E-Business and Telecommunications: 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26–28, 2019, Revised Selected Papers

The identification of causes of errors in network systems is difficult due to their inherent complexity. Network administrators usually rely on available information sources to analyze the current situation and identify possible problems. Even though they are able to identify the symptoms seen in the past and thus can apply their experience gathered from the solved cases the time needed to identify and correct the errors is considerable. The automation of the troubleshooting process is a way to reduce the time spent on individual cases. In this paper, the model that can be used to automate the diagnostic process of network communication is presented. The model is based on building the finite automaton to describe protocol behavior in various situations. The unknown communication is checked against the model to identify error states and associated descriptions of causes. The tool prototype was implemented in order to demonstrate the proposed method via a set of experiments.

[1]  Robert G. Gallager,et al.  Low-density parity-check codes , 1962, IRE Trans. Inf. Theory.

[2]  V. Strassen Gaussian elimination is not optimal , 1969 .

[3]  E. Wolpert A Manual of Standardized Terminology, Techniques and Scoring System for Sleep Stages of Human Subjects. , 1969 .

[4]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[5]  T. W. Parsons Separation of speech from interfering speech by means of harmonic selection , 1976 .

[6]  E. Kay,et al.  Introductory Graph Theory , 1978 .

[7]  Abbas El Gamal,et al.  Capacity theorems for the relay channel , 1979, IEEE Trans. Inf. Theory.

[8]  Andrew Chi-Chih Yao,et al.  Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.

[9]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[10]  H. Cooper Organizing knowledge syntheses: A taxonomy of literature reviews , 1988 .

[11]  Joachim Hagenauer,et al.  A Viterbi algorithm with soft-decision outputs and its applications , 1989, IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond.

[12]  A. Glavieux,et al.  Near Shannon limit error-correcting coding and decoding: Turbo-codes. 1 , 1993, Proceedings of ICC '93 - IEEE International Conference on Communications.

[13]  Guy J. Brown,et al.  Computational auditory scene analysis , 1994, Comput. Speech Lang..

[14]  J. Samet,et al.  The Sleep Heart Health Study: design, rationale, and methods. , 1997, Sleep.

[15]  Hans-Andrea Loeliger New turbo-like codes , 1997, Proceedings of IEEE International Symposium on Information Theory.

[16]  H. Otzenberger,et al.  Temporal relationship between dynamic heart rate variability and electroencephalographic activity during sleep in man , 1997, Neuroscience Letters.

[17]  W. Loh,et al.  SPLIT SELECTION METHODS FOR CLASSIFICATION TREES , 1997 .

[18]  Uri Zwick,et al.  All pairs shortest paths in weighted directed graphs-exact and almost exact algorithms , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).

[19]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[20]  Uri Zwick,et al.  All pairs shortest paths in undirected graphs with integer weights , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).

[21]  Emre Telatar,et al.  Capacity of Multi-antenna Gaussian Channels , 1999, Eur. Trans. Telecommun..

[22]  R. Wise,et al.  Go Downstream: The New Profit Imperative in Manufacturing , 1999 .

[23]  Reid Lifset Moving from Products to Services , 2000 .

[24]  Ivan Damgård,et al.  Multiparty Computation from Threshold Homomorphic Encryption , 2000, EUROCRYPT.

[25]  Dariush Divsalar,et al.  Serial turbo trellis coded modulation with rate-1 inner code , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).

[26]  Michael A. Casey,et al.  Separation of Mixed Audio Sources By Independent Subspace Analysis , 2000, ICMC.

[27]  Silvio Micali,et al.  Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements , 2000, EUROCRYPT.

[28]  J. Trinder,et al.  Autonomic activity during human sleep as a function of time and sleep stage , 2001, Journal of sleep research.

[29]  Johann Großschädl,et al.  A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m) , 2001, CHES.

[30]  Stephan ten Brink,et al.  Convergence behavior of iteratively decoded parallel concatenated codes , 2001, IEEE Trans. Commun..

[31]  O. Mont Introducing and developing a Product-Service System (PSS) concept in Sweden , 2001 .

[32]  Wenliang Du,et al.  Privacy-preserving cooperative statistical analysis , 2001, Seventeenth Annual Computer Security Applications Conference.

[33]  Mark D. Plumbley,et al.  IF THE INDEPENDENT COMPONENTS OF NATURAL IMAGES ARE EDGES, WHAT ARE THE INDEPENDENT COMPONENTS OF NATURAL SOUNDS? , 2001 .

[34]  Christoph Busch,et al.  Watermarking 2D-vector data for geographical information systems , 2002, IS&T/SPIE Electronic Imaging.

[35]  Richard T. Watson,et al.  Analyzing the Past to Prepare for the Future: Writing a Literature Review , 2002, MIS Q..

[36]  Oksana Mont,et al.  Clarifying the Concept of Product-Service System , 2002 .

[37]  Ryutarou Ohbuchi,et al.  Robust watermarking of vector digital maps , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[38]  Elza Erkip,et al.  User cooperation diversity. Part I. System description , 2003, IEEE Trans. Commun..

[39]  Matthew C. Valenti,et al.  Distributed turbo coded diversity for relay channel , 2003 .

[40]  Ezio Manzini,et al.  A strategic design approach to develop sustainable product service systems: examples taken from the ‘environmentally friendly innovation’ Italian prize , 2003 .

[41]  G.-J. Jang,et al.  Single-channel signal separation using time-domain basis functions , 2003, IEEE Signal Processing Letters.

[42]  A. Tukker Eight types of product–service system: eight ways to sustainability? Experiences from SusProNet , 2004 .

[43]  Peter W. Markstein,et al.  Software Division and Square Root Using Goldschmidt's Algorithms , 2004 .

[44]  V. Tarokh,et al.  Design and analysis of collaborative diversity protocols for wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[45]  Sanjay Ghemawat,et al.  MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.

[46]  DeLiang Wang,et al.  Overcomplete Blind Source Separation by Combining ICA and Binary Time-Frequency Masking , 2005, 2005 IEEE Workshop on Machine Learning for Signal Processing.

[47]  Eike Kiltz,et al.  Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation , 2006, IACR Cryptol. ePrint Arch..

[48]  T. Strine,et al.  Associations of frequent sleep insufficiency with health-related quality of life and health behaviors. , 2005, Sleep medicine.

[49]  Yuval Ishai,et al.  Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation , 2005, TCC.

[50]  Dan Barry,et al.  Single Channel Source Separation using Short-time Independent Component Analysis , 2005 .

[51]  Rémi Gribonval,et al.  Performance measurement in blind audio source separation , 2006, IEEE Transactions on Audio, Speech, and Language Processing.

[52]  Peng Li,et al.  Monaural Speech Separation Based on Computational Auditory Scene Analysis and Objective Quality Assessment of Speech , 2006, IEEE Transactions on Audio, Speech, and Language Processing.

[53]  Lutz H.-J. Lampe,et al.  Distributed space-time coding for multihop transmission in power line communication networks , 2006, IEEE Journal on Selected Areas in Communications.

[54]  Jan C. Aurich,et al.  Life cycle oriented design of technical Product-Service Systems , 2006 .

[55]  Mark R. Every,et al.  Separation of synchronous pitched notes by spectral filtering of harmonics , 2006, IEEE Transactions on Audio, Speech, and Language Processing.

[56]  Aggelos Bletsas,et al.  A simple Cooperative diversity method based on network path selection , 2005, IEEE Journal on Selected Areas in Communications.

[57]  M.E. Davies,et al.  Source separation using single channel ICA , 2007, Signal Process..

[58]  J. Pagel,et al.  Primary care sleep medicine : a practical guide , 2007 .

[59]  Ivan Damgård,et al.  Non-interactive Proofs for Integer Multiplication , 2007, EUROCRYPT.

[60]  Jun Hu,et al.  Low Density Parity Check Codes over Wireless Relay Channels , 2007, IEEE Transactions on Wireless Communications.

[61]  Artak Amirbekyan,et al.  A New Efficient Privacy-Preserving Scalar Product Protocol , 2007, AusDM.

[62]  T S Baines,et al.  State-of-the-art in product-service systems , 2007 .

[63]  Rémi Gribonval,et al.  Oracle estimators for the benchmarking of source separation algorithms , 2007, Signal Process..

[64]  Ashutosh Sabharwal,et al.  Low density parity check codes for the relay channel , 2007, IEEE Journal on Selected Areas in Communications.

[65]  Tsan-sheng Hsu,et al.  Toward Empirical Aspects of Secure Scalar Product , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[66]  M. Anwar Hasan,et al.  High-Performance Architecture of Elliptic Curve Scalar Multiplication , 2008, IEEE Transactions on Computers.

[67]  A. Li,et al.  AUTHENTICATION OF GIS VECTOR DATA BASED ON ZERO-WATERMARKING , 2008 .

[68]  Ping Deng,et al.  Secure Multi-party Protocols for Privacy Preserving Data Mining , 2008, WASA.

[69]  Milos D. Ercegovac,et al.  Digital Arithmetic , 2003, Wiley Encyclopedia of Computer Science and Engineering.

[70]  Derry Fitzgerald,et al.  Extended Nonnegative Tensor Factorisation Models for Musical Sound Source Separation , 2008, Comput. Intell. Neurosci..

[71]  Changshui Zhang,et al.  Unsupervised Single-Channel Music Source Separation by Average Harmonic Structure Modeling , 2008, IEEE Transactions on Audio, Speech, and Language Processing.

[72]  A. Neely Exploring the financial consequences of the servitization of manufacturing , 2008 .

[73]  Kristína Susmáková,et al.  Discrimination ability of individual measures used in sleep stages classification , 2008, Artif. Intell. Medicine.

[74]  Aggelos K. Katsaggelos,et al.  A Computational Auditory Scene Analysis-Enhanced Beamforming Approach for Sound Source Separation , 2009, EURASIP J. Adv. Signal Process..

[75]  Tomas Toft,et al.  Linear, Constant-Rounds Bit-Decomposition , 2009, ICISC.

[76]  Erdal Arikan,et al.  Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.

[77]  Yonghui Li,et al.  Distributed space-time trellis codes for a cooperative system , 2009, IEEE Transactions on Wireless Communications.

[78]  DeLiang Wang,et al.  Monaural Musical Sound Separation Based on Pitch and Common Amplitude Modulation , 2009, IEEE Transactions on Audio, Speech, and Language Processing.

[79]  G. David Forney,et al.  Concatenated codes , 2009, Scholarpedia.

[80]  Jalil Taghia,et al.  Subband-based Single-channel Source Separation of Instantaneous Audio Mixtures , 2009 .

[81]  Yi Li,et al.  Sleep stage classification based on EEG Hilbert-Huang transform , 2009, 2009 4th IEEE Conference on Industrial Electronics and Applications.

[82]  Relay Selection with ANC and TDBC Protocols in Bidirectional Relay Networks , 2010, IEEE Transactions on Communications.

[83]  Jungyeop Kim Robust Vector Digital Watermarking Using Angles and a Random Table , 2010, Adv. Inf. Sci. Serv. Sci..

[84]  Xiang Li,et al.  Iterative embedding-based reversible watermarking for 2D-vector maps , 2010, 2010 IEEE International Conference on Image Processing.

[85]  Octavian Catrina,et al.  Secure Computation with Fixed-Point Numbers , 2010, Financial Cryptography.

[86]  Changshui Zhang,et al.  Multiple Fundamental Frequency Estimation by Modeling Spectral Peaks and Non-Peak Regions , 2010, IEEE Transactions on Audio, Speech, and Language Processing.

[87]  Mariko Nakano-Miyatake,et al.  A Blind Video Watermarking Scheme Robust To Frame Attacks Combined With MPEG2 Compression , 2010 .

[88]  Chokri Ben Amar,et al.  Collusion, MPEG4 compression and frame dropping resistant video watermarking , 2010, Multimedia Tools and Applications.

[89]  Octavian Catrina,et al.  Secure Multiparty Linear Programming Using Fixed-Point Arithmetic , 2010, ESORICS.

[90]  Stefan Conrad,et al.  An approach for automatic sleep stage scoring and apnea-hypopnea detection , 2010, 2010 IEEE International Conference on Data Mining.

[91]  Octavian Catrina,et al.  Improved Primitives for Secure Multiparty Integer Computation , 2010, SCN.

[92]  Vitaly Anatolyevich Mitekin,et al.  The New Blockwise Algorithm for Large-Scale Images Robust Watermarking , 2010, 2010 20th International Conference on Pattern Recognition.

[93]  Lajos Hanzo,et al.  Maximum-Throughput Irregular Distributed Space-Time Code for Near-Capacity Cooperative Communications , 2010, IEEE Transactions on Vehicular Technology.

[94]  Patrick McDaniel,et al.  Analysis techniques for mobile operating system security , 2011 .

[95]  Ki-Ryong Kwon,et al.  Vector watermarking scheme for GIS vector map management , 2011, Multimedia Tools and Applications.

[96]  Herbert Bos,et al.  Minemu: The World's Fastest Taint Tracker , 2011, RAID.

[97]  Bruno Crispo,et al.  YAASE: Yet Another Android Security Extension , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[98]  T. H. Liew,et al.  Turbo Coding, Turbo Equalisation and Space-Time Coding: EXIT-Chart-Aided Near-Capacity Designs for Wireless Channels , 2011 .

[99]  K. J. Ray Liu,et al.  Factorization of Overlapping Harmonic Sounds Using Approximate Matching Pursuit , 2011, ISMIR.

[100]  Dariusz Mika,et al.  ICA-based Single Channel Audio Separation: New Bases and Measures of Distance , 2011 .

[101]  Anna Krakovská,et al.  Automatic sleep scoring: A search for an optimal combination of measures , 2011, Artif. Intell. Medicine.

[102]  Sheng-Fu Liang,et al.  A rule-based automatic sleep staging method , 2011, 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[103]  Seungyeop Han,et al.  These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.

[104]  S. Sohn,et al.  The reliability and validity of the Korean version of the Pittsburgh Sleep Quality Index , 2012, Sleep and Breathing.

[105]  José Ramón Beltrán Blázquez,et al.  Blind separation of overlapping partials in harmonic musical notes using amplitude and phase reconstruction , 2012, EURASIP J. Adv. Signal Process..

[106]  Natheer Khasawneh,et al.  Automated sleep stage identification system based on time-frequency analysis of a single EEG channel and random forest classifier , 2012, Comput. Methods Programs Biomed..

[107]  S. Quan,et al.  Rules for scoring respiratory events in sleep: update of the 2007 AASM Manual for the Scoring of Sleep and Associated Events. Deliberations of the Sleep Apnea Definitions Task Force of the American Academy of Sleep Medicine. , 2012, Journal of clinical sleep medicine : JCSM : official publication of the American Academy of Sleep Medicine.

[108]  Mauro Conti,et al.  MOSES: supporting operation modes on smartphones , 2012, SACMAT '12.

[109]  Roberto Di Pietro,et al.  PRISM - Privacy-Preserving Search in MapReduce , 2012, Privacy Enhancing Technologies.

[110]  W. Jatmiko,et al.  An integrated sleep stage classification device based on electrocardiograph signal , 2012, 2012 International Conference on Advanced Computer Science and Information Systems (ICACSIS).

[111]  Seral Özsen,et al.  Classification of sleep stages using class-dependent sequential feature selection and artificial neural network , 2012, Neural Computing and Applications.

[112]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[113]  E. Zagrouba,et al.  A robust video watermarking based on image mosacing and multi-frequential embedding , 2012, 2012 IEEE 8th International Conference on Intelligent Computer Communication and Processing.

[114]  Dan Bogdanov,et al.  High-performance secure multi-party computation for data mining applications , 2012, International Journal of Information Security.

[115]  Michael Bächle,et al.  Einführung in die Wirtschaftsinformatik , 2012 .

[116]  Gerhard Thonhauser,et al.  Improving time series classification using Hidden Markov Models , 2012, 2012 12th International Conference on Hybrid Intelligent Systems (HIS).

[117]  Mads Dam,et al.  TreeDroid: a tree automaton based approach to enforcing data processing policies , 2012, CCS '12.

[118]  Sheng-Fu Liang,et al.  Automatic Stage Scoring of Single-Channel Sleep EEG by Using Multiscale Entropy and Autoregressive Models , 2012, IEEE Transactions on Instrumentation and Measurement.

[119]  Travis Mayberry,et al.  PIRMAP: Efficient Private Information Retrieval for MapReduce , 2013, Financial Cryptography.

[120]  Roksana Boreli,et al.  On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).

[121]  William Enck,et al.  AppsPlayground: automatic security analysis of smartphone applications , 2013, CODASPY.

[122]  Shengping Zhang,et al.  Dynamic image mosaic via SIFT and dynamic programming , 2013, Machine Vision and Applications.

[123]  Matthias Boehm,et al.  Looking beyond the rim of one's teacup: a multidisciplinary literature review of Product-Service Systems in Information Systems, Business Management, and Engineering & Design , 2013 .

[124]  Lajos Hanzo,et al.  Irregular Convolution and Unity-Rate Coded Network-Coding for Cooperative Multi-User Communications , 2013, IEEE Transactions on Wireless Communications.

[125]  Gautham J. Mysore,et al.  Interactive refinement of supervised and semi-supervised sound source separation estimates , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[126]  Liliane Pintelon,et al.  A refined typology of Product-Service Systems based on Functional Hierarchy Modeling , 2013 .

[127]  Urbano Nunes,et al.  Automatic sleep staging: A computer assisted approach for optimal combination of features and polysomnographic channels , 2013, Expert Syst. Appl..

[128]  Sanjay R. Zadokar,et al.  A digital watermarking for anaglyph 3D images , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[129]  Paulo Augusto Cauchick Miguel,et al.  Product-service systems: a literature review on integrated products and services , 2013 .

[130]  Thomas Roche,et al.  A decision methodology to support servitisation of manufacturing , 2013 .

[131]  Oliver Gassmann,et al.  Geschäftsmodelle entwickeln : 55 innovative Konzepte mit dem St. Galler Business Model Navigator , 2013 .

[132]  Elena Hernández-Pereira,et al.  A method for the automatic analysis of the sleep macrostructure in continuum , 2013, Expert Syst. Appl..

[133]  Antoine Liutkus,et al.  An overview of informed audio source separation , 2013, 2013 14th International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS).

[134]  Ezzeddine Zagrouba,et al.  An online approach for multi-sprite generation based on camera parameters estimation , 2013, Signal Image Video Process..

[135]  Yihua Zhang,et al.  Secure Computation on Floating Point Numbers , 2013, NDSS.

[136]  Yuan Zhang,et al.  Vetting undesirable behaviors in android apps with permission use analysis , 2013, CCS.

[137]  Thomas Schreck,et al.  Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques , 2015, International Journal of Information Security.

[138]  Dirk Westhoff,et al.  Curtailing privilege escalation attacks over asynchronous channels on Android , 2014, 2014 14th International Conference on Innovations for Community Services (I4CS).

[139]  John C. S. Lui,et al.  DroidTrace: A ptrace based Android dynamic analysis system with forward execution capability , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).

[140]  François Le Gall,et al.  Powers of tensors and fast matrix multiplication , 2014, ISSAC.

[141]  T Penzel,et al.  A review of signals used in sleep analysis , 2014, Physiological measurement.

[142]  Louis Chevallier,et al.  An interactive audio source separation framework based on non-negative matrix factorization , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[143]  Yanick Fratantonio,et al.  Andrubis: Android Malware Under the Magnifying Glass , 2014 .

[144]  Sankardas Roy,et al.  Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps , 2014, CCS.

[145]  R. Anitha,et al.  Robust and blind watermarking scheme for three dimensional anaglyph images , 2014, Comput. Electr. Eng..

[146]  Hakan Erdogan,et al.  Deep neural networks for single channel source separation , 2013, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[147]  Mauro Conti,et al.  MOSES: Supporting and Enforcing Security Profiles on Smartphones , 2014, IEEE Transactions on Dependable and Secure Computing.

[148]  Xiapu Luo,et al.  On Tracking Information Flows through JNI in Android Applications , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.

[149]  Chang-qing Zhu,et al.  Selective authentication algorithm based on semi-fragile watermarking for vector geographical data , 2014, 2014 22nd International Conference on Geoinformatics.

[150]  Ana R. Cavalli,et al.  Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps , 2014, FPS.

[151]  Din J. Wasem,et al.  Mining of Massive Datasets , 2014 .

[152]  John Bosco Balaguru Rayappan,et al.  Dual Cellular Automata on FPGA: An Image Encryptors Chip , 2014 .

[153]  Jure Leskovec,et al.  Mining of Massive Datasets, 2nd Ed , 2014 .

[154]  Jan Willemson,et al.  Secure floating point arithmetic and private satellite collision analysis , 2015, International Journal of Information Security.

[155]  Musa Peker,et al.  A Comparative Study on Classification of Sleep Stage Based on EEG Signals Using Feature Selection and Classification Algorithms , 2014, Journal of Medical Systems.

[156]  Alessandro Armando,et al.  Securing the "Bring Your Own Device" Paradigm , 2014, Computer.

[157]  Birgit Vogel-Heuser,et al.  Innovationsprozesse zyklenorientiert managen , 2014 .

[158]  Joris Van Ostaeyen Analysis of the Business Potential of Product-Service Systems for Investment Goods (Analyse van het zakelijk potentieel van product-dienstsystemen voor investeringsgoederen) , 2014 .

[159]  Zhiyong Peng,et al.  Blind watermarking scheme for polylines in vector geo-spatial data , 2014, Multimedia Tools and Applications.

[160]  Yuwei Peng,et al.  A Zero-Watermarking Scheme for Vector Map Based on Feature Vertex Distance Ratio , 2015, J. Electr. Comput. Eng..

[161]  Miroslav Zivanovic,et al.  Harmonic Bandwidth Companding for Separation of Overlapping Harmonics in Pitched Signals , 2015, IEEE/ACM Transactions on Audio, Speech, and Language Processing.

[162]  Franck Giron,et al.  Deep neural network based instrument extraction from music , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[163]  Homer Nazeran,et al.  Automatic sleep staging by simultaneous analysis of ECG and respiratory signals in long epochs , 2015, Biomed. Signal Process. Control..

[164]  Xue Liu,et al.  Effective Real-Time Android Application Auditing , 2015, 2015 IEEE Symposium on Security and Privacy.

[165]  Loganathan Agilandeeswari,et al.  A robust color video watermarking scheme based on hybrid embedding techniques , 2015, Multimedia Tools and Applications.

[166]  Sanjay R. Zadokar,et al.  A Robust DWT Watermarking for 3D Images , 2015 .

[167]  Ivan Damgård,et al.  Secure Multiparty Computation and Secret Sharing , 2015 .

[168]  Richard Heusdens,et al.  Sleep apnea detection using time-delayed heart rate variability , 2015, 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).

[169]  Vrizlynn L. L. Thing,et al.  Securing Android , 2015, ACM Comput. Surv..

[170]  Chunxing Wang Robust Digital Watermarking Scheme of Anaglyphic 3 D for RGB Color Images , 2015 .

[171]  Taha Mohammed Hasan,et al.  Imperceptible 3D Video Watermarking Technique Based on Scene Change Detection , 2015 .

[172]  Masaaki Ikehara,et al.  Vocal separation by constrained non-negative matrix factorization , 2015, 2015 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA).

[173]  N. Wang,et al.  RST Invariant Fragile Watermarking for 2D Vector Map Authentication , 2015, MUE 2015.

[174]  Volodymyr I. Ponomaryov,et al.  Invisible digital color watermarking technique in anaglyph 3D images , 2015, 2015 12th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE).

[175]  Ezzeddine Zagrouba,et al.  On Line Video Watermarking - A New Robust Approach of Video Watermarking based on Dynamic Multi-sprites Generation , 2015, VISAPP.

[176]  Y. Rakesh,et al.  Digital Watermarked Anaglyph 3D Images Using FrFT , 2016 .

[177]  A. Hassan,et al.  A decision support system for automatic sleep staging from EEG signals using tunable Q-factor wavelet transform and spectral features , 2016, Journal of Neuroscience Methods.

[178]  John C. S. Lui,et al.  TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime , 2016, CCS.

[179]  Christian Kowalkowski,et al.  Servitization and Deservitization: Overview, Concepts, and Definitions , 2016 .

[180]  Chenxiong Qian,et al.  Toward Engineering a Secure Android Ecosystem , 2016, ACM Comput. Surv..

[181]  Azizah Abdul Manaf,et al.  Collusion-Resistant digital video watermarking for copyright protection application , 2016 .

[182]  Nana Wang,et al.  RST Invariant Reversible Watermarking for 2D Vector Map , 2016, MUE 2016.

[183]  Khumanthem Manglem Singh,et al.  A robust and optimized 3D red-cyan anaglyph blind image watermarking in the DWT domain , 2016 .

[184]  Mihaela Cocea,et al.  Advancements in GIS map copyright protection schemes - a critical review , 2017, Multimedia Tools and Applications.

[185]  Ehud Gudes,et al.  Security and privacy aspects in MapReduce on clouds: A survey , 2016, Comput. Sci. Rev..

[186]  Jan Willemson,et al.  Alternative Implementations of Secure Real Numbers , 2016, IACR Cryptol. ePrint Arch..

[187]  Shlomi Dolev,et al.  Private and Secure Secret Shared MapReduce (Extended Abstract) - (Extended Abstract) , 2016, DBSec.

[188]  Amit Phadikar,et al.  A blind video watermarking scheme resistant to rotation and collusion attacks , 2016, J. King Saud Univ. Comput. Inf. Sci..

[189]  Eric Bodden,et al.  Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques , 2016, NDSS.

[190]  Yehuda Lindell,et al.  How To Simulate It - A Tutorial on the Simulation Proof Technique , 2016, IACR Cryptol. ePrint Arch..

[191]  Marina Blanton,et al.  Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model , 2016, International Journal of Information Security.

[192]  Mohammed Imamul Hassan Bhuiyan,et al.  Automatic sleep scoring using statistical features in the EMD domain and ensemble methods , 2016 .

[193]  Mohammed Imamul Hassan Bhuiyan,et al.  Computer-aided sleep staging using Complete Ensemble Empirical Mode Decomposition with Adaptive Noise and bootstrap aggregating , 2016, Biomed. Signal Process. Control..

[194]  Tobias Bachmeier,et al.  Business Model Generation A Handbook For Visionaries Game Changers And Challengers , 2016 .

[195]  Urbano Nunes,et al.  ISRUC-Sleep: A comprehensive public dataset for sleep researchers , 2016, Comput. Methods Programs Biomed..

[196]  Jyh-Shing Roger Jang,et al.  Singing Voice Separation and Pitch Extraction from Monaural Polyphonic Audio Music via DNN and Adaptive Pitch Tracking , 2016, 2016 IEEE Second International Conference on Multimedia Big Data (BigMM).

[197]  Emilia Gómez,et al.  Monaural Score-Informed Source Separation for Classical Music Using Convolutional Neural Networks , 2017, ISMIR.

[198]  Tim C. McAloone,et al.  Product/Service-System Origins and Trajectories: A Systematic Literature Review of PSS Definitions and their Characteristics , 2017 .

[199]  Ezzeddine Zagrouba,et al.  Online multi-sprites based video watermarking robust to collusion and transcoding attacks for emerging applications , 2017, Multimedia Tools and Applications.

[200]  Mark D. Plumbley,et al.  Two-Stage Single-Channel Audio Source Separation Using Deep Neural Networks , 2017, IEEE/ACM Transactions on Audio, Speech, and Language Processing.

[201]  Reza Boostani,et al.  A comparative review on sleep stage classification methods in patients and healthy individuals , 2017, Comput. Methods Programs Biomed..

[202]  Ali Feizollah,et al.  The Evolution of Android Malware and Android Analysis Techniques , 2017, ACM Comput. Surv..

[203]  Yingying Wang,et al.  A multiple watermarking algorithm for vector geographic data based on coordinate mapping and domain subdivision , 2017, Multimedia Tools and Applications.

[204]  B. Kölmel,et al.  Customer Centricity von digitalen Produkt-Service-Systemen , 2017 .

[205]  Jimeng Sun,et al.  SLEEPNET: Automated Sleep Staging System via Deep Learning , 2017, ArXiv.

[206]  Heikki Huttunen,et al.  Convolutional Recurrent Neural Networks for Polyphonic Sound Event Detection , 2017, IEEE/ACM Transactions on Audio, Speech, and Language Processing.

[207]  Y. D. Vybornova Password-based key derivation function as one of Blum-Blum-Shub pseudo-random generator applications , 2017 .

[208]  Ezzeddine Zagrouba,et al.  A Robust Video Watermarking for Real-Time Application , 2017, ACIVS.

[209]  Pascal Lafourcade,et al.  Secure Matrix Multiplication with MapReduce , 2017, ARES.

[210]  Fei Peng,et al.  A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping , 2017, SpaCCS Workshops.

[211]  Jean-Guillaume Dumas,et al.  Dual protocols for private multi-party matrix multiplication and trust computations , 2017, Comput. Secur..

[212]  A. Tukker,et al.  New Business for Old Europe : Product-Service Development, Competitiveness and Sustainability , 2017 .

[213]  Zhu Han,et al.  Machine Learning Paradigms for Next-Generation Wireless Networks , 2017, IEEE Wireless Communications.

[214]  Yu Xue,et al.  Multipurpose watermarking for vector map protection and authentication , 2018, Multimedia Tools and Applications.

[215]  Vincent Charvillat,et al.  Robust Video Watermarking Approach Based on Crowdsourcing and Hybrid Insertion , 2017, 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA).

[216]  Emilia Gómez,et al.  Monoaural Audio Source Separation Using Deep Convolutional Neural Networks , 2017, LVA/ICA.

[217]  Hidangmayum Saxena Devi,et al.  A Novel, Efficient, Robust, and Blind Imperceptible 3D Anaglyph Image Watermarking , 2017 .

[218]  Jong-Uk Hou,et al.  Collusion Attack Resilient 3D Mesh Watermarking Based on Anti-Collusion Fingerprint Code , 2018, Applied Sciences.

[219]  Wenshan Wang,et al.  A Novel Hybrid Information Security Scheme for 2D Vector Map , 2018, Mob. Networks Appl..

[220]  Y D Vybornova Application of spatial interpolation methods for restoration of partially defined images , 2018 .

[221]  Octavian Catrina,et al.  Round-Efficient Protocols for Secure Multiparty Fixed-Point Arithmetic , 2018, 2018 International Conference on Communications (COMM).

[222]  Mahesh Chandra,et al.  An efficient video watermarking based security model , 2018 .

[223]  Maarten De Vos,et al.  Automating the Detection of REM Sleep Behaviour Disorder , 2018, 2018 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).

[224]  Arijit Sur,et al.  View invariant DIBR-3D image watermarking using DT-CWT , 2018, Multimedia Tools and Applications.

[225]  Ezzeddine Zagrouba,et al.  An Efficient Group of Pictures Decomposition based Watermarking for Anaglyph 3D Video , 2018, VISIGRAPP.

[226]  A. Richter,et al.  A review of influential factors for Product Service System application [Un bilan des facteurs déterminants de la mise en œuvre de systèmes produits-services] , 2018 .

[227]  Dan Bogdanov,et al.  Rmind: A Tool for Cryptographically Secure Statistical Analysis , 2016, IEEE Transactions on Dependable and Secure Computing.

[228]  Vincent Charvillat,et al.  A robust video watermarking based on feature regions and crowdsourcing , 2018, Multimedia Tools and Applications.

[229]  Antoine Liutkus,et al.  An Overview of Lead and Accompaniment Separation in Music , 2018, IEEE/ACM Transactions on Audio, Speech, and Language Processing.

[230]  Pascal Lafourcade,et al.  Secure Grouping and Aggregation with MapReduce , 2018, IACR Cryptol. ePrint Arch..

[231]  José Manuel Fonseca,et al.  Investigating the contribution of distance-based features to automatic sleep stage classification , 2018, Comput. Biol. Medicine.

[232]  J. Buhmann,et al.  Automatic Human Sleep Stage Scoring Using Deep Neural Networks , 2018, Front. Neurosci..

[233]  Mukesh Dalal,et al.  A robust and imperceptible steganography technique for SD and HD videos , 2019, Multimedia Tools and Applications.

[234]  Pascal Lafourcade,et al.  Secure Joins with MapReduce , 2018, FPS.

[235]  Christos Salis,et al.  A novel, fast and efficient single-sensor automatic sleep-stage classification based on complementary cross-frequency coupling estimates , 2017, Clinical Neurophysiology.

[236]  Ali Motie Nasrabadi,et al.  A new automatic sleep staging system based on statistical behavior of local extrema using single channel EEG signal , 2018, Expert Syst. Appl..

[237]  Ezzeddine Zagrouba,et al.  A Robust Anaglyph 3D Video Watermarking based on Multi-sprite Generation , 2019, ICETE.

[238]  Silvio Micali,et al.  A Completeness Theorem for Protocols with Honest Majority , 1987, STOC 1987.

[239]  Tapani Ristaniemi,et al.  An Automatic Sleep Scoring Toolbox: Multi-modality of Polysomnography Signals' Processing , 2019, ICETE.

[240]  Alejandro Delgado Castro,et al.  Semi-supervised Audio Source Separation based on the Iterative Estimation and Extraction of Note Events , 2019, ICETE.

[241]  Pascal Lafourcade,et al.  Secure Intersection with MapReduce , 2019, ICETE.

[242]  Johannes Sametinger,et al.  Dynamic Taint-tracking: Directions for Future Research , 2019, ICETE.

[243]  Tom Dhaene,et al.  Automated Sleep Apnea Detection in Raw Respiratory Signals Using Long Short-Term Memory Neural Networks , 2019, IEEE Journal of Biomedical and Health Informatics.

[244]  Pascal Lafourcade,et al.  Secure and Efficient Matrix Multiplication with MapReduce , 2019, ICETE.

[245]  Pascal Lafourcade,et al.  Secure Strassen-Winograd Matrix Multiplication with MapReduce , 2019, ICETE.

[246]  Yuliya Vybornova,et al.  Method for Vector Map Protection based on using of a Watermark Image as a Secondary Carrier , 2019, ICETE.

[247]  Oliver Y. Chén,et al.  SeqSleepNet: End-to-End Hierarchical Recurrent Neural Network for Sequence-to-Sequence Automatic Sleep Staging , 2018, IEEE Transactions on Neural Systems and Rehabilitation Engineering.

[248]  Yuliya Vybornova,et al.  A new watermarking method for vector map data: a study on information capacity of the carrier image , 2019, International Conference on Machine Vision.

[249]  U. Rajendra Acharya,et al.  A review of automated sleep stage scoring based on physiological signals for the new millennia , 2019, Comput. Methods Programs Biomed..

[250]  Ezzeddine Zagrouba,et al.  A Review on Anaglyph 3D Image and Video Watermarking , 2019 .

[251]  Ezzeddine Zagrouba,et al.  A Multi-sprite Based Anaglyph 3D Video Watermarking Approach Robust Against Collusion , 2019 .

[252]  Bashir I. Morshed,et al.  Exacerbation in Obstructive Sleep Apnea: Early Detection and Monitoring Using a Single Channel EEG with Quadratic Discriminant Analysis * , 2019, 2019 9th International IEEE/EMBS Conference on Neural Engineering (NER).

[253]  Stanislas Chambon,et al.  DOSED: A deep learning approach to detect multiple sleep micro-events in EEG signal , 2018, Journal of Neuroscience Methods.

[254]  David Kent,et al.  Automated Sleep Stage Scoring of the Sleep Heart Health Study Using Deep Neural Networks. , 2019, Sleep.

[255]  Nigel P. Smart,et al.  Benchmarking Privacy Preserving Scientific Operations , 2019, IACR Cryptol. ePrint Arch..

[256]  Johannes Sametinger,et al.  Information Disclosure Detection in Cyber-Physical Systems , 2019, DEXA Workshops.

[257]  Octavian Catrina Efficient Secure Floating-point Arithmetic using Shamir Secret Sharing , 2019, ICETE.

[258]  Tapani Ristaniemi,et al.  Multi-modality of polysomnography signals' fusion for automatic sleep scoring , 2019, Biomed. Signal Process. Control..

[259]  Ezzeddine Zagrouba,et al.  An Efficient Anaglyph 3D Video Watermarking Approach Based on Hybrid Insertion , 2019, CAIP.

[260]  Alexander Richter,et al.  A Systematic Literature Review on Product-Service Systems Classifications and Types , 2019, ICETE.

[261]  Xiangyu Zhang,et al.  TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices , 2017, IEEE Transactions on Dependable and Secure Computing.