Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
16
views
26
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,562
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Frontiers of Combining Systems
Evolution, Adaptation, and the Quest for Incrementality
other
Author(s):
Carlo Ghezzi
Publication date
(Print):
2012
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Crocodylian evolution
Most cited references
26
Record
: found
Abstract
: not found
Article
: not found
Model-checking algorithms for continuous-time markov chains
Paul Baier
,
Elizabeth B Haverkort
,
H Hermanns
…
(2003)
0
comments
Cited
93
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Programs, life cycles, and laws of software evolution
M.M. Lehman
(1980)
0
comments
Cited
72
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Tentative steps toward a development method for interfering programs
C Jones
(1983)
0
comments
Cited
71
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2012
Pages
: 369-379
DOI:
10.1007/978-3-642-34059-8_19
SO-VID:
a2354f85-4603-43ab-9091-be3a674225ff
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
On general solution of equations in a free semigroup
pp. 1
Cryptanalysis of Reduced-Round MIBS Block Cipher
pp. 1
Finite Element Approximation with Hierarchical B-Splines
pp. 1
Alignment of Biomedical Ontologies Using Life Science Literature
pp. 1
Rough Sets and Flow Graphs
pp. 1
A Scalable MPI_Comm_split Algorithm for Exascale Computing
pp. 1
The Periodic Table of Elements via an XNA-Powered Serious Game
pp. 1
Function-Based Single and Dual Point Haptic Interaction in Cyberworlds
pp. 1
Multimodal Human Machine Interactions in Virtual and Augmented Reality
pp. 1
Viewpoints on Emergent Semantics
pp. 1
Interactive Proofs for Quantum Computation
pp. 1
Theory of L systems: From the point of view of formal language theory
pp. 1
Web Intelligence (WI) Research Challenges and Trends in the New Information Age
pp. 1
SCOOP: Solving Combinatorial Optimization problems in parallel
pp. 1
Forward Secure Ring Signature without Random Oracles
pp. 1
Constructions of Free Commutative Integro-Differential Algebras
pp. 1
The Potential of 3D Internet in the Cultural Heritage Domain
pp. 1
On the Minimal Assumptions of Group Signature Schemes
pp. 1
High Level System Design and Analysis Using Abstract State Machines
pp. 1
Online Coloring of Intervals with Bandwidth
pp. 1
Integrity and Consistency for Untrusted Services
pp. 1
A Hybrid Bin-Packing Heuristic to Multiprocessor Scheduling
pp. 1
Application of linear utility theory to belief functions
pp. 1
Reversible Data Hiding
pp. 1
A Holistic, Interdisciplinary Decision Support System for Sustainable Smart City Design
pp. 3
Secure and Trusted Application Execution on Embedded Devices
pp. 3
Scanpath Prediction Based on High-Level Features and Memory Bias
pp. 3
A Logical Analysis of Framing for Specifications with Pure Method Calls
pp. 3
Social Intelligence Design — An Overview
pp. 3
Desktop PC, Tablet PC, or Smartphone? An Analysis of Use Preferences in Daily Activities for Different Technology Generations of a Worldwide Sample
pp. 3
Relevance of Named Entities in Authorship Attribution
pp. 3
The Linguistic Basis of a Rule-Based Tagger of Czech
pp. 3
Content-Based Quality Estimation for Automatic Subject Indexing of Short Texts Under Precision and Recall Constraints
pp. 3
Design and Evaluation of a Workload-Adaptive Associate System for Cockpit Crews
pp. 11
Portable Compilers for OpenMP
pp. 11
Applying Case Based Reasoning Approach in Analyzing Organizational Change Management Data
pp. 15
The Language, the Expression, and the (Small) Automaton
pp. 15
What Is End-User Software Engineering and Why Does It Matter?
pp. 15
A Probabilistic Interpretation of PID Controllers Using Active Inference
pp. 15
Get Realistic! - UCD Course Design and Evaluation
pp. 15
Edge Width Estimation for Defocus Map from a Single Image
pp. 15
A terminological interpretation of (abductive) logic programming
pp. 16
Human Classification Using Gait Features
pp. 16
Introduction to Secure Computation
pp. 17
Averaging Three-Dimensional Time-Varying Sequences of Rotations: Application to Preprocessing of Motion Capture Data
pp. 17
Extreme Learning Machine: A Robust Modeling Technique? Yes!
pp. 18
STH-Bass: A Spatial-Temporal Heterogeneous Bass Model to Predict Single-Tweet Popularity
pp. 18
MC-RAIS: Multi-chunk Redundant Array of Independent SSDs with Improved Performance
pp. 19
The Intentional Attunement Hypothesis The Mirror Neuron System and Its Role in Interpersonal Relations
pp. 2
Managing Trust in Peer-to-Peer Systems Using Reputation-Based Techniques
pp. 2
On Efficient Gossiping in Radio Networks
pp. 20
Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds
pp. 20
Proxy Re-encryption with Unforgeable Re-encryption Keys
pp. 24
Optimal μ-Distributions for the Hypervolume Indicator for Problems with Linear Bi-objective Fronts: Exact and Exhaustive Results
pp. 4
Using an Adaptive Memory Strategy to Improve a Multistart Heuristic for Sequencing by Hybridization
pp. 5
A Light but Formal Introduction to XQuery
pp. 54
Managing Uncertainty and Vagueness in Description Logics, Logic Programs and Description Logic Programs
pp. 7
An Attacker-Defender Game for Honeynets
pp. 7
The Space of Cognitive Vision
pp. 82
Algorithms in modern mathematics and computer science
pp. 9
Genericity in graphics recognition algorithms
pp. 9
CLEF 2002 — Overview of Results
pp. 9
A Computational Model That Enables Global Amodal Completion Based on V4 Neurons
pp. 15
On the number of simple cycles in planar graphs
pp. 16
Multi-lingual Detection of Terrorist Content on the Web
pp. 17
Acoustic Modeling with Deep Belief Networks for Russian Speech Recognition
pp. 20
Using Types and Inheritance in Object-Oriented Languages
pp. 24
Multi-atlas-Based Segmentation of the Left Atrium and Pulmonary Veins
pp. 24
Variable-length maximal codes
pp. 26
A Middleware Architecture for Safety Critical Ambient Intelligence Applications
pp. 29
Efficient Algorithms for a Graph Partitioning Problem
pp. 29
Semantic Explanations in Ensemble Learning
pp. 30
Lifted Junction Tree Algorithm
pp. 31
Node Labels in Local Decision
pp. 32
Design for open systems in Java
pp. 32
Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers
pp. 33
Solving Combinatorial Problems with Regular Local Search Algorithms
pp. 33
The Design of the Estonian Governmental Document Exchange Classification Framework
pp. 4
StarDBT: An Efficient Multi-platform Dynamic Binary Translation System
pp. 42
Consistent Query Answers in Virtual Data Integration Systems
pp. 5
Approximation Algorithms for 2-Stage Stochastic Optimization Problems
pp. 6
Implementations of Square-Root and Exponential Functions for Large FPGAs
pp. 62
Model Driven Engineering with Ontology Technologies
pp. 116
Service Oriented Architecture: Overview and Directions
pp. 20
Mizar
pp. 30
Simulated Annealing for Multi-agent Coalition Formation
pp. 31
Model Based HMI Specification in an Automotive Context
pp. 31
Integrating Feature Selection into Program Learning
pp. 33
DNA Computing in Microreactors
pp. 36
The Persistent Morse Complex Segmentation of a 3-Manifold
pp. 36
Use and Reuse of Legal Ontologies in Knowledge Engineering and Information Management
pp. 38
Using a Theorem Prover for Reasoning on Constraint Problems
pp. 39
An Improved Integrality Gap for the Călinescu-Karloff-Rabani Relaxation for Multiway Cut
pp. 41
Moving towards Adaptive Search in Digital Libraries
pp. 43
Random Early Marking
pp. 44
Migratable User Interface Descriptions in Component-Based Development
pp. 44
Learning to Generate CGs from Domain Specific Sentences
pp. 45
ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones
pp. 46
On Consistency of Finite Difference Approximations to the Navier-Stokes Equations
pp. 47
The LuminUs: Providing Musicians with Visual Feedback on the Gaze and Body Motion of Their Co-performers
pp. 47
Automatic Evaluation of FHR Recordings from CTU-UHB CTG Database
pp. 49
Tools of the Trade: A Survey of Technologies in End-User Development Literature
pp. 51
Translating Formal Software Specifications to Natural Language
pp. 52
A Generative Approach for Multi-agent System Development
pp. 60
Exception Safety: Concepts and Techniques
pp. 111
How to Cook a Complete Hoare Logic for Your Pet OO Language
pp. 17
A service-oriented negotiation model between autonomous agents
pp. 36
User Behavior Modeling in a Cellular Network Using Latent Dirichlet Allocation
pp. 42
Toward an Automatic Left Atrium Localization Based on Shape Descriptors and Prior Knowledge
pp. 42
Identity Based DRM: Personal Entertainment Domain
pp. 48
3D Probabilistic Segmentation and Volumetry from 2D Projection Images
pp. 48
Fitness Inheritance in the Bayesian Optimization Algorithm
pp. 49
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption
pp. 57
Anonymization in the Time of Big Data
pp. 57
Sonia: An adaptation of Linda for coordination of activities in organizations
pp. 6
MPI and Hybrid Programming Models for Petascale Computing
pp. 60
Unrestricted State Complexity of Binary Operations on Regular Languages
pp. 62
Formalizing and Implementing Types in MSVL
pp. 63
How Firms Adapt and Interact in Open Source Ecosystems: Analyzing Stakeholder Influence and Collaboration Patterns
pp. 64
Analyzing Component-Based Systems on the Basis of Architectural Constraints
pp. 68
On Classical Nonassociative Lambek Calculus
pp. 72
A Scalable Segmented Decision Tree Abstract Domain
pp. 72
Automating Derivations of Abstract Machines from Reduction Semantics:
pp. 77
Separating the specification and implementation phases in cryptology
pp. 85
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer
pp. 102
On the semantics of rule-based expert systems with uncertainty
pp. 143
A New Formal Definition of Polish Nominal Phrases
pp. 33
Perspectives of Dynamic Complexity
pp. 43
Achieving ISO 9001 Certification for an XP Company
pp. 47
The Influence of Team-Member Exchange on Self-reported Creativity in the Korean Information and Communication Technology (ICT) Industry
pp. 48
Deep Neural Network or Dermatologist?
pp. 49
Spatial Subgroup Discovery Applied to the Analysis of Vegetation Data
pp. 51
Graph Searching with Advice
pp. 51
Correlated Set Coordination in Fault Tolerant Message Logging Protocols
pp. 51
Distributed Genetic Algorithms on Portable Devices for Smart Cities
pp. 54
Linear Time Suffix Array Construction Using D-Critical Substrings
pp. 54
Choosing Parameters for Random Subspace Ensembles for fMRI Classification
pp. 54
Combined Selection of COTS Components
pp. 59
Biasing Monte-Carlo Simulations through RAVE Values
pp. 60
Remarks on Sublanguages Consisting of Primitive Words of Slender Regular and Context-Free Languages
pp. 61
Programming irregular parallel applications in Cilk
pp. 64
Optimizing Verification of Structurally Evolving Algebraic Petri Nets
pp. 66
Ranking and Sparsifying a Connection Graph
pp. 68
On τ-, μ-, π-, and ε-Contracting
pp. 74
The Straight-Line RAC Drawing Problem Is NP-Hard
pp. 74
Use of a Levy Distribution for Modeling Best Case Execution Time Variation
pp. 79
Unsupervised Feature Selection for Noisy Data
pp. 99
Finite Fuzzy Description Logics and Crisp Representations
pp. 100
Aggregating Trust Using Triangular Norms in the KeyNote Trust Management System
pp. 101
Interview Review: An Empirical Study on Detecting Ambiguities in Requirements Elicitation Interviews
pp. 103
Handwritten Address Recognition Using Hidden Markov Models
pp. 109
Engineering Organization-Based Multiagent Systems
pp. 112
Running Time Analysis of a Multiobjective Evolutionary Algorithm on Simple and Hard Problems
pp. 137
Automating Verification of State Machines with Reactive Designs and Isabelle/UTP
pp. 146
Genetic Algorithms in Machine Learning
pp. 19
Mechanisms of Question Intonation in Mandarin
pp. 27
Argumentation Semantics for Defeasible Logics
pp. 55
Power Indices in Spanning Connectivity Games
pp. 61
The Effect of Tangible Artifacts, Gender and Subjective Technical Competence on Teaching Programming to Seventh Graders
pp. 64
Temporalizing Spatial Calculi: On Generalized Neighborhood Graphs
pp. 64
Mobile Internet in Stereo: An End-to-End Scenario
pp. 67
Software Architecture-Based Adaptation for Pervasive Systems
pp. 69
A Review of Image Recognition with Deep Convolutional Neural Network
pp. 83
Aspects of Reversibility for Classical Automata
pp. 85
Improved Brain Segmentation Using Pixel Separation and Additional Segmentation Features
pp. 89
Efficient Preprocessing Methods for Quantifier Elimination
pp. 89
On Maximum Differential Probability of Generalized Feistel
pp. 89
On the Predictive Properties of Performance Models Derived through Input-Output Relationships
pp. 90
Designing Multi-agent Systems around an Extensible Communication Abstraction
pp. 92
A Framework for Building OLAP Cubes on Graphs
pp. 95
Protecting Data Privacy in Federated Learning Combining Differential Privacy and Weak Encryption
pp. 96
Dynamic Is − a Hierarchy Generation System Based on User’s Viewpoint
pp. 98
Aspects of Composition in the Reflex AOP Kernel
pp. 100
Reinforcement Learning as a Means of Dynamic Aggregate QoS Provisioning
pp. 104
Unlocking Keys for XML Trees
pp. 105
Handling Differential Equations with Constraints for Decision Support
pp. 105
Pattern-Based Ontology Transformation Service Exploiting OPPL and OWL-API
pp. 107
Towards a compositional method for coordinating Gamma programs
pp. 107
Bi-Abduction with Pure Properties for Specification Inference
pp. 108
Towards Mapping Analysis in Ontology-Based Data Access
pp. 113
Parameter Curation for Benchmark Queries
pp. 125
Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations
pp. 134
Analysis of Inverse Snyder Optimizations
pp. 152
Cognitive Artifacts in Complex Work
pp. 166
Activities and Technologies in Digital City Kyoto
pp. 237
Security and Trust Requirements Engineering
pp. 52
Learning Model Trees from Data Streams
pp. 60
IPML: Extending SMIL for Distributed Multimedia Presentations
pp. 62
Emotion Judgment Based on Relationship between Speaker and Sentential Actor
pp. 71
Competitive analysis of the Round Robin algorithm
pp. 78
A High-Availability Bebras Competition System
pp. 78
Fast Ejection Chain Algorithms for Vehicle Routing with Time Windows
pp. 79
Extending the Translation from SDL to Promela
pp. 82
AudioRadar: A Metaphorical Visualization for the Navigation of Large Music Collections
pp. 86
Space-Optimal Rendezvous of Mobile Agents in Asynchronous Trees
pp. 87
Point estimation using the Kullback-Leibler loss function and MML
pp. 87
A Cyber-Physical System for Distributed Real-Time Control of Urban Drainage Networks in Smart Cities
pp. 102
Promoting Computational Thinking Skills: Would You Use this Bebras Task?
pp. 110
Transaction Performance vs. Moore’s Law: A Trend Analysis
pp. 118
Conformance Tests as Checking Experiments for Partial Nondeterministic FSM
pp. 121
Coinductive Unwinding of Security-Relevant Hyperproperties
pp. 122
Publish/Subscribe Tree Construction in Wireless Ad-Hoc Networks
pp. 123
Using an explicit model of teamwork in RoboCup
pp. 125
Redescription Mining with Multi-target Predictive Clustering Trees
pp. 129
Linking Unlinkability
pp. 130
AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash
pp. 131
A Markovian Agent Model for Fire Propagation in Outdoor Environments
pp. 137
Implementing Product-Line Features with Component Reuse
pp. 139
Ontological Reengineering for Reuse
pp. 153
Improved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48
pp. 161
An Operational Semantics of BPMN Collaboration
pp. 172
Private Database Access with HE-over-ORAM Architecture
pp. 175
Where Snow is a Landmark: Route Direction Elements in Alpine Contexts
pp. 188
Unifying Theories in Isabelle/HOL
pp. 188
World Digital Cities: Beyond Heterogeneity
pp. 222
Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for \({\varSigma }\)-Protocols
pp. 48
Adding the Emotional Dimension to Scripting Character Dialogues
pp. 86
Logistics Support Approach for Drone Delivery Fleet
pp. 93
Using Real-Time Road Traffic Data to Evaluate Congestion
pp. 98
Multimodal Neural Networks: RGB-D for Semantic Segmentation and Object Detection
pp. 105
Multimedia synchronization and UNIX
pp. 107
Cloud-Based Wheelchair Assist System for Mobility Impaired Individuals
pp. 113
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks
pp. 116
Growing into Agility: Process Implementation Paths for Scrum
pp. 124
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE
pp. 130
Experiments with WRF on Intel® Many Integrated Core (Intel MIC) Architecture
pp. 137
Syndrome Based Collision Resistant Hashing
pp. 139
Formal Analysis and Verification of Self-Healing Systems
pp. 153
An SQL-Based Query Language and Engine for Graph Pattern Matching
pp. 156
Prêt à Voter Providing Everlasting Privacy
pp. 173
Translating TROLL light concepts to Maude
pp. 80
Clustering with Swarm Algorithms Compared to Emergent SOM
pp. 81
The computation of Gröbner bases on a shared memory multiprocessor
pp. 87
StepByStep: Design of an Interactive Pictorial Activity Game for Teaching Generalization Skills to Children with Autism
pp. 90
Exact Algorithms and Approximation Schemes for Base Station Placement Problems
pp. 103
Using CSP||B Components: Application to a Platoon of Vehicles
pp. 106
A Very Small Bytecode-Verifier Based on PCC Algorithm for Smart Card
pp. 107
Predicting Car Park Occupancy Rates in Smart Cities
pp. 110
Speeding Up Inference in Statistical Relational Learning by Clustering Similar Query Literals
pp. 110
Improving Multi-agent Based Scheduling by Neurodynamic Programming
pp. 112
Towards Facial Gestures Generation by Speech Signal Analysis Using HUGE Architecture
pp. 122
Ordered paramodulation and resolution as decision procedure
pp. 130
Mobile Activity Recognition Using Ubiquitous Data Stream Mining
pp. 131
Computing a Minimum-Width Square Annulus in Arbitrary Orientation
pp. 131
L-ToPSS – Push-Oriented Location-Based Services
pp. 133
End-to-End Encryption Schemes for Online Social Networks
pp. 133
First-Order Logic Formalisation of Arrow’s Theorem
pp. 135
UT Austin Villa RoboCup 3D Simulation Base Code Release
pp. 137
LECTOR: Towards Reengaging Students in the Educational Process Inside Smart Classrooms
pp. 137
Organised Crime and Social Media: Detecting and Corroborating Weak Signals of Human Trafficking Online
pp. 138
Hypergesture Homology for Performance Stemmata with Lie Operators
pp. 142
Composing RESTful Services with JOpera
pp. 143
An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm
pp. 144
Probabilistic Timed Automata with Clock-Dependent Probabilities
pp. 147
Vacuity Checking in the Modal Mu-Calculus*
pp. 150
A Decision-Making Approach for Improving Organizations’ Cloud Forensic Readiness
pp. 151
AESOP: Altruism-Endowed Self-organizing Peers
pp. 155
How Case-Based Reasoning Explains Neural Networks: A Theoretical Analysis of XAI Using Post-Hoc Explanation-by-Example from a Survey of ANN-CBR Twin-Systems
pp. 162
Programming for Locality and Parallelism with Hierarchically Tiled Arrays
pp. 173
Integration of Extra-Functional Properties in Component Models
pp. 174
Cutting plane versus frege proof systems
pp. 191
Linking Geosensor Network Data and Ontologies to Support Transportation Modeling
pp. 204
Side-Channel Attacks on the Yubikey 2 One-Time Password Generator
pp. 68
Biologically motivated approach to face recognition
pp. 132
Deep Learning Using EEG Data in Time and Frequency Domains for Sleep Stage Classification
pp. 146
The syntactic inference problem for dol-sequences
pp. 146
Prediction of User Retweets Based on Social Neighborhood Information and Topic Modelling
pp. 152
Approximation Algorithms for Semidefinite Packing Problems with Applications to Maxcut and Graph Coloring
pp. 158
Relative Trustworthiness
pp. 171
The Coq Library as a Theory Graph
pp. 174
Secure and Anonymous Hybrid Encryption from Coding Theory
pp. 175
Extended Private Information Retrieval and Its Application in Biometrics Authentications
pp. 184
Union Types for Semistructured Data
pp. 185
A Methodology to Create Legal Ontologies in a Logic Programming Information Retrieval System
pp. 196
Embedding Online Runtime Verification for Fault Disambiguation on Robonaut2
pp. 255
A procedure for automatically proving the termination of a set of rewrite rules
pp. 348
Public-Key Encryption Resistant to Parameter Subversion and Its Realization from Efficiently-Embeddable Groups
pp. 405
An actor-based metalevel architecture for group-wide reflection
pp. 91
Sibling Page Search by Page Examples
pp. 104
Mining the Structure and Evolution of the Airport Network of China over the Past Twenty Years
pp. 119
Contact Area Determination between a N95 Filtering Facepiece Respirator and a Headform
pp. 124
A Faster Algorithm for Computing Maximal \(\alpha \)-gapped Repeats in a String
pp. 128
Narrowing the Gap Between Humans and Agents in e-Commerce: 3D Electronic Institutions
pp. 142
A Hybrid GRASP-Path Relinking Algorithm for the Capacitated p – hub Median Problem
pp. 145
Image Restoration with Fuzzy Coefficient Driven Anisotropic Diffusion
pp. 152
Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity
pp. 170
Sorting Genomes with Insertions, Deletions and Duplications by DCJ
pp. 171
Residual Finite Tree Automata
pp. 174
Tolerating transient and permanent failures (extended abstract)
pp. 180
ISOGA: A System for Geographical Reachability Analysis
pp. 182
Towards Secure and Practical MACs for Body Sensor Networks
pp. 185
Controlled redundancy in incremental rule learning
pp. 186
Sparse Feature Maps in a Scale Hierarchy
pp. 209
TKG: Efficient Mining of Top-K Frequent Subgraphs
pp. 215
Introducing a calculus of trees
pp. 307
Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious
pp. 365
Disappearing Cryptography in the Bounded Storage Model
pp. 112
An Equilibrium Model in Urban Transit Riding and Fare Polices
pp. 113
Associative Mechanism of Foreign Spoken Language Perception (Forensic Phonetic Aspect)
pp. 118
Admission Control for DiffServ Based Quality of Service in Cut-Through Networks
pp. 125
Minimax Regret Sink Location Problem in Dynamic Tree Networks with Uniform Capacity
pp. 137
In-Vivo IVUS Tissue Classification: A Comparison Between RF Signal Analysis and Reconstructed Images
pp. 139
Identification of Different Types of Minority Class Examples in Imbalanced Data
pp. 158
Verification of Switch-level designs with many-valued logic
pp. 177
Practical Formal Methods in Railways - The SafeCap Approach
pp. 177
A framework for argumentation-based negotiation
pp. 183
On the Number of Nonterminal Symbols in Unambiguous Conjunctive Grammars
pp. 184
Entity Relative Position Representation Based Multi-head Selection for Joint Entity and Relation Extraction
pp. 188
Anycast Latency: How Many Sites Are Enough?
pp. 193
Mutual Remote Attestation: Enabling System Cloning for TPM Based Platforms
pp. 205
The Well-Founded Semantics Is a Stratified Fitting Semantics
pp. 218
Scalable SaaS-Based Process Customization with CaseWalls
pp. 228
Automated Detection of Instruction Cache Leaks in Modular Exponentiation Software
pp. 234
Pomset interpretations of parallel functional programs
pp. 370
Two-Message Statistically Sender-Private OT from LWE
pp. 113
Automatic Laughter Detection in Spontaneous Speech Using GMM–SVM Method
pp. 129
System description: Proof planning in higher-order logic with λClam
pp. 133
Linking Global Climate Grid Surfaces with Local Long-Term Migration Monitoring Data: Spatial Computations for the Pied Flycatcher to Assess Climate-Related Population Dynamics on a Continental Scale
pp. 154
A Frame-Based Approach for Reference Metadata Extraction
pp. 156
Consultation Algorithm for Computer Shogi: Move Decisions by Majority
pp. 161
Integrated Digital Image Correlation for the Identification of Mechanical Properties
pp. 165
Fast Training of Linear Programming Support Vector Machines Using Decomposition Techniques
pp. 167
Cross-Channel Co-occurrence Matrices for Robust Characterization of Surface Disruptions in 21/2D Rail Image Analysis
pp. 169
Resistance Welding Spot Defect Detection with Convolutional Neural Networks
pp. 171
Exploring the Lexical and Acoustic Consequences of Referential Predictability
pp. 175
Grammar Encoding in DNA-Like Secret Sharing Infrastructure
pp. 181
Jetson, Where Is the Ball? Using Neural Networks for Ball Detection at RoboCup 2017
pp. 185
Location Management Based on the Mobility Patterns of Mobile Users
pp. 204
Identifying “Interesting” Component Assemblies for NFRs Using Imperfect Information
pp. 213
Distributed Differential Evolution for Anonymity-Driven Vertical Fragmentation in Outsourced Data Storage
pp. 235
Feature Interaction and Dependencies: Modeling Features for Reengineering a Legacy Product Line
pp. 252
On Uniquely Closable and Uniquely Typable Skeletons of Lambda Terms
pp. 254
Automatic parallelization of lazy functional programs
pp. 271
Kripke Open Bisimulation
pp. 285
Engineering World-Wide Multi-Agent Systems with Hypermedia
pp. 310
A soft stairway to institutions
pp. 135
Facial Expression Measurement for Detecting Driver Drowsiness
pp. 147
Genetic Transformation Techniques in Cryptanalysis
pp. 151
An Architecture for Problem Solving with Diagrams
pp. 157
Stakeholders Approach to Smart Cities: A Survey on Smart City Definitions
pp. 172
A Real-Time Eye Gesture Recognition System Based on Fuzzy Inference System for Mobile Devices Monitoring
pp. 172
A Clause String DNA Algorithm for SAT
pp. 173
Time Efficient Gossiping in Known Radio Networks
pp. 173
A universal infrastructure for the run-time monitoring of parallel and distributed applications
pp. 184
Holistic Tracking of Products on the Blockchain Using NFC and Verified Users
pp. 193
Wireless Device Authentication Using Acoustic Hardware Fingerprints
pp. 200
Generating multimedia presentations for RoboCup soccer games
pp. 211
A Simple Extension of Java Language for Controllable Transparent Migration and its Portable Implementation
pp. 214
Integrating Meta-modelling Aspects with Graph Transformation for Efficient Visual Language Definition and Model Manipulation
pp. 238
F-OWL: An Inference Engine for Semantic Web
pp. 275
Logic programming as hypergraph Rewriting
pp. 298
Towards Generation of Efficient Transformations
pp. 306
Formal Analysis of the Operational Concept for the Small Aircraft Transportation System
pp. 322
Generic Multi-keyword Ranked Search on Encrypted Cloud Data
pp. 400
Composable Adaptive Secure Protocols Without Setup Under Polytime Assumptions
pp. 162
A Methodology to Solve Optimisation Problems with MAS Application to the Graph Colouring Problem
pp. 170
BSO-CLARA: Bees Swarm Optimization for Clustering LARge Applications
pp. 174
Effective Selection of Partition Sizes for Moldable Scheduling of Parallel Jobs
pp. 181
A Boyer—Moore Type Algorithm for Compressed Pattern Matching
pp. 190
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues
pp. 199
Towards an Integration of Standard Component-Based Safety Evaluation Techniques with SaveCCM
pp. 207
Encrypted Traffic Classification Using Graph Convolutional Networks
pp. 209
Forcing-Based Cut-Elimination for Gentzen-Style Intuitionistic Sequent Calculus
pp. 224
Computer Runtimes and the Length of Proofs
pp. 225
A Koala-Based Approach for Modelling and Deploying Configurable Software Product Families
pp. 237
Ocarina : An Environment for AADL Models Analysis and Automatic Code Generation for High Integrity Applications
pp. 256
An Approach to Extract Special Skills to Improve the Performance of Resume Selection
pp. 257
Formal Security Policy Verification of Distributed Component-Structured Software
pp. 146
Visualizing Sets: An Empirical Comparison of Diagram Types
pp. 149
Recognition of Altered Rock Based on Improved Particle Swarm Neural Network
pp. 154
A Teaching Tool for Proving Equivalences between Logical Formulae
pp. 171
Outperforming Buy-and-Hold with Evolved Technical Trading Rules: Daily, Weekly and Monthly Trading
pp. 172
Graph Characteristics from the Schrödinger Operator
pp. 186
KiMPA: A Kinematics-Based Method for Polygon Approximation
pp. 189
OntoWeb - A Semantic Web Community Portal
pp. 191
Fast Indulgent Consensus with Zero Degradation
pp. 195
Lombardi Drawings of Graphs
pp. 203
Modeling the Semantic Coordination of Speech and Gesture under Cognitive and Linguistic Constraints
pp. 205
On Template Method for DNA Sequence Design
pp. 211
Logic Programming and Artificial Neural Networks in Breast Cancer Detection
pp. 211
Integrating Declarative Knowledge in Hierarchical Clustering Tasks
pp. 220
Skeletonizing volume objects part II: From surface to curve skeleton
pp. 237
A Concept Lattice-Based Kernel for SVM Text Classification
pp. 238
Left is Better than Right for Reducing Nondeterminism of NFAs
pp. 243
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations
pp. 252
Measuring and Ensuring Similarity of User Interfaces: The Impact of Web Layout
pp. 273
Locally Decodable Codes: A Brief Survey
pp. 299
Deep Eyedentification: Biometric Identification Using Micro-movements of the Eye
pp. 313
A configuration approach to parallel programming
pp. 529
Overcoming Cryptographic Impossibility Results Using Blockchains
pp. 190
Introducing a Multi-agent, Multi-criteria Methodology for Modeling Electronic Consumer’s Behavior: The Case of Internet Radio
pp. 197
OpenCorba: a Reflective Open Broker
pp. 208
Optimal 3D Angular Resolution for Low-Degree Graphs
pp. 210
Competitive Analysis for Multi-objective Online Algorithms
pp. 225
MQL: An Algebraic Query Language for Knowledge Discovery
pp. 226
Robust Audio Watermarking Based on Low-Order Zernike Moments
pp. 231
Examples of a real-time temporal logic specification
pp. 232
MaTRU: A New NTRU-Based Cryptosystem
pp. 235
Kleene Theorems for Product Systems
pp. 258
Anonymous Identity-Based Broadcast Encryption with Adaptive Security
pp. 270
Labeled Step Sequences in Petri Nets
pp. 290
Constraint-Based Design-Space Exploration and Model Synthesis
pp. 293
Task Decomposition and Dynamic Role Assignment for Real - Time Strategic Teamwork
pp. 296
A Framework for Analysis of Typed Logic Programs
pp. 369
Evolution, Adaptation, and the Quest for Incrementality
pp. 409
Benchmarking Applied Semantic Inference: The PASCAL Recognising Textual Entailment Challenges
pp. 108
Uncertainty and Predictability: Can They Be Reconciled?
pp. 162
A Petri-Net Based Context Representation in Smart Car Environment
pp. 174
Does Memetic Approach Improve Global Induction of Regression and Model Trees?
pp. 204
Peering at the Internet’s Frontier: A First Look at ISP Interconnectivity in Africa
pp. 223
Rule Extraction from Random Forest: the RF+HC Methods
pp. 250
Web Agents Cooperating Deductively
pp. 252
Algorithms for Finding Gene Clusters
pp. 305
Private and Dynamic Time-Series Data Aggregation with Trust Relaxation
pp. 322
Efficient Bulk Operations on Dynamic R-trees
pp. 170
Identification of Infants at Risk for Autism Using Multi-parameter Hierarchical White Matter Connectomes
pp. 197
Graphics and Semantics: The Relationship between What Is Seen and What Is Meant in Icon Design
pp. 216
Choosing Best Algorithm Combinations for Speech Processing Tasks in Machine Learning Using MARF
pp. 218
On Tractable Parameterizations of Graph Isomorphism
pp. 241
Correct Development of Embedded Systems
pp. 245
The DANTE Temporal Expression Tagger
pp. 253
Parallel programming in maude
pp. 263
The Effects of Smart Classroom-Based Instruction on College Students’ Learning Engagement and Internet Self-efficacy
pp. 266
Human-Swarm Interaction as Shared Control: Achieving Flexible Fault-Tolerant Systems
pp. 266
Detecting Termination of Active Database Rules Using Symbolic Model Checking
pp. 326
C**: A large-grain, object-oriented, data-parallel programming language
pp. 355
Development via Refinement in Probabilistic B — Foundation and Case Study
pp. 611
SMILE: Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential Transactions
pp. 209
Yarta: A Middleware for Managing Mobile Social Ecosystems
pp. 248
Learning Stochastic Deterministic Regular Languages
pp. 278
APT Agents: Agents That Are Adaptive Predictable and Timely
pp. 376
Asymmetric Subversion Attacks on Signature Schemes
pp. 386
HardIDX: Practical and Secure Index with SGX
pp. 156
jcc: Integrating Timed Default Concurrent Constraint Programming into Java
pp. 207
Analyzing Social Bots and Their Coordination During Natural Disasters
pp. 241
Investigating the Complex with Virtual Soccer
pp. 252
Ωmega: Towards a mathematical assistant
pp. 257
ArchWare: Architecting Evolvable Software
pp. 262
Fast and Robust Edge-Based Localization in the Sony Four-Legged Robot League
pp. 267
New Integral Characteristics of KASUMI Derived by Division Property
pp. 268
A Study on the Noise Label Influence in Boosting Algorithms: AdaBoost, GBM and XGBoost
pp. 296
A Hash Chains Based Key Management Scheme for Wireless Sensor Networks
pp. 335
HoneySpam 2.0: Profiling Web Spambot Behaviour
pp. 347
Two Architectural Threat Analysis Techniques Compared
pp. 358
Approximating the Size of a Radio Network in Beeping Model
pp. 425
Improved Quantum Circuits for Elliptic Curve Discrete Logarithms
pp. 194
Breaking the curse of dynamics by task migration: Pilot experiments in the polder metacomputer
pp. 207
Finding Similar Queries to Satisfy Searches Based on Query Traces
pp. 235
Automatic Assessment of Students’ Free-Text Answers with Support Vector Machines
pp. 243
Learning Horn definitions with equivalence and membership queries
pp. 248
Prediction of Learning Abilities Based on a Cross-Modal Evaluation of Non-verbal Mental Attributes Using Video-Game-Like Interfaces
pp. 253
IPSA: A Digital Archive of Herbals to Support Scientific Research
pp. 280
Secure Multicast Using Proxy Encryption
pp. 280
BatchNorm Decomposition for Deep Neural Network Interpretation
pp. 288
A Formal Definition and a New Security Mechanism of Physical Unclonable Functions
pp. 318
Aristotle, Whately, and the taxonomy of fallacies
pp. 328
Galileo: A Tool for Dynamic Fault Tree Analysis
pp. 335
Best Paper: Stabilizing Clock Synchronization for Wireless Sensor Networks
pp. 355
Unconditionally Secure Rational Secret Sharing in Standard Communication Networks
pp. 137
Towards a Semantic Integration of Medical Relational Databases by Using Ontologies: A Case Study
pp. 245
Heuristically Accelerated Q–Learning: A New Approach to Speed Up Reinforcement Learning
pp. 248
Automatic Motherese Detection for Face-to-Face Interaction Analysis
pp. 322
Constraint-generating dependencies
pp. 337
LêRótulos: A Mobile Application Based on Text Recognition in Images to Assist Visually Impaired People
pp. 374
Fair Division with Subsidy
pp. 733
Multi-Theorem Preprocessing NIZKs from Lattices
pp. 234
Query Generation Using Semantic Features
pp. 284
The Behavior Analysis of Product Negative Word-of-Mouth Spread on Sina Weibo
pp. 305
Lessons Learned from an XP Experiment with Students: Test-First Needs More Teachings
pp. 323
Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets
pp. 341
A Practical Index for Genome Searching
pp. 353
A Proof Pearl with the Fan Theorem and Bar Induction
pp. 732
Reverse Firewalls for Actively Secure MPCs
pp. 211
Unsupervised Learning of Rules for Morphological Disambiguation
pp. 217
Language-Independent Methods for Compiling Monolingual Lexical Data
pp. 233
Adoption of Cloud Computing in Supply Chain Management Solutions: A SCOR-Aligned Assessment
pp. 266
Effective DDoS Attacks Detection Using Generalized Entropy Metric
pp. 304
Standard bases of differential ideals
pp. 334
Separate Compositional Analysis of Class-Based Object-Oriented Languages
pp. 340
Association Rule Based Approach to Improve Diversity of Query Recommendations
pp. 368
Plasticity and Nativism: Towards a Resolution of an Apparent Paradox
pp. 153
Replication Strategies for Highly Available Peer-to-Peer Storage
pp. 225
Emergent Motion Characteristics of a Modular Robot through Genetic Algorithm
pp. 243
Representation Learning for Retinal Vasculature Embeddings
pp. 292
Probabilistic Declarative Process Mining
pp. 308
The Use of Heterogeneous Cellular Automata to Study the Capacity of the Roundabout
pp. 314
KM for Public Administration: Focusing on KMS Feature Requirements
pp. 348
A Reversible Watermarking Based on Histogram Shifting
pp. 381
The Role of Soft Information in Trust Building: Evidence from Online Social Lending
pp. 393
Usability Assessment of an Extreme Programming Project: Close Co-operation with the Customer Does Not Equal to Good Usability
pp. 413
Combining Case-Based Reasoning and Reinforcement Learning for Tactical Unit Selection in Real-Time Strategy Game AI
pp. 230
Monitoring Grid Applications with Grid-Enabled OMIS Monitor
pp. 237
Ranked Tag Recommendation Systems Based on Logistic Regression
pp. 289
Using Augmented Reality Technology to Support the Automobile Development
pp. 293
General Topic Annotation in Social Networks: A Latent Dirichlet Allocation Approach
pp. 334
Symbolic-Numerical Algorithms for Solving Parabolic Quantum Well Problem with Hydrogen-Like Impurity
pp. 345
From Post Systems to the Reachability Problems for Matrix Semigroups and Multicounter Automata
pp. 484
Square Attack: A Query-Efficient Black-Box Adversarial Attack via Random Search
pp. 357
Hitting sets derandomize BPP
pp. 362
Assessing Requirements Compliance Scenarios in System Platform Subcontracting
pp. 374
An Efficient Finger-Knuckle-Print Based Recognition System Fusing SIFT and SURF Matching Scores
pp. 398
Concepts for Comparing Modeling Tool Architectures
pp. 430
Market Prices and Institutional Values
pp. 452
Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure
pp. 501
Asymptotic Density and the Theory of Computability: A Partial Survey
pp. 227
Easy Access to Social Media: Introducing the Mediata-App
pp. 254
A Lightweight GRL Profile for i* Modeling
pp. 306
FLEXOR: A Flexible Localization Scheme Based on RFID
pp. 316
Visual Network Analysis of Dynamic Metabolic Pathways
pp. 327
An Approach to Continuous Pervasive Care of Remote Patients Based on Priority Based Assignment of Nurse
pp. 347
Generating Dubins Path for Fixed Wing UAVs in Search Missions
pp. 413
Efficient Procedures for Using Matrix Algorithms
pp. 430
Berlinda: An object-oriented platform for implementing coordination languages in Java
pp. 151
Ontology-based Layered Semantics for Precise OA&D Modeling
pp. 202
Self-adaptive Hints for Collective I/O
pp. 357
Floating Car Data Analysis of Urban Road Networks
pp. 366
LiquidReality: Wetness Sensations on the Face for Virtual Reality
pp. 319
An Augmented Reality Visual Prothesis for People Affected by Tunneling Vision
pp. 367
An Energy Efficient Multi-hop Routing Protocol for Terahertz Wireless Nanosensor Networks
pp. 444
Algorithmic Improvements on Regular Inference of Software Models and Perspectives for Security Testing
pp. 253
Automatic Transcription of Czech Language Oral History in the MALACH Project: Resources and Initial Experiments
pp. 271
A Task Scheduling Algorithm Based on Load Balancing in Cloud Computing
pp. 291
Modeling Input Space for Testing Scientific Computational Software: A Case Study
pp. 364
Context-Sensitive Equivalences for Non-interference Based Protocol Analysis
pp. 396
Two algorithms for finding rectangular duals of planar graphs
pp. 460
The Role of Gamer Identity on Digital Gaming Outcomes
pp. 419
Detecting Critical Links in Complex Network to Maintain Information Flow/Reachability
pp. 434
A reactive architecture for RoboCup competition
pp. 211
Morpheme Based Language Models for Speech Recognition of Czech
pp. 285
From Debugging to Authoring: Adapting Productivity Tools to Narrative Content Description
pp. 359
A Contribution to a Unified Approach in Policy Making through Documenting Cultural Heritage
pp. 597
The Present and Future of Digital Rights Management – Musings on Emerging Legal Problems
pp. 429
Towards Dual Approaches for Learning Context-Free Grammars Based on Syntactic Concept Lattices
pp. 312
On-line monitoring support in PVM and MPI
pp. 312
Towards a Mechanism for Discretionary Overriding of Access Control
pp. 371
Dynamic Musical Orchestration Using Genetic Algorithms and a Spectro-Temporal Description of Musical Instruments
pp. 431
Optimized Connected Components Labeling with Pixel Prediction
pp. 438
Efficient Information Exchange in Single-Hop Multi-Channel Radio Networks
pp. 489
Word Similarity Fails in Multiple Sense Word Embedding
pp. 442
Benchmarking for Content-Based Visual Information Search
pp. 444
Designing and Implementing Affective and Intelligent Tutoring Systems in a Learning Social Network
pp. 500
Cybersickness and Postural Sway Using HMD Orientation
pp. 217
Polarity Classification for Target Phrases in Tweets: A Word2Vec Approach
pp. 304
Effective Bit-Width and Under-Approximation
pp. 337
NFC Provided User Friendliness for Technologically Advanced Services
pp. 394
Aesthetic Classification and Sorting Based on Image Compression
pp. 517
The Vibropixels: A Scalable Wireless Tactile Display System
pp. 563
A Smart Planning for Smart City: The Concept of Smart City as an Opportunity to Re-think the Planning Models of the Contemporary City
pp. 287
A Lightweight Framework for Executing Task Parallelism on Top of MPI
pp. 296
Improving the Performance of Boosting for Naive Bayesian Classification
pp. 349
Model Order Reduction for Large Scale Engineering Models Developed in ANSYS
pp. 375
Conversational Behavior Reflecting Interpersonal Attitudes in Small Group Interactions
pp. 381
Automated Email Answering by Text Pattern Matching
pp. 388
DAMASCo: A Framework for the Automatic Composition of Component-Based and Service-Oriented Architectures
pp. 396
Text Mining for Clinical Chinese Herbal Medical Knowledge Discovery
pp. 440
A Wearable Rehabilitation Robotic Hand Driven by PM-TS Actuators
pp. 457
Collaborative Feature Maps for Interactive Video Search
pp. 555
Ways to Cross the Rubicon: Pivoting in Software Startups
pp. 476
The weights of the orthogonals of certain cyclic codes or extended GOPPA codes
pp. 480
Coinductive Proof Techniques for Language Equivalence
pp. 572
Learning-Based Test Programming for Programmers
pp. 420
A n-Bit Reconfigurable Scalar Quantiser
pp. 515
UT Austin Villa: RoboCup 2016 3D Simulation League Competition and Technical Challenges Champions
pp. 575
Mobile Augmented Games in Playable Cities: Humorous Interaction with Pokémon Go
pp. 725
Personalized Thread Recommendation for MOOC Discussion Forums
pp. 287
Users and Evaluation of Interactive Storytelling
pp. 350
Triangle Fuzzy Number Intuitionistic Fuzzy Aggregation Operators and Their Application to Group Decision Making
pp. 400
Investigating Feature Reduction Strategies for Replay Antispoofing in Voice Biometrics
pp. 494
Hybrid Computational Intelligence Schemes in Complex Domains: An Extended Review
pp. 719
Maintaining Sliding-Window Neighborhood Profiles in Interaction Networks
pp. 335
Interactive Decision Support for Medical Planning
pp. 451
Particle Swarm Optimization and an Agent-Based Algorithm for a Problem of Staff Scheduling
pp. 460
A Direct Reputation Model for VO Formation
pp. 474
Tourist Trip Planning Functionalities: State–of–the–Art and Future
pp. 386
Tackling Ant Colony Optimization Meta-Heuristic as Search Method in Feature Subset Selection Based on Correlation or Consistency Measures
pp. 462
User Perspective Adaptation Enhancement Using Autonomous Mobile Devices
pp. 756
Learning to Aggregate Using Uninorms
pp. 426
An Improved Multi-objective Technique for Fuzzy Clustering with Application to IRS Image Segmentation
pp. 480
Bayesian Dynamic Trust Model
pp. 493
Games Accessibility for Deaf People: Evaluating Integrated Guidelines
pp. 439
QUASAR: The Question Answering System of the Universidad Politécnica de Valencia
pp. 446
New Human-Computer Interactions Using Tangible Objects: Application on a Digital Tabletop with RFID Technology
pp. 451
A Digital Nominative Proxy Signature Scheme for Mobile Communication
pp. 551
Which Is the Worst-Case Nash Equilibrium?
pp. 421
INFERNO: A Novel Architecture for Generating Long Neuronal Sequences with Spikes
pp. 523
Interface Design and Dynamic Audio
pp. 553
LSTM Recurrent Neural Networks for Short Text and Sentiment Classification
pp. 567
Aircraft Scheduling Considering Discrete Airborne Delay and Holding Pattern in the Near Terminal Area
pp. 632
Hardware Secured, Password-based Authentication for Smart Sensors for the Industrial Internet of Things
pp. 441
Online Dynamic Value System for Machine Learning
pp. 457
Towards Efficient Decomposition and Parallelization of MPDATA on Hybrid CPU-GPU Cluster
pp. 495
Estimation of Link Speed Using Pattern Classification of GPS Probe Car Data
pp. 556
Realtime Object Recognition Using Decision Tree Learning
pp. 418
Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme
pp. 514
A New Algorithm for Fast Discovery of Maximal Sequential Patterns in a Document Collection
pp. 685
On the Robustness of Decision Tree Learning Under Label Noise
pp. 319
Recording and Annotation of the Czech Speech Corpus
pp. 426
Resolving Ambiguities in Sentence Boundary Detection in Russian Spontaneous Speech
pp. 453
A Numerical Approach for the American Call Option Pricing Model
pp. 463
LMI Based Global Asymptotic Stability Criterion for Recurrent Neural Networks with Infinite Distributed Delays
pp. 498
A Fuzzy Set Semantics for Qualitative Fluents in the Situation Calculus
pp. 847
Recognizing Textual Entailment with Attentive Reading and Writing Operations
pp. 533
Three-Dimensional Virtual Models for Better Comprehension of Architectural Heritage Construction Techniques and Its Maintenance over Time
pp. 747
Delivering User Stories for Implementing Logical Software Architectures by Multiple Scrum Teams
pp. 421
Basket Analysis for Graph Structured Data
pp. 446
NetPot: Easy Meal Enjoyment for Distant Diners
pp. 566
Layered Specification of Intelligent Agents
pp. 579
Social-Stratification Probabilistic Routing Algorithm in Delay-Tolerant Network
pp. 744
The Role of Intermediate Territories for New Sustainable Planning and Governance Approaches. Criteria and Requirements for Determining Multi-municipal Dimension: South Italy Case
pp. 496
Robust Multi-stream Keyword and Non-linguistic Vocalization Detection for Computationally Intelligent Virtual Agents
pp. 567
An Efficient Device Authentication Protocol Using Bioinformatic
pp. 418
Dialogue Experiment for Elderly People in Home Health Care System
pp. 494
Talking Agents Design on the ICARO Framework
pp. 576
Practical Test-Functions Generated by Computer Algorithms
pp. 441
Implementation of dynamic density functional theory for self-organizing complex fluids on parallel computers
pp. 557
Comparison of Selection Strategies for Evolutionary Quantum Circuit Design
pp. 547
A Markov Random Field Image Segmentation Model Using Combined Color and Texture Features
pp. 622
Comparison of Homogeneous and Heterogeneous Motorised Traffic at Signalised and Two-Way Stop Control Single Lane Intersection
pp. 694
A Sentiment Analysis System for Indian Language Tweets
pp. 663
Rapid Mixing of Several Markov Chains for a Hard-Core Model
pp. 636
Real-time fault diagnosis — Using occupancy grids and neural network techniques
pp. 676
Cataloging Intangible Cultural Heritage on the Web
pp. 832
Reinforcement Learning-Based Load Shared Sequential Routing
pp. 626
Mobile Technology and E-Inclusion
pp. 644
GRADIS – Multiagent Environment Supporting Distributed Graph Transformations
pp. 698
Introduction to Reasoning about Cyclic Intervals
pp. 704
OFFD: Optimal Flexible Frequency Discretization for Naïve Bayes Classification
pp. 816
Deputy Mechanism for Workflow Views
pp. 786
RICFFP: An Efficient Service Discovery Protocol for MANETs
pp. 598
New Directions in Connectionist Language Modeling
pp. 636
A Term Weighting Method Based on Lexical Chain for Automatic Summarization
pp. 653
Least-Squares Spectral Element Method on a Staggered Grid
pp. 746
Adaptive Augmented Reality for Cultural Heritage: ARtSENSE Project
pp. 867
Leukocyte Segmentation in Blood Smear Images Using Region-Based Active Contours
pp. 755
A Method to Establish the Cooling Scheme in Simulated Annealing Like Algorithms
pp. 756
The MEMORI Technology - An Innovative Tool for the Protection of Movable Cultural Assets
pp. 914
On the Probability of Finding Non-interfering Paths in Wireless Multihop Networks
pp. 664
Segmentation of Abdominal Aortic Aneurysms in CT Images Using a Radial Model Approach
pp. 776
A JXTA-based Architecture for Efficient and Adaptive Healthcare Services
pp. 697
Application of Multi-Objective Teaching-Learning-Based Algorithm to an Economic Load Dispatch Problem with Incommensurable Objectives
pp. 391
Bounded set theory and polynomial computability
pp. 958
High Performance 3D Convolution for Protein Docking on IBM Blue Gene
pp. 724
A Bag Oversampling Approach for Class Imbalance in Multiple Instance Learning
pp. 792
Dublin City University at CLEF 2005: Cross-Language Speech Retrieval (CL-SR) Experiments
pp. 802
Decision of Class Borders on Spherical SOM and Its Visualization
pp. 847
Digital Human Model Based Participatory Design Method to Improve Work Tasks and Workplaces
pp. 730
A Constructive Algorithm for Wavelet Neural Networks
pp. 987
The Performance Estimation of the Situation Awareness RFID System from Ubiquitous Environment Scenario
pp. 1133
Adaptive Learning Procedure for a Network of Spiking Neurons and Visual Pattern Recognition
pp. 841
Triangular grid protocol: An efficient scheme for replica control with uniform access quorums
pp. 1239
Comparing Discrete and Continuous Genotypes on the Constrained Portfolio Selection Problem
pp. 1016
Novelty Detection Approach for Keystroke Dynamics Identity Verification
pp. 925
Oil Price Forecasting with an EMD-Based Multiscale Neural Network Learning Paradigm
Similar content
3,562
Questing for Camelot
Authors:
J. Foster
Food and the Status Quest
Authors:
B. Hayden
Food and the Status Quest
Authors:
M. Dietler
See all similar
Cited by
2
Efficient Utility-Driven Self-Healing Employing Adaptation Rules for Large Dynamic Architectures
Authors:
Thomas Vogel
,
Holger Giese
,
Sona Ghahremani
Using Runtime Quantitative Verification to Provide Assurance Evidence for Self-Adaptive Software
Authors:
Radu Calinescu
,
Simos Gerasimou
,
Kenneth Johnson
…
See all cited by