Review Research 2021

Computer Science

cstotal



Jump to: 2020 | 2019 | 2018 | 2017 | 2016 | 2015

2020

Abstract


Fehnker, A. , & Mader, A. (2020). Atelier for Creative Programming. Abstract from 12th International Conference on Computer Supported Education, CSEDU 2020, .

Gatti, L. , & van Stegeren, J. (2020). Improving Pattern.nl sentiment analysis. Abstract from 30th Meeting on Computational Linguistics in The Netherlands, CLIN 2020, Utrecht, Netherlands.

Haarman, J. A. M. , & de Vries, R. A. J. (2020). Healthy Loads & Happy LEDs: An interactive dining table to capture social eating behavior. 87. Abstract from Supporting Health by Technology 2020, Enschede, Netherlands.

Langener, S. , van der Nagel, J. , Klaassen, R., Brouwer, L. , & Heylen, D. (2020). Go up in smoke: proof of concept study on tobacco craving in a VR environment. Abstract from Supporting Health by Technology 2020, Enschede, Netherlands.

Article (contribution to journal)


Akata, Z., Balliet, D., de Rijke, M., Dignum, F., Dignum, V., Eiben, G., Fokkens, A., Grossi, D., Hindriks, K., Hoos, H., Hung, H., Jonker, C., Monz, C., Neerincx, M., Oliehoek, F., Prakken, H., Schlobach, S., van der Gaag, L., van Harmelen, F., ... Welling, M. (2020). A Research Agenda for Hybrid Intelligence: Augmenting Human Intellect With Collaborative, Adaptive, Responsible, and Explainable Artificial Intelligence. Computer (New York), 53(8), 18-28. https://doi.org/10.1109/MC.2020.2996587


Anuradha Chathuranga Ranasinghe , & Gerez, S. H. (2020). Glitch-Optimized Circuit Blocks for Low-Power High-Performance Booth Multipliers. IEEE transactions on very large scale integration (VLSI) systems, 28(9), 2028-2041. [9149668]. https://doi.org/10.1109/TVLSI.2020.3009239


Bayhan, S., Estefanía Coronado, Roberto Riggio, & Anatolij Zubow (2020). User-AP Association Management in Software-Defined WLANs. IEEE transactions on network and service management, 17(3), 1838-1852. [9115672]. https://doi.org/10.1109/TNSM.2020.3001869


Bottenheft, C., Brouwer, A-M. , Stuldreher, I., Groen, E. , & van Erp, J. (2020). Cognitive task performance under (combined) conditions of a metabolic and sensory stressor. Cognition, technology and work. https://doi.org/10.1007/s10111-020-00653-w

Brandt, R. , Strisciuglio, N., Petkov, N., & Wilkinson, M. H. F. (2020). Efficient binocular stereo correspondence matching with 1-D Max-Trees. Pattern recognition letters, 135, 402-408. https://doi.org/10.1016/j.patrec.2020.02.019

Brouwer, A-M., van den Broek, T. J., Hogervorst, M. A. , Kaneko, D., Toet, A., Kallen, V. , & van Erp, J. B. F. (2020). Estimating affective taste experience using combined implicit behavioral and neurophysiological measures. IEEE transactions on affective computing. https://doi.org/10.1109/TAFFC.2020.3032236



Budde, C. E., D’Argenio, P. R. , Hartmanns, A., & Sedwards, S. (2020). An efficient statistical model checker for nondeterminism and rare events. International journal on software tools for technology transfer, 22(6), 759-780. https://doi.org/10.1007/s10009-020-00563-2


Celebi, R., Moreira, J. R., Hassan, A. A., Ayyar, S., Ridder, L., Kuhn, T., & Dumontier, M. (2020). Towards FAIR protocols and workflows: the OpenPREDICT use case. PeerJ computer science, 6, [281]. https://doi.org/10.7717/peerj-cs.281


Choi, K. N., Kolamunna, H., Uyanwatta, A., Thilakarathna, K., Seneviratne, S. , Holz, R., Hassan, M., & Zomaya, A. (2020). LoRadar: LoRa Sensor Network Monitoring through Passive Packet Sniffing. Computer communication review, 50(4). https://doi.org/10.1145/3431832.3431835

Chomsiri, T., He, X., Nanda, P. , & Tan, Z. (2020). Hybrid tree-rule firewall for high speed data transmission. IEEE transactions on cloud computing, 8(4), 1237-1249. https://doi.org/10.1109/TCC.2016.2554548

Cui, X., Zheng, S., Heuvelmans, M. A., Du, Y., Sidorenkov, G., Dorrius, M. D. , Veldhuis, R. N. J., Oudkerk, M., de Bock, G. H., van Ooijen, P. M. A., Vliegenthart, R., & Ye, Z. (2020). Validation of a deep learning-based computer-aided system for lung nodule detection in a Chinese lung cancer screening program. European respiratory journal, 56(64), [4168]. https://doi.org/10.1183/13993003.congress-2020.4168

Deichmann, D., Moser, C., Birkholz, J. M., Nerghes, A., Groenewegen, P. , & Wang, S. (2020). Ideas with impact: How connectivity shapes idea diffusion. Research policy, 49(1), [103881]. https://doi.org/10.1016/j.respol.2019.103881

Didden, R. , VanDerNagel, J., Delforterie, M., & van Duijvenbode, N. (2020). Substance use disorders in people with intellectual disability. Current Opinion in Psychiatry, 33(2), 124-129. https://doi.org/10.1097/YCO.0000000000000569, https://doi.org/10.1097/yco.0000000000000569





Guo, Z. , Li, B. , Li, X., & Zhang, S. (2020). Compatible spanning circuits in edge-colored graphs. Discrete mathematics, 343(7), [111908]. https://doi.org/10.1016/j.disc.2020.111908


Haider, F. , Salim, F. A. , Postma, D. B. W. , Delden, R. V. , Reidsma, D. , Beijnum, B. J. V., & Luz, S. (2020). A super-bagging method for volleyball action recognition using wearable sensors. Multimodal Technologies and Interaction, 4(2), [33]. https://doi.org/10.3390/mti4020033

Hartmanns, A., Junges, S. , Katoen, J-P., & Quatmann, T. (2020). Multi-cost Bounded Tradeoff Analysis in MDP. Journal of automated reasoning, 64(7), 1483-1522. https://doi.org/10.1007/s10817-020-09574-9


Heldens, S. J. , Litvak, N. , & van Steen, M. (2020). Scalable Detection of Crowd Motion Patterns. IEEE transactions on knowledge and data engineering, 32(1), 152-164. [8519317]. https://doi.org/10.1109/TKDE.2018.2879079

Hesselman, C., Grosso, P. , Holz, R., Kuipers, F., Xue, J. H. , Jonker, M., de Ruiter, J. , Sperotto, A. , van Rijswijk-Deij, R., Moura, G. C. M. , Pras, A., & de Laat, C. (2020). A Responsible Internet to Increase Trust in the Digital World. Journal of network and systems management, 28(4), 882-922. https://doi.org/10.1007/s10922-020-09564-7

Hesselman, C., Kaeo, M., Chapin, L., Claffy, K., Seiden, M., McPherson, D., Piscitello, D., McConachie, A., April, T., Latour, J., & Rasmussen, R. (2020). The DNS in IoT: Opportunities, Risks, and Challenges. IEEE internet computing, 24(4), 23-32. [9133283]. https://doi.org/10.1109/MIC.2020.3005388

Holz, R., Hiller, J., Amann, J., Razaghpanah, A., Jost, T., Vallina-Rodriguez, N., & Hohlfeld, O. (2020). Tracking the deployment of TLS 1.3 on the Web: A story of experimentation and centralization. Computer communication review, 50(3), 3-11. https://doi.org/10.1145/3411740.3411742


Kamilari, E., Anagnostopoulos, D. A., Papademas, P. , Kamilaris, A., & Tsaltas, D. (2020). Characterizing halloumi cheese's bacterial communities through metagenomic analysis. LWT - Food Science and Technology, 126, [109298]. https://doi.org/10.1016/j.lwt.2020.109298

Kamilaris, A., Engelbrecht, A., Pitsillides, A., & Prenafeta-Boldú, F. X. (2020). Transfer of manure as fertilizer from livestock farms to crop fields: The case of Catalonia. Computers and electronics in agriculture, 175, [105550]. https://doi.org/10.1016/j.compag.2020.105550

Kaneko, D., Brouwer, A. M., Hogervorst, M., Toet, A., Kallen, V. , & van Erp, J. B. F. (2020). Emotional State During Tasting Affects Emotional Experience Differently and Robustly for Novel and Familiar Foods. Frontiers in psychology, 11, [558172]. https://doi.org/10.3389/fpsyg.2020.558172

Kraaij, W., Verberne, S., Koldijk, S., de Korte, E., van Dantzig, S., Sappelli, M. , Shoaib, M. , Bosems, S. , Achterkamp, R., Bonomi, A., Schavemaker, J., Hulsebosch, B., Wabeke, T. , Vollenbroek-Hutten, M., Neerincx, M. , & Sinderen, M. V. (2020). Personalized support for well-being at work: an overview of the SWELL project. User modeling and user-adapted interaction, 30(3), 413–446. https://doi.org/10.1007/s11257-019-09238-3


Li, M., Turrini, A. , Hahn, E. M., She, Z., & Zhang, L. (2020). Probabilistic Preference Planning Problem for Markov Decision Processes. IEEE transactions on software engineering. https://doi.org/10.1109/TSE.2020.3024215


Liu, Y., Toet, A., Krone, T., van Stokkum, R., Eijsman, S. , & van Erp, J. B. F. (2020). A network model of affective odor perception. PLoS ONE, 15(7), [e0236468]. https://doi.org/10.1371/journal.pone.0236468


Macnish, K. , & van der Ham, J. (2020). Ethics in cybersecurity research and practice. Technology in society, 63, [101382]. https://doi.org/10.1016/j.techsoc.2020.101382

Marazza, F. , Bukhsh, F. A., Geerdink, J., Vijlbrief, O. , Pathak, S. , van Keulen, M. , & Seifert, C. (2020). Automatic Process Comparison for Subpopulations: Application in Cancer Care. International journal of environmental research and public health, 17(16), 1-23. [5707]. https://doi.org/10.3390/ijerph17165707

Melotti, D., Heimbach, K., Rodríguez-Sánchez, A. , Strisciuglio, N., & Azzopardi, G. (2020). A robust contour detection operator with combined push-pull inhibition and surround suppression. Information sciences, 524, 229-240. https://doi.org/10.1016/j.ins.2020.03.026



Narayanan, A., Sousa de Sena, A., Gutierrez-Rojas, D., Carrillo Melgarejo, D., Hussain, H. M., Ullah, M. , Bayhan, S., & Nardelli, P. H. J. (2020). Key Advances in Pervasive Edge Computing for Industrial Internet of Things in 5G and Beyond. IEEE Access, 8, 206734-206754. https://doi.org/10.1109/ACCESS.2020.3037717

Nijholt, A. (2020). “All the world’s a stage”: incongruity humour revisited. Annals of mathematics and artificial intelligence, 88(5-6), 405-438. https://doi.org/10.1007/s10472-018-9609-7

Pathak, S., van Rossen, J., Vijlbrief, O., Geerdink, J. , Seifert, C. , & van Keulen, M. (2020). Post-Structuring Radiology Reports of Breast Cancer Patients for Clinical Quality Assurance. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 17(6), 1883-1894. https://doi.org/10.1109/TCBB.2019.2914678

Pfeifer, B. , Alachiotis, N., Pavlidis, P., & Schimek, M. G. (2020). Genome scans for selection and introgression based on k-nearest neighbour techniques. Molecular Ecology Resources, 20(6), 1597-1609. https://doi.org/10.1111/1755-0998.13221



Qi, J. , Bloemen, V., Wang, S., Van Wijk, J., & Van De Wetering, H. (2020). STBins: Visual Tracking and Comparison of Multiple Data Sequences Using Temporal Binning. IEEE transactions on visualization and computer graphics, 26(1), 1054-1063. [8805450]. https://doi.org/10.1109/TVCG.2019.2934289

Raja, K., Ferrara, M., Franco, A. , Spreeuwers, L. , Batskos, I. , de Wit, F. F., Gomez-Barrero, M., Scherhag, U., Fischer, D., Venkatesh, S., Mohan Singh, J., Ramachandra, R., Rathgeb, C., Frings, D., Seidel, U., Knopjes, F. , Veldhuis, R. N. J., Maltoni, D., & Busch, C. (2020). Morphing Attack Detection - Database, Evaluation Platform and Benchmarking. IEEE transactions on information forensics and security. https://doi.org/10.1109/TIFS.2020.3035252

Ramachandran, S. , Strisciuglio, N., Vinekar, A., John, R., & Azzopardi, G. (2020). U-COSFIRE filters for vessel tortuosity quantification with application to automated diagnosis of retinopathy of prematurity. Neural Computing and Applications, 32(16), 12453-12468. https://doi.org/10.1007/s00521-019-04697-6


Sales, L., Henning, P., Veiga, V., Murrieta Costa, M., Sayao, L. F. , Bonino da Silva Santos, L. O. , & Ferreira Pires, L. (2020). GO FAIR Brazil: A Challenge for Brazilian Data Science. Data Intelligence, 2(1-2), 238-245. https://doi.org/10.1162/dint_a_00046

Salim, F. A., Haider, F. , Postma, D. B. W. , van Delden, R. , Reidsma, D., Luz, S. , & van Beijnum, B. J. F. (2020). Towards Automatic Modeling of Volleyball Players’ Behavior for Analysis, Feedback, and Hybrid Training. Journal for the Measurement of Physical Behaviour, 3(4), 323-330. https://doi.org/10.1123/jmpb.2020-0012



Schlötterer, J. , Seifert, C., Satchell, C., & Granitzer, M. (2020). QueryCrumbs Search History Visualization: Usability, Transparency and Long-term Usage. Journal of Computer Languages, 57, [100941]. https://doi.org/10.1016/j.cola.2020.100941

Stara, V., Vera, B., Bolliger, D., Rossi, L., Felici, E., Rosa, M. D. , Jong, M. D., & Paolini, S. (2020). Usability and Acceptance of the Embodied Conversational Agent Anne by People with Dementia and their Caregivers: an exploratory study in home environment settings. Manuscript submitted for publication. https://doi.org/10.2196/preprints.25891

Stegman, P., Crawford, C. S., Andujar, M. , Nijholt, A., & Gilbert, J. E. (2020). Brain–Computer Interface Software: A Review and Discussion. IEEE Transactions on Human-Machine Systems, 50(2), 101-115. https://doi.org/10.1109/THMS.2020.2968411

Strisciuglio, N., Lopez-Antequera, M., & Petkov, N. (2020). Enhanced Robustness of Convolutional Networks with a Push-Pull Inhibition Layer. Neural Computing and Applications, 32(24), 17957-17971. https://doi.org/10.1007/s00521-020-04751-8




Thammasan, N. , Stuldreher, I., Schreuders, E., Giletta, M., & Brouwer, A-M. (2020). A Usability Study of Physiological Measurement in School Using Wearable Sensors. Sensors (Switzerland), 20(18), [5380]. https://doi.org/10.3390/s20185380


Tijssen, M., Hernlund, E., Rhodin, M. , Bosch, S., Voskamp, J. P., Nielen, M., & Serra Bragança, F. M. (2020). Automatic hoof-on and -off detection in horses using hoof-mounted inertial measurement unit sensors. PLoS ONE, 15(6), [e0233266]. https://doi.org/10.1371/journal.pone.0233266



Toet, A., Eijsman, S., Liu, Y., Donker, S. , Kaneko, D., Brouwer, A-M. , & van Erp, J. B. F. (2020). The Relation Between Valence and Arousal in Subjective Odor Experience. Chemosensory Perception, 13(2), 141–151. https://doi.org/10.1007/s12078-019-09275-7

Toet, A., Heijn, F., Brouwer, A-M., Mioch, T. , & van Erp, J. B. F. (2020). An Immersive Self-Report Tool for the Affective Appraisal of 360º VR Videos. Frontiers in Virtual Reality, 1, [552587]. https://doi.org/10.3389/frvir.2020.552587

Toet, A., Kuling, I. A., Krom, B. N. , & van Erp, J. B. F. (2020). Toward Enhanced Teleoperation Through Embodiment. Frontiers in robotics and AI, 7(14). https://doi.org/10.3389/frobt.2020.00014

Ton, B., Basten, R., Bolte, J. , Braaksma, J., Bucchianico, A. D., Calseyde, P. V. D., Grooteman, F., Heskes, T., Jansen, N., Teeuw, W. , Tinga, T. , & Stoelinga, M. (2020). PrimaVera: Synergising Predictive Maintenance. Applied Sciences, 10(23), [8348]. https://doi.org/10.3390/app10238348

Wetselaar, P., Lobbezoo, F., de Jong, P., Choudry, U., van Rooijen, J. , & Langerak, R. (2020). A methodology for evaluating tooth wear monitoring using timed automata modelling. Journal of Oral Rehabilitation, 47(3), 353-360. https://doi.org/10.1111/joor.12908


Yaman, A., Iacca, G. , Mocanu, D. C., Coler, M., Fletcher, G., & Pechenizkiy, M. (2020). Evolving plasticity for autonomous learning under changing environmental conditions. Evolutionary Computation. https://arxiv.org/abs/1904.01709

Zahid, M., Inayat, I. , Daneva, M., & Mehmood, Z. (2020). A security risk mitigation framework for cyber physical systems. Journal of software: Evolution and Process, 32(2), [e2219]. https://doi.org/10.1002/smr.2219

Zheng, S., Cui, X., Vonder, M. , Veldhuis, R. N. J., Dorrius, M. D., Ye, Z., Vliegenthart, R., Oudkerk, M., & van Ooijen, P. M. A. (2020). Effect of slab thickness on pulmonary nodule detection using maximum intensity projection in a deep learning-based computer-aided detection system. European respiratory journal, 56(64), [4169]. https://doi.org/10.1183/13993003.congress-2020.4169

Zheng, S., Guo, J., Cui, X. , Veldhuis, R. N. J., Oudkerk, M., & Van Ooijen, P. M. A. (2020). Automatic Pulmonary Nodule Detection in CT Scans Using Convolutional Neural Networks Based on Maximum Intensity Projection. IEEE transactions on medical imaging, 39(3), 797-805. [8801875]. https://doi.org/10.1109/TMI.2019.2935553





van Dam, T. J., Neumann, N. M. P., Phillipson, F. , & van den Berg, H. (2020). Hybrid Helmholtz machines: a gate-based quantum circuit implementation. Quantum Information Processing, 19(6), [174]. https://doi.org/10.1007/s11128-020-02660-2





van den Oever, L. B., Cornelissen, L., Vonder, M., Xia, C., van Bolhuis, J. N., Vliegenthart, R. , Veldhuis, R. N. J., de Bock, G. H., Oudkerk, M., & van Ooijen, P. M. A. (2020). Deep learning for automated exclusion of cardiac CT examinations negative for coronary artery calcium. European journal of radiology, 129, [109114]. https://doi.org/10.1016/j.ejrad.2020.109114

van der Toorn, O. I. , & Sperotto, A. (2020). Looking Beyond the Horizon: Thoughts on Proactive Detection of Threats. Digital Threats: Research and Practice, 1(1), [4]. https://doi.org/10.1145/3373639

Article (contribution to specialist publication)

Chapter


Arias, J. , Budde, C. E., Penczek, W. , Petrucci, L., Sidoruk, T. , & Stoelinga, M. (2020). Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-agent Systems. In SW. Lin, Z. Hou, & B. Mahoney (Eds.), Formal Methods and Software Engineering - 22nd International Conference on Formal Engineering Methods, ICFEM 2020, Proceedings (pp. 3-19). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12531 LNCS). Springer. https://doi.org/10.1007/978-3-030-63406-3_1

Budde, C. E. (2020). FIG: The Finite Improbability Generator. In A. Biere, & D. Parker (Eds.), Tools and Algorithms for the Construction and Analysis of Systems- 26th International Conference, TACAS 2020, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Proceedings, Part I (pp. 483-491). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12078 LNCS). Springer Singapore. https://doi.org/10.1007/978-3-030-45190-5_27

Budde, C. E. , & Stoelinga, M. (2020). Automated Rare Event Simulation for Fault Tree Analysis via Minimal Cut Sets. In H. Hermanns (Ed.), Measurement, Modelling and Evaluation of Computing Systems - 20th International GI/ITG Conference, MMB 2020, Proceedings (pp. 259-277). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12040 LNCS). Springer Singapore. https://doi.org/10.1007/978-3-030-43024-5_16

Budde, C. E. , Biagi, M. , Monti, R. E., D’Argenio, P. R. , & Stoelinga, M. (2020). Rare Event Simulation for Non-Markovian Repairable Fault Trees. In A. Biere, & D. Parker (Eds.), Tools and Algorithms for the Construction and Analysis of Systems: 26th International Conference, TACAS 2020, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Dublin, Ireland, April 25–30, 2020, Proceedings (Vol. I, pp. 463-482). (Lecture Notes in Computer Science; Vol. 12078). Springer Singapore. https://doi.org/10.1007/978-3-030-45190-5_26

Budde, C. E. , Ruijters, E. , & Stoelinga, M. (2020). The Dynamic Fault Tree Rare Event Simulator. In M. Gribaudo, D. N. Jansen, & A. Remke (Eds.), Quantitative Evaluation of Systems: 17th International Conference, QEST 2020, Vienna, Austria, August 31 – September 3, 2020, Proceedings (pp. 233-238). (Lecture Notes in Computer Science; Vol. 12289), (Theoretical Computer Science and General Issues). Springer. https://doi.org/10.1007/978-3-030-59854-9_17

Didden, R. , VanDerNagel, J., van Duijvenbode, N., Delforterie, M., Otten, R., & Poelen, E. (2020). Treatment of substance abuse in dual diagnosis. In J. L. Matson (Ed.), Handbook of Dual Diagnosis : Assessment and Treatment in Persons with Intellectual Disorders (pp. 549-563). (Autism and Child Psychopathology Series). Springer. https://doi.org/10.1007/978-3-030-46835-4_32

Granell, C. , Kamilaris, A., Kotsev, A. , Ostermann, F. O., & Trilles, S. (2020). Internet of Things. In H. Guo, M. F. Goodchild, & A. Annoni (Eds.), Manual of Digital Earth (pp. 387-423). Springer. https://doi.org/10.1007/978-981-32-9915-3_11

Haak, L. B. V. D., Wijs, A., Brand, M. V. D. , & Huisman, M. (2020). Formal Methods for GPGPU Programming: Is the Demand Met? In B. Dongol, & E. Troubitsyna (Eds.), Integrated Formal Methods: 16th International Conference, IFM 2020, Lugano, Switzerland, November 16–20, 2020, Proceedings (pp. 160-177). (Lecture Notes in Computer Science; Vol. 12546). Springer. https://doi.org/10.1007/978-3-030-63461-2_9

Henning, P. , & Moreira, J. L. R. (2020). Ciência aberta, dados abertos e princípios FAIR: uma contribuição dos Países Baixos. In M. Shintaku, L. Farias Sales, & M. Costa (Eds.), Tópicos sobre dados abertos para editores científicos (pp. 145-158). ABEC Brasil. https://doi.org/10.21452/978-85-93910-04-3.cap12

Huisman, M. , Monti, R. E., Ulbrich, M., & Weigl, A. (2020). The VerifyThis Collaborative Long Term Challenge. In W. Ahrendt, B. Beckert, R. Bubel, R. Hähnle, & M. Ulbrich (Eds.), Deductive Software Verification: Future Perspectives: Reflections on the Occasion of 20 Years of KeY (pp. 246-260). (Lecture Notes in Computer Science; Vol. 12345). Springer Singapore. https://doi.org/10.1007/978-3-030-64354-610

Monti, R. , Budde, C. E., & D’argenio, P. R. (2020). A compositional semantics for repairable fault trees with general distributions. In E. Albert, & L. Kovacs (Eds.), Proceedings of the 23rd International Conference on Logic for Programming, Artificial Intelligence and Reasoning (pp. 354-372). (EPiC Series in Computing; Vol. 73). EasyChair. https://doi.org/10.29007/p16v

Mulder, H. , Huisman, M. , & Joosten, S. J. C. (2020). Improving Performance of the VerCors Program Verifier. In W. Ahrendt, B. Beckert, R. Bubel, R. Hähnle, & M. Ulbrich (Eds.), Deductive Software Verification: Future Perspectives - Reflections on the Occasion of 20 Years of KeY (pp. 65-82). (Lecture Notes in Computer Science; Vol. 12345). Springer Singapore. https://doi.org/10.1007/978-3-030-64354-6_3

Oortwijn, W. , Huisman, M. , Joosten, S. J. C. , & Pol, J. V. D. (2020). Automated Verification of Parallel Nested DFS. In A. Biere, & D. Parker (Eds.), Tools and Algorithms for the Construction and Analysis of Systems: 26th International Conference, TACAS 2020, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Dublin, Ireland, April 25–30, 2020, Proceedings, Part I (pp. 247-265). (Lecture Notes in Computer Science; Vol. 12078). Springer. https://doi.org/10.1007/978-3-030-45190-5_14

VanDerNagel, J., & van Horsen, S. (2020). Sucht und kognitive Beeinträchtigung in den Niederlanden. In D. Zullino, S. Cattacin, D. Domenig, & U. Schäfer (Eds.), Leben lassen! Kognitive Beeinträchtigung, psychoaktive Substanzen und suchtbedingte Verhaltensweisen Seismo Verlag.

Veldhuis, R. , Spreeuwers, L., Ton, B., & Rozendal, S. (2020). A High-Quality Finger Vein Dataset Collected Using a Custom-Designed Capture Device. In A. Uhl, C. Busch, S. Marcel, & R. Veldhuis (Eds.), Handbook of Vascular Biometrics (pp. 63-75). (Advances in Computer Vision and Pattern Recognition). Springer. https://doi.org/10.1007/978-3-030-27731-4_2

Conference article


Beyer, D. , & Huisman, M. (2020). Tools for the construction and analysis of systems A special issue for TACAS 2018. International journal on software tools for technology transfer, 22(6), 685-687. https://doi.org/10.1007/s10009-020-00581-0

Botteghi, N. , Sirmacek, B. , Poel, M. , & Brune, C. (2020). Reinforcement learning helps slam: Learning to build maps. International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 43(B4), 329-336. https://doi.org/10.5194/isprs-archives-XLIII-B4-2020-329-2020



Conference contribution


Abate, A., Blom, H., Cauchi, N., Delicaris, J. , Hartmanns, A., Khaled, M., Lavaei, A., Pilch, C. , Remke, A., Schupp, S., Shmarov, F., Soudjani, S., Vinod, A. P., Wooding, B., Zamani, M., & Zuliani, P. (2020). ARCH-COMP20 Category Report: Stochastic Models. In ARCH20. 7th International Workshop on Applied Verification of Continuous and Hybrid Systems (ARCH20), Berlin, Germany, July 12, 2020 (Vol. 74, pp. 76-106). (EPiC Series in Computing). EasyChair. https://doi.org/10.29007/mqzc

Abeywardena, K., Zhao, J., Brent, L., Seneviratne, S. , & Holz, R-G. (2020). Triplet Mining-based Phishing Webpage Detection. In Local Computer Networks IEEE.

Aldea, A. I., Vaicekauskaitė, E. , Daneva, M. , & Piest, J. P. S. (2020). Assessing Resilience in Enterprise Architecture: A Systematic Review. In 2020 IEEE 24th International Enterprise Distributed Object Computing Conference (EDOC) [9233153] IEEE. https://doi.org/10.1109/edoc49727.2020.00011

Ali, G. , Bagheriye, L. , & Kerkhoff, H. G. (2020). On-Chip Embedded Instruments Data Fusion and Life-Time Prognostics of Dependable VLSI-SoCs using Machine-learning. In IEEE International Symposium on Circuits and Systems, ISCAS 2020 (pp. 1-5). (IEEE International Symposium on Circuits and Systems (ISCAS); Vol. 2020). IEEE. https://doi.org/10.1109/ISCAS45731.2020.9180773

Ali, G. , Bagheriye, L., Manhaeve, H. , & Kerkhoff, H. G. (2020). On-chip EOL Prognostics Using Data-Fusion of Embedded Instruments for Dependable MP-SoCs. In IEEE Asian Test Symposium, ATS 2020 (pp. 1-6). (IEEE Asian Test Symposium (ATS); Vol. 2020, No. 29). IEEE. https://doi.org/10.1109/ATS49688.2020.9301509

Aliannejadi, M., Landoni, M. , Huibers, T. W. C., Murgia, E., & Pera, M. S. (2020). Say it with Emojis: Co-designing relevance cues for searching in the classroom. In CIRCLE 2020 Information Retrieval Communities in Europe 2020: Proceedings of the Joint Conference of the Information Retrieval Communities in Europe (CIRCLE 2020) Samatan, Gers, France, July 6-9, 2020 (CEUR Workshop Proceedings; Vol. 2621). CEUR. http://ceur-ws.org/Vol-2621/

Aliannejadi, M., Landoni, M. , Huibers, T. W. C., Murgia, E., & Pera, M. S. (Accepted/In press). Children's Perspective on How Emojis Help Them to Recognise Relevant Results: Do Actions Speak Louder Than Words? In 6th ACM SIGIR Conference on Human Information Interaction and Retrieval: CHIIR 2021 ACM Press.

Anbalagan, S. N. , Seraj, F. , & Havinga, P. (2020). Towards Factory Schedule based Adaptation for Reliable Networking in Industrial IoT. In Proceedings 2020 IEEE 29th International Symposium on Industrial Electronics (ISIE) (pp. 1115-1120). IEEE. https://doi.org/10.1109/ISIE45063.2020.9152553


Ayub, M. A. , Continella, A., & Siraj, A. (2020). An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network. In Proceedings - 2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science, IRI 2020 (pp. 319-324). [9191509] IEEE. https://doi.org/10.1109/IRI49571.2020.00053

Bagheriye, L. , Ali, G. , & Kerkhoff, H. G. (2020). Life-Time Prognostics of Dependable VLSI-SoCs using Machine-learning. In IEEE International Symposium on On-Line Testing and Robust System Design, IOLTS 2020 (pp. 1-4). (IEEE International Symposium on On-Line Testing and Robust System Design (IOLTS); Vol. 2020, No. 26). IEEE. https://doi.org/10.1109/IOLTS50870.2020.9159753

Bergsma, T. , van Stegeren, J. , & Theune, M. (2020). Creating a Sentiment Lexicon with Game-Specific Words for Analyzing NPC Dialogue in The Elder Scrolls V: Skyrim. In S. M. Lukin (Ed.), Proceedings of the LREC 2020 Workshop Games and Natural Language Processing (pp. 1-9). European Language Resources Association (ELRA). https://www.aclweb.org/anthology/2020.gamnlp-1.1/

Bollen, L. M., Heinsius, L. R., Souilljee, M. L., Boe, M. , Hoogsteen, G. , Gerards, M. E. T. , & Hurink, J. L. (2020). Profile Steering with Non-regular Time-Intervals. In 2020 IEEE PES Innovative Smart Grid Technologies Europe: Smart Grids: key enablers of a green power system (pp. 284-288). IEEE. https://doi.org/10.1109/ISGT-Europe47291.2020.9248922

Bortolameotti, R. , van Ede, T. S. , Continella, A. , Hupperich, T. M. , Everts, M. H., Rafati, R. , Jonker, W. , Hartel, P. , & Peter, A. (2020). HeadPrint: Detecting Anomalous Communications through Header-based APplication Fingerprinting. In 35th Annual ACM Symposium on Applied Computing, SAC 2020 (pp. 1696-1705). Association for Computing Machinery (ACM). https://doi.org/10.1145/3341105.3373862

Bossek, J., Grimme, C. , & Trautmann, H. (2020). Dynamic Bi-Objective Routing of Multiple Vehicles. In Proceedings of the Genetic and Evolutionary Computation Conference (GECCO '20) (pp. 166-174). ACM SIGCOMM.

Botteghi, N. , Kamilaris, A., Sinai, L. , & Sirmaçek, B. (2020). Multi-Agent Path Planning of Robotic Swarms in Agricultural Fields. In ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Volume V-1-2020 (pp. 361-368). International Society for Photogrammetry and Remote Sensing (ISPRS). https://doi.org/10.5194/isprs-annals-V-1-2020-361-2020

Bouwman, M. , van der Wal, D., Luttik, B. , Stoelinga, M. , & Rensink, A. (2020). What is the point: Formal analysis and test generation for a railway standard. In P. Baraldi, F. Di Maio, & E. Zio (Eds.), Proceedings of the 30th European Safety and Reliability Conference and the 15th Probabilistic Safety Assessment and Management Conference (pp. 921-928). Research Publishing Services. https://doi.org/10.3850/978-981-14-8593-0_4410-cd

Breymann, L. E. I. , Mader, A. H., & Kok, H. M. (2020). How can technology enhanced learning improve the efficiency and quality of help seeking and giving for programming. In J. van der Veen, N. van Hattum-Janssen, H-M. Järvinen, T. de Laet, & I. ten Dam (Eds.), Engaging, Engineering, Education: Book of Abstracts, SEFI 48th Annual Conference University of Twente (online), 20-24 September, 2020 (pp. 679-688). University of Twente.

Bueno, M. L. P., Hommersom, A. , & Lucas, P. J. F. (2020). Temporal exceptional model mining using dynamic Bayesian networks. In V. Lemaire, S. Malinowski, A. Bagnall, T. Guyet, R. Tavenard, & G. Ifrim (Eds.), Advanced Analytics and Learning on Temporal Data - 5th ECML PKDD Workshop, AALTD 2020, Revised Selected Papers (pp. 97-112). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12588 LNAI). Springer. https://doi.org/10.1007/978-3-030-65742-0_7

Catala, A. , Nazareth, D. S., Félix, P. , Truong, K. P. , & Westerhof, G. J. (2020). Emobook: A Multimedia Life Story Book App for Reminiscence Intervention. In MobileHCI '20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services Association for Computing Machinery (ACM). https://doi.org/10.1145/3406324.3410717

Ceron, J. M., Scholten, C. , Pras, A. , & Santanna, J. (2020). MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification. In Proceedings of IEEE/IFIP Network Operations and Management Symposium 2020: Management in the Age of Softwarization and Artificial Intelligence [9110336] (2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020); Vol. 2020). IEEE. https://doi.org/10.1109/NOMS47738.2020.9110336

Chandramohan, A. , & Heijenk, G. (2020). Modelling V2V message generation rates in a highway environment. In 2020 16th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) [9253392] IEEE. https://doi.org/10.1109/WiMob50308.2020.9253392

Chaudhary, K., Chand, V. , & Fehnker, A. (2020). Double-Spending Analysis of Bitcoin. In D. Vogel, K. N. Shen, P. S. Ling, C. Hsu, J. Y. L. Thong, M. D. Marco, M. Limayem, & S. X. Xu (Eds.), 24th Pacific Asia Conference on Information Systems, PACIS 2020, Dubai, UAE, June 22-24, 2020 (pp. 210) https://aisel.aisnet.org/pacis2020/210

Coutinho, J. C., Moreira, J. , & Rebelo de Sá, C. (2020). UnFOOT - Unsupervised Football Analytics Tool. In Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2019, Würzburg, Germany, September 16–20, 2019, Proceedings, Part III (pp. 786-789). (Lecture notes in computer science; Vol. 11908). Springer. https://doi.org/10.1007/978-3-030-46133-1_52

D'Argenio, P. R., Fraire, J. A. , & Hartmanns, A. (2020). Sampling Distributed Schedulers for Resilient Space Communication. In R. Lee, S. Jha, & A. Mavridou (Eds.), NASA Formal Methods: 12th International Symposium, NFM 2020, Moffett Field, CA, USA, May 11–15, 2020, Proceedings (pp. 291-310). (Lecture Notes in Computer Science; Vol. 12229). Springer. https://doi.org/10.1007/978-3-030-55754-6_17

Daneva, M., & Bolscher, R. (2020). What we know about software architecture styles in continuous delivery and devops? In M. van Sinderen, & L. A. Maciaszek (Eds.), Software Technologies: 14th International Conference, ICSOFT 2019, Prague, Czech Republic, July 26–28, 2019, Revised Selected Papers (pp. 26-39). (Communications in Computer and Information Science; Vol. 1250). Springer Singapore. https://doi.org/10.1007/978-3-030-52991-8_2

Daniel Happ , & Bayhan, S. (2020). On the Impact of Clustering for IoT Analytics and Message Broker Placement across Cloud and Edge. In EdgeSys '20: Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking (pp. 43-48). ACM Publishing. https://doi.org/10.1145/3378679.3394538

Davison, D. P. , Wijnen, F. M. , Charisi, V. , van der Meij, J. , Evers, V. , & Reidsma, D. (2020). Working with a social robot in school: A long-term real-world unsupervised deployment. In HRI 2020 - Proceedings of the 2020 ACM/IEEE International Conference on Human-Robot Interaction (pp. 63-72). (ACM/IEEE International Conference on Human-Robot Interaction).. https://doi.org/10.1145/3319502.3374803, https://doi.org/10.1145/3319502.3374803

De Vries, R. A. J. , Haarman, J. A. M., Harmsen, E. C. , Heylen, D. K. J. , & Hermens, H. J. (2020). The Sensory Interactive Table: Exploring the Social Space of Eating. In ICMI 2020 - Proceedings of the 2020 International Conference on Multimodal Interaction (pp. 689-693). Association for Computing Machinery (ACM). https://doi.org/10.1145/3382507.3418866

De Wolf, E. , & Li, J. (2020). Double Trouble: The Effect of Eye Gaze on the Social Impression of Mobile Robotic Telepresence Operators. In Social Robotics: 12th International Conference, ICSR 2020, Golden, CO, USA, November 14–18, 2020, Proceedings (pp. 357-368). (Lecture Notes in Computer Science; Vol. 12483). Springer. https://doi.org/10.1007/978-3-030-62056-1_30

Deknop, C., Fabry, J., Mens, K. , & Zaytsev, V. (2020). Improving a Software Modernisation Process by Differencing Migration Logs. In M. Morisio, M. Torchiano, & A. Jedlitschka (Eds.), Product-Focused Software Process Improvement: 21st International Conference, PROFES 2020, Turin, Italy, November 25–27, 2020, Proceedings (pp. 270-286). (Lecture Notes in Computer Science; Vol. 12562). Springer. https://doi.org/10.1007/978-3-030-64148-1_17

Dietz, C., Dreo, G. , Sperotto, A. , & Pras, A. (2020). Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using MTD. In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020): Management in the Age of Softwarization and Artificial Intelligence [9110332] (IEEE/IFIP Network Operations and Management Symposium (NOMS); Vol. 2020). IEEE. https://doi.org/10.1109/NOMS47738.2020.9110332

Ebrahimi, H. , & Kerkhoff, H. G. (2020). A New Monitor Insertion Algorithm for Intermittent Fault Detection. In 2020 IEEE European Test Symposium, ETS 2020 [9131563] (Proceedings of the European Test Workshop; Vol. 2020-May). IEEE. https://doi.org/10.1109/ETS48528.2020.9131563

Eijkel, D. , & Fehnker, A. (2020). A distributed blockchain model of selfish mining. In E. Sekerinski, N. Moreira, J. N. Oliveira, D. Ratiu, R. Guidotti, M. Farrell, M. Luckcuck, D. Marmsoler, J. Campos, T. Astarte, L. Gonnord, A. Cerone, L. Couto, B. Dongol, M. Kutrib, P. Monteiro, & D. Delmas (Eds.), Formal Methods- FM 2019 International Workshops - Revised Selected Papers (pp. 350-361). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12232 LNCS). Springer Singapore. https://doi.org/10.1007/978-3-030-54994-7_26

El Haddad, K., Tits, N. , Velner, E., & Bohy, H. (2020). Cozmo4Resto: A Practical AI Application for Human-Robot Interaction. In H. Dibeklioglu, & E. Sürer (Eds.), Proceedings eNTERFACE’19: 15th International Summer Workshop on Multimodal Interfaces (pp. 12-18). Bilkent University.

Esquivel Vargas, H. T., Caselli, M. , Laanstra, G. J. , & Peter, A. (2020). Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective. In Detection of Intrusions and Malware, and Vulnerability Assessmen: 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings (pp. 44-64). (Lecture Notes in Computer Science; Vol. 12223). https://doi.org/10.1007/978-3-030-52683-2_3

Estefanía Coronado, Abin Thomas , Bayhan, S., & Roberto Riggio (2020). aiOS: An Intelligence Layer for SD-WLANs. In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020): Management in the Age of Softwarization and Artificial Intelligence [9110260] (IEEE/IFIP Network Operations and Management Symposium (NOMS); Vol. 2020). IEEE. https://doi.org/10.1109/NOMS47738.2020.9110260

Fehnker, A. (2020). A sports day for programming. In D. R. Stikkolorum, & E. Rahimi (Eds.), CSERC '20: the 9th Computer Science Education Research Conference, Virtual Event, The Netherlands, 19-20 October, 2020 (pp. 11:1-11:6). [11] ACM SIGCOMM. https://doi.org/10.1145/3442481.3442507

Fehnker, A. , Mader, A., Rump, A., Rutgers, M., Steenmeijer, L., & Witteveen, C. (2020). Atelier: An Online Platform for Programming Tutorials. In Proceedings of the 9th Computer Science Education Research Conference (CSERC '20). Association for Computing Machinery (ACM). https://doi.org/10.1145/3442481.3442511


Fung, N. L. S. , van Sinderen, M. J. , Jones, V. M. , & Hermens, H. J. (2020). A Verified, Executable Formalism for Resilient and Pervasive Guideline-Based Decision Support for Patients. In M. Michalowski, & R. Moskovitch (Eds.), Artificial Intelligence in Medicine: 18th International Conference on Artificial Intelligence in Medicine, AIME 2020, Proceedings (pp. 427-439). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12299 LNAI). Springer. https://doi.org/10.1007/978-3-030-59137-3_38

Garavel, H., Ter Beek, M. H. , & Van De Pol, J. (2020). The 2020 Expert Survey on Formal Methods. In M. H. ter Beek, & D. Nickovic (Eds.), Formal Methods for Industrial Critical Systems - 25th International Conference, FMICS 2020, Proceedings (pp. 3-69). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12327 LNCS). Springer. https://doi.org/10.1007/978-3-030-58298-2_1

Garcia, K. D., Carvalho, T., Mendes-Moreira, J., Cardoso, J. M. P., & de Carvalho, A. C. P. L. F. (2020). A Study on Hyperparameter Configuration for Human Activity Recognition. In H. Quintián, J. A. Sáez Muñoz, E. Corchado, F. Martínez Álvarez, & A. Troncoso Lora (Eds.), 14th International Conference on Soft Computing Models in Industrial and Environmental Applications SOCO 2019, Proceedings (pp. 47-56). (Advances in Intelligent Systems and Computing; Vol. 950). Springer Verlag. https://doi.org/10.1007/978-3-030-20055-8_5

Gawlowicz, P., Zubow, A. , & Bayhan, S. (2020). Demo Abstract: Cross-technology communication between LTE-U/LAA and WiFi. In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2020 (pp. 1272-1273). [9162587] IEEE. https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162587

Gawlowicz, P., Zubow, A. , Bayhan, S., & Wolisz, A. (2020). Punched Cards over the Air: Cross-Technology Communication Between LTE-U/LAA and WiFi. In 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM) IEEE. https://doi.org/10.1109/WoWMoM49955.2020.00058

Geissler, D., Nguyen, E., Theodorakopoulos, D. , & Gatti, L. (2020). Pokérator - Unveil your inner Pokémon. In Proceedings of the 11th International Conference on Computational Creativity (ICCC’20) (pp. 500-503) http://computationalcreativity.net/iccc20/papers/159-iccc20.pdf

Gritti, F., Fontana, L., Gustafson, E., Pagani, F. , Continella, A., Kruegel, C., & Vigna, G. (2020). SYMBION: Interleaving Symbolic with Concrete Execution. In Proceedings of the 8th IEEE Conference on Communications and Network Security (CNS '20) [9162164] (2020 IEEE Conference on Communications and Network Security, CNS 2020). IEEE. https://doi.org/10.1109/CNS48642.2020.9162164

Hackenjos, T. , Hahn, F., & Kerschbaum, F. (2020). SAGMA: Secure Aggregation Grouped by Multiple Attributes. In D. Maier, R. Pottinger, A. Doan, W-C. Tan, A. Alawini, & H. Q. Ngo (Eds.), SIGMOD'20: Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data, June 2020 (pp. 587–601). ACM Publishing. https://doi.org/10.1145/3318464.3380569

Hahn, E. M., Perez, M., Schewe, S., Somenzi, F., Trivedi, A., & Wojtczak, D. (2020). Faithful and Effective Reward Schemes for Model-Free Reinforcement Learning of Omega-Regular Objectives. In D. V. Hung, & O. Sokolsky (Eds.), Automated Technology for Verification and Analysis: 18th International Symposium, ATVA 2020, Hanoi, Vietnam, October 19–23, 2020, Proceedings (pp. 108-124). (Lecture Notes in Computer Science; Vol. 12302). Springer. https://doi.org/10.1007/978-3-030-59152-6_6

Hahn, E. M., Perez, M., Schewe, S., Somenzi, F., Trivedi, A., & Wojtczak, D. (2020). Model-Free Reinforcement Learning for Stochastic Parity Games. In I. Konnov, & L. Kovacs (Eds.), 31st International Conference on Concurrency Theory (CONCUR 2020) (Leibniz International Proceedings in Informatics (LIPIcs); Vol. 171). Dagstuhl. https://doi.org/10.4230/LIPICS.CONCUR.2020.21

Hartmanns, A., & Kaminski, B. L. (2020). Optimistic Value Iteration. In S. K. Lahiri, & C. Wang (Eds.), Computer Aided Verification: 32nd International Conference, CAV 2020, Los Angeles, CA, USA, July 21–24, 2020, Proceedings, Part II (pp. 488-511). (Lecture Notes in Computer Science; Vol. 12225). Springer. https://doi.org/10.1007/978-3-030-53291-8_26

Holz, R., Perino, D., Varvello, M., Amann, J. , Continella, A., Evans, N., Leontiadis, I., Natoli, C., & Scheitle, Q. (2020). A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web. In Proceedings of the Network Traffic Measurement and Analysis Conference (TMA) IEEE.

Hoogsteen, G. , Gerards, M. E. T. , & Hurink, J. L. (2020). Optimization of Multi-Energy Systems Using the Profile Steering Coordination Framework. In 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe) (pp. 91-95). [41] IEEE Power & Energy Society. https://doi.org/10.1109/ISGT-Europe47291.2020.9248766

Huisman, M. , & Monti, R. E. (2020). On the Industrial Application of Critical Software Verification with VerCors. In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation: Applications - 9th International Symposium on Leveraging Applications of Formal Methods, ISoLA 2020, Rhodes, Greece, October 20-30, 2020, Proceedings, Part III (pp. 273-292). (Lecture Notes in Computer Science; Vol. 12478). Springer Singapore. https://doi.org/10.1007/978-3-030-61467-6_18

Huisman, M., & Seceleanu, C. (2020). Verification and Validation of Concurrent and Distributed Systems (Track Summary). In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation: Verification Principles - 9th International Symposium on Leveraging Applications of Formal Methods, ISoLA 2020, Rhodes, Greece, October 20-30, 2020, Proceedings, Part I (pp. 421-425). (Lecture Notes in Computer Science; Vol. 12476). Springer Singapore. https://doi.org/10.1007/978-3-030-61362-4_24

Huisman, M., & Wijs, A. (2020). Towards verified construction of correct and optimised GPU software. In W. Oortwijn (Ed.), FTfJP 2020: Proceedings of the 22nd ACM SIGPLAN International Workshop on Formal Techniques for Java-Like Programs (pp. 10-14). Association for Computing Machinery (ACM). https://doi.org/10.1145/3427761.3428344

Jakubeit, P., Dercksen, A. , & Peter, A. (2020). SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities. In M. Laurent, & T. Giannetsos (Eds.), Information Security Theory and Practice: 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings (pp. 202-219). (Lecture notes in computer science; Vol. 12024). Springer International Publishing AG. https://doi.org/10.1007/978-3-030-41702-4_13

Jansen, M-P. , Truong, K. P. , Nazareth, D. S. , & Heylen, D. K. J. (2020). Introducing MULAI: A Multimodal Database of Laughter during Dyadic Interactions. In Proceedings of the 12th Conference on Language Resources and Evaluation (LREC 2020) (pp. 4333-4342). European Language Resources Association (ELRA). https://www.aclweb.org/anthology/2020.lrec-1.534/

Jansen, M. , & Seraj, F. (2020). e-Sight: Real-time cloud platform for visualizing edge transport infrastructure information. In 2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) [9156181] IEEE. https://doi.org/10.1109/PerComWorkshops48775.2020.9156181

Jonker, M. , Sperotto, A. , & Pras, A. (2020). DDoS Mitigation: A Measurement-Based Approach. In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020) (pp. 1-6). (IEEE/IFIP Network Operations and Management Symposium (NOMS); Vol. 2020). IEEE. https://doi.org/10.1109/NOMS47738.2020.9110320

Kaag, W. , Theune, M. , & Huibers, T. W. C. (Accepted/In press). Designing a learning robot to encourage collaboration between children. In Proceedings of Design, Learning, and Innovation (DLI 2020) (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering). Springer.

Kaya, F., Berg, M. V. D. , Wieringa, R., & Makkes, M. (2020). The Banking Industry Underestimates Costs of Cloud Migrations. In S. Aier, J. Gordijn, H. A. Proper, & J. Verelst (Eds.), Proceedings - 2020 IEEE 22nd Conference on Business Informatics, CBI 2020 (pp. 300-309). [9140248] IEEE. https://doi.org/10.1109/CBI49978.2020.00039

Kelly, U. M. , Veldhuis, R. N. J. , & Spreeuwers, L. (2020). Improving deep-learning-based face recognition to increase robustness against morphing attacks. In D. C. Wyld, & J. Zizka (Eds.), 9th International Conference on Signal, Image Processing and Pattern Recognition (SPPR 2020), December 19 ~ 20, 2020, Sydney, Australia (Computer Science & Information Technology; Vol. 10, No. 19). Academy and Industry Research Collaboration Center (AIRCC). https://doi.org/10.5121/csit.2020.101901

Kola, I., Jonker, C. M. , & van Riemsdijk, M. B. (2020). Who’s that? – Social Situation Awareness for Behaviour Support Agents: A Feasibility Study. In Engineering Multi-Agent Systems: 7th International Workshop, EMAS 2019, Montreal, QC, Canada, May 13–14, 2019, Revised Selected Papers (Vol. 12058, pp. 127-151). (Lecture notes in computer science; Vol. 12058). Springer. https://doi.org/10.1007/978-3-030-51417-4_7

Kola, I., Jonker, C. M., Tielman, M. , & van Riemsdijk, M. B. (2020). Grouping Situations Based on their Psychological Characteristics Gives Insight into Personal Values. In MRC 2020. Modelling and Reasoning in Context : Proceedings of the 11th International Workshop on Modelling and Reasoning in Context (pp. 17-26). (Workshop Proceedings; Vol. 2787). CEUR. http://ceur-ws.org/Vol-2787/paper3.pdf

Kuling, I. A., Gijsbertse, K., Krom, B. N., van Teeffelen, K. J. , & van Erp, J. B. F. (2020). Haptic feedback in a teleoperated box & blocks task. In I. Nisky, J. Hartcher-O’Brien, M. Wiertlewski, & J. Smeets (Eds.), Haptics: Science, Technology, Applications - 12th International Conference, EuroHaptics 2020, Leiden, The Netherlands, September 6–9, 2020, Proceedings (pp. 96-104). (Lecture Notes in Computer Science; Vol. 12272). Springer. https://doi.org/10.1007/978-3-030-58147-3_11

Kulkarni, V. V. , & Seraj, F. (2020). An embedded wearable device for monitoring diabetic foot ulcer parameters. In PETRA '20: The 13th PErvasive Technologies Related to Assistive Environments Conference [47] ACM SigCHI. https://doi.org/10.1145/3389189.3397982

Lafranca, L. , & Li, J. (2020). Humans and Robots in Times of Quarantine Based on First-Hand Accounts. In A. R. Wagner, D. Feil-Seifer, K. S. Haring, S. Rossi, T. Williams, H. He, & S. Sam Ge (Eds.), Social Robotics - 12th International Conference, ICSR 2020, Proceedings (pp. 688-707). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12483 LNAI). Springer. https://doi.org/10.1007/978-3-030-62056-1_57

Lammers, M. , Wijnhoven, F. , Bukhsh, F. A., & Silva, P. D. A. (2020). Automatic Q.A-Pair Generation for Incident Tickets Handling: An Application of NLP. In K. Djemame, J. Á. Bañares, V. Stankovski, J. Altmann, O. A. Ben-Yehuda, & B. Tuffin (Eds.), Economics of Grids, Clouds, Systems, and Services: 17th International Conference, GECON 2020, Izola, Slovenia, September 15–17, 2020, Revised Selected Papers (pp. 15-27). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12441 LNCS). Springer. https://doi.org/10.1007/978-3-030-63058-4_2

Landoni, M., Fails, J. A. , Huibers, T. W. C., Kucirkova, N., Murgia, E., & Pera, M. S. (2020). 4th KidRec Workshop - "what does good look like?": From design, research, and practice to policy. In Extended Abstracts - Proceedings of the 2020 ACM Interaction Design and Children Conference, IDC 2020 (pp. 103-110). Association for Computing Machinery (ACM). https://doi.org/10.1145/3397617.3398057

Landoni, M. , Huibers, T. W. C., Murgia, E., & Pera, M. S. (2020). We've only just begun: Children searching in the classroom. In I. Cantador, M. Chevalier, M. Melucci, & J. Mothe (Eds.), CIRCLE 2020 Information Retrieval Communities in Europe 2020: Proceedings of the Joint Conference of the Information Retrieval Communities in Europe (CIRCLE 2020) Samatan, Gers, France, July 6-9, 2020 (CEUR Workshop Proceedings; Vol. 2621). CEUR. http://ceur-ws.org/Vol-2621/

Landoni, M. , Huibers, T. W. C., Murgia, E., & Pera, M. S. (2020). You've Got a Friend in Me: Children and Search Agents. In UMAP 2020 Adjunct - Adjunct Publication of the 28th ACM Conference on User Modeling, Adaptation and Personalization (pp. 89-94). Association for Computing Machinery (ACM). https://doi.org/10.1145/3386392.3397604

Landoni, M., Pera, M. S., Murgia, E. , & Huibers, T. W. C. (2020). Inside Out: Exploring the Emotional Side of Search Engines in the Classroom. In UMAP 2020 - Proceedings of the 28th ACM Conference on User Modeling, Adaptation and Personalization (pp. 136-144). Association for Computing Machinery (ACM). https://doi.org/10.1145/3340631.3394847

Lastdrager, E. , Hesselman, C., Jansen, J., & Davids, M. (2020). Protecting Home Networks from Insecure IoT Devices. In Proceedings of IEEE/IFIP Network Operations and Management Symposium 2020: Management in the Age of Softwarization and Artificial Intelligence, NOMS 2020 [9110419] IEEE. https://doi.org/10.1109/NOMS47738.2020.9110419

Lathouwers, S. , Everts, M. , & Huisman, M. (2020). Verifying Sanitizer Correctness through Black-Box Learning: A Symbolic Finite Transducer Approach. In S. Furnell, P. Mori, E. Weippl, & O. Camp (Eds.), Proceedings of the 6th International Conference on Information Systems Security and Privacy: Volume 1: ForSE (pp. 784-795). SCITEPRESS Digital Library. https://doi.org/10.5220/0009371207840795

Lee, H., Gireesh, A. , van Rijswijk - Deij, R., Kwon, T., & Chung, T. (2020). A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email. In Proceedings of the 29th USENIX Security Symposium (pp. 613-630). (Proceedings of the 29th USENIX Security Symposium). USENIX. https://www.usenix.org/conference/usenixsecurity20/presentation/lee-hyeonmin

Li, D. , & van der Veer, G. C. (2020). Supporting the Experience of Stakeholders of Multimedia Art – Towards an Ontology. In J. Abdelnour Nocera, J. Abdelnour Nocera, A. Parmaxi, M. Winckler, F. Loizides, C. Ardito, G. Bhutkar, & P. Dannenmann (Eds.), Beyond Interactions - INTERACT 2019 Workshops, Revised Selected Papers (pp. 3-15). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11930 LNCS). Springer Singapore. https://doi.org/10.1007/978-3-030-46540-7_1

Li, J. J., Currano, R., Sirkin, D., Goedicke, D., Tennent, H., Levine, A. , Evers, V., & Ju, W. (2020). On-Road and Online Studies to Investigate Beliefs and Behaviors of Netherlands, US and Mexico Pedestrians Encountering Hidden-Driver Vehicles. In HRI '20: Proceedings of the 2020 ACM/IEEE International Conference on Human-Robot Interaction (pp. 141-149). Association for Computing Machinery (ACM).

Li, J. J. , Davison, D. P., Alcorn, A. M., Williams, A., Babovic Dimitrijevic, S., Petrovic, S. , Chevalier, P. , Schadenberg, B. R., Ainger, E., Pellicano, L. , & Evers, V. (2020). Non-participatory user-centered design of accessible teacher-teleoperated robot and tablets for minimally verbal autistic children. In PETRA '20: Proceedings of the 13th ACM International Conference on PErvasive Technologies Related to Assistive Environments (pp. 1-9). [8] Association for Computing Machinery (ACM). https://doi.org/10.1145/3389189.3393738

Li, J. J., Petrovic, S. , Davison, D. P., Babovic, S. , Chevalier, P. , & Evers, V. (2020). Addressing Attention Difficulties in Autistic Children Using Multimodal Cues from a Humanoid Robot. In Companion of the 2020 ACM/IEEE International Conference on Human-Robot Interaction (HRI ’20 Companion) (pp. 334-336). ACM Publishing. https://doi.org/10.1145/3371382.3378276

Lijzenga, O. , & van Dijk, T. (2020). Symbolic Parity Game Solvers that Yield Winning Strategies. In J-F. Raskin, & D. Bresolin (Eds.), Proceedings 11th International Symposium on Games, Automata, Logics, and Formal Verification: Brussels, Belgium, September 21-22, 2020 (pp. 18-32). (Electronic Proceedings in Theoretical Computer Science; Vol. 326). Open Publishing Association. https://doi.org/10.4204/EPTCS.326.2



Malakonakis, P., Brokalakis, A. , Alachiotis, N., Sotiriades, E., & Dollas, A. (2020). Exploring Modern FPGA Platforms for Faster Phylogeny Reconstruction with RAxML. In 2020 IEEE 20th International Conference on Bioinformatics and Bioengineering (BIBE) (Proceedings IEEE International Conference on Bioinformatics and Bioengineering (BIBE); Vol. 2020). IEEE. https://doi.org/10.1109/BIBE50027.2020.00024

Marin, M. D. , Mocanu, E. , & Seifert, C. (2020). Effectiveness of neural language models for word prediction of textual mammography reports. In 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC) IEEE SMC. https://doi.org/10.1109/SMC42975.2020.9283304

Meijer, M., Dokter, M., Boersma, C., Sadananda Bhat, A. , Bohlmeijer, E. T. , & Li, J. J. (2020). PlantBot: A Social Robot Prototype to Help with Behavioral Activation in Young People with Minor Depression. In Companion of the 2020 ACM/IEEE International Conference on Human- Robot Interaction (HRI ’20 Companion)

Meijerink, B. , & Heijenk, G. (2020). Infrastructure Support for Contention-Based Forwarding. In D. Cabric, O. Altintas, T. Leinmueller, H. Zhang, & T. Higuchi (Eds.), 2019 IEEE Vehicular Networking Conference, VNC 2019 [9062795] (IEEE Vehicular Networking Conference, VNC; Vol. 2019-December). IEEE Computer Society Press. https://doi.org/10.1109/VNC48660.2019.9062795


Mohan, N., Corneo, L., Zavodovski , A. , Bayhan, S., Wong, W., & Kangasharju, J. (2020). Pruning Edge Research with Latency Shears. In B. Zhao, & H. Zheng (Eds.), HotNets'20: The 19th ACM Workshop on Hot Topics in Networks (pp. 182-189). ACM Publishing. https://dl.acm.org/doi/10.1145/3422604.3425943

Moura, G. C. M. , Hesselman, C., Schaapman, G., Boerman, N., & De Weerdt, O. (2020). Into the DDoS maelstrom: A longitudinal study of a scrubbing service. In 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020 (pp. 550-558). [9229733] IEEE. https://doi.org/10.1109/EuroSPW51379.2020.00081

Muñoz Sánchez, M., Silvas, E., Pogosov, D. , & Mocanu, D. C. (2020). A Hybrid Framework Combining Vehicle System Knowledge with Machine Learning Methods for Improved Highway Trajectory Prediction. In 2020 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2020 (pp. 444-450). [9282933] IEEE SMC. https://doi.org/10.1109/SMC42975.2020.9282933

Müller, M., Toorop, W., Chung, T., Jansen, J. , & van Rijswijk-Deij, R. (2020). The Reality of Algorithm Agility: Studying the DNSSEC Algorithm Life-Cycle. In IMC '20: Proceedings of the 20th ACM Internet Measurement Conference (pp. 295-308). ACM Publishing. https://doi.org/10.1145/3419394.3423638

Nauta, M. , Putten, M. J. A. M. V. , Tjepkema-Cloostermans, M. C., Bos, J. P. , Keulen, M. V. , & Seifert, C. (2020). Interactive Explanations of Internal Representations of Neural Network Layers: An Exploratory Study on Outcome Prediction of Comatose Patients. In K. Bach, R. Bunescu, C. Marling, & N. Wiratunga (Eds.), KDH 2020: 5th International Workshop on Knowledge Discovery in Healthcare Data (Vol. 2675, pp. 5-11). (CEUR Workshop Proceedings; Vol. 2675). CEUR. http://ceur-ws.org/Vol-2675/paper1.pdf

Nijholt, A. (2020). Playful and Humorous Interactions in Urban Environments Made Possible with Augmented Reality Technology. In A. Brooks, & E. I. Brooks (Eds.), Interactivity, Game Creation, Design, Learning, and Innovation. ArtsIT 2019, DLI 2019: 8th EAI International Conference, ArtsIT 2019, and 4th EAI International Conference, DLI 2019, Aalborg, Denmark, November 6–8, 2019, Proceedings (pp. 273-289). (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Vol. 328). Springer. https://doi.org/10.1007/978-3-030-53294-9_19

Nijholt, A. (2020). Real, Augmented, Virtual, and Robotic Animals in Smart and Playable Cities. In G. Di Bucchianico, C. S. Shin, S. Shim, S. Fukuda, G. Montagna, & C. Carvalho (Eds.), Advances in Industrial Design: Proceedings of the AHFE 2020 Virtual Conferences on Design for Inclusion, Affective and Pleasurable Design, Interdisciplinary Practice in Industrial Design, Kansei Engineering, and Human Factors for Apparel and Textile Engineering (pp. 627-633). (Advances in Intelligent Systems and Computing; Vol. 1202). Springer. https://doi.org/10.1007/978-3-030-51194-4_82

Nijholt, A. (2020). Virtual and Augmented Reality Animals in Smart and Playful Cities: Invited Paper. In 2020 Joint 9th International Conference on Informatics, Electronics & Vision (ICIEV) and 2020 4th International Conference on Imaging, Vision & Pattern Recognition (icIVPR) IEEE. https://doi.org/10.1109/ICIEVicIVPR48672.2020.9306528

Oortwijn, W., Gurov, D. , & Huisman, M. (2020). Practical Abstractions for Automated Verification of Shared-Memory Concurrency. In D. Beyer, & D. Zufferey (Eds.), Verification, Model Checking, and Abstract Interpretation - 21st International Conference, VMCAI 2020, New Orleans, LA, USA, January 16-21, 2020, Proceedings (pp. 401-425). (Lecture Notes in Computer Science; Vol. 11990). Springer Singapore. https://doi.org/10.1007/978-3-030-39322-9_19

Oude Nijeweme - d'Hollosy, W. , van Velsen, L. , Poel, M. , Groothuis-Oudshoorn, C., Soer, R., Stegeman, P. , & Hermens, H. (2020). Applying machine learning on patient-reported data to model the selection of appropriate treatments for low back pain: A Pilot Study. In Proceedings of the 13th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2020) (Vol. 5: HEALTHINF, pp. 117-124). SCITEPRESS. https://doi.org/10.5220/0008962101170124

Piest, J. P. S. , Bemthuis, R., & Charismadiptya, G. (2020). Demonstrating the architecture for situation-aware logistics using smart returnable assets. In IEEE 24th International Enterprise Distributed Object Computing Workshop, EDOCW 2020 (pp. 86-90). IEEE. https://doi.org/10.1109/EDOCW49879.2020.00024

Pilch, C. , Hartmanns, A. , & Remke, A. (2020). Classic and non-prophetic model checking for hybrid Petri nets with stochastic firings. In A. Ames, S. A. Seshia, & J. Deshmukh (Eds.), HSCC '20: Proceedings of the 23rd International Conference on Hybrid Systems: Computation and Control [10] Association for Computing Machinery (ACM). https://doi.org/10.1145/3365365.3382198

Ranasinghe, A. C. , & Gerez, S. H. (2020). MEPNTC: A Standard-Cell Library Design Scheme Extending the Minimum-Energy-Point Operation of Near-Vth Computing. In Proceedings - 2020 IEEE 38th International Conference on Computer Design, ICCD 2020 (pp. 96-104). [9283594] IEEE. https://doi.org/10.1109/ICCD50377.2020.00032

Ranasinghe, A. C. , & Gerez, S. H. (2020). Ultra-Low Voltage 4-to-2 Compressors for Near-Vth Computing. In IEEE International Symposium on Circuits and Systems (ISCAS) IEEE. https://doi.org/10.1109/ISCAS45731.2020.9181126

Rieger, A. , Theune, M., & Tintarev, N. (Accepted/In press). Toward Natural Language Mitigation Strategies for Cognitive Biases in Recommender Systems. In J. Alonso, & A. Catala (Eds.), NL4XAI 20202nd Workshop on Interactive Natural Language Technologyfor Explainable Artificial Intelligence Association for Computational Linguistics (ACL).

Rodday, N. M., van Baaren, R. , Hendriks, L. , van Rijswijk - Deij, R. M. , Pras, A., & Dreo Rodosek, G. (2020). Evaluating RPKI ROV Identification Methodologies in Automatically Generated Mininet Topologies. In Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '20) (pp. 530-531). ACM SIGCOMM. https://doi.org/10.1145/3386367.3431669

Ruis, F. , Pathak, S., Geerdink, J. , Hegeman, J. H. , Seifert, C. , & van Keulen, M. (2020). Human-in-the-loop Language-agnostic Extraction of Medication Data from Highly Unstructured Electronic Health Records. In 20th International Conference on Data Mining Workshops 2020 IEEE EDS.

Safari, M. , & Huisman, M. (2020). A Generic Approach to the Verification of the Permutation Property of Sequential and Parallel Swap-Based Sorting Algorithms. In B. Dongol, & E. Troubitsyna (Eds.), Integrated Formal Methods - 16th International Conference, IFM 2020, Lugano, Switzerland, November 16-20, 2020, Proceedings (pp. 257-275). (Lecture Notes in Computer Science; Vol. 12546). Springer Singapore. https://doi.org/10.1007/978-3-030-63461-2_14

Safari, M. , & Huisman, M. (2020). Formal Verification of Parallel Stream Compaction and Summed-Area Table Algorithms. In V. K. I. Pun, V. Stolz, & A. Simão (Eds.), Theoretical Aspects of Computing - ICTAC 2020 - 17th International Colloquium, Macau, China, November 30 - December 4, 2020, Proceedings (pp. 181-199). (Lecture Notes in Computer Science; Vol. 12545). Springer Singapore. https://doi.org/10.1007/978-3-030-64276-1_10

Safari, M. , Oortwijn, W. , Joosten, S. J. C. , & Huisman, M. (2020). Formal Verification of Parallel Prefix Sum. In R. Lee, S. Jha, & A. Mavridou (Eds.), NASA Formal Methods - 12th International Symposium, NFM 2020, Moffett Field, CA, USA, May 11-15, 2020, Proceedings (pp. 170-186). (Lecture Notes in Computer Science; Vol. 12229). Springer Singapore. https://doi.org/10.1007/978-3-030-55754-6_10

Salim, F. A., Haider, F., Frutos-Pascual, M. , Reidsma, D., Luz, S. , & Van Beijnum, B. J. (2020). Action modelling for interaction and analysis in smart sports and physical education. In ICMI 2020 Companion - Companion Publication of the 2020 International Conference on Multimodal Interaction (pp. 228-229). Association for Computing Machinery (ACM). https://doi.org/10.1145/3395035.3425299

Salim, F. A., Haider, F., Yengec Tasdemir, S. B., Naghashi, V., Tengiz, I., Cengiz, K. , Postma, D. B. W. , van Delden, R. , Reidsma, D., Luz, S. , & van Beijnum, B-J. (2020). Volleyball Action Modelling for Behavior Analysis and Interactive Multi-modal Feedback. In eNTERFACE’19, 15th International Summer Workshop on Multimodal Interface Bilkent University.

Schadenberg, B. R. , Li, J. J., Petrovic, S. , Reidsma, D. , Heylen, D. K. J. , & Evers, V. (2020). Helping Educators Monitor Autistic Children's Progress Across Sessions: A Needfinding Study. In HRI '20: 15th Annual ACM/IEEE International Conference on Human-Robot Interaction, March 23-26, 2020 Association for Computing Machinery (ACM). https://doi.org/10.1145/3371382.3378378

Schultes, E. , Magagna, B., Hettne, K. M., Pergl, R., Suchánek, M., & Kuhn, T. (2020). Reusable FAIR Implementation Profiles as Accelerators of FAIR Convergence. In G. Grossmann, & S. Ram (Eds.), Advances in Conceptual Modeling - ER 2020 Workshops CMAI, CMLS, CMOMM4FAIR, CoMoNoS, EmpER, 2020, Proceedings (pp. 138-147). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12584 LNCS). Springer. https://doi.org/10.1007/978-3-030-65847-2_13

Seraj, F. , Ayele, E. , & Meratnia, N. (2020). Unsupervised learning of wildlife behaviour for activity-driven opportunistic beacon networks. In 2019 13th International Conference on Sensing Technology (ICST) (Proceedings International Conference on Sensing Technology (ICST); Vol. 2019). IEEE. https://doi.org/10.1109/ICST46873.2019.9047671

Sohail, S. A., Krabbe, J., de Alencar Silva, P. , & Bukhsh, F. A. (2020). Privacy Value Modeling: A Gateway To Ethical Big Data Handling. In B. Roelens, W. Laurier, G. Poels, & H. Weigand (Eds.), VMBO 2020: Value Modelling and Business Ontologies (pp. 5-15). (CEUR Workshop Proceedings; Vol. 2574). CEUR. http://ceur-ws.org/Vol-2574/paper1.pdf

Sokar, G. A. Z. N. , Mocanu, D. C., & Pechenizkiy, M. (Accepted/In press). Learning Invariant Representation for Continual Learning. In Meta-Learning for Computer Vision (MeL4CV) workshop at AAAI Conference on Artificial Intelligence (AAAI-21)

Sommese, R. , Bertholdo, L. M., Akiwate, G. , Jonker, M. , van Rijswijk - Deij, R. M., Dainotti, A., Claffy, K. , & Sperotto, A. (2020). MAnycast2 - Using Anycast to Measure Anycast: Challenges and Opportunities. In IMC '20: Proceedings of the 20th ACM Internet Measurement Conference (pp. 456-463). ACM Publishing. https://doi.org/10.1145/3419394.3423646

Sommese, R. , Jonker, M. , van Rijswijk-Deij, R., Dainotti, A., Claffy, K. C. , & Sperotto, A. (2020). The Forgotten Side of DNS: Orphan and Abandoned Records. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 538-543). [9229781] (Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020). IEEE. https://doi.org/10.1109/EuroSPW51379.2020.00079

Sommese, R., Moura, G. C. M. , Jonker, M. , van Rijswijk-Deij, R., Dainotti, A., Claffy, K. C. , & Sperotto, A. (2020). When Parents and Children Disagree: Diving into DNS Delegation Inconsistency. In A. Sperotto, A. Dainotti, & B. Stiller (Eds.), Passive and Active Measurement: 21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30–31, 2020. Proceedings (pp. 175-189). (Lecture Notes in Computer Science; Vol. 12048). Springer Heidelberg. https://doi.org/10.1007/978-3-030-44081-7_11

Soro, F., Allegretta, M. , Drago, I., Mellia, M. , & Bertholdo, L. M. (2020). Sensing the Noise: Uncovering Communities in Darknet Traffic. In 2020 Mediterranean Communication and Computer Networking Conference (MedComNet) IEEE. https://doi.org/10.1109/MedComNet49392.2020.9191555

Sperotto, A. , Steinberger, J., Baier, H. , & Pras, A. (2020). Distributed DDoS Defense: A collaborative Approach at Internet Scale. In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020) (IEEE/IFIP Network Operations and Management Symposium (NOMS); Vol. 2020). IEEE. https://doi.org/10.1109/NOMS47738.2020.9110300

Stara, V. , de Jong, M., Felici, E., Bolliger, D., Birrer, E., von Döllen, V., Rossi, L., & Heerink, M. (2020). The design adaptation of the virtual assistant anne for moderate dementia patients and their formal caregivers in protected environment tests. In N. J. Lightner, & J. Kalra (Eds.), Advances in Human Factors and Ergonomics in Healthcare and Medical Devices - Proceedings of the AHFE International Conference on Human Factors and Ergonomics in Healthcare and Medical Devices, 2019 (pp. 270-279). (Advances in Intelligent Systems and Computing; Vol. 957). Springer Verlag. https://doi.org/10.1007/978-3-030-20451-8_27

Szilas, N., De Jong, R. , & Theune, M. (2020). ExpReal: A Writing Language and System for Authoring Texts in Interactive Narrative. In G. N. Yannakakis, A. Liapis, K. Penny, V. Volz, F. Khosmood, & P. Lopes (Eds.), FDG '20: International Conference on the Foundations of Digital Games [12] (ACM International Conference Proceeding Series). Association for Computing Machinery (ACM). https://doi.org/10.1145/3402942.3402949

Thammasan, N., Brouwer, A-M. , Poel, M. , & van Erp, J. (2020). Interpersonal EEG synchrony while listening to a story recorded using consumer-grade EEG devices. In F. D. Davis, R. Riedl, J. vom Brocke, P-M. Léger, A. Randolph, & T. Fischer (Eds.), Information Systems and Neuroscience: NeuroIS Retreat 2019 (pp. 253-259). (Lecture Notes in Information Systems and Organisation; Vol. 32). Springer. https://doi.org/10.1007/978-3-030-28144-1_28

Theodoris, C. , Alachiotis, N., Low, T. M., & Pavlidis, P. (2020). qLD: High-performance Computation of Linkage Disequilibrium on CPU and GPU. In 2020 IEEE 20th International Conference on Bioinformatics and Bioengineering (BIBE) (Proceedings IEEE International Conference on Bioinformatics and Bioengineering (BIBE); Vol. 2020). IEEE. https://doi.org/10.1109/BIBE50027.2020.00019

Theodorus, A. , Nauta, M. , & Seifert, C. (2020). Evaluating CNN interpretability on sketch classification. In W. Osten, D. Nikolaev, & J. Zhou (Eds.), 12th International Conference on Machine Vision, ICMV 2019 [114331Q] (Proceedings of SPIE - The International Society for Optical Engineering; Vol. 11433). SPIE Press. https://doi.org/10.1117/12.2559536

Toet, A. , & van Erp, J. B. F. (2020). The EmojiGrid as a Rating Tool for the Affective Appraisal of Touch. In I. Nisky, J. Hartcher-O’Brien, M. Wiertlewski, & J. Smeets (Eds.), EuroHaptics 2020: Haptics: Science, Technology, Applications: 12th International Conference, EuroHaptics 2020, Leiden, The Netherlands, September 6–9, 2020, Proceedings (pp. 3-11). (Lecture notes in computer science; Vol. 12272). Springer. https://doi.org/10.1007/978-3-030-58147-3

Toet, A., Mioch, T., Gunkel, S. N. B. , Sallaberry, C. , van Erp, J. B. F., & Niamut, O. (2020). Holistic Quality Assessment of Mediated Immersive Multisensory Social Communication. In Virtual Reality and Augmented Reality: 17th EuroVR International Conference, EuroVR 2020, Valencia, Spain, November 25–27, 2020, Proceedings (pp. 209-215). (Lecture Notes in Computer Science; Vol. 12499). Springer. https://doi.org/10.1007/978-3-030-62655-6_13

Tomassetti, F. , & Zaytsev, V. (2020). Reflections on the Lack of Adoption of Domain Specific Languages. In L. Burgueño, & L. M. Kristensen (Eds.), STAF Workshop Proceedings (pp. 85-94). [5] (CEUR Workshop Proceedings; Vol. 2707). CEUR. http://ceur-ws.org/Vol-2707/oopslepaper5.pdf

Toro-Betancur, V. , Bayhan, S., Gawlowicz, P., & Di Francesco, M. (2020). CTC-CEM: Low-Latency Cross-Technology Channel Establishment with Multiple Nodes. In 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM) https://doi.org/10.1109/WoWMoM49955.2020.00032


Velasco, C. , Nijholt, A., Spence, C., Narumi, T., Motoki, K., Huisman, G., & Obrist, M. (2020). Multisensory Approaches to Human-Food Interaction. In ICMI 2020 - Proceedings of the 2020 International Conference on Multimodal Interaction (pp. 878-880). ACM Publishing. https://doi.org/10.1145/3382507.3419749

Velner, E., Boersma, P., & de Graaf , M. (2020). Intonation in Robot Speech: Does it Work the Same as with People? In HRI '20: Proceedings of the 2020 ACM/IEEE International Conference on Human-Robot Interaction (pp. 569-578). ACM Publishing. https://doi.org/10.1145/3319502.3374801

Visscher, A. , Kolkmeier, J. , Langener, S. , & van Delden, R. W. (2020). ANIM3: ANIMated ANIMals as A Numbing Immersive Mechanic. In CHI PLAY 2020 - Extended Abstracts of the 2020 Annual Symposium on Computer-Human Interaction in Play (pp. 393-397) https://doi.org/10.1145/3383668.3419870

Wabeke, T., Moura, G. C. M., Franken, N. , & Hesselman, C. (2020). Counterfighting Counterfeit: Detecting and Taking down Fraudulent Webshops at a ccTLD. In A. Sperotto, A. Dainotti, & B. Stiller (Eds.), Passive and Active Measurement - 21st International Conference, PAM 2020, Proceedings (pp. 158-174). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12048 LNCS). Springer Singapore. https://doi.org/10.1007/978-3-030-44081-7_10

Wan, G., Izhikevich, L., Adrian, D., Yoshioka, K. , Holz, R., Rossow, C., & Durumeric, Z. (2020). On the origin of scanning: the impact of location on Internet-wide scans. In IMC '20: Proceedings of the ACM Internet Measurement Conference (pp. 661-679). ACM SIGCOMM. https://doi.org/10.1145/3419394.3424214

Wang, C., Tang, Y., Liang, P. , Daneva, M. , & van Sinderen, M. (2020). What industry wants from requirements engineers in China? An exploratory and comparative study on RE job ads. In ESEM '20: Proceedings of the 14th ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) [3410672] (International Symposium on Empirical Software Engineering and Measurement). ACM Press. https://doi.org/10.1145/3382494.3410672

Wang, W. , Seraj, F. , & Havinga, P. J. M. (2020). A sound-based crowd activity recognition with neural network based regression models. In PETRA '20: The 13th PErvasive Technologies Related to Assistive Environments Conference (pp. 126-133). [18] ACM SigCHI. https://doi.org/10.1145/3389189.3389196

Wang, W. , Seraj, F. , & Havinga, P. J. M. (2020). k-SpecNET: Localization and classification of indoor superimposed sound for acoustic sensor networks. In 2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) (pp. 1). IEEE. https://doi.org/10.1109/PerComWorkshops48775.2020.9156174


Wang, W. , Seraj, F. , Meratnia, N. , & Havinga, P. J. M. (2020). Speaker Counting Model based on Transfer Learning from SincNet Bottleneck Layer. In 2020 IEEE International Conference on Pervasive Computing and Communications (PerCom) (pp. 1). [9127390] IEEE. https://doi.org/10.1109/PerCom45495.2020.9127390

Weller, M., Classen, J., Ullrich, F., Waßmann, D. , & Tews, E. (2020). Lost and found: Stopping bluetooth finders from leaking private information. In WiSec 2020 - Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (pp. 184-194). Association for Computing Machinery (ACM). https://doi.org/10.1145/3395351.3399422

Yazdani, R. , van der Toorn, O. , & Sperotto, A. (2020). A Case of Identity: Detection of Suspicious IDN Homograph Domains Using Active DNS Measurements. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS & PW) (pp. 559-564). IEEE. https://doi.org/10.1109/EuroSPW51379.2020.00082

Yeleshetty, D. , Spreeuwers, L., & Li, Y. (2020). 3D Face Recognition for Cows. In A. Bromme, A. Dantcheva, C. Rathgeb, C. Busch, K. Raja, & A. Uhl (Eds.), BIOSIG 2020 - Proceedings of the 19th International Conference of the Biometrics Special Interest Group [9211005] (Proceedings of the International Conference of the Biometrics Special Interest Group, BIOSIG; Vol. 2020). IEEE. https://ieeexplore.ieee.org/document/9211005

Yu, W., Akinlolu, O., Sander, Y. , Huang, Y., & Garcia-Ortiz, A. (2020). SATA: An intelligent security aware task allocation for multihop wireless networks. In 2020 9th International Conference on Modern Circuits and Systems Technologies, MOCAST 2020 https://doi.org/10.1109/MOCAST49295.2020.9200239

Yu, W., Najafi, A., Nevarez, Y. , Huang, Y., & Garcia-Ortiz, A. (2020). TAAC: Task Allocation Meets Approximate Computing for Internet of Things. In 2020 IEEE International Symposium on Circuits and Systems (ISCAS) IEEE. https://doi.org/10.1109/ISCAS45731.2020.9180895

Zaytsev, V. (2020). Software Language Engineers' Worst Nightmare. In R. Lämmel, L. Tratt, & J. De Lara (Eds.), Proceedings of the 13th International Conference on Software Language Engineering (13th ed., pp. 72-85). ACM Publishing. https://doi.org/10.1145/3426425.3426933

Zubow, A. , Bayhan, S., Gawlowicz, P., & Dressler, F. (2020). DeepTxFinder: Multiple Transmitter Localization by Deep Learning in Crowdsourced Spectrum Sensing. In 2020 29th International Conference on Computer Communications and Networks (ICCCN) https://doi.org/10.1109/ICCCN49398.2020.9209727

de Vos, P., Kirchhoff, M. , & Ziener, D. (2020). A Complete Open Source Design Flow for Gowin FPGAs. In 2020 International Conference on Field-Programmable Technology (ICFPT) (Proceedings - 2020 International Conference on Field-Programmable Technology, ICFPT 2020; Vol. 2020). IEEE.

de Vries, R. A. J., Keizers, G. H. J., van Arum, S. R. , Haarman, J. A. M. , Klaassen, R. , van Delden, R. W. , van Beijnum, B-J. F. , & van den Boer, J. H. W. (2020). Multimodal Interactive Dining with the Sensory Interactive Table: Two Use Cases. In ICMI '20 Companion: Companion Publication of the 2020 International Conference on Multimodal Interaction ACM Press. https://doi.org/10.1145/3395035.3425654

de Vries, W. B., Aljammaz, S. , & van Rijswijk - Deij, R. M. (2020). Global-Scale Anycast Network Management with Verfploeter. In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020) [9110449] (IEEE/IFIP Network Operations and Management Symposium (NOMS); Vol. 2020). IEEE. https://doi.org/10.1109/NOMS47738.2020.9110449

ter Stal, S. , Catala, A. , Theune, M. , & Reidsma, D. (2020). Designing a smart toy interactive setting for creating stories: From free play to story structure and reflection support. In A. Brooks, & E. I. Brooks (Eds.), Interactivity, Game Creation, Design, Learning, and Innovation: 8th EAI International Conference, ArtsIT 2019, and 4th EAI International Conference, DLI 2019, Aalborg, Denmark, November 6–8, 2019, Proceedings (pp. 601-610). (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; Vol. 328 LNICST). Springer Singapore. https://doi.org/10.1007/978-3-030-53294-9_44

van 't Klooster, J-W. , Giebels, E. , Slijkhuis, P. J. H. , Langener, S. , Nijen Es, L. , Beerlage-de Jong, N. , & van Gemert-Pijnen, L. (2020). Research on the road using the ExperiVan. In Supporting Health by Technology: Supporting Health by Technology International Conference 11-6-2020: Abstract book (pp. 44-44). University of Twente.

van Beers, J. J. , Stuldreher, I. V. , Thammasan, N., & Brouwer, A-M. (2020). A Comparison between Laboratory and Wearable Sensors in the Context of Physiological Synchrony. In K. Truong, D. Heylen, & M. Czerwinski (Eds.), ICMI '20 - Proceedings of the 2020 International Conference on Multimodal Interaction (pp. 604-608). Association for Computing Machinery (ACM). https://doi.org/10.1145/3382507.3418837

van Delden, R. W., Bergsma, S., Vogel, K. , Postma, D. B. W. , & Reidsma, D. (2020). VR4VRT: Virtual Reality for Virtual Rowing Training. In CHI PLAY 2020 - Extended Abstracts of the 2020 Annual Symposium on Computer-Human Interaction in Play (pp. 388-392) https://doi.org/10.1145/3383668.3419865

van Delden, R. W. , Plass - Oude Bos, D., de With, V., Vogel, K. , Klaassen, R., Zwart, N., Faber, J., Thio, B. , & van der Kamp, M. R. (2020). SpiroPlay, a Suite of Breathing Games for Spirometry by Kids & Experts. In CHI PLAY 2020 - Proceedings of the Annual Symposium on Computer-Human Interaction in Play (pp. 400-413). (CHI PLAY 2020 - Proceedings of the Annual Symposium on Computer-Human Interaction in Play). ACM Publishing. https://doi.org/10.1145/3410404.3414223

van Ede, T. S. , Bortolameotti, R. , Continella, A., Ren, J., Dubois, D. J., Lindorfer, M., Choffnes, D. , van Steen, M. , & Peter, A. (2020). FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic. In Network and Distributed System Security Symposium (NDSS) (27 ed.). Internet Society. https://doi.org/10.14722/ndss.2020.24412

van Huizen, J. C. , Huisman, M. , Lathouwers, S. A. M. , Schaafstal, A. M. , & Stoelinga, M. I. A. (2020). Alice and Eve: a celebration of women in computer science. In J. van der Veen, N. van Hattum-Janssen, H-M. Järvinen, T. de Laet, & I. ten Dam (Eds.), Engaging, Engineering, Education: Book of Abstracts, SEFI 48th Annual Conference University of Twente (online), 20-24 September, 2020 University of Twente.

van Sinderen, M. J. , Engelsman, W. , Wieringa, R. J., Gordijn, J., & Haaker, T. (2020). Transforming e3value models into ArchiMate diagrams. In 2020 IEEE 24th International Enterprise Distributed Object Computing Conference (EDOC) (pp. 11-20). IEEE. https://doi.org/10.1109/EDOC49727.2020.00012

van Stegeren, J. , & Theune, M. (Accepted/In press). Fantastic strings and where to find them: The quest for high-quality video game text corpora. In Proceedings of the 12th Intelligent Narrative Technologies (INT) workshop CEUR.

van Waterschoot, J., Hendrickx, I., Khan, A., Klabbers, E., de Korte, M., Strik, H., Cucchiarini, C. , & Theune, M. (2020). BLISS: An agent for collecting spoken dialogue data about health and well-being. In N. Calzolari, F. Bechet, P. Blache, K. Choukri, C. Cieri, T. Declerck, S. Goggi, H. Isahara, B. Maegaard, J. Mariani, H. Mazo, A. Moreno, J. Odijk, & S. Piperidis (Eds.), Proceedings of the12th International Conference on Language Resources and Evaluation (LREC 2020) (pp. 449-458). European Language Resources Association (ELRA).

van den Brink, A. B. , & Bekooij, M. J. G. (2020). Conflict-Free Vectorized In-order In-place Radix-r Belief Propagation Polar Code Decoder Algorithm. In ICCBN '20: Proceedings of the 2020 8th International Conference on Communications and Broadband Networking (pp. 18-23). (International Conference Proceedings Series). https://doi.org/10.1145/3390525.3390539

van der Toorn, O. , van Rijswijk-Deij, R., Fiebig, T., Lindorfer, M. , & Sperotto, A. (2020). TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) [9229819] IEEE. https://doi.org/10.1109/EuroSPW51379.2020.00080

Digital or Visual Products

Editorial



Cuadrado, J. S. , & Rensink, A. (2020). Special section on ICMT at STAF 2018. Software and systems modeling, 19(2), 399-400. https://doi.org/10.1007/s10270-020-00775-9

Fehnker, A., & Garavel, H. (2020). Preface. Electronic Proceedings in Theoretical Computer Science, EPTCS, 316. http://eptcs.web.cse.unsw.edu.au/content.cgi?MARS2020#EPTCS316.0

Holz, R., Mellia, M., Bonaventure, O., Haddadi, H., Caesar, M., Gorinsky, S., Antichi, G., Camp, J., Claffy, K., Raman, B. , Sperotto, A., Vianna, A., & Uhlig, S. (2020). Update on ACM SIGCOMM CCR reviewing process: Towards a more open review process. Computer communication review, 50(3), 55-56. https://doi.org/10.1145/3411740.3411748

Misa, C., Guse, D., Hohlfeld, O., Durairajan, R. , Sperotto, A., Dainotti, A., & Rejaie, R. (2020). Lessons learned organizing the PAM 2020 virtual conference. Computer communication review, 50(3), 46-54. https://doi.org/10.1145/3411740.3411747

Foreword/postscript


Castillo, P. A., Laredo, J. L. J., Vega, F. F. D., Iacca, G. , Bucur, D., Smith, S., Vallejo, M., Mora, A., Sánchez, P. G., Tonda, A. P., Guervós, J. J. M., Cotta, C., Fernández, P., Machado, P., & Banzhaf, W. (2020). Preface. In Applications of Evolutionary Computation (pp. V-VI). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12104).

Uhl, A., Busch, C., Marcel, S. , & Veldhuis, R. (2020). Preface. In A. Uhl, C. Busch, S. Marcel, & R. Veldhuis (Eds.), Handbook of Vascular Biometrics (pp. ix-xiv). (Advances in Computer Vision and Pattern Recognition). Springer. https://doi.org/10.7591/9780801458286-001

Literature review

Other


Li, J. J., & Planting, J. (2020). How Culture and Presence of a Robot Affect Teachers’ Use of Touch with Autistic Children. 15th Annual ACM/IEEE International Conference on Human-Robot Interaction, HRI 2020 (Canceled), Cambridge, United Kingdom.

Paper


Akiwate, G. , Jonker, M. , Sommese, R., Foster, I., Voelker, G. M., Savage, S., & Claffy, K. (2020). Unresolved Issues: Prevalence, Persistence, and Perils of Lame Delegations. 281-294. Paper presented at ACM Internet Measurement Conference, IMC 2020, . https://doi.org/10.1145/3419394.3423623

Beenhakker, L. , Salim, F. , Postma, D. , van Delden, R. , Reidsma, D. , & van Beijnum, B-J. (2020). How Good is Good Enough? The Impact of Errors in Single Person Action Classification on the Modeling of Group Interactions in Volleyball. 278. Paper presented at 22nd ACM International Conference on Multimodal Interaction, ICMI 2020, Virtual, Online, Netherlands. https://doi.org/10.1145/3382507.3418846

Bertholdo, L. M. , Ceron, J. M., Granville, L. Z., Moura, G. C. M. , Hesselman, C. , & van Rijswijk-Deij, R. (2020). BGP Anycast Tuner: Intuitive Route Management for Anycast Services. Paper presented at 16th International Conference on Network and Service Management, Izmir, Turkey.


Choi, K. N., Kolamunna, H., Thilakarathna, K., Seneviratne, S. , Holz, R., Hassan, M., & Zomaya, A. (2020). Passive Packet Sniffing Tools for Enabling Wireless Situational Awareness. Paper presented at Cyber Defence Next Generation Technology & Science Conference 2020 (Postponed), Brisbane, Australia.

Huizing, G. H. , Klaassen, R. , & Heylen, D. K. J. (2020). Multi-Perspective Persuasion by a Council of Virtual Coaches. Paper presented at 8th International Workshop on Behavior Change Support Systems, BCSS 2020, Aalborg, Denmark. http://ceur-ws.org/Vol-2662/BCSS2020_paper2.pdf

Jan, T., Trienschnigg, D. , Seifert, C. , & Hiemstra, D. (2020). Comparing Rule-based, Feature-based and Deep Neural Methods for De-identification of Dutch Medical Records. Paper presented at ACM Health Search and Data Mining Workshop, HSDM 2020, Houston, United States.

Kamilaris, A., Engelbrecht, A. , Pitsillides, A., & Prenafeta Boldu, F. (2020). Transfer of Manure from Livestock Farms to Crop Fields as Fertilizer using an Ant Inspired Approach. 139-146. Paper presented at XXIVth ISPRS Congress 2020, Nice, France. https://doi.org/10.5194/isprs-Annals-V-4-2020-139-2020


Landoni, M. , Huibers, T. W. C., Murgia, E., Aliannejadi, M., & Pera, M. S. (Accepted/In press). Somehwere over the Rainbow: Exploring the Sense of Relevance in Children. Paper presented at 32nd European Conference on Cognitive Ergonomics, ECCE 2021, Siena, Italy.

Legoy, V., Caselli, M. , Seifert, C. , & Peter, A. (2020). Automated Retrieval of ATT&CK Tactics and Techniques for Cyber Threat Reports. Paper presented at 1st Cyber Threat Intelligence Symposium, CTI 2020, . https://arxiv.org/abs/2004.14322

Li, J. , Davison, D. , Schadenberg, B. , Chevalier, P., Alcorn, A., Williams, A., Petrovic, S., Dimitrijevic, S. B., Shen, J., Pellicano, L. , & Evers, V. (2020). Usability of a Robot's Realistic Facial Expressions and Peripherals in Autistic Children's Therapy. Paper presented at 2nd Workshop on Social Robots in Therapy and Care 2019, Daegu, Korea, Republic of.

Liu, S., van der Lee, T., Yaman, A. , Atashgahi, Z., Ferraro, D., Sokar, G. A. Z. N., Pechenizkiy, M. , & Mocanu, D. C. (2020). Topological Insights into Sparse Neural Networks. Paper presented at European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases, ECML-PKDD 2020, .

Lusi, B. , van Lotringen, C. M. , Klaassen, R. , Ludden, G. D. S. , & Noordzij, M. L. (2020). Design for compassion: designing robots for e-mental healthcare. Paper presented at 1st International Workshop on Designerly HRI Knowledge 2020, . http://hridesign.eu/assets/pdf/Lusi%20et%20al.pdf

Mader, A. H. , Fehnker, A. , & Dertien, E. C. (2020). Tinkering in Informatics as Teaching Method. 450-457. Paper presented at 12th International Conference on Computer Supported Education, CSEDU 2020, . https://doi.org/10.5220/0009467304500457

Provoost, J. C. , Wismans, L. J. J., van der Drift, S. J. , van Keulen, M. , & Kamilaris, A. (Accepted/In press). Short Term Prediction of Parking Area states Using Real Time Data and Machine Learning Techniques. Paper presented at 99th Transportation Research Board (TRB) Annual Meeting 2020, Washington, United States. https://annualmeeting.mytrb.org/OnlineProgramArchive/Details/13689

Redini, N., Machiry, A., Wang, R., Spensky, C. , Continella, A., Shoshitaishvili, Y., Kruegel, C., & Vigna, G. (2020). Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale. Paper presented at Black Hat Asia, Singapore.

Reijnders, V. M. J. J. , Gerards, M. E. T. , & Hurink, J. L. (2020). A Hybrid Pricing Mechanism for Joint System Optimization and Social Acceptance. Paper presented at 6th International Conference on New Business Models, NBM 2021, Online Conference, Tunisia.

Sokar, G. A. Z. N. , Mocanu, D. C., & Pechenizkiy, M. (Accepted/In press). Self-Attention Meta-Learner for Continual Learning. Paper presented at 20th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2021, Virtual Event, United Kingdom.

Stanciu, V-D. , van Steen, M., Dobre, C. , & Peter, A. (Accepted/In press). k-Anonymous Crowd Flow Analytics. Paper presented at 17th EAI International Conference on Mobile and Ubiquitous Systems:
Computing, Networking and Services, . https://doi.org/10.1145/3448891.3448903

Ullah, I. , Meratnia, N. , & Havinga, P. J. M. (2020). Entropy as a Service: A Lightweight Random Number Generator for Decentralized IoT Applications. Paper presented at 2020 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2020, Austin, United States. https://doi.org/10.1109/PerComWorkshops48775.2020.9156205

Working paper



Bastiaansen, H. J. M., Nieuwenhuis, C. H. M., Zomer, G. , Piest, J. P. S. , van Sinderen, M., Dalmolen, S., & Hofman, W. J. (2020). The logistics data sharing infrastructure: whitepaper August 2020. TKI Dinalog.

Bertholdo, L. M. , Ceron, J. M. , Vries, W. B. D., Schmitt, R. D. O., Granville, L. Z. , Rijswijk-Deij, R. V. , & Pras, A. (2020). Tangled: A Cooperative Anycast Testbed. ArXiv. https://arxiv.org/abs/2008.12881



Dross, C., Furia, C. A. , Huisman, M., Monahan, R., & Müller, P. (2020). VerifyThis 2019: A Program Verification Competition (Extended Report). arXiv.org.






2019

Article (contribution to journal)



Alcorn, A. M., Ainger, E., Charisi, V., Mantinioti, S., Petrovic, S. , Schadenberg, B. R., Tavassoli, T., & Pellicano, E. (2019). Educators' Views on Using Humanoid Robots With Autistic Learners in Special Education Settings in England. Frontiers in robotics and AI, 1-15. https://doi.org/10.3389/frobt.2019.00107


Araque, O. , Gatti, L., Staiano, J., & Guerini, M. (2019). DepecheMood++: a Bilingual Emotion Lexicon Built Through Simple Yet Powerful Techniques. IEEE transactions on affective computing. https://doi.org/10.1109/TAFFC.2019.2934444

Bajpai, V., Kellerer, W., Smaragdakis, G., Brunstrom, A. , Pras, A., Wählisch, M., Feldmann, A., Schulzrinne, H., & Wehrle, K. (2019). The dagstuhl beginners guide to reproducibility for experimental networking research. Computer communication review, 49(1), 24-30. https://doi.org/10.1145/3314212.3314217



Bloemen, V., Duret-Lutz, A. , & van de Pol, J. (2019). Model checking with generalized Rabin and Fin-less automata. International journal on software tools for technology transfer, 21(3), 307-324. https://doi.org/10.1007/s10009-019-00508-4


Boer, L., Bischoff, E., van der Heijden, M. , Lucas, P. , Akkermans, R., Vercoulen, J., Heijdra, Y., Assendelft, W., & Schermer, T. (2019). A Smart Mobile Health Tool Versus a Paper Action Plan to Support Self-Management of Chronic Obstructive Pulmonary Disease Exacerbations: Randomized Controlled Trial. JMIR mHealth and uHealth, 7(10), [e14408]. https://doi.org/10.2196/14408


Brouwer, A. M., Hogervorst, M. A. , van Erp, J. B. F., Grootjen, M., van Dam, E., & Zandstra, E. H. (2019). Measuring cooking experience implicitly and explicitly: Physiology, facial expression and subjective ratings. Food quality and preference, 78, [103726]. https://doi.org/10.1016/j.foodqual.2019.103726


Budde, C. E., D'Argenio, P. R. , & Hartmanns, A. (2019). Automated compositional importance splitting. Science of computer programming, 174, 90 - 108. https://doi.org/10.1016/j.scico.2019.01.006

Bueno, M., Hommersom, A. , Lucas, P. J. F., & Janzing, J. (2019). A probabilistic framework for predicting disease dynamics: a case study of psychotic depression. Journal of biomedical informatics, 95, [103232]. https://doi.org/10.1016/j.jbi.2019.103232


Burgueño, L., Ciccozzi, F., Famelis, M., Kappel, G., Lambers, L., Mosser, S., Paige, R. F., Pierantonio, A. , Rensink, A., Salay, R., Taentzer, G., Vallecillo, A., & Wimmer, M. (2019). Contents for a Model-Based Software Engineering Body of Knowledge. Software and systems modeling, 18(6), 3193-3205. https://doi.org/10.1007/s10270-019-00746-9

Cauteruccio, F., Fortino, G., Guerrieri, A., Liotta, A. , Mocanu, D. C., Perra, C., Terracina, G., & Torres Vega, M. (2019). Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance. Information Fusion, 52, 13-30. https://doi.org/10.1016/j.inffus.2018.11.010

Ceron, J. M., Steding-Jessen, K., Hoepers, C., Granville, L. Z., & Margi, C. B. (2019). Improving IoT Botnet Investigation Using an Adaptive Network Layer. Sensors (Switzerland), 19(3), [727]. https://doi.org/10.3390/s19030727



Fujita, S. , Li, R., & Wang, G. (2019). Decomposing edge-coloured graphs under colour degree constraints. Combinatorics Probability and Computing, 28(5), 755-767. https://doi.org/10.1017/S0963548319000014

Gerhold, M. , Hartmanns, A. , & Stoelinga, M. (2019). Model-based testing of stochastically timed systems. Innovations in systems and software engineering, 15(3-4), 207-233. https://doi.org/10.1007/s11334-019-00349-z


Hahn, E. M., Hashemi, V. , Hermanns, H., Lahijanian, M., & Turrini, A. (2019). Interval Markov Decision Processes with Multiple Objectives: From Robust Strategies to Pareto Curves. ACM transactions on modeling and computer simulation, 29(4), [27]. https://doi.org/10.1145/3309683



Huggins, J. E., Guger, C., Aarnoutse, E., Allison, B., Anderson, C. W., Bedrick, S., Besio, W., Chavarriaga, R., Collinger, J. L., Do, A. H., Herff, C., Hohmann, M., Kinsella, M., Lee, K., Lotte, F., Müller-Putz, G. , Nijholt, A., Pels, E., Peters, B., ... Zander, T. (2019). Workshops of the seventh international brain-computer interface meeting: not getting lost in translation. Brain-Computer Interfaces, 6(3), 71-101. https://doi.org/10.1080/2326263X.2019.1697163

Ionita, D. , Wieringa, R., Gordijn, J., & Yesuf, A. S. (2019). Quantitative, Value-driven Risk Analysis of e-Services. Journal of Information Systems, 33(3), 45–60. https://doi.org/10.2308/isys-52150


Kaneko, D., Hogervorst, M., Toet, A. , van Erp, J. B. F., Kallen, V., & Brouwer, A. M. (2019). Explicit and implicit responses to tasting drinks associated with different tasting experiences. Sensors (Switzerland), 19(20), [4397]. https://doi.org/10.3390/s19204397




Li, F., Ye, Q., & Rada, J. (2019). The Augmented Zagreb Indices of Fluoranthene-Type Benzenoid Systems. Bulletin of the Malaysian Mathematical Sciences Society, 42(3), 1119-1141. https://doi.org/10.1007/s40840-017-0536-2


Li, J. J., Cuadra, A., Mok, B., Reeves, B., Kaye, J., & Ju, W. (2019). Communicating Dominance in a Nonanthropomorphic Robot Using Locomotion. ACM Transactions on Human-Robot Interaction, 8(1), [4]. https://doi.org/10.1145/3310357



Lutscher, P. M., Weidmann, N. B., Roberts, M. E. , Jonker, M., King, A., & Dainotti, A. (2019). At Home and Abroad: The Use of Denial-of-service Attacks during Elections in Nondemocratic Regimes. Journal of Conflict Resolution, 64(2-3), 373-401. https://doi.org/10.1177/0022002719861676


Meijer, J. , & van de Pol, J. (2019). Sound black-box checking in the LearnLib. Innovations in systems and software engineering, 15(3-4), 267-287. https://doi.org/10.1007/s11334-019-00342-6


Miano, S., Doriguzzi-Corin, R., Risso, F., Siracusa, D. , & Sommese, R. (2019). Introducing smartnics in server-based data plane processing: The ddos mitigation use case. IEEE Access, 7, 107161-107170. [8789414]. https://doi.org/10.1109/ACCESS.2019.2933491


Müller, M., Chung, T., Mislove, A. , & van Rijswijk-Deij, R. (2019). Rolling with Confidence: Managing the Complexity of DNSSEC Operations. IEEE transactions on network and service management, 16(3), 1199-1211. https://doi.org/10.1109/TNSM.2019.2916176








Tinga, A. M., Nyklíček, I. , Jansen, M-P., de Back, T. T., & Louwerse, M. M. (2019). Respiratory Biofeedback Does Not Facilitate Lowering Arousal in Meditation Through Virtual Reality. Applied psychophysiology and biofeedback, 44(1), 51-59. https://doi.org/10.1007/s10484-018-9421-5


Toet, A. , Kaneko, D., de Kruijf, I., Ushiama, S., van Schaik, M. G., Brouwer, A-M., Kallen, V. , & van Erp, J. B. F. (2019). CROCUFID: a cross-cultural food image database for research on food elicited affective responses. Frontiers in psychology, 10, [58]. https://doi.org/10.3389/fpsyg.2019.00058

Toet, A., Van Schaik, M. G. , Kaneko, D. , & van Erp, J. B. F. (2019). Do food cinemagraphs evoke stronger appetitive responses than stills? International Journal of Food Design, 4(1), 63-83. https://doi.org/10.1386/ijfd.4.1.63_1

Unlu, B. , Ozceylan, B., & Baykal, B. (2019). DIVVY: An Efficient Shared Cell Scheduling Method and Algorithm for 6TiSCH-Based IoT Networks. IEEE Transactions on Green Communications and Networking, 3(1), 170-179. [8527560]. https://doi.org/10.1109/TGCN.2018.2879873

Wagner, S., Mendez Fernandez, D., Felderer, M., Vetro, A., Kalinowski, M. , Wieringa, R. J., Pfahl, D., Conte, T., Christiansson, M-T., Greer, D., Lassenius, C., Mannisto, T., Nayebi, M., Oivo, M., Penzenstadler, B., Prikladnicki, R., Ruhe, G., Schekelmann, A., Sen, S., ... Winkler, D. (2019). Status Quo in Requirements Engineering: A Theory and a Global Family of Surveys. ACM Transactions on Software Engineering and Methodology, 28(2), [9]. https://doi.org/10.1145/3306607







Zhang, D., Bošnački, D., van den Brand, M., Huizing, C., Jacobs, B., Kuiper, R., & Wijs, A. (2019). Dependency safety for Java – Implementing and testing failboxes. Science of computer programming, 184, [102316]. https://doi.org/10.1016/j.scico.2019.102316




Book/Film/Article review

Chapter


Baier, C. , Hermanns, H. , & Katoen, J-P. (2019). The 10,000 Facets of MDP Model Checking. In B. Steffen, & G. Woeginger (Eds.), Computing and Software Science: State of the Art and Perspectives (Vol. 10000, pp. 420-451). (Lecture Notes in Computer Science; Vol. 10000). Springer. https://doi.org/10.1007/978-3-319-91908-9_21

Duijvenbode, N. V. , VanDerNagel, J. E. L., & Didden, R. (2019). Alcohol (Mis)Use in Individuals With Mild to Borderline Intellectual Disability. In V. R. Preedy (Ed.), Neuroscience of Alcohol: Mechanisms and Treatment (pp. 307-314). Elsevier. https://doi.org/10.1016/b978-0-12-813125-1.00032-5

Gatti, L., Özbal, G., Guerini, M., Stock, O., & Strapparava, C. (2019). Computer-Supported Human Creativity and Human-Supported Computer Creativity in Language. In T. Veale, & F. A. Cardoso (Eds.), Computational Creativity: The Philosophy and Engineering of Autonomously Creative Systems (pp. 237-254). (Computational Synthesis and Creative Systems). Springer. https://doi.org/10.1007/978-3-319-43610-4_11

Hahn, E. M., Perez, M., Schewe, S., Somenzi, F., Trivedi, A., Trivedi, A., & Wojtczak, D. (2019). Omega-Regular Objectives in Model-Free Reinforcement Learning. In T. Vojnar, & L. Zhang (Eds.), Tools and Algorithms for the Construction and Analysis of Systems: 25th International Conference, TACAS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings (Vol. Part I, pp. 395-412). (Lecture Notes in Computer Science; Vol. 11427). Springer. https://doi.org/10.1007/978-3-030-17462-0_27

Hähnle, R. , & Huisman, M. (2019). Deductive Software Verification: From Pen-and-Paper Proofs to Industrial Tools. In B. Steffen, & G. Woeginger (Eds.), Computing and Software Science : State of the Art and Perspectives (pp. 345-373). (Lecture Notes in Computer Science; Vol. 10000), (Theoretical Computer Science and General Issues). Springer. https://doi.org/10.1007/978-3-319-91908-9_18

Kordon, F., Leuschel, M. , Pol, J. V. D., & Thierry-Mieg, Y. (2019). Software Architecture of Modern Model Checkers. In B. Steffen, & G. Woeginger (Eds.), Computing and Software Science: State of the Art and Perspectives (pp. 393-419). (Lecture Notes in Computer Science; Vol. 10000), (Theoretical Computer Science and General Issues). Springer. https://doi.org/10.1007/978-3-319-91908-9_20

Nijholt, A. (2019). City Residents as Videogame Characters in Smart Urban Environments. In A. Nijholt (Ed.), Making Smart Cities More Playable: Exploring Playable Cities (pp. 355-377). (Gaming Media and Social Effects). Springer. https://doi.org/10.1007/978-981-13-9765-3_16

Nijholt, A. (2019). Introduction: Brain-Computer Interfaces for Artistic Expression. In A. Nijholt (Ed.), Brain Art: Brain-Computer Interfaces for Artistic Expression (pp. 1-29). Springer. https://doi.org/10.1007/978-3-030-14323-7_1

Nijholt, A. (2019). Playful Introduction on “Making Smart Cities More Playable”. In A. Nijholt (Ed.), Making Smart Cities More Playable: Exploring Playable Cities (pp. 1-22). (Gaming Media and Social Effects). Springer. https://doi.org/10.1007/978-981-13-9765-3_1

Nijholt, A., & Chisik, Y. (2019). Animals and the (Playable) City: A Critical Perspective. In ACI'19: Proceedings of the Sixth International Conference on Animal-Computer Interaction: Haifa Israel, November 2019 [19] ACM Publishing. https://doi.org/10.1145/3371049.3371068

Sillitti, A., Anakabe, J. F., Basurko, J., Dam, P., Ferreira, H., Ferreiro, S., Gijsbers, J., He, S., Hegedűs, C., Holenderski, M., Hooghoudt, J-O., Lecuona, I., Leturiondo, U., Marcelis, Q., Moldován, I., Okafor, E. , Rebelo de Sá, C., Romero, R., Sarr, B., ... Zurutuza, U. (2019). Providing Proactiveness: Data Analysis Techniques Portfolios. In M. Albano, E. Jantunen, G. Papa, & U. Zurutuza (Eds.), The MANTIS Book: Cyber Physical System Based Proactive Collaborative Maintenance (River Publishers Series in Automation, Control and Robotics). River Publishers. https://doi.org/10.13052/rp-9788793609846


VanDerNagel, J. E. L., van Duijvenbode, N., & Didden, R. (2019). Assessment of Alcohol Use Disorder and Alcohol‐Related Offending Behaviour. In W. R. Lindsay, L. A. Craig, & D. Griffiths (Eds.), The Wiley Handbook on What Works for Offenders with Intellectual and Developmental Disabilities: An Evidence‐Based Approach to Theory, Assessment, and Treatment Wiley. https://doi.org/10.1002/9781119316268.ch9

de Vries, R. A. J. , Truong, K. P. , Kim, J. , & Evers, V. (2019). “You Can Do It!” - Crowdsourcing Motivational Speech and Text Messages. In Macrotask Crowdsourcing: Engaging the Crowds to Address Complex Problems (pp. 217-231). (Human–Computer Interaction Series). Springer. https://doi.org/10.1007/978-3-030-12334-5_8

van de Pol, J. , & Meijer, J. (2019). Synchronous or Alternating? LTL Black-Box Checking of Mealy Machines by Combining the LearnLib and LTSmin. In T. Margaria, S. Graf, & K. G. Larsen (Eds.), Models, Mindsets, Meta: The What, the How, and the Why Not?: Essays Dedicated to Bernhard Steffen on the Occasion of His 60th Birthday (pp. 417-430). (Lecture Notes in Computer Science; Vol. 11200), (Theoretical Computer Science and General Issues). Springer. https://doi.org/10.1007/978-3-030-22348-9_24

Conference article


Bischoff, E., Boer, L., van der Heijden, M. , Lucas, P. , Akkermans, R., Vercoulen, J., Heijdra, Y., Assendelft, P., & Schermer, T. (2019). A smart mHealth tool versus a paper action plan to support self-management of COPD exacerbations: a randomised controlled trial. European respiratory journal. Supplement, 54(Suppl. 63), [PA2238]. https://doi.org/10.1183/13993003.congress-2019.PA2238

Bogachev, M. I., Pyko, N. S., Pyko, S. A. , Vasenev, A. N. , & Vasenev, A. N. (2019). Service delays in strongly linked network communities. Journal of physics: Conference series, 1352(1), [012006]. https://doi.org/10.1088/1742-6596/1352/1/012006




Mustafa, K. A. A. , Botteghi, N. , Sirmacek, B. , Poel, M. , & Stramigioli, S. (2019). Towards continuous control for mobile robot navigation: A reinforcement learning and slam based approach. International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 42(2/W13), 857-863. https://doi.org/10.5194/isprs-archives-XLII-2-W13-857-2019

Conference contribution


Aldea, A. , Iacob, M-E. , Daneva, M., & Masyhur, L. H. (2019). Multi-criteria and model-based analysis for project selection: An integration of capability-based planning, project portfolio management and enterprise architecture. In 2019 IEEE 23rd International Enterprise Distributed Object Computing Workshop (EDOCW) (pp. 128-135). [8907326] (Proceedings IEEE International Enterprise Distributed Object Computing Workshop (EDOCW); Vol. 23). IEEE. https://doi.org/10.1109/EDOCW.2019.00032

Ali, G. , Pathros, J. , & Kerkhoff, H. G. (2019). IJTAG Compatible Timing Monitor with Robust Self-Calibration for Environmental and Aging Variation. In Proceedings - 2019 IEEE European Test Symposium, ETS 2019 (pp. 1-6). [8791539] (Proceedings of the European Test Workshop (ETS); Vol. 2019). IEEE. https://doi.org/10.1109/ETS.2019.8791539


Allah Bukhsh, Z. , van Sinderen, M. , Sikkel, K. , & Quartel, D. (2019). How to manage and model unstructured business processes: A proposed list of representational requirements. In M. S. Obaidat, & E. Cabello (Eds.), E-Business and Telecommunications: 14th International Joint Conference, ICETE 2017, Revised Selected Paper (pp. 81-103). (Communications in Computer and Information Science; Vol. 990). Springer. https://doi.org/10.1007/978-3-030-11039-0_5

Amparore, E., Berthomieu, B., Ciardo, G., Dal Zilio, S., Gallà, F., Hillah, L. M., Hulin-Hubard, F., Jensen, P. G., Jezequel, L., Kordon, F., Le Botlan, D., Liebke, T. , Meijer, J., Miner, A., Paviot-Adet, E., Srba, J., Thierry-Mieg, Y. , van Dijk, T., & Wolf, K. (2019). Presentation of the 9th Edition of the Model Checking Contest. In F. Kordon, M. Huisman, B. Steffen, & D. Beyer (Eds.), Tools and Algorithms for the Construction and Analysis of Systems - 25 Years of TACAS: TOOLympics, Held as Part of ETAPS 2019, Proceedings (pp. 50-68). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11429 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-030-17502-3_4

Amrani, M., Blouin, D., Heinrich, R. , Rensink, A., Vangheluwe, H., & Wortmann, A. (2019). Towards a formal specification of multi-paradigm modelling. In L. Burgueño, A. Pretschner, S. Voss, M. Chaudron, J. Kienzle, M. Völter, S. Gérard, M. Zahedi, E. Bousse, A. Rensink, F. Polack, G. Engels, & G. Kappel (Eds.), Proceedings - 2019 ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems Companion, MODELS-C 2019 (pp. 419-424). [8904740] IEEE. https://doi.org/10.1109/MODELS-C.2019.00067

André, É. , Bloemen, V. , Petrucci, L. , & van de Pol, J. (2019). Minimal-time synthesis for parametric timed automata. In L. Zhang, & T. Vojnar (Eds.), Tools and Algorithms for the Construction and Analysis of Systems: 25th International Conference, TACAS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Proceedings (pp. 211-228). (Lecture Notes in Computer Science; Vol. 11428), (Theoretical Computer Science and General Issues). Springer. https://doi.org/10.1007/978-3-030-17465-1_12

André, É., Lime, D., Ramparison, M. , & Stoelinga, M. (2019). Parametric Analyses of Attack-Fault Trees. In Proceedings - 2019 19th International Conference on Application of Concurrency to System Design, ACSD 2019 (pp. 33-42). (Proceedings - International Conference on Application of Concurrency to System Design, ACSD; Vol. 2019). IEEE. https://doi.org/10.1109/ACSD.2019.00008

Asghar, S. M. A., Van Loo, R., Kruiper, T. , & Ziener, D. (2019). Optimizing FPGA-Based Streaming Applications for Throughput Using Pipelining. In Proceedings - 2019 International Conference on Field-Programmable Technology, ICFPT 2019 (pp. 351-354). [8977878] (Proceedings - 2019 International Conference on Field-Programmable Technology, ICFPT 2019; Vol. 2019-December). IEEE. https://doi.org/10.1109/ICFPT47387.2019.00065


Bagave, P., Linssen, J., Teeuw, W. , Klein Brinke, J. , & Meratnia, N. (2019). Channel State Information (CSI) analysis for Predictive Maintenance using Convolutional Neural Network (CNN). In DATA'19: Proceedings of the 2nd Workshop on Data Acquisition To Analysis (pp. 51-56). https://doi.org/10.1145/3359427.3361917

Bartocci, E., Beyer, D., Black, P. E., Fedyukovich, G., Garavel, H. , Hartmanns, A. , Huisman, M., Kordon, F., Nagele, J., Sighireanu, M., Steffen, B., Suda, M., Sutcliffe, G., Weber, T., & Yamada, A. (2019). TOOLympics 2019: An Overview of Competitions in Formal Methods. In D. Beyer, M. Huisman, F. Kordon, & B. Steffen (Eds.), Tools and Algorithms for the Construction and Analysis of Systems - 25 Years of TACAS (pp. 3-24). (Lecture Notes in Computer Science; Vol. 11429). Springer. https://doi.org/10.1007/978-3-030-17502-3_1

Bemthuis, R. (2019). Business Logic for Resilient Supply Chain Logistics. In 2019 IEEE 23rd International Enterprise Distributed Object Computing Workshop (EDOCW) (pp. 190-195). [8907296] (IEEE International Enterprise Distributed Object Computing Workshop (EDOCW); Vol. 23). IEEE. https://doi.org/10.1109/EDOCW.2019.00041

Bemthuis, R. H. , Koot, M. , Mes, M. R. K. , Bukhsh, F. A. , Iacob, M-E. , & Meratnia, N. (2019). An Agent-Based Process Mining Architecture for Emergent Behavior Analysis. In 2019 IEEE 23rd International Enterprise Distributed Object Computing Workshop (EDOCW) (pp. 54-64). [8907303] (Proceedings IEEE International Enterprise Distributed Object Computing Workshop (EDOCW); Vol. 23). IEEE. https://doi.org/10.1109/EDOCW.2019.00022

Bode, M. (2019). Towards a formal description language for digital IT consulting products in decentralized IT consulting firms. In Proceedings 2019 IEEE 23rd International Enterprise Distributed Object Computing Workshop, EDOCW 2019 (pp. 168-173). [8907321] (IEEE International Enterprise Distributed Object Computing Conference workshops). IEEE. https://doi.org/10.1109/EDOCW.2019.00037

Bolscher, R. , & Daneva, M. (2019). Designing software architecture to support continuous delivery and DevOps: A systematic literature review. In M. van Sinderen, L. Maciaszek, & L. Maciaszek (Eds.), ICSOFT 2019 - Proceedings of the 14th International Conference on Software Technologies (pp. 27-39). SCITEPRESS.

Bortolameotti, R. , van Ede, T. S. , Everts, M. H. , Jonker, W. , Hartel, P. H. , Peter, A. , & Continella, A. (2019). Victim-Aware Adaptive Covert Channels. In S. Chen, K-K. R. Choo, X. Fu, W. Lou, & A. Mohaisen (Eds.), Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I (pp. 450-471). (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; Vol. 304 LNICST). https://doi.org/10.1007/978-3-030-37228-6_22

Broekens, J., & Dai, L. (2019). A TDRL Model for the Emotion of Regret. In 2019 8th International Conference on Affective Computing and Intelligent Interaction, ACII 2019 [8925441] IEEE. https://doi.org/10.1109/ACII.2019.8925441

Bukhsh, F. A., Silva, P. D. A., Bukhsh, B. A., & Syed, S. (2019). From Traditional to Technologically Influenced Audit : A Compliance Perspective. In 2018 International Conference on Frontiers of Information Technology (FIT) (pp. 164-169). IEEE. https://doi.org/10.1109/FIT.2018.00036

Butkova, Y. , Hartmanns, A. , & Hermanns, H. (2019). A Modest Approach to Modelling and Checking Markov Automata. In D. Parker, & V. Wolf (Eds.), Proceedings of the 16th International Conference on Quantitative Evaluation of Systems (QEST 2019) (pp. 52-69). (Lecture Notes in Computer Science; Vol. 11785), (Theoretical Computer Science and General Issues). Springer. https://doi.org/10.1007/978-3-030-30281-8_4


Chia, V. , Hartel, P. H., Hum, Q., Ma, S., Piliouras, G., Reijsbergen, D., Van Staalduinen, M., & Szalachowski, P. (2019). Rethinking Blockchain Security: Position Paper. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (pp. 1273-1280). IEEE. https://doi.org/10.1109/Cybermatics_2018.2018.00222

Chromik, J. J. , Remke, A. K. I. , Haverkort, B. R. H. M., & Geist, G. (2019). A Parser for Deep Packet Inspection of IEC-104: A Practical Solution for Industrial Applications. In 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks – Industry Track IEEE. https://doi.org/10.1109/DSN-Industry.2019.00008

Chung, T., Aben, E., Bruijnzeels, T., Chandrasekaran, B., Choffnes, D., Levin, D., Maggs, B., Mislove, A. , van Rijswijk - Deij, R. M., Rula, J., & Sullivan, N. (2019). RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins. In IMC '19: ACM Internet Measurement Conference, Amsterdam Netherlands, October, 2019 (pp. 406-419). Association for Computing Machinery (ACM). https://doi.org/10.1145/3355369.3355596

Corradini, A., Heindel, T., König, B., Nolte, D. , & Rensink, A. (2019). Rewriting Abstract Structures: Materialization Explained Categorically. In A. Simpson, & M. Bojanczyk (Eds.), Foundations of Software Science and Computation Structures: 22nd International Conference, FOSSACS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Proceedings (pp. 169-188). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11425 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-030-17127-8_10

Coutinho, J. C., Moreira, J. M. , & de Sá, C. R. (2019). Mining Frequent Distributions in Time Series. In H. Yin, R. Allmendinger, D. Camacho, P. Tino, A. J. Tallón-Ballesteros, & R. Menezes (Eds.), Intelligent Data Engineering and Automated Learning – IDEAL 2019: 20th International Conference, Manchester, UK, November 14–16, 2019, Proceedings (Vol. II, pp. 271-279). (Lecture Notes in Computer Science; Vol. 11872), (Information Systems and Applications, incl. Internet/Web, and HCI). Springer. https://doi.org/10.1007/978-3-030-33617-2_28

Dai, L., Broekens, J. , & Truong, K. P. (2019). Real-time pain detection in facial expressions for health robotics. In 2019 8th International Conference on Affective Computing and Intelligent Interaction Workshops and Demos (ACIIW) (pp. 277-283). IEEE. https://doi.org/10.1109/ACIIW.2019.8925192

Daneva, M., Berry, D. , Condori-Fernandez, N., Dalpiaz, F., Herrmann, A., Horkoff, J., & Madhavji, N. (2019). Live studies at REFSQ 2019. In P. Spoletini, P. Mäder, D. M. Berry, F. Dalpiaz, & M. Daneva (Eds.), REFSQ-2019 Workshops, Doctoral Symposium, Live Studies Track, and Poster Track: Essen, Germany, March 18th, 2019 (CEUR Workshop Proceedings; Vol. 2376). CEUR. https://dblp1.uni-trier.de/pers/hd/d/Daneva:Maya

Daneva, M., Herrmann, A. , Condori-Fernandez, N. , & Wang, C. (2019). Understanding the most in-demand soft skills in requirements engineering practice: Insights from two focus groups. In Proceedings of EASE 2019 - Evaluation and Assessment in Software Engineering (pp. 284-290). Association for Computing Machinery (ACM). https://doi.org/10.1145/3319008.3319352

Dietz, C., Castro, R. L. , Steinberger, J., Wilczak, C., Antzek, M. , Sperotto, A. , & Pras, A. (2019). IoT-Botnet Detection and Isolation by Access Routers. In F. Idzikowski, A. Kliks, M. Rodziewicz, D. Tuncer, & P. Chemouil (Eds.), 2018 9th International Conference on the Network of the Future, NOF 2018 (pp. 88-95). [8598138] IEEE. https://doi.org/10.1109/NOF.2018.8598138

Dijk, T. V. (2019). A Parity Game Tale of Two Counters. In J. Leroux, & J-F. Raskin (Eds.), Proceedings Tenth International Symposium on Games, Automata, Logics, and Formal Verification, GandALF 2019: Bordeaux, France, 2-3rd September 2019 (pp. 107-122). (Electronic Proceedings in Theoretical Computer Science (EPTCS); Vol. 305). ArXiv. https://doi.org/10.4204/EPTCS.305.8

Dijk, T. V., & Rubbens, B. (2019). Simple Fixpoint Iteration To Solve Parity Games. In J. Leroux, & J-F. Raskin (Eds.), Proceedings Tenth International Symposium on Games, Automata, Logics, and Formal Verification, GandALF 2019: Bordeaux, France, 2-3rd September 2019 (pp. 123-139). (Electronic Proceedings in Theoretical Computer Science (EPTCS); Vol. 305). ArXiv. https://doi.org/10.4204/EPTCS.305.9

Dudzik, B. , Jansen, M-P., Burger, F., Kaptein, F., Broekens, J. , Heylen, D. K. J., Hung, H., Neerincx, M. , & Truong, K. P. (2019). Context in Human Emotion Perception for Automatic Affect Detection: A Survey of Audiovisual Databases. In 2019 8th International Conference on Affective Computing and Intelligent Interaction (ACII) (pp. 206-212). (International Conference on Affective Computing and Intelligent Interaction (ACII); Vol. 2019). IEEE. https://doi.org/10.1109/ACII.2019.8925446

El Hakim, V. S. , & Bekooij, M. J. G. (2019). Reachability Analysis of Hybrid Automata with Clocked Linear Dynamics. In S. Stuijk (Ed.), SCOPES '19 Proceedings of the 22nd International Workshop on Software and Compilers for Embedded Systems (pp. 27-36). ACM Inc.. https://doi.org/10.1145/3323439.3323980

Elhagaly, M., Drvoderic, K., Kippers, R. G. , & Bukhsh, F. A. (2019). Evolution of Compliance Checking in Process Mining Discipline. In 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET) IEEE. https://doi.org/10.1109/ICOMET.2019.8673437

Engelsman, W. , Wieringa, R. J. , van Sinderen, M. J., Gordijn, J., & Haaker, T. (2019). Realizing Traceability from the Business Model to Enterprise Architecture. In G. Guizzardi, F. Gailly, & R. S. Pitangueira Maciel (Eds.), Advances in Conceptual Modeling - ER 2019 Workshops FAIR, MREBA, EmpER, MoBiD, OntoCom, and ER Doctoral Symposium Papers, Salvador, Brazil, November 4–7, 2019, Proceedings: ER 2019 Workshops FAIR, MREBA, EmpER, MoBiD, OntoCom, and ER Doctoral Symposium Papers, Salvador, Brazil, November 4–7, 2019, Proceedings (pp. 37-46). (Lecture Notes in Computer Science; Vol. 11787). Springer. https://doi.org/10.1007/978-3-030-34146-6_4

Ernst, G. , Huisman, M. , Mostowski, W., & Ulbrich, M. (2019). VerifyThis - Verification Competition with a Human Factor. In D. Beyer, M. Huisman, F. Kordon, & B. Steffen (Eds.), Tools and Algorithms for the Construction and Analysis of Systems: 25 Years of TACAS: TOOLympics, Held as Part of ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, Part III (pp. 176-195). (Lecture Notes in Computer Science; Vol. 11429). Springer. https://doi.org/10.1007/978-3-030-17502-3_12

Esquivel-Vargas, H., Caselli, M. , Tews, E. , Bucur, D. , & Peter, A. (2019). BACRank: Ranking building automation and control system components by business continuity impact. In A. Romanovsky, E. Troubitsyna, & F. Bitsch (Eds.), Computer Safety, Reliability, and Security: 38th International Conference, SAFECOMP 2019, Proceedings (pp. 183-199). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11698 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-030-26601-1_13

Fatseas, K. , & Bekooij, M. J. G. (2019). Neural Network Based Multiple Object Tracking for Automotive FMCW Radar. In 2019 International Radar Conference, RADAR 2019 [9078996] IEEE. https://doi.org/10.1109/RADAR41533.2019.171248

Fehnker, A., & de Man, R. (2019). Detecting and Addressing Design Smells in Novice Processing Programs. In B. M. McLaren, R. Reilly, S. Zvacek, & J. Uhomoibhi (Eds.), Computer Supported Education: 10th International Conference, CSEDU 2018, Funchal, Madeira, Portugal, March 15–17, 2018, Revised Selected Papers (pp. 507-531). (Communications in Computer and Information Science; Vol. 1022). Springer. https://doi.org/10.1007/978-3-030-21151-6_24

Ferreira, P. J. S., Magalhães, R. M. C. , Dearo Garcia, K., Cardoso, J. M. P., & Mendes-Moreira, J. (2019). An Efficient Scheme for Prototyping kNN in the Context of Real-Time Human Activity Recognition. In H. Yin, D. Camacho, P. Tino, A. J. Tallón-Ballesteros, & R. Menezes (Eds.), Intelligent Data Engineering and Automated Learning – IDEAL 2019: 20th International Conference, Manchester, UK, November 14–16, 2019, Proceedings, Part I (pp. 486-493). (Lecture Notes in Computer Science; Vol. 11871), (Information Systems and Applications, incl. Internet/Web, and HCI). Springer. https://doi.org/10.1007/978-3-030-33607-3_52

Garcia, K. D. , Poel, M. , Kok, J. N., & de Carvalho, A. C. P. L. F. (2019). Online Clustering for Novelty Detection and Concept Drift in Data Streams. In P. Moura Oliveira, P. Novais, & L. P. Reis (Eds.), Progress in Artificial Intelligence: 19th EPIA Conference on Artificial Intelligence, EPIA 2019, Vila Real, Portugal, September 3–6, 2019, Proceedings (pp. 448-459). (Lecture Notes in Computer Science; Vol. 11805), (Lecture Notes in Artificial Intelligence), (Lecture Notes in Bioinformatics). Springer. https://doi.org/10.1007/978-3-030-30244-3_37

Garcia, K. D., de Faria, E. R. , de Sá, C. R., Mendes-Moreira, J., Aggarwal, C. C., de Carvalho, A. C. P. L. F. , & Kok, J. N. (2019). Ensemble Clustering for Novelty Detection in Data Streams. In P. Kralj Novak, S. Džeroski, & T. Šmuc (Eds.), Discovery Science : 22nd International Conference, DS 2019, Splitm, Croatia, October 28-30, 2019. Proceedings (pp. 460-470). (Lecture Notes in Artificial Intelligence; subseries of Lecture Notes in Computer Science; Vol. 11828 LNAI). Springer. https://doi.org/10.1007/978-3-030-33778-0_34

Gerards, M. E. T. , & Hurink, J. L. (2019). PV Predictions Made Easy: Flexibility Through Simplicity. In Proceedings of the 25th International Conference on Electricity Distribution (CIRED 2019) [1857] (CIRED Conference Proceedings). CIRED. https://www.cired-repository.org/handle/20.500.12455/610

Gillani, S. G. A. , & Kokkeler, A. B. J. (2019). Go Green Radio Astronomy: Approximate Computing Perspective: Opportunities and Challenges: POSTER. In 16th ACM International Conference on Computing Frontiers (pp. 300-301). Association for Computing Machinery (ACM). https://doi.org/10.1145/3310273.3323427

Gillani, S. G. A., Krapukhin, A. , & Kokkeler, A. B. J. (2019). Energy-Efficient Approximate Least Squares Accelerator: A Case Study of Radio Astronomy Calibration Processing. In 16th ACM International Conference on Computing Frontiers (pp. 358-365). Association for Computing Machinery (ACM). https://doi.org/10.1145/3310273.3323161

Gomes Avelino, J. , de Alencar Silva, P. , & Allah Bukhsh, F. (2019). Towards green value network modeling: A case from the agribusiness sector in Brazil. In H. Panetto, C. Debruyne, D. Lewis, M. Hepp, C. A. Ardagna, & R. Meersman (Eds.), On the Move to Meaningful Internet Systems: OTM 2019 Conferences - Confederated International Conferences: CoopIS, ODBASE, C and TC 2019, Rhodes, Greece, October 21–25, 2019, Proceedings (pp. 458-475). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11877 LNCS). Springer Singapore. https://doi.org/10.1007/978-3-030-33246-4_29

Hahn, E. M. , Hartmanns, A., Hensel, C., Klauck, M., Klein, J., Křetínský, J., Parker, D., Quatmann, T., Steinmetz, M. , & Ruijters, E. (2019). The 2019 Comparison of Tools for the Analysis of Quantitative Formal Models: (QComp 2019 Competition Report). In D. Beyer, M. Huisman, F. Kordon, & B. Steffen (Eds.), Tools and Algorithms for the Construction and Analysis of Systems: 25 Years of TACAS: TOOLympics, Held as Part of ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings (Vol. Part III, pp. 69-92). (Lecture Notes in Computer Science; Vol. 11429). Springer. https://doi.org/10.1007/978-3-030-17502-3_5

Haider, F. , Salim, F., Naghashi, V., Yengec Tasdemir, S. B., Tengiz, I., Cengiz, K. , Postma, D. , Van Delden, R. , Reidsma, D. , van Beijnum, B-J., & Luz, S. (2019). Evaluation of dominant and non-dominant hand movements for volleyball action modelling. In ICMI '19: Adjunct of the 2019 International Conference on Multimodal Interaction [8] Association for Computing Machinery (ACM). https://doi.org/10.1145/3351529.3360651

Hartmanns, A. , & Hermanns, H. (2019). A Modest Markov Automata Tutorial. In M. Krötzsch, & D. Stepanova (Eds.), 15th International Reasoning Web Summer School on Explainable Artificial Intelligence (RW 2019) (pp. 250-276). (Lecture Notes in Computer Science; Vol. 11810), (Information Systems and Applications, incl. Internet/Web, and HCI ). Springer. https://doi.org/10.1007/978-3-030-31423-1_8

Hartmanns, A., Klauck, M., Parker, D., Quatmann, T. , & Ruijters, E. J. J. (2019). The Quantitative Verification Benchmark Set. In T. Vojnar, & L. Zhang (Eds.), Proceedings of the 25th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2019) (pp. 344-350). (Lecture Notes in Computer Science; Vol. 11427). Springer. https://doi.org/10.1007/978-3-030-17462-0_20

Herrmann, A., Berry, D. M. , Daneva, M., & Groen, E. C. (2019). Eighth International Workshop on Creativity in Requirements Engineering (CreaRE 2019). In 2019 Joint of International Conference on Requirements Engineering: Foundation for Software Quality Workshops, Doctoral Symposium, Live Studies Track, and Poster Track, REFSQ-JP 2019 (CEUR workshop proceedings; Vol. 2376). CEUR. http://ceur-ws.org/Vol-2376/

Homan, B., Nebiolo, S. , Hoogsteen, G. , Hurink, J. L. , & Smit, G. J. M. (2019). Improving the Degree of Autarky of a 16 House Neighbourhood in the Netherlands: A case study. In 2019 IEEE PES Innovative Smart Grid Technologies Europe: New Businesses for Energy Transition [491] IEEE. https://doi.org/10.1109/ISGTEurope.2019.8905491

Honig, J. J. , Everts, M. H. , & Huisman, M. (2019). Practical Mutation Testing for Smart Contracts. In C. Pérez-Solà, G. Navarro-Arribas, A. Biryukov, & J. García-Alfaro (Eds.), Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26-27, 2019, Proceedings (pp. 289-303). (Lecture Notes in Computer Science; Vol. 11737). Springer. https://doi.org/10.1007/978-3-030-31500-9_19


Hoogsteen, G. , Smit, G. J. M. , & Hurink, J. L. (2019). DEMKit: a Decentralized Energy Management Simulation and Demonstration Toolkit. In IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe) [439] IEEE Power & Energy Society. https://doi.org/10.1109/ISGTEurope.2019.8905439

Huibers, T., Fails, J. A., Kucirkova, N., Landoni, M., Murgia, E., & Pera, M. S. (2019). 3rd KidRec workshop: What does good look like? In Proceedings of the 18th ACM International Conference on Interaction Design and Children, IDC 2019 (pp. 681-688). Association for Computing Machinery (ACM). https://doi.org/10.1145/3311927.3325162


Ibrahim, A. M. Y. , & Kerkhoff, H. G. (2019). DARS: An EDA framework for reliability and functional safety management of system-on-chips. In 2019 IEEE International Test Conference, ITC 2019 [9000112] (Proceedings - International Test Conference; Vol. 2019-November). IEEE. https://doi.org/10.1109/ITC44170.2019.9000112

Ibrahim, A. M. Y. , Kerkhoff, H. G., Ibrahim, A., Safar, M., & El-Kharashi, M. W. (2019). Efficient Structured Scan Patterns Retargeting for Hierarchical IEEE 1687 Networks. In IEEE VLSI Test Symposium (VTS): VTS 2019: proceedings: April 23rd - 25th 2019, Monterey, California (USA) (pp. 1-6). IEEE. https://doi.org/10.1109/VTS.2019.8758635

Ijaz, K. B., Inayat, I. , & Allah Bukhsh, F. (2019). Non-functional Requirements Prioritization: A Systematic Literature Review. In M. Staron, R. Capilla, & A. Skavhaug (Eds.), Proceedings - 45th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2019 (pp. 379-386). [8906708] IEEE. https://doi.org/10.1109/SEAA.2019.00064

Ionita, D., van der Velden, C., Ikkink, H. J. K., Neven, E. , Daneva, M., & Kuipers, M. (2019). Towards risk-driven security requirements management in agile software development. In C. Cappiello, & M. Ruiz (Eds.), Information Systems Engineering in Responsible Information Systems: CAiSE Forum 2019, Rome, Italy, June 3–7, 2019, Proceedings (pp. 133-144). (Lecture Notes in Business Information Processing; Vol. 350). Springer. https://doi.org/10.1007/978-3-030-21297-1_12

Jansen, M-P. (2019). Communicative Signals and Social Contextual Factors in Multimodal Affect Recognition. In W. Gao, H. M. L. Meng, M. Turk, & S. R. Fussell (Eds.), ICMI '19: 2019 International Conference on Multimodal Interaction (pp. 468-472). Association for Computing Machinery (ACM). https://doi.org/10.1145/3340555.3356094

Jorge, C. C., Atzmueller, M., Heravi, B. M., Gibson, J. L. , de Sá, C. R., & Rossetti, R. J. F. (2019). Mining Exceptional Social Behaviour. In P. Moura Oliveira, P. Novais, & L. P. Reis (Eds.), Progress in Artificial Intelligence: 19th EPIA Conference on Artificial Intelligence, EPIA 2019, Proceedings (Vol. Part II, pp. 460-472). (Lecture Notes in Computer Science; Vol. 11805), (Lecture notes in Artificial Intelligence). Springer. https://doi.org/10.1007/978-3-030-30244-3_38

Kamilaris, A., van den Brink, C., & Karatsiolis, S. (2019). Training Deep Learning Models via Synthetic Data: Application in Unmanned Aerial Vehicles. In M. Vento, G. Percannella, S. Colantonio, D. Giorgi, B. J. Matuszewski, H. Kerdegari, & M. Razaak (Eds.), Computer Analysis of Images and Patterns : CAIP 2019 International Workshops, ViMaBi and DL-UAV, Salerno, Italy, September 6, 2019, Proceedings (pp. 81-90). (Communications in Computer and Information Science; Vol. 1089). Springer. https://doi.org/10.1007/978-3-030-29930-9_8

Kamminga, J. W., Jones, M., Seppi, K. , Meratnia, N. , & Havinga, P. J. M. (2019). Synchronization between Sensors and Cameras in Movement Data Labeling Frameworks. In DATA'19: Proceedings of the 2nd Workshop on Data Acquisition To Analysis (pp. 37-39) https://doi.org/10.1145/3359427.3361920

Kantharaju, R. B., Pease, A. , Reidsma, D., Pelachaud, C., Snaith, M. , Bruijnes, M. , Klaassen, R. , Beinema, T. , Huizing, G. , Simonetti, D. , Heylen, D. , & op den Akker, H. (2019). Integrating argumentation with social conversation between multiple virtual coaches. In IVA 2019 - Proceedings of the 19th ACM International Conference on Intelligent Virtual Agents (pp. 203-205). Association for Computing Machinery (ACM). https://doi.org/10.1145/3308532.3329450

Keelawat, P. , Thammasan, N., Kijsirikul, B., & Numao, M. (2019). Subject-Independent Emotion Recognition During Music Listening Based on EEG Using Deep Convolutional Neural Networks. In 2019 IEEE 15th International Colloquium on Signal Processing & Its Applications (CSPA) (pp. 21-26). IEEE. https://doi.org/10.1109/CSPA.2019.8696054

Kegel, R. H. P. , van Sinderen, M. , & Wieringa, R. J. (2019). Towards More Individualized Interfaces: Automating the assessment of computer literacy. In S. Iyengar, P. Tikka, L. van Gemert-Pijnen, & H. Oinas-Kukkonen (Eds.), Behavior Change Support Systems, BCSS 2019: Proceedings of the Seventh International Workshop on Behavior Change Support Systems (CEUR Workshop proceedings; Vol. 2340). CEUR. http://ceur-ws.org/Vol-2340/06-BCSS2019_paper.pdf

Klein Brinke, J. , & Meratnia, N. (2019). Dataset: Channel State Information for Different Activities, Participants and Days. In DATA’19: Proceedings of the Second Workshop on Data Acquisition To Analysis (pp. 61-64). ACM Press. https://doi.org/10.1145/3359427.3361913

Klein Brinke, J. , & Meratnia, N. (2019). Scaling Activity Recognition Using Channel State Information Through Convolutional Neural Networks and Transfer Learning. In AIChallengeIoT ’19: International Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things (pp. 56-62). https://doi.org/10.1145/3363347.3363362

Kließ, M. S. , Stoelinga, M. , & van Riemsdijk, M. B. (2019). From Good Intentions to Behaviour Change: Probabilistic Feature Diagrams for Behaviour Support Agents. In M. Baldoni, M. Dastani, B. Liao, Y. Sakurai, & R. Zalila-Wenkstern (Eds.), PRIMA 2019: Principles and Practice of Multi-Agent Systems: 22nd International Conference, Turin, Italy, October 28-31, 2019, Proceedings (pp. 354-369). (Lecture Notes in Computer Science; Vol. 11873). Springer. https://doi.org/10.1007/978-3-030-33792-6_22

Koopman, R. , & Wang, S. (2019). A two-step approach toward subject prediction. In G. Catalano, C. Daraio, M. Gregori, H. F. Moed, & G. Ruocco (Eds.), 17th International Conference on Scientometrics and Informetrics, ISSI 2019 - Proceedings: 2-5 September 2019 Sapienza University of Rome, Italy (Vol. I, pp. 1038-1043). International Society for Scientometrics and Informetrics.

Krom, B. N., Catoire, M., Toet, A., van Dijk, R. J. E. , & van Erp, J. B. F. (2019). Effects of Likeness and Synchronicity on the Ownership Illusion over a Moving Virtual Robotic Arm and Hand. In 2019 IEEE World Haptics Conference, WHC 2019 (pp. 49-54). [8816112] IEEE. https://doi.org/10.1109/WHC.2019.8816112

Kumar, A. , Mocanu, E., Babar, M., & Nguyen, P. H. (2019). Collaborative learning for classification and prediction of building energy flexibility. In 2019 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe) [8905597] IEEE. https://doi.org/10.1109/ISGTEurope.2019.8905597

Kumar, A. , Mocanu, E., Babar, M., & Nguyen, P. H. (Accepted/In press). Collaborative learning for classification and prediction of building energy flexibility. In 9th IEEE PES Innovative Smart Grid Technology Conference Europe IEEE.

Landoni, M., Matteri, D., Murgia, E. , Huibers, T., & Pera, M. S. (2019). Sonny, Cerca! Evaluating the Impact of Using a Vocal Assistant to Search at School. In F. Crestani, M. Braschler, J. Savoy, A. Rauber, H. Müller, D. E. Losada, G. Heinatz Bürki, L. Cappellato, & N. Ferro (Eds.), Experimental IR Meets Multilinguality, Multimodality, and Interaction: 10th International Conference of the CLEF Association, CLEF 2019, Lugano, Switzerland, September 9-12, 2019. Proceedings (pp. 101-113). (Lecture Notes in Computer Science; Vol. 11696). Springer. https://doi.org/10.1007/978-3-030-28577-7_6

Landoni, M., Murgia, E. , Huibers, T., & Pera, M. S. (2019). My Name is Sonny, How May I help You Searching for Information? In IDC '19: Proceedings of the 18th ACM International Conference on Interaction Design and Children Association for Computing Machinery (ACM).

Lau, E. T., Chai, K. K., Chen, Y. , & Vasenev, A. (2019). A Strategic Urban Grid Planning Tool to Improve the Resilience of Smart Grid Networks. In C. Klein, A. Pascoal, B. Donnellan, O. Gusikhin, & M. Helfert (Eds.), Smart Cities, Green Technologies, and Intelligent Transport Systems - 6th International Conference, SMARTGREENS 2017, and 3rd International Conference, VEHITS 2017, Revised Selected Papers (pp. 150-167). (Communications in Computer and Information Science; Vol. 921). Springer Verlag. https://doi.org/10.1007/978-3-030-02907-4_8

Lee, H. R., Cheon, E. , De Graaf, M., Alves-Oliveira, P. , Zaga, C., & Young, J. (2019). Robots for Social Good: Exploring Critical Design for HRI. In 14th ACM/IEEE International Conference on Human-Robot Interaction (HRI) (pp. 681-682). [8673130] IEEE Computer Society. https://doi.org/10.1109/HRI.2019.8673130

Lee, W. Y., Hou, Y. T. Y. , Zaga, C., & Jung, M. (2019). Design for Serendipitous Interaction: BubbleBot - Bringing People Together with Bubbles. In 14th ACM/IEEE International Conference on Human-Robot Interaction (HRI) (pp. 759-760). [8673265] IEEE Computer Society. https://doi.org/10.1109/HRI.2019.8673265

Lestriandoko, N. H. , Spreeuwers, L. , & Veldhuis, R. (2019). Multi-Resolution Face Recognition: The Behaviors of Local Binary Pattern at Different Frequency Bands. In G. Callebaut, K. Verniers, & B. Cox (Eds.), Proceedings of the 2019 Symposium on Information Theory and Signal Processing in the Benelux: May 28-29 2019, KU Leuven, Technologiecampus Gent, Belgium (pp. 63-70). Werkgemeenschap voor Informatie- en Communicatietheorie (WIC). http://www.w-i-c.org/proceedings/proceedings_SITB2019.pdf

Lewis, B. , Hartmanns, A., Basu, P., Shridevi, R. J., Chakraborty, K., Roy, S., & Zhang, Z. (2019). Probabilistic Verification for Reliable Network-on-Chip System Design. In K. G. Larsen, & T. Willemse (Eds.), Formal Methods for Industrial Critical Systems: 24th International Conference, FMICS 2019, Amsterdam, The Netherlands, August 30–31, 2019, Proceedings (pp. 110-126). (Lecture Notes in Computer Science; Vol. 11687). Springer. https://doi.org/10.1007/978-3-030-27008-7_7

Linard, A. , Bucur, D. , & Stoelinga, M. (2019). Fault Trees from Data: Efficient Learning with an Evolutionary Algorithm. In N. Guan, J-P. Katoen, & J. Sun (Eds.), Dependable Software Engineering. Theories, Tools, and Applications: 5th International Symposium, SETTA 2019, Shanghai, China, November 27-29, 2019, Proceedings (pp. 19-37). (Lecture Notes in Computer Science; Vol. 11951), (Programming and Software Engineering). Springer. https://doi.org/10.1007/978-3-030-35540-1_2

Linard, A., Bueno, M. , Bucur, D. , & Stoelinga, M. I. A. (2019). Induction of Fault Trees through Bayesian Networks. In M. Beer, & E. Zio (Eds.), Proceedings of the 29th European Safety and Reliability Conference (ESREL) (pp. 910-918). Research Publishing. http://itekcmsonline.com/rps2prod/esrel2019/e-proceedings/pdf/0596.pdf

Marazza, F. , Bukhsh, F. A., Vijlbrief, O. , Geerdink, J. , Pathak, S. , van Keulen, M. , & Seifert, C. (2019). Comparing Process Models for Patient Populations: Application in Breast Cancer Care. In C. Di Francescomarino, R. Dijkman, & U. Zdun (Eds.), Business Process Management Workshops - BPM 2019 International Workshops, Revised Selected Papers (pp. 496-507). (Lecture Notes in Business Information Processing; Vol. 362). Springer. https://doi.org/10.1007/978-3-030-37453-2_40

Melgar-Estrada, L., Koolen, M., Beelen, K., Huurdeman, H., Wigham, M., Martinez-Ortiz, C., Blom, J. , & Ordelman, R. (2019). The CLARIAH Media Suite: A Hybrid Approach to System Design in the Humanities. In Proceedings of the 2019 Conference on Human Information Interaction and Retrieval (pp. 373-377). ACM Siggraph. https://doi.org/10.1145/3295750.3298918


Moreira, J. , Ferreira Pires, L. , van Sinderen, M. , Wieringa, R. , Singh, P. , Dockhorn Costa, P., & Llop, M. (2019). Improving the Semantic Interoperability of IoT Early Warning Systems: The Port of Valencia Use Case. In K. Popplewell, K-D. Thoben, T. Knothe, & R. Poler (Eds.), Enterprise Interoperability VIII: Smart Services and Business Impact of Enterprise Interoperability (pp. 17-29). (Proceedings of the I-ESA Conferences; Vol. 9). Springer International Publishing AG. https://doi.org/10.1007/978-3-030-13693-2_2

Murgia, E., Landoni, M. , Huibers, T. W. C., Fails, J. A., & Pera, M. S. (2019). The Seven Layers of Complexity of Recommender Systems for Children in Educational Contexts. In Proceedings of the Workshop on Recommendation in Complex Scenarios (pp. 5-9). (CEUR Workshop Proceedings; Vol. 2449). Association for Computing Machinery (ACM). http://ceur-ws.org/Vol-2449/paper1.pdf

Murgia, E., Landoni, M., Pera, M. S. , & Huibers, T. (2019). When will the promises of search technology in the classroom come trur? In ICERI2019 Proceedings: 12th annual International Conference of Education, Research and Innovation, 11-13 November, 2019, Seville, Spain (pp. 10409-10415). (International Conference of Education, Research and Innovation (ICERI); Vol. 2019). International Association of Technology, Education and Development (IATED). https://doi.org/10.21125/iceri.2019.2547

Müller, M., Thomas, M., Wessels, D., Hardaker, W., Chung, T., Toorop, W. , & Rijswijk-Deij, R. V. (2019). Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover. In IMC '19: Proceedings of the Internet Measurement Conference (pp. 1-14). Association for Computing Machinery (ACM). https://doi.org/10.1145/3355369.3355570

Nakhaee, M. C. , Hiemstra, D. , Stoelinga, M., & Noort, M. V. (2019). The Recent Applications of Machine Learning in Rail Track Maintenance: A Survey. In S. Collart-Dutilleul, T. Lecomte, & A. B. Romanovsky (Eds.), Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification: Third International Conference, RSSRail 2019, Lille, France, June 4-6, 2019, Proceedings (pp. 91-105). (Lecture Notes in Computer Science; Vol. 11495). Springer. https://doi.org/10.1007/978-3-030-18744-6_6

Nazareth, D. S., Burghardt, C., Capra, A., Cristoforetti, P., Lam, W. , van Waterschoot, J. B. , Westerhof, G. J. , & Truong, K. P. (2019). Babbelbord: A personalized conversational game for people with dementia. In R. Brankaert (Ed.), Dementia Lab 2019. Making Design Work: Engaging with Dementia in Context: 4th Conference, D-Lab 2019, Eindhoven, The Netherlands, October 21–22, 2019, Proceedings (pp. 169-173). (Communications in Computer and Information Science; Vol. 1117). https://doi.org/10.1007/978-3-030-33540-3_18

Nazareth, D. S. , Jansen, M-P. , Truong, K. P. , Westerhof, G. J. , & Heylen, D. (2019). MEMOA: Introducing the Multi-Modal Emotional Memories of Older Adults Database. In 2019 8th International Conference on Affective Computing and Intelligent Interaction (ACII) (pp. 697). (International Conference on Affective Computing and Intelligent Interaction (ACII); Vol. 2013). IEEE. https://doi.org/10.1109/ACII.2019.8925462

Nazareth, D. S., Tournier, E., Leimkötter, S., Janse, E. , Heylen, D. , Westerhof, G. J. , & Truong, K. P. (2019). An acoustic and lexical analysis of emotional valence in spontaneous speech: Autobiographical memory recall in older adults. In Proceedings Interspeech 2019 (pp. 3287-3291). International Speech Communication Association (ISCA). https://doi.org/10.21437/Interspeech.2019-1823

Neidlinger, K. L., Toussaint, L. , Dertien, E. C. , Truong, K. P. , Hermens, H. J. , & Evers, V. (2019). Emotional prosthesis for animating awe through performative biofeedback. In Proceedings of the 23rd International Symposium on Wearable Computers (ISWC '19) (pp. 312-317) https://doi.org/10.1145/3341163.3346939

Nijholt, A. (2019). Smart, Affective, and Playable Cities. In A. L. Brooks, E. Brooks, & C. Sylla (Eds.), Interactivity, Game Creation, Design, Learning, and Innovation - 7th EAI International Conference, ArtsIT 2018, and 3rd EAI International Conference, DLI 2018, ICTCC 2018, Proceedings (pp. 163-168). (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; Vol. 265). Springer Verlag. https://doi.org/10.1007/978-3-030-06134-0_17

Nijholt, A. (2019). Stand-up Comedy and Humor by Robots. In L. Ruiz Miyares (Ed.), Proceedings Sixteenth International Symposium on Social Communication: Comunicación Social: Lingüística, Medios Masivos, Arte, Etnología, Folclor y otras ciencias afines (pp. 228-234). Centro de Lingüística Aplicada.

Normakristagaluh, P. , Spreeuwers, L. , & Veldhuis, R. N. J. (2019). Finger-vein Pattern Recognition Based on ICP on Contours. In G. Callebaut, K. Verniers, & B. Cox (Eds.), 2019 Symposium on Information Theory and Signal Processing in the Benelux (pp. 97-101). Katholieke Universiteit Leuven.

Okai, J., Paraschiakos, S., Beekman, M., Knobbe, A. , & Pinho Rebelo de Sá, C. F. (2019). Building robust models for Human Activity Recognition from raw accelerometers data using Gated Recurrent Units and Long Short Term Memory Neural Networks. In 2019 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC) (Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC); Vol. 2019, No. 41). IEEE. https://doi.org/10.1109/EMBC.2019.8857288

Oortwijn, W. , & Huisman, M. (2019). Formal Verification of an Industrial Safety-Critical Traffic Tunnel Control System. In W. Ahrendt, & S. L. Tapia Tarifa (Eds.), Integrated Formal Methods: 15th International Conference, IFM 2019, Bergen, Norway, December 2–6, 2019, Proceedings (pp. 418-436). (Lecture Notes in Computer Science; Vol. 11918). Springer. https://doi.org/10.1007/978-3-030-34968-4_23

Oortwijn, W. , & Huisman, M. (2019). Practical Abstractions for Automated Verification of Message Passing Concurrency. In W. Ahrendt, & S. L. Tapia Tarifa (Eds.), Integrated Formal Methods - 15th International Conference, IFM 2019, Proceedings (pp. 399-417). (Lecture Notes in Computer Science; Vol. 11918). Springer. https://doi.org/10.1007/978-3-030-34968-4_22

Ozceylan, B. , Haverkort, B. R. H. M. , de Graaf, M. , & Gerards, M. E. T. (2019). A Generic Processor Temperature Estimation Method. In M. Rencz, L. Codecasa, & A. Poppe (Eds.), 2019 25th International Workshop on Thermal Investigations of ICs and Systems (THERMINIC) IEEE. https://doi.org/10.1109/THERMINIC.2019.8923636

Pathrose Vareed, J. , Ali, G. , & Kerkhoff, H. G. (2019). Enhancing Physical Unclonable Function Robustness Employing Embedded Instruments. In 2018 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS) (pp. 370-373). [8605571] IEEE. https://doi.org/10.1109/APCCAS.2018.8605571

Pathrose, J., Van De Logt, L. , & Kerkhoff, H. G. (2019). Analog test interface for IEEE 1687 employing split SAR architecture to support embedded instrument dependability applications. In 2019 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2019 [8875372] IEEE. https://doi.org/10.1109/DFT.2019.8875372

Postma, D. , Van Delden, R., Walinga, W., Koekoek, J. , van Beijnum, B-J. , Salim, F. A., Van Hilvoorde, I. , & Reidsma, D. (2019). Towards smart sports exercises: First designs. In CHI PLAY '19 Extended Abstracts: Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play Companion Extended Abstracts (pp. 619-630). Association for Computing Machinery (ACM). https://doi.org/10.1145/3341215.3356306

Rebelo de Sá, C., Shekar, A. K., Ferreira, H., & Soares, C. (2019). Building Robust Prediction Models for Defective Sensor Data Using Artificial Neural Networks. In H. Quintián, J. A. Sáez Muñoz, E. Corchado, F. Martínez Álvarez, & A. Troncoso Lora (Eds.), 14th International Conference on Soft Computing Models in Industrial and Environmental Applications (SOCO 2019) (pp. 142-153). (Advances in Intelligent Systems and Computing; Vol. 950). Springer. https://doi.org/10.1007/978-3-030-20055-8_14

Reijnders, V. M. J. J. , Gerards, M. E. T. , & Hurink, J. L. (2019). Pricing mechanism based on losses using grid topology. In 2019 IEEE Milan PowerTech [8810436] (2019 IEEE Milan PowerTech, PowerTech 2019). IEEE. https://doi.org/10.1109/PTC.2019.8810436

Rivolli, A., Amaral, C., Guardão, L. , de Sá, C. R., & Soares, C. (2019). KnowBots: Discovering Relevant Patterns in Chatbot Dialogues. In P. Kralj Novak, S. Džeroski, & T. Šmuc (Eds.), Discovery Science : 22nd International Conference, DS 2019, Split, Croatia, October 28-30, 2019. Proceedings (pp. 481-492). (Lecture Notes in Artificial Intelligence ; subseries of Lecture Notes in Computer Science; Vol. 11828 LNAI). Springer. https://doi.org/10.1007/978-3-030-33778-0_36

Roddav, N., Streit, K., Rodosek, G. D. , & Pras, A. (2019). On the Usage of DSCP and ECN codepoints in internet backbone traffic traces for IPv4 and IPv6. In 2019 International Symposium on Networks, Computers and Communications, ISNCC 2019 [8909187] IEEE. https://doi.org/10.1109/ISNCC.2019.8909187

Ruijters, E. J. J. , Budde, C. E. , Chenariyan Nakhaee, M. , Stoelinga, M. I. A. , Bucur, D. , Hiemstra, D. , & Schivo, S. (2019). FFORT: A benchmark suite for fault tree analysis. In M. Beer, & E. Zio (Eds.), ESREL 2019: Proceedings of the 29th European Safety and Reliability Conference (pp. 878-885). Research Publishing. https://doi.org/10.3850/978-981-11-2724-3_0641-cd

Río, N. G. D., González-González, C. S., Martín-González, R., Navarro-Adelantado, V., Toledo-Delgado, P., Marrero-Gordillo, N. , Barrios-Fleitas, Y. D. C., Armas-Ramos, H., & Gacía-Pẽalvo, F. (2019). Treatment of children obesity and diabetes through gamification: A case of study. In M. A. Conde-Gonzalez, F. J. Rodriguez-Sedano, C. Fernandez-Llamas, & F. J. Garcia-Penalvo (Eds.), Proceedings - TEEM 2019: 7th International Conference on Technological Ecosystems for Enhancing Multiculturality (pp. 452-458). (ACM International Conference Proceeding Series). Association for Computing Machinery (ACM). https://doi.org/10.1145/3362789.3362935

Safapourhajari, S. , & Kokkeler, A. B. J. (2019). Low Complexity Synchronization for Offset Tolerant DFT-Based BFSK Demodulator. In 2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) IEEE. https://doi.org/10.1109/SPAWC.2019.8815394

Safapourhajari, S. , & Kokkeler, A. B. J. (2019). Offset Tolerant Demodulator for Frequency/Phase Modulation in Time-Varying Channel. In 2019 IEEE Wireless Communications and Networking Conference (WCNC) [8886086] (IEEE Wireless Communications and Networking Conference, WCNC; Vol. 2019). IEEE. https://doi.org/10.1109/WCNC.2019.8886086

Salim, F., Haider, F., Tasdemir, S. B. Y., Naghashi, V., Tengiz, I., Cengiz, K. , Postma, D. , Van Delden, R. , Reidsma, D., Luz, S. , & van Beijnum, B-J. (2019). A searching and automatic video tagging tool for events of interest during volleyball training sessions. In ICMI 2019 - Proceedings of the 2019 International Conference on Multimodal Interaction (pp. 501-503). ACM Publishing. https://doi.org/10.1145/3340555.3358660

Schadenberg, B. R. (2019). Predictability in Human-Robot Interactions for Autistic Children. In 2019 14th ACM/IEEE International Conference on Human-Robot Interaction (HRI) (pp. 748-750). IEEE. https://doi.org/10.1109/HRI.2019.8673135

Scherzinger, S. , Seifert, C., & Wiese, L. (Accepted/In press). The Best of both Worlds: Challenges in Linking Provenance and Explainability in Distributed Machine Learning. In Proceedings of the 39th International Conference on Distributed Computing Systems IEEE Computer Society.

Soro, F. , Drago, I., Trevisan, M., Mellia, M. , Ceron, J. , & Santanna, J. J. (2019). Are darknets all the same? On darknet visibility for security monitoring. In 25th IEEE International Symposium on Local and Metropolitan Area Networks, LANMAN 2019 [8847113] (IEEE Workshop on Local and Metropolitan Area Networks; Vol. 2019-July). IEEE Computer Society Press. https://doi.org/10.1109/LANMAN.2019.8847113

Stuldreher, I. V., de Winter, J. C. F. , Thammasan, N., & Brouwer, A-M. (2019). Analytic approaches for the combination of autonomic and neural activity in the assessment of physiological synchrony. In 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC) (pp. 4143-4148). (IEEE International Conference on Systems, Man and Cybernetics (SMC); Vol. 2019). IEEE. https://doi.org/10.1109/SMC.2019.8913927

Sun, J. , Katoen, J-P., & Guan, N. (2019). Preface. In Dependable Software Engineering. Theories, Tools, and Applications: 5th International Symposium, SETTA 2019, Shanghai, China, November 27–29, 2019, Proceedings (pp. v-v). (Lecture Notes in Computer Science; Vol. 11951). Springer. https://link.springer.com/content/pdf/bfm%3A978-3-030-35540-1%2F1.pdf

Thammasan, N. , Stuldreher, I., Wismeijer, D. , Poel, M. , van Erp, J., & Brouwer, A-M. (2019). A novel, simple and objective method to detect movement artefacts in electrodermal activity. In 2019 8th International Conference on Affective Computing and Intelligent Interaction, ACII 2019 (pp. 371-377). [8925512] (International Conference on Affective Computing and Intelligent Interaction (ACII); Vol. 2019). IEEE. https://doi.org/10.1109/ACII.2019.8925512

Toet, A., Heijn, F., Brouwer, A-M., Mioch, T. , & van Erp, J. B. F. (2019). The EmojiGrid as an Immersive Self-report Tool for the Affective Assessment of 360 VR Videos. In P. Bourdot, V. Interrante, L. Nedel, N. Magnenat-Thalmann, & G. Zachmann (Eds.), Virtual Reality and Augmented Reality: 16th EuroVR International Conference, EuroVR 2019, Tallinn, Estonia, October 23–25, 2019, Proceedings (pp. 330-335). (Lecture Notes in Computer Science; Vol. 11883). Springer. https://doi.org/10.1007/978-3-030-31908-3_24

Trienes, J., & Balog, K. (2019). Identifying unclear questions in community question answering websites. In B. Stein, P. Mayr, L. Azzopardi, D. Hiemstra, N. Fuhr, & C. Hauff (Eds.), Advances in Information Retrieval - 41st European Conference on IR Research, ECIR 2019, Proceedings (pp. 276-289). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11437 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-030-15712-8_18

Truong, K. P., Trouvain, J. , & Jansen, M-P. (2019). Towards an annotation scheme for complex laughter in speech corpora. In Interspeech 2019 (pp. 529-533). ISCA. https://doi.org/10.21437/Interspeech.2019-1557

Venkatesh, S., Ramachandra, R., Raja, K. , Spreeuwers, L. , Veldhuis, R., & Busch, C. (2019). Morphed Face Detection Based on Deep Color Residual Noise. In 2019 9th International Conference on Image Processing Theory, Tools and Applications, IPTA 2019 [8936088] (International Conference on Image Processing Theory, Tools and Applications (IPTA); Vol. 2019). IEEE. https://doi.org/10.1109/IPTA.2019.8936088

Verhoeven, G. , Catala, A. , & Theune, M. (2019). Designing a playful robot application for second language learning. In A. L. Brooks, E. Brooks, & C. Sylla (Eds.), Interactivity, Game Creation, Design, Learning, and Innovation: 7th EAI International Conference, ArtsIT 2018, and 3rd EAI International Conference, DLI 2018, ICTCC 2018, Braga, Portugal, October 24–26, 2018, Proceedings (pp. 385-394). (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Vol. 265). Springer. https://doi.org/10.1007/978-3-030-06134-0_42

Vroon, J. , Englebienne, G. , & Evers, V. (2019). Detecting perceived appropriateness of a robot's social positioning behavior from non-verbal cues. In Proceedings - 2019 IEEE 1st International Conference on Cognitive Machine Intelligence, CogMI 2019 (pp. 216-225). [8998780] IEEE. https://doi.org/10.1109/CogMI48466.2019.00039

Wang, C., Liang, P. , Daneva, M. , & van Sinderen, M. (2019). Augmenting app reviews with app changelogs: An approach for app reviews classification. In Proceedings - SEKE 2019: 31st International Conference on Software Engineering and Knowledge Engineering (pp. 398-403). (Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE; Vol. 2019, No. 31). Knowledge Systems Institute Graduate School. https://doi.org/10.18293/SEKE2019-176

Wang, S., Koopman, R. , & Englebienne, G. (2019). Non-Parametric Subject Prediction. In A. Doucet, A. Isaac, K. Golub, T. Aalberg, & A. Jatowt (Eds.), Digital Libraries for Open Knowledge: 23rd International Conference on Theory and Practice of Digital Libraries, TPDL 2019, Oslo, Norway, September 9-12, 2019, Proceedings (pp. 312-326). (Lecture Notes in Computer Science; Vol. 11799). Springer. https://doi.org/10.1007/978-3-030-30760-8_27

Wang, W. , Keyer, C. , Hartman, T., & van der Ven, J-K. (2019). Two Sided Earthing Versus one Sided Earthing for Ethernet Cables. In 2019 International Symposium on Electromagnetic Compatibility - EMC EUROPE (pp. 619-624). [8872004] (EMC Europe 2019 - 2019 International Symposium on Electromagnetic Compatibility). IEEE Electromagnetic Compatibility Society. https://doi.org/10.1109/EMCEurope.2019.8872004

Wieringa, R. J. , Engelsman, W., Gordijn, J. , & Ionita, D. (2019). A Business Ecosystem Architecture Modeling Framework. In 2019 IEEE 21st Conference on Business Informatics (CBI) IEEE. https://doi.org/10.1109/CBI.2019.00024

Wigham, M., Melgar Estrada, L. , & Ordelman, R. J. F. (2019). Jupyter Notebooks for Generous Archive Interfaces. In 2018 IEEE International Conference on Big Data (Big Data) https://doi.org/10.1109/BigData.2018.8622203

Wijnhoven, F., Kluitenberg, F. , & Daneva, M. (2019). Open Source Software Information Triangulation: A design science study. In 28th International Conference on Information Systems Development, ISD 2019

Wrede, C. , Jansen, L. , Havinga, P. J. M. , Croockewit, J. H. , & van Gemert-Pijnen, J. E. W. C. (2019). Unobtrusive sensing technologies to monitor and coach elderly with dementia: Track, Trace & Trigger. In E. Kyza, P. Karpinnen, E. Karapanos, K. T. Win , & H. Oinas-Kukkonen (Eds.), Adjunct Proceedings of the 14th International Conference on Persuasive Technology, Limassol, Cyprus (pp. 43-45)

Zeinstra, C. , Meuwly, D. , Veldhuis, R. , & Spreeuwers, L. (2019). Mind the Gap: A practical framework for classifiers in a forensic context. In 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems, BTAS 2018 [8698583] (IEEE nternational Conference on Biometrics Theory, Applications and Systems (BTAS); Vol. 2018). IEEE. https://doi.org/10.1109/BTAS.2018.8698583

Zeng, D. , Veldhuis, R. N. J. , Spreeuwers, L., & Zhao, Q. (2019). Likelihood Ratio based Loss to fine tune CNNs for Very Low Resolution Face Verification. In M. Nixon, & P. J. Flynn (Eds.), The 12th IAPR International Conference on Biometrics (ICB 2019) (pp. 1)

Zeng, D. , Veldhuis, R. , Spreeuwers, L., & Zhao, Q. (2019). Likelihood Ratio based Loss to finetune CNNs for Very Low Resolution Face Verification. In 2019 International Conference on Biometrics, ICB 2019 [8987249] (International Conference on Biometrics, ICB; Vol. 2019). IEEE. https://doi.org/10.1109/ICB45273.2019.8987249

Ziener, D., Pirkl, J., & Teich, J. (2019). Configuration Tampering of BRAM-based AES Implementations on FPGAs. In 2018 International Conference on ReConFigurable Computing and FPGAs IEEE Computer Society. https://doi.org/10.1109/RECONFIG.2018.8641692


de Jong, M., Hettinga, M., Stara, V. , Evers, V. , & Li, J. J. (2019). Eldertainment or functional necessity? How virtual agents affect the home lives of people with dementia using the Quality of Life (QOL-AD) scale. In UbiComp/ISWC '19 Adjunct Adjunct Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers (pp. 41-44) https://doi.org/10.1145/3341162.3343827


de Sousa Santos, O. , de Alencar Silva, P. , Bukhsh, F. A., & Queiroz, P. G. G. (2019). Conceptual Modeling for Corporate Social Responsibility: A Systematic Literature Review. In K. Djemame, J. Altmann, J. Á. Bañares, O. Agmon Ben-Yehuda, & M. Naldi (Eds.), Economics of Grids, Clouds, Systems, and Services - 16th International Conference, GECON 2019, Proceedings (pp. 218-227). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11819 LNCS). Springer Singapore. https://doi.org/10.1007/978-3-030-36027-6_19

de Sá, C. R. (2019). Variance-Based Feature Importance in Neural Networks. In P. Kralj Novak, S. Džeroski, & T. Šmuc (Eds.), Discovery Science : 22nd International Conference, DS 2019, Split, Croatia, October 28-30, 2019. Proceedings (pp. 306-315). (Lecture Notes in Artificial Intelligence; subseries of Lecture Notes in Computer Science; Vol. 11828 LNAI). Springer. https://doi.org/10.1007/978-3-030-33778-0_24

de Vries, W. B., Scheitle, Q. , Müller, M., Toorop, W., Dolmans, R. , & van Rijswijk-Deij, R. (2019). A First Look at QNAME Minimization in the Domain Name System. In D. Choffnes, & M. Barcellos (Eds.), Passive and Active Measurement: 20th International Conference, PAM 2019, Proceedings (pp. 147-160). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11419 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-030-15986-3_10


van Delden, R. , de Vries, R. A. J. , & Heylen, D. K. J. (2019). Questioning Our Attitudes and Feelings Towards Persuasive Technology. In H. Oinas-Kukkonen, K. Than Win, E. Karapanos, P. Karppinen, & E. Kyza (Eds.), Persuasive Technology: Development of Persuasive and Behavior Change Support Systems: 14th International Conference, PERSUASIVE 2019, Limassol, Cyprus, April 9–11, 2019, Proceedings (pp. 3-15). (Lecture Notes in Computer Science ; Vol. 11433). Springer. https://doi.org/10.1007/978-3-030-17287-9_1

van Dijk, T. , Meijer, J. , & van de Pol, J. (2019). Multi-core On-The-Fly Saturation. In L. Zhang, & T. Vojnar (Eds.), Tools and Algorithms for the Construction and Analysis of Systems: 25th International Conference, TACAS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Proceedings (pp. 58-75). (Lecture Notes in Computer Science; Vol. 11428), (Theoretical Computer Science and General Issues). Springer. https://doi.org/10.1007/978-3-030-17465-1_4

van Rijswijk - Deij, R., Rijnders, G. , Bomhoff, M., & Allodi, L. (2019). Privacy-Conscious Threat Intelligence Using DNSBloom. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019 (pp. 98-106). [8717908] IEEE. https://ieeexplore.ieee.org/document/8717908

van Stegeren, J. , & Theune, M. (2019). Churnalist: Fictional Headline Generation for Context-appropriate Flavor Text. In K. Grace, M. Cook, D. Ventura, & M. L. Maher (Eds.), Proceedings of the 10th International Conference on Computational Creativity (pp. 65-72). Association for Computational Creativity.

van Stegeren, J. , & Theune, M. (2019). Narrative Generation in the Wild: Methods from NaNoGenMo. In F. Ferraro, T-H. K. Huang, S. Lukin, & M. Mitchell (Eds.), Storytelling: Proceedings of the Second Workshop, August 1, 2019, Florence Italy (pp. 65-74). Association for Computational Linguistics (ACL). https://www.aclweb.org/anthology/W19-34

van Stegeren, J. , & Theune, M. (2019). Remixing Headlines for Context-Appropriate Flavor Text. In Proceedings of the IEEE Conference On Games (COG) 2019 [156] IEEE. http://ieee-cog.org/papers/paper_156.pdf

van de Kamp, T. R., Stritzl, D. , Jonker, W. , & Peter, A. (2019). Two-Client and Multi-client Functional Encryption for Set Intersection. In J. Jang-Jaccard, & F. Guo (Eds.), Information security and privacy: 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings (pp. 97-115). (Lecture Notes in Computer Science; Vol. 11547). Springer International Publishing AG. https://doi.org/10.1007/978-3-030-21548-4_6

van de Pol, J. (2019). Concurrent algorithms and data structures for model checking. In W. Fokkink, & R. van Glabbeek (Eds.), 30th International Conference on Concurrency Theory, CONCUR 2019 [4] (Leibniz International Proceedings in Informatics, LIPIcs; Vol. 140). Dagstuhl. https://doi.org/10.4230/LIPIcs.CONCUR.2019.4

van der Berg, F. I. , & van de Pol, J. (2019). Concurrent chaining hash maps for software model checking. In C. Barrett, & J. Yang (Eds.), 2019 Formal Methods in Computer Aided Design (FMCAD) (pp. 46-54). [8894279] (Proceedings of the Conference on Formal Methods in Computer-Aided Design (FMCAD); Vol. 2019). IEEE. https://doi.org/10.23919/FMCAD.2019.8894279

Foreword/postscript


Burgue, L., Pretschner, A., Voss, S., Chaudron, M., Kienzle, J., Völter, M., Gérard, S., Zahedi, M., Bousse, E. , Rensink, A., Polack, F., Engels, G., & Kappel, G. (2019). Preface to the ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C). In L. Burgueño, A. Pretschner, S. Voss, M. Chaudron, J. Kienzle, M. Völter, S. Gérard, M. Zahedi, E. Bousse, A. Rensink, F. Polack, G. Engels, & G. Kappel (Eds.), 2019 ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C) (pp. xviii-xxiv) https://doi.org/10.1109/MODELS-C.2019.00005

Ceravolo, P. , Van Keulen, M., & Stoffel, K. (2019). Preface. In P. Ceravolo, M. van Keulen, & K. Stoffel (Eds.), Data-Driven Process Discovery and Analysis: 7th IFIP WG 2.6 International Symposium, SIMPDA 2017, Neuchatel, Switzerland, December 6-8, 2017, Revised Selected Papers (pp. V-VI). (Lecture notes in business information processing; Vol. 340). Springer. https://link.springer.com/content/pdf/bfm%3A978-3-030-11638-5%2F1.pdf

Katoen, J-P. (2019). ETAPS Foreword. In D. Beyer, M. Huisman, F. Kordon, & B. Steffen (Eds.), Tools and Algorithms for the Construction and Analysis of Systems: 25 Years of TACAS: TOOLympics, Held as Part of ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings, Part III (pp. v-vi). (Lecture Notes in Computer Science; Vol. 11429), (Theoretical Computer Science and General Issues). Springer. https://link.springer.com/content/pdf/bfm%3A978-3-030-17502-3%2F1.pdf

Nijholt, A. (2019). Preface. In A. Nijholt (Ed.), Brain Art: Brain-Computer Interfaces for Artistic Expression (pp. vii-ix). Springer. https://link.springer.com/content/pdf/bfm:978-3-030-14323-7/1.pdf

Nijholt, A. (2019). Preface. In A. Nijholt (Ed.), Making Smart Cities More Playable: Exploring Playable Cities (pp. v-vi). (Gaming Media and Social Effects). Springer. https://link.springer.com/content/pdf/bfm:978-981-13-9765-3/1.pdf

Paper


Eijkel, D. , & Fehnker, A. (2019). A Distributed Blockchain Model of Selfish Mining. 48-59. Paper presented at 3rd World Congress on Formal Methods, FM 2019, Porto, Portugal. https://drive.google.com/file/d/1s0PkOn6RzTEVmZrWSK5zkGfTIHcRGzvk/view?usp=sharing

Enendu, S., Scholtes, J., Smeets, J. , Hiemstra, D. , & Theune, M. (2019). Predicting semantic labels of text regions in heterogeneous document images. 203-11. Paper presented at 15th Conference on Natural Language Processing, KONVENS 2019, Erlangen, Germany. https://corpora.linguistik.uni-erlangen.de/data/konvens/proceedings/papers/KONVENS2019_paper_54.pdf

Guo, Z. , Broersma, H. , Li, B., & Zhang, S. (2019). Compatible spanning circuits in edge-colored Fan-type graphs. 61-64. Paper presented at 17th Cologne-Twente Workshop on Graphs and Combinatorial Optimization, CTW 2019, Enschede, Netherlands.

Huibers, T. , & Westerveld, T. (2019). Relevance and utility in an educational search environment. Paper presented at 3rd International and Interdisciplinary Perspectives on Children & Recommender and Information Retrieval Systems, KidRec 2019, Boise, United States.

Huizing, G. H. , Klaassen, R. , & Heylen, D. K. J. (2019). Designing and Developing Lifelike, Engaging Lifestyle Coaching Agents and Scenarios for Multiparty Coaching Interaction. Paper presented at 2018 AAMAS Workshop on Intelligent Conversation Agents in Home and Geriatric Care Applications, ICAHGCA 2018, Stockholm, Sweden. http://ceur-ws.org/Vol-2338/paper3.pdf

Iacob, M. E., Charismadiptya, G. , van Sinderen, M. J. , & Piest, J. P. S. (2019). An architecture for Situation-aware Smart Logistics. Paper presented at 10th SOEA4EE Workshop, Paris, France.

Kamilaris, A. (2019). Visualizing Data for Good. Paper presented at Data Visualizations Course of the Creative Technologies BSc Program, Enschede, Netherlands.

Kamminga, J. W. , Meratnia, N. , & Havinga, P. J. M. (2019). Dataset: Horse Movement Data and Analysis of its Potential for Activity Recognition. 22-25. Paper presented at 2nd Workshop on Data Acquisition To Analysis, DATA 2019, New York, United States. https://doi.org/10.1145/3359427.3361908


Li, J. J., Sirkin, D. , van Erp, J. , & van Riemsdijk, B. (2019). Closeness with Robots as Social Partners. 691-692. Paper presented at 14th Annual ACM/IEEE International Conference on Human-Robot Interaction, HRI 2019, Daegu, Korea, Republic of. https://doi.org/10.1109/HRI.2019.8673168

Marazza, F. , Bukhsh, F. A., Vijlbrief, O., Geerdink, J. , Pathak, S. , van Keulen, M. , & Seifert, C. (2019). Comparing Process Models for Patient Populations: Application in Breast Cancer Care. Paper presented at International Workshop Process-Oriented Data Science for Healthcare 2019, Vienna, Austria.

Papenmeier, A. , Englebienne, G. , & Seifert, C. (2019). How model accuracy and explanation fidelity influence user trust in AI. Paper presented at IJCAI Workshop on Explainable Artificial Intelligence (XAI) 2019, Macau, China.

Peters, M., Kempen, L. , Nauta, M. , & Seifert, C. (2019). Visualising the Training Process of Convolutional Neural Networks for Non-Experts. Paper presented at 31st Benelux Conference on Artificial Intelligence, BNAIC 2019, Brussels, Belgium.

Ros, K. , Mocanu, E. , & Seifert, C. (2019). Airport Restroom Cleanliness Prediction Using Real Time User Feedback Data. Paper presented at 5th International Conference on Collaboration and Internet Computing , Los Angeles, United States.

Seifert, C., Scherzinger, S., & Wiese, L. (2019). Towards Generating Consumer Labels for Machine Learning Models. Paper presented at 1st IEEE International Conference on Cognitive Machine Intelligence, Los Angeles, United States.

Spreeuwers, L., & Wang, H. (2019). A high resolution pressure sensor for measurement of grip force. Paper presented at 40th WIC Symposium on Information Theory in the Benelux 2019, Leuven, Belgium.

Turkoglu, M. O. , Spreeuwers, L., Thong, W., & Kicanaoglu, B. (2019). A Layer-Based Sequential Framework for Scene Generation with GANs. Paper presented at 33rd AAAI Conference on Artificial Intelligence, AAAI 2019, Honolulu, United States.

Wang, W. , Seraj, F. , Meratnia, N. , & Havinga, P. J. M. (2019). Privacy-aware environmental sound classification for indoor human activity recognition. 36-44. Paper presented at 12th ACM International Conference on PErvasive Technologies Related to Assistive Environments, PETRA 2019, Rhodes, Greece. https://doi.org/10.1145/3316782.3321521

Patent


Blott, M., Liu, L. , Ziener, D., & Karras, K. (2019). Pipelined database processing circuit and method. (Patent No. 10482129). https://patents.justia.com/patent/10482129

PhD Thesis - Research UT, graduation UT

























Poster


Abhishta, A. , Joosten, R. , Jonker, M., Kamerman, W. , & Nieuwenhuis, L. J. M. (2019). Collecting Contextual Information About a DDoS Attack Event Using Google Alerts. Poster session presented at 40th IEEE Symposium on Security and Privacy 2019, San Francisco, United States. https://www.ieee-security.org/TC/SP2019/posters/hotcrp_sp19posters-final32.pdf

Araque, O. , Gatti, L., & Kalimeri, K. (2019). MoralStrength: Exploiting a moral lexicon and embedding similarity for moral foundations prediction. Poster session presented at 3rd European Symposium Series on Societal Challenges in Computational Social Science 2019, Zurich, Switzerland.


Salim, F. A. , Reidsma, D. , & van Delden, R. (2019). Modeling Behavior of Volleyball Players For Analysis and Interactive Multimodal Feedback. Poster session presented at 6th International Conference on Ambulatory Monitoring of Physical Activity and Movement, ICAMPAM 2019, Maastricht, Netherlands.

Sohail, S. A. , & Bukhsh, F. A. (2019). Ethics evaluation of big data in Practice: Healthcare in focus. Poster session presented at 7th ICT.OPEN 2019, Hilversum, Netherlands.

de Vries, R. A. J. , & Haarman, J. A. M. (2019). Pride and Prejudice: Tackling chronic disease prevention through real-life monitoring and context-aware intervention design. Poster session presented at 1st European Conference on Personalised Nutrition & Health, PNH 2019, Wageningen, Netherlands.


2018

Abstract


Brouwer, A-M., Hogervorst, M. A. , van Erp, J. B. F., van Dam, E., Brooks, J. R., Grootjen, M., & Zandstra, E. H. (2018). Improving real-life, heart rate based estimates of emotion by taking metabolic heart rate into account : a perspective and an example in cooking. Abstract from 2nd International Neuroergonomics Conference 2018, Philadelphia, United States. https://doi.org/10.3389/conf.fnhum.2018.227.00044

Pham, T. N. , Zhang, L., Shi, D., Komarneni, M. R. , Ruiz-Ramiro, M. P., Resasco, D. , & Faria, J. (2018). Leveraging interstitial boron atoms to tailor the acid-base properties of MgO for selective aldol-condensation of acetaldehyde. CATL 504. Abstract from 255th American Chemical Society National Meeting & Exposition, New Orleans, United States. https://www.acs.org/content/dam/acsorg/meetings/national-meetings/spring-2018/acs-nola-program-book.pdf

Article (contribution to journal)




Badonnel, R., Koch, R., Drasar, M. , Pras, A., Eiseler, V., Stiemert, L., Seeber, S., Tuncer, D., Charalambides, M., & Rodosek, G. D. (2018). Report on the 10th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2016) - Management and Security in the Age of Hyperconnectivity. Journal of network and systems management, 26(4), 1101-1109. https://doi.org/10.1007/s10922-018-9460-5




Bullee, J-W. , Montoya, L. , Junger, M. , & Hartel, P. H. (2018). Physical location of smart key activators: A building security penetration test. Journal of corporate real estate, 20(2), 138-151. https://doi.org/10.1108/JCRE-05-2017-0014


Cameron, D., Millings, A., Fernando, S., Collins, E. C., Moore, R. K., Sharkey, A. , Evers, V., & Prescott, A. (2018). The effects of robot facial emotional expressions and gender on child-robot interaction in a field study. Connection science, 30(4), 343-361. https://doi.org/10.1080/09540091.2018.1454889

Ceccarelli, A., Zoppi, T. , Vasenev, A., Mori, M. , Ionita, D. , Montoya, L., & Bondavalli, A. (2018). Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach. ACM Transactions on Cyber-Physical Systems, 3(2), [18]. https://doi.org/10.1145/3234513

Ceravolo, P., Azzini, A., Angelini, M., Catarci, T., Cudré-Mauroux, P., Damiani, E., Mazak, A. , van Keulen, M., Jarrar, M., Santucci, G., Sattler, K-U., Scannapieco, M., Wimmer, M., Wrembel, R., & Zaraket, F. (2018). Big Data Semantics. Journal on Data Semantics, 7(2), 65-85. https://doi.org/10.1007/s13740-018-0086-2



Divasón, J. , Joosten, S., Thiemann, R., & Yamada, A. (2018). A verified LLL algorithm. Archive of Formal Proofs, 2018. https://www.isa-afp.org/entries/LLL_Basis_Reduction.html




Georgakis, C., Panagakis, Y. , & Pantic, M. (2018). Dynamic Behavior Analysis via Structured Rank Minimization. International journal of computer vision, 126(2-4), 333-357. https://doi.org/10.1007/s11263-016-0985-3



Gomes, P. D. C., Gurov, D. , Huisman, M., & Artho, C. (2018). Specification and verification of synchronization with condition variables. Science of computer programming, 163, 174-189. https://doi.org/10.1016/j.scico.2018.05.001


Hofstede, R. , Pras, A. , Sperotto, A., & Dreo Rodosek, G. (2018). Flow-Based Compromise Detection: Lessons Learned. IEEE security & privacy, 16(1), 82-89. [8283485]. https://doi.org/10.1109/MSP.2018.1331021

Hooft, J. V. D., Claeys, M., Bouten, N., Wauters, T., Schönwälder, J. , Pras, A., Stiller, B., Charalambides, M., Badonnel, R., Serrat, J., Santos, C. R. P. D., & Turck, F. D. (2018). Updated Taxonomy for the Network and Service Management Research Field. Journal of network and systems management, 26(3), 790-808. https://doi.org/10.1007/s10922-017-9443-y

Huisman, M., & Rubin, J. (2018). Software quality tools and techniques presented in FASE’17. International journal on software tools for technology transfer, 20(6), 611-613. https://doi.org/10.1007/s10009-018-0504-7

Joosten, S. J. C. (2018). Finding models through graph saturation. Journal of Logical and Algebraic Methods in Programming, 100, 98-112. https://doi.org/10.1016/j.jlamp.2018.06.005


Kamilaris, A. , & Ostermann, F. O. (2018). Geospatial Analysis and the Internet of Things. ISPRS international journal of geo-information, 7(7), 1-22. [269]. https://doi.org/10.3390/ijgi7070269





Klaassen, R., Bul, K. , op den Akker, H. J. A., van der Burg, G. J., Kato, P. M., & Di Bitonto, P. (2018). Design and Evaluation of a Pervasive Coaching and Gamification Platform for Young Diabetes Patients. Sensors (Switzerland), 18(2), [402]. https://doi.org/10.3390/s18020402






Nait Aicha, A. , Englebienne, G., & Kröse, B. J. A. (2018). Continuous measuring of the indoor walking speed of older adults living alone. Journal of ambient intelligence and humanized computing, 9(3), 589-599. https://doi.org/10.1007/s12652-017-0456-x

Nies, G., Stenger, M., Krčál, J. , Hermanns, H., Bisgaard, M., Gerhardt, D. , Haverkort, B. , Jongerden, M. , Larsen, K. G., & Wognsen, E. R. (2018). Mastering operational limitations of LEO satellites – The GOMX-3 approach. Acta astronautica, 151, 726-735. https://doi.org/10.1016/j.actaastro.2018.04.040

Nijholt, A. (2018). Les interfaces cerveau-machine. Sciences Psy, 2018(13), 56-59.






Rajbdad, F., Aslam, M., Azmat, S. , Ali, T., & Khattak, S. (2018). Automated Fiducial Points Detection Using Human Body Segmentation. Arabian Journal for Science and Engineering, 43(2), 509-524. https://doi.org/10.1007/s13369-017-2646-4


Ruiz, A., Rudovic, O., Binefa, X. , & Pantic, M. (2018). Multi-Instance Dynamic Ordinal Random Fields for Weakly Supervised Facial Behavior Analysis. IEEE transactions on image processing, 27(8), 3969-3982. https://doi.org/10.1109/TIP.2018.2830189


Scheitle, Q., Chung, T., Hiller, J., Gasser, O., Naab, J. , van Rijswijk - Deij, R. M., Hohlfeld, O. , Holz, R., Choffnes, D., Mislove, A., & Carle, G. (2018). A First Look at Certification Authority Authorization (CAA). Computer communication review, 48(2), 11-23. https://doi.org/10.1145/3213232.3213235


Tinga, A. M., Jansen, C., van der Smagt, M. J., Nijboer, T. C. W. , & van Erp, J. B. F. (2018). Inducing circular vection with tactile stimulation encircling the waist. Acta psychologica, 182, 32-38. https://doi.org/10.1016/j.actpsy.2017.11.007

Toet, A. , Kaneko, D., Ushiama, S., Hoving, S., de Kruijf, I., Brouwer, A-M., Kallen, V. , & van Erp, J. B. F. (2018). EmojiGrid: A 2D Pictorial Scale for the Assessment of Food Elicited Emotions. Frontiers in psychology, 9, [2396]. https://doi.org/10.3389/fpsyg.2018.02396

Toet, A. , van Erp, J. B. F. , Boertjes, E. M., & van Buuren, S. (Accepted/In press). Graphical uncertainty representations for ensemble predictions. Information visualization, 18(4), 373-383. https://doi.org/10.1177/1473871618807121

Tran, T. X. , Le, D. V., Yue, G., & Pompili, D. (2018). Cooperative Hierarchical Caching and Request Scheduling in a Cloud Radio Access Network. IEEE Transactions on Mobile Computing, 17(12), 2729-2743. [8323203]. https://doi.org/10.1109/TMC.2018.2818723





de Jong, M. D. T., Harkink, K. M. , & Barth, S. (2018). Making Green Stuff? Effects of Corporate Greenwashing on Consumers. Journal of business and technical communication, 32(1), 77-112. https://doi.org/10.1177/1050651917729863


van Dijk, T. , & van de Pol, J. (2018). Multi-core symbolic bisimulation minimisation. International journal on software tools for technology transfer, 20(2), 157-177. https://doi.org/10.1007/s10009-017-0468-z

Book editing


Bach Tobji, M. A., Jallouli, R., Koubaa, Y. , & Nijholt, A. (Eds.) (2018). Digital Economy. Emerging Technologies and Business Innovation: Third International Conference, ICDEc 2018, Brest, France, May 3-5, 2018. (Lecture Notes in Business Information Processing; Vol. 325). Springer. https://doi.org/10.1007/978-3-319-97749-2



Cabello, E., Cardoso, J. S., Maciaszek, L. A. , & van Sinderen, M. J. (2018). Software Technologies: 12th International Joint Conference, ICSOFT 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Papers. (Communications in computer and information science; Vol. 868). Springer. https://doi.org/10.1007/978-3-319-93641-3

Callegari, C. , van Sinderen, M., Novais, P., Sarigiannidis, P. G., Battiato, S., Serrano Sanches de Leon, A., Lorenz, P., & Obaidat, M. S. (2018). Proceedings of the 15th International Joint Conference on e-Business and Telecommunications (Volume 2). SCITEPRESS.

Ceravolo, P., Teresa Gómez López, M. , & Van Keulen, M. (Eds.) (2018). Proceedings of the 8th International Symposium on Data-Driven Process Discovery and Analysis (SIMPDA 2018). (CEUR Workshop Proceedings; Vol. 2270). CEUR. http://ceur-ws.org/Vol-2270




Velasco, C. , Nijholt, A., & Karunanayaka, K. (Eds.) (2018). Multi-Sensory Human-Food Interaction. Frontiers Media S.A. https://doi.org/10.3389/978-2-88945-518-8

Chapter


Ahrendt, W. , Huisman, M., Reger, G., & Rozier, K. Y. (2018). A Broader View on Verification: From Static to Runtime and Back (Track Summary). In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation. Verification : 8th International Symposium, ISoLA 2018, Limassol, Cyprus, November 5-9, 2018, Proceedings, Part II (pp. 3-7). (Lecture Notes in Computer Science; No. 11245). Springer. https://doi.org/10.1007/978-3-030-03421-4_1

Bach Tobji, M. A., Jallouli, R., Koubaa, Y. , & Nijholt, A. (2018). Preface. In M. A. Bach Tobji, R. Jallouli, Y. Koubaa, & A. Nijholt (Eds.), Digital Economy. Emerging Technologies and Business Innovation: Third International Conference, ICDEc 2018, Brest, France, May 3-5, 2018, Proceedings (pp. V-VI). ( Lecture Notes in Business Information Processing; Vol. 325). Springer.

Barbosa, C. M., Lima Gomes, R., Goncalves Pereira Filho, J. , & Moreira, J. L. (2018). RS4IoT: a Recommender System for IoT. In Enterprise Interoperability: Smart Services and Business Impact of Enterprise Interoperability (pp. 225 - 231). Wiley.

Barnat, J. , Bloemen, V., Duret-Lutz, A. , Laarman, A. , Petrucci, L. , van de Pol, J., & Renault, E. (2018). Parallel Model Checking Algorithms for Linear-Time Temporal Logic. In Y. Hamadi, & L. Sais (Eds.), Handbook of Parallel Constraint Reasoning (pp. 457-507). Springer. https://doi.org/10.1007/978-3-319-63516-3_12

Bloemen, V. , van de Pol, J., & van der Aalst, W. M. P. (2018). Symbolically Aligning Observed and Modelled Behaviour. In 2018 18th International Conference on Application of Concurrency to System Design : Proceedings (pp. 50-59). IEEE. https://doi.org/10.1109/ACSD.2018.00008

Bosdriesz, Y. , van Sinderen, M. , Iacob, M., & Verkroost, P. (2018). A Building Information Model-centered Big Data Platform to Support Digital Transformation in the Construction Industry. In M. Zelm, F-W. Jaekel, G. Doumeingts, & M. Wollschlaeger (Eds.), Enterprise Interoperability: Smart Services and Business Impact of Enterprise Interoperability (pp. 209-215). Wiley. https://doi.org/10.1002/9781119564034.ch26

Broersma, H. (2018). Evolution in Nanomaterio: The NASCENCE Project. In S. Stepney, & A. Adamatzky (Eds.), Inspired by Nature: Essays Presented to Julian F. Miller on the Occasion of his 60th Birthday (pp. 87-111). (Emergence, Complexity and Computation; Vol. 28). Springer. https://doi.org/10.1007/978-3-319-67997-6_4

Broersma, H., Stepney, S., & Wendin, G. (2018). Computability and Complexity of Unconventional Computing Devices. In S. Stepney, S. Rasmussen, & M. Amos (Eds.), Computational Matter (pp. 185-229). (Natural Computing Series). Springer. https://doi.org/10.1007/978-3-319-65826-1_11

Daneva, M., Marczak, S., Knauss, E., & Madhavji, N. (2018). Welcome from the Workshop Chairs. In 2018 IEEE 7th International Workshop on Empirical Requirements Engineering (EmpiRE) (7 ed., pp. VI-VII). IEEE. https://doi.org/10.1109/EmpiRE.2018.00005

Divasón, J. , Joosten, S., Thiemann, R., & Yamada, A. (2018). A Formalization of the LLL Basis Reduction Algorithm. In J. Avigad, & A. Mahboubi (Eds.), Interactive Theorem Proving: 9th International Conference, ITP 2018. Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 9-12, 2018. Proceedings (pp. 160-177). (Lecture Notes in Computer Science; Vol. 10895). Springer. https://doi.org/10.1007/978-3-319-94821-8_10

Hartel, P. H. , & Junger, M. (2018). Computer Science. In R. Wortley, A. Sidebottom, N. Tilley, & G. Laycock (Eds.), Routledge Handbook of Crime Science: Every new technology brings new opportunity for crime, and information and communication technology (ICT) is no exception. This short article offers students of crime insights in the two main connections between ICT and criminology. On the one hand we show how ICT can be used as a tool, target, or location of crime. On the other hand we show how ICT can be used as a tool to study crime. (1 ed., pp. 179-189). Routledge. https://doi.org/10.4324/9780203431405

Kastenberg, H. , & Rensink, A. (2018). Graph Attribution Through Sub-Graphs. In R. Hecke, & G. Taentzer (Eds.), Graph Transformation, Specifications, and Nets: In Memory of Hartmut Ehrig (pp. 245-265). (Lecture Notes in Computer Science; Vol. 10800), (Theoretical Computer Science and General Issues). Springer. https://doi.org/10.1007/978-3-319-75396-6_14

Kastenberg, H. , & Rensink, A. (2018). Graph Attribution Through Sub-Graphs. In R. Heckel, & G. Taentzer (Eds.), Graph Transformation, Specifications, and Nets: In Memory of Hartmut Ehrig (Vol. 10800, pp. 245-265). (Lecture Notes in Computer Science; Vol. 10800). Springer International Publishing AG. https://doi.org/10.1007/978-3-319-75396-6_14

Konkoli, Z., Stepney, S. , Broersma, H., Dini, P., Nehaniv, C. L., & Nichele, S. (2018). Philosophy of Computation. In Computational Matter (pp. 153-184). (Natural Computing Series). Springer. https://doi.org/10.1007/978-3-319-65826-1_10

Kordon, F., Garavel, H., Hillah, L-M., Paviot-Adet, E., Jezequel, L., Hulin-Hubard, F., Amparore, E. G., Beccuti, M., Berthomieu, B., Evrard, H., Jensen, P. G., Botlan, D. L., Liebke, T. , Meijer, J., Srba, J., Thierry-Mieg, Y. , Pol, J. V. D., & Wolf, K. (2018). MCC'2017 - The Seventh Model Checking Contest. In M. Koutny, L. M. Kristensen, & W. Penczek (Eds.), Transactions on Petri Nets and Other Models of Concurrency XIII (pp. 181-209). (Lecture notes in computer science; Vol. 11090). https://doi.org/10.1007/978-3-662-58381-4_9

König, B., Nolte, D., Padberg, J. , & Rensink, A. (2018). A tutorial on graph transformation. In R. Heckel, & G. Taentzer (Eds.), Graph Transformation, Specifications, and Nets: In Memory of Hartmut Ehrig (pp. 83-104). (Lecture Notes in Computer Science; Vol. 10800), (Theoretical Computer Science and General Issues). Springer. https://doi.org/10.1007/978-3-319-75396-6_5

Lotte, F., Nam, C. S. , & Nijholt, A. (2018). Introduction: Evolution of Brain-Computer Interfaces. In C. S. Nam, A. Nijholt, & F. Lotte (Eds.), Brain-Computer Interfaces Handbook: Technological and Theoretical Advances (pp. 1-8). CRC Press. https://doi.org/10.1201/9781351231954

Moreira, J. L. , Ferreira Pires, L. , & van Sinderen, M. J. (2018). Semantic Interoperability for the IoT: Analysis of JSON for Linked Data. In M. Zelm, F-W. Jaekel, G. Doumeingts, & M. Wollschlaeger (Eds.), Enterprise Interoperability: Smart Services and Business Impact of Enterprise Interoperability (pp. 163-169). (Systems and Industrial Engineering Series). Wiley.

Moreira, J. L. , Ferreira Pires, L., Dockhorn Costa, P. , & van Sinderen, M. J. (2018). Semantic Interoperability of Early Warning Systems: a Systematic Literature Review. In Enterprise Interoperability: Smart Services and Business Impact of Enterprise Interoperability (pp. 407 - 413). Wiley.

Nam, C. S., Lotte, F. , & Nijholt, A. (2018). Conclusion: Moving Forward in Brain-Computer Interfaces. In C. S. Nam, A. Nijholt, & F. Lotte (Eds.), Brain-Computer Interfaces Handbook: Technological and Theoretical Advances (pp. 725). CRC Press. https://doi.org/10.1201/9781351231954

Nijholt, A. (2018). Multi-Brain Computing: BCI Monitoring and Real-Time Decision Making. In H. Ayaz, & F. Dehais (Eds.), Neuroergonomics: The Brain at Work and in Everyday Life (pp. 243). Elsevier. https://doi.org/10.1016/B978-0-12-811926-6.00056-7

Nijholt, A., Nam, C. S., & Lotte, F. (2018). Preface. In C. S. Nam, A. Nijholt, & F. Lotte (Eds.), Brain-Computer Interfaces Handbook: Technological and Theoretical Advances (pp. xiii). CRC Press. https://doi.org/10.1201/9781351231954

Singh, P. M. , van Sinderen, M. , & Wieringa, R. (2018). SmTIP: A Big Data Intergration Platform for Synchromodal Transport. In M. Zelm, F-W. Jaekel, G. Doumeingts, & M. Wollschlaeger (Eds.), Enterprise Interoperability: Smart Services and Business Impact of Enterprise Interoperability (pp. 187-192). Wiley.

Snaith, M. , op den Akker, H. , Beinema, T. C. , Bruijnes, M., Fides-Valero, Á. , Huizing, G. H., Kantharaju, R. , Klaassen, R. , Konsolakis, K. , Reidsma, D. , & Weusthof, M. H. H. (2018). A Demonstration of Multi-Party Dialogue Using Virtual Coaches: The First Council of Coaches Demonstrator. In S. Modgil, K. Budzynska, J. Lawrence, & K. Budzynska (Eds.), Computational Models of Argument (pp. 473-474). (Frontiers in Artificial Intelligence and Applications; Vol. 305). IOS Press. https://doi.org/10.3233/978-1-61499-906-5-473

Zambon, E. , & Rensink, A. (2018). Recipes for Coffee: Compositional Construction of Jave Control Flow Graphs in GROOVE. In P. Müller, & I. Schaefer (Eds.), Principled Software Development: Essays Dedicated to Arnd Poetzsch-Heffter on the Occasion of his 60th Birthday (pp. 305-323). Springer. https://doi.org/10.1007/978-3-319-98047-8_19

van Dijk, T. , & van de Pol, J. (2018). Multi-core Decision Diagrams. In Y. Hamadi, & L. Sais (Eds.), Handbook of Parallel Constraint Reasoning (pp. 509-545). Springer. https://doi.org/10.1007/978-3-319-63516-3_13

van Erp, J. B. F. (2018). Brain–Computer Interfaces and Haptics: A Literature Review. In Brain–Computer Interfaces Handbook: Technological and Theoretical Advances (1st ed.). Taylor & Francis. https://doi.org/10.1201%2F9781351231954-13

van Glabbeek, R., Höfner, P. , & van der Wal, D. (2018). Analysing AWN-specifications using mCRL2 (extended abstract). In C. A. Furia, & K. Winter (Eds.), Integrated Formal Methods - 14th International Conference, IFM 2018, Proceedings: 14th International Conference, IFM 2018, Maynooth, Ireland, September 5-7, 2018, Proceedings (pp. 398-418). (Lecture Notes in Computer Science; Vol. 11023). Springer. https://doi.org/10.1007/978-3-319-98938-9_23

van Sinderen, M., & Gusmeroli, S. (2018). Summary: Industrial Big Data Platforms Enabling Enterprise Interoperability for Smart Services. In M. Zelm, F-W. Jaekel, G. Doumeingts, & M. Wollschlaeger (Eds.), Enterprise Interoperability: Smart Services and Business Impact of Enterprise Interoperability (pp. 159-161). (Systems and Industrial Engineering Series). Wiley.

Conference article


Da Silva Reis, J., De Alencar Silva, P. , Bukhsh, F. A., & De Castro, A. F. (2018). Configuring value networks based on subjective business values. CEUR workshop proceedings, 2239, 158-170.

De Laat, M. , & Daneva, M. (2018). Empirical validation of a software requirements specification checklist. CEUR workshop proceedings, 2075.

Pelikan, H., Cheatle, A., Jung, M., & Jackson, S. (2018). Operating at a Distance-How a Teleoperated Surgical Robot Reconfigures Teamwork in the Operating Room. ACM Proceedings on Human-Computer Interaction, 2(CSCW), [138]. https://doi.org/10.1145/3274407


Yasmin, F. A. , Bukhsh, F. A., & De Alencar Silva, P. (2018). Process enhancement in process mining: A literature review. CEUR workshop proceedings, 2270, 65-72.

Conference contribution


Aakster, Y. , van Delden, R., & Lentelink, S. (2018). Lost puppy: Towards a playful intervention for wandering dementia patients. In A. D. Cheok, M. Inami, & T. Romao (Eds.), Advances in Computer Entertainment Technology: 14th International Conference, ACE 2017, Proceedings (pp. 84-102). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10714 LNCS). Springer. https://doi.org/10.1007/978-3-319-76270-8_7

Abate, A., Blom, H., Cauchi, N., Haesaert, S. , Hartmanns, A., Lesser, K., Oishi, M., Sivaramakrishnan, V., Soudjani, S., Vasile, C. I., & Vinod, A. P. (2018). ARCH-COMP18 Category Report: Stochastic Modelling. In G. Frehse, M. Althoff, S. Bogomolov, & T. T. Johnson (Eds.), Proceedings of the 5th International Workshop on Applied Verification of Continuous and Hybrid Systems (ARCH 2018) (Vol. 54, pp. 71-103). (EPiC Series in Computing). EasyChair. https://doi.org/10.29007/7ks7

Abate, A. , Budde, C. E., Cauchi, N., Hoque, K. A. , & Stoelinga, M. I. A. (2018). Assessment of Maintenance Policies for Smart Buildings: Application of Formal Methods to Fault Maintenance Trees. In Proceedings of the European Conference of the PHM Society (1 ed., Vol. 4). (Proceedings of the European Conference of the PHM Society). PHM society. https://www.phmpapers.org/index.php/phme/article/view/385

Abate, A. , Budde, C. E., Cauchi, N. , van Harmelen, A., Hoque, K. A. , & Stoelinga, M. I. A. (2018). Modelling Smart Buildings Using Fault Maintenance Trees. In R. Bakhshi, P. Ballarini, B. Barbot, H. Castel-Taleb, & A. Remke (Eds.), Computer Performance Engineering: 15th European Workshop, EPEW 2018, Paris, France, October 29-30, 2018, Proceedings (pp. 110-125). (Lecture Notes in Computer Science; Vol. 11178). Springer. https://doi.org/10.1007/978-3-030-02227-3_8



Aldea, A., Kusumaningrum, M. C. , Iacob, M. , & Daneva, M. (2018). Modeling and Analyzing Digital Business Ecosystems: An Approach and Evaluation. In M. Brichni, C. Huemer, H. A. Proper, D. Rozier, S. Guerreiro, W. Guedria, I. Razo-Zapata, M. M. Komarov, S. Strecker, C. Feltus, & S. V. Maltseva (Eds.), 2018 IEEE 20th Conference on Business Informatics (CBI) (pp. 156-163). (IEEE Conference on Business Informatics (CBI); Vol. 2018). IEEE. https://doi.org/10.1109/CBI.2018.10064

Aleksandrowicz, G., Arbel, E., Bloem, R. , ter Braak, T. D., Devadze, S., Fey, G., Jenihhin, M., Jutman, A. , Kerkhoff, H. G., Könighofer, R., Koyfman, S., Malburg, J., Moran, S., Raik, J., Rauwerda, G., Riener, H., Röck, F., Shibin, K., Sunesen, K. , ... Zhao, Y. (2018). Designing Reliable Cyber-Physical Systems. In R. Wille, & F. Fummi (Eds.), Languages, Design Methods, and Tools for Electronic System Design - Selected Contributions from FDL 2016 (pp. 15-38). (Lecture Notes in Electrical Engineering; Vol. 454). Springer Verlag. https://doi.org/10.1007/978-3-319-62920-9_2


Ali, G. , Pathrose Vareed, J. , & Kerkhoff, H. G. (2018). On‐Chip Lifetime Prediction for Dependable Many‐Processor SoCs based on Data Fusion. In 2018 IEEE 12th International Symposium on Embedded Multicore/Many-core Systems-on-Chip (MCSoC) (pp. 44-51) https://doi.org/10.1109/MCSoC2018.2018.00019

Alsaqaf, W. , Daneva, M. , & Wieringa, R. (2018). Understanding challenging situations in agile quality requirements engineering and their solution strategies: Insights from a case study. In G. Ruhe, W. Maalej, & D. Amyot (Eds.), Proceedings - 2018 IEEE 26th International Requirements Engineering Conference, RE 2018 (pp. 274-285). [8491142] IEEE. https://doi.org/10.1109/RE.2018.00035

Alsaqaf, W. , Daneva, M. , & Wieringa, R. J. (2018). Quality requirements challenges in the context of large-scale distributed agile: An empirical study. In E. Kamsties, J. Horkoff, & F. Dalpiaz (Eds.), Requirements Engineering: Foundation for Software Quality - 24th International Working Conference, REFSQ 2018, Utrecht, The Netherlands, March 19-22, 2018. Proceedings (pp. 139-154). (Lecture Notes in Computer Science; Vol. 10753). Springer. https://doi.org/10.1007/978-3-319-77243-1_9

Amighi, A. , Huisman, M. , & Blom, S. (2018). Verification of Shared-Reading Synchronisers. In S. Bensalem, & S. Bliudze (Eds.), Proceedings of the 1st International Workshop on Methods and Tools for Rigorous System Design (Metrid) (pp. 107-120). (Electronic Proceedings in Theoretical Computer Science, EPTCS; Vol. 272). https://doi.org/10.4204/EPTCS.272.9

Apriyanti, D. H. , Spreeuwers, L. J. , & Veldhuis, R. N. J. (2018). Breaking Out of the Black Box in Automated Flower Recognition. In L. Spreeuwers, & J. Goseling (Eds.), Proceedings of the 2018 Symposium on Information Theory and Signal Processing in the Benelux: May 31-1 June, 2018, University of Twente, Enschede, The Netherlands (pp. 28-34). Werkgemeenschap voor Informatie- en Communicatietheorie (WIC). https://www.utwente.nl/en/eemcs/sitb2018/sitb2018proceedings.pdf

Ayele, E. D. , Meratnia, N. , & Havinga, P. J. M. (2018). MANER: Managed Data Dissemination Scheme for LoRa IoT Enabled Wildlife Monitoring System (WMS). In 2018 9th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2018 - Proceedings IEEE. https://doi.org/10.1109/NTMS.2018.8328701

Babur, Ö., Cleophas, L., van den Brand, M., Tekinerdogan, B. , & Aksit, M. (2018). Models, More Models, and Then a Lot More. In S. Zschaler, & M. Seidl (Eds.), Software Technologies: Applications and Foundations - STAF 2017 Collocated Workshops, Revised Selected Papers (pp. 129-135). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10748 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-319-74730-9_10

Barbosa, P. , Dearo Garcia, K., & Mendes-Moreira, J. (2018). Unsupervised Domain Adaptation for Human Activity Recognition. In H. Yin, P. Novais, D. Camacho, & A. J. Tallón-Ballesteros (Eds.), Intelligent Data Engineering and Automated Learning – IDEAL 2018 - 19th International Conference, Proceedings: IDEAL 2018 (pp. 623-630). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11314 LNCS). Springer. https://doi.org/10.1007/978-3-030-03493-1_65

Berkel, A. R. R. , Singh, P. M. , & van Sinderen, M. J. (2018). An information security architecture for smart cities. In B. Shishkov (Ed.), Business Modeling and Software Design: 8th International Symposium, BMSD 2018, Vienna, Austria, July 2-4, 2018, Proceedings (pp. 167 - 184). (Lecture Notes in Business Information Processing; Vol. 319). Springer. https://doi.org/10.1007/978-3-319-94214-8_11

Bloemen, V., van Zelst, S. J., van der Aalst, W. M. P., van Dongen, B. F. , & van de Pol, J. (2018). Maximizing Synchronization for Aligning Observed and Modelled Behaviour. In M. Weske, M. Montali, J. vom Brocke, & I. Weber (Eds.), Business Process Management: 16th International Conference, BPM 2018, Sydney, NSW, Australia, September 9–14, 2018, Proceedings (Vol. 11080, pp. 233-249). Springer. https://doi.org/10.1007/978-3-319-98648-7_14

Boerman, J. , Huisman, M. , & Joosten, S. J. C. (2018). Reasoning About JML: Differences Between KeY and OpenJML. In C. A. Furia, & K. Winter (Eds.), Integrated Formal Methods: 14th International Conference, IFM 2018, Maynooth, Ireland, September 5-7, 2018. Proceedings (pp. 30-46). [3] (Lecture Notes in Computer Science; Vol. 11023). Springer. https://doi.org/10.1007/978-3-319-98938-9_3

Bos, P. V. D. , & Stoelinga, M. (2018). Tester versus Bug: A Generic Framework for Model-Based Testing via Games. In A. Orlandini, & M. Zimmermann (Eds.), Proceedings Ninth International Symposium on Games, Automata, Logics, and Formal Verification, GandALF 2018, Saarbrücken, Germany, 26-28th September 2018. (pp. 118-132). (Electronic Proceedings in Theoretical Computer Science (EPTCS); Vol. 277). Dagstuhl. https://doi.org/10.4204/EPTCS.277.9

Bucur, D. (2018). On the Gender of Books: Author Gender Mixing in Book Communities. In C. Cherifi, H. Cherifi, M. Karsai, & M. Musolesi (Eds.), Complex Networks and Their Applications VI: Proceedings of Complex Networks 2017 (The Sixth International Conference on Complex Networks and Their Applications) (pp. 797-808). (Studies in Computational Intelligence; Vol. 689). Springer. https://doi.org/10.1007/978-3-319-72150-7_64

Bucur, D., Iacca, G., Marcelli, A., Squillero, G., & Tonda, A. (2018). Evaluating surrogate models for multi-objective influence maximization in social networks. In GECCO 2018 Companion : Proceedings of the 2018 Genetic and Evolutionary Computation Conference Companion (pp. 1258-1265). Association for Computing Machinery (ACM). https://doi.org/10.1145/3205651.3208238

Bucur, D., Iacca, G., Marcelli, A., Squillero, G., & Tonda, A. (2018). Improving Multi-objective Evolutionary Influence Maximization in Social Networks. In K. Sim, & P. Kaufmann (Eds.), Applications of Evolutionary Computation: 21st International Conference, EvoApplications 2018, Proceedings (pp. 117-124). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10784 LNCS). Springer. https://doi.org/10.1007/978-3-319-77538-8_9

Budde, C. E., D'Argenio, P. R. , Hartmanns, A., & Sedwards, S. (2018). A Statistical Model Checker for Nondeterminism and Rare Events. In D. Beyer, & M. Huisman (Eds.), Proceedings of the 24th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2018) (pp. 340-358). (Lecture Notes in Computer Science; Vol. 10806). Springer. https://doi.org/10.1007/978-3-319-89963-3_20

Bukhsh, F. A. B., & Weigand, H. W. (2018). Compliance Checking of Shipment Request by Utilizing Process Mining Concepts: An Evaluation of Smart Auditing Framework. In 2017 International Conference on Frontiers of Information Technology (FIT) (pp. 235-240). IEEE. https://doi.org/10.1109/FIT.2017.00049

Bukhsh, F. A., Arachchige, J. J., & Malik, F. (2018). Analyzing excessive user feedback: A big data challenge. In 2018 International Conference on Frontiers of Information Technology (FIT) (pp. 206-211) https://doi.org/10.1109/FIT.2018.00043

Bukhsh, F. A., De Alencar Silva, P. , & Wienen, H. (2018). Data pre-processing: Case of sensor data consistency based on Bi-temporal concepts. In 2017 13th International Conference on Emerging Technologies (ICET) (pp. 1-6). IEEE. https://doi.org/10.1109/ICET.2017.8281746

Bunt, H., Gilmartin, E., Keizer, S., Pelachaud, C., Petukhova, V., Prévot, L. , & Theune, M. (2018). Downward compatible revision of dialogue annotation. In Proceedings of the 14th Joint ACL-ISO Workshop on Interoperable Semantic Annotation (pp. 21-34). [W18-4703] Association for Computational Linguistics (ACL). http://www.aclweb.org/anthology/W18-4703

Canavan, S. J., Andujar, M., Yin, L. , Nijholt, A., & Schotter, E. (2018). Ubiquitous Emotion Recognition with Multimodal Mobile Interfaces. In UbiComp/ISWC 2018 - Adjunct Proceedings of the 2018 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2018 ACM International Symposium on Wearable Computers (pp. 937-941). Association for Computing Machinery (ACM). https://doi.org/10.1145/3267305.3274139

Catala, A., Sylla, C. , Theune, M., Brooks, E., & Read, J. C. (2018). Rethinking children's co-creation processes beyond the design of TUIs. In IDC 2018 - Proceedings of the 2018 ACM Conference on Interaction Design and Children (pp. 733-740). Association for Computing Machinery (ACM). https://doi.org/10.1145/3202185.3205870

Catoire, M., Krom, B. N. , & van Erp, J. B. F. (2018). Towards a Test Battery to Benchmark Dexterous Performance in Teleoperated Systems. In D. Prattichizzo, H. Shinoda, H. Z. Tan, E. Ruffaldi, & A. Frisoli (Eds.), Haptics: Science, Technology, and Applications: 11th International Conference, EuroHaptics 2018, Pisa, Italy, June 13-16, 2018, Proceedings, Part II (pp. 440-451). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10894 LNCS). Springer. https://doi.org/10.1007/978-3-319-93399-3_38

Chilipirea, C., Dobre, C. , Baratchi, M. , & van Steen, M. R. (2018). Identifying movements in noisy crowd analytics data. In 19th International Conference on Mobile Data Management (MDM) (pp. 161-166). IEEE. https://doi.org/10.1109/MDM.2018.00033

Chromik, J. J. , Haverkort, B. R. H. M. , Remke, A. K. I., Pilch, C., Brackmann, P., Duhme, C., Everinghoff, F., Giberlein, A., Teodorowicz, T., & Wieland, J. (2018). Context-aware local Intrusion Detection in SCADA systems: a testbed and two showcases. In 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm) IEEE. https://doi.org/10.1109/SmartGridComm.2017.8340672

Chromik, J. J. , Remke, A. , & Haverkort, B. R. (2018). Bro in SCADA: dynamic intrusion detection policies based on a system model. In 5th International Symposium for ICS&SCADA Cyber Security Research (ICS-CSR 2018) (pp. 112-121). BCS Learning & Development Ltd..

Ciccozzi, F., Famelis, M., Kappel, G., Mosser, S., Paige, R. F., Pierantonio, A. , Rensink, A., Salay, R., Taentzer, G., Valecillo, A., & Wimmer, M. (2018). How do we teach modelling and model-driven engineering? A survey. In Ö. Babur, D. Strüber, & S. Abrahão (Eds.), MODELS'18. Proceedings of the 21st ACM/IEEE International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings (pp. 122-129). ACM Press. https://doi.org/10.1145/3270112.3270129

Ciccozzi, F., Lambers, L., Pierantonio, A., Taentzer, G., Famelis, M., Mosser, S. , Rensink, A., Vallecillo, A., Kappel, G., Paige, R. F., Salay, R., & Wimmer, M. (2018). Towards a body of knowledge for model-based software engineering. In Ö. Babur, D. Strüber, & S. Abrahão (Eds.), MODELS'18. Proceedings of the 21st ACM/IEEE International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings (pp. 82-89). ACM Press. https://doi.org/10.1145/3270112.3270121

D'Argenio, P. R. , Gerhold, M. , Hartmanns, A., & Sedwards, S. (2018). A Hierarchy of Scheduler Classes for Stochastic Automata. In C. Baier, & U. Dal Lago (Eds.), Proceedings of the 21st International Conference on Foundations of Software Science and Computation Structures (FoSSaCS 2018) (pp. 384-402). (Lecture Notes in Computer Science; Vol. 10803). Springer. https://doi.org/10.1007/978-3-319-89366-2_21

D'Argenio, P. R. , Hartmanns, A., & Sedwards, S. (2018). Lightweight Statistical Model Checking in Nondeterministic Continuous Time. In T. Margaria, & B. Steffen (Eds.), Proceedings of the 8th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2018) (Vol. 11245, pp. 336-353). (Lecture Notes in Computer Science; Vol. 11245). Springer. https://doi.org/10.1007/978-3-030-03421-4_22

Daneva, M. (2018). Using crowdsourced data for empirical research in information systems: What it is and how to do it safe? In 2018 12th International Conference on Research Challenges in Information Science, RCIS 2018 (Proceedings International Conference on Research Challenges in Information Science (RCIS); Vol. 2018). IEEE Computer Society. https://doi.org/10.1109/RCIS.2018.8406646

Daneva, M., & Lazarov, B. (2018). Requirements for smart cities: Results from a systematic review of literature. In 2018 12th International Conference on Research Challenges in Information Science, RCIS 2018 (Proceedings International Conference on Research Challenges in Information Science (RCIS); Vol. 2018). IEEE Computer Society. https://doi.org/10.1109/RCIS.2018.8406655

Daneva, M. , & Wang, C. (2018). Security requirements engineering in the agile era: How does it work in practice? In X. Franch, A. Jedlitschka, D. M. Fernandez, & M. Oivo (Eds.), 2018 IEEE 1st International Workshop on Quality Requirements in Agile Projects (QuaRAP) (pp. 10-13). [8501269] IEEE. https://doi.org/10.1109/QuaRAP.2018.00008

Daneva, M. , Sikkel, K. , Condori-Fernandez, N., & Herrmann, A. (2018). Experiences in using practitioner's checklists to evaluate the industrial relevance of requirements engineering experiments. In Proceedings 2018 ACM/IEEE 6th International Workshop on Conducting Empirical Studies in Industry, CESI 2018 (pp. 5-12). IEEE. https://doi.org/10.1145/3193965.3193966

Daneva, M. , Wang, C., Herrmann, A. , & Condori-Fernandez, N. (2018). Understanding the soft skills that industry wants from requirements engineers: A focus group study. In K. Schmid (Ed.), REFSQ-JP 2018: REFSQ 2018 Joint Proceedings of the Co-Located Events (CEUR workshop proceedings; Vol. 2075). CEUR. http://ceur-ws.org/Vol-2075/LS_paper1.pdf

De Vries, W. B., Van Rijswijk-Deij, R. , De Boer, P. T. , & Pras, A. (2018). Passive Observations of a Large DNS Service: 2.5 Years in the Life of Google. In 2018 Network Traffic Measurement and Analysis Conference (TMA) [8506536] IEEE. https://doi.org/10.23919/TMA.2018.8506536

Dearo Garcia, K., de Carvalho, A. C. P. L. F., & Mendes-Moreira, J. (2018). A cluster based prototype reduction for online classification. In H. Yin, D. Camacho, P. Novais, & A. J. Tallón-Ballesteros (Eds.), Intelligent Data Engineering and Automated Learning - IDEAL 2018: 19th International Conference, Madrid, Spain, November 21–23, 2018, Proceedings, Part I (pp. 603-610). (Lecture Notes in Computer Science; Vol. 11314). Springer. https://doi.org/10.1007/978-3-030-03493-1_63

Divasón, J. , Joosten, S. J. C., Thiemann, R., & Yamada, A. (2018). A Perron-Frobenius Theorem for Jordan Blocks for Complexity Proving. In S. Lucas (Ed.), 16th International Workshop on Termination: WST 2018, July 18-19. 2018, Oxford, UK (pp. 30-34) http://wst2018.webs.upv.es/wst2018proceedings.pdf

Divasón, J. , Joosten, S., Kuncar, O., Thiemann, R., & Yamada, A. (2018). Efficient certification of complexity proofs: formalizing the Perron--Frobenius theorem (invited talk paper). In A. Felty, & J. Andronick (Eds.), Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs (pp. 2-13) https://doi.org/10.1145/3167103

Ebrahimi, H. , & Kerkhoff, H. G. (2018). Intermittent Resistance Fault Detection at Board Level. In 2018 IEEE 21st International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS)

El Hakim, V. S. , & Bekooij, M. J. G. (2018). Stability Verification of Self-Timed Control Systems using Model-Checking. In M. Novotný, N. Konofaos, & A. Skavhaug (Eds.), 2018 21st Euromicro Conference on Digital System Design (DSD) (pp. 312-319). IEEE. https://doi.org/10.1109/DSD.2018.00062

Fehnker, A. , & Chaudhary, K. (2018). Twenty Percent and a Few Days: Optimising a Bitcoin Majority Attack. In A. Dutle, C. Muñoz, & A. Narkawicz (Eds.), NASA Formal Methods: 10th International Symposium, NFM 2018 Newport News, VA, USA, April 17-19, 2018 Proceedings (pp. 157-163). (Lecture Notes in Computer Science; Vol. 10811). Springer. https://doi.org/10.1007/978-3-319-77935-5_11

Fehnker, A. , Chaudhary, K., & Mehta, V. (2018). An Even Better Approach: Improving the B.A.T.M.A.N. Protocol Through Formal Modelling and Analysis. In A. Dutle, C. Muñoz, & A. Narkawicz (Eds.), NASA Formal Methods: 10th International Symposium, NFM 2018 Newport News, VA, USA, April 17-19, 2018 Proceedings (pp. 164-178). (Lecture Notes in Computer Science; Vol. 10811). Springer. https://doi.org/10.1007/978-3-319-77935-5_12

Felderer, M., Gurov, D. , Huisman, M., Lisper, B., & Schlick, R. (2018). Formal Methods in Industrial Practice: Bridging the Gap (Track Summary). In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice: 8th International Symposium, ISoLA 2018, Limassol, Cyprus, November 5-9, 2018, Proceedings, Part IV (pp. 77-81). (Lecture Notes in Computer Science; Vol. 11247). Springer. https://doi.org/10.1007/978-3-030-03427-6_10

Ferling, B. , Chromik, J. J. , Caselli, M. , & Remke, A. K. I. (2018). Intrusion Detection for sequence-based attacks with reduced traffic models. In R. German, K-S. Hielscher, & U. R. Krieger (Eds.), Measurement, Modelling and Evaluation of Computing Systems: 19th International GI/ITG Conference, MMB 2018, Erlangen, Germany, February 26-28, 2018, Proceedings (pp. 53-67). Springer. https://doi.org/10.1007/978-3-319-74947-1_4

Franck, T. , Iacob, M. E. , van Sinderen, M. , & Wombacher, A. (2018). Towards an integrated architecture model of smart manufacturing enterprises. In B. Shishkov (Ed.), Business Modeling and Software Design: 7th International Symposium, BMSD 2017, Revised Selected Papers (pp. 112-133). (Lecture Notes in Business Information Processing; Vol. 309). Springer Verlag. https://doi.org/10.1007/978-3-319-78428-1_6

Gasser, O., Lone, Q., Scheitle, Q., Korczyński, M., Foremski, P., Strowes, S. D. , Hendriks, L., & Carle, G. (2018). Clusters in the expanse: Understanding and unbiasing IPv6 Hitlists. In IMC 2018 - Proceedings of the Internet Measurement Conference (pp. 364-378). Association for Computing Machinery (ACM). https://doi.org/10.1145/3278532.3278564

Gatti, L., van der Lee, C. , & Theune, M. (2018). Template-based multilingual football reports generation using Wikidata as a knowledge base. In Proceedings of the 11th International Conference on Natural Language Generation (pp. 183-188). Association for Computational Linguistics (ACL). http://aclweb.org/anthology/W18-6523

Georgakis, C., Panagakis, Y. , & Pantic, M. (2018). Behavior Prediction In-The-Wild. In 2017 Seventh International Conference on Affective Computing and Intelligent Interaction Workshops and Demos (ACIIW) IEEE. https://doi.org/10.1109/ACIIW.2017.8272617

Gerhold, M. , Hartmanns, A. , & Stoelinga, M. (2018). Model-Based Testing for General Stochastic Time. In A. Dutle, C. Munoz, & A. Narkawicz (Eds.), Proceedings of the 10th International NASA Formal Methods Symposium (NFM 2018) (pp. 203-219). (Lecture Notes in Computer Science; Vol. 10811). Springer. https://doi.org/10.1007/978-3-319-77935-5_15

Goedicke, D. , Li, J. J. , Evers, V., & Ju, W. (2018). VR-OOM: Virtual Reality On-rOad driving siMulation. In CHI '18. Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems [165] https://doi.org/10.1145/3173574.3173739


Haasnoot, E., Khodabakhsh, A. , Zeinstra, C. , Spreeuwers, L. , & Veldhuis, R. (2018). FEERCI: A Package for Fast Non-Parametric Confidence Intervals for Equal Error Rates in Amortized O(m log n). In A. Bromme, A. Uhl, C. Busch, C. Rathgeb, & A. Dantcheva (Eds.), 2018 International Conference of the Biometrics Special Interest Group, BIOSIG 2018 [8553607] (International Conference of the Biometrics Special Interest Group (BIOSIG); Vol. 2018). IEEE. https://doi.org/10.23919/BIOSIG.2018.8553607

Hartmanns, A., Junges, S. , Katoen, J-P., & Quatmann, T. (2018). Multi-cost Bounded Reachability in MDP. In D. Beyer, & M. Huisman (Eds.), Proceedings of the 24th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2018) (pp. 320-339). (Lecture Notes in Computer Science; Vol. 10806). Springer. https://doi.org/10.1007/978-3-319-89963-3_19

Heijblom, R., Postma, W., Natarajan, V. , & Stoelinga, M. (2018). DFT Analysis Incorporating Spare Parts in Fault Trees. In 2018 Annual Reliability and Maintainability Symposium, RAMS 2018 [8463074] (Proceedings - Annual Reliability and Maintainability Symposium; Vol. 2018-January). IEEE. https://doi.org/10.1109/RAM.2018.8463074

Heron, L. , Kim, J., Lee, M., El Haddad, K., Dupont, S., Dutoit, T. , & Truong, K. P. (2018). A Dyadic Conversation Dataset on Moral Emotions. In 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018) (pp. 687-691). IEEE. https://doi.org/10.1109/FG.2018.00108

Hinze, N., Nawrocki, M. , Jonker, M., Dainotti, A., Schmidt, T. C., & Waehlisch, M. (2018). On the Potential of BGP Flowspec for DDoS Mitigation at Two Sources: ISP and IXP. In SIGCOMM '18 Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos (pp. 57-59) https://doi.org/10.1145/3234200.3234209


Hoogsteen, G. , Gerards, M. E. T. , & Hurink, J. L. (2018). On the Scalability of Decentralized Energy Management using Profile Steering. In Proceedings - 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe, ISGT-Europe 2018 [8571823] IEEE. https://doi.org/10.1109/ISGTEurope.2018.8571823

Huisman, M. (2018). On Models and Code: A Unified Approach to Support Large-Scale Deductive Program Verification. In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation. Modeling: 8th International Symposium, ISoLA 2018, Limassol, Cyprus, November 5-9, 2018, Proceedings, Part I (pp. 111-118). (Lecture Notes in Computer Science; Vol. 11244). Springer. https://doi.org/10.1007/978-3-030-03418-4_7

Huisman, M. , & Joosten, S. J. C. (2018). Towards Reliable Concurrent Software. In P. Müller, & I. Schaefer (Eds.), Principled Software Development: Essays Dedicated to Arnd Poetzsch-Heffter on the Occasion of his 60th Birthday (pp. 129-146). (Principled Software Development). Springer. https://doi.org/10.1007/978-3-319-98047-8_9

Huisman, M. , Blom, S. , Darabi, S. , & Safari, M. (2018). Program Correctness by Transformation. In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation. Modeling: 8th International Symposium, ISoLA 2018, Limassol, Cyprus, November 5-9, 2018, Proceedings, Part I (pp. 365-380). (Lecture Notes in Computer Science; Vol. 11244). Springer. https://doi.org/10.1007/978-3-030-03418-4_22

Huistra, D. , Meijer, J. , & Pol, J. V. D. (2018). Adaptive Learning for Learn-Based Regression Testing. In F. Howar, & J. Barnat (Eds.), Formal Methods for Industrial Critical Systems: 23rd International Conference, FMICS 2018, Maynooth, Ireland, September 3-4, 2018, Proceedings (pp. 162-177). (Lecture Notes in Computer Science; Vol. 11119). Springer. https://doi.org/10.1007/978-3-030-00244-2_11

Iacob, M. E., Monteban, J. , Van Sinderen, M., Hegeman, E., & Bitaraf, K. (2018). Measuring Enterprise Architecture Complexity. In 2018 IEEE 22nd International Enterprise Distributed Object Computing Conference Workshops, EDOCW 2018 (pp. 115-124). [8536112] IEEE. https://doi.org/10.1109/EDOCW.2018.00026

Ionita, D., Ford, M. , Vasenev, A. , & Wieringa, R. J. (2018). Graphical Modeling of Security Arguments: Current State and Future Directions. In P. Liu, S. Mauw, & K. Stolen (Eds.), Graphical Models for Security: 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers (pp. 1 - 16). (Lecture Notes in Computer Science; Vol. 10744). Springer. https://doi.org/10.1007/978-3-319-74860-3_1

Jansen, M-P. , Heylen, D. K. J. , Truong, K. P. , Nazareth, D. S. , & Englebienne, G. (2018). The MULAI Corpus: Multimodal Recordings of Spontaneous Laughter in Dyadic Interaction. In J. Ginzburg, & C. Pelachaud (Eds.), Proceedings of Laughter Workshop 2018 (pp. 58-63)

Jonker, M. , Pras, A., Dainotti, A. , & Sperotto, A. (2018). A First Joint Look at DoS Attacks and BGP Blackholing in the Wild. In Proceedings of the ACM Internet Measurement Conference 2018 (pp. 457-463) https://doi.org/10.1145/3278532.3278571

Joosten, S. J. C. , & Huisman, M. (2018). Static Code Verification Through Process Models. In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation. Distributed Systems: 8th International Symposium, ISoLA 2018, Limassol, Cyprus, November 5-9, 2018, Proceedings, Part III (pp. 343-354). (Lecture Notes in Computer Science; Vol. 11246). Springer. https://doi.org/10.1007/978-3-030-03424-5_23

Junges, S. , Katoen, J. P. , Stoelinga, M. I. A., & Volk, M. (2018). One Net Fits All: A Unifying Semantics of Dynamic Fault Trees Using GSPNs. In V. Khomenko, & O. H. Roux (Eds.), Application and Theory of Petri Nets and Concurrency: 39th International Conference, PETRI NETS 2018, Bratislava, Slovakia, June 24-29, 2018, Proceedings (pp. 272-293). (Lecture notes in computer science; Vol. 10877). Springer. https://doi.org/10.1007/978-3-319-91268-4_14

Kamali, M. , & Fehnker, A. (2018). Adaptive Formal Framework for WMN Routing Protocols. In Formal Aspects of Component Software: 15th International Conference, FACS 2018, Pohang, South Korea, October 10-12, 2018, Proceedings (pp. 175-195). (Lecture notes in computer science; Vol. 11222). https://doi.org/10.1007/978-3-030-02146-7_9

Kerkers, M. , Chromik, J. J. , Remke, A. K. I. , & Haverkort, B. R. H. M. (2018). A Tool for Generating Automata of IEC60870-5-104 Implementations. In R. German, K-S. Hielscher, & U. R. Krieger (Eds.), Measurement, Modelling and Evaluation of Computing Systems: 19th International GI/ITG Conference, MMB 2018, Erlangen, Germany, February 26-28, 2018, Proceedings (pp. 307-311). (Lecture notes in computer science; Vol. 10740). https://doi.org/10.1007/978-3-319-74947-1_23

Khodabakhsh, A. , Haasnoot, E., & Bours, P. (2018). Predicted Templates: Learning-curve Based Template Projection for Keystroke Dynamics. In A. Bromme, A. Uhl, C. Busch, C. Rathgeb, & A. Dantcheva (Eds.), 2018 International Conference of the Biometrics Special Interest Group, BIOSIG 2018 [8553293] (International Conference of the Biometrics Special Interest Group (BIOSIG); Vol. 2018). IEEE. https://doi.org/10.23919/BIOSIG.2018.8553293

Kolkmeier, J., Harmsen, E., Giesselink, S. , Reidsma, D. , Theune, M. , & Heylen, D. K. J. (2018). With a Little Help from a Holographic Friend: The OpenIMPRESS Mixed Reality Telepresence Toolkit for Remote Collaboration Systems. In S. N. Spencer (Ed.), VRST'18: Proceedings of the 24th ACM Symposium on Virtual Reality Software and Technology (pp. 1-11). [3281542] ACM Press. https://doi.org/10.1145/3281505.3281542

Kopp, H. , Kargl, F., Bösch, C. , & Peter, A. (2018). uMine: A Blockchain Based on Human Miners. In Information and Communications Security: 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings (pp. 20-38). Springer. https://doi.org/10.1007/978-3-030-01950-1_2

Kumar, R. , Rensink, A. , & Stoelinga, M. I. A. (2018). LOCKS: a property specification language for security goals. In H. M. Haddad, R. L. Wainwright, & R. Chbeir (Eds.), SAC '18: Proceedings of the 33rd Annual ACM Symposium on Applied Computing (pp. 1907-1915). Association for Computing Machinery (ACM). https://doi.org/10.1145/3167132.3167336

Kumar, R. , Schivo, S. , Ruijters, E. J. J. , Yildiz, B. M. , Huistra, D. J., Brandt, J. , Rensink, A. , & Stoelinga, M. I. A. (2018). Effective Analysis of Attack Trees: A Model-Driven Approach. In A. Russo, & A. Schürr (Eds.), Proceedings of the 21st International Conference on Fundamental Approaches to Software Engineering (FASE 2018) (pp. 56-73). (Lecture Notes in Computer Science; Vol. 10802). Springer. https://doi.org/10.1007/978-3-319-89363-1_4

Körner, P., Leuschel, M. , & Meijer, J. (2018). State-of-the-Art Model Checking for B and Event-B Using ProB and LTSmin. In C. A. Furia, & K. Winter (Eds.), Integrated Formal Methods - 14th International Conference, IFM 2018, Proceedings: 14th International Conference, IFM 2018, Maynooth, Ireland, September 5-7, 2018, Proceedings (pp. 275-295). (Lecture Notes in Computer Science; Vol. 11023). Springer. https://doi.org/10.1007/978-3-319-98938-9_16

Le, D. V. , Kamminga, J. , Scholten, H. , & Havinga, P. J. M. (2018). A Framework to Measure Reliance of Acoustic Latency on Smartphone Status. In 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2018 (pp. 348-354). [8480354] IEEE. https://doi.org/10.1109/PERCOMW.2018.8480354


Le, D. V., Nguyen, T. , Scholten, H. , & Havinga, P. J. M. (2018). Probability of Task Completion and Energy Consumption in Cooperative Pervasive Mobile Computing. In 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2018 (pp. 34-39). [8480135] IEEE. https://doi.org/10.1109/PERCOMW.2018.8480135

Le, D. V. , Van Kleunen, W. A. P., Nguyen, T. , Meratnia, N. , & Havinga, P. J. M. (2018). SomBe: Self-Organizing Map for Unstructured and Non-Coordinated iBeacon Constellations. In 2018 IEEE International Conference on Pervasive Computing and Communications, PerCom 2018 [8444584] IEEE. https://doi.org/10.1109/PERCOM.2018.8444584

Lestriandoko, N. H. , Spreeuwers, L. , & Veldhuis, R. (2018). The Behavior of Principal Component Analysis and Linear Discriminant Analysis (PCA-LDA) for Face Recognition. In L. Spreeuwers, & J. Goseling (Eds.), Proceedings of the 2018 Symposium on Information Theory and Signal Processing in the Benelux: May 31-1 June, 2018, University of Twente, Enschede, The Netherlands (pp. 133-148). Werkgemeenschap voor Informatie- en Communicatietheorie (WIC). https://www.utwente.nl/en/eemcs/sitb2018/sitb2018proceedings.pdf

Li, D. , & van der Veer, G. C. (2018). The evolution of visual art: From painting to interaction design. In M. Winckler, T. Clemmensen, V. Rajamanickam, H. Petrie, & P. Dannenmann (Eds.), Global Thoughts, Local Designs - INTERACT 2017 IFIP TC 13 Workshops, Revised Selected Papers (pp. 33-44). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10774 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-319-92081-8_4

Man, R. D. , & Fehnker, A. (2018). The Smell of Processing. In B. M. McLaren, R. Reilly, S. Zvacek, & J. Uhomoibhi (Eds.), Proceedings of the 10th International Conference on Computer Supported Education (Vol. 2, pp. 420-431) https://doi.org/10.5220/0006701704200431

Meijer, J. , & van de Pol, J. (2018). Sound Black-Box Checking in the LearnLib. In A. Dutle, C. A. Muñoz, & A. Narkawicz (Eds.), NASA Formal Methods: 10th International Symposium, NFM 2018, Newport News, VA, USA, April 17-19, 2018, Proceedings (pp. 349-366). (Lecture Notes in Computer Science; Vol. 10811). Springer. https://doi.org/10.1007/978-3-319-77935-5_24

Meijerink, B. J. , & Heijenk, G. (2018). Implementation and Evaluation of Distributed Geographical Routing. In K. R. Chowdhury, M. Di Felice, I. Matta, & B. Sheng (Eds.), Wired/Wireless Internet Communications: 16th IFIP WG 6.2 International Conference, WWIC 2018, Boston, MA, USA, June 18–20, 2018, Proceedings (pp. 121-133). (Lecture notes in computer science; Vol. 10866). https://doi.org/10.1007/978-3-030-02931-9_10

Mikhael, M. R. M. , Oude Alink, M. S. , & Kokkeler, A. B. J. (2018). A cross-correlation sub-sampling receiver for low power applications in a low SINR environment. In 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) (pp. 1108). IEEE. https://doi.org/10.1109/IEMCON.2018.8614927

Milz, T. , & Seifert, C. (2018). Analysing Author Self-Citations in Computer Science Publications. In M. Elloumi, M. Granitzer, A. Hameurlain, C. Seifert, B. Stein, A. Min Tjoa, & R. Wagner (Eds.), Database and Expert Systems Applications: DEXA 2018 International Workshops, BDMICS, BIOKDD, and TIR, Regensburg, Germany, September 3–6, 2018, Proceedings (pp. 289-300). (Communications in Computer and Information Science; Vol. 903). Springer. https://doi.org/10.1007/978-3-319-99133-7_24

Milz, T. , & Seifert, C. (2018). Who cites what in Computer Science? - Analysing Citation Patterns across Conference Rank and Gender. In E. Mendez, C. Ribeiro, G. David, J. C. Lopes, & F. Crestani (Eds.), Digital Libraries for Open Knowledge - 22nd International Conference on Theory and Practice of Digital Libraries, TPDL 2018, Proceedings (pp. 321-325). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11057 LNCS). https://doi.org/10.1007/978-3-030-00066-0_32

Moreira, J. , Ferreira Pires, L. , van Sinderen, M., & Daniele, L. (2018). SAREF4health: IoT Standard-Based Ontology-Driven Healthcare Systems. In S. Borgo, P. Hitzler, & O. Kutz (Eds.), Formal Ontology in Information Systems: Proceedings of the 10th International Conference (FOIS 2018) (Vol. 309, pp. 239-252). (Frontiers in Artificial Intelligence and Applications; Vol. 306). IOS Press. https://doi.org/10.3233/978-1-61499-910-2-239

Nauta, M. , Bucur, D. , & Stoelinga, M. (2018). LIFT: Learning Fault Trees from Observational Data. In A. McIver, & A. Horvath (Eds.), Quantitative Evaluation of Systems: 15th International Conference, QEST 2018, Beijing, China, September 4-7, 2018, Proceedings (pp. 306-322). (Lecture Notes in Computer Science; Vol. 11024). Springer. https://doi.org/10.1007/978-3-319-99154-2_19

Neidlinger, K. L., Willson, C. , Truong, K. P. , Hermens, H. J. , & Evers, V. (2018). Nanogami: The microbiome expanded. Speak your truth. Listen to your gut. In ISWC'18: Proceedings of the 2018 ACM International Symposium on Wearable Computers (pp. 295-300). Association for Computing Machinery (ACM). https://doi.org/10.1145/3267242.3267296

Nguyen, H. G. , Petrucci, L. , & Pol, J. V. D. (2018). Layered and Collecting NDFS with Subsumption for Parametric Timed Automata. In A. W. Lin, & J. Sun (Eds.), 23rd International Conference on Engineering of Complex Computer Systems, ICECCS 2018, Melbourne, Australia, December 12-14, 2018 IEEE Canada. https://doi.org/10.1109/ICECCS2018.2018.00009

Niculescu, A. I., Wadhwa, B. , & Nijholt, A. (2018). Designing Humour in Interaction: A Design Experience. In N. Streitz, & S. Konomi (Eds.), Distributed, Ambient and Pervasive Interactions: Technologies and Contexts - 6th International Conference, DAPI 2018, Held as Part of HCI International 2018, Proceedings (pp. 327-336). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10922 LNCS). Springer. https://doi.org/10.1007/978-3-319-91131-1_25

Nijholt, A. (2018). From Word Play to World Play: Introducing Humor in Human-Computer Interaction. In Proceedings of the 36th European Conference on Cognitive Ergonomics (ECCE'18) [1] Association for Computing Machinery (ACM). https://doi.org/10.1145/3232078.3232239

Nijholt, A. (2018). Playable Cities for Children? In S. Fukuda (Ed.), Advances in Affective and Pleasurable Design: Proceedings of the AHFE 2018 International Conference on Affective and Pleasurable Design, July 21-25, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA (pp. 14-20). (Advances in Intelligent Systems and Computing; Vol. 774). Springer. https://doi.org/10.1007/978-3-319-94944-4_2

Nijholt, A. (2018). Robotic Stand-up Comedy: State-of-the-Art. In N. Streitz, & S. Konomi (Eds.), Distributed, Ambient and Pervasive Interactions: Understanding Humans - 6th International Conference, DAPI 2018, Held as Part of HCI International 2018, Proceedings (pp. 391-410). (Lecture Notes in Computer Science; Vol. 10921). Springer. https://doi.org/10.1007/978-3-319-91125-0_32

Nijholt, A., Jacob, R. J. K., Andujar, M., Yuksel, B. F., & Leslie, G. (2018). Brain-Computer Interfaces for Artistic Expression. In CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (Vol. 2018-April). [W22] Association for Computing Machinery (ACM). https://doi.org/10.1145/3170427.3170618

Nijholt, A., Velasco, C., Obrist, M., Okajima, K., & Spence, C. (2018). 3rd International Workshop on Multisensory Approaches to Human-Food Interaction. In ICMI 2018 - Proceedings of the 2018 International Conference on Multimodal Interaction (pp. 657-659). Association for Computing Machinery (ACM). https://doi.org/10.1145/3242969.3265860

Normakristagaluh, P. , Spreeuwers, L. J. , & Veldhuis, R. N. J. (2018). A Prototype of Finger-vein Phantom. In L. Spreeuwers, & J. Goseling (Eds.), Proceedings of the 2018 Symposium on Information Theory and Signal Processing in the Benelux: May 31-1 June, 2018, University of Twente, Enschede, The Netherlands (pp. 163-166). Werkgemeenschap voor Informatie- en Communicatietheorie (WIC). http://www.w-i-c.org/proceedings/proceedings_SITB2018.pdf

Ojanperä, T. , van den Berg, H., IJntema, W. , de Souza Schwartz, R., & Djurica, M. (2018). Application Synchronization among Multiple MEC Servers in Connected Vehicle Scenarios. In 2018 IEEE 88th Vehicular Technology Conference, VTC-Fall 2018: Proceedings [8691039] (IEEE Vehicular Technology Conference; Vol. 2018). IEEE. https://doi.org/10.1109/VTCFall.2018.8691039


Ordelman, R. J. F., Melgar Estrada, L., Martínez Ortíz, C., & Noordegraaf, J. (2018). Media Suite: Unlocking Archives for Mixed Media Scholarly Research. In I. Skadina, & M. Eskevich (Eds.), CLARIN 2018 Annual Conference (pp. 21-25) https://office.clarin.eu/v/CE-2018-1292-CLARIN2018_ConferenceProceedings.pdf

Ordelman, R., Martínez Ortíz, C., Melgar Estrada, L., Koolen, M., Blom, J., Melder, W., van Gorp, J., De Boer, V., Karavellas, T., Aroyo, L., Poell, T., Karrouche, N., Baaren, E., Wassenaar, J., Inel, O., & Noordegraaf, J. (2018). Challenges in Enabling Mixed Media Scholarly Research with Multi-media Data in a Sustainable Infrastructure. In Digital Humanities 2018 Conference https://dh2018.adho.org/en/challenges-in-enabling-mixed-media-scholarly-research-with-multi-media-data-in-a-sustainable-infrastructure/

Orhan, G. , Aksit, M. , & Rensink, A. (2018). Designing Reusable and Run-Time Evolvable Scheduling Software. In E. K. Burke, L. Di Gaspero, B. McCollum, N. Musliu, & E. Özcan (Eds.), PATAT 2018: Proceedings of the 12th International Conference of the Practice and Theory of Automated Timetabling (pp. 339-373). TU Wien. https://www.persistent-identifier.nl/urn:nbn:nl:ui:28-57a7f02c-0016-44d2-afe1-9be0cc807e66

Pathak, S., van Rossen, J., Vijlbrief, O., Geerdink, J. , Seifert, C. , & van Keulen, M. (2018). Automatic structuring of breast cancer radiology reports for quality assurance. In J. Yu, Z. Li, H. Tong, & F. Zhu (Eds.), Proceedings of the Workshop on Data Mining in Biomedical Informatics and Healthcare (DMBIH 2018) (Vol. 2018-November, pp. 732-739). [8637387] IEEE Computer Society. https://doi.org/10.1109/ICDMW.2018.00111


Petrucci, L. , & van de Pol, J. (2018). Parameter Synthesis Algorithms for Parametric Interval Markov Chains. In C. Baier, & L. Caires (Eds.), Formal Techniques for Distributed Objects, Components, and Systems: 38th IFIP WG 6.1 International Conference, FORTE 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedings (pp. 121-140). (Lecture Notes in Computer Science; Vol. 10854). Springer. https://doi.org/10.1007/978-3-319-92612-4_7

Piotrowski, K., Geers, M. P. A., Garrido, D., Chen, J., Peralta, J. J., Casaca, A. , & Gerards, M. E. T. (2018). Balancing energy production and consumption in energy efficient neighborhoods. In 2018 IEEE International Energy Conference, ENERGYCON 2018 IEEE. https://doi.org/10.1109/ENERGYCON.2018.8398801

Postema, B. F., Van Damme, T., De Persis, C., Tesi, P. , & Haverkort, B. R. H. M. (2018). Combining Energy Saving Techniques in Data Centres using Model-Based Analysis. In ICPE'18. Companion of the 2018 ACM/SPEC International Conference on Performance Engineering (pp. 67-72). ACM Press. https://doi.org/10.1145/3185768.3186310

Reidsma, D. , & van Delden, R. (2018). Towards an Interactive-Movement-Learning Movement. In M. Ciussi (Ed.), Proceedings of the 12th European Conference on Games Based Learning (pp. 532-539).


Rietberg, E., D'Acunto, L., Kooij, R. , & van den Berg, H. (2018). Analyzing information availability in ICN under link failures. In 32nd International Conference on Information Networking, ICOIN 2018 (pp. 199-204). (International Conference on Information Networking (ICOIN); Vol. 2018). IEEE Computer Society Press. https://doi.org/10.1109/ICOIN.2018.8343110

Rybarczyk, Y., & Kleine Deters, J. (2018). Evaluation of Self-Rehabilitation Movements by Hidden Markov Model. In P. Angelov, T. Yildirim, L. Iliadis, & Y. Manolopoulos (Eds.), 2018 IEEE (SMC) International Conference on Innovations in Intelligent Systems and Applications, INISTA 2018 [8466285] IEEE. https://doi.org/10.1109/INISTA.2018.8466285

Rybarczyk, Y., Kleine Deters, J., Gonzalo, A. A., Esparza, D., Gonzalez, M., Villarreal, S., & Nunes, I. L. (2018). Recognition of Physiotherapeutic Exercises Through DTW and Low-Cost Vision-Based Motion Capture. In I. L. Nunes (Ed.), Advances in Human Factors and Systems Interaction - Proceedings of the AHFE 2017 International Conference on Human Factors and Systems Interaction, 2017 (pp. 348-360). (Advances in Intelligent Systems and Computing; Vol. 592). Springer Verlag. https://doi.org/10.1007/978-3-319-60366-7_33

Saeed, A., Ozcelebi, T., Lukkien, J. , van Erp, J. B. F., & Trajanovski, S. (2018). Model Adaptation and Personalization for Physiological Stress Detection. In 2018 IEEE 5th International Conference on Data Science and Advanced Analytics (DSAA) (pp. 209-216). IEEE. https://doi.org/10.1109/DSAA.2018.00031



Schadenberg, B. R. , Heylen, D. K. J. , & Evers, V. (2018). Affect bursts to constrain the meaning of the facial expressions of the humanoid robot Zeno. In C. Tsiourti, S. Hanke, & L. Santos (Eds.), Joint Proceedings of the Workshop on Social Interaction and Multimodal Expression for Socially Intelligent Robots and the Workshop on the Barriers of Social Robotics take-up by Society (pp. 30-39). CEUR. http://ceur-ws.org/Vol-2059/paper4.pdf

Schlötterer, J. , Seifert, C., & Granitzer, M. (2018). QueryCrumbs for Experts: A Compact Visual Query Support System to Facilitate Insights into Search Engine Internals. In J. M. Pires, N. M. S. Datia, G. Polese, M. Temperini, F. Sciarrone, M. Risi, G. Venturini, T. Di Mascio, R. Zaccagnino, V. Deufemia, D. Malandrino, P. Diaz, A. F. Anta, E. Banissi, T. G. Wyeld, M. Sarfraz, F. Bouali, M. W. M. Bannatyne, F. Papadopoulo, U. Erra, V. Rossano, A. Ursyn, A. Cuzzocrea, ... R. Francese (Eds.), Proceedings of the 22nd International Conference on Information Visualization (IV) (pp. 78-84) https://doi.org/10.1109/iV.2018.00024

Schoot Uiterkamp, M. H. H. , Gerards, M. E. T. , & Hurink, J. L. (2018). Fill-level prediction in online valley-filling algorithms for electric vehicle charging. In Proceedings - 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe, ISGT-Europe 2018 [8571605] IEEE. https://doi.org/10.1109/ISGTEurope.2018.8571605


Shoaib, M., Incel, O. D., Scholten, H. , & Havinga, P. (2018). Smokesense: Online activity recognition framework on smartwatches. In R. Ohmura, K. Murao, S. Inoue, & Y. Gotoh (Eds.), Mobile Computing, Applications, and Services - 9th International Conference, MobiCASE 2018, Proceedings (pp. 106-124). (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; Vol. 240). Springer Verlag. https://doi.org/10.1007/978-3-319-90740-6_7

Spreeuwers, L. , Veldhuis, R., & Schils, M. (2018). Towards Robust Evaluation of Face Morphing Detection. In 2018 26th European Signal Processing Conference, EUSIPCO 2018 (pp. 1027-1031). [8553018] (European Signal Processing Conference; Vol. 2018-September). IEEE. https://doi.org/10.23919/EUSIPCO.2018.8553018


Stoelinga, M. (2018). Risk management for high tech systems. In S. Gnesi, N. Plat, P. Spoletini, & P. Pelliccione (Eds.), FormaliSE'18. Proceedings of the 6th Conference on Formal Methods in Software Engineering, FormaliSE 2018, collocated with ICSE 2018, Gothenburg, Sweden, June 2, 2018 ACM Inc.. https://doi.org/10.1145/3193992.3193993

Suvei, S. D. , Vroon, J., Somoza Sanchéz, V. V., Bodenhagen, L. , Englebienne, G., Krüger, N. , & Evers, V. (2018). “I would like to get close to you”: Making robot personal space invasion less intrusive with a social gaze cue. In M. Antona, & C. Stephanidis (Eds.), Universal Access in Human-Computer Interaction. Virtual, Augmented, and Intelligent Environments - 12th International Conference, UAHCI 2018, Held as Part of HCI International 2018, Proceedings (pp. 366-385). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10908 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-319-92052-8_29

Tobji, M. A. B., Jallouli, R. , Nijholt, A., & Koubaa, Y. (2018). Preface. In M. A. B. Tobji, R. Jallouli, Y. Koubaa, & A. Nijholt (Eds.), Digital Economy - Emerging Technologies and Business Innovation: Third International Conference, ICDEc 2018, Brest, France, May 3-5, 2018, Proceedings (pp. V-VI). (Lecture Notes in Business Information Processing; Vol. 325). Springer. https://link.springer.com/content/pdf/bfm%3A978-3-319-97749-2%2F1.pdf

Toepfer, M. , & Seifert, C. (2018). Content-Based Quality Estimation for Automatic Subject Indexing of Short Texts under Precision and Recall Constraints. In E. Mendez, C. Ribeiro, G. David, J. C. Lopes, & F. Crestani (Eds.), Digital Libraries for Open Knowledge - 22nd International Conference on Theory and Practice of Digital Libraries, TPDL 2018, Proceedings (pp. 3-15). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11057 LNCS). https://doi.org/10.1007/978-3-030-00066-0_1

Van Delden, R. , & Reidsma, D. (2018). Automatic measurements of a leisure activity for people with profound disabilities. In F. Sieverink, R. Klaassen, R. van Delden, J. Wentzel, L. van Gemert-Pijnen, D. Heylen, & H. Oinas-Kukkonen (Eds.), BCSS 2018. Behavior Change Support Systems (pp. 48-59). (CEUR Workshop Proceedings; Vol. 2102). http://ceur-ws.org/Vol-2102/paper_4_van_Delden.pdf

Van Den Berg, F., Garousi, V., Tekinerdogan, B. , & Haverkort, B. R. (2018). Designing cyber-physical systems with aDSL: A domain-specific language and tool support. In 2018 13th System of Systems Engineering Conference, SoSE 2018 (pp. 225-232). [8428770] IEEE. https://doi.org/10.1109/SYSOSE.2018.8428770

Velasco, C. , Nijholt, A., Obrist, M., Okajima, K., & Spence, C. (2018). Message from the chairs. In A. Nijholt, C. Velasco, M. Obrist, K. Okajima, & C. Spence (Eds.), MHFI'18: Proceedings of the 3rd International Workshop on Multisensory Approaches to Human-Food Interaction Association for Computing Machinery (ACM). https://portalparts.acm.org/3280000/3279954/fm/frontmatter.pdf

Veldhuis, R., Raja, K., & Ramachandra, R. (2018). A Likelihood Ratio Classifier for Histogram Features. In 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS) (IEEE International Conference on Biometrics Theory, Applications and Systems (BTAS); Vol. 2018). IEEE. https://doi.org/10.1109/BTAS.2018.8698573

Vereecken, R., Petridis, S., Panagakis, Y. , & Pantic, M. (2018). Online attention for interpretable conflict estimation in political debates. In 13th IEEE International Conference on Automatic Face and Gesture Recognition, FG 2018 (pp. 389-393). IEEE. https://doi.org/10.1109/FG.2018.00062

Wieringa, R. J., Gordijn, J. , & Ionita, D. (2018). Tool Support for Value Modeling and Risk Analysis of e-Services. In 24th Joint International Conference on Requirements Engineering

Witt, N., Granitzer, M. , & Seifert, C. (2018). Most Important First – Keyphrase Scoring for Improved Ranking in Settings With Limited Keyphrases. In L. Soldatova, J. Vanschoren, G. Papadopoulos, & M. Ceci (Eds.), Discovery Science: 21st International Conference, DS 2018, Limassol, Cyprus, October 29–31, 2018, Proceedings (pp. 373-385). (Lecture notes in computer science; Vol. 11198). Springer. https://doi.org/10.1007/978-3-030-01771-2_24

Yumusak, S. , Kamilaris, A., Dogdu, E., Kodaz, H., Uysal, E., & Aras, R. E. (2018). A Discovery and Analysis Engine for Semantic Web. In WWW '18 Companion Proceedings of the The Web Conference 2018 (pp. 1497-1505). https://doi.org/10.1145/3184558.3191599

Zeinstra, C. , & Haasnoot, E. (2018). Shallow CNNs for the Reliable Detection of Facial Marks. In A. Bromme, A. Uhl, C. Busch, C. Rathgeb, & A. Dantcheva (Eds.), 2018 International Conference of the Biometrics Special Interest Group, BIOSIG 2018 [8553157] (International Conference of the Biometrics Special Interest Group (BIOSIG); Vol. 2018). IEEE. https://doi.org/10.23919/BIOSIG.2018.8553157

de Goeijen, G. J. H. , Hurink, J. L. , & Smit, G. J. M. (2018). A Heuristic Approach to Control the Ecovat System. In 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe) IEEE. https://doi.org/10.1109/ISGTEurope.2018.8571598

de Jong, R. , & Theune, M. (2018). Going Dutch: Creating SimpleNLG-NL. In E. Krahmer, A. Gatt, & M. Goudbeek (Eds.), Proceedings of The 11th International Natural Language Generation Conference (pp. 73-78). [W18-6508] Association for Computational Linguistics (ACL). http://aclweb.org/anthology/W18-6508

de Putter, S., Wijs, A. , & Zhang, D. (2018). The SLCO framework for verified, model-driven construction of component software. In P. C. Ölveczky, & K. Bae (Eds.), Formal Aspects of Component Software - 15th International Conference, FACS 2018, Proceedings (pp. 288-296). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11222 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-030-02146-7_15

van Keulen, M., Kaminski, B., Matheja, C. , & Katoen, J. P. (2018). Rule-based conditioning of probabilistic data. In D. Ciucci, G. Pasi, & B. Vantaggi (Eds.), Scalable Uncertainty Management: 12th International Conference, SUM 2018, Milan, Italy, October 3-5, 2018, Proceedings (pp. 290-305). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11142 LNAI). Springer. https://doi.org/10.1007/978-3-030-00461-3_20

van Stegeren , J. , & Theune, M. (2018). Towards generating textual game assets from real-world data. In S. Deterding, M. Khandaker, S. Risi, J. Font, S. Dahlskog, C. Salge, & C. M. Olsson (Eds.), FDG '18: Proceedings of the 13th International Conference on the Foundations of Digital Games [43] Association for Computing Machinery (ACM). https://doi.org/10.1145/3235765.3235809


van Waterschoot, J. B., Dubuisson Duplessis, G. , Gatti, L. , Bruijnes, M. , & Heylen, D. K. J. (2018). HAI Alice - An Information-Providing Closed-Domain Dialog Corpus. In N. Calzolari, K. Choukri, C. Cieri, T. Declerck, S. Goggi, K. Hasida, H. Isahara, B. Maegaard, J. Mariani, H. Mazo, A. Moreno, J. Odijk, S. Piperidis, & T. Tokunaga (Eds.), Proceedings of the Eleventh International Conference on Language Resources and Evaluation (LREC 2018) (11 ed., pp. 2746-2752). [429] European Language Resources Association (ELRA). https://hal.archives-ouvertes.fr/hal-01782261

van de Kamp, T. , Peter, A. , Everts, M. H. , & Jonker, W. (2018). Multi-client predicate-only encryption for conjunctive equality tests. In S. Capkun, & S. S. M. Chow (Eds.), Cryptology and Network Security - 16th International Conference, CANS 2017, Revised Selected Papers (pp. 135-157). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11261 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-030-02641-7_7

van den Berg, F. G. B., Hooman, J. , & Haverkort, B. R. H. M. (2018). A Domain-Specific Language and Toolchain for Performance Evaluation Based on Measurements. In R. German, K-S. Hielscher, & U. R. Krieger (Eds.), Measurement, Modelling and Evaluation of Computing Systems: 19th International GI/ITG Conference, MMB 2018, Erlangen, Germany, February 26-28, 2018, Proceedings (pp. 295-301). (Lecture Notes in Computer Science; Vol. 10740). Springer. https://doi.org/10.1007/978-3-319-74947-1_21

van der Toorn, O. I. , van Rijswijk, R. M., Geesink, B. , & Sperotto, A. (2018). Melting the Snow: Using Active DNS Measurements to Detect Snowshoe Spam Domains. In IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018 (pp. 1-9). IEEE. https://doi.org/10.1109/NOMS.2018.8406222

Entry for encyclopedia/dictionary


van Keulen, M. (2018). Probabilistic Data Integration. In S. Sakr, & A. Zomaya (Eds.), Encyclopedia of Big Data Technologies Springer. https://doi.org/10.1007/978-3-319-63962-8_18-1

Other


Brouwer, A-M., Gjaltema, C. , van Erp, J. B. F., Hogervorst, M. A., Nijdam, P., van Dam, E., Oldenhof, W., & Zandstra, E. H. (2018). Using physiology to implicitly and continuously measure cooking and tasting experiences. Eighth European Conference on Sensory and Consumer Research 2018, Verona, Italy.

Paper


Ayele, E. D. , Meratnia, N. , & Havinga, P. J. M. (2018). Towards A New Opportunistic IoT Network Architecture for Wildlife Monitoring System. 1-5. Paper presented at 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France. https://doi.org/10.1109/NTMS.2018.8328721

Bruijnes, M., & Falcone, S. (2018). The Embodied Debate Corpus – Proposed corpus recordings of multi-party multi-embodiment multi-measure debates. Paper presented at 1st workshop on Methodology and the Evaluation of Intelligent Virtual Agents (ME-IVA) at the Intelligent Virtual Agent conference (IVA2018), Sydney, Australia. https://iva2018methodologyworkshop.files.wordpress.com/2018/12/s5-embodied-debate-corpus.pdf

Cauchi, N., Hoque, K. A. , Stoelinga, M., & Abate, A. (2018). Maintenance of Smart Buildings using Fault Trees. 28:1-28:25. Paper presented at 4th ACM International Conference on Systems for Energy-Efficient Built Environments 2017, Delft, Netherlands. https://doi.org/10.1145/3232616

Huisman, M. (2018). Mercedes: Maximal Reliability of Concurrent and Distributed Software. Paper presented at ICT.OPEN 2018, Amersfoort, Netherlands.

Huisman, M., Varbanescu, A. L., van Werkhoven, B., & Wijs, A. (2018). An overview of GPU Computing Research in the Netherlands: Results from the NIRICT GPGPU Reconnaissance workshop. Paper presented at Fourth workshop in NIRICT GPGPU Reconnaissance workshop series, Utrecht, Netherlands. http://fmt.ewi.utwente.nl/NIRICT_GPGPU/GPU-Workshop-Whitepaper.pdf

Joosten, S. J. C. , Oortwijn, W. , Safari, M. , & Huisman, M. (2018). An Exercise in Verifying Sequential Programs with VerCors. Paper presented at 20th Workshop on Formal Techniques for Java-like Programs Formal techniques, Amsterdam, Netherlands. https://polybox.ethz.ch/index.php/s/HEBJ0Tv6FyzeZz4/download

Kalluri, B., Kondepudi, S., Wai, T. K., Wei, K. H. , & Kamilaris, A. (2018). SMELs: A Data-driven Middleware for Smart Miscellaneous Electrical Load Management in Buildings. 159-165. Paper presented at 3rd IEEE Cyber Science and Technology Congress 2018, Athens, Greece. https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00038

Kamilaris, A. (2018). A Review on the Application of Natural Computing in Environmental Informatics. Paper presented at 32nd EnviroInfo 2018, Garching bei Munchen, Germany. https://arxiv.org/abs/1808.00260

Kamilaris, A. , & Ostermann, F. O. (2018). Geospatial Analysis and Internet of Things in Environmental Informatics. Paper presented at 32nd EnviroInfo 2018, Garching bei Munchen, Germany.

Kuhnert, K. , Steinberger, J., & Baier, H. (2018). Botnet detection and prevention in anonymous networks. Paper presented at 12th International Conference on Autonomous Infrastructure, Management and Security 2018, Munich, Germany.

Mayoral Vilches, V., Alzola Kirschgens, L., Bilbao Calvo, A., Hernández Cordero, A., Izquierdo Pisón, R., Mayoral Vilches, D., Muñiz Rosas, A., Olalde Mendia, G., Usategi San Juan, L., Zamalloa Ugarte, I., Gil-Uriarte, E. , Tews, E. , & Peter, A. (2018). Introducing the Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics. Paper presented at Symposium on Blockchain for Robotic Systems 2018, Cambridge, United States. https://arxiv.org/abs/1806.04042

Oude Nijeweme - d'Hollosy, W. , Poel, M. , van Velsen, L. S. , Oudshoorn, C. , Hermens, H. J., Stegeman, P., Wolff, A. P., Reneman, M. F., & Soer, R. (2018). Personalized advice on chronic low back pain interventions: a machine learning approach. 25. Paper presented at SBPR 2018, Groningen, Netherlands.


Snaith, M., Bedsted, B., Kotnis, S. R., Nielsen, R. Ø. , Beinema, T. C. , Klaassen, R., & Pease, A. (2018). Challenges in argumentation and dialogue for autonomous, multi-party health coaching. Paper presented at 7th International Conference on Computational Models of Argument 2018, Warsaw, Poland. http://comma2018.argdiap.pl/wp-content/uploads/Snaith.pdf

Steinberger, J., Kuhnert, B. , Dietz, C., Ball, L. , Sperotto, A., Baier, H. , Pras, A., & Dreo Rodosek, G. (2018). DDoS Defense using MTD and SDN. Paper presented at 16th IEEE/IFIP Network Operations and Management Symposium 2018, Taipei, Taiwan, Province of China. https://doi.org/10.1109/NOMS.2018.8406221

van Rees, H. , Mader, A. H., Smits, M. , Ludden, G. D. S., & Lamontagne, V. (2018). Textile waste and haptic feedback for wearable robotics. 1775-1786. Paper presented at Design Research Society 2018, Limerick, Ireland.

van Sinderen, M. J. , Moreira, J. L. , Ferreira Pires, L., & Daniele, L. (2018). SAREF4health: IoT Standard-Based Ontology-Driven Healthcare Systems. 239 - 252. Paper presented at Formal Ontology in Information Systems, FOIS 2018, Cape Town, South Africa.

PhD Thesis - Research UT, graduation UT






























Poster


Homan, B. , Reijnders, V. M. J. J. , Hoogsteen, G. , Hurink, J. L. , & Smit, G. J. M. (2018). Implementation and Verification of a Realistic Battery Model in the DEMKit Simulation Software. Poster session presented at 8th IEEE PES Innovative Smart Grid Technologies Conference Europe 2018, Sarajevo, Bosnia and Herzegovina.

Kaneko, D., Toet, A., Ushiama, S., Hoving, S., Kruijf, I., Brouwer, A. M., Kallen, V. , & van Erp, J. B. F. (2018). EmojiGrid: a pictorial single-item scale for the assessment of food elicited pleasure and arousal. Poster session presented at Eighth European Conference on Sensory and Consumer Research 2018, Verona, Italy.

Kaneko, D., Toet, A., Ushiama, S., de Kruijff, I., van Schaik, M., Brouwer, A. M., Kallen, V. , & van Erp, J. B. F. (2018). CROCUFID: A cross-cultural food image database. Poster session presented at Eighth European Conference on Sensory and Consumer Research 2018, Verona, Italy.


Reijnders, V. M. J. J. , Gerards, M. E. T. , Hurink, J. L. , & Smit, G. J. M. (2018). Testing Grid-Based Electricity Prices and Batteries in a Field Test. Poster session presented at CIRED 2018 Ljubljana Workshop on Microgrids and Local Energy Communities, Ljubljana, Slovenia.

Schadenberg, B. R. , Chevalier, P. , Li, J. J., Ainger, E., Alcorn, A. M., Babovic, S. , Davison, D. P. , Charisi, V., Petrovic, S. , Reidsma, D., Shen, J., Pellicano, E. , Heylen, D. K. J. , & Evers, V. (2018). Design of a Robot-Based Emotion-Mirroring Game to Engage Autistic Children with Emotional Expressions. Poster session presented at The International Society for Autism Research Annual Meeting 2018, Rotterdam, Netherlands.

de Dieuleveult, A. L., Brouwer, A. M., Siemonsma, P. C. , van Erp, J. B. F., & Brenner, E. (2018). Aging And Sensitivity To Illusory Target Motion. Poster session presented at 24th Nordic Congress of Gerontology 2018, Oslo, Norway.

van Delden, R. , Klaassen, R. , Meireles Ferreira Cabrita, A. M. , Tabak, M. , Heylen, D. K. J., & Thio, B. (2018). Play In Public Spaces As Part Of Persuasive Systems (PIPSAPOPS) Keep It Simple.. Poster session presented at 13th International Conference on Persuasive Technology, PERSUASIVE 2018, Waterloo, Canada.

Report


Habraken, M. M. P., Ahsmann, B., van den Akker , E., van Baars , G., Baartmans, R., Blankendaal, J., Bossert, R., Burghardt, P., Duisterwinkel, A., van Eijk , D., van den Eijnde , W., Endhoven, W., Gijsbers, G., Ten Have, K. , Haverkort, B. R. H. M., van der Horst, T., Jayawardhana, B., Jansson, M., Karelse, F., ... Thuis, B. (2018). Smart Industry roadmap: Onderzoeksagenda voor HTSM en ICT en routekaart voor de NWA. Smart Industry. https://www.smartindustry.nl/smart-industry-roadmap/


Review article


Kaneko, D., Toet, A., Brouwer, A. M., Kallen, V. , & van Erp, J. B. F. (2018). Methods for evaluating emotions evoked by food experiences: A literature review. Frontiers in Psychiatry, 9(JUN), [911]. https://doi.org/10.3389/fpsyg.2018.00911

Seckiner, D., Mallett, X., Roux, C. , Meuwly, D., & Maynard, P. (2018). Forensic image analysis - CCTV distortion and artefacts. Forensic science international, 285, 77-85. [285]. https://doi.org/10.1016/j.forsciint.2018.01.024

Torbaghan, S. S., Blaauwbroek, N., Kuiken, D., Gibescu, M. , Haji Ghasemi, M., Phuong Nguyen , Smit, G. J. M., Roggenkamp, M. , & Hurink, J. (2018). A market-based framework for demand side flexibility scheduling and dispatching. Sustainable Energy, Grids and Networks, 14, 47-61. https://doi.org/10.1016/j.segan.2018.03.003


Special issue


Santanna, J. J., de Vries, J. , de O. Schmidt, R., Tuncer, D., Z. Granville, L. , & Pras, A. (2018). Booter list generation: The basis for investigating DDoS-for-hire websites. International journal of network management, 28(1), [e2008]. https://doi.org/10.1002/nem.2008

Working paper



Stanley-Marbell, P., Alaghi, A., Carbin, M., Darulova, E., Dolecek, L., Gerstlauer, A. , Gillani, S. G. A., Jevdjic, D., Moreau, T., Cacciotti, M., Daglis, A., Jerger, N. E., Falsafi, B., Misailovic, S., Sampson, A., & Zufferey, D. (2018). Exploiting Errors for Efficiency: A Survey from Circuits to Algorithms. ArXiv. https://doi.org/arXiv:1809.05859 [cs.AR]

2017

Article (contribution to journal)




Brouwer, A-M., Hogervorst, M. A., Grootjen, M. , van Erp, J. B. F., & Zandstra, E. H. (2017). Neurophysiological responses during cooking food associated with different emotions. Food quality and preference, 62, 307-316. https://doi.org/10.1016/j.foodqual.2017.03.005



Cheng, S., Marras, I., Zafeiriou, S. , & Pantic, M. (2017). Statistical non-rigid ICP algorithm and its application to 3D face alignment. Image and vision computing, 58, 3-12. https://doi.org/10.1016/j.imavis.2016.10.007




Eleftheriadis, S., Rudovic, O., Deisenroth, M. P. , & Pantic, M. (2017). Gaussian Process Domain Experts for Modeling of Facial Affect. IEEE transactions on image processing, 26(10), 4697-4711. [7961231]. https://doi.org/10.1109/TIP.2017.2721114


Erich, F. M. A. , Amrit, C. , & Daneva, M. (2017). A qualitative study of DevOps usage in practice. Journal of software: Evolution and Process, 29(6), [e1885]. https://doi.org/10.1002/smr.1885

Georgakis, C., Panagakis, Y., Zafeiriou, S. , & Pantic, M. (2017). The Conflict Escalation Resolution (CONFER) Database. Image and vision computing, 65, 37-48. https://doi.org/10.1016/j.imavis.2016.12.001

Gerards, M. E. T. , Hurink, J. L., & Hübner, R. (2017). Demand side management in a field test: lessons learned. CIRED: Open Access Proceedings Journal, 2017(1), 1678-1681. https://doi.org/10.1049/oap-cired.2017.1238


Groen, F. C. A., Pavlin, G., Winterboer, A. , & Evers, V. (2017). A hybrid approach to decision making and information fusion: Combining humans and artificial agents. Robotics and autonomous systems, 90(April 2017), 71-85. https://doi.org/10.1016/j.robot.2016.08.009



Haverkort, B. R., & Zimmermann, A. (2017). Smart Industry: How ICT Will Change the Game! IEEE internet computing, 21(1), 8-10. https://doi.org/10.1109/MIC.2017.22

Hiemstra, D., Harman, D. (Ed.), Allan, J., Kelly, D. (Ed.), Belkin, N. J., Bennet, P., Callan, J., Clarke, C., Diaz, F., Dumais, S., Ferro, N., Harman, D., Ruthven, I., Sakai, T., Smucker, M. D., & Zobel, J. (2017). Overview of Special Issue. SIGIR forum, 51(2), 1-25. https://doi.org/10.1145/3130348.3130350

Hofstede, R. , Jonker, M. , Sperotto, A. , & Pras, A. (2017). Flow-Based Web Application Brute-Force Attack and Compromise Detection. Journal of network and systems management, 25(4), 735-758. https://doi.org/10.1007/s10922-017-9421-4


Hu, N. , Englebienne, G., Lou, Z., & Kröse, B. J. A. (2017). Learning to Recognize Human Activities Using Soft Labels. IEEE transactions on pattern analysis and machine intelligence, 39(10), 1973-1984. https://doi.org/10.1109/TPAMI.2016.2621761

Huggins, J. E., Guger, C., Ziat, M., Zander, T. O., Taylor, D., Tangermann, M., Soria-Frisch, A., Simeral, J., Scherer, R., Rupp, R., Ruffini, G. , Robinson, D. K. R., Ramsey, N. F. , Nijholt, A., Müller-Putz, G. R., McFarland, D. J., Mattia, D., Lance, B. J., Kindermans, P-J., ... Aarnoutse, E. J. (2017). Workshops of the Sixth International Brain–Computer Interface Meeting: brain–computer interfaces past, present, and future. Brain-Computer Interfaces, 4(1-2), 3-36. https://doi.org/10.1080/2326263X.2016.1275488


Joosten, S., Thiemann, R., & Yamada, A. (2017). Subresultants. Archive of Formal Proofs. https://www.isa-afp.org/entries/Subresultants.html







Kossaifi, J., Tzimiropoulos, G. , & Pantic, M. (2017). Fast and exact Newton and Bidirectional fitting of Active Appearance Models. IEEE transactions on image processing, 26(2), 1040-1053. https://doi.org/10.1109/TIP.2016.2642828

Kossaifi, J., Tzimiropoulos, G., Todorovic, S. , & Pantic, M. (2017). AFEW-VA database for valence and arousal estimation in-the-wild. Image and vision computing, 65, 23-36. https://doi.org/10.1016/j.imavis.2017.02.001




Li, B., Zhang, Y. , & Broersma, H. (2017). An exact formula for all star-kipas Ramsey numbers. Graphs and combinatorics, 33(1), 141-148. https://doi.org/10.1007/s00373-016-1746-3


Li, R. , Broersma, H. J., Xu, C., & Zhang, S. (2017). Cycle extension in edge-colored complete graphs. Discrete mathematics, 340(6), 1235-1241. https://doi.org/10.1016/j.disc.2017.01.023


Méndez Fernández, D., Wagner, S., Kalinowski, N., Felderer, M., Mafra, P., Vetrò, A., Conte, T., Christianson, M-T., Greer, D., Lassenius, C., Männistö, T., Nayabi, M., Oivo, M., Penzenstadler, B., Pfahl, D., Prikladnicki, R., Ruhe, G., Schekelmann, A., Sen, S. , ... Wieringa, R. (2017). Naming the pain in requirements engineering: Contemporary problems, causes, and effects in practice. Empirical software engineering. https://doi.org/10.1007/s10664-016-9451-7

Nait Aicha, A. , Englebienne, G., & Kröse, B. J. A. (2017). Unsupervised visit detection in smart homes. Pervasive and Mobile Computing, 34, 157-167. https://doi.org/10.1016/j.pmcj.2016.05.003

Nautsch, A. , Meuwly, D., Ramos, D., Lindh, J., & Busch, C. (2017). Making Likelihood Ratios Digestible for Cross-Application Performance Assessment. IEEE signal processing letters, 24(10), 1552-1556. [17176768]. https://doi.org/10.1109/LSP.2017.2748899












Schönwälder, J., Friedman, T. , & Pras, A. (2017). Using networks to teach about networks (report on dagstuhl seminar #17112). Computer communication review, 47(3), 40-44. https://doi.org/10.1145/3138808.3138814


Soleymani, M., Garcia, D., Jou, B., Schuller, B., Chang, S. F. , & Pantic, M. (2017). A survey of multimodal sentiment analysis. Image and vision computing, 65, 3-14. https://doi.org/10.1016/j.imavis.2017.08.003






Zhang, Z-B., Zhang, X. , Broersma, H., & Lou, D. (2017). Extremal and Degree Conditions for Path Extendability in Digraphs. SIAM J. Discrete Math., 31(3), 1990-2014. https://doi.org/10.1137/16M1077453





van Dijk, T. , & van de Pol, J. (2017). Sylvan: multi-core framework for decision diagrams. International journal on software tools for technology transfer, 19(6), 675-696. https://doi.org/10.1007/s10009-016-0433-2





van der Ham, J. , & van Rijswijk, R. M. (2017). Ethics and Internet Measurements. Journal of Cyber Security and Mobility, 5(4), 287-308. [3]. https://doi.org/10.13052/jcsm2245-1439.543


Book editing




Jallouli, R., Zaïane, O. R. Z., Bach Tobji, M. A., Srarfi Tabbane, R. , & Nijholt, A. (Eds.) (2017). Digital Economy. Emerging Technologies and Business Innovation: Second International Conference, ICDEc 2017, Sidi Bou Said, Tunisia, May 4–6, 2017, Proceedings. ( Lecture Notes in Business Information Processing; Vol. 290). Springer. https://doi.org/10.1007/978-3-319-62737-3



Velasco, C. , Nijholt, A., Obrist, M., Okajima, K., Schifferstein, R., & Spence, C. (Eds.) (2017). MHFI’17: Proceedings of the 2nd ACM SIGCHI InternationalWorkshop on Multisensory Approaches to Human-Food Interaction. Association for Computing Machinery (ACM). https://dl.acm.org/citation.cfm?id=3141788


Chapter


Brinksma, E. , Stoelinga, M. , & Timmer, M. (2017). Testing Divergent Transition Systems. In L. Aceto, G. Bacci, G. Bacci, A. Ingolfsdottir, A. Legay, & R. Mardare (Eds.), Models, Algorithms, Logics and Tools: Essays Dedicated to Kim Guldstrand Larsen on the Occasion of His 60th Birthday (pp. 339). (Lecture Notes in Computer Science; Vol. 10460). Springer. https://doi.org/10.1007/978-3-319-63121-9_17

Budde, C. E., D'Argenio, P. R., Monti, R. E., Lee, M. D., Rodríguez, L., & Wolovick, N. (2017). The Road from Stochastic Automata to the Simulation of Rare Events. In R. Langerak, J-P. Katoen, & A. Rensink (Eds.), ModelEd, TestEd, TrustEd: Essays Dedicated to Ed Brinksma on the Occasion of His 60th Birthday (Vol. LNCS, pp. 276-294). (Lecture Notes in Computer Science; Vol. 10500). https://doi.org/10.1007/978-3-319-68270-9_14

Ionita, D. , Nazareth, D. S. , Vasenev, A. , van der Velde, F. , & Wieringa, R. (2017). The role of tangibility and iconicity in collaborative modelling tasks. In C. Cabanillas, S. España, & S. Farshidi (Eds.), Proceedings of the ER Forum 2017 and the ER 2017 Demo track (pp. 1-14). CEUR. http://ceur-ws.org/Vol-1979/paper-13.pdf

Katoen, J. P. , & Stoelinga, M. I. A. (2017). Boosting Fault Tree Analysis by Formal Methods. In J-P. Katoen, R. Langerak, & A. Rensink (Eds.), ModelEd, TestEd, TrustEd: Essays Dedicated to Ed Brinksma on the Occasion of His 60th Birthday (pp. 368-380). (Lecture notes in computer science; Vol. 10500). https://doi.org/10.1007/978-3-319-68270-9_19

Liao, Z., Petridis, S. , & Pantic, M. (2017). Local Deep Neural Networks for Age and Gender Classification. In 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) IEEE Computer Vision and Pattern Recognition. https://arxiv.org/abs/1703.08497

Maltoni, D., Cappelli, R. , & Meuwly, D. (2017). Automated Fingerprint Identification Systems: From Fingerprints to Fingermarks. In M. Tistarelli, & C. Champod (Eds.), Handbook of Biometrics for Forensic Science (pp. 37-61). (Advances in Computer Vision and Pattern Recognition). Springer. https://doi.org/10.1007/978-3-319-50673-9_3

Nijholt, A. (2017). Mischief Humor in Smart and Playable Cities. In A. Nijholt (Ed.), Playable Cities: The City as a Digital Playground (pp. 235-253). (Gaming Media and Social Effects). Springer. https://doi.org/10.1007/978-981-10-1962-3_11

Nijholt, A. (2017). Preface. In Playable Cities: The City as a Digital Playground (pp. vii-viii). (Gaming Media and Social Effects). Springer. https://link.springer.com/content/pdf/bfm:978-981-10-1962-3/1.pdf

Nijholt, A. (2017). Towards Playful and Playable Cities. In A. Nijholt (Ed.), Playable Cities: The City as a Digital Playground (pp. 1-20). (Gaming Media and Social Effects). Springer. https://doi.org/10.1007/978-981-10-1962-3_1

Pieters, W., & Dechesne, F. (2017). Adversarial risks in social experiments with new technologies. In I. van der Poel, L. Asveld, & D. C. Mehos (Eds.), Experimentation beyond the laboratory: new perspectives on technology Routledge.

Rensink, A. (2017). How much are your geraniums? Taking graph conditions beyond first Order. In J-P. Katoen, R. Langerak, & A. Rensink (Eds.), ModelEd, TestEd, TrustEd: Essays Dedicated to Ed Brinksma on the Occasion of His 60th Birthday (Vol. 10500 LNCS, pp. 191-213). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10500 LNCS). Springer. https://doi.org/10.1007/978-3-319-68270-9_10

Schivo, S. , & Langerak, R. (2017). Discretization of Continuous Dynamical Systems Using UPPAAL. In J-P. Katoen, R. Langerak, & A. Rensink (Eds.), ModelEd, TestEd, TrustEd: Essays Dedicated to Ed Brinksma on the Occasion of His 60th Birthday (pp. 297-315). (Lecture Notes in Computer Science; Vol. 10500). Springer. https://doi.org/10.1007/978-3-319-68270-9_15


Seraj, F. , Meratnia, N. , & Havinga, P. J. M. (2017). An aggregation and visualization technique for crowd-sourced continuous monitoring of transport infrastructures. In 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2017 (pp. 219-224). IEEE. https://doi.org/10.1109/PERCOMW.2017.7917561

Seraj, F. , Meratnia, N. , & Havinga, P. J. M. (2017). RoVi: Continuous transport infrastructure monitoring framework for preventive maintenance. In 2017 IEEE International Conference on Pervasive Computing and Communications, PerCom 2017 (pp. 217-226). IEEE. https://doi.org/10.1109/PERCOM.2017.7917868

Trouvain, J. , & Truong, K. P. (2017). Laughter. In S. Attardo (Ed.), The Routledge Handbook of Language and Humor (pp. 340-355). (Routledge Handbooks in Linguistics). Routledge. https://www.routledge.com/The-Routledge-Handbook-of-Language-and-Humor/Attardo/p/book/9781138843066

van den Berg, F. G. B. , Haverkort, B. R. H. M., & Hooman, J. (2017). iDSL: Automated Performance Evaluation of Service-Oriented Systems. In R. Langerak, & A. Rensink (Eds.), ModelEd, TestEd, TrustEd: Essays Dedicated to Ed Brinksma on the Occasion of His 60th Birthday (Lecture Notes in Computer Science; Vol. 10500). Springer. https://doi.org/10.1007/978-3-319-68270-9_11

Conference contribution


Abbasi, A., Holz, T. , Zambon, E. , & Etalle, S. (2017). ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers. In ACSAC 2017: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017 (pp. 437-448). Association for Computing Machinery (ACM). https://doi.org/10.1145/3134600.3134618

Abbasi, A., Wetzels, J., Bokslag, W. , Zambon, E. , & Etalle, S. (2017). μShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems. In Z. Yan, R. Molva, W. Mazurczyk, & R. Kantola (Eds.), Network and System Security: 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings (pp. 694-709). ( Lecture Notes in Computer Science; Vol. 10394). Springer. https://doi.org/10.1007/978-3-319-64701-2_55

Acciani, F. , Heijenk, G. , & Frasca, P. (2017). Achieving robust average consensus over wireless networks. In 2016 European Control Conference, ECC 2016 (pp. 555-560). [7810343] IEEE. https://doi.org/10.1109/ECC.2016.7810343

Ahmad, W. , Yildiz, B. M. , Rensink, A. , & Stoelinga, M. I. A. (2017). A Model-Driven Framework for Hardware-Software Co-design of Dataflow Applications. In C. Berger, M. Mousavi, & R. Wisniewski (Eds.), Proceedings of the 6th International Workshop on Design, Modeling and Evaluation of Cyber Physical Systems: CyPhy 2016. Revised Selected Papers (Vol. 10107, pp. 1-16). (Lecture Notes in Computer Science; Vol. 10107). Springer. https://doi.org/10.1007/978-3-319-51738-4_1

Aldea, A. I., Febriani, T. R. , Daneva, M. , & Iacob, M. E. (2017). The Strategy Blueprint: A Strategy Process Computer-Aided Design Tool. In VMSD 2017: Proceedings of the Seventh International Symposium on Business Modeling and Software Design (pp. 125-135). SCITEPRESS.

Allah Bukhsh, Z. , van Sinderen, M. J. , Sikkel, N., & Quartel, D. (2017). Understanding Modeling Requirements of Unstructured Business Processes. In M. van Sinderen, M. S. Obaidat, & E. Cabello (Eds.), ICETE 2017: Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (Vol. 4, pp. 17-27) https://doi.org/10.5220/0006398400170027

Alsaqaf, W. H. A. , Daneva, M. , & Wieringa, R. J. (2017). Agile quality requirements engineering challenges: first results from a case study. In 2017 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) IEEE. https://doi.org/10.1109/ESEM.2017.61

Alsaqaf, W. , Daneva, M. , & Wieringa, R. (2017). Quality requirements in large-scale distributed agile projects - A systematic literature review. In P. Grünbacher, & A. Perini (Eds.), Requirements Engineering: Foundation for Software Quality: 23rd International Working Conference, REFSQ 2017, Essen, Germany, February 27 – March 2, 2017, Proceedings (pp. 219-234 ). (Lecture Notes in Computer Science; Vol. 10153). Springer. https://doi.org/10.1007/978-3-319-54045-0_17

Amsaleg, L. (Ed.), Eskevich, M., Guðmundsson, G. Þ. (Ed.), Larson, M. , Aly, R., Gurrin, C. (Ed.), Jónsson, B. Þ. (Ed.), Sabetghadam, S., Jones, G. J. F., Satoh, S. (Ed.) , Ordelman, R. J. F., & Huet, B. (2017). Multimodal video-to-video linking: Turning to the crowd for insight and evaluation. In Multimedia Modeling: Proceedings of the 23rd International Conference on Multimedia Modeling, MMM 2017 (pp. 280-292). (Lecture Notes in Computer Science; Vol. 10133). Springer. https://doi.org/10.1007/978-3-319-51814-5_24


Awad, G., Butt, A. A., Fiscus, J., Joy, D., Delgado, A., Michel, M., Smeaton, A. F., Graham, Y., Kraaij, W., Quénot, G. , Ordelman, R. J. F., Jones, G. J. F., & Huet, B. (2017). Trecvid 2017: Evaluating ad-hoc and instance video search, events detection, video captioning and hyperlinking. In Proceedings of TRECVID (Vol. 2017).

Ayele, E. D., Hakkenberg, C. , Meijers, J. P., Zhang, K. , Meratnia, N. , & Havinga, P. J. M. (2017). Performance analysis of LoRa radio for an indoor IoT applications. In Internet of Things for the Global Community, IoTGC 2017 - Proceedings [8008973] IEEE. https://doi.org/10.1109/IoTGC.2017.8008973

Baratchi, M. , Heijenk, G. , & van Steen, M. R. (2017). Spaceprint: a Mobility-based Fingerprinting Scheme for Spaces. In SIGSPATIAL '17: Proceedings of the 25th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems [102] Association for Computing Machinery (ACM). https://doi.org/10.1145/3139958.3140009

Bernhard, S., Jasper, M. , Meijer, J. , & van de Pol, J. (2017). Property-Preserving Generation of Tailored Benchmark Petri Nets. In 17th International Conference on Application of Concurrency to System Design - ACSD 2017: 25-30 June 2017, Zaragoza, Spain : proceedings IEEE Computer Society. https://doi.org/10.1109/ACSD.2017.24

Bloemen, V., Duret-Lutz, A. , & van de Pol, J. (2017). Explicit State Model Checking with Generalized Büchi and Rabin Automata. In SPIN 2017: Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software (pp. 50-59). Association for Computing Machinery (ACM). https://doi.org/10.1145/3092282.3092288

Blok, T. , & Fehnker, A. (2017). Automated Program Analysis for Novice Programmers. In J. Domenech, M. C. Vincent-Vela, E. de la Poza, & D. Blazquez (Eds.), HEAd'17: Proceedings of the 3rd International Conference on Higher Education Advances (pp. 1138-1146). Universitat Politecnica de Valencia. https://doi.org/10.4995/HEAD17.2017.5533

Blom, S. , Darabi, S. , Huisman, M. , & Oortwijn, W. (2017). The VerCors Tool Set: Verification of Parallel and Concurrent Software. In N. Polikarpova, & S. Schneider (Eds.), Integrated Formal Methods: 13th International Conference, IFM 2017, Turin, Italy, September 20-22, 2017, Proceedings (pp. 102-110). (Lecture Notes in Computer Science; Vol. 10510). Springer. https://doi.org/10.1007/978-3-319-66845-1_7

Bortolameotti, R. , van Ede, T. S., Caselli, M. , Everts, M. H. , Hartel, P. H., Hofstede, R. , Jonker, W. , & Peter, A. (2017). DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. In ACSAC 2017, Proceedings of the 33rd Annual Computer Security Applications Conference (pp. 373-386) https://doi.org/10.1145/3134600.3134605

Bowden, K., Nilsson, T., Spencer, C., Cengiz, K., Ghitulescu, A. , & van Waterschoot, J. B. (2017). I Probe, Therefore I Am: Designing a Virtual Journalist with Human Emotions. In K. Truong, & D. Reidsma (Eds.), Proceedings of eNTERFACE'16 - The 12th Summer Workshop on Multimodal Interfaces (02 ed., Vol. 17, pp. 47-53). Centre for Telematics and Information Technology (CTIT).

Brueckner, R., Schmitt, M. , Pantic, M., & Schuller, B. (2017). Spotting social signals in conversational speech over IP: A deep learning perspective. In Proceedings Interspeech 2017 (pp. 2371-2375) https://doi.org/10.21437/Interspeech.2017-635

Brugman, T. , Baratchi, M. , Heijenk, G. , & van Steen, M. (2017). Inferring the social-connectedness of locations from mobility data. In G. L. Ciampaglia, A. Mashhadi, & T. Yasseri (Eds.), Social Informatics: 9th International Conference, SocInfo 2017, Oxford, UK, September 13-15, 2017 (pp. 443-457). (Lecture Notes in Computer Science; Vol. 10540). Springer. https://doi.org/10.1007/978-3-319-67256-4_35

Bucci, P., Cang, X. L., Valair, A., Marino, D., Tseng, L. , Jung, M. M., Rantala, J., Schneider, O. S., & MacLean, K. E. (2017). Sketching CuddleBits: Coupled Prototyping of Body and Behaviour for an Affective Robot Pet. In CHI 2017 online proceedings (pp. 3681-3692). Association for Computing Machinery (ACM). https://doi.org/10.1145/3025453.3025774

Bucur, D. (2017). Towards accurate de novo assembly for genomes with repeats. In 2017 IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology (CIBCB) https://doi.org/10.1109/CIBCB.2017.8058534

Budde, C. E. , D'Argenio, P. R. , & Hartmanns, A. (2017). Better Automated Importance Splitting for Transient Rare Events. In K. G. Larsen, & O. Sokolsky (Eds.), Proceedings of the Third International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA 2017) (pp. 42-58). (Lecture Notes in Computer Science; Vol. 10606). Springer. https://doi.org/10.1007/978-3-319-69483-2_3

Budde, C. E., Dehnert, C. , Hahn, E. M. , Hartmanns, A., Junges, S., & Turrini, A. (2017). JANI: Quantitative Model and Tool Interaction. In A. Legay, & T. Margaria (Eds.), Tools and Algorithms for the Construction and Analysis of Systems: 23rd International Conference, TACAS 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings (Vol. Part II, pp. 151-168). (Lecture Notes in Computer Science; Vol. 10206). Springer. https://doi.org/10.1007/978-3-662-54580-5_9

Bukhsh, F. A., & Silva, P. D. A. (2017). Modeling E-Business Customization with e3value Modeling. In 2016 International Conference on Frontiers of Information Technology (FIT) (pp. 187-192). [7866751] IEEE. https://doi.org/10.1109/FIT.2016.042

Bukhsh, F. A., Younus, I., & Arachchige, J. J. (2017). Information technology project management viewpoint: A case study from PTCL. In 2016 6th International Conference on Innovative Computing Technology, INTECH 2016 (pp. 24-29). [7845086] IEEE. https://doi.org/10.1109/INTECH.2016.7845086

Cafaro, A. , Bruijnes, M. , van Waterschoot, J. B., Pelachaud, C. , Theune, M. , & Heylen, D. K. J. (2017). Selecting and Expressing Communicative Functions in a SAIBA-Compliant Agent Framework. In J. Beskow, C. Peters, G. Castellano, C. O'Sullivan, I. Leite, & S. Kopp (Eds.), Intelligent Virtual Agents: 17th International Conference, IVA 2017, Stockholm, Sweden, August 27-30, 2017, Proceedings (pp. 73-82). ( Lecture Notes in Computer Science; Vol. 10498). Springer. https://doi.org/10.1007/978-3-319-67401-8_8

Catala, A. , Theune, M. , & Heylen, D. (2017). My tablet is moving around, can I touch it? In TEI 2017 - Proceedings of the 11th International Conference on Tangible, Embedded, and Embodied Interaction (pp. 495-502). Association for Computing Machinery (ACM). https://doi.org/10.1145/3024969.3025082

Catala, A. , Theune, M. , Gijlers, H. , & Heylen, D. (2017). Storytelling as a creative activity in the classroom. In C&C '17: Proceedings of the 2017 ACM SIGCHI Conference on Creativity and Cognition 2017 (pp. 237-242). Association for Computing Machinery (ACM). https://doi.org/10.1145/3059454.3078857, https://doi.org/10.1145/3059454.3078857

Catala, A. , Theune, M. , Reidsma, D. , ter Stal, S. , & Heylen, D. K. J. (2017). Exploring Children’s Use of a Remotely Controlled Surfacebot Character for Storytelling. In Y. Chisik, J. Holopainen, R. Khaled, J. L. Silva, & P. A. Silva (Eds.), Intelligent Technologies for Interactive Entertainment : 9th International Conference, INTETAIN 2017, Funchal, Portugal, June 20-22, 2017, Proceedings (pp. 120-129). (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Vol. 215). Springer. https://doi.org/10.1007/978-3-319-73062-2_9

Catala, A. , Theune, M., Sylla, C., & Ribeiro, P. (2017). Bringing Together Interactive Digital Storytelling with Tangible Interaction: Challenges and Opportunities. In N. Nunes, I. Oakley, & V. Nisi (Eds.), Interactive Storytelling: 10th International Conference on Interactive Digital Storytelling, ICIDS 2017, Proceedings (pp. 395-398). (Lecture Notes in Computer Science; Vol. 10690). Springer. https://doi.org/10.1007/978-3-319-71027-3_51

Cauchi, N., Hoque, K. A., Abate, A. , & Stoelinga, M. (2017). Efficient probabilistic model checking of smart building maintenance using fault maintenance trees. In BuildSys'17: Proceedings of the 4th ACM International Conference on Systems for Energy-Efficient Built Environments [24] ACM/Sheridan. https://doi.org/10.1145/3137133.3137138

Charisi, V. , Davison, D. P. , Wijnen, F. M. , Reidsma, D. , & Evers, V. (2017). Measuring Children’s Perceptions of Robots’ Social Competence: Design and Validation. In A. Kheddar, E. Yoshida, S. S. Ge, K. Suzuki, J-J. Cabibihan, F. Eyssel, & H. He (Eds.), Social Robotics: 9th International Conference, ICSR 2017, Tsukuba, Japan, November 22-24, 2017, Proceedings (pp. 676-686). (Lecture notes in computer science; Vol. 10652).. https://doi.org/10.1007/978-3-319-70022-9_67

Charisi, V., Habibovic, A., Andersson, J. , Li, J. J. , & Evers, V. (2017). Children's Views on Identification and Intention Communication of Self-driving Vehicles. In IDC '17 Proceedings of the 2017 Conference on Interaction Design and Children (pp. 399-404). Association for Computing Machinery (ACM). https://doi.org/10.1145/3078072.3084300

Chaudhary, K. , Fehnker, A., & Mehta, V. (2017). Modelling, Verification, and Comparative Performance Analysis of the B.A.T.M.A.N. Protocol. In H. Hermanns, & P. Höfner (Eds.), Proceedings 2nd Workshop on Models for Formal Analysis of Real Systems, MARS@ETAPS 2017: Uppsala, Sweden, 29th April 2017 (pp. 53-65). (Electronic Proceedings in Theoretical Computer Science (EPTCS); Vol. 244). EPTCS. https://doi.org/10.4204/EPTCS.244.3

Cheng, S., Kotsia, I. , Pantic, M., & Zafeiriou, S. (2017). 4DFAB: A Large Scale 4D Facial Expression Database for Biometric Applications. In R. Chellappa, Z. Zhang, & A. Hoogs (Eds.), 30th IEEE Conference on Computer Vision and Pattern Recognition : CVPR 2017: 21-26 July 2016, Honolulu, Hawaii : proceedings IEEE. https://arxiv.org/abs/1712.01443

Chevalier, P. , Li, J. J., Ainger, E., Alcorn, A. M., Babovic, S., Charisi, V., Petrovic, S. , Schadenberg, B. R., Pellicano, E. , & Evers, V. (2017). Dialogue Design for a Robot-Based Face-Mirroring Game to Engage Autistic Children with Emotional Expressions. In A. Kheddar, E. Yoshida, S. S. Ge, K. Suzuki, J-J. Cabibihan, F. Eyssel, & H. He (Eds.), Social Robotics: 9th International Conference, ICSR 2017, Tsukuba, Japan, November 22-24, 2017, Proceedings (pp. 546-555). ( Lecture Notes in Computer Science; Vol. 10652). Springer. https://doi.org/10.1007/978-3-319-70022-9_54

Chung, T. , van Rijswijk, R. M., Choffnes, D., Levin, D., Maggs, B., Mislove, A., & Wilson, C. (2017). Understanding the Role of Registrars in DNSSEC Deployment. In IMC '17: Proceedings of the 2017 Internet Measurement Conference (pp. 369-383). Association for Computing Machinery (ACM). https://doi.org/10.1145/3131365.3131373

Chung, T. , van Rijswijk-Deij, R., Chandrasekaran, B., Choffnes, D., Levin, D., Maggs, B., Mislove, A., & Wilson, C. (2017). A Longitudinal, End-to-End View of the DNSSEC Ecosystem. In Proceedings of the 26th USENIX Security Symposium: August 16–18, 2017 • Vancouver, BC, Canada (pp. 1307-1322). USENIX. https://www.usenix.org/node/203653

Continella, A., Fratantonio, Y., Lindorfer, M., Puccetti, A., Zand, A., Kruegel, C., & Vigna, G. (2017). Obfuscation-resilient privacy leak detection for mobile apps through differential analysis. In Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS) https://doi.org/10.14722/ndss.2017.23465

Cruz, I., Moreira, C. , Poel, M., Ferreira, H. , & Nijholt, A. (2017). Kessel Run - A Cooperative Multiplayer SSVEP BCI Game. In Y. Chisik, J. Holopainen, R. Khaled, J. L. Silva, & P. A. Silva (Eds.), Intelligent Technologies for Interactive Entertainment: 9th International Conference, INTETAIN 2017, Funchal, Portugal, June 20-22, 2017, Proceedings (pp. 77-95). (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Vol. 215). Springer. https://doi.org/10.1007/978-3-319-73062-2_6

Dai, X., Oberhagemann, M. , Truong, K. P. , & Van Der Velde, F. (2017). Bridge the gap of codification and personalization strategies: Gain and lost of knowledge management of postgraduate student project meetings. In K. Liu, A. C. Salgado, J. Bernardino, J. Filipe, & J. Filipe (Eds.), Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management. Volume 3 KMIS (pp. 247-254). SCITEPRESS. https://doi.org/10.5220/0006584602470254

Daneva, M. , Wang, C., Hoener, P., & Hoener, P. (2017). What the Job Market Wants from Requirements Engineers? An Empirical Analysis of Online Job Ads from the Netherlands. In Proceedings - 11th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2017 (pp. 448-453). (International Symposium on Empirical Software Engineering and Measurement; Vol. 2017). IEEE Computer Society. https://doi.org/10.1109/ESEM.2017.60

Darabi, S. , Blom, S. C. C. , & Huisman, M. (2017). A Verification Technique for Deterministic Parallel Programs. In C. Barrett, M. Davies, & T. Kahsai (Eds.), NASA Formal Methods: 9th International Symposium, NFM 2017, Moffett Field, CA, USA, May 16-18, 2017, Proceedings (pp. 247-264). (Lecture Notes in Computer Science; Vol. 10227). https://doi.org/10.1007/978-3-319-57288-8_17

Davison, D., Gorer, B. , Kolkmeier, J. , Linssen, J. M. , Schadenberg, B. R., van de Vijver, B., Campbell, N. , Dertien, E. , & Reidsma, D. (2017). Things that Make Robots Go HMMM : Heterogeneous Multilevel Multimodal Mixing to Realise Fluent, Multiparty, Human-Robot Interaction. In K. P. Truong, & D. Reidsma (Eds.), Proceedings of eNTERFACE '16 (pp. 6-20). Telematica Instituut / CTIT.

De Vries, R. A. J. , Zaga, C., Bayer, F. , Drossaert, C. H. C. , Truong, K. P. , & Evers, V. (2017). Experts Get Me Started, Peers Keep Me Going: Comparing Crowd- versus Expert-Designed Motivational Text Messages for Exercise Behavior Change. In Proceedings of the 11th EAI International Conference on Pervasive Computing Technologies for Healthcare Association for Computing Machinery (ACM).

De Vries, W. B. , de Oliveira Schmidt, R., Hardaker, W., Heidemann, J. , de Boer, P-T. , & Pras, A. (2017). Broad and load-aware anycast mapping with Verfploeter. In IMC '17: Proceedings of the 2017 Internet Measurement Conference (pp. 477-488). Association for Computing Machinery (ACM). https://doi.org/10.1145/3131365.3131371

Divasón, J. , Joosten, S., Thiemann, R., & Yamada, A. (2017). A formalization of the Berlekamp-Zassenhaus factorization algorithm. In CPP 2017: Proceedings of the 6th ACM SIGPLAN Conference on Certified Programs and Proofs (pp. 17-29). Association for Computing Machinery (ACM). https://doi.org/10.1145/3018610.3018617

Edirisinghe, C. , Nijholt, A., & Cheok, A. D. (2017). From Playable to Playful: The Humorous City. In Intelligent Technologies for Interactive Entertainment: 8th International Conference, INTETAIN 2016, Utrecht, The Netherlands, June 28–30, 2016, Revised Selected Papers (pp. 261-265). ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; Vol. 178). Springer. https://doi.org/10.1007/978-3-319-49616-0_25


Esquivel Vargas, H. T., Caselli, M. , & Peter, A. (2017). Automatic Deployment of Specification-based Intrusion Detection in the BACnet Protocol. In CPS'17, Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy (pp. 25-36). ACM Publishing. https://doi.org/10.1145/3140241.3140244

Fotiadou, E., Panagakis, Y. , & Pantic, M. (2017). Temporal Archetypal Analysis for Action Segmentation. In Proceedings - 12th IEEE International Conference on Automatic Face and Gesture Recognition, FG 2017 - 1st International Workshop on Adaptive Shot Learning for Gesture Understanding and Production, ASL4GUP 2017, Biometrics in the Wild, Bwild 2017, Heterogeneous Face Recognition, HFR 2017, Joint Challenge on Dominant and Complementary Emotion Recognition Using Micro Emotion Features and Head-Pose Estimation, DCER and HPE 2017 and 3rd Facial Expression Recognition and Analysis Challenge, FERA 2017 (pp. 490-496). [7961781] IEEE. https://doi.org/10.1109/FG.2017.66

Franck, T. , Iacob, M-E. , van Sinderen, M. J. , & Wombacher, A. (2017). Towards an Integrated Architecture Model of Smart Manufacturing Enterprises. In VMSD 2017: Proceedings of the Seventh International Symposium on Business Modeling and Software Design (pp. 61-71). SCITEPRESS.

Gerhold, M. , & Stoelinga, M. (2017). Model-Based Testing of Probabilistic Systems with Stochastic Time. In E. Broch Johnsen (Ed.), Tests and Proofs: 11th International Conference, TAP 2017, Held as Part of STAF 2017, Marburg, Germany, July 19–20, 2017, Proceedings (pp. 77-97). (Lecture notes in computer science; Vol. 10375). https://doi.org/10.1007/978-3-319-61467-0_5

Gholibeigi, M., Sarrionandia, N. , Karimzadeh Motallebi Azar, M. , Baratchi, M. , van den Berg, H. L. , & Heijenk, G. (2017). Reliable vehicular broadcast using 5G device-to-device communication. In WMNC 2017: 10th IFIP Wireless and Mobile Networking Conference, 25-27 September 2017, Valencia (Spain) IEEE. https://doi.org/10.1109/WMNC.2017.8248846

Gillani, G. A. , & Kokkeler, A. B. J. (2017). Improving Error Resilience Analysis Methodology of Iterative Workloads for Approximate Computing. In CF'17: Proceedings of the Computing Frontiers Conference (pp. 374-379). Association for Computing Machinery (ACM). https://doi.org/10.1145/3075564.3078891

Gilmartin, E. , Kim, J., Diallo, A. , Zhao, Y., Chiarain, N. N., Su, K., Huang, Y., Cowan, B., & Campbell, N. (2017). CARAMILLA - Speech Mediated Language Learning Modules for Refugee and High School Learners of English and Irish. In O. Engwall, J. Lopes, & I. Leite (Eds.), SLaTE 2017: proceedings of the Seventh ISCA Workshop on Speech and Language Technology in Education, SLaTE 2017 KTH Royal Institute of Technology. http://www.slate2017.org/proceedings.pdf

Graf-Brill, A. , Hartmanns, A. , Hermanns, H., & Rose, S. (2017). Modelling and certification for electric mobility. In 2017 IEEE 15th International Conference on Industrial Informatics (INDIN 2017) (pp. 109-114). IEEE. https://doi.org/10.1109/INDIN.2017.8104755

Green, B., Krotofil, M. , & Abbasi, A. (2017). On the Significance of Process Comprehension for Conducting Targeted ICS Attacks. In CPS '17: Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy (pp. 57-67). Association for Computing Machinery (ACM). https://doi.org/10.1145/3140241.3140254

Haasnoot, E. , Barnhoorn, J. S. , Spreeuwers, L. J. , Veldhuis, R. N. J. , & Verwey, W. B. (2017). Towards understanding behavioural biometric classifier performance over time and practice. In R. Heusdens, & J. H. Weber (Eds.), Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux: May 11-12, 2017, Delft University of Technology, Delft, the Netherlands (pp. 79-88). Delft University of Technology.

Han, J., Zhang, Z., Schmitt, M. , Pantic, M., & Schuller, B. (2017). From hard to soft: Towards more human-like emotion recognition by modelling the perception uncertainty. In MM 2017 - Proceedings of the 25th ACM Multimedia Conference (pp. 890-897). Association for Computing Machinery (ACM). https://doi.org/10.1145/3123266.3123383

Hartmanns, A., Sedwards, S. , & D'Argenio, P. R. (2017). Efficient simulation-based verification of probabilistic timed automata. In W. K. V. Chan, A. D’Ambrogio, G. Zacharewicz, N. Mustafee, G. Wainer, & E. Page (Eds.), Proceedings of the 2017 Winter Simulation Conference (pp. 1419-1430). IEEE. https://doi.org/10.1109/WSC.2017.8247885

Hendriks, L., Velan, P. , de O. Schmidt, R. , de Boer, P-T. , & Pras, A. (2017). Flow-based detection of IPv6-specific network layer attacks. In D. Tuncer, R. Koch, R. Badonne, & B. Stiller (Eds.), Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Proceedings (pp. 137-142). (Lecture Notes in Computer Science; Vol. 10356), (Lecture Notes in Computer Communication Networks and Telecommunications). Springer. https://doi.org/10.1007/978-3-319-60774-0_11


Hendriks, L. , de Boer, P-T. , & Pras, A. (2017). IPv6-specific misconfigurations in the DNS. In 2017 13th International Conference on Network and Service Management (CNSM) (International Conference on Network and Service Management Proceedings). IEEE. https://doi.org/10.23919/CNSM.2017.8256036

Hendriks, L. , de Oliveira Schmidt, R., van Rijswijk-Deij, R. , & Pras, A. (2017). On the potential of IPv6 open resolvers for DDoS attacks. In M. A. Kaafar, S. Uhlig, & J. Amann (Eds.), Passive and Active Measurement: 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings (pp. 17-29). (Lecture Notes in Computer Science; Vol. 10176), (Lecture Notes in Computer Communication Networks and Telecommunications). Springer. https://doi.org/10.1007/978-3-319-54328-4_2

Herrmann, A., Berry, D. M. , Daneva, M., & Groen, E. C. (2017). CreaRE 2017: Sixth International Workshop on Creativity in Requirements Engineering. In REFSQ-JP 2017: REFSQ 2017 Joint Proceedings of the Co-Located Events (CEUR workshop proceedings; Vol. 1796). CEUR. http://ceur-ws.org/Vol-1796/

Hiemstra, D., Hauff, C., & Azzopardi, L. (2017). Exploring the Query Halo Effect in Site Search: Leading People to Longer Queries. In N. Kando, T. Sakay, H. Joho, H. Li, A. P. de Vries, & R. W. White (Eds.), SIGIR'17. Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval (pp. 981 - 984). Association for Computing Machinery (ACM). https://doi.org/10.1145/3077136.3080696

Hillerström, F. , Veldhuis, R. , & Spreeuwers, L. (2017). Deep Verification Learning. In R. Heusden, & J. H. Weber (Eds.), Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux: May 11-12, 2017, Delft University of Technology, Delft, the Netherlands (pp. 97-104). Delft University of Technology.


Huisman, M. (2017). A verification technique for deterministic parallel programs: Invited abstract. In W. Vanhoof, & B. Pientka (Eds.), Proceedings of the 19th International Symposium on Principles and Practice of Declarative Programming, Namur, Belgium, October 09 - 11, 2017 (pp. 3). ACM/Sheridan. https://doi.org/10.1145/3131851.3131852

Huisman, M. (2017). Verification of Concurrent Software with VerCors. In M. Walden (Ed.), Proceedings of the 29th Nordic Workshop on Programming Theory (NWPT) (pp. 2). (TUCS lecture notes; No. 27).

Hähnle, R. , & Huisman, M. (2017). 24 Challenges in Deductive Software Verification. In G. Reger, & D. Traytel (Eds.), ARCADE 2017, 1st International Workshop on Automated Reasoning: Challenges, Applications, Directions, Exemplary Achievements, Gothenburg, Sweden, 6th August 2017 (pp. 37-41). (EPiC Series in Computing; Vol. 51). EasyChair. http://www.easychair.org/publications/paper/kdZ7

Ibrahim, A. M. Y. , & Kerkhoff, H. G. (2017). A cost-efficient dependability management framework for self-aware system-on-chips based on IEEE 1687. In 2017 IEEE 23rd International Symposium on On-Line Testing and Robust System Design (IOLTS) (pp. 1-2). IEEE. https://doi.org/10.1109/IOLTS.2017.8046166


Jasper, M., Fecke, M., Steffen, B., Schordan, M. , Meijer, J. , van de Pol, J., Howar, F., & Siegel, S. F. (2017). The RERS 2017 Challenge and Workshop. In Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software (pp. 11-20). ACM Inc.. https://doi.org/10.1145/3092282.3098206

Jongerden, M. R. , & Haverkort, B. R. (2017). Battery Aging, Battery Charging and the Kinetic Battery Model: A First Exploration. In N. Bertrand, & L. Bortolussi (Eds.), Quantitative Evaluation of Systems: 14th International Conference, QEST 2017, Berlin, Germany, September 5-7, 2017, Proceedings (pp. 88-103). (Lecture Notes in Computer Science; Vol. 10503). Springer. https://doi.org/10.1007/978-3-319-66335-7_6

Jonker, M. , & Sperotto, A. (2017). Measuring exposure in DDoS protection services. In 2017 13th International Conference on Network and Service Management (CNSM) IEEE. https://doi.org/10.23919/CNSM.2017.8255991

Joosten, S. JC. (2017). Parsing and Printing of and with Triples. In P. Höfner, D. Pous, & G. Struth (Eds.), Relational and algebraic methods in computer science: 16th International Conference, RAMiCS 2017, Lyon, France, May 15-18, 2017. Proceedings (pp. 159-176). (Lecture Notes in Computer Science; Vol. 10226). Springer.

Junger, M. , Montoya, L. , Hartel, P. H., & Heydari, M. (2017). Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe. In 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA) IEEE. https://doi.org/10.1109/CyberSA.2017.8073391

Jutman, A., Lotz, C., Larsson, E., Reorda, M. S., Jenihhin, M., Raik, J. , Kerkhoff, H. G., Krenz-Baath, R., & Engelke, P. (2017). BASTION: Board and SoC test instrumentation for ageing and no failure found. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017 (pp. 115-120). IEEE. https://doi.org/10.23919/DATE.2017.7926968

Kamminga, J. W., Bisby, H. C. , Le, D. V. , Meratnia, N. , & Havinga, P. J. M. (2017). Generic online animal activity recognition on collar tags. In UbiComp'17: Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers (pp. 597-606). ACM Press. https://doi.org/10.1145/3123024.3124407

Karimzadeh Motallebi Azar, M., Valtulina, L. , Pras, A., Liebsch, M., & Taleb, T. (2017). Double-NAT Based Mobility Management for Future LTE Networks. In IEEE Wireless Communications and Networking Conference (WCNC 2017) IEEE. https://doi.org/10.1109/WCNC.2017.7925948


Karimzadeh, M., Valtulina, L. , Berg, H. V. D. , Pras, A., Ortiz, P. G., & Sadre, R. (2017). MultiPath TCP to support user's mobility in future LTE network. In 10th IFIP Wireless and Mobile Networking Conference, WMNC 2017, Valencia, Spain, September 25-27, 2017 IEEE. https://doi.org/10.1109/WMNC.2017.8248845

Karuppiah Ramachandran, V. R. , Le Viet Duc, L. D. , Meratnia, N. , & Havinga, P. J. M. (2017). DiNAMAC: A disruption tolerant, reinforcement learning-based Mac protocol for implantable body sensor networks. In 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI) (pp. 1806-1814) https://doi.org/10.1109/UIC-ATC.2017.8397664

Karvelas, N. P. , Peter, A., & Katzenbeisser, S. (2017). Using Oblivious RAM in Genomic Studies. In J. Garcia-Alfaro, G. Navarro-Aribas, H. Hartenstein, & J. Herrera-Joancomarti (Eds.), Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings (pp. 35-52). (Lecture notes in computer science; Vol. 10436). Springer. https://doi.org/10.1007/978-3-319-67816-0_3


Kim, J. , Englebienne, G. , Truong, K. P. , & Evers, V. (2017). Deep Temporal Models using Identity Skip-Connections for Speech Emotion Recognition. In MM '17: Proceedings of the 2017 ACM on Multimedia Conference (pp. 1006-1013). Association for Computing Machinery (ACM). https://doi.org/10.1145/3123266.3123353

Kim, J. , Englebienne, G. , Truong, K. P. , & Evers, V. (2017). Towards Speech Emotion Recognition "in the wild" using Aggregated Corpora and Deep Multi-Task Learning. In Interspeech 2017: 20-24 August 2017, Stockholm (pp. 1113-1117). International Speech Communication Association (ISCA). https://doi.org/10.21437/Interspeech.2017

Klaassen, R. , Van Delden, R. , Cabrita, M. , & Tabak, M. (2017). AIRPlay: Towards a 'breathgiving' approach. In P. Tikka, R. Klaassen, P. Karppinen, R. de Vries, R. van Delden, H. Oinas-Kukkonen, L. van Gemert-Pijnen, & D. Heylen (Eds.), BCSS 2017: Proceedings of the Fifth International Workshop on Behavior Change Support Systems (pp. 38-45). (CEUR Workshop Proceedings; Vol. 1822). http://ceur-ws.org/Vol-1822/BCSS_2017_paper_4.pdf

Kolkmeier, J. , Bruijnes, M. , & Reidsma, D. (2017). A demonstration of the ASAP Realizer-Unity3D bridge for virtual and mixed reality applications. In J. Beskow, C. Peters, G. Castellano, C. O'Sullivan, I. Leite, & S. Kopp (Eds.), Intelligent Virtual Agents : 17th International Conference, IVA 2017, Stockholm, Sweden, August 27-30, 2017, Proceedings (Vol. 10498 LNAI, pp. 223-226). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10498 LNAI). Springer. https://doi.org/10.1007/978-3-319-67401-8_26

Kolkmeier, J. , Bruijnes, M. , Reidsma, D. , & Heylen, D. K. J. (2017). An ASAP Realizer-Unity3D Bridge for Virtual and Mixed Reality Applications. In J. Beskow, C. Peters, G. Castellano, C. O'Sullivan, I. Leite, & S. Kopp (Eds.), Intelligent Virtual Agents: 17th International Conference, IVA 2017, Stockholm, Sweden, August 27-30, 2017, Proceedings (pp. 227-230). (Lecture Notes in Computer Science ; Vol. 10498). Springer. https://doi.org/10.1007/978-3-319-67401-8_27

Kolkmeier, J., Lee, M. , & Heylen, D. K. J. (2017). Moral conflicts in VR: Addressing grade disputes with a virtual trainer. In Intelligent Virtual Agents: 17th International Conference, IVA 2017, Stockholm, Sweden, August 27-30, 2017, Proceedings (pp. 231-234). (Lecture notes in computer science; Vol. 10498). Springer. https://doi.org/10.1007/978-3-319-67401-8_28

Kuhnert, B. , Steinberger, J., Baier, H. , Sperotto, A. , & Pras, A. (2017). Booters and Certificates: An Overview of TLS in the DDoS-as-a-Service Landscape. In P. Lorenz, & J. Trienekens (Eds.), ACCSE 2017: The Second International Conference on Advances in Computation, Communications and Services (pp. 37). IARIA/Thinkmind. http://thinkmind.org/index.php?view=article&articleid=accse_2017_3_30_80028

Kuiper, G. , & Bekooij, M. J. G. (2017). Latency analysis of homogeneous synchronous dataflow graphs using timed automata. In Proceedings of the 2017 Design, Automation & Test in Europe (DATE): 27–31 March 2017, Swisstech, Lausanne, Switzerland (pp. 902-905). IEEE. https://doi.org/10.23919/DATE.2017.7927116

Kumar, R. , & Stoelinga, M. I. A. (2017). Quantitative security and safety analysis with attack-fault trees. In Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering (HASE 2017) (pp. 25-32). (HASE). IEEE. https://doi.org/10.1109/HASE.2017.12

Langerak, R. , van de Pol, J. , Post, J. N. , & Schivo, S. (2017). Improving the Timed Automata Approach to Biological Pathway Dynamics. In L. Aceto, G. Bacci, G. Bacci, A. Ingólfsdóttir, A. Legay, & R. Mardare (Eds.), Models, Algorithms, Logics and Tools: Essays Dedicated to Kim Guldstrand Larsen on the Occasion of His 60th Birthday (pp. 96-111). (Lecture Notes in Computer Science; Vol. 10460). Springer. https://doi.org/10.1007/978-3-319-63121-9_5



Li, D. , & van der Veer, G. C. (2017). From Painter to Interaction Designer: The Evolution of Visual Art Things. In A. Joshi, D. K. Balkrishan, G. Dalvi, & M. Winckler (Eds.), Adjunct Proceedings INTERACT 2017 Mumbai: 16th IFIP TC.13 International Conference on Human Computer Interaction, September 25–29, 2017, Mumbai, India (pp. 139-149). Indian Institute of Technology Madras.

Linssen, J. , & Theune, M. (2017). R3D3: The Rolling Receptionist Robot with Double Dutch Dialogue. In Proceedings of the Companion of the 2017 ACM/IEEE International Conference on Human-Robot Interaction (pp. 189-190). Association for Computing Machinery (ACM). https://doi.org/10.1145/3029798.3038372

Linssen, J., Berkhoff, M., Bode, M., Rens, E. , Theune, M., & Wiltenburg, D. (2017). You Can Leave Your Head On: Attention Management and Turn-Taking in Multi-party Interaction with a Virtual Human/Robot Duo. In J. Beskow, C. Peters, G. Castellano, C. O'Sullivan, I. Leite, & S. Kopp (Eds.), Intelligent Virtual Agents: 17th International Conference, IVA 2017, Stockholm, Sweden, August 27-30, 2017, Proceedings (pp. 251-254). (Lecture Notes in Computer Science; Vol. 10498). Springer. https://doi.org/10.1007/978-3-319-67401-8_33

Lopes de Souza, P., Francisco do Prado, A. , Lopes de Souza, W., Pereira, S. , & Ferreira Pires, L. (2017). Combining Behaviour-Driven Development with Scrum for Software Development in the Education Domain. In S. Hammoudi, M. Smialek, O. Camp, & J. Filipe (Eds.), Proceedings of the 19th International Conference on Enterprise Information Systems (ICEIS 2017) (Vol. 2, pp. 449-458). SCITEPRESS. https://doi.org/10.5220/0006336804490458

Marras, I., Nikitidis, S., Zafeiriou, S. , & Pantic, M. (2017). A Joint Discriminative Generative Model for Deformable Model Construction and Classification. In 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017) (pp. 127-134). [7961732] IEEE. https://doi.org/10.1109/FG.2017.24

Meijerink, B. J. , Baratchi, M. , & Heijenk, G. (2017). Evaluation of geocast routing trees on random and actual networks. In Y. Koucheryavy, L. Mamatas, I. Matta, A. Ometov, & P. Papadimitriou (Eds.), Wired/Wireless Internet Communications: 15th IFIP WG 6.2 International Conference, WWIC 2017, Proceedings (pp. 127-142). (Lecture Notes in Computer Science; Vol. 10372). Springer. https://doi.org/10.1007/978-3-319-61382-6_11

Mocanu, D. C. , Mocanu, E., Nguyen, P. H., Gibescu, M., & Liotta, A. (2017). Big IoT data mining for real-time energy disaggregation in buildings (extended abstract). In W. Duivesteijn, M. Pechenizkiy, G. Fletcher, V. Menkovski, E. Postma, J. Vanschoren, & P. van der Putten (Eds.), Benelearn 2017: Proceedings of the Twenty-Sixth Benelux Conference on Machine Learning TU/e.

Moreira, J. L. , Ferreira Pires, L. , van Sinderen, M. J. , & Dockhorn Costa, P. (2017). Ontology-Driven Conceptual Modeling for Early Warning Systems: Redesigning the Situation Modeling Language. In L. F. Pires, S. Hammoudi, & B. Selic (Eds.), MODELSWARD 2017: proceedings of the 5th intrnational conference on Model-Driven Engineering and Software Development: Porto, Portugal, February 19-21, 2017 (pp. 467-477). SCITEPRESS. https://doi.org/10.5220/0006208904670477

Müller, M. , Moura, G. G. M. , de O. Schmidt, R., & Heidemann, J. (2017). Recursives in the wild: engineering authoritative DNS servers. In IMC '17: Proceedings of the 2017 Internet Measurement Conference (pp. 489-495). Association for Computing Machinery (ACM). https://doi.org/10.1145/3131365.3131366

Neidlinger, K. L. , Truong, K. P., Telfair, C., Feijs, L. , Dertien, E. C. , & Evers, V. (2017). AWElectric: that gave me goosebumps, did you feel it too? In Proceedings of the Eleventh International Conference on Tangible, Embedded, and Embodied Interaction (TEI'17) (pp. 315-324). Association for Computing Machinery (ACM). https://doi.org/10.1145/3024969.3025004


Nguyen, T. , Le Viet Duc, D. V., Zhang, Q., & Karunanithi, M. (2017). Dirichlet Process Gaussian Mixture Model for Activity Discovery in Smart Homes with Ambient Sensors. In EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous) European Alliance for Innovation. https://publications.csiro.au/rpr/pub?pid=csiro:EP173997

Nijholt, A. (2017). Designed and Accidental Humor in the Smart Digital Wild. In L. Ruiz Miyares (Ed.), Proceedings of the 15th International Symposium on Social Communication: ISSC 2017 (pp. 310-317). (Nuevos estudios sobre Comunicación Social). Centro de Lingüística Aplicada.

Nijholt, A. (2017). Humans as Avatars in Smart and Playable Cities. In 2017 International Conference on Cyberworlds (CW) (pp. 190-193). IEEE. https://doi.org/10.1109/CW.2017.23

Nijholt, A. (2017). Humor Facilitation in Smart Workplaces. In A. Joshi, D. K. Balkrishan, G. Dalvi, & M. Winckler (Eds.), Adjunct Proceedings INTERACT 2017 Mumbai: 16th IFIP TC.13 International Conference on Human Computer Interaction, September 25–29, 2017, Mumbai, India (pp. 228-239). Indian Institute of Technology Madras. https://www.researchgate.net/publication/320127621_Humor_Facilitation_in_Smart_Workplaces

Nijholt, A. (2017). Playable cities: A short survey (Keynote paper). In 2017 6th International Conference on Informatics, Electronics and Vision and 2017 7th International Symposium in Computational Medical and Health Technology, ICIEV-ISCMHT 2017 (pp. 1-6). [8338610] (2017 6th International Conference on Informatics, Electronics and Vision and 2017 7th International Symposium in Computational Medical and Health Technology, ICIEV-ISCMHT 2017; Vol. 2018-January). IEEE. https://doi.org/10.1109/ICIEV.2017.8338610

Nijholt, A., & Minuto, A. (2017). Smart material interfaces: Playful and artistic applications (keynote paper). In 2017 IEEE International Conference on Imaging, Vision and Pattern Recognition, icIVPR 2017 IEEE. https://doi.org/10.1109/ICIVPR.2017.7890882

Nijholt, A. , Niculescu, A., Valitutti, A., & Banchs, R. E. (2017). Humor in Human-Computer Interaction: A Short Survey. In A. Joshi, D. K. Balkrishan, G. Dalvi, & M. Winckler (Eds.), Adjunct Proceedings INTERACT 2017 Mumbai: 16th IFIP TC.13 International Conference on Human Computer Interaction, September 25–29, 2017, Mumbai, India (pp. 192-214). Indian Institute of Technology Madras. https://www.researchgate.net/publication/320127779_Humor_in_Human-Computer_Interaction_A_Short_Survey

Oortwijn, W. , Blom, S., Gurov, D. , Huisman, M. , & Zaharieva, M. (2017). An Abstraction Technique for Describing Concurrent Program Behaviour. In A. Paskevich, & T. Wies (Eds.), Verified Software. Theories, Tools, and Experiments: 9th International Conference, VSTTE 2017, Heidelberg, Germany, July 22-23, 2017, Revised Selected Papers (pp. 191-209). (Lecture Notes in Computer Science; Vol. 10712). Springer. https://doi.org/10.1007/978-3-319-72308-2_12

Oortwijn, W. , van Dijk, T. , & van de Pol, J. (2017). Distributed Binary Decision Diagrams for Symbolic Reachability. In SPIN 2017 Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software (pp. 21-30). Association for Computing Machinery (ACM). https://doi.org/10.1145/3092282.3092284

Orhan, G. , Aksit, M. , & Rensink, A. (2017). A Formal Product-Line Engineering Approach for Schedulers. In L. Jololian, D. E. Robbins, & S. L. Fernandes (Eds.), SDPS 22nd International Conference on Emerging Trends and Technologies in Convergence Solutions (pp. 15-30). (Integrated design and process technology; Vol. 22). https://www.sdpsnet.org/sdps/documents/sdps-2017/proceedings-sdps-2017-v2.pdf


Petridis, S., Li, Z. , & Pantic, M. (2017). End-to-end visual speech recognition with LSTMS. In 2017 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2017 - Proceedings (pp. 2592-2596). [7952625] IEEE. https://doi.org/10.1109/ICASSP.2017.7952625

Poel, M. (2017). Detecting Mislabeled Data Using Supervised Machine Learning Techniques. In D. D. Schmorrow, & C. M. Fidopiastis (Eds.), Augmented Cognition. Neurocognition and Machine Learning: 11th International Conference, AC 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part I (pp. 571-581). Springer. https://doi.org/10.1007/978-3-319-58628-1_43

Pons, P., Jaen, J. , & Catala, A. (2017). Towards future interactive intelligent systems for animals: Study and recognition of embodied interactions. In IUI 2017 - Proceedings of the 22nd International Conference on Intelligent User Interfaces (pp. 389-400). Association for Computing Machinery (ACM). https://doi.org/10.1145/3025171.3025175

Postema, B. F. , & Haverkort, B. R. (2017). Specification of data centre power management strategies. In Proceedings of the 8th International Conference on Future Energy Systems, e-Energy 2017 (pp. 284-289). Association for Computing Machinery (ACM). https://doi.org/10.1145/3077839.3084025

Pu, J., Panagakis, Y., Petridis, S. , & Pantic, M. (2017). Audio-visual object localization and separation using low-rank and sparsity. In 2017 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2017 - Proceedings (pp. 2901-2905). [7952687] IEEE. https://doi.org/10.1109/ICASSP.2017.7952687

Raaijen, T. , & Daneva, M. (2017). Depicting the smarter cities of the future: A systematic literature review & field study. In J. Ruzicka (Ed.), 2017 Smart Cities Symposium Prague (SCSP): Prague, May 25-26, 2017 IEEE. https://doi.org/10.1109/SCSP.2017.7973352

Rakicevic, N., Rudovic, O., Petridis, S. , & Pantic, M. (2017). Multi-Modal Neural Conditional Ordinal Random Fields for Agreement Level Estimation. In 2016 23rd International Conference on Pattern Recognition (ICPR) (pp. 2228-2233). IEEE Computer Society. https://doi.org/10.1109/ICPR.2016.7899967

Ringeval, F., Gratch, J., Schuller, B., Cowie, R., Valstar, M. , & Pantic, M. (2017). AVEC 2017 chairs' welcome. In AVEC'17: Proceedings of the 7th Annual Workshop on Audio/Visual Emotion Challenge (pp. iii)

Ringeval, F., Schuller, B., Valstar, M., Gratch, J., Cowie, R. , & Pantic, M. (2017). Summary for AVEC 2017 - Real-life depression and affect challenge and workshop. In MM 2017 - Proceedings of the 2017 ACM Multimedia Conference (pp. 1963-1964). Association for Computing Machinery (ACM). https://doi.org/10.1145/3123266.3132049

Ringeval, F., Schuller, B., Valstar, M., Gratch, J., Cowie, R., Scherer, S., Mozgai, S., Cummins, N., Schmitt, M. , & Pantic, M. (2017). AVEC 2017 - Real-life depression, and affect recognition workshop and challenge. In AVEC'17: Proceedings of the 7th Annual Workshop on Audio/Visual Emotion Challenge (pp. 3-9). Association for Computing Machinery (ACM). https://doi.org/10.1145/3133944.3133953

Ruijters, E. J. J. , Reijsbergen, D. P. , de Boer, P-T. , & Stoelinga, M. I. A. (2017). Rare Event Simulation for Dynamic Fault Trees. In S. Tonetta, E. Schoitsch, & F. Bitsch (Eds.), Computer Safety, Reliability, and Security: 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings (pp. 20-35). (Lecture Notes in Computer Science; Vol. 10488). Springer. https://doi.org/10.1007/978-3-319-66266-4_2


Ruiz, A., Rudovic, O., Binefa, X. , & Pantic, M. (2017). Multi-instance dynamic ordinal random fields for weakly-supervised pain intensity estimation. In S-H. Lai, V. Lepetit, K. Nishino, & Y. Sato (Eds.), Computer Vision - ACCV 2016: 13th Asian Conference on Computer Vision, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers (pp. 171-186). (Lecture Notes in Computer Science; Vol. 10112). Springer. https://doi.org/10.1007/978-3-319-54184-6_11

Saeed, A., Trajanovski, S. , van Keulen, M. , & van Erp, J. B. F. (2017). Deep Physiological Arousal Detection in a Driving Simulator Using Wearable Sensors. In 2017 IEEE International Conference on Data Mining Workshops (ICDMW) (pp. 486-493). IEEE. https://doi.org/10.1109/ICDMW.2017.69

Saini, S. , & Fehnker, A. (2017). Evaluating the Stream Control Transmission Protocol Using Uppaal. In H. Hermanns, & P. Höfner (Eds.), Proceedings 2nd Workshop on Models for Formal Analysis of Real Systems, MARS@ETAPS 2017: Uppsala, Sweden, 29th April 2017 (pp. 1-13). (Electronic Proceedings in Theoretical Computer Science (EPTCS); Vol. 244). EPTCS. https://doi.org/10.4204/EPTCS.244.1

Santanna, J. J. , Schmidt, R. D. O., Tuncer, D., De Vries, J., Granville, L. Z. , & Pras, A. (2017). Booter blacklist: Unveiling DDoS-for-hire websites. In S. Keith-Marsoun, C. R. P. dos Santos, N. Limam, M. Cheriet, M. F. Zhani, & O. Festor (Eds.), 2016 12th International Conference on Network and Service Management, CNSM 2016 and Workshops, 3rd International Workshop on Management of SDN and NFV, ManSDN/NFV 2016, and International Workshop on Green ICT and Smart Networking, GISN 2016 (pp. 144-152). [7818410] IEEE. https://doi.org/10.1109/CNSM.2016.7818410

Scherhag, U., Nautsch, A., Rathgeb, C., Gomez-Barrero, M. , Veldhuis, R. N. J. , Spreeuwers, L., Schils, M., Maltoni, D., Grother, P., Marcel, S., Breithaupt, R., Ramachandra, R., & Busch, C. (2017). Biometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reporting. In 2017 International Conference of the Biometrics Special Interest Group, BIOSIG 2017 [8053499] Gesellschaft für Informatik. https://doi.org/10.23919/BIOSIG.2017.8053499

Schivo, S. , Yildiz, B. M. , Ruijters, E. J. J., Gerking, C. , Kumar, R., Dziwok, S. , Rensink, A. , & Stoelinga, M. I. A. (2017). How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach. In K. Larsen, O. Sokolsky, & J. Wang (Eds.), Dependable Software Engineering. Theories, Tools, and Applications: Third International Symposium, SETTA 2017, Changsha, China, October 23-25, 2017, Proceedings (pp. 319-336). (Lecture Notes in Computer Science; Vol. 10606), (Lecture Notes in Programming and Software Engineering). Springer. https://doi.org/10.1007/978-3-319-69483-2_19


Singh, P. M. , van Sinderen, M. J. , & Wieringa, R. J. (2017). Reference architecture for integration platforms. In 2017 IEEE 21st International Enterprise Distributed Object Computing Conference (EDOC) (pp. 113-122). (IEEE International Enterprise Distributed Object Computing Conference (EDOC); Vol. 2017). IEEE. https://doi.org/10.1109/EDOC.2017.24

Spreeuwers, L. (2017). De-Duplication Using Automated Face Recognition: A Mathematical Model and All Babies Are Equally Cute. In 2017 International Conference of the Biometrics Special Interest Group, BIOSIG 2017 [8053500] Gesellschaft für Informatik. https://doi.org/10.23919/BIOSIG.2017.8053500

Theune, M., Wiltenburg, D., Bode, M. , & Linssen, J. (2017). R3D3 in the Wild: Using A Robot for Turn Management in Multi-Party Interaction with a Virtual Human. In Proceedings of 1st Interaction with Agents and Robots 2017: Different Embodiments, Common Challenges: Workshop in conjunction with the 17th International Conference on Intelligent Virtual Agents

Tran, D. L., Walecki, R., Rudovic, O., Eleftheriadis, S., Schuller, B. , & Pantic, M. (2017). DeepCoder: Semi-parametric Variational Autoencoders for Automatic Facial Action Coding. In The IEEE International Conference on Computer Vision (ICCV2017) (pp. 3190-3199). (Computer Vision). https://doi.org/10.1109/ICCV.2017.346

Tseng Lau, E., Keong Chai, K., Chen, Y. , & Vasenev, A. (2017). Towards Improving Resilience of Smart Urban Electricity Networks by Interactively Assessing Potential Microgrids. In Proceedings of the 6th International Conference on Smart Cities and Green ICT Systems (Vol. 1, pp. 352-359). SciTecPress.

Van Keulen, M., Geerdink, J., Linssen, G. C. M. , Slart, R. H. J. A., & Vijlbrief, O. (2017). Exploiting Natural Language Processing for Improving Health Processes. In P. Ceravolo, M. van Keulen, & K. Stoffel (Eds.), Proceedings of the 7th International Symposium on Data-Driven Process Discovery and Analysis (SIMPDA 2017) (pp. 145-146). (CEUR Workshop Proceedings; Vol. 2016). CEUR. http://ceur-ws.org/Vol-2016/paper11.pdf

Vasenev, A. , Ionita, D., Zoppi, T., Ceccarelli, A. , & Wieringa, R. J. (2017). Towards security requirements: Iconicity as a feature of an informal modeling language. In CEUR Workshop Proceedings (Vol. 1796, pp. 1-15). (CEUR Workshop Proceedings; Vol. 1796). CEUR. http://www.ceur-ws.org/Vol-1796/resacs-paper-2.pdf

Vasenev, A. , Montoya, L. , & Ionita, D. (2017). Outlining an ‘Evaluation continuum’: Structuring evaluation methodologies for infrastructure-related decision making tools. In E. T. Lau, M. K. K. chai, Y. Chen, O. Jung, V. C. M. Leung, K. Yang, S. Bessler, J. Loo, & T. Nakayama (Eds.), Smart Grid Inspired Future Technologies: Second EAI International Conference, SmartGIFT 2017, London, UK, March 27–28, 2017, Proceedings (pp. 243-249). ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; Vol. 203). Springer. https://doi.org/10.1007/978-3-319-61813-5_24

Velasco, C. , Nijholt, A., Obrist, M., Okajima, K., Schifferstein, R., & Spence, C. (2017). MHFI 2017: 2nd international workshop on multisensorial approaches to human-food interaction (workshop summary). In ICMI 2017: Proceedings of the 19th ACM International Conference on Multimodal Interaction (pp. 674-676). Association for Computing Machinery (ACM). https://doi.org/10.1145/3136755.3137023

Velasco, C. , Nijholt, A., Obrist, M., Okajima, K., Spence, C., & Schifferstein, R. (2017). Message from the chairs. In C. Velasco, A. Nijholt, M. Obrist, K. Okajima, R. Schifferstein, & C. Spence (Eds.), MHFI '17: Proceedings of the 2nd ACM SIGCHI International Workshop on Multisensory Approaches to Human-Food Interaction (pp. iii-iii). Association for Computing Machinery (ACM). https://portalparts.acm.org/3150000/3141788/fm/frontmatter.pdf

Vroon, J. H. (2017). Responsive Social Positioning Behaviors for Semi-Autonomous Telepresence Robots. In HRI '17 Proceedings of the Companion of the 2017 ACM/IEEE International Conference on Human-Robot Interaction (pp. 383-384) https://doi.org/10.1145/3029798.3034821

Vroon, J. , Zaga, C. , Davison, D. , Kolkmeier, J. , & Linssen, J. (2017). Snoozle - A Robotic Pillow That Helps You Go to Sleep: HRI 2017 Student Design Competition. In HRI '17: Proceedings of the Companion of the 2017 ACM/IEEE International Conference on Human-Robot Interaction (pp. 399-400). Association for Computing Machinery (ACM). https://doi.org/10.1145/3029798.3034949

Walecki, R., Rudovic, O., Pavlovic, V., Schuller, B. , & Pantic, M. (2017). Deep Structured Learning for Facial Action Unit Intensity Estimation. In 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (pp. 3405-3414). IEEE. https://doi.org/10.1109/CVPR.2017.605

Wang, C., Luo, Z., Lin, L. , & Daneva, M. (2017). How to Reduce Software Development Cost with Personnel Assignment Optimization. In EASE'17: Proceedings of the 21st International Conference on Evaluation and Assessment in Software Engineering (pp. 270-279). ACM Press. https://doi.org/10.1145/3084226.3084245

Yildiz, B. M. , Bockisch, C. , Aksit, M. , & Rensink, A. (2017). An MDE Approach for Modular Program Analyses. In Programming ’17: Companion to the first International Conference on the Art, Science and Engineering of Programming [15] Association for Computing Machinery (ACM). https://doi.org/10.1145/3079368.3079392

Yildiz, B. M. , Bockisch, C. , Rensink, A. , & Aksit, M. (2017). A Java Bytecode Metamodel for Composable Program Analyses. In M. Seidl, & S. Zschaler (Eds.), Software Technologies: Applications and Foundations: STAF 2017 Collocated Workshops, Marburg, Germany, July 17-21, 2017, Revised Selected Papers (pp. 30-40). (Lecture Notes in Computer Science; Vol. 10748). Springer. https://doi.org/10.1007/978-3-319-74730-9_4

Yildiz, B. M. , Rensink, A. , Bockisch, C. , & Aksit, M. (2017). A Model-Derivation Framework for Software Analysis. In H. Hermanns, & P. Höffner (Eds.), Proceedings 2nd Workshop on Models for Formal Analysis of Real Systems (MARS): Uppsala, Sweden, 29th April 2017 (pp. 217-229). (EPTCS - Electronic Publications in Theoretical Computer Science; Vol. 244). arXiv.org. https://doi.org/10.4204/EPTCS.244.9

Zafeiriou, L., Zafeiriou, S. , & Pantic, M. (2017). Deep Analysis of Facial Behavioral Dynamics. In 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (pp. 1988-1996). [8014983] IEEE Computer Society. https://doi.org/10.1109/CVPRW.2017.249

Zaga, C. (2017). Something in The Way It Moves and Beeps: Exploring Minimal Nonverbal Robot Behavior for Child-Robot Interaction. In HRI '17: Proceedings of the Companion of the 2017 ACM/IEEE International Conference on Human-Robot Interaction (pp. 387-388). Association for Computing Machinery (ACM). https://doi.org/10.1145/3029798.3034816

Zaga, C., Charisi, V. , Schadenberg, B. , Reidsma, D., Neerincx, M., Prescott, T., Zillich, M., Verschure, P. , & Evers, V. (2017). Growing-Up Hand in Hand with Robots: Designing and Evaluating Child-Robot Interaction from a Developmental Perspective. In HRI '17: Proceedings of the Companion of the 2017 ACM/IEEE International Conference on Human-Robot Interaction (pp. 429-430). Association for Computing Machinery (ACM). https://doi.org/10.1145/3029798.3029804

Zaga, C. , Moreno Celleri, A. M. , & Evers, V. (2017). Gotta Hatch 'Em All! Robot-Supported Cooperation in Interactive Playgrounds. In CSCW '17 Companion Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (pp. 347-350). Association for Computing Machinery (ACM). https://doi.org/10.1145/3022198.3026355

Zaga, C. , de Vries, R. A. J. , Li, J. , Truong, K. P. , & Evers, V. (2017). A Simple Nod of the Head: The Effect of Minimal Robot Movements on Children's Perception of a Low-Anthropomorphic Robot. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 336-341). Association for Computing Machinery (ACM). https://doi.org/10.1145/3025453.3025995



Zeinstra, C. , Veldhuis, R. , & Spreeuwers, L. (2017). How Random Is a Classifier Given Its Area under Curve? In A. Brömme, C. Busch, A. Dantcheva, C. Rathgeb, & A. Uhl (Eds.), 2017 International Conference of the Biometrics Special Interest Group (BIOSIG): BIOSIG 2017 [8053509] Gesellschaft für Informatik. https://doi.org/10.23919/BIOSIG.2017.8053509

Zeinstra, C. , Veldhuis, R. , Spreeuwers, L., & Ruifrok, A. (2017). Manually annotated characteristic descriptors: Measurability and variability. In 2017 5th International Workshop on Biometrics and Forensics (IWBF 2017) [7935095] IEEE. https://doi.org/10.1109/IWBF.2017.7935095

Zeng, L., Weber, G., Ravyse, I., Simros, M., Mioch, T. , van Erp, J. B. F., Conradie, P., & Saldien, J. (2017). Range-IT: Detection and multimodal presentation of indoor objects for visually impaired people. In MobileHCI '17: Proceedings of the 19th International Conference on Human-Computer Interaction with Mobile Devices and Services [54] Association for Computing Machinery (ACM). https://doi.org/10.1145/3098279.3125442

Zhang, K. , Ayele, E. D. , Meratnia, N. , Havinga, P. J. M., Guo, P., & Wu, Y. (2017). MobiBone: An energy-efficient and adaptive network protocol to support short rendezvous between static and mobile wireless sensor nodes. In 2017 International Conference on Computing, Networking and Communications, ICNC 2017 (pp. 1024-1030). [7876275] IEEE. https://doi.org/10.1109/ICCNC.2017.7876275

Zhao, Z. , Karimzadeh Motallebi Azar, M., Braun, T. , Pras, A. , & van den Berg, H. L. (2017). Cloudified Mobility and Bandwidth Prediction in Virtualized LTE Networks. In IFIP/IEEE International Symposium on Integrated Network Management (IM 2017) IEEE. https://doi.org/10.23919/INM.2017.7987321

Zoppi, T., Bessler, S., Ceccarelli, A., Lambert, E., Tseng Lau, E. , & Vasenev, A. (2017). A Modeling Framework to Support Resilient Evolution Planning of Smart Grids. In E. T. Lau, M. K. K. Chai, Y. Chen, O. Jung, V. C. M. Leung, K. Yang, S. Bessler, J. Loo, & T. Nakayama (Eds.), Smart Grid Inspired Future Technologies: Second EAI International Conference, SmartGIFT 2017, London, UK, March 27–28, 2017, Proceedings (pp. 233-242). Springer. https://doi.org/10.1007/978-3-319-61813-5_23

de Alencar Silva, P. , Allah Bukhsh, F., da Silva Reis, J., & de Castro, A. F. (2017). Agency monitoring patterns for value networks. In J. A. Banares, C. Pham, & J. Altmann (Eds.), Economics of Grids, Clouds, Systems, and Services: 14th International Conference, GECON 2017, Proceedings (pp. 81-93). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10537 LNCS). Springer. https://doi.org/10.1007/978-3-319-68066-8_7

op den Akker, H. J. A. , Klaassen, R., Bul, K., Kato, P. M., van der Burg, G. J., & di Bitonto, P. (2017). Let them play: experiences in the wild with a gamification and coaching system for young diabetes patients. In PervasiveHealth '17: Proceedings of the 11th EAI International Conference on Pervasive Computing Technologies for Healthcare (pp. 409-418). ACM Press. https://doi.org/10.1145/3154862.3154931

van Delden, R. , Moreno, A. , Poppe, R. , Reidsma, D. , & Heylen, D. (2017). A Thing of Beauty: Steering Behavior in an Interactive Playground. In CHI'17: Proceedings of the 2017 ACM SIGCHI Conference on Human Factors in Computing Systems, May 6-11, 2017, Denver, CO, USA (pp. 2462-2472). Association for Computing Machinery (ACM). https://doi.org/10.1145/3025453.3025816

van Houwelingen-Snippe, J. , Vroon, J. H. , Englebienne, G., & Haselager, W. F. G. (2017). Blame my telepresence robot Joint effect of proxemics and attribution on interpersonal attraction. In 2017 26th IEEE International Symposium on Robot and Human Interactive Communication (RO-MAN) (pp. 162-168). IEEE. https://doi.org/10.1109/ROMAN.2017.8172296

van de Pol, J. (2017). Parallel Algorithms for Model Checking. In M. R. Mousavi, & J. Sgall (Eds.), Topics in Theoretical Computer Science: Second IFIP WG 1.8 International Conference, TTCS 2017, Tehran, Iran, September 12-14, 2017, Proceedings (pp. xv-xvi). (Lecture Notes in Computer Science; Vol. 10608). Springer.

van den Berg, B. , & Wanders, I. (2017). Windowed Factorization and Merging. In R. Heusdens, & J. H. Weber (Eds.), Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux: May 11-12, 2017, Delft University of Technology, Delft, the Netherlands (pp. 15-22). Delft University of Technology.

van der Kooij, S., Kempker, P. , van den Berg, H., & Bhulai, S. (2017). Optimal battery charging in smart grids with price forecasts. In 2017 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2017 [8086070] (IEEE Power and Energy Society Innovative Smart Grid Technologies Conference (ISGT); Vol. 2017). IEEE. https://doi.org/10.1109/ISGT.2017.8086070

Editorial


Huisman, M. (2017). Verification of Concurrent Software. Electronic proceedings in theoretical computer science, (261), 2-2.


Foreword/postscript


Ceravolo, P. , Van Keulen, M., & Stoffel, K. (2017). Foreword. In P. Ceravolo, M. van Keulen, & K. Stoffel (Eds.), 7th International Symposium on Data-Driven Process Discovery and Analysis (SIMPDA 2017) (pp. II). (CEUR Workshop Proceedings; Vol. 2016). CEUR. http://ceur-ws.org/Vol-2016/preface.pdf

Meeting Abstract


Kaneko, D., Kallen, V., Hogervorst, M., Toet, A. , van Erp, J. B. F., & Brouwer, A-M. (2017). Physiological Responses to Tasting Drinks are Associated with Different Tasting Experiences. Psychophysiology, 54(S1), S102-S102. https://onlinelibrary.wiley.com/toc/14698986/2017/54/S1

de Dieuleveult, A. L., Brouwer, A. M., Siemonsma, P. C. , van Erp, J. B. F., & Brenner, E. (2017). Effects of aging on illusory target motion in a hitting task. Journal of vision, 17(10), [815]. https://doi.org/10.1167/17.10.815

Paper


Acciani, F. , Frasca, P. , Heijenk, G. , & Stoorvogel, A. A. (2017). Using a linear gain to accelerate average consensus over unreliable networks. 3569 - 3574. Paper presented at 56th IEEE Conference on Decision and Control, CDC 2017, Melbourne, Australia. https://doi.org/10.1109/CDC.2017.8264183

Awad, G., Soboroff, I., Butt, A., Ellis, A., Dimmick, D., Fiscus, J., Joy, D., Michel, M., Delgado, A., Smeaton, A., Kraaij, W., Quénot, G. , Ordelman, R., Eskevich, M., Jones, G., Huet, B., Strassel, S., & Li, X. (2017). TREC video retrieval evaluation TRECVID 2017. Paper presented at 17th annual TREC Video Retrieval Evaluation, TRECVID 2017, Gaithersburg, United States.

Bajpai, V., Kühlewind, M., Ott, J., Schoenwaelder, J. , Sperotto, A., & Trammell, B. (2017). Challenges with Reproducibility. 1-4. Paper presented at Reproducibility Workshop, Reproducibility 2017, Los Angeles, United States. https://doi.org/10.1145/3097766.3097767


Eskevich, M. , Ordelman, R., Jones, G. J. F., & Huet, B. (2017). Video hyperlinking (LNK) TRECVID 2017. Paper presented at 17th annual TREC Video Retrieval Evaluation, TRECVID 2017, Gaithersburg, United States.

Fabiano, F., Pelikan, H., Pingen, J., Zissoldt, J. , Catala, A. , & Theune, M. (2017). Designing a Co-Creative Dancing Robotic Tablet. Paper presented at 6th International Workshop on Computational Creativity, Concept Invention, and General Intelligence, Madrid, Spain.

Gerards, M. E. T. , & Hurink, J. L. (2017). On the value of device flexibility in smart grid applications. Paper presented at 12th IEEE PES PowerTech Conference, Manchester, United Kingdom. https://doi.org/10.1109/PTC.2017.7981170

Haasnoot, E. , Barnhoorn, J. , Spreeuwers, L. , Veldhuis, R. , & Verwey, W. (2017). Understanding. Paper presented at 14th IAPR/IEEE International Summer School on Biometrics 2017, Alghero, Italy.

Hajighasemi, M. , Hurink, J. L. , & Smit, G. J. M. (2017). Planning based real-time control using DEMKit. Paper presented at 12th IEEE PES PowerTech Conference, Manchester, United Kingdom. https://doi.org/10.1109/PTC.2017.7980903

Homan, B. , Smit, G. J. M. , van Leeuwen, R. P., & Ten Kortenaar, M. (2017). A comprehensive model for battery State of Charge prediction. 1-6. Paper presented at 12th IEEE PES PowerTech Conference, Manchester, United Kingdom. https://doi.org/10.1109/PTC.2017.7980943

Jonker, M., King, A., Krupp, J., Rossow, C. , Sperotto, A., & Dainotti, A. (2017). Millions of targets under attack: a macroscopic characterization of the DoS ecosystem. 100-113. Paper presented at 2017 ACM Internet Measurement Conference, IMC 2017, London, United Kingdom. https://doi.org/10.1145/3131365.3131383

Kamilaris, A. (2017). Simulating Training Data for Deep Learning Models. Paper presented at 32nd EnviroInfo 2018, Garching bei Munchen, Germany.


Kim, J. , Truong, K. , Englebienne, G. , & Evers, V. (2017). Learning spectral-temporal features with 3D CNNs for speech emotion recognition. Paper presented at 7th International Conference on Affective Computing and Intelligent Interaction, San Antonio, United States.

Kuiper, G. , Kurtin, P. S. , & Bekooij, M. J. G. (2017). Hybrid Latency Minimization Approach Using Model Checking and Dataflow Analysis. 41-50. Paper presented at 20th International Workshop on Software and Compilers for Embedded Systems, SCOPES 2017, Sankt Goar, Germany. https://doi.org/10.1145/3078659.3078665


Lee, M. , Kim, J. , Truong, K., de Kort, Y., Beute, F., & IJsselsteijn, W. (2017). Exploring Moral Conflicts in Speech: Multidisciplinary Analysis of Affect and Stress. Paper presented at 7th International Conference on Affective Computing and Intelligent Interaction, San Antonio, United States.

Masoum, A. , Meratnia, N. , & Havinga, P. J. M. (2017). Compressive sensing based data collection in wireless sensor networks. 442-447. Paper presented at 2017 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, MFI 2017, Daegu, Korea, Republic of. https://doi.org/10.1109/MFI.2017.8170360

Moreira, J. L. , Daniele, L. M. , Ferreira Pires, L. , van Sinderen, M. J., Wasielewska, K., Szmeja, P., Pawlowski, W., Ganzha, M., & Paprzycki, M. (2017). Towards IoT platforms’ integration: Semantic Translations between W3C SSN and ETSI SAREF. Paper presented at SEMANTiCS conference 2017, Amsterdam, Netherlands. http://ceur-ws.org/Vol-2063/sisiot-paper3.pdf

Nutma, J. S. , Hoogsteen, G. , Molderink, A., Wijbrandi, W. E. , Hurink, J. L. , & Smit, G. J. M. (2017). On integrating device level schedules into market based control. Paper presented at 12th IEEE PES PowerTech Conference, Manchester, United Kingdom. https://doi.org/10.1109/PTC.2017.7980984

Petridis, S., Wang, Y., Li, Z. , & Pantic, M. (2017). End-to-End Audiovisual Fusion with LSTMs. Paper presented at 14th International Conference on Auditory-Visual Speech Processing, AVSP 2017, Stockholm, Sweden. https://arxiv.org/abs/1709.04343

Petridis, S., Wang, Y., Li, Z. , & Pantic, M. (2017). End-to-End Multi-View Lipreading. Paper presented at British Machine Vision Conference, BMVC 2017, London, United Kingdom. https://arxiv.org/abs/1709.00443


Sperotto, A. , van der Toorn, O. , & van Rijswijk, R. (2017). TIDE – Threat Identification using Active DNS Measurements. 65-67. Paper presented at Annual Conference of the ACM Special Interest Group on Data Communication, ACM SIGCOMM 2017, Los Angeles, United States. https://doi.org/10.1145/3123878.3131988

Weda, J. J. , Schadenberg, B. R. , & van Dijk, J. (2017). Support by Participatory Sense-Making in Robot Therapy for Children with Autism. Paper presented at Student Interaction Design Research Conference, SIDeR 2017, Delft, Netherlands. http://id.tudelft.nl/sider/2017/papers/33.pdf

Wieringa, R. J. (2017). Requirements Engineering Since the Year One Thousand. 480 - 481. Paper presented at 25th IEEE International Requirements Engineering Conference 2017, Lisbon, Portugal.

de Visser, M. , Miao, S. , Englebienne, G. , Sools, A. M. , & Visscher, K. (2017). Machine-based mapping of innovation portfolios. 667-671. Paper presented at 18th International CINet Conference, Potsdam, Germany.

van Rijswijk-Deij, R., Chung, T., Choffnes, D., Mislove, A., & Toorop, W. (2017). The Root Canary: Monitoring and Measuring the DNSSEC Root Key Rollover. 63-64. Paper presented at Annual Conference of the ACM Special Interest Group on Data Communication, ACM SIGCOMM 2017, Los Angeles, United States. https://doi.org/10.1145/3123878.3131987

van Sinderen, M. J. , Singh, P. M. , & Wieringa, R. J. (2017). Smart logistics: an enterprise architecture perspective. 9-16. Paper presented at 29th International Conference on Advanced Information Systems Engineering, Essen, Germany. http://ceur-ws.org/Vol-1848/CAiSE2017_Forum_Paper2.pdf

van de Kamp, T. R. , Peter, A. , Everts, M. H. , & Jonker, W. (2017). Multi-client Predicate-only Encryption for Conjunctive Equality Tests. Paper presented at 16th International Conference on Cryptology And Network Security 2017, Hong Kong, China.

PhD Thesis - Research UT, graduation UT































PhD Thesis - Research external, graduation UT

Poster


Rosbergen, G. J. , Jansen, M-P., Rosbergen-de Vries, A. R., Roke, Y., & Otten, R. (2017). Het slaappatroon van volwassenen met autisme in een klinische setting: een pilotstudie. Poster session presented at 17e Nationaal Autisme congres 2017, Rotterdam, Netherlands.

Rosbergen, G. J. , Jansen, M-P., Rosbergen-de Vries, A. R., Roke, Y., & Otten, R. (2017). Het slaappatroon van volwassenen met autisme in een klinische setting: een pilotstudie. Poster session presented at Nederlands voorjaarscongres voor Psychiatrie 2017, Maastricht, Netherlands.


Report


Darabi, S. , Blom, S. , & Huisman, M. (2017). A Verification Technique for Deterministic Parallel Programs (extended version). (CTIT technical report; No. TR-CTIT-17-01). Centre for Telematics and Information Technology (CTIT).

Huisman, M., Monahan, R., Müller, P. , Mostowski, W., & Ulbrich, M. (2017). VerifyThis 2017: A Program Verification Competition. (Karlsruhe Reports in Informatics; No. 2017-10). Karlsruhe Institute of Technology. https://doi.org/10.5445/ir/1000077160

Huisman, M., Noll, T., & Tatsuta, M. (2017). Analysis and Verification of Pointer Programs. (NII Shonan Meeting Reports; No. 2017-14). National Institute of Informatics.

Kegel, R. H. P. , Barth, S. , Klaassen, R. , & Wieringa, R. J. (2017). Computer literacy systematic literature review method. (CTIT Technical Report Series; No. TR-CTIT-17-05). Centre for Telematics and Information Technology (CTIT).

Kurtin, P. S. , & Bekooij, M. J. G. (2017). An Abstraction-Refinement Theory for the Analysis and Design of Real-Time Systems (Extended Version). (CTIT Technical Report Series; No. TR-CTIT-17-06). Centre for Telematics and Information Technology (CTIT).

Ruijters, E. J. J. , Reijsbergen, D. P. , de Boer, P-T. , & Stoelinga, M. I. A. (2017). Rare event simulation for dynamic fault trees. (CTIT technical report series; No. TR-CTIT-17-02). Centre for Telematics and Information Technology (CTIT).

Wienen, H. C. A. , Bukhsh, F. A. , Vriezekolk, E. , & Wieringa, R. J. (2017). Accident Analysis Methods and Models — a Systematic Literature Review. (CTIT Technical Report; No. TR-CTIT-17-04). Centre for Telematics and Information Technology (CTIT).

van Delden, R. W. , & Bruijnes, M. (2017). Telepresence Robots in Daily Life - Technical Report. (CTIT technical report series; No. 17-03). Centre for Telematics and Information Technology (CTIT).


Review article


de Dieuleveult, A. L., Siemonsma, P. C. , van Erp, J. B. F., & Brouwer, A. M. (2017). Effects of aging in multisensory integration: A systematic review. Frontiers in Aging Neuroscience, 9(MAR), [80]. https://doi.org/10.3389/fnagi.2017.00080

2016

Abstract


Buijsrogge, A. , de Boer, P-T. , & Scheinhardt, W. R. W. (2016). Analysis of a state-independent change of measure for the G|G|1 tandem queue. 48-48. Abstract from European Conference on Queueing Theory 2016, Toulouse, France.


Steinberger, J. (Ed.), Kuhnert, B., Alavi, S. , Cardoso de Santanna, J. J. , Sperotto, A., Baier, H. , & Pras, A. (2016). Whom do we trust - Booters and SSL/TLS certificates. 14-14. Abstract from 11th SPRING graduate workshop of the special interest group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) (SPRING 2016), . http://www.gi-fg-sidar.de/spring/SIDAR-Reports/SIDAR-Report-SR-2016-01.pdf

Article (contribution to journal)



Ambusaidi, M. A., He, X., Nanda, P. , & Tan, Z. (2016). Building an intrusion detection system using a filter-based feature selection algorithm. IEEE transactions on computers, 65(10), 2986-2998. https://doi.org/10.1109/TC.2016.2519914

Amighi, A., de Carvalho Gomes, P., Gurov, D. , & Huisman, M. (2016). Provably correct control flow graphs from Java bytecode programs with exceptions. International journal on software tools for technology transfer, 18(6), 653-684. https://doi.org/10.1007/s10009-015-0375-0


Attema, T. , van den Berg, H. L., Kempker, P. C., Worm, D., & van der Vliet-Hameeteman, C. (2016). Models for QoS-Aware Capacity Management in Cable Access Networks. Broadband (Cramlington), 38(2), 54-58. https://www.thescte.eu/broadband/vol38_no2_FHQE/files/assets/basic-html/page56.html

Aung, M. S. H., Kaltwang, S., Romera-Paredes, B., Martinez, B., Singh, A., Cella, M., Valstar, M., Meng, H., Kemp, A., Shafizadeh, M., Elkins, A. C., Kanakam, N., de Rothschild, A., Tyler, N., Watson, P. J., de C. Williams, A. C. , Pantic, M., & Bianchi-Berthouze, N. (2016). The Automatic Detection of Chronic Pain-Related Expression: Requirements, Challenges and the Multimodal EmoPain Dataset. IEEE transactions on affective computing, 7(4), 435-451. https://doi.org/10.1109/TAFFC.2015.2462830



Braganca, F. M. , Bosch, S., Voskamp, J. P. , Marin Perianu, M. , van der Zwaag, B. J., Vernooij, J. C., van Weeren, P. R., & Back, W. (2016). Validation of distal limb mounted inertial measurement unit sensors for stride detection in Warmblood horses at walk and trot. Equine veterinary journal, online pre-publication. https://doi.org/10.1111/evj.12651




Eleftheriadis, S., Rudovic, O. , & Pantic, M. (2016). Joint Facial Action Unit Detection and Feature Fusion: A Multi-Conditional Learning Approach. IEEE transactions on image processing, 25(12), 5727-5742. https://doi.org/10.1109/TIP.2016.2615288


Eyben, F., Scherer, K., Schuller, B., Sundberg, J., André, E., Busso, C., Devillers, L., Epps, J., Laukka, P., Narayanan, S. , & Truong, K. P. (2016). The Geneva Minimalistic Acoustic Parameter Set (GeMAPS) for Voice Research and Affective Computing. IEEE transactions on affective computing, 7(2), 190-202. https://doi.org/10.1109/TAFFC.2015.2457417



Georgakis, C., Panagakis, Y. , & Pantic, M. (2016). Discriminant Incoherent Component Analysis. IEEE transactions on image processing, 25(5), 2021-2034. https://doi.org/10.1109/TIP.2016.2539502

Georgakis, C., Petridis, S. , & Pantic, M. (2016). Discrimination Between Native and Non-Native Speech Using Visual Features Only. IEEE transactions on cybernetics, 46(12), 2758-2771. https://doi.org/10.1109/TCYB.2015.2488592






Huisman, M., Klebanov, V., Monahan, R., & Tautschnig, M. (2016). VerifyThis 2015: A program verification competition. International journal on software tools for technology transfer, 19(6), 763–771. https://doi.org/10.1007/s10009-016-0438-x


Kaltwang, S., Todorovic, S. , & Pantic, M. (2016). Doubly Sparse Relevance Vector Machine for Continuous Facial Behavior Estimation. IEEE transactions on pattern analysis and machine intelligence, 38(9), 1748-1761. https://doi.org/10.1109/TPAMI.2015.2501824


Kammüller, F., & Probst, C. W. (2016). Modeling and verification of insider threats using logical analysis. IEEE systems journal, 11(2), 534-545. https://doi.org/10.1109/JSYST.2015.2453215







Kotzerke, J., Hao, H., Davis, S. A., Hayes, R. , Spreeuwers, L. J. , Veldhuis, R. N. J., & Horadam, K. J. (2016). Identification performance of evidential value estimation for ridge-based biometrics. EURASIP journal on information security, 2016(24), 1-10. https://doi.org/10.1186/s13635-016-0050-3

Laarman, A., Pater, E. , van de Pol, J., & Hansen, H. (2016). Guard-based partial-order reduction. International journal on software tools for technology transfer, 18(4), 427-448. https://doi.org/10.1007/s10009-014-0363-9


Li, B. , Broersma, H. J., & Zhang, S. (2016). Forbidden subgraphs for hamiltonicity of 1-tough graphs. Discussiones mathematicae. Graph theory, 36(4), 915-929. https://doi.org/10.7151/dmgt.1897

Li, R., Ning, B., & Zhang, S. (2016). Color Degree Sum Conditions for Rainbow Triangles in Edge-Colored Graphs. Graphs and combinatorics, 32(5), 2001-2008. https://doi.org/10.1007/s00373-016-1690-2








Nguyen, D-P., Doğruöz, A. S., Rosé, C. P. , & de Jong, F. M. G. (2016). Computational Sociolinguistics: A Survey. Computational linguistics, 42(3), 537-593. https://doi.org/10.1162/COLI_a_00258

Panagakis, Y., Nicolaou, M. A., Zafeiriou, S. , & Pantic, M. (2016). Robust correlated and individual component analysis. IEEE transactions on pattern analysis and machine intelligence, 38(8), 1665-1678. https://doi.org/10.1109/TPAMI.2015.2497700



Pieters, W., Barendse, J., Ford, M., Heath, C. P. R., Probst, C. W., & Verbij, R. (2016). The navigation metaphor in security economics. IEEE security & privacy, 14(3), 14-21. https://doi.org/10.1109/MSP.2016.47


Raniery Paula dos Santos, C., Famaey, J., Schönwälder, J., Zambenedetti Granville, L. , Pras, A., & De Turck, F. (2016). Taxonomy for the Network and Service Management Research Field. Journal of network and systems management, 24(3), 764-787. https://doi.org/10.1007/s10922-015-9363-7

Robben, S. , Englebienne, G., & Krose, B. J. A. (2016). Delta Features From Ambient Sensor Data are Good Predictors of Change in Functional Health. IEEE journal of biomedical and health informatics, 21(4), 986-993. https://doi.org/10.1109/JBHI.2016.2593980

Sagonas, C., Antonakos, E., Tzimiropoulos, G., Zafeiriou, S. , & Pantic, M. (2016). 300 Faces In-The-Wild Challenge: database and results. Image and vision computing, 47, 3-18. https://doi.org/10.1016/j.imavis.2016.01.002

Sagonas, C., Panagakis, Y., Zafeiriou, S. , & Pantic, M. (2016). Robust statistical frontalization of human and animal faces. International journal of computer vision, 122(2), 270-291. https://doi.org/10.1007/s11263-016-0920-7








Toet, A., Tak, S. , & van Erp, J. B. F. (2016). Visualizing uncertainty. Towards a better understanding of weather forecasts. Tijdschrift voor human factors, 41(1), 9-14.

Tzimiropoulos, G. , & Pantic, M. (2016). Fast Algorithms for Fitting Active Appearance Models to Unconstrained Images. International journal of computer vision, 122(1), 17-33. https://doi.org/10.1007/s11263-016-0950-1




Venrooij, W., Toet, A. , & van Erp, J. B. F. (2016). Measuring dashboard performance. Optimizing the view on data. Tijdschrift voor human factors, 41(1), 15-19.

Voulgaris, S., Dobson, M. , & van Steen, M. (2016). Decentralized Network-level Synchronization in Mobile Ad Hoc Networks. ACM transactions on sensor networks, 12(1), 5. https://doi.org/10.1145/2880223

Vyas, D., Kröner, A. , & Nijholt, A. (2016). From Mundane to Smart: Exploring Interactions with ‘Smart’ Design Objects. International journal of mobile human computer interaction, 8(1), 63-88. https://doi.org/10.4018/IJMHCI.2016010103



Zafeiriou, L., Nicolaou, M. A., Zafeiriou, S., Nikitidis, S. , & Pantic, M. (2016). Probabilistic Slow Features for Behavior Analysis. IEEE transactions on neural networks and learning systems, 27(5), 1034-1048. https://doi.org/10.1109/TNNLS.2015.2435653


Zhang, Y. , Broersma, H. J., & Chen, Y. (2016). Narrowing down the gap on cycle-star Ramsey numbers. Journal of combinatorics (Somerville), 7(2-3), 481-493. https://doi.org/10.4310/JOC.2016.v7.n2.a13


Zhang, Y. , Zhang, Y. , Broersma, H. J., & Chen, Y. (2016). On fan-wheel and tree-wheel Ramsey numbers. Discrete mathematics, 339(9), 2284-2287. https://doi.org/10.1016/j.disc.2016.03.013












Chapter


Broersma, H. J., Miller, J. F., & Nichele, S. (2016). Computational matter: evolving computational functions in nanoscale materials. In A. Adamatzky (Ed.), Advances in Unconventional Computing, Volume 2: Prototypes, Models and Algorithms (pp. 397-428). (Emergence, Complexity and Computation; Vol. 23, No. 23). Springer. https://doi.org/10.1007/978-3-319-33921-4_16

Dockhorn Costa, P. , Andrade Almeida, J., Pereira, I. S. A. , van Sinderen, M. J. , & Ferreira Pires, L. (2016). Rule-based support for situation management. In G. Rogova, & P. Scott (Eds.), Fusion Methodologies in Crisis Management (pp. 341-364). Springer. https://doi.org/10.1007/978-3-319-22527-2_16

Huisman, M., Ahrendt, W., Grahl, D., & Hentschel, M. (2016). Formal specification with the Java modeling language. In W. Ahrendt, B. Beckert, R. Bubel, R. Hähnle, P. H. Schmitt, & M. Ulbrich (Eds.), Deductive Software Verification – The KeY Book (pp. 193-241). (Lecture Notes in Computer Science; Vol. 10001). Springer. https://doi.org/10.1007/978-3-319-49812-6_7

Kolesnichenko, A. V. , Remke, A. K. I. , de Boer, P-T. , & Haverkort, B. R. H. M. (2016). Model checking two layers of mean-field models. In L. Fiondella, & A. Puliafito (Eds.), Principles of Performance and Reliability Modeling and Evaluation - Essays in Honor of Kishor Trivedi on his 70th Birthday (pp. 341-369). (Springer series in reliability engineering). Springer. https://doi.org/10.1007/978-3-319-30599-8_13

Mikkelsen, E. J. , VanDerNagel, J. E. L., & Lindsay, W. R. (2016). Substance related and addictive disorders. In R. J. Fletcher, J. Barnhill, & S-A. Cooper (Eds.), DM-IDI 2: Diagnostic Manual – Intellectual Disability: A textbook of diagnosis of mental disorders in persons with intellectual disability NADD Press.

Miri, H. , Kolkmeier, J. , Taylor, P. J. , Poppe, R. , & Heylen, D. (2016). project SENSE: multimodal simulation with full-body real-time verbal and nonverbal interactions. In R. Poppe, J-J. Meyer, R. Veltkamp, & M. Dastani (Eds.), Intelligent Technologies for Interactive Entertainment: 8th International Conference, INTETAIN 2016, Utrecht, The Netherlands, June 28-30, 2016 (pp. 279-284). (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Vol. 178). Springer. https://doi.org/10.1007/978-3-319-49616-0_28

Nijholt, A. (2016). Humor Engineering in Smart Environments. In S. Fukuda (Ed.), Emotional Engineering Volume 4 (pp. 37-57). (Emotional Engineering; Vol. 4). Springer. https://doi.org/10.1007/978-3-319-29433-9_3

Nijholt, A. (2016). Preface (to Playable Cities). In A. Nijholt (Ed.), Playable Cities: The City as a Digital Playground (pp. vii-viii). (Gaming Media and Social Effects). Springer. https://doi.org/10.1007/978-981-10-1962-3

Probst, C. W., Willemson, J. , & Pieters, W. (2016). The Attack Navigator (Invited). In S. Mauw, B. Kordy, & S. Jajodia (Eds.), Graphical Models for Security: Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers (pp. 1-17). (Lecture Notes in Computer Science; Vol. 9390). Springer. https://doi.org/10.1007/978-3-319-29968-6_1

Reijsbergen, D. P. , de Boer, P-T. , & Scheinhardt, W. R. W. (2016). Hypothesis testing for rare-event simulation: limitations and possibilities. In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques: 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10–14, 2016, Proceedings, Part I (pp. 16-26). (Lecture Notes in Computer Science; Vol. 9952). Springer. https://doi.org/10.1007/978-3-319-47166-2_2

Rensink, A. (2016). Model Patterns - The Quest for the Right Level of Abstraction. In B. Steffen (Ed.), Transactions on Foundations for Mastering Change I (pp. 47-70). (Lecture Notes in Computer Science; Vol. 9960, No. 9960). Springer. https://doi.org/10.1007/978-3-319-46508-1_4

Seraj, F. , van der Zwaag, B. J. , Dilo, A., Luarasi, T. , & Havinga, P. J. M. (2016). RoADS: A road pavement monitoring system for anomaly detection using smart phones. In M. Atzmueller, A. Chin, F. Janssen, I. Schweizer, & C. Trattner (Eds.), Big Data Analytics in the Social and Ubiquitous Context (pp. 128-146). (Lecture Notes in Computer Science; Vol. 9546, No. 9546). Springer. https://doi.org/10.1007/978-3-319-29009-6, https://doi.org/10.1007/978-3-319-29009-6_7

Yang, Y., Al-Shaikhli, S., Jiang, T. , Cao, Y., & Rosenhahn, B. (2016). Bi-layer dictionary learning for remote sensing image classification. In Proceedings of International Geoscience and Remote Sensing Symposium (IGARSS) : Advancing the understanding of our living planet, 10-15 July 2016, Beijing, China (pp. 3059-3062). (IGARSS; No. 2016). IEEE. https://doi.org/10.1109/IGARSS.2016.7729791

Zwicklbauer, S. , Seifert, C., & Granitzer, M. (2016). Robust and Collective Entity Disambiguation through Semantic Embeddings. In SIGIR'16. Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval - SIGIR '16 (pp. 425-434). ACM Press. https://doi.org/10.1145/2911451.2911535

op den Akker, H. J. A. , Klaassen, R. , & Nijholt, A. (2016). Virtual coaches for healthy lifestyle. In A. Esposito, & L. C. Jain (Eds.), Toward Robotic Socially Believable Behaving Systems - Volume II: Modeling Social Signals (pp. 121-149). (Intelligent Systems Reference Library; Vol. 106, No. 106). Springer. https://doi.org/10.1007/978-3-319-31053-4_8

van Sinderen, M. J. , & Iacob, M. E. (2016). Workshop C2 Report - Big Data Interoperability for Enterprises. In M. Zelm, G. Doumeingts, & J. P. Mendonca (Eds.), Enterprise Interoperability in the Digitized and Networked Factory of the Future (pp. 268-269). International Society for Technology in Education. http://www.iste.co.uk/index.php?p=a&ACTION=View&id=1073

van der Nagel, J., Didden, R., van Duijvenbode, N., Kemna, L., & Trentelman, M. (2016). Middelengebruik en verslaving. In R. Didden, P. Troost, X. Moonen, & W. Groen (Eds.), Handboek psychiatrie en lichte verstandelijke beperking (pp. 157-169). De Tijdstroom.

Conference article


Eskevich, M., Jones, G. J. F. , Aly, R. , Ordelman, R., & Huet, B. (2016). Pursuing a moving target: Iterative use of benchmarking of a task to understand the task. CEUR workshop proceedings, 1739.

Conference contribution



Ahmad, W. , & van de Pol, J. C. (2016). Synthesizing Energy-Optimal Controllers for Multiprocessor Dataflow Applications with UPPAAL STRATEGO. In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques: 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10–14, 2016, Proceedings, Part I (pp. 94-113). (Lecture Notes in Computer Science; Vol. 9952). Springer. https://doi.org/10.1007/978-3-319-47166-2_7

Ahmad, W. , Jongerden, M. R. , Stoelinga, M. I. A. , & van de Pol, J. C. (2016). Model checking and evaluating QoS of batteries in MPSoC dataflow applications via hybrid automata. In Proceedings of the 16th International Conference on Application of Concurrency to System Design, ACSD 2016 (pp. 114-123). IEEE Computer Society. https://doi.org/10.1109/ACSD.2016.18

Alt, J., Bernardi, P., Bosio, A., Cantoro, R. , Kerkhoff, H. G., Leininger, A., Molzer, W., Motta, A., Pacha, C., Pagani, A. , Rohani, A., & Strasser, S. (2016). Thermal issues in test: An overview of the significant aspects and industrial practice. In IEEE 34th VLSI Test Symposium (VTS 2016) (pp. 1-4). IEEE. https://doi.org/10.1109/VTS.2016.7477278

Amighi, A. , Blom, S. , & Huisman, M. (2016). VerCors: A Layered Approach to Practical Verification of Concurrent Software. In Proceedings of the 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2016) (pp. 495-503). IEEE Computer Society. https://doi.org/10.1109/PDP.2016.107

Andujar, M. , Nijholt, A., & Gilbert, J. E. (2016). Designing a Humorous Workplace: Improving and Retaining Employee's Happiness. In WJ. Chung, & C. Sungsoo Shin (Eds.), Proceedings of the AHFE 2016 International Conference on Affective and Pleasurable Design (pp. 683-693). (Advances in Intelligent Systems and Computing; Vol. 483). Springer. https://doi.org/10.1007/978-3-319-41661-8_66


Baratchi, M., Laarhuis, J. H., Teunissen, L., Ebben, P. , Teeuw, W. B. , & van Steen, M. R. (2016). Towards Decisive Garments for Heat Stress Risk Detection. In UbiComp '16 : Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct (pp. 1095-1100). ACM Press. https://doi.org/10.1145/2968219.2972714

Belov, A. , Vasenev, A. , Havinga, P. J. M. , & Meratnia, N. (2016). Enhancing user comfort models for Demand Response solutions for domestic water heating systems. In Proceedings of the 5th International Conference on Smart Cities and Green ICT Systems (pp. 201-212). SCITEPRESS. https://doi.org/10.5220/0005809702010212

Bendisposto, J., Körner, P., Leuschel, M. , Meijer, J. , van de Pol, J. C., Treharne, H., & Whitefield, J. (2016). Symbolic Reachability Analysis of B through ProB and LTSmin. In E. Ábrahám, & M. Huisman (Eds.), Integrated Formal Methods: 12th International Conference, IFM 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings (pp. 275-291). (Lecture Notes in Computer Science; Vol. 9681). Springer. https://doi.org/10.1007/978-3-319-33693-0_18

Bloemen, V. (2016). Parallel Model Checking of ω-Automata. In A. Butterfield, & M. Rossi (Eds.), Proceedings of the Formal Methods 2016 Doctoral Symposium co-located with 21st International Symposium on Formal Methods (FM 2016) (pp. 1). CEUR. http://ceur-ws.org/Vol-1744/paper1.pdf

Bloemen, V. , & van de Pol, J. C. (2016). Multi-core SCC-Based LTL Model Checking. In R. Bloem, & E. Arbel (Eds.), Hardware and Software: Verification and Testing; Proceedings of the 12th International Haifa Verification Conference, HVC 2016 (pp. 18-33). (Lecture Notes in Computer Science; Vol. 10028). Springer. https://doi.org/10.1007/978-3-319-49052-6_2

Bloemen, V. , Laarman, A. , & van de Pol, J. C. (2016). Multi-Core On-The-Fly SCC Decomposition. In Proceedings of the 21st ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, PPoPP 2016 (pp. 8). Association for Computing Machinery (ACM). https://doi.org/10.1145/2851141.2851161

Blom, K. C. H., Dol, H. S. , Kokkeler, A. B. J. , & Smit, G. J. M. (2016). Blind equalization of underwater acoustic channels using implicit higher-order statistics. In 2016 IEEE Third Underwater Communications and Networking Conference (UComms) (pp. 1-5). IEEE. https://doi.org/10.1109/UComms.2016.7583462

Bol Raap, W. , Iacob, M. E. , van Sinderen, M. J. , & Piest, S. (2016). An architecture and common data model for open data-based cargo-tracking in synchromodal logistics. In C. Debruyne, H. Panetto, R. Meersman, T. Dillon, E. Kuehn, D. O'Sullivan, & C. Agostino Ardagna (Eds.), On the Move to Meaningful Internet Systems: OTM 2016 Conferences (pp. 327-343). (Lecture notes in computer science; Vol. 10033). Springer. https://doi.org/10.1007/978-3-319-48472-3_19

Bortolameotti, R. , Peter, A. , Everts, M. H. , Jonker, W. , & Hartel, P. H. (2016). Reliably determining data leakage in the presence of strong attackers. In Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016 (pp. 484-495). Association for Computing Machinery (ACM). https://doi.org/10.1145/2991079.2991095

Bruijnes, M. , Huisman, G. , & Heylen, D. K. J. (2016). Tasty tech: human-food interaction and multimodal interfaces. In Proceedings of the 1st Workshop on Multi-sensorial Approaches to Human-Food Interaction, MHFI 2016 (pp. 4). Association for Computing Machinery (ACM). https://doi.org/10.1145/3007577.3007581

Buijsrogge, A. , de Boer, P-T. , & Scheinhardt, W. R. W. (2016). Analysis of a state-independent change of measure for the G|G|1 tandem queue. In 11th International Workshop on Rare Event Simulation, RESIM 2016 (pp. 1-3). EURANDOM.

Bullee, J-W. , Montoya, L. , Junger, M. , & Hartel, P. H. (2016). Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention. In A. Mathur, & A. Roychoudhury (Eds.), Proceedings of the inaugural Singapore Cyber Security R&D Conference (SG-CRC 2016) (pp. 107-114). (Cryptology and Information Security Series; Vol. 14). IOS Press. https://doi.org/10.3233/978-1-61499-617-0-107


Charisi, V. , Davison, D. P. , Reidsma, D. , & Evers, V. (2016). Evaluation Methods for User-Centered Child-Robot Interaction. In Proceedings of the 25th IEEE International Symposium on Robot and Human Interactive Communication, RO-MAN 2016 (pp. MoA3.4). (Proceedings IEEE International Symposium on Robot and Human Interactive Communication, RO-MAN; Vol. 2016). IEEE ROBOTICS AND AUTOMATION SOCIETY. https://doi.org/10.1109/ROMAN.2016.7745171

Chaudhary, K. , & Fehnker, A. (2016). Model Checking a Client-Side Micro Payment Protocol. In 3rd Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE 2016) (pp. 90-97). IEEE. https://doi.org/10.1109/APWC-on-CSE.2016.026

Chockalingam, S. , Hadziosmanovic, D. , Pieters, W., Texeira, A., & van Gelder, P. (2016). Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications. In G. Havarneanu, R. Setola, H. Nassopoulos, & S. Wolthusen (Eds.), Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers (pp. -). (Lecture Notes in Computer Science; Vol. 10242), (Security and Cryptology). Springer.

Chomsiri, T., He, X., Nanda, P. , & Tan, Z. (2016). An improvement of tree-Rule firewall for a large network: supporting large rule size and low delay. In 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 178-184). IEEE Computer Society. https://doi.org/10.1109/TrustCom.2016.0061

Chromik, J. J. , Remke, A. K. I. , & Haverkort, B. R. H. M. (2016). Improving SCADA security of a local process with a power grid model. In Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research, ICS-CSR 2016 (pp. 114-123). (Electronic Workshops in Computing). BCS Learning & Development Ltd.. https://doi.org/10.14236/ewic/ICS2016.13

Chromik, J. J. , Remke, A. K. I. , & Haverkort, B. R. H. M. (2016). What's under the hood? Improving SCADA security with process awareness. In Proceedings of the Joint Workshop on Cyber-physical Security and Resilience in Smart Grids (CPSR-SG 2016) (pp. -). IEEE. https://doi.org/10.1109/CPSRSG.2016.7684100

D'Argenio, P. R. , Hartmanns, A., Legay, A., & Sedwards, S. (2016). Statistical Approximation of Optimal Schedulers for Probabilistic Timed Automata. In Proceedings of the 12th International Conference on Integrated Formal Methods (IFM 2016) (pp. 99-114). (Lecture Notes in Computer Science; Vol. 9681). Springer. https://doi.org/10.1007/978-3-319-33693-0_7

Davison, D. P. (2016). Child, Robot and Educational Material: A Triadic Interaction. In HRI'16: The Eleventh ACM/IEEE International Conference on Human Robot Interaction (pp. 607-608). (ACM/IEEE International Conference on Human-Robot Interaction). IEEE. https://doi.org/10.1109/HRI.2016.7451879

Davison, D., Schindler, L. , & Reidsma, D. (2016). Physical extracurricular activities in educational child-robot interaction. In K. Dautenhahn, P. Baxter, A. Weiss, & A. Salem (Eds.), Proceedings of the 5th International Symposium on New Frontiers in Human-Robot Interaction (NF-HRI 2016) European Respiratory Society. https://arxiv.org/abs/1606.02736

Dietz, C. , Sperotto, A., Dreo, G. , & Pras, A. (2016). How to Achieve Early Botnet Detection at the Provider Level? In Proceedings of the 10th IFIP WG 6.6 International Conference on Management and Security in the Age of Hyperconnectivity, AIMS 2016 (pp. 142-146). (Lecture Notes in Computer Science; Vol. 9701). Springer. https://doi.org/10.1007/978-3-319-39814-3_15

Dietz, C. , Sperotto, A., Dreo, G. , & Pras, A. (2016). Monitoring the DNS Infrastructure for Proactive Botnet Detection. In Proceedings of the 11th SPRING graduate workshop of the special interest group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) (SPRING 2016) (pp. 3-4). (SIDAR reports; Vol. SR-2016-01). Special interest group Security - Intrusion Detection and Response (SIDAR) German Informatics Society (GI). http://www.gi-fg-sidar.de/spring/SIDAR-Reports/SIDAR-Report-SR-2016-01.pdf

Ebrahimi, H. , & Kerkhoff, H. G. (2016). Testing for intermittent resistive faults in CMOS integrated systems. In IEEE 2016 Euromicro Conference on Digital System Design (DSD) (pp. 703-707). IEEE Circuits & Systems Society. https://doi.org/10.1109/DSD.2016.58

Ebrahimi, H. , Kerkhoff, H. G. , & Rohani, A. (2016). Detecting intermittent resistive faults in digital CMOS circuits. In IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT) (pp. 87-90). IEEE Computer Society. https://doi.org/10.1109/DFT.2016.7684075

Eleftheriadis, S., Rudovic, O., Deisenroth, M. P. , & Pantic, M. (2016). Gaussian Process Domain Experts for Model Adaptation in Facial Behavior Analysis. In 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW 2016): Las Vegas, Nevada, USA, 26 June - 1 July 2016 (pp. 1469-1477). (IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)). IEEE Computer Society. https://doi.org/10.1109/CVPRW.2016.184

Eleftheriadis, S., Rudovic, O., Deisenroth, M. P. , & Pantic, M. (2016). Variational Gaussian Process Auto-Encoder for Ordinal Prediction of Facial Action Units. In S-H. Lai, V. Lepetit, K. Nishino, & Y. Sato (Eds.), Computer Vision – ACCV 2016: 13th Asian Conference on Computer Vision, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers (pp. 154-170). (Lecture Notes in Computer Science; Vol. 10112). Springer. https://doi.org/10.1007/978-3-319-54184-6_10

Erasmus, I. P. , & Daneva, M. (2016). An empirical study on memory bias situations and correction strategies in ERP effort estimation. In P. Amrahamsson, L. Corral, M. Olivo, & B. Russo (Eds.), 16th International Conference on Product-Focused Software Process Improvement, PROFES 2015 (pp. 227-242). (Lecture Notes in Computer Science; Vol. 9459). Springer. https://doi.org/10.1007/978-3-319-26844-6_17

Fichtner, L. , Pieters, W., & Texeira, A. (2016). Cybersecurity as a Politikum: Implications of Security Discourses for Infrastructures. In NSPW '16: Proceedings of the 2016 New Security Paradigms Workshop (pp. 36-48). Association for Computing Machinery (ACM). https://doi.org/10.1145/3011883.3011887

Fraile, M., Ford, M., Gadyatskaya, O. , Kumar, R. , Stoelinga, M. I. A., & Trujillo-Rasua, R. (2016). Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study. In 9th IFIP WG 8.1 Working Conference on The Practice of Enterprise Modeling (PoEM) (pp. 326-334). (Lecture Notes in Business Information Processing; Vol. 267). Springer. https://doi.org/10.1007/978-3-319-48393-1_24

Förster, D., Löhr, H. , & Kargl, F. (2016). Decentralized enforcement of k-anonymity for location privacy using secret sharing. In O. Altintas, F. Kargl, E. Ekici, C. Sommer, & M. Segata (Eds.), 2015 IEEE Vehicular Networking Conference, VNC 2015 (pp. 279-286). [7385589] (IEEE Vehicular Networking Conference, VNC; Vol. 2016). IEEE Computer Society. https://doi.org/10.1109/VNC.2015.7385589

Gadyatskaya, O., Hansen, R. R. , Larsen, K. G., Legay, A., Olesen, M. C., & Poulsen, D. B. (2016). Modelling attack-defense trees using timed automata. In 14th International Conference on Formal Modeling and Analysis of Timed Systems, FORMATS 2016 (pp. 35-50). (Lecture notes in computer science; Vol. 9884). Springer. https://doi.org/10.1007/978-3-319-44878-7_3

Gerhold, M. , & Stoelinga, M. I. A. (2016). Model-Based Testing of Probabilistic Systems. In P. Stevens, & A. Wasowski (Eds.), Fundamental Approaches to Software Engineering: 19th International Conference, FASE 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2–8, 2016, Proceedings (pp. 251-268). (Lecture Notes in Computer Science; Vol. 9633). Springer. https://doi.org/10.1007/978-3-662-49665-7_15

Gerhold, M. , & Stoelinga, M. I. A. (2016). Model-Based Testing of Stochastic Systems with IOCO Theory. In Proceedings of the 7th International Workshop on Automating Test Case Design, Selection, and Evaluation, A-TEST 2016 (pp. 45-51). Association for Computing Machinery (ACM). https://doi.org/10.1145/2994291.2994298

Geske, M., Jasper, M., Steffen, B., Howar, F., Schordan, M. , & van de Pol, J. C. (2016). RERS 2016: Parallel and Sequential Benchmarks with Focus on LTL Verification. In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications: 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part II (pp. 787-803). (Lecture Notes in Computer Science; Vol. 9953). Springer. https://doi.org/10.1007/978-3-319-47169-3_59

Gholibeigi, M. , & Heijenk, G. (2016). Analysis of Multi-Hop Broadcast in Vehicular Ad Hoc Networks: a Reliability Perspective. In Proceedings of the Eight IEEE/IFIP International Wireless Days Conference, WD 2016 (pp. -). IEEE Communications Society. https://doi.org/10.1109/WD.2016.7461489

Gholibeigi, M. , Baratchi, M. , van den Berg, H. L. , & Heijenk, G. (2016). Towards Reliable Multi-Hop Broadcast in VANETs: An Analytical Approach. In Proceedings of the Eight IEEE International Vehicular networking Conference, VNC 2016 (pp. 166-173). IEEE Communications Society. https://doi.org/10.1109/VNC.2016.7835959

Giannakopoulou, D. , Guck, D., & Schumann, J. (2016). Exploring model quality for ACAS X. In FM 2016: Formal Methods: 21st International Symposium, Limassol, Cyprus, November 9-11, 2016, Proceedings (Vol. 9995, pp. 274-290). (Lecture Notes in Computer Science; Vol. 9995). Springer. https://doi.org/10.1007/978-3-319-48989-6_17

Gomes, P., Gurov, D. , & Huisman, M. (2016). Specification and Verification of Synchronization with Condition Variables. In C. Artho, & P. C. Ölveczky (Eds.), Proceedings of the Fifth International Workshop on Formal Techniques for Safety-Critical Systems (FTSCS 2016) (pp. 3-19). (Communications in Computer and Information Science; Vol. 694). Springer. https://doi.org/10.1007/978-3-319-53946-1_1

Greff, K. , van Damme, R. M. J., Koutnik, J. , Broersma, H. J. , Mikhal, J. O. , Lawrence, C. P. , van der Wiel, W. G., & Schmidhuber, J. (2016). Unconventional computing using evolution-in-nanomaterio: neural networks meet nanoparticle networks. In The Eighth International Conference on Future Computational Technologies and Applications, FUTURE COMPUTING 2016 (pp. 15-20). IARIA. http://eprints.eemcs.utwente.nl/secure2/26922/01/future_computing_2016_1_30_30037.pdf

Gurov, D., Havelund, K. , Huisman, M., & Monahan, R. (2016). Static and runtime verification, competitors or friends? (Track summary). In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques: 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10–14, 2016, Proceedings, Part I (pp. 397-401). (Lecture Notes in Computer Science; Vol. 9952). Springer. https://doi.org/10.1007/978-3-319-47166-2_27

Gündogan, C., Passarelli, S., Hillmann, P. , Dietz, C., & Stiemert, L. (2016). A Traffic Merging and Generation Framework for Realistic Synthesis of Network Traffic. In Proceedings of the 11th SPRING graduate workshop of the special interest group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) (SPRING 2016) (pp. 9-10). (SIDAR reports; Vol. SR-2016-01). Special interest group Security - Intrusion Detection and Response (SIDAR) German Informatics Society (GI). http://www.gi-fg-sidar.de/spring/SIDAR-Reports/SIDAR-Report-SR-2016-01.pdf

Hahn, E. M. , & Hartmanns, A. (2016). A Comparison of Time- and Reward-Bounded Probabilistic Model Checking Techniques. In M. Fränzle, & D. Kapur (Eds.), Dependable Software Engineering: Theories, Tools, and Applications: Second International Symposium, SETTA 2016, Beijing, China, November 9-11, 2016, Proceedings (pp. 85-100). (Lecture Notes in Computer Science; Vol. 9984). Springer. https://doi.org/10.1007/978-3-319-47677-3_6

Hajighasemi, M. , Haji Ghasemi, M. , Smit, G. J. M. , & Hurink, J. L. (2016). A multi-commodity simulation tool based on TRIANA. In A. K. I. Remke, A. K. I. Remke, B. R. H. M. Haverkort, & B. R. H. M. Haverkort (Eds.), Measurement, Modelling and Evaluation of Dependable Computer and Communication Systems, 18th International GI/ITG Conference, MMB & DFT 2016 (pp. 55-59). (Lecture Notes in Computer Science; Vol. 9629). Springer. https://doi.org/10.1007/978-3-319-31559-1_6

Hartmanns, A. , Hermanns, H., & Bungert, M. (2016). Flexible support for time and costs in scenario-aware dataflow. In Proceedings of the 13th International Conference on Embedded Software (EMSOFT 2016) Association for Computing Machinery (ACM). https://doi.org/10.1145/2968478.2968496

Hartmanns, A. , Hermanns, H., & Krčál, J. (2016). Schedulers are no Prophets. In Semantics, Logics, and Calculi: Essays Dedicated to Hanne Riis Nielson and Flemming Nielson on the Occasion of Their 60th Birthdays (pp. 214-235). (Lecture Notes in Computer Science; Vol. 9560). Springer. https://doi.org/10.1007/978-3-319-27810-0_11

Hausmans, J. P. H. M. , & Bekooij, M. J. G. (2016). A Refinement Theory for Timed-Dataflow Analysis with Support for Reordering. In Proceedings of the 13th International Conference on Embedded Software, EMSOFT 2016 (pp. -). Association for Computing Machinery (ACM). https://doi.org/10.1145/2968478.2968489

Hermanns, H., Krämer, J., Krčál, J. , & Stoelinga, M. I. A. (2016). The Value of Attack-Defence Diagrams. In F. Piessens, & L. Viganò (Eds.), Proceedings of the 5th International Conference on Principles of Security and Trust, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016 (pp. 163-185). (Lecture Notes in Computer Science; Vol. 9635). Springer. https://doi.org/10.1007/978-3-662-49635-0_9

Homan, B. , van Leeuwen, R. P. , Smit, G. J. M., Zhu, L., & de Wit, J. B. (2016). Validation of a predictive model for smart control of electrical energy storage. In 2016 IEEE International Energy Conference (ENERGYCON) (pp. -). IEEE Power Electronics Society. https://doi.org/10.1109/ENERGYCON.2016.7513872

Hoogesteger, M. , de Oliveira Schmidt, R. , & Pras, A. (2016). ITSA: Internet Traffic Statistics Archive. In IEEE/IFIP Network Operations and Management Symposium (IEEE NOMS 2016) (pp. 995-996). IEEE Communications Society. https://doi.org/10.1109/NOMS.2016.7502940


Hoogsteen, G. , van der Klauw, T. , Molderink, A. , Hurink, J. L. , Smit, G. J. M., Feng, X., & Hebner, R. E. (2016). Balancing islanded residential microgrids using demand side management. In 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT) (pp. 1-5). IEEE Power & Energy Society. https://doi.org/10.1109/ISGT.2016.7781167

Huisman, G. , Bruijnes, M. , & Heylen, D. K. J. (2016). A Moving Feast: Effects of Color, Shape and Animation on Taste Associations and Taste Perceptions. In ACE '16: Proceedings of the 13th International Conference on Advances in Computer Entertainment Technology (pp. 13). Association for Computing Machinery (ACM). https://doi.org/10.1145/3001773.3001776

Huisman, G., Darriba Frederiks, A. , van Erp, J. B. F. , & Heylen, D. K. J. (2016). Simulating Affective Touch: Using a Vibrotactile Array to Generate Pleasant Stroking Sensations. In Haptics: Perception, Devices, Control, and Applications: 10th International Conference, EuroHaptics 2016, London, UK, July 4-7, 2016, Proceedings, Part II (pp. 240-250). (Lecture Notes in Computer Science; Vol. 9775). Springer. https://doi.org/10.1007/978-3-319-42324-1_24

Huisman, M., Bos, H. , Brinkkemper, S., van Deursen, A., Groote, J. F., Lago, P. , van de Pol, J., & Visser, E. (2016). Software that meets its Intent. In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications: 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part II (pp. 609-625). (Lecture Notes in Computer Science; Vol. 9953). Springer. https://doi.org/10.1007/978-3-319-47169-3_47

Huiting, J. , Kokkeler, A. B. J. , & Smit, G. J. M. (2016). The effects of single bit quantization on direction of arrival estimation of UHF RFID tags. In 2016 IEEE International Conference on RFID Technology and Applications (RFID-TA) (pp. 55-60). IEEE Communications Society. https://doi.org/10.1109/RFID-TA.2016.7750731

Ibrahim, A. M. Y. , & Kerkhoff, H. G. (2016). Analysis and design of an on-chip retargeting engine for IEEE 1687 networks. In 21st IEEE European Test Symposium (ETS 2016) (pp. 1-6). IEEE Circuits & Systems Society. https://doi.org/10.1109/ETS.2016.7519301

Ibrahim, A. M. Y. , & Kerkhoff, H. G. (2016). Efficient Utilization of Hierarchical iJTAG Networks for Interrupts Management. In 2016 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT) (pp. 97-102). IEEE Computer Society. https://doi.org/10.1109/DFT.2016.7684077

Ibrahim, A. M. Y. , & Kerkhoff, H. G. (2016). Towards an automated and reusable in-field self-test solution for MPSoCs. In 28th International Conference on Microelectronics (ICM 2016) (pp. 249-252). IEEE Computer Society. https://doi.org/10.1109/ICM.2016.7847862

Ionita, D. , Gordijn, J., Yesuf, A. S. , & Wieringa, R. J. (2016). Value-Driven Risk Analysis of Coordination Models. In The Practice of Enterprise Modeling : 9th IFIP WG 8.1. Working Conference, PoEM 2016, Proceedings (pp. 102-116). (Lecture Notes in Business Information Processing; Vol. 267). Springer. https://doi.org/10.1007/978-3-319-48393-1_8

Ionita, D., Kaidalova, J. , Vasenev, A. , & Wieringa, R. (2016). A study on tangible participative enterprise modelling. In S. Link, & J. C. Trujillo (Eds.), Advances in Conceptual Modeling: ER 2016 Workshops, AHA, MoBiD, MORE-BI, MReBA, QMMQ, SCME, and WM2SP, Gifu, Japan, November 14–17, 2016, Proceedings (pp. 139-148). (Lecture Notes in Computer Science; Vol. 9975). Springer. https://doi.org/10.1007/978-3-319-47717-6_12

Ionita, D. , Kegel, R., Baltuta, A. , & Wieringa, R. (2016). ArgueSecure: Out-of-the-box Risk Assessment. In Proceedings of the 2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE) (pp. 74-79). IEEE Computer Society. https://doi.org/10.1109/REW.2016.027

Ionita, D. , Wieringa, R. J. , & Gordijn, J. (2016). Automated Identification and Prioritization of Business Risks in e-service Networks. In T. Borangiu, M. Dragoicea, & H. Novoa (Eds.), Proceedings of the 7th International Conference on Exploring Service Science, IESS 2016 (pp. 547-560). (Lecture Notes in Business Information Processing; Vol. 247). Springer. https://doi.org/10.1007/978-3-319-32689-4_42

Jongerden, M. R., Hüls, J. , Haverkort, B. R. H. M. , & Remke, A. K. I. (2016). Assessing the Cost of Energy Independence. In Proceedings of the IEEE International Energy Conference, ENERGYCON 2016 (pp. 1-6). IEEE Power & Energy Society. https://doi.org/10.1109/ENERGYCON.2016.7514139

Jonker, M. , Sperotto, A. , van Rijswijk, R. M. , Sadre, R. , & Pras, A. (2016). Measuring the Adoption of DDoS Protection Services. In Proceedings of the 2016 ACM Internet Measurement Conference, IMC 2016 (pp. 279-285). Association for Computing Machinery (ACM). https://doi.org/10.1145/2987443.2987487

Jung, O., Besser, S., Ceccarelli, A., Zoppi, T. , Vasenev, A. , Montoya, L., Clarke, T., & Chappell, K. (2016). Towards a Collaborative Framework to Improve Urban Grid Resilience. In Proceedings of the IEEE International Energy Conference, ENERGYCON 2016 (pp. 1-6). IEEE. https://doi.org/10.1109/ENERGYCON.2016.7513887

Junges, S. , Guck, D. , Katoen, J. P. , & Stoelinga, M. I. A. (2016). Uncovering dynamic fault trees. In 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2016 (pp. 299-310). IEEE. https://doi.org/10.1109/DSN.2016.35

Karuppiah Ramachandran, V. R. , Havinga, P. J. M. , & Meratnia, N. (2016). HACMAC: A reliable human activity-based medium access control for implantable body sensor networks. In Proceedings of the 13th International Conference on Wearable and Implantable Body Sensor Networks, BSN 2016 (pp. 383-389). IEEE Computer Society. https://doi.org/10.1109/BSN.2016.7516292


Katoen, J. P. (2016). The Probabilistic Model Checking Landscape. In Proceedings of the 31st Annual ACM/IEEE Symposium on Logic in Computer Science (LICS 2016) (pp. 31-45). Association for Computing Machinery (ACM). https://doi.org/10.1145/2933575.2934574

Kegel, R. H. P. , & Wieringa, R. J. (2016). Measuring Computer Literacy Without Questionnaires. In O. A. Kulyk, L. Simons, H. Oinas-Kukkonen, & J. E. W. C. van Gemert-Pijnen (Eds.), Fourth International Workshop on Behavior Change Support Systems (BCSS 2016) (pp. 61-65). (CEUR Workshop Proceedings; Vol. 1573). CEUR. http://ceur-ws.org/Vol-1573/Paper_5_BCSS2016.pdf

Kerkhoff, H. G. (2016). A genetic algorithm based remaining lifetime prediction for a VLIW processor employing path delay and IDDX testing. In Y. Zhao (Ed.), International Conference on Design and Technology of Integrated Systems in Nanoscale Era, DTIS 2016 (pp. 10-14). IEEE Computer Society. https://doi.org/10.1109/DTIS.2016.7483805

Kim, J. , & Truong, K. P. (2016). Automatic analysis of children’s engagement using interactional network features. In Proceedings of the Workshop on Child Computer Interaction (WOCCI 2016) (pp. 23-28). ISCA. https://doi.org/10.21437/WOCCI.2016-4


Kim, J. , Truong, K. P. , Charisi, V. , Zaga, C. , Evers, V., & Chetouani, M. (2016). Multimodal Detection of Engagement in Groups of Children Using Rank Learning. In M. Chetouani, J. Cohn, & A. A. Salah (Eds.), Human Behavior Understanding: 7th International Workshop, HBU 2016, Amsterdam, The Netherlands, October 16, 2016, Proceedings (pp. 35-48). (Lecture Notes in Computer Science; Vol. 9997). Springer. https://doi.org/10.1007/978-3-319-46843-3_3

Klaassen, R. , op den Akker, R., Di Bitonto, P., van der Burg, G. J., Bul, K., & Kato, P. (2016). PERGAMON: A serious gaming and digital coaching platform supporting patients and healthcare professionals. In J. E. Q. Varajão, M. M. Cruz-Cunha, R. Martinho, R. Rijo, N. Bjørn-Andersen, R. Turner, & D. Alves (Eds.), Conference on ENTERprise Information Systems/International Conference on Project MANagement/International Conference on Health and Social Care Information Systems and Technologies, CENTERIS/ProjMAN/HCist 2016: Book of industry papers and abstracts (pp. 261-269). Scika.

Koek, P. , Geuns, S. J. , Hausmans, J. P. H. M., Corporaal, H. , & Bekooij, M. J. G. (2016). CSDFa: a model for exploiting the trade-off between data and pipeline parallelism. In Proceedings of the 19th International Workshop on Software and Compilers for Embedded Systems (pp. 30-39). Association for Computing Machinery (ACM). https://doi.org/10.1145/2906363.2906364

Kolkmeier, J. , Vroon, J. H. , & Heylen, D. K. J. (2016). Interacting with Virtual Agents in Shared Space: Single and Joint Effects of Gaze and Proxemics. In D. Traum, W. Swartout, P. Khooshabeh, S. Kopp, S. Scherer, & A. Leuski (Eds.), Proceedings of the International Conference on Intelligent Virtual Agents, IVA 2016 (pp. 1-14). (Lecture Notes in Computer Science; Vol. 10011). Springer. https://doi.org/10.1007/978-3-319-47665-0_1

Konak, S., Turan, F. , Shoaib, M. , & Durmaz, O. (2016). Feature Engineering for Activity Recognition from Wrist-Worn Motion Sensors. In Proceedings of the 6th International Joint Conference on Pervasive and Embedded Computing and Communication Systems, PECCS 2016 (pp. 76-84). SCITEPRESS – Science and Technology Publications. https://doi.org/10.5220/0006007100760084

Kuiper, G. , Geuns, S. J. , Hausmans, J. P. H. M. , & Bekooij, M. J. G. (2016). Compositional temporal analysis method for fixed priority pre-emptive scheduled modal stream processing applications. In 19th International Workshop on Software and Compilers for Embedded Systems (SCOPES 2016) (pp. 98-107). Association for Computing Machinery (ACM). https://doi.org/10.1145/2906363.2906375

Kurtin, P. S. , & Bekooij, M. J. G. (2016). Temporal analysis of static priority preemptive scheduled cyclic streaming applications using CSDF models. In 2016 ACM/IEEE Symposium on Embedded Systems for Real-Time Multimedia (ESTIMedia) (pp. 94-103). Association for Computing Machinery (ACM). https://doi.org/10.1145/2993452.2993564


Kurtin, P. S. , Hausmans, J. P. H. M. , & Bekooij, M. J. G. (2016). HAPI: An event-driven simulator for real-time multiprocessor systems. In 2016 ACM International Workshop on Software and Compilers for Embedded Systems (SCOPES) (pp. 60-66). Association for Computing Machinery (ACM). https://doi.org/10.1145/2906363.2906381

Le Viet Duc, D. V. , Kamminga, J. W. , Scholten, J. , & Havinga, P. J. M. (2016). Error Bounds for Localization with Noise Diversity. In V. D. Le (Ed.), 2016 International Conference on Distributed Computing in Sensor Systems (DCOSS) (pp. 83-92). IEEE Communications Society. https://doi.org/10.1109/DCOSS.2016.18

Le Viet Duc, D. V. , Kamminga, J. W. , Scholten, J. , & Havinga, P. J. M. (2016). Nondeterministic Sound Source Localization with Smartphones in Crowdsensing. In V. D. Le, & L. D. Le Viet Duc (Eds.), Proceedings of the 5th CoSDEO workshop on Contact-Free Ambient Sensing, Localization and Tracking, CoSDEO 2016 (pp. 279-285). IEEE Computer Society. https://doi.org/10.1109/PERCOMW.2016.7457115

Le, A., Chen, Y., Chai, K. K. , Vasenev, A. , & Montoya, L. (2016). Assessing loss event frequencies of smart grid cyber threats: Encoding flexibility into FAIR using Bayesian network approach. In 1st EAI International Conference on Smart Grid Inspired Future (pp. 43-51). Springer. https://doi.org/10.1007/978-3-319-47729-9_5

Mader, A. H. , & Dertien, E. C. (2016). Tinkering as Method in Academic Teaching. In E. Bohemia (Ed.), DS 83: Proceedings of the 18th International Conference on Engineering and Product Design Education (pp. 240-245) https://www.designsociety.org/publication/39073/tinkering_as_method_in_academic_teaching

Martella, C., Miraglia, A., Cattani, M. , & van Steen, M. R. (2016). Leveraging Proximity Sensing to Mine the Behavior of Museum Visitors. In Proceedings of the IEEE International Conference on Pervasive Computing and Communication (PerCom 2016) (pp. 9). IEEE Computer Society. https://doi.org/10.1109/PERCOM.2016.7456513

Meijer, J. , & van de Pol, J. C. (2016). Bandwidth and Wavefront Reduction for Static Variable Ordering in Symbolic Reachability Analysis. In S. Rayadurgam, & O. Tkachuk (Eds.), NASA Formal Methods: 8th International Symposium, NFM 2016, Minneapolis, MN, USA, June 7-9, 2016, Proceedings (pp. 255-271). (Lecture Notes in Computer Science; Vol. 9690). Springer. https://doi.org/10.1007/978-3-319-40648-0_20

Meijerink, B. J. , Baratchi, M. , & Heijenk, G. (2016). An Efficient Geographical Addressing Scheme for the Internet. In Proceedings of the 14th IFIP WG 6.2 International Conference on Wired/Wireless Internet Communications, WWIC 2016 (pp. 78-90). (Lecture Notes in Computer Science; Vol. 9674). Springer. https://doi.org/10.1007/978-3-319-33936-8_7

Mocanu, E., Nguyen, P. H., & Gibescu, M. (2016). Energy disaggregation for real-time building flexibility detection. In 2016 IEEE Power and Energy Society General Meeting, PESGM 2016: 17-21 July 2016, Boston, Massachusetts [7741966] (IEEE Power and Energy Society General Meeting; Vol. 2016). IEEE Computer Society. https://doi.org/10.1109/PESGM.2016.7741966

Moreira, J. , van Sinderen, M. J. , Ferreira Pires, L. , & Dockhorn Costa, P. (2016). Improving semantic interoperability of big data for epidemiological surveillance. In M. Zelm, G. Doumeingts, & J. P. Mendonca (Eds.), Enterprise Interoperability in the Digitized and Networked Factory of the Future, I-ESA 2016 (pp. 314-324). International Society for Technology in Education. http://www.iste.co.uk/index.php?p=a&ACTION=View&id=1073

Moreno Celleri, A. M. , Poppe, R. W. , & Heylen, D. K. J. (2016). Play with Me! Gender-Typed Social Play Behavior Analysis in Interactive Tag Games. In Proceedings of the 8th International Conference on Intelligent Technologies for Interactive Entertainment (INTETAIN 2016), Revised Selected Papers (pp. 146-157). (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Vol. 178). Springer. https://doi.org/10.1007/978-3-319-49616-0_14


Morshed, S. , Baratchi, M. , Mandal, P. K. , & Heijenk, G. (2016). A Multi-channel Multiple Access Scheme Using Frequency Offsets - Modelling and Analysis. In Proceedings of the 12th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2016 (pp. -). IEEE Computer Society. https://doi.org/10.1109/WiMOB.2016.7763230

Moscoviter, D. , Gholibeigi, M. , Meijerink, B. J., Kooijman, R., Krijger, P. , & Heijenk, G. (2016). Improving Spatial Indexing and Searching for Location-Based DNS Queries. In Proceedings of the 14th IFIP WG 6.2 International Conference on Wired/Wireless Internet Communications, WWIC 2016 (pp. 187-198). (Lecture Notes in Computer Science; Vol. 9674). Springer. https://doi.org/10.1007/978-3-319-33936-8_15

Mostowski, W. (2016). Dynamic Frames Based Verification Method for Concurrent Java Programs. In A. Gurfinkel, & S. A. Seshia (Eds.), Proceedings of the 7th Working Conference on Verified Software: Theories, Tools, and Experiments, VSTTE 2015. Revised Selected Papers (pp. 124-141). (Lecture Notes in Computer Science; Vol. 9593). Springer. https://doi.org/10.1007/978-3-319-29613-5_8

Nardi, J. C. , A. Almeida, J. P., Pereira, M. C., de Almeida Falbo, R. , Iacob, M. E. , van Sinderen, M. J. , & Ferreira Pires, L. (2016). Service commitments and capabilities across ArchiMate architectural layers. In 2016 IEEE 20th International Enterprise Distributed Object Computing Workshop (EDOCW) (pp. 139-148). (IEEE International Enterprise Distributed Object Computing Workshop). IEEE. https://doi.org/10.1109/EDOCW.2016.7584386

Neele, T., Wijs, A., Bosnacki, D. , & van de Pol, J. C. (2016). Partial-Order Reduction for GPU Model Checking. In C. Artho, A. Legay, & D. Peled (Eds.), Proceedings of the 14th International Symposium on Automated Technology for Verification and Analysis, ATVA 2016 (pp. 357-374). (Lecture Notes in Computer Science; Vol. 9938). Springer. https://doi.org/10.1007/978-3-319-46520-3_23

Nguyen, D-P., & Cornips, L. (2016). Automatic Detection of Intra-Word Code-Switching. In Proceedings of the 14th Annual SIGMORPHON Workshop on Computational Research in Phonetics, Phonology, and Morphology (pp. 82-86). Association for Computational Linguistics (ACL). http://anthology.aclweb.org/W16-2013

Nies, G., Stenger, M., Krčál, J. , Hermanns, H., Bisgaard, M., Gerhardt, D. , Haverkort, B. R. H. M. , Jongerden, M. R. , Larsen, K. G., & Wognsen, E. R. (2016). Mastering Operational Limitations of LEO Satellites - The GOMX-3 Approach. In Proceedings of the 23rd IAA Symposium on Small Missions at the 67th International Astronotical Congress, IAC 16/B4 (pp. 1-15). International Astronautical Federation. https://iafastro.directory/iac/archive/browse/IAC-16/B4/3/35160/

Nijholt, A. (2016). Human Avatars in Playful and Humorous Environments. In WJ. Chung, & C. Sungsoo Shin (Eds.), Proceedings of the AHFE 2016 International Conference on Affective and Pleasurable Design (pp. 671-682). (Advances in Intelligent Systems and Computing; Vol. 483). Springer. https://doi.org/10.1007/978-3-319-41661-8_65

Nijholt, A. (2016). Multi-Brain BCI Games: Where to Go from Here? In A. Spink, G. Riedel, L. Zhou, R. Albatel, & C. Gurrin (Eds.), Proceedings of Measuring Behavior 2016, 10th International Conference on Methods and Techniques in Behavioral Research (pp. 496-499). Dublin City University. http://www.measuringbehavior.org/files/2016/MB2016_Proceedings.pdf

Nijholt, A. (2016). Smart Bugs and Digital Banana Peels: Accidental Humor in Smart Environments? In N. Streitz, & P. Markopoulos (Eds.), Proceedings of the 4th International Conference on Distributed, Ambient and Pervasive Interactions, DAPI 2016, Held as Part of HCI International 2016 (pp. 329-340). (Lecture Notes in Computer Science; Vol. 9749). Springer. https://doi.org/10.1007/978-3-319-39862-4_30

Nijholt, A. (2016). The Future of Brain-Computer Interfacing (keynote paper). In Proceedings of the 5th International Conference on Informatics, Electronics & Vision (ICIEV 2016) (pp. 156-161). IEEE Computer Society. https://doi.org/10.1109/ICIEV.2016.7759987

Nijholt, A. , & Poel, M. (2016). Multi-Brain BCI: Characteristics and Social Interactions. In D. D. Schmorrow, & C. M. Fidopiastis (Eds.), Foundations of Augmented Cognition: Neuroergonomics and Operational Neuroscience: 0th International Conference, AC 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings, Part I (pp. 79-90). (Lecture Notes in Computer Science; Vol. 9743). Springer. https://doi.org/10.1007/978-3-319-39955-3_8

Nijholt, A., Velasco, C., Karunanayaka, K. , & Huisman, G. (2016). 1st International Workshop on Multi-sensorial Approaches to Human-Food Interaction (Workshop Summary). In Proceedings 18th International Conference on Multimodal Interaction, ICMI 2016 (pp. 601-603). Association for Computing Machinery (ACM). https://doi.org/10.1145/2993148.3007633


Ordelman, R. J. F. (2016). Developing Benchmarks: The Importance of the Process and New Paradigms. In MMCommons '16: Proceedings of the 2016 ACM Workshop on Multimedia COMMONS ACM Publishing. https://doi.org/10.1145/2983554.2983562

Oudshoorn, L. , Gillani, G. A. , & Kokkeler, A. B. J. (2016). Impact of delay propagation on NTV PCMOS design. In Proceedings of the International Conference: Energy efficiency and sustainability in ICT (pp. 21-22). (ICT Energy Letters; Vol. 12, No. 12). Noise in physical systems, dipartimento di fisica e geologia. http://www.ict-energyletters.eu/node/196

Perez, K. X., Baldea, M., Edgar, T. F. , Hoogsteen, G. , van Leeuwen, R. P. , van der Klauw, T. , Homan, B. , Fink, J. , & Smit, G. J. M. (2016). Soft-islanding a group of houses through scheduling of CHP, PV and storage. In IEEE International Energy Conference, ENERGYCON 2016 (pp. 1-6). IEEE Power & Energy Society. https://doi.org/10.1109/ENERGYCON.2016.7513972

Petridis, S. , & Pantic, M. (2016). Deep Complementary Bottleneck Features for Visual Speech Recognition. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016 (pp. 2304-2308). (IEEE International Conference on Acoustics, Speech and Signal Processing). IEEE. https://doi.org/10.1109/ICASSP.2016.7472088

Piotrowski, K., Casaca, A. , Gerards, M. E. T. , Jongerden, M. R., Melo, F., Garrido, D., Geers, M., & Peralta, J. (2016). A hierarchical architecture for an energy management system. In The 10th Mediterranean Conference on Power Generation, Transmission, Distribution and Energy Conversion, MedPower 2016 (pp. 109). IET Digital Library. https://doi.org/10.1049/cp.2016.1098

Pons, P., Hirskyj-Douglas, I. , Nijholt, A., & Cheok, A. D. (2016). Animal-Computer Interaction: Animal-Centred, Participatory, and Playful Design. In A. Spink, G. Riedel, L. Zhou, L. Teekens, R. Albatal, & C. Gurrin (Eds.), Proceedings of Measuring Behavior 2016, 10th International Conference on Methods and Techniques in Behavioral Research (pp. 456-460). Dublin City University. http://www.measuringbehavior.org/files/2016/MB2016_Proceedings.pdf

Pras, A. , Cardoso de Santanna, J. J. , Steinberger, J. , & Sperotto, A. (2016). DDoS 3.0 - How Terrorists Bring Down the Internet. In A. K. I. Remke, & B. R. H. M. Haverkort (Eds.), Proceedings of the 18th International GI/ITG Conference on “Measurement, Modelling and Evaluation of Computing Systems‿ and “Dependability and Fault-Tolerance‿, MMB & DFT 2016 (pp. 1-4). (Lecture Notes in Computer Science; Vol. 9629). Springer. https://doi.org/10.1007/978-3-319-31559-1_1

Reidsma, D. , Charisi, V. , Davison, D. P. , Wijnen, F. M. , van der Meij, J. , Evers, V., Cameron, D., Fernando, S., Moore, R., Prescott, T., Mazzei, D., Pieroni, M., Cominelli, L., Garofalo, R., De Rossi, D., Vouloutsi, V., Zucca, R., Grechuta, K., Blancas, M., & Verschure, P. (2016). The EASEL Project: Towards Educational Human-Robot Symbiotic Interaction. In N. F. Lepora, A. Mura, M. Mangan, P. F. M. J. Verschure, M. Desmulliez, & T. J. Prescott (Eds.), Proceedings of the 5th International Conference on Living Machines (pp. 297-306). (Lecture Notes in Computer Science; Vol. 9793). Springer. https://doi.org/10.1007/978-3-319-42417-0_27

Rensink, A. (2016). Verification Techniques for Graph Rewriting (Tutorial). In P. A. Abdulla, F. Gadducci, B. König, & V. Vafeiadis (Eds.), Verification of Evolving Graph Structures (pp. 18-18). (Dagstuhl Reports; Vol. 5, No. 11). Dagstuhl. https://doi.org/10.4230/DagRep.5.11.1

Rodday, N. M. , de Oliveira Schmidt, R. , & Pras, A. (2016). Exploring Security Vulnerabilities of Unmanned Aerial Vehicles. In Proceedings of the IEEE/IFIP Network Operations and Management Symposium (IEEE NOMS 2016) (pp. 993-994). IEEE Communications Society. https://doi.org/10.1109/NOMS.2016.7502939

Ruijters, E. J. J. , Guck, D., Drolenga, P. , & Stoelinga, M. I. A. (2016). Fault maintenance trees: reliability centered maintenance via statistical model checking. In Proceedings of the IEEE 62nd Annual Reliability and Maintainability Symposium, RAMS 2016 IEEE. https://doi.org/10.1109/RAMS.2016.7447986

Ruijters, E. J. J. , Guck, D., Drolenga, P., Peters, M. , & Stoelinga, M. I. A. (2016). Maintenance analysis and optimization via statistical model checking: Evaluating a train pneumatic compressor. In G. Agha, & B. Van Houdt (Eds.), Proceedings of the 13th International Conference on Quantitative Evaluation of SysTems, QEST 2016 (pp. 331-347). (Lecture Notes in Computer Science; Vol. 9826). Springer. https://doi.org/10.1007/978-3-319-43425-4_22

Ruijters, E. J. J. , Guck, D., van Noort, M. , & Stoelinga, M. I. A. (2016). Reliability-centered maintenance of the Electrically Insulated Railway Joint via Fault Tree Analysis: A practical experience report. In Proceedings of the 46th annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016 (pp. 662-669). IEEE Computer Society. https://doi.org/10.1109/DSN.2016.67

Ruijters, E. , & Stoelinga, M. (2016). Better railway engineering through statistical model checking. In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques: 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10–14, 2016, Proceedings, Part I (pp. 151-165). (Lecture Notes in Computer Science; Vol. 9952). Springer. https://doi.org/10.1007/978-3-319-47166-2_10

Schot, N. J., Velthuis, P. J. E. , & Postema, B. F. (2016). Capabilities of Raspberry Pi 2 for Big Data and Video Streaming Applications in Data Centres. In A. K. I. Remke, A. K. I. Remke, B. R. H. M. Haverkort, & B. R. H. M. Haverkort (Eds.), Proceedings of the 18th International GI/ITG Conference on Measurement, Modelling and Evaluation of Dependable Computer and Communication Systems (MMB & DFT 2016) (pp. 183-198). (Lecture Notes in Computer Science; Vol. 9629). Springer. https://doi.org/10.1007/978-3-319-31559-1_15

Seraj, F. , Havinga, P. J. M. , & Meratnia, N. (2016). SpinSafe: An unsupervised smartphone-based wheelchair path monitoring system. In Proceedings of the IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016 (pp. 1-6). IEEE Computer Society. https://doi.org/10.1109/PERCOMW.2016.7457151

Shoaib, M. , Scholten, J. , Havinga, P. J. M. , & Durmaz, O. (2016). A hierarchical lazy smoking detection algorithm using smartwatch sensors. In Proceedings of the IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom 2016) (pp. 117-122). IEEE Computer Society. https://doi.org/10.1109/HealthCom.2016.7749439

Sieverink, F. , Kelders, S. M., Akkersdijk, S. , Poel, M. , Tjin-Kam-Jet-Siemons, L. , & van Gemert-Pijnen, J. E. W. C. (2016). Work in progress: a protocol for the collection, analysis, and interpretation of log data from eHealth technology. In O. Kulyk, L. Siemons, H. Oinas-Kukkonen, & L. van Gemert-Pijnen (Eds.), Proceedings of the Fourth International Workshop on Behavior Change Support Systems co-located with the 11th International Conference on Persuasive Technology (pp. 56-60)

Singh, P. M. , & van Sinderen, M. J. (2016). Big data interoperability challenges for logistics. In M. Zelm, G. Doumeingts, & J. P. Mendonca (Eds.), Enterprise Interoperability in the Digitized and Networked Factory of the Future (pp. 325-335). International Society for Technology in Education. http://www.iste.co.uk/index.php?p=a&ACTION=View&id=1073

Sousa, B., Zhao, Z. , Karimzadeh Motallebi Azar, M., Palma, D., Fonseca, V., Simoes, P., Braun, T. , van den Berg, H. L. , Pras, A., & Cordeiro, L. (2016). Enabling a Mobility Prediction-aware Follow-Me Cloud Model. In Proceedings of the 41st IEEE Conference on Local Computer Networks (LNC 2016) (pp. 486-494). IEEE Computer Society. https://doi.org/10.1109/LCN.2016.77

Staring, A. J. , Meertens, L. O. , & Sikkel, N. (2016). Business models & business cases for point-of-care testing. In BMSD 2016 - Proceedings of the 6th International Symposium on Business Modeling and Software Design (pp. 54-63). SCITEPRESS. https://doi.org/10.5220/0006222200540063

Steinberger, J. , Cardoso de Santanna, J. J., Spatharas, E., Amler, H., Breuer, N., Graul, K., Kuhnert, B., Piontek, U. , Sperotto, A., Baier, H. , & Pras, A. (2016). "LUDO" - Kids playing Distributed Denial of Service. In J. Bergström, G. Hórvath, & B. Schofield (Eds.), Proceedings of the 32th Trans European Research and Education Networking Conference (TNC 2016) (pp. 3). (European Journal of Higher Education IT; Vol. 2016-02). EUNIS Research and Analysis Initiative. http://www.eunis.org/download/TNC2016/03-paper-TNC2016-2.pdf

Steinberger, J., Kuhnert, B. , Sperotto, A., Baier, H. , & Pras, A. (2016). Collaborative DDoS Defense using Flow-based Security Event Information. In Proceedings of the IEEE/IFIP Network Operations and Management Symposium, IEEE NOMS 2016 (pp. 516-552). IEEE Communications Society. https://doi.org/10.1109/NOMS.2016.7502852

Steinberger, J., Kuhnert, B. , Sperotto, A., Baier, H. , & Pras, A. (2016). In Whom Do We Trust - Sharing Security Events. In Proceedings of the 10th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2016) (pp. 111-124). (Lecture Notes in Computer Science; Vol. 9701). Springer. https://doi.org/10.1007/978-3-319-39814-3_11

Türkes, O. , Scholten, J. , & Havinga, P. J. M. (2016). Friend-to-friend short message service with opportunistic Wi-Fi beacons. In Proceedings of the 7th IEEE Workshop on Pervasive Collaboration and Social Networking (PerCol 2016), in conjunction with the IEEE International Conference on Pervasive Computing and Communication (PerCom 2016) (pp. 1-6). IEEE Computer Society. https://doi.org/10.1109/PERCOMW.2016.7457142

Türkes, O. , Scholten, J. , & Havinga, P. J. M. (2016). Opportunistic Beacon Networks: Information Dissemination via Wireless Network Identifiers. In Proceedings of the 5th IEEE International Workshop on the Impact of Human Mobility in Pervasive Systems and Applications, 2016 (PerMoby 2016), in conjunction with IEEE International Conference on Pervasive Computing and Communication (PerCom 2016) (pp. 1-6). IEEE Computer Society. https://doi.org/10.1109/PERCOMW.2016.7457153

Valstar, M., Pelachaud, C. , Heylen, D. K. J., Dermouche, S., Ghitulescu, A., Baur, T., Cafaro, A., Potard, B., André, E., Wagner, J., Durieu, L., Aylett, M., Coutinho, E., Schuller, B., Zhang, Y. , Theune, M. , & van Waterschoot, J. (2016). Ask Alice: an Artificial Retrieval of Information Agent. In Proceedings of the 18th ACM International Conference on Multimodal Interaction, ICMI 2016 (pp. 419-420). Association for Computing Machinery (ACM). https://doi.org/10.1145/2993148.2998535


Vasenev, A. , Montoya, L., & Ceccarelli, A. (2016). A Hazus-Based Method for Assessing Robustness of Electricity Supply to Critical Smart Grid Consumers during Flood Events. In 11th International Conference on Availability, Reliability and Security, ARES 2016 (pp. 223-228). IEEE. https://doi.org/10.1109/ARES.2016.12

Vasenev, A. , Montoya, L., Ceccarelli, A., Le, A. , & Ionita, D. (2016). Threat navigator: grouping and ranking malicious external threats to current and future urban smart grids. In 1st EAI International Conference on Smart Grid Inspired Future (pp. 184-192). Springer. https://doi.org/10.1007/978-3-319-47729-9_19

Velasco, C., Reinoso Carvalho, F., Petit, O. , & Nijholt, A. (2016). A Multisensory Approach for the Design of Food and Drink Enhancing Sonic Systems. In Proceedings of the 1st Workshop on Multi-sensorial Approaches to Human-Food Interaction, MHFI 2016 (pp. 7). Association for Computing Machinery (ACM). https://doi.org/10.1145/3007577.3007578

Vouloutsi, V., Blancas, M., Zucca, R., Omedas, P. , Reidsma, D. , Davison, D. P. , Charisi, V. , Wijnen, F. M., Wijnen, F. M. , van der Meij, J. , Evers, V., Cameron, D., Fernando, S., Moore, R., Prescott, T., Mazzei, D., Pieroni, M., Cominelli, L., Garofalo, R., ... Verschure, P. (2016). Towards a Synthetic Tutor Assistant: The EASEL Project and its Architecture. In N. F. Lepora, A. Mura, M. Mangan, P. F. M. J. Verschure, M. Desmulliez, & T. J. Prescott (Eds.), Biomimetic and Biohybrid Systems, Proceedings of the 5th International Conference on Living Machines (pp. 353-364). (Lecture Notes in Computer Science; Vol. 9793). Springer. https://doi.org/10.1007/978-3-319-42417-0_32

Vroon, J. H. , Englebienne, G. , & Evers, V. (2016). Responsive Social Agents: Feedback-Sensitive Behavior Generation for Social Interactions. In A. Agah, J-J. Cabibihan, A. M. Howard, M. A. Salichs, & H. He (Eds.), Social Robotics: 8th International Conference, ICSR 2016, Kansas City, MO, USA, November 1-3, 2016 Proceedings (pp. 126-137). (Lecture notes in computer science; Vol. 9979). https://doi.org/10.1007/978-3-319-47437-3_13

Wevers, L. , Huisman, M. , & van Keulen, M. (2016). Lazy Evaluation for Concurrent OLTP and Bulk Transactions. In Proceedings of the 20th International Database Engineering & Applications Symposium (IDEAS 2016) (pp. 115-124). Association for Computing Machinery (ACM). https://doi.org/10.1145/2938503.2938555

Willemse, C. J. A. M. , Huisman, G. , Jung, M. M. , van Erp, J. B. F. , & Heylen, D. K. J. (2016). Observing Touch from Video: The Influence of Social Cues on Pleasantness Perceptions. In F. Bello, H. Kajimoto, & Y. Visell (Eds.), Haptics: Perception, Devices, Control, and Applications: 10th International Conference, EuroHaptics 2016, London, UK, July 4-7, 2016, Proceedings, Part II (pp. 196-205). (Lecture Notes in Computer Science; Vol. 9775). Springer. https://doi.org/10.1007/978-3-319-42324-1_20


Yüksel, Ö. , den Hartog, J. , & Etalle, S. (2016). Reading between the fields: practical, effective intrusion detection for industrial control systems. In SAC '16 Proceedings of the 31st Annual ACM Symposium on Applied Computing (pp. 2063-2070). Association for Computing Machinery (ACM). https://doi.org/10.1145/2851613.2851799

Zafeiriou, L., Antonakos, E., Zafeiriou, S. , & Pantic, M. (2016). Joint Unsupervised Deformable Spatio-Temporal Alignment of Sequences. In Proceedings of IEEE International Conference on Computer Vision & Pattern Recognition (CVPR 2016) (pp. 3382-3390). IEEE Computer Vision and Pattern Recognition. https://doi.org/10.1109/CVPR.2016.368

Zaga, C. , De Vries, R. A. J., Spenkelink, S. J. , Truong, K. P. , & Evers, V. (2016). Help-Giving Robot Behaviors in Child-Robot Games: Exploring Semantic Free Utterances. In 11th ACM/IEEE International Conference on Human Robot Interaction (HRI 2016) (pp. 541-542). IEEE. https://doi.org/10.1109/HRI.2016.7451846

Zaga, C. , Lohse, M. , Charisi, V. , Evers, V., Neerincx, M., Kanda, T., & Leite, I. (2016). 2nd Workshop on Evaluating Child Robot Interaction. In HRI'16: The Eleventh ACM/IEEE International Conference on Human Robot Interaction (pp. 587-588). (ACM/IEEE International Conference on Human-Robot Interaction; Vol. 2016). IEEE. https://doi.org/10.1109/HRI.2016.7451869


Zambrano Constantini, A. C. , & Kerkhoff, H. G. (2016). Online digital compensation method for AMR sensors. In IFIP/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2016 (pp. -). IEEE. https://doi.org/10.1109/VLSI-SoC.2016.7753579


de Vries, W. B. , de Oliveira Schmidt, R. , & Pras, A. (2016). Anycast and its potential for DDoS mitigation. In Management and Security in the Age of Hyperconnectivity. Proceedings of the 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016 (pp. 147-151). (Lecture Notes in Computer Science; Vol. 9701). Springer. https://doi.org/10.1007/978-3-319-39814-3_16


van Delden, R. W., Gerritsen, S. , Reidsma, D. , & Heylen, D. K. J. (2016). Distributed Embodied Team Play, a Distributed Interactive Pong Playground. In R. Poppe, J-J. Meyer, R. Veltkamp, & M. Destani (Eds.), Proceedings of the 8th International Conference on Intelligent Technologies for Interactive Entertainment (INETAIN 2016) (pp. 124-135). (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST); Vol. 178). Springer. https://doi.org/10.1007/978-3-319-49616-0_12

van Delden, R., Janssen, J. , ter Stal, S., Deenik, W., Meijer, W. , Reidsma, D. , & Heylen, D. K. J. (2016). Personalization of Gait Rehabilitation Games on a Pressure Sensitive Interactive LED Floor. In R. Orji, M. Reisinger, M. Busch, A. Dijkstra, A. Stibe, & M. Tscheligi (Eds.), Proceedings of the International Workshop on Personalization in Persuasive Technology: co-located with the 11th International Conference on Persuasive Technology (PT 2016) (pp. 60-73). (CEUR workshop proceedings; Vol. 1582). RWTH Aachen University. http://ceur-ws.org/Vol-1582/6Delden.pdf

van Dijk, T. , & van de Pol, J. C. (2016). Multi-core Symbolic Bisimulation Minimisation. In M. Chechik, & J-F. Raskin (Eds.), Proceedings of the 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2016) (pp. 332-348). (Lecture Notes in Computer Science; Vol. 9636). Springer. https://doi.org/10.1007/978-3-662-49674-9_19

van Kleunen, W. A. P. , Le Viet Duc, L. D. , & Havinga, P. J. M. (2016). Calibration-Free Signal-Strength Localization using Product-Moment Correlation. In Proceedings of the 13th IEEE International Conference on Mobile Ad hoc and Sensor Systems (IEEE MASS 2016) (pp. 210-218). IEEE Computer Society. https://doi.org/10.1109/MASS.2016.17

van Leeuwen, R. P., Gebhardt, I., de Wit, J. B. , & Smit, G. J. M. (2016). A predictive model for smart control of a domestic heat pump and thermal storage. In Proceedings of SMARTGREENS 2016 (pp. 136-145). SCITEPRESS Digital Library. https://doi.org/10.5220/0005762201360145

van Wieren, M., Doerr, C., Jacobs, V. , & Pieters, W. (2016). Understanding Bifurcation of Slow Versus Fast Cyber-Attackers. In G. Livraga, V. Torra, A. Aldini, F. Martinelli, & N. Suri (Eds.), Data Privacy Management and Security Assurance: 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings (pp. 19-33). (Lecture notes in computer science; Vol. 9963). Springer. https://doi.org/10.1007/978-3-319-47072-6_2

van de Kamp, T. R. , Peter, A. , Everts, M. H. , & Jonker, W. (2016). Private Sharing of IOCs and Sightings. In 3rd ACM Workshop on Information Sharing and Collaborative Security, WISCS 2016 (pp. 35-38). Association for Computing Machinery (ACM). https://doi.org/10.1145/2994539.2994544

van den Berg, F. , Postema, B. F. , & Haverkort, B. R. H. M. (2016). Evaluating Load Balancing Policies for Performance and Energy-Efficiency. In Proceedings of the 14th International Workshop on Quantitative Aspects of Programming Languages and Systems, QAPL 2016 (pp. 98-117). (Electronic Proceedings in Theoretical Computer Science; Vol. 227). Open Publishing Association. https://doi.org/10.4204/EPTCS.227.7


van der Klauw, T. , Gerards, M. E. T. , & Hurink, J. L. (2016). Using demand-side management to decrease transformer ageing. In 2016 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe) (pp. 186). IEEE Power & Energy Society. https://doi.org/10.1109/ISGTEurope.2016.7856205


van der Klauw, T. , Hoogsteen, G. , Gerards, M. E. T. , Hurink, J. L., Feng, X., & Hebner, R. E. (2016). Assessing the potential of residential HVAC systems for demand-side management. In IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, ISGT 2016 (pp. 107). IEEE Power & Energy Society. https://doi.org/10.1109/ISGT.2016.7781193

Foreword/postscript


Badonnel, R., Koch, R., Drašar, M. , & Pras, A. (2016). Preface. In R. Badonnel, R. Koch, A. Pras, M. Drasar, & B. Stiller (Eds.), Management and Security in the Age of Hyperconnectivity: 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings (Vol. 9701, pp. V-VI). (Lecture notes in computer science; Vol. 9701). Springer.

Paper


Ali, G. , Badawy, A. , & Kerkhoff, H. G. (2016). Accessing on-chip temperature health monitors using the IEEE 1687 standard. 776-779. Paper presented at 23rd IEEE International Conference on Electronics, Circuits and Systems (ICECS), . https://doi.org/10.1109/ICECS.2016.7841317

Awad, G., Smeaton, A., Soboroff, I., Kraaij, W., Ellis, A., Quénot, G., Dimmick, D. , Ordelman, R. , Aly, R., Eskevich, M., Larson, M., Jones, G., Fiscus, J., Huet, B., Joy, D., Ritter, M., Michel, M., Strassel, S., Delgado, A., & Li, X. (2016). TREC video retrieval evaluation. Paper presented at TREC Video Retrieval Evaluation, TRECVID 2016, Gaithersburg, United States.

Ayele, E. D. , Meratnia, N. , & Havinga, P. J. M. (2016). HAMA: A Herd-Movement Adaptive MAC Protocol for Wireless Sensor Networks. 1-7. Paper presented at 8th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2016, . https://doi.org/10.1109/NTMS.2016.7792456

Belov, A., Kartak, V. , Vasenev, A. , Meratnia, N. , & Havinga, P. J. M. (2016). A hierarchical scheme for balancing user comfort and electricity consumption of tank water heaters. Paper presented at 2016 IEEE PES Innovative Smart Grid Technologies, ISGT 2016, Minneapolis, United States. https://doi.org/10.1109/ISGT.2016.7781268



Davison, D. P. , Charisi, V. , Wijnen, F. M., Papenmeier, A. , van der Meij, J. , Reidsma, D. , & Evers, V. (2016). Design challenges for long-term interaction with a robot in a science classroom. -. Paper presented at RO-MAN 2016 Workshop on Long-term Child-robot Interaction, New York, United States.

Eskevich, M., Larson, M. , Aly, R. , Ordelman, R., Jones, G. J. F., & Huet, B. (2016). Video hyperlinking (LNK) TRECVID 2016. Paper presented at TREC Video Retrieval Evaluation, TRECVID 2016, Gaithersburg, United States.

Gerards, M. E. T. , & Hurink, J. L. (2016). Planning of on/off devices with minimum run-times. Paper presented at 2016 IEEE PES Innovative Smart Grid Technologies Europe, ISGT Europe 2016, Ljubljana, Slovenia. https://doi.org/10.1109/ISGTEurope.2016.7856220

Hendriks, L. , de Oliveira Schmidt, R. , Sadre, R., Bezerra, J. , & Pras, A. (2016). Assessing the quality of flow measurements from OpenFlow devices. 1-8. Paper presented at 8th International Workshop on Traffic Monitoring and Analysis, TMA 2016, . http://tma.ifip.org/2016/papers/tma2016-final34.pdf

Kolesnichenko, A. V. , Haverkort, B. R. H. M. , Remke, A. K. I. , & de Boer, P-T. (2016). Fitting a code-red virus spread model: An account of putting theory into practice. 39-46. Paper presented at 12th International Conference on the Design of Reliable Communication Networks (DRCN 2016), . https://doi.org/10.1109/DRCN.2016.7470833

Kossaifi, J., Panagakis, Y. , & Pantic, M. (2016). TensorLy: Tensor Learning in Python. Paper presented at Proceedings of Tensor-Learn Workshop 2016, . https://arxiv.org/abs/1610.09555

Moura, G. M. , de O. Schmidt, R., Heidemann, J. , de Vries, W. B., Müller, M., Wei, L. , & Hesselman, C. (2016). Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event. 255-270. Paper presented at 2016 ACM on Internet Measurement Conference, IMC 2016, . https://doi.org/10.1145/2987443.2987446

Nijholt, A. (2016). Brain-Computer Interfacing Embedded in Intelligent and Affective Systems. 1-1. Paper presented at 4th IIAE International Conference on Intelligent Systems and Image Processing, ICISIP 2016, Kyoto, Japan. https://doi.org/10.12792/icisip2016.001

Oortwijn, W. H. M. , Blom, S. , & Huisman, M. (2016). Static Verification of Message Passing Programs. Paper presented at ICT.OPEN 2016, Amersfoort, Netherlands.

Peng, Y. , Spreeuwers, L. J. , & Veldhuis, R. N. J. (2016). Designing a Low-Resolution Face Recognition System for Long-Range Surveillance. 16429137. Paper presented at 15th International Conference of the Biometrics Special Interest Group, BIOSIG 2016, Darmstadt, Germany. https://doi.org/10.1109/BIOSIG.2016.7736917

Rohani, A. , Ebrahimi, H. , & Kerkhoff, H. G. (2016). A software framework to calculate local temperatures in CMOS processors. 183-188. Paper presented at 26th International Workshop on Power and Timing Modeling, Optimization and Simulation, Bremen, Germany. https://doi.org/10.1109/PATMOS.2016.7833685

Schramm, M. , & Daneva, M. (2016). Implementations of service oriented architecture and agile software development: What works and what are the challenges?. 1-12. Paper presented at Tenth IEEE International Conference on Research Challenges in Information Science, RCIS 2016, . https://doi.org/10.1109/RCIS.2016.7549345

Sieverink, F. , Kelders, S. M. , Poel, M. , & van Gemert-Pijnen, J. E. W. C. (2016). How to collect, analyze and interpret log data from eHealth technology. -. Paper presented at Supporting Health by Technology VII 2016, Groningen, Netherlands.

Susyanto, N. , Veldhuis, R. N. J. , Spreeuwers, L. J., & Klaassen, C. A. J. (2016). Fixed FAR correction factor of score level fusion. 16555751. Paper presented at 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems, BTAS 2016, Washington, United States. https://doi.org/10.1109/BTAS.2016.7791173

Susyanto, N. , Veldhuis, R. N. J. , Spreeuwers, L. J., & Klaassen, C. A. J. (2016). Two-step calibration method for multi-algorithm score-based face recognition systems by minimizing discrimination loss. 16252593. Paper presented at 9th IAPR International Conference on Biometrics, ICB 2016, Halmstad, Sweden. https://doi.org/10.1109/ICB.2016.7550094

Walecki, R., Rudovic, O. , Pantic, M., Pavlovic, V., & Cohn, J. F. (2016). A Framework for Joint Estimation and Guided Annotation of Facial Action Unit Intensity. 1460-1468. Paper presented at 29th IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, United States. https://doi.org/10.1109/CVPRW.2016.183

Walecki, R., Rudovic, O., Pavlovic, V. , & Pantic, M. (2016). Copula Ordinal Regression for Joint Estimation of Facial Action Unit Intensity. 4902-4910. Paper presented at 29th IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, United States. https://doi.org/10.1109/CVPR.2016.530

Zeinstra, C. G. , Veldhuis, R. N. J. , & Spreeuwers, L. J. (2016). Discriminating Power of FISWG Characteristic Descriptors Under Different Forensic Use Cases. 16429109. Paper presented at 15th International Conference of the Biometrics Special Interest Group, BIOSIG 2016, Darmstadt, Germany. https://doi.org/10.1109/BIOSIG.2016.7736919


de Vries, R. A. J. , Truong, K. P. , & Evers, V. (2016). Crowd-designed motivation: combining personality and the Transtheoretical Model. 41-52. Paper presented at 11th International Conference on Persuasive Technology, PERSUASIVE 2016, Salzburg, Austria. https://doi.org/10.1007/978-3-319-31510-2_4

de Vries, R. A. J. , Truong, K. P., Kwint, S. , Drossaert, C. H. C. , & Evers, V. (2016). Crowd-Designed Motivation: Motivational Messages for Exercise Adherence Based on Behavior Change Theory. 297-308. Paper presented at 34th Annual CHI Conference on Human Factors in Computing Systems, CHI 2016, San Jose, United States. https://doi.org/10.1145/2858036.2858229

van Rijswijk, R. M. , Jonker, M. , & Sperotto, A. (2016). On the Adoption of the Elliptic Curve Digital Signature Algorithm (ECDSA) in DNSSEC. 258-262. Paper presented at 12th international Conference on Network and Service Management, CNSM 2016, Montreal, Canada. https://doi.org/10.1109/CNSM.2016.7818428

PhD Thesis - Research UT, graduation UT








Hofstede, R. J. (2016). Flow-based Compromise Detection. Centre for Telematics and Information Technology (CTIT). https://doi.org/10.3990/1.9789036540667








Türkes, O. (2016). Opportunistic Beacon Networks. Centre for Telematics and Information Technology (CTIT). https://doi.org/10.3990/1.9789036541343





van de Laar, B. L. A. (2016). Experiencing Brain-Computer Interface Control. Centre for Telematics and Information Technology (CTIT). https://doi.org/10.3990/1.9789036541923

PhD Thesis - Research external, graduation UT

Poster




Kamminga, J. W. , Havinga, P. J. M. , & Meratnia, N. (2016). The Rhino Project. Poster session presented at ICT.OPEN 2016, Amersfoort, Netherlands.

Mocanu, D. C., Exarchakos, G., & Liotta, A. (2016). The double link between network science and artificial intelligence: a key to scalable learning solutions?. Poster session presented at European Data Forum, EDF 2016, Eindhoven, Netherlands.

Quintero Pulido, D. F., Ten Kortenaar, M. V., Vaidya, M. , Hurink, J. L. , & Smit, G. J. M. (2016). Electrochemical Oxidation of Glycerol and Reduction of Oxygen in Alkaline Media. Poster session presented at 19th Topical Meeting of the International Society of Electrochemistry 2016, Auckland, New Zealand. https://www.ise-online.org/ise-conferences/annmeet/folder/19-topical-program-BoA.pdf

Steinberger, J. , Sperotto, A. , Pras, A., & Baier, H. (2016). Real-time DDoS Defense: A collaborative Approach at Internet Scale. Poster session presented at 6th PhD School on Traffic Monitoring and Analysis, TMA 2016, .

Report


Abbasi, A. (2016). Ghost in the PLC: stealth on-the-fly manipulation of programmable logic controllers’ I/O. (CTIT Technical Report Series; No. TR-CTIT-16-02). Centre for Telematics and Information Technology (CTIT).


Ahmad, W. , Yildiz, B. M. , Rensink, A. , & Stoelinga, M. I. A. (2016). A Model-Driven Framework for Hardware-Software Co-design of Dataflow Applications (extended version). (CTIT Technical Report Series; No. TR-CTIT-16-09). Centre for Telematics and Information Technology (CTIT).

Huisman, M., Monahan, R., Müller, P., & Poll, E. (2016). VerifyThis 2016: A Program Verification Competition. (CTIT Technical Report Series; No. TR-CTIT-16-07). Centre for Telematics and Information Technology (CTIT).

Jongerden, M. R. , & Haverkort, B. R. H. M. (2016). Battery Aging and the Kinetic Battery Model. (CTIT technical report; No. TR-CTIT-2016-11). Centre for Telematics and Information Technology (CTIT).

Kurtin, P. S. , & Bekooij, M. J. G. (2016). Appendix to Temporal analysis of static priority preemptive scheduled cyclic streaming applications using CSDF models. (CTIT Technical Report Series; No. TR-CTIT-16-10). Centre for Telematics and Information Technology (CTIT).

Moura, G. C. M. , de O. Schmidt, R., Heidemann, J. , de Vries, W. B., Müller, M., Wei, L. , & Hesselman, C. (2016). Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event. (Information Sciences Institute technical report; No. ISI-TR-2016-709b). University of Southern California.

Nguyen, D-P., Demeester, T. , Trieschnigg, R. B. , & Hiemstra, D. (2016). Resource Selection for Federated Search on the Web. (CTIT Technical Report Series; No. TR-CTIT-16-12). Centre for Telematics and Information Technology (CTIT).

Vriezekolk, E. (2016). Technical Report on Raster field test at a Water Board. (CTIT Technical Report Series; No. TR-CTIT-16-06). Centre for Telematics and Information Technology (CTIT).

de Oliveira Schmidt, R., Heidemann, J., & Kuipers, J. H. (2016). Anycast Latency: How Many Sites Are Enough? (Information Sciences Institute technical report; No. ISI-TR-2016-708). University of Southern California. https://ant.isi.edu/bib/Schmidt16a.html

ter Braak, T. D. , Smit, G. J. M. , & Holzenspies, P. K. F. (2016). Dynamic Resource Allocation. Centre for Telematics and Information Technology (CTIT).

Working paper


Moreira, J. L., Sales, T. P., Guerson, J., Braga, B. F. B., Brasileiro, F., & Sobral, V. (2016). Menthor Editor. http://ceur-ws.org/Vol-1660/demo-paper1.pdf

2015

Article (contribution to journal)





Andujar, M., Crawford, C. S. , Nijholt, A., Jackson, F., & Gilbert, J. E. (2015). Artistic brain-computer interfaces: the expression and stimulation of the user's affective state. Brain-Computer Interfaces, 2(2-3), 60-69. https://doi.org/10.1080/2326263X.2015.1104613

Asthana, A. , Asthana, A., Zafeiriou, S., Tzimiropoulos, G., Cheng, S. , & Pantic, M. (2015). From Pixels to Response Maps: Discriminative Image Filtering for Face Alignment in the Wild. IEEE transactions on pattern analysis and machine intelligence, 37(6), 1312-1320. https://doi.org/10.1109/TPAMI.2014.2362142


Bauer, D. , Broersma, H. J. , van den Heuvel, J., Kahl, N., Nevo, A., Schmeichel, E., Woodall, D. R., & Yatauro, M. (2015). Best monotone degree conditions for graph properties: a survey. Graphs and combinatorics, 31(1), 1-22. https://doi.org/10.1007/s00373-014-1465-6


Bilgin, B. , Nikova, S. I., Nikov, V., Rijmen, V., Tokareva, N., & Vitkup, V. (2015). Threshold implementations of Small S-boxes. Cryptography and communications, 7(1), 3-33. https://doi.org/10.1007/s12095-014-0104-7

Blom, S. , & Huisman, M. (2015). Witnessing the elimination of magic wands. International journal on software tools for technology transfer, 17(6), 757-781. https://doi.org/10.1007/s10009-015-0372-3





Bousmalis, K., Zafeiriou, S., Morency, L-P. , Pantic, M., & Ghahramani, Z. (2015). Variational Infinite Hidden Conditional Random Fields. IEEE transactions on pattern analysis and machine intelligence, 37(9), 1917-1929. https://doi.org/10.1109/TPAMI.2014.2388228


Broersma, H. J. (2015). How tough is toughness? Bulletin of the European Association for Theoretical Computer Science, 117, 28-52. http://bulletin.eatcs.org/index.php/beatcs/article/view/362

Broersma, H. J., Fiala, J., Golovach, P. A., Kaiser, T. , Paulusma, D., & Proskurowski, A. (2015). Linear-time algorithms for scattering number and hamilton-connectivity of interval graphs. Journal of graph theory, 79(4), 282-299. https://doi.org/10.1002/jgt.21832


Brouwer, A-M., Zander, T. O. , van Erp, J. B. F., Korteling, J. E., & Bronkhorst, A. W. (2015). Using neurophysiological signals that reflect cognitive or affective state: Six recommendations to avoid common pitfalls. Frontiers in human neuroscience, 9, 136. https://doi.org/10.3389/fnins.2015.00136

Brouwer, A-M., van Schaik, M. G., Korteling, J. E. H. , van Erp, J. B. F., & Toet, A. (2015). Neuroticism, Extraversion, Conscientiousness and Stress: Physiological Correlates. IEEE transactions on affective computing, 6(2), 109-117. https://doi.org/10.1109/TAFFC.2014.2326402


Brunner, C., Birbaumer, N., Blankertz, B., Guger, C., Kübler, A., Mattia, D., Millán, J. D. R., Miralles, F. , Nijholt, A., Opisso, E., Ramsey, N., Salomon, P., & Müller-Putz, G. R. (2015). BNCI Horizon 2020: towards a roadmap for the BCI community. Brain-Computer Interfaces, 2(1), 1-10. https://doi.org/10.1080/2326263X.2015.1008956



D'Mello, S. K., D'Mello, S. K. (Ed.) , Pantic, M. (Ed.) , & Nijholt, A. (Ed.) (2015). Introduction to the “Best of ACII 2013‿ Special Section. IEEE transactions on affective computing, 6(2), 84-85. https://doi.org/10.1109/TAFFC.2015.2398011








Gamboa, H. (Ed.) , Nijboer, F. , van de Laar, B. L. A., Plácido da Silva, H. (Ed.), Gilleade, K. (Ed.), Gerritsen, S. , Nijholt, A., Bermúdez i Badia, S. (Ed.) , Poel, M., & Fairclough, S. (Ed.) (2015). Usability of Three Electroencephalogram Headsets for Brain-Computer Interfaces: A Within Subject Comparison. Interacting with computers, 27(5), 500-511. https://doi.org/10.1093/iwc/iwv023


Gollmann, D., Herley, C., Koenig, V. , Pieters, W., & Sasse, M. A. (2015). Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl reports, 4(12), 1-28. https://doi.org/10.4230/DagRep.4.12.1

Guardia, G. D. A. , Ferreira Pires, L., Vêncio, R. Z. N., Malmegrim, K. C. R. , & Guareis de farias, C. (2015). A methodology for the development of RESTful semantic web services for gene expression analysis. PLoS ONE, 10(7), e0134011:1-e0134011:28. [e0134011]. https://doi.org/10.1371/journal.pone.0134011



Hancock, P. A., Lawson, B., Cholewiak, R., Elliott, L. R. , van Erp, J. B. F., Mortimer, B. J. P., Rupert, A., & Redden, E. S. (2015). Tactile Cuing to Augment Multisensory Human–Machine Interaction. Ergonomics in design, 23(2), 4-9. https://doi.org/10.1177/1064804615572623

Hartmanns, A. , & Timmer, M. (2015). Sound statistical model checking for MDP using partial order and confluence reduction. International journal on software tools for technology transfer, 17(4), 429-456. https://doi.org/10.1007/s10009-014-0349-7

Hogenboom, A., Frasincar, F. , de Jong, F. M. G., & Kaymak, U. (2015). Polarity classification using structure-based vector representations of text. Decision support systems, 74(June), 46-56. https://doi.org/10.1016/j.dss.2015.04.002

Hogenboom, A., Frasincar, F. , de Jong, F. M. G., & Kaymak, U. (2015). Using rhetorical structure in sentiment analysis. Communications of the ACM, 58(7), 69-77. https://doi.org/10.1145/2699418

Huisman, M., Klebanov, V., & Monahan, R. (2015). VerifyThis 2012 - A Program Verification Competition. International journal on software tools for technology transfer, 17(6), 647-657. https://doi.org/10.1007/s10009-015-0396-8

Inayat, I., Salim, S. S., Marczak, S. , Daneva, M., & Shamshirband, S. (2015). A systematic literature review on agile requirements engineering practices and challenges. Computers in human behavior, 51(Part B), 915-929. https://doi.org/10.1016/j.chb.2014.10.046



Li, B., Ning, B. , Broersma, H. J., & Zhang, S. (2015). Characterizing heavy subgraph pairs for pancyclicity. Graphs and combinatorics, 31(3), 649-667. https://doi.org/10.1007/s00373-014-1406-4

Li, B. , Zhang, Y., Bielak, H. , Broersma, H. J., & Holub, P. (2015). Closing the gap on path-kipas Ramsey numbers. Electronic journal of combinatorics, 22(3), 3.21. http://www.combinatorics.org/ojs/index.php/eljc/article/view/v22i3p21

Liwicki, S., Zafeiriou, S. P. , & Pantic, M. (2015). Online Kernel Slow Feature Analysis for Temporal Video Segmentation and Tracking. IEEE transactions on image processing, 24(10), 2955-2970. https://doi.org/10.1109/TIP.2015.2428052

Mader, A. H. , Reidsma, D. (Ed.) , Dertien, E. C., Volpe, G. (Ed.), Kolkmeier, J., Camurri, A. (Ed.) , Kolkmeier, J. , & Nijholt, A. (Ed.) (2015). Single Value Devices. International Journal of Arts and Technology, 8(3), 249-277. https://doi.org/10.1504/IJART.2015.071209



Mashayekhi, H., Habibi, J., Khalafbeigi, T., Voulgaris, S. , & van Steen, M. R. (2015). GDCluster: A General Decentralized Clustering Algorithm. IEEE transactions on knowledge and data engineering, 27(7), 1892-1905. https://doi.org/10.1109/TKDE.2015.2391123

Meder, T. , Nguyen, D-P., & Gravel, R. (2015). The Apocalypse on Twitter. Digital scholarship in the humanities, 31(2), 1-13. https://doi.org/10.1093/llc/fqu073

Minuto, A., Pittarello, F. , & Nijholt, A. (2015). Smart Material Interfaces for Education. Journal of visual languages and computing, 31(Part B), 267-274. https://doi.org/10.1016/j.jvlc.2015.10.006




Nardi, J. C., de Almeida Falbo, R. , Andrade Almeida, J. , Guizzardi, G. , Ferreira Pires, L. , van Sinderen, M. J., Guarino, N., & Fonseca, C. M. (2015). A commitment-based reference ontology for services. Information systems, 54, 263-288. https://doi.org/10.1016/j.is.2015.01.012




Petit, J., Schaub, F. , Feiri, M. , & Kargl, F. (2015). Pseudonym schemes in vehicular networks: a survey. IEEE communications surveys & tutorials, 17(1), 228-255. https://doi.org/10.1109/COMST.2014.2345420

Pieters, W., Padget, J., Dechesne, F., Dignum, V., & Aldewereld, H. (2015). Effectiveness of qualitative and quantitative security obligations. Journal of information security and applications, 22, 3-16. https://doi.org/10.1016/j.jisa.2014.07.003


Razo-Zapata, I. S. , Gordijn, J., de Leenheer, P. , & Wieringa, R. J. (2015). e3service: a critical reflection and future research. Business & information systems engineering, 57(1), 51-59. https://doi.org/10.1007/s12599-014-0360-2

Reidsma, D. (Ed.), Volpe, G., Volpe, G. (Ed.), Camurri, A. (Ed.), Camurri, A. , & Nijholt, A. (Ed.) (2015). Editorial: Expressive Interactive Systems That Tell a Story. International Journal of Arts and Technology, 8(3), 185-187. http://www.inderscience.com/browse/getEditorial.php?articleID=4393

Reidsma, D. (Ed.) , van Dijk, E. M. A. G. , van der Sluis, F., Volpe, G. (Ed.), Camurri, A. (Ed.), Perloy, L. M. , & Nijholt, A. (Ed.) (2015). A user experience model for tangible interfaces for children. International Journal of Arts and Technology, 8(3), 212-230. https://doi.org/10.1504/IJART.2015.071207



Romão, T. , Nijholt, A. (Ed.), & Cheok, A. D. (2015). Editorial: Special Issue on Advances in Computer Entertainment. International Journal of Arts and Technology, 8(4), 279-281. http://www.inderscience.com/browse/getEditorial.php?articleID=4522

Rossi, L., Badel, A., Bajko, M., Ballarino, A., Bottura, L. , Dhalle, M. M. J., Durante, M., Fazilleau, P., Fleiter, J., Goldacker, W., Haro, E., Kario, A., Kirby, G., Lorin, C. , van Nugteren, J., de Rijk, G. , Salmi, T., Senatore, C., Stenvall, A., ... Zangenberg, N. (2015). The EuCARD-2 Future Magnets European Collaboration for Accelerator-Quality HTS Magnets. IEEE transactions on applied superconductivity, 25(3), 4001007-. [4001007]. https://doi.org/10.1109/TASC.2014.2364215

Rudovic, O., Pavlovic, V. , & Pantic, M. (2015). Context-sensitive Dynamic Ordinal Regression for Intensity Estimation of Facial Action Units. IEEE transactions on pattern analysis and machine intelligence, 37(5), 944-958. https://doi.org/10.1109/TPAMI.2014.2356192






Soleymani, M., Soleymani, M. (Ed.), Pun, T. (Ed.), Pun, T. , & Nijholt, A. (Ed.) (2015). Best of Affective Computing and Intelligent Interaction 2013 in Multimodal Interactions. Journal on multimodal user interfaces, 9(1), 1-2. https://doi.org/10.1007/s12193-014-0163-2

Sperotto, A., Doyen, G., Latré, S., Charalambides, M., Famaey, J., Velan, P., & Celeda, P. (2015). Report on the 8th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2014). Journal of network and systems management, 23(3), 794-802. https://doi.org/10.1007/s10922-015-9346-8

Sperotto, A. , Hofstede, R. J., Dainotti, A., Schmitt, C., & Dreo Rodosek, G. (2015). Editorial special issue on measure, detect and mitigate – challenges and trends in network security. International journal of network management, 25(5), 261-262. https://doi.org/10.1002/nem.1905




Tak, S., Toet, A. , & van Erp, J. B. F. (2015). Public understanding of visual representations of uncertainty in temperature forecasts. Journal of cognitive engineering and decision making, 9(3), 241-262. https://doi.org/10.1177/1555343415591275

Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015). Detection of denial-of-service attacks based on computer vision techniques. IEEE transactions on computers, 64(9), 2519-2533. https://doi.org/10.1109/TC.2014.2375218






Xiong, C. , Zhang, X., Mahendra, A., He, J., Choi, D-Y., Chae, C. J. , Marpaung, D. , Leinse, A. , Heideman, R. , Hoekman, M. , Roeloffzen, C. G. H. , Oldenbeuving, R. M., van Dijk, P. W. L. , Taddei, C., Leong, P. H. W., & Eggleton, B. J. (2015). Compact and reconfigurable silicon nitride time-bin entanglement circuit. Optica, 2(8), 724-727. https://doi.org/10.1364/OPTICA.2.000724


Zhang, Y. , Broersma, H. J., & Chen, Y. (2015). A note on Ramsey numbers for fans. Bulletin of the Australian Mathematical Society, 92(1), 19-23. https://doi.org/10.1017/S0004972715000398













van Maanen, P-P., Busschers, F. S., Brouwer, A-M., van der Meulendijk, M. J. , & van Erp, J. B. F. (2015). Quality Control of Geological Voxel Models using Experts' Gaze. Computers & geosciences, 76(March 2015), 50-58. https://doi.org/10.1016/j.cageo.2014.11.011





Chapter


Ali, G., Bilotta, E., Gabriele, L., Pantano, P., Sepulveda, J., Servidio, R. , & Vasenev, A. (2015). eLearning in industrial mathematics with applications to nanoelectronics. In Coupled multiscale simulation and optimization in nanoelectronics (pp. 503-559). (The European Consortium for Mathematics in Industry; Vol. 21, No. 21). Springer. https://doi.org/10.1007/978-3-662-46672-8_9

Ali, T., Tome, P., Fierrez, J., Vera-Rodriguez, R. , Spreeuwers, L. J. , & Veldhuis, R. N. J. (2015). A Study of Identification Performance of Facial Regions from CCTV Images. In U. Garain, & F. Shafait (Eds.), Computational Forensics (pp. 83-91). (Lecture Notes in Computer Science; Vol. 8915). Springer. https://doi.org/10.1007/978-3-319-20125-2_8

Bruijnes, M. , Linssen, J. M. , op den Akker, H. J. A. , Theune, M., Wapperom, S., Broekema, C. , & Heylen, D. K. J. (2015). Social Behaviour in Police Interviews: Relating Data to Theories. In F. D'Errico, I. Poggi, A. Vinciarelli, & L. Vincze (Eds.), Conflict and Multimodal Communication (pp. 317-347). (Computational Social Sciences). Springer. https://doi.org/10.1007/978-3-319-14081-0_16

Effing, R. , van Hillegersberg, J. , & Huibers, T. (2015). Social Media Indicator and Local Elections in the Netherlands: Towards a Framework for Evaluating the Influence of Twitter, YouTube, and Facebook. In M. Zahid Sobaci (Ed.), Social Media and Local Governments: Theory and Practice (pp. 281-298). (Public Administration and Information Technology; Vol. 15). Springer. https://doi.org/10.1007/978-3-319-17722-9_15

Gürkök, H. , Nijholt, A. , & Poel, M. (2015). Brain-Computer Interface Games: Towards a Framework. In R. Nakatsu, M. Rauterberg, & P. Ciancarini (Eds.), Handbook of Digital Games and Entertainment Technologies (pp. 1-18). Springer. https://doi.org/10.1007/978-981-4560-52-8_5-1

Heijenk, G. , Klein Wolterink, W. , van den Berg, H. L. , & Karagiannis, G. (2015). Modeling and evaluation of location-based forwarding in vehicular networks. In W. Chen (Ed.), Vehicular communications and networks - Architectures, protocols, operation and deployment (pp. 151-169). Woodhead Publishing. https://doi.org/10.1016/B978-1-78242-211-2.00008-8

Kant, G. , Laarman, A. , Meijer, J. , van de Pol, J. C. , Blom, S. , & van Dijk, T. (2015). LTSmin: High-Performance Language-Independent Model Checking. In C. Baier, & C. Tinelli (Eds.), Tools and Algorithms for the Construction and Analysis of Systems (pp. 692-707). (Lecture Notes in Computer Science; Vol. 9035, No. 9035). Springer. https://doi.org/10.1007/978-3-662-46681-0_61

Larburu Rubio, N. , van Schooten, B. W., Shalom, E. , Fung, L. S. N. , van Sinderen, M. J. , Hermens, H. J. , & Jones, V. M. (2015). A quality-of-data aware mobile decision support system for patients with chronic illnesses. In D. Riano, R. Lenz, S. Miksch, M. Peleg, M. U. Reichert, & A. ten Teije (Eds.), Knowledge representation for health care (pp. 126-139). (Lecture Notes in Artificial Intelligence; Vol. 9485, No. 1). Springer. https://doi.org/10.1007/978-3-319-26585-8_9

Mühl, C. , Heylen, D. K. J. , & Nijholt, A. (2015). Affective brain-computer interfaces: neuroscientific approaches to affect detection. In R. Calvo, S. K. D'Mello, J. Gratch, & A. Kappas (Eds.), Oxford Handbook of Affective Computing (pp. 217-232). Oxford University Press. https://doi.org/10.1093/oxfordhb/9780199942237.013.024

Nijholt, A. (2015). Competing and collaborating brains: multi-brain computer interfacing. In A. E. Hassanieu, & A. T. Azar (Eds.), Brain-Computer Interfaces: Current trends and Applications (pp. 313-335). (Intelligent Systems Reference Library Series; Vol. 74, No. 74). Springer. https://doi.org/10.1007/978-3-319-10978-7_12

Nijholt, A. (2015). Foreword. In A. E. Hassanieu, & A. T. Azar (Eds.), Brain-Computer Interfaces: Current trends and Applications (pp. v-vi). (Intelligent Systems Reference Library Series; Vol. 74, No. 74). Springer. http://link.springer.com/content/pdf/bfm:978-3-319-10978-7/1.pdf

Nijholt, A. (2015). More playful user interfaces: an introduction. In A. Nijholt (Ed.), More Playful User Interfaces: Interfaces that Invite Social and Physical Interaction (pp. 1-13). (Gaming media and social effects). Springer. https://doi.org/10.1007/978-981-287-546-4_1

Nijholt, A. (2015). Preface. In A. Nijholt (Ed.), More Playful User Interfaces: Interfaces that Invite Social and Physical Interaction (pp. v-vi). (Gaming media and social effects). Springer. https://link.springer.com/content/pdf/bfm%3A978-981-287-546-4%2F1.pdf

Conference contribution



Akoushideh, A. , Veldhuis, R. N. J. , Spreeuwers, L. J., & Maybodi, B. M-N. (2015). Facial recognition using new LBP representations. In Proceedings of the 36th WIC Symposium on Information Theory in the Benelux (pp. 34-41). Université Libre de Bruxelles. http://w-i-c.org/proceedings/proceedings_SITB2015.pdf

Aksit, M. , & Malakuti Khah Olun Abadi, S. (2015). Hermeneutics framework: integration of design rationale and optimizing software modules. In Proceedings of the 14th International Conference on Software Engineering, Parallel and Distributed Systems (SEPADS 2015) (pp. 58-62). (Recent Advances in Computer Engineering Series; Vol. 27). WSEAS Press. http://www.wseas.us/e-library/conferences/2015/Dubai/SEPADS/SEPADS-06.pdf

Aksit, M. , Tekinerdogan, B. , Sözer, H., Safi, H. F., & Ayas, M. (2015). The DESARC method: An effective approach for university-industry cooperation. In Proceedings of the International Conference on Advances in Computing, Control and Networking, ACCN 2015 (pp. 51-53). Institute of Research Engineers and Doctors. https://doi.org/10.15224/978-1-63248-038-5-10

Albuquerque de Medeiros, R. W. , Ferreira Pires, L., & Rosa, N. S. (2015). Predicting service composition costs with complex cost behavior. In 12th IEEE International Conference on Service Computing, SCC 2015 (pp. 419-426). IEEE Computer Society. https://doi.org/10.1109/SCC.2015.64


Ameller, D., Franch, X., Gómez, C., Araújo, J., Berntsson Svensson, R., Biffle, S., Cabot, J., Cortelessa, V. , Daneva, M., Méndez Fernández, D., Moreira, A., Muccini, H., Vallecillo, A., Wimmer, M., Amaral, V., Brunelière, H., Burgueño, L., Goulão, M., Schätz, B., & Teufl, S. (2015). Handling non-functional requirements in model-driven development: an ongoing industrial survey. In 23rd International Conference on Requirements Engineering (RE) (pp. 208-213). IEEE Computer Society. https://doi.org/10.1109/RE.2015.7320424

Amighi, A. , Darabi, S. , Blom, S. , & Huisman, M. (2015). Specification and verification of atomic operations in GPGPU programs. In R. Calinescu, & B. Rumpe (Eds.), Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM 2015) (pp. 69-83). (Lecture Notes in Computer Science; Vol. 9276). Springer. https://doi.org/10.1007/978-3-319-22969-0_5

Anish, P. R. , Daneva, M., Cleland-Huang, J. , Wieringa, R. J., & Ghaisas, S. (2015). What you ask is what you get: Understanding architecturally significant functional requirements. In D. Zowghi, V. Gervasi, & D. Amyot (Eds.), 23rd IEEE Internatioanl Conference on Requirements Engineering (RE) (pp. 86-95). IEEE Computer Society. https://doi.org/10.1109/RE.2015.7320411

Arnold, F. , Guck, D. , Kumar, R. , & Stoelinga, M. (2015). Sequential and Parallel Attack Tree Modelling. In F. Koornneef, & C. van Gulijk (Eds.), Computer Safety, Reliability, and Security: SAFECOMP 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands, September 22, 2015, Proceedings (pp. 291-299). (Lecture Notes in Computer Science; Vol. 9338). Springer. https://doi.org/10.1007/978-3-319-24249-1_25

Athanasiou, G., Amditis, A., Riviere, N. , Makri, E., Makri, E., Bartzas, A., Anyfantis, A., Werner, R., Alexsson, D., di Girolamo, E., Etienne, N., Schaap, M. , Kerle, N., Bozabalian, N., Marafioti, G., Berzosa, J., & Gustafsson, A. (2015). INACHUS : Integrated wide area situation awarenesss and survivor localization in search and rescue operations. In Book of abstracts of the 5th International Conference on Earth Observation for Global Changes (EOGC) and the 7th Geo-information Technologies for Natural Disaster Management (GiT4NDM) (pp. 1-1). United Nations Office for Outer Space Affairs.

Azevedo, C. L. B. , A. Almeida, J. P. , van Sinderen, M. J. , & Ferreira Pires, L. (2015). Towards capturing strategic planning in EA. In 19th IEEE International Enterprise Object Computing Conference, EDOC 2015 (pp. 159-168). IEEE. https://doi.org/10.1109/EDOC.2015.31

Azevedo, C. L. B. , van Sinderen, M. J. , Ferreira Pires, L. , & Andrade Almeida, J. (2015). Aligning enterprise architecture with strategic planning. In CAiSE International Workshops 2015 (pp. 426-437). (Lecture Notes in Business Information Processing; Vol. 215). Springer. https://doi.org/10.1007/978-3-319-19243-7_39

Bakondi, B. G. , Peter, A. , Everts, M. H. , Hartel, P. H. , & Jonker, W. (2015). Publicly Verifiable Private Aggregation of Time-Series Data. In 10th International Conference on Availability, Reliability and Security, ARES 2015 (pp. 50-59). IEEE. https://doi.org/10.1109/ARES.2015.82

Baltussen, L. B., Karavellas, T. , & Ordelman, R. J. F. (2015). Exploiting program guides for contextualisation. In J. C. Torres, G. Guidi, J. Barcelo, L. Duranti, H. Graf, P. Brunet, S. Hazan, R. Scopigno, & F. Remondino (Eds.), 2015 Digital Heritage International Congress, Digital Heritage 2015 (pp. 161-164). [7419477] IEEE. https://doi.org/10.1109/DigitalHeritage.2015.7419477


Belov, A. , Vasenev, A. , Havinga, P. J. M. , Meratnia, N. , & van der Zwaag, B. J. (2015). Reducing user discomfort in direct load control of domestic water heaters. In Proceedings of the IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA 2015) (pp. 1-6). (IEEE Transactions on Smart Grid). IEEE Computer Society. https://doi.org/10.1109/ISGT-Asia.2015.7387131

Blom, S. , Darabi, S. , & Huisman, M. (2015). Verification of loop parallelisations. In A. Egyed, & I. Schaefer (Eds.), Proceedings of the 18th International Conference on Fundamental Approaches to Software Engineering (FASE 2015) (pp. 202-217). (Lecture Notes in Computer Science; Vol. 9033). Springer. https://doi.org/10.1007/978-3-662-46675-9_14

Blom, S. , Huisman, M. , & Zaharieva, M. (2015). History-Based Verification of Functional Behaviour of Concurrent Programs. In R. Calinescu, & B. Rumpe (Eds.), Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM 2015) (pp. 84-98). (Lecture Notes in Computer Science; Vol. 9276). Springer. https://doi.org/10.1007/978-3-319-22969-0_6

Bloom, N. , Theune, M. , & de Jong, F. M. G. (2015). Document categorization using multilingual associative networks based on Wikipedia. In WWW 2015 Companion. Proceedings of the 24th International Conference on World Wide Web (pp. 841-846). Association for Computing Machinery (ACM). https://doi.org/10.1145/2740908.2743003

Bortolameotti, R. , Peter, A. , Everts, M. H. , & Bolzoni, D. (2015). Indicators of Malicious SSL Connections. In 9th International Conference on Network and System Security, NSS 2015 (pp. 162-175). (Lecture Notes in Computer Science; Vol. 9408). Springer. https://doi.org/10.1007/978-3-319-25645-0_11


Bosman, J. , van den Berg, H. L., & van der Mei, R. (2015). Real-Time QoS Control for Service Orchestration. In Proceedings of the 27th International Teletraffic Congress (ITC 2015) (pp. 152-158). IEEE Computer Society. https://doi.org/10.1109/ITC.2015.25

Brand, A. , & Iacob, M. E. (2015). Interoperability architecture for electric mobility. In M. J. van Sinderen, & V. Chapurlat (Eds.), Enterprise Interoperability - Proceedings of the 6th International IFIP Working Conference, IWEI 2015 (pp. 126-140). (Lecture Notes in Business Information Processing; Vol. 213). Springer. https://doi.org/10.1007/978-3-662-47157-9_12

Brouwer, A-M., Dijksterhuis, C. , & van Erp, J. B. F. (2015). Physiological correlates of mental effort as manipulated through lane width during simulated driving. In Proceedings of the International Conference on Affective Computing and Intelligent Interaction (ACII 2015) (pp. 42-48). IEEE Computer Society. https://doi.org/10.1109/ACII.2015.7344549

Bruijnes, M. , op den Akker, H. J. A., Hartholt, A. , & Heylen, D. K. J. (2015). Virtual suspect William. In W-P. Brinkman, D. Heylen, & J. Broekens (Eds.), Proceedings of the 15th International Conference on Intelligent Virtual Agents, IVA 2015 (pp. 67-76). (Lecture Notes in Computer Science; Vol. 9238). Springer. https://doi.org/10.1007/978-3-319-21996-7_7

Bruintjes, T. , Kokkeler, A. B. J. , Karagiannis, G. , & Smit, G. J. M. (2015). Shaped pattern synthesis for equispaced linear arrays with non-isotropic antennas. In Proceedings of the 9th European Conference on Antennas and Propagation (EuCAP 2015) (pp. 26-30). IEEE Antennas & Propagation Society. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7228314

Bullee, J-W. , Montoya, L. , Pieters, W. , Junger, M. , & Hartel, P. H. (2015). Regression Nodes: Extending attack trees with data from social sciences. In Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015) (pp. 17-23). IEEE Computer Society. https://doi.org/10.1109/STAST.2015.11

Cameron, D., Fernando, S., Collins, E., Millings, A., Moore, R., Sharkey, A. , Evers, V., & Prescott, T. (2015). Presence of Life-Like Robot Expressions Influences Children’s Enjoyment of Human-Robot Interactions in the Field. In Proceedings of Fourth International Symposium on "New Frontiers in Human-Robot Interaction" (pp. 3). The Society for the Study of Artificial Intelligence and Simulation of Behaviour (AISB). https://www.cs.kent.ac.uk/events/2015/AISB2015/proceedings/hri/3-Cameron-presenceoflife.pdf

Cantoro, R., Sonza Reorda, M. , Rohani, A. , & Kerkhoff, H. G. (2015). On the maximization of the sustained switching activity in a processor. In IEEE 21st International On-Line Testing Symposium, IOLST 2015 (pp. 34-35). IEEE Computer Society. https://doi.org/10.1109/IOLTS.2015.7229826

Cardoso de Santanna, J. J., Durban, R. , Sperotto, A. , & Pras, A. (2015). Inside Booters: an analysis on operational databases. In R. Badonnel, J. Xiao, S. Ata, F. De Turck, V. Groza, & C. R. P. dos Santos (Eds.), IFIP/IEEE International Symposium on Integrated Network Management (IM 2015) (pp. 432-440). IEEE Computer Society. https://doi.org/10.1109/INM.2015.7140320

Cardoso de Santanna, J. J. , van Rijswijk, R. M. , Hofstede, R. J. , Sperotto, A., Wierbosch, M., Zambenedetti Granville, L. , & Pras, A. (2015). Booters - an analysis of DDoS-as-a-Service attacks. In R. Badonnel, J. Xiao, S. Ata, F. De Turck, V. Groza, & C. R. P. dos Santos (Eds.), Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, IM 2015 (pp. 243 -251). IEEE Computer Society. https://doi.org/10.1109/INM.2015.7140298

Caselli, M. , Zambon, E. , & Kargl, F. (2015). Sequence-aware intrusion detection in industrial control systems. In J. Zhou, & D. Jones (Eds.), Proceedings of the 1st ACM Workshop on Cyber-Physical System Security (pp. 13-24). (CPSS Workshop - AsiaCCS'15). Association for Computing Machinery (ACM). https://doi.org/10.1145/2732198.2732200

Caselli, M. , Zambon, E. , Petit, J. , & Kargl, F. (2015). Modeling message sequences for intrusion detection in industrial control systems. In M. Rice, & S. Shenoi (Eds.), Critical Infrastructure Protection IX: 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers (pp. 49-71). (Critical Infrastructure Protection IX; Vol. 466). Springer. https://doi.org/10.1007/978-3-319-26567-4

Chandra, K., Cao, Z. , Bruintjes, T., Prasad, R. V. , Karagiannis, G., Tangdiongga, E., van den Boom, H. P. A. , & Kokkeler, A. B. J. (2015). mCRAN: A radio access network architecture for 5G indoor ccommunications. In IEEE International Conference on Communications 2015 (pp. 306-311). IEEE Communications Society. http://eprints.eemcs.utwente.nl/secure2/26157/01/1570092085.pdf

Charisi, V. , Davison, D. P. , Wijnen, F. M. , van der Meij, J. , Reidsma, D., Prescott, T. , van Joolingen, W. , & Evers, V. (2015). Towards a child-robot symbiotic co-development: a theoretical approach. In M. Salem, A. Weiss, P. Baxter, & K. Dautenhahn (Eds.), Proceedings of the Fourth International Symposium on "New Frontiers in Human-Robot Interaction" (pp. 331-336). The Society for the Study of Artificial Intelligence and Simulation of Behaviour (AISB). https://www.cs.kent.ac.uk/events/2015/AISB2015/proceedings/hri/16-Charisi-towardsachild.pdf

Chaudhary, K. , Fehnker, A. , van de Pol, J. C. , & Stoelinga, M. I. A. (2015). Modeling and Verification of the Bitcoin Protocol. In R. J. van Glabbeek, J. F. Groote, & P. Höfner (Eds.), Proceedings of the Workshop on Models for Formal Analysis of Real Systems (MARS 2015) (pp. 46-60). (Electronic Proceedings in Theoretical Computer Science; Vol. 196). Open Publishing Association. https://doi.org/10.4204/EPTCS.196.5

Chen, T., Kammüller, F., Nemli, I., & Probst, C. W. (2015). A Probabilistic Analysis Framework for Malicious Insider Threats. In T. Tryfonas, & I. Askoxylakis (Eds.), Human Aspects of Information Security, Privacy, and Trust: Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings (pp. 178-189). (Lecture notes in computer science; Vol. 9190). Springer. https://doi.org/10.1007/978-3-319-20376-8_16

Chilipirea, C., Petre, A-C., Dobre, C. , & van Steen, M. (2015). Filters for Wi-Fi Generated Crowd Movement Data. In Proceedings of the 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2015) (pp. 285-290). IEEE Computer Society. https://doi.org/10.1109/3PGCIC.2015.36

Chilipirea, C., Petre, A-C., Dobre, C. , & van Steen, M. (2015). Proximity Graphs for Crowd Movement Sensors. In Proceedings of the 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2015) (pp. 310-314). IEEE Computer Society. https://doi.org/10.1109/3PGCIC.2015.147

Chromik, J. J. , Cardoso de Santanna, J. J. , Sperotto, A. , & Pras, A. (2015). Booter websites characterization: Towards a list of threats. In Proceedings of 33rd Brazilian Symposium on Computer Networks and Distributed Systems, SBRC 2015 (pp. 445-458). Brazilian Computer Society (SBC). http://sbrc2015.ufes.br/wp-content/uploads/138741.1.pdf

Daneva, M. (2015). Focus group: cost-effective and methodologically sound ways to get practitioners involved in your empirical RE research. In REFSQ-JP 2015: REFSQ Workshops, Research Method Track, and Poster Track (pp. 211-216). (CEUR Workshop Proceedings; Vol. 1342). CEUR. http://ceur-ws.org/Vol-1342/

Daneva, M. (2015). Play-testing and requirements engineering: implications for research and teaching. In E. Bjarnason, M. Borg, & M. Morandino (Eds.), 2nd IEEE/ACM International Workshop on Requirements Engineering and Testing, RET@ICSE 2015 (pp. 9-12). Association for Computing Machinery (ACM). https://doi.org/10.1109/RET.2015.10

Das, K. , Mathews, E. , Zand, P. , Sanchez Ramirez, A. , & Havinga, P. J. M. (2015). Efficient I/O Joining and Reliable Data Publication in Energy Harvested ISA100.11a Network. In Proceedings of the 2015 IEEE International Conference on Industrial Technology (ICIT 2015), Seville, Spain (pp. 2184-2191). IEEE Industrial Electronics Society. https://doi.org/10.1109/ICIT.2015.7125419

David, N., David, A., Hansen, R. R. , Larsen, K. G., Legay, A., Olesen, M. C., & Probst, C. W. (2015). Modelling Social-Technical Attacks with Timed Automata. In Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats (MIST) (pp. 21-28). Association for Computing Machinery (ACM). https://doi.org/10.1145/2808783.2808787


Delamare, J., Bitachon, B., Peng, Z., Wang, Y. , Haverkort, B. R. H. M. , & Jongerden, M. R. (2015). Development of a Smart Grid Simulation Environment. In Proceedings of the 29th and 30th Annual UK Performance Engineering Workshops (UKPEW 2014) (pp. 19-29). (Electronic Notes in Theoretical Computer Science; Vol. 318). Elsevier. https://doi.org/10.1016/j.entcs.2015.10.017

Demeester, T. , Trieschnigg, R. B., Zhou, K. , Nguyen, D-P. , & Hiemstra, D. (2015). FedWeb Greatest Hits: Presenting the New Test Collection for Federated Web Search. In Proceedings of the 24th International Conference on World Wide Web, WWW 2015 Companion (pp. 27-28). Association for Computing Machinery (ACM). https://doi.org/10.1145/2740908.2742755


Dwi Prasetyo, N. , Hauff, C. , Nguyen, D-P., van den Broek, T. , & Hiemstra, D. (2015). On the Impact of Twitter-based Health Campaigns: A Cross-Country Analysis of Movember. In Proceedings of the Sixth International Workshop on Health Text Mining and Information Analysis (Louhi) (pp. 55-63). Association for Computational Linguistics (ACL). https://aclweb.org/anthology/W/W15/W15-2607.pdf

Eleftheriadis, S., Rudovic, O. , & Pantic, M. (2015). Multi-Conditional Latent Variable Model for Joint Facial Action Unit Detection. In Proceedings of the IEEE International Conference on Computer Vision (ICCV 2015) (pp. 3792-3800). IEEE. https://doi.org/10.1109/ICCV.2015.432

Ellens, W., Kovács, P., Núñez-Queija, R. , & van den Berg, H. L. (2015). Routing policies for a partially observable two-server queueing system. In Proceedings of the 9th EAI International Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS 2015) (pp. 111-118). Association for Computing Machinery (ACM). https://doi.org/10.4108/eai.14-12-2015.2262697

Erasmus, I. P. , & Daneva, M. (2015). ERP services effort estimation strategies based on early requirements. In A. Kalenborg, & M. Trapp (Eds.), 2nd International Workshop on Requirements Engineering for the Precontract Phase (RE4P2) at REFSQ 2015 (pp. 83-99). (CEUR Workshop Proceedings; Vol. 1342). CEUR. http://ceur-ws.org/Vol-1342/

Erasmus, P. , & Daneva, M. (2015). An experience report on ERP effort estimation driven by quality requirements. In S. Schockert (Ed.), 6th Workshop on Requirements Prioritization and Communication (RePriCo) at REFSQ 2015 (pp. 126-139). (CEUR Workshop Proceedings; Vol. 1342). CEUR. http://ceur-ws.org/Vol-1342/

Eskevich, M. , Aly, R. , Ordelman, R. J. F., Racca, D. N., Chen, S., & Jones, G. J. F. (2015). SAVA at MediaEval 2015: Search and Anchoring in Video Archives. In Working Notes Proceedings of the MediaEval 2015 Workshop (pp. 11). CEUR. http://ceur-ws.org/Vol-1436/Paper11.pdf

Ferreira, M. I. G. B. , Moreira, J., Campos, M. L. M., Braga, B. F. B., Sales, T. P., de Cordeiro, K. F., & Borges, M. R. S. (2015). OntoEmergePlan: variability of emergency plans supported by a domain ontology. In 12th International Conference on Information Systems for Crisis Response and Management (ISCRAM) (pp. 1-9). University of Agder. http://eprints.eemcs.utwente.nl/secure2/26498/01/2-13.pdf

Förster, D. , Kargl, F., & Löhr, H. (2015). Short: A framework for evaluating pseudonym strategies in vehicular ad-hoc networks. In WiSec '15: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (pp. 1–6). [a19] Association for Computing Machinery (ACM). https://doi.org/10.1145/2766498.2766520

Förster, D., Löhr, H., Zibuschka, J. , & Kargl, F. (2015). REWIRE – Revocation without resolution: A privacy-friendly revocation mechanism for vehicular ad-hoc networks. In M. Conti, M. Schunter, & I. Askoxylakis (Eds.), Trust and Trustworthy Computing: 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings (pp. 193-208). (Lecture Notes in Computer Science; Vol. 9229). Springer. https://doi.org/10.1007/978-3-319-22846-4_12


Gerhold, M. , & Stoelinga, M. I. A. (2015). Ioco Theory for Probabilistic Automata. In Proceedings of the 10th Workshop on Model Based Testing, MBT 2015 (pp. 23-40). (Electronic proceedings in theoretical computer science; Vol. 180). Open Publishing Association. https://doi.org/10.4204/EPTCS.180.2

Ghasemieh, H. , Haverkort, B. R. H. M. , Jongerden, M. R. , & Remke, A. K. I. (2015). Energy Resilience Modeling for Smart Houses. In Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015 (pp. 275-286). IEEE Computer Society. https://doi.org/10.1109/DSN.2015.31

Gravier, G., Jones, G. J. F., Larson, M. , & Ordelman, R. J. F. (2015). Overview of the 2015 Workshop on Speech, Language and Audio in Multimedia. In Proceedings of the 23rd ACM International Conference on Multimedia (MM 2015) (pp. 1347-1348). Association for Computing Machinery (ACM). https://doi.org/10.1145/2733373.2806414

Guck, D., Spel, J. , & Stoelinga, M. I. A. (2015). DFTCalc: Reliability centered maintenance via fault tree analysis (tool paper). In M. Butler, S. Conchon, & F. Zaïdi (Eds.), Proceedings of the 17th International Conference on Formal Engineering Methods (ICFEM 2015) (pp. 304-311). (Lecture Notes in Computer Science; Vol. 9407). Springer. https://doi.org/10.1007/978-3-319-25423-4_19

Hendriks, L. , Sperotto, A. , & Pras, A. (2015). Characterizing the IPv6 Security Landscape by Large-Scale Measurements. In Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015 (pp. 145-149). (Lecture Notes in Computer Science; Vol. 9122). Springer. https://doi.org/10.1007/978-3-319-20034-7_16

Herley, C. , & Pieters, W. (2015). “If you were attacked, you’d be sorry‿: Counterfactuals as security arguments. In New Security Paradigm Workshop (NSPW) (pp. 112-123). Association for Computing Machinery (ACM). https://doi.org/10.1145/2841113.2841122


Hofstede, R. J. , & Hendriks, L. (2015). Unveiling SSHCure 3.0: Flow-based SSH Compromise Detection. In Proceedings of the International Conference on Networked Systems, NetSys 2015 (pp. -). Brandenburg University of Technology Cottbus-Senftenberg. https://www.netsys2015.com/wp-content/uploads/NetSys2015_Demo_Hofstede.pdf


Huisman, M. , & Mostowski, W. (2015). A Symbolic Approach to Permission Accounting for Concurrent Reasoning. In Proceedings of the 14th International Symposium on Parallel and Distributed Computing, ISPDC 2015 (pp. 165-174). IEEE Computer Society. https://doi.org/10.1109/ISPDC.2015.26

Huiting, J. , Kokkeler, A. B. J. , & Smit, G. J. M. (2015). Near field phased array DOA and range estimation of UHF RFID tags. In International EURASIP Workshop on RFID Technology, EURFID 2015 (pp. 103-107). IEEE Computer Society. https://doi.org/10.1109/EURFID.2015.7332393

Ibrahim, A. M. Y. , & Kerkhoff, H. G. (2015). A system level approach for a dependable heterogeneous MPSoC. In Supplemental Proceeding of The 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (pp. 141082). Sociedade Brasileira de Computacao. http://eprints.eemcs.utwente.nl/secure2/26114/01/A_System-Level_Solution_for_Dependable_Heterogeneous_MPSoCs.pdf

Inayat, I., Moraes, L. , Daneva, M., & Salim, S. S. (2015). A reflection on agile requirements engineering: solutions brought and challenges posed. In M. Paasivaara (Ed.), 1st International Workshop on Requirements Engineering in Agile Development (READ) (pp. 61-67). Association for Computing Machinery (ACM). https://doi.org/10.1145/2764979.2764985

Ionita, D. , Wieringa, R. J. , Bullee, J-W. , & Vasenev, A. (2015). Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus Group. In P. Johannesson, M. Li Lee, S. W. Liddle, A. L. Opdahl, & Ó. P. López (Eds.), 34th International Conference on Conceptual Modeling, ER 2015 (pp. 558-565). (Lecture Notes in Computer Science; Vol. 9381). Springer. https://doi.org/10.1007/978-3-319-25264-3_42

Ionita, D. , Wieringa, R. J., Wolos, L. , Gordijn, J. , & Pieters, W. (2015). Using Value Models for Business Risk Analysis in e-Service Networks. In J. Ralyté, S. España, & O. Pastor (Eds.), 8th IFIP WG 8.1. Working Conference on the Practice of Enterprise Modelling, PoEM 2015 (pp. 239-253). (Lecture Notes in Business Information Processing; Vol. 235). Springer. https://doi.org/10.1007/978-3-319-25897-3_16

Ivanova, M. G., Probst, C. W., Hansen, R. R., & Kammüller, F. (2015). Transforming Graphical System Models To Graphical Attack Models. In S. Mauw, B. Kordy, & S. Jajodia (Eds.), Graphical Models for Security: Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers (pp. 82-96). (Lecture notes in computer science; Vol. 9390). Springer. https://doi.org/10.1007/978-3-319-29968-6_6

Jonker, M. , & Sperotto, A. (2015). Mitigating DDoS Attacks using OpenFlow-based Software Defined Networking. In S. Latré, M. Charalambides, J. François, C. Schmitt, & B. Stiller (Eds.), Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015 (pp. 129-133). (Lecture Notes in Computer Science; Vol. 9122). Springer. https://doi.org/10.1007/978-3-319-20034-7_13

Jonker, M. , Hofstede, R. J. , Sperotto, A. , & Pras, A. (2015). Unveiling Flat Traffic on the Internet: An SSH Attack Case Study. In Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015) (pp. 270-278). IEEE Communications Society. https://doi.org/10.1109/INM.2015.7140301

Joosse, M. P., Knuppe, R., Pingen, G., Varkevisser, R., Vukoja, J. , Lohse, M. , & Evers, V. (2015). Robots Guiding Small Groups: The Effect of Appearance Change on the User Experience. In M. Salem, A. Weiss, P. Baxter, & K. Dautenhahn (Eds.), Proceedings of the 4th International Symposium on New Frontiers in Human-Robot Interaction (pp. 6). University of Kent. http://www.cs.kent.ac.uk/events/2015/AISB2015/proceedings/hri/6-Joosse-robotsguidingsmall.pdf

Jung, M. M., Cang, X. L. , Poel, M., & MacLean, K. E. (2015). Touch Challenge ‘15: Recognizing Social Touch Gestures. In Proceedings of the 2015 ACM on International Conference on Multimodal Interaction, ICMI 2015 (pp. 387 -390). Association for Computing Machinery (ACM). https://doi.org/10.1145/2818346.2829993

Junges, S. , Guck, D. , Katoen, J. P. , Rensink, A. , & Stoelinga, M. I. A. (2015). Fault Trees on a Diet: Automated Reduction by Graph Rewriting. In X. Li, Z. Liu, & W. Yi (Eds.), Dependable Software Engineering: Theories, Tools, and Applications: First International Symposium, SETTA 2015, Nanjing, China, November 4-6, 2015, Proceedings (pp. 3-18). (Lecture Notes in Computer Science; Vol. 9409), (Lecture Notes in Programming and Software Engineering). Springer. https://doi.org/10.1007/978-3-319-25942-0_1

Kaltwang, S., Todorovic, S. , & Pantic, M. (2015). Latent Trees for Estimating Intensity of Facial Action Units. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2015) (pp. 296-304). IEEE Computer Society. https://doi.org/10.1109/CVPR.2015.7298626

Kandziora, J. , Huisman, M. , Bockisch, C. , & Zaharieva, M. (2015). Run-time Assertion Checking of JML Annotations in Multithreaded Applications with e-OpenJML. In R. Monahan (Ed.), Proceedings of the 17th Workshop on Formal Techniques for Java-like Programs (FTfJP 2015) (pp. 8). [8] Association for Computing Machinery (ACM). https://doi.org/10.1145/2786536.2786541

Karimzadeh Motallebi Azar, M., Zhao, Z. , Hendriks, L. , de Oliveira Schmidt, R., la Fleur, S. , van den Berg, H. L. , Pras, A., Braun, T., & Julian Corici, M. (2015). Mobility and Bandwidth Prediction as a Service in Virtualized LTE Systems. In Proceedings of the 4th International Conference on Cloud Networking, CloudNet 2015 (pp. 132-138). IEEE. https://doi.org/10.1109/CloudNet.2015.7335295


Karreman, D. , Ludden, G. , & Evers, V. (2015). Visiting cultural heritage with a tour guide robot: a user evaluation study in-the-wild. In A. Tapus, E. André, J-C. Martin, F. Ferland, & M. Ammi (Eds.), Social Robotics: 7th International Conference, ICSR 2015, Paris, France, October 26-30, 2015, Proceedings (pp. 317-326). (Lecture Notes in Computer Science; Vol. 9388). Springer. https://doi.org/10.1007/978-3-319-25554-5_32

Karuppiah Ramachandran, V. R. , van der Zwaag, B. J. , Meratnia, N. , & Havinga, P. J. M. (2015). Implantable Body Sensor Network MAC Protocols Using Wake-up Radio – Evaluation in Animal Tissue. In Proceedings of the 9th International Symposium on Medical Information and Communication Technology, ISMICT 2015 (pp. 88-92). IEEE Engineering in Medicine and Biology Society. https://doi.org/10.1109/ISMICT.2015.7107504

Katoen, J. P. (2015). Probabilistic Programming: A True Verification Challenge. In B. Finkbeiner, G. Pu, & L. Zhang (Eds.), Automated Technology for Verification and Analysis: 13th International Symposium, ATVA 2015, Shanghai, China, October 12-15, 2015, Proceedings (pp. 1-3). (Lecture Notes in Computer Science; Vol. 9364). Springer. https://doi.org/10.1007/978-3-319-24953-7_1

Kegel, R. H. P. (2015). The Personal Information Security Assistant. In 2015 IEEE 23rd International Requirements Engineering Conference (RE) (pp. 393-397). (IEEE International Requirements Engineering Conference (RE); Vol. 2015). IEEE. https://doi.org/10.1109/RE.2015.7320457

Kegel, R. H. P. , & Wieringa, R. J. (2015). Behavior Change Support Systems for Privacy and Security. In O. A. Kulyk, S. Kelders, L. van Gemert-Pijnen, & H. Oinas-Kukkonen (Eds.), Proceedings of the Third International Workshop on Behavior Change Support Systems (pp. 51-55). (CEUR Workshop Proceedings; Vol. Vol-1369). CEUR. http://ceur-ws.org/Vol-1369/Paper_5.pdf

Kempker, P. , van Dijk, N. M. , Scheinhardt, W. R. W. , van den Berg, H. L. , & Hurink, J. L. (2015). Optimization of charging strategies for electric vehicles in PowerMatcher-driven smart energy grids. In W. Knottenbelt, K. Wolter, A. Busic, M. Gribaudo, & P. Reinecke (Eds.), Proceedings 9th EAI International Conference on Performance Evaluation Methodologies and Tools, Valuetools 2015 (pp. 1-8). Association for Computing Machinery (ACM). https://doi.org/10.4108/eai.4-1-2016.151091

Kerkhoff, H. G. (2015). Application of functional IDDQ testing in a VLIW processor towards detection of aging degradation. In Y. Zhao (Ed.), 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS 2015) (pp. 1-5). IEEE Computer Society. https://doi.org/10.1109/DTIS.2015.7127359

Kerkhoff, H. G. (2015). Predicting aging caused delay degradation with alternative IDDT testing in a VLIW processor. In Y. Zhao (Ed.), Proceedings of the final Workshop on Manufacturable and Dependable Multicore Architectures at Nanoscale, MEDIAN 2015 (pp. 27-32). European Cooperation in Science and Technology. http://eprints.eemcs.utwente.nl/secure2/26456/01/Alternative_test_Delay_IDD_final.pdf

Kerkhoff, H. G. , & Ebrahimi, H. (2015). Detection of intermittent resistive faults in electronic systems based on the mixed-signal boundary-scan standard. In 2015 6th Asia Symposium on Quality Electronic Design (ASQED 2015): Kuala Lumpur, Malaysia, 4-5 August 2015 (pp. 77-82). IEEE Circuits & Systems Society. https://doi.org/10.1109/ACQED.2015.7274011

Kerkhoff, H. G. , & Ebrahimi, H. (2015). Intermittent resistive faults in digital cmos circuits. In IEEE International Symposium on Design and Diagnostics of Electronic Circuits and Systems, DDECS 2015 (pp. 211-216). IEEE Circuits & Systems Society. https://doi.org/10.1109/DDECS.2015.12

Kim, J. , Truong, K. P. , Charisi, V. , Zaga, C. , Lohse, M. , Heylen, D. , & Evers, V. (2015). Vocal turn-taking patterns in groups of children performing collaborative tasks: an exploratory study. In INTERSPEECH 2015: 16th Annual Conference of the International Speech Communication Association (pp. 1645-1649). (INTERSPEECH : Annual Conference of the International Speech Communication Association; Vol. 2015). International Speech Communication Association (ISCA). http://www.isca-speech.org/archive/interspeech_2015/i15_1645.html

Kleber, S., van der Heijden, R. W., Kopp, H. , & Kargl, F. (2015). Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions. In 2015 International Conference and Workshops on Networked Systems (NetSys) (pp. 1-8). IEEE Computer Society. https://doi.org/10.1109/NetSys.2015.7089068

Kokkeler, A. B. J. , & Smit, G. J. M. (2015). Digitally assisted analog beamforming for millimeter-wave communication. In IEEE International conference on communications 2015 (pp. 1039-1044). IEEE Communications Society. http://eprints.eemcs.utwente.nl/secure2/26156/01/1570088867.pdf

Kolkmeier, J. (2015). Record, Transform & Reproduce Social Encounters in Immersive VR: An Iterative Approach. In Proceedings of the 2015 ACM on International Conference on Multimodal Interaction (ICMI 2015) (pp. 641-644). Association for Computing Machinery (ACM). https://doi.org/10.1145/2818346.2823314

Kossaifi, J., Tzimiropoulos, G. , & Pantic, M. (2015). Fast and exact Bi-directional Fitting of Active Appearance Models. In Proceedings of IEEE International Conference on Image Processing (ICIP 2015) (pp. 1135-1139). IEEE Computer Society. https://doi.org/10.1109/ICIP.2015.7350977

Kotzerke, J., Kotzerke, J., Davis, S. A., Hayes, R. , Spreeuwers, L. J. , Veldhuis, R. N. J., & Horadam, K. J. (2015). Discriminating fingermarks with evidential value for forensic comparison. In Proceedings of the 3rd International Workshop on Biometrics and Forensics, IWBF 2015 (pp. 1-6). IEEE. https://doi.org/10.1109/IWBF.2015.7110220

Kotzerke, J. , Kotzerke, J., Davis, S., Hayes, R. , Spreeuwers, L. J. , Veldhuis, R. N. J., & Horadam, K. J. (2015). Identification Performance of Evidential Value Estimation for Fingermarks. In Proceedings of the 2015 International Conference of the Biometrics Special Interest Group (BIOSIG) (pp. 1-6). (Lecture Notes in Informatics (LNI) - Proceedings; Vol. P-245). Gesellschaft für Informatik. https://doi.org/10.1109/BIOSIG.2015.7314607

Kuiper, G. , Geuns, S. J. , & Bekooij, M. J. G. (2015). Utilization improvement by enforcing mutual exclusive task execution in modal stream processing applications. In Proceedings of the 18th International Workshop on Software and Compilers for Embedded Systems (SCOPES 2015) (pp. -). Association for Computing Machinery (ACM). https://doi.org/10.1145/2764967.2764970

Kumar, R. , Guck, D. , & Stoelinga, M. I. A. (2015). Time dependent analysis with dynamic counter measure trees. In Proceedings of the 13th Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL 2015) (pp. 1-5). INRIA. http://arxiv.org/pdf/1510.00050.pdf

Kumar, R. , Ruijters, E. J. J. , & Stoelinga, M. I. A. (2015). Quantitative Attack Tree Analysis via Priced Timed Automata. In S. Sankaranarayanan, & E. Vicario (Eds.), Proceedings of the 13th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS 2015) (pp. 156-171). (Lecture Notes in Computer Science; Vol. 9268). Springer. https://doi.org/10.1007/978-3-319-22975-1_11


Kwantes, P. M., van Gorp, P., Kleijn, J. , & Rensink, A. (2015). Towards Compliance Verification Between Global and Local Process Models. In F. Parisi-Presicce, & B. Westfechtel (Eds.), Proceedings of the 8th International Conference on Graph Transformation, ICGT 2015 (pp. 221-236). (Lecture Notes in Computer Science; Vol. 9151). Springer. https://doi.org/10.1007/978-3-319-21145-9_14

Larburu Rubio, N. , Bults, R. G. A. , van Sinderen, M. J. , & Hermens, H. J. (2015). Quality-of-Data Management for Telemedicine Systems. In 5th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2015) (pp. 451-458). (Procedia Computer Science (2015); Vol. 63). Elsevier. https://doi.org/10.1016/j.procs.2015.08.367


Ligthart, M. , & Truong, K. P. (2015). Selecting the right robot: Influence of user attitude, robot sociability and embodiment on user preferences. In Proceedings of the 24th IEEE International Symposium on Robot and Human Interactive Communication (RO-MAN 2015) (pp. 682-687). IEEE. https://doi.org/10.1109/ROMAN.2015.7333598

Linssen, J. M. , Theune, M., & de Groot, T. (2015). Improving social awareness through thought bubbles and flashbacks of virtual characters. In W-P. Brinkman, J. Broekens, & D. K. J. Heylen (Eds.), Proceedings of the 15th International Conference on Intelligent Virtual Agents, IVA 2015 (pp. 250-259). (Lecture Notes in Computer Science; Vol. 9238). Springer. https://doi.org/10.1007/978-3-319-21996-7_25

Linssen, J. M., de Groot, T. , & Theune, M. (2015). LOITER-TB: Thought Bubbles that Give Feedback on Virtual Agents' Experiences. In W-P. Brinkman, J. Broekens, & D. K. J. Heylen (Eds.), Proceedings of the 15th International Conference on Intelligent Virtual Agents, IVA 2015 (pp. 283-286). (Lecture Notes in Computer Science; Vol. 9238). Springer. https://doi.org/10.1007/978-3-319-21996-7_30

Malakuti Khah Olun Abadi, S. , & Aksit, M. (2015). On liberating programs from the von neumann architecture via event-based modularization. In Companion Proceedings of the 14th International Conference on Modularity, MODULARITY Companion 2015 (pp. 31-34). Association for Computing Machinery (ACM). https://doi.org/10.1145/2735386.2735387

Meijerink, B. J. , & Heijenk, G. (2015). Lossless Multicast Handovers in Proxy Fast Mobile IPv6 Networks. In Proceedings of the 13th International Conference on Wired/Wireless Internet Communications, WWIC 2015, Revised Selected Papers (pp. 341-354). (Lecture Notes in Computer Science; Vol. 9071). Springer. https://doi.org/10.1007/978-3-319-22572-2_25

Mian, U. S. , den Hartog, J. , Etalle, S., & Zannone, N. (2015). Auditing with incomplete logs. In Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust 2015 (pp. 1-23). Technische Universiteit Eindhoven.

Miller, J. F. , & Broersma, H. J. (2015). Computational matter: evolving computational solutions in materials. In S. Silva (Ed.), Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, GECCO Companion 2015 (pp. 769-770). Association for Computing Machinery (ACM). https://doi.org/10.1145/2739482.2764939

Minuto, A., Pittarello, F. , & Nijholt, A. (2015). A Smart Material Interfaces Learning Experience. In Proceedings of the 21st International Conference on Distributed Multimedia Systems (DMS 2015) (pp. 131-140). Knowledge Systems Institute. https://doi.org/10.18293/DMS2015-013

Mocanu, D. C., Turkmen, F., & Liotta, A. (2015). Towards ABAC Policy Mining from Logs with Deep Learning. In V. A. Fomichov, & O. S. Fomichova (Eds.), Proceedings of the 18th International Multiconference - Intelligent Systems, IS 2015 Jožef Stefan Institute. https://research.tue.nl/files/9876041/ABACPolicyMining_author_version.pdf

Moreira, J., Cordeiro, K., Campos, M. L. M., & Borges, M. (2015). Hybrid multidimensional design for heterogeneous data supported by ontological analysis: an application case in the Brazilian electric system operation. In 4th Workshop on Energy Data Management (EnDM) in the 18th International Conference on Extending Database Technology (EDBT) (pp. 72-77). (CEUR workshop proceedings; Vol. 1330). CEUR. http://eprints.eemcs.utwente.nl/secure2/26497/01/paper-13.pdf

Moreira, J., Moreira, J. , Ferreira Pires, L. , van Sinderen, M. J. , & Dockhorn Costa, P. (2015). Developing situation-aware applications for disaster management with a distributed rule-based platform. In Proceedings of the RuleML 2015 Challenge, Special Track on Rule-based Recommender Systems for the Web of Data, Special Industry Track, and RuleML 2015 Doctoral Consortium (pp. -). (CEUR Workshop Proceedings; Vol. 1417). CEUR. http://ceur-ws.org/Vol-1417/paper15.pdf

Moreno Celleri, A. M. , van Delden, R. W. , Poppe, R. W. , Reidsma, D. , & Heylen, D. K. J. (2015). Augmenting traditional playground games to enhance game experience. In Proceedings of the 7th International Conference on Intelligent Technologies for Interactive Entertainment (INTETAIN 2015) (pp. -). IEEE Computer Society. https://doi.org/10.4108/icst.intetain.2015.259399

Morshed, S. , & Heijenk, G. (2015). Optimization and Verification of the TR-MAC Protocol for Wireless Sensor Networks. In Proceedings of the 13th International Conference on Wired/Wireless Internet Communications, WWIC 2015, Revised Selected Papers (pp. 396-410). (Lecture Notes in Computer Science; Vol. 9071). Springer. https://doi.org/10.1007/978-3-319-22572-2_29

Mostowski, W., & Ulbrich, M. (2015). Dynamic Dispatch for Method Contracts through Abstract Predicates. In Proceedings of the 14th International Conference on Modularity (MODULARITY 2015) (pp. 109-116). (MODULARITY 2015). Association for Computing Machinery (ACM). https://doi.org/10.1145/2724525.2724574

Moura, P., Kon, F., Voulgaris, S. , & van Steen, M. R. (2015). Using Performance Forecasting to Accelerate Elasticity. In Proceedings of the Second International Workshop on Adaptive Resource Management and Scheduling for Cloud Computing (ARMS-CC 2015), Revised Selected Papers (pp. 17-31). (Lecture Notes in Computer Science; Vol. 9438). Springer. https://doi.org/10.1007/978-3-319-28448-4_2

Najafabadi, M. S. , Skidmore, A. K. , Darvishzadeh, R., Kolzsch, A., Exo, K. M., Nolet, B. A., Griffin, L., Stahl, J. , Havinga, P. J. M. , Meratnia, N. , & Toxopeus, A. G. (2015). Identifying environmental parameters for goose spring migration from last staging site to breeding ground. In AniMove workshop & symposium 2015 : Animal movement and remote sensing, 21-25 September 2015, Konstanz, Germany (pp. 1-1) http://www.itc.nl/library/papers_2015/pres/shariati_ide_abs.pdf

Najafabadi, M. S. , Skidmore, A. K. , Darvishzadeh, R. , Vrieling, A., Nolet, B. A., Exo, K. M. , Meratnia, N. , Havinga, P. J. M., Stahl, J. , & Toxopeus, A. G. (2015). Green wave indices for predicting spring migration timing of geese. In The 36th International Symposium on Remote Sensing of Environment (ISRSE), 11-15 May, 2015, Berlin, Germany (pp. s1-s20) http://www.itc.nl/library/papers_2015/pres/shariati_gre_ppt.pdf

Nguyen, D-P. , Trieschnigg, R. B., & Cornips, L. (2015). Audience and the Use of Minority Languages on Twitter. In Proceedings of the Ninth International AAAI Conference on Web and Social Media, ICWSM 2015 (pp. 666-669). AAAI Press. http://www.aaai.org/ocs/index.php/ICWSM/ICWSM15/paper/view/10512

Nguyen, D-P. , van den Broek, T. A. , Hauff, C. , Hiemstra, D. , & Ehrenhard, M. L. (2015). #SupportTheCause: Identifying Motivations to Participate in Online Health Campaigns. In Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, EMNLP 2015 (pp. 2570-2576). Association for Computational Linguistics (ACL). http://www.aclweb.org/anthology/D15-1308

Nijholt, A. (2015). Designing Humor for Playable Cities. In T. Ahram, W. Karwowski, & D. Schmorrow (Eds.), Proceedings of the 6th International Conference on Applied Human Factors and Ergonomics (AHFE 2015) and the Affiliated Conferences, AHFE 2015 (pp. 2175-2182). (Procedia Manufacturing; Vol. 3). Elsevier. https://doi.org/10.1016/j.promfg.2015.07.358

Nijholt, A. (2015). Humor techniques: from real world and game environments to smart environments. In N. Streitz, & P. Markopoulos (Eds.), 3rd International Conference on Distributed, Ambient and Pervasive Interactions, DAPI 2015 (pp. 659-670). (Lecture Notes in Computer Science; Vol. 9189). Springer. https://doi.org/10.1007/978-3-319-20804-6_60

Nijholt, A. (2015). Incongruity Humor in Language and Beyond: From Bergson to Digitally Enhanced Worlds. In Proceedings Fourteenth International Symposium on Social Communication (pp. 594-599). Centro de Lingüística Aplicada.

Nijholt, A. (2015). Mischief humor: From Games to Playable Cities. In ACE '15: Proceedings of the 12th International Conference on Advances in Computer Entertainment Technology (pp. 67). Association for Computing Machinery (ACM). https://doi.org/10.1145/2832932.2975583

Nijholt, A. (2015). Multimodal and Multi-Brain Computer Interfaces: A Review. In Proceedings of the 10th International Conference on Information, Communications and Signal Processing (ICICS 2015) (pp. 1-5). IEEE Computer Society. https://doi.org/10.1109/ICICS.2015.7459835

Nijholt, A. (2015). The Humor Continuum: From Text to Smart Environments (Keynote Paper). In Proceedings of the International Conference on Informatics, Electronics & Vision (ICIEV 2015) (pp. 1-10). IEEE Computer Society. https://doi.org/10.1109/ICIEV.2015.7334034

Norilo, V. , Verstraelen, M. J. W., & Valimaki, V. (2015). Implementing a low-latency parallel graphic equalizer with heterogeneous computing. In P. Svensson, & U. Kristiansen (Eds.), Proceedings of the 18th International Conference on Digital Audio Effects, DAFx 2015 (pp. 351-357). Norwegian University of Science and Technology, Department of Music and Department of Electronics and Telecommunications.

Oortwijn, W. H. M. , van Dijk, T. , & van de Pol, J. C. (2015). A Distributed Hash Table for Shared Memory. In R. Wyrzykowski, E. Deelman, J. Dongarra, K. Karczewski, J. Kitowski, & K. Wiatr (Eds.), Parallel Processing and Applied Mathematics: 11th International Conference, PPAM 2015, Krakow, Poland, September 6-9, 2015. Revised Selected Papers, Part II (pp. 15-24). (Lecture Notes in Computer Science; Vol. 9574). Springer. https://doi.org/10.1007/978-3-319-32152-3_2

Ordelman, R. J. F. , Aly, R., Eskevich, M., Huet, B., & Jones, G. J. F. (2015). Convenient Discovery of Archived Video Using Audiovisual Hyperlinking. In Proceedings of the Third Edition Workshop on Speech, Language & Audio in Multimedia (SLAM 2015) (pp. 23-26). Association for Computing Machinery (ACM). https://doi.org/10.1145/2802558.2814652

Ordelman, R. J. F., Eskevich, M. , Aly, R., Huet, B., & Jones, G. J. F. (2015). Defining and Evaluating Video Hyperlinking for Navigating Multimedia Archives. In Proceedings of the 24th International Conference on World Wide Web, WWW 2015 Companion (pp. 727-732). International World Wide Web Conferences Steering Committee. https://doi.org/10.1145/2740908.2742915

Ossenbühl, S. , Steinberger, J., & Baier, H. (2015). Towards automated incident handling: how to select an appropriate response against a network-based attack? In Proceedings of the 9th International Conference on IT Security Incident Management & IT Forensics (IMF 2015) (pp. 51-67). IEEE Computer Society. https://doi.org/10.1109/IMF.2015.13

Pacini, L. A., do Prado, A. F. , Lopes de Souza, W. , & Ferreira Pires, L. (2015). An approach to business process recovery from source code. In S. Latifi (Ed.), 12th International Conference on Information Technology: New Generations, ITNG 2015 (pp. 361-366). IEEE Computer Society. https://doi.org/10.1109/ITNG.2015.64

Peng, Y. , Spreeuwers, L. J. , & Veldhuis, R. N. J. (2015). Likelihood Ratio Based Mixed Resolution Facial Comparison. In Proceedings of the 3rd International Workshop on Biometrics and Forensics, IWBF 2015 (pp. 1-5). IEEE Computer Society. https://doi.org/10.1109/IWBF.2015.7110231

Petridis, S., Rajgarhia, V. , & Pantic, M. (2015). Comparison of Single-model and Multiple-model Prediction-based Audiovisual Fusion. In Proceedings of the 1st Joint Conference on Facial Analysis, Animation, and Auditory-Visual Speech Processing, FAAVSP 2015 (pp. 109-114). ISCA Speech Organisation. http://www.isca-speech.org/archive/avsp15/papers/av15_109.pdf

Pfab, I. , & Willemse, C. J. A. M. (2015). Design of a wearable research tool for warm mediated social touches. In Proceedings of the International Conference on Affective Computing and Intelligent Interaction (ACII 2015) (pp. 976-981). IEEE Computer Society. https://doi.org/10.1109/ACII.2015.7344694

Pieters, W., & Davarynejad, M. (2015). Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers. In J. Garcia-Alfaro, J. Herrera-Joancomartí, E. Lupu, & J. Posegga (Eds.), Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers (pp. 201-215). (Lecture Notes in Computer Science; Vol. 8872). Springer. https://doi.org/10.1007/978-3-319-17016-9_13

Postema, B. F. , & Haverkort, B. R. H. M. (2015). An AnyLogic simulation model for power and performance analysis of data centres. In M. Beltrán, W. Knottenbelt, & J. Bradley (Eds.), Proceedings of the 12th European Workshop on Computer Performance Engineering, EPEW 2015 (pp. 258-272). (Lecture Notes in Computer Science; Vol. 9272). Springer. https://doi.org/10.1007/978-3-319-23267-6_17

Rakicevic, N., Rudovic, O., & Petridis, S. (2015). Neural Conditional Ordinal Random Fields for Agreement Level Estimation. In N. Rakicevic, O. Rudovic, S. Petrids, & M. Pantic (Eds.), Proceedings of the International Conference on Affective Computing and Intelligent Interaction (ACII 2015) (pp. 885-890). IEEE Communications Society. https://doi.org/10.1109/ACII.2015.7344679

Rensink, A. , & Zambon, E. (2015). Graphs as Models - Preface. In A. Rensink, & E. Zambon (Eds.), Proceedings Graphs as Models (pp. -). (Electronic Proceedings in Theoretical Computer Science; Vol. 181). Open Publishing Association. https://doi.org/10.4204/EPTCS.181

Sagonas, C., Panagakis, Y., Zafeiriou, S. , & Pantic, M. (2015). Robust Statistical Face Frontalization. In Proceedings of The IEEE International Conference on Computer Vision (ICCV 2015) (pp. 3871-3879). IEEE. https://doi.org/10.1109/ICCV.2015.441

Seraj, F. , Zhang, K. , Türkes, O. , Meratnia, N. , & Havinga, P. J. M. (2015). A smartphone based method to enhance road pavement anomaly detection by analyzing the driver behavior. In UbiComp & ISWC'15: proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the proceedings of the 2015 ACM International Symposium on Wearable Computers (pp. 1169-1177). Association for Computing Machinery (ACM). https://doi.org/10.1145/2800835.2800981

Shalom, E., Shahar, Y., Goldstein, A., Ariel, E., Sheinberger, M. , Fung, L. S. N. , Jones, V. M. , & van Schooten, B. W. (2015). Implementation of a distributed guideline-based decision support model within a patient-guidance framework. In D. Riaño, R. Lenz, S. Miksch, M. Peleg, M. U. Reichert, & A. ten Teije (Eds.), Knowledge Representation for Health Care: AIME 2015 International Joint Workshop, KR4HC/ProHealth 2015 (pp. 111-125). (Lecture Notes in Computer Science; Vol. 9485). Springer. https://doi.org/10.1007/978-3-319-26585-8_8

Shoaib, M. , Bosch, S. , Durmaz, O. , Scholten, J. , & Havinga, P. J. M. (2015). Defining a Roadmap Towards Comparative Research in Online Activity Recognition on Mobile Phones. In Proceedings of the 5th International Conference on Pervasive and Embedded Computing and Communication Systems, PECCS 2015 (pp. 154-159). SCITEPRESS - Science and Technology Publications.

Shoaib, M. , Bosch, S. , Scholten, J. , Havinga, P. J. M. , & Durmaz, O. (2015). Towards detection of bad habits by fusing smartphone and smartwatch sensors. In Proceedings of the IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2015 (pp. 591 -596). IEEE Computer Society. https://doi.org/10.1109/PERCOMW.2015.7134104

Singh, P. M. , & van Sinderen, M. J. (2015). Interoperability challenges for context aware logistics services - the case of synchromodal logistics. In M. Zelm (Ed.), Proceedings of the Workshops of the 6th International IFIP Working Conference on Enterprise Interoperability, IWEI-WS 2015 (pp. 9). (CEUR Workshop Proceedings; Vol. 1414). CEUR. http://ceur-ws.org/Vol-1414/paper4.pdf

Singh, P. M. , & van Sinderen, M. J. (2015). Lightweight metrics for enterprise architecture analysis. In W. Abramowicz (Ed.), Business Information Workshops - Revised Papers of BIS 2015 International Workshops (pp. 113-125). (Lecture Notes in Business Information Processing; Vol. 228). Springer. https://doi.org/10.1007/978-3-319-26762-3_11

Steinberger, J. , Sperotto, A., Baier, H. , & Pras, A. (2015). Collaborative Attack Mitigation and Response: A survey. In Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management (IM 2015) (pp. 910-913). IEEE Computer Society. https://doi.org/10.1109/INM.2015.7140407

Steinberger, J. , Sperotto, A., Baier, H. , & Pras, A. (2015). Exchanging security events of flow-based intrusion detection systems at internet scale. In Proceedings of the Internet Architecture Board and Internet Society Coordinating Attack Response at Internet Scale Workshop (CARIS 2015) (pp. 3). Internet Architecture Board Website. https://www.iab.org/wp-content/IAB-uploads/2015/04/CARIS_2015_submission_3.pdf

Steinberger, J. , Sperotto, A., Golling, M., & Baier, H. (2015). How to exchange security events? Overview and evaluation of formats and protocols. In IFIP/IEEE International Symposium on Integrated Network Management (IM 2015) (pp. 261-269). IEEE Computer Society. https://doi.org/10.1109/INM.2015.7140300

Susyanyo, N., Klaassen, C. A. J. , Veldhuis, R. N. J. , & Spreeuwers, L. J. (2015). Semiparametric score level fusion: Gaussian copula approach. In Proceedings of the 36th WIC Symposium on Information Theory in the Benelux (pp. 26-33). Université Libre de Bruxelles. http://w-i-c.org/proceedings/proceedings_SITB2015.pdf

Taghikhaki, Z. , Meratnia, N. , & Havinga, P. J. M. (2015). Protecting Informative Messages over Burst Error Channels in Chain-based Wireless Sensor Networks. In Proceedings of the 4th International Conference on Sensor Networks (SENSORNETS-2015) (pp. 130-141). SCITEPRESS. https://doi.org/10.5220/0005294601300141

Toersche, H. , Hurink, J. L., & Konsman, M. J. (2015). Energy management with TRIANA on FPAI. In PowerTech, 2015 IEEE Eindhoven (pp. 1-6). IEEE Power & Energy Society. https://doi.org/10.1109/PTC.2015.7232650

Triebel, R., Arras, K., Alami, R., Beyer, L., Breuers, S., Chatila, R., Chetouani, M., Cremers, D. , Evers, V., Fiore, M., Hung, H., Islas Ramírez, O. A. , Joosse, M. P., Khambhaita, H., Kucner, T., Leibe, B., Lilienthal, A. J., Linder, T. , Lohse, M. , ... Zhang, L. (2015). SPENCER: A Socially Aware Service Robot for Passenger Guidance and Help in Busy Airports. In Proceedings of the 10th Conference on Field and Service Robotics, FSR 2015 (pp. 607-622). (Springer Tracts in Advanced Robotics; Vol. 113). Springer. https://doi.org/10.1007/978-3-319-27702-8_40

Trouvain, J. , & Truong, K. P. (2015). Prosodic characteristics of read speech before and after treadmill running. In Proceedings of Interspeech (pp. 3700-3704). (Proceedings of Interspeech). International Speech Communication Association (ISCA). http://www.isca-speech.org/archive/interspeech_2015/papers/i15_3700.pdf

Truong, K. P., Nieuwenhuys, A., Beek, P. , & Evers, V. (2015). A database for analysis of speech under physical stress: detection of exercise intensity while running and talking. In Proceedings of Interspeech (pp. 3705-3709). (Proceedings of Interspeech). International Speech Communication Association (ISCA). http://www.isca-speech.org/archive/interspeech_2015/papers/i15_3705.pdf

Türkes, O. , Scholten, J. , & Havinga, P. J. M. (2015). BLESSED with Opportunistic Beacons: A Lightweight Data Dissemination Model for Smart Mobile Ad-Hoc Networks. In Proceedings of the Tenth ACM MobiCom Workshop on Challenged Networks, CHANTS 2015 (pp. 25-30). Association for Computing Machinery (ACM). https://doi.org/10.1145/2799371.2799382

Türkes, O. , Seraj, F. , Scholten, J. , Meratnia, N. , & Havinga, P. J. M. (2015). An Ad-Hoc Opportunistic Dissemination Protocol for Smartphone-based Participatory Traffic Monitoring. In Proceedings of the 82nd IEEE International Vehicular Technology Conference (VTC Fall 2015) (pp. 1-5). IEEE Vehicular Technology Society. https://doi.org/10.1109/VTCFall.2015.7390836

Veldhuis, R. N. J. (2015). The relation between the secrecy rate of biometric template protection and biometric recognition performance. In 2015 International Conference on Biometrics (ICB 2015): Phuket, Thailand, 19-22 May 2015 (pp. 311-318). IEEE. https://doi.org/10.1109/ICB.2015.7139055

Verstraelen, M. J. W., Pfeifle, F., & Bader, R. (2015). Feasibility analysis of real-time physical modeling using WaveCore processor technology on FPGA. In Proceedings of the Third Vienna Talk on Music Acoustics (pp. 273-280). Institute of Musical Acoustics (Wiener Klangstil). http://eprints.eemcs.utwente.nl/secure2/26470/01/ViTa_2015_Paper_21.pdf

Vriezekolk, E. , Etalle, S. , & Wieringa, R. J. (2015). Experimental Validation of a Risk Assessment Method. In 21st International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2015 (pp. 1-16). (Lecture Notes in Computer Science; Vol. 9013). Springer. https://doi.org/10.1007/978-3-319-16101-3_1

Vriezekolk, E. , Etalle, S. , & Wieringa, R. J. (2015). Validating the raster risk assessment method in practice. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), Proceedings of the ISCRAM 2015 Conference (pp. -). International Association for Information Systems for Crisis Response and Management (ISCRAM). http://idl.iscram.org/files/eelcovriezekolk/2015/1316_EelcoVriezekolk_etal2015.pdf

Vroon, J. H. , Joosse, M. P. , Lohse, M. , Kolkmeier, J. , Kim, J. , Truong, K. P. , Englebienne, G. , Heylen, D. K. J. , & Evers, V. (2015). Dynamics of social positioning patterns in group-robot interactions. In Proceedings of the 24th IEEE International Sumposium on Robot and Human Interactive Communication (RoMan 2015) (pp. 394-399). IEEE ROBOTICS AND AUTOMATION SOCIETY. https://doi.org/10.1109/ROMAN.2015.7333633

Vroon, J. H. , Kim, J., & Koster, R. (2015). Robot response behaviors to accommodate hearing problems. In Proceedings of New Friends 2015: the 1st International Conference on Social Robotics in Therapy and Education Windesheim Flevoland University.

Wan, J. , & Kerkhoff, H. G. (2015). Embedded instruments for enhancing dependability of analogue and mixed-signal IPs. In NIEEE 13th International New Circuits and Systems Conference, NEWCAS 2015 (pp. 1-4). IEEE Circuits & Systems Society. https://doi.org/10.1109/NEWCAS.2015.7181979


Wan, J. , & Kerkhoff, H. G. (2015). Reliability of SAR ADCs and associated embedded instrument detection. In 20th International Mixed-Signal Testing Workshop, IMSTW 2015 (pp. 1-5). IEEE Computer Society. https://doi.org/10.1109/IMS3TW.2015.7177870

Wanders, B. , van Keulen, M. , & van der Vet, P. E. (2015). Uncertain Groupings: Probabilistic combination of grouping data. In Proceedings of the 26th International Conference on Database and Expert Systems Applications, DEXA 2015 (pp. 236-250). (Lecture Notes in Computer Science; Vol. 9261). Springer. https://doi.org/10.1007/978-3-319-22849-5_17


Wevers, L., Hofstra, M., Tammens, M. , Huisman, M. , & van Keulen, M. (2015). A Benchmark for Online Non-Blocking Schema Transformations. In M. Helfert, A. Holzinger, O. Belo, & C. Francalanci (Eds.), Proceedings of 4th International Conference on Data Management Technologies and Applications, DATA 2015: July 20-22, 2015, in Colmar, Alsace, France (pp. 288-298). SCITEPRESS. https://doi.org/10.5220/0005500202880298

Wevers, L., Hofstra, M., Tammens, M. , Huisman, M. , & van Keulen, M. (2015). Analysis of the blocking behaviour of schema transformations in relational database systems. In Proceedings of the 19th East European Conference on Advances in Databases and Information Systems, ADBIS 2015 (pp. 169-183). (Lecture Notes in Computer Science; Vol. 9282). Springer. https://doi.org/10.1007/978-3-319-23135-8_12

Wijnen, F. M. , Charisi, V. , Davison, D. P. , van der Meij, J. , Reidsma, D. , & Evers, V. (2015). Inquiry learning with a social robot: can you explain that to me? In M. Heerink, & M. de Jong (Eds.), Proceedings of New Friends 2015: the 1st international conference on social robotics in therapy and education (pp. 24-25). Windesheim Flevoland. http://www.newfriends2015.org/Proceedings/ProceedingsNF2015.pdf

Willemse, C. J. A. M. (2015). A warm Touch of Affect? In Proceedings of the International Conference on Affective Computing and Intelligent Interaction (ACII 2015) (pp. 766-771). IEEE Computer Society. https://doi.org/10.1109/ACII.2015.7344656

Willemse, C. J. A. M. , Heylen, D. K. J. , & van Erp, J. B. F. (2015). Warmth in affective mediated interaction. In Proceedings of the International Conference on Affective Computing and Intelligent Interaction (ACII 2015) (pp. 28-34). IEEE Computer Society. https://doi.org/10.1109/ACII.2015.7344547

Willemse, C. J. A. M., Munters, G. M. , van Erp, J. B. F. , & Heylen, D. K. J. (2015). Nakama: a companion for non-verbal affective communication. In Proceedings of the 2015 ACM on International Conference on Multimodal Interaction (ICMI 2015) (pp. 377-378). Association for Computing Machinery (ACM). https://doi.org/10.1145/2818346.2823299

Wognsen, E. R. , Haverkort, B. R. H. M. , Jongerden, M. R., Hansen, R. R. , & Larsen, K. G. (2015). A Score Function for Optimizing the Cycle-Life of Battery-Powered Embedded Systems. In S. Sankaranarayanan, & E. Vicario (Eds.), Proceedings of the 13th International Conference on Formal Modeling and Analysis of Timed Systems, FORMATS 2015 (pp. 305-320). (Lecture Notes in Computer Science; Vol. 9268). Springer. https://doi.org/10.1007/978-3-319-22975-1_20

Xia, C., Chi, C., Wong, R. , Wombacher, A. , Ferreira Pires, L. , van Sinderen, M. J., & Ding, C. (2015). Workflow-based service selection under multi-constraints. In Twelfth IEEE International Conference on Services Computing, SCC 2015 (pp. 332-339). IEEE. https://doi.org/10.1109/SCC.2015.53

Zaga, C. , Lohse, M. , Truong, K. P. , & Evers, V. (2015). The Effect of a Robot's Social Character on Children Task Engagement: Peer Versus Tutor. In A. Tapus, E. André, J-C. Martin, F. Ferland, & M. Ammi (Eds.), Social Robotics: 7th International Conference, ICSR 2015, Paris, France, October 26-30, 2015, Proceedings (pp. 704- 713). (Lecture Notes in Computer Science; Vol. 9388). Springer. https://doi.org/10.1007/978-3-319-25554-5_70



Zambrano Constantini, A. C. , & Kerkhoff, H. G. (2015). Online digital offset voltage compensation method for AMR sensors. In IEEE International Instrumentation and Measurement Technology Conference, I2MTC 2015 (pp. 1512-1515). IEEE Instrumentation & Measurement Society. https://doi.org/10.1109/I2MTC.2015.7151502



Zhao, Y. , & Kerkhoff, H. G. (2015). Unit-based functional IDDT testing for aging degradation monitoring in a VLIW processor. In 18th Euromicro Conference on Digital Systems Design, DSD 2015 (pp. 353-358). IEEE Computer Society. https://doi.org/10.1109/DSD.2015.113

Zhao, Z. , Karimzadeh Motallebi Azar, M., Braun, T. , Pras, A. , & van den Berg, H. L. (2015). A Demonstration of Mobility Prediction as a Service in Cloudified LTE Networks. In Proceedings of the 4th International Conference on Cloud Networking, CloudNet 2015 (pp. 78-80). IEEE. https://doi.org/10.1109/CloudNet.2015.7335285

de Boer, P-T. , Reijsbergen, D. P. , & Scheinhardt, W. R. W. (2015). Interactive comparison of hypothesis tests for statistical model checking. In 9th EAI International Conference on Performance Evaluation Methodologies and Tools, ValueTools 2015 (pp. -). Association for Computing Machinery (ACM). https://doi.org/10.4108/eai.14-12-2015.2262571

de Boer, V. , Ordelman, R. J. F., & Schuurman, J. (2015). Practice-Oriented Evaluation of Unsupervised Labeling of Audiovisual Content in an Archive Production Environment. In Research and Advanced Technology for Digital Libraries, Proceedings of the 19th International Conference on Theory and Practice of Digital Libraries, TPDL 2015 (pp. 43-55). (Lecture Notes in Computer Science; Vol. 9316). Springer. https://doi.org/10.1007/978-3-319-24592-8_4

de Oliveira Schmidt, R. , van den Berg, H. L. , & Pras, A. (2015). Measurement-Based Network Link Dimensioning. In Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015) (pp. 1071-1077). IEEE. https://doi.org/10.1109/INM.2015.7140435

de Vries, W. B. , Cardoso de Santanna, J. J. , Sperotto, A. , & Pras, A. (2015). How asymmetric is the Internet? A Study to Support the use of Traceroute. In S. Latré, M. Charalambides, J. François, C. Schmitt, & B. Stiller (Eds.), Intelligent Mechanisms for Network Configuration and Security, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015 (pp. 113-125). (Lecture Notes in Computer Science; Vol. 9122). Springer. https://doi.org/10.1007/978-3-319-20034-7_12

de Wide, L. , Spreeuwers, L. J. , & Veldhuis, R. N. J. (2015). Exploring How User Routine Affects the Recognition Performance of a Lock Pattern. In Proceedings of the 2015 International Conference of the Biometrics Special Interest Group (BIOSIG) (pp. 1-8). (Lecture Notes in Informatics (LNI) - Proceedings; Vol. P-245). Gesellschaft für Informatik. https://doi.org/10.1109/BIOSIG.2015.7314603

op den Akker, H. J. A. (2015). What do care robots reveal about technology? In Proceedings of the 1st international conference on social robots in therapy and education, NewFriends 2015 (pp. 82-83). Windesheim Flevoland. http://newfriends2015.org/Proceedings/Contents/Papers/New_Friends_2015_submission_46.pdf

van Dijk, T. , & van de Pol, J. C. (2015). Sylvan: Multi-core Decision Diagrams. In Proceedings of the 21st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2015 (pp. 677-691). (Lecture Notes in Computer Science; Vol. 9035). Springer. https://doi.org/10.1007/978-3-662-46681-0_60

van Dijk, T. , Hahn, E. M. , Jansen, D. N., Li, Y., Neele, T. , Stoelinga, M., Turrini, A., & Zhang, L. (2015). A Comparative Study of BDD Packages for Probabilistic Symbolic Model Checking. In X. Li, Z. Liu, & W. Yi (Eds.), Dependable Software Engineering: Theories, Tools, and Applications: First International Symposium, SETTA 2015, Nanjing, China, November 4-6, 2015, Proceedings (pp. 35-51). (Lecture Notes in Computer Science; Vol. 9409). Springer. https://doi.org/10.1007/978-3-319-25942-0_3

van Erp, J. B. F., Toet, A., Meijer, K., Janssen, J., & Jong, A. (2015). Subjective User Experience and Performance with Active Tangibles on a Tabletop Interfaces. In N. Streitz, & P. Markopoulos (Eds.), Distributed, Ambient, and Pervasive Interactions: Third International Conference, DAPI 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015, Proceedings (pp. 212-223). (Lecture Notes in Computer Science; Vol. 9189). Springer. https://doi.org/10.1007/978-3-319-20804-6_20

van Leeuwen, R. P. , Fink, J. , & Smit, G. J. M. (2015). Central model predictive control of a group of domestic heat pumps, case study for a small district. In M. Helfert, K-H. Krempels, B. Donnellan, & C. Klein (Eds.), 4th International Conference on Smart Cities and Green ICT Systems (SMARTGREENS 2015) (pp. 136-147). INSTICC Institute for Systems and Technologies of Information, Control and Communication. https://doi.org/10.5220/0005434301360147


van Rijswijk, R. M. , Jonker, M. , Sperotto, A. , & Pras, A. (2015). The Internet of Names: A DNS Big Dataset - Actively Measuring 50% of the Entire DNS Name Space, Every Day. In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, SIGCOMM 2015 (pp. 91-92). Association for Computing Machinery (ACM). https://doi.org/10.1145/2785956.2789996

van de Pol, J. C. (2015). Automated Verification of Nested DFS. In M. Núñez, & M. Güdemann (Eds.), Proceedings of the 20th International Workshop on Formal Methods for Industrial Critical Systems (FMICS 2015) (pp. 181-197). (Lecture Notes in Computer Science; Vol. 9128). Springer. https://doi.org/10.1007/978-3-319-19458-5_12

van den Berg, F. , Haverkort, B. R. H. M., & Hooman, J. (2015). Efficiently Computing Latency Distributions by combined Performance Evaluation Techniques. In W. Knottenbelt, K. Wolter, A. Busic, M. Gribaudo, & P. Reinecke (Eds.), Proceedings of the 9th EAI International Conference on Performance Evaluation Methodologies and Tools, VALUETOOLS 2015 (pp. 158-163). Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. https://doi.org/10.4108/eai.14-12-2015.2262725

van den Berg, F., Hooman, J. , Hartmanns, A. , Haverkort, B. R. H. M. , & Remke, A. K. I. (2015). Computing Response Time Distributions Using Iterative Probabilistic Model Checking. In M. Beltran, W. Knottenbelt, & J. Bradley (Eds.), Proceedings of the 12th European Workshop on Computer Performance Engineering (EPEW 2015) (pp. 208-224). (Lecture notes in computer science; Vol. 9272). Springer. https://doi.org/10.1007/978-3-319-23267-6_14

van den Berg, F. , Remke, A. K. I. , & Haverkort, B. R. H. M. (2015). iDSL: Automated Performance Prediction and Analysis of Medical Imaging Systems. In M. Beltran, W. Knottenbelt, & J. Bradley (Eds.), Proceedings of the 12th European Workshop on Computer Performance Engineering, EPEW 2015 (pp. 227-242). (Lecture Notes in Computer Science; Vol. 9272). Springer. https://doi.org/10.1007/978-3-319-23267-6_15

van der Steeg, D. , Hofstede, R. J. , Sperotto, A. , & Pras, A. (2015). Real-time DDoS attack detection for Cisco IOS using NetFlow. In Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015) (pp. 972-977). IEEE Communications Society. https://doi.org/10.1109/INM.2015.7140420

van der Toorn, O. I. , Hofstede, R. J. , Jonker, M. , & Sperotto, A. (2015). A First Look at HTTP(S) Intrusion Detection using NetFlow/IPFIX. In Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015) (pp. 862-865). IEEE Communications Society. https://doi.org/10.1109/INM.2015.7140395

Foreword/postscript


Berntsson Svensson, R. , Daneva, M., Marczak, S., Ernst, N. , & Madhavji, N. (2015). Welcome from the Workshop Chairs. In Fifth International Workshop on Empirical Requirements Engineering, EmpiRE 2015 at RE'15 (pp. 3-5). IEEE Computer Society. http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7430398

Inaugural speech


van Erp, J. B. F. (2015). ICT met gevoel. Universiteit Twente.

Paper




Moreira, J. (2015). From situation modelling to a distributed rule-based platform for situation awareness: an ontological framework for disaster management applications. 1-13. Paper presented at 34th International Conference on Conceptual Modeling, ER 2015, Stockholm, Sweden.

Shiarlis, K., Messias, J., van Someren, M., Whiteson, S. , Kim, J. , Vroon, J. H. , Englebienne, G. , Truong, K. P., Pérez-Higueras, N., Pérez-Hurtado, I., Ramon-Vigo, R., Caballero, F., Merino, L., Shen, J., Petridis, S. , Pantic, M., Hedman, L., Scherlund, M., Koster, R., & Michel, H. (2015). TERESA: a socially intelligent semi-autonomous telepresence system. -. Paper presented at Workshop on Machine Learning for Social Robotics 2015, Seattle, United States. https://staff.fnwi.uva.nl/s.a.whiteson/Shimon_Whiteson/ICRA_files/teresa_icra15ws-crc.pdf

Sieverink, F. , Poel, M. , Kelders, S. M., Braakman, E. J. M., & van Gemert, J. (2015). Log Data Analysis via Machine Learning to Make eHealth More Persuasive. -. Paper presented at 10th International Conference on Persuasive Technology, PERSUASIVE 2015, Chicago, United States.

PhD Thesis - Research UT, graduation UT
























Poster


Boonstra, T. , van Kordelaar, J. , Engelhart, D., van Vugt, J. P. , & van der Kooij, H. (2015). Asymmetries in reactive and anticipatory balance control are of similar magnitude in Parkinson's disease patients. -. Poster session presented at Congres of the International Society of Gait and Poster (ISPGR), Seville, Spain, .

Mocanu, D. C., Ammar, H. B., Lowet, D., Driessens, K., Liotta, A., Weiss, G., & Tuyls, K. (2015). Factored four-way conditional restricted Boltzmann machines (FFW-CRBMs) for activity recognition. Poster session presented at SNN Symposium Intelligent Machines 2015, Nijmegen, Netherlands.

Taballione, C., Agbana, T. , Hoekman, M. , Wevers, L., Kalkman, J., Verhaegen, M. , van der Slot, P. J. M. , & Boller, K. J. (2015). Si3N4-Based Waveguide Circuits for Smart Spectrometer Devices. -. Poster session presented at IOP Photonic Devices Symposium 2015, Amsterdam, Netherlands.

Vlutters, M. , Boonstra, T. , Schouten, A. C. , & van der Kooij, H. (2015). Direct measurment of the intrinsic ankle stiffness during standing. -. Poster session presented at 5th Dutch Bio-Medical Engineering Conference, BME 2015, Egmond aan Zee, Netherlands.

Report



Blom, S. , Huisman, M. , & Zaharieva, M. (2015). History-based Verification of Functional Behaviour of Concurrent Programs. (CTIT Technical Report Series; No. TR-CTIT-15-02). Centre for Telematics and Information Technology (CTIT).

Buijsrogge, A. , de Boer, P-T. , & Scheinhardt, W. R. W. (2015). A note on a state-independent change of measure for the $G|G|1$ tandem queue. (Memorandum of the Department of Applied Mathematics; No. 2051). University of Twente, Department of Applied Mathematics.


Ionita, D. , Wieringa, R. J. , Bullee, J-W. , & Vasenev, A. (2015). Investigating the usability and utility of tangible modelling of socio-technical architectures. (CTIT Technical Report Series; No. TR-CTIT-15-03). Centre for Telematics and Information Technology (CTIT).

Joosse, M. P. , Lohse, M. , & Evers, V. (2015). How a Guide Robot Should Behave at an Airport - Insights Based on Observing Passengers. (CTIT Technical Report Series; No. TR-CTIT-15-01). Centre for Telematics and Information Technology (CTIT).


Müller-Putz, G. R., Brunner, C., Bauernfeind, G., Blefari, M. L., Millan, J. D. R., Real, R. G. L., Kübler, A., Mattia, D., Pichiorri, F., Schettini, F., Ramsey, N., Höhne, J., Blankertz, B., Miralles, F., Otal, B., Guger, C., Ortner, R. , Poel, M. , Nijholt, A., ... Opisso, E. (2015). The future in brain/neural computer interaction: Horizon 2020. EU & Graz University of Techology. https://doi.org/10.3217/978-3-85125-379-5


Ramsgaard Wognsen, E. , Jongerden, M. R. , & Haverkort, B. R. H. M. (2015). A Score Function for State of Charge Profiles for Rechargeable Batteries. (CTIT Technical Report Series; No. 15-06). Centre for Telematics and Information Technology (CTIT).

Yildiz, B. M. , Rensink, A. , Bockisch, C. , & Aksit, M. (2015). A Model-Derivation Framework for Timing Analysis of Java Software Systems. (CTIT Technical Report Series; No. TR-CTIT-15-08). Centre for Telematics and Information Technology (CTIT).

This publication list has been generated from UT Research Information.