publication venue for
- Hierarchical peer-to-peer systems. 2790:1230-1239. 2004
- Cooperative Information Systems 2025
- Network Games, Artificial Intelligence, Control and Optimization 2025
- Service-Oriented Computing 2024
- Computer Security. ESORICS 2023 International Workshops 2024
- Foundations and Practice of Security 2024
- Foundations and Practice of Security 2024
- Cooperative Information Systems 2023
- Data Privacy Management, Cryptocurrencies and Blockchain Technology 2023
- Formal Methods Teaching 2023
- Foundations and Practice of Security 2023
- Foundations and Practice of Security 2022
- Pattern Recognition and Artificial Intelligence 2022
- Privacy in Statistical Databases 2022
- Service-Oriented Computing – ICSOC 2021 Workshops 2022
- Foundations and Practice of Security 2021
- Risks and Security of Internet and Systems 2021
- Computer Security 2020
- Data Privacy Management, Cryptocurrencies and Blockchain Technology 2020
- Information Security Theory and Practice 2020
- Service-Oriented Computing – ICSOC 2019 Workshops 2020
- The Impact of Digital Technologies on Public Health in Developed and Developing Countries 2020
- Foundations and Practice of Security 2019
- How AI Impacts Urban Living and Public Health 2019
- Machine Learning for Networking 2019
- Mobile, Secure, and Programmable Networking 2019
- Mobile, Secure, and Programmable Networking 2019
- Security and Safety Interplay of Intelligent Software Systems 2019
- Data Privacy Management, Cryptocurrencies and Blockchain Technology 2018
- Foundations and Practice of Security 2018
- Information and Communications Security 2018
- Risks and Security of Internet and Systems 2018
- Smart Homes and Health Telematics, Designing a Better Future: Urban Assisted Living 2018
- Tests and Proofs 2018
- Enhanced Quality of Life and Smart Living 2017
- Intelligent Human Computer Interaction 2017
- On the Move to Meaningful Internet Systems. OTM 2017 Conferences 2017
- Security, Privacy, and Applied Cryptography Engineering 2017
- Testing Software and Systems 2017
- Data Privacy Management, and Security Assurance 2016
- Inclusive Smart Cities and Digital Health 2016
- Mobile, Secure, and Programmable Networking 2016
- Research in Attacks, Intrusions, and Defenses 2016
- Service-Oriented Computing – ICSOC 2015 Workshops 2016
- Testing Software and Systems 2016
- Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance 2015
- Inclusive Smart Cities and e-Health 2015
- Mobile, Secure, and Programmable Networking 2015
- Service-Oriented Computing - ICSOC 2014 Workshops 2015
- Service-Oriented Computing 2014
- Evolution of Telecommunication Services 2013
- Inclusive Society: Health and Wellbeing in the Community, and Care at Home 2013
- Data Privacy Management and Autonomous Spontaneus Security 2012
- Impact Analysis of Solutions for Chronic Disease Prevention and Management 2012
- Data Privacy Management and Autonomous Spontaneous Security 2011
- Economics of Converged, Internet-Based Networks 2011
- Toward Useful Services for Elderly and People with Disabilities 2011
- Aging Friendly Technology for Health and Independence 2010
- Autonomic and Trusted Computing 2010
- Intelligent Virtual Agents 2010
- Mobile Multimedia Processing 2010
- Ubiquitous Intelligence and Computing 2010
- Engineering Societies in the Agents World X 2009
- Multi-perspective Conformance Checking for Email-Driven Processes 2024
- SUMix: Mixup with Semantic and Uncertain Information 2024
- ScanTalk: 3D Talking Heads from Unregistered Scans 2024
- Quantifying the Impact Propagation of Cyber Attacks Using Business Logic Modeling 2024
- A Model-Driven Framework to Support Portfolio Management Under Uncertainties 2024
- A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM 2024
- A Privacy-Preserving Infrastructure to Monitor Encrypted DNS Logs 2024
- An Event-B Model of a Mechanical Lung Ventilator 2024
- Avatar Reaction to Multimodal Human Behavior 2024
- Checking Transaction Isolation Violations Using Graph Queries 2024
- Maximizing Minimum Cycle Bases Intersection 2024
- SIP-DDoS: SIP Framework for DDoS Intrusion Detection Based on Recurrent Neural Networks 2024
- A Comprehensive Analysis on Associative Classification in Building Maintenance Datasets 2023
- Data-Driven Evaluation of Intrusion Detectors: A Methodological Framework 2023
- Efficient Network Representation for GNN-Based Intrusion Detection 2023
- Emotionally-Bridged Cross-Lingual Meta-Learning for Chinese Sexism Detection 2023
- Exploring Heterogeneous Data Graphs Through Their Entity Paths 2023
- Mapping and Cleaning Open Commonsense Knowledge Bases with Generative Translation 2023
- PathWays: Entity-Focused Exploration of Heterogeneous Data Graphs 2023
- Proving Local Invariants in ASTDs 2023
- Request Relaxation Based-on Provider Constraints for a Capability-Based NaaS Services Discovery 2023
- Towards a Personalized Business Services Recommendation System Dedicated to Preventing Frailty in Elderly People 2023
- Uncovering Implicit Bundling Constraints: Empowering Cloud Network Service Discovery 2023
- Utility-Oriented Gradual Itemsets Mining Using High Utility Itemsets Mining 2023
- A Model Driven Approach to Transform Business Vision-Oriented Decision-Making Requirement into Solution-Oriented Optimization Model 2022
- A Trustworthy decentralized Change Propagation Mechanism for Declarative Choreographies 2022
- Agent-Based Intermodal Behavior for Urban Toll 2022
- Analysis of the Impact of Interaction Patterns and IoT Protocols on Energy Consumption of IoT Consumer Applications 2022
- Differential Testing of Simulation-Based Virtual Machine Generators 2022
- Empowering Well-Being Through Conversational Coaching for Active and Healthy Ageing 2022
- Metric Learning on Complex Projective Spaces 2022
- Process-Oriented Intents: A Cornerstone for Superimposition of Natural Language Conversations over Composite Services 2022
- Testing Against Non-deterministic FSMs: A Probabilistic Approach for Test Suite Minimization 2022
- Towards a Systematic and Automatic Use of State Machine Inference to Uncover Security Flaws and Fingerprint TLS Stacks 2022
- Uncertainty Detection in Historical Databases 2022
- An Industry-Adapted AR Training Method for Manual Assembly Operations 2021
- Blockchain-Based Business Processes: A Solidity-to-CPN Formal Verification Approach 2021
- Formally Verified Transformation of Non-binary Constraints into Binary Constraints 2021
- How Can Personality Influence Perception on Security of Context-Aware Applications? 2021
- Mapping Multidimensional Schemas to Property Graph Models 2021
- Performance Evaluation and Energy Consumption for DVFS Processor 2021
- Performance Evaluation of the Packet Aggregation Mechanism of an N-GREEN Metro Network Node 2021
- Towards an Integration of the Multi-role Dimension in the Design of Learning Games: a Review of the Literature 2021
- A Systematic Model to Model Transformation for Knowledge-Based Planning Generation Problems 2020
- An Event-B Model of an Automotive Adaptive Exterior Light System 2020
- Analysis of QUIC Session Establishment and Its Implementations 2020
- Deep Active Learning with Simulated Rationales for Text Classification 2020
- End-to-End Generative Adversarial Network for Palm-Vein Recognition 2020
- Geocaching-Inspired Navigation for Micro Aerial Vehicles with Fallible Place Recognition 2020
- Interpreting Deep Glucose Predictive Models for Diabetic People Using RETAIN 2020
- Modeling of a Speed Control System Using Event-B 2020
- Modelling Hybrid Programs with Event-B 2020
- Space-Time Pattern Extraction in Alarm Logs for Network Diagnosis 2020
- A Model Checking Based Approach for Detecting SDN Races 2019
- Agent-Based Appliance Scheduling for Energy Management in Industry 4.0 2019
- Approximate Querying on Property Graphs 2019
- Are You in Pain? Predicting Pain and Stiffness from Wearable Sensor Activity Data 2019
- Byzantine Collision-Fast Consensus Protocols 2019
- Continuous Objects Detection Based on Optimized Greedy Algorithm in IoT Sensing Networks 2019
- Deployment of an IoT Solution for Early Behavior Change Detection 2019
- Discovering Crossing-Workflow Fragments Based on Activity Knowledge Graph 2019
- Entity Embedding Analogy for Implicit Link Discovery 2019
- Evaluating the Complexity of Deriving Adaptive Homing, Synchronizing and Distinguishing Sequences for Nondeterministic FSMs 2019
- Fast and Scalable Optimal Transport for Brain Tractograms 2019
- Forecasting Cryptocurrency Value by Sentiment Analysis: An HPC-Oriented Survey of the State-of-the-Art in the Cloud Era 2019
- From Raw Signals to Human Skills Level in Physical Human-Robot Collaboration for Advanced-Manufacturing Applications 2019
- Generating Personalized and Certifiable Workflow Designs: A Prototype 2019
- Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms 2019
- Position Certainty Propagation: A Location Service for MANETs 2019
- Prediction-Coherent LSTM-Based Recurrent Neural Network for Safer Glucose Predictions in Diabetic People 2019
- ScalOMP: Analyzing the Scalability of OpenMP Applications 2019
- Siamese Network Based Feature Learning for Improved Intrusion Detection 2019
- 3D Hand Gesture Recognition by Analysing Set-of-Joints Trajectories 2018
- A Connectionist Model of Reading with Error Correction Properties 2018
- A Platform for Security Monitoring of Multi-cloud Applications 2018
- A Study of Threat Detection Systems and Techniques in the Cloud 2018
- An Event-B Model of the Hybrid ERTMS/ETCS Level 3 Standard 2018
- Boosting Transactional Memory with Stricter Serializability 2018
- Configurable IoT-Aware Allocation in Business Processes 2018
- Coop-DAAB: Cooperative Attribute Based Data Aggregation for Internet of Things Applications 2018
- Cyber-Physical Systems Engineering: An Introduction 2018
- Design of a Secure Shield for Internet and Web-Based Services Using Software Reflection 2018
- Dynamic Joint Resource Allocation and Femtocell Selection for 5G HetNet 2018
- EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control 2018
- In the Search of Quality Influence on a Small Scale – Micro-influencers Discovery 2018
- Lifelogging Protection Scheme for Internet-Based Personal Assistants 2018
- Low Cost Intelligent System for the 2D Biomechanical Analysis of Road Cyclists 2018
- Low Frequency Mobile Communications in Underwater Networks 2018
- Model-Driven Elasticity for Cloud Resources 2018
- Modeling the Hybrid ERTMS/ETCS Level 3 Standard Using a Formal Requirements Engineering Approach 2018
- Multiset Canonical Correlation Analysis: Texture Feature Level Fusion of Multiple Descriptors for Intra-modal Palmprint Biometric Recognition 2018
- On Maximal Frequent Itemsets Mining with Constraints 2018
- On the Importance of Explicit Domain Modelling in Refinement-Based Modelling Design. Experiments with Event-B 2018
- SDAC: A New Software-Defined Access Control Paradigm for Cloud-Based Systems 2018
- Technological Approach for Early and Unobtrusive Detection of Possible Health Changes Toward More Effective Treatment 2018
- Test Derivation for SDN-Enabled Switches: A Logic Circuit Based Approach 2018
- Towards a Security Event Data Taxonomy 2018
- ARCID: A New Approach to Deal with Imbalanced Datasets Classification 2017
- $$\mathcal {PCS}$$, A Privacy-Preserving Certification Scheme 2017
- A Framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory 2017
- A Game Theoretical Model for Optimal Distribution of Network Security Resources 2017
- AGACY Monitoring: A Hybrid Model for Activity Recognition and Uncertainty Handling 2017
- Activity Recognition Enhancement Based on Ground-Truth: Introducing a New Method Including Accuracy and Granularity Metrics 2017
- An n-Sided Polygonal Model to Calculate the Impact of Cyber Security Events 2017
- Analysis of Performance and Energy Consumption in the Cloud 2017
- Anonymous Certification for an e-Assessment Framework 2017
- Applying a Dependency Mechanism for Voting Protocol Models Using Event-B 2017
- Approximate Inference in Related Multi-output Gaussian Process Regression 2017
- Authentication Based Elliptic Curves Digital Signature for ZigBee Networks 2017
- CAREDAS: Context and Activity Recognition Enabling Detection of Anomalous Situation 2017
- Choosing Models for Security Metrics Visualization 2017
- Combining Fog Architectures and Distributed Event-Based Systems for Mobile Sensor Location Certification 2017
- Databases Traceability by Means of Watermarking with Optimized Detection 2017
- Deadlock-Freeness Verification of Business Process Configuration Using SOG 2017
- M2HAV: A Standardized ICN Naming Scheme for Wireless Devices in Internet of Things 2017
- Morphological Hierarchical Image Decomposition Based on Laplacian 0-Crossings 2017
- Multi-cloud Applications Security Monitoring 2017
- Object Tracking Using Deep Convolutional Neural Networks and Visual Appearance Models 2017
- Optimization of a Modular Ad Hoc Land Wireless System via Distributed Joint Source-Network Coding for Correlated Sensors 2017
- Performance Analysis of Object Store Systems in a Fog and Edge Computing Infrastructure 2017
- Quality Estimation of Virtual Machine Placement in Cloud Infrastructures 2017
- Reasoning Under Conflicts in Smart Environment 2017
- Security of Cyber-Physical Systems 2017
- Stochastic Bounds for Switched Bernoulli Batch Arrivals Observed Through Measurements 2017
- Unified Modeling of Quality of Context and Quality of Situation for Context-Aware Applications in the Internet of Things 2017
- Unobtrusive Technological Approach for Continuous Behavior Change Detection Toward Better Adaptation of Clinical Assessments and Interventions for Elderly People 2017
- Using Formal Model for Evaluation of Business Processes Elasticity in the Cloud 2017
- A Formal Guidance Approach for Correct Process Configuration 2016
- A Framework for Sampling-Based XML Data Pricing 2016
- A Full Description of Polytopes Related to the Index of the Lowest Nonzero Row of an Assignment Matrix 2016
- A Global SLA-Aware Approach for Aggregating Services in the Cloud 2016
- A QoC-Aware Discovery Service for the Internet of Things 2016
- Attack Volume Model: Geometrical Approach and Application 2016
- Attribute-Based Signatures for Supporting Anonymous Certification 2016
- Authenticated Key Agreement Mediated by a Proxy Re-encryptor for the Internet of Things 2016
- Automatic Nonlinear Filtering and Segmentation for Breast Ultrasound Images 2016
- Automatic Segmentation of TV News into Stories Using Visual and Temporal Information 2016
- Creating an Easy to Use and High Performance Parallel Platform on Multi-cores Networks 2016
- Differential Fault Analysis on Midori 2016
- Efficient Intermediate Data Placement in Federated Cloud Data Centers Storage 2016
- Event-Triggered Watermarking Control to Handle Cyber-Physical Integrity Attacks 2016
- Failure is Also an Option 2016
- From Graph Orientation to the Unweighted Maximum Cut 2016
- Hardware-Enforced Protection Against Buffer Overflow Using Masked Program Counter 2016
- Hybrid Risk Assessment Model Based on Bayesian Networks 2016
- Isolating and Reusing Template Instances in UML 2016
- ML: DDoS Damage Control with MPLS 2016
- Multimodal Sequential Modeling and Recognition of Human Activities 2016
- Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY 2016
- On Dynamic Feature Weighting for Feature Drifting Data Streams 2016
- On the Use of Domain and System Knowledge Modeling in Goal-Based Event-B Specifications 2016
- RPL Border Router Redundancy in the Internet of Things 2016
- Simplifying Installation and Maintenance of Ambient Intelligent Solutions Toward Large Scale Deployment 2016
- SysML-Sec Attack Graphs: Compact Representations for Complex Attacks 2016
- Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations 2016
- Tests and Proofs for Enumerative Combinatorics 2016
- Towards an Automated and Dynamic Risk Management Response System 2016
- Using Computer Vision to See 2016
- Virtualization Techniques: Challenges and Opportunities 2016
- $$\mathcal {ALC({\mathbf {F}}})$$ : A New Description Logic for Spatial Reasoning in Images 2015
- A Formal Approach to Automatic Testing of Security Policies Specified in XACML 2015
- A Landmark-Based Approach for Robust Estimation of Exposure Index Values in Digital Radiography 2015
- A Survey on Wireless Sensors Networks Security Based on a Layered Approach 2015
- Abductive Reasoning Using Tableau Methods for High-Level Image Interpretation 2015
- Activity Recognition in Assisted Living Facilities with Incremental, Approximate Ground Truth 2015
- Adapted Quantization Index Modulation for Database Watermarking 2015
- Adaptive Sampling for Incremental Optimization Using Stochastic Gradient Descent 2015
- An Abstraction for the Interoperability Analysis of Security Policies 2015
- Asymptotics of Superposition of Point Processes 2015
- Building Thermal Renovation Overview 2015
- Conversational Behavior Reflecting Interpersonal Attitudes in Small Group Interactions 2015
- Exploring the Magnitude of Human Sexual Dimorphism in 3D Face Gender Classification 2015
- Extracting Configuration Guidance Models from Business Process Repositories 2015
- Eye Can Tell: On the Correlation Between Eye Movement and Phishing Identification 2015
- Fast Optimal Transport Averaging of Neuroimaging Data 2015
- Format Oracles on OpenPGP 2015
- Fuzzy 'Along' Spatial Relation in 3D. Application to Anatomical Structures in Maxillofacial CBCT 2015
- Guiding Testers’ Hands in Monitoring Tools: Application of Testing Approaches on SIP 2015
- Hausdorff Distances Between Distributions Using Optimal Transport and Mathematical Morphology 2015
- Improving the Reliability and the Performance of CAPE by Using MPI for Data Exchange on Network 2015
- Interactive Multi-organ Segmentation Based on Multiple Template Deformation 2015
- Local Sparse Representation Based Interest Point Matching for Person Re-identification 2015
- Mining Frequent Closed Flows Based on Approximate Support with a Sliding Window over Packet Streams 2015
- Nonlinear Cross-View Sample Enrichment for Action Recognition 2015
- On Debiasing Restoration Algorithms: Applications to Total-Variation and Nonlocal-Means 2015
- On the Most Imbalanced Orientation of a Graph 2015
- Open Packing for Facade-Layout Synthesis Under a General Purpose Solver 2015
- Positive/Negative Emotion Detection from RGB-D Upper Body Images 2015
- Privacy Preserving Record Matching Using Automated Semi-trusted Broker 2015
- Privacy in Digital Identity Systems: Models, Assessment, and User Adoption 2015
- Private Asymmetric Fingerprinting: A Protocol with Optimal Traitor Tracing Using Tardos Codes 2015
- Provenance Circuits for Trees and Treelike Instances 2015
- Reality Mining with Mobile Data: Understanding the Impact of Network Structure on Propagation Dynamics 2015
- Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications 2015
- Remote Collaboration, Decision Support, and On-Demand Medical Image Analysis for Acute Stroke Care 2015
- Research on Big Data 2015
- Technical Challenges Towards an AAL Large Scale Deployment 2015
- Toward Scheduling I/O Request of Mapreduce Tasks Based on Markov Model 2015
- Translating ATL Model Transformations to Algebraic Graph Transformations 2015
- Two-Stage Filtering Scheme for Sparse Representation Based Interest Point Matching for Person Re-identification 2015
- Measuring the Impact of ICTs on the Quality of Life of Ageing People with Mild Dementia 2014
- A Metamodel for Collaboration Formalization 2014
- A Recursive Algorithm for Building Renovation in Smart Cities 2014
- A Spatio-temporal Approach for Multiple Object Detection in Videos Using Graphs and Probability Maps 2014
- A UML Model-Driven Approach to Efficiently Allocate Complex Communication Schemes 2014
- Analyzing Feasibility for Deploying Very Fast Decision Tree for DDoS Attack Detection in Cloud-Assisted WBAN 2014
- Business Process Fragments Behavioral Merge 2014
- Collaborative Systems in Crisis Management: A Proposal for a Conceptual Framework 2014
- Conditioning Probabilistic Relational Data with Referential Constraints 2014
- Configuration Rule Mining for Variability Analysis in Configurable Process Models 2014
- Coupled Parallel Snakes for Segmenting Healthy and Pathological Retinal Arteries in Adaptive Optics Images 2014
- Fault Injection to Reverse Engineer DES-Like Cryptosystems 2014
- From Non-verbal Signals Sequence Mining to Bayesian Networks for Interpersonal Attitudes Expression 2014
- Get a Sample for a Discount 2014
- How Do Content Delivery Networks Affect the Economy of the Internet and the Network Neutrality Debate? 2014
- Hybrid Model for LTE Network-Assisted D2D Communications 2014
- Integration of Web Sources Under Uncertainty and Dependencies Using Probabilistic XML 2014
- Interpersonal Attitude of a Speaking Agent in Simulated Group Conversations 2014
- Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model 2014
- Masks Will Fall Off 2014
- Mining Configurable Process Fragments for Business Process Design 2014
- Mining Event Logs to Assist the Development of Executable Process Variants 2014
- Multi-organ Localization Combining Global-to-Local Regression and Confidence Maps 2014
- On Implicit and Explicit Semantics: Integration Issues in Proof-Based Development of Systems 2014
- Ontology-Based Workflow Design for the Coordination of Homecare Interventions 2014
- Orthogonal Direct Sum Masking 2014
- PDP 4PS : Periodic-Delayed Protocol for Partitioned Systems 2014
- QoS-Aware Complex Event Service Composition and Optimization Using Genetic Algorithms 2014
- Querying Geometric Figures Using a Controlled Language, Ontological Graphs and Dependency Lattices 2014
- Revisiting the Performance of the Modular Clock Algorithm for Distributed Blind Rendezvous in Cognitive Radio Networks 2014
- Semantic Heterogeneity in the Formal Development of Complex Systems: An Introduction 2014
- Setting up Clusters of Computing Units to Process Several Data Streams Efficiently 2014
- The Investigation of Different Factors to Optimize the Simulation of 3D Mass Models in Breast Tomosynthesis 2014
- Towards Automated Business Process Deduction through a Social and Collaborative Platform 2014
- Towards Formal Modelling and Verification of Pervasive Computing Systems 2014
- Towards Formal Modelling and Verification of Pervasive Computing Systems 2014
- Uncertainty in Crowd Data Sourcing Under Structural Constraints 2014
- Upper Body Animation Synthesis for a Laughing Character 2014
- A Cross Layer Balanced Routing Protocol for Differentiated Traffics over Mobile Ad Hoc Networks 2013
- A Dense Deformation Field for Facial Expression Analysis in Dynamic Sequences of 3D Scans 2013
- A Generic, Robust and Fully-Automatic Workflow for 3D CT Liver Segmentation 2013
- A Theoretical Model of User Engagement in Crowdsourcing 2013
- Adaptive Homing and Distinguishing Experiments for Nondeterministic Finite State Machines 2013
- Auditory Sketches: Sparse Representations of Sounds Based on Perceptual Models 2013
- Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation 2013
- Behavior Recognition for Elderly People in Large-Scale Deployment 2013
- Challenges, Experiences and Lessons Learned from Deploying Patient Monitoring and Assistance System at Dementia Care Hostel 2013
- Checking Compatibility of Web Services Behaviorally 2013
- Contextual Bandits for Context-Based Information Retrieval 2013
- Data Ranking and Clustering via Normalized Graph Cut Based on Asymmetric Affinity 2013
- Descriptive Profiles for Sets of Alternatives in Multiple Criteria Decision Aid 2013
- Discovering Multi-stage Attacks Using Closed Multi-dimensional Sequential Pattern Mining 2013
- Efficient Online Novelty Detection in News Streams 2013
- Fusion of Novel Iris Segmentation Quality Metrics for Failure Detection 2013
- Intelligent and Adaptive Crawling of Web Applications for Web Archiving 2013
- Internet of Things 2013
- Learning from M/EEG Data with Variable Brain Activation Delays 2013
- Mathematical Morphology Operators over Concept Lattices 2013
- Model-Based Image Interpretation under Uncertainty and Fuzziness 2013
- Model-Driven Extraction and Analysis of Network Security Policies 2013
- Modeling Multimodal Behaviors from Speech Prosody 2013
- Monitoring the Habits of Elderly People through Data Mining from Home Automation Devices Data 2013
- On the Connections between Relational and XML Probabilistic Data Models 2013
- QoCIM: A Meta-model for Quality of Context 2013
- Runtime Function Instrumentation with EZTrace 2013
- Space-Time Pose Representation for 3D Human Action Recognition 2013
- Static Analysis Techniques to Verify Mutual Exclusion Situations within SysML Models 2013
- Stochastic Model of a Metastability-Based True Random Number Generator 2013
- The k-Separator Problem 2013
- Towards an Access-Control Metamodel for Web Content Management Systems 2013
- Two Bioinspired Methods for Dynamic Signatures Analysis 2013
- Using Multiple Data Stores in the Cloud: Challenges and Solutions 2013
- Verification of Reachability Properties for Time Petri Nets 2013
- Virtualizing Platforms 2013
- A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress 2012
- A Contextual-Bandit Algorithm for Mobile Context-Aware Recommender System 2012
- A Generic Framework for Service-Based Business Process Elasticity in the Cloud 2012
- A Semantic Plug&Play Based Framework for Ambient Assisted Living 2012
- A System for Web Widget Discovery Using Semantic Distance between User Intent and Social Tags 2012
- An Economic Agent Maximizing Cloud Provider Revenues under a Pay-as-you-Book Pricing Model 2012
- An Event-Based Packet Dropping Detection Scheme for Wireless Mesh Networks 2012
- Automatic Photoreceptor Detection in In-Vivo Adaptive Optics Retinal Images: Statistical Validation 2012
- Autonomic Nature-Inspired Eco-systems 2012
- Body Pixel Classification by Neural Network 2012
- Challenges for Advanced Security Monitoring – The MASSIF Project 2012
- Combined CAC and Forced Handoff for Mobile Network Performability 2012
- Constrained Closed Non Derivable Data Cubes 2012
- Design of a Shared-Memory Model for CAPE 2012
- Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses 2012
- Detecting Overlapping Communities in Location-Based Social Networks 2012
- Does Location Help Daily Activity Recognition? 2012
- Exploiting the Social and Semantic Web for Guided Web Archiving 2012
- Exploration / Exploitation Trade-Off in Mobile Context-Aware Recommender Systems 2012
- High Performance Checksum Computation for Fault-Tolerant MPI over Infiniband 2012
- INCOME – Multi-scale Context Management for the Internet of Things 2012
- Individual Countermeasure Selection Based on the Return On Response Investment Index 2012
- Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation 2012
- Monadic Datalog Containment 2012
- Multi-modal Non-intrusive Sleep Pattern Recognition in Elder Assistive Environment 2012
- OVIDIUS: A Web Platform for Video Browsing and Search 2012
- On Semantics in Onto-DIY 2012
- Personalized Healthcare Self-management Using Social Persuasion 2012
- Preventing the Cluster Formation Attack against the Hierarchical OLSR Protocol 2012
- Real-Time 3D Motion Capture by Monocular Vision and Virtual Rendering 2012
- Retrieval of Multiple Instances of Objects in Videos 2012
- Reusing Pattern Solutions in Modeling: A Generic Approach Based on a Role Language 2012
- Scalability Issues in Designing and Implementing Semantic Provenance Management Systems 2012
- Semantic Reasoning in Context-Aware Assistive Environments to Support Ageing with Dementia 2012
- Some Experimental Results Relevant to the Optimization of Configuration and Planning Problems 2012
- Sound Environment Analysis in Smart Home 2012
- Towards Large-Scale Network Virtualization 2012
- Towards a Scalable Semantic Provenance Management System 2012
- Trust-orBAC: A Trust Access Control Model in Multi-Organization Environments 2012
- Urban Traffic Modelling and Prediction Using Large Scale Taxi GPS Traces 2012
- Using Requirements Engineering in an Automatic Security Policy Derivation Process 2012
- Whispering Interactions to the End User Using Rules 2012
- A Fast Solver for Truncated-Convex Priors: Quantized-Convex Split Moves 2011
- A Fuzzy Similarity Based Image Segmentation Scheme Using Self-organizing Map with Iterative Region Merging 2011
- A Quality of Experience Based Approach for Wireless Mesh Networks 2011
- Animating a Conversational Agent with User Expressivity 2011
- Automatic Task Resolution and Adaptation in Pervasive Environments 2011
- Cache Location in Tree Networks: Preliminary Results 2011
- Clustering Rankings in the Fourier Domain 2011
- Cross Layer Simulation: Application to Performance Modelling of Networks Composed of MANETs and Satellites 2011
- Direct Spherical Parameterization of 3D Triangular Meshes Using Local Flattening Operations 2011
- Evaluation of in vivo Liver Tissue Characterization with Spectral RF Analysis versus Elasticity 2011
- FIRE: Fault Injection for Reverse Engineering 2011
- Handling User Interface Plasticity in Assistive Environment: UbiSMART Framework 2011
- Heterogeneous Multi-sensor Fusion Based on an Evidential Network for Fall Detection 2011
- High Level Video Temporal Segmentation 2011
- Improving Clustering Techniques in Wireless Sensor Networks Using Thinning Process 2011
- Interplay between Security Providers, Consumers, and Attackers: A Weighted Congestion Game Approach 2011
- MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies 2011
- Mining Classification Rules without Support: an Anti-monotone Property of Jaccard Measure 2011
- Multi-feature Statistical Nonrigid Registration Using High-Dimensional Generalized Information Measures 2011
- On Traffic Domination in Communication Networks 2011
- Optical Metropolitan Networks: Packet Format, MAC Protocols and Quality of Service 2011
- Performance of Multicast Packet Aggregation in All Optical Slotted Networks 2011
- Physical Activity Monitoring with Mobile Phones 2011
- Precise Registration of 3D Images Acquired from a Hand-Held Visual Sensor 2011
- SWRL-Based Context Awareness for Application Servers Hosting Digital Services 2011
- Session-Based Role Programming for the Design of Advanced Telephony Applications 2011
- Towards QoC-Aware Location-Based Services 2011
- Trust Evaluation through Human-Machine Dialogue Modelling 2011
- Using Testing Techniques for Vulnerability Detection in C Programs 2011
- eGovernment Trends in the Web 2.0 Era and the Open Innovation Perspective: An Exploratory Field Study 2011
- 3D Vector Flow Guided Segmentation of Airway Wall in MSCT 2010
- A Fault Injection Tool for Testing Web Services Composition 2010
- A Flexible Privacy and Trust Based Context-Aware Secure Framework 2010
- A Robustness Measure of Association Rules 2010
- A Server-Assisted Approach for Mobile-Phone Games 2010
- A Service Dependency Model for Cost-Sensitive Intrusion Response 2010
- ASRBAC: A Security Administration Model for Mobile Autonomic Networks (MAutoNets) 2010
- Accuracy of Strong and Weak Comparisons for Network of Queues 2010
- Activity Recognition on an Accelerometer Embedded Mobile Phone with Varying Positions and Orientations 2010
- An Alternate Topology Generator for Joint Study of Power Grids and Communication Networks 2010
- Approximability of 3- and 4-Hop Bounded Disjoint Paths Problems 2010
- Collaborative Filtering Technique for Web Service Recommendation Based on User-Operation Combination 2010
- Contextual Privacy Management in Extended Role Based Access Control Model 2010
- Document Provenance in the Cloud: Constraints and Challenges 2010
- Inferring User Search Intention Based on Situation Analysis of the Physical World 2010
- Informed Source Separation Using Latent Components 2010
- MDA Tool for Telecom Service Functional Design 2010
- Measurement of the Skin-Liver Capsule Distance on Ultrasound RF Data for 1D Transient Elastography 2010
- Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking 2010
- On a Conjecture about Binary Strings Distribution 2010
- Satisfaction and Coherence of Deadline Constraints in Inter-Organizational Workflows 2010
- Searching Aligned Groups of Objects with Fuzzy Criteria 2010
- Shaping Future Service Environments with the Cloud and Internet of Things: Networking Challenges and Service Evolution 2010
- Spatial Statistics of Visual Keypoints for Texture Recognition 2010
- Stochastic Comparisons for Performability of Telecommunication Systems 2010
- Towards Non-intrusive Sleep Pattern Recognition in Elder Assistive Environment 2010
- Towards a Service Delivery Based on Customer eXperience Ontology: Shift from Service to eXperience 2010
- Unobtrusive Sleep Posture Detection for Elder-Care in Smart Home 2010
- 2D Face Recognition in the IV2 Evaluation Campaign 2009
- A Distributed Exact Solution to Compute Inter-domain Multi-constrained Paths 2009
- A Model-Driven Approach for Telecommunications Network Services Definition 2009
- A Quality of Service Based Mobility Management in Heterogenous Wireless Networks 2009
- A Statistical Approach to Test Stochastic and Probabilistic Systems 2009
- An Extended Role-Based Access Control Model for Delegating Obligations 2009
- Approximate Parallelism between Fuzzy Objects: Some Definitions 2009
- Autonomic Virtual Routers for the Future Internet 2009
- Bayesian Maximal Paths for Coronary Artery Segmentation from 3D CT Angiograms 2009
- Biometric Identification over Encrypted Data Made Feasible 2009
- Building Secure Resources to Ensure Safe Computations in Distributed and Potentially Corrupted Environments 2009
- Conceptual Modeling for System Requirements Enhancement 2009
- Coronary Occlusion Detection with 4D Optical Flow Based Strain Estimation on 4D Ultrasound 2009
- Fingerprint and On-Line Signature Verification Competitions at ICB 2009 2009
- Gesture Recognition with a 3-D Accelerometer 2009
- Inverse Analysis from a Condorcet Robustness Denotation of Valued Outranking Relations 2009
- Management Tool for Semantic Annotations in WSDL 2009
- Modeling Multimodal Interaction for Performance Evaluation 2009
- Modeling, Validation, and Verification of PCEP Using the IF Language 2009
- Observability and Controllability Issues in Conformance Testing of Web Service Compositions 2009
- On Optimal Rule Mining: A Framework and a Necessary and Sufficient Condition of Antimonotonicity 2009
- On the Operational Security Assurance Evaluation of Networked IT Systems 2009
- Optimization of Transmission Power in Competitive Wireless Networks 2009
- Reference Based Contrast Functions in a Semi-blind Context 2009
- Robust 3D Face Tracking on Unknown Users with Dynamical Active Models 2009
- Robust and Efficient Routing in Wireless Mesh Networks with Unreliable Nodes 2009
- Supervision of Autonomous Vehicles: Mutual Modeling and Interaction Management 2009
- Surfing Peer-to-Peer IPTV: Distributed Channel Switching 2009
- Symbolic Abstraction and Deadlock-Freeness Verification of Inter-enterprise Processes 2009
- The Metalist Model: A Simple and Extensible Information Model for the Future Internet 2009
- Towards a Task Supporting System with CBR Approach in Smart Home 2009
- Understanding and Preventing Tacit Collusion among Telecommunication Operators 2009
- WIFE: Wireless Indoor Positioning Based on Fingerprint Evaluation 2009
- Weaving Variability into Domain Metamodels 2009
- Design of a Smart Continence Management System Based on Initial User Requirement Assessment 2008
- HYCARE: A Hybrid Context-Aware Reminding Framework for Elders with Mild Dementia 2008
- 3D Face Recognition Evaluation on Expressive Faces Using the IV 2 Database 2008
- A Comparison of Different Off-Centered Entropies to Deal with Class Imbalance for Decision Trees 2008
- A Low Cost Incremental Biometric Fusion Strategy for a Handheld Device 2008
- Authority Sharing in a Swarm of UAVs: Simulation and Experiments with Operators 2008
- Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking 2008
- GpuCV: A GPU-Accelerated Framework for Image Processing and Computer Vision 2008
- OMIE: Ontology Mapping within an Interactive and Extensible Environment 2008
- Optimizing Multi-hop Queries in ZigBee Based Multi-sink Sensor Networks 2008
- Revocation Schemes for Delegation Licences 2008
- Style-Based Model Transformation for Early Extrafunctional Analysis of Distributed Systems 2008
- Quality-of-Service Multicast Overlay Spanning Tree Algorithms for Wireless Ad Hoc Networks 2007
- A New Resilient Key Management Protocol for Wireless Sensor Networks 2007
- Using PANA for Mobile IPv6 Bootstrapping 2007
- Workflow Abstraction for Privacy Preservation 2007
- Assessment of Airway Remodeling in Asthma: Volumetric Versus Surface Quantification Approaches 2006
- Behavioral Technique for Workflow Abstraction and Matching 2006
- CT Hepatic Venography: 3D Vascular Segmentation for Preoperative Evaluation 2005
- Modeling of the Residual Capability for People with Severe Motor Disabilities: Analysis of Hand Posture 2005
- Toward Feasibility and Scalability of Session Initiation and Dynamic QoS Provisioning in Policy-Enabled Networks 2005
- Physiopathology of Pulmonary Airways: Automated Facilities for Accurate Assessment 2004
- 3D Automated Lung Nodule Segmentation in HRCT 2003
- Maximum Entropy Models for Skin Detection 2003
- Measuring Myocardial Deformations in Tagged MR Image Sequences Using Informational Non-rigid Registration 2003