Filter
Conference contribution

Search results

  • 2012

    Hierarchical scheme for Arabic text recognition

    Asi, A., El-Sana, J. & Margner, V., 12 Nov 2012, 2012 11th International Conference on Information Science, Signal Processing and their Applications, ISSPA 2012. p. 1266-1271 6 p. 6310486. (2012 11th International Conference on Information Science, Signal Processing and their Applications, ISSPA 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Inter-association constraints in UML2: Comparative analysis, usage recommendations, and modeling guidelines

    Maraee, A. & Balaban, M., 24 Oct 2012, Model Driven Engineering Languages and Systems - 15th International Conference, MODELS 2012, Proceedings. p. 302-318 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7590 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Layout analysis for Arabic historical document images using machine learning

    Bukhari, S. S., Breuel, T. M., Asi, A. & El-Sana, J., 1 Dec 2012, Proceedings - 13th International Conference on Frontiers in Handwriting Recognition, ICFHR 2012. p. 639-644 6 p. 6424468. (Proceedings - International Workshop on Frontiers in Handwriting Recognition, IWFHR).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    63 Scopus citations
  • Lifted MEU by weighted model counting

    Apsel, U. & Brafman, R. I., 7 Nov 2012, AAAI-12 / IAAI-12 - Proceedings of the 26th AAAI Conference on Artificial Intelligence and the 24th Innovative Applications of Artificial Intelligence Conference. p. 1861-1867 7 p. (Proceedings of the National Conference on Artificial Intelligence; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Lower bounds for restricted-use objects: Extended abstract

    Aspnes, J., Attiya, H., Censor-Hillel, K. & Hendler, D., 27 Jul 2012, SPAA'12 - Proceedings of the 24th ACM Symposium on Parallelism in Algorithms and Architectures. p. 172-181 10 p. (Annual ACM Symposium on Parallelism in Algorithms and Architectures).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    6 Scopus citations
  • MCTS based on simple regret

    Tolpin, D. & Shimony, S. E., 7 Nov 2012, AAAI-12 / IAAI-12 - Proceedings of the 26th AAAI Conference on Artificial Intelligence and the 24th Innovative Applications of Artificial Intelligence Conference. p. 570-576 7 p. (Proceedings of the National Conference on Artificial Intelligence; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    27 Scopus citations
  • MCTS based on simple regret

    Tolpin, D. & Shimony, S. E., 1 Dec 2012, Proceedings of the 5th Annual Symposium on Combinatorial Search, SoCS 2012. p. 193-199 7 p. (Proceedings of the 5th Annual Symposium on Combinatorial Search, SoCS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Mob data sourcing

    Deutch, D. & Milo, T., 28 Jun 2012, SIGMOD '12 - Proceedings of the International Conference on Management of Data. p. 581-583 3 p. (Proceedings of the ACM SIGMOD International Conference on Management of Data).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Multi-Agent A* for Parallel and Distributed Systems

    Brafman, R., Jun 2012, Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems. Vol. 3. p. 43-51 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Nested merkle's puzzles against sampling attacks

    Dolev, S., Fandina, N. & Li, X., 28 Nov 2012, Information Security and Cryptology - 8th International Conference, INSCRYPT 2012, Revised Selected Papers. p. 157-174 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7763 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Non-intrusive repair of reactive programs

    Harel, D., Katz, G., Marron, A. & Weiss, G., 1 Nov 2012, Proceedings - 2012 IEEE 17th International Conference on Engineering of Complex Computer Systems, ICECCS 2012. p. 3-12 10 p. 06299199. (Proceedings - 2012 IEEE 17th International Conference on Engineering of Complex Computer Systems, ICECCS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    29 Scopus citations
  • Occluded character restoration using active contour with shape priors

    Cohen, R., Kedem, K., Dinstein, I. & El-Sana, J., 1 Dec 2012, Proceedings - 13th International Conference on Frontiers in Handwriting Recognition, ICFHR 2012. p. 497-502 6 p. 6424444. (Proceedings - International Workshop on Frontiers in Handwriting Recognition, IWFHR).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • On-line detection and prediction of temporal patterns

    Dolev, S., Goldfeld, J. & Puzis, R., 5 Nov 2012, Hardware and Software: Verification and Testing - 7th International Haifa Verification Conference, HVC 2011, Revised Selected Papers. p. 254-256 3 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7261 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • On the learnability of shuffle ideals

    Angluin, D., Aspnes, J. & Kontorovich, A., 30 Oct 2012, Algorithmic Learning Theory - 23rd International Conference, ALT 2012, Proceedings. p. 111-123 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7568 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • On the locality of some NP-complete problems

    Barenboim, L., 1 Jan 2012, Automata, Languages, and Programming - 39th International Colloquium, ICALP 2012, Proceedings. PART 2 ed. Springer Verlag, p. 403-415 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7392 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    20 Scopus citations
  • Partial cooperation in multi-agent local search

    Grubshtein, A., Zivan, R. & Meisels, A., 1 Jan 2012, ECAI 2012 - 20th European Conference on Artificial Intelligence, 27-31 August 2012, Montpellier, France - Including Prestigious Applications of Artificial Intelligence (PAIS-2012) System Demonstration. IOS Press BV, p. 378-383 6 p. (Frontiers in Artificial Intelligence and Applications; vol. 242).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Permanent revocation in attribute based broadcast encryption

    Dolev, S., Gilboa, N. & Kopeetsky, M., 1 Jan 2012, Proceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012. Institute of Electrical and Electronics Engineers, p. 203-208 6 p. 6542545. (Proceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Privacy-aware mechanism design

    Nissim, K., Orlandi, C. & Smorodinsky, R., 10 Jul 2012, EC '12 - Proceedings of the 13th ACM Conference on Electronic Commerce. p. 774-789 16 p. (Proceedings of the ACM Conference on Electronic Commerce).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    69 Scopus citations
  • Programming with Boolean Satisfaction

    Codish, M., May 2012, Functional and Logic Programming : 11th International Symposium, FLOPS 2012, Kobe, Japan, May 23-25, 2012, Proceedings. Springer Berlin Heidelberg, p. 1 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Provenance for web 2.0 data

    Bienvenu, M., Deutch, D. & Suchanek, F. M., 6 Sep 2012, Secure Data Management - 9th VLDB Workshop, SDM 2012, Proceedings. p. 148-155 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7482 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Pruning methods for optimal delete-free planning

    Gefen, A. & Brafman, R. I., 25 Sep 2012, ICAPS 2012 - Proceedings of the 22nd International Conference on Automated Planning and Scheduling. p. 56-64 9 p. (ICAPS 2012 - Proceedings of the 22nd International Conference on Automated Planning and Scheduling).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • RNA tree comparisons via unrooted unordered alignments

    Milo, N., Zakov, S., Katzenelson, E., Bachmat, E., Dinitz, Y. & Ziv-Ukelson, M., 1 Oct 2012, Algorithms in Bioinformatics - 12th International Workshop, WABI 2012, Proceedings. p. 135-148 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7534 LNBI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Secret sharing schemes for very dense graphs

    Beimel, A., Farràs, O. & Mintz, Y., 3 Sep 2012, Advances in Cryptology, CRYPTO 2012 - 32nd Annual Cryptology Conference, Proceedings. p. 144-161 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7417 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Selecting computations: Theory and applications

    Hay, N., Russell, S., Tolpin, D. & Shimony, S. E., 1 Dec 2012, Uncertainty in Artificial Intelligence - Proceedings of the 28th Conference, UAI 2012. p. 346-355 10 p. (Uncertainty in Artificial Intelligence - Proceedings of the 28th Conference, UAI 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    46 Scopus citations
  • Self-stabilizing end-to-end communication in (bounded capacity, omitting, duplicating and non-FIFO) dynamic networks

    Dolev, S., Hanemann, A., Schiller, E. M. & Sharma, S., 7 Nov 2012, Stabilization, Safety, and Security of Distributed Systems - 14th International Symposium, SSS 2012, Proceedings. p. 133-147 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7596 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    21 Scopus citations
  • Sensor fusion: From dependence analysis via matroid bases to online synthesis

    Cohen, A., Dolev, S. & Leshem, G., 27 Feb 2012, Algorithms for Sensor Systems - 7th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities, ALGOSENSORS 2011, Revised Selected Papers. p. 42-56 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7111 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Share conversion and private information retrieval

    Beimel, A., Ishai, Y., Kushilevitz, E. & Orlov, I., 26 Sep 2012, Proceedings - 2012 IEEE 27th Conference on Computational Complexity, CCC 2012. p. 258-268 11 p. 6243402. (Proceedings of the Annual IEEE Conference on Computational Complexity).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    56 Scopus citations
  • Small sample scene categorization from perceptual relations

    Kadar, I. & Ben-Shahar, O., 1 Oct 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2012. p. 2711-2718 8 p. 6247993. (Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • String reconciliation with unknown edit distance

    Kontorovich, A. & Trachtenberg, A., 22 Oct 2012, 2012 IEEE International Symposium on Information Theory Proceedings, ISIT 2012. p. 2751-2755 5 p. 6284024

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • Tunneling and decomposition-based state reduction for optimal planning

    Nissim, R., Apsel, U. & Brafman, R., 1 Jan 2012, ECAI 2012 - 20th European Conference on Artificial Intelligence, 27-31 August 2012, Montpellier, France - Including Prestigious Applications of Artificial Intelligence (PAIS-2012) System Demonstration. IOS Press BV, p. 624-629 6 p. (Frontiers in Artificial Intelligence and Applications; vol. 242).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • Using classical planners to solve conformant probabilistic planning problems

    Taig, R. & Brafman, R. I., 1 Dec 2012, Problem Solving Using Classical Planners - Papers from the 2012 AAAI Workshop, Technical Report. p. 65-71 7 p. (AAAI Workshop - Technical Report; vol. WS-12-12).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Using petal-decompositions to build a low stretch spanning tree

    Abraham, I. & Neiman, O., 26 Jun 2012, STOC '12 - Proceedings of the 2012 ACM Symposium on Theory of Computing. p. 395-405 11 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    67 Scopus citations
  • VOI-aware MCTS

    Tolpin, D. & Shimony, S. E., 1 Jan 2012, ECAI 2012 - 20th European Conference on Artificial Intelligence, 27-31 August 2012, Montpellier, France - Including Prestigious Applications of Artificial Intelligence (PAIS-2012) System Demonstration. IOS Press BV, p. 929-930 2 p. (Frontiers in Artificial Intelligence and Applications; vol. 242).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Which multi-peg tower of Hanoi problems are exponential?

    Berend, D. & Sapir, A., 2 Nov 2012, Graph-Theoretic Concepts in Computer Science - 38th International Workshop, WG 2012, Revised Selcted Papers. p. 81-90 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7551 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Workshop on OCL and textual modeling: OCL 2012

    Balaban, M., Cabot, J., Gogolla, M. & Wilke, C., 1 Dec 2012, Proceedings of the 12th Workshop on OCL and Textual Modelling, OCL 2012 - Being Part of the ACM/IEEE 15th International Conference on Model Driven Engineering Languages and Systems, MODELS 2012. p. 5-6 2 p. (Proceedings of the 12th Workshop on OCL and Textual Modelling, OCL 2012 - Being Part of the ACM/IEEE 15th International Conference on Model Driven Engineering Languages and Systems, MODELS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2011

    1/p-secure multiparty computation without honest majority and the best of both worlds

    Beimel, A., Lindell, Y., Omri, E. & Orlov, I., 1 Jan 2011, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings. Springer Verlag, p. 277-296 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    37 Scopus citations
  • 2D-3D fusion for layer decomposition of urban facades

    Li, Y., Zheng, Q., Sharf, A., Cohen-Or, D., Chen, B. & Mitra, N. J., 1 Dec 2011, 2011 International Conference on Computer Vision, ICCV 2011. p. 882-889 8 p. 6126329. (Proceedings of the IEEE International Conference on Computer Vision).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    73 Scopus citations
  • A biologically-inspired theory for non-axiomatic parametric curve completion

    Ben-Yosef, G. & Ben-Shahar, O., 16 Mar 2011, Computer Vision, ACCV 2010 - 10th Asian Conference on Computer Vision, Revised Selected Papers. PART 2 ed. p. 346-359 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6493 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • A dynamic elimination-combining stack algorithm

    Bar-Nissan, G., Hendler, D. & Suissa, A., 26 Dec 2011, Principles of Distributed Systems - 15th International Conference, OPODIS 2011, Proceedings. p. 544-561 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7109 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • A fully automated greedy square jigsaw puzzle solver

    Pomeranz, D., Shemesh, M. & Ben-Shahar, O., 1 Jan 2011, 2011 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2011. Institute of Electrical and Electronics Engineers, p. 9-16 8 p. 5995331. (Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    99 Scopus citations
  • A method for detecting unknown malicious executables

    Rozenberg, B., Gudes, E., Elovici, Y. & Fledel, Y., 1 Dec 2011, Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011. p. 190-196 7 p. 6120819. (Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Analyzing group communication for preventing data leakage via email

    Zilberman, P., Dolev, S., Katz, G., Elovici, Y. & Shabtai, A., 22 Sep 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 37-41 5 p. 5984047. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    19 Scopus citations
  • A polar representation of motion and implications for optical flow

    Adato, Y., Zickler, T. & Ben-Shahar, O., 1 Jan 2011, 2011 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2011. Institute of Electrical and Electronics Engineers, p. 1145-1152 8 p. 5995419. (Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    16 Scopus citations
  • A quest for beauty and wealth (or, Business Processes for Database Researchers)

    Deutch, D. & Milo, T., 15 Jul 2011, PODS'11 - Proceedings of the 30th Symposium on Principles of Database Systems. p. 1-12 12 p. (Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    15 Scopus citations
  • A translation based approach to probabilistic conformant planning

    Brafman, R. I. & Taig, R., 31 Oct 2011, Algorithmic Decision Theory - Second International Conference, ADT 2011, Proceedings. p. 16-27 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6992 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Automatic Evolution of Java-Written Game Heuristics

    Orlov, M., Bregman, C. & Sipper, M., 2011, SSBSE: International Symposium on Search Based Software Engineering. Cohen, M. B. & Cinnéide, M. Ó. (eds.). Springer, p. 277 (Lecture Notes in Computer Science; vol. 6956).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Behavioral programming, decentralized control, and multiple time scales

    Harel, D., Marron, A., Wiener, G. & Weiss, G., 1 Dec 2011, SPLASH'11 Workshops - Compilation Proceedings of the Co-Located Workshops: DSM'11, TMC'11, AGERE'11, AOOPES'11, NEAT'11, and VMIL'11. p. 171-182 12 p. (SPLASH'11 Workshops - Compilation Proceedings of the Co-Located Workshops: DSM'11, TMC'11, AGERE'11, AOOPES'11, NEAT'11, and VMIL'11).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    21 Scopus citations
  • Boolean equi-propagation for optimized SAT encoding

    Metodi, A., Codish, M., Lagoon, V. & Stuckey, P. J., 26 Sep 2011, Principles and Practice of Constraint Programming, CP 2011 - 17th International Conference, Proceedings. p. 621-636 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6876 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • Case study in Hebrew character searching

    Rabaev, I., Biller, O., El-Sana, J., Kedem, K. & Dinstein, I., 2 Dec 2011, Proceedings - 11th International Conference on Document Analysis and Recognition, ICDAR 2011. p. 1080-1084 5 p. 6065476. (Proceedings of the International Conference on Document Analysis and Recognition, ICDAR).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    10 Scopus citations
  • Combinatorial algorithms for distributed graph coloring

    Barenboim, L. & Elkin, M., 2 Nov 2011, Distributed Computing - 25th International Symposium, DISC 2011, Proceedings. p. 66-81 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6950 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations