Abstract is missing.
- Application Error Detection in Networks by Protocol Behavior ModelMartin Holkovic, Libor Polcák, Ondrej Rysavý. 3-28 [doi]
- Cooperative Communications, Distributed Coding and Machine LearningSoon Xin Ng. 29-58 [doi]
- Product-Service Systems at a Glance - How Classification and Typification Contribute to ComprehensibilityLukas Waidelich, Alexander Richter, Rebecca Bulander, Bernhard Kölmel, Patrice Glaser. 61-84 [doi]
- n)Salah Harb, M. Omair Ahmad, M. N. S. Swamy. 87-107 [doi]
- Evaluation of Floating-Point Arithmetic Protocols Based on Shamir Secret SharingOctavian Catrina. 108-131 [doi]
- Secure and Efficient Matrix Multiplication with MapReduceRadu Ciucanu, Matthieu Giraud, Pascal Lafourcade 0001, Lihua Ye. 132-156 [doi]
- An Invisible Hybrid 3D Video Watermarking Robust Against Malicious AttacksDorra Dhaou, Saoussen Ben Jabra, Ezzeddine Zagrouba. 157-179 [doi]
- Copyright Protection Method for Vector Map DataYuliya Vybornova, Vladislav Sergeev. 180-202 [doi]
- Dynamic Taint Tracking SimulationFabian Berner, René Mayrhofer, Johannes Sametinger. 203-227 [doi]
- A Note Event-Based Decomposition of Polyphonic Recordings Applied to Single-channel Audio Source SeparationAlejandro Delgado Castro, John E. Szymanski. 231-255 [doi]
- Automatic Sleep Scoring Toolbox and Its Application in Sleep ApneaRui Yan 0003, Fan Li, Xiaoyu Wang, Tapani Ristaniemi, Fengyu Cong. 256-275 [doi]