Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
47
views
40
references
Top references
cited by
3
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,731
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Is Open Access
Security Protocols : 7th International Workshop, Cambridge, UK, April 19-21, 1999. Proceedings
Shepherding Hordes of Markov Chains
other
Author(s):
Milan Češka
,
Nils Jansen
,
Sebastian Junges
,
Joost-Pieter Katoen
Publication date
(Online):
April 03 2019
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Download
XML
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
40
Record
: found
Abstract
: not found
Article
: not found
A logic for reasoning about time and reliability
Hans-Christen Hansson
,
Bengt-Harald Jonsson
(1994)
0
comments
Cited
210
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Z3: An Efficient SMT Solver
Leonardo de Moura
,
Nikolaj Bjørner
(2008)
0
comments
Cited
135
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
PRISM 4.0: Verification of Probabilistic Real-Time Systems
Marta Kwiatkowska
,
Gethin Norman
,
David Parker
(2011)
0
comments
Cited
59
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2019
Publication date (Online):
April 03 2019
Pages
: 172-190
DOI:
10.1007/978-3-030-17465-1_10
SO-VID:
6d5963bd-e96c-41e0-aae8-386dc9f56504
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Strict finitism and feasibility
pp. 1
Storage system architectures for continuous media data
pp. 1
CMMI RAMS Extension Based on CENELEC Railway Standard
pp. 1
Agent-Oriented Software Engineering
pp. 1
Testing equivalences for event structures
pp. 1
Evaluating a Reinforcement Learning Algorithm with a General Intelligence Test
pp. 1
Motivations, background, and basic definitions
pp. 1
Next Generation Software Product Line Engineering
pp. 1
Performance issues in parallel programming
pp. 1
Introduction
pp. 1
Setting the Stage for Open Mathematical Documents
pp. 1
Basic techniques and symbol-level recognition — An overview
pp. 1
Verification of Behaviour Networks Using Finite-State Automata
pp. 1
Introduction
pp. 1
Introduction: Bringing Together Humans and Artificial Agents in Cyber-societies:A New Field of Trust Research
pp. 1
Producing Compliant Interactions: Conformance, Coverage, and Interoperability
pp. 1
Application of Classification Algorithms on IDDM Rat Data
pp. 1
Information Transfer among Coupled Random Boolean Networks
pp. 1
Chapter I: Introduction
pp. 1
Boolean Functions Fitness Spaces
pp. 1
An automatic interprocedural analysis for the understanding of scientific application programs
pp. 1
Automated geometric reasoning: Dixon resultants, Gröbner bases, and characteristic sets
pp. 1
Introduction
pp. 1
Symbolic Execution Techniques for Test Purpose Definition
pp. 1
Getting started: Basic definitions and constructions
pp. 1
A Library for Declarative Resolution-Independent 2D Graphics
pp. 1
About this Author
pp. 1
Revisiting Hyperbolic Voronoi Diagrams in Two and Higher Dimensions from Theoretical, Applied and Generalized Viewpoints
pp. 1
New Channel Selection Criterion for Spatial Domain Steganography
pp. 1
Data Complexity Analysis: Linkage between Context and Solution in Classification
pp. 1
Prostate Cancer MR Imaging
pp. 3
Designing Human Computer Interfaces for Command and Control Environments
pp. 3
Property Preserving Encryption in NoSQL Wide Column Stores
pp. 3
Stochastic Temporal Logic Abstractions: Challenges and Opportunities
pp. 3
Making Self-organizing Systems Secure
pp. 3
Optimizing Two-Level Preconditionings for the Conjugate Gradient Method
pp. 3
Automata and Program Analysis
pp. 10
Kilo-instruction Processors
pp. 11
Would a Virtual Butler Do a Good Job for Old People? Psychological Considerations about Benefits and Risks of Technological Assistance
pp. 11
An Extension of the Order Bound for AG Codes
pp. 11
Chapter 2: Next Generation Web Search
pp. 12
Sentic Neural Networks: A Novel Cognitive Model for Affective Common Sense Reasoning
pp. 12
Security for Cyber-Physical Systems
pp. 13
Turkish Information Retrieval: Past Changes Future
pp. 15
Can Multi-Agents Wake Us from IC Design Productivity Nightmare?
pp. 16
Don’t Be Greedy: Leveraging Community Structure to Find High Quality Seed Sets for Influence Maximization
pp. 17
What Constitutes an Effective Representation?
pp. 17
Models of Timed Systems
pp. 2
Creating an Electronic Commerce Device Which Promotes Universal Access: The KALI Project
pp. 2
Extending Architectural Representation in UML with View Integration
pp. 2
A Sharp PageRank Algorithm with Applications to Edge Ranking and Graph Sparsification
pp. 2
Automata for Codes
pp. 20
Natural Born Computing
pp. 21
Exploiting Partial Success in Applying Automated Formal Methods
pp. 21
From Public Plans to Global Solutions in Multiagent Planning
pp. 23
Algebraic data type and process specifications based on projection spaces
pp. 24
Combining Petri Nets and other formal methods
pp. 25
2. Experience Management
pp. 26
Model-Driven Techniques to Enhance Architectural Languages Interoperability
pp. 3
Processes Inspired by the Functioning of Living Cells: Natural Computing Approach
pp. 3
Can Component/Service-Based Systems Be Proved Correct?
pp. 3
Document Markup for the Web
pp. 31
Predicates as parameters in logic programming
pp. 31
A Refactoring Library for Scala Compiler Extensions
pp. 35
Recoverability
pp. 4
Chapter II: Syntax, semantics and proof theory for equational logic
pp. 5
Abstract interpretation
pp. 5
Adapting the System to Users Based on Implicit Data: Ethical Risks and Possible Solutions
pp. 8
Specification of Bahavioural Requirements within Compositional Multi-agent System Design
pp. 9
Properties of the Hopfield Model with Weighted Patterns
pp. 9
Concurrent processes as objects
pp. 9
Trailing-Edge Management
pp. 9
Graph rewriting systems — The basic concepts
pp. 9
1. Making Smarter Business Decisions in Less Time
pp. 15
The Game of the Name in Cryptographic Tables
pp. 15
Efficient Triangle Counting in Large Graphs via Degree-Based Vertex Partitioning
pp. 17
Structured Induction Proofs in Isabelle/Isar
pp. 18
A Declarative Approach for Software Modeling
pp. 18
Human Action Categorization Using Ultrasound Micro-Doppler Signatures
pp. 18
Chapter III: Subtree replacement systems
pp. 19
Einige Anwendungen der Kreisscheibenarithmetik in der Kettenbruchtheorie
pp. 22
Supervised Approaches to Assign Cooperative Patent Classification (CPC) Codes to Patents
pp. 22
Individual Differences in Working Memory Capacity and Presence in Virtual Environments
pp. 23
On semantic issues in the relational model of data
pp. 24
Research on Application of Data Mining Methods to Diagnosing Gastric Cancer
pp. 24
Next Generation Semantic Web Applications
pp. 25
Searching with Partial Belief States in General Games with Incomplete Information
pp. 25
Constructive Modelling of Parallelized Environmental Models for Structured Testing of Automated Driving Systems
pp. 26
CARE: Overview of an Adaptive Multithreaded Architecture
pp. 26
Exploiting Policies in an Open Infrastructure for Lifelong Learning
pp. 26
LogicObjects: Enabling Logic Programming in Java through Linguistic Symbiosis
pp. 27
Trust and Distrust Definitions: One Bite at a Time
pp. 27
Conditionals
pp. 28
Type Similarity for the Lambek-Grishin Calculus Revisited
pp. 28
Agent-Oriented Design
pp. 29
Busy Beaver - The Influence of Representation
pp. 3
Vision-Based Control of Robot Motion
pp. 3
Markov Logic: A Unifying Language for Structural and Statistical Pattern Recognition
pp. 30
Coates' algorithm
pp. 31
Nucleic Acids
pp. 34
Managing proofs
pp. 39
Level Planarity: Transitivity vs. Even Crossings
pp. 39
A Logic for Assessing Sets of Heterogeneous Testing Hypotheses
pp. 4
EI2N’10 - Keynote
pp. 47
3. Representing Experience
pp. 49
Feature-Specific Profiling
pp. 6
On the Power of Threshold Measurements as Oracles
pp. 60
Alpha, Betti and the Megaparsec Universe: On the Topology of the Cosmic Web
pp. 69
The modelling and analysis of IEEE 802.6's configuration control protocol with coloured petri nets
pp. 71
Some special effective numberings
pp. 77
Mathematical Theory of Transfer, I
pp. 102
Skew Jensen-Bregman Voronoi Diagrams
pp. 115
Mathematical Theory of Transfer, II
pp. 146
Mechanistic Insights into Metabolic Disturbance during Type-2 Diabetes and Obesity Using Qualitative Networks
pp. 17
Technologies and Considerations for Developing Internet and Multiplayer Computer Games: A Tutorial
pp. 22
What Should Be Abducible for Abductive Nursing Risk Management?
pp. 23
A Multimedia Session Manager Service for the Collaborative Browsing System
pp. 24
Computing Weights
pp. 24
Applying PVS Background Theories and Proof Strategies in Invariant Based Programming
pp. 28
Chapter IV: The confluence property and the Church-Rosser property
pp. 29
Virtual Butler: What Can We Learn from Adaptive User Interfaces?
pp. 29
Sequential Deep Learning for Human Action Recognition
pp. 30
Supportedly Stable Answer Sets for Logic Programs with Generalized Atoms
pp. 32
Testing Embedded Memories: A Survey
pp. 35
Detection of horizontal lines in noisy run length encoded images: The FAST method
pp. 35
The Sandpile Model: Parallelization of Efficient Algorithms for Systems with Shared Memory
pp. 37
Sensitivity Analysis for Threshold Decision Making with Bayesian Belief Networks
pp. 39
The effective arrangement of logical systems
pp. 41
Constraint relaxation
pp. 41
Proposing the Underlying Causes That Lead to the Trainee’s Erroneous Actions to the Trainer
pp. 43
Dynamic Model Checking for Multi-agent Systems
pp. 47
Sharing analysis
pp. 49
ddNF: An Efficient Data Structure for Header Spaces
pp. 50
Customized Document Research by a Stigmergic Approach Using Agents and Artifacts
pp. 51
Supervaluationism and Classical Logic
pp. 52
On parallel hierarchies and R ki
pp. 55
The Socio-cognitive Dynamics of Trust: Does Trust Create Trust?
pp. 63
Highly Efficient \(GF(2^8)\) G F ( 2 8 ) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design
pp. 73
Completion with history-dependent complexities for generated equations
pp. 91
Programmed attributed graph rewrite systems — An advanced modelling formalism
pp. 120
Spatial Representations and Analysis Techniques
pp. 135
Theory of Grouping
pp. 173
Evaluation
pp. 19
Routing in 2-D Meshes: A Tutorial
pp. 19
Distance-2 Self-stabilizing Algorithm for a b-Coloring of Graphs
pp. 33
Metaphor Design Spaces
pp. 33
The PLUSS Approach – Domain Modeling with Features, Use Cases and Use Case Realizations
pp. 34
An Efficient Inverse-Consistent Diffeomorphic Image Registration Method for Prostate Adaptive Radiotherapy
pp. 35
Technology Diffusion in Social Networks
pp. 36
Partial Word DFAs
pp. 36
Component Evolution in General Random Intersection Graphs
pp. 40
Prediction of Protein Secondary Structure Using Nonlinear Method
pp. 40
Proof Obligation Generation and Discharging for Recursive Definitions in VDM
pp. 42
Solving Sequential Mixed Auctions with Integer Programming
pp. 43
Rank for Some Families of Quaternary Reed-Muller Codes
pp. 45
Interaction Design Teaching Method Design
pp. 48
Soft-Tissue Simulation Using the Radial Elements Method
pp. 49
Phenotype Plasticity in Genetic Programming: A Comparison of Darwinian and Lamarckian Inheritance Schemes
pp. 49
Abduction with Negation as Failure for Active and Reactive Rules
pp. 49
Using Equivalences of Worlds for Aggregation Semantics of Relational Conditionals
pp. 52
A Development Environment for the Realization of Open and Scalable Multi-agent Systems
pp. 57
Backtracking approaches
pp. 58
Shapley Facility Location Games
pp. 61
Automating Belief Revision for AgentSpeak
pp. 61
Non-deterministic Population Protocols
pp. 63
Consistency of Service Composition
pp. 65
Collaborative Framework for Monitoring Reliability of Distributed Components of Composed Services
pp. 68
FairCloud: Truthful Cloud Scheduling with Continuous and Combinatorial Auctions
pp. 71
Transcription and Posttranscriptional Processes
pp. 73
Belief Revision Process Based on Trust: Agents Evaluating Reputation of Information Sources
pp. 73
Pragmatics of type-directed partial evaluation
pp. 79
K-Nearest Neighbor Search for Moving Query Point
pp. 102
Lightweight Coprocessor for Koblitz Curves: 283-Bit ECC Including Scalar Conversion with only 4300 Gates
pp. 113
The ACT-system experiences and future enhancements
pp. 115
Clifford algebraic calculus for geometric reasoning
pp. 125
Overview of existing schemes with other than ordinary security
pp. 151
A GIS Based Wireless Sensor Network Coverage Estimation and Optimization: A Voronoi Approach
pp. 156
Spatial Logic and Spatial Model Checking for Closure Spaces
pp. 216
First-Class Compositions
pp. 42
Atlas Based Segmentation and Mapping of Organs at Risk from Planning CT for the Development of Voxel-Wise Predictive Models of Toxicity in Prostate Radiotherapy
pp. 45
An Evaluation of Formalisms for Negotiations in E-commerce
pp. 48
Clustering Analysis for Bacillus Genus Using Fourier Transform and Self-Organizing Map
pp. 49
Instantiation of SMT Problems Modulo Integers
pp. 50
Procedural Image Processing for Visualization
pp. 50
Transactional Cache Management with A periodic Invalidation Scheme in Mobile Environments
pp. 52
A CSP-Based Orientation Detection Model
pp. 53
Optimal Bipartite Ramanujan Graphs from Balanced Incomplete Block Designs: Their Characterizations and Applications to Expander/LDPC Codes
pp. 54
A Proof-Theoretic Approach to Tactics
pp. 63
Computer Memory: Why We Should Care What Is under the Hood
pp. 63
Modelling Agents in Hard Real-Time Environments
pp. 63
Weighted-Sequence Problem: ASP vs CASP and Declarative vs Problem-Oriented Solving
pp. 68
Iterative Aggregation/Disaggregation Methods for Computing Some Characteristics of Markov Chains
pp. 74
Preserving Sharing in the Partial Evaluation of Lazy Functional Programs
pp. 77
Universal Slope Sets for Upward Planar Drawings
pp. 78
Stable Availability under Denial of Service Attacks through Formal Patterns
pp. 82
Iterative User-Driven Fault Localization
pp. 82
Mode Analysis Domains for Typed Logic Programs
pp. 83
Adaptive Trust and Co-operation: An Agent-Based Simulation Approach
pp. 86
A Novel WebGIS-Based Situational Awareness Platform for Trustworthy Big Data Integration and Analytics in Mobility Context
pp. 88
Model-Based Representations for Dataflow Schedules
pp. 93
Synthesis and Posttranslational Modifications of Proteins
pp. 97
Non-interactive Zaps and New Techniques for NIZK
pp. 102
Imperative Program Specialisation: An Approach Using CLP
pp. 103
Belief Revision and Nonmonotonic Reasoning — Revisited
pp. 108
Temporal Vagueness, Coordination and Communication
pp. 113
Towards a modular analysis of coloured Petri nets
pp. 116
Direct CCA-Secure KEM and Deterministic PKE from Plain LWE
pp. 117
A Model-Based, Open Architecture for Mobile, Spatially Aware Applications
pp. 12
Methodologies of Support to the Execution of Risk Management
pp. 131
Expressing computational complexity in constructive type theory
pp. 131
The specification language of OBSCURE
pp. 175
Algebraic Theory of Inheritance
pp. 183
Universal models in categories for process synchronization
pp. 25
Similarity Invariant Delaunay Graph Matching
pp. 268
Challenges in the Design of the Package Template Mechanism
pp. 46
Creative Design by Bipartite KeyGraph Based Interactive Evolutionary Computation
pp. 48
A Comparison between Film-Screen Mammography and Full-Field Digital Mammography Utilizing Phase Contrast Technology in Breast Cancer Screening Programs
pp. 49
A Rule Chaining Architecture Using a Correlation Matrix Memory
pp. 54
Power and Permission in Computer Systems
pp. 55
Building Intensional Communities Using Shared Contexts
pp. 62
Adaptive Integration of Multiple Cues for Contingency Detection
pp. 62
Observable Sharing for Functional Circuit Description
pp. 62
Multiplicative Attribute Graph Model of Real-World Networks
pp. 64
A Comparison of Two Strategies for Scaling Up Instance Selection in Huge Datasets
pp. 69
Form item extraction based on line searching
pp. 69
An Attempt to Generalize Distortion Measure for JPEG Steganography
pp. 70
Virtual Helper or Virtual Card Player? Contrasting Responses of Older Users
pp. 71
The Security of Polynomial Information of Diffie-Hellman Key
pp. 72
Solving the Satisfiability Problem Through Boolean Networks
pp. 77
Multi-agent Systems on the Internet: Extending the Scope of Coordination towards Security and Topology
pp. 78
Practical and Methodological Aspects of the Use of Cutting-Edge ASP Tools
pp. 81
Time-Integration Algorithms for the Computer Treatment of the Horizontal Advection in Air Pollution Models
pp. 85
Automating inversion of inductive predicates in Coq
pp. 86
Property-Based Preferences in Abstract Argumentation
pp. 87
An improvement of McMillan's unfolding algorithm
pp. 91
When and How Process Groups Can Be Used to Reduce the Renaming Space
pp. 92
Elliptic integras concluded
pp. 92
Upward Planar Morphs
pp. 99
Improving Efficiency and Accuracy of Formula-Based Debugging
pp. 101
Learning Multicriteria Utility Functions with Random Utility Models
pp. 106
Electing a Leader in Multi-hop Radio Networks
pp. 106
Generation of Rule-Based Constraint Solvers: Combined Approach
pp. 115
7. Developing Case-Based Help-Desk Support Systems for Complex Technical Equipment
pp. 118
Towards the Testing of Composed Web Services in 3rd Generation Networks
pp. 133
Recovering Short Secret Keys of RLCE in Polynomial Time
pp. 136
Multi-Sorted Residuation
pp. 141
Empirical results
pp. 143
Accelerating Homomorphic Evaluation on Reconfigurable Hardware
pp. 188
Homotopic Object Reconstruction Using Natural Neighbor Barycentric Coordinates
pp. 201
8 UML for Software Safety and Certification
pp. 201
CBR for Design
pp. 213
Building blocks
pp. 219
8. Experience Adaptation
pp. 267
Programming with algebras
pp. 57
Discovering Chances for Organizational Training Strategies from Intra-group Relations
pp. 57
A Generative Multiset Kernel for Structured Data
pp. 65
DSM-Communities in the World-Wide Web
pp. 72
Towards a Conceptual Framework for Interaction Design for the Pragmatic Web
pp. 72
Cerebral Activation Patterns in the Preparation and Movement Periods of Spontaneous and Evoked Movements
pp. 72
Chapter VIII: Recursively defined functions
pp. 73
A Systems Theory Approach to Periodically Time-Varying Convolutional Codes by Means of Their Invariant Equivalent
pp. 74
C4.5 Consolidation Process: An Alternative to Intelligent Oversampling Methods in Class Imbalance Problems
pp. 74
Deformable Tissue Parameterized by Properties of Real Biological Tissue
pp. 78
A Fault-Tolerant Distributed Deadlock Detection Algorithm
pp. 80
Model-based analysis of printed tables
pp. 82
How to Vote Privately Using Bitcoin
pp. 84
Applying the Davis-Putnam procedure to non-clausal formulas
pp. 89
Finding Kairos: The Influence of Context-Based Timing on Compliance with Well-Being Triggers
pp. 93
Efficient Tabling of Structured Data Using Indexing and Program Transformation
pp. 95
MIC(0) Preconditioning of Rotated Trilinear FEM Elliptic Systems
pp. 99
A Simple Low-Energy Instruction Wakeup Mechanism
pp. 99
Schedule Insensitivity Reduction
pp. 99
Fault Localization of Energy Consumption Behavior Using Maximum Satisfiability
pp. 105
Precedence-Constrained Scheduling Problems Parameterized by Partial Order Width
pp. 107
Minimizing Clutter Using Absence in Venn- \(\text {i}^\text {e}\)
pp. 109
Genetic Programming of a Goal-Keeper Control Strategy for the RoboCup Middle Size Competition
pp. 115
Adaptive Task Automata: A Framework for Verifying Adaptive Embedded Systems
pp. 116
A Formal Semantics for UML Interactions
pp. 121
Lessons Learned: Performance Tuning for Hadoop Systems
pp. 121
Tree Exploration by a Swarm of Mobile Agents
pp. 133
Non-termination Analysis of Logic Programs Using Types
pp. 136
Understanding Branch Cuts of Expressions
pp. 136
A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures
pp. 139
High-Throughput Technologies in Molecular Biology
pp. 142
A Method for Making Password-Based Key Exchange Resilient to Server Compromise
pp. 213
Relative Motion
pp. 241
9 Model Evolution and Management
pp. 53
Face Recognition Using ALLE and SIFT for Human Robot Interaction
pp. 63
Real-Time Extreme Programming
pp. 64
Trust, Ethics and Social Capital on the Internet: An Empirical Study Between Japan, USA and Singapore
pp. 74
Perceptual Intelligence
pp. 80
A Novel Gait Recognition Method Via Fusing Shape and Kinematics Features
pp. 81
Cognitive Decision Making for Navigation Assistance Based on Intent Recognition
pp. 84
Trimming Visibly Pushdown Automata
pp. 89
Some Notes upon “When Does $<{\mathbb T}>\(Equal Sat \)({\mathbb T})$ ?”
pp. 92
Morphological approach for dashed lines detection
pp. 95
The SAT-Based Approach for Classical Modal Logics
pp. 97
Multidimensional Zero-Correlation Linear Cryptanalysis on 23-Round LBlock-s
pp. 97
Care-O-bot® 3 – Vision of a Robot Butler
pp. 98
Programming Organization-Aware Agents
pp. 100
Tracking the Movement of Surgical Tools in a Virtual Temporal Bone Dissection Simulator
pp. 101
How to Correctly Prune Tropical Trees
pp. 101
Structural Sharing and Efficient Proof-Search in Propositional Intuitionistic Logic
pp. 105
Job Scheduling for Maximal Throughput in Autonomic Computing Systems
pp. 106
General diagram-recognition methodologies
pp. 111
Geometrically Invariant Image Blind Watermarking Based on Speeded-Up Robust Features and DCT Transform
pp. 113
On a Schur Complement Approach for Solving Two-Level Finite Element Systems
pp. 113
Energy Trade-Offs in Resource-Constrained Multi-Agent Systems
pp. 115
A Temporal Agent Communication Language for Dynamic Multi-agent Systems
pp. 121
Group-Based Pricing to Shape Demand in Real-Time Electricity Markets
pp. 121
A Scheme of Independent Calculations in a Precedence Constrained Routing Problem
pp. 122
Model-Based Safety Analysis of Simulink Models Using SCADE Design Verifier
pp. 130
Planning System for Emergency Services
pp. 131
UML 2.0 Architectural Crossroads: Sculpting or Mudpacking?
pp. 141
JADL – An Agent Description Language for Smart Agents
pp. 142
Work-Energy Profiles: General Approach and In-Memory Database Application
pp. 167
On the Complexity of “Superdetermined” Minrank Instances
pp. 172
On Associative Lambek Calculus Extended with Basic Proper Axioms
pp. 176
Alternatives to Threshold-Based Desire Selection in Bayesian BDI Agents
pp. 184
Initial behaviour semantics for algebraic specifications
pp. 271
10 Model-Based Analysis and Development of Dependable Systems
pp. 284
Conclusions and continued research
pp. 58
Reducing the Overhead of Intra-Node Communication in Clusters of SMPs
pp. 82
Intensional Markup Language
pp. 89
Advanced Interaction in Context
pp. 89
Modeling Architectural Value: Cash Flow, Time and Uncertainty
pp. 92
The Impact of Rich Application Frameworks on User Experience Design
pp. 94
Instantiation of Parameterized Data Structures for Model-Based Testing
pp. 102
Exploring Brick-Based Navigation and Composition in an Augmented Reality
pp. 106
Strategy Complexity of Finite-Horizon Markov Decision Processes and Simple Stochastic Games
pp. 109
Verification of LTL on B Event Systems
pp. 116
Online Scheduling of Bounded Length Jobs to Maximize Throughput
pp. 120
Self-embedding Fragile Watermarking Scheme Combined Average with VQ Encoding
pp. 124
Capturing Abstract Matrices from Paper
pp. 125
Prediction of Difficulty Levels in Video Games from Ongoing EEG
pp. 138
A Segment-Swapping Approach for Executing Trapped Computations
pp. 146
An Operational Decision Support Framework for Monitoring Business Constraints
pp. 161
Use of TTCN-3 for Software Module Testing
pp. 167
Automatic compositional verification of some Security properties
pp. 176
Transformation Rules for Logic Programs with Goals as Arguments
pp. 189
Constant-Round Group Key Exchange from the Ring-LWE Assumption
pp. 210
Some consequences of cryptographical conjectures for S 2 1 and EF
pp. 239
Unfolding Groups, I
pp. 315
11. Experience Management for Self-Service and Help-Desk Support
pp. 38
ASSERT4SOA: Toward Security Certification of Service-Oriented Applications
pp. 66
On Service-Oriented Network Measurement Architecture with Mobile Agent
pp. 75
Communication with and Between Mathematical Software Systems
pp. 81
Tikhonov-Type Regularization for Restricted Boltzmann Machines
pp. 84
Query Based Summarization Using Non-negative Matrix Factorization
pp. 87
Dynamic belief analysis
pp. 90
Towards a Logical Basis for Modelling and Querying Multi-dimensional Databases
pp. 93
From Stress Awareness to Coping Strategies of Medical Staff: Supporting Reflection on Physiological Data
pp. 102
Comparison of System Family Modeling Approaches
pp. 102
Effect of Diffusion Weighting and Number of Sensitizing Directions on Fiber Tracking in DTI
pp. 103
Belief revision through the belief-function formalism in a multi-agent environment
pp. 108
Design Perspectives: Sampling User Research for Concept Development
pp. 111
Coprime Mapping Transformation for Protected and Revocable Fingerprint Template Generation
pp. 122
Constant Price of Anarchy in Network Creation Games via Public Service Advertising
pp. 136
Token Jumping in Minor-Closed Classes
pp. 136
An Evolving Associative Classifier for Incomplete Database
pp. 146
Realizing a Secure Federation of Multi-institutional Service Systems
pp. 154
Risk Information Extraction and Aggregation
pp. 161
On Strong Equilibria and Improvement Dynamics in Network Creation Games
pp. 166
Lattice Completion Algorithms for Distributed Computations
pp. 177
Distributed Load Tests with TTCN-3
pp. 78
Pathtrait: A Tool for Tight Link Location and End-to-End Available Bandwidth Measurement
pp. 85
Modelling Agents’ Knowledge Inductively
pp. 90
Intelligent Secure Web Service Using Context Information
pp. 110
3-D Reconstruction of Blood Vessels Skeleton Based on Neural Network
pp. 111
Texture Guided Active Appearance Model Propagation for Prostate Segmentation
pp. 117
Formal specification of beliefs in multi-agent systems
pp. 125
Hypergraph Automata: A Theoretical Model for Patterned Self-assembly
pp. 128
Efficient Algorithms for Channel Assignment in a Cellular Network
pp. 131
A Better Way towards Key Establishment and Authentication in Wireless Sensor Networks
pp. 132
3D Reconstruction of Large Tubular Geometries from CT Data
pp. 139
Completeness and Decidability of a Fragment of Duration Calculus with Iteration
pp. 141
Local Synchronization on Oriented Rings
pp. 141
An Improved Monte Carlo Algorithm for Elastic Electron Backscattering from Surfaces
pp. 143
TimeNetManager — A Software Tool for Generating Random Temporal Networks
pp. 145
Image Information Hiding Based on Binary Holography of Iterative Conjugate-Symmetric Extension
pp. 147
Some Considerations on the Usability of Interactive Provers
pp. 148
Trust Based Evaluation of Wikipedia’s Contributors
pp. 157
Middleware Supporting Various Input/Output Devices for Networked Audio and Visual Home Appliances
pp. 159
An Algorithm with Approximation Ratio 5/6 for the Metric Maximum m-PSP
pp. 161
Reactive and Memory-Based Genetic Programming for Robot Control
pp. 168
LearnPADS + + : Incremental Inference of Ad Hoc Data Formats
pp. 172
Tool-Supported Compression of UML Class Diagrams
pp. 178
Concurrent Model Synchronization with Conflict Resolution Based on Triple Graph Grammars
pp. 185
Synthesis of Data Views for Communicating Processes
pp. 194
Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack
pp. 197
Analyzing the Impact of Protocol Changes on Tests
pp. 216
The Replacement Operation for CCP Programs
pp. 235
GoalSPEC: A Goal Specification Language Supporting Adaptivity and Evolution
pp. 235
Abstract Tensor Systems as Monoidal Categories
pp. 236
Discovering Spatial Co-location Patterns: A Summary of Results
pp. 253
Characterizing parallel time by type 2 recursions with polynomial output length
pp. 277
Compositional Synthesis of Leakage Resilient Programs
pp. 43
Towards Large-Size Ontology Alignment by Mapping Groups of Concepts
pp. 86
Melody Recognition with Learned Edit Distances
pp. 105
Impact of Frequency on the Energetic Efficiency of Action Potentials
pp. 121
Message Oriented Middleware for Flexible Wizard of Oz Experiments in HCI
pp. 127
Word Oriented Cascade Jump σ−LFSR
pp. 128
Intuitive Use of User Interfaces: Defining a Vague Concept
pp. 131
Reasoning about collective goals
pp. 138
Modeling Heart Pacemaker Tissue by a Network of Stochastic Oscillatory Cellular Automata
pp. 155
Modelling and Proof Analysis of Interrupt Driven Scheduling
pp. 157
Mechanized Mathematics
pp. 163
Cross-Layer Approach to Detect Data Packet Droppers in Mobile Ad-Hoc Networks
pp. 179
Finding Upper Bounds for Software Failure Probabilities – Experiments and Results
pp. 181
Restricted Manipulation in Iterative Voting: Condorcet Efficiency and Borda Score
pp. 194
Recursive Checkonly QVT-R Transformations with General when and where Clauses via the Modal Mu Calculus
pp. 206
Reversible Language Extensions and Their Application in Debugging
pp. 213
Detecting Observability Problems in Distributed Testing
pp. 215
Abstract Diagnosis of First Order Functional Logic Programs
pp. 234
Annotations for Prolog – A Concept and Runtime Handling
pp. 242
Towards soft computing
pp. 89
Document Infrastructure (Module DOC)
pp. 97
Context First
pp. 103
Optimal Trajectory Generation for Walking Up and Down a Staircase with a Biped Robot Using Genetic Algorithm (GA)
pp. 116
A Context Model for Ubiquitous Computing Applications
pp. 131
Design and Rich Application Frameworks
pp. 133
Using Corba in the Web Operating System
pp. 138
Effect of Body Position on NIRS Based Hemodynamic Measures from Prefrontal Cortex
pp. 141
Formalisation of a cooperation model based on joint intentions
pp. 142
A Novel Method for Simulating Cancer Growth
pp. 145
The von Mises Naive Bayes Classifier for Angular Data
pp. 159
Between a Rock and a Hard Place: The Two-to-One Assignment Problem
pp. 165
Replication Based on Role Concept for Multi-Agent Systems
pp. 166
Non Binary CSPs and Heuristics for Modeling and Diagnosing Dynamic Systems
pp. 168
Modeling Human Motion Trajectories by Sparse Activation of Motion Primitives Learned from Unpartitioned Data
pp. 178
Prognostic Modeling with High Dimensional and Censored Data
pp. 182
A Fully Polynomial-Time Approximation Scheme for a Special Case of a Balanced 2-Clustering Problem
pp. 184
Evolving an Environment Model for Robot Localization
pp. 193
Controller Compilation and Compression for Resource Constrained Applications
pp. 198
Distributed Policy Specification and Interpretation with Classified Advertisements
pp. 204
Modeling Dynamic Software Components in UML
pp. 213
Queue Layouts of Planar 3-Trees
pp. 216
Circuits as streams in Coq: Verification of a sequential multiplier
pp. 251
On Forward-Secure Storage
pp. 279
Calendars, Time Granularities, and Automata
pp. 303
Evolution of partial evaluators: Removing inherited limits
pp. 47
Modeling and Use of an Ontology Network for Website Recommendation Systems
pp. 117
3D Object Recognition Using Hyper-Graphs and Ranked Local Invariant Features
pp. 123
Tool Support for Complex Refactoring to Design Patterns
pp. 136
Enhancing Personas with Their Main Scenarios
pp. 142
Clusters, Servers, Thin Clients, and On-line Communities
pp. 147
Ergonomists and Usability Engineers Encounter Test Method Dilemmas with Virtual Work Environments
pp. 149
Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions
pp. 166
Solving Systems of Linear Algebraic Equations Using Quasirandom Numbers
pp. 167
STANSE: Bug-Finding Framework for C Programs
pp. 178
Relational Learning: Hard Problems and Phase Transitions
pp. 180
Nogoods in Qualitative Constraint-Based Reasoning
pp. 180
Minimal while programs
pp. 181
Knowledge Management in Role Based Agents
pp. 184
Ein Versuch zur Verallgemeinerung der Intervallrechnung
pp. 186
Formal Transformation of Platform Independent Models into Platform Specific Models
pp. 188
Basic Mental Attitudes of a Collaborating Agent: Cognitive Primitives for MAS
pp. 193
PTAS for the Euclidean Capacitated Vehicle Routing Problem in \(R^d\)
pp. 208
Evolutionary Safety Analysis: Motivations from the Air Traffic Management Domain
pp. 214
Distributed Genetic Algorithm for Inference of Biological Scale-Free Network Structure
pp. 220
Extending UML for Modeling Reflective Software Components
pp. 229
Crossing Minimization in Perturbed Drawings
pp. 235
Secure Data Management in Reactive Sensor Networks
pp. 267
If We Could Go Back in Time... On the Use of ‘Unnatural’ Time and Ordering in Dataflow Models
pp. 300
Feasibly categorical models
pp. 322
A Self-Applicable supercompiler
pp. 397
Solid Structure
pp. 125
Footstep Planning Based on Univector Field Method for Humanoid Robot
pp. 142
Streamlining User Experience Design and Development: Roles, Tasks and Workflow of Applying Rich Application Technologies
pp. 156
“Arousal” or “Activation” Dysfunction in the Frontal Region of Children with Attention-Deficit/Hyperactivity Disorder: Evidence from an Electroencephalogram Study
pp. 164
Pattern Recognition in Biological Time Series
pp. 168
A Multi-objective Evolutionary Algorithm for Color Image Segmentation
pp. 173
Towards layered dialogical agents
pp. 174
Asynchronous Signal Passing for Tile Self-assembly: Fuel Efficient Computation and Efficient Assembly of Shapes
pp. 191
The condition problem in solution of linear multistage systems
pp. 193
Stochastic Gradient Descent with GPGPU
pp. 198
Image Splicing Verification Based on Pixel-Based Alignment Method
pp. 202
A Bio-inspired Approach for Self-protecting an Organic Middleware with Artificial Antibodies
pp. 203
Evolving Fuzzy Rule Based Classifiers with GA-P: A Grammatical Approach
pp. 208
Managing Informal Mathematical Knowledge: Techniques from Informal Logic
pp. 209
A Minimum Spanning Tree-Inspired Clustering-Based Outlier Detection Technique
pp. 210
Subjective Situations
pp. 212
Ultra High-Performance ASIC Implementation of SM2 with SPA Resistance
pp. 263
Towards Machine-Actionable Modules of a Digital Mathematics Library
pp. 278
Priorities for modeling and verifying distributed systems
pp. 290
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
pp. 297
Extended Lambek Calculi and First-Order Linear Logic
pp. 299
Concurrency relations and the safety problem for Petri nets
pp. 307
On Lions and Elligators: An Efficient Constant-Time Implementation of CSIDH
pp. 330
TriviA: A Fast and Secure Authenticated Encryption Scheme
pp. 338
Multi-Level Lambda-Calculi: An algebraic description
pp. 53
SMILE – A Framework for Semantic Applications
pp. 150
Design Verification for Product Line Development
pp. 168
Contextual Ontologies
pp. 169
Noisy Interpolation of Multivariate Sparse Polynomials in Finite Fields
pp. 169
UniRSS: A New RSS Framework Supporting Dynamic Plug-In of RSS Extension Modules
pp. 186
Control Languages Associated with Tissue P Systems
pp. 190
On WQO Property for Different Quasi Orderings of the Set of Permutations
pp. 191
A Parallel Compact Hash Table
pp. 202
Experiences with a Logic-based Knowledge Discovery Support Environment
pp. 220
Variable Neighborhood Search-Based Heuristics for Min-Power Symmetric Connectivity Problem in Wireless Networks
pp. 247
A Game-Based Adaptive Unit of Learning with IMS Learning Design and <e-Adventure>
pp. 278
A Hybrid Approach for Semantic Enrichment of MathML Mathematical Expressions
pp. 280
Multiparty Computation from Threshold Homomorphic Encryption
pp. 367
Automatic presentations of structures
pp. 55
AVYTAT’10 - PC Co-chairs Message
pp. 181
On Generating All Maximal Acyclic Subhypergraphs with Polynomial Delay
pp. 183
Using the Relaxed Plan Heuristic to Select Goals in Oversubscription Planning Problems
pp. 184
Multipath Routing in Ad Hoc Wireless Networks with Omni Directional and Directional Antenna: A Comparative Study
pp. 193
IC2D: Interactive Control and Debugging of Distribution
pp. 202
Reduction of Petri-nets
pp. 205
Newton-Algorithmen zur Bestimmung von Polynomwurzeln unter Verwendung komplexer Kreisarithmetik
pp. 208
On the Boundary of Regular Languages
pp. 233
A combined high and low level approach to interpreting scanned engineering drawings
pp. 245
Grid Computing Supporting System on ITBL Project
pp. 258
Node-Based Connection Semantics for Equation-Based Object-Oriented Modeling Languages
pp. 263
Using Formal Concept Analysis for Mining and Interpreting Patient Flows within a Healthcare Network
pp. 269
Causality, Influence, and Computation in Possibly Disconnected Synchronous Dynamic Networks
pp. 271
A Heuristic Approach Towards Drawings of Graphs with High Crossing Resolution
pp. 273
Semantic Modeling and Inference with Episodic Organization for Managing Personal Digital Traces
pp. 350
Improved Quantum Multicollision-Finding Algorithm
pp. 365
Design and Implementation of Multi-scale Databases
pp. 393
A restricted second order logic for finite structures
pp. 455
Process Grammar
pp. 161
Motivation and Context-Based Multi-Robot Architecture for Dynamic Task, Role and Behavior Selections
pp. 209
Numerical Analysis of Quantum Speed Limits: Controlled Quantum Spin Chain Systems with Constrained Control Functions
pp. 215
Fehlerabschätzung bei linearer Optimierung
pp. 227
Faster Model Checking for Open Systems
pp. 246
Functional parts detection in engineering drawings: Looking for the screws
pp. 249
How to Share Knowledge by Gossiping
pp. 251
Authoring LeActiveMath Calculus Content
pp. 259
Branching Time Semantics for UML 2.0 Sequence Diagrams
pp. 261
A Safety-Related PES for Task-Oriented Real-Time Execution Without Asynchronous Interrupts
pp. 273
A Declarative Specification of Tree-Based Symbolic Arithmetic Computations
pp. 278
UML-Based Fusion Analysis
pp. 284
Wait-Free Stabilizing Dining Using Regular Registers
pp. 296
Escaping the Trap of Too Precise Topic Queries
pp. 325
Cryptanalysis of Reduced-Round MISTY
pp. 368
The Monotone Lambek Calculus Is NP-Complete
pp. 387
The Architecture of ArcIMS, a Distributed Internet Map Server
pp. 167
Complex Fiedler Vectors for Shape Retrieval
pp. 184
High-Order Markov Kernels for Network Intrusion Detection
pp. 188
Synchronization and Control of Cellular Automata
pp. 210
Program Development Environment for OpenMP Programs on ccNUMA Architectures
pp. 220
Combinatorial Optimization in Pattern Assembly
pp. 233
Supporting Fuzzy Metric Temporal Logic Based Situation Recognition by Mean Shift Clustering
pp. 239
An Argumentation Approach to Semantics of Declarative Programs with Defeasible Inheritance
pp. 258
People, Place, and Time: Inferences from Diagrams
pp. 260
Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups
pp. 266
Information Retrieval and Rendering with MML Query
pp. 267
Identifying Malicious Behavior in Multi-party Bipolar Argumentation Debates
pp. 303
An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack
pp. 324
Using TimedTTCN-3 in Interoperability Testing for Real-Time Communication Systems
pp. 340
The Rectangle Attack — Rectangling the Serpent
pp. 349
Reactive EFSMs — Reactive Promela/RSPIN
pp. 368
Using Petri Nets to develop programs for PLC systems
pp. 375
Measuring Masking Fault-Tolerance
pp. 430
Specialization of imperative programs through analysis of relational expressions
pp. 77
Towards Adaptive Service Ecosystems with Agreement Technologies
pp. 170
Three Patterns in Java Unit Testing
pp. 177
Combining Shape Priors and MRF-Segmentation
pp. 187
Notation and Presentation (Module PRES)
pp. 192
Design and Implementation of a Distributed Agent Delivery System
pp. 198
The Role of Event Boundaries in Language: Perceiving and Describing the Sequence of Simultaneous Events
pp. 204
Are Computers Capable of Understanding Our Emotional States?
pp. 213
Architecture for the Use of Synergies between Knowledge Engineering and Requirements Engineering
pp. 217
Weaknesses of Cuckoo Hashing with a Simple Universal Hash Class: The Case of Large Universes
pp. 229
On approximate iterations and solutions for equations considered in function spaces
pp. 230
Preliminary Validation Using in vivo Measures of a Macroscopic Electrical Model of the Heart
pp. 232
Towards Computation with Microchemomechanical Systems
pp. 237
Ontology-Based Information Extraction for French Newspaper Articles
pp. 244
Hyper-optimization for Deterministic Tree Automata
pp. 251
Entailment of Non-structural Subtype Constraints
pp. 262
Against Rigor
pp. 270
A benchmark: Performance evaluation of dashed-line detection algorithms
pp. 285
Descriptive Profiles for Sets of Alternatives in Multiple Criteria Decision Aid
pp. 289
Functional Apportioning of Safety Requirements on Railway Signalling Systems
pp. 311
Simple Pricing Schemes for the Cloud
pp. 358
Efficient Amplification of the Security of Weak Pseudo-random Function Generators
pp. 369
Probabilistic duration automata for analyzing real-time systems
pp. 373
Receipt-Free Universally-Verifiable Voting with Everlasting Privacy
pp. 393
Conjoinability in 1-Discontinuous Lambek Calculus
pp. 404
On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders
pp. 425
Efficient Mining of Spatiotemporal Patterns
pp. 447
A constant-space sequential model of computation for first-order logic
pp. 169
Integrity-Aware PCBC Encryption Schemes
pp. 177
A Biophysical Network Model Displaying the Role of Basal Ganglia Pathways in Action Selection
pp. 210
Supporting Production Strategies as Refinements of the Production Process
pp. 231
Significance of DNN-AM for Multimodal Sentiment Analysis
pp. 241
Semantic Approach to Identity in Coreference Resolution Task
pp. 257
The B-Method for the Construction of Microkernel-Based Systems
pp. 282
Countering Universal Image Tampering Detection with Histogram Restoration
pp. 284
Tropical Combinatorial Nullstellensatz and Fewnomials Testing
pp. 303
Automatic Code Generation for PLC Controllers
pp. 322
MACE – Enriching Architectural Learning Objects for Experience Multiplication
pp. 324
On the Behavior of Complex Object-Oriented Systems
pp. 373
Min-round Resettable Zero-Knowledge in the Public-Key Model
pp. 391
The Concurrency Factory software development environment
pp. 402
The Hidden Structural Rules of the Discontinuous Lambek Calculus
pp. 172
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
pp. 197
Consensus Graphs for Symmetry Plane Estimation
pp. 209
A DGC-Based Data Classification Method Used for Abnormal Network Intrusion Detection
pp. 214
Process Choreography for Human Interaction Computer-Aided Simulation
pp. 219
Repeated Root Cyclic and Negacyclic Codes over Galois Rings
pp. 219
A Seven-State Time-Optimum Square Synchronizer
pp. 227
Comparative Analysis of Classification Methods for Protein Interaction Verification System
pp. 232
Physically Interacting with Four Dimensions
pp. 236
Java for Scientific Computation: Prospects and Problems
pp. 241
Implementing Services by Partial State Machines
pp. 246
A P System Parsing Word Derivatives
pp. 260
Hardware Verification and Beyond: Using B at AWE
pp. 278
Electronic Geometry Textbook: A Geometric Textbook Knowledge Management System
pp. 283
Evaluating the Effects of Colour in LineSets
pp. 298
Mixed Integer Programming Approach to Multiprocessor Job Scheduling with Setup Times
pp. 301
Summary and recommendations
pp. 303
Modeling and Enforcing Semantic Obligations for Access Control
pp. 323
Resource Allocation Systems: Some Complexity Results on the S4PR Class
pp. 340
Routing Games in the Wild: Efficiency, Equilibration and Regret
pp. 394
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
pp. 395
Structural Cryptanalysis of SASAS
pp. 460
Pre-aggregation in Spatial Data Warehouses
pp. 90
RDF Containers – A Framework for the Integration of Distributed and Heterogeneous Applications
pp. 207
Graph Characteristic from the Gauss-Bonnet Theorem
pp. 221
Building Multimodal Interfaces Out of Executable, Model-Based Interactors and Mappings
pp. 223
Construction of Additive Reed-Muller Codes
pp. 232
Adaptive User Interactive Sketching for Teaching Based on Pen Gesture
pp. 249
A New Evaluation Method for Ontology Alignment Measures
pp. 250
Hybrid Teams in Virtual Environments: Samurai Joins the Training Team
pp. 255
Pattern Matching with Swaps for Short Patterns in Linear Time
pp. 300
Rapid Image Splicing Detection Based on Relevance Vector Machine
pp. 303
An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks
pp. 312
Deterministic Oblivious Local Broadcast in the SINR Model
pp. 318
Coupling Regulative and Constitutive Dimensions in Situated Artificial Institutions
pp. 339
Optimized Colored Nets Unfolding
pp. 371
Formal Verification of Tokeneer Behaviours Modelled in fUML Using CSP
pp. 110
Data Integration Systems for Scientific Applications
pp. 229
The First Interaction Design Pattern Library for Internet of Things User Created Applications
pp. 232
Emotional Balance as a Predictor of Impulse Control in Prisoners and Non-prisoners
pp. 250
Towards an All-Optical Soliton FFT in the 3NLS-Domain
pp. 253
Topography of Functional Connectivity in Human Multichannel Electroencephalogram during Second Language Processing
pp. 267
Automatic Bug Detection in Microcontroller Software by Static Program Analysis
pp. 281
Designing Interaction Styles for a Mobile Use Context
pp. 297
Autonomous Spacecraft Resource Management: A Multi-Agent Approach
pp. 300
On Duplication in Mathematical Repositories
pp. 336
Learning a Majority Rule Model from Large Sets of Assignment Examples
pp. 344
Math-Net.Ru as a Digital Archive of the Russian Mathematical Knowledge from the XIX Century to Today
pp. 344
Design Evaluation: Estimating Multiple Critical Performance and Cost Impacts of Designs
pp. 502
Query Processing in Broadcasted Spatial Index Trees
pp. 230
Robotic Implementation of Realistic Reaching Motion Using a Sliding Mode/Operational Space Controller
pp. 263
A Summary on the Study of the Medium-Term Forecasting of the Extra-Virgen Olive Oil Price
pp. 268
Performance Prediction Methodology for Parallel Programs with MPI in NOW Environments
pp. 270
Interval-extension of quasilinearization method
pp. 293
Single Feature Indicator Systems in the Openbox
pp. 304
Balancing Gains, Risks, Costs, and Real-Time Constraints in the Ball Passing Algorithm for the Robotic Soccer
pp. 349
A Dynamic Symbolic Geometry Environment Based on the GröbnerCover Algorithm for the Computation of Geometric Loci and Envelopes
pp. 357
Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments
pp. 383
Cascades and Myopic Routing in Nonhomogeneous Kleinberg’s Small World Model
pp. 407
cTc — A tool supporting the construction of cTLA-Specifications
pp. 445
On Expected Constant-Round Protocols for Byzantine Agreement
pp. 478
Complexity Challenges in Development of Cyber-Physical Systems
pp. 120
Incremental Validation of Models in a MDE Approach Applied to the Modeling of Complex Data Structures
pp. 217
Timing Self-generated Actions for Sensory Streaming
pp. 227
Validating OMDoc Documents
pp. 235
Novel Efficient Certificateless Aggregate Signatures
pp. 239
Topology Control in Large-Scale High Dynamic Mobile Ad-Hoc Networks
pp. 243
A Novel Blind Digital Watermark Algorithm Based on Neural Network and Chaotic Map
pp. 261
d-Monomial Tests of Nonlinear Cellular Automata for Cryptographic Design
pp. 272
Fine-Grid Resolution in Danish Eulerian Model and an Implementation on SGI Origin 2000 Computer
pp. 279
Zur numerischen Konstruktion konvergenter Schrankenfolgen für Systeme nichtlinearer, gewöhnlicher Anfangswertaufgaben
pp. 287
Integrating Knowledge Encoded by Linguistic Phenomena of Indian Languages with Neural Machine Translation
pp. 336
Blind Detection of Electronic Voice Transformation with Natural Disguise
pp. 409
On the Danger of Coverage Directed Test Case Generation
pp. 463
Robust Multiparty Computation with Linear Communication Complexity
pp. 258
From Structural Analysis to Scenarios and Patterns for Knowledge Sharing Applications
pp. 283
Multiscale Extension of the Gravitational Approach to Edge Detection
pp. 288
Untersuchungen der Grenzgenauigkeit von Algorithmen zur Auflösung linearer Gleichungssysteme mit Fehlererfassung
pp. 297
Partitioned-Based Clustering Approaches for Single Document Extractive Text Summarization
pp. 333
Towards a Conceptual Representation of Actions
pp. 347
Separators Are as Simple as Cutsets
pp. 375
Budgeted Personalized Incentive Approaches for Smoothing Congestion in Resource Networks
pp. 381
Security Research from a Multi-disciplinary and Multi-sectoral Perspective
pp. 402
Inserting an Edge into a Geometric Embedding
pp. 483
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation
pp. 577
Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability
pp. 139
DATAVIEW’10 - PC Co-chairs Message
pp. 257
Graph Characteristics from the Ihara Zeta Function
pp. 259
Relating Transition P Systems and Spiking Neural P Systems
pp. 262
Development of a Micro Quad-Rotor UAV for Monitoring an Indoor Environment
pp. 268
A Design Patterns Approach to Adaptive User Interfaces for Users with Special Needs
pp. 268
Global Stability of a Class of High-Order Recurrent Neural Networks with Multiple Delays
pp. 275
Exhaustive Evaluation of Radius 2 Toggle Rules for a Variable-Length Cryptographic Cellular Automata-Based Model
pp. 281
Meca: A Tool for Access Control Models
pp. 284
Integrated Expert Management Knowledge on OSI Network Management Objects
pp. 300
Triple Space Computing: Adding Semantics to Space-Based Computing
pp. 358
Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence Modulation
pp. 369
Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report)
pp. 390
Problem Frames and Architectures for Security Problems
pp. 416
Generating Tests from UML Specifications
pp. 416
\(\beta \)-Stars or On Extending a Drawing of a Connected Subgraph
pp. 420
Grey-Box Checking
pp. 452
Abstract Program Slicing: From Theory towards an Implementation
pp. 495
Identification Protocols Secure against Reset Attacks
pp. 306
Verbesserung von Fehlerschranken bei iterativer Matrizeninversion
pp. 321
Patient-Specific Biomechanical Model of the Brain: Application to Parkinson’s Disease Procedure
pp. 349
Incomplete Transition Complexity of Basic Operations on Finite Languages
pp. 468
Loop Invariant Synthesis in a Combined Domain
pp. 512
Does Encryption with Redundancy Provide Authenticity?
pp. 150
A Characterization of the Layout Definition Problem for Web Search Results
pp. 275
Adaptive Parallel Ant Colony Optimization
pp. 289
Plug-and-Play Nondeterminacy
pp. 304
Knowledge Management in Different Software Development Approaches
pp. 311
Iterationsverfahren bei inklusionsmonotonen Intervallfunktionen
pp. 313
An Study on Ear Detection and Its Applications to Face Detection
pp. 313
Singular Value Decomposition-Based Illumination Compensation in Video
pp. 319
Design and Implementation of a Soft Real Time Fault Tolerant System
pp. 368
Real-Time Motion Planning in Autonomous Vehicles: A Hybrid Approach
pp. 374
Software for Evaluating Relevance of Steps in Algebraic Transformations
pp. 480
Usability of Visual Data Profiling in Data Cleaning and Transformation
pp. 485
Software Metrics in Static Program Analysis
pp. 160
ProcessGene View: An Integrated Visualization of Business Process Models
pp. 306
Human Performance Model for Combined Steering-Targeting Tasks
pp. 317
Using Wearable Computer as an Audiovisual Memory Prosthesis
pp. 380
Solving Employee Timetabling Problems by Generalized Local Search
pp. 425
A Concurrent Architecture for Agent Reasoning Cycle Execution in Jason
pp. 431
Uppaal in 1995
pp. 170
Outlines for Dynamic Visualization of Semantic Web Data
pp. 295
Ontology Learning from Text: A Soft Computing Paradigm
pp. 324
An Architecture Design Process Using a Supportable Meta-architecture and Roundtrip Engineering
pp. 339
Quick-Reference Table to the OMDoc Attributes
pp. 365
User Care Preference-Based Semantic Service Discovery in a Ubiquitous Environment
pp. 377
Programming with Explicit Regions
pp. 398
Notations Around the World: Census and Exploitation
pp. 302
Text Categorization Based on Artificial Neural Networks
pp. 308
Spectral Embedding of Feature Hypergraphs
pp. 311
Emotion Recognition Based on Physiological Signals
pp. 334
A Cellular Automata-Based Modular Lighting System
pp. 343
A Token-Based Distributed Algorithm for Total Order Atomic Broadcast
pp. 343
Combining Neighbourhoods in Fuzzy Job Shop Problems
pp. 425
Memoryless Hash-Based Perceptual Image Authentication
pp. 441
On the Parameter Control of the Residual Method for the Correction of Improper Problems of Convex Programming
pp. 444
A Digital Library Framework for Reusing e-Learning Video Documents
pp. 449
Automating Personalized Learning Through Motivation
pp. 318
Clustering Using Class Specific Hyper Graphs
pp. 353
Self-adaptive RBF Neural Networks for Face Recognition
pp. 427
On Building a Knowledge Base for Stability Theory
pp. 435
Visual Cryptography Based Watermarking: Definition and Meaning
pp. 455
Agent Based Simulation to Evaluate Adaptive Caching in Distributed Databases
pp. 330
Hippie: A Nomadic Information System
pp. 341
Cognitive Analysis for Knowledge Modeling in Air Traffic Control Work
pp. 366
A Semantic Search Conceptual Model and Application in Security Access Control
pp. 401
A Problem Kernelization for Graph Packing
pp. 423
Parallel LU-decomposition on Pentium Streaming SIMD Extensions
pp. 436
Preserving Context Privacy in Distributed Hash Table Wireless Sensor Networks
pp. 440
Proviola: A Tool for Proof Re-animation
pp. 463
Analysing Incentive Strategies to Promote Participation in Crowdsourcing Systems
pp. 524
Ortho-Polygon Visibility Representations of 3-Connected 1-Plane Graphs
pp. 296
Exploratory Behaviour Depends on Multisensory Integration during Spatial Learning
pp. 315
Component-Oriented Agile Software Development
pp. 331
Word Frequency Effect and Word Similarity Effect in Korean Lexical Decision Task and Their Computational Model
pp. 338
Variable Momentum Factor Odd Symmetry Error Function Blind Equalization Algorithm
pp. 351
Individual Differences in Work Load While Doing Multitasking with a Computer
pp. 364
FORBAC: A Flexible Organisation and Role-Based Access Control Model for Secure Information Systems
pp. 377
Document Filtering for Domain Ontology Based on Concept Preferences
pp. 386
Deduction in Logic of Association Rules
pp. 534
Closing the Gap between Object-Oriented Modeling of Structure and Behavior
pp. 581
Comparison of Model Checking Tools for Information Systems
pp. 319
Unit Testing beyond a Bar in Green and Red
pp. 358
Secure Real-Time Transaction Processing with Timeliness Guarantees in Mobile Distributed Real-Time Database Systems
pp. 359
Time Estimation as a Measure of Mental Workload
pp. 388
Asynchronous Migration in Parallel Genetic Programming
pp. 440
Online Remote Trace Analysis of Parallel Applications on High-Performance Clusters
pp. 229
Ontology Approach for the Interoperability of Networked Enterprises in Supply Chain Environment
pp. 307
Genetic Programming of a Microcontrolled Water Bath Plant
pp. 313
Self-calibrating Marker Tracking in 3D with Event-Based Vision Sensors
pp. 340
Chameleon — Reconfigurability in Hand-Held Multimedia Computers
pp. 351
Prediction of Thermal Comfort Index Using Type-2 Fuzzy Neural Network
pp. 368
Human Behavioral Simulation Using Affordance-Based Agent Model
pp. 378
Numerical Modelling of the Flow in Magnetic Liquid Seals
pp. 390
Verification Results for a Multimedia Protocol
pp. 509
Search of Nash Equilibrium in Quadratic n-person Game
pp. 315
Symbiotic Sensor Networks in Complex Underwater Terrains: A Simulation Framework
pp. 360
NN-OPT: Neural Network for Option Pricing Using Multinomial Tree
pp. 372
Modeling the Model Athlete: Automatic Coaching of Rowing Technique
pp. 378
Investigating the Effects of Metacognition in Dynamic Control Tasks
pp. 387
Dynamic Mesh Schemes for Fluid-Structure Interaction
pp. 403
A Cluster Based Pseudo Feedback Technique Which Exploits Good and Bad Clusters
pp. 449
On Some SAT-Variants over Linear Formulas
pp. 584
How Can a Subsystem Be Both a Package and a Classifier?
pp. 324
Predicting Cluster Formation in Decentralized Sensor Grids
pp. 328
Automated Extract Component Refactoring
pp. 401
Boundary Integral Method for 3D Simulation of Foam Dynamics
pp. 408
Personalized Fair Reputation Based Resource Allocation in Grid
pp. 520
A Robust Image Classification Scheme with Sparse Coding and Multiple Kernel Learning
pp. 593
Optimal Grid Drawings of Complete Multipartite Graphs and an Integer Variant of the Algebraic Connectivity
pp. 598
Using UML/OCL Constraints for Relational Database Design
pp. 646
Dynamic Resource Reallocation between Deployment Components
pp. 257
ISDE’10 - PC Co-chairs Message
pp. 339
Simulating Light Adaptation in the Retina with Rod-Cone Coupling
pp. 380
A Reliability-Based RBF Network Ensemble Model for Foreign Exchange Rates Predication
pp. 392
Ensemble Combination for Solving the Parameter Selection Problem in Image Segmentation
pp. 423
A New Criteria for Selecting Neighborhood in Memory-Based Recommender Systems
pp. 473
Unambiguous Erasing Morphisms in Free Monoids
pp. 493
IKASYS: Using Mobile Devices for Memorization and Training Activities
pp. 614
Towards a UML Extension for Hypermedia Design
pp. 259
An Interaction Meta-model for Cooperative Component-Based User Interfaces
pp. 390
Combining Time-Scale Feature Extractions with SVMs for Stock Index Forecasting
pp. 406
Psychometric Evaluation with Brain-Computer Interface
pp. 269
Experimental Evaluation of ’On-Site Customer’ XP Practice on Quality of Software and Team Effectiveness
pp. 414
An Inductive Inference Model to Elicit Noncompensatory Judgment Strategies
pp. 425
A Chronological History-Based Execution Time Estimation Model for Embarrassingly Parallel Applications on Grids
pp. 443
A Tool for Link-Based Web Page Classification
pp. 445
Finite Sample Bias of Robust Scale Estimators in Computer Vision Problems
pp. 497
Asynchronous Deterministic Rendezvous on the Line
pp. 570
Variable Neighborhood Search Approach for the Location and Design Problem
pp. 645
Timed Sequence Diagrams and Tool-Based Analysis — A Case Study
pp. 694
Alternating Interval Based Temporal Logics
pp. 358
On Models in Fuzzy Propositional Logic
pp. 377
Vectors of coroutines
pp. 421
Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram
pp. 433
Picard-Uzawa Schemes: Errors, Convergence and Stopping Criterion
pp. 509
Design Validation by Symbolic Simulation and Equivalence Checking: A Case Study in Memory Optimization for Image Manipulation
pp. 661
Timing Analysis of UML Sequence Diagrams
pp. 289
A Software Inspection Process for Globally Distributed Teams
pp. 426
Monitoring Performance and Mental Workload in an Automated System
pp. 442
On Utilization of the Grid Computing Technology for Video Conversion and 3D Rendering
pp. 463
Improving Collaborative Filtering in Social Tagging Systems
pp. 465
Using Visualizations to Support Design and Debugging in Virtual Reality
pp. 521
Group Input Machine
pp. 675
The Normal Object Form: Bridging the Gap from Models to Code
pp. 430
Neural Networks, Fuzzy Inference Systems and Adaptive-Neuro Fuzzy Inference Systems for Financial Decision Making
pp. 441
Tracking by Hierarchical Representation of Target Structure
pp. 454
MPI Parallel Implementation of a Fast Separable Solver
pp. 691
Modeling Exceptional Behavior
pp. 350
Multiple-Instance Learning Improves CAD Detection of Masses in Digital Mammography
pp. 451
Using the Shape Characteristics of Rain to Identify and Remove Rain from Video
pp. 483
Lightweighting the Web of Data through Compact RDF/HDT
pp. 706
Advanced Methods and Tools for a Precise UML
pp. 354
Practice Makes Perfect
pp. 395
Contour Detection by CORF Operator
pp. 450
Pretests for Genetic-Programming Evolved Trading Programs: “zero-intelligence” Strategies and Lottery Trading
pp. 459
A Fast Approach to Improve Classification Performance of ECOC Classification Systems
pp. 474
On Influencing of a Space Geometry on Dynamics of Some CA Pedestrian Movement Model
pp. 494
Query Expansion Methods and Performance Evaluation for Reusing Linking Open Data of the European Public Procurement Notices
pp. 523
Automatic Generation of Service Ontology from UML Diagrams for Semantic Web Services
pp. 319
Service-Oriented Communities: Visions and Contributions towards Social Organizations
pp. 403
Hybrid Ensembles Using Hopfield Neural Networks and Haar-Like Features for Face Detection
pp. 461
Currency Options Volatility Forecasting with Shift-Invariant Wavelet Transform and Neural Networks
pp. 471
Project and Development of ErgoCoIn Version 2.0
pp. 479
Parameter Identification in a Two-Dimensional Parabolic Equation Using an ADI Based Solver
pp. 491
A Cost Optimal Parallel Quicksorting and Its Implementation on a Shared Memory Parallel Computer
pp. 570
A Machine Checked Soundness Proof for an Intermediate Verification Language
pp. 329
SpotAFriendNow: Social Interaction through Location-Based Social Networks
pp. 406
Mathematical Formulation of a Type of Hierarchical Neurofuzzy System
pp. 411
Face Recognition with Disparity Corrected Gabor Phase Differences
pp. 480
A Reference Model for Adaptive Visualization Systems
pp. 489
Solving the Direction Field for Discrete Agent Motion
pp. 582
Symbolic State-Space Generation of Asynchronous Systems Using Extensible Decision Diagrams
pp. 363
Scaling Extreme Programming in a Market Driven Development Context
pp. 415
Hardware Support for Language Aware Information Mining
pp. 478
Intelligence-Based Model to Timing Problem of Resources Exploration in the Behavior of Firm
pp. 349
Towards Optimal Multi-item Shopping Basket Management: Heuristic Approach
pp. 506
Stochastic Transition Model for Discrete Agent Movements
pp. 538
Recognizing Action Primitives in Complex Actions Using Hidden Markov Models
pp. 566
Towards a Topical Ontology of Fraud
pp. 621
The Minimum Reload s-t Path/Trail/Walk Problems
pp. 443
Biologically Plausible Multi-dimensional Reinforcement Learning in Neural Networks
pp. 446
On the parsing of LL-regular grammars
pp. 449
An Intelligent Synchronization Scheme for WLAN Convergence Systems
pp. 451
Adaptive Neural Oscillator with Synaptic Plasticity Enabling Fast Resonance Tuning
pp. 459
Learning from Delayed Reward und Punishment in a Spiking Neural Network Model of Basal Ganglia with Opposing D1/D2 Plasticity
pp. 539
Shape –Based Human Actions Recognition in Videos
pp. 579
Blob Tracking with Adaptive Feature Selection and Accurate Scale Determination
pp. 386
Teaching Team Work: An Extreme Week for First-Year Programmers
pp. 535
Gear Crack Detection Using Kernel Function Approximation
pp. 541
Diagnosticity of Cardiac Modes of Autonomic Control Elicited by Simulated Driving and Verbal Working Memory Dual-Tasks
pp. 547
Dynamic Queries with Relevance Feedback for Content Based Image Retrieval
pp. 551
On Euclidean Corrections for Non-Euclidean Dissimilarities
pp. 576
Efficient and Beneficial Defense Against DDoS Direct Attack and Reflector Attack
pp. 609
A PSO-Based Web Document Query Optimization Algorithm
pp. 394
Supporting Collaborative Conceptualization Tasks through a Semantic Wiki Based Platform
pp. 474
Learning How to Select an Action: A Computational Model
pp. 557
Cellular Automata for a Cyclic Bus
pp. 562
Feature and Classifier Selection in Class Decision Trees
pp. 404
Modelling the Public Sector Information through CIDOC Conceptual Reference Model
pp. 562
Experimental Studies of Visual Models in Automatic Image Annotation
pp. 572
Soft Feature Selection by Using a Histogram-Based Classifier
pp. 406
Five Challenges in Teaching XP
pp. 414
Integration of Domain and Social Ontologies in a CMS Based Collaborative Platform
pp. 568
Modelling Cognitive and Affective Load for the Design of Human-Machine Collaboration
pp. 570
Chase and Escape in Groups
pp. 608
Performance Analysis and Prediction on VEGA Grid
pp. 575
Event-Related Brain Potentials Corroborate Subjectively Optimal Delay in Computer Response to a User’s Action
pp. 580
Image Skeletonization Based on Curve Skeleton Extraction
pp. 426
Using Object Role Modeling in a Service-Oriented Data Integration Project
pp. 507
Learning to Imitate YMCA with an ESN
pp. 582
Effects of Pattern Complexity on Information Integration: Evidence from Eye Movements
pp. 602
An Efficient Algorithm for Optimal Multilevel Thresholding of Irregularly Sampled Histograms
pp. 638
A Novel 3D Statistical Shape Model for Segmentation of Medical Images
pp. 515
A New Neural Data Analysis Approach Using Ensemble Neural Network Rule Extraction
pp. 589
Multi-degree Prosthetic Hand Control Using a New BP Neural Network
pp. 593
Productivity Enhancement through Lot Size Optimization
pp. 648
Scale Consistent Image Completion
pp. 477
Clinical Performance of Digital Breast Tomosynthesis Versus Full-Field Digital Mammography: Preliminary Results
pp. 515
Segmentation of Ovarian Ultrasound Images Using Cellular Neural Networks Trained by Support Vector Machines
pp. 600
Multilane Single GCA-w Based Expressway Traffic Model
pp. 622
Fast Multivariate Ordinal Type Histogram Matching
pp. 422
Doctoral Symposium at XP 2003
pp. 457
ORM and MDM/MMS: Integration in an Enterprise Level Conceptual Data Model
pp. 613
Properties of Cellular Automaton Model for On-ramp System
pp. 533
An Efficient 3-D Positioning Method from Satellite Synthetic Aperture Radar Images
pp. 539
Learning Features and Predictive Transformation Encoding Based on a Horizontal Product Model
pp. 530
A mathematical model of parallel information processing
pp. 625
Clustering and Transport Efficiency in Public Conveyance System
pp. 678
Distribution Design in Distributed Databases Using Clustering to Solve Large Instances
pp. 639
Combining Skin Conductance and Heart Rate Variability for Adaptive Automation During Simulated IFR Flight
pp. 653
Imaged Based Codes Performance Comparison for Mobile Environments
pp. 564
Conversion Scheme for Reducing Security Vulnerability in IPv4/ IPv6 Networks
pp. 571
Echo State Networks for Multi-dimensional Data Clustering
pp. 654
Hybrid Intelligent PID Control for MIMO System
pp. 721
Markerless Pose Tracking for Augmented Reality
pp. 514
Subtyping and Derivation Rules in Fact-Based Modeling
pp. 572
Improved Location Management for Reducing Traffic Cost in 3G Mobile Networks
pp. 670
LSCM Based Non-rigid Registration for Craniofacial Surfaces
pp. 694
Automatic Mutual Nonrigid Registration of Dense Surfaces by Graphical Model Based Inference
pp. 569
Equivalence and optimization of recursive program schemata
pp. 580
A Semantic Web Portal for Semantic Annotation and Search
pp. 588
A Semantic Portal for Fund Finding in the EU: Semantic Upgrade, Integration and Publication of Heterogeneous Legacy Data
pp. 768
Task-Oriented Mobile Service Recommendation Enhanced by a Situational Reasoning Engine
pp. 598
A Heuristic Approach to Semantic Web Services Classification
pp. 604
Constructing Robust Liquid State Machines to Process Highly Variable Data Streams
pp. 724
Learning Curves for the Analysis of Multiple Instance Classifiers
pp. 757
A Key Management Scheme for Cross-Layering Designs in Wireless Sensor Networks
pp. 543
Black-Hole Attacks in P2P Mobile Networks Discovered through Bayesian Filters
pp. 553
Progress Toward a Quantitative Scale for Describing Radiodensity in Mammographic Images
pp. 612
Infinite Sparse Threshold Unit Networks
pp. 561
Systematic Performance Analysis of SART as Applied to Digital Breast Tomosynthesis
pp. 620
Learning Two-Layer Contractive Encodings
pp. 711
Fuzzy Adaptive Particle Filter Algorithm for Mobile Robot Fault Diagnosis
pp. 445
Measuring the Effectiveness of Agile Methodologies Using Data Mining, Knowledge Discovery and Information Visualization
pp. 629
Effects of Architecture Choices on Sparse Coding in Speech Recognition
pp. 723
Voice Alarm System in Emergency Evacuation
pp. 775
A New Solution Scheme of Unsupervised Locality Preserving Projection Method for the SSS Problem
pp. 653
Integrating Neural Networks and Chaotic Measurements for Modelling Epileptic Brain
pp. 746
On Properties of Genetic Operators from a Network Analytical Viewpoint
pp. 655
A New Scheme for Interactive Multi-criteria Decision Making
pp. 754
SDMOGA: A New Multi-objective Genetic Algorithm Based on Objective Space Divided
pp. 760
Human Integration in the Lifecycle of Aviation Systems
pp. 831
Segmentation of Triangular Meshes Using Multi-scale Normal Variation
pp. 596
Enabling Access to Web Resources through SecPODE-Based Annotations
pp. 770
A Characteristic of a Navigator’s Response to Artificial Ship’s Movement by Picture and Motion Platform
pp. 606
Reflecting on a Process to Automatically Evaluate Ontological Material Generated Automatically
pp. 670
Use of Support Vector Machines: Synergism to Intelligent Humanoid Robot Walking Down on a Slope
pp. 677
Recognizing Human Activities Using a Layered Markov Architecture
pp. 811
Use of Structured Pattern Representations for Combining Classifiers
pp. 860
Face Recognition Using 2D and 3D Multimodal Local Features
pp. 692
A Simple 3D Edge Template for Pose Invariant Face Detection
pp. 699
Emergence of Flocking Behavior Based on Reinforcement Learning
pp. 710
Dual Support Vector Domain Description for Imbalanced Classification
pp. 852
A Hidden Markov Model Approach to Classify and Predict the Sign of Financial Local Trends
pp. 718
Learning Method Inspired on Swarm Intelligence for Fuzzy Cognitive Maps: Travel Behaviour Modelling
pp. 726
A Computational Model of Motor Areas Based on Bayesian Networks and Most Probable Explanations
pp. 834
Analysis of Human Factors Integration Aspects for Aviation Accidents and Incidents
pp. 836
An Improved Primal-Dual Genetic Algorithm for Optimization in Dynamic Environments
pp. 927
A Mesh Based Anycast Routing Protocol for Ad Hoc Networks
pp. 845
Multiobjective Optimization Design of a Hybrid Actuator with Genetic Algorithm
pp. 852
An European Approach to the Integrated Management of Human Factors in Aircraft Maintenance: Introducing the IMMS
pp. 682
On the Social Dynamics of Ontological Commitments
pp. 742
Time Series Data Classification Using Recurrent Neural Network with Ensemble Learning
pp. 917
A New Performance Evaluation Method for Two-Class Imbalanced Problems
pp. 874
Mobile Robot Control Using Fuzzy-Neural-Network for Learning Human Behavior
pp. 884
EFuNN Ensembles Construction Using a Clustering Method and a Coevolutionary Multi-objective Genetic Algorithm
pp. 984
Analytic Performance Modeling of a Fully Adaptive Routing Algorithm in the Torus
pp. 900
A Multi-objective Evolutionary Algorithm for Multi-UAV Cooperative Reconnaissance Problem
pp. 967
A Learning Scheme for Recognizing Sub-classes from Model Trained on Aggregate Classes
pp. 813
Construction of School Temperature Measurement System with Sensor Network
pp. 938
Image Reconstruction Using Genetic Algorithm in Electrical Impedance Tomography
pp. 1047
Manage Distributed Ontologies on the Semantic Web
pp. 1012
A Fuzzy Clustering Algorithm for Symbolic Interval Data Based on a Single Adaptive Euclidean Distance
pp. 1028
Prototype-Based Threshold Rules
pp. 893
Minimum Cost Operation Mode and Minimum Loss Operation Mode of Power System – Operation Mode Selection Based on Voltage Stability
pp. 1063
Workpiece Recognition by the Combination of Multiple Simplified Fuzzy ARTMAP
pp. 1079
Design Methodology of Optimized IG_gHSOFPNN and Its Application to pH Neutralization Process
pp. 1087
Neuro-fuzzy Modeling and Fuzzy Rule Extraction Applied to Conflict Management
pp. 1095
Hardware Implementation of a Wavelet Neural Network Using FPGAs
pp. 1105
Neural Network Implementation in Hardware Using FPGAs
pp. 980
Customer Experience Management Influencing on Human Kansei to MOT
pp. 1141
Synchronization Via Multiplex Spike-Trains in Digital Pulse Coupled Networks
pp. 1012
Neural Network Approach for Learning of the World Structure by Cognitive Agents
pp. 1027
Grounding Crisp and Fuzzy Ontological Concepts in Artificial Cognitive Agents
pp. 1035
A Design of Hybrid Mobile Multimedia Game Content
pp. 1189
Neurocomputing for Minimizing Energy Consumption of Real-Time Operating System in the System-on-a-Chip
pp. 1050
A Study on a Design of Efficient Electronic Commerce System
pp. 1058
A Scheduling Middleware for Data Intensive Applications on a Grid
pp. 1119
A Methodology for Determining the Creditability of Recommending Agents
pp. 1128
How to Solve a Multicriterion Problem for Which Pareto Dominance Relationship Cannot Be Applied? A Case Study from Medicine
pp. 1150
Investigating Security in Multi-tree Based Technique in RFID Systems
pp. 1157
An Improved ALOHA Algorithm for RFID Tag Identification
pp. 1192
Personalisation of Web Search: An Agent Based Approach
pp. 1224
Using Hierarchical Filters to Detect Sparseness in Unknown Channels
pp. 1232
Auditory Feedback for Brain Computer Interface Management – An EEG Data Sonification Approach
Similar content
1,731
A tropical horde of counterfeit predator eyes
Authors:
DH Janzen
,
W Hallwachs
,
JM Burns
Metric Learning With HORDE: High-Order Regularizer for Deep Embeddings
Authors:
Pierre Jacob
,
David Picard
,
Aymeric Histace
…
Hordas feroces, víctimas y beligerantes. Colombia en la guerra de 1859-1862 o la guerra por la Soberanías
Translated title: Fierce hordes, victims, and belligerents. Colombia in the 1859-1862 or the War for Sovereignties
Translated title: Hordas ferozes, vítimas e beligerantes. A Colômbia na guerra de 1859-1862 ou a guerra pela soberanía
Translated title: Des hordes féroces, victimes et belligérantes. La colombie dans la guerre de 1859-1862 ou la guerre pour les souverainetés
Authors:
PATRICIA CARDONA ZULUAGA
See all similar
Cited by
3
Shepherding Hordes of Markov Chains
Authors:
Milan Češka
,
Nils Jansen
,
Sebastian Junges
…
Counterexample-Driven Synthesis for Probabilistic Program Sketches
Authors:
Milan Češka
,
Christian Hensel
,
Sebastian Junges
…
Farkas certificates and minimal witnesses for probabilistic reachability constraints
Authors:
Florian Funke
,
Simon Jantsch
,
Christel Baier
See all cited by