Abstract is missing.
- An Approach for LPF Table ComputationSupaporn Chairungsee, Thana Charuphanthuset. 3-7 [doi]
- Smart Persistence and Accessibility of Genomic and Clinical DataEleonora Cappelli, Emanuel Weitschek, Fabio Cumbo. 8-14 [doi]
- Classification of Pre-cursor microRNAs from Different Species Using a New Set of FeaturesMalik Yousef, Jens Allmer. 15-20 [doi]
- A Review of Quasi-perfect Secondary Structure Prediction ServersMirto Musci, Gioele Maruccia, Marco Ferretti. 21-26 [doi]
- Theoretical and Practical Analyses in Metagenomic Sequence ClassificationHend Amraoui, Mourad Elloumi, Francesco Marcelloni, Faouzi Mhamdi, Davide Verzotto. 27-37 [doi]
- mirLSTM: A Deep Sequential Approach to MicroRNA Target Binding Site PredictionAhmet Paker, Hasan Ogul. 38-44 [doi]
- K - Means Based One-Class SVM ClassifierLoai AbedAllah, Murad Badarna, Waleed Khalifa, Malik Yousef. 45-53 [doi]
- Molecular Subtyping in Human Disease Using the Paraclique AlgorithmRonald D. Hagan, Michael A. Langston. 54-58 [doi]
- Speeding-Up the Dynamic Programming Procedure for the Edit Distance of Two StringsGiuseppe Lancia, Marcello Dalpasso. 59-66 [doi]
- Efficient Transformation of Protein Sequence Databases to Columnar Index SchemaRoman Zoun, Kay Schallert, David Broneske, Ivayla Trifonova, Xiao Chen 0008, Robert Heyer, Dirk Benndorf, Gunter Saake. 67-72 [doi]
- Making (Implicit) Security Requirements Explicit for Cyber-Physical Systems: A Maritime Use Case Security AnalysisTope Omitola, Abdolbaghi Rezazadeh, Michael J. Butler. 75-84 [doi]
- Information Disclosure Detection in Cyber-Physical SystemsFabian Berner, Johannes Sametinger. 85-94 [doi]
- Resilient Security of Medical Cyber-Physical SystemsAakarsh Rao, Nadir Carreón, Roman Lysecky, Jerzy W. Rozenblit, Johannes Sametinger. 95-100 [doi]
- Securing Smart HomesJohannes Sametinger. 101-107 [doi]
- Deriving an Optimal Noise Adding Mechanism for Privacy-Preserving Machine LearningMohit Kumar, Michael Rossbory, Bernhard Alois Moser, Bernhard Freudenthaler. 108-118 [doi]
- Linking Trust to Cyber-Physical SystemsDagmar Auer, Markus Jäger 0003, Josef Küng. 119-128 [doi]
- Security Risk Mitigation of Cyber Physical Systems: A Case Study of a Flight SimulatorMaryam Zahid, Irum Inayat, Atif Mashkoor, Zahid Mehmood. 129-138 [doi]
- Analyzing Trending Technological Areas of PatentsMustafa Sofean, Hidir Aras, Ahmad Alrifai. 141-146 [doi]
- Emotion Analysis Using Heart Rate DataLuis Alberto Barradas Chacon, Artem Fedoskin, Ekaterina Shcheglakova, Sutthida Neamsup, Ahmed Rashed. 147-154 [doi]
- Towards Explaining Deep Neural Networks Through Graph AnalysisVitor A. C. Horta, Alessandra Mileo. 155-165 [doi]
- Question Formulation and Question Answering for Knowledge Graph CompletionMaria Khvalchik, Christian Blaschke, Artem Revenko. 166-171 [doi]
- The Use of Class Assertions and Hypernyms to Induce and Disambiguate Word SensesArtem Revenko, Víctor Mireles. 172-181 [doi]
- On Conditioning GANs to Hierarchical OntologiesHamid Eghbal-zadeh, Lukas Fischer, Thomas Hoch. 182-186 [doi]
- Introducing the Notion of 'Contrast' Features for Language TechnologyMarina Santini, Benjamin Danielsson, Arne Jönsson. 189-198 [doi]
- LineIT: Similarity Search and Recommendation Tool for Photo Lineup AssemblingLadislav Peska, Hana Trojanová. 199-209 [doi]
- Advanced Behavioral Analyses Using Inferred Social Networks: A VisionIrena Holubová, Martin Svoboda, Tomás Skopal, David Bernhauer, Ladislav Peska. 210-219 [doi]