Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
2
views
0
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
6,372
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Foundations and Practice of Security
Palmprint Biometric System Modeling by DBC and DLA Methods and Classifying by KNN and SVM Classifiers
other
Author(s):
Raouia Mokni
,
Monji Kherallah
Publication date
(Online):
August 13 2016
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
NeuroImaging Methods
Author and book information
Book Chapter
Publication date (Print):
2016
Publication date (Online):
August 13 2016
Pages
: 259-266
DOI:
10.1007/978-3-319-44781-0_31
SO-VID:
48242bd6-e4b6-45a8-988a-e9422735d584
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Data Clustering: A User’s Dilemma
pp. 1
Correlation Clustering with Partial Information
pp. 1
Query Expansion in Folksonomies
pp. 1
Subspace Codes
pp. 1
Fully Abstract Characterization of Probabilistic May Testing
pp. 1
Learning with Configurable Operators and RL-Based Heuristics
pp. 1
Feature Selection Based on Iterative Canonical Correlation Analysis for Automatic Diagnosis of Parkinson’s Disease
pp. 1
Motion Coordination for Multi-agent Networks
pp. 1
Interacting with Context
pp. 1
Image-Based Low-Cost Systems for Automatic 3D Recording and Modelling of Archaeological Finds and Objects
pp. 1
Blow-Ups, Win/Win’s, and Crown Rules: Some New Directions in FPT
pp. 1
Final universes of processes
pp. 1
On the synthesis of strategies in infinite games
pp. 1
Leveraging Multiple Mechanisms for Information Propagation
pp. 1
Medical Image Synthesis for Data Augmentation and Anonymization Using Generative Adversarial Networks
pp. 1
Second-Order Polynomial Models for Background Subtraction
pp. 1
0. Introduction
pp. 1
Recent developments in practical examination timetabling
pp. 1
The history of steganography
pp. 1
Refining specifications to logic programs
pp. 1
The Quantum Inspired Modelling of Changing Attitudes and Self-organising Societies
pp. 1
On the Revival of Dynamic Languages
pp. 1
Invariants and Well-Foundedness in Program Algebra
pp. 1
A Gauge-Invariant Reversible Cellular Automaton
pp. 1
Reasoning as Search: Supporting Reasoning with Distributed Memory
pp. 1
Let’s Get Physical: Models and Methods for Real-World Security Protocols
pp. 2
Globus Toolkit Version 4: Software for Service-Oriented Systems
pp. 3
Evaluating Quality of Service Traffic Classes on the Megafly Network
pp. 3
Boosting Authenticated Encryption Robustness with Minimal Modifications
pp. 3
Quantum Homomorphic Encryption for Polynomial-Sized Circuits
pp. 3
Towards Sensor Database Systems
pp. 3
Exploring the Potential of User Modeling Based on Mind Maps
pp. 3
Touchscreen Poetry: Analyzing Gestural Digital Poems
pp. 3
GO-WAR: A Tool for Mining Weighted Association Rules from Gene Ontology Annotations
pp. 3
Constant-Factor Approximation for Minimum-Weight (Connected) Dominating Sets in Unit Disk Graphs
pp. 3
Adversarial Image Synthesis for Unpaired Multi-modal Cardiac Data
pp. 3
Plan Indexing for State-Based Plans
pp. 3
Deciphering Text from Touchscreen Key Taps
pp. 5
Active Learning of Extended Finite State Machines
pp. 5
Querying Trust in RDF Data with tSPARQL
pp. 5
1 Homing and Synchronizing Sequences
pp. 5
Involving Users in the Design of ICT Aimed to Improve Education, Work, and Leisure for Users with Intellectual Disabilities
pp. 7
Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best
pp. 7
Axiomatizing Weak Ready Simulation Semantics over BCCSP
pp. 9
Identifying Relationships in Functional and Structural Connectome Data Using a Hypergraph Learning Method
pp. 9
Modelling the Effects of Operating Conditions on Motor Power Consumption in Single Screw Extrusion
pp. 10
What Automata Can Provide a Medium for Life?
pp. 11
TrajSpark: A Scalable and Efficient In-Memory Management System for Big Trajectory Data
pp. 13
Self-organizing data structures
pp. 13
An Apriori-Based Algorithm for Mining Frequent Substructures from Graph Data
pp. 13
Philosophical Conceptions of Information
pp. 13
A Bandwidth-Efficient Application Level Framing Protocol for H.264 Video Multicast over Wireless LANs
pp. 13
Local Approximation Algorithms for the Uncapacitated Metric Facility Location Problem in Power-Aware Sensor Networks
pp. 13
Pairing-Based Cryptography at High Security Levels
pp. 13
Generic programming
pp. 13
Deformable Image Registration of Follow-Up Breast Magnetic Resonance Images
pp. 14
Many-Objective Optimization: An Engineering Design Perspective
pp. 15
Face Authentication Using One-Class Support Vector Machines
pp. 15
A Macroscopic Privacy Model for Heterogeneous Robot Swarms
pp. 16
Building General Purpose Security Services on Trusted Computing
pp. 16
SVC2004: First International Signature Verification Competition
pp. 16
Cross-Cultural Study on Facial Regions as Cues to Recognize Emotions of Virtual Agents
pp. 17
DroidSense: A Mobile Tool to Analyze Software Development Processes by Measuring Team Proximity
pp. 18
k2-Trees for Compact Web Graph Representation
pp. 18
Influence and Passivity in Social Media
pp. 18
Phrase-Based Statistical Machine Translation
pp. 18
A Formal Specification for Organizational Adaptation
pp. 18
Unsupervised Learning of Models for Recognition
pp. 19
VLog: A Rule Engine for Knowledge Graphs
pp. 19
Rational control of reasoning in artificial intelligence
pp. 19
Robust Recognition of Reading Activity in Transit Using Wearable Electrooculography
pp. 19
2. Synchronization
pp. 19
Treewidth: Algorithmic techniques and results
pp. 22
Predicting Online Extremism, Content Adopters, and Interaction Reciprocity
pp. 22
Query Evaluation via Tree-Decompositions
pp. 23
On Symmetric and Choiceless Computation
pp. 24
Using Evidences Based on Natural Language to Drive the Process of Fusing Multimodal Sources
pp. 24
When You Can’t Read It, Listen to It! An Audio-Visual Interface for Book Reading
pp. 24
Young-Elderly Travellers as Potential Users and Actual Users of Internet with Mobile Devices During Trips
pp. 25
Matching Ontologies in Open Networked Systems: Techniques and Applications
pp. 25
Interactive Conversion of Web Tables
pp. 27
Distortion-Free Data Embedding for Images
pp. 27
A New Public-Key Cryptosystem
pp. 28
The Marketcast Method for Aggregating Prediction Market Forecasts
pp. 29
Boolean Networks: Beyond Generalized Asynchronicity
pp. 29
Extending the GHS Weil Descent Attack
pp. 29
Dataset Issues in Object Recognition
pp. 30
Modelling of Cancer Patient Records: A Structured Approach to Data Mining and Visual Analytics
pp. 31
Novel Local Shape-Adaptive Gyrification Index with Application to Brain Development
pp. 31
Mutual Development: A Case Study in Customer-Initiated Software Product Development
pp. 31
Encoding Context-Sensitivity in Reo into Non-Context-Sensitive Semantic Models
pp. 32
A Middleware Enforcing Location Privacy in Mobile Platform
pp. 32
Neural Networks Regression Inductive Conformal Predictor and Its Application to Total Electron Content Prediction
pp. 32
Beeping a Maximal Independent Set
pp. 33
Towards a Common API for Structured Peer-to-Peer Overlays
pp. 33
3. A case study in synchronization and proof techniques
pp. 33
Event2vec: Learning Representations of Events on Temporal Sequences
pp. 34
Minimal weight k-SR representations
pp. 34
Moderately exponential bound for graph isomorphism
pp. 34
A New Algorithm for Long Integer Cube Computation with Some Insight into Higher Powers
pp. 36
30 Years of Modal Transition Systems: Survey of Extensions and Analysis
pp. 36
Privacy Preserving Data Mining
pp. 36
Dependent Types and Fibred Computational Effects
pp. 36
Diverse Image-to-Image Translation via Disentangled Representations
pp. 36
An Empirical Study on the Adoption of Online Household e-waste Collection Services in China
pp. 37
Approximating the Average Stretch Factor of Geometric Graphs
pp. 37
Correlation-Weighted Sparse Group Representation for Brain Network Construction in MCI Classification
pp. 37
A QoS-Aware Web Service Composition Approach Based on Genetic Programming and Graph Databases
pp. 38
Deep Learning for Emotion Recognition in Faces
pp. 39
A Unified Approach for Measuring Precision and Generalization Based on Anti-alignments
pp. 39
Scalar Aggregation in FD-Inconsistent Databases
pp. 39
Submodular Secretary Problem and Extensions
pp. 40
Relational Presheaves as Labelled Transition Systems
pp. 40
Active Trust Management for Autonomous Adaptive Survivable Systems (ATM’s for AAss’s)
pp. 40
Orthogonal Direct Sum Masking
pp. 41
Interpretability in Intelligent Systems – A New Concept?
pp. 41
Algebraic and Logical Emulations of Quantum Circuits
pp. 42
Fibrational Induction Meets Effects
pp. 42
Cloud Computing and Big Data Analytics: What Is New from Databases Perspective?
pp. 42
Knowledge Discovery in Multi-label Phenotype Data
pp. 43
On the Link between Gaussian Homotopy Continuation and Convex Envelopes
pp. 43
On Practical Aspects of PCFG Password Cracking
pp. 44
Segmentation and Recognition Using Structure from Motion Point Clouds
pp. 44
Protecting Mobile Agents Against Malicious Hosts
pp. 44
A Bayesian Algorithm for Reconstructing Two-Component Signaling Networks
pp. 45
Multimodal Learning Hub: A Tool for Capturing Customizable Multimodal Learning Experiences
pp. 46
Scheduling, timetabling and rostering — A special relationship?
pp. 46
Co-evolutionary constraint satisfaction
pp. 47
#Depression: Findings from a Literature Review of 10 Years of Social Media and Depression Research
pp. 47
On Dataset Complexity for Case Base Maintenance
pp. 48
Engineering Self-Adaptive Systems through Feedback Loops
pp. 48
Predicting Personality Using Novel Mobile Phone-Based Metrics
pp. 48
On Berge Multiplication for Monotone Boolean Dualization
pp. 48
Perceptions of Teachers and Guardians on the Electronic Record in the School-Family Communication
pp. 48
On the Availability of Non-strict Quorum Systems
pp. 49
On Optimal Timed Strategies
pp. 49
A Universal Client-Based Identity Management Tool
pp. 49
Patient Position Detection for SAR Optimization in Magnetic Resonance Imaging
pp. 49
Some probabilistic powerdomains in the category SFP
pp. 49
Unsupervised Accent Modeling for Language Identification
pp. 50
Metric Space Searching Based on Random Bisectors and Binary Fingerprints
pp. 51
The Stixel World - A Compact Medium Level Representation of the 3D-World
pp. 51
Rapid Learning for Binary Programs
pp. 51
When Birds Die: Making Population Protocols Fault-Tolerant
pp. 51
Adaptive Navigation Support and Adaptive Collaboration Support in WebDL
pp. 52
ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector
pp. 52
The Cog Project: Building a Humanoid Robot
pp. 52
On the Use of Gröbner Bases for Computing the Structure of Finite Abelian Groups
pp. 53
Bridging Computational Features Toward Multiple Semantic Features with Multi-task Regression: A Study of CT Pulmonary Nodules
pp. 53
Ant Colony Optimisation-Based Classification Using Two-Dimensional Polygons
pp. 54
Human Robot Interaction and Fiction: A Contradiction
pp. 54
Sesame: A Generic Architecture for Storing and Querying RDF and RDF Schema
pp. 54
SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key
pp. 54
Single Sign-On Using Trusted Platforms
pp. 55
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics
pp. 55
Integration of Unsupervised and Supervised Criteria for Deep Neural Networks Training
pp. 56
Moral Values from Simple Game Play
pp. 57
IR-n System, a Passage Retrieval Architecture
pp. 57
Fast probabilistic algorithms
pp. 59
Partial Order Methods for Statistical Model Checking and Simulation
pp. 59
Constrained Connectivity and Transition Regions
pp. 60
External User Inclusion in Public e-Service Development: Exploring the Current Practice in Sweden
pp. 60
Reasoning about Non-terminating Loops Using Deadline Commands
pp. 60
A High Resolution Land Use/Cover Modelling Framework for Europe: Introducing the EU-ClueScanner100 Model
pp. 61
The Monoids of Order Eight and Nine
pp. 61
EnvSOM: A SOM Algorithm Conditioned on the Environment for Clustering and Visualization
pp. 61
ADRES: An Architecture with Tightly Coupled VLIW Processor and Coarse-Grained Reconfigurable Matrix
pp. 61
Light Robustness
pp. 61
Robust Cancer Treatment Outcome Prediction Dealing with Small-Sized and Imbalanced Data from FDG-PET Images
pp. 62
Efficient State-Based CRDTs by Delta-Mutation
pp. 62
Adversarial Examples for Malware Detection
pp. 62
Lower Bounds on Matrix Rigidity Via a Quantum Argument
pp. 62
Logic Training through Algorithmic Problem Solving
pp. 63
Decidability Results for Restricted Models of Petri Nets with Name Creation and Replication
pp. 63
Cryptocurrencies as a Disruption? Empirical Findings on User Adoption and Future Potential of Bitcoin and Co
pp. 64
The Matita Interactive Theorem Prover
pp. 64
TweetNaCl: A Crypto Library in 100 Tweets
pp. 64
Inter-organizational Integration in the AEC/FM Industry
pp. 65
5. Syntax and semantics of CCS
pp. 65
Key-Insulated Public Key Cryptosystems
pp. 65
An Agent-Based Model for Simultaneous Phone and SMS Traffic over Time
pp. 65
Completeness Theorems for Bi-Kleene Algebras and Series-Parallel Rational Pomset Languages
pp. 66
Element-Oriented Method of Assessing Landscape of Sightseeing Spots by Using Social Images
pp. 67
Using the TPTP Language for Writing Derivations and Finite Interpretations
pp. 68
Automatic verification of pipelined microprocessor control
pp. 68
On Testing Expansion in Bounded-Degree Graphs
pp. 69
Unsupervised Learning of Visual Representations by Solving Jigsaw Puzzles
pp. 69
Network Discovery and Verification with Distance Queries
pp. 69
Training Hierarchical Feed-Forward Visual Recognition Models Using Transfer Learning from Pseudo-Tasks
pp. 69
A Closer Look at Database Replication Middleware Architectures for Enterprise Applications
pp. 69
LC-QuAD 2.0: A Large Dataset for Complex Question Answering over Wikidata and DBpedia
pp. 70
Accelerated Analysis of Biological Parameters Space Using GPUs
pp. 70
Structured Sparse Kernel Learning for Imaging Genetics Based Alzheimer’s Disease Diagnosis
pp. 70
SAT-Based Model Checking without Unrolling
pp. 71
Prehension of an Anthropomorphic Metamorphic Robotic Hand Based on Opposition Space Model
pp. 71
Structural Operational Semantics for Continuous State Probabilistic Processes
pp. 71
What Does Classifying More Than 10,000 Image Categories Tell Us?
pp. 72
Efficient Selectivity and Backup Operators in Monte-Carlo Tree Search
pp. 72
Cell-Probe Proofs and Nondeterministic Cell-Probe Complexity
pp. 72
Breast Imaging with 3D Ultrasound Computer Tomography: Results of a First In-vivo Study in Comparison to MRI Images
pp. 72
Enhancing E-commerce Security Using GSM Authentication
pp. 73
Inferring High-Level Behavior from Low-Level Sensors
pp. 73
An ACO Approach to Planning
pp. 73
Speed Records for NTRU
pp. 73
Covert channels—A context-based view
pp. 74
Cochlea Modelling: Clinical Challenges and Tubular Extraction
pp. 74
A Comparison of the Historical Entries in Wikipedia and Baidu Baike
pp. 75
Reconstructing Online Behaviors by Effort Minimization
pp. 75
Longitudinal Modeling of Multi-modal Image Contrast Reveals Patterns of Early Brain Growth
pp. 76
Data Weighting for Principal Component Noise Reduction in Contrast Enhanced Ultrasound
pp. 77
Automatic Construction of 3D Statistical Deformation Models Using Non-rigid Registration
pp. 77
Approximation Algorithms for the Maximum Leaf Spanning Tree Problem on Acyclic Digraphs
pp. 78
Modelling and Evaluation of CCN-Caching Trees
pp. 79
Automatic Reference Selection for Quantitative EEG Component Interpretation: Cross Spectrum Analysis Based on Bipolar EEG
pp. 80
A Data Mining Library for miRNA Annotation and Analysis
pp. 80
Conquering the Needle-in-a-Haystack: How Correlated Input Variables Beneficially Alter the Fitness Landscape for Neural Networks
pp. 80
The Effects of Regularization on Learning Facial Expressions with Convolutional Neural Networks
pp. 81
Loop Summarization and Termination Analysis
pp. 81
A Systematic Review of Impediments Blocking Internet of Things Adoption by Governments
pp. 81
Attention-Based Two-Phase Model for Video Action Detection
pp. 81
Sentiments in Wikipedia Articles for Deletion Discussions
pp. 82
Finding the Maximal Pose Error in Robotic Mechanical Systems Using Constraint Programming
pp. 83
A structural co-induction theorem
pp. 84
Prediction of Brain Network Age and Factors of Delayed Maturation in Very Preterm Infants
pp. 84
Greedy Approximation Algorithms for Finding Dense Components in a Graph
pp. 84
Multi-directional Characterization for Pollen Tubes Based on a Nanorobotic Manipulation System
pp. 84
On Temporally Connected Graphs of Small Cost
pp. 84
Shape Filtering for False Positive Reduction at Computed Tomography Colonography
pp. 85
A CPS-translation of the λμ-calculus
pp. 85
Improving the Development of Data Warehouses by Enriching Dimension Hierarchies with WordNet
pp. 86
A Graph-Oriented Model for Articulation of Ontology Interdependencies
pp. 86
A Robust Optimization Approach to Supply Chain Management
pp. 86
Evader Interdiction and Collateral Damage
pp. 86
Combining Bayesian Networks, k Nearest Neighbours Algorithm and Attribute Selection for Gene Expression Data Analysis
pp. 86
Improved Harmony Search from Ensemble of Music Players
pp. 87
Predicting Phenotype from Genotype through Automatically Composed Petri Nets
pp. 88
Querying Wikidata: Comparing SPARQL, Relational and Graph Databases
pp. 88
Security Bounds for the Design of Code-Based Cryptosystems
pp. 88
FEMaLeCoP: Fairly Efficient Machine Learning Connection Prover
pp. 88
Stability-Weighted Matrix Completion of Incomplete Multi-modal Data for Disease Diagnosis
pp. 90
A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement
pp. 90
SpiderCNN: Deep Learning on Point Sets with Parameterized Convolutional Filters
pp. 90
Statistical Instance-Based Ensemble Pruning for Multi-class Problems
pp. 90
A Semantics for Every GSPN
pp. 90
On Finite Monoids of Cellular Automata
pp. 90
Transformation: The Missing Link of MDA
pp. 91
Computing the Edit-Distance Between Unrooted Ordered Trees
pp. 91
mHealthDroid: A Novel Framework for Agile Development of Mobile Health Applications
pp. 91
Gold Mining in a River of Internet Content Traffic
pp. 92
Optimal Use of Expert Knowledge in Ant Colony Optimization for the Analysis of Epistasis in Human Disease
pp. 92
User Interfaces for On-Line Diagram Recognition
pp. 92
A Regularization Scheme for Diffusion Tensor Magnetic Resonance Images
pp. 93
Analyzing Entities and Topics in News Articles Using Statistical Topic Models
pp. 93
The MathSAT5 SMT Solver
pp. 94
The Factor Structure of the System Usability Scale
pp. 95
Deep Projective 3D Semantic Segmentation
pp. 97
Architectural Modeling and Analysis for Safety Engineering
pp. 97
Dismantling MIFARE Classic
pp. 98
A Time and Sentiment Unification Model for Personalized Recommendation
pp. 99
Cryptography from Learning Parity with Noise
pp. 99
Passive Testing with Asynchronous Communications
pp. 99
Unsupervised Feature Learning for Human Activity Recognition Using Smartphone Sensors
pp. 101
A Fast Method of Generating Pharmacokinetic Maps from Dynamic Contrast-Enhanced Images of the Breast
pp. 101
Generalized Rabin(1) Synthesis with Applications to Robust System Synthesis
pp. 103
Three metric domains of processes for bisimulation
pp. 103
A Case for Term Weighting Using a Dictionary on GPUs
pp. 104
Lazy Annotation for Program Testing and Verification
pp. 106
Role-Based Access Control for Model-Driven Web Applications
pp. 106
Following the Blind Seer – Creating Better Performance Models Using Less Information
pp. 107
An Algebraic Characterisation of Complexity for Valued Constraint
pp. 108
Laws of software evolution revisited
pp. 109
Interaction Design: The Mobile Percussionist
pp. 110
Quotienting the Delay Monad by Weak Bisimilarity
pp. 111
8. Some proofs about data structures
pp. 111
Auto-alignment of Knee MR Scout Scans through Redundant, Adaptive and Hierarchical Anatomy Detection
pp. 111
Home Network or Access Link? Locating Last-Mile Downstream Throughput Bottlenecks
pp. 112
AutoPart: Parameter-Free Graph Partitioning and Outlier Detection
pp. 112
Word Sense Disambiguation: A Graph-Based Approach Using N-Cliques Partitioning Technique
pp. 112
Computer Assisted Identification, Segmentation and Quantification of Synapses in the Cerebral Cortex
pp. 113
Keyword Spotting with Convolutional Deep Belief Networks and Dynamic Time Warping
pp. 113
Specification and Verification of Graph-Based Model Transformation Properties
pp. 115
Modeling Adversaries in a Logic for Security Protocol Analysis
pp. 115
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults
pp. 115
Security Requirements for the Deployment of Services Across Tactical SOA
pp. 115
The Impact of Reader to Tag Collision on RFID Tag Identification
pp. 115
Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks
pp. 115
Affine Sessions
pp. 116
On discerning words by automata
pp. 116
Efficient Compression on Real World Directed Graphs
pp. 117
Engineering Route Planning Algorithms
pp. 118
Trend Cluster Based Kriging Interpolation in Sensor Data Networks
pp. 120
Mass Preserving Mappings and Image Registration
pp. 121
Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment
pp. 121
Computational Advantages of Deep Prototype-Based Learning
pp. 121
Rainbow Domination and Related Problems on Some Classes of Perfect Graphs
pp. 121
Motion-Coherent Affinities for Hypergraph Based Motion Segmentation
pp. 122
Directly Addressable Variable-Length Codes
pp. 124
Testing for Distinguishing Repair Candidates in Spreadsheets – the Mussco Approach
pp. 125
Call Center Stress Recognition with Person-Specific Models
pp. 125
Building Oblivious Transfer on Channel Delays
pp. 126
SFMap: Inferring Services over Encrypted Web Flows Using Dynamical Domain Name Graphs
pp. 127
Automatic Landmark Estimation for Adolescent Idiopathic Scoliosis Assessment Using BoostNet
pp. 128
A Review of Quality Dimensions in e-Government Services
pp. 128
Deep Convolutional Neural Networks for Classifying Body Constitution
pp. 129
MiRaGE: Inference of Gene Expression Regulation via MicroRNA Transfection II
pp. 129
Implementing Gentry’s Fully-Homomorphic Encryption Scheme
pp. 129
Graph Treewidth and Geometric Thickness Parameters
pp. 129
Pattern Structures and Their Projections
pp. 129
javaPlex: A Research Software Package for Persistent (Co)Homology
pp. 130
Modeling Malware-driven Honeypots
pp. 131
A Hierarchy of Polynomial-Time Computable Simulations for Automata
pp. 132
On the random walk method for protocol testing
pp. 132
Simulation Subsumption in Ramsey-Based Büchi Automata Universality and Inclusion Testing
pp. 132
Ephemeral Communication and Communication Places
pp. 132
Comprehending Ringads
pp. 133
Differences between the EISPACK subroutines and the handbook Algol procedures
pp. 133
Closing Schemas in Object-Relational Databases
pp. 133
Time-Triggered Conversion of Guards for Reachability Analysis of Hybrid Automata
pp. 133
Consumers’ Perceptions of Social Commerce Adoption in Saudi Arabia
pp. 133
Networks Become Navigable as Nodes Move and Forget
pp. 134
Encoding-Decoding Transitional Systems for Classes of P Systems
pp. 136
An Adapted Lesk Algorithm for Word Sense Disambiguation Using WordNet
pp. 136
Nonlinear Statistical Shape Modeling for Ankle Bone Segmentation Using a Novel Kernelized Robust PCA
pp. 137
The Performance Impact of Advance Reservation Meta-scheduling
pp. 137
PHAT – Persistent Homology Algorithms Toolbox
pp. 138
Polyglot: An Extensible Compiler Framework for Java
pp. 140
Convolutional Learning of Spatio-temporal Features
pp. 141
Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials
pp. 143
User Data Management and Usage Model Acquisition in an Adaptive Educational Collaborative Environment
pp. 144
Automated Analysis of Multi Site MRI Phantom Data for the NIHPD Project
pp. 144
Testing the Foundations of Quantal Response Equilibrium
pp. 144
Asymptotically Optimal Declustering Schemes for Range Queries
pp. 145
Towards an Ontology-Based Approach for Eliciting Possible Solutions to Non-Functional Requirements
pp. 145
Meta-heuristic and Constraint-Based Approaches for Single-Line Railway Timetabling
pp. 145
Some Investigations on Robustness of Deep Learning in Limited Angle Tomography
pp. 146
A Real-World Benchmark Model for Testing Concurrent Real-Time Systems in the Automotive Domain
pp. 146
‘Who, When, and Where?’ Location Proof Assertion for Mobile Devices
pp. 146
Who Is Concerned about What? A Study of American, Chinese and Indian Users’ Privacy Concerns on Social Network Sites
pp. 147
Modelling Cloud Forensic-Enabled Services
pp. 148
Random Forests for Phase Detection in Surgical Workflow Analysis
pp. 151
Gait Recognition Using a View Transformation Model in the Frequency Domain
pp. 151
Trace Inclusion for One-Counter Nets Revisited
pp. 151
Improving Segmentation of the Left Ventricle Using a Two-Component Statistical Model
pp. 153
Induction of recursive Bayesian classifiers
pp. 154
Towards an On-Line Analysis of Tweets Processing
pp. 154
How Many Trees in a Random Forest?
pp. 156
Provably Secure Implicit Certificate Schemes
pp. 156
ParCoLab: A Parallel Corpus for Serbian, French and English
pp. 157
On Formulations of Firing Squad Synchronization Problems
pp. 157
A Semantic Theory of the Internet of Things
pp. 158
DES and Differential Power Analysis The “Duplication” Method
pp. 158
Undoing the Damage of Dataset Bias
pp. 159
Software Implementation of Mathematical Model of Thermodynamic Processes in a Steam Turbine on High-Performance System
pp. 159
RFID Systems: A Survey on Security Threats and Proposed Solutions
pp. 161
An Ontology-Based Bayesian Network Approach for Representing Uncertainty in Clinical Practice Guidelines
pp. 161
Integrating Statistical Prior Knowledge into Convolutional Neural Networks
pp. 161
Anisotropic Feature Extraction from Endoluminal Images for Detection of Intestinal Contractions
pp. 162
Using a Modelling Language to Describe the Quality of Life Goals of People Living with Dementia
pp. 162
Testing TLS Using Combinatorial Methods and Execution Framework
pp. 162
Graph-theoretic arguments in low-level complexity
pp. 162
Engineering a Performance Management System to Support Community Care Delivery
pp. 163
A Model-Based Extension to HiP-HOPS for Dynamic Fault Propagation Studies
pp. 163
Response-Time Modeling of Controller Area Network (CAN)
pp. 163
Quantum cryptanalysis of hash and claw-free functions
pp. 164
Discovering Consumer Health Expressions from Consumer-Contributed Content
pp. 165
Independent Vector Analysis: An Extension of ICA to Multivariate Components
pp. 166
Social Situated Agents in Virtual, Real and Mixed Reality Environments
pp. 166
SpineNet: Automatically Pinpointing Classification Evidence in Spinal MRIs
pp. 167
Breach, A Toolbox for Verification and Parameter Synthesis of Hybrid Systems
pp. 167
DNA-based Cryptography
pp. 168
A Tool for Checking ANSI-C Programs
pp. 169
The Database of the Cardiovascular System Related Signals
pp. 169
Clinical Evaluation of an Automatic Path Tracker for Virtual Colonoscopy
pp. 169
Experiences with QuickCheck: Testing the Hard Stuff and Staying Sane
pp. 169
Semi-homomorphic Encryption and Multiparty Computation
pp. 170
DNN-Buddies: A Deep Neural Network-Based Estimation Metric for the Jigsaw Puzzle Problem
pp. 170
From Transitions to Executions
pp. 170
A New GreatSPN GUI for GSPN Editing and CSLTA Model Checking
pp. 170
Outlier Detection Using Replicator Neural Networks
pp. 170
Teaching Academic Concurrency to Amazing Students
pp. 171
Towards Self-aware Approach for Mobile Devices Security
pp. 171
A Learning-Based Approach for IP Geolocation
pp. 173
Fine-Grained Access Control with Object-Sensitive Roles
pp. 173
Data Dependent Concentration Bounds for Sequential Prediction Algorithms
pp. 173
W-OTS+ – Shorter Signatures for Hash-Based Signature Schemes
pp. 175
Patient-Centered Information Extraction for Effective Search on Healthcare Forum
pp. 175
Induced Subgraphs of Bounded Degree and Bounded Treewidth
pp. 176
Estimating Depth from RGB and Sparse Sensing
pp. 178
Towards Continuous Certification of Clinical Information Systems
pp. 180
Enhanced Importance Sampling: Unscented Auxiliary Particle Filtering for Visual Tracking
pp. 180
A New Sharing Paradigm for the Personal Cloud
pp. 183
Recent Results in Speech Recognition for the Tatar Language
pp. 184
Quantum Entanglement and the Issue of Selective Influences in Psychology: An Overview
pp. 184
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm
pp. 184
Pseudonym Systems
pp. 184
Exploring the Impact of Search Interface Features on Search Tasks
pp. 185
LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks
pp. 185
Can Evaluation Patterns Enable End Users to Evaluate the Quality of an e-learning System? An Exploratory Study
pp. 186
Improved Approximation Algorithms for Budgeted Allocations
pp. 188
An Improved Optimistic and Fault-Tolerant Replication Protocol
pp. 188
Improving Multi-label Classifiers via Label Reduction with Association Rules
pp. 188
An Effectiveness Measure for Ambiguous and Underspecified Queries
pp. 188
Monitoring Discrete Event Systems Using Petri Net Embeddings
pp. 191
Comparison of Coarsening Schemes for Multilevel Graph Partitioning
pp. 191
Parallel Object Oriented Monte Carlo Simulations
pp. 192
Using Simulation to Evaluate and Tune the Performance of Dynamic Load Balancing of an Over-Decomposed Geophysics Application
pp. 192
Face Recognition Using Wavelet Transform and Non-negative Matrix Factorization
pp. 193
How Do E-Patients Connect Online? A Study of Social Support Roles in Health Social Networking
pp. 194
On infinite transition graphs having a decidable monadic theory
pp. 194
Examining Community in the Digital Neighborhood: Early Results from Canada’s Wired Suburb
pp. 194
Automated Age Estimation from Hand MRI Volumes Using Deep Learning
pp. 195
tLab: A System Enabling Malware Clustering Based on Suspicious Activity Trees
pp. 195
Formal Reasoning on Infinite Data Values: An Ongoing Quest
pp. 196
Multiple-Precision Residue-Based Arithmetic Library for Parallel CPU-GPU Architectures: Data Types and Features
pp. 196
The glory of the past
pp. 196
Constraint Satisfaction Problems with Infinite Templates
pp. 196
Safety Verification for Probabilistic Hybrid Systems
pp. 196
Experienced and Novice Driver Situation Awareness at Rail Level Crossings: An Exploratory On-Road Study
pp. 196
Reasoning about gradual changes of topological relationships
pp. 197
Oblivious RAM with O((logN)3) Worst-Case Cost
pp. 197
BcePred: Prediction of Continuous B-Cell Epitopes in Antigenic Sequences Using Physico-chemical Properties
pp. 197
Timing assumptions and verification of finite-state concurrent systems
pp. 198
The Travelling Salesman Problem in Bounded Degree Graphs
pp. 199
Thompson Sampling: An Asymptotically Optimal Finite-Time Analysis
pp. 201
IKNOW: A Tool to Assist and Study the Creation, Maintenance, and Dissolution of Knowledge Networks
pp. 201
Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations
pp. 201
Pairing the Volcano
pp. 203
Learning and Incorporating Shape Models for Semantic Segmentation
pp. 203
A Deep Learning Method for Classification of EEG Data Based on Motor Imagery
pp. 204
Shared Ensemble Learning Using Multi-trees
pp. 204
Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context
pp. 204
A Statistical Framework for Partial Volume Segmentation
pp. 204
Combining Passages in the Monolingual Task with the IR-n System
pp. 205
DoS Amplification Attacks – Protocol-Agnostic Detection of Service Abuse in Amplifier Networks
pp. 206
Optimizing Egalitarian Performance in the Side-Effects Model of Colocation for Data Center Resource Management
pp. 208
SymDIVINE: Tool for Control-Explicit Data-Symbolic State Space Exploration
pp. 208
The Application of I-Voting for Estonian Parliamentary Elections of 2011
pp. 209
Atlas Guided Identification of Brain Structures by Combining 3D Segmentation and SVM Classification
pp. 209
Multimodal Fusion and Fission within W3C Standards for Nonverbal Communication with Blind Persons
pp. 209
UML Modelling and Performance Analysis of Mobile Software Architectures
pp. 210
Using Ant Colony Optimization to Build Cluster-Based Classification Systems
pp. 211
Do Voting Advice Applications Have an Effect on Electoral Participation and Voter Turnout? Evidence from the 2007 Swiss Federal Elections
pp. 211
Timed Temporal Logics
pp. 213
Planarity for clustered graphs
pp. 213
VPR: a new packing, placement and routing tool for FPGA research
pp. 213
3D multi-scale line filter for segmentation and visualization of curvilinear structures in medical images
pp. 214
A Tool Integrating Model Checking into a C Verification Toolset
pp. 214
Piecewise testable events
pp. 214
Hierarchical Predicate Encryption for Inner-Products
pp. 214
Deriving Inverse Operators for Modal Logic
pp. 215
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
pp. 215
Conceptual Model of Complex Multi-agent System Smart City 4.0
pp. 216
A Complete Declarative Debugger for Maude
pp. 216
Comparison of Methods for Community Detection in Networks
pp. 217
A Generic yet Efficient Method for Secure Inner Product
pp. 220
An Application of Recurrent Neural Networks to Discriminative Keyword Spotting
pp. 221
A Neural Approach to Blind Motion Deblurring
pp. 221
A Language and a Methodology for Prototyping User Interfaces for Control Systems
pp. 221
Contributing to Current Challenges in Identity and Access Management with Visual Analytics
pp. 222
Interlinked Convolutional Neural Networks for Face Parsing
pp. 222
The Independent Choice Logic and Beyond
pp. 223
DFA on LS-Designs with a Practical Implementation on SCREAM
pp. 223
Arrays in Blitz++
pp. 223
Model-Driven Web Form Validation with UML and OCL
pp. 224
Fundamentals of 3D halftoning
pp. 225
Fair Testing and Stubborn Sets
pp. 227
SSH – Somewhat Secure Host
pp. 227
Cryptanalysis of a White Box AES Implementation
pp. 227
Watermarking document images with bounding box expansion
pp. 228
Comparing a Shipping Information Pipeline with a Thick Flow and a Thin Flow
pp. 228
Semi-numerical Solution of Stochastic Process Algebra Models
pp. 229
Optimizing Window Aggregate Functions via Random Sampling
pp. 229
Squerall: Virtual Ontology-Based Access to Heterogeneous and Large Data Sources
pp. 230
Dependently Typed Programming in Agda
pp. 230
A Flexible and Extensible Architecture for Device-Level Service Deployment
pp. 230
SCTP, XTP and TCP as Transport Protocols for High Performance Computing on Multi-cluster Grid Environments
pp. 230
Regressing Heatmaps for Multiple Landmark Localization Using CNNs
pp. 231
Distinguisher and Related-Key Attack on the Full AES-256
pp. 231
Reflection and Preservation of Properties in Coalgebraic (bi)Simulations
pp. 231
Maximum Matching in Semi-streaming with Few Passes
pp. 232
A Structured Comparison of Social Engineering Intelligence Gathering Tools
pp. 232
GRASPing the Examination Scheduling Problem
pp. 232
A General Diagnosis Method for Ontologies
pp. 233
Automatic Generalization of a QA Answer Extraction Module Based on Semantic Roles
pp. 233
Multi-scale line segmentation with automatic estimation of width, contrast and tangential direction in 2D and 3D medical images
pp. 233
On spanning trees with low crossing numbers
pp. 234
Clustering and Hot Spot Detection in Socio-economic Spatio-temporal Data
pp. 234
Semi-supervised On-Line Boosting for Robust Tracking
pp. 235
Kernel Depth Measures for Functional Data with Application to Outlier Detection
pp. 236
Cancer Metastasis Detection via Spatially Structured Deep Network
pp. 236
SpecDB: A Database for Storing and Managing Mass Spectrometry Proteomics Data
pp. 236
Metacommunication Patterns in Online Communities
pp. 237
Towards Personalization of Diabetes Therapy Using Computerized Decision Support and Machine Learning: Some Open Problems and Challenges
pp. 238
Design of a Series Variable Stiffness Joint Based on Antagonistic Principle
pp. 238
Integrating Formal Predictions of Interactive System Behaviour with User Evaluation
pp. 238
Multimedia Search with Pseudo-relevance Feedback
pp. 238
An Evaluation Framework for Disseminating Context Information with Gossiping
pp. 239
Undetachable Threshold Signatures
pp. 240
Implementing Computations in Automaton (Semi)groups
pp. 241
Mining Communication Data in a Music Community: A Preliminary Analysis
pp. 241
Motion Reconstruction of Swarm-Like Self-organized Motor Bike Traffic from Public Videos
pp. 243
Predestination: Inferring Destinations from Partial Trajectories
pp. 243
KT-IDEM: Introducing Item Difficulty to the Knowledge Tracing Model
pp. 243
Identifying the Affective Dimension of Data Mining Practice: An Exploratory Study
pp. 244
IR-n: A Passage Retrieval System at CLEF-2001
pp. 244
Automating the Choice of Decision Support System Architecture
pp. 244
Bisimulation Algorithms for Stochastic Process Algebras and Their BDD-Based Implementation
pp. 245
Fast Log Replication in Highly Available Data Store
pp. 245
From Plagiarism Detection to Bible Analysis: The Potential of Machine Learning for Grammar-Based Text Analysis
pp. 246
Parametric Trace Slicing and Monitoring
pp. 247
On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records
pp. 248
EEG-Based Random Number Generators
pp. 249
Two-Phase Preference Disclosure in Attributed Social Networks
pp. 249
Adaptive Learning from Evolving Data Streams
pp. 249
A Taxonomy of Single Sign-On Systems
pp. 249
Efficient Timetable Information in the Presence of Delays
pp. 250
Two-Degree-of-Freedom Mechanisms Design Based on Parasitic Motion Maximization
pp. 250
Compositional Specification of Controllers for Batch Process Operations
pp. 250
Secure Two-Party Computation Is Practical
pp. 250
Type Assignment for Intersections and Unions in Call-by-Value Languages
pp. 251
The Challenge of Accelerating Greek Judicial Procedure
pp. 251
Local Reject Option for Deterministic Multi-class SVM
pp. 252
A Formal Template Language Enabling Metaproof
pp. 254
S-TaLiRo: A Tool for Temporal Logic Falsification for Hybrid Systems
pp. 256
Ninth International Workshop on the Pragmatics of OCL and Other Textual Specification Languages
pp. 256
Graphical Modeling of Ultrasound Propagation in Tissue for Automatic Bone Segmentation
pp. 256
Constraint Support in MDA Tools: A Survey
pp. 256
Playing “Air Instruments”: Mimicry of Sound-Producing Gestures by Novices and Experts
pp. 256
A Dataset for Web-Scale Knowledge Base Population
pp. 257
Eighth International Workshop on OCL Concepts and Tools
pp. 258
Using Case-Based Tests to Detect Gray Cygnets
pp. 258
Monoaural Audio Source Separation Using Deep Convolutional Neural Networks
pp. 259
Palmprint Biometric System Modeling by DBC and DLA Methods and Classifying by KNN and SVM Classifiers
pp. 260
Elimination of Redundancy in Ontologies
pp. 260
User Modeling on Adaptive Web-Based Learning Communities
pp. 261
Cross-Categorial Donkeys
pp. 261
Stochastic Semantic-Based Multi-objective Genetic Programming Optimisation for Classification of Imbalanced Data
pp. 261
A Scalable Framework for Quality Assessment of RDF Datasets
pp. 261
Analysis of a Proposed Hash-Based Signature Standard
pp. 263
On Cost-Effective Inter-LMA Domain Handover Scheme in NEMO-PMIPv6 Networks
pp. 263
Social Network for Education: What Are the Resources Desired by Students?
pp. 263
Information and Knowledge Based Conceptual Study of 2008 Financial Crisis
pp. 263
Compression and Information Leakage of Plaintext
pp. 264
From Individuals to Social and Vice-versa
pp. 265
Bayesian Image Quality Transfer
pp. 266
A Reduction of Logical Regulatory Graphs Preserving Essential Dynamical Properties
pp. 266
Reuse: From Components to Services
pp. 266
Sliding Mode Control of Robot Based on Neural Network Model with Positive Definite Inertia Matrix
pp. 267
Discovering Opinion Spammer Groups by Network Footprints
pp. 267
The (Un)reliability of Saliency Methods
pp. 268
Improving the Reproducibility of PAN’s Shared Tasks:
pp. 270
Towards a Formalization of Individual Work Execution at Computer Workplaces
pp. 271
On the specification of elementary reactive behaviour
pp. 274
Testing Speculative Work in a Lazy/Eager Parallel Functional Language
pp. 274
Indexing Highly Repetitive Collections
pp. 275
A Large Deformation Diffeomorphic Approach to Registration of CLARITY Images via Mutual Information
pp. 276
Similarity Search on Time Series Based on Threshold Queries
pp. 276
Isogeny Volcanoes and the SEA Algorithm
pp. 276
On the Expressiveness of Refinement Settings
pp. 277
Comparative Analysis of Effectiveness of Two Timing-Driven Design Approaches
pp. 277
Weighted Learning Vector Quantization to Cost-Sensitive Learning
pp. 277
On Solutions to the Key Escrow Problem
pp. 281
Detecting Isodistance Hotspots on Spatial Networks: A Summary of Results
pp. 281
A Lightweight Regression Method to Infer Psycholinguistic Properties for Brazilian Portuguese
pp. 282
MOPED: A Multi-objective Parzen-Based Estimation of Distribution Algorithm for Continuous Problems
pp. 282
A Debugger for Parallel Haskell Dialects
pp. 282
Object Segmentation by Long Term Analysis of Point Trajectories
pp. 283
Quantum Security of NMAC and Related Constructions
pp. 286
Evolutionary Fuzzy Scheduler for Grid Computing
pp. 288
On the Foundations of Quantitative Information Flow
pp. 289
Managerial and Technical Barriers to the Adoption of Open Source Software
pp. 289
Measuring Similarity in Description Logics Using Refinement Operators
pp. 291
Resilient Optimistic Termination Detection for the Async-Finish Model
pp. 291
Reinforced Condition/Decision Coverage (RC/DC): A New Criterion for Software Testing
pp. 292
Reversible Communicating Systems
pp. 292
Particle Filtering for Nonlinear BOLD Signal Analysis
pp. 292
Categorical and Kripke Semantics for Constructive S4 Modal Logic
pp. 293
Sparklify: A Scalable Software Component for Efficient Evaluation of SPARQL Queries over Distributed RDF Datasets
pp. 293
Cross-View Action Recognition from Temporal Self-similarities
pp. 294
A Streaming Data Prediction Method Based on Evolving Bayesian Network
pp. 296
On Probabilistic Parallel Programs with Process Creation and Synchronisation
pp. 298
A Comparison of Market Approaches to Software Vulnerability Disclosure
pp. 298
All-But-Many Lossy Trapdoor Functions from Lattices and Applications
pp. 299
Use Fewer Instances of the Letter “i”: Toward Writing Style Anonymization
pp. 299
Verifying Progress in Timed Systems
pp. 300
A Methodology Based on MP Theory for Gene Expression Analysis
pp. 300
A Cross-Modality Neural Network Transform for Semi-automatic Medical Image Annotation
pp. 300
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
pp. 300
Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation
pp. 301
The Dependency Pair Framework: Combining Techniques for Automated Termination Proofs
pp. 302
Compact E-Cash
pp. 302
Detecting Partially Occluded Objects with an Implicit Shape Model Random Field
pp. 303
Replica-Aware Partitioning Design in Parallel Database Systems
pp. 303
Leveraging the Model-Driven Architecture for Service Choreography in Ubiquitous Systems
pp. 303
The Minimum Conflict-Free Row Split Problem Revisited
pp. 303
A Relativistic Opinion Mining Approach to Detect Factual or Opinionated News Sources
pp. 303
Extending the Petri Box Calculus with Time
pp. 304
Calculating multidimensional symmetric functions using Jacobi's formula
pp. 304
Qubit Neural Network and Its Efficiency
pp. 305
On-the-fly analysis of systems with unbounded, lossy FIFO channels
pp. 306
On-Line Algorithms in Machine Learning
pp. 307
An Economic Model of User Rating in an Online Recommender System
pp. 307
Usability Analysis of Secure Pairing Methods
pp. 307
A Learning-Based Algorithm Selection Meta-Reasoner for the Real-Time MPE Problem
pp. 308
Securely Accessing Shared Resources with Concurrent Constraint Programming
pp. 308
Using Reservoir Computing and Trend Information for Short-Term Streamflow Forecasting
pp. 309
MarUja: Virtual Assistant Prototype for the Computing Service Catalogue of the University of Jaén
pp. 309
User Engagement in Research Data Curation
pp. 312
Recurrent Instance Segmentation
pp. 313
TeslaML: Steering Machine Learning Automatically in Tencent
pp. 313
A Reliability-Based Approach for Influence Maximization Using the Evidence Theory
pp. 313
An Open-Ended Computational Evolution Strategy for Evolving Parsimonious Solutions to Human Genetics Problems
pp. 317
Interactive Programs in Dependent Type Theory
pp. 317
A Knowledge-Based Approach to Augment Applications with Interaction Traces
pp. 317
Tamper resistant software: an implementation
pp. 317
The Effect of Subharmonic Stimuli on Singing Voices
pp. 318
Applying Evolutionary Techniques to Debug Functional Programs
pp. 319
Object Recognition with Gradient-Based Learning
pp. 319
Better Key Sizes (and Attacks) for LWE-Based Encryption
pp. 319
Ellipse Detection for Visual Cyclists Analysis “In the Wild”
pp. 320
The Local Nature of List Colorings for Graphs of High Girth
pp. 320
Improving Semantic Segmentation with Generalized Models of Local Context
pp. 321
Design of a Neural Network for an Identification of a Robot Model with a Positive Definite Inertia Matrix
pp. 322
A Mimetic Finite-Difference Scheme for Convection of Multicomponent Fluid in a Porous Medium
pp. 322
Learning Continuous-Time Information Diffusion Model for Social Behavioral Data Analysis
pp. 323
Cautious Ordinal Classification by Binary Decomposition
pp. 324
A Fast and Automatic Method to Correct Intensity Inhomogeneity in MR Brain Images
pp. 324
Trusting and Adopting E-Government Services in Developing Countries? Privacy Concerns and Practices in Rwanda
pp. 325
Event structures
pp. 327
A Novel and Unifying View of Trustworthiness in Cyberphysical Systems
pp. 328
Modeling and In-Database Management of Relational, Data-Aware Processes
pp. 328
Tools for Supporting Hybrid Learning Strategies in Open Source Software Environments
pp. 328
Session Types for Object-Oriented Languages
pp. 329
Untrusted Business Process Monitoring and Execution Using Blockchain
pp. 329
A Conversational Agent as Museum Guide – Design and Evaluation of a Real-World Application
pp. 330
Fuzzy Clustering of Short Time-Series and Unevenly Distributed Sampling Points
pp. 331
A Feedback Control Approach to Mitigating Mistreatment in Distributed Caching Groups
pp. 331
Web Accessibility in Africa: A Study of Three African Domains
pp. 331
Mapping Cyber-Collective Action among Female Muslim Bloggers for the Women to Drive Movement
pp. 331
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services
pp. 332
VirtualEMF: A Model Virtualization Tool
pp. 332
Visual Landmark Based 3D Road Course Estimation with Black Box Variational Inference
pp. 332
A Novel Modeling and Recognition Method for Underwater Sound Based on HMT in Wavelet Domain
pp. 333
Organizing a Global Coordinate System from Local Information on an Ad Hoc Sensor Network
pp. 333
A Global Constraint for Closed Frequent Pattern Mining
pp. 336
Multivariate Dynamic Kernels for Financial Time Series Forecasting
pp. 337
Complete Parsimony Haplotype Inference Problem and Algorithms
pp. 340
Discriminative Analysis of Early Alzheimer’s Disease Based on Two Intrinsically Anti-correlated Networks with Resting-State fMRI
pp. 341
Boosting Lazy Abstraction for SystemC with Partial Order Reduction
pp. 342
A Process for Driving Process Improvement in VSEs
pp. 343
A First Step Toward Quantifying the Climate’s Information Production over the Last 68,000 Years
pp. 344
Supporting Framework Use via Automatically Extracted Concept-Implementation Templates
pp. 345
A Probabilistic Interpretation of Precision, Recall and F-Score, with Implication for Evaluation
pp. 346
Towards Aggregated Answers for Semistructured Data
pp. 347
Formally Testing Liveness by Means of Compression Rates
pp. 348
Rawdata-Based Detection of the Optimal Reconstruction Phase in ECG-Gated Cardiac Image Reconstruction
pp. 350
Method for Polygonal Approximation through Dominant Points Deletion
pp. 351
Tetris is Hard, Even to Approximate
pp. 351
Neural Networks Compression for Language Modeling
pp. 352
Dynamically Balanced Online Random Forests for Interactive Scribble-Based Segmentation
pp. 353
Selecting the Optimal Sequence for Deformable Registration of Microscopy Image Sequences Using Two-Stage MST-based Clustering Algorithm
pp. 354
Nonlinear Control of Omnidirectional Mobile Platforms
pp. 354
LTSmin: Distributed and Symbolic Reachability
pp. 354
Do We Need a New Narratology for Interactive Digital Storytelling? A Workshop on Theory at ICIDS 2009
pp. 354
Estimating Visual Comfort in Stereoscopic Displays Using Electroencephalography: A Proof-of-Concept
pp. 355
Diagnosing Performance Variations in HPC Applications Using Machine Learning
pp. 356
The Computer Scientist Nightmare
pp. 357
Classification Rule Mining with an Improved Ant Colony Algorithm
pp. 357
A Smart Contract for Boardroom Voting with Maximum Voter Privacy
pp. 357
X-ray Image Contrast Enhancement Using the Second Generation Curvelet Transform
pp. 359
Multiple Classifier Systems for the Classification of Audio-Visual Emotional States
pp. 359
Recognition and Segmentation of 3-D Human Action Using HMM and Multi-class AdaBoost
pp. 359
Verified LISP Implementations on ARM, x86 and PowerPC
pp. 360
Video Mining with Frequent Itemset Configurations
pp. 361
Mobile Terminals Haptic Interface: A Vibro-Tactile Finger Device for 3D Shape Rendering
pp. 361
Metamodel—Assisted Evolution Strategies
pp. 362
JAK-STAT Signalling as Example for a Database-Supported Modular Modelling Concept
pp. 363
Mediated Population Protocols
pp. 365
Dynamic Regression for Partial Correlation and Causality Analysis of Functional Brain Networks
pp. 366
One Knowledge Graph to Rule Them All? Analyzing the Differences Between DBpedia, YAGO, Wikidata & co.
pp. 367
Localized Priors for the Precise Segmentation of Individual Vertebras from CT Volume Data
pp. 368
Mining Outliers with Ensemble of Heterogeneous Detectors on Random Subspaces
pp. 369
Spatiotemporal Integration of Optical Flow Vectors for Micro-expression Detection
pp. 370
High-Throughput Glomeruli Analysis of $$\mu $$ CT Kidney Images Using Tree Priors and Scalable Sparse Computation
pp. 371
Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance
pp. 371
A Model of Spatial Reference Frames in Language
pp. 372
CADP 2010: A Toolbox for the Construction and Analysis of Distributed Processes
pp. 372
Recovery of Liver Motion and Deformation Due to Respiration Using Laparoscopic Freehand 3D Ultrasound System
pp. 372
Using Machine Learning Techniques to Recover Prismatic Cirrus Ice Crystal Size from 2-Dimensional Light Scattering Patterns
pp. 372
Bayesian Diffusion Tensor Estimation with Spatial Priors
pp. 373
Brain-Computer Interface Games: Towards a Framework
pp. 373
Adaptive Multimodal Fusion
pp. 373
Kernel-Regularized ICA for Computing Functional Topography from Resting-State fMRI
pp. 374
Spelling approximate repeated or common motifs using a suffix tree
pp. 376
An Application of NLP Rules to Spoken Document Segmentation Task
pp. 377
A Registration Method for 3D Point Clouds with Convolutional Neural Network
pp. 377
Metaheuristic Hybridized Applied to Solve the Capacity Vehicle Routing Problem
pp. 378
The Lean Theorem Prover (System Description)
pp. 380
25 Years of CNNs: Can We Compare to Human Abstraction Capabilities?
pp. 384
On Designing a GeoViz-Aware Database System - Challenges and Opportunities
pp. 384
Fully-Dynamic All-Pairs Shortest Paths: Faster and Allowing Negative Cycles
pp. 386
Photo and Video Quality Evaluation: Focusing on the Subject
pp. 387
Security Proofs for Signature Schemes
pp. 388
Unsupervised Acquisition of Axioms to Paraphrase Noun Compounds and Genitives
pp. 389
Jump Number of Two-Directional Orthogonal Ray Graphs
pp. 390
An evolved circuit, intrinsic in silicon, entwined with physics
pp. 391
Using Social Media for Word-of-Mouth Marketing
pp. 393
A Survey of Single-Database Private Information Retrieval: Techniques and Applications
pp. 394
Program Metamorphosis
pp. 397
Streaming Algorithm for Euler Characteristic Curves of Multidimensional Images
pp. 399
Concurrent Kleene Algebra
pp. 401
Wayfinding Strategies in Behavior and Language: A Symmetric and Interdisciplinary Approach to Cognitive Processes
pp. 402
Name Creation vs. Replication in Petri Net Systems
pp. 402
Improving the Centered CUSUMS Statistic for Structural Break Detection in Time Series
pp. 405
Advanced Parallel Robot with Extended RSUR Kinematic for a Circulating Working Principle
pp. 405
An Integrated Solar Database (ISD) with Extended Spatiotemporal Querying Capabilities
pp. 405
A Functionality Perspective on Digital Library Interoperability
pp. 407
Action versus state based logics for transition systems
pp. 408
Parallelization of Pricing Path-Dependent Financial Instruments on Bounded Trinomial Lattices
pp. 414
Investigating ID3-Induced Rules from Low-Dimensional Data Cleaned by Complete Case Analysis
pp. 416
An Empirical Study on Evolution of API Documentation
pp. 416
Improving Functional MRI Registration Using Whole-Brain Functional Correlation Tensors
pp. 416
Sentiment Analysis of Products’ Reviews Containing English and Hindi Texts
pp. 417
Personal Desktop-Level Jet Fighter Simulator for Training or Entertainment
pp. 417
Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates
pp. 419
Symbolic Techniques for Parametric Reasoning about Counter and Clock Systems
pp. 421
Pattern Matching in Lempel-Ziv Compressed Strings: Fast, Simple, and Deterministic
pp. 424
Construction of Büchi Automata for LTL Model Checking Verified in Isabelle/HOL
pp. 425
TabEL: Entity Linking in Web Tables
pp. 426
On Memory-Bound Functions for Fighting Spam
pp. 427
Generating Fake but Realistic Headlines Using Deep Neural Networks
pp. 428
Families of Graph Algorithms: SSSP Case Study
pp. 430
Differences on How People Organize and Think about Personal Information
pp. 431
Improving MDLSTM for Offline Arabic Handwriting Recognition Using Dropout at Different Positions
pp. 433
Multimodal Hyper-connectivity Networks for MCI Classification
pp. 433
Reconstructing Many Partitions Using Spectral Techniques
pp. 434
Emergence of Cooperation in Adaptive Social Networks with Behavioral Diversity
pp. 435
On Optimizing Nearest Neighbor Queries in High-Dimensional Data Spaces
pp. 437
Integrating Information of Films by a Multi-source Combining Framework
pp. 438
Preprocessing and Transmission for 3D Point Cloud Data
pp. 438
CFD Analysis Incorporating the Influence of Wall Motion: Application to Intracranial Aneurysms
pp. 439
Improving Toponym Extraction and Disambiguation Using Feedback Loop
pp. 439
Agent coordination and control through logic theories
pp. 441
PRISM: A Tool for Automatic Verification of Probabilistic Systems
pp. 442
Affective, Behavioral, and Cognitive Aspects of Teen Perspectives on Personal Data in Social Media: A Model of Youth Data Literacy
pp. 445
Coverability Trees for Petri Nets with Unordered Data
pp. 445
How the Structuring of Domain Knowledge Helps Casual Process Modelers
pp. 446
Parallel Computing for Time-Consuming Multicriterial Optimization Problems
pp. 447
Algorithms for ε-Approximations of Terrains
pp. 447
On the Complexity of Mixed Discriminants and Related Problems
pp. 448
Higher-order logic programming
pp. 449
On approximation properties of the Independent set problem for degree 3 graphs
pp. 450
A Novel Approach to Network Security Situation Assessment Based on Attack Confidence
pp. 450
Knowledge Discovery Using Concept-Class Taxonomies
pp. 450
Dexterous Hand Motion Classification and Recognition Based on Multimodal Sensing
pp. 452
Certificateless Public Key Cryptography
pp. 454
Universal quasi-prime algebraic domains
pp. 455
Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time
pp. 458
Zero-Knowledge Undeniable Signatures (extended abstract)
pp. 459
Air Quality Monitoring System and Benchmarking
pp. 459
A Functional Approach to Parallelizing Data Mining Algorithms in Java
pp. 460
Population-Shrinkage of Covariance to Estimate Better Brain Functional Connectivity
pp. 460
Exploratory Matrix Factorization for PET Image Analysis
pp. 460
Topology Aware Fully Convolutional Networks for Histology Gland Segmentation
pp. 461
Preserving the Fabric of Our Lives: A Survey of Web Preservation Initiatives
pp. 462
Generation and Transformation of Compliant Process Collaboration Models to BPMN
pp. 462
Hedging Public-Key Encryption in the Real World
pp. 462
Learning the Grammar of Distant Change in the World-Wide Web
pp. 463
Diagnostic Information for Control-Flow Analysis of Workflow Graphs (a.k.a. Free-Choice Workflow Nets)
pp. 466
Using Multiple Clause Constructors in Inductive Logic Programming for Semantic Parsing
pp. 467
Mining process models from workflow logs
pp. 468
A Goal-Based Modeling Approach to Develop Requirements of an Adaptive System with Environmental Uncertainty
pp. 469
Face Recognition with Local Binary Patterns
pp. 469
HeMIS: Hetero-Modal Image Segmentation
pp. 469
A Formalisation of Smallfoot in HOL
pp. 471
A New Neural Model for Traffic Simulation
pp. 471
Taverna, Reloaded
pp. 474
Robust Human Action Recognition Using Dynamic Movement Features
pp. 476
Who Will Follow Whom? Exploiting Semantics for Link Prediction in Attention-Information Networks
pp. 476
Approximate Distance Labeling Schemes
pp. 479
Homotopy Type Theory in Lean
pp. 479
GameOfFlows: Process Instance Adaptation in Complex, Dynamic and Potentially Adversarial Domains
pp. 479
Part-Based Local Shape Models for Colon Polyp Detection
pp. 481
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family
pp. 482
Combining Edge, Region, and Shape Information to Segment the Left Ventricle in Cardiac MR Images
pp. 483
Application Areas of AIS: The Past, The Present and The Future
pp. 486
Creating Subjective and Objective Sentence Classifiers from Unannotated Texts
pp. 487
Creating the DISEQuA Corpus: A Test Set for Multilingual Question Answering
pp. 488
Multinomial Naive Bayes for Text Categorization Revisited
pp. 491
Key Design Properties for Shipping Information Pipeline
pp. 494
PISA — A Platform and Programming Language Independent Interface for Search Algorithms
pp. 494
Object, Scene and Actions: Combining Multiple Features for Human Action Recognition
pp. 495
Complexity Bounds for Regular Games
pp. 495
Supervised Discriminative EEG Brain Source Imaging with Graph Regularization
pp. 498
The Role of Self-efficacy in Cancer Information Avoidance
pp. 498
Genetics of Anisotropy Asymmetry: Registration and Sample Size Effects
pp. 500
Fine-Tuning Word Embeddings for Aspect-Based Sentiment Analysis
pp. 501
Recognition of Two-Dimensional Shapes Based on Dependence Vectors
pp. 502
Augmented Lagrangian Method, Dual Methods and Split Bregman Iteration for ROF Model
pp. 502
Oblivious RAM Revisited
pp. 506
Non-negative Kernel Sparse Coding for the Analysis of Motion Data
pp. 507
Robot Orientation with Histograms on MSL
pp. 508
A Notion of Glue Expressiveness for Component-Based Systems
pp. 509
Blobworld: A System for Region-Based Image Indexing and Retrieval
pp. 509
The Conflict-Driven Answer Set Solver clasp: Progress Report
pp. 510
Recurrent Fusion Network for Image Captioning
pp. 514
Approximate Reachability for Linear Systems
pp. 516
Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework
pp. 516
Valmet: A New Validation Tool for Assessing and Improving 3D Object Segmentation
pp. 516
Feature Selection and Activity Recognition from Wearable Sensors
pp. 517
Scene Classification Via pLSA
pp. 517
Terrier Information Retrieval Platform
pp. 520
4D Shape Registration for Dynamic Electrophysiological Cardiac Mapping
pp. 520
Bayesian Inference of Latent Causes in Gene Regulatory Dynamics
pp. 521
Information Behavior and Filipino Values: An Exploratory Study
pp. 521
MOCHA: Modularity in model checking
pp. 523
Dynamic Field Mapping and Motion Correction Using Interleaved Double Spin-Echo Diffusion MRI
pp. 523
Risk-Based Models of Attacker Behavior in Cybersecurity
pp. 525
Policy Model for National and Academic Digital Collections
pp. 525
The Beginning of a Beautiful Friendship? Intelligent Tutoring Systems and MOOCs
pp. 528
ReliefF-ML: An Extension of ReliefF Algorithm to Multi-label Learning
pp. 531
Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks
pp. 533
Multi-scale Improves Boundary Detection in Natural Images
pp. 534
Queuing Algorithms Performance against Buffer Size and Attack Intensities in DDOS Attacks
pp. 535
Enhancing Effectiveness of Outlier Detections for Low Density Patterns
pp. 544
An Integrated Programming Environment for Teaching the Object-Oriented Programming Paradigm
pp. 544
Work that Enables Care: Understanding Tasks, Automation, and the National Health Service
pp. 547
Proactive Process Adaptation Using Deep Learning Ensembles
pp. 549
A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems
pp. 550
Analyzing the Effect of Query Class on Document Retrieval Performance
pp. 550
A Conceptual Model for Multidimensional Analysis of Documents
pp. 551
Almost 2-SAT Is Fixed-Parameter Tractable (Extended Abstract)
pp. 552
PET: An Interactive Software Testing Tool
pp. 553
Eye Movements and Pupil Size Reveal Deception in Computer Administered Questionnaires
pp. 554
Image Registration Guided by Particle Filter
pp. 557
A New Method for the Registration of Cardiac PET and MR Images Using Deformable Model Based Segmentation of the Main Thorax Structures
pp. 561
Private Computation of Spatial and Temporal Power Consumption with Smart Meters
pp. 562
New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction
pp. 566
An Assistive Vision System for the Blind That Helps Find Lost Things
pp. 567
Universal hashing and k-wise independent random variables via integer arithmetic without primes
pp. 569
Accurate Prediction of Financial Distress of Companies with Machine Learning Algorithms
pp. 570
A Review of Upper and Lower Limb Rehabilitation Training Robot
pp. 572
7T-Guided Learning Framework for Improving the Segmentation of 3T MR Images
pp. 573
Defining and Detecting Emergence in Complex Networks
pp. 575
Category Independent Object Proposals
pp. 576
Securing the Future — An Information Flow Analysis of a Distributed OO Language
pp. 576
Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation
pp. 577
Tracklet Descriptors for Action Modeling and Video Analysis
pp. 577
Ranking Outliers Using Symmetric Neighborhood Relationship
pp. 582
Improving the Robustness in Extracting 3D Point Landmarks from 3D Medical Images Using Parametric Deformable Models
pp. 583
A Temporal Object-Oriented Data Warehouse Model
pp. 583
Kernel principal component analysis
pp. 587
Improving the Presentation of Argument Interpretations Based on User Trials
pp. 588
Specifying Web Service Compositions on the Basis of Natural Language Requests
pp. 589
Region Covariance: A Fast Descriptor for Detection and Classification
pp. 591
Joint Factorizational Topic Models for Cross-City Recommendation
pp. 591
Color-Based Object Tracking in Multi-camera Environments
pp. 592
Performative Metadata: Reliability Frameworks and Accounting Frameworks in Content Aggregation Data Models
pp. 596
Guiding Learners in Learning Management Systems through Recommendations
pp. 598
Massive Quasi-Clique Detection
pp. 602
A Sparse Bayesian Learning Algorithm for White Matter Parameter Estimation from Compressed Multi-shell Diffusion MRI
pp. 602
Robust Vessel Tree Modeling
pp. 604
Configurations with Few Crossings in Topological Graphs
pp. 605
Intention-Based Human Robot Collaboration
pp. 609
Automatic Table Detection in Document Images
pp. 610
Voice Code Verification Algorithm Using Competing Models for User Entrance Authentication
pp. 616
Revisiting Ackermann-Hardness for Lossy Counter Machines and Reset Petri Nets
pp. 617
The Fast Bilateral Solver
pp. 617
Relational Differential Prediction
pp. 618
Introduction to: The Myths of Object-Orientation
pp. 620
Revisiting the Sequence Constraint
pp. 620
Registering Histological and MR Images of Prostate for Image-Based Cancer Detection
pp. 624
Regularization and Semi-supervised Learning on Large Graphs
pp. 625
Block Matrix Multiplication in a Distributed Computing Environment: Experiments with NetSolve
pp. 625
On Supervised Human Activity Analysis for Structured Environments
pp. 626
An Evolutionary Algorithm for Adaptive Online Services in Dynamic Environment
pp. 629
Filtering h int Images for the Detection of Microcalcifications
pp. 635
Kernel Bounds for Disjoint Cycles and Disjoint Paths
pp. 637
Analytic Expressions for Fiducial and Surface Target Registration Error
pp. 640
Subtype Cell Detection with an Accelerated Deep Convolution Neural Network
pp. 642
On the Road to an Abstract Architecture for Open Virtual Organizations
pp. 644
Automatic Nipple Detection Using Shape and Statistical Skin Color Information
pp. 647
Integration of Libnormaliz in CoCoALib and CoCoA 5
pp. 648
Zoom Better to See Clearer: Human and Object Parsing with Hierarchical Auto-Zoom Net
pp. 649
Imaging Biomarker Discovery for Lung Cancer Survival Prediction
pp. 651
PRF-ODH: Relations, Instantiations, and Impossibility Results
pp. 652
Active Learning for Dialogue Act Labelling
pp. 653
On the Use of Implicit Shape Models for Recognition of Object Categories in 3D Data
pp. 656
A General Architecture for Grid-Based PSE Toolkits
pp. 656
Generating Applications from Object Role Models
pp. 660
PARAM: A Model Checker for Parametric Markov Models
pp. 660
Query Specific Fusion for Image Retrieval
pp. 667
Malware Behavior Modeling with Colored Petri Nets
pp. 667
Automatic Quantification of Fluorescence from Clustered Targets in Microscope Images
pp. 674
Product Theorems Via Semidefinite Programming
pp. 675
Speeding Up Logistic Model Tree Induction
pp. 678
Physics-Based Elastic Image Registration Using Splines and Including Landmark Localization Uncertainties
pp. 681
Monadic Second-Order Logics with Cardinalities
pp. 681
Embedding Memoization to the Semantic Tree Search for Deciding QBFs
pp. 682
HiDDeN: Hiding Data With Deep Networks
pp. 685
A Hierarchical Convolutional Neural Network for Mitosis Detection in Phase-Contrast Microscopy Images
pp. 687
Video Retrieval Based on Words-of-Interest Selection
pp. 690
VC-Dimension and Shortest Path Algorithms
pp. 692
A Relaxed K-SVD Algorithm for Spontaneous Micro-Expression Recognition
pp. 695
Interactive Simulation of Embolization Coils: Modeling and Experimental Validation
pp. 696
Kernel Codebooks for Scene Categorization
pp. 697
Using Google Analytics to Evaluate the Usability of E-Commerce Sites
pp. 698
Approximative Methods for Monotone Systems of Min-Max-Polynomial Equations
pp. 699
Managing Process Model Collections with AProMoRe
pp. 706
Set Bounds and (Split) Set Domain Propagation Using ROBDDs
pp. 706
Gait Analysis for Human Identification
pp. 713
Developing Library Services for International Students in China’s Universities: What Does the Literature Tell Us?
pp. 717
Fast Guided Global Interpolation for Depth and Motion
pp. 718
User Friendly Decision Support Techniques in a Case-Based Reasoning System
pp. 720
Automatic Quality Control of Cardiac MRI Segmentation in Large-Scale Population Imaging
pp. 721
Motion Analysis of Wave Glider Based on Multibody Dynamic Theory
pp. 721
Access Control Model for AWS Internet of Things
pp. 722
Finding Knees in Multi-objective Optimization
pp. 726
Intensity Gradient Based Registration and Fusion of Multi-modal Images
pp. 728
Towards Image-Guided Pancreas and Biliary Endoscopy: Automatic Multi-organ Segmentation on Abdominal CT with Dense Dilated Networks
pp. 734
Gait Shape Estimation for Identification
pp. 735
Distributed Formation Control of Autonomous Underwater Vehicles Based on Flocking and Consensus Algorithms
pp. 735
A Generative Approach for Image-Based Modeling of Tumor Growth
pp. 740
Kinematic Nonlinear Control of Aerial Mobile Manipulators
pp. 741
The Complexity of Counting Functions with Easy Decision Version
pp. 742
Natural Landmark Based Navigation
pp. 745
D-Width: A More Natural Measure for Directed Tree Width
pp. 747
Improving Surgical Training Phantoms by Hyperrealism: Deep Unpaired Image-to-Image Translation from Real Surgeries
pp. 748
Explicit Non-adaptive Combinatorial Group Testing Schemes
pp. 748
Alphabet-Independent Compressed Text Indexing
pp. 750
Multi-view Inverse Rendering Under Arbitrary Illumination and Albedo
pp. 751
Towards QoS-Awareness of Context-Aware Mobile Applications and Services
pp. 751
Global Grammar Constraints
pp. 765
Control of a Magnet-Driven Nano Positioning Stage with Long Stroke Based on Disturbance Observer
pp. 769
Multimeme Algorithms for Protein Structure Prediction
pp. 770
Shape Preserving Filament Enhancement Filtering
pp. 771
Groupwise Non-rigid Registration Using Polyharmonic Clamped-Plate Splines
pp. 773
Impossibility of a Quantum Speed-Up with a Faulty Oracle
pp. 773
Development of a $$\upmu $$ CT-based Patient-Specific Model of the Electrically Stimulated Cochlea
pp. 778
Pattern Repulsion Revisited
pp. 786
FCNN: Fourier Convolutional Neural Networks
pp. 789
Combining Spatial and Non-spatial Dictionary Learning for Automated Labeling of Intra-ventricular Hemorrhage in Neonatal Brain MRI
pp. 792
A Convex Formulation of Continuous Multi-label Problems
pp. 803
Evaluation of Evolutionary Algorithms for Multi-objective Train Schedule Optimization
pp. 805
Combining Face and Iris Biometrics for Identity Verification
pp. 809
Where Should Saliency Models Look Next?
pp. 811
Clustering Gene Expression Profiles with Memetic Algorithms
pp. 819
Tri-Dexel Model Based Geometric Simulation of Multi-axis Additive Manufacturing
pp. 822
Multi-scale Patch Based Collaborative Representation for Face Recognition with Margin Distribution Optimization
pp. 823
Active Surface Approach for Extraction of the Human Cerebral Cortex from MRI
pp. 827
Towards an Optimal CNF Encoding of Boolean Cardinality Constraints
pp. 835
Deep Virtual Stereo Odometry: Leveraging Deep Depth Prediction for Monocular Direct Sparse Odometry
pp. 861
Solving Rotated Multi-objective Optimization Problems Using Differential Evolution
pp. 869
Feature-Based Diversity Optimization for Problem Instance Classification
pp. 873
Sub-structural Niching in Non-stationary Environments
pp. 875
Scalable Metric Learning via Weighted Approximate Rank Component Analysis
pp. 904
Segmentation of Neck Lymph Nodes in CT Datasets with Stable 3D Mass-Spring Models
pp. 910
A Negotiation Agent
pp. 925
Using UN/CEFACT’S Modelling Methodology (UMM) in e-Health Projects
pp. 937
MaSiMe: A Customized Similarity Measure and Its Application for Tag Cloud Refactoring
pp. 940
Calibration Method for Determining the Physical Location of the Ultrasound Image Plane
pp. 948
Non-linear Local Registration of Functional Data
pp. 948
Flexible Camera Setup for Visual Based Registration on 2D Interaction Surface with Undefined Geometry Using Neural Network
pp. 948
Detecting Inconsistencies in the Gene Ontology Using Ontology Databases with Not-gadgets
pp. 961
Image Processing of Finite Size Rat Retinal Ganglion Cells Using Multifractal and Local Connected Fractal Analysis
pp. 991
A Bayesian Metric for Evaluating Machine Learning Algorithms
pp. 1017
A Toolbox for Learning from Relational Data with Propositional and Multi-instance Learners
pp. 1022
Phase-Based User-Steered Image Segmentation
pp. 1030
A Synergy of Modelling for Constraint Problems
pp. 1040
Robust Segmentation of Medical Images Using Geometric Deformable Models and a Dynamic Speed Function
pp. 1055
Discovering Interesting Association Rules by Clustering
pp. 1075
Image Guided Radiotherapy of the Prostate
pp. 1088
Analysis of the (1 + 1) EA for a Noisy OneMax
pp. 1114
Optimization in Prostate Cancer Detection
pp. 1137
An Architecture for Simulating Needle-Based Surgical Procedures
pp. 1157
A Multimodal Navigation System for Interventional MRI
pp. 1166
Repeatability and Accuracy of Ankle Centre Location Estimates Using a Biaxial Joint Model
pp. 1174
Automatic Detection of Large Misregistrations of Multimodality Medical Images
pp. 1201
Modeling Dynamic Rules in ORM
pp. 1201
Anisotropic Volume Rendering Using Intensity Interpolation
pp. 1215
A Method for µCT Based Assessment of Root Canal Instrumentation in Endodontics Research
pp. 1219
Immune Clonal Selection Algorithm for Multiuser Detection in DS-CDMA Systems
pp. 1235
Spherical Navigator Echoes for Full 3-D Rigid Body Motion Measurement in MRI
pp. 1237
Phase Unwrapping for Magnetic Resonance Thermometry
pp. 1250
Development of a New Image-Guided Prostate Biopsy System
pp. 1262
The T-Detectors Maturation Algorithm Based on Genetic Algorithm
pp. 1263
Real-Time Simulation of Minimally-Invasive Surgery with Cutting Based on Boundary Element Methods
pp. 1273
The Continuous Tabu Search as an Optimizer for 2D-to-3D Biomedical Image Registration
pp. 1279
Two-Step Registration of Subacute to Hyperacute Stroke MRIs
pp. 1281
The Effect of Organ Motion and Image Artifacts on Monomodal Volume Registration
pp. 1293
The Importance of Partial Voluming in Multi-dimensional Medical Image Segmentation
pp. 1295
Learning a Procedure That Can Solve Hard Bin-Packing Problems: A New GA-Based Approach to Hyper-heuristics
pp. 1316
Advances in Active Constraints and Their Application to Minimally Invasive Surgery
pp. 1343
Bag-of-Particles Model for Simulating Tissue, Organs, and Flow
pp. 1356
Mutual Scale
pp. 1379
Implicit Snakes: Active Constrained Implicit Models
pp. 1391
Classification of Breast Tumors on Digital Mammograms Using Laws’ Texture Features
pp. 1401
Interactive Visualisation of MRI Vector and Tensor Fields
pp. 1430
A Modular Robotic System for Ultrasound Image Acquisition
pp. 1435
Optimal Port Placement in Robot-Assisted Coronary Artery Bypass Grafting
Similar content
6,372
DBC based Face Recognition using DWT
Authors:
K Babu
,
K Raja
,
H S Jagadeesh
Heat Pipe Integrated in Direct Bonded Copper (DBC) Technology for Cooling of Power Electronics Packaging
Authors:
Mariya E. Ivanova
,
Yvan Avenas
,
Christian Schaeffer
…
et al., Tuning the optoelectronic properties of dibenzochrysene (DBC) based small molecules for organic solar cells
Authors:
A Sharif
See all similar