Position Papers of the 2014 Federated Conference on Computer Science and Information Systems, FedCSIS 2014, Warsaw, Poland, September 7-10, 2014

I will analyze Pawlak’s rough sets and extend the usual setting of characterization via an equivalence relation to any arbitrary relation, or a full relation. I extract the specification of rough sets by two operators: probable operator and sure operator. This would provide a general framework to analyze full rough sets and to compare them with Pawlak’s rough sets. It also facilitates all the computation and further expansion. This paper extends Pawlak’s approximation approach to any arbitrary relations and explicitly defines several computational operators to study the closeness regarding the characterization of operations on sets.

[1]  Hermann Härtig,et al.  The Nizza secure-system architecture , 2005, 2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[2]  Edward C. Prem,et al.  Wireless Local Area Networks , 2008, Industrial Communication Systems.

[3]  Reiner W. Hartenstein Are We Really Ready for the Breakthrough , 2003 .

[4]  The challenge for legal metrology of operating systems embedded in measuring instruments , .

[5]  Peter F. Patel-Schneider,et al.  Layering the Semantic Web: Problems and Directions , 2002, SEMWEB.

[6]  D. M. Titterington,et al.  Variational approximations in Bayesian model selection for finite mixture distributions , 2007, Comput. Stat. Data Anal..

[7]  P. Pancheri,et al.  Dal Minnesota Multiphasic Personality Inventory al “Panda”: il MMPI-2 automatico , 1999 .

[8]  Salvatore J. Stolfo,et al.  Measuring Security , 2011, IEEE Security & Privacy.

[9]  Yehya Mohamad,et al.  Supporting Inclusive Design of User Interfaces with a Virtual User Model , 2011, HCI.

[10]  Tor D. Wager,et al.  Individual differences in multiple types of shifting attention , 2006, Memory & cognition.

[11]  Elizabeth Chang,et al.  Semantic Web Service matchmakers: state of the art and challenges , 2013, Concurr. Comput. Pract. Exp..

[12]  Michal Panczyk,et al.  A self–stabilizing algorithm for finding weighted centroid in trees , 2012 .

[13]  Yasushi Azuma,et al.  Counting the atoms in a 28Si crystal for a new kilogram definition , 2011 .

[14]  Dino Schweitzer,et al.  Designing interactive visualization tools for the graphics classroom , 1992, SIGCSE '92.

[15]  Tetsuo Tamai,et al.  Software lifetime and its evolution process over generations , 1992, Proceedings Conference on Software Maintenance 1992.

[16]  Vaduvur Bharghavan,et al.  MACAW: a media access protocol for wireless LAN's , 1994, SIGCOMM 1994.

[17]  Vyas Sekar,et al.  Verifiable network function outsourcing: requirements, challenges, and roadmap , 2013, HotMiddlebox '13.

[18]  Marianne M. Swanson,et al.  Standards for Security Categorization of Federal Information and Information Systems , 2004 .

[19]  Lonnie Golden,et al.  A Brief History of Long Work Time and the Contemporary Sources of Overwork , 2008 .

[20]  Yuh-Jen Chen,et al.  An empirical knowledge management framework for professional virtual community in knowledge-intensive service industries , 2012, Expert Syst. Appl..

[21]  Kevin C. Almeroth,et al.  The impact of channel bonding on 802.11n network management , 2011, CoNEXT '11.

[22]  J. Konorski,et al.  Implementation and testing of Level 2 security architecture for the IIP System , 2012 .

[23]  Matthias Lange,et al.  L4Android: a generic operating system framework for secure smartphones , 2011, SPSM '11.

[24]  T. Rydén,et al.  Stylized Facts of Daily Return Series and the Hidden Markov Model , 1998 .

[25]  Chih-Yu Wang,et al.  IEEE 802.11n MAC Enhancement and Performance Evaluation , 2009, Mob. Networks Appl..

[26]  Gerard Salton,et al.  A vector space model for automatic indexing , 1975, CACM.

[27]  Monia Bellalouna,et al.  Average-Case Analysis for the Probabilistic Bin Packing Problem , 2004 .

[28]  The Bologna Declaration on the European space for higher education: an explanation , 2000 .

[29]  Jolanta Sala,et al.  Kształcenie kadr dla potrzeb gospodarki elektronicznej , 2008 .

[30]  Po-Jung Chen,et al.  Design of a Low-Power and Low-Latency MAC Protocol with Nodes Grouping and Transmission Pipelining in Wireless Sensor Networks , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[31]  Hakan Altinçay,et al.  Analytical evaluation of term weighting schemes for text categorization , 2010, Pattern Recognit. Lett..

[32]  Vangelis Th. Paschos,et al.  The probabilistic longest path problem , 1999, Networks.

[33]  Jaroslaw Legierski,et al.  USSD communication channel as alternative to XML SOAP in mobile Unified Communication applications , 2013, FedCSIS.

[34]  A. Tripathi,et al.  On prioritization of vulnerability categories based on CVSS scores , 2011, 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT).

[35]  Rick Cattell,et al.  Scalable SQL and NoSQL data stores , 2011, SGMD.

[36]  V. Paschos,et al.  Well solved cases of probabilistic traveling salesman problem , 2010 .

[37]  Marco Conti,et al.  Throughput Analysis and Measurements in IEEE 802.11 WLANs with TCP and UDP Traffic Flows , 2008, IEEE Transactions on Mobile Computing.

[38]  Lionel Pichon,et al.  A Matched-Pulse Approach for Soft-Fault Detection in Complex Wire Networks , 2012, IEEE Transactions on Instrumentation and Measurement.

[39]  Stewart Kowalski,et al.  Information Security Metrics: State of the Art : State of the art , 2011 .

[40]  D. R. Paulson,et al.  Active Learning in the College Classroom. , 1998 .

[41]  Stephen N. Luko,et al.  Risk Management Principles and Guidelines , 2013 .

[42]  Dimitris Bertsimas,et al.  A Vehicle Routing Problem with Stochastic Demand , 1992, Oper. Res..

[43]  Viviane Reding,et al.  The European data protection framework for the twenty-first century , 2012 .

[44]  David L. Cohn,et al.  Autonomic Computing , 2003, ISADS.

[45]  Nick McKeown,et al.  OpenFlow: enabling innovation in campus networks , 2008, CCRV.

[46]  Janusz Furtak,et al.  How to use the TPM in the method of secure data exchange using Flash RAM media , 2013, 2013 Federated Conference on Computer Science and Information Systems.

[47]  Jennifer L. Bayuk,et al.  Security as a theoretical attribute construct , 2013, Comput. Secur..

[48]  Xu Zhiqun,et al.  Emerging of Telco Cloud , 2013, China Communications.

[49]  Vangelis Th. Paschos,et al.  The Probabilistic Minimum Vertex‐covering Problem , 2002 .

[50]  Chris Barlas Beating Babel - Identification, Metadata and Rights , 2002, ISMIR.

[51]  M. E. Kabay,et al.  Writing Secure Code , 2015 .

[52]  Andrea Hershatter,et al.  Millennials and the World of Work: An Organization and Management Perspective , 2010 .

[53]  Jelena Dakic,et al.  Contemporary management in a higher education institution in Serbia , 2013 .

[54]  Qiang Wang,et al.  Fractal-Based Brain State Recognition from EEG in Human Computer Interaction , 2011, BIOSTEC.

[55]  Patrick Jaillet On Some Probabilistic Combinatorial Optimization Problems Defined on Graphs , 1987 .

[56]  Jean-Pierre Seifert,et al.  Advances on Access-Driven Cache Attacks on AES , 2006, Selected Areas in Cryptography.

[57]  F. Harary,et al.  Outerplanar Graphs and Weak Duals , 1974 .

[58]  Thierry Turletti,et al.  A survey of QoS enhancements for IEEE 802.11 wireless LAN , 2004, Wirel. Commun. Mob. Comput..

[59]  อนิรุธ สืบสิงห์,et al.  Data Mining Practical Machine Learning Tools and Techniques , 2014 .

[60]  B. Gates Business @ the Speed of Thought , 1999 .

[61]  Yang Ou,et al.  To ontologise or not to ontologise: An information model for a geospatial knowledge infrastructure , 2012, Comput. Geosci..

[62]  Steffen Staab,et al.  Knowledge Processes and Ontologies , 2001, IEEE Intell. Syst..

[63]  G. Becker,et al.  Human Capital: A Theoretical and Empirical Analysis with Special Reference to Education, Third Edition , 1993 .

[64]  James A. Thom,et al.  Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.

[65]  Arthur M. Farley Vertex Centers of Trees , 1982 .

[66]  Guido Proietti,et al.  On the Stability of Approximation for Hamiltonian Path Problems , 2006, Algorithmic Oper. Res..

[67]  Reijo Savola On the Feasibility of Utilizing Security Metrics in Software-Intensive Systems , 2010 .

[68]  Witold Pedrycz,et al.  Data Mining: A Knowledge Discovery Approach , 2007 .

[69]  Magdalene Marinaki,et al.  A hybrid Honey Bees Mating Optimization algorithm for the Probabilistic Traveling Salesman Problem , 2009, 2009 IEEE Congress on Evolutionary Computation.

[70]  Horst Zuse,et al.  A Framework of Software Measurement , 1998 .

[71]  S. M. Hedetniemi,et al.  Linear Algorithms for Finding the Jordan Center and Path Center of a Tree , 1981 .

[72]  Marcin Kuzia,et al.  Mobile Payment System - Telco 2.0 application dedicated for payments , 2013, 2013 Federated Conference on Computer Science and Information Systems.

[73]  Vilhelm Verendel,et al.  Quantified security is a weak hypothesis: a critical survey of results and assumptions , 2009, NSPW '09.

[74]  Abdullah Al-Dhelaan Pairwise key establishment scheme for hypercube-based wireless sensor networks , 2011 .

[75]  Vangelis Th. Paschos,et al.  Probabilistic graph-coloring in bipartite and split graphs , 2009, J. Comb. Optim..

[76]  Sebastian Abeck,et al.  Metrics for Evaluating Service Designs Based on SoaML , 2011 .

[77]  Scott W. Brown,et al.  Processing resources in timing and sequencing tasks , 2007, Perception & psychophysics.

[78]  Claudia Linnhoff-Popien,et al.  A Context Modeling Survey , 2004 .

[79]  Deshi Li,et al.  Research on Wireless Sensor Network and Carrying Network Integration Based on Gateway , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[80]  David Boyle,et al.  Securing Wireless Sensor Networks: Security Architectures , 2008, J. Networks.

[81]  Deep Medhi,et al.  CAM05-6: Lightpath Topology Configuration for Wavelength-routed IP/MPLS Networks for Time-Dependent Traffic , 2006, IEEE Globecom 2006.

[82]  B. Kiker Investment in human capital , 1971 .

[83]  Khalid Hafeez,et al.  Dynamics of human resource and knowledge management , 2003, J. Oper. Res. Soc..

[84]  Khaled Ghédira,et al.  A priori parallel machines scheduling , 2010, Comput. Ind. Eng..

[85]  Nicola Santoro,et al.  Distributed algorithms for finding centers and medians in networks , 1984, TOPL.

[86]  Edsger W. Dijkstra,et al.  Self stabilization in spite of distributed control , 1974 .

[87]  P. Tse,et al.  Attention and the subjective expansion of time , 2004, Perception & psychophysics.

[88]  T. Sarkar,et al.  Analysis of Multiconductor Transmission Lines , 1988, 31st ARFTG Conference Digest.

[89]  Douglas R. Shier,et al.  On powers and centers of chordal graphs , 1983, Discret. Appl. Math..

[90]  Daniel Jachyra,et al.  Multiway classification of MMPI profiles , 2013, The International Conference on Digital Technologies 2013.

[91]  Krzysztof Cabaj,et al.  Towards Self-defending Mechanisms Using Data Mining in the EFIPSANS Framework , 2010, MISSI.

[92]  D. M. Titterington,et al.  VARIATIONAL BAYESIAN ANALYSIS FOR HIDDEN MARKOV MODELS , 2009 .

[93]  Monia Bellalouna,et al.  Problèmes d'optimisation combinatoires probabilistes , 1993 .

[94]  Giorgio Marchetti,et al.  Observation levels and units of time: A critical analysis of the main assumption of the theory of the artificial , 2000, AI & SOCIETY.

[95]  Otto Carlos Muniz Bandeira Duarte,et al.  Authentication and Access Control Architecture for Software Defined Networks , 2013 .

[96]  Krzysztof Pancerz,et al.  Computer-aided diagnosis of patients with mental disorders using the Copernicus system , 2011, 2011 4th International Conference on Human System Interactions, HSI 2011.

[97]  Fernando M. V. Ramos,et al.  Towards secure and dependable software-defined networks , 2013, HotSDN '13.

[98]  Eduardo Feitosa,et al.  Increasing the Resilience and Trustworthiness of OpenID Identity Providers for Future Networks and Services , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.

[99]  Electrical Units of Measurement , 1883, Nature.

[100]  Iwona Doliñska Wybrane aspekty zapewniania bezpieczeñœtwa sieci bezprzewodowych IEEE 802.11 , 2011 .

[101]  James L. McClelland Is a Machine Realization of Truly Human-Like Intelligence Achievable? , 2009, Cognitive Computation.

[102]  J. Shih Project Time in Silicon Valley , 2004 .

[103]  Danny Krizanc,et al.  Revitalizing computing education through free and open source software for humanity , 2009, Commun. ACM.

[104]  Mohammad Atique,et al.  Power Aware Wireless Sensor Node DesignUsing PSoC , 2013 .

[105]  Mohammad Reza Akhavan,et al.  Study the Performance Limits of IEEE 802 . 11 Wirelesses LANs Master of Science in Computer Science and Engineering , 2006 .

[106]  Patrick Jaillet,et al.  A Priori Optimization , 1990, Oper. Res..

[107]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[108]  Fernando M. V. Ramos,et al.  Software-Defined Networking: A Comprehensive Survey , 2014, Proceedings of the IEEE.

[109]  Mehmet Hakan Karaata,et al.  Self-stabilizing algorithms for finding centers and medians of trees , 1994, PODC '94.

[110]  Jugoslav Ackoski,et al.  Service-Oriented Architecture concept for intelligence information system development , 2011 .

[111]  B. Moor,et al.  Subspace identification for linear systems , 1996 .

[112]  Damon Greer Safe Harbor—a framework that works , 2011 .

[113]  Krzysztof Pancerz,et al.  Experiments with Hybridization and Optimization of the Rules Knowledge Base for Classification of MMPI Profiles , 2011, ICDM.

[114]  Philip S. Yu,et al.  Top 10 algorithms in data mining , 2007, Knowledge and Information Systems.

[115]  S. Rosenow Comparison of an Exact Branch-and-Bound and an Approximative Evolutionary Algorithm for the Probabilistic Traveling Salesman Problem , 1999 .

[116]  D. Drysdale An Introduction to Fire Dynamics , 2011 .

[117]  Vyas Sekar,et al.  Making middleboxes someone else's problem: network processing as a cloud service , 2012, SIGCOMM '12.

[118]  Dominik Kujawa,et al.  The Hybrid Algorithm for Procedural Generation of Virtual Scene Components , 2012, ISVC.

[119]  Jukka Ylitalo,et al.  OpenID authentication as a service in OpenStack , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[120]  Daniel Jachyra,et al.  Classification of MMPI Profiles using Decision Trees , 2011 .

[121]  Riel Miller,et al.  Measuring What People Know: Human Capital Accounting for the Knowledge Economy , 1996 .

[122]  Shlomi Dolev,et al.  Self Stabilization , 2004, J. Aerosp. Comput. Inf. Commun..

[123]  Mária Bieliková,et al.  Query construction for related document search based on user annotations , 2013, 2013 Federated Conference on Computer Science and Information Systems.

[124]  Lakhmi C. Jain,et al.  Introduction to Bayesian Networks , 2008 .

[125]  Michal Panczyk,et al.  A self-stabilizing algorithm for finding weighted centroid in trees , 2012, Ann. UMCS Informatica.

[126]  Vangelis Th. Paschos,et al.  Probabilistic models for the Steiner Tree problem , 2010, Networks.

[127]  Ian Sommerville,et al.  Decision Support Tools for Cloud Migration in the Enterprise , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[128]  Luca Mari,et al.  A Comparison Between Foundations of Metrology and Software Measurement , 2008, IEEE Transactions on Instrumentation and Measurement.

[129]  Sebastian Grabowski,et al.  BusStop — Telco 2.0 application supporting public transport in agglomerations , 2012, 2012 Federated Conference on Computer Science and Information Systems (FedCSIS).

[130]  Aristides Matopoulos,et al.  The Evolution of Logistics Service Providers and the Role of Internet-based Applications in Facilitating Global Operations , 2010 .

[131]  D. Schunk Learning Theories: An Educational Perspective , 1991 .

[132]  Irina Shklovski,et al.  Leakiness and creepiness in app space: perceptions of privacy and mobile app use , 2014, CHI.

[133]  R. William Beckwith High Assurance Security/Safety for Deeply Embedded, Real-time Systems , 2004 .

[134]  Marcin S. Szczuka,et al.  The Rough Set Exploration System , 2005, Trans. Rough Sets.

[135]  Panagiotis Symeonidis,et al.  Ternary Semantic Analysis of Social Tags for Personalized Music Recommendation , 2008, ISMIR.

[136]  Dieter Gollmann,et al.  Quality of Protection - Security Measurements and Metrics , 2006, Advances in Information Security.

[137]  Thierry Bertin-Mahieux,et al.  The Million Song Dataset , 2011, ISMIR.

[138]  Enrique Alba,et al.  Parallelism and evolutionary algorithms , 2002, IEEE Trans. Evol. Comput..

[139]  Alexandru Iosup,et al.  Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[140]  Chris Arney Artificial Psychology: The Quest for What It Means to Be Human , 2009 .

[141]  John Debenham,et al.  Knowledge Engineering , 1998, Artificial Intelligence.

[142]  Luiz Antonio,et al.  CONSTRUCTIVE GENETIC ALGORITHM FOR GRAPH COLORING , 1997 .

[143]  Wieslaw Paja,et al.  Feasibility Studies of Quality of Knowledge Mined from Multiple Secondary Sources. I. Implementation of generic operations , 2005, Intelligent Information Systems.

[144]  Christoph Krauß,et al.  Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques , 2007, ESAS.

[145]  Peretz Shoval,et al.  Information Filtering: Overview of Issues, Research and Systems , 2001, User Modeling and User-Adapted Interaction.

[146]  Antoine B. Bagula,et al.  Context-aware handoff decision for wireless access networks using Bayesian networks , 2009, SAICSIT '09.

[147]  Eugene Agichtein,et al.  Find it if you can: a game for modeling different types of web search success using interaction data , 2011, SIGIR.

[148]  H. R. E. H. Bouchekara,et al.  Diagnosis of Multi-Fault Wiring Network Using Time-Domain Reflectometry and Electromagnetism-Like Mechanism , 2013 .

[149]  Patrick Jaillet,et al.  Probabilistic Traveling Salesman Problems , 1985 .

[150]  Henwood,et al.  Author index , 1983, Pharmacology Biochemistry and Behavior.

[151]  Wei Wang,et al.  Design and Implementation of Wireless Sensor Network Gateway Based on Environmental Monitoring , 2009, 2009 International Conference on Environmental Science and Information Application Technology.

[152]  Thomas Keays,et al.  Semantic Web for the Working Ontologist , 2008 .

[153]  HeiserGernot,et al.  Are virtual-machine monitors microkernels done right? , 2006 .

[154]  Steven M. Bellovin On the Brittleness of Software and the Infeasibility of Security Metrics , 2006, IEEE Security & Privacy Magazine.

[155]  Patrick Jaillet Rates of Convergence for Quasi-Additive Smooth Euclidean Functionals and Application to Combinatorial Optimization Problems , 1992, Math. Oper. Res..

[156]  Reijo Savola,et al.  Quality of security metrics and measurements , 2013, Comput. Secur..

[157]  Markus Modzelewski,et al.  An ontology-based approach to achieve inclusive design support in the early phases of the product development process , 2014 .

[158]  Jacek Baginski Software Support of the Risk Reduction Assessment in the ValueSec Project Flood Use Case , 2013, DepCoS-RELCOMEX.

[159]  Mohammed El-Abd,et al.  Cooperative models of particle swarm optimizers , 2008 .

[160]  Steven L. Kinney Trusted Platform Module Basics: Using TPM in Embedded Systems (Embedded Technology) , 2006 .

[161]  Mabry Tyson,et al.  FRESCO: Modular Composable Security Services for Software-Defined Networks , 2013, NDSS.

[162]  Yu-Hsin Liu Diversified local search strategy under scatter search framework for the probabilistic traveling salesman problem , 2008, Eur. J. Oper. Res..

[163]  Chih-Ming Chen,et al.  An efficient fuzzy classifier with feature selection based on fuzzy entropy , 2001, IEEE Trans. Syst. Man Cybern. Part B.

[164]  William G. Griswold,et al.  Exploring the potential of mobile phones for active learning in the classroom , 2007, SIGCSE.

[165]  Yu-Hsin Liu A hybrid scatter search for the probabilistic traveling salesman problem , 2007, Comput. Oper. Res..

[166]  Ole Agesen,et al.  A comparison of software and hardware techniques for x86 virtualization , 2006, ASPLOS XII.

[167]  Maya Gokhale,et al.  Matched Filter Computation on FPGA, Cell and GPU , 2007, 15th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2007).

[168]  Arkadiusz Kawa,et al.  Cooperation between Logistics Service Providers Based on Cloud Computing , 2013, ACIIDS.

[169]  Klaus-Dieter Thoben,et al.  Supporting Inclusive Design of Mobile Devices with a Context Model , 2012 .

[170]  Peter Van Roy,et al.  Exploring Fractals on the Macintosh , 1994 .

[171]  Andreas Christmann,et al.  Support vector machines , 2008, Data Mining and Knowledge Discovery Handbook.

[172]  Guy Pujolle,et al.  A Survey on Identity Management for the Future Network , 2013, IEEE Communications Surveys & Tutorials.

[173]  Dimitris Bertsimas,et al.  Computational Approaches to Stochastic Vehicle Routing Problems , 1995, Transp. Sci..

[174]  J. Löser,et al.  An I / O Architecture for Microkernel-Based Operating Systems , 2003 .

[175]  Brian Elvesæter,et al.  Specifying Services using the Service Oriented Architecture Modeling Language (SoaML) - A Baseline for Specification of Cloud-based Services , 2011, CLOSER.

[176]  Li Sui,et al.  The Design and Realization of Embedded Gateway Based on WSN , 2008, 2008 International Conference on Computer Science and Software Engineering.

[177]  Marco Domenico Aime,et al.  The risks with security metrics , 2008, QoP '08.

[178]  Guy Leduc,et al.  Basic Abstractions for an Autonomic Network Architecture , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[179]  Divyakant Agrawal,et al.  Big data and cloud computing: current state and future opportunities , 2011, EDBT/ICDT '11.

[180]  Janusz Strużyna,et al.  Puzzle "bycia zatrudnionym" - wyzwania nowego HRM dla menedżerów , 2013 .

[181]  Piotr Korbel,et al.  LocFusion API - Programming interface for accurate multi-source mobile terminal positioning , 2013, 2013 Federated Conference on Computer Science and Information Systems.

[182]  Hung-Hsuan Huang,et al.  From observation to simulation: generating culture-specific behavior for interactive systems , 2009, AI & SOCIETY.

[183]  Bogdan Franczyk,et al.  Applying big data and linked data concepts in supply chains management , 2013, 2013 Federated Conference on Computer Science and Information Systems.

[184]  Jesus San-Miguel-Ayanz,et al.  Active Fire Detection for Fire Emergency Management: Potential and Limitations for the Operational Use of Remote Sensing , 2005 .

[185]  Mauro Nunes,et al.  Assessing the Performance of Virtual Teams with Intelligent Agents , 2011 .

[186]  Watts S. Humphrey,et al.  The Watts New Collection: Columns by the SEI’s Watts Humphrey , 2009 .

[187]  Miguel Correia,et al.  SCFS: A Shared Cloud-backed File System , 2014, USENIX Annual Technical Conference.

[188]  Dimitris Bertsimas,et al.  The probabilistic minimum spanning tree problem , 1990, Networks.

[189]  Markus Klann,et al.  Virtual User Models - Approach and first results of the VICON project. , 2011 .

[190]  Joel Rosenblatt Security Metrics: A Solution in Search of a Problem , 2008 .

[191]  Wayne A. Jansen,et al.  Directions in Security Metrics Research , 2009 .

[192]  Ajay Jasra,et al.  On population-based simulation for static inference , 2007, Stat. Comput..

[193]  Yehya Mohamad,et al.  Prototype of a Virtual User Modeling Software Framework for Inclusive Design of Consumer Products and User Interfaces , 2013, HCI.

[194]  Danny Dhillon,et al.  Developer-Driven Threat Modeling: Lessons Learned in the Trenches , 2011, IEEE Security & Privacy.

[195]  Ryszard Rutka,et al.  Metoda identyfikacji zdolności systemu motywacyjnego do kreowania zachowań oczekiwanych przez pracodawcę , 2013 .

[196]  Mabry Tyson,et al.  A security enforcement kernel for OpenFlow networks , 2012, HotSDN '12.

[197]  Antonio Casimiro,et al.  A Trustworthy and Resilient Event Broker for Monitoring Cloud Infrastructures , 2012, DAIS.

[198]  Anthony N. Pettitt,et al.  Transdimensional sequential Monte Carlo using variational Bayes - SMCVB , 2016, Comput. Stat. Data Anal..

[199]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[200]  Kirstie Hawkey,et al.  Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures , 2012, Computers & security.

[201]  Robert K. Cunningham,et al.  Why Measuring Security Is Hard , 2010, IEEE Security & Privacy.

[202]  Krzysztof Pancerz,et al.  Classification of MMPI Profiles of Patients with Mental Disorders - Experiments with Attribute Reduction and Extension , 2010, RSKT.

[203]  D. Bertsimas,et al.  Further results on the probabilistic traveling salesman problem , 1993 .

[204]  Kunihiko Kaneko,et al.  A Generic Mechanism for Adaptive Growth Rate Regulation , 2007, PLoS Comput. Biol..

[205]  Patrick Langdon,et al.  Inclusion and interaction: Designing interaction for inclusive populations , 2010, Interact. Comput..

[206]  Bernhard Ager,et al.  Outsourcing the routing control logic: better internet routing based on SDN principles , 2012, HotNets-XI.

[207]  A. J. Goldman Minimax Location of a Facility in a Network , 1972 .

[208]  Simeon Keates,et al.  Inclusive Design: Design for the Whole Population , 2003 .

[209]  Feng Zhao,et al.  Tiny web services: design and implementation of interoperable and evolvable sensor networks , 2008, SenSys '08.

[210]  Eiji Oki,et al.  Application of Attractor Selection to Adaptive Virtual Network Topology Control , 2008, BIONETICS.

[211]  Si-Ho Cha,et al.  Ontology-Based Methodology for Managing Heterogeneous Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[212]  Neil J. Gunther Time—The Zeroth Performance Metric , 2011 .

[213]  Louis Goubin,et al.  Protecting AES with Shamir's Secret Sharing Scheme , 2011, CHES.

[214]  Gerald G. Brown,et al.  How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[215]  Gilbert Laporte,et al.  A Priori Optimization of the Probabilistic Traveling Salesman Problem , 1994, Oper. Res..

[216]  Peter Gregor,et al.  “User sensitive inclusive design”— in search of a new paradigm , 2000, CUU '00.

[217]  G. Rein,et al.  Forecasting fire growth using an inverse zone modelling approach , 2011 .

[218]  Luca Maria Gambardella,et al.  Solving the Homogeneous Probabilistic Traveling Salesman Problem by the ACO Metaheuristic , 2002, Ant Algorithms.

[219]  Hagai Attias,et al.  Inferring Parameters and Structure of Latent Variable Models by Variational Bayes , 1999, UAI.

[220]  Dave Durkee,et al.  Why Cloud Computing Will Never Be Free , 2010, ACM Queue.

[221]  S. Hooper,et al.  A "learning society"? , 1996, Science.

[222]  Eduardo Feitosa,et al.  System Design Artifacts for Resilient Identification and Authentication Infrastructures , 2014, ICNS 2014.

[223]  Robert Faludi Building wireless sensor networks , 2010 .

[224]  Hari Balakrishnan,et al.  CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.

[225]  Panos M. Pardalos,et al.  Expanding neighborhood search–GRASP for the probabilistic traveling salesman problem , 2008, Optim. Lett..

[226]  Alexander Aiken,et al.  Expanding the frontiers of computer science: designing a curriculum to reflect a diverse field , 2010, SIGCSE.

[227]  Iwona Dolinska,et al.  The Mathematical Model for Interference Simulation and Optimization in 802.11n Networks , 2013, CS&P.

[228]  Mary Levering Intellectual Property Rights in Musical Works: Overview, Digital Library Issues and Related Initiatives , 2000, ISMIR.

[229]  Damian Daniluk,et al.  Logistics Mall - Logistiksoftware aus der Cloud , 2014, Wirtschaftsinformatik Manag..

[230]  L. Pichon,et al.  Detection and location of defects in wiring networks using Time Domain reflectometry and neural networks , 2010, Digests of the 2010 14th Biennial IEEE Conference on Electromagnetic Field Computation.

[231]  Jeffrey A. Ingalsbe,et al.  Threat Modeling: Diving into the Deep End , 2008, IEEE Software.

[232]  Renato Recio,et al.  Software defined networking to support the software defined environment , 2014, IBM J. Res. Dev..

[233]  Jeffrey D. Case,et al.  Simple Network Management Protocol (SNMP) , 1989, RFC.

[234]  Glen Gibb,et al.  Outsourcing network functionality , 2012, HotSDN '12.

[235]  Adam Lackorzynski,et al.  Virtual Processors as Kernel Interface , 2010 .

[236]  Magdalene Marinaki,et al.  A Hybrid Multi-Swarm Particle Swarm Optimization algorithm for the Probabilistic Traveling Salesman Problem , 2010, Comput. Oper. Res..

[237]  Luis Miguel Vaquero Gonzalez,et al.  Locking the sky: a survey on IaaS cloud security , 2010, Computing.

[238]  G. Dodig-Crnkovic Scientific Methods in Computer Science , 2002 .

[239]  T. Fink,et al.  Characterization of the probabilistic traveling salesman problem. , 2000, Physical review. E, Statistical, nonlinear, and soft matter physics.

[240]  Janusz Zalewski,et al.  Rough sets: Theoretical aspects of reasoning about data , 1996 .

[241]  David Simchi-Levi,et al.  Finding the Optimal a Priori Tour and Location of a Traveling Salesman with Nonhomogeneous Customers , 1988, Transp. Sci..

[242]  David Wright,et al.  Towards Operational Measures of Computer Security , 1993, J. Comput. Secur..

[243]  Robert S. Laramee,et al.  Open Source Software in Computer Science and IT Higher Education: A Case Study , 2011 .

[244]  Akihiro Nakao Deeply programmable network; emerging technologies for network virtualization and software defined network (SDN) , 2013, 2013 Proceedings of ITU Kaleidoscope: Building Sustainable Communities.

[245]  Patrick Jaillet,et al.  A Priori Solution of a Traveling Salesman Problem in Which a Random Subset of the Customers Are Visited , 1988, Oper. Res..

[246]  Nazim Agoulmine,et al.  FOCALE: A Novel Autonomic Networking Architecture , 2006 .

[247]  Ian Sommerville,et al.  Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[248]  D. Lloyd Biological time is fractal: Early events reverberate over a life time , 2008, Journal of Biosciences.

[249]  Constantine Stephanidis,et al.  User-Centered Interaction Paradigms for Universal Access in the Information Society , 2004, Lecture Notes in Computer Science.

[250]  Vlad Trifa,et al.  Towards physical mashups in the Web of Things , 2009, 2009 Sixth International Conference on Networked Sensing Systems (INSS).

[251]  Jolanta Sala,et al.  Rozwiązania instytucjonalne na rzecz transferu wiedzy i kompetencji , 2013 .

[252]  Colin Tankard,et al.  Advanced Persistent threats and how to monitor and deter them , 2011, Netw. Secur..

[253]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[254]  Daniele Miorandi,et al.  BIONETS : a New Vision of Opportunistic Networks , 2007 .

[255]  David H. Sharp,et al.  Complex Fluid Mixing Flows: Simulation vs. Theory vs. Experiment , 2006 .

[256]  Ronald W. Potter The Art of Measurement: Theory and Practice , 1999 .

[257]  M. Wand,et al.  Mean field variational bayes for elaborate distributions , 2011 .

[258]  Kevin M. Stine,et al.  Performance Measurement Guide for Information Security , 2008 .

[259]  Yan Liu,et al.  A Context-Aware Policy Model to Support Autonomic Networking , 2008, 2008 32nd Annual IEEE International Computer Software and Applications Conference.

[260]  Andrew J. Kornecki,et al.  Studying interrelationships of safety and security for software assurance in cyber-physical systems: Approach based on bayesian belief networks , 2013, 2013 Federated Conference on Computer Science and Information Systems.

[261]  Jerry Kanter,et al.  Knowledge Management, Practically Speaking , 1999, Inf. Syst. Manag..

[262]  W. Bruce Croft,et al.  Effective query formulation with multiple information sources , 2012, WSDM '12.

[263]  Olivier Darrigol,et al.  Number and measure: Hermann von Helmholtz at the crossroads of mathematics, physics, and psychology. , 2003, Studies in history and philosophy of science.

[264]  Jianhua Zhang,et al.  Design and Optimization of Wireless Sensor Network with Mobile Gateway , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[265]  Krzysztof Pancerz,et al.  Rule-Based Classification of MMPI Data of Patients with Mental Disorders: Experiments with Basic and Extended Profiles , 2011, Int. J. Comput. Intell. Syst..

[266]  Felix Stalder,et al.  The Age of Spiritual Machines: When Computers Exceed Human Intelligence , 2001, CSOC.

[267]  Brendan Jennings,et al.  An autonomic architecture to manage Ubiquitous Computing networks and applications , 2009, 2009 First International Conference on Ubiquitous and Future Networks.

[268]  Vangelis Th. Paschos,et al.  The Probabilistic Minimum Coloring Problem , 2003, WG.

[269]  George Strawn Science or Security , 2016 .

[270]  Charles Fleurent,et al.  Genetic and hybrid algorithms for graph coloring , 1996, Ann. Oper. Res..

[271]  Arthur M. Farley,et al.  Computation of the center and diameter of outerplanar graphs , 1980, Discret. Appl. Math..

[272]  Ann Melissa Campbell,et al.  Extension of the 2-p-opt and 1-shift algorithms to the heterogeneous probabilistic traveling salesman problem , 2007, Eur. J. Oper. Res..

[273]  Francesco Rossi,et al.  Aspects of Heuristic Methods in the Probabilistic Traveling Salesman Problem (PTSP) , 1987 .

[274]  Sungyoung Lee,et al.  Connecting Sensor Networks with TCP/IP Network , 2006, APWeb Workshops.

[275]  Jamal Hadi Salim,et al.  Forwarding and Control Element Separation (ForCES) Forwarding Element Model , 2010, RFC.

[276]  Alysson Neves Bessani,et al.  State Machine Replication for the Masses with BFT-SMART , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.

[277]  Vangelis Th. Paschos,et al.  Probabilistic combinatorial optimization problems on graphs: A new domain in operational research , 1995 .

[278]  Lisa Z. Song,et al.  The Role of Information Technologies in Enhancing R&D–Marketing Integration: An Empirical Investigation , 2010 .

[279]  S. Puuronen,et al.  Fuzzy Classifier Based on Fuzzy Decision Tree , 2007, EUROCON 2007 - The International Conference on "Computer as a Tool".

[280]  K Alagarsamy,et al.  The Applicability of Existing Metrics for Software Security , 2010 .

[281]  Vangelis Th. Paschos,et al.  The probabilistic maximum independent set problem , 1995 .

[282]  Emilie Poirson,et al.  Comparative analysis of human modeling tools , 2013 .

[283]  Benoit B. Mandelbrot,et al.  Fractal Geometry of Nature , 1984 .

[284]  G.N. Rouskas,et al.  On Hierarchical Traffic Grooming in WDM Networks , 2008, IEEE/ACM Transactions on Networking.

[285]  Gebhard Geiger,et al.  Does lift of liquid ban raise or compromise the current level of aviation security in the European Union? Simulation-based quantitative security risk analysis and assessment , 2015 .

[286]  片山 徹 Subspace methods for system identification , 2005 .

[287]  Yoji Akao,et al.  Quality Function Deployment : Integrating Customer Requirements into Product Design , 1990 .

[288]  Piotr Korbel,et al.  Student information delivery platform using telecommunications open middleware APIs , 2013, 2013 Federated Conference on Computer Science and Information Systems.

[289]  Federico Gobbo,et al.  The Pomodoro Technique for Sustainable Pace in Extreme Programming Teams , 2008, XP.

[290]  Damian M. Lyons,et al.  Evaluation of a Parallel Architecture and Algorithm for Mapping and Localization , 2007, 2007 International Symposium on Computational Intelligence in Robotics and Automation.

[291]  Tarja Susi,et al.  Technostress in the office: a distributed cognition perspective on human–technology interaction , 2013, Cognition, Technology & Work.

[292]  Jaroslaw Legierski,et al.  Parking Reservation - application dedicated for car users based on telecommunications APIs , 2013, 2013 Federated Conference on Computer Science and Information Systems.

[293]  L. Baum,et al.  A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains , 1970 .

[294]  J. Prins Directive 2003/98/EC of the European Parliament and of the Council , 2006 .

[295]  Richard W. Longman On the Interaction Between Theory, Experiments, and Simulation in Developing Practical Learning Control Algorithms , 2003 .

[296]  Peter I. Corke,et al.  Toward trusted wireless sensor networks , 2010, TOSN.

[297]  P. Moral,et al.  Sequential Monte Carlo samplers , 2002, cond-mat/0212648.

[298]  Kishor S. Trivedi,et al.  Ten Fallacies of Availability and Reliability Analysis , 2008, ISAS.

[299]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[300]  David Hylender,et al.  Data Breach Investigations Report , 2011 .

[301]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[302]  Song Wang,et al.  Shape deformation: SVM regression and application to medical image segmentation , 2001, Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001.

[303]  Konrad Campowsky,et al.  BonFIRE: A Multi-cloud Test Facility for Internet of Services Experimentation , 2012, TRIDENTCOM.

[304]  Marina Schmid,et al.  The Third Wave , 2016 .

[305]  Alessandro Chiuso,et al.  Some Algorithmic aspects of Subspace Identification with Inputs , 2001 .

[306]  Yiyu Yao,et al.  On Generalizing Rough Set Theory , 2003, RSFDGrC.

[307]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[308]  William H. Sanders Quantitative Security Metrics: Unattainable Holy Grail or a Vital Breakthrough within Our Reach? , 2014, IEEE Security & Privacy.

[309]  Jugoslav Achkoski,et al.  Intelligence information system (IIS) with SOA-based information systems , 2011, Proceedings of the ITI 2011, 33rd International Conference on Information Technology Interfaces.

[310]  Chunli Bai,et al.  Fractal structure and fractal dimension determination at nanometer scale , 1999 .

[311]  James G. Quintiere,et al.  Enclosure Fire Dynamics , 1999 .

[312]  Uwe Arnold,et al.  Advancements in cloud computing for logistics , 2013, 2013 Federated Conference on Computer Science and Information Systems.

[313]  Krzysztof Pancerz,et al.  A preliminary attempt to rules generation for mental disorders , 2010, 3rd International Conference on Human System Interaction.

[314]  Tomasz Imielinski,et al.  Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.

[315]  Mike P. Papazoglou,et al.  e-Business: Organizational and Technical Foundations , 2006 .

[316]  Peter I. Corke,et al.  secFleck: A Public Key Technology Platform for Wireless Sensor Networks , 2009, EWSN.

[317]  L. Edvinsson Developing intellectual capital at Skandia , 1997 .

[318]  Yuan-Shun Dai,et al.  A study of service reliability and availability for distributed systems , 2003, Reliab. Eng. Syst. Saf..

[319]  S. LalitMohan,et al.  IDRBT Community Cloud for Indian Banks , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[320]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[321]  Timothy J. Robinson,et al.  Sequential Monte Carlo Methods in Practice , 2003 .

[322]  Capers Jones,et al.  Embedded Software: Facts, Figures, and Future , 2009, Computer.

[323]  Gregory Gutin,et al.  The traveling salesman problem , 2006, Discret. Optim..

[324]  N. Chopin A sequential particle filter method for static models , 2002 .

[325]  M. Dorigo,et al.  Ant colony optimization and local search for the probabilistic traveling salesman problem: a case study in stochastic combinatorial optimization , 2006 .

[326]  Syed Ali Khayam,et al.  Revisiting Traffic Anomaly Detection Using Software Defined Networking , 2011, RAID.

[327]  Ramesh Sharda,et al.  You’ve got email! Does it really matter to process emails now or later? , 2011, Inf. Syst. Frontiers.

[328]  W E Hatcher Automated classification of MMPI profiles into psychotic, neurotic or personality disorder types. , 1978, Computer programs in biomedicine.

[329]  Terje Aven,et al.  The Role of Quantitative Risk Assessments for Characterizing Risk and Uncertainty and Delineating Appropriate Risk Management Options, with Special Emphasis on Terrorism Risk , 2009, Risk analysis : an official publication of the Society for Risk Analysis.

[330]  W. Levelt Models of word production , 1999, Trends in Cognitive Sciences.

[331]  Sebastian Abeck,et al.  Evaluation of Service Designs Based on SoaML , 2010, 2010 Fifth International Conference on Software Engineering Advances.

[332]  José A. Pino,et al.  A generalized algorithm for centrality problems on trees , 1989, JACM.

[333]  M. Peter,et al.  Towards Modular Security-conscious Virtual Machines , 2010 .

[334]  François Pachet,et al.  Hit Song Science Is Not Yet a Science , 2008, ISMIR.

[335]  Marco Listanti,et al.  Off-line configuration of a MPLS over WDM network under time-varying offered traffic , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[336]  Maria Macchiato,et al.  On the methods to identify clustering properties in sequences of seismic time-occurrences , 2002 .

[337]  O. Kariv,et al.  An Algorithmic Approach to Network Location Problems. I: The p-Centers , 1979 .

[338]  Hinrich Schütze,et al.  Introduction to information retrieval , 2008 .

[339]  J. Winch,et al.  Supply Chain Management: Strategy, Planning, and Operation , 2003 .

[340]  Giuseppe Longo,et al.  Scaling and Scale Symmetries in Biological Systems , 2014 .

[341]  Debra Herrmann,et al.  Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI , 2007 .

[342]  Artur Rot,et al.  IT security threats in cloud computing sourcing model , 2013, 2013 Federated Conference on Computer Science and Information Systems.

[343]  Y. Rahmat-Samii,et al.  Particle swarm optimization in electromagnetics , 2004, IEEE Transactions on Antennas and Propagation.

[344]  Gernot Heiser,et al.  The role of virtualization in embedded systems , 2008, IIES '08.

[345]  Yehya Mohamad,et al.  Creative Design for Inclusion Using Virtual User Models , 2012, ICCHP.

[346]  Debra M. Amidon,et al.  Innovation Strategy for the Knowledge Economy , 1997 .

[347]  Mike P. Papazoglou,et al.  Service-oriented design and development methodology , 2006, Int. J. Web Eng. Technol..

[348]  Nazim Agoulmine,et al.  Challenges for Autonomic Network Management , 2006 .

[349]  Paulo Veríssimo,et al.  Intrusion-tolerant middleware: the road to automatic security , 2006, IEEE Security & Privacy.

[350]  R. Kurzweil,et al.  The Singularity Is Near: When Humans Transcend Biology , 2006 .

[351]  E. Eckholm,et al.  Losing Ground: Environmental Stress and World Food Prospects , 1976 .

[352]  Bogdan Franczyk,et al.  Applying Linked Data concepts in BPM , 2012, 2012 Federated Conference on Computer Science and Information Systems (FedCSIS).

[353]  David Sinreich,et al.  An architectural blueprint for autonomic computing , 2006 .

[354]  Richard Bejtlich,et al.  The Practice of Network Security Monitoring: Understanding Incident Detection and Response , 2013 .

[355]  Tom Briggs Techniques for active learning in CS courses , 2005 .

[356]  Rodrigo Braga,et al.  Lightweight DDoS flooding attack detection using NOX/OpenFlow , 2010, IEEE Local Computer Network Conference.

[357]  Anthony Seeger,et al.  I Found It, How Can I Use It?" - Dealing With the Ethical and Legal Constraints of Information Access , 2003, ISMIR.

[358]  Kristin L. Wood,et al.  Development of a Functional Basis for Design , 2000 .

[359]  Jiewen Wu,et al.  A Study of Ontology-based Query Expansion , 2011 .

[360]  Bozo Nikolic,et al.  Designing and Building an Information System for a Higher Education Institution , 2008 .

[361]  R. Srikant,et al.  A tutorial on cross-layer optimization in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[362]  Hao Wang,et al.  Security metrics for software systems , 2009, ACM-SE 47.

[363]  Ofodike A. Ezekoye,et al.  Characterizing Heat Release Rates Using an Inverse Fire Modeling Technique , 2012 .

[364]  Salim Hariri,et al.  The Autonomic Computing Paradigm , 2006, Cluster Computing.

[365]  Guillermo Rein,et al.  Forecasting fire dynamics using inverse computational fluid dynamics and tangent linearisation , 2012, Adv. Eng. Softw..

[366]  D. Luckham Event Processing for Business: Organizing the Real-Time Enterprise , 2011 .

[367]  David B. Fogel,et al.  Evolutionary algorithms in theory and practice , 1997, Complex.

[368]  Roberto Turrin,et al.  Performance of recommender algorithms on top-n recommendation tasks , 2010, RecSys '10.

[369]  Elena N. Zaitseva,et al.  Usage of New Information Estimations for Induction of Fuzzy Decision Trees , 2002, IDEAL.

[370]  Adam Lackorzynski,et al.  Virtual machines jailed: virtualization in systems with small trusted computing bases , 2009, VDTS '09.

[371]  Miguel Correia,et al.  Clouds-of-Clouds for Dependability and Security: Geo-replication Meets the Cloud , 2013, Euro-Par Workshops.

[372]  Jaana Kekäläinen,et al.  Cumulated gain-based evaluation of IR techniques , 2002, TOIS.

[373]  Jean Kerisel Of Stones and Man: From the Pharaohs to the Present Day , 2005 .

[374]  Adalberto Llarena Here Comes the Robotic Brain ! , 2010, FIRA RoboWorld Congress.

[375]  Thomas A. Limoncelli,et al.  The Practice of System and Network Administration , 2001 .

[376]  Michaéla C. Schippers,et al.  Energy Management of People in Organizations: A Review and Research Agenda , 2011, Journal of business and psychology.

[377]  Jin-Kao Hao,et al.  Hybrid Evolutionary Algorithms for Graph Coloring , 1999, J. Comb. Optim..

[378]  Enrique Alba,et al.  Parallel Metaheuristics: A New Class of Algorithms , 2005 .

[379]  Prasanna Balaprakash,et al.  Adaptive sample size and importance sampling in estimation-based local search for the probabilistic traveling salesman problem , 2009, Eur. J. Oper. Res..

[380]  Slawomir Kuklinski,et al.  Programmable management framework for evolved SDN , 2014, 2014 IEEE Network Operations and Management Symposium (NOMS).

[381]  Mass Soldal Lund,et al.  A Conceptual Model for Service Availability , 2006, Quality of Protection.

[382]  Minna Räikkönen,et al.  A Framework for Integrating Economic Evaluation and Risk Assessment to Support Policymakers' Security-related Decisions , 2012 .

[383]  Michael Norrish,et al.  seL4: formal verification of an OS kernel , 2009, SOSP '09.

[384]  Chao Xu,et al.  IFME: information filtering by multiple examples with under-sampling in a digital library environment , 2013, JCDL '13.

[385]  Kristin E. Lauter,et al.  Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.

[386]  Uwe Arnold,et al.  LOGICAL — Development of cloud computing platforms and tools for logistics hubs and communities , 2012, 2012 Federated Conference on Computer Science and Information Systems (FedCSIS).

[387]  Andrei Broder,et al.  A taxonomy of web search , 2002, SIGF.

[388]  Antonio Cerone,et al.  Using Free/Libre Open Source Software Projects as E-learning Tools , 2010, Electron. Commun. Eur. Assoc. Softw. Sci. Technol..

[389]  Joshua D. Knowles,et al.  Local search for the probabilistic traveling salesman problem: Correction to the 2-p-opt and 1-shift algorithms , 2005, Eur. J. Oper. Res..

[390]  T. Healy,et al.  The Well-Being of Nations: The Role of Human and Social Capital. Education and Skills. , 2001 .

[391]  Yusnani Mohd Yussoff,et al.  Identity-based Trusted Authentication in Wireless Sensor Network , 2012, ArXiv.

[392]  Riccardo Poli,et al.  Particle swarm optimization , 1995, Swarm Intelligence.

[393]  J. Clarkson,et al.  Inclusive design , 2010 .

[394]  Mary-Anne Williams,et al.  Robot Social Intelligence , 2012, ICSR.

[395]  D. Bertsimas Probabilistic combinatorial optimization problems , 1988 .

[396]  Radu Sion,et al.  To cloud or not to cloud?: musings on costs and viability , 2011, SOCC '11.

[397]  Matthew J. Traxler,et al.  Introduction to Psycholinguistics: Understanding Language Science , 2011 .

[398]  Jane Large Koeckeritz,et al.  The Seven Principles of Good Practice , 2002 .

[399]  Qian Zhu,et al.  IOT Gateway: BridgingWireless Sensor Networks into Internet of Things , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[400]  Luca Maria Gambardella,et al.  An Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem , 2002, PPSN.

[401]  Lingxuan Hu,et al.  Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[402]  Ajay Kumar,et al.  Cloud computing - An emerging trend in information technology , 2014, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).

[403]  W. R. Howard Software Measurement and Estimation: A Practical Approach , 2007 .

[404]  Victor Bahl,et al.  Mobile IP: A Solution for Transparent, Seamless Mobile Computer Communications , 1998 .

[405]  Fred Cohen,et al.  How Do We Measure Security , 2011 .

[406]  Juraj Hromkovic Stability of Approximation Algorithms for Hard Optimization Problems , 1999, SOFSEM.

[407]  Adam Smith,et al.  Special Issue on Statistical and Learning-Theoretic Challenges in Data Privacy , 2012, J. Priv. Confidentiality.

[408]  Begoña C. Arrue,et al.  Computer vision techniques for forest fire perception , 2008, Image Vis. Comput..

[409]  Dharma P. Agrawal,et al.  A generalized algorithm for evaluating distributed-program reliability , 1993 .

[410]  Jaydip Sen,et al.  A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..

[411]  Krzysztof Pancerz,et al.  Copernicus - An Expert System Supporting Differential Diagnosis of Patients Examined using the MMPI Test - An Index-rule Approach , 2011, HEALTHINF.

[412]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[413]  J. Stephen Downie,et al.  The International Music Information Retrieval Systems Evaluation Laboratory: Governance, Access and Security , 2004, ISMIR.

[414]  Ali Mostashari,et al.  Measuring systems security , 2013, Syst. Eng..

[415]  Konstantina Papagiannaki,et al.  Structural analysis of network traffic flows , 2004, SIGMETRICS '04/Performance '04.

[416]  Andrzej Bialas Risk Assessment Aspects in Mastering the Value Function of Security Measures , 2013, DepCoS-RELCOMEX.

[417]  Haoyu Song,et al.  Protocol-oblivious forwarding: unleash the power of SDN through a future-proof forwarding plane , 2013, HotSDN '13.

[418]  Alex Doboli,et al.  Dynamic reconfiguration in a PSoC device , 2009, 2009 International Conference on Field-Programmable Technology.

[419]  Ronald Maier,et al.  Knowledge management systems - information and communication technologies for knowledge management (3. ed.) , 2007 .

[420]  J. Beardwood,et al.  The shortest path through many points , 1959, Mathematical Proceedings of the Cambridge Philosophical Society.

[421]  Selim Zaim,et al.  Performance of knowledge management practices: a causal analysis , 2007, J. Knowl. Manag..

[422]  L. Zadeh,et al.  Fuzzy Logic for the Management of Uncertainty , 1992 .

[423]  Min Zhu,et al.  B4: experience with a globally-deployed software defined wan , 2013, SIGCOMM.

[424]  Ziynet Dayıoğlu Secure Database in Cloud Computing - CryptDB Revisited , 2014 .

[425]  Hermann Härtig,et al.  Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors , 2004, EW 11.

[426]  Michel Gendreau,et al.  A Tabu Search Heuristic for the Vehicle Routing Problem with Stochastic Demands and Customers , 1996, Oper. Res..

[427]  Eric Rogers,et al.  Subspace Identification of Process Dynamics for Iterative Learning Control , 2013 .

[428]  Ming Li,et al.  Software Design of a Simple Wireless Sensor Network System Based on CC2430 , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.