Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
44
views
116
references
Top references
cited by
8
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,637
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Affective Interactions : Towards a New Generation of Computer Interfaces
Using Models at Runtime to Address Assurance for Self-Adaptive Systems
other
Author(s):
Betty H. C. Cheng
,
Kerstin I. Eder
,
Martin Gogolla
,
Lars Grunske
,
Marin Litoiu
,
Hausi A. Müller
,
Patrizio Pelliccione
,
Anna Perini
,
Nauman A. Qureshi
,
Bernhard Rumpe
,
Daniel Schneider
,
Frank Trollmann
,
Norha M. Villegas
Publication date
(Print):
2014
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Genome Engineering using CRISPR
Most cited references
116
Record
: found
Abstract
: not found
Article
: not found
Statecharts: a visual formalism for complex systems
David Harel
(1987)
0
comments
Cited
353
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
The vision of autonomic computing
J.O. Kephart
,
D.M. Chess
(2003)
0
comments
Cited
324
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Basic concepts and taxonomy of dependable and secure computing
A. Avizienis
,
J.-C. Laprie
,
B. Randell
…
(2004)
0
comments
Cited
247
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2014
Pages
: 101-136
DOI:
10.1007/978-3-319-08915-7_4
SO-VID:
b8789967-bb97-46ff-bc54-8b004331c16a
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Interactive Robotic Fish for the Analysis of Swarm Behavior
pp. 1
Gödel Machines: Towards a Technical Justification of Consciousness
pp. 1
On Relating Type Theories and Set Theories
pp. 1
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
pp. 1
Delay Bounds in a Network with Aggregate Scheduling
pp. 1
Recognisable Languages over Monads
pp. 1
R-OSGi: Distributed Applications Through Software Modularization
pp. 1
How to build a highly available system using consensus
pp. 1
Balancing Agility and Discipline: A Guide for the Perplexed
pp. 1
Anonymity and Historical-Anonymity in Location-Based Services
pp. 1
Conceptual Design of XML Document Warehouses
pp. 1
Colour Spaces for Colour Transfer
pp. 1
Partial Completeness of Abstract Fixpoint Checking
pp. 1
Time-Evolving Relational Classification and Ensemble Methods
pp. 1
Elementary strong functional programming
pp. 1
Quilt: An XML Query Language for Heterogeneous Data Sources
pp. 1
Meta-heuristics: The State of the Art
pp. 1
Hebbian-Based Neural Networks for Bottom-Up Visual Attention Systems
pp. 1
Learning Weighted Automata
pp. 1
A Theory of Predicate-Complete Test Coverage and Generation
pp. 1
Negative Selection Algorithm for Aircraft Fault Detection
pp. 1
Standard ML of New Jersey
pp. 1
Visualizing Knowledge and Information: An Introduction
pp. 3
BoostMF: Boosted Matrix Factorisation for Collaborative Ranking
pp. 3
Approximation of Graph Edit Distance in Quadratic Time
pp. 3
Breaking Cryptographic Implementations Using Deep Learning Techniques
pp. 3
A Qualitative Survey of Regression Testing Practices
pp. 3
Research and Challenges on Bitcoin Anonymity
pp. 3
Research into Interactive Digital Narrative: A Kaleidoscopic View
pp. 7
MPICH2: A New Start for MPI Implementations
pp. 7
Empirical Research Methods in Software Engineering
pp. 9
Verification of an alternating bit protocol by means of process algebra protocol
pp. 9
The Effects of Testing Environment on the Viscoelastic Properties of Soft Tissues
pp. 11
The Case for Holistic Data Integration
pp. 11
A Survey of Industrial Control System Testbeds
pp. 13
Assessing the Impact of Changing Environments on Classifier Performance
pp. 14
Iterative Byzantine Vector Consensus in Incomplete Graphs
pp. 15
Adding equations to NU-Prolog
pp. 15
Understanding Probabilistic Programs
pp. 16
Granular Computing and Sequential Three-Way Decisions
pp. 17
Practical Traffic Analysis: Extending and Resisting Statistical Disclosure
pp. 17
Dimensions of Adjustable Autonomy and Mixed-Initiative Interaction
pp. 17
Designing Business Models in the Era of Internet of Things
pp. 18
Toward a Model of Knowledge-Based Graph Comprehension
pp. 19
A Dataset and Evaluation Methodology for Depth Estimation on 4D Light Fields
pp. 20
On the Structure of Protocols for Magic State Distillation
pp. 21
Efficient sequential and parallel algorithms for planar minimum cost flow
pp. 21
Prospecting Archaeological Landscapes
pp. 21
Effective Affective in Intelligent Systems – Building on Evidence of Empathy in Teaching and Learning
pp. 24
Secure Delegation of Elliptic-Curve Pairing
pp. 25
A Comparison of Sentiment Analysis Techniques: Polarizing Movie Blogs
pp. 26
Sentiment Classification from Multi-class Imbalanced Twitter Data Using Binarization
pp. 28
Design Patterns for Decentralised Coordination in Self-organising Emergent Systems
pp. 31
User Tracking on the Web via Cross-Browser Fingerprinting
pp. 31
Generic Linear Business Process Modeling
pp. 31
Location Privacy Techniques in Client-Server Architectures
pp. 32
Self-Stabilizing Pulse Synchronization Inspired by Biological Pacemaker Networks
pp. 33
Differentially Private Multi-dimensional Time Series Release for Traffic Monitoring
pp. 33
Constructive Cryptography – A New Paradigm for Security Definitions and Proofs
pp. 34
Reconfiguration of List L(2,1)-Labelings in a Graph
pp. 35
Detecting and Avoiding Multiple Sources of Interference in the 2.4 GHz Spectrum
pp. 35
Automated Selection of Standardized Planes from Ultrasound Volume
pp. 37
Tiles for Reo
pp. 37
Co-occurrence Histograms of Oriented Gradients for Pedestrian Detection
pp. 40
Specification-Driven Test Generation for Model Transformations
pp. 40
Business Modelling Is Not Process Modelling
pp. 41
Schematizing Maps: Simplification of Geographic Shape by Discrete Curve Evolution
pp. 42
Feature-Based Forensic Camera Model Identification
pp. 42
Service Interaction: Patterns, Formalization, and Analysis
pp. 42
Refinement calculus, part I: Sequential nondeterministic programs
pp. 42
A Survey of Peer-to-Peer Security Issues
pp. 42
Isovists as a Means to Predict Spatial Experience and Behavior
pp. 44
Truth Table Invariant Cylindrical Algebraic Decomposition by Regular Chains
pp. 45
Cost-Sensitive Neural Network with ROC-Based Moving Threshold for Imbalanced Classification
pp. 45
Multilayer Spiking Neural Network for Audio Samples Classification Using SpiNNaker
pp. 45
On the Use of Cognitive Neurometric Indexes in Aeronautic and Air Traffic Management Environments
pp. 47
Cyber Security Exercises and Competitions as a Platform for Cyber Security Experiments
pp. 47
A Functional Logic Programming Approach to Graphical User Interfaces
pp. 47
Termination and Confluence of Higher-Order Rewrite Systems
pp. 48
Analysis of a guard condition in type theory
pp. 48
An Associative Perception-Action Structure Using a Localized Space Variant Information Representation
pp. 49
A note on distributed computing
pp. 49
Emotion and Facial Expression
pp. 50
ClaSP: An Efficient Algorithm for Mining Frequent Closed Sequences
pp. 50
Authoring Issues beyond Tools
pp. 50
Cube and Conquer: Guiding CDCL SAT Solvers by Lookaheads
pp. 51
Anomaly Detection in Elderly Daily Behavior in Ambient Sensing Environments
pp. 52
How Does Predicate Invention Affect Human Comprehensibility?
pp. 52
Applications of Gröbner bases in non-linear computational geometry
pp. 53
Adaptive Methods for Classification in Arbitrarily Imbalanced and Drifting Data Streams
pp. 55
A Rely-Guarantee Proof System for x86-TSO
pp. 56
A Three Level Search Engine Index Based in Query Log Distribution
pp. 57
Semantically Enhanced Collaborative Filtering on the Web
pp. 57
A Mobile Phone Malicious Software Detection Model with Behavior Checker
pp. 58
The Minimum Degree Heuristic and the Minimal Triangulation Process
pp. 60
Approaches to Text Mining Arguments from Legal Cases
pp. 60
Routing in telecommunications networks with ant-like agents
pp. 61
Semi-supervised Assessment of Incomplete LV Coverage in Cardiac MRI Using Generative Adversarial Nets
pp. 61
Increasing System Dependability through Architecture-Based Self-Repair
pp. 61
Node-Link Mapping Principles for Visualizing Knowledge and Information
pp. 61
Linear λ-calculus and categorical models revisited
pp. 62
Model-checking for real-time systems
pp. 62
A semantic integration of object-Z and CSP for the specification of concurrent systems
pp. 64
On the Cost of Lazy Engineering for Masked Software Implementations
pp. 65
Motion Deblurring in the Wild
pp. 65
Counterexample Generation for Discrete-Time Markov Models: An Introductory Survey
pp. 67
Refinement calculus, part II: Parallel and reactive programs
pp. 68
Computational Topology in Text Mining
pp. 69
Conversion of Security Proofs from One Leakage Model to Another: A New Issue
pp. 70
R2-EMOA: Focused Multiobjective Search Using R2-Indicator-Based Selection
pp. 70
Exp.Open 2.0: A Flexible Tool Integrating Partial Order, Compositional, and On-The-Fly Verification Methods
pp. 71
A Probabilistic Approach to Large Displacement Optical Flow and Occlusion Detection
pp. 72
Overview of the CLEF 2009 Medical Image Retrieval Track
pp. 72
Mote-Based Online Anomaly Detection Using Echo State Networks
pp. 74
Variational Quantum Factoring
pp. 74
Hardness of approximating graph transformation problem
pp. 75
Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data
pp. 78
Building a Side Channel Based Disassembler
pp. 80
Foundations of Attack–Defense Trees
pp. 81
Temporal Here and There
pp. 82
Analysis of Co-authorship Ego Networks
pp. 82
Unsupervised Pre-training Across Image Domains Improves Lung Tissue Classification
pp. 83
Bottom-Up Gazetteers: Learning from the Implicit Semantics of Geotags
pp. 84
Gast: Generic Automated Software Testing
pp. 87
A Process Calculus Analysis of Compensations
pp. 87
Recognition of Leaf Images Based on Shape Features Using a Hypersphere Classifier
pp. 87
‘Realness’ in Chatbots: Establishing Quantifiable Criteria
pp. 87
Some recursively unsolvable problems relating to isolated cutpoints in probabilistic automata
pp. 88
Sampling-Based Relative Landmarks: Systematically Test-Driving Algorithms before Choosing
pp. 89
A Hybrid CS/PSO Algorithm for Global Optimization
pp. 89
Aggregation Queries in the Database-As-a-Service Model
pp. 89
Designing Web Warehouses from XML Schemas
pp. 90
Separation Logic Modulo Theories
pp. 91
Inductive Logic Programming in Answer Set Programming
pp. 91
Local Descriptors for Spatio-temporal Recognition
pp. 91
Piecewise Affine Registration of Biological Images
pp. 93
Targeted Sentiment Classification with Attentional Encoder Network
pp. 93
Ludonarrative Hermeneutics: A Way Out and the Narrative Paradox
pp. 94
Virtual Reality Enabled Training for Social Adaptation in Inclusive Education Settings for School-Aged Children with Autism Spectrum Disorder (ASD)
pp. 94
Comparing Hidden Markov Models and Long Short Term Memory Neural Networks for Learning Action Representations
pp. 94
Simulating Sparse Hamiltonians with Star Decompositions
pp. 94
What makes a good data model? Evaluating the quality of entity relationship models
pp. 95
Assessing the Scholarly Impact of ImageCLEF
pp. 96
Hash Based Digital Signature Schemes
pp. 96
Applied Quantitative Information Flow and Statistical Databases
pp. 97
Optimal Bounds for Transformations of ω-Automata
pp. 97
Unsupervised Representation Learning with Deep Convolutional Neural Network for Remote Sensing Images
pp. 99
Fully dynamic maintenance of vertex cover
pp. 101
Using Models at Runtime to Address Assurance for Self-Adaptive Systems
pp. 102
Influence of Falsified Position Data on Geographic Ad-Hoc Routing
pp. 102
Feature and Meta-Models in Clafer: Mixed, Specialized, and Coupled
pp. 102
A Hybrid Spatial Model for Representing Indoor Environments
pp. 102
A Case Study on Runtime Monitoring of an Autonomous Research Vehicle (ARV) System
pp. 103
Information Theoretic Security for Encryption Based on Conditional Rényi Entropies
pp. 104
#metoo Through the Lens of Social Media
pp. 104
Hyperparameter Search Space Pruning – A New Component for Sequential Model-Based Hyperparameter Optimization
pp. 104
On Private Scalar Product Computation for Privacy-Preserving Data Mining
pp. 105
A Formal Model of Dataflow Repositories
pp. 105
Introduction to Testing Graph Properties
pp. 108
ESC/Java2: Uniting ESC/Java and JML
pp. 109
Probabilistic Data Generation for Deduplication and Data Linkage
pp. 111
Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability Scanners
pp. 112
A Riemannian Framework for the Processing of Tensor-Valued Images
pp. 113
Generalized Self-testing and the Security of the 6-State Protocol
pp. 116
Robotic Exploration, Brownian Motion and Electrical Resistance
pp. 117
GAMA 1.6: Advancing the Art of Complex Agent-Based Modeling and Simulation
pp. 117
Leader Election and Shape Formation with Self-organizing Programmable Matter
pp. 119
A Graph–Theoretic Approach to Steganography
pp. 119
Nearest Neighbor Queries in a Mobile Environment
pp. 120
PTR: Phrase-Based Topical Ranking for Automatic Keyphrase Extraction in Scientific Publications
pp. 121
Priority queues: Small, monotone and trans-dichotomous
pp. 122
A Sound and Complete Backward Chaining Algorithm for Existential Rules
pp. 122
Algebraic Characterizations of Unitary Linear Quantum Cellular Automata
pp. 124
Explaining Inconsistencies in OWL Ontologies
pp. 126
On the Formal Specification of Electronic Institutions
pp. 127
A Greedy Facility Location Algorithm Analyzed Using Dual Fitting
pp. 127
Segmentation of medical image objects using deformable shape loci
pp. 127
How to Train Your Avatar: A Data Driven Approach to Gesture Generation
pp. 127
Predicting Best Answerers for New Questions in Community Question Answering
pp. 127
Preventing Premature Convergence to Local Optima in Genetic Algorithms via Random Offspring Generation
pp. 128
Formal Verification and Simulation for Performance Analysis for Probabilistic Broadcast Protocols
pp. 128
RoADS: A Road Pavement Monitoring System for Anomaly Detection Using Smart Phones
pp. 130
Type-Based Proxy Re-encryption and Its Construction
pp. 130
Practical Interruptible Conversations
pp. 133
Leakless DNA Strand Displacement Systems
pp. 133
Submodular Function Maximization on the Bounded Integer Lattice
pp. 135
Simplifying Probabilistic Programs Using Computer Algebra
pp. 135
Space and Energy Efficient Computation with DNA Strand Displacement Systems
pp. 135
Modelling Empathy in Social Robotic Companions
pp. 135
Playing with Kruskal: Algorithms for Morphological Trees in Edge-Weighted Graphs
pp. 135
A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model
pp. 135
Gapping as Like-Category Coordination
pp. 136
Discovering Discriminative and Interpretable Patterns for Surgical Motion Analysis
pp. 136
A Generic Parallel Collection Framework
pp. 137
Schelling Segregation with Strategic Agents
pp. 137
Collaboration Analysis in Recommender Systems Using Social Networks
pp. 137
Never Trust a Bunny
pp. 139
Unitary Error Bases: Constructions, Equivalence, and Applications
pp. 141
Extending abduction from propositional to first-order logic
pp. 142
Analysis of selection, mutation and recombination in genetic algorithms
pp. 143
An Artificial Bee Colony Algorithm for the Unrelated Parallel Machines Scheduling Problem
pp. 143
Simulating Neurons in Reaction-Diffusion Chemistry
pp. 143
Complexity of Solving Systems with Few Independent Monomials and Applications to Mass-Action Kinetics
pp. 144
An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs
pp. 144
A Verification-Based Approach to Memory Fence Insertion in Relaxed Memory Systems
pp. 147
Generative Adversarial Training for MRA Image Synthesis Using Multi-contrast MRI
pp. 148
Data Clustering Based on Teaching-Learning-Based Optimization
pp. 148
Tracking of Instruments in Minimally Invasive Surgery for Surgical Skill Analysis
pp. 149
Is Water-Scrum-Fall Reality? On the Use of Agile and Traditional Development Practices
pp. 149
Long-lived, fast, waitfree renaming with optimal name space and high throughput
pp. 150
NEOCR: A Configurable Dataset for Natural Image Text Recognition
pp. 151
Monitoring Compliance Policies over Incomplete and Disagreeing Logs
pp. 152
Chameleon-Hashes with Ephemeral Trapdoors
pp. 154
Faster and Space-Optimal Edit Distance “1” Dictionary
pp. 155
Policy Gradients for CVaR-Constrained MDPs
pp. 156
A Use of Flashback and Foreshadowing for Surprise Arousal in Narrative Using a Plan-Based Approach
pp. 156
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography
pp. 157
Designing for Complementarity: Teacher and Student Needs for Orchestration Support in AI-Enhanced Classrooms
pp. 159
Distributed Circle Formation for Anonymous Oblivious Robots
pp. 159
Algorithmic Thinking: The Key for Understanding Computer Science
pp. 160
NovA: Automated Analysis of Nonverbal Signals in Social Interactions
pp. 160
Coral Reef Fish Detection and Recognition in Underwater Videos by Supervised Machine Learning: Comparison Between Deep Learning and HOG+SVM Methods
pp. 163
Persuasive Mobile Apps for Health and Wellness: A Comparative Systematic Review
pp. 165
Geometric Grouping of Repeated Elements within Images
pp. 166
Resilience of Process Control Systems to Cyber-Physical Attacks
pp. 166
Computational Sensemaking on Examples of Knowledge Discovery from Neuroscience Data: Towards Enhancing Stroke Rehabilitation
pp. 167
Hypermedia and learning: Who guides whom?
pp. 167
On the Inefficiency of Equilibria in Congestion Games
pp. 168
Which triangulations approximate the complete graph?
pp. 168
Assume-Guarantee Model Checking of Software: A Comparative Case Study
pp. 168
A Generic Programming Extension for Clean
pp. 169
Report on the Model Checking Contest at Petri Nets 2011
pp. 169
A Framework for Evaluating Mobile App Repackaging Detection Algorithms
pp. 169
Weakly-Supervised Learning for Tool Localization in Laparoscopic Videos
pp. 169
Robust Simulations of Turing Machines with Analytic Maps and Flows
pp. 169
A Bibliometric Analysis of the Research Status of the Technology Enhanced Language Learning
pp. 171
On sparseness, ambiguity and other decision problems for acceptors and transducers
pp. 172
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices
pp. 173
Object-Contextual Representations for Semantic Segmentation
pp. 174
Effective and Scalable Authorship Attribution Using Function Words
pp. 179
Indexed Matching Statistics and Shortest Unique Substrings
pp. 179
Action Recognition and Prediction for Driver Assistance Systems Using Dynamic Belief Networks
pp. 179
Petri nets with marking-dependent arc cardinality: Properties and analysis
pp. 181
Hierarchical automata as model for statecharts
pp. 181
Finding Reductions Automatically
pp. 181
How to improve the nonlinearity of bijective S-boxes
pp. 183
On the Robustness of Complex Networks by Using the Algebraic Connectivity
pp. 184
A demand driven computation strategy for lazy narrowing
pp. 185
Towards a More Democratic Mining in Bitcoins
pp. 185
Extended Reeb Graphs for Surface Understanding and Description
pp. 187
Testing Transition Systems: An Annotated Bibliography
pp. 187
Asynchronous Session Types: Exceptions and Multiparty Interactions
pp. 188
Approximate Graph Edit Distance Computation Combining Bipartite Matching and Exact Neighborhood Substructure Distance
pp. 188
Implementing Expressive Gesture Synthesis for Embodied Conversational Agents
pp. 189
Quantum Merlin-Arthur Proof Systems: Are Multiple Merlins More Helpful to Arthur?
pp. 192
Efficient Multilabel Classification Algorithms for Large-Scale Problems in the Legal Domain
pp. 193
Intelligent User Profiling
pp. 193
New Results on Fault Tolerant Geometric Spanners
pp. 194
3D Shape Matching through Topological Structures
pp. 195
Bayesian Networks for Reliability Analysis of Complex Systems
pp. 195
Approximate String Matching over Ziv—Lempel Compressed Text
pp. 198
Verification of ATL Transformations Using Transformation Models and Model Finders
pp. 201
Quantitative Monitoring of STL with Edit Distance
pp. 203
Online Crowdsourcing in the Public Sector: How to Design Open Government Platforms
pp. 203
Load Balanced Scalable Byzantine Agreement through Quorum Building, with Full Information
pp. 205
Sound Global State Caching for ALC with Inverse Roles
pp. 205
Compiling Semiring-based Constraints with clp(FD,S)
pp. 205
Genome growth and the evolution of the genotype-phenotype map
pp. 205
Web Usage Mining Project for Improving Web-Based Learning Sites
pp. 207
Finding All Common Intervals of k Permutations
pp. 208
A Single-Camera Remote Eye Tracker
pp. 208
Inferring Strings from Graphs and Arrays
pp. 209
Arc-Consistency Filtering Algorithms for Logical Combinations of Constraints
pp. 210
Scalable Processing of Context Information with COSMOS
pp. 211
Byzantizing Paxos by Refinement
pp. 211
Rule Protection for Indirect Discrimination Prevention in Data Mining
pp. 211
Formalizing Human Ignorance
pp. 211
On Computing Ad-hoc Selective Families
pp. 212
User Model Enrichment for Venue Recommendation
pp. 212
An Automata-Based Symbolic Approach for Verifying Programs on Relaxed Memory Models
pp. 214
Two algorithms for the longest common subsequence of three (or more) strings
pp. 218
An Integrated Supply Chain Management System: A Case Study in Healthcare Sector
pp. 220
Bio-Visual Fusion for Person-Independent Recognition of Pain Intensity
pp. 222
Incremental regular inference
pp. 224
Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault
pp. 226
Automata-Theoretic Approach to Planning for Temporally Extended Goals
pp. 226
Deciding properties for message sequence charts
pp. 228
A Timed Calculus for Wireless Systems
pp. 228
On-the-Fly Calibration of Low-Cost Gas Sensors
pp. 229
Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch
pp. 230
Optimal Edge User Allocation in Edge Computing with Variable Sized Vector Bin Packing
pp. 231
Empirical Evaluation of Wireless Underground-to-Underground Communication in Wireless Underground Sensor Networks
pp. 231
Convolution Neural Network for Relation Extraction
pp. 233
Library-Based Design and Consistency Checking of System-Level Industrial Test Cases
pp. 233
Indirect Alignment between Multilingual Ontologies: A Case Study of Korean and Swedish Ontologies
pp. 235
A Classification Scheme for Lymphocyte Segmentation in H&E Stained Histology Images
pp. 235
Euclidean reconstruction from uncalibrated views
pp. 238
Emotion Tokens: Bridging the Gap among Multilingual Twitter Sentiment Analysis
pp. 238
Towards a Framework and a Model for Knowledge Visualization: Synergies Between Information and Knowledge Visualization
pp. 238
Cost Analysis of Concurrent OO Programs
pp. 242
A Survey on Applications of Bipartite Graph Edit Distance
pp. 244
Solving the Narrative Paradox in VEs – Lessons from RPGs
pp. 245
Large-Scale Shape Retrieval with Sparse 3D Convolutional Neural Networks
pp. 245
Algorithm Engineering in Robust Optimization
pp. 247
A Deeper Look at the Use of Telemetry for Analysis of Player Behavior in RTS Games
pp. 249
Support Vector Machines: Theory and Applications
pp. 249
Simulation and Statistical Model Checking for Modestly Nondeterministic Models
pp. 250
An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement
pp. 251
Extensions to a memetic timetabling system
pp. 251
The median problem for breakpoints in comparative genomics
pp. 253
Leaf Recognition Based on the Combination of Wavelet Transform and Gaussian Interpolation
pp. 254
Medical Record System Using Blockchain, Big Data and Tokenization
pp. 256
Genre Classification of Web Pages
pp. 257
Complexity of Graph Self-assembly in Accretive Systems and Self-destructible Systems
pp. 257
A P–Lingua Based Simulator for Spiking Neural P Systems
pp. 260
Prediction of Classifier Training Time Including Parameter Optimization
pp. 260
Meta Cookie+: An Illusion-Based Gustatory Display
pp. 262
Proof of Space from Stacked Expanders
pp. 263
Exploring the Capability of Immune Algorithms: A Characterization of Hypermutation Operators
pp. 266
Understanding TSP Difficulty by Learning from Evolved Instances
pp. 267
A Reliable Fall Detection System Based on Wearable Sensor and Signal Magnitude Area for Elderly Residents
pp. 267
Refinement of actions in causality based models
pp. 274
On Detecting Clustered Anomalies Using SCiForest
pp. 277
“Secure” Log-Linear and Logistic Regression Analysis of Distributed Databases
pp. 278
Comparative Evaluation of Distributed Clustering Schemes for Multi-source Entity Resolution
pp. 278
A tableau calculus for minimal model reasoning
pp. 279
New Impossible Differential Attacks on AES
pp. 279
Radical-Enhanced Chinese Character Embedding
pp. 282
Improved Impossible Differential Cryptanalysis of 7-Round AES-128
pp. 284
Membrane Computing
pp. 287
Operational semantics of OBJ-3
pp. 287
Identifying Productive Inquiry in Virtual Labs Using Sequence Mining
pp. 288
Searching for Rising Stars in Bibliography Networks
pp. 288
RAxML-OMP: An Efficient Program for Phylogenetic Inference on SMPs
pp. 291
Efficient and Non-interactive Timed-Release Encryption
pp. 294
Active Constrained Clustering by Examining Spectral Eigenvectors
pp. 296
Counting the Number of Matchings in Chordal and Chordal Bipartite Graph Classes
pp. 299
Longest Common Prefix with Mismatches
pp. 301
Expression of Moral Emotions in Cooperating Agents
pp. 303
Agents in Traffic Modelling — From Reactive to Social Behaviour
pp. 304
The CSU Face Identification Evaluation System: Its Purpose, Features, and Structure
pp. 306
Speeding Up Pattern Matching by Text Compression
pp. 308
Mining Multi-label Concept-Drifting Data Streams Using Dynamic Classifier Ensemble
pp. 310
Equivalence of Deterministic Nested Word to Word Transducers
pp. 310
PerSent: A Freely Available Persian Sentiment Lexicon
pp. 311
An Optimal Offloading Partitioning Algorithm in Mobile Cloud Computing
pp. 313
A Profile-Based Method for Authorship Verification
pp. 315
Embodied Conversational Agents: Effects on Memory Performance and Anthropomorphisation
pp. 317
Parallel search for combinatorial optimization: Genetic algorithms, simulated annealing, tabu search and GRASP
pp. 318
Improvements in BDD-Based Reachability Analysis of Timed Automata
pp. 320
Fixed-Parameter Tractability Results for Feedback Set Problems in Tournaments
pp. 321
Genetic Algorithm Based QoS-Aware Service Compositions in Cloud Computing
pp. 322
New AES Software Speed Records
pp. 323
Investigation of Bagging Ensembles of Genetic Neural Networks and Fuzzy Systems for Real Estate Appraisal
pp. 326
Complexity results for 1-safe nets
pp. 327
On using q-gram locations in approximate string matching
pp. 329
Approximating Terminological Queries
pp. 331
A Polynomial Time Algorithm for Bounded Directed Pathwidth
pp. 332
Möbius: An Extensible Tool for Performance and Dependability Modeling
pp. 334
Learning and Reasoning with Logic Tensor Networks
pp. 335
Class-driven statistical discretization of continuous attributes (Extended abstract)
pp. 337
A Survey of Datasets for Human Gesture Recognition
pp. 338
A calculus of broadcasting systems
pp. 340
SEB-tree: An Approach to Index Continuously Moving Objects
pp. 340
Comparison of Bagging, Boosting and Stacking Ensembles Applied to Real Estate Appraisal
pp. 340
Constructing Stochastic Mixture Policies for Episodic Multiobjective Reinforcement Learning Tasks
pp. 342
Enforcing Performance Isolation Across Virtual Machines in Xen
pp. 343
Term Rewriting with Logical Constraints
pp. 343
Extended Sanitizable Signatures
pp. 347
A Local System for Classical Logic
pp. 352
Formal Concept Analysis for Knowledge Discovery and Data Mining: The New Challenges
pp. 353
Object Tracking with an Adaptive Color-Based Particle Filter
pp. 355
Virtual data structures
pp. 356
GRASP with Path-Relinking for the Quadratic Assignment Problem
pp. 358
Broadcast in the Ad Hoc SINR Model
pp. 362
Partial Implicit Unfolding in the Davis-Putnam Procedure for Quantified Boolean Formulae
pp. 363
Lazy Approximation for Dense Real-Time Systems
pp. 364
Clean — A language for functional graph rewriting
pp. 365
An Adaptive Brain Storm Optimization Algorithm for Multiobjective Optimization Problems
pp. 366
Random Generation of Bayesian Networks
pp. 366
Sub-Riemannian Fast Marching in SE(2)
pp. 371
Modelling Plastic Distortion in Fingerprint Images
pp. 372
On the Limitations of Scalarisation for Multi-objective Reinforcement Learning of Pareto Fronts
pp. 374
A Neural Networks Committee for the Contextual Bandit Problem
pp. 374
Controlling search in declarative programs
pp. 376
Gapped Permutation Patterns for Comparative Genomics
pp. 380
Finite Differencing of Logical Formulas for Static Analysis
pp. 388
Access Invaders: Developing a Universally Accessible Action Game
pp. 390
METAFrame in Practice: Design of Intelligent Network Services
pp. 391
Cryptanalysis and Improvement of a Biometrics-Based Multi-server Authentication with Key Agreement Scheme
pp. 393
Algebraic Side-Channel Attacks
pp. 393
Selecting Collaborative Filtering Algorithms Using Metalearning
pp. 393
Evolutionary Discrete Firefly Algorithm for Travelling Salesman Problem
pp. 393
Improved Branch-Cut-and-Price for Capacitated Vehicle Routing
pp. 393
Implicit Feature Identification via Co-occurrence Association Rule Mining
pp. 394
Sign Language Recognition Using Kinect
pp. 395
CSIDH: An Efficient Post-Quantum Commutative Group Action
pp. 398
Design Science Research Evaluation
pp. 399
Formal Specification and Testing of Model Transformations
pp. 400
On bayesian methods for seeking the extremum
pp. 400
Immunity Through Swarms: Agent-Based Simulations of the Human Immune System
pp. 400
Time optimal self-stabilizing spanning tree algorithms
pp. 401
On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis
pp. 402
Improving RetinaNet for CT Lesion Detection with Dense Masks from Weak RECIST Labels
pp. 416
Petri net analysis using boolean manipulation
pp. 417
Swarm Intelligence in Big Data Analytics
pp. 417
A Hybrid Brain-Computer Interface for Smart Home Control
pp. 417
Token-Based Cloud Computing
pp. 423
A Comprehensive Framework for Evaluation in Design Science Research
pp. 426
Learning CNN-based Features for Retrieval of Food Images
pp. 426
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority
pp. 431
Using KNN and SVM Based One-Class Classifier for Detecting Online Radicalization on Twitter
pp. 432
Model Checking Knowledge and Time in Systems with Perfect Recall
pp. 435
Compact Multi-signatures for Smaller Blockchains
pp. 440
Incorporating Temporal Prior from Motion Flow for Instrument Segmentation in Minimally Invasive Surgery Video
pp. 442
Measuring the Stability of Feature Selection
pp. 445
Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications
pp. 458
Exploring Norms in Agile Software Teams
pp. 460
Improving Steering of a Powered Wheelchair Using an Expert System to Interpret Hand Tremor
pp. 460
Activity Recognition Using Hierarchical Hidden Markov Models on a Smartphone with 3D Accelerometer
pp. 461
Finding Structural Similarity in Time Series Data Using Bag-of-Patterns Representation
pp. 467
Multiple Linear Regression Based on Coefficients Identification Using Non-iterative SGTM Neural-like Structure
pp. 473
Landslide Susceptibility Mapping Using Artificial Neural Network in the Urban Area of Senise and San Costantino Albanese (Basilicata, Southern Italy)
pp. 474
Hierarchical Classifiers for Complex Spatio-temporal Concepts
pp. 480
On the difference between one and many
pp. 490
KEx:A Peer-to-Peer Solution for Distributed Knowledge Management
pp. 491
Probabilistic student models: Bayesian Belief Networks and Knowledge Space Theory
pp. 497
The Image Classification with Different Types of Image Features
pp. 514
An Empirical Study of Optimization for Maximizing Diffusion in Networks
pp. 537
Path Planning and Obstacle Avoidance for Autonomous Mobile Robots: A Review
pp. 542
Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD
pp. 547
Robust Motion Estimation Based on Multiple Monocular Camera for Indoor Autonomous Navigation of Micro Aerial Vehicle
pp. 553
Graph Coloring with a Distributed Hybrid Quantum Annealing Algorithm
pp. 554
Training Data Selection for Support Vector Machines
pp. 563
Explainable AI: A Brief Survey on History, Research Areas, Approaches and Challenges
pp. 566
HMM-Based Audio Keyword Generation
pp. 573
Mitigating Bias in Gender, Age and Ethnicity Classification: A Multi-task Convolution Neural Network Approach
pp. 587
On the choice of regularisation parameter in image restoration
pp. 588
Cross-Modal Recipe Retrieval: How to Cook this Dish?
pp. 591
Taking Gradients Through Experiments: LSTMs and Memory Proximal Policy Optimization for Black-Box Quantum Control
pp. 609
Search for Sparse Active Inputs: A Review
pp. 613
Self-monitoring and Technology: Challenges and Open Issues in Personal Informatics
pp. 622
GANomaly: Semi-supervised Anomaly Detection via Adversarial Training
pp. 637
Influence of Gender and Age on the Attitudes of Children towards Humanoid Robots
pp. 638
The Privacy Blanket of the Shuffle Model
pp. 638
Handling Analogical Proportions in Classical Logic and Fuzzy Logics Settings
pp. 642
Assessing Sustainability: Research Directions and Relevant Issues
pp. 643
Heuristic Semantic Walk
pp. 649
Mining High Utility Itemsets in Big Data
pp. 652
Useful Infeasible Solutions in Engineering Optimization with Evolutionary Algorithms
pp. 660
Summary of Usability Evaluations of an Educational Augmented Reality Application
pp. 671
Statistical Abnormal Crowd Behavior Detection and Simulation for Real-Time Applications
pp. 672
A Collaborative Brain-Computer Interface for Accelerating Human Decision Making
pp. 674
Towards a Large Scale Concept Ontology for Broadcast Video
pp. 677
RBNet: A Deep Neural Network for Unified Road and Road Boundary Detection
pp. 687
Skin-color modeling and adaptation
pp. 692
Weakly Supervised Object Detection in Artworks
pp. 713
SVM and RGB-D Sensor Based Gesture Recognition for UAV Control
pp. 713
Detection of Protein-Protein Interactions from Amino Acid Sequences Using a Rotation Forest Model with a Novel PR-LPQ Descriptor
pp. 747
Citizen Participation and Technologies: The C.A.S.T. Architecture
pp. 763
A Theoretical Investigation of the Reaction N(2D) + C6H6 and Implications for the Upper Atmosphere of Titan
pp. 773
Saliency Based Image Cropping
pp. 837
EUS SVMs: Ensemble of Under-Sampled SVMs for Data Imbalance Problems
pp. 887
JCUDA: A Programmer-Friendly Interface for Accelerating Java Programs with CUDA
pp. 944
Modeling Students’ Emotions from Cognitive Appraisal in Educational Games
pp. 989
Real-Observation Quantum-Inspired Evolutionary Algorithm for a Class of Numerical Optimization Problems
pp. 1067
Combinatorial Preconditioners and Multilevel Solvers for Problems in Computer Vision and Image Processing
pp. 1126
That Elusive Diversity in Classifier Ensembles
pp. 1310
Indoor/Outdoor Pedestrian Navigation with an Embedded GPS/RFID/Self-contained Sensor System
Similar content
4,637
A Tool for Optimizing Runtime Parameters of Open MPI
Authors:
Mohamad Chaarawi
,
Jeffrey M. Squyres
,
Edgar Gabriel
…
Runtime Verification of k-Safety Hyperproperties in HyperLTL
Authors:
Shreya Agrawal
,
Borzoo Bonakdarpour
JavaMOP: efficient parametric runtime monitoring framework
Authors:
D Jin
,
P Meredith
,
C. Lee
…
See all similar
Cited by
8
Robotics and Integrated Formal Methods: Necessity Meets Opportunity
Authors:
Marie Farrell
,
Matt Luckcuck
,
Michael M. Fisher
Perpetual Assurances for Self-Adaptive Systems
Authors:
Danny Weyns
,
Nelly Bencomo
,
Radu Calinescu
…
MoDeS3: Model-Based Demonstrator for Smart and Safe Cyber-Physical Systems
Authors:
András Vörös
,
Márton Búr
,
István Ráth
…
See all cited by