Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
25
views
34
references
Top references
cited by
31
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
5,451
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Security Protocols : 7th International Workshop, Cambridge, UK, April 19-21, 1999. Proceedings
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
other
Author(s):
Jan Camenisch
,
Anna Lysyanskaya
Publication date
(Online):
April 15 2001
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Primate Tool Use
Most cited references
34
Record
: found
Abstract
: not found
Book Chapter
: not found
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
Ronald Cramer
,
Victor Shoup
(1998)
0
comments
Cited
177
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Security and Composition of Multiparty Cryptographic Protocols
Ran Canetti
(2000)
0
comments
Cited
155
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Blind Signatures for Untraceable Payments
David Chaum
(1983)
0
comments
Cited
152
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2001
Publication date (Online):
April 15 2001
Pages
: 93-118
DOI:
10.1007/3-540-44987-6_7
SO-VID:
c88b139d-9451-449b-9bd4-5bdecdb6d420
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Asymptotic Dynamics of (Some) Asyncronous Cellular Automata
pp. 1
Storage system architectures for continuous media data
pp. 1
Modelling of Complex Software Systems: A Reasoned Overview
pp. 1
Processing Preference Queries in Standard Database Systems
pp. 1
Fostering Proof Scores in CafeOBJ
pp. 1
On the Competitiveness of the Online Asymmetric and Euclidean Steiner Tree Problems
pp. 1
Distributed Process Discovery and Conformance Checking
pp. 1
Modelling and design of multi-agent systems
pp. 1
Rigorous System Design: The BIP Approach
pp. 1
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
pp. 1
Industry Standards for the Analytics Era: TPC Roadmap
pp. 1
The Pervasive Sensor
pp. 1
New Channel Selection Criterion for Spatial Domain Steganography
pp. 1
Resource-Aware Control and Dynamic Scheduling in CPS
pp. 1
The stratified loose approach: A generalization of initial and loose semantics
pp. 1
On Budget-Feasible Mechanism Design for Symmetric Submodular Objectives
pp. 1
A Memory Efficient Version of Satoh’s Algorithm
pp. 1
The Order Bound for Toric Codes
pp. 1
The Omega Number: Irreducible Complexity in Pure Math
pp. 1
Domain-Driven Discovery of Stable Abstractions for Pointcut Interfaces
pp. 1
Two Agents Competing for a Shared Machine
pp. 1
Introduction: From Jeeves to Jeannie to Siri, and Then?
pp. 1
High Performance Computing Trends and Self Adapting Numerical Software
pp. 1
The Anatomy of the Long Tail of Consumer Demand
pp. 1
FixMe: A Self-organizing Isolated Anomaly Detection Architecture for Large Scale Distributed Systems
pp. 1
Transfer
pp. 1
BDD-Based Software Model Checking with CPAchecker
pp. 1
Introduction
pp. 3
A Graphical Model for Context-Free Grammar Parsing
pp. 3
Moving Objects: Logical Relationships and Queries
pp. 3
Probationary Contracts: Reducing Risk in Norm-Based Systems
pp. 3
Image-Based Graph Visualization: Advances and Challenges
pp. 3
Diagrams Affect Choice of Strategy in Probability Problem Solving
pp. 11
What One Has to Know When Attacking \(\textsf {P}\) vs. \(\textsf {NP}\) (Extended Abstract)
pp. 13
The Attributed Pi-Calculus with Priorities
pp. 13
An alternative approach to the performance evaluation of thinning algorithms for document processing applications
pp. 13
A Description Logic for Image Retrieval
pp. 14
Finding Secure Curves with the Satoh-FGH Algorithm and an Early-Abort Strategy
pp. 15
Meta-Evolution in Graph GP
pp. 16
Transforming Threads into Actors: Learning Concurrency Structure from Execution Traces
pp. 16
Towards Theory Translation
pp. 16
Urban Computing and Smart Cities: Opportunities and Challenges in Modelling Large-Scale Aggregated Human Behavior
pp. 17
Extending some Concepts of CBR — Foundations of Case Retrieval Nets
pp. 17
Make Things Now! Pragmatic Functional Programming in Haskell
pp. 2
Graph Classification on Dissimilarity Space Embedding
pp. 2
Neurodynamic Optimization and Its Applications in Robotics
pp. 21
Exploiting Partial Success in Applying Automated Formal Methods
pp. 21
Analysis of Air Traffic Track Data with the AutoBayes Synthesis System
pp. 22
Towards a JSON-Based Fast Policy Evaluation Framework
pp. 22
On the Parallelization of the Sparse Grid Approach for Data Mining
pp. 24
Monads for functional programming
pp. 25
2. Experience Management
pp. 26
Model-Driven Techniques to Enhance Architectural Languages Interoperability
pp. 4
Self-organising Networks: Panacea or Pandora’s Box?
pp. 5
The office world
pp. 7
A generalized interval arithmetic
pp. 8
A Study of Optimal Matrix for Efficient Matrix Embedding in $\mathbb{F}_3$
pp. 9
Graph rewriting systems — The basic concepts
pp. 9
Generating and Updating Textures for a Large-Scale Environment
pp. 9
Trust Rules for Trust Dilemmas: How Decision Makers Think and Act in the Shadow of Doubt
pp. 9
Properties of the Hopfield Model with Weighted Patterns
pp. 9
Research Themes in the Case-Based Reasoning in Health Sciences Core Literature
pp. 13
Markup for Mathematical Knowledge
pp. 15
Quantum Secret Sharing with Graph States
pp. 15
Efficient Triangle Counting in Large Graphs via Degree-Based Vertex Partitioning
pp. 15
Prostate Cancer Segmentation Using Multispectral Random Walks
pp. 16
Applications of Symbolic Finite Automata
pp. 17
Enabling the Refinement of a Software Architecture into a Design
pp. 17
A Space-Based Generic Pattern for Self-Initiative Load Balancing Agents
pp. 17
Constraint concepts
pp. 18
A Declarative Approach for Software Modeling
pp. 18
Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-Bit Microcontrollers
pp. 19
Planar Surface Detection in Image Pairs Using Homographic Constraints
pp. 22
A Multi-agent System for Incident Management Solutions on IT Infrastructures
pp. 22
Everywhere Messaging
pp. 23
Total Immersion: Designing for Affective Symbiosis in a Virtual Reality Game with Haptics, Biosensors, and Emotive Agents
pp. 23
From On-Campus Project Organised Problem Based Learning to Facilitated Work Based Learning in Industry
pp. 24
Semantic-Based Development of Service-Oriented Systems
pp. 3
Keynote: Distributed Algorithms and VLSI
pp. 3
Vision-Based Control of Robot Motion
pp. 30
Information Retention in Heterogeneous Majority Dynamics
pp. 31
Related work
pp. 33
Java Communications for Large-Scale Parallel Computing
pp. 33
Representations for state automata
pp. 37
The Rationality of Round Interpretation
pp. 4
EI2N’10 - Keynote
pp. 41
Strengthening Digital Signatures Via Randomized Hashing
pp. 42
Co-ordination in multi-agent systems
pp. 44
Structuring theories on consequence
pp. 49
A Principled Approach to Tracking Information Flow in the Presence of Libraries
pp. 57
3 Metamodelling
pp. 58
Computational geometry problems in REDLOG
pp. 6
On the Power of Threshold Measurements as Oracles
pp. 69
The modelling and analysis of IEEE 802.6's configuration control protocol with coloured petri nets
pp. 115
Mathematical Theory of Transfer, II
pp. 123
Abstracting Context in Event-Based Software
pp. 125
The loading dock: A case study
pp. 17
Technologies and Considerations for Developing Internet and Multiplayer Computer Games: A Tutorial
pp. 21
Using Product Sets to Define Complex Product Decisions
pp. 23
Self-protection in P2P Networks: Choosing the Right Neighbourhood
pp. 29
Virtual Butler: What Can We Learn from Adaptive User Interfaces?
pp. 30
Hierarchical Topic Term Extraction for Semantic Annotation in Chinese Bulletin Board System
pp. 32
Market Self-organization under Limited Information
pp. 35
An analyzer for message sequence charts
pp. 35
Objective and Subjective Measures of Visual Aesthetics of Website Interface Design: The Two Sides of the Coin
pp. 37
Approximation Algorithms for Multiple Strip Packing
pp. 39
Numerical Simulator III – A Terascale SMP-Cluster System for Aerospace Science and Engineering: Its Design and the Performance Issue
pp. 4
Interpreting Invariant Composition in the B Method Using the Spec# Ownership Relation: A Way to Explain and Relax B Restrictions
pp. 4
A Distributed and Deterministic TDMA Algorithm for Write-All-With-Collision Model
pp. 40
Efficient and Non-interactive Non-malleable Commitment
pp. 40
Exploring Representations of Student Time-Use
pp. 40
Core Research and Innovation Areas in Cyber-Physical Systems of Systems
pp. 45
Exact Approaches for Parameter Elicitation in Lexicographic Ordering
pp. 45
Benchmarking Spark Machine Learning Using BigBench
pp. 46
Continuous Path Brownian Trajectories for Diffusion Monte Carlo via First- and Last-Passage Distributions
pp. 52
On parallel hierarchies and R ki
pp. 53
Generation of problem solving cases
pp. 53
Monitoring Temporal Logic with Clock Variables
pp. 53
Short Plane Supports for Spatial Hypergraphs
pp. 55
The Socio-cognitive Dynamics of Trust: Does Trust Create Trust?
pp. 55
Bounded Sequence Testing from Non-deterministic Finite State Machines
pp. 58
Multi-core On-The-Fly Saturation
pp. 62
A polynomial-time graph algorithm to decide liveness of some basic classes of bounded Petri nets
pp. 91
Intelligent Sales Support with CBR
pp. 102
Computational synthetic geometry with Clifford algebra
pp. 107
5 Modeling and Simulation of TDL Applications
pp. 114
Independence of control structures
pp. 127
Liveness analysis
pp. 129
Continuous-Time Moving Network Voronoi Diagram
pp. 137
Programming with Fudgets
pp. 173
Evaluation
pp. 19
Distance-2 Self-stabilizing Algorithm for a b-Coloring of Graphs
pp. 34
Structured Formal Development with Quotient Types in Isabelle/HOL
pp. 34
An Efficient Inverse-Consistent Diffeomorphic Image Registration Method for Prostate Adaptive Radiotherapy
pp. 35
Technology Diffusion in Social Networks
pp. 37
Auctions with Arbitrary Deals
pp. 40
Prediction of Protein Secondary Structure Using Nonlinear Method
pp. 40
Chapter V: Termination
pp. 41
Contextuality in Multipartite Pseudo-Telepathy Graph Games
pp. 42
Embodied Virtual Agents: An Affective and Attitudinal Approach of the Effects on Man-Machine Stickiness in a Product/Service Discovery
pp. 42
Semantically Inspired Electronic Healthcare Records
pp. 43
Rank for Some Families of Quaternary Reed-Muller Codes
pp. 48
The Environment as an Argument
pp. 49
Abduction with Negation as Failure for Active and Reactive Rules
pp. 49
Engineering Agent Organisations in a Business Environment
pp. 50
A Review on Network Robustness from an Information Theory Perspective
pp. 50
Secret Key Extraction with Quantization Randomness Using Hadamard Matrix on QuaDRiGa Channel
pp. 52
Recursivity, sequence recursivity, stack recursivity and semantics of programs
pp. 57
Information Security in a Quantum World
pp. 58
Multilevel Monte Carlo Methods
pp. 59
Aggregates for CHR through Program Transformation
pp. 62
A constructive proof of the Heine-Borel covering theorem for formal reals
pp. 62
Infinite State Model Checking by Abstract Interpretation and Program Specialisation
pp. 67
Verification of the Schorr-Waite Algorithm – From Trees to Graphs
pp. 71
Fairness Strategy for Multilevel Secure Concurrency Control Protocol
pp. 71
Reactive Synthesis for Robotic Swarms
pp. 71
Transcription and Posttranscriptional Processes
pp. 77
Predictability Issues in Mixed-Criticality Real-Time Systems
pp. 78
Applying an O-MaSE Compliant Process to Develop a Holonic Multiagent System for the Evaluation of Intelligent Power Distribution Systems
pp. 92
Jungle evaluation
pp. 115
Clifford algebraic calculus for geometric reasoning
pp. 117
Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols
pp. 125
Overview of existing schemes with other than ordinary security
pp. 13
Motion and Emotional Behavior Design for Pet Robot Dog
pp. 160
General programming properties of effective numberings of subrecursive classes
pp. 32
Duty Cycle Stabilization in Semi-mobile Wireless Networks
pp. 35
Mathematical Textbooks and Articles
pp. 44
Pocket BargainFinder: A Handheld Device for Augmented Commerce
pp. 45
An Evaluation of Formalisms for Negotiations in E-commerce
pp. 49
Instantiation of SMT Problems Modulo Integers
pp. 53
Optimal Bipartite Ramanujan Graphs from Balanced Incomplete Block Designs: Their Characterizations and Applications to Expander/LDPC Codes
pp. 58
Semantic Annotation Using Horizontal and Vertical Contexts
pp. 62
Navigation with an Adaptive Mobile Map-Application: User Experiences of Gesture- and Context-Sensitiveness
pp. 62
Practical Lattice-Based Fault Attack and Countermeasure on SM2 Signature Algorithm
pp. 67
From simple filtering to tagging
pp. 67
The Interaction Between Logic and Geometry in Aristotelian Diagrams
pp. 76
Gauss-Manin operators
pp. 77
Web Cube
pp. 77
A Portable and Efficient Implementation of Coinductive Logic Programming
pp. 78
Cryptographic Counters and Applications to Electronic Voting
pp. 83
Adaptive Trust and Co-operation: An Agent-Based Simulation Approach
pp. 85
Filtered hashing
pp. 90
A Logical Basis for Quantum Evolution and Entanglement
pp. 91
Context-Dependence and the Sorites
pp. 91
Efficient case retrieval
pp. 93
Synthesis and Posttranslational Modifications of Proteins
pp. 101
O2O: Virtual Private Organizations to Manage Security Policy Interoperability
pp. 108
Learning Lambek Grammars from Proof Frames
pp. 115
Regular approximation of computation paths in logic and functional languages
pp. 116
An application of social filtering to movie recommendation
pp. 131
Staged Points-to Analysis for Large Code Bases
pp. 141
On Communication Models When Verifying Equivalence Properties
pp. 145
Some well-known problems implemented on LUCAS
pp. 187
7. Experience Retrieval
pp. 217
Conclusions
pp. 228
Merging monads and folds for functional programming
pp. 33
Modeling and Analysis of a Parallel Nested Loop Join on Cluster Architectures
pp. 47
Bridging Cognitive and Social Chasms in Software Development Using Extreme Programming
pp. 49
OpenMath Content Dictionaries
pp. 52
Scalable and Flexible Location-Based Services for Ubiquitous Information Access
pp. 62
Multiplicative Attribute Graph Model of Real-World Networks
pp. 62
Optimizing Locality for Self-organizing Context-Based Systems
pp. 62
Observable Sharing for Functional Circuit Description
pp. 64
Trust Distrust Enhanced Recommendations Using an Effective Similarity Measure
pp. 67
Simulation for Preoperative Planning and Intraoperative Application of Titanium Implants
pp. 69
Convex Hulls on Cellular Automata
pp. 69
Form item extraction based on line searching
pp. 75
The Routing Open Shop Problem: New Approximation Algorithms
pp. 77
Interactive Content-Based Image Retrieval with Deep Neural Networks
pp. 77
Multi-agent Systems on the Internet: Extending the Scope of Coordination towards Security and Topology
pp. 78
Practical and Methodological Aspects of the Use of Cutting-Edge ASP Tools
pp. 82
Multiagent Model for Agile Context Inference Based on Articial Immune Systems and Sparse Distributed Representations
pp. 83
A Generic Approach to Diagrammatic Representation: The Case of Single Feature Indicator Systems
pp. 86
Property-Based Preferences in Abstract Argumentation
pp. 90
Denotation by Transformation
pp. 91
When and How Process Groups Can Be Used to Reduce the Renaming Space
pp. 99
6. Documenting Case-Based Reasoning Development Experience
pp. 99
On the Verification of Software Vulnerabilities During Static Code Analysis Using Data Mining Techniques
pp. 103
Limiting User’s Sybil Attack in Resource Sharing
pp. 106
Visualizing the Template of a Chaotic Attractor
pp. 122
Ptolemy-HLA: A Cyber-Physical System Distributed Simulation Framework
pp. 123
Rule Validation of a Meta-classifier Through a Galois (Concept) Lattice and Complementary Means
pp. 131
Lattice-Based Cryptography
pp. 135
Tail Probabilities for Randomized Program Runtimes via Martingales for Higher Moments
pp. 164
A Survey of Attacks on Ethereum Smart Contracts (SoK)
pp. 233
Aggregate Programming: From Foundations to Applications
pp. 39
Scheduling Efficiently for Irregular Load Distributions in a Large-scale Cluster
pp. 55
Structured and Parametrized Theories
pp. 57
A Generative Multiset Kernel for Structured Data
pp. 65
If Z is the answer, what could the question possibly be?
pp. 67
Enabling Context-Awareness from Network-Level Location Tracking
pp. 70
BFPkNN: An Efficient k-Nearest-Neighbor Search Algorithm for Historical Moving Object Trajectories
pp. 72
Cerebral Activation Patterns in the Preparation and Movement Periods of Spontaneous and Evoked Movements
pp. 76
A Mathematical Model of the Competition between Acquired Immunity and Virus
pp. 82
Energy-Efficient Fast Delivery by Mobile Agents
pp. 84
Incorporating BDI Agents into Human-Agent Decision Making Research
pp. 90
An Improved Decision Procedure for Propositional Projection Temporal Logic
pp. 93
Efficient Tabling of Structured Data Using Indexing and Program Transformation
pp. 93
Constant-Factor Approximations for Cycle Cover Problems
pp. 94
Automatic Analysis of a Safety Critical Tele Control System
pp. 106
A Semantic Model for Service Composition with Coordination Time Delays
pp. 108
A Formal Model for Fault-Tolerance in Distributed Systems
pp. 108
Optimizing Inequality Joins in Datalog with Approximated Constraint Propagation
pp. 113
Power-Performance Trade-Offs in Wide and Clustered VLIW Cores for Numerical Codes
pp. 121
Tree Exploration by a Swarm of Mobile Agents
pp. 127
Test generation with inputs, outputs, and quiescence
pp. 132
Context-Aware Provisional Access Control
pp. 134
Synthesis of Admissible Shields
pp. 139
High-Throughput Technologies in Molecular Biology
pp. 142
A Method for Making Password-Based Key Exchange Resilient to Server Compromise
pp. 143
Computing Average Response Time
pp. 145
Weighted Branching Systems: Behavioural Equivalence, Behavioural Distance, and Their Logical Characterisations
pp. 146
Agents, mobility and multimedia information
pp. 161
Reasoning about hierarchies of online program specialization systems
pp. 170
Observing nondeterministic data types
pp. 189
Points on algebraic curves and the parametrization problem
pp. 213
Relative Motion
pp. 45
A Vectorial Representation for the Indexation of Structural Informations
pp. 49
A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems
pp. 53
Face Recognition Using ALLE and SIFT for Human Robot Interaction
pp. 79
Using Root Cause Data Analysis for Requirements and Knowledge Elicitation
pp. 79
Self-stabilizing Numerical Iterative Computation
pp. 82
Augmenting Social Interactions: Experiments in Socio-emotional Computing
pp. 82
Determining the Variation Degree of Feature Models
pp. 82
Blowing Light: Green-Based Interaction Design
pp. 84
Scalability Analysis of ANN Training Algorithms with Feature Selection
pp. 88
Performance Evaluation of a Two Level Error Recovery Scheme for Distributed Systems
pp. 96
Parameterized Aspects of Triangle Enumeration
pp. 97
Care-O-bot® 3 – Vision of a Robot Butler
pp. 98
Finding Dense Subgraphs in G(n,1/2)
pp. 109
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-Resistant Blackbox Traceable
pp. 111
Geometrically Invariant Image Blind Watermarking Based on Speeded-Up Robust Features and DCT Transform
pp. 113
Energy Trade-Offs in Resource-Constrained Multi-Agent Systems
pp. 113
Representation in Case-Based Reasoning Applied to Control Reconfiguration
pp. 119
Spoken Language Processing: Where Do We Go from Here?
pp. 120
Genetic Programming Discovers Efficient Learning Rules for the Hidden and Output Layers of Feedforward Neural Networks
pp. 130
Verified Resource Guarantees for Heap Manipulating Programs
pp. 131
UML 2.0 Architectural Crossroads: Sculpting or Mudpacking?
pp. 135
An application of co-inductive types in Coq: Verification of the alternating bit protocol
pp. 135
Monotonically convergent numerical two-sided bounds for a differential birth and death process
pp. 138
Annotation Algorithms for Unrestricted Independent And-Parallelism in Logic Programs
pp. 146
Estimation of false drops in set-valued object retrieval with signature files
pp. 149
Performance Analysis of Concurrent PCOs in TTCN-3
pp. 149
Scaling Up Algorithmic Debugging with Virtual Execution Trees
pp. 152
Probabilistic Hybrid Systems Verification via SMT and Monte Carlo Techniques
pp. 156
Transformation of Left Terminating Programs
pp. 160
Mitigating Dictionary Attacks on Password-Protected Local Storage
pp. 164
Towards Uniformed Task Models in a Model-Based Approach
pp. 183
Type specialisation for the λ-calculus; or, a new paradigm for partial evaluation based on type inference
pp. 313
Signing many long messages
pp. 73
Software Development under Stringent Hardware Constraints: Do Agile Methods Have a Chance?
pp. 76
Context-Aware Application System for Music Playing Services
pp. 89
Chapter X: Another approach to confluence, termination, optimality
pp. 90
Clinical Intelligence: A Data Mining Study on Corneal Transplantation
pp. 94
Determinacy in Stochastic Games with Unbounded Payoff Functions
pp. 95
Tracking Uncertainty in a Spatially Explicit Susceptible-Infected Epidemic Model
pp. 97
A Uniformization Theorem for Nested Word to Word Transductions
pp. 98
Improving Random Walk Estimation Accuracy with Uniform Restarts
pp. 106
Strategy Complexity of Finite-Horizon Markov Decision Processes and Simple Stochastic Games
pp. 109
Self-Stabilizing Leader Election in Optimal Space
pp. 119
Labelled Tableaux for Non-Normal Modal Logics
pp. 120
Self-embedding Fragile Watermarking Scheme Combined Average with VQ Encoding
pp. 120
Investigating Global Behavior in Computing Grids
pp. 121
The Influence of Input and Output Measurement Noise on Batch-End Quality Prediction with Partial Least Squares
pp. 123
Automatic learning and recognition of graphical symbols in engineering drawings
pp. 129
Human Rating Methods on Multi-agent Systems
pp. 131
Agents That Coordinate Web Services in Ubiquitous Computing
pp. 135
Evolution of Ship Detectors for Satellite SAR Imagery
pp. 146
Fixed Price Approximability of the Optimal Gain from Trade
pp. 151
Directed Graph Exploration
pp. 161
A Particle Swarm-Based Approach for Semantic Similarity Computation
pp. 162
Extending Context Descriptions in Semantics-Aware Access Control
pp. 180
Rationality and Adversarial Behavior in Multi-party Computation
pp. 181
The roles of fuzzy logic and soft computing in the conception, design and deployment of intelligent systems
pp. 196
Engineering Pervasive Multiagent Systems in SAPERE
pp. 216
What not to do when writing an interpreter for specialisation
pp. 218
Integration of reasoning and algebraic calculus in geometry
pp. 239
Unfolding Groups, I
pp. 38
ASSERT4SOA: Toward Security Certification of Service-Oriented Applications
pp. 65
Efficient Pruning of Probabilistic Automata
pp. 79
Framed Versus Unframed Two-Dimensional Languages
pp. 80
Tourism Room Occupancy Rate Prediction Based on Neural Network
pp. 110
Hybrid Index for Spatio-temporal OLAP Operations
pp. 114
On the Effectiveness of Distributed Learning on Different Class-Probability Distributions of Data
pp. 118
Controllable-Choice Message Sequence Graphs
pp. 118
On the Radiocoloring Problem
pp. 123
Noise Injection Heuristics for Concurrency Testing
pp. 124
Tiara: A Self-stabilizing Deterministic Skip List
pp. 128
On the Additive Constant of the k-Server Work Function Algorithm
pp. 136
An Evolving Associative Classifier for Incomplete Database
pp. 137
Using Decentralized Clustering for Task Allocation in Networks with Reconfigurable Helper Units
pp. 137
Learning in Multi Agent Social Environments with Opponent Models
pp. 137
Investigating Tactile Stimulation in Symbiotic Systems
pp. 141
A Novel Post-processing Method to Improve the Ability of Reconstruction for Video Leaking Signal
pp. 148
Efficient Randomized Algorithm for a Vector Subset Problem
pp. 169
Aesthetic Discrimination of Graph Layouts
pp. 169
Snapshot Generation in a Constructive Object-Oriented Modeling Language
pp. 173
Terminyzer: An Automatic Non-termination Analyzer for Large Logic Programs
pp. 182
Key Recovery and Message Attacks on NTRU-Composite
pp. 205
Formal verification of an arbiter cascade
pp. 299
Methodology for Building CBR Applications
pp. 309
12 Fujaba4Eclipse Real-Time Tool Suite
pp. 41
Allowing Citizens to Self-compose Personalized Services: A Cloud Computing Model
pp. 80
Towards Humanlike Social Touch for Prosthetics and Sociable Robotics: Three-Dimensional Finite Element Simulations of Synthetic Finger Phalanges
pp. 81
The OMDoc Document Format
pp. 93
Approximating Tree Edit Distance through String Edit Distance for Binary Tree Codes
pp. 101
Study for Intelligent Guide System Using Soft Computing
pp. 105
The Shortcut Problem – Complexity and Approximation
pp. 110
3-D Reconstruction of Blood Vessels Skeleton Based on Neural Network
pp. 128
CANv2: A Hybrid CA Model by Micro and Macro-dynamics Examples
pp. 132
Fast Katz and Commuters: Efficient Estimation of Social Relatedness in Large Networks
pp. 134
A Completion Algorithm for Lattice Tree Automata
pp. 135
A (4 + ε)-Approximation for the Minimum-Weight Dominating Set Problem in Unit Disk Graphs
pp. 139
Completeness and Decidability of a Fragment of Duration Calculus with Iteration
pp. 141
Local Synchronization on Oriented Rings
pp. 141
An Improved Monte Carlo Algorithm for Elastic Electron Backscattering from Surfaces
pp. 143
TimeNetManager — A Software Tool for Generating Random Temporal Networks
pp. 150
Expressive Power of Evolving Neural Networks Working on Infinite Input Streams
pp. 157
Middleware Supporting Various Input/Output Devices for Networked Audio and Visual Home Appliances
pp. 202
Predator Shape Analysis Tool Suite
pp. 327
Related Areas
pp. 43
Towards Large-Size Ontology Alignment by Mapping Groups of Concepts
pp. 83
OMDoc as a Modular Format
pp. 87
Investigating the Effects of Gain and Loss of Esteem on Human-Robot Interaction
pp. 105
Impact of Frequency on the Energetic Efficiency of Action Potentials
pp. 129
Membrane Computing Optimization Method Based on Catalytic Factor
pp. 133
Interval-Valued Writer-Dependent Global Features for Off-line Signature Verification
pp. 138
Modeling Heart Pacemaker Tissue by a Network of Stochastic Oscillatory Cellular Automata
pp. 145
Tetrahedral Mass Spring Model for Fast Soft Tissue Deformation
pp. 146
Game-Theoretic Models of Information Overload in Social Networks
pp. 149
Statistical Algorithms for Simulation of Electron Quantum Kinetics in Semiconductors - Part I
pp. 155
Digital Me: Controlling and Making Sense of My Digital Footprint
pp. 162
Evolutionary Role Model for Multi-Agent Systems
pp. 164
Minimal Absent Words in a Sliding Window and Applications to On-Line Pattern Matching
pp. 166
CWFM: Closed Contingency Weighted Frequent Itemsets Mining
pp. 169
On attribute grammars
pp. 175
On Distributed Program Specification and Synthesis in Architectures with Cycles
pp. 198
Learning Probabilistic Relational Models Using an Ontology of Transformation Processes
pp. 200
The Queue-Number of Posets of Bounded Width or Height
pp. 201
Action Refinement in Process Algebra and Security Issues
pp. 231
Dynamic selectivity estimation for multidimensional queries
pp. 235
Duality-Based Nested Controller Synthesis from STL Specifications for Stochastic Linear Systems
pp. 247
\(\mathsf {StocHy}\) : Automated Verification and Synthesis of Stochastic Processes
pp. 253
On Canonical Embeddings of Residuated Groupoids
pp. 257
Constrained Nearest Neighbor Queries
pp. 298
Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows
pp. 299
Mechanical Design and Manufacturing
pp. 107
Activity Representation in Crowd
pp. 108
Design and Evaluation of Network-Bandwidth-Based Parallel Replication Algorithm
pp. 131
Design and Rich Application Frameworks
pp. 131
Boundary Delineation in Prostate Imaging Using Active Contour Segmentation Method with Interactively Defined Object Regions
pp. 137
On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling
pp. 137
Creation of an Ergonomic Guideline for Supervisory Control Interface Design
pp. 138
Effect of Body Position on NIRS Based Hemodynamic Measures from Prefrontal Cortex
pp. 141
An Automated System for Contact Lens Inspection
pp. 142
Efficient Location Management by Movement Prediction of the Mobile Host
pp. 144
Despeckling with Structure Preservation in Clinical Ultrasound Images Using Historical Edge Information Weighted Regularizer
pp. 145
The von Mises Naive Bayes Classifier for Angular Data
pp. 155
Action Investment Energy Games
pp. 158
On Palindromic Sequence Automata and Applications
pp. 159
Between a Rock and a Hard Place: The Two-to-One Assignment Problem
pp. 163
Lemma Generalization and Non-unit Lemma Matching for Model Elimination
pp. 165
Replication Based on Role Concept for Multi-Agent Systems
pp. 166
Non Binary CSPs and Heuristics for Modeling and Diagnosing Dynamic Systems
pp. 173
Convergence Time Analysis of Self-stabilizing Algorithms in Wireless Sensor Networks with Unreliable Links
pp. 173
Formal definition of semantics of generalized control regimes
pp. 177
Subquadratic Non-adaptive Threshold Group Testing
pp. 178
Beliebig genaue numerische Schranken für die Lösung parabolischer Randwertaufgaben
pp. 178
Prognostic Modeling with High Dimensional and Censored Data
pp. 184
Evolving an Environment Model for Robot Localization
pp. 193
Controller Compilation and Compression for Resource Constrained Applications
pp. 194
Justification of Smart Sensors for Nuclear Applications
pp. 197
An Investigation into OWL for Concrete Syntax Specification Using UML Notations
pp. 209
Graph Transforming Java Data
pp. 225
Plan Generation and Plan Execution in Agent Programming
pp. 226
An Algorithm to Find Frequent Concepts of a Formal Context with Taxonomy
pp. 251
The rise of machine intelligence
pp. 303
Evolution of partial evaluators: Removing inherited limits
pp. 329
15 Benefits of System Simulation for Automotive Applications
pp. 97
Metadata (Modules DC and CC)
pp. 107
Mathematical Objects (Module MOBJ)
pp. 119
A Quorum Based Group k-Mutual Exclusion Algorithm for Open Distributed Environments
pp. 124
Adaptive Classifier Selection on Hierarchical Context Modeling for Robust Vision Systems
pp. 142
Clusters, Servers, Thin Clients, and On-line Communities
pp. 147
Using Brain Activity to Predict Task Performance and Operator Efficiency
pp. 155
Unravelling the Yeast Cell Cycle Using the TriGen Algorithm
pp. 155
Community Focused Social Network Extraction
pp. 156
Fingerprint Image Quality Assessment and Scoring
pp. 165
How to Add Force Feedback to a Surgery Simulator
pp. 167
STANSE: Bug-Finding Framework for C Programs
pp. 180
Nogoods in Qualitative Constraint-Based Reasoning
pp. 187
Automatic Data Locality Optimization Through Self-optimization
pp. 188
TugaTAC Broker: A Fuzzy Logic Adaptive Reasoning Agent for Energy Trading
pp. 194
$\mathcal{SHACUN}$ : Semi-supervised Hierarchical Active Clustering Based on Ranking Constraints
pp. 208
Learning CP-net Preferences Online from User Queries
pp. 244
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference
pp. 286
Genus Two Isogeny Cryptography
pp. 125
Footstep Planning Based on Univector Field Method for Humanoid Robot
pp. 129
A Communication Infrastructure for Emulating Large-Scale Neural Networks Models
pp. 131
Experiences in Learning XP Practices: A Qualitative Study
pp. 135
Wireless Interent Service of Visited Mobile ISP Subscriber on GPRS Network
pp. 142
Streamlining User Experience Design and Development: Roles, Tasks and Workflow of Applying Rich Application Technologies
pp. 153
Epistemic Strategies and Games on Concurrent Processes
pp. 156
“Arousal” or “Activation” Dysfunction in the Frontal Region of Children with Attention-Deficit/Hyperactivity Disorder: Evidence from an Electroencephalogram Study
pp. 157
Interactive Style of 3D Display of Buildings on Touch Screen
pp. 179
Introducing the FPGA-Based Hardware Architecture of Systemic Computation (HAoS)
pp. 193
Stochastic Gradient Descent with GPGPU
pp. 198
Image Splicing Verification Based on Pixel-Based Alignment Method
pp. 203
An Application of Specification-Based Design of Self-stabilization to Tracking in Wireless Sensor Networks
pp. 212
Symbolic Verification of Communicating Systems with Probabilistic Message Losses: Liveness and Fairness
pp. 219
On Comments in Visual Languages
pp. 221
A Stochastic Simulation of the Decision to Retweet
pp. 222
Is Cook’s Theorem Correct for DNA-Based Computing?
pp. 236
Nine Suggestions for Improving UML Extensibility
pp. 237
Enhanced Semantic Access to Formal Software Models
pp. 242
Identifying Opinion Drivers on Social Media
pp. 249
A simple model construction for the Calculus of Constructions
pp. 265
The Sybase replication server project
pp. 293
Context-Moving Transformations for Function Verification
pp. 303
Binary Decision Diagrams with Edge-Specified Reductions
pp. 345
17 Towards Model-Based Engineering of Self-configuring Embedded Systems
pp. 124
Simulation and Phantom Studies of Contrast-Enhanced Dual Energy Mammography (CEDEM)
pp. 154
Multidimensional Lucid: Design, Semantics and Implementation
pp. 155
Multi-class Cancer Classification with OVR-Support Vector Machines Selected by Naïve Bayes Classifier
pp. 163
Using Cellular Automata on a Graph to Model the Exchanges of Cash and Goods
pp. 164
A New Italian Sign Language Database
pp. 169
Noisy Interpolation of Multivariate Sparse Polynomials in Finite Fields
pp. 186
A Digital Photography Framework Supporting Social Interaction and Affective Awareness
pp. 194
Optimization Problems in Multiple Subtree Graphs
pp. 201
Demand-Driven Model Checking for Context-Free Processes
pp. 202
Experiences with a Logic-based Knowledge Discovery Support Environment
pp. 216
Autonomic Management of Edge Servers
pp. 217
Multiple Context-Free Tree Grammars and Multi-component Tree Adjoining Grammars
pp. 220
Multi-input Functional Encryption and Its Application in Outsourcing Computation
pp. 226
Bistable Perception and Fractal Reasoning
pp. 232
Towards a Comprehensive Integration and Application Platform for Large-Scale Sensor Networks
pp. 252
Approximate Efficiency in Matching Markets
pp. 255
Applying Design by Contract to Feature-Oriented Programming
pp. 310
High-level nets and linear logic
pp. 329
Quantum Security of Hash Functions and Property-Preservation of Iterated Hashing
pp. 139
ER-TCP: An Efficient Fault-Tolerance Scheme for TCP Connections
pp. 147
Fuzzy ART for Relatively Fast Unsupervised Image Color Quantization
pp. 162
QFD-PPP: Product Line Portfolio Planning Using Quality Function Deployment
pp. 173
Montebello: A Metapopulation Based Model of Carcinogenesis
pp. 177
Matchmaking of Semantic Web Services Using Semantic-Distance Information
pp. 179
Ontology-Based RBAC Specification for Interoperation in Distributed Environment
pp. 179
New Commutative Semifields and Their Nuclei
pp. 193
IC2D: Interactive Control and Debugging of Distribution
pp. 230
On \(\varSigma \wedge \varSigma \wedge \varSigma \) Circuits: The Role of Middle \(\varSigma \) Fan-In, Homogeneity and Bottom Degree
pp. 270
Integration Testing of Software Product Lines Using Compositional Symbolic Execution
pp. 326
Anytime Algorithms in Time-Triggered Control Systems
pp. 339
Digital Bifurcation Analysis of TCP Dynamics
pp. 373
Predictive Models for Min-entropy Estimation
pp. 393
A restricted second order logic for finite structures
pp. 140
Performance of Protocols
pp. 175
Towards an Automatic Analysis of Interaction Data for HCI Evaluation Application to a Transport Network Supervision System
pp. 177
Towards Generalized Measures Grasping CA Dynamics
pp. 186
Spreads in Projective Hjelmslev Geometries
pp. 187
Ontology-Based Information Systems Development: The Problem of Automation of Information Processing Rules
pp. 192
Performance Modeling of Wireless Voice over IP
pp. 193
Time and Fairness in a Process Algebra with Non-blocking Reading
pp. 198
Memetic Algorithm Based on Global-Best Harmony Search and Hill Climbing for Part of Speech Tagging
pp. 201
JaMake: A Java Compiler Environment
pp. 210
On behaviour of R-fuzzy automata
pp. 232
How to Invent Functions
pp. 234
Reducing Expression Size Using Rule-Based Integration
pp. 246
Functional parts detection in engineering drawings: Looking for the screws
pp. 250
The Perception of Clutter in Linear Diagrams
pp. 251
Authoring LeActiveMath Calculus Content
pp. 258
A Visual Resource Integration Environment for Distributed Applications on the ITBL System
pp. 259
Dependable Coding of Fiducial Tags
pp. 261
A Safety-Related PES for Task-Oriented Real-Time Execution Without Asynchronous Interrupts
pp. 269
Using FCA to Suggest Refactorings to Correct Design Defects
pp. 278
UML-Based Fusion Analysis
pp. 281
Linked Open Data for Linguists: Publishing the Hartmann von Aue-Portal in RDF
pp. 284
Wait-Free Stabilizing Dining Using Regular Registers
pp. 285
Combining Related Products into Product Lines
pp. 287
A Formal Verification Study on the Rotterdam Storm Surge Barrier
pp. 348
On weighted T-systems
pp. 349
Multi-Agent Programming Contest 2013: TUB Team Description
pp. 357
Verifying Safety of Synchronous Fault-Tolerant Algorithms by Bounded Model Checking
pp. 369
20 The Model-Integrated Computing Tool Suite
pp. 395
Improved Side-Channel Analysis of Finite-Field Multiplication
pp. 147
Performance of Protocols
pp. 185
A Formal Model of Mixed-Initiative Interaction in Design Exploration
pp. 186
Strategies of Product Family Architecture Development
pp. 202
Active Single Landmark Based Global Localization of Autonomous Mobile Robots
pp. 205
An Ontology Architecture for Integration of Ontologies
pp. 205
Expressiveness of Multiple Heads in CHR
pp. 220
Combinatorial Optimization in Pattern Assembly
pp. 223
Einschliessungsmengen von Polynom-Nullstellen
pp. 229
Minimal Cost Reconfiguration of Data Placement in Storage Area Network
pp. 233
How can an agent learn to negotiate?
pp. 239
Autonomic Security for Home Networks
pp. 244
Automatic Parallelization of Arbitrary Programs
pp. 257
The Complexity of Routing with Few Collisions
pp. 275
Formalizing Collaboration Goal Sequences for Service Choreography
pp. 317
An algorithm for the implementation of replicated tables
pp. 368
Using Petri Nets to develop programs for PLC systems
pp. 477
Music
pp. 77
Towards Adaptive Service Ecosystems with Agreement Technologies
pp. 168
Design Schemes and Performance Analysis of Dynamic Rerouting Interconnection Networks for Tolerating Faults and Preventing Collisions
pp. 169
Cyfield-RISP: Generating Dynamic Instruction Set Processors for Reconfigurable Hardware Using OpenCL
pp. 174
Development of Middleware GLIA for Connective Wide Collaborative Space with Networked I/O Device
pp. 179
An Algorithm for Sensory Area Coverage by Mobile Robots Operating in Complex Arenas
pp. 192
Design and Implementation of a Distributed Agent Delivery System
pp. 204
Rooted Trees Searching for Cocyclic Hadamard Matrices over D 4t
pp. 242
Competitive Multi-dimensional Dynamic Bin Packing via L-Shape Bin Packing
pp. 243
Hovering Data Clouds: A Decentralized and Self-organizing Information System
pp. 255
Evolving Controllers for Autonomous Agents Using Genetically Programmed Networks
pp. 269
A Secure Route Optimization Mechanism for Expressive Internet Architecture (XIA) Mobility
pp. 271
Parikh Image of Pushdown Automata
pp. 285
Descriptive Profiles for Sets of Alternatives in Multiple Criteria Decision Aid
pp. 329
Improved traditional mirror
pp. 360
Hierarchical System Design with Vertical Contracts
pp. 369
Probabilistic duration automata for analyzing real-time systems
pp. 447
A constant-space sequential model of computation for first-order logic
pp. 88
ADI’10 - PC Co-chairs Message
pp. 187
Measuring the Similarity of Vector Fields Using Global Distributions
pp. 201
Auxiliary Elements (Module EXT)
pp. 209
Addition of Recurrent Configurations in Chip Firing Games: Finding Minimal Recurrent Configurations with Markov Chains
pp. 212
A Review of Current Human Reliability Assessment Methods Utilized in High Hazard Human-System Interface Design
pp. 215
Interesting Examples on Maximal Irreducible Goppa Codes
pp. 224
On Restructuring Distributed Algorithms for Mobile Computing
pp. 230
Analysis of the non-context-free component of formal languages
pp. 248
Defending Grids Against Intrusions
pp. 272
Comparison of Diagrams in Producing and Understanding Hierarchies in Three Different Application Domains
pp. 282
An Entropy Based Encrypted Traffic Classifier
pp. 307
PN Standardisation: A Survey
pp. 338
Automating Cut-off for Multi-parameterized Systems
pp. 379
Modelling and evaluation of a satellite system using EVAL, a Petri Net based industrial tool
pp. 465
Self-applicable online partial evaluation
pp. 197
Virtual Door-Based Coverage Path Planning for Mobile Robot
pp. 209
Exercises (Module QUIZ)
pp. 213
Semantic-Based Affect and Metaphor Interpretation in Virtual Drama
pp. 222
Using Variation Propagation for Model-Driven Management of a System Family
pp. 222
Who Is Taking over Control? A Psychological Perspective in Examining Effects of Agent-Based Negotiation Support Technologies
pp. 234
Design of Aliasing Free Space Compressor in BIST with Maximal Compaction Ratio Using Concepts of Strong and Weak Compatibilities of Response Data Outputs and Generalized Sequence Mergeability
pp. 241
Implementing Services by Partial State Machines
pp. 246
A P System Parsing Word Derivatives
pp. 247
Normative Multi-Agent Organizations
pp. 273
Levels of Delegation and Levels of Adoption as the basis for Adjustable Autonomy
pp. 298
Evaluation of High-Speed VPN Using CFD Benchmark
pp. 301
Summary and recommendations
pp. 347
Monotone Drawings of k-Inner Planar Graphs
pp. 353
Complete Semantics to Empower Touristic Service Providers
pp. 361
Scientific databases: Challenges to the database community
pp. 183
The Resurrecting Duckling
pp. 223
A Framework for Experience Representation
pp. 237
Distributed Architecture for Association Rule Mining
pp. 246
A Behavioral Synthesis Tool for Exploiting Fine Grain Parallelism in FPGAs
pp. 249
Semi-analytic Natural Number Series Induction
pp. 250
A Concept Driven Graph Based Approach for Estimating the Focus Time of a Document
pp. 262
A JAG Extension for Verifying LTL Properties on B Event Systems
pp. 274
Amplifying Reality
pp. 293
An OpenMath Content Dictionary for Tensor Concepts
pp. 300
Rapid Image Splicing Detection Based on Relevance Vector Machine
pp. 307
The Development of the UPACS CFD Environment
pp. 309
On Speed Scaling Scheduling of Parallel Jobs with Preemption
pp. 354
Dynamic Pricing in Competitive Markets
pp. 371
Formal Verification of Tokeneer Behaviours Modelled in fUML Using CSP
pp. 481
Interval Sequences: An Object-Relational Approach to Manage Spatial Data
pp. 503
A query language for NC (extended abstract)
pp. 110
Data Integration Systems for Scientific Applications
pp. 205
Development of a Medical Information Gathering System Using JMA Standard Health Insurance Claim System ORCA on IPv6 Network
pp. 229
The First Interaction Design Pattern Library for Internet of Things User Created Applications
pp. 232
Emotional Balance as a Predictor of Impulse Control in Prisoners and Non-prisoners
pp. 241
Generating Cryptographically Suitable Non-linear Maximum Length Cellular Automata
pp. 250
On the relationship between a procedure and its data
pp. 250
Towards an All-Optical Soliton FFT in the 3NLS-Domain
pp. 253
Shape Tracking and Registration for 4D Visualization of MRI and Structure
pp. 254
Joint Activity Testbed: Blocks World for Teams (BW4T)
pp. 281
Designing Interaction Styles for a Mobile Use Context
pp. 308
Formal Verification of Descriptions with Distinct Order of Memory Operations
pp. 309
Reactive and motivational agents: Towards a collective minder
pp. 311
Dynamic Hybrid Honeypot System Based Transparent Traffic Redirection Mechanism
pp. 311
A Proof-Theoretic Approach to Deciding Subsumption and Computing Least Common Subsumer in $\cal EL$ w.r.t. Hybrid TBoxes
pp. 326
Undecidability of the Lambek Calculus with Subexponential and Bracket Modalities
pp. 388
Model Checking Hierarchical Probabilistic Systems
pp. 394
Modeling fine grain computation via the Fusion of two extended Petri nets
pp. 209
Liquid Computing in a Simplified Model of Cortical Layer IV: Learning to Balance a Ball
pp. 230
Robotic Implementation of Realistic Reaching Motion Using a Sliding Mode/Operational Space Controller
pp. 231
A Generalization of the Zig-Zag Graph Product by Means of the Sandwich Product
pp. 274
WikiSeeAlso: Suggesting Tangentially Related Concepts (See also links) for Wikipedia Articles
pp. 279
On the Unification of Process Semantics: Observational Semantics
pp. 306
Invertible Transducers, Iteration and Coordinates
pp. 341
Decision Problems for Subclasses of Rational Relations over Finite and Infinite Words
pp. 350
Information Sources About Hydrogeological Disasters: The Role of Trust
pp. 357
The Application of an Object-Oriented Method in Information System Security Evaluation
pp. 394
Queries on structures in hypertext
pp. 399
A Framework for User-Driven Mapping Discovery in Rich Spaces of Heterogeneous Data
pp. 404
Trace-Driven Verification of Multithreaded Programs
pp. 219
Genetically Optimized Fuzzy Set-Based Polynomial Neural Networks Based on Information Granules with Aids of Symbolic Genetic Algorithms
pp. 225
When Does a Pair Outperform Two Individuals?
pp. 237
Polytopal Graph Complexity, Matrix Permanents, and Embedding
pp. 250
Analysis of Birefringent Characteristics of Photonic Crystal Fibers Filled Magnetic Fluid
pp. 261
d-Monomial Tests of Nonlinear Cellular Automata for Cryptographic Design
pp. 264
Theoretical and Methodological Considerations in the Comparison of Performance and Physiological Measures of Mental Workload
pp. 264
Structural and Event Based Multimodal Video Data Modeling
pp. 273
Fusing Features in Direct Volume Rendered Images
pp. 280
New Scheme for Design of Static Virtual Topology in Wide Area Optical Networks
pp. 301
Middleware for Ubiquitous Computing
pp. 354
ML4PG in Computer Algebra Verification
pp. 418
Ontologies and Human Users: A Systematic Analysis of the Influence of Ontology Documentation on Community Agreement About Type Membership
pp. 225
Evaluation of the Distributed Fuzzy Contention Control for IEEE 802.11 Wireless LANs
pp. 234
Being Jane Malkovich: A Look Into the World of an XP Customer
pp. 239
Bounds on the Number of Users for Random 2-Secure Codes
pp. 247
Gesture Recognition Based on Manifold Learning
pp. 265
A lower bound of 1/2n2 on linear search programs for the knapsack problem
pp. 269
Results of a Tailored Communication Framework Through E-Health
pp. 277
LEIRIOS Test Generator: Automated Test Generation from B Models
pp. 331
Enhancing Approximations for Regular Reachability Analysis
pp. 346
Chameleon: A Lightweight Method for Thwarting Relay Attacks in Near Field Communication
pp. 352
A Bypass-Sensitive Blocking-Preventing Scheduling Technique for Mesh-Connected Multicomputers
pp. 357
A knowledge-theoretic semantics for concurrent MetateM
pp. 364
Tabu Search Approach for the Bi-Level Competitive Base Station Location Problem
pp. 367
Logic and Games for Ethical Agents in Normative Multi-agent Systems
pp. 425
Reduction of Test Suites Using Mutation
pp. 436
Reasoning about Safety and Progress Using Contracts
pp. 139
DATAVIEW’10 - PC Co-chairs Message
pp. 233
Improved Genetic Algorithm-Based FSMC Design for Multi-nonlinear System
pp. 260
Scalable Dynamic Self-Organising Maps for Mining Massive Textual Data
pp. 268
Global Stability of a Class of High-Order Recurrent Neural Networks with Multiple Delays
pp. 298
Konvergente numerische Schranken für partielle Randwertaufgaben von monotoner Art
pp. 308
Arousal Prediction of News Articles in Social Media
pp. 308
The MediaCup: Awareness Technology Embedded in an Everyday Object
pp. 340
Generating Small Automata and the Černý Conjecture
pp. 387
Optimization Approaches for Solving Chance Constrained Stochastic Orienteering Problems
pp. 390
Problem Frames and Architectures for Security Problems
pp. 445
Norwegian State of Estate Report as Linked Open Data
pp. 263
Lock-Free Parallel Garbage Collection
pp. 272
An Improved Method for Real-Time 3D Construction of DTM
pp. 278
Hybrid Neural Network Based on ART2—BP Information Fusion Control in Circulating Fluidized Bed Boiler (CFBB)
pp. 303
Direct Estimation of the Stereo Geometry from Monocular Normal Flows
pp. 317
Appendix
pp. 329
Increasing Machine Speed in On-Line Scheduling of Weighted Unit-Length Jobs in Slotted Time
pp. 363
Verifiable Proxy Re-encryption from Indistinguishability Obfuscation
pp. 391
Fast Primal-Dual Gradient Method for Strongly Convex Minimization Problems with Linear Constraints
pp. 395
Applying Agent Based Simulation to the Design of Traffic Control Systems with Respect to Real-World Urban Complexity
pp. 521
Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields
pp. 620
SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip
pp. 282
Depth Estimation Using Variant of Depth of Field by Horizontal Planes of Sharp Focus
pp. 288
An Improved Single Neuron Adaptive PID Controller Based on Levenberg-Marquardt Algorithm
pp. 297
Multi-window System and the Working Memory
pp. 322
Dental Decision Making on Missing Tooth Represented in an Ontology and Rules
pp. 332
Volume Modeling of Myocard Deformation with a Spring Mass System
pp. 374
Software for Evaluating Relevance of Steps in Algebraic Transformations
pp. 471
Fine Slicing
pp. 537
Automated Security Proofs with Sequences of Games
pp. 641
Finding the AES Bits in the Haystack: Reverse Engineering and SCA Using Voltage Contrast
pp. 160
ProcessGene View: An Integrated Visualization of Business Process Models
pp. 292
A Study on Stereo and Motion Data Accuracy for a Moving Platform
pp. 299
Towards Pattern-Driven Engineering of Run-Time Adaptive User Interfaces for Smart Production Environments
pp. 312
Cellular Automata Applied in Remote Sensing to Implement Contextual Pseudo-fuzzy Classification
pp. 323
A Combined Strategy Using FMCDM for Textures Segmentation in Hemispherical Images from Forest Environments
pp. 329
Expressing Constraint Models in Object Oriented Data Using UML and ODL
pp. 393
An ORAM Scheme with Improved Worst-Case Computational Overhead
pp. 467
Derivation of a Suitable Finite Test Suite for Customized Probabilistic Systems
pp. 555
On Robust Combiners for Private Information Retrieval and Other Primitives
pp. 298
Hybrid Genetic Algorithm and Procrustes Analysis for Enhancing the Matching of Graphs Generated from Shapes
pp. 304
Stochastic Resonance in Excitable Neuronal System with Phase-Noise
pp. 322
Impact of Coupling of Distributed Denial of Service Attack with Routing on Throughput of Packet Switching Network
pp. 334
A High-Speed Parallel Architecture for Stereo Matching
pp. 339
Grid Computing: The Future of Distributed Computing for High Performance Scientific and Business Applications
pp. 365
User Care Preference-Based Semantic Service Discovery in a Ubiquitous Environment
pp. 406
A Self-Matching Sliding Block Algorithm Applied to Deduplication in Distributed Storage System
pp. 438
Workplace Learning: How We Keep Track of Relevant Information
pp. 501
A Domain-Specific Language for Scripting Refactorings in Erlang
pp. 269
Comparison of Squall Line Positioning Methods Using Radar Data
pp. 272
Spike Transmission on Diverging/Converging Neural Network and Its Implementation on a Multilevel Modeling Platform
pp. 304
On consecutive storage of records
pp. 311
Determination of Gender and Age Based on Pattern of Human Motion Using AdaBoost Algorithms
pp. 319
User-Oriented Accessibility Patterns for Smart Environments
pp. 324
Effects of Driver Fatigue Monitoring – An Expert Survey
pp. 334
Knowledge-Based Enterprise Modelling Framework
pp. 334
A Cellular Automata-Based Modular Lighting System
pp. 345
The RelaxNG Schema for OMDoc
pp. 402
Design and Implementation of a Parallel Programming Environment Based on Distributed Shared Arrays
pp. 411
Evidence Algorithm and System for Automated Deduction: A Retrospective View
pp. 277
On Clustering Performance Indices for Multispectral Images
pp. 298
Embracing Change: An XP Experience Report
pp. 327
On Positioning for Augmented Reality Systems
pp. 353
Learning Cooperative TSK-0 Fuzzy Rules Using Fast Local Search Algorithms
pp. 388
Partial Order Semantics of Types of Nets
pp. 602
New Proofs for NMAC and HMAC: Security Without Collision-Resistance
pp. 339
Examining the Moderating Effect of Workload on Controller Task Distribution
pp. 353
Structural Optimization of Biomorphic Microcellular Ceramics by Homogenization Approach
pp. 356
Efficient Circuit Construction in Brownian Cellular Automata Based on a New Building-Block for Delay-Insensitive Circuits
pp. 363
Weighted Tardiness Minimization in Job Shops with Setup Times by Hybrid Genetic Algorithm
pp. 449
Region-in-Region Incrementing Visual Cryptography Scheme
pp. 469
Application of Supply Function Equilibrium Model to Describe the Interaction of Generation Companies in the Electricity Market
pp. 518
Analysing UML Use Cases as Contracts
pp. 565
Making the Right Cut in Model Checking Data-Intensive Timed Systems
pp. 211
Application-Services Integration among Multi-clouds for Small and Middle Scale Enterprises
pp. 323
Relations between programs with different storage requirements
pp. 345
Load Balancing Based on Similarity Multi-paths Routing
pp. 349
Cognitive, Perceptual, Sensory and Verbal Abilities as Predictors of PDA Text Entry Error and Instructions Across the Lifespan
pp. 351
Individual Differences in Work Load While Doing Multitasking with a Computer
pp. 365
A Cellular Automaton Controlled Shading for a Building Facade
pp. 373
Interval-Valued Fuzzy Sets for Color Image Super-Resolution
pp. 401
Ontology-Based Competence Management for Team Configuration
pp. 480
Chain Store Against Manufacturers: Regulation Can Mitigate Market Distortion
pp. 541
Realization and Connectivity of the Graphs of Origami Flat Foldings
pp. 300
A Windowing/Pushbroom Hyperspectral Imager
pp. 304
Control of Biped Robot Joints’ Angles Using Coordinated Matsuoka Oscillators
pp. 345
A Flexible Implementation Method of Distributed ANN
pp. 359
Finding a Relationship between Internet Anxiety and Human Behavior
pp. 369
Handling Systems from Non-linear Theory of Elasticity
pp. 387
Qualitative Spatial Relation Database for Semantic Web
pp. 412
A Study on CART Based on Maximum Probabilistic-Based Rough Set
pp. 469
A p2p Framework for Interacting with Learning Objects
pp. 313
Self-calibrating Marker Tracking in 3D with Event-Based Vision Sensors
pp. 351
Prediction of Thermal Comfort Index Using Type-2 Fuzzy Neural Network
pp. 368
Human Behavioral Simulation Using Affordance-Based Agent Model
pp. 387
A Wireless Broadcast Generation Scheme Considering Data Access Frequencies
pp. 400
Automatic Creation and Simplified Querying of Semantic Web Content: An Approach Based on Information-Extraction Ontologies
pp. 437
Modelling and Verifying Mobile Systems Using π-Graphs
pp. 467
Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN
pp. 383
The Application of Collaborative Filtering for Trust Management in P2P Communities
pp. 387
Dynamic Mesh Schemes for Fluid-Structure Interaction
pp. 398
Spreading Activation Model for Connectivity Based Clustering
pp. 403
A Cluster Based Pseudo Feedback Technique Which Exploits Good and Bad Clusters
pp. 449
On Some SAT-Variants over Linear Formulas
pp. 330
A Proposed Neural Control for the Trajectory Tracking of a Nonholonomic Mobile Robot with Disturbances
pp. 413
SAHN with SEP/COP and SPADE, to Build a General Web Navigation Adaptation System Using Server Log Information
pp. 426
Logfile Player and Analyzer for RoboCup 3D Simulation
pp. 538
A Robust Leaky-LMS Algorithm for Sparse System Identification
pp. 257
ISDE’10 - PC Co-chairs Message
pp. 359
Constructing iterative version of a system of recursive procedures
pp. 388
The Influence of Visual Angle on the Performance of Static Images Scanning
pp. 409
Coxeter Groups and Asynchronous Cellular Automata
pp. 423
A New Criteria for Selecting Neighborhood in Memory-Based Recommender Systems
pp. 473
Unambiguous Erasing Morphisms in Free Monoids
pp. 547
Extended Separating Plane Algorithm and NSO-Solutions of PageRank Problem
pp. 341
Biologically-Inspired Visual-Motor Coordination Model in a Navigation Problem
pp. 392
Survey of the Facial Expression Recognition Research
pp. 397
Occurrence of Secondary Tasks and Quality of Lane Changes
pp. 419
Some Formal Properties of Asynchronous Cellular Automata
pp. 269
Experimental Evaluation of ’On-Site Customer’ XP Practice on Quality of Software and Team Effectiveness
pp. 350
Support Vector Machine with Composite Kernels for Time Series Prediction
pp. 407
What Really Is Going on? Review, Critique and Extension of Situation Awareness Theory
pp. 411
Multi-angle View, Illumination and Cosmetic Facial Image Database (MaVIC) and Quantitative Analysis of Facial Appearance
pp. 497
Asynchronous Deterministic Rendezvous on the Line
pp. 694
Alternating Interval Based Temporal Logics
pp. 359
The ChatterBox
pp. 417
Stress and Managers Performance: Age-Related Changes in Psychophysiological Reactions to Cognitive Load
pp. 421
Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram
pp. 423
A User-Friendly Tool for Detecting the Stress Level in a Person’s Daily Life
pp. 433
Picard-Uzawa Schemes: Errors, Convergence and Stopping Criterion
pp. 439
Towards Patterns of Comfort: A Multilayered Model Based on Situated Multi-agent Systems
pp. 455
Flexible Segmentation and Smoothing of DT-MRI Fields Through a Customizable Structure Tensor
pp. 511
Support of Multidimensional Parallelism in the OpenMP Programming Model
pp. 432
”How Do I Line Up?”: Reducing Mental Transformations to Improve Performance
pp. 446
A Pedestrian Movement Model That Takes into Account the Capacity Drop Phenomenon in the Motion of Crowd
pp. 521
Group Input Machine
pp. 297
Revisiting and Improving a Result on Integrity Preservation by Concurrent Transactions
pp. 365
VoIP in Context-Aware Communication Spaces
pp. 374
From Vague or Loose Concepts to Hazy and Fuzzy Sets – Human Understanding Versus Exact Science
pp. 379
Some Things Psychopathologies Can Tell Us about Consciousness
pp. 430
Neural Networks, Fuzzy Inference Systems and Adaptive-Neuro Fuzzy Inference Systems for Financial Decision Making
pp. 436
Context-Aware Notification for Mobile Police Officers
pp. 443
A Middleware Architecture for Designing TV-Based Adapted Applications for the Elderly
pp. 529
Improve OpenMP Performance by Extending BARRIER and REDUCTION Constructs
pp. 307
Evaluation of Metaverse Server in a Widely-Distributed Environment
pp. 351
Combining Agile Practices with UML and EJB: A Case Study in Agile Development
pp. 382
Universal Steganalysis Using Multiwavelet Higher-Order Statistics and Support Vector Machines
pp. 371
The Design and Implementation of the Ubidata Information Dissemination Framework
pp. 450
Pretests for Genetic-Programming Evolved Trading Programs: “zero-intelligence” Strategies and Lottery Trading
pp. 455
Mental Workload in Command and Control Teams: Musings on the Outputs of EAST and WESTT
pp. 461
Developing a User Recommendation Engine on Twitter Using Estimated Latent Topics
pp. 479
Container Problem in Burnt Pancake Graphs
pp. 494
Query Expansion Methods and Performance Evaluation for Reusing Linking Open Data of the European Public Procurement Notices
pp. 398
Stock Index Modeling Using Hierarchical Radial Basis Function Networks
pp. 465
Lightweight Collaborative Activity Patterns in Project Management
pp. 505
Physically-Based Real-Time Diffraction Using Spherical Harmonics
pp. 570
A Machine Checked Soundness Proof for an Intermediate Verification Language
pp. 329
SpotAFriendNow: Social Interaction through Location-Based Social Networks
pp. 469
Trend-Weighted Fuzzy Time-Series Model for TAIEX Forecasting
pp. 479
Selection and Fusion of Similarity Measure Based Classifiers Using Support Vector Machines
pp. 480
A Reference Model for Adaptive Visualization Systems
pp. 503
Near Optimal Routing in a Small-World Network with Augmented Local Awareness
pp. 537
DODDLE-OWL: A Domain Ontology Construction Tool with OWL
pp. 380
QoS and Context Awareness for Mobile Computing
pp. 419
Visual Categorization Based on Learning Contextual Probabilistic Latent Component Tree
pp. 489
On Mixtures of Linear SVMs for Nonlinear Classification
pp. 595
Symbolic Reachability Analysis of Integer Timed Petri Nets
pp. 349
Towards Optimal Multi-item Shopping Basket Management: Heuristic Approach
pp. 383
Anonymous and Confidential Communications from an IP Addressless Computer
pp. 506
Stochastic Transition Model for Discrete Agent Movements
pp. 358
Gossiping for Autonomic Estimation of Network-Based Parameters in Dynamic Environments
pp. 436
Compiler generation using denotational semantics
pp. 372
Comparing Extreme Programming to Traditional Development for Student Projects: A Case Study
pp. 442
On divergence problem for program schemas
pp. 517
Synchronization and Fluctuation of Rhythm in Musical Cooperative Performance
pp. 520
Combining Online Classification Approaches for Changing Environments
pp. 523
Excluded Volume Effect in a Pedestrian Queue
pp. 518
Fault Diagnosis in Nonlinear Circuit Based on Volterra Series and Recurrent Neural Network
pp. 522
Empirical Evidence for a Model of Operator Reaction to Alerting Systems
pp. 530
Optimal Kernel in a Class of Kernels with an Invariant Metric
pp. 532
Simulation on Vehicle Emission by the Brake-Light Cellular Automata Model
pp. 595
Protein Data Sources Management Using Semantics
pp. 378
Semantic Similarity and Selection of Resources Published According to Linked Data Best Practice
pp. 453
The characteristic polynomial of a finite automaton
pp. 457
Aggressive Sub-channel Allocation Algorithm for Intelligent Transmission in Multi-user OFDMA System
pp. 526
Manufacturing Yield Improvement by Clustering
pp. 531
“Investigating the Way National Grid Controllers Visualize the Electricity Transmission Grid Using a Neuro-Linguistic Programming (NLP) Approach”
pp. 539
Shape –Based Human Actions Recognition in Videos
pp. 656
A Formal Model of Business Application Integration from Web Services (Position Paper)
pp. 458
Error detection using regular languages
pp. 547
Dynamic Queries with Relevance Feedback for Content Based Image Retrieval
pp. 394
Design-led & Design-less: One Experiment and Two Approaches
pp. 465
On a relationship between programs of address machines and Mazurkiewicz algorithms
pp. 473
Intelligent Beamforming for Personal Area Network Systems
pp. 551
EEG Activities of Dynamic Stimulation in VR Driving Motion Simulator
pp. 555
Face Sketch Synthesis via Multivariate Output Regression
pp. 557
Cellular Automata for a Cyclic Bus
pp. 472
DIJKSTRA's predicate transformer, non-determinism, recursion, and termination
pp. 562
Experimental Studies of Visual Models in Automatic Image Annotation
pp. 572
Soft Feature Selection by Using a Histogram-Based Classifier
pp. 632
A Pi-Calculus Based Ontology Change Management
pp. 414
Integration of Domain and Social Ontologies in a CMS Based Collaborative Platform
pp. 563
Ensemble of Competitive Associative Nets for Stable Learning Performance in Temperature Control of RCA Cleaning Solutions
pp. 582
Embedded Map Projection for Dimensionality Reduction-Based Similarity Search
pp. 424
ORM’10 - PC Co-chairs Message
pp. 497
A Fast and Accurate Progressive Algorithm for Training Transductive SVMs
pp. 580
Image Skeletonization Based on Curve Skeleton Extraction
pp. 628
Margin Maximizing Discriminant Analysis for Multi-shot Based Object Recognition
pp. 495
On the lower bound for minimum comparison selection
pp. 588
Appearance Similarity Index for Medicinal Ampoule Labels
pp. 602
An Efficient Algorithm for Optimal Multilevel Thresholding of Irregularly Sampled Histograms
pp. 638
A Novel 3D Statistical Shape Model for Segmentation of Medical Images
pp. 515
A New Neural Data Analysis Approach Using Ensemble Neural Network Rule Extraction
pp. 591
Event-Related Potential as a Measure of Effects of Report Order and Compatibility on Identification on Multidimensional Stimulus
pp. 598
A Novel Parallel Clustering Algorithm Based on Artificial Immune Network Using nVidia CUDA Framework
pp. 668
Personal Information Modeling in Semantic Web
pp. 420
Using Metaphors in eXtreme Programming Projects
pp. 457
ORM and MDM/MMS: Integration in an Enterprise Level Conceptual Data Model
pp. 609
Cognitive and Emotional Human Models Within a Multi-agent Framework
pp. 613
Properties of Cellular Automaton Model for On-ramp System
pp. 618
Improving the Usability of Hierarchical Representations for Interactively Labeling Large Image Data Sets
pp. 662
Mining Association Rules from Multi-stream Time Series Data on Multiprocessor Systems
pp. 689
Client and Server Anonymity Preserving in P2P Networks
pp. 533
An Efficient 3-D Positioning Method from Satellite Synthetic Aperture Radar Images
pp. 539
Learning Features and Predictive Transformation Encoding Based on a Horizontal Product Model
pp. 628
The Similarity Index of Character Shape of Medicine Names Based on Character Shape Similarity (II)
pp. 668
Mining Frequent Closed Itemsets Without Candidate Generation
pp. 696
A Map Ontology Driven Approach to Natural Language Traffic Information Processing and Services
pp. 474
A Proposal for Folding in ORM Diagrams
pp. 631
The Impact of Automation and FMS in Flight Safety: Results of a Survey and an Experimental Study
pp. 637
ColoriT: Color Based Image Code Application to Aid in Memory Restoration of Offline Photo Artifacts
pp. 654
A Dynamic Programming Technique for Optimizing Dissimilarity-Based Classifiers
pp. 537
Powerdomains
pp. 548
Secure Authentication Protocol in Mobile IPv6 Networks
pp. 633
Clusters in the Helbing’s Improved Model
pp. 664
Supervised Principal Geodesic Analysis on Facial Surface Normals for Gender Classification
pp. 429
Extending Testability for Automated Refactoring
pp. 648
HILAS Flight Operations Research: Development of Risk/Safety Management, Process Improvement and Task Support Tools
pp. 850
Using Instagram Picture Features to Predict Users’ Personality
pp. 431
Software Configuration Management for Test-Driven Development
pp. 564
Conversion Scheme for Reducing Security Vulnerability in IPv4/ IPv6 Networks
pp. 646
A New Computational Methodology Using Infinite and Infinitesimal Numbers
pp. 658
Analyzing Constraints to Support Computational Modeling of Air Traffic Controllers
pp. 660
A Global Optimal Algorithm for Camera Calibration with One-Dimensional Objects
pp. 713
A Holistic Approach to Survivable Distributed Information System for Critical Applications
pp. 739
Semantic Autocompletion
pp. 572
Improved Location Management for Reducing Traffic Cost in 3G Mobile Networks
pp. 589
An Adaptive Threshold Neural-Network Scheme for Rotorcraft UAV Sensor Failure Diagnosis
pp. 650
Molecular Implementations of Cellular Automata
pp. 668
Risk-Based Information Integration for Ship Navigation
pp. 731
Lip Detection Using Confidence-Based Adaptive Thresholding
pp. 677
High-Quality Fast Image Upsampling Algorithm Based on CUDA
pp. 678
Experimental Thermal/Moisture Mapping of Industrial Safety Helmets
pp. 437
Mitigating Risks in Mobile System Development
pp. 687
Common Work Space or How to Support Cooperative Activities Between Human Operators and Machine: Application to Air Traffic Control
pp. 714
Scale-Space Kernels for Additive Modeling
pp. 743
A Distributed Power-Efficient Data Gathering and Aggregation Protocol for Wireless Sensor Networks
pp. 751
A Critical Appraisal of the Box Counting Method to Assess the Fractal Dimension of Tree Crowns
pp. 697
Human Performance Enhancements: From Certification to HCI Innovation
pp. 724
Learning Curves for the Analysis of Multiple Instance Classifiers
pp. 757
A Key Management Scheme for Cross-Layering Designs in Wireless Sensor Networks
pp. 596
Multiplicity functions on ω-automata
pp. 612
Infinite Sparse Threshold Unit Networks
pp. 769
A Clustering Mechanism with Various Cluster Sizes for the Sensor Network
pp. 443
Collecting Data in Web Service Development
pp. 620
Learning Two-Layer Contractive Encodings
pp. 716
Confucius in Western Cockpits: The Investigation of Long-Term Versus Short-Term Orientation Culture and Aviation Accidents
pp. 629
Effects of Architecture Choices on Sparse Coding in Speech Recognition
pp. 565
Re-engineering Business Rules for a Government Innovation Information Portal
pp. 641
On the Profitability of Scalping Strategies Based on Neural Networks
pp. 741
Evaluation of the Effects of Visual Field on Road Sign Recognition
pp. 775
A New Solution Scheme of Unsupervised Locality Preserving Projection Method for the SSS Problem
pp. 451
Coaching for Agile and Xtreme Practices A Fishbowl with Piranhas
pp. 661
Dynamic Stopping Improves the Speed and Accuracy of a P300 Speller
pp. 790
Automatic Classification of NMR Spectra by Ensembles of Local Experts
pp. 801
Bagging, Random Subspace Method and Biding
pp. 606
Reflecting on a Process to Automatically Evaluate Ontological Material Generated Automatically
pp. 677
Recognizing Human Activities Using a Layered Markov Architecture
pp. 779
Classification of Blink Waveforms Towards the Assessment of Driver’s Arousal Level - An Approach for HMM Based Classification from Blinking Video Sequence
pp. 811
Use of Structured Pattern Representations for Combining Classifiers
pp. 685
PSO for Reservoir Computing Optimization
pp. 787
Classification of Blink Waveforms Toward the Assessment of Driver’s Arousal Levels - An EOG Approach and the Correlation with Physiological Measures
pp. 821
Combination of Experts by Classifiers in Similarity Score Spaces
pp. 626
EPICA: Easy Persistent Identifier Common Architecture
pp. 684
Human Hand Detection Using Evolutionary Computation for Gestures Recognition of a Partner Robot
pp. 796
Common Work Space or How to Support Cooperative Activities Between Human Operators: Application to Fighter Aircraft
pp. 870
TCP and ICMP in Network Measurement: An Experimental Evaluation
pp. 635
Knowledge Representation with Autonomic Ontologies
pp. 806
Culture and Communication in the Philippine Aviation Industry
pp. 882
Fuzzy Congestion Avoidance in Communication Networks
pp. 645
Semantic Support for Computer-Human Interaction: Intuitive 3DVirtual Tools for Surface Deformation in CAD
pp. 699
Emergence of Flocking Behavior Based on Reinforcement Learning
pp. 814
Future Trends in Flight Deck Equipment
pp. 707
Real Time Head Nod and Shake Detection Using HMMs
pp. 665
Automatic Support for Product Based Workflow Design: Generation of Process Models from a Product Data Model
pp. 726
A Computational Model of Motor Areas Based on Bayesian Networks and Most Probable Explanations
pp. 826
Neuro-genetic Approach for Solving Constrained Nonlinear Optimization Problems
pp. 874
Behavior Analysis of Volume Prototypes in High Dimensionality
pp. 675
OTMA’10 - PC Co-chairs Message
pp. 836
An Improved Primal-Dual Genetic Algorithm for Optimization in Dynamic Environments
pp. 842
Development and Evaluation of a Multimodal Touchpad for Advanced In-Vehicle Systems
pp. 733
Developing a Decision Support System for a Dove’s Voice Competition
pp. 933
Research of Power-Aware Dynamic Adaptive Replica Allocation Algorithm in Mobile Ad Hoc Networks
pp. 682
On the Social Dynamics of Ontological Commitments
pp. 860
A Research of Speech Signal of Fire Information Display Interface
pp. 926
A Pruning Rule Based on a Distance Sparse Table for Hierarchical Similarity Search Algorithms
pp. 966
Constructing the Robust and Efficient Small World Overlay Network for P2P Systems
pp. 884
EFuNN Ensembles Construction Using a Clustering Method and a Coevolutionary Multi-objective Genetic Algorithm
pp. 937
Classification and Automatic Annotation Extension of Images Using Bayesian Network
pp. 711
Automatic Exposure Control in Digital Mammography: Contrast-to-Noise Ratio Versus Average Glandular Dose
pp. 774
Fuzzy Model for the Assessment of Operators’ Work in a Cadastre Information System
pp. 947
Selection of Suitable Set of Decision Rules Using Choquet Integral
pp. 782
Local Buffer as Source of Web Mining Data
pp. 900
A Multi-objective Evolutionary Algorithm for Multi-UAV Cooperative Reconnaissance Problem
pp. 956
Evaluating the Stability of Feature Selectors That Optimize Feature Subset Cardinality
pp. 910
Global and Local Contrast Enhancement for Image by Genetic Algorithm and Wavelet Neural Network
pp. 967
A Learning Scheme for Recognizing Sub-classes from Model Trained on Aggregate Classes
pp. 1012
Hyper-Erlang Based Model for Network Traffic Approximation
pp. 1024
Prediction-Based Multicast Mobility Management in Mobile Internet
pp. 813
Construction of School Temperature Measurement System with Sensor Network
pp. 946
Mitigating Deception in Genetic Search Through Suitable Coding
pp. 869
Texture Image Segmentation Based on Improved Wavelet Neural Network
pp. 1101
Throughput Analysis for Fully-Connected Ad Hoc Network with Multiuser Detection
pp. 1123
An Efficient Cache Access Protocol in a Mobile Computing Environment
pp. 1022
Approximation Accuracy of Table Look-Up Scheme for Fuzzy-Neural Networks with Bell Membership Function
pp. 1070
Stability of Periodic Solution in Fuzzy BAM Neural Networks with Finite Distributed Delays
pp. 930
The Influences of R&D Expenditures on Knowledge-Based Economy in Taiwan
pp. 1079
Design Methodology of Optimized IG_gHSOFPNN and Its Application to pH Neutralization Process
pp. 1024
Technical and Fundamental Analysis for the Forecast of Financial Scrip Quotation: An Approach Employing Artificial Neural Networks and Wavelet Transform
pp. 1141
Synchronization Via Multiplex Spike-Trains in Digital Pulse Coupled Networks
pp. 1168
A Digital Hardware Architecture of Self-Organizing Relationship (SOR) Network
pp. 1035
A Design of Hybrid Mobile Multimedia Game Content
pp. 1189
Neurocomputing for Minimizing Energy Consumption of Real-Time Operating System in the System-on-a-Chip
pp. 1199
A Novel Multiplier for Achieving the Programmability of Cellular Neural Network
pp. 1068
Development of a Monitoring Module for ITS (Intrusion Tolerant System)
pp. 1120
Hydro Plant Dispatch Using Artificial Neural Network and Genetic Algorithm
pp. 1102
A Legal Architecture for Digital Ecosystems
pp. 1136
Interpretation of Group Measurements of Validation Data Using Fuzzy Techniques in an Object-Oriented Approach
pp. 1176
Using Windows Printer Drivers for Solaris Applications – An Application of Multiagent System
pp. 1216
An Online Method for Detecting Nonlinearity Within a Signal
pp. 1280
Sensor Network Localization Using Least Squares Kernel Regression
Similar content
5,451
Finding a needle in a haystack or identifying anonymous census records
Authors:
T Dalenius
,
Dalenius T.
Ensuring anonymity in survey panel research
Authors:
Kees Mulder
AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption
Authors:
Xiang-Yang Li
,
Meng Wan
,
Zhiguo Wan
…
See all similar
Cited by
85
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
Authors:
Benny Applebaum
,
David W. Cash
,
Chris Peikert
…
Practical Verifiable Encryption and Decryption of Discrete Logarithms
Authors:
Jan Camenisch
,
Victor Shoup
Privacy in the Smart City—Applications, Technologies, Challenges, and Solutions
Authors:
David Eckhoff
,
Isabel V Wagner
See all cited by