Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
24
views
33
references
Top references
cited by
8
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,871
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Graph-Theoretic Concepts in Computer Science : 24th International Workshop, WG’98, Smolenice Castle, Slovak Republic, June 18-20, 1998. Proceedings
Robotics and Integrated Formal Methods: Necessity Meets Opportunity
other
Author(s):
Marie Farrell
,
Matt Luckcuck
,
Michael Fisher
Publication date
(Online):
August 09 2018
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
AI & Robotics
Most cited references
33
Record
: found
Abstract
: not found
Article
: not found
Analysing robot swarm behaviour via probabilistic model checking
Savas Konur
,
Clare Dixon
,
Michael M. Fisher
(2012)
0
comments
Cited
18
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Model checking agent programming languages
Michael W. Fisher
,
Louise A. Dennis
,
Rafael H Bordini
…
(2012)
0
comments
Cited
17
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
The dMARS Architecture: A Specification of the Distributed Multi-Agent Reasoning System
Michael Wooldridge
,
Mark d'Inverno
,
Michael Luck
…
(2004)
0
comments
Cited
16
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2018
Publication date (Online):
August 09 2018
Pages
: 161-171
DOI:
10.1007/978-3-319-98938-9_10
SO-VID:
cae2ab03-873f-4a04-8a48-a8a1ade3adcf
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
RDF Querying: Language Constructs and Evaluation Methods Compared
pp. 1
Understanding TwitterTM Use among Parliament Representatives: A Genre Analysis
pp. 1
Aesthetics, Art, Evolution
pp. 1
RoboCup: A challenge problem for AI and robotics
pp. 1
Asymptotically Optimal Discrimination between Pure Quantum States
pp. 1
Theorizing in Design Science Research
pp. 1
Towards fault-tolerant and secure agentry
pp. 1
Managing Dynamic Reconfiguration in Component-Based Systems
pp. 1
Logic and databases: A 20 year retrospective
pp. 1
Conceptual Graphs: Draft Proposed American National Standard
pp. 1
The complexity class θp2: Recent results and applications in AI and modal logic
pp. 1
Seven Numeric Properties of Effectiveness Metrics
pp. 1
Designing Acceptable Assisted Living Services for Elderly Users
pp. 1
Environments for Multiagent Systems State-of-the-Art and Research Challenges
pp. 1
A Smell of Orchids
pp. 1
A Spatio-Temporal Taxonomy for the Representation of Spatial Set Behaviours
pp. 1
Edit-Distance of Weighted Automata
pp. 1
Three Complementary Approaches to Bidirectional Programming
pp. 1
Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited
pp. 1
First Class Patterns?
pp. 1
Completely Reachable Automata
pp. 1
Abstract Models of Computation in Cryptography
pp. 1
Region-Based Interactive Ranking Optimization for Person Re-identification
pp. 1
Intelligent Techniques for Web Personalization
pp. 1
Evoking Comprehensive Mental Models of Anonymous Credentials
pp. 1
Linear Time Solvable Optimization Problems on Graphs of Bounded Clique Width
pp. 1
Recent developments in maximum flow algorithms
pp. 1
Predictive Business Operations Management
pp. 1
Cyber-Physical Systems: Imminent Challenges
pp. 1
A Curious Emergence of Reaching
pp. 1
Formal Modeling and Analysis of Software Architecture: Components, Connectors, and Events
pp. 1
The Useful MAM, a Reasonable Implementation of the Strong \(\lambda \) -Calculus
pp. 1
SPEComp: A New Benchmark Suite for Measuring Parallel Computer Performance
pp. 2
Ontological Query Answering with Existential Rules
pp. 3
5G New Radio System Performance Analysis Using Limited Resource Queuing Systems with Varying Requirements
pp. 3
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks
pp. 3
The Sixth Visual Object Tracking VOT2018 Challenge Results
pp. 3
LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors
pp. 3
Image Anomaly Detection with Generative Adversarial Networks
pp. 4
A framework for the synthesis of reactive modules
pp. 5
Translating AADL into BIP - Application to the Verification of Real-Time Systems
pp. 6
Using a Learning Agent with a Student Model
pp. 7
Fundamentals of cardinality constraints
pp. 9
Real-Time Marker-Free Patient Registration and Image-Based Navigation Using Stereovision for Dental Surgery
pp. 10
Polyhedral Methods for Space Curves Exploiting Symmetry Applied to the Cyclic n-roots Problem
pp. 11
A Formally-Verified Alias Analysis
pp. 11
Hybrid MPI and OpenMP Parallel Programming
pp. 11
Simple Geodesic Regression for Image Time-Series
pp. 11
Reproducible Measurements of MPI Performance Characteristics
pp. 11
Hamiltonian abstract Voronoi diagrams in linear time
pp. 11
Toward a Formal Common Information Model Ontology
pp. 11
Towards Live Monocular 3D Laparoscopy Using Shading and Specularity Information
pp. 12
Humanitarian Information Management and Systems
pp. 12
Ontology-Based Integration of Management Behaviour and Information Definitions Using SWRL and OWL
pp. 12
Issues in Developing a Thread-Safe MPI Implementation
pp. 13
Is E-Government Research a Flash in the Pan or Here for the Long Shot?
pp. 13
InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services
pp. 13
Big Data Cleaning
pp. 13
Specifying and verifying distributed Intelligent systems
pp. 13
On local search for weighted κ-set packing
pp. 14
Provably-Secure Schemes for Basic Query Support in Outsourced Databases
pp. 14
Security Assessments of Safety Critical Systems Using HAZOPs
pp. 15
Quadratic variation of deformations
pp. 16
Derivatives of Containers
pp. 16
The Role of B2B Protocols in Inter-Enterprise Process Execution
pp. 16
A duration calculus with infinite intervals
pp. 16
Structure from Periodic Motion
pp. 17
An Emulator for Exploring RaPiD Configurable Computing Architectures
pp. 17
Security-Informed Safety: If It’s Not Secure, It’s Not Safe
pp. 17
Usage Control: A Vision for Next Generation Access Control
pp. 18
Checking Component Composability
pp. 19
Methodological Approach to the Definition of a Blockchain System for the Food Industry Supply Chain Traceability
pp. 19
BrailleTouch: Mobile Texting for the Visually Impaired
pp. 19
A rewriting of Fife's theorem about overlap-free words
pp. 20
On the Effectiveness of Techniques to Detect Phishing Sites
pp. 20
Mobile Computing Middleware
pp. 21
Pogo, a Middleware for Mobile Phone Sensing
pp. 21
Group-Oriented Modelling Tools with Heterogeneous Semantics
pp. 22
Behavioural Investigations of Financial Trading Agents Using Exchange Portal (ExPo)
pp. 22
Cross-Domain Interoperability: A Case Study
pp. 24
Challenges and Recommendations When Increasing the Realism of Controlled Software Engineering Experiments
pp. 25
Measuring the Ability of Score Distributions to Model Relevance
pp. 25
Making Visible the Invisible. Augmented Reality Visualization for 3D Reconstructions of Archaeological Sites
pp. 25
A Comparison of Neural Networks with Time Series Models for Forecasting Returns on a Stock Market Index
pp. 25
Modeling and Simulation of Data Center Energy-Efficiency in CoolEmAll
pp. 25
Emergent Semantics Principles and Issues
pp. 26
The Arrowsmith Project: 2005 Status Report
pp. 26
Generating sparse spanners for weighted graphs
pp. 26
DiCoT: A Methodology for Applying Distributed Cognition to the Design of Teamworking Systems
pp. 26
Local and Global Skeleton Fitting Techniques for Optical Motion Capture
pp. 26
From Tweets to Semantic Trajectories: Mining Anomalous Urban Mobility Patterns
pp. 26
A Functional Ontology of Observation and Measurement
pp. 26
Formal methods in the railways signalling industry
pp. 26
TASTE: A Real-Time Software Engineering Tool-Chain Overview, Status, and Future
pp. 26
Towards a Living Lab for Information Retrieval Research and Development
pp. 27
Named Entity Recognition and Resolution in Legal Text
pp. 27
Remote Software-Based Attestation for Wireless Sensors
pp. 27
Cultural Algorithms for the Set Covering Problem
pp. 28
Coordination as constrained interaction (extended abstract)
pp. 28
It’s Computational Thinking! Bebras Tasks in the Curriculum
pp. 28
Gossip-Based Clock Synchronization for Large Decentralized Systems
pp. 30
Formal Verification of Programs That Use MPI One-Sided Communication
pp. 30
A Kleene Theorem for a Class of Communicating Automata with Effective Algorithms
pp. 30
Lazy Infinite-State Analysis of Security Protocols
pp. 31
A Social Semantics for Agent Communication Languages
pp. 32
XML-OLAP: A Multidimensional Analysis Framework for XML Warehouses
pp. 32
Say Anything: A Massively Collaborative Open Domain Story Writing Companion
pp. 32
Natural Language Processing and Information Retrieval
pp. 32
Challenges and Experiences in Managing Large-Scale Proofs
pp. 33
Formal Analysis of BPMN Models Using Event-B
pp. 34
Data Modelling for Analysis of Adaptive Changes in Fly Photoreceptors
pp. 34
An Attribute Grammar Decoder for the 01 MultiConstrained Knapsack Problem
pp. 34
Differential-Revelation VCG Mechanisms for Combinatorial Auctions
pp. 35
Challenges in Model-Driven Software Engineering
pp. 35
Modelling Attack-defense Trees Using Timed Automata
pp. 36
An Incremental Model for Combinatorial Maximization Problems
pp. 36
Representational Correspondence as a Basic Principle of Diagram Design
pp. 36
Using Genetic Algorithms in the Housing Market Analysis
pp. 37
Coercion-Resistant Electronic Elections
pp. 37
Stylometric Analysis for Authorship Attribution on Twitter
pp. 38
Proof Terms for Simply Typed Higher Order Logic
pp. 38
A Coordination Theory Perspective to Improve the Use of Open Data in Policy-Making
pp. 38
Private Information Disclosure from Web Searches
pp. 38
The Motivational Appeal of Interactive Storytelling: Towards a Dimensional Model of the User Experience
pp. 40
Spectral Analysis of CNN for Tomato Disease Identification
pp. 40
A Symbolic Framework for Model-Based Testing
pp. 41
An Epidemic Protocol for Managing Routing Tables in Very Large Peer-to-Peer Networks
pp. 41
LPL, Towards a GDPR-Compliant Privacy Language: Formal Definition and Usage
pp. 41
On the Generalization Ability of Geometric Semantic Genetic Programming
pp. 43
Efficient Maximum Closeness Centrality Group Identification
pp. 43
Towards Robust CT-Ultrasound Registration Using Deep Learning Methods
pp. 43
Reasoning with the formal definition of standard ML in HOL
pp. 44
User-Specific Semantic Integration of Heterogeneous Data: The SIRUP Approach
pp. 44
Theme and Variations on the Concatenation Product
pp. 45
Fast and optimal simulations between CRCW PRAMs
pp. 45
Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks
pp. 46
Stubborn Sets for Standard Properties
pp. 47
On Trust Establishment in Mobile Ad-Hoc Networks
pp. 47
Formal Semantics and Analysis of Behavioral AADL Models in Real-Time Maude
pp. 47
A Robust and Scalable Peer-to-Peer Gossiping Protocol
pp. 48
The Domain-Specific Task of CLEF - Specific Evaluation Strategies in Cross-Language Information Retrieval
pp. 48
Effect Analysis for Programs with Callbacks
pp. 48
Competitive Hill-Climbing Strategies for Replica Placement in a Distributed File System
pp. 49
A Modified Binary Differential Evolution Algorithm
pp. 49
Decision Forests for Segmentation of the Left Atrium from 3D MRI
pp. 49
Towards a Certified Computation of Homology Groups for Digital Images
pp. 50
Generalized coloring for tree-like graphs
pp. 50
Difference Map Readability for Dynamic Graphs
pp. 50
In-Close2, a High Performance Formal Concept Miner
pp. 50
Human-PnP: Ergonomic AR Interaction Paradigm for Manual Placement of Rigid Bodies
pp. 50
Open-Source Portuguese–Spanish Machine Translation
pp. 51
The Reflective Practitioner Perspective in eXtreme Programming
pp. 51
Efficient Experimental String Matching by Weak Factor Recognition*
pp. 52
Composition and Reuse with Compiled Domain-Specific Languages
pp. 52
Personalisation of Learning in Virtual Learning Environments
pp. 53
Adding continuous components to L-systems
pp. 54
Multi-track Annotation of Child Language and Gestures
pp. 54
Stage-Based Augmented Edutainment
pp. 54
Smart Environments and Context-Awareness for Lifestyle Management in a Healthy Active Ageing Framework
pp. 55
Distribution Rules for Array Database Queries
pp. 55
Restarting Automata and Their Relations to the Chomsky Hierarchy
pp. 56
Trend Detection in Folksonomies
pp. 57
One-Input-Face MPCVP Is Hard for L, But in LogDCFL
pp. 58
The Influence of Control on the Acceptance of Ambient Intelligence by Elderly People: An Explorative Study
pp. 58
Patient Classification of fMRI Activation Maps
pp. 59
Multiplayer Cost Games with Simple Nash Equilibria
pp. 59
Even Better DCAS-Based Concurrent Deques
pp. 60
Internet Scale User-Generated Live Video Streaming: The Twitch Case
pp. 60
TIMES: A Tool for Schedulability Analysis and Code Generation of Real-Time Systems
pp. 61
Managing Borderline and Noisy Examples in Imbalanced Classification by Combining SMOTE with Ensemble Filtering
pp. 61
The Behavior-Oriented Design of Modular Agent Intelligence
pp. 61
Multi-objective Improvement of Software Using Co-evolution and Smart Seeding
pp. 61
Evaluating Bluetooth as a Medium for Botnet Command and Control
pp. 62
Auditory and Visual Recognition of Emotional Behaviour of Foreign Language Subjects (by Native and Non-native Speakers)
pp. 62
A Study of Some Multi-agent Meta-models
pp. 62
Case-Based User Profiling for Content Personalisation
pp. 62
Privacy Protection in High Security Biometrics Applications
pp. 63
An Empirical Analysis on Temporal Pattern of Credit Card Trade
pp. 64
Silhouette-Based Method for Object Classification and Human Action Recognition in Video
pp. 64
Flow-Based Security Issue Detection in Building Automation and Control Networks
pp. 64
PHM: Mining Periodic High-Utility Itemsets
pp. 64
Classifying Criminal Charges in Chinese for Web-Based Legal Services
pp. 65
Types and Roles of Legal Ontologies
pp. 66
Combining a Logical and a Numerical Method for Data Reconciliation
pp. 66
Kernels for Structured Data
pp. 66
Operational Semantics of Security Protocols
pp. 67
MSPASS: Modal Reasoning by Translation and First-Order Resolution
pp. 67
A Logical Framework for Integrating Inconsistent Information in Multiple Databases
pp. 68
Classification of CA Rules Targeting Synthesis of Reversible Cellular Automata
pp. 68
Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware
pp. 68
Towards Linked Open Services and Processes
pp. 68
A New State-of-The-Art Czech Named Entity Recognizer
pp. 69
On Selecting an Appropriate Colour Space for Skin Detection
pp. 69
CacheZoom: How SGX Amplifies the Power of Cache Attacks
pp. 69
Social Aspects to Support Opportunistic Networks in an Academic Environment
pp. 70
Games and Model Checking for Guarded Logics
pp. 71
The Cinderella Game on Holes and Anti-holes
pp. 72
PIATS: A Partially Sanitizable Signature Scheme
pp. 73
Better Filtering with Gapped q-Grams
pp. 73
DJ: Dynamic Adaptive Programming in Java
pp. 73
The Test Automation Manifesto
pp. 73
Object Classification Using a Fragment-Based Representation
pp. 75
Leaf Segmentation and Tracking Using Probabilistic Parametric Active Contours
pp. 75
A Generalized Threats Search Algorithm
pp. 76
Affective Appraisal versus Cognitive Evaluation in Social Emotions and Interactions
pp. 76
Querying Context-Aware Databases
pp. 76
Genetic Programming, Ensemble Methods and the Bias/Variance Tradeoff – Introductory Investigations
pp. 76
Big Security for Big Data: Addressing Security Challenges for the Big Data Infrastructure
pp. 76
Foundations of Description Logics
pp. 79
Data Clustering Using Harmony Search Algorithm
pp. 79
The Mojette Transform: The First Ten Years
pp. 80
Multi-perspective Anomaly Detection in Business Process Execution Events
pp. 81
Modelling Component Dependencies to Inform Their Selection
pp. 81
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves
pp. 82
An Aspect-Oriented Approach for Developing Self-Adaptive Fractal Components
pp. 82
Attractor Equivalence: An Observational Semantics for Reaction Networks
pp. 82
Fast iterative reconstruction of band-limited images from non-uniform sampling values
pp. 82
Formulating Queries for Assessing Clinical Trial Eligibility
pp. 83
Higher Order Rippling in IsaPlanner
pp. 83
Revisiting Character-Based Affective Storytelling under a Narrative BDI Framework
pp. 85
A Fragment-Based Approach to Object Representation and Classification
pp. 85
On Plane Constrained Bounded-Degree Spanners
pp. 86
Concordia: An infrastructure for collaborating mobile agents
pp. 86
Adding Adaptive Features to Virtual Reality Interfaces for E-Commerce
pp. 87
DFS tree construction: Algorithms and characterizations
pp. 87
Core Algorithms of the Maui Scheduler
pp. 87
Experiments with Test Case Generation and Runtime Analysis
pp. 87
Revisiting the relationship between non-blocking atomic commitment and consensus
pp. 87
Hyperparameter Optimization with Factorized Multilayer Perceptrons
pp. 88
Netlog, a Rule-Based Language for Distributed Programming
pp. 88
The Characterization of 2 n -Periodic Binary Sequences with Fixed 1-Error Linear Complexity
pp. 89
Developing Multi-agent Systems with JADE
pp. 89
Essential Proteins Discovery from Weighted Protein Interaction Networks
pp. 89
Case-Based Recommender Systems: A Unifying View
pp. 89
Is Document Frequency Important for PRF?
pp. 89
ObjectCurry:An Object-Oriented Extension of the Declarative Multi-Paradigm Language Curry
pp. 89
Degrees of non-determinism and concurrency: A Petri net view
pp. 89
RoboCup 2012 Best Humanoid Award Winner NimbRo TeenSize
pp. 89
Myocardial Segmentation Using Constrained Multi-Seeded Region Growing
pp. 90
Convex Hull Abstractions in Specialization of CLP Programs
pp. 90
Managing Uncertainty in Schema Matching with Top-K Schema Mappings
pp. 91
DB-Nets: On the Marriage of Colored Petri Nets and Relational Databases
pp. 92
VISCERAL: Towards Large Data in Medical Imaging — Challenges and Directions
pp. 92
Multivariate Prediction for Learning on the Semantic Web
pp. 92
On the Performance of Parallel Tasking Runtimes for an Irregular Fast Multipole Method Application
pp. 92
A Study of RPL DODAG Version Attacks
pp. 93
A Developmental Method for Growing Graphs and Circuits
pp. 93
Symbolic Versus Numerical Computation and Visualization of Parameter Regions for Multistationarity of Biological Networks
pp. 94
The CORAS Framework for a Model-Based Risk Management Process
pp. 95
Microservices: How To Make Your Application Scale
pp. 95
On the Structure of Sequential Search: Beyond “No Free Lunch”
pp. 95
Presenting Distributive Laws
pp. 95
Lambek Grammars Based on Pregroups
pp. 96
Verifying correctness of logic programs
pp. 97
Three approaches to type structure
pp. 98
Quo Vadis, Evolutionary Computation?
pp. 98
AutoMap and AutoLink tools for communicating complex and dynamic data-structures using MPI
pp. 98
Automatic Ultrasound Image Analysis in Hashimoto’s Disease
pp. 98
Spatial Prepositions and Vague Quantifiers: Implementing the Functional Geometric Framework
pp. 98
Modeling Two-Player Games in the Sigma Graphical Cognitive Architecture
pp. 98
Phenotypic Diversity in Initial Genetic Programming Populations
pp. 99
A Decentralized Redeployment Algorithm for Improving the Availability of Distributed Systems
pp. 99
Testing against formal specifications: A theoretical view
pp. 100
The Social Side of Technical Practices
pp. 101
Analyzing the Bitcoin Ponzi Scheme Ecosystem
pp. 102
An Efficient Attack of a McEliece Cryptosystem Variant Based on Convolutional Codes
pp. 103
Approximate k-Space Models and Deep Learning for Fast Photoacoustic Reconstruction
pp. 103
Unveiling Scholarly Communities over Knowledge Graphs
pp. 104
Ring Signature with Designated Linkability
pp. 105
Bidirectional Transformation of Model-Driven Spreadsheets
pp. 106
Detecting Pedophile Activity in BitTorrent Networks
pp. 106
A Very Elementary Presentation of the Hannenhalli-Pevzner Theory
pp. 106
VeryVote: A Voter Verifiable Code Voting System
pp. 108
Attention-Driven Deep Learning for Pathological Spine Segmentation
pp. 108
A Model of Countable Nondeterminism in Guarded Type Theory
pp. 108
A Virtual Machine for Functional Logic Computations
pp. 108
Graph-Modeled Data Clustering: Fixed-Parameter Algorithms for Clique Generation
pp. 109
Flattening on the Fly: efficient handling of MPI derived datatypes
pp. 109
Implementation of a Linear Tabling Mechanism
pp. 109
XPath: Looking Forward
pp. 110
Endoscopic Sheffield Index for Unsupervised In Vivo Spectral Band Selection
pp. 111
A Faster and More Realistic Flush+Reload Attack on AES
pp. 112
Automated Lattice Drawing
pp. 112
A role-based decision-mechanism for teams of reactive and coordinating agents
pp. 112
On NFA Reductions
pp. 113
Using Tag Recommendations to Homogenize Folksonomies in Microblogging Environments
pp. 113
Equational Reasoning on Ad Hoc Networks
pp. 113
Between Agents and Mean Fields
pp. 115
Generation of Checking Sequences Using Identification Sets
pp. 116
A Hybrid GRASP with Data Mining for the Maximum Diversity Problem
pp. 116
Rewriting regular inequalities
pp. 116
Wireless Epidemic Spread in Dynamic Human Networks
pp. 117
Automated Synthesis of Safe Autonomous Vehicle Control Under Perception Uncertainty
pp. 117
Collaborative Architectures of Fuzzy Modeling
pp. 118
Slot Grammar
pp. 118
Robustness and Implementability of Timed Automata
pp. 119
A Simple Linear Time LexBFS Cograph Recognition Algorithm
pp. 119
A Random Sampling Technique for Training Support Vector Machines
pp. 120
Experimenting with eXtreme Design
pp. 120
GP-EndChess: Using Genetic Programming to Evolve Chess Endgame Players
pp. 120
Image Reconstruction via Variational Network for Real-Time Hand-Held Sound-Speed Imaging
pp. 121
Non-erasing Variants of the Chomsky–Schützenberger Theorem
pp. 121
Monitoring, Security, and Dynamic Configuration with the dynamicTAO Reflective ORB
pp. 121
Breast Tumor Detection in Ultrasound Images Using Deep Learning
pp. 122
Efficient Sequential Clamping for Lifted Message Passing
pp. 122
A Deduction Method Complete for Refutation and Finite Satisfiability
pp. 123
Neighborhood-Based Topology Recognition in Sensor Networks
pp. 123
Latent Patient Profile Modelling and Applications with Mixed-Variate Restricted Boltzmann Machine
pp. 124
Robust Detection of Transform Domain Additive Watermarks
pp. 124
An experiment in partial evaluation: The generation of a compiler generator
pp. 125
The interprocedural coincidence theorem
pp. 125
Mining association rules in multiple relations
pp. 126
Combining Recommender and Reputation Systems to Produce Better Online Advice
pp. 127
Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other Primitives
pp. 127
Independence of Hyperlogarithms over Function Fields via Algebraic Combinatorics
pp. 127
A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System
pp. 128
Qanti: A Software Tool for Quick Ambiguous Non-standard Text Input
pp. 128
MPI-2: Extending the message-passing interface
pp. 128
Modularity
pp. 130
Building University timetables using constraint logic programming
pp. 130
Typed Tagless Final Interpreters
pp. 132
A Study into Preferred Explanations of Virtual Agent Behavior
pp. 133
Privacy-Preserving Processing of Raw Genomic Data
pp. 133
Learning-Based Spectrum Selection in Cognitive Radio Ad Hoc Networks
pp. 133
An Evaluation of OpenMP on Current and Emerging Multithreaded/Multicore Processors
pp. 134
Efficient Byzantine agreement secure against general adversaries
pp. 134
Strong I/O Lower Bounds for Binomial and FFT Computation Graphs
pp. 134
Towards Liquid Web Applications
pp. 135
Fast and Accurate Sentence Alignment of Bilingual Corpora
pp. 136
Maximal Causal Models for Sequentially Consistent Systems
pp. 136
A new data structure for implementing extensions to Prolog
pp. 136
Evotype: Evolutionary Type Design
pp. 137
A critical-pair/completion algorithm for finitely generated ideals in rings
pp. 137
Redundant Bit Vectors for Quickly Searching High-Dimensional Regions
pp. 137
Towards Enabling Trusted Artificial Intelligence via Blockchain
pp. 137
Physics-Based Deep Neural Network for Augmented Reality During Liver Surgery
pp. 139
Hierarchically Performed Hazard Origin and Propagation Studies
pp. 140
Characterizing Dark DNS Behavior
pp. 140
On the Evaluation of Quality of Context
pp. 141
Server-Aided Verification Signatures: Definitions and New Constructions
pp. 141
Provably correct compiler development and implementation
pp. 143
An Algorithm for Inferring Mitogenome Rearrangements in a Phylogenetic Tree
pp. 143
Self-Regulated Learning and Online Learning: A Systematic Review
pp. 143
Improving Teacher Awareness Through Activity, Badge and Content Visualizations
pp. 144
FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors
pp. 144
Towards Automating Source-Consistent UML Refactorings
pp. 146
Bin Packing with Rejection Revisited
pp. 146
Decision Models for Record Linkage
pp. 146
The Kell Calculus: A Family of Higher-Order Distributed Process Calculi
pp. 148
A User-Centric Evaluation of the Europeana Digital Library
pp. 149
Learning Visual Obstacle Detection Using Color Histogram Features
pp. 149
Stochastic Grammatical Inference with Multinomial Tests
pp. 149
TAX: A Tree Algebra for XML
pp. 150
Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning
pp. 150
A Note on Vertex Cover in Graphs with Maximum Degree 3
pp. 151
Improving ESOP-Based Synthesis of Reversible Logic Using Evolutionary Algorithms
pp. 151
Abuse-Free Multi-party Contract Signing
pp. 152
Crossing Borders: Security and Privacy Issues of the European e-Passport
pp. 153
Adaptable and adaptive user interfaces for disabled users in the AVANTI project
pp. 153
CRF-Based Czech Named Entity Recognizer and Consolidation of Czech NER Research
pp. 153
On Schema Evolution in Multidimensional Databases
pp. 155
A formal specification of dMARS
pp. 156
Web Accessibility Testing: When the Method Is the Culprit
pp. 157
Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications
pp. 158
The State of Cryptographic Hash Functions
pp. 158
Trace Semantics via Generic Observations
pp. 159
Convolutional Neural Networks for Multimedia Sentiment Analysis
pp. 159
Media Equation Revisited: Do Users Show Polite Reactions towards an Embodied Agent?
pp. 159
Improved Approximation Algorithms for the Maximum Happy Vertices and Edges Problems
pp. 160
E-Scribe: Ubiquitous Real-Time Speech Transcription for the Hearing-Impaired
pp. 161
Shortest Unique Queries on Strings
pp. 161
Robotics and Integrated Formal Methods: Necessity Meets Opportunity
pp. 161
Exploratory Hierarchical Clustering for Management Zone Delineation in Precision Agriculture
pp. 162
The Legion Resource Management System
pp. 162
Analyzing Impacts of Coexistence between M2M and H2H Communication on 3GPP LTE System
pp. 163
The Value of Attack-Defence Diagrams
pp. 164
Why Swap When You Can Shuffle? A Comparison of the Proximity Swap and Data Shuffle for Numeric Data
pp. 164
EventKG+TL: Creating Cross-Lingual Timelines from an Event-Centric Knowledge Graph
pp. 166
A π-calculus Model of a Spanish Fish Market — Preliminary Report —
pp. 167
Stateful Aspects in JAsCo
pp. 168
Ultrasound Servoing of Catheters for Beating Heart Valve Repair
pp. 169
Performance Prediction of Component-Based Systems
pp. 170
A formal definition of crosscuts
pp. 170
Incentive Compatible Two Player Cake Cutting
pp. 171
Compiling Multi-paradigm Declarative Programs into Prolog
pp. 173
FCA-Based Models and a Prototype Data Analysis System for Crowdsourcing Platforms
pp. 174
Prometheus: A Methodology for Developing Intelligent Agents
pp. 175
HCTR: A Variable-Input-Length Enciphering Mode
pp. 176
Towards a Theoretical Framework for Interactive Digital Narrative
pp. 176
Advances in Ontology Matching
pp. 176
Asynchrony Immune Cellular Automata
pp. 176
Degradation of Communication Range in VANETs Caused by Interference 2.0 - Real-World Experiment
pp. 176
The Bright and Dark Sides of Gamification
pp. 176
Efficient Construction of Semilinear Representations of Languages Accepted by Unary NFA
pp. 177
Sparse Square Roots
pp. 177
Platforms for AAL Applications
pp. 179
Derivational Minimalism Is Mildly Context–Sensitive
pp. 179
Nested-Unit Petri Nets: A Structural Means to Increase Efficiency and Scalability of Verification on Elementary Nets
pp. 179
Object-oriented specification in LOTOS and Z, or my cat really is object-oriented!
pp. 180
From causal consistency to sequential consistency in shared memory systems
pp. 181
Dyna: Extending Datalog for Modern AI
pp. 181
Improved Pattern Recognition with Artificial Clonal Selection?
pp. 181
FcaBedrock, a Formal Context Creator
pp. 181
Predictive Modeling for Job Power Consumption in HPC Systems
pp. 181
FPGA-Based Smith-Waterman Algorithm: Analysis and Novel Design
pp. 182
A faster cryptanalysis of the self-shrinking generator
pp. 182
Performance Evaluation and Energy Efficiency of High-Density HPC Platforms Based on Intel, AMD and ARM Processors
pp. 182
Computing Directed Pathwidth in O(1.89 n ) Time
pp. 183
SNE: Signed Network Embedding
pp. 184
High Integrated Information in Complex Networks Near Criticality
pp. 184
Interpreting Results from Large Scale Automatic Evaluation of Web Accessibility
pp. 186
Comparison of Failures and Attacks on Random and Scale-Free Networks
pp. 187
Ray class field constructions of curves over finite fields with many rational points
pp. 187
Hypersequents and the Proof Theory of Intuitionistic Fuzzy Logic
pp. 187
Evolution and Acquisition of Modules in Cartesian Genetic Programming
pp. 187
Complexity of Sequential Pattern Matching Algorithms
pp. 187
Towards Development of Secure Systems Using UMLsec
pp. 188
Object Detection and Terrain Classification in Agricultural Fields Using 3D Lidar Data
pp. 188
Overview of the INEX 2011 Question Answering Track (QA@INEX)
pp. 189
Finding an Optimal Inversion Median: Experimental Results
pp. 189
Using Models to Model-Check Recursive Schemes
pp. 191
A Survey on Proximity Measures for Social Networks
pp. 191
Modelling Agent Societies: Co-ordination Frameworks and Institutions
pp. 191
PKI Seeks a Trusting Relationship
pp. 193
Analysis of Emotional Gestures for the Generation of Expressive Copying Behaviour in an Embodied Agent
pp. 193
An Evaluation of User-Level Failure Mitigation Support in MPI
pp. 194
A RIF-Style Semantics for RuleML-Integrated Positional-Slotted, Object-Applicative Rules
pp. 194
The Song Remains the Same: Lossless Conversion and Streaming of MIDI to RDF and Back
pp. 194
Ontology-Based Data Access with Databases: A Short Course
pp. 196
Dynamic Data Packaging Protocol for Real-Time Medical Applications of Nanonetworks
pp. 196
A Roadside Unit Placement Scheme for Vehicular Telematics Networks
pp. 197
Online Social Network Profile Linkage
pp. 198
An Analysis of the Quality Issues of the Properties Available in the Spanish DBpedia
pp. 198
Learning Structure and Parameters of Stochastic Logic Programs
pp. 199
Efficient Exhaustive Generation of Functional Programs Using Monte-Carlo Search with Iterative Deepening
pp. 199
Noise elimination in inductive concept learning: A case study in medical diagnosis
pp. 200
Cache-Access Pattern Attack on Disaligned AES T-Tables
pp. 201
Simplifying Algebraic Functional Systems
pp. 201
Simple combinatorial Gray codes constructed by reversing sublists
pp. 202
Visualising Event-B Models with B-Motion Studio
pp. 202
MetaCompose: A Compositional Evolutionary Music Composer
pp. 202
Implementation and Optimization of the OpenMP Accelerator Model for the TI Keystone II Architecture
pp. 203
SOLE: Linking Research Papers with Science Objects
pp. 203
Retrenchment and the B-Toolkit
pp. 203
Benchmarking Publish/Subscribe-Based Messaging Systems
pp. 204
Towards an Integrated Model Checker for Railway Signalling Data
pp. 204
Negation and aggregates in recursive rules: the LDL++ approach
pp. 204
Read, Write and Copy Dependencies for Symbolic Model Checking
pp. 205
Shifting Primes: Extension of Pseudo-Mersenne Primes to Optimize ECC for MSP430-Based Future Internet of Things Devices
pp. 205
Preliminary Findings of an Ethnographical Research on Designing Accessible Geolocated Services with Older People
pp. 205
What Syntax Can Contribute in the Entailment Task
pp. 206
Lace: Non-blocking Split Deque for Work-Stealing
pp. 207
Automatic interpretation of scanned topographic maps: A raster-based approach
pp. 209
Unsupervised Multi-modal Style Transfer for Cardiac MR Segmentation
pp. 210
Network Creation Games with Traceroute-Based Strategies
pp. 210
Ontological Analysis of Taxonomic Relationships
pp. 210
A Tool for Optimizing Runtime Parameters of Open MPI
pp. 211
Quantitative Information Flow and Applications to Differential Privacy
pp. 213
Compliant Business Process Design by Declarative Specifications
pp. 214
Approximation Operators in Qualitative Data Analysis
pp. 214
The World of Framsticks: Simulation, Evolution, Interaction
pp. 214
A Real-Time Auto-Adjusting Vision System for Robotic Soccer
pp. 215
Analysis of Location Privacy/Energy Efficiency Tradeoffs in Wireless Sensor Networks
pp. 215
From RNA Secondary Structure to Coding Theory: A Combinatorial Approach
pp. 217
Paragon for Practical Programming with Information-Flow Control
pp. 217
Combining Lexical Resources with Tree Edit Distance for Recognizing Textual Entailment
pp. 217
PassGAN: A Deep Learning Approach for Password Guessing
pp. 218
Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE
pp. 218
MADRE: The Memory-Aware Data Redistribution Engine
pp. 218
Building complex systems using developmental process: An engineering approach
pp. 219
Novel Clustering Approach that Employs Genetic Algorithm with New Representation Scheme and Multiple Objectives
pp. 220
Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board
pp. 220
PSAEC: An Improved Algorithm for Short Read Error Correction Using Partial Suffix Arrays
pp. 221
A Performance Study of Event Processing Systems
pp. 221
Introducing institutions
pp. 222
Approximate String Matching Using a Bidirectional Index
pp. 222
Bag Dissimilarities for Multiple Instance Learning
pp. 224
Supporting Constructive Video-Based Learning: Requirements Elicitation from Exploratory Studies
pp. 225
Fitness and Novelty in Evolutionary Art
pp. 226
An Efficient Algorithm for the Approximate Median Selection Problem
pp. 226
Session-Based Compilation Framework for Multicore Programming
pp. 227
Uniform Price Auctions: Equilibria and Efficiency
pp. 227
Context-Aware Retrieval for Ubiquitous Computing Environments
pp. 228
Transforming Linear Context-Free Rewriting Systems into Minimalist Grammars
pp. 228
Agent Programming with Declarative Goals
pp. 228
OPAL: Design and implementation of an algebraic programming language
pp. 228
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security
pp. 229
Real-Time Walk Light Detection with a Mobile Phone
pp. 231
A Class of Non-optimum-time 3n-Step FSSP Algorithms - A Survey
pp. 231
Experimental Construction of Very Large Scale DNA Databases with Associative Search Capability
pp. 232
A Standard for Representing Multidimensional Properties: The Common Warehouse Metamodel (CWM)
pp. 233
visPerf: Monitoring Tool for Grid Computing
pp. 233
Computational properties of qualitative spatial reasoning: First results
pp. 235
On the Declassification of Confidential Documents
pp. 235
QBF as an Alternative to Courcelle’s Theorem
pp. 236
A Theory of Mediators for Eternal Connectors
pp. 236
CoOL: A Context Ontology Language to Enable Contextual Interoperability
pp. 238
A New Approach for Model-Based Adaptive Region Growing in Medical Image Analysis
pp. 239
The Best-of-n Problem with Dynamic Site Qualities: Achieving Adaptability with Stubborn Individuals
pp. 240
TURank: Twitter User Ranking Based on User-Tweet Graph Analysis
pp. 241
A DCNN Based Fingerprint Liveness Detection Algorithm with Voting Strategy
pp. 241
Blind separation of linear-quadratic mixtures of real sources using a recurrent structure
pp. 242
SOWL: A Framework for Handling Spatio-temporal Information in OWL 2.0
pp. 242
Operational Semantics for SPARQL Update
pp. 242
GAMA: A Simulation Platform That Integrates Geographical Information Data, Agent-Based Modeling and Multi-scale Control
pp. 243
Short Accountable Ring Signatures Based on DDH
pp. 243
ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research
pp. 243
Dummy elimination: Making termination easier
pp. 245
Tor HTTP Usage and Information Leakage
pp. 245
Abstractions and Infrastructures for the Design and Development of Mobile Agent Organizations
pp. 245
MiDataSets: Creating the Conditions for a More Realistic Evaluation of Iterative Optimization
pp. 246
Right-Linear Finite Path Overlapping Term Rewriting Systems Effectively Preserve Recognizability
pp. 246
Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing
pp. 247
CauDEr: A Causal-Consistent Reversible Debugger for Erlang
pp. 247
On Scene Interpretation with Description Logics
pp. 247
Automatic Tongue Image Segmentation for Traditional Chinese Medicine Using Deep Neural Network
pp. 247
Algebrric solution of systems of polynomirl equations using Groebher bases
pp. 249
The Amount of Information on Emotional States Conveyed by the Verbal and Nonverbal Channels: Some Perceptual Data
pp. 250
The ORD Speech Corpus of Russian Everyday Communication “One Speaker’s Day”: Creation Principles and Annotation
pp. 250
CodeSurfer/x86—A Platform for Analyzing x86 Executables
pp. 251
Topic Detection and Tracking with Spatio-Temporal Evidence
pp. 252
A Cognitive Integrated Management Support System for Enterprises
pp. 252
Non-adjacent Digrams Improve Matching of Cross-Lingual Spelling Variants
pp. 252
An Overview of Quality of Experience Measurement Challenges for Video Applications in IP Networks
pp. 253
RITS: Real-Time Interactive Text Steganography Based on Automatic Dialogue Model
pp. 253
A General Measure of Rule Interestingness
pp. 253
Agent-Oriented Model of Simulated Evolution
pp. 257
SIGNAL: A declarative language for synchronous programming of real-time systems
pp. 257
mlVIRNET: Multilevel Variational Image Registration Network
pp. 258
An introduction to OBJ 3
pp. 259
A Reversible Semantics for Erlang
pp. 260
Circular DNA and splicing systems
pp. 260
Rigorous Runtime Analysis of the (1+1) ES: 1/5-Rule and Ellipsoidal Fitness Landscapes
pp. 261
Constructing Automata from Temporal Logic Formulas: A Tutorial⋆
pp. 261
Evaluation of Colour Models for Computer Vision Using Cluster Validation Techniques
pp. 261
A calculus for collections and aggregates
pp. 262
Observations on Determinization of Büchi Automata
pp. 262
Modeling Influenza by Modulating Flu Awareness
pp. 263
A Comparison of Shape Matching Methods for Contour Based Pose Estimation
pp. 264
Combining MILS with Contract-Based Design for Safety and Security Requirements
pp. 265
PALOMA: A Process Algebra for Located Markovian Agents
pp. 266
Specifying Quality Characteristics and Attributes for Websites
pp. 266
Reactive Stochastic Local Search Algorithms for the Genomic Median Problem
pp. 269
FPT Algorithms for Connected Feedback Vertex Set
pp. 270
Comparisons of Single- and Multiple-Hidden-Layer Neural Networks
pp. 270
Finger-Knuckle-Print Recognition Using LGBP
pp. 271
Knowledge-Based Event Detection in Complex Time Series Data
pp. 271
Formalizing Integration Theory with an Application to Probabilistic Algorithms
pp. 271
On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers
pp. 275
Transformations of derivation sequences in graph grammars
pp. 275
The MOLEN ρμ-Coded Processor
pp. 275
Local Search-Based Pattern Matching Features in EMF-IncQuery
pp. 275
SYSTRAN on AltaVista A User Study on Real-Time Machine Translation on the Internet
pp. 276
Minimal Reversible Deterministic Finite Automata
pp. 277
A Quality Performance Model for Cost-Benefit Analysis of Non-functional Requirements Applied to the Mobile Handset Domain
pp. 278
Relay Attacks on Bluetooth Authentication and Solutions
pp. 278
On the Hyperbolicity of Small-World and Tree-Like Random Graphs
pp. 278
User Interaction Design for Secure Systems
pp. 281
A Model for a Collaborative Recommender System for Multimedia Learning Material
pp. 281
Collective loop fusion for array contraction
pp. 281
Shape Recognition Based on Radial Basis Probabilistic Neural Network and Application to Plant Species Identification
pp. 282
RoboViz: Programmable Visualization for Simulated Soccer
pp. 283
Restarting automata
pp. 283
A Process and Tool for the Conversion of MARC Records to a Normalized FRBR Implementation
pp. 283
The Finest of its Class: The Natural Point-Based Ternary Calculus ${\mathcal LR}$ for Qualitative Spatial Reasoning
pp. 284
Type Error Slicing in Implicitly Typed Higher-Order Languages
pp. 284
A simple characterization of stuttering bisimulation
pp. 284
Sojourn Time Analysis for Processor Sharing Loss System with Unreliable Server
pp. 285
Linear Programming Hierarchies Suffice for Directed Steiner Tree
pp. 285
Current Challenges in Multi-player Game Search
pp. 286
From Reconfigurability to Evolution in Construction Systems: Spanning the Electronic, Microfluidic and Biomolecular Domains
pp. 288
A relational database system for images
pp. 290
Batch Weighted Ensemble for Mining Data Streams with Concept Drift
pp. 292
Cryptanalysis of a Perturbated White-Box AES Implementation
pp. 292
Online Cake Cutting
pp. 292
The semantics of clear, a specification language
pp. 294
The Eli system
pp. 295
Explainable AI: The New 42?
pp. 297
Complexity of Hypergraph Coloring and Seidel’s Switching
pp. 298
Model-Based Development of Embedded Systems
pp. 301
Applying Tree Languages in Proof Theory
pp. 302
Experiences on Processing Spatial Data with MapReduce
pp. 302
An extended static checker for modula-3
pp. 302
The Parameterized Complexity of Intersection and Composition Operations on Sets of Finite-State Automata
pp. 303
Scalable Parallel Trace-Based Performance Analysis
pp. 305
Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings
pp. 306
Adaptive MPI
pp. 306
EEG-driven RNN Classification for Prognosis of Neurodegeneration in At-Risk Patients
pp. 306
Real-Time MRI for Portuguese
pp. 307
Real Time Hand Based Robot Control Using 2D/3D Images
pp. 307
Validating the Hybrid ERTMS/ETCS Level 3 Concept with Electrum
pp. 307
Overview of the CLEF 2005 Multilingual Question Answering Track
pp. 308
Finding the right model for bridge diagnosis
pp. 308
Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro
pp. 309
On the representation of data in lambda-calculus
pp. 311
Improved Anonymous Timed-Release Encryption
pp. 311
Declarative Name Binding and Scope Rules
pp. 312
Trustable Formal Specification for Software Certification
pp. 313
Implementing Norms in Multiagent Systems
pp. 313
Analysis and design of multiagent systems using MAS-CommonKADS
pp. 314
Incremental Runtime Verification of Probabilistic Systems
pp. 314
Discovering Fuzzy Classification Rules with Genetic Programming and Co-evolution
pp. 315
Stable Roommate with Narcissistic, Single-Peaked, and Single-Crossing Preferences
pp. 315
Scalable Replication in Database Clusters
pp. 315
The Making of SPINdle
pp. 317
Compiling Process Graphs into Executable Code
pp. 318
Emotion Analysis in Man-Machine Interaction Systems
pp. 319
Event-B Decomposition for Parallel Programs
pp. 319
SVM Based Learning System for Information Extraction
pp. 321
Semantic Annotation of Data Processing Pipelines in Scientific Publications
pp. 321
Multi-Tilde-Bar Derivatives
pp. 321
Electricity Market Price Forecasting: Neural Networks versus Weighted-Distance k Nearest Neighbours
pp. 323
The DELOS Testbed for Choosing a Digital Preservation Strategy
pp. 324
An Overview of the GXL Graph Exchange Language
pp. 324
Kan Extensions for Program Optimisation Or: Art and Dan Explain an Old Trick
pp. 325
PEGASO: Towards a Life Companion
pp. 326
Evaluation of Texture Features for Content-Based Image Retrieval
pp. 326
Using Description Logic to Maintain Consistency between UML Models
pp. 327
On the Hazmat Transport Network Design Problem
pp. 329
Systematic Pattern Approach for Safety and Security Co-engineering in the Automotive Domain
pp. 329
Modelling Combined Subaerial-Subaqueous Flow-Like Landslides by Cellular Automata
pp. 330
Point-Of-Interest Recommendation Using Temporal Orientations of Users and Locations
pp. 331
Discriminative Training of Gender-Dependent Acoustic Models
pp. 331
Measuring MPI Send and Receive Overhead and Application Availability in High Performance Network Interfaces
pp. 333
TIP: Tons of Inductive Problems
pp. 333
Sequential Schemes for Frequentist Estimation of Properties in Statistical Model Checking
pp. 334
A Max-SAT Solver with Lazy Data Structures
pp. 334
Using B as a High Level Programming Language in an Industrial Project: Roissy VAL
pp. 335
Combining Naive Bayes and n-Gram Language Models for Text Classification
pp. 335
Recognizing Human Gender in Computer Vision: A Survey
pp. 335
Updates on the Security of FPGAs Against Power Analysis Attacks
pp. 337
Simultaneous Single-Item Auctions
pp. 338
Finite Volume Discretization of Equations Describing Nonlinear Diffusion in Li-Ion Batteries
pp. 341
External Representations Contribute to the Dynamic Construction of Ideas
pp. 343
Forward Reachability Analysis of Timed Petri Nets
pp. 343
Layered Evaluation of Adaptive Applications and Services
pp. 343
Assurance Cases in Model-Driven Development of the Pacemaker Software
pp. 343
Extended symbolic projections as a knowledge structure for spatial reasoning
pp. 344
Sleeping Experts in Wireless Networks
pp. 344
From 3D Content Models to HBIM for Conservation and Management of Built Heritage
pp. 345
Almost Optimal Strategies in One Clock Priced Timed Games
pp. 347
Evaluation of KQML as an agent communication language
pp. 352
Submachine locality in the bulk synchronous setting
pp. 354
Overview of VideoCLEF 2009: New Perspectives on Speech-Based Multimedia Content Enrichment
pp. 355
Energy - Aware Offloading Algorithm for Multi-level Cloud Based 5G System
pp. 355
A Process Semantics for BPMN
pp. 356
Integral Operators for Computing Homology Generators at Any Dimension
pp. 357
Probabilistic Programming Language and its Incremental Evaluation
pp. 357
A database needs two kinds of negation
pp. 360
Planning as Heuristic Search: New Results
pp. 361
IQ-Station: A Low Cost Portable Immersive Environment
pp. 363
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party
pp. 366
Specifying & verifying concurrent systems using Z
pp. 367
Monte-Carlo Tree Search in Poker Using Expected Reward Distributions
pp. 369
The Rich Transcription 2005 Spring Meeting Recognition Evaluation
pp. 369
Bounds on the Difference between Reconstructions in Binary Tomography
pp. 369
A Tool for Probabilistic Reasoning Based on Logic Programming and First-Order Theories Under Stable Model Semantics
pp. 370
Pattern Recognition Techniques for the Classification of Malware Packers
pp. 370
Dispatching and Conflict-Free Routing of Automated Guided Vehicles: A Hybrid Approach Combining Constraint Programming and Mixed Integer Programming
pp. 371
Automatic Recognition of Unconstrained Off-Line Bangla Handwritten Numerals
pp. 372
Converse-Et-Impera: Exploiting Deep Learning and Hierarchical Reinforcement Learning for Conversational Recommender Systems
pp. 373
Transforming termination by self-labelling
pp. 375
Improved Exact Exponential Algorithms for Vertex Bipartization and Other Problems
pp. 375
Sieving for Shortest Vectors in Ideal Lattices
pp. 376
SMT-Based Verification of Solidity Smart Contracts
pp. 377
KERMIT: A Constraint-Based Tutor for Database Modeling
pp. 377
Permutation Problems and Channelling Constraints
pp. 377
Analysing the Cognitive Effectiveness of the BPMN 2.0 Visual Notation
pp. 379
Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
pp. 383
Semi Supervised Adaptive Framework for Classifying Evolving Data Stream
pp. 383
Intrusion Detection through Behavioral Data
pp. 386
Precise Thread-Modular Abstract Interpretation of Concurrent Programs Using Relational Interference Abstractions
pp. 386
The Potential of On-Chip Multiprocessing for QCD Machines
pp. 390
PTaCL: A Language for Attribute-Based Access Control in Open Systems
pp. 392
SIM_AGENT: A toolkit for exploring agent designs
pp. 397
Finding Maximal Quasiperiodicities in Strings
pp. 398
Parallel genetic algorithms, population genetics and combinatorial optimization
pp. 398
Co-evolving Soccer Softbot team coordination with genetic programming
pp. 399
Relationship of DevOps to Agile, Lean and Continuous Deployment
pp. 400
A Fast Set Intersection Algorithm for Sorted Sequences
pp. 403
Equivalences among various logical frameworks of partial algebras
pp. 403
Efficiently Implementing Episodic Memory
pp. 406
The Power of Local Information in Social Networks
pp. 406
Variability-Specific Abstraction Refinement for Family-Based Model Checking
pp. 407
Scalable Protection and Access Control in Full Scalable Video Coding
pp. 410
A Core Calculus for Provenance
pp. 410
On Combining Functional Verification and Performance Evaluation Using CADP
pp. 411
Guarded Transitions in Evolving Specifications
pp. 414
Analysis of discrete event coordination
pp. 416
Self-Stabilizing De Bruijn Networks
pp. 419
Fast and Compact Prefix Codes
pp. 422
Exploiting Interchangeabilities for Case Adaptation
pp. 422
MaxTract: Converting PDF to $\mbox\LaTeX$ , MathML and Text
pp. 422
Cellular PSO: A PSO for Dynamic Environments
pp. 423
Decision Procedure for Separation Logic with Inductive Definitions and Presburger Arithmetic
pp. 424
Combining a REST Lexical Analysis Web Service with SPARQL for Mashup Semantic Annotation from Text
pp. 429
Mathematical Morphology on Hypergraphs: Preliminary Definitions and Results
pp. 429
Aether – Generating and Viewing Extended VoID Statistical Descriptions of RDF Datasets
pp. 431
Towards Personalized Context-Aware Recommendation by Mining Context Logs through Topic Models
pp. 432
Intravascular Ultrasound Image Segmentation: A Fast-Marching Method
pp. 436
Graphs Capturing Alternations in Words
pp. 438
A Firefly Algorithm Based Wrapper-Penalty Feature Selection Method for Cancer Diagnosis
pp. 441
Advanced Prosody Modelling
pp. 441
Proof Transformations for Evolutionary Formal Software Development
pp. 442
Security Proof of Sakai-Kasahara’s Identity-Based Encryption Scheme
pp. 442
Lower bounds for static dictionaries on RAMs with bit operations but no multiplication
pp. 442
Improving the Scalability of Recommender Systems by Clustering Using Genetic Algorithms
pp. 447
Transforming Out Timing Leaks, More or Less
pp. 447
A Triple Space-Based Semantic Distributed Middleware for Internet of Things
pp. 453
Recommending Multidimensional Queries
pp. 454
Provider-Independent Use of the Cloud
pp. 456
The LINPACK Benchmark: An explanation
pp. 457
Exploiting Eye Tracking for Smartphone Authentication
pp. 457
Sharing Block Ciphers
pp. 460
Efficient wavelength routing on directed fiber trees
pp. 465
Finite dimensional generalized baker dynamical systems for cryptographic applications
pp. 466
Audio-Haptic Browser for a Geographical Information System
pp. 467
Detecting Malicious URLs Using Lexical Analysis
pp. 467
Partitioning an array onto a mesh of processors
pp. 468
Isabelle/jEdit – A Prover IDE within the PIDE Framework
pp. 468
The Integration of Safety and Security Requirements
pp. 473
UT Austin Villa: RoboCup 2017 3D Simulation League Competition and Technical Challenges Champions
pp. 474
Inferring Unusual Crowd Events from Mobile Phone Call Detail Records
pp. 478
Deciding finiteness of Petri nets up to bisimulation
pp. 487
NET – A System for Extracting Web Data from Flat and Nested Data Records
pp. 488
Optimisation and Illumination of a Real-World Workforce Scheduling and Routing Application (WSRP) via Map-Elites
pp. 489
Automatic Recognition of Impact Craters on the Surface of Mars
pp. 490
Text Analysis of Consumer Reviews: The Case of Virtual Travel Firms
pp. 493
Moderately Hard Functions: Definition, Instantiations, and Applications
pp. 494
The Intelligent Helpdesk: Supporting Peer-Help in a University Course
pp. 496
Toward a Taxonomy of Wearable Technologies in Healthcare
pp. 499
A framework for intelligent knowledge sequencing and task sequencing
pp. 500
Automatic array privatization
pp. 501
Contemporary Issues in Interactive Storytelling Authoring Systems
pp. 503
Shortest Unique Substrings Queries in Optimal Time
pp. 507
On Individual Polyinformativity of Speech and Voice Regarding Speakers Auditive Attribution (Forensic Phonetic Aspect)
pp. 509
Discretization of Continuous Attributes for Learning Classification Rules
pp. 518
Towards Generalised Accessibility of Computer Games
pp. 518
Engaging Users in Self-Reporting Their Data: A Tangible Interface for Quantified Self
pp. 523
Adaptive Smoothing Neural Networks in Foreign Exchange Rate Forecasting
pp. 523
Reducing the Plagiarism Detection Search Space on the Basis of the Kullback-Leibler Distance
pp. 523
Enlarged Skeleton Models of Plankton for Tactile Teaching
pp. 524
Paraphrase Identification on the Basis of Supervised Machine Learning Techniques
pp. 526
Introducing the Open Trace Format (OTF)
pp. 527
Techniques for dealing with missing values in classification
pp. 532
Correlation Analysis of Spatial Time Series Datasets: A Filter-and-Refine Approach
pp. 533
ARMCI: A portable remote memory copy library for distributed array libraries and compiler run-time systems
pp. 534
Efficient Data Mining Based on Formal Concept Analysis
pp. 539
Partitioned Memory Models for Program Analysis
pp. 547
Distance-Based Outliers in Sequences
pp. 549
Knowledge Transfer across Multilingual Corpora via Latent Topics
pp. 550
Emotion Detection from Speech to Enrich Multimedia Content
pp. 550
Exploring Clustering for Multi-document Arabic Summarisation
pp. 550
Zero Phase Representation of Panoramic Images for Image Based Localization
pp. 552
Sustainable Urban Regeneration Policy Making: Inclusive Participation Practice
pp. 554
Four Perspectives of Applied Sustainability: Research Implications and Possible Integrations
pp. 556
Human-Computer Interaction and Usability Engineering for Elderly (HCI4AGING): Introduction to the Special Thematic Session
pp. 556
Malware Detection Using Deep Transferred Generative Adversarial Networks
pp. 563
A Multicriteria Sorting Procedure for Financial Classification Problems: The Case of Business Failure Risk Assessment
pp. 563
Density as the Segregation Mechanism in Fish School Search for Multimodal Optimization Problems
pp. 565
Ludic Educational Game Creation Tool: Teaching Schoolers Road Safety
pp. 566
Challenges for Inclusive Affective Detection in Educational Scenarios
pp. 567
An Evolutionary Music Composer Algorithm for Bass Harmonization
pp. 569
Feature Selection Based on Mutual Correlation
pp. 571
Optimal 6-State Algorithms for the Behavior of Several Moving Creatures
pp. 574
WASA: A workflow-based architecture to support scientific database applications
pp. 593
Process-Oriented Requirement Analysis Supporting the Data Warehouse Design Process A Use Case Driven Approach
pp. 596
An Intelligent Tutoring System Incorporating a Model of an Experienced Human Tutor
pp. 603
Realistic Face Animation for a Czech Talking Head
pp. 606
Multilabel Classification on Heterogeneous Graphs with Gaussian Embeddings
pp. 616
Statistical Machine Translation of German Compound Words
pp. 618
Drusen Detection in a Retinal Image Using Multi-level Analysis
pp. 619
DIVACE: Diverse and Accurate Ensemble Learning Algorithm
pp. 622
Multi-task Localization and Segmentation for X-Ray Guided Planning in Knee Surgery
pp. 622
Innovative Transport Systems to Promote Sustainable Mobility: Developing the Model Architecture of a Traffic Control and Supervisor System
pp. 627
A Chaotic-Neural-Network-Based Encryption Algorithm for JPEG2000 Encoded Images
pp. 633
Segmentation-Free Detection of Comic Panels
pp. 641
A Relational Model for Formal Object-Oriented Requirement Analysis in UML
pp. 644
CAMPS: A Middleware for Providing Context-Aware Services for Smart Space
pp. 651
Application of C&RT, CHAID, C4.5 and WizWhy Algorithms for Stroke Type Diagnosis
pp. 659
Extraversion and Computer Game Play: Who Plays What Games?
pp. 665
On the Structuring of the Computational Chemistry Virtual Organization COMPCHEM
pp. 681
A Correlation Approach for Automatic Image Annotation
pp. 688
Automated Segmentation of 3D US Prostate Images Using Statistical Texture-Based Matching Method
pp. 689
Twitter: The Best of Bot Worlds for Automated Wit
pp. 708
PM: An operating system coordinated high performance communication library
pp. 713
Connectivity Differences between Human Operators of Swarms and Bandwidth Limitations
pp. 718
ImageCLEF 2004: Combining Image and Multi-lingual Search for Medical Image Retrieval
pp. 725
Using Open Data and Open Tools in Defining Strategies for the Enhancement of Basilicata Region
pp. 728
Some Aspects of the Development of Low-Cost Augmented Reality Learning Environments as Examples for Future Interfaces in Technology Enhanced Learning
pp. 731
Trustless Intermediation in Blockchain-Based Decentralized Service Marketplaces
pp. 741
Self Adaptive High Interaction Honeypots Driven by Game Theory
pp. 762
The Navigated Image Viewer – Evaluation in Maxillofacial Surgery
pp. 762
Existing but Not Explicit - The User Perspective in Scrum Projects in Practice
pp. 763
Learning to communicate through imitation in autonomous robots
pp. 825
UNICORE: A Grid Computing Environment
pp. 863
StarPU: A Unified Platform for Task Scheduling on Heterogeneous Multicore Architectures
pp. 1008
Ramsis – The Leading Cad Tool for Ergonomic Analysis of Vehicles
pp. 1010
Ontology-Based Retrieval of Spatially Related Objects for Location Based Services
pp. 1030
Optimized Design of MEMS by Evolutionary Multi-objective Optimization with Interactive Evolutionary Computation
pp. 1095
Neural network adaptive modeling of battery discharge behavior
pp. 1122
Helping People with Visual Impairments Gain Access to Graphical Information Through Natural Language: The iGraph System
pp. 1163
HOWARD: High-Order Wavefront Aberration Regularized Deconvolution for Enhancing Graphic Displays for Visually Impaired Computer Users
pp. 1223
LAMBDA: A European System to Access Mathematics with Braille and Audio Synthesis
pp. 1226
Evolving a Roving Eye for Go
Similar content
3,871
The necessity for T-cryptantigen activation screening in babies with necrotising enterocolitis
Authors:
G.F. Kirsten
,
J. Smith
,
C. Pieper
…
Can you see green or blue? On the necessity of visibility analysis of urban open spaces using Remote Sensing techniques and Geographic Information Systems
Authors:
Anna-Maria Bolte
,
Theo Kötter
,
Sophie Schuppe
Necessity of selecting the optimum model for urban landfills site selection in line with land use planning and sustainable development
Authors:
Abdolkhani Nejhad
See all similar
Cited by
8
Formal Specification and Verification of Autonomous Robotic Systems
Authors:
Matt Luckcuck
,
Marie Farrell
,
Louise A. Dennis
…
Towards a framework for certification of reliable autonomous systems
Authors:
Michael Fisher
,
Viviana Mascardi
,
Kristin Yvonne Rozier
…
Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages
Authors:
Marie Farrell
,
Matthew Bradbury
,
Michael Benjamin Fisher
…
See all cited by