1
Developments in Language Theory [E-Book] : 27th International Conference, DLT 2023, Umeå, Sweden, June 12-16, 2023, Proceedings /
Table of Contents: ...Transducers and the Power of Delay -- When the Map is More Exact than the Terrain -- Formal Languages and the NLP Black Box -- On Structural Tractability Parameters for Hard String Problems -- Jumping Automata over Infinite Words -- Isometric Words based...

Full text 
2
Tools and Algorithms for the Construction and Analysis of Systems [E-Book] : 29th International Conference, TACAS 2023, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Paris, France, April 22-27, 2023, Proceedings, Part II /
Table of Contents: ... Contribution) -- 2LS: Arrays and Loop Unwinding (Competition Contribution) -- Bubaak: Runtime Monitoring of Program Verifiers (Competition Contribution) -- EBF 4.2: Black-Box Cooperative Verification for Concurrent Programs (Competition Contribution) -- Goblint...

Full text 
3
Descriptional Complexity of Formal Systems [E-Book] : 25th IFIP WG 1.02 International Conference, DCFS 2023, Potsdam, Germany, July 4-6, 2023, Proceedings /
Table of Contents: ... Non-Recurrent Letter -- Merging two Hierarchies of External Contextual Grammars with Subregular Selection -- A Tight Upper Bound on the Length of Maximal Bordered Box Repetition-Free Words....

Full text 
4
Knowledge Science, Engineering and Management [E-Book] : 16th International Conference, KSEM 2023, Guangzhou, China, August 16-18, 2023, Proceedings, Part I /
Bi, Yaxin
2023
Table of Contents: ... Redundancy Learning for Unsupervised Multi-view Feature Selection -- Dynamic Feed-Forward LSTM -- Black-box Adversarial Attack on Graph Neural Networks Based on Node Domain Knowledge -- Role and Relationship-Aware Representation Learning for Complex Coupled...

Full text 
5
Computational Collective Intelligence [E-Book] : 15th International Conference, ICCCI 2023, Budapest, Hungary, September 27-29, 2023, Proceedings /
Table of Contents: ... for Digital Content Understanding -- Desertification Detection in Satellite Images using Siamese Variational Autoencoder with Transfer Learning -- Speaker Identification Enhancement Using Emotional Features -- Classification of punches in Olympic boxing using...

Full text 
6
Runtime Verification [E-Book] : 23rd International Conference, RV 2023, Thessaloniki, Greece, October 3-6, 2023, Proceedings /
Table of Contents: ...Assumption Generation for Learning-Enabled Autonomous Systems -- Customizable Reference Runtime Monitoring of Neural Networks using Resolution Boxes -- Scalable Stochastic Parametric Verification with Stochastic Variational Smoothed Model Checking...

Full text 
7
Programs as Diagrams [E-Book] : From Categorical Computability to Computable Categories /
8
A Journey from Process Algebra via Timed Automata to Model Learning [E-Book] : Essays Dedicated to Frits Vaandrager on the Occasion of His 60th Birthday /
Table of Contents: ... Temporal Logic -- Equivalence Checking 40 Years After: A Review of Bisimulation Tools -- Apartness and Distinguishing formulas in Using the parallel ATerm library for parallel model checking and state space generation -- Active Automata Learning as Black-Box...

Full text 
9
Parallel Problem Solving from Nature - PPSN XVII [E-Book] : 17th International Conference, PPSN 2022, Dortmund, Germany, September 10-14, 2022, Proceedings, Part I /
Table of Contents: ... Points -- Collective Learning of Low-Memory Matrix Adaptation for Large-Scale Black-Box Optimization -- Evolutionary Time-Use Optimization for Improving Children's Health Outcomes -- Iterated Local Search for the eBuses Charging Location Problem -- Multi-view...

Full text 
10
Advances in Computer Games [E-Book] : 17th International Conference, ACG 2021, Virtual Event, November 23-25, 2021, Revised Selected Papers /
Table of Contents: ... on Rectangular Boards - Part 1: Partisan Col and Snort -- Solving Bicoloring-Graph Games on Rectangular Boards - Part 2: Impartial Col and Snort -- BoxOff is NP-Complete....

Full text 
11
Learning and Intelligent Optimization [E-Book] : 16th International Conference, LION 16, Milos Island, Greece, June 5-10, 2022, Revised Selected Papers /
Table of Contents: ... -- The Skewed Kruskal algorithm -- Bounds for sparse solutions of K-SVCR multi-class classification model -- Integer Linear Programming in Solving an Optimization Problem at the Mixing Department of the Metallurgical Production -- Realtime Gray-Box Algorithm...

Full text 
12
Automated Technology for Verification and Analysis [E-Book] : 20th International Symposium, ATVA 2022, Virtual Event, October 25-28, 2022, Proceedings /
Table of Contents: ...Invited Paper -- Learning Monitorable Operational Design Domains for Assured Autonomy -- Reinforcement Learning -- Dynamic Shielding for Reinforcement Learning in Black-Box Environments -- An Impossibility Result in Automata-Theoretic Reinforcement...

Full text 
13
Coordination, Organizations, Institutions, Norms, and Ethics for Governance of Multi-Agent Systems XV [E-Book] : International Workshop, COINE 2022, Virtual Event, May 9, 2022, Revised Selected Papers /
Table of Contents: ... of Reactive Plans Using Social Norms -- Self-Learning Governance of Black-Box Multi-Agent Systems -- Computational Theory of Mind for Human-Agent Coordination -- Computational Discovery of Transaction-Based Financial Crime via Grammatical Evolution: The Case...

Full text 
14
Advanced Information Systems Engineering [E-Book] : 34th International Conference, CAiSE 2022, Leuven, Belgium, June 6-10, 2022, Proceedings /
Table of Contents: ...Process mining -- Decision Mining with Time Series Data Based on Automatic Feature Generation -- Inferring A Multi-Perspective Likelihood Graph from Black-Box Next Event Predictors -- Bootstrapping Generalization of Process Models Discovered From Event...

Full text 
15
Understanding Network Hacks [E-Book] : Attack and Defense with Python 3 /
Table of Contents: ...Installation -- Networks 4 newbies -- Python Basics -- Layer 2 attacks -- TCP / IP Tricks -- WHO IS DNS? -- HTTP Hacks -- Wifi fun -- Feeling Bluetooth on the Tooth -- Bargain Box Kung Fu -- Scapy Reference -- Secondary Links -- Index....

Full text 
16
Data Visualisation with R [E-Book] : 100 Examples /
17
Human Aspects of IT for the Aged Population. Applications, Services and Contexts [E-Book] : Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part II /
Table of Contents: ... between Senior Communities with Telepresence Robots -- Reopening the Black Box of Career Age and Research Performance. - Intergenerational Techno-Creative Activities in a Library Fablab. - ‘Industrie 4.0’ and an Aging Workforce – A Discussion from a...

Full text 
18
SOFSEM 2016: Theory and Practice of Computer Science [E-Book] : 42nd International Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 23-28, 2016, Proceedings /
Table of Contents: ..., and the Future -- Pay-as-you-go Data Integration: Experiences and Recurring Themes -- Foundations of Computer Science -- Robust Recoverable Path Using Backup Nodes -- On Contact Graphs with Cubes and Proportional Boxes -- Orthogonal Layout with Optimal Face Complexity...

Full text 
19
Social Robotics [E-Book] : 8th International Conference, ICSR 2016, Kansas City, MO, USA, November 1-3, 2016 Proceedings /
Table of Contents: ... Children with ASD -- Culture as a Driver for the Design of Social Robots for Autism Spectrum Disorder Interventions in the Middle East -- Robo2Box: A Toolkit to Elicit Children's Design Requirements for Classroom Robots -- Interaction with Artificial Companions...

Full text 
20
Theory of Cryptography [E-Book] : 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II /
Table of Contents: ... Security Does Not Imply Indistinguishability Under Selective Opening -- Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts -- Towards Non-Black-Box Separations of Public Key Encryption and One Way Function -- Post...

Full text