Last update:
Sat Oct 14 16:23:14 MDT 2017
Andreas Friesen and Wolfgang Theilmann and Markus Heller and Jens Lemcke and Christof Momm On Some Challenges in Business Systems Management and Engineering for the Networked Enterprise of the Future . . . 1--15 Youakim Badr and Yong Peng and Frédérique Biennier Digital Ecosystems for Business e-Services in Knowledge-Intensive Firms 16--31 Birgit Hofreiter and Christian Huemer and Gerti Kappel and Dieter Mayrhofer and Jan vom Brocke Inter-organizational Reference Models --- May Inter-organizational Systems Profit from Reference Modeling? . . . . 32--47 Valeria Cardellini and Emiliano Casalicchio and Vincenzo Grassi and Francesco Lo Presti On Guaranteeing Global Dependability Properties in Collaborative Business Process Management . . . . . . . . . . . 48--70 Eric Dubois and Sylvain Kubicki and Sophie Ramel and André Rifaut Capturing and Aligning Assurance Requirements for Business Services Systems . . . . . . . . . . . . . . . . 71--92 Marco Anisetti and Claudio A. Ardagna and Ernesto Damiani Container-Level Security Certification of Services . . . . . . . . . . . . . . 93--108 Leszek A. Maciaszek An Architectural Style for Trustworthy Adaptive Service Based Applications . . 109--121 Michael Parkin and Mike P. Papazoglou A Conceptual Architecture for Business-Aware Transaction Management 122--137 Jörg Niemöller and Eugen Freiter and Konstantinos Vandikas and Raphaël Quinet and Roman Levenshteyn Composition in Heterogeneous Service Networks: Requirements and Solutions . . 138--158 Fabrizio Smith and Michele Missikoff and Maurizio Proietti Ontology-Based Querying of Composite Services . . . . . . . . . . . . . . . . 159--180 Ismael Bouassida Rodriguez and Riadh Ben Halima and Khalil Drira and Christophe Chassot A Graph Grammar-Based Dynamic Reconfiguration for Virtualized Web Service-Based Composite Architectures 181--196 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Alexander Clark Logical Grammars, Logical Theories . . . 1--20 Christophe Fouqueré and Myriam Quatrini Ludics and Natural Language: First Approaches . . . . . . . . . . . . . . . 21--44 Nicholas Asher The Non Cooperative Basis of Implicatures . . . . . . . . . . . . . . 45--57 Thomas Graf Movement-Generalized Minimalist Grammars 58--73 Yuri Ishishita and Daisuke Bekki Toward the Formulation of Presupposition by Illative Combinatory Logic . . . . . 74--85 Boris Karlov Abstract Automata and a Normal Form for Categorial Dependency Grammars . . . . . 86--102 Gregory M. Kobele Importing Montagovian Dynamics into Minimalism . . . . . . . . . . . . . . . 103--118 Gregory M. Kobele and Jens Michaelis CoTAGs and ACGs . . . . . . . . . . . . 119--134 Yusuke Kubota and Robert Levine Gapping as Like-Category Coordination 135--150 Stepan Kuznetsov $L$-Completeness of the Lambek Calculus with the Reversal Operation . . . . . . 151--160 Zhe Lin Distributive Full Nonassociative Lambek Calculus with S4-Modalities Is Context-Free . . . . . . . . . . . . . . 161--172 Zhaohui Luo Common Nouns as Types . . . . . . . . . 173--185 Hiroko Ozaki and Daisuke Bekki Extractability as the Deduction Theorem in Subdirectional Combinatory Logic . . 186--200 Andrew Plummer and Carl Pollard Agnostic Possible Worlds Semantics . . . 201--212 Kurt Ranalter Abstract Machines for Argumentation . . 213--228 Alexey Sorokin On the Completeness of Lambek Calculus with Respect to Cofinite Language Models 229--233 Tao Xue and Zhaohui Luo Dot-types and Their Implementation . . . 234--249 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Catherine Plaisant Life on the Line: Interacting with Temporal Event Sequence Representations 1--2 Dave Barker-Plummer and John Etchemendy and Michael Murray and Emma Pease and Nik Swoboda Learning to Use the Openbox: a Framework for the Implementation of Heterogeneous Reasoning . . . . . . . . . . . . . . . 3--3 Peter Chapman and Luana Micallef 3rd International Workshop on Euler Diagrams . . . . . . . . . . . . . . . . 4--4 Richard Cox and Jonathan San Diego Technology Enhanced Diagrams Research Workshop . . . . . . . . . . . . . . . . 5--5 Cagatay Goncu and Kim Marriott Accessible Graphics: Graphics for Vision Impaired People . . . . . . . . . . . . 6--6 Lisa A. Best Graduate Student Symposium of Diagrams 2012 . . . . . . . . . . . . . . . . . . 7--7 Richard Burns and Sandra Carberry and Stephanie Elzer and Daniel Chester Automatically Recognizing Intended Messages in Grouped Bar Charts . . . . . 8--22 Barbara Tversky and James E. Corter and Lixiu Yu and David L. Mason and Jeffrey V. Nickerson Representing Category and Continuum: Visualizing Thought . . . . . . . . . . 23--34 Emmanuel Manalo and Yuri Uesaka Elucidating the Mechanism of Spontaneous Diagram Use in Explanations: How Cognitive Processing of Text and Diagrammatic Representations Are Influenced by Individual and Task-Related Factors . . . . . . . . . . 35--50 Michael Wybrow and Kim Marriott and Peter J. Stuckey Orthogonal Hyperedge Routing . . . . . . 51--64 Lars Kristian Klauske and Christoph Daniel Schulze and Miro Spönemann and Reinhard von Hanxleden Improved Layout for Data Flow Diagrams with Port Constraints . . . . . . . . . 65--79 Christian Ernstbrunner and Josef Pichler Aesthetic Layout of Wiring Diagrams . . 80--94 Cengiz Acartürk Points, Lines and Arrows in Statistical Graphs . . . . . . . . . . . . . . . . . 95--101 Michael Burch and Michael Raschke and Miriam Greis and Daniel Weiskopf Enriching Indented Pixel Tree Plots with Node-Oriented Quantitative, Categorical, Relational, and Time-Series Data . . . . 102--116 Michael T. Bradley and Andrew Brand and A. Luke MacNeill Interpreting Effect Size Estimates through Graphic Analysis of Raw Data Distributions . . . . . . . . . . . . . 117--123 Takeshi Sugio and Atsushi Shimojima and Yasuhiro Katagiri Psychological Evidence of Mental Segmentation in Table Reading . . . . . 124--131 Ryo Takemura Proof-Theoretical Investigation of Venn Diagrams: a Logic Translation and Free Rides . . . . . . . . . . . . . . . . . 132--147 Paolo Bottoni and Gennaro Costagliola and Andrew Fish Euler Diagram Encodings . . . . . . . . 148--162 Matej Urbas and Mateja Jamnik and Gem Stapleton and Jean Flower Speedith: a Diagrammatic Reasoner for Spider Diagrams . . . . . . . . . . . . 163--177 Peter C.-H. Cheng Algebra Diagrams: a HANDi Introduction 178--192 Anonymous Front Matter . . . . . . . . . . . . . . ??
Vijay V. Vazirani Can the Theory of Algorithms Ratify the ``Invisible Hand of the Market''? . . . 1--5 Maxim Babenko and Ivan Pouzyrevsky Resilient Quicksort and Selection . . . 6--17 Sebastian S. Bauer and Uli Fahrenberg and Axel Legay and Claus Thrane General Quantitative Specification Theories with Modalities . . . . . . . . 18--30 Michael Blondin and Pierre McKenzie The Complexity of Intersecting Finite Automata Having Few Final States . . . . 31--42 Bart\lomiej Bosek and Stefan Felsner and Kolja Knauer and Grzegorz Matecki News about Semiantichains and Unichain Coverings . . . . . . . . . . . . . . . 43--51 Dmitry V. Chistikov Checking Tests for Read-Once Functions over Arbitrary Bases . . . . . . . . . . 52--63 Nachshon Cohen and Zeev Nutov Approximating Minimum Power Edge-Multi-Covers . . . . . . . . . . . 64--75 Evgeny Demenkov A Lower Bound on Circuit Complexity of Vector Function in $U_2$ . . . . . . . . 76--80 Evgeny Demenkov and Alexander S. Kulikov and Ivan Mihajlin and Hiroki Morizumi Computing All MOD-Functions Simultaneously . . . . . . . . . . . . . 81--88 Volker Diekert and Manfred Kufleitner Bounded Synchronization Delay in Omega-Rational Expressions . . . . . . . 89--98 Martin Dietzfelbinger and Michael Rink Towards Optimal Degree-Distributions for Left-Perfect Matchings in Random Bipartite Graphs . . . . . . . . . . . . 99--111 Stefan Dobrev and Evangelos Kranakis and Oscar Morales Ponce and Milan Pl\vzík Robust Sensor Range for Constructing Strongly Connected Spanning Digraphs in UDGs . . . . . . . . . . . . . . . . . . 112--124 Amr Elmasry and Jyrki Katajainen Worst-Case Optimal Priority Queues via Extended Regular Counters . . . . . . . 125--137 Eli Fox-Epstein and Danny Krizanc The Complexity of Minor-Ancestral Graph Properties with Forbidden Pairs . . . . 138--147 Andreas Goerdt and Lutz Falke Satisfiability Thresholds beyond $k$-XORSAT . . . . . . . . . . . . . . . 148--159 Petr A. Golovach and Bernard Lidický and Barnaby Martin and Daniël Paulusma Finding Vertex-Surjective Graph Homomorphisms . . . . . . . . . . . . . 160--171 Pinar Heggernes and Sigve H. Sæther Broadcast Domination on Block Graphs in Linear Time . . . . . . . . . . . . . . 172--183 Bernhard Heinemann Characterizing Certain Topological Specifications . . . . . . . . . . . . . 184--195 Galina Jirásková Descriptional Complexity of Operations on Alternating and Boolean Automata . . 196--204 Timo Jolivet and Jarkko Kari Consistency of Multidimensional Combinatorial Substitutions . . . . . . 205--216 Anonymous Front Matter . . . . . . . . . . . . . . ??
Ron Shamir Gene Regulation, Protein Networks and Disease: a Computational Perspective . . 1--1 Gonzalo Navarro Wavelet Trees for All . . . . . . . . . 2--26 Maxime Crochemore and Costas S. Iliopoulos and Tomasz Kociumaka and Marcin Kubica The Maximum Number of Squares in a Tree 27--40 A\"\ida Ouangraoua and Mathieu Raffinot Faster and Simpler Minimal Conflicting Set Identification . . . . . . . . . . . 41--55 Sharon Bruckner and Falk Hüffner and Christian Komusiewicz and Rolf Niedermeier and Sven Thiel Partitioning into Colorful Components by Minimum Edge Deletions . . . . . . . . . 56--69 Dima Blokh and Danny Segev and Roded Sharan Approximation Algorithms and Hardness Results for Shortest Path Based Graph Orientations . . . . . . . . . . . . . . 70--82 Dany Breslauer and Leszek G\kasieniec and Roberto Grossi Constant-Time Word-Size String Matching 83--96 Raphaël Clifford and Markus Jalsenius and Ely Porat and Benjamin Sach Pattern Matching in Multiple Streams . . 97--109 Omar AitMous and Frédérique Bassino and Cyril Nicaud An Efficient Linear Pseudo-minimization Algorithm for Aho--Corasick Automata . . 110--123 Christian Hundt and Florian Wendland Efficient Two-Dimensional Pattern Matching with Scaling and Rotation and Higher-Order Interpolation . . . . . . . 124--137 Guillaume Blin and Laurent Bulteau and Minghui Jiang and Pedro J. Tejada and Stéphane Vialette Hardness of Longest Common Subsequence for Sequences with Bounded Run-Lengths 138--148 Ferdinando Cicalese and Eduardo Laber and Oren Weimann and Raphael Yuster Near Linear Time Construction of an Approximate Index for All Maximum Consecutive Sub-sums of a Sequence . . . 149--158 Anne Condon and Ján Ma\vnuch and Chris Thachuk The Complexity of String Partitioning 159--172 Wing-Kai Hon and Rahul Shah and Sharma V. Thankachan Towards an Optimal Space-and-Query-Time Index for Top- k Document Retrieval . . 173--184 Wing-Kai Hon and Rahul Shah and Sharma V. Thankachan and Jeffrey Scott Vitter Document Listing for Queries with Excluded Pattern . . . . . . . . . . . . 185--195 Gregory Kucherov and Yakov Nekrich and Tatiana Starikovskaya Cross-Document Pattern Matching . . . . 196--207 Michael P. Ferguson FEMTO: Fast Search of Large Sequence Collections . . . . . . . . . . . . . . 208--219 Keisuke Goto and Hideo Bannai and Shunsuke Inenaga and Masayuki Takeda Speeding Up $q$-Gram Mining on Grammar-Based Compressed Texts . . . . . 220--231 Pawe\l Gawrychowski Simple and Efficient LZW-Compressed Multiple Pattern Matching . . . . . . . 232--242 Enno Ohlebusch and Timo Beller and Mohamed I. Abouelhoda Computing the Burrows--Wheeler Transform of a String and Its Reverse . . . . . . 243--256 Anonymous Front Matter . . . . . . . . . . . . . . ??
Ioannis Caragiannis and Christos Kalaitzis Space Lower Bounds for Low-Stretch Greedy Embeddings . . . . . . . . . . . 1--12 Shiri Chechik and David Peleg The Fault Tolerant Capacitated $k$-Center Problem . . . . . . . . . . . 13--24 Yuval Emek and Pierre Fraigniaud and Amos Korman Notions of Connectivity in Overlay Networks . . . . . . . . . . . . . . . . 25--35 Amotz Bar-Noy and Ben Baumer and Dror Rawitz Changing of the Guards: Strip Cover with Duty Cycling . . . . . . . . . . . . . . 36--47 Henning Hasemann and Juho Hirvonen Deterministic Local Algorithms, Unique Identifiers, and Fractional Graph Colouring . . . . . . . . . . . . . . . 48--60 Peter Kling and Friedhelm Meyer auf der Heide An Algorithm for Online Facility Leasing 61--72 Martin Biely and Peter Robinson and Ulrich Schmid Agreement in Directed Dynamic Networks 73--84 Majid Khabbazian and Stephane Durocher Bounding Interference in Wireless Ad Hoc Networks with Nodes in Random Position 85--98 Mohsen Eftekhari Hesari and Evangelos Kranakis Strong Connectivity of Sensor Networks with Double Antennae . . . . . . . . . . 99--110 Dongxiao Yu and Qiang-Sheng Hua and Yuexuan Wang Distributed Multiple-Message Broadcast in Wireless Ad-Hoc Networks under the SINR Model . . . . . . . . . . . . . . . 111--122 Eyjólfur Ingi Ásgeirsson Wireless Network Stability in the SINR Model . . . . . . . . . . . . . . . . . 123--134 Heger Arfaoui and Pierre Fraigniaud What Can Be Computed without Communications? . . . . . . . . . . . . 135--146 Vittorio Bil\`o and Michele Flammini On Bidimensional Congestion Games . . . 147--158 Michele Flammini and Vasco Gallotti Mobile Network Creation Games . . . . . 159--170 Carole Delporte-Gallet and Hugues Fauconnier Homonyms with Forgeable Identifiers . . 171--182 Xavier Vilaça and Oksana Denysyuk Asynchrony and Collusion in the $N$-party BAR Transfer Problem . . . . . 183--194 Dan Alistarh and Hagit Attiya and Rachid Guerraoui Early Deciding Synchronous Renaming in $O(\log f)$ Rounds or Less . . . . . . . 195--206 Jérémie Chalopin and Yves Métivier On Snapshots and Stable Properties Detection in Anonymous Fully Distributed Systems (Extended Abstract) . . . . . . 207--218 Andreas Larsson and Philippas Tsigas Self-stabilizing $(k,r)$-Clustering in Clock Rate-Limited Systems . . . . . . . 219--230 Michel Raynal and Julien Stainer Increasing the Power of the Iterated Immediate Snapshot Model with Failure Detectors . . . . . . . . . . . . . . . 231--242 Anonymous Front Matter . . . . . . . . . . . . . . ??
Parvaz Mahdabi and Fabio Crestani Learning-Based Pseudo-Relevance Feedback for Patent Retrieval . . . . . . . . . . 1--11 Katharina Wäschle and Stefan Riezler Analyzing Parallelism and Domain Similarities in the MAREC Patent Corpus 12--27 Khanh-Ly Nguyen and Sung-Hyon Myaeng Query Enhancement for Patent Prior-Art-Search Based on Keyterm Dependency Relations and Semantic Tags 28--42 Víctor M. Prieto and Manuel Álvarez and Rafael López-García and Fidel Cacheda Analysis and Detection of Web Spam by Means of Web Content . . . . . . . . . . 43--57 Anastasia Moumtzidou and Stefanos Vrochidis and Sara Tonelli and Ioannis Kompatsiaris Discovery of Environmental Nodes in the Web . . . . . . . . . . . . . . . . . . 58--72 Pavlos Fafalios and Ioannis Kitsos and Yannis Marketakis and Claudio Baldassarre Web Searching with Entity Mining at Query Time . . . . . . . . . . . . . . . 73--88 Tobias Schleser and Doris Ipsmiller and Roland Mörzinger Patent and Norm Exploration with the m2n Knowledge Discovery Suite . . . . . . . 89--93 Juan Carlos Gomez and Marie-Francine Moens Hierarchical Classification of Web Documents by Stratified Discriminant Analysis . . . . . . . . . . . . . . . . 94--108 Stefanos Vrochidis and Anastasia Moumtzidou and Gerard Ypma and Ioannis Kompatsiaris PatMedia: Augmenting Patent Search with Content-Based Image Retrieval . . . . . 109--112 Kimmo Kettunen and Paavo Arvola Generating Variant Keyword Forms for a Morphologically Complex Language Leads to Successful Information Retrieval with Finnish . . . . . . . . . . . . . . . . 113--126 Wolfgang Tannebaum and Andreas Rauber Analyzing Query Logs of USPTO Examiners to Identify Useful Query Terms in Patent Documents for Query Expansion in Patent Searching: a Preliminary Study . . . . . 127--136 Luepol Pipanmaekaporn and Yuefeng Li Discovering Relevant Features for Effective Query Formulation . . . . . . 137--151 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Mohammad Ghodsi and Anil Maheshwari and Mostafa Nouri $\alpha$-Visibility . . . . . . . . . . 1--12 Jessica Sherette and Carola Wenk Partial Matching between Surfaces Using Fréchet Distance . . . . . . . . . . . . 13--23 Takehiro Ito and Shin-Ichi Nakano and Yoshio Okamoto and Yota Otachi A Polynomial-Time Approximation Scheme for the Geometric Unique Coverage Problem on Unit Squares . . . . . . . . 24--35 Adrian Dumitrescu and Joseph S. B. Mitchell and Pawe\l \.Zyli\'nski Watchman Routes for Lines and Segments 36--47 Mohammad Ali Abam and Zahed Rahmati and Alireza Zarei Kinetic Pie Delaunay Graph and Its Applications . . . . . . . . . . . . . . 48--58 Andreas Gemsa and D. T. Lee and Chih-Hung Liu and Dorothea Wagner Higher Order City Voronoi Diagrams . . . 59--70 Babak Behsaz and Mohammad R. Salavatipour On Minimum Sum of Radii and Diameters Clustering . . . . . . . . . . . . . . . 71--82 Tomas Hruz and Marcel Schöngens A Simple Framework for the Generalized Nearest Neighbor Problem . . . . . . . . 83--94 Marek Cygan Deterministic Parameterized Connected Vertex Cover . . . . . . . . . . . . . . 95--106 Esha Ghosh and Sudeshna Kolay and Mrinal Kumar and Pranabendu Misra Faster Parameterized Algorithms for Deletion to Split Graphs . . . . . . . . 107--118 Eun Jung Kim and Christophe Paul and Geevarghese Philip A Single-Exponential FPT Algorithm for the $K_4$-Minor Cover Problem . . . . . 119--130 Yijie Han and Tadao Takaoka An $O(n^3 \log \log n / \log^2 n)$ Time Algorithm for All Pairs Shortest Paths 131--141 Aistis Atminas and Vadim V. Lozin and Igor Razgon Linear Time Algorithm for Computing a Small Biclique in Graphs without Long Induced Paths . . . . . . . . . . . . . 142--152 Petr A. Golovach and Daniël Paulusma and Erik Jan van Leeuwen Induced Disjoint Paths in AT-Free Graphs 153--164 Archontia C. Giannopoulou and Iosif Salem and Dimitris Zoros Effective Computation of Immersion Obstructions for Unions of Graph Classes 165--176 Danny Z. Chen and Yan Gu and Jian Li and Haitao Wang Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain . . . . . . . . . . . . 177--188 Oleksiy Busaryev and Sergio Cabello and Chao Chen and Tamal K. Dey Annotating Simplices with a Homology Basis and Its Applications . . . . . . . 189--200 Rom Aschner and Matthew J. Katz and Gila Morgenstern Do Directional Antennas Facilitate in Reducing Interferences? . . . . . . . . 201--212 Adrian Dumitrescu and Sariel Har-Peled and Csaba D. Tóth Minimum Convex Partitions and Maximum Empty Polytopes . . . . . . . . . . . . 213--224 Markus Bläser and Konstatinos Panagiotou A Probabilistic Analysis of Christofides' Algorithm . . . . . . . . 225--236 Anonymous Front Matter . . . . . . . . . . . . . . ??
Wolfgang Thomas Synthesis and Some of Its Challenges . . 1--1 David L. Dill Model Checking Cell Biology . . . . . . 2--2 Rastislav Bodik and Emina Torlak Synthesizing Programs with Constraint Solvers . . . . . . . . . . . . . . . . 3--3 Aaron R. Bradley IC3 and beyond: Incremental, Inductive Verification . . . . . . . . . . . . . . 4--4 Chris J. Myers Formal Verification of Genetic Circuits 5--5 Micha\l Moskal From C to Infinity and Back: Unbounded Auto-active Verification with VCC . . . 6--6 Jan K\vretínský and Javier Esparza Deterministic Automata for the $(F,G)$-Fragment of LTL . . . . . . . . 7--22 Tomá\vs Brázdil and Krishnendu Chatterjee and Antonín Ku\vcera and Petr Novotný Efficient Controller Synthesis for Consumption Games with Multiple Resource Types . . . . . . . . . . . . . . . . . 23--38 Rüdiger Ehlers ACTL $\cap$ LTL Synthesis . . . . . . . 39--54 Yu-Fang Chen and Bow-Yaw Wang Learning Boolean Functions Incrementally 55--70 Rahul Sharma and Aditya V. Nori and Alex Aiken Interpolants as Classifiers . . . . . . 71--87 Wonchan Lee and Bow-Yaw Wang and Kwangkeun Yi Termination Analysis with Algorithmic Learning . . . . . . . . . . . . . . . . 88--104 Marc Brockschmidt and Richard Musiol and Carsten Otto and Jürgen Giesl Automated Termination Proofs for Java Programs with Cyclic Data . . . . . . . 105--122 Javier Esparza and Andreas Gaiser and Stefan Kiefer Proving Termination of Probabilistic Programs Using Patterns . . . . . . . . 123--138 Arnaud J. Venet The Gauge Domain: Scalable Analysis of Linear Inequality Invariants . . . . . . 139--154 Josh Berdine and Arlen Cox and Samin Ishtiaq and Christoph M. Wintersteiger Diagnosing Abstraction Failure for Separation Logic--Based Analyses . . . . 155--173 Aditya Thakur and Thomas Reps A Method for Symbolic Computation of Abstract Operations . . . . . . . . . . 174--192 Simone Fulvio Rollini and Ondrej Sery and Natasha Sharygina Leveraging Interpolant Strength in Model Checking . . . . . . . . . . . . . . . . 193--209 Mohamed Faouzi Atig and Ahmed Bouajjani and Michael Emmi and Akash Lal Detecting Fair Non-termination in Multithreaded Programs . . . . . . . . . 210--226 Vineet Kahlon and Chao Wang Lock Removal for Concurrent Trace Programs . . . . . . . . . . . . . . . . 227--242 Anonymous Front Matter . . . . . . . . . . . . . . ??
Claire R. Donoghue and Anil Rao and Anthony M. J. Bull and Daniel Rueckert Robust Global Registration through Geodesic Paths on an Empirical Manifold with Knee MRI from the Osteoarthritis Initiative (OAI) . . . . . . . . . . . . 1--10 Yi Hong and Yundi Shi and Martin Styner and Mar Sanchez and Marc Niethammer Simple Geodesic Regression for Image Time-Series . . . . . . . . . . . . . . 11--20 Ryan D. Datteri and Beno\^\it M. Dawant Automatic Detection of the Magnitude and Spatial Location of Error in Non-rigid Registration . . . . . . . . . . . . . . 21--30 Nicholas J. Tustison and Brian B. Avants Diffeomorphic Directly Manipulated Free-Form Deformation Image Registration via Vector Field Flows . . . . . . . . . 31--39 Daniel Forsberg and Gunnar Farnebäck and Hans Knutsson and Carl-Fredrik Westin Multi-modal Image Registration Using Polynomial Expansion and Mutual Information . . . . . . . . . . . . . . 40--49 Firdaus Janoos and Petter Risholm and William Wells III Bayesian Characterization of Uncertainty in Multi-modal Image Registration . . . 50--59 Wei Sun and Wiro J. Niessen and Stefan Klein Hierarchical vs. Simultaneous Multiresolution Strategies for Nonrigid Image Registration . . . . . . . . . . . 60--69 David Thivierge-Gaulin and Chen-Rui Chou and Atilla P. Kiraly and Christophe Chefd'Hotel $3$D--$2$D Registration Based on Mesh-Derived Image Bisection . . . . . . 70--78 Marc Modat and M. Jorge Cardoso and Pankaj Daga and David Cash and Nick C. Fox and Sébastien Ourselin Inverse-Consistent Symmetric Free Form Deformation . . . . . . . . . . . . . . 79--88 Fitsum A. Reda and Jack H. Noble and Robert F. Labadie and Beno\^\it M. Dawant Fully Automatic Surface-Based Pre- to Intra-operative CT Registration for Cochlear Implant . . . . . . . . . . . . 89--98 Istvan Csapo and Brad Davis and Yundi Shi and Mar Sanchez and Martin Styner and Marc Niethammer Temporally-Dependent Image Similarity Measure for Longitudinal Analysis . . . 99--109 Beno\^\it Compte and Adrien Bartoli and Daniel Pizarro Constant Flow Sampling: a Method to Automatically Select the Regularization Parameter in Image Registration . . . . 110--119 Takanori Watanabe and Clayton Scott Spatial Confidence Regions for Quantifying and Visualizing Registration Uncertainty . . . . . . . . . . . . . . 120--130 Diego D. B. Carvalho and Stefan Klein and Zeynettin Akkus and Gerrit L. ten Kate and Hui Tang Registration of Free-Hand Ultrasound and MRI of Carotid Arteries through Combination of Point-Based and Intensity-Based Algorithms . . . . . . . 131--140 Amin Katouzian and Athanasios Karamalis and Jennifer Lisauskas and Abouzar Eslami and Nassir Navab IVUS-Histology Image Registration . . . 141--149 Boris N. Oreshkin and Tal Arbel Optimization over Random and Gradient Probabilistic Pixel Sampling for Fast, Robust Multi-resolution Image Registration . . . . . . . . . . . . . . 150--159 \vZiga \vSpiclin and Bo\vstjan Likar and Franjo Pernu\vs Quad-tree Based Entropy Estimator for Fast and Robust Brain Image Registration 160--169 Aditya Gupta and Maria Escolar and Cheryl Dietrich and John Gilmore and Guido Gerig and Martin Styner $3$D Tensor Normalization for Improved Accuracy in DTI Tensor Registration Methods . . . . . . . . . . . . . . . . 170--179 Anand A. Joshi and David W. Shattuck and Richard M. Leahy A Method for Automated Cortical Surface Registration and Labeling . . . . . . . 180--189 Lars Ruthotto and Erlend Hodneland and Jan Modersitzki Registration of Dynamic Contrast Enhanced MRI with Local Rigidity Constraint . . . . . . . . . . . . . . . 190--198 Anonymous Front Matter . . . . . . . . . . . . . . ??
Trevor Bench-Capon Marek Sergot: a Memoir . . . . . . . . . 1--3 Steve Barker and Andrew J. I. Jones and Antonis Kakas and Robert A. Kowalski and Alessio Lomuscio The Scientific Contribution of Marek Sergot . . . . . . . . . . . . . . . . . 4--11 Robert A. Kowalski and Fariba Sadri Teleo-Reactive Abductive Logic Programs 12--32 Paolo Mancarella and Francesca Toni Semi-negative Abductive Logic Programs with Implicative Integrity Constraints: Semantics and Properties . . . . . . . . 33--51 Dov M. Gabbay What Is Negation as Failure? . . . . . . 52--78 Dario Della Monica and Angelo Montanari and Pietro Sala The Importance of the Past in Interval Temporal Logics: The Case of Propositional Neighborhood Logic . . . . 79--102 Evgenios Hadjisoteriou and Antonis Kakas Argumentation and the Event Calculus . . 103--122 Stefano Bragaglia and Federico Chesani and Paola Mello and Marco Montali and Paolo Torroni Reactive Event Calculus for Monitoring Global Computing Applications . . . . . 123--146 Justin Blount and Michael Gelfond Reasoning about the Intentions of Agents 147--171 Alessio Lomuscio and Wojciech Penczek Symbolic Model Checking for Temporal-Epistemic Logic . . . . . . . . 172--195 Koen V. Hindriks and Wiebe van der Hoek and John-Jules Ch. Meyer GOAL Agents Instantiate Intention Logic 196--219 Trevor Bench-Capon Open Texture and Argumentation: What Makes an Argument Persuasive? . . . . . 220--233 Paul E. Dunne Irrationality in Persuasive Argumentation . . . . . . . . . . . . . 234--248 Henry Prakken Some Reflections on Two Current Trends in Formal Argumentation . . . . . . . . 249--272 Andrew J. I. Jones and Steven O. Kimbrough On the Representation of Normative Sentences in FOL . . . . . . . . . . . . 273--294 Xavier Parent Why Be Afraid of Identity? . . . . . . . 295--307 Marco Alberti and Marco Gavanelli and Evelina Lamma Deon$^+$: Abduction and Constraints for Normative Reasoning . . . . . . . . . . 308--328 Paolo Turrini and Xavier Parent and Leendert van der Torre and Silvano Colombo Tosatto Contrary-To-Duties in Games . . . . . . 329--348 Steve Barker Logical Approaches to Authorization Policies . . . . . . . . . . . . . . . . 349--373 Naftaly H. Minsky Decentralized Governance of Distributed Systems via Interaction Control . . . . 374--400 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Melissa L. Hill and Kela Liu and James G. Mainprize and Ronald B. Levitin and Rushin Shojaii Pre-clinical Evaluation of Tumour Angiogenesis with Contrast-Enhanced Breast Tomosynthesis . . . . . . . . . . 1--8 Yue-Houng Hu and David A. Scaduto and Wei Zhao The Effect of Amorphous Selenium Thickness on Imaging Performance of Contrast Enhanced Digital Breast Tomosynthesis . . . . . . . . . . . . . 9--16 Juan-Pablo Cruz-Bastida and Iván Rosado-Méndez and Héctor Pérez-Ponce and Yolanda Villaseñor Contrast Optimization in Clinical Contrast-Enhanced Digital Mammography Images . . . . . . . . . . . . . . . . . 17--23 David A. Scaduto and Wei Zhao Determination of System Geometrical Parameters and Consistency between Scans for Contrast-Enhanced Digital Breast Tomosynthesis . . . . . . . . . . . . . 24--31 Sara Gavenonis and Kristen Lau and Roshan Karunamuni and Yiheng Zhang and Baorui Ren and Chris Ruth Initial Experience with Dual-Energy Contrast-Enhanced Digital Breast Tomosynthesis in the Characterization of Breast Cancer . . . . . . . . . . . . . 32--39 Wenda He and Erika R. E. Denton and Reyer Zwiggelaar Mammographic Segmentation and Risk Classification Using a Novel Binary Model Based Bayes Classifier . . . . . . 40--47 Thomy Mertzanidou and John H. Hipwell and Lianghao Han and Zeike Taylor and Henkjan Huisman Intensity-Based MRI to X-ray Mammography Registration with an Integrated Fast Biomechanical Transformation . . . . . . 48--55 Diksha Sharma and Aldo Badano Comparison of Experimental, mantis, and hybrid mantis X-ray Response for a Breast Imaging CsI Detector . . . . . . 56--63 Fabián Narváez and Eduardo Romero Breast Mass Classification Using Orthogonal Moments . . . . . . . . . . . 64--71 Stefano Young and Andreu Badal and Kyle J. Myers and Subok Park A Task-Specific Argument for Variable-Exposure Breast Tomosynthesis 72--79 Tushita Patel and Kelly Klanian and Zongyi Gong and Mark B. Williams Detective Quantum Efficiency of a CsI-CMOS X-ray Detector for Breast Tomosynthesis Operating in High Dynamic Range and High Sensitivity Modes . . . . 80--87 Jan M. Lesniak and Guido van Schie and Christine Tanner and Bram Platel and Henkjan Huisman Multimodal Classification of Breast Masses in Mammography and MRI Using Unimodal Feature Selection and Decision Fusion . . . . . . . . . . . . . . . . . 88--95 Jelena Bozek and Michiel Kallenberg and Mislav Grgic and Nico Karssemeijer Comparison of Lesion Size Using Area and Volume in Full Field Digital Mammograms 96--103 Masami Ando and Qingkai Huo and Shu Ichihara and Tokiko Endo and Tetsuya Yuasa and Naoki Sunaguchi Very High Contrast and Very High Spatial Resolution $2$-D, $2.5$-D and $3$-D Breast Tissue Visualization under X-ray Dark Field Imaging . . . . . . . . . . . 104--110 Alessandro Bria and Claudio Marrocco and Mario Molinara and Francesco Tortorella Detecting Clusters of Microcalcifications with a Cascade-Based Approach . . . . . . . . . . . . . . . . 111--118 Nachiko Uchiyama and Takayuki Kinoshita and Takashi Hojo and Sota Asaga and Junko Suzuki Diagnostic Impact of Adjunction of Digital Breast Tomosynthesis (DBT) to Full Field Digital Mammography (FFDM) and in Comparison with Full Field Digital Mammography (FFDM) . . . . . . . 119--126 Sadaf Hashmi and Jamie C. Sergeant and Julie Morris and Sigrid Whiteside and Paula Stavrinos Ethnic Variation in Volumetric Breast Density . . . . . . . . . . . . . . . . 127--133 Mariela A. Porras-Chaverri and John R. Vetter and Ralph Highnam Personalizing Mammographic Dosimetry Using Multilayered Anatomy-Based Breast Models . . . . . . . . . . . . . . . . . 134--140 Ingrid Reiser and Beverly A. Lau and Robert M. Nishikawa and Predrag R. Bakic A Directional Small-Scale Tissue Model for an Anthropomorphic Breast Phantom 141--148 Feiyu Chen and David D. Pokrajac and Xiquan Shi and Fengshan Liu and Andrew D. A. Maidment Simulation of Three Material Partial Volume Averaging in a Software Breast Phantom . . . . . . . . . . . . . . . . 149--156 Anonymous Front Matter . . . . . . . . . . . . . . ??
Jesse Alama and Lionel Mamane and Josef Urban Dependencies in Formal Mathematics: Applications and Extraction for Coq and Mizar . . . . . . . . . . . . . . . . . 1--16 Andrea Asperti Proof, Message and Certificate . . . . . 17--31 Timothy Bourke and Matthias Daum and Gerwin Klein and Rafal Kolanski Challenges and Experiences in Managing Large-Scale Proofs . . . . . . . . . . . 32--48 Catalin David and Constantin Jucovschi and Andrea Kohlhase and Michael Kohlhase Semantic Alliance: a Framework for Semantic Allies . . . . . . . . . . . . 49--64 Fulya Horozal and Michael Kohlhase and Florian Rabe Extending MKM Formats at the Statement Level . . . . . . . . . . . . . . . . . 65--80 Rui Hu and Vadim Mazalov and Stephen M. Watt A Streaming Digital Ink Framework for Multi-party Collaboration . . . . . . . 81--95 Constantin Jucovschi Cost-Effective Integration of MKM Semantic Services into Editing Environments . . . . . . . . . . . . . . 96--110 Paul Libbrecht and Sandra Rebholz and Daniel Herding and Wolfgang Müller and Felix Tscheulin Understanding the Learners' Actions when Using Mathematics Learning Tools . . . . 111--126 Vesna Marinkovi\'c and Predrag Jani\vci\'c Towards Understanding Triangle Construction Problems . . . . . . . . . 127--142 Florian Rabe A Query Language for Formal Mathematical Libraries . . . . . . . . . . . . . . . 143--158 Alan P. Sexton Abramowitz and Stegun --- a Resource for Mathematical Document Analysis . . . . . 159--168 Carst Tankink and Christoph Lange and Josef Urban Point-and-Write --- Documenting Formal Mathematics by Reference . . . . . . . . 169--185 Iain Whiteside and David Aspinall and Gudmund Grov An Essence of SSReflect . . . . . . . . 186--201 Jacques Carette and Russell O'Connor Theory Presentation Combinators . . . . 202--215 Jónathan Heras and María Poza and Julio Rubio Verifying an Algorithm Computing Discrete Vector Fields for Digital Imaging . . . . . . . . . . . . . . . . 216--230 Muhammad Taimoor Khan and Wolfgang Schreiner Towards the Formal Specification and Verification of Maple Programs . . . . . 231--247 Filip Mari\'c and Miodrag \vZivkovi\'c and Bojan Vu\vckovi\'c Formalizing Frankl's Conjecture: FC-Families . . . . . . . . . . . . . . 248--263 Mladen Nikoli\'c and Predrag Jani\vci\'c CDCL-Based Abstract State Transition System for Coherent Logic . . . . . . . 264--279 David J. Wilson and Russell J. Bradford and James H. Davenport Speeding Up Cylindrical Algebraic Decomposition by Gröbner Bases . . . . . 280--294 Gabriel Dos Reis A System for Axiomatic Programming . . . 295--309 Anonymous Front Matter . . . . . . . . . . . . . . ??
Jacek Cicho\'n and Jakub Lemiesz and Marcin Zawada On Message Complexity of Extrema Propagation Techniques . . . . . . . . . 1--13 Sang Hyuk Lee and Tomasz Radzik Improved Approximation Bounds for Maximum Lifetime Problems in Wireless Ad-Hoc Network . . . . . . . . . . . . . 14--27 Sabrina Merkel and Sanaz Mostaghim and Hartmut Schmeck Distributed Geometric Distance Estimation in Ad Hoc Networks . . . . . 28--41 Alexandre Mouradian and Isabelle Augé-Blum $1$-D Coordinate Based on Local Information for MAC and Routing Issues in WSNs . . . . . . . . . . . . . . . . 42--55 Evangelos Kranakis and Fraser MacQuarie and Oscar Morales-Ponce and Jorge Urrutia Uninterrupted Coverage of a Planar Region with Rotating Directional Antennae . . . . . . . . . . . . . . . . 56--68 Radu Ioan Ciobanu and Ciprian Dobre and Valentin Cristea Social Aspects to Support Opportunistic Networks in an Academic Environment . . 69--82 Mikael Asplund and Simin Nadjm-Tehrani Analysing Delay-Tolerant Networks with Correlated Mobility . . . . . . . . . . 83--97 Waldir Moreira and Manuel de Souza and Paulo Mendes and Susana Sargento Study on the Effect of Network Dynamics on Opportunistic Routing . . . . . . . . 98--111 Micha\l Wódczak Autonomic Cooperative Networking for Vehicular Communications . . . . . . . . 112--125 Shikha Sarkar and Lina Stankovic and Ivan Andonovic Protocol Design for Farm Animal Monitoring Using Simulation . . . . . . 126--138 Guanyu Wang and Qiang-Sheng Hua and Yuexuan Wang Minimum Latency Aggregation Scheduling for Arbitrary Tree Topologies under the SINR Model . . . . . . . . . . . . . . . 139--152 Jacques M. Bahi and Abdallah Makhoul and Maguy Medlej An Optimized In-Network Aggregation Scheme for Data Collection in Periodic Sensor Networks . . . . . . . . . . . . 153--166 Nicholas M. Boers and Ioanis Nikolaidis and Pawel Gburzynski Impulsive Interference Avoidance in Dense Wireless Sensor Networks . . . . . 167--180 Wei Shi and Meng Yao and Jean-Pierre Corriveau Resilient Secure Localization and Detection of Colluding Attackers in WSNs 181--192 Dan Tao and Shaojie Tang and Huadong Ma Low Cost Data Gathering Using Mobile Hybrid Sensor Networks . . . . . . . . . 193--206 Daniel Bimschas and Oliver Kleine and Dennis Pfisterer Debugging the Internet of Things: a 6LoWPAN/CoAP Testbed Infrastructure . . 207--220 Álvaro Torres and Carlos T. Calafate and Juan-Carlos Cano and Pietro Manzoni Evaluating the Effectiveness of a QoS Framework for MANETs in a Real Testbed 221--234 Thomas Scherer and Clemens Lombriser and Wolfgang Schott and Hong Linh Truong and Beat Weiss Wireless Sensor Network for Continuous Temperature Monitoring in Air-Cooled Data Centers: Applications and Measurement Results . . . . . . . . . . 235--248 Tzu Hao Li and Alexey Borisenko and Miodrag Bolic Open Platform Semi-passive RFID Tag . . 249--259 Sandra Sendra and Jose V. Lamparero and Jaime Lloret and Miguel Ardid Study of the Optimum Frequency at 2.4GHz ISM Band for Underwater Wireless Ad Hoc Communications . . . . . . . . . . . . . 260--273 Anonymous Front Matter . . . . . . . . . . . . . . ??
Nikolaj Bjòrner Taking Satisfiability to the Next Level with Z3 . . . . . . . . . . . . . . . . 1--8 Yuri Matiyasevich Enlarging the Scope of Applicability of Successful Techniques for Automated Reasoning in Mathematics . . . . . . . . 9--9 Robert Nieuwenhuis SAT and SMT Are Still Resolution: Questions and Challenges . . . . . . . . 10--13 Siva Anantharaman and Serdar Erbatur and Christopher Lynch and Paliath Narendran Unification Modulo Synchronous Distributivity . . . . . . . . . . . . . 14--29 Franz Baader and Stefan Borgwardt and Barbara Morawska SAT Encoding of Unification in $\mathcal{ELH}_{R^+}$ w.r.t. Cycle-Restricted Ontologies . . . . . . 30--44 Franz Baader and Julian Mendez and Barbara Morawska UEL: Unification Solver for the Description Logic $\mathcal{EL}$ --- System Description . . . . . . . . . . . 45--51 Matthias Baaz and Ori Lahav and Anna Zamansky Effective Finite-Valued Semantics for Labelled Calculi . . . . . . . . . . . . 52--66 François Bobot and Sylvain Conchon and Evelyne Contejean and Mohamed Iguernelala and Assia Mahboubi A Simplex-Based Extension of Fourier--Motzkin for Solving Linear Integer Arithmetic . . . . . . . . . . . 67--81 Stefan Borgwardt and Felix Distel and Rafael Peñaloza How Fuzzy Is My Fuzzy Description Logic? 82--96 Taus Brock-Nannestad and Carsten Schürmann Truthful Monadic Abstractions . . . . . 97--110 Chad E. Brown Satallax: An Automatic Higher-Order Prover . . . . . . . . . . . . . . . . . 111--117 Roberto Bruttomesso and Silvio Ghilardi and Silvio Ranise From Strong Amalgamability to Modularity of Quantifier-Free Interpolation . . . . 118--133 Melisachew Wudage Chekol and Jérôme Euzenat and Pierre Genev\`es and Nabil Laya\"\ida SPARQL Query Containment under RDFS Entailment Regime . . . . . . . . . . . 134--148 Frank de Boer and Marcello Bonsangue and Jurriaan Rot Automated Verification of Recursive Programs with Pointers . . . . . . . . . 149--163 Stéphanie Delaune and Steve Kremer and Daniel Pasaila Security Protocols, Constraint Systems, and Group Theories . . . . . . . . . . . 164--178 Stéphane Demri and Amit Kumar Dhar and Arnaud Sangnier Taming Past LTL and Flat Counter Systems 179--193 Mnacho Echenim and Nicolas Peltier A Calculus for Generating Ground Explanations . . . . . . . . . . . . . . 194--209 Moshe Emmer and Zurab Khasidashvili and Konstantin Korovin and Christoph Sticksel EPR-Based Bounded Model Checking at Word Level . . . . . . . . . . . . . . . . . 210--224 Fabian Emmes and Tim Enger and Jürgen Giesl Proving Non-looping Non-termination Automatically . . . . . . . . . . . . . 225--240 Stephan Falke and Deepak Kapur Rewriting Induction + Linear Arithmetic = Decision Procedure . . . . . . . . . . 241--255 Anonymous Front Matter . . . . . . . . . . . . . . ??
Wolfgang Reisig A Fresh Look at Petri Net Extensions . . 1--9 Karsten Gabriel and Hartmut Ehrig Modelling of Communication Platforms Using Algebraic High-Level Nets and Their Processes . . . . . . . . . . . . 10--25 Herbert Weber Modeling Revisited . . . . . . . . . . . 26--35 Marco Konersmann and Michael Goedicke A Conceptual Framework and Experimental Workbench for Architectures . . . . . . 36--52 Djamshid Tavangarian Virtual Computing: The Emperor's New Clothes? . . . . . . . . . . . . . . . . 53--70 Frank Leymann Linked Compute Units and Linked Experiments: Using Topology and Orchestration Technology for Flexible Support of Scientific Applications . . . 71--80 Kristian Beckers and Stephan Faßbender Pattern-Based Context Establishment for Service-Oriented Architectures . . . . . 81--101 Michael P. Papazoglou Cloud Blueprints for Integrating and Managing Cloud Federations . . . . . . . 102--119 Ingolf Krüger and Barry Demchak Dynamic Service Composition and Deployment with OpenRichServices . . . . 120--146 Kirill Mechitov and Gul Agha An Architecture for Dynamic Service-Oriented Computing in Networked Embedded Systems . . . . . . . . . . . . 147--164 Christoph Rensing and Stephan Tittel Location-Based Services for Technology Enhanced Learning and Teaching . . . . . 165--179 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Daniel J. Olsher COGPARSE: Brain-Inspired Knowledge-Driven Full Semantics Parsing 1--11 Thomas Mazzocco and Erik Cambria and Amir Hussain and Qiu-Feng Wang Sentic Neural Networks: a Novel Cognitive Model for Affective Common Sense Reasoning . . . . . . . . . . . . 12--21 Terry G. Rawlinson and Shulan Lu and Patrick Coleman Individual Differences in Working Memory Capacity and Presence in Virtual Environments . . . . . . . . . . . . . . 22--30 Kamran Farooq and Amir Hussain and Stephen Leslie and Chris Eckl and Calum MacRae and Warner Slack An Ontology Driven and Bayesian Network Based Cardiovascular Decision Support Framework . . . . . . . . . . . . . . . 31--41 Kamran Farooq and Amir Hussain and Stephen Leslie and Chris Eckl and Calum MacRae and Warner Slack Semantically Inspired Electronic Healthcare Records . . . . . . . . . . . 42--51 Hui Wei and Zheng Dong A CSP-Based Orientation Detection Model 52--61 Murat Perit Çakìr and Abdullah Murat \cSenyi\ugit and Daryal Murat Akay and Hasan Ayaz and Veysi \.I\csler Evaluation of UAS Camera Operator Interfaces in a Simulated Task Environment: An Optical Brain Imaging Approach . . . . . . . . . . . . . . . . 62--71 Chunguang Li and Lining Sun Cerebral Activation Patterns in the Preparation and Movement Periods of Spontaneous and Evoked Movements . . . . 72--81 Erfu Yang and Amir Hussain and Kevin Gurney Neurobiologically-Inspired Soft Switching Control of Autonomous Vehicles 82--91 Amir Hussain and Rudwan Abdullah and Erfu Yang and Kevin Gurney An Intelligent Multiple-Controller Framework for the Integrated Control of Autonomous Vehicles . . . . . . . . . . 92--101 Derek Harter Evolution of Small-World Properties in Embodied Networks . . . . . . . . . . . 102--111 Yujuan Qi and Yanjiang Wang and Tingting Xue Brain Memory Inspired Template Updating Modeling for Robust Moving Object Tracking Using Particle Filter . . . . . 112--119 Juan Huo and Alan Murray VLSI Implementation of Barn Owl Superior Colliculus Network for Visual and Auditory Integration . . . . . . . . . . 120--128 Fuluo Wang and Yourui Huang and Ming Shi and Shanshan Wu Membrane Computing Optimization Method Based on Catalytic Factor . . . . . . . 129--137 Murat Ozgoren and Merve Tetik and Kurtulus Izzetoglu and Adile Oniz and Banu Onaral Effect of Body Position on NIRS Based Hemodynamic Measures from Prefrontal Cortex . . . . . . . . . . . . . . . . . 138--146 Hasan Ayaz and Scott Bunce and Patricia Shewokis and Kurtulus Izzetoglu and Ben Willems Using Brain Activity to Predict Task Performance and Operator Efficiency . . 147--155 Ligang Wang and Jie Kong and Jing Luo and Wenbin Gao and Xianju Guo ``Arousal'' or ``Activation'' Dysfunction in the Frontal Region of Children with Attention--Deficit/Hyperactivity Disorder: Evidence from an Electroencephalogram Study . . . . . . . 156--163 Marco Fagiani and Emanuele Principi and Stefano Squartini and Francesco Piazza A New Italian Sign Language Database . . 164--173 Gahangir Hossain and Mark H. Myers and Robert Kozma Study of Phase Relationships in ECoG Signals Using Hilbert--Huang Transforms 174--182 Scott C. Bunce and Kurtulus Izzetoglu and Meltem Izzetoglu and Hasan Ayaz and Kambiz Pourrezaei Treatment Status Predicts Differential Prefrontal Cortical Responses to Alcohol and Natural Reinforcer Cues among Alcohol Dependent Individuals . . . . . 183--191 Anonymous Front Matter . . . . . . . . . . . . . . ??
Alexander A. Frolov and Du\vsan Húsek and Pavel Yu. Polyakov Attractor Neural Network Combined with Likelihood Maximization Algorithm for Boolean Factor Analysis . . . . . . . . 1--10 Zaiyong Tang and Kallol Bagchi and Youqin Pan and Gary J. Koehler Pruning Feedforward Neural Network Search Space Using Local Lipschitz Constants . . . . . . . . . . . . . . . 11--20 Wook-Dong Kim and Sung-Kwun Oh and Hyun-Ki Kim Context FCM-Based Radial Basis Function Neural Networks with the Aid of Fuzzy Clustering . . . . . . . . . . . . . . . 21--28 Li-Jie Zhao and Jian Tang and Tian-you Chai Modeling Spectral Data Based on Mutual Information and Kernel Extreme Learning Machines . . . . . . . . . . . . . . . . 29--36 Jing Wang and Haibo He and Yuan Cao and Jin Xu and Dongbin Zhao A Hierarchical Neural Network Architecture for Classification . . . . 37--46 Zhende Ke and Yiwen Yang and Yunong Zhang Discrete-Time ZNN Algorithms for Time-Varying Quadratic Programming Subject to Time-Varying Equality Constraint . . . . . . . . . . . . . . . 47--54 Xibin Zhu and Frank-Michael Schleif and Barbara Hammer Patch Processing for Relational Learning Vector Quantization . . . . . . . . . . 55--63 Zheng Zhang A Neural Network Model for Currency Arbitrage Detection . . . . . . . . . . 64--71 Shuxia Lu and Guiqiang Zhang and Xizhao Wang A Rank Reduced Matrix Method in Extreme Learning Machine . . . . . . . . . . . . 72--79 Wentao Mao and Mei Tian and Guirong Yan and Xianfang Wang Research of Dynamic Load Identification Based on Extreme Learning Machine . . . 80--89 Wei Huang and Sung-Kwun Oh Fuzzy Relation-Based Polynomial Neural Networks Based on Hybrid Optimization 90--97 Yunong Zhang and Yunjia Xie and Hongzhou Tan Time-Varying Moore--Penrose Inverse Solving Shows Different Zhang Functions Leading to Different ZNN Models . . . . 98--105 Kun Zhang and Cuirong Wang and Baoyan Wang A Multi-object Segmentation Algorithm Based on Background Modeling and Region Growing . . . . . . . . . . . . . . . . 106--115 Wei-Feng Zhang and Peng Yang and Dao-Qing Dai and Arye Nehorai Reflectance Estimation Using Local Regression Methods . . . . . . . . . . . 116--122 Lei Gu Applying a Novel Decision Rule to the Semi-supervised Clustering Method Based on One-Class SVM . . . . . . . . . . . . 123--131 He Huang and Xiaoping Chen State Estimation of Markovian Jump Neural Networks with Mixed Time Delays 132--139 Qiaojie Li and Zhoushun Zheng and Shuang Wang and Jiankang Liu Lattice Boltzmann Model for Nonlinear Heat Equations . . . . . . . . . . . . . 140--148 Wenyu Yang and Jie Yang and Wei Wu A Modified One-Layer Spiking Neural Network Involves Derivative of the State Function at Firing Time . . . . . . . . 149--158 Yingwei Zhang and Chuang Wang Modeling and Monitoring of Multimodes Process . . . . . . . . . . . . . . . . 159--168 Yingwei Zhang and Hailong Zhang Data-Based Modeling and Monitoring for Multimode Processes Using Local Tangent Space Alignment . . . . . . . . . . . . 169--178 Anonymous Front Matter . . . . . . . . . . . . . . ??
Dazhong Ma and Jinhai Liu and Zhanshan Wang The Pattern Classification Based on Fuzzy Min-max Neural Network with New Algorithm . . . . . . . . . . . . . . . 1--9 Li-jie Zhao and Tian-you Chai and Xiao-kun Diao and De-cheng Yuan Multi-class Classification with One-Against-One Using Probabilistic Extreme Learning Machine . . . . . . . . 10--19 Shangfei Wang and Shan He and Hua Zhu Similarity Measurement and Feature Selection Using Genetic Algorithm . . . 20--29 Ting Wang and Sheng-Uei Guan and Fei Liu Entropic Feature Discrimination Ability for Pattern Classification Based on Neural IAL . . . . . . . . . . . . . . . 30--37 Wook-Dong Kim and Sung-Kwun Oh and Jeong-Tae Kim Design of Optimized Radial Basis Function Neural Networks Classifier with the Aid of Fuzzy Clustering and Data Preprocessing Method . . . . . . . . . . 38--45 Yongsheng Dong and Jinwen Ma An Efficient Histogram-Based Texture Classification Method with Weighted Symmetrized Kullback--Leibler Divergence 46--55 Qiaoge Zhang and Zhigang Liu and Gang Chen The Recognition Study of Impulse and Oscillation Transient Based on Spectral Kurtosis and Neural Network . . . . . . 56--63 Min Han and Xiaoxin Liu Forward Feature Selection Based on Approximate Markov Blanket . . . . . . . 64--72 Tianshu Wu and Kunqing Xie and Chengkai Nie and Guojie Song An Adaption of Relief for Redundant Feature Elimination . . . . . . . . . . 73--81 Jian Tang and Li-Jie Zhao and Yi-miao Li and Tian-you Chai and S. Joe Qin Feature Selection of Frequency Spectrum for Modeling Difficulty to Measure Process Parameters . . . . . . . . . . . 82--91 Zunyi Tang and Shuxue Ding Nonnegative Dictionary Learning by Nonnegative Matrix Factorization with a Sparsity Constraint . . . . . . . . . . 92--101 Dongyue Chen and Zongwen Chen and Xiaosheng Yu A New Method for Hand Detection Based on Hough Forest . . . . . . . . . . . . . . 102--109 Jia Li and Changyong Niu and Ming Fan Multi-scale Convolutional Neural Networks for Natural Scene License Plate Detection . . . . . . . . . . . . . . . 110--119 Zhao Liu and Guiyu Feng and Dewen Hu Robust Mean Shift Tracking with Background Information . . . . . . . . . 120--129 Lijuan Jia and Dandan Song and Linmi Tao and Yao Lu Heart Sounds Classification with a Fuzzy Neural Network Method with Structure Learning . . . . . . . . . . . . . . . . 130--140 Ting Zhang and Guosheng Yang and Xinkai Kuai On Cortex Mechanism Hierarchy Model for Facial Expression Recognition: Multi-database Evaluation Results . . . 141--148 Mehreen Saeed LEFT--Logical Expressions Feature Transformation: a Framework for Transformation of Symbolic Features . . 149--158 Songping Mai and Yixin Zhao and Chun Zhang and Zhihua Wang A Time-Frequency Aware Cochlear Implant: Algorithm and System . . . . . . . . . . 159--168 Xiaosheng Yu and Chengdong Wu and Dongyue Chen and Ting Zhou and Tong Jia Gradient Vector Flow Based on Anisotropic Diffusion . . . . . . . . . 169--178 Kai Huang and Liqing Zhang and Yang Wu ECG Classification Based on Non-cardiology Feature . . . . . . . . . 179--186 Anonymous Front Matter . . . . . . . . . . . . . . ??
Florian Hess Generalised Jacobians in Cryptography and Coding Theory . . . . . . . . . . . 1--15 Gerardo Vega and Carlos A. Vázquez The Weight Distribution of a Family of Reducible Cyclic Codes . . . . . . . . . 16--28 Olav Geil and Stefano Martin and Ryutaroh Matsumoto A New Method for Constructing Small-Bias Spaces from Hermitian Codes . . . . . . 29--44 Pierre-Louis Cayrel and Sidi Mohamed El Yousfi Alaoui and Gerhrad Hoffmann and Pascal Véron An Improved Threshold Ring Signature Scheme Based on Error Correcting Codes 45--63 Alexander Pott and Qi Wang and Yue Zhou Sequences and Functions Derived from Projective Planes and Their Difference Sets . . . . . . . . . . . . . . . . . . 64--80 Lin Sok and Patrick Solé On Formally Self-dual Boolean Functions in 2,4 and 6 Variables . . . . . . . . . 81--91 Boris Batteux On the Algebraic Normal Form and Walsh Spectrum of Symmetric Functions over Finite Rings . . . . . . . . . . . . . . 92--107 Lilya Budaghyan and Oleksandr Kazymyrov Verification of Restricted EA-Equivalence for Vectorial Boolean Functions . . . . . . . . . . . . . . . 108--118 Shay Gueron and Vlad Krasnov Software Implementation of Modular Exponentiation, Using Advanced Vector Instructions Architectures . . . . . . . 119--135 Nadia El Mrabet and Nicolas Gama Efficient Multiplication over Extension Fields . . . . . . . . . . . . . . . . . 136--151 Danuta Pamula and Arnaud Tisserand ${\rm GF}(2^m)$ Finite-Field Multipliers with Reduced Activity Variations . . . . 152--167 Razvan Barbulescu and Jérémie Detrey and Nicolas Estibals and Paul Zimmermann Finding Optimal Formulae for Bilinear Maps . . . . . . . . . . . . . . . . . . 168--186 Benedikt Driessen and Christof Paar Solving Binary Linear Equation Systems over the Rationals and Binaries . . . . 187--195 Sami Omar and Raouf Ouni and Saber Bouanani Hashing with Elliptic Curve $L$-Functions . . . . . . . . . . . . . 196--207 Emmanuel Thomé Square Root Algorithms for the Number Field Sieve . . . . . . . . . . . . . . 208--224 Ryuichi Harasawa and Yutaka Sueyoshi and Aichi Kudo Improving the Berlekamp Algorithm for Binomials $x^n - a$ . . . . . . . . . . 225--235 Sumanta Sarkar and Srimanta Bhattacharya and Ayça Çe\csmelio\uglu On Some Permutation Binomials of the Form $x^{\frac{2^n - 1}{k} + 1} + a x$ over $\mathbb{F}_{2^n}$: Existence and Count . . . . . . . . . . . . . . . . . 236--246 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . 1--1 Michael A. Langston Fixed-Parameter Tractability, A Prehistory . . . . . . . . . . . . . . . 3--16 Rod Downey The Birth and Early Years of Parameterized Complexity . . . . . . . . 17--38 Neal Koblitz Crypto Galore! . . . . . . . . . . . . . 39--50 Todd Wareham Flyby: Life Before, During, and After Graduate Studies with Mike Fellows . . . 51--55 Ulrike Stege The Impact of Parameterized Complexity to Interdisciplinary Problem Solving . . 56--68 Venkatesh Raman Vertex Cover, Dominating Set and My Encounters with Parameterized Complexity and Mike Fellows . . . . . . . . . . . . 69--73 Jan Arne Telle Mike Fellows: Weaving the Web of Mathematics and Adventure . . . . . . . 74--79 Frances Rosamond Passion Plays: Melodramas about Mathematics . . . . . . . . . . . . . . 80--87 Anonymous Front Matter . . . . . . . . . . . . . . 89--89 Rod Downey A Basic Parameterized Complexity Primer 91--128 Daniel Lokshtanov and Neeldhara Misra and Saket Saurabh Kernelization --- Preprocessing with a Guarantee . . . . . . . . . . . . . . . 129--161 Jianer Chen and Iyad A. Kanj Parameterized Complexity and Subexponential-Time Computability . . . 162--195 Hans L. Bodlaender Fixed-Parameter Tractability of Treewidth and Pathwidth . . . . . . . . 196--227 Dimitrios M. Thilikos Graph Minors and Parameterized Algorithm Design . . . . . . . . . . . . . . . . . 228--256 Gregory Gutin and Anders Yeo Constraint Satisfaction Problems Parameterized above or below Tight Bounds: a Survey . . . . . . . . . . . . 257--286 Serge Gaspers and Stefan Szeider Backdoors to Satisfaction . . . . . . . 287--317 Nadja Betzler and Robert Bredereck and Jiehua Chen and Rolf Niedermeier Studies in Computational Aspects of Voting . . . . . . . . . . . . . . . . . 318--363 Yijia Chen and Jörg Flum A Parameterized Halting Problem . . . . 364--397 Tim Bell and Frances Rosamond and Nancy Casey Computer Science Unplugged and Related Projects in Math and Computer Science Popularization . . . . . . . . . . . . . 398--456 Fedor V. Fomin and Dániel Marx FPT Suspects and Tough Customers: Open Problems of Downey and Fellows . . . . . 457--468 Dániel Marx What's Next? Future Directions in Parameterized Complexity . . . . . . . . 469--496 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Leendert van der Torre Logics for Security and Privacy . . . . 1--7 Yuan Cheng and Jaehong Park and Ravi Sandhu A User-to-User Relationship-Based Access Control Model for Online Social Networks 8--24 Alessandro Armando and Silvio Ranise Automated and Efficient Analysis of Role-Based Access Control with Attributes . . . . . . . . . . . . . . . 25--40 Xin Jin and Ram Krishnan and Ravi Sandhu A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC . . . . 41--55 Joachim Biskup and Sven Hartmann and Sebastian Link and Jan-Hendrik Lochner and Torsten Schlotmann Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join Dependencies 56--73 Rosa Karimi Adl and Mina Askari and Ken Barker and Reihaneh Safavi-Naini Privacy Consensus in Anonymization Systems via Game Theory . . . . . . . . 74--89 Gianluca Dini and Pericle Perazzo Uniform Obfuscation for Location Privacy 90--105 Ravi Singh Pippal and Jaidhar C. D. and Shashikala Tapaswi Security Vulnerabilities of User Authentication Scheme Using Smart Card 106--113 Ding Wang and Chun-guang Ma and Peng Wu Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards . . . . . . . . . 114--121 Tiana Razafindralambo and Guillaume Bouffard and Jean-Louis Lanet A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard 122--128 Robert Nix and Murat Kantarcioglu and Keesook J. Han Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data 129--144 Jonathan L. Dautrich and Chinya V. Ravishankar Security Limitations of Using Secret Sharing for Data Outsourcing . . . . . . 145--160 Danish Mehmood and Basit Shafiq and Jaideep Vaidya and Yuan Hong and Nabil Adam Privacy-Preserving Subgraph Discovery 161--176 Simon N. Foley and William M. Fitzgerald Decentralized Semantic Threat Graphs . . 177--192 Rami Sharon and Ehud Gudes Code Type Revealing Using Experiments Framework . . . . . . . . . . . . . . . 193--206 Nikolay Yakovets and Jarek Gryz and Stephanie Hazlewood and Paul van Run From MDM to DB2: a Case Study of Security Enforcement Migration . . . . . 207--222 Smitha Sundareswaran and Anna Cinzia Squicciarini XSS-Dec: a Hybrid Solution to Mitigate Cross-Site Scripting Attacks . . . . . . 223--238 Abhijith Shastry and Murat Kantarcioglu and Yan Zhou and Bhavani Thuraisingham Randomizing Smartphone Malware Profiles against Statistical Mining Techniques 239--254 Hamed Saljooghinejad and Wilson Naik Bhukya Layered Security Architecture for Masquerade Attack Detection . . . . . . 255--262 Abbas Taheri Soodejani and Mohammad Ali Hadavi and Rasool Jalili $k$-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing . . . . . . . . . . . . 263--273 Anonymous Front Matter . . . . . . . . . . . . . . ??
Kaori Tosu and Noboru Kunihiro Optimal Bounds for Multi-Prime $\Phi$-Hiding Assumption . . . . . . . . 1--14 Atsushi Fujioka and Mark Manulis and Koutarou Suzuki and Berkant Ustao\uglu Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange . . . . . . . . . . . . . . . . 15--28 Haruna Higo and Keisuke Tanaka and Akihiro Yamada and Kenji Yasunaga A Game-Theoretic Perspective on Oblivious Transfer . . . . . . . . . . . 29--42 Yuji Nagashima and Noboru Kunihiro Faster Algorithm for Solving Hard Knapsacks for Moderate Message Length 43--56 Peter Lory and Manuel Liedel Accelerating the Secure Distributed Computation of the Mean by a Chebyshev Expansion . . . . . . . . . . . . . . . 57--70 Takanori Isobe and Kyoji Shibutani Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo . . 71--86 Yu Sasaki and Sareh Emami and Deukjo Hong and Ashish Kumar Improved Known-Key Distinguishers on Feistel--SP Ciphers and Application to Camellia . . . . . . . . . . . . . . . . 87--100 Jiazhe Chen and Leibo Li Low Data Complexity Attack on Reduced Camellia-256 . . . . . . . . . . . . . . 101--114 Xianmeng Meng and Xuexin Zheng Cryptanalysis of RSA with a Small Parameter . . . . . . . . . . . . . . . 115--123 Jintai Ding and Yanbin Pan and Yingpu Deng An Algebraic Broadcast Attack against NTRU . . . . . . . . . . . . . . . . . . 124--137 Mufeed ALMashrafi and Harry Bartlett and Leonie Simpson and Ed Dawson and Kenneth Koon-Ho Wong Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers 138--151 Ewan Fleischmann and Christian Forler and Stefan Lucks and Jakob Wenzel Weimar-DM: a Highly Secure Double-Length Compression Function . . . . . . . . . . 152--165 K. Preetha Mathew and Sachin Vasant and Sridhar Venkatesan and C. Pandu Rangan An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model . . . . . . . . . . . 166--179 Kirill Morozov and Tsuyoshi Takagi Zero-Knowledge Protocols for the McEliece Encryption . . . . . . . . . . 180--193 Jothi Rangasamy and Douglas Stebila and Colin Boyd and Juan Manuel González-Nieto Effort-Release Public-Key Encryption from Cryptographic Puzzles . . . . . . . 194--207 Manh Ha Nguyen and Keisuke Tanaka and Kenji Yasunaga Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs 208--222 Kun Peng and Matt Henricksen How to Fix Two RSA-Based PVSS Schemes--- Exploration and Solution . . . . . . . . 223--234 Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions . . . 235--246 Xiao Tan and Duncan S. Wong Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes . . . . . . . . . . . . . . . . 247--260 Haibo Tian and Xiaofeng Chen and Jin Li A Short Non-delegatable Strong Designated Verifier Signature . . . . . 261--279 Anonymous Front Matter . . . . . . . . . . . . . . ??
Anu Gupta and Subhrojyoti Sarkar An Efficient High Frequency and Low Power Analog Multiplier in Current Domain . . . . . . . . . . . . . . . . . 1--9 Biswajit Maity and Pradip Mandal Design of Push-Pull Dynamic Leaker Circuit for a Low Power Embedded Voltage Regulator . . . . . . . . . . . . . . . 10--18 Priyanka Choudhury and Sambhu Nath Pradhan Power Modeling of Power Gated FSM and Its Low Power Realization by Simultaneous Partitioning and State Encoding Using Genetic Algorithm . . . . 19--29 Rahul Shrestha and Roy Paily Design and Implementation of a Linear Feedback Shift Register Interleaver for Turbo Decoding . . . . . . . . . . . . . 30--39 Gunti Nagendra Babu and Brajesh Kumar Kaushik and Anand Bulusu and Manoj Kumar Majumder Low Complexity Encoder for Crosstalk Reduction in RLC Modeled Interconnects 40--45 Ashutosh Nandi and Ashok K. Saxena and Sudeb Dasgupta Analog Performance Analysis of Dual-$k$ Spacer Based Underlap FinFET . . . . . . 46--51 R. Jayagowri and K. S. Gurumurthy Implementation of Gating Technique with Modified Scan Flip-Flop for Low Power Testing of VLSI Chips . . . . . . . . . 52--58 Surajit Kumar Roy and Dona Roy and Chandan Giri and Hafizur Rahaman Post-bond Stack Testing for $3$D Stacked IC . . . . . . . . . . . . . . . . . . . 59--68 Soumyadip Bandyopadhyay and Kunal Banerjee and Dipankar Sarkar and Chittaranjan R. Mandal Translation Validation for PRES+ Models of Parallel Behaviours via an FSMD Equivalence Checker . . . . . . . . . . 69--78 Prabir Saha and Arindam Banerjee and Anup Dandapat and Partha Bhattacharyya Design of High Speed Vedic Multiplier for Decimal Number System . . . . . . . 79--88 Mamata Dalui and Biplab K. Sikdar An Efficient Test Design for CMPs Cache Coherence Realizing MESI Protocol . . . 89--98 Debapriya Basu Roy and Debdeep Mukhopadhyay An Efficient High Speed Implementation of Flexible Characteristic-2 Multipliers on FPGAs . . . . . . . . . . . . . . . . 99--110 Subrata Das and Partha Sarathi Dasgupta and Samar Sensarma Arithmetic Algorithms for Ternary Number System . . . . . . . . . . . . . . . . . 111--120 Dushyant Juneja and Sougata Kar and Procheta Chatterjee and Siddhartha Sen SOI MEMS Based Over-Sampling Accelerometer Design with $\Delta\Sigma$ Output . . . . . . . . . . . . . . . . . 121--128 Goutam Rana and Samir Kumar Lahiri and Chirasree Roy Chaudhuri Design Optimization of a Wide Band MEMS Resonator for Efficient Energy Harvesting . . . . . . . . . . . . . . . 129--138 Chandrabhan Kushwah and Santosh K. Vishvakarma Ultra-Low Power Sub-threshold SRAM Cell Design to Improve Read Static Noise Margin . . . . . . . . . . . . . . . . . 139--146 Arun Dobriyal and Rahul Gonnabattula and Pallab Dasgupta and Chittaranjan R. Mandal Workload Driven Power Domain Partitioning . . . . . . . . . . . . . . 147--155 Rituparna Dasgupta and Dipankar Saha and Jagannath Samanta and Sayan Chatterjee Implementation of a New Offset Generator Block for the Low-Voltage, Low-Power Self Biased Threshold Voltage Extractor Circuit . . . . . . . . . . . . . . . . 156--165 Manas Kumar Hati and Tarun Kanti Bhattacharyya A High Speed, Low Jitter and Fast Acquisition CMOS Phase Frequency Detector for Charge Pump PLL . . . . . . 166--171 Jaynarayan T. Tudu and Deepak Malani and Virendra Singh ILP Based Approach for Input Vector Controlled (IVC) Toggle Maximization in Combinational Circuits . . . . . . . . . 172--179 Anonymous Front Matter . . . . . . . . . . . . . . ??
Sabyasachi Karati and Abhijit Das and Dipanwita Roychowdhury and Bhargav Bellur Batch Verification of ECDSA Signatures 1--18 Sidi Mohamed El Yousfi Alaoui and Özgür Dagdelen and Pascal Véron and David Galindo Extended Security Arguments for Signature Schemes . . . . . . . . . . . 19--34 Sébastien Canard and Amandine Jambert and Roch Lescuyer Sanitizable Signatures with Several Signers and Sanitizers . . . . . . . . . 35--52 Jingjing Wang and Xiangxue Li and Kefei Chen and Wenzheng Zhang Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator 53--66 Julien Bringer and Hervé Chabanne and Mélanie Favre Fuzzy Vault for Multiple Users . . . . . 67--81 Reihaneh Safavi-Naini and Mohammed Ashraful Alam Tuhin Bounds and Constructions for $1$-Round $(0, \delta)$-Secure Message Transmission against Generalized Adversary . . . . . . . . . . . . . . . 82--98 Mohammed Meziani and Gerhard Hoffmann and Pierre-Louis Cayrel Improving the Performance of the SYND Stream Cipher . . . . . . . . . . . . . 99--116 Jiazhe Chen and Meiqin Wang and Bart Preneel Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT . . . . . . . . . . . . . . . 117--137 Yu Sasaki and Lei Wang and Yasuhide Sakai and Kazuo Sakiyama and Kazuo Ohta Three-Subset Meet-in-the-Middle Attack on Reduced XTEA . . . . . . . . . . . . 138--154 Yue Sun and Meiqin Wang and Shujia Jiang and Qiumei Sun Differential Cryptanalysis of Reduced-Round ICEBERG . . . . . . . . . 155--171 Thomas Eisenbarth and Zheng Gong and Tim Güneysu and Stefan Heyse and Sebastiaan Indesteege Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices . . . . . . . . . . . . . . . . 172--187 Enrico Thomae and Christopher Wolf Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important . . . . . . . . . . . . . 188--202 Augustin P. Sarr and Philippe Elbaz--Vincent A Complementary Analysis of the (s)YZ and DIKE Protocols . . . . . . . . . . . 203--220 Abderrahmane Nitaj A New Attack on RSA and CRT-RSA . . . . 221--233 Frederik Armknecht and Stefan Katzenbeisser and Andreas Peter Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption . . . . . . . . . . . . . . . 234--251 Ewan Fleischmann and Christian Forler and Stefan Lucks The Collision Security of MDC-4 . . . . 252--269 Jiali Choy and Huihui Yap and Khoongming Khoo and Jian Guo and Thomas Peyrin and Axel Poschmann SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks . . . . . . . . . . . 270--286 Elena Andreeva and Bart Mennink and Bart Preneel and Marjan \vSkrobot Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Gròstl, JH, Keccak, and Skein . . . . . . . . . . . 287--305 Thierry P. Berger and Joffrey D'Hayer and Kevin Marquet and Marine Minier and Gaël Thomas The GLUON Family: a Lightweight Hash Function Family Based on FCSRs . . . . . 306--323 Peter Schwabe and Bo-Yin Yang and Shang-Yi Yang SHA-3 on ARM11 Processors . . . . . . . 324--341 Anonymous Front Matter . . . . . . . . . . . . . . ??
Joseph Ayers and Daniel Blustein and Anthony Westphal A Conserved Biomimetic Control Architecture for Walking, Swimming and Flying Robots . . . . . . . . . . . . . 1--12 Luis Bobo and Ivan Herreros and Paul F. M. J. Verschure A Digital Neuromorphic Implementation of Cerebellar Associative Learning . . . . 13--25 Roberto Bortoletto and Massimo Sartori and Fuben He and Enrico Pagello Simulating an Elastic Bipedal Robot Based on Musculoskeletal Modeling . . . 26--37 Alexander S. Boxerbaum and Kathryn A. Daltorio and Hillel J. Chiel and Roger D. Quinn A Soft-Body Controller with Ubiquitous Sensor Feedback . . . . . . . . . . . . 38--49 Frédéric Boyer and Vincent Lebastard Exploration of Objects by an Underwater Robot with Electric Sense . . . . . . . 50--61 Ken Caluwaerts and Antoine Favre-Félix and Mariacarla Staffa and Steve N'Guyen and Christophe Grand Neuro-inspired Navigation Strategies Shifting for Robots: Integration of a Multiple Landmark Taxon Strategy . . . . 62--73 Federico Carpi and Gabriele Frediani and Danilo De Rossi Bioinspired Tunable Lens Driven by Electroactive Polymer Artificial Muscles 74--82 Eris Chinellato and Marco Antontelli and Angel P. del Pobil A Pilot Study on Saccadic Adaptation Experiments with Robots . . . . . . . . 83--94 Sanjay Dastoor and Sam Weiss and Hannah Stuart and Mark Cutkosky Jumping Robot with a Tunable Suspension Based on Artificial Muscles . . . . . . 95--106 Naveed Ejaz and Reiko J. Tanaka and Holger G. Krapp Static versus Adaptive Gain Control Strategy for Visuo-motor Stabilization 107--119 Thierry Hoinville and Rüdiger Wehner and Holk Cruse Learning and Retrieval of Memory Elements in a Navigation Task . . . . . 120--131 Tim Landgraf and Michael Oertel and Andreas Kirbach and Randolf Menzel and Raúl Rojas Imitation of the Honeybee Dance Communication System by Means of a Biomimetic Robot . . . . . . . . . . . . 132--143 André Luvizotto and César Rennó-Costa and Paul Verschure A Framework for Mobile Robot Navigation Using a Temporal Population Code . . . . 144--155 Encarni Marcos and Armin Duff and Martí Sánchez-Fibla and Paul F. M. J. Verschure Generalization of Integrator Models to Foraging: a Robot Study Using the DAC9 Model . . . . . . . . . . . . . . . . . 156--167 Ben Mitchinson and Martin J. Pearson and Anthony G. Pipe and Tony J. Prescott The Emergence of Action Sequences from Spatial Attention: Insight from Rodent-Like Robots . . . . . . . . . . . 168--179 Vishwanathan Mohan and Pietro Morasso How Past Experience, Imitation and Practice Can Be Combined to Swiftly Learn to Use Novel ``Tools'': Insights from Skill Learning Experiments with Baby Humanoids . . . . . . . . . . . . . 180--191 Dimitri Ognibene and Eris Chinellato and Miguel Sarabia and Yiannis Demiris Towards Contextual Action Recognition and Target Localization with Active Allocation of Attention . . . . . . . . 192--203 Ana Brându\csa Pavel and Cristian Ioan Vasile and Ioan Dumitrache Robot Localization Implemented with Enzymatic Numerical $P$ Systems . . . . 204--215 Andrew Philippides and Bart Baddeley and Philip Husbands and Paul Graham How Can Embodiment Simplify the Problem of View-Based Navigation? . . . . . . . 216--227 Mikhail I. Rabinovich and Pablo Varona The Dynamical Modeling of Cognitive Robot-Human Centered Interaction . . . . 228--237 Anonymous Front Matter . . . . . . . . . . . . . . ??
Pavel Turkov and Olga Krasotkina and Vadim Mottl Bayesian Approach to the Concept Drift in the Pattern Recognition Problems . . 1--10 Michelangelo Ceci and Annalisa Appice and Herna L. Viktor and Donato Malerba and Eric Paquet Transductive Relational Classification in the Co-training Paradigm . . . . . . 11--25 Rong Yang and Zhenyuan Wang Generalized Nonlinear Classification Model Based on Cross-Oriented Choquet Integral . . . . . . . . . . . . . . . . 26--39 Hai Thanh Nguyen and Katrin Franke A General $L_p$-norm Support Vector Machine via Mixed $0$--$1$ Programming 40--49 László Kovács Reduction of Distance Computations in Selection of Pivot Elements for Balanced GHT Structure . . . . . . . . . . . . . 50--62 Dieter William Joenssen and Udo Bankhofer Hot Deck Methods for Imputing Missing Data . . . . . . . . . . . . . . . . . . 63--75 Saket Bharambe and Harshit Dubey and Vikram Pudi BINER . . . . . . . . . . . . . . . . . 76--85 Kartick Chandra Mondal and Nicolas Pasquier and Anirban Mukhopadhyay and Ujjwal Maulik A New Approach for Association Rule Mining and Bi-clustering Using Formal Concept Analysis . . . . . . . . . . . . 86--101 Aixiang Li and Makoto Haraguchi and Yoshiaki Okubo Top-$N$ Minimization Approach for Indicative Correlation Change Mining . . 102--116 Rui Leite and Pavel Brazdil and Joaquin Vanschoren Selecting Classification Algorithms with Active Testing . . . . . . . . . . . . . 117--131 Amit Thombre Comparing Logistic Regression, Neural Networks, C5.0 and M5' Classification Techniques . . . . . . . . . . . . . . . 132--140 Upendra Sapkota and Barrett R. Bryant and Alan Sprague Unsupervised Grammar Inference Using the Minimum Description Length Principle . . 141--153 Thais Mayumi Oshiro and Pedro Santoro Perez and José Augusto Baranauskas How Many Trees in a Random Forest? . . . 154--168 Tao Xu and David Chiu and Iker Gondra Constructing Target Concept in Multiple Instance Learning Using Maximum Partial Entropy . . . . . . . . . . . . . . . . 169--182 Heni Bouhamed and Afif Masmoudi and Thierry Lecroq and Ahmed Reba\"\i A New Learning Structure Heuristic of Bayesian Networks from Data . . . . . . 183--197 Nikolaos Pitelis and Anastasios Tefas Discriminant Subspace Learning Based on Support Vectors Machines . . . . . . . . 198--212 Nong Thi Hoa and Bui The Duy A New Learning Strategy of General BAMs 213--221 Godfried T. Toussaint and Constantin Berzan Proximity-Graph Instance-Based Learning, Support Vector Machines, and High Dimensionality: An Empirical Comparison 222--236 Javid Ebrahimi and Mohammad Saniee Abadeh Semi Supervised Clustering: a Pareto Approach . . . . . . . . . . . . . . . . 237--251 Andreia Silva and Cláudia Antunes Semi-supervised Clustering: a Case Study 252--263 Anonymous Front Matter . . . . . . . . . . . . . . ??
Rainer Schmidt and Heike Weiss and Georg Fuellen Application of Classification Algorithms on IDDM Rat Data . . . . . . . . . . . . 1--8 Isabelle Bichindaritz Research Themes in the Case-Based Reasoning in Health Sciences Core Literature . . . . . . . . . . . . . . . 9--23 Arnis Kirshners and Serge Parshutin and Marcis Leja Research on Application of Data Mining Methods to Diagnosing Gastric Cancer . . 24--37 Gabor I. Nagy and Krisztian Buza SOHAC: Efficient Storage of Tick Data That Supports Search and Analysis . . . 38--51 Hongyan Liu and Zhiyuan Yao and Tomas Eklund and Barbro Back Electricity Consumption Time Series Profiling: a Data Mining Application in Energy Industry . . . . . . . . . . . . 52--66 Pedro Santos and Luisa F. Villa and Aníbal Reñones and Andrés Bustillo and Jesús Maudes Wind Turbines Fault Diagnosis Using Ensemble Classifiers . . . . . . . . . . 67--76 Luís Moreira-Matias and Carlos Ferreira and João Gama and João Mendes-Moreira Bus Bunching Detection by Mining Sequences of Headway Deviations . . . . 77--91 Ronnie Alves and Pedro Ferreira and Joel Ribeiro and Orlando Belo Detecting Abnormal Patterns in Call Graphs Based on the Aggregation of Relevant Vertex Measures . . . . . . . . 92--102 Andriy Ivannikov and Mikko Jegoroff and Tommi Kärkkäinen Real-Time Mass Flow Estimation in Circulating Fluidized Bed . . . . . . . 103--112 Ons Lejri and Moncef Tagina Representation in Case-Based Reasoning Applied to Control Reconfiguration . . . 113--120 Jef Vanlaer and Pieter Van den Kerkhof and Geert Gins and Jan F. M. Van Impe The Influence of Input and Output Measurement Noise on Batch-End Quality Prediction with Partial Least Squares 121--135 Kaoru Shimada An Evolving Associative Classifier for Incomplete Database . . . . . . . . . . 136--150 Laura Welcker and Stephan Koch and Frank Dellmann Improving Classifier Performance by Knowledge-Driven Data Preparation . . . 151--165 Eunkyoung Park and Younghee Kim and Ieejoon Kim and Jaeyeol Yoon and Jiyeon Lim and Ungmo Kim CWFM: Closed Contingency Weighted Frequent Itemsets Mining . . . . . . . . 166--177 Leon Bobrowski and Tomasz \Lukaszuk Prognostic Modeling with High Dimensional and Censored Data . . . . . 178--193 Eya Ben Ahmed and Ahlem Nabli and Fa\"\iez Gargouri $\mathcal{SHACUN}$: Semi-supervised Hierarchical Active Clustering Based on Ranking Constraints . . . . . . . . . . 194--208 Xiaochun Wang and Xia Li Wang and D. Mitch Wilkes A Minimum Spanning Tree-Inspired Clustering-Based Outlier Detection Technique . . . . . . . . . . . . . . . 209--223 Samir A. Mohamed Elsayed and Sanguthevar Rajasekaran and Reda A. Ammar ML-DS: a Novel Deterministic Sampling Algorithm for Association Rules Mining 224--235 Wies\law Paja and Mariusz Wrzesie\'n Decision Rules Development Using Set of Generic Operations Approach . . . . . . 236--242 Sebastian Klenk and Jürgen Dippon and Andre Burkovski and Gunther Heidemann Redundant Dictionary Spaces as a General Concept for the Analysis of Non-vectorial Data . . . . . . . . . . . 243--257 Anonymous Front Matter . . . . . . . . . . . . . . ??
Albert Clapés and Miguel Reyes and Sergio Escalera User Identification and Object Recognition in Clutter Scenes Based on RGB-Depth Analysis . . . . . . . . . . . 1--11 Margara Tejera and Adrian Hilton Compression Techniques for $3$D Video Mesh Sequences . . . . . . . . . . . . . 12--25 Sòren Hauberg and Kim Steenstrup Pedersen Spatial Measures between Human Poses for Classification and Understanding . . . . 26--36 Rune Havnung Bakken and Adrian Hilton Real-Time Pose Estimation Using Constrained Dynamics . . . . . . . . . . 37--46 Junghyun Ahn and Stéphane Gobron and David Garcia An NVC Emotional Model for Conversational Virtual Humans in a $3$D Chatting Environment . . . . . . . . . . 47--57 Stéphane Gobron and Junghyun Ahn and David Garcia An Event-Based Architecture to Manage Virtual Human Non-Verbal Communication in $3$D Chatting Environment . . . . . . 58--68 María del Puy Carretero and Aitor Ardanza Improving Gestural Communication in Virtual Characters . . . . . . . . . . . 69--81 Sergio Navarro and Adolfo López-Méndez Multi-view Body Tracking with a Detector-Driven Hierarchical Particle Filter . . . . . . . . . . . . . . . . . 82--91 Bogdan Kwolek and Tomasz Krzeszowski Real-Time Multi-view Human Motion Tracking Using Particle Swarm Optimization with Resampling . . . . . . 92--101 Alexandros Neophytou and Adrian Hilton A Comparative Study of Surface Representations Used in Statistical Human Models . . . . . . . . . . . . . . 102--113 Ran Xu and Priyanshu Agarwal and Suren Kumar Combining Skeletal Pose with Local Motion for Human Activity Recognition 114--123 Claudio Loconsole and Nuno Barbosa A New Marker-Less $3$D Kinect-Based System for Facial Anthropometric Measurements . . . . . . . . . . . . . . 124--133 Kensuke Kitamura and Noriko Takemura and Yoshio Iwai Automatic Detection of Unconscious Reactions to Illuminance Changes in Illumination . . . . . . . . . . . . . . 134--143 Stuart Bennett and Joan Lasenby Deformation Measurement of a Human Chest Experiencing Global Motion . . . . . . . 144--152 Thomas Jensen and Henrik Rasmussen Automatic Estimation of Movement Statistics of People . . . . . . . . . . 153--162 Seth Holladay and Parris Egbert Granular Material Deposition for Simulation and Texturing . . . . . . . . 163--172 Nader Mahmoud and Stephane A. Nicolau Fast $3$D Structure From Motion with Missing Points from Registration of Partial Reconstructions . . . . . . . . 173--183 Xiangyang Ju and Balvinder Khambay and Emer O'Leary Evaluation of the Reproducibility of Non-verbal Facial Animations . . . . . . 184--193 Francisco Ramos and Oscar Ripolles and Miguel Chover Continuous Level of Detail for Large Scale Rendering of $3$D Animated Polygonal Models . . . . . . . . . . . . 194--203 Wenjuan Gong and Jordi Gonz\`alez A New Image Dataset on Human Interactions . . . . . . . . . . . . . . 204--209 Anonymous Front Matter . . . . . . . . . . . . . . ??
Shlomo Berkovsky and Jill Freyne and Gregory Smith Personalized Network Updates: Increasing Social Interactions and Contributions in Social Networks . . . . . . . . . . . . 1--13 Fabian Bohnert and Ingrid Zukerman and David W. Albrecht Realistic Simulation of Museum Visitors' Movements as a Tool for Assessing Sensor-Based User Models . . . . . . . . 14--25 Fabian Bohnert and Ingrid Zukerman and Junaidy Laures GECKOmmender: Personalised Theme and Tour Recommendations for Museums . . . . 26--37 Federica Cena and Silvia Likavec and Francesco Osborne Property-Based Interest Propagation in Ontology-Based User Model . . . . . . . 38--50 Federico Cirett Galán and Carole R. Beal EEG Estimates of Engagement and Cognitive Workload Predict Math Problem Solving Outcomes . . . . . . . . . . . . 51--62 Maunendra Sankar Desarkar and Roopam Saxena and Sudeshna Sarkar Preference Relation Based Matrix Factorization for Recommender Systems 63--75 John Finnson and Jie Zhang and Thomas Tran and Umar Farooq Minhas and Robin Cohen A Framework for Modeling Trustworthiness of Users in Mobile Vehicular Ad-Hoc Networks and Its Validation through Simulated Traffic Flow . . . . . . . . . 76--87 Qi Gao and Fabian Abel and Geert-Jan Houben and Yong Yu A Comparative Study of Users' Microblogging Behavior on Sina Weibo and Twitter . . . . . . . . . . . . . . . . 88--101 Yue Gong and Joseph E. Beck and Carolina Ruiz Modeling Multiple Distributions of Student Performances to Improve Predictive Accuracy . . . . . . . . . . 102--113 Guibing Guo and Jie Zhang and Daniel Thalmann A Simple But Effective Method to Incorporate Trusted Neighbors in Recommender Systems . . . . . . . . . . 114--125 Samad Kardan and Cristina Conati Exploring Gaze Data for Determining User Learning with an Interactive Simulation 126--138 Melanie Larizza and Ingrid Zukerman and Fabian Bohnert and R. Andrew Russell and Lucy Busija Studies to Determine User Requirements Regarding In-Home Monitoring Systems . . 139--150 Martin Leginus and Peter Dolog and Valdas \vZemaitis Improving Tensor Based Recommenders with Clustering . . . . . . . . . . . . . . . 151--163 Janette Lehmann and Mounia Lalmas and Elad Yom-Tov and Georges Dupret Models of User Engagement . . . . . . . 164--175 Monika Mandl and Alexander Felfernig Improving the Performance of Unit Critiquing . . . . . . . . . . . . . . . 176--187 Cataldo Musto and Fedelucio Narducci and Pasquale Lops and Giovanni Semeraro and Marco de Gemmis Enhanced Semantic TV-Show Representation for Personalized Electronic Program Guides . . . . . . . . . . . . . . . . . 188--199 Vidhya Navalpakkam and Ravi Kumar and Lihong Li and D. Sivakumar Attention and Selection in Online Choice Tasks . . . . . . . . . . . . . . . . . 200--211 Ingrid Nunes and Simon Miles and Michael Luck and Carlos J. P. de Lucena Investigating Explanations to Justify Choice . . . . . . . . . . . . . . . . . 212--224 Luiz Augusto Pizzato and Joshua Akehurst and Cameron Silvestrini and Kalina Yacef The Effect of Suspicious Profiles on People Recommenders . . . . . . . . . . 225--236 Alan Said and Brijnesh J. Jain and Sascha Narr and Till Plumbaum Users and Noise: The Magic Barrier of Recommender Systems . . . . . . . . . . 237--248 Anonymous Front Matter . . . . . . . . . . . . . . ??
Lei Wei and Alexei Sourin and Zoran Najdovski Function-Based Single and Dual Point Haptic Interaction in Cyberworlds . . . 1--16 Vladimir Aleshin and Valery Afanasiev Visual $3$D Perception of Motion Environment and Visibility Factors in Virtual Space . . . . . . . . . . . . . 17--33 Joëlle Tilmanne and Thierry Dutoit Continuous Control of Style and Style Transitions through Linear Interpolation in Hidden Markov Model Based Walk Synthesis . . . . . . . . . . . . . . . 34--54 Vaisagh Viswanathan and Michael Lees Modeling and Analyzing the Human Cognitive Limits for Perception in Crowd Simulation . . . . . . . . . . . . . . . 55--76 Roman V. Yampolskiy and Gyuchoon Cho Experiments in Artimetrics: Avatar Face Recognition . . . . . . . . . . . . . . 77--94 Kenji Ohmori and Tosiyasu L. Kunii Visualization of Joinery Using Homotopy Theory and Attaching Maps . . . . . . . 95--114 Toshio Kodama and Yoichi Seki and Tosiyasu L. Kunii Example of Business Applications Using the Numerical Value and Exponential Calculation of the Cellular Data System 115--133 Erika Harrison and Ali Mahdavi-Amiri Analysis of Inverse Snyder Optimizations 134--148 Yichen Li and Mingqiang Wei and Jianhuang Wu Error-Controllable Simplification of Point Cloud . . . . . . . . . . . . . . 149--162 Yang Wenzhen and Pan Zhigen and Chen Wenhua Physically-Based Haptic Rendering for Virtual Hand Interaction . . . . . . . . 163--178 Gianluca Mura The Advanced Open Metaplastic Platform for Cyber Art . . . . . . . . . . . . . 179--190 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . I--XII
Yuan Gao and Kai Salomaa In Memoriam Sheng Yu . . . . . . . . . . 1--4 Janusz Brzozowski In Search of Most Complex Regular Languages . . . . . . . . . . . . . . . 5--24 Andrzej Ehrenfeucht and Grzegorz Rozenberg A Formal Framework for Processes Inspired by the Functioning of Living Cells . . . . . . . . . . . . . . . . . 25--27 Paul Gastin and Benjamin Monmege Adding Pebbles to Weighted Automata . . 28--51 José N. Oliveira Typed Linear Algebra for Weigthed (Probabilistic) Automata . . . . . . . . 52--65 Cyril Allauzen and Michael Riley A Pushdown Transducer Extension for the OpenFst Library . . . . . . . . . . . . 66--77 Joshua Amavi and Jacques Chabin and Pierre Réty Weak Inclusion for Recursive XML Types 78--89 Mikhail V. Berlinkov Synchronizing Automata on Quasi-Eulerian Digraph . . . . . . . . . . . . . . . . 90--100 Tullio Ceccherini-Silberstein and Michel Coornaert and Francesca Fiorenzi and Zoran \vSuni\'c Cellular Automata on Regular Rooted Trees . . . . . . . . . . . . . . . . . 101--112 Stefano Crespi Reghizzi and Pierluigi L. San Pietro Strict Local Testability with Consensus Equals Regularity . . . . . . . . . . . 113--124 Pierpaolo Degano and Gian-Luigi Ferrari and Gianluca Mezzetti Nominal Automata for Resource Usage Control . . . . . . . . . . . . . . . . 125--137 Manfred Droste and Bundit Pibaljommee Weighted Nested Word Automata and Logics over Strong Bimonoids . . . . . . . . . 138--148 Simone Faro and Thierry Lecroq A Fast Suffix Automata Based Algorithm for Exact Online String Matching . . . . 149--158 Fedor Fominykh and Mikhail Volkov P(l)aying for Synchronization . . . . . 159--170 Vladimir V. Gusev Synchronizing Automata of Bounded Rank 171--179 Daniel Go\vc and Dane Henshall and Jeffrey Shallit Automatic Theorem-Proving in Combinatorics on Words . . . . . . . . . 180--191 Oscar H. Ibarra and Nicholas Q. Tran How to Synchronize the Heads of a Multitape Automaton . . . . . . . . . . 192--204 Franz Jahn and Manfred Kufleitner and Alexander Lauser Regular Ideal Languages and Their Boolean Combinations . . . . . . . . . . 205--216 Artur Je\.z and Andreas Maletti Hyper-minimization for Deterministic Tree Automata . . . . . . . . . . . . . 217--228 Galina Jirásková and Tomá\vs Masopust On the State and Computational Complexity of the Reverse of Acyclic Minimal DFAs . . . . . . . . . . . . . . 229--239 Anonymous Front Matter . . . . . . . . . . . . . . ??
Shizhi Chen and D. Michael Quintian and YingLi Tian Towards a Visual Speech Learning System for the Deaf by Matching Dynamic Lip Shapes . . . . . . . . . . . . . . . . . 1--9 Makoto Kobayashi and Takuya Suzuki and Daisuke Wakatsuki Teaching Support Software for Hearing Impaired Students Who Study Computer Operation . . . . . . . . . . . . . . . 10--17 Petr Hladík and Tomá\vs G\ocircura The Hybrid Book --- One Document for All in the Latest Development . . . . . . . 18--24 Andrea Petz and Klaus Miesenberger Dealing with Changes in Supporting Students with Disabilities in Higher Education . . . . . . . . . . . . . . . 25--32 Lisa Featherstone and Simon Ball Putting the Disabled Student in Charge: Introduction to the Special Thematic Session . . . . . . . . . . . . . . . . 33--35 Lars Ballieu Christensen and Tanja Stevns Biblus --- a Digital Library to Support Integration of Visually Impaired in Mainstream Education . . . . . . . . . . 36--42 Alistair McNaught and Lisa Featherstone Alternative Approaches to Alternative Formats --- Changing Expectations by Challenging Myths . . . . . . . . . . . 43--50 Mike Wald and E. A. Draffan and Russell Newman and Sebastian Skuse and Chris Phethean Access Toolkit for Education . . . . . . 51--58 Poorna Kushalnagar and Benjamin Williams and Raja S. Kushalnagar Community-Based Participatory Approach: Students as Partners in Educational Accessible Technology Research . . . . . 59--64 Paloma Cantón and Ángel L. González and Gonzalo Mariscal and Carlos Ruiz Applying New Interaction Paradigms to the Education of Children with Special Educational Needs . . . . . . . . . . . 65--72 Fern Faux and David Finch and Lisa Featherstone InStep: a Video Database Assessment Tool 73--76 Lars Ballieu Christensen and Sean J. Keegan and Tanja Stevns SCRIBE: a Model for Implementing Robobraille in a Higher Education Institution . . . . . . . . . . . . . . 77--83 Wiebke Köhlmann Identifying Barriers to Collaborative Learning for the Blind . . . . . . . . . 84--91 Raja S. Kushalnagar and Poorna Kushalnagar and Jeffrey B. Pelz Deaf and Hearing Students' Eye Gaze Collaboration . . . . . . . . . . . . . 92--99 José Antonio Borges and Dolores Tomé The Musibraille Project --- Enabling the Inclusion of Blind Students in Music Courses . . . . . . . . . . . . . . . . 100--107 Mike Wald Important New Enhancements to Inclusive Learning Using Recorded Lectures . . . . 108--115 Mamoru Fujiyoshi and Akio Fujiyoshi and Akiko Ohsawa and Toshiaki Aomatsu and Haruhiko Sawazaki Development of New Auditory Testing Media with Invisible $2$-Dimensional Codes for Test-Takers with Print Disabilities . . . . . . . . . . . . . . 116--123 John Gardner and Courtney Christensen More Accessible Math . . . . . . . . . . 124--129 Katsuhito Yamaguchi and Masakazu Suzuki Accessible Authoring Tool for DAISY Ranging from Mathematics to Others . . . 130--137 Wanda Gonzúrová and Pavel Hrabák Blind Friendly LaTeX . . . . . . . . . . 138--141 Anonymous Front Matter . . . . . . . . . . . . . . ??
Lars Emil Knudsen and Harald Holone A Multimodal Approach to Accessible Web Content on Smartphones . . . . . . . . . 1--8 Roberto Manduchi Mobile Vision as Assistive Technology for the Blind: An Experimental Study . . 9--16 Shuihua Wang and Yingli Tian Camera-Based Signage Detection and Recognition for Blind Persons . . . . . 17--24 James M. Coughlan and Huiying Shen The Crosswatch Traffic Intersection Analyzer: a Roadmap for the Future . . . 25--28 Jesus Zegarra and René Farcy GPS and Inertial Measurement Unit (IMU) as a Navigation System for the Visually Impaired . . . . . . . . . . . . . . . . 29--32 Edgardo Molina and Zhigang Zhu and Yingli Tian Visual Nouns for Indoor/Outdoor Navigation . . . . . . . . . . . . . . . 33--40 Huiying Shen and James M. Coughlan Towards a Real-Time System for Finding and Reading Signs for Visually Impaired Users . . . . . . . . . . . . . . . . . 41--47 Yoonjung Choi and Ki-Hyung Hong User Requirements for Camera-Based Mobile Applications on Touch Screen Devices for Blind People . . . . . . . . 48--51 Mehrez Boulares and Mohamed Jemni A Route Planner Interpretation Service for Hard of Hearing People . . . . . . . 52--58 Martin Spindler and Michael Weber and Denise Prescher and Mei Miao and Gerhard Weber Translating Floor Plans into Directions 59--66 Tracey J. Mehigan and Ian Pitt Harnessing Wireless Technologies for Campus Navigation by Blind Students and Visitors . . . . . . . . . . . . . . . . 67--74 Vladimir Kulyukin and Tanwir Zaman and Abhishek Andhavarapu and Aliasgar Kutiyanawala Eyesight Sharing in Blind Grocery Shopping: Remote P2P Caregiving through Cloud Computing . . . . . . . . . . . . 75--82 Stefan Almer and Josef Kolbitsch and Johannes Oberzaucher and Martin Ebner Assessment Test Framework for Collecting and Evaluating Fall-Related Data Using Mobile Devices . . . . . . . . . . . . . 83--90 Werner Bischof and Elmar Krajnc and Markus Dornhofer and Michael Ulm NAVCOM--WLAN Communication between Public Transport Vehicles and Smart Phones to Support Visually Impaired and Blind People . . . . . . . . . . . . . . 91--98 Shigeki Miyoshi and Sumihiro Kawano and Mayumi Shirasawa and Kyoko Isoda and Michiko Hasuike Mobile-Type Remote Captioning System for Deaf or Hard-of-Hearing People and the Experience of Remote Supports after the Great East Japan Earthquake . . . . . . 99--104 Bogdan Zamfir and Robert Tedesco and Brian Reichow Handheld ``App'' Offering Visual Support to Students with Autism Spectrum Disorders (ASDs) . . . . . . . . . . . . 105--112 Zdenek Bumbalek and Jan Zelenka and Lukas Kencl Cloud-Based Assistive Speech-Transcription Services . . . . . 113--116 Yumi Hwang and Daejin Shin and Chang-Yeal Yang and Seung-Yeun Lee and Jin Kim and Byunggoo Kong Developing a Voice User Interface with Improved Usability for People with Dysarthria . . . . . . . . . . . . . . . 117--124 Frank G. Palmer and Zhigang Zhu and Tony Ro Wearable Range-Vibrotactile Field: Design and Evaluation . . . . . . . . . 125--132 Adam Kupryjanow and Piotr Suchomski and Piotr Odya and Andrzej Czyzewski System Supporting Speech Perception in Special Educational Needs Schoolchildren 133--136 Anonymous Front Matter . . . . . . . . . . . . . . ??
Claude Castelluccia and Mohamed-Ali Kaafar and Minh-Dung Tran Betrayed by Your Ads! . . . . . . . . . 1--17 George Danezis and Markulf Kohlweiss and Benjamin Livshits and Alfredo Rial Private Client-Side Profiling with Random Forests and Hidden Markov Models 18--37 Fernando Pérez-González and Carmela Troncoso Understanding Statistical Disclosure: a Least Squares Approach . . . . . . . . . 38--57 Xun Gong and Nikita Borisov and Negar Kiyavash and Nabil Schear Website Detection Using Remote Traffic Analysis . . . . . . . . . . . . . . . . 58--78 Wen Ming Liu and Lingyu Wang and Kui Ren and Pengsu Cheng and Mourad Debbabi $k$-Indistinguishable Traffic Padding in Web Applications . . . . . . . . . . . . 79--99 Yossi Gilad and Amir Herzberg Spying in the Dark: TCP and Tor Traffic Analysis . . . . . . . . . . . . . . . . 100--119 Dima Alhadidi and Noman Mohammed and Benjamin C. M. Fung and Mourad Debbabi Secure Distributed Framework for Achieving $\epsilon$-Differential Privacy . . . . . . . . . . . . . . . . 120--139 T.-H. Hubert Chan and Mingfei Li and Elaine Shi and Wenchang Xu Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams . . . . . . . . . . 140--159 Chengfang Fang and Ee-Chien Chang Adaptive Differentially Private Histogram of Low-Dimensional Data . . . 160--179 Erik-Oliver Blass and Roberto Di Pietro and Refik Molva and Melek Önen PRISM --- Privacy-Preserving Search in MapReduce . . . . . . . . . . . . . . . 180--200 Martin Pirker and Daniel Slamanig and Johannes Winter Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients 201--220 Marek Jawurek and Florian Kerschbaum Fault-Tolerant Privacy-Preserving Statistics . . . . . . . . . . . . . . . 221--238 David Fifield and Nate Hardison and Jonathan Ellithorpe and Emily Stark and Dan Boneh Evading Censorship with Browser-Based Proxies . . . . . . . . . . . . . . . . 239--258 Nick Nikiforakis and Steven Van Acker and Frank Piessens and Wouter Joosen Exploring the Ecosystem of Referrer-Anonymizing Services . . . . . 259--278 Vaibhav Garg and L. Jean Camp and Katherine Connelly and Lesa Lorenzen-Huber Risk Communication Design: Video vs. Text . . . . . . . . . . . . . . . . . . 279--298 Andrew W. E. McDonald and Sadia Afroz and Aylin Caliskan and Ariel Stolerman and Rachel Greenstadt Use Fewer Instances of the Letter ``i'': Toward Writing Style Anonymization . . . 299--318 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Thomas Ball and Nikolaj Bjòrner and Leonardo de Moura and Kenneth L. McMillan and Margus Veanes Beyond First-Order Satisfaction: Fixed Points, Interpolants, Automata and Polynomials . . . . . . . . . . . . . . 1--6 Paul Dan Marinescu and Cristian Cadar High-Coverage Symbolic Patch Testing . . 7--21 Andrey Rybalchenko Towards Automatic Synthesis of Software Verification Tools . . . . . . . . . . . 22--22 Andreas Zeller Mining Models . . . . . . . . . . . . . 23--23 Stefan Leue and Mitra Tabaei Befrouei Counterexample Explanation by Anomaly Detection . . . . . . . . . . . . . . . 24--42 Sami Evangelista and Lars Michael Kristensen Combining the Sweep-Line Method with the Use of an External-Memory Priority Queue 43--61 Hao Zheng and Emmanuel Rodriguez and Yingying Zhang and Chris Myers A Compositional Minimization Approach for Large Asynchronous Design Verification . . . . . . . . . . . . . . 62--79 Alexander Ditter and Milan \vCe\vska and Gerald Lüttgen On Parallel Software Verification Using Boolean Equation Systems . . . . . . . . 80--97 Anton J. Wijs and Dragan Bo\vsna\vcki Improving GPU Sparse Matrix-Vector Multiplication for Probabilistic Model Checking . . . . . . . . . . . . . . . . 98--116 Theo C. Ruys and Pim Kars Gossiping Girls Are All Alike . . . . . 117--136 Shravan Garlapati and Sandeep K. Shukla Formal Verification of Hierarchically Distributed Agent Based Protection Scheme in Smart Grid . . . . . . . . . . 137--154 Gerard J. Holzmann Parallelizing the Spin Model Checker . . 155--171 Ethan Burns and Rong Zhou Parallel Model Checking Using Abstraction . . . . . . . . . . . . . . 172--190 Reng Zeng and Zhuo Sun and Su Liu and Xudong He McPatom: a Predictive Analysis Tool for Atomicity Violation Using Model Checking 191--207 Divjyot Sethi and Muralidhar Talupur and Daniel Schwartz-Narbonne and Sharad Malik Parameterized Model Checking of Fine Grained Concurrency . . . . . . . . . . 208--226 Jonathan Bogdoll and Alexandre David and Arnd Hartmanns and Holger Hermanns \tt mctau: Bridging the Gap between Modest and UPPAAL . . . . . . . . . . . 227--233 Heinz Riener and Görschwin Fey FAuST: a Framework for Formal Verification, Automated Debugging, and Software Test Generation . . . . . . . . 234--240 Martin Sulzmann and Axel Zechner Model Checking DSL-Generated C Source Code . . . . . . . . . . . . . . . . . . 241--247 Jürgen Christ and Jochen Hoenicke and Alexander Nutz SMTInterpol: An Interpolating SMT Solver 248--254 Yong Jiang and Zongyan Qiu S2N: Model Transformation from SPIN to NuSMV . . . . . . . . . . . . . . . . . 255--260 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Jean-Baptiste Jeannin and Dexter Kozen Computing with Capsules . . . . . . . . 1--19 Christos A. Kapoutsis Minicomplexity . . . . . . . . . . . . . 20--42 André Platzer Logical Analysis of Hybrid Systems . . . 43--49 Pedro V. Silva Groups and Automata: a Perfect Match . . 50--63 Fernando Arroyo and Juan Castellanos and Victor Mitrana Uniform Distributed Pushdown Automata Systems . . . . . . . . . . . . . . . . 64--75 Zuzana Bednárová and Viliam Geffert and Carlo Mereghetti and Beatrice Palano Removing Nondeterminism in Constant Height Pushdown Automata . . . . . . . . 76--88 Maria Paola Bianchi and Markus Holzer and Sebastian Jakobi and Giovanni Pighizzini On Inverse Operations and Their Descriptional Complexity . . . . . . . . 89--102 Francine Blanchet-Sadri and Sean Simmons Deciding Representability of Sets of Words of Equal Length . . . . . . . . . 103--116 Janusz Brzozowski and Baiyu Li Syntactic Complexities of Some Classes of Star-Free Languages . . . . . . . . . 117--129 Cezar Câmpeanu Randomness Behaviour in Blum Universal Static Complexity Spaces . . . . . . . . 130--140 Jürgen Dassow and Ronny Harbich Production Complexity of Some Operations on Context-Free Languages . . . . . . . 141--154 Yuan Gao and Lila Kari State Complexity of Star and Square of Union of k Regular Languages . . . . . . 155--168 Markus Holzer and Sebastian Jakobi State Complexity of Chop Operations on Unary and Finite Languages . . . . . . . 169--182 Artur Je\.z and Alexander Okhotin On the Number of Nonterminal Symbols in Unambiguous Conjunctive Grammars . . . . 183--195 Galina Jirásková and Ond\vrej Klíma Descriptional Complexity of Biautomata 196--208 Andreas Malcher and Katja Meckel and Carlo Mereghetti and Beatrice Palano Descriptional Complexity of Pushdown Store Languages . . . . . . . . . . . . 209--221 Florin Manea and Bianca Truthe On Internal Contextual Grammars with Subregular Selection Languages . . . . . 222--235 Alexander Meduna and Luká\vs Vrábel and Petr Zemek An Infinite Hierarchy of Language Families Resulting from Stateless Pushdown Automata with Limited Pushdown Alphabets . . . . . . . . . . . . . . . 236--243 Friedrich Otto Centralized PC Systems of Pushdown Automata versus Multi-head Pushdown Automata . . . . . . . . . . . . . . . . 244--251 Alexandros Palioudakis and Kai Salomaa and Selim G. Akl State Complexity and Limited Nondeterminism . . . . . . . . . . . . . 252--265 Anonymous Front Matter . . . . . . . . . . . . . . ??
Matthias Heinrich and Franz Josef Grüneberger and Thomas Springer and Martin Gaedke Reusable Awareness Widgets for Collaborative Web Applications --- a Non-invasive Approach . . . . . . . . . 1--15 Feng Xiao and Tomoya Noro and Takehiro Tokuda News-Topic Oriented Hashtag Recommendation in Twitter Based on Characteristic Co-occurrence Word Detection . . . . . . . . . . . . . . . 16--30 Michael Nebeling and Stefania Leone and Moira C. Norrie Crowdsourced Web Engineering and Design 31--45 Damir Vandic and Flavius Frasincar and Frederik Hogenboom Scaling Pair-Wise Similarity-Based Algorithms in Tagging Spaces . . . . . . 46--60 Martin Leginus and Peter Dolog and Ricardo Lage and Frederico Durao Methodologies for Improved Tag Cloud Generation with Clustering . . . . . . . 61--75 Devis Bianchini and Valeria De Antonellis and Michele Melchiori Semantic Collaborative Tagging for Web APIs Sharing and Reuse . . . . . . . . . 76--90 Cristóbal Arellano and Oscar Díaz and Jon Iturrioz Opening Personalization to Partners: An Architecture of Participation for Websites . . . . . . . . . . . . . . . . 91--105 Mairon Belchior and Daniel Schwabe and Fernando Silva Parreiras Role-Based Access Control for Model-Driven Web Applications . . . . . 106--120 Manar H. Alalfi and James R. Cordy and Thomas R. Dean Recovering Role-Based Access Control Security Models from Dynamic Web Applications . . . . . . . . . . . . . . 121--136 Alessandro Bozzon and Marco Brambilla and Piero Fraternali and Marco Tagliasacchi Diversification for Multi-domain Result Sets . . . . . . . . . . . . . . . . . . 137--152 Ke Tao and Fabian Abel and Claudia Hauff and Geert-Jan Houben Twinder: a Search Engine for Twitter Streams . . . . . . . . . . . . . . . . 153--168 Elena Ilina and Claudia Hauff and Ilknur Celik and Fabian Abel and Geert-Jan Houben Social Event Detection on Twitter . . . 169--176 Damien Leprovost and Lylia Abrouk and Nadine Cullot and David Gross-Amblard Temporal Semantic Centrality for the Analysis of Communication Networks . . . 177--184 Manuel Wimmer and Nathalie Moreno and Antonio Vallecillo Systematic Evolution of WebML Models by Coupled Transformations . . . . . . . . 185--199 Julián Grigera and José Matías Rivero and Esteban Robles Luna and Franco Giacosa and Gustavo Rossi From Requirements to Web Applications in an Agile Model-Driven Approach . . . . . 200--214 Nora Koch and Alexander Knapp and Sergej Kozuruba Assessment of Effort Reduction due to Model-to-Model Transformations in the Web Domain . . . . . . . . . . . . . . . 215--222 Yulkeidi Martínez and Cristina Cachero and Santiago Meliá Evaluating the Impact of a Model-Driven Web Engineering Approach on the Productivity and the Satisfaction of Software Development Teams . . . . . . . 223--237 Shabnam Mirshokraie and Ali Mesbah JSART: JavaScript Assertion-Based Regression Testing . . . . . . . . . . . 238--252 Sara Comai and Davide Mazza and Andrea Guarinoni A Framework for the Development of Haptic-Enhanced Web Applications . . . . 253--267 Sergio Firmenich and Vincent Gaits and Silvia Gordillo and Gustavo Rossi and Marco Winckler Supporting Users Tasks with Personal Information Management and Web Forms Augmentation . . . . . . . . . . . . . . 268--282 Anonymous Front Matter . . . . . . . . . . . . . . ??
Olaf Beyersdorff and Oliver Kutz Proof Complexity of Non-classical Logics 1--54 Jan Broersen and Leendert van der Torre Ten Problems of Deontic Logic and Normative Reasoning in Computer Science 55--88 Ugo Dal Lago A Short Introduction to Implicit Computational Complexity . . . . . . . . 89--109 Sujata Ghosh and R. Ramanujam Strategies in Games: a Logic-Automata Study . . . . . . . . . . . . . . . . . 110--159 Davide Grossi and Gabriella Pigozzi Introduction to Judgment Aggregation . . 160--209 Wojciech Jamroga and Wojciech Penczek Specification and Verification of Multi-Agent Systems . . . . . . . . . . 210--263 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Xia Hong and Sheng Chen PSO Assisted NURB Neural Network Identification . . . . . . . . . . . . . 1--9 Lukasz Cielecki and Olgierd Unold $2$D Discontinuous Function Approximation with Real-Valued Grammar-Based Classifier System . . . . 10--17 Zhi-Zeng Li and Xue-Yan Song and Ji-Zhou Sun and Zhao-Tong Huang A Scatter Search Methodology for the Aircraft Conflict Resolution Problem . . 18--24 Datong Xie and Lixin Ding and Shenwen Wang and Zhaolu Guo and Yurong Hu and Chengwang Xie Self-adaptive Differential Evolution Based Multi-objective Optimization Incorporating Local Search and Indicator-Based Selection . . . . . . . 25--33 Tianpei Zhou Application of Data Mining in Coal Mine Safety Decision System Based on Rough Set . . . . . . . . . . . . . . . . . . 34--41 Xianghua Lu and Weijing Wang Study on Web Text Feature Selection Based on Rough Set . . . . . . . . . . . 42--48 Luyi Bai and Zongmin Ma A Generalized Approach for Determining Fuzzy Temporal Relations . . . . . . . . 49--56 Hongyan Xing and Daowen Qiu Applications on Information Flow and Biomedical Treatment of FDES Based on Fuzzy Sequential Machines Theory . . . . 57--64 Yabin Shao and Zengtai Gong Discontinuous Fuzzy Systems and Henstock Integrals of Fuzzy Number Valued Functions . . . . . . . . . . . . . . . 65--72 Haiping Yu and Fengying Yang A Phased Adaptive PSO Algorithm for Multimodal Function Optimization . . . . 73--79 Guoliang Huang and Xinling Shi and Zhenzhou An and He Sun The Comparative Study of Different Number of Particles in Clustering Based on Three-Layer Particle Swarm Optimization . . . . . . . . . . . . . . 80--86 Yang Weon Lee Implementation of Mutual Localization of Multi-robot Using Particle Filter . . . 87--94 Milad Malekzadeh and Alireza Khosravi and Saeed Alighale and Hamed Azami Optimization of Orthogonal Poly Phase Coding Waveform Based on Bees Algorithm and Artificial Bee Colony for MIMO Radar 95--102 Yinli Dong and Shuisheng Zhou SVM Regularizer Models on RKHS vs. on $R^m$ . . . . . . . . . . . . . . . . . 103--111 Xing Zhang Research on Performance Comprehensive Evaluation of Thermal Power Plant under Low-Carbon Economy . . . . . . . . . . . 112--119 Hui Zhang and Qing Guo and Costas S. Iliopoulos Computing the Minimum $\lambda$-Cover in Weighted Sequences . . . . . . . . . . . 120--127 Huantong Geng and Haifeng Zhu and Rui Xing and Tingting Wu A Novel Hybrid Evolutionary Algorithm for Solving Multi-Objective Optimization Problems . . . . . . . . . . . . . . . . 128--136 Huynh Thi Thanh Binh and Pham Vu Long and Nguyen Ngoc Dat and Nguyen Sy Thai Ha Heuristic Algorithms for Solving Survivable Network Design Problem with Simultaneous Unicast and Anycast Flows 137--144 Xueling Li and Min Zhu and Xiaolai Li and Hong-Qiang Wang and Shulin Wang Protein-Protein Binding Affinity Prediction Based on an SVR Ensemble . . 145--151 Xiaoli Wei and Xue Shi and Seongho Kim and Craig McClain and Xiang Zhang A Novel Two-Stage Alignment Method for Liquid Chromatography Mass Spectrometry-Based Metabolomics . . . . 152--159 Anonymous Front Matter . . . . . . . . . . . . . . ??
Xiaoming Liu and Bo Li and Jun Liu and Xin Xu and Zhilin Feng Mass Diagnosis in Mammography with Mutual Information Based Feature Selection and Support Vector Machine . . 1--8 Xuyang Lou and Qian Ye and Ke Lou and Baotong Cui Mean Square Exponential Stability of Hybrid Neural Networks with Uncertain Switching Probabilities . . . . . . . . 9--17 Ming-xuan Sun Time-Varying Neurocomputing: An Iterative Learning Perspective . . . . . 18--26 Hong Wang and Huijuan Shi Knowledge Reduction Based on Evidence Reasoning Theory in Interval Ordered Information Systems . . . . . . . . . . 27--34 Yong-Heng Zhang and Feng Zhang Research on New Algorithm of Topic-Oriented Crawler and Duplicated Web Pages Detection . . . . . . . . . . 35--42 Xiaochun Lv and Hanming Gu Direct Search Simulated Annealing for Nonlinear Global Optimization of Rayleigh Waves . . . . . . . . . . . . . 43--50 Ke-Fan Yu and Ke-Han Zeng Four-Quadrant Division with HNN for Euclidean TSP . . . . . . . . . . . . . 51--58 Hai-Qin Xu and Yong-Sheng Ding and Hao Liu and Xiao-Li Li An Immune Genetic Algorithm with Orthogonal Initialization for Analog Circuit Design . . . . . . . . . . . . . 59--66 Yi-Kui Zhai and Ying Xu and Jun-Ying Gan A Novel Artificial Fish Swarm Algorithm Based on Multi-objective Optimization 67--73 Pawe\l Skrobanek and Henryk Maciejewski and Maciej Dobrowolski and Olgierd Unold and Ewa Walkowicz Comparison of Data Exploration Methods and the BLUP Method in Application to the Animals Breeding . . . . . . . . . . 74--81 Shan-Wen Zhang and Chuan-Lei Zhang Two-Dimensional Locality Discriminant Projection for Plant Leaf Classification 82--88 Zhan-Li Sun and Ting-Ting Sun and Yang Liu An Eigengene-Based Classifier Committee Learning Algorithm for Tumor Classification . . . . . . . . . . . . . 89--94 Vitoantonio Bevilacqua and Maurizio Triggiani and Vito Gallo and Isabella Cafagna An Expert System for an Innovative Discrimination Tool of Commercial Table Grapes . . . . . . . . . . . . . . . . . 95--102 Zhaowen Li and Ninghua Gao Soft Rough Sets and Topologies . . . . . 103--110 Peng Lu and Chi Liu and Daoren Yuan and Yusong Li Sudden-Target Search Algorithm of Monitor Area Based on Visual Information Processing Model . . . . . . . . . . . . 111--118 Jie Yu and Haihong Zhao and Fangfang Liu User Real-Time Interest Prediction Based on Collaborative Filtering and Interactive Computing for Academic Recommendation . . . . . . . . . . . . . 119--127 Lu Cao and Yoshinori Kobayashi and Yoshinori Kuno Spatial-Based Feature for Locating Objects . . . . . . . . . . . . . . . . 128--137 Jian-Fei Luo and Bao-Yuan Wu and Qiu-Shi Lin and Fei Shen and Zhong-Cheng Wu A Novel $F$-Pad for Handwriting Force Information Acquisition . . . . . . . . 138--144 Jia Liu and Hua Zhou and Kai-yu Tong Stability of a Predator-Prey Model with Modified Holling-Type II Functional Response . . . . . . . . . . . . . . . . 145--150 Qing-Hua Zhou and Jing Cui and Juan Xie Using Multiple Objective Functions in the Dynamic Model of Metabolic Networks of \em Escherichia coli . . . . . . . . 151--158 Anonymous Front Matter . . . . . . . . . . . . . . ??
Dimitris Achlioptas and Ricardo Menchaca-Mendez Unsatisfiability Bounds for Random CSPs from an Energetic Interpolation Method 1--12 Anil Ada and Arkadev Chattopadhyay and Omar Fawzi and Phuong Nguyen The NOF Multiparty Communication Complexity of Composed Functions . . . . 13--24 Andris Ambainis and Art\=urs Ba\vckurs and Kaspars Balodis and Dmitrijs Krav\vcenko and Raitis Ozols Quantum Strategies Are Better Than Classical in Almost Any XOR Game . . . . 25--37 Yossi Azar and Iftah Gamzu Efficient Submodular Function Maximization under Linear Packing Constraints . . . . . . . . . . . . . . 38--50 László Babai and Paolo Codenotti and Youming Qiao Polynomial-Time Isomorphism Test for Groups with No Abelian Normal Subgroups 51--62 Maria Florina Balcan and Yingyu Liang Clustering under Perturbation Resilience 63--74 Siddharth Barman and Seeun Umboh and Shuchi Chawla and David Malec Secretary Problems with Convex Costs . . 75--87 Joshua Baron and Rafail Ostrovsky and Ivan Visconti Nearly Simultaneously Resettable Black-Box Zero Knowledge . . . . . . . . 88--99 Bruno Bauwens Complexity of Complexity and Maximal Plain versus Prefix-Free Kolmogorov Complexity . . . . . . . . . . . . . . . 100--108 Aditya Bhaskara and Moses Charikar and Rajsekar Manokaran and Aravindan Vijayaraghavan On Quadratic Programming with a Ratio Objective . . . . . . . . . . . . . . . 109--120 Prosenjit Bose and Sébastien Collette and Rolf Fagerberg and Stefan Langerman De-amortizing Binary Search Trees . . . 121--132 Karl Bringmann and Konstantinos Panagiotou Efficient Sampling Methods for Discrete Distributions . . . . . . . . . . . . . 133--144 Niv Buchbinder and Joseph (Seffi) Naor and R. Ravi and Mohit Singh Approximation Algorithms for Online Weighted Rank Function Maximization under Matroid Constraints . . . . . . . 145--156 Jaroslaw Byrka and Bartosz Rybicki Improved LP-Rounding Approximation Algorithm for $k$-level Uncapacitated Facility Location . . . . . . . . . . . 157--169 Deeparnab Chakrabarty and Zhiyi Huang Testing Coverage Functions . . . . . . . 170--181 T.-H. Hubert Chan and Mingfei Li and Li Ning Sparse Fault-Tolerant Spanners for Doubling Metrics with Bounded Hop-Diameter or Degree . . . . . . . . . 182--193 Moses Charikar and Shi Li A Dependent LP-Rounding Approach for the $k$-Median Problem . . . . . . . . . . . 194--205 Chandra Chekuri and Alina Ene and Ali Vakilian Node-Weighted Network Design in Planar and Minor-Closed Families of Graphs . . 206--217 Danny Z. Chen and Haitao Wang Computing the Visibility Polygon of an Island in a Polygonal Domain . . . . . . 218--229 Rajesh Chitnis and Marek Cygan and Mohammadtaghi Hajiaghayi and Dániel Marx Directed Subset Feedback Vertex Set Is Fixed-Parameter Tractable . . . . . . . 230--241 Anonymous Front Matter . . . . . . . . . . . . . . ??
Riccardo Colini-Baldeschi and Monika Henzinger and Stefano Leonardi and Martin Starnberger On Multiple Keyword Sponsored Search Auctions with Budgets . . . . . . . . . 1--12 Gilles Dowek A Theory Independent Curry--De Bruijn--Howard Correspondence . . . . . 13--15 David Harel Standing on the Shoulders of a Giant . . 16--22 Kohei Honda Session Types and Distributed Computing 23--23 Daniel A. Spielman Algorithms, Graph Theory, and the Solution of Laplacian Linear Equations 24--26 Berthold Vöcking Randomized Mechanisms for Multi-unit Auctions . . . . . . . . . . . . . . . . 27--29 Luca Aceto and Arnaud Carayol and Zoltán Ésik and Anna Ingólfsdóttir Algebraic Synchronization Trees and Processes . . . . . . . . . . . . . . . 30--41 Rajeev Alur and Loris D'Antoni Streaming Tree Transducers . . . . . . . 42--53 Pablo Arrighi and Gilles Dowek Causal Graph Dynamics . . . . . . . . . 54--66 Albert Atserias and Anuj Dawar Degree Lower Bounds of Tower-Type for Approximating Formulas with Parity Quantifiers . . . . . . . . . . . . . . 67--78 Michael Benedikt and Pierre Bourhis and Pierre Senellart Monadic Datalog Containment . . . . . . 79--91 Miko\laj Boja\'nczyk and S\lawomir Lasota A Machine-Independent Characterization of Timed Languages . . . . . . . . . . . 92--103 Miko\laj Boja\'nczyk and Thomas Place Regular Languages of Infinite Trees That Are Boolean Combinations of Open Sets 104--115 Miko\laj Boja\'nczyk and Thomas Place Toward Model Theory with Data Values . . 116--127 Patricia Bouyer and Nicolas Markey and Ocan Sankur Robust Reachability in Timed Automata: A Game-Based Approach . . . . . . . . . . 128--140 Tomá\vs Brázdil and Antonín Ku\vcera and Petr Novotný and Dominik Wojtczak Minimizing Expected Termination Time in One-Counter Markov Decision Processes 141--152 Christopher Broadbent Prefix Rewriting for Nested-Words and Collapsible Pushdown Automata . . . . . 153--164 Chris Broadbent and Arnaud Carayol and Matthew Hague and Olivier Serre A Saturation Method for Collapsible Pushdown Systems . . . . . . . . . . . . 165--176 Volker Diekert and Manfred Kufleitner and Klaus Reinhardt and Tobias Walter Regular Languages Are Church--Rosser Congruential . . . . . . . . . . . . . . 177--188 John Fearnley and Sven Schewe Time and Parallelizability Results for Parity Games with Bounded Treewidth . . 189--200 Anonymous Front Matter . . . . . . . . . . . . . . ??
Robert Demolombe Causality in the Context of Multiple Agents . . . . . . . . . . . . . . . . . 1--15 Silvano Colombo Tosatto and Guido Boella Visualizing Normative Systems: An Abstract Approach . . . . . . . . . . . 16--30 Paolo Turrini Agreements as Norms . . . . . . . . . . 31--45 Guido Governatori and Antonino Rotolo and Erica Calardo Possible World Semantics for Defeasible Deontic Logic . . . . . . . . . . . . . 46--60 Ricardo Gonçalves and José Júlio Alferes An Embedding of Input-Output Logic in Deontic Logic Programs . . . . . . . . . 61--75 Louwe B. Kuijer Sanction Semantics and Contrary-to-Duty Obligations . . . . . . . . . . . . . . 76--90 Dov Gabbay Temporal Deontic Logic for the Generalised Chisholm Set of Contrary to Duty Obligations . . . . . . . . . . . . 91--107 Emiliano Lorini On the Logical Foundations of Moral Agency . . . . . . . . . . . . . . . . . 108--122 Régis Riveret and Antonino Rotolo and Giovanni Sartor Norms and Learning in Probabilistic Logic-Based Agents . . . . . . . . . . . 123--138 Olivier Roy and Albert J. J. Anglberger and Norbert Gratzl The Logic of Obligation as Weakest Permission . . . . . . . . . . . . . . . 139--150 Christian Straßer and Mathieu Beirlaen An Andersonian Deontic Logic with Contextualized Sanctions . . . . . . . . 151--169 Andreas Herzig and Tiago de Lima and Emiliano Lorini A Computationally Grounded Dynamic Logic of Agency, with an Application to Legal Actions . . . . . . . . . . . . . . . . 170--183 Piotr Kulicki and Robert Trypuz A Deontic Action Logic with Sequential Composition of Actions . . . . . . . . . 184--198 Jan Broersen and Dov Gabbay and Leendert van der Torre Discussion Paper: Changing Norms Is Changing Obligation Change . . . . . . . 199--214 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . 1--1 Hieu Cuong Nguyen and Stefan Katzenbeisser Robust Resampling Detection in Digital Images . . . . . . . . . . . . . . . . . 3--15 Karl Kümmel and Tobias Scheidat and Claus Vielhauer and Jana Dittmann Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries . . . . . . . . . . 16--25 Saloomeh Shariati and François Koeune and François-Xavier Standaert Security Analysis of Image-Based PUFs for Anti-counterfeiting . . . . . . . . 26--38 Mouhamadou L. Diong and Patrick Bas and Chloé Pelle and Wadih Sawaya Document Authentication Using $2$D Codes: Maximizing the Decoding Performance Using Statistical Inference 39--54 Patrik Bichsel and Jan Camenisch and Bart De Decker and Jorn Lapon and Vincent Naessens Data-Minimizing Authentication Goes Mobile . . . . . . . . . . . . . . . . . 55--71 Zhuo Wei and Xuhua Ding and Robert Huijie Deng and Yongdong Wu No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption . . . . . . . . . . . 72--86 Anonymous Front Matter . . . . . . . . . . . . . . 87--87 Andrey Makrushin and Tobias Kiertscher and Robert Fischer and Stefan Gruhn and Claus Vielhauer Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL Scans . . . . . . . . . . . . . . . 89--98 Graeme Horsman and Christopher Laing and Paul Vickers A Method for Reducing the Risk of Errors in Digital Forensic Investigations . . . 99--106 Tobias Scheidat and Karl Kümmel and Claus Vielhauer Short Term Template Aging Effects on Biometric Dynamic Handwriting Authentication Performance . . . . . . . 107--116 Roland Schmitz and Shujun Li and Christos Grecos and Xinpeng Zhang A New Approach to Commutative Watermarking-Encryption . . . . . . . . 117--130 Steffen Wendzel and Jörg Keller Systematic Engineering of Control Protocols for Covert Channels . . . . . 131--144 Elke Franz and Stefan Pfennig and André Fischer Efficiency of Secure Network Coding Schemes . . . . . . . . . . . . . . . . 145--159 Amar Siad A New Approach for Private Searches on Public-Key Encrypted Data . . . . . . . 160--173 M. Maachaoui and A. Abou El Kalam and C. Fraboul and A. Ait Ouahman Multi-level Authentication Based Single Sign-On for IMS Services . . . . . . . . 174--187 Anonymous Front Matter . . . . . . . . . . . . . . 189--189 Patrick Bas and Teddy Furon Are 128 Bits Long Keys Possible in Watermarking? . . . . . . . . . . . . . 191--191 William Perrizo and Arjun G. Roy Predicate-Tree Based Pretty Good Privacy of Data . . . . . . . . . . . . . . . . 192--194 Hanno Langweg OOXML File Analysis of the July 22nd Terrorist Manual . . . . . . . . . . . . 195--197 Milica Milutinovic and Vincent Naessens and Bart De Decker Privacy-Preserving Scheduling Mechanism for eHealth Systems . . . . . . . . . . 198--200 Jürgen Fuß and Wolfgang Kastl and Robert Kolmhofer and Georg Schönberger and Florian Wex Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors . . . . . . . . 201--203 André Zúquete and Pedro Correia and Miguel Rocha A Framework for Enforcing User-Based Authorization Policies on Packet Filter Firewalls . . . . . . . . . . . . . . . 204--206 Anonymous Front Matter . . . . . . . . . . . . . . ??
Arno Bastenhof Polarized Montagovian Semantics for the Lambek--Grishin Calculus . . . . . . . . 1--16 Denis Béchet and Alexander Dikovsky and Annie Foret Two Models of Learning Iterated Dependencies . . . . . . . . . . . . . . 17--32 Jeroen Bransen The Lambek--Grishin Calculus Is NP-Complete . . . . . . . . . . . . . . 33--49 Berthold Crysmann Resumption and Island-Hood in Hausa . . 50--65 Michael Dekhtyar and Alexander Dikovsky and Boris Karlov Iterated Dependencies and Kleene Iteration . . . . . . . . . . . . . . . 66--81 Denys Duchier and Thi-Bich-Hanh Dao and Yannick Parmentier and Willy Lesaint Property Grammar Parsing Seen as a Constraint Optimization Problem . . . . 82--96 Thomas Graf Reference-Set Constraints as Linear Tree Transductions via Controlled Optimality Systems . . . . . . . . . . . . . . . . 97--113 Scott Martin and Carl Pollard Hyperintensional Dynamic Semantics . . . 114--129 Vedrana Mihali\vcek and Carl Pollard Distinguishing Phenogrammar from Tectogrammar Simplifies the Analysis of Interrogatives . . . . . . . . . . . . . 130--145 Glyn Morrill and Oriol Valentín Generalized Discontinuity . . . . . . . 146--161 Sylvain Pogodalla and Florent Pompigne Controlling Extraction in Abstract Categorial Grammars . . . . . . . . . . 162--177 Byeong-Uk Yi Plural Quantifications and Generalized Quantifiers . . . . . . . . . . . . . . 178--191 Ryo Yoshinaka and Alexander Clark Polynomial Time Learning of Some Multiple Context-Free Languages with a Minimally Adequate Teacher . . . . . . . 192--207 Thomas Graf Locality and the Complexity of Minimalist Derivation Tree Languages . . 208--227 Petr Homola Building a Formal Grammar for a Polysynthetic Language . . . . . . . . . 228--242 András Kornai Eliminating Ditransitives . . . . . . . 243--261 Stepan Kuznetsov Lambek Grammars with the Unit . . . . . 262--266 Hans Leiß Resolving Plural Ambiguities by Type Reconstruction . . . . . . . . . . . . . 267--286 Scott Martin Weak Familiarity and Anaphoric Accessibility in Dynamic Semantics . . . 287--306 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Barbara Pernici and Cinzia Cappiello and Maria Grazia Fugini and Pierluigi Plebani Setting Energy Efficiency Goals in Data Centers: The GAMES Approach . . . . . . 1--12 Sonja Klingert and Andreas Berl and Michael Beck and Radu Serban and Marco di Girolamo Sustainable Energy Management in Data Centers through Collaboration . . . . . 13--24 Micha vor dem Berge and Georges Da Costa and Andreas Kopecki and Ariel Oleksiak Modeling and Simulation of Data Center Energy-Efficiency in CoolEmAll . . . . . 25--36 Wolfgang Ziegler SLAs for Energy-Efficient Data Centres: The Standards-Based Approach of the OPTIMIS Project . . . . . . . . . . . . 37--46 Ywes Israel and Thomas Leitert The GreenIT DC-Benchmarking Tool: From Scientific Theory to Real Life . . . . . 47--53 Christian Bunse and Sonja Klingert and Thomas Schulze GreenSLAs: Supporting Energy-Efficiency through Contracts . . . . . . . . . . . 54--68 Vlasia Anagnostopoulou and Susmit Biswas and Heba Saadeldeen and Ricardo Bianchini and Tao Yang Power-Aware Resource Allocation for CPU- and Memory-Intense Internet Services . . 69--80 Marco Guazzone and Cosimo Anglano and Massimo Canonico Exploiting VM Migration for the Automated Power and Performance Management of Green Cloud Computing Systems . . . . . . . . . . . . . . . . 81--92 Drazen Lucanin and Michael Maurer and Toni Mastelic and Ivona Brandic Energy Efficient Service Delivery in Clouds in Compliance with the Kyoto Protocol . . . . . . . . . . . . . . . . 93--104 Mikko Pervilä and Mikko Rantanen and Jussi Kangasharju Implementation and Evaluation of a Wired Data Center Sensor Network . . . . . . . 105--116 Edward Curry and Souleiman Hasan and Mark White and Hugh Melvin An Environmental Chargeback for Data Center and Cloud Computing Consumers . . 117--128 Dang Minh Quan and Andrey Somov and Corentin Dupont Energy Usage and Carbon Emission Optimization Mechanism for Federated Data Centers . . . . . . . . . . . . . . 129--140 Ghislain Landry Tsafack Chetsa and Laurent Lefevre and Jean-Marc Pierson and Patricia Stolf DNA-Inspired Scheme for Building the Energy Profile of HPC Systems . . . . . 141--152 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Hyoungshick Kim and John Tang and Ross Anderson Social Authentication: Harder Than It Looks . . . . . . . . . . . . . . . . . 1--15 Sonia Chiasson and Chris Deschamps The MVP Web-Based Authentication Framework . . . . . . . . . . . . . . . 16--24 Joseph Bonneau and Sören Preibusch and Ross Anderson A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs . . . . . . . . . . . . . . . . . . 25--40 Tyler Moore and Jie Han and Richard Clayton The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs . . . . . . . . . . . . . . . . 41--56 Dan Bogdanov and Riivo Talviste and Jan Willemson Deploying Secure Multi-Party Computation for Financial Data Analysis . . . . . . 57--64 Christopher Thorpe and Steven R. Willis Cryptographic Rule-Based Trading . . . . 65--72 Zi Lin and Denis Foo Kune and Nicholas Hopper Efficient Private Proximity Testing with GSM Location Sketches . . . . . . . . . 73--88 Benjamin Johnson and John Chuang and Jens Grossklags Metrics for Measuring ISP Badness: The Case of Spam . . . . . . . . . . . . . . 89--97 Tao Wang and Kevin Bauer and Clara Forero Congestion-Aware Path Selection for Tor 98--113 Scott Wolchok and Eric Wustrow and Dawn Isabel Attacking the Washington, D.C. Internet Voting System . . . . . . . . . . . . . 114--128 Rainer Böhme Security Audits Revisited . . . . . . . 129--147 Attila A. Yavuz and Peng Ning and Michael K. Reiter Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging . . . . . . . . . . 148--163 Morten Dahl and Chao Ning and Tomas Toft On Secure Two-Party Integer Division . . 164--178 Rafik Chaabouni and Helger Lipmaa and Bingsheng Zhang A Non-interactive Range Proof with Constant Communication . . . . . . . . . 179--199 T.-H. Hubert Chan and Elaine Shi and Dawn Song Privacy-Preserving Stream Aggregation with Fault Tolerance . . . . . . . . . . 200--214 Daniel Slamanig Dynamic Accumulator Based Discretionary Access Control for Outsourced Storage with Unlinkable Access . . . . . . . . . 215--222 Mariana Raykova and Hang Zhao and Steven M. Bellovin Privacy Enhanced Access Control for Outsourced Data Sharing . . . . . . . . 223--238 Andres Molina-Markham and George Danezis and Kevin Fu Designing Privacy-Preserving Smart Meters with Low-Cost Microcontrollers 239--253 Benjamin Mood and Lara Letaw and Kevin Butler Memory-Efficient Garbled Circuit Generation for Mobile Devices . . . . . 254--268 Payman Mohassel and Salman Niksefat Oblivious Decision Programs from Oblivious Transfer: Efficient Reductions 269--284 Anonymous Front Matter . . . . . . . . . . . . . . ??
Joseph Bonneau and Ekaterina Shutova Linguistic Properties of Multi-word Passphrases . . . . . . . . . . . . . . 1--12 Marcelo Carlos and Geraint Price Understanding the Weaknesses of Human-Protocol Interaction . . . . . . . 13--26 Alexei Czeskis and Jacob Appelbaum High Stakes: Designing a Privacy Preserving Registry . . . . . . . . . . 27--43 Alexei Czeskis and Dirk Balfanz Protected Login . . . . . . . . . . . . 44--52 Zheng Dong Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks . . . . 53--67 Patrick Gage Kelley and Sunny Consolvo and Lorrie Faith Cranor and Jaeyeon Jung and Norman Sadeh A Conundrum of Permissions: Installing Applications on an Android Smartphone 68--79 Fanny Lalonde Lévesque and Carlton R. Davis and José M. Fernandez and Sonia Chiasson Methodology for a Field Study of Anti-malware Software . . . . . . . . . 80--85 Sameer Patil and Yann Le Gall and Adam J. Lee and Apu Kapadia My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules . . . . . . . . . . . . . . 86--97 Andrew G. West and Pedram Hayati and Vidyasagar Potdar and Insup Lee Spamming for Science: Active Measurement in Web 2.0 Abuse Research . . . . . . . 98--111 Michael Bailey and Erin Kenneally and David Dittrich A Refined Ethical Impact Assessment Tool and a Case Study of Its Application . . 112--123 Serge Egelman and Joseph Bonneau and Sonia Chiasson and David Dittrich and Stuart Schechter It's Not Stealing If You Need It: a Panel on the Ethics of Performing Research Using Public Data of Illicit Origin . . . . . . . . . . . . . . . . . 124--132 Ross Anderson Ethics Committees and IRBs: Boon, or Bane, or More Research Needed? . . . . . 133--135 José M. Fernandez and Andrew S. Patrick and Lenore D. Zuck Ethical and Secure Data Sharing across Borders . . . . . . . . . . . . . . . . 136--140 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Samson Abramsky and Jonathan Zvesper From Lawvere to Brandenburger-Keisler: Interactive Forms of Diagonalization and Self-reference . . . . . . . . . . . . . 1--19 Marcello M. Bonsangue and Jan Rutten and Joost Winter Defining Context-Free Power Series Coalgebraically . . . . . . . . . . . . 20--39 Pawe\l Soboci\'nski Relational Presheaves as Labelled Transition Systems . . . . . . . . . . . 40--50 Ji\vrí Adámek and Stefan Milius and Lawrence S. Moss On Finitary Functors and Their Presentations . . . . . . . . . . . . . 51--70 Giorgio Bacci and Marino Miculan Structural Operational Semantics for Continuous State Probabilistic Processes 71--89 Vincenzo Ciancia and Yde Venema Stream Automata Are Coalgebras . . . . . 90--108 Bart Jacobs and Alexandra Silva and Ana Sokolova Trace Semantics via Determinization . . 109--129 Alexander Kurz and Daniela Petri\csan and Paula Severi An Alpha-Corecursion Principle for the Infinitary Lambda Calculus . . . . . . . 130--149 Johannes Marti and Yde Venema Lax Extensions of Coalgebra Functors . . 150--169 Eleftherios Matsikoudis and Edward A. Lee From Transitions to Executions . . . . . 170--190 Dusko Pavlovic Tracing the Man in the Middle in Monoidal Categories . . . . . . . . . . 191--217 Celia Picard and Ralph Matthes Permutations in Coinductive Graph Representation . . . . . . . . . . . . . 218--237 Toby Wilkinson Internal Models for Coalgebraic Modal Logics . . . . . . . . . . . . . . . . . 238--258 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??