In this paper, we introduce the transition-based feature generator (TFGe...
We use machine learning to classify examples of braids (or flat braids) ...
Data encryption limits the power and efficiency of queries. Direct proce...
In this paper, we consider the naive applications of process mining in
n...
We report on our success on solving the problem of untangling braids up ...
In this paper, we consider the applications of process mining in intrusi...
The shipping industry is an important component of the global trade and
...
We use reinforcement learning to tackle the problem of untangling braids...
The previous VPT 2020 workshop was organized in honour of Professor Albe...
Event definitions in Complex Event Processing systems are constrained by...
Chord diagrams, under the name of Gauss diagrams, are used in low-dimens...
Ensuring that autonomous space robot control software behaves as it shou...
Penetration testing (or pentesting) is one of the widely used and import...
This volume contains a final and revised selection of papers presented a...
This volume contains the proceedings of the Fifth International Workshop...
Current approaches to the engineering of space software such as satellit...