Pervasive Systems, Algorithms and Networks: 16th International Symposium, I-SPAN 2019, Naples, Italy, September 16-20, 2019, Proceedings
暂无分享,去创建一个
Krishna M. Sivalingam | Alfredo Cuzzocrea | Simone Diniz Junqueira Barbosa | Phoebe Chen | Xiaoyong Du | Orhun Kara | Ting Liu | Dominik Ślęzak | Takashi Washio | Xiaokang Yang | Jiman Hong | Junsong Yuan | Christian Esposito | C. Esposito | T. Washio | D. Ślęzak | Simone Diniz Junqueira Barbosa | Phoebe Chen | A. Cuzzocrea | Xiaoyong Du | Orhun Kara | Ting Liu | K. Sivalingam | Xiaokang Yang | Junsong Yuan | Jiman Hong
[1] Colin Boyd,et al. Analysis of two authorization protocols using Colored Petri Nets , 2014, International Journal of Information Security.
[2] Sebastian Mödersheim,et al. OFMC: A Symbolic Model-Checker for Security Protocols , 2004 .
[3] Peter Szolovits,et al. The coming of age of artificial intelligence in medicine , 2009, Artif. Intell. Medicine.
[4] Yang Xu,et al. Modeling and Analysis of Security Protocols Using Colored Petri Nets , 2011, J. Comput..
[5] Luigi Catuogno,et al. On the Security of a Two-Factor Authentication Scheme , 2010, WISTP.
[6] Julian Fierrez,et al. Graphical Password-Based User Authentication With Free-Form Doodles , 2016, IEEE Transactions on Human-Machine Systems.
[7] Henry A. Kautz,et al. An Overview of the Assisted Cognition Project , 2002 .
[8] A. Ant Ozok,et al. A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords , 2006, SOUPS '06.
[9] James M. Robins,et al. Optimal Structural Nested Models for Optimal Sequential Decisions , 2004 .
[10] Vahid Rafe,et al. Security analysis of network protocols through model checking: a case study on mobile IPv6 , 2016, Secur. Commun. Networks.
[11] David A. Wagner,et al. Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract) , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[12] David J. Reinkensmeyer,et al. A computational model of use-dependent motor recovery following a stroke: Optimizing corticospinal activations via reinforcement learning can explain residual capacity and other strength recovery dynamics , 2012, Neural Networks.
[13] Dawn Xiaodong Song. Athena: a new efficient automatic checker for security protocol analysis , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[14] Lars Michael Kristensen,et al. Coloured Petri Nets and CPN Tools for modelling and validation of concurrent systems , 2007, International Journal on Software Tools for Technology Transfer.
[15] Kunihiko Miyazaki,et al. Improving the Security of Cryptographic Protocol Standards , 2015, IEEE Security & Privacy.
[16] S. Murphy,et al. Methodological Challenges in Constructing Effective Treatment Sequences for Chronic Psychiatric Disorders , 2007, Neuropsychopharmacology.
[17] Luigi Catuogno,et al. On user authentication by means of video events recognition , 2014, J. Ambient Intell. Humaniz. Comput..
[18] Giuseppe De Pietro,et al. A Reinforcement Learning-Based Approach for the Risk Management of e-Health Environments: A Case Study , 2018, 2018 14th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS).
[19] Issam Al-Azzoni,et al. THE VERIFICATION OF CRYPTOGRAPHIC PROTOCOLS USING COLOURED PETRI NETS , 2004 .
[20] Jiachen Yang,et al. Precision medicine as a control problem: Using simulation and deep reinforcement learning to discover adaptive, personalized multi-cytokine therapy for sepsis , 2018, ArXiv.
[21] A. Cheng,et al. Model Checking Coloured Petri Nets - Exploiting Strongly Connected Components , 1997 .
[22] Lars Michael Kristensen,et al. Coloured Petri Nets - Modelling and Validation of Concurrent Systems , 2009 .
[23] Gustavo Carneiro,et al. Deep Reinforcement Learning for Active Breast Lesion Detection from DCE-MRI , 2017, MICCAI.
[24] Ron Steinfeld,et al. On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices , 2015, IEEE Transactions on Information Forensics and Security.
[25] Antonio Coronato,et al. A Reinforcement-Learning-Based Approach for the Planning of Safety Strategies in AAL Applications , 2018, Intelligent Environments.
[26] Alessandro Armando,et al. SATMC: A SAT-Based Model Checker for Security-Critical Systems , 2014, TACAS.
[27] W. Rogowski,et al. What is personalized medicine: sharpening a vague term based on a systematic literature review , 2013, BMC Medical Ethics.
[28] Olli Saarela,et al. Optimal Dynamic Regimes: Presenting a Case for Predictive Inference , 2010, The international journal of biostatistics.
[29] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[30] P. Thall,et al. Covariate‐adjusted adaptive randomization in a sarcoma trial with multi‐stage treatments , 2005, Statistics in medicine.
[31] Luigi Catuogno,et al. Analysis of a two-factor graphical password scheme , 2014, International Journal of Information Security.
[32] Elizabeth D. Mynatt,et al. Increasing the opportunities for aging in place , 2000, CUU '00.
[33] Athanasios S. Polydoros,et al. Survey of Model-Based Reinforcement Learning: Applications on Robotics , 2017, J. Intell. Robotic Syst..
[34] Alfredo Pironti,et al. Formal verification of security protocol implementations: a survey , 2012, Formal Aspects of Computing.
[35] Ree Dawson,et al. Dynamic treatment regimes: practical design considerations , 2004, Clinical trials.
[36] Stefan Schaal,et al. 2008 Special Issue: Reinforcement learning of motor skills with policy gradients , 2008 .
[37] Giovanni Paragliola,et al. Risk management for nuclear medical department using reinforcement learning algorithms , 2019, Journal of Reliable Intelligent Environments.
[38] Li Xu,et al. Ticket-based handoff authentication for wireless mesh networks , 2014, Comput. Networks.
[39] Jeannette M. Wing. A specifier's introduction to formal methods , 1990, Computer.
[40] Kurt Jensen,et al. Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use. Vol. 2, Analysis Methods , 1992 .
[41] Martín Abadi,et al. Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..
[42] J. Sinacore,et al. The Importance of Patient Preferences in the Measurement of Health Care Satisfaction , 1993, Medical care.
[43] Salah A. Aly,et al. Protocol Verification And Analysis Using Colored Petri Nets , 2003 .