Search

Showing total 88 results
88 results

Search Results

2. Security-preserving social data sharing methods in modern social big knowledge systems.

3. Improving formal analysis of state machines with particular emphasis on and-cross transitions.

4. Time-optimal symbolic control of a changeover process based on an approximately bisimilar symbolic model.

5. Robustness of stochastic bandit policies.

6. Measuring the significance of inconsistency in the Viewpoints framework.

7. The complexity of the stamp folding problem.

8. ARREST: From work practices to redesign for usability

9. Testable design of AND–EXOR logic networks with universal test sets

10. A note on models for graph representations

11. Standard-compliant, but incompatible?!

12. A uniform solution to SAT using membrane creation

13. On-line assurance of interpretability criteria in evolving fuzzy systems – Achievements, new concepts and open issues.

14. Small (purely) catalytic P systems simulating register machines.

15. Embedding meshes into locally twisted cubes

16. A description based on languages of the final non-deterministic automaton.

17. Syntactic N-grams as machine learning features for natural language processing.

18. The complexity of manipulative attacks in nearly single-peaked electorates.

19. Relating constraint answer set programming languages and algorithms.

20. Environmental impact assessment based on D numbers.

21. General time consistent discounting.

22. Supervised learning and Co-training.

23. A test-suite reduction approach to improving fault-localization effectiveness.

24. On the migrativity of triangular subnorms.

25. Convex linear T–S functions: A generalization of Frank's equation.

26. On the vertical threshold generation method of fuzzy implication and its properties.

27. Incremental construction of systems: An efficient characterization of the lacking sub-system.

28. Closed form fuzzy interpolation.

29. State complexity of star of union and square of union on k regular languages.

30. A complete proof system for propositional projection temporal logic.

31. Approximation algorithms for a bi-level knapsack problem.

32. A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices.

33. Semi-online scheduling problems on two uniform machines under a grade of service provision.

34. On parallel complexity of analytic functions.

35. On the gap between schedulability tests and an automotive task model.

36. Information flow in systems with schedulers, Part II: Refinement.

37. Permanence of a stage-structured predator–prey system.

38. On-site investigation methodology for incident response in Windows environments.

39. Practical parallel key-insulated encryption with multiple helper keys.

40. Online game bot detection based on party-play log analysis.

41. Formal virtualization requirements for the ARM architecture.

42. An ontological analysis of the notion of community in the RM-ODP enterprise language

43. Semantic web services matchmaking: Semantic distance-based approach.

44. Using the complementary nature of node joining and leaving to handle churn problem in P2P networks.

45. An iterative approach to synthesize business process templates from compliance rules

46. Improving the Hadamard extractor

47. Anytime coalition structure generation in multi-agent systems with positive or negative externalities

48. Transfer of trust in event-based reputation systems

49. Narrative-based taxonomy distillation for effective indexing of text collections

50. Contexts, refinement and determinism