Login / Signup
AISC
1998
2004
2012
2018
1998
2018
Keyphrases
Publications
2018
Yu Wang
,
Wenyuan Wu
,
Bican Xia
Early Ending in Homotopy Path-Tracking for Real Roots.
AISC
(2018)
Pengcheng Peng
,
Chenqi Mou
,
Wei-Tek Tsai
Game-Theoretic Analysis on the Number of Participants in the Software Crowdsourcing Contest.
AISC
(2018)
Alan Bundy
,
Kwabena Nuamah
,
Christopher Lucas
Automated Reasoning in the Age of the Internet.
AISC
(2018)
Pedro Quaresma
Automatic Deduction in an AI Geometry Book.
AISC
(2018)
Xiaoyu Chen
,
Haotian Shuai
,
Dongming Wang
,
Jing Yang
LaTEX: A Linear Algebra Textbook System.
AISC
(2018)
Jose Divasón
,
Jesús Aransay
A Formal Proof of the Computation of Hermite Normal Form in a General Setting.
AISC
(2018)
Francisco Botana
,
Zoltán Kovács
,
Tomás Recio
Towards an Automated Geometer.
AISC
(2018)
Tianshu Song
,
Feng Zhu
,
Ke Xu
Specialty-Aware Task Assignment in Spatial Crowdsourcing.
AISC
(2018)
Ilias S. Kotsireas
,
Jing Yang
Autocorrelation via Runs.
AISC
(2018)
Wei Su
,
Chuan Cai
,
Jinzhao Wu
The Accessibility of Mathematical Formulas for the Visually Impaired in China.
AISC
(2018)
Shaofan Liu
,
Jie Luo
FMUS2: An Efficient Algorithm to Compute Minimal Unsatisfiable Subsets.
AISC
(2018)
Dongchen Jiang
,
Xiaoyu Chen
,
Xin Yang
A Chinese New Word Detection Approach Based on Independence Testing.
AISC
(2018)
Martin Strecker
Deciding Extended Modal Logics by Combining State Space Generation and SAT Solving.
AISC
(2018)
Yaqing Jiang
,
Petros Papapanagiotou
,
Jacques D. Fleuriot
Machine Learning for Inductive Theorem Proving.
AISC
(2018)
Sólrún Halla Einarsdóttir
,
Moa Johansson
,
Johannes Åman Pohjola
Into the Infinite - Theory Exploration for Coinduction.
AISC
(2018)
James H. Davenport
Methodologies of Symbolic Computation.
AISC
(2018)
Fadoua Ghourabi
,
Kazuko Takahashi
What Does Qualitative Spatial Knowledge Tell About Origami Geometric Folds?
AISC
(2018)
Zoltán Kovács
Discovering Geometry Theorems in Regular Polygons.
AISC
(2018)
Changbo Chen
,
Wenyuan Wu
Revealing Bistability in Neurological Disorder Models By Solving Parametric Polynomial Systems Geometrically.
AISC
(2018)
David Braun
,
Nicolas Magaud
,
Pascal Schreck
Formalizing Some "Small" Finite Models of Projective Geometry in Coq.
AISC
(2018)
volume 11110, 2018
Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings
AISC
11110 (2018)
2015
Dilshan Jayarathna
,
Udaya Kiran Tupakula
,
Vijay Varadharajan
Hypervisor-based Security Architecture to Protect Web Applications.
AISC
(2015)
Tristan Newby
,
Duncan A. Grove
,
Alex Murray
,
Chris A. Owen
,
Jim McCarthy
,
Chris J. North
Annex: A Middleware for Constructing High-Assurance Software Systems.
AISC
(2015)
David Myers
,
Ernest Foo
,
Kenneth Radke
Internet-wide Scanning Taxonomy and Framework.
AISC
(2015)
Nicholas R. Rodofile
,
Kenneth Radke
,
Ernest Foo
Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy.
AISC
(2015)
Toby J. Richer
,
Grant Neale
,
Grant Osborne
On the E ectiveness of Virtualisation Assisted View Comparison for Rootkit Detection.
AISC
(2015)
Adrian Herrera
,
Ben Cheney
JMD: A Hybrid Approach for Detecting Java Malware.
AISC
(2015)
Binbin Di
,
Leonie Simpson
,
Harry Bartlett
,
Ed Dawson
,
Kenneth Koon-Ho Wong
Correcting flaws in Mitchell's analysis of EPBC.
AISC
(2015)
Deepa Mani
,
Alireza Heravi
,
Kim-Kwang Raymond Choo
,
Sameera Mubarak
Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical Analysis.
AISC
(2015)
John Shield
,
Bradley D. Hopkins
,
Mark R. Beaumont
,
Chris North
Hardware Trojans - A Systemic Threat.
AISC
(2015)
volume 161, 2015
13th Australasian Information Security Conference, AISC 2015, Sydney, Australia, January 2015
AISC
161 (2015)
2014
Frédéric Lardeux
,
Éric Monfroy
From Declarative Set Constraint Models to "Good" SAT Instances.
AISC
(2014)
Sajal Bhatia
,
Nishchal Kush
,
Chris I. Djamaludin
,
Ayodeji J. Akande
,
Ernest Foo
Practical Modbus Flooding Attack and Detection.
AISC
(2014)
Oumaima Boussarsar
,
Imen Boukhris
,
Zied Elouedi
A Direct Propagation Method in Singly Connected Causal Belief Networks with Conditional Distributions for all Causes.
AISC
(2014)
Sui-Guan Teo
,
Kenneth Koon-Ho Wong
,
Harry Bartlett
,
Leonie Simpson
,
Ed Dawson
Algebraic analysis of Trivium-like ciphers (Poster).
AISC
(2014)
Lubjana Beshaj
,
Tony Shaska
Decomposition of Some Jacobian Varieties of Dimension 3.
AISC
(2014)
Dilshan Jayarathna
,
Udaya Kiran Tupakula
,
Vijay Varadharajan
Hypervisor-based Security Architecture for Validating DNS Services (Poster).
AISC
(2014)
Janaka Seneviratne
,
Udaya Parampalli
,
Lars Kulik
An Authorised Pseudonym System for Privacy Preserving Location Proof Architectures.
AISC
(2014)
Kamini Bajaj
,
Josef Pieprzyk
A Case Study of User-Level Spam Filtering.
AISC
(2014)
Juana Sendra
,
David Gómez
,
Valerio Morán
Rational Conchoid and Offset Constructions: Algorithms and Implementation.
AISC
(2014)
Carlos Gamallo-Chicano
,
Eugenio Roanes-Lozano
,
Carlos Gamallo-Amat
A Rule-Based Expert System for Vaginal Cytology Diagnosis.
AISC
(2014)
Nishchal Kush
,
Ejaz Ahmed
,
Mark Branagan
,
Ernest Foo
Poisoned GOOSE: Exploiting the GOOSE Protocol.
AISC
(2014)
Belaïd Benhamou
Dynamic Symmetry Breaking in Itemset Mining.
AISC
(2014)
José-Luis Ruiz-Reina
Proving and Computing: Applying Automated Reasoning to the Verification of Symbolic Computation Systems (Invited Talk).
AISC
(2014)
Volker Sorge
Combining Systems for Mathematical Creativity (Invited Talk).
AISC
(2014)
Ali Al-Hamdan
,
Harry Bartlett
,
Ed Dawson
,
Leonie Simpson
,
Kenneth Koon-Ho Wong
Weak key-IV Pairs in the A5/1 Stream Cipher.
AISC
(2014)
Jesús Aransay-Azofra
,
Jose Divasón
,
Jónathan Heras
,
Laureano Lambán
,
María Vico Pascual
,
Ángel Luis Rubio
,
Julio Rubio
Obtaining an ACL2 Specification from an Isabelle/HOL Theory.
AISC
(2014)
Salvador Lucas
Using Representation Theorems for Proving Polynomials Non-negative.
AISC
(2014)
volume 8884, 2014
Artificial Intelligence and Symbolic Computation - 12th International Conference, AISC 2014, Seville, Spain, December 11-13, 2014. Proceedings
AISC
8884 (2014)
volume 149, 2014
Twelfth Australasian Information Security Conference, AISC 2014, Auckland, New Zealand, January 2014
AISC
149 (2014)