Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
42
views
8
references
Top references
cited by
32
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,509
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Security Protocols : 7th International Workshop, Cambridge, UK, April 19-21, 1999. Proceedings
Automatic presentations of structures
other
Author(s):
Bakhadyr Khoussainov
,
Anil Nerode
Publication date
(Online):
May 31 2005
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Emerald: Sustainable Structures & Infrastructures
Most cited references
8
Record
: found
Abstract
: not found
Book Chapter
: not found
Automata on Infinite Objects
Wolfgang Thomas
(1990)
0
comments
Cited
83
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Trees, automata, and games
Yuri Gurevich
,
Leo Harrington
(1982)
0
comments
Cited
35
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Synchronized rational relations of finite and infinite words
Christiane Frougny
,
Jacques Sakarovitch
(1993)
0
comments
Cited
25
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
1995
Publication date (Online):
May 31 2005
Pages
: 367-392
DOI:
10.1007/3-540-60178-3_93
SO-VID:
624a5410-eba0-43b8-83dd-9b3d2b6ef224
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Introduction
pp. 1
Algebraic Specification and Program Development by Stepwise Refinement
pp. 1
Proving Termination with (Boolean) Satisfaction
pp. 1
Distributed Process Discovery and Conformance Checking
pp. 1
Implicit coercions in type systems
pp. 1
Storage system architectures for continuous media data
pp. 1
Three Syntactic Theories for Combinatory Graph Reduction
pp. 1
The Web Operating System — WOS
pp. 1
Using high-level petri nets in the field of intelligent networks
pp. 1
Industry Standards for the Analytics Era: TPC Roadmap
pp. 1
Early fault detection tools
pp. 1
Functional Link Artificial Neural Network for Multi-label Classification
pp. 1
Intervall — Mathematik Zum Karlsruher Symposium 1975
pp. 1
XP after Enron - Can It Survive?
pp. 1
The Semantic Web: A Network of Understanding
pp. 1
Techniques for the Identification of Semantically-Equivalent Online Identities
pp. 1
Introduction
pp. 1
Temporal Patterns in Artificial Reaction Networks
pp. 1
E-Voting and the Need for Rigourous Software Engineering – The Past, Present and Future
pp. 1
Biomodel Engineering – From Structure to Behavior
pp. 1
The Order Bound for Toric Codes
pp. 1
Two Agents Competing for a Shared Machine
pp. 1
New Channel Selection Criterion for Spatial Domain Steganography
pp. 1
Functional parsers
pp. 1
Bandwidth Management in Community Networks
pp. 1
SAT-Based Combinational and Sequential Dependency Computation
pp. 1
Generalized default logic: minimal knowledge, autoepistemic and default reasoning reconciled
pp. 1
Rigorous System Design: The BIP Approach
pp. 3
Image-Based Graph Visualization: Advances and Challenges
pp. 13
A 3D Simulator of Multiple Legged Robots Based on USARSim
pp. 13
Emerging Application Domains and the Computing Fabric
pp. 13
The Importance of Single-Source Engineering of Emergency and Process Shutdown Systems
pp. 14
Kleene algebra with tests and commutativity conditions
pp. 14
On Residuation
pp. 15
Identification of a 2-Additive Bi-Capacity by Using Mathematical Programming
pp. 16
A two-level approach towards lean proof-checking
pp. 16
Urban Computing and Smart Cities: Opportunities and Challenges in Modelling Large-Scale Aggregated Human Behavior
pp. 17
2 Model-Based Integration
pp. 17
Practical aspects of specialization of Algol-like programs
pp. 18
Asymptotic behavior of stochastic automata
pp. 19
Optimising Problem Formulation for Cylindrical Algebraic Decomposition
pp. 2
Using Speculative Multithreading for General-Purpose Applications
pp. 2
Neurodynamic Optimization and Its Applications in Robotics
pp. 2
Keynote: Trustworthy Services and the Biological Analogy
pp. 2
Using B Machines for Model-Based Testing of Smartcard Software
pp. 21
Analysis of Air Traffic Track Data with the AutoBayes Synthesis System
pp. 21
Exploiting Partial Success in Applying Automated Formal Methods
pp. 22
A Data Sharing Agreement Framework
pp. 22
Towards a JSON-Based Fast Policy Evaluation Framework
pp. 22
On the Power of the Randomized Iterate
pp. 23
Clustered Planarity = Flat Clustered Planarity
pp. 23
Modeling Snapshot of Composite WS Execution by Colored Petri Nets
pp. 25
2. Experience Management
pp. 26
Model-Driven Techniques to Enhance Architectural Languages Interoperability
pp. 31
Mollified Zone Diagrams and Their Computation
pp. 42
Effective numberings, completions, and control structures
pp. 6
Composing Security Properties
pp. 8
A Study of Optimal Matrix for Efficient Matrix Embedding in $\mathbb{F}_3$
pp. 9
Graph rewriting systems — The basic concepts
pp. 9
Properties of the Hopfield Model with Weighted Patterns
pp. 9
Research Themes in the Case-Based Reasoning in Health Sciences Core Literature
pp. 15
Efficient Triangle Counting in Large Graphs via Degree-Based Vertex Partitioning
pp. 16
Concept Sharing Through Interaction: The Effect of Information Visualization for Career Design
pp. 18
A Declarative Approach for Software Modeling
pp. 19
A Novel Mapping Scheme for Steganalysis
pp. 19
Semantic Views of Homogeneous Unstructured Data
pp. 20
Design, Implementation and Evaluations of a Direction Based Service System for Both Indoor and Outdoor
pp. 21
An Empirical Analysis of Under-Sampling Techniques to Balance a Protein Structural Class Dataset
pp. 22
A Multi-agent System for Incident Management Solutions on IT Infrastructures
pp. 23
Total Immersion: Designing for Affective Symbiosis in a Virtual Reality Game with Haptics, Biosensors, and Emotive Agents
pp. 23
Comparison of methods for detecting corner points from digital curves
pp. 25
Certainty-factor-like Structures in Bayesian Networks
pp. 29
The Complexity of Model Checking Concurrent Programs Against CTLK Specifications
pp. 29
A Tour of Recent Results on Word Transducers
pp. 3
Keynote: Distributed Algorithms and VLSI
pp. 3
The Design of Spacecraft On-Board Software
pp. 3
Vision-Based Control of Robot Motion
pp. 30
How to Put through Your Agenda in Collective Binary Decisions
pp. 30
Information Retention in Heterogeneous Majority Dynamics
pp. 30
Constraint Logic Programming Applied to Model Checking
pp. 33
Synchronization analyses for multiple recursion parameters
pp. 33
Java Communications for Large-Scale Parallel Computing
pp. 35
UBS-Graph rewriting systems — matching subgraphs in constant time
pp. 35
User interface management system embedded in a multimedia document editor framework
pp. 36
The greatest common divisor: A case study for program extraction from classical proofs
pp. 37
Password Exhaustion: Predicting the End of Password Usefulness
pp. 37
The Rationality of Round Interpretation
pp. 37
To be or not to be an “agent”
pp. 4
EI2N’10 - Keynote
pp. 45
A Game Theoretic Approach for Resource Usage
pp. 6
On the Power of Threshold Measurements as Oracles
pp. 69
The modelling and analysis of IEEE 802.6's configuration control protocol with coloured petri nets
pp. 81
An outline of the SMoLCS approach
pp. 92
Dynamic Aspect-Oriented Programming in Java: The HotWave Experience
pp. 115
Mathematical Theory of Transfer, II
pp. 17
Technologies and Considerations for Developing Internet and Multiplayer Computer Games: A Tutorial
pp. 21
Jikzi: A New Framework for Secure Publishing
pp. 25
A Dynamic Field Architecture for the Generation of Hierarchically Organized Sequences
pp. 29
Virtual Butler: What Can We Learn from Adaptive User Interfaces?
pp. 32
Market Self-organization under Limited Information
pp. 34
Innovative Information and Knowledge Infrastructures – How Do I Find What I Need?
pp. 35
A Betweenness Centrality Guided Clustering Algorithm and Its Applications to Cancer Diagnosis
pp. 37
Approximation Algorithms for Multiple Strip Packing
pp. 37
A Machine-Learning Framework for Hybrid Machine Translation
pp. 39
Mutation in Genetic Programming: A Preliminary Study
pp. 4
A Distributed and Deterministic TDMA Algorithm for Write-All-With-Collision Model
pp. 43
A Declarative Compositional Timing Analysis for Multicores Using the Latency-Rate Abstraction
pp. 51
Certification of Bounds of Non-linear Functions: The Templates Method
pp. 52
On parallel hierarchies and R ki
pp. 53
Generation of problem solving cases
pp. 55
The Socio-cognitive Dynamics of Trust: Does Trust Create Trust?
pp. 59
The SynchAADL2Maude Tool
pp. 69
A Synchronous-Based Code Generator for Explicit Hybrid Systems Languages
pp. 77
4 Semantics of UML Models for Dynamic Behavior
pp. 79
Characterizations of acceptability
pp. 97
Functional programming with overloading and higher-order polymorphism
pp. 107
5 Modeling and Simulation of TDL Applications
pp. 129
Continuous-Time Moving Network Voronoi Diagram
pp. 131
Parameter region for the proper operation of the IEEE 802.2 LLC type 3 protocol: A petri net approach
pp. 141
5. Representing Knowledge for Adaptation
pp. 144
CCS is an (augmented) contact free C/E system
pp. 173
Evaluation
pp. 19
Chorus Angelorum
pp. 19
Distance-2 Self-stabilizing Algorithm for a b-Coloring of Graphs
pp. 33
An OMDoc Primer
pp. 34
Modelling the Population Dynamics and the File Availability in a BitTorrent-Like P2P System with Decreasing Peer Arrival Rate
pp. 34
An Efficient Inverse-Consistent Diffeomorphic Image Registration Method for Prostate Adaptive Radiotherapy
pp. 35
Technology Diffusion in Social Networks
pp. 37
Auctions with Arbitrary Deals
pp. 37
Jikzi: A New Framework for Secure Publishing
pp. 40
Prediction of Protein Secondary Structure Using Nonlinear Method
pp. 42
Embodied Virtual Agents: An Affective and Attitudinal Approach of the Effects on Man-Machine Stickiness in a Product/Service Discovery
pp. 42
Semantically Inspired Electronic Healthcare Records
pp. 43
Rank for Some Families of Quaternary Reed-Muller Codes
pp. 44
Calibration Based Reliable Detector for Detecting LSB Matching Steganography
pp. 45
Planning with Regression Analysis in Transaction Logic
pp. 48
The Environment as an Argument
pp. 49
Engineering Agent Organisations in a Business Environment
pp. 49
Abduction with Negation as Failure for Active and Reactive Rules
pp. 49
Position Tracking Using Infra-Red Signals for Museum Guiding System
pp. 57
Information Security in a Quantum World
pp. 66
Verifying a Plaftorm for Digital Imaging: A Multi-tool Strategy
pp. 67
Turning Cliques into Paths to Achieve Planarity
pp. 71
Reactive Synthesis for Robotic Swarms
pp. 71
Transcription and Posttranscriptional Processes
pp. 73
Characterizing the Principle of Minimum Cross-Entropy
pp. 73
Practical Guidelines for Developing Case-Based Reasoning Applications
pp. 79
Specification and Efficient Monitoring Beyond STL
pp. 80
LUCAS microprogramming language
pp. 83
Web Service Composition Based on Petri Nets: Review and Contribution
pp. 83
Round5: Compact and Fast Post-quantum Public-Key Encryption
pp. 87
Prediction theory for stochastic automata
pp. 100
Multi-agent matchmaking
pp. 115
Clifford algebraic calculus for geometric reasoning
pp. 125
Overview of existing schemes with other than ordinary security
pp. 13
Motion and Emotional Behavior Design for Pet Robot Dog
pp. 161
Robot Manipulators
pp. 179
Conclusion
pp. 183
Constructing medium sized efficient functional programs in Clean
pp. 21
RDIM: A Self-adaptive and Balanced Distribution for Replicated Data in Scalable Storage Clusters
pp. 37
Service Oriented Architecture Pitfalls
pp. 41
The Mix-Matrix Method in the Problem of Binary Quadratic Optimization
pp. 45
An Evaluation of Formalisms for Negotiations in E-commerce
pp. 48
Using Regular Grammars for Event-Based Testing
pp. 49
Instantiation of SMT Problems Modulo Integers
pp. 53
Optimal Bipartite Ramanujan Graphs from Balanced Incomplete Block Designs: Their Characterizations and Applications to Expander/LDPC Codes
pp. 54
LSB Replacement Steganography Software Detection Based on Model Checking
pp. 55
Coarse-Grained Parallelization of Distance-Bound Smoothing for the Molecular Conformation Problem
pp. 61
An Iterative Approach for Searching an Equilibrium in Piecewise Linear Exchange Model
pp. 62
Longest Wait First for Broadcast Scheduling [Extended Abstract]
pp. 67
From simple filtering to tagging
pp. 67
A Modelling Framework for Cyber-Physical System Resilience
pp. 70
Improving Memory Latency Aware Fetch Policies for SMT Processors
pp. 71
Computational Aspects of Manipulation and Control in Judgment Aggregation
pp. 74
Coordination Mechanisms, Cost-Sharing, and Approximation Algorithms for Scheduling
pp. 74
Graph Patterns, Reinforcement Learning and Models of Reputation for Improving Coalition Formation in Collaborative Multi-agent Systems
pp. 76
An application of constructive completeness
pp. 82
A Universal Machine for Biform Theory Graphs
pp. 83
Adaptive Trust and Co-operation: An Agent-Based Simulation Approach
pp. 84
MikiBeta : A General GUI Library for Visualizing Proof Trees
pp. 91
Perfect Timed Communication Is Hard
pp. 91
Efficient case retrieval
pp. 93
Synthesis and Posttranslational Modifications of Proteins
pp. 95
Compiler generation for interactive graphics using intermediate code
pp. 97
Semantic Caching in Location-Dependent Query Processing
pp. 98
VyPR2: A Framework for Runtime Verification of Python Web Services
pp. 108
On Persistency in Time Petri Nets
pp. 111
Analogical replay
pp. 115
Constraint-Based Monitoring of Hyperproperties
pp. 123
Single Base Modular Multiplication for Efficient Hardware RNS Implementations of ECC
pp. 149
Conventional definitions of fail-stop signature schemes and general reductions
pp. 173
Rainfall Distribution Based on a Delaunay Triangulation Method
pp. 187
7. Experience Retrieval
pp. 49
Justifications for the Event-B Modelling Notation
pp. 52
Realtime TRUS/MRI Fusion Targeted-Biopsy for Prostate Cancer: A Clinical Demonstration of Increased Positive Biopsy Rates
pp. 57
Advantage of Quantum Strategies in Random Symmetric XOR Games
pp. 62
Multiplicative Attribute Graph Model of Real-World Networks
pp. 62
Observable Sharing for Functional Circuit Description
pp. 65
Semantic Wiki as a Lightweight Knowledge Management System
pp. 69
Convex Hulls on Cellular Automata
pp. 69
Form item extraction based on line searching
pp. 75
The Routing Open Shop Problem: New Approximation Algorithms
pp. 77
Multi-agent Systems on the Internet: Extending the Scope of Coordination towards Security and Topology
pp. 78
Practical and Methodological Aspects of the Use of Cutting-Edge ASP Tools
pp. 81
On the branching structure of languages
pp. 83
Recharging Probably Keeps Batteries Alive
pp. 86
Property-Based Preferences in Abstract Argumentation
pp. 89
When Agents Communicate Hypotheses in Critical Situations
pp. 91
When and How Process Groups Can Be Used to Reduce the Renaming Space
pp. 93
Presence Interaction Management in SIP SOHO Architecture
pp. 99
Compositional CLP-Based Test Data Generation for Imperative Languages
pp. 106
Visualizing the Template of a Chaotic Attractor
pp. 109
Linked Data and Ontology Reference Model for Infectious Disease Reporting Systems
pp. 109
A Declarative-Friendly API for Web Document Manipulation
pp. 117
Improving Priority Promotion for Parity Games
pp. 118
Specialising Finite Domain Programs Using Polyhedra
pp. 133
Learning to Trust
pp. 137
A roadmap to metacomputation by supercompilation
pp. 137
Deciding between Conflicting Influences
pp. 151
Exact and Approximated Data-Reuse Optimizations for Tiling with Parametric Sizes
pp. 171
Automated production of readable proofs for theorems in non-Euclidean geometries
pp. 57
A Generative Multiset Kernel for Structured Data
pp. 63
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
pp. 64
Automatic Translation from Combined B and CSP Specification to Java Programs
pp. 72
Cerebral Activation Patterns in the Preparation and Movement Periods of Spontaneous and Evoked Movements
pp. 72
Universal Witnesses for State Complexity of Basic Operations Combined with Reversal
pp. 73
Language Identification Based on the Variations in Intonation Using Multi-classifier Systems
pp. 74
Relating May and Must Testing Semantics for Discrete Timed Process Algebras
pp. 76
A Mathematical Model of the Competition between Acquired Immunity and Virus
pp. 79
Scenarios for Companions
pp. 83
Optimal Data Embedding in 3D Models for Extraction from 2D Views Using Perspective Invariants
pp. 84
Incorporating BDI Agents into Human-Agent Decision Making Research
pp. 85
Avoiding Moving Persons by Using Simple Trajectory Prediction and Spatio Temporal Planning
pp. 89
Protocol Engineering for Multi-agent Interaction
pp. 90
An Improved Decision Procedure for Propositional Projection Temporal Logic
pp. 93
Efficient Tabling of Structured Data Using Indexing and Program Transformation
pp. 98
A Logical Investigation of Heterogeneous Reasoning with Graphs in Elementary Economics
pp. 104
Sobolev Space Preconditioning for Mixed Nonlinear Elliptic Boundary Value Problems
pp. 106
A Semantic Model for Service Composition with Coordination Time Delays
pp. 108
Optimizing Inequality Joins in Datalog with Approximated Constraint Propagation
pp. 111
Instead of a conclusion
pp. 121
Tree Exploration by a Swarm of Mobile Agents
pp. 136
Roles of Program Extension
pp. 139
High-Throughput Technologies in Molecular Biology
pp. 142
A Method for Making Password-Based Key Exchange Resilient to Server Compromise
pp. 145
Weighted Branching Systems: Behavioural Equivalence, Behavioural Distance, and Their Logical Characterisations
pp. 145
Learning Mutual Trust
pp. 154
On the product form solution for Stochastic Petri Nets
pp. 171
Optgen: A Generator for Local Optimizations
pp. 213
Relative Motion
pp. 232
COSTPN for Modeling and control of telecommunication systems
pp. 241
LUCAS as a dedicated processor for image processing
pp. 289
Constructions for one message block
pp. 53
Face Recognition Using ALLE and SIFT for Human Robot Interaction
pp. 59
A Development Graph for Elementary Algebra
pp. 65
Spectral Signal Unmixing with Interior-Point Nonnegative Matrix Factorization
pp. 74
A Resource Classification System for the WOS
pp. 79
Self-stabilizing Numerical Iterative Computation
pp. 82
Augmenting Social Interactions: Experiments in Socio-emotional Computing
pp. 82
Blowing Light: Green-Based Interaction Design
pp. 82
Neurobiologically-Inspired Soft Switching Control of Autonomous Vehicles
pp. 90
The Case for Virtualized Wireless Access Networks
pp. 97
Care-O-bot® 3 – Vision of a Robot Butler
pp. 98
Finding Dense Subgraphs in G(n,1/2)
pp. 98
Consideration of the Watermark Inversion Attack and Its Invalidation Framework
pp. 111
Geometrically Invariant Image Blind Watermarking Based on Speeded-Up Robust Features and DCT Transform
pp. 113
Energy Trade-Offs in Resource-Constrained Multi-Agent Systems
pp. 113
A Procedure for an Event-Condition-Transaction Language
pp. 113
Representation in Case-Based Reasoning Applied to Control Reconfiguration
pp. 115
Recent results on L systems
pp. 120
Genetic Programming Discovers Efficient Learning Rules for the Hidden and Output Layers of Feedforward Neural Networks
pp. 122
Compensable WorkFlow Nets
pp. 123
Symbolic Execution of Concurrent Objects in CLP
pp. 123
Human Reasoning with Proportional Quantifiers and Its Support by Diagrams
pp. 127
Field Array Compression in Data Caches for Dynamically Allocated Recursive Data Structures
pp. 130
Verified Resource Guarantees for Heap Manipulating Programs
pp. 131
UML 2.0 Architectural Crossroads: Sculpting or Mudpacking?
pp. 132
Formally Analyzing Continuous Aspects of Cyber-Physical Systems Modeled by Homogeneous Linear Differential Equations
pp. 137
Compact Drawings of 1-Planar Graphs with Right-Angle Crossings and Few Bends
pp. 138
Annotation Algorithms for Unrestricted Independent And-Parallelism in Logic Programs
pp. 145
Socially Enabled Preference Learning from Implicit Feedback Data
pp. 149
Scaling Up Algorithmic Debugging with Virtual Execution Trees
pp. 159
Distributed Trust in Open Multi-agent Systems
pp. 160
A real-life experiment in creating an agent marketplace
pp. 162
Trace Relations and Logical Preservation for Markov Automata
pp. 162
Modeling Dynamical Phenomena in the Era of Big Data
pp. 169
Conclusion
pp. 169
Contradictions at the Borders
pp. 173
Obtaining deadlock-preserving skeletons for coloured nets
pp. 193
Towards a Scalable Framework for Context-Free Language Reachability
pp. 195
On Herbrand's theorem
pp. 208
Flat central configurations of four planet motions
pp. 313
Signing many long messages
pp. 55
Stochastic Text Models for Music Categorization
pp. 73
Hybrid Optimized Polynomial Neural Networks with Polynomial Neurons and Fuzzy Polynomial Neurons
pp. 76
Context-Aware Application System for Music Playing Services
pp. 94
A Self-stabilizing $\frac{2}{3}$ -Approximation Algorithm for the Maximum Matching Problem
pp. 95
Tracking Uncertainty in a Spatially Explicit Susceptible-Infected Epidemic Model
pp. 106
Finding Important Vocabulary Within Ontology
pp. 106
Strategy Complexity of Finite-Horizon Markov Decision Processes and Simple Stochastic Games
pp. 109
Self-Stabilizing Leader Election in Optimal Space
pp. 109
Towards Nominal Context-Free Model-Checking
pp. 120
Self-embedding Fragile Watermarking Scheme Combined Average with VQ Encoding
pp. 121
The Influence of Input and Output Measurement Noise on Batch-End Quality Prediction with Partial Least Squares
pp. 125
On-Line State Estimation of Maneuvering Objects by Sequential Monte Carlo Algorithm
pp. 138
Automatically Testing Web Services Choreography with Assertions
pp. 139
Extensions of Euler Diagrams in Peirce’s Four Manuscripts on Logical Graphs
pp. 141
Verwendung von Tschebyschew-Approximation und Ökonomisierungsverfahren bei der Vergröberung von Intervallpolynomen
pp. 143
Exploiting Preference Queries for Searching Learning Resources
pp. 161
A Particle Swarm-Based Approach for Semantic Similarity Computation
pp. 165
10. Developing Experience Factory Applications
pp. 166
Hash Functions: From Merkle-Damgård to Shoup
pp. 168
Determining Points on Handwritten Mathematical Symbols
pp. 193
P-superfairness in nets
pp. 197
Evaluation of Buffer Queries in Spatial Databases
pp. 208
Partial algebras, subsorting, and dependent types
pp. 239
Unfolding Groups, I
pp. 297
11 The EAST-ADL Architecture Description Language for Automotive Embedded Software
pp. 38
ASSERT4SOA: Toward Security Certification of Service-Oriented Applications
pp. 79
Framed Versus Unframed Two-Dimensional Languages
pp. 92
Sparse Bump Sonification: A New Tool for Multichannel EEG Diagnosis of Mental Disorders; Application to the Detection of the Early Stage of Alzheimer’s Disease
pp. 114
On the Effectiveness of Distributed Learning on Different Class-Probability Distributions of Data
pp. 121
Integrating Geometric and Biomechanical Models of a Liver Tumour for Cryosurgery Simulation
pp. 123
Noise Injection Heuristics for Concurrency Testing
pp. 124
Tiara: A Self-stabilizing Deterministic Skip List
pp. 128
On the Additive Constant of the k-Server Work Function Algorithm
pp. 131
Clustering Based on Density Estimation with Sparse Grids
pp. 136
An Evolving Associative Classifier for Incomplete Database
pp. 149
Automatic Generation of Affine IFS and Strongly Typed Genetic Programming
pp. 153
Palovca: Describing and Executing Graph Algorithms in Haskell
pp. 157
Hint, Instruction, and Practice: The Necessary Components for Promoting Spontaneous Diagram Use in Students’ Written Work?
pp. 165
A natural deduction approach to dynamic logic
pp. 196
Making Mercury Programs Tail Recursive
pp. 229
Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA
pp. 233
Verifying Fast and Sparse SSA-Based Optimizations in Coq
pp. 235
Operational semantics of behavioural canons based on narrowing
pp. 253
Defense in Depth Formulation and Usage in Dynamic Access Control
pp. 257
Unfolding Groups, II
pp. 309
12 Fujaba4Eclipse Real-Time Tool Suite
pp. 41
Allowing Citizens to Self-compose Personalized Services: A Cloud Computing Model
pp. 80
Towards Humanlike Social Touch for Prosthetics and Sociable Robotics: Three-Dimensional Finite Element Simulations of Synthetic Finger Phalanges
pp. 89
Modeling of Spiking Analog Neural Circuits with Hebbian Learning, Using Amorphous Semiconductor Thin Film Transistors with Silicon Oxide Nitride Semiconductor Split Gates
pp. 93
Approximating Tree Edit Distance through String Edit Distance for Binary Tree Codes
pp. 110
3-D Reconstruction of Blood Vessels Skeleton Based on Neural Network
pp. 114
Key Requirements for Integrating Usability Engineering and Software Engineering
pp. 124
The Open-End Argument for Private Computing
pp. 135
A (4 + ε)-Approximation for the Minimum-Weight Dominating Set Problem in Unit Disk Graphs
pp. 139
Completeness and Decidability of a Fragment of Duration Calculus with Iteration
pp. 140
Time Constraint Patterns for Event B Development
pp. 141
An Improved Monte Carlo Algorithm for Elastic Electron Backscattering from Surfaces
pp. 141
Local Synchronization on Oriented Rings
pp. 143
Towards Interactional Symbiosis: Epistemic Balance and Co-presence in a Quantified Self Experiment
pp. 143
TimeNetManager — A Software Tool for Generating Random Temporal Networks
pp. 145
A Particle Swarm Optimization Metaheuristic for the Blocking Flow Shop Scheduling Problem: Total Tardiness Minimization
pp. 148
Self-tuned Refresh Rate in a Swarm Intelligence Path Management System
pp. 152
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems
pp. 157
Middleware Supporting Various Input/Output Devices for Networked Audio and Visual Home Appliances
pp. 177
Sequential Deliberation for Social Choice
pp. 200
A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory
pp. 211
Basic concepts of a fuzzy logic data browser with applications
pp. 215
A C++ binding for Penguin: a system for data sharing among heterogeneous object models
pp. 227
Tighter Security Proofs for Generic Key Encapsulation Mechanism in the Quantum Random Oracle Model
pp. 229
Environmentally-Friendly GR(1) Synthesis
pp. 249
The algebraic specification of semicomputable data types
pp. 317
13 AutoFocus 3 - A Scientific Tool Prototype for Model-Based Development of Component-Based, Reactive, Distributed Systems
pp. 43
Towards Large-Size Ontology Alignment by Mapping Groups of Concepts
pp. 87
Investigating the Effects of Gain and Loss of Esteem on Human-Robot Interaction
pp. 90
Performance Evaluation of a Self-organized Hierarchical Topology for Update of Replicas in a Large Distributed System
pp. 97
Agile Development Using Naked Objects
pp. 105
Impact of Frequency on the Energetic Efficiency of Action Potentials
pp. 129
Optimization of Queries Invoking Views by Query Tail Absorption
pp. 133
FTT Algorithm of Web Pageviews for Personalized Recommendation
pp. 138
Modeling Heart Pacemaker Tissue by a Network of Stochastic Oscillatory Cellular Automata
pp. 143
Parameterized Algorithms for Stochastic Steiner Tree Problems
pp. 146
Game-Theoretic Models of Information Overload in Social Networks
pp. 146
Approximate Matching between a Context-Free Grammar and a Finite-State Automaton
pp. 155
A fuzzy extension of Allen’s Interval Algebra
pp. 157
Towards an Agent-Based Negotiation Scheme for Scheduling Electric Vehicles Charging
pp. 159
Knowledge-based segmentation for automatic map interpretation
pp. 162
Evolutionary Role Model for Multi-Agent Systems
pp. 166
CWFM: Closed Contingency Weighted Frequent Itemsets Mining
pp. 187
Using Diagrammatic Drawings to Understand Fictional Spaces: Exploring the Buendía House in Gabriel García Márquez’s One Hundred Years of Solitude
pp. 189
SPEC HPG Benchmarks for Large Systems
pp. 196
Attack-Resilient Multitree Data Distribution Topologies
pp. 200
The Queue-Number of Posets of Bounded Width or Height
pp. 211
NSS: An NTRU Lattice-Based Signature Scheme
pp. 225
Timed Condition/Event systems: A framework for modular discrete models of chemical plants and verification of their real-time discrete control
pp. 232
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
pp. 249
(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model
pp. 257
Constrained Nearest Neighbor Queries
pp. 107
Activity Representation in Crowd
pp. 131
Design and Rich Application Frameworks
pp. 135
Panel: Change is Good. You Go First
pp. 138
Effect of Body Position on NIRS Based Hemodynamic Measures from Prefrontal Cortex
pp. 139
Checking Violation Tolerance of Approaches to Database Integrity
pp. 140
D-FOAF: Distributed Identity Management with Access Rights Delegation
pp. 145
The von Mises Naive Bayes Classifier for Angular Data
pp. 155
Action Investment Energy Games
pp. 159
Between a Rock and a Hard Place: The Two-to-One Assignment Problem
pp. 163
Lemma Generalization and Non-unit Lemma Matching for Model Elimination
pp. 165
Replication Based on Role Concept for Multi-Agent Systems
pp. 166
Non Binary CSPs and Heuristics for Modeling and Diagnosing Dynamic Systems
pp. 169
Coded Spread Spectrum Watermarking Scheme
pp. 171
Refinement of Statemachines Using Event B Semantics
pp. 172
Agreement Technologies Applied to Transmission Towers Maintenance
pp. 175
Extending Social Reasoning to Cope with Multiple Partner Coalitions
pp. 178
Prognostic Modeling with High Dimensional and Censored Data
pp. 179
Automatic region labeling of the layered map
pp. 184
Evolving an Environment Model for Robot Localization
pp. 193
Controller Compilation and Compression for Resource Constrained Applications
pp. 222
proSQLite: Prolog File Based Databases via an SQLite Interface
pp. 226
An Algorithm to Find Frequent Concepts of a Formal Context with Taxonomy
pp. 227
Compositional Testing of Communication Systems
pp. 229
The Bit Security of Paillier’s Encryption Scheme and Its Applications
pp. 230
Mathematics and the World Wide Web
pp. 247
Reducing page thrashing in recursive query processing
pp. 254
Lossy Channels in a Dataflow Model of Computation
pp. 255
Verification by Testing for Recursive Program Schemes
pp. 287
Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce Bits
pp. 303
Evolution of partial evaluators: Removing inherited limits
pp. 329
15 Benefits of System Simulation for Automotive Applications
pp. 365
A Mathematical Theory of Architecture
pp. 98
Time-Lock Puzzle with Examinable Evidence of Unlocking Time
pp. 119
A Quorum Based Group k-Mutual Exclusion Algorithm for Open Distributed Environments
pp. 136
Panel: A Competition of Software Product Line Economic Models
pp. 141
Natural Specifications Yield Decidability for Distributed Synthesis of Asynchronous Systems
pp. 142
Clusters, Servers, Thin Clients, and On-line Communities
pp. 147
Using Brain Activity to Predict Task Performance and Operator Efficiency
pp. 154
Multipath Routing to Provide Quality of Service in Mobile Ad Hoc Networks
pp. 155
Unravelling the Yeast Cell Cycle Using the TriGen Algorithm
pp. 157
A reactive-deliberative model of dialogue agency
pp. 158
ActiveMap: A Visualization Tool for Location Awareness to Support Informal Interactions
pp. 167
STANSE: Bug-Finding Framework for C Programs
pp. 168
Ciphertext-Only Attack on Gentry-Halevi Implementation of Somewhat Homomorphic Scheme
pp. 180
Nogoods in Qualitative Constraint-Based Reasoning
pp. 190
The Snow Team Problem
pp. 190
Verification-based approach for automated text and feature extraction from raster-scanned maps
pp. 193
Adapting the Fitness Function in GP for Data Mining
pp. 194
$\mathcal{SHACUN}$ : Semi-supervised Hierarchical Active Clustering Based on Ranking Constraints
pp. 208
Learning CP-net Preferences Online from User Queries
pp. 219
Design of an Optimal Frequency Reward Program in the Face of Competition
pp. 239
A Functional Program for Agents, Actions, and Deontic Specifications
pp. 264
Highways and jukeboxes: A revolution for data structures?
pp. 279
A Note on Multidimensional Dyck Languages
pp. 292
Multi-Agent Programming Contest 2013
pp. 109
Trust Management and Network Layer Security Protocols
pp. 125
Footstep Planning Based on Univector Field Method for Humanoid Robot
pp. 126
An Efficient Implementation of the Backtesting of Trading Strategies
pp. 129
A Communication Infrastructure for Emulating Large-Scale Neural Networks Models
pp. 142
Streamlining User Experience Design and Development: Roles, Tasks and Workflow of Applying Rich Application Technologies
pp. 156
“Arousal” or “Activation” Dysfunction in the Frontal Region of Children with Attention-Deficit/Hyperactivity Disorder: Evidence from an Electroencephalogram Study
pp. 157
Interactive Style of 3D Display of Buildings on Touch Screen
pp. 161
Real-Time Rendering of Light Shafts on GPU
pp. 162
Behavioral Analysis Based on Relations in Weblogs
pp. 175
Monte Carlo Analysis of the Small-Signal Response of Charge Carriers
pp. 175
Tissue Cutting Using Finite Elements and Force Feedback
pp. 179
Introducing the FPGA-Based Hardware Architecture of Systemic Computation (HAoS)
pp. 180
Grover’s Algorithm with Errors
pp. 181
Brzozowski’s Minimization Algorithm—More Robust than Expected
pp. 187
On specific features of recognizable families of languages
pp. 193
Stochastic Gradient Descent with GPGPU
pp. 198
Image Splicing Verification Based on Pixel-Based Alignment Method
pp. 203
An Application of Specification-Based Design of Self-stabilization to Tracking in Wireless Sensor Networks
pp. 203
A Dialectical Approach to Enable Decision Making in Online Trading
pp. 204
FO Model Checking on Map Graphs
pp. 204
Software system design for paper map conversion
pp. 214
Scanning with a Purpose – Supporting the Fair Information Principles in RFID Protocols
pp. 221
A Stochastic Simulation of the Decision to Retweet
pp. 242
Identifying Opinion Drivers on Social Media
pp. 244
Parallel Performance of Declarative Programming Using a PGAS Model
pp. 262
On Adaptive vs. Non-adaptive Security of Multiparty Protocols
pp. 276
Machine intelligibility and the duality principle
pp. 319
SMADAS: A Team for MAPC Considering the Organization and the Environment as First-Class Abstractions
pp. 133
Mathematical Statements (Module ST)
pp. 163
Using Cellular Automata on a Graph to Model the Exchanges of Cash and Goods
pp. 169
Noisy Interpolation of Multivariate Sparse Polynomials in Finite Fields
pp. 174
Prospects of Group-Based Communication in Mobile Ad hoc Networks
pp. 189
A rational agent as the kernel of a cooperative spoken dialogue system: Implementing a logical theory of interaction
pp. 194
Optimization Problems in Multiple Subtree Graphs
pp. 201
Demand-Driven Model Checking for Context-Free Processes
pp. 202
Experiences with a Logic-based Knowledge Discovery Support Environment
pp. 212
Object-process based segmentation and recognition of ANSI and ISO standard dimensioning texts
pp. 213
Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic Tools
pp. 218
Our Brothers’ Keepers: Secure Routing with High Performance
pp. 249
A Classification of Stereotypes for Object-Oriented Modeling Languages
pp. 255
Applying Design by Contract to Feature-Oriented Programming
pp. 265
Optimized encodings of fragments of type theory in first order logic
pp. 306
Embedded Software Design Methodology Based on Formal Models of Computation
pp. 319
Effective Entailment Checking for Separation Logic with Inductive Definitions
pp. 331
A Categorial Type Logic
pp. 345
Compressing Multiresolution Triangle Meshes
pp. 357
A Physical Approach for Stochastic Modeling of TERO-Based TRNG
pp. 145
Associative Memory in Neuronal Networks of Spiking Neurons: Architecture and Storage Analysis
pp. 161
Intensional High Performance Computing
pp. 173
Montebello: A Metapopulation Based Model of Carcinogenesis
pp. 179
New Commutative Semifields and Their Nuclei
pp. 180
Effects of Layer Partitioning in Collaborative 3D Visualizations
pp. 193
IC2D: Interactive Control and Debugging of Distribution
pp. 193
The Role of Connectivity in Supporting Context- Sensitive Applications
pp. 205
Modelling social agents: Communication as action
pp. 217
Knowledge-Base Revision Using Implications as Hypotheses
pp. 228
Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns
pp. 232
Integration of Security Policy into System Modeling
pp. 233
On the Facets of Combinatorial Polytopes
pp. 234
Argumentation-Based Hybrid Recommender System for Recommending Learning Objects
pp. 237
Managing Automatically Formed Mathematical Theories
pp. 243
Reducing Software Architecture Models Complexity: A Slicing and Abstraction Approach
pp. 244
Aggregating Conditionally Lexicographic Preferences Using Answer Set Programming Solvers
pp. 246
Safety Interfaces for Component-Based Systems
pp. 276
New Malicious Code Detection Using Variable Length n-grams
pp. 279
A survey of DBMS research issues in supporting very large tables
pp. 288
Three Years of DLMF: Web, Math and Search
pp. 313
Generic system support for deductive program development
pp. 326
The Number Field Sieve in the Medium Prime Case
pp. 328
Liveness and boundedness analysis for Petri nets with event graph modules
pp. 393
A restricted second order logic for finite structures
pp. 176
A Quantitative Diagnostic Method Based on Bayesian Networks in Traditional Chinese Medicine
pp. 177
Towards Generalized Measures Grasping CA Dynamics
pp. 198
Memetic Algorithm Based on Global-Best Harmony Search and Hill Climbing for Part of Speech Tagging
pp. 226
Using the Hermite Regression Formula to Design a Neural Architecture with Automatic Learning of the “Hidden” Activation Functions
pp. 234
Reducing Expression Size Using Rule-Based Integration
pp. 242
Detecting Removed Object from Video with Stationary Background
pp. 243
Decidable Weighted Expressions with Presburger Combinators
pp. 246
Functional parts detection in engineering drawings: Looking for the screws
pp. 251
Authoring LeActiveMath Calculus Content
pp. 261
A Safety-Related PES for Task-Oriented Real-Time Execution Without Asynchronous Interrupts
pp. 278
UML-Based Fusion Analysis
pp. 284
Wait-Free Stabilizing Dining Using Regular Registers
pp. 285
Combining Related Products into Product Lines
pp. 287
A Formal Verification Study on the Rotterdam Storm Surge Barrier
pp. 369
20 The Model-Integrated Computing Tool Suite
pp. 409
Program specialization via program slicing
pp. 414
Comparing the power of monadic NP games
pp. 173
Complex Theories (Modules CTH and DG)
pp. 203
Push Less and Pull the Current Highest Demanded Data Item to Decrease the Waiting Time in Asymmetric Communication Environments
pp. 220
Combinatorial Optimization in Pattern Assembly
pp. 229
Minimal Cost Reconfiguration of Data Placement in Storage Area Network
pp. 238
XIG: Generating from Interchange Format using Mixed Representations
pp. 259
Approximating Coupled-Task Scheduling Problems with Equal Exact Delays
pp. 260
Reconstruction of 3D solid model from three orthographic views — Top-down approach
pp. 294
Scale Effects in Web Search
pp. 300
Node Sampling Using Random Centrifugal Walks
pp. 310
Using MathML to Represent Units of Measurement for Improved Ontology Alignment
pp. 317
An algorithm for the implementation of replicated tables
pp. 357
Cryptanalysis of 2R− Schemes
pp. 368
Using Petri Nets to develop programs for PLC systems
pp. 416
Evaluation and Improvement of Generic-Emulating DPA Attacks
pp. 426
Linear constraint query languages expressive power and complexity
pp. 477
Music
pp. 77
Towards Adaptive Service Ecosystems with Agreement Technologies
pp. 179
An Algorithm for Sensory Area Coverage by Mobile Robots Operating in Complex Arenas
pp. 192
Improved Realtime Intrusion Detection System
pp. 192
Design and Implementation of a Distributed Agent Delivery System
pp. 204
Rooted Trees Searching for Cocyclic Hadamard Matrices over D 4t
pp. 207
Association-Rules Mining Based Broadcasting Approach for XML Data
pp. 212
Iterative Estimation of 3D Transformations for Object Alignment
pp. 212
Automatic Alignment of Ontology Eliminating the Probable Misalignments
pp. 214
An Adaptive Resource Reservation and Distributed Admission Control Scheme for Mobile Networks
pp. 218
Global Computing Systems
pp. 242
Competitive Multi-dimensional Dynamic Bin Packing via L-Shape Bin Packing
pp. 267
A Novel Video Inter-frame Forgery Model Detection Scheme Based on Optical Flow Consistency
pp. 272
Routing Open Shop with Unrelated Travel Times
pp. 278
Performance of Network Intrusion Detection Cluster System
pp. 279
Probabilistic Argumentation, a Small Step for Uncertainty, a Giant Step for Complexity
pp. 285
Descriptive Profiles for Sets of Alternatives in Multiple Criteria Decision Aid
pp. 329
Improved traditional mirror
pp. 366
Multi-Agent Programming Contest 2013: The Teams and the Design of Their Systems
pp. 369
Probabilistic duration automata for analyzing real-time systems
pp. 373
Modelling and control of complex logistic systems for manufacturing
pp. 446
ML pattern match compilation and partial evaluation
pp. 447
A constant-space sequential model of computation for first-order logic
pp. 88
ADI’10 - PC Co-chairs Message
pp. 174
An Evolutionary Multi-objective Neural Network Optimizer with Bias-Based Pruning Heuristic
pp. 180
XP with Acceptance-Test Driven Development: A Rewrite Project for a Resource Optimization System
pp. 187
Measuring the Similarity of Vector Fields Using Global Distributions
pp. 209
Addition of Recurrent Configurations in Chip Firing Games: Finding Minimal Recurrent Configurations with Markov Chains
pp. 217
CSDTM A Cost Sensitive Decision Tree Based Method
pp. 228
Java for Large-Scale Scientific Computations?
pp. 236
Definition einer Kahan-Arithmetik und ihre Implementierung
pp. 244
Evolutionary Programming Using Distribution-Based and Differential Mutation Operators
pp. 261
Designing and implementing a multi-agent architecture for business process management
pp. 263
Smart Matching
pp. 266
A CPS-Transform of Constructive Classical Logic
pp. 270
Concurrent Genetic Programming, Tartarus and Dancing Agents
pp. 286
How to win a dashed line detection contest
pp. 288
Constructing a Virtual Laboratory on the Internet: The ITBL Portal
pp. 330
Wait-Free Linked-Lists
pp. 330
The ForMaRE Project – Formal Mathematical Reasoning in Economics
pp. 333
On the Area-Universality of Triangulations
pp. 393
Cryptographic Protocols for Electronic Voting
pp. 189
A Customer Test Generator for Web-Based Systems
pp. 197
Virtual Door-Based Coverage Path Planning for Mobile Robot
pp. 213
Semantic-Based Affect and Metaphor Interpretation in Virtual Drama
pp. 222
Who Is Taking over Control? A Psychological Perspective in Examining Effects of Agent-Based Negotiation Support Technologies
pp. 233
Planning and Execution in a Personalised E-Learning Setting
pp. 237
Programs, computations and temporal features
pp. 240
Pattern Based Information Retrieval Approach to Discover Extremist Information on the Internet
pp. 241
Implementing Services by Partial State Machines
pp. 246
A P System Parsing Word Derivatives
pp. 247
Normative Multi-Agent Organizations
pp. 277
Emotion-based attention shift in autonomous agents
pp. 290
Face Verification Using Color Sparse Representation
pp. 295
Modelling and Analysis of Network Security - a Probabilistic Value-passing CCS Approach
pp. 301
Summary and recommendations
pp. 309
Computing Convex Coverage Sets for Multi-objective Coordination Graphs
pp. 330
UML-RT as a Candidate for Modeling Embedded Real-Time Systems in the Telecommunication Domain
pp. 361
Scientific databases: Challenges to the database community
pp. 369
Using Both Latent and Supervised Shared Topics for Multitask Learning
pp. 407
Cyber-Physical Systems Education: Explorations and Dreams
pp. 475
Multi-variate High-Order Attacks of Shuffled Tables Recomputation
pp. 217
Intrusion Alert Analysis Based on PCA and the LVQ Neural Network
pp. 223
A Framework for Experience Representation
pp. 244
A note on the automatic generation of inductive assertions
pp. 247
Object-Oriented Framework for Large Scale air Pollution Modeling
pp. 248
Computational Power of Protein Interaction Networks
pp. 293
An OpenMath Content Dictionary for Tensor Concepts
pp. 300
Rapid Image Splicing Detection Based on Relevance Vector Machine
pp. 339
Modeling Hard Real Time Systems with UML The OOHARTS Approach
pp. 354
Dynamic Pricing in Competitive Markets
pp. 371
Formal Verification of Tokeneer Behaviours Modelled in fUML Using CSP
pp. 389
The stubborn set method in practice
pp. 406
Hyper-bent Functions
pp. 110
Data Integration Systems for Scientific Applications
pp. 201
Artificial Neural Networks and Data Compression Statistics for the Discrimination of Cultured Neuronal Activity
pp. 227
Gröbner Representations of Binary Matroids
pp. 229
The First Interaction Design Pattern Library for Internet of Things User Created Applications
pp. 232
Emotional Balance as a Predictor of Impulse Control in Prisoners and Non-prisoners
pp. 241
Generating Cryptographically Suitable Non-linear Maximum Length Cellular Automata
pp. 247
Automatic Lung Nodule Detection Using Template Matching
pp. 250
Towards an All-Optical Soliton FFT in the 3NLS-Domain
pp. 256
Representing and Reasoning with Application Profiles Based on OWL and OWL/XDD
pp. 257
Performance Driven Routing in Distributed Environment
pp. 258
A Monitoring Infrastructure for the Digital on-demand Computing Organism (DodOrg)
pp. 266
A Generic Flash-Based Animation Engine for ProB
pp. 281
Designing Interaction Styles for a Mobile Use Context
pp. 289
Visualising the Boolean Algebra \(\mathbb {B}_{4}\) in 3D
pp. 311
A Proof-Theoretic Approach to Deciding Subsumption and Computing Least Common Subsumer in $\cal EL$ w.r.t. Hybrid TBoxes
pp. 325
Facility Location in Unfair Competition
pp. 361
How to Fit a Tree in a Box
pp. 209
Liquid Computing in a Simplified Model of Cortical Layer IV: Learning to Balance a Ball
pp. 212
A Prototype of a Chat System Using Message Driven and Interactive Actions Character
pp. 230
Robotic Implementation of Realistic Reaching Motion Using a Sliding Mode/Operational Space Controller
pp. 231
A Generalization of the Zig-Zag Graph Product by Means of the Sandwich Product
pp. 234
Color Image Watermarking Algorithm Using BPN Neural Networks
pp. 240
Time Scales of Sensorimotor Contingencies
pp. 251
Chaotic Cellular Automata with Cryptographic Application
pp. 252
Quantum Random Active Element Machine
pp. 254
MIGP: Medical Image Grid Platform Based on HL7 Grid Middleware
pp. 263
History Trees as Descriptors of Macromolecular Structures
pp. 284
In vitro Measurement of Mechanical Properties of Liver Tissue under Compression and Elongation Using a New Test Piece Holding Method with Surgical Glue
pp. 357
The Application of an Object-Oriented Method in Information System Security Evaluation
pp. 404
Trace-Driven Verification of Multithreaded Programs
pp. 237
Polytopal Graph Complexity, Matrix Permanents, and Embedding
pp. 250
Analysis of Birefringent Characteristics of Photonic Crystal Fibers Filled Magnetic Fluid
pp. 255
Simulating Metabolic Processes Using an Architecture Based on Networks of Bio-inspired Processors
pp. 261
d-Monomial Tests of Nonlinear Cellular Automata for Cryptographic Design
pp. 264
Theoretical and Methodological Considerations in the Comparison of Performance and Physiological Measures of Mental Workload
pp. 274
BRAMA: A New Graphic Animation Tool for B Models
pp. 278
Visualizing Defeasible Logic Rules for the Semantic Web
pp. 321
An Algorithm for Recruitment of Agents in Agency Design
pp. 331
Integrating Multiple Sources to Answer Questions in Algebraic Topology
pp. 334
On L k(Q) Types and Boundedness of IFP(Q) on Finite Structures
pp. 350
A Leader-Follower Hub Location Problem Under Fixed Markups
pp. 355
Listing All Fixed-Length Simple Cycles in Sparse Graphs in Optimal Time
pp. 363
Trust, Negotiations and Virtual Currencies for a Sharing Economy
pp. 363
Comparative Preferences Induction Methods for Conversational Recommenders
pp. 368
Towards a Cyber Security Reporting System – A Quality Improvement Process
pp. 387
The Complexity of Drawing a Graph in a Polygonal Region
pp. 453
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
pp. 504
Augmenting State Models with Data Flow
pp. 212
Pictures Can’t Lie under Oath
pp. 239
An Upper Bound on Blocking Probability of Vertical Stacked Optical Benes Networks
pp. 239
Bounds on the Number of Users for Random 2-Secure Codes
pp. 257
On String Reading Stateless Multicounter 5′ → 3′ Watson-Crick Automata
pp. 269
Results of a Tailored Communication Framework Through E-Health
pp. 290
A Fast Technique for Assigning Wavelengths in WDM All-Optical Networks (AONs)
pp. 344
Robust Median Filtering Detection Based on Filtered Residual
pp. 399
Correct Realizations of Interface Constraints with OCL
pp. 425
Reduction of Test Suites Using Mutation
pp. 436
Reasoning about Safety and Progress Using Contracts
pp. 524
On the Road to Conviction: An Email Exchange with Edward Lee
pp. 139
DATAVIEW’10 - PC Co-chairs Message
pp. 231
A Novel Bifurcation-Based Synthesis of Asynchronous Cellular Automaton Based Neuron
pp. 252
It’s Elementary, My Dear Watson: Time-Optimal Sorting Algorithms on a Completely Overlapping Network
pp. 268
Global Stability of a Class of High-Order Recurrent Neural Networks with Multiple Delays
pp. 293
Empirical Evaluation of a Visual Interface for Exploring Message Boards
pp. 300
Design of 1-FT Communication Network under Budget Constraint
pp. 359
Ant Colony Optimization for the Ship Berthing Problem
pp. 360
Broadcast in a MANET Based on the Beneficial Area
pp. 390
Problem Frames and Architectures for Security Problems
pp. 418
A constraint-oriented Service Creation Environment
pp. 241
The Interactive Feature Selection Method Development for an ANN Based Emotion Recognition System
pp. 272
An Improved Method for Real-Time 3D Construction of DTM
pp. 277
An axiomatic approach to information structures
pp. 285
JML2B: Checking JML Specifications with B Machines
pp. 294
Knowledge Integration in Information Systems Education Through an (Inter)active Platform of Analysis and Modelling Case Studies
pp. 312
Approximating the Range Sum of a Graph on CREW PRAM
pp. 356
On Plan Adaptation through Planning Graph Analysis
pp. 363
Verifiable Proxy Re-encryption from Indistinguishability Obfuscation
pp. 368
An Optimal Method for Coordinated En-route Web Object Caching
pp. 369
swMATH – A New Information Service for Mathematical Software
pp. 395
Determinism and Computational Power of Real Measurement-Based Quantum Computation
pp. 399
Thompson Sampling for Bayesian Bandits with Resets
pp. 430
Formalising UML State Machines for Model Checking
pp. 282
Depth Estimation Using Variant of Depth of Field by Horizontal Planes of Sharp Focus
pp. 288
An Improved Single Neuron Adaptive PID Controller Based on Levenberg-Marquardt Algorithm
pp. 314
Wearable Information Appliances for the Emergency Services: HotHelmet
pp. 335
Improved Community Interaction Through Context Based Citation Analysis
pp. 374
Software for Evaluating Relevance of Steps in Algebraic Transformations
pp. 376
An Improved Algorithm of Multicast Topology Inference from End-to-End Measurements
pp. 404
An Approach to Fractional Programming via D.C. Constraints Problem: Local Search
pp. 409
Busy Beaver Scores and Alphabet Size
pp. 471
Fine Slicing
pp. 529
Encryption Modes with Almost Free Message Integrity
pp. 160
ProcessGene View: An Integrated Visualization of Business Process Models
pp. 285
A RBF Network for Chinese Text Classification Based on Concept Feature Extraction
pp. 292
A Study on Stereo and Motion Data Accuracy for a Moving Platform
pp. 312
Cellular Automata Applied in Remote Sensing to Implement Contextual Pseudo-fuzzy Classification
pp. 323
Facial Expression Transformations for Expression-Invariant Face Recognition
pp. 329
Ontology Driven Visualisation of Maps with SVG – Technical Aspects
pp. 333
Quick-Reference Table to the OMDoc Elements
pp. 340
Towards Patient-Specific Anatomical Model Generation for Finite Element-Based Surgical Simulation
pp. 348
Mining Informative Words from the Tweets for Detecting the Resources During Disaster
pp. 375
An Efficient Location Management by Optimal Location Area Partitioning in PCS Networks
pp. 379
The DeLiVerMATH Project
pp. 385
Chordal Topologies for Interconnection Networks
pp. 418
Automatic Kolmogorov Complexity and Normality Revisited
pp. 425
Possible Winner Problems on Partial Tournaments: A Parameterized Study
pp. 457
UML Behavior: Inheritance and Implementation in Current Object-Oriented Languages
pp. 298
A Fast and Scalable Conflict Detection Algorithm for Packet Classifiers
pp. 304
Stochastic Resonance in Excitable Neuronal System with Phase-Noise
pp. 316
A Mental Workload Predicator Model for the Design of Pre Alarm Systems
pp. 322
Impact of Coupling of Distributed Denial of Service Attack with Routing on Throughput of Packet Switching Network
pp. 365
User Care Preference-Based Semantic Service Discovery in a Ubiquitous Environment
pp. 393
Distributed Location of Shared Resources and Its Application to the Load Sharing Problem in Heterogeneous Distributed Systems
pp. 430
Multiple Cuts in Separating Plane Algorithms
pp. 501
A Domain-Specific Language for Scripting Refactorings in Erlang
pp. 570
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions
pp. 272
Spike Transmission on Diverging/Converging Neural Network and Its Implementation on a Multilevel Modeling Platform
pp. 311
Determination of Gender and Age Based on Pattern of Human Motion Using AdaBoost Algorithms
pp. 319
User-Oriented Accessibility Patterns for Smart Environments
pp. 334
A Cellular Automata-Based Modular Lighting System
pp. 337
Computer Simulation of the Air Flow and the Distribution of Combustion Generated Pollutants around Buildings
pp. 343
A Semantics-Based Protocol for Business Process Transactions
pp. 379
A Verification Technique Based on Syntactic Action Refinement in a TCSP-like Process Algebra and the Hennessy-Milner-Logic
pp. 411
Evidence Algorithm and System for Automated Deduction: A Retrospective View
pp. 320
A Heuristic Routing Algorithm for Degree-Constrained Minimum Overall Latency Application Layer Multicast
pp. 321
A Comparative Study of Two Reference Estimation Methods in EEG Recording
pp. 331
Visual Hierarchy and Viewing Behavior: An Eye Tracking Study
pp. 344
On Multigrid Methods for the Compressible Navier-Stokes Equations
pp. 344
A Network-Based Indexing Method for Trajectories of Moving Objects
pp. 351
Fuzzy View-Based Semantic Search
pp. 353
Learning Cooperative TSK-0 Fuzzy Rules Using Fast Local Search Algorithms
pp. 509
Orthogonal and Smooth Orthogonal Layouts of 1-Planar Graphs with Low Edge Complexity
pp. 307
Extreme Makeover: Bending the Rules to Reduce Risk Rewriting Complex Systems
pp. 356
Efficient Circuit Construction in Brownian Cellular Automata Based on a New Building-Block for Delay-Insensitive Circuits
pp. 363
Weighted Tardiness Minimization in Job Shops with Setup Times by Hybrid Genetic Algorithm
pp. 449
Region-in-Region Incrementing Visual Cryptography Scheme
pp. 565
Making the Right Cut in Model Checking Data-Intensive Timed Systems
pp. 211
Application-Services Integration among Multi-clouds for Small and Middle Scale Enterprises
pp. 351
Individual Differences in Work Load While Doing Multitasking with a Computer
pp. 365
A Cellular Automaton Controlled Shading for a Building Facade
pp. 373
Interval-Valued Fuzzy Sets for Color Image Super-Resolution
pp. 401
Ontology-Based Competence Management for Team Configuration
pp. 431
Parallel Matrix Multiplication and LU Factorization on Ethernet-Based Clusters
pp. 445
Prior Classification of Stego Containers as a New Approach for Enhancing Steganalyzers Accuracy
pp. 341
Content-Based 3D Graphic Information Retrieval
pp. 345
A Flexible Implementation Method of Distributed ANN
pp. 359
Finding a Relationship between Internet Anxiety and Human Behavior
pp. 469
A p2p Framework for Interacting with Learning Objects
pp. 485
On the Security of Multi-secret Visual Cryptography Scheme with Ring Shares
pp. 550
Black and White Diamonds
pp. 313
Self-calibrating Marker Tracking in 3D with Event-Based Vision Sensors
pp. 351
Prediction of Thermal Comfort Index Using Type-2 Fuzzy Neural Network
pp. 368
Human Behavioral Simulation Using Affordance-Based Agent Model
pp. 371
A New Data Fusion Model of Intrusion Detection-IDSFP
pp. 450
Performance Study of a Whole Genome Comparison Tool on a Hyper-Threading Multiprocessor
pp. 566
Interconnecting Objects via Contracts
pp. 325
Extreme Programming: A More Musical Approach to Software Development?
pp. 343
An Evaluation of WebTwig — A Site Outliner for Handheld Web Access
pp. 387
Dynamic Mesh Schemes for Fluid-Structure Interaction
pp. 403
A Cluster Based Pseudo Feedback Technique Which Exploits Good and Bad Clusters
pp. 449
On Some SAT-Variants over Linear Formulas
pp. 478
A De-anonymization Attack on Geo-Located Data Considering Spatio-temporal Influences
pp. 507
A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CA
pp. 579
Algorithms and Bounds for Drawing Directed Graphs
pp. 346
Human Factors of Multi-modal Ubiquitous Computing
pp. 413
SAHN with SEP/COP and SPADE, to Build a General Web Navigation Adaptation System Using Server Log Information
pp. 468
Large Scale Structures of Turbulent Shear Flow via DNS
pp. 257
ISDE’10 - PC Co-chairs Message
pp. 349
URCP: Experimental Support for Multi-modal Interfaces
pp. 407
2L-MuRR: A Compact Register Renaming Scheme for SMT Processors
pp. 409
Coxeter Groups and Asynchronous Cellular Automata
pp. 409
A Lagrange Multipliers/Fictitious Domain Approach for Particulate Flow
pp. 423
A New Criteria for Selecting Neighborhood in Memory-Based Recommender Systems
pp. 444
Exploring the Flexible Workflow Technology to Automate Service Composition
pp. 473
Unambiguous Erasing Morphisms in Free Monoids
pp. 476
Molecular Dynamics Simulation of Prion Protein by Large Scale Cluster Computing
pp. 609
Graph Drawing Contest Report
pp. 662
A Pattern System to Support Refining Informal Ideas into Formal Expressions
pp. 459
Mediation Enabled Semantic Web Services Usage
pp. 563
Location, Pricing and the Problem of Apollonius
pp. 269
Experimental Evaluation of ’On-Site Customer’ XP Practice on Quality of Software and Team Effectiveness
pp. 337
EnterpriseXP: Can the Combination of XP and DSDM Improve the Appeal of XP to the Business Community?
pp. 411
Multi-angle View, Illumination and Cosmetic Facial Image Database (MaVIC) and Quantitative Analysis of Facial Appearance
pp. 425
Wave Evolution of Heated Falling Films. Numerical Analysis Using Finite-Difference Method
pp. 474
Toward Automatic Discovery and Invocation of Information-Providing Web Services
pp. 497
Asynchronous Deterministic Rendezvous on the Line
pp. 694
Alternating Interval Based Temporal Logics
pp. 279
Early Validation of Requirements in Distributed Product Development – An Industrial Case Study
pp. 421
Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram
pp. 433
Picard-Uzawa Schemes: Errors, Convergence and Stopping Criterion
pp. 385
One — one degrees of Turing machines decision problems
pp. 432
”How Do I Line Up?”: Reducing Mental Transformations to Improve Performance
pp. 521
Group Input Machine
pp. 297
Revisiting and Improving a Result on Integrity Preservation by Concurrent Transactions
pp. 347
Extreme Programming at Work
pp. 430
Neural Networks, Fuzzy Inference Systems and Adaptive-Neuro Fuzzy Inference Systems for Financial Decision Making
pp. 443
A Middleware Architecture for Designing TV-Based Adapted Applications for the Elderly
pp. 501
Web Services Analysis: Making Use of Web Service Composition and Annotation
pp. 383
New Classifier Based on Fuzzy Level Set Subgrouping
pp. 516
WWW: WSMO, WSML, and WSMX in a Nutshell
pp. 540
OpenMP for Adaptive Master-Slave Message Passing Applications
pp. 404
On memory requirements of Strassen's algorithms
pp. 450
Pretests for Genetic-Programming Evolved Trading Programs: “zero-intelligence” Strategies and Lottery Trading
pp. 461
Developing a User Recommendation Engine on Twitter Using Estimated Latent Topics
pp. 494
Query Expansion Methods and Performance Evaluation for Reusing Linking Open Data of the European Public Procurement Notices
pp. 552
OpenGR: A Directive-Based Grid Programming Environment
pp. 530
A Composition Oriented and Graph-Based Service Search Method
pp. 570
A Machine Checked Soundness Proof for an Intermediate Verification Language
pp. 329
SpotAFriendNow: Social Interaction through Location-Based Social Networks
pp. 377
A Universal, Location-Aware Hoarding Mechanism
pp. 416
Generating control mechanisms by restrictions
pp. 480
A Reference Model for Adaptive Visualization Systems
pp. 419
Visual Categorization Based on Learning Contextual Probabilistic Latent Component Tree
pp. 489
On Mixtures of Linear SVMs for Nonlinear Classification
pp. 496
Phase Coexistence in Congested States of Pedestrian Dynamics
pp. 528
Viewpoint Selection for Angiographic Volume
pp. 349
Towards Optimal Multi-item Shopping Basket Management: Heuristic Approach
pp. 366
Building Standard ERP Software Packages Using Self-developed Agile Methodologies
pp. 430
On some properties of cyclic automata and their extensions
pp. 488
Application of ICA in On-Line Verification of the Phase Difference of the Current Sensor
pp. 506
Stochastic Transition Model for Discrete Agent Movements
pp. 386
Ad-hoc Network Routing for Centralized Information Sharing Systems
pp. 504
The Development of a Cognitive Work Analysis Tool
pp. 530
MFLWQ: A Fair and Adaptive Queue Management Algorithm for Scavenger Service
pp. 548
Polyhedrization of Discrete Convex Volumes
pp. 512
Human Activity Modeling for Systems Design: A Trans-Disciplinary and Empirical Approach
pp. 517
Synchronization and Fluctuation of Rhythm in Musical Cooperative Performance
pp. 520
Combining Online Classification Approaches for Changing Environments
pp. 523
Excluded Volume Effect in a Pedestrian Queue
pp. 558
Automatic Camera Calibration and Scene Reconstruction with Scale-Invariant Features
pp. 588
Design of Semantically Interoperable Adverse Event Reporting Framework
pp. 633
Polylog Space Compression Is Incomparable with Lempel-Ziv and Pushdown Compression
pp. 530
Optimal Kernel in a Class of Kernels with an Invariant Metric
pp. 532
Simulation on Vehicle Emission by the Brake-Light Cellular Automata Model
pp. 569
Surface Fitting to Curves with Energy Control
pp. 645
A New Family of Regular Operators Fitting with the Position Automaton Computation
pp. 378
Semantic Similarity and Selection of Resources Published According to Linked Data Best Practice
pp. 526
Manufacturing Yield Improvement by Clustering
pp. 531
“Investigating the Way National Grid Controllers Visualize the Electricity Transmission Grid Using a Neuro-Linguistic Programming (NLP) Approach”
pp. 539
Shape –Based Human Actions Recognition in Videos
pp. 564
A Hybrid Neural Network Approach to the Classification of Novel Attacks for Intrusion Detection
pp. 656
A Formal Model of Business Application Integration from Web Services (Position Paper)
pp. 547
Dynamic Queries with Relevance Feedback for Content Based Image Retrieval
pp. 555
Face Sketch Synthesis via Multivariate Output Regression
pp. 557
Cellular Automata for a Cyclic Bus
pp. 599
Improved Face Recognition Using Extended Modular Principal Component Analysis
pp. 482
A Dynamic Binding Mechanism for Retrieving and Unifying Complex Predicate-Logic Knowledge
pp. 553
Minimizing Makespan on Identical Parallel Machines Using Neural Networks
pp. 562
Experimental Studies of Visual Models in Automatic Image Annotation
pp. 572
Soft Feature Selection by Using a Histogram-Based Classifier
pp. 596
Grid Accounting Information Service with End-to-End User Identity
pp. 414
Integration of Domain and Social Ontologies in a CMS Based Collaborative Platform
pp. 482
Context-free programmed grammars and ETOL systems
pp. 487
Testing Online Navigation Recommendations in a Web Site
pp. 618
Characterization of the Closest Discrete Approximation of a Line in the 3-Dimensional Space
pp. 639
A Comprehensive Study of Inappropriate Hierarchy in WordNet
pp. 424
ORM’10 - PC Co-chairs Message
pp. 497
An Overview of Agent Coordination and Cooperation
pp. 580
Image Skeletonization Based on Curve Skeleton Extraction
pp. 620
An Accounting Services Model for ShanghaiGrid
pp. 414
Filleting XP for Educational Purposes
pp. 504
Innovations in Intelligent Agents and Web
pp. 588
Appearance Similarity Index for Medicinal Ampoule Labels
pp. 602
An Efficient Algorithm for Optimal Multilevel Thresholding of Irregularly Sampled Histograms
pp. 638
A Novel 3D Statistical Shape Model for Segmentation of Medical Images
pp. 436
Real-Time Integration of Geo-data in ORM
pp. 503
Computational processes generated by programs with /recursive/ procedures and block structures
pp. 515
A New Neural Data Analysis Approach Using Ensemble Neural Network Rule Extraction
pp. 598
A Novel Parallel Clustering Algorithm Based on Artificial Immune Network Using nVidia CUDA Framework
pp. 596
Neural-Network-Based Sliding Mode Control for Missile Electro-Hydraulic Servo Mechanism
pp. 682
A Semantic Reputation Mechanism in P2P Semantic Web
pp. 457
ORM and MDM/MMS: Integration in an Enterprise Level Conceptual Data Model
pp. 517
Degrees of parallelism in computations
pp. 523
Bayesian Decision Tree Averaging for the Probabilistic Interpretation of Solar Flare Occurrences
pp. 531
Learning Sequence Neighbourhood Metrics
pp. 609
Cognitive and Emotional Human Models Within a Multi-agent Framework
pp. 613
Properties of Cellular Automaton Model for On-ramp System
pp. 618
Improving the Usability of Hierarchical Representations for Interactively Labeling Large Image Data Sets
pp. 464
A Fact-Based Meta Model for Standardization Documents
pp. 524
On adaptability of a system of programs
pp. 533
An Efficient 3-D Positioning Method from Satellite Synthetic Aperture Radar Images
pp. 539
Learning Features and Predictive Transformation Encoding Based on a Horizontal Product Model
pp. 628
The Similarity Index of Character Shape of Medicine Names Based on Character Shape Similarity (II)
pp. 474
A Proposal for Folding in ORM Diagrams
pp. 637
ColoriT: Color Based Image Code Application to Aid in Memory Restoration of Offline Photo Artifacts
pp. 711
A Knowledge- and Workflow-Based System for Supporting Order Fulfillment Process in the Build-to-Order Supply Chains
pp. 484
A Basic Characterization of Relation Migration
pp. 561
A New Fault Detection and Diagnosis Method for Oil Pipeline Based on Rough Set and Neural Network
pp. 633
Clusters in the Helbing’s Improved Model
pp. 664
Supervised Principal Geodesic Analysis on Facial Surface Normals for Gender Classification
pp. 725
A Distributed IR Model Based on Semantic Web
pp. 563
The Spherical Hidden Markov Self Organizing Map for Learning Time Series Data
pp. 712
Unsupervised Clustering of Shapes
pp. 732
Experimental Study of Semantic Contents Mining on Intra-university Enterprise Contents Management System for Knowledge Sharing
pp. 504
Mapping ORM to Datalog: An Overview
pp. 551
The influence of the data presentation on the computational power of machines
pp. 564
Conversion Scheme for Reducing Security Vulnerability in IPv4/ IPv6 Networks
pp. 658
Analyzing Constraints to Support Computational Modeling of Air Traffic Controllers
pp. 660
A Global Optimal Algorithm for Camera Calibration with One-Dimensional Objects
pp. 572
Improved Location Management for Reducing Traffic Cost in 3G Mobile Networks
pp. 650
Molecular Implementations of Cellular Automata
pp. 664
H ∞ Neural Networks Control for Uncertain Nonlinear Switched Impulsive Systems
pp. 725
A Personalized and Scalable Service Broker for the Global Computing Environment
pp. 674
Reliable Robust Controller Design for Nonlinear State-Delayed Systems Based on Neural Networks
pp. 677
High-Quality Fast Image Upsampling Algorithm Based on CUDA
pp. 678
Experimental Thermal/Moisture Mapping of Industrial Safety Helmets
pp. 737
Distributed Network Computing on Transient Stability Analysis and Control
pp. 762
Networked Interactive Photo Annotation and Reminiscence Content Delivery
pp. 596
On-Line Processing of Grammatical Structure Using Reservoir Computing
pp. 684
Neural Network Applications in Advanced Aircraft Flight Control System, a Hybrid System, a Flight Test Demonstration
pp. 687
Common Work Space or How to Support Cooperative Activities Between Human Operators and Machine: Application to Air Traffic Control
pp. 714
Scale-Space Kernels for Additive Modeling
pp. 439
Extreme Advertised Bidding
pp. 588
The calculus of facts
pp. 724
Learning Curves for the Analysis of Multiple Instance Classifiers
pp. 757
A Key Management Scheme for Cross-Layering Designs in Wireless Sensor Networks
pp. 761
3D Surface Reconstruction and Registration for Image Guided Medialization Laryngoplasty
pp. 606
A RDF-Based Framework for User Profile Creation and Management
pp. 612
Infinite Sparse Threshold Unit Networks
pp. 602
A complete axiomatic characterization of algorithmic properties of block-structured programs with procedures
pp. 620
Learning Two-Layer Contractive Encodings
pp. 629
Effects of Architecture Choices on Sparse Coding in Speech Recognition
pp. 755
A Novel Coding Scheme for Indexing Fingerprint Patterns
pp. 803
Graph-Based Multi-resolution Temporal-Based Face Reconstruction
pp. 804
Effective Resource Allocation in a JXTA-Based Grid Computing Platform JXTPIA
pp. 738
Synthesis of Desired Binary Cellular Automata Through the Genetic Algorithm
pp. 741
Evaluation of the Effects of Visual Field on Road Sign Recognition
pp. 775
A New Solution Scheme of Unsupervised Locality Preserving Projection Method for the SSS Problem
pp. 827
A Workflow Management Mechanism for Peer-to-Peer Computing Platforms
pp. 661
Dynamic Stopping Improves the Speed and Accuracy of a P300 Speller
pp. 606
Reflecting on a Process to Automatically Evaluate Ontological Material Generated Automatically
pp. 677
Recognizing Human Activities Using a Layered Markov Architecture
pp. 811
Use of Structured Pattern Representations for Combining Classifiers
pp. 850
An Efficient Photon Mapping Algorithm for Rendering Light-Emitting Fluids
pp. 787
Classification of Blink Waveforms Toward the Assessment of Driver’s Arousal Levels - An EOG Approach and the Correlation with Physiological Measures
pp. 684
Human Hand Detection Using Evolutionary Computation for Gestures Recognition of a Partner Robot
pp. 871
Adaptive Background Generation for Video Object Segmentation
pp. 635
Knowledge Representation with Autonomic Ontologies
pp. 806
Culture and Communication in the Philippine Aviation Industry
pp. 842
A Low Cost Incremental Biometric Fusion Strategy for a Handheld Device
pp. 699
Emergence of Flocking Behavior Based on Reinforcement Learning
pp. 890
A New Method of Network Data Link Troubleshooting
pp. 665
Automatic Support for Product Based Workflow Design: Generation of Process Models from a Product Data Model
pp. 726
A Computational Model of Motor Areas Based on Bayesian Networks and Most Probable Explanations
pp. 675
OTMA’10 - PC Co-chairs Message
pp. 725
Human Support Network System Using Friendly Robot
pp. 836
An Improved Primal-Dual Genetic Algorithm for Optimization in Dynamic Environments
pp. 682
On the Social Dynamics of Ontological Commitments
pp. 860
A Research of Speech Signal of Fire Information Display Interface
pp. 955
Cross-Layer Flow Control Based on Path Capacity Prediction for Multi-hop Ad Hoc Network
pp. 884
EFuNN Ensembles Construction Using a Clustering Method and a Coevolutionary Multi-objective Genetic Algorithm
pp. 937
Classification and Automatic Annotation Extension of Images Using Bayesian Network
pp. 711
Automatic Exposure Control in Digital Mammography: Contrast-to-Noise Ratio Versus Average Glandular Dose
pp. 947
Selection of Suitable Set of Decision Rules Using Choquet Integral
pp. 812
Predicting Time Series Using Incremental Langrangian Support Vector Regression
pp. 900
A Multi-objective Evolutionary Algorithm for Multi-UAV Cooperative Reconnaissance Problem
pp. 789
Lessons from the Application of Domain-Independent Data Mining System for Discovering Web User Access Patterns
pp. 967
A Learning Scheme for Recognizing Sub-classes from Model Trained on Aggregate Classes
pp. 920
A Novel Constrained Genetic Algorithm for the Optimization of Active Bar Placement and Feedback Gains in Intelligent Truss Structures
pp. 928
A Double-Stage Genetic Optimization Algorithm for Portfolio Selection
pp. 813
Construction of School Temperature Measurement System with Sensor Network
pp. 1055
Next Generation Networks Architecture and Layered End-to-End QoS Control
pp. 954
The Hybrid Genetic Algorithm for Blind Signal Separation
pp. 1065
FairOM: Enforcing Proportional Contributions Among Peers in Internet-Scale Distributed Systems
pp. 1077
An Efficient QoS Framework with Distributed Adaptive Resource Management in IPv6 Networks
pp. 843
IdeaCrepe: Creativity Support Tool with History Layers
pp. 983
Extraction of Fuzzy Features for Detecting Brain Activation from Functional MR Time-Series
pp. 1038
A Fuzzy LMS Neural Network Method for Evaluation of Importance of Indices in MADM
pp. 1079
Design Methodology of Optimized IG_gHSOFPNN and Its Application to pH Neutralization Process
pp. 956
Spatial Equilibrium Model on Regional Analysis for the Trade Liberalization of Fluid Milk in Taiwan
pp. 972
Structural Learning of Neural Networks for Forecasting Stock Prices
pp. 1141
Synchronization Via Multiplex Spike-Trains in Digital Pulse Coupled Networks
pp. 1035
A Design of Hybrid Mobile Multimedia Game Content
pp. 1189
Neurocomputing for Minimizing Energy Consumption of Real-Time Operating System in the System-on-a-Chip
pp. 1168
Distributed Face Recognition: A Multiagent Approach
pp. 1256
The Performance of LVQ Based Automatic Relevance Determination Applied to Spontaneous Biosignals
pp. 1264
Alertness Assessment Using Data Fusion and Discrimination Ability of LVQ-Networks
pp. E1
Comparison of Squall Line Positioning Methods Using Radar Data
Similar content
2,509
Shape asymmetry: a morphological indicator for automatic detection of galaxies in the post-coalescence merger stages
Authors:
,
,
…
A method for automatic detection and classification of stroke from brain CT images.
Authors:
Jayanthi Sivaswamy
,
Saurabh Sharma
,
L T Kishore
…
Automatization and on-line intelligent control of refrigeration systems using artificial neural networks
Authors:
T Borja
See all similar
Cited by
32
Monitoring Metric First-Order Temporal Properties
Authors:
David Basin
,
Felix Klaedtke
,
Samuel Muller
…
Computable fixpoints in well-structured symbolic model checking
Authors:
P. Schnoebelen
,
N Bertrand
Automatic Presentations for Finitely Generated Groups
Authors:
Graham P. Oliver
,
Richard M Thomas
See all cited by