top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Runtime verification : second International Conference, RV 2011, San Francisco, CA, USA, September 27-30, 2011, Revised selected papers / Sarfraz Khurshid, Koushik Sen (eds.).
Runtime verification : second International Conference, RV 2011, San Francisco, CA, USA, September 27-30, 2011, Revised selected papers / Sarfraz Khurshid, Koushik Sen (eds.).
Creatore [RV (Conference) (2nd : 2011 : San Francisco, Calif.)]
Estensione 1 online resource (xii, 458 pages).
Disciplina 005.1/4
Accesso persona Khurshid, Sarfraz
Sen, Koushik
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Software engineering
Computer software
Logic design
Algorithm Analysis and Problem Complexity
Logics and Meanings of Programs
Programming Techniques
Programming Languages, Compilers, Interpreters
Mathematical Logic and Formal Languages
ISBN 9783642298608
3642298605
3642298591
9783642298592
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Internal versus External DSLs for Trace Analysis / (Extended Abstract) / Howard Barringer and Klaus Havelund -- Predicting Concurrency Failures in the Generalized Execution Traces of x86 Executables / Chao Wang and Malay Ganai -- Runtime Monitoring of Time-Sensitive Systems / [Tutorial Supplement] / Borzoo Bonakdarpour and Sebastian Fischmeister -- Teaching Runtime Verification / Martin Leucker -- Runtime Verification: A Computer Architecture Perspective / Sharad Malik -- Isolating Determinism in Multi-threaded Programs / Lukasz Ziarek, Siddharth Tiwary and Suresh Jagannathan -- Efficiency Optimizations for Implementations of Deadlock Immunity / Horatiu Jula, Silviu Andrica and George Candea -- Permission Regions for Race-Free Parallelism / Edwin Westbrook, Jisheng Zhao, Zoran Budimlić and Vivek Sarkar -- Dynamic Race Detection with LLVM Compiler / Compile-Time Instrumentation for ThreadSanitizer / Konstantin Serebryany, Alexander Potapenko, Timur Iskhodzhanov and Dmitriy Vyukov -- NORT: Runtime Anomaly-Based Monitoring of Malicious Behavior for Windows / Narcisa Andreea Milea, Siau Cheng Khoo, David Lo and Cristian Pop -- Runtime Verification of LTL-Based Declarative Process Models / Fabrizio Maria Maggi, Michael Westergaard, Marco Montali and Wil M.P. van der Aalst -- Parametric Identification of Temporal Properties / Eugene Asarin, Alexandre Donzé, Oded Maler and Dejan Nickovic.
Marathon: Detecting Atomic-Set Serializability Violations with Conflict Graphs / William N. Sumner, Christian Hammer and Julian Dolby -- Coverage Metrics for Saturation-Based and Search-Based Testing of Concurrent Software / Bohuslav Křena, Zdeněk Letko and Tomáš Vojnar -- Runtime Verification with State Estimation / Scott D. Stoller, Ezio Bartocci, Justin Seyster, Radu Grosu and Klaus Havelund, et al. -- Efficient Techniques for Near-Optimal Instrumentation in Time-Triggered Runtime Verification / Samaneh Navabpour, Chun Wah Wallace Wu, Borzoo Bonakdarpour and Sebastian Fischmeister -- CoMA: Conformance Monitoring of Java Programs by Abstract State Machines / Paolo Arcaini, Angelo Gargantini and Elvinia Riccobene -- Automated Test-Trace Inspection for Microcontroller Binary Code / Thomas Reinbacher, Jörg Brauer, Daniel Schachinger, Andreas Steininger and Stefan Kowalewski -- What Is My Program Doing? Program Dynamics in Programmer's Terms / Steven P. Reiss and Alexander Tarvo -- Algorithms for Monitoring Real-Time Properties / David Basin, Felix Klaedtke and Eugen Zălinescu -- Runtime Monitoring of Stochastic Cyber-Physical Systems with Hybrid State / A. Prasad Sistla, Miloš Žefran and Yao Feng -- Combining Time and Frequency Domain Specifications for Periodic Signals / Aleksandar Chakarov, Sriram Sankaranarayanan and Georgios Fainekos -- Runtime Verification for Ultra-Critical Systems / Lee Pike, Sebastian Niller and Nis Wegmann.
Runtime Verification of Data-Centric Properties in Service Based Systems / Guoquan Wu, Jun Wei, Chunyang Ye, Xiaozhe Shao and Hua Zhong, et al. -- Cooperative Concurrency for a Multicore World / (Extended Abstract) / Jaeheon Yi, Caitlin Sadowski, Stephen N. Freund and Cormac Flanagan -- Monitoring Data Structures Using Hardware Transactional Memory / Shakeel Butt, Vinod Ganapathy, Arati Baliga and Mihai Christodorescu -- MONPOLY: Monitoring Usage-Control Policies / David Basin, Matúš Harvan, Felix Klaedtke and Eugen Zălinescu -- MOPBox: A Library Approach to Runtime Verification (Tool Demonstration) / Eric Bodden -- Elarva: A Monitoring Tool for Erlang / Christian Colombo, Adrian Francalanza and Rudolph Gatt -- DA-BMC: A Tool Chain Combining Dynamic Analysis and Bounded Model Checking / Jan Fiedor, Vendula Hrubá, Bohuslav Křena and Tomáš Vojnar -- Monitoring Finite State Properties: Algorithmic Approaches and Their Relative Strengths / Rahul Purandare, Matthew B. Dwyer and Sebastian Elbaum -- Unbounded Symbolic Execution for Program Verification / Joxan Jaffar, Jorge A. Navas and Andrew E. Santosa -- Execution Trace Exploration and Analysis Using Ontologies / Newres Al Haider, Benoit Gaudin and John Murphy -- Monitoring Realizability / Rüdiger Ehlers and Bernd Finkbeiner -- Runtime Verification of Traces under Recording Uncertainty / Shaohui Wang, Anaheed Ayoub, Oleg Sokolsky and Insup Lee.₉
Record Nr. NYU-004375279
[RV (Conference) (2nd : 2011 : San Francisco, Calif.)]  
Materiale a stampa
Lo trovi qui: New York University
Mobile and ubiquitous systems: Computing, networking, and services : 8th International ICST Conference, MobiQuitous 2011, Copenhagen, Denmark, December 6-9, 2011, Revised selected papers / Alessandro Puiatti, Tao Gu (eds.).
Mobile and ubiquitous systems: Computing, networking, and services : 8th International ICST Conference, MobiQuitous 2011, Copenhagen, Denmark, December 6-9, 2011, Revised selected papers / Alessandro Puiatti, Tao Gu (eds.).
Creatore [International Conference on Mobile and Ubiquitous Systems : Computing, Networking, and Services (8th : 2011 : Copenhagen, Demark)]
Estensione 1 online resource.
Disciplina 004
Accesso persona Puiatti, Alessandro
Gu, Tao.
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Computer software
Information storage and retrieval systems
Artificial intelligence
Information Systems Applications (incl. Internet)
Algorithm Analysis and Problem Complexity
Information Storage and Retrieval
ISBN 9783642309731
3642309739
3642309720
9783642309724
Classificazione 54.32
54.80
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1. Localization and Tracking -- Social Geoscape: Visualizing an Image of the City for Mobile UI Using User Generated Geo-Tagged Objects / Koh Sueda, Takashi Miyaki and Jun Rekimoto -- On the Spatio-temporal Information Content and Arithmetic Coding of Discrete Trajectories / Markus Koegel and Martin Mauve -- A Proposal on Direction Estimation between Devices Using Acoustic Waves / Yasutaka Nishimura, Naoki Imai and Kiyohito Yoshihara -- Part 2. Best Paper Session -- Using SIFT and WiFi Signals to Provide Location-Based Services for Smartphones / Antonio J. Ruiz-Ruiz, Oscar Canovas, Ruben A. Rubio Muñoz and Pedro E. Lopez-de-Teruel Alcolea -- What's around Me? Spatialized Audio Augmented Reality for Blind Users with a Smartphone / Jeffrey R. Blum, Mathieu Bouchard and Jeremy R. Cooperstock -- Real-Time Detection of Anomalous Taxi Trajectories from GPS Traces / Chao Chen, Daqing Zhang, Pablo Samuel Castro, Nan Li and Lin Sun, et al. -- Scalable Data Processing for Community Sensing Applications / Heitor Ferreira, Sérgio Duarte, Nuno Preguiça and David Navalho -- Part 3. Search and Discovery -- Gander: Personalizing Search of the Here and Now / Jonas Michel, Christine Julien, Jamie Payton and Gruia-Catalin Roman.
A Mean-Variance Based Index for Dynamic Context Data Lookup / Shubhabrata Sen and Hung Keng Pung -- HiCHO: Attributes Based Classification of Ubiquitous Devices / Shachi Sharma, Shalini Kapoor, Bharat R. Srinivasan and Mayank S. Narula -- Part 4. Classification and Profiling -- On the Effects of Input Unreliability on Classification Algorithms / Ardjan Zwartjes, Majid Bahrepour, Paul J.M. Havinga, Johann L. Hurink and Gerard J.M. Smit -- Unsupervised Power Profiling for Mobile Devices / Mikkel Baun Kjærgaard and Henrik Blunck -- Towards a New Classification of Location Privacy Methods in Pervasive Computing / Mads Schaarup Andersen and Mikkel Baun Kjærgaard -- Part 5. Industry Track -- A Simulation Model for Evaluating Distributed Storage Services for Smart Product Systems / Markus Miche, Kai Baumann, Jerome Golenzer and Marc Brogle -- Instance-Informed Information Systems: A Pre-requisite for Energy-Efficient and Green Information Systems / Kary Främling, Jan Nyman, André Kaustell and Jan Holmström -- SenseBox -- A Generic Sensor Platform for the Web of Things / Arne Bröring, Albert Remke and Damian Lasnia -- Analysis of Data from a Taxi Cab Participatory Sensor Network / Raghu Ganti, Iqbal Mohomed, Ramya Raghavendra and Anand Ranganathan.
Part 6: Poster and Demo -- POSTER Adaptive OSGi-Based Context Modeling for Android / Darren Carlson and Andreas Schrader -- POSTER Towards Proactive Adaptation in Pervasive Environments / Sebastian VanSyckel, Gregor Schiele and Christian Becker -- POSTER Zero-Configuration Path Loss Model-Based Indoor Localization / Ryangsoo Kim, Wooyeol Choi, Hyuk Lim and Jae-Hyung Jang -- POSTER Towards a Privacy -- Respectful Telematic Verification System for Vehicle and Driver Authorizations / Ana I. González-Tablas, Almudena Alcaide, Guillermo Suarez-Tangil, José M. de Fuentes and Israel Barroso-Perez -- POSTER IPS: A Ubiquitous Indoor Positioning System / Moustafa Alzantot, Reem Elkhouly, Amal Lotfy and Moustafa Youssef -- POSTER An Embedded Fusion System for Location Management / Eduardo Metola and Ana M. Bernardos -- DEMO MultiCAMBA: A System to Assist in the Broadcasting of Sport Events / Roberto Yus, David Antón, Eduardo Mena, Sergio Ilarri and Arantza Illarramendi -- DEMO Classroom7: Please, Make Sure Your Phones Are Switched On! / Moustafa Alzantot, Muhammad Hataba and Moustafa Youssef -- Part 7. Wireless Communication and Routing.
ZigBee-Assisted WiFi Transmission for Multi-interface Mobile Devices / Hua Qin, Yanfei Wang and Wensheng Zhang -- A Dynamic and Distributed Addressing and Routing Protocol for Wireless Sensor Networks / Tomás Sánchez López and Gonzalo Huerta-Canepa -- Neuron Inspired Collaborative Transmission in Wireless Sensor Networks / Stephan Sigg, Predrag Jakimovski, Florian Becker, Hedda R. Schmidtke and Alexander Neumann, et al. -- Part 8. Context Awareness and Architecture -- Minimizing the Side Effect of Context Inconsistency Resolution for Ubiquitous Computing / Chang Xu, Xiaoxing Ma, Chun Cao and Jian Lu -- Activity-Oriented Context Adaptation in Mobile Applications / Jan D.S. Wischweh and Dirk Bade -- PINtext: A Framework for Secure Communication Based on Context / Stephan Sigg, Dominik Schuermann and Yusheng Ji -- In Search of an Internet of Things Service Architecture: REST or WS-*? A Developers' Perspective / Dominique Guinard, Iulia Ion and Simon Mayer -- Part 9. Location and Activity Recognition -- Towards Meeting Assistance: An Integrated Appointment Assistance and Group Pedestrian Navigation System / Bjoern Zenker, Viktor Pyatkovka and Christian Drabek -- Recognizing Group Activities Using Wearable Sensors / Dawud Gordon, Jan-Hendrik Hanne, Martin Berchtold, Takashi Miyaki and Michael Beigl.
Record Nr. NYU-004375407
[International Conference on Mobile and Ubiquitous Systems : Computing, Networking, and Services (8th : 2011 : Copenhagen, Demark)]  
Materiale a stampa
Lo trovi qui: New York University
Fun with algorithms : 6th International Conference, FUN 2012, Venice, Italy, June 4-6, 2012. Proceedings / Evangelos Kranakis, Danny Krizanc, Flaminia Luccio (eds.).
Fun with algorithms : 6th International Conference, FUN 2012, Venice, Italy, June 4-6, 2012. Proceedings / Evangelos Kranakis, Danny Krizanc, Flaminia Luccio (eds.).
Creatore [FUN (Conference) (6th : 2012 : Venice, Italy)]
Estensione 1 online resource.
Disciplina 518/.1
Accesso persona Kranakis, Evangelos
Krizanc, Danny
Luccio, Flaminia, 1969-
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data structures (Computer science)
Computer software
Computational complexity
Artificial intelligence
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Data Structures
Computation by Abstract Devices
ISBN 9783642303470
3642303471
3642303463
9783642303463
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Distributed Algorithms by Forgetful Mobile Robots / Paola Flocchini -- Stability and Metastability of the Logit Dynamics of Strategic Games / Giuseppe Persiano -- Art Galleries, k-modems, and k-convexity / Jorge Urrutia -- The Vulcan Game of Kal-Toh: Finding or Making Triconnected Planar Subgraphs / Terry Anderson and Therese Biedl -- Scandinavian Thins on Top of Cake: On the Smallest One-Size-Fits-All Box / Esther M. Arkin, Alon Efrat, George Hart, Irina Kostitsyna and Alexander Kröller, et al. -- The Kissing Problem: How to End a Gathering When Everyone Kisses Everyone Else Goodbye / Michael A. Bender, Ritwik Bose, Rezaul Chowdhury and Samuel McCauley -- Mad at Edge Crossings? Break the Edges! / Till Bruckdorfer and Michael Kaufmann -- Train Marshalling Is Fixed Parameter Tractable / Leo Brueggeman, Michael Fellows, Rudolf Fleischer, Martin Lackner and Christian Komusiewicz, et al. -- Conflict-Free Graph Orientations with Parity Constraints / Sarah Cannon, Mashhood Ishaque and Csaba D. Tóth -- The Multi-interval Ulam-Rényi Game / Ferdinando Cicalese -- Picture-Hanging Puzzles / Erik D. Demaine, Martin L. Demaine, Yair N. Minsky, Joseph S.B. Mitchell and Ronald L. Rivest, et al.
Optimal Sensor Networks for Area Monitoring Using Rotating and Beam Sensors / Stefan Dobrev, Lata Narayanan and Jaroslav Opatrny -- The Byzantine Brides Problem / Swan Dubois, Sébastien Tixeuil and Nini Zhu -- Lean Programs, Branch Mispredictions, and Sorting / Amr Elmasry and Jyrki Katajainen -- On Computer Integrated Rationalized Crossword Puzzle Manufacturing / Jakob Engel, Markus Holzer, Oliver Ruepp and Frank Sehnke -- Solving Single-Digit Sudoku Subproblems / David Eppstein -- Finding Good Coffee in Paris / Paola Flocchini, Matthew Kellett, Peter C. Mason and Nicola Santoro -- To Satisfy Impatient Web Surfers Is Hard / Fedor V. Fomin, Frédéric Giroire, Alain Jean-Marie, Dorian Mazauric and Nicolas Nisse -- Making Life Easier for Firefighters / Fedor V. Fomin, Pinar Heggernes and Erik Jan van Leeuwen -- Counting Perfect Matchings in Graphs of Degree 3 / Martin Fürer -- M.C. Escher Wrap Artist: Aesthetic Coloring of Ribbon Patterns / Ellen Gethner, David G. Kirkpatrick and Nicholas J. Pippenger -- On the Complexity of Rolling Block and Alice Mazes / Markus Holzer and Sebastian Jakobi -- Grid Graphs with Diagonal Edges and the Complexity of Xmas Mazes / Markus Holzer and Sebastian Jakobi.
Algorithms and Complexity of Generalized River Crossing Problems / Hiro Ito, Stefan Langerman and Yuichi Yoshida -- Solving Tantrix via Integer Programming / Fumika Kino and Yushi Uno -- Scrabble Is PSPACE-Complete / Michael Lampis, Valia Mitsou and Karolina Sołtys -- Practical Algorithms for Generating a Random Ordering of the Elements of a Weighted Set / Kevin J. Lang -- Spanning Trees and the Complexity of Flood-Filling Games / Kitty Meeks and Alexander Scott -- Tron, a Combinatorial Game on Abstract Graphs / Tillmann Miltzow -- Divorcing Made Easy / Kirk Pruhs and Gerhard J. Woeginger -- A New Analysis of Best Fit Bin Packing / Jiří Sgall -- The Coolest Order of Binary Strings / Brett Stevens and Aaron Williams -- Hitori Number / Akira Suzuki, Kei Uchizawa and Takeaki Uno -- Computing Maximum Hamiltonian Paths in Complete Graphs with Tree Metric / Wojciech Rytter and Bartosz Szreder -- Gaming Is a Hard Job, But Someone Has to Do It! / Giovanni Viglietta -- Hardness of Mastermind / Giovanni Viglietta -- Scienceography: The Study of How Science Is Written / Graham Cormode, S. Muthukrishnan and Jinyun Yan.
Record Nr. NYU-004375467
[FUN (Conference) (6th : 2012 : Venice, Italy)]  
Materiale a stampa
Lo trovi qui: New York University
Information security and privacy research : 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings / Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou (eds.).
Information security and privacy research : 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings / Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou (eds.).
Creatore [IFIP TC11 International Conference on Information Security (27th : 2012 : Ērakleion, Greece)]
Estensione 1 online resource.
Disciplina 005.8
Accesso persona Gritzalis, Dimitris
Furnell, Steven, 1970-
Theoharidou, Marianthi
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data encryption (Computer science)
Computer software
Information Systems
Management of Computing and Information Systems
Data Encryption
Computers and Society
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
ISBN 9783642304361
3642304362
3642304354
9783642304354
Classificazione 54.62
54.32
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Relay Attacks on Secure Element-Enabled Mobile Devices / Virtual Pickpocketing Revisited / Michael Roland, Josef Langer and Josef Scharinger -- Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) / Alessandro Armando, Alessio Merlo, Mauro Migliardi and Luca Verderame -- An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling / Bernhard J. Berger and Karsten Sohr -- Embedded Eavesdropping on Java Card / Guillaume Barbu, Christophe Giraud and Vincent Guerin -- Authenticated Key Exchange (AKE) in Delay Tolerant Networks / Sofia Anna Menesidou and Vasilios Katos -- OFELIA -- A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management / Alexandre B. Augusto and Manuel Eduardo Correia -- Smart OpenID: A Smart Card Based OpenID Protocol / Andreas Leicher, Andreas U. Schmidt and Yogendra Shah -- Peer to Peer Botnet Detection Based on Flow Intervals / David Zhao, Issa Traore, Ali Ghorbani, Bassam Sayed and Sherif Saad, et al. -- Towards a Universal Data Provenance Framework Using Dynamic Instrumentation / Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis and Sotiris Ioannidis -- Improving Flask Implementation Using Hardware Assisted In-VM Isolation / Baozeng Ding, Fufeng Yao, Yanjun Wu and Yeping He.
HyperForce: Hypervisor-enForced Execution of Security-Critical Code / Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg and Wouter Joosen -- RandHyp: Preventing Attacks via Xen Hypercall Interface / Feifei Wang, Ping Chen, Bing Mao and Li Xie -- Role Mining under Role-Usage Cardinality Constraint / John C. John, Shamik Sural, Vijayalakshmi Atluri and Jaideep S. Vaidya -- HIDE_DHCP: Covert Communications through Network Configuration Messages / Ruben Rios, Jose A. Onieva and Javier Lopez -- Handling Stateful Firewall Anomalies / Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia-Alfaro, Tarik Moataz and Xavier Rimasson -- A Framework for Threat Assessment in Access Control Systems / Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi and Luigi Logrippo -- Support for Write Privileges on Outsourced Data / Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi and Pierangela Samarati -- Malicious Users' Transactions: Tackling Insider Threat / Weihan Li, Brajendra Panda and Qussai Yaseen -- Privacy-Preserving Television Audience Measurement Using Smart TVs / George Drosatos, Aimilia Tasidou and Pavlos S. Efraimidis -- Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility / Christian Banse, Dominik Herrmann and Hannes Federrath.
Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition / Alexios Mylonas, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou and Dimitris Gritzalis -- Modeling Social Engineering Botnet Dynamics across Multiple Social Networks / Shuhao Li, Xiaochun Yun, Zhiyu Hao, Yongzheng Zhang and Xiang Cui, et al. -- Layered Analysis of Security Ceremonies / Giampaolo Bella and Lizzie Coles-Kemp -- A Small Depth-16 Circuit for the AES S-Box / Joan Boyar and René Peralta -- Formal Verification of the mERA-Based eServices with Trusted Third Party Protocol / Maria Christofi and Aline Gouget -- My Authentication Album: Adaptive Images-Based Login Mechanism / Amir Herzberg and Ronen Margulies -- Balancing Security and Usability of Local Security Mechanisms for Mobile Devices / Shuzhe Yang and Gökhan Bal -- Analyzing Value Conflicts for a Work-Friendly ISS Policy Implementation / Ella Kolkowska and Bart De Decker -- When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems / Gurpreet Dhillon, Tiago Oliveira, Santa Susarapu and Mário Caldeira -- Security-by-Contract for the OSGi Platform / Olga Gadyatskaya, Fabio Massacci and Anton Philippov -- Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis / Hyundo Park, Sung-Oh David Jung, Heejo Lee and Hoh Peter In.
Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds / Yulong Zhang, Min Li, Kun Bai, Meng Yu and Wanyu Zang -- Give Rookies A Chance: A Trust-Based Institutional Online Supplier Recommendation Framework / Han Jiao, Jixue Liu, Jiuyong Li and Chengfei Liu -- A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation / Giuseppe D'Acquisto, Marta Flamini and Maurizio Naldi -- Optimizing Network Patching Policy Decisions / Yolanta Beres and Jonathan Griffin -- A Risk Assessment Method for Smartphones / Marianthi Theoharidou, Alexios Mylonas and Dimitris Gritzalis -- Empirical Benefits of Training to Phishing Susceptibility / Ronald Dodge, Kathryn Coronges and Ericka Rovira -- Multi-modal Behavioural Biometric Authentication for Mobile Devices / Hataichanok Saevanee, Nathan L. Clarke and Steven M. Furnell -- Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks / Christoforos Ntantogian, Christos Xenakis and Ioannis Stavrakakis -- Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks / Yongge Wang -- Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains / Shaoying Cai, Yingjiu Li and Yunlei Zhao -- Enhanced Dictionary Based Rainbow Table / Vrizlynn L.L. Thing and Hwei-Ming Ying.
Authorization Policies for Materialized Views / Sarah Nait-Bahloul, Emmanuel Coquery and Mohand-Saïd Hacid -- Enhancing the Security of On-line Transactions with CAPTCHA Keyboard / Yongdong Wu and Zhigang Zhao -- Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach / Xin Kang and Yongdong Wu -- A Framework for Anonymizing GSM Calls over a Smartphone VoIP Network / Ioannis Psaroudakis, Vasilios Katos and Pavlos S. Efraimidis -- A Browser-Based Distributed System for the Detection of HTTPS Stripping Attacks against Web Pages / Marco Prandini and Marco Ramilli -- Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth System / Milica Milutinovic, Vincent Naessens and Bart De Decker -- Web Services Security Assessment: An Authentication-Focused Approach / Yannis Soupionis and Miltiadis Kandias -- Open Issues and Proposals in the IT Security Management of Commercial Ports: The S-PORT National Case / Nineta Polemi and Theodoros Ntouskas -- A Response Strategy Model for Intrusion Response Systems / Nor Badrul Anuar, Maria Papadaki, Steven Furnell and Nathan Clarke -- Intrusion Tolerance of Stealth DoS Attacks to Web Services / Massimo Ficco and Massimiliano Rak -- Towards Use-Based Usage Control / Christos Grompanopoulos and Ioannis Mavridis.
Record Nr. NYU-004375588
[IFIP TC11 International Conference on Information Security (27th : 2012 : Ērakleion, Greece)]  
Materiale a stampa
Lo trovi qui: New York University
Integrated formal methods : 9th International Conference, IFM 2012, Pisa, Italy, June 18-21, 2012. Proceedings / John Derrick [and others] (eds.).
Integrated formal methods : 9th International Conference, IFM 2012, Pisa, Italy, June 18-21, 2012. Proceedings / John Derrick [and others] (eds.).
Creatore [International Conference on Integrated Formal Methods (9th : 2012 : Pisa, Italy)]
Estensione 1 online resource (xii, 360 pages) : illustrations.
Disciplina 004.01/51
Accesso persona Derrick, John, 1963-
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Software engineering
Computer software
Logic design
Logics and Meanings of Programs
Programming Languages, Compilers, Interpreters
Mathematical Logic and Formal Languages
Programming Techniques
Algorithm Analysis and Problem Complexity
ISBN 9783642307294
3642307299
9783642307287
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contribution to a Rigorous Analysis of Web Application Frameworks / Egon Börger, Antonio Cisternino and Vincenzo Gervasi -- Process Algebra for Event-Driven Runtime Verification: A Case Study of Wireless Network Management / Muffy Calder and Michele Sevegnani -- Translating TLA+ to B for Validation with ProB / Dominik Hansen and Michael Leuschel -- Rely/Guarantee Reasoning for Teleo-reactive Programs over Multiple Time Bands / Brijesh Dongol and Ian J. Hayes -- Safety and Line Capacity in Railways -- An Approach in Timed CSP / Yoshinao Isobe, Faron Moller, Hoang Nga Nguyen and Markus Roggenbach -- Refinement-Based Development of Timed Systems / Jesper Berthing, Pontus Boström, Kaisa Sere, Leonidas Tsiopoulos and Jüri Vain -- Analysing and Closing Simulation Coverage by Automatic Generation and Verification of Formal Properties from Coverage Reports / Tim Blackmore, David Halliwell, Philip Barker, Kerstin Eder and Naresh Ramaram -- Model Checking as Static Analysis: Revisited / Fuyuan Zhang, Flemming Nielson and Hanne Riis Nielson -- Formal Verification of Compiler Transformations on Polychronous Equations / Van Chan Ngo, Jean-Pierre Talpin, Thierry Gautier, Paul Le Guernic and Loïc Besnard -- Understanding Programming Bugs in ANSI-C Software Using Bounded Model Checking Counter-Examples / Herbert Rocha, Raimundo Barreto, Lucas Cordeiro and Arilo Dias Neto -- MULE-Based Wireless Sensor Networks: Probabilistic Modeling and Quantitative Analysis / Fatemeh Kazemeyni, Einar Broch Johnsen, Olaf Owe and Ilangko Balasingham -- Mechanized Extraction of Topology Anti-patterns in Wireless Networks / Matthias Woehrle, Rena Bakhshi and Mohammad Reza Mousavi -- A Proof Framework for Concurrent Programs / Leonard Lensink, Sjaak Smetsers and Marko van Eekelen -- A UTP Semantics of pGCL as a Homogeneous Relation / Riccardo Bresciani and Andrew Butterfield -- Behaviour-Based Cheat Detection in Multiplayer Games with Event-B / HaiYun Tian, Phillip J. Brooke and Anne-Gwenn Bosser -- Refinement-Preserving Translation from Event-B to Register-Voice Interactive Systems / Denisa Diaconescu, Ioana Leustean, Luigia Petre, Kaisa Sere and Gheorghe Stefanescu -- Formal Modelling and Verification of Service-Oriented Systems in Probabilistic Event-B / Anton Tarasyuk, Elena Troubitsyna and Linas Laibinis -- Partially-Supervised Plants: Embedding Control Requirements in Plant Components / Jasen Markovski, Dirk A. van Beek and Jos Baeten -- Early Fault Detection in Industry Using Models at Various Abstraction Levels / Jozef Hooman, Arjan J. Mooij and Hans van Wezep -- PE-KeY: A Partial Evaluator for Java Programs / Ran Ji and Richard Bubel -- Specification-Driven Unit Test Generation for Java Generic Classes / Francisco Rebello de Andrade, João P. Faria, Antónia Lopes and Ana C.R. Paiva -- Specifying UML Protocol State Machines in Alloy / Ana Garis, Ana C.R. Paiva, Alcino Cunha and Daniel Riesco -- Patterns for a Log-Based Strengthening of Declarative Compliance Models / Dennis M.M. Schunselaar, Fabrizio M. Maggi and Natalia Sidorova -- A Formal Interactive Verification Environment for the Plan Execution Interchange Language / Camilo Rocha, Héctor Cadavid, César Muñoz and Radu Siminiceanu.
Record Nr. NYU-004375876
[International Conference on Integrated Formal Methods (9th : 2012 : Pisa, Italy)]  
Materiale a stampa
Lo trovi qui: New York University
RFID: Security and privacy : 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised selected papers / Ari Juels, Christof Paar (eds.).
RFID: Security and privacy : 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised selected papers / Ari Juels, Christof Paar (eds.).
Creatore [RFIDSec 2011 (2011 : Amherst, Mass.)]
Estensione 1 online resource (x, 201 pages) : illustrations.
Disciplina 621.3841/92
Accesso persona Juels, Ari.
Paar, Christof, 1963-
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Data protection
Data encryption (Computer science)
Computer software
Information Systems
Systems and Data Security
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Special Purpose and Application-Based Systems
ISBN 9783642252860
3642252869
9783642252853
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004373743
[RFIDSec 2011 (2011 : Amherst, Mass.)]  
Materiale a stampa
Lo trovi qui: New York University
Latent variable analysis and signal separation : 10th International Conference, LVA/ICA 2012, Tel Aviv, Israel, March 12-15, 2012. Proceedings / Fabian Theis [and others] (eds.).
Latent variable analysis and signal separation : 10th International Conference, LVA/ICA 2012, Tel Aviv, Israel, March 12-15, 2012. Proceedings / Fabian Theis [and others] (eds.).
Creatore [LVA/ICA 2012 (2012 : Tel Aviv, Israel)]
Estensione 1 online resource (xvi, 538 pages) : illustrations.
Disciplina 621.382/2
Accesso persona Theis, Fabian J.
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Software engineering
Computer software
Computational complexity
Computer simulation
Computer vision
Optical pattern recognition
Pattern Recognition
Image Processing and Computer Vision
Simulation and Modeling
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Special Purpose and Application-Based Systems
ISBN 9783642285516
3642285511
9783642285509
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Block Component Analysis, a New Concept for Blind Source Separation -- Partially Linear Estimation with Application to Image Deblurring Using Blurred/Noisy Image Pairs -- Causal Discovery for Linear Non-Gaussian Acyclic Models in the Presence of Latent Gaussian Confounders -- Alleviating the Influence of Weak Data Asymmetries on Granger-Causal Analyses -- Online PLCA for Real-Time Semi-supervised Source Separation -- Cramér-Rao Bound for Circular Complex Independent Component Analysis -- Complex Non-Orthogonal Joint Diagonalization Based on LU and LQ Decompositions -- Exact and Approximate Quantum Independent Component Analysis for Qubit Uncoupling -- A Matrix Joint Diagonalization Approach for Complex Independent Vector Analysis -- Algebraic Solutions to Complex Blind Source Separation -- On the Separation Performance of the Strong Uncorrelating Transformation When Applied to Generalized Covariance and Pseudo-covariance Matrices -- A Canonical Correlation Analysis Based Method for Improving BSS of Two Related Data Sets -- A Probability-Based Combination Method for Unsupervised Clustering with Application to Blind Source Separation -- Charrelation Matrix Based ICA -- Contrast Functions for Independent Subspace Analysis -- Distributional Convergence of Subspace Estimates in FastICA: A Bootstrap Study -- New Online EM Algorithms for General Hidden Markov Models. Application to the SLAM Problem -- The Role of Whitening for Separation of Synchronous Sources -- Simultaneous Diagonalization of Skew-Symmetric Matrices in the Symplectic Group.
Joint Block Diagonalization Algorithms for Optimal Separation of Multidimensional Components -- On Computation of Approximate Joint Block-Diagonalization Using Ordinary AJD -- Joint Diagonalization of Several Scatter Matrices for ICA -- To Infinity and Beyond: On ICA over Hilbert Spaces -- Regularized Sparse Representation for Spectrometric Pulse Separation and Counting Rate Estimation -- Some Uniqueness Results in Sparse Convolutive Source Separation -- Ternary Sparse Coding -- Closed-Form EM for Sparse Coding and Its Application to Source Separation -- Convolutive Underdetermined Source Separation through Weighted Interleaved ICA and Spatio-temporal Source Correlation -- Dictionary Learning with Large Step Gradient Descent for Sparse Representations -- Separation of Sparse Signals in Overdetermined Linear-Quadratic Mixtures -- Collaborative Filtering via Group-Structured Dictionary Learning -- Group Polytope Faces Pursuit for Recovery of Block-Sparse Signals -- Nonnegative Matrix Factorization via Generalized Product Rule and Its Application for Classification -- An Algebraic Method for Approximate Rank One Factorization of Rank Deficient Matrices -- Bayesian Non-negative Matrix Factorization with Learned Temporal Smoothness Priors -- On Connection between the Convolutive and Ordinary Nonnegative Matrix Factorizations -- On Revealing Replicating Structures in Multiway Data: A Novel Tensor Decomposition Approach -- An On-Line NMF Model for Temporal Pattern Learning: Theory with Application to Automatic Speech Recognition -- Low-Latency Instrument Separation in Polyphonic Audio Using Timbre Models.
Real-Time Speech Separation by Semi-supervised Nonnegative Matrix Factorization -- An Audio-Video Based IVA Algorithm for Source Separation and Evaluation on the AV16.3 Corpus -- Non-negative Matrix Factorization Based Noise Reduction for Noise Robust Automatic Speech Recognition -- Audio Imputation Using the Non-negative Hidden Markov Model -- A Non-negative Approach to Language Informed Speech Separation -- Temporally-Constrained Convolutive Probabilistic Latent Component Analysis for Multi-pitch Detection -- A Latently Constrained Mixture Model for Audio Source Separation and Localization -- Multiple Instrument Mixtures Source Separation Evaluation Using Instrument-Dependent NMF Models -- Complex Extension of Infinite Sparse Factor Analysis for Blind Speech Separation -- A General Framework for Online Audio Source Separation -- Sound Recognition in Mixtures -- The 2011 Signal Separation Evaluation Campaign (SiSEC2011): -- Audio Source Separation -- -- The 2011 Signal Separation Evaluation Campaign (SiSEC2011): -- Biomedical Data Analysis -- -- Improved Perceptual Metrics for the Evaluation of Audio Source Separation -- Musical Audio Source Separation Based on User-Selected F0 Track -- A GMM Sound Source Model for Blind Speech Separation in Under-determined Conditions -- Model-Driven Speech Enhancement for Multisource Reverberant Environment (Signal Separation Evaluation Campaign (SiSEC) 2011) -- Semi-blind Source Separation Based on ICA and Overlapped Speech Detection -- Nonparametric Modelling of ECG: Applications to Denoising and to Single Sensor Fetal ECG Extraction -- Nesterov's Iterations for NMF-Based Supervised Classification of Texture Patterns -- Detection of Aliasing in Image Sequences Using Nonlinear Factor Analysis -- Geometrical Method Using Simplicial Cones for Overdetermined Nonnegative Blind Source Separation: Application to Real PET Images -- Multi-domain Feature of Event-Related Potential Extracted by Nonnegative Tensor Factorization: 5 vs. 14 Electrodes EEG Data -- The Use of Linear Feature Projection for Precipitation Classification Using Measurements from Commercial Microwave Links -- Bayesian Inference of Latent Causes in Gene Regulatory Dynamics -- Bayesian Fuzzy Clustering of Colored Graphs.
Record Nr. NYU-004374078
[LVA/ICA 2012 (2012 : Tel Aviv, Israel)]  
Materiale a stampa
Lo trovi qui: New York University
Advances in computer science and information technology : computer science and information technology : second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings. Part III / Natarajan Meghanathan, Nabendu Chaki, Dhinaharan Nagamalai (eds.).
Advances in computer science and information technology : computer science and information technology : second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings. Part III / Natarajan Meghanathan, Nabendu Chaki, Dhinaharan Nagamalai (eds.).
Creatore [International Conference on Computer Science and Information Technology (2011- ) (2nd : 2012 : Bangalore, India)]
Estensione 1 online resource (xvii, 567 pages).
Disciplina 004
Accesso persona Meghanathan, Natarajan, 1977-
Chaki, Nabendu
Nagamalai, Dhinaharan
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Computer software
Information storage and retrieval systems
Artificial intelligence
Information Systems Applications (incl. Internet)
Artificial Intelligence (incl. Robotics)
Algorithm Analysis and Problem Complexity
Information Storage and Retrieval
ISBN 9783642273179
3642273173
3642273165
9783642273162
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1. Advances in Computer Science and Information Technology -- Driving Hazards Message Propagation Using Road Side Infrastructure in VANETs -- Policy Based Distributed Run Time Fault Diagnoser Model for Web Services -- The Reconstruction Conjecture -- Collaborative Framework for Distributed Computing in P2P Network -- Minimizing Boolean Sum of Products Functions Using Binary Decision Diagram -- Compression of Gray Scale Images Using Linear Prediction on Wavelet Coefficients -- An Innovative Approach to Association Rule Mining Using Graph and Clusters -- Policy Based Accounting for Web Services -- Fusion Based Linked Object Web Ranking for Social Networks -- Comparing Supervised Learning Classifiers to Detect Advanced Fee Fraud Activities on Internet -- Algebra of Geometric Filters Defined over Three Dimenisonal Rectangular Lattice-PartI -- Finite State Transducers Framework for Monitors Conflict Detection and Resolution -- Real Time Facial Expression Recognition -- Face Recognition System in Cell Phones Based on Text Message Service -- Requirements Volatility in Software Maintenance -- Information Security Measurement and E-Governance -- Comparison of Efficient and Rand Index Fitness Function for Clustering Gene Expression Data -- A Novel Hybrid Fuzzy Multi-Objective Evolutionary Algorithm: HFMOEA -- Testability Estimation Model (TEMOOD) -- Generation of All Spanning Trees in the Limelight -- A New Encryption Method for Secured Message Passing by Sorting Technique -- Algorithm for Constructing Complete Distributive Lattice of Polyhedrons Defined over Three Dimensional Rectangular Grid- Part II -- Enhancing the Network Security Using Lexicographic Game -- Spectral Characterization of Rank Filters Based Directional Textures of Digital Images Using Rajan Transform -- Enlargement of Clinical Stemmer in Hindi Language for Homoeopathy Province -- Fuzziness in Text Classification Using Different Similarity Metrics -- Image Compression over Low Channel Bandwidth -- Fuzzy Identification of Geometric Shapes -- Towards Perception Based Image Retrieval -- Estimation of f-Similarity in f-Triangles Using FIS -- Survey on Image Compression Techniques: Using CVIP Tools -- Developing Hindi POS Tagger for Homoeopathy Clinical Language -- Wireless Sensor Network Security -- Recent Developments in Scheduling and Allocation of High Level Synthesis -- Digital Signature of an Image by Elliptic Curve Cryptosystem -- Part 2. Ad Hoc and Ubiquitous Computing -- Mobile-Cloud: A Framework of Cloud Computing for Mobile Application -- The Effect of Design Patterns on Aspect Oriented Software Quality-An Empirical Evaluation -- A Novel Statistical Fusion Rule for Image Fusion in Non Subsampled Contourlet Transform Domain -- Maximizing Lifetime of Wireless Sensor Network through Extended LEACH Algorithm -- Intersection Area Based Geocasting Protocol (IBGP) for Vehicular Ad Hoc Networks -- Survey on H.264 Standard -- Self-configurable Processor Schedule Window Algorithm -- An Authenticated BSS Methodology for Data Security Using Steganography -- A Real Time Multivariate Robust Regression Based Flood Prediction Model Using Polynomial Approximation for Wireless Sensor Network Based Flood Forecasting Systems -- AODV Enhancement Based on the Minimization of Route-Request Packets -- Key Management for Group Based Mobile Ad Hoc Networks -- Optimal Clustering in Zone Based Protocol of Wireless Sensor Network -- Optimized FZ-LEACH Using Exponential Weighted Moving Average for Wireless Sensor Network -- IAMKeys: Independent and Adaptive Management of Keys for Security in Wireless Body Area Networks -- A Study on Various Deployment Schemes for Wireless Sensor Networks -- Spanning Tree Based Reliable Data Transmission in LEACH -- Image Deblurring Using Bayesian Framework -- Taxonomy and Control Measures of SPAM and SPIM -- A Distributed OFDM Polarizing Transmission via Broadcast Switching -- Multipath OLSR with Energy Optimization in Mobile Adhoc NETwork (MANET).
Record Nr. NYU-004374162
[International Conference on Computer Science and Information Technology (2011- ) (2nd : 2012 : Bangalore, India)]  
Materiale a stampa
Lo trovi qui: New York University
Topics in cryptology-- CT-RSA 2012 : the Cryptographers' track at the RSA Conference 2012, San Francisco, CA, USA, February 27-March 2, 2012. Proceedings / Orr Dunkelman (ed.).
Topics in cryptology-- CT-RSA 2012 : the Cryptographers' track at the RSA Conference 2012, San Francisco, CA, USA, February 27-March 2, 2012. Proceedings / Orr Dunkelman (ed.).
Creatore [Cryptographers' Track at RSA Conference (2012 : San Francisco, Calif.)]
Estensione 1 online resource (xiii, 434 pages).
Disciplina 005.8/2
Accesso persona Dunkelman, Orr.
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Computational complexity
Discrete Mathematics in Computer Science
Systems and Data Security
Algorithm Analysis and Problem Complexity
ISBN 9783642279546
3642279546
9783642279539
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004374333
[Cryptographers' Track at RSA Conference (2012 : San Francisco, Calif.)]  
Materiale a stampa
Lo trovi qui: New York University
Parameterized and exact computation : 6th International Symposium, IPEC 2011, Saarbrücken, Germany, September 6-8, 2011. Revised selected papers / edited by Dániel Marx, Peter Rossmanith
Parameterized and exact computation : 6th International Symposium, IPEC 2011, Saarbrücken, Germany, September 6-8, 2011. Revised selected papers / edited by Dániel Marx, Peter Rossmanith
Creatore [IPEC (Symposium) (6th : 2011 : Saarbrücken, Germany)]
Estensione 1 online resource (viii, 271 pages).
Disciplina 511.352
Accesso persona Marx, Daniel
Rossmanith, Peter
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Information theory
Computer software
Computational complexity
Algebra -- Data processing
Algorithms
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Theory of Computation
Symbolic and Algebraic Manipulation
Computation by Abstract Devices
ISBN 9783642280504
3642280501
9783642280498
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On Multiway Cut Parameterized above Lower Bounds / Marek Cygan, Marcin Pilipczuk, Michał Pilipczuk and Jakub Onufry Wojtaszczyk -- Parameterized Complexity of Firefighting Revisited / Marek Cygan, Fedor V. Fomin and Erik Jan van Leeuwen -- Parameterized Complexity in Multiple-Interval Graphs: Domination / Minghui Jiang and Yong Zhang -- A Faster Algorithm for Dominating Set Analyzed by the Potential Method / Yoichi Iwata -- Contracting Graphs to Paths and Trees / Pinar Heggernes, Pim van 't Hof, Benjamin Lévêque, Daniel Lokshtanov and Christophe Paul -- Increasing the Minimum Degree of a Graph by Contractions / Petr A. Golovach, Marcin Kamiński, Daniël Paulusma and Dimitrios M. Thilikos -- Planar Disjoint-Paths Completion / Isolde Adler, Stavros G. Kolliopoulos and Dimitrios M. Thilikos -- Sparse Solutions of Sparse Linear Systems: Fixed-Parameter Tractability and an Application of Complex Group Testing / Peter Damaschke -- New Upper Bounds for MAX-2-SAT and MAX-2-CSP w.r.t. the Average Variable Degree / Alexander Golovnev -- Improved Parameterized Algorithms for above Average Constraint Satisfaction / Eun Jung Kim and Ryan Williams -- On Polynomial Kernels for Structural Parameterizations of Odd Cycle Transversal / Bart M.P. Jansen and Stefan Kratsch -- Kernel Bounds for Path and Cycle Problems / Hans L. Bodlaender, Bart M.P. Jansen and Stefan Kratsch -- On the Hardness of Losing Width / Marek Cygan, Daniel Lokshtanov, Marcin Pilipczuk, Michał Pilipczuk and Saket Saurabh -- Safe Approximation and Its Relation to Kernelization / Jiong Guo, Iyad Kanj and Stefan Kratsch -- Simpler Linear-Time Kernelization for Planar Dominating Set / Torben Hagerup -- Linear-Time Computation of a Linear Problem Kernel for Dominating Set on Planar Graphs / René van Bevern, Sepp Hartung, Frank Kammer, Rolf Niedermeier and Mathias Weller -- Tight Complexity Bounds for FPT Subgraph Problems Parameterized by Clique-Width / Hajo Broersma, Petr A. Golovach and Viresh Patel -- Finding Good Decompositions for Dynamic Programming on Dense Graphs / Eivind Magnus Hvidevold, Sadia Sharmin, Jan Arne Telle and Martin Vatshelle -- Parameterized Maximum Path Coloring / Michael Lampis -- On Cutwidth Parameterized by Vertex Cover / Marek Cygan, Daniel Lokshtanov, Marcin Pilipczuk, Michał Pilipczuk and Saket Saurabh -- Twin-Cover: Beyond Vertex Cover in Parameterized Algorithmics / Robert Ganian.
Record Nr. NYU-004374531
[IPEC (Symposium) (6th : 2011 : Saarbrücken, Germany)]  
Materiale a stampa
Lo trovi qui: New York University