Intelligent Algorithms in Ambient and Biomedical Computing

This book is the outcome of a series of discussions at the Philips Symposium on Intelligent Algorithms, held in Eindhoven in December 2004. It offers exciting and practical examples of the use of intelligent algorithms in ambient and biomedical computing. It contains topics such as bioscience computing, database design, machine consciousness, scheduling, video summarization, audio classification, semantic reasoning, machine learning, tracking and localization, secure computing, and communication.

[1]  Hsie-Chia Chang,et al.  An area-efficient architecture for Reed-Solomon decoder using the inversionless decomposed Euclidean algorithm , 2001, ISCAS 2001. The 2001 IEEE International Symposium on Circuits and Systems (Cat. No.01CH37196).

[2]  Natasa Jonoska,et al.  Self-assembling DNA graphs , 2004, Natural Computing.

[3]  Marc Ehrig,et al.  State of the art on ontology alignment , 2013 .

[4]  Bin Yu,et al.  Model Selection and the Principle of Minimum Description Length , 2001 .

[5]  R. Kirk Sentience and Behaviour , 1974 .

[6]  Ehud Shapiro,et al.  DNA molecule provides a computing machine with both data and fuel , 2003, Proceedings of the National Academy of Sciences of the United States of America.

[7]  A. P. Dawid,et al.  Present position and potential developments: some personal views , 1984 .

[8]  Geoffrey I. Webb Further Experimental Evidence against the Utility of Occam's Razor , 1996, J. Artif. Intell. Res..

[9]  P. Haikonen The Cognitive Approach to Conscious Machines , 2003 .

[10]  Ion Stoica,et al.  Packet fair queueing algorithms for wireless networks with location-dependent errors , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[11]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[12]  P. Maini,et al.  Mathematical oncology: Cancer summed up , 2003, Nature.

[13]  R. Weiss,et al.  Advances in synthetic biology: on the path from prototypes to applications. , 2005, Current opinion in biotechnology.

[14]  Dan Gusfield,et al.  Algorithms on Strings, Trees, and Sequences - Computer Science and Computational Biology , 1997 .

[15]  Shih-Fu Chang,et al.  A utility framework for the automatic generation of audio-visual skims , 2002, MULTIMEDIA '02.

[16]  Sabine Buchholz,et al.  Using Grammatical Relations, Answer Frequencies and the World Wide Web for TREC Question Answering , 2001, TREC.

[17]  R Ekins,et al.  Microarrays: their origins and applications. , 1999, Trends in biotechnology.

[18]  Ron Weiss,et al.  Genetic circuit building blocks for cellular computation, communications, and signal processing , 2003, Natural Computing.

[19]  Brian D. Ripley,et al.  Pattern Recognition and Neural Networks , 1996 .

[20]  Herman J. ter Horst,et al.  Completeness, decidability and complexity of entailment for RDF Schema and a semantic extension involving the OWL vocabulary , 2005, J. Web Semant..

[21]  Ahmed M. Elgammal,et al.  Face detection in complex environments from color images , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[22]  David I. Lewin,et al.  DNA computing , 2002, Comput. Sci. Eng..

[23]  M R Holt,et al.  Cell motility: proline-rich proteins promote protrusions. , 2001, Trends in cell biology.

[24]  M. Hauser Wild Minds: What Animals Really Think , 2000 .

[25]  Esen A. Ozkarahan Database machines and database management , 1986 .

[26]  Pim Tuyls,et al.  Practical Two-Party Computation Based on the Conditional Gate , 2004, ASIACRYPT.

[27]  Yevgeniy Dodis,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.

[28]  Yasubumi Sakakibara,et al.  Development of an In Vivo Computer Based on Escherichia coli , 2005, DNA.

[29]  Neil D. Jones,et al.  Computability and complexity , 1997 .

[30]  Munindar P. Singh,et al.  Readings in agents , 1997 .

[31]  R. Blahut Theory and practice of error control codes , 1983 .

[32]  D. J. Hermes,et al.  Measurement of pitch by subharmonic summation. , 1988, The Journal of the Acoustical Society of America.

[33]  G Rozenberg,et al.  Computing with DNA by operating on plasmids. , 2000, Bio Systems.

[34]  Matthew K. Franklin,et al.  Joint Encryption and Message-Efficient Secure Computation , 1993, CRYPTO.

[35]  Ajay Divakaran,et al.  Automatic measurement of intensity of motion activity of video segments , 2001, IS&T/SPIE Electronic Imaging.

[36]  Jorma Rissanen,et al.  Fisher information and stochastic complexity , 1996, IEEE Trans. Inf. Theory.

[37]  James H. Martin,et al.  Speech and language processing: an introduction to natural language processing , 2000 .

[38]  Pim Tuyls,et al.  Capacity and Examples of Template-Protecting Biometric Authentication Systems , 2004, ECCV Workshop BioAW.

[39]  L. Wasserman,et al.  The Selection of Prior Distributions by Formal Rules , 1996 .

[40]  Pádraig Cunningham,et al.  Ontology Discovery for the Semantic Web Using Hierarchical Clustering , 2002 .

[41]  Kang G. Shin,et al.  Analysis of combined adaptive bandwidth allocation and admission control in wireless networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[42]  Fabien Gouyon,et al.  Exploration of techniques for automatic labeling of audio drum tracks instruments , 2001 .

[43]  Naoki Abe,et al.  Collaborative Filtering Using Weighted Majority Prediction Algorithms , 1998, ICML.

[44]  J. K. Lenstra,et al.  Local Search in Combinatorial Optimisation. , 1997 .

[45]  Sanjeev R. Kulkarni,et al.  Rapid estimation of camera motion from compressed video with application to video annotation , 2000, IEEE Trans. Circuits Syst. Video Technol..

[46]  Zoubin Ghahramani,et al.  A Unifying Review of Linear Gaussian Models , 1999, Neural Computation.

[47]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[48]  John Riedl,et al.  Item-based collaborative filtering recommendation algorithms , 2001, WWW '01.

[49]  Igor Aleksander Axioms and tests for the presence of minimal consciousness in agents , 2003 .

[50]  Christopher Wright The Dutch Painters: 100 Seventeenth Century Masters , 1978 .

[51]  H. Jeffreys An invariant form for the prior probability in estimation problems , 1946, Proceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences.

[52]  Gregory J. Chaitin,et al.  On the Length of Programs for Computing Finite Binary Sequences: statistical considerations , 1969, JACM.

[53]  L. Knopoff,et al.  Entropy as a Measure of Style: The Influence of Sample Length , 1983 .

[54]  Sunghyun Choi,et al.  Goodput enhancement of IEEE 802.11a wireless LAN via link adaptation , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).

[55]  Bin Yu,et al.  Wavelet thresholding via MDL for natural images , 2000, IEEE Trans. Inf. Theory.

[56]  Richard O. Duda,et al.  Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.

[57]  Padraig Cunningham,et al.  Context boosting collaborative recommendations , 2004, Knowl. Based Syst..

[58]  Henk Jan Bergveld,et al.  Battery Management Systems , 2002 .

[59]  Xia Chen,et al.  Aqueous Solutions of Algorithmic Problems: Emphasizing Knights on a 3 x 3 , 2001, DNA.

[60]  J. Watson,et al.  DNA: The Secret of Life , 2003 .

[61]  Marti A. Hearst Automatic Acquisition of Hyponyms from Large Text Corpora , 1992, COLING.

[62]  Stuart J. Russell,et al.  Dynamic bayesian networks: representation, inference and learning , 2002 .

[63]  Philip J. Stokes Philosophy 100 Essential Thinkers , 2003 .

[64]  Benny Pinkas,et al.  Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.

[65]  Shu Yantail Achieving Efficient Channel Utilization for Data Communications in IEEE 802.11 WLAN , 2005 .

[66]  David Harlan Wood,et al.  DNA Based Computers III , 1999 .

[67]  Xia Chen,et al.  Aqueous computing: A survey with an invitation to participate , 2002, Journal of Computer Science and Technology.

[68]  I. J. Myung,et al.  Counting probability distributions: Differential geometry and model selection , 2000, Proc. Natl. Acad. Sci. USA.

[69]  In-Cheol Park,et al.  A high-speed and low-latency Reed-Solomon decoder based on a dual-line structure , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[70]  E. Shapiro,et al.  An autonomous molecular computer for logical control of gene expression , 2004, Nature.

[71]  Paramvir Bahl,et al.  Distributed Fair Scheduling in a Wireless LAN , 2005, IEEE Trans. Mob. Comput..

[72]  Herman J. ter Horst,et al.  Combining RDF and Part of OWL with Rules: Semantics, Decidability, Complexity , 2005, SEMWEB.

[73]  Hugo Krawczyk,et al.  Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, Journal of Cryptology.

[74]  Steven de Rooij,et al.  An Empirical Study of MDL Model Selection with Infinite Parametric Complexity , 2005, ArXiv.

[75]  B. Moore,et al.  A revision of Zwicker's loudness model , 1996 .

[76]  D. Dennett The Intentional Stance. , 1987 .

[77]  Keld K. Jensen,et al.  Timbre Models of Musical Sounds , 1999 .

[78]  B. Baars In the Theater of Consciousness , 1997 .

[79]  Finn V. Jensen,et al.  Bayesian Networks and Decision Graphs , 2001, Statistics for Engineering and Information Science.

[80]  T. Head,et al.  Aqueous computing: writing on molecules , 1999, Proceedings of the 1999 Congress on Evolutionary Computation-CEC99 (Cat. No. 99TH8406).

[81]  L M Adleman,et al.  Molecular computation of solutions to combinatorial problems. , 1994, Science.

[82]  Emile H. L. Aarts,et al.  The New Everyday: Views on Ambient Intelligence , 2003 .

[83]  Richard Parncutt,et al.  AN IMPROVED MODEL OF TONALITY PERCEPTION INCORPORATING PITCH SALIENCE AND ECHOIC MEMORY , 1993 .

[84]  Tatsuaki Okamoto,et al.  Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , 1992, CRYPTO.

[85]  Paul W. P. J. Grefen,et al.  PRISMA/DB: A Parallel Main Memory Relational DBMS , 1992, IEEE Trans. Knowl. Data Eng..

[86]  Glazier,et al.  Simulation of the differential adhesion driven rearrangement of biological cells. , 1993, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[87]  Katie Bentley,et al.  Nature's Batik: a computer evolution model of diatom valve morphogenesis. , 2005, Journal of nanoscience and nanotechnology.

[88]  Jorma Rissanen,et al.  Stochastic Complexity in Statistical Inquiry , 1989, World Scientific Series in Computer Science.

[89]  W. Freeman How Brains Make Up Their Minds , 1999 .

[90]  Michael Isard,et al.  CONDENSATION—Conditional Density Propagation for Visual Tracking , 1998, International Journal of Computer Vision.

[91]  C. Krumhansl,et al.  Tracing the dynamic changes in perceived tonal organization in a spatial representation of musical keys. , 1982 .

[92]  E. Shapiro,et al.  Cellular abstractions: Cells as computation , 2002, Nature.

[93]  John F. Canny,et al.  Collaborative filtering with privacy via factor analysis , 2002, SIGIR '02.

[94]  Pradeep Ravikumar,et al.  Adaptive Name Matching in Information Integration , 2003, IEEE Intell. Syst..

[95]  Nsf Ncr,et al.  A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single Node Case* , 1991 .

[96]  Scott R. Eliason Maximum likelihood estimation: Logic and practice. , 1994 .

[97]  Klaus Obermayer,et al.  Correspondence Analysis for Visualizing Interplay of Pitch Class, Key, and Composer , 2003 .

[98]  Elliott Mendelson,et al.  Introduction to Mathematical Logic , 1979 .

[99]  David Gelernter,et al.  Generative communication in Linda , 1985, TOPL.

[100]  Gregory J. Chaitin,et al.  On the Length of Programs for Computing Finite Binary Sequences , 1966, JACM.

[101]  Ilya Shmulevich,et al.  Localized Key Finding: Algorithms and Applications , 2000 .

[102]  John Zimmerman,et al.  TV Content Recommender System , 2000, AAAI/IAAI.

[103]  Ivan Damgård,et al.  Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.

[104]  Leilei Song,et al.  VLSI design of Reed-Solomon decoder architectures , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).

[105]  Milan Petkovic,et al.  Multi-modal extraction of highlights from TV Formula 1 programs , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[106]  D. Wilkinson,et al.  Towards an e-biology of ageing: integrating theory and data , 2003, Nature Reviews Molecular Cell Biology.

[107]  James H. Martin,et al.  Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition , 2000 .

[108]  Luigi Fratta,et al.  Performance evaluation and enhancement of the CSMA/CA MAC protocol for 802.11 wireless LANs , 1996, Proceedings of PIMRC '96 - 7th International Symposium on Personal, Indoor, and Mobile Communications.

[109]  John Riedl,et al.  An algorithmic framework for performing collaborative filtering , 1999, SIGIR '99.

[110]  François Pachet,et al.  A taxonomy of musical genres , 2000, RIAO.

[111]  李幼升,et al.  Ph , 1989 .

[112]  François Pachet,et al.  Representing Musical Genre: A State of the Art , 2003 .

[113]  I. Csiszar,et al.  The consistency of the BIC Markov order estimator , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).

[114]  N. Meyers,et al.  H = W. , 1964, Proceedings of the National Academy of Sciences of the United States of America.

[115]  Oren Etzioni,et al.  Scaling question answering to the Web , 2001, WWW '01.

[116]  Parameswaran Ramanathan,et al.  Adapting packet fair queueing algorithms to wireless networks , 1998, MobiCom '98.

[117]  Markus Jakobsson,et al.  Mix and Match: Secure Function Evaluation via Ciphertexts , 2000, ASIACRYPT.

[118]  Ray J. Solomonoff,et al.  Complexity-based induction systems: Comparisons and convergence theorems , 1978, IEEE Trans. Inf. Theory.

[119]  R. Cramer,et al.  Multiparty Computation from Threshold Homomorphic Encryption , 2000 .

[120]  Hong Shen Wang,et al.  Finite-state Markov channel-a useful model for radio communication channels , 1995 .

[121]  John Riedl,et al.  GroupLens: an open architecture for collaborative filtering of netnews , 1994, CSCW '94.

[122]  Michael Böttner,et al.  Natural Language , 1997, Relational Methods in Computer Science.

[123]  C. A. Condat,et al.  Competition effects in the dynamics of tumor cords. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[124]  Gerhard Weiss,et al.  Multiagent systems: a modern approach to distributed artificial intelligence , 1999 .

[125]  A. A. Hassan,et al.  Simulation of error trapping decoders on a fading channel , 1996, Proceedings of Vehicular Technology Conference - VTC.

[126]  Herman J. ter Horst,et al.  Extending the RDFS Entailment Lemma , 2004, SEMWEB.

[127]  Jan H. M. Korst,et al.  Automatic Ontology Population by Googling , 2005, BNAIC.

[128]  Dharmendra S. Modha,et al.  Prequential and Cross-Validated Regression Estimation , 1998, Machine Learning.

[129]  Andrew R. Barron,et al.  Minimum complexity density estimation , 1991, IEEE Trans. Inf. Theory.

[130]  Luciano Serafini,et al.  Semantic Coordination: A New Approach and an Application , 2003, SEMWEB.

[131]  Dan Brickley,et al.  Resource Description Framework (RDF) Model and Syntax Specification , 2002 .

[132]  Hiroyuki Morikawa,et al.  Fair scheduling algorithm for wireless packet networks , 1999, Proceedings of the 1999 ICPP Workshops on Collaboration and Mobile Computing (CMC'99). Group Communications (IWGC). Internet '99 (IWI'99). Industrial Applications on Network Computing (INDAP). Multime.

[133]  Martin L. Kersten Databases for Ambient Intelligence , 2003, ICDE.

[134]  James A. Hendler,et al.  The Semantic Web" in Scientific American , 2001 .

[135]  Arthur W. Burks,et al.  Essays on cellular automata , 1970 .

[136]  Hanho Lee High-speed VLSI architecture for parallel Reed-Solomon decoder , 2003, IEEE Trans. Very Large Scale Integr. Syst..

[137]  Peter F. Patel-Schneider,et al.  Reducing OWL entailment to description logic satisfiability , 2004, Journal of Web Semantics.

[138]  Shingo Uchihashi,et al.  An interactive comic book presentation for exploring video , 2000, CHI.

[139]  George Karypis,et al.  Evaluation of Item-Based Top-N Recommendation Algorithms , 2001, CIKM '01.

[140]  John Langford,et al.  Suboptimal Behavior of Bayes and MDL in Classification Under Misspecification , 2004, COLT.

[141]  Jeroen Breebaart,et al.  Features for Audio Classification , 2004 .

[142]  Philip S. Yu,et al.  Horting hatches an egg: a new graph-theoretic approach to collaborative filtering , 1999, KDD '99.

[143]  S. Pinker How the Mind Works , 1999, Philosophy after Darwin.

[144]  Klaus Obermayer,et al.  A new method for tracking modulations in tonal music in audio data format , 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium.

[145]  Hui Zhang,et al.  WF/sup 2/Q: worst-case fair weighted fair queueing , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.

[146]  R. G. Crowder,et al.  Perception of the Major/Minor Distinction: IV. Emotional Connotations in Young Children , 1990 .

[147]  A. Damasio The Feeling of What Happens: Body and Emotion in the Making of Consciousness , 1999 .

[148]  Tong Zhang,et al.  On the Convergence of MDL Density Estimation , 2004, COLT.

[149]  David Temperley,et al.  An Algorithm for Harmonic Analysis , 1997 .

[150]  Wolfram Burgard,et al.  Monte Carlo localization for mobile robots , 1999, Proceedings 1999 IEEE International Conference on Robotics and Automation (Cat. No.99CH36288C).

[151]  C. Bernard Shung,et al.  A (208,192;8) Reed-Solomon decoder for DVD application , 1998, ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220).

[152]  Arno Siebes,et al.  Bio-Inspired Data Management , 2006 .

[153]  Nicholas Humphrey,et al.  Consciousness Regained: Chapters in the Development of Mind , 1983 .

[154]  Jeroen Breebaart,et al.  Features for audio and music classification , 2003, ISMIR.

[155]  S. Jamaloddin Golestani,et al.  A self-clocked fair queueing scheme for broadband applications , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[156]  Jacob Cohen,et al.  Weighted kappa: Nominal scale agreement provision for scaled disagreement or partial credit. , 1968 .

[157]  Elaine Chew,et al.  The Spiral Array: An Algorithm for Determining Key Boundaries , 2002, ICMAI.

[158]  Jorma Rissanen,et al.  The Minimum Description Length Principle in Coding and Modeling , 1998, IEEE Trans. Inf. Theory.

[159]  Jean-Paul M. G. Linnartz,et al.  New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.

[160]  Henry Tirri,et al.  On Supervised Selection of Bayesian Networks , 1999, UAI.

[161]  Ryutaro Ichise,et al.  Integrating Multiple Internet Directories by Instance-based Learning , 2003, IJCAI.

[162]  Emilia Gómez,et al.  Estimating The Tonality Of Polyphonic Audio Files: Cognitive Versus Machine Learning Modelling Strategies , 2004, ISMIR.

[163]  J. E. Schrader Detecting and interpreting musical note onsets in polyphonic music , 2003 .

[164]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[165]  R. Crawford,et al.  FILAMENT FORMATION IN THE DIATOM MELOSIRA GRANULATA 1 , 1986 .

[166]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[167]  Jeremy J. Carroll,et al.  Resource description framework (rdf) concepts and abstract syntax , 2003 .

[168]  Wim F. J. Verhaegh,et al.  Collaborative filtering with privacy , 2003 .

[169]  H. Zettl Sight, Sound, Motion: Applied Media Aesthetics , 1973 .

[170]  Peter A. Boncz,et al.  AmbientDB: P2P data management middleware for ambient intelligence , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[171]  Hanho Lee An area-efficient Euclidean algorithm block for Reed-Solomon decoder , 2003, IEEE Computer Society Annual Symposium on VLSI, 2003. Proceedings..

[172]  S. R. Holtzman A program for key determination , 1977 .

[173]  Christina Fragouli,et al.  Controlled multimedia wireless link sharing via enhanced class-based queuing with channel-state-dependent packet scheduling , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[174]  Chris Chafe,et al.  Toward an Intelligent Editor of Digital Audio: Recognition of Musical Constructs , 1982 .

[175]  Sergey Brin,et al.  Extracting Patterns and Relations from the World Wide Web , 1998, WebDB.

[176]  Vladimir Vapnik,et al.  Statistical learning theory , 1998 .

[177]  John Riedl,et al.  Analysis of recommendation algorithms for e-commerce , 2000, EC '00.

[178]  Peter Grünwald,et al.  A minimum description length approach to grammar inference , 1995, Learning for Natural Language Processing.

[179]  Topi Järvinen,et al.  Tonal Hierarchies in Jazz Improvisation , 1995 .

[180]  John von Neumann,et al.  Theory Of Self Reproducing Automata , 1967 .

[181]  Kenneth Steiglitz,et al.  Combinatorial Optimization: Algorithms and Complexity , 1981 .

[182]  Stephen B. Wicker,et al.  Reed-Solomon Codes and Their Applications , 1999 .

[183]  Athanasios Papoulis,et al.  Probability, Random Variables and Stochastic Processes , 1965 .

[184]  Songwu Lu,et al.  A wireless fair service algorithm for packet cellular networks , 1998, MobiCom '98.

[185]  Péter Gács,et al.  Algorithmic statistics , 2000, IEEE Trans. Inf. Theory.

[186]  Michael McGill,et al.  Introduction to Modern Information Retrieval , 1983 .

[187]  Pedro M. Domingos The Role of Occam's Razor in Knowledge Discovery , 1999, Data Mining and Knowledge Discovery.

[188]  Denis Noble,et al.  The rise of computational biology , 2002, Nature Reviews Molecular Cell Biology.

[189]  Martin D. Davis Computability and Complexity , 2008 .

[190]  J. Rissanen A UNIVERSAL PRIOR FOR INTEGERS AND ESTIMATION BY MINIMUM DESCRIPTION LENGTH , 1983 .

[191]  Jan Karel Lenstra,et al.  Periodic Multiprocessor Scheduling , 1991, PARLE.

[192]  Gheorghe Paun,et al.  Computing with Membranes , 2000, J. Comput. Syst. Sci..

[193]  Xavier Boyen,et al.  Tractable Inference for Complex Stochastic Processes , 1998, UAI.

[194]  Gregory Grefenstette,et al.  Explorations in automatic thesaurus discovery , 1994 .

[195]  Peter Steenkiste,et al.  Effort-limited fair (ELF) scheduling for wireless networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[196]  Michael I. Jordan,et al.  Mixed Memory Markov Models: Decomposing Complex Stochastic Processes as Mixtures of Simpler Ones , 1999, Machine Learning.

[197]  B. Baars A cognitive theory of consciousness , 1988 .

[198]  R. Kurzweil The Age of Spiritual Machines , 1999 .

[199]  Laurence B. Milstein,et al.  On the effect of imperfect interleaving for the Gilbert-Elliott channel , 1999, IEEE Trans. Commun..

[200]  Hsie-Chia Chang,et al.  A low-power Reed-Solomon decoder for STM-16 optical communications , 2002, Proceedings. IEEE Asia-Pacific Conference on ASIC,.

[201]  Sophia Ananiadou,et al.  Classifying Technical Terms , 1999, ELPUB.

[202]  Rainer Lienhart,et al.  Comparison of automatic shot boundary detection algorithms , 1998, Electronic Imaging.

[203]  Simone Santini,et al.  Similarity Measures , 1999, IEEE Trans. Pattern Anal. Mach. Intell..

[204]  H. Akaike INFORMATION THEORY AS AN EXTENSION OF THE MAXIMUM LIKELIHOOD , 1973 .

[205]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[206]  D. Chalmers Facing Up to the Problem of Consciousness , 1995 .

[207]  C. S. Wallace,et al.  Estimation and Inference by Compact Coding , 1987 .

[208]  Ivan Damgård,et al.  Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption , 2003, CRYPTO.

[209]  John G. Proakis,et al.  Digital Communications , 1983 .

[210]  A. Leon-Garcia,et al.  A distributed self-clocked fair queueing architecture for wireless ATM networks , 1997, Proceedings of 8th International Symposium on Personal, Indoor and Mobile Radio Communications - PIMRC '97.

[211]  M. Chaplain,et al.  Continuous and discrete mathematical models of tumor-induced angiogenesis , 1998, Bulletin of mathematical biology.

[212]  J. Rissanen Stochastic Complexity and Modeling , 1986 .

[213]  R. Srikant,et al.  Fair scheduling in wireless packet networks , 1999, TNET.

[214]  Peter Grünwald,et al.  A First Look at the Minimum Description Length Principle , 2006 .

[215]  Uta Francke WASP (Wiskott‐Aldrich Syndrome Protein) , 2002 .

[216]  Ness B. Shroff,et al.  Transmission scheduling for efficient wireless utilization , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[217]  David Heckerman,et al.  Empirical Analysis of Predictive Algorithms for Collaborative Filtering , 1998, UAI.

[218]  Ian Horrocks,et al.  OWL rules: A proposal and prototype implementation , 2005, J. Web Semant..

[219]  P. Chavrier,et al.  Actin dynamics during phagocytosis. , 2001, Seminars in immunology.

[220]  Jacques Stern,et al.  Sharing Decryption in the Context of Voting or Lotteries , 2000, Financial Cryptography.

[221]  Jorma Rissanen,et al.  Universal coding, information, prediction, and estimation , 1984, IEEE Trans. Inf. Theory.

[222]  Mark A. Pitt,et al.  Advances in Minimum Description Length: Theory and Applications , 2005 .

[223]  David Haussler,et al.  Occam's Razor , 1987, Inf. Process. Lett..

[224]  Nozay Bp This paper presents , 1984 .

[225]  Jacques Stern,et al.  CryptoComputing with Rationals , 2002, Financial Cryptography.

[226]  Abhay Parekh,et al.  A generalized processor sharing approach to flow control in integrated services networks: the single-node case , 1993, TNET.

[227]  Pattie Maes,et al.  Social information filtering: algorithms for automating “word of mouth” , 1995, CHI '95.

[228]  C. Krumhansl Cognitive Foundations of Musical Pitch , 1990 .

[229]  Roy Goldman,et al.  Lore: a database management system for semistructured data , 1997, SGMD.

[230]  Edward W. Knightly,et al.  Opportunistic media access for multirate ad hoc networks , 2002, MobiCom '02.

[231]  Ralf Steinmetz,et al.  Ontology enrichment with texts from the WWW , 2002 .

[232]  Naresh R. Shanbhag,et al.  High-speed architectures for Reed-Solomon decoders , 2001, IEEE Trans. Very Large Scale Integr. Syst..