Abstract— In stream authentication protocols used for largescale data dissemination in autonomuous systems, authentication is based on the timing of the publication of keys, and ...
Mehmet A. Orgun, Ji Ma, Chuchang Liu, Guido Govern...
Pre-symptomatic drought stress prediction is of great relevance in precision plant protection, ultimately helping to meet the challenge of “How to feed a hungry world?”. Unfor...
Kristian Kersting, Zhao Xu, Mirwaes Wahabzada, Chr...
Abstract. A variant of iterative learning in the limit (cf. [LZ96]) is studied when a learner gets negative examples refuting conjectures containing data in excess of the target la...
Abstract. In this paper we present algorithms for the automatic timesynchronization of score-, MIDI- or PCM-data streams which represent the same polyphonic piano piece. In contras...
Vlora Arifi, Michael Clausen, Frank Kurth, Meinard...
Abstract. We describe the results of an empirical study comparing an interactive Information Visualization (InfoVis) technique called Gravi++ (GRAVI), Exploratory Data Analysis (ED...
Markus Rester, Margit Pohl, Sylvia Wiltner, Klaus ...