Last update:
Tue May 2 17:54:12 MDT 2023
Michael R. Berthold Towards Bisociative Knowledge Discovery 1--10
Werner Dubitzky and
Tobias Kötter and
Oliver Schmidt and
Michael R. Berthold Towards Creative Information Exploration
Based on Koestler's Concept of
Bisociation . . . . . . . . . . . . . . 11--32
Tobias Kötter and
Michael R. Berthold From Information Networks to Bisociative
Information Networks . . . . . . . . . . 33--50
Christian Borgelt Network Creation: Overview . . . . . . . 51--53
Marc Segond and
Christian Borgelt Selecting the Links in BisoNets
Generated from Document Collections . . 54--65
Matja\vz Jur\vsi\vc and
Borut Sluban and
Bojan Cestnik and
Miha Gr\vcar and
Nada Lavra\vc Bridging Concept Identification for
Constructing Information Networks from
Text Documents . . . . . . . . . . . . . 66--90
Teemu Hynönen and
Sébastien Mahler and
Hannu Toivonen Discovery of Novel Term Associations in
a Document Collection . . . . . . . . . 91--103
Marc Segond and
Christian Borgelt Cover Similarity Based Item Set Mining 104--121
Angelika Kimmig and
Esther Galbrun and
Hannu Toivonen and
Luc De Raedt Patterns and Logic for Reasoning with
Networks . . . . . . . . . . . . . . . . 122--143
Hannu Toivonen Network Analysis: Overview . . . . . . . 144--146
Anton Dries and
Siegfried Nijssen and
Luc De Raedt BiQL: a Query Language for Analyzing
Information Networks . . . . . . . . . . 147--165
Fang Zhou and
Sébastien Mahler and
Hannu Toivonen Review of BisoNet Abstraction Techniques 166--178
Fang Zhou and
Sébastien Mahler and
Hannu Toivonen Simplification of Networks by Edge
Pruning . . . . . . . . . . . . . . . . 179--198
Hannu Toivonen and
Fang Zhou and
Aleksi Hartikainen and
Atte Hinkka Network Compression by Node and Edge
Mergers . . . . . . . . . . . . . . . . 199--217
Laura Langohr and
Hannu Toivonen Finding Representative Nodes in
Probabilistic Graphs . . . . . . . . . . 218--229
Tobias Kötter and
Michael R. Berthold (Missing) Concept Discovery in
Heterogeneous Information Networks . . . 230--245
Kilian Thiel and
Michael R. Berthold Node Similarities from Spreading
Activation . . . . . . . . . . . . . . . 246--262
Uwe Nagel and
Kilian Thiel and
Tobias Kötter and
Dawid Pi\katek and
Michael R. Berthold Towards Discovery of Subgraph
Bisociations . . . . . . . . . . . . . . 263--284
Andreas Nürnberger Exploration: Overview . . . . . . . . . 285--286
Tatiana Gossen and
Marcus Nitsche and
Stefan Haun and
Andreas Nürnberger Data Exploration for Bisociative
Knowledge Discovery: a Brief Overview of
Tools and Evaluation Methods . . . . . . 287--300
Anonymous Front Matter . . . . . . . . . . . . . . ??
Ryan Woolrych and
Andrew Sixsmith Challenges of User-Centred Research in
the Development of Ambient Assisted
Living Systems . . . . . . . . . . . . . 1--8
Hen-I Yang and
Ryan Babbitt and
Johnny Wong and
Carl K. Chang A Framework for Service Morphing and
Heterogeneous Service Discovery in Smart
Environments . . . . . . . . . . . . . . 9--17
James Barrientos and
Jeffrey Soar and
Ying Su Impact Analysis of Assessment,
Consultation and Education Services to
Support the Adoption of Smart Home
Technologies, Innovations for Chronic
Disease Prevention and Solutions for
Independent Living . . . . . . . . . . . 18--25
Anne-Sophie Parent and
Nena Georgantzi and
Ilenia Gheno Ensuring a Fruitful Future to Innovation
and Research: Practical Guidance for the
Involvement of Older People in Research 26--34
Silvio Bonfiglio Fostering a Continuum of Care . . . . . 35--41
Peter Leijdekkers and
Valerie Gay User Adoption of Mobile Apps for Chronic
Disease Management: a Case Study Based
on myFitnessCompanion\reg . . . . . . . 42--49
Jon A. Sanford and
Patricia C. Griffiths and
Helen Hoenig Effects of In-home Tele-Rehabilitation
on Task Self-efficacy in Mobility
Impaired Adults . . . . . . . . . . . . 50--57
Hél\`ene Corriveau and
Michel Tousignant and
Sylvie Gosselin and
Patrick Boissy The Use of Telerehabilitation to Provide
an Exercise Program to Improve Balance
in a Post-stroke Population: Preliminary
Results . . . . . . . . . . . . . . . . 58--65
Hamid Mukhtar and
Arshad Ali and
Sungyoung Lee and
Djamel Bela\"\id Personalized Healthcare Self-management
Using Social Persuasion . . . . . . . . 66--73
Paolo Emilio Puddu and
John M. Morgan and
Concetta Torromeo and
Nick Curzen and
Michele Schiariti A Clinical Observational Study in the
CHIRON Project: Rationale and Expected
Results . . . . . . . . . . . . . . . . 74--82
Chao Chen and
Daqing Zhang and
Lin Sun and
Mossaab Hariz and
Yang Yuan Does Location Help Daily Activity
Recognition? . . . . . . . . . . . . . . 83--90
Antonio Andriatrimoson and
Nadia Abchiche and
Simon Galerne and
Etienne Colle A Robot-Environment Cooperation
Architecture for the Safety of Elderly
People at Home . . . . . . . . . . . . . 91--98
Carlos Cavero Barca and
Juan Mario Rodríguez and
Rosana Valle Soriano and
Alberto Rugnone Medical Expert Support Tool (MEST): a
Person-Centric Approach for Healthcare
Management . . . . . . . . . . . . . . . 99--106
Roberta Gazzarata and
Fabio Vergari and
Jan-Marc Verlinden and
Francesco Morandi and
Simone Naso The Integration of e-health into the
Clinical Workflow --- Electronic Health
Record and Standardization Efforts . . . 107--115
Cristiana Corsi and
Johan De Bie and
David Mortara and
Stefano Severi Innovative Solutions in Health
Monitoring at Home: The Real-Time
Assessment of Serum Potassium
Concentration from ECG . . . . . . . . . 116--123
Ian Cleland and
Chris Nugent and
Dewar Finlay and
William Burns and
Jennifer Bougourd Assessment of Custom Fitted Heart Rate
Sensing Garments whilst undertaking
Everyday Activities . . . . . . . . . . 124--131
Hongbo Ni and
Bessam Abdulrazak and
Daqing Zhang and
Shu Wu and
Xingshe Zhou and
Kejian Miao Multi-modal Non-intrusive Sleep Pattern
Recognition in Elder Assistive
Environment . . . . . . . . . . . . . . 132--139
Héctor Solar and
Erik Fernández and
Gennaro Tartarisco and
Giovanni Pioggia and
Bo\vzidara Cvetkovi\'c A Non Invasive, Wearable Sensor Platform
for Multi-parametric Remote Monitoring
in CHF Patients . . . . . . . . . . . . 140--147
Willy All\`egre and
Thomas Burger and
Pascal Berruet and
Jean-Yves Antoine A Non-intrusive Monitoring System for
Ambient Assisted Living Service Delivery 148--156
Andrew McDowell and
Mark Donnelly and
Chris Nugent and
Michael McGrath Passive Sleep Actigraphy: Evaluating a
Non-contact Method of Monitoring Sleep 157--164
Anonymous Front Matter . . . . . . . . . . . . . . ??
Petra Perner Learning an Ontology for Visual Tasks 1--16
Sara Colantonio and
Massimo Martinelli Ontology and Algorithms Integration for
Image Analysis . . . . . . . . . . . . . 17--29
Nikos Malandrakis and
Alexandros Potamianos EmotiWord: Affective Lexicon Creation
with Application to Interaction and
Multimedia Data . . . . . . . . . . . . 30--41
Pablo Ruiz and
Javier Mateos and
Rafael Molina A Bayesian Active Learning Framework for
a Two-Class Classification Problem . . . 42--53
Koray Kayabol and
Vladimir A. Krylov Unsupervised Classification of SAR
Images Using Hierarchical Agglomeration
and EM . . . . . . . . . . . . . . . . . 54--65
Tamás Szirányi and
Dániel Szolgay Geometrical and Textural Component
Separation with Adaptive Scale Selection 66--77
Donghoon Kim and
Rozenn Dahyot Bayesian Shape from Silhouettes . . . . 78--89
Levente Kovács Shape Retrieval and Recognition on
Mobile Devices . . . . . . . . . . . . . 90--101
Furkan Keskin and
A. Enis Çetin Directionally Selective Fractional
Wavelet Transform Using a $2$-D
Non-separable Unbalanced Lifting
Structure . . . . . . . . . . . . . . . 102--113
Jungong Han and
Eric Pauwels and
Paul de Zeeuw Visible and Infrared Image Registration
Employing Line-Based Geometric Analysis 114--125
Pavel Vácha and
Michal Haindl Texture Recognition Using Robust
Markovian Features . . . . . . . . . . . 126--137
Michal Haindl and
Vojt\vech Havlí\vcek A Plausible Texture Enlargement and
Editing Compound Markovian Model . . . . 138--148
Michal Haindl and
Michal Havlí\vcek Bidirectional Texture Function
Simultaneous Autoregressive Model . . . 149--159
Ji\vrí Filip and
Pavel Vácha and
Michal Haindl Analysis of Human Gaze Interactions with
Texture and Shape . . . . . . . . . . . 160--171
Elisabet Carcel and
Manuel Martos Rich Internet Application for
Semi-automatic Annotation of Semantic
Shots on Keyframes . . . . . . . . . . . 172--182
Emmanuelle Martienne and
Vincent Claveau Labeling TV Stream Segments with
Conditional Random Fields . . . . . . . 183--194
Jaime Gallego and
Montse Pard\`as and
Montse Solano Foreground Objects Segmentation for
Moving Camera Scenarios Based on SCGMM 195--206
Massimo Magrini and
Davide Moroni Real Time Image Analysis for
Infomobility . . . . . . . . . . . . . . 207--218
Szilard Szalai and
Tamás Szirányi Tracking the Saliency Features in Images
Based on Human Observation Statistics 219--233
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
José Meseguer Taming Distributed System Complexity
through Formal Patterns . . . . . . . . 1--2
John Rushby Composing Safe Systems . . . . . . . . . 3--11
Gyrd Brændeland and
Atle Refsdal and
Ketil Stòlen A Denotational Model for Component-Based
Risk Analysis . . . . . . . . . . . . . 12--41
Benjamin Aminof and
Fabio Mogavero and
Aniello Murano Synthesis of Hierarchical Systems . . . 42--60
Sebastian S. Bauer and
Kim Guldstrand Larsen A Modal Specification Theory for
Components with Data . . . . . . . . . . 61--78
Roberto Bruni and
Alberto Lluch Lafuente Evaluating the Performance of Model
Transformation Styles in Maude . . . . . 79--96
Dan Li and
Xiaoshan Li and
Zhiming Liu and
Volker Stolz Interactive Transformations from
Object-Oriented Models to
Component-Based Models . . . . . . . . . 97--114
Julien Dormoy and
Olga Kouchnarenko and
Arnaud Lanoix Runtime Verification of Temporal
Patterns for Dynamic Reconfigurations of
Components . . . . . . . . . . . . . . . 115--132
Jose Pablo Escobedo and
Christophe Gaston Timed Conformance Testing for
Orchestrated Service Discovery . . . . . 133--150
Gregor Gössler and
Gwen Salaün Realizability of Choreographies for
Services Interacting Asynchronously . . 151--167
Mohammad Mahdi Jaghoori and
Ólafur Hlynsson Networks of Real-Time Actors . . . . . . 168--186
Einar Broch Johnsen and
Rudolf Schlatte A Formal Model of Object Mobility in
Resource-Restricted Deployment Scenarios 187--204
Carroline Dewi Puspa Kencana Ramli The Logic of XACML . . . . . . . . . . . 205--222
Mounira Kezadri and
Beno\^\it Combemale and
Marc Pantel A Proof Assistant Based Formalization of
MDE Components . . . . . . . . . . . . . 223--240
Sébastien Limet and
Sophie Robert and
Ahmed Turki Controlling an Iteration-Wise Coherence
in Dataflow . . . . . . . . . . . . . . 241--258
José Antonio Martín and
Antonio Brogi Learning from Failures: a Lightweight
Approach to Run-Time Behavioural
Adaptation . . . . . . . . . . . . . . . 259--277
Rabéa Ameur-Boulifa and
Raluca Halalai and
Ludovic Henrio Verifying Safety of Fault-Tolerant
Distributed Components . . . . . . . . . 278--295
Hamideh Sabouri and
Ramtin Khosravi Reducing the Model Checking Cost of
Product Lines Using Static Analysis
Techniques . . . . . . . . . . . . . . . 296--312
Alejandro Sanchez and
Luís Soares. Barbosa Bigraphical Modelling of Architectural
Patterns . . . . . . . . . . . . . . . . 313--330
Davide Brugali and
Luca Gherardi and
Elvinia Riccobene Coordinated Execution of Heterogeneous
Service-Oriented Components by Abstract
State Machines . . . . . . . . . . . . . 331--349
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Miguel Lurgi and
David Robertson Multi-agent Coordination through
Mutualistic Interactions . . . . . . . . 1--20
Maaike Harbers and
Jeffrey M. Bradshaw and
Matthew Johnson and
Paul Feltovich Explanation in Human-Agent Teamwork . . 21--37
Kathleen Keogh and
Liz Sonenberg Adaptive Coordination in Distributed and
Dynamic Agent Organizations . . . . . . 38--57
Jie Jiang and
Virginia Dignum and
Yao-Hua Tan An Agent-Based Inter-organizational
Collaboration Framework: OperA+ . . . . 58--74
Charalampos Tampitsikas and
Stefano Bromuri and
Michael Ignaz Schumacher MANET: a Model for First-Class
Electronic Institutions . . . . . . . . 75--92
Sofia Panagiotidi and
Javier Vázquez-Salceda Towards Practical Normative Agents: a
Framework and an Implementation for
Norm-Aware Planning . . . . . . . . . . 93--109
Ioan Alfred Letia and
Anca Goron Towards Justifying Norm Compliance . . . 110--128
Tina Balke and
Marina De Vos and
Julian Padget Normative Run-Time Reasoning for
Institutionally-Situated BDI Agents . . 129--148
Stephen Cranefield and
Michael Winikoff and
Wamberto Vasconcelos Modelling and Monitoring Interdependent
Expectations . . . . . . . . . . . . . . 149--166
Tina Balke and
Daniel Villatoro Operationalization of the Sanctioning
Process in Utilitarian Artificial
Societies . . . . . . . . . . . . . . . 167--185
Samhar Mahmoud and
Nathan Griffiths and
Jeroen Keppens and
Michael Luck Overcoming Omniscience for Norm
Emergence in Axelrod's Metanorm Model 186--202
Samhar Mahmoud and
Nathan Griffiths and
Jeroen Keppens and
Michael Luck Establishing Norms for Network
Topologies . . . . . . . . . . . . . . . 203--220
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Andrzej Janusz Dynamic Rule-Based Similarity Model for
DNA Microarray Data . . . . . . . . . . 1--25
M. E. Abd El-Monsef and
H. M. Abu-Donia and
E. A. Marei Multi-valued Approach to Near Set Theory 26--40
Christopher J. Henry Perceptual Indiscernibility, Rough Sets,
Descriptively Near Sets, and Image
Analysis . . . . . . . . . . . . . . . . 41--121
A. Mani Dialectics of Counting and the
Mathematics of Vagueness . . . . . . . . 122--180
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Hee-Kap Ahn and
Sang Won Bae and
Otfried Cheong A Generalization of the Convex Kakeya
Problem . . . . . . . . . . . . . . . . 1--12
Eric Angel and
Evripidis Bampis and
Vincent Chau Low Complexity Scheduling Algorithm
Minimizing the Energy for Tasks with
Agreeable Deadlines . . . . . . . . . . 13--24
Esther M. Arkin and
José Miguel Díaz-Báñez Bichromatic $2$-Center of Pairs of
Points . . . . . . . . . . . . . . . . . 25--36
Vikraman Arvind and
Partha Mukhopadhyay Erd\Hos--Rényi Sequences and
Deterministic Construction of Expanding
Cayley Graphs . . . . . . . . . . . . . 37--48
Rafael da Ponte Barbosa and
Yoshiko Wakabayashi A Better Approximation Ratio and an IP
Formulation for a Sensor Cover Problem 49--60
Hans-Joachim Böckenhauer and
Dennis Komm On the Advice Complexity of the Knapsack
Problem . . . . . . . . . . . . . . . . 61--72
Nicolas Boria and
Jérôme Monnot and
Vangelis Th. Paschos Reoptimization of Some Maximum Weight
Induced Hereditary Subgraph Problems . . 73--84
Prosenjit Bose and
Rolf Fagerberg and
André van Renssen On Plane Constrained Bounded-Degree
Spanners . . . . . . . . . . . . . . . . 85--96
Joshua Brody and
Hongyu Liang and
Xiaoming Sun Space-Efficient Approximation Scheme for
Circular Earth Mover Distance . . . . . 97--108
Ana Bu\vsi\'c and
Nazim Fat\`es and
Jean Mairesse Density Classification on Infinite
Lattices and Trees . . . . . . . . . . . 109--120
Jean Cardinal and
Matias Korman Coloring Planar Homothets and
Three-Dimensional Hypergraphs . . . . . 121--132
Armando Castañeda and
Maurice Herlihy and
Sergio Rajsbaum An Equivariance Theorem with
Applications to Renaming . . . . . . . . 133--144
Armando Castañeda and
Damien Imbs and
Sergio Rajsbaum Renaming Is Weaker Than Set Agreement
But for Perfect Renaming: a Map of
Sub-consensus Tasks . . . . . . . . . . 145--156
Eda Cesaratto and
Brigitte Vallée Pseudorandomness of a Random Kronecker
Sequence . . . . . . . . . . . . . . . . 157--171
Richard Cole and
Vijaya Ramachandran Revisiting the Cache Miss Analysis of
Multithreaded Algorithms . . . . . . . . 172--183
Robert Crowston and
Gregory Gutin and
Mark Jones Parameterized Complexity of MaxSat above
Average . . . . . . . . . . . . . . . . 184--194
Marek Cygan and
Marcin Pilipczuk and
Micha\l Pilipczuk Solving the $2$-Disjoint Connected
Subgraphs Problem Faster Than $2^n$ . . 195--206
Daniel Dadush A $O(1 / \epsilon^2)^n$-Time Sieving
Algorithm for Approximate Integer
Programming . . . . . . . . . . . . . . 207--218
Pooya Davoodi and
Michiel Smid and
Freek van Walderveen Two-Dimensional Range Diameter Queries 219--230
Domingos Dellamonica Jr. and
Yoshiharu Kohayakawa An Improved Upper Bound on the Density
of Universal Random Graphs . . . . . . . 231--242
Anonymous Front Matter . . . . . . . . . . . . . . ??
Arie Middelkoop and
Alexander B. Elyasov Functional Instrumentation of
ActionScript Programs with Asil . . . . 1--16
Edward Amsden and
Matthew Fluet Fairness for Transactional Events . . . 17--34
Patrick Maier and
Phil Trinder Implementing a High-Level
Distributed-Memory Parallel Haskell in
Haskell . . . . . . . . . . . . . . . . 35--50
Thomas Schilling Challenges for a Trace-Based
Just-In-Time Compiler for Haskell . . . 51--68
Jason S. Reich and
Matthew Naylor Lazy Generation of Canonical Test
Programs . . . . . . . . . . . . . . . . 69--84
Anders Persson and
Emil Axelsson Generic Monadic Constructs for Embedded
Languages . . . . . . . . . . . . . . . 85--99
Stephen Chang and
Eli Barzilay and
John Clements From Stack Traces to Lazy Rewriting
Sequences . . . . . . . . . . . . . . . 100--115
Pieter Koopman and
Peter Achten Model Based Testing with Logical
Properties versus State Machines . . . . 116--133
Rex Page Property-Based Testing and Verification:
a Catalog of Classroom Examples . . . . 134--147
Michael Kirkedal Thomsen Describing and Optimising Reversible
Logic Using a Functional Language . . . 148--163
Adam Megacz Hardware Design with Generalized Arrows 164--180
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Alastair Butler Logic and Engineering of Natural
Language Semantics (LENLS) 8 . . . . . . 1--2
Nicholas Asher and
Jason Quinley Begging Questions, Their Answers and
Basic Cooperativity . . . . . . . . . . 3--12
Mauricio Hernandes Players Who Are Learning How to Play: a
Haskell Implementation of Awareness
Dynamics . . . . . . . . . . . . . . . . 13--26
Margot Colinet and
Grégoire Winterstein Emphatic NPI/FCI and Adversative
Discourse Relations, a Probabilistic
Approach . . . . . . . . . . . . . . . . 27--39
David Y. Oshima The Japanese Particle yo in
Declaratives: Relevance, Priority, and
Blaming . . . . . . . . . . . . . . . . 40--53
J.-R. Hayashishita and
Daisuke Bekki Conjoined Nominal Expressions in
Japanese . . . . . . . . . . . . . . . . 54--67
Christina Unger Dynamic Semantics as Monadic Computation 68--81
Satoru Suzuki Measurement-Theoretic Foundations of
Gradable-Predicate Logic . . . . . . . . 82--95
Alastair Butler and
Kei Yoshimoto Towards a Self-selective and
Self-healing Evaluation . . . . . . . . 96--109
Shozo Ota and
Ken Satoh and
Makoto Nakamura The Fifth International Workshop on
Juris-Informatics (JURISIN 2011) . . . . 110--111
Robert Kowalski and
Anthony Burton WUENIC --- a Case Study in Rule-Based
Knowledge Representation and Reasoning 112--125
Hirokazu Igari and
Akira Shimazu and
Koichiro Ochimizu Document Structure Analysis with
Syntactic Model and Parsers: Application
to Legal Judgments . . . . . . . . . . . 126--140
Yasuhiro Ogawa and
Masaki Mori and
Katsuhiko Toyama Recall-Oriented Evaluation Metrics for
Consistent Translation of Japanese Legal
Sentences . . . . . . . . . . . . . . . 141--154
Takanori Sato and
Shogo Okada and
Katsumi Nitta Deliberation Process Support System for
Citizen Judge Trial Based on Structure
of Factors . . . . . . . . . . . . . . . 155--169
Katsuhiko Sano and
Shingo Hagiwara and
Satoshi Tojo An Intuitionistic Investigation of
Prerequisite-Effect Structure . . . . . 170--183
Koji Tsuda and
Shin-ichi Minato Second Workshop on Algorithms for
Large-Scale Information Processing in
Knowledge Discovery (ALSIP) . . . . . . 184--185
Shoichi Higuchi and
Tomohiro Kan and
Yoshiyuki Yamamoto and
Kouichi Hirata An A* Algorithm for Computing Edit
Distance between Rooted Labeled
Unordered Trees . . . . . . . . . . . . 186--196
Yuichi Kameda and
Akihiro Yamamoto Mining Closed Weighted Itemsets for
Numerical Transaction Databases . . . . 197--210
Yoshiyuki Yamamoto and
Kouichi Hirata and
Tetsuji Kuboyama On Computing Tractable Variations of
Unordered Tree Edit Distance with
Network Algorithms . . . . . . . . . . . 211--223
Mayumi Bono and
Nobuhiro Furuyama Multimodality in Multispace Interaction
(MiMI) . . . . . . . . . . . . . . . . . 224--225
Anonymous Front Matter . . . . . . . . . . . . . . ??
Yu Sasaki and
Kazumaro Aoki Improved Integral Analysis on Tweaked
Lesamnta . . . . . . . . . . . . . . . . 1--17
Thorsten Ernst Schilling and
Håvard Raddum Analysis of Trivium Using Compressed
Right Hand Side Equations . . . . . . . 18--32
Florian Mendel and
Tomislav Nad and
Martin Schläffer Cryptanalysis of Round-Reduced HAS-160 33--47
Daehyun Strobel and
Christof Paar An Efficient Method for Eliminating
Random Delays in Power Traces of
Embedded Software . . . . . . . . . . . 48--60
Hailong Zhang and
Yongbin Zhou and
Dengguo Feng An Efficient Leakage Characterization
Method for Profiled Power Analysis
Attacks . . . . . . . . . . . . . . . . 61--73
Hyung Tae Lee and
HongTae Kim and
Yoo-Jin Baek and
Jung Hee Cheon Correcting Errors in Private Keys
Obtained from Cold Boot Attacks . . . . 74--87
Ryo Kikuchi and
Atsushi Fujioka and
Yoshiaki Okamoto and
Taiichi Saito Strong Security Notions for
Timed-Release Public-Key Encryption
Revisited . . . . . . . . . . . . . . . 88--108
Song Luo and
Qingni Shen and
Zhong Chen Fully Secure Unidirectional
Identity-Based Proxy Re-encryption . . . 109--126
Yong Qiao and
Yuexiang Yang and
Jie He and
Bo Liu and
Yingzhi Zeng Detecting Parasite P2P Botnet in
eMule-like Networks through
Quasi-periodicity Recognition . . . . . 127--139
Kai Chen and
Yifeng Lian and
Yingjun Zhang AutoDunt: Dynamic Latent Dependence
Analysis for Detection of Zero Day
Vulnerability . . . . . . . . . . . . . 140--154
Juliane Krämer and
Dmitry Nedospasov and
Jean-Pierre Seifert Weaknesses in Current RSA Signature
Schemes . . . . . . . . . . . . . . . . 155--168
Shuguo Yang and
Yongbin Zhou and
Jiye Liu and
Danyang Chen Back Propagation Neural Network Based
Leakage Characterization for Practical
Security Analysis of Cryptographic
Implementations . . . . . . . . . . . . 169--185
Keita Emura and
Atsuko Miyaji and
Kazumasa Omote A Revocable Group Signature Scheme with
the Property of Hiding the Number of
Revoked Users . . . . . . . . . . . . . 186--203
Laila El Aimani Generic Constructions for Verifiable
Signcryption . . . . . . . . . . . . . . 204--218
Haibo Tian and
Xiaofeng Chen and
Zhengtao Jiang and
Yusong Du Non-delegatable Strong Designated
Verifier Signature on Elliptic Curves 219--234
Kyung Chul Jeong and
Dong Hoon Lee and
Daewan Han An Improved Known Plaintext Attack on
PKZIP Encryption Algorithm . . . . . . . 235--247
Yi Lu and
Serge Vaudenay and
Willi Meier and
Liping Ding and
Jianchun Jiang Synthetic Linear Analysis: Improved
Attacks on CubeHash and Rabbit . . . . . 248--260
Yusong Du and
Fangguo Zhang and
Meicheng Liu On the Resistance of Boolean Functions
against Fast Algebraic Attacks . . . . . 261--274
Yu Chen and
Liqun Chen and
Zongyang Zhang CCA Secure IB-KEM from the Computational
Bilinear Diffie--Hellman Assumption in
the Standard Model . . . . . . . . . . . 275--301
Marko Wolf and
Timo Gendrullis Design, Implementation, and Evaluation
of a Vehicular Hardware Security Module 302--318
Anonymous Front Matter . . . . . . . . . . . . . . ??
Antje Düsterhöft and
Meike Klettke Dedication to a Theory of Modelling . . 1--6
Jan Paredaens What about Constraints in RDF? . . . . . 7--18
Joachim Biskup Some Remarks on Relational Database
Schemes Having Few Minimal Keys . . . . 19--28
Gyula O. H. Katona Random Databases with Correlated Data 29--35
David Källberg and
Nikolaj Leonenko Statistical Inference for Rényi Entropy
Functionals . . . . . . . . . . . . . . 36--51
Egon Börger The Subject-Oriented Approach to
Software Design and the Abstract State
Machines Method . . . . . . . . . . . . 52--72
Johann A. Makowsky and
Elena V. Ravve BCNF via Attribute Splitting . . . . . . 73--84
Flavio Ferrarotti and
Sven Hartmann Foundations for a Fourth Normal Form
over SQL-Like Databases . . . . . . . . 85--100
Stephen J. Hegner Independent Update Reflections on
Interdependent Database Views . . . . . 101--115
Alejandro L. Grosso and
José M. Turull Torres SO$^{F}$: a Semantic Restriction over
Second-Order Logic and Its
Polynomial-Time Hierarchy . . . . . . . 116--135
Qing Wang Abstract State Machines for
Data-Parallel Computing . . . . . . . . 136--150
Stephen W. Clyde and
David W. Embley OSM-Logic: a Fact-Oriented,
Time-Dependent Formalization of
Object-oriented Systems Modeling . . . . 151--172
Sudarshan Murthy and
David Maier Cloaking Data to Ease View Creation,
Query Expression, and Query Execution 173--189
Arne Sòlvberg On Models of Concepts and Data . . . . . 190--196
Gerti Kappel and
Philip Langer Model Transformation By-Example: a
Survey of the First Wave . . . . . . . . 197--215
Antonio Villegas and
Antoni Olivé On Computing the Importance of
Associations in Large Conceptual Schemas 216--230
Oscar Pastor and
Juan Carlos Casamayor Conceptual Modeling of Human Genome:
Integration Challenges . . . . . . . . . 231--250
Hui Ma Transforming Geometrically Enhanced
Conceptual Model Schemas to GML . . . . 251--267
Marie Du\vzí Extensional Logic of Hyperintensions . . 268--290
Hannu Jaakkola Culture Sensitive Aspects in Software
Engineering . . . . . . . . . . . . . . 291--315
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Armin Biere Preprocessing and Inprocessing
Techniques in SAT . . . . . . . . . . . 1--1
Kathryn Kranen Pioneering the Future of Verification: a
Spiral of Technological and Business
Innovation . . . . . . . . . . . . . . . 2--2
Ben Liblit Automated Detection and Repair of
Concurrency Bugs . . . . . . . . . . . . 3--3
Klaus-Dieter Schubert Verification Challenges of Workload
Optimized Hardware Systems . . . . . . . 4--4
Orna Kupferman and
Dorsa Sadigh and
Sanjit A. Seshia Synthesis with Clairvoyance . . . . . . 5--19
Matthias Schlaipfer and
Georg Hofferek and
Roderick Bloem Generalized Reactivity(1) Synthesis
without a Monolithic Strategy . . . . . 20--34
Lei Bu and
Yang Yang and
Xuandong Li IIS-Guided DFS for Efficient Bounded
Reachability Analysis of Linear Hybrid
Automata . . . . . . . . . . . . . . . . 35--49
Marijn J. H. Heule and
Oliver Kullmann and
Siert Wieringa and
Armin Biere Cube and Conquer: Guiding CDCL SAT
Solvers by Lookaheads . . . . . . . . . 50--65
Zurab Khasidashvili and
Alexander Nadel Implicative Simultaneous Satisfiability
and Applications . . . . . . . . . . . . 66--79
B. A. Krishna and
Jonathan Michelson and
Vigyan Singhal and
Alok Jain Liveness vs Safety --- a Practical
Viewpoint . . . . . . . . . . . . . . . 80--94
Arnab Sinha and
Sharad Malik and
Chao Wang and
Aarti Gupta Predicting Serializability Violations:
SMT-Based Search vs. DPOR-Based Search 95--114
Qichang Chen and
Liqiang Wang and
Zijiang Yang SAM: Self-adaptive Dynamic Analysis for
Multithreaded Programs . . . . . . . . . 115--129
Michael Huth and
Jim Huan-Pu Kuo and
Nir Piterman Concurrent Small Progress Measures . . . 130--144
Kenneth Johnson and
Simon Reed and
Radu Calinescu Specification and Quantitative Analysis
of Probabilistic Cloud Deployment
Patterns . . . . . . . . . . . . . . . . 145--159
Ondrej Sery and
Grigory Fedyukovich and
Natasha Sharygina Interpolation-Based Function Summaries
in Bounded Model Checking . . . . . . . 160--175
Thomas J. Ostrand and
Elaine J. Weyuker Can File Level Characteristics Help
Identify System Level Fault-Proneness? 176--189
Ariel Birnbaum and
Laurent Fournier and
Steve Mittermaier and
Avi Ziv Reverse Coverage Analysis . . . . . . . 190--202
Peter Collingbourne and
Cristian Cadar and
Paul H. J. Kelly Symbolic Testing of OpenCL Code . . . . 203--218
Allon Adir and
Ronen Levy and
Tamer Salman Dynamic Test Data Generation for Data
Intensive Applications . . . . . . . . . 219--233
Merav Aharony and
Emanuel Gofman and
Elena Guralnik and
Anatoly Koyfman Injecting Floating-Point Testing
Knowledge into Test Generators . . . . . 234--241
Anonymous Front Matter . . . . . . . . . . . . . . ??
Babak Alipanahi and
Nathan Krislock and
Ali Ghodsi Protein Structure by Semidefinite Facial
Reduction . . . . . . . . . . . . . . . 1--11
Sivan Bercovici and
Jesse M. Rodriguez Ancestry Inference in Complex Admixtures
via Variable-Length Markov Chain Linkage
Models . . . . . . . . . . . . . . . . . 12--28
Stefan Canzar and
Mohammed El-Kebir and
René Pool Charge Group Partitioning in
Biomolecular Simulation . . . . . . . . 29--43
Hector Corrada Bravo Increased Methylation Variation in
Epigenetic Domains across Cancer Types 44--44
Dan F. DeBlasio and
Travis J. Wheeler Estimating the Accuracy of Multiple
Alignments and its Use in Parameter
Advising . . . . . . . . . . . . . . . . 45--59
Matthew R. Francis and
Elana J. Fertig Quantifying the Dynamics of Coupled
Networks of Switches and Oscillators . . 60--61
Melissa Gymrek and
David Golan and
Saharon Rosset lobSTR: a Short Tandem Repeat Profiler
for Personal Genomes . . . . . . . . . . 62--63
Dan He and
Buhm Han and
Eleazar Eskin Hap-seq: An Optimal Algorithm for
Haplotype Phasing with Imputation Using
Sequencing Data . . . . . . . . . . . . 64--78
Lu He and
Fabio Vandin and
Gopal Pandurangan Ballast: a Ball-Based Algorithm for
Structural Motifs . . . . . . . . . . . 79--93
Patrick Holloway and
Krister Swenson Evolution of Genome Organization by
Duplication and Loss: An Alignment
Approach . . . . . . . . . . . . . . . . 94--112
Daniel Holtby and
Shuai Cheng Li and
Ming Li LoopWeaver --- Loop Modeling by the
Weighted Scaling of Verified Proteins 113--126
Yan Huang and
Yin Hu and
Corbin D. Jones A Robust Method for Transcript
Quantification with RNA-seq Data . . . . 127--147
Marcus Kinsella and
Vineet Bafna Modeling the Breakage-Fusion-Bridge
Mechanism: Combinatorics and Cancer
Genomics . . . . . . . . . . . . . . . . 148--162
Yang Li and
Hong-Mei Li and
Paul Burns TrueSight: Self-training Algorithm for
Splice Junction Detection Using RNA-seq 163--164
Yaw-Ling Lin and
Charles Ward and
Steven Skiena Synthetic Sequence Design for Signal
Location Search . . . . . . . . . . . . 165--179
Marc A. Marti-Renom The Three-Dimensional Architecture of a
Bacterial Genome and Its Alteration by
Genetic Perturbation . . . . . . . . . . 180--180
Andrew McPherson and
Chunxiao Wu Discovery of Complex Genomic
Rearrangements in Cancer Using
High-Throughput Sequencing . . . . . . . 181--182
T. M. Murali and
Matthew D. Dyer and
David Badger Network-Based Prediction and Analysis of
HIV Dependency Factors . . . . . . . . . 183--183
Andrew S. Parker and
Karl E. Griswold Structure-Guided Deimmunization of
Therapeutic Proteins . . . . . . . . . . 184--198
Dmitri Pervouchine and
Ekaterina Khrameeva Evidence for Widespread Association of
Mammalian Splicing and Conserved
Long-Range RNA Structures . . . . . . . 199--199
Anonymous Front Matter . . . . . . . . . . . . . . ??
Ping-Lin Chang and
Dongbin Chen and
Daniel Cohen $2$D/$3$D Registration of a Preoperative
Model with Endoscopic Video Using
Colour-Consistency . . . . . . . . . . . 1--12
Simon Drouin and
Marta Kersten-Oertel A Realistic Test and Development
Environment for Mixed Reality in
Neurosurgery . . . . . . . . . . . . . . 13--23
Kenko Fujii and
Johannes Totz and
Guang-Zhong Yang Visual Search Behaviour and Analysis of
Augmented Visualisation for Minimally
Invasive Surgery . . . . . . . . . . . . 24--35
Kate Alicia Gavaghan and
Sylvain Anderegg Augmented Reality Image Overlay
Projection for Image Guided Open Liver
Ablation of Metastatic Liver Cancer . . 36--46
Stamatia Giannarou and
Guang-Zhong Yang Tissue Deformation Recovery with
Gaussian Mixture Model Based Structure
from Motion . . . . . . . . . . . . . . 47--57
Samantha Horvath and
John Galeotti and
Bo Wang Towards an Ultrasound Probe with Vision:
Structured Light to Determine Surface
Orientation . . . . . . . . . . . . . . 58--64
Jagadeesan Jayender and
Inbar Spofford Markov Modeling of Colonoscopy Gestures
to Develop Skill Trainers . . . . . . . 65--73
Bernhard Kainz and
Rupert H. Portugaller Volume Visualization in the Clinical
Practice . . . . . . . . . . . . . . . . 74--84
Pencilla Lang and
Michael W. Chu CT-US Registration for Guidance of
Transcatheter Aortic Valve Implantation 85--92
Cristian A. Linte and
Kurt E. Augustine Enhanced Planning of Interventions for
Spinal Deformity Correction Using
Virtual Modeling and Visualization
Techniques . . . . . . . . . . . . . . . 93--105
Coert Metz and
Michiel Schaap and
Stefan Klein Alignment of $4$D Coronary CTA with
Monoplane X-ray Angiography . . . . . . 106--116
Naoki Suzuki and
Asaki Hattori and
Satoshi Ieiri VR Training System for Endoscopic
Surgery Robot . . . . . . . . . . . . . 117--129
Jue Wu and
Kathryn Davis and
Allan Azarion Brain Parcellation Aids in Electrode
Localization in Epileptic Patients . . . 130--137
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Jack Minker To Vladimir Lifschitz on His 65th
Birthday . . . . . . . . . . . . . . . . 1--13
Neelakantan Kartha and
Esra Erdem and
Joohyung Lee and
Paolo Ferraris Vladimir Lifschitz --- a Youth at 65 . . 14--23
Marcello Balduccini A ``Conservative'' Approach to Extending
Answer Set Programming with Non-Herbrand
Functions . . . . . . . . . . . . . . . 24--39
Chitta Baral and
Marcos Alvarez Gonzalez and
Aaron Gottesman The Inverse Lambda Calculus Algorithm
for Typed First Order Logic Lambda
Calculus and Its Application to
Translating English to FOL . . . . . . . 40--56
Ringo Baumann and
Gerhard Brewka and
Wolfgang Dvo\vrák and
Stefan Woltran Parameterized Splitting: a Simple
Modification-Based Approach . . . . . . 57--71
Nikolaj Bjòrner and
Guido de Caso and
Yuri Gurevich From Primal Infon Logic with Individual
Variables to Datalog . . . . . . . . . . 72--86
Alexander Bochman Here and There among Logics for Logic
Programming . . . . . . . . . . . . . . 87--101
Pedro Cabalar Causal Logic Programming . . . . . . . . 102--116
Andrea Cal\`\i and
Georg Gottlob and
Giorgio Orsi and
Andreas Pieris On the Interaction of Existential Rules
and Equality Constraints in Ontology
Querying . . . . . . . . . . . . . . . . 117--133
Xiaoping Chen and
Guoqiang Jin and
Fangkai Yang Extending Action Language $\mathcal{C}+$
by Formalizing Composite Actions . . . . 134--148
Stefania Costantini and
Andrea Formisano and
David Pearce Strong Equivalence of RASP Programs . . 149--163
James Delgrande Considerations on Belief Revision in an
Action Theory . . . . . . . . . . . . . 164--177
Marc Denecker and
Maurice Bruynooghe and
Joost Vennekens Approximation Fixpoint Theory and the
Semantics of Logic and Answers Set
Programs . . . . . . . . . . . . . . . . 178--194
Jürgen Dix and
Wolfgang Faber and
V. S. Subrahmanian Privacy Preservation Using Multi-context
Systems and Default Logic . . . . . . . 195--210
Thomas Eiter and
Cristina Feier and
Michael Fink Simulating Production Rules Using ACTHEX 211--228
Esra Erdem and
Volkan Patoglu Applications of Action Languages in
Cognitive Robotics . . . . . . . . . . . 229--246
Wolfgang Faber and
Nicola Leone and
Simona Perri The Intelligent Grounder of DLV . . . . 247--264
Luis Fariñas del Cerro and
David Pearce and
Agustín Valverde Bi-state Logic . . . . . . . . . . . . . 265--278
Dov M. Gabbay An Equational Approach to Logic
Programming . . . . . . . . . . . . . . 279--295
Martin Gebser and
Roland Kaufmann and
Torsten Schaub Gearing Up for Effective ASP Planning 296--310
Anonymous Front Matter . . . . . . . . . . . . . . ??
Andreas Fasbender and
Martin Gerdes and
Sascha Smets Cellular Networking Technologies in ITS
Solutions: Opportunities and Challenges 1--13
Muhammad Sabir Idrees and
Yves Roudier Effective and Efficient Security Policy
Engines for Automotive On-Board Networks 14--26
Axel Sikora Security Solutions for Highly Dynamic
Car2X Networks in the KoFAS Initiative 27--39
Zubaida Alazawi and
Mohmmad B. Abdljabar and
Saleh Altowaijri and
Anna Maria Vegni ICDMS: An Intelligent Cloud Based
Disaster Management System for Vehicular
Networks . . . . . . . . . . . . . . . . 40--56
Krzysztof Ró\.zanowski and
Zbigniew Piotrowski and
Tadeusz Sondej and
Krzysztof Sawicki Wireless Driver and Vehicle Surveillance
System Based on IEEE 802.11 Networks . . 57--67
Krzysztof Ró\.zanowski and
Tadeusz Sondej and
Zbigniew Piotrowski and
Krzysztof Sawicki Architecture of Car Measurement System
for Driver Monitoring . . . . . . . . . 68--79
Carlos Gañán and
Jose L. Muñoz and
Oscar Esparza and
Jorge Mata-Díaz and
Juanjo Alins Toward Revocation Data Handling
Efficiency in VANETs . . . . . . . . . . 80--90
Muhammad Shoaib and
Wang-Cheol Song and
Keun Hyung Kim Cluster Based Data Aggregation in
Vehicular Adhoc Network . . . . . . . . 91--102
Florent Kaisser and
Christophe Gransart and
Marion Berbineau Simulations of VANET Scenarios with
OPNET and SUMO . . . . . . . . . . . . . 103--112
Bhushan G. Jagyasi and
Vikrant Kumar and
Arun Pande Human Participatory Sensing in Fixed
Route Bus Information System . . . . . . 113--123
Dariusz Kowalski and
Zeev Nutov and
Michael Segal Scheduling of Vehicles in Transportation
Networks . . . . . . . . . . . . . . . . 124--136
Johan Bergs and
Erwin Van de Velde and
Daan Pareit and
Dries Naudts and
Milos Rovcanin Design and Prototype of a
Train-to-Wayside Communication
Architecture . . . . . . . . . . . . . . 137--150
Navin Kumar and
Nidhu Kumari Conceptual Architectural Design of
Indian Railway Intelligent
Transportation Systems . . . . . . . . . 151--162
Abhinav Jha and
Amit Kumar Agrawal and
Chirabrata Bhaumik Automatic Alert Generation from Train to
the People at Unmanned Level Crossings
Using Principles of IoT . . . . . . . . 163--173
Patricia Noriega-Vivas and
Celeste Campo and
Carlos Garcia-Rubio and
Alicia Rodriguez-Carrion MOFETA: a Network Architecture Based on
MObile FEmtocells to Enhance Cellular
Connectivity on TrAins . . . . . . . . . 174--185
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . 1--1
Krzysztof Bartecki Neural Network-Based PCA: An Application
to Approximation of a Distributed
Parameter System . . . . . . . . . . . . 3--11
Jaros\law Bilski and
Jacek Smol\kag Parallel Realisation of the Recurrent
Multi Layer Perceptron Learning . . . . 12--20
Giacomo Capizzi and
Christian Napoli and
Lucio Patern\`o An Innovative Hybrid Neuro-wavelet
Method for Reconstruction of Missing
Data in Astronomical Photometric Surveys 21--29
Daniel Salles Chevitarese and
Dilza Szwarcman and
Marley Vellasco Speeding Up the Training of Neural
Networks with CUDA Technology . . . . . 30--38
Meng Joo Er and
Piotr Duda On the Uniform Convergence of the
Orthogonal Series-Type Kernel Regression
Neural Networks in a Time-Varying
Environment . . . . . . . . . . . . . . 39--46
Piotr Duda and
Yoichi Hayashi and
Maciej Jaworski On the Strong Convergence of the
Orthogonal Series-Type Kernel Regression
Neural Networks in a Non-stationary
Environment . . . . . . . . . . . . . . 47--54
Piotr Duda and
Marcin Korytkowski On the Strong Convergence of the
Recursive Orthogonal Series-Type Kernel
Probabilistic Neural Networks Handling
Time-Varying Noise . . . . . . . . . . . 55--62
Bogumi\l Fiksak and
Maciej Krawczak Incidental Neural Networks as Nomograms
Generators . . . . . . . . . . . . . . . 63--71
Krzysztof Halawa Selection of Activation Functions in the
Last Hidden Layer of the Multilayer
Perceptron . . . . . . . . . . . . . . . 72--80
Adrian Horzyk Information Freedom and Associative
Artificial Intelligence . . . . . . . . 81--89
Maciej Jaworski and
Meng Joo Er and
Lena Pietruczuk On the Application of the Parzen-Type
Kernel Regression Neural Network and
Order Statistics for Learning in a
Non-stationary Environment . . . . . . . 90--98
Maciej Jaworski and
Marcin Gabryel On Learning in a Time-Varying
Environment by Using a Probabilistic
Neural Network and the Recursive Least
Squares Method . . . . . . . . . . . . . 99--110
Vladimir Kryzhanovskiy and
Irina Zhelavskaya and
Jakov Karandashev Binary Perceptron Learning Algorithm
Using Simplex-Method . . . . . . . . . . 111--118
\Lukasz Laskowski Objects Auto-selection from
Stereo-Images Realised by
Self-Correcting Neural Network . . . . . 119--125
Maciej \Lawry\'nczuk On-Line Trajectory-Based Linearisation
of Neural Models for a Computationally
Efficient Predictive Control Algorithm 126--134
Vladimir Olej and
Jana Filipova Short Time Series of Website Visits
Prediction by RBF Neural Networks and
Support Vector Machine Regression . . . 135--142
Jaros\law Piersa and
Tomasz Schreiber Spectra of the Spike-Flow Graphs in
Geometrically Embedded Neural Networks 143--151
Lena Pietruczuk and
Meng Joo Er Weak Convergence of the Parzen-Type
Probabilistic Neural Network Handling
Time-Varying Noise . . . . . . . . . . . 152--159
Lena Pietruczuk and
Yoichi Hayashi Strong Convergence of the Recursive
Parzen-Type Probabilistic Neural Network
Handling Nonstationary Noise . . . . . . 160--168
Piotr P\lo\'nski and
Krzysztof Zaremba Improving Performance of Self-Organising
Maps with Distance Metric Learning
Method . . . . . . . . . . . . . . . . . 169--177
Anonymous Front Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . 1--1
Yalemisew M. Abgaz and
Muhammad Javed and
Claus Pahl Dependency Analysis in Ontology-Driven
Content-Based Systems . . . . . . . . . 3--12
Vladimír Bartík Measuring Web Page Similarity Based on
Textual and Visual Properties . . . . . 13--21
Stanis\law Brodowski and
Andrzej Bielecki New Specifics for a Hierarchial
Estimator Meta-algorithm . . . . . . . . 22--29
Dariusz Ceglarek and
Konstanty Haniewicz Fast Plagiarism Detection by Sentence
Hashing . . . . . . . . . . . . . . . . 30--37
Harry Chang Enriching Domain-Specific Language
Models Using Domain Independent WWW
$N$-Gram Corpus . . . . . . . . . . . . 38--46
Pietro Codara On the Structure of Indiscernibility
Relations Compatible with a Partially
Ordered Set . . . . . . . . . . . . . . 47--55
Piotr Duda and
Maciej Jaworski and
Lena Pietruczuk On Pre-processing Algorithms for Data
Stream . . . . . . . . . . . . . . . . . 56--63
Marek Grochowski Simple Incremental Instance Selection
Wrapper for Classification . . . . . . . 64--72
Anamika Gupta and
Naveen Kumar and
Vasudha Bhatnagar Mining of Multiobjective Non-redundant
Association Rules in Data Streams . . . 73--81
Maciej Jaworski and
Piotr Duda and
Lena Pietruczuk On Fuzzy Clustering of Data Streams with
Concept Drift . . . . . . . . . . . . . 82--91
Maciej Jaworski and
Lena Pietruczuk and
Piotr Duda On Resources Optimization in Fuzzy
Clustering of Data Streams . . . . . . . 92--99
Przemys\law Kl\kesk A Comparison of Complexity Selection
Approaches for Polynomials Based on:
Vapnik--Chervonenkis Dimension,
Rademacher Complexity and Covering
Numbers . . . . . . . . . . . . . . . . 100--110
Marcin Korze\'n and
Przemys\law Kl\kesk Sample Complexity of Linear Learning
Machines with Different Restrictions
over Weights . . . . . . . . . . . . . . 111--119
Maciej Krawczak and
Gra\.zyna Szkatu\la A Clustering Algorithm Based on
Distinguishability for Nominal
Attributes . . . . . . . . . . . . . . . 120--127
Piotr \Lady\.zy\'nski and
Przemys\law Grzegorzewski Retrieving Informative Content from Web
Pages with Conditional Learning of
Support Vector Machines and Semantic
Analysis . . . . . . . . . . . . . . . . 128--135
Henryk Maciejewski and
Ewa Walkowicz and
Olgierd Unold and
Pawe\l Skrobanek Enhancing Recognition of a Weak Class
--- Comparative Study Based on
Biological Population Data Mining . . . 136--143
Marcin Michalak Foundations of Rough Biclustering . . . 144--151
Marcin Michalak and
Marek Sikora and
Patryk Ziarnik ORG- Oblique Rules Generator . . . . . . 152--159
Marcin Pluci\'nski Mini-models --- Local Regression Models
for the Function Approximation Learning 160--167
Artur Starczewski A Cluster Validity Index for Hard
Clustering . . . . . . . . . . . . . . . 168--174
Anonymous Front Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . 1--1
Djibrilla Amadou Kountché and
Nicolas Monmarché and
Mohamed Slimane The \em Pachycondyla Apicalis Ants
Search Strategy for Data Clustering
Problems . . . . . . . . . . . . . . . . 3--11
Jaros\law Arabas and
Ogier Maitre and
Pierre Collet PARADE: a Massively Parallel
Differential Evolution Template for
EASEA . . . . . . . . . . . . . . . . . 12--20
Li Bai and
David Feltell A $3$D Discrete-Continuum Swarm
Intelligence Simulation on GPU for Swarm
Robotics and Biomedical Applications . . 21--29
Kálmán Bolla and
Tamás Kovacs and
Gábor Fazekas Gathering of Fat Robots with Limited
Visibility and without Global Navigation 30--38
Petr Bujok and
Josef Tvrdík Parallel Migration Model Employing
Various Adaptive Variants of
Differential Evolution . . . . . . . . . 39--47
Roberto De Prisco and
Gianluca Zaccagnino and
Rocco Zaccagnino A Differential Evolution Algorithm
Assisted by ANFIS for Music Fingering 48--56
Abbas El Dor and
Maurice Clerc and
Patrick Siarry Hybridization of Differential Evolution
and Particle Swarm Optimization in a New
Algorithm: DEPSO-2S . . . . . . . . . . 57--65
Iztok Fister Jr. and
Iztok Fister and
Janez Brest A Hybrid Artificial Bee Colony Algorithm
for Graph $3$-Coloring . . . . . . . . . 66--74
Jeremy Fix and
Matthieu Geist Monte--Carlo Swarm Policy Search . . . . 75--83
Giovanni Iacca and
Ferrante Neri and
Ernesto Mininno Compact Bacterial Foraging Optimization 84--92
Andrew Koh A Coevolutionary MiniMax Algorithm for
the Detection of Nash Equilibrium . . . 93--101
Tomasz Krzeszowski and
Bogdan Kwolek and
Boguslaw Rymut and
Konrad Wojciechowski Real-Time Tracking of Full-Body Motion
Using Parallel Particle Swarm
Optimization with a Pool of Best
Particles . . . . . . . . . . . . . . . 102--109
Karol Opara and
Jaros\law Arabas Decomposition and Metaoptimization of
Mutation Operator in Differential
Evolution . . . . . . . . . . . . . . . 110--118
Janusz Papli\'nski Continuous Ant Colony Optimization for
Identification of Time Delays in the
Linear Plant . . . . . . . . . . . . . . 119--127
M. Fatih Tasgetiren and
Quan-Ke Pan and
P. N. Suganthan and
Ozge Buyukdagli A Variable Iterated Greedy Algorithm
with Differential Evolution for Solving
No-Idle Flowshops . . . . . . . . . . . 128--135
Josef Tvrdík and
Ivan K\vrivý Differential Evolution with Competing
Strategies Applied to Partitional
Clustering . . . . . . . . . . . . . . . 136--144
Matthieu Weber and
Ferrante Neri Contiguous Binomial Crossover in
Differential Evolution . . . . . . . . . 145--153
Ale\vs Zamuda and
Janez Brest Population Reduction Differential
Evolution with Multiple Mutation
Strategies in Real World Industry
Challenges . . . . . . . . . . . . . . . 154--161
Anonymous Front Matter . . . . . . . . . . . . . . 163--163
Petr Cermak and
Michal Mura Genetic Optimization of Fuzzy Rule Based
MAS Using Cognitive Analysis . . . . . . 165--173
Marcin Czajkowski and
Marek Kretowski Does Memetic Approach Improve Global
Induction of Regression and Model Trees? 174--181
Anonymous Front Matter . . . . . . . . . . . . . . ??
Elisa Burato and
Matteo Cristani The Process of Reaching Agreement in
Meaning Negotiation . . . . . . . . . . 1--42
Veronica Jascanu and
Nicolae Jascanu Formalizing Emotional E-Commerce Agents
for a Simple Negotiation Protocol . . . 43--60
Giancarlo Fortino and
Francesco Rango Engineering Multi-Agent Systems through
Statecharts-Based JADE Agents and Tools 61--81
Mahdi Zargayouna Fleet Organization Models for Online
Vehicle Routing Problems . . . . . . . . 82--102
Vill\`evo Adanhounm\`e and
Théophile K. Dagba Neural Smooth Function Approximation and
Prediction with Adaptive Learning Rate 103--118
James O'Shea and
Zuhair Bandar and
Keeley Crockett A Multi-classifier Approach to Dialogue
Act Classification Using Function Words 119--143
Danuta Zakrzewska Building Group Recommendations in
E-Learning Systems . . . . . . . . . . . 144--163
Wojciech Lorkiewicz and
Radoslaw Katarzyniak Individual Semiosis in Multi-Agent
Systems . . . . . . . . . . . . . . . . 164--197
Pierpaolo Di Bitonto and
Maria Laterza Evaluation of Multi-Agent Systems:
Proposal and Validation of a Metric Plan 198--221
Jaros\law W\kas Egress Modeling through Cellular
Automata Based Multi-Agent Systems . . . 222--235
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Dimitri Van Landuyt and
Steven Op de beeck and
Eddy Truyen and
Wouter Joosen Domain-Driven Discovery of Stable
Abstractions for Pointcut Interfaces . . 1--52
Jean-Yves Tigli and
Stéphane Lavirotte and
Gaëtan Rey and
Nicolas Ferry and
Vincent Hourdin Aspect of Assembly: From Theory to
Performance . . . . . . . . . . . . . . 53--91
Danilo Ansaloni and
Walter Binder and
Philippe Moret and
Alex Villazón Dynamic Aspect-Oriented Programming in
Java: The HotWave Experience . . . . . . 92--122
Adrian Holzer and
Lukasz Ziarek and
K. R. Jayaram and
Patrick Eugster Abstracting Context in Event-Based
Software . . . . . . . . . . . . . . . . 123--167
Daniel Lohmann and
Olaf Spinczyk and
Wanja Hofer and
Wolfgang Schröder-Preikschat The Aspect-Aware Design and
Implementation of the CiAO
Operating-System Family . . . . . . . . 168--215
Lodewijk Bergmans and
Wilke Havinga and
Mehmet Aksit First-Class Compositions . . . . . . . . 216--267
Eyvind W. Axelsen and
Fredrik Sòrensen and
Stein Krogdahl and
Birger Mòller-Pedersen Challenges in the Design of the Package
Template Mechanism . . . . . . . . . . . 268--305
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Francisco Maia and
Miguel Matos Slead: Low-Memory, Steady Distributed
Systems Slicing . . . . . . . . . . . . 1--15
François Fouquet and
Erwan Daubert Dissemination of Reconfiguration
Policies on Mesh Networks . . . . . . . 16--30
Dimokritos Stamatakis and
Nikos Tsikoudis Scalability of Replicated Metadata
Services in Distributed File Systems . . 31--44
Fatemeh Rahimian and
Thinh Le Nguyen Huu Locality-Awareness in a Peer-to-Peer
Publish/Subscribe Network . . . . . . . 45--58
Philippe De Ryck and
Nick Nikiforakis Serene: Self-Reliant Client-Side
Protection against Session Fixation . . 59--72
Linda Ariani Gunawan Behavioral Singletons to Consistently
Handle Global States of Security
Patterns . . . . . . . . . . . . . . . . 73--86
Diego Kreutz and
António Casimiro A Trustworthy and Resilient Event Broker
for Monitoring Cloud Infrastructures . . 87--95
Miguel Borges and
Paulo Jesus and
Carlos Baquero Spectra: Robust Estimation of
Distribution Functions in Networks . . . 96--103
Jef Maerien and
Pieter Agten FAMoS: a Flexible Active Monitoring
Service for Wireless Sensor Networks . . 104--117
Abdulkader Benchi and
Frédéric Guidec A Message Service for Opportunistic
Computing in Disconnected MANETs . . . . 118--131
Engineer Bainomugisha and
Koosha Paridel Flexub: Dynamic Subscriptions for
Publish/Subscribe Systems in MANETs . . 132--139
John Lyle and
Shamal Faily and
Ivan Fléchais On the Design and Development of
webinos: a Distributed Mobile
Application Middleware . . . . . . . . . 140--147
Graham Thomson and
Sotirios Terzis A Middleware for Pervasive
Situation-Awareness . . . . . . . . . . 148--161
Abdulrahman Azab and
Hein Meling Stroll: a Universal Filesystem-Based
Interface for Seamless Task Deployment
in Grid Computing . . . . . . . . . . . 162--176
Fredrik Degerlund Scheduling of Compute-Intensive Code
Generated from Event-B Models: An
Empirical Efficiency Study . . . . . . . 177--184
Narasimha Raghavan Veeraragavan Reliability Modeling and Analysis of
Modern Distributed Interactive
Multimedia Applications: a Case Study of
a Distributed Opera Performance . . . . 185--193
Diana Elena Comes and
Christoph Evers Designing Socio-technical Applications
for Ubiquitous Computing . . . . . . . . 194--201
Ivan Voras and
Marin Orli\'c and
Mario \vZagar Something Old Is New Again: Reimagining
the Oldest Social Networking Platform 202--207
Preston Rodrigues and
Yérom-David Bromberg ZigZag: a Middleware for Service
Discovery in Future Internet . . . . . . 208--221
Diana Elena Comes and
Harun Baraki BPRules and the BPR-Framework:
Comprehensive Support for Managing QoS
in Web Service Compositions . . . . . . 222--235
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Michael Lienhardt and
Ivan Lanese A Reversible Abstract Machine and Its
Space Overhead . . . . . . . . . . . . . 1--17
Taylor T. Johnson and
Sayan Mitra A Small Model Theorem for Rectangular
Hybrid Automata Networks . . . . . . . . 18--34
Elvira Albert and
Antonio E. Flores-Montoya Analysis of May-Happen-in-Parallel in
Concurrent Objects . . . . . . . . . . . 35--51
Bogdan Aman and
Gabriel Ciobanu and
Maciej Koutny Behavioural Equivalences over Migrating
Processes with Timers . . . . . . . . . 52--66
Kais Klai and
Jörg Desel Checking Soundness of Business Processes
Compositionally Using Symbolic
Observation Graphs . . . . . . . . . . . 67--83
Roland Kindermann and
Tommi Junttila Beyond Lassos: Complete SMT-Based
Bounded Model Checking for Timed
Automata . . . . . . . . . . . . . . . . 84--100
Pavithra Prabhakar and
Mahesh Viswanathan Conformance Testing of Boolean Programs
with Multiple Faults . . . . . . . . . . 101--117
Saddek Bensalem and
Marius Bozga and
Jean Quilbeuf Knowledge-Based Distributed Conflict
Resolution for Multiparty Interactions
and Priorities . . . . . . . . . . . . . 118--134
Andrea Cerone and
Matthew Hennessy Modelling Probabilistic Wireless
Networks . . . . . . . . . . . . . . . . 135--151
Dimiter Milushev and
Wim Beck and
Dave Clarke Noninterference via Symbolic Execution 152--168
David Romero Hernández and
David de Frutos Escrig Defining Distances for All Process
Semantics . . . . . . . . . . . . . . . 169--185
Gilles Barthe and
Juan Manuel Crespo Secure Multi-Execution through Static
Program Transformation . . . . . . . . . 186--202
Beno\^\it Delahaye and
Uli Fahrenberg Synchronous Interface Theories and Time
Triggered Scheduling . . . . . . . . . . 203--218
Samira Tasharofi and
Rajesh K. Karmani TransDPOR: a Novel Dynamic Partial-Order
Reduction Technique for Testing Actor
Programs . . . . . . . . . . . . . . . . 219--234
Giorgio Delzanno and
Arnaud Sangnier Verification of Ad Hoc Networks with
Node and Communication Failures . . . . 235--250
Clara Benac Earle and
Lars-Åke Fredlund Verification of Timed Erlang Programs
Using McErlang . . . . . . . . . . . . . 251--267
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Vitaliy Liptchinsky and
Roman Khazankin and
Hong-Linh Truong Statelets: Coordination of Social
Collaboration Processes . . . . . . . . 1--16
Davide Rossi A Social Software-Based Coordination
Platform . . . . . . . . . . . . . . . . 17--28
Frederico Alvares de Oliveira Jr. and
Remi Sharrock Synchronization of Multiple Autonomic
Control Loops: Application to Cloud
Computing . . . . . . . . . . . . . . . 29--43
Marko van Dooren and
Dave Clarke Subobject Transactional Memory . . . . . 44--58
Dave Clarke and
José Proença Partial Connector Colouring . . . . . . 59--73
Ramtin Khosravi and
Hamideh Sabouri Using Coordinated Actors to Model
Families of Distributed Systems . . . . 74--88
Peter Dinges and
Gul Agha Scoped Synchronization Constraints for
Large Scale Actor Systems . . . . . . . 89--103
Roberto Bruni and
Carla Ferreira and
Anne Kersten Kauer First-Order Dynamic Logic for
Compensable Processes . . . . . . . . . 104--121
Bogdan Aman and
Gabriel Ciobanu Coordinating Parallel Mobile Ambients to
Solve SAT Problem in Polynomial Number
of Steps . . . . . . . . . . . . . . . . 122--136
Micha\l Terepeta and
Hanne Riis Nielson and
Flemming Nielson Recursive Advice for Coordination . . . 137--151
Mieke Massink and
Diego Latella Fluid Analysis of Foraging Ants . . . . 152--165
Stefan Dziwok and
Christian Heinzemann and
Matthias Tichy Real-Time Coordination Patterns for
Advanced Mechatronic Systems . . . . . . 166--180
Eline Philips and
Jorge Vallejos Group Orchestration in a Mobile
Environment . . . . . . . . . . . . . . 181--195
Luigia Petre and
Petter Sandvik and
Kaisa Sere Node Coordination in Peer-to-Peer
Networks . . . . . . . . . . . . . . . . 196--211
Mirko Viroli and
Danilo Pianini and
Jacob Beal Linda in Space-Time: An Adaptive
Coordination Model for Mobile Ad-Hoc
Environments . . . . . . . . . . . . . . 212--229
Eva Kühn and
Alexander Marek and
Thomas Scheller A Space-Based Generic Pattern for
Self-Initiative Load Clustering Agents 230--244
Massimo Bartoletti and
Emilio Tuosto and
Roberto Zunino On the Realizability of Contracts in
Dishonest Systems . . . . . . . . . . . 245--260
Pierpaolo Degano and
Gian-Luigi Ferrari Types for Coordinating Secure
Behavioural Variations . . . . . . . . . 261--276
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Michael Hutter and
Mario Kirschbaum and
Thomas Plos and
Jörn-Marc Schmidt and
Stefan Mangard Exploiting the Difference of
Side-Channel Leakages . . . . . . . . . 1--16
Thomas Korak and
Thomas Plos and
Michael Hutter Attacking an AES-Enabled NFC Tag:
Implications from Design to a Real-World
Scenario . . . . . . . . . . . . . . . . 17--32
Mathias Wagner 700+ Attacks Published on Smart Cards:
The Need for a Systematic Counter
Strategy . . . . . . . . . . . . . . . . 33--38
Wei He and
Eduardo de la Torre and
Teresa Riesgo An Interleaved EPE-Immune PA-DPL
Structure for Resisting Concentrated EM
Side Channel Attacks on FPGA
Implementation . . . . . . . . . . . . . 39--53
Shohreh Sharif Mansouri and
Elena Dubrova An Architectural Countermeasure against
Power Analysis Attacks for FSR-Based
Stream Ciphers . . . . . . . . . . . . . 54--68
Jean-Sébastien Coron and
Christophe Giraud and
Emmanuel Prouff and
Soline Renner Conversion of Security Proofs from One
Leakage Model to Another: a New Issue 69--81
Sven Bauer Attacking Exponent Blinding in RSA
without CRT . . . . . . . . . . . . . . 82--88
Jean Da Rolt and
Amitabh Das and
Giorgio Di Natale and
Marie-Lise Flottes and
Bruno Rouzeyre A New Scan Attack on RSA in Presence of
Industrial Countermeasures . . . . . . . 89--104
Camille Vuillaume and
Takashi Endo and
Paul Wooderson RSA Key Generation: New Attacks . . . . 105--119
Philipp Jovanovic and
Martin Kreuzer and
Ilia Polian A Fault Attack on the LED Block Cipher 120--134
Liang Zhao and
Takashi Nishide and
Kouichi Sakurai Differential Fault Analysis of Full
LBlock . . . . . . . . . . . . . . . . . 135--150
Pierre Bayon and
Lilian Bossuet and
Alain Aubert and
Viktor Fischer and
François Poucheret Contactless Electromagnetic Active
Attack on Ring Oscillator Based True
Random Number Generator . . . . . . . . 151--166
Viktor Fischer A Closer Look at Security in Random
Number Generators Design . . . . . . . . 167--182
Cédric Murdica and
Sylvain Guilley and
Jean-Luc Danger and
Philippe Hoogvorst and
David Naccache Same Values Power Analysis Using Special
Points on Elliptic Curves . . . . . . . 183--198
Alexander Krüger The Schindler--Itoh-attack in Case of
Partial Information Leakage . . . . . . 199--214
Michael Zohner and
Michael Kasper and
Marc Stöttinger Butterfly-Attack on Skein's Modular
Addition . . . . . . . . . . . . . . . . 215--230
Xinjie Zhao and
Fan Zhang and
Shize Guo and
Tao Wang and
Zhijie Shi and
Huiying Liu and
Keke Ji MDASCA: An Enhanced Algebraic
Side-Channel Attack for Error Tolerance
and New Leakage Model Exploitation . . . 231--248
Annelie Heuser and
Michael Zohner Intelligent Machine Homicide . . . . . . 249--264
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Marco E. Lübbecke Automatic Decomposition and
Branch-and-Price--- a Status Report . . 1--8
Barbara Kempkes and
Friedhelm Meyer auf der Heide Continuous Local Strategies for Robotic
Formation Problems . . . . . . . . . . . 9--17
Vitaly Osipov and
Peter Sanders and
Christian Schulz Engineering Graph Partitioning
Algorithms . . . . . . . . . . . . . . . 18--26
Benjamin Albrecht and
Volker Heun Space Efficient Modifications to
Structator--- a Fast Index-Based Search
Tool for RNA Sequence-Structure Patterns 27--38
Eric Angel and
Romain Campigotto and
Christian Laforest Implementation and Comparison of
Heuristics for the Vertex Cover Problem
on Huge Graphs . . . . . . . . . . . . . 39--50
Annabell Berger and
Matthias Müller-Hannemann How to Attack the NP-Complete Dag
Realization Problem in Practice . . . . 51--62
Christina Büsing and
Fabio D'Andreagiovanni New Results about Multi-band Uncertainty
in Robust Optimization . . . . . . . . . 63--74
Sonia Cafieri and
Pierre Hansen and
Lucas Létocart and
Leo Liberti and
Frédéric Messine Compact Relaxations for Polynomial
Programming Problems . . . . . . . . . . 75--86
Alberto Costa and
Leo Liberti Relaxations of Multilinear Convex
Envelopes: Dual Is Better Than Primal 87--98
Pierluigi Crescenzi and
Roberto Grossi and
Leonardo Lanzi and
Andrea Marino On Computing the Diameter of Real-World
Directed (Weighted) Graphs . . . . . . . 99--110
Annalisa D'Andrea and
Guido Proietti Reoptimizing the Strengthened Metric TSP
on Multiple Edge Weight Modifications 111--122
Gianlorenzo D'Angelo and
Mattia D'Emidio and
Daniele Frigioni and
Vinicio Maurizio Engineering a New Loop-Free Shortest
Paths Routing Algorithm . . . . . . . . 123--134
Gianlorenzo D'Angelo and
Mattia D'Emidio and
Daniele Frigioni and
Camillo Vitale Fully Dynamic Maintenance of Arc-Flags
in Road Networks . . . . . . . . . . . . 135--147
Martin Dietzfelbinger and
Hendrik Peilke and
Michael Rink A More Reliable Greedy Heuristic for
Maximum Matchings in Sparse Random
Graphs . . . . . . . . . . . . . . . . . 148--159
Amr Elmasry and
Jyrki Katajainen and
Max Stenmark Branch Mispredictions Don't Affect
Mergesort . . . . . . . . . . . . . . . 160--171
Simone Faro and
Thierry Lecroq A Multiple Sliding Windows Approach to
Speed Up String Matching Algorithms . . 172--183
Guillaume Fertin and
Hafedh Mohamed Babou and
Irena Rusu Algorithms for Subnetwork Mining in
Heterogeneous Networks . . . . . . . . . 184--194
Donatella Firmani and
Giuseppe F. Italiano and
Luigi Laura and
Alessio Orlandi Computing Strong Articulation Points and
Strong Bridges in Large Scale Graphs . . 195--207
Giorgos Georgiadis and
Marina Papatriantafilou Adaptive Distributed $b$-Matching in
Overlays with Preferences . . . . . . . 208--223
Stelios Joannou and
Rajeev Raman Dynamizing Succinct Tree Representations 224--235
Anonymous Front Matter . . . . . . . . . . . . . . ??
Sarang Bharadwaj Masti and
Siva P. Meenakshi and
Serugudi V. Raghavan VNEMX: Virtual Network Embedding
Test-Bed Using MPLS and Xen . . . . . . 1--12
Panagiotis Papadimitriou and
Ines Houidi and
Wajdi Louati and
Djamal Zeghlache and
Christoph Werle Towards Large-Scale Network
Virtualization . . . . . . . . . . . . . 13--25
Vasileios Lakafosis and
Sreenivas Addagatla and
Christian Belady and
Suyash Sinha Prometheus: a Wirelessly Interconnected,
Pico-Datacenter Framework for the
Developing World . . . . . . . . . . . . 26--39
Olga Galinina and
Sergey Andreev and
Yevgeni Koucheryavy Performance Analysis of Client Relay
Cloud in Wireless Cellular Networks . . 40--51
Christos Liaskos and
Andreas Xeros and
Georgios I. Papadimitriou and
Marios Lestas Periodic Scheduling with Costs Revisited 52--63
Christos Liaskos and
Ageliki Tsioliaridou and
Georgios I. Papadimitriou More for Less . . . . . . . . . . . . . 64--75
Junyu Lai and
Bernd E. Wolfinger A Method to Improve the Channel
Availability of IPTV Systems with Users
Zapping Channels Sequentially . . . . . 76--89
Nedal Ababneh and
Nicholas Timmons and
Jim Morrison An Adaptive Bandwidth Allocation Scheme
for Data Streaming over Body Area
Networks . . . . . . . . . . . . . . . . 90--101
Ehsan Ahvar and
René Serral-Graci\`a and
Eva Marín-Tordera and
Xavier Masip-Bruin EQR: a New Energy-Aware Query-Based
Routing Protocol for Wireless Sensor
Networks . . . . . . . . . . . . . . . . 102--113
Gerald Wagenknecht and
Markus Anwander and
Torsten Braun Performance Evaluation of Reliable
Overlay Multicast in Wireless Sensor
Networks . . . . . . . . . . . . . . . . 114--125
Desislava C. Dimitrova and
Islam Alyafawi and
Torsten Braun Experimental Comparison of Bluetooth and
WiFi Signal Propagation for Indoor
Localisation . . . . . . . . . . . . . . 126--137
Kaushik Mondal and
Partha Sarathi Mandal and
Bhabani P. Sinha Localization in Presence of Multipath
Effect in Wireless Sensor Networks . . . 138--149
Ausama Yousef and
Samer Rishe and
Andreas Mitschele-Thiel and
Abdalkarim Awad RNBB: a Reliable Hybrid Broadcasting
Algorithm for Ad-Hoc Networks . . . . . 150--161
Ghazale Hosseinabadi and
Nitin H. Vaidya Exploiting Opportunistic Overhearing to
Improve Performance of Mutual Exclusion
in Wireless Ad Hoc Networks . . . . . . 162--173
Fraser Cadger and
Kevin Curran and
Jose Santos and
Sandra Moffett MANET Location Prediction Using Machine
Learning Algorithms . . . . . . . . . . 174--185
José Marinho and
Edmundo Monteiro Cooperative Sensing-Before-Transmit in
Ad-Hoc Multi-hop Cognitive Radio
Scenarios . . . . . . . . . . . . . . . 186--197
Adetola Oredope and
Guilherme Frassetto and
Barry Evans An Evaluation of Vertical Handovers in
LTE Networks . . . . . . . . . . . . . . 198--207
Michal Vondra and
Zdenek Becvar Connection Cost Based Handover Decision
for Offloading Macrocells by Femtocells 208--219
Chung-Hsien Hsu Direct Link Assignment Approach for IEEE
802.16 Networks . . . . . . . . . . . . 220--231
Dongxiao Yu and
Qiang-Sheng Hua and
Weiguo Dai and
Yuexuan Wang and
Francis C. M. Lau Dynamic Contention Resolution in
Multiple-Access Channels . . . . . . . . 232--243
Anonymous Front Matter . . . . . . . . . . . . . . ??
Hsinchun Chen Dark Web: Exploring and Mining the Dark
Side of the Web . . . . . . . . . . . . 1--1
Luc De Raedt Declarative Modeling for Machine
Learning and Data Mining . . . . . . . . 2--2
Paul Elzinga Can Concepts Reveal Criminals? . . . . . 3--3
Bart Goethals Cartification: From Similarities to
Itemset Frequencies . . . . . . . . . . 4--4
Ir. Edward Peters Processes Are Concepts, Aren't They? . . 5--5
Dominik \'Sl\kezak Rough Sets and FCA --- Scalability
Challenges . . . . . . . . . . . . . . . 6--6
Mikhail A. Babin and
Sergei O. Kuznetsov Approximating Concept Stability . . . . 7--15
Eduard Bartl and
Michal Krupka Logical Analysis of Concept Lattices by
Factorization . . . . . . . . . . . . . 16--27
Radim Belohlavek and
Martin Trnecka Basic Level of Concepts in Formal
Concept Analysis . . . . . . . . . . . . 28--44
Anne Berry and
Alain Sigayret A Peep through the Looking Glass:
Articulation Points in Lattices . . . . 45--60
Stéphanie Chollet and
Vincent Lestideau and
Yoann Maurel and
Etienne Gandrille and
Philippe Lalanda Practical Use of Formal Concept Analysis
in Service-Oriented Computing . . . . . 61--76
Stephan Doerfel and
Robert Jäschke and
Gerd Stumme Publication Analysis of the Formal
Concept Analysis Community . . . . . . . 77--95
Dominik Endres and
Ruth Adam and
Martin A. Giese and
Uta Noppeney Understanding the Semantic Structure of
Human fMRI Brain Recordings with Formal
Concept Analysis . . . . . . . . . . . . 96--111
Sébastien Ferré and
Pierre Allard and
Olivier Ridoux Cubes of Concepts: Multi-dimensional
Exploration of Multi-valued Contexts . . 112--127
Bernhard Ganter and
Cynthia Vera Glodeanu Ordinal Factor Analysis . . . . . . . . 128--139
Tim B. Kaiser and
Stefan E. Schmidt A Macroscopic Approach to FCA and Its
Various Fuzzifications . . . . . . . . . 140--147
Sebastian Kerkhoff A Connection between Clone Theory and
FCA Provided by Duality Theory . . . . . 148--163
Markus Kirchberg and
Erwin Leonardi and
Yu Shyang Tan and
Sebastian Link and
Ryan K. L. Ko Formal Concept Discovery in Semantic Web
Data . . . . . . . . . . . . . . . . . . 164--179
Michal Krupka and
Jan Lastovicka Concept Lattices of Incomplete Data . . 180--194
Juraj Macko Formal Concept Analysis as a Framework
for Business Intelligence Technologies 195--210
Anonymous Front Matter . . . . . . . . . . . . . . ??
Corrado Leita Challenges in Critical Infrastructure
Security . . . . . . . . . . . . . . . . 1--1
Niels Bouten and
Anna Hristoskova and
Femke Ongenae and
Jelle Nelis and
Filip De Turck Ontology-Driven Dynamic Discovery and
Distributed Coordination of a Robot
Swarm . . . . . . . . . . . . . . . . . 2--13
Andrei Vancea and
Guilherme Sperb Machado and
Laurent d'Orazio and
Burkhard Stiller Cooperative Database Caching within
Cloud Environments . . . . . . . . . . . 14--25
Stylianos Georgoulas and
Klaus Moessner and
Alexis Mansour and
Menelaos Pissarides A Fuzzy Reinforcement Learning Approach
for Pre-Congestion Notification Based
Admission Control . . . . . . . . . . . 26--37
Julius Rückert and
David Hausheer Bridging the Gap: Towards an Adaptive
Video Streaming Approach Supporting
Transitions . . . . . . . . . . . . . . 38--41
Teemu Rautio and
Jukka Mäkelä A Multiaccess Enabled Load Balancing in
Cognitive Networks . . . . . . . . . . . 42--45
Viktor Pu\vs Hardware Acceleration for Measurements
in 100 Gb/s Networks . . . . . . . . . . 46--49
Kevin Dominik Korte and
Anuj Sehgal and
Jürgen Schönwälder A Study of the RPL Repair Process Using
ContikiRPL . . . . . . . . . . . . . . . 50--61
Radek Krej\vcí and
Pavel \vCeleda and
Jakub Dobrovolný Traffic Measurement and Analysis of
Building Automation and Control Networks 62--73
Tobias Jung and
Sylvain Martin and
Damien Ernst and
Guy Leduc SPRT for SPIT: Using the Sequential
Probability Ratio Test for Spam in VoIP
Prevention . . . . . . . . . . . . . . . 74--85
Laurens Hellemons and
Luuk Hendriks and
Rick Hofstede and
Anna Sperotto and
Ramin Sadre and
Aiko Pras SSHCure: a Flow-Based SSH Intrusion
Detection System . . . . . . . . . . . . 86--97
Thorsten Ries and
Radu State and
Thomas Engel Instant Degradation of Anonymity in
Low-Latency Anonymisation Systems . . . 98--108
Rick Hofstede and
Aiko Pras Real-Time and Resilient Intrusion
Detection: a Flow-Based Approach . . . . 109--112
Karel Bartos and
Martin Rehak Distributed Self-organized Collaboration
of Autonomous IDS Sensors . . . . . . . 113--117
Václav Barto\vs and
Martin \vZádník Network Anomaly Detection: Comparison
and Real-Time Issues . . . . . . . . . . 118--121
Cynthia Wagner and
Thomas Engel Detecting Anomalies in Netflow Record
Time Series by Using a Kernel Function 122--125
Ji\vrí Tobola How to Build an IT Spin-Off Company . . 126--126
Ricardo de O. Schmidt and
Anna Sperotto and
Ramin Sadre and
Aiko Pras Towards Bandwidth Estimation Using
Flow-Level Measurements . . . . . . . . 127--138
Vaibhav Bajpai and
Nikolay Melnikov and
Anuj Sehgal and
Jürgen Schönwälder Flow-Based Identification of Failures
Caused by IPv6 Transition Mechanisms . . 139--150
Samuel Marchal and
Thomas Engel Large Scale DNS Analysis . . . . . . . . 151--154
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Yang Yang and
Guang Gong and
Xiaohu Tang Odd Perfect Sequences and Sets of
Spreading Sequences with Zero or Low Odd
Periodic Correlation Zone . . . . . . . 1--12
Ferruh Özbudak and
O\uguz Yayla and
C. Cengiz Yìldìrìm Nonexistence of Certain Almost $p$-ary
Perfect Sequences . . . . . . . . . . . 13--24
Yin Tan and
Longjiang Qu and
Chik How Tan and
Chao Li New Families of Differentially
$4$-Uniform Permutations over ${\mathbb
F}_{2^{2k}}$ . . . . . . . . . . . . . . 25--39
Jean-Pierre Flori and
Sihem Mesnager Dickson Polynomials, Hyperelliptic
Curves and Hyper-bent Functions . . . . 40--52
Jonathan Lutz and
Charles J. Colbourn and
Violet R. Syrotiuk Variable Weight Sequences for Adaptive
Scheduled Access in MANETs . . . . . . . 53--64
Andrew Klapper Arithmetic Walsh Transform of Quadratic
Boolean Functions . . . . . . . . . . . 65--76
Sumanta Sarkar Characterizing Negabent Boolean
Functions over Finite Fields . . . . . . 77--88
Ça\ugda\cs Çalìk and
Ali Do\uganaksoy Computing the Weight of a Boolean
Function from Its Algebraic Normal Form 89--100
Gottlieb Pirsic and
Arne Winterhof Boolean Functions Derived from
Pseudorandom Binary Sequences . . . . . 101--109
Solomon W. Golomb Infinite Sequences with Finite
Cross-Correlation-II . . . . . . . . . . 110--116
Thomas J. Dorsey and
Alfred W. Hales Irreducible Coefficient Relations . . . 117--125
Jonathan Jedwab and
Jane Wodlinger Wavelength Isolation Sequence Pairs . . 126--135
Ana S\ual\uagean and
David Gardner and
Raphael Phan Index Tables of Finite Fields and
Modular Golomb Rulers . . . . . . . . . 136--147
Zhengchun Zhou and
Xiaohu Tang and
Yang Yang and
Udaya Parampalli On the Aperiodic Hamming Correlation of
Frequency-Hopping Sequences from Norm
Functions . . . . . . . . . . . . . . . 148--158
Santiago Barrera Acevedo and
Thomas E. Hall Perfect Sequences of Unbounded Lengths
over the Basic Quaternions . . . . . . . 159--167
Michael Vielhaber and
Mónica del Pilar Canales Chacón The Linear Complexity Deviation of
Multisequences: Formulae for Finite
Lengths and Asymptotic Distributions . . 168--180
Zhixiong Chen and
Domingo Gómez-Pérez Linear Complexity of Binary Sequences
Derived from Polynomial Quotients . . . 181--189
Sartaj Ul Hasan and
Daniel Panario and
Qiang Wang Word-Oriented Transformation Shift
Registers and Their Linear Complexity 190--201
Jin-Ho Chung and
Kyeongcheol Yang Low-Hit-Zone Frequency-Hopping Sequence
Sets with New Parameters . . . . . . . . 202--211
Oscar Moreno and
Andrew Tirkel New Optimal Low Correlation Sequences
for Wireless Communications . . . . . . 212--223
Anonymous Front Matter . . . . . . . . . . . . . . ??
Nick Wainwright and
Nick Papanikolaou Introduction: The FIA Research Roadmap,
Priorities for Future Internet Research 1--5
Alexandros Kostopoulos and
Ioanna Papafili and
Costas Kalogiros and
Tapio Levä and
Nan Zhang A Tussle Analysis for
Information-Centric Networking
Architectures . . . . . . . . . . . . . 6--17
Bernard Sales and
Emmanuel Darmois and
Dimitri Papadimitriou and
Didier Bourse A Systematic Approach for Closing the
Research to Standardization Gap . . . . 18--29
Kevin Doolin and
Ioanna Roussaki and
Mark Roddy and
Nikos Kalatzis and
Elizabeth Papadopoulou SOCIETIES: Where Pervasive Meets Social 30--41
Anne-Marie Oostveen and
Isis Hjorth and
Brian Pickering and
Michael Boniface and
Eric T. Meyer Cross-Disciplinary Lessons for the
Future Internet . . . . . . . . . . . . 42--54
Dimitri Papadimitriou and
Theodore Zahariadis and
Pedro Martinez-Julia and
Ioanna Papafili Design Principles for the Future
Internet Architecture . . . . . . . . . 55--67
Dimitri Papadimitriou and
Bernard Sales and
Piet Demeester and
Theodore Zahariadis From Internet Architecture Research to
Standards . . . . . . . . . . . . . . . 68--80
Amira Ben Hamida and
Fabio Kon and
Gustavo Ansaldi Oliva and
Carlos Eduardo Moreira Dos Santos An Integrated Development and Runtime
Environment for the Future Internet . . 81--92
James Davey and
Florian Mansmann and
Jörn Kohlhammer and
Daniel Keim Visual Analytics: Towards Intelligent
Interactive Internet and Security
Solutions . . . . . . . . . . . . . . . 93--104
Francesco Di Cerbo and
Michele Bezzi and
Samuel Paul Kaluvuri and
Antonino Sabetta Towards a Trustworthy Service
Marketplace for the Future Internet . . 105--116
Athanasios Antoniou and
Evangelos Theodoridis and
Ioannis Chatzigiannakis and
Georgios Mylonas Using Future Internet Infrastructure and
Smartphones for Mobility Trace
Acquisition and Social Interactions
Monitoring . . . . . . . . . . . . . . . 117--129
Apostolos Axenopoulos and
Petros Daras and
Sotiris Malassiotis and
Vincenzo Croce I-SEARCH: a Unified Framework for
Multimodal Search and Retrieval . . . . 130--141
Flávio de Oliveira Silva and
Alex Dias and
Caio César Ferreira and
Eduardo De Souza Santos Semantically Enriched Services to
Understand the Need of Entities . . . . 142--153
Pawe\l \'Swi\katek and
Krzysztof Juszczyszyn and
Krzysztof Brzostowski and
Jaros\law Drapa\la Supporting Content, Context and User
Awareness in Future Internet
Applications . . . . . . . . . . . . . . 154--165
Lara Srivastava and
Athena Vakali Towards a Narrative-Aware Design
Framework for Smart Urban Environments 166--177
Leonidas G. Anthopoulos and
Athena Vakali Urban Planning and Smart Cities:
Interrelations and Reciprocities . . . . 178--189
Roberto Gimenez and
Diego Fuentes and
Emilio Martin and
Diego Gimenez and
Judith Pertejo The Safety Transformation in the Future
Internet Domain . . . . . . . . . . . . 190--200
Christos Tranoris and
Spyros Denazis FSToolkit: Adopting Software Engineering
Practices for Enabling Definitions of
Federated Resource Infrastructures . . . 201--212
Leonidas Lymberopoulos and
Mary Grammatikou and
Martin Potts and
Paola Grosso and
Attila Fekete NOVI Tools and Algorithms for Federating
Virtualized Infrastructures . . . . . . 213--224
Ioannis Tomkos and
Marianna Angelou and
Ramón J. Durán Barroso and
Ignacio de Miguel Next Generation Flexible and Cognitive
Heterogeneous Optical Networks . . . . . 225--236
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Ferran Argelaguet and
David Antonio Gómez Jáuregui and
Maud Marchal and
Anatole Lécuyer A Novel Approach for Pseudo-haptic
Textures Based on Curvature Information 1--12
Christopher T. Asque and
Andy M. Day and
Stephen D. Laycock Cursor Navigation Using Haptics for
Motion-Impaired Computer Users . . . . . 13--24
Yuki Ban and
Takashi Kajinami and
Takuji Narumi and
Tomohiro Tanikawa and
Michitaka Hirose Modifying an Identified Angle of Edged
Shapes Using Pseudo-haptic Effects . . . 25--36
Ozgur Baser and
E. Ilhan Konukseven and
Hakan Gurocak Transparency Improvement in Haptic
Devices with a Torque Compensator Using
Motor Current . . . . . . . . . . . . . 37--46
Buket Baylan and
Ugur Aridogan and
Cagatay Basdogan Finite Element Modeling of a Vibrating
Touch Screen Actuated by Piezo Patches
for Haptic Feedback . . . . . . . . . . 47--57
Valeria Bellan and
Carlo Reverberi and
Alberto Gallace Evidence for `Visual Enhancement of
Touch' Mediated by Visual Displays and
Its Relationship with Body Ownership . . 58--66
Fernanda Brandi and
Burak Cizmeci and
Eckehard Steinbach On the Perceptual Artifacts Introduced
by Packet Losses on the Forward Channel
of Haptic Telemanipulation Sessions . . 67--78
Gwénaël Changeon and
Delphine Graeff and
Margarita Anastassova and
José Lozada Tactile Emotions: a Vibrotactile Tactile
Gamepad for Transmitting Emotional
Messages to Children with Autism . . . . 79--90
George H. Van Doorn and
Vladimir Dubaj and
Dianne B. Wuillemin and
Barry L. Richardson Cognitive Load Can Explain Differences
in Active and Passive Touch . . . . . . 91--102
Satoshi Endo and
Geoff Pegman and
Mark Burgin and
Tarek Toumi and
Alan M. Wing Haptics in Between-Person Object
Transfer . . . . . . . . . . . . . . . . 103--111
Ignacio Galiana and
Jose Breñosa and
Jorge Barrio and
Manuel Ferre New Control Architecture Based on PXI
for a $3$-Finger Haptic Device Applied
to Virtual Manipulation . . . . . . . . 112--123
Laurent George and
Maud Marchal and
Loeiz Glondu and
Anatole Lécuyer Combining Brain-Computer Interfaces and
Haptics: Detecting Mental Workload to
Adapt Haptic Assistance . . . . . . . . 124--135
Christos Giachritsis and
Gary Randall and
Samuel Roselier Development of Intuitive Tactile
Navigational Patterns . . . . . . . . . 136--147
Luca Greci and
Marco Sacco and
Nicola Cau and
Flavia Buonanno FootGlove: a Haptic Device Supporting
the Customer in the Choice of the Best
Fitting Shoes . . . . . . . . . . . . . 148--159
Netta Gurari and
Jason Wheeler and
Amy Shelton and
Allison M. Okamura Discrimination of Springs with Vision,
Proprioception, and Artificial Skin
Stretch Cues . . . . . . . . . . . . . . 160--172
Taku Hachisu and
Michi Sato and
Shogo Fukushima and
Hiroyuki Kajimoto Augmentation of Material Property by
Modulating Vibration Resulting from
Tapping . . . . . . . . . . . . . . . . 173--180
Felix G. Hamza-Lup and
William H. Baird Feel the Static and Kinetic Friction . . 181--192
Christian Hatzfeld and
Roland Werthschützky Mechanical Impedance as Coupling
Parameter of Force and Deflection
Perception: Experimental Evaluation . . 193--204
Koichi Hirota and
Kazuyoshi Tagawa Acquisition of Elastically Deformable
Object Model Based on Measurement . . . 205--217
Charles Hudin and
José Lozada and
Michael Wiertlewski and
Vincent Hayward Tradeoffs in the Application of
Time-Reversed Acoustics to Tactile
Stimulation . . . . . . . . . . . . . . 218--226
Anonymous Front Matter . . . . . . . . . . . . . . ??
Jalal Awed and
Imad H. Elhajj and
Nadiya Slobodenyuk Haptic Force Perception in Bimanual
Manipulation . . . . . . . . . . . . . . 1--6
Wouter M. Bergmann Tiest and
Connie Lyklema and
Astrid M. L. Kappers Investigating the Effect of Area of
Stimulation on Cutaneous and
Proprioceptive Weight Perception . . . . 7--12
Sandra Coelho and
Miguel V. Correia Rediscovering the Haptic Sense through
Crossroads of Art and Design Research 13--18
Nienke B. Debats and
Idsart Kingma and
Peter J. Beek and
Jeroen B. J. Smeets The Precision of ``Haptic'' Rod Length
Perception Is Reduced by Lack of Visual
Precision . . . . . . . . . . . . . . . 19--24
George H. Van Doorn and
Barry L. Richardson and
Mark A. Symmons and
Jacqui L. Howell Cutaneous Inputs Yield Judgments of Line
Length That Are Equal to, or Better
Than, Those Based on Kinesthetic Inputs 25--30
Marieke C. W. van der Graaff and
Eli Brenner and
Jeroen B. J. Smeets Is the Curvature in Hand Movements to
Haptic Targets in the Mid Sagittal Plane
Caused by a Misjudgment in Direction? 31--36
Florimond Guéniat and
Yoren Gaffary and
Luc Pastur and
Ammi Mehdi Haptic Stimulus for the Discrimination
between Intrinsic Properties of Dynamic
Systems . . . . . . . . . . . . . . . . 37--42
Christian Hatzfeld and
Roland Werthschützky Just Noticeable Differences of
Low-Intensity Vibrotactile Forces at the
Fingertip . . . . . . . . . . . . . . . 43--48
Kiuk Gwak and
Jun-Cheol Park and
Dae-Shik Kim A Novel Stimulation Method Based on a
Neuromorphic Mechanoreceptor Model for
Haptic Illusion . . . . . . . . . . . . 49--54
Jacqui L. Howell and
Mark A. Symmons and
George H. Van Doorn The Misperception of Length in Vision,
Haptics and Audition . . . . . . . . . . 55--60
Inwook Hwang and
Seungmoon Choi Effect of Mechanical Ground on the
Vibrotactile Perceived Intensity of a
Handheld Object . . . . . . . . . . . . 61--66
Hiroyuki Kajimoto Design of Cylindrical Whole-Hand Haptic
Interface Using Electrocutaneous Display 67--72
Tuuli Keskinen and
Markku Turunen and
Roope Raisamo and
Grigori Evreinov and
Eemeli Haverinen Utilizing Haptic Feedback in Drill Rigs 73--78
Scinob Kuroki and
Junji Watanabe and
Shin'ya Nishida Dissociation of Vibrotactile Frequency
Discrimination Performances for
Supra-Threshold and Near-Threshold
Vibrations . . . . . . . . . . . . . . . 79--84
Chang-Gyu Lee and
Ian Oakley and
Jeha Ryu Exploring the Impact of Visual-Haptic
Registration Accuracy in Augmented
Reality . . . . . . . . . . . . . . . . 85--90
Jong-uk Lee and
Jeong-Mook Lim and
Heesook Shin and
Ki-Uk Kyung SHIFT: Interactive Smartphone Bumper
Case . . . . . . . . . . . . . . . . . . 91--96
Takuya Nakano and
Shota Saji and
Yasuyuki Yanagida Indicating Wind Direction Using a
Fan-Based Wind Display . . . . . . . . . 97--102
Ryuta Okazaki and
Hiroyuki Kajimoto and
Vincent Hayward Vibrotactile Stimulation Can Affect
Auditory Loudness: a Pilot Study . . . . 103--108
Frederik Wilhelm Jozef Olierook and
Mathias Funk Hands Reaching Out of Dreamland: a
Haptic Peripheral Alarm Clock . . . . . 109--114
Kensuke Oshima and
Shigeru Ichihara How Finger Movement Speed Affects
Braille Pattern Recognition . . . . . . 115--120
Anonymous Front Matter . . . . . . . . . . . . . . ??
Noreen Kamal and
Sidney Fels Determining the Determinants of Health
Behaviour Change through an Online
Social Network . . . . . . . . . . . . . 1--12
Winslow Burleson and
Naomi Newman and
Ryan Brotman Empowering Independent Living for People
with Autism: Designing Supportive,
Low-Cost, Interactive E-Health
Environments . . . . . . . . . . . . . . 13--30
Samir Chatterjee and
Jongbok Byun Persuasive Sensing: a Novel In-Home
Monitoring Technology to Assist Elderly
Adult Diabetic Patients . . . . . . . . 31--42
Luca Chittaro and
Riccardo Sioni Turning the Classic Snake Mobile Game
into a Location--Based Exergame that
Encourages Walking . . . . . . . . . . . 43--54
Matthijs Jan Zwinderman and
Azadeh Shirzad Phone Row: a Smartphone Game Designed to
Persuade People to Engage in
Moderate-Intensity Physical Activity . . 55--66
Morten Aagaard and
Peter Òhrstròm Developing Persuasive Technology for ASD
Challenged Teenagers . . . . . . . . . . 67--78
Sandy Schumann and
Olivier Klein and
Karen Douglas Talk to Act: How Internet Use Empowers
Users to Participate in Collective
Actions Offline . . . . . . . . . . . . 79--89
Cees Midden and
Jaap Ham The Illusion of Agency: The Influence of
the Agency of an Artificial Agent on Its
Persuasive Power . . . . . . . . . . . . 90--99
Luciano Gamberini and
Anna Spagnolli Tailoring Feedback to Users' Actions in
a Persuasive Game for Household
Electricity Conservation . . . . . . . . 100--111
S. Shyam Sundar and
Saraswathi Bellur Motivational Technologies: a Theoretical
Framework for Designing Preventive
Health Applications . . . . . . . . . . 112--122
Jilles Smids The Voluntariness of Persuasive
Technology . . . . . . . . . . . . . . . 123--132
Lars Müller and
Verónica Rivera-Pelayo Persuasion and Reflective Learning:
Closing the Feedback Loop . . . . . . . 133--144
Thijs Waardenburg and
Robbert Winkel Normative Social Influence in Persuasive
Technology: Intensity versus
Effectiveness . . . . . . . . . . . . . 145--156
Filip Drozd and
Tuomas Lehto Exploring Perceived Persuasiveness of a
Behavior Change Support System: a
Structural Model . . . . . . . . . . . . 157--168
Nupur Bhatnagar and
Abhishek Sinha Biometric Monitoring as a Persuasive
Technology: Ensuring Patients Visit
Health Centers in India's Slums . . . . 169--180
Susan Ferebee and
James Davis The Neural Persuasion Model: Aligning
Neural Readiness, Perceived Need, and
Intervention Strategies . . . . . . . . 181--192
Isaac Wiafe and
Muna M. Alhammad Analyzing the Persuasion Context of the
Persuasive Systems Design Model with the
$3$D-RAB Model . . . . . . . . . . . . . 193--202
Rita Orji and
Regan L. Mandryk Towards a Data-Driven Approach to
Intervention Design: a Predictive Path
Model of Healthy Eating Determinants . . 203--214
Luca Chittaro Passengers' Safety in Aircraft
Evacuations: Employing Serious Games to
Educate and Persuade . . . . . . . . . . 215--226
Ingo Pribik and
Alexander Felfernig Towards Persuasive Technology for
Software Development Environments: An
Empirical Study . . . . . . . . . . . . 227--238
Anonymous Front Matter . . . . . . . . . . . . . . ??
Bryan He Optimal Binary Representation of Mosaic
Floorplans and Baxter Permutations . . . 1--12
Jiun-Jie Wang and
Xin He Succinct Strictly Convex Greedy Drawing
of $3$-Connected Plane Graphs . . . . . 13--25
Longcheng Liu and
Yong Chen and
Biao Wu and
Enyu Yao Weighted Inverse Minimum Cut Problem
under the Sum-Type Hamming Distance . . 26--35
Chenglin Fan and
Jun Luo and
Wencheng Wang Voronoi Diagram with Visual Restriction 36--46
Xuehou Tan and
Bo Jiang Minimization of the Maximum Distance
between the Two Guards Patrolling a
Polygonal Region . . . . . . . . . . . . 47--57
Minghui Jiang On Covering Points with Minimum Turns 58--69
Xia Hua On Envy-Free Pareto Efficient Pricing 70--81
Yong Zhang and
Francis Y. L. Chin Online Pricing for Multi-type of Items 82--92
Yiwei Jiang and
Zewei Weng and
Jueliang Hu Algorithms with Limited Number of
Preemptions for Scheduling on Parallel
Machines . . . . . . . . . . . . . . . . 93--104
Danny Z. Chen and
Xiaomin Liu and
Haitao Wang Computing Maximum Non-crossing Matching
in Convex Bipartite Graphs . . . . . . . 105--116
Kazuhide Nishikawa and
Takao Nishizeki Algorithms for Bandwidth Consecutive
Multicolorings of Graphs . . . . . . . . 117--128
Yu Song and
Tian Liu and
Ke Xu Independent Domination on Tree Convex
Bipartite Graphs . . . . . . . . . . . . 129--138
Deshi Ye and
Lili Mei On-Line Scheduling of Parallel Jobs in
Heterogeneous Multiple Clusters . . . . 139--148
Evripidis Bampis and
Dimitrios Letsios On Multiprocessor Temperature-Aware
Scheduling Problems . . . . . . . . . . 149--160
Yan Lan and
Xin Chen and
Ning Ding and
György Dósa Online Minimum Makespan Scheduling with
a Buffer . . . . . . . . . . . . . . . . 161--171
Richard Beigel and
Bin Fu A Dense Hierarchy of Sublinear Time
Approximation Schemes for Bin Packing 172--181
Bin Fu Multivariate Polynomial Integration and
Differentiation Are Polynomial Time
Inapproximable Unless P=NP . . . . . . . 182--191
Bangsheng Tang Some Remarks on the Incompressibility of
Width-Parameterized SAT Instances . . . 192--198
Jianer Chen and
Henning Fernau and
Peter Shaw Kernels for Packing and Covering
Problems . . . . . . . . . . . . . . . . 199--211
Junping Zhou and
Minghao Yin The Worst-Case Upper Bound for Exact
$3$-Satisfiability with the Number of
Clauses as the Parameter . . . . . . . . 212--223
Anonymous Front Matter . . . . . . . . . . . . . . ??
Dmytro Babik and
Lakshmi S. Iyer and
Eric W. Ford Towards a Comprehensive Online Peer
Assessment System . . . . . . . . . . . 1--8
Anders Hjalmarsson and
Daniel Rudmark Designing Digital Innovation Contests 9--27
Bala Iyer and
George Wyner Evaluating APIs: a Call for Design
Science Research . . . . . . . . . . . . 28--35
Arvind Karunakaran and
Sandeep Purao Designing for Recombination: Process
Design through Template Combination . . 36--51
Heikki Lempinen and
Matti Rossi and
Virpi Kristiina Tuunainen Design Principles for
Inter-Organizational Systems Development
--- Case Hansel . . . . . . . . . . . . 52--65
Lysanne Lessard and
Eric Yu Using Design Science Research to Develop
a Modeling Technique for Service Design 66--77
Amy Van Looy and
Manu De Backer and
Geert Poels Towards a Decision Tool for Choosing a
Business Process Maturity Model . . . . 78--87
Wendy Lucas and
Tamara Babaian Implementing Design Principles for
Collaborative ERP Systems . . . . . . . 88--107
Martin Meyer and
Markus Helfert and
Brian Donnellan and
Jim Kenneally Applying Design Science Research for
Enterprise Architecture Business Value
Assessments . . . . . . . . . . . . . . 108--121
Sandeep Purao and
Narasimha Bolloju and
Chuan Hoo Tan Designing-in-the-Large: Combining Local
Perspectives to Generate Enterprise-Wide
Integration Solutions . . . . . . . . . 122--138
Rohit Valecha and
Raj Sharman and
Raghav Rao and
Shambhu Upadhyaya Emergency Response System Design: An
Examination of Emergency Communication
Messages . . . . . . . . . . . . . . . . 139--146
Upkar Varshney An Approach for Smart Artifacts for
Mobile Advertising . . . . . . . . . . . 147--151
Matthias Voigt and
Björn Niehaves and
Jörg Becker Towards a Unified Design Theory for
Creativity Support Systems . . . . . . . 152--173
M. Lisa Yeo and
Ofer Arazy What Makes Corporate Wikis Work? Wiki
Affordances and Their Suitability for
Corporate Knowledge Work . . . . . . . . 174--190
Andreas Drechsler Design Science as Design of Social
Systems --- Implications for Information
Systems Research . . . . . . . . . . . . 191--205
Wolfgang Maass and
Sabine Janzen Towards Design Engineering of Ubiquitous
Information Systems . . . . . . . . . . 206--219
Roel Wieringa and
Ay\cse Moralì Technical Action Research as a
Validation Method in Information Systems
Design Science . . . . . . . . . . . . . 220--238
Arjan Knol and
Henk Sol and
Johan van Wamelen Decision Enhancement for Sourcing with
Shared Service Centres in the Dutch
Government . . . . . . . . . . . . . . . 239--255
Jan Pries-Heje and
Lene Pries-Heje Designing a Framework for Virtual
Management and Team Building . . . . . . 256--270
António Rito Silva and
Michael Rosemann Integrating Organisational Design with
IT Design . . . . . . . . . . . . . . . 271--286
Anonymous Front Matter . . . . . . . . . . . . . . ??
John Hopcroft On the Impact of Turing Machines . . . . 1--2
S. Barry Cooper From Turing Machine to Morphogenesis:
Forming and Informing Computation . . . 3--10
Richard M. Karp Theory of Computation as an Enabling
Tool for the Sciences . . . . . . . . . 11--11
Deyi Li and
Liwei Huang Interaction and Collective Intelligence
on the Internet . . . . . . . . . . . . 12--22
Butler Lampson What Computers Do: Model, Connect,
Engage . . . . . . . . . . . . . . . . . 23--26
Wei Li R-Calculus: a Logical Inference System
for Scientific Discovery . . . . . . . . 27--27
Andrew Chi-Chih Yao Quantum Computing: a Great Science in
the Making . . . . . . . . . . . . . . . 28--28
Jon Kleinberg The Convergence of Social and
Technological Networks . . . . . . . . . 29--29
Yicheng Pan Principles of Network Computing . . . . 30--39
Pan Peng The Small Community Phenomenon in
Networks: Models, Algorithms and
Applications . . . . . . . . . . . . . . 40--49
A. Bonato and
D. Mitsche and
P. Pra\lat Vertex-Pursuit in Hierarchical Social
Networks . . . . . . . . . . . . . . . . 50--60
Zipeng Zhang and
Xinyu Feng and
Ming Fu and
Zhong Shao and
Yong Li A Structural Approach to Prophecy
Variables . . . . . . . . . . . . . . . 61--71
Shuling Wang and
Naijun Zhan and
Dimitar Guelev An Assume/Guarantee Based Compositional
Calculus for Hybrid CSP . . . . . . . . 72--83
Ernst-Rüdiger Olderog Automatic Verification of Real-Time
Systems with Rich Data: An Overview . . 84--93
Deepak Kapur Program Analysis Using
Quantifier-Elimination Heuristics . . . 94--108
Albert F. Lawrence and
Séastien Phan and
Mark Ellisman Electron Tomography and Multiscale
Biology . . . . . . . . . . . . . . . . 109--130
Hiro Ito and
Susumu Kiyoshima and
Yuichi Yoshida Constant-Time Approximation Algorithms
for the Knapsack Problem . . . . . . . . 131--142
Jingguo Bi and
Qi Cheng Lower Bounds of Shortest Vector Lengths
in Random NTRU Lattices . . . . . . . . 143--155
Michal \vCerný and
Miroslav Rada Polynomial Time Construction of
Ellipsoidal Approximations of Zonotopes
Given by Generator Descriptions . . . . 156--163
Alexandru Popa and
Prudence W. H. Wong and
Fencol C. C. Yung Hardness and Approximation of the
Asynchronous Border Minimization Problem 164--176
Anonymous Front Matter . . . . . . . . . . . . . . ??
Paola Flocchini Distributed Algorithms by Forgetful
Mobile Robots . . . . . . . . . . . . . 1--1
Giuseppe Persiano Stability and Metastability of the Logit
Dynamics of Strategic Games . . . . . . 2--2
Jorge Urrutia Art Galleries, $k$-modems, and
$k$-convexity . . . . . . . . . . . . . 3--3
Terry Anderson and
Therese Biedl The Vulcan Game of Kal-Toh: Finding or
Making Triconnected Planar Subgraphs . . 4--15
Esther M. Arkin and
Alon Efrat and
George Hart and
Irina Kostitsyna Scandinavian Thins on Top of Cake: On
the Smallest One-Size-Fits-All Box . . . 16--27
Michael A. Bender and
Ritwik Bose and
Rezaul Chowdhury and
Samuel McCauley The Kissing Problem: How to End a
Gathering When Everyone Kisses Everyone
Else Goodbye . . . . . . . . . . . . . . 28--39
Till Bruckdorfer and
Michael Kaufmann Mad at Edge Crossings? Break the Edges! 40--50
Leo Brueggeman and
Michael Fellows and
Rudolf Fleischer and
Martin Lackner Train Marshalling Is Fixed Parameter
Tractable . . . . . . . . . . . . . . . 51--56
Sarah Cannon and
Mashhood Ishaque and
Csaba D. Tóth Conflict-Free Graph Orientations with
Parity Constraints . . . . . . . . . . . 57--68
Ferdinando Cicalese The Multi-interval Ulam--Rényi Game . . . 69--80
Erik D. Demaine and
Martin L. Demaine and
Yair N. Minsky Picture-Hanging Puzzles . . . . . . . . 81--93
Stefan Dobrev and
Lata Narayanan and
Jaroslav Opatrny Optimal Sensor Networks for Area
Monitoring Using Rotating and Beam
Sensors . . . . . . . . . . . . . . . . 94--106
Swan Dubois and
Sébastien Tixeuil and
Nini Zhu The Byzantine Brides Problem . . . . . . 107--118
Amr Elmasry and
Jyrki Katajainen Lean Programs, Branch Mispredictions,
and Sorting . . . . . . . . . . . . . . 119--130
Jakob Engel and
Markus Holzer and
Oliver Ruepp and
Frank Sehnke On Computer Integrated Rationalized
Crossword Puzzle Manufacturing . . . . . 131--141
David Eppstein Solving Single-Digit Sudoku Subproblems 142--153
Paola Flocchini and
Matthew Kellett and
Peter C. Mason and
Nicola Santoro Finding Good Coffee in Paris . . . . . . 154--165
Fedor V. Fomin and
Frédéric Giroire and
Alain Jean-Marie and
Dorian Mazauric To Satisfy Impatient Web Surfers Is Hard 166--176
Fedor V. Fomin and
Pinar Heggernes and
Erik Jan van Leeuwen Making Life Easier for Firefighters . . 177--188
Martin Fürer Counting Perfect Matchings in Graphs of
Degree 3 . . . . . . . . . . . . . . . . 189--197
Anonymous Front Matter . . . . . . . . . . . . . . ??
HyunYong Lee and
Akihiro Nakao Efficient User-Assisted Content
Distribution over Information-Centric
Network . . . . . . . . . . . . . . . . 1--12
Konstantinos V. Katsaros and
Nikos Fotiou and
Xenofon Vasilakos and
Christopher N. Ververidis On Inter-Domain Name Resolution for
Information-Centric Networks . . . . . . 13--26
Wei Koong Chai and
Diliang He and
Ioannis Psaras and
George Pavlou Cache ``Less for More'' in
Information-Centric Networks . . . . . . 27--40
Shuo Guo and
Haiyong Xie and
Guangyu Shi Collaborative Forwarding and Caching in
Content Centric Networks . . . . . . . . 41--55
Norbert Blenn and
Christian Doerr and
Bas Van Kester and
Piet Van Mieghem Crawling and Detecting Community
Structure in Online Social Networks
Using Local Information . . . . . . . . 56--67
Jin Jiang and
Claudio E. Casetti Distributed Content Backup and Sharing
Using Social Information . . . . . . . . 68--81
Nuno Apolónia and
Paulo Ferreira and
Luís Veiga Trans-Social Networks for Distributed
Processing . . . . . . . . . . . . . . . 82--96
Norbert Blenn and
Kassandra Charalampidou and
Christian Doerr Context-Sensitive Sentiment
Classification of Short Colloquial Text 97--108
Marcelo F. Vasconcelos and
Ronaldo M. Salles Resilience in Computer Network
Management . . . . . . . . . . . . . . . 109--120
Béla Genge and
Christos Siaterlis An Experimental Study on the Impact of
Network Segmentation to the Resilience
of Physical Processes . . . . . . . . . 121--134
Udi Ben-Porat and
Anat Bremler-Barr and
Hanoch Levy and
Bernhard Plattner On the Vulnerability of Hardware Hash
Tables to Sophisticated Attacks . . . . 135--148
Cong Li and
Huijuan Wang and
Piet Van Mieghem Degree and Principal Eigenvectors in
Complex Networks . . . . . . . . . . . . 149--160
Isil Burcu Barla and
Dominic A. Schupke and
Georg Carle Resilient Virtual Network Design for
End-to-End Cloud Services . . . . . . . 161--174
Nico Janssens and
Xueli An and
Koen Daenen and
Claudio Forlivesi Dynamic Scaling of Call-Stateful SIP
Services in the Cloud . . . . . . . . . 175--189
Vijay Mann and
Akanksha Gupta and
Partha Dutta and
Anilkumar Vishnoi and
Parantapa Bhattacharya Remedy: Network-Aware Steady State VM
Management for Data Centers . . . . . . 190--204
Junjie Liu and
Yingke Xie and
Gaogang Xie and
Layong Luo and
Fuxing Zhang and
Xiaolong Wu Building a Flexible and Scalable Virtual
Hardware Data Plane . . . . . . . . . . 205--216
Hung Quoc Vo and
Olav Lysne and
Amund Kvalbein Permutation Routing for Increased
Robustness in IP Networks . . . . . . . 217--231
Meng Shen and
Hongying Liu and
Ke Xu and
Ning Wang and
Yifeng Zhong Routing On Demand: Toward the
Energy-Aware Traffic Engineering with
OSPF . . . . . . . . . . . . . . . . . . 232--246
Frédéric Giroire and
Joanna Moulierac and
Truong Khoa Phan and
Frédéric Roudaut Minimization of Network Power
Consumption with Redundancy Elimination 247--258
Yang Xiang and
Zhiliang Wang and
Jianping Wu and
Xingang Shi and
Xia Yin Sign What You Really Care about ---
Secure BGP AS Paths Efficiently . . . . 259--273
Anonymous Front Matter . . . . . . . . . . . . . . ??
Julius Rückert and
Osama Abboud and
Thomas Zinner and
Ralf Steinmetz and
David Hausheer Quality Adaptation in P2P Video
Streaming Based on Objective QoE Metrics 1--14
Fabio V. Hecht and
Thomas Bocek and
Flávio Roberto Santos and
Burkhard Stiller Playback Policies for Live and On-Demand
P2P Video Streaming . . . . . . . . . . 15--28
Roberto Roverso and
Sameh El-Ansary and
Seif Haridi SmoothCache: HTTP-Live Streaming Goes
Peer-to-Peer . . . . . . . . . . . . . . 29--43
K.-W. Hwang and
D. Applegate and
A. Archer and
V. Gopalakrishnan and
S. Lee and
V. Misra Leveraging Video Viewing Patterns for
Optimal Content Placement . . . . . . . 44--58
Haiyang Wang and
Feng Wang and
Jiangchuan Liu and
Ke Xu Enhancing Traffic Locality in BitTorrent
via Shared Trackers . . . . . . . . . . 59--70
Yong Zhao and
Zhibin Zhang and
Ting He and
Alex X. Liu and
Li Guo and
Binxing Fang A Task-Based Model for the Lifespan of
Peer-to-Peer Swarms . . . . . . . . . . 71--83
Glauber D. Gonçalves and
Anna Guimarães and
Alex Borges Vieira and
Ítalo Cunha Using Centrality Metrics to Predict Peer
Cooperation in Live Streaming
Applications . . . . . . . . . . . . . . 84--96
Seungbae Kim and
Jinyoung Han and
Taejoong Chung and
Hyun-chul Kim and
Ted ``Taekyoung'' Kwon Content Publishing and Downloading
Practice in BitTorrent . . . . . . . . . 97--110
Jakub Mikians and
Amogh Dhamdhere and
Constantine Dovrolis and
Pere Barlet-Ros Towards a Statistical Characterization
of the Interdomain Traffic Matrix . . . 111--123
Yujing Liu and
Xiapu Luo and
Rocky K. C. Chang and
Jinshu Su Characterizing Inter-domain Rerouting
after Japan Earthquake . . . . . . . . . 124--135
Amogh Dhamdhere and
Himalatha Cherukuru and
Constantine Dovrolis and
Kc Claffy Measuring the Evolution of Internet
Peering Agreements . . . . . . . . . . . 136--148
Syed Hasan and
Sergey Gorinsky Obscure Giants: Detecting the
Provider-Free ASes . . . . . . . . . . . 149--160
Stefan Hommes and
Radu State and
Thomas Engel Detecting Stealthy Backdoors with
Association Rule Mining . . . . . . . . 161--171
Zichao Yang and
John C. S. Lui Security Adoption in Heterogeneous
Networks: the Influence of
Cyber-Insurance Market . . . . . . . . . 172--183
Yves Igor Jerschow and
Martin Mauve Secure Client Puzzles Based on Random
Beacons . . . . . . . . . . . . . . . . 184--197
Mentari Djatmiko and
Mathieu Cunche and
Roksana Boreli and
Aruna Seneviratne Heterogeneous Secure Multi-Party
Computation . . . . . . . . . . . . . . 198--210
Tania Jiménez and
Yezekael Hayel and
Eitan Altman Competition in Access to Content . . . . 211--222
Raul Landa and
Eleni Mykoniati and
Richard G. Clegg and
David Griffin and
Miguel Rio Modelling the Tradeoffs in Overlay-ISP
Cooperation . . . . . . . . . . . . . . 223--237
Dimitra Gkorou and
Tamás Vinkó and
Nitin Chiluka and
Johan Pouwelse and
Dick Epema Reducing the History in Decentralized
Interaction-Based Reputation Systems . . 238--251
Isabel Amigo and
Pablo Belzarena and
Sandrine Vaton On the Problem of Revenue Sharing in
Multi-domain Federations . . . . . . . . 252--264
Anonymous Front Matter . . . . . . . . . . . . . . ??
Huaizhou Shi and
R. Venkatesha Prasad and
Vijay S. Rao and
I. G. M. M. Niemegeers A Fairness Model for Resource Allocation
in Wireless Networks . . . . . . . . . . 1--9
Vincenzo Ciancaglini and
Luigi Liquori and
Giang Ngo Hoang and
Petar Maksimovi\'c An Extension and Cooperation Mechanism
for Heterogeneous Overlay Networks . . . 10--18
Yong Xiao and
Luiz A. DaSilva Dynamic Pricing Coalitional Game for
Cognitive Radio Networks . . . . . . . . 19--26
Dario Sabella and
Marco Caretti and
William Tomaselli and
Valerio Palestini and
Bruno Cendón Evaluation of ON-OFF Schemes and Linear
Prediction Methods for Increasing Energy
Efficiency in Mobile Broadband Networks 27--34
Javier Martín-Hernández and
Christian Doerr and
Johannes Lessmann and
Marcus Schöller Challenge-Aware Traffic Protection in
Wireless Mobile Backhaul Networks . . . 35--42
Mohtasim Abbassi and
Shahbaz Khan and
M. Rahman A Distributed Signaling Fast Mobile IPv6
Scheme for Next Generation Heterogeneous
IP Networks . . . . . . . . . . . . . . 43--51
António Serrador and
Luís M. Correia Energy Efficiency Gains Using VHOs in
Heterogeneous Networks . . . . . . . . . 52--62
Xavier Misseri and
Ivan Gojmerac and
Jean-Louis Rougier Inter-Domain Route Diversity for the
Internet . . . . . . . . . . . . . . . . 63--71
Antonio Ghezzi A Proposal of Business Model Design
Parameters for Future Internet Carriers 72--79
Mohamed Lamine Lamali and
Dominique Barth and
Johanne Cohen Reputation-Aware Learning for SLA
Negotiation . . . . . . . . . . . . . . 80--88
Andreas Sackl and
Patrick Zwickl and
Peter Reichl From Quality of Experience to
Willingness to Pay for Interconnection
Service Quality . . . . . . . . . . . . 89--96
Patrick Zwickl and
Peter Reichl An Instance-Based Approach for the
Quantitative Assessment of Key Value
Network Dependencies . . . . . . . . . . 97--104
Anand Raju and
Vânia Gonçalves and
Sven Lindmark and
Pieter Ballon Evaluating Impacts of Oversubscription
on Future Internet Business Models . . . 105--112
Eleni Agiatzidou and
Costas Courcoubetis and
Olivier Dugeon and
Finn-Tore Johansen Inter-domain Coordination Models . . . . 113--120
Eitan Altman In Which Content to Specialize? A Game
Theoretic Analysis . . . . . . . . . . . 121--125
Till Wollenberg Estimation of Expectable Network Quality
in Wireless Mesh Networks . . . . . . . 126--132
Ondrej Krejcar Development of Localization Module for
Various Smart Devices Platforms . . . . 133--138
Marek Dvorsky and
Libor Michalek and
Pavel Moravec and
Roman Sebesta Improved GSM-Based Localization by
Incorporating Secondary Network
Characteristics . . . . . . . . . . . . 139--144
Ivan Zelinka and
Donald Davendra and
Lenka Skanderova Visualization of Complex Networks
Dynamics: Case Study . . . . . . . . . . 145--150
Hakan Kavlak and
Hakki Ilk PCI Planning Strategies for Long Term
Evolution Networks . . . . . . . . . . . 151--156
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Isra Al-Turaiki and
Ghada Badr and
Hassan Mathkour Trie-based Apriori Motif Discovery
Approach . . . . . . . . . . . . . . . . 1--12
Laurent Bulteau and
Minghui Jiang Inapproximability of (1,2)-Exemplar
Distance . . . . . . . . . . . . . . . . 13--23
Daniele Catanzaro and
Martine Labbé A Mixed Integer Programming Model for
the Parsimonious Loss of Heterozygosity
Problem . . . . . . . . . . . . . . . . 24--35
Xi Chen and
Chen Wang and
Ayesha N. Shajahan Reconstruction of Transcription
Regulatory Networks by Stability-Based
Network Component Analysis . . . . . . . 36--47
Yann Christinat and
Bernard M. E. Moret A Transcript Perspective on Evolution 48--59
Ralph W. Crosby and
Tiffani L. Williams A Fast Algorithm for Computing the
Quartet Distance for Large Sets of
Evolutionary Trees . . . . . . . . . . . 60--71
Peter Damaschke and
Leonid Molokov Error Propagation in Sparse Linear
Systems with Peptide-Protein Incidence
Matrices . . . . . . . . . . . . . . . . 72--83
Bhaskar DasGupta Models and Algorithmic Tools for
Computational Processes in Cellular
Biology: Recent Developments and Future
Directions . . . . . . . . . . . . . . . 84--86
Akshay Deepak and
Jianrong Dong Identifying Rogue Taxa through Reduced
Consensus: NP-Hardness and Exact
Algorithms . . . . . . . . . . . . . . . 87--98
Cynthia J. Gibas Analytics Approaches for the Era of
10,000* Genomes *and Counting . . . . . 99--101
Pawe\l Górecki and
J. Gordon Burleigh GTP Supertrees from Unrooted Gene Trees:
Linear Time Algorithms for NNI Based
Local Searches . . . . . . . . . . . . . 102--114
Pawe\l Górecki and
Oliver Eulenstein A Robinson--Foulds Measure to Compare
Unrooted Trees with Rooted Trees . . . . 115--126
Fei Guo and
Shuai Cheng Li and
Lusheng Wang P-Binder: a System for the
Protein-Protein Binding Sites
Identification . . . . . . . . . . . . . 127--138
Bonnie Kirkpatrick Non-identifiable Pedigrees and a
Bayesian Solution . . . . . . . . . . . 139--152
Juntao Li and
Kwok Pui Choi Iterative Piecewise Linear Regression to
Accurately Assess Statistical
Significance in Batch Confounded
Differential Expression Analysis . . . . 153--164
Si Li and
Kwok Pui Choi and
Taoyang Wu and
Louxin Zhang Reconstruction of Network Evolutionary
History from Extant Network Topology and
Duplication History . . . . . . . . . . 165--176
Victor Missirian and
Isabelle Henry and
Luca Comai POPE: Pipeline of Parentally-Biased
Expression . . . . . . . . . . . . . . . 177--188
Ji\vrí Novák and
David Hoksza and
Jakub Loko\vc On Optimizing the Non-metric Similarity
Search in Tandem Mass Spectra by
Clustering . . . . . . . . . . . . . . . 189--200
A\"\ida Ouangraoua and
Krister M. Swenson On the Comparison of Sets of Alternative
Transcripts . . . . . . . . . . . . . . 201--212
Hyun Jung Park and
Luay Nakhleh MURPAR: a Fast Heuristic for Inferring
Parsimonious Phylogenetic Networks from
Multiple Gene Trees . . . . . . . . . . 213--224
Anonymous Front Matter . . . . . . . . . . . . . . ??
Michael Codish Programming with Boolean Satisfaction 1--1
Tachio Terauchi Automated Verification of Higher-Order
Functional Programs . . . . . . . . . . 2--2
Stephanie Weirich Dependently-Typed Programming in GHC . . 3--3
Beniamino Accattoli and
Luca Paolini Call-by-Value Solvability, Revisited . . 4--16
Sergio Antoy and
Arthur Peters Compiling a Functional Logic Language:
The Basic Scheme . . . . . . . . . . . . 17--31
Zena M. Ariola and
Paul Downen and
Hugo Herbelin Classical Call-by-Need Sequent Calculi:
The Unity of Semantic Artifacts . . . . 32--46
Dariusz Biernacki and
Sergue\"\i Lenglet Normal Form Bisimulations for
Delimited-Control Operators . . . . . . 47--61
Gerlof Bouma Real-Time Persistent Queues and Deques
with Logic Variables (Declarative Pearl) 62--72
Rafael Caballero and
Yolanda García-Ruiz Declarative Debugging of Wrong and
Missing Answers for SQL Views . . . . . 73--87
Ignacio Castiñeiras and
Fernando Sáenz-Pérez Improving the Performance of FD
Constraint Solving in a CFLP System . . 88--103
Pablo Chico de Guzmán and
Manuel Carro A General Implementation Framework for
Tabled CLP . . . . . . . . . . . . . . . 104--119
Sonia Estévez-Martín and
Jesús Correas Fernández Extending the $\mathcal{TOY}$ System
with the ECL$^i$PS$^e$ Solver over Sets
of Integers . . . . . . . . . . . . . . 120--135
Makoto Hamana Correct Looping Arrows from Cyclic Terms 136--150
Yoichi Hirai A Lambda Calculus for Gödel--Dummett
Logic Capturing Waitfreedom . . . . . . 151--165
Oleg Kiselyov Iteratees . . . . . . . . . . . . . . . 166--181
Jael Kriener and
Andy King Mutual Exclusion by Interpolation . . . 182--196
Oleg Lobachev Parallel Computation Skeletons with
Premature Termination Property . . . . . 197--212
Akimasa Morihata Calculational Developments of New
Parallel Algorithms for Size-Constrained
Maximum-Sum Segment Problems . . . . . . 213--227
Kristoffer H. Rose and
Lionel Villard and
Naoto Sato A Data Flow Language for Hybrid Query
and Programming Languages . . . . . . . 228--242
Neda Saeedloei and
Gopal Gupta Coinductive Constraint Logic Programming 243--259
Anonymous Front Matter . . . . . . . . . . . . . . ??
Abraham Bernstein Semantic Web/LD at a Crossroads: Into
the Garbage Can or To Theory? . . . . . 1--1
Jeroen van Grondelle New Audiences for Ontologies: Dealing
with Complexity in Business Processes 2--2
Alon Halevy Bringing (Web) Databases to the Masses 3--3
Aleksander Ko\lcz Large Scale Learning at Twitter . . . . 4--4
Monica S. Lam Musubi: a Decentralized Mobile Social
Web . . . . . . . . . . . . . . . . . . 5--5
Márta Nagy-Rothengass Data Value Chain in Europe . . . . . . . 6--6
Julius van de Laar Cutting through the Noise: How to Shape
Public Perception, Frame the Debate and
Effectively Engage Your Audience in the
Digital Age . . . . . . . . . . . . . . 7--7
Olaf Hartig SPARQL for a Web of Linked Data:
Semantics and Computability . . . . . . 8--23
Danica Damljanovic and
Milan Stankovic and
Philippe Laublet Linked Data-Based Concept
Recommendation: Comparison of Different
Methods in Open Innovation Scenario . . 24--38
Milan Stankovic and
Matthew Rowe and
Philippe Laublet Finding Co-solvers on Twitter, with a
Little Help from Linked Data . . . . . . 39--55
Andreas Wagner and
Thanh Tran Duc and
Günter Ladwig and
Andreas Harth and
Rudi Studer Top- k Linked Data Query Processing . . 56--71
Audun Stolpe and
Martin G. Skjæveland Preserving Information Content in RDF
Using Bounded Homomorphisms . . . . . . 72--86
Christophe Guéret and
Paul Groth and
Claus Stadler and
Jens Lehmann Assessing Linked Data Mappings Using
Network Measures . . . . . . . . . . . . 87--102
Melike Sah and
Vincent Wade A Novel Concept-Based Search for the Web
of Data Using UMBEL and a Fuzzy
Retrieval Model . . . . . . . . . . . . 103--118
Andriy Nikolov and
Mathieu d'Aquin and
Enrico Motta Unsupervised Learning of Link Discovery
Configuration . . . . . . . . . . . . . 119--133
Uta Lösch and
Stephan Bloehdorn and
Achim Rettinger Graph Kernels for RDF Data . . . . . . . 134--148
Axel-Cyrille Ngonga Ngomo and
Klaus Lyko EAGLE: Efficient Active Learning of Link
Specifications Using Genetic Programming 149--163
Xueyan Jiang and
Yi Huang and
Maximilian Nickel and
Volker Tresp Combining Information Extraction,
Deductive Reasoning and Machine Learning
for Relation Prediction . . . . . . . . 164--178
Isabel F. Cruz and
Alessio Fabiani and
Federico Caimi and
Cosmin Stroe and
Matteo Palmonari Automatic Configuration Selection Using
Ontology Matching Task Profiling . . . . 179--194
Emilio Rubiera and
Luis Polo and
Diego Berrueta and
Adil El Ghali TELIX: An RDF-Based Model for Linguistic
Annotation . . . . . . . . . . . . . . . 195--209
Anonymous Front Matter . . . . . . . . . . . . . . ??
Thepparit Banditwattanawong From Web Cache to Cloud Cache . . . . . 1--15
Jianzong Wang and
Yanjun Chen and
Daniel Gmach and
Changsheng Xie and
Jiguang Wan and
Rui Hua pCloud: An Adaptive I/O Resource
Allocation Algorithm with Revenue
Consideration over Public Clouds . . . . 16--30
JongBeom Lim and
Kwang-Sik Chung and
Sung-Ho Chin and
Heon-Chang Yu A Gossip-Based Mutual Exclusion
Algorithm for Cloud Environments . . . . 31--45
Zhuoran Qin and
Jixian Zhang and
Xuejie Zhang An Effective Partition Approach for
Elastic Application Development on
Mobile Cloud Computing . . . . . . . . . 46--53
Li Ruan and
Huixiang Wang and
Limin Xiao and
Mingfa Zhu and
Feibo Li Memory Virtualization for MIPS Processor
Based Cloud Server . . . . . . . . . . . 54--63
Chao-Tung Yang and
Wen-Chung Shih and
Chih-Lin Huang Implementation of a Distributed Data
Storage System with Resource Monitoring
on Cloud Computing . . . . . . . . . . . 64--73
Leila Abidi and
Christophe Cérin and
Kais Klai Design, Verification and Prototyping the
Next Generation of Desktop Grid
Middleware . . . . . . . . . . . . . . . 74--88
Pingli Gu and
Yanlei Shang and
Junliang Chen and
Bo Cheng and
Yan Jiang A Request Multiplexing Method Based on
Multiple Tenants in SaaS . . . . . . . . 89--97
Vishnuvardhan Mannava and
T. Ramesh An Adaptive Design Pattern for Genetic
Algorithm-Based Composition of Web
Services in Autonomic Computing Systems
Using SOA . . . . . . . . . . . . . . . 98--108
Weisen Pan and
Shizhan Chen and
Zhiyong Feng Service-Oriented Ontology and Its
Evolution . . . . . . . . . . . . . . . 109--121
Yunji Liang and
Xingshe Zhou and
Zhiwen Yu and
Bin Guo and
Yue Yang Energy Efficient Activity Recognition
Based on Low Resolution Accelerometer in
Smart Phones . . . . . . . . . . . . . . 122--136
Jian Cao and
Yihua Wu and
Minglu Li Energy Efficient Allocation of Virtual
Machines in Cloud Computing Environments
Based on Demand Forecast . . . . . . . . 137--151
Ashok Chandrasekar and
Karthik Chandrasekar and
Harini Ramasatagopan and
Rafica Abdul Rahim Energy Conservative Mobile Cloud
Infrastructure . . . . . . . . . . . . . 152--161
Junghoon Lee and
Gyung-Leen Park and
Ho-Young Kwak and
Jikwang Han Power-Constrained Actuator Coordination
for Agricultural Sensor Networks . . . . 162--171
Jennifer Kim Design and Evaluation of Mobile
Applications with Full and Partial
Offloadings . . . . . . . . . . . . . . 172--182
Fu-Quan Zhang and
Inwhee Joe A Cross-Layer Scheme to Improve TCP
Performance in Wireless Multi-hop
Networks . . . . . . . . . . . . . . . . 183--197
Jianxin Xue and
Xiaoju Dong A Fully Abstract View for Local Cause
Semantics . . . . . . . . . . . . . . . 198--209
Jignesh Kakkad and
Nandan Parameswaran Efficiency Considerations in Policy
Based Management in Resource Constrained
Devices . . . . . . . . . . . . . . . . 210--220
Di Zheng and
Jun Wang and
Ke-rong Ben Agent Based Quality Management
Middleware for Context-Aware Pervasive
Applications . . . . . . . . . . . . . . 221--230
Yabing Cui and
Chunming Hu and
Tianyu Wo and
Hanwen Wang A Virtual File System for Streaming
Loading of Virtual Software on Windows
NT . . . . . . . . . . . . . . . . . . . 231--243
Anonymous Front Matter . . . . . . . . . . . . . . ??
Wan-Shiou Yang and
Shi-Xin Weng Application of the Ant Colony
Optimization Algorithm to Competitive
Viral Marketing . . . . . . . . . . . . 1--8
Nikolaos Pothitos and
George Kastrinis and
Panagiotis Stamatopoulos Constraint Propagation as the Core of
Local Search . . . . . . . . . . . . . . 9--16
Ilianna Kollia and
Kostas Rapantzikos and
Giorgos Stamou and
Andreas Stafylopatis Semantic Query Answering in Digital
Libraries . . . . . . . . . . . . . . . 17--24
Spyridon Revithis and
Georgios Tagalakis A SOM-Based Validation Approach to a
Neural Circuit Theory of Autism . . . . 25--32
Vicky Panagiotopoulou and
Iraklis Varlamis and
Ion Androutsopoulos and
George Tsatsaronis Word Sense Disambiguation as an Integer
Linear Programming Problem . . . . . . . 33--40
Yiannis Kokkinos and
Konstantinos Margaritis Parallelism, Localization and Chain
Gradient Tuning Combinations for Fast
Scalable Probabilistic Neural Networks
in Data Mining Applications . . . . . . 41--48
Emmanouil Rigas and
Georgios Meditskos and
Nick Bassiliades SWRL2COOL: Object-Oriented
Transformation of SWRL in the CLIPS
Production Rule Engine . . . . . . . . . 49--56
Elias Zouboulidis and
Sotiris Kotsiantis Forecasting Fraudulent Financial
Statements with Committee of
Cost-Sensitive Decision Tree Classifiers 57--64
Despina Deligianni and
Sotiris Kotsiantis Forecasting Corporate Bankruptcy with an
Ensemble of Classifiers . . . . . . . . 65--72
Grigorios Tzortzis and
Aristidis Likas Greedy Unsupervised Multiple Kernel
Learning . . . . . . . . . . . . . . . . 73--80
Angelos Mimis and
Antonis Rovolis and
Marianthi Stamou An AZP-ACO Method for Region-Building 81--89
Vasileios Gavriilidis and
Anastasios Tefas Exploiting Quadratic Mutual Information
for Discriminant Analysis . . . . . . . 90--97
Dimitris Kalles and
Vassiliki Mperoukli and
Andreas Papandreadis Emerge-Sort: Swarm Intelligence Sorting 98--105
Vassileios-Marios Anastassiou and
Panagiotis Diamantopoulos and
Stavros Vassos iThink: a Library for Classical Planning
in Video-Games . . . . . . . . . . . . . 106--113
George Giannakopoulos and
Vangelis Karkaletsis and
George A. Vouros Detecting Human Features in Summaries
--- Symbol Sequence Statistical
Regularity . . . . . . . . . . . . . . . 114--123
Vincenzo Lagani and
Ioannis Tsamardinos and
Sofia Triantafillou Learning from Mixture of Experimental
Data: a Constraint--Based Approach . . . 124--131
George A. Vouros Information Sharing and Searching via
Collaborative Reinforcement Learning . . 132--140
George M. Santipantakis and
George A. Vouros Distributed Instance Retrieval in
$E^{DDL}_{HQ^+} \mathcal{SHIQ}$
Representation Framework . . . . . . . . 141--148
Damianos Galanopoulos and
Christos Athanasiadis and
Anastasios Tefas Evolutionary Optimization of a Neural
Network Controller for Car Racing
Simulation . . . . . . . . . . . . . . . 149--156
Elpiniki I. Papageorgiou and
Panagiotis Oikonomou and
Arthi Kannappan Bagged Nonlinear Hebbian Learning
Algorithm for Fuzzy Cognitive Maps
Working on Classification Tasks . . . . 157--164
Anonymous Front Matter . . . . . . . . . . . . . . ??
Ignacio Araya and
Gilles Trombettoni A Contractor Based on Convex Interval
Taylor . . . . . . . . . . . . . . . . . 1--16
Sébastien Bardin and
Arnaud Gotlieb \tt fdcc: a Combined Approach for
Solving Constraints over Finite Domains
and Arrays . . . . . . . . . . . . . . . 17--33
David Bergman and
Andre A. Cire Variable Ordering for the Application of
BDDs to the Maximum Independent Set
Problem . . . . . . . . . . . . . . . . 34--49
David Bergman and
John N. Hooker Graph Coloring Facets from All-Different
Systems . . . . . . . . . . . . . . . . 50--65
Jean-Charles Billaut and
Emmanuel Hebrard Complete Characterization of
Near-Optimal Sequences for the
Two-Machine Flow Shop Scheduling Problem 66--80
Alessio Bonfietti and
Michele Lombardi Global Cyclic Cumulative Constraint . . 81--96
Hadrien Cambazard and
Deepak Mehta A Computational Geometry-Based Local
Search Algorithm for Planar Location
Problems . . . . . . . . . . . . . . . . 97--112
Gilles Chabert and
Sophie Demassey The Conjunction of Interval A mong
Constraints . . . . . . . . . . . . . . 113--128
Andre A. Cire and
Elvin Coban Flow-Based Combinatorial Chance
Constraints . . . . . . . . . . . . . . 129--145
Nicholas Downing and
Thibaut Feydy Explaining Flow-Based Propagation . . . 146--162
Tommy Färnqvist Constraint Optimization Problems and
Bounded Tree-Width Revisited . . . . . . 163--179
Daniel Fontaine and
Laurent Michel A High Level Language for Solver
Independent Model Manipulation and
Generation of Hybrid Solvers . . . . . . 180--194
Graeme Gange and
Peter J. Stuckey Explaining Propagators for $s$-DNNF
Circuits . . . . . . . . . . . . . . . . 195--210
Stefan Heinz and
J. Christopher Beck Reconsidering Mixed Integer Programming
and MIP-Based Hybrids for Scheduling . . 211--227
Laurent Michel and
Pascal Van Hentenryck Activity-Based Search for Black-Box
Constraint Programming Solvers . . . . . 228--243
Yuri Malitsky and
Meinolf Sellmann Instance-Specific Algorithm
Configuration as a Method for
Non-Model-Based Portfolio Generation . . 244--259
Florence Massen and
Yves Deville Pheromone-Based Heuristic Column
Generation for Vehicle Routing Problems
with Black Box Feasibility . . . . . . . 260--274
Renaud Masson and
Fabien Lehuédé and
Olivier Péton Simple Temporal Problems in Route
Scheduling for the Dial-a-Ride Problem
with Transfers . . . . . . . . . . . . . 275--291
Quang Dung Pham and
Yves Deville Solving the Longest Simple Path Problem
with Constraint-Based Techniques . . . . 292--306
Aníbal Ponte and
Luís Paquete and
José R. Figueira On Beam Search for Multicriteria
Combinatorial Optimization Problems . . 307--321
Anonymous Front Matter . . . . . . . . . . . . . . ??
Bhavani Thuraisingham and
Vaibhav Khadilkar and
Jyothsna Rachapalli and
Tyrone Cadenhead Cloud-Centric Assured Information
Sharing . . . . . . . . . . . . . . . . 1--26
Zahri Yunos and
Rabiah Ahmad and
Syahrir Mat Ali and
Solahuddin Shamsuddin Illicit Activities and Terrorism in
Cyberspace: An Exploratory Study in the
Southeast Asian Region . . . . . . . . . 27--35
Weiping Chang and
Yungchang Ku and
Sinru Wu and
Chaochang Chiu CybercrimeIR --- a Technological
Perspective to Fight Cybercrime . . . . 36--44
Xin Xia and
Xiaohu Yang and
Chao Wu and
Shanping Li and
Linfeng Bao Information Credibility on Twitter in
Emergency Situation . . . . . . . . . . 45--59
Chao Li and
Jun Luo and
Joshua Zhexue Huang and
Jianping Fan Multi-Layer Network for Influence
Propagation over Microblog . . . . . . . 60--72
Tim M. H. Li and
Michael Chau and
Paul W. C. Wong and
Paul S. F. Yip A Hybrid System for Online Detection of
Emotional Distress . . . . . . . . . . . 73--80
Viet H. Huynh and
An N. T. Le Process Mining and Security:
Visualization in Database Intrusion
Detection . . . . . . . . . . . . . . . 81--95
Mustafa Amir Faisal and
Zeyar Aung and
John R. Williams and
Abel Sanchez Securing Advanced Metering
Infrastructure Using Intrusion Detection
System with Data Stream Mining . . . . . 96--111
Dan Bogdanov and
Roman Jagomägis and
Sven Laur A Universal Toolkit for
Cryptographically Secure
Privacy-Preserving Data Mining . . . . . 112--126
Jakub Valcik and
Jan Sedmidubsky and
Michal Balazia and
Pavel Zezula Identifying Walk Cycles for Human
Recognition . . . . . . . . . . . . . . 127--135
Yajuan Ling and
Jing Yang and
Liang He Chinese Organization Name Recognition
Based on Multiple Features . . . . . . . 136--144
Ameera Jadalla and
Ashraf Elnagar A Plagiarism Detection System for Arabic
Text-Based Documents . . . . . . . . . . 145--153
Nurfadhlina Mohd Sharef and
Khairul Azhar Kasmiran Examining Text Categorization Methods
for Incidents Analysis . . . . . . . . . 154--161
Weiwei Sun and
Bo Yang and
Qiong Huang and
Sha Ma and
Ximing Li Multi-Committer Threshold Commitment
Scheme from Lattice . . . . . . . . . . 162--175
Zhenhua Chen and
Chunying Wu and
Daoshun Wang and
Shundong Li Conjunctive Keywords Searchable
Encryption with Efficient Pairing,
Constant Ciphertext and Short Trapdoor 176--189
Jia Yu and
Shuguang Wang and
Huawei Zhao and
Minglei Shu and
Jialiang Lv and
Qiang Guo A Simultaneous Members Enrollment and
Revocation Protocol for Secret Sharing
Schemes . . . . . . . . . . . . . . . . 190--197
Biao Jiang and
Eul Gyu Im and
Yunmo Koo SaaS-Driven Botnets . . . . . . . . . . 198--206
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??