Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
44
views
40
references
Top references
cited by
3
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,045
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Is Open Access
Security Protocols : 7th International Workshop, Cambridge, UK, April 19-21, 1999. Proceedings
Shepherding Hordes of Markov Chains
other
Author(s):
Milan Češka
,
Nils Jansen
,
Sebastian Junges
,
Joost-Pieter Katoen
Publication date
(Online):
April 03 2019
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Download
XML
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
40
Record
: found
Abstract
: not found
Article
: not found
A logic for reasoning about time and reliability
Hans-Christen Hansson
,
Bengt-Harald Jonsson
(1994)
0
comments
Cited
210
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Z3: An Efficient SMT Solver
Leonardo de Moura
,
Nikolaj Bjørner
(2008)
0
comments
Cited
132
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
PRISM 4.0: Verification of Probabilistic Real-Time Systems
Marta Kwiatkowska
,
Gethin Norman
,
David Parker
(2011)
0
comments
Cited
59
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2019
Publication date (Online):
April 03 2019
Pages
: 172-190
DOI:
10.1007/978-3-030-17465-1_10
SO-VID:
6d5963bd-e96c-41e0-aae8-386dc9f56504
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
XP after Enron - Can It Survive?
pp. 1
Generalized default logic: minimal knowledge, autoepistemic and default reasoning reconciled
pp. 1
Industry Standards for the Analytics Era: TPC Roadmap
pp. 1
Introduction
pp. 1
Temporal Patterns in Artificial Reaction Networks
pp. 1
Prostate Cancer MR Imaging
pp. 1
Chapter I: Introduction
pp. 1
Producing Compliant Interactions: Conformance, Coverage, and Interoperability
pp. 1
Rigorous System Design: The BIP Approach
pp. 1
Verification of Behaviour Networks Using Finite-State Automata
pp. 1
A Library for Declarative Resolution-Independent 2D Graphics
pp. 1
Boolean Functions Fitness Spaces
pp. 1
Basic techniques and symbol-level recognition — An overview
pp. 1
Proving Termination with (Boolean) Satisfaction
pp. 1
Distributed Process Discovery and Conformance Checking
pp. 1
Motivations, background, and basic definitions
pp. 1
Techniques for the Identification of Semantically-Equivalent Online Identities
pp. 1
Functional parsers
pp. 1
Biomodel Engineering – From Structure to Behavior
pp. 1
Information Transfer among Coupled Random Boolean Networks
pp. 1
Intervall — Mathematik Zum Karlsruher Symposium 1975
pp. 1
Algebraic Specification and Program Development by Stepwise Refinement
pp. 1
The Semantic Web: A Network of Understanding
pp. 1
SAT-Based Combinational and Sequential Dependency Computation
pp. 1
The Web Operating System — WOS
pp. 1
Three Syntactic Theories for Combinatory Graph Reduction
pp. 1
Introduction
pp. 1
Implicit coercions in type systems
pp. 1
E-Voting and the Need for Rigourous Software Engineering – The Past, Present and Future
pp. 1
Using high-level petri nets in the field of intelligent networks
pp. 1
Application of Classification Algorithms on IDDM Rat Data
pp. 1
Early fault detection tools
pp. 1
Bandwidth Management in Community Networks
pp. 1
Getting started: Basic definitions and constructions
pp. 1
Functional Link Artificial Neural Network for Multi-label Classification
pp. 3
Designing Human Computer Interfaces for Command and Control Environments
pp. 3
Image-Based Graph Visualization: Advances and Challenges
pp. 3
Property Preserving Encryption in NoSQL Wide Column Stores
pp. 11
Would a Virtual Butler Do a Good Job for Old People? Psychological Considerations about Benefits and Risks of Technological Assistance
pp. 12
Security for Cyber-Physical Systems
pp. 13
The Importance of Single-Source Engineering of Emergency and Process Shutdown Systems
pp. 13
A 3D Simulator of Multiple Legged Robots Based on USARSim
pp. 13
Emerging Application Domains and the Computing Fabric
pp. 14
Kleene algebra with tests and commutativity conditions
pp. 14
On Residuation
pp. 15
Identification of a 2-Additive Bi-Capacity by Using Mathematical Programming
pp. 15
Can Multi-Agents Wake Us from IC Design Productivity Nightmare?
pp. 16
Urban Computing and Smart Cities: Opportunities and Challenges in Modelling Large-Scale Aggregated Human Behavior
pp. 16
Don’t Be Greedy: Leveraging Community Structure to Find High Quality Seed Sets for Influence Maximization
pp. 16
A two-level approach towards lean proof-checking
pp. 17
Practical aspects of specialization of Algol-like programs
pp. 17
2 Model-Based Integration
pp. 18
Asymptotic behavior of stochastic automata
pp. 19
Optimising Problem Formulation for Cylindrical Algebraic Decomposition
pp. 2
A Sharp PageRank Algorithm with Applications to Edge Ranking and Graph Sparsification
pp. 2
Using B Machines for Model-Based Testing of Smartcard Software
pp. 2
Using Speculative Multithreading for General-Purpose Applications
pp. 2
Keynote: Trustworthy Services and the Biological Analogy
pp. 2
Neurodynamic Optimization and Its Applications in Robotics
pp. 21
Analysis of Air Traffic Track Data with the AutoBayes Synthesis System
pp. 21
From Public Plans to Global Solutions in Multiagent Planning
pp. 22
Towards a JSON-Based Fast Policy Evaluation Framework
pp. 22
A Data Sharing Agreement Framework
pp. 22
On the Power of the Randomized Iterate
pp. 23
Modeling Snapshot of Composite WS Execution by Colored Petri Nets
pp. 23
Clustered Planarity = Flat Clustered Planarity
pp. 3
Can Component/Service-Based Systems Be Proved Correct?
pp. 31
Mollified Zone Diagrams and Their Computation
pp. 4
Chapter II: Syntax, semantics and proof theory for equational logic
pp. 42
Effective numberings, completions, and control structures
pp. 5
Adapting the System to Users Based on Implicit Data: Ethical Risks and Possible Solutions
pp. 5
Abstract interpretation
pp. 6
Composing Security Properties
pp. 9
Research Themes in the Case-Based Reasoning in Health Sciences Core Literature
pp. 15
The Game of the Name in Cryptographic Tables
pp. 16
Concept Sharing Through Interaction: The Effect of Information Visualization for Career Design
pp. 18
Chapter III: Subtree replacement systems
pp. 19
Semantic Views of Homogeneous Unstructured Data
pp. 19
Einige Anwendungen der Kreisscheibenarithmetik in der Kettenbruchtheorie
pp. 19
A Novel Mapping Scheme for Steganalysis
pp. 20
Design, Implementation and Evaluations of a Direction Based Service System for Both Indoor and Outdoor
pp. 21
An Empirical Analysis of Under-Sampling Techniques to Balance a Protein Structural Class Dataset
pp. 22
Individual Differences in Working Memory Capacity and Presence in Virtual Environments
pp. 22
A Multi-agent System for Incident Management Solutions on IT Infrastructures
pp. 23
Total Immersion: Designing for Affective Symbiosis in a Virtual Reality Game with Haptics, Biosensors, and Emotive Agents
pp. 23
On semantic issues in the relational model of data
pp. 23
Comparison of methods for detecting corner points from digital curves
pp. 24
Research on Application of Data Mining Methods to Diagnosing Gastric Cancer
pp. 25
Certainty-factor-like Structures in Bayesian Networks
pp. 25
Searching with Partial Belief States in General Games with Incomplete Information
pp. 26
LogicObjects: Enabling Logic Programming in Java through Linguistic Symbiosis
pp. 26
Exploiting Policies in an Open Infrastructure for Lifelong Learning
pp. 29
A Tour of Recent Results on Word Transducers
pp. 29
The Complexity of Model Checking Concurrent Programs Against CTLK Specifications
pp. 3
The Design of Spacecraft On-Board Software
pp. 3
Keynote: Distributed Algorithms and VLSI
pp. 30
Information Retention in Heterogeneous Majority Dynamics
pp. 30
Coates' algorithm
pp. 30
Constraint Logic Programming Applied to Model Checking
pp. 30
How to Put through Your Agenda in Collective Binary Decisions
pp. 31
Nucleic Acids
pp. 33
Synchronization analyses for multiple recursion parameters
pp. 34
Managing proofs
pp. 35
UBS-Graph rewriting systems — matching subgraphs in constant time
pp. 35
User interface management system embedded in a multimedia document editor framework
pp. 36
The greatest common divisor: A case study for program extraction from classical proofs
pp. 37
Password Exhaustion: Predicting the End of Password Usefulness
pp. 37
To be or not to be an “agent”
pp. 37
The Rationality of Round Interpretation
pp. 45
A Game Theoretic Approach for Resource Usage
pp. 49
Feature-Specific Profiling
pp. 71
Some special effective numberings
pp. 81
An outline of the SMoLCS approach
pp. 92
Dynamic Aspect-Oriented Programming in Java: The HotWave Experience
pp. 21
Jikzi: A New Framework for Secure Publishing
pp. 25
A Dynamic Field Architecture for the Generation of Hierarchically Organized Sequences
pp. 28
Chapter IV: The confluence property and the Church-Rosser property
pp. 30
Supportedly Stable Answer Sets for Logic Programs with Generalized Atoms
pp. 32
Market Self-organization under Limited Information
pp. 34
Innovative Information and Knowledge Infrastructures – How Do I Find What I Need?
pp. 35
A Betweenness Centrality Guided Clustering Algorithm and Its Applications to Cancer Diagnosis
pp. 37
A Machine-Learning Framework for Hybrid Machine Translation
pp. 37
Approximation Algorithms for Multiple Strip Packing
pp. 37
Sensitivity Analysis for Threshold Decision Making with Bayesian Belief Networks
pp. 39
Mutation in Genetic Programming: A Preliminary Study
pp. 39
The effective arrangement of logical systems
pp. 4
A Distributed and Deterministic TDMA Algorithm for Write-All-With-Collision Model
pp. 41
Constraint relaxation
pp. 41
Proposing the Underlying Causes That Lead to the Trainee’s Erroneous Actions to the Trainer
pp. 43
A Declarative Compositional Timing Analysis for Multicores Using the Latency-Rate Abstraction
pp. 43
Dynamic Model Checking for Multi-agent Systems
pp. 47
Sharing analysis
pp. 50
Customized Document Research by a Stigmergic Approach Using Agents and Artifacts
pp. 51
Certification of Bounds of Non-linear Functions: The Templates Method
pp. 59
The SynchAADL2Maude Tool
pp. 63
Highly Efficient \(GF(2^8)\) G F ( 2 8 ) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design
pp. 69
A Synchronous-Based Code Generator for Explicit Hybrid Systems Languages
pp. 73
Completion with history-dependent complexities for generated equations
pp. 77
4 Semantics of UML Models for Dynamic Behavior
pp. 79
Characterizations of acceptability
pp. 97
Functional programming with overloading and higher-order polymorphism
pp. 107
5 Modeling and Simulation of TDL Applications
pp. 131
Parameter region for the proper operation of the IEEE 802.2 LLC type 3 protocol: A petri net approach
pp. 141
5. Representing Knowledge for Adaptation
pp. 144
CCS is an (augmented) contact free C/E system
pp. 19
Chorus Angelorum
pp. 33
An OMDoc Primer
pp. 34
Modelling the Population Dynamics and the File Availability in a BitTorrent-Like P2P System with Decreasing Peer Arrival Rate
pp. 36
Component Evolution in General Random Intersection Graphs
pp. 37
Auctions with Arbitrary Deals
pp. 37
Jikzi: A New Framework for Secure Publishing
pp. 42
Semantically Inspired Electronic Healthcare Records
pp. 42
Embodied Virtual Agents: An Affective and Attitudinal Approach of the Effects on Man-Machine Stickiness in a Product/Service Discovery
pp. 44
Calibration Based Reliable Detector for Detecting LSB Matching Steganography
pp. 45
Planning with Regression Analysis in Transaction Logic
pp. 48
The Environment as an Argument
pp. 49
Position Tracking Using Infra-Red Signals for Museum Guiding System
pp. 49
Engineering Agent Organisations in a Business Environment
pp. 49
Using Equivalences of Worlds for Aggregation Semantics of Relational Conditionals
pp. 57
Information Security in a Quantum World
pp. 57
Backtracking approaches
pp. 58
Shapley Facility Location Games
pp. 61
Non-deterministic Population Protocols
pp. 66
Verifying a Plaftorm for Digital Imaging: A Multi-tool Strategy
pp. 67
Turning Cliques into Paths to Achieve Planarity
pp. 71
Reactive Synthesis for Robotic Swarms
pp. 73
Practical Guidelines for Developing Case-Based Reasoning Applications
pp. 73
Characterizing the Principle of Minimum Cross-Entropy
pp. 79
Specification and Efficient Monitoring Beyond STL
pp. 80
LUCAS microprogramming language
pp. 83
Web Service Composition Based on Petri Nets: Review and Contribution
pp. 83
Round5: Compact and Fast Post-quantum Public-Key Encryption
pp. 87
Prediction theory for stochastic automata
pp. 100
Multi-agent matchmaking
pp. 13
Motion and Emotional Behavior Design for Pet Robot Dog
pp. 161
Robot Manipulators
pp. 179
Conclusion
pp. 183
Constructing medium sized efficient functional programs in Clean
pp. 21
RDIM: A Self-adaptive and Balanced Distribution for Replicated Data in Scalable Storage Clusters
pp. 37
Service Oriented Architecture Pitfalls
pp. 41
The Mix-Matrix Method in the Problem of Binary Quadratic Optimization
pp. 48
Using Regular Grammars for Event-Based Testing
pp. 50
Transactional Cache Management with A periodic Invalidation Scheme in Mobile Environments
pp. 54
LSB Replacement Steganography Software Detection Based on Model Checking
pp. 55
Coarse-Grained Parallelization of Distance-Bound Smoothing for the Molecular Conformation Problem
pp. 61
An Iterative Approach for Searching an Equilibrium in Piecewise Linear Exchange Model
pp. 62
Longest Wait First for Broadcast Scheduling [Extended Abstract]
pp. 67
A Modelling Framework for Cyber-Physical System Resilience
pp. 70
Improving Memory Latency Aware Fetch Policies for SMT Processors
pp. 71
Computational Aspects of Manipulation and Control in Judgment Aggregation
pp. 74
Coordination Mechanisms, Cost-Sharing, and Approximation Algorithms for Scheduling
pp. 74
Graph Patterns, Reinforcement Learning and Models of Reputation for Improving Coalition Formation in Collaborative Multi-agent Systems
pp. 74
Preserving Sharing in the Partial Evaluation of Lazy Functional Programs
pp. 76
An application of constructive completeness
pp. 82
A Universal Machine for Biform Theory Graphs
pp. 84
MikiBeta : A General GUI Library for Visualizing Proof Trees
pp. 86
A Novel WebGIS-Based Situational Awareness Platform for Trustworthy Big Data Integration and Analytics in Mobility Context
pp. 91
Perfect Timed Communication Is Hard
pp. 95
Compiler generation for interactive graphics using intermediate code
pp. 97
Semantic Caching in Location-Dependent Query Processing
pp. 98
VyPR2: A Framework for Runtime Verification of Python Web Services
pp. 108
On Persistency in Time Petri Nets
pp. 108
Temporal Vagueness, Coordination and Communication
pp. 111
Analogical replay
pp. 115
Constraint-Based Monitoring of Hyperproperties
pp. 116
Direct CCA-Secure KEM and Deterministic PKE from Plain LWE
pp. 12
Methodologies of Support to the Execution of Risk Management
pp. 123
Single Base Modular Multiplication for Efficient Hardware RNS Implementations of ECC
pp. 149
Conventional definitions of fail-stop signature schemes and general reductions
pp. 173
Rainfall Distribution Based on a Delaunay Triangulation Method
pp. 183
Universal models in categories for process synchronization
pp. 25
Similarity Invariant Delaunay Graph Matching
pp. 49
A Rule Chaining Architecture Using a Correlation Matrix Memory
pp. 49
Justifications for the Event-B Modelling Notation
pp. 52
Realtime TRUS/MRI Fusion Targeted-Biopsy for Prostate Cancer: A Clinical Demonstration of Increased Positive Biopsy Rates
pp. 57
Advantage of Quantum Strategies in Random Symmetric XOR Games
pp. 65
Semantic Wiki as a Lightweight Knowledge Management System
pp. 69
An Attempt to Generalize Distortion Measure for JPEG Steganography
pp. 69
Convex Hulls on Cellular Automata
pp. 75
The Routing Open Shop Problem: New Approximation Algorithms
pp. 81
On the branching structure of languages
pp. 83
Recharging Probably Keeps Batteries Alive
pp. 89
When Agents Communicate Hypotheses in Critical Situations
pp. 92
Elliptic integras concluded
pp. 93
Presence Interaction Management in SIP SOHO Architecture
pp. 99
Compositional CLP-Based Test Data Generation for Imperative Languages
pp. 106
Generation of Rule-Based Constraint Solvers: Combined Approach
pp. 106
Visualizing the Template of a Chaotic Attractor
pp. 109
A Declarative-Friendly API for Web Document Manipulation
pp. 109
Linked Data and Ontology Reference Model for Infectious Disease Reporting Systems
pp. 117
Improving Priority Promotion for Parity Games
pp. 118
Specialising Finite Domain Programs Using Polyhedra
pp. 133
Learning to Trust
pp. 137
Deciding between Conflicting Influences
pp. 137
A roadmap to metacomputation by supercompilation
pp. 141
Empirical results
pp. 151
Exact and Approximated Data-Reuse Optimizations for Tiling with Parametric Sizes
pp. 171
Automated production of readable proofs for theorems in non-Euclidean geometries
pp. 201
8 UML for Software Safety and Certification
pp. 63
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
pp. 64
Automatic Translation from Combined B and CSP Specification to Java Programs
pp. 72
Universal Witnesses for State Complexity of Basic Operations Combined with Reversal
pp. 72
Chapter VIII: Recursively defined functions
pp. 73
Language Identification Based on the Variations in Intonation Using Multi-classifier Systems
pp. 74
Relating May and Must Testing Semantics for Discrete Timed Process Algebras
pp. 76
A Mathematical Model of the Competition between Acquired Immunity and Virus
pp. 79
Scenarios for Companions
pp. 83
Optimal Data Embedding in 3D Models for Extraction from 2D Views Using Perspective Invariants
pp. 84
Incorporating BDI Agents into Human-Agent Decision Making Research
pp. 85
Avoiding Moving Persons by Using Simple Trajectory Prediction and Spatio Temporal Planning
pp. 89
Protocol Engineering for Multi-agent Interaction
pp. 90
An Improved Decision Procedure for Propositional Projection Temporal Logic
pp. 98
A Logical Investigation of Heterogeneous Reasoning with Graphs in Elementary Economics
pp. 104
Sobolev Space Preconditioning for Mixed Nonlinear Elliptic Boundary Value Problems
pp. 106
A Semantic Model for Service Composition with Coordination Time Delays
pp. 108
Optimizing Inequality Joins in Datalog with Approximated Constraint Propagation
pp. 111
Instead of a conclusion
pp. 121
Lessons Learned: Performance Tuning for Hadoop Systems
pp. 133
Non-termination Analysis of Logic Programs Using Types
pp. 136
Roles of Program Extension
pp. 145
Learning Mutual Trust
pp. 145
Weighted Branching Systems: Behavioural Equivalence, Behavioural Distance, and Their Logical Characterisations
pp. 154
On the product form solution for Stochastic Petri Nets
pp. 171
Optgen: A Generator for Local Optimizations
pp. 232
COSTPN for Modeling and control of telecommunication systems
pp. 241
LUCAS as a dedicated processor for image processing
pp. 289
Constructions for one message block
pp. 59
A Development Graph for Elementary Algebra
pp. 65
Spectral Signal Unmixing with Interior-Point Nonnegative Matrix Factorization
pp. 74
A Resource Classification System for the WOS
pp. 81
Cognitive Decision Making for Navigation Assistance Based on Intent Recognition
pp. 82
Blowing Light: Green-Based Interaction Design
pp. 82
Neurobiologically-Inspired Soft Switching Control of Autonomous Vehicles
pp. 82
Augmenting Social Interactions: Experiments in Socio-emotional Computing
pp. 90
The Case for Virtualized Wireless Access Networks
pp. 98
Consideration of the Watermark Inversion Attack and Its Invalidation Framework
pp. 98
Finding Dense Subgraphs in G(n,1/2)
pp. 106
General diagram-recognition methodologies
pp. 113
A Procedure for an Event-Condition-Transaction Language
pp. 113
Representation in Case-Based Reasoning Applied to Control Reconfiguration
pp. 115
Recent results on L systems
pp. 121
Group-Based Pricing to Shape Demand in Real-Time Electricity Markets
pp. 122
Compensable WorkFlow Nets
pp. 123
Symbolic Execution of Concurrent Objects in CLP
pp. 123
Human Reasoning with Proportional Quantifiers and Its Support by Diagrams
pp. 127
Field Array Compression in Data Caches for Dynamically Allocated Recursive Data Structures
pp. 130
Planning System for Emergency Services
pp. 130
Verified Resource Guarantees for Heap Manipulating Programs
pp. 132
Formally Analyzing Continuous Aspects of Cyber-Physical Systems Modeled by Homogeneous Linear Differential Equations
pp. 137
Compact Drawings of 1-Planar Graphs with Right-Angle Crossings and Few Bends
pp. 138
Annotation Algorithms for Unrestricted Independent And-Parallelism in Logic Programs
pp. 142
Work-Energy Profiles: General Approach and In-Memory Database Application
pp. 145
Socially Enabled Preference Learning from Implicit Feedback Data
pp. 159
Distributed Trust in Open Multi-agent Systems
pp. 160
A real-life experiment in creating an agent marketplace
pp. 162
Modeling Dynamical Phenomena in the Era of Big Data
pp. 162
Trace Relations and Logical Preservation for Markov Automata
pp. 169
Contradictions at the Borders
pp. 169
Conclusion
pp. 173
Obtaining deadlock-preserving skeletons for coloured nets
pp. 176
Alternatives to Threshold-Based Desire Selection in Bayesian BDI Agents
pp. 193
Towards a Scalable Framework for Context-Free Language Reachability
pp. 195
On Herbrand's theorem
pp. 208
Flat central configurations of four planet motions
pp. 284
Conclusions and continued research
pp. 55
Stochastic Text Models for Music Categorization
pp. 73
Hybrid Optimized Polynomial Neural Networks with Polynomial Neurons and Fuzzy Polynomial Neurons
pp. 94
A Self-stabilizing $\frac{2}{3}$ -Approximation Algorithm for the Maximum Matching Problem
pp. 94
Instantiation of Parameterized Data Structures for Model-Based Testing
pp. 95
Tracking Uncertainty in a Spatially Explicit Susceptible-Infected Epidemic Model
pp. 106
Finding Important Vocabulary Within Ontology
pp. 109
Towards Nominal Context-Free Model-Checking
pp. 109
Self-Stabilizing Leader Election in Optimal Space
pp. 121
The Influence of Input and Output Measurement Noise on Batch-End Quality Prediction with Partial Least Squares
pp. 124
Capturing Abstract Matrices from Paper
pp. 125
On-Line State Estimation of Maneuvering Objects by Sequential Monte Carlo Algorithm
pp. 138
Automatically Testing Web Services Choreography with Assertions
pp. 139
Extensions of Euler Diagrams in Peirce’s Four Manuscripts on Logical Graphs
pp. 141
Verwendung von Tschebyschew-Approximation und Ökonomisierungsverfahren bei der Vergröberung von Intervallpolynomen
pp. 143
Exploiting Preference Queries for Searching Learning Resources
pp. 161
A Particle Swarm-Based Approach for Semantic Similarity Computation
pp. 165
10. Developing Experience Factory Applications
pp. 166
Hash Functions: From Merkle-Damgård to Shoup
pp. 167
Automatic compositional verification of some Security properties
pp. 168
Determining Points on Handwritten Mathematical Symbols
pp. 193
P-superfairness in nets
pp. 197
Evaluation of Buffer Queries in Spatial Databases
pp. 208
Partial algebras, subsorting, and dependent types
pp. 210
Some consequences of cryptographical conjectures for S 2 1 and EF
pp. 297
11 The EAST-ADL Architecture Description Language for Automotive Embedded Software
pp. 79
Framed Versus Unframed Two-Dimensional Languages
pp. 92
Sparse Bump Sonification: A New Tool for Multichannel EEG Diagnosis of Mental Disorders; Application to the Detection of the Early Stage of Alzheimer’s Disease
pp. 108
Design Perspectives: Sampling User Research for Concept Development
pp. 111
Coprime Mapping Transformation for Protected and Revocable Fingerprint Template Generation
pp. 114
On the Effectiveness of Distributed Learning on Different Class-Probability Distributions of Data
pp. 121
Integrating Geometric and Biomechanical Models of a Liver Tumour for Cryosurgery Simulation
pp. 122
Constant Price of Anarchy in Network Creation Games via Public Service Advertising
pp. 123
Noise Injection Heuristics for Concurrency Testing
pp. 124
Tiara: A Self-stabilizing Deterministic Skip List
pp. 128
On the Additive Constant of the k-Server Work Function Algorithm
pp. 131
Clustering Based on Density Estimation with Sparse Grids
pp. 149
Automatic Generation of Affine IFS and Strongly Typed Genetic Programming
pp. 153
Palovca: Describing and Executing Graph Algorithms in Haskell
pp. 157
Hint, Instruction, and Practice: The Necessary Components for Promoting Spontaneous Diagram Use in Students’ Written Work?
pp. 161
On Strong Equilibria and Improvement Dynamics in Network Creation Games
pp. 165
A natural deduction approach to dynamic logic
pp. 196
Making Mercury Programs Tail Recursive
pp. 229
Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA
pp. 233
Verifying Fast and Sparse SSA-Based Optimizations in Coq
pp. 235
Operational semantics of behavioural canons based on narrowing
pp. 253
Defense in Depth Formulation and Usage in Dynamic Access Control
pp. 257
Unfolding Groups, II
pp. 309
12 Fujaba4Eclipse Real-Time Tool Suite
pp. 41
Allowing Citizens to Self-compose Personalized Services: A Cloud Computing Model
pp. 80
Towards Humanlike Social Touch for Prosthetics and Sociable Robotics: Three-Dimensional Finite Element Simulations of Synthetic Finger Phalanges
pp. 89
Modeling of Spiking Analog Neural Circuits with Hebbian Learning, Using Amorphous Semiconductor Thin Film Transistors with Silicon Oxide Nitride Semiconductor Split Gates
pp. 93
Approximating Tree Edit Distance through String Edit Distance for Binary Tree Codes
pp. 111
Texture Guided Active Appearance Model Propagation for Prostate Segmentation
pp. 114
Key Requirements for Integrating Usability Engineering and Software Engineering
pp. 124
The Open-End Argument for Private Computing
pp. 131
A Better Way towards Key Establishment and Authentication in Wireless Sensor Networks
pp. 135
A (4 + ε)-Approximation for the Minimum-Weight Dominating Set Problem in Unit Disk Graphs
pp. 140
Time Constraint Patterns for Event B Development
pp. 143
Towards Interactional Symbiosis: Epistemic Balance and Co-presence in a Quantified Self Experiment
pp. 145
A Particle Swarm Optimization Metaheuristic for the Blocking Flow Shop Scheduling Problem: Total Tardiness Minimization
pp. 148
Self-tuned Refresh Rate in a Swarm Intelligence Path Management System
pp. 152
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems
pp. 161
Reactive and Memory-Based Genetic Programming for Robot Control
pp. 177
Sequential Deliberation for Social Choice
pp. 185
Synthesis of Data Views for Communicating Processes
pp. 194
Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack
pp. 200
A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory
pp. 211
Basic concepts of a fuzzy logic data browser with applications
pp. 215
A C++ binding for Penguin: a system for data sharing among heterogeneous object models
pp. 227
Tighter Security Proofs for Generic Key Encapsulation Mechanism in the Quantum Random Oracle Model
pp. 229
Environmentally-Friendly GR(1) Synthesis
pp. 249
The algebraic specification of semicomputable data types
pp. 253
Characterizing parallel time by type 2 recursions with polynomial output length
pp. 317
13 AutoFocus 3 - A Scientific Tool Prototype for Model-Based Development of Component-Based, Reactive, Distributed Systems
pp. 87
Investigating the Effects of Gain and Loss of Esteem on Human-Robot Interaction
pp. 90
Performance Evaluation of a Self-organized Hierarchical Topology for Update of Replicas in a Large Distributed System
pp. 97
Agile Development Using Naked Objects
pp. 127
Word Oriented Cascade Jump σ−LFSR
pp. 129
Optimization of Queries Invoking Views by Query Tail Absorption
pp. 133
FTT Algorithm of Web Pageviews for Personalized Recommendation
pp. 143
Parameterized Algorithms for Stochastic Steiner Tree Problems
pp. 146
Game-Theoretic Models of Information Overload in Social Networks
pp. 146
Approximate Matching between a Context-Free Grammar and a Finite-State Automaton
pp. 155
A fuzzy extension of Allen’s Interval Algebra
pp. 157
Towards an Agent-Based Negotiation Scheme for Scheduling Electric Vehicles Charging
pp. 159
Knowledge-based segmentation for automatic map interpretation
pp. 162
Evolutionary Role Model for Multi-Agent Systems
pp. 166
CWFM: Closed Contingency Weighted Frequent Itemsets Mining
pp. 187
Using Diagrammatic Drawings to Understand Fictional Spaces: Exploring the Buendía House in Gabriel García Márquez’s One Hundred Years of Solitude
pp. 189
SPEC HPG Benchmarks for Large Systems
pp. 196
Attack-Resilient Multitree Data Distribution Topologies
pp. 200
The Queue-Number of Posets of Bounded Width or Height
pp. 206
Reversible Language Extensions and Their Application in Debugging
pp. 211
NSS: An NTRU Lattice-Based Signature Scheme
pp. 225
Timed Condition/Event systems: A framework for modular discrete models of chemical plants and verification of their real-time discrete control
pp. 232
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
pp. 249
(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model
pp. 97
Context First
pp. 103
Optimal Trajectory Generation for Walking Up and Down a Staircase with a Biped Robot Using Genetic Algorithm (GA)
pp. 107
Activity Representation in Crowd
pp. 135
Panel: Change is Good. You Go First
pp. 139
Checking Violation Tolerance of Approaches to Database Integrity
pp. 140
D-FOAF: Distributed Identity Management with Access Rights Delegation
pp. 168
Modeling Human Motion Trajectories by Sparse Activation of Motion Primitives Learned from Unpartitioned Data
pp. 169
Coded Spread Spectrum Watermarking Scheme
pp. 171
Refinement of Statemachines Using Event B Semantics
pp. 172
Agreement Technologies Applied to Transmission Towers Maintenance
pp. 175
Extending Social Reasoning to Cope with Multiple Partner Coalitions
pp. 179
Automatic region labeling of the layered map
pp. 213
Queue Layouts of Planar 3-Trees
pp. 222
proSQLite: Prolog File Based Databases via an SQLite Interface
pp. 226
An Algorithm to Find Frequent Concepts of a Formal Context with Taxonomy
pp. 227
Compositional Testing of Communication Systems
pp. 229
The Bit Security of Paillier’s Encryption Scheme and Its Applications
pp. 230
Mathematics and the World Wide Web
pp. 247
Reducing page thrashing in recursive query processing
pp. 254
Lossy Channels in a Dataflow Model of Computation
pp. 255
Verification by Testing for Recursive Program Schemes
pp. 287
Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce Bits
pp. 329
15 Benefits of System Simulation for Automotive Applications
pp. 365
A Mathematical Theory of Architecture
pp. 47
Modeling and Use of an Ontology Network for Website Recommendation Systems
pp. 98
Time-Lock Puzzle with Examinable Evidence of Unlocking Time
pp. 136
Panel: A Competition of Software Product Line Economic Models
pp. 141
Natural Specifications Yield Decidability for Distributed Synthesis of Asynchronous Systems
pp. 147
Using Brain Activity to Predict Task Performance and Operator Efficiency
pp. 147
Ergonomists and Usability Engineers Encounter Test Method Dilemmas with Virtual Work Environments
pp. 154
Multipath Routing to Provide Quality of Service in Mobile Ad Hoc Networks
pp. 155
Unravelling the Yeast Cell Cycle Using the TriGen Algorithm
pp. 157
A reactive-deliberative model of dialogue agency
pp. 158
ActiveMap: A Visualization Tool for Location Awareness to Support Informal Interactions
pp. 168
Ciphertext-Only Attack on Gentry-Halevi Implementation of Somewhat Homomorphic Scheme
pp. 178
Relational Learning: Hard Problems and Phase Transitions
pp. 184
Ein Versuch zur Verallgemeinerung der Intervallrechnung
pp. 190
Verification-based approach for automated text and feature extraction from raster-scanned maps
pp. 190
The Snow Team Problem
pp. 193
Adapting the Fitness Function in GP for Data Mining
pp. 194
$\mathcal{SHACUN}$ : Semi-supervised Hierarchical Active Clustering Based on Ranking Constraints
pp. 219
Design of an Optimal Frequency Reward Program in the Face of Competition
pp. 229
Crossing Minimization in Perturbed Drawings
pp. 235
Secure Data Management in Reactive Sensor Networks
pp. 239
A Functional Program for Agents, Actions, and Deontic Specifications
pp. 264
Highways and jukeboxes: A revolution for data structures?
pp. 279
A Note on Multidimensional Dyck Languages
pp. 292
Multi-Agent Programming Contest 2013
pp. 109
Trust Management and Network Layer Security Protocols
pp. 126
An Efficient Implementation of the Backtesting of Trading Strategies
pp. 157
Interactive Style of 3D Display of Buildings on Touch Screen
pp. 161
Real-Time Rendering of Light Shafts on GPU
pp. 162
Behavioral Analysis Based on Relations in Weblogs
pp. 168
A Multi-objective Evolutionary Algorithm for Color Image Segmentation
pp. 175
Monte Carlo Analysis of the Small-Signal Response of Charge Carriers
pp. 175
Tissue Cutting Using Finite Elements and Force Feedback
pp. 179
Introducing the FPGA-Based Hardware Architecture of Systemic Computation (HAoS)
pp. 180
Grover’s Algorithm with Errors
pp. 181
Brzozowski’s Minimization Algorithm—More Robust than Expected
pp. 187
On specific features of recognizable families of languages
pp. 191
The condition problem in solution of linear multistage systems
pp. 203
An Application of Specification-Based Design of Self-stabilization to Tracking in Wireless Sensor Networks
pp. 203
Evolving Fuzzy Rule Based Classifiers with GA-P: A Grammatical Approach
pp. 203
A Dialectical Approach to Enable Decision Making in Online Trading
pp. 204
Software system design for paper map conversion
pp. 204
FO Model Checking on Map Graphs
pp. 214
Scanning with a Purpose – Supporting the Fair Information Principles in RFID Protocols
pp. 242
Identifying Opinion Drivers on Social Media
pp. 244
Parallel Performance of Declarative Programming Using a PGAS Model
pp. 262
On Adaptive vs. Non-adaptive Security of Multiparty Protocols
pp. 276
Machine intelligibility and the duality principle
pp. 297
Extended Lambek Calculi and First-Order Linear Logic
pp. 299
Concurrency relations and the safety problem for Petri nets
pp. 319
SMADAS: A Team for MAPC Considering the Organization and the Environment as First-Class Abstractions
pp. 338
Multi-Level Lambda-Calculi: An algebraic description
pp. 53
SMILE – A Framework for Semantic Applications
pp. 133
Mathematical Statements (Module ST)
pp. 163
Using Cellular Automata on a Graph to Model the Exchanges of Cash and Goods
pp. 174
Prospects of Group-Based Communication in Mobile Ad hoc Networks
pp. 189
A rational agent as the kernel of a cooperative spoken dialogue system: Implementing a logical theory of interaction
pp. 190
On WQO Property for Different Quasi Orderings of the Set of Permutations
pp. 194
Optimization Problems in Multiple Subtree Graphs
pp. 212
Object-process based segmentation and recognition of ANSI and ISO standard dimensioning texts
pp. 213
Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic Tools
pp. 218
Our Brothers’ Keepers: Secure Routing with High Performance
pp. 249
A Classification of Stereotypes for Object-Oriented Modeling Languages
pp. 255
Applying Design by Contract to Feature-Oriented Programming
pp. 265
Optimized encodings of fragments of type theory in first order logic
pp. 306
Embedded Software Design Methodology Based on Formal Models of Computation
pp. 319
Effective Entailment Checking for Separation Logic with Inductive Definitions
pp. 331
A Categorial Type Logic
pp. 345
Compressing Multiresolution Triangle Meshes
pp. 357
A Physical Approach for Stochastic Modeling of TERO-Based TRNG
pp. 55
AVYTAT’10 - PC Co-chairs Message
pp. 145
Associative Memory in Neuronal Networks of Spiking Neurons: Architecture and Storage Analysis
pp. 161
Intensional High Performance Computing
pp. 173
Montebello: A Metapopulation Based Model of Carcinogenesis
pp. 179
New Commutative Semifields and Their Nuclei
pp. 180
Effects of Layer Partitioning in Collaborative 3D Visualizations
pp. 193
The Role of Connectivity in Supporting Context- Sensitive Applications
pp. 205
Newton-Algorithmen zur Bestimmung von Polynomwurzeln unter Verwendung komplexer Kreisarithmetik
pp. 205
Modelling social agents: Communication as action
pp. 217
Knowledge-Base Revision Using Implications as Hypotheses
pp. 228
Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns
pp. 232
Integration of Security Policy into System Modeling
pp. 233
A combined high and low level approach to interpreting scanned engineering drawings
pp. 233
On the Facets of Combinatorial Polytopes
pp. 234
Argumentation-Based Hybrid Recommender System for Recommending Learning Objects
pp. 237
Managing Automatically Formed Mathematical Theories
pp. 243
Reducing Software Architecture Models Complexity: A Slicing and Abstraction Approach
pp. 244
Aggregating Conditionally Lexicographic Preferences Using Answer Set Programming Solvers
pp. 246
Safety Interfaces for Component-Based Systems
pp. 271
A Heuristic Approach Towards Drawings of Graphs with High Crossing Resolution
pp. 273
Semantic Modeling and Inference with Episodic Organization for Managing Personal Digital Traces
pp. 276
New Malicious Code Detection Using Variable Length n-grams
pp. 279
A survey of DBMS research issues in supporting very large tables
pp. 288
Three Years of DLMF: Web, Math and Search
pp. 313
Generic system support for deductive program development
pp. 326
The Number Field Sieve in the Medium Prime Case
pp. 328
Liveness and boundedness analysis for Petri nets with event graph modules
pp. 176
A Quantitative Diagnostic Method Based on Bayesian Networks in Traditional Chinese Medicine
pp. 177
Towards Generalized Measures Grasping CA Dynamics
pp. 198
Memetic Algorithm Based on Global-Best Harmony Search and Hill Climbing for Part of Speech Tagging
pp. 215
Fehlerabschätzung bei linearer Optimierung
pp. 226
Using the Hermite Regression Formula to Design a Neural Architecture with Automatic Learning of the “Hidden” Activation Functions
pp. 227
Faster Model Checking for Open Systems
pp. 234
Reducing Expression Size Using Rule-Based Integration
pp. 242
Detecting Removed Object from Video with Stationary Background
pp. 243
Decidable Weighted Expressions with Presburger Combinators
pp. 249
How to Share Knowledge by Gossiping
pp. 285
Combining Related Products into Product Lines
pp. 287
A Formal Verification Study on the Rotterdam Storm Surge Barrier
pp. 369
20 The Model-Integrated Computing Tool Suite
pp. 409
Program specialization via program slicing
pp. 414
Comparing the power of monadic NP games
pp. 167
Complex Fiedler Vectors for Shape Retrieval
pp. 173
Complex Theories (Modules CTH and DG)
pp. 203
Push Less and Pull the Current Highest Demanded Data Item to Decrease the Waiting Time in Asymmetric Communication Environments
pp. 229
Minimal Cost Reconfiguration of Data Placement in Storage Area Network
pp. 233
Supporting Fuzzy Metric Temporal Logic Based Situation Recognition by Mean Shift Clustering
pp. 238
XIG: Generating from Interchange Format using Mixed Representations
pp. 239
An Argumentation Approach to Semantics of Declarative Programs with Defeasible Inheritance
pp. 259
Approximating Coupled-Task Scheduling Problems with Equal Exact Delays
pp. 260
Reconstruction of 3D solid model from three orthographic views — Top-down approach
pp. 294
Scale Effects in Web Search
pp. 300
Node Sampling Using Random Centrifugal Walks
pp. 303
An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack
pp. 310
Using MathML to Represent Units of Measurement for Improved Ontology Alignment
pp. 357
Cryptanalysis of 2R− Schemes
pp. 416
Evaluation and Improvement of Generic-Emulating DPA Attacks
pp. 426
Linear constraint query languages expressive power and complexity
pp. 192
Improved Realtime Intrusion Detection System
pp. 198
The Role of Event Boundaries in Language: Perceiving and Describing the Sequence of Simultaneous Events
pp. 204
Rooted Trees Searching for Cocyclic Hadamard Matrices over D 4t
pp. 207
Association-Rules Mining Based Broadcasting Approach for XML Data
pp. 212
Iterative Estimation of 3D Transformations for Object Alignment
pp. 212
Automatic Alignment of Ontology Eliminating the Probable Misalignments
pp. 214
An Adaptive Resource Reservation and Distributed Admission Control Scheme for Mobile Networks
pp. 217
Weaknesses of Cuckoo Hashing with a Simple Universal Hash Class: The Case of Large Universes
pp. 218
Global Computing Systems
pp. 229
On approximate iterations and solutions for equations considered in function spaces
pp. 232
Towards Computation with Microchemomechanical Systems
pp. 244
Hyper-optimization for Deterministic Tree Automata
pp. 251
Entailment of Non-structural Subtype Constraints
pp. 267
A Novel Video Inter-frame Forgery Model Detection Scheme Based on Optical Flow Consistency
pp. 272
Routing Open Shop with Unrelated Travel Times
pp. 278
Performance of Network Intrusion Detection Cluster System
pp. 279
Probabilistic Argumentation, a Small Step for Uncertainty, a Giant Step for Complexity
pp. 311
Simple Pricing Schemes for the Cloud
pp. 358
Efficient Amplification of the Security of Weak Pseudo-random Function Generators
pp. 366
Multi-Agent Programming Contest 2013: The Teams and the Design of Their Systems
pp. 373
Modelling and control of complex logistic systems for manufacturing
pp. 393
Conjoinability in 1-Discontinuous Lambek Calculus
pp. 446
ML pattern match compilation and partial evaluation
pp. 88
ADI’10 - PC Co-chairs Message
pp. 174
An Evolutionary Multi-objective Neural Network Optimizer with Bias-Based Pruning Heuristic
pp. 177
A Biophysical Network Model Displaying the Role of Basal Ganglia Pathways in Action Selection
pp. 180
XP with Acceptance-Test Driven Development: A Rewrite Project for a Resource Optimization System
pp. 187
Measuring the Similarity of Vector Fields Using Global Distributions
pp. 217
CSDTM A Cost Sensitive Decision Tree Based Method
pp. 228
Java for Large-Scale Scientific Computations?
pp. 236
Definition einer Kahan-Arithmetik und ihre Implementierung
pp. 241
Semantic Approach to Identity in Coreference Resolution Task
pp. 244
Evolutionary Programming Using Distribution-Based and Differential Mutation Operators
pp. 257
The B-Method for the Construction of Microkernel-Based Systems
pp. 261
Designing and implementing a multi-agent architecture for business process management
pp. 263
Smart Matching
pp. 266
A CPS-Transform of Constructive Classical Logic
pp. 270
Concurrent Genetic Programming, Tartarus and Dancing Agents
pp. 282
Countering Universal Image Tampering Detection with Histogram Restoration
pp. 286
How to win a dashed line detection contest
pp. 288
Constructing a Virtual Laboratory on the Internet: The ITBL Portal
pp. 330
The ForMaRE Project – Formal Mathematical Reasoning in Economics
pp. 330
Wait-Free Linked-Lists
pp. 333
On the Area-Universality of Triangulations
pp. 391
The Concurrency Factory software development environment
pp. 393
Cryptographic Protocols for Electronic Voting
pp. 402
The Hidden Structural Rules of the Discontinuous Lambek Calculus
pp. 189
A Customer Test Generator for Web-Based Systems
pp. 197
Virtual Door-Based Coverage Path Planning for Mobile Robot
pp. 213
Semantic-Based Affect and Metaphor Interpretation in Virtual Drama
pp. 222
Who Is Taking over Control? A Psychological Perspective in Examining Effects of Agent-Based Negotiation Support Technologies
pp. 233
Planning and Execution in a Personalised E-Learning Setting
pp. 237
Programs, computations and temporal features
pp. 240
Pattern Based Information Retrieval Approach to Discover Extremist Information on the Internet
pp. 247
Normative Multi-Agent Organizations
pp. 260
Hardware Verification and Beyond: Using B at AWE
pp. 277
Emotion-based attention shift in autonomous agents
pp. 290
Face Verification Using Color Sparse Representation
pp. 295
Modelling and Analysis of Network Security - a Probabilistic Value-passing CCS Approach
pp. 303
Modeling and Enforcing Semantic Obligations for Access Control
pp. 309
Computing Convex Coverage Sets for Multi-objective Coordination Graphs
pp. 330
UML-RT as a Candidate for Modeling Embedded Real-Time Systems in the Telecommunication Domain
pp. 369
Using Both Latent and Supervised Shared Topics for Multitask Learning
pp. 407
Cyber-Physical Systems Education: Explorations and Dreams
pp. 475
Multi-variate High-Order Attacks of Shuffled Tables Recomputation
pp. 90
RDF Containers – A Framework for the Integration of Distributed and Heterogeneous Applications
pp. 217
Intrusion Alert Analysis Based on PCA and the LVQ Neural Network
pp. 223
A Framework for Experience Representation
pp. 232
Adaptive User Interactive Sketching for Teaching Based on Pen Gesture
pp. 244
A note on the automatic generation of inductive assertions
pp. 247
Object-Oriented Framework for Large Scale air Pollution Modeling
pp. 248
Computational Power of Protein Interaction Networks
pp. 250
Hybrid Teams in Virtual Environments: Samurai Joins the Training Team
pp. 293
An OpenMath Content Dictionary for Tensor Concepts
pp. 303
An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks
pp. 318
Coupling Regulative and Constitutive Dimensions in Situated Artificial Institutions
pp. 339
Modeling Hard Real Time Systems with UML The OOHARTS Approach
pp. 354
Dynamic Pricing in Competitive Markets
pp. 389
The stubborn set method in practice
pp. 406
Hyper-bent Functions
pp. 201
Artificial Neural Networks and Data Compression Statistics for the Discrimination of Cultured Neuronal Activity
pp. 227
Gröbner Representations of Binary Matroids
pp. 241
Generating Cryptographically Suitable Non-linear Maximum Length Cellular Automata
pp. 247
Automatic Lung Nodule Detection Using Template Matching
pp. 256
Representing and Reasoning with Application Profiles Based on OWL and OWL/XDD
pp. 257
Performance Driven Routing in Distributed Environment
pp. 258
A Monitoring Infrastructure for the Digital on-demand Computing Organism (DodOrg)
pp. 266
A Generic Flash-Based Animation Engine for ProB
pp. 267
Automatic Bug Detection in Microcontroller Software by Static Program Analysis
pp. 289
Visualising the Boolean Algebra \(\mathbb {B}_{4}\) in 3D
pp. 297
Autonomous Spacecraft Resource Management: A Multi-Agent Approach
pp. 311
A Proof-Theoretic Approach to Deciding Subsumption and Computing Least Common Subsumer in $\cal EL$ w.r.t. Hybrid TBoxes
pp. 325
Facility Location in Unfair Competition
pp. 344
Math-Net.Ru as a Digital Archive of the Russian Mathematical Knowledge from the XIX Century to Today
pp. 361
How to Fit a Tree in a Box
pp. 212
A Prototype of a Chat System Using Message Driven and Interactive Actions Character
pp. 231
A Generalization of the Zig-Zag Graph Product by Means of the Sandwich Product
pp. 234
Color Image Watermarking Algorithm Using BPN Neural Networks
pp. 240
Time Scales of Sensorimotor Contingencies
pp. 251
Chaotic Cellular Automata with Cryptographic Application
pp. 252
Quantum Random Active Element Machine
pp. 254
MIGP: Medical Image Grid Platform Based on HL7 Grid Middleware
pp. 263
History Trees as Descriptors of Macromolecular Structures
pp. 270
Interval-extension of quasilinearization method
pp. 284
In vitro Measurement of Mechanical Properties of Liver Tissue under Compression and Elongation Using a New Test Piece Holding Method with Surgical Glue
pp. 383
Cascades and Myopic Routing in Nonhomogeneous Kleinberg’s Small World Model
pp. 120
Incremental Validation of Models in a MDE Approach Applied to the Modeling of Complex Data Structures
pp. 217
Timing Self-generated Actions for Sensory Streaming
pp. 250
Analysis of Birefringent Characteristics of Photonic Crystal Fibers Filled Magnetic Fluid
pp. 255
Simulating Metabolic Processes Using an Architecture Based on Networks of Bio-inspired Processors
pp. 264
Theoretical and Methodological Considerations in the Comparison of Performance and Physiological Measures of Mental Workload
pp. 274
BRAMA: A New Graphic Animation Tool for B Models
pp. 278
Visualizing Defeasible Logic Rules for the Semantic Web
pp. 279
Zur numerischen Konstruktion konvergenter Schrankenfolgen für Systeme nichtlinearer, gewöhnlicher Anfangswertaufgaben
pp. 287
Integrating Knowledge Encoded by Linguistic Phenomena of Indian Languages with Neural Machine Translation
pp. 321
An Algorithm for Recruitment of Agents in Agency Design
pp. 331
Integrating Multiple Sources to Answer Questions in Algebraic Topology
pp. 334
On L k(Q) Types and Boundedness of IFP(Q) on Finite Structures
pp. 350
A Leader-Follower Hub Location Problem Under Fixed Markups
pp. 355
Listing All Fixed-Length Simple Cycles in Sparse Graphs in Optimal Time
pp. 363
Trust, Negotiations and Virtual Currencies for a Sharing Economy
pp. 363
Comparative Preferences Induction Methods for Conversational Recommenders
pp. 368
Towards a Cyber Security Reporting System – A Quality Improvement Process
pp. 387
The Complexity of Drawing a Graph in a Polygonal Region
pp. 453
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
pp. 504
Augmenting State Models with Data Flow
pp. 212
Pictures Can’t Lie under Oath
pp. 239
An Upper Bound on Blocking Probability of Vertical Stacked Optical Benes Networks
pp. 239
Bounds on the Number of Users for Random 2-Secure Codes
pp. 257
On String Reading Stateless Multicounter 5′ → 3′ Watson-Crick Automata
pp. 269
Results of a Tailored Communication Framework Through E-Health
pp. 288
Untersuchungen der Grenzgenauigkeit von Algorithmen zur Auflösung linearer Gleichungssysteme mit Fehlererfassung
pp. 290
A Fast Technique for Assigning Wavelengths in WDM All-Optical Networks (AONs)
pp. 333
Towards a Conceptual Representation of Actions
pp. 344
Robust Median Filtering Detection Based on Filtered Residual
pp. 347
Separators Are as Simple as Cutsets
pp. 399
Correct Realizations of Interface Constraints with OCL
pp. 402
Inserting an Edge into a Geometric Embedding
pp. 425
Reduction of Test Suites Using Mutation
pp. 436
Reasoning about Safety and Progress Using Contracts
pp. 524
On the Road to Conviction: An Email Exchange with Edward Lee
pp. 231
A Novel Bifurcation-Based Synthesis of Asynchronous Cellular Automaton Based Neuron
pp. 252
It’s Elementary, My Dear Watson: Time-Optimal Sorting Algorithms on a Completely Overlapping Network
pp. 259
Relating Transition P Systems and Spiking Neural P Systems
pp. 293
Empirical Evaluation of a Visual Interface for Exploring Message Boards
pp. 300
Design of 1-FT Communication Network under Budget Constraint
pp. 359
Ant Colony Optimization for the Ship Berthing Problem
pp. 360
Broadcast in a MANET Based on the Beneficial Area
pp. 369
Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report)
pp. 418
A constraint-oriented Service Creation Environment
pp. 241
The Interactive Feature Selection Method Development for an ANN Based Emotion Recognition System
pp. 272
An Improved Method for Real-Time 3D Construction of DTM
pp. 277
An axiomatic approach to information structures
pp. 285
JML2B: Checking JML Specifications with B Machines
pp. 294
Knowledge Integration in Information Systems Education Through an (Inter)active Platform of Analysis and Modelling Case Studies
pp. 312
Approximating the Range Sum of a Graph on CREW PRAM
pp. 356
On Plan Adaptation through Planning Graph Analysis
pp. 368
An Optimal Method for Coordinated En-route Web Object Caching
pp. 369
swMATH – A New Information Service for Mathematical Software
pp. 395
Determinism and Computational Power of Real Measurement-Based Quantum Computation
pp. 399
Thompson Sampling for Bayesian Bandits with Resets
pp. 430
Formalising UML State Machines for Model Checking
pp. 282
Depth Estimation Using Variant of Depth of Field by Horizontal Planes of Sharp Focus
pp. 288
An Improved Single Neuron Adaptive PID Controller Based on Levenberg-Marquardt Algorithm
pp. 289
Plug-and-Play Nondeterminacy
pp. 311
Iterationsverfahren bei inklusionsmonotonen Intervallfunktionen
pp. 313
Singular Value Decomposition-Based Illumination Compensation in Video
pp. 314
Wearable Information Appliances for the Emergency Services: HotHelmet
pp. 335
Improved Community Interaction Through Context Based Citation Analysis
pp. 376
An Improved Algorithm of Multicast Topology Inference from End-to-End Measurements
pp. 404
An Approach to Fractional Programming via D.C. Constraints Problem: Local Search
pp. 409
Busy Beaver Scores and Alphabet Size
pp. 471
Fine Slicing
pp. 480
Usability of Visual Data Profiling in Data Cleaning and Transformation
pp. 529
Encryption Modes with Almost Free Message Integrity
pp. 285
A RBF Network for Chinese Text Classification Based on Concept Feature Extraction
pp. 292
A Study on Stereo and Motion Data Accuracy for a Moving Platform
pp. 306
Human Performance Model for Combined Steering-Targeting Tasks
pp. 312
Cellular Automata Applied in Remote Sensing to Implement Contextual Pseudo-fuzzy Classification
pp. 323
Facial Expression Transformations for Expression-Invariant Face Recognition
pp. 329
Ontology Driven Visualisation of Maps with SVG – Technical Aspects
pp. 333
Quick-Reference Table to the OMDoc Elements
pp. 340
Towards Patient-Specific Anatomical Model Generation for Finite Element-Based Surgical Simulation
pp. 348
Mining Informative Words from the Tweets for Detecting the Resources During Disaster
pp. 375
An Efficient Location Management by Optimal Location Area Partitioning in PCS Networks
pp. 379
The DeLiVerMATH Project
pp. 380
Solving Employee Timetabling Problems by Generalized Local Search
pp. 385
Chordal Topologies for Interconnection Networks
pp. 418
Automatic Kolmogorov Complexity and Normality Revisited
pp. 425
Possible Winner Problems on Partial Tournaments: A Parameterized Study
pp. 457
UML Behavior: Inheritance and Implementation in Current Object-Oriented Languages
pp. 170
Outlines for Dynamic Visualization of Semantic Web Data
pp. 298
A Fast and Scalable Conflict Detection Algorithm for Packet Classifiers
pp. 304
Stochastic Resonance in Excitable Neuronal System with Phase-Noise
pp. 316
A Mental Workload Predicator Model for the Design of Pre Alarm Systems
pp. 322
Impact of Coupling of Distributed Denial of Service Attack with Routing on Throughput of Packet Switching Network
pp. 393
Distributed Location of Shared Resources and Its Application to the Load Sharing Problem in Heterogeneous Distributed Systems
pp. 430
Multiple Cuts in Separating Plane Algorithms
pp. 501
A Domain-Specific Language for Scripting Refactorings in Erlang
pp. 570
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions
pp. 272
Spike Transmission on Diverging/Converging Neural Network and Its Implementation on a Multilevel Modeling Platform
pp. 311
Determination of Gender and Age Based on Pattern of Human Motion Using AdaBoost Algorithms
pp. 319
User-Oriented Accessibility Patterns for Smart Environments
pp. 337
Computer Simulation of the Air Flow and the Distribution of Combustion Generated Pollutants around Buildings
pp. 343
A Token-Based Distributed Algorithm for Total Order Atomic Broadcast
pp. 343
A Semantics-Based Protocol for Business Process Transactions
pp. 379
A Verification Technique Based on Syntactic Action Refinement in a TCSP-like Process Algebra and the Hennessy-Milner-Logic
pp. 411
Evidence Algorithm and System for Automated Deduction: A Retrospective View
pp. 444
A Digital Library Framework for Reusing e-Learning Video Documents
pp. 449
Automating Personalized Learning Through Motivation
pp. 320
A Heuristic Routing Algorithm for Degree-Constrained Minimum Overall Latency Application Layer Multicast
pp. 321
A Comparative Study of Two Reference Estimation Methods in EEG Recording
pp. 331
Visual Hierarchy and Viewing Behavior: An Eye Tracking Study
pp. 344
On Multigrid Methods for the Compressible Navier-Stokes Equations
pp. 344
A Network-Based Indexing Method for Trajectories of Moving Objects
pp. 351
Fuzzy View-Based Semantic Search
pp. 353
Self-adaptive RBF Neural Networks for Face Recognition
pp. 353
Learning Cooperative TSK-0 Fuzzy Rules Using Fast Local Search Algorithms
pp. 435
Visual Cryptography Based Watermarking: Definition and Meaning
pp. 455
Agent Based Simulation to Evaluate Adaptive Caching in Distributed Databases
pp. 509
Orthogonal and Smooth Orthogonal Layouts of 1-Planar Graphs with Low Edge Complexity
pp. 307
Extreme Makeover: Bending the Rules to Reduce Risk Rewriting Complex Systems
pp. 356
Efficient Circuit Construction in Brownian Cellular Automata Based on a New Building-Block for Delay-Insensitive Circuits
pp. 363
Weighted Tardiness Minimization in Job Shops with Setup Times by Hybrid Genetic Algorithm
pp. 463
Analysing Incentive Strategies to Promote Participation in Crowdsourcing Systems
pp. 565
Making the Right Cut in Model Checking Data-Intensive Timed Systems
pp. 211
Application-Services Integration among Multi-clouds for Small and Middle Scale Enterprises
pp. 296
Exploratory Behaviour Depends on Multisensory Integration during Spatial Learning
pp. 338
Variable Momentum Factor Odd Symmetry Error Function Blind Equalization Algorithm
pp. 365
A Cellular Automaton Controlled Shading for a Building Facade
pp. 373
Interval-Valued Fuzzy Sets for Color Image Super-Resolution
pp. 401
Ontology-Based Competence Management for Team Configuration
pp. 431
Parallel Matrix Multiplication and LU Factorization on Ethernet-Based Clusters
pp. 445
Prior Classification of Stego Containers as a New Approach for Enhancing Steganalyzers Accuracy
pp. 341
Content-Based 3D Graphic Information Retrieval
pp. 345
A Flexible Implementation Method of Distributed ANN
pp. 359
Finding a Relationship between Internet Anxiety and Human Behavior
pp. 359
Time Estimation as a Measure of Mental Workload
pp. 388
Asynchronous Migration in Parallel Genetic Programming
pp. 469
A p2p Framework for Interacting with Learning Objects
pp. 485
On the Security of Multi-secret Visual Cryptography Scheme with Ring Shares
pp. 550
Black and White Diamonds
pp. 229
Ontology Approach for the Interoperability of Networked Enterprises in Supply Chain Environment
pp. 371
A New Data Fusion Model of Intrusion Detection-IDSFP
pp. 390
Verification Results for a Multimedia Protocol
pp. 450
Performance Study of a Whole Genome Comparison Tool on a Hyper-Threading Multiprocessor
pp. 566
Interconnecting Objects via Contracts
pp. 325
Extreme Programming: A More Musical Approach to Software Development?
pp. 343
An Evaluation of WebTwig — A Site Outliner for Handheld Web Access
pp. 478
A De-anonymization Attack on Geo-Located Data Considering Spatio-temporal Influences
pp. 507
A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CA
pp. 579
Algorithms and Bounds for Drawing Directed Graphs
pp. 346
Human Factors of Multi-modal Ubiquitous Computing
pp. 413
SAHN with SEP/COP and SPADE, to Build a General Web Navigation Adaptation System Using Server Log Information
pp. 468
Large Scale Structures of Turbulent Shear Flow via DNS
pp. 593
Optimal Grid Drawings of Complete Multipartite Graphs and an Integer Variant of the Algebraic Connectivity
pp. 339
Simulating Light Adaptation in the Retina with Rod-Cone Coupling
pp. 349
URCP: Experimental Support for Multi-modal Interfaces
pp. 407
2L-MuRR: A Compact Register Renaming Scheme for SMT Processors
pp. 409
A Lagrange Multipliers/Fictitious Domain Approach for Particulate Flow
pp. 409
Coxeter Groups and Asynchronous Cellular Automata
pp. 444
Exploring the Flexible Workflow Technology to Automate Service Composition
pp. 476
Molecular Dynamics Simulation of Prion Protein by Large Scale Cluster Computing
pp. 609
Graph Drawing Contest Report
pp. 662
A Pattern System to Support Refining Informal Ideas into Formal Expressions
pp. 459
Mediation Enabled Semantic Web Services Usage
pp. 563
Location, Pricing and the Problem of Apollonius
pp. 337
EnterpriseXP: Can the Combination of XP and DSDM Improve the Appeal of XP to the Business Community?
pp. 411
Multi-angle View, Illumination and Cosmetic Facial Image Database (MaVIC) and Quantitative Analysis of Facial Appearance
pp. 425
Wave Evolution of Heated Falling Films. Numerical Analysis Using Finite-Difference Method
pp. 474
Toward Automatic Discovery and Invocation of Information-Providing Web Services
pp. 279
Early Validation of Requirements in Distributed Product Development – An Industrial Case Study
pp. 377
Vectors of coroutines
pp. 509
Design Validation by Symbolic Simulation and Equivalence Checking: A Case Study in Memory Optimization for Image Manipulation
pp. 289
A Software Inspection Process for Globally Distributed Teams
pp. 385
One — one degrees of Turing machines decision problems
pp. 432
”How Do I Line Up?”: Reducing Mental Transformations to Improve Performance
pp. 465
Using Visualizations to Support Design and Debugging in Virtual Reality
pp. 347
Extreme Programming at Work
pp. 441
Tracking by Hierarchical Representation of Target Structure
pp. 443
A Middleware Architecture for Designing TV-Based Adapted Applications for the Elderly
pp. 501
Web Services Analysis: Making Use of Web Service Composition and Annotation
pp. 350
Multiple-Instance Learning Improves CAD Detection of Masses in Digital Mammography
pp. 383
New Classifier Based on Fuzzy Level Set Subgrouping
pp. 516
WWW: WSMO, WSML, and WSMX in a Nutshell
pp. 540
OpenMP for Adaptive Master-Slave Message Passing Applications
pp. 395
Contour Detection by CORF Operator
pp. 404
On memory requirements of Strassen's algorithms
pp. 552
OpenGR: A Directive-Based Grid Programming Environment
pp. 319
Service-Oriented Communities: Visions and Contributions towards Social Organizations
pp. 403
Hybrid Ensembles Using Hopfield Neural Networks and Haar-Like Features for Face Detection
pp. 530
A Composition Oriented and Graph-Based Service Search Method
pp. 377
A Universal, Location-Aware Hoarding Mechanism
pp. 411
Face Recognition with Disparity Corrected Gabor Phase Differences
pp. 416
Generating control mechanisms by restrictions
pp. 489
On Mixtures of Linear SVMs for Nonlinear Classification
pp. 496
Phase Coexistence in Congested States of Pedestrian Dynamics
pp. 528
Viewpoint Selection for Angiographic Volume
pp. 366
Building Standard ERP Software Packages Using Self-developed Agile Methodologies
pp. 430
On some properties of cyclic automata and their extensions
pp. 488
Application of ICA in On-Line Verification of the Phase Difference of the Current Sensor
pp. 538
Recognizing Action Primitives in Complex Actions Using Hidden Markov Models
pp. 386
Ad-hoc Network Routing for Centralized Information Sharing Systems
pp. 504
The Development of a Cognitive Work Analysis Tool
pp. 530
MFLWQ: A Fair and Adaptive Queue Management Algorithm for Scavenger Service
pp. 548
Polyhedrization of Discrete Convex Volumes
pp. 621
The Minimum Reload s-t Path/Trail/Walk Problems
pp. 443
Biologically Plausible Multi-dimensional Reinforcement Learning in Neural Networks
pp. 512
Human Activity Modeling for Systems Design: A Trans-Disciplinary and Empirical Approach
pp. 517
Synchronization and Fluctuation of Rhythm in Musical Cooperative Performance
pp. 520
Combining Online Classification Approaches for Changing Environments
pp. 523
Excluded Volume Effect in a Pedestrian Queue
pp. 558
Automatic Camera Calibration and Scene Reconstruction with Scale-Invariant Features
pp. 588
Design of Semantically Interoperable Adverse Event Reporting Framework
pp. 633
Polylog Space Compression Is Incomparable with Lempel-Ziv and Pushdown Compression
pp. 446
On the parsing of LL-regular grammars
pp. 451
Adaptive Neural Oscillator with Synaptic Plasticity Enabling Fast Resonance Tuning
pp. 530
Optimal Kernel in a Class of Kernels with an Invariant Metric
pp. 532
Simulation on Vehicle Emission by the Brake-Light Cellular Automata Model
pp. 569
Surface Fitting to Curves with Energy Control
pp. 645
A New Family of Regular Operators Fitting with the Position Automaton Computation
pp. 378
Semantic Similarity and Selection of Resources Published According to Linked Data Best Practice
pp. 531
“Investigating the Way National Grid Controllers Visualize the Electricity Transmission Grid Using a Neuro-Linguistic Programming (NLP) Approach”
pp. 564
A Hybrid Neural Network Approach to the Classification of Novel Attacks for Intrusion Detection
pp. 579
Blob Tracking with Adaptive Feature Selection and Accurate Scale Determination
pp. 656
A Formal Model of Business Application Integration from Web Services (Position Paper)
pp. 394
Supporting Collaborative Conceptualization Tasks through a Semantic Wiki Based Platform
pp. 562
Feature and Classifier Selection in Class Decision Trees
pp. 599
Improved Face Recognition Using Extended Modular Principal Component Analysis
pp. 404
Modelling the Public Sector Information through CIDOC Conceptual Reference Model
pp. 482
A Dynamic Binding Mechanism for Retrieving and Unifying Complex Predicate-Logic Knowledge
pp. 553
Minimizing Makespan on Identical Parallel Machines Using Neural Networks
pp. 596
Grid Accounting Information Service with End-to-End User Identity
pp. 482
Context-free programmed grammars and ETOL systems
pp. 487
Testing Online Navigation Recommendations in a Web Site
pp. 618
Characterization of the Closest Discrete Approximation of a Line in the 3-Dimensional Space
pp. 639
A Comprehensive Study of Inappropriate Hierarchy in WordNet
pp. 424
ORM’10 - PC Co-chairs Message
pp. 497
An Overview of Agent Coordination and Cooperation
pp. 620
An Accounting Services Model for ShanghaiGrid
pp. 414
Filleting XP for Educational Purposes
pp. 504
Innovations in Intelligent Agents and Web
pp. 507
Learning to Imitate YMCA with an ESN
pp. 582
Effects of Pattern Complexity on Information Integration: Evidence from Eye Movements
pp. 588
Appearance Similarity Index for Medicinal Ampoule Labels
pp. 436
Real-Time Integration of Geo-data in ORM
pp. 503
Computational processes generated by programs with /recursive/ procedures and block structures
pp. 598
A Novel Parallel Clustering Algorithm Based on Artificial Immune Network Using nVidia CUDA Framework
pp. 648
Scale Consistent Image Completion
pp. 477
Clinical Performance of Digital Breast Tomosynthesis Versus Full-Field Digital Mammography: Preliminary Results
pp. 596
Neural-Network-Based Sliding Mode Control for Missile Electro-Hydraulic Servo Mechanism
pp. 682
A Semantic Reputation Mechanism in P2P Semantic Web
pp. 517
Degrees of parallelism in computations
pp. 523
Bayesian Decision Tree Averaging for the Probabilistic Interpretation of Solar Flare Occurrences
pp. 531
Learning Sequence Neighbourhood Metrics
pp. 609
Cognitive and Emotional Human Models Within a Multi-agent Framework
pp. 618
Improving the Usability of Hierarchical Representations for Interactively Labeling Large Image Data Sets
pp. 464
A Fact-Based Meta Model for Standardization Documents
pp. 524
On adaptability of a system of programs
pp. 628
The Similarity Index of Character Shape of Medicine Names Based on Character Shape Similarity (II)
pp. 474
A Proposal for Folding in ORM Diagrams
pp. 530
A mathematical model of parallel information processing
pp. 637
ColoriT: Color Based Image Code Application to Aid in Memory Restoration of Offline Photo Artifacts
pp. 711
A Knowledge- and Workflow-Based System for Supporting Order Fulfillment Process in the Build-to-Order Supply Chains
pp. 484
A Basic Characterization of Relation Migration
pp. 561
A New Fault Detection and Diagnosis Method for Oil Pipeline Based on Rough Set and Neural Network
pp. 633
Clusters in the Helbing’s Improved Model
pp. 639
Combining Skin Conductance and Heart Rate Variability for Adaptive Automation During Simulated IFR Flight
pp. 664
Supervised Principal Geodesic Analysis on Facial Surface Normals for Gender Classification
pp. 725
A Distributed IR Model Based on Semantic Web
pp. 563
The Spherical Hidden Markov Self Organizing Map for Learning Time Series Data
pp. 712
Unsupervised Clustering of Shapes
pp. 732
Experimental Study of Semantic Contents Mining on Intra-university Enterprise Contents Management System for Knowledge Sharing
pp. 504
Mapping ORM to Datalog: An Overview
pp. 551
The influence of the data presentation on the computational power of machines
pp. 658
Analyzing Constraints to Support Computational Modeling of Air Traffic Controllers
pp. 721
Markerless Pose Tracking for Augmented Reality
pp. 514
Subtyping and Derivation Rules in Fact-Based Modeling
pp. 664
H ∞ Neural Networks Control for Uncertain Nonlinear Switched Impulsive Systems
pp. 725
A Personalized and Scalable Service Broker for the Global Computing Environment
pp. 569
Equivalence and optimization of recursive program schemata
pp. 674
Reliable Robust Controller Design for Nonlinear State-Delayed Systems Based on Neural Networks
pp. 677
High-Quality Fast Image Upsampling Algorithm Based on CUDA
pp. 678
Experimental Thermal/Moisture Mapping of Industrial Safety Helmets
pp. 737
Distributed Network Computing on Transient Stability Analysis and Control
pp. 762
Networked Interactive Photo Annotation and Reminiscence Content Delivery
pp. 596
On-Line Processing of Grammatical Structure Using Reservoir Computing
pp. 684
Neural Network Applications in Advanced Aircraft Flight Control System, a Hybrid System, a Flight Test Demonstration
pp. 687
Common Work Space or How to Support Cooperative Activities Between Human Operators and Machine: Application to Air Traffic Control
pp. 714
Scale-Space Kernels for Additive Modeling
pp. 439
Extreme Advertised Bidding
pp. 588
The calculus of facts
pp. 604
Constructing Robust Liquid State Machines to Process Highly Variable Data Streams
pp. 761
3D Surface Reconstruction and Registration for Image Guided Medialization Laryngoplasty
pp. 543
Black-Hole Attacks in P2P Mobile Networks Discovered through Bayesian Filters
pp. 553
Progress Toward a Quantitative Scale for Describing Radiodensity in Mammographic Images
pp. 606
A RDF-Based Framework for User Profile Creation and Management
pp. 561
Systematic Performance Analysis of SART as Applied to Digital Breast Tomosynthesis
pp. 602
A complete axiomatic characterization of algorithmic properties of block-structured programs with procedures
pp. 723
Voice Alarm System in Emergency Evacuation
pp. 755
A Novel Coding Scheme for Indexing Fingerprint Patterns
pp. 803
Graph-Based Multi-resolution Temporal-Based Face Reconstruction
pp. 804
Effective Resource Allocation in a JXTA-Based Grid Computing Platform JXTPIA
pp. 738
Synthesis of Desired Binary Cellular Automata Through the Genetic Algorithm
pp. 741
Evaluation of the Effects of Visual Field on Road Sign Recognition
pp. 827
A Workflow Management Mechanism for Peer-to-Peer Computing Platforms
pp. 661
Dynamic Stopping Improves the Speed and Accuracy of a P300 Speller
pp. 831
Segmentation of Triangular Meshes Using Multi-scale Normal Variation
pp. 596
Enabling Access to Web Resources through SecPODE-Based Annotations
pp. 770
A Characteristic of a Navigator’s Response to Artificial Ship’s Movement by Picture and Motion Platform
pp. 850
An Efficient Photon Mapping Algorithm for Rendering Light-Emitting Fluids
pp. 787
Classification of Blink Waveforms Toward the Assessment of Driver’s Arousal Levels - An EOG Approach and the Correlation with Physiological Measures
pp. 860
Face Recognition Using 2D and 3D Multimodal Local Features
pp. 871
Adaptive Background Generation for Video Object Segmentation
pp. 635
Knowledge Representation with Autonomic Ontologies
pp. 806
Culture and Communication in the Philippine Aviation Industry
pp. 842
A Low Cost Incremental Biometric Fusion Strategy for a Handheld Device
pp. 710
Dual Support Vector Domain Description for Imbalanced Classification
pp. 852
A Hidden Markov Model Approach to Classify and Predict the Sign of Financial Local Trends
pp. 890
A New Method of Network Data Link Troubleshooting
pp. 718
Learning Method Inspired on Swarm Intelligence for Fuzzy Cognitive Maps: Travel Behaviour Modelling
pp. 665
Automatic Support for Product Based Workflow Design: Generation of Process Models from a Product Data Model
pp. 834
Analysis of Human Factors Integration Aspects for Aviation Accidents and Incidents
pp. 675
OTMA’10 - PC Co-chairs Message
pp. 725
Human Support Network System Using Friendly Robot
pp. 860
A Research of Speech Signal of Fire Information Display Interface
pp. 955
Cross-Layer Flow Control Based on Path Capacity Prediction for Multi-hop Ad Hoc Network
pp. 937
Classification and Automatic Annotation Extension of Images Using Bayesian Network
pp. 711
Automatic Exposure Control in Digital Mammography: Contrast-to-Noise Ratio Versus Average Glandular Dose
pp. 947
Selection of Suitable Set of Decision Rules Using Choquet Integral
pp. 812
Predicting Time Series Using Incremental Langrangian Support Vector Regression
pp. 789
Lessons from the Application of Domain-Independent Data Mining System for Discovering Web User Access Patterns
pp. 920
A Novel Constrained Genetic Algorithm for the Optimization of Active Bar Placement and Feedback Gains in Intelligent Truss Structures
pp. 928
A Double-Stage Genetic Optimization Algorithm for Portfolio Selection
pp. 1055
Next Generation Networks Architecture and Layered End-to-End QoS Control
pp. 954
The Hybrid Genetic Algorithm for Blind Signal Separation
pp. 1065
FairOM: Enforcing Proportional Contributions Among Peers in Internet-Scale Distributed Systems
pp. 1077
An Efficient QoS Framework with Distributed Adaptive Resource Management in IPv6 Networks
pp. 843
IdeaCrepe: Creativity Support Tool with History Layers
pp. 983
Extraction of Fuzzy Features for Detecting Brain Activation from Functional MR Time-Series
pp. 1038
A Fuzzy LMS Neural Network Method for Evaluation of Importance of Indices in MADM
pp. 956
Spatial Equilibrium Model on Regional Analysis for the Trade Liberalization of Fluid Milk in Taiwan
pp. 972
Structural Learning of Neural Networks for Forecasting Stock Prices
pp. 1168
Distributed Face Recognition: A Multiagent Approach
pp. 1256
The Performance of LVQ Based Automatic Relevance Determination Applied to Spontaneous Biosignals
pp. 1264
Alertness Assessment Using Data Fusion and Discrimination Ability of LVQ-Networks
pp. E1
Comparison of Squall Line Positioning Methods Using Radar Data
Similar content
1,045
Finding spaces for urban food production—Matching spatial and stakeholder analysis with urban agriculture approaches in the urban renewal area of dortmund-Horde, Germany
Authors:
The golden hordes: International tourism and the pleasure peripher
Authors:
Louis Turner
,
John Ash
,
L. TURNER
…
A tropical horde of counterfeit predator eyes
Authors:
DH Janzen
,
W Hallwachs
,
JM Burns
See all similar
Cited by
3
Shepherding Hordes of Markov Chains
Authors:
Milan Češka
,
Nils Jansen
,
Sebastian Junges
…
Counterexample-Driven Synthesis for Probabilistic Program Sketches
Authors:
Milan Češka
,
Christian Hensel
,
Sebastian Junges
…
Farkas certificates and minimal witnesses for probabilistic reachability constraints
Authors:
Florian Funke
,
Simon Jantsch
,
Christel Baier
See all cited by