Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
17
views
23
references
Top references
cited by
4
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,561
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Security Protocols : 7th International Workshop, Cambridge, UK, April 19-21, 1999. Proceedings
A Masked Ring-LWE Implementation
other
Author(s):
Oscar Reparaz
,
Sujoy Sinha Roy
,
Frederik Vercauteren
,
Ingrid Verbauwhede
Publication date
(Online):
September 1 2015
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
23
Record
: found
Abstract
: not found
Book Chapter
: not found
Differential Power Analysis
Paul Köcher
,
Joshua Jaffe
,
Benjamin Jun
(1999)
0
comments
Cited
146
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
Paul Kocher
(1996)
0
comments
Cited
81
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
On lattices, learning with errors, random linear codes, and cryptography
Oded Regev
(2005)
0
comments
Cited
72
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2015
Publication date (Online):
September 1 2015
Pages
: 683-702
DOI:
10.1007/978-3-662-48324-4_34
SO-VID:
d74d5e47-dc1f-479a-bb00-9b79cb5bf0a1
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Prostate Cancer MR Imaging
pp. 1
An automatic interprocedural analysis for the understanding of scientific application programs
pp. 1
Basic techniques and symbol-level recognition — An overview
pp. 1
The Immergence of Norms in Agent Worlds
pp. 1
A Library for Declarative Resolution-Independent 2D Graphics
pp. 1
Symbolic Execution Techniques for Test Purpose Definition
pp. 1
Testing equivalences for event structures
pp. 1
Chapter I: Introduction
pp. 1
Introduction: Bringing Together Humans and Artificial Agents in Cyber-societies:A New Field of Trust Research
pp. 1
Evaluating a Reinforcement Learning Algorithm with a General Intelligence Test
pp. 1
Agent-Oriented Software Engineering
pp. 1
Strict finitism and feasibility
pp. 1
Setting the Stage for Open Mathematical Documents
pp. 1
Getting started: Basic definitions and constructions
pp. 1
Revisiting Hyperbolic Voronoi Diagrams in Two and Higher Dimensions from Theoretical, Applied and Generalized Viewpoints
pp. 1
DRFE: Dynamic Recursive Feature Elimination for Gene Identification Based on Random Forest
pp. 1
Introduction
pp. 1
Next Generation Software Product Line Engineering
pp. 1
About this Author
pp. 1
Motivations, background, and basic definitions
pp. 1
Information Transfer among Coupled Random Boolean Networks
pp. 1
Introduction
pp. 1
Performance issues in parallel programming
pp. 1
Boolean Functions Fitness Spaces
pp. 1
Data Complexity Analysis: Linkage between Context and Solution in Classification
pp. 1
Application of Classification Algorithms on IDDM Rat Data
pp. 1
CMMI RAMS Extension Based on CENELEC Railway Standard
pp. 1
Automated geometric reasoning: Dixon resultants, Gröbner bases, and characteristic sets
pp. 1
Producing Compliant Interactions: Conformance, Coverage, and Interoperability
pp. 1
Introduction
pp. 1
Verification of Behaviour Networks Using Finite-State Automata
pp. 3
Making Self-organizing Systems Secure
pp. 3
Property Preserving Encryption in NoSQL Wide Column Stores
pp. 3
Designing Human Computer Interfaces for Command and Control Environments
pp. 3
Stochastic Temporal Logic Abstractions: Challenges and Opportunities
pp. 3
Automata and Program Analysis
pp. 3
Optimizing Two-Level Preconditionings for the Conjugate Gradient Method
pp. 10
Perceived Complexity and Cognitive Stability in Human-Centered Design
pp. 10
Kilo-instruction Processors
pp. 11
An Extension of the Order Bound for AG Codes
pp. 11
Would a Virtual Butler Do a Good Job for Old People? Psychological Considerations about Benefits and Risks of Technological Assistance
pp. 11
Chapter 2: Next Generation Web Search
pp. 12
Evaluation of an Automated Mechanism for Generating New Regulations
pp. 12
Sentic Neural Networks: A Novel Cognitive Model for Affective Common Sense Reasoning
pp. 12
Security for Cyber-Physical Systems
pp. 13
Turkish Information Retrieval: Past Changes Future
pp. 15
Can Multi-Agents Wake Us from IC Design Productivity Nightmare?
pp. 16
Don’t Be Greedy: Leveraging Community Structure to Find High Quality Seed Sets for Influence Maximization
pp. 17
What Constitutes an Effective Representation?
pp. 17
Models of Timed Systems
pp. 2
A Sharp PageRank Algorithm with Applications to Edge Ranking and Graph Sparsification
pp. 2
Extending Architectural Representation in UML with View Integration
pp. 2
Creating an Electronic Commerce Device Which Promotes Universal Access: The KALI Project
pp. 2
Automata for Codes
pp. 20
Natural Born Computing
pp. 21
From Public Plans to Global Solutions in Multiagent Planning
pp. 23
Algebraic data type and process specifications based on projection spaces
pp. 24
Combining Petri Nets and other formal methods
pp. 3
Can Component/Service-Based Systems Be Proved Correct?
pp. 3
Document Markup for the Web
pp. 3
Processes Inspired by the Functioning of Living Cells: Natural Computing Approach
pp. 31
Predicates as parameters in logic programming
pp. 31
A Refactoring Library for Scala Compiler Extensions
pp. 35
Recoverability
pp. 4
Transformation from OWL Description to Resource Space Model
pp. 4
Chapter II: Syntax, semantics and proof theory for equational logic
pp. 5
Adapting the System to Users Based on Implicit Data: Ethical Risks and Possible Solutions
pp. 5
Abstract interpretation
pp. 8
Specification of Bahavioural Requirements within Compositional Multi-agent System Design
pp. 8
Strategies Emerging from Game Play: Experience from an Educational Game for Academic Career Design
pp. 9
1. Making Smarter Business Decisions in Less Time
pp. 9
Concurrent processes as objects
pp. 9
Trailing-Edge Management
pp. 15
The Game of the Name in Cryptographic Tables
pp. 17
Structured Induction Proofs in Isabelle/Isar
pp. 18
Human Action Categorization Using Ultrasound Micro-Doppler Signatures
pp. 18
Chapter III: Subtree replacement systems
pp. 19
Einige Anwendungen der Kreisscheibenarithmetik in der Kettenbruchtheorie
pp. 22
Individual Differences in Working Memory Capacity and Presence in Virtual Environments
pp. 22
Supervised Approaches to Assign Cooperative Patent Classification (CPC) Codes to Patents
pp. 23
On semantic issues in the relational model of data
pp. 24
Next Generation Semantic Web Applications
pp. 24
Research on Application of Data Mining Methods to Diagnosing Gastric Cancer
pp. 25
Searching with Partial Belief States in General Games with Incomplete Information
pp. 25
Constructive Modelling of Parallelized Environmental Models for Structured Testing of Automated Driving Systems
pp. 26
LogicObjects: Enabling Logic Programming in Java through Linguistic Symbiosis
pp. 26
CARE: Overview of an Adaptive Multithreaded Architecture
pp. 26
Exploiting Policies in an Open Infrastructure for Lifelong Learning
pp. 27
Conditionals
pp. 27
Trust and Distrust Definitions: One Bite at a Time
pp. 28
Type Similarity for the Lambek-Grishin Calculus Revisited
pp. 28
Agent-Oriented Design
pp. 29
Busy Beaver - The Influence of Representation
pp. 3
Markov Logic: A Unifying Language for Structural and Statistical Pattern Recognition
pp. 30
Coates' algorithm
pp. 31
Nucleic Acids
pp. 34
Managing proofs
pp. 39
Level Planarity: Transitivity vs. Even Crossings
pp. 39
A Logic for Assessing Sets of Heterogeneous Testing Hypotheses
pp. 42
Blind Source Separation from Single Measurements Using Singular Spectrum Analysis
pp. 47
3. Representing Experience
pp. 49
Feature-Specific Profiling
pp. 60
Alpha, Betti and the Megaparsec Universe: On the Topology of the Cosmic Web
pp. 71
Some special effective numberings
pp. 77
Mathematical Theory of Transfer, I
pp. 77
A Language for Biochemical Systems: Design and Formal Specification
pp. 102
Skew Jensen-Bregman Voronoi Diagrams
pp. 146
Mechanistic Insights into Metabolic Disturbance during Type-2 Diabetes and Obesity Using Qualitative Networks
pp. 22
What Should Be Abducible for Abductive Nursing Risk Management?
pp. 23
A Multimedia Session Manager Service for the Collaborative Browsing System
pp. 24
Computing Weights
pp. 24
Applying PVS Background Theories and Proof Strategies in Invariant Based Programming
pp. 28
Chapter IV: The confluence property and the Church-Rosser property
pp. 29
Sequential Deep Learning for Human Action Recognition
pp. 30
Supportedly Stable Answer Sets for Logic Programs with Generalized Atoms
pp. 32
Testing Embedded Memories: A Survey
pp. 33
A Goal-Oriented Approach for Modelling Self-organising MAS
pp. 35
Detection of horizontal lines in noisy run length encoded images: The FAST method
pp. 35
The Sandpile Model: Parallelization of Efficient Algorithms for Systems with Shared Memory
pp. 37
Sensitivity Analysis for Threshold Decision Making with Bayesian Belief Networks
pp. 38
SOHAC: Efficient Storage of Tick Data That Supports Search and Analysis
pp. 39
The effective arrangement of logical systems
pp. 41
Constraint relaxation
pp. 41
Proposing the Underlying Causes That Lead to the Trainee’s Erroneous Actions to the Trainer
pp. 43
Dynamic Model Checking for Multi-agent Systems
pp. 47
Sharing analysis
pp. 49
ddNF: An Efficient Data Structure for Header Spaces
pp. 50
Customized Document Research by a Stigmergic Approach Using Agents and Artifacts
pp. 51
NP-Completeness of Grammars Based Upon Products of Free Pregroups
pp. 51
Supervaluationism and Classical Logic
pp. 56
Network Monitoring for Security and Forensics
pp. 63
Highly Efficient \(GF(2^8)\) G F ( 2 8 ) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design
pp. 73
Completion with history-dependent complexities for generated equations
pp. 91
Programmed attributed graph rewrite systems — An advanced modelling formalism
pp. 120
Spatial Representations and Analysis Techniques
pp. 135
Theory of Grouping
pp. 19
Routing in 2-D Meshes: A Tutorial
pp. 33
The PLUSS Approach – Domain Modeling with Features, Use Cases and Use Case Realizations
pp. 33
Metaphor Design Spaces
pp. 36
Partial Word DFAs
pp. 36
Component Evolution in General Random Intersection Graphs
pp. 38
XMask: An Enabled XML Management System
pp. 40
Proof Obligation Generation and Discharging for Recursive Definitions in VDM
pp. 42
Solving Sequential Mixed Auctions with Integer Programming
pp. 45
Interaction Design Teaching Method Design
pp. 48
Soft-Tissue Simulation Using the Radial Elements Method
pp. 49
Using Equivalences of Worlds for Aggregation Semantics of Relational Conditionals
pp. 49
Phenotype Plasticity in Genetic Programming: A Comparison of Darwinian and Lamarckian Inheritance Schemes
pp. 5
Detecting Underlying Stance Adopted When Human Construe Behavior of Entities
pp. 52
A Development Environment for the Realization of Open and Scalable Multi-agent Systems
pp. 52
Electricity Consumption Time Series Profiling: A Data Mining Application in Energy Industry
pp. 57
Backtracking approaches
pp. 57
Possible Winners in Approval Voting
pp. 58
Shapley Facility Location Games
pp. 61
Automating Belief Revision for AgentSpeak
pp. 61
Non-deterministic Population Protocols
pp. 63
Consistency of Service Composition
pp. 65
Collaborative Framework for Monitoring Reliability of Distributed Components of Composed Services
pp. 68
FairCloud: Truthful Cloud Scheduling with Continuous and Combinatorial Auctions
pp. 73
Pragmatics of type-directed partial evaluation
pp. 73
Belief Revision Process Based on Trust: Agents Evaluating Reputation of Information Sources
pp. 79
K-Nearest Neighbor Search for Moving Query Point
pp. 102
Lightweight Coprocessor for Koblitz Curves: 283-Bit ECC Including Scalar Conversion with only 4300 Gates
pp. 113
The ACT-system experiences and future enhancements
pp. 151
A GIS Based Wireless Sensor Network Coverage Estimation and Optimization: A Voronoi Approach
pp. 156
Spatial Logic and Spatial Model Checking for Closure Spaces
pp. 216
First-Class Compositions
pp. 42
Atlas Based Segmentation and Mapping of Organs at Risk from Planning CT for the Development of Voxel-Wise Predictive Models of Toxicity in Prostate Radiotherapy
pp. 48
Clustering Analysis for Bacillus Genus Using Fourier Transform and Self-Organizing Map
pp. 50
Procedural Image Processing for Visualization
pp. 50
Transactional Cache Management with A periodic Invalidation Scheme in Mobile Environments
pp. 52
A CSP-Based Orientation Detection Model
pp. 54
A Proof-Theoretic Approach to Tactics
pp. 61
Developing of a Multimodal Interactive Training System in Therapeutic Calisthenics for Elderly People
pp. 63
Modelling Agents in Hard Real-Time Environments
pp. 63
Computer Memory: Why We Should Care What Is under the Hood
pp. 63
Weighted-Sequence Problem: ASP vs CASP and Declarative vs Problem-Oriented Solving
pp. 65
Peer-to-Peer Overlay Network Based on Swarm Intelligence
pp. 68
Iterative Aggregation/Disaggregation Methods for Computing Some Characteristics of Markov Chains
pp. 74
Preserving Sharing in the Partial Evaluation of Lazy Functional Programs
pp. 77
Universal Slope Sets for Upward Planar Drawings
pp. 78
Stable Availability under Denial of Service Attacks through Formal Patterns
pp. 82
Iterative User-Driven Fault Localization
pp. 82
Mode Analysis Domains for Typed Logic Programs
pp. 86
Optimistic Anonymous Participation in Inter-organizational Workflow Instances
pp. 86
A Novel WebGIS-Based Situational Awareness Platform for Trustworthy Big Data Integration and Analytics in Mobility Context
pp. 88
Model-Based Representations for Dataflow Schedules
pp. 97
Non-interactive Zaps and New Techniques for NIZK
pp. 102
Imperative Program Specialisation: An Approach Using CLP
pp. 103
Belief Revision and Nonmonotonic Reasoning — Revisited
pp. 108
Temporal Vagueness, Coordination and Communication
pp. 113
Towards a modular analysis of coloured Petri nets
pp. 116
Direct CCA-Secure KEM and Deterministic PKE from Plain LWE
pp. 117
A Model-Based, Open Architecture for Mobile, Spatially Aware Applications
pp. 12
Methodologies of Support to the Execution of Risk Management
pp. 131
The specification language of OBSCURE
pp. 131
Expressing computational complexity in constructive type theory
pp. 169
CBR Applied to Planning
pp. 175
Algebraic Theory of Inheritance
pp. 183
Universal models in categories for process synchronization
pp. 25
Similarity Invariant Delaunay Graph Matching
pp. 268
Challenges in the Design of the Package Template Mechanism
pp. 46
Creative Design by Bipartite KeyGraph Based Interactive Evolutionary Computation
pp. 48
A Comparison between Film-Screen Mammography and Full-Field Digital Mammography Utilizing Phase Contrast Technology in Breast Cancer Screening Programs
pp. 49
A Rule Chaining Architecture Using a Correlation Matrix Memory
pp. 54
Power and Permission in Computer Systems
pp. 55
Building Intensional Communities Using Shared Contexts
pp. 60
Tracking of Individuals in Very Long Video Sequences
pp. 62
Adaptive Integration of Multiple Cues for Contingency Detection
pp. 64
A Comparison of Two Strategies for Scaling Up Instance Selection in Huge Datasets
pp. 68
Agent Architectures for Compliance
pp. 69
An Attempt to Generalize Distortion Measure for JPEG Steganography
pp. 70
Virtual Helper or Virtual Card Player? Contrasting Responses of Older Users
pp. 71
The Security of Polynomial Information of Diffie-Hellman Key
pp. 72
Solving the Satisfiability Problem Through Boolean Networks
pp. 77
Bus Bunching Detection by Mining Sequences of Headway Deviations
pp. 81
Time-Integration Algorithms for the Computer Treatment of the Horizontal Advection in Air Pollution Models
pp. 85
Automating inversion of inductive predicates in Coq
pp. 87
An improvement of McMillan's unfolding algorithm
pp. 92
Elliptic integras concluded
pp. 92
Upward Planar Morphs
pp. 99
Improving Efficiency and Accuracy of Formula-Based Debugging
pp. 101
Learning Multicriteria Utility Functions with Random Utility Models
pp. 106
Electing a Leader in Multi-hop Radio Networks
pp. 106
Generation of Rule-Based Constraint Solvers: Combined Approach
pp. 115
7. Developing Case-Based Help-Desk Support Systems for Complex Technical Equipment
pp. 118
Towards the Testing of Composed Web Services in 3rd Generation Networks
pp. 133
Recovering Short Secret Keys of RLCE in Polynomial Time
pp. 136
Multi-Sorted Residuation
pp. 141
Empirical results
pp. 143
Accelerating Homomorphic Evaluation on Reconfigurable Hardware
pp. 188
Homotopic Object Reconstruction Using Natural Neighbor Barycentric Coordinates
pp. 201
8 UML for Software Safety and Certification
pp. 201
CBR for Design
pp. 213
Building blocks
pp. 219
8. Experience Adaptation
pp. 267
Programming with algebras
pp. 49
Randomness and Determination, from Physics and Computing towards Biology
pp. 57
Discovering Chances for Organizational Training Strategies from Intra-group Relations
pp. 65
DSM-Communities in the World-Wide Web
pp. 66
Wavelet Spectral Entropy for Indication of Epileptic Seizure in Extracranial EEG
pp. 69
The Effect of Animation Location and Timing on Visual Search Performance and Memory
pp. 72
Towards a Conceptual Framework for Interaction Design for the Pragmatic Web
pp. 72
Chapter VIII: Recursively defined functions
pp. 73
A Systems Theory Approach to Periodically Time-Varying Convolutional Codes by Means of Their Invariant Equivalent
pp. 74
C4.5 Consolidation Process: An Alternative to Intelligent Oversampling Methods in Class Imbalance Problems
pp. 74
Deformable Tissue Parameterized by Properties of Real Biological Tissue
pp. 78
A Fault-Tolerant Distributed Deadlock Detection Algorithm
pp. 80
Model-based analysis of printed tables
pp. 82
How to Vote Privately Using Bitcoin
pp. 84
Timed Automata Approach to Verification of Systems with Degradation
pp. 84
Applying the Davis-Putnam procedure to non-clausal formulas
pp. 89
Finding Kairos: The Influence of Context-Based Timing on Compliance with Well-Being Triggers
pp. 92
Detecting Abnormal Patterns in Call Graphs Based on the Aggregation of Relevant Vertex Measures
pp. 95
MIC(0) Preconditioning of Rotated Trilinear FEM Elliptic Systems
pp. 99
Schedule Insensitivity Reduction
pp. 99
Fault Localization of Energy Consumption Behavior Using Maximum Satisfiability
pp. 99
A Simple Low-Energy Instruction Wakeup Mechanism
pp. 105
Precedence-Constrained Scheduling Problems Parameterized by Partial Order Width
pp. 107
Minimizing Clutter Using Absence in Venn- \(\text {i}^\text {e}\)
pp. 109
Genetic Programming of a Goal-Keeper Control Strategy for the RoboCup Middle Size Competition
pp. 115
Adaptive Task Automata: A Framework for Verifying Adaptive Embedded Systems
pp. 116
A Formal Semantics for UML Interactions
pp. 116
An Evolutionary Algorithm for the Biobjective Capacitated m-Ring Star Problem
pp. 121
Lessons Learned: Performance Tuning for Hadoop Systems
pp. 133
Non-termination Analysis of Logic Programs Using Types
pp. 136
A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures
pp. 136
Understanding Branch Cuts of Expressions
pp. 241
9 Model Evolution and Management
pp. 63
Real-Time Extreme Programming
pp. 64
Trust, Ethics and Social Capital on the Internet: An Empirical Study Between Japan, USA and Singapore
pp. 74
Perceptual Intelligence
pp. 80
Three-Level Object-Oriented Database Architecture Based on Virtual Updateable Views
pp. 80
A Novel Gait Recognition Method Via Fusing Shape and Kinematics Features
pp. 81
Cognitive Decision Making for Navigation Assistance Based on Intent Recognition
pp. 84
Trimming Visibly Pushdown Automata
pp. 89
Some Notes upon “When Does $<{\mathbb T}>\(Equal Sat \)({\mathbb T})$ ?”
pp. 92
Morphological approach for dashed lines detection
pp. 95
The SAT-Based Approach for Classical Modal Logics
pp. 97
Multidimensional Zero-Correlation Linear Cryptanalysis on 23-Round LBlock-s
pp. 98
Programming Organization-Aware Agents
pp. 100
Tracking the Movement of Surgical Tools in a Virtual Temporal Bone Dissection Simulator
pp. 101
How to Correctly Prune Tropical Trees
pp. 101
Structural Sharing and Efficient Proof-Search in Propositional Intuitionistic Logic
pp. 105
Job Scheduling for Maximal Throughput in Autonomic Computing Systems
pp. 106
General diagram-recognition methodologies
pp. 113
On a Schur Complement Approach for Solving Two-Level Finite Element Systems
pp. 115
A Temporal Agent Communication Language for Dynamic Multi-agent Systems
pp. 121
Group-Based Pricing to Shape Demand in Real-Time Electricity Markets
pp. 121
A Scheme of Independent Calculations in a Precedence Constrained Routing Problem
pp. 122
Model-Based Safety Analysis of Simulink Models Using SCADE Design Verifier
pp. 130
Planning System for Emergency Services
pp. 141
JADL – An Agent Description Language for Smart Agents
pp. 142
Work-Energy Profiles: General Approach and In-Memory Database Application
pp. 167
On the Complexity of “Superdetermined” Minrank Instances
pp. 172
On Associative Lambek Calculus Extended with Basic Proper Axioms
pp. 176
Alternatives to Threshold-Based Desire Selection in Bayesian BDI Agents
pp. 184
Initial behaviour semantics for algebraic specifications
pp. 271
10 Model-Based Analysis and Development of Dependable Systems
pp. 284
Conclusions and continued research
pp. 58
Reducing the Overhead of Intra-Node Communication in Clusters of SMPs
pp. 82
Intensional Markup Language
pp. 82
Automatic Detection of Critical Epochs in coma-EEG Using Independent Component Analysis and Higher Order Statistics
pp. 89
Modeling Architectural Value: Cash Flow, Time and Uncertainty
pp. 89
Advanced Interaction in Context
pp. 92
The Impact of Rich Application Frameworks on User Experience Design
pp. 94
Instantiation of Parameterized Data Structures for Model-Based Testing
pp. 94
Using Model Trees and Their Ensembles for Imbalanced Data
pp. 102
Real-Time Detection of Out-of-Plane Objects in Stereo Vision
pp. 102
Exploring Brick-Based Navigation and Composition in an Augmented Reality
pp. 109
Verification of LTL on B Event Systems
pp. 114
Prefix-Free Regular Languages: Closure Properties, Difference, and Left Quotient
pp. 116
Online Scheduling of Bounded Length Jobs to Maximize Throughput
pp. 119
Small Talk Is More than Chit-Chat
pp. 124
Capturing Abstract Matrices from Paper
pp. 125
Prediction of Difficulty Levels in Video Games from Ongoing EEG
pp. 138
A Segment-Swapping Approach for Executing Trapped Computations
pp. 146
An Operational Decision Support Framework for Monitoring Business Constraints
pp. 161
Use of TTCN-3 for Software Module Testing
pp. 167
Automatic compositional verification of some Security properties
pp. 176
Transformation Rules for Logic Programs with Goals as Arguments
pp. 189
Constant-Round Group Key Exchange from the Ring-LWE Assumption
pp. 210
Some consequences of cryptographical conjectures for S 2 1 and EF
pp. 315
11. Experience Management for Self-Service and Help-Desk Support
pp. 66
On Service-Oriented Network Measurement Architecture with Mobile Agent
pp. 75
Communication with and Between Mathematical Software Systems
pp. 81
Tikhonov-Type Regularization for Restricted Boltzmann Machines
pp. 84
Query Based Summarization Using Non-negative Matrix Factorization
pp. 87
Dynamic belief analysis
pp. 90
Towards a Logical Basis for Modelling and Querying Multi-dimensional Databases
pp. 93
From Stress Awareness to Coping Strategies of Medical Staff: Supporting Reflection on Physiological Data
pp. 98
How Developers Anticipate User Behavior in the Design of Assistance Systems
pp. 102
Comparison of System Family Modeling Approaches
pp. 102
Effect of Diffusion Weighting and Number of Sensitizing Directions on Fiber Tracking in DTI
pp. 103
Belief revision through the belief-function formalism in a multi-agent environment
pp. 108
Design Perspectives: Sampling User Research for Concept Development
pp. 111
Coprime Mapping Transformation for Protected and Revocable Fingerprint Template Generation
pp. 112
Brain Memory Inspired Template Updating Modeling for Robust Moving Object Tracking Using Particle Filter
pp. 112
Stereo Imaging with Uncalibrated Camera
pp. 122
Constant Price of Anarchy in Network Creation Games via Public Service Advertising
pp. 136
Token Jumping in Minor-Closed Classes
pp. 146
Realizing a Secure Federation of Multi-institutional Service Systems
pp. 154
Risk Information Extraction and Aggregation
pp. 161
On Strong Equilibria and Improvement Dynamics in Network Creation Games
pp. 166
Lattice Completion Algorithms for Distributed Computations
pp. 177
Specification and Realization of Access Control in SPKI/SDSI
pp. 177
Distributed Load Tests with TTCN-3
pp. 78
Pathtrait: A Tool for Tight Link Location and End-to-End Available Bandwidth Measurement
pp. 85
Modelling Agents’ Knowledge Inductively
pp. 90
Intelligent Secure Web Service Using Context Information
pp. 111
Texture Guided Active Appearance Model Propagation for Prostate Segmentation
pp. 117
Formal specification of beliefs in multi-agent systems
pp. 122
Global Hand Pose Estimation by Multiple Camera Ellipse Tracking
pp. 125
Hypergraph Automata: A Theoretical Model for Patterned Self-assembly
pp. 128
Efficient Algorithms for Channel Assignment in a Cellular Network
pp. 131
A Better Way towards Key Establishment and Authentication in Wireless Sensor Networks
pp. 132
3D Reconstruction of Large Tubular Geometries from CT Data
pp. 145
Image Information Hiding Based on Binary Holography of Iterative Conjugate-Symmetric Extension
pp. 147
Some Considerations on the Usability of Interactive Provers
pp. 148
Trust Based Evaluation of Wikipedia’s Contributors
pp. 151
Improving Classifier Performance by Knowledge-Driven Data Preparation
pp. 152
Stochastic Modelling of Scientific Terms Distribution in Publications
pp. 159
An Algorithm with Approximation Ratio 5/6 for the Metric Maximum m-PSP
pp. 161
Reactive and Memory-Based Genetic Programming for Robot Control
pp. 168
LearnPADS + + : Incremental Inference of Ad Hoc Data Formats
pp. 172
Tool-Supported Compression of UML Class Diagrams
pp. 178
Concurrent Model Synchronization with Conflict Resolution Based on Triple Graph Grammars
pp. 185
Synthesis of Data Views for Communicating Processes
pp. 191
A Collaborative Framework to Realize Virtual Enterprises Using 3APL
pp. 194
Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack
pp. 197
Analyzing the Impact of Protocol Changes on Tests
pp. 216
The Replacement Operation for CCP Programs
pp. 235
GoalSPEC: A Goal Specification Language Supporting Adaptivity and Evolution
pp. 235
Abstract Tensor Systems as Monoidal Categories
pp. 236
Discovering Spatial Co-location Patterns: A Summary of Results
pp. 253
Characterizing parallel time by type 2 recursions with polynomial output length
pp. 277
Compositional Synthesis of Leakage Resilient Programs
pp. 86
Melody Recognition with Learned Edit Distances
pp. 118
Design of a Fuzzy Takagi-Sugeno Controller to Vary the Joint Knee Angle of Paraplegic Patients
pp. 121
Message Oriented Middleware for Flexible Wizard of Oz Experiments in HCI
pp. 127
Word Oriented Cascade Jump σ−LFSR
pp. 128
Intuitive Use of User Interfaces: Defining a Vague Concept
pp. 131
Reasoning about collective goals
pp. 133
Vision-Based Self-localization of Autonomous Guided Vehicle Using Landmarks of Colored Pentagons
pp. 134
Learning Naive Bayes Models for Multiple-Instance Learning with Label Proportions
pp. 155
Modelling and Proof Analysis of Interrupt Driven Scheduling
pp. 156
Plan Recognition by Program Execution in Continuous Temporal Domains
pp. 156
High Capacity Data Hiding for Halftone Image Authentication
pp. 157
Mechanized Mathematics
pp. 163
Cross-Layer Approach to Detect Data Packet Droppers in Mobile Ad-Hoc Networks
pp. 179
Finding Upper Bounds for Software Failure Probabilities – Experiments and Results
pp. 181
Restricted Manipulation in Iterative Voting: Condorcet Efficiency and Borda Score
pp. 194
Recursive Checkonly QVT-R Transformations with General when and where Clauses via the Modal Mu Calculus
pp. 206
Reversible Language Extensions and Their Application in Debugging
pp. 213
Detecting Observability Problems in Distributed Testing
pp. 215
Abstract Diagnosis of First Order Functional Logic Programs
pp. 234
Annotations for Prolog – A Concept and Runtime Handling
pp. 242
Towards soft computing
pp. 89
Document Infrastructure (Module DOC)
pp. 97
Context First
pp. 103
Optimal Trajectory Generation for Walking Up and Down a Staircase with a Biped Robot Using Genetic Algorithm (GA)
pp. 116
A Context Model for Ubiquitous Computing Applications
pp. 127
Characterization of Breast Abnormality Patterns in Digital Mammograms Using Auto-associator Neural Network
pp. 133
Using Corba in the Web Operating System
pp. 141
Formalisation of a cooperation model based on joint intentions
pp. 142
A Novel Method for Simulating Cancer Growth
pp. 168
Modeling Human Motion Trajectories by Sparse Activation of Motion Primitives Learned from Unpartitioned Data
pp. 177
On-Demand Distributed Energy-Aware Routing with Limited Route Length
pp. 182
A Fully Polynomial-Time Approximation Scheme for a Special Case of a Balanced 2-Clustering Problem
pp. 198
Distributed Policy Specification and Interpretation with Classified Advertisements
pp. 204
Modeling Dynamic Software Components in UML
pp. 213
Queue Layouts of Planar 3-Trees
pp. 216
Circuits as streams in Coq: Verification of a sequential multiplier
pp. 251
On Forward-Secure Storage
pp. 279
Calendars, Time Granularities, and Automata
pp. 47
Modeling and Use of an Ontology Network for Website Recommendation Systems
pp. 117
3D Object Recognition Using Hyper-Graphs and Ranked Local Invariant Features
pp. 123
Tool Support for Complex Refactoring to Design Patterns
pp. 136
Enhancing Personas with Their Main Scenarios
pp. 147
Ergonomists and Usability Engineers Encounter Test Method Dilemmas with Virtual Work Environments
pp. 149
Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions
pp. 166
Solving Systems of Linear Algebraic Equations Using Quasirandom Numbers
pp. 178
Relational Learning: Hard Problems and Phase Transitions
pp. 180
Minimal while programs
pp. 181
Knowledge Management in Role Based Agents
pp. 184
Ein Versuch zur Verallgemeinerung der Intervallrechnung
pp. 186
Formal Transformation of Platform Independent Models into Platform Specific Models
pp. 188
Basic Mental Attitudes of a Collaborating Agent: Cognitive Primitives for MAS
pp. 193
PTAS for the Euclidean Capacitated Vehicle Routing Problem in \(R^d\)
pp. 208
Evolutionary Safety Analysis: Motivations from the Air Traffic Management Domain
pp. 214
Distributed Genetic Algorithm for Inference of Biological Scale-Free Network Structure
pp. 220
Extending UML for Modeling Reflective Software Components
pp. 229
Crossing Minimization in Perturbed Drawings
pp. 235
Secure Data Management in Reactive Sensor Networks
pp. 267
If We Could Go Back in Time... On the Use of ‘Unnatural’ Time and Ordering in Dataflow Models
pp. 300
Feasibly categorical models
pp. 322
A Self-Applicable supercompiler
pp. 397
Solid Structure
pp. 145
Ovarian Cancer Prognosis by Hemostasis and Complementary Learning
pp. 164
Pattern Recognition in Biological Time Series
pp. 168
A Multi-objective Evolutionary Algorithm for Color Image Segmentation
pp. 173
Towards layered dialogical agents
pp. 174
Asynchronous Signal Passing for Tile Self-assembly: Fuel Efficient Computation and Efficient Assembly of Shapes
pp. 191
The condition problem in solution of linear multistage systems
pp. 202
A Bio-inspired Approach for Self-protecting an Organic Middleware with Artificial Antibodies
pp. 203
Evolving Fuzzy Rule Based Classifiers with GA-P: A Grammatical Approach
pp. 208
Managing Informal Mathematical Knowledge: Techniques from Informal Logic
pp. 209
A Minimum Spanning Tree-Inspired Clustering-Based Outlier Detection Technique
pp. 210
Subjective Situations
pp. 212
Ultra High-Performance ASIC Implementation of SM2 with SPA Resistance
pp. 227
Virtualizing Real-World Objects in FRP
pp. 263
Towards Machine-Actionable Modules of a Digital Mathematics Library
pp. 278
Priorities for modeling and verifying distributed systems
pp. 290
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
pp. 297
Extended Lambek Calculi and First-Order Linear Logic
pp. 299
Concurrency relations and the safety problem for Petri nets
pp. 307
On Lions and Elligators: An Efficient Constant-Time Implementation of CSIDH
pp. 330
TriviA: A Fast and Secure Authenticated Encryption Scheme
pp. 338
Multi-Level Lambda-Calculi: An algebraic description
pp. 53
SMILE – A Framework for Semantic Applications
pp. 137
Pair-Associate Learning with Modulated Spike-Time Dependent Plasticity
pp. 143
An Exploratory Analysis on User Behavior Regularity in the Mobile Internet
pp. 150
Design Verification for Product Line Development
pp. 168
Contextual Ontologies
pp. 169
UniRSS: A New RSS Framework Supporting Dynamic Plug-In of RSS Extension Modules
pp. 186
Control Languages Associated with Tissue P Systems
pp. 190
On WQO Property for Different Quasi Orderings of the Set of Permutations
pp. 191
A Parallel Compact Hash Table
pp. 196
Parallel square root iterations
pp. 205
Improved Query Suggestion by Query Search
pp. 213
Cooperative Sign Language Tutoring: A Multiagent Approach
pp. 216
Security Policy Enforcement Through Refinement Process
pp. 220
Variable Neighborhood Search-Based Heuristics for Min-Power Symmetric Connectivity Problem in Wireless Networks
pp. 228
A New Approach for Concurrent Program Slicing
pp. 247
A Game-Based Adaptive Unit of Learning with IMS Learning Design and <e-Adventure>
pp. 278
A Hybrid Approach for Semantic Enrichment of MathML Mathematical Expressions
pp. 280
Multiparty Computation from Threshold Homomorphic Encryption
pp. 367
Automatic presentations of structures
pp. 55
AVYTAT’10 - PC Co-chairs Message
pp. 174
Study of Phase Relationships in ECoG Signals Using Hilbert-Huang Transforms
pp. 174
Defining a Work Support and Training Tool for Automation Design Engineers
pp. 181
On Generating All Maximal Acyclic Subhypergraphs with Polynomial Delay
pp. 183
Using the Relaxed Plan Heuristic to Select Goals in Oversubscription Planning Problems
pp. 184
Multipath Routing in Ad Hoc Wireless Networks with Omni Directional and Directional Antenna: A Comparative Study
pp. 202
Reduction of Petri-nets
pp. 205
Multi-Criteria TSP: Min and Max Combined
pp. 205
Newton-Algorithmen zur Bestimmung von Polynomwurzeln unter Verwendung komplexer Kreisarithmetik
pp. 208
On the Boundary of Regular Languages
pp. 233
A combined high and low level approach to interpreting scanned engineering drawings
pp. 245
Grid Computing Supporting System on ITBL Project
pp. 258
Node-Based Connection Semantics for Equation-Based Object-Oriented Modeling Languages
pp. 263
Using Formal Concept Analysis for Mining and Interpreting Patient Flows within a Healthcare Network
pp. 269
Causality, Influence, and Computation in Possibly Disconnected Synchronous Dynamic Networks
pp. 271
A Heuristic Approach Towards Drawings of Graphs with High Crossing Resolution
pp. 273
Semantic Modeling and Inference with Episodic Organization for Managing Personal Digital Traces
pp. 350
Improved Quantum Multicollision-Finding Algorithm
pp. 365
Design and Implementation of Multi-scale Databases
pp. 455
Process Grammar
pp. 150
Online Adaptive Fault-Tolerant Routing in 2D Torus
pp. 153
Bifurcating Neurons with Filtered Base Signals
pp. 159
Remote Plug and Play USB Devices for Mobile Terminals
pp. 161
Motivation and Context-Based Multi-Robot Architecture for Dynamic Task, Role and Behavior Selections
pp. 191
GPU-Based Active Contour Segmentation Using Gradient Vector Flow
pp. 209
Numerical Analysis of Quantum Speed Limits: Controlled Quantum Spin Chain Systems with Constrained Control Functions
pp. 215
Fehlerabschätzung bei linearer Optimierung
pp. 227
Faster Model Checking for Open Systems
pp. 229
Improving Confidence of Dual Averaging Stochastic Online Learning via Aggregation
pp. 232
GOAL Agents Instantiate Intention Logic
pp. 243
Redundant Dictionary Spaces as a General Concept for the Analysis of Non-vectorial Data
pp. 249
How to Share Knowledge by Gossiping
pp. 259
Branching Time Semantics for UML 2.0 Sequence Diagrams
pp. 273
A Declarative Specification of Tree-Based Symbolic Arithmetic Computations
pp. 289
A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes
pp. 296
Escaping the Trap of Too Precise Topic Queries
pp. 306
Symbolic and on the Fly Testing with Real-Time Observers
pp. 325
Cryptanalysis of Reduced-Round MISTY
pp. 368
The Monotone Lambek Calculus Is NP-Complete
pp. 387
The Architecture of ArcIMS, a Distributed Internet Map Server
pp. 166
SIP-Based Streaming Control Architecture for Mobile Personal Area Networks
pp. 167
Complex Fiedler Vectors for Shape Retrieval
pp. 184
High-Order Markov Kernels for Network Intrusion Detection
pp. 188
Synchronization and Control of Cellular Automata
pp. 210
Program Development Environment for OpenMP Programs on ccNUMA Architectures
pp. 233
Supporting Fuzzy Metric Temporal Logic Based Situation Recognition by Mean Shift Clustering
pp. 236
ALIVE: A Framework for Flexible and Adaptive Service Coordination
pp. 239
An Argumentation Approach to Semantics of Declarative Programs with Defeasible Inheritance
pp. 258
Human-Centered Text Mining: A New Software System
pp. 258
People, Place, and Time: Inferences from Diagrams
pp. 260
Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups
pp. 266
Information Retrieval and Rendering with MML Query
pp. 267
Identifying Malicious Behavior in Multi-party Bipolar Argumentation Debates
pp. 301
Tracing Your Maintenance Work – A Cross-Project Validation of an Automated Classification Dictionary for Commit Messages
pp. 303
An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack
pp. 324
Using TimedTTCN-3 in Interoperability Testing for Real-Time Communication Systems
pp. 340
The Rectangle Attack — Rectangling the Serpent
pp. 349
Reactive EFSMs — Reactive Promela/RSPIN
pp. 375
Measuring Masking Fault-Tolerance
pp. 430
Specialization of imperative programs through analysis of relational expressions
pp. 170
Three Patterns in Java Unit Testing
pp. 177
Combining Shape Priors and MRF-Segmentation
pp. 187
Notation and Presentation (Module PRES)
pp. 198
The Role of Event Boundaries in Language: Perceiving and Describing the Sequence of Simultaneous Events
pp. 204
Are Computers Capable of Understanding Our Emotional States?
pp. 213
Architecture for the Use of Synergies between Knowledge Engineering and Requirements Engineering
pp. 217
Weaknesses of Cuckoo Hashing with a Simple Universal Hash Class: The Case of Large Universes
pp. 229
On approximate iterations and solutions for equations considered in function spaces
pp. 230
Preliminary Validation Using in vivo Measures of a Macroscopic Electrical Model of the Heart
pp. 232
Towards Computation with Microchemomechanical Systems
pp. 237
Ontology-Based Information Extraction for French Newspaper Articles
pp. 244
Hyper-optimization for Deterministic Tree Automata
pp. 251
Entailment of Non-structural Subtype Constraints
pp. 255
A Tool for Firewall Administration
pp. 262
Against Rigor
pp. 270
A benchmark: Performance evaluation of dashed-line detection algorithms
pp. 289
Functional Apportioning of Safety Requirements on Railway Signalling Systems
pp. 292
Composition of Use Cases Using Synchronization and Model Checking
pp. 311
Simple Pricing Schemes for the Cloud
pp. 316
Cohesive and Isolated Development with Branches
pp. 358
Efficient Amplification of the Security of Weak Pseudo-random Function Generators
pp. 373
Receipt-Free Universally-Verifiable Voting with Everlasting Privacy
pp. 393
Conjoinability in 1-Discontinuous Lambek Calculus
pp. 404
On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders
pp. 425
Efficient Mining of Spatiotemporal Patterns
pp. 169
Integrity-Aware PCBC Encryption Schemes
pp. 177
A Biophysical Network Model Displaying the Role of Basal Ganglia Pathways in Action Selection
pp. 181
Development and Evaluation of No-Record Chat System Against Screen Capture
pp. 201
A Distributed Neural Network Learning Algorithm for Network Intrusion Detection System
pp. 210
Supporting Production Strategies as Refinements of the Production Process
pp. 222
Temporal Alignment of Time Varying MRI Datasets for High Resolution Medical Visualization
pp. 231
Significance of DNN-AM for Multimodal Sentiment Analysis
pp. 241
Semantic Approach to Identity in Coreference Resolution Task
pp. 257
The B-Method for the Construction of Microkernel-Based Systems
pp. 282
Countering Universal Image Tampering Detection with Histogram Restoration
pp. 284
Tropical Combinatorial Nullstellensatz and Fewnomials Testing
pp. 303
Automatic Code Generation for PLC Controllers
pp. 322
MACE – Enriching Architectural Learning Objects for Experience Multiplication
pp. 324
On the Behavior of Complex Object-Oriented Systems
pp. 373
Min-round Resettable Zero-Knowledge in the Public-Key Model
pp. 391
The Concurrency Factory software development environment
pp. 402
The Hidden Structural Rules of the Discontinuous Lambek Calculus
pp. 172
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
pp. 189
Home-Network of a Mutual Complement Communication System by Wired and Wireless
pp. 197
Consensus Graphs for Symmetry Plane Estimation
pp. 209
A DGC-Based Data Classification Method Used for Abnormal Network Intrusion Detection
pp. 214
Process Choreography for Human Interaction Computer-Aided Simulation
pp. 219
A Seven-State Time-Optimum Square Synchronizer
pp. 219
Repeated Root Cyclic and Negacyclic Codes over Galois Rings
pp. 227
Comparative Analysis of Classification Methods for Protein Interaction Verification System
pp. 232
Physically Interacting with Four Dimensions
pp. 236
Java for Scientific Computation: Prospects and Problems
pp. 246
The error in interval arithmetic
pp. 260
Hardware Verification and Beyond: Using B at AWE
pp. 278
Electronic Geometry Textbook: A Geometric Textbook Knowledge Management System
pp. 283
Evaluating the Effects of Colour in LineSets
pp. 298
Mixed Integer Programming Approach to Multiprocessor Job Scheduling with Setup Times
pp. 303
Modeling and Enforcing Semantic Obligations for Access Control
pp. 323
Resource Allocation Systems: Some Complexity Results on the S4PR Class
pp. 340
Routing Games in the Wild: Efficiency, Equilibration and Regret
pp. 394
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
pp. 395
Structural Cryptanalysis of SASAS
pp. 460
Pre-aggregation in Spatial Data Warehouses
pp. 90
RDF Containers – A Framework for the Integration of Distributed and Heterogeneous Applications
pp. 193
Emergence of Connectivity Patterns from Long-Term and Short-Term Plasticities
pp. 207
Graph Characteristic from the Gauss-Bonnet Theorem
pp. 221
Building Multimodal Interfaces Out of Executable, Model-Based Interactors and Mappings
pp. 223
Construction of Additive Reed-Muller Codes
pp. 232
Adaptive User Interactive Sketching for Teaching Based on Pen Gesture
pp. 243
Low Level Moving-Feature Extraction Via Heat Flow Analogy
pp. 249
A New Evaluation Method for Ontology Alignment Measures
pp. 250
Hybrid Teams in Virtual Environments: Samurai Joins the Training Team
pp. 255
Pattern Matching with Swaps for Short Patterns in Linear Time
pp. 303
An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks
pp. 312
Deterministic Oblivious Local Broadcast in the SINR Model
pp. 318
Coupling Regulative and Constitutive Dimensions in Situated Artificial Institutions
pp. 339
Optimized Colored Nets Unfolding
pp. 349
Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract)
pp. 409
Random Selection with an Adversarial Majority
pp. 221
OMDoc Applications, Tools, and Projects
pp. 253
Topography of Functional Connectivity in Human Multichannel Electroencephalogram during Second Language Processing
pp. 267
Automatic Bug Detection in Microcontroller Software by Static Program Analysis
pp. 297
Autonomous Spacecraft Resource Management: A Multi-Agent Approach
pp. 300
On Duplication in Mathematical Repositories
pp. 336
Learning a Majority Rule Model from Large Sets of Assignment Examples
pp. 344
Design Evaluation: Estimating Multiple Critical Performance and Cost Impacts of Designs
pp. 344
Math-Net.Ru as a Digital Archive of the Russian Mathematical Knowledge from the XIX Century to Today
pp. 353
A Survey of Control-Flow Obfuscations
pp. 502
Query Processing in Broadcasted Spatial Index Trees
pp. 263
A Summary on the Study of the Medium-Term Forecasting of the Extra-Virgen Olive Oil Price
pp. 268
Performance Prediction Methodology for Parallel Programs with MPI in NOW Environments
pp. 270
Interval-extension of quasilinearization method
pp. 293
Single Feature Indicator Systems in the Openbox
pp. 304
Balancing Gains, Risks, Costs, and Real-Time Constraints in the Ball Passing Algorithm for the Robotic Soccer
pp. 349
A Dynamic Symbolic Geometry Environment Based on the GröbnerCover Algorithm for the Computation of Geometric Loci and Envelopes
pp. 357
Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments
pp. 372
Extending EFSMs to Specify and Test Timed Systems with Action Durations and Timeouts
pp. 383
Cascades and Myopic Routing in Nonhomogeneous Kleinberg’s Small World Model
pp. 407
cTc — A tool supporting the construction of cTLA-Specifications
pp. 445
On Expected Constant-Round Protocols for Byzantine Agreement
pp. 478
Complexity Challenges in Development of Cyber-Physical Systems
pp. 120
Incremental Validation of Models in a MDE Approach Applied to the Modeling of Complex Data Structures
pp. 217
Timing Self-generated Actions for Sensory Streaming
pp. 227
Validating OMDoc Documents
pp. 235
Novel Efficient Certificateless Aggregate Signatures
pp. 239
Topology Control in Large-Scale High Dynamic Mobile Ad-Hoc Networks
pp. 243
A Novel Blind Digital Watermark Algorithm Based on Neural Network and Chaotic Map
pp. 272
Fine-Grid Resolution in Danish Eulerian Model and an Implementation on SGI Origin 2000 Computer
pp. 279
Zur numerischen Konstruktion konvergenter Schrankenfolgen für Systeme nichtlinearer, gewöhnlicher Anfangswertaufgaben
pp. 287
Integrating Knowledge Encoded by Linguistic Phenomena of Indian Languages with Neural Machine Translation
pp. 336
Blind Detection of Electronic Voice Transformation with Natural Disguise
pp. 361
Secure Itineraries Framework for Mobile Agent Systems
pp. 409
On the Danger of Coverage Directed Test Case Generation
pp. 463
Robust Multiparty Computation with Linear Communication Complexity
pp. 251
A Gait Generation for an Unlocked Joint Failure of the Quadruped Robot with Balance Weight
pp. 258
From Structural Analysis to Scenarios and Patterns for Knowledge Sharing Applications
pp. 259
A Lateral Inhibitory Spiking Neural Network for Sparse Representation in Visual Cortex
pp. 274
Chat Mining for Gender Prediction
pp. 283
Multiscale Extension of the Gravitational Approach to Edge Detection
pp. 288
Untersuchungen der Grenzgenauigkeit von Algorithmen zur Auflösung linearer Gleichungssysteme mit Fehlererfassung
pp. 297
Partitioned-Based Clustering Approaches for Single Document Extractive Text Summarization
pp. 303
Adaptive Incentive-Compatible Sponsored Search Auction
pp. 333
Towards a Conceptual Representation of Actions
pp. 347
Separators Are as Simple as Cutsets
pp. 365
Malafide Intension Based Detection of Privacy Violation in Information System
pp. 375
Budgeted Personalized Incentive Approaches for Smoothing Congestion in Resource Networks
pp. 381
Security Research from a Multi-disciplinary and Multi-sectoral Perspective
pp. 402
Inserting an Edge into a Geometric Embedding
pp. 483
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation
pp. 577
Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability
pp. 257
Graph Characteristics from the Ihara Zeta Function
pp. 259
Relating Transition P Systems and Spiking Neural P Systems
pp. 262
Development of a Micro Quad-Rotor UAV for Monitoring an Indoor Environment
pp. 268
A Design Patterns Approach to Adaptive User Interfaces for Users with Special Needs
pp. 275
Exhaustive Evaluation of Radius 2 Toggle Rules for a Variable-Length Cryptographic Cellular Automata-Based Model
pp. 281
Meca: A Tool for Access Control Models
pp. 284
Integrated Expert Management Knowledge on OSI Network Management Objects
pp. 293
A Study of the Suitability of Evolutionary Computation in 3D Modeling of Forensic Remains
pp. 300
Triple Space Computing: Adding Semantics to Space-Based Computing
pp. 358
Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence Modulation
pp. 369
Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report)
pp. 416
\(\beta \)-Stars or On Extending a Drawing of a Connected Subgraph
pp. 416
Generating Tests from UML Specifications
pp. 420
Grey-Box Checking
pp. 452
Abstract Program Slicing: From Theory towards an Implementation
pp. 495
Identification Protocols Secure against Reset Attacks
pp. 239
Biomimetic Binaural Sound Source Localisation with Ego-Noise Cancellation
pp. 288
The Effect of Traffic on Situation Awareness and Mental Workload: Simulator-Based Study
pp. 303
L-System-Driven Self-assembly for Swarm Robotics
pp. 306
Verbesserung von Fehlerschranken bei iterativer Matrizeninversion
pp. 321
Patient-Specific Biomechanical Model of the Brain: Application to Parkinson’s Disease Procedure
pp. 349
Incomplete Transition Complexity of Basic Operations on Finite Languages
pp. 373
Towards a Formal Specification Method for Enterprise Information System Security
pp. 455
A New Design Defects Classification: Marrying Detection and Correction
pp. 468
Loop Invariant Synthesis in a Combined Domain
pp. 512
Does Encryption with Redundancy Provide Authenticity?
pp. 150
A Characterization of the Layout Definition Problem for Web Search Results
pp. 275
Adaptive Parallel Ant Colony Optimization
pp. 289
Plug-and-Play Nondeterminacy
pp. 304
Knowledge Management in Different Software Development Approaches
pp. 311
Iterationsverfahren bei inklusionsmonotonen Intervallfunktionen
pp. 313
Singular Value Decomposition-Based Illumination Compensation in Video
pp. 313
An Study on Ear Detection and Its Applications to Face Detection
pp. 319
Design and Implementation of a Soft Real Time Fault Tolerant System
pp. 368
Real-Time Motion Planning in Autonomous Vehicles: A Hybrid Approach
pp. 377
Recent Research on Privacy Preserving Data Mining
pp. 480
Usability of Visual Data Profiling in Data Cleaning and Transformation
pp. 485
Software Metrics in Static Program Analysis
pp. 255
Walking Pattern Analysis of Humanoid Robot Using Support Vector Regression
pp. 296
Variable Step Length Best Combination AEC Algorithm in IPC
pp. 306
Human Performance Model for Combined Steering-Targeting Tasks
pp. 317
Using Wearable Computer as an Audiovisual Memory Prosthesis
pp. 380
Solving Employee Timetabling Problems by Generalized Local Search
pp. 425
A Concurrent Architecture for Agent Reasoning Cycle Execution in Jason
pp. 431
Uppaal in 1995
pp. 486
System Dependence Graphs in Sequential Erlang
pp. 170
Outlines for Dynamic Visualization of Semantic Web Data
pp. 295
Ontology Learning from Text: A Soft Computing Paradigm
pp. 324
An Architecture Design Process Using a Supportable Meta-architecture and Roundtrip Engineering
pp. 339
Quick-Reference Table to the OMDoc Attributes
pp. 377
Programming with Explicit Regions
pp. 398
Notations Around the World: Census and Exploitation
pp. 302
Text Categorization Based on Artificial Neural Networks
pp. 308
Spectral Embedding of Feature Hypergraphs
pp. 311
Emotion Recognition Based on Physiological Signals
pp. 343
A Token-Based Distributed Algorithm for Total Order Atomic Broadcast
pp. 343
Light Simulation in a Distributed Driving Simulator
pp. 343
Combining Neighbourhoods in Fuzzy Job Shop Problems
pp. 425
Memoryless Hash-Based Perceptual Image Authentication
pp. 441
On the Parameter Control of the Residual Method for the Correction of Improper Problems of Convex Programming
pp. 444
A Digital Library Framework for Reusing e-Learning Video Documents
pp. 449
Automating Personalized Learning Through Motivation
pp. 280
Differential Entropy of Multivariate Neural Spike Trains
pp. 318
Clustering Using Class Specific Hyper Graphs
pp. 353
Self-adaptive RBF Neural Networks for Face Recognition
pp. 427
On Building a Knowledge Base for Stability Theory
pp. 435
Visual Cryptography Based Watermarking: Definition and Meaning
pp. 455
Agent Based Simulation to Evaluate Adaptive Caching in Distributed Databases
pp. 329
Single LFP Sorting for High-Resolution Brain-Chip Interfacing
pp. 329
Structure Is a Visual Class Invariant
pp. 330
Hippie: A Nomadic Information System
pp. 341
Cognitive Analysis for Knowledge Modeling in Air Traffic Control Work
pp. 354
Adaptive Enumeration Strategies and Metabacktracks for Constraint Solving
pp. 366
A Semantic Search Conceptual Model and Application in Security Access Control
pp. 401
A Problem Kernelization for Graph Packing
pp. 423
Parallel LU-decomposition on Pentium Streaming SIMD Extensions
pp. 436
Preserving Context Privacy in Distributed Hash Table Wireless Sensor Networks
pp. 440
Proviola: A Tool for Proof Re-animation
pp. 463
Analysing Incentive Strategies to Promote Participation in Crowdsourcing Systems
pp. 524
Ortho-Polygon Visibility Representations of 3-Connected 1-Plane Graphs
pp. 296
Exploratory Behaviour Depends on Multisensory Integration during Spatial Learning
pp. 315
Component-Oriented Agile Software Development
pp. 331
Word Frequency Effect and Word Similarity Effect in Korean Lexical Decision Task and Their Computational Model
pp. 338
Variable Momentum Factor Odd Symmetry Error Function Blind Equalization Algorithm
pp. 364
FORBAC: A Flexible Organisation and Role-Based Access Control Model for Secure Information Systems
pp. 373
Accurate Extraction of Reciprocal Space Information from Transmission Electron Microscopy Images
pp. 377
Document Filtering for Domain Ontology Based on Concept Preferences
pp. 386
Deduction in Logic of Association Rules
pp. 464
A Secret Enriched Visual Cryptography
pp. 534
Closing the Gap between Object-Oriented Modeling of Structure and Behavior
pp. 581
Comparison of Model Checking Tools for Information Systems
pp. 319
Unit Testing beyond a Bar in Green and Red
pp. 358
Secure Real-Time Transaction Processing with Timeliness Guarantees in Mobile Distributed Real-Time Database Systems
pp. 359
Time Estimation as a Measure of Mental Workload
pp. 377
An Anycasting Protocol for Anonymous Access to a Group of Contents-Equivalent Servers in a Distributed System
pp. 388
Asynchronous Migration in Parallel Genetic Programming
pp. 440
Online Remote Trace Analysis of Parallel Applications on High-Performance Clusters
pp. 229
Ontology Approach for the Interoperability of Networked Enterprises in Supply Chain Environment
pp. 307
Genetic Programming of a Microcontrolled Water Bath Plant
pp. 340
Chameleon — Reconfigurability in Hand-Held Multimedia Computers
pp. 378
Numerical Modelling of the Flow in Magnetic Liquid Seals
pp. 390
Verification Results for a Multimedia Protocol
pp. 509
Search of Nash Equilibrium in Quadratic n-person Game
pp. 315
Symbiotic Sensor Networks in Complex Underwater Terrains: A Simulation Framework
pp. 360
NN-OPT: Neural Network for Option Pricing Using Multinomial Tree
pp. 361
The Possibility of Using Simple Neuron Models to Design Brain-Like Computers
pp. 372
Modeling the Model Athlete: Automatic Coaching of Rowing Technique
pp. 378
Investigating the Effects of Metacognition in Dynamic Control Tasks
pp. 584
How Can a Subsystem Be Both a Package and a Classifier?
pp. 324
Predicting Cluster Formation in Decentralized Sensor Grids
pp. 328
Automated Extract Component Refactoring
pp. 370
A Brain-Inspired Cerebellar Associative Memory Approach to Option Pricing and Arbitrage Trading
pp. 379
Multidimensional Evaluation of Human Responses to the Workload
pp. 401
Boundary Integral Method for 3D Simulation of Foam Dynamics
pp. 408
Personalized Fair Reputation Based Resource Allocation in Grid
pp. 461
The Simple Reachability Problem in Switch Graphs
pp. 520
A Robust Image Classification Scheme with Sparse Coding and Multiple Kernel Learning
pp. 593
Optimal Grid Drawings of Complete Multipartite Graphs and an Integer Variant of the Algebraic Connectivity
pp. 598
Using UML/OCL Constraints for Relational Database Design
pp. 646
Dynamic Resource Reallocation between Deployment Components
pp. 339
Simulating Light Adaptation in the Retina with Rod-Cone Coupling
pp. 380
A Reliability-Based RBF Network Ensemble Model for Foreign Exchange Rates Predication
pp. 382
Analysis of Pesticide Application Practices Using an Intelligent Agriculture Decision Support System (ADSS)
pp. 392
Ensemble Combination for Solving the Parameter Selection Problem in Image Segmentation
pp. 421
Simulation of Diabetic Retinopathy Neovascularization in Color Digital Fundus Images
pp. 493
IKASYS: Using Mobile Devices for Memorization and Training Activities
pp. 614
Towards a UML Extension for Hypermedia Design
pp. 259
An Interaction Meta-model for Cooperative Component-Based User Interfaces
pp. 390
Combining Time-Scale Feature Extractions with SVMs for Stock Index Forecasting
pp. 406
Psychometric Evaluation with Brain-Computer Interface
pp. 433
Extended Precision Quality Measure for Recommender Systems
pp. 434
Mesh Optimisation Using Edge Information in Feature-Based Surface Reconstruction
pp. 678
Specification Translation of State Machines from Equational Theories into Rewrite Theories
pp. 349
A Self-organising Sensing System for Structural Health Management
pp. 414
An Inductive Inference Model to Elicit Noncompensatory Judgment Strategies
pp. 425
A Chronological History-Based Execution Time Estimation Model for Embarrassingly Parallel Applications on Grids
pp. 443
A Tool for Link-Based Web Page Classification
pp. 445
Finite Sample Bias of Robust Scale Estimators in Computer Vision Problems
pp. 570
Variable Neighborhood Search Approach for the Location and Design Problem
pp. 645
Timed Sequence Diagrams and Tool-Based Analysis — A Case Study
pp. 358
On Models in Fuzzy Propositional Logic
pp. 377
Vectors of coroutines
pp. 431
Developing High-Performance Parallel Applications Using EPAS
pp. 509
Design Validation by Symbolic Simulation and Equivalence Checking: A Case Study in Memory Optimization for Image Manipulation
pp. 661
Timing Analysis of UML Sequence Diagrams
pp. 289
A Software Inspection Process for Globally Distributed Teams
pp. 366
Is Soft Computing in Technology and Medicine Human-Friendly?
pp. 371
An Effect of Short and Long Reciprocal Projections on Evolution of Hierarchical Neural Networks
pp. 426
Monitoring Performance and Mental Workload in an Automated System
pp. 442
On Utilization of the Grid Computing Technology for Video Conversion and 3D Rendering
pp. 463
Improving Collaborative Filtering in Social Tagging Systems
pp. 465
Using Visualizations to Support Design and Debugging in Virtual Reality
pp. 675
The Normal Object Form: Bridging the Gap from Models to Code
pp. 441
Tracking by Hierarchical Representation of Target Structure
pp. 454
MPI Parallel Implementation of a Fast Separable Solver
pp. 475
Strategies for Part-Based Shape Analysis Using Skeletons
pp. 691
Modeling Exceptional Behavior
pp. 350
Multiple-Instance Learning Improves CAD Detection of Masses in Digital Mammography
pp. 451
Using the Shape Characteristics of Rain to Identify and Remove Rain from Video
pp. 467
Parallel Unstructured Quadrilateral Mesh Generation
pp. 483
Lightweighting the Web of Data through Compact RDF/HDT
pp. 706
Advanced Methods and Tools for a Precise UML
pp. 354
Practice Makes Perfect
pp. 390
Fast Shape Index Framework Based on Principle Component Analysis Using Edge Co-occurrence Matrix
pp. 395
Contour Detection by CORF Operator
pp. 459
A Fast Approach to Improve Classification Performance of ECOC Classification Systems
pp. 474
On Influencing of a Space Geometry on Dynamics of Some CA Pedestrian Movement Model
pp. 495
Real Time Hand Gesture Recognition Including Hand Segmentation and Tracking
pp. 523
Automatic Generation of Service Ontology from UML Diagrams for Semantic Web Services
pp. 319
Service-Oriented Communities: Visions and Contributions towards Social Organizations
pp. 403
Hybrid Ensembles Using Hopfield Neural Networks and Haar-Like Features for Face Detection
pp. 461
Currency Options Volatility Forecasting with Shift-Invariant Wavelet Transform and Neural Networks
pp. 471
Project and Development of ErgoCoIn Version 2.0
pp. 479
Parameter Identification in a Two-Dimensional Parabolic Equation Using an ADI Based Solver
pp. 491
A Cost Optimal Parallel Quicksorting and Its Implementation on a Shared Memory Parallel Computer
pp. 406
Mathematical Formulation of a Type of Hierarchical Neurofuzzy System
pp. 411
Face Recognition with Disparity Corrected Gabor Phase Differences
pp. 489
Solving the Direction Field for Discrete Agent Motion
pp. 582
Symbolic State-Space Generation of Asynchronous Systems Using Extensible Decision Diagrams
pp. 363
Scaling Extreme Programming in a Market Driven Development Context
pp. 415
Hardware Support for Language Aware Information Mining
pp. 478
Intelligence-Based Model to Timing Problem of Resources Exploration in the Behavior of Firm
pp. 538
Recognizing Action Primitives in Complex Actions Using Hidden Markov Models
pp. 566
Towards a Topical Ontology of Fraud
pp. 621
The Minimum Reload s-t Path/Trail/Walk Problems
pp. 443
Biologically Plausible Multi-dimensional Reinforcement Learning in Neural Networks
pp. 446
On the parsing of LL-regular grammars
pp. 449
An Intelligent Synchronization Scheme for WLAN Convergence Systems
pp. 451
Adaptive Neural Oscillator with Synaptic Plasticity Enabling Fast Resonance Tuning
pp. 459
Learning from Delayed Reward und Punishment in a Spiking Neural Network Model of Basal Ganglia with Opposing D1/D2 Plasticity
pp. 579
Blob Tracking with Adaptive Feature Selection and Accurate Scale Determination
pp. 386
Teaching Team Work: An Extreme Week for First-Year Programmers
pp. 535
Gear Crack Detection Using Kernel Function Approximation
pp. 541
Diagnosticity of Cardiac Modes of Autonomic Control Elicited by Simulated Driving and Verbal Working Memory Dual-Tasks
pp. 551
On Euclidean Corrections for Non-Euclidean Dissimilarities
pp. 576
Efficient and Beneficial Defense Against DDoS Direct Attack and Reflector Attack
pp. 589
Self-Calibration with Two Views Using the Scale-Invariant Feature Transform
pp. 609
A PSO-Based Web Document Query Optimization Algorithm
pp. 394
Supporting Collaborative Conceptualization Tasks through a Semantic Wiki Based Platform
pp. 474
Learning How to Select an Action: A Computational Model
pp. 562
Feature and Classifier Selection in Class Decision Trees
pp. 404
Modelling the Public Sector Information through CIDOC Conceptual Reference Model
pp. 480
Multiband Radio Resource Allocation for Cognitive Radio Systems
pp. 608
Shape Reconstruction by Line Voting in Discrete Space
pp. 406
Five Challenges in Teaching XP
pp. 491
Estimation of Causal Orders in a Linear Non-Gaussian Acyclic Model: A Method Robust against Latent Confounders
pp. 568
Modelling Cognitive and Affective Load for the Design of Human-Machine Collaboration
pp. 570
Chase and Escape in Groups
pp. 608
Performance Analysis and Prediction on VEGA Grid
pp. 499
Reservoir Sizes and Feedback Weights Interact Non-linearly in Echo State Networks
pp. 572
Predication of Properties of Welding Joints Based on Uniform Designed Neural Network
pp. 575
Event-Related Brain Potentials Corroborate Subjectively Optimal Delay in Computer Response to a User’s Action
pp. 426
Using Object Role Modeling in a Service-Oriented Data Integration Project
pp. 507
Learning to Imitate YMCA with an ESN
pp. 581
Applying an Intelligent Neural System to Predicting Lot Output Time in a Semiconductor Fabrication Factory
pp. 582
Effects of Pattern Complexity on Information Integration: Evidence from Eye Movements
pp. 630
An Agent-Based Grid Computing Infrastructure
pp. 507
Robust Segmentation for Left Ventricle Based on Curve Evolution
pp. 589
Multi-degree Prosthetic Hand Control Using a New BP Neural Network
pp. 593
Productivity Enhancement through Lot Size Optimization
pp. 648
Scale Consistent Image Completion
pp. 477
Clinical Performance of Digital Breast Tomosynthesis Versus Full-Field Digital Mammography: Preliminary Results
pp. 515
Segmentation of Ovarian Ultrasound Images Using Cellular Neural Networks Trained by Support Vector Machines
pp. 600
Multilane Single GCA-w Based Expressway Traffic Model
pp. 622
Fast Multivariate Ordinal Type Histogram Matching
pp. 422
Doctoral Symposium at XP 2003
pp. 672
Optimal Parameterizations of Bézier Surfaces
pp. 616
An AND-OR Fuzzy Neural Network Ship Controller Design
pp. 530
A mathematical model of parallel information processing
pp. 625
Clustering and Transport Efficiency in Public Conveyance System
pp. 678
Distribution Design in Distributed Databases Using Clustering to Solve Large Instances
pp. 639
Combining Skin Conductance and Heart Rate Variability for Adaptive Automation During Simulated IFR Flight
pp. 653
Imaged Based Codes Performance Comparison for Mobile Environments
pp. 701
A Discrete Event System Model for Simulating Mobile Agent
pp. 571
Echo State Networks for Multi-dimensional Data Clustering
pp. 654
Hybrid Intelligent PID Control for MIMO System
pp. 721
Markerless Pose Tracking for Augmented Reality
pp. 514
Subtyping and Derivation Rules in Fact-Based Modeling
pp. 579
The Counter-Change Model of Motion Perception: An Account Based on Dynamic Field Theory
pp. 670
LSCM Based Non-rigid Registration for Craniofacial Surfaces
pp. 694
Automatic Mutual Nonrigid Registration of Dense Surfaces by Graphical Model Based Inference
pp. 569
Equivalence and optimization of recursive program schemata
pp. 580
A Semantic Web Portal for Semantic Annotation and Search
pp. 588
A Semantic Portal for Fund Finding in the EU: Semantic Upgrade, Integration and Publication of Heterogeneous Legacy Data
pp. 768
Task-Oriented Mobile Service Recommendation Enhanced by a Situational Reasoning Engine
pp. 598
A Heuristic Approach to Semantic Web Services Classification
pp. 604
Constructing Robust Liquid State Machines to Process Highly Variable Data Streams
pp. 543
Black-Hole Attacks in P2P Mobile Networks Discovered through Bayesian Filters
pp. 553
Progress Toward a Quantitative Scale for Describing Radiodensity in Mammographic Images
pp. 702
Neural-Network Inverse Dynamic Online Learning Control on Physical Exoskeleton
pp. 705
Operator Assistance and Semi-autonomous Functions as Key Elements of Future Systems for Multiple Uav Guidance
pp. 771
Vision-Based User Interfaces for Health Applications: A Survey
pp. 561
Systematic Performance Analysis of SART as Applied to Digital Breast Tomosynthesis
pp. 614
Integrated Document Browsing and Data Acquisition for Building Large Ontologies
pp. 711
Fuzzy Adaptive Particle Filter Algorithm for Mobile Robot Fault Diagnosis
pp. 445
Measuring the Effectiveness of Agile Methodologies Using Data Mining, Knowledge Discovery and Information Visualization
pp. 723
Voice Alarm System in Emergency Evacuation
pp. 637
Generating Motion Trajectories by Sparse Activation of Learned Motion Primitives
pp. 813
Web-Based Interface for the Visualization of Microarray Data
pp. 653
Integrating Neural Networks and Chaotic Measurements for Modelling Epileptic Brain
pp. 746
On Properties of Genetic Operators from a Network Analytical Viewpoint
pp. 655
A New Scheme for Interactive Multi-criteria Decision Making
pp. 754
SDMOGA: A New Multi-objective Genetic Algorithm Based on Objective Space Divided
pp. 760
Human Integration in the Lifecycle of Aviation Systems
pp. 831
Segmentation of Triangular Meshes Using Multi-scale Normal Variation
pp. 596
Enabling Access to Web Resources through SecPODE-Based Annotations
pp. 663
Utilization of NNs for Improving the Traditional Technical Analysis in the Financial Markets
pp. 770
A Characteristic of a Navigator’s Response to Artificial Ship’s Movement by Picture and Motion Platform
pp. 841
Integration of Multiple Methods for Class and Specific Object Recognition
pp. 670
Use of Support Vector Machines: Synergism to Intelligent Humanoid Robot Walking Down on a Slope
pp. 772
UEAS: A Novel United Evolutionary Algorithm Scheme
pp. 853
An Adaptive Web Caching Method Based on the Heterogeneity of Web Object
pp. 860
Face Recognition Using 2D and 3D Multimodal Local Features
pp. 692
A Simple 3D Edge Template for Pose Invariant Face Detection
pp. 701
Bi-objective Genetic Algorithm for Feature Selection in Ensemble Systems
pp. 710
Dual Support Vector Domain Description for Imbalanced Classification
pp. 852
A Hidden Markov Model Approach to Classify and Predict the Sign of Financial Local Trends
pp. 891
Real-Time GPU-Based Simulation of Dynamic Terrain
pp. 718
Learning Method Inspired on Swarm Intelligence for Fuzzy Cognitive Maps: Travel Behaviour Modelling
pp. 901
High-Resolution Video from Series of Still Photographs
pp. 715
Construction and Evaluation of Text-Dialog Corpus with Emotion Tags Focusing on Facial Expression in Comics
pp. 834
Analysis of Human Factors Integration Aspects for Aviation Accidents and Incidents
pp. 927
A Mesh Based Anycast Routing Protocol for Ad Hoc Networks
pp. 845
Multiobjective Optimization Design of a Hybrid Actuator with Genetic Algorithm
pp. 852
An European Approach to the Integrated Management of Human Factors in Aircraft Maintenance: Introducing the IMMS
pp. 742
Time Series Data Classification Using Recurrent Neural Network with Ensemble Learning
pp. 866
Evolvable Viral Agent Modeling and Exploration
pp. 917
A New Performance Evaluation Method for Two-Class Imbalanced Problems
pp. 874
Mobile Robot Control Using Fuzzy-Neural-Network for Learning Human Behavior
pp. 766
A Constrained Spreading Activation Approach to Collaborative Filtering
pp. 984
Analytic Performance Modeling of a Fully Adaptive Routing Algorithm in the Torus
pp. 797
Application of Hybrid Recommendation in Web-Based Cooking Assistant
pp. 938
Image Reconstruction Using Genetic Algorithm in Electrical Impedance Tomography
pp. 1047
Manage Distributed Ontologies on the Semantic Web
pp. 820
Land Cover Classification from MODIS Satellite Data Using Probabilistically Optimal Ensemble of Artificial Neural Networks
pp. 964
Genetic Algorithm for Satellite Customer Assignment
pp. 974
A Look-Ahead Fuzzy Back Propagation Network for Lot Output Time Series Prediction in a Wafer Fab
pp. 1012
A Fuzzy Clustering Algorithm for Symbolic Interval Data Based on a Single Adaptive Euclidean Distance
pp. 875
Full Fuzzy-Logic-Based Vector Control for Permanent Magnet Synchronous Motors
pp. 883
Artificial Intelligent Application to Service Restoration Considering Load Balancing in Distribution Networks
pp. 1028
Prototype-Based Threshold Rules
pp. 1146
An Effective Cluster-Based Slot Allocation Mechanism in Ad Hoc Networks
pp. 893
Minimum Cost Operation Mode and Minimum Loss Operation Mode of Power System – Operation Mode Selection Based on Voltage Stability
pp. 1055
A Study on Decision Model of Bottleneck Capacity Expansion with Fuzzy Demand
pp. 914
Rule-Based Expert System for Designing DC-DC Converters
pp. 1063
Workpiece Recognition by the Combination of Multiple Simplified Fuzzy ARTMAP
pp. 922
DNA-Based Evolutionary Algorithm for Cable Trench Problem
pp. 1087
Neuro-fuzzy Modeling and Fuzzy Rule Extraction Applied to Conflict Management
pp. 1095
Hardware Implementation of a Wavelet Neural Network Using FPGAs
pp. 1105
Neural Network Implementation in Hardware Using FPGAs
pp. 964
Analysing the Density of Subgroups in Valued Relationships Based on DNA Computing
pp. 1113
FPGA Discrete Wavelet Transform Encoder/Decoder Implementation
pp. 1122
Randomized Algorithm in Embedded Crypto Module
pp. 980
Customer Experience Management Influencing on Human Kansei to MOT
pp. 1004
An Approach to Resolving Semantic Conflicts of Temporally-Vague Observations in Artificial Cognitive Agent
pp. 1012
Neural Network Approach for Learning of the World Structure by Cognitive Agents
pp. 1020
Towards a Computational Framework for Modeling Semantic Interactions in Large Multiagent Communities
pp. 1027
Grounding Crisp and Fuzzy Ontological Concepts in Artificial Cognitive Agents
pp. 1178
Towards Hardware Acceleration of Neuroevolution for Multimedia Processing Applications on Mobile Devices
pp. 1050
A Study on a Design of Efficient Electronic Commerce System
pp. 1058
A Scheduling Middleware for Data Intensive Applications on a Grid
pp. 1092
A Semantic Recommender Engine Enabling an eTourism Scenario
pp. 1111
Evolutionary ANNs for Improving Accuracy and Efficiency in Document Classification Methods
pp. 1119
A Methodology for Determining the Creditability of Recommending Agents
pp. 1128
How to Solve a Multicriterion Problem for Which Pareto Dominance Relationship Cannot Be Applied? A Case Study from Medicine
pp. 1150
Investigating Security in Multi-tree Based Technique in RFID Systems
pp. 1157
An Improved ALOHA Algorithm for RFID Tag Identification
pp. 1192
Personalisation of Web Search: An Agent Based Approach
pp. 1201
Autonomy and Intelligence – Opportunistic Service Delivery in Mobile Computing
pp. 1224
Using Hierarchical Filters to Detect Sparseness in Unknown Channels
pp. 1232
Auditory Feedback for Brain Computer Interface Management – An EEG Data Sonification Approach
pp. 1272
Signal Reconstruction by Projection Filter with Preservation of Preferential Components
Similar content
1,561
Constraint-Hiding Constrained PRFs for NC \(^1\) from LWE
Authors:
Ran Canetti
,
Yilei Chen
High-Speed Polynomial Multiplication Architecture for Ring-LWE and SHE Cryptosystems
Authors:
Donald Donglong Chen
,
Nele Mentens
,
Frederik Vercauteren
…
Better key sizes (and attacks) for LWE-based encryption
Authors:
R Lindner
,
C Peikert
See all similar
Cited by
4
Additively Homomorphic Ring-LWE Masking
Authors:
Oscar Reparaz
,
Ruan de Clercq
,
Sujoy Sinha Roy
…
On Practical Discrete Gaussian Samplers for Lattice-Based Cryptography
Authors:
James Howe
,
Ayesha Khalid
,
Ciara Rafferty
…
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
Authors:
Robert Primas
,
Peter Pessl
,
Stefan Mangard
See all cited by