Symbolic Reachability
pp. 354
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum
pp. 354
Nonlinear Control of Omnidirectional Mobile Platforms
pp. 354
Estimating Visual Comfort in Stereoscopic Displays Using Electroencephalography: A Proof-of-Concept
pp. 354
Do We Need a New Narratology for Interactive Digital Storytelling? A Workshop on Theory at ICIDS 2009
pp. 355
Diagnosing Performance Variations in HPC Applications Using Machine Learning
pp. 356
The Computer Scientist Nightmare
pp. 357
X-ray Image Contrast Enhancement Using the Second Generation Curvelet Transform
pp. 357
Classification Rule Mining with an Improved Ant Colony Algorithm
pp. 359
Verified LISP Implementations on ARM, x86 and PowerPC
pp. 359
CNN-Based Background Subtraction for Long-Term In-Vial FIM Imaging
pp. 359
Recognition and Segmentation of 3-D Human Action Using HMM and Multi-class AdaBoost
pp. 361
Metamodel—Assisted Evolution Strategies
pp. 361
Mobile Terminals Haptic Interface: A Vibro-Tactile Finger Device for 3D Shape Rendering
pp. 362
JAK-STAT Signalling as Example for a Database-Supported Modular Modelling Concept
pp. 363
Mediated Population Protocols
pp. 365
Dynamic Regression for Partial Correlation and Causality Analysis of Functional Brain Networks
pp. 366
One Knowledge Graph to Rule Them All? Analyzing the Differences Between DBpedia, YAGO, Wikidata & co.
pp. 367
Localized Priors for the Precise Segmentation of Individual Vertebras from CT Volume Data
pp. 368
Mining Outliers with Ensemble of Heterogeneous Detectors on Random Subspaces
pp. 369
Spatiotemporal Integration of Optical Flow Vectors for Micro-expression Detection
pp. 369
Reachability in Succinct and Parametric One-Counter Automata
pp. 370
High-Throughput Glomeruli Analysis of $$\mu $$ CT Kidney Images Using Tree Priors and Scalable Sparse Computation
pp. 371
Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance
pp. 371
A Model of Spatial Reference Frames in Language
pp. 372
CADP 2010: A Toolbox for the Construction and Analysis of Distributed Processes
pp. 372
Bayesian Diffusion Tensor Estimation with Spatial Priors
pp. 372
Recovery of Liver Motion and Deformation Due to Respiration Using Laparoscopic Freehand 3D Ultrasound System
pp. 372
Using Machine Learning Techniques to Recover Prismatic Cirrus Ice Crystal Size from 2-Dimensional Light Scattering Patterns
pp. 373
Kernel-Regularized ICA for Computing Functional Topography from Resting-State fMRI
pp. 373
Adaptive Multimodal Fusion
pp. 373
Brain-Computer Interface Games: Towards a Framework
pp. 374
Spelling approximate repeated or common motifs using a suffix tree
pp. 376
An Application of NLP Rules to Spoken Document Segmentation Task
pp. 377
A Registration Method for 3D Point Clouds with Convolutional Neural Network
pp. 377
Metaheuristic Hybridized Applied to Solve the Capacity Vehicle Routing Problem
pp. 378
Music Artist Similarity: An Exploratory Study on a Large-Scale Dataset of Online Streaming Services
pp. 380
25 Years of CNNs: Can We Compare to Human Abstraction Capabilities?
pp. 382
Mitotic Oscillators as MP Graphs
pp. 384
On Designing a GeoViz-Aware Database System - Challenges and Opportunities
pp. 384
Fully-Dynamic All-Pairs Shortest Paths: Faster and Allowing Negative Cycles
pp. 386
The Universal Composable Security of Quantum Key Distribution
pp. 386
Photo and Video Quality Evaluation: Focusing on the Subject
pp. 387
Security Proofs for Signature Schemes
pp. 388
Unsupervised Acquisition of Axioms to Paraphrase Noun Compounds and Genitives
pp. 389
Jump Number of Two-Directional Orthogonal Ray Graphs
pp. 390
An evolved circuit, intrinsic in silicon, entwined with physics
pp. 391
Labeling Color 2D Digital Images in Theoretical Near Logarithmic Time
pp. 391
Using Social Media for Word-of-Mouth Marketing
pp. 393
A Survey of Single-Database Private Information Retrieval: Techniques and Applications
pp. 394
Program Metamorphosis
pp. 397
Streaming Algorithm for Euler Characteristic Curves of Multidimensional Images
pp. 399
Concurrent Kleene Algebra
pp. 401
Wayfinding Strategies in Behavior and Language: A Symmetric and Interdisciplinary Approach to Cognitive Processes
pp. 402
Name Creation vs. Replication in Petri Net Systems
pp. 402
Improving the Centered CUSUMS Statistic for Structural Break Detection in Time Series
pp. 405
An Integrated Solar Database (ISD) with Extended Spatiotemporal Querying Capabilities
pp. 405
Advanced Parallel Robot with Extended RSUR Kinematic for a Circulating Working Principle
pp. 405
A Functionality Perspective on Digital Library Interoperability
pp. 408
Parallelization of Pricing Path-Dependent Financial Instruments on Bounded Trinomial Lattices
pp. 413
Local Descriptors Encoded by Fisher Vectors for Person Re-identification
pp. 414
Investigating ID3-Induced Rules from Low-Dimensional Data Cleaned by Complete Case Analysis
pp. 416
Sentiment Analysis of Products’ Reviews Containing English and Hindi Texts
pp. 416
Improving Functional MRI Registration Using Whole-Brain Functional Correlation Tensors
pp. 416
An Empirical Study on Evolution of API Documentation
pp. 417
Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates
pp. 417
Personal Desktop-Level Jet Fighter Simulator for Training or Entertainment
pp. 419
Symbolic Techniques for Parametric Reasoning about Counter and Clock Systems
pp. 421
Pattern Matching in Lempel-Ziv Compressed Strings: Fast, Simple, and Deterministic
pp. 424
Construction of Büchi Automata for LTL Model Checking Verified in Isabelle/HOL
pp. 425
TabEL: Entity Linking in Web Tables
pp. 426
On Memory-Bound Functions for Fighting Spam
pp. 427
Generating Fake but Realistic Headlines Using Deep Neural Networks
pp. 428
Families of Graph Algorithms: SSSP Case Study
pp. 430
Differences on How People Organize and Think about Personal Information
pp. 431
Improving MDLSTM for Offline Arabic Handwriting Recognition Using Dropout at Different Positions
pp. 433
Reconstructing Many Partitions Using Spectral Techniques
pp. 433
Multimodal Hyper-connectivity Networks for MCI Classification
pp. 434
Emergence of Cooperation in Adaptive Social Networks with Behavioral Diversity
pp. 435
On Optimizing Nearest Neighbor Queries in High-Dimensional Data Spaces
pp. 437
Integrating Information of Films by a Multi-source Combining Framework
pp. 438
CFD Analysis Incorporating the Influence of Wall Motion: Application to Intracranial Aneurysms
pp. 438
Preprocessing and Transmission for 3D Point Cloud Data
pp. 439
Application Research on Network Attacks and Defenses with Zachman Framework
pp. 439
Improving Toponym Extraction and Disambiguation Using Feedback Loop
pp. 441
PRISM: A Tool for Automatic Verification of Probabilistic Systems
pp. 442
Affective, Behavioral, and Cognitive Aspects of Teen Perspectives on Personal Data in Social Media: A Model of Youth Data Literacy
pp. 445
Loci: Simple Thread-Locality for Java
pp. 445
How the Structuring of Domain Knowledge Helps Casual Process Modelers
pp. 445
Coverability Trees for Petri Nets with Unordered Data
pp. 446
Parallel Computing for Time-Consuming Multicriterial Optimization Problems
pp. 447
Algorithms for ε-Approximations of Terrains
pp. 447
On the Complexity of Mixed Discriminants and Related Problems
pp. 448
Higher-order logic programming
pp. 449
On approximation properties of the Independent set problem for degree 3 graphs
pp. 450
A Novel Approach to Network Security Situation Assessment Based on Attack Confidence
pp. 450
Dexterous Hand Motion Classification and Recognition Based on Multimodal Sensing
pp. 450
Knowledge Discovery Using Concept-Class Taxonomies
pp. 451
Increasing the capacity of a hopfield network without sacrificing functionality
pp. 452
A Case Base Planning Approach for Dialogue Generation in Digital Movie Design
pp. 454
Universal quasi-prime algebraic domains
pp. 455
Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time
pp. 457
DeepRED – Rule Extraction from Deep Neural Networks
pp. 459
Air Quality Monitoring System and Benchmarking
pp. 460
Exploratory Matrix Factorization for PET Image Analysis
pp. 460
Population-Shrinkage of Covariance to Estimate Better Brain Functional Connectivity
pp. 460
Topology Aware Fully Convolutional Networks for Histology Gland Segmentation
pp. 461
Preserving the Fabric of Our Lives: A Survey of Web Preservation Initiatives
pp. 462
Generation and Transformation of Compliant Process Collaboration Models to BPMN
pp. 462
Hedging Public-Key Encryption in the Real World
pp. 462
Learning the Grammar of Distant Change in the World-Wide Web
pp. 467
Mining process models from workflow logs
pp. 468
A Goal-Based Modeling Approach to Develop Requirements of an Adaptive System with Environmental Uncertainty
pp. 471
A New Neural Model for Traffic Simulation
pp. 471
Taverna, Reloaded
pp. 474
Robust Human Action Recognition Using Dynamic Movement Features
pp. 476
Computational Complexity of Traffic Hijacking under BGP and S-BGP
pp. 476
Who Will Follow Whom? Exploiting Semantics for Link Prediction in Attention-Information Networks
pp. 476
Approximate Distance Labeling Schemes
pp. 479
Homotopy Type Theory in Lean
pp. 479
Part-Based Local Shape Models for Colon Polyp Detection
pp. 479
GameOfFlows: Process Instance Adaptation in Complex, Dynamic and Potentially Adversarial Domains
pp. 481
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family
pp. 482
Combining Edge, Region, and Shape Information to Segment the Left Ventricle in Cardiac MR Images
pp. 483
Application Areas of AIS: The Past, The Present and The Future
pp. 486
Creating Subjective and Objective Sentence Classifiers from Unannotated Texts
pp. 487
Creating the DISEQuA Corpus: A Test Set for Multilingual Question Answering
pp. 488
Multinomial Naive Bayes for Text Categorization Revisited
pp. 490
The Blockchain and Kudos: A Distributed System for Educational Record, Reputation and Reward
pp. 491
Key Design Properties for Shipping Information Pipeline
pp. 491
Mining the Web for Synonyms: PMI-IR versus LSA on TOEFL
pp. 494
Object, Scene and Actions: Combining Multiple Features for Human Action Recognition
pp. 494
PISA — A Platform and Programming Language Independent Interface for Search Algorithms
pp. 495
Supervised Discriminative EEG Brain Source Imaging with Graph Regularization
pp. 495
Complexity Bounds for Regular Games
pp. 498
The Role of Self-efficacy in Cancer Information Avoidance
pp. 498
Genetics of Anisotropy Asymmetry: Registration and Sample Size Effects
pp. 500
Fine-Tuning Word Embeddings for Aspect-Based Sentiment Analysis
pp. 501
Recognition of Two-Dimensional Shapes Based on Dependence Vectors
pp. 502
Augmented Lagrangian Method, Dual Methods and Split Bregman Iteration for ROF Model
pp. 502
Convergence Time to Nash Equilibria
pp. 506
Non-negative Kernel Sparse Coding for the Analysis of Motion Data
pp. 507
Robot Orientation with Histograms on MSL
pp. 509
The Conflict-Driven Answer Set Solver clasp: Progress Report
pp. 509
Blobworld: A System for Region-Based Image Indexing and Retrieval
pp. 510
Recurrent Fusion Network for Image Captioning
pp. 510
Sprinkling: Supervised Latent Semantic Indexing
pp. 514
Approximate Reachability for Linear Systems
pp. 516
Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework
pp. 516
Feature Selection and Activity Recognition from Wearable Sensors
pp. 516
Valmet: A New Validation Tool for Assessing and Improving 3D Object Segmentation
pp. 517
Terrier Information Retrieval Platform
pp. 517
Scene Classification Via pLSA
pp. 520
4D Shape Registration for Dynamic Electrophysiological Cardiac Mapping
pp. 520
Bayesian Inference of Latent Causes in Gene Regulatory Dynamics
pp. 521
MOCHA: Modularity in model checking
pp. 521
Information Behavior and Filipino Values: An Exploratory Study
pp. 523
Risk-Based Models of Attacker Behavior in Cybersecurity
pp. 523
Dynamic Field Mapping and Motion Correction Using Interleaved Double Spin-Echo Diffusion MRI
pp. 525
The Beginning of a Beautiful Friendship? Intelligent Tutoring Systems and MOOCs
pp. 525
Policy Model for National and Academic Digital Collections
pp. 528
ReliefF-ML: An Extension of ReliefF Algorithm to Multi-label Learning
pp. 531
Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks
pp. 533
Multi-scale Improves Boundary Detection in Natural Images
pp. 534
Queuing Algorithms Performance against Buffer Size and Attack Intensities in DDOS Attacks
pp. 535
Enhancing Effectiveness of Outlier Detections for Low Density Patterns
pp. 544
An Integrated Programming Environment for Teaching the Object-Oriented Programming Paradigm
pp. 544
Work that Enables Care: Understanding Tasks, Automation, and the National Health Service
pp. 544
Cosmology Inspired Design of Biomimetic Tissue Engineering Templates with Gaussian Random Fields
pp. 547
Proactive Process Adaptation Using Deep Learning Ensembles
pp. 548
Blind Decomposition of Spectral Imaging Microscopy: A Study on Artificial and Real Test Data
pp. 549
A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems
pp. 550
Analyzing the Effect of Query Class on Document Retrieval Performance
pp. 550
A Conceptual Model for Multidimensional Analysis of Documents
pp. 551
Almost 2-SAT Is Fixed-Parameter Tractable (Extended Abstract)
pp. 552
PET: An Interactive Software Testing Tool
pp. 553
Eye Movements and Pupil Size Reveal Deception in Computer Administered Questionnaires
pp. 554
Image Registration Guided by Particle Filter
pp. 557
A New Method for the Registration of Cardiac PET and MR Images Using Deformable Model Based Segmentation of the Main Thorax Structures
pp. 561
Private Computation of Spatial and Temporal Power Consumption with Smart Meters
pp. 562
New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction
pp. 566
An Assistive Vision System for the Blind That Helps Find Lost Things
pp. 567
Universal hashing and k-wise independent random variables via integer arithmetic without primes
pp. 569
Accurate Prediction of Financial Distress of Companies with Machine Learning Algorithms
pp. 570
A Review of Upper and Lower Limb Rehabilitation Training Robot
pp. 572
7T-Guided Learning Framework for Improving the Segmentation of 3T MR Images
pp. 573
Defining and Detecting Emergence in Complex Networks
pp. 575
Category Independent Object Proposals
pp. 576
Securing the Future — An Information Flow Analysis of a Distributed OO Language
pp. 577
Ranking Outliers Using Symmetric Neighborhood Relationship
pp. 577
Tracklet Descriptors for Action Modeling and Video Analysis
pp. 582
Improving the Robustness in Extracting 3D Point Landmarks from 3D Medical Images Using Parametric Deformable Models
pp. 583
A Temporal Object-Oriented Data Warehouse Model
pp. 587
Improving the Presentation of Argument Interpretations Based on User Trials
pp. 588
Specifying Web Service Compositions on the Basis of Natural Language Requests
pp. 589
Region Covariance: A Fast Descriptor for Detection and Classification
pp. 591
Color-Based Object Tracking in Multi-camera Environments
pp. 591
Joint Factorizational Topic Models for Cross-City Recommendation
pp. 598
Massive Quasi-Clique Detection
pp. 602
A Sparse Bayesian Learning Algorithm for White Matter Parameter Estimation from Compressed Multi-shell Diffusion MRI
pp. 602
Robust Vessel Tree Modeling
pp. 604
Configurations with Few Crossings in Topological Graphs
pp. 605
Intention-Based Human Robot Collaboration
pp. 609
Automatic Table Detection in Document Images
pp. 610
Voice Code Verification Algorithm Using Competing Models for User Entrance Authentication
pp. 616
Revisiting Ackermann-Hardness for Lossy Counter Machines and Reset Petri Nets
pp. 617
Relational Differential Prediction
pp. 618
Introduction to: The Myths of Object-Orientation
pp. 620
q-Space Upsampling Using x-q Space Regularization
pp. 620
Registering Histological and MR Images of Prostate for Image-Based Cancer Detection
pp. 620
Revisiting the Sequence Constraint
pp. 624
Regularization and Semi-supervised Learning on Large Graphs
pp. 625
Block Matrix Multiplication in a Distributed Computing Environment: Experiments with NetSolve
pp. 625
On Supervised Human Activity Analysis for Structured Environments
pp. 626
An Evolutionary Algorithm for Adaptive Online Services in Dynamic Environment
pp. 635
Kernel Bounds for Disjoint Cycles and Disjoint Paths
pp. 637
Analytic Expressions for Fiducial and Surface Target Registration Error
pp. 639
Source Code Rejuvenation Is Not Refactoring
pp. 640
Subtype Cell Detection with an Accelerated Deep Convolution Neural Network
pp. 640
Type-Constrained Representation Learning in Knowledge Graphs
pp. 642
On the Road to an Abstract Architecture for Open Virtual Organizations
pp. 644
Automatic Nipple Detection Using Shape and Statistical Skin Color Information
pp. 647
Integration of Libnormaliz in CoCoALib and CoCoA 5
pp. 648
Zoom Better to See Clearer: Human and Object Parsing with Hierarchical Auto-Zoom Net
pp. 648
Supporting Concurrency in Private Data Outsourcing
pp. 649
Imaging Biomarker Discovery for Lung Cancer Survival Prediction
pp. 651
PRF-ODH: Relations, Instantiations, and Impossibility Results
pp. 652
Active Learning for Dialogue Act Labelling
pp. 653
On the Use of Implicit Shape Models for Recognition of Object Categories in 3D Data
pp. 656
Generating Applications from Object Role Models
pp. 658
A Grid Service Based on Suffix Trees for Pattern Extraction from Mass Spectrometry Proteomics Data
pp. 660
Query Specific Fusion for Image Retrieval
pp. 660
PARAM: A Model Checker for Parametric Markov Models
pp. 667
Automatic Quantification of Fluorescence from Clustered Targets in Microscope Images
pp. 667
Cache-Timing Template Attacks
pp. 667
Malware Behavior Modeling with Colored Petri Nets
pp. 674
Product Theorems Via Semidefinite Programming
pp. 675
Speeding Up Logistic Model Tree Induction
pp. 678
Physics-Based Elastic Image Registration Using Splines and Including Landmark Localization Uncertainties
pp. 681
Embedding Memoization to the Semantic Tree Search for Deciding QBFs
pp. 681
Monadic Second-Order Logics with Cardinalities
pp. 681
TBS: Tensor-Based Supervoxels for Unfolding the Heart
pp. 682
HiDDeN: Hiding Data With Deep Networks
pp. 685
A Hierarchical Convolutional Neural Network for Mitosis Detection in Phase-Contrast Microscopy Images
pp. 687
Video Retrieval Based on Words-of-Interest Selection
pp. 690
VC-Dimension and Shortest Path Algorithms
pp. 692
A Relaxed K-SVD Algorithm for Spontaneous Micro-Expression Recognition
pp. 695
Interactive Simulation of Embolization Coils: Modeling and Experimental Validation
pp. 696
Kernel Codebooks for Scene Categorization
pp. 697
Using Google Analytics to Evaluate the Usability of E-Commerce Sites
pp. 698
Approximative Methods for Monotone Systems of Min-Max-Polynomial Equations
pp. 699
Managing Process Model Collections with AProMoRe
pp. 700
Current Events: Identifying Webpages by Tapping the Electrical Outlet
pp. 706
Gait Analysis for Human Identification
pp. 706
Set Bounds and (Split) Set Domain Propagation Using ROBDDs
pp. 712
Audible Convergence for Optimal Base Melody Extension with Statistical Genre-Specific Interval Distance Evaluation
pp. 713
Developing Library Services for International Students in China’s Universities: What Does the Literature Tell Us?
pp. 717
Fast Guided Global Interpolation for Depth and Motion
pp. 718
User Friendly Decision Support Techniques in a Case-Based Reasoning System
pp. 721
Access Control Model for AWS Internet of Things
pp. 722
Finding Knees in Multi-objective Optimization
pp. 726
Intensity Gradient Based Registration and Fusion of Multi-modal Images
pp. 728
Towards Image-Guided Pancreas and Biliary Endoscopy: Automatic Multi-organ Segmentation on Abdominal CT with Dense Dilated Networks
pp. 734
Gait Shape Estimation for Identification
pp. 735
A Generative Approach for Image-Based Modeling of Tumor Growth
pp. 735
Distributed Formation Control of Autonomous Underwater Vehicles Based on Flocking and Consensus Algorithms
pp. 740
Kinematic Nonlinear Control of Aerial Mobile Manipulators
pp. 741
The Complexity of Counting Functions with Easy Decision Version
pp. 742
Natural Landmark Based Navigation
pp. 745
D-Width: A More Natural Measure for Directed Tree Width
pp. 747
Improving Surgical Training Phantoms by Hyperrealism: Deep Unpaired Image-to-Image Translation from Real Surgeries
pp. 748
Explicit Non-adaptive Combinatorial Group Testing Schemes
pp. 748
Alphabet-Independent Compressed Text Indexing
pp. 750
Multi-view Inverse Rendering Under Arbitrary Illumination and Albedo
pp. 751
Towards QoS-Awareness of Context-Aware Mobile Applications and Services
pp. 765
Control of a Magnet-Driven Nano Positioning Stage with Long Stroke Based on Disturbance Observer
pp. 769
Multimeme Algorithms for Protein Structure Prediction
pp. 770
Shape Preserving Filament Enhancement Filtering
pp. 771
Groupwise Non-rigid Registration Using Polyharmonic Clamped-Plate Splines
pp. 773
Impossibility of a Quantum Speed-Up with a Faulty Oracle
pp. 773
Development of a $$\upmu $$ CT-based Patient-Specific Model of the Electrically Stimulated Cochlea
pp. 774
Replicated Ambient Petri Nets
pp. 778
Pattern Repulsion Revisited
pp. 786
FCNN: Fourier Convolutional Neural Networks
pp. 789
Combining Spatial and Non-spatial Dictionary Learning for Automated Labeling of Intra-ventricular Hemorrhage in Neonatal Brain MRI
pp. 792
A Convex Formulation of Continuous Multi-label Problems
pp. 803
Evaluation of Evolutionary Algorithms for Multi-objective Train Schedule Optimization
pp. 805
Combining Face and Iris Biometrics for Identity Verification
pp. 806
A Multilingual SVM-Based Question Classification System
pp. 809
Where Should Saliency Models Look Next?
pp. 811
Clustering Gene Expression Profiles with Memetic Algorithms
pp. 819
Tri-Dexel Model Based Geometric Simulation of Multi-axis Additive Manufacturing
pp. 822
Multi-scale Patch Based Collaborative Representation for Face Recognition with Margin Distribution Optimization
pp. 823
Active Surface Approach for Extraction of the Human Cerebral Cortex from MRI
pp. 835
Deep Virtual Stereo Odometry: Leveraging Deep Depth Prediction for Monocular Direct Sparse Odometry
pp. 854
Size Independent Active Contour Model for Blood Vessel Lumen Quantification in High-Resolution Magnetic Resonance Images
pp. 861
Solving Rotated Multi-objective Optimization Problems Using Differential Evolution
pp. 869
Feature-Based Diversity Optimization for Problem Instance Classification
pp. 873
Sub-structural Niching in Non-stationary Environments
pp. 875
Scalable Metric Learning via Weighted Approximate Rank Component Analysis
pp. 904
Segmentation of Neck Lymph Nodes in CT Datasets with Stable 3D Mass-Spring Models
pp. 910
A Negotiation Agent
pp. 925
Using UN/CEFACT’S Modelling Methodology (UMM) in e-Health Projects
pp. 940
Calibration Method for Determining the Physical Location of the Ultrasound Image Plane
pp. 948
Detecting Inconsistencies in the Gene Ontology Using Ontology Databases with Not-gadgets
pp. 948
Flexible Camera Setup for Visual Based Registration on 2D Interaction Surface with Undefined Geometry Using Neural Network
pp. 948
Non-linear Local Registration of Functional Data
pp. 961
Random neural network recognition of shaped objects in strong clutter
pp. 991
A Bayesian Metric for Evaluating Machine Learning Algorithms
pp. 999
A Verified Compiler from Isabelle/HOL to CakeML
pp. 1017
A Toolbox for Learning from Relational Data with Propositional and Multi-instance Learners
pp. 1022
Phase-Based User-Steered Image Segmentation
pp. 1030
A Synergy of Modelling for Constraint Problems
pp. 1040
Robust Segmentation of Medical Images Using Geometric Deformable Models and a Dynamic Speed Function
pp. 1055
Discovering Interesting Association Rules by Clustering
pp. 1075
Image Guided Radiotherapy of the Prostate
pp. 1088
Analysis of the (1 + 1) EA for a Noisy OneMax
pp. 1114
Optimization in Prostate Cancer Detection
pp. 1137
An Architecture for Simulating Needle-Based Surgical Procedures
pp. 1147
Intra-operative Transfer of Planned Zygomatic Fixtures by Personalized Templates: A Cadaver Validation Study
pp. 1157
A Multimodal Navigation System for Interventional MRI
pp. 1166
Repeatability and Accuracy of Ankle Centre Location Estimates Using a Biaxial Joint Model
pp. 1174
Automatic Detection of Large Misregistrations of Multimodality Medical Images
pp. 1194
A Comparative Analysis of Fuzzy System Modelling Approaches: A Case in Mining Medical Diagnostic Rules
pp. 1201
Modeling Dynamic Rules in ORM
pp. 1201
Anisotropic Volume Rendering Using Intensity Interpolation
pp. 1215
A Method for µCT Based Assessment of Root Canal Instrumentation in Endodontics Research
pp. 1219
Immune Clonal Selection Algorithm for Multiuser Detection in DS-CDMA Systems
pp. 1235
Spherical Navigator Echoes for Full 3-D Rigid Body Motion Measurement in MRI
pp. 1237
Phase Unwrapping for Magnetic Resonance Thermometry
pp. 1250
Development of a New Image-Guided Prostate Biopsy System
pp. 1253
The Semipublic Encryption for Visual Cryptography Using Q’tron Neural Networks
pp. 1262
The T-Detectors Maturation Algorithm Based on Genetic Algorithm
pp. 1263
Real-Time Simulation of Minimally-Invasive Surgery with Cutting Based on Boundary Element Methods
pp. 1273
The Continuous Tabu Search as an Optimizer for 2D-to-3D Biomedical Image Registration
pp. 1279
Two-Step Registration of Subacute to Hyperacute Stroke MRIs
pp. 1283
A Maximum Likelihood Approach for 2-D to 3-D Registration
pp. 1293
The Importance of Partial Voluming in Multi-dimensional Medical Image Segmentation
pp. 1295
Learning a Procedure That Can Solve Hard Bin-Packing Problems: A New GA-Based Approach to Hyper-heuristics
pp. 1316
Advances in Active Constraints and Their Application to Minimally Invasive Surgery
pp. 1343
Bag-of-Particles Model for Simulating Tissue, Organs, and Flow
pp. 1356
Mutual Scale
pp. 1391
Classification of Breast Tumors on Digital Mammograms Using Laws’ Texture Features
pp. 1401
Interactive Visualisation of MRI Vector and Tensor Fields
pp. 1430
A Modular Robotic System for Ultrasound Image Acquisition
pp. 1435
Optimal Port Placement in Robot-Assisted Coronary Artery Bypass Grafting
Similar content
5,631
Global pedigree and national imperative: Hong Kong universities’ response to China’s grand strategies
Authors:
William Lo
,
Jack Lee
,
Dana Abdrasheva
Get Unstuck: pandemic positivity imperatives and self-care for women
Authors:
R Gill
,
S.S. Orgad
Impact and the Reflexive Imperative in Criminal Justice Policy, Practice and Research
Authors:
Sarah Armstrong
,
Jarrett Blaustein
,
Alistair Henry
See all similar
Cited by
21
Resource Aware ML
Authors:
Jan Hoffmann
,
Klaus Aehlig
,
Martin Hofmann
Resource Analysis of Complex Programs with Cost Equations
Authors:
Antonio Flores-Montoya
,
Reiner Hähnle
Analyzing Runtime and Size Complexity of Integer Programs
Authors:
Marc Brockschmidt
,
Fabian Emmes
,
Stephan Falke
…
See all cited by