Last update:
Sat Oct 14 16:24:17 MDT 2017
Ibrahima Gueye and
Idrissa Sarr and
Hubert Naacke TransElas: Elastic Transaction
Monitoring for Web2.0 Applications . . . 1--12
Sushil Jajodia and
Witold Litwin and
Thomas Schwarz Recoverable Encryption through Noised
Secret over a Large Cloud . . . . . . . 13--24
Byunggu Yu and
Alfredo Cuzzocrea and
Dong Jeong and
Sergey Maydebura A Bigtable/MapReduce-Based Cloud
Infrastructure for Effectively and
Efficiently Managing Large-Scale Sensor
Networks . . . . . . . . . . . . . . . . 25--36
Diana Moise and
Alexandra Carpen-Amarie MapReduce Applications in the Cloud: a
Cost Evaluation of Computation and
Storage . . . . . . . . . . . . . . . . 37--48
Mohamed Amin Sakka and
Bruno Defude Scalability Issues in Designing and
Implementing Semantic Provenance
Management Systems . . . . . . . . . . . 49--61
Balwinder Sodhi and
T. V. Prabhakar Performance Characteristics of
Virtualized Platforms from Applications
Perspective . . . . . . . . . . . . . . 62--74
Qiming Chen and
Meichun Hsu Open Execution Engines of Stream
Analysis Operations . . . . . . . . . . 75--87
George Pallis Improving Content Delivery by Exploiting
the Utility of CDN Servers . . . . . . . 88--99
Eugenio Cesario and
Carlo Mastroianni and
Domenico Talia Using Mining@Home for Distributed
Ensemble Learning . . . . . . . . . . . 100--111
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Filipe Portela and
Manuel Filipe Santos and
José Machado and
Álvaro Silva and
Fernando Rua Intelligent Data Acquisition and Scoring
System for Intensive Medicine . . . . . 1--15
Maribel Yasmina Santos and
Jorge Cruz and
Artur Teles de Araújo Data Mining in the Study of the Chronic
Obstructive Pulmonary Disease . . . . . 16--30
Miroslav Bursa and
Lenka Lhotska and
Vaclav Chudacek and
Jiri Spilka and
Petr Janku and
Martin Huser Practical Problems and Solutions in
Hospital Information System Data Mining 31--39
Dominic Girardi and
Michael Giretzlehner and
Josef Küng Using Generic Meta-Data-Models for
Clustering Medical Data . . . . . . . . 40--53
Cátia Santos-Pereira and
Alexandre B. Augusto and
Manuel E. Correia and
Ana Ferreira A Mobile Based Authorization Mechanism
for Patient Managed Role Based Access
Control . . . . . . . . . . . . . . . . 54--68
Mersini Paschou and
Efrosini Sourla and
George Basagiannis and
Evangelos Sakkopoulos Care@HOME: a Mobile Monitoring System
for Patient Treatment and Blood Pressure
Tracking . . . . . . . . . . . . . . . . 69--83
Anna Hristoskova and
Veselka Boeva and
Elena Tsiporkova An Integrative Clustering Approach
Combining Particle Swarm Optimization
and Formal Concept Analysis . . . . . . 84--98
Francesco Folino and
Clara Pizzuti Link Prediction Approaches for Disease
Networks . . . . . . . . . . . . . . . . 99--108
Michelangelo Ceci and
Fabio Fumarola and
Pietro Hiram Guzzi and
Federica Mandreoli Toward a Semantic Framework for the
Querying, Mining and Visualization of
Cancer Microenvironment Data . . . . . . 109--123
Adam Wyner and
Luke Riley and
Robert Hoehndorf and
Samuel Croset Argumentation to Represent and Reason
over Biological Systems . . . . . . . . 124--138
Karol Kozak The Use of Design Specificity in
Standardized Mean Difference for
Analysis of High throughput RNA
Interference Screens . . . . . . . . . . 139--150
Catia M. Machado and
Francisco M. Couto and
Alexandra R. Fernandes and
Susana Santos Toward a Translational Medicine Approach
for Hypertrophic Cardiomyopathy . . . . 151--165
Andreas Holzinger and
Reinhold Scherer and
Martin Seeber and
Johanna Wagner and
Gernot Müller-Putz Computational Sensemaking on Examples of
Knowledge Discovery from Neuroscience
Data: Towards Enhancing Stroke
Rehabilitation . . . . . . . . . . . . . 166--168
Jan Havlík and
Lucie Ku\vcerová and
Imrich Kohút and
Jan Dvo\vrák and
Vratislav Fabián The Database of the Cardiovascular
System Related Signals . . . . . . . . . 169--170
Jan Havlík and
Ond\vrej Fousek and
Miroslav Lo\vzek Patient Monitoring Using Bioimpedance
Signal . . . . . . . . . . . . . . . . . 171--172
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Roland Traunmüller Knowledge Management in Government: New
Perspectives . . . . . . . . . . . . . . 1--9
Alexander Prosser eParticipation --- Did We Deliver What
We Promised? . . . . . . . . . . . . . . 10--18
Emmanuel Nyakwende and
Ali Al Mazari Factors Affecting the Development of
e-Government in Saudi Arabia . . . . . . 19--28
Wichian Chutimaskul and
Suree Funilkul The Framework for Monitoring the
Development Process and Inspection of
Government Information System and
Technology: a Case Study in Thailand . . 29--43
La Anh Tuan and
John Debenham Online Tender Evaluation: VietNam
Government e-Procurement System . . . . 44--51
Sergiusz Strykowski and
Rafa\l Wojciechowski Composable Modeling and Execution of
Administrative Procedures . . . . . . . 52--66
Igor T. Hawryszkiewycz A Design Framework for Collaboration in
Systems of Systems . . . . . . . . . . . 67--78
Chih-Hui Hsiao and
Hui-Chih Wang and
Her-Sen Doong A Study of Factors Influencing
e-Government Service Acceptance
Intention: a Multiple Perspective
Approach . . . . . . . . . . . . . . . . 79--87
Thomas Zefferer and
Vesna Krnjic Towards User-Friendly e-Government
Solutions: Usability Evaluation of
Austrian Smart-Card Integration
Techniques . . . . . . . . . . . . . . . 88--102
Swapnil Shrivastava and
Zia Saquib and
Gopinath P. and
Peeyush Chomal Unique Identity Enabled Service Delivery
through NSDG . . . . . . . . . . . . . . 103--111
Serenella Carota and
Flavio Corradini and
Damiano Falcioni and
Maria Laura Maggiulli FedCohesion: Federated Identity
Management in the Marche Region . . . . 112--124
Damiano Falcioni and
Andrea Polini and
Alberto Polzonetti and
Barbara Re Livelock and Deadlock Detection for PA
Inter-organizational Business Processes 125--139
Laura González and
Raúl Ruggia and
Jorge Abin and
Guzmán Llambías and
Raquel Sosa and
Bruno Rienzi A Service-Oriented Integration Platform
to Support a Joined-Up E-Government
Approach: The Uruguayan Experience . . . 140--154
José Félix Muñoz and
Carlos Bobed and
Francisco Serón Modeling Administrative Procedures to
Improve Information to the Public . . . 155--169
John Debenham and
Simeon Simoff The Co-Creation Machine: Managing
Co-Creative Processes for the Crowd . . 170--177
Artur Afonso Sousa and
Pedro Agante and
Luís Borges Gouveia A Worked Proposal on eParticipation for
State Wide Elections . . . . . . . . . . 178--190
Sergey Ablameyko and
Nikolai Kalosha and
Sergey Bratchenya and
Vitali Lipen Test Implementation of the ``Guarantor''
Internet Voting System: Design
Principles, Operation, and Approbation 191--201
Katalin Ternai and
Ildikó Szabó EBEST Platform Supporting SMEs to Manage
Supply Chain and Collaborate . . . . . . 202--215
Ourania Hatzi and
Mara Nikolaidou and
Panagiotis Katsivelis-Perakis and
Valentino Hudhra Using Social Network Technology to
Provide e-Administration Services as
Collaborative Tasks . . . . . . . . . . 216--230
Sangin Park and
Yeontai Choi and
Dukyun Hwang and
Miyon Paek Do Different Types of SNS Have Different
Impacts on Participatory Social Capital? 231--241
Anonymous Front Matter . . . . . . . . . . . . . . ??
Tadayuki Matsumura and
Tetsuya Yamada IT-Cooling Collaborative Control Methods
for Battery-Aware IT-Systems Targeting
India . . . . . . . . . . . . . . . . . 1--17
Afef Denguir and
François Trousset and
Jacky Montmain Research for IT Driven Energy Efficiency
Based on a Multidimensional Comfort
Control$^*$ . . . . . . . . . . . . . . 18--32
Deb Polson and
Cassandra Selin The ECOS Green Buildings Project: Data
Dramatization, Visualization and
Manipulation . . . . . . . . . . . . . . 33--43
Hallgeir Lien and
Lasse Natvig and
Abdullah Al Hasib and
Jan Christian Meyer Case Studies of Multi-core Energy
Efficiency in Task Based Programs . . . 44--54
José I. Aliaga and
Manuel F. Dolz and
Alberto F. Martín and
Rafael Mayo Leveraging Task-Parallelism in
Energy-Efficient ILU Preconditioners . . 55--63
Saif ul Islam and
Jean-Marc Pierson Evaluating Energy Consumption in CDN
Servers . . . . . . . . . . . . . . . . 64--78
Alexandre Mello Ferreira and
Barbara Pernici and
Pierluigi Plebani Green Performance Indicators Aggregation
through Composed Weighting System . . . 79--93
Thanh Binh Nguyen and
Fabian Wagner and
Wolfgang Schoepp EC4MACS --- An Integrated Assessment
Toolbox of Well-Established Modeling
Tools to Explore the Synergies and
Interactions between Climate Change, Air
Quality and Other Policy Objectives . . 94--108
Benjamin Bertin and
Marian Scuturici and
Jean-Marie Pinon and
Emmanuel Risler Semantic Modelling of Dependency
Relations between Life Cycle Analysis
Processes . . . . . . . . . . . . . . . 109--124
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . I--X
Jos C. M. Baeten and
Bas Luttik and
Paul van Tilburg Turing Meets Milner . . . . . . . . . . 1--20
Gordon D. Plotkin Concurrency and the Algebraic Theory of
Effects . . . . . . . . . . . . . . . . 21--22
Brian Randell A Turing Enigma . . . . . . . . . . . . 23--36
Peter Sewell False Concurrency and Strange-but-True
Machines . . . . . . . . . . . . . . . . 37--38
Béatrice Bérard and
Serge Haddad and
Mathieu Sassolas and
Nathalie Sznajder Concurrent Games on VASS with Inhibition 39--52
Wojciech Czerwi\'nski and
Piotr Hofman and
S\lawomir Lasota Reachability Problem for Weak
Multi-Pushdown Automata . . . . . . . . 53--68
Nengkun Yu and
Mingsheng Ying Reachability and Termination Analysis of
Concurrent Quantum Programs . . . . . . 69--83
Guy Avni and
Orna Kupferman Making Weighted Containment Feasible: a
Heuristic Based on Simulation and
Abstraction . . . . . . . . . . . . . . 84--99
Sandie Balaguer and
Thomas Chatain Avoiding Shared Clocks in Networks of
Timed Automata . . . . . . . . . . . . . 100--114
Krishnendu Chatterjee and
Mickael Randour and
Jean-François Raskin Strategy Synthesis for Multi-Dimensional
Quantitative Objectives . . . . . . . . 115--131
Emmanuel Filiot and
Raffaella Gentilini and
Jean-François Raskin Quantitative Languages Defined by
Functional Automata . . . . . . . . . . 132--146
Romain Brenguier and
Stefan Göller and
Ocan Sankur A Comparison of Succinctly Represented
Finite-State Systems . . . . . . . . . . 147--161
Antti Valmari All Linear-Time Congruences for Familiar
Operators Part 2: Infinite LTSs . . . . 162--176
Arnaud Da Costa and
François Laroussinie and
Nicolas Markey Quantified CTL: Expressiveness and Model
Checking . . . . . . . . . . . . . . . . 177--192
Fabio Mogavero and
Aniello Murano and
Giuseppe Perelli and
Moshe Y. Vardi What Makes Atl* Decidable? A Decidable
Fragment of Strategy Logic . . . . . . . 193--208
Tzu-Chun Chen and
Kohei Honda Specifying Stateful Asynchronous
Properties for Distributed Programs . . 209--224
Julien Lange and
Emilio Tuosto Synthesising Choreographies from Local
Session Types . . . . . . . . . . . . . 225--239
Fides Aarts and
Faranak Heidarian and
Frits Vaandrager A Theory of History Dependent
Abstractions for Learning Interface
Automata . . . . . . . . . . . . . . . . 240--255
Alexey Gotsman and
Hongseok Yang Linearizability with Ownership Transfer 256--271
Romain Demangeon and
Kohei Honda Nested Protocols in Session Types . . . 272--286
Anonymous Front Matter . . . . . . . . . . . . . . ??
Thomas Ågotnes and
Hans van Ditmarsch Coalitional Public Announcement Games 1--15
Jianye Hao and
Songzheng Song and
Yang Liu and
Jun Sun and
Lin Gui and
Jin Song Dong and
Ho-fung Leung Probabilistic Model Checking Multi-agent
Behaviors in Dispersion Games Using
Counter Abstraction . . . . . . . . . . 16--30
Koen V. Hindriks Debugging Is Explaining . . . . . . . . 31--45
Jianye Hao and
Ho-fung Leung An Efficient Negotiation Protocol to
Achieve Socially Optimal Allocation . . 46--60
Ayman Ghoneim Reassignment-Based Strategy-Proof
Mechanisms for Interdependent Task
Allocation . . . . . . . . . . . . . . . 61--76
Yingqian Zhang and
Sicco Verwer Mechanism for Robust Procurements . . . 77--91
Cyril Poulet and
Vincent Corruble and
Amal El Fallah Seghrouchni Auction-Based Strategies for the
Open-System Patrolling Task . . . . . . 92--106
Gerrit Anders and
Florian Siefert and
Jan-Philipp Steghöfer and
Wolfgang Reif A Decentralized Multi-agent Algorithm
for the Set Partitioning Problem . . . . 107--121
Dai Hamada and
Toshiharu Sugawara Two-Sided Parameter Learning of Role
Selections for Efficient Team Formation 122--136
Toshihiro Matsui and
Marius Silaghi and
Katsutoshi Hirayama and
Makoto Yokoo and
Hiroshi Matsuo Distributed Search Method with Bounded
Cost Vectors on Multiple Objective DCOPs 137--152
Feyza Merve Hafìzo\uglu and
Sandip Sen Analysis of Opinion Spread through
Migration and Adoption in Agent
Communities . . . . . . . . . . . . . . 153--167
Bastin Tony Roy Savarimuthu and
Lam-Son Lê and
Aditya Ghose From Green Norms to Policies ---
Combining Bottom-Up and Top-Down
Approaches . . . . . . . . . . . . . . . 168--183
Han Yu and
Zhiqi Shen and
Bo An An Adaptive Witness Selection Method for
Reputation-Based Trust Models . . . . . 184--198
Jeremy Pitt and
Julia Schaumeier Provision and Appropriation of
Common-Pool Resources without Full
Disclosure . . . . . . . . . . . . . . . 199--213
Takayuki Ito and
Ryo Kanamori and
Jun Takahashi and
Ivan Marsa Maestre and
Enrique de la Hoz Effect of Anticipatory Stigmergy on
Decentralized Traffic Congestion Control 214--227
Viet Xuan Truong and
Hiep Xuan Huynh and
Minh Ngoc Le and
Alexis Drogoul Modeling a Surveillance Network Based on
Unit Disk Graph Technique ---
Application for Monitoring the Invasion
of Insects in Mekong Delta Region . . . 228--242
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Andrea Asperti and
Wilmer Ricciotti Formalizing Turing Machines . . . . . . 1--25
Ekaterina Fokina and
Sy Friedman and
André Nies Equivalence Relations That Are
$\Sigma^0_3$ Complete for Computable
Reducibility . . . . . . . . . . . . . . 26--33
Laura Kallmeyer and
Rainer Osswald An Analysis of Directed Motion
Expressions with Lexicalized Tree
Adjoining Grammars and Frame Semantics 34--55
George Metcalfe Admissible Rules: From Characterizations
to Applications . . . . . . . . . . . . 56--69
Volker Diekert and
Anca Muscholl On Distributed Monitoring of
Asynchronous Systems . . . . . . . . . . 70--84
Nicole Schweikardt On the Expressive Power of Logics with
Invariant Uses of Arithmetic Predicates 85--87
Peter Selinger Logical Methods in Quantum Information
Theory . . . . . . . . . . . . . . . . . 88--88
Hans van Ditmarsch Quantifying Notes . . . . . . . . . . . 89--109
Sergio Abriola and
Santiago Figueira and
Gabriel Senno Linearizing Bad Sequences: Upper Bounds
for the Product and Majoring Well
Quasi-orders . . . . . . . . . . . . . . 110--126
Benedikt Ahrens Initiality for Typed Syntax and
Semantics . . . . . . . . . . . . . . . 127--141
Carlos Areces and
Raul Fervari and
Guillaume Hoffmann Moving Arrows and Four Model Checking
Results . . . . . . . . . . . . . . . . 142--153
Paolo Baldi and
Agata Ciabattoni and
Lara Spendier Standard Completeness for Extensions of
MTL: An Automated Approach . . . . . . . 154--167
Alexandru Baltag and
Bryan Renne and
Sonja Smets The Logic of Justified Belief Change,
Soft Evidence and Defeasible Knowledge 168--190
Nick Bezhanishvili and
Clemens Kupke and
Prakash Panangaden Minimization via Duality . . . . . . . . 191--205
Claudio Callejas and
João Marcos and
Benjamín René Callejas Bedregal On Some Subclasses of the Fodor--Roubens
Fuzzy Bi-implication . . . . . . . . . . 206--215
Alejandro Díaz-Caro and
Barbara Petit Linearity in the Non-deterministic
Call-by-Value Setting . . . . . . . . . 216--231
Amin Farjudian Polynomial-Time Solution of Initial
Value Problems Using Polynomial
Enclosures . . . . . . . . . . . . . . . 232--245
Willem L. Fouché Algorithmic Randomness and Ramsey
Properties of Countable Homogeneous
Structures . . . . . . . . . . . . . . . 246--256
Sebastian Link Propositional Reasoning about Saturated
Conditional Probabilistic Independence 257--267
Márcio M. Ribeiro and
Marcelo E. Coniglio Contracting Logics . . . . . . . . . . . 268--281
Anonymous Front Matter . . . . . . . . . . . . . . ??
AbdulRahman A. Al-Sewari and
Kamal Z. Zamli Constraints Dependent T-Way Test Suite
Generation Using Harmony Search Strategy 1--11
Siti Hajar Othman and
Ghassan Beydoun Evaluating Disaster Management Knowledge
Model by Using a Frequency-Based
Selection Technique . . . . . . . . . . 12--27
Fengqi An and
Xiongcai Cai and
Arcot Sowmya Perceptual Evaluation of Automatic
$2.5$D Cartoon Modelling . . . . . . . . 28--42
Nader Hanna and
Deborah Richards and
Michael J. Jacobson Automatic Acquisition of User Models of
Interaction to Evaluate the Usability of
Virtual Environments . . . . . . . . . . 43--57
Zhao Chen and
Md. Sumon Shahriar and
Byeong Ho Kang User-Centric Recommendation-Based
Approximate Information Retrieval from
Marine Sensor Data . . . . . . . . . . . 58--72
Ana Ximena Halabi Echeverry and
Deborah Richards Addressing Challenges for Knowledge
Discovery from Data in the Domain of
Seaport Integration . . . . . . . . . . 73--85
Chuen Tse Kuah and
Kuan Yew Wong Data Envelopment Analysis for Evaluating
Knowledge Acquisition and Creation . . . 86--93
Dung T. Ho and
Tru H. Cao A High-Order Hidden Markov Model for
Emotion Detection from Textual Data . . 94--105
Norshuhani Zamin and
Alan Oxley and
Zainab Abu Bakar and
Syed Ahmad Farhan A Lazy Man's Way to Part-of-Speech
Tagging . . . . . . . . . . . . . . . . 106--117
Filippo Galgani and
Paul Compton and
Achim Hoffmann Knowledge Acquisition for Categorization
of Legal Case Reports . . . . . . . . . 118--132
Kyohei Ishikawa and
Hayato Ohwada Extraction of How-to Type
Question-Answering Sentences Using Query
Sets . . . . . . . . . . . . . . . . . . 133--139
Ahmed Boulemden and
Yamina Tlili Image Indexing and Retrieval with
Pachinko Allocation Model: Application
on Local and Global Features . . . . . . 140--146
Andrei Kelarev and
Richard Dazeley and
Andrew Stranieri and
John Yearwood and
Herbert Jelinek Detection of CAN by Ensemble Classifiers
Based on Ripple Down Rules . . . . . . . 147--159
Myung Hee Kim and
Paul Compton Improving Open Information Extraction
for Informal Web Documents with
Ripple-Down Rules . . . . . . . . . . . 160--174
Yang Sok Kim and
Paul Compton and
Byeong Ho Kang Ripple-Down Rules with Censored
Production Rules . . . . . . . . . . . . 175--187
Omaru Maruatona and
Peter Vamplew and
Richard Dazeley RM and RDM, a Preliminary Evaluation of
Two Prudent RDR Techniques . . . . . . . 188--194
Karen Ang and
Ethel Ong Planning Children's Stories Using Agent
Models . . . . . . . . . . . . . . . . . 195--208
Nader Hanna and
Deborah Richards A Framework for a Multi-agent
Collaborative Virtual Learning
Environment (MACVILLE) Based on Activity
Theory . . . . . . . . . . . . . . . . . 209--220
Shahrinaz Ismail and
Mohd Sharifuddin Ahmad Emergence of Personal Knowledge
Management Processes within Multi-agent
Roles . . . . . . . . . . . . . . . . . 221--228
Amara Atif and
Peter Busch and
Deborah Richards Towards an Ontology-Based Approach to
Knowledge Management of Graduate
Attributes in Higher Education . . . . . 229--243
Anonymous Front Matter . . . . . . . . . . . . . . ??
Hiroaki Kitano Systems Biology Powered by Artificial
Intelligence . . . . . . . . . . . . . . 1--1
Francesca Rossi Preference Reasoning and Aggregation:
Between AI and Social Choice . . . . . . 2--2
Shantanu Chakraborty and
Takayuki Ito and
Tomonobu Senjyu Economical Operation of Thermal
Generating Units Integrated with Smart
Houses . . . . . . . . . . . . . . . . . 3--14
Mahsa Chitsaz and
Kewen Wang and
Michael Blumenstein and
Guilin Qi Concept Learning for ${\cal EL}^{++}$ by
Refinement and Reinforcement . . . . . . 15--26
Maike Erdmann and
Duc Dung Nguyen and
Tomoya Takeyoshi and
Gen Hattori and
Kazunori Matsumoto Hierarchical Training of Multiple SVMs
for Personalized Web Filtering . . . . . 27--39
Filippo Galgani and
Paul Compton and
Achim Hoffmann Citation Based Summarisation of Legal
Texts . . . . . . . . . . . . . . . . . 40--52
Gaopeng Gou and
Di Huang and
Yunhong Wang A Novel Video Face Clustering Algorithm
Based on Divide and Conquer Strategy . . 53--63
Gaopeng Gou and
Di Huang and
Yunhong Wang A Hybrid Local Feature for Face
Recognition . . . . . . . . . . . . . . 64--75
Miha Gr\vcar and
Vid Podpe\vcan and
Borut Sluban and
Igor Mozeti\vc Ontology Querying Support in Semantic
Annotation Process . . . . . . . . . . . 76--87
Jianye Hao and
Ho-fung Leung Learning to Achieve Socially Optimal
Solutions in General-Sum Games . . . . . 88--99
Jianye Hao and
Ho-fung Leung Incorporating Fairness into Agent
Interactions Modeled as Two-Player
Normal-Form Games . . . . . . . . . . . 100--111
Jijian Huang and
Hui Xue and
Yuqing Zhai Semi-Supervised Discriminatively
Regularized Classifier with Pairwise
Constraints . . . . . . . . . . . . . . 112--123
Jihye Hwang and
Kyung-tai Kim and
Eun Yi Kim Outdoor Situation Recognition Using
Support Vector Machine for the Blind and
the Visually Impaired . . . . . . . . . 124--132
Akihiro Inokuchi and
Ayumu Yamaoka and
Takashi Washio and
Yuji Matsumoto and
Masayuki Asahara Mining Rules for Rewriting States in a
Transition-Based Dependency Parser . . . 133--145
Takayuki Ito and
Ryo Kanamori and
Jun Takahashi and
Iván Marsa Maestre and
Enrique de la Hoz The Comparison of Stigmergy Strategies
for Decentralized Traffic Congestion
Control: Preliminary Results . . . . . . 146--156
Yusuke Iwasawa and
Ikuko Eguchi Yairi Life-Logging of Wheelchair Driving on
Web Maps for Visualizing Potential
Accidents and Incidents . . . . . . . . 157--169
Hamid A. Jalab and
Rabha W. Ibrahim Texture Feature Extraction Based on
Fractional Mask Convolution with Cesáro
Means for Content-Based Image Retrieval 170--179
Yifan Jin and
Kewen Wang and
Lian Wen Possibilistic Reasoning in Multi-Context
Systems: Preliminary Report . . . . . . 180--193
Kye-Sung Kim and
Su-Jeong Choi and
Seong-Bae Park and
Sang-Jo Lee A Two-Step Zero Pronoun Resolution by
Reducing Candidate Cardinality . . . . . 194--205
Yang Sok Kim and
Alfred Krzywicki and
Wayne Wobcke and
Ashesh Mahidadia and
Paul Compton Hybrid Techniques to Address Cold Start
Problems for People to People
Recommendation in Social Networks . . . 206--217
Anonymous Front Matter . . . . . . . . . . . . . . ??
Elli Fragkaki and
Lujo Bauer and
Limin Jia and
David Swasey Modeling and Enhancing Android's
Permission System . . . . . . . . . . . 1--18
James Kelley and
Roberto Tamassia and
Nikos Triandopoulos Hardening Access Control and Data
Protection in GFS-like File Systems . . 19--36
Jonathan Crussell and
Clint Gibler and
Hao Chen Attack of the Clones: Detecting Cloned
Applications on Android Markets . . . . 37--54
Arnar Birgisson and
Daniel Hedin and
Andrei Sabelfeld Boosting the Permissiveness of Dynamic
Information-Flow Tracking by Testing . . 55--72
Serdar Erbatur and
Santiago Escobar and
Deepak Kapur and
Zhiqiang Liu and
Christopher Lynch Effective Symbolic Protocol Analysis via
Equational Irreducibility Conditions . . 73--90
Henning Schnoor Deciding Epistemic and Strategic
Properties of Cryptographic Protocols 91--108
Arif Akram Khan and
Philip W. L. Fong Satisfiability and Feasibility in a
Relationship-Based Workflow
Authorization Model . . . . . . . . . . 109--126
Sebastian Mödersheim Deciding Security for a Fragment of
ASLan . . . . . . . . . . . . . . . . . 127--144
Massimiliano Albanese and
Alessandra De Benedictis and
Sushil Jajodia and
Paulo Shakarian A Probabilistic Framework for
Localization of Attackers in MANETs . . 145--162
Ruben Rios and
Jorge Cuellar and
Javier Lopez Robust Probabilistic Fake Packet
Injection for Receiver-Location Privacy
in WSN . . . . . . . . . . . . . . . . . 163--180
Adam J. Aviv and
Micah Sherr and
Matt Blaze and
Jonathan M. Smith Privacy-Aware Message Exchanges for
Geographically Routed Human Movement
Networks . . . . . . . . . . . . . . . . 181--198
Italo Dacosta and
Mustaque Ahamad and
Patrick Traynor Trust No One Else: Detecting MITM
Attacks against SSL/TLS without
Third-Parties . . . . . . . . . . . . . 199--216
Ralph Holz and
Thomas Riedmaier and
Nils Kammenhuber and
Georg Carle X.509 Forensics: Detecting and
Localising the SSL/TLS Men-in-the-Middle 217--234
Simon Eberz and
Martin Strohmeier and
Matthias Wilhelm and
Ivan Martinovic A Practical Man-In-The-Middle Attack on
Signal-Based Key Generation Protocols 235--252
Ahmad-Reza Sadeghi and
Steffen Schulz and
Vijay Varadharajan The Silence of the LANs: Efficient
Leakage Resilience for IPsec VPNs . . . 253--270
Amir Herzberg and
Haya Shulman Security of Patched DNS . . . . . . . . 271--288
Qijun Gu and
Kyle Jones and
Wanyu Zang and
Meng Yu and
Peng Liu Revealing Abuses of Channel Assignment
Protocols in Multi-channel Wireless
Networks: An Investigation Logic
Approach . . . . . . . . . . . . . . . . 289--306
Mishari Almishari and
Gene Tsudik Exploring Linkability of User Reviews 307--324
Naipeng Dong and
Hugo Jonker and
Jun Pang Formal Analysis of Privacy in an eHealth
Protocol . . . . . . . . . . . . . . . . 325--342
Jinkyu Koo and
Xiaojun Lin and
Saurabh Bagchi PRIVATUS: Wallet-Friendly Privacy
Protection for Smart Meters . . . . . . 343--360
Anonymous Front Matter . . . . . . . . . . . . . . ??
Gilles Barthe and
Benjamin Grégoire and
Santiago Zanella Béguelin Computer-Aided Cryptographic Proofs . . 1--2
Dino Distefano A Voyage to the Deep-Heap . . . . . . . 3--3
Shriram Krishnamurthi Semantics and Analyses for JavaScript
and the Web . . . . . . . . . . . . . . 4--4
Jonathan K. Lee and
Jens Palsberg and
Rupak Majumdar and
Hong Hong Efficient May Happen in Parallel
Analysis for Async-Finish Parallelism 5--23
Eric Goubault and
Sylvie Putot and
Franck Védrine Modular Static Analysis with Zonotopes 24--40
Jacob M. Howe and
Andy King Polyhedral Analysis Using Parametric
Objectives . . . . . . . . . . . . . . . 41--57
David Cachera and
Thomas Jensen and
Arnaud Jobin and
Florent Kirchner Inference of Polynomial Invariants for
Imperative Programs: a Farewell to
Gröbner Bases . . . . . . . . . . . . . . 58--74
Arnault Ioualalen and
Matthieu Martel A New Abstract Domain for the
Representation of Mathematically
Equivalent Expressions . . . . . . . . . 75--93
Tie Cheng and
Xavier Rival An Abstract Domain to Infer Types over
Zones in Spreadsheets . . . . . . . . . 94--110
Aditya Thakur and
Matt Elder and
Thomas Reps Bilateral Algorithms for Symbolic
Abstraction . . . . . . . . . . . . . . 111--128
Roberto Giacobazzi and
Isabella Mastroeni Making Abstract Interpretation
Incomplete: Modeling the Potency of
Obfuscation . . . . . . . . . . . . . . 129--145
Alejandro Sanchez and
Sriram Sankaranarayanan and
César Sánchez and
Bor-Yuh Evan Chang Invariant Generation for Parametrized
Systems Using Self-reflection . . . . . 146--163
Parosh Aziz Abdulla and
Mohamed Faouzi Atig and
Yu-Fang Chen and
Carl Leonardsson and
Ahmed Rezine Automatic Fence Insertion in Integer
Programs via Predicate Abstraction . . . 164--180
Peter Calvert and
Alan Mycroft Control Flow Analysis for the Join
Calculus . . . . . . . . . . . . . . . . 181--197
Nicolas Halbwachs and
Julien Henry When the Decreasing Sequence Fails . . . 198--213
Sebastian Biallas and
Jörg Brauer and
Andy King and
Stefan Kowalewski Loop Leaping with Closures . . . . . . . 214--230
Joxan Jaffar and
Vijayaraghavan Murali and
Jorge A. Navas and
Andrew E. Santosa Path-Sensitive Backward Slicing . . . . 231--247
Dimitra Giannakopoulou and
Zvonimir Rakamari\'c and
Vishwanath Raman Symbolic Learning of Component
Interfaces . . . . . . . . . . . . . . . 248--264
Uday P. Khedker and
Alan Mycroft and
Prashant Singh Rawat Liveness-Based Pointer Analysis . . . . 265--282
Julien Henry and
David Monniaux and
Matthieu Moy Succinct Representations for Abstract
Interpretation . . . . . . . . . . . . . 283--299
Anonymous Front Matter . . . . . . . . . . . . . . ??
Oliver Kramer A Particle Swarm Embedding Algorithm for
Nonlinear Dimensionality Reduction . . . 1--12
Khalid M. Salama and
Alex A. Freitas ABC-Miner: An Ant-Based Bayesian
Classification Algorithm . . . . . . . . 13--24
Mieke Massink and
Manuele Brambilla and
Diego Latella and
Marco Dorigo and
Mauro Birattari Analysing Robot Swarm Decision-Making
with Bio-PEPA . . . . . . . . . . . . . 25--36
Leonardo C. T. Bezerra and
Manuel López-Ibáñez and
Thomas Stützle Automatic Generation of Multi-objective
ACO Algorithms for the Bi-objective
Knapsack . . . . . . . . . . . . . . . . 37--48
Mohammad Majid al-Rifaie and
Tim Blackwell Bare Bones Particle Swarms with Jumps 49--60
Sergi Mateo and
Christian Blum and
Pascal Fua and
Engin Türetgen Hybrid Algorithms for the Minimum-Weight
Rooted Arborescence Problem . . . . . . 61--72
Matthew Medland and
Fernando E. B. Otero and
Alex A. Freitas Improving the cAnt-Miner$_{PB}$
Classification Algorithm . . . . . . . . 73--84
Jorge Gomes and
Paulo Urbano and
Anders Lyhne Christensen Introducing Novelty Search in
Evolutionary Swarm Robotics . . . . . . 85--96
Adiel Ismail and
Andries P. Engelbrecht Measuring Diversity in the Cooperative
Particle Swarm Optimizer . . . . . . . . 97--108
Giovanni Pini and
Arne Brutschy and
Gianpiero Francesca and
Marco Dorigo and
Mauro Birattari Multi-armed Bandit Formulation of the
Task Partitioning Problem in Swarm
Robotics . . . . . . . . . . . . . . . . 109--120
Barend J. Leonard and
Andries P. Engelbrecht Scalability Study of Particle Swarm
Optimizers in Dynamic Environments . . . 121--132
Lachlan Murray and
Jon Timmis and
Andy Tyrrell Self-reconfigurable Modular e-pucks . . 133--144
James Worcester and
M. Ani Hsieh Task Partitioning via Ant Colony
Optimization for Distributed Assembly 145--155
Adiel Ismail and
Andries P. Engelbrecht The Self-adaptive Comprehensive Learning
Particle Swarm Optimizer . . . . . . . . 156--167
Heiko Hamann Towards Swarm Calculus: Universal
Properties of Swarm Performance and
Collective Decisions . . . . . . . . . . 168--179
Yannis Marinakis and
Magdalene Marinaki A Hybrid Particle Swarm Optimization
Algorithm for the Open Vehicle Routing
Problem . . . . . . . . . . . . . . . . 180--187
Filipe V. Nepomuceno and
Andries P. Engelbrecht A Self-adaptive Heterogeneous PSO
Inspired by Ants . . . . . . . . . . . . 188--195
Yotam Elor and
Alfred M. Bruckstein A ``Thermodynamic'' Approach to
Multi-robot Cooperative Localization
with Noisy Sensors . . . . . . . . . . . 196--203
Dong Do Duc and
Huy Q. Dinh and
Thanh Hai Dang and
Kris Laukens and
Xuan Huan Hoang AcoSeeD: An Ant Colony Optimization for
Finding Optimal Spaced Seeds in
Biological Sequence Search . . . . . . . 204--211
Rui Fang and
Zequn Huang and
Louis Rossi and
Chien-Chung Shen Analysis of Ant-Based Routing with
Wireless Medium Access Control . . . . . 212--219
Anonymous Front Matter . . . . . . . . . . . . . . ??
Abhinav Srivastava and
Himanshu Raj and
Jonathon Giffin and
Paul England Trusted VM Snapshots in Untrusted Cloud
Infrastructures . . . . . . . . . . . . 1--21
Martim Carbone and
Matthew Conover and
Bruce Montague and
Wenke Lee Secure and Robust Monitoring of Virtual
Machines through Guest-Assisted
Introspection . . . . . . . . . . . . . 22--41
Shengzhi Zhang and
Peng Liu Assessing the Trustworthiness of Drivers 42--63
Olivier Thonnard and
Leyla Bilge and
Gavin O'Gorman and
Seán Kiernan and
Martin Lee Industrial Espionage and Targeted
Attacks: Understanding the
Characteristics of an Escalating Threat 64--85
Victor van der Veen and
Nitish dutt-Sharma and
Lorenzo Cavallaro and
Herbert Bos Memory Errors: The Past, the Present,
and the Future . . . . . . . . . . . . . 86--106
Dongkyun Ahn and
Gyungho Lee A Memory Access Validation Scheme
against Payload Injection Attacks . . . 107--126
Jennifer Mankin and
David Kaeli Dione: a Flexible Disk Monitoring and
Analysis Framework . . . . . . . . . . . 127--146
Zhi Xu and
Hungyuan Hsu and
Xin Chen and
Sencun Zhu and
Ali R. Hurson AK-PPM: An Authenticated Packet
Attribution Scheme for Mobile Ad Hoc
Networks . . . . . . . . . . . . . . . . 147--168
Tobias Lauinger and
Engin Kirda and
Pietro Michiardi Paying for Piracy? An Analysis of
One-Click Hosters' Controversial Reward
Schemes . . . . . . . . . . . . . . . . 169--189
Samuel Marchal and
Jérôme François and
Radu State and
Thomas Engel Proactive Discovery of Phishing Related
Domain Names . . . . . . . . . . . . . . 190--209
Daisuke Mashima and
Alvaro A. Cárdenas Evaluating Electricity Theft Detectors
in Smart Grid Networks . . . . . . . . . 210--229
Jialong Zhang and
Chao Yang and
Zhaoyan Xu and
Guofei Gu PoisonAmplifier: a Guided Approach of
Discovering Compromised Websites through
Reversing Search Poisoning Attacks . . . 230--253
Sebastian Lekies and
Nick Nikiforakis and
Walter Tighzert and
Frank Piessens and
Martin Johns DEMACRO: Defense against Malicious
Cross-Domain Requests . . . . . . . . . 254--273
Timon Van Overveldt and
Christopher Kruegel and
Giovanni Vigna FlashDetect: ActionScript 3 Malware
Detection . . . . . . . . . . . . . . . 274--293
Jie Chu and
Zihui Ge and
Richard Huber and
Ping Ji and
Jennifer Yates and
Yung-Chao Yu ALERT-ID: Analyze Logs of the Network
Element in Real Time for Intrusion
Detection . . . . . . . . . . . . . . . 294--313
Bernhard Amann and
Robin Sommer and
Aashish Sharma and
Seth Hall A Lone Wolf No More: Supporting Network
Intrusion Detection with Real-Time
Intelligence . . . . . . . . . . . . . . 314--333
Victor C. Valgenti and
Jatin Chhugani and
Yan Sun and
Nadathur Satish and
Min Sik Kim and
Changkyu Kim GPP-Grep: High-Speed Regular Expression
Processing Engine on General Purpose
Processors . . . . . . . . . . . . . . . 334--353
Dina Had\vziosmanovi\'c and
Lorenzo Simionato and
Damiano Bolzoni and
Emmanuele Zambon $N$-Gram against the Machine: On the
Feasibility of the $N$-Gram Network
Analysis for Binary Protocols . . . . . 354--373
Shah Mahmood and
Yvo Desmedt Online Social Networks, a Criminals
Multipurpose Toolbox (Poster Abstract) 374--375
Cui Xiang and
Shi Jinqiao and
Liao Peng and
Liu Chaoge The Triple-Channel Model: Toward Robust
and Efficient Advanced Botnets (Poster
Abstract) . . . . . . . . . . . . . . . 376--377
Anonymous Front Matter . . . . . . . . . . . . . . ??
Alper Aydemir and
Erik Järleberg and
Samuel Prentice and
Patric Jensfelt Predicting What Lies Ahead in the
Topology of Indoor Environments . . . . 1--16
Zoltan-Csaba Marton and
Ferenc Balint-Benczedi and
Florian Seidel Object Categorization in Clutter Using
Additive Features and Hashing of
Part-Graph Descriptors . . . . . . . . . 17--33
Richard Bormann and
Jan Fischer and
Georg Arbeiter and
Alexander Verl Efficient Object Categorization with the
Surface-Approximation Polynomials
Descriptor . . . . . . . . . . . . . . . 34--53
Nikos Mitsou and
Roderick de Nijs and
David Lenz and
Johannes Frimberger Online Semantic Mapping of Urban
Environments . . . . . . . . . . . . . . 54--73
Torsten Fiolka and
Jörg Stückler and
Dominik A. Klein and
Dirk Schulz SURE: Surface Entropy for Distinctive
$3$D Features . . . . . . . . . . . . . 74--93
Paloma de la Puente and
Andrea Censi Dense Map Inference with User-Defined
Priors: From Priorlets to Scan
Eigenvariations . . . . . . . . . . . . 94--113
Georg Arbeiter and
Richard Bormann and
Jan Fischer and
Martin Hägele Towards Geometric Mapping for
Semi-autonomous Mobile Robots . . . . . 114--127
Christoph Hertzberg and
René Wagner and
Udo Frese Tutorial on Quick and Easy Model Fitting
Using the SLoM Framework . . . . . . . . 128--142
Bernhard E. Riecke Are Left-Right Hemisphere Errors in
Point-to-Origin Tasks in VR Caused by
Failure to Incorporate Heading Changes? 143--162
Nicholas A. Giudice and
Hengshan Li The Effects of Visual Granularity on
Indoor Spatial Learning Assisted by
Mobile $3$D Information Displays . . . . 163--172
Stefanie Pietsch and
Petra Jansen The Relationship between Coordination
Skill and Mental Rotation Ability . . . 173--181
Alexia Galati and
Marios N. Avraamides Collaborating in Spatial Tasks: Partners
Adapt the Perspective of Their
Descriptions, Coordination Strategies,
and Memory Representations . . . . . . . 182--195
Linsey A. Smith and
Dedre Gentner Using Spatial Analogy to Facilitate
Graph Learning . . . . . . . . . . . . . 196--209
Eva Neidhardt and
Michael Popp Activity Effects on Path Integration
Tasks for Children in Different
Environments . . . . . . . . . . . . . . 210--219
Sarah Neuburger and
Vera Heuser and
Petra Jansen and
Claudia Quaiser-Pohl Influence of Rotational Axis and
Gender-Stereotypical Nature of Rotation
Stimuli on the Mental-Rotation
Performance of Male and Female Fifth
Graders . . . . . . . . . . . . . . . . 220--229
Sander Lestrade and
Nina Reshöft Towards a Revision of the Typology of
Motion Verbs . . . . . . . . . . . . . . 230--241
Alexander Klippel and
Jinlong Yang and
Jan Oliver Wallgrün and
Frank Dylla Assessing Similarities of Qualitative
Spatio-temporal Relations . . . . . . . 242--261
Chiara Meneghetti and
Francesca Pazzaglia and
Rossana De Beni The Mental Representation Derived from
Spatial Descriptions is North-Up
Oriented: The Role of Visuo-spatial
Abilities . . . . . . . . . . . . . . . 262--278
Thora Tenbrink and
Marco Ragni Linguistic Principles for Spatial
Relational Reasoning . . . . . . . . . . 279--298
Kris Lohmann and
Christopher Habel Extended Verbal Assistance Facilitates
Knowledge Acquisition of Virtual Tactile
Maps . . . . . . . . . . . . . . . . . . 299--318
Anonymous Front Matter . . . . . . . . . . . . . . ??
Georg Gottlob and
Marco Manna and
Michael Morak On the Complexity of Ontological
Reasoning under Disjunctive Existential
Rules . . . . . . . . . . . . . . . . . 1--18
Christian Komusiewicz New Races in Parameterized Algorithmics 19--30
Antonino Salibra Scott Is Always Simple . . . . . . . . . 31--45
Nicole Schweikardt A Toolkit for Proving Limitations of the
Expressive Power of Logics . . . . . . . 46--47
Esko Ukkonen How to Reconstruct a Genome . . . . . . 48--48
Igor Walukiewicz Simple Models for Recursive Schemes . . 49--60
Gerhard J. Woeginger Transportation under Nasty Side
Constraints . . . . . . . . . . . . . . 61--62
Mihalis Yannakakis Computation of Least Fixed Points . . . 63--63
Lauri Ahlroth and
Pekka Orponen Unordered Constraint Satisfaction Games 64--75
Tatsuya Akutsu and
Takeyuki Tamura A Polynomial-Time Algorithm for
Computing the Maximum Common Subgraph of
Outerplanar Graphs of Bounded Degree . . 76--87
Eric Allender and
Harry Buhrman and
Luke Friedman Reductions to the Set of Random Strings:
The Resource-Bounded Case . . . . . . . 88--99
Vikraman Arvind and
Johannes Köbler Approximate Graph Isomorphism . . . . . 100--111
Vikraman Arvind and
Partha Mukhopadhyay Near-Optimal Expanding Generator Sets
for Solvable Permutation Groups . . . . 112--123
Eugene Asarin and
Nicolas Basset Generating Functions of Timed Languages 124--135
Cristina Bazgan and
Morgan Chopin The Robust Set Problem: Parameterized
Complexity and Approximation . . . . . . 136--147
Paul C. Bell and
Mika Hirvensalo and
Igor Potapov Mortality for $2 \times 2$ Matrices Is
NP-Hard . . . . . . . . . . . . . . . . 148--159
Dietmar Berwanger and
\Lukasz Kaiser Solving Counter Parity Games . . . . . . 160--171
Therese Biedl and
Peter Floderus Drawing Planar Graphs on Points Inside a
Polygon . . . . . . . . . . . . . . . . 172--183
Davide Bil\`o and
Anna Zych New Advances in Reoptimizing the Minimum
Steiner Tree Problem . . . . . . . . . . 184--197
Markus Bläser and
Bodo Manthey Smoothed Complexity Theory . . . . . . . 198--209
Anonymous Front Matter . . . . . . . . . . . . . . ??
Kristian Beckers and
Stefan Eicker and
Stephan Faßbender and
Maritta Heisel and
Holger Schmidt Ontology-Based Identification of
Research Gaps and Immature Research
Areas . . . . . . . . . . . . . . . . . 1--16
Gerald Bader and
Amin Anjomshoaa and
A. Min Tjoa A Context-Aware Mashup Integration
Guideline for Enterprise 2.0 . . . . . . 17--30
Mostafa Kiani Deh Kiani and
Barat Ghobadian and
Fathollah Ommi and
Gholamhassan Najafi Artificial Neural Networks Approach for
the Prediction of Thermal Balance of SI
Engine Using Ethanol-Gasoline Blends . . 31--43
Jesús M. Almendros-Jiménez Validation of XML Documents with SWRL 44--57
Theresia Gschwandtner and
Johannes Gärtner and
Wolfgang Aigner and
Silvia Miksch A Taxonomy of Dirty Time-Oriented Data 58--72
Marius Ebel and
Martin Hulin Combining Relational and Semi-structured
Databases for an Inquiry Application . . 73--84
Martin Gilje Jaatun Hunting for Aardvarks: Can Software
Security Be Measured? . . . . . . . . . 85--92
Kristian Beckers and
Maritta Heisel A Foundation for Requirements Analysis
of Privacy Preserving Software . . . . . 93--107
Andreas Holzinger and
Evgenia Popova and
Bernhard Peischl and
Martina Ziefle On Complexity Reduction of User
Interfaces for Safety-Critical Systems 108--122
Martin Gilje Jaatun and
Karin Bernsmed and
Astrid Undheim Security SLAs --- An Idea Whose Time Has
Come? . . . . . . . . . . . . . . . . . 123--130
Aneta Poniszewska-Maranda UML Representation of Extended
Role-Based Access Control Model with the
Use of Usage Control Concept . . . . . . 131--145
Eckehard Hermann and
Udo Litschauer and
Jürgen Fuß A Formal Equivalence Classes Based
Method for Security Policy Conformance
Checking . . . . . . . . . . . . . . . . 146--160
Tanja A\vzderska and
Borka Jerman Bla\vzi\vc Trust as an Organismic Trait of
E-Commerce Systems . . . . . . . . . . . 161--175
Andreas Holzinger and
Peter Treitler and
Wolfgang Slany Making Apps Useable on Multiple
Different Mobile Platforms: On
Interoperability for Business
Application Development on Smartphones 176--189
Mersini Paschou and
Evangelos Sakkopoulos and
Efrosini Sourla and
Athanasios Tsakalidis Enhancing Business APPification Using
SMS Text Messages: Metrics, Strategies
and Alternatives . . . . . . . . . . . . 190--202
Daniele Montanari and
Piera Laura Puglisi Near Duplicate Document Detection for
Large Information Flows . . . . . . . . 203--217
Pedro Furtado TinyStream Sensors . . . . . . . . . . . 218--232
Hiroshi Sato and
Hisashi Kurasawa and
Takeru Inoue and
Motonori Nakamura and
Hajime Matsumura Distributed Sampling Storage for
Statistical Analysis of Massive Sensor
Data . . . . . . . . . . . . . . . . . . 233--243
Rachid Aknouche and
Ounas Asfari and
Fadila Bentayeb and
Omar Boussaid Integrating Query Context and User
Context in an Information Retrieval
Model Based on Expanded Language
Modeling . . . . . . . . . . . . . . . . 244--258
Guang-Ho Cha Indexing and Search for Fast Music
Identification . . . . . . . . . . . . . 259--271
Anonymous Front Matter . . . . . . . . . . . . . . ??
Klaus-Dieter Althoff Case-Based Reasoning and Expert Systems 1--1
Yolanda Gil Reproducibility and Efficiency of
Scientific Data Analysis: Scientific
Workflows and Case-Based Reasoning . . . 2--2
Mobyen Uddin Ahmed and
Peter Funk A Computer Aided System for
Post-operative Pain Treatment Combining
Knowledge Discovery and Case-Based
Reasoning . . . . . . . . . . . . . . . 3--16
Kerstin Bach and
Klaus-Dieter Althoff Developing Case-Based Reasoning
Applications Using myCBR 3 . . . . . . . 17--31
Alexandra Coman and
Héctor Muñoz-Avila Diverse Plan Generation by Plan
Adaptation and by First-Principles
Planning: a Comparative Study . . . . . 32--46
Sebastian Dieterle and
Ralph Bergmann Case-Based Appraisal of Internet Domains 47--61
Ruihai Dong and
Markus Schaal Harnessing the Experience Web to Support
User-Generated Product Reviews . . . . . 62--76
Valmi Dufour-Lussier and
Florence Le Ber Adapting Spatial and Temporal Cases . . 77--91
Gonzalo Flórez-Puga and
Guillermo Jiménez-Díaz eCo: Managing a Library of Reusable
Behaviours . . . . . . . . . . . . . . . 92--106
Odd Erik Gundersen Toward Measuring the Similarity of
Complex Event Sequences in Real-Time . . 107--121
Mario Gómez and
Enric Plaza Case-Based Project Scheduling . . . . . 122--136
Julien Henriet and
Pierre-Emmanuel Leni Adapting Numerical Representations of
Lung Contours Using Case-Based Reasoning
and Artificial Neural Networks . . . . . 137--151
Barry Hurley and
Barry O'Sullivan Adaptation in a CBR-Based Solver
Portfolio for the Satisfiability Problem 152--166
Rupa Jagannathan and
Sanja Petrovic A Local Rule-Based Attribute Weighting
Scheme for a Case-Based Reasoning System
for Radiotherapy Treatment Planning . . 167--181
Ulit Jaidee and
Héctor Muñoz-Avila Learning and Reusing Goal-Specific
Policies for Goal-Driven Autonomy . . . 182--195
Vahid Jalali and
David Leake Custom Accessibility-Based CCBR Question
Selection by Ongoing User Classification 196--210
Debarun Kar and
Sutanu Chakraborti Feature Weighting and Confidence Based
Prediction for Case Based Reasoning
Systems . . . . . . . . . . . . . . . . 211--225
Sergio Manzano and
Santiago Ontañón A Case-Based Approach to Mutual
Adaptation of Taxonomic Ontologies . . . 226--240
David McSherry A Lazy Learning Approach to Explaining
Case-Based Reasoning Solutions . . . . . 241--254
Mirjam Minor and
Mohd. Siblee Islam Confidence in Workflow Adaptation . . . 255--268
Anonymous Front Matter . . . . . . . . . . . . . . ??
Jean-Paul A. Barth\`es and
Alistair Jones Ambiguity in Multimodal Interaction with
Multi-touch Multi-user Graphics Tables 1--13
Davide Gazz\`e and
Mariantonietta N. La Polla WorkMail: Collaborative Document
Workflow Management by Email . . . . . . 14--23
Jang Ho Lee Real-Time Mobile Distance Learning
System for Smartphone . . . . . . . . . 24--32
Takashi Aruga and
Nobuyoshi Yabuki Cooperative Information Management of
Degradation of Structures in Operation
and Management . . . . . . . . . . . . . 33--40
Aaron Costin and
Nipesh Pradhananga Real-Time Resource Location Tracking in
Building Information Models (BIM) . . . 41--48
Nobuyoshi Yabuki and
Yuta Ashida Cooperative Integration of Product Model
and Sensor Data Model for Knowledge
Discovery . . . . . . . . . . . . . . . 49--52
Wojciech Indyk and
Tomasz Kajdanowicz Cooperative Decision Making Algorithm
for Large Networks Using MapReduce
Programming Model . . . . . . . . . . . 53--56
Navid Ahmadi and
Mehdi Jazayeri and
Monica Landoni Enabling Cooperative Educational Game
Design on the Web . . . . . . . . . . . 57--64
Mikhail Fominykh Learning Computer-Mediated Cooperation
in $3$D Visualization Projects . . . . . 65--72
Sven Ubik and
Ji\vrí Navrátil and
Petr \vZejdl Real-Time Stereoscopic Streaming of
Medical Surgeries for Collaborative
eLearning . . . . . . . . . . . . . . . 73--77
Hugo Sereno Ferreira and
Tiago Boldt Sousa Scalable Integration of Multiple Health
Sensor Data for Observing Medical
Patterns . . . . . . . . . . . . . . . . 78--84
Miguel Garcia and
Diana Bri and
Jaime Lloret Collaborating Using Intergroup
Communications in Group-Based Wireless
Sensor Networks: Another Way for Saving
Energy . . . . . . . . . . . . . . . . . 85--93
Cong Chen and
Kang Zhang and
Takayuki Itoh Empirical Evidence of Tags Supporting
High-Level Awareness . . . . . . . . . . 94--101
Sylvia Encheva Rough Sets Methods for Working with
Uncertainty . . . . . . . . . . . . . . 102--109
Sylvia Encheva and
Sharil Tumin Project Proposals Ranking Based on
Closed Sets Properties . . . . . . . . . 110--113
Catherine Elsen and
Françoise Darses What Do Strokes Teach Us about
Collaborative Design? . . . . . . . . . 114--125
Ingeun Yi and
Seongki Lee and
Sunyoung Jang Communication between Physical and
Virtual Models in Designing Smart
Buildings . . . . . . . . . . . . . . . 126--133
Yanwei Zhao and
Huan Wang and
Huanhuan Hong Cased-Based Reasoning Based on Extension
Theory for Conflict Resolution in
Cooperative Design . . . . . . . . . . . 134--142
Sushardjanti Felasari and
Chengzhi Peng The Role of a City's Collective Memory
in Supporting Cooperative Urban Design
Learning . . . . . . . . . . . . . . . . 143--150
Marina Z. Solesvik and
Tatiana Iakovleva Simulation and Optimization in
Collaborative Ship Design: Innovative
Approach . . . . . . . . . . . . . . . . 151--154
Anonymous Front Matter . . . . . . . . . . . . . . ??
David McGookin and
Stephen A. Brewster Understanding Auditory Navigation to
Physical Landmarks . . . . . . . . . . . 1--10
Emma Murphy and
Camille Moussette and
Charles Verron and
Catherine Guastavino Supporting Sounds: Design and Evaluation
of an Audio-Haptic Interface . . . . . . 11--20
Junlei Yu and
Christopher Habel A Haptic-Audio Interface for Acquiring
Spatial Knowledge about Apartments . . . 21--30
David Cuartielles and
Andreas Göransson and
Tony Olsson and
Ståle Stenslie Mobile Haptic Technology Development
through Artistic Exploration . . . . . . 31--40
Dominik Bial and
Thorsten Appelmann and
Enrico Rukzio and
Albrecht Schmidt Improving Cyclists Training with Tactile
Feedback on Feet . . . . . . . . . . . . 41--50
Janko Timmermann and
Benjamin Poppinga and
Susanne Boll and
Wilko Heuten HapticPulse --- Reveal Your Heart Rate
in Physical Activities . . . . . . . . . 51--60
Niels C. Nilsson and
Rolf Nordahl and
Luca Turchet and
Stefania Serafin Audio-Haptic Simulation of Walking on
Virtual Ground Surfaces to Enhance
Realism . . . . . . . . . . . . . . . . 61--70
Johan Kildal Interacting with Deformable User
Interfaces: Effect of Material Stiffness
and Type of Deformation Gesture . . . . 71--80
Karljohan Lundin Palmerius and
Gunnar Höst and
Konrad Schönborn An Interactive and Multi-sensory
Learning Environment for Nano Education 81--90
Martin Halvey and
Michael Henderson and
Stephen A. Brewster and
Graham Wilson and
Stephen A. Hughes Augmenting Media with Thermal
Stimulation . . . . . . . . . . . . . . 91--100
Koray Tahiro\uglu and
Johan Kildal and
Teemu Ahmaniemi and
Simon Overstall and
Valtteri Wikström Embodied Interactions with Audio-Tactile
Virtual Objects in AHNE . . . . . . . . 101--110
Benjamin Poppinga and
Martin Pielot and
Wilko Heuten and
Susanne Boll Towards an Objective Comparison of
Scanning-Based Interaction Techniques 111--120
M. Ercan Altinsoy Knocking Sound as Quality Sign for
Household Appliances and the Evaluation
of the Audio-Haptic Interaction . . . . 121--130
Lorenzo Picinali and
Christopher Feakes and
Davide A. Mauro and
Brian F. G. Katz Spectral Discrimination Thresholds
Comparing Audio and Haptics for Complex
Stimuli . . . . . . . . . . . . . . . . 131--140
Trevor Hogan and
Eva Hornecker How Does Representation Modality Affect
User-Experience of Data Artifacts? . . . 141--151
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Oleksiy Mazhelis and
Eetu Luoma and
Henna Warma Defining an Internet-of-Things Ecosystem 1--14
Seppo Leminen and
Mika Westerlund and
Mervi Rajahonka and
Riikka Siuruainen Towards IOT Ecosystems and Business
Models . . . . . . . . . . . . . . . . . 15--26
Andrej Kos and
Damijan Pristov and
Urban Sedlar and
Janez Sterle and
Mojca Volk and
Toma\vz Vidonja Open and Scalable IoT Platform and Its
Applications for Real Time Access Line
Monitoring and Alarm Correlation . . . . 27--38
Konstantinos Kotis and
Artem Katasonov and
Jarkko Leino Aligning Smart and Control Entities in
the IoT . . . . . . . . . . . . . . . . 39--50
Andrey Boytsov and
Arkady Zaslavsky and
Zahraa Abdallah Where Have You Been? Using Location
Clustering and Context Awareness to
Understand Places of Interest . . . . . 51--62
Dmitry Namiot and
Manfred Sneps-Sneppe Where Are They Now --- Safe Location
Sharing . . . . . . . . . . . . . . . . 63--74
Ekaterina Dashkova and
Andrei Gurtov Survey on Congestion Control Mechanisms
for Wireless Sensor Networks . . . . . . 75--85
Vitaly Petrov and
Sergey Andreev and
Andrey Turlikov and
Yevgeni Koucheryavy On IEEE 802.16m Overload Control for
Smart Grid Deployments . . . . . . . . . 86--94
Abdelrahman Abuarqoub and
Mohammad Hammoudeh and
Tariq Alsboui An Overview of Information Extraction
from Mobile Wireless Sensor Networks . . 95--106
Mohammadali Heidari Jozam and
Erfaneh Allameh and
Bauke De Vries and
Harry Timmermans VR-Smart Home . . . . . . . . . . . . . 107--118
Oscar Rodríguez Rocha and
Luis Javier Suarez-Meza and
Boris Moltchanov Smart Space Governing through Service
Mashups . . . . . . . . . . . . . . . . 119--127
Yury Korolev and
Dmitry Korzun and
Ivan Galov Smart Space Applications Integration: a
Mediation Formalism and Design for
Smart-M3 . . . . . . . . . . . . . . . . 128--139
Alexander Smirnov and
Nikolay Shilov and
Alexey Kashevnik and
Nikolay Teslya Smart Logistic Service for Dynamic
Ridesharing . . . . . . . . . . . . . . 140--151
Yves Vanrompay and
Yolande Berbers A Methodological Approach to Quality of
Future Context for Proactive Smart
Systems . . . . . . . . . . . . . . . . 152--163
Natan Blaunstein and
Michael Borisovich Sergeev Integration of Advanced LTE Technology
and MIMO Network Based on Adaptive
Multi-beam Antennas . . . . . . . . . . 164--173
Alexey Khoryaev and
Mikhail Shilov and
Sergey Panteleev and
Andrey Chervyakov and
Artyom Lomayev Feasibility Analysis of Dynamic
Adjustment of TDD Configurations in
Macro-Femto Heterogeneous LTE Networks 174--185
Mikhail Gerasimenko and
Sergey Andreev and
Yevgeni Koucheryavy and
Alexey Trushanin Performance Comparison of System Level
Simulators for 3GPP LTE Uplink . . . . . 186--197
Dmitry Petrov and
Ilmari Repo and
Marko Lampinen Performance of Multiflow Aggregation
Scheme for HSDPA with Joint Intra-site
Scheduling and in Presence of CQI
Imperfections . . . . . . . . . . . . . 198--207
Irina A. Gudkova and
Konstantin E. Samouylov Modelling a Radio Admission Control
Scheme for Video Telephony Service in
Wireless Networks . . . . . . . . . . . 208--215
Wei Liu and
Yueyun Chen and
Yudong Yao Multi-point Cooperative Fountain Codes
Multicast for LTE Cellular System . . . 216--224
Anonymous Front Matter . . . . . . . . . . . . . . ??
Nate Foster and
Kazutaka Matsuda and
Janis Voigtländer Three Complementary Approaches to
Bidirectional Programming . . . . . . . 1--46
Ralf Hinze Generic Programming with Adjunctions . . 47--129
Oleg Kiselyov Typed Tagless Final Interpreters . . . . 130--174
Jeremy G. Siek The C++0x ``Concepts'' Effort . . . . . 175--216
Stephanie Weirich and
Chris Casinghino Generic Programming with Dependent Types 217--258
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Surangika Ranathunga and
Stephen Cranefield Interfacing a Cognitive Agent Platform
with Second Life . . . . . . . . . . . . 1--21
Joost van Oijen and
Lo\"\is Vanhée and
Frank Dignum CIGA: a Middleware for Intelligent
Agents in Virtual Environments . . . . . 22--37
Jakub Gemrot and
Cyril Brom and
Joanna Bryson How to Compare Usability of Techniques
for the Specification of Virtual Agents'
Behavior? An Experimental Pilot Study
with Human Subjects . . . . . . . . . . 38--62
Edward Chao-Chun Kao and
Von-Wun Soo Dialog Designs in Virtual Drama:
Balancing Agency and Scripted Dialogs 63--78
Yundong Cai and
Zhiqi Shen Learning by Playing in Agent-Oriented
Virtual Learning Environment . . . . . . 79--93
Takeo Tsukamoto and
Yumi Muroya Collection and Analysis of Multimodal
Interaction in Direction-Giving
Dialogues: Towards an Automatic Gesture
Selection Mechanism for Metaverse
Avatars . . . . . . . . . . . . . . . . 94--105
Joost Westra and
Frank Dignum and
Virginia Dignum Organizing Scalable Adaptation in
Serious Games . . . . . . . . . . . . . 106--122
Alex Yu-Hung Chien and
Von-Wun Soo Inferring Pragmatics from Dialogue
Contexts in Simulated Virtual Agent
Games . . . . . . . . . . . . . . . . . 123--138
Sergio Alvarez-Napagao Socially-Aware Emergent Narrative . . . 139--150
Michael Wißner and
Wouter Beek and
Esther Lozano Increasing Learners' Motivation through
Pedagogical Agents: The Cast of Virtual
Characters in the DynaLearn ILE . . . . 151--165
Meirav Hadad and
Avi Rosenfeld ADAPT: Abstraction Hierarchies to Better
Simulate Teamwork under Dynamics . . . . 166--182
Sabrina Campano and
Etienne de Sevin An Architecture for Affective Behaviour
Based on the Conservation of Resources 183--194
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Jiliang Tang and
Xufei Wang and
Huan Liu Integrating Social Media Data for
Community Detection . . . . . . . . . . 1--20
Martin Atzmueller and
Stephan Doerfel Face-to-Face Contacts at a Conference:
Dynamics of Communities and Roles . . . 21--39
Philipp Singer and
Claudia Wagner Factors Influencing the Co-evolution of
Social and Content Networks in Online
Social Media . . . . . . . . . . . . . . 40--59
Ursula Redmond and
Martin Harrigan Mining Dense Structures to Uncover
Anomalous Behaviour in Financial Network
Data . . . . . . . . . . . . . . . . . . 60--76
Florian Lemmerich and
Martin Atzmueller Describing Locations Using Tags and
Images: Explorative Pattern Mining in
Social Media . . . . . . . . . . . . . . 77--96
Annalisa Appice and
Michelangelo Ceci Learning and Transferring Geographically
Weighted Regression Trees across Time 97--117
Pietro Guccione and
Annalisa Appice Trend Cluster Based Kriging
Interpolation in Sensor Data Networks 118--137
Else Nygren Simulation of User Participation and
Interaction in Online Discussion Groups 138--157
Ricardo Tesoriero and
Mohamed Bourimi Model-Driven Privacy and Security in
Multi-modal Social Media UIs . . . . . . 158--181
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Shan Jianfang and
Liu Zongtian A Novel Event Network Matching Algorithm 1--14
Kunpeng Jiang and
Huifang Guo and
Shengping Zhu and
Julong Lan Static Patterns Matching for High Speed
Networks . . . . . . . . . . . . . . . . 15--22
Niu Li and
Han Xiaoting Information Propagation in Online Social
Networks Based on User Behavior . . . . 23--30
Xin Li and
Yue-fang Yang Research on Operation and Management of
Railway Transport of Dangerous Goods in
Third-Party Logistics Enterprises . . . 31--36
Jing Shen and
Yusong Du A Password Authentication Scheme against
Smart Card Security Breach . . . . . . . 37--44
Bo Han and
Qing Wang and
Fajiang Yu and
Xianda Zhang A Vulnerability Attack Graph Generation
Method Based on Scripts . . . . . . . . 45--50
Zailani Abdullah and
Tutut Herawan and
A. Noraziah and
Mustafa Mat Deris DFP-Growth: An Efficient Algorithm for
Mining Frequent Patterns in Dynamic
Database . . . . . . . . . . . . . . . . 51--58
Xizhe Zhang and
Guolong Zhao and
Tianyang Lv and
Ying Yin and
Bin Zhang Analysis on Key Nodes Behavior for
Complex Software Network . . . . . . . . 59--66
Junling Ren and
Li Zhang Webpage Information Hiding Algorithm
Based on Integration of Tags and Data 67--74
Wei Zhu and
Ping Sun and
Ying nan Ma and
Rui Song and
Shi wei He and
Ke Hui Liu Location Method of Underground Pipeline
Monitoring Point Based on Cavity
Detection . . . . . . . . . . . . . . . 75--81
Qichun Zhong and
Jinghong Hu Research on Purified Internet
Environment for College Students . . . . 82--87
Qianmu Li and
Qiugan Shi and
Jun Hou and
Yong Qi and
Hong Zhang A Mobile-Certificate Security Method of
Satellite-Earth Integration Networks . . 88--97
Wen-Hsing Lai and
Siou-Lin Wang Duration Modeling for Emotional Speech 98--103
Hongwei Zhao and
Xiao Chen and
Wei Huang and
Pingping Liu and
Lingjiao Ma Research on Image Retrieval Based on
Color and Shape Features . . . . . . . . 104--111
Kaihua Wang and
Wenxiang Zhang and
Zhanji Gui Existence and Simulations of Periodic
Solution for Impulsive Predator-Prey
System with Stage Structure for the
Predator . . . . . . . . . . . . . . . . 112--119
Yan Yan and
Kaihua Wang and
Zhanji Gui Dynamics and Simulations of
Multi-species Competition-Predator
System with Impulsive . . . . . . . . . 120--127
Ying Chen and
Shaobai Zhang Research on the Distal Supervised
Learning Model of Speech Inversion . . . 128--135
Ruei-Chang Chen and
Shih-Fong Lee and
Yeong-Chau Kuo Low Power Pulse Width Modulation Design
for Class D Audio Amplifier Systems . . 136--143
Guan Wei and
Lv Yuanhai A New Logic Method for Education
Resource Software Guarantee . . . . . . 144--151
Zhenjie Hou and
Junsheng Huang and
Jianhua Zhang Research on $3$D Object Rounding
Photography Systems and Technology . . . 152--158
Anonymous Front Matter . . . . . . . . . . . . . . ??
Laura Leal-Taixé and
Gerard Pons-Moll Exploiting Pedestrian Interaction via
Global Optimization and Social Behaviors 1--26
Nicolai Schneider and
Stefan Gehrig An Evaluation Framework for Stereo-Based
Driver Assistance . . . . . . . . . . . 27--51
Sandino Morales and
Simon Hermann Real-World Stereo-Analysis Evaluation 52--77
Yoshihiko Mochizuki and
Atsushi Imiya Pyramid Transform and Scale-Space
Analysis in Image Analysis . . . . . . . 78--109
Ralf Dragon and
Michele Fenzi and
Wolf Siberski Towards Feature-Based Situation
Assessment for Airport Apron Video
Surveillance . . . . . . . . . . . . . . 110--130
Yong-Dian Jian and
Doru C. Balcan Generalized Subgraph Preconditioners for
Large-Scale Bundle Adjustment . . . . . 131--150
Ioannis Brilakis and
Fei Dai Achievements and Challenges in
Recognizing and Reconstructing Civil
Infrastructure . . . . . . . . . . . . . 151--176
Dan Raviv and
Alexander M. Bronstein Equi-affine Invariant Geometries of
Articulated Objects . . . . . . . . . . 177--190
Torsten Sattler and
Bastian Leibe and
Leif Kobbelt Towards Fast Image-Based Localization on
a City-Scale . . . . . . . . . . . . . . 191--211
Anne Sedlazeck and
Reinhard Koch Perspective and Non-perspective Camera
Models in Underwater Imaging ---
Overview and Error Analysis . . . . . . 212--242
Juergen Gall and
Nima Razavi An Introduction to Random Forests for
Multi-class Object Detection . . . . . . 243--263
Jan D. Wegner and
Bodo Rosenhahn and
Uwe Sörgel Segmentation and Classification of
Objects with Implicit Scene Context . . 264--284
Helmut Mayer and
Jan Bartelsen Dense $3$D Reconstruction from Wide
Baseline Image Sets . . . . . . . . . . 285--304
Gerard Pons-Moll and
Laura Leal-Taixé Data-Driven Manifolds for Outdoor Motion
Capture . . . . . . . . . . . . . . . . 305--328
Daniel Kondermann and
Steffen Abraham On Performance Analysis of Optical Flow
Algorithms . . . . . . . . . . . . . . . 329--355
Glen Debard and
Peter Karsmakers Camera-Based Fall Detection on Real
World Data . . . . . . . . . . . . . . . 356--375
Sid Yingze Bao and
Silvio Savarese Semantic Structure from Motion: a Novel
Framework for Joint Object Recognition
and $3$D Reconstruction . . . . . . . . 376--397
Ronny Klowsky and
Patrick Mücke Hierarchical Surface Reconstruction from
Multi-resolution Point Samples . . . . . 398--418
Ralf Reulke and
Dominik Rueß and
Kristian Manthey Traffic Observation and Situation
Assessment . . . . . . . . . . . . . . . 419--441
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Björn Fröhlich and
Erik Rodner and
Joachim Denzler As Time Goes by--- Anytime Semantic
Segmentation with Iterative Context
Forests . . . . . . . . . . . . . . . . 1--10
Georg Zankl and
Yll Haxhimusa and
Adrian Ion Interactive Labeling of Image
Segmentation Hierarchies . . . . . . . . 11--20
Naveen Shankar Nagaraja and
Peter Ochs and
Kun Liu and
Thomas Brox Hierarchy of Localized Random Forests
for Video Annotation . . . . . . . . . . 21--30
Coloma Ballester and
Lluis Garrido and
Vanel Lazcano and
Vicent Caselles A TV-L1 Optical Flow Method with
Occlusion Detection . . . . . . . . . . 31--40
Alexander Shekhovtsov and
Pushmeet Kohli and
Carsten Rother Curvature Prior for MRF-Based
Segmentation and Shape Inpainting . . . 41--51
Kevin Schelten and
Stefan Roth Mean Field for Continuous High-Order
MRFs . . . . . . . . . . . . . . . . . . 52--61
Qi Gao and
Stefan Roth How Well Do Filter-Based MRFs Model
Natural Images? . . . . . . . . . . . . 62--72
Christopher Schroers and
Henning Zimmer and
Levi Valgaerts and
Andrés Bruhn and
Oliver Demetz Anisotropic Range Image Integration . . 73--82
Thorsten Schmidt and
Margret Keuper and
Taras Pasternak and
Klaus Palme and
Olaf Ronneberger Modeling of Sparsely Sampled Tubular
Surfaces Using Coupled Curves . . . . . 83--92
Simon Winkelbach and
Jens Spehr and
Dirk Buchholz and
Markus Rilk and
Friedrich M. Wahl Shape (Self-)Similarity and
Dissimilarity Rating for Segmentation
and Matching . . . . . . . . . . . . . . 93--102
Benjamin Ummenhofer and
Thomas Brox Dense $3$D Reconstruction with a
Hand-Held Camera . . . . . . . . . . . . 103--112
Aitor Aldoma and
Federico Tombari and
Radu Bogdan Rusu and
Markus Vincze OUR-CVFH --- Oriented, Unique and
Repeatable Clustered Viewpoint Feature
Histogram for Object Recognition and
6DOF Pose Estimation . . . . . . . . . . 113--122
Michele Fenzi and
Ralf Dragon and
Laura Leal-Taixé and
Bodo Rosenhahn and
Jörn Ostermann $3$D Object Recognition and Pose
Estimation for Multiple Objects Using
Multi-Prioritized RANSAC and Model
Updating . . . . . . . . . . . . . . . . 123--133
Hakan Bilen and
Vinay P. Namboodiri and
Luc J. Van Gool Classification with Global, Local and
Shared Features . . . . . . . . . . . . 134--143
Thorsten Franzel and
Uwe Schmidt and
Stefan Roth Object Detection in Multi-view X-Ray
Images . . . . . . . . . . . . . . . . . 144--154
Ferdinand Hahmann and
Heike Ruppertshofen and
Gordon Böer and
Ralf Stannarius and
Hauke Schramm Eye Localization Using the
Discriminative Generalized Hough
Transform . . . . . . . . . . . . . . . 155--164
Andreas Rune Fugl and
Andreas Jordt and
Henrik Gordon Petersen and
Morten Willatzen Simultaneous Estimation of Material
Properties and Pose for Deformable
Objects from Depth and Color Images . . 165--174
Sebastian von Enzberg and
Bernd Michaelis Surface Quality Inspection of Deformable
Parts with Variable B-Spline Surfaces 175--184
Fabian Zach and
Christian Riess and
Elli Angelopoulou Automated Image Forgery Detection
through Classification of JPEG Ghosts 185--194
Martin Köstinger and
Peter M. Roth and
Horst Bischof Synergy-Based Learning of Facial
Identity . . . . . . . . . . . . . . . . 195--204
Anonymous Front Matter . . . . . . . . . . . . . . ??
Bassam Mokbel and
Sebastian Gross and
Markus Lux and
Niels Pinkwart and
Barbara Hammer How to Quantitatively Compare Data
Dissimilarities for Unsupervised Machine
Learning? . . . . . . . . . . . . . . . 1--13
Daniela Hofmann and
Barbara Hammer Kernel Robust Soft Learning Vector
Quantization . . . . . . . . . . . . . . 14--23
Davide Maltoni and
Erik M. Rehn Incremental Learning by Message Passing
in Hierarchical Temporal Memory . . . . 24--35
Ludwig Lausser and
Christoph Müssel and
Hans A. Kestler Representative Prototype Sets for Data
Characterization and Classification . . 36--47
Takashi Nagatani and
Shigeo Abe Feature Selection by Block Addition and
Block Deletion . . . . . . . . . . . . . 48--59
Michel Tokic and
Günther Palm Gradient Algorithms for
Exploration/Exploitation Trade-Offs:
Global and Local Variants . . . . . . . 60--71
Edmondo Trentin and
Marco Bongini Towards a Novel Probabilistic Graphical
Model of Sequential Data: Fundamental
Notions and a Solution to the Problem of
Parameter Learning . . . . . . . . . . . 72--81
Marco Bongini and
Edmondo Trentin Towards a Novel Probabilistic Graphical
Model of Sequential Data: a Solution to
the Problem of Structure Learning and an
Empirical Evaluation . . . . . . . . . . 82--92
Andrey V. Savchenko Statistical Recognition of a Set of
Patterns Using Novel Probability Neural
Network . . . . . . . . . . . . . . . . 93--103
Miriam Schmidt and
Günther Palm and
Friedhelm Schwenker On Graph-Associated Matrices and Their
Eigenvalues for Optical Character
Recognition . . . . . . . . . . . . . . 104--114
José Ricardo Gonçalves Manzan and
Shigueo Nomura and
Keiji Yamanaka Improving Iris Recognition through New
Target Vectors in MLP Artificial Neural
Networks . . . . . . . . . . . . . . . . 115--126
Antonio García-Manso and
Carlos J. García-Orellana and
Ramón Gallardo-Caballero Robustness of a CAD System on Digitized
Mammograms . . . . . . . . . . . . . . . 127--138
Kaushik Roy and
Mohamed S. Kamel Facial Expression Recognition Using Game
Theory . . . . . . . . . . . . . . . . . 139--150
Alessandro Zamberletti and
Ignazio Gallo and
Simone Albertini and
Marco Vanetti and
Angelo Nodari Classification of Segmented Objects
through a Multi-net Approach . . . . . . 151--162
Vasileios Korfiatis and
Simone Tassani and
George K. Matsopoulos A Decision Support System for the
Prediction of the Trabecular Fracture
Zone . . . . . . . . . . . . . . . . . . 163--174
Kelwin Fernandez and
Carolina Chang Teeth/Palate and Interdental
Segmentation Using Artificial Neural
Networks . . . . . . . . . . . . . . . . 175--185
Sascha Meudt and
Friedhelm Schwenker On Instance Selection in Audio Based
Emotion Recognition . . . . . . . . . . 186--192
Matthias Hillebrand and
Ulrich Kreßel and
Christian Wöhler and
Franz Kummert Traffic Sign Classifier Adaption by
Semi-supervised Co-training . . . . . . 193--200
Paul T. Pearson and
Cameron I. Cooper Using Self Organizing Maps to Analyze
Demographics and Swing State Voting in
the 2008 U.S. Presidential Election . . 201--212
Osvaldo de Souza and
Paulo César Cortez and
Francisco A. T. F. da Silva Grayscale Images and RGB Video:
Compression by Morphological Neural
Network . . . . . . . . . . . . . . . . 213--224
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Amin Abdalla and
Andrew U. Frank Combining Trip and Task Planning: How to
Get from A to Passport . . . . . . . . . 1--14
Chris Anderson-Tarver and
Mike Gleason and
Barbara Buttenfield Automated Centerline Delineation to
Enrich the National Hydrography Dataset 15--28
Kevin Buchin and
Bettina Speckmann and
Sander Verdonschot Evolution Strategies for Optimizing
Rectangular Cartograms . . . . . . . . . 29--42
Maike Buchin and
Somayeh Dodge and
Bettina Speckmann Context-Aware Similarity of Trajectories 43--56
Yao-Yi Chiang and
Craig A. Knoblock Generating Named Road Vector Data from
Raster Maps . . . . . . . . . . . . . . 57--71
Matthew P. Dube and
Max J. Egenhofer An Ordering of Convex Topological
Relations . . . . . . . . . . . . . . . 72--86
Julien Gaffuri Toward Web Mapping with Vector Data . . 87--101
Carsten Keßler and
Krzysztof Janowicz and
Tomi Kauppinen \tt spatial@linkedscience --- Exploring
the Research Field of GIScience with
Linked Data . . . . . . . . . . . . . . 102--115
Nicolas Maisonneuve and
Bastien Chopard Crowdsourcing Satellite Imagery
Analysis: Study of Parallel and
Iterative Models . . . . . . . . . . . . 116--131
Pradeep Mohan and
Xun Zhou and
Shashi Shekhar Quantifying Resolution Sensitivity of
Spatial Autocorrelation: a Resolution
Correlogram Approach . . . . . . . . . . 132--145
Silvia Nittel and
Christopher Dorr and
John C. Whittier LocalAlert: Simulating Decentralized
Ad-Hoc Collaboration in Emergency
Situations . . . . . . . . . . . . . . . 146--159
Avinash Rude and
Kate Beard High-Level Event Detection in Spatially
Distributed Time Series . . . . . . . . 160--172
Thiago Luís Lopes Siqueira Towards Vague Geographic Data Warehouses 173--186
Guibo Sun and
Hui Lin and
Rongrong Li Measuring the Influence of Built
Environment on Walking Behavior: An
Accessibility Approach . . . . . . . . . 187--197
Guillaume Touya Social Welfare to Assess the Global
Legibility of a Generalized Map . . . . 198--211
Jan Oliver Wallgrün and
Jinlong Yang and
Alexander Klippel Investigations into the Cognitive
Conceptualization and Similarity
Assessment of Spatial Scenes . . . . . . 212--225
Lisa A. Walton and
Michael Worboys A Qualitative Bigraph Model for Indoor
Space . . . . . . . . . . . . . . . . . 226--240
Toyohide Watanabe and
Kosuke Yamamoto Dynamic Refuse Collection Strategy Based
on Adjacency Relationship between Euler
Cycles . . . . . . . . . . . . . . . . . 241--257
Ting Wei and
Scott Bell Impact of Indoor Location Information
Reliability on Users' Trust of an Indoor
Positioning System . . . . . . . . . . . 258--269
Nancy Wiegand Ontology for the Engineering of
Geospatial Systems . . . . . . . . . . . 270--283
Anonymous Front Matter . . . . . . . . . . . . . . ??
Marco Porsch and
Thomas Bauschert A Testbed Analysis of the Effects of
IEEE 802.11s Power Save on Mesh Link
Performance . . . . . . . . . . . . . . 1--11
Muhammad Irfan Rafique and
Thomas Bauschert Path Selection and Adaptive Selection of
Smart Antenna Transmission Schemes in
Multi-hop Wireless Networks . . . . . . 12--22
Cristina Cano and
Boris Bellalta and
Miquel Oliver Receiver-Initiated vs. Short-Preamble
Burst MAC Approaches for Multi-channel
Wireless Sensor Networks . . . . . . . . 23--32
Albert Domingo and
Boris Bellalta and
Miquel Oliver White Spaces in UHF Band: Catalonia Case
Study and Impact of the Digital Dividend 33--40
Zahra Tavakoli and
Sebastian Meier and
Alexander Vensmer A Framework for Security Context
Migration in a Firewall Secured Virtual
Machine Environment . . . . . . . . . . 41--51
Zoltán Czirkos and
Gábor Hosszú Enhancing Collaborative Intrusion
Detection Methods Using a Kademlia
Overlay Network . . . . . . . . . . . . 52--63
Pavel \vCeleda and
Radek Krej\vcí and
Vojt\vech Krmí\vcek Flow-Based Security Issue Detection in
Building Automation and Control Networks 64--75
Gy\Hoz\Ho Gódor and
Sándor Imre Hash-Based Mutual Authentication
Protocol for Low-Cost RFID Systems . . . 76--87
Christiaan Ottow and
Frank van Vliet and
Pieter-Tjerk de Boer and
Aiko Pras The Impact of IPv6 on Penetration
Testing . . . . . . . . . . . . . . . . 88--99
Iyas Alloush and
Vanea Chiprianov and
Yvon Kermarrec and
Siegfried Rouvrais Linking Telecom Service High-Level
Abstract Models to Simulators Based on
Model Transformations: The IMS Case
Study . . . . . . . . . . . . . . . . . 100--111
Stefan Türk and
Ying Liu and
Rico Radeke and
Ralf Lehnert Network Migration Optimization Using
Genetic Algorithms . . . . . . . . . . . 112--123
Patcharee Thongtra and
Finn Arve Aagesen and
Kornschnok Dittawit OWL-Based Node Capability Parameter
Configuration . . . . . . . . . . . . . 124--135
Konrad Walczyk and
Annie Gravey Techno-Economic Comparison of
Next-Generation Access Networks for the
French Market . . . . . . . . . . . . . 136--147
Christos Tsiaras and
Martin Waldburger and
Guilherme Sperb Machado and
Andrei Vancea The Design of a Single Funding Point
Charging Architecture . . . . . . . . . 148--160
Volker Richter and
Rico Radeke and
Ralf Lehnert A Two Layer Guaranteed and Sustained
Rate Based Scheduler for IEEE
802.16-2009 Based WiMAX Networks . . . . 161--172
Régel González Usach and
Mirja Kühlewind Implementation and Evaluation of Coupled
Congestion Control for Multipath TCP . . 173--182
Bjòrn J. Villa and
Poul E. Heegaard and
Anders Instefjord Improving Fairness for Adaptive HTTP
Video Streaming . . . . . . . . . . . . 183--193
Jakub Marsza\lkowski Prototype of High Performance Scalable
Advertising Server with Local Memory
Storage and Centralised Processing . . . 194--203
Mihály Orosz and
Gábor Hosszú Responsible Source Multicasting . . . . 204--214
Adrian Noguero and
Isidro Calvo and
Luis Almeida and
Unai Gangoiti A Model for System Resources in Flexible
Time-Triggered Middleware Architectures 215--226
Anonymous Front Matter . . . . . . . . . . . . . . ??
Wil M. P. van der Aalst A Decade of Business Process Management
Conferences: Personal Reflections on a
Developing Discipline . . . . . . . . . 1--16
Alejandro Buchmann and
Stefan Appel and
Tobias Freudenreich and
Sebastian Frischbier From Calls to Events: Architecting
Future BPM Systems . . . . . . . . . . . 17--32
Jan Claes and
Irene Vanderfeesten and
Hajo A. Reijers and
Jakob Pinggera and
Matthias Weidlich Tying Process Model Quality to the
Modeling Process: The Impact of
Structuring, Movement, and Speed . . . . 33--48
Jana Koehler and
Joerg Hofstetter and
Roland Woodtly Capabilities and Levels of Maturity in
IT-Based Case Management . . . . . . . . 49--64
Rami-Habib Eid-Sabbagh and
Remco Dijkman and
Mathias Weske Business Process Architecture: Use and
Correctness . . . . . . . . . . . . . . 65--81
Massimiliano de Leoni and
Fabrizio Maria Maggi and
Wil M. P. van der Aalst Aligning Event Logs and Declarative
Process Models for Conformance Checking 82--97
Jan Martijn E. M. van der Werf and
H. M. W. Verbeek and
Wil M. P. van der Aalst Context-Aware Compliance Checking . . . 98--113
Sebastian Banescu and
Milan Petkovi\'c and
Nicola Zannone Measuring Privacy Compliance Using
Fitness Metrics . . . . . . . . . . . . 114--119
Antonio Estruch and
José Antonio Heredia Álvaro Event-Driven Manufacturing Process
Management Approach . . . . . . . . . . 120--133
Stefano Tranquillini and
Patrik Spieß and
Florian Daniel and
Stamatis Karnouskos and
Fabio Casati Process-Based Design and Integration of
Wireless Sensor Network Applications . . 134--149
Ognjen Scekic and
Hong-Linh Truong and
Schahram Dustdar Modeling Rewards and Incentive
Mechanisms for Social BPM . . . . . . . 150--155
Cédric Favre and
Hagen Völzer The Difficulty of Replacing an Inclusive
OR-Join . . . . . . . . . . . . . . . . 156--171
Rafael Accorsi and
Andreas Lehmann Automatic Information Flow Analysis of
Business Process Models . . . . . . . . 172--187
Marian Benner and
Matthias Book and
Tobias Brückmann and
Volker Gruhn and
Thomas Richter Managing and Tracing the Traversal of
Process Clouds with Templates, Agendas
and Artifacts . . . . . . . . . . . . . 188--193
Mourad Amziani and
Tarek Melliti and
Samir Tata A Generic Framework for Service-Based
Business Process Elasticity in the Cloud 194--199
Juan Li and
Ross Jeffery and
Kam Hay Fung and
Liming Zhu and
Qing Wang and
He Zhang and
Xiwei Xu A Business Process-Driven Approach for
Requirements Dependency Analysis . . . . 200--215
David Martinho and
António Rito Silva A Recommendation Algorithm to Capture
End-Users' Tacit Knowledge . . . . . . . 216--222
Adela del-Río-Ortega and
Manuel Resinas Arias de Reyna and
Amador Durán Toro Defining Process Performance Indicators
by Using Templates and Patterns . . . . 223--228
Dirk Fahland and
Wil M. P. van der Aalst Repairing Process Models to Reflect
Reality . . . . . . . . . . . . . . . . 229--245
Zhiqiang Yan and
Remco Dijkman and
Paul Grefen FNet: An Index for Advanced Business
Process Querying . . . . . . . . . . . . 246--261
Anonymous Front Matter . . . . . . . . . . . . . . ??
Md. Sadim Mahmud and
Sylvia L. Osborn Tradeoff Analysis of Relational Database
Storage of Privacy Preferences . . . . . 1--13
Maryam Shoaran and
Alex Thomo and
Jens Weber Differential Privacy in Practice . . . . 14--24
Steven Euijong Whang and
Hector Garcia-Molina A Model for Quantifying Information
Leakage . . . . . . . . . . . . . . . . 25--44
Daniel Janusz and
Martin Kost and
Johann-Christoph Freytag Privacy Protocol for Linking Distributed
Medical Data . . . . . . . . . . . . . . 45--57
Wen Qiang Wang and
Dinh Tien Tuan Anh and
Hock Beng Lim and
Anwitaman Datta Cloud and the City: Facilitating
Flexible Access Control over
Data-Streams . . . . . . . . . . . . . . 58--74
Barbara Carminati and
Elena Ferrari and
Michele Guglielmi Policies for Composed Emergencies in
Support of Disaster Management . . . . . 75--92
Bijit Hore and
Ee-Chien Chang and
Mamadou H. Diallo and
Sharad Mehrotra Indexing Encrypted Documents for
Supporting Efficient Keyword Search . . 93--110
Chunwang Zhang and
Junjie Jin and
Ee-Chien Chang and
Sharad Mehrotra Secure Quasi-Realtime Collaborative
Editing over Low-Cost Storage Services 111--129
Stepan Kozak and
David Novak and
Pavel Zezula Secure Metric-Based Index for Similarity
Cloud . . . . . . . . . . . . . . . . . 130--147
Meghyn Bienvenu and
Daniel Deutch and
Fabian M. Suchanek Provenance for Web 2.0 Data . . . . . . 148--155
Sean Thorpe and
Tyrone Grandison and
Indrajit Ray and
Abbie Barbir Towards Enabling Behavioral Trust among
Participating Cloud Forensic Data Center
Agencies . . . . . . . . . . . . . . . . 156--161
Mina Deng and
Marco Nalin and
Milan Petkovi\'c and
Ilaria Baroni and
Abitabile Marco Towards Trustworthy Health Platform
Cloud . . . . . . . . . . . . . . . . . 162--175
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Manas Pathak and
Jose Portelo and
Bhiksha Raj and
Isabel Trancoso Privacy-Preserving Speaker
Authentication . . . . . . . . . . . . . 1--22
Florian Mendel and
Tomislav Nad and
Stefan Scherz and
Martin Schläffer Differential Attacks on Reduced
RIPEMD-160 . . . . . . . . . . . . . . . 23--38
Bogdan Groza and
Bogdan Warinschi Revisiting Difficulty Notions for Client
Puzzles and DoS Resilience . . . . . . . 39--54
Noboru Kunihiro On Optimal Bounds of Small Inverse
Problems and Approximate GCD Problems
with Higher Degree . . . . . . . . . . . 55--69
Sanna Suoranta and
André Andrade and
Tuomas Aura Strong Authentication with Mobile Phone 70--85
Chaitrali Amrutkar and
Patrick Traynor and
Paul C. van Oorschot Measuring SSL Indicators on Mobile
Browsers: Extended Life, or End of the
Road? . . . . . . . . . . . . . . . . . 86--103
Jens Bender and
Özgür Dagdelen and
Marc Fischlin and
Dennis Kügler Domain-Specific Pseudonymous Signatures
for the German Identity Card . . . . . . 104--119
Falko Strenzke Solutions for the Storage Problem of
McEliece Public and Private Keys on
Memory-Constrained Platforms . . . . . . 120--135
Samiran Bag and
Aritra Dhar and
Pinaki Sarkar 100% Connectivity for Location Aware
Code Based KPD in Clustered WSN: Merging
Blocks . . . . . . . . . . . . . . . . . 136--150
Lei Zhao and
Debin Gao and
Lina Wang Learning Fine-Grained Structured Input
for Memory Corruption Detection . . . . 151--167
Sami Alsouri and
Jan Sinschek and
Andreas Sewe and
Eric Bodden and
Mira Mezini Dynamic Anomaly Detection for More
Trustworthy Outsourced Computation . . . 168--187
Jiangang Wang and
Xiaohong Li and
Xuhui Liu and
Xinshu Dong and
Junjie Wang and
Zhenkai Liang An Empirical Study of Dangerous
Behaviors in Firefox Extensions . . . . 188--203
Michael Clear and
Karl Reid and
Desmond Ennis and
Arthur Hughes and
Hitesh Tewari Collaboration-Preserving Authenticated
Encryption for Operational
Transformation Systems . . . . . . . . . 204--223
Christoph Bösch and
Qiang Tang and
Pieter Hartel and
Willem Jonker Selective Document Retrieval from
Encrypted Database . . . . . . . . . . . 224--241
Andreas Peter and
Max Kronberg and
Wilke Trei and
Stefan Katzenbeisser Additively Homomorphic Encryption with a
Double Decryption Mechanism, Revisited 242--257
Atsushi Fujioka and
Taiichi Saito and
Keita Xagawa Secure Hierarchical Identity-Based
Identification without Random Oracles 258--273
E. Ghadafi and
N. P. Smart Efficient Two-Move Blind Signatures in
the Common Reference String Model . . . 274--289
Jinwei Hu and
Khaled M. Khan and
Yun Bai and
Yan Zhang Compliance Checking for
Usage-Constrained Credentials in Trust
Negotiation Systems . . . . . . . . . . 290--305
Peter Drábik and
Fabio Martinelli and
Charles Morisset A Quantitative Approach for Inexact
Enforcement of Security Policies . . . . 306--321
Nezar Nassr and
Nidal Aboudagga and
Eric Steegmans OSDM: An Organizational Supervised
Delegation Model for RBAC . . . . . . . 322--337
Anonymous Front Matter . . . . . . . . . . . . . . ??
Burkhard Monien and
Christian Scheideler Selfish Distributed Optimization . . . . 1--2
Omer Rana and
Marios Dikaiakos and
Daniel S. Katz and
Christine Morin Topic 1: Support Tools and Environments 3--3
Yi Wen Wong and
Tomasz Dubrownik and
Wai Teng Tang and
Wen Jun Tan and
Rubing Duan Tulipse: a Visualization Framework for
User-Guided Parallelization . . . . . . 4--15
Fabrizio Marozzo and
Francesc Lordan and
Roger Rafanell and
Daniele Lezzi and
Domenico Talia Enabling Cloud Interoperability with
COMPSs . . . . . . . . . . . . . . . . . 16--27
Alexandru Calotoiu and
Christian Siebert and
Felix Wolf Pattern-Independent Detection of Manual
Collectives in MPI Programs . . . . . . 28--39
Geoffrey C. Hulette and
Matthew J. Sottile and
Allen D. Malony A Type-Based Approach to Separating
Protocol from Application Logic . . . . 40--51
Allen D. Malony and
Helen Karatza and
William Knottenbelt and
Sally McKee Topic 2: Performance Prediction and
Evaluation . . . . . . . . . . . . . . . 52--53
Ami Marowka Energy Consumption Modeling for Hybrid
Computing . . . . . . . . . . . . . . . 54--64
Alvaro Aguilera and
Michael Kluge and
Thomas William and
Wolfgang E. Nagel HPC File Systems in Wide Area Networks:
Understanding the Performance of Lustre
over WAN . . . . . . . . . . . . . . . . 65--76
Jeremy Logan and
Scott Klasky and
Hasan Abbasi and
Qing Liu and
George Ostrouchov and
Manish Parashar Understanding I/O Performance Using I/O
Skeletal Applications . . . . . . . . . 77--88
Pablo de Oliveira Castro and
Eric Petit and
Jean Christophe Beyler and
William Jalby ASK: Adaptive Sampling Kit for
Performance Characterization . . . . . . 89--101
Shuai Jiao and
Paolo Ienne and
Xiaochun Ye and
Da Wang and
Dongrui Fan and
Ninghui Sun CRAW/P: a Workload Partition Method for
the Efficient Parallel Simulation of
Manycores . . . . . . . . . . . . . . . 102--114
Denis Trystram and
Ioannis Milis and
Zhihui Du and
Uwe Schwiegelshohn Topic 3: Scheduling and Load Balancing 115--115
Stephane Chretien and
Jean-Marc Nicod and
Laurent Philippe and
Veronika Rehn-Sonigo and
Lamiel Toch Job Scheduling Using Successive Linear
Programming Approximations of a Sparse
Model . . . . . . . . . . . . . . . . . 116--127
Eric Angel and
Evripidis Bampis and
Fadi Kacem and
Dimitrios Letsios Speed Scaling on Parallel Processors
with Migration . . . . . . . . . . . . . 128--140
Ankur Narang and
Abhinav Srivastava and
Ramnik Jain and
R. K. Shyamasundar Dynamic Distributed Scheduling Algorithm
for State Space Search . . . . . . . . . 141--154
Vladimir Janjic and
Kevin Hammond Using Load Information in Work-Stealing
on Distributed Systems with Non-uniform
Communication Latencies . . . . . . . . 155--166
Peter Sanders and
Jochen Speck Energy Efficient Frequency Scaling and
Scheduling for Malleable Tasks . . . . . 167--178
Marcelo Veiga Neves and
Tiago Ferreto and
César De Rose Scheduling MapReduce Jobs in HPC
Clusters . . . . . . . . . . . . . . . . 179--190
Gladys Utrera and
Siham Tabik and
Julita Corbalan and
Jesús Labarta A Job Scheduling Approach for Multi-core
Clusters Based on Virtual Malleability 191--203
Anonymous Front Matter . . . . . . . . . . . . . . ??
Xiang Xie and
Rui Xue and
Rui Zhang Deterministic Public Key Encryption and
Identity-Based Encryption from Lattices
in the Auxiliary-Input Setting . . . . . 1--18
Craig Gentry and
Shai Halevi and
Chris Peikert and
Nigel P. Smart Ring Switching in BGV-Style Homomorphic
Encryption . . . . . . . . . . . . . . . 19--37
Ivan Damgård and
Adriana López-Alt Zero-Knowledge Proofs with Low Amortized
Communication from Lattice Assumptions 38--56
Jan Camenisch and
Gregory Neven and
Markus Rückert Fully Anonymous Attribute Tokens from
Lattices . . . . . . . . . . . . . . . . 57--75
Jan Camenisch and
Maria Dubovitskaya and
Kristiyan Haralambiev Efficient Structure-Preserving Signature
Scheme from Standard Assumptions . . . . 76--94
Olivier Blazy and
David Pointcheval and
Damien Vergnaud Compact Round-Optimal Partially-Blind
Signatures . . . . . . . . . . . . . . . 95--112
Marc Fischlin and
Anja Lehmann and
Dominique Schröder History-Free Sequential Aggregate
Signatures . . . . . . . . . . . . . . . 113--130
Melissa Chase and
Markulf Kohlweiss A New Hash-and-Sign Approach and
Structure-Preserving Signatures from
DLIN . . . . . . . . . . . . . . . . . . 131--148
Steven Myers and
Mona Sergi and
abhi shelat Blackbox Construction of a More Than
Non-Malleable CCA 1 Encryption Scheme
from Plaintext Awareness . . . . . . . . 149--165
Duong Hieu Phan and
David Pointcheval and
Mario Strefler Decentralized Dynamic Broadcast
Encryption . . . . . . . . . . . . . . . 166--183
Kohei Kasamatsu and
Takahiro Matsuda and
Keita Emura and
Nuttapong Attrapadung and
Goichiro Hanaoka Time-Specific Encryption from
Forward-Secure Encryption . . . . . . . 184--204
Vladimir Kolesnikov and
Ranjit Kumaresan Improved Secure Two-Party Computation
via Information-Theoretic Garbled
Circuits . . . . . . . . . . . . . . . . 205--221
Joshua Baron and
Karim El Defrawy and
Kirill Minkovich and
Rafail Ostrovsky and
Eric Tressler 5PM: Secure Pattern Matching . . . . . . 222--240
Ivan Damgård and
Marcel Keller and
Enrique Larraia and
Christian Miles and
Nigel P. Smart Implementing AES via an
Actively/Covertly Secure
Dishonest-Majority MPC Protocol . . . . 241--263
Seung Geol Choi and
Dana Dachman-Soled and
Moti Yung On the Centrality of Off-Line E-Cash to
Concrete Partial Information Games . . . 264--280
Ran Canetti and
Margarita Vald Universally Composable Security with
Local Adversaries . . . . . . . . . . . 281--301
Masaya Yasuda and
Takeshi Shimoyama and
Jun Kogure and
Tetsuya Izu On the Strength Comparison of the ECDLP
and the IFP . . . . . . . . . . . . . . 302--325
Gottfried Herold and
Alexander Meurer New Attacks for Knapsack Based
Cryptosystems . . . . . . . . . . . . . 326--342
Céline Blondeau and
Beno\^\it Gérard and
Kaisa Nyberg Multiple Differential Cryptanalysis
Using LLR and $\chi^2$ Statistics . . . 343--360
Enrico Thomae Quo Vadis Quaternion? Cryptanalysis of
Rainbow over Non-commutative Rings . . . 361--373
Anonymous Front Matter . . . . . . . . . . . . . . ??
Dov Gabbay Bipolar Argumentation Frames and
Contrary to Duty Obligations,
Preliminary Report . . . . . . . . . . . 1--24
Gerhard Lakemeyer Multi-agent Only-Knowing . . . . . . . . 25--25
Emiliano Lorini Logics for Reasoning about Agents'
Attitudes in Strategic Contexts . . . . 26--26
Isaac Pinyol A Time-Situated Meta-logic for
Characterizing Goal-Processing Bounded
Agents . . . . . . . . . . . . . . . . . 27--42
Ho-Pun Lam and
Guido Governatori and
Ken Satoh Distributed Defeasible Speculative
Reasoning in Ambient Environment . . . . 43--60
Frank Dignum and
Virginia Dignum A Formal Semantics for Agent
(Re)Organization . . . . . . . . . . . . 61--76
Dimitar P. Guelev and
Catalin Dima Epistemic ATL with Perfect Recall, Past
and Strategy Contexts . . . . . . . . . 77--93
Matei Popovici Using Evolution Graphs for Describing
Topology-Aware Prediction Models in
Large Clusters . . . . . . . . . . . . . 94--109
Isabelle Mirbel and
Serena Villata Enhancing Goal-Based Requirements
Consistency: An Argumentation-Based
Approach . . . . . . . . . . . . . . . . 110--127
Nils Bulling and
Michael Köster and
Matei Popovici A Game Theoretic Approach for Optimal
Network Topologies in Opportunistic
Networks . . . . . . . . . . . . . . . . 128--145
Martin Homola and
Matthias Knorr and
João Leite MKNF Knowledge Bases in Multi-Context
Systems . . . . . . . . . . . . . . . . 146--162
Ben Wright and
Enrico Pontelli and
Tran Cao Son Implementing Reversible Processes in
Multi-agent Action Languages Using
Answer Set Planning . . . . . . . . . . 163--180
Cristian Gratie and
Adina Magda Florea Full Hybrid $\mu$-Calculus, Its
Bisimulation Invariance and Application
to Argumentation . . . . . . . . . . . . 181--194
Dov Gabbay and
Odinaldo Rodrigues A Numerical Approach to the Merging of
Argumentation Networks . . . . . . . . . 195--212
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Magdalena Ortiz and
Mantas \vSimkus Reasoning and Query Answering in
Description Logics . . . . . . . . . . . 1--53
Georg Gottlob and
Giorgio Orsi and
Andreas Pieris Datalog and Its Extensions for Semantic
Web Databases . . . . . . . . . . . . . 54--77
Marcelo Arenas and
Jorge Pérez Federation and Navigation in SPARQL 1.1 78--111
Markus Krötzsch OWL 2 Profiles: An Introduction to
Lightweight Ontology Languages . . . . . 112--183
Sergio Flesca and
Tim Furche and
Linda Oro Reasoning and Ontologies in Data
Extraction . . . . . . . . . . . . . . . 184--210
Guilin Qi and
Jianfeng Du Reasoning with Uncertain and
Inconsistent OWL Ontologies . . . . . . 211--244
Danh Le-Phuoc and
Josiane Xavier Parreira Linked Stream Data Processing . . . . . 245--289
Manolis Koubarakis and
Manos Karpathiotakis Data Models and Query Languages for
Linked Geospatial Data . . . . . . . . . 290--328
François Bry and
Sebastian Schaffert Semantic Wikis: Approaches,
Applications, and Perspectives . . . . . 329--369
Francesca Toni Reasoning on the Web with
Assumption-Based Argumentation . . . . . 370--386
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Taylor Cassidy and
Heng Ji and
Hongbo Deng and
Jing Zheng and
Jiawei Han Analysis and Refinement of Cross-Lingual
Entity Linking . . . . . . . . . . . . . 1--12
Ragnar Nordlie and
Nils Pharo Seven Years of INEX Interactive
Retrieval Experiments --- Lessons and
Challenges . . . . . . . . . . . . . . . 13--23
Allan Hanbury and
Henning Müller and
Georg Langs and
Marc André Weber and
Bjoern H. Menze Bringing the Algorithms to the Data:
Cloud--Based Benchmarking for Medical
Image Analysis . . . . . . . . . . . . . 24--29
Julia J. Jürgens and
Preben Hansen and
Christa Womser-Hacker Going beyond CLEF-IP: The `Reality' for
Patent Searchers? . . . . . . . . . . . 30--35
Nicola Orio and
Cynthia C. S. Liem and
Geoffroy Peeters and
Markus Schedl MusiClef: Multimodal Music Tagging Task 36--41
Richard Berendsen and
Manos Tsagkias and
Maarten de Rijke and
Edgar Meij Generating Pseudo Test Collections for
Learning to Rank Scientific Articles . . 42--53
Florina Piroi and
Mihai Lupu and
Allan Hanbury Effects of Language and Topic Size in
Patent IR: An Empirical Study . . . . . 54--66
Parth Gupta and
Alberto Barrón-Cedeño and
Paolo Rosso Cross-Language High Similarity Search
Using a Conceptual Thesaurus . . . . . . 67--75
Anita Keszler and
Levente Kovács and
Tamás Szirányi The Appearance of the Giant Component in
Descriptor Graphs and Its Application
for Descriptor Selection . . . . . . . . 76--81
Xueliang Yan and
Guanglai Gao and
Xiangdong Su and
Hongxi Wei and
Xueliang Zhang and
Qianqian Lu Hidden Markov Model for Term Weighting
in Verbose Queries . . . . . . . . . . . 82--87
Maristella Agosti and
Emanuele Di Buccio and
Nicola Ferro and
Ivano Masiero and
Simone Peruzzo DIRECTions: Design and Specification of
an IR Evaluation Infrastructure . . . . 88--99
Petra Galu\vs\vcáková and
Pavel Pecina and
Jan Haji\vc Penalty Functions for Evaluation
Measures of Unsegmented Speech Retrieval 100--111
Marco Angelini and
Nicola Ferro and
Kalervo Järvelin and
Heikki Keskustalo and
Ari Pirkola Cumulated Relative Position: a Metric
for Ranking Evaluation . . . . . . . . . 112--123
Philipp Schaer Better than Their Reputation? On the
Reliability of Relevance Assessments
with Students . . . . . . . . . . . . . 124--135
Jens Kürsten and
Maximilian Eibl Comparing IR System Components Using
Beanplots . . . . . . . . . . . . . . . 136--137
Pinaki Bhaskar and
Sivaji Bandyopadhyay Language Independent Query Focused
Snippet Generation . . . . . . . . . . . 138--140
Solange de L. Pertile and
Viviane P. Moreira A Test Collection to Evaluate Plagiarism
by Missing or Incorrect References . . . 141--143
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Michael Khoo and
Catherine Hall What Would `Google' Do? Users' Mental
Models of a Digital Library Search
Engine . . . . . . . . . . . . . . . . . 1--12
Dana McKay and
Annika Hinze and
Ralf Heese and
Nicholas Vanderschantz and
Claire Timpany An Exploration of ebook Selection
Behavior in Academic Library Collections 13--24
Fernando Loizides Information Seekers' Visual Focus during
Time Constraint Document Triage . . . . 25--31
Nina Tahmasebi and
Gerhard Gossen and
Thomas Risse Which Words Do You Remember? Temporal
Properties of Language Use in Digital
Archives . . . . . . . . . . . . . . . . 32--37
Dongwon Lee Toward Mobile-Friendly Libraries: The
Status Quo . . . . . . . . . . . . . . . 38--50
Annika Hinze and
David Bainbridge Listen to Tipple: Creating a Mobile
Digital Library with Location-Triggered
Audio Books . . . . . . . . . . . . . . 51--56
Annika Hinze and
Amay Dighe Re-finding Physical Documents: Extending
a Digital Library into a Human-Centred
Workplace . . . . . . . . . . . . . . . 57--63
Mark S. Sweetnam and
Maristella Agosti and
Nicola Orio and
Chiara Ponchia and
Christina M. Steiner User Needs for Enhanced Engagement with
Cultural Heritage Collections . . . . . 64--75
Anne Adams and
Pauline Ngimwa Digital Library Sustainability and
Design Processes . . . . . . . . . . . . 76--88
Adam Dudczak and
Mi\losz Kmieciak and
Marcin Werla Creation of Textual Versions of
Historical Documents from Polish Digital
Libraries . . . . . . . . . . . . . . . 89--94
Marco Büchler and
Gregory Crane and
Maria Moritz and
Alison Babeu Increasing Recall for Text Re-use in
Historical Documents to Support Research
in the Humanities . . . . . . . . . . . 95--100
Anqi Cui and
Liner Yang and
Dejun Hou and
Min-Yen Kan and
Yiqun Liu and
Min Zhang and
Shaoping Ma PrEV: Preservation Explorer and Vault
for Web 2.0 User-Generated Content . . . 101--112
Rudolf Mayer and
Andreas Rauber and
Martin Alexander Neumann and
John Thomson and
Gonçalo Antunes Preserving Scientific Processes from
Design to Publications . . . . . . . . . 113--124
Hany M. SalahEldeen and
Michael L. Nelson Losing My Revolution: How Many Resources
Shared on Social Media Have Been Lost? 125--137
Maria Sumbana and
Marcos André Gonçalves and
Rodrigo Silva and
Jussara Almeida and
Adriano Veloso Automatic Vandalism Detection in
Wikipedia with Active Associative
Classification . . . . . . . . . . . . . 138--143
Electra Sutton and
Chloe Reynolds and
Fredric C. Gey and
Ray R. Larson Applying Digital Library Technologies to
Nuclear Forensics . . . . . . . . . . . 144--149
Katarina Boland and
Dominique Ritze and
Kai Eckert and
Brigitte Mathiak Identifying References to Datasets in
Publications . . . . . . . . . . . . . . 150--161
M. Mahoui and
C. Boston-Clay and
R. Stein and
N. Tirupattur Collaborative Tagging of Art Digital
Libraries: Who Should Be Tagging? . . . 162--172
Emanuele Di Buccio and
Giorgio Maria Di Nunzio and
Gianmaria Silvello A System for Exposing Linguistic Linked
Open Data . . . . . . . . . . . . . . . 173--178
Richard Gartner Linking the Parliamentary Record: a New
Approach to Metadata for Legislative
Proceedings . . . . . . . . . . . . . . 179--184
Anonymous Front Matter . . . . . . . . . . . . . . ??
William Gropp MPI 3 and Beyond: Why MPI Is Successful
and What Challenges It Faces . . . . . . 1--9
Ulrich Brüning MPI Functions and Their Impact on
Interconnect Hardware . . . . . . . . . 10--10
Shinji Sumimoto The MPI Communication Library for the K
Computer: Its Design and Implementation 11--11
Anthony Danalis MPI and Compiler Technology: a Love-Hate
Relationship . . . . . . . . . . . . . . 12--13
William Gropp and
Ewing Lusk and
Rajeev Thakur Advanced MPI Including New MPI-3
Features . . . . . . . . . . . . . . . . 14--14
Markus Geimer and
Michael Gerndt and
Sameer Shende and
Bert Wesarg and
Brian Wylie Hands-on Practical Hybrid Parallel
Application Performance Engineering . . 15--15
Xin Zhao and
Gopalakrishnan Santhanaraman and
William Gropp Adaptive Strategy for One-Sided
Communication in MPICH2 . . . . . . . . 16--26
Brian W. Barrett and
Ron Brightwell and
Keith D. Underwood A Low Impact Flow Control Implementation
for Offload Communication Interfaces . . 27--36
Sylvain Didelot and
Patrick Carribault and
Marc Pérache and
William Jalby Improving MPI Communication Overlap with
Collaborative Polling . . . . . . . . . 37--46
Kazumi Yoshinaga and
Yuichi Tsujita and
Atsushi Hori and
Mikiko Sato and
Mitaro Namiki Delegation-Based MPI Communications for
a Hybrid Parallel Computer with
Many-Core Architecture . . . . . . . . . 47--56
James Dinan and
David Goodell and
William Gropp and
Rajeev Thakur and
Pavan Balaji Efficient Multithreaded Context ID
Allocation in MPI . . . . . . . . . . . 57--66
Nikhil Jain and
JohnMark Lau and
Laxmikant Kale Collectives on Two-Tier Direct Networks 67--77
Manjunath Gorentla Venkata and
Richard L. Graham and
Joshua S. Ladd and
Pavel Shamis Exploiting Atomic Operations for Barrier
on Cray XE/XK Systems . . . . . . . . . 78--88
Simone Pellegrini and
Torsten Hoefler and
Thomas Fahringer Exact Dependence Analysis for Increased
Communication Overlap . . . . . . . . . 89--99
Jesper Larsson Träff \tt mpicroscope: Towards an MPI
Benchmark Tool for Performance Guideline
Verification . . . . . . . . . . . . . . 100--109
D. Bureddy and
H. Wang and
A. Venkatesh and
S. Potluri and
D. K. Panda OMB-GPU: a Micro-Benchmark Suite for
Evaluating MPI Libraries on GPU Clusters 110--120
Timo Schneider and
Robert Gerstenberger and
Torsten Hoefler Micro-applications for Communication
Data Access Patterns and MPI Datatypes 121--131
Torsten Hoefler and
James Dinan and
Darius Buntinas and
Pavan Balaji and
Brian W. Barrett Leveraging MPI's One-Sided Communication
Interface for Shared-Memory Programming 132--141
Isaías A. Comprés Ureña and
Michael Gerndt and
Carsten Trinitis Wait-Free Message Passing Protocol for
Non-coherent Shared Memory Architectures 142--152
Atsushi Hori and
Toyohisa Kameyama and
Yuichi Tsujita and
Mitaro Namiki and
Yutaka Ishikawa An Efficient Kernel-Level Blocking MPI
Implementation . . . . . . . . . . . . . 153--162
Anonymous Front Matter . . . . . . . . . . . . . . ??
Tobias Glasmachers Convergence of the IGO-Flow of Isotropic
Gaussian Distributions on Convex
Quadratic Problems . . . . . . . . . . . 1--10
Andrea Mambrini and
Dirk Sudholt and
Xin Yao Homogeneous and Heterogeneous Island
Models for the Set Cover Problem . . . . 11--20
Alberto Moraglio and
Krzysztof Krawiec and
Colin G. Johnson Geometric Semantic Genetic Programming 21--31
Johannes Textor Efficient Negative Selection Algorithms
by Sampling and Approximate Counting . . 32--41
Youhei Akimoto and
Anne Auger and
Nikolaus Hansen Convergence of the Continuous Time
Trajectories of Isotropic Evolution
Strategies on Monotonic
$\mathcal{C}^2$-composite Functions . . 42--51
Andrew M. Sutton and
Frank Neumann A Parameterized Runtime Analysis of
Simple Evolutionary Algorithms for
Makespan Scheduling . . . . . . . . . . 52--61
Chao Qian and
Yang Yu and
Zhi-Hua Zhou On Algorithm-Dependent Boundary Case
Identification for Problem Classes . . . 62--71
Alexandre Chotard and
Anne Auger and
Nikolaus Hansen Cumulative Step-Size Adaptation on
Linear Functions . . . . . . . . . . . . 72--81
Dirk V. Arnold On the Behaviour of the $(1, \lambda) -
\sigma$ SA-ES for a Constrained Linear
Problem . . . . . . . . . . . . . . . . 82--91
Darrell Whitley and
Wenxiang Chen and
Adele Howe An Empirical Evaluation of $O(1)$
Steepest Descent for NK-Landscapes . . . 92--101
Tommaso Urli and
Markus Wagner and
Frank Neumann Experimental Supplements to the
Computational Complexity Analysis of
Genetic Programming for Problems
Modelling Isolated Program Semantics . . 102--112
Timo Kötzing and
Hendrik Molter ACO Beats EA on a Dynamic Pseudo-Boolean
Function . . . . . . . . . . . . . . . . 113--122
Dimo Brockhoff and
Manuel López-Ibáñez and
Boris Naujoks and
Günter Rudolph Runtime Analysis of Simple Interactive
Evolutionary Biobjective Optimization
Algorithms . . . . . . . . . . . . . . . 123--132
Markus Wagner and
Frank Neumann Parsimony Pressure versus
Multi-objective Optimization for
Variable Length Representations . . . . 133--142
Alessia Amelio and
Clara Pizzuti An Evolutionary and Graph-Based Method
for Image Segmentation . . . . . . . . . 143--152
Roberto Ugolotti and
Youssef S. G. Nashed and
Stefano Cagnoni Real-Time GPU Based Road Sign Detection
and Classification . . . . . . . . . . . 153--162
Michaela Sikulova and
Lukas Sekanina Acceleration of Evolutionary Image
Filter Design Using Coevolution in
Cartesian GP . . . . . . . . . . . . . . 163--172
Martin Pelikan and
Mark W. Hauschild and
Pier Luca Lanzi Transfer Learning, Soft Distance-Based
Bias, and the Hierarchical BOA . . . . . 173--183
Markus Thill and
Patrick Koch and
Wolfgang Konen Reinforcement Learning with $N$-tuples
on the Game Connect-$4$ . . . . . . . . 184--194
Patrick Koch and
Wolfgang Konen Efficient Sampling and Handling of
Variance in Tuning Data Mining Models 195--205
Anonymous Front Matter . . . . . . . . . . . . . . ??
Kalyanmoy Deb and
Sunith Bandaru and
Cem Celal Tutum Temporal Evolution of Design Principles
in Engineering Systems: Analogies with
Human Evolution . . . . . . . . . . . . 1--10
Antony Waldock and
David W. Corne Exploiting Prior Information in
Multi-objective Route Planning . . . . . 11--21
Naoya Kowatari and
Akira Oyama and
Hernán Aguirre and
Kiyoshi Tanaka Analysis on Population Size and
Neighborhood Recombination on
Many-Objective Optimization . . . . . . 22--31
Julia Handl and
Joshua Knowles Clustering Criteria in Multiobjective
Data Clustering . . . . . . . . . . . . 32--41
Adam Ghandar and
Zbigniew Michalewicz and
Ralf Zurbruegg Enhancing Profitability through
Interpretability in Algorithmic Trading
with a Multiobjective Evolutionary Fuzzy
System . . . . . . . . . . . . . . . . . 42--51
Shlomo Israel and
Amiram Moshaiov Bootstrapping Aggregate Fitness
Selection with Evolutionary
Multi-Objective Optimization . . . . . . 52--61
Wei Peng and
Qingfu Zhang Network Topology Planning Using MOEA/D
with Objective-Guided Operators . . . . 62--71
Hoang N. Luong and
Peter A. N. Bosman Elitist Archiving for Multi-Objective
Evolutionary Algorithms: To Adapt or Not
to Adapt . . . . . . . . . . . . . . . . 72--81
Mario Garza-Fabre and
Eduardo Rodriguez-Tello and
Gregorio Toscano-Pulido An Improved Multiobjectivization
Strategy for HP Model-Based Protein
Structure Prediction . . . . . . . . . . 82--92
Hui Li and
Xiaolei Su and
Zongben Xu and
Qingfu Zhang MOEA/D with Iterative Thresholding
Algorithm for Sparse Optimization
Problems . . . . . . . . . . . . . . . . 93--101
Alessandro G. Di Nuovo and
Giuseppe Ascia and
Vincenzo Catania A Study on Evolutionary Multi-Objective
Optimization with Fuzzy Approximation
for Computational Expensive Problems . . 102--111
Panwadee Tangpattanakul and
Nicolas Jozefowiez and
Pierre Lopez Multi-objective Optimization for
Selecting and Scheduling Observations by
Agile Earth Observing Satellites . . . . 112--121
Amiram Moshaiov and
Yafit Snir Tailoring $\epsilon$-MOEA to
Concept-Based Problems . . . . . . . . . 122--131
Hisao Ishibuchi and
Naoya Akedo and
Yusuke Nojima Recombination of Similar Parents in
SMS-EMOA on Many-Objective 0/1 Knapsack
Problems . . . . . . . . . . . . . . . . 132--142
Francisco J. Rodriguez and
Carlos García-Martínez and
Christian Blum and
Manuel Lozano An Artificial Bee Colony Algorithm for
the Unrelated Parallel Machines
Scheduling Problem . . . . . . . . . . . 143--152
Carlos M. Fernandes and
Juan J. Merelo and
Agostinho C. Rosa Controlling the Parameters of the
Particle Swarm Optimization with a
Self-Organized Criticality Model . . . . 153--163
Andrew McNabb and
Kevin Seppi The Apiary Topology: Emergent Behavior
in Communities of Particle Swarms . . . 164--173
Shigeyoshi Tsutsui ACO on Multiple GPUs with CUDA for
Faster Solution of QAPs . . . . . . . . 174--184
Jan Bim and
Giorgos Karafotias and
S. K. Smit and
A. E. Eiben and
Evert Haasdijk It's Fate: a Self-organising
Evolutionary Algorithm . . . . . . . . . 185--194
Alan P. Reynolds and
Asaad Abdollahzadeh and
David W. Corne and
Mike Christie and
Brian Davies Guide Objective Assisted Particle Swarm
Optimization and Its Application to
History Matching . . . . . . . . . . . . 195--204
Anonymous Front Matter . . . . . . . . . . . . . . ??
Lars Bollen and
Hannie Gijlers and
Wouter van Joolingen Computer-Supported Collaborative Drawing
in Primary School Education ---
Technical Realization and Empirical
Findings . . . . . . . . . . . . . . . . 1--16
Katharina Emmerich and
Katja Neuwald and
Julia Othlinghaus and
Sabrina Ziebarth and
H. Ulrich Hoppe Training Conflict Management in a
Collaborative Virtual Environment . . . 17--32
Osmel Bordiés and
Eloy Villasclaras and
Yannis Dimitriadis and
Adolfo Ruiz-Calleja Reusability of Data Flow Designs in
Complex CSCL Scripts: Evaluation Results
from a Case Study . . . . . . . . . . . 33--40
Armando Cruz and
António Correia and
Hugo Paredes and
Benjamim Fonseca and
Leonel Morgado Towards an Overarching Classification
Model of CSCW and Groupware: a
Socio-technical Perspective . . . . . . 41--56
Alexander Nolte and
Michael Prilla Normal Users Cooperating on Process
Models: Is It Possible at All? . . . . . 57--72
Francisco Gutierrez and
Nelson Baloian and
Sergio F. Ochoa and
Gustavo Zurita Designing the Software Support for
Partially Virtual Communities . . . . . 73--88
Michael Prilla Supporting Social Tasks of Individuals:
a Matter of Access to Cooperation
Systems . . . . . . . . . . . . . . . . 89--96
Gustavo A. Oliva and
Francisco W. Santana and
Kleverton C. M. de Oliveira Characterizing Key Developers: a Case
Study with Apache Ant . . . . . . . . . 97--112
Andréa M. Magdaleno and
Renata M. Araujo and
Cláudia M. L. Werner An Exploratory Study on Collaboration
Understanding in Software Development
Social Networks . . . . . . . . . . . . 113--120
Shi Shi and
Thomas Largillier and
Julita Vassileva Keeping Up with Friends' Updates on
Facebook . . . . . . . . . . . . . . . . 121--128
Benjamin Weyers and
Wolfram Luther and
Nelson Baloian and
Jose A. Pino Formal Modeling of Multi-user Interfaces
in Cooperative Work . . . . . . . . . . 129--136
Thomas Largillier and
Julita Vassileva Using Collective Trust for Group
Formation . . . . . . . . . . . . . . . 137--144
Irene-Angelica Chounta and
Nikolaos Avouris Time Series Analysis of Collaborative
Activities . . . . . . . . . . . . . . . 145--152
Andreas Harrer and
Thomas Irgang and
Norbert Sattes and
Kerstin Pfahler SoCCR --- Optimistic Concurrency Control
for the Web-Based Collaborative
Framework Metafora . . . . . . . . . . . 153--160
Lars Bollen and
Sabrina C. Eimler and
Marc Jansen and
Jan Engler Enabling and Evaluating Mobile Learning
Scenarios with Multiple Input Channels 161--175
Didac Gil de La Iglesia and
Marcelo Milrad and
Jesper Andersson Software Requirements to Support QoS in
Collaborative M-Learning Activities . . 176--183
Dan Kohen-Vacs and
Arianit Kurti and
Marcelo Milrad and
Miky Ronen Systems Integration Challenges for
Supporting Cross Context Collaborative
Pedagogical Scenarios . . . . . . . . . 184--191
Daniel Cernea and
Simone Mora and
Alfredo Perez and
Achim Ebert and
Andreas Kerren and
Monica Divitini Tangible and Wearable User Interfaces
for Supporting Collaboration among
Emergency Workers . . . . . . . . . . . 192--199
Sírius Thadeu Ferreira da Silva and
Jonice Oliveira and
Marcos R. S. Borges Contextual Analysis of the Victims'
Social Network for People Recommendation
on the Emergency Scenario . . . . . . . 200--207
Sabrina Ziebarth and
Nils Malzahn and
H. Ulrich Hoppe Matchballs --- a Multi-Agent-System for
Ontology-Based Collaborative Learning
Games . . . . . . . . . . . . . . . . . 208--222
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Todd J. Green and
Molham Aref and
Grigoris Karvounarakis LogicBlox, Platform and Language: a
Tutorial . . . . . . . . . . . . . . . . 1--8
Yuri Gurevich Datalog: a Perspective and the Potential 9--20
Marie-Laure Mugnier Existential Rules: a Graph-Based View 21--26
Axel Polleres How (Well) Do Datalog, SPARQL and RIF
Interplay? . . . . . . . . . . . . . . . 27--30
Mario Alviano and
Nicola Leone and
Marco Manna and
Giorgio Terracina and
Pierfrancesco Veltri Magic-Sets for Datalog with Existential
Quantifiers . . . . . . . . . . . . . . 31--43
Tom J. Ameloot and
Jan Van den Bussche On the CRON Conjecture . . . . . . . . . 44--55
Stefan Brass Order in Datalog with Applications to
Declarative Output . . . . . . . . . . . 56--67
Cristina Civili and
Riccardo Rosati A Broad Class of First-Order Rewritable
Tuple-Generating Dependencies . . . . . 68--80
Onofrio Febbraro and
Giovanni Grasso and
Nicola Leone and
Kristian Reale and
Francesco Ricca Datalog Development Tools . . . . . . . 81--85
Jaffer Gardezi and
Leopoldo Bertossi Query Rewriting Using Datalog for
Duplicate Resolution . . . . . . . . . . 86--98
Matteo Interlandi Reasoning about Knowledge in Distributed
Systems Using Datalog . . . . . . . . . 99--110
Sven Köhler and
Bertram Ludäscher and
Yannis Smaragdakis Declarative Datalog Debugging for Mere
Mortals . . . . . . . . . . . . . . . . 111--122
Thomas Lukasiewicz and
Maria Vanina Martinez and
Gerardo I. Simari Inconsistency-Tolerant Query Rewriting
for Linear Datalog$\pm$ . . . . . . . . 123--134
William R. Marczak and
Peter Alvaro and
Neil Conway and
Joseph M. Hellerstein and
David Maier Confluence Analysis for Distributed
Programs: a Model-Theoretic Approach . . 135--147
Daniel Ritter and
Till Westmann Business Network Reconstruction Using
Datalog . . . . . . . . . . . . . . . . 148--152
Domenico Sacc\`a and
Edoardo Serra Data Exchange in Datalog Is Mainly a
Matter of Choice . . . . . . . . . . . . 153--164
Marianne Shaw and
Paraschos Koutris and
Bill Howe and
Dan Suciu Optimizing Large-Scale Semi-Na\"\ive
Datalog Evaluation in Hadoop . . . . . . 165--176
Carlo Zaniolo Logical Foundations of Continuous Query
Languages for Data Streams . . . . . . . 177--189
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Jan M. Baetens and
Bernard De Baets Topological Perturbations and Their
Effect on the Dynamics of Totalistic
Cellular Automata . . . . . . . . . . . 1--10
Sukanta Das and
Avik Chakraborty and
Biplab K. Sikdar Counting Cycles in Reversible Cellular
Automata . . . . . . . . . . . . . . . . 11--19
Dominique Désérable Propagative Mode in a Lattice-Grain CA:
Time Evolution and Timestep
Synchronization . . . . . . . . . . . . 20--31
Toshikazu Ishida and
Shuichi Inokuchi Limit Cycle for Composited Cellar
Automata . . . . . . . . . . . . . . . . 32--41
Martin Kutrib and
Andreas Malcher Iterative Arrays: Little Resources Big
Size Impact . . . . . . . . . . . . . . 42--51
Debdeep Mukhopadhyay Generating Expander Graphs Using
Cellular Automata . . . . . . . . . . . 52--62
Nazma Naskar and
Avik Chakraborty and
Pradipta Maji and
Sukanta Das Analysis of Reachability Tree for
Identification of Cyclic and Acyclic CA
States . . . . . . . . . . . . . . . . . 63--72
Fumio Ohi and
Takanori Ichikawa Confliction-Like Dynamics of Rule 20 ECA
of Wolfram Class II . . . . . . . . . . 73--82
Susumu Adachi and
Jia Lee and
Ferdinand Peper and
Teijiro Isokawa and
Katsunobu Imai Determining the Critical Temperature of
the Continuous-State Game of Life . . . 83--90
Tomasz M. Gwizda\l\la The Dynamics of Disproportionality Index
for Cellular Automata Based
Sociophysical Models . . . . . . . . . . 91--100
Luidnel Maignan and
Jean-Baptiste Yun\`es A Spatio-temporal Algorithmic Point of
View on Firing Squad Synchronisation
Problem . . . . . . . . . . . . . . . . 101--110
Gina M. B. Oliveira and
Paulo M. Vidica A Coevolutionary Approach to Cellular
Automata-Based Task Scheduling . . . . . 111--120
Anna Piwonska and
Franciszek Seredynski and
Miroslaw Szaban Searching Cellular Automata Rules for
Solving Two-Dimensional Binary
Classification Problem . . . . . . . . . 121--130
Epaminondas Sidiropoulos Multi-objective Cellular Automata
Optimization . . . . . . . . . . . . . . 131--140
Stylianos Scarlatos Behavior of Social Dynamical Models I:
Fixation in the Symmetric Cyclic System 141--150
Adam Adamopoulos and
Stylianos Scarlatos Behavior of Social Dynamical Models II:
Clustering for Some Multitype Particle
Systems with Confidence Threshold . . . 151--160
Anastasiya Sharifulina Investigation of Stable Patterns Formed
by Totalistic Cellular Automata
Evolution . . . . . . . . . . . . . . . 161--170
Hiroshi Umeo and
Keisuke Kubo Recent Developments in Constructing
Square Synchronizers . . . . . . . . . . 171--183
Baltasar Trancón y Widemann Structural Operational Semantics for
Cellular Automata . . . . . . . . . . . 184--193
Machi Zawidzki and
Katsuhiro Nishinari Controlling the Opacity of a Building
Envelope by a Triangular Two-Color
Two-Dimensional Cellular Automaton . . . 194--203
Anonymous Front Matter . . . . . . . . . . . . . . ??
Masayuki Abe Tools over Bilinear Groups for Modular
Design of Cryptographic Tasks . . . . . 1--1
Dennis Y. W. Liu and
Duncan S. Wong One-Move Convertible Nominative
Signature in the Standard Model . . . . 2--20
Shengke Zeng and
Zhiguang Qin and
Qing Lu and
Qinyi Li Efficient and Random Oracle-Free
Conditionally Anonymous Ring Signature 21--34
S. Sharmila Deva Selvi and
S. Sree Vivek and
Dhinakaran Vinayagamurthy and
C. Pandu Rangan ID Based Signcryption Scheme in Standard
Model . . . . . . . . . . . . . . . . . 35--52
Cheng Chen and
Jie Chen and
Hoon Wei Lim and
Zhenfeng Zhang and
Dengguo Feng Combined Public-Key Schemes: The Case of
ABE and ABS . . . . . . . . . . . . . . 53--69
Ioana Boureanu and
Serge Vaudenay Several Weak Bit-Commitments Using
Seal-Once Tamper-Evident Devices . . . . 70--87
Margus Niitsoo Deterministic Random Oracles . . . . . . 88--103
Oana Ciobotaru On the (Non-)Equivalence of UC Security
Notions . . . . . . . . . . . . . . . . 104--124
Bo Yang and
Mingwu Zhang LR-UESDE: a Continual-Leakage Resilient
Encryption with Unbounded Extensible Set
Delegation . . . . . . . . . . . . . . . 125--142
Yu Chen and
Zongyang Zhang and
Dongdai Lin and
Zhenfu Cao Anonymous Identity-Based Hash Proof
System and Its Applications . . . . . . 143--160
Yunmei Zhang and
Joseph K. Liu and
Xinyi Huang and
Man Ho Au and
Willy Susilo Efficient Escrow-Free Identity-Based
Signature . . . . . . . . . . . . . . . 161--174
Mototsugu Nishioka Perfect Keyword Privacy in PEKS Systems 175--192
Tapas Pandit and
Rana Barua Efficient Fully Secure Attribute-Based
Encryption Schemes for General Access
Structures . . . . . . . . . . . . . . . 193--214
Masayuki Yoshino and
Noboru Kunihiro and
Ken Naganuma and
Hisayoshi Sato Symmetric Inner-Product Predicate
Encryption Based on Three Groups . . . . 215--234
Takanori Suga and
Takashi Nishide and
Kouichi Sakurai Secure Keyword Search Using Bloom Filter
with Specified Character Positions . . . 235--252
Cheng Chen and
Zhenfeng Zhang and
Dengguo Feng Fully Secure Doubly-Spatial Encryption
under Simple Assumptions . . . . . . . . 253--263
Zheng Yang and
Jörg Schwenk Strongly Authenticated Key Exchange
Protocol from Bilinear Groups without
Random Oracles . . . . . . . . . . . . . 264--275
Yanfei Guo and
Zhenfeng Zhang Authenticated Key Exchange with Entities
from Different Settings and Varied
Groups . . . . . . . . . . . . . . . . . 276--287
Mohammad Reza Reyhanitabar and
Willy Susilo On Capabilities of Hash Domain Extenders
to Preserve Enhanced Security Properties 288--299
Zhaohui Tang and
Hoon Wei Lim and
Huaxiong Wang Revisiting a Secret Sharing Approach to
Network Codes . . . . . . . . . . . . . 300--317
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Gerhard Brewka Multi-context Systems: Specifying the
Interaction of Knowledge Bases
Declaratively . . . . . . . . . . . . . 1--4
Tommaso Di Noia Semantic Matchmaking and Ranking: Beyond
Deduction in Retrieval Scenarios . . . . 5--8
Stefan Borgwardt and
Rafael Peñaloza A Tableau Algorithm for Fuzzy
Description Logics over Residuated De
Morgan Lattices . . . . . . . . . . . . 9--24
Diego Calvanese and
Giuseppe De Giacomo and
Domenico Lembo and
Marco Montali and
Ario Santoso Ontology-Based Governance of Data-Aware
Processes . . . . . . . . . . . . . . . 25--41
Cristina Civili and
Riccardo Rosati Query Patterns for Existential Rules . . 42--57
Thomas Eiter and
Michael Fink and
Daria Stepanova Semantic Independence in DL-Programs . . 58--74
Víctor Gutiérrez-Basulto and
Yazmín Angélica Ibáñez-García and
Roman Kontchakov An Update on Query Answering with
Restricted Forms of Negation . . . . . . 75--89
Víctor Gutiérrez-Basulto and
Szymon Klarman Towards a Unifying Approach to
Representing and Querying Temporal Data
in Description Logics . . . . . . . . . 90--105
Tomi Janhunen and
Vesa Luukkala Meta Programming with Answer Sets for
Smart Spaces . . . . . . . . . . . . . . 106--121
Mélanie König and
Michel Lecl\`ere and
Marie-Laure Mugnier and
Michaël Thomazo A Sound and Complete Backward Chaining
Algorithm for Existential Rules . . . . 122--138
Senlin Liang and
Michael Kifer Deriving Predicate Statistics for Logic
Rules . . . . . . . . . . . . . . . . . 139--155
Thomas Lukasiewicz and
Maria Vanina Martinez and
Gerardo I. Simari Consistent Answers in Probabilistic
Datalog$\pm$ Ontologies . . . . . . . . 156--171
Eleni Tsalapati and
Giorgos Stoilos and
Giorgos Stamou and
George Koletsos Query Rewriting under Ontology
Contraction . . . . . . . . . . . . . . 172--187
Jürgen Umbrich and
Aidan Hogan and
Axel Polleres and
Stefan Decker Improving the Recall of Live Linked Data
Querying through Reasoning . . . . . . . 188--204
Rosamaria Barilaro and
Nicola Leone and
Francesco Ricca and
Giorgio Terracina Distributed Ontology Based Data Access
via Logic Programming . . . . . . . . . 205--208
Valentinos Evripidou and
Francesca Toni Argumentation and Voting for an
Intelligent User Empowering Business
Directory on the Web . . . . . . . . . . 209--212
Wolfgang Faber A Polynomial Reduction from ASPDA to ASP 213--216
Enrico Franconi and
Nhung Ngo and
Evgeny Sherkhonov The Definability Abduction Problem for
Data Exchange . . . . . . . . . . . . . 217--220
Beibei Hu and
Theodore Patkos and
Abdelghani Chibani and
Yacine Amirat Rule-Based Context Assessment in Smart
Cities . . . . . . . . . . . . . . . . . 221--224
Matthias Knorr and
David Carral Martínez and
Pascal Hitzler and
Adila A. Krisnadhi Recent Advances in Integrating OWL and
Rules (Technical Communication) . . . . 225--228
Anonymous Front Matter . . . . . . . . . . . . . . ??
John Rushby The Versatile Synchronous Observer . . . 1--1
Wolfram Schulte Thirteen Years of Automated Code
Analysis at Microsoft . . . . . . . . . 2--2
Araceli Acosta and
Cecilia Kilmurray Model Checking Propositional Deontic
Temporal Logic via a $\mu$-Calculus
Characterization . . . . . . . . . . . . 3--18
Haniel Barbosa and
David Déharbe An Approach Using the B Method to Formal
Verification of PLC Programs in an
Industrial Setting . . . . . . . . . . . 19--34
Fernando A. F. Braz and
Jader S. Cruz Palytoxin Inhibits the Sodium-Potassium
Pump --- An Investigation of an
Electrophysiological Model Using
Probabilistic Model Checking . . . . . . 35--50
Ernesto C. B. de Matos BETA: a B Based Testing Approach . . . . 51--66
Gustavo Carvalho and
Diogo Falcão A Process Algebra Based Strategy for
Generating Test Vectors from SCR
Specifications . . . . . . . . . . . . . 67--82
Simone André da Costa Cavalheiro Specification Patterns for Properties
over Reachable States of Graph Grammars 83--98
Jim Davies and
Jeremy Gibbons and
David Milward Compositionality and Refinement in
Model-Driven Engineering . . . . . . . . 99--114
André Didier and
Alexandre Mota Identifying Hardware Failures
Systematically . . . . . . . . . . . . . 115--130
Yanhong Huang and
Yongxin Zhao and
Jianqi Shi Investigating Time Properties of
Interrupt-Driven Programs . . . . . . . 131--146
Germán Regis and
Nicolás Ricci Specifying and Verifying Declarative
Fluent Temporal Logic Properties of
Workflows . . . . . . . . . . . . . . . 147--162
Christoph Schulz and
Michael Löwe Composition of Model Transformations: A
Categorical Framework . . . . . . . . . 163--178
Emil Sekerinski and
Tian Zhang Verification Rules for Exception
Handling in Eiffel . . . . . . . . . . . 179--193
Subodh Sharma and
Ganesh Gopalakrishnan A Sound Reduction of Persistent-Sets for
Deadlock Detection in MPI Applications 194--209
Dante Zanarini and
Carlos Luna and
Luis Sierra Alternating-Time Temporal Logic in the
Calculus of (Co)Inductive Constructions 210--225
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . 1--1
Adam Kilgarriff Getting to Know Your Corpus . . . . . . 3--15
Ruslan Mitkov and
Richard Evans and
Constantin Or\uasan and
Iustin Dornescu and
Miguel Rios Coreference Resolution: To What Extent
Does It Help NLP Applications? . . . . . 16--27
Anonymous Front Matter . . . . . . . . . . . . . . 29--29
\Lukasz Kobyli\'nski and
Mateusz Kope\'c Semantic Similarity Functions in Word
Sense Disambiguation . . . . . . . . . . 31--38
Thomas Scholz and
Stefan Conrad and
Lutz Hillekamps Opinion Mining on a German Corpus of a
Media Response Analysis . . . . . . . . 39--46
David Pinto and
Darnes Vilariño and
Yuridiana Alemán and
Helena Gómez and
Nahun Loya The Soundex Phonetic Algorithm Revisited
for SMS Text Representation . . . . . . 47--55
Magda \vSev\vcíková and
Ji\vrí Mírovský Sentence Modality Assignment in the
Prague Dependency Treebank . . . . . . . 56--63
Dimitrios Kokkinakis and
Markus Forsberg and
Sofie Johansson Kokkinakis and
Frida Smith Literacy Demands and Information to
Cancer Patients . . . . . . . . . . . . 64--71
Aleksander Wawer and
Konrad Go\luchowski Expanding Opinion Attribute Lexicons . . 72--80
Adam Radziszewski and
Szymon Aceda\'nski Taggers Gonna Tag: An Argument against
Evaluating Disambiguation Capacities of
Morphosyntactic Taggers . . . . . . . . 81--87
Marcin Woli\'nski and
Andrzej Zaborowski An Ambiguity Aware Treebank Search Tool 88--94
Georgios Petasis and
Mara Tsoumari A New Annotation Tool for Aligned
Bilingual Corpora . . . . . . . . . . . 95--104
Frane \vSari\'c and
Jan \vSnajder and
Bojana Dalbelo Ba\vsi\'c Optimizing Sentence Boundary Detection
for Croatian . . . . . . . . . . . . . . 105--111
Filip Grali\'nski Mining the Web for Idiomatic Expressions
Using Metalinguistic Markers . . . . . . 112--118
Katarzyna Krasnowska and
Witold Kiera\'s and
Marcin Woli\'nski and
Adam Przepiórkowski Using Tree Transducers for Detecting
Errors in a Treebank of Polish . . . . . 119--126
Tomá\vs Jelínek and
Barbora \vStindlová and
Alexandr Rosen and
Jirka Hana Combining Manual and Automatic
Annotation of a Learner Corpus . . . . . 127--134
Márton Kiss and
Ágoston Nagy and
Veronika Vincze and
Attila Almási and
Zoltán Alexin and
János Csirik A Manually Annotated Corpus of
Pharmaceutical Patents . . . . . . . . . 135--142
Adam Radziszewski and
Adam Pawlaczek Large-Scale Experiments with NP Chunking
of Polish . . . . . . . . . . . . . . . 143--149
Milena Slavcheva Mapping a Lexical Semantic Resource to a
Common Framework of Computational
Lexicons . . . . . . . . . . . . . . . . 150--157
Václava Kettnerová and
Markéta Lopatková and
Zde\vnka Ure\vsová The Rule-Based Approach to Czech
Grammaticalized Alternations . . . . . . 158--165
Goran Glava\vs and
Jan \vSnajder and
Bojana Dalbelo Ba\vsi\'c Semi-supervised Acquisition of Croatian
Sentiment Lexicon . . . . . . . . . . . 166--173
Anonymous Front Matter . . . . . . . . . . . . . . ??