Last update:
Sat Oct 22 11:24:43 MDT 2022
Michael Elad and Dmitry Datsenko Example-Based Regularization Deployed to Super-Resolution Reconstruction of a Single Image . . . . . . . . . . . . . . 15--30
Erol Gelenbe Editorial . . . . . . . . . . . . . . . 1--2 Yongzhi Cao A Hierarchy of Behavioral Equivalences in the $\pi$-calculus with Noisy Channels . . . . . . . . . . . . . . . . 3--20 Xiaowei Huang and Li Jiao and Weiming Lu Congruence Formats for Weak Readiness Equivalence and Weak Possible Future Equivalence . . . . . . . . . . . . . . 21--36 Xuejun Yang and Ji Wang and Xiaodong Yi Slicing Execution with Partial Weakest Precondition for Model Abstraction of C Programs . . . . . . . . . . . . . . . . 37--49 Daniel Cutting and Aaron Quigley and Björn Landfeldt Special Interest Messaging: a Comparison of IGM Approaches . . . . . . . . . . . 50--68 Patrick Erik Bradley and Norbert Paul Using the Relational Model to Capture Topological Information of Spaces . . . 69--89 Wil M. P. van der Aalst and Niels Lohmann and Peter Massuthe and Christian Stahl and Karsten Wolf Multiparty Contracts: Agreeing and Implementing Interorganizational Processes . . . . . . . . . . . . . . . 90--106 Feng Liu and ChuanKun Wu and XiJun Lin Some Extensions on Threshold Visual Cryptography Schemes . . . . . . . . . . 107--119 A. S. M. Sajeev and Sakgasit Ramingwong Mum Effect as an Offshore Outsourcing Risk: a Study of Differences in Perceptions . . . . . . . . . . . . . . 120--126 Ricardo Jasinski Book Review: Jari Nurmi, \booktitleProcessor Design --- System-on-Chip Computing for ASICs and FPGAs. Springer (2007). ISBN-13 978-1-4020-5529-4. 525 pp. Hardcover . . 127
Bo Hu and Bin Hu and Victor Callaghan and Zongkai Lin Combining Theory and Systems Building in Pervasive Computing . . . . . . . . . . 129--130 Junzhou Luo and Weining Kong and Liang Ge Implementation of Learning Path in Process Control Model . . . . . . . . . 131--141 F. Rivera-illingworth and V. Callaghan and H. Hagras Detection of Normal and Novel Behaviours in Ubiquitous Domestic Environments . . 142--151 Baopeng Zhang and Yuanchun Shi and Xin Xiao A Policy-Driven Service Composition Method for Adaptation in Pervasive Computing Environment . . . . . . . . . 152--165 Zheng-Yu Wu and Han-Tao Song Ant-based Energy-aware Disjoint Multipath Routing Algorithm for MANETs 166--176 Jinjiao Lin and Chengxiang Song and Haiyang Wang A Rule-based Method for Improving Adaptability in Pervasive Systems . . . 177--190 Philip Moore and Bin Hu and Jizheng Wan Smart-Context: a Context Ontology for Pervasive Mobile Computing . . . . . . . 191--207 Kumaara Velan Modelling Bidders in Sequential Automated Auctions . . . . . . . . . . . 208--218 Zhao Wu and Naixue Xiong and Jong Hyuk Park and Tai-Hoon Kim and Lei Yuan A Simulation Model Supporting Time and Non-time Metrics for Web Service Composition . . . . . . . . . . . . . . 219--233 Mouna Allani and Beno\^\it Garbinato and Fernando Pedone Resource-Aware Multimedia Content Delivery: a Gambling Approach . . . . . 234--248
Taskin Koçak Two Decades of Random Neural Networks 249--250 Stelios Timotheou The Random Neural Network: a Survey . . 251--267 Georgia Sakellari The Cognitive Packet Network: a Survey 268--279 Jian Wu and Steve Furber A Multicast Routing Scheme for a Universal Spiking Neural Network Architecture . . . . . . . . . . . . . . 280--288 Mustafa Badaro\uglu and Ugur Halici and Isik Aybay and Cuneyt Cerkez A Cascadable Random Neural Network Chip with Reconfigurable Topology . . . . . . 289--303 Fionn Murtagh The Correspondence Analysis Platform for Uncovering Deep Structure in Data and Information . . . . . . . . . . . . . . 304--315 Ching-man Au Yeung and Ho-Fung Leung A Formal Model of Ontology for Handling Fuzzy Membership and Typicality of Instances . . . . . . . . . . . . . . . 316--341 Ajoy K. Datta and Lawrence L. Larmore and Priyanka Vemula A Self-Stabilizing $O(k)$-Time $k$-Clustering Algorithm . . . . . . . . 342--350 Chih-Yu Lin and Yu-Chee Tseng and Yung-Chih Liu Imprecision-Tolerant Location Management for Object-Tracking Wireless Sensor Network . . . . . . . . . . . . . . . . 351--364
Marcus Nilsson Computational Aspects of Monomial Dynamical Systems . . . . . . . . . . . 365--369 Vladimir Anashin Non-Archimedean Ergodic Theory and Pseudorandom Generators . . . . . . . . 370--392 Patrick Erik Bradley Mumford Dendrograms . . . . . . . . . . 393--404 Fionn Murtagh On Ultrametric Algorithmic Information 405--416 Jenny Benois-Pineau and Andrei Khrennikov Significance Delta Reasoning with $p$-Adic Neural Networks: Application to Shot Change Detection in Video . . . . . 417--431 Branko Dragovich and Alexandra Dragovich $p$-Adic Modelling of the Genome and the Genetic Code . . . . . . . . . . . . . . 432--442 Anthony Karel Seda and Pascal Hitzler Generalized Distance Functions in the Theory of Computation . . . . . . . . . 443--464 Behzad Akbarpour and Amr T. Abdel-Hamid and Sofi\`ene Tahar and John Harrison Verifying a Synthesized Implementation of IEEE-754 Floating-Point Exponential Function using HOL . . . . . . . . . . . 465--488 Mark Levene Book Review: Rokach Lior and Maimon Oded, \booktitleData Mining with Decision Trees: Theory and Applications. World Scientific (2008). ISBN-13 978-981-277-171-1. 244 pp. Hardcover . . 489 Boran Gazi Book Review: Krzysztof J. Cios, Witold Pedrycz, Roman W. Swiniarski and Lukasz A. Kurgan, \booktitleData Mining: A Knowledge Discovery Approach. Springer (2007). ISBN-13 978-0-387-33333-5. \pounds 55.99. 606 pp. Hardcover . . . . 489--490
Anonymous Introduction to the Special Issue on Advances in Sensing, Information Processing and Decision Making for Coalition Operations within the US/UK International Technology Alliance . . . 491--492 Duncan Gillies and David Thornley and Chatschik Bisdikian Probabilistic Approaches to Estimating the Quality of Information in Military Sensor Networks . . . . . . . . . . . . 493--502 Gita Sukthankar and Katia Sycara Analyzing Team Decision-Making in Tactical Scenarios . . . . . . . . . . . 503--512 Lei Chen and Zijian Wang and Boleslaw Szymanski and Joel W. Branch and Dinesh Verma and Raju Damarla and John Ibbotson Dynamic Service Execution in Sensor Networks . . . . . . . . . . . . . . . . 513--527 Katia Sycara and Timothy J. Norman and Joseph A. Giampapa and Martin J. Kollingbaum and Chris Burnett and Daniele Masato and Mairi McCallum and Michael H. Strub Agent Support for Policy-Driven Collaborative Mission Planning . . . . . 528--540 Dinesh Verma and Bong Jun Ko and Petros Zerfos and Kang-won Lee and Ting He and Matthew Duggan and Kristian Stewart and Ananthram Swami and Nikoletta Sofra Understanding the Quality of Monitoring for Network Management . . . . . . . . . 541--550 Zhongqiang Chen and Yuan Zhang and Zhongrong Chen A Categorization Framework for Common Computer Vulnerabilities and Exposures 551--580 H. Rahaman and J. Mathew and D. K. Pradhan Secure Testable S-box Architecture for Cryptographic Hardware Implementation 581--591 François Baccelli and Bartlomiej Blaszczyszyn and Paul Mühlethaler Time--Space Opportunistic Routing in Wireless Ad hoc Networks: Algorithms and Performance Optimization by Stochastic Geometry . . . . . . . . . . . . . . . . 592--609 Mathew D. Penrose Discussant of Response to the \booktitleComputer Journal Lecture by François Baccelli . . . . . . . . . . . . 610--611 Takis Konstantopoulos Response to Prof. Baccelli's lecture on Modelling of Wireless Communication Networks by Stochastic Geometry . . . . 612--614 Rupak Majumdar Book Review: Paul Ammann and Jeff Offutt, \booktitleIntroduction to Software Testing. Cambridge University Press (2008). ISBN-13 978-0-521-88038-1. \pounds 32.99. 322 pp. Hardcover . . . . 615 François Laroussinie Book Review: Christel Baier and Joost-Pieter Katoen, \booktitlePrinciples of Model Checking. MIT Press (May 2008). ISBN-13 978-0-262-02649-9. \pounds 44.95. 975 pp. Hardcover . . . . . . . . . . . . . 615--616 Neil F. Johnson Book Review: Frank Y. Shih, \booktitleDigital Watermarking and Steganography: Fundamentals and Techniques. CRC/Taylor & Francis (2008). ISBN-13 978-1-4200-4757-8. \pounds 46.99. 180 pp. Hardcover . . . . . . . . 616--617
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 619--622 Chien-Liang Chen and Shao-Chi Chin and Hsu-Chun Yen Reachability Analysis of Augmented Marked Graphs via Integer Linear Programming . . . . . . . . . . . . . . 623--633 Yu-Chen Kuo General Tree $k$-Coteries to Reduce the Degradation of Quorums . . . . . . . . . 634--643 R. Marshall Modeling DNA/RNA Strings Using Resistor--Capacitor (RC) Ladder Networks 644--660 Ro-Yu Wu and Jou-Ming Chang and Yue-Li Wang Loopless Generation of Non-regular Trees with a Prescribed Branching Sequence . . 661--666 Jywe-Fei Fang The Bipancycle-Connectivity and the $m$-Pancycle-Connectivity of the $k$-ary $n$-cube . . . . . . . . . . . . . . . . 667--678 Roberto Barbuti and Nicoletta De Francesco and Luca Tesei An Abstract Interpretation Approach for Enhancing the Java Bytecode Verifier . . 679--700 Shmuel T. Klein and Miri Kopel Ben-Nissan On the Usefulness of Fibonacci Compression Codes . . . . . . . . . . . 701--716 Dae-Hwan Kim and Hyuk-Jae Lee Fine-Grain Register Allocation and Instruction Scheduling in a Reference Flow . . . . . . . . . . . . . . . . . . 717--740 Emilio J. Padrón and Margarita Amor and Montserrat Bóo and Ramón Doallo Hierarchical Radiosity for Multiresolution Systems Based on Normal Tests . . . . . . . . . . . . . . . . . 741--752 Iren Valova and Derek Beaton and Dan MacLean and John Hammond NIPSOM: Parallel Architecture and Implementation of a Growing SOM . . . . 753--771 Anne Benoit and Mourad Hakem and Yves Robert Multi-criteria Scheduling of Precedence Task Graphs on Heterogeneous Platforms 772--785 Xiaoyan Zhu and Qinbao Song and Zihan Jia A Weighted Voting-Based Associative Classification Algorithm . . . . . . . . 786--801 Jen-Bang Feng and Iuon-Chang Lin and Yen-Ping Chu and Shyh-Chang Tsaur Resampling Halftone Images Using Interpolation and Error-Diffusion . . . 802--813 Hans Vandierendonck and Sean Rul and Koen De Bosschere Accelerating Multiple Sequence Alignment with the Cell BE Processor . . . . . . . 814--826 Michael A. Bekos and Michael Kaufmann and Katerina Potika and Antonios Symvonis Area-Feature Boundary Labeling . . . . . 827--841 Rich Picking and Alexia Robinet and Vic Grout and John McGinn and Armando Roy and Simon Ellis and Denise Oram A Case Study Using a Methodological Approach to Developing User Interfaces for Elderly and Disabled People . . . . 842--859 Peter G. Harrison Turning Back Time --- What Impact on Performance? . . . . . . . . . . . . . . 860--868 Erol Gelenbe and Stephen Gilmore Discussants' Comments on the \booktitleComputer Journal Lecture by Peter Harrison presented at the British Computer Society on 24th February 2009 869--870 Alessandra Di Pierro and Chris Hankin and Herbert Wiklicky Program Analysis Probably Counts . . . . 871--880 Pasquale Malacaria Program Analysis Probably Counts: Discussant Contribution for the \booktitleComputer Journal Lecture by Chris Hankin . . . . . . . . . . . . . . 881
Haneul Chon and Taewhan Kim Resource Sharing Problem of Timing Variation-Aware Task Scheduling and Binding in MPSoC . . . . . . . . . . . . 883--894 Liang Xia and Yongxin Zhu and Jun Yang and Jingwei Ye and Zonghua Gu Implementing a Thermal-Aware Scheduler in Linux Kernel on a Multi-Core Processor . . . . . . . . . . . . . . . 895--903 Minje Jun and Eui-Young Chung Design of On-Chip Crossbar Network Topology Using Chained Edge Partitioning 904--917 Chung-Ming Huang and Jian-Wei Li and Chun-Ta Chen Distributed Hash Table-Based Interrogating-Call Session Control Function Network in the Internet Protocol Multimedia Subsystem for Efficient Query Services . . . . . . . . 918--933 Jongsung Kim and Seokhie Hong Side-Channel Attack Using Meet-in-the-Middle Technique . . . . . . 934--938 Iuon-Chang Lin and Shih-Shan Tang and Chung-Ming Wang Multicast Key Management without Rekeying Processes . . . . . . . . . . . 939--950 Jenn-Wei Lin and Ming-Feng Yang Robust Super-Peer-Based P2P File-Sharing Systems . . . . . . . . . . . . . . . . 951--968 Chuan-Chi Weng and Ching-Wen Chen and Chang-Jung Ku and Shiow-Fen Hwang A Bandwidth-Based Power-Aware Routing Protocol with Low Route Discovery Overhead in Mobile Ad hoc Networks . . . 969--990 Jonathan Tate and Iain Bate Sensornet Protocol Tuning Using Principled Engineering Methods . . . . . 991--1019 Georgios Loukas and Gülay Öke Protection Against Denial of Service Attacks: a Survey . . . . . . . . . . . 1020--1037 Isi Mitrani Management of Server Farms for Performance and Profit . . . . . . . . . 1038--1044 Andreas Berl and Erol Gelenbe and Marco Di Girolamo and Giovanni Giuliani and Hermann De Meer and Minh Quan Dang and Kostas Pentikousis Energy-Efficient Cloud Computing . . . . 1045--1051 Erol Gelenbe and Edith Ngai Adaptive Random Re-Routing for Differentiated QoS in Sensor Networks 1052--1061 Tsu-Yang Wu and Yuh-Min Tseng An ID-Based Mutual Authentication and Key Exchange Protocol for Low-Power Mobile Devices . . . . . . . . . . . . . 1062--1070 Xiuqiang He and Zonghua Gu and Yongxin Zhu Task Allocation and Optimization of Distributed Embedded Systems with Simulated Annealing and Geometric Programming . . . . . . . . . . . . . . 1071--1091 Eyal Loz and Guillermo Pineda-Villavicencio New Benchmarks for Large-Scale Networks with Given Maximum Degree and Diameter 1092--1105 Denis Trcek Security Metrics Foundations for Computer Security . . . . . . . . . . . 1106--1112 Morris Sloman and Emil Lupu Engineering Policy-Based Ubiquitous Systems . . . . . . . . . . . . . . . . 1113--1127 Robin Milner Discussant of Response to the \booktitleComputer Journal Lecture by Morris Sloman . . . . . . . . . . . . . 1128 Mark Levene Social Networks: An Introduction . . . . 1129 Elizabeth Harrin Growing Software: Proven Strategies for Managing Software Engineers . . . . . . 1129--1130 Michael Elad and Dmitry Datsenko Corrigendum: ``Example-Based Regularization Deployed to Super-Resolution Reconstruction of a Single Image'' . . . . . . . . . . . . . 1131--1131
Sung Woo Chung and Hsien-Hsin S. Lee and Woo Hyong Lee Architecture/OS Support for Embedded Multi-core Systems . . . . . . . . . . . 1134--1135 Fariba Sadri and Kostas Stathis Special Issue on Artificial Societies for Ambient Intelligence Editorial Introduction . . . . . . . . . . . . . . 1136--1137 Jurriaan van Diggelen and Robbert-Jan Beun and Rogier M. van Eijk and Peter J. Werkhoven Efficient Semantic Information Exchange for Ambient Intelligence . . . . . . . . 1138--1151 Marco P. Locatelli and Marco Loregian and Giuseppe Vizzari Artificial Societies in a Community-Based Approach to Ambient Intelligence . . . . . . . . . . . . . . 1152--1168 Aitor Ibarguren and Iñaki Maurtua and Basilio Sierra Layered Architecture for Real-Time Sign Recognition . . . . . . . . . . . . . . 1169--1183 Krysia Broda and Christopher J. Hogger Designing Effective Policies for Minimal Agents . . . . . . . . . . . . . . . . . 1184--1209 Fabio Patern\`o and Carmen Santoro and Antonio Scorcia Ambient Intelligence for Supporting Task Continuity across Multiple Devices and Implementation Languages . . . . . . . . 1210--1228 Patrice Caire and Leendert van der Torre Convivial Ambient Technologies: Requirements, Ontology and Design . . . 1229--1256 Alessandra Mileo and Davide Merico and Stefano Pinardi and Roberto Bisiani A Logical Approach to Home Healthcare with Intelligent Sensor-Network Support 1257--1276 Johnsen Kho and Long Tran-Thanh and Alex Rogers and Nicholas R. Jennings An Agent-Based Distributed Coordination Mechanism for Wireless Visual Sensor Nodes Using Dynamic Programming . . . . 1277--1290 Guang-Ho Cha A Context-Aware Similarity Search for a Handwritten Digit Image Database . . . . 1291--1301 Huzaifa Zafar and Daniel D. Corkill Reducing Online Model-Development Time by Agents Using Constraints Between Shared Observations . . . . . . . . . . 1302--1314 Mücahid Kutlu and Celal Cì\ugìr and Ilyas Cicekli Generic Text Summarization for Turkish 1315--1323 Göksel Günlü and Hasan S. Bilge Face Recognition with Discriminating $3$D DCT Coefficients . . . . . . . . . 1324--1337 Jakub Mare\vcek Book Review: \booktitleHandbook of Approximation Algorithms and Metaheuristics . . . . . . . . . . . . . 1338--1339
N. R. Jennings and A. Rogers and S. Case and R. Johnston and D. Philpot Decentralized Data and Information Systems: Theory and Practice . . . . . . 1341--1343 Michalis Smyrnakis and David S. Leslie Dynamic Opponent Modelling in Fictitious Play . . . . . . . . . . . . . . . . . . 1344--1359 Erol Gelenbe and Stelios Timotheou and David Nicholson Fast Distributed Near-Optimum Assignment of Assets to Tasks . . . . . . . . . . . 1360--1369 Nicos G. Pavlidis and Niall M. Adams and David Nicholson and David J. Hand Prospects for Bandit Solutions in Sensor Management . . . . . . . . . . . . . . . 1370--1383 Nikolaos Dimakis and Avgoustinos Filippoupolitis and Erol Gelenbe Distributed Building Evacuation Simulator for Smart Emergency Management 1384--1400 Christoforos Anagnostopoulos and Niall M. Adams and David J. Hand Streaming Covariance Selection with Applications to Adaptive Querying in Sensor Networks . . . . . . . . . . . . 1401--1414 Seung Min Lee and Stephen J. Roberts Sequential Dynamic Classification Using Latent Variable Models . . . . . . . . . 1415--1429 Roman Garnett and Michael A. Osborne and Steven Reece and Alex Rogers and Stephen J. Roberts Sequential Bayesian Prediction in the Presence of Changepoints and Faults . . 1430--1446 Sarvapali D. Ramchurn and Alessandro Farinelli and Kathryn S. Macarthur and Nicholas R. Jennings Decentralized Coordination in RoboCup Rescue . . . . . . . . . . . . . . . . . 1447--1461 Archie C. Chapman and Rosa Anna Micillo and Ramachandra Kota and Nicholas R. Jennings Decentralized Dynamic Task Allocation Using Overlapping Potential Games . . . 1462--1477 Lein Harn and Wen-Jung Hsin and Changlu Lin Efficient On-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families . . . . . . . . . 1478--1484 Roberto De Prisco and Alfredo De Santis Cheating Immune Threshold Visual Secret Sharing . . . . . . . . . . . . . . . . 1485--1496 Lélia Blin and Christian Laforest and Stephane Rovedakis and Nicolas Thibault Hardness Results and Heuristic for Multi-groups Interconnection . . . . . . 1497--1507 Adenilso Simão and Alexandre Petrenko Fault Coverage-Driven Incremental Test Generation . . . . . . . . . . . . . . . 1508--1522 Vicent Cholvi and Antonio Fernández and Ernesto Jiménez and Pilar Manzano and Michel Raynal A Methodological Construction of an Efficient Sequentially Consistent Distributed Shared Memory . . . . . . . 1523--1534 Michael Wetherfield Personal Recollections of Programming Deuce in the Late 1950s . . . . . . . . 1535--1549
You-Chiun Wang and Tomoaki Ohtsuki and Athanasios (Thanos) Vasilakos and Ashutosh Sabharwal and Yuh-Shyan Chen and Yu-Chee Tseng Algorithms, Protocols and Future Applications of Wireless Sensor Networks 1551--1552 Orhan Dagdeviren and Kayhan Erciyes Graph Matching-Based Distributed Clustering and Backbone Formation Algorithms for Sensor Networks . . . . . 1553--1575 Thanassis Giannetsos and Tassos Dimitriou and Ioannis Krontiris and Neeli R. Prasad Arbitrary Code Injection through Self-propagating Worms in von Neumann Architecture Devices . . . . . . . . . . 1576--1593 Yuan Zhang and Lichun Bao and Shih-Hsien Yang and Max Welling and Di Wu Localization Algorithms for Wireless Sensor Retrieval . . . . . . . . . . . . 1594--1605 Aaron Kiely and Mingsen Xu and Wen-Zhan Song and Renjie Huang and Behrooz Shirazi Adaptive Linear Filtering Compression on Realtime Sensor Networks . . . . . . . . 1606--1620 Chih-Wei Yi and Peng-Jun Wan and Chao-Min Su and Chen-Wei Huang The Critical Grid Size and Transmission Radius for Local-Minimum-Free Grid Routing in Wireless Ad Hoc and Sensor Networks . . . . . . . . . . . . . . . . 1621--1631 Meng Zheng and Wei Liang and Haibin Yu and Yang Xiao Cross Layer Optimization for Energy-Constrained Wireless Sensor Networks: Joint Rate Control and Routing 1632--1642 Long Cheng and Yimin Chen and Canfeng Chen and Jian Ma and Lei Shu and Athanasios V. Vasilakos and Naixue Xiong Efficient Query-Based Data Collection for Mobile Wireless Monitoring Applications . . . . . . . . . . . . . . 1643--1657 Jaime Lloret and Sandra Sendra and Hugo Coll and Miguel Garcia Saving Energy in Wireless Local Area Sensor Networks . . . . . . . . . . . . 1658--1673 Pruet Boonma and Junichi Suzuki Moppet: a Model-Driven Performance Engineering Framework for Wireless Sensor Networks . . . . . . . . . . . . 1674--1690 Yu-Ying Shih and Daniel Chao Sequence of Control in S$^3$PMR . . . . 1691--1703 Chung-Ming Huang and Ming-Sian Lin and Lik-Hou Chang The Design of Mobile Concurrent Multipath Transfer in Multihomed Wireless Mobile Networks . . . . . . . . 1704--1718 Jianxin Liao and Qi Qi and Xiaomin Zhu and Yufei Cao and Tonghong Li Enhanced IMS Handoff Mechanism for QoS Support over Heterogeneous Network . . . 1719--1737 Maria Petrou and Marco Elio Tabacchi and Roberta Piroddi Networks of Concepts and Ideas . . . . . 1738--1751 Jon Crowcroft Internet Failures: an Emergent Sea of Complex Systems and Critical Design Errors? . . . . . . . . . . . . . . . . 1752--1757 Manfred Broy A Logical Basis for Component-Oriented Software and Systems Engineering . . . . 1758--1782 Daniel Y. Chao Fewer Monitors and More Efficient Controllability for Deadlock Control in S$^3$PGR$^2$ (Systems of Simple Sequential Processes with General Resource Requirements) . . . . . . . . . 1783--1798
Qiang Liu and George A. Constantinides and Konstantinos Masselos and Peter Y. K. Cheung Compiling C-like Languages to FPGA Hardware: Some Novel Approaches Targeting Data Memory Organization . . . 1--10 Mark S. Nixon and Xin U. Liu and Cem Direko\=glu and David J. Hurley On Using Physical Analogies for Feature and Shape Extraction in Computer Vision 11--25 Stefan Dantchev Dynamic Neighbourhood Cellular Automata 26--30 Corina C\^\irstea and Alexander Kurz and Dirk Pattinson and Lutz Schröder and Yde Venema Modal Logics are Coalgebraic . . . . . . 31--41 Glynn Winskel Events, Causality and Symmetry . . . . . 42--57 Andreas Bauer and Jan Jürjens and Yijun Yu Run-Time Security Traceability for Evolving Systems . . . . . . . . . . . . 58--87 Kohei Honda and Nobuko Yoshida A Unified Theory of Program Logics: an Approach based on the $\pi$-Calculus . . 88--107 Heewan Park and Hyun-il Lim and Seokwoo Choi and Taisook Han Detecting Common Modules in Java Packages Based on Static Object Trace Birthmark . . . . . . . . . . . . . . . 108--124 Sebastián Basterrech and Samir Mohammed and Gerardo Rubino and Mostafa Soliman Levenberg--Marquardt Training Algorithms for Random Neural Networks . . . . . . . 125--135 David Hartley EDSAC at 60---a Celebration of 60 Years Since the First Program Ran on the EDSAC at Cambridge . . . . . . . . . . . . . . 136--138 David Barron EDSAC: a Programmer Remembers . . . . . 139--142 Doron Swade Inventing the User: EDSAC in Context . . 143--147 D. Cavagnino and A. E. Werbrouck An Analysis of Associated Dividends in the DBM Algorithm for Division by Constants Using Multiplication . . . . . 148--156 GuanJun Liu and ChangJun Jiang and Daniel Y. Chao A Necessary and Sufficient Condition for the Liveness of Normal Nets . . . . . . 157--163 Jing Dong and Tu Peng and Yajing Zhao On Instantiation and Integration Commutability of Design Pattern . . . . 164--184
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 185--186 A. Manzalini and P. H. Deussen and S. Nechifor and M. Mamei and R. Minerva and C. Moiso and A. Salden and T. Wauters and F. Zambonelli Self-optimized Cognitive Network of Networks . . . . . . . . . . . . . . . . 189--196 Yosi Ben-Asher and Sharoni Feldman and Moran Feldman Dynamic Multipath Allocation in Ad Hoc Networks . . . . . . . . . . . . . . . . 197--212 Giuseppe Anastasi and Eleonora Borgia and Marco Conti and Enrico Gregori A Hybrid Adaptive Protocol for Reliable Data Delivery in WSNS with Multiple Mobile Sinks . . . . . . . . . . . . . . 213--229 Oliviu Ghica and Goce Trajcevski and Peter Scheuermann and Nikolay Valtchanov and Zachary Bischof Controlled Multi-Path Routing in Sensor Networks Using Bézier Curves . . . . . . 230--254 Jywe-Fei Fang The Edge-Fault-Tolerant Bipancyclicity of the Even $k$-ary $n$-cube . . . . . . 255--262 David Nicholson Defence Applications of Agent-Based Information Fusion . . . . . . . . . . . 263--273 Thu-Ha Dao-Thi and Jean-Michel Fourneau and Minh-Anh Tran Multiple Class Symmetric G-networks with Phase Type Service Times . . . . . . . . 274--284 Lucas Vespa and Ning Weng and Ramaswamy Ramaswamy MS-DFA: Multiple-Stride Pattern Matching for Scalable Deep Packet Inspection . . 285--303 Mihaela Ulieru Book Review: Wired for Innovation: How Information Technology is Reshaping the Economy . . . . . . . . . . . . . . . . 304--305
A. Rogers Agent Technologies for Sensor Networks 307--308 Ettore Ferranti and Niki Trigoni Practical Issues in Deploying Mobile Agents to Explore a Sensor-Instrumented Environment . . . . . . . . . . . . . . 309--320 Dirk Bade and Winfried Lamersdorf An Agent-Based Event Processing Middleware for Sensor Networks and RFID Systems . . . . . . . . . . . . . . . . 321--331 Damla Turgut and Ladislau Bölöni Heuristic Approaches for Transmission Scheduling in Sensor Networks with Multiple Mobile Sinks . . . . . . . . . 332--344 Shunichiro Suenaga and Nobukazu Yoshioka and Shinichi Honiden Group Migration by Mobile Agents in Wireless Sensor Networks . . . . . . . . 345--355 Murat \cSensoy and Thao Le and Wamberto W. Vasconcelos and Timothy J. Norman and Alun D. Preece Resource Determination and Allocation in Sensor Networks: a Hybrid Approach . . . 356--372 Sherine Abdelhak and Rabi S. Chaudhuri and Chandra S. Gurram and Soumik Ghosh and Magdy Bayoumi Energy-Aware Distributed $QR$ Decomposition on Wireless Sensor Nodes 373--391 Daniel D. Corkill Deploying Power-Aware, Wireless Sensor Agents . . . . . . . . . . . . . . . . . 392--405 Edison Pignaton de Freitas and Tales Heimfarth and Carlos Eduardo Pereira and Armando Morado Ferreira and Flávio Rech Wagner and Tony Larsson Multi-Agent Support in a Middleware for Mission-Driven Heterogeneous Sensor Networks . . . . . . . . . . . . . . . . 406--420 Andrew Markham and Niki Trigoni The Automatic Evolution of Distributed Controllers to Configure Sensor Network Operation . . . . . . . . . . . . . . . 421--438 Francesco Aiello and Giancarlo Fortino and Raffaele Gravina and Antonio Guerrieri A Java-Based Agent Platform for Programming Wireless Sensor Networks . . 439--454 Meritxell Vinyals and Juan A. Rodriguez-Aguilar and Jesus Cerquides A Survey on Sensor Networks from a Multiagent Perspective . . . . . . . . . 455--470 Antony Waldock and David Nicholson A Framework for Cooperative Control Applied to a Distributed Sensor Network 471--481 Partha Mukherjee and Sandip Sen Comparing Reputation Schemes for Detecting Malicious Nodes in Sensor Networks . . . . . . . . . . . . . . . . 482--489 Richard Tynan and Conor Muldoon and Gregory O'Hare and Michael O'Grady Coordinated Intelligent Power Management and the Heterogeneous Sensing Coverage Problem . . . . . . . . . . . . . . . . 490--502
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 503--504 Zuowen Tan An Off-line Electronic Cash Scheme Based on Proxy Blind Signature . . . . . . . . 505--512 Fuchun Guo and Yi Mu and Willy Susilo Short Signatures with a Tighter Security Reduction Without Random Oracles . . . . 513--524 Qiong Huang and Duncan S. Wong and Guomin Yang Heterogeneous Signcryption with Key Privacy . . . . . . . . . . . . . . . . 525--536 Mehran S. Fallah and Maryam Mouzarani A Game-based Sybil-resistant Strategy for Reputation Systems in Self-organizing Manets . . . . . . . . . 537--548 Biming Tian and Song Han and Sazia Parvin and Jiankun Hu and Sajal Das Self-Healing Key Distribution Schemes for Wireless Networks: a Survey . . . . 549--569 Prasanta Gogoi and D. K. Bhattacharyya and B. Borah and Jugal K. Kalita A Survey of Outlier Detection Methods in Network Anomaly Identification . . . . . 570--588 Ender Yüksel and Hanne Riis Nielson and Flemming Nielson A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks . . . . 589--601 Murat Ergun and Albert Levi and Erkay Savas Increasing Resiliency in Multi-phase Wireless Sensor Networks: Generationwise Key Predistribution Approach . . . . . . 602--616 David Taniar and Maytham Safar and Quoc Thai Tran and Wenny Rahayu and Jong Hyuk Park Spatial Network RNN Queries in GIS . . . 617--627 Chien-Lung Chan Information Security Risk Modeling Using Bayesian Index . . . . . . . . . . . . . 628--638
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 639--640 Jeremy T. Bradley Computer Performance Evaluation: Preface 641--642 Nigel Thomas and Yishi Zhao Mean value analysis for a class of Pepa models . . . . . . . . . . . . . . . . . 643--652 Gianfranco Balbo and Marco Beccuti and Massimiliano De Pierro and Giuliana Franceschinis First Passage Time Computation in Tagged GSPNs with Queue Places . . . . . . . . 653--673 Connie U. Smith and Catalina M. Lladó and Ramon Puigjaner Model Interchange Format Specifications for Experiments, Output and Results . . 674--690 Abigail S. Lebrecht and Nicholas J. Dingle and William J. Knottenbelt Analytical and Simulation Modelling of Zoned RAID Systems . . . . . . . . . . . 691--707 Mehmet Serkan Apaydin and Bülent Çatay and Nicholas Patrick and Bruce R. Donald NVR-BIP: Nuclear Vector Replacement using Binary Integer Programming for NMR Structure-Based Assignments . . . . . . 708--716 Ender Sevinç and Ahmet Co\csar An Evolutionary Genetic Algorithm for Optimization of Distributed Database Queries . . . . . . . . . . . . . . . . 717--725 H. Sarbazi-Azad and A. Khonsari and M. Ould-Khaoua On the Topological Properties of Grid-Based Interconnection Networks: Surface Area and Volume of Radial Spheres . . . . . . . . . . . . . . . . 726--737 Rìfat Benveniste and Cem Ünsalan A Color Invariant for Line Stripe-Based Range Scanners . . . . . . . . . . . . . 738--753 Marco Bozzano and Alessandro Cimatti and Joost-Pieter Katoen and Viet Yen Nguyen and Thomas Noll and Marco Roveri Safety, Dependability and Performance Analysis of Extended AADL Models . . . . 754--775 James F. Korsh Fast Generation of $t$-ary Trees . . . . 776--785 Ramon Bertran and Marc Gonz\`alez and Xavier Martorell and Nacho Navarro and Eduard Ayguadé Local Memory Design Space Exploration for High-Performance Computing . . . . . 786--799 Murat Ali Bayir and Murat Demirbas and Ahmet Cosar A Web-Based Personalized Mobility Service for Smartphone Applications . . 800--814 Minhaj Ahmad Khan Data Cache Prefetching With Dynamic Adaptation . . . . . . . . . . . . . . . 815--823 Yen-Ju Chen and Jia-Jie Liu and Yue-Li Wang An Optimal Rotation Distance Set . . . . 824--830 Mark Levene Book Review: Search Engines: Information Retrieval in Practice . . . . . . . . . 831--832
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 833--835 Django Armstrong and Karim Djemame Performance Issues in Clouds: an Evaluation of Virtual Image Propagation and I/O Paravirtualization . . . . . . . 836--849 Erol Gelenbe and Christina Morfopoulou A Framework for Energy-Aware Routing in Packet Networks . . . . . . . . . . . . 850--859 Arshad Jhumka and Matthew Leeke and Sambid Shrestha On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy . . . . . . . . . . . 860--874 Osama Younes and Nigel Thomas An SRN Model of the IEEE 802.11 DCF MAC Protocol in Multi-Hop Ad Hoc Networks with Hidden Nodes . . . . . . . . . . . 875--893 Feng Liu and Xiaoyu Song and Qingping Tan and Gang Chen Formal Analysis of Hybrid Prefix/Carry-Select Arithmetic Systems 894--904 Qiang Li and Qin-fen Hao and Li-min Xiao and Zhou-jun Li An Integrated Approach to Automatic Management of Virtualized Resources in Cloud Environments . . . . . . . . . . . 905--919 Yonghong Xiang and Iain A. Stewart A Multipath Analysis of Biswapped Networks . . . . . . . . . . . . . . . . 920--930 Kalika Suksomboon and Panita Pongpaibool and Yusheng Ji and Chaodit Aswakul PC-Nash: QoS Provisioning Framework With Path-Classification Scheme Under Nash Equilibrium . . . . . . . . . . . . . . 931--943 Mustafa K. Gurcan and Hadhrami Ab Ghani and Jihai Zhou and Anusorn Chungtragarn Bit Energy Consumption Minimization for Multi-path Routing in Ad Hoc Networks 944--959 S. A. Jarvis UK Performance Engineering Workshop 2010 960--961 Jie Yu and Zhoujun Li and Peng Xiao and Chengfang Fang and Jia Xu and Ee-Chien Chang ID Repetition in Structured P2P Networks 962--975 Guangyan Huang and Yanchun Zhang and Jing He and Jinli Cao Fault Tolerance in Data Gathering Wireless Sensor Networks . . . . . . . . 976--987 A. Sinan Akyurek and Elif Uysal-Biyikoglu A Depth-optimal Low-complexity Distributed Wireless Multicast Algorithm 988--1003
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1005--1009 Alex W. Stedmon and Benjamin Hasseldine and David Rice and Mark Young and Steve Markham and Michael Hancox and Edward Brickell and Joanna Noble `MotorcycleSim': an Evaluation of Rider Interaction with an Innovative Motorcycle Simulator . . . . . . . . . . 1010--1025 Petr Hnetynka and Liam Murphy and John Murphy Comparing the Service Component Architecture and Fractal Component Model 1026--1037 Tatjana Kapus Closing a System in the Dynamic Input/Output Automata Model . . . . . . 1038--1048 Ahmad Taherkhani and Ari Korhonen and Lauri Malmi Recognizing Algorithms Using Language Constructs, Software Metrics and Roles of Variables: an Experiment with Sorting Algorithms . . . . . . . . . . . . . . . 1049--1066 Paul E. Dunne On Constructing Minimal Formulae . . . . 1067--1075 Alessandro Basso and Davide Cavagnino and Victor Pomponiu and Annamaria Vernone Blind Watermarking of Color Images Using Karhunen--Lo\`eve Transform Keying . . . 1076--1090 Yuqing Wu and Dirk Van Gucht and Marc Gyssens and Jan Paredaens A Study of a Positive Fragment of Path Queries: Expressiveness, Normal Form and Minimization . . . . . . . . . . . . . . 1091--1118 Harold Thimbleby Signposting in Documents . . . . . . . . 1119--1135 Chuen-Horng Lin and Wei-Chih Lin Image Retrieval System Based on Adaptive Color Histogram and Texture Features . . 1136--1147 David Pinto and Paolo Rosso and Héctor Jiménez-Salazar A Self-enriching Methodology for Clustering Narrow Domain Short Texts . . 1148--1165 Sven Hartmann and Uwe Leck and Sebastian Link On Codd Families of Keys over Incomplete Relations . . . . . . . . . . . . . . . 1166--1180 Tetsu Narumi and Kenji Yasuoka and Makoto Taiji and Francesco Zerbetto and Siegfried Höfinger Fast Calculation of Electrostatic Potentials on the GPU or the ASIC MD-GRAPE-3 . . . . . . . . . . . . . . . 1181--1187 Alexandre R. J. François An Architectural Framework for the Design, Analysis and Implementation of Interactive Systems . . . . . . . . . . 1188--1204 Yulai Xie Some Results on Minimum Discrete Bending Energy Path in Simple Polygon . . . . . 1205--1210 Jia Lee and Susumu Adachi and Ferdinand Peper A Partitioned Cellular Automaton Approach for Efficient Implementation of Asynchronous Circuits . . . . . . . . . 1211--1220 Medeni Soysal and A. Aydin Alatan Joint Utilization of Appearance, Geometry and Chance for Scene Logo Retrieval . . . . . . . . . . . . . . . 1221--1231
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1233--1234 Constandinos X. Mavromoustakis and Helen D. Karatza Embedded Socio-oriented Model for End-to-End Reliable Stream Schedules by Using Collaborative Outsourcing in Mp2P Systems . . . . . . . . . . . . . . . . 1235--1247 Amirhosein Taherkordi and Frédéric Loiret and Romain Rouvoy and Frank Eliassen A Generic Component-Based Approach for Programming, Composing and Tuning Sensor Software . . . . . . . . . . . . . . . . 1248--1266 In Hwan Doh and Jongmoo Choi and Donghee Lee and Sam H. Noh An Empirical Study of Deploying Storage Class Memory into the I/O Path of Portable Systems . . . . . . . . . . . . 1267--1281 José Luis March and Julio Sahuquillo and Houcine Hassan and Salvador Petit and José Duato A New Energy-Aware Dynamic Task Set Partitioning Algorithm for Soft and Hard Embedded Real-Time Systems . . . . . . . 1282--1294 Ali Ahmadinia and Alireza Shahrabi A Highly Adaptive and Efficient Router Architecture for Network-on-Chip . . . . 1295--1307 Minseong Kim and Andy Wellings Multiprocessors and Asynchronous Event Handling in the Real-Time Specification for Java . . . . . . . . . . . . . . . . 1308--1324 Mohammed F. Mokbel and Robert D. Kent and Michael Wong An Abstract Semantically Rich Compiler Collocative and Interpretative Model for OpenMP Programs . . . . . . . . . . . . 1325--1343 Tiziana Calamoneri The $L(h, k)$-Labelling Problem: an Updated Survey and Annotated Bibliography . . . . . . . . . . . . . . 1344--1371 Antoine Bossard and Keiichi Kaneko and Shietung Peng A New Node-to-Set Disjoint-Path Algorithm in Perfect Hierarchical Hypercubes . . . . . . . . . . . . . . . 1372--1381 Eun-Chan Park and Minjoong Rim Fair Coexistence MAC Protocol for Contention-Based Heterogeneous Networks 1382--1397 Onur Yilmaz and Orhan Dagdeviren and Kayhan Erciyes Interference-Aware Dynamic Algorithms for Energy-Efficient Topology Control in Wireless Ad Hoc and Sensor Networks . . 1398--1411
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1413--1415 Shuo Xu and Fan Yu and Zhe Luo and Ze Ji and Duc Truong Pham and Renxi Qiu Adaptive Bees Algorithm --- Bioinspiration from Honeybee Foraging to Optimize Fuel Economy of a Semi-Track Air-Cushion Vehicle . . . . . . . . . . 1416--1426 Hugo Hernández and Christian Blum Foundations of \sc Antcycle: Self-synchronized Duty-cycling in Mobile Sensor Networks . . . . . . . . . . . . 1427--1448 Wei-Po Lee and Yu-Ting Hsiao An Adaptive GA--PSO Approach with Gene Clustering to Infer S-system Models of Gene Regulatory Networks . . . . . . . . 1449--1464 Hongxing Wei and Youdong Chen and Miao Liu and Yingpeng Cai and Tianmiao Wang Swarm Robots: from Self-assembly to Locomotion . . . . . . . . . . . . . . . 1465--1474 Hanife Kebapci and Berrin Yanikoglu and Gozde Unal Plant Image Retrieval Using Color, Shape and Texture Features . . . . . . . . . . 1475--1490 Maria Petrou and Archontis Giannakidis Full Tomographic Reconstruction of $2$D Vector Fields using Discrete Integral Data . . . . . . . . . . . . . . . . . . 1491--1504 Gérard Sabah Natural Language Understanding, Where Are We Going? Where Could We Go? . . . . 1505--1513 Stelios Timotheou Asset-Task Assignment Algorithms in the Presence of Execution Uncertainty . . . 1514--1525 Serdar Cakir and A. Enis Cetin Mel- and Mellin-cepstral Feature Extraction Algorithms for Face Recognition . . . . . . . . . . . . . . 1526--1534 Gözde Özbal and Hìlal Karaman and Ferda N. Alpaslan A Content-Boosted Collaborative Filtering Approach for Movie Recommendation Based on Local and Global Similarity and Missing Data Prediction 1535--1546 S. B. Kotsiantis Cascade Generalization with Reweighting Data for Handling Imbalanced Problems 1547--1559 Mark Levene Chess Metaphors, Artificial Intelligence and the Human Mind . . . . . . . . . . . 1560--1560
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1561--1564 Monowar H. Bhuyan and D. K. Bhattacharyya and J. K. Kalita Surveying Port Scans and Their Detection Methodologies . . . . . . . . . . . . . 1565--1581 Duc-Phong Le and Chao-Liang Liu Refinements of Miller's Algorithm over Weierstrass Curves Revisited . . . . . . 1582--1591 Salih Ergün A Truly Random Number Generator Based on a Pulse-Excited Cross-Coupled Chaotic Oscillator . . . . . . . . . . . . . . . 1592--1602 Ruben Rios and Javier Lopez Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks . . . . . . . . . . . . 1603--1615 Hossein Homaei and Hamid Reza Shahriari Compositional Approach to Quantify the Vulnerability of Computer Systems . . . 1616--1631 Kai Xi and Yan Tang and Jiankun Hu Correlation Keystroke Verification Scheme for User Access Control in Cloud Computing Environment . . . . . . . . . 1632--1644 Yong Yu and Yi Mu and Guilin Wang and Ying Sun Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature . . . . . . . . . . . . . . . 1645--1651 Hassan Jameel Asghar and Josef Pieprzyk and Huaxiong Wang On the Hardness of the Sum of $k$ Mins Problem . . . . . . . . . . . . . . . . 1652--1660 Jun Zhang and Yang Xiang and Wanlei Zhou and Lei Ye and Yi Mu Secure Image Retrieval Based on Visual Content and Watermarking Protocol . . . 1661--1674 Lan Zhou and Vijay Varadharajan and Michael Hitchens Enforcing Role-Based Access Control for Secure Data Storage in the Cloud . . . . 1675--1687 Lein Harn and Chia-Yin Lee and Changlu Lin and Chin-Chen Chang Fully Deniable Message Authentication Protocols Preserving Confidentiality . . 1688--1699 Yini Wang and Sheng Wen and Silvio Cesare and Wanlei Zhou and Yang Xiang The Microcosmic Model of Worm Propagation . . . . . . . . . . . . . . 1700--1720 Erika Rosas and Olivier Marin and Xavier Bonnaire Corps: Building a Community of Reputable Peers in Distributed Hash Tables . . . . 1721--1735
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1737--1740 Chenfeng Xu and Hongsheng Xi and Fengguang Wu Evaluation and Optimization of Kernel File Readaheads Based on Markov Decision Models . . . . . . . . . . . . . . . . . 1741--1755 Edgar G. Daylight Dijkstra's Rallying Cry for Generalization: the Advent of the Recursive Procedure, Late 1950s--Early 1960s . . . . . . . . . . . . . . . . . 1756--1772 Mitzi McCarthy and Zhen He Efficient Updates for OLAP Range Queries on Flash Memory . . . . . . . . . . . . 1773--1789 Tien Van Do Comparison of Allocation Schemes for Virtual Machines in Energy-Aware Server Farms . . . . . . . . . . . . . . . . . 1790--1797 Amir Kaivani and Ghassem Jaberipur Decimal CORDIC Rotation based on Selection by Rounding: Algorithm and Architecture . . . . . . . . . . . . . . 1798--1809 Cagatay Turkay and Emre Koc and Selim Balcisoy Integrating Information Theory in Agent-Based Crowd Simulation Behavior Models . . . . . . . . . . . . . . . . . 1810--1820 Gabriel Rodríguez and María J. Martín and Patricia González and Juan Touriño Analysis of Performance-impacting Factors on Checkpointing Frameworks: the CPPC Case Study . . . . . . . . . . . . 1821--1837 Jia-Jie Liu and William Chung-Kung Yen and Yen-Ju Chen An Optimal Algorithm for Untangling Binary Trees via Rotations . . . . . . . 1838--1844 Ahmad Taherkhani Using Decision Tree Classifiers in Source Code Analysis to Recognize Algorithms: an Experiment with Sorting Algorithms . . . . . . . . . . . . . . . 1845--1860 Francisco Vázquez and Ester M. Garzón and José Jesús Fernández Matrix Implementation of Simultaneous Iterative Reconstruction Technique (Sirt) on GPUs . . . . . . . . . . . . . 1861--1868 Tiziana Calamoneri The $L(2, 1)$-Labeling Problem on Oriented Regular Grids . . . . . . . . . 1869--1875 Ionu\dt Popa SE-Compression: a Generalization of Dictionary-Based Compression . . . . . . 1876--1881 Yang Liu and Zhen He and Yi-Ping Phoebe Chen and Thi Nguyen External Sorting on Flash Memory Via Natural Page Run Generation . . . . . . 1882--1990 Francisco Ortin Type Inference to Optimize a Hybrid Statically and Dynamically Typed Language . . . . . . . . . . . . . . . . 1901--1924
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1925--1927 Damianos Gavalas and Grammati Pantziou and Charalampos Konstantopoulos Mobility in Wireless Sensor Networks . . 1928--1930 Roland Kays and Sameer Tilak and Margaret Crofoot and Tony Fountain and Daniel Obando and Alejandro Ortega and Franz Kuemmeth and Jamie Mandel and George Swenson and Thomas Lambert and Ben Hirsch and Martin Wikelski Tracking Animal Location and Activity with an Automated Radio Telemetry System in a Tropical Rainforest . . . . . . . . 1931--1948 Giuseppe Cardone and Antonio Corradi and Luca Foschini Cross-Network Opportunistic Collection of Urgent Data in Wireless Sensor Networks . . . . . . . . . . . . . . . . 1949--1962 Mahdi Zareei and Alireza Taghizadeh and Rahmat Budiarto and Tat-Chee Wan EMS-MAC: Energy Efficient Contention-Based Medium Access Control Protocol for Mobile Sensor Networks . . 1963--1972 Olof Rensfelt and Frederik Hermans and Per Gunningberg and Lars-Åke Larzon and Erik Björnemo Repeatable Experiments with Mobile Nodes in a Relocatable WSN Testbed . . . . . . 1973--1986 M. Emre Keskin and I. Kuban Altinel and Necati Aras and Cem Ersoy Lifetime Maximization in Wireless Sensor Networks Using a Mobile Sink with Nonzero Traveling Time . . . . . . . . . 1987--1999 Zeqiang Chen and Liping Di and Genong Yu and Nengcheng Chen Real-Time On-Demand Motion Video Change Detection in the Sensor Web Environment 2000--2016 Kai-Ting Yang and Ge-Ming Chiu A Hybrid Pull-Based with Piggybacked Push Protocol for Cache Sharing . . . . 2017--2032 Jih-Ching Chiu and Yu-Liang Chou and Po-Kai Chen and Ding-Siang Su A Unitable Computing Architecture for Chip Multiprocessors . . . . . . . . . . 2033--2052 Yanbo Wu and Quan Z. Sheng and Damith C. Ranasinghe Facilitating Efficient Object Tracking in Large-Scale Traceability Networks . . 2053--2071
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1--2 Kazuma Akamine and Ken Fukuchi and Akisato Kimura and Shigeru Takagi Fully Automatic Extraction of Salient Objects from Videos in Near Real Time 3--14 Daniel Ruijters and Philippe Thévenaz GPU Prefilter for Accurate Cubic B-spline Interpolation . . . . . . . . . 15--20 Sangpil Lee and Won W. Ro Accelerated Network Coding with Dynamic Stream Decomposition on Graphics Processing Unit . . . . . . . . . . . . 21--34 Sumeer Goel and Yasser Ismail and Magdy Bayoumi High-speed Motion Estimation Architecture for Real-time Video Transmission . . . . . . . . . . . . . . 35--46 Ingrid Petric and Bojan Cestnik and Nada Lavrac and Tanja Urbancic Outlier Detection in Cross-Context Link Discovery for Creative Literature Mining 47--61 M. O\uguzhan Külekci and Jeffrey Scott Vitter and Bojian Xu Fast Pattern-Matching via $k$-bit Filtering Based Text Decomposition . . . 62--68 Manuel Abellanas and Antonio Leslie Bajuelos and Inês Matos Minimizing the Range for $k$-Covered Paths on Sensor Networks . . . . . . . . 69--81 Vid Podpecan and Monika Zemenova and Nada Lavrac Orange4Ws Environment for Service-Oriented Data Mining . . . . . . 82--98 Dick Hamlet Science, Mathematics, Computer Science, Software Engineering . . . . . . . . . . 99--110 Antonio Fariña and Gonzalo Navarro and José R. Paramá Boosting Text Compression with Word-Based Statistical Encoding . . . . 111--131
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 133--135 S. A. Jarvis Editorial Performance Modelling, Benchmarking and Simulation of High-Performance Computing Systems . . . 136--137 S. J. Pennycook and S. D. Hammond and G. R. Mudalige and S. A. Wright and S. A. Jarvis On the Acceleration of Wavefront Applications using Distributed Many-Core Architectures . . . . . . . . . . . . . 138--153 Xingfu Wu and Valerie Taylor Performance Characteristics of Hybrid MPI/OpenMP Implementations of NAS Parallel Benchmarks SP and BT on Large-Scale Multicore Clusters . . . . . 154--167 M. B. Giles and G. R. Mudalige and Z. Sharif and G. Markall and P. H. J. Kelly Performance Analysis and Optimization of the OP2 Framework on Many-Core Architectures . . . . . . . . . . . . . 168--180 Ming-yu Hsieh and Rolf Riesen and Kevin Thompson and William Song and Arun Rodrigues SST: a Scalable Parallel Framework for Architecture-Level Performance, Power, Area and Thermal Simulation . . . . . . 181--191 Simon McIntosh-Smith and Terry Wilson and Amaurys Ávila Ibarra and Jonathan Crisp and Richard B. Sessions Benchmarking Energy Efficiency, Power Costs and Carbon Emissions on Heterogeneous Systems . . . . . . . . . 192--205 Sandeep Budanur and Frank Mueller and Todd Gamblin Memory Trace Compression and Replay for SPMD Systems Using Extended PRSDs . . . 206--217 Sergio González-Valenzuela and Son T. Vuong and Victor C. M. Leung Leveraging Service Discovery in MANETs with Mobile Directories . . . . . . . . 218--231 Dong-Heon Jung and Soo-Mook Moon and Sung-Hwan Bae Evaluation of a Java Ahead-of-Time Compiler for Embedded Systems . . . . . 232--252
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 253--255 Jason J. Jung and Dariusz Król Editorial: Engineering Knowledge and Semantic Systems . . . . . . . . . . . . 256--257 Grzegorz Kukla and Przemyslaw Kazienko and Piotr Bródka and Tomasz Filipowski Soclake: Social Latent Knowledge Explorator . . . . . . . . . . . . . . . 258--276 ZongDa Wu and GuanDong Xu and YanChun Zhang and Peter Dolog and ChengLang Lu An Improved Contextual Advertising Matching Approach based on Wikipedia Knowledge . . . . . . . . . . . . . . . 277--292 Olcay Taner Yildiz Univariate Decision Tree Induction using Maximum Margin Classification . . . . . 293--298 Gerasimos Spanakis and Georgios Siolas and Andreas Stafylopatis Exploiting Wikipedia Knowledge for Conceptual Hierarchical Clustering of Documents . . . . . . . . . . . . . . . 299--312 Mariano Rivera and Oscar Dalmau and Washington Mio and Alonso Ramirez-Manzanares Spatial Sampling for Image Segmentation 313--324 Hideki Katagiri and Ichiro Nishizaki and Tomohiro Hayashida and Takanori Kadoma Multiobjective Evolutionary Optimization of Training and Topology of Recurrent Neural Networks for Time-Series Prediction . . . . . . . . . . . . . . . 325--336 Jason J. Jung Discovering Community of Lingual Practice for Matching Multilingual Tags from Folksonomies . . . . . . . . . . . 337--346 Muhammad Raza and Farookh Khadeer Hussain and Omar Khadeer Hussain Neural Network-Based Approach for Predicting Trust Values Based on Non-uniform Input in Mobile Applications 347--378
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 379--381 Jiankun Hu and Yang Xiang and Wanlei Zhou Advances in Network and System Security: Editorial Statement . . . . . . . . . . 382--383 Leonardo B. Oliveira and Aman Kansal and Conrado P. L. Gouvêa and Diego F. Aranha and Julio López and Bodhi Priyantha and Michel Goraczko and Feng Zhao Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks . . . . . . . . . . . . 384--396 Udaya Kiran Tupakula and Vijay Varadharajan Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines . . . . . . 397--409 Shui Yu and Wanlei Zhou and Weijia Jia and Jiankun Hu Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics . . . . . . . . . . . . . . . . 410--421 Xiaoxun Sun and Hua Wang and Jiuyong Li and Yanchun Zhang Satisfying Privacy Requirements Before Data Anonymization . . . . . . . . . . . 422--437 Biming Tian and Song Han and Sazia Parvin and Jiankun Hu and Sajal Das Erratum: Self-Healing Key Distribution Schemes for Wireless Networks: a Survey 438--438 Hung-Yu Chien Improved Anonymous Multi-receiver Identity-Based Encryption . . . . . . . 439--446 Xiangyang Luo and Fenlin Liu and Chunfang Yang and Shiguo Lian and Daoshun Wang On F5 Steganography in Images . . . . . 447--456 Xinyi Huang and Yi Mu and Willy Susilo and Duncan S. Wong and Wei Wu Certificateless Signatures: New Schemes and Security Models . . . . . . . . . . 457--474 Yuh-Min Tseng and Tung-Tso Tsai Efficient Revocable ID-Based Encryption with a Public Channel . . . . . . . . . 475--486 Lina Zhu and Li Feng and Zuochang Zhang Predicting the Propagation Path of Random Worm by Subnet Infection Situation Using Fuzzy Reasoning . . . . 487--496 Lanfranco Lopriore Encrypted Pointers in Protection System Design . . . . . . . . . . . . . . . . . 497--507
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 509--511 Nihal Pekergin Introduction to the Special Issue on Probability Models in Performance Analysis . . . . . . . . . . . . . . . . 512--514 Peter Whittle Neural Memories and Oscillatory Operation . . . . . . . . . . . . . . . 515--521 Azaria Paz and Jack W. Carlyle Chaotic Evolution via Generalized Probabilistic Automata (Probabilistic Arrays) . . . . . . . . . . . . . . . . 522--533 Tien Viet Nguyen and François Baccelli A Stochastic Geometry Model for Cognitive Radio Networks . . . . . . . . 534--552 Emmanuel Hyon and Alain Jean-Marie Scheduling Services in a Queuing System with Impatience and Setup Costs . . . . 553--563 H. Castel-Taleb and I. Ismael-Aouled and N. Pekergin Bounding Aggregations for Transient and Stationary Performance Analysis of Subnetworks . . . . . . . . . . . . . . 564--576 Thu-Ha Dao-Thi and Jean-Michel Fourneau and Minh-Anh Tran Erratum: Multiple Class Symmetric G-networks with Phase Type Service Times 577--577 Mehmet Hakan Karaata and Ozgur Sinanoglu and Bader AlBdaiwi An Optimal Inherently Stabilizing $2$-Neighborhood Crash Resilient Protocol for Secure and Reliable Routing in Hypercube Networks . . . . . . . . . 578--589 Jakub Stárka and Martin Svoboda and Jan Sochna and Jirí Schejbal and Irena Mlýnková and David Bednárek Analyzer: a Complex System for Data Analysis . . . . . . . . . . . . . . . . 590--615 Supriya Aggarwal and Kavita Khare Design Techniques Targeting Low-Area-Power-Delay Product in Hyperbolic CORDIC Algorithm . . . . . . 616--628 Samuel Antão and Jean-Claude Bajard and Leonel Sousa RNS-Based Elliptic Curve Point Multiplication for Massive Parallel Architectures . . . . . . . . . . . . . 629--647
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 649--650 Wojciech Mazurczyk and Krzysztof Szczypiorski Toward Effective and Reliable Digital Forensics . . . . . . . . . . . . . . . 651--652 Jacques M. Bahi and Jean-François Couchot and Christophe Guyeux Steganography: a Class of Secure and Robust Algorithms . . . . . . . . . . . 653--666 Gaurav Bhatnagar and Q. M. Jonathan Wu and Balasubramanian Raman Image and Video Encryption based on Dual Space-Filling Curves . . . . . . . . . . 667--685 Xiaofeng Wang and Nanning Zheng and Jianru Xue and Zhenli Liu A Novel Image Signature Method for Content Authentication . . . . . . . . . 686--701 Hui Tian and Hong Jiang and Ke Zhou and Dan Feng Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography . . . . . . . . . . . . . 702--716 Chunfang Yang and Fenlin Liu and Shiguo Lian and Xiangyang Luo and Daoshun Wang Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit Plane . . 717--727 Ronaldo M. Salles and Donato A. Marino, Jr. Strategies and Metric for Resilience in Computer Networks . . . . . . . . . . . 728--739 João V. Gomes and Pedro R. M. Inácio and Manuela Pereira and Mário M. Freire and Paulo P. Monteiro Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic . . . . . . . . . . . . . . . . 740--755 Chao-Hsien Lee and Chung-Ming Huang and Chia-Ching Yang and Tai-Hsiang Wang CO-SVC-MDC-Based Cooperative Video Streaming Over Vehicular Networks . . . 756--768 Antoine Bossard and Keiichi Kaneko The Set-to-Set Disjoint-Path Problem in Perfect Hierarchical Hypercubes . . . . 769--775
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 777--778 Simon Lavington A Synopsis of the Book \booktitleAlan Turing and his Contemporaries: Building the World's First Computers . . . . . . 779--787 P. Whittle A Natural Channel Coding for the Finite and Infinite Time Axes . . . . . . . . . 788--798 Peter J. Denning Reflections on a Symposium on Computation . . . . . . . . . . . . . . 799--802 Peter J. Denning and Peter Wegner Introduction to What is Computation . . 803--804 Peter J. Denning Opening Statement: What is Computation? 805--810 Peter Wegner The Evolution of Computation . . . . . . 811--813 John S. Conery Computation is Symbol Manipulation . . . 814--816 Dennis J. Frailey Computation is Process . . . . . . . . . 817--819 Paul S. Rosenbloom Computing and Computation . . . . . . . 820--824 Ruzena Bajcsy Computation and Information . . . . . . 825--825 Dave Bacon Computation and Fundamental Physics . . 826--829 Lance Fortnow The Enduring Legacy of the Turing Machine . . . . . . . . . . . . . . . . 830--831 Alfred V. Aho Computation and Computational Thinking 832--835 Joseph Traub What is the Right Computational Model for Continuous Scientific Problems? . . 836--837 Jeffrey P. Buzen Computation, Uncertainty and Risk . . . 838--847 Erol Gelenbe Natural Computation . . . . . . . . . . 848--851 Melanie Mitchell Biological Computation . . . . . . . . . 852--855 Paolo Rocchi What is Information: Beyond the Jungle of Information Theories . . . . . . . . 856--860 Peter A. Freeman Consideration of the Question ``What Is Computation'' Considered Harmful . . . . 861--862 Peter J. Denning Closing Statement: What Have We Said About Computation? . . . . . . . . . . . 863--865 Jane Hillston and Mirco Tribastone and Stephen Gilmore Stochastic Process Algebras: from Individuals to Populations . . . . . . . 866--881 Jeremy T. Bradley and Nigel Thomas and Richard A. Hayden and Anton Stefanek Invited Response to Computer Journal Lecture by Prof. Jane Hillston . . . . . 882--886 Jinhai Cai Robust Filtering-Based Thinning Algorithm for Pattern Recognition . . . 887--896 Jie Lin and Don Adjeroh All-Against-All Circular Pattern Matching . . . . . . . . . . . . . . . . 897--906
Bharat Jayaraman Special Issue on Security and Performance of Networks and Clouds: Guest Editor's Introduction . . . . . . 907--908 Rachit Agarwal and Abhik Banerjee and Vincent Gauthier and Monique Becker and Chai Kiat Yeo and Bu Sung Lee Achieving Small-World Properties using Bio-Inspired Techniques in Wireless Networks . . . . . . . . . . . . . . . . 909--931 Yan Sun and Qiangfeng Jiang and Mukesh Singhal A Hill-Area-Restricted Geographic Routing Protocol for Mobile Ad Hoc and Sensor Networks . . . . . . . . . . . . 932--949 Omer H. Abdelrahman and Erol Gelenbe Packet Delay and Energy Consumption in Non-homogeneous Networks . . . . . . . . 950--964 Hongfang Yu and Vishal Anand and Chunming Qiao Virtual Infrastructure Design for Surviving Physical Link Failures . . . . 965--978 Antonio Muñoz and Javier Gonzalez and Antonio Maña A Performance-Oriented Monitoring System for Security Properties in Cloud Computing Applications . . . . . . . . . 979--994 Timothy Wood and K. K. Ramakrishnan and Prashant Shenoy and Jacobus Van der Merwe Enterprise-Ready Virtual Cloud Pools: Vision, Opportunities and Challenges . . 995--1004 Shivsubramani Krishnamoorthy and Preeti Bhargava and Matthew Mah and Ashok Agrawala Representing and Managing the Context of a Situation . . . . . . . . . . . . . . 1005--1019
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1021--1022 Mark Burgin and Eugene Eberbach Evolutionary Automata: Expressiveness and Convergence of Evolutionary Computation . . . . . . . . . . . . . . 1023--1029 Yang Wang and Lin Wu and Xiaodi Huang and Xuemin Lin Human Action Recognition from Video Sequences by Enforcing Tri-view Constraints . . . . . . . . . . . . . . 1030--1040 Iyad F. Jafar and Khalid A. Darabkh and Ghazi M. Al-Sukkar A Rule-Based Fuzzy Inference System for Adaptive Image Contrast Enhancement . . 1041--1057 Jianping Gou and Zhang Yi and Lan Du and Taisong Xiong A Local Mean-Based $k$-Nearest Centroid Neighbor Classifier . . . . . . . . . . 1058--1071 Alex Pappachen James and Sima Dimitrijev Nearest Neighbor Classifier Based on Nearest Feature Decisions . . . . . . . 1072--1087 Zhang Zhang and Jun Cheng and Jun Li and Wei Bian and Dacheng Tao Segment-Based Features for Time Series Classification . . . . . . . . . . . . . 1088--1102 Kui Yu and Xindong Wu and Wei Ding and Hao Wang Exploring Causal Relationships with Streaming Features . . . . . . . . . . . 1103--1117 I-Ching Hsu Semantic Tag-based Profile Framework for Social Tagging Systems . . . . . . . . . 1118--1129 Paul Conilione and Dianhui Wang Fuzzy Approach for Semantic Face Image Retrieval . . . . . . . . . . . . . . . 1130--1145
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1147--1147 Manoj Thomas and Gurpreet Dhillon Interpreting Deep Structures of Information Systems Security . . . . . . 1148--1156 Wei Wu and Yi Mu and Willy Susilo and Xinyi Huang and Li Xu A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption . . . . . . . 1157--1168 Yu-Fang Chung and Zhen-Yu Wu Casting Ballots over Internet Connection Against Bribery and Coercion . . . . . . 1169--1179 Chang Xu and Zhoujun Li and Yi Mu and Hua Guo and Tao Guo Affiliation-Hiding Authenticated Asymmetric Group Key Agreement . . . . . 1180--1191 Lin Ding and Jie Guan Cryptanalysis of Loiss Stream Cipher . . 1192--1201 Jinguang Han and Willy Susilo and Yi Mu and Jun Yan Attribute-Based Oblivious Access Control 1202--1215 Derek Pao and Xing Wang Multi-Stride String Searching for High-Speed Content Inspection . . . . . 1216--1231 Hyejin Son and Taeyoon Kang and Hwangnam Kim and Jong-Bae Park and Jae Hyung Roh A Fair and Secure Bandwidth Allocation for Ami Mesh Network in Smart Grid . . . 1232--1243 Nimalaprakasan Skandhakumar and Jason Reid and Ed Dawson and Robin Drogemuller and Farzad Salim An Authorization Framework using Building Information Models . . . . . . 1244--1264 João V. Gomes and Pedro R. M. Inácio and Manuela Pereira and Mário M. Freire and Paulo P. Monteiro Corrigendum: Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic . . . . . . . . . . 1265--1265 Paul S. Rosenbloom Erratum: Computing and Computation . . . 1266--1266
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1267--1269 Haitao Dan and Robert M. Hierons Controllability Problems in MSC-Based Testing . . . . . . . . . . . . . . . . 1270--1287 Suraj Pandey and Rajkumar Buyya Scheduling Workflow Applications Based on Multi-source Parallel Data Retrieval in Distributed Computing Networks . . . 1288--1308 Winfried K. Grassmann A Computer Built with Relays and a Mechanical Memory, and Algol . . . . . . 1309--1316 Tayfun Kucukyilmaz and Ata Turk and Cevdet Aykanat A Parallel Framework for In-Memory Construction of Term-Partitioned Inverted Indexes . . . . . . . . . . . . 1317--1330 Doohwan Oh and Won W. Ro Multi-Threading and Suffix Grouping on Massive Multiple Pattern Matching Algorithm . . . . . . . . . . . . . . . 1331--1346 Shmuel T. Klein and Dana Shapira The String-to-Dictionary Matching Problem . . . . . . . . . . . . . . . . 1347--1356 Mina Memar and Mahmood Deypir and Mohammad Hadi Sadreddini and Seyyed Mostafa Fakhrahmad An Efficient Frequent Itemset Mining Method over High-speed Data Streams . . 1357--1366 Hyungjung Seo and Jaewon Seo and Taewhan Kim Algorithms for Combined Inter- and Intra-Task Dynamic Voltage Scaling . . . 1367--1382 Jie Ding and Jane Hillston Numerically Representing Stochastic Process Algebra Models . . . . . . . . . 1383--1397 Matthias Weidlich and Remco Dijkman and Mathias Weske Behaviour Equivalence and Compatibility of Business Process Models with Complex Correspondences . . . . . . . . . . . . 1398--1418
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1419--1419 Mohamed Adel Serhani and Abdelghani Benharref and Elarbi Badidi and Salah Bouktif Scalable Federated Broker Management for Selection of Web Services . . . . . . . 1420--1439 Antoine Bossard and Keiichi Kaneko Node-to-Set Disjoint-Path Routing in Hierarchical Cubic Networks . . . . . . 1440--1446 Oguzhan Erdem and Cüneyt F. Bazlamaçci High-performance IP Lookup Engine with Compact Clustered Trie Search . . . . . 1447--1466 Chuan-Gang Liu and Chih-Hung Chao and Chih-Wen Leou and Jung-Shian Li Iterative Key Distribution Based on Mad Neighborhood in Underwater Mobile Sensor Networks . . . . . . . . . . . . . . . . 1467--1485 Dan Wang and Xiaowei Han and Hong Yang and Binbin Hao On Global Adaptive Synchronization in Weighted Complex Networks . . . . . . . 1486--1491 Debraj De and Wen-Zhan Song and Shaojie Tang and Diane Cook EAR: an Energy and Activity-Aware Routing Protocol for Wireless Sensor Networks in Smart Environments . . . . . 1492--1506 Fabíola Greve and Pierre Sens and Luciana Arantes and Véronique Simon Eventually Strong Failure Detector with Unknown Membership . . . . . . . . . . . 1507--1524 Ozgur Sinanoglu Fault Model Independent, Maximal Compaction of Test Responses in the Presence of Unknown Response Bits . . . 1525--1537
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1--1 Jan Bergstra and Jens Blanck and Faron Moller and Stan Wainer Guest Editorial . . . . . . . . . . . . 2--2 Jan A. Bergstra and Inge Bethke and Alban Ponse Cancellation Meadows: a Generic Basis Theorem and Some Applications . . . . . 3--14 Nick D. James and Jeffery Zucker A Class of Contracting Stream Operators 15--33 Maciej Gazda and Wan Fokkink Turning GSOS Rules into Equations for Linear Time-Branching Time Semantics . . 34--44 Jens Blanck Interval Domains and Computable Sequences: a Case Study of Domain Reductions . . . . . . . . . . . . . . . 45--52 Bernhard Möller Modal Knowledge and Game Semirings . . . 53--69 Zoran \Dbaruri\'c and Dragan Ga\vsevi\'c A Source Code Similarity System for Plagiarism Detection . . . . . . . . . . 70--86 Estefanía Serral and Pedro Valderas and Vicente Pelechano Context-Adaptive Coordination of Pervasive Services by Interpreting Models during Runtime . . . . . . . . . 87--114 Thi Nguyen and Zhen He and Yi-Ping Phoebe Chen S$^e$TPR$^*$-tree: Efficient Buffering for Spatiotemporal Indexes Via Shared Execution . . . . . . . . . . . . . . . 115--137
Irfan Awan Editorial: Performance Engineering of Communication Systems and Applications 139--140 S. A. Wright and S. D. Hammond and S. J. Pennycook and R. F. Bird and J. A. Herdman and I. Miller and A. Vadgama and A. Bhalerao and S. A. Jarvis Parallel File System Analysis Through Application I/O Tracing . . . . . . . . 141--155 O. F. J. Perks and D. A. Beckingsale and S. D. Hammond and I. Miller and J. A. Herdman and A. Vadgama and A. H. Bhalerao and L. He and S. A. Jarvis Towards Automated Memory Model Generation Via Event Tracing . . . . . . 156--174 Malik Jahan Khan and Mian Muhammad Awais and Shafay Shamail A Randomized Partitioning Approach for CBR-Based Autonomic Systems to Improve Retrieval Performance . . . . . . . . . 175--183 Constandinos X. Mavromoustakis and Helen D. Karatza Performance Evaluation of Opportunistic Resource-Sharing Scheme Using Socially Oriented Outsourcing in Wireless Devices 184--197 Ramon Bertran and Marc Gonz\`alez and Xavier Martorell and Nacho Navarro and Eduard Ayguadé Counter-Based Power Modeling Methods: Top-Down vs. Bottom-Up . . . . . . . . . 198--213 Sabela Ramos and Guillermo L. Taboada and Roberto R. Expósito and Juan Touriño and Ramón Doallo Design of Scalable Java Communication Middleware for Multi-Core Systems . . . 214--228 Yi Xie and J. Hu and S. Tang and X. Huang A Forward--Backward Algorithm for Nested Hidden semi-Markov Model and Application to Network Traffic . . . . . . . . . . . 229--238 Pingshan Liu and Guimin Huang and Shengzhong Feng and Jianping Fan Event-Driven High-Priority First Data Scheduling Scheme for P2P VoD Streaming 239--257 Hongbing Fan and Yu-Liang Wu and Ray C. C. Cheung Design Automation Framework for Reconfigurable Interconnection Networks 258--269
Einoshin Suzuki Special Issue on Discovery Science: Guest Editor's Introduction . . . . . . 271--273 Tobias Girschick and Ulrich Rückert and Stefan Kramer Adapted Transfer of Distance Measures for Quantitative Structure-Activity Relationships and Data-Driven Selection of Source Datasets . . . . . . . . . . . 274--288 Laura Langohr and Vid Podpe\vcan and Marko Petek and Igor Mozeti\vc and Kristina Gruden and Nada Lavra\vc and Hannu Toivonen Contrasting Subgroup Discovery . . . . . 289--303 An\vze Vavpeti\vc and Nada Lavra\vc Semantic Subgroup Discovery Systems and Workflows in the SDM-Toolkit . . . . . . 304--320 Miha Gr\vcar and Nejc Trdin and Nada Lavra\vc A Methodology for Mining Document-Enriched Heterogeneous Information Networks . . . . . . . . . . 321--335 Dongsheng Duan and Yuhua Li and Ruixuan Li and Zhengding Lu and Aiming Wen MEI: Mutual Enhanced Infinite Community-Topic Model for Analyzing Text-Augmented Social Networks . . . . . 336--354 Hiromichi Nagao and Tomoyuki Higuchi and Satoshi Miura and Daisuke Inazu Time-Series Modeling of Tide Gauge Records for Monitoring of the Crustal Activities Related to Oceanic Trench Earthquakes Around Japan . . . . . . . . 355--364 Nina Gierasimczuk and Dick de Jongh On the Complexity of Conclusive Update 365--377 Jiuyong Li and Jixue Liu and Hannu Toivonen and Jianming Yong Effective Pruning for the Discovery of Conditional Functional Dependencies . . 378--392 S. R. Kannan and S. Ramthilagam and R. Devi and Yueh-Min Huang Novel Quadratic Fuzzy $c$-Means Algorithms for Effective Data Clustering Problems . . . . . . . . . . . . . . . . 393--406
Tsz Hon Yuen and Joseph K. Liu and Man Ho Au and Willy Susilo and Jianying Zhou Efficient Linkable and/or Threshold Ring Signature Without Random Oracles . . . . 407--421 G. Vache Marconato and M. Kaâniche and V. Nicomette A Vulnerability Life Cycle-Based Security Modeling and Evaluation Approach . . . . . . . . . . . . . . . . 422--439 H. Janicke and A. Cau and F. Siewe and H. Zedan Dynamic Access Control Policies: Specification and Verification . . . . . 440--463 Mingwu Zhang and Bo Yang and Tsuyoshi Takagi Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate 464--477 Lanfranco Lopriore Protection Structures in Multithreaded Systems . . . . . . . . . . . . . . . . 478--496 Joonsang Baek and Quang Hieu Vu and Abdulhadi Shoufan and Andrew Jones and Duncan S. Wong Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure 497--507 Gianluca Dini and Marco Tiloca HISS: a HIghly Scalable Scheme for Group Rekeying . . . . . . . . . . . . . . . . 508--525
Marios C. Angelides Editorial: MPEG Applications and Services . . . . . . . . . . . . . . . . 527--528 Luis Herranz and José María Martínez Combining MPEG Tools to Generate Video Summaries Adapted to the Terminal and Network . . . . . . . . . . . . . . . . 529--553 R. Iqbal and S. Shirmohammadi and B. Hariri Modeling and Evaluation of a Metadata-Based Adaptive P2P Video-Streaming System . . . . . . . . . 554--572 Martín López-Nores and Yolanda Blanco-Fernández and José Juan Pazos-Arias Cloud-Based Personalization of New Advertising and e-Commerce Models for Video Consumption . . . . . . . . . . . 573--592 Harry Agius and Marios C. Angelides and Damon Daylamani Zad MC 2: a Framework and Service for MPEG-7 Content-Modelling Communities . . . . . 593--616 Anish Mittal and Anush K. Moorthy and Alan C. Bovik Visually Lossless H.264 Compression of Natural Videos . . . . . . . . . . . . . 617--627 D. C. Gibbon and Z. Liu and A. Basso and B. Shahraray Automated Content Metadata Extraction Services Based on MPEG Standards . . . . 628--645 Benjamin J. Ford and Haiping Xu and Iren Valova A Real-Time Self-Adaptive Classifier for Identifying Suspicious Bidders in Online Auctions . . . . . . . . . . . . . . . . 646--663 Martin Richards How BCPL Evolved from CPL . . . . . . . 664--670
John Lloyd Special Issue on Dependable Software Systems: Associate Editor's Introduction 671--673 Matthew Leeke and Arshad Jhumka and Sarabjot Singh Anand Towards the Design of Efficient Error Detection Mechanisms for Transient Data Errors . . . . . . . . . . . . . . . . . 674--692 Miguel Correia and Nuno Ferreira Neves and Paulo Verissimo BFT-TO: Intrusion Tolerance with Less Replicas . . . . . . . . . . . . . . . . 693--715 Wenbing Zhao and P. M. Melliar-Smith and L. E. Moser Low Latency Fault Tolerance System . . . 716--740 Ian J. Hayes and Alan Burns and Brijesh Dongol and Cliff B. Jones Comparing Degrees of Non-Determinism in Expression Evaluation . . . . . . . . . 741--755 Ra'ed Al-Dujaily and Terrence Mak and Kai-Pui Lam and Fei Xia and Alex Yakovlev and Chi-Sang Poon Dynamic On-Chip Thermal Optimization for Three-Dimensional Networks-On-Chip . . . 756--770 Jinpyo Hong and Hwangnam Kim A Dual Mobility Model with User Profiling: Decoupling User Mobile Patterns from Association Patterns . . . 771--784 Xiaoling Zhang and Jianguo Qian $ L(p, q) $-Labeling and Integer Flow on Planar Graphs . . . . . . . . . . . . . 785--792
José Raúl Romero and Juan Ignacio Jaén and Antonio Vallecillo A Tool for the Model-Based Specification of Open Distributed Systems . . . . . . 793--818 Manuel Abellanas and Jose M. Díaz-Báñez and Pablo Pérez-Lantero and Inmaculada Ventura Locating a Communication Path in a Competitive Scenario . . . . . . . . . . 819--826 S. S. Ili\'c and P. Spalevi\'c Using Wavelet Packets for Selectivity Estimation . . . . . . . . . . . . . . . 827--842 M. Bóo and M. Amor and R. Concheiro and M. Doggett Efficient Adaptive and Dynamic Mesh Refinement Based on a Non-recursive Strategy . . . . . . . . . . . . . . . . 843--851 O\uguzcan Dobrucali and Billur Barshan Novel Compression Algorithm Based on Sparse Sampling of $3$-D Laser Range Scans . . . . . . . . . . . . . . . . . 852--870 Eddie Cheng and Ke Qiu and Zhizhang Shen A Generating Function Approach to the Edge Surface Area of the Arrangement Graphs . . . . . . . . . . . . . . . . . 871--881 Tiziana Calamoneri and Dario Frascaria and Blerina Sinaimeri All Graphs with at Most Seven Vertices are Pairwise Compatibility Graphs . . . 882--886 E. N. Argyriou and M. A. Bekos and A. Symvonis Maximizing the Total Resolution of Graphs . . . . . . . . . . . . . . . . . 887--900 Sajjad Mahmood and Richard Lai RE-UML: a Component-Based System Requirements Analysis Language . . . . . 901--922
Min Chen and Victor C. M. Leung Green Mobile Networking and Communications . . . . . . . . . . . . . 923--925 Wei Gong and Kebin Liu and Xiaoxu Li and Xin Miao and Tong Zhu Quality of Interaction for Sensor Network Energy-Efficient Management . . 926--937 Daqiang Zhang and Zhijun Yang and Vaskar Raychoudhury and Zhe Chen and Jaime Lloret An Energy-Efficient Routing Protocol Using Movement Trends in Vehicular Ad hoc Networks . . . . . . . . . . . . . . 938--946 Jiafu Wan and Hehua Yan and Di Li and Keliang Zhou and Lu Zeng Cyber-Physical Systems for Optimal Energy Management Scheme of Autonomous Electric Vehicle . . . . . . . . . . . . 947--956 Kai Lin and Xiaofei Wang and Limei Peng and Xuan Zhu Energy-Efficient $K$-Cover Problem in Hybrid Sensor Networks . . . . . . . . . 957--967 Jiaojiao Liu and Yige Wang and Gang Wei Distributed Topology Control Based on Coalition Formation Game in Wireless Networks . . . . . . . . . . . . . . . . 968--976 Yichao Jin and Yonggang Wen and Qinghua Chen and Zuqing Zhu An Empirical Investigation of the Impact of Server Virtualization on Energy Efficiency for Green Data Center . . . . 977--990 Xiaofei Liao and Hai Jin and Jia Yu and Dingding Li A Performance Optimization Mechanism for SSD in Virtualized Environment . . . . . 991--1000 Lei Lei and Jing Zhao and Zhangdui Zhong and Kan Zheng Flow-Level Analysis of Energy Efficiency Performance for Device-to-Device Communications in OFDM Cellular Networks 1001--1009 Jing Zhang and Xi Yang and Qi Yao and Xiaohu Ge and Minho Jo and Guoqiang Mao Cooperative Energy Efficiency Modeling and Performance Analysis in Co-Channel Interference Cellular Networks . . . . . 1010--1019 Wei-Ting Cho and Ying-Xun Lai and Chin-Feng Lai and Yueh-Min Huang Appliance-Aware Activity Recognition Mechanism for IoT Energy Management System . . . . . . . . . . . . . . . . . 1020--1033 Yi Sun and Yang Guo and Yuming Ge and Shan Lu and Jihua Zhou and Eryk Dutkiewicz Improving the Transmission Efficiency by Considering Non-Cooperation in Ad Hoc Networks . . . . . . . . . . . . . . . . 1034--1042
Douglas Mota Dias and Marco Aurélio C. Pacheco Quantum-Inspired Linear Genetic Programming as a Knowledge Management System . . . . . . . . . . . . . . . . . 1043--1062 Jianping Gou and Zhang Yi Locality-Based Discriminant Neighborhood Embedding . . . . . . . . . . . . . . . 1063--1082 Jamshaid Ashraf and Omar Khadeer Hussain and Farookh Khadeer Hussain A Framework for Measuring Ontology Usage on the Web . . . . . . . . . . . . . . . 1083--1101 Fasheng Wang and Mingyu Lu Efficient Visual Tracking via Hamiltonian Monte Carlo Markov Chain . . 1102--1112 Eakasit Pacharawongsakda and Thanaruk Theeramunkong Multi-Label Classification Using Dependent and Independent Dual Space Reduction . . . . . . . . . . . . . . . 1113--1135 Erwan Le Martelot and Chris Hankin Fast Multi-Scale Detection of Relevant Communities in Large-Scale Networks . . 1136--1150
Young-Sik Jeong and Damien Sauveron and Jong Hyuk Park Advanced Security Technologies and Services for Future Computing Environments . . . . . . . . . . . . . . 1151--1153 Guangjie Han and Jinfang Jiang and Lei Shu and Mohsen Guizani and Shojiro Nishio A Two-Step Secure Localization for Wireless Sensor Networks . . . . . . . . 1154--1166 Yao-Hsin Chou and Shuo-Mao Chen and Yu-Ting Lin and Chi-Yuan Chen and Han-Chieh Chao Using GHZ-State for Multiparty Quantum Secret Sharing Without Code Table . . . 1167--1175 Bin Zhang and Jiahai Yang and Jianping Wu and Ziyu Wang MBST: Detecting Packet-Level Traffic Anomalies by Feature Stability . . . . . 1176--1188 Jong-Hyouk Lee and Thierry Ernst IPv6 Security Issues in Cooperative Intelligent Transportation Systems . . . 1189--1197 Andreu Pere Isern-Dey\`a and Arnau Vives-Guasch and Maci\`a Mut-Puigserver and Magdalena Payeras-Capell\`a and Jordi Castell\`a-Roca A Secure Automatic Fare Collection System for Time-Based or Distance-Based Services with Revocable Anonymity for Users . . . . . . . . . . . . . . . . . 1198--1215 Aikaterini Mitrokotsa and Pedro Peris-Lopez and Christos Dimitrakakis and Serge Vaudenay On Selecting the Nonce Length in Distance-Bounding Protocols . . . . . . 1216--1227 Yinghui Zhang and Xiaofeng Chen and Hui Li Key-Evolving Hierarchical ID-Based Signcryption . . . . . . . . . . . . . . 1228--1248 Yuanju Gan and Lihua Wang and Licheng Wang and Ping Pan and Yixian Yang Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie--Hellman Assumption . . . . . . . 1249--1257 Gerard Draper-Gil and Josep-Lluís Ferrer-Gomila and M. Francisca Hinarejos and Jianying Zhou An Asynchronous Optimistic Protocol for Atomic Multi-Two-Party Contract Signing 1258--1267
Wei Sun and Tao Wen and Quan Guo Improving the Start-up Performance of the TFRC Protocol . . . . . . . . . . . 1269--1278 Massimo Melucci Deriving a Quantum Information Retrieval Basis . . . . . . . . . . . . . . . . . 1279--1291 Chwan-Yi Shiah and Yun-Sheng Yen Compression of Chinese Document Images by Complex Shape Matching . . . . . . . 1292--1304 Robert M. Hierons Implementation Relations for Testing Through Asynchronous Channels . . . . . 1305--1319 Mircea Merca Binary Diagrams for Storing Ascending Compositions . . . . . . . . . . . . . . 1320--1327 Bingyue Peng and Junjie Wu and Hua Yuan and Qingwei Guo and Dacheng Tao ANEEC: a Quasi-Automatic System for Massive Named Entity Extraction and Categorization . . . . . . . . . . . . . 1328--1346 Baolei Cheng and Jianxi Fan and Xiaohua Jia and Shukui Zhang and Bangrui Chen Constructive Algorithm of Independent Spanning Trees on Möbius Cubes . . . . . 1347--1362 Ioannis Dimitriou Analysis of a Priority Retrial Queue with Dependent Vacation Scheme and Application to Power Saving in Wireless Communication Systems . . . . . . . . . 1363--1380 Stephen T. Hedetniemi and David P. Jacobs and K. E. Kennedy Linear-Time Self-Stabilizing Algorithms for Disjoint Independent Sets . . . . . 1381--1387 Ro-Yu Wu and Jou-Ming Chang and An-Hang Chen and Chun-Liang Liu Ranking and Unranking $t$-ary Trees in a Gray-Code Order . . . . . . . . . . . . 1388--1395
Jacob Beal and Stefan Dulman and Olivier Michel and Antoine Spicher Editorial . . . . . . . . . . . . . . . 1397--1398 Avgoustinos Filippoupolitis and Gokce Gorbil and Erol Gelenbe Spatial Computers for Emergency Support 1399--1416 Muhammad Jafar Sadeq and Matt Duckham and Michael F. Worboys Decentralized Detection of Topological Events in Evolving Spatial Regions . . . 1417--1431 Alan Both and Matt Duckham and Patrick Laube and Tim Wark and Jeremy Yeoman Decentralized Monitoring of Moving Objects in a Transportation Network Augmented with Checkpoints . . . . . . . 1432--1449 David H. Ackley and Daniel C. Cannon and Lance R. Williams A Movable Architecture for Robust Spatial Computing . . . . . . . . . . . 1450--1468 Qingzhi Liu and Andrei Pruteanu and Stefan Dulman Gradient-Based Distance Estimation for Spatial Computers . . . . . . . . . . . 1469--1499 Jacob Beal and Kyle Usbeck and Brett Benyo On the Evaluation of Space--Time Functions . . . . . . . . . . . . . . . 1500--1517 D. Rincón and A. Agustí-Torra and J. F. Botero and F. Raspall and D. Remondo and X. Hesselbach and M. T. Beck and H. de Meer and F. Niedermeier and G. Giuliani A Novel Collaboration Paradigm for Reducing Energy Consumption and Carbon Dioxide Emissions in Data Centres . . . 1518--1536
Reinaldo A. Vallejos C. and José M. Martínez V. A Fast Transformation of Markov Chains and Their Respective Steady-State Probability Distributions . . . . . . . 1--11 Artem Polyvyanyy and Luciano García-Bañuelos and Dirk Fahland and Mathias Weske Maximal Structuring of Acyclic Process Models . . . . . . . . . . . . . . . . . 12--35 Juan de Lara and Esther Guerra and Ruth Cobos and Jaime Moreno-Llorena Extending Deep Meta-Modelling for Practical Model-Driven Engineering . . . 36--58 Arnold L. Rosenberg Region Management by Finite-State Robots 59--72 Michel A. Reniers and Rob Schoren and Tim A. C. Willemse Results on Embeddings Between State-Based and Event-Based Systems . . 73--92 Jinn-Shyong Yang and Jou-Ming Chang Optimal Independent Spanning Trees on Cartesian Product of Hybrid Graphs . . . 93--99 Iván Cores and Gabriel Rodríguez and Patricia González and María J. Martín Failure Avoidance in MPI Applications Using an Application-Level Approach . . 100--114 Yongjian Li and Naiju Zeng and William N. N. Hung and Xiaoyu Song Combining Symmetry Reduction with Generalized Symbolic Trajectory Evaluation . . . . . . . . . . . . . . . 115--128 K. Subramani and James Worthington On Certifying Instances of Zero-Clairvoyant Scheduling . . . . . . 129--137 Alev Mutlu and Pinar Senkul Improving Hit Ratio of ILP-based Concept Discovery System with Memoization . . . 138--153 Kewen Liao and Hong Shen LP-Based Approximation Algorithms for Reliable Resource Allocation . . . . . . 154--164 Oana Agrigoroaiei and Gabriel Ciobanu Rewriting Systems Over Indexed Multisets 165--179
Jongsung Kim and Bo Hong and Naveen Chilamkurti Advanced Computer Technologies and Applications in Grid and Cloud Computing 181--182 Haibin Zhai and Albert K. Wong and Hai Jiang and Yi Sun and Jun Li and Zhongcheng Li A Node-Link-Based P2P Cache Deployment Algorithm in ISP Networks . . . . . . . 183--194 Ahmed Sallam and Kenli Li A Multi-objective Virtual Machine Migration Policy in Cloud Systems . . . 195--204 Aun Irtaza and M. Arfan Jaffar and Muhammad Tariq Mahmood Semantic Image Retrieval in a Grid Computing Environment Using Support Vector Machines . . . . . . . . . . . . 205--216 Hong-Chang Lee and Jong-Eun Park and Myung-Joon Lee C3ware: a Middleware Supporting Collaborative Services over Cloud Storage . . . . . . . . . . . . . . . . 217--224 Lin Yao and Guowei Wu and Jiankang Ren and Yanwei Zhu and Ying Li Guaranteeing Fault-Tolerant Requirement Load Balancing Scheme Based on VM Migration . . . . . . . . . . . . . . . 225--232 Joon-Sang Park and Seung Jun Baek and Kyogu Lee A Highly Parallelized Decoder for Random Network Coding leveraging GPGPU . . . . 233--240 Ayad Ibrahim and Hai Jin and Ali A. Yassin and Deqing Zou and Peng Xu Towards Efficient Yet Privacy-Preserving Approximate Search in Cloud Computing 241--254 Hong-Yi Chang and Hsin-Che Lu and Yu-Huei Huang and Yuan-Wei Lin and Yih-Jou Tzang Novel Auction Mechanism with Factor Distribution Rule for Cloud Resource Allocation . . . . . . . . . . . . . . . 255--262 Yong Tae Park and Pranesh Sthapit and Jae-Young Pyun Energy Efficient Data Fragmentation for Ubiquitous Computing . . . . . . . . . . 263--272 Juan Caubet and Carlos Gañán and Oscar Esparza and Jose L. Muñoz and Jorge Mata-Díaz and Juanjo Alins Certificate Revocation List Distribution System for the KAD Network . . . . . . . 273--280 Neeraj Kumar and Naveen Chilamkurti and Sherali Zeadally and Young-Sik Jeong Achieving Quality of Service (QoS) Using Resource Allocation and Adaptive Scheduling in Cloud Computing with Grid Support . . . . . . . . . . . . . . . . 281--290 Zhipiao Liu and Shangguang Wang and Qibo Sun and Hua Zou and Fangchun Yang Cost-Aware Cloud Service Request Scheduling for SaaS Providers . . . . . 291--301 Hwamin Lee and Doosoon Park A Grid Service-Based Virtual Screening System . . . . . . . . . . . . . . . . . 302--307 Tien-Dung Nguyen and An Thuy Nguyen and Man Doan Nguyen and Mui Van Nguyen and Eui-Nam Huh An Improvement of Resource Allocation for Migration Process in Cloud Environment . . . . . . . . . . . . . . 308--318 D. Piso and J. D. Bruguera Obtaining Accurate Error Expressions and Bounds for Floating-Point Multiplicative Algorithms . . . . . . . . . . . . . . . 319--331 Antoine Bossard and Keiichi Kaneko Set-to-Set Disjoint Paths Routing in Hierarchical Cubic Networks . . . . . . 332--337
Hyun-Chul Kim and Jaewook Lee and Daewon Lee Transductive Gaussian Processes with Applications to Object Pose Estimation 339--346 Fabrizio Riguzzi Speeding Up Inference for Probabilistic Logic Programs . . . . . . . . . . . . . 347--363 Linjia Sun and Xiaohui Liang and Qinping Zhao Recursive Templates Segmentation and Exemplars Matching for Human Parsing . . 364--377 Beaux P. Sharifi and David I. Inouye and Jugal K. Kalita Summarization of Twitter Microblogs . . 378--402 Rachel Chasin and Daryl Woodward and Jeremy Witmer and Jugal Kalita Extracting and Displaying Temporal and Geospatial Entities from Articles on Historical Events . . . . . . . . . . . 403--426 John Reeder and Michael Georgiopoulos Generative Neural Networks for Multi-task Life-Long Learning . . . . . 427--450 Pitipong Chanloha and Jatuporn Chinrungrueng and Wipawee Usaha and Chaodit Aswakul Cell Transmission Model-Based Multiagent Q-Learning for Network-Scale Signal Control With Transit Priority . . . . . 451--468 Ahmed Kheiri and Ender Özcan Constructing Constrained-Version of Magic Squares Using Selection Hyper-heuristics . . . . . . . . . . . . 469--479
Fuchun Guo and Yi Mu and Willy Susilo and Vijay Varadharajan Server-Aided Signature Verification for Lightweight Devices . . . . . . . . . . 481--493 Salman Niksefat and Babak Sadeghiyan and Payman Mohassel and Saeed Sadeghian ZIDS: a Privacy-Preserving Intrusion Detection System Using Secure Two-Party Computation Protocols . . . . . . . . . 494--509 Juan Manuel González Nieto and Mark Manulis and Dongdong Sun Forward-Secure Hierarchical Predicate Encryption . . . . . . . . . . . . . . . 510--536 Monowar H. Bhuyan and H. J. Kashyap and D. K. Bhattacharyya and J. K. Kalita Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions . . . . . . . . . . . . . . . 537--556 Tao Han and Weiming Zhang and Chao Wang and Nenghai Yu and Yuefei Zhu Adaptive $ \pm 1 $ Steganography in Extended Noisy Region . . . . . . . . . 557--566 Shengke Zeng and Shaoquan Jiang A New Framework for Conditionally Anonymous Ring Signature . . . . . . . . 567--578 Jinguang Han and Willy Susilo and Yi Mu and Jun Yan Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing . . 579--591 Limin Shen and Futai Zhang and Yinxia Sun Efficient Revocable Certificateless Encryption Secure in the Standard Model 592--601 Prasanta Gogoi and D. K. Bhattacharyya and B. Borah and Jugal K. Kalita MLH-IDS: a Multi-Level Hybrid Intrusion Detection Method . . . . . . . . . . . . 602--623 Faezeh Sadat Babamir and Ali Norouzi Achieving Key Privacy and Invisibility for Unattended Wireless Sensor Networks in Healthcare . . . . . . . . . . . . . 624--635 Huaqun Wang Insecurity of `Improved Anonymous Multi-Receiver Identity-Based Encryption' . . . . . . . . . . . . . . 636--638
Joshua Amavi and Béatrice Bouchou and Agata Savary On Correcting XML Documents with Respect to a Schema . . . . . . . . . . . . . . 639--674 Rekai González-Alberquilla and Fernando Emmanuel Frati and Luis Piñuel and Karin Strauss and Luis Ceze Data Race Detection with Minimal Hardware Support . . . . . . . . . . . . 675--692 Victor Khomenko and Andrey Mokhov Direct Construction of Complete Merged Processes . . . . . . . . . . . . . . . 693--707 Chao Zhu and Qiang Zhu and Calisto Zuzarte Optimization of Monotonic Linear Progressive Queries Based on Dynamic Materialized Views . . . . . . . . . . . 708--730 Kuei-Hao Chen and Guan-Shieng Huang and Richard Chia-Tung Lee Bit-Parallel Algorithms for Exact Circular String Matching . . . . . . . . 731--743 Lijun Lun and Xin Chi and Hui Xu The Relationship between Forward Slicing and Backward Slicing for Software Architecture . . . . . . . . . . . . . . 744--758 Patrick Graydon and Iain Bate Realistic Safety Cases for the Timing of Systems . . . . . . . . . . . . . . . . 759--774 Rada Chirkova Combined-Semantics Equivalence and Minimization of Conjunctive Queries . . 775--795
Juan A. Rodriguez-Aguilar Special Issue on Optimization in Multi-Agent Systems: Guest Editor's Introduction . . . . . . . . . . . . . . 797--798 Jesus Cerquides and Alessandro Farinelli and Pedro Meseguer and Sarvapali D. Ramchurn A Tutorial on Optimization for Multi-Agent Systems . . . . . . . . . . 799--824 Sejoon Lim and Daniela Rus Congestion-Aware Multi-Agent Path Planning: Distributed Algorithm and Applications . . . . . . . . . . . . . . 825--839 Hala Mostafa and Partha Pal and Patrick Hurley Message Passing for Distributed QoS-Security Tradeoffs . . . . . . . . . 840--855 Meritxell Vinyals and Kathryn S. Macarthur and Alessandro Farinelli and Sarvapali D. Ramchurn and Nicholas R. Jennings A Message-Passing Approach to Decentralized Parallel Machine Scheduling . . . . . . . . . . . . . . . 856--874 Archie C. Chapman and David S. Leslie and Alex Rogers and Nicholas R. Jennings Learning in Unknown Reward Games: Application to Sensor Networks . . . . . 875--892 Jason Tsai and Thanh H. Nguyen and Nicholas Weller and Milind Tambe Game-Theoretic Target Selection in Contagion-Based Domains . . . . . . . . 893--905 Christian Bessiere and Ismel Brito and Patricia Gutierrez and Pedro Meseguer Global Constraints in Distributed Constraint Satisfaction and Optimization 906--923 Faisal Iradat and Sergey Andreev and Sayeed Ghani and Syed Irfan Nabi and Waseem Arain Revisiting Assumptions in Backoff Process Modeling and Queueing Analysis of Wireless Local Area Networks (WLANs) 924--938 Shih-Chang Huang D$^2$PS: Direction and Distance Positioning System in Wireless Networks 939--951
Shan Ling and Weidong Chen Node-to-Set Disjoint Paths in Biswapped Networks . . . . . . . . . . . . . . . . 953--967 Gloria Ortega and Francisco Vázquez and Inmaculada García and Ester M. Garzón FastSpMM: an Efficient Library for Sparse Matrix Matrix Product on GPUs . . 968--979 Sushanta Karmakar and A. Chandrakanth Reddy An Improved Algorithm for Distributed Trigger Counting in Ring . . . . . . . . 980--986 Haitao Dan and Robert M. Hierons The Oracle Problem When Testing from MSCs . . . . . . . . . . . . . . . . . . 987--1001 Anthony Danalis and Piotr Luszczek and Gabriel Marin and Jeffrey S. Vetter and Jack Dongarra BlackjackBench: Portable Hardware Characterization with Automated Results' Analysis . . . . . . . . . . . . . . . . 1002--1016 Pablo Llopis and Javier Garcia Blas and Florin Isaila and Jesus Carretero Survey of Energy-Efficient and Power-Proportional Storage Systems . . . 1017--1032 Hui Kong and Xiaoyu Song and Dong Han and Ming Gu and Jiaguang Sun A New Barrier Certificate for Safety Verification of Hybrid Systems . . . . . 1033--1045 Frank Zeyda and Lalkhumsanga Lalkhumsanga and Ana Cavalcanti and Andy Wellings Circus Models for Safety-Critical Java Programs . . . . . . . . . . . . . . . . 1046--1091 Jiufeng Zhou and Lixin Han and Yuan Yao and Xiaoqin Zeng and Feng Xu A Parallel Approach to Link Sign Prediction in Large-Scale Online Social Networks . . . . . . . . . . . . . . . . 1092--1104 Janardan Misra A Calculus of Incomplete Fusions . . . . 1105--1116
Dilek Demirbas and Ismail Akturk and Ozcan Ozturk and U\ugur Güdükbay Application-Specific Heterogeneous Network-on-Chip Design . . . . . . . . . 1117--1131 Arta Babaee and Moez Draief Distributed Multivalued Consensus . . . 1132--1140 Libo Huang and Zhiying Wang and Nong Xiao and Qiang Dou Efficient Utilization of SIMD Engines for General-Purpose Processors . . . . . 1141--1154 David Poulain and Joanna Tomasik and Marc-Antoine Weisser and Dominique Barth A Packing Problem Approach to Lightpath Assignment in an Optical Ring . . . . . 1155--1166 Waheed Yasin and Hamidah Ibrahim and Nur Izura Udzir and Nor Asilah Wati Abdul Hamid An Overview of Media Streams Caching in Peer-to-Peer Systems . . . . . . . . . . 1167--1177 Yan Cui and Yingxin Wang and Yu Chen and Yuanchun Shi Mitigating Resource Contention on Multicore Systems via Scheduling . . . . 1178--1194 Wassim Ramadan and Eugen Dedu and Julien Bourgeois Oscillation-Free Video Adaptation at Application Layer on Server Side and Experiments Using DCCP . . . . . . . . . 1195--1210 Pingshan Liu and Shengzhong Feng and Guimin Huang and Jianping Fan Bandwidth-Availability-Based Replication Strategy for P2P VoD Systems . . . . . . 1211--1229 A. Ouqour and Y. Jabrane and B. Ait Es Said and A. Ait Ouahman PAPR Reduction in OFDM via Active Constellation Extension--Projection Onto Convex Sets Combined with Particle Swarm Optimization . . . . . . . . . . . . . . 1230--1237 Marjan Radi and Behnam Dezfouli and Kamalrulnizam Abu Bakar and Shukor Abd Razak and Malrey Lee Network Initialization in Low-Power Wireless Networks: a Comprehensive Study 1238--1261 Chathuranga Widanapathirana and Jonathan C. Li and Milosh V. Ivanovich and Paul G. Fitzpatrick and Y. Ahmet \cSekercio\uglu Adaptive Statistical Signatures of Network Soft-Failures in User Devices 1262--1278
Guandong Xu and Aoying Zhou and Nitin Agarwal Special Issue on Social Computing and its Applications . . . . . . . . . . . . 1279--1280 Ming Gao and Cheqing Jin and Weining Qian and Xueqing Gong Real-time and Personalized Search over a Microblogging System . . . . . . . . . . 1281--1295 Micha\l K. Szczerbak and François Toutain and Ahmed Bouabdallah and Jean-Marie Bonnin KRAMER: New Social Medium Based on Collaborative Recognition of Important Situations . . . . . . . . . . . . . . . 1296--1317 Hongbo Chen and Jungang Xu and Ben He Automated Essay Scoring by Capturing Relative Writing Quality . . . . . . . . 1318--1330 Jianshan Sun and Jian Ma and Zhiying Liu and Yajun Miao Leveraging Content and Connections for Scientific Article Recommendation in Social Computing Contexts . . . . . . . 1331--1342 Zhiang Wu and Jie Cao and Junjie Wu and Youquan Wang and Chunyang Liu Detecting Genuine Communities from Large-Scale Social Networks: a Pattern-Based Method . . . . . . . . . . 1343--1357 Longbing Cao Non-IIDness Learning in Behavioral and Social Data . . . . . . . . . . . . . . 1358--1370 Mostafa Haghir Chehreghani An Efficient Algorithm for Approximate Betweenness Centrality Computation . . . 1371--1382 Abraham Varghese and Kannan Balakrishnan and Reji Rajan Varghese and Joseph S. Paul Content-Based Image Retrieval of Axial Brain Slices Using a Novel LBP with a Ternary Encoding . . . . . . . . . . . . 1383--1394 Huiyu Zhou and Kotaro Hirasawa Traffic Density Prediction with Time-Related Data Mining using Genetic Network Programming . . . . . . . . . . 1395--1414 Haoran Xie and Qing Li and Xudong Mao and Xiaodong Li and Yi Cai and Qianru Zheng Mining Latent User Community for Tag-Based and Content-Based Search in Social Media . . . . . . . . . . . . . . 1415--1430 Qibin Duan and Dirk P. Kroese and Tim Brereton and Aaron Spettl and Volker Schmidt Inverting Laguerre Tessellations . . . . 1431--1440
Chin-Chen Chang and Ting-Fang Cheng A Secure Diverse Ticket-Sale System in a Distributed Cloud Environment . . . . . 1441--1459 Lourdes López-García and Luis J. Dominguez Perez and Francisco Rodríguez-Henríquez A Pairing-Based Blind Signature E-Voting Scheme . . . . . . . . . . . . . . . . . 1460--1471 Hui Cui and Yi Mu and Man Ho Au Signcryption Secure Against Linear Related-Key Attacks . . . . . . . . . . 1472--1483 Duygu Karao\uglan and Albert Levi A Survey on the Development of Security Mechanisms for Body Area Networks . . . 1484--1512 Long Ngo and Colin Boyd and Juan González Nieto Automated Proofs for Computational Indistinguishability . . . . . . . . . . 1513--1536 Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao CCA-Secure IB--KEM from Identity-Based Extractable Hash Proof System . . . . . 1537--1556 Ren-Junn Hwang and Yu-Kai Hsiao Anonymous Routing Protocol Based on Weil Pairing for Wireless Mesh Networks . . . 1557--1569 Shaoquan Jiang On Unconditional $ \mu $-Security of Private Key Encryption . . . . . . . . . 1570--1579 Chang Xu and Hua Guo and Zhoujun Li and Yi Mu Affiliation-Hiding Authenticated Asymmetric Group Key Agreement Based on Short Signature . . . . . . . . . . . . 1580--1590
Joaquim Gabarro and Maria Serna and Alan Stewart Analysing Web-Orchestrations Under Stress Using Uncertainty Profiles . . . 1591--1615 Tiziana Calamoneri and Antonio Frangioni and Blerina Sinaimeri Pairwise Compatibility Graphs of Caterpillars . . . . . . . . . . . . . . 1616--1623 Daniel Lemire and Owen Kaser Strongly Universal String Hashing is Fast . . . . . . . . . . . . . . . . . . 1624--1638 Chia-Lin Lee and Tzong-Jye Liu A Self-Stabilizing Distance-$2$ Edge Coloring Algorithm . . . . . . . . . . . 1639--1648 Billur Barshan and Murat Cihan Yüksek Recognizing Daily and Sports Activities in Two Open Source Machine Learning Environments Using Body-Worn Sensor Units . . . . . . . . . . . . . . . . . 1649--1667 Antonio L. Bajuelos and Sergey Bereg and Mafalda Martins Guarding Orthogonal Galleries with Rectangular Rooms . . . . . . . . . . . 1668--1673 Rui Zhou and Chengfei Liu and Jianxin Li and Junhu Wang and Jeffrey Xu Yu Evaluating Irredundant Maximal Contained Rewritings for XPath Queries on Views 1674--1692 Peter G. Harrison and Andrea Marin Product-Forms in Multi-Way Synchronizations . . . . . . . . . . . . 1693--1710 Sheau-Ru Tong and Yuan-Tse Yu Adaptation of Near-Perfect Packet-Level FEC Interleaving in Mobile Media Streaming . . . . . . . . . . . . . . . 1711--1722 Qingting Wei and Jihong Guan and Shuigeng Zhou and Xin Wang A New and Effective Approach to GML Documents Compression . . . . . . . . . 1723--1740 David Novak and Pavel Zezula Performance Study of Independent Anchor Spaces for Similarity Searching . . . . 1741--1755 Xu Yang and Deyuan Guo and Hu He and Haijing Tang and Yanjun Zhang An Implementation of Message-Passing Interface over VxWorks for Real-Time Embedded Multi-Core Systems . . . . . . 1756--1764
Raed Al-Zubi and Mohammed Hawa and Ghazi Al-Sukkar and Khalid A. Darabkh Markov-Based Distributed Approach for Mitigating Self-Coexistence Problem in IEEE 802.22 WRANs . . . . . . . . . . . 1765--1775 Hong-Yi Chang and Chih-Chun Lai and Yuan-Wei Lin A Fast SVC-Based Channel-Recommendation System for an IPTV on a Cloud and P2P Hybrid Platform . . . . . . . . . . . . 1776--1789 Sain Saginbekov and Arshad Jhumka Towards Efficient Stabilizing Code Dissemination in Wireless Sensor Networks . . . . . . . . . . . . . . . . 1790--1816 Hwangnam Kim and Hwantae Kim and Wonkyun Park and Mungyu Bae Disabling Misbehavior with Traffic Constraints in WLANs . . . . . . . . . . 1817--1833 Heejung Yang and Chin-Wan Chung Efficient Iceberg Query Processing in Sensor Networks . . . . . . . . . . . . 1834--1851 Orhan Dagdeviren and Vahid Khalilpour Akram An Energy-Efficient Distributed Cut Vertex Detection Algorithm for Wireless Sensor Networks . . . . . . . . . . . . 1852--1869 Marco Beccuti and Giuliana Franceschinis and Daniele Codetta-Raiteri and Serge Haddad Computing Optimal Repair Strategies by Means of NdRFT Modeling and Analysis . . 1870--1892 Prem Nath and Chiranjeev Kumar Mobility Management Scheme for Fixed Mobility Pattern Mobile Users in IPv4 Networks . . . . . . . . . . . . . . . . 1893--1911 V. S. Felix Enigo and V. Ramachandran Enhancing the Scalability of Non-Spatial Concurrent Queries in Wireless Sensor Networks . . . . . . . . . . . . . . . . 1912--1924
Nikolay Grozev and Rajkumar Buyya Performance Modelling and Simulation of Three-Tier Applications in Cloud and Multi-Cloud Environments . . . . . . . . 1--22 Marco Beccuti and Chiara Fornari and Giuliana Franceschinis and Sami M. Halawani and Omar Ba-Rukab and Ab Rahman Ahmad and Gianfranco Balbo From Symmetric Nets to Differential Equations exploiting Model Symmetries 23--39 Shenlu Wang and Muhammad Aamir Cheema and Xuemin Lin Efficiently Monitoring Reverse $k$-Nearest Neighbors in Spatial Networks . . . . . . . . . . . . . . . . 40--56 Gianfranco Balbo and Maria Grazia Vigliotti On the Analysis of a M/M/1 Queue with Bulk Services . . . . . . . . . . . . . 57--74 Zhe Chen Control Systems on Automata and Grammars 75--94 James Pallister and Simon J. Hollis and Jeremy Bennett Identifying Compiler Options to Minimize Energy Consumption for Embedded Platforms . . . . . . . . . . . . . . . 95--109 Yang Wang and Hua Li and Menglan Hu Reusing Garbage Data for Efficient Workflow Computation . . . . . . . . . . 110--125 James G. Dowty SMML Estimators for $1$-Dimensional Continuous Data . . . . . . . . . . . . 126--133 Michal Klempa and Michal Kozak and Mário Mikula and Robert Smetana and Jakub Starka and Michal \vSvirec and Matej Vitásek and Martin Ne\vcaský and Irena Holubova (Mlýnková) jInfer: a Framework for XML Schema Inference . . . . . . . . . . . . . . . 134--156 Albert Corominas and Alberto García-Villoria and Rafael Pastor Technical Note: Relating to the Parameter Values Given by Nelder and Mead in their Algorithm . . . . . . . . 157--159 Antonio Leslie Bajuelos and Santiago Canales and Gregorio Hernández and Mafalda Martins and Inês Matos Some Results on Open-Edge and Open Mobile Guarding of Polygons and Triangulations . . . . . . . . . . . . . 160--171
Omar Alsaleh and Bella Bose and Bechir Hamdaoui One-to-Many Node-Disjoint Paths Routing in Dense Gaussian Networks . . . . . . . 173--187 Chung-Ming Huang and Yih-Chung Chen and Shih-Yang Lin Packet Scheduling and Congestion Control Schemes for Multipath Datagram Congestion Control Protocol . . . . . . 188--203 O\uguzhan Erdem and Aydin Carus and Hoang Le Value-Coded Trie Structure for High-Performance IPv6 Lookup . . . . . . 204--214 P. Cappanera and A. Lori and G. Stea and G. Vaglini On the Schedulability of Deadline-Constrained Traffic in TDMA Wireless Mesh Networks . . . . . . . . . 215--233 Sami Habib and Paulvanna N. Marimuthu and Naser Zaeri Carbon-aware Enterprise Network through Redesign . . . . . . . . . . . . . . . . 234--245 Sen Su and Qingjia Huang and Jian Li and Xiang Cheng and Peng Xu and Kai Shuang Enhanced Energy-Efficient Scheduling for Parallel Tasks Using Partial Optimal Slacking . . . . . . . . . . . . . . . . 246--257 S. A. Abid and Mazliza Othman and Nadir Shah and Mazhar Ali and A. R. Khan 3D-RP: a DHT-Based Routing Protocol for MANETs . . . . . . . . . . . . . . . . . 258--279 Islam Elgedawy CRESCENT: a Reliable Framework for Durable Composite Web Services Management . . . . . . . . . . . . . . . 280--299 Mostafa Rezvani and Mohammad Kazem Akbari and Bahman Javadi Resource Allocation in Cloud Computing Environments Based on Integer Linear Programming . . . . . . . . . . . . . . 300--314 Chien-Fu Cheng and Hsien-Chun Liao A Malicious-Resilient Protocol for Consistent Scheduling Problem in the Cloud Computing Environment . . . . . . 315--330 Mirka Miller and R. Sundara Rajan and N. Parthiban and Indra Rajasingh Minimum Linear Arrangement of Incomplete Hypercubes . . . . . . . . . . . . . . . 331--337 Shih-Chang Huang and Hong-Yi Chang A Bidirectional Route Repair Method for Wireless Mobile Ad Hoc Networks . . . . 338--353
Slim Kallel and Mohamed Jmaiel and Sumitra Reddy Enabling Technologies: Infrastructure for Collaborative Enterprises . . . . . 355--355 Wassim Derguech and Sami Bhiri and Souleiman Hasan and Edward Curry Using Formal Concept Analysis for Organizing and Discovering Sensor Capabilities . . . . . . . . . . . . . . 356--367 Zahra Movahedi and Walid Gaaloul and Sami Bhiri and Bruno Defude Assisting Sensor-Based Application Design and Instantiation Using Activity Recommendation . . . . . . . . . . . . . 368--384 Afef Jmal Maâlej and Moez Krichen Study on the Limitations of WS-BPEL Compositions Under Load Conditions . . . 385--402 Ines Houidi and Wajdi Louati and Djamal Zeghlache Exact Multi-Objective Virtual Network Embedding in Cloud Environments . . . . 403--415 Ryszard Janicki and Mohammad Hadi Soudkhah On Classification with Pairwise Comparisons, Support Vector Machines and Feature Domain Overlapping . . . . . . . 416--431 María Arsuaga-Ríos and Miguel A. Vega-Rodríguez Multiobjective Small-World Optimization for Energy Saving in Grid Environments 432--447 Ajay Kumar and Anil Kumar Verma An Improved Algorithm for the Metamorphosis of Semi-Extended Regular Expressions to Deterministic Finite Automata . . . . . . . . . . . . . . . . 448--456 Lei Du and Qinbao Song and Lei Zhu and Xiaoyan Zhu A Selective Detector Ensemble for Concept Drift Detection . . . . . . . . 457--471 Omar Khadeer Hussain and Zia-ur- Rahman and Farookh Khadeer Hussain and Jaipal Singh and Naeem Khalid Janjua and Elizabeth Chang A User-Based Early Warning Service Management Framework in Cloud Computing 472--496 Jianxin Li and Chengfei Liu and Rui Zhou and Jeffrey Xu Yu Query-Driven Frequent Co-Occurring Term Computation over Relational Data Using MapReduce . . . . . . . . . . . . . . . 497--513
Zhiyong Zhang Security, Trust and Risk in Multimedia Social Networks . . . . . . . . . . . . 515--517 Constantinos Patsakis and Athanasios Zigomitros and Achilleas Papageorgiou and Agusti Solanas Privacy and Security for Multimedia Content shared on OSNs: Issues and Countermeasures . . . . . . . . . . . . 518--535 Hui Zhu and Cheng Huang and Hui Li Information Diffusion Model Based on Privacy Setting in Online Social Networking Services . . . . . . . . . . 536--548 Hong Zhu and Shengli Tian and Kevin Lü Privacy-Preserving Data Publication with Features of Independent $ \ell $-Diversity . . . . . . . . . . . . . . 549--571 WeiTao Song and Bin Hu Approach to Detecting Type-Flaw Attacks Based on Extended Strand Spaces . . . . 572--587 Bin Yang and Xingming Sun and Xianyi Chen and Jianjun Zhang and Xu Li Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows 588--600 Ayesha Kanwal and Rahat Masood and Muhammad Awais Shibli and Rafia Mumtaz Taxonomy for Trust Models in Cloud Computing . . . . . . . . . . . . . . . 601--626 Qingqi Pei and Dingyu Yan and Lichuan Ma and Zi Li and Yang Liao A Strong and Weak Ties Feedback-Based Trust Model in Multimedia Social Networks . . . . . . . . . . . . . . . . 627--643 Zhen Yang and Kaiming Gao and Kefeng Fan and Yingxu Lai Sensational Headline Identification By Normalized Cross Entropy-Based Metric 644--655 Hui Lin and Jia Hu and Jianfeng Ma and Li Xu and Li Yang CRM: a New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks . . . . . . . . . . . . . . . . 656--667 Zhiyong Zhang and Kanliang Wang A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks . . . . . . . 668--678 V. Natarajan and Shina Sheen and R. Anitha Multilevel Analysis to Detect Covert Social Botnet in Multimedia Social Networks . . . . . . . . . . . . . . . . 679--687 Guowei Wu and Zuosong Liu and Lin Yao and Jing Deng and Jie Wang A Trust Routing for Multimedia Social Networks . . . . . . . . . . . . . . . . 688--699 Danmei Niu and Lanlan Rui and Cheng Zhong and Xuesong Qiu A Composition and Recovery Strategy for Mobile Social Network Service in Disaster . . . . . . . . . . . . . . . . 700--708 Volkmar Lotz and Francesco Di Cerbo and Michele Bezzi and Samuel Paul Kaluvuri and Antonino Sabetta and Slim Trabelsi Security Certification for Service-Based Business Ecosystems . . . . . . . . . . 709--723 Qiang Tang and Hua Ma and Xiaofeng Chen Extend the Concept of Public Key Encryption with Delegated Search . . . . 724--734 Mingwu Zhang and Chunzhi Wang and Tsuyoshi Takagi and Yi Mu Functional Encryption Resilient to Hard-to-Invert Leakage . . . . . . . . . 735--749 Yuh-Min Tseng and Tung-Tso Tsai and Sen-Shan Huang Leakage-Free ID-Based Signature . . . . 750--757 M. Francisca Hinarejos and Andreu Pere Isern-Dey\`a and Josep-Lluís Ferrer-Gomila and Magdalena Payeras-Capell\`a MC-2D: an Efficient and Scalable Multicoupon Scheme . . . . . . . . . . . 758--778 Ying-Kai Tang and Sherman S. M. Chow and Joseph K. Liu Comments on `Efficient Revocable Certificateless Encryption Secure in the Standard Model' . . . . . . . . . . . . 779--781 Lanfranco Lopriore Password Capabilities Revisited . . . . 782--791 Ke Gu and Weijia Jia and Chunlin Jiang Efficient Identity-Based Proxy Signature in the Standard Model . . . . . . . . . 792--807 Debasish Das and Utpal Sharma and D. K. Bhattacharyya Detection of Cross-Site Scripting Attack under Multiple Scenarios . . . . . . . . 808--822 Xinyu Fan and Guomin Yang and Yi Mu and Yong Yu On Indistinguishability in Remote Data Integrity Checking . . . . . . . . . . . 823--830 Alptekin Küpçü Official Arbitration with Secure Cloud Storage Application . . . . . . . . . . 831--852 Jiguo Li and Huiyun Teng and Xinyi Huang and Yichen Zhang and Jianying Zhou A Forward-Secure Certificate-Based Signature Scheme . . . . . . . . . . . . 853--866 Yong Yu and Man Ho Au and Yi Mu and Willy Susilo and Huai Wu Secure Delegation of Signing Power from Factorization . . . . . . . . . . . . . 867--877 Hai L. Vu and Kenneth K. Khaw and Tsong Yueh Chen A New Approach for Network Vulnerability Analysis . . . . . . . . . . . . . . . . 878--891 Stavros N. Shiaeles and Maria Papadaki FHSD: an Improved IP Spoof Detection Method for Web DDoS Attacks . . . . . . 892--903 Huacui Liu and Chenhui Jin Lower Bounds of Differential and Linear Active $S$-boxes for $3$D-like Structure 904--921 Yu-Chi Chen SPEKS: Secure Server-Designation Public Key Encryption with Keyword Search against Keyword Guessing Attacks . . . . 922--933 Cheng-Chi Lee and Yan-Ming Lai Toward a Secure Single Sign-On Mechanism for Distributed Computer Networks . . . 934--943 Franco Frattolillo Watermarking Protocols: Problems, Challenges and a Possible Solution . . . 944--960 Abdulah Abdulah Zadeh and Howard M. Heys Application of Simple Power Analysis to Stream Ciphers Constructed Using Feedback Shift Registers . . . . . . . . 961--972 Haider Salim Hmood and Zhitang Li and Hasan Khalaf Abdulwahid and Yang Zhang Adaptive Caching Approach to Prevent DNS Cache Poisoning Attack . . . . . . . . . 973--985 Sha Ma and Mingwu Zhang and Qiong Huang and Bo Yang Public Key Encryption with Delegated Equality Test in a Multi-User Setting 986--1002 Qiang Tang From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data . . . . . . . . . . . 1003--1020 Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and Willy Susilo An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants . . . . . . . 1021--1039
Gabriel Ciobanu and Maciej Koutny PerTiMo: a Model of Spatial Migration with Safe Access Permissions . . . . . . 1041--1060 Jie Lin and Yue Jiang and Don Adjeroh Circular Pattern Discovery . . . . . . . 1061--1073 Jia-Jie Liu and Yue-Li Wang and Yu-Shan Chiu Constrained Longest Common Subsequences with Run-Length-Encoded Strings . . . . 1074--1084 Emilio Di Giacomo and Walter Didimo and Luca Grilli and Giuseppe Liotta and Salvatore Agostino Romeo Heuristics for the Maximum $2$-Layer RAC Subgraph Problem . . . . . . . . . . . . 1085--1098 Ahmad Sabri and Vincent Vajnovszki Two Reflected Gray Code-Based Orders on Some Restricted Growth Sequences . . . . 1099--1111 Chia Shin Ou and Chin Lung Lu and R. C. T. Lee A Systematical and Parallel Approach to Solve Problems Involving Special Properties of Bit-Vectors . . . . . . . 1112--1121 Amy Affleck and Aneesh Krishna and Narasimaha R. Achuthan Non-Functional Requirements Framework: a Mathematical Programming Approach . . . 1122--1139 Florentin Ipate and Alin Stefanescu and Ionut Dinca Model Learning and Test Generation Using Cover Automata . . . . . . . . . . . . . 1140--1159 Antonio Badia and Daniel Lemire Functional Dependencies with null Markers . . . . . . . . . . . . . . . . 1160--1168 Petr Procházka and Jan Holub Compression of a Set of Files with Natural Language Content . . . . . . . . 1169--1185 Joel Fuentes and Pablo Sáez and Gilberto Gutiérrez and Isaac D. Scherson A Method to Find Functional Dependencies Through Refutations and Duality of Hypergraphs . . . . . . . . . . . . . . 1186--1198 Chang-Ai Sun and Yimeng Zai and Huai Liu Evaluating and Comparing Fault-Based Testing Strategies for General Boolean Specifications: a Series of Experiments 1199--1213 Behrooz Parhami Digital Arithmetic in Nature: Continuous-Digit RNS . . . . . . . . . . 1214--1223
Zhangbing Zhou and Huansheng Ning and Meikang Qiu and Habib F. Rashvand Editorial: Green Energy Management and Smart Grid . . . . . . . . . . . . . . . 1225--1226 Jianxin Li and Jieyu Zhao and Yi Li and Lei Cui and Bo Li and Lu Liu and John Panneerselvam iMIG: Toward an Adaptive Live Migration Method for KVM Virtual Machines . . . . 1227--1242 Kehua Guo and Biao Tian and Jianhua Ma AMPS: an Adaptive Message Push Strategy for the Energy Efficiency Optimization in Mobile Terminals . . . . . . . . . . 1243--1253 Liyun Zuo and Shoubin Dong and Chunsheng Zhu and Lei Shu and Guangjie Han A Cloud Resource Evaluation Model Based on Entropy Optimization and Ant Colony Clustering . . . . . . . . . . . . . . . 1254--1266 Jianhui Zhang and Zhi Li and Feng Xia and Shaojie Tang and Xingfa Shen and Bei Zhao Cooperative Scheduling for Adaptive Duty Cycling in Asynchronous Sensor Networks 1267--1279 Guangjie Han and Xun Li and Jinfang Jiang and Lei Shu and Jaime Lloret Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks . . . 1280--1292 Zhiyong Feng and Bo Lan and Zhen Zhang and Shizhan Chen A Study of Semantic Web Services Network 1293--1305 Xiang Wang and Ying Lu and Yi Zhang and Zexi Zhao and Tongsheng Xia and Limin Xiao Power Optimization in Logic Synthesis for Mixed Polarity Reed--Muller Logic Circuits . . . . . . . . . . . . . . . . 1306--1313 Domen Zupan\vci\vc and Mitja Lu\vstrek and Matja\vz Gams Multi-Agent Architecture for Control of Heating and Cooling in a Residential Space . . . . . . . . . . . . . . . . . 1314--1329 Linghe Kong and Xiao-Yang Liu and Meixia Tao and Min-You Wu and Yu Gu and Long Cheng and Jianwei Niu Resource-Efficient Data Gathering in Sensor Networks for Environment Reconstruction . . . . . . . . . . . . . 1330--1343 Jin Liu and Juan Li and Xiaoguang Niu and Xiaohui Cui and Yunchuan Sun GreenOCR: an Energy-Efficient Optimal Clustering Routing Protocol . . . . . . 1344--1359 Yongzhao Zhan and Shan Dai and Qirong Mao and Lu Liu and Wei Sheng A Video Semantic Analysis Method Based on Kernel Discriminative Sparse Representation and Weighted KNN . . . . 1360--1372 He Li and Mianxiong Dong and Xiaofei Liao and Hai Jin Deduplication-Based Energy Efficient Storage System in Cloud Environment . . 1373--1383 Hamed Javidi and Maziar Goudarzi TABEMS: Tariff-Aware Building Energy Management System for Sustainability through Better Use of Electricity . . . 1384--1398 Xiaolan Tang and Juhua Pu and Yang Gao and Yu Xie and Zhang Xiong GPS-Based Replica Deletion Scheme with Anti-Packet Distribution for Vehicular Networks . . . . . . . . . . . . . . . . 1399--1415 Antonio Frangioni and Laura Galli and Giovanni Stea Optimal Joint Path Computation and Rate Allocation for Real-time Traffic . . . . 1416--1430 Andrew Larkin and David E. Williams and Molly L. Kile and William M. Baird Developing a Smartphone Software Package for Predicting Atmospheric Pollutant Concentrations at Mobile Locations . . . 1431--1442 Nizam Ayyìldìz and Ece Güran Schmidt and Hasan Cengiz Güran S-DIRECT: Scalable and Dynamically Reconfigurable TCAM Architecture for High-Speed IP Lookup . . . . . . . . . . 1443--1455 Pavel Rajmic and Jirí Ho\vsek and Michal Fusek and Sergey Andreev and Július Stecík Simplified Probabilistic Modelling and Analysis of Enhanced Distributed Coordination Access in IEEE 802.11 . . . 1456--1468 Sang-Yeon Kim and Dong-Wan Choi and Chin-Wan Chung Finding a Friendly Community in Social Networks Considering Bad Relationships 1469--1481 Hamid Saadatfar and Hossein Deldari and Mahmoud Naghibzadeh Improving the Scheduler's Energy Saving Capability by Noting both Job and Resource Characteristics . . . . . . . . 1482--1493
Viliam Simko and David Hauzar and Petr Hnetynka and Tomas Bures and Frantisek Plasil Formal Verification of Annotated Textual Use-Cases . . . . . . . . . . . . . . . 1495--1529 Achal Kaushik and Deo Prakash Vidyarthi A Green Energy Model for Resource Allocation in Computational Grid . . . . 1530--1547 H. Ahmadifar and G. Jaberipur A New Residue Number System with $5$-Moduli Set: $ 2^{2 q}$, $ 2^q \pm 3$, $ 2^q \pm 1$ . . . . . . . . . . . . 1548--1565 Edem Kwedzo Bankas and Kazeem Alagbe Gbolagade New MRC Adder-Based Reverse Converter for the Moduli Set $ 2^n $, $ 2^{2 n + 1} - 1 $, $ 2^{2 n + 2} - 1 $ . . . . . 1566--1572 Qian Mao and K. Bharanitharan and Chin-Chen Chang A Proxy User Authentication Protocol Using Source-Based Image Morphing . . . 1573--1584 Yi-wen Zhang and Rui-feng Guo Low-Power Scheduling Algorithms for Sporadic Task with Shared Resources in Hard Real-Time Systems . . . . . . . . . 1585--1597 Chao-Liang Liu and Wang-Jui Tsai and Ting-Yi Chang and Chun-Cheng Peng and Peng-Shiang Wong Meaningful Share Generation for $ (2, 2)$-Multiple Visual Secret Sharing Scheme Without Pixel Expansion . . . . . 1598--1606 Abdelkrim Abdelli Improving the State Space Computation of the Time Stream Petri Nets Model . . . . 1607--1627 Yang Wang and Wei Shi Dataflow-Based Scheduling for Scientific Workflows in HPC with Storage Constraints . . . . . . . . . . . . . . 1628--1644 Murat Yesilyurt and Yildiray Yalman and A. Turan Ozcerit A Robust Watermarking Method for MPEG-4 Based on Kurtosis . . . . . . . . . . . 1645--1655 Alexandre Petrenko and Adenilso Simao Generalizing the DS-Methods for Testing Non-Deterministic FSMs . . . . . . . . . 1656--1672 Niko Beerenwinkel and Stefano Beretta and Paola Bonizzoni and Riccardo Dondi and Yuri Pirola Covering Pairs in Directed Acyclic Graphs . . . . . . . . . . . . . . . . . 1673--1686
Quan Z. Sheng and Elhadi M. Shakshuki and Jian Yu Ambient and Context-Aware Services for the Future Web . . . . . . . . . . . . . 1687--1688 Khalid Elgazzar and Sharief M. A. Oteafy and Walid M. Ibrahim and Hossam S. Hassanein A Resilient P2P Architecture for Mobile Resource Sharing . . . . . . . . . . . . 1689--1700 Zahoor A. Khan and Shyamala C. Sivakumar and William J. Phillips and Bill Robertson QPRR: QoS-Aware Peering Routing Protocol for Reliability Sensitive Data in Body Area Network Communication . . . . . . . 1701--1716 Alireza Nafarieh and Shyamala Sivakumar and William Robertson and William Phillips SLA-Based Time-Aware Provisioning Mechanisms in Shared Mesh Protected Optical Networks . . . . . . . . . . . . 1717--1731 Heiko Desruelle and Frank Gielen Context-Driven Progressive Enhancement of Mobile Web Applications: a Multicriteria Decision-Making Approach 1732--1746 Yanling Hu and Anfeng Liu An Efficient Heuristic Subtraction Deployment Strategy to Guarantee Quality of Event Detection for WSNs . . . . . . 1747--1762 David Diez Hernandez and Jaime Garcia-Reinoso and Ivan Vidal SFP: Statistical Filtering Policy for Caching in Content-Centric Networking 1763--1775 Xing Su and Minjie Zhang and Quan Bai Dynamic Task Allocation for Heterogeneous Agents in Disaster Environments Under Time, Space and Communication Constraints . . . . . . . 1776--1791 Xiuchao Wu and Kenneth N. Brown and Cormac J. Sreenan Contact Probing Mechanisms for Opportunistic Sensor Data Collection . . 1792--1810 Ping Xie and Jianzhong Huang and Qiang Cao and Xiao Qin and Changsheng Xie A New Non-MDS RAID-6 Code to Support Fast Reconstruction and Balanced I/Os 1811--1825 Guangjun Qin and Mingfa Zhu and Limin Xiao and Li Ruan Lessen Interflow Interference Using Virtual Channels Partitioning . . . . . 1826--1841 Jaime Garcia-Reinoso and Ivan Vidal and David Diez and Daniel Corujo and Rui L. Aguiar Analysis and Enhancements to Probabilistic Caching in Content-Centric Networking . . . . . . . . . . . . . . . 1842--1856 Ahmed Kheiri and Ender Ozcan Corrigendum: Constructing Constrained-Version of Magic Squares Using Selection Hyper-heuristics . . . . 1857--1857
Neil Y. Yen and Uyen Trang Nguyen and Jong Hyuk Park Mining Social Media for Knowledge Discovery . . . . . . . . . . . . . . . 1859--1860 Thomas Steiner and Ruben Verborgh and Joaquim Gabarro and Erik Mannens and Rik Van de Walle Clustering Media Items Stemming from Multiple Social Networks . . . . . . . . 1861--1875 Weiwei Yuan and Donghai Guan and Sungyoung Lee and Jin Wang Skeleton Searching Strategy for Recommender Searching Mechanism of Trust-Aware Recommender Systems . . . . 1876--1883 Yongkoo Han and Kisung Park and Donghai Guan and Sajal Halder and Young-Koo Lee Topological Similarity-Based Feature Selection for Graph Classification . . . 1884--1893 Lihua Zhou and Kevin Lü Detecting Communities with Different Sizes for Social Network Analysis . . . 1894--1908 Wu He and Gongjun Yan Mining Blogs And Forums To Understand the Use of Social Media in Customer Co-creation . . . . . . . . . . . . . . 1909--1920 Chen Yang and Jian Ma and Thushari Silva and Xiaoyan Liu and Zhongsheng Hua A Multilevel Information Mining Approach for Expert Recommendation in Online Scientific Communities . . . . . . . . . 1921--1936 Lida Ghahremanlou and Wanita Sherchan and James A. Thom Geotagging Twitter Messages in Crisis Management . . . . . . . . . . . . . . . 1937--1954 Seyed Mohammadhadi Daneshmand and Amin Javari and Seyed Ebrahim Abtahi and Mahdi Jalili A Time-Aware Recommender System Based on Dependency Network of Items . . . . . . 1955--1966 Naeem Khalid Janjua and Omar Khadeer Hussain and Farookh Khadeer Hussain and Elizabeth Chang Philosophical and Logic-Based Argumentation-Driven Reasoning Approaches and their Realization on the WWW: a Survey . . . . . . . . . . . . . 1967--1999 R. Rodríguez-Rodríguez and F. Castro and D. Chaver and R. Gonzalez-Alberquilla and L. Piñuel and F. Tirado Write-Aware Replacement Policies for PCM-Based Systems . . . . . . . . . . . 2000--2025 Muhammad Ashad Kabir and Jun Han and Jian Yu and Alan Colman Inferring User Situations from Interaction Events in Social Media . . . 2026--2043 Hiren Mewada and Rahul Patel and Suprava Patnaik A Novel Structure Tensor Modulated Chan--Vese Model for Texture Image Segmentation . . . . . . . . . . . . . . 2044--2060 Yi Liu and Xiongzi Ge and Xiaoxia Huang and David H. C. Du MOLAR: a Cost-Efficient, High-Performance SSD-Based Hybrid Storage Cache . . . . . . . . . . . . . 2061--2078 Sadegh Aliakbary and Jafar Habibi and Ali Movaghar Feature Extraction from Degree Distribution for Comparison and Analysis of Complex Networks . . . . . . . . . . 2079--2091 Mehmet Al\.I Abbaso\uglu and Bu\ugra Ged\.Ik and Hakan Ferhatosmano\uglu Aggregate Profile Clustering for Streaming Analytics . . . . . . . . . . 2092--2108 Yanmin Zhu and Yin Wang and George Forman and Hong Wei Mining Large-Scale GPS Streams for Connectivity Refinement of Road Maps . . 2109--2119 Lin Wu and Xiaodi Huang and John Shepherd and Yang Wang Multi-Query Augmentation-Based Web Landmark Photo Retrieval . . . . . . . . 2120--2134 Minaz Parmar and Marios C. Angelides MAC-REALM: a Video Content Feature Extraction and Modelling Framework . . . 2135--2171 Álvaro Rubio-Largo and Miguel A. Vega-Rodríguez and David L. González-Álvarez A Parallel Multiobjective Approach based on Honey Bees for Traffic Grooming in Optical Networks . . . . . . . . . . . . 2171--2191
David G. Rosado and Nadira Lammari and Jan Jürjens Special Issue on Secure Information Systems Engineering . . . . . . . . . . 2193--2194 Maryam Sepehri and Stelvio Cimato and Ernesto Damiani Privacy-Preserving Query Processing by Multi-Party Computation . . . . . . . . 2195--2212 Evangelia Kavakli and Christos Kalloniatis and Haralambos Mouratidis and Stefanos Gritzalis Privacy as an Integral Part of the Implementation of Cloud Solutions . . . 2213--2224 D. Marudhadevi and V. Neelaya Dhatchayani and V. S. Shankar Sriram A Trust Evaluation Model for Cloud Computing Using Service Level Agreement 2225--2232 Oscar Rebollo and Daniel Mellado and Eduardo Fernandez-Medina ISGcloud: a Security Governance Framework for Cloud Computing . . . . . 2233--2254 Thomas Quirchmayr and Mark Strembeck A Discussion of Communication Schemes for Process Execution Histories to Enforce Entailment Constraints in Process-Driven SOAs . . . . . . . . . . 2255--2279 Katarzyna Mazur and Bogdan Ksiezopolski and Zbigniew Kotulski The Robust Measurement Method for Security Metrics Generation . . . . . . 2280--2296 Takeshi Takahashi and Youki Kadobayashi Reference Ontology for Cybersecurity Operational Information . . . . . . . . 2297--2312 Ricardo J. Rodríguez and José Merseguer and Simona Bernardi Modelling Security of Critical Infrastructures: a Survivability Assessment . . . . . . . . . . . . . . . 2313--2327 Jose Fran. Ruiz and Antonio Maña and Carsten Rudolph An Integrated Security and Systems Engineering Process and Modelling Framework . . . . . . . . . . . . . . . 2328--2350 Carlos Blanco and Eduardo Fernández-Medina and Juan Trujillo Modernizing Secure OLAP Applications with a Model-Driven Approach . . . . . . 2351--2367 Kazim Yumbul and Erkay Sava\cs Enhancing an Embedded Processor Core for Efficient and Isolated Execution of Cryptographic Algorithms . . . . . . . . 2368--2387 Udaya Tupakula and Vijay Varadharajan Trust Enhanced Security for Tenant Transactions in the Cloud Environment 2388--2403 Kenneth Radke and Colin Boyd and Juan Gonzalez Nieto and Harry Bartlett CHURNs: Freshness Assurance for Humans 2404--2425 Chunfeng Lian and Liaojun Pang and Jimin Liang Generalized Random Grid-Based Visual Secret Sharing for General Access Structures . . . . . . . . . . . . . . . 2426--2442 Xing Wang and Nga Lam Or and Ziyan Lu and Derek Pao Hardware Accelerator to Detect Multi-Segment Virus Patterns . . . . . . 2443--2460 Chanying Huang and Hwaseong Lee and Hyoseung Kim and Dong Hoon Lee mvSERS: a Secure Emergency Response Solution for Mobile Healthcare in Vehicular Environments . . . . . . . . . 2461--2475 Grazielle Vernize and André Luiz Pires Guedes and Luiz Carlos Pessoa Albini Malicious Nodes Identification for Complex Network Based on Local Views . . 2476--2491 Jianghong Wei and Wenfen Liu and Xuexian Hu Forward-Secure Threshold Attribute-Based Signature Scheme . . . . . . . . . . . . 2492--2506 Debiao He and Mingwu Zhang and Baowen Xu Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model . . . . . . . . . . . . . 2507--2508 Chang Xu and Liehuang Zhu and Zhoujun Li and Feng Wang One-Round Affiliation-Hiding Authenticated Asymmetric Group Key Agreement with Semi-trusted Group Authority . . . . . . . . . . . . . . . 2509--2519 Shi-Feng Sun and Dawu Gu and Zhengan Huang Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks 2520--2536 Zoran Djuric and Dragan Gasevic FEIPS: a Secure Fair-Exchange Payment System for Internet Transactions . . . . 2537--2556 Lanfranco Lopriore Password Management: Distribution, Review and Revocation . . . . . . . . . 2557--2566 Amir Jalaly Bidgoly and Behrouz Tork Ladani Modelling and Quantitative Verification of Reputation Systems Against Malicious Attackers . . . . . . . . . . . . . . . 2567--2582 Wien Hong and Gwoboa Horng and Chih-Wei Shiu and Tung-Shou Chen and Yu-Chi Chen Reversible Steganographic Method Using Complexity Control and Human Visual System . . . . . . . . . . . . . . . . . 2583--2594 Dong Lai Fu and Xin Guang Peng and Yu Li Yang Trusted Validation for Geolocation of Cloud Data . . . . . . . . . . . . . . . 2595--2607 Shahid Alam and Issa Traore and Ibrahim Sogukpinar Annotated Control Flow Graph for Metamorphic Malware Detection . . . . . 2608--2621 Md Saiful Islam and Naif Alajlan Model-based Alignment of Heartbeat Morphology for Enhancing Human Recognition Capability . . . . . . . . . 2622--2635 Sk Hafizul Islam and Fagen Li Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings . . . . . . . . 2636--2648 Pericle Perazzo and Pavel Skvortsov and Gianluca Dini On Designing Resilient Location-Privacy Obfuscators . . . . . . . . . . . . . . 2649--2664 Yang Wang and Willy Susilo and Man Ho Au Revisiting Security Against the Arbitrator in Optimistic Fair Exchange 2665--2676 Lin Ding and Chenhui Jin and Jie Guan and Shaowu Zhang and Ting Cui and Dong Han and Wei Zhao Cryptanalysis of WG Family of Stream Ciphers . . . . . . . . . . . . . . . . 2677--2685 Kaibin Huang and Raylin Tso and Yu-Chi Chen and Sk Md Mizanur Rahman and Ahmad Almogren and Atif Alamri PKE-AET: Public Key Encryption with Authorized Equality Test . . . . . . . . 2686--2697 Nuttapong Attrapadung and Keita Emura and Goichiro Hanaoka and Yusuke Sakai Revocable Group Signature with Constant-Size Revocation List . . . . . 2698--2715 Erkay Sava\cs and Cemal Yìlmaz A Generic Method for the Analysis of a Class of Cache Attacks: a Case Study for AES . . . . . . . . . . . . . . . . . . 2716--2737 Mayana Pereira and Rafael Dowsley and Anderson C. A. Nascimento and Goichiro Hanaoka Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions . . . . . . . . . . . . 2738--2746 Wei Gao and Guilin Wang and Xueli Wang and Kefei Chen Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited . . 2747--2757 André Ricardo Abed Grégio and Vitor Monte Afonso and Dario Simões Fernandes Filho and Paulo Lício de Geus and Mario Jino Toward a Taxonomy of Malware Behaviors 2758--2777 Kaitai Liang and Willy Susilo and Joseph K. Liu and Duncan S. Wong Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption 2778--2792
Nina Yevtushenko and Khaled El-Fakih and Tiziano Villa and Jie-Hong R. Jiang Deriving Compositionally Deadlock-Free Components over Synchronous Automata Compositions . . . . . . . . . . . . . . 2793--2803 Ahmet Kara and Halit O\uguztüzün and M. Nedim Alpdemir A Methodology for Resolution Mapping for Cross-Resolution Simulation using Event-B . . . . . . . . . . . . . . . . 2804--2823 Weiqiang Kong and Leyuan Liu and Takahiro Ando and Hirokazu Yatsu and Kenji Hisazumi and Akira Fukuda Facilitating Multicore Bounded Model Checking with Stateless Explicit-State Exploration . . . . . . . . . . . . . . 2824--2840 Xiaowang Zhang and Jan Van den Bussche On the Power of SPARQL in Expressing Navigational Queries . . . . . . . . . . 2841--2851 Sung-In Jang and Su-Kyung Yoon and Kihyun Park and Gi-Ho Park and Shin-Dug Kim Data Classification Management with its Interfacing Structure for Hybrid SLC/MLC PRAM Main Memory . . . . . . . . . . . . 2852--2863 Shaowei Cai and Chuan Luo and Kaile Su Improving WalkSAT By Effective Tie-Breaking and Efficient Implementation . . . . . . . . . . . . . 2864--2875 Pablo Muñoz and David F. Barrero and María D. R-Moreno A Statistically Rigorous Analysis of $2$D Path-Planning Algorithms . . . . . 2876--2891 Gauthier van den Hove On the Origin of Recursive Procedures 2892--2899 Paolo Arcaini and Angelo Gargantini and Elvinia Riccobene How to Optimize the Use of SAT and SMT Solvers for Test Generation of Boolean Expressions . . . . . . . . . . . . . . 2900--2920 Frank Gurski Linear Programming Formulations for Computing Graph Layout Parameters . . . 2921--2927 Shiyu Yang and Muhammad Aamir Cheema and Xuemin Lin Impact Set: Computing Influence Using Query Logs . . . . . . . . . . . . . . . 2928--2943 Xi Wang and Alejandro Erickson and Jianxi Fan and Xiaohua Jia Hamiltonian Properties of DCell Networks 2944--2955 Giorgos Stoilos and Tassos Venetis and Giorgos Stamou A Fuzzy Extension to the OWL 2 RL Ontology Language . . . . . . . . . . . 2956--2971 Jinn-Shyong Yang and Sih-Syuan Luo and Jou-Ming Chang Pruning Longer Branches of Independent Spanning Trees on Folded Hyper-Stars . . 2972--2981 Thomas Roelleke and Andreas Kaltenbrunner and Ricardo Baeza-Yates Harmony Assumptions in Information Retrieval and Social Networks . . . . . 2982--2999 A. S. M. Kayes and Jun Han and Alan Colman OntCAAC: an Ontology-Based Approach to Context-Aware Access Control for Software Services . . . . . . . . . . . 3000--3034 Hao Zheng and Xiaoshe Dong and Zhengdong Zhu and Baoke Chen and Yizhi Zhang and Xingjun Zhang Research on Algorithms to Capture Drivers' Write Operations . . . . . . . 3035--3056 Jorge F. Fabeiro and Diego Andrade and Basilio B. Fraguela and Ramón Doallo Automatic Generation of Optimized OpenCL Codes Using OCLoptimizer . . . . . . . . 3057--3073 Shenwei Huang and Matthew Johnson and Daniël Paulusma Narrowing the Complexity Gap for Colouring $ (C_s, P_t) $-Free Graphs . . 3074--3088 Robert M. Hierons and Uraz Cengiz Türker Incomplete Distinguishing Sequences for Finite State Machines . . . . . . . . . 3089--3113 Yinglei Song and Chunmei Liu and Yongzhong Li A New Parameterized Algorithm for Predicting the Secondary Structure of RNA Sequences Including Pseudoknots . . 3114--3125 Emilio Di Giacomo and Walter Didimo and Giuseppe Liotta and Henk Meijer and Stephen K. Wismath Planar and Quasi-Planar Simultaneous Geometric Embedding . . . . . . . . . . 3126--3140 Outi Sievi-Korte and Kai Koskimies and Erkki Mäkinen Techniques for Genetic Software Architecture Design . . . . . . . . . . 3141--3170 László Lengyel and Tamás Mészáros and Márk Asztalos and Péter Boros and Attila Máté and Gábor Madács and Péter Hudák and Kristóf Kovács and András Tresch and Hassan Charaf Quality Assured Model-Driven Requirements Engineering and Software Development . . . . . . . . . . . . . . 3171--3186 Kun Ma and Fusen Dong and Bo Yang Large-Scale Schema-Free Data Deduplication Approach with Adaptive Sliding Window Using MapReduce . . . . . 3187--3201 Amir Vahid Dastjerdi and Rajkumar Buyya An Autonomous Time-Dependent SLA Negotiation Strategy for Cloud Computing 3202--3216
Sérgio Esteves and Paulo Ferreira and Luís Veiga $ C^3 P $: a Re-Configurable Framework to Design Cycle-sharing Computing Cloud Platforms . . . . . . . . . . . . . . . 3217--3241 Yuhao Yi and Zhongzhi Zhang and Yuan Lin and Guanrong Chen Small-World Topology Can Significantly Improve the Performance of Noisy Consensus in a Complex Network . . . . . 3242--3254 Huajun He and Yang Zhao and Jinfu Wu and Ye Tian Cost-Aware Capacity Provisioning for Internet Video Streaming CDNs . . . . . 3255--3270 R. Sundara Rajan and Paul Manuel and Indra Rajasingh and N. Parthiban and Mirka Miller A Lower Bound for Dilation of an Embedding . . . . . . . . . . . . . . . 3271--3278 Yonggang Che and Chuanfu Xu and Jianbin Fang and Yongxian Wang and Zhenghua Wang Realistic Performance Characterization of CFD Applications on Intel Many Integrated Core Architecture . . . . . . 3279--3294 Wei Zhou and Tao Jing and Yan Huo and Jin Qian and Zhen Li Double Auction for Joint Channel and Power Allocation in Cognitive Radio Networks . . . . . . . . . . . . . . . . 3295--3305 Chun-Chieh Huang and Ren-Song Ko A Study on Maximizing the Parallelism of Macroscopically Derived Routing Algorithms for WSNs . . . . . . . . . . 3306--3324
Rodrigo Andrade and Márcio Ribeiro and Henrique Rebêlo and Paulo Borba and Vaidas Gasiunas and Lucas Satabin Assessing Idioms for a Flexible Feature Binding Time . . . . . . . . . . . . . . 1--32 Robert M. Hierons A More Precise Implementation Relation for Distributed Testing . . . . . . . . 33--46 Li Chunlin and Li LaYuan Context-Aware Integrated Scheme for Mobile Cloud Service Allocation . . . . 47--63 K. Hemant Kumar Reddy and Diptendu Sinha Roy DPPACS: a Novel Data Partitioning and Placement Aware Computation Scheduling Scheme for Data-Intensive Cloud Applications . . . . . . . . . . . . . . 64--82 Shay Gueron and Vlad Krasnov Fast Quicksort Implementation Using AVX Instructions . . . . . . . . . . . . . . 83--90 Sulin Song and Shuming Zhou and Xiaoyan Li Conditional Diagnosability of Burnt Pancake Networks Under the PMC Model . . 91--105 Zaharije Radivojevi\'c and Milo\vs Cvetanovi\'c and Sa\vsa Stojanovi\'c Comparison of Binary Procedures: a Set of Techniques for Evading Compiler Transformations . . . . . . . . . . . . 106--118 Jie Zhao and Rongcai Zhao and Jinchen Xu Code Generation for Distributed-Memory Architectures . . . . . . . . . . . . . 119--132 Carla Binucci and Walter Didimo Computing Quasi-Upward Planar Drawings of Mixed Graphs . . . . . . . . . . . . 133--150 Zhendong Shao and Igor Averbakh and Sandi Klav\vzar Labeling Dot-Cartesian and Dot-Lexicographic Product Graphs with a Condition at Distance Two . . . . . . . 151--158
You Wang and Jun Bi Software-Defined Mobility Support in IP Networks . . . . . . . . . . . . . . . . 159--177 Abdul Hameed and Adnan Noor Mian Towards Better Traffic Localization of Virtual LANs Using Genetic Algorithm . . 178--191 J. Araujo and F. Giroire and J. Moulierac and Y. Liu and R. Modrzejewski Energy Efficient Content Distribution 192--207 Sareh Fotuhi Piraghaj and Rodrigo N. Calheiros and Jeffrey Chan and Amir Vahid Dastjerdi and Rajkumar Buyya Virtual Machine Customization and Task Mapping Architecture for Efficient Allocation of Cloud Data Center Resources . . . . . . . . . . . . . . . 208--224 Lélia Blin and Maria Potop-Butucaru and Stéphane Rovedakis and Sébastien Tixeuil A New Self-Stabilizing Minimum Spanning Tree Construction with Loop-Free Property . . . . . . . . . . . . . . . . 225--243 Mahmood Naderan-Tahan and Hamid Sarbazi-Azad Why Does Data Prefetching Not Work for Modern Workloads? . . . . . . . . . . . 244--259 Md. Abu Layek and TaeChoong Chung and Eui-Nam Huh Adaptive Desktop Delivery Scheme for Provisioning Quality of Experience in Cloud Desktop as a Service . . . . . . . 260--274 J. Bahi and W. Elghazel and C. Guyeux and M. Haddad and M. Hakem and K. Medjaher and N. Zerhouni Resiliency in Distributed Sensor Networks for Prognostics and Health Management of the Monitoring Targets . . 275--284
Surya Nepal and Suraj Pandey Guest Editorial: Cloud Computing and Scientific Applications (CCSA) --- Big Data Analysis in the Cloud . . . . . . . 285--286 Roberto R. Expósito and Guillermo L. Taboada and Sabela Ramos and Juan Touriño and Ramón Doallo Performance Evaluation of Data-Intensive Computing Applications on a Public IaaS Cloud . . . . . . . . . . . . . . . . . 287--307 Sami Yangui and Samir Tata An OCCI Compliant Model for PaaS Resources Description and Provisioning 308--324 Liang Li and Endong Wang and Xiaoshe Dong and Zhengdong Zhu The Optimization of Memory Access Congestion for MapReduce Applications on Manycore Systems . . . . . . . . . . . . 325--337 Christian Napoli and Giuseppe Pappalardo and Emiliano Tramontana and Gaetano Zappal\`a A Cloud-Distributed GPU Architecture for Pattern Identification in Segmented Detectors Big-Data Surveys . . . . . . . 338--352 T. Veni and S. Mary Saira Bhanu MDedup++: Exploiting Temporal and Spatial Page-Sharing Behaviors for Memory Deduplication Enhancement . . . . 353--370 Sérgio Esteves and Luís Veiga WaaS: Workflow-as-a-Service for the Cloud with Scheduling of Continuous and Data-Intensive Workflows . . . . . . . . 371--383 David L. González-Álvarez and Miguel A. Vega-Rodríguez and Álvaro Rubio-Largo A Comparative Study of Different Motif Occurrence Models Applied to a Hybrid Multiobjective Shuffle Frog Leaping Algorithm . . . . . . . . . . . . . . . 384--402 Yan Kong and Minjie Zhang and Dayong Ye An Auction-Based Approach for Group Task Allocation in an Open Network Environment . . . . . . . . . . . . . . 403--422 Iyad F. Jafar and Khalid A. Darabkh and Raed T. Al-Zubi and Rami A. Al Na'mneh Efficient Reversible Data Hiding Using Multiple Predictors . . . . . . . . . . 423--438
Wuqiang Shen and Shaohua Tang RGB, a Mixed Multivariate Signature Scheme . . . . . . . . . . . . . . . . . 439--451 Leyou Zhang and Yi Mu and Qing Wu Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys . . . . . . . . . . . 452--461 Simeon Veloudis and Nimal Nissanke A Novel Permission Hierarchy for RBAC for Dealing with SoD in MAC Models . . . 462--492 Mingwu Zhang and Yi Mu Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations . . . . . . 493--507 Joonsang Baek and Duncan S. Wong and Jin Li and Man Ho Au Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction . . . . . . . 508--521 Peng Zhou and Xiaojing Gu and Rocky K. C. Chang Harvesting File Download Exploits in the Web: a Hacker's View . . . . . . . . . . 522--540 Xinran Li and Chen-Hui Jin and Fang-Wei Fu Improved Results of Impossible Differential Cryptanalysis on Reduced FOX . . . . . . . . . . . . . . . . . . 541--548 Guo-Qiang Liu and Chen-Hui Jin Linear Cryptanalysis of PRESENT-like Ciphers with Secret Permutation . . . . 549--558 Jiannan Wei and Guomin Yang and Yi Mu and Kaitai Liang Anonymous Proxy Signature with Hierarchical Traceability . . . . . . . 559--569 Emma Osborn and Andrew Simpson On Safety and Security Requirements in Emerging Ubiquitous Computing Models . . 570--591 Hung-Yu Chien A Generic Approach to Improving Diffie--Hellman Key Agreement Efficiency for Thin Clients . . . . . . . . . . . . 592--601
Josh Chopin and Hamid Laga and Stanley J. Miklavcic The Influence of Object Shape on the Convergence of Active Contour Models for Image Segmentation . . . . . . . . . . . 603--615 Jia-Jie Liu and Cheng-Ju Hsu and Chien-Hung Lin Computing Global Secure Set on Trees . . 616--629 Riku Saikkonen and Eljas Soisalon-Soininen Cache-Sensitive Memory Layout for Dynamic Binary Trees . . . . . . . . . . 630--649 Konrad K. Dabrowski and Daniël Paulusma Clique-Width of Graph Classes Defined by Two Forbidden Induced Subgraphs . . . . 650--666 Natarajan Meghanathan Maximal Assortative Matching and Maximal Dissortative Matching for Complex Network Graphs . . . . . . . . . . . . . 667--684 Ju-Hee Choi and Gi-Ho Park Demand-Aware NVM Capacity Management Policy for Hybrid Cache Architecture . . 685--700 Jia-Chun Lin and Fang-Yie Leu and Ying-ping Chen Impacts of Task Re-Execution Policy on MapReduce Jobs . . . . . . . . . . . . . 701--714 Zheng Hao and Dong Xiaoshe and Zhu Zhengdong and Chen Baoke and Bai Xiuxiu and Zhang Xingjun and Wang Endong Improving the Reliability of the Operating System Inside a VM . . . . . . 715--740 Tao Zhang and He Jiang and Xiapu Luo and Alvin T. S. Chan A Literature Review of Research in Bug Resolution: Tasks, Challenges and Future Directions . . . . . . . . . . . . . . . 741--773
Bernabe Dorronsoro and Sergio Nesmachnow Parallel Soft Computing Techniques in High-Performance Computing Systems . . . 775--776 Francisco Luna and Gustavo R. Zavala and Antonio J. Nebro and Juan J. Durillo and Carlos A. Coello Coello Distributed Multi-Objective Metaheuristics for Real-World Structural Optimization Problems . . . . . . . . . 777--792 Misun Yu and Doo-Hwan Bae SimpleLock$^+$: Fast and Accurate Hybrid Data Race Detection . . . . . . . . . . 793--809 Nadia Nedjah and Rogério de Moraes Calazan and Luiza de Macedo Mourelle Particle, Dimension and Cooperation-Oriented PSO Parallelization Strategies for Efficient High-Dimension Problem Optimizations on Graphics Processing Units . . . . . . . . . . . . 810--835 Guillermo Vigueras and Juan M. Orduña On the Use of GPU for Accelerating Communication-Aware Mapping Techniques 836--847 Jianliang Gao and Ping Liu and Xuedan Kang and Lixia Zhang and Jianxin Wang PRS: Parallel Relaxation Simulation for Massive Graphs . . . . . . . . . . . . . 848--860 Zhuo Wang and Tingting Hou and Dawei Song and Zhun Li and Tianqi Kong Detecting Review Spammer Groups via Bipartite Graph Projection . . . . . . . 861--874 Chris Gorman and Iren Valova GORMANN: Gravitationally Organized Related Mapping Artificial Neural Network . . . . . . . . . . . . . . . . 875--888 D. Thenmozhi and Chandrabose Aravindan An Automatic and Clause-Based Approach to Learn Relations for Ontologies . . . 889--907 Mert Ozer and Ilkcan Keles and Hakki Toroslu and Pinar Karagoz and Hasan Davulcu Predicting the Location and Time of Mobile Phone Users by Using Sequential Pattern Mining Techniques . . . . . . . 908--922 Sangeeta Bhattacharya and S. Selvakumar Multi-Measure Multi-Weight Ranking Approach for the Identification of the Network Features for the Detection of DoS and Probe Attacks . . . . . . . . . 923--943
Joseph K. Liu and Sze Ling Yeo and Wun-She Yap and Sherman S. M. Chow and Duncan S. Wong and Willy Susilo Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol . . . . . . 945--954 Peng Jiang and Yi Mu and Fuchun Guo and Xiaofen Wang and Qiaoyan Wen Online/Offline Ciphertext Retrieval on Resource Constrained Devices . . . . . . 955--969 Chunpeng Ge and Willy Susilo and Jiandong Wang and Zhiqiu Huang and Liming Fang and Yongjun Ren A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles . . 970--982 Zhen Liu and Duncan S. Wong Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe . . . . . . . . . . . . . . . . 983--1004 Amir Jalaly Bidgoly and Behrouz Tork Ladani Modeling and Quantitative Verification of Trust Systems Against Malicious Attackers . . . . . . . . . . . . . . . 1005--1027 Jiguo Li and Haiting Du and Yichen Zhang Certificate-Based Key-Insulated Signature in the Standard Model . . . . 1028--1039 Joseph K. Liu and Willy Susilo and Tsz Hon Yuen and Man Ho Au and Junbin Fang and Zoe L. Jiang and Jianying Zhou Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles . . . . . . . . . . . . . . . . 1040--1053 Kunpeng Bai and Chuankun Wu An AES-Like Cipher and Its White-Box Implementation . . . . . . . . . . . . . 1054--1065 Jiguo Li and Meilin Teng and Yichen Zhang and Qihong Yu A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme . . . . 1066--1075 Mario Diego Munoz-Hernandez and Miguel Morales-Sandoval and Jose Juan Garcia-Hernandez An End-to-End Security Approach for Digital Document Management . . . . . . 1076--1090 Haibo Yi and Shaohua Tang Very Small FPGA Processor for Multivariate Signatures . . . . . . . . 1091--1101 Haibo Yi and Shaohua Tang and Ranga Vemuri Fast Inversions in Small Finite Fields by Using Binary Trees . . . . . . . . . 1102--1112
Xiang Zhao and Yifan Chen and Chuan Xiao and Yoshiharu Ishikawa and Jiuyang Tang Frequent Subgraph Mining Based on Pregel 1113--1128 Jorge Francisco Cutigi and Adenilso Simao and Simone R. S. Souza Reducing FSM-Based Test Suites with Guaranteed Fault Coverage . . . . . . . 1129--1143 Pablo Pérez-Lantero Area and Perimeter of the Convex Hull of Stochastic Points . . . . . . . . . . . 1144--1154 Hairong Yu and Guohui Li and Jianjun Li and Lihchyun Shu DO$_{\rm cyclical}$: a Latency-Resistant Cyclic Multi-Threading Approach for Automatic Program Parallelization . . . 1155--1173 Indra Rajasingh and Paul Manuel and N. Parthiban and D. Azubha Jemilet and R. Sundara Rajan Transmission in Butterfly Networks . . . 1174--1179 Zbyn\vek K\vrivka and Alexander Meduna and Petr Zemek Phrase-Structure Grammars: Normal Forms and Reduction . . . . . . . . . . . . . 1180--1185 Robert M. Hierons and Uraz Cengiz Türker Distinguishing Sequences for Distributed Testing: Adaptive Distinguishing Sequences . . . . . . . . . . . . . . . 1186--1206 Huilin Liu and Chen Chen and JunChang Xin and Liyuan Zhang Searching the Informative Subgraph Based on the PeakGraph Model . . . . . . . . . 1207--1219 Hui Cui and Robert H. Deng Revocable and Decentralized Attribute-Based Encryption . . . . . . . 1220--1235 Weifeng Wang and Li Jiao Trace Abstraction Refinement for Solving Horn Clauses . . . . . . . . . . . . . . 1236--1251 Fabrizio Luccio and Bernard Mans and Luke Mathieson and Linda Pagli Complete Balancing via Rotation . . . . 1252--1263 Rolando Trujillo-Rasua and Ismael G. Yero Characterizing $1$-Metric Antidimensional Trees and Unicyclic Graphs . . . . . . . . . . . . . . . . . 1264--1273
Arambam Neelima and Kh Manglem Singh Perceptual Hash Function based on Scale-Invariant Feature Transform and Singular Value Decomposition . . . . . . 1275--1281 Wei Ni Minimized Error Propagation Location Method Based on Error Estimation . . . . 1282--1288 D. Thenmozhi and Chandrabose Aravindan Paraphrase Identification by Using Clause-Based Similarity Features and Machine Translation Metrics . . . . . . 1289--1302 Alok Kumar Singh Kushwaha and Rajeev Srivastava Maritime Object Segmentation Using Dynamic Background Modeling and Shadow Suppression . . . . . . . . . . . . . . 1303--1329 Willian Valmorbida and Jorge Luis Victória Barbosa and Débora Nice Ferrari Barbosa and Sandro José Rigo U-Library: an Intelligent Model for Ubiquitous Library Support . . . . . . . 1330--1344 Billur Barshan and Aras Yurtman Investigating Inter-Subject and Inter-Activity Variations in Activity Recognition Using Wearable Motion Sensors . . . . . . . . . . . . . . . . 1345--1362 Konstantinos Tsakalozos and Spiros Evangelatos and Fotis Psallidas and Marcos R. Vieira and Vassilis J. Tsotras and Alex Delis DiVA: Using Application-Specific Policies to `Dive' into Vector Approximations . . . . . . . . . . . . . 1363--1382 Sunita Garhwal and Ram Jiwari Parallel Fuzzy Regular Expression and its Conversion to Epsilon-Free Fuzzy Automaton . . . . . . . . . . . . . . . 1383--1391 Ohoud Nafea and Sanaa Ghouzali and Wadood Abdul and Emad-ul-Haq Qazi Hybrid Multi-Biometric Template Protection Using Watermarking . . . . . 1392--1407 Yair Neuman and Yochai Cohen A Novel Methodology for Automatically Measuring Psychological Dimensions in Textual Data . . . . . . . . . . . . . . 1408--1414 Nilson Donizete Guerin, Jr. and Flavio de Barros Vidal and Bruno Macchiavello Text-dependent User Verification of Handwritten Words and Signatures on Mobile Devices . . . . . . . . . . . . . 1415--1425 Ümit Ekmekçi and Zehra Çataltepe and Güvenç Güngör and Demir Can Kahya EigenBots for the Okey Social Board Game 1426--1432
Pilar González-Férez and Juan Piernas and Toni Cortes Improving I/O Performance Through an In-Kernel Disk Simulator . . . . . . . . 1433--1452 Lois Orosa and Javier D. Bruguera and Elisardo Antelo Asymmetric Allocation in a Shared Flexible Signature Module for Multicore Processors . . . . . . . . . . . . . . . 1453--1469 Rui Hou and Jigang Wu and Yawen Chen and Haibo Zhang Note on Edge-Colored Graphs for Networks with Homogeneous Faults . . . . . . . . 1470--1478 A. S. Kang and Renu Vig Comparative Performance Evaluation of Modified Prototype Filter Bank Multicarrier Cognitive Radio Under Constraints of $ L_p $, K, N and D . . . 1479--1491 Yung-Ting Chuang and P. M. Melliar-Smith and Louise E. Moser and Isaií Michel Lombera Statistical Estimation and Dynamic Adaptation Algorithms for the iTrust Publication, Search and Retrieval System 1492--1510 Hongzhi Zhao and Yuan Xue RSD Fault Block Model for Highly Efficient Fault-Tolerant Manhattan Routing Algorithms in $2$D Mesh . . . . 1511--1526 L. Sivagami and J. Martin Leo Manickam Cluster-Based MAC Protocol for Collision Avoidance and TDMA Scheduling in Underwater Wireless Sensor Networks . . 1527--1535 Yili Gong and Chuang Hu and Yanyan Xu and Wenjie Wang A Distributed File System with Variable Sized Objects for Enhanced Random Writes 1536--1550 I. S. Akila and R. Venkatesan A Fuzzy Based Energy-aware Clustering Architecture for Cooperative Communication in WSN . . . . . . . . . . 1551--1562 Xiang Hu and Li Jiao and Zhijia Li Modelling and Performance Analysis of IEEE 802.11 DCF Using Coloured Petri Nets . . . . . . . . . . . . . . . . . . 1563--1580
Magdy M. Fadel and Ali I. El-Desoky and Amira Y. Haikel and Labib M. Labib A Low-Storage Precise IP Traceback Technique Based on Packet Marking and Logging . . . . . . . . . . . . . . . . 1581--1592 Lan Zhou and Vijay Varadharajan and K. Gopinath A Secure Role-Based Cloud Storage System For Encrypted Patient-Centric Health Records . . . . . . . . . . . . . . . . 1593--1611 Mohannad J. Alhanahnah and Arshad Jhumka and Sahel Alouneh A Multidimension Taxonomy of Insider Threats in Cloud Computing . . . . . . . 1612--1622 Fatemeh Imanimehr and Mehran S. Fallah How Powerful Are Run-Time Monitors with Static Information? . . . . . . . . . . 1623--1636 Shi-Feng Sun and Joseph K. Liu and Yu Yu and Baodong Qin and Dawu Gu RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions 1637--1658 Yanli Ren and Ning Ding and Xinpeng Zhang and Haining Lu and Dawu Gu Identity-Based Encryption with Verifiable Outsourced Revocation . . . . 1659--1668 Junqing Gong and Xiaolei Dong and Zhenfu Cao and Jie Chen Almost-Tight Identity Based Encryption Against Selective Opening Attack . . . . 1669--1688 Hyung Tae Lee and San Ling and Jae Hong Seo and Huaxiong Wang CCA2 Attack and Modification of Huang et al.'s Public Key Encryption with Authorized Equality Test . . . . . . . . 1689--1694 Jiangshan Yu and Vincent Cheval and Mark Ryan DTKI: a New Formalized PKI with Verifiable Trusted Parties . . . . . . . 1695--1713 Jianghong Wei and Xinyi Huang and Wenfen Liu and Xuexian Hu Practical Attribute-based Signature: Traceability and Revocability . . . . . 1714--1734 Byungho Min and Vijay Varadharajan Rethinking Software Component Security: Software Component Level Integrity and Cross Verification . . . . . . . . . . . 1735--1748
Minhaj Ahmad Khan A Transformation For Optimizing String-Matching Algorithms For Long Patterns . . . . . . . . . . . . . . . . 1749--1759 Walayat Hussain and Farookh Khadeer Hussain and Omar Khadeer Hussain and Elizabeth Chang Provider-Based Optimized Personalized Viable SLA (OPV-SLA) Framework to Prevent SLA Violation . . . . . . . . . 1760--1783 Mariem Mefteh and Nadia Bouassida and Hanêne Ben-Abdallah Mining Feature Models from Functional Requirements . . . . . . . . . . . . . . 1784--1804 Khaled El-Fakih and Nina Yevtushenko Test Translation for Embedded Finite State Machine Components . . . . . . . . 1805--1816 Farah A\"\it-Salaht and Hind Castel-Taleb and Jean-Michel Fourneau and Nihal Pekergin Performance Analysis of a Queue by Combining Stochastic Bounds, Real Traffic Traces and Histograms . . . . . 1817--1830 P. Angelini and G. Da Lozzo SEFE = C-Planarity? . . . . . . . . . . 1831--1838 Shiying Wang and Zhenhua Wang and Mujiangshan Wang The $2$-Extra Connectivity and $2$-Extra Diagnosability of Bubble-Sort Star Graph Networks . . . . . . . . . . . . . . . . 1839--1856 Liang Bao and Fen Zhao and Mengqing Shen and Yutao Qi and Ping Chen An Orthogonal Genetic Algorithm for QoS-Aware Service Composition . . . . . 1857--1871 Simone Brognoli and Gianfranco Lamperti and Michele Scandale Incremental Determinization of Expanding Automata . . . . . . . . . . . . . . . . 1872--1899 Sandi Klav\vzar and Paul Manuel and M. J. Nadjafi-Arani and R. Sundara Rajan and Cyriac Grigorious and Sudeep Stephen Average Distance in Interconnection Networks via Reduction Theorems for Vertex-Weighted Graphs . . . . . . . . . 1900--1910
Weidong Chen and Shan Ling Node-Pancyclic Properties of Biswapped Networks Based on Cycles in Their Factor Networks . . . . . . . . . . . . . . . . 1--12 Shuo-I Wang and Fu-Hsing Wang Independent Spanning Trees in RTCC-Pyramids . . . . . . . . . . . . . 13--26 Jian Yu and Jun Han and Jean-Guy Schneider and Cameron Hine and Steve Versteeg A Petri-Net-Based Virtual Deployment Testing Environment for Enterprise Software Systems . . . . . . . . . . . . 27--44 Aimal Rextin and Patrick Healy Dynamic Upward Planarity Testing of Single Source Embedded Digraphs . . . . 45--59 J. C. Saez and A. Pousa and R. Rodriíguez-Rodriíguez and F. Castro and M. Prieto-Matias PMCTrack: Delivering Performance Monitoring Counter Support to the OS Scheduler . . . . . . . . . . . . . . . 60--85 Alejandro Pérez and Pablo Sánchez On the Use of C# Partial Classes for the Implementation of Software Product Lines 86--109 Robert M. Hierons and Uraz Cengiz Türker Distinguishing Sequences for Distributed Testing: Preset Distinguishing Sequences 110--125 Maryam Shoaran and Alex Thomo Editorial: Zero-Knowledge-Private Counting of Group Triangles in Social Networks . . . . . . . . . . . . . . . . 126--134 Emilio Di Giacomo and Walter Didimo and Giuseppe Liotta and Fabrizio Montecchiani Area-Thickness Trade-Offs for Straight-Line Drawings of Planar Graphs 135--142 Chang-ai Sun and Lin Pan and Qiaoling Wang and Huai Liu and Xiangyu Zhang An Empirical Study on Mutation Testing of WS-BPEL Programs . . . . . . . . . . 143--158
Yali Lv and Cheng-Kuan Lin and Jianxi Fan Hamiltonian Cycle and Path Embeddings in $k$-Ary $n$-Cubes Based on Structure Faults . . . . . . . . . . . . . . . . . 60 Cyriac Grigorious and Sudeep Stephen and Bharati Rajan and Mirka Miller On the Partition Dimension of Circulant Graphs . . . . . . . . . . . . . . . . . 60 Seyyed Amir Ali Ghafourian Ghahramani and Ali Mohammad Afshin Hemmatyar A Graph-based Performance Analysis of the 802.11p MAC Protocol for Safety Communications in Highway Vehicular Ad Hoc Networks . . . . . . . . . . . . . . 60 Keyvan RahimiZadeh and Morteza AnaLoui and Peyman Kabiri and Bahman Javadi Workload-Aware Placement of Multi-Tier Applications in Virtualized Datacenters 60 Joshua Higgins and Violeta Holmes and Colin Venters Autonomous Discovery and Management in Virtual Container Clusters . . . . . . . 60 Yen-Hung Chen and Yuan-Cheng Lai and Ching-Neng Lai and Yang-Chi Li A Group Bandwidth Reservation Scheme to Enhance the Driver's Safety in Vehicles and Transport Environment . . . . . . . 60 Tong Liu and Yanmin Zhu and Hongzi Zhu and Jiadi Yu and Yuanyuan Yang and Fan Ye Online Pricing for Efficient Renewable Energy Sharing in a Sustainable Microgrid . . . . . . . . . . . . . . . 60
Sebastian Maneth and Alexandra Poulovassilis Data Science . . . . . . . . . . . . . . 60 Yang Cao and Wenfei Fan and Shuai Ma Virtual Network Mapping in Cloud Computing: a Graph Pattern Matching Approach . . . . . . . . . . . . . . . . 60 Lena Wiese and Tim Waage and Ferdinand Bollwein A Replication Scheme for Multiple Fragmentations with Overlapping Fragments . . . . . . . . . . . . . . . 60 Andreas Weiler and Michael Grossniklaus and Marc H. Scholl Editorial: Survey and Experimental Analysis of Event Detection Techniques for Twitter . . . . . . . . . . . . . . 60 Yu Liu and Peter McBrien Transactional and Incremental Type Inference from Data Updates . . . . . . 60 Reem Q. Al Fayez and Mike Joy Using Linked Data for Integrating Educational Medical Web Databases Based on BioMedical Ontologies . . . . . . . . 60 Eleni Tsalapati and Giorgos Stoilos and Alexandros Chortaras and Giorgos Stamou and George Koletsos Query Rewriting Under Ontology Change 60 Adnan Idris and Asifullah Khan Churn Prediction System for Telecom using Filter--Wrapper and Ensemble Classification . . . . . . . . . . . . . 60 Alireza Nazemi and Ozra Ghezelsofla A Dual Neural Network Scheme for Solving the Assignment Problem . . . . . . . . . 60 Prabavathy Balasundaram and Chitra Babu and Subha Devi M Improving Read Throughput of Deduplicated Cloud Storage using Frequent Pattern-Based Prefetching Technique . . . . . . . . . . . . . . . 60
Tomasz Hyla and Jerzy Peja\'s A Hess-Like Signature Scheme Based on Implicit and Explicit Certificates . . . 457--475 Jeremy Maitin-Shepard and Mehdi Tibouchi and Diego F. Aranha Elliptic Curve Multiset Hash . . . . . . 476--490 Xi-Jun Lin and Lin Sun and Haipeng Qu and Xiaoshuai Zhang Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme . . . . . . . . . . 491--496 Shaoquan Jiang Bounds for Message Authentication with Distortion . . . . . . . . . . . . . . . 497--506 Jing Liu and Yunyun Wu and Xuezheng Liu and Yunchun Zhang and Gang Xue and Wei Zhou and Shaowen Yao On the (In)Security of Recent Group Key Distribution Protocols . . . . . . . . . 507--526 Kenneth Radke and Colin Boyd Security Proofs for Protocols Involving Humans . . . . . . . . . . . . . . . . . 527--540 Leyou Zhang and Jingxia Zhang and Yi Mu Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System . . . 541--554 Emi\.n \.Islam Tatli and Bedi\.rhan Urgun WIVET --- Benchmarking Coverage Qualities of Web Crawlers . . . . . . . 555--572 Muhammet Yildiz and Berrin Yaniko\uglu and Alisher Kholmatov and Alper Kanak and Umut Uluda\ug and Hakan Erdo\ugan Biometric Layering with Fingerprints: Template Security and Privacy Through Multi-Biometric Template Fusion . . . . 573--587 Man Ho Au and Joseph K. Liu and Zhenfei Zhang and Willy Susilo and Jin Li and Jianying Zhou Anonymous Announcement System (AAS) for Electric Vehicle in VANETs . . . . . . . 588--599 Yujue Wang and HweeHwa Pang Probabilistic Public Key Encryption for Controlled Equijoin in Relational Databases . . . . . . . . . . . . . . . 600--612 Wentan Yi and Shaozhen Chen and Yuchen Li Zero-correlation Linear Cryptanalysis of SAFER Block Cipher Family Using the Undisturbed Bits . . . . . . . . . . . . 613--624
Xiang Xu and Shuming Zhou and Jinqiang Li Reliability of Complete Cubic Networks under the Condition of $g$-Good-Neighbor 625--635 Ornela Dardha and Daniele Gorla and Daniele Varacca Semantic Subtyping for Objects and Classes . . . . . . . . . . . . . . . . 636--656 Stefan Edelkamp and Amr Elmasry and Jyrki Katajainen Heap Construction --- 50 Years Later . . 657--674 Wang Lin and Min Wu and Zhengfeng Yang and Zhenbing Zeng Verification for Non-polynomial Hybrid Systems Using Rational Invariants . . . 675--689 Yu Yang and Hongbo Liu and Hua Wang and Ansheng Deng and Colton Magnant On Algorithms for Enumerating Subtrees of Hexagonal and Phenylene Chains . . . 690--710 Akinori Kawachi and Yoshio Okamoto and Keisuke Tanaka and Kenji Yasunaga General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction . . . . . . . . . . . . . 711--728 Wiktor B. Daszczuk Communication and Resource Deadlock Analysis Using IMDS Formalism and Model Checking . . . . . . . . . . . . . . . . 729--750 Cheng Zhou and Zhonghai Yin and Youqian Feng Events Algebra of Triggers . . . . . . . 751--760 Seungbum Jo and Stelios Joannou and Daisuke Okanohara and Rajeev Raman and Srinivasa Rao Satti Compressed Bit vectors Based on Variable-to-Fixed Encodings . . . . . . 761--775
Wei Wu and Jiguang Wan and Ling Zhan and Jibin Wang and Changsheng Xie DROP: a New RAID Architecture for Enhancing Shared RAID Performance . . . 777--790 Qiufen Xia and Weifa Liang and Zichuan Xu Data Locality-Aware Big Data Query Evaluation in Distributed Clouds . . . . 791--809 Xiaoyin Li and Lianshan Yan and Wei Pan and Bin Luo Secure and Robust DV-Hop Localization Based on the Vector Refinement Feedback Method for Wireless Sensor Networks . . 810--821 Meng-Shu Chiang and Chung-Ming Huang and Duy-Tuan Dao and Binh-Chau Pham GB-PMIPv6: a Group-Based Handover Control Scheme for PMIPv6 Using the `Hitch on' Concept . . . . . . . . . . . 822--834 Ramzi Saifan and Iyad Jafar and Ghazi Al Sukkar Optimized Cooperative Spectrum Sensing Algorithms in Cognitive Radio Networks 835--849 Jia Peng and Yanmin Zhu and Qingwen Zhao and Hongzi Zhu and Jian Cao and Guangtao Xue and Bo Li Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones . . . . . . . . . . . . . . 850--865 Parisa Jalili Marandi and Marco Primi and Nicolas Schiper and Fernando Pedone Ring Paxos: High-Throughput Atomic Broadcast . . . . . . . . . . . . . . . 866--882 Ihsan Mert Ozcelik and Ibrahim Korpeoglu and Ashok Agrawala Energy Efficient IP-Connectivity with IEEE 802.11 for Home M2M Networks . . . 883--897 Chen Ying and Hao Huang and Ajay Gopinathan and Zongpeng Li A Prior-Free Spectrum Auction for Approximate Revenue Maximization . . . . 898--910 Fan Zhang and Tao Jing and Yan Huo and Kaiwei Jiang Throughput Optimization for Energy Harvesting Cognitive Radio Networks with Save-Then-Transmit Protocol . . . . . . 911--924 Li Chunlin and Zhou Min and Luo Youlong Efficient Load-Balancing Aware Cloud Resource Scheduling for Mobile User . . 925--939
Susan Lomax and Sunil Vadera A Cost-Sensitive Decision Tree Learning Algorithm Based on a Multi-Armed Bandit Framework . . . . . . . . . . . . . . . 941--956 Lin Zheng and Fuxi Zhu and Alshahrani Mohammed Attribute and Global Boosting: a Rating Prediction Method in Context-Aware Recommendation . . . . . . . . . . . . . 957--968 Salma Ben Jemaa and Mohamed Hammami and Hanene Ben-Abdallah Finger Surfaces Recognition Using Rank Level Fusion . . . . . . . . . . . . . . 969--985 S. Thayammal and D. Selvathi Edge Preserved Multispectral Image Compression Using Extended Shearlet Transform . . . . . . . . . . . . . . . 986--994 Karam Abdulahhad and Jean-Pierre Chevallet and Catherine Berrut Logics, Lattices and Probability: The Missing Links to Information Retrieval 995--1018 Long Chen and Joemon M. Jose and Haitao Yu and Fajie Yuan A Hybrid Approach for Question Retrieval in Community Question Answerin . . . . . 1019--1031 Zhiping Peng and Bo Xu and Antonio Marcel Gates and Delong Cui and Weiwei Lin A Study of a Multi-Agent Organizational Framework with Virtual Machine Clusters as the Unit of Granularity in Cloud Computing . . . . . . . . . . . . . . . 1032--1043 Joshua Goncalves and Aneesh Krishna Incorporating Change Management Within Dynamic Requirements-Based Model-Driven Agent Development . . . . . . . . . . . 1044--1077 Jianbin Huang and Yu Zhou and Xiaolin Jia and Heli Sun A Novel Social Event Organization Approach for Diverse User Choices . . . 1078--1095 Angelo Furfaro and Maria Carmela Groccia and Simona E. Rombo $2$D Motif Basis Applied to the Classification of Digital Images . . . . 1096--1109
Shuling Wang and Flemming Nielson and Hanne Riis Nielson and Naijun Zhan Modelling and Verifying Communication Failure of Hybrid Systems in HCSP . . . 1111--1130 Hailong Zhang and Yongbin Zhou Mahalanobis Distance Similarity Measure Based Higher Order Optimal Distinguisher 1131--1144 Zheng Yang and Junyu Lai and Chao Liu and Wanping Liu and Shuangqing Li Simpler Generic Constructions for Strongly Secure One-round Key Exchange from Weaker Assumptions . . . . . . . . 1145--1160 Yanwei Zhou and Bo Yang Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security . . 1161--1172 Guglielmo Cola and Marco Avvenuti and Alessio Vecchio Real-Time Identification Using Gait Pattern Analysis on a Standalone Wearable Accelerometer . . . . . . . . . 1173--1186 Huifang Yu and Bo Yang Pairing-Free and Secure Certificateless Signcryption Scheme . . . . . . . . . . 1187--1196 Haibo Yi and Weijian Li On the Importance of Checking Multivariate Public Key Cryptography for Side-Channel Attacks: The Case of enTTS Scheme . . . . . . . . . . . . . . . . . 1197--1209 Junwei Zhou and Hui Duan and Kaitai Liang and Qiao Yan and Fei Chen and F. Richard Yu and Jieming Wu and Jianyong Chen Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation . . . . . . . . . . . . . . . 1210--1222 Shabnam Seradji and Mehran S. Fallah A Bayesian Game of Whitewashing in Reputation Systems . . . . . . . . . . . 1223--1237 Gamze Tillem and Erkay Sava\cs and Kamer Kaya A New Method for Computational Private Information Retrieval . . . . . . . . . 1238--1250 Yang Liu and Andrew Simpson AdSelector: a Privacy-Preserving Advertisement Selection Mechanism for Mobile Devices . . . . . . . . . . . . . 1251--1270
Sergio L. S. Mergen and Viviane P. Moreira DuelMerge: Merging with Fewer Moves . . 1271--1278 Gregorio Hernández and Mafalda Martins Remote Monitoring by Edges and Faces of Maximal Outerplanar Graphs . . . . . . . 1279--1288 Wei Gao and Mohammad Reza Farahani Generalization Bounds and Uniform Bounds for Multi-Dividing Ontology Algorithms with Convex Ontology Loss Function . . . 1289--1299 Jose Quiroga and Francisco Ortin SSA Transformations to Facilitate Type Inference in Dynamically Typed Code . . 1300--1315 Fahimeh Ramezani and Jie Lu and Javid Taheri and Albert Y. Zomaya A Multi-Objective Load Balancing System for Cloud Environments . . . . . . . . . 1316--1337 Hu He and Xu Yang and Yanjun Zhang On Improving Performance and Energy Efficiency for Register-File Connected Clustered VLIW Architectures for Embedded System Usage . . . . . . . . . 1338--1352 Chuanli Zhao and Chou-Jung Hsu and Win-Chin Lin and Wen-Hsiang Wu and Chin-Chia Wu An Investigation of Single-Machine Due-Window Assignment with Time-Dependent Processing Times and a Controllable Rate-Modifying Activity . . 1353--1362 Lucas Bueno Ruas Oliveira and Elena Leroux and Katia Romero Felizardo and Flavio Oquendo and Elisa Yumi Nakagawa ArchSORS: a Software Process for Designing Software Architectures of Service-Oriented Robotic Systems . . . . 1363--1381 Jianbin Huang and Xiaojing Sun and Yu Zhou and Heli Sun A Team Formation Model with Personnel Work Hours and Project Workload Quantified . . . . . . . . . . . . . . . 1382--1394 Nieves R. Brisaboa and Guillermo de Bernardo and Gilberto Gutiérrez and Miguel R. Luaces and José R. Paramá Efficiently Querying Vector and Raster Data . . . . . . . . . . . . . . . . . . 1395--1413
Anonymous Special Issue on Software-Defined Wireless Networks . . . . . . . . . . . 1415--1416 Xiao Liu and Anfeng Liu and Qingyong Deng and Haolin Liu Large-Scale Programming Code Dissemination for Software-Defined Wireless Networks . . . . . . . . . . . 1417--1442 Yaser Jararweh and Mohammad Alsmirat and Mahmoud Al-Ayyoub and Elhadj Benkhelifa and Ala' Darabseh and Brij Gupta and Ahmad Doulat Software-Defined System Support for Enabling Ubiquitous Mobile Edge Computing . . . . . . . . . . . . . . . 1443--1457 Ramon dos Reis Fontes and Mohamed Mahfoudi and Walid Dabbous and Thierry Turletti and Christian Rothenberg How Far Can We Go? Towards Realistic Software-Defined Wireless Networking Experiments . . . . . . . . . . . . . . 1458--1471 Shichao Li and Gang Zhu and Siyu Lin and Chao Shen and Qian Gao and Weiliang Xie and Xiaoyu Qiao Ultra Dense Cells Management and Resource Allocation in Green Software-Defined Wireless Networks . . . 1472--1481 Seyed Hamed Rastegar and Aliazam Abbasfar and Vahid Shah-Mansouri Latency-Aware Sum-Rate Maximization for 5G Software-Defined Radio Access Networks . . . . . . . . . . . . . . . . 1482--1497 Tao Song and Yuchen Liu and Yiding Wang and Ruhui Ma and Alei Liang and Zhengwei Qi and Haibing Guan Ashman: a Bandwidth Fragmentation-Based Dynamic Flow Scheduling for Data Center Networks . . . . . . . . . . . . . . . . 1498--1509 Ahmed Abdelaziz and Ang Tan Fong and Abdullah Gani and Suleman Khan and Faiz Alotaibi and Muhammad Khurram Khan On Software-Defined Wireless Network (SDWN) Network Virtualization: Challenges and Open Issues . . . . . . . 1510--1519 Michael Rademacher and Karl Jonas and Florian Siebertz and Adam Rzyska and Moritz Schlebusch and Markus Kessel Software-Defined Wireless Mesh Networking: Current Status and Challenges . . . . . . . . . . . . . . . 1520--1535 Shaohua Wan and Yin Zhang Coverage Hole Bypassing in Wireless Sensor Networks . . . . . . . . . . . . 1536--1544
Jianbin Huang and Ze Lv and Yu Zhou and He Li and Heli Sun and others Forming Grouped Teams with Efficient Collaboration in Social Networks . . . . 1545--1560 Saurav Acharya and Byung Suk Lee and Paul Hines Causal Prediction of Top-$k$ Event Types Over Real-Time Event Streams . . . . . . 1561--1581 Lein Harn and Ching-Fang Hsu A Practical Hybrid Group Key Establishment for Secure Group Communications . . . . . . . . . . . . . 1582--1589 Emna Fendri and Mayssa Frikha and Mohamed Hammami Adaptive Person Re-identification Based on Visible Salient Body Parts in Large Camera Network . . . . . . . . . . . . . 1590--1608 Hai-Xia Xu and Wei Zhou and Yao-Nan Wang and Wei Wang and Yan Mo Matrix Separation Based on LMaFit-Seed 1609--1618 Tung Doan Nguyen and Quan Bai Enhance Trust Management in Composite Services with Indirect Ratings . . . . . 1619--1632 Shervan Fekri-Ershad and Farshad Tajeripour Impulse-Noise Resistant Color-Texture Classification Approach Using Hybrid Color Local Binary Patterns and Kullback--Leibler Divergence . . . . . . 1633--1648 H. M. W. Verbeek and W. M. P. van der Aalst and J. Munoz-Gama Divide and Conquer: a Tool Framework for Supporting Decomposed Discovery in Process Mining . . . . . . . . . . . . . 1649--1674 Ming-Hung Wang and Alex Chuan-Hsien Chang and Kuan-Ta Chen and Chin-Laung Lei Estimating Ideological Scores of Facebook Pages: an Empirical Study in Taiwan . . . . . . . . . . . . . . . . . 1675--1686 XiaoHong Han and Yan Qiang and Yuan Lan A Bird Flock Gravitational Search Algorithm Based on the Collective Response of Birds . . . . . . . . . . . 1687--1716 Lidia Fotia and Fabrizio Messina and Domenico Rosaci and Giuseppe M. L. Sarné Using Local Trust for Forming Cohesive Social Structures in Virtual Communities 1717--1727
Yang Lu and Jiguo Li and Jian Shen Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model . . . . 1729--1744 El-Sayed M. El-Alfy Detection of Phishing Websites Based on Probabilistic Neural Networks and $K$-Medoids Clustering . . . . . . . . . 1745--1759 Abderrahim Ait Wakrime Satisfiability-Based Privacy-Aware Cloud Computing . . . . . . . . . . . . . . . 1760--1769 Jayashree Pougajendy and Arun Raj Kumar Parthiban Detection of SIP-Based Denial of Service Attack Using Dual Cost Formulation of Support Vector Machine . . . . . . . . . 1770--1784 Ying Wu and Jinyong Chang and Rui Xue and Rui Zhang Homomorphic MAC from Algebraic One-Way Functions for Network Coding with Small Key Size . . . . . . . . . . . . . . . . 1785--1800 Damien Vergnaud Comment on `Attribute-Based Signatures for Supporting Anonymous Certification' by N. Kaaniche and M. Laurent (ESORICS 2016) . . . . . . . . . . . . . . . . . 1801--1808 Jianchang Lai and Yi Mu and Fuchun Guo and Rongmao Chen Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization 1809--1821 Sha Ma Authorized Equi-join for Multiple Data Contributors in the PKC-Based Setting 1822--1838 Howard M. Heys Statistical Cipher Feedback of Stream Ciphers . . . . . . . . . . . . . . . . 1839--1851 Xiaofang Xia and Wei Liang and Yang Xiao and Meng Zheng Difference-Comparison-based Malicious Meter Inspection in Neighborhood Area Networks in Smart Grid . . . . . . . . . 1852--1870 Weiran Liu and Xiao Liu and Jianwei Liu and Qianhong Wu Auditing Revocable Privacy-Preserving Access Control for EHRs in Clouds . . . 1871--1888 Xavier Bonnaire and Rudyar Cortés and Fabrice Kordon and Olivier Marin ASCENT: a Provably Terminating Decentralized Logging Service . . . . . 1889--1911 Dario Fiore and María Isabel González Vasco and Claudio Soriente Partitioned Group Password-Based Authenticated Key Exchange . . . . . . . 1912--1922
Xin-ju Zhang Multi-state System Reliability Analysis Based on Fuzzy Colored Petri Nets . . . 1--13 Chin-Chia Wu and Shang-Chia Liu and Chuanli Zhao and Sheng-Zhi Wang and Win-Chin Lin A Multi-Machine Order Scheduling with Learning Using the Genetic Algorithm and Particle Swarm Optimization . . . . . . 14--31 Jurairat Phuttharak and Seng W. Loke LogicCrowd: Crowd-Powered Logic Programming Based Mobile Applications 32--46 Ji-Bo Wang and Lin Li Machine Scheduling with Deteriorating Jobs and Modifying Maintenance Activities . . . . . . . . . . . . . . . 47--53 Hon-Chan Chen and Tzu-Liang Kung and Lih-Hsing Hsu An Augmented Pancyclicity Problem of Crossed Cubes . . . . . . . . . . . . . 54--62 Nidhi Kalra and Ajay Kumar Deterministic Deep Pushdown Transducer and its Parallel Version . . . . . . . . 63--73 J. C. Saez and A. Pousa and A. E. de Giusti and M. Prieto-Matias On the Interplay Between Throughput, Fairness and Energy Efficiency on Asymmetric Multicore Processors . . . . 74--94 Nisha Chaurasia and Shashikala Tapaswi and Joydip Dhar A Resource Efficient Expectation Maximization Clustering Approach for Cloud . . . . . . . . . . . . . . . . . 95--104 Zhenyou Wang and Cuntao Xiao and Xianwei Lin and Yuan-Yuan Lu Single Machine Total Absolute Differences Penalties Minimization Scheduling with a Deteriorating and Resource-Dependent Maintenance Activity 105--110 Wojciech Mu\la and Nathan Kurz and Daniel Lemire Faster Population Counts Using AVX2 Instructions . . . . . . . . . . . . . . 111--120 Jou-Ming Chang and Jinn-Shyong Yang and Shyue-Ming Tang and Kung-Jui Pai The Wide Diameters of Regular Hyper-Stars and Folded Hyper-Stars . . . 121--128 Xiaoyan Li and Jianxi Fan and Cheng-Kuan Lin and Xiaohua Jia Diagnosability Evaluation of the Data Center Network DCell . . . . . . . . . . 129--143 Xiaodong Meng and Minyi Guo and Jingyu Zhang An Efficient Graph Query Framework with Structural Recursion . . . . . . . . . . 144--157 Jianbin Huang and Xiaojing Sun and Yu Zhou and Heli Sun Corrigendum: A Team Formation Model with Personnel Work Hours and Project Workload Quantified . . . . . . . . . . 158--158
Saurabh K. Pandey and Mukesh A. Zaveri Quasi Random Deployment and Localization in Layered Framework for the Internet of Things . . . . . . . . . . . . . . . . . 159--179 Xiaolin Chang and Tianju Wang and Ricardo J. Rodríguez and Zhenjiang Zhang Modeling and Analysis of High Availability Techniques in a Virtualized System . . . . . . . . . . . . . . . . . 180--198 Natarajan Meghanathan Complex Network Analysis-Based Graph Theoretic Metrics to Determine Stable Data Gathering Trees for Mobile Sensor Networks . . . . . . . . . . . . . . . . 199--222 I Karthiga and Sharmila Sankar Providing Secret Authentication in Clustered Security Architecture for Cloud-Based WBAN . . . . . . . . . . . . 223--232 Tahani H. Hussain and Paulvanna N. Marimuthu and Sami J. Habib Exploration of Storage Architectures for Enterprise Network . . . . . . . . . . . 233--247 S. Sarathambekai and K. Umamaheswari Multi-Objective Optimization Techniques for Task Scheduling Problem in Distributed Systems . . . . . . . . . . 248--263 Bang Chul Jung and Jae Sook Yoo and Woongsup Lee A Practical Physical-Layer Network Coding with Spatial Modulation in Two-Way Relay Networks . . . . . . . . . 264--272 Jigang Wu and Long Chen and Xu Wang and Guiyuan Jiang and Siew-kei Lam and Thambipillai Srikanthan Algorithms for Replica Placement and Update in Tree Network . . . . . . . . . 273--287 Lin Lyu and Shengli Liu and Shuai Han Public-Key Encryption with Tight Simulation-Based Selective-Opening Security . . . . . . . . . . . . . . . . 288--318
Mona Taghavi and Jamal Bentahar and Kaveh Bakhtiyari and Chihab Hanachi New Insights Towards Developing Recommender Systems . . . . . . . . . . 319--348 Iqbal H. Sarker and Alan Colman and Muhammad Ashad Kabir and Jun Han Individualized Time-Series Segmentation for Mining Mobile Phone User Behavior 349--368 Prashant Srivastava and Ashish Khare Content-Based Image Retrieval using Local Binary Curvelet Co-occurrence Pattern --- A Multiresolution Technique 369--385 Vasilis Kolias and Ioannis Anagnostopoulos and Sherali Zeadally Structural analysis and classification of search interfaces for the deep web 386--398 Jeremy Barnett and Philip Treleaven Algorithmic Dispute Resolution --- The Automation of Professional Dispute Resolution Using AI and Blockchain Technologies . . . . . . . . . . . . . . 399--408 Zhou Shao and Muhammad Aamir Cheema and David Taniar Trip Planning Queries in Indoor Venues 409--426 Chitra M. Subramanian and Aneesh Krishna and Arshinder Kaur Game Theory-Based Requirements Analysis in the $ i^* $ Framework . . . . . . . . 427--446 Meng-Jia Zhang and Kang Zhang and Jie Li and Yi-Na Li Visual Exploration of $3$D Geospatial Networks in a Virtual Reality Environment . . . . . . . . . . . . . . 447--458 Hazem Hiary and Rawan Zaghloul and Moh'd Belal Al-Zoubi Single-Image Shadow Detection using Quaternion Cues . . . . . . . . . . . . 459--468
Jianhong Zhang and Jian Mao On the Security of a Pairing-Free Certificateless Signcryption Scheme . . 469--471 Emma Osborn and Andrew Simpson Risk and the Small-Scale Cyber Security Decision Making Dialogue --- a UK Case Study . . . . . . . . . . . . . . . . . 472--495 Haiqin Wu and Liangmin Wang and Shunrong Jiang Secure Top-$k$ Preference Query for Location-based Services in Crowd-outsourcing Environments . . . . . 496--511 Tran Viet Xuan Phuong and Guomin Yang and Willy Susilo Criteria-Based Encryption . . . . . . . 512--525 Yanping Shen and Kangfeng Zheng and Chunhua Wu and Mingwu Zhang and Xinxin Niu and Yixian Yang An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection . . . . . . . . . . . . . . . 526--538 Xi-Jun Lin and Lin Sun and Haipeng Qu and Dongxiao Liu Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme . . 539--544 Siyuan Chen and Peng Zeng and Kim-Kwang Raymond Choo and Xiaolei Dong Efficient Ring Signature and Group Signature Schemes Based on $q$-ary Identification Protocols . . . . . . . . 545--560 Qiqi Lai and Bo Yang and Yong Yu and Yuan Chen and Jian Bai Novel Smooth Hash Proof Systems Based on Lattices . . . . . . . . . . . . . . . . 561--574 Husen Wang and Qiang Tang Efficient Homomorphic Integer Polynomial Evaluation Based on GSW FHE . . . . . . 575--585 Yanwei Zhou and Bo Yang and Yi Mu Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles . . . . . . . . . . . . . . . . 586--600 Kamalkumar R. Macwan and Sankita J. Patel $k$-NMF Anonymization in Social Network Data Publishing . . . . . . . . . . . . 601--613 Kaushal A. Shah and Devesh C. Jinwala Privacy Preserving, Verifiable and Resilient Data Aggregation in Grid-Based Networks . . . . . . . . . . . . . . . . 614--628
Shuanglong Kan and Zhiqiu Huang Partial Order Reduction for the full Class of State/Event Linear Temporal Logic . . . . . . . . . . . . . . . . . 629--644 Lalit Mohan Goyal and M. M. Sufyan Beg and Tanvir Ahmad An Efficient Framework for Mining Association Rules in the Distributed Databases . . . . . . . . . . . . . . . 645--657 Liangze Yin and Wei Dong and Fei He and Ji Wang A True-Concurrency Encoding for BMC of Compositional Systems . . . . . . . . . 658--671 Mei-Mei Gu and Rong-Xia Hao and Yan-Quan Feng and Ai-Mei Yu The $3$-extra Connectivity and Faulty Diagnosability . . . . . . . . . . . . . 672--686 Edans F. O. Sandes and George L. M. Teodoro and Maria Emilia M. T. Walter and Xavier Martorell and Eduard Ayguade and Alba C. M. A. Melo Formalization of Block Pruning: Reducing the Number of Cells Computed in Exact Biological Sequence Comparison Algorithms . . . . . . . . . . . . . . . 687--713 Liqiong Xu and Shuming Zhou and Guanqin Lian and Zuwen Luo A Kind of Conditional Connectivity of Cayley Graphs Generated by $2$-trees . . 714--721 Mosong Zhou and Xiaoshe Dong and Heng Chen and Xingjun Zhang A Runtime Available Resource Capacity Evaluation Model Based on the Concept of Similar Tasks . . . . . . . . . . . . . 722--744 Yi Qi and Huan Li and Zhongzhi Zhang Extended Corona Product as an Exactly Tractable Model for Weighted Heterogeneous Networks . . . . . . . . . 745--760 Shiying Wang and Guozhen Zhang and Kai Feng Edge Fault Tolerance of Cartesian Product Graphs on Super Restricted Edge Connectivity . . . . . . . . . . . . . . 761--772 Andrea Farruggia and Travis Gagie and Gonzalo Navarro and Simon J. Puglisi and Jouni Sirén Relative Suffix Trees . . . . . . . . . 773--788
Dan Feng and Ma Yajie and Zhou Fengxing and Wang Xiaomao and He Kai A Safety Message Broadcast Strategy in Hybrid Vehicular Network Environment . . 789--797 Tua A. Tamba On Handelman's Representation of Network Utility Maximization . . . . . . . . . . 798--807 Giuseppe Lettieri and Vincenzo Maffione and Luigi Rizzo A Study of I/O Performance of Virtual Machines . . . . . . . . . . . . . . . . 808--831 Atul Tripathi and Isha Pathak and Deo Prakash Vidyarthi Energy Efficient VM Placement for Effective Resource Utilization using Modified Binary PSO . . . . . . . . . . 832--846 Jyotshana Kanti and Geetam Singh Tomar Solution of sensing failure problem: an improved two-stage detector . . . . . . 847--855 R. Rodríguez-Rodríguez and J. Díaz and F. Castro and P. Ibáñez and D. Chaver and V. Viñals and J. C. Saez and M. Prieto-Matias and L. Piñuel and T. Monreal and J. M. Llabería Reuse Detector: Improving the Management of STT-RAM SLLCs . . . . . . . . . . . . 856--880 Nileshkumar R. Patel and Shishir Kumar Energy-Efficient Approach for Effective Estimation of Delimited Node Position with Limited References . . . . . . . . 881--895 Ping Xie and Jianzhong Huang and Xiao Qin and Changsheng Xie SmartRec: Fast Recovery from Single Failures in Heterogeneous RAID-Coded Storage Systems . . . . . . . . . . . . 896--911 Francisco José Esteban and David Díaz and Pilar Hernández and Juan Antonio Caballero and Gabriel Dorado and Sergio Gálvez MC64-Cluster: Many-Core CPU Cluster Architecture and Performance Analysis in B-Tree Searches . . . . . . . . . . . . 912--925 Thompson Stephan and K. Suresh Joseph Particle Swarm Optimization-Based Energy Efficient Channel Assignment Technique for Clustered Cognitive Radio Sensor Networks . . . . . . . . . . . . . . . . 926--936 Tong Liu and Yanmin Zhu and Ting Wen and Jiadi Yu Location Privacy-Preserving Method for Auction-Based Incentive Mechanisms in Mobile Crowd Sensing . . . . . . . . . . 937--948
Chao Tong and Xiang Yin and Jun Li and Tongyu Zhu and Renli Lv and Liang Sun and Joel J. P. C. Rodrigues A shilling attack detector based on convolutional neural network for collaborative recommender system in social aware network . . . . . . . . . . 949--958 Jieren Cheng and Jinghe Zhou and Qiang Liu and Xiangyan Tang and Yanxiang Guo A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence . . . . . . . . 959--970 Noor Ullah and Xiangjie Kong and Liangtian Wan and Honglong Chen and Zhibo Wang and Feng Xia A Social Utility-Based Dissemination Scheme for Emergency Warning Messages in Vehicular Social Networks . . . . . . . 971--986 Jiaqi Wang and Yunyao Lu and Xiaojie Wang and Jing Dong and Xiping Hu SAR: a Social-Aware Route Recommendation System for Intelligent Transportation 987--997 Mostafa Haghir Chehreghani and Albert Bifet and Talel Abdessalem Discriminative Distance-Based Network Indices with Application to Link Prediction . . . . . . . . . . . . . . . 998--1014 Xiaogang Fu and Jianyong Sun Reference-Inspired Many-Objective Evolutionary Algorithm Based on Decomposition . . . . . . . . . . . . . 1015--1037 Alexey Stakhov Mission-Critical Systems, Paradox of Hamming Code, Row Hammer Effect, `Trojan Horse' of the Binary System and Numeral Systems with Irrational Bases . . . . . 1038--1063 Yonghong Hou and Lin Xue and Shuo Li and Jiaming Xing User-Experience-Oriented Fuzzy Logic Controller for Adaptive Streaming . . . 1064--1074 Wassim Derguech and Sami Bhiri and Edward Curry Using Ontologies for Business Capability modelling: Describing What Services and Processes Achieve . . . . . . . . . . . 1075--1098 C. Harriet Linda and G. Wiselin Jiji Hierarchical Approach to Detect Fractures in CT DICOM Images . . . . . . 1099--1108
Khalifa Toumi and Mohamed Aouadi and Ana R. Cavalli and Wissam Mallouli and Jordi Puiggal Allepuz and Pol Valletb Montfort A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System . . . . . . . . 1109--1122 Rong Wang and Yan Zhu and Tung-Shou Chen and Chin-Chen Chang An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining . . . . . 1123--1132 Haijiang Wang and Xiaolei Dong and Zhenfu Cao and Dongmei Li Secure and Efficient Attribute-Based Encryption with Keyword Search . . . . . 1133--1142 Gunikhan Sonowal and K. S. Kuppusamy SmiDCA: an Anti-Smishing Model with Machine Learning Approach . . . . . . . 1143--1157 Rongjia Li and Chenhui Jin Meet-in-the-Middle Attacks on Reduced-Round QARMA-64/128 . . . . . . . 1158--1165 Xiaojuan Zhang and Xiutao Feng and Dongdai Lin Fault Attack on ACORN v3 . . . . . . . . 1166--1179 Amir Daneshgar and Fahimeh Mohebbipoor A Secure Self-Synchronized Stream Cipher 1180--1201 Baoguo Yuan and Junfeng Wang and Zhiyang Fang and Li Qi A New Software Birthmark based on Weight Sequences of Dynamic Control Flow Graph for Plagiarism Detection . . . . . . . . 1202--1215 Jianye Huang and Qiong Huang and Willy Susilo Leakage-Resilient Dual-Form Signatures 1216--1227 Dianyan Xiao and Yang Yu Klepto for Ring-LWE Encryption . . . . . 1228--1239 Jianchang Lai and Yi Mu and Fuchun Guo and Peng Jiang and Sha Ma Identity-Based Broadcast Encryption for Inner Products . . . . . . . . . . . . . 1240--1251 Ya Liu and Anren Yang and Bo Dai and Wei Li and Zhiqiang Liu and Dawu Gu and Zhiqiang Zeng Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128 . . . . . . . . 1252--1258 Baodong Qin and Qinglan Zhao and Dong Zheng Bounded Revocable and Outsourceable ABE for Secure Data Sharing . . . . . . . . 1259--1268
Bei-yang Zhang and Xie-dong Zhang and Zhi-hua Zhang Nested-Stacking Genetic Algorithm for the Optimal Placement of Sensors in Bridge . . . . . . . . . . . . . . . . . 1269--1283 Jialei Liu and Shangguang Wang and Ao Zhou and Xiang Xu and Sathish A. P. Kumar and Fangchun Yang Towards Bandwidth Guaranteed Virtual Cluster Reallocation in the Cloud . . . 1284--1295 Zhi Chen and Xiaolin Chang and Zhen Han and Lin Li Survivability Modeling and Analysis of Cloud Service in Distributed Data Centers . . . . . . . . . . . . . . . . 1296--1305 Walayat Hussain and Farookh Khadeer Hussain and Omar Hussain and Ravindra Bagia and Elizabeth Chang Risk-based framework for SLA violation abatement from the cloud service provider's perspective . . . . . . . . . 1306--1322 Jian Jin and Ping Ji Scheduling jobs with resource-dependent ready times and processing times depending on their starting times and positions . . . . . . . . . . . . . . . 1323--1328 Ji-Bo Wang and Xin-Na Geng and Lu Liu and Jian-Jun Wang and Yuan-Yuan Lu Single Machine CON/SLK Due Date Assignment Scheduling with Controllable Processing Time and Job-dependent Learning Effects . . . . . . . . . . . . 1329--1337 Shufeng Kong and Sanjiang Li and Michael Sioutis Exploring Directional Path-Consistency for Solving Constraint Networks . . . . 1338--1350 Simone Faro and Arianna Pavone An Efficient Skip-Search Approach to Swap Matching . . . . . . . . . . . . . 1351--1360 Nurul Liyana Mohamad Zulkufli and Sherzod Turaev and Mohd Izzuddin Mohd Tamrin and Azeddine Messikh Watson--Crick Context-Free Grammars: Grammar Simplifications and a Parsing Algorithm . . . . . . . . . . . . . . . 1361--1373 Andrea Pinna and Roberto Tonelli and Matteo Orrú and Michele Marchesi A Petri Nets Model for Blockchain Analysis . . . . . . . . . . . . . . . . 1374--1388 Samuel Tweneboah-Koduah and William J. Buchanan Security Risk Assessment of Critical Infrastructure Systems: a Comparative Study . . . . . . . . . . . . . . . . . 1389--1406 Pedro Álvarez and Sergio Hernández and Javier Fabra and Joaquín Ezpeleta Cost-driven provisioning and execution of a computing-intensive service on the Amazon EC2 . . . . . . . . . . . . . . . 1407--1421 Ji-Bo Wang and Lu Liu and Jian-Jun Wang and Lin Li Makespan minimization scheduling with ready times, group technology and shortening job processing times . . . . 1422--1428
Leonildo J. M. de Azevedo and Júlio C. Estrella and Luis H. V. Nakamura and Marcos J. Santana and Regina H. C. Santana and Cláudio F. Motta Toledo and Bruno G. Batista and Stephan Reiff-Marganiec Optimized Service Level Agreement Establishment in Cloud Computing . . . . 1429--1442 Zhenni Feng and Yanmin Zhu and Hui Cai and Pingyi Luo Optimal Distributed Auction for Mobile Crowd Sensing . . . . . . . . . . . . . 1443--1459 Yunus Ozen and Cuneyt Bayilmis urgMAC: a New Traffic and QoS-aware Cross-Layer MAC protocol for Wireless Multimedia Sensor Networks . . . . . . . 1460--1467 Soumya Das and Tamaghna Acharya Faulty Node Detection in HMM-Based Cooperative Spectrum Sensing For Cognitive Radio Networks . . . . . . . . 1468--1478 Reza Entezari-Maleki and Kishor S. Trivedi and Leonel Sousa and Ali Movaghar Performability-Based Workflow Scheduling in Grids . . . . . . . . . . . . . . . . 1479--1495 Maroua Meddeb and Amine Dhraief and Abdelfettah Belghith and Thierry Monteil and Khalil Drira and Saad AlAhmadi Cache Freshness in Named Data Networking for the Internet of Things . . . . . . . 1496--1511 Margarida Mamede and José Legatheaux Martins and João Horta BOUQUET --- Aggregating Network Paths in Trees to Reduce Data-Plane Forwarding State . . . . . . . . . . . . . . . . . 1512--1522 N. Gobalakrishnan and C. Arun A New Multi-Objective Optimal Programming Model for Task Scheduling using Genetic Gray Wolf Optimization in Cloud Computing . . . . . . . . . . . . 1523--1536 Frédéric Giroire and Nicolas Huin and Joanna Moulierac and Truong Khoa Phan Energy-Aware Routing in Software-Defined Network using Compression . . . . . . . 1537--1556 Anubis Graciela de Moraes Rossetto and Cláudio F. R. Geyer and Luciana Arantes and Pierre Sens Impact FD: an Unreliable Failure Detector Based on Process Relevance and Confidence in the System . . . . . . . . 1557--1576 S. Renuga and S. S. K. Jagatheeshwari Efficient Privacy-Preserving Data Sanitization over Cloud Using Optimal GSA Algorithm . . . . . . . . . . . . . 1577--1588
Himangshu Sarma and Robert Porzel and Jan D. Smeddinck and Rainer Malaka and Arun Baran Samaddar A Text to Animation System for Physical Exercises . . . . . . . . . . . . . . . 1589--1604 Qirong Mao and Feifei Zhang and Liangjun Wang and Sidian Luo and Ming Dong Cascaded Multi-level Transformed Dirichlet Process for Multi-pose Facial Expression Recognition . . . . . . . . . 1605--1619 Ammar Sohail and Muhammad Aamir Cheema and David Taniar Social-Aware Spatial Top-k and Skyline Queries . . . . . . . . . . . . . . . . 1620--1638 Md Mosaddek Khan and Long Tran-Thanh and Sarvapali D. Ramchurn and Nicholas R. Jennings Speeding Up GDL-Based Message Passing Algorithms for Large-Scale DCOPs . . . . 1639--1666 Sunny Rai and Shampa Chakraverty and Devendra K. Tayal and Yash Kukreti A Study on Impact of Context on Metaphor Detection . . . . . . . . . . . . . . . 1667--1682 Chandra Prakash and Rajesh Kumar and Namita Mittal Optimized Clustering Techniques for Gait Profiling in Children with Cerebral Palsy for Rehabilitation . . . . . . . . 1683--1694 Zhenjun Tang and Ziqing Huang and Heng Yao and Xianquan Zhang and Lv Chen and Chunqiang Yu Perceptual Image Hashing with Weighted DWT Features for Reduced-Reference Image Quality Assessment . . . . . . . . . . . 1695--1709 Zhi-Fang Yang and Chih-Ting Kuo and Te-Hsi Kuo Authorization Identification by Watermarking in Log-polar Coordinate System . . . . . . . . . . . . . . . . . 1710--1723 Zhi-jie Liang and Sheng-bin Liao and Bing-zhang Hu $3$D Convolutional Neural Networks for Dynamic Sign Language Recognition . . . 1724--1736 H. Hassanpour and N. Nowrozian and M. M. AlyanNezhadi and N. Samadiani Image Zooming Using a Multi-layer Neural Network . . . . . . . . . . . . . . . . 1737--1748
David W. Archer and Dan Bogdanov and Yehuda Lindell and Liina Kamm and Kurt Nielsen and Jakob Illeborg Pagter and Nigel P. Smart and Rebecca N. Wright From Keys to Databases --- Real-World Applications of Secure Multi-Party Computation . . . . . . . . . . . . . . 1749--1771 Eunsung Lee and Sang Woo Kim Non-interactive Conditional Proxy Re-Signature in the Standard Model . . . 1772--1782 Tingting Lin and Hailun Yan and Xuejia Lai and Yixin Zhong and Yin Jia Security Evaluation and Improvement of a White-Box SMS4 Implementation Based on Affine Equivalence Algorithm . . . . . . 1783--1790 Xi-Jun Lin and Lin Sun and Haipeng Qu and Dongxiao Liu On the Security of Secure Server-Designation Public Key Encryption with Keyword Search . . . . . . . . . . 1791--1793 Yunhua Wen and Shengli Liu and Ziyuan Hu and Shuai Han Computational Robust Fuzzy Extractor . . 1794--1805 Yi Dou and Henry C. B. Chan and Man Ho Au Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage . . 1806--1824 Shuai Han and Shengli Liu and Lin Lyu and Dawu Gu Tightly Secure Encryption Schemes against Related-Key Attacks . . . . . . 1825--1844 Biao Wang and Xueqing Wang and Rui Xue and Xinyi Huang Matrix FHE and Its Application in Optimizing Bootstrapping . . . . . . . . 1845--1861 Yung-Ting Chuang and Yi-Fan Lee Defense Mechanism for Malicious and Selective Forwarding Attacks in Large and Mobile Wireless Networks . . . . . . 1862--1879 Jinhui Liu and Yong Yu and Bo Yang and Jianwei Jia and Shijia Wang and Houzhen Wang Structural Key Recovery of Simple Matrix Encryption Scheme Family . . . . . . . . 1880--1896 Qingwen Guo and Qiong Huang and Guomin Yang Authorized Function Homomorphic Signature . . . . . . . . . . . . . . . 1897--1908
Nazmun Naher and Tanzima Hashem Think Ahead: Enabling Continuous Sharing of Location Data in Real-Time with Privacy Guarantee . . . . . . . . . . . 1--19 Shmuel T. Klein and Dana Shapira Context Sensitive Rewriting Codes for Flash Memory . . . . . . . . . . . . . . 20--29 Zbyn\vek K\vrivka and Ji\vrí Ku\vcera and Alexander Meduna Jumping Pure Grammars . . . . . . . . . 30--41 Chengcheng Mou and Shaoping Chen and Yi-Cheng Tu A Comparative Study of Dual-Tree Algorithms for Computing Spatial Distance Histograms . . . . . . . . . . 42--62 Yuan Lin and Zhongzhi Zhang Non-Backtracking Centrality Based Random Walk on Networks . . . . . . . . . . . . 63--80 Weiwei Liu and Chong Jiang and Ji-Bo Wang and Yuan-Yuan Lu Single-machine scheduling with simultaneous considerations of resource allocation and deteriorating jobs . . . 81--89 Yu Tian and Ming Xu and Chong Jiang and Ji-Bo Wang and Xiao-Yuan Wang No-wait resource allocation flowshop scheduling with learning effect under limited cost availability . . . . . . . 90--96 Abel Cabrera Martínez and Frank A. Hernández Mira and José M. Sigarreta Almira and Ismael G. Yero On Computational and Combinatorial Properties of the Total Co-independent Domination Number of Graphs . . . . . . 97--108 Vanderson Hafemann Fragal and Adenilso Simao and Mohammad Reza Mousavi and Uraz Cengiz Turker Extending HSI Test Generation Method for Software Product Lines . . . . . . . . . 109--129 Dong-Yuh Yang and Yi-Chun Cho Analysis of the $N$-policy GI/M/1/K Queueing Systems with Working Breakdowns and Repairs . . . . . . . . . . . . . . 130--143 Shu-Li Zhao and Rong-Xia Hao The Generalized Three-Connectivity of Two Kinds of Cayley Graphs . . . . . . . 144--149 Bing Zhu and Kenneth W. Shum and Hui Li On the Duality and File Size Hierarchy of Fractional Repetition Codes . . . . . 150--160
Bruno Guazzelli Batista and Bruno Tardiole Kuehne and Dionisio Machado Leite Filho and Maycon Leone Maciel Peixoto Security Overhead on a Service with Automatic Resource Management: a Performance Analysis . . . . . . . . . . 161--173 Salman Taherizadeh and Vlado Stankovski Dynamic Multi-level Auto-scaling Rules for Containerized Applications . . . . . 174--197 Yeim-Kuan Chang and Han-Chen Chen Fast Packet Classification using Recursive Endpoint-Cutting and Bucket Compression on FPGA . . . . . . . . . . 198--214 Fan Zhang and Tao Jing and Yan Huo and Kaiwei Jiang Joint Optimization of Spectrum Sensing and Transmit Power in Energy Harvesting Cognitive Radio Sensor Networks . . . . 215--230 Matthieu Barjon and Arnaud Casteigts and Serge Chaumette and Colette Johnen and Yessin M. Neggaz Maintaining a Distributed Spanning Forest in Highly Dynamic Networks . . . 231--246 Jianzhong Huang and Panping Zhou and Xiao Qin and Yanqun Wang and Changsheng Xie Optimizing Erasure-Coded Data Archival for Replica-Based Storage Clusters . . . 247--262 C. BrijilalRuban and B. Paramasivan Cluster-Based Secure Communication and Certificate Revocation Scheme for VANET 263--275 Neetesh Kumar and Deo Prakash Vidyarthi A Hybrid Heuristic for Load-Balanced Scheduling of Heterogeneous Workload on Heterogeneous Systems . . . . . . . . . 276--291 Ahmad Hiasat and Leonel Sousa On the Design of RNS Inter-Modulo Processing Units for the Arithmetic-Friendly Moduli Sets $ 2^{n + k} $, $ 2^n - 1 $, $ 2^{n + 1} - 1 $ . . 292--300 Xinjian Luo and Xiaofeng Gao and Guihai Chen Accelerate Data Retrieval by Multi-Dimensional Indexing in Switch-Centric Data Centers . . . . . . 301--320
Jesús M. Almendros-Jiménez and Antonio Becerra-Terón and Manuel Torres Integrating and Querying OpenStreetMap and Linked Geo Open Data . . . . . . . . 321--345 Raphael Angulu and Jules R. Tapamo and Aderemi O. Adewumi Age-Group Estimation Using Feature and Decision Level Fusion . . . . . . . . . 346--358 Ximing Li and Ang Zhang and Changchun Li and Lantian Guo and Wenting Wang and Jihong Ouyang Relational Biterm Topic Model: Short-Text Topic Modeling using Word Embeddings . . . . . . . . . . . . . . . 359--372 Chris J. Mitchell Security issues in a group key establishment protocol . . . . . . . . . 373--376 Asieh Ghanbarpour and Hassan Naderi A Model-based Keyword Search Approach for Detecting Top-$k$ Effective Answers 377--393 Michael Scriney and Suzanne McCarthy and Andrew McCarren and Paolo Cappellari and Mark Roantree Automating Data Mart Construction from Semi-structured Data Sources . . . . . . 394--413 Hafiz Tayyeb Javed and Mirza Omer Beg and Hasan Mujtaba and Hammad Majeed and Muhammad Asim Fairness in Real-Time Energy Pricing for Smart Grid Using Unsupervised Learning 414--429 Weihua Li and Quan Bai and Minjie Zhang A Multi-agent System for Modelling Preference-Based Complex Influence Diffusion in Social Networks . . . . . . 430--447 Zeynep Engin and Philip Treleaven Algorithmic Government: Automating Public Services and Supporting Civil Servants in using Data Science Technologies . . . . . . . . . . . . . . 448--460 Sandra Sampaio and Mashael Aljubairah and Hapsoro Adi Permana and Pedro Sampaio A Conceptual Approach for Supporting Traffic Data Wrangling Tasks . . . . . . 461--480
Gaoli Wang and Zhenfu Cao and Xiaolei Dong Improved Fault-Tolerant Aggregate Signatures . . . . . . . . . . . . . . . 481--489 Hui Guo and Zhenfeng Zhang and Jing Xu and Ningyu An Non-transferable Proxy Re-encryption . . 490--506 Fatemeh Rezaeibagha and Yi Mu Efficient Micropayment of Cryptocurrency from Blockchains . . . . . . . . . . . . 507--517 Van Tuyen Dang and Truong Thu Huong and Nguyen Huu Thanh and Pham Ngoc Nam and Nguyen Ngoc Thanh and Alan Marshall SDN-Based SYN Proxy --- A Solution to Enhance Performance of Attack Mitigation Under TCP SYN Flood . . . . . . . . . . 518--534 Rongjia Li and Chenhui Jin and Ruya Fan Improved Integral Distinguishers on Compression Function of GOST R Hash Function . . . . . . . . . . . . . . . . 535--544 Kwangsu Lee and Dong Hoon Lee and Jong Hwan Park and Moti Yung CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts . . . . . 545--562 Ming Zeng and Kai Zhang and Haifeng Qian and Xiaofeng Chen and Jie Chen A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications . . . . . . . . . 563--578 Hongyun Cai and Fuzhi Zhang An Unsupervised Method for Detecting Shilling Attacks in Recommender Systems by Mining Item Relationship and Identifying Target Items . . . . . . . . 579--597 Muhammed Ali Bingöl and Osman Biçer and Mehmet Sabir Kiraz and Albert Levi An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates 598--613 Keita Emura and Hayato Kimura and Toshihiro Ohigashi and Tatsuya Suzuki Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions and Its Implementations . . . . . . . . 614--630 Yi Zhao and Yong Yu and Bo Yang Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications . . . . . . . . . 631--640
Mahmoud Darwich and Mohsen Amini Salehi and Ege Beyazit and Magdy Bayoumi Cost-Efficient Cloud-Based Video Streaming Through Measuring Hotness . . 641--656 Mira Gonen and Dana Shapira and James A. Storer Edit Distance with Multiple Block Operations . . . . . . . . . . . . . . . 657--669 A. S. M. Kayes and Jun Han and Wenny Rahayu and Tharam Dillon and Md Saiful Islam and Alan Colman A Policy Model and Framework for Context-Aware Access Control to Information Resources . . . . . . . . . 670--705 Shuang Zhao and Jixiang Meng Arc Fault Tolerance of Maximally Arc-Connected Networks Modeled By Digraphs . . . . . . . . . . . . . . . . 706--714 Shiying Wang and Mujiangshan Wang The strong connectivity of bubble-sort star graphs . . . . . . . . . . . . . . 715--729 Alkida Balliu and Pierre Fraigniaud Certification of Compact Low-Stretch Routing Schemes . . . . . . . . . . . . 730--746 Yafei Zhai and Limei Lin and Li Xu and Xinxin Zhang and Yanze Huang The Conditional Diagnosability with $g$-Good-Neighbor of Exchanged Hypercubes . . . . . . . . . . . . . . . 747--756 Khaled El-Fakih and Nina Yevtushenko and Ayat Saleh Incremental and Heuristic Approaches for Deriving Adaptive Distinguishing Test Cases for Non-deterministic Finite-State Machines . . . . . . . . . . . . . . . . 757--768 Yi Qi and Yuhao Yi and Zhongzhi Zhang Topological and Spectral Properties of Small-World Hierarchical Graphs . . . . 769--784 Chunlin Li and Jingpan Bai and Shaofeng Du and Chunguang Yang and Youlong Luo Combining Tag Correlation and Interactive Behaviors for Community Discovery . . . . . . . . . . . . . . . 785--800
Zina Nakhla and Kaouther Nouira and Ahmed Ferchichi Prescription Adverse Drug Events System (PrescADE) Based on Ontology and Internet of Things . . . . . . . . . . . 801--805 Ian C. Pyle Software for the Linesman Radar Data Processing System . . . . . . . . . . . 806--819 Faisal Ahmed and Corentin Kervadec and Yannick Le Moullec and Gert Tamberg and Paul Annus Autonomous Wireless Sensor Networks: Implementation of Transient Computing and Energy Prediction for Improved Node Performance and Link Quality . . . . . . 820--837 Muhammad Usman and Aris Cahyadi Risdianto and Jungsu Han and Jongwon Kim Interactive Visualization of SDN-Enabled Multisite Cloud Playgrounds Leveraging SmartX MultiView Visibility Framework 838--854 Ab Shaqoor Nengroo and K. S. Kuppusamy `Advertisements or adverse-tisements?' --- An accessibility barrier for persons with visual impairments . . . . . . . . 855--868 Jianzhong Huang and Jie Xia and Xiao Qin and Qiang Cao and Changsheng Xie Optimization of Small Updates for Erasure-Coded In-memory Stores . . . . . 869--883 Christine Niyizamwiyitira and Lars Lundberg A Utilization-Based Schedulability Test of Real-Time Systems Running on a Multiprocessor Virtual Machine . . . . . 884--904 Xing Su and Minjie Zhang and Quan Bai Two Mathematical Programming-Based Approaches for Wireless Mobile Robot Deployment in Disaster Environments . . 905--918 Lamiaa F. Ibrahim and Hesham A. Salman and Sara Y. Sery and Zaki Taha Using Clustering Techniques to Plan Indoor Femtocell Base Stations Layout in Multi-floors . . . . . . . . . . . . . . 919--930 Manju C. Thayammal and M. Mary Linda Utility-Based Optimal Resource Allocation in LTE-A Networks by Hybrid ACO-TS with MFA Scheme . . . . . . . . . 931--942 Francesc D. Muñoz-Escoí and Rubén de Juan-Marín and José-Ramón García-Escrivá and J. R. González de Mendívil and José M. Bernabéu-Aubán CAP Theorem: Revision of Its Related Consistency Models . . . . . . . . . . . 943--960
Lida Ghahremanlou and Abdel-Rahman H. Tawil and Paul Kearney and Hossein Nevisi and Xia Zhao and Ali Abdallah A Survey of Open Data Platforms in Six UK Smart City Initiatives . . . . . . . 961--976 Saber Amri and Hela Ltifi and Mounir Ben Ayed A Predictive Visual Analytics Evaluation Approach Based on Adaptive Neuro-Fuzzy Inference System . . . . . . . . . . . . 977--1000 Ibrahim Furkan Ince and Yusuf Sait Erdem and Faruk Bulut and Md Haidar Sharif A Low-Cost Pupil Center Localization Algorithm Based on Maximized Integral Voting of Circular Hollow Kernels . . . 1001--1015 Xuezhi Yan and Ruige Li and Xiaoying Sun and Guohong Liu Effects of Touch Force Profiles and Waveforms of Electrostatic Tactile Feedback on Touchscreen Pan Operation 1016--1035 M. Dhivya and M. Renuka Devi Detection of Structural Defects in Fabric Parts Using a Novel Edge Detection Method . . . . . . . . . . . . 1036--1043 Alex Bogatu and Norman W. Paton and Alvaro A. A. Fernandes and Martin Koehler Towards Automatic Data Format Transformations: Data Wrangling at Scale 1044--1060 Alireza Nazemi and Marziyeh Mortezaee A Novel Collaborate Neural Dynamic System Model for Solving a Class of Min-uMax Optimization Problems with an Application in Portfolio Management . . 1061--1085
Xi-Jun Lin and Lin Sun and Haipeng Qu and He-Qun Xian Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys . . 1087--1091 Yanwei Zhou and Bo Yang and Hongxia Hou and Lina Zhang and Tao Wang and Mingxiao Hu Continuous Leakage-Resilient Identity-Based Encryption with Tight Security . . . . . . . . . . . . . . . . 1092--1105 Jordan S. Queiroz and Eduardo L. Feitosa A Web Browser Fingerprinting Method Based on the Web Audio API . . . . . . . 1106--1120 Qian Wang and Chenhui Jin A Method to Bound the Number of Active S-Boxes for a Kind of AES-Like Structure 1121--1131 Jiahui Chen and Jie Ling and Jianting Ning and Jintai Ding Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems 1132--1147 Nanyuan Cao and Zhenfu Cao and Zhen Liu and Xiaolei Dong and Xiaopeng Zhao All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application . . . . . . . . . . . . 1148--1157 Hanqiu Liu and Chenhui Jin An Improvement of the CS Attack to DSC Cipher . . . . . . . . . . . . . . . . . 1158--1165 Yuzhao Cui and Qiong Huang and Jianye Huang and Hongbo Li and Guomin Yang Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification . . . . . . . . . . . . . 1166--1177 Parvin Rastegari and Willy Susilo and Mohammad Dakhlalian Efficient Certificateless Signcryption in the Standard Model: Revisiting Luo and Wan's Scheme from Wireless Personal Communications (2018) . . . . . . . . . 1178--1193 Thierry Mefenza and Damien Vergnaud Cryptanalysis of Server-Aided RSA Protocols with Private-Key Splitting . . 1194--1213 Jinguang Han and Maoxuan Bei and Liqun Chen and Yang Xiang and Jie Cao and Fuchun Guo and Weizhi Meng Attribute-Based Information Flow Control 1214--1231 Jinyong Chang and Genqing Bian and Yanyan Ji and Maozhi Xu On the KDM--CCA Security from Partial Trapdoor One-Way Family in the Random Oracle Model . . . . . . . . . . . . . . 1232--1245
Natarajan Meghanathan Centrality and Partial Correlation Coefficient-Based Assortativity Analysis of Real-World Networks . . . . . . . . . 1247--1264 Kenji Yasunaga Error Correction by Structural Simplicity: Correcting Samplable Additive Errors . . . . . . . . . . . . 1265--1276 Shu-Li Zhao and Rong-Xia Hao and Lidong Wu The Generalized Connectivity of $ (n, k)$-Bubble-Sort Graphs . . . . . . . . . 1277--1283 Khalil Mohamed and Ayman El Shenawy and Hany Harb A Hybrid Decentralized Coordinated Approach for Multi-Robot Exploration Task . . . . . . . . . . . . . . . . . . 1284--1300 Jinyong Wang and Xiaoping Mi Open Source Software Reliability Model with the Decreasing Trend of Fault Detection Rate . . . . . . . . . . . . . 1301--1312 Yuxing Yang Characterizations of Minimum Structure- and Substructure-Cuts of Hypercubes . . 1313--1321 Zhiwu Xu and Ping Lu and Haiming Chen Towards an Effective Syntax and a Generator for Deterministic Standard Regular Expressions . . . . . . . . . . 1322--1341 Tangliu Wen and Lan Song and Zhen You Proving Linearizability Using Reduction 1342--1364 Ying Jiang and Jian Liu and Gilles Dowek and Kailiang Ji Towards Combining Model Checking and Proof Checking . . . . . . . . . . . . . 1365--1402
Saurabh K Pandey and Mukesh A Zaveri DoA-Based Event Localization Using Uniform Concentric Circular Array in the IoT Environment . . . . . . . . . . . . 1403--1425 Islam Elleuch and Achraf Makni and Rafik Bouaziz Cooperative Overtaking Assistance System Based on V2V Communications and RTDB . . 1426--1449 Zikai Zhang and Jigang Wu and Long Chen and Guiyuan Jiang and Siew-Kei Lam Collaborative Task Offloading with Computation Result Reusing for Mobile Edge Computing . . . . . . . . . . . . . 1450--1462 Guijuan Wang and Cheng-Kuan Lin and Baolei Cheng and Jianxi Fan and Weibei Fan Structure Fault-Tolerance of the Generalized Hypercube . . . . . . . . . 1463--1476 Hisham M Almasaeid Maximizing Achievable Transmission Time in Cognitive Radio Networks Under Sensor-Aided Crowdsourced Spectrum Sensing . . . . . . . . . . . . . . . . 1477--1489 Hui Cai and Yanmin Zhu and Jie Li and Jiadi Yu Double Auction for a Data Trading Market with Preferences and Conflicts of Interest . . . . . . . . . . . . . . . . 1490--1504 Mohamed A Bayoumi and Tarek M Salem and Samir M Koriem Improving the Mechanism of Detecting and Measuring Holes in Ad hoc Wireless Sensor Network . . . . . . . . . . . . . 1505--1514 Jianhua Fan and Tao Liang and Tongxiang Wang and Jianwei Liu Identification and Localization of the Jammer in Wireless Sensor Networks . . . 1515--1527 Moresh Madhukar Mukhedkar and Uttam Kolekar Trust-Based Secure Routing in Mobile Ad Hoc Network Using Hybrid Optimization Algorithm . . . . . . . . . . . . . . . 1528--1545
Sarah Alhumoud Twitter Analysis for Intelligent Transportation . . . . . . . . . . . . . 1547--1556 Sreenithya Sumesh and Aneesh Krishna and Chitra M. Subramanian Game Theory-Based Reasoning of Opposing Non-functional Requirements using Inter-actor Dependencies . . . . . . . . 1557--1583 Vasile Palade and J. Gerard Wolff A Roadmap for the Development of the `SP Machine' for Artificial Intelligence . . 1584--1604 Muhammad Adnan and Muhammad Afzal and Khadim Hussain Asif Ontology-Oriented Software Effort Estimation System for E-commerce Applications Based on Extreme Programming and Scrum Methodologies . . 1605--1624 Jianbin Huang and Qingquan Bian and Heli Sun and Yaming Yang and Yu Zhou Parameter-free Community Detection through Distance Dynamic Synchronization 1625--1638 Manashee Kalita and Themrichon Tuithung and Swanirbhar Majumder A New Steganography Method Using Integer Wavelet Transform and Least Significant Bit Substitution . . . . . . . . . . . . 1639--1655 N. Shankar and S. Sathish Babu and C. Viswanathan Femur Bone Volumetric Estimation for Osteoporosis Classification Using Optimization-Based Deep Belief Network in X-Ray Images . . . . . . . . . . . . 1656--1670 Roger Santos Ferreira and Denilson Alves Pereira BigFeel --- A Distributed Processing Environment for the Integration of Sentiment Analysis Methods . . . . . . . 1671--1683 Ond\vrej Zamazal Machine Learning Support for EU Funding Project Categorization . . . . . . . . . 1684--1694 R. Vijayarajan and P. Gnanasivam and R. Avudaiammal Bio-Key Based AES for Personalized Image Cryptography . . . . . . . . . . . . . . 1695--1705
Nghi Huynh and Marc Frappier and Herman Pooda and Amel Mammar and Régine Laleau SGAC: a Multi-Layered Access Control Model with Conflict Resolution Strategy 1707--1733 Binlin Cheng and Jinjun Liu and Jiejie Chen and Shudong Shi and Xufu Peng and Xingwen Zhang and Haiqing Hai MoG: Behavior-Obfuscation Resistance Malware Detection . . . . . . . . . . . 1734--1747 Yang Chen and Wenmin Li and Fei Gao and Wei Yin and Kaitai Liang and Hua Zhang and Qiaoyan Wen Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures . . 1748--1760 Ya Liu and Yifan Shi and Dawu Gu and Zhiqiang Zeng and Fengyu Zhao and Wei Li and Zhiqiang Liu and Yang Bao Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC . . 1761--1776 Zhen-Hui Han and Xing-Shu Chen and Xue-Mei Zeng and Yi Zhu and Ming-Yong Yin Detecting Proxy User Based on Communication Behavior Portrait . . . . 1777--1792 Jianghua Zhong and Dongdai Lin On Equivalence of Cascade Connections of Two Nonlinear Feedback Shift Registers 1793--1804 Lele Chen and Gaoli Wang and GuoYan Zhang MILP-based Related-Key Rectangle Attack and Its Application to GIFT, Khudra, MIBS . . . . . . . . . . . . . . . . . . 1805--1821 Venkatraman Subbarayalu and B Surendiran and P Arun Raj Kumar Hybrid Network Intrusion Detection System for Smart Environments Based on Internet of Things . . . . . . . . . . . 1822--1839 Haibo Hong and Licheng Wang and Jun Shao and Jianhua Yan and Haseeb Ahmad and Guiyi Wei and Mande Xie and Yixian Yang A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type . . . . . . . . . . . . . . 1840--1848 San Ling and Khoa Nguyen and Huaxiong Wang and Juanyang Zhang Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation . . . . . . 1849--1862
Yonghong Hou and Lin Xue and Shuo Li and Jiaming Xing Corrigendum: User-Experience-Oriented Fuzzy Logic Controller for Adaptive Streaming . . . . . . . . . . . . . . . 1937--1937
Binlin Cheng and Jinjun Liu and Chen Jiejie and Shi Shudong and Peng Xufu and Zhang Xingwen and Haiqing Hai Erratum to: MoG: Behavior-Obfuscation Resistance Malware Detection . . . . . . 2846--2846