Last update:
Tue May 2 17:54:12 MDT 2023
Michael R. Berthold Towards Bisociative Knowledge Discovery 1--10 Werner Dubitzky and Tobias Kötter and Oliver Schmidt and Michael R. Berthold Towards Creative Information Exploration Based on Koestler's Concept of Bisociation . . . . . . . . . . . . . . 11--32 Tobias Kötter and Michael R. Berthold From Information Networks to Bisociative Information Networks . . . . . . . . . . 33--50 Christian Borgelt Network Creation: Overview . . . . . . . 51--53 Marc Segond and Christian Borgelt Selecting the Links in BisoNets Generated from Document Collections . . 54--65 Matja\vz Jur\vsi\vc and Borut Sluban and Bojan Cestnik and Miha Gr\vcar and Nada Lavra\vc Bridging Concept Identification for Constructing Information Networks from Text Documents . . . . . . . . . . . . . 66--90 Teemu Hynönen and Sébastien Mahler and Hannu Toivonen Discovery of Novel Term Associations in a Document Collection . . . . . . . . . 91--103 Marc Segond and Christian Borgelt Cover Similarity Based Item Set Mining 104--121 Angelika Kimmig and Esther Galbrun and Hannu Toivonen and Luc De Raedt Patterns and Logic for Reasoning with Networks . . . . . . . . . . . . . . . . 122--143 Hannu Toivonen Network Analysis: Overview . . . . . . . 144--146 Anton Dries and Siegfried Nijssen and Luc De Raedt BiQL: a Query Language for Analyzing Information Networks . . . . . . . . . . 147--165 Fang Zhou and Sébastien Mahler and Hannu Toivonen Review of BisoNet Abstraction Techniques 166--178 Fang Zhou and Sébastien Mahler and Hannu Toivonen Simplification of Networks by Edge Pruning . . . . . . . . . . . . . . . . 179--198 Hannu Toivonen and Fang Zhou and Aleksi Hartikainen and Atte Hinkka Network Compression by Node and Edge Mergers . . . . . . . . . . . . . . . . 199--217 Laura Langohr and Hannu Toivonen Finding Representative Nodes in Probabilistic Graphs . . . . . . . . . . 218--229 Tobias Kötter and Michael R. Berthold (Missing) Concept Discovery in Heterogeneous Information Networks . . . 230--245 Kilian Thiel and Michael R. Berthold Node Similarities from Spreading Activation . . . . . . . . . . . . . . . 246--262 Uwe Nagel and Kilian Thiel and Tobias Kötter and Dawid Pi\katek and Michael R. Berthold Towards Discovery of Subgraph Bisociations . . . . . . . . . . . . . . 263--284 Andreas Nürnberger Exploration: Overview . . . . . . . . . 285--286 Tatiana Gossen and Marcus Nitsche and Stefan Haun and Andreas Nürnberger Data Exploration for Bisociative Knowledge Discovery: a Brief Overview of Tools and Evaluation Methods . . . . . . 287--300 Anonymous Front Matter . . . . . . . . . . . . . . ??
Ryan Woolrych and Andrew Sixsmith Challenges of User-Centred Research in the Development of Ambient Assisted Living Systems . . . . . . . . . . . . . 1--8 Hen-I Yang and Ryan Babbitt and Johnny Wong and Carl K. Chang A Framework for Service Morphing and Heterogeneous Service Discovery in Smart Environments . . . . . . . . . . . . . . 9--17 James Barrientos and Jeffrey Soar and Ying Su Impact Analysis of Assessment, Consultation and Education Services to Support the Adoption of Smart Home Technologies, Innovations for Chronic Disease Prevention and Solutions for Independent Living . . . . . . . . . . . 18--25 Anne-Sophie Parent and Nena Georgantzi and Ilenia Gheno Ensuring a Fruitful Future to Innovation and Research: Practical Guidance for the Involvement of Older People in Research 26--34 Silvio Bonfiglio Fostering a Continuum of Care . . . . . 35--41 Peter Leijdekkers and Valerie Gay User Adoption of Mobile Apps for Chronic Disease Management: a Case Study Based on myFitnessCompanion\reg . . . . . . . 42--49 Jon A. Sanford and Patricia C. Griffiths and Helen Hoenig Effects of In-home Tele-Rehabilitation on Task Self-efficacy in Mobility Impaired Adults . . . . . . . . . . . . 50--57 Hél\`ene Corriveau and Michel Tousignant and Sylvie Gosselin and Patrick Boissy The Use of Telerehabilitation to Provide an Exercise Program to Improve Balance in a Post-stroke Population: Preliminary Results . . . . . . . . . . . . . . . . 58--65 Hamid Mukhtar and Arshad Ali and Sungyoung Lee and Djamel Bela\"\id Personalized Healthcare Self-management Using Social Persuasion . . . . . . . . 66--73 Paolo Emilio Puddu and John M. Morgan and Concetta Torromeo and Nick Curzen and Michele Schiariti A Clinical Observational Study in the CHIRON Project: Rationale and Expected Results . . . . . . . . . . . . . . . . 74--82 Chao Chen and Daqing Zhang and Lin Sun and Mossaab Hariz and Yang Yuan Does Location Help Daily Activity Recognition? . . . . . . . . . . . . . . 83--90 Antonio Andriatrimoson and Nadia Abchiche and Simon Galerne and Etienne Colle A Robot-Environment Cooperation Architecture for the Safety of Elderly People at Home . . . . . . . . . . . . . 91--98 Carlos Cavero Barca and Juan Mario Rodríguez and Rosana Valle Soriano and Alberto Rugnone Medical Expert Support Tool (MEST): a Person-Centric Approach for Healthcare Management . . . . . . . . . . . . . . . 99--106 Roberta Gazzarata and Fabio Vergari and Jan-Marc Verlinden and Francesco Morandi and Simone Naso The Integration of e-health into the Clinical Workflow --- Electronic Health Record and Standardization Efforts . . . 107--115 Cristiana Corsi and Johan De Bie and David Mortara and Stefano Severi Innovative Solutions in Health Monitoring at Home: The Real-Time Assessment of Serum Potassium Concentration from ECG . . . . . . . . . 116--123 Ian Cleland and Chris Nugent and Dewar Finlay and William Burns and Jennifer Bougourd Assessment of Custom Fitted Heart Rate Sensing Garments whilst undertaking Everyday Activities . . . . . . . . . . 124--131 Hongbo Ni and Bessam Abdulrazak and Daqing Zhang and Shu Wu and Xingshe Zhou and Kejian Miao Multi-modal Non-intrusive Sleep Pattern Recognition in Elder Assistive Environment . . . . . . . . . . . . . . 132--139 Héctor Solar and Erik Fernández and Gennaro Tartarisco and Giovanni Pioggia and Bo\vzidara Cvetkovi\'c A Non Invasive, Wearable Sensor Platform for Multi-parametric Remote Monitoring in CHF Patients . . . . . . . . . . . . 140--147 Willy All\`egre and Thomas Burger and Pascal Berruet and Jean-Yves Antoine A Non-intrusive Monitoring System for Ambient Assisted Living Service Delivery 148--156 Andrew McDowell and Mark Donnelly and Chris Nugent and Michael McGrath Passive Sleep Actigraphy: Evaluating a Non-contact Method of Monitoring Sleep 157--164 Anonymous Front Matter . . . . . . . . . . . . . . ??
Petra Perner Learning an Ontology for Visual Tasks 1--16 Sara Colantonio and Massimo Martinelli Ontology and Algorithms Integration for Image Analysis . . . . . . . . . . . . . 17--29 Nikos Malandrakis and Alexandros Potamianos EmotiWord: Affective Lexicon Creation with Application to Interaction and Multimedia Data . . . . . . . . . . . . 30--41 Pablo Ruiz and Javier Mateos and Rafael Molina A Bayesian Active Learning Framework for a Two-Class Classification Problem . . . 42--53 Koray Kayabol and Vladimir A. Krylov Unsupervised Classification of SAR Images Using Hierarchical Agglomeration and EM . . . . . . . . . . . . . . . . . 54--65 Tamás Szirányi and Dániel Szolgay Geometrical and Textural Component Separation with Adaptive Scale Selection 66--77 Donghoon Kim and Rozenn Dahyot Bayesian Shape from Silhouettes . . . . 78--89 Levente Kovács Shape Retrieval and Recognition on Mobile Devices . . . . . . . . . . . . . 90--101 Furkan Keskin and A. Enis Çetin Directionally Selective Fractional Wavelet Transform Using a $2$-D Non-separable Unbalanced Lifting Structure . . . . . . . . . . . . . . . 102--113 Jungong Han and Eric Pauwels and Paul de Zeeuw Visible and Infrared Image Registration Employing Line-Based Geometric Analysis 114--125 Pavel Vácha and Michal Haindl Texture Recognition Using Robust Markovian Features . . . . . . . . . . . 126--137 Michal Haindl and Vojt\vech Havlí\vcek A Plausible Texture Enlargement and Editing Compound Markovian Model . . . . 138--148 Michal Haindl and Michal Havlí\vcek Bidirectional Texture Function Simultaneous Autoregressive Model . . . 149--159 Ji\vrí Filip and Pavel Vácha and Michal Haindl Analysis of Human Gaze Interactions with Texture and Shape . . . . . . . . . . . 160--171 Elisabet Carcel and Manuel Martos Rich Internet Application for Semi-automatic Annotation of Semantic Shots on Keyframes . . . . . . . . . . . 172--182 Emmanuelle Martienne and Vincent Claveau Labeling TV Stream Segments with Conditional Random Fields . . . . . . . 183--194 Jaime Gallego and Montse Pard\`as and Montse Solano Foreground Objects Segmentation for Moving Camera Scenarios Based on SCGMM 195--206 Massimo Magrini and Davide Moroni Real Time Image Analysis for Infomobility . . . . . . . . . . . . . . 207--218 Szilard Szalai and Tamás Szirányi Tracking the Saliency Features in Images Based on Human Observation Statistics 219--233 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
José Meseguer Taming Distributed System Complexity through Formal Patterns . . . . . . . . 1--2 John Rushby Composing Safe Systems . . . . . . . . . 3--11 Gyrd Brændeland and Atle Refsdal and Ketil Stòlen A Denotational Model for Component-Based Risk Analysis . . . . . . . . . . . . . 12--41 Benjamin Aminof and Fabio Mogavero and Aniello Murano Synthesis of Hierarchical Systems . . . 42--60 Sebastian S. Bauer and Kim Guldstrand Larsen A Modal Specification Theory for Components with Data . . . . . . . . . . 61--78 Roberto Bruni and Alberto Lluch Lafuente Evaluating the Performance of Model Transformation Styles in Maude . . . . . 79--96 Dan Li and Xiaoshan Li and Zhiming Liu and Volker Stolz Interactive Transformations from Object-Oriented Models to Component-Based Models . . . . . . . . . 97--114 Julien Dormoy and Olga Kouchnarenko and Arnaud Lanoix Runtime Verification of Temporal Patterns for Dynamic Reconfigurations of Components . . . . . . . . . . . . . . . 115--132 Jose Pablo Escobedo and Christophe Gaston Timed Conformance Testing for Orchestrated Service Discovery . . . . . 133--150 Gregor Gössler and Gwen Salaün Realizability of Choreographies for Services Interacting Asynchronously . . 151--167 Mohammad Mahdi Jaghoori and Ólafur Hlynsson Networks of Real-Time Actors . . . . . . 168--186 Einar Broch Johnsen and Rudolf Schlatte A Formal Model of Object Mobility in Resource-Restricted Deployment Scenarios 187--204 Carroline Dewi Puspa Kencana Ramli The Logic of XACML . . . . . . . . . . . 205--222 Mounira Kezadri and Beno\^\it Combemale and Marc Pantel A Proof Assistant Based Formalization of MDE Components . . . . . . . . . . . . . 223--240 Sébastien Limet and Sophie Robert and Ahmed Turki Controlling an Iteration-Wise Coherence in Dataflow . . . . . . . . . . . . . . 241--258 José Antonio Martín and Antonio Brogi Learning from Failures: a Lightweight Approach to Run-Time Behavioural Adaptation . . . . . . . . . . . . . . . 259--277 Rabéa Ameur-Boulifa and Raluca Halalai and Ludovic Henrio Verifying Safety of Fault-Tolerant Distributed Components . . . . . . . . . 278--295 Hamideh Sabouri and Ramtin Khosravi Reducing the Model Checking Cost of Product Lines Using Static Analysis Techniques . . . . . . . . . . . . . . . 296--312 Alejandro Sanchez and Luís Soares. Barbosa Bigraphical Modelling of Architectural Patterns . . . . . . . . . . . . . . . . 313--330 Davide Brugali and Luca Gherardi and Elvinia Riccobene Coordinated Execution of Heterogeneous Service-Oriented Components by Abstract State Machines . . . . . . . . . . . . . 331--349 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Miguel Lurgi and David Robertson Multi-agent Coordination through Mutualistic Interactions . . . . . . . . 1--20 Maaike Harbers and Jeffrey M. Bradshaw and Matthew Johnson and Paul Feltovich Explanation in Human-Agent Teamwork . . 21--37 Kathleen Keogh and Liz Sonenberg Adaptive Coordination in Distributed and Dynamic Agent Organizations . . . . . . 38--57 Jie Jiang and Virginia Dignum and Yao-Hua Tan An Agent-Based Inter-organizational Collaboration Framework: OperA+ . . . . 58--74 Charalampos Tampitsikas and Stefano Bromuri and Michael Ignaz Schumacher MANET: a Model for First-Class Electronic Institutions . . . . . . . . 75--92 Sofia Panagiotidi and Javier Vázquez-Salceda Towards Practical Normative Agents: a Framework and an Implementation for Norm-Aware Planning . . . . . . . . . . 93--109 Ioan Alfred Letia and Anca Goron Towards Justifying Norm Compliance . . . 110--128 Tina Balke and Marina De Vos and Julian Padget Normative Run-Time Reasoning for Institutionally-Situated BDI Agents . . 129--148 Stephen Cranefield and Michael Winikoff and Wamberto Vasconcelos Modelling and Monitoring Interdependent Expectations . . . . . . . . . . . . . . 149--166 Tina Balke and Daniel Villatoro Operationalization of the Sanctioning Process in Utilitarian Artificial Societies . . . . . . . . . . . . . . . 167--185 Samhar Mahmoud and Nathan Griffiths and Jeroen Keppens and Michael Luck Overcoming Omniscience for Norm Emergence in Axelrod's Metanorm Model 186--202 Samhar Mahmoud and Nathan Griffiths and Jeroen Keppens and Michael Luck Establishing Norms for Network Topologies . . . . . . . . . . . . . . . 203--220 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Andrzej Janusz Dynamic Rule-Based Similarity Model for DNA Microarray Data . . . . . . . . . . 1--25 M. E. Abd El-Monsef and H. M. Abu-Donia and E. A. Marei Multi-valued Approach to Near Set Theory 26--40 Christopher J. Henry Perceptual Indiscernibility, Rough Sets, Descriptively Near Sets, and Image Analysis . . . . . . . . . . . . . . . . 41--121 A. Mani Dialectics of Counting and the Mathematics of Vagueness . . . . . . . . 122--180 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Hee-Kap Ahn and Sang Won Bae and Otfried Cheong A Generalization of the Convex Kakeya Problem . . . . . . . . . . . . . . . . 1--12 Eric Angel and Evripidis Bampis and Vincent Chau Low Complexity Scheduling Algorithm Minimizing the Energy for Tasks with Agreeable Deadlines . . . . . . . . . . 13--24 Esther M. Arkin and José Miguel Díaz-Báñez Bichromatic $2$-Center of Pairs of Points . . . . . . . . . . . . . . . . . 25--36 Vikraman Arvind and Partha Mukhopadhyay Erd\Hos--Rényi Sequences and Deterministic Construction of Expanding Cayley Graphs . . . . . . . . . . . . . 37--48 Rafael da Ponte Barbosa and Yoshiko Wakabayashi A Better Approximation Ratio and an IP Formulation for a Sensor Cover Problem 49--60 Hans-Joachim Böckenhauer and Dennis Komm On the Advice Complexity of the Knapsack Problem . . . . . . . . . . . . . . . . 61--72 Nicolas Boria and Jérôme Monnot and Vangelis Th. Paschos Reoptimization of Some Maximum Weight Induced Hereditary Subgraph Problems . . 73--84 Prosenjit Bose and Rolf Fagerberg and André van Renssen On Plane Constrained Bounded-Degree Spanners . . . . . . . . . . . . . . . . 85--96 Joshua Brody and Hongyu Liang and Xiaoming Sun Space-Efficient Approximation Scheme for Circular Earth Mover Distance . . . . . 97--108 Ana Bu\vsi\'c and Nazim Fat\`es and Jean Mairesse Density Classification on Infinite Lattices and Trees . . . . . . . . . . . 109--120 Jean Cardinal and Matias Korman Coloring Planar Homothets and Three-Dimensional Hypergraphs . . . . . 121--132 Armando Castañeda and Maurice Herlihy and Sergio Rajsbaum An Equivariance Theorem with Applications to Renaming . . . . . . . . 133--144 Armando Castañeda and Damien Imbs and Sergio Rajsbaum Renaming Is Weaker Than Set Agreement But for Perfect Renaming: a Map of Sub-consensus Tasks . . . . . . . . . . 145--156 Eda Cesaratto and Brigitte Vallée Pseudorandomness of a Random Kronecker Sequence . . . . . . . . . . . . . . . . 157--171 Richard Cole and Vijaya Ramachandran Revisiting the Cache Miss Analysis of Multithreaded Algorithms . . . . . . . . 172--183 Robert Crowston and Gregory Gutin and Mark Jones Parameterized Complexity of MaxSat above Average . . . . . . . . . . . . . . . . 184--194 Marek Cygan and Marcin Pilipczuk and Micha\l Pilipczuk Solving the $2$-Disjoint Connected Subgraphs Problem Faster Than $2^n$ . . 195--206 Daniel Dadush A $O(1 / \epsilon^2)^n$-Time Sieving Algorithm for Approximate Integer Programming . . . . . . . . . . . . . . 207--218 Pooya Davoodi and Michiel Smid and Freek van Walderveen Two-Dimensional Range Diameter Queries 219--230 Domingos Dellamonica Jr. and Yoshiharu Kohayakawa An Improved Upper Bound on the Density of Universal Random Graphs . . . . . . . 231--242 Anonymous Front Matter . . . . . . . . . . . . . . ??
Arie Middelkoop and Alexander B. Elyasov Functional Instrumentation of ActionScript Programs with Asil . . . . 1--16 Edward Amsden and Matthew Fluet Fairness for Transactional Events . . . 17--34 Patrick Maier and Phil Trinder Implementing a High-Level Distributed-Memory Parallel Haskell in Haskell . . . . . . . . . . . . . . . . 35--50 Thomas Schilling Challenges for a Trace-Based Just-In-Time Compiler for Haskell . . . 51--68 Jason S. Reich and Matthew Naylor Lazy Generation of Canonical Test Programs . . . . . . . . . . . . . . . . 69--84 Anders Persson and Emil Axelsson Generic Monadic Constructs for Embedded Languages . . . . . . . . . . . . . . . 85--99 Stephen Chang and Eli Barzilay and John Clements From Stack Traces to Lazy Rewriting Sequences . . . . . . . . . . . . . . . 100--115 Pieter Koopman and Peter Achten Model Based Testing with Logical Properties versus State Machines . . . . 116--133 Rex Page Property-Based Testing and Verification: a Catalog of Classroom Examples . . . . 134--147 Michael Kirkedal Thomsen Describing and Optimising Reversible Logic Using a Functional Language . . . 148--163 Adam Megacz Hardware Design with Generalized Arrows 164--180 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Alastair Butler Logic and Engineering of Natural Language Semantics (LENLS) 8 . . . . . . 1--2 Nicholas Asher and Jason Quinley Begging Questions, Their Answers and Basic Cooperativity . . . . . . . . . . 3--12 Mauricio Hernandes Players Who Are Learning How to Play: a Haskell Implementation of Awareness Dynamics . . . . . . . . . . . . . . . . 13--26 Margot Colinet and Grégoire Winterstein Emphatic NPI/FCI and Adversative Discourse Relations, a Probabilistic Approach . . . . . . . . . . . . . . . . 27--39 David Y. Oshima The Japanese Particle yo in Declaratives: Relevance, Priority, and Blaming . . . . . . . . . . . . . . . . 40--53 J.-R. Hayashishita and Daisuke Bekki Conjoined Nominal Expressions in Japanese . . . . . . . . . . . . . . . . 54--67 Christina Unger Dynamic Semantics as Monadic Computation 68--81 Satoru Suzuki Measurement-Theoretic Foundations of Gradable-Predicate Logic . . . . . . . . 82--95 Alastair Butler and Kei Yoshimoto Towards a Self-selective and Self-healing Evaluation . . . . . . . . 96--109 Shozo Ota and Ken Satoh and Makoto Nakamura The Fifth International Workshop on Juris-Informatics (JURISIN 2011) . . . . 110--111 Robert Kowalski and Anthony Burton WUENIC --- a Case Study in Rule-Based Knowledge Representation and Reasoning 112--125 Hirokazu Igari and Akira Shimazu and Koichiro Ochimizu Document Structure Analysis with Syntactic Model and Parsers: Application to Legal Judgments . . . . . . . . . . . 126--140 Yasuhiro Ogawa and Masaki Mori and Katsuhiko Toyama Recall-Oriented Evaluation Metrics for Consistent Translation of Japanese Legal Sentences . . . . . . . . . . . . . . . 141--154 Takanori Sato and Shogo Okada and Katsumi Nitta Deliberation Process Support System for Citizen Judge Trial Based on Structure of Factors . . . . . . . . . . . . . . . 155--169 Katsuhiko Sano and Shingo Hagiwara and Satoshi Tojo An Intuitionistic Investigation of Prerequisite-Effect Structure . . . . . 170--183 Koji Tsuda and Shin-ichi Minato Second Workshop on Algorithms for Large-Scale Information Processing in Knowledge Discovery (ALSIP) . . . . . . 184--185 Shoichi Higuchi and Tomohiro Kan and Yoshiyuki Yamamoto and Kouichi Hirata An A* Algorithm for Computing Edit Distance between Rooted Labeled Unordered Trees . . . . . . . . . . . . 186--196 Yuichi Kameda and Akihiro Yamamoto Mining Closed Weighted Itemsets for Numerical Transaction Databases . . . . 197--210 Yoshiyuki Yamamoto and Kouichi Hirata and Tetsuji Kuboyama On Computing Tractable Variations of Unordered Tree Edit Distance with Network Algorithms . . . . . . . . . . . 211--223 Mayumi Bono and Nobuhiro Furuyama Multimodality in Multispace Interaction (MiMI) . . . . . . . . . . . . . . . . . 224--225 Anonymous Front Matter . . . . . . . . . . . . . . ??
Yu Sasaki and Kazumaro Aoki Improved Integral Analysis on Tweaked Lesamnta . . . . . . . . . . . . . . . . 1--17 Thorsten Ernst Schilling and Håvard Raddum Analysis of Trivium Using Compressed Right Hand Side Equations . . . . . . . 18--32 Florian Mendel and Tomislav Nad and Martin Schläffer Cryptanalysis of Round-Reduced HAS-160 33--47 Daehyun Strobel and Christof Paar An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software . . . . . . . . . . . 48--60 Hailong Zhang and Yongbin Zhou and Dengguo Feng An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks . . . . . . . . . . . . . . . . 61--73 Hyung Tae Lee and HongTae Kim and Yoo-Jin Baek and Jung Hee Cheon Correcting Errors in Private Keys Obtained from Cold Boot Attacks . . . . 74--87 Ryo Kikuchi and Atsushi Fujioka and Yoshiaki Okamoto and Taiichi Saito Strong Security Notions for Timed-Release Public-Key Encryption Revisited . . . . . . . . . . . . . . . 88--108 Song Luo and Qingni Shen and Zhong Chen Fully Secure Unidirectional Identity-Based Proxy Re-encryption . . . 109--126 Yong Qiao and Yuexiang Yang and Jie He and Bo Liu and Yingzhi Zeng Detecting Parasite P2P Botnet in eMule-like Networks through Quasi-periodicity Recognition . . . . . 127--139 Kai Chen and Yifeng Lian and Yingjun Zhang AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day Vulnerability . . . . . . . . . . . . . 140--154 Juliane Krämer and Dmitry Nedospasov and Jean-Pierre Seifert Weaknesses in Current RSA Signature Schemes . . . . . . . . . . . . . . . . 155--168 Shuguo Yang and Yongbin Zhou and Jiye Liu and Danyang Chen Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations . . . . . . . . . . . . 169--185 Keita Emura and Atsuko Miyaji and Kazumasa Omote A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users . . . . . . . . . . . . . 186--203 Laila El Aimani Generic Constructions for Verifiable Signcryption . . . . . . . . . . . . . . 204--218 Haibo Tian and Xiaofeng Chen and Zhengtao Jiang and Yusong Du Non-delegatable Strong Designated Verifier Signature on Elliptic Curves 219--234 Kyung Chul Jeong and Dong Hoon Lee and Daewan Han An Improved Known Plaintext Attack on PKZIP Encryption Algorithm . . . . . . . 235--247 Yi Lu and Serge Vaudenay and Willi Meier and Liping Ding and Jianchun Jiang Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit . . . . . 248--260 Yusong Du and Fangguo Zhang and Meicheng Liu On the Resistance of Boolean Functions against Fast Algebraic Attacks . . . . . 261--274 Yu Chen and Liqun Chen and Zongyang Zhang CCA Secure IB-KEM from the Computational Bilinear Diffie--Hellman Assumption in the Standard Model . . . . . . . . . . . 275--301 Marko Wolf and Timo Gendrullis Design, Implementation, and Evaluation of a Vehicular Hardware Security Module 302--318 Anonymous Front Matter . . . . . . . . . . . . . . ??
Antje Düsterhöft and Meike Klettke Dedication to a Theory of Modelling . . 1--6 Jan Paredaens What about Constraints in RDF? . . . . . 7--18 Joachim Biskup Some Remarks on Relational Database Schemes Having Few Minimal Keys . . . . 19--28 Gyula O. H. Katona Random Databases with Correlated Data 29--35 David Källberg and Nikolaj Leonenko Statistical Inference for Rényi Entropy Functionals . . . . . . . . . . . . . . 36--51 Egon Börger The Subject-Oriented Approach to Software Design and the Abstract State Machines Method . . . . . . . . . . . . 52--72 Johann A. Makowsky and Elena V. Ravve BCNF via Attribute Splitting . . . . . . 73--84 Flavio Ferrarotti and Sven Hartmann Foundations for a Fourth Normal Form over SQL-Like Databases . . . . . . . . 85--100 Stephen J. Hegner Independent Update Reflections on Interdependent Database Views . . . . . 101--115 Alejandro L. Grosso and José M. Turull Torres SO$^{F}$: a Semantic Restriction over Second-Order Logic and Its Polynomial-Time Hierarchy . . . . . . . 116--135 Qing Wang Abstract State Machines for Data-Parallel Computing . . . . . . . . 136--150 Stephen W. Clyde and David W. Embley OSM-Logic: a Fact-Oriented, Time-Dependent Formalization of Object-oriented Systems Modeling . . . . 151--172 Sudarshan Murthy and David Maier Cloaking Data to Ease View Creation, Query Expression, and Query Execution 173--189 Arne Sòlvberg On Models of Concepts and Data . . . . . 190--196 Gerti Kappel and Philip Langer Model Transformation By-Example: a Survey of the First Wave . . . . . . . . 197--215 Antonio Villegas and Antoni Olivé On Computing the Importance of Associations in Large Conceptual Schemas 216--230 Oscar Pastor and Juan Carlos Casamayor Conceptual Modeling of Human Genome: Integration Challenges . . . . . . . . . 231--250 Hui Ma Transforming Geometrically Enhanced Conceptual Model Schemas to GML . . . . 251--267 Marie Du\vzí Extensional Logic of Hyperintensions . . 268--290 Hannu Jaakkola Culture Sensitive Aspects in Software Engineering . . . . . . . . . . . . . . 291--315 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Armin Biere Preprocessing and Inprocessing Techniques in SAT . . . . . . . . . . . 1--1 Kathryn Kranen Pioneering the Future of Verification: a Spiral of Technological and Business Innovation . . . . . . . . . . . . . . . 2--2 Ben Liblit Automated Detection and Repair of Concurrency Bugs . . . . . . . . . . . . 3--3 Klaus-Dieter Schubert Verification Challenges of Workload Optimized Hardware Systems . . . . . . . 4--4 Orna Kupferman and Dorsa Sadigh and Sanjit A. Seshia Synthesis with Clairvoyance . . . . . . 5--19 Matthias Schlaipfer and Georg Hofferek and Roderick Bloem Generalized Reactivity(1) Synthesis without a Monolithic Strategy . . . . . 20--34 Lei Bu and Yang Yang and Xuandong Li IIS-Guided DFS for Efficient Bounded Reachability Analysis of Linear Hybrid Automata . . . . . . . . . . . . . . . . 35--49 Marijn J. H. Heule and Oliver Kullmann and Siert Wieringa and Armin Biere Cube and Conquer: Guiding CDCL SAT Solvers by Lookaheads . . . . . . . . . 50--65 Zurab Khasidashvili and Alexander Nadel Implicative Simultaneous Satisfiability and Applications . . . . . . . . . . . . 66--79 B. A. Krishna and Jonathan Michelson and Vigyan Singhal and Alok Jain Liveness vs Safety --- a Practical Viewpoint . . . . . . . . . . . . . . . 80--94 Arnab Sinha and Sharad Malik and Chao Wang and Aarti Gupta Predicting Serializability Violations: SMT-Based Search vs. DPOR-Based Search 95--114 Qichang Chen and Liqiang Wang and Zijiang Yang SAM: Self-adaptive Dynamic Analysis for Multithreaded Programs . . . . . . . . . 115--129 Michael Huth and Jim Huan-Pu Kuo and Nir Piterman Concurrent Small Progress Measures . . . 130--144 Kenneth Johnson and Simon Reed and Radu Calinescu Specification and Quantitative Analysis of Probabilistic Cloud Deployment Patterns . . . . . . . . . . . . . . . . 145--159 Ondrej Sery and Grigory Fedyukovich and Natasha Sharygina Interpolation-Based Function Summaries in Bounded Model Checking . . . . . . . 160--175 Thomas J. Ostrand and Elaine J. Weyuker Can File Level Characteristics Help Identify System Level Fault-Proneness? 176--189 Ariel Birnbaum and Laurent Fournier and Steve Mittermaier and Avi Ziv Reverse Coverage Analysis . . . . . . . 190--202 Peter Collingbourne and Cristian Cadar and Paul H. J. Kelly Symbolic Testing of OpenCL Code . . . . 203--218 Allon Adir and Ronen Levy and Tamer Salman Dynamic Test Data Generation for Data Intensive Applications . . . . . . . . . 219--233 Merav Aharony and Emanuel Gofman and Elena Guralnik and Anatoly Koyfman Injecting Floating-Point Testing Knowledge into Test Generators . . . . . 234--241 Anonymous Front Matter . . . . . . . . . . . . . . ??
Babak Alipanahi and Nathan Krislock and Ali Ghodsi Protein Structure by Semidefinite Facial Reduction . . . . . . . . . . . . . . . 1--11 Sivan Bercovici and Jesse M. Rodriguez Ancestry Inference in Complex Admixtures via Variable-Length Markov Chain Linkage Models . . . . . . . . . . . . . . . . . 12--28 Stefan Canzar and Mohammed El-Kebir and René Pool Charge Group Partitioning in Biomolecular Simulation . . . . . . . . 29--43 Hector Corrada Bravo Increased Methylation Variation in Epigenetic Domains across Cancer Types 44--44 Dan F. DeBlasio and Travis J. Wheeler Estimating the Accuracy of Multiple Alignments and its Use in Parameter Advising . . . . . . . . . . . . . . . . 45--59 Matthew R. Francis and Elana J. Fertig Quantifying the Dynamics of Coupled Networks of Switches and Oscillators . . 60--61 Melissa Gymrek and David Golan and Saharon Rosset lobSTR: a Short Tandem Repeat Profiler for Personal Genomes . . . . . . . . . . 62--63 Dan He and Buhm Han and Eleazar Eskin Hap-seq: An Optimal Algorithm for Haplotype Phasing with Imputation Using Sequencing Data . . . . . . . . . . . . 64--78 Lu He and Fabio Vandin and Gopal Pandurangan Ballast: a Ball-Based Algorithm for Structural Motifs . . . . . . . . . . . 79--93 Patrick Holloway and Krister Swenson Evolution of Genome Organization by Duplication and Loss: An Alignment Approach . . . . . . . . . . . . . . . . 94--112 Daniel Holtby and Shuai Cheng Li and Ming Li LoopWeaver --- Loop Modeling by the Weighted Scaling of Verified Proteins 113--126 Yan Huang and Yin Hu and Corbin D. Jones A Robust Method for Transcript Quantification with RNA-seq Data . . . . 127--147 Marcus Kinsella and Vineet Bafna Modeling the Breakage-Fusion-Bridge Mechanism: Combinatorics and Cancer Genomics . . . . . . . . . . . . . . . . 148--162 Yang Li and Hong-Mei Li and Paul Burns TrueSight: Self-training Algorithm for Splice Junction Detection Using RNA-seq 163--164 Yaw-Ling Lin and Charles Ward and Steven Skiena Synthetic Sequence Design for Signal Location Search . . . . . . . . . . . . 165--179 Marc A. Marti-Renom The Three-Dimensional Architecture of a Bacterial Genome and Its Alteration by Genetic Perturbation . . . . . . . . . . 180--180 Andrew McPherson and Chunxiao Wu Discovery of Complex Genomic Rearrangements in Cancer Using High-Throughput Sequencing . . . . . . . 181--182 T. M. Murali and Matthew D. Dyer and David Badger Network-Based Prediction and Analysis of HIV Dependency Factors . . . . . . . . . 183--183 Andrew S. Parker and Karl E. Griswold Structure-Guided Deimmunization of Therapeutic Proteins . . . . . . . . . . 184--198 Dmitri Pervouchine and Ekaterina Khrameeva Evidence for Widespread Association of Mammalian Splicing and Conserved Long-Range RNA Structures . . . . . . . 199--199 Anonymous Front Matter . . . . . . . . . . . . . . ??
Ping-Lin Chang and Dongbin Chen and Daniel Cohen $2$D/$3$D Registration of a Preoperative Model with Endoscopic Video Using Colour-Consistency . . . . . . . . . . . 1--12 Simon Drouin and Marta Kersten-Oertel A Realistic Test and Development Environment for Mixed Reality in Neurosurgery . . . . . . . . . . . . . . 13--23 Kenko Fujii and Johannes Totz and Guang-Zhong Yang Visual Search Behaviour and Analysis of Augmented Visualisation for Minimally Invasive Surgery . . . . . . . . . . . . 24--35 Kate Alicia Gavaghan and Sylvain Anderegg Augmented Reality Image Overlay Projection for Image Guided Open Liver Ablation of Metastatic Liver Cancer . . 36--46 Stamatia Giannarou and Guang-Zhong Yang Tissue Deformation Recovery with Gaussian Mixture Model Based Structure from Motion . . . . . . . . . . . . . . 47--57 Samantha Horvath and John Galeotti and Bo Wang Towards an Ultrasound Probe with Vision: Structured Light to Determine Surface Orientation . . . . . . . . . . . . . . 58--64 Jagadeesan Jayender and Inbar Spofford Markov Modeling of Colonoscopy Gestures to Develop Skill Trainers . . . . . . . 65--73 Bernhard Kainz and Rupert H. Portugaller Volume Visualization in the Clinical Practice . . . . . . . . . . . . . . . . 74--84 Pencilla Lang and Michael W. Chu CT-US Registration for Guidance of Transcatheter Aortic Valve Implantation 85--92 Cristian A. Linte and Kurt E. Augustine Enhanced Planning of Interventions for Spinal Deformity Correction Using Virtual Modeling and Visualization Techniques . . . . . . . . . . . . . . . 93--105 Coert Metz and Michiel Schaap and Stefan Klein Alignment of $4$D Coronary CTA with Monoplane X-ray Angiography . . . . . . 106--116 Naoki Suzuki and Asaki Hattori and Satoshi Ieiri VR Training System for Endoscopic Surgery Robot . . . . . . . . . . . . . 117--129 Jue Wu and Kathryn Davis and Allan Azarion Brain Parcellation Aids in Electrode Localization in Epileptic Patients . . . 130--137 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Jack Minker To Vladimir Lifschitz on His 65th Birthday . . . . . . . . . . . . . . . . 1--13 Neelakantan Kartha and Esra Erdem and Joohyung Lee and Paolo Ferraris Vladimir Lifschitz --- a Youth at 65 . . 14--23 Marcello Balduccini A ``Conservative'' Approach to Extending Answer Set Programming with Non-Herbrand Functions . . . . . . . . . . . . . . . 24--39 Chitta Baral and Marcos Alvarez Gonzalez and Aaron Gottesman The Inverse Lambda Calculus Algorithm for Typed First Order Logic Lambda Calculus and Its Application to Translating English to FOL . . . . . . . 40--56 Ringo Baumann and Gerhard Brewka and Wolfgang Dvo\vrák and Stefan Woltran Parameterized Splitting: a Simple Modification-Based Approach . . . . . . 57--71 Nikolaj Bjòrner and Guido de Caso and Yuri Gurevich From Primal Infon Logic with Individual Variables to Datalog . . . . . . . . . . 72--86 Alexander Bochman Here and There among Logics for Logic Programming . . . . . . . . . . . . . . 87--101 Pedro Cabalar Causal Logic Programming . . . . . . . . 102--116 Andrea Cal\`\i and Georg Gottlob and Giorgio Orsi and Andreas Pieris On the Interaction of Existential Rules and Equality Constraints in Ontology Querying . . . . . . . . . . . . . . . . 117--133 Xiaoping Chen and Guoqiang Jin and Fangkai Yang Extending Action Language $\mathcal{C}+$ by Formalizing Composite Actions . . . . 134--148 Stefania Costantini and Andrea Formisano and David Pearce Strong Equivalence of RASP Programs . . 149--163 James Delgrande Considerations on Belief Revision in an Action Theory . . . . . . . . . . . . . 164--177 Marc Denecker and Maurice Bruynooghe and Joost Vennekens Approximation Fixpoint Theory and the Semantics of Logic and Answers Set Programs . . . . . . . . . . . . . . . . 178--194 Jürgen Dix and Wolfgang Faber and V. S. Subrahmanian Privacy Preservation Using Multi-context Systems and Default Logic . . . . . . . 195--210 Thomas Eiter and Cristina Feier and Michael Fink Simulating Production Rules Using ACTHEX 211--228 Esra Erdem and Volkan Patoglu Applications of Action Languages in Cognitive Robotics . . . . . . . . . . . 229--246 Wolfgang Faber and Nicola Leone and Simona Perri The Intelligent Grounder of DLV . . . . 247--264 Luis Fariñas del Cerro and David Pearce and Agustín Valverde Bi-state Logic . . . . . . . . . . . . . 265--278 Dov M. Gabbay An Equational Approach to Logic Programming . . . . . . . . . . . . . . 279--295 Martin Gebser and Roland Kaufmann and Torsten Schaub Gearing Up for Effective ASP Planning 296--310 Anonymous Front Matter . . . . . . . . . . . . . . ??
Andreas Fasbender and Martin Gerdes and Sascha Smets Cellular Networking Technologies in ITS Solutions: Opportunities and Challenges 1--13 Muhammad Sabir Idrees and Yves Roudier Effective and Efficient Security Policy Engines for Automotive On-Board Networks 14--26 Axel Sikora Security Solutions for Highly Dynamic Car2X Networks in the KoFAS Initiative 27--39 Zubaida Alazawi and Mohmmad B. Abdljabar and Saleh Altowaijri and Anna Maria Vegni ICDMS: An Intelligent Cloud Based Disaster Management System for Vehicular Networks . . . . . . . . . . . . . . . . 40--56 Krzysztof Ró\.zanowski and Zbigniew Piotrowski and Tadeusz Sondej and Krzysztof Sawicki Wireless Driver and Vehicle Surveillance System Based on IEEE 802.11 Networks . . 57--67 Krzysztof Ró\.zanowski and Tadeusz Sondej and Zbigniew Piotrowski and Krzysztof Sawicki Architecture of Car Measurement System for Driver Monitoring . . . . . . . . . 68--79 Carlos Gañán and Jose L. Muñoz and Oscar Esparza and Jorge Mata-Díaz and Juanjo Alins Toward Revocation Data Handling Efficiency in VANETs . . . . . . . . . . 80--90 Muhammad Shoaib and Wang-Cheol Song and Keun Hyung Kim Cluster Based Data Aggregation in Vehicular Adhoc Network . . . . . . . . 91--102 Florent Kaisser and Christophe Gransart and Marion Berbineau Simulations of VANET Scenarios with OPNET and SUMO . . . . . . . . . . . . . 103--112 Bhushan G. Jagyasi and Vikrant Kumar and Arun Pande Human Participatory Sensing in Fixed Route Bus Information System . . . . . . 113--123 Dariusz Kowalski and Zeev Nutov and Michael Segal Scheduling of Vehicles in Transportation Networks . . . . . . . . . . . . . . . . 124--136 Johan Bergs and Erwin Van de Velde and Daan Pareit and Dries Naudts and Milos Rovcanin Design and Prototype of a Train-to-Wayside Communication Architecture . . . . . . . . . . . . . . 137--150 Navin Kumar and Nidhu Kumari Conceptual Architectural Design of Indian Railway Intelligent Transportation Systems . . . . . . . . . 151--162 Abhinav Jha and Amit Kumar Agrawal and Chirabrata Bhaumik Automatic Alert Generation from Train to the People at Unmanned Level Crossings Using Principles of IoT . . . . . . . . 163--173 Patricia Noriega-Vivas and Celeste Campo and Carlos Garcia-Rubio and Alicia Rodriguez-Carrion MOFETA: a Network Architecture Based on MObile FEmtocells to Enhance Cellular Connectivity on TrAins . . . . . . . . . 174--185 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . 1--1 Krzysztof Bartecki Neural Network-Based PCA: An Application to Approximation of a Distributed Parameter System . . . . . . . . . . . . 3--11 Jaros\law Bilski and Jacek Smol\kag Parallel Realisation of the Recurrent Multi Layer Perceptron Learning . . . . 12--20 Giacomo Capizzi and Christian Napoli and Lucio Patern\`o An Innovative Hybrid Neuro-wavelet Method for Reconstruction of Missing Data in Astronomical Photometric Surveys 21--29 Daniel Salles Chevitarese and Dilza Szwarcman and Marley Vellasco Speeding Up the Training of Neural Networks with CUDA Technology . . . . . 30--38 Meng Joo Er and Piotr Duda On the Uniform Convergence of the Orthogonal Series-Type Kernel Regression Neural Networks in a Time-Varying Environment . . . . . . . . . . . . . . 39--46 Piotr Duda and Yoichi Hayashi and Maciej Jaworski On the Strong Convergence of the Orthogonal Series-Type Kernel Regression Neural Networks in a Non-stationary Environment . . . . . . . . . . . . . . 47--54 Piotr Duda and Marcin Korytkowski On the Strong Convergence of the Recursive Orthogonal Series-Type Kernel Probabilistic Neural Networks Handling Time-Varying Noise . . . . . . . . . . . 55--62 Bogumi\l Fiksak and Maciej Krawczak Incidental Neural Networks as Nomograms Generators . . . . . . . . . . . . . . . 63--71 Krzysztof Halawa Selection of Activation Functions in the Last Hidden Layer of the Multilayer Perceptron . . . . . . . . . . . . . . . 72--80 Adrian Horzyk Information Freedom and Associative Artificial Intelligence . . . . . . . . 81--89 Maciej Jaworski and Meng Joo Er and Lena Pietruczuk On the Application of the Parzen-Type Kernel Regression Neural Network and Order Statistics for Learning in a Non-stationary Environment . . . . . . . 90--98 Maciej Jaworski and Marcin Gabryel On Learning in a Time-Varying Environment by Using a Probabilistic Neural Network and the Recursive Least Squares Method . . . . . . . . . . . . . 99--110 Vladimir Kryzhanovskiy and Irina Zhelavskaya and Jakov Karandashev Binary Perceptron Learning Algorithm Using Simplex-Method . . . . . . . . . . 111--118 \Lukasz Laskowski Objects Auto-selection from Stereo-Images Realised by Self-Correcting Neural Network . . . . . 119--125 Maciej \Lawry\'nczuk On-Line Trajectory-Based Linearisation of Neural Models for a Computationally Efficient Predictive Control Algorithm 126--134 Vladimir Olej and Jana Filipova Short Time Series of Website Visits Prediction by RBF Neural Networks and Support Vector Machine Regression . . . 135--142 Jaros\law Piersa and Tomasz Schreiber Spectra of the Spike-Flow Graphs in Geometrically Embedded Neural Networks 143--151 Lena Pietruczuk and Meng Joo Er Weak Convergence of the Parzen-Type Probabilistic Neural Network Handling Time-Varying Noise . . . . . . . . . . . 152--159 Lena Pietruczuk and Yoichi Hayashi Strong Convergence of the Recursive Parzen-Type Probabilistic Neural Network Handling Nonstationary Noise . . . . . . 160--168 Piotr P\lo\'nski and Krzysztof Zaremba Improving Performance of Self-Organising Maps with Distance Metric Learning Method . . . . . . . . . . . . . . . . . 169--177 Anonymous Front Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . 1--1 Yalemisew M. Abgaz and Muhammad Javed and Claus Pahl Dependency Analysis in Ontology-Driven Content-Based Systems . . . . . . . . . 3--12 Vladimír Bartík Measuring Web Page Similarity Based on Textual and Visual Properties . . . . . 13--21 Stanis\law Brodowski and Andrzej Bielecki New Specifics for a Hierarchial Estimator Meta-algorithm . . . . . . . . 22--29 Dariusz Ceglarek and Konstanty Haniewicz Fast Plagiarism Detection by Sentence Hashing . . . . . . . . . . . . . . . . 30--37 Harry Chang Enriching Domain-Specific Language Models Using Domain Independent WWW $N$-Gram Corpus . . . . . . . . . . . . 38--46 Pietro Codara On the Structure of Indiscernibility Relations Compatible with a Partially Ordered Set . . . . . . . . . . . . . . 47--55 Piotr Duda and Maciej Jaworski and Lena Pietruczuk On Pre-processing Algorithms for Data Stream . . . . . . . . . . . . . . . . . 56--63 Marek Grochowski Simple Incremental Instance Selection Wrapper for Classification . . . . . . . 64--72 Anamika Gupta and Naveen Kumar and Vasudha Bhatnagar Mining of Multiobjective Non-redundant Association Rules in Data Streams . . . 73--81 Maciej Jaworski and Piotr Duda and Lena Pietruczuk On Fuzzy Clustering of Data Streams with Concept Drift . . . . . . . . . . . . . 82--91 Maciej Jaworski and Lena Pietruczuk and Piotr Duda On Resources Optimization in Fuzzy Clustering of Data Streams . . . . . . . 92--99 Przemys\law Kl\kesk A Comparison of Complexity Selection Approaches for Polynomials Based on: Vapnik--Chervonenkis Dimension, Rademacher Complexity and Covering Numbers . . . . . . . . . . . . . . . . 100--110 Marcin Korze\'n and Przemys\law Kl\kesk Sample Complexity of Linear Learning Machines with Different Restrictions over Weights . . . . . . . . . . . . . . 111--119 Maciej Krawczak and Gra\.zyna Szkatu\la A Clustering Algorithm Based on Distinguishability for Nominal Attributes . . . . . . . . . . . . . . . 120--127 Piotr \Lady\.zy\'nski and Przemys\law Grzegorzewski Retrieving Informative Content from Web Pages with Conditional Learning of Support Vector Machines and Semantic Analysis . . . . . . . . . . . . . . . . 128--135 Henryk Maciejewski and Ewa Walkowicz and Olgierd Unold and Pawe\l Skrobanek Enhancing Recognition of a Weak Class --- Comparative Study Based on Biological Population Data Mining . . . 136--143 Marcin Michalak Foundations of Rough Biclustering . . . 144--151 Marcin Michalak and Marek Sikora and Patryk Ziarnik ORG- Oblique Rules Generator . . . . . . 152--159 Marcin Pluci\'nski Mini-models --- Local Regression Models for the Function Approximation Learning 160--167 Artur Starczewski A Cluster Validity Index for Hard Clustering . . . . . . . . . . . . . . . 168--174 Anonymous Front Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . 1--1 Djibrilla Amadou Kountché and Nicolas Monmarché and Mohamed Slimane The \em Pachycondyla Apicalis Ants Search Strategy for Data Clustering Problems . . . . . . . . . . . . . . . . 3--11 Jaros\law Arabas and Ogier Maitre and Pierre Collet PARADE: a Massively Parallel Differential Evolution Template for EASEA . . . . . . . . . . . . . . . . . 12--20 Li Bai and David Feltell A $3$D Discrete-Continuum Swarm Intelligence Simulation on GPU for Swarm Robotics and Biomedical Applications . . 21--29 Kálmán Bolla and Tamás Kovacs and Gábor Fazekas Gathering of Fat Robots with Limited Visibility and without Global Navigation 30--38 Petr Bujok and Josef Tvrdík Parallel Migration Model Employing Various Adaptive Variants of Differential Evolution . . . . . . . . . 39--47 Roberto De Prisco and Gianluca Zaccagnino and Rocco Zaccagnino A Differential Evolution Algorithm Assisted by ANFIS for Music Fingering 48--56 Abbas El Dor and Maurice Clerc and Patrick Siarry Hybridization of Differential Evolution and Particle Swarm Optimization in a New Algorithm: DEPSO-2S . . . . . . . . . . 57--65 Iztok Fister Jr. and Iztok Fister and Janez Brest A Hybrid Artificial Bee Colony Algorithm for Graph $3$-Coloring . . . . . . . . . 66--74 Jeremy Fix and Matthieu Geist Monte--Carlo Swarm Policy Search . . . . 75--83 Giovanni Iacca and Ferrante Neri and Ernesto Mininno Compact Bacterial Foraging Optimization 84--92 Andrew Koh A Coevolutionary MiniMax Algorithm for the Detection of Nash Equilibrium . . . 93--101 Tomasz Krzeszowski and Bogdan Kwolek and Boguslaw Rymut and Konrad Wojciechowski Real-Time Tracking of Full-Body Motion Using Parallel Particle Swarm Optimization with a Pool of Best Particles . . . . . . . . . . . . . . . 102--109 Karol Opara and Jaros\law Arabas Decomposition and Metaoptimization of Mutation Operator in Differential Evolution . . . . . . . . . . . . . . . 110--118 Janusz Papli\'nski Continuous Ant Colony Optimization for Identification of Time Delays in the Linear Plant . . . . . . . . . . . . . . 119--127 M. Fatih Tasgetiren and Quan-Ke Pan and P. N. Suganthan and Ozge Buyukdagli A Variable Iterated Greedy Algorithm with Differential Evolution for Solving No-Idle Flowshops . . . . . . . . . . . 128--135 Josef Tvrdík and Ivan K\vrivý Differential Evolution with Competing Strategies Applied to Partitional Clustering . . . . . . . . . . . . . . . 136--144 Matthieu Weber and Ferrante Neri Contiguous Binomial Crossover in Differential Evolution . . . . . . . . . 145--153 Ale\vs Zamuda and Janez Brest Population Reduction Differential Evolution with Multiple Mutation Strategies in Real World Industry Challenges . . . . . . . . . . . . . . . 154--161 Anonymous Front Matter . . . . . . . . . . . . . . 163--163 Petr Cermak and Michal Mura Genetic Optimization of Fuzzy Rule Based MAS Using Cognitive Analysis . . . . . . 165--173 Marcin Czajkowski and Marek Kretowski Does Memetic Approach Improve Global Induction of Regression and Model Trees? 174--181 Anonymous Front Matter . . . . . . . . . . . . . . ??
Elisa Burato and Matteo Cristani The Process of Reaching Agreement in Meaning Negotiation . . . . . . . . . . 1--42 Veronica Jascanu and Nicolae Jascanu Formalizing Emotional E-Commerce Agents for a Simple Negotiation Protocol . . . 43--60 Giancarlo Fortino and Francesco Rango Engineering Multi-Agent Systems through Statecharts-Based JADE Agents and Tools 61--81 Mahdi Zargayouna Fleet Organization Models for Online Vehicle Routing Problems . . . . . . . . 82--102 Vill\`evo Adanhounm\`e and Théophile K. Dagba Neural Smooth Function Approximation and Prediction with Adaptive Learning Rate 103--118 James O'Shea and Zuhair Bandar and Keeley Crockett A Multi-classifier Approach to Dialogue Act Classification Using Function Words 119--143 Danuta Zakrzewska Building Group Recommendations in E-Learning Systems . . . . . . . . . . . 144--163 Wojciech Lorkiewicz and Radoslaw Katarzyniak Individual Semiosis in Multi-Agent Systems . . . . . . . . . . . . . . . . 164--197 Pierpaolo Di Bitonto and Maria Laterza Evaluation of Multi-Agent Systems: Proposal and Validation of a Metric Plan 198--221 Jaros\law W\kas Egress Modeling through Cellular Automata Based Multi-Agent Systems . . . 222--235 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Dimitri Van Landuyt and Steven Op de beeck and Eddy Truyen and Wouter Joosen Domain-Driven Discovery of Stable Abstractions for Pointcut Interfaces . . 1--52 Jean-Yves Tigli and Stéphane Lavirotte and Gaëtan Rey and Nicolas Ferry and Vincent Hourdin Aspect of Assembly: From Theory to Performance . . . . . . . . . . . . . . 53--91 Danilo Ansaloni and Walter Binder and Philippe Moret and Alex Villazón Dynamic Aspect-Oriented Programming in Java: The HotWave Experience . . . . . . 92--122 Adrian Holzer and Lukasz Ziarek and K. R. Jayaram and Patrick Eugster Abstracting Context in Event-Based Software . . . . . . . . . . . . . . . . 123--167 Daniel Lohmann and Olaf Spinczyk and Wanja Hofer and Wolfgang Schröder-Preikschat The Aspect-Aware Design and Implementation of the CiAO Operating-System Family . . . . . . . . 168--215 Lodewijk Bergmans and Wilke Havinga and Mehmet Aksit First-Class Compositions . . . . . . . . 216--267 Eyvind W. Axelsen and Fredrik Sòrensen and Stein Krogdahl and Birger Mòller-Pedersen Challenges in the Design of the Package Template Mechanism . . . . . . . . . . . 268--305 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Francisco Maia and Miguel Matos Slead: Low-Memory, Steady Distributed Systems Slicing . . . . . . . . . . . . 1--15 François Fouquet and Erwan Daubert Dissemination of Reconfiguration Policies on Mesh Networks . . . . . . . 16--30 Dimokritos Stamatakis and Nikos Tsikoudis Scalability of Replicated Metadata Services in Distributed File Systems . . 31--44 Fatemeh Rahimian and Thinh Le Nguyen Huu Locality-Awareness in a Peer-to-Peer Publish/Subscribe Network . . . . . . . 45--58 Philippe De Ryck and Nick Nikiforakis Serene: Self-Reliant Client-Side Protection against Session Fixation . . 59--72 Linda Ariani Gunawan Behavioral Singletons to Consistently Handle Global States of Security Patterns . . . . . . . . . . . . . . . . 73--86 Diego Kreutz and António Casimiro A Trustworthy and Resilient Event Broker for Monitoring Cloud Infrastructures . . 87--95 Miguel Borges and Paulo Jesus and Carlos Baquero Spectra: Robust Estimation of Distribution Functions in Networks . . . 96--103 Jef Maerien and Pieter Agten FAMoS: a Flexible Active Monitoring Service for Wireless Sensor Networks . . 104--117 Abdulkader Benchi and Frédéric Guidec A Message Service for Opportunistic Computing in Disconnected MANETs . . . . 118--131 Engineer Bainomugisha and Koosha Paridel Flexub: Dynamic Subscriptions for Publish/Subscribe Systems in MANETs . . 132--139 John Lyle and Shamal Faily and Ivan Fléchais On the Design and Development of webinos: a Distributed Mobile Application Middleware . . . . . . . . . 140--147 Graham Thomson and Sotirios Terzis A Middleware for Pervasive Situation-Awareness . . . . . . . . . . 148--161 Abdulrahman Azab and Hein Meling Stroll: a Universal Filesystem-Based Interface for Seamless Task Deployment in Grid Computing . . . . . . . . . . . 162--176 Fredrik Degerlund Scheduling of Compute-Intensive Code Generated from Event-B Models: An Empirical Efficiency Study . . . . . . . 177--184 Narasimha Raghavan Veeraragavan Reliability Modeling and Analysis of Modern Distributed Interactive Multimedia Applications: a Case Study of a Distributed Opera Performance . . . . 185--193 Diana Elena Comes and Christoph Evers Designing Socio-technical Applications for Ubiquitous Computing . . . . . . . . 194--201 Ivan Voras and Marin Orli\'c and Mario \vZagar Something Old Is New Again: Reimagining the Oldest Social Networking Platform 202--207 Preston Rodrigues and Yérom-David Bromberg ZigZag: a Middleware for Service Discovery in Future Internet . . . . . . 208--221 Diana Elena Comes and Harun Baraki BPRules and the BPR-Framework: Comprehensive Support for Managing QoS in Web Service Compositions . . . . . . 222--235 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Michael Lienhardt and Ivan Lanese A Reversible Abstract Machine and Its Space Overhead . . . . . . . . . . . . . 1--17 Taylor T. Johnson and Sayan Mitra A Small Model Theorem for Rectangular Hybrid Automata Networks . . . . . . . . 18--34 Elvira Albert and Antonio E. Flores-Montoya Analysis of May-Happen-in-Parallel in Concurrent Objects . . . . . . . . . . . 35--51 Bogdan Aman and Gabriel Ciobanu and Maciej Koutny Behavioural Equivalences over Migrating Processes with Timers . . . . . . . . . 52--66 Kais Klai and Jörg Desel Checking Soundness of Business Processes Compositionally Using Symbolic Observation Graphs . . . . . . . . . . . 67--83 Roland Kindermann and Tommi Junttila Beyond Lassos: Complete SMT-Based Bounded Model Checking for Timed Automata . . . . . . . . . . . . . . . . 84--100 Pavithra Prabhakar and Mahesh Viswanathan Conformance Testing of Boolean Programs with Multiple Faults . . . . . . . . . . 101--117 Saddek Bensalem and Marius Bozga and Jean Quilbeuf Knowledge-Based Distributed Conflict Resolution for Multiparty Interactions and Priorities . . . . . . . . . . . . . 118--134 Andrea Cerone and Matthew Hennessy Modelling Probabilistic Wireless Networks . . . . . . . . . . . . . . . . 135--151 Dimiter Milushev and Wim Beck and Dave Clarke Noninterference via Symbolic Execution 152--168 David Romero Hernández and David de Frutos Escrig Defining Distances for All Process Semantics . . . . . . . . . . . . . . . 169--185 Gilles Barthe and Juan Manuel Crespo Secure Multi-Execution through Static Program Transformation . . . . . . . . . 186--202 Beno\^\it Delahaye and Uli Fahrenberg Synchronous Interface Theories and Time Triggered Scheduling . . . . . . . . . . 203--218 Samira Tasharofi and Rajesh K. Karmani TransDPOR: a Novel Dynamic Partial-Order Reduction Technique for Testing Actor Programs . . . . . . . . . . . . . . . . 219--234 Giorgio Delzanno and Arnaud Sangnier Verification of Ad Hoc Networks with Node and Communication Failures . . . . 235--250 Clara Benac Earle and Lars-Åke Fredlund Verification of Timed Erlang Programs Using McErlang . . . . . . . . . . . . . 251--267 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Vitaliy Liptchinsky and Roman Khazankin and Hong-Linh Truong Statelets: Coordination of Social Collaboration Processes . . . . . . . . 1--16 Davide Rossi A Social Software-Based Coordination Platform . . . . . . . . . . . . . . . . 17--28 Frederico Alvares de Oliveira Jr. and Remi Sharrock Synchronization of Multiple Autonomic Control Loops: Application to Cloud Computing . . . . . . . . . . . . . . . 29--43 Marko van Dooren and Dave Clarke Subobject Transactional Memory . . . . . 44--58 Dave Clarke and José Proença Partial Connector Colouring . . . . . . 59--73 Ramtin Khosravi and Hamideh Sabouri Using Coordinated Actors to Model Families of Distributed Systems . . . . 74--88 Peter Dinges and Gul Agha Scoped Synchronization Constraints for Large Scale Actor Systems . . . . . . . 89--103 Roberto Bruni and Carla Ferreira and Anne Kersten Kauer First-Order Dynamic Logic for Compensable Processes . . . . . . . . . 104--121 Bogdan Aman and Gabriel Ciobanu Coordinating Parallel Mobile Ambients to Solve SAT Problem in Polynomial Number of Steps . . . . . . . . . . . . . . . . 122--136 Micha\l Terepeta and Hanne Riis Nielson and Flemming Nielson Recursive Advice for Coordination . . . 137--151 Mieke Massink and Diego Latella Fluid Analysis of Foraging Ants . . . . 152--165 Stefan Dziwok and Christian Heinzemann and Matthias Tichy Real-Time Coordination Patterns for Advanced Mechatronic Systems . . . . . . 166--180 Eline Philips and Jorge Vallejos Group Orchestration in a Mobile Environment . . . . . . . . . . . . . . 181--195 Luigia Petre and Petter Sandvik and Kaisa Sere Node Coordination in Peer-to-Peer Networks . . . . . . . . . . . . . . . . 196--211 Mirko Viroli and Danilo Pianini and Jacob Beal Linda in Space-Time: An Adaptive Coordination Model for Mobile Ad-Hoc Environments . . . . . . . . . . . . . . 212--229 Eva Kühn and Alexander Marek and Thomas Scheller A Space-Based Generic Pattern for Self-Initiative Load Clustering Agents 230--244 Massimo Bartoletti and Emilio Tuosto and Roberto Zunino On the Realizability of Contracts in Dishonest Systems . . . . . . . . . . . 245--260 Pierpaolo Degano and Gian-Luigi Ferrari Types for Coordinating Secure Behavioural Variations . . . . . . . . . 261--276 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Michael Hutter and Mario Kirschbaum and Thomas Plos and Jörn-Marc Schmidt and Stefan Mangard Exploiting the Difference of Side-Channel Leakages . . . . . . . . . 1--16 Thomas Korak and Thomas Plos and Michael Hutter Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario . . . . . . . . . . . . . . . . 17--32 Mathias Wagner 700+ Attacks Published on Smart Cards: The Need for a Systematic Counter Strategy . . . . . . . . . . . . . . . . 33--38 Wei He and Eduardo de la Torre and Teresa Riesgo An Interleaved EPE-Immune PA-DPL Structure for Resisting Concentrated EM Side Channel Attacks on FPGA Implementation . . . . . . . . . . . . . 39--53 Shohreh Sharif Mansouri and Elena Dubrova An Architectural Countermeasure against Power Analysis Attacks for FSR-Based Stream Ciphers . . . . . . . . . . . . . 54--68 Jean-Sébastien Coron and Christophe Giraud and Emmanuel Prouff and Soline Renner Conversion of Security Proofs from One Leakage Model to Another: a New Issue 69--81 Sven Bauer Attacking Exponent Blinding in RSA without CRT . . . . . . . . . . . . . . 82--88 Jean Da Rolt and Amitabh Das and Giorgio Di Natale and Marie-Lise Flottes and Bruno Rouzeyre A New Scan Attack on RSA in Presence of Industrial Countermeasures . . . . . . . 89--104 Camille Vuillaume and Takashi Endo and Paul Wooderson RSA Key Generation: New Attacks . . . . 105--119 Philipp Jovanovic and Martin Kreuzer and Ilia Polian A Fault Attack on the LED Block Cipher 120--134 Liang Zhao and Takashi Nishide and Kouichi Sakurai Differential Fault Analysis of Full LBlock . . . . . . . . . . . . . . . . . 135--150 Pierre Bayon and Lilian Bossuet and Alain Aubert and Viktor Fischer and François Poucheret Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator . . . . . . . . 151--166 Viktor Fischer A Closer Look at Security in Random Number Generators Design . . . . . . . . 167--182 Cédric Murdica and Sylvain Guilley and Jean-Luc Danger and Philippe Hoogvorst and David Naccache Same Values Power Analysis Using Special Points on Elliptic Curves . . . . . . . 183--198 Alexander Krüger The Schindler--Itoh-attack in Case of Partial Information Leakage . . . . . . 199--214 Michael Zohner and Michael Kasper and Marc Stöttinger Butterfly-Attack on Skein's Modular Addition . . . . . . . . . . . . . . . . 215--230 Xinjie Zhao and Fan Zhang and Shize Guo and Tao Wang and Zhijie Shi and Huiying Liu and Keke Ji MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation . . . 231--248 Annelie Heuser and Michael Zohner Intelligent Machine Homicide . . . . . . 249--264 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Marco E. Lübbecke Automatic Decomposition and Branch-and-Price--- a Status Report . . 1--8 Barbara Kempkes and Friedhelm Meyer auf der Heide Continuous Local Strategies for Robotic Formation Problems . . . . . . . . . . . 9--17 Vitaly Osipov and Peter Sanders and Christian Schulz Engineering Graph Partitioning Algorithms . . . . . . . . . . . . . . . 18--26 Benjamin Albrecht and Volker Heun Space Efficient Modifications to Structator--- a Fast Index-Based Search Tool for RNA Sequence-Structure Patterns 27--38 Eric Angel and Romain Campigotto and Christian Laforest Implementation and Comparison of Heuristics for the Vertex Cover Problem on Huge Graphs . . . . . . . . . . . . . 39--50 Annabell Berger and Matthias Müller-Hannemann How to Attack the NP-Complete Dag Realization Problem in Practice . . . . 51--62 Christina Büsing and Fabio D'Andreagiovanni New Results about Multi-band Uncertainty in Robust Optimization . . . . . . . . . 63--74 Sonia Cafieri and Pierre Hansen and Lucas Létocart and Leo Liberti and Frédéric Messine Compact Relaxations for Polynomial Programming Problems . . . . . . . . . . 75--86 Alberto Costa and Leo Liberti Relaxations of Multilinear Convex Envelopes: Dual Is Better Than Primal 87--98 Pierluigi Crescenzi and Roberto Grossi and Leonardo Lanzi and Andrea Marino On Computing the Diameter of Real-World Directed (Weighted) Graphs . . . . . . . 99--110 Annalisa D'Andrea and Guido Proietti Reoptimizing the Strengthened Metric TSP on Multiple Edge Weight Modifications 111--122 Gianlorenzo D'Angelo and Mattia D'Emidio and Daniele Frigioni and Vinicio Maurizio Engineering a New Loop-Free Shortest Paths Routing Algorithm . . . . . . . . 123--134 Gianlorenzo D'Angelo and Mattia D'Emidio and Daniele Frigioni and Camillo Vitale Fully Dynamic Maintenance of Arc-Flags in Road Networks . . . . . . . . . . . . 135--147 Martin Dietzfelbinger and Hendrik Peilke and Michael Rink A More Reliable Greedy Heuristic for Maximum Matchings in Sparse Random Graphs . . . . . . . . . . . . . . . . . 148--159 Amr Elmasry and Jyrki Katajainen and Max Stenmark Branch Mispredictions Don't Affect Mergesort . . . . . . . . . . . . . . . 160--171 Simone Faro and Thierry Lecroq A Multiple Sliding Windows Approach to Speed Up String Matching Algorithms . . 172--183 Guillaume Fertin and Hafedh Mohamed Babou and Irena Rusu Algorithms for Subnetwork Mining in Heterogeneous Networks . . . . . . . . . 184--194 Donatella Firmani and Giuseppe F. Italiano and Luigi Laura and Alessio Orlandi Computing Strong Articulation Points and Strong Bridges in Large Scale Graphs . . 195--207 Giorgos Georgiadis and Marina Papatriantafilou Adaptive Distributed $b$-Matching in Overlays with Preferences . . . . . . . 208--223 Stelios Joannou and Rajeev Raman Dynamizing Succinct Tree Representations 224--235 Anonymous Front Matter . . . . . . . . . . . . . . ??
Sarang Bharadwaj Masti and Siva P. Meenakshi and Serugudi V. Raghavan VNEMX: Virtual Network Embedding Test-Bed Using MPLS and Xen . . . . . . 1--12 Panagiotis Papadimitriou and Ines Houidi and Wajdi Louati and Djamal Zeghlache and Christoph Werle Towards Large-Scale Network Virtualization . . . . . . . . . . . . . 13--25 Vasileios Lakafosis and Sreenivas Addagatla and Christian Belady and Suyash Sinha Prometheus: a Wirelessly Interconnected, Pico-Datacenter Framework for the Developing World . . . . . . . . . . . . 26--39 Olga Galinina and Sergey Andreev and Yevgeni Koucheryavy Performance Analysis of Client Relay Cloud in Wireless Cellular Networks . . 40--51 Christos Liaskos and Andreas Xeros and Georgios I. Papadimitriou and Marios Lestas Periodic Scheduling with Costs Revisited 52--63 Christos Liaskos and Ageliki Tsioliaridou and Georgios I. Papadimitriou More for Less . . . . . . . . . . . . . 64--75 Junyu Lai and Bernd E. Wolfinger A Method to Improve the Channel Availability of IPTV Systems with Users Zapping Channels Sequentially . . . . . 76--89 Nedal Ababneh and Nicholas Timmons and Jim Morrison An Adaptive Bandwidth Allocation Scheme for Data Streaming over Body Area Networks . . . . . . . . . . . . . . . . 90--101 Ehsan Ahvar and René Serral-Graci\`a and Eva Marín-Tordera and Xavier Masip-Bruin EQR: a New Energy-Aware Query-Based Routing Protocol for Wireless Sensor Networks . . . . . . . . . . . . . . . . 102--113 Gerald Wagenknecht and Markus Anwander and Torsten Braun Performance Evaluation of Reliable Overlay Multicast in Wireless Sensor Networks . . . . . . . . . . . . . . . . 114--125 Desislava C. Dimitrova and Islam Alyafawi and Torsten Braun Experimental Comparison of Bluetooth and WiFi Signal Propagation for Indoor Localisation . . . . . . . . . . . . . . 126--137 Kaushik Mondal and Partha Sarathi Mandal and Bhabani P. Sinha Localization in Presence of Multipath Effect in Wireless Sensor Networks . . . 138--149 Ausama Yousef and Samer Rishe and Andreas Mitschele-Thiel and Abdalkarim Awad RNBB: a Reliable Hybrid Broadcasting Algorithm for Ad-Hoc Networks . . . . . 150--161 Ghazale Hosseinabadi and Nitin H. Vaidya Exploiting Opportunistic Overhearing to Improve Performance of Mutual Exclusion in Wireless Ad Hoc Networks . . . . . . 162--173 Fraser Cadger and Kevin Curran and Jose Santos and Sandra Moffett MANET Location Prediction Using Machine Learning Algorithms . . . . . . . . . . 174--185 José Marinho and Edmundo Monteiro Cooperative Sensing-Before-Transmit in Ad-Hoc Multi-hop Cognitive Radio Scenarios . . . . . . . . . . . . . . . 186--197 Adetola Oredope and Guilherme Frassetto and Barry Evans An Evaluation of Vertical Handovers in LTE Networks . . . . . . . . . . . . . . 198--207 Michal Vondra and Zdenek Becvar Connection Cost Based Handover Decision for Offloading Macrocells by Femtocells 208--219 Chung-Hsien Hsu Direct Link Assignment Approach for IEEE 802.16 Networks . . . . . . . . . . . . 220--231 Dongxiao Yu and Qiang-Sheng Hua and Weiguo Dai and Yuexuan Wang and Francis C. M. Lau Dynamic Contention Resolution in Multiple-Access Channels . . . . . . . . 232--243 Anonymous Front Matter . . . . . . . . . . . . . . ??
Hsinchun Chen Dark Web: Exploring and Mining the Dark Side of the Web . . . . . . . . . . . . 1--1 Luc De Raedt Declarative Modeling for Machine Learning and Data Mining . . . . . . . . 2--2 Paul Elzinga Can Concepts Reveal Criminals? . . . . . 3--3 Bart Goethals Cartification: From Similarities to Itemset Frequencies . . . . . . . . . . 4--4 Ir. Edward Peters Processes Are Concepts, Aren't They? . . 5--5 Dominik \'Sl\kezak Rough Sets and FCA --- Scalability Challenges . . . . . . . . . . . . . . . 6--6 Mikhail A. Babin and Sergei O. Kuznetsov Approximating Concept Stability . . . . 7--15 Eduard Bartl and Michal Krupka Logical Analysis of Concept Lattices by Factorization . . . . . . . . . . . . . 16--27 Radim Belohlavek and Martin Trnecka Basic Level of Concepts in Formal Concept Analysis . . . . . . . . . . . . 28--44 Anne Berry and Alain Sigayret A Peep through the Looking Glass: Articulation Points in Lattices . . . . 45--60 Stéphanie Chollet and Vincent Lestideau and Yoann Maurel and Etienne Gandrille and Philippe Lalanda Practical Use of Formal Concept Analysis in Service-Oriented Computing . . . . . 61--76 Stephan Doerfel and Robert Jäschke and Gerd Stumme Publication Analysis of the Formal Concept Analysis Community . . . . . . . 77--95 Dominik Endres and Ruth Adam and Martin A. Giese and Uta Noppeney Understanding the Semantic Structure of Human fMRI Brain Recordings with Formal Concept Analysis . . . . . . . . . . . . 96--111 Sébastien Ferré and Pierre Allard and Olivier Ridoux Cubes of Concepts: Multi-dimensional Exploration of Multi-valued Contexts . . 112--127 Bernhard Ganter and Cynthia Vera Glodeanu Ordinal Factor Analysis . . . . . . . . 128--139 Tim B. Kaiser and Stefan E. Schmidt A Macroscopic Approach to FCA and Its Various Fuzzifications . . . . . . . . . 140--147 Sebastian Kerkhoff A Connection between Clone Theory and FCA Provided by Duality Theory . . . . . 148--163 Markus Kirchberg and Erwin Leonardi and Yu Shyang Tan and Sebastian Link and Ryan K. L. Ko Formal Concept Discovery in Semantic Web Data . . . . . . . . . . . . . . . . . . 164--179 Michal Krupka and Jan Lastovicka Concept Lattices of Incomplete Data . . 180--194 Juraj Macko Formal Concept Analysis as a Framework for Business Intelligence Technologies 195--210 Anonymous Front Matter . . . . . . . . . . . . . . ??
Corrado Leita Challenges in Critical Infrastructure Security . . . . . . . . . . . . . . . . 1--1 Niels Bouten and Anna Hristoskova and Femke Ongenae and Jelle Nelis and Filip De Turck Ontology-Driven Dynamic Discovery and Distributed Coordination of a Robot Swarm . . . . . . . . . . . . . . . . . 2--13 Andrei Vancea and Guilherme Sperb Machado and Laurent d'Orazio and Burkhard Stiller Cooperative Database Caching within Cloud Environments . . . . . . . . . . . 14--25 Stylianos Georgoulas and Klaus Moessner and Alexis Mansour and Menelaos Pissarides A Fuzzy Reinforcement Learning Approach for Pre-Congestion Notification Based Admission Control . . . . . . . . . . . 26--37 Julius Rückert and David Hausheer Bridging the Gap: Towards an Adaptive Video Streaming Approach Supporting Transitions . . . . . . . . . . . . . . 38--41 Teemu Rautio and Jukka Mäkelä A Multiaccess Enabled Load Balancing in Cognitive Networks . . . . . . . . . . . 42--45 Viktor Pu\vs Hardware Acceleration for Measurements in 100 Gb/s Networks . . . . . . . . . . 46--49 Kevin Dominik Korte and Anuj Sehgal and Jürgen Schönwälder A Study of the RPL Repair Process Using ContikiRPL . . . . . . . . . . . . . . . 50--61 Radek Krej\vcí and Pavel \vCeleda and Jakub Dobrovolný Traffic Measurement and Analysis of Building Automation and Control Networks 62--73 Tobias Jung and Sylvain Martin and Damien Ernst and Guy Leduc SPRT for SPIT: Using the Sequential Probability Ratio Test for Spam in VoIP Prevention . . . . . . . . . . . . . . . 74--85 Laurens Hellemons and Luuk Hendriks and Rick Hofstede and Anna Sperotto and Ramin Sadre and Aiko Pras SSHCure: a Flow-Based SSH Intrusion Detection System . . . . . . . . . . . . 86--97 Thorsten Ries and Radu State and Thomas Engel Instant Degradation of Anonymity in Low-Latency Anonymisation Systems . . . 98--108 Rick Hofstede and Aiko Pras Real-Time and Resilient Intrusion Detection: a Flow-Based Approach . . . . 109--112 Karel Bartos and Martin Rehak Distributed Self-organized Collaboration of Autonomous IDS Sensors . . . . . . . 113--117 Václav Barto\vs and Martin \vZádník Network Anomaly Detection: Comparison and Real-Time Issues . . . . . . . . . . 118--121 Cynthia Wagner and Thomas Engel Detecting Anomalies in Netflow Record Time Series by Using a Kernel Function 122--125 Ji\vrí Tobola How to Build an IT Spin-Off Company . . 126--126 Ricardo de O. Schmidt and Anna Sperotto and Ramin Sadre and Aiko Pras Towards Bandwidth Estimation Using Flow-Level Measurements . . . . . . . . 127--138 Vaibhav Bajpai and Nikolay Melnikov and Anuj Sehgal and Jürgen Schönwälder Flow-Based Identification of Failures Caused by IPv6 Transition Mechanisms . . 139--150 Samuel Marchal and Thomas Engel Large Scale DNS Analysis . . . . . . . . 151--154 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Yang Yang and Guang Gong and Xiaohu Tang Odd Perfect Sequences and Sets of Spreading Sequences with Zero or Low Odd Periodic Correlation Zone . . . . . . . 1--12 Ferruh Özbudak and O\uguz Yayla and C. Cengiz Yìldìrìm Nonexistence of Certain Almost $p$-ary Perfect Sequences . . . . . . . . . . . 13--24 Yin Tan and Longjiang Qu and Chik How Tan and Chao Li New Families of Differentially $4$-Uniform Permutations over ${\mathbb F}_{2^{2k}}$ . . . . . . . . . . . . . . 25--39 Jean-Pierre Flori and Sihem Mesnager Dickson Polynomials, Hyperelliptic Curves and Hyper-bent Functions . . . . 40--52 Jonathan Lutz and Charles J. Colbourn and Violet R. Syrotiuk Variable Weight Sequences for Adaptive Scheduled Access in MANETs . . . . . . . 53--64 Andrew Klapper Arithmetic Walsh Transform of Quadratic Boolean Functions . . . . . . . . . . . 65--76 Sumanta Sarkar Characterizing Negabent Boolean Functions over Finite Fields . . . . . . 77--88 Ça\ugda\cs Çalìk and Ali Do\uganaksoy Computing the Weight of a Boolean Function from Its Algebraic Normal Form 89--100 Gottlieb Pirsic and Arne Winterhof Boolean Functions Derived from Pseudorandom Binary Sequences . . . . . 101--109 Solomon W. Golomb Infinite Sequences with Finite Cross-Correlation-II . . . . . . . . . . 110--116 Thomas J. Dorsey and Alfred W. Hales Irreducible Coefficient Relations . . . 117--125 Jonathan Jedwab and Jane Wodlinger Wavelength Isolation Sequence Pairs . . 126--135 Ana S\ual\uagean and David Gardner and Raphael Phan Index Tables of Finite Fields and Modular Golomb Rulers . . . . . . . . . 136--147 Zhengchun Zhou and Xiaohu Tang and Yang Yang and Udaya Parampalli On the Aperiodic Hamming Correlation of Frequency-Hopping Sequences from Norm Functions . . . . . . . . . . . . . . . 148--158 Santiago Barrera Acevedo and Thomas E. Hall Perfect Sequences of Unbounded Lengths over the Basic Quaternions . . . . . . . 159--167 Michael Vielhaber and Mónica del Pilar Canales Chacón The Linear Complexity Deviation of Multisequences: Formulae for Finite Lengths and Asymptotic Distributions . . 168--180 Zhixiong Chen and Domingo Gómez-Pérez Linear Complexity of Binary Sequences Derived from Polynomial Quotients . . . 181--189 Sartaj Ul Hasan and Daniel Panario and Qiang Wang Word-Oriented Transformation Shift Registers and Their Linear Complexity 190--201 Jin-Ho Chung and Kyeongcheol Yang Low-Hit-Zone Frequency-Hopping Sequence Sets with New Parameters . . . . . . . . 202--211 Oscar Moreno and Andrew Tirkel New Optimal Low Correlation Sequences for Wireless Communications . . . . . . 212--223 Anonymous Front Matter . . . . . . . . . . . . . . ??
Nick Wainwright and Nick Papanikolaou Introduction: The FIA Research Roadmap, Priorities for Future Internet Research 1--5 Alexandros Kostopoulos and Ioanna Papafili and Costas Kalogiros and Tapio Levä and Nan Zhang A Tussle Analysis for Information-Centric Networking Architectures . . . . . . . . . . . . . 6--17 Bernard Sales and Emmanuel Darmois and Dimitri Papadimitriou and Didier Bourse A Systematic Approach for Closing the Research to Standardization Gap . . . . 18--29 Kevin Doolin and Ioanna Roussaki and Mark Roddy and Nikos Kalatzis and Elizabeth Papadopoulou SOCIETIES: Where Pervasive Meets Social 30--41 Anne-Marie Oostveen and Isis Hjorth and Brian Pickering and Michael Boniface and Eric T. Meyer Cross-Disciplinary Lessons for the Future Internet . . . . . . . . . . . . 42--54 Dimitri Papadimitriou and Theodore Zahariadis and Pedro Martinez-Julia and Ioanna Papafili Design Principles for the Future Internet Architecture . . . . . . . . . 55--67 Dimitri Papadimitriou and Bernard Sales and Piet Demeester and Theodore Zahariadis From Internet Architecture Research to Standards . . . . . . . . . . . . . . . 68--80 Amira Ben Hamida and Fabio Kon and Gustavo Ansaldi Oliva and Carlos Eduardo Moreira Dos Santos An Integrated Development and Runtime Environment for the Future Internet . . 81--92 James Davey and Florian Mansmann and Jörn Kohlhammer and Daniel Keim Visual Analytics: Towards Intelligent Interactive Internet and Security Solutions . . . . . . . . . . . . . . . 93--104 Francesco Di Cerbo and Michele Bezzi and Samuel Paul Kaluvuri and Antonino Sabetta Towards a Trustworthy Service Marketplace for the Future Internet . . 105--116 Athanasios Antoniou and Evangelos Theodoridis and Ioannis Chatzigiannakis and Georgios Mylonas Using Future Internet Infrastructure and Smartphones for Mobility Trace Acquisition and Social Interactions Monitoring . . . . . . . . . . . . . . . 117--129 Apostolos Axenopoulos and Petros Daras and Sotiris Malassiotis and Vincenzo Croce I-SEARCH: a Unified Framework for Multimodal Search and Retrieval . . . . 130--141 Flávio de Oliveira Silva and Alex Dias and Caio César Ferreira and Eduardo De Souza Santos Semantically Enriched Services to Understand the Need of Entities . . . . 142--153 Pawe\l \'Swi\katek and Krzysztof Juszczyszyn and Krzysztof Brzostowski and Jaros\law Drapa\la Supporting Content, Context and User Awareness in Future Internet Applications . . . . . . . . . . . . . . 154--165 Lara Srivastava and Athena Vakali Towards a Narrative-Aware Design Framework for Smart Urban Environments 166--177 Leonidas G. Anthopoulos and Athena Vakali Urban Planning and Smart Cities: Interrelations and Reciprocities . . . . 178--189 Roberto Gimenez and Diego Fuentes and Emilio Martin and Diego Gimenez and Judith Pertejo The Safety Transformation in the Future Internet Domain . . . . . . . . . . . . 190--200 Christos Tranoris and Spyros Denazis FSToolkit: Adopting Software Engineering Practices for Enabling Definitions of Federated Resource Infrastructures . . . 201--212 Leonidas Lymberopoulos and Mary Grammatikou and Martin Potts and Paola Grosso and Attila Fekete NOVI Tools and Algorithms for Federating Virtualized Infrastructures . . . . . . 213--224 Ioannis Tomkos and Marianna Angelou and Ramón J. Durán Barroso and Ignacio de Miguel Next Generation Flexible and Cognitive Heterogeneous Optical Networks . . . . . 225--236 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Ferran Argelaguet and David Antonio Gómez Jáuregui and Maud Marchal and Anatole Lécuyer A Novel Approach for Pseudo-haptic Textures Based on Curvature Information 1--12 Christopher T. Asque and Andy M. Day and Stephen D. Laycock Cursor Navigation Using Haptics for Motion-Impaired Computer Users . . . . . 13--24 Yuki Ban and Takashi Kajinami and Takuji Narumi and Tomohiro Tanikawa and Michitaka Hirose Modifying an Identified Angle of Edged Shapes Using Pseudo-haptic Effects . . . 25--36 Ozgur Baser and E. Ilhan Konukseven and Hakan Gurocak Transparency Improvement in Haptic Devices with a Torque Compensator Using Motor Current . . . . . . . . . . . . . 37--46 Buket Baylan and Ugur Aridogan and Cagatay Basdogan Finite Element Modeling of a Vibrating Touch Screen Actuated by Piezo Patches for Haptic Feedback . . . . . . . . . . 47--57 Valeria Bellan and Carlo Reverberi and Alberto Gallace Evidence for `Visual Enhancement of Touch' Mediated by Visual Displays and Its Relationship with Body Ownership . . 58--66 Fernanda Brandi and Burak Cizmeci and Eckehard Steinbach On the Perceptual Artifacts Introduced by Packet Losses on the Forward Channel of Haptic Telemanipulation Sessions . . 67--78 Gwénaël Changeon and Delphine Graeff and Margarita Anastassova and José Lozada Tactile Emotions: a Vibrotactile Tactile Gamepad for Transmitting Emotional Messages to Children with Autism . . . . 79--90 George H. Van Doorn and Vladimir Dubaj and Dianne B. Wuillemin and Barry L. Richardson Cognitive Load Can Explain Differences in Active and Passive Touch . . . . . . 91--102 Satoshi Endo and Geoff Pegman and Mark Burgin and Tarek Toumi and Alan M. Wing Haptics in Between-Person Object Transfer . . . . . . . . . . . . . . . . 103--111 Ignacio Galiana and Jose Breñosa and Jorge Barrio and Manuel Ferre New Control Architecture Based on PXI for a $3$-Finger Haptic Device Applied to Virtual Manipulation . . . . . . . . 112--123 Laurent George and Maud Marchal and Loeiz Glondu and Anatole Lécuyer Combining Brain-Computer Interfaces and Haptics: Detecting Mental Workload to Adapt Haptic Assistance . . . . . . . . 124--135 Christos Giachritsis and Gary Randall and Samuel Roselier Development of Intuitive Tactile Navigational Patterns . . . . . . . . . 136--147 Luca Greci and Marco Sacco and Nicola Cau and Flavia Buonanno FootGlove: a Haptic Device Supporting the Customer in the Choice of the Best Fitting Shoes . . . . . . . . . . . . . 148--159 Netta Gurari and Jason Wheeler and Amy Shelton and Allison M. Okamura Discrimination of Springs with Vision, Proprioception, and Artificial Skin Stretch Cues . . . . . . . . . . . . . . 160--172 Taku Hachisu and Michi Sato and Shogo Fukushima and Hiroyuki Kajimoto Augmentation of Material Property by Modulating Vibration Resulting from Tapping . . . . . . . . . . . . . . . . 173--180 Felix G. Hamza-Lup and William H. Baird Feel the Static and Kinetic Friction . . 181--192 Christian Hatzfeld and Roland Werthschützky Mechanical Impedance as Coupling Parameter of Force and Deflection Perception: Experimental Evaluation . . 193--204 Koichi Hirota and Kazuyoshi Tagawa Acquisition of Elastically Deformable Object Model Based on Measurement . . . 205--217 Charles Hudin and José Lozada and Michael Wiertlewski and Vincent Hayward Tradeoffs in the Application of Time-Reversed Acoustics to Tactile Stimulation . . . . . . . . . . . . . . 218--226 Anonymous Front Matter . . . . . . . . . . . . . . ??
Jalal Awed and Imad H. Elhajj and Nadiya Slobodenyuk Haptic Force Perception in Bimanual Manipulation . . . . . . . . . . . . . . 1--6 Wouter M. Bergmann Tiest and Connie Lyklema and Astrid M. L. Kappers Investigating the Effect of Area of Stimulation on Cutaneous and Proprioceptive Weight Perception . . . . 7--12 Sandra Coelho and Miguel V. Correia Rediscovering the Haptic Sense through Crossroads of Art and Design Research 13--18 Nienke B. Debats and Idsart Kingma and Peter J. Beek and Jeroen B. J. Smeets The Precision of ``Haptic'' Rod Length Perception Is Reduced by Lack of Visual Precision . . . . . . . . . . . . . . . 19--24 George H. Van Doorn and Barry L. Richardson and Mark A. Symmons and Jacqui L. Howell Cutaneous Inputs Yield Judgments of Line Length That Are Equal to, or Better Than, Those Based on Kinesthetic Inputs 25--30 Marieke C. W. van der Graaff and Eli Brenner and Jeroen B. J. Smeets Is the Curvature in Hand Movements to Haptic Targets in the Mid Sagittal Plane Caused by a Misjudgment in Direction? 31--36 Florimond Guéniat and Yoren Gaffary and Luc Pastur and Ammi Mehdi Haptic Stimulus for the Discrimination between Intrinsic Properties of Dynamic Systems . . . . . . . . . . . . . . . . 37--42 Christian Hatzfeld and Roland Werthschützky Just Noticeable Differences of Low-Intensity Vibrotactile Forces at the Fingertip . . . . . . . . . . . . . . . 43--48 Kiuk Gwak and Jun-Cheol Park and Dae-Shik Kim A Novel Stimulation Method Based on a Neuromorphic Mechanoreceptor Model for Haptic Illusion . . . . . . . . . . . . 49--54 Jacqui L. Howell and Mark A. Symmons and George H. Van Doorn The Misperception of Length in Vision, Haptics and Audition . . . . . . . . . . 55--60 Inwook Hwang and Seungmoon Choi Effect of Mechanical Ground on the Vibrotactile Perceived Intensity of a Handheld Object . . . . . . . . . . . . 61--66 Hiroyuki Kajimoto Design of Cylindrical Whole-Hand Haptic Interface Using Electrocutaneous Display 67--72 Tuuli Keskinen and Markku Turunen and Roope Raisamo and Grigori Evreinov and Eemeli Haverinen Utilizing Haptic Feedback in Drill Rigs 73--78 Scinob Kuroki and Junji Watanabe and Shin'ya Nishida Dissociation of Vibrotactile Frequency Discrimination Performances for Supra-Threshold and Near-Threshold Vibrations . . . . . . . . . . . . . . . 79--84 Chang-Gyu Lee and Ian Oakley and Jeha Ryu Exploring the Impact of Visual-Haptic Registration Accuracy in Augmented Reality . . . . . . . . . . . . . . . . 85--90 Jong-uk Lee and Jeong-Mook Lim and Heesook Shin and Ki-Uk Kyung SHIFT: Interactive Smartphone Bumper Case . . . . . . . . . . . . . . . . . . 91--96 Takuya Nakano and Shota Saji and Yasuyuki Yanagida Indicating Wind Direction Using a Fan-Based Wind Display . . . . . . . . . 97--102 Ryuta Okazaki and Hiroyuki Kajimoto and Vincent Hayward Vibrotactile Stimulation Can Affect Auditory Loudness: a Pilot Study . . . . 103--108 Frederik Wilhelm Jozef Olierook and Mathias Funk Hands Reaching Out of Dreamland: a Haptic Peripheral Alarm Clock . . . . . 109--114 Kensuke Oshima and Shigeru Ichihara How Finger Movement Speed Affects Braille Pattern Recognition . . . . . . 115--120 Anonymous Front Matter . . . . . . . . . . . . . . ??
Noreen Kamal and Sidney Fels Determining the Determinants of Health Behaviour Change through an Online Social Network . . . . . . . . . . . . . 1--12 Winslow Burleson and Naomi Newman and Ryan Brotman Empowering Independent Living for People with Autism: Designing Supportive, Low-Cost, Interactive E-Health Environments . . . . . . . . . . . . . . 13--30 Samir Chatterjee and Jongbok Byun Persuasive Sensing: a Novel In-Home Monitoring Technology to Assist Elderly Adult Diabetic Patients . . . . . . . . 31--42 Luca Chittaro and Riccardo Sioni Turning the Classic Snake Mobile Game into a Location--Based Exergame that Encourages Walking . . . . . . . . . . . 43--54 Matthijs Jan Zwinderman and Azadeh Shirzad Phone Row: a Smartphone Game Designed to Persuade People to Engage in Moderate-Intensity Physical Activity . . 55--66 Morten Aagaard and Peter Òhrstròm Developing Persuasive Technology for ASD Challenged Teenagers . . . . . . . . . . 67--78 Sandy Schumann and Olivier Klein and Karen Douglas Talk to Act: How Internet Use Empowers Users to Participate in Collective Actions Offline . . . . . . . . . . . . 79--89 Cees Midden and Jaap Ham The Illusion of Agency: The Influence of the Agency of an Artificial Agent on Its Persuasive Power . . . . . . . . . . . . 90--99 Luciano Gamberini and Anna Spagnolli Tailoring Feedback to Users' Actions in a Persuasive Game for Household Electricity Conservation . . . . . . . . 100--111 S. Shyam Sundar and Saraswathi Bellur Motivational Technologies: a Theoretical Framework for Designing Preventive Health Applications . . . . . . . . . . 112--122 Jilles Smids The Voluntariness of Persuasive Technology . . . . . . . . . . . . . . . 123--132 Lars Müller and Verónica Rivera-Pelayo Persuasion and Reflective Learning: Closing the Feedback Loop . . . . . . . 133--144 Thijs Waardenburg and Robbert Winkel Normative Social Influence in Persuasive Technology: Intensity versus Effectiveness . . . . . . . . . . . . . 145--156 Filip Drozd and Tuomas Lehto Exploring Perceived Persuasiveness of a Behavior Change Support System: a Structural Model . . . . . . . . . . . . 157--168 Nupur Bhatnagar and Abhishek Sinha Biometric Monitoring as a Persuasive Technology: Ensuring Patients Visit Health Centers in India's Slums . . . . 169--180 Susan Ferebee and James Davis The Neural Persuasion Model: Aligning Neural Readiness, Perceived Need, and Intervention Strategies . . . . . . . . 181--192 Isaac Wiafe and Muna M. Alhammad Analyzing the Persuasion Context of the Persuasive Systems Design Model with the $3$D-RAB Model . . . . . . . . . . . . . 193--202 Rita Orji and Regan L. Mandryk Towards a Data-Driven Approach to Intervention Design: a Predictive Path Model of Healthy Eating Determinants . . 203--214 Luca Chittaro Passengers' Safety in Aircraft Evacuations: Employing Serious Games to Educate and Persuade . . . . . . . . . . 215--226 Ingo Pribik and Alexander Felfernig Towards Persuasive Technology for Software Development Environments: An Empirical Study . . . . . . . . . . . . 227--238 Anonymous Front Matter . . . . . . . . . . . . . . ??
Bryan He Optimal Binary Representation of Mosaic Floorplans and Baxter Permutations . . . 1--12 Jiun-Jie Wang and Xin He Succinct Strictly Convex Greedy Drawing of $3$-Connected Plane Graphs . . . . . 13--25 Longcheng Liu and Yong Chen and Biao Wu and Enyu Yao Weighted Inverse Minimum Cut Problem under the Sum-Type Hamming Distance . . 26--35 Chenglin Fan and Jun Luo and Wencheng Wang Voronoi Diagram with Visual Restriction 36--46 Xuehou Tan and Bo Jiang Minimization of the Maximum Distance between the Two Guards Patrolling a Polygonal Region . . . . . . . . . . . . 47--57 Minghui Jiang On Covering Points with Minimum Turns 58--69 Xia Hua On Envy-Free Pareto Efficient Pricing 70--81 Yong Zhang and Francis Y. L. Chin Online Pricing for Multi-type of Items 82--92 Yiwei Jiang and Zewei Weng and Jueliang Hu Algorithms with Limited Number of Preemptions for Scheduling on Parallel Machines . . . . . . . . . . . . . . . . 93--104 Danny Z. Chen and Xiaomin Liu and Haitao Wang Computing Maximum Non-crossing Matching in Convex Bipartite Graphs . . . . . . . 105--116 Kazuhide Nishikawa and Takao Nishizeki Algorithms for Bandwidth Consecutive Multicolorings of Graphs . . . . . . . . 117--128 Yu Song and Tian Liu and Ke Xu Independent Domination on Tree Convex Bipartite Graphs . . . . . . . . . . . . 129--138 Deshi Ye and Lili Mei On-Line Scheduling of Parallel Jobs in Heterogeneous Multiple Clusters . . . . 139--148 Evripidis Bampis and Dimitrios Letsios On Multiprocessor Temperature-Aware Scheduling Problems . . . . . . . . . . 149--160 Yan Lan and Xin Chen and Ning Ding and György Dósa Online Minimum Makespan Scheduling with a Buffer . . . . . . . . . . . . . . . . 161--171 Richard Beigel and Bin Fu A Dense Hierarchy of Sublinear Time Approximation Schemes for Bin Packing 172--181 Bin Fu Multivariate Polynomial Integration and Differentiation Are Polynomial Time Inapproximable Unless P=NP . . . . . . . 182--191 Bangsheng Tang Some Remarks on the Incompressibility of Width-Parameterized SAT Instances . . . 192--198 Jianer Chen and Henning Fernau and Peter Shaw Kernels for Packing and Covering Problems . . . . . . . . . . . . . . . . 199--211 Junping Zhou and Minghao Yin The Worst-Case Upper Bound for Exact $3$-Satisfiability with the Number of Clauses as the Parameter . . . . . . . . 212--223 Anonymous Front Matter . . . . . . . . . . . . . . ??
Dmytro Babik and Lakshmi S. Iyer and Eric W. Ford Towards a Comprehensive Online Peer Assessment System . . . . . . . . . . . 1--8 Anders Hjalmarsson and Daniel Rudmark Designing Digital Innovation Contests 9--27 Bala Iyer and George Wyner Evaluating APIs: a Call for Design Science Research . . . . . . . . . . . . 28--35 Arvind Karunakaran and Sandeep Purao Designing for Recombination: Process Design through Template Combination . . 36--51 Heikki Lempinen and Matti Rossi and Virpi Kristiina Tuunainen Design Principles for Inter-Organizational Systems Development --- Case Hansel . . . . . . . . . . . . 52--65 Lysanne Lessard and Eric Yu Using Design Science Research to Develop a Modeling Technique for Service Design 66--77 Amy Van Looy and Manu De Backer and Geert Poels Towards a Decision Tool for Choosing a Business Process Maturity Model . . . . 78--87 Wendy Lucas and Tamara Babaian Implementing Design Principles for Collaborative ERP Systems . . . . . . . 88--107 Martin Meyer and Markus Helfert and Brian Donnellan and Jim Kenneally Applying Design Science Research for Enterprise Architecture Business Value Assessments . . . . . . . . . . . . . . 108--121 Sandeep Purao and Narasimha Bolloju and Chuan Hoo Tan Designing-in-the-Large: Combining Local Perspectives to Generate Enterprise-Wide Integration Solutions . . . . . . . . . 122--138 Rohit Valecha and Raj Sharman and Raghav Rao and Shambhu Upadhyaya Emergency Response System Design: An Examination of Emergency Communication Messages . . . . . . . . . . . . . . . . 139--146 Upkar Varshney An Approach for Smart Artifacts for Mobile Advertising . . . . . . . . . . . 147--151 Matthias Voigt and Björn Niehaves and Jörg Becker Towards a Unified Design Theory for Creativity Support Systems . . . . . . . 152--173 M. Lisa Yeo and Ofer Arazy What Makes Corporate Wikis Work? Wiki Affordances and Their Suitability for Corporate Knowledge Work . . . . . . . . 174--190 Andreas Drechsler Design Science as Design of Social Systems --- Implications for Information Systems Research . . . . . . . . . . . . 191--205 Wolfgang Maass and Sabine Janzen Towards Design Engineering of Ubiquitous Information Systems . . . . . . . . . . 206--219 Roel Wieringa and Ay\cse Moralì Technical Action Research as a Validation Method in Information Systems Design Science . . . . . . . . . . . . . 220--238 Arjan Knol and Henk Sol and Johan van Wamelen Decision Enhancement for Sourcing with Shared Service Centres in the Dutch Government . . . . . . . . . . . . . . . 239--255 Jan Pries-Heje and Lene Pries-Heje Designing a Framework for Virtual Management and Team Building . . . . . . 256--270 António Rito Silva and Michael Rosemann Integrating Organisational Design with IT Design . . . . . . . . . . . . . . . 271--286 Anonymous Front Matter . . . . . . . . . . . . . . ??
John Hopcroft On the Impact of Turing Machines . . . . 1--2 S. Barry Cooper From Turing Machine to Morphogenesis: Forming and Informing Computation . . . 3--10 Richard M. Karp Theory of Computation as an Enabling Tool for the Sciences . . . . . . . . . 11--11 Deyi Li and Liwei Huang Interaction and Collective Intelligence on the Internet . . . . . . . . . . . . 12--22 Butler Lampson What Computers Do: Model, Connect, Engage . . . . . . . . . . . . . . . . . 23--26 Wei Li R-Calculus: a Logical Inference System for Scientific Discovery . . . . . . . . 27--27 Andrew Chi-Chih Yao Quantum Computing: a Great Science in the Making . . . . . . . . . . . . . . . 28--28 Jon Kleinberg The Convergence of Social and Technological Networks . . . . . . . . . 29--29 Yicheng Pan Principles of Network Computing . . . . 30--39 Pan Peng The Small Community Phenomenon in Networks: Models, Algorithms and Applications . . . . . . . . . . . . . . 40--49 A. Bonato and D. Mitsche and P. Pra\lat Vertex-Pursuit in Hierarchical Social Networks . . . . . . . . . . . . . . . . 50--60 Zipeng Zhang and Xinyu Feng and Ming Fu and Zhong Shao and Yong Li A Structural Approach to Prophecy Variables . . . . . . . . . . . . . . . 61--71 Shuling Wang and Naijun Zhan and Dimitar Guelev An Assume/Guarantee Based Compositional Calculus for Hybrid CSP . . . . . . . . 72--83 Ernst-Rüdiger Olderog Automatic Verification of Real-Time Systems with Rich Data: An Overview . . 84--93 Deepak Kapur Program Analysis Using Quantifier-Elimination Heuristics . . . 94--108 Albert F. Lawrence and Séastien Phan and Mark Ellisman Electron Tomography and Multiscale Biology . . . . . . . . . . . . . . . . 109--130 Hiro Ito and Susumu Kiyoshima and Yuichi Yoshida Constant-Time Approximation Algorithms for the Knapsack Problem . . . . . . . . 131--142 Jingguo Bi and Qi Cheng Lower Bounds of Shortest Vector Lengths in Random NTRU Lattices . . . . . . . . 143--155 Michal \vCerný and Miroslav Rada Polynomial Time Construction of Ellipsoidal Approximations of Zonotopes Given by Generator Descriptions . . . . 156--163 Alexandru Popa and Prudence W. H. Wong and Fencol C. C. Yung Hardness and Approximation of the Asynchronous Border Minimization Problem 164--176 Anonymous Front Matter . . . . . . . . . . . . . . ??
Paola Flocchini Distributed Algorithms by Forgetful Mobile Robots . . . . . . . . . . . . . 1--1 Giuseppe Persiano Stability and Metastability of the Logit Dynamics of Strategic Games . . . . . . 2--2 Jorge Urrutia Art Galleries, $k$-modems, and $k$-convexity . . . . . . . . . . . . . 3--3 Terry Anderson and Therese Biedl The Vulcan Game of Kal-Toh: Finding or Making Triconnected Planar Subgraphs . . 4--15 Esther M. Arkin and Alon Efrat and George Hart and Irina Kostitsyna Scandinavian Thins on Top of Cake: On the Smallest One-Size-Fits-All Box . . . 16--27 Michael A. Bender and Ritwik Bose and Rezaul Chowdhury and Samuel McCauley The Kissing Problem: How to End a Gathering When Everyone Kisses Everyone Else Goodbye . . . . . . . . . . . . . . 28--39 Till Bruckdorfer and Michael Kaufmann Mad at Edge Crossings? Break the Edges! 40--50 Leo Brueggeman and Michael Fellows and Rudolf Fleischer and Martin Lackner Train Marshalling Is Fixed Parameter Tractable . . . . . . . . . . . . . . . 51--56 Sarah Cannon and Mashhood Ishaque and Csaba D. Tóth Conflict-Free Graph Orientations with Parity Constraints . . . . . . . . . . . 57--68 Ferdinando Cicalese The Multi-interval Ulam--Rényi Game . . . 69--80 Erik D. Demaine and Martin L. Demaine and Yair N. Minsky Picture-Hanging Puzzles . . . . . . . . 81--93 Stefan Dobrev and Lata Narayanan and Jaroslav Opatrny Optimal Sensor Networks for Area Monitoring Using Rotating and Beam Sensors . . . . . . . . . . . . . . . . 94--106 Swan Dubois and Sébastien Tixeuil and Nini Zhu The Byzantine Brides Problem . . . . . . 107--118 Amr Elmasry and Jyrki Katajainen Lean Programs, Branch Mispredictions, and Sorting . . . . . . . . . . . . . . 119--130 Jakob Engel and Markus Holzer and Oliver Ruepp and Frank Sehnke On Computer Integrated Rationalized Crossword Puzzle Manufacturing . . . . . 131--141 David Eppstein Solving Single-Digit Sudoku Subproblems 142--153 Paola Flocchini and Matthew Kellett and Peter C. Mason and Nicola Santoro Finding Good Coffee in Paris . . . . . . 154--165 Fedor V. Fomin and Frédéric Giroire and Alain Jean-Marie and Dorian Mazauric To Satisfy Impatient Web Surfers Is Hard 166--176 Fedor V. Fomin and Pinar Heggernes and Erik Jan van Leeuwen Making Life Easier for Firefighters . . 177--188 Martin Fürer Counting Perfect Matchings in Graphs of Degree 3 . . . . . . . . . . . . . . . . 189--197 Anonymous Front Matter . . . . . . . . . . . . . . ??
HyunYong Lee and Akihiro Nakao Efficient User-Assisted Content Distribution over Information-Centric Network . . . . . . . . . . . . . . . . 1--12 Konstantinos V. Katsaros and Nikos Fotiou and Xenofon Vasilakos and Christopher N. Ververidis On Inter-Domain Name Resolution for Information-Centric Networks . . . . . . 13--26 Wei Koong Chai and Diliang He and Ioannis Psaras and George Pavlou Cache ``Less for More'' in Information-Centric Networks . . . . . . 27--40 Shuo Guo and Haiyong Xie and Guangyu Shi Collaborative Forwarding and Caching in Content Centric Networks . . . . . . . . 41--55 Norbert Blenn and Christian Doerr and Bas Van Kester and Piet Van Mieghem Crawling and Detecting Community Structure in Online Social Networks Using Local Information . . . . . . . . 56--67 Jin Jiang and Claudio E. Casetti Distributed Content Backup and Sharing Using Social Information . . . . . . . . 68--81 Nuno Apolónia and Paulo Ferreira and Luís Veiga Trans-Social Networks for Distributed Processing . . . . . . . . . . . . . . . 82--96 Norbert Blenn and Kassandra Charalampidou and Christian Doerr Context-Sensitive Sentiment Classification of Short Colloquial Text 97--108 Marcelo F. Vasconcelos and Ronaldo M. Salles Resilience in Computer Network Management . . . . . . . . . . . . . . . 109--120 Béla Genge and Christos Siaterlis An Experimental Study on the Impact of Network Segmentation to the Resilience of Physical Processes . . . . . . . . . 121--134 Udi Ben-Porat and Anat Bremler-Barr and Hanoch Levy and Bernhard Plattner On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks . . . . 135--148 Cong Li and Huijuan Wang and Piet Van Mieghem Degree and Principal Eigenvectors in Complex Networks . . . . . . . . . . . . 149--160 Isil Burcu Barla and Dominic A. Schupke and Georg Carle Resilient Virtual Network Design for End-to-End Cloud Services . . . . . . . 161--174 Nico Janssens and Xueli An and Koen Daenen and Claudio Forlivesi Dynamic Scaling of Call-Stateful SIP Services in the Cloud . . . . . . . . . 175--189 Vijay Mann and Akanksha Gupta and Partha Dutta and Anilkumar Vishnoi and Parantapa Bhattacharya Remedy: Network-Aware Steady State VM Management for Data Centers . . . . . . 190--204 Junjie Liu and Yingke Xie and Gaogang Xie and Layong Luo and Fuxing Zhang and Xiaolong Wu Building a Flexible and Scalable Virtual Hardware Data Plane . . . . . . . . . . 205--216 Hung Quoc Vo and Olav Lysne and Amund Kvalbein Permutation Routing for Increased Robustness in IP Networks . . . . . . . 217--231 Meng Shen and Hongying Liu and Ke Xu and Ning Wang and Yifeng Zhong Routing On Demand: Toward the Energy-Aware Traffic Engineering with OSPF . . . . . . . . . . . . . . . . . . 232--246 Frédéric Giroire and Joanna Moulierac and Truong Khoa Phan and Frédéric Roudaut Minimization of Network Power Consumption with Redundancy Elimination 247--258 Yang Xiang and Zhiliang Wang and Jianping Wu and Xingang Shi and Xia Yin Sign What You Really Care about --- Secure BGP AS Paths Efficiently . . . . 259--273 Anonymous Front Matter . . . . . . . . . . . . . . ??
Julius Rückert and Osama Abboud and Thomas Zinner and Ralf Steinmetz and David Hausheer Quality Adaptation in P2P Video Streaming Based on Objective QoE Metrics 1--14 Fabio V. Hecht and Thomas Bocek and Flávio Roberto Santos and Burkhard Stiller Playback Policies for Live and On-Demand P2P Video Streaming . . . . . . . . . . 15--28 Roberto Roverso and Sameh El-Ansary and Seif Haridi SmoothCache: HTTP-Live Streaming Goes Peer-to-Peer . . . . . . . . . . . . . . 29--43 K.-W. Hwang and D. Applegate and A. Archer and V. Gopalakrishnan and S. Lee and V. Misra Leveraging Video Viewing Patterns for Optimal Content Placement . . . . . . . 44--58 Haiyang Wang and Feng Wang and Jiangchuan Liu and Ke Xu Enhancing Traffic Locality in BitTorrent via Shared Trackers . . . . . . . . . . 59--70 Yong Zhao and Zhibin Zhang and Ting He and Alex X. Liu and Li Guo and Binxing Fang A Task-Based Model for the Lifespan of Peer-to-Peer Swarms . . . . . . . . . . 71--83 Glauber D. Gonçalves and Anna Guimarães and Alex Borges Vieira and Ítalo Cunha Using Centrality Metrics to Predict Peer Cooperation in Live Streaming Applications . . . . . . . . . . . . . . 84--96 Seungbae Kim and Jinyoung Han and Taejoong Chung and Hyun-chul Kim and Ted ``Taekyoung'' Kwon Content Publishing and Downloading Practice in BitTorrent . . . . . . . . . 97--110 Jakub Mikians and Amogh Dhamdhere and Constantine Dovrolis and Pere Barlet-Ros Towards a Statistical Characterization of the Interdomain Traffic Matrix . . . 111--123 Yujing Liu and Xiapu Luo and Rocky K. C. Chang and Jinshu Su Characterizing Inter-domain Rerouting after Japan Earthquake . . . . . . . . . 124--135 Amogh Dhamdhere and Himalatha Cherukuru and Constantine Dovrolis and Kc Claffy Measuring the Evolution of Internet Peering Agreements . . . . . . . . . . . 136--148 Syed Hasan and Sergey Gorinsky Obscure Giants: Detecting the Provider-Free ASes . . . . . . . . . . . 149--160 Stefan Hommes and Radu State and Thomas Engel Detecting Stealthy Backdoors with Association Rule Mining . . . . . . . . 161--171 Zichao Yang and John C. S. Lui Security Adoption in Heterogeneous Networks: the Influence of Cyber-Insurance Market . . . . . . . . . 172--183 Yves Igor Jerschow and Martin Mauve Secure Client Puzzles Based on Random Beacons . . . . . . . . . . . . . . . . 184--197 Mentari Djatmiko and Mathieu Cunche and Roksana Boreli and Aruna Seneviratne Heterogeneous Secure Multi-Party Computation . . . . . . . . . . . . . . 198--210 Tania Jiménez and Yezekael Hayel and Eitan Altman Competition in Access to Content . . . . 211--222 Raul Landa and Eleni Mykoniati and Richard G. Clegg and David Griffin and Miguel Rio Modelling the Tradeoffs in Overlay-ISP Cooperation . . . . . . . . . . . . . . 223--237 Dimitra Gkorou and Tamás Vinkó and Nitin Chiluka and Johan Pouwelse and Dick Epema Reducing the History in Decentralized Interaction-Based Reputation Systems . . 238--251 Isabel Amigo and Pablo Belzarena and Sandrine Vaton On the Problem of Revenue Sharing in Multi-domain Federations . . . . . . . . 252--264 Anonymous Front Matter . . . . . . . . . . . . . . ??
Huaizhou Shi and R. Venkatesha Prasad and Vijay S. Rao and I. G. M. M. Niemegeers A Fairness Model for Resource Allocation in Wireless Networks . . . . . . . . . . 1--9 Vincenzo Ciancaglini and Luigi Liquori and Giang Ngo Hoang and Petar Maksimovi\'c An Extension and Cooperation Mechanism for Heterogeneous Overlay Networks . . . 10--18 Yong Xiao and Luiz A. DaSilva Dynamic Pricing Coalitional Game for Cognitive Radio Networks . . . . . . . . 19--26 Dario Sabella and Marco Caretti and William Tomaselli and Valerio Palestini and Bruno Cendón Evaluation of ON-OFF Schemes and Linear Prediction Methods for Increasing Energy Efficiency in Mobile Broadband Networks 27--34 Javier Martín-Hernández and Christian Doerr and Johannes Lessmann and Marcus Schöller Challenge-Aware Traffic Protection in Wireless Mobile Backhaul Networks . . . 35--42 Mohtasim Abbassi and Shahbaz Khan and M. Rahman A Distributed Signaling Fast Mobile IPv6 Scheme for Next Generation Heterogeneous IP Networks . . . . . . . . . . . . . . 43--51 António Serrador and Luís M. Correia Energy Efficiency Gains Using VHOs in Heterogeneous Networks . . . . . . . . . 52--62 Xavier Misseri and Ivan Gojmerac and Jean-Louis Rougier Inter-Domain Route Diversity for the Internet . . . . . . . . . . . . . . . . 63--71 Antonio Ghezzi A Proposal of Business Model Design Parameters for Future Internet Carriers 72--79 Mohamed Lamine Lamali and Dominique Barth and Johanne Cohen Reputation-Aware Learning for SLA Negotiation . . . . . . . . . . . . . . 80--88 Andreas Sackl and Patrick Zwickl and Peter Reichl From Quality of Experience to Willingness to Pay for Interconnection Service Quality . . . . . . . . . . . . 89--96 Patrick Zwickl and Peter Reichl An Instance-Based Approach for the Quantitative Assessment of Key Value Network Dependencies . . . . . . . . . . 97--104 Anand Raju and Vânia Gonçalves and Sven Lindmark and Pieter Ballon Evaluating Impacts of Oversubscription on Future Internet Business Models . . . 105--112 Eleni Agiatzidou and Costas Courcoubetis and Olivier Dugeon and Finn-Tore Johansen Inter-domain Coordination Models . . . . 113--120 Eitan Altman In Which Content to Specialize? A Game Theoretic Analysis . . . . . . . . . . . 121--125 Till Wollenberg Estimation of Expectable Network Quality in Wireless Mesh Networks . . . . . . . 126--132 Ondrej Krejcar Development of Localization Module for Various Smart Devices Platforms . . . . 133--138 Marek Dvorsky and Libor Michalek and Pavel Moravec and Roman Sebesta Improved GSM-Based Localization by Incorporating Secondary Network Characteristics . . . . . . . . . . . . 139--144 Ivan Zelinka and Donald Davendra and Lenka Skanderova Visualization of Complex Networks Dynamics: Case Study . . . . . . . . . . 145--150 Hakan Kavlak and Hakki Ilk PCI Planning Strategies for Long Term Evolution Networks . . . . . . . . . . . 151--156 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Isra Al-Turaiki and Ghada Badr and Hassan Mathkour Trie-based Apriori Motif Discovery Approach . . . . . . . . . . . . . . . . 1--12 Laurent Bulteau and Minghui Jiang Inapproximability of (1,2)-Exemplar Distance . . . . . . . . . . . . . . . . 13--23 Daniele Catanzaro and Martine Labbé A Mixed Integer Programming Model for the Parsimonious Loss of Heterozygosity Problem . . . . . . . . . . . . . . . . 24--35 Xi Chen and Chen Wang and Ayesha N. Shajahan Reconstruction of Transcription Regulatory Networks by Stability-Based Network Component Analysis . . . . . . . 36--47 Yann Christinat and Bernard M. E. Moret A Transcript Perspective on Evolution 48--59 Ralph W. Crosby and Tiffani L. Williams A Fast Algorithm for Computing the Quartet Distance for Large Sets of Evolutionary Trees . . . . . . . . . . . 60--71 Peter Damaschke and Leonid Molokov Error Propagation in Sparse Linear Systems with Peptide-Protein Incidence Matrices . . . . . . . . . . . . . . . . 72--83 Bhaskar DasGupta Models and Algorithmic Tools for Computational Processes in Cellular Biology: Recent Developments and Future Directions . . . . . . . . . . . . . . . 84--86 Akshay Deepak and Jianrong Dong Identifying Rogue Taxa through Reduced Consensus: NP-Hardness and Exact Algorithms . . . . . . . . . . . . . . . 87--98 Cynthia J. Gibas Analytics Approaches for the Era of 10,000* Genomes *and Counting . . . . . 99--101 Pawe\l Górecki and J. Gordon Burleigh GTP Supertrees from Unrooted Gene Trees: Linear Time Algorithms for NNI Based Local Searches . . . . . . . . . . . . . 102--114 Pawe\l Górecki and Oliver Eulenstein A Robinson--Foulds Measure to Compare Unrooted Trees with Rooted Trees . . . . 115--126 Fei Guo and Shuai Cheng Li and Lusheng Wang P-Binder: a System for the Protein-Protein Binding Sites Identification . . . . . . . . . . . . . 127--138 Bonnie Kirkpatrick Non-identifiable Pedigrees and a Bayesian Solution . . . . . . . . . . . 139--152 Juntao Li and Kwok Pui Choi Iterative Piecewise Linear Regression to Accurately Assess Statistical Significance in Batch Confounded Differential Expression Analysis . . . . 153--164 Si Li and Kwok Pui Choi and Taoyang Wu and Louxin Zhang Reconstruction of Network Evolutionary History from Extant Network Topology and Duplication History . . . . . . . . . . 165--176 Victor Missirian and Isabelle Henry and Luca Comai POPE: Pipeline of Parentally-Biased Expression . . . . . . . . . . . . . . . 177--188 Ji\vrí Novák and David Hoksza and Jakub Loko\vc On Optimizing the Non-metric Similarity Search in Tandem Mass Spectra by Clustering . . . . . . . . . . . . . . . 189--200 A\"\ida Ouangraoua and Krister M. Swenson On the Comparison of Sets of Alternative Transcripts . . . . . . . . . . . . . . 201--212 Hyun Jung Park and Luay Nakhleh MURPAR: a Fast Heuristic for Inferring Parsimonious Phylogenetic Networks from Multiple Gene Trees . . . . . . . . . . 213--224 Anonymous Front Matter . . . . . . . . . . . . . . ??
Michael Codish Programming with Boolean Satisfaction 1--1 Tachio Terauchi Automated Verification of Higher-Order Functional Programs . . . . . . . . . . 2--2 Stephanie Weirich Dependently-Typed Programming in GHC . . 3--3 Beniamino Accattoli and Luca Paolini Call-by-Value Solvability, Revisited . . 4--16 Sergio Antoy and Arthur Peters Compiling a Functional Logic Language: The Basic Scheme . . . . . . . . . . . . 17--31 Zena M. Ariola and Paul Downen and Hugo Herbelin Classical Call-by-Need Sequent Calculi: The Unity of Semantic Artifacts . . . . 32--46 Dariusz Biernacki and Sergue\"\i Lenglet Normal Form Bisimulations for Delimited-Control Operators . . . . . . 47--61 Gerlof Bouma Real-Time Persistent Queues and Deques with Logic Variables (Declarative Pearl) 62--72 Rafael Caballero and Yolanda García-Ruiz Declarative Debugging of Wrong and Missing Answers for SQL Views . . . . . 73--87 Ignacio Castiñeiras and Fernando Sáenz-Pérez Improving the Performance of FD Constraint Solving in a CFLP System . . 88--103 Pablo Chico de Guzmán and Manuel Carro A General Implementation Framework for Tabled CLP . . . . . . . . . . . . . . . 104--119 Sonia Estévez-Martín and Jesús Correas Fernández Extending the $\mathcal{TOY}$ System with the ECL$^i$PS$^e$ Solver over Sets of Integers . . . . . . . . . . . . . . 120--135 Makoto Hamana Correct Looping Arrows from Cyclic Terms 136--150 Yoichi Hirai A Lambda Calculus for Gödel--Dummett Logic Capturing Waitfreedom . . . . . . 151--165 Oleg Kiselyov Iteratees . . . . . . . . . . . . . . . 166--181 Jael Kriener and Andy King Mutual Exclusion by Interpolation . . . 182--196 Oleg Lobachev Parallel Computation Skeletons with Premature Termination Property . . . . . 197--212 Akimasa Morihata Calculational Developments of New Parallel Algorithms for Size-Constrained Maximum-Sum Segment Problems . . . . . . 213--227 Kristoffer H. Rose and Lionel Villard and Naoto Sato A Data Flow Language for Hybrid Query and Programming Languages . . . . . . . 228--242 Neda Saeedloei and Gopal Gupta Coinductive Constraint Logic Programming 243--259 Anonymous Front Matter . . . . . . . . . . . . . . ??
Abraham Bernstein Semantic Web/LD at a Crossroads: Into the Garbage Can or To Theory? . . . . . 1--1 Jeroen van Grondelle New Audiences for Ontologies: Dealing with Complexity in Business Processes 2--2 Alon Halevy Bringing (Web) Databases to the Masses 3--3 Aleksander Ko\lcz Large Scale Learning at Twitter . . . . 4--4 Monica S. Lam Musubi: a Decentralized Mobile Social Web . . . . . . . . . . . . . . . . . . 5--5 Márta Nagy-Rothengass Data Value Chain in Europe . . . . . . . 6--6 Julius van de Laar Cutting through the Noise: How to Shape Public Perception, Frame the Debate and Effectively Engage Your Audience in the Digital Age . . . . . . . . . . . . . . 7--7 Olaf Hartig SPARQL for a Web of Linked Data: Semantics and Computability . . . . . . 8--23 Danica Damljanovic and Milan Stankovic and Philippe Laublet Linked Data-Based Concept Recommendation: Comparison of Different Methods in Open Innovation Scenario . . 24--38 Milan Stankovic and Matthew Rowe and Philippe Laublet Finding Co-solvers on Twitter, with a Little Help from Linked Data . . . . . . 39--55 Andreas Wagner and Thanh Tran Duc and Günter Ladwig and Andreas Harth and Rudi Studer Top- k Linked Data Query Processing . . 56--71 Audun Stolpe and Martin G. Skjæveland Preserving Information Content in RDF Using Bounded Homomorphisms . . . . . . 72--86 Christophe Guéret and Paul Groth and Claus Stadler and Jens Lehmann Assessing Linked Data Mappings Using Network Measures . . . . . . . . . . . . 87--102 Melike Sah and Vincent Wade A Novel Concept-Based Search for the Web of Data Using UMBEL and a Fuzzy Retrieval Model . . . . . . . . . . . . 103--118 Andriy Nikolov and Mathieu d'Aquin and Enrico Motta Unsupervised Learning of Link Discovery Configuration . . . . . . . . . . . . . 119--133 Uta Lösch and Stephan Bloehdorn and Achim Rettinger Graph Kernels for RDF Data . . . . . . . 134--148 Axel-Cyrille Ngonga Ngomo and Klaus Lyko EAGLE: Efficient Active Learning of Link Specifications Using Genetic Programming 149--163 Xueyan Jiang and Yi Huang and Maximilian Nickel and Volker Tresp Combining Information Extraction, Deductive Reasoning and Machine Learning for Relation Prediction . . . . . . . . 164--178 Isabel F. Cruz and Alessio Fabiani and Federico Caimi and Cosmin Stroe and Matteo Palmonari Automatic Configuration Selection Using Ontology Matching Task Profiling . . . . 179--194 Emilio Rubiera and Luis Polo and Diego Berrueta and Adil El Ghali TELIX: An RDF-Based Model for Linguistic Annotation . . . . . . . . . . . . . . . 195--209 Anonymous Front Matter . . . . . . . . . . . . . . ??
Thepparit Banditwattanawong From Web Cache to Cloud Cache . . . . . 1--15 Jianzong Wang and Yanjun Chen and Daniel Gmach and Changsheng Xie and Jiguang Wan and Rui Hua pCloud: An Adaptive I/O Resource Allocation Algorithm with Revenue Consideration over Public Clouds . . . . 16--30 JongBeom Lim and Kwang-Sik Chung and Sung-Ho Chin and Heon-Chang Yu A Gossip-Based Mutual Exclusion Algorithm for Cloud Environments . . . . 31--45 Zhuoran Qin and Jixian Zhang and Xuejie Zhang An Effective Partition Approach for Elastic Application Development on Mobile Cloud Computing . . . . . . . . . 46--53 Li Ruan and Huixiang Wang and Limin Xiao and Mingfa Zhu and Feibo Li Memory Virtualization for MIPS Processor Based Cloud Server . . . . . . . . . . . 54--63 Chao-Tung Yang and Wen-Chung Shih and Chih-Lin Huang Implementation of a Distributed Data Storage System with Resource Monitoring on Cloud Computing . . . . . . . . . . . 64--73 Leila Abidi and Christophe Cérin and Kais Klai Design, Verification and Prototyping the Next Generation of Desktop Grid Middleware . . . . . . . . . . . . . . . 74--88 Pingli Gu and Yanlei Shang and Junliang Chen and Bo Cheng and Yan Jiang A Request Multiplexing Method Based on Multiple Tenants in SaaS . . . . . . . . 89--97 Vishnuvardhan Mannava and T. Ramesh An Adaptive Design Pattern for Genetic Algorithm-Based Composition of Web Services in Autonomic Computing Systems Using SOA . . . . . . . . . . . . . . . 98--108 Weisen Pan and Shizhan Chen and Zhiyong Feng Service-Oriented Ontology and Its Evolution . . . . . . . . . . . . . . . 109--121 Yunji Liang and Xingshe Zhou and Zhiwen Yu and Bin Guo and Yue Yang Energy Efficient Activity Recognition Based on Low Resolution Accelerometer in Smart Phones . . . . . . . . . . . . . . 122--136 Jian Cao and Yihua Wu and Minglu Li Energy Efficient Allocation of Virtual Machines in Cloud Computing Environments Based on Demand Forecast . . . . . . . . 137--151 Ashok Chandrasekar and Karthik Chandrasekar and Harini Ramasatagopan and Rafica Abdul Rahim Energy Conservative Mobile Cloud Infrastructure . . . . . . . . . . . . . 152--161 Junghoon Lee and Gyung-Leen Park and Ho-Young Kwak and Jikwang Han Power-Constrained Actuator Coordination for Agricultural Sensor Networks . . . . 162--171 Jennifer Kim Design and Evaluation of Mobile Applications with Full and Partial Offloadings . . . . . . . . . . . . . . 172--182 Fu-Quan Zhang and Inwhee Joe A Cross-Layer Scheme to Improve TCP Performance in Wireless Multi-hop Networks . . . . . . . . . . . . . . . . 183--197 Jianxin Xue and Xiaoju Dong A Fully Abstract View for Local Cause Semantics . . . . . . . . . . . . . . . 198--209 Jignesh Kakkad and Nandan Parameswaran Efficiency Considerations in Policy Based Management in Resource Constrained Devices . . . . . . . . . . . . . . . . 210--220 Di Zheng and Jun Wang and Ke-rong Ben Agent Based Quality Management Middleware for Context-Aware Pervasive Applications . . . . . . . . . . . . . . 221--230 Yabing Cui and Chunming Hu and Tianyu Wo and Hanwen Wang A Virtual File System for Streaming Loading of Virtual Software on Windows NT . . . . . . . . . . . . . . . . . . . 231--243 Anonymous Front Matter . . . . . . . . . . . . . . ??
Wan-Shiou Yang and Shi-Xin Weng Application of the Ant Colony Optimization Algorithm to Competitive Viral Marketing . . . . . . . . . . . . 1--8 Nikolaos Pothitos and George Kastrinis and Panagiotis Stamatopoulos Constraint Propagation as the Core of Local Search . . . . . . . . . . . . . . 9--16 Ilianna Kollia and Kostas Rapantzikos and Giorgos Stamou and Andreas Stafylopatis Semantic Query Answering in Digital Libraries . . . . . . . . . . . . . . . 17--24 Spyridon Revithis and Georgios Tagalakis A SOM-Based Validation Approach to a Neural Circuit Theory of Autism . . . . 25--32 Vicky Panagiotopoulou and Iraklis Varlamis and Ion Androutsopoulos and George Tsatsaronis Word Sense Disambiguation as an Integer Linear Programming Problem . . . . . . . 33--40 Yiannis Kokkinos and Konstantinos Margaritis Parallelism, Localization and Chain Gradient Tuning Combinations for Fast Scalable Probabilistic Neural Networks in Data Mining Applications . . . . . . 41--48 Emmanouil Rigas and Georgios Meditskos and Nick Bassiliades SWRL2COOL: Object-Oriented Transformation of SWRL in the CLIPS Production Rule Engine . . . . . . . . . 49--56 Elias Zouboulidis and Sotiris Kotsiantis Forecasting Fraudulent Financial Statements with Committee of Cost-Sensitive Decision Tree Classifiers 57--64 Despina Deligianni and Sotiris Kotsiantis Forecasting Corporate Bankruptcy with an Ensemble of Classifiers . . . . . . . . 65--72 Grigorios Tzortzis and Aristidis Likas Greedy Unsupervised Multiple Kernel Learning . . . . . . . . . . . . . . . . 73--80 Angelos Mimis and Antonis Rovolis and Marianthi Stamou An AZP-ACO Method for Region-Building 81--89 Vasileios Gavriilidis and Anastasios Tefas Exploiting Quadratic Mutual Information for Discriminant Analysis . . . . . . . 90--97 Dimitris Kalles and Vassiliki Mperoukli and Andreas Papandreadis Emerge-Sort: Swarm Intelligence Sorting 98--105 Vassileios-Marios Anastassiou and Panagiotis Diamantopoulos and Stavros Vassos iThink: a Library for Classical Planning in Video-Games . . . . . . . . . . . . . 106--113 George Giannakopoulos and Vangelis Karkaletsis and George A. Vouros Detecting Human Features in Summaries --- Symbol Sequence Statistical Regularity . . . . . . . . . . . . . . . 114--123 Vincenzo Lagani and Ioannis Tsamardinos and Sofia Triantafillou Learning from Mixture of Experimental Data: a Constraint--Based Approach . . . 124--131 George A. Vouros Information Sharing and Searching via Collaborative Reinforcement Learning . . 132--140 George M. Santipantakis and George A. Vouros Distributed Instance Retrieval in $E^{DDL}_{HQ^+} \mathcal{SHIQ}$ Representation Framework . . . . . . . . 141--148 Damianos Galanopoulos and Christos Athanasiadis and Anastasios Tefas Evolutionary Optimization of a Neural Network Controller for Car Racing Simulation . . . . . . . . . . . . . . . 149--156 Elpiniki I. Papageorgiou and Panagiotis Oikonomou and Arthi Kannappan Bagged Nonlinear Hebbian Learning Algorithm for Fuzzy Cognitive Maps Working on Classification Tasks . . . . 157--164 Anonymous Front Matter . . . . . . . . . . . . . . ??
Ignacio Araya and Gilles Trombettoni A Contractor Based on Convex Interval Taylor . . . . . . . . . . . . . . . . . 1--16 Sébastien Bardin and Arnaud Gotlieb \tt fdcc: a Combined Approach for Solving Constraints over Finite Domains and Arrays . . . . . . . . . . . . . . . 17--33 David Bergman and Andre A. Cire Variable Ordering for the Application of BDDs to the Maximum Independent Set Problem . . . . . . . . . . . . . . . . 34--49 David Bergman and John N. Hooker Graph Coloring Facets from All-Different Systems . . . . . . . . . . . . . . . . 50--65 Jean-Charles Billaut and Emmanuel Hebrard Complete Characterization of Near-Optimal Sequences for the Two-Machine Flow Shop Scheduling Problem 66--80 Alessio Bonfietti and Michele Lombardi Global Cyclic Cumulative Constraint . . 81--96 Hadrien Cambazard and Deepak Mehta A Computational Geometry-Based Local Search Algorithm for Planar Location Problems . . . . . . . . . . . . . . . . 97--112 Gilles Chabert and Sophie Demassey The Conjunction of Interval A mong Constraints . . . . . . . . . . . . . . 113--128 Andre A. Cire and Elvin Coban Flow-Based Combinatorial Chance Constraints . . . . . . . . . . . . . . 129--145 Nicholas Downing and Thibaut Feydy Explaining Flow-Based Propagation . . . 146--162 Tommy Färnqvist Constraint Optimization Problems and Bounded Tree-Width Revisited . . . . . . 163--179 Daniel Fontaine and Laurent Michel A High Level Language for Solver Independent Model Manipulation and Generation of Hybrid Solvers . . . . . . 180--194 Graeme Gange and Peter J. Stuckey Explaining Propagators for $s$-DNNF Circuits . . . . . . . . . . . . . . . . 195--210 Stefan Heinz and J. Christopher Beck Reconsidering Mixed Integer Programming and MIP-Based Hybrids for Scheduling . . 211--227 Laurent Michel and Pascal Van Hentenryck Activity-Based Search for Black-Box Constraint Programming Solvers . . . . . 228--243 Yuri Malitsky and Meinolf Sellmann Instance-Specific Algorithm Configuration as a Method for Non-Model-Based Portfolio Generation . . 244--259 Florence Massen and Yves Deville Pheromone-Based Heuristic Column Generation for Vehicle Routing Problems with Black Box Feasibility . . . . . . . 260--274 Renaud Masson and Fabien Lehuédé and Olivier Péton Simple Temporal Problems in Route Scheduling for the Dial-a-Ride Problem with Transfers . . . . . . . . . . . . . 275--291 Quang Dung Pham and Yves Deville Solving the Longest Simple Path Problem with Constraint-Based Techniques . . . . 292--306 Aníbal Ponte and Luís Paquete and José R. Figueira On Beam Search for Multicriteria Combinatorial Optimization Problems . . 307--321 Anonymous Front Matter . . . . . . . . . . . . . . ??
Bhavani Thuraisingham and Vaibhav Khadilkar and Jyothsna Rachapalli and Tyrone Cadenhead Cloud-Centric Assured Information Sharing . . . . . . . . . . . . . . . . 1--26 Zahri Yunos and Rabiah Ahmad and Syahrir Mat Ali and Solahuddin Shamsuddin Illicit Activities and Terrorism in Cyberspace: An Exploratory Study in the Southeast Asian Region . . . . . . . . . 27--35 Weiping Chang and Yungchang Ku and Sinru Wu and Chaochang Chiu CybercrimeIR --- a Technological Perspective to Fight Cybercrime . . . . 36--44 Xin Xia and Xiaohu Yang and Chao Wu and Shanping Li and Linfeng Bao Information Credibility on Twitter in Emergency Situation . . . . . . . . . . 45--59 Chao Li and Jun Luo and Joshua Zhexue Huang and Jianping Fan Multi-Layer Network for Influence Propagation over Microblog . . . . . . . 60--72 Tim M. H. Li and Michael Chau and Paul W. C. Wong and Paul S. F. Yip A Hybrid System for Online Detection of Emotional Distress . . . . . . . . . . . 73--80 Viet H. Huynh and An N. T. Le Process Mining and Security: Visualization in Database Intrusion Detection . . . . . . . . . . . . . . . 81--95 Mustafa Amir Faisal and Zeyar Aung and John R. Williams and Abel Sanchez Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining . . . . . 96--111 Dan Bogdanov and Roman Jagomägis and Sven Laur A Universal Toolkit for Cryptographically Secure Privacy-Preserving Data Mining . . . . . 112--126 Jakub Valcik and Jan Sedmidubsky and Michal Balazia and Pavel Zezula Identifying Walk Cycles for Human Recognition . . . . . . . . . . . . . . 127--135 Yajuan Ling and Jing Yang and Liang He Chinese Organization Name Recognition Based on Multiple Features . . . . . . . 136--144 Ameera Jadalla and Ashraf Elnagar A Plagiarism Detection System for Arabic Text-Based Documents . . . . . . . . . . 145--153 Nurfadhlina Mohd Sharef and Khairul Azhar Kasmiran Examining Text Categorization Methods for Incidents Analysis . . . . . . . . . 154--161 Weiwei Sun and Bo Yang and Qiong Huang and Sha Ma and Ximing Li Multi-Committer Threshold Commitment Scheme from Lattice . . . . . . . . . . 162--175 Zhenhua Chen and Chunying Wu and Daoshun Wang and Shundong Li Conjunctive Keywords Searchable Encryption with Efficient Pairing, Constant Ciphertext and Short Trapdoor 176--189 Jia Yu and Shuguang Wang and Huawei Zhao and Minglei Shu and Jialiang Lv and Qiang Guo A Simultaneous Members Enrollment and Revocation Protocol for Secret Sharing Schemes . . . . . . . . . . . . . . . . 190--197 Biao Jiang and Eul Gyu Im and Yunmo Koo SaaS-Driven Botnets . . . . . . . . . . 198--206 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??