Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
106
views
0
references
Top references
cited by
99
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,078
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Foundations and Practice of Security
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
other
Author(s):
Zvika Brakerski
,
Vinod Vaikuntanathan
Publication date
(Print):
2011
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Security and Safety (S&S)
Author and book information
Book Chapter
Publication date (Print):
2011
Pages
: 505-524
DOI:
10.1007/978-3-642-22792-9_29
SO-VID:
94547e11-b448-498e-8e93-c408345f3dcc
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. E1
Erratum to: A Learning-Free Approach to Whole Spine Vertebra Localization in MRI
pp. 1
Geospatial Semantics: Why, of What, and How?
pp. 1
Context-free sets of infinite words
pp. 1
The Evolution of Paternal Care
pp. 1
Scaling up Dynamic Time Warping to Massive Datasets
pp. 1
Model Checking and the State Explosion Problem
pp. 1
Classes, Jim, But Not as We Know Them — Type Classes in Haskell: What, Why, and Whither
pp. 1
Syntactic Dependency-Based N-grams as Classification Features
pp. 1
Session Types for Link Failures
pp. 1
Agent-Based Evolutionary Labor Market Model with Strategic Coalition
pp. 1
Dynamic Multi-party Computation Forever for Swarm and Cloud Computing and Code Obfuscation
pp. 1
Robust Active Shape Models: A Robust, Generic and Simple Automatic Segmentation Tool
pp. 1
Optimal Error Correction Against Computationally Bounded Noise
pp. 1
Solving Weighted Argumentation Frameworks with Soft Constraints
pp. 1
ML Confidential: Machine Learning on Encrypted Data
pp. 1
Towards Symmetric Multimodality: Fusion and Fission of Speech, Gesture, and Facial Expression
pp. 1
Forward-Security in Private-Key Cryptography
pp. 1
Fusion – Visually Exploring and Eliciting Relationships in Linked Data
pp. 1
Protecting Privacy in Data Release
pp. 1
Precise Analysis of String Expressions
pp. 1
Human Factors Engineering as the Methodological Babel Fish: Translating User Needs into Software Design
pp. 1
Efficient Alignment Free Sequence Comparison with Bounded Mismatches
pp. 1
From Lawvere to Brandenburger-Keisler: Interactive Forms of Diagonalization and Self-reference
pp. 3
Propagation, Diffusion and Randomization in Cellular Automata
pp. 3
Privacy Analysis of Android Apps: Implicit Flows and Quantitative Analysis
pp. 3
Euler’s Method Applied to the Control of Switched Systems
pp. 3
Introduction to the Third Workshop on Business Process Intelligence (BPI 2007)
pp. 3
FAIR: Fuzzy Alarming Index Rule for Privacy Analysis in Smartphone Apps
pp. 3
A Novel Approach for Mobile Robot Localization in Topological Maps Using Classification with Reject Option from Structural Co-occurrence Matrix
pp. 3
The Grid, Grid Services and the Semantic Web: Technologies and Opportunities
pp. 3
Visual Mediation Mechanisms for Collaborative Design and Development
pp. 3
Ankle Active Rehabilitation Strategies Analysis Based on the Characteristics of Human and Robotic Integrated Biomechanics Simulation
pp. 3
Secure Two-Party Computation over a Z-Channel
pp. 3
Back to Basics: Unsupervised Learning of Optical Flow via Brightness Constancy and Motion Smoothness
pp. 5
Lazy Clause Generation: Combining the Power of SAT and CP (and MIP?) Solving
pp. 10
Measuring the Effect of Public Health Campaigns on Twitter: The Case of World Autism Awareness Day
pp. 10
Security Metrics and Security Investment Models
pp. 11
Sound and Complete Monitoring of Sequential Consistency for Relaxed Memory Models
pp. 11
Covering and Secret Sharing with Linear Codes
pp. 11
Symbolic Synthesis of Finite-State Controllers for Request-Response Specifications
pp. 11
Adaptive Query Processing: A Survey
pp. 11
The Online Stochastic Generalized Assignment Problem
pp. 13
An Introduction to BioModel Engineering, Illustrated for Signal Transduction Pathways
pp. 13
On the optimization of unimodal functions with the (1+1) evolutionary algorithm
pp. 14
Activity-Aware Map: Identifying Human Daily Activity Pattern Using Mobile Phone Data
pp. 14
Deep MR to CT Synthesis Using Unpaired Data
pp. 14
Characterizing 3D Shapes Using Fractal Dimension
pp. 15
The Birth of Object Orientation: the Simula Languages
pp. 15
Cooperative organization of connectivity patterns and receptive fields in the visual pathway: application to adaptive tresholding
pp. 16
Similarity Measures for Short Segments of Text
pp. 16
A Survey of Context-Aware Cross-Digital Library Personalization
pp. 16
A Comparative Study of Energy Minimization Methods for Markov Random Fields
pp. 16
Attacking an Obfuscated Cipher by Injecting Faults
pp. 16
Solving CSPs with Naming Games
pp. 17
Efficient Engineering Data Exchange in Multi-disciplinary Systems Engineering
pp. 17
A Model Driven Reverse Engineering Framework for Extracting Business Rules Out of a Java Application
pp. 17
Developing Mathematical Thinking with Scratch
pp. 17
Computer-Based Periaxial Rotation Measurement for Aligning Fractured Femur Fragments: Method and Preliminary Results
pp. 18
Ensemble Hierarchical High-Order Functional Connectivity Networks for MCI Classification
pp. 18
SLIQ: A fast scalable classifier for data mining
pp. 19
Optimal Task Ordering in Chain Data Flows: Exploring the Practicality of Non-scalable Solutions
pp. 19
Progressive Neural Architecture Search
pp. 19
Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks: A Case-Study
pp. 19
Handling Consistency Between Safety and System Models
pp. 20
Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing
pp. 20
Scaling Microblogging Services with Divergent Traffic Demands
pp. 20
Managing Autonomous Mobility on Demand Systems for Better Passenger Experience
pp. 20
Approximate Reachability Analysis of Piecewise-Linear Dynamical Systems
pp. 21
Efficient Peer-to-Peer Keyword Searching
pp. 23
Building a Large-Scale Commonsense Knowledge Base by Converting an Existing One in a Different Language
pp. 24
Visualizing Convolutional Networks for MRI-Based Diagnosis of Alzheimer’s Disease
pp. 24
Varieties of increasing trees
pp. 24
FSPNs: Fluid stochastic Petri nets
pp. 24
Laplacian Deformation with Symmetry Constraints for Reconstruction of Defective Skulls
pp. 25
Collaborative Learning in a Web-Accessible Workbench
pp. 25
Gesture Recognition with a 3-D Accelerometer
pp. 25
Toward a Formal Model of the Shifting Relationship between Concepts and Contexts during Associative Thought
pp. 25
HyperGraphDB: A Generalized Graph Database
pp. 26
Formal Verification of Financial Algorithms
pp. 26
Composite Repetition-Aware Data Structures
pp. 26
Relation Extraction from the Web Using Distant Supervision
pp. 27
Introduction to Multiobjective Optimization: Interactive Approaches
pp. 27
Efficient Identification of Overlapping Communities
pp. 27
Mining Frequent Episodes for Relating Financial Events and Stock Trends
pp. 28
Improved Stixel Estimation Based on Transitivity Analysis in Disparity Space
pp. 28
Data Mining and Information Security
pp. 28
SIFT Flow: Dense Correspondence across Different Scenes
pp. 28
Maximizing Network Lifetime on the Line with Adjustable Sensing Ranges
pp. 28
Recoverable Robustness in Shunting and Timetabling
pp. 29
Birthday Paradox for Multi-collisions
pp. 29
An Improved Data Stream Summary: The Count-Min Sketch and Its Applications
pp. 30
On the complexity of some coloring games
pp. 30
Expressing DOACROSS Loop Dependences in OpenMP
pp. 31
HOBiT: Programming Lenses Without Using Lens Combinators
pp. 32
Qualitative vs. Quantitative Plan Diversity in Case-Based Planning
pp. 32
Statistical Abstraction and Model-Checking of Large Heterogeneous Systems
pp. 32
Human Action Recognition Using Optical Flow Accumulated Local Histograms
pp. 33
Hippocampal Shape Analysis Using Medial Surfaces
pp. 33
Laconic Oblivious Transfer and Its Applications
pp. 33
Fast Non Local Means Denoising for 3D MR Images
pp. 34
Causal Clustering for 2-Factor Measurement Models
pp. 35
Toward Model Synchronization Between Safety Analysis and System Architecture Design in Industrial Contexts
pp. 35
A Non-rigid Multimodal Image Registration Method Based on Particle Filter and Optical Flow
pp. 35
Accurate Scene Text Recognition Based on Recurrent Neural Network
pp. 35
Fairness-Aware Classifier with Prejudice Remover Regularizer
pp. 36
Optimal Cryptographic Hardness of Learning Monotone Functions
pp. 36
Emotion Recognition Using Bio-sensors: First Steps towards an Automatic System
pp. 37
Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems
pp. 37
Disentangling Digital Divide and Trust
pp. 39
Convolutional Neural Network for Reconstruction of 7T-like Images from 3T MRI Using Appearance and Anatomical Features
pp. 39
Enabling Semantics within Industry 4.0
pp. 40
Low-Cost and Open-Source Solutions for Automated Image Orientation – A Critical Overview
pp. 41
Extremal Optimization as a Viable Means for Mapping in Grids
pp. 41
Bagging Decision Multi-trees
pp. 41
Understanding the Impact of Network Infrastructure Changes Using Large-Scale Measurement Platforms
pp. 41
A Machine Learning Approach to Automatic Production of Compiler Heuristics
pp. 42
Sensor Fusion: From Dependence Analysis via Matroid Bases to Online Synthesis
pp. 43
Clothed and Naked Human Shapes Estimation from a Single Image
pp. 43
Mixing Hough and Color Histogram Models for Accurate Real-Time Object Tracking
pp. 43
Discriminative Sparse Image Models for Class-Specific Edge Detection and Image Interpretation
pp. 44
On the Clique-Width of Graphs in Hereditary Classes
pp. 44
Design and Modeling of a Compact Rotary Series Elastic Actuator for an Elbow Rehabilitation Robot
pp. 44
Deformation Energy for Size Functions
pp. 46
A Physically Universal Quantum Cellular Automaton
pp. 47
Knowledge-Based Configuration- Survey and Future Directions
pp. 47
DAAR: A Discrimination-Aware Association Rule Classifier for Decision Support
pp. 47
An Outline of MP Modeling Framework
pp. 48
A Five-Degree-of-Freedom Hybrid Manipulator for Machining of Complex Curved Surface
pp. 48
Joint Emoji Classification and Embedding Learning
pp. 49
Quantifying Small Changes in Brain Ventricular Volume Using Non-rigid Registration
pp. 49
Online Dynamic Monitoring of MPI Communications
pp. 50
Are Happy Developers More Productive?
pp. 50
Uniform Convergence of Adaptive Graph-Based Regularization
pp. 51
Partial Data Replication as a Strategy for Parallel Computing of the Multilevel Discrete Wavelet Transform
pp. 51
Pictorial and Verbal Tools for Conveying Routes
pp. 53
Root Contention in IEEE 1394
pp. 54
BGP and Inter-AS Economic Relationships
pp. 54
On Fitting Mixture Models
pp. 55
Non-invasive Spoofing Attacks for Anti-lock Braking Systems
pp. 56
Analysis of Chewing Sounds for Dietary Monitoring
pp. 56
Game Semantics and Normalization by Evaluation
pp. 56
Using THOMAS for Service Oriented Open MAS
pp. 56
C-semiring Frameworks for Minimum Spanning Tree Problems
pp. 57
Applications on Information Flow and Biomedical Treatment of FDES Based on Fuzzy Sequential Machines Theory
pp. 57
Analysing the Pattern of Twitter Activities Among Academics in a UK Higher Education Institution
pp. 57
Semantic Map for Structural Bioinformatics: Enhanced Service Discovery Based on High Level Concept Ontology
pp. 57
Constrained Deep Answer Sentence Selection
pp. 57
Non-local Regularization of Inverse Problems
pp. 58
Longitudinal Multiple Sclerosis Lesion Segmentation Using Multi-view Convolutional Neural Networks
pp. 59
A Dynamic Real-Time Motion Planning Method for Multi-robots with Collision Avoidance
pp. 60
Invariant Generation in Vampire
pp. 60
Parallel Monte-Carlo Tree Search
pp. 61
Distributed Protocols for Leader Election: A Game-Theoretic Perspective
pp. 61
ETSI Industry Specification Group on Autonomic Network Engineering for the Self-managing Future Internet (ETSI ISG AFI)
pp. 63
Towards a Translational Method for Studying the Influence of Motivational and Affective Variables on Performance During Human-Computer Interactions
pp. 64
Reasoning About Confidence and Uncertainty in Assurance Cases: A Survey
pp. 65
Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors
pp. 65
Answering Graph Pattern Matching Using Views: A Revisit
pp. 65
Establishing big brother using covert channels and other covert techniques
pp. 65
The Rademacher Complexity of Linear Transformation Classes
pp. 66
A Review of Model Prediction in Diabetes and of Designing Glucose Regulators Based on Model Predictive Control for the Artificial Pancreas
pp. 67
Synthesis of Linear Ranking Functions
pp. 67
Performing Safety Analyses with AADL and AltaRica
pp. 68
A Conundrum of Permissions: Installing Applications on an Android Smartphone
pp. 69
Unsupervised Training of PLDA with Variational Bayes
pp. 70
A Tight Lower Bound for the Steiner Point Removal Problem on Trees
pp. 73
Boost Clickbait Detection Based on User Behavior Analysis
pp. 73
Interoperation Between a Conventional PKI and an ID-Based Infrastructure
pp. 73
A Brief Overview of Agda – A Functional Language with Dependent Types
pp. 73
The implication problem for data dependencies
pp. 74
Emulating Transactional Memory on FPGA Multiprocessors
pp. 75
Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions
pp. 75
Automatic Verification of Real-Time Systems with Discrete Probability Distributions
pp. 75
Technocracy to Democracy Knowledge Transfer Using Social Media and Reputation Management
pp. 76
The Ideal View on Rackoff’s Coverability Technique
pp. 77
Fully Convolutional Network for Liver Segmentation and Lesions Detection
pp. 77
PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks
pp. 78
Genetic algorithms with multi-parent recombination
pp. 78
The MX Formalism for Semantic Web Compatible Representation of Music Metadata
pp. 78
The Effect of the Normalization Strategy on Voxel-Based Analysis of DTI Images: A Pattern Recognition Based Assessment
pp. 78
Practical Property-Based Attestation on Mobile Devices
pp. 78
Improved Scan-Chain Based Attacks and Related Countermeasures
pp. 79
A Framework for Autonomous Search in the Ecl i ps e Solver
pp. 79
Robot Convergence via Center-of-Gravity Algorithms
pp. 80
Liberal Typing for Functional Logic Programs
pp. 80
A Lightweight Framework for Multi-device Integration and Multi-sensor Fusion to Explore Driver Distraction
pp. 80
Optimization of Parameters of Feed-Back Pulse Coupled Neural Network Applied to the Segmentation of Material Microstructure Images
pp. 82
Comparing Metaheuristic Algorithms for Error Detection in Java Programs
pp. 82
Broadening the Scope of Differential Privacy Using Metrics
pp. 82
Safety Analysis of a Data Center’s Electrical System Using Production Trees
pp. 83
Embodiment and Perceptual Crossing in 2D
pp. 83
“Copping” in Heroin Markets: The Hidden Information Costs of Indirect Sales and Why They Matter
pp. 83
Synthetic Speech in Therapy of Auditory Hallucinations
pp. 84
6. Communication trees (CTs) as a model of CCS
pp. 85
A Bio-inspired Model Reliably Predicts the Collision of Approaching Objects under Different Light Conditions
pp. 86
Decision Making and Recommendation Acceptance Issues in Recommender Systems
pp. 86
Tracking the Evolution of Cooperation in Complex Networked Populations
pp. 88
The LCA Problem Revisited
pp. 89
A New Scan Attack on RSA in Presence of Industrial Countermeasures
pp. 89
Flock Stability in the Vicsek Model
pp. 90
Past Indeterminacy in Data Warehouse Design
pp. 91
On-Demand Snapshot Maintenance in Data Warehouses Using Incremental ETL Pipeline
pp. 91
The Biequivalence of Locally Cartesian Closed Categories and Martin-Löf Type Theories
pp. 92
Time to Refuel the Conceptual Discussion on Public e-Services – Revisiting How e-Services Are Manifested in Practice
pp. 93
Cultural Polarization and the Role of Extremist Agents: A Simple Simulation Model
pp. 93
A Tabular Survey of Automated Table Processing
pp. 93
Differentiated Multiple Aggregations in Multidimensional Databases
pp. 93
Context-Bounded Model Checking of Concurrent Software
pp. 94
Learning Discriminative Representation for Skeletal Action Recognition Using LSTM Networks
pp. 95
A Bi-criterion Approach to Multimodal Optimization: Self-adaptive Approach
pp. 95
Subtyping Supports Safe Session Substitution
pp. 95
Covert channel analysis for Stubs
pp. 96
Adapting Weighted Aggregation for Multiobjective Evolution Strategies
pp. 96
Improving the Timed Automata Approach to Biological Pathway Dynamics
pp. 97
Unsupervised Discrete Representation Learning
pp. 97
The Variable Hierarchy of the μ-Calculus Is Strict
pp. 98
Preliminary Results of EMG-Based Hand Gestures for Long Term Use
pp. 98
On the Complexity of Efficiency and Envy-Freeness in Fair Division of Indivisible Goods with Additive Preferences
pp. 99
Classification of Elementary Cellular Automata Up to Topological Conjugacy
pp. 99
An OpenMP* Barrier Using SIMD Instructions for Intel® Xeon PhiTM Coprocessor
pp. 99
Expected Patch Log Likelihood with a Sparse Prior
pp. 100
The Refined Process Structure Tree
pp. 100
A 3D Femoral Head Coverage Metric for Enhanced Reliability in Diagnosing Hip Dysplasia
pp. 101
SPADE: Support for Provenance Auditing in Distributed Environments
pp. 101
Design and Analysis of Proximate Mechanisms for Cooperative Transport in Real Robots
pp. 102
Data Integration and Knowledge Discovery in Life Sciences
pp. 102
Embodiment and Interaction in Socially Intelligent Life-Like Agents
pp. 103
Advancing the Performance of Complex Manufacturing Systems Through Agent-Based Production Control
pp. 104
Attempto Controlled English for Knowledge Representation
pp. 104
Visualizing and Evaluating Complexity of Textual Case Bases
pp. 105
Sum of Exit Times in Series of Metastable States in Probabilistic Cellular Automata
pp. 105
MiSeRe-Hadoop: A Large-Scale Robust Sequential Classification Rules Mining Framework
pp. 106
Characterizing Cell Types through Differentially Expressed Gene Clusters Using a Model-Based Approach
pp. 106
The Automated Learning of Deep Features for Breast Mass Classification from Mammograms
pp. 107
Decoding Random Linear Codes in $\tilde{\mathcal{O}}(2^{0.054n})$
pp. 108
A New Combinatorial Approach for Sparse Graph Problems
pp. 109
Proof-Relevant Parametricity
pp. 109
SVM Classification for Discriminating Cardiovascular Disease Patients from Non-cardiovascular Disease Controls Using Pulse Waveform Variability Analysis
pp. 110
Planning under the Uncertainty of the Technical Analysis of Stock Markets
pp. 110
Analysis of a Software System with Rejuvenation, Restoration and Checkpointing
pp. 110
A Unified Construction of the Glushkov, Follow, and Antimirov Automata
pp. 112
The complexity of graph connectivity
pp. 112
Detecting DNS Tunneling Using Ensemble Learning
pp. 112
A Vision and Agenda for Theory Provenance in Scientific Publishing
pp. 112
Bicategories of Markov Processes
pp. 112
Anonymity Revocation through Standard Infrastructures
pp. 113
Classification of Anemia Using Data Mining Techniques
pp. 113
Evolving behavioral strategies in predators and prey
pp. 113
Improving Automatic UML2 Profile Generation for MDA Industrial Development
pp. 114
OpenMP on the Low-Power TI Keystone II ARM/DSP System-on-Chip
pp. 114
Type and Effect Systems
pp. 115
Multimodal Deep Learning for Cervical Dysplasia Diagnosis
pp. 115
Smart Security System Based on Android Platform
pp. 116
Unsupervised Discovery of Spatially-Informed Lung Texture Patterns for Pulmonary Emphysema: The MESA COPD Study
pp. 116
Quaternion-Based Spectral Saliency Detection for Eye Fixation Prediction
pp. 116
Robust Collision Avoidance in Unknown Domestic Environments
pp. 116
Extracting Event-Centric Document Collections from Large-Scale Web Archives
pp. 118
Deep Learning, Sparse Coding, and SVM for Melanoma Recognition in Dermoscopy Images
pp. 118
The 2-nd generalized Hamming weight of double-error correcting binary BCH codes and their dual codes
pp. 119
Support for Reusable Explorations of Linked Data in the Semantic Web
pp. 120
An Efficient Map-Reduce Framework to Mine Periodic Frequent Patterns
pp. 120
A Locomotion Robot Driven by Soft Dielectric Elastomer Resonator
pp. 120
Reducing Red Blood Cell Transfusions
pp. 120
Constant Thresholds Can Make Target Set Selection Tractable
pp. 121
Pulse: Mining Customer Opinions from Free Text
pp. 122
Ontology Management and Ontology Reuse in Web Environment
pp. 123
The 2010 Signal Separation Evaluation Campaign (SiSEC2010): Biomedical Source Separation
pp. 123
Social Network Analysis of Peer Effects on Binge Drinking among U.S. Adolescents
pp. 123
Learning Rate Based Branching Heuristic for SAT Solvers
pp. 124
Learning from Experts: Developing Transferable Deep Features for Patient-Level Lung Cancer Prediction
pp. 125
Modeling Human Comprehension of Data Visualizations
pp. 125
Projective reed-muller codes
pp. 125
Property-Preserving Parallel Decomposition
pp. 126
Automatic Image Colorization Via Multimodal Predictions
pp. 126
Profile Reconciliation Through Dynamic Activities Across Social Networks
pp. 126
Engineering User Centered Interaction Systems for Semantic Visualizations
pp. 126
On Generating the Initial Key in the Bounded-Storage Model
pp. 127
Formal Performance Modelling: From Protocols to People
pp. 127
On the Preprocessing of Mass Spectrometry Proteomics Data
pp. 127
Approximating Markov Processes by Averaging
pp. 128
New Results on Type Systems for Functional Logic Programming
pp. 128
Generating Polyphonic Music Using Tied Parallel Networks
pp. 128
Survey on Big Data Analysis Algorithms for Network Security Measurement
pp. 128
Inverse Finite Element Characterization of Soft Tissues
pp. 129
Growing Recursive Self-Improvers
pp. 129
Using Predictable Observer Mobility for Power Efficient Design of Sensor Networks
pp. 129
SafeConcert: A Metamodel for a Concerted Safety Modeling of Socio-Technical Systems
pp. 129
Improving NFS for the Discrete Logarithm Problem in Non-prime Finite Fields
pp. 130
An Axiomatization of Probabilistic Testing
pp. 130
MapReduce-Based Complex Big Data Analytics over Uncertain and Imprecise Social Networks
pp. 131
Towards Detection of Botnet Communication through Social Media by Monitoring User Activity
pp. 131
Prometheus and INGENIAS Agent Methodologies: A Complementary Approach
pp. 132
Keyphrase Extraction Using Knowledge Graphs
pp. 132
Adaptive Image Classification for Aerial Photo Image Retrieval
pp. 132
DeepVessel: Retinal Vessel Segmentation via Deep Learning and Conditional Random Field
pp. 133
Layouts of Graph Subdivisions
pp. 133
A Multiview Approach to Tracking People in Crowded Scenes Using a Planar Homography Constraint
pp. 133
Goal-Oriented Monitoring Adaptation: Methodology and Patterns
pp. 134
Using SWRL Rules to Model Noun Behaviour in Italian
pp. 134
Engineering the LOUDS Succinct Tree Representation
pp. 135
Scatteract: Automated Extraction of Data from Scatter Plots
pp. 135
PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access
pp. 136
Execution of Scientific Workflows on Federated Multi-cloud Infrastructures
pp. 136
Quasi-Gaussian DCT Filter for Speckle Reduction of Ultrasound Images
pp. 136
Topological Data Analysis for Image Tampering Detection
pp. 138
DeepMedic for Brain Tumor Segmentation
pp. 138
A Power Saving Storage Method That Considers Individual Disk Rotation
pp. 138
Searching Keywords with Wildcards on Encrypted Data
pp. 139
An Upward Spiral Model: Bridging and Deepening Digital Divide
pp. 139
Weak Simulation Quasimetric in a Gossip Scenario
pp. 139
Kinetic Line Voronoi Operations and Their Reversibility
pp. 141
Image Classification Using Super-Vector Coding of Local Image Descriptors
pp. 141
Reasoning about binary topological relations
pp. 141
Novel Insights on Cross Project Fault Prediction Applied to Automotive Software
pp. 142
Improving Topic Diversity in Recommendation Lists: Marginally or Proportionally?
pp. 143
Indexing Multiple-Instance Objects
pp. 143
Multiagent Systems for Production Planning in Automation
pp. 143
Toward Efficient Architecture-Independent Algorithms for Dynamic Programs
pp. 144
Knowledge-Based Automatic Generation of Partitioned Matrix Expressions
pp. 145
Process Execution and Enactment in Medical Environments
pp. 146
Where Will You Go? Mobile Data Mining for Next Place Prediction
pp. 146
Lcf: A way of doing proofs with a machine
pp. 147
Formalizing the Logic-Automaton Connection
pp. 148
Towards an Extensible Context Ontology for Ambient Intelligence
pp. 149
Gender and Cultural Differences in Perceiving Game Characters of Digital Educational Games
pp. 149
NFA to DFA transformation for finite languages
pp. 149
Market-Based Adaptive Discussion Forums
pp. 149
Tensions in Online Communities: The Case of a Mass Size eParticipation Initiative
pp. 150
Conference Linked Data: The ScholarlyData Project
pp. 151
Runtime Verification for Linear-Time Temporal Logic
pp. 151
Verification of Hybrid Systems
pp. 151
A Tight Lower Bound for Determinization of Transition Labeled Büchi Automata
pp. 151
Thompson’s Group and Public Key Cryptography
pp. 151
Network Partitioning and Self-sizing Methods for QoS Management with Autonomic Characteristics
pp. 152
A Formal Model of Obfuscation and Negotiation for Location Privacy
pp. 152
Detecting Emotion Stimuli in Emotion-Bearing Sentences
pp. 152
Classification of Imbalanced Data by Combining the Complementary Neural Network and SMOTE Algorithm
pp. 152
Design and Implementation of a True Random Number Generator Based on Digital Circuit Artifacts
pp. 152
Applying Image Pre-processing Techniques for Appearance-Based Human Posture Recognition: An Experimental Analysis
pp. 153
Ordinal Theory for Expressiveness of Well Structured Transition Systems
pp. 155
Social Recommendation Terms: Probabilistic Explanation Optimization
pp. 155
Friends and Enemies of Clinton and Trump: Using Context for Detecting Stance in Political Tweets
pp. 155
Compressive Sensing for Background Subtraction
pp. 156
The Mertens Conjecture Revisited
pp. 157
On an Optimal Split Tree Problem
pp. 160
Reliable Distance and Intersection Computation Using Finite Precision Geometry
pp. 160
Protecting Software Code by Guards
pp. 161
A Grid-Based Infrastructure for Distributed Retrieval
pp. 161
Finding a Maximum Matching in a Sparse Random Graph in O(n) Expected Time
pp. 164
Rainbow, a New Multivariable Polynomial Signature Scheme
pp. 164
Limits to the Pursuit of Reproducibility: Emergent Data-Scarce Domains of Science
pp. 165
From Ensemble Methods to Comprehensible Models
pp. 165
On Infinite Terms Having a Decidable Monadic Theory
pp. 165
Machine Learning for Mathematical Software
pp. 166
Acquiring Adaptation Cases for Scientific Workflows
pp. 166
Identifying Trade Entry and Exit Timing Using Mathematical Technical Indicators in XCS
pp. 166
Induction of Decision Multi-trees Using Levin Search
pp. 166
A Social Cyber Contract Theory Model for Understanding National Cyber Strategies
pp. 166
TVSLAM: An Efficient Topological-Vector Based SLAM Algorithm for Home Cleaning Robots
pp. 167
Petaflop Seismic Simulations in the Public Cloud
pp. 167
Graph States and the Necessity of Euler Decomposition
pp. 168
Detecting People Using Mutually Consistent Poselet Activations
pp. 169
Mining Model Trees from Spatial Data
pp. 169
Defining Distances for All Process Semantics
pp. 169
Symmetric Curvature Patterns for Colonic Polyp Detection
pp. 171
OMPT: An OpenMP Tools Application Programming Interface for Performance Analysis
pp. 171
A Convex Max-Flow Segmentation of LV Using Subject-Specific Distributions on Cardiac MRI
pp. 173
Compressed RF Tomography for Wireless Sensor Networks: Centralized and Decentralized Approaches
pp. 173
Toward Effective Soft Robot Control via Reinforcement Learning
pp. 173
Population Coding: A New Design Paradigm for Embodied Distributed Systems
pp. 173
Minimum-Cost Broadcast through Varying-Size Neighborcast
pp. 173
Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks
pp. 174
Analysis of the equality relations for the program terms
pp. 175
Computed Cleansing for Virtual Colonoscopy Using a Three-Material Transition Model
pp. 177
SenseCam: A Retrospective Memory Aid
pp. 177
ProtTest-HPC: Fast Selection of Best-Fit Models of Protein Evolution
pp. 178
Mutual Authentication for Low-Power Mobile Devices
pp. 179
GPS-Equipped Wireless Sensor Network Node for High-Accuracy Positioning Applications
pp. 179
A Deep Learning Approach for Hand Posture Recognition from Depth Data
pp. 179
Weak Nominal Modal Logic
pp. 180
Formalising Observer Theory for Environment-Sensitive Bisimulation
pp. 180
MoScript: A DSL for Querying and Manipulating Model Repositories
pp. 182
SNPs Problems, Complexity, and Algorithms
pp. 182
Engineering Time-Expanded Graphs for Faster Timetable Information
pp. 183
Big Data, Big Opportunities: Revenue Sources of Social Media Services Besides Advertising
pp. 183
Linear Time Maximally Stable Extremal Regions
pp. 183
The industrial take-up of formal methods in safety-critical and other areas: A perspective
pp. 183
MAIS-TB: An Integrated Web Tool for Molecular Epidemiology Analysis
pp. 184
Vac - Verifier of Administrative Role-Based Access Control Policies
pp. 185
Learning Deep Features for Automated Placement of Correspondence Points on Ensembles of Complex Shapes
pp. 186
Demand Response by Decentralized Device Control Based on Voltage Level
pp. 186
The Role and Resolution of Textual Entailment in Natural Language Processing Applications
pp. 186
Open Source Task Profiling by Extending the OpenMP Runtime API
pp. 186
CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud
pp. 186
Natural Image Stitching with the Global Similarity Prior
pp. 186
Efficient Semiautomatic Segmentation of 3D Objects in Medical Images
pp. 186
Augmented Virtuality for Arthroscopic Knee Surgery
pp. 186
A Dictionary Learning Approach for Classification: Separating the Particularity and the Commonality
pp. 187
Differential Privacy and the Risk-Utility Tradeoff for Multi-dimensional Contingency Tables
pp. 189
Pre-emptive Camera Activation for Video-Surveillance HCI
pp. 189
FUN: An Efficient Algorithm for Mining Functional and Embedded Dependencies
pp. 190
OLAP in Multifunction Multidimensional Databases
pp. 192
Distinguishing Exponent Digits by Observing Modular Subtractions
pp. 192
A Generic Protection against High-Order Differential Power Analysis
pp. 192
Data-Driven Identification of German Phrasal Compounds
pp. 192
A Formal Model of Real-Time Program Compilation
pp. 193
Evolutionary Approaches for Estimating a Coupled Markov Chain Model for Credit Portfolio Risk Management
pp. 194
The Personal Server: Changing the Way We Think about Ubiquitous Computing
pp. 194
Identity-Based Encryption from Codes with Rank Metric
pp. 195
Unconditional Lower Bounds against Advice
pp. 197
Towards an Evaluation Framework for MAS Software Engineering
pp. 198
TED-LIUM 3: Twice as Much Data and Corpus Repartition for Experiments on Speaker Adaptation
pp. 199
Don’t Be Deceived: The Message Might Be Fake
pp. 199
ICT and Financial Inclusion in the Brazilian Amazon
pp. 199
Sorting presorted files
pp. 200
Term Frequency Normalisation Tuning for BM25 and DFR Models
pp. 200
Privacy-Preserving Collaborative Web Services QoS Prediction via Differential Privacy
pp. 201
Distributed Data Mining for Root Causes of KPI Faults in Wireless Networks
pp. 201
Optimization of Paintbrush Rendering of Images by Dynamic MCMC Methods
pp. 201
MesoFT: Unifying Diffusion Modelling and Fiber Tracking
pp. 202
Using Run-Time Predictions to Estimate Queue Wait Times and Improve Scheduler Performance
pp. 202
Contextual Affordances for Intelligent Virtual Characters
pp. 203
A Visual Analytics Tool for Software Project Structure and Relationships among Classes
pp. 203
Simplified PAC-Bayesian Margin Bounds
pp. 205
Eavesdropping Opponent Agent Communication Using Deep Learning
pp. 205
Parallel Implementation of Cellular Automaton Model of the Carbon Corrosion Under the Influence of the Electrochemical Oxidation
pp. 206
Blockchain Based Access Control
pp. 206
Indexing Information for Data Forensics
pp. 207
Time-Dependent Route Planning
pp. 207
3D Shape Histograms for Similarity Search and Classification in Spatial Databases
pp. 208
StreamLeader: A New Stream Clustering Algorithm not Based in Conventional Clustering
pp. 208
A Programming Model for the Semantic Web
pp. 209
Reachability Analysis of a Class of Switched Continuous Systems by Integrating Rectangular Approximation and Rectangular Analysis
pp. 209
Blaubot – Hassle-Free Multi-device Applications
pp. 209
Simple Stochastic Games and P-Matrix Generalized Linear Complementarity Problems
pp. 212
Verification of Component Fault Trees Using Error Effect Simulations
pp. 213
Exploring Congruence Between Organizational Structure and Task Performance: A Simulation Approach
pp. 214
Cognitive Compatibility of Motorcyclists and Drivers
pp. 215
Learning Shape and Texture Characteristics of CT Tree-in-Bud Opacities for CAD Systems
pp. 215
Blockchain Technology as s Support Infrastructure in e-Government
pp. 215
Application of Formal Methods to the Analysis of Web Services Security
pp. 217
Compact FPGA Implementations of the Five SHA-3 Finalists
pp. 218
Permutations in Coinductive Graph Representation
pp. 219
An Artificial Immune System for Fault Detection
pp. 221
An Unsupervised Method to Improve Spanish Stemmer
pp. 221
Integrated Quality Assessment of Linked Thesauri for the Environment
pp. 222
Fast Scheduling of Weighted Unit Jobs with Release Times and Deadlines
pp. 223
A Concept of Clustering-Based Method for Botnet Detection
pp. 224
An Electro-mechanical Model of the Heart for Cardiac Image Analysis
pp. 224
Overhead Analysis of Inter-domain Mobility Management in Multicasting-Supported FPMIPv6 Networks
pp. 224
Recognizing Objects in Range Data Using Regional Point Descriptors
pp. 224
Uniform Equivalence of Logic Programs under the Stable Model Semantics
pp. 224
Exploiting MOEA to Automatically Geneate Test Programs for Path-Delay Faults in Microprocessors
pp. 225
The Implementation of Cellular Automata Interference of Two Waves in LuNA Fragmented Programming System
pp. 225
Features and Metric from a Classifier Improve Visualizations with Dimension Reduction
pp. 225
Using Clustering Techniques to Improve the Performance of a Multi-objective Particle Swarm Optimizer
pp. 225
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients
pp. 226
Towards an Information State Update Model Approach for Nonverbal Communication
pp. 227
Parallel Implementation of LQG Balanced Truncation for Large-Scale Systems
pp. 228
Markov Text Generator for Basque Poetry
pp. 228
Formal Analysis of Optical Waveguides in HOL
pp. 229
Privacy Attitudes and Data Valuation Among Fitness Tracker Users
pp. 230
Semi-supervised Adversarial Learning to Generate Photorealistic Face Images of New Identities from 3D Morphable Model
pp. 230
A predicative semantics for the refinement of real-time systems
pp. 231
Recommendation in Reciprocal and Bipartite Social Networks–A Case Study of Online Dating
pp. 231
Early Detection of Potential Experts in Question Answering Communities
pp. 232
A Mechanical, Three-Dimensional, Ultrasound-Guided Breast Biopsy Apparatus
pp. 233
A GPU-Based DVC to H.264/AVC Transcoder
pp. 236
Delegating Biometric Authentication with the Sumcheck Protocol
pp. 236
Moving Digital Library Service Systems to the Grid
pp. 236
The Potential of the Estonian e-Governance Infrastructure in Supporting Displaced Estonian Residents
pp. 236
Locally Optimized RANSAC
pp. 237
The history of subliminal channels
pp. 240
In You We Follow: Determining the Group Leader in Dialogue
pp. 241
Using Particle Swarm Optimization for Image Regions Annotation
pp. 241
Topic 6: Grid, Cluster and Cloud Computing
pp. 241
A memetic algorithm for university exam timetabling
pp. 241
The Study of Informality as a Framework for Evaluating the Normalisation of Web 2.0 Texts
pp. 242
P-LAG: Location-Aware Group Recommendation for Passive Users
pp. 243
Comparing the Interpretability of Deep Networks via Network Dissection
pp. 243
Operations on Unambiguous Finite Automata
pp. 243
pMapper: Power and Migration Cost Aware Application Placement in Virtualized Systems
pp. 244
Featherweight Jigsaw: A Minimal Core Calculus for Modular Composition of Classes
pp. 244
A Fuzzy Semantics for the Resource Description Framework
pp. 246
Properties of the Conservative Parallel Discrete Event Simulation Algorithm
pp. 247
Automatic Cystocele Severity Grading in Ultrasound by Spatio-Temporal Regression
pp. 247
Performance Exploration Through Optimistic Static Program Annotations
pp. 248
A Classification of Ontology Modification
pp. 248
Towards Covert Channels in Cloud Environments: A Study of Implementations in Virtual Networks
pp. 248
Continuously Mining Sliding Window Trend Clusters in a Sensor Network
pp. 249
The Essence of Dependent Object Types
pp. 250
New Formulations for an Optimal Connectivity Approach for Mobile Ad-hoc Networks
pp. 250
Constructing elliptic curves with given group order over large finite fields
pp. 251
Measuring Similarity between Ontologies
pp. 251
Evaluating the Effectiveness of Hashtags as Predictors of the Sentiment of Tweets
pp. 251
Convection in a Porous Medium and Mimetic Scheme in Polar Coordinates
pp. 252
STOP: Space-Time Occupancy Patterns for 3D Action Recognition from Depth Map Sequences
pp. 254
Information-Theoretic Model Selection for Independent Components
pp. 254
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards
pp. 254
On the Eigenvalue Power Law
pp. 256
Multi-agent Task Division Learning in Hide-and-Seek Games
pp. 257
Formation of Multiple Networks
pp. 257
Worldwide Consensus
pp. 257
Combining Parallelization with Overlaps and Optimization of Cache Memory Usage
pp. 258
GAVS+: An Open Platform for the Research of Algorithmic Game Solving
pp. 259
Bisimilarity Congruences for Open Terms and Term Graphs via Tile Logic
pp. 260
A Comparative Study of Wavelet Coders for Image Compression
pp. 261
Tactile Representation of Paintings: An Early Assessment of Possible Computer Based Strategies
pp. 262
An Object-Oriented Structuring for Z Based on Views
pp. 262
Multi-class SVM Based Real-Time Recognition of Sit-to-Stand and Stand-to-Sit Transitions for a Bionic Knee Exoskeleton in Transparent Mode
pp. 262
Dynamic Point Labeling is Strongly PSPACE-Complete
pp. 263
Steganalysis Based on Awareness of Selection-Channel and Deep Learning
pp. 263
A Semi-monad for Semi-structured Data (ICDT Version)
pp. 263
Modular Tree Automata
pp. 265
An Extension of the TIGR M4 Suite to Preprocess and Visualize Affymetrix Binary Files
pp. 265
Probabilistic Linear-Time Model Checking: An Overview of the Automata-Theoretic Approach
pp. 265
A Flexible Framework for Probabilistic Models of Social Trust
pp. 265
Probabilistic Shortest Path Tractography in DTI Using Gaussian Process ODE Solvers
pp. 266
A Binary Entropy Measure to Assess Nonrigid Registration Algorithms
pp. 267
Implementing Cryptographic Primitives in the Symbolic Model
pp. 267
Ensemble Models of Learning Vector Quantization Based on Bootstrap Resampling
pp. 268
Relating Modal Refinements, Covariant-Contravariant Simulations and Partial Bisimulations
pp. 268
Diffusion k-tensor Estimation from Q-ball Imaging Using Discretized Principal Axes
pp. 269
The theory and practice of transforming call-by-need into call-by-value
pp. 272
Unbeast: Symbolic Bounded Synthesis
pp. 272
A Holonic Multi-Agent System Approach to Differential Diagnosis
pp. 272
On Pseudorandom Generators in NC0
pp. 273
Using PVS to Investigate Incidents through the Lens of Distributed Cognition
pp. 273
Using Agent JPF to Build Models for Other Model Checkers
pp. 273
Designing of a Passive Knee-Assisting Exoskeleton for Weight-Bearing
pp. 273
“How Much Context Do You Need?”: An Experiment About the Context Size in Interactive Cross-Language Question Answering
pp. 273
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks
pp. 274
Domain Adaptation with Regularized Optimal Transport
pp. 275
Automated Cryptographic Analysis of the Pedersen Commitment Scheme
pp. 275
Level-k Phylogenetic Networks Are Constructable from a Dense Triplet Set in Polynomial Time
pp. 276
Improved Map-Slice-to-Volume Motion Correction with B0 Inhomogeneity Correction: Validation of Activation Detection Algorithms Using ROC Curve Analyses
pp. 277
Biological Specifications for a Synthetic Gene Expression Data Generation Model
pp. 277
Reasoning over Extended ER Models
pp. 277
Visual Sentiment Summarization of Movie Reviews
pp. 278
Smallest Color-Spanning Objects
pp. 278
An Efficient Branch-and-Bound Algorithm for Finding a Maximum Clique
pp. 278
Tiling Databases
pp. 279
Fast Rates for Support Vector Machines
pp. 279
Fractal based image steganography
pp. 279
Adopting SOA in Public Service Provision
pp. 280
Searching a fixed graph
pp. 281
Trend Detection in Gold Worth Using Regression
pp. 281
A Formal Approach to Analyzing Cyber-Forensics Evidence
pp. 284
Learning the Long-Term Structure of the Blues
pp. 284
Massive Media Event Data Analysis to Assess World-Wide Political Conflict and Instability
pp. 286
Development of HIT Humanoid Robot
pp. 287
Data-Driven Importance Distributions for Articulated Tracking
pp. 287
Tracking the Evolution of OGD Portals: A Maturity Model
pp. 288
A Rule-Based Named-Entity Recognition for Malay Articles
pp. 289
Comparison of Interval and Ellipsoidal Bounds for the Errors of Vector Operations
pp. 289
Flexible Management of Consistency and Availability of Networked Data Replications
pp. 290
Small Progress Measures for Solving Parity Games
pp. 291
The ACL2 Sedan Theorem Proving System
pp. 291
KaDE: A Tool to Compile Kappa Rules into (Reduced) ODE Models
pp. 291
Cryptanalysis and Improvement of an Identity-Based Proxy Multi-signature Scheme
pp. 292
When and Why Are Visual Landmarks Used in Giving Directions?
pp. 292
Cutting a Cake for Five People
pp. 293
An Explicit Exact SDP Relaxation for Nonlinear 0-1 Programs
pp. 293
A chemical abstract machine for graph reduction extended abstract
pp. 293
Intuitionistic Logic Programming for SQL
pp. 293
APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks
pp. 294
Graph Layout Problems Parameterized by Vertex Cover
pp. 295
Finding Frequent Elements in Compressed 2D Arrays and Strings
pp. 295
Echo hiding
pp. 296
A Simple Modification in CMA-ES Achieving Linear Time and Space Complexity
pp. 296
Meta-context: Putting Context-Awareness into Context
pp. 297
Almost Optimal Asynchronous Rendezvous in Infinite Multidimensional Grids
pp. 298
On-Board Visual SLAM on a UGV Using a RGB-D Camera
pp. 298
A formal semantics for a language with type extension
pp. 299
Neural Network Classification and Prior Class Probabilities
pp. 300
Inferring 3D Shapes and Deformations from Single Views
pp. 300
Deformable Image Registration Based on Similarity-Steered CNN Regression
pp. 301
Concurrent Games with Ordered Objectives
pp. 301
PLDA: Parallel Latent Dirichlet Allocation for Large-Scale Applications
pp. 301
Utilizing Mind-Maps for Information Retrieval and User Modelling
pp. 301
Algebraic Rewritings for Optimizing Regular Path Queries
pp. 303
QA4MRE 2011-2013: Overview of Question Answering for Machine Reading Evaluation
pp. 304
Lifting theorems for Kleisli categories
pp. 304
Term Similarity and Weighting Framework for Text Representation
pp. 305
What Makes a Good Collaborative Knowledge Graph: Group Composition and Quality in Wikidata
pp. 305
Learning Bayesian Networks Does Not Have to Be NP-Hard
pp. 305
Compressing the Input for CNNs with the First-Order Scattering Transform
pp. 306
An Approach for the Design of Self-conscious Agent for Robotics
pp. 306
Integrating Fleet Deployment into the Liner Shipping Cargo Allocation Problem
pp. 306
Real-Time Plane Segmentation Using RGB-D Cameras
pp. 308
Declarative Debugging of Rewriting Logic Specifications
pp. 308
Why Trust Seals Don’t Work: A Study of User Perceptions and Behavior
pp. 309
Generalised Coherent Point Drift for Group-Wise Registration of Multi-dimensional Point Sets
pp. 310
Level Set Methods for Computation in Hybrid Systems
pp. 310
Shunting for Dummies: An Introductory Algorithmic Survey
pp. 311
Fast Follower Recovery for State Machine Replication
pp. 312
Revealing the Conceptual Schemas of RDF Datasets
pp. 312
Exclusive Perpetual Ring Exploration without Chirality
pp. 313
Generating Data Race Witnesses by an SMT-Based Analysis
pp. 314
Stereoscopic Visual Attention Model for 3D Video
pp. 317
Surgical Motion Adaptive Robotic Technology (S.M.A.R.T): Taking the Motion out of Physiological Motion
pp. 317
On the Error Characteristics of Multihop Node Localization in Ad-Hoc Sensor Networks
pp. 318
Streaming Algorithms for Submodular Function Maximization
pp. 318
Strategic Planning for Disaster Recovery with Stochastic Last Mile Distribution
pp. 318
The Essence of Multi-stage Evaluation in LMS
pp. 319
Annotation Inference for Separation Logic Based Verifiers
pp. 320
Modelling OWL Ontologies with Graffoo
pp. 321
Finding Typical Internet User Behaviors
pp. 322
Detecting Ground Shadows in Outdoor Consumer Photographs
pp. 322
CST++
pp. 323
“What was this Movie About this Chick?”
pp. 326
Twisted Edwards Curves Revisited
pp. 326
Why Do Small and Medium-Size Freemium Game Developers Use Game Analytics?
pp. 326
Testing for Termination with Monotonicity Constraints
pp. 327
Dichotomy theorem for the generalized unique satisfiability problem
pp. 327
Interactive Exploration of Subspace Clusters for High Dimensional Data
pp. 327
A General Metric for Riemannian Manifold Hamiltonian Monte Carlo
pp. 328
Object-Oriented Specification of Hybrid Systems Using UML h and ZimOO
pp. 329
Tenth International Workshop on OCL and Textual Modelling
pp. 332
Dealing with Performance Unpredictability in an Asymmetric Multicore Processor Cloud
pp. 332
A State Recovery Attack on ACORN-v1 and ACORN-v2
pp. 332
On Verification of Workflow and Planning Domain Models Using Attribute Grammars
pp. 332
Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs
pp. 333
Factorization of a 768-Bit RSA Modulus
pp. 333
Yarp Based Plugins for Gazebo Simulator
pp. 334
RPO, Second-Order Contexts, and λ-Calculus
pp. 334
Representation, Indexing, and Retrieval of Biological Cases for Biologically Inspired Design
pp. 334
Top Down FP-Growth for Association Rule Mining
pp. 335
Position Bias in Recommender Systems for Digital Libraries
pp. 335
Automated Diagnosis of Neural Foraminal Stenosis Using Synchronized Superpixels Representation
pp. 335
Weierstraß Elliptic Curves and Side-Channel Attacks
pp. 336
Distributed Classification for Pocket Data Mining
pp. 336
An Algorithm for Quantitative Verification of Probabilistic Transition Systems
pp. 337
Specification and verification of concurrent systems in CESAR
pp. 338
Dynamic IT Values and Relationships: A Sociomaterial Perspective
pp. 339
Testing Divergent Transition Systems
pp. 339
Collective-k Optimal Location Selection
pp. 339
Summarization for Geographically Distributed Data Streams
pp. 341
Mining Interesting Association Rules for Prediction in the Software Project Management Area
pp. 342
Question Answering and Multi-search Engines in Geo-Temporal Information Retrieval
pp. 343
Combining Genetic Algorithms and Mutation Testing to Generate Test Sequences
pp. 343
GMCP-Tracker: Global Multi-object Tracking Using Generalized Minimum Clique Graphs
pp. 343
Applying an Elitist Electromagnetism-Like Algorithm to Head Robot Stabilization
pp. 345
Rules for Inducing Hierarchies from Social Tagging Data
pp. 345
Early Prediction of Movie Success — What, Who, and When
pp. 345
On Combining Classifiers by Relaxation for Natural Textures in Images
pp. 346
Counting Edges and Triangles in Online Social Networks via Random Walk
pp. 346
Research on a 3-DOF Compliant Precision Positioning Stage Based on Piezoelectric Actuators
pp. 347
Symbolic Association Using Parallel Multilayer Perceptron
pp. 347
CERN Analysis Preservation: A Novel Digital Library Service to Enable Reusable and Reproducible Research
pp. 347
Robust and Efficient Subspace Segmentation via Least Squares Regression
pp. 347
Adapting Multimodal Fission to User’s Abilities
pp. 348
A Modular Approach to Gesture Recognition for Interaction with a Domestic Service Robot
pp. 348
Toward Third-Party Immune Applications
pp. 350
Efficient Discovery of Functional Dependencies and Armstrong Relations
pp. 350
Time–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU
pp. 351
Partitioning Complex Networks via Size-Constrained Clustering
pp. 351
Improving the MLP Learning by Using a Method to Calculate the Initial Weights of the Network Based on the Quality of Similarity Measure
pp. 351
Dynamic Brachytherapy of the Prostate Under Active Image Guidance
pp. 353
Depth Map Super-Resolution by Deep Multi-Scale Guidance
pp. 354
An Integrated Multi-scale Model for Breast Cancer Histopathological Image Classification with Joint Colour-Texture Features
pp. 355
The Philosophy of Information Retrieval Evaluation
pp. 356
Unique Signatures of Histograms for Local Surface Description
pp. 356
Giveme5W: Main Event Retrieval from News Articles by Extraction of the Five Journalistic W Questions
pp. 357
Safe Exploration Techniques for Reinforcement Learning – An Overview
pp. 357
Inherent-Cost Aware Collective Spatial Keyword Queries
pp. 358
Efficient Bisimilarities from Second-Order Reaction Semantics for π-Calculus
pp. 360
Computer-Assisted Soft-Tissue Surgery Training and Monitoring
pp. 361
Analysis, Comparison and Selection of MAS Software Engineering Processes and Tools
pp. 361
Orientation-Sensitive Overlap Measures for the Validation of Medical Image Segmentations
pp. 361
Adaptive Quadruped Locomotion: Learning to Detect and Avoid an Obstacle
pp. 363
Feature Fallacy: Complications with Interpreting Linear Decoding Weights in fMRI
pp. 363
Sound Recognition System Using Spiking and MLP Neural Networks
pp. 365
Iterative Feature Selection of Translation Texts for Translator Identification
pp. 365
Verification of synchronous sequential machines based on symbolic execution
pp. 365
Extracting Declarative Process Models from Natural Language
pp. 365
A High-Level Haptic Interface for Enhanced Interaction within VirtoolsTM
pp. 366
The Conceptual Confusion Around “e-service”: Practitioners’ Conceptions
pp. 367
Opportunities for Computer Support for Systematic Reviewing - A Gap Analysis
pp. 368
All Together Now
pp. 368
ORM2: Formalisation and Encoding in OWL2
pp. 368
Process Discovery Using Integer Linear Programming
pp. 368
Towards Dynamic Planning and Guidance of Minimally Invasive Robotic Cardiac Bypass Surgical Procedures
pp. 369
Scalable Histopathological Image Analysis via Active Learning
pp. 370
SEAGULL: Seam-Guided Local Alignment for Parallax-Tolerant Image Stitching
pp. 372
Two Space Saving Tricks for Linear Time LCP Array Computation
pp. 372
Parameter Synthesis for Parametric Interval Markov Chains
pp. 372
A Structural Learning Method of Restricted Boltzmann Machine by Neuron Generation and Annihilation Algorithm
pp. 373
Heart Motion Abnormality Detection via an Information Measure and Bayesian Filtering
pp. 375
Reasoning about Summarizability in Heterogeneous Multidimensional Schemas
pp. 377
Prediction of Socioeconomic Levels Using Cell Phone Records
pp. 378
Incompressibility through Colors and IDs
pp. 379
Persistent Authenticated Dictionaries and Their Applications
pp. 379
Current Advances in Neural Decoding
pp. 379
A Continuous Max-Flow Approach to Potts Model
pp. 379
Virtual Tendering and Bidding in the Construction Sector
pp. 380
Cost-Sensitive Decision Trees with Multiple Cost Scales
pp. 380
Measuring and Synthesizing Systems in Probabilistic Environments
pp. 380
A Parallel Implementation of the Jacobi-Davidson Eigensolver for Unsymmetric Matrices
pp. 381
Evaluating a Probabilistic Dialogue Model for a Railway Information Task
pp. 381
Surface Matching via Currents
pp. 382
Paths, Flowers and Vertex Cover
pp. 382
Emo-dramatic Robotic Stewards
pp. 382
Towards Automated Variant Selection for Heterogeneous Tiled Architectures
pp. 382
N-way Decomposition: Towards Linking Concurrent EEG and fMRI Analysis During Natural Stimulus
pp. 382
An Ontology-Driven Search Module for Accessing Chronic Pathology Literature
pp. 383
From Process Models to Chatbots
pp. 384
Event Extraction for Reasoning with Text
pp. 384
Analysis of Types of Self-Improving Software
pp. 384
Computer Assisted Dental Implantology: A New Method and a Clinical Validation
pp. 385
A Sliding Window Algorithm for Relational Frequent Patterns Mining from Data Streams
pp. 385
Learning Approach to Analyze Tumour Heterogeneity in DCE-MRI Data During Anti-cancer Treatment
pp. 385
Traversing the k-mer Landscape of NGS Read Datasets for Quality Score Sparsification
pp. 385
Succinct Data Structures for Retrieval and Approximate Membership (Extended Abstract)
pp. 388
Predicting the Evolution of Narratives in Social Media
pp. 389
Secure Authentication in the Grid: A Formal Analysis of DNP3: SAv5
pp. 389
Coloured Petri Net Diagnosers for Lumped Process Systems
pp. 389
Towards a Multi-modal Atlas for Neurosurgical Planning
pp. 390
Sensitivity Analysis of a Parametric Hand Exoskeleton Designed to Match Natural Human Grasping Motion
pp. 391
Improvement and Evaluation of Time-Spread Echo Hiding Technology for Long-Distance Voice Evacuation Systems
pp. 392
Intra-operative Real-Time 3-D Information Display System Based on Integral Videography
pp. 393
Comparison of Reuse Strategies for Case-Based Classification in Bioinformatics
pp. 394
Experimental Comparison of Orthogonal Moments as Feature Extraction Methods for Character Recognition
pp. 395
Using Full-Text of Research Articles to Analyze Academic Impact of Algorithms
pp. 395
No-Three-in-Line-in-3D
pp. 398
Evaluation-Oriented Training via Surrogate Metrics for Multiple Sclerosis Segmentation
pp. 399
Software and Application Patterns for Explanation Methods
pp. 400
PCPs and the Hardness of Generating Private Synthetic Data
pp. 401
3D Brain Segmentation Using Active Appearance Models and Local Regressors
pp. 403
Pseudofractal 2D Shape Recognition
pp. 403
Classification of Household Devices by Electricity Usage Profiles
pp. 404
Impact of Content Features for Automatic Online Abuse Detection
pp. 405
Constraint-Based Clustering in Large Databases
pp. 405
Ultrasound Monitoring of Tissue Ablation Via Deformation Model and Shape Priors
pp. 406
Corpus Callosum Segmentation in Brain MRIs via Robust Target-Localization and Joint Supervised Feature Extraction and Prediction
pp. 406
Sense and Sensibility in a Pervasive World
pp. 407
Subject-Specific Structural Parcellations Based on Randomized AB-divergences
pp. 408
Formal Verification of Exact Computations Using Newton’s Method
pp. 411
A Delta for Hybrid Type Checking
pp. 412
Trade-Offs in Social and Behavioral Modeling in Mobile Networks
pp. 414
Achieving Efficient Conjunctive Keyword Searches over Encrypted Data
pp. 414
Non-Bayesian Learning in the Presence of Byzantine Agents
pp. 415
Path-Sensitive Data Flow Analysis Simplified
pp. 415
Automatic Liver and Lesion Segmentation in CT Using Cascaded Fully Convolutional Neural Networks and 3D Conditional Random Fields
pp. 417
From Implicit to Touching Interaction by Identification Technologies: Towards Tagging Context
pp. 421
Asymmetry of SPECT Perfusion Image Patterns as a Diagnostic Feature for Alzheimer’s Disease
pp. 422
Soufflé: On Synthesis of Program Analyzers
pp. 423
Designing a DSL Solution for the Domain of Augmented Reality Software Applications Specification
pp. 423
Factors Influencing Emoji Usage in Smartphone Mediated Communications
pp. 423
Development of a Mobile Museum Guide Robot That Can Configure Spatial Formation with Visitors
pp. 423
On a Network Generalization of the Minmax Theorem
pp. 423
Efficient Constructions for One-Way Hash Chains
pp. 427
A Systematic Analysis of Random Forest Based Social Media Spam Classification
pp. 427
Relational Frequent Patterns Mining for Novelty Detection from Data Streams
pp. 429
Experiments with Segmentation in an Online Speaker Diarization System
pp. 429
Domestic Migrant Workers in Israel: The Strength of Weak Ties
pp. 430
Semantic Segmentation with Second-Order Pooling
pp. 433
Detecting Anomalous Behaviors Using Structural Properties of Social Networks
pp. 434
Second-Order Source Separation Based on Prior Knowledge Realized in a Graph Model
pp. 434
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast
pp. 436
Decentralized Time Geography for Ad-Hoc Collaborative Planning
pp. 436
Majority Is Not Enough: Bitcoin Mining Is Vulnerable
pp. 437
CBRSHM – A Case-Based Decision Support System for Semi-Automated Assessment of Structures in Terms of Structural Health Monitoring
pp. 438
Alpha-Flow for Video Matting
pp. 439
A Neural Network Model for Solving the Feature Correspondence Problem
pp. 440
Evaluating Web Archive Search Systems
pp. 440
A Hoare Logic for the State Monad
pp. 442
Multi-modal EEG and fMRI Source Estimation Using Sparse Constraints
pp. 444
Investigating Microstructure Patterns of Enterprise Network in Perspective of Ego Network
pp. 444
Java on 1000 Cores: Tales of Hardware/Software Co-design
pp. 444
The Spectral Method for General Mixture Models
pp. 445
Community Mining from Multi-relational Networks
pp. 446
EasyApp: Goal-Driven Service Flow Generator with Semantic Web Service Technologies
pp. 449
Parallel Interconnection of Broadcast Systems with Multiple FIFO Channels
pp. 449
Robust Object Tracking via Structure Learning and Patch Refinement in Handling Occlusion
pp. 449
A Declarative Framework for Security: Secure Concurrent Constraint Programming
pp. 449
Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs
pp. 449
Detecting Feature Interactions in Agricultural Trade Data Using a Deep Neural Network
pp. 451
Simple Proofs of Sequential Work
pp. 452
Improving Data Association by Joint Modeling of Pedestrian Trajectories and Groupings
pp. 453
Monadic Presentations of Lambda Terms Using Generalized Inductive Types
pp. 454
Video Error Concealment Based on Data Hiding for the Emerging Video Technologies
pp. 455
Pose-Invariant Object Recognition for Event-Based Vision with Slow-ELM
pp. 455
Detecting Social Spam Campaigns on Twitter
pp. 458
On Spectral Learning of Mixtures of Distributions
pp. 458
Trust Metrics and Results for Social Media Analysis
pp. 459
Recursion Equations as a Programming Language
pp. 460
Quadratic Approximation PSO for Economic Dispatch Problems with Valve-Point Effects
pp. 460
Neural Architecture for Negative Opinion Expressions Extraction
pp. 462
Learning Based Single Image Super Resolution Using Discrete Wavelet Transform
pp. 464
Split Bregman Algorithm, Douglas-Rachford Splitting and Frame Shrinkage
pp. 465
Threshold Ring Signatures and Applications to Ad-hoc Groups
pp. 466
Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field
pp. 467
Improved sparse multivariate polynomial interpolation algorithms
pp. 467
Revising 1-Copy Equivalence in Replicated Databases with Snapshot Isolation
pp. 469
Shading-Aware Multi-view Stereo
pp. 471
Detection of Protrusions in Curved Folded Surfaces Applied to Automated Polyp Detection in CT Colonography
pp. 471
The Multiple Language Question Answering Track at CLEF 2003
pp. 473
Improved 3D Osteotomy Planning in Cranio-maxillofacial Surgery
pp. 475
Identifying the Academic Rising Stars via Pairwise Citation Increment Ranking
pp. 476
Self-organizing Maps as Substitutes for K-Means Clustering
pp. 477
Toward a Conversational Virtual Instructor of Ballroom Dance
pp. 477
Safety Verification of Hybrid Systems Using Barrier Certificates
pp. 478
Deep Learning for Multi-task Medical Image Segmentation in Multiple Modalities
pp. 479
Real-Time Denoising of Medical X-Ray Image Sequences: Three Entirely Different Approaches
pp. 480
Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees
pp. 483
A formal framework for ASTRAL intra-level proof obligations
pp. 484
Towards a Computer Assisted Approach for Migrating Legacy Systems to SOA
pp. 484
Virtual Simulation of the Artificial Satellites Based on OpenGL
pp. 485
Liveness Reasoning with Isabelle/HOL
pp. 486
A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks
pp. 486
Mixcoin: Anonymity for Bitcoin with Accountable Mixes
pp. 486
LPN Decoded
pp. 486
An Object Reconstruction Method Based on Binocular Stereo Vision
pp. 489
Adding implicit invocation to languages: Three approaches
pp. 493
Scotch: A software package for static mapping by dual recursive bipartitioning of process and architecture graphs
pp. 493
Using Term Rewriting to Solve Bit-Vector Arithmetic Problems
pp. 495
The Video Face Book
pp. 495
Detecting Acromegaly: Screening for Disease with a Morphable Model
pp. 499
OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy Updating
pp. 500
Mind the Gap
pp. 500
A Novel String Representation and Kernel Function for the Comparison of I/O Access Patterns
pp. 501
A Pattern Restore Method for Restoring Missing Patterns in Server Side Clickstream Data
pp. 502
Generalized k-Medians Clustering for Strings
pp. 502
Efficiently Testing Sparse GF(2) Polynomials
pp. 503
Enhancing Awareness on the Benefits of Supply Chain Visibility Through Serious Gaming
pp. 505
Enhanced Probabilistic Label Fusion by Estimating Label Confidences Through Discriminative Learning
pp. 505
Preventing Attacks by Classifying User Models in a Collaborative Scenario
pp. 508
Optimal layouts on a chain ATM network
pp. 508
An Implicit Shape Model for Combined Object Categorization and Segmentation
pp. 509
Conceptualizing the Role of Reading and Literacy in Health Information Practices
pp. 510
Privacy-Preserving Stochastic Gradient Descent with Multiple Distributed Trainers
pp. 512
Homophily in Online Social Networks
pp. 513
Feature Sensitive Label Fusion with Random Walker for Atlas-Based Image Segmentation
pp. 515
Effect of Neural Controller on Adaptive Cruise Control
pp. 521
IPsec and IKE as Functions in SDN Controlled Network
pp. 521
ParCube: Sparse Parallelizable Tensor Decompositions
pp. 522
PHOG-Derived Aesthetic Measures Applied to Color Photographs of Artworks, Natural Scenes and Objects
pp. 522
A Theory of Classes from the Theoretical Foundations of LePUS3
pp. 524
A Dual Dynamic Programming Approach to the Detection of Spine Boundaries
pp. 529
SMILES: A Multi-purpose Learning System
pp. 529
Prior-Based Coregistration and Cosegmentation
pp. 530
Acyclic Directed Graphs to Represent Conditional Independence Models
pp. 532
Geometrical Transformation Approximation for 2D/3D Intensity-Based Registration of Portal Images and CT Scan
pp. 532
A New Chessboard Corner Detection Algorithm with Simple Thresholding
pp. 532
Eat&Travel: A New Immersive Dining Experience for Restaurants
pp. 536
Ultrasound-Guided Percutaneous Scaphoid Pinning: Operator Variability and Comparison with Traditional Fluoroscopic Procedure
pp. 536
Affective Learning System for Algorithmic Logic Applying Gamification
pp. 537
How Do Pre-service Teachers Work “Together” on Curriculum Development Projects: A Study on Tools and Tasks in Collaborative Information Behavior
pp. 538
Globally Optimal Label Fusion with Shape Priors
pp. 539
Hand Gesture Recognition Using Interactive Image Segmentation Method
pp. 540
Bayesian Non-negative Matrix Factorization
pp. 548
FiberNET: An Ensemble Deep Learning Framework for Clustering White Matter Fibers
pp. 549
Affine Registration with Feature Space Mutual Information
pp. 549
Boosted Bellman Residual Minimization Handling Expert Demonstrations
pp. 554
Ultimately periodic words of rational ω-languages
pp. 554
Hand Pose Estimation from Local Surface Normals
pp. 555
A Formal Approach for Network Security Policy Relevancy Checking
pp. 561
A Bluetooth MPI Framework for Collaborative Computer Graphics
pp. 562
Diagnose This If You Can
pp. 563
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation
pp. 563
Novelty Detection from Evolving Complex Data Streams with Time Windows
pp. 563
Using Machine Learning Techniques for Evaluating the Similarity of Enterprise Architecture Models
pp. 565
Fast Approximate Text Document Clustering Using Compressive Sampling
pp. 566
Dynamic Programming on Tree Decompositions Using Generalised Fast Subset Convolution
pp. 567
Cheating Behaviors in Online Gaming
pp. 568
Decentralizing Attribute-Based Encryption
pp. 571
Emotions Change in Pedestrian Navigation: A Perspective of User’s Focuses
pp. 571
A Distributed and Oblivious Heap
pp. 573
A Generic Framework for Non-rigid Registration Based on Non-uniform Multi-level Free-Form Deformations
pp. 574
Extraction of Shallow Language Patterns: An Approximation of Data Oriented Parsing
pp. 575
Faster Algebraic Algorithms for Path and Packing Problems
pp. 575
Fiber Orientation Estimation Guided by a Deep Network
pp. 580
A Concurrency-Optimal Binary Search Tree
pp. 582
Learning CRFs Using Graph Cuts
pp. 582
Controlling Search in Constrained-Object Models
pp. 585
Electronic Document and Records Management System Implementation in Malaysia: A Preliminary Study of Issues Embracing the Initiative
pp. 586
Tissue Characterization Using Dimensionality Reduction and Fluorescence Imaging
pp. 594
A Method for Registering Diffusion Weighted Magnetic Resonance Images
pp. 597
Spanners in Sparse Graphs
pp. 599
Smart Alignment Tool for Knee MosaicPlasty Surgery
pp. 605
Loglog Counting of Large Cardinalities
pp. 606
When Can We Call a System Self-Organizing?
pp. 610
Labeling Points with Weights
pp. 611
Bayesian Image Quality Transfer with CNNs: Exploring Uncertainty in dMRI Super-Resolution
pp. 611
Fifty Shades of Green: How Informative is a Compliant Process Trace?
pp. 613
A Novel Low Velocity Robotic Penetrator Based on Ampere Force
pp. 613
Improved Tree Decomposition Based Algorithms for Domination-like Problems
pp. 621
From External to Internal Regret
pp. 623
A Logic Based Approach for Dynamic Access Control
pp. 627
On the transformation between direct and continuation semantics
pp. 627
Developing a Test Collection for the Evaluation of Integrated Search
pp. 634
Simpler Linear-Time Modular Decomposition Via Recursive Factorizing Permutations
pp. 637
The Second Answer Set Programming Competition
pp. 638
Resources Required for Preparing Graph States
pp. 638
Gray Matter Surface Based Spatial Statistics (GS-BSS) in Diffusion Microstructure
pp. 641
A Real-World Application of a Many-Objective Optimisation Complexity Reduction Process
pp. 641
Finding Dense Subgraphs in Relational Graphs
pp. 645
Higher Order Contractive Auto-Encoder
pp. 645
Bronchoscope Tracking Based on Image Registration Using Multiple Initial Starting Points Estimated by Motion Prediction
pp. 645
A New Visualization Method for Virtual Colonoscopy
pp. 646
The Complexity of the Counting Constraint Satisfaction Problem
pp. 647
Privacy-Preserving SVM Classification on Vertically Partitioned Data
pp. 649
Labeling Subway Lines
pp. 653
Accelerating the Tucker Decomposition with Compressed Sparse Tensors
pp. 656
Patient-Specific Skeletal Muscle Fiber Modeling from Structure Tensor Field of Clinical CT Images
pp. 658
Robust cluster analysis via mixtures of multivariate t-distributions
pp. 658
3D Segmentation of Glial Cells Using Fully Convolutional Networks and k-Terminal Cut
pp. 662
The bit probe complexity measure revisited
pp. 669
Design and Implementation of SIP Security
pp. 675
Fast and Effective Multi-objective Optimisation of Submerged Wave Energy Converters
pp. 677
Functional MRI Analysis by a Novel Spatiotemporal ICA Algorithm
pp. 678
Online Tracking and Reacquisition Using Co-trained Generative and Discriminative Trackers
pp. 680
MADMM: A Generic Algorithm for Non-smooth Optimization on Manifolds
pp. 683
Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet
pp. 684
Transformative Spaces: The Library as Panopticon
pp. 685
Distributed and Anonymous Publish-Subscribe
pp. 685
Barbed bisimulation
pp. 689
Inferring the Socioeconomic Status of Social Media Users Based on Behaviour and Language
pp. 690
Deconvolution of 3D Fluorescence Microscopy Images Using Graphics Processing Units
pp. 694
Iconic Feature Registration with Sparse Wavelet Coefficients
pp. 700
Nonnegative Matrix Factor 2-D Deconvolution for Blind Single Channel Source Separation
pp. 701
Person Re-identification via Recurrent Feature Aggregation
pp. 702
Discovering Latent Domains for Multisource Domain Adaptation
pp. 702
Semi-supervised Learning for Biomedical Image Segmentation via Forest Oriented Super Pixels(Voxels)
pp. 706
Designing and Enacting Simulations Using Distributed Components
pp. 715
An Introductory Computer Graphics Course in the Context of the European Space of Higher Education: A Curricular Approach
pp. 716
Visual Recognition Using Local Quantized Patterns
pp. 722
Parallelization strategies for Ant Colony Optimization
pp. 724
HKUST/MTS: A Very Large Scale Mandarin Telephone Speech Corpus
pp. 726
Logical Model of Relationship for Online Social Networks and Performance Optimizing of Queries
pp. 734
Learning High-Order Filters for Efficient Blind Deconvolution of Document Photographs
pp. 737
Constructing a Generic Natural Language Interface for an XML Database
pp. 741
Harmony Search for Generalized Orienteering Problem: Best Touring in China
pp. 741
Fast CapsNet for Lung Cancer Screening
pp. 742
Evaluation on Similarity Measures of a Surface-to-Image Registration Technique for Ultrasound Images
pp. 750
Backward-Warping Ultrasound Reconstruction for Improving Diagnostic Value and Registration
pp. 752
Rigid Point-Surface Registration Using an EM Variant of ICP for Computer Guided Oral Implantology
pp. 763
Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting
pp. 764
A Soft Approach to Multi-objective Optimization
pp. 766
Trajectory-Keeping Control of AUV Based on RNM-ADRC Method Under Current Disturbances for Terrain Survey Mission
pp. 785
Scalable Transactions in the Cloud: Partitioning Revisited
pp. 788
Robust Object Tracking by Hierarchical Association of Detection Responses
pp. 795
Imaging Metabolism with Light: Quantifying Local Fluorescence Lifetime Perturbation in Tissue-like Turbid Media
pp. 807
Segmentation of Thalamic Nuclei from DTI Using Spectral Clustering
pp. 810
Cartesio: A Software Tool for Pre-implant Stent Analyses
pp. 825
System Construction for Distributedly Controlling the Thrusters of X4-AUV
pp. 832
On the Rate of Structural Change in Scale Spaces
pp. 840
Immune Clonal Selection Network
pp. 845
Upper Bounds on the Noise Threshold for Fault-Tolerant Quantum Computing
pp. 853
Performance Improvement of RBF Network Using ART2 Algorithm and Fuzzy Logic System
pp. 854
Super-Gaussian Mixture Source Model for ICA
pp. 856
Constructing a Probabilistic Model for Automated Liver Region Segmentation Using Non-contrast X-Ray Torso CT images
pp. 867
User Experience of Hurricane Visualization in an Immersive 3D Environment
pp. 872
Half Fourier Acquisition Applied to Time Series Analysis of Contrast Agent Uptake
pp. 877
HybridCAM: Tool Path Generation Software for Hybrid Manufacturing
pp. 901
Left Ventricle Segmentation via Graph Cut Distribution Matching
pp. 932
Analysis of the Parameter Space of a Metric for Registering 3D Vascular Images
pp. 937
Collective Evolutionary Indexing of Multimedia Objects
pp. 946
Brain Surface Conformal Parameterization with Algebraic Functions
pp. 954
On the Tradeoff Between Blocking and Dropping Probabilities in CDMA Networks Supporting Elastic Services
pp. 955
Logarithm Odds Maps for Shape Representation
pp. 955
Extended Locally Linear Embedding with Gabor Wavelets for Face Recognition
pp. 967
Tensor-Based Analysis of Genetic Influences on Brain Integrity Using DTI in 100 Twins
pp. 979
An Interaction Model for Affect Monitoring
pp. 981
Affective Computing: A Review
pp. 985
Ontology Transformation in Multiple Domains
pp. 1015
Beyond Accuracy, F-Score and ROC: A Family of Discriminant Measures for Performance Evaluation
pp. 1031
Comparison of Two Restoration Techniques in the Context of 3D Medical Imaging
pp. 1048
Hybrid Segmentation of Anatomical Data
pp. 1049
Contributions of Domain Knowledge and Stacked Generalization in AI-Based Classification Models
pp. 1115
Selecting Subspace Dimensions for Kernel-Based Nonlinear Subspace Classifiers Using Intelligent Search Methods
pp. 1135
A Framework for Disambiguation in Ambiguous Iconic Environments
pp. 1144
Non-rigid registration of breast MR images using mutual information
pp. 1154
Feature Extraction Based on Wavelet Domain Hidden Markov Tree Model for Robust Speech Recognition
pp. 1160
Feature Unification and Constraint Satisfaction in Parsing Korean Case Phenomena
pp. 1172
Matching Breast Lesions in Multiple Mammographic Views
pp. 1175
A Novel Planar Walking Algorithm for Virtual Walking Machine
pp. 1176
Registration of the Spine Using a Physically-Based Image Model for Ultrasound
pp. 1178
Computing Match Functions for Curves in ℝ2 and ℝ3 by Refining Polyline Approximations
pp. 1183
Segmentation of the Subthalamic Nucleus in MR Images Using Information Fusion — A Preliminary Study for a Computed-Aided Surgery of Parkinson.s Disease
pp. 1200
A Parallel Learning Approach for Neural Network Ensemble
pp. 1213
Fuzzy C-means Clustering Analysis to Monitor Tissue Perfusion with Near Infrared Imaging
pp. 1220
Exploiting Voxel Correlation for Automated MRI Bias Field Correction by Conditional Entropy Minimization
pp. 1246
Statistical Exploratory Analysis of Genetic Algorithms: The Influence of Gray Codes upon the Difficulty of a Problem
pp. 1248
Remote Analysis for Brain Shift Compensation
pp. 1255
Clinical Use of a Mutual Information-Based Automated Image Registration System for Conformal Radiotherapy Treatment Planning
pp. 1267
Methods for Modeling and Predicting Mechanical Deformations of the Breast Under External Perturbations
pp. 1287
A Virtual Exploring Robot for Adaptive Left Ventricle Contour Detection in Cardiac MR Images
pp. 1289
A Mesh-Based Shape Analysis Framework
pp. 1314
Hexapod Intervention Planning for a Robotic Skull-Base Surgery System
pp. 1320
3D+t Modeling of Coronary Artery Tree from Standard Non Simultaneous Angiograms
pp. 1332
Phase-Driven Finite Element Model for Spatio-temporal Tracking in Cardiac Tagged MRI
pp. 1358
Fast Linear Elastic Matching Without Landmarks
pp. 1361
Endoscope Calibration and Accuracy Testing for 3D/2D Image Registration
pp. 1376
Approximate Volumetric Reconstruction from Projected Images
pp. 1384
Integrated System for Objective Assessment of Global and Regional Lung Structure
pp. 1386
Computer Aided Diagnosis for the Alzheimer Type Dementia
pp. 1406
Toward Application of Virtual Reality to Visualization of DT-MRI Volumes
pp. 1417
Cooperative Fine Manipulation Tasks in Surgery
Similar content
2,078
Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme
Authors:
Jung Cheon
,
Woo-Hwan Kim
,
Hyun Soo Nam
Privacy Preserving BGN-Type Parallel Homomorphic Encryption Algorithm Based on LWE. J
Authors:
Z Min
,
G Yang
,
J. Wang
…
Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated Encryption
Authors:
Jung Cheon
,
Kyoohyung Han
,
Seong-Min Hong
…
See all similar
Cited by
98
Homomorphic Encryption for Arithmetic of Approximate Numbers
Authors:
Jung Cheon
,
Andrey Kim
,
Miran Kim
…
Fully homomorphic SIMD operations
Authors:
N. Smart
,
F Vercauteren
Fully Homomorphic Encryption with Polylog Overhead
Authors:
Craig Gentry
,
Shai Halevi
,
Nigel Smart
See all cited by