Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
93
views
0
references
Top references
cited by
99
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,191
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Foundations and Practice of Security
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
other
Author(s):
Zvika Brakerski
,
Vinod Vaikuntanathan
Publication date
(Print):
2011
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Security and Safety (S&S)
Author and book information
Book Chapter
Publication date (Print):
2011
Pages
: 505-524
DOI:
10.1007/978-3-642-22792-9_29
SO-VID:
94547e11-b448-498e-8e93-c408345f3dcc
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. E1
Erratum: Sentiment Characterization of an Urban Environment via Twitter
pp. 1
SIFT-SS: An Advanced Steady-State Multi-Objective Genetic Fuzzy System
pp. 1
Crossings and Permutations
pp. 1
A Method for Tracking the Camera Motion of Real Endoscope by Epipolar Geometry Analysis and Virtual Endoscopy System
pp. 1
Candidate Multilinear Maps from Ideal Lattices
pp. 1
Approximation Algorithms for Disjoint st-Paths with Minimum Activation Cost
pp. 1
Understanding Etiology of Complex Neurodevelopmental Disorders: Two Approaches
pp. 1
Distributed Minimum Cut Approximation
pp. 1
Reflections on Monadic Lenses
pp. 1
Planar point location revisited (A guided tour of a decade of research)
pp. 1
Preliminary Bone Sawing Model for a Virtual Reality-Based Training Simulator of Bilateral Sagittal Split Osteotomy
pp. 1
Analysing the IOBC Authenticated Encryption Mode
pp. 1
Advances in Automated Program Repair and a Call to Arms
pp. 1
Neuromorphic Detection of Vowel Representation Spaces
pp. 1
Notes on Triangular Sets and Triangulation-Decomposition Algorithms I: Polynomial Systems
pp. 1
Modeling and enactment of workflow systems
pp. 1
General theory of cumulative inference
pp. 1
Quantum Computing: 1-Way Quantum Automata
pp. 1
Reliable Software Development: Analysis-Aware Design
pp. 1
I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves
pp. 1
The Scholarly Impact of CLEF (2000–2009)
pp. 1
Efficient Private Matching and Set Intersection
pp. 2
Parallelization of Sphere-Decoding Methods
pp. 2
Detecting Missing Method Calls in Object-Oriented Software
pp. 2
Problems of and Mechanisms for Instantiating Virtual Organizations
pp. 3
End-User Development and Meta-design: Foundations for Cultures of Participation
pp. 3
COMPENDIUM: A Text Summarization System for Generating Abstracts of Research Papers
pp. 3
Developing Criteria for Evaluating a Multi-channel Digitally Enabled Participatory Budgeting Platform
pp. 3
The Active Atlas: Combining 3D Anatomical Models with Texture Detectors
pp. 3
Detecting Adversarial Attacks in the Context of Bayesian Networks
pp. 3
Natural Language Understanding in Façade: Surface-Text Processing
pp. 3
Evaluation of Data Warehouse Design Methodologies in the Context of Big Data
pp. 3
On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers
pp. 3
The KEEN Universe
pp. 3
Driving Innovation Using Big Open Linked Data (BOLD) Panel
pp. 3
MULDER: Querying the Linked Data Web by Bridging RDF Molecule Templates
pp. 3
Route Recommendations to Business Travelers Exploiting Crowd-Sourced Data
pp. 5
Language constructs and runtime systems for compositional parallel programming
pp. 5
Compositional Coinduction with Sized Types
pp. 9
1. Experimenting on nondeterministic machines
pp. 9
Formal Testing of Timed and Probabilistic Systems
pp. 9
Automatic IVUS Segmentation of Atherosclerotic Plaque with Stop & Go Snake
pp. 9
Tyrant Leaders as e-Government Service Promoters: The Role of Transparency and Tyranny in the Implementation of e-Government Service
pp. 10
Retrofitting Communication Security into a Publish/Subscribe Middleware Platform
pp. 11
Total Setup Time Minimisation in Production Scheduling with Alternatives
pp. 12
Security Protocol Deployment Risk
pp. 12
A Scale Invariant Covariance Structure on Jet Space
pp. 13
Geometric Structure of Degeneracy for Multi-body Motion Segmentation
pp. 14
Case Retrieval Reuse Net (CR2N): An Architecture for Reuse of Textual Solutions
pp. 14
Internet Ad Auctions: Insights and Directions
pp. 15
Are Android Smartphones Ready to Locally Execute Intelligent Algorithms?
pp. 16
Centrality Indices
pp. 16
Statistics of Patch Offsets for Image Completion
pp. 16
A Recurrent Enumeration of Free Hypermultisets
pp. 17
A Blueprint for Event-Driven Business Activity Management
pp. 17
Pen-Based Video Annotations: A Proposal and a Prototype for Tablet PCs
pp. 17
Reactive Semantics for Distributed UML Activities
pp. 18
Text Classification for Data Loss Prevention
pp. 18
Real-World Behavior Analysis through a Social Media Lens
pp. 19
Experiences in Trusted Cloud Computing
pp. 19
How to Break MD5 and Other Hash Functions
pp. 20
The Voronoi Diagram of Circles and Its Application to the Visualization of the Growth of Particles
pp. 21
Integrated Operational Semantics: Small-Step, Big-Step and Multi-step
pp. 21
AErlang: Empowering Erlang with Attribute-Based Communication
pp. 21
An Extensible Ubiquitous Architecture for Networked Devices in Smart Living Environments
pp. 21
Cell Segmentation Proposal Network for Microscopy Image Analysis
pp. 22
Computer-aided school and university timetabling: The new wave
pp. 22
Typed Assembler for a RISC Crypto-Processor
pp. 22
A Nivat Theorem for Quantitative Automata on Unranked Trees
pp. 23
Densifying Assumed-Sparse Tensors
pp. 24
Binary Shapelet Transform for Multiclass Time Series Classification
pp. 24
Child’s Play - A Literature-Based Survey on Gamified Tools and Methods for Fostering Public Participation in Urban Planning
pp. 26
The Use of Expressives in Online Political Talk: Impeding or Facilitating the Normative Goals of Deliberation?
pp. 26
Outcome Prediction for Patient with High-Grade Gliomas from Brain Functional and Structural Networks
pp. 27
Happier Together: Integrating a Wellness Application into a Social Network Site
pp. 27
Checking Framework Interactions with Relationships
pp. 27
Reasoning with Temporal Logic on Truncated Paths
pp. 28
A New Continuous Model for Segregation Implemented and Analyzed on Swarm Robots
pp. 29
Bundle Adjustment in the Large
pp. 29
Beyond 2-Safety: Asymmetric Product Programs for Relational Program Verification
pp. 29
Stochastic Process Algebras Meet Eden
pp. 30
Algorithms for Model Checking HyperLTL and HyperCTL $$^*$$
pp. 30
A Survey of the Merit Factor Problem for Binary Sequences
pp. 30
Specification of Autonomous Agents in E-commerce Systems
pp. 31
Human Reidentification with Transferred Metric Learning
pp. 31
Secure Conjunctive Keyword Search over Encrypted Data
pp. 32
The rakaposhi Stream Cipher
pp. 33
Drug Activity Characterization Using One-Class Support Vector Machines with Counterexamples
pp. 34
Strategies to Manage Ignorance Situations in Multiperson Decision Making Problems
pp. 36
An Improved Decomposition Theorem for Graphs Excluding a Fixed Minor
pp. 38
Peer Nominations and Its Relation to Interactions in a Computer Game
pp. 38
Problems easy for tree-decomposable graphs extended abstract
pp. 38
Aggregation of Statistical Data from Passive Probes: Techniques and Best Practices
pp. 39
Proofs, Programs, Processes
pp. 40
Joint Sparse and Low-Rank Regularized Multi-Task Multi-Linear Regression for Prediction of Infant Brain Development with Incomplete Data
pp. 40
Advances in WASP
pp. 40
A Study of Archiving Strategies in Multi-objective PSO for Molecular Docking
pp. 40
Learning Neural Representations for Predicting GPU Performance
pp. 40
Traffic Localization for DHT-Based BitTorrent Networks
pp. 41
Detecting Spatially Consistent Structural Differences in Alzheimer’s and Fronto Temporal Dementia Using Deformation Morphometry
pp. 41
A finite-domain semantics for testing temporal logic specifications
pp. 43
On Privacy in Spatio-Temporal Data: User Identification Using Microblog Data
pp. 43
Manifold Valued Statistics, Exact Principal Geodesic Analysis and the Effect of Linear Approximations
pp. 44
Using Geographic Cost Functions to Discover Vessel Itineraries from AIS Messages
pp. 44
Worst-Case and Average-Case Approximations by Simple Randomized Search Heuristics
pp. 44
Energy-Aware Model-Driven Development of a Wearable Healthcare Device
pp. 45
Canonized Rewriting and Ground AC Completion Modulo Shostak Theories
pp. 45
Exploring Behavior Change Features for Mobile Workout Applications
pp. 45
On Solving a Stochastic Programming Model for Perishable Inventory Control
pp. 45
Incentivising Resource Sharing in Federated Clouds
pp. 45
Community Adaptive Educational Games
pp. 45
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
pp. 47
Extracting Muscle Synergy Patterns from EMG Data Using Autoencoders
pp. 47
Location Privacy Protection Through Obfuscation-Based Techniques
pp. 47
4. Case studies in value-communication
pp. 48
Fast Predictive Image Registration
pp. 48
The Decision Diffie-Hellman problem
pp. 49
Trials of traced traitors
pp. 50
Understanding Compliance Differences between Legal and Social Norms: The Case of Smoking Ban
pp. 50
Filter Keywords and Majority Class Strategies for Company Name Disambiguation in Twitter
pp. 50
MASIF The OMG mobile agent system interoperability facility
pp. 51
A Metric Conceptual Space Algebra
pp. 51
Safe Agents in Space: Lessons from the Autonomous Sciencecraft Experiment
pp. 52
COPE - Automating Coupled Evolution of Metamodels and Models
pp. 53
Making Study Populations Visible Through Knowledge Graphs
pp. 54
On Decidability and Complexity of Description Logics with Uniqueness Constraints
pp. 54
Team Formation Through Preference-Based Behavior Composition
pp. 54
Towards Measuring Anonymity
pp. 55
DCCO: Towards Deformable Continuous Convolution Operators for Visual Tracking
pp. 55
Histopathological Image Classification Using Stain Component Features on a pLSA Model
pp. 57
Stacked Hierarchical Labeling
pp. 57
Neighbor Discovery in a Sensor Network with Directional Antennae
pp. 57
Can Social Interaction Skills Be Taught by a Social Agent? The Role of a Robotic Mediator in Autism Therapy
pp. 57
Urban Traffic Modelling and Prediction Using Large Scale Taxi GPS Traces
pp. 57
An Efficient Method for Constructing Optimal Statistical Shape Models
pp. 58
Optimal Reachability in Cost Time Petri Nets
pp. 58
Description of Interest Regions with Center-Symmetric Local Binary Patterns
pp. 58
Performance Characteristics of Large SMP Machines
pp. 62
Reasoning about Loops in Total and General Correctness
pp. 62
Infinite objects in type theory
pp. 62
Efficient Linear System Solvers for Mesh Processing
pp. 63
Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs
pp. 63
Spatio-Temporal Shape Analysis of Cross-Sectional Data for Detection of Early Changes in Neurodegenerative Disease
pp. 63
MoteTrack: A Robust, Decentralized Approach to RF-Based Location Tracking
pp. 63
Compressed Suffix Arrays for Massive Data
pp. 63
Clinical experience with a high precision image-guided neurosurgery system
pp. 64
A Survey on Condensed Representations for Frequent Sets
pp. 64
Enabling Spatial Queries in Open Government Data Portals
pp. 64
Target-Specific Convolutional Bi-directional LSTM Neural Network for Political Ideology Analysis
pp. 65
sameAs.cc: The Closure of 500M owl:sameAs Statements
pp. 65
A Multiversion-Based Multidimensional Model
pp. 66
A Fast Approximate Algorithm for Mapping Long Reads to Large Reference Databases
pp. 68
Program Extraction from Gentzen’s Proof of Transfinite Induction up to ε0
pp. 71
Distributed Generation and Resilience in Power Grids
pp. 72
Computational adequacy via ‘mixed’ inductive definitions
pp. 72
Influences on the Intention to Buy a Sex Robot
pp. 72
Semantics and analysis of linda-based languages
pp. 72
Maximum Coverage Problem with Group Budget Constraints and Applications
pp. 72
LAIMA: A Multi-agent Platform Using Ordered Choice Logic Programming
pp. 73
The Essence of Inheritance
pp. 74
Browsing Search Results via Formal Concept Analysis: Automatic Selection of Attributes
pp. 74
A Strategy for Efficient Crawling of Rich Internet Applications
pp. 75
Choosing Models for Security Metrics Visualization
pp. 76
Bisimulation on Markov Processes over Arbitrary Measurable Spaces
pp. 76
An Overview of an Architecture Proposal for a High Energy Physics Grid
pp. 76
Slicing Concurrent Constraint Programs
pp. 77
Optimal Control for Multi-mode Systems with Discrete Costs
pp. 77
An “almost dual” to Gottschalk’s Conjecture
pp. 77
Validation of EISPACK
pp. 77
Preference-Based CBR: First Steps toward a Methodological Framework
pp. 77
Interpretable Text-to-Image Synthesis with Hierarchical Semantic Layout Generation
pp. 79
Performance Characterization of De Novo Genome Assembly on Leading Parallel Systems
pp. 79
The Chromatic Number of the Convex Segment Disjointness Graph
pp. 79
SEO: A Scientific Events Data Model
pp. 80
A rational design process: How and why to fake it
pp. 80
Practical Use Cases for Linked Open Data in eGovernment Demonstrated on the Czech Republic
pp. 80
A General Feature Engineering Wrapper for Machine Learning Using $$\epsilon $$ -Lexicase Survival
pp. 80
A Continuous Query Language for Stream-Based Artifacts
pp. 81
An AZP-ACO Method for Region-Building
pp. 81
Building Semantic Causal Models to Predict Treatment Adherence for Tuberculosis Patients in Sub-Saharan Africa
pp. 82
A New Decision Procedure for Finite Sets and Cardinality Constraints in SMT
pp. 83
A Theory of Transactions on Recoverable Search Trees
pp. 83
Source Camera Model Identification Using Features from Contaminated Sensor Noise
pp. 83
Improving IP Address Autoconfiguration Security in MANETs Using Trust Modelling
pp. 84
Early Experiences with the OpenMP Accelerator Model
pp. 85
Consistent and Elastic Registration of Histological Sections Using Vector-Spline Regularization
pp. 85
Edit Distance with Move Operations
pp. 85
Bounded Seed-AGI
pp. 85
Classification by Voting Feature Intervals
pp. 87
Manufacturing Service Reconfiguration Optimization Using Hybrid Bees Algorithm in Cloud Manufacturing
pp. 87
Experimental Evaluation of a Multi-modal User Interface for a Robotic Service
pp. 88
DeepChess: End-to-End Deep Neural Network for Automatic Learning in Chess
pp. 88
Data-Driven Approach Based on Semantic Roles for Recognizing Temporal Expressions and Events in Chinese
pp. 88
A Simple Fault Tolerant Distributed Hash Table
pp. 90
Hand-Held Force Magnifier for Surgical Instruments
pp. 91
New Collision Attacks against Up to 24-Step SHA-2
pp. 91
Using Trusted Execution Environments for Secure Stream Processing of Medical Data
pp. 92
An Architecture for Supporting RFID-Enhanced Interactions in Digital Libraries
pp. 92
Falx Cerebri Segmentation via Multi-atlas Boundary Fusion
pp. 92
Markov Logic
pp. 93
A Survey on the Algebras of the So–Called Intuitionistic Fuzzy Sets (IFS)
pp. 94
Reasoning about Timeouts
pp. 95
Understanding the Adoption of Mobile Internet in the Saudi Arabian Context: Results from a Descriptive Analysis
pp. 96
On List Update with Locality of Reference
pp. 96
Exhaustive Simulation and Test Generation Using fUML Activity Diagrams
pp. 96
Benchmarking Wireless Protocols for Feasibility in Supporting Crowdsourced Mobile Computing
pp. 96
DBpedia FlexiFusion the Best of Wikipedia > Wikidata > Your Data
pp. 97
ESBMC $$^{QtOM}$$ Q t O M : A Bounded Model Checking Tool to Verify Qt Applications
pp. 97
Employing Visual Analytics to Aid the Design of White Matter Hyperintensity Classifiers
pp. 98
Scientific Lenses to Support Multiple Views over Linked Chemistry Data
pp. 99
Social Modeling and i*
pp. 99
Safe and Efficient Data Sharing for Message-Passing Concurrency
pp. 99
Minimizing View Sets without Losing Query-Answering Power
pp. 99
Linked Open Government Data Analytics
pp. 99
Comparing the Efficiency of In Situ Visualization Paradigms at Scale
pp. 101
FastFDs: A Heuristic-Driven, Depth-First Algorithm for Mining Functional Dependencies from Relation Instances Extended Abstract
pp. 101
Hedging Uncertainty: Approximation Algorithms for Stochastic Optimization Problems
pp. 101
Real Time Head Pose Estimation from Consumer Depth Cameras
pp. 101
Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption
pp. 102
"5 Days in August" – How London Local Authorities Used Twitter during the 2011 Riots
pp. 103
Remote Sensing Image Registration Techniques: A Survey
pp. 103
Automated Classification of Galaxies Using Invariant Moments
pp. 104
SyncTap: An Interaction Technique for Mobile Networking
pp. 104
The Rise of Panopticons: Examining Region-Specific Third-Party Web Tracking
pp. 105
Seven more myths of formal methods: Dispelling industrial prejudices
pp. 105
Pseudo Boosted Deep Belief Network
pp. 105
Progressive Probabilistic Graph Matching with Local Consistency Regularization
pp. 106
Organizing Scalable Adaptation in Serious Games
pp. 108
Cost Soundness for Priced Resource-Constrained Workflow Nets
pp. 108
Localization for Large-Scale Underwater Sensor Networks
pp. 109
Investigating Cortical Variability Using a Generic Gyral Model
pp. 109
Research on Variable Stiffness and Damping Magnetorheological Actuator for Robot Joint
pp. 109
Collaboration between ISPs for Efficient Overlay Traffic Management
pp. 110
Approximating Linear Threshold Predicates
pp. 110
CTL+ Is Exponentially More Succinct than CTL
pp. 111
Some Geometrical Aspects of Control Points for Toric Patches
pp. 111
Certification for $$\mu $$ μ -Calculus with Winning Strategies
pp. 111
Automated Trading in Prediction Markets
pp. 113
On Improving the Efficiency of Deterministic Calls and Answers in Tabled Logic Programs
pp. 113
Detecting Resized Double JPEG Compressed Images – Using Support Vector Machine
pp. 114
Evaluating Cellular Automata Models by Evolutionary Multiobjective Calibration
pp. 114
Network Lifetime and Power Assignment in ad hoc Wireless Networks
pp. 114
Cost Based Data Dissemination in Broadcast Networks
pp. 115
Complexity Based Analysis of eGov Ontologies
pp. 115
Improving Fuzzy Searchable Encryption with Direct Bigram Embedding
pp. 116
Cicero - Towards a Multimodal Virtual Audience Platform for Public Speaking Training
pp. 117
Blood Flow and Velocity Estimation Based on Vessel Transit Time by Combining 2D and 3D X-Ray Angiography
pp. 118
Enabling Android-Based Devices to High-End GPGPUs
pp. 121
Minimax Regret 1-Sink Location Problems in Dynamic Path Networks
pp. 121
Droids in Disarray: Detecting Frame Confusion in Hybrid Android Apps
pp. 121
CNNs Under Attack: On the Vulnerability of Deep Neural Networks Based Face Recognition to Image Morphing
pp. 121
Output Range Analysis for Deep Feedforward Neural Networks
pp. 121
MIXes in mobile communication systems: Location management with privacy
pp. 122
Topological models for higher order control flow
pp. 123
Structure-Preserving Instance Generation
pp. 123
Reviewing Traffic Classification
pp. 123
Leveraging Active Learning for Relevance Feedback Using an Information Theoretic Diversity Measure
pp. 123
Support for the Evolution of C++ Generic Functions
pp. 124
Learning Intermediary Category Labels for Personal Recommendation
pp. 125
Deep Learning Trends for Focal Brain Pathology Segmentation in MRI
pp. 126
The Role of Stories in Three Non-12 Step Alcohol Online Support Groups
pp. 126
Refinement of Higher-Order Logic Programs
pp. 126
Network Density Estimation: Analysis of Point Patterns over a Network
pp. 128
A Semantic Query Interface for the OGO Platform
pp. 128
From a Literature Review to a Conceptual Framework for Health Sector Websites’ Assessment
pp. 129
Mobile Health Application Running on Public Cloud During Hajj
pp. 130
Buchberger algorithm and integer programming
pp. 130
Top-Level MeSH Disease Terms Are Not Linearly Separable in Clinical Trial Abstracts
pp. 130
Reenacting Sensorimotor Features of Drawing Movements from Friction Sounds
pp. 130
On Barrier Resilience of Sensor Networks
pp. 131
Turning Inductive into Equational Specifications
pp. 131
Deep Convolutional Neural Networks for the Segmentation of Gliomas in Multi-sequence MRI
pp. 132
Neural Network Modelling for Dissolved Oxygen Effects in Extensive Litopenaeus Vannamei Culture
pp. 133
Identifying Important Places in People’s Lives from Cellular Network Data
pp. 133
Utilization and SLO-Based Control for Dynamic Sizing of Resource Partitions
pp. 133
DSS: A Scalable and Efficient Stratified Sampling Algorithm for Large-Scale Datasets
pp. 134
Ontology Population and Enrichment: State of the Art
pp. 134
Applying a Def-Use Approach on Signal Exchange to Implement SysML Model-Based Testing
pp. 134
Shutdown Policies with Power Capping for Large Scale Computing Systems
pp. 134
Cryptanalysis of a SIP Authentication Scheme
pp. 134
A Real-Time Low-Power Stereo Vision Engine Using Semi-Global Matching
pp. 135
Two-Dimensional Traffic Rules and the Density Classification Problem
pp. 135
Specification-Based Monitoring of Cyber-Physical Systems: A Survey on Theory, Tools and Applications
pp. 137
Hybridizing Sparse Component Analysis with Genetic Algorithms for Blind Source Separation
pp. 137
Deep Learning for Classification of Malware System Call Sequences
pp. 138
Automatic Phonetic Segmentation Using the Kaldi Toolkit
pp. 138
Inference of Isoforms from Short Sequence Reads
pp. 139
Facial Expression Recognition Using a Hybrid CNN–SIFT Aggregator
pp. 140
Competitive vs Affiliative Design of Immersive VR Exergames
pp. 140
Fuzzy-Timed Automata
pp. 140
Cloud Infrastructure Security
pp. 140
Deep Retinal Image Understanding
pp. 142
A Novel Software Toolkit for Graph Edit Distance Computation
pp. 142
Online and Offline Trend Cluster Discovery in Spatially Distributed Data Streams
pp. 144
Virtual Humans with Secrets: Learning to Detect Verbal Cues to Deception
pp. 144
Measuring the Effectiveness of Throttled Data Transfers on Data-Intensive Workflows
pp. 144
Adaptable Landmark Localisation: Applying Model Transfer Learning to a Shape Model Matching System
pp. 145
A Surgery Simulation Supporting Cuts and Finite Element Deformation
pp. 145
Indexing the Pickup and Drop-Off Locations of NYC Taxi Trips in PostgreSQL – Lessons from the Road
pp. 145
Fast Distributed Computation of Cuts Via Random Circulations
pp. 146
Relations as Executable Specifications: Taming Partiality and Non-determinism Using Invariants
pp. 146
A Generic Algorithm for Learning Symbolic Automata from Membership Queries
pp. 147
Language Independent Assessment of Motor Impairments of Patients with Parkinson’s Disease Using i-Vectors
pp. 147
Finite-Horizon Bisimulation Minimisation for Probabilistic Systems
pp. 147
On-line packing and covering problems
pp. 148
Implicit Dynamic Frames: Combining Dynamic Frames and Separation Logic
pp. 149
Building VCL Models and Automatically Generating Z Specifications from Them
pp. 150
A First Approach to Deal with Imbalance in Multi-label Datasets
pp. 150
Convex Multi-class Image Labeling by Simplex-Constrained Total Variation
pp. 151
Conflict Propagation and Component Recursion for Canonical Labeling
pp. 151
Learning More from Experience in Case-Based Reasoning
pp. 151
How to Extract Fragments from Agent Oriented Design Processes
pp. 151
The Newton channel
pp. 152
The Machine Knows What You Are Hiding: An Automatic Micro-expression Recognition System
pp. 153
Patient-Specific Simulation of Carotid Artery Stenting Using Computational Fluid Dynamics
pp. 153
Integrating Feedback-Based Semantic Evidence to Enhance Retrieval Effectiveness for Clinical Decision Support
pp. 154
Learning to Recognize Activities from the Wrong View Point
pp. 155
Partial Key Recovery Attacks on XCBC, TMAC and OMAC
pp. 156
The Boomerang Attack
pp. 156
The Personalized, Collaborative Digital Library Environment CYCLADES and Its Collections Management
pp. 156
A New Approach to Software Reliability
pp. 157
Real-Time Normal Measurement and Error Compensation of Curved Aircraft Surface Based on On-line Thickness Measurement
pp. 157
A progress report on subliminal-free channels
pp. 158
Semantically Linking and Browsing Provenance Logs for E-science
pp. 158
11. Conclusion
pp. 158
Distinguisher-Dependent Simulation in Two Rounds and its Applications
pp. 158
Generalized Craig Interpolation for Stochastic Boolean Satisfiability Problems
pp. 158
Replicated Ubiquitous Nets
pp. 159
Shrinking and Expanding Cellular Automata
pp. 159
The Security Impact of a New Cryptographic Library
pp. 160
On the Essence of Unsupervised Detection of Anomalous Motion in Surveillance Videos
pp. 160
A Stochastic Approach to Tracking Objects Across Multiple Cameras
pp. 160
Hardware and Software Support for Transposition of Bit Matrices in High-Speed Encryption
pp. 161
Blind Super-Resolution with Deep Convolutional Neural Networks
pp. 161
Deep Autoencoding Models for Unsupervised Anomaly Segmentation in Brain MR Images
pp. 161
Volume Rendering of Segmented Tubular Objects
pp. 161
Parameter Selection in Particle Swarm Optimisation from Stochastic Stability Analysis
pp. 162
Source-Channel Communication in Sensor Networks
pp. 163
Towards Spatially- and Category-Wise k-Diverse Nearest Neighbors Queries
pp. 163
Weighted Bisimulation in Linear Algebraic Form
pp. 163
Aspects of Application Security for Internet of Things Systems
pp. 166
Sweetening Ontologies with DOLCE
pp. 167
Building a Test-Ready Abstraction of a Behavioral Model Using CLP
pp. 168
Learning dynamic Bayesian networks
pp. 168
A Productivity Checker for Logic Programming
pp. 169
Statistical Shape Model of Nested Structures Based on the Level Set
pp. 169
Reordering Transaction Execution to Boost High Frequency Trading Applications
pp. 170
An 8-State Simple Reversible Triangular Cellular Automaton that Exhibits Complex Behavior
pp. 171
Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries
pp. 172
Modelling Word Activation in Semantic Networks: Three Scaled Entanglement Models Compared
pp. 173
A MapReduce Based Distributed Framework for Similarity Search in Healthcare Big Data Environment
pp. 174
Mining for Empty Rectangles in Large Data Sets
pp. 174
Multi-atlas Propagation Whole Heart Segmentation from MRI and CTA Using a Local Normalised Correlation Coefficient Criterion
pp. 174
Declarative Debugging of Membership Equational Logic Specifications
pp. 174
Multiple approximate string matching
pp. 176
A Hyperheuristic Approach to Scheduling a Sales Summit
pp. 176
Towards a Methodology for Semantic Business Process Modeling and Configuration
pp. 177
Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis Coding
pp. 177
Locally Adaptive Probabilistic Models for Global Segmentation of Pathological OCT Scans
pp. 177
Accelerating by Idling: How Speculative Delays Improve Performance of Message-Oriented Systems
pp. 177
Timewise refinement for communicating processes
pp. 177
3D Reconstruction of Coronary Stents in Vivo Based on Motion Compensated X-Ray Angiograms
pp. 178
PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites
pp. 182
Spatio-Temporal Functional Dependencies for Sensor Data Streams
pp. 183
Convergence Issues in Competitive Games
pp. 183
A Condensation Approach to Privacy Preserving Data Mining
pp. 183
Hom4PS-3: A Parallel Numerical Solver for Systems of Polynomial Equations Based on Polyhedral Homotopy Continuation Methods
pp. 185
Research on Fine-Grained Linked Data Creation for Digital Library Resources
pp. 185
Using Long Queries in a Passage Retrieval System
pp. 185
Retina Mosaicing Using Local Features
pp. 185
On the Total Variation Distance of Semi-Markov Chains
pp. 185
An Ontology-Based Latent Semantic Indexing Approach Using Long Short-Term Memory Networks
pp. 185
Resident Security System for Government/Industry Owned Computers
pp. 185
Bus-OLAP: A Bus Journey Data Management Model for Non-on-time Events Query
pp. 186
MaLTESE: Large-Scale Simulation-Driven Machine Learning for Transient Driving Cycles
pp. 186
Eddy-Current Distortion Correction and Robust Tensor Estimation for MR Diffusion Imaging
pp. 186
Analysis of an Electronic Voting Protocol in the Applied Pi Calculus
pp. 187
Cutting Out Continuations
pp. 187
How Current Android Malware Seeks to Evade Automated Code Analysis
pp. 188
A Framework for Multi-Objective Clustering and Its Application to Co-Location Mining
pp. 188
Characterization of a Novel Imaging-Based Metric of Patellofemoral Separation Using Computational Modeling
pp. 189
Designing Human Behavior Through Social Influence in Mobile Crowdsourcing with Micro-communities
pp. 189
Annotating Simplices with a Homology Basis and Its Applications
pp. 189
Semantic Web Datatype Similarity: Towards Better RDF Document Matching
pp. 190
Monitoring Hyperproperties
pp. 191
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
pp. 191
Multiset Rewriting: A Semantic Framework for Concurrency with Name Binding
pp. 192
A Subexponential Lower Bound for Zadeh’s Pivoting Rule for Solving Linear Programs and Games
pp. 192
Phoenix: DGA-Based Botnet Tracking and Intelligence
pp. 192
Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers
pp. 192
Intrinsic Regression Models for Manifold-Valued Data
pp. 193
A Characterization of Minimalist Languages
pp. 193
Incremental Program Obfuscation
pp. 194
Information Systems Modeling: Language, Verification, and Tool Support
pp. 194
Applying Information System Hazard Analysis to an Episodic Document Context
pp. 195
“Tri, Tri Again”: Finding Triangles and Small Subgraphs in a Distributed Setting
pp. 195
The Core Concept for the Multidimensional Knapsack Problem
pp. 196
Analysis of the Bit-Search Generator and Sequence Compression Techniques
pp. 198
Denoising of Radiotherapy Portal Images Using Wavelets
pp. 199
Accelerating K-Means by Grouping Points Automatically
pp. 199
Multi-Region Probabilistic Histograms for Robust and Scalable Identity Inference
pp. 199
Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study
pp. 201
Enhancing CardSpace Authentication Using a Mobile Device
pp. 201
Relative Lempel-Ziv Compression of Genomes for Large-Scale Storage and Retrieval
pp. 202
A Pipeline to Characterize Virulence Factors in Mycobacterium Massiliense Genome
pp. 203
Modelling-Alignment for Non-random Sequences
pp. 205
Mathematical structures underlying greedy algorithms
pp. 206
Beam Search Extraction and Forgetting Strategies on Shared Ensembles
pp. 207
Manhattan-Geodesic Embedding of Planar Graphs
pp. 207
Combining the Temporal and Epistemic Dimensions for MTL Monitoring
pp. 208
Development of a New Fractal Algorithm to Predict Quality Traits of MRI Loins
pp. 209
Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges
pp. 209
Knowledge-Based Query Expansion over a Medical Terminology Oriented Ontology on the Web
pp. 209
Anamorphosis Projection by Ubiquitous Display in Intelligent Space
pp. 211
An Approach to Semantic Information Retrieval Based on Natural Language Query Understanding
pp. 212
Surface-Wise Texture Patch Analysis of Combined MRI and PET to Detect MRI-Negative Focal Cortical Dysplasia
pp. 212
Rational Behaviour and Strategy Construction in Infinite Multiplayer Games
pp. 212
Linked Relations Architecture for Production and Consumption of Linksets in Open Government Data
pp. 213
Ontology-Based User Modeling for Knowledge Management Systems
pp. 213
Performance Prediction and Automated Tuning of Randomized and Parametric Algorithms
pp. 214
Mobile Agents for Management of Native Applications in GRID
pp. 214
Comparing DNA Sequence Collections by Direct Comparison of Compressed Text Indexes
pp. 215
SemanGit: A Linked Dataset from git
pp. 215
Improving Information Retrieval by Meta-modelling Medical Terminologies
pp. 217
A Steganalysis Scheme for AAC Audio Based on MDCT Difference Between Intra and Inter Frame
pp. 217
The Enron Corpus: A New Dataset for Email Classification Research
pp. 217
A Nonparametric Bayesian Approach to Detecting Spatial Activation Patterns in fMRI Data
pp. 217
Intelligent Overhead Sensor for Sliding Doors: A Stereo Based Method for Augmented Efficiency
pp. 219
Taxonomy-Oriented Recommendation towards Recommendation with Stage
pp. 219
A Visual Inspection Method Based on Periodic Feature for Wheel Mark Defect on Wafer Backside
pp. 220
Adding State and Visibility Control to Traits Using Lexical Nesting
pp. 221
Proving Correctness of Compilers Using Structured Graphs
pp. 222
A Tool for Analyzing Clinical Datasets as Blackbox
pp. 223
On the Design and Implementation of an Efficient DAA Scheme
pp. 224
Setup and Annotation of Metabolomic Experiments by Integrating Biological and Mass Spectrometric Metadata
pp. 224
A Comparative Study of STOPA and RTPA
pp. 225
Hypertextual Programming for Domain-Specific End-User Development
pp. 225
A Swarm Intelligence Approach in Undersampling Majority Class
pp. 226
Using Personality to Create Alliances in Group Recommender Systems
pp. 226
Determining Personality Traits from Renren Status Usage Behavior
pp. 228
AnyOut: Anytime Outlier Detection on Streaming Data
pp. 229
Rational Secret Sharing, Revisited
pp. 230
Color Set Size problem with applications to string matching
pp. 231
The Exact Subgraph Recoverable Robust Shortest Path Problem
pp. 232
Low-Cost Approximation Algorithms for Scheduling Independent Tasks on Hybrid Platforms
pp. 232
On the Expressiveness of Absolute-Time Coordination Languages
pp. 232
Fuzzy-Genetic System Applied to Topology Optimization of Cable-Trusses Modular Design
pp. 232
Ambient Sensor System for Freezing of Gait Detection by Spatial Context Analysis
pp. 233
Inconsistency and Undefinedness in Z – A Practical Guide
pp. 234
Approximation Algorithms for Scheduling Parallel Jobs: Breaking the Approximation Ratio of 2
pp. 234
Shifting Hypergraphs by Probabilistic Voting
pp. 235
A Survey on Localization for Mobile Wireless Sensor Networks
pp. 235
Tractable Reasoning in a Fragment of Separation Logic
pp. 235
A Prediction Model Based Approach to Open Space Steganography Detection in HTML Webpages
pp. 235
Context-Aware Recommendations in the Mobile Tourist Application COMPASS
pp. 236
Blur Insensitive Texture Classification Using Local Phase Quantization
pp. 236
Transparency Dimensions of Big and Open Linked Data
pp. 236
Fine-Grained Evaluation of Local Positioning Systems for Specific Target Applications
pp. 237
Neural Machine Translation for Morphologically Rich Languages with Improved Sub-word Units and Synthetic Data
pp. 237
A Privacy Awareness System for Ubiquitous Computing Environments
pp. 237
Improving Functional Logic Programs by Difference-Lists
pp. 238
Internal Models for Coalgebraic Modal Logics
pp. 238
Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications
pp. 238
Learning Policies for Resolving Demand-Capacity Imbalances During Pre-tactical Air Traffic Management
pp. 239
Finding P–Maps and I–Maps to Represent Conditional Independencies
pp. 239
Self-Transfer Learning for Weakly Supervised Lesion Localization
pp. 241
Real-Time Human Pose Estimation via Cascaded Neural Networks Embedded with Multi-task Learning
pp. 241
A spatial predator-prey approach to multi-objective optimization: A preliminary study
pp. 242
Can We Apply Learning Analytics Tools in Challenge Based Learning Contexts?
pp. 243
Combining Knowledge-Based Methods to Refine and Expand Queries in Medicine
pp. 244
Multiple Controlled Mobile Elements (Data Mules) for Data Collection in Sensor Networks
pp. 244
Search Result Personalization in Twitter Using Neural Word Embeddings
pp. 244
Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?
pp. 245
Unifying Guilt-by-Association Approaches: Theorems and Fast Algorithms
pp. 245
Simultaneous Multiple Rotation Averaging Using Lagrangian Duality
pp. 247
Open Data Landscape: A Global Perspective and a Focus on China
pp. 247
Embedding Covert Channels into TCP/IP
pp. 248
On Compressibility and Acceleration of Orthogonal NMF for POMDP Compression
pp. 248
Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors
pp. 249
Pareto Distance for Multi-layer Network Analysis
pp. 249
Analysis of Perceptron-Based Active Learning
pp. 252
Spatial Cues in Hamlet
pp. 252
Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization
pp. 254
Static Guard Analysis in Timed Automata Verification
pp. 255
Evaluation of the Music Ontology Framework
pp. 256
Communication Requirements for Team Automata
pp. 256
SXSLT: Manipulation Language for XML
pp. 257
Multi-level Algorithms for Modularity Clustering
pp. 258
Retrospective Evaluation of Inter-subject Brain Registration
pp. 258
Optimal Monotone Encodings
pp. 259
Tractable Models for Information Diffusion in Social Networks
pp. 259
Concept Type Hierarchy as Ontology: An Example Historical Knowledge Base
pp. 259
Blockchain-Based Research Data Sharing Framework for Incentivizing the Data Owners
pp. 259
A Formal Semantics for Brahms
pp. 260
Rewriting System for Profile-Guided Data Layout Transformations on Binaries
pp. 260
Monitoring of Real-Time Properties
pp. 261
A Comparative Study on Evolutionary Algorithms for Many-Objective Optimization
pp. 261
Novel Design of a Family of Legged Mobile Lander
pp. 261
Shoal: Query Optimization and Operator Placement for Access Controlled Stream Processing Systems
pp. 262
Combining Third Party Components Securely in Automotive Systems
pp. 262
t for Two Linear Synergy Advances the Evolution of Directional Pointing Behaviour
pp. 262
Minimum Support ICA Using Order Statistics. Part I: Quasi-range Based Support Estimation
pp. 263
Intuitionistic Fuzzy Sets in Intelligent Data Analysis for Medical Diagnosis
pp. 263
Grid-Based Colocation Mining Algorithms on GPU for Big Spatial Event Data: A Summary of Results
pp. 264
Recognizing End-Diastole and End-Systole Frames via Deep Temporal Regression Network
pp. 266
Testing the Intermediate Disturbance Hypothesis: Effect of Asynchronous Population Incorporation on Multi-Deme Evolutionary Algorithms
pp. 267
QUASY: Quantitative Synthesis Tool
pp. 268
A Signature Scheme with Efficient Protocols
pp. 269
Reducing Local Optima in Single-Objective Problems by Multi-objectivization
pp. 270
Recognition of Cross Profiles of Roadbed Based on Polygonal Representations
pp. 271
Can Text Summaries Help Predict Ratings? A Case Study of Movie Reviews
pp. 271
Polynomial-Time Construction of Linear Network Coding
pp. 271
End-to-End Resilience for HPC Applications
pp. 272
Actionable Clause Detection from Non-imperative Sentences in Howto Instructions: A Step for Actionable Information Extraction
pp. 272
Speaker Model to Monitor the Neurological State and the Dysarthria Level of Patients with Parkinson’s Disease
pp. 272
A Dynamic Allocation Method of Basis Functions in Reinforcement Learning
pp. 273
Linear $$ \lambda \mu $$ is $$ \textsc {CP} $$ (more or less)
pp. 274
Coauthor Prediction for Junior Researchers
pp. 275
Meeting Organisational Needs and Quality Assurance through Balancing Agile and Formal Usability Testing Results
pp. 275
Scaling Bounded Model Checking by Transforming Programs with Arrays
pp. 276
Requirements Engineering for Cyber Physical Production Systems
pp. 276
Types, Maps and Separation Logic
pp. 276
Using a generalisation critic to find bisimulations for coinductive proofs
pp. 276
Interactive Organ Segmentation Using Graph Cuts
pp. 279
IsaPlanner: A Prototype Proof Planner in Isabelle
pp. 280
Contour-Relaxed Superpixels
pp. 281
Mitigating MPI Message Matching Misery
pp. 282
Stochastic Constraint Programming by Neuroevolution with Filtering
pp. 283
Mixed Metric Random Forest for Dense Correspondence of Cone-Beam Computed Tomography Images
pp. 284
A Correlation-Based Distance Function for Nearest Neighbor Classification
pp. 285
Personalized Citation Recommendation via Convolutional Neural Networks
pp. 285
Algorithm for Clustering of Web Search Results from a Hyper-heuristic Approach
pp. 286
Gene Network Modules-Based Liner Discriminant Analysis of Microarray Gene Expression Data
pp. 287
Mining Learning Processes from FLOSS Mailing Archives
pp. 287
Memory Efficient Vision Based Line Feature Extraction for Tiny Mobile Robots
pp. 287
Cross-Correlation and Rotation Estimation of Local 3D Vector Field Patches
pp. 287
Autonomous Navigation Control for Quadrotors in Trajectories Tracking
pp. 287
Constructing Extended Formulations from Reflection Relations
pp. 288
Hardness of approximating problems on cubic graphs
pp. 289
Execution of Recursive Queries in Apache Spark
pp. 290
On the Application of Spell Correction to Improve Plagiarism Detection
pp. 290
A Procedural Semantics for Multi-adjoint Logic Programming
pp. 291
On hyperbolic cascaded Reed-Solomon codes
pp. 291
Day-ahead PV Power Forecast by Hybrid ANN Compared to the Five Parameters Model Estimated by Particle Filter Algorithm
pp. 291
Optimal Transport for Diffeomorphic Registration
pp. 291
Automatic Quality Control for Population Imaging: A Generic Unsupervised Approach
pp. 292
Prioritizing Disease Genes by Bi-Random Walk
pp. 292
Enumerating Membrane Structures
pp. 293
Symbolic Model Checking for Probabilistic Timed Automata
pp. 293
On the Equivalence-Checking Problem for a Model of Programs Related With Multi-tape Automata
pp. 294
Computational Complexity of the Distance Constrained Labeling Problem for Trees (Extended Abstract)
pp. 294
Semantic Security for the Wiretap Channel
pp. 294
Architecture for a Collaborative Research Environment Based on Reading List Sharing
pp. 294
Strategic Planning in the Public Sector: How Can Brazilian Public Universities Transform Their Management, Computerise Processes and Improve Monitoring?
pp. 295
A Fourth Normal Form for Uncertain Data
pp. 296
Quantitative Types for the Linear Substitution Calculus
pp. 299
Toward an MP Model of Non-Photochemical Quenching
pp. 299
Private-Collective Innovation and Open Source Software: Longitudinal Insights from Linux Kernel Development
pp. 300
A Direct Sum Theorem in Communication Complexity via Message Compression
pp. 300
Detection and Prediction of Natural Hazards Using Large-Scale Environmental Data
pp. 301
Refresh Instead of Revoke Enhances Safety and Availability: A Formal Analysis
pp. 301
A Collaborative Approach to In-Place Sensor Calibration
pp. 302
Feature Location in a Collection of Software Product Variants Using Formal Concept Analysis
pp. 303
Improved Reversible Visible Watermarking Based on Adaptive Block Partition
pp. 303
Simulation Based Computation of Certificates for Safety of Dynamical Systems
pp. 303
Optimal Rates of Aggregation
pp. 303
Measure Properties of Game Tree Languages
pp. 308
Refinement of Three-Dimensional Orthogonal Graph Drawings
pp. 309
Guiding Patients in the Hospital
pp. 309
Active Hidden Markov Models for Information Extraction
pp. 309
Temporal Visualization of Social Network Dynamics: Prototypes for Nation of Neighbors
pp. 309
Google’s Auction for TV Ads
pp. 310
Quantum Non-malleability and Authentication
pp. 311
Discovering Block-Structured Process Models from Event Logs - A Constructive Approach
pp. 312
Global Task Data-Dependencies in PGAS Applications
pp. 314
Towards a Set of Capabilities for Orchestrating IT-Outsourcing in the Retained Organizations
pp. 314
Learning to Recognize Daily Actions Using Gaze
pp. 314
Analysis and Solution Model of Distributed Computing in Scientific Calculations
pp. 314
Truthfulness of Candidates in Set of t-uples Expansion
pp. 316
Improving Content-Based Image Retrieval by Identifying Least and Most Correlated Visual Words
pp. 317
Optimizing Cellular Automata through a Meta-model Assisted Memetic Algorithm
pp. 317
Neural Fitted Q Iteration – First Experiences with a Data Efficient Neural Reinforcement Learning Method
pp. 317
Wrangling in the Power of Code Pointers with ProxyCFI
pp. 317
Last Syllable Unit Penalization in Unit Selection TTS
pp. 317
Fast Geodesic Regression for Population-Based Image Analysis
pp. 317
Metadata versus Full-Text: Tracking Users’ Electronic Theses and Dissertations (ETDs) Seeking Behavior
pp. 318
A Symbolic Operational Semantics for TESL
pp. 318
Quaternion Neural Network and Its Application
pp. 320
Focusing and Proof-Nets in Linear and Non-commutative Logic
pp. 323
On the Relative Succinctness of Two Extensions by Definitions of Multimodal Logic
pp. 323
Flush, Gauss, and Reload – A Cache Attack on the BLISS Lattice-Based Signature Scheme
pp. 324
Describing Periodicity in Two-Way Deterministic Finite Automata Using Transformation Semigroups
pp. 326
TER: A System for Robotic Tele-echography
pp. 327
An Experimental Study of Workflow Scheduling Algorithms for Heterogeneous Systems
pp. 327
Boat Speed Monitoring Using Artificial Vision
pp. 329
A Comparison of the Performance of Different Metaheuristics on the Timetabling Problem
pp. 331
Detecting User Occupations on Microblogging Platforms: An Experimental Study
pp. 331
On the Statistical Properties of Syndrome Trellis Coding
pp. 331
Alternative OVA Proposals for Cooperative Competitive RBFN Design in Classification Tasks
pp. 333
Another approach to sequentiality: Kleene's unimonotone functions
pp. 333
The Analysis of Parameters t and k of LPP on Several Famous Face Databases
pp. 334
Real-Time Rendering of Teeth with No Preprocessing
pp. 339
Comparison of Formalisation Approaches of UML Class Constructs in Z and Object-Z
pp. 339
Iterative Constructions and Private Data Release
pp. 339
Surgical Gesture Segmentation and Recognition
pp. 342
New Security Notions and Feasibility Results for Authentication of Quantum Data
pp. 343
Visualization of Changes in Process Dynamics Using Self-Organizing Maps
pp. 343
Design Optimization of Radio Frequency Discrete Tuning Varactors
pp. 343
Practical Tactics for Separation Logic
pp. 343
Co-clustering for Microdata Anonymization
pp. 343
Simplifying, Regularizing and Strengthening Sum-Product Network Structure Learning
pp. 345
HMOS: Her Majesty's Orthography Service
pp. 345
Asymptotically Optimal Hitting Sets Against Polynomials
pp. 346
Workshop AccessibleTV ”Accessible User Interfaces for Future TV Applications”
pp. 346
CacheBleed: A Timing Attack on OpenSSL Constant Time RSA
pp. 348
Frequency Estimation of Internet Packet Streams with Limited Space
pp. 348
A Parallel Solution of Hermitian Toeplitz Linear Systems,
pp. 350
ContextLocNet: Context-Aware Deep Network Models for Weakly Supervised Localization
pp. 351
Value-Based Decision Making: Decision Theory Meets e-Government
pp. 352
SuperParsing: Scalable Nonparametric Image Parsing with Superpixels
pp. 353
Enhancing the OpenDLib Search Service
pp. 355
Linkator: Enriching Web Pages by Automatically Adding Dereferenceable Semantic Annotations
pp. 356
Policy Model for University Digital Collections
pp. 357
Modelling and Verification of Web Services Business Activity Protocol
pp. 357
Succinct Dynamic Dictionaries and Trees
pp. 358
Model Checking Continuous-Time Markov Chains by Transient Analysis
pp. 358
Learning and Intelligent Optimization for Material Design Innovation
pp. 359
Information Artifact Evaluation with TEDSrate
pp. 359
Graphical Password Authentication Using Cued Click Points
pp. 359
Algorithm Diversity for Resilient Systems
pp. 359
An Experimental Comparison of Min-cut/Max-flow Algorithms for Energy Minimization in Vision
pp. 360
Remote User Authentication Using Public Information
pp. 361
Aspect-Oriented Model Development at Different Levels of Abstraction
pp. 361
An Extrinsic Look at the Riemannian Hessian
pp. 362
Referring to Landmark or Street Information in Route Directions: What Difference Does It Make?
pp. 363
A Case-Based Reasoning Approach for Providing Machine Diagnosis from Service Reports
pp. 364
On Discovering Moving Clusters in Spatio-temporal Data
pp. 365
Single Image 3D Interpreter Network
pp. 368
Progress in clasp Series 3
pp. 368
Denotational semantics for timed testing
pp. 368
Intruder or Welcome Friend: Inferring Group Membership in Online Social Networks
pp. 368
Belief Temporal Analysis of Expert Users: Case Study Stack Overflow
pp. 369
Stepping Stones over the Refactoring Rubicon
pp. 370
The Design, Implementation, and Use of the Ngram Statistics Package
pp. 370
Contour Knowledge Transfer for Salient Object Detection
pp. 370
Weakly Supervised Region Proposal Network and Object Detection
pp. 371
A Compressed Sensing Approach for MR Tissue Contrast Synthesis
pp. 372
Social Customer Relationship Management: An Architectural Exploration of the Components
pp. 373
Image Segmentation Fusion Using General Ensemble Clustering Methods
pp. 373
Realtime Classification for Encrypted Traffic
pp. 373
Towards Finger Gestures and Force Recognition Based on Wrist Electromyography and Accelerometers
pp. 374
Priority-Based Human Resource Allocation in Business Processes
pp. 375
Quorum-based secure multi-party computation
pp. 375
Rumor Spreading in Social Networks
pp. 377
The President on Twitter: A Characterization Study of @realDonaldTrump
pp. 378
Alf-Verifier: An Eclipse Plugin for Verifying Alf/UML Executable Models
pp. 378
CBR with Commonsense Reasoning and Structure Mapping: An Application to Mediation
pp. 379
Aggregation and Sparsity Via ℓ1 Penalized Least Squares
pp. 379
Towards a Unified Spatial Crowdsourcing Platform
pp. 380
Systematizing Secure Computation for Research and Decision Support
pp. 380
Numerical Simulation of Radio Frequency Ablation with State Dependent Material Parameters in Three Space Dimensions
pp. 381
Skyline-Based Feature Selection for Polarity Classification in Social Networks
pp. 382
Developing a Robust Part-of-Speech Tagger for Biomedical Text
pp. 382
First-Order Provenance Games
pp. 384
Mobile Interaction: Automatically Adapting Audio Output to Users and Contexts on Communication and Media Control Scenarios
pp. 386
Persistence Diagrams of Cortical Surface Data
pp. 386
Extending Soft Arc Consistency Algorithms to Non-invertible Semirings
pp. 386
Machine Learning for Analyzing Malware
pp. 387
T2: Temporal Property Verification
pp. 387
Estimating Hidden Influences in Metabolic and Gene Regulatory Networks
pp. 387
Stochastic Hybrid Systems: Application to Communication Networks
pp. 388
Using EMV Cards to Protect E-commerce Transactions
pp. 391
Change Detection from Media Sharing Community
pp. 391
Effective Sampling for Mining Association Rules
pp. 392
Programming with Infinitesimals: A While-Language for Hybrid System Modeling
pp. 393
A Unified Framework to Predict Movement
pp. 396
Evaluation of Interconnection Network Performance Under Heavy Non-uniform Loads
pp. 397
Competitive Weighted Matching in Transversal Matroids
pp. 398
Two-Class with Oversampling Versus One-Class Classification for Microarray Datasets
pp. 399
Shaping Future Service Environments with the Cloud and Internet of Things: Networking Challenges and Service Evolution
pp. 399
Leveraging Cloud Heterogeneity for Cost-Efficient Execution of Parallel Applications
pp. 400
Spam 2.0: The Problem Ahead
pp. 400
Fast Case Retrieval Nets for Textual Data
pp. 401
Towards Motion-Robust Magnetic Resonance Thermometry
pp. 403
Civil Unrest Prediction: A Tumblr-Based Exploration
pp. 403
Respondent-Driven Sampling in Online Social Networks
pp. 406
Polar Sine Based Siamese Neural Network for Gesture Recognition
pp. 407
Classification of Intangible Social Innovation Concepts
pp. 408
Improving Retrieval Results with Discipline-Specific Query Expansion
pp. 412
GraphVAE: Towards Generation of Small Graphs Using Variational Autoencoders
pp. 413
Assessment of Airway Remodeling in Asthma: Volumetric Versus Surface Quantification Approaches
pp. 413
Markerless Augmented Reality Using Image Mosaics
pp. 415
Kernel Functions over Orders of Magnitude Spaces by Means of Usual Kernels. Application to Measure Financial Credit Risk
pp. 415
Human Joint Angle Estimation and Gesture Recognition for Assistive Robotic Vision
pp. 415
Day Types Identification of Algerian Electricity Load Using an Image Based Two-Stage Approach
pp. 415
D-FLIP: Dynamic and Flexible Interactive PhotoShow
pp. 416
On narrowing strategies for partial non-strict functions
pp. 421
Using Mind Maps to Model Semistructured Documents
pp. 421
A Performance Analysis of Semantic Caching for Distributed Semi-structured Query Processing
pp. 422
From Tessellations to Table Interpretation
pp. 423
Time Series Case Based Reasoning for Image Categorisation
pp. 424
Privacy Protection in Personalized Web Search: A Peer Group-Based Approach
pp. 427
An Adaptive Framework for RDF Stream Processing
pp. 427
Anonymous Attestation with Subverted TPMs
pp. 427
Detection of Interest Points for Image Indexation
pp. 429
Improving Annotations in Digital Documents
pp. 430
Retracted: How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks
pp. 433
Model-Based Segmentation of Vertebral Bodies from MR Images with 3D CNNs
pp. 434
Dynamic Normal Forms and Dynamic Characteristic Polynomial
pp. 435
A Categorical Semantics of Signal Flow Graphs
pp. 436
Distributed Private-Key Generators for Identity-Based Cryptography
pp. 437
On the Complexity of Computing Probabilistic Bisimilarity
pp. 438
Analysis of the Abortion Rate on Lazy Replication Protocols
pp. 438
A Metaprocesses-Oriented Methodology for Software Assets Reuse in the e-Health Domain
pp. 439
An Information Visualization Approach to Hospital Shifts Scheduling
pp. 439
Twitter Me: Using Micro-blogging to Motivate Teenagers to Exercise
pp. 440
A System for Querying and Displaying Typed Intervals
pp. 441
Measuring User Credibility in Social Media
pp. 442
An overview of evolutionary computation
pp. 442
Privacy Preserving Keyword Searches on Remote Encrypted Data
pp. 446
A New CAD System for the Evaluation of Kidney Diseases Using DCE-MRI
pp. 447
Prom timed to hybrid systems
pp. 450
Exploit Label Embeddings for Enhancing Network Classification
pp. 453
A Tool for Converting from MARC to FRBR
pp. 457
Supporting the Xeon Phi Coprocessor in a Heterogeneous Programming Model
pp. 457
Interactive Catheter Shape Modeling in Interventional Radiology Simulation
pp. 457
A Model for Personalized Learning Through IDTV
pp. 457
Analyzing Graphs with Node Differential Privacy
pp. 458
Automatic Model Selection in Archetype Analysis
pp. 459
An Approximation Algorithm for Binary Searching in Trees
pp. 459
Experiences in Web Site Development with Multidisciplinary Teams. From XML to JST
pp. 460
Calibration and Pose Estimation of a Pox-slits Camera from a Single Image
pp. 460
Graspable Object Classification with Multi-loss Hierarchical Representations
pp. 461
Symbolic Semantics for the Verification of Security Properties of Mobile Petri Nets
pp. 462
Hierarchical Part-Based Detection of 3D Flexible Tubes: Application to CT Colonoscopy
pp. 463
Schild’s Ladder for the Parallel Transport of Deformations in Time Series of Images
pp. 464
Comparing Information Literacy Levels of Canadian and German University Students
pp. 464
A Discrete Wavelet Transform Approach to Fraud Detection
pp. 465
Significance of Interaction Parameter Levels in Interaction Quality Modelling for Human-Human Conversation
pp. 465
Parametric Eyeball Model for Interactive Simulation of Ophthalmologic Surgery
pp. 466
Syntactic Markovian Bisimulation for Chemical Reaction Networks
pp. 467
Data Quality Assurance in International Supply Chains: An Application of the Value Cycle Approach
pp. 468
Using High Resolution Cardiac CT Data to Model and Visualize Patient-Specific Interactions between Trabeculae and Blood Flow
pp. 469
Enhancing OLAP Analysis with Web Cubes
pp. 471
A Provably Secure Additive and Multiplicative Privacy Homomorphism*
pp. 472
Algorithms for 2-Route Cut Problems
pp. 472
Simple Baselines for Human Pose Estimation and Tracking
pp. 472
Multiple Ant Colony System for Substructure Discovery
pp. 473
Toward Optimal Pedagogical Action Patterns by Means of Partially Observable Markov Decision Process
pp. 476
Information Encountering on Social Q&A Sites: A Diary Study of the Process
pp. 477
Design for Smart Driving: A Tale of Two Interfaces
pp. 478
A Method to Minimize Distributed PSO Algorithm Execution Time in Grid Computer Environment
pp. 478
MapFIM: Memory Aware Parallelized Frequent Itemset Mining in Very Large Datasets
pp. 478
An anonymous and undeniable payment scheme
pp. 479
A Two-Phase Local Search for the Biobjective Traveling Salesman Problem
pp. 480
Congestion Game Scheduling Implementation for High-Throughput Virtual Drug Screening Using BOINC-Based Desktop Grid
pp. 480
Rotation-Invariant Restricted Boltzmann Machine Using Shared Gradient Filters
pp. 482
A Study of Abstractive Summarization Using Semantic Representations and Discourse Level Information
pp. 482
Tools for Modeling and Generating Safe Interface Interactions in Web Applications
pp. 483
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
pp. 484
Names Trump Malice: Tiny Mobile Agents Can Tolerate Byzantine Failures
pp. 485
On the Behavior of Indexes for Imprecise Numerical Data and Necessity Measured Queries under Skewed Data Sets
pp. 486
BrainSync: An Orthogonal Transformation for Synchronization of fMRI Data Across Subjects
pp. 487
From Accessibility to Assess-Ability: An Evaluation Heuristic Based on Cognitive Engagement in Search
pp. 488
Using Digital Library Techniques – Registration of Scientific Primary Data
pp. 488
Metric Learning for Large Scale Image Classification: Generalizing to New Classes at Near-Zero Cost
pp. 489
GPU-STREAM v2.0: Benchmarking the Achievable Memory Bandwidth of Many-Core Processors Across Diverse Parallel Programming Models
pp. 490
Sampling Strategies for Bag-of-Features Image Classification
pp. 492
Social Distances Model of Pedestrian Dynamics
pp. 494
Parameterized Single-Exponential Time Polynomial Space Algorithm for Steiner Tree
pp. 494
Non-negative Matrix Factor Deconvolution; Extraction of Multiple Sound Sources from Monophonic Inputs
pp. 495
Supersingular Curves in Cryptography
pp. 496
Multi-armed Bandits with Metric Switching Costs
pp. 497
GPS-Based Curve Estimation for an Adaptive Pure Pursuit Algorithm
pp. 499
Model checking of probabilistic and nondeterministic systems
pp. 500
Interface Design Challenge for Brain-Computer Interaction
pp. 501
Defect Classification on Specular Surfaces Using Wavelets
pp. 501
Pedestrian Recognition with a Learned Metric
pp. 505
Inference and Visualization of Information Flow in the Visual Pathway Using dMRI and EEG
pp. 509
General Automatic Human Shape and Motion Capture Using Volumetric Contour Cues
pp. 510
Minimum Dominating Set Approximation in Graphs of Bounded Arboricity
pp. 513
A syntax for linear logic
pp. 513
Multimodal Tutor for CPR
pp. 513
Automated Interpretation and Integration of Security Tools Using Semantic Knowledge
pp. 513
Exploiting User Model Diversity in Forecast Aggregation
pp. 514
A Fault Tolerant Distributed Routing Algorithm Based on Combinatorial Ant Systems
pp. 515
Evaluating 35 Methods to Generate Structural Connectomes Using Pairwise Classification
pp. 516
Expressiveness of Dynamic Networks of Timed Petri Nets
pp. 518
A Business Intelligence Solution for Monitoring Efficiency of Photovoltaic Power Plants
pp. 520
Data Mining Strategies for CRM Negotiation Prescription Problems
pp. 521
Deep Fusion Net for Multi-atlas Segmentation: Application to Cardiac MR Images
pp. 523
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
pp. 524
Proof and Evaluation of a 1CS Middleware Data Replication Protocol Based on O2PL
pp. 525
Computer Vision Application: Real Time Smart Traffic Light
pp. 525
A Primal Approach to the Stable Set Problem
pp. 528
A Review of Gesture Recognition Based on Computer Vision
pp. 529
Graphical Representation of Defeasible Logic Rules Using Digraphs
pp. 529
When Semi-supervised Learning Meets Ensemble Learning
pp. 529
An Assessment Model for Continuous Security Compliance in Large Scale Agile Environments
pp. 530
A complete axiomatisation for trace congruence of finite state behaviors
pp. 530
DMP Online: A Demonstration of the Digital Curation Centre’s Web-Based Tool for Creating, Maintaining and Exporting Data Management Plans
pp. 530
Learned-Norm Pooling for Deep Feedforward and Recurrent Neural Networks
pp. 533
Use of Hypermedia Tools for End-User Development
pp. 535
An Evolving Type-2 Neural Fuzzy Inference System
pp. 536
Integral Human Pose Regression
pp. 537
Mutual Information for Performance Assessment of Multi Objective Optimisers: Preliminary Results
pp. 538
A Kind of Large-Sized Flapping Wing Robotic Bird: Design and Experiments
pp. 539
Threshold Models for Competitive Influence in Social Networks
pp. 540
Finding Is as Easy as Detecting for Quantum Walks
pp. 543
Connecting First-Order ASP and the Logic FO(ID) through Reducts
pp. 548
Compact Structure-Preserving Signatures with Almost Tight Security
pp. 549
Consistency in Scalable Systems
pp. 550
An Ontology Matching Approach to Semantic Web Services Discovery
pp. 551
CCPI 2010: Workshop on Cloud Computing Projects and Initiatives
pp. 553
Registration of Microscopic Iris Image Sequences Using Probabilistic Mesh
pp. 553
Singing Voice Separation Using RPCA with Weighted $$l_{1}$$ -norm
pp. 555
Collaborative Deep Ranking: A Hybrid Pair-Wise Recommendation Algorithm with Implicit Feedback
pp. 555
Mixed-Criticality Scheduling of Sporadic Task Systems
pp. 555
Computing Surrogate Constraints for Multidimensional Knapsack Problems Using Evolution Strategies
pp. 557
Perceiving Ribs in Single-View Wireframe Sketches of Polyhedral Shapes
pp. 558
A Correlation-Based Approach to Robust Point Set Registration
pp. 558
Evolving Spatiotemporal Coordination in a Modular Robotic System
pp. 560
Predicting Search Performance from Mobile Touch Interactions on Cross-device Search Engine Result Pages
pp. 560
A Complete Year of User Retrieval Sessions in a Social Sciences Academic Search Engine
pp. 561
Color Pattern Recognition on the Random Neural Network Model
pp. 561
Tumor Therapeutic Response and Vessel Tortuosity: Preliminary Report in Metastatic Breast Cancer
pp. 564
Adaptive Learning for String Classification
pp. 564
Accounting for the Confound of Meninges in Segmenting Entorhinal and Perirhinal Cortices in T1-Weighted MRI
pp. 565
Area-Dividing Route Mutation in Moving Target Defense Based on SDN
pp. 565
Efficient Non-blocking Radix Trees
pp. 565
Semi-supervised Learning Using an Unsupervised Atlas
pp. 566
PESSOA: A Tool for Embedded Controller Synthesis
pp. 567
A combinatorial bound for linear programming and related problems
pp. 569
Harvesting the Thermal Cardiac Pulse Signal
pp. 570
EventJava: An Extension of Java for Event Correlation
pp. 579
Do We Really Need to Collect Millions of Faces for Effective Face Recognition?
pp. 581
External Force Detection for Physical Human-Robot Interaction Using Dynamic Model Identification
pp. 581
Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP
pp. 582
Easing Erroneous Translations in Cross-Language Image Retrieval Using Word Associations
pp. 582
Distributed Environmental Monitoring Using Random Sensor Networks
pp. 582
Design of a New Cloud Computing Simulation Platform
pp. 585
Subscriber Profile Extraction and Modification via Diameter Interconnection
pp. 585
On the Cost of Prioritized Atomic Multicast Protocols
pp. 587
A Formal Treatment of Multi-key Channels
pp. 588
Pattern Recognition in a Bucket
pp. 596
Feature Correspondence Via Graph Matching: Models and Global Optimization
pp. 597
Unsupervised Domain Adaptation in Brain Lesion Segmentation with Adversarial Networks
pp. 597
Active Learning with Evolving Streaming Data
pp. 601
Solution of Permutation Problem in Frequency Domain ICA, Using Multivariate Probability Density Functions
pp. 604
Mind Your Right to Know: On De-anonymization Auditability in V2X Communications
pp. 605
Server-Aided Verification: Theory and Practice
pp. 606
On the Identification and Analysis of P2P Traffic Aggregation
pp. 607
Extending Middleware Protocols for Database Replication with Integrity Support
pp. 607
Performance Evaluation of Thread-Level Speculation in Off-the-Shelf Hardware Transactional Memories
pp. 608
Supplier Selection Based on the PROMETHEE VI Multicriteria Method
pp. 609
Distance Oracles for Unweighted Graphs: Breaking the Quadratic Barrier with Constant Additive Error
pp. 610
Optimal Experimental Design in the Modelling of Pattern Formation
pp. 610
A Novel Navigation Algorithm for Locomotion Interfaces with Programmable Platforms
pp. 614
The Development of a Haptic Robot to Take Blood Samples from the Forearm
pp. 615
A GPU-Based Implementation for Range Queries on Spaghettis Data Structure
pp. 615
Using Citizen Science Projects to Develop Cases for Teaching Digital Curation
pp. 619
Ratcheted Encryption and Key Exchange: The Security of Messaging
pp. 620
Detecting Overlapping Communities in Social Networks by Game Theory and Structural Equivalence Concept
pp. 621
Computer Aided Diagnosis for Virtual Colonography
pp. 627
Towards Expressive Publish/Subscribe Systems
pp. 629
Neighborhood Matching for Curved Domains with Application to Denoising in Diffusion MRI
pp. 630
Implementing Automatic Error Recovery Support for Rich Web Clients
pp. 635
Making Action Recognition Robust to Occlusions and Viewpoint Changes
pp. 635
Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds
pp. 635
Automated Statistical Approach for Memory Leak Detection: Case Studies
pp. 637
Space Robotic De-Tumbling of Large Target with Eddy Current Brake in Hand
pp. 642
Topology Prediction of α-Helical and β-Barrel Transmembrane Proteins Using RBF Networks
pp. 643
Towards Dependably Detecting Geolocation of Cloud Servers
pp. 645
Uncovering Hidden Insights for Information Management: Examination and Modeling of Change in Digital Collection Metadata
pp. 646
Requirements Engineering with ORM
pp. 647
A Bag-of-Features Approach to Predicting TMS Language Mapping Results from DSI Tractography
pp. 648
Vocabulary Reduction in BoW Representing by Topic Modeling
pp. 648
Approximate Dynamic Programming for Relay Deployment in Multi-robot System
pp. 650
Error Concealment by Means of Motion Refinement and Regularized Bregman Divergence
pp. 653
Carving: Scalable Interactive Segmentation of Neural Volume Electron Microscopy Images
pp. 655
Classification-Driven Pathological Neuroimage Retrieval Using Statistical Asymmetry Measures
pp. 655
Diversifying the Next Generation of Information Scientists: Six Years of Implementation and Outcomes for a Year-Long REU Program
pp. 657
Automatic Extraction and Learning of Keyphrases from Scientific Articles
pp. 658
Applying Constraint Satisfaction Techniques to 3D Camera Control
pp. 659
A Constraint Mining Approach to Support Monitoring Cyber-Physical Systems
pp. 670
Ray-Tracing Based Registration for HRCT Images of the Lungs
pp. 670
Constraints from STRIPS — Preliminary Report
pp. 673
Adaptive Immunization in Dynamic Networks
pp. 675
Behavior-Derived Variability Analysis: Mining Views for Comparison and Evaluation
pp. 675
Technologies for Augmented Reality: Calibration for Real-Time Superimposition on Rigid and Simple-Deformable Real Objects
pp. 677
Recognition and Quantification of Area Damaged by Oligonychus Perseae in Avocado Leaves
pp. 682
A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing
pp. 682
Increasing Availability in a Replicated Partitionable Distributed Object System
pp. 691
A System to Support Laparoscopic Surgery by Augmented Reality Visualization
pp. 691
Automatic Generation of Aesthetic Patterns with the Use of Dynamical Systems
pp. 699
Blood Pool Agent CE-MRA: Improved Arterial Visualization of the Aortoiliac Vasculature in the Steady-State Using First-Pass Data
pp. 701
Boundary Patrolling by Mobile Agents with Distinct Maximal Speeds
pp. 707
Suffix Vector: A Space-Efficient Suffix Tree Representation
pp. 708
Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security
pp. 710
Automatic Point Landmark Matching for Regularizing Nonlinear Intensity Registration: Application to Thoracic CT Images
pp. 713
Randomized Local Search, Evolutionary Algorithms, and the Minimum Spanning Tree Problem
pp. 725
Automatic 3D Registration of Lung Surfaces in Computed Tomography Scans
pp. 729
Unsupervised Learning for Fast Probabilistic Diffeomorphic Registration
pp. 730
Longer-Term Memory in Clause Weighting Local Search for SAT
pp. 730
Improving Semantic Embedding Consistency by Metric Learning for Zero-Shot Classiffication
pp. 737
Deep Convolutional Neural Networks for Breast Cancer Histology Image Analysis
pp. 740
Software Support for User Interface Description Language
pp. 743
Fusion of Histological Sections and MR Images: Towards the Construction of an Atlas of the Human Basal Ganglia
pp. 745
Pitch Angle Active Disturbance Rejection Control with Model Compensation for Underwater Glider
pp. 752
Improving Image-Based Localization by Active Correspondence Search
pp. 755
Unbiased Shape Compactness for Segmentation
pp. 760
Tight Lower Bounds for Multi-pass Stream Computation Via Pass Elimination
pp. 762
A Stochastic Iterative Closest Point Algorithm (stochastICP)
pp. 764
From Face Recognition to Models of Identity: A Bayesian Approach to Learning About Unknown Identities from Unsupervised Data
pp. 777
Experimental Research of Loading Effect on a 3-DOF Macro-Micro Precision Positioning System
pp. 778
3D Freehand Echocardiography for Automatic Left Ventricle Reconstruction and Analysis Based on Multiple Acoustic Windows
pp. 784
Multiobjective Optimization on a Limited Budget of Evaluations Using Model-Assisted $\mathcal{S}$ -Metric Selection
pp. 786
A Little Semantic Web Goes a Long Way in Biology
pp. 789
Proofs of Work From Worst-Case Assumptions
pp. 790
Multilevel Segmentation and Integrated Bayesian Model Classification with an Application to Brain Tumor Segmentation
pp. 795
A Power Benchmarking Framework for Network Devices
pp. 796
Visualization and Data Mining of Pareto Solutions Using Self-Organizing Map
pp. 799
A New Adaptive Probabilistic Model of Blood Vessels for Segmenting MRA Images
pp. 799
Multivariate Scale Mixture of Gaussians Modeling
pp. 800
Interactive Learning of Data Structures and Algorithmic Schemes
pp. 801
A Hierarchical CLH Queue Lock
pp. 801
Simulation for Path Planning of OUC-II Glider with Intelligence Algorithm
pp. 802
Improving the Agility of Keyframe-Based SLAM
pp. 808
Numerical Simulation of Forming Process Conditions and Wall Thickness for Balloon
pp. 808
Uniform Budgets and the Envy-Free Pricing Problem
pp. 811
Maximum Likelihood Estimation of the Bias Field in MR Brain Images: Investigating Different Modelings of the Imaging Process
pp. 813
The Use of Unwrapped Phase in MR Image Segmentation : A Preliminary Study
pp. 829
Statistical and Deformable Model Approaches to the Segmentation of MR Imagery and Volume Estimation of Stroke Lesions
pp. 831
Analysis of Source Sparsity and Recoverability for SCA Based Blind Source Separation
pp. 832
Multilevel System as Multigraph
pp. 833
Truthful Unification Framework for Packing Integer Programs with Choices
pp. 839
Validation of Image Segmentation by Estimating Rater Bias and Variance
pp. 845
A Novel Measure of Fractional Anisotropy Based on the Tensor Distribution Function
pp. 848
A General Framework for Image Segmentation Using Ordered Spatial Dependency
pp. 864
Modeling of Intensity Priors for Knowledge-Based Level Set Algorithm in Calvarial Tumors Segmentation
pp. 865
Evolving Aggregation Behaviors in a Swarm of Robots
pp. 868
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
pp. 869
Optimal Quantum Adversary Lower Bounds for Ordered Search
pp. 880
Analysis of Skeletal Microstructure with Clinical Multislice CT
pp. 881
Quantum SAT for a Qutrit-Cinquit Pair Is QMA 1-Complete
pp. 888
An Energy Minimization Approach to the Data Driven Editing of Presegmented Images/Volumes
pp. 896
Accurate Banded Graph Cut Segmentation of Thin Structures Using Laplacian Pyramids
pp. 898
Using Loops in Genetic Programming for a Two Class Binary Image Classification Problem
pp. 899
Assessing skill and learning in surgeons and medical students using a force feedback surgical simulator
pp. 914
A Performance Evaluation of g-Bound with a Consistency Protocol Supporting Multiple Isolation Levels
pp. 937
A Fast Visual Search and Recognition Mechanism for Real-Time Robotics Applications
pp. 943
Adaptive Object Recognition with Image Feature Interpolation
pp. 964
Multi-modal Image Registration Using the Generalized Survival Exponential Entropy
pp. 973
A Novel Statistical Method on Decision Table Analysis
pp. 997
TBNA-protocols Guiding TransBronchial Needle Aspirations Without a Computer in the Operating Room
pp. 1003
An Efficient Parallel Algorithm for Graph-Based Image Segmentation
pp. 1007
3D Reconstruction of the Human Jaw: A New Approach and Improvements
pp. 1011
A Symbolic Hybrid Approach to Face the New User Problem in Recommender Systems
pp. 1024
Using UML Packages for Designing Secure Data Warehouses
pp. 1036
Building a More Accurate Classifier Based on Strong Frequent Patterns
pp. 1043
Color Texture Analysis Using Wavelet-Based Hidden Markov Model
pp. 1054
An Arbitrated Quantum Message Signature Scheme
pp. 1060
Brain Fiber Architecture, Genetics, and Intelligence: A High Angular Resolution Diffusion Imaging (HARDI) Study
pp. 1091
Constructing Patient Specific Models for Correcting Intraoperative Brain Deformation
pp. 1095
On Enhancing the Performance of Spam Mail Filtering System Using Semantic Enrichment
pp. 1101
Parameterising Bayesian Networks
pp. 1130
Performance and Robustness of Automatic Fluoroscopic Image Calibration in a New Computer Assisted Surgery System
pp. 1140
An Autonomous Surveillance Vehicle for People Tracking
pp. 1141
An Intelligent Grading System for Descriptive Examination Papers Based on Probabilistic Latent Semantic Analysis
pp. 1156
Ubiquitous Systems and Petri Nets
pp. 1164
A Pulsating Coronary Vessel Phantom for Two- and Three-Dimensional Intravascular Ultrasound Studies
pp. 1170
Automatic Modeling of Anatomical Structures for Biomechanical Analysis and Visualization in a Virtual Spine Workstation
pp. 1180
A Multi-modal Approach to Segmentation of Tubular Structures
pp. 1187
Inheritance of Multiple Identity Conditions in Order-Sorted Logic
pp. 1187
Segmentation of Chemical Shift Images with Mixture Modeling
pp. 1191
3D Markov Random Fields and Region Growing for Interactive Segmentation of MR Data
pp. 1195
Augmented Reality in the Operating Theatre of the Future
pp. 1199
The Evaluation of the Color Blending Function for the Texture Generation from Photographs
pp. 1206
An Intelligent Gas Concentration Estimation System Using Neural Network Implemented Microcontroller
pp. 1210
PET Studies of the Effects of ECT on Cerebral Physiology
pp. 1228
Automatic Detection of Myocardial Boundaries in MR Cardio Perfusion Images
pp. 1243
Trans-urethral Ultrasound: A New Tool for Diagnostic and Therapeutic Imaging in Prostate Cancer
pp. 1245
Resection of Recurrent Carcinomas in the Pelvis - A New Field of Computer Aided Surgery
pp. 1265
3-D Reconstruction and Functional Analysis of the Temporomandibular Joint
pp. 1271
Non-linear Soft Tissue Deformations for the Simulation of Percutaneous Surgeries
pp. 1291
Clinical MRI Based Volumetry: The Cerebral Ventricles
pp. 1306
Development of Semi-autonomous Control Modes in Laparoscopic Surgery Using Automatic Visual Servoing
pp. 1310
A New Diagnostic Method for Alzheimer’s Disease Using Pupillary Light Reflex
pp. 1323
New Tools for Visualization and Quantification in Dynamic Processes: Application to the Nuclear Envelope Dynamics During Mitosis
pp. 1326
Full 3D Rigid Body Automatic Motion Correction of MRI Images
pp. 1336
JULIUS — An Extendable Software Framework for Surgical Planning and Image-Guided Navigation
pp. 1338
A Statistical Model of Respiratory Motion and Deformation of the Liver
pp. 1345
Simulated Animal Dissection
pp. 1369
Morphogenesis-Based Deformable Models Application to 3D Medical Image Segmentation and Analysis
pp. 1388
CAD System for the Assistance of Comparative Reading for Lung Cancer Using Serial Helical CT Images
pp. 1393
Computer-Aided Diagnosis of Pulmonary Nodules Using Three-Dimensional Thoracic CT Images
pp. 1398
Multiresolution Signal Processing on Meshes for Automatic Pathological Shape Characterization
pp. 1404
Tracking Methods for Medical Augmented Reality
pp. 1415
Java Internet Viewer: A WWW Tool for Remote 3D Medical Image Data Visualization and Comparison
pp. 1433
A Mechatronic System for the Implantation of the Acetabular Component in Total Hip Alloarthroplasty
Similar content
2,191
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs
Authors:
Adam Smith
,
Craig Gentry
,
Jens Groth
…
Johnson homomorphisms and actions of higher-rank lattices on right-angled Artin groups
Authors:
Richard Wade
Do homomorphic and heteromorphic self-incompatibility systems have the same sporophytic mechanism?
Authors:
Peter E. M. Gibbs
See all similar
Cited by
98
Homomorphic Encryption for Arithmetic of Approximate Numbers
Authors:
Jung Cheon
,
Andrey Kim
,
Miran Kim
…
Fully homomorphic SIMD operations
Authors:
N. Smart
,
F Vercauteren
Fully Homomorphic Encryption with Polylog Overhead
Authors:
Craig Gentry
,
Shai Halevi
,
Nigel Smart
See all cited by