Last update:
Sat Aug 31 12:36:59 MDT 2024
Xi Guo and Chuan Xiao and Yoshiharu Ishikawa Combination Skyline Queries . . . . . . 1--30 Gabriele Kern-Isberner and Christoph Beierle Comparing and Evaluating Approaches to Probabilistic Reasoning: Theory, Implementation, and Applications . . . . 31--75 Bernhard Thalheim The Science and Art of Conceptual Modelling . . . . . . . . . . . . . . . 76--105 Lasanthi Heendaliya and Dan Lin and Ali Hurson Predictive Line Queries for Traffic Prediction . . . . . . . . . . . . . . . 106--133 Athanasia Asiki and Dimitrios Tsoumakos A DHT-Based System for the Management of Loosely Structured, Multidimensional Data . . . . . . . . . . . . . . . . . . 134--166 Béatrice Bouchou and Mirian Halfeld-Ferrari A Grammarware for the Incremental Validation of Integrity Constraints on XML Documents under Multiple Updates . . 167--197 Huiping Cao and Shawn Bowers Database Support for Enabling Data-Discovery Queries over Semantically-Annotated Observational Data . . . . . . . . . . . . . . . . . . 198--228 Jingyu Han and Kejia Chen and Dawei Jiang Probabilistically Ranking Web Article Quality Based on Evolution Patterns . . 229--258 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Thomas E. Hampshire and Holger R. Roth and Darren J. Boone and Greg Slabaugh and Steve Halligan Prone to Supine CT Colonography Registration Using a Landmark and Intensity Composite Method . . . . . . . 1--9 Holger R. Roth and Darren J. Boone and Steve Halligan and Thomas E. Hampshire External Clinical Validation of Prone and Supine CT Colonography Registration 10--19 Rui Shi and Wei Zeng and Jerome Zhengrong Liang and Xianfeng David Gu Efficient Topological Cleaning for Visual Colon Surface Flattening . . . . 20--29 Janne J. Näppi and Se Hyung Kim and Hiroyuki Yoshida Adaptive Volumetric Detection of Lesions for Minimal-Preparation Dual-Energy CT Colonography . . . . . . . . . . . . . . 30--39 Janne J. Näppi and Masanori Imuta and Yasuyuki Yamashita and Hiroyuki Yoshida Computer-Aided Detection for Ultra-Low-Dose CT Colonography . . . . . 40--48 Chang Won Kim and Jong Hyo Kim Application of CT Simulation Technique for Virtual Ultra-Low-Dose Trial in CT Colonography . . . . . . . . . . . . . . 49--57 Zepa Yang and Hyeong-min Jin and Jong Hyo Kim Application of CT Simulation Technique for Virtual Fecal Tagging in CTC . . . . 58--68 Janne J. Näppi and Don Rockey and Daniele Regge and Hiroyuki Yoshida Application of CT Acquisition Parameters as Features in Computer-Aided Detection for CT Colonography . . . . . . . . . . 69--77 Sang Ho Lee and Janne J. Näppi and Hiroyuki Yoshida Comparative Performance of State-of-the-Art Classifiers in Computer-Aided Detection for CT Colonography . . . . . . . . . . . . . . 78--87 Wenli Cai and June-Goo Lee and Da Zhang and Christina Piel and Hiroyuki Yoshida Piecewise Structural Diffusion Defined on Shape Index for Noise Reduction in Dual-Energy CT Images . . . . . . . . . 88--96 Dwarikanath Mahapatra and Peter Schueffler and Jeroen A. W. Tielbeek and Joachim M. Buhmann A Supervised Learning Based Approach to Detect Crohn's Disease in Abdominal MR Volumes . . . . . . . . . . . . . . . . 97--106 Mehmet Yigitsoy and Sonja Kirchhoff and Maximilian F. Reiser and Nassir Navab Out-of-Plane Motion Compensation in Cine-MRI . . . . . . . . . . . . . . . . 107--115 Ruwan Nawarathna and JungHwan Oh and Jayantha Muthukudage and Wallapak Tavanapong and Johnny Wong Real-Time Phase Boundary Detection for Colonoscopy Videos Using Motion Vector Templates . . . . . . . . . . . . . . . 116--125 Sho Tomoshige and Elco Oost and Akinobu Shimizu and Hidefumi Watanabe and Hidefumi Kobatake Relaxed Conditional Statistical Shape Models and Their Application to Non-contrast Liver Segmentation . . . . 126--136 Silja Kiriyanthan and Ketut Fundana and Tahir Majeed and Philippe C. Cattin A Landmark-Based Primal-Dual Approach for Discontinuity Preserving Registration . . . . . . . . . . . . . . 137--146 Golnoosh Samei and Christine Tanner and Gabor Székely Predicting Liver Motion Using Exemplar Models . . . . . . . . . . . . . . . . . 147--157 Sanat Upadhyay and Manos Papadakis and Saurabh Jain and Gregory Gladish Semi-automatic Discrimination of Normal Tissue and Liver Cancer Lesions in Contrast Enhanced X-Ray CT-Scans . . . . 158--167 Ha Manh Luu and Adriaan Moelker and Camiel Klink and Adrienne Mendrik and Wiro Niessen Evaluation of Diffusion Filters for $3$D CTA Liver Vessel Enhancement . . . . . . 168--177 Weimin Huang and Wei Xiong and Jiayin Zhou and Jing Zhang and Tao Yang and Jiang Liu and Yi Su $3$D Shape Analysis for Liver-Gallbladder Anatomical Structure Retrieval . . . . . . . . . . . . . . . 178--187 Jianfei Liu and Shijun Wang and Marius G. Linguraru and Ronald M. Summers Tumor Sensitive Matching Flow: An Approach for Ovarian Cancer Metastasis Detection and Segmentation . . . . . . . 188--197 Anonymous Front Matter . . . . . . . . . . . . . . ??
Mike P. Papazoglou Cloud Blueprint: a Model-Driven Approach to Configuring Federated Clouds . . . . 1--1 Eric Féron Model-Based Auto Coding of Embedded Control Software with Full Semantics . . 2--2 Roula Karam and Piero Fraternali and Alessandro Bozzon and Luca Galli Modeling End-Users as Contributors in Human Computation Applications . . . . . 3--15 Diego Rodríguez-Gracia and Javier Criado and Luis Iribarne and Nicolás Padilla Runtime Adaptation of Architectural Models: An Approach for Adapting User Interfaces . . . . . . . . . . . . . . . 16--30 Carlo Batini and Marco Comerio and Gianluigi Viscusi Managing Quality of Large Set of Conceptual Schemas in Public Administration: Methods and Experiences 31--42 Sébastien Maitrehenry and Sylvain Metge and Yamine A\"\it-Ameur and Pierre Bieber An MDE-Based Synthesis of Aircraft Safety Models . . . . . . . . . . . . . 43--54 Selma Djeddai and Martin Strecker and Mohamed Mezghiche Integrating a Formal Development for DSLs into Meta-modeling . . . . . . . . 55--66 Emsaieb Geepalla and Behzad Bordbar and Joel Last Transformation of Spatio-Temporal Role Based Access Control Specification to Alloy . . . . . . . . . . . . . . . . . 67--78 Nesrine Ben Mustapha and Marie-Aude Aufaure and Hajer Baazaoui Zghal and Henda Ben Ghezala Modular Ontological Warehouse for Adaptative Information Search . . . . . 79--90 Meriem Djezzar and Mounir Hemam and Zizette Boufaida Ontological Re-classification of Individuals: a Multi-viewpoints Approach 91--102 Jesús M. Almendros-Jiménez and Luis Iribarne Transformation and Validation with SWRL and OWL of ODM-Based Models . . . . . . 103--115 Takashi Yanagisawa and Takao Miura Context-Based Query Using Dependency Structures Based on Latent Topic Model 116--128 Nour El Islem Karabadji and Hassina Seridi and Ilyes Khelf and Lakhdar Laouar Decision Tree Selection in an Industrial Machine Fault Diagnostics . . . . . . . 129--140 Fairouz Dahi and Nora Bounour Crosscutting Concerns Identification Approach Based on the Sequence Diagram Analysis . . . . . . . . . . . . . . . . 141--152 Franck Barbier and Eric Cariou Inductive UML . . . . . . . . . . . . . 153--161 Anthony Fernandes Pires and Thomas Polacsek and Stéphane Duprat Formal Software Verification at Model and at Source Code Levels . . . . . . . 162--169 Rania Soussi and Marie-Aude Aufaure Enterprise Ontology Learning for Heterogeneous Graphs Extraction . . . . 170--177 Sa\"\id Taktak and Jamel Feki Toward Propagating the Evolution of Data Warehouse on Data Marts . . . . . . . . 178--185 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Lee Harland Open PHACTS: a Semantic Knowledge Infrastructure for Public and Commercial Drug Discovery Research . . . . . . . . 1--7 Camille Pradel Allowing End Users to Query Graph-Based Knowledge Bases . . . . . . . . . . . . 8--15 Victor de Boer and Michiel Hildebrand and Lora Aroyo and Pieter De Leenheer and Chris Dijkshoorn Nichesourcing: Harnessing the Power of Crowds of Experts . . . . . . . . . . . 16--20 Jodi Schneider and Brian Davis and Adam Wyner Dimensions of Argumentation in Social Media . . . . . . . . . . . . . . . . . 21--25 Claudia d'Amato and Volha Bryl and Luciano Serafini Semantic Knowledge Discovery from Heterogeneous Data Sources . . . . . . . 26--31 Arash Joorabchi and Abdulhussain E. Mahdi Automatic Subject Metadata Generation for Scientific Documents Using Wikipedia and Genetic Algorithms . . . . . . . . . 32--41 Sébastien Ferré and Sebastian Rudolph Advocatus Diaboli --- Exploratory Enrichment of Ontologies with Negative Constraints . . . . . . . . . . . . . . 42--56 Lorenz Bühmann and Jens Lehmann Universal OWL Axiom Enrichment for Large Knowledge Bases . . . . . . . . . . . . 57--71 Chiraz Latiri and Lamia Ben Ghezaiel and Mohamed Ben Ahmed Proxemic Conceptual Network Based on Ontology Enrichment for Representing Documents in IR . . . . . . . . . . . . 72--86 Daniel Gerber and Axel-Cyrille Ngonga Ngomo Extracting Multilingual Natural-Language Patterns for RDF Predicates . . . . . . 87--96 Myung Hee Kim and Paul Compton Improving the Performance of a Named Entity Recognition System with Knowledge Acquisition . . . . . . . . . . . . . . 97--113 Valentina Presutti and Francesco Draicchio and Aldo Gangemi Knowledge Extraction Based on Discourse Representation Theory and Linguistic Frames . . . . . . . . . . . . . . . . . 114--129 Sara Tonelli and Volha Bryl and Claudio Giuliano and Luciano Serafini Investigating the Semantics of Frame Elements . . . . . . . . . . . . . . . . 130--143 Manuel Atencia and Jérôme David and François Scharffe Keys and Pseudo-Keys Detection for Web Datasets Cleansing and Interlinking . . 144--153 Renata Dividino and Gerd Gröner and Stefan Scheglmann and Matthias Thimm Ranking RDF with Provenance via Preference Aggregation . . . . . . . . . 154--163 Jürgen Umbrich and Marcel Karnstedt and Aidan Hogan and Josiane Xavier Parreira Freshening up while Staying Fast: Towards Hybrid SPARQL Queries . . . . . 164--174 Sebastian Hellmann and Jens Lehmann and Sören Auer Linked-Data Aware URI Schemes for Referencing Text Fragments . . . . . . . 175--184 Alice Hermann and Sébastien Ferré and Mireille Ducassé An Interactive Guidance Process Supporting Consistent Updates of RDFS Graphs . . . . . . . . . . . . . . . . . 185--199 Stéphane Campinas and Renaud Delbru and Giovanni Tummarello Effective Retrieval Model for Entity with Multi-valued Attributes: BM25MF and Beyond . . . . . . . . . . . . . . . . . 200--215 Eva Blomqvist and Azam Seil Sepour and Valentina Presutti Ontology Testing- Methodology and Tool 216--226 Anonymous Front Matter . . . . . . . . . . . . . . ??
Ji\vrí Wiedermann Computability and Non-computability Issues in Amorphous Computing . . . . . 1--9 Davide Ancona and Giovanni Lagorio Static Single Information Form for Abstract Compilation . . . . . . . . . . 10--27 Suna Bensch and Markus Holzer and Martin Kutrib and Andreas Malcher Input-Driven Stack Automata . . . . . . 28--42 Marijke Hans L. Bodlaender Probabilistic Inference and Monadic Second Order Logic . . . . . . . . . . . 43--56 Marijke Hans L. Bodlaender and Cor A. J. Hurkens Cinderella versus the Wicked Stepmother 57--71 Michele Boreale and Michela Paolini Worst- and Average-Case Privacy Breaches in Randomization Mechanisms . . . . . . 72--86 Tomasz Brengos Weak Bisimulations for Coalgebras over Ordered Functors . . . . . . . . . . . . 87--103 Arnaud Carayol and Zoltán Ésik A Context-Free Linear Ordering with an Undecidable First-Order Theory . . . . . 104--118 Yuxin Deng and Yuan Feng Open Bisimulation for Quantum Processes 119--133 Fabio Gadducci and Giacoma Valentina Monreale and Ugo Montanari A Modular LTS for Open Reactive Systems 134--148 Petr Jan\vcar and Prateek Karandikar and Philippe Schnoebelen Unidirectional Channel Systems Can Be Tested . . . . . . . . . . . . . . . . . 149--163 Galina Jirásková and Tomá\vs Masopust On Properties and State Complexity of Deterministic State-Partition Automata 164--178 Galina Jirásková and Benedek Nagy On Union-Free and Deterministic Union-Free Languages . . . . . . . . . . 179--192 Alexander Kurz and Tomoyuki Suzuki and Emilio Tuosto A Characterisation of Languages on Infinite Alphabets with Nominal Regular Expressions . . . . . . . . . . . . . . 193--208 Philipp Küfner and Uwe Nestmann and Christina Rickmann Formal Verification of Distributed Algorithms . . . . . . . . . . . . . . . 209--224 Salvatore La Torre and Margherita Napoli A Temporal Logic for Multi-threaded Programs . . . . . . . . . . . . . . . . 225--239 Hongyu Liang The Algorithmic Complexity of $k$-Domatic Partition of Graphs . . . . 240--249 Bas Luttik Unique Parallel Decomposition in Branching and Weak Bisimulation Semantics . . . . . . . . . . . . . . . 250--264 Gerald Lüttgen and Walter Vogler Modal Interface Automata . . . . . . . . 265--279 Emmanuel Beffara and Virgile Mogbil Proofs as Executions . . . . . . . . . . 280--294 Anonymous Front Matter . . . . . . . . . . . . . . ??
Amihood Amir and Avivit Levy Approximate Period Detection and Correction . . . . . . . . . . . . . . . 1--15 Ricardo Baeza-Yates and Yoelle Maarek Usage Data in Web Search: Benefits and Limitations . . . . . . . . . . . . . . 16--16 Ian Witten Semantic Document Representation: Do It with Wikification . . . . . . . . . . . 17--17 Artur Abdullin and Olfa Nasraoui Clustering Heterogeneous Data with Mutual Semi-supervision . . . . . . . . 18--29 Andrés Abeliuk and Gonzalo Navarro Compressed Suffix Trees for Repetitive Texts . . . . . . . . . . . . . . . . . 30--41 Amihood Amir and Haim Paryenty and Liam Roditty Configurations and Minority in the String Consensus Problem . . . . . . . . 42--53 Xiangdong An and Nick Cercone and Hai Wang A Study on Novelty Evaluation in Biomedical Information Retrieval . . . . 54--60 Golnaz Badkobeh and Maxime Crochemore Computing the Maximal-Exponent Repeats of an Overlap-Free String in Linear Time 61--72 Krisztian Balog and Robert Neumayer Collection Ranking and Selection for Federated Entity Search . . . . . . . . 73--85 Hideo Bannai and Shunsuke Inenaga Efficient LZ78 Factorization of Grammar Compressed Text . . . . . . . . . . . . 86--98 Timo Beller and Katharina Berger Space-Efficient Computation of Maximal and Supermaximal Repeats in Genome Sequences . . . . . . . . . . . . . . . 99--110 Lamjed Ben Jabeur and Lynda Tamine Active Microbloggers: Identifying Influencers, Leaders and Discussers in Microblogging Networks . . . . . . . . . 111--117 Etienne Birmelé and Pierluigi Crescenzi Efficient Bubble Enumeration in Directed Graphs . . . . . . . . . . . . . . . . . 118--129 Guillaume Blin and Minghui Jiang The Longest Common Subsequence Problem with Crossing-Free Arc-Annotated Sequences . . . . . . . . . . . . . . . 130--142 Felipe Bravo-Marquez and Manuel Manriquez A Zipf-Like Distant Supervision Approach for Multi-document Summarization Using Wikinews Articles . . . . . . . . . . . 143--154 Nieves R. Brisaboa and Ana Cerdeira-Pena Ranked Document Retrieval in (Almost) No Space . . . . . . . . . . . . . . . . . 155--160 B. Barla Cambazoglu Impact of Regionalization on Performance of Web Search Engine Result Caches . . . 161--166 Francisco Claude and Gonzalo Navarro The Wavelet Matrix . . . . . . . . . . . 167--179 Francisco Claude and Gonzalo Navarro Improved Grammar-Based Compressed Indexes . . . . . . . . . . . . . . . . 180--192 Clément de Groc and Xavier Tannier Experiments on Pseudo Relevance Feedback Using Graph Random Walks . . . . . . . . 193--198 Anonymous Front Matter . . . . . . . . . . . . . . ??
Dirk Beyer and Alexander K. Petrenko Linux Driver Verification . . . . . . . 1--6 Joost Kok and Anna-Lena Lamprecht and Fons J. Verbeek and Mark D. Wilkinson Bioscientific Data Processing and Modeling . . . . . . . . . . . . . . . . 7--11 Hernando Sanchez-Faddeev and Michael T. M. Emmerich and Fons J. Verbeek and Andrew H. Henry Using Multiobjective Optimization and Energy Minimization to Design an Isoform-Selective Ligand of the 14-3-3 Protein . . . . . . . . . . . . . . . . 12--24 Kuan Yan and Fons J. Verbeek Segmentation for High-Throughput Image Analysis: Watershed Masked Clustering 25--41 Alexander E. Nezhinsky and Fons J. Verbeek Efficient and Robust Shape Retrieval from Deformable Templates . . . . . . . 42--55 Ian Wood and Ben Vandervalk and Luke McCarthy and Mark D. Wilkinson OWL-DL Domain-Models as Abstract Workflows . . . . . . . . . . . . . . . 56--66 Andrea Braun von Reinersdorff and Tiziana Margaria and Christoph Rasche Processes and Data Integration in the Networked Healthcare . . . . . . . . . . 67--69 Tiziana Margaria and Steve Boßelmann and Bertold Kujath Simple Modeling of Executable Role-Based Workflows: An Application in the Healthcare Domain . . . . . . . . . . . 70--72 Andreas Holubek and Christian Metzger Considerations for Healthcare Applications in a Platform as a Service Environment . . . . . . . . . . . . . . 73--74 Markus Doedt and Thomas Göke and Jan Pardo and Bernhard Steffen Reha-Sports: The Challenge of Small Margin Healthcare Accounting . . . . . . 75--77 Björn Lisper and Johan Nordlander and Sophie Quinton Timing Constraints: Theory Meets Practice . . . . . . . . . . . . . . . . 78--79 Björn Lisper and Johan Nordlander A Simple and Flexible Timing Constraint Logic . . . . . . . . . . . . . . . . . 80--95 Sophie Quinton and Rolf Ernst Generalized Weakly-Hard Constraints . . 96--110 Marie-Agn\`es Peraldi-Frati and Arda Goknil and Morayo Adedjouma and Pierre Yves Gueguen Modeling a BSG-E Automotive System with the Timing Augmented Description Language . . . . . . . . . . . . . . . . 111--125 Iakovos Ouranos and Kazuhiro Ogata and Petros Stefaneas Formal Analysis of TESLA Protocol in the Timed OTS/CafeOBJ Method . . . . . . . . 126--142 Ning Ge and Marc Pantel and Xavier Crégut Formal Specification and Verification of Task Time Constraints for Real-Time Systems . . . . . . . . . . . . . . . . 143--157 Raimund Kirner The WCET Analysis Tool CalcWcet167 . . . 158--172 Klaus Birken Abstract Execution for Event-Driven Systems --- An Application from Automotive/Infotainment Development . . 173--186 Alessandro Fantechi and Francesco Flammini and Stefania Gnesi Formal Methods for Intelligent Transportation Systems . . . . . . . . . 187--189 Francesco Flammini and Stefano Marrone and Nicola Mazzocca and Roberto Nardone Model-Driven V&V Processes for Computer Based Control Systems: a Unifying Perspective . . . . . . . . . . . . . . 190--204 Anonymous Front Matter . . . . . . . . . . . . . . ??
Yehuda Afek and Haim Kaplan and Boris Korenfeld and Adam Morrison and Robert E. Tarjan CBTree: a Practical Concurrent Self-Adjusting Search Tree . . . . . . . 1--15 Faith Ellen and Vijaya Ramachandran and Philipp Woelfel Efficient Fetch-and-Increment . . . . . 16--30 Alexey Gotsman and Madanlal Musuvathi and Hongseok Yang Show No Weakness: Sequentially Consistent Specifications of TSO Libraries . . . . . . . . . . . . . . . 31--45 Julian Anaya and Jérémie Chalopin and Jurek Czyzowicz and Arnaud Labourel and Andrzej Pelc Collecting Information by Power-Aware Mobile Agents . . . . . . . . . . . . . 46--60 Ofer Feinerman and Amos Korman Memory Lower Bounds for Randomized Collaborative Search and Implications for Biology . . . . . . . . . . . . . . 61--75 Chen Chen and Roman Vitenberg and Hans-Arno Jacobsen A Generalized Algorithm for Publish/Subscribe Overlay Design and Its Fast Implementation . . . . . . . . . . 76--90 Keren Censor-Hillel and Bernhard Haeupler and Nancy Lynch and Muriel Médard Bounded-Contention Coding for Wireless Networks in the High SNR Regime . . . . 91--105 Tomasz Jurdzinski and Dariusz R. Kowalski Distributed Backbone Structure for Algorithms in the SINR Model of Wireless Networks . . . . . . . . . . . . . . . . 106--120 Marcin Bienkowski and Tomasz Jurdzinski and Miroslaw Korzeniowski and Dariusz R. Kowalski Distributed Online and Stochastic Queuing on a Multiple Access Channel . . 121--135 Atish Das Sarma and Anisur Rahaman Molla and Gopal Pandurangan Fast Distributed Computation in Dynamic Networks via Random Walks . . . . . . . 136--150 Atish Das Sarma and Ashwin Lall and Danupon Nanongkai and Amitabh Trehan Dense Subgraphs on Dynamic Networks . . 151--165 Bernhard Haeupler and Fabian Kuhn Lower Bounds on Information Dissemination in Dynamic Networks . . . 166--180 Mika Göös and Jukka Suomela No Sublogarithmic-Time Approximation Scheme for Bipartite Vertex Cover . . . 181--194 Danny Dolev and Christoph Lenzen and Shir Peled ``Tri, Tri Again'': Finding Triangles and Small Subgraphs in a Distributed Setting . . . . . . . . . . . . . . . . 195--209 Andrzej Czygrinow and Michal Han\'ckowiak and Edyta Szyma\'nska and Wojciech Wawrzyniak Distributed $2$-Approximation Algorithm for the Semi-matching Problem . . . . . 210--222 Mohsen Ghaffari and Bernhard Haeupler and Nancy Lynch and Calvin Newport Bounds on Contention Management in Radio Networks . . . . . . . . . . . . . . . . 223--237 Sebastian Daum and Fabian Kuhn and Calvin Newport Efficient Symmetry Breaking in Multi-Channel Radio Networks . . . . . . 238--252 Alexandre Maurer and Sébastien Tixeuil On Byzantine Broadcast in Loosely Connected Networks . . . . . . . . . . . 253--266 Abhijeet Pareek and Philipp Woelfel RMR-Efficient Randomized Abortable Mutual Exclusion . . . . . . . . . . . . 267--281 Prasad Jayanti and Zhiyu Liu Abortable Reader-Writer Locks Are No More Complex Than Abortable Mutex Locks 282--296 Anonymous Front Matter . . . . . . . . . . . . . . ??
Ewen Denney and Ganesh Pai A Lightweight Methodology for Safety Case Assembly . . . . . . . . . . . . . 1--12 André Alexandersen Hauge and Ketil Stòlen A Pattern-Based Method for Safe Control Systems Exemplified within Nuclear Power Production . . . . . . . . . . . . . . . 13--24 Silvia Gil Casals and Philippe Owezarski and Gilles Descargues Risk Assessment for Airworthiness Security . . . . . . . . . . . . . . . . 25--36 Christoph Läsche and Eckard Böde and Thomas Peikenkamp A Method for Guided Hazard Identification and Risk Mitigation for Offshore Operations . . . . . . . . . . 37--48 Manfred Schäfer Risk Analysis and Software Integrity Protection for 4G Network Elements in ASMONIA . . . . . . . . . . . . . . . . 49--61 Christoph Woskowski Applying Industrial-Strength Testing Techniques to Critical Care Medical Equipment . . . . . . . . . . . . . . . 62--73 Viacheslav Izosimov and Urban Ingelsson and Andreas Wallin Requirement Decomposition and Testability in Development of Safety-Critical Automotive Components 74--86 Jan Krause and Elke Hintze and Stephan Magnus and Christian Diedrich Model Based Specification, Verification, and Test Generation for a Safety Fieldbus Profile . . . . . . . . . . . . 87--98 Ernest Edifor and Martin Walker and Neil Gordon Quantification of Priority-OR Gates in Temporal Fault Trees . . . . . . . . . . 99--110 Michael Glaß and Heng Yu and Felix Reimann and Jürgen Teich Cross-Level Compositional Reliability Analysis for Embedded Systems . . . . . 111--124 Tobias Hoppe and Sven Kuhlmann and Stefan Kiltz and Jana Dittmann IT-Forensic Automotive Investigations on the Example of Route Reconstruction on Automotive System and Communication Data 125--136 Hans-Hermann Bock and Jens Braband and Birgit Milius and Hendrik Schäbe Towards an IT Security Protection Profile for Safety-Related Communication in Railway Automation . . . . . . . . . 137--148 Felix Wieczorek and Christoph Krauß and Frank Schiller and Claudia Eckert Towards Secure Fieldbus Communication 149--160 Andrey Zakonov and Anatoly Shalyto Extracting EFSMs of Web Applications for Formal Requirements Specification . . . 161--172 Irene Bicchierai and Giacomo Bucci and Carlo Nocentini and Enrico Vicario An Ontological Approach to Systematization of SW-FMEA . . . . . . . 173--184 Roberto Baldoni and Giorgia Lodi and Luca Montanari and Guido Mariotta and Marco Rizzuto Online Black-Box Failure Prediction for Mission Critical Distributed Systems . . 185--197 Domenico Di Leo and Fatemeh Ayatolahi and Behrooz Sangchoolie and Johan Karlsson On the Impact of Hardware Faults --- An Investigation of the Relationship between Workload Inputs and Failure Mode Distributions . . . . . . . . . . . . . 198--209 Anton Tarasyuk and Inna Pereverzeva and Elena Troubitsyna and Timo Latvala and Laura Nummila Formal Development and Assessment of a Reconfigurable On-board Satellite System 210--222 Olof Hannius and Johan Karlsson Impact of Soft Errors in a Jet Engine Controller . . . . . . . . . . . . . . . 223--234 Ludovic Pintard and Christel Seguin and Jean-Paul Blanquart Which Automata for Which Safety Assessment Step of Satellite FDIR? . . . 235--246 Anonymous Front Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . 1--1 Alejandra Ruiz and Tim P. Kelly and Mehrdad Sabetzadeh and Didier Van Den Abeele Introduction to Sassur 2012 . . . . . . 3--7 Ewen Denney and Ganesh Pai and Josef Pohl AdvoCATE: An Assurance Case Automation Toolset . . . . . . . . . . . . . . . . 8--21 Alejandra Ruiz and Ibrahim Habli and Huáscar Espinoza Towards a Case-Based Reasoning Approach for Safety Assurance Reuse . . . . . . . 22--35 Jasen Markovski and J. M. van de Mortel-Fronczak Modeling for Safety in a Synthesis-Centric Systems Engineering Framework . . . . . . . . . . . . . . . 36--49 Fabien Belmonte and Elie Soubiran A Model Based Approach for Safety Analysis . . . . . . . . . . . . . . . . 50--63 Jose Luis de la Vara and Sunil Nair and Eric Verhulst and Janusz Studzizba and Piotr Pepek Towards a Model-Based Evolutionary Chain of Evidence for Compliance with Safety Standards . . . . . . . . . . . . . . . 64--78 Xingyu Zhao and Dajian Zhang and Minyan Lu and Fuping Zeng A New Approach to Assessment of Confidence in Assurance Cases . . . . . 79--91 Eric Verhulst and Bernhard H. C. Sputh An Unified Meta-model for Trustworthy Systems Engineering . . . . . . . . . . 92--105 Anna Lanzaro and Antonio Pecchia and Marcello Cinque and Domenico Cotroneo and Ricardo Barbosa A Preliminary Fault Injection Framework for Evaluating Multicore Systems . . . . 106--116 Daniel Kästner and Marc Schlickling and Markus Pister and Christoph Cullmann and Gernot Gebhard Meeting Real-Time Requirements with Multi-core Processors . . . . . . . . . 117--131 Patrick J. Graydon and Tim P. Kelly Assessing Software Interference Management When Modifying Safety-Related Software . . . . . . . . . . . . . . . . 132--145 Anonymous Front Matter . . . . . . . . . . . . . . 147--147 António Casimiro and Jörg Kaiser Introduction to ASCoMS 2012 . . . . . . 149--150 Luís Marques and António Casimiro Towards Dependable and Stable Perception in Smart Environments with Timing and Value Faults . . . . . . . . . . . . . . 151--161 Sebastian Zug and Tino Brade and Jörg Kaiser and Sasanka Potluri An Approach Supporting Fault-Propagation Analysis for Smart Sensor Systems . . . 162--173 Kenneth Östberg and Rolf Johansson Use of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles . . . . . . . . . . . . . . . . 174--179 Christian Berger From Autonomous Vehicles to Safer Cars: Selected Challenges for the Software Engineering . . . . . . . . . . . . . . 180--189 Oscar Ljungkrantz and Henrik Lönn and Hans Blom and Cecilia Ekelin and Daniel Karlsson Modelling of Safety-Related Timing Constraints for Automotive Embedded Systems . . . . . . . . . . . . . . . . 190--201 Anonymous Front Matter . . . . . . . . . . . . . . 203--203 Christian Esposito and Marco Platania and Francesco Brancati Introduction to DESEC4LCCI 2012 . . . . 205--208 Leonardo Montecchi and Paolo Lollini and Andrea Bondavalli and Ernesto La Mattina Quantitative Security Evaluation of a Multi-biometric Authentication System 209--221 Luigi Romano and Salvatore D'Antonio and Valerio Formicola and Luigi Coppolino Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology . . . . . . . . . . . . . . . 222--234 Anonymous Front Matter . . . . . . . . . . . . . . ??
Takako Aikawa and Kentaro Yamamoto and Hitoshi Isahara The Impact of Crowdsourcing Post-editing with the Collaborative Translation Framework . . . . . . . . . . . . . . . 1--10 Shaoyu Chen and Tadahiro Matsumoto Translation of Quantifiers in Japanese--Chinese Machine Translation 11--22 Hitoshi Isahara Toward Practical Use of Machine Translation . . . . . . . . . . . . . . 23--27 Jun Sakata and Masato Tokuhisa and Jin'ichi Murakami Phrase-Level Pattern-Based Machine Translation Based on Analogical Mapping Method . . . . . . . . . . . . . . . . . 28--39 Haithem Afli and Lo\"\ic Barrault and Holger Schwenk Parallel Texts Extraction from Multimodal Comparable Corpora . . . . . 40--51 Gan Jin and Natallia Khatseyeva A Reliable Communication System to Maximize the Communication Quality . . . 52--63 Gaël Lejeune and Romain Brixtel and Antoine Doucet and Nadine Lucas DAnIEL: Language Independent Character-Based News Surveillance . . . 64--75 Jian Qu and Akira Shimazu and Minh Le Nguyen OOV Term Translation, Context Information and Definition Extraction Based on OOV Term Type Prediction . . . 76--87 Fatiha Sadat Exploiting a Web-Based Encyclopedia as a Knowledge Base for the Extraction of Multilingual Terminology . . . . . . . . 88--96 Jyoti Srivastava and Sudip Sanyal Segmenting Long Sentence Pairs to Improve Word Alignment in English--Hindi Parallel Corpora . . . . . . . . . . . . 97--107 Hoai-Thu Vuong and Dao Ngoc Tu and Minh Le Nguyen and Vinh Van Nguyen Shallow Syntactic Preprocessing for Statistical Machine Translation . . . . 108--117 Paul Brillant Feuto Njonko and Sylviane Cardey-Greenfield and Peter Greenfield Linguistic Rules Based Approach for Automatic Restoration of Accents on French Texts . . . . . . . . . . . . . . 118--125 Masood Ghayoomi Word Clustering for Persian Statistical Parsing . . . . . . . . . . . . . . . . 126--137 Wannachai Kampeera and Sylviane Cardey-Greenfield Building a Lexically and Semantically-Rich Resource for Paraphrase Processing . . . . . . . . . 138--143 Bartosz Zaborowski and Adam Przepiórkowski Tagset Conversion with Decision Trees 144--155 Elizaveta Zimina Fitting a Round Peg in a Square Hole: Japanese Resource Grammar in GF . . . . 156--167 Ahmed H. Aliwy Arabic Language Analyzer with Lemma Extraction and Rich Tagset . . . . . . . 168--179 Jorge J. García Flores and Pierre Zweigenbaum and Zhao Yue and William Turner Tracking Researcher Mobility on the Web Using Snippet Semantic Analysis . . . . 180--191 Konrad Go\luchowski and Adam Przepiórkowski Semantic Role Labelling without Deep Syntactic Parsing . . . . . . . . . . . 192--197 Przemys\law Jarz\kebowski and Adam Przepiórkowski Temporal Information Extraction with Cross-Language Projected Data . . . . . 198--209 Anonymous Front Matter . . . . . . . . . . . . . . ??
Thomas P. Kersten and Maren Lindstaedt Image-Based Low-Cost Systems for Automatic $3$D Recording and Modelling of Archaeological Finds and Objects . . 1--10 Dieter Fritsch and Mohammed Abdel-Wahab and Alessandro Cefalu and Konrad Wenzel Photogrammetric Point Cloud Collection with Multi-camera Systems . . . . . . . 11--20 Immo Trinks and Wolfgang Neubauer and Michael Doneus Prospecting Archaeological Landscapes 21--29 Fabian Hollaus and Melanie Gau and Robert Sablatnig Multispectral Image Acquisition of Ancient Manuscripts . . . . . . . . . . 30--39 Fabio Remondino and Silvio Del Pizzo and Thomas P. Kersten and Salvatore Troisi Low-Cost and Open-Source Solutions for Automated Image Orientation --- a Critical Overview . . . . . . . . . . . 40--54 Thomas P. Kersten and Friedrich Keller and Jerome Saenger and Jochen Schiewe Automated Generation of an Historic $4$D City Model of Hamburg and Its Visualisation with the GE Engine . . . . 55--65 Marcello Balzani and Carlo Bughi and Federico Ferrari and Luca Rossato and Alessandra Tursi Alberti's Box: The Cultural Multimedia Project on the Architectures of Leon Battista Alberti . . . . . . . . . . . . 66--75 Wassim Moussa and Mohammed Abdel-Wahab and Dieter Fritsch Automatic Fusion of Digital Images and Laser Scanner Data for Heritage Preservation . . . . . . . . . . . . . . 76--85 Eirini Bernikola and Elsa Tsiranidou and Vivi Tornari and Vincent Detalle and Jean Luc Bodnar Mapping of Defect Structural Micro-morphology in the Documentation of Conservation Approaches . . . . . . . . 86--96 Dafni Sidiropoulou-Velidou and Andreas Georgopoulos and José Luis Lerma Exploitation of Thermal Imagery for the Detection of Pathologies in Monuments 97--108 Nikolaos Doulamis and Christos Yiakoumettis and George Miaoulis On-line Spectral Learning in Exploring $3$D Large Scale Geo-Referred Scenes . . 109--118 Pierre Drap and Djamal Merad and Julien Seinturier and Jean-Marc Bo\"\i and Daniela Peloso An Information System for Medieval Archaeology Based on Photogrammetry and Archaeological Database: The Shawbak Castle Project . . . . . . . . . . . . . 119--128 Athos Agapiou and Diofantos G. Hadjimitsis and Andreas Georgopoulos and Apostolos Sarris Towards an Archaeological Index: Identification of the Spectral Regions of Stress Vegetation due to Buried Archaeological Remains . . . . . . . . . 129--138 Elena Gigliarelli and Donato Carlea and Angela Corcella and Heleni Porfyriou Historical Social Housing: Smart Analysis and Design for Conservation and Energy Regeneration . . . . . . . . . . 139--148 Karina Rodriguez Echavarria and Jaime Kaminski and David Arnold $3$D Heritage on Mobile Devices: Scenarios and Opportunities . . . . . . 149--158 Philippe Fleury and Sophie Madeleine Reviving Ancient Rome: Virtual Reality at the Service of Cultural Heritage . . 159--169 Georg Zotti and Wolfgang Neubauer Virtual Reconstructions in a Desktop Planetarium for Demonstrations in Cultural Astronomy . . . . . . . . . . . 170--180 Belén Jiménez Fernández-Palacios and Alessandro Rizzi and Francesco Nex Augmented Reality for Archaeological Finds . . . . . . . . . . . . . . . . . 181--190 Hafizur Rahaman and Rana Das and Shehzad Zahir Virtual Heritage: Exploring Photorealism 191--200 Thomas P. Kersten and Maren Lindstaedt Virtual Architectural $3$D Model of the Imperial Cathedral (Kaiserdom) of Königslutter, Germany through Terrestrial Laser Scanning . . . . . . . . . . . . . 201--210 Anonymous Front Matter . . . . . . . . . . . . . . ??
Arjan Blom and Gerhard de Koning Gans and Erik Poll and Joeri de Ruiter and Roel Verdult Designed to Fail: a USB-Connected Reader for Online Banking . . . . . . . . . . . 1--16 Benjamin Adolphi and Hanno Langweg Security Add-Ons for Mobile Platforms 17--30 Torben Jensen and Heine Pedersen and Mads Chr. Olesen and René Rydhof Hansen THAPS: Automated Vulnerability Scanning of PHP Applications . . . . . . . . . . 31--46 Teodor Sommestad and Jonas Hallberg Cyber Security Exercises and Competitions as a Platform for Cyber Security Experiments . . . . . . . . . . 47--60 Tony Proctor The Development of Cyber Security Warning, Advice and Report Points . . . 61--72 Ramona Groner and Philipp Brune Towards an Empirical Examination of IT Security Infrastructures in SME . . . . 73--88 Fabio Massacci and Federica Paci How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners . . . . . . . 89--104 Job Noorman and Nick Nikiforakis and Frank Piessens There Is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication 105--120 Dimiter Milushev and Dave Clarke Coinductive Unwinding of Security-Relevant Hyperproperties . . . 121--136 Björn Ståhl and Per Mellstrand Retooling and Securing Systemic Debugging . . . . . . . . . . . . . . . 137--152 Kirsi Helkala and Nils Kalstad Svendsen and Per Thorsheim and Anders Wiehe Cracking Associative Passwords . . . . . 153--168 Jan Zibuschka and Lothar Fritsch A Hybrid Approach for Highly Available and Secure Storage of Pseudo-SSO Credentials . . . . . . . . . . . . . . 169--183 Behrooz Sangchoolie and Mazdak Rajabi Nasab and Tomas Olovsson and Wolfgang John Assessing the Quality of Packet-Level Traces Collected on Internet Backbone Links . . . . . . . . . . . . . . . . . 184--198 Jason W. Clark Everything But the Kitchen Sink: Determining the Effect of Multiple Attacks on Privacy Preserving Technology Users . . . . . . . . . . . . . . . . . 199--214 Huiying Duan and Cäcilia Zirn Can We Identify Manipulative Behavior and the Corresponding Suspects on Review Websites Using Supervised Learning? . . 215--230 Tobias Pulls Privacy-Friendly Cloud Storage for the Data Track . . . . . . . . . . . . . . . 231--246 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Fatiha Djebbar and Beghdad Ayad Audio Steganalysis Based on Lossless Data-Compression Techniques . . . . . . 1--9 Yang-Wai Chow and Willy Susilo and Duncan S. Wong Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme . . . . . . . . . . . . . . . . . 10--21 Carlos Gañán and Jose L. Muñoz and Oscar Esparza and Jorge Mata-Díaz and Juanjo Alins Impact of the Revocation Service in PKI Prices . . . . . . . . . . . . . . . . . 22--32 Hatem M. Bahig and Ashraf Bhery and Dieaa I. Nassr Cryptanalysis of Multi-Prime RSA with Small Prime Difference . . . . . . . . . 33--44 Jun Xu and Lei Hu and Siwei Sun Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem . . . . . . . . . . . . . . 45--57 Shusheng Liu and Zheng Gong and Libin Wang Improved Related-Key Differential Attacks on Reduced-Round LBlock . . . . 58--69 Yajuan Tang Countermeasures on Application Level Low-Rate Denial-of-Service Attack . . . 70--80 Zouheir Trabelsi and Liren Zhang and Safaa Zeidan Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test 81--92 John Felix and Charles Joseph and Ali A. Ghorbani Group Behavior Metrics for P2P Botnet Detection . . . . . . . . . . . . . . . 93--104 Yuan Ma and Luning Xia and Jingqiang Lin and Jiwu Jing and Zongbin Liu and Xingjie Yu Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA 105--118 Hao Xiong and Cong Zhang and Tsz Hon Yuen and Echo P. Zhang and Siu Ming Yiu and Sihan Qing Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model 119--130 Wilko Henecka and Nigel Bean and Matthew Roughan Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain . . . . . . . . . . . . . 131--141 Yang Wang and Man Ho Au and Willy Susilo Perfect Ambiguous Optimistic Fair Exchange . . . . . . . . . . . . . . . . 142--153 Xiaoqiong Pang and Bo Yang and Qiong Huang Privacy-Preserving Noisy Keyword Search in Cloud Computing . . . . . . . . . . . 154--166 Tsz Hon Yuen and Joseph K. Liu and Xinyi Huang and Man Ho Au and Willy Susilo and Jianying Zhou Forward Secure Attribute-Based Signatures . . . . . . . . . . . . . . . 167--177 Ning Ding and Dawu Gu On Constant-Round Precise Zero-Knowledge 178--190 Jingwei Li and Chunfu Jia and Jin Li and Xiaofeng Chen Outsourcing Encryption of Attribute-Based Encryption with MapReduce . . . . . . . . . . . . . . . 191--201 Atsushi Fujioka and Taiichi Saito and Keita Xagawa Security Enhancement of Identity-Based Identification with Reversibility . . . 202--213 Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture . . . . . . . . . 214--227 Jiawei Zhu and Zhi Guan and Yang Yang and Liangwen Yu and Huiping Sun and Zhong Chen Permission-Based Abnormal Application Detection for Android . . . . . . . . . 228--239 Anonymous Front Matter . . . . . . . . . . . . . . ??
Gavin C. Cawley Over-Fitting in Model Selection and Its Avoidance . . . . . . . . . . . . . . . 1--1 Paola Sebastiani Intelligent Data Analysis of Human Genetic Data . . . . . . . . . . . . . . 2--6 Arno Siebes Queries for Data Analysis . . . . . . . 7--22 Zaenal Akbar and Violeta N. Ivanova and Michael R. Berthold Parallel Data Mining Revisited. Better, Not Faster . . . . . . . . . . . . . . . 23--34 Renato Cordeiro de Amorim and Trevor Fenner Weighting Features for Partition around Medoids Using the Minkowski Metric . . . 35--44 Renato Cordeiro de Amorim and Peter Komisarczuk On Initializations for the Minkowski Weighted K-Means . . . . . . . . . . . . 45--55 Maurice Berk and Giovanni Montana A Skew-$t$-Normal Multi-level Reduced-Rank Functional PCA Model for the Analysis of Replicated Genomics Time Course Data . . . . . . . . . . . . . . 56--66 Mehrez Boulares and Mohamed Jemni Methodological Foundation for Sign Language $3$D Motion Trajectory Analysis 67--77 Christian Braune and Christian Borgelt and Sonja Grün Assembly Detection in Continuous Neural Spike Train Data . . . . . . . . . . . . 78--89 Josep Carmona and Ricard Gavald\`a Online Techniques for Dealing with Concept Drift in Process Mining . . . . 90--102 Jun Chen and Mahdi Mahfouf and Chris Bingham and Yu Zhang and Zhijing Yang and Michael Gallimore An Evolutionary Based Clustering Algorithm Applied to Dada Compression for Industrial Systems . . . . . . . . . 103--113 Wouter Duivesteijn and Eneldo Loza Mencía and Johannes Fürnkranz and Arno Knobbe Multi-label LeGo --- Enhancing Multi-label Classifiers with Local Patterns . . . . . . . . . . . . . . . . 114--125 Andrej Gisbrecht and Daniela Hofmann and Barbara Hammer Discriminative Dimensionality Reduction Mappings . . . . . . . . . . . . . . . . 126--138 Alípio M. Jorge and João Mendes-Moreira and Jorge Freire de Sousa and Carlos Soares Finding Interesting Contexts for Explaining Deviations in Bus Trip Duration Using Distribution Rules . . . 139--149 Frank Klawonn and Nada Abidi and Evelin Berger and Lothar Jänsch Curve Fitting for Short Time Series Data from High Throughput Experiments with Correction for Biological Variation . . 150--160 Kleanthis-Nikolaos Kontonasios and Tijl DeBie Formalizing Complex Prior Information to Quantify Subjective Interestingness of Frequent Pattern Sets . . . . . . . . . 161--171 Christine Largeron and Christophe Moulin and Mathias Géry MCut: a Thresholding Strategy for Multi-label Classification . . . . . . . 172--183 Matthijs van Leeuwen and Diyah Puspitaningrum Improving Tag Recommendation Using Few Associations . . . . . . . . . . . . . . 184--194 Eric Malmi and Juha Raitio and Oskar Kohonen and Krista Lagus and Timo Honkela Identifying Anomalous Social Contexts from Mobile Proximity Data Using Binomial Mixture Models . . . . . . . . 195--206 Jean-Philippe Métivier and Patrice Boizumault and Bruno Crémilleux and Mehdi Khiari Constrained Clustering Using SAT . . . . 207--218 Anonymous Front Matter . . . . . . . . . . . . . . ??
Kirsty Kitto and Fabio Boschetti and Peter Bruza The Quantum Inspired Modelling of Changing Attitudes and Self-organising Societies . . . . . . . . . . . . . . . 1--12 François Dubois and Isabelle Greff and Thomas Hélie On Least Action Principles for Discrete Quantum Scales . . . . . . . . . . . . . 13--23 Dominic Widdows and Trevor Cohen Real, Complex, and Binary Semantic Vectors . . . . . . . . . . . . . . . . 24--35 Diederik Aerts and Jan Broekaert and Liane Gabora and Tomas Veloz The Guppy Effect as Interference . . . . 36--47 Diederik Aerts and Sandro Sozzo and Jocelyn Tapia A Quantum Model for the Ellsberg and Machina Paradoxes . . . . . . . . . . . 48--59 Masanari Asano and Irina Basieva and Andrei Khrennikov and Masanori Ohya A Quantum-Like Model of \em Escherichia coli's Metabolism Based on Adaptive Dynamics . . . . . . . . . . . . . . . . 60--67 Giuseppe Vitiello Fractals, Dissipation and Coherent States . . . . . . . . . . . . . . . . . 68--79 Jerome R. Busemeyer and Zheng Wang and Jennifer S. Trueblood Hierarchical Bayesian Estimation of Quantum Decision Model Parameters . . . 80--89 Trevor Cohen and Dominic Widdows and Lance De Vine and Roger Schvaneveldt Many Paths Lead to Discovery: Analogical Retrieval of Cancer Therapies . . . . . 90--101 Ariane Lambert-Mogiliansky and Jerome R. Busemeyer Emergence and Instability of Individual Identity . . . . . . . . . . . . . . . . 102--113 Diederik Aerts and Sandro Sozzo Entanglement of Conceptual Entities in Quantum Model Theory (QMod) . . . . . . 114--125 Diederik Aerts and Sandro Sozzo Quantum Model Theory (QMod): Modeling Contextual Emergent Entangled Interfering Entities . . . . . . . . . . 126--137 Masanari Asano and Irina Basieva and Andrei Khrennikov and Masanori Ohya Quantum-Like Representation of Irrational Inference . . . . . . . . . . 138--147 Christian Flender and Günter Müller Type Indeterminacy in Privacy Decisions: The Privacy Paradox Revisited . . . . . 148--159 Masanari Asano and Irina Basieva and Andrei Khrennikov and Masanori Ohya Adaptive Dynamics and Its Application to Context Dependent Systems Breaking the Classical Probability Law . . . . . . . 160--171 David Galea and Peter Bruza and Kirsty Kitto and Douglas Nelson Modelling Word Activation in Semantic Networks: Three Scaled Entanglement Models Compared . . . . . . . . . . . . 172--183 Ehtibar N. Dzhafarov and Janne V. Kujala Quantum Entanglement and the Issue of Selective Influences in Psychology: An Overview . . . . . . . . . . . . . . . . 184--195 Thomas Filk Quantum-Like Behavior of Classical Systems . . . . . . . . . . . . . . . . 196--206 Sándor Darányi and Peter Wittek Connecting the Dots: Mass, Energy, Word Meaning, and Particle-Wave Duality . . . 207--217 Michel Gondran and Sébastien Lepaul Indiscernability and Mean Field, a Base of Quantum Interaction . . . . . . . . . 218--226 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Jesse Gray and Cynthia Breazeal Manipulating Mental States through Physical Action . . . . . . . . . . . . 1--14 Jaap Ham and Mirjam van Esch and Yvonne Limpens and Jente de Pee and John-John Cabibihan The Automaticity of Social Behavior towards Robots: The Influence of Cognitive Load on Interpersonal Distance to Approachable versus Less Approachable Robots . . . . . . . . . . . . . . . . . 15--25 Caixia Liu and Jaap Ham and Eric Postma and Cees Midden and Bart Joosten and Martijn Goudbeek How to Make a Robot Smile? Perception of Emotional Expressions from Digitally-Extracted Facial Landmark Configurations . . . . . . . . . . . . . 26--34 Gabriele Trovato and Tatsuhiro Kishi and Nobutsuna Endo and Kenji Hashimoto and Atsuo Takanishi A Cross-Cultural Study on Generation of Culture Dependent Facial Expressions of Humanoid Social Robot . . . . . . . . . 35--44 Mary-Anne Williams Robot Social Intelligence . . . . . . . 45--55 Evgenios Vlachos and Henrik Schärfe Android Emotions Revealed . . . . . . . 56--65 Ben Robins and Kerstin Dautenhahn and Paul Dickerson Embodiment and Cognitive Learning --- Can a Humanoid Robot Help Children with Autism to Learn about Tactile Social Behaviour? . . . . . . . . . . . . . . . 66--75 Alvin Wong and Yeow Kee Tan and Adrian Tay and Anthony Wong and Dilip Kumar Limbu and Tran Anh Dung A User Trial Study to Understand Play Behaviors of Autistic Children Using a Social Robot . . . . . . . . . . . . . . 76--85 Laura Boccanfuso and Eva Juarez Perez and Myra Robinson and Jason M. O'Kane Collecting Heart Rate Using a High Precision, Non-contact, Single-Point Infrared Temperature Sensor . . . . . . 86--97 Michihiro Shimada and Takayuki Kanda and Satoshi Koizumi How Can a Social Robot Facilitate Children's Collaboration? . . . . . . . 98--107 Barbara Klein and Glenda Cook Emotional Robotics in Elder Care --- a Comparison of Findings in the UK and Germany . . . . . . . . . . . . . . . . 108--117 Haibin Yan and Marcelo H. Ang Jr. and Aun Neow Poo Dorothy Robotubby: a Robotic Nanny . . . 118--127 Susanne Frennert and Britt Östlund and Håkan Eftring Would Granny Let an Assistive Robot into Her Home? . . . . . . . . . . . . . . . 128--137 Tobias Körtner and Alexandra Schmid and Daliah Batko-Klein and Christoph Gisinger and Andreas Huber How Social Robots Make Older Users Really Feel Well --- a Method to Assess Users' Concepts of a Social Robotic Assistant . . . . . . . . . . . . . . . 138--147 Rebecca Q. Stafford and Bruce A. MacDonald and Elizabeth Broadbent Identifying Specific Reasons Behind Unmet Needs May Inform More Specific Eldercare Robot Design . . . . . . . . . 148--157 Akira Yamazaki and Ryosuke Masuda Various Foods Handling Movement of Chopstick-Equipped Meal Assistant Robot and There Evaluation . . . . . . . . . . 158--167 Sophya Yumakulov and Dean Yergens and Gregor Wolbring Imagery of Disabled People within Social Robotics Research . . . . . . . . . . . 168--177 I-Han Kuo and Chandimal Jayawardena and Elizabeth Broadbent and Rebecca Q. Stafford HRI Evaluation of a Healthcare Service Robot . . . . . . . . . . . . . . . . . 178--187 Claudia B. Rebola and Gbolabo Ogunmakin and Patricio A. Vela Automated Behavioral Mapping for Monitoring Social Interactions among Older Adults . . . . . . . . . . . . . . 188--198 Julia Fink Anthropomorphism and Human Likeness in the Design of Robots and Human-Robot Interaction . . . . . . . . . . . . . . 199--208 Anonymous Front Matter . . . . . . . . . . . . . . ??
Bruce Christianson Introduction: Bringing Protocols to Life (Transcript of Discussion) . . . . . . . 1--2 Todd R. Andel and Alec Yasinsac Secure Internet Voting Protocol for Overseas Military Voters . . . . . . . . 3--14 Todd R. Andel Secure Internet Voting Protocol for Overseas Military Voters (Transcript of Discussion) . . . . . . . . . . . . . . 15--22 Feng Hao and Brian Randell and Dylan Clarke Self-enforcing Electronic Voting . . . . 23--31 Feng Hao Self-enforcing Electronic Voting (Transcript of Discussion) . . . . . . . 32--40 Phillip J. Brooke and Richard F. Paige and Christopher Power Approaches to Modelling Security Scenarios with Domain-Specific Languages 41--54 Phillip J. Brooke Approaches to Modelling Security Scenarios with Domain-Specific Languages(Transcript of Discussion) . . 55--59 Sandy Clark and Matt Blaze and Jonathan M. Smith The Casino and the OODA Loop . . . . . . 60--63 Matt Blaze The Casino and the OODA Loop: Why Our Protocols Always Eventually Fail (Transcript of Discussion) . . . . . . . 64--75 Joseph Bonneau Statistical Metrics for Individual Password Strength . . . . . . . . . . . 76--86 Joseph Bonneau Statistical Metrics for Individual Password Strength (Transcript of Discussion) . . . . . . . . . . . . . . 87--95 Tiffany Hyun-Jin Kim and Virgil Gligor and Adrian Perrig Street-Level Trust Semantics for Attribute Authentication . . . . . . . . 96--115 Virgil Gligor Street-Level Trust Semantics for Attribute Authentication (Transcript of Discussion) . . . . . . . . . . . . . . 116--125 Dylan Clarke and Feng Hao and Brian Randell Analysis of Issues and Challenges of E-Voting in the UK . . . . . . . . . . . 126--135 Dylan Clarke Analysis of Issues and Challenges of E-Voting in the UK (Transcript of Discussion) . . . . . . . . . . . . . . 136--144 Ross Anderson Protocol Governance: The Elite, or the Mob? . . . . . . . . . . . . . . . . . . 145--145 Ross Anderson Protocol Governance: The Elite, or the Mob? (Transcript of Discussion) . . . . 146--160 Yuko Murayama and Yasuhiro Fujihara and Yoshia Saito and Dai Nishioka Usability Issues in Security . . . . . . 161--171 Yuko Murayama Usability Issues in Security (Transcript of Discussion) . . . . . . . . . . . . . 172--180 Shah Mahmood and Yvo Desmedt Usable Privacy by Visual and Interactive Control of Information Flow . . . . . . 181--188 Anonymous Front Matter . . . . . . . . . . . . . . ??
Neville A. Stanton Human Factors Engineering as the Methodological Babel Fish: Translating User Needs into Software Design . . . . 1--17 Emilia Mendes Improving Software Effort Estimation Using an Expert-Centred Approach . . . . 18--33 Lucio Davide Spano and Antonio Cisternino and Fabio Patern\`o A Compositional Model for Gesture Definition . . . . . . . . . . . . . . . 34--52 Llúcia Masip and Célia Martinie and Marco Winckler and Philippe Palanque and Toni Granollers A Design Process for Exhibiting Design Choices and Trade-Offs in (Potentially) Conflicting User Interface Guidelines 53--71 Célia Martinie and Philippe Palanque and David Navarre and Eric Barboni A Development Process for Usable Large Scale Interactive Critical Systems: Application to Satellite Ground Segments 72--93 Kati Kuusinen and Tommi Mikkonen and Santtu Pakarinen Agile User Experience Development in a Large Software Organization: Good Expertise but Limited Impact . . . . . . 94--111 Carlos Eduardo Silva and José Creissac Campos Can GUI Implementation Markup Languages Be Used for Modelling? . . . . . . . . . 112--129 Chris Roast Constraining and Creating Solutions --- Reflections on the Analysis of Early Design . . . . . . . . . . . . . . . . . 130--145 Artur H. Kronbauer and Celso A. S. Santos and Vaninha Vieira Smartphone Applications Usability Evaluation: a Hybrid Model and Its Implementation . . . . . . . . . . . . . 146--163 Thomas Grill and Ondrej Polacek and Manfred Tscheligi Methods towards API Usability: a Structural Analysis of Usability Problem Categories . . . . . . . . . . . . . . . 164--180 Joël Vogt and Kris Luyten and Jan Van den Bergh and Karin Coninx and Andreas Meier Putting Dementia into Context . . . . . 181--198 Jose Danado and Fabio Patern\`o Puzzle: a Visual-Based Environment for End User Development in Touch-Based Mobile Phones . . . . . . . . . . . . . 199--216 Shamal Faily and John Lyle and Andre Paul and Andrea Atzeni and Dieter Blomme and Heiko Desruelle Requirements Sensemaking Using Concept Maps . . . . . . . . . . . . . . . . . . 217--232 Anne-Marie Déry-Pinna and Audrey Occello and Michel Riveill Towards Conflict Management in User Interface Composition Driven by Business Needs . . . . . . . . . . . . . . . . . 233--250 Oumout Chouseinoglou and Semih Bilgen A Model for Assessing Organizational Learning in Software Development Organizations . . . . . . . . . . . . . 251--258 Kay Behrenbruch and Martin Atzmüller and Christoph Evers and Ludger Schmidt and Gerd Stumme A Personality Based Design Approach Using Subgroup Discovery . . . . . . . . 259--266 Brigit van Loggem Assessing Use Complexity of Software: a Tool for Documentation Designers . . . . 267--274 Amin Rasooli and Peter Forbrig and Fattaneh Tagivareh Collecting Users Profiles for Web Applications . . . . . . . . . . . . . . 275--282 Elton R. Vieira and Carina Alves and Letícia Duboc Creativity Patterns Guide: Support for the Application of Creativity Techniques in Requirements Engineering . . . . . . 283--290 Malte Ressin and Cecilia Oyugi and José Abdelnour-Nocera and David Lee and Dharam Panesar Exploring Local Cultural Perspectives in User Interface Development in an Indian Offshoring Context: a View from the UK 291--298 Anonymous Front Matter . . . . . . . . . . . . . . ??
Pedro Centieiro and Teresa Romão and A. Eduardo Dias Applaud Having Fun: a Mobile Game to Cheer Your Favourite Sports Team . . . . 1--16 Kazuyuki Fujita and Hiroyuki Kidokoro and Yuichi Itoh Paranga: An Interactive Flipbook . . . . 17--30 Taku Hachisu and Hiroyuki Kajimoto Augmentation of Toothbrush by Modulating Sounds Resulting from Brushing . . . . . 31--43 Shigeyuki Hirai and Yoshinobu Sakakibara and Seiho Hayakawa Bathcratch: Touch and Sound-Based DJ Controller Implemented on a Bathtub . . 44--56 Hiroyuki Kanke and Yoshinari Takegawa and Tsutomu Terada and Masahiko Tsukamoto Airstic Drum: a Drumstick for Integration of Real and Virtual Drums 57--69 Fausto Mourato and Fernando Birra and Manuel Próspero dos Santos Enhancing Level Difficulty and Additional Content in Platform Videogames through Graph Analysis . . . 70--84 Tatsuhiko Okazaki and Tsutomu Terada and Masahiko Tsukamoto A System for Supporting Performers in Stuffed Suits . . . . . . . . . . . . . 85--100 André Pereira and Rui Prada and Ana Paiva Socially Present Board Game Opponents 101--116 Kiyoshi Shin and Kosuke Kaneko and Yu Matsui and Koji Mikami and Masaru Nagaku Localizing Global Game Jam: Designing Game Development for Collaborative Learning in the Social Context . . . . . 117--132 Dhaval Vyas and Yanqing Cui and Jarno Ojala and Guido Grassel Producing while Consuming: Social Interaction around Photos Shared within Private Group . . . . . . . . . . . . . 133--150 Shih-Han Chan and Stéphane Natkin and Guillaume Tiger and Alexandre Topol Extensible Sound Description in COLLADA: a Unique File for a Rich Sound Design 151--166 Tai-Yun Chen and Hung-Wei Hsu and Wen-Kai Tai and Chin-Chen Chang An Automatic Race Track Generating System . . . . . . . . . . . . . . . . . 167--181 Yongsoon Choi and Rahul Parsani and Xavier Roman and Anshul Vikram Pandey and Adrian David Cheok Light Perfume: Designing a Wearable Lighting and Olfactory Accessory for Empathic Interactions . . . . . . . . . 182--197 Chris Deaker and Masood Masoodian and Bill Rogers A Survey of Players' Opinions on Interface Customization in World of Warcraft . . . . . . . . . . . . . . . . 198--213 Dimitris Grammenos and George Margetis and Panagiotis Koutlemanis and Xenophon Zabulis 53.090 Virtual Rusks = 510 Real Smiles Using a Fun Exergame Installation for Advertising Traditional Food Products 214--229 Kaj Grònbæk and Karen Johanne Kortbek and Claus Mòller and Jesper Nielsen and Liselott Stenfeldt Designing Playful Interactive Installations for Urban Environments --- The SwingScape Experience . . . . . . . 230--245 Olivier Guy and Ronan Champagnat Flashback in Interactive Storytelling 246--261 Robert Howland and Sachi Urano and Junichi Hoshino SanjigenJiten: Computer Assisted Language Learning System within a $3$D Game Environment . . . . . . . . . . . . 262--273 Yuko Konya and Itiro Siio A Caption Presentation System for the Hearing Impaired People Attending Theatrical Performances . . . . . . . . 274--286 Kinyo Kou and Yoichiro Kawaguchi Emergent Gait Evolution of Quadruped Artificial Life . . . . . . . . . . . . 287--296 Anonymous Front Matter . . . . . . . . . . . . . . ??
Oana Andrei and Muffy Calder Trend-Based Analysis of a Population Model of the AKAP Scaffold Protein . . . 1--25 Alessio Angius and András Horváth and Verena Wolf Quasi Product Form Approximation for Markov Models of Reaction Networks . . . 26--52 Ezio Bartocci and Pietro Li\`o and Emanuela Merelli and Nicola Paoletti Multiple Verification in Complex Biological Systems: The Bone Remodelling Case Study . . . . . . . . . . . . . . . 53--76 L. Brim and J. Fabriková and S. Dra\vzan and D. \vSafránek On Approximative Reachability Analysis of Biochemical Dynamical Systems . . . . 77--101 Andrzej Ehrenfeucht and Jetty Kleijn and Maciej Koutny and Grzegorz Rozenberg Minimal Reaction Systems . . . . . . . . 102--122 Cristian Versari and Gianluigi Zavattaro Complex Functional Rates in Rule-Based Languages for Biochemistry . . . . . . . 123--150 Qixia Yuan and Panuwat Trairatphisan and Jun Pang and Sjouke Mauw and Monique Wiesinger Probabilistic Model Checking of the PDGF Signaling Pathway . . . . . . . . . . . 151--180 Andrzej Mizera and Eugen Czeizler and Ion Petre Self-assembly Models of Variable Resolution . . . . . . . . . . . . . . . 181--203 Rodrick Wallace Metabolic Constraints on the Evolution of Genetic Codes: Did Multiple Preaerobic' Ecosystem Transitions Entrain Richer Dialects via Serial Endosymbiosis? . . . . . . . . . . . . . 204--232 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
George Nagy Estimation, Learning, and Adaptation: Systems That Improve with Use . . . . . 1--10 Kenichi Kanatani Optimization Techniques for Geometric Estimation: Beyond Minimization . . . . 11--30 Ale\vs Leonardis Hierarchical Compositional Representations of Object Structure . . 31--32 Lin Han and Luca Rossi and Andrea Torsello and Richard C. Wilson and Edwin R. Hancock Information Theoretic Prototype Selection for Unattributed Graphs . . . 33--41 Benoit Gaüz\`ere and Luc Brun and Didier Villemin Graph Kernels: Crossing Information from Different Patterns Using Graph Edit Distance . . . . . . . . . . . . . . . . 42--50 Robert P. W. Duin and Ana L. N. Fred and Marco Loog and El\.zbieta P\kekalska Mode Seeking Clustering by KNN and Mean Shift Evaluated . . . . . . . . . . . . 51--59 Zhouyu Fu and Guojun Lu and Kai-Ming Ting and Dengsheng Zhang Learning Sparse Kernel Classifiers in the Primal . . . . . . . . . . . . . . . 60--69 Lucas Franek and Xiaoyi Jiang Evolutionary Weighted Mean Based Framework for Generalized Median Computation with Application to Strings 70--78 Lu Bai and Edwin R. Hancock Graph Complexity from the Jensen--Shannon Divergence . . . . . . . 79--88 Aasa Feragen Complexity of Computing Distances between Geometric Trees . . . . . . . . 89--97 Xavier Cortés and Francesc Serratosa and Albert Solé-Ribalta Active Graph Matching Based on Pairwise Probabilities between Nodes . . . . . . 98--106 Nicola Rebagliati and Albert Solé-Ribalta and Marcello Pelillo and Francesc Serratosa On the Relation between the Common Labelling and the Median Graph . . . . . 107--115 Silvio Jamil F. Guimarães and Jean Cousty and Yukiko Kenmochi and Laurent Najman A Hierarchical Image Segmentation Algorithm Based on an Observation Scale 116--125 Martin Tschirsich and Arjan Kuijper A Discrete Scale Space Neighborhood for Robust Deep Structure Extraction . . . . 126--134 Jaume Gibert and Ernest Valveny and Horst Bunke and Alicia Fornés On the Correlation of Graph Edit Distance and $L_1$ Distance in the Attribute Statistics Embedding Space . . 135--143 Luca Rossi and Andrea Torsello and Edwin R. Hancock Approximate Axial Symmetries from Continuous Time Quantum Walks . . . . . 144--152 Sergej Lewin and Xiaoyi Jiang and Achim Clausing A Clustering-Based Ensemble Technique for Shape Decomposition . . . . . . . . 153--161 Martin Tschirsich and Arjan Kuijper Laplacian Eigenimages in Discrete Scale Space . . . . . . . . . . . . . . . . . 162--170 Laura Antanas and Paolo Frasconi and Fabrizio Costa and Tinne Tuytelaars and Luc De Raedt A Relational Kernel-Based Framework for Hierarchical Image Understanding . . . . 171--180 Lu Bai and Edwin R. Hancock and Peng Ren A Jensen--Shannon Kernel for Hypergraphs 181--189 Anonymous Front Matter . . . . . . . . . . . . . . ??
Jean-Paul Laumond A Geometric Perspective of Anthropomorphic Embodied Actions . . . . 1--1 Yoshiyuki Sankai Cybernics: Fusion of Human, Machine and Information . . . . . . . . . . . . . . 2--2 Michael Beetz If Abstraction Is the Answer, What Is the Question?--- Reasoning for Everyday Manipulation Tasks . . . . . . . . . . . 3--3 Salvatore M. Anzalone and Yuichiro Yoshikawa and Hiroshi Ishiguro and Emanuele Menegatti Towards Partners Profiling in Human Robot Interaction Contexts . . . . . . . 4--15 Blagovest Vladimirov and Hyun Kim and Namshik Park Motivation-Based Autonomous Behavior Control of Robotic Computer . . . . . . 16--27 Kazuyoshi Wada and Keisuke Takayama and Yusuke Suganuma and Toshihiko Suzuki An Evaluation Method for Smart Variable Space in Living Space . . . . . . . . . 28--39 Konrad Ku\lakowski and Tomasz Szmuc Modeling Robot Behavior with CCL . . . . 40--51 Robert Coleman and Vladimir Estivill-Castro and René Hexel and Carl Lusty Visual-Trace Simulation of Concurrent Finite-State Machines for Validation and Model-Checking of Complex Behaviour . . 52--64 Evan Drumwright Fast Dynamic Simulation of Highly Articulated Robots with Contact via $\Theta(n^2)$ Time Dense Generalized Inertia Matrix Inversion . . . . . . . . 65--76 Xiaogang Xiong and Ryo Kikuuwe and Motoji Yamamoto A Differential-Algebraic Multistate Friction Model . . . . . . . . . . . . . 77--88 Andreas Rune Fugl and Henrik Gordon Petersen and Morten Willatzen Simulation of Flexible Objects in Robotics . . . . . . . . . . . . . . . . 89--100 Florian Lier and Simon Schulz and Ingo Lütkebohle Continuous Integration for Iterative Validation of Simulated Robot Models . . 101--112 Arne Nordmann and Matthias Rolf and Sebastian Wrede Software Abstractions for Simulation and Control of a Continuum Robot . . . . . . 113--124 Paul Kilgo and Eugene Syriani and Monica Anderson A Visual Modeling Language for RDIS and ROS Nodes Using AToM$^3$ . . . . . . . . 125--136 Andrew Kimmel and Andrew Dobson and Zakary Littlefield and Athanasios Krontiris and James Marble PRACSYS: An Extensible Architecture for Composing Motion Controllers and Planners . . . . . . . . . . . . . . . . 137--148 Saadia Dhouib and Selma Kchir and Serge Stinckwich and Tewfik Ziadi and Mikal Ziane RobotML, a Domain-Specific Language to Design, Simulate and Deploy Robotic Applications . . . . . . . . . . . . . . 149--160 Luca Gherardi and Davide Brugali and Daniele Comotti A Java vs. C++ Performance Evaluation: a $3$D Modeling Benchmark . . . . . . . . 161--172 Gordon Klaus and Kyrre Glette and Jim Tòrresen A Comparison of Sampling Strategies for Parameter Estimation of a Robot Simulator . . . . . . . . . . . . . . . 173--184 Masahiro Shiomi and Francesco Zanlungo and Kotaro Hayashi and Takayuki Kanda A Framework with a Pedestrian Simulator for Deploying Robots into a Real Environment . . . . . . . . . . . . . . 185--196 Gilberto Echeverria and Séverin Lemaignan and Arnaud Degroote and Simon Lacroix and Michael Karg Simulating Complex Robotic Scenarios with MORSE . . . . . . . . . . . . . . . 197--208 Anonymous Front Matter . . . . . . . . . . . . . . ??
Yiming Jing and Gail-Joon Ahn and Hongxin Hu Model-Based Conformance Testing for Android . . . . . . . . . . . . . . . . 1--18 Takanori Yasuda and Tsuyoshi Takagi and Kouichi Sakurai Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography . . . . . . . . . . . . . . 19--36 Chien-Ning Chen and Nisha Jacob and Sebastian Kutzner and San Ling and Axel Poschmann Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU . . . . . . 37--50 Kenta Nekado and Yasuyuki Nogami and Kengo Iokibe Very Short Critical Path Implementation of AES with Direct Logic Gates . . . . . 51--68 Kazuki Yoneyama One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary . . . . . . . . . . . . . . . 69--86 S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan Compact Stateful Encryption Schemes with Ciphertext Verifiability . . . . . . . . 87--104 Geong Sen Poh and Moesfa Soeheila Mohamad and Muhammad Reza Z'aba Structured Encryption for Conceptual Graphs . . . . . . . . . . . . . . . . . 105--122 Akinori Kawachi and Hirotoshi Takebe and Keisuke Tanaka Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability . . . 123--137 Takanori Isobe and Toshihiro Ohigashi and Masakatu Morii Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI . . . . . . . . 138--155 Yu Sasaki and Lei Wang and Yasuhiro Takasaki and Kazuo Sakiyama and Kazuo Ohta Boomerang Distinguishers for Full HAS-160 Compression Function . . . . . . 156--169 Lei Wang and Yu Sasaki and Kazuo Sakiyama and Kazuo Ohta Polynomial-Advantage Cryptanalysis of $3$D Cipher and $3$D-Based Hash Function 170--181 Jingjing Wang and Kefei Chen and Shixiong Zhu Annihilators of Fast Discrete Fourier Spectra Attacks . . . . . . . . . . . . 182--196 Jiqiang Lu and Yongzhuang Wei and Enes Pasalic and Pierre-Alain Fouque Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher 197--215 Susumu Kiyoshima and Yoshifumi Manabe and Tatsuaki Okamoto Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security 216--232 Youwen Zhu and Tsuyoshi Takagi and Liusheng Huang Efficient Secure Primitive for Privacy Preserving Distributed Computations . . 233--243 Itsuki Suzuki and Maki Yoshida and Toru Fujiwara Generic Construction of GUC Secure Commitment in the KRK Model . . . . . . 244--260 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Twan van Laarhoven and Elena Marchiori Robust Community Detection Methods with Resolution Parameter for Complex Detection in Protein Protein Interaction Networks . . . . . . . . . . . . . . . . 1--13 Pedro J. Ballester Machine Learning Scoring Functions Based on Random Forest and Support Vector Regression . . . . . . . . . . . . . . . 14--25 Sami Laroum and Béatrice Duval and Dominique Tessier and Jin-Kao Hao A Genetic Algorithm for Scale-Based Translocon Simulation . . . . . . . . . 26--37 Yifeng Li and Alioune Ngom and Luis Rueda A Framework of Gene Subset Selection Using Multiobjective Evolutionary Algorithm . . . . . . . . . . . . . . . 38--48 Masae Hosoda and Yukie Akune and Kiyoko F. Aoki-Kinoshita Multiple Tree Alignment with Weights Applied to Carbohydrates to Extract Binding Recognition Patterns . . . . . . 49--58 Shuzhong Zhang and Kun Wang and Cody Ashby and Bilian Chen and Xiuzhen Huang A Unified Adaptive Co-identification Framework for High-D Expression Data . . 59--70 Chendra Hadi Suryanto and Hiroto Saigo and Kazuhiro Fukui Protein Clustering on a Grassmann Manifold . . . . . . . . . . . . . . . . 71--81 Boris Shabash and Kay Wiese and Edward Glen Improving the Portability and Performance of jViz.RNA --- a Dynamic RNA Visualization Software . . . . . . . 82--93 Lavneet Singh and Girija Chetty and Dharmendra Sharma A Novel Machine Learning Approach for Detecting the Brain Abnormalities from MRI Structural Images . . . . . . . . . 94--105 Gabriel Keeble-Gagn\`ere and Johan Nyström-Persson and Matthew I. Bellgard and Kenji Mizuguchi An Open Framework for Extensible Multi-stage Bioinformatics Software . . 106--117 João Cardoso and Paulo Vilaça and Simão Soares and Miguel Rocha An Algorithm to Assemble Gene-Protein-Reaction Associations for Genome-Scale Metabolic Model Reconstruction . . . . . . . . . . . . . 118--128 Marcelo Maraschin and Amélia Somensi-Zeggio and Simone K. Oliveira and Shirley Kuhnen A Machine Learning and Chemometrics Assisted Interpretation of Spectroscopic Data --- a NMR-Based Metabolomics Platform for the Assessment of Brazilian Propolis . . . . . . . . . . . . . . . . 129--140 Y.-H. Taguchi and Akira Okamoto Principal Component Analysis for Bacterial Proteomic Analysis . . . . . . 141--152 Nikolay Razin and Dmitry Sungurov and Vadim Mottl and Ivan Torshin and Valentina Sulimova Application of the Multi-modal Relevance Vector Machine to the Problem of Protein Secondary Structure Prediction . . . . . 153--165 Fabienne Thomarat and Fabien Lauer and Yann Guermeur Cascading Discriminant and Generative Models for Protein Secondary Structure Prediction . . . . . . . . . . . . . . . 166--177 Masahito Ohue and Yuri Matsuzaki and Takashi Ishida and Yutaka Akiyama Improvement of the Protein--Protein Docking Prediction by Introducing a Simple Hydrophobic Interaction Model: An Application to Interaction Pathway Analysis . . . . . . . . . . . . . . . . 178--187 Cem Meydan and Osman Ugur Sezerman Representation of Protein Secondary Structure Using Bond-Orientational Order Parameters . . . . . . . . . . . . . . . 188--197 Yifeng Li and Alioune Ngom Diagnose the Premalignant Pancreatic Cancer Using High Dimensional Linear Machine . . . . . . . . . . . . . . . . 198--209 Raunaq Malhotra and Shruthi Prabhakara and Raj Acharya Predicting V(D)J Recombination Using Conditional Random Fields . . . . . . . 210--221 Dusan Popovic and Alejandro Sifrim and Georgios A. Pavlopoulos and Yves Moreau and Bart De Moor A Simple Genetic Algorithm for Biomarker Mining . . . . . . . . . . . . . . . . . 222--232 Anonymous Front Matter . . . . . . . . . . . . . . ??
Zhenhua Qu and Weiqi Luo and Jiwu Huang Identifying Shifted Double JPEG Compression Artifacts for Non-intrusive Digital Image Forensics . . . . . . . . 1--8 Shouhong Ding and Feiyue Huang and Zhifeng Xie and Yongjian Wu and Lizhuang Ma A Novel Customized Recompression Framework for Massive Internet Images 9--16 Xueying Qin and Rui Zhang and Lili Lin and Fan Zhong and Guanyu Xing and Qunsheng Peng Decomposition Equation of Basis Images with Consideration of Global Illumination . . . . . . . . . . . . . . 17--24 Zhongqiang Wang and Li Zhu Intrinsic Image Decomposition with Local Smooth Assumption and Global Color Assumption . . . . . . . . . . . . . . . 25--32 Jing Li and Gang Zeng and Rui Gan and Hongbin Zha and Long Wang A Game-Theoretical Approach to Image Segmentation . . . . . . . . . . . . . . 33--42 Yu Guo and Xiaowu Chen and Bin Zhou and Qinping Zhao Clothed and Naked Human Shapes Estimation from a Single Image . . . . . 43--50 Xiaohui Wang and Jia Jia and Hanyu Liao and Lianhong Cai Image Colorization with an Affective Word . . . . . . . . . . . . . . . . . . 51--58 Na Chen and Viktor K. Prasanna Semantic Image Clustering Using Object Relation Network . . . . . . . . . . . . 59--66 Guo-Xin Zhang and Yu-Kun Lai and Shi-Min Hu Efficient Solid Texture Synthesis Using Gradient Solids . . . . . . . . . . . . 67--74 Hanqi Fan and Qunsheng Peng and Yizhou Yu A Robust Algorithm for Denoising Meshes with High-Resolution Details . . . . . . 75--82 Jieyi Zhao and Min Tang and Ruofeng Tong Mesh Segmentation for Parallel Decompression on GPU . . . . . . . . . . 83--90 Qian-Yi Zhou and Ulrich Neumann Modeling Residential Urban Areas from Dense Aerial LiDAR Point Clouds . . . . 91--98 Yanlin Weng and Dongping Li and Yiying Tong Constrained Texture Mapping on Subdivision Surfaces . . . . . . . . . . 99--106 Qiang Fan and Chun Qi Similar Region Contrast Based Salient Object Detection . . . . . . . . . . . . 107--114 Yongwei Miao and Jieqing Feng and Jinrong Wang and Renato Pajarola A Shape Enhancement Technique Based on Multi-channel Salience Measure . . . . . 115--121 Yong-Liang Yang and Chao-Hui Shen Multi-scale Salient Feature Extraction on Mesh Models . . . . . . . . . . . . . 122--129 Jie Wang and Caiming Zhang and Yuanfeng Zhou and Yu Wei and Yi Liu Global Contrast of Superpixels Based Salient Region Detection . . . . . . . . 130--137 Lei Zhang and Yao Zhao and Zhenfeng Zhu Incremental Shared Subspace Learning for Multi-label Classification . . . . . . . 138--145 Yong-Jin Liu and Qiu-Fang Fu and Ye Liu and Xiao-Lan Fu $2$D-Line-Drawing-Based $3$D Object Recognition . . . . . . . . . . . . . . 146--153 Yanhui Xiao and Zhenfeng Zhu and Yao Zhao Graph Regularized ICA for Over-Complete Feature Learning . . . . . . . . . . . . 154--161 Anonymous Front Matter . . . . . . . . . . . . . . ??
XiaoXiao Feng and Koichi Matsumoto and Shigeo Sugimoto Uncovering the Secrets of Daoism \em Fus Using Digital Dao-Fa Hui-Yuan . . . . . 1--10 Ryan Baumann and Christopher Blackwell and W. Brent Seales Automatic Perspective Correction of Manuscript Images . . . . . . . . . . . 11--18 Chao Wang and Ling Zhuang and Jiangqin Wu and Feng Zhou An Ontology-Based Fuzzy Matching Approach to Semantic Retrieval of Historical Place Names . . . . . . . . . 19--28 Amjad Usman and Sharifullah Khan Exploiting Semantics in Subject-Based Searching of DSpace . . . . . . . . . . 29--38 Kazuya Fujikawa and Hideo Joho and Shin'ichi Nakayama Constraint Can Affect Human Perception, Behaviour, and Performance of Search . . 39--48 Lighton Phiri and Kyle Williams and Miles Robinson and Stuart Hammar and Hussein Suleman Bonolo: a General Digital Library System for File-Based Collections . . . . . . . 49--58 Emi Ishita and Yukiko Watanabe and Ai Yamaguchi and Takako Oda and Yuiko Higa and Miki Horiuchi The Ratio of Conference Papers in Citations of Engineering Dissertations at Kyushu University . . . . . . . . . . 59--62 Tanja Mer\vcun and Maja \vZumer and Trond Aalberg Presenting and Exploring the Complexity of Bibliographic Relationships . . . . . 63--66 R. Guruprasad and Khaiser Nikam and P. Marimuthu Use Patterns of Aerospace E-Indexing, Abstracting and Citation Services: a Research Study of Aerospace Scientists and Engineers of Bangalore . . . . . . . 67--72 Christopher C. Yang and Xuning Tang and Min Song and Suyeon Kim A Trend Analysis of Domain-Specific Literatures with Content and Co-author Network Similarity . . . . . . . . . . . 73--76 Rushdi Shams and Robert E. Mercer Improving Supervised Keyphrase Indexer Classification of Keyphrases with Text Denoising . . . . . . . . . . . . . . . 77--86 Tetsuya Mihara and Mitsuharu Nagamori and Shigeo Sugimoto A Metadata-Centric Approach to a Production and Browsing Platform of Manga . . . . . . . . . . . . . . . . . 87--96 Yundong Cai and Yin-Leng Theng and Qimeng Cai and Zhi Ling and Yangbo Ou and Gladys Theng Crowdsourcing Metadata Schema Generation for Chinese-Style Costume Digital Library . . . . . . . . . . . . . . . . 97--105 Esther Meng-Yoke Tan and Dion Hoe-Lian Goh and Yin-Leng Theng and Schubert Foo Social Interaction Patterns during Mobile Information Seeking . . . . . . . 106--115 Liangju Zheng and Weiming Lu and Meng Zhang and Baofeng Zhang and Baogang Wei A Scalable, Adaptive, Self-management and Fault-Tolerant Architecture for Digital Library . . . . . . . . . . . . 116--125 Ei Pa Pa Pe-Than and Dion Hoe-Lian Goh and Chei Sian Lee Enjoyment of a Mobile Information Sharing Game: Perspectives from Needs Satisfaction and Information Quality . . 126--135 Suparp Kanyacome and Smarn Loipha and Somchai Numprasertchai Needs of Collaborative Digital Library for Secondary School Students in Thailand . . . . . . . . . . . . . . . . 136--139 Marius Nel and Kyle Williams and Hussein Suleman Evaluating Large Image Support for DSpace . . . . . . . . . . . . . . . . . 140--143 Hsiao-Tieh Pu and Ying-Han Chang User Navigation for Online Video Leisure: An Exploratory Study . . . . . 144--147 Maja \vZumer and Athena Salaba and Yin Zhang User Verification of the FRBR Conceptual Model and Testing of FRBR Prototypes . . 148--151 Anonymous Front Matter . . . . . . . . . . . . . . ??
Mario Tokoro Toward Practical Application of Formal Methods in Software Lifecycle Processes 1--1 Darren Cofer Formal Methods in the Aerospace Industry: Follow the Money . . . . . . . 2--3 Robert E. Shostak Applying Term Rewriting to Speech Recognition of Numbers . . . . . . . . . 4--4 Duy-Khanh Le and Wei-Ngan Chin and Yong-Meng Teo Variable Permissions for Concurrency Verification . . . . . . . . . . . . . . 5--21 Xiaoxiao Yang and Yu Zhang and Ming Fu and Xinyu Feng A Concurrent Temporal Programming Model with Atomic Blocks . . . . . . . . . . . 22--37 Granville Barnett and Shengchao Qin A Composable Mixed Mode Concurrency Control Semantics for Transactional Programs . . . . . . . . . . . . . . . . 38--53 Edmond Gjondrekaj and Michele Loreti and Rosario Pugliese and Francesco Tiezzi and Carlo Pinciroli Towards a Formal Verification Methodology for Collective Robotic Systems . . . . . . . . . . . . . . . . 54--70 Einar Broch Johnsen and Rudolf Schlatte and Silvia Lizeth Tapia Tarifa Modeling Resource-Aware Virtualized Applications for the Cloud in Real-Time ABS . . . . . . . . . . . . . . . . . . 71--86 Kazuhiro Ogata and Phan Thi Thanh Huyen Specification and Model Checking of the Chandy and Lamport Distributed Snapshot Algorithm in Rewriting Logic . . . . . . 87--102 Chunyan Mu Quantitative Program Dependence Graphs 103--118 Tarek Mhamdi and Osman Hasan and Sofi\`ene Tahar Quantitative Analysis of Information Flow Using Theorem Proving . . . . . . . 119--134 Mahsa Varshosaz and Ramtin Khosravi Modeling and Verification of Probabilistic Actor Systems Using pRebeca . . . . . . . . . . . . . . . . 135--150 Qiu Zongyan and Hong Ali and Liu Yijing Modular Verification of OO Programs with Interfaces . . . . . . . . . . . . . . . 151--166 François Bobot and Jean-Christophe Filliâtre Separation Predicates: a Taste of Separation Logic in First-Order Logic 167--181 William L. Harrison and Adam Procter and Gerard Allwein The Confinement Problem in the Presence of Faults . . . . . . . . . . . . . . . 182--197 Fabian Büttner and Marina Egea and Jordi Cabot and Martin Gogolla Verification of ATL Transformations Using Transformation Models and Model Finders . . . . . . . . . . . . . . . . 198--213 Shang-Wei Lin and Yang Liu and Pao-Ann Hsiung and Jun Sun and Jin Song Dong Automatic Generation of Provably Correct Embedded Systems . . . . . . . . . . . . 214--229 Wen Su and Jean-Raymond Abrial and Huibiao Zhu Complementary Methodologies for Developing Hybrid Systems with Event-B 230--248 Takashi Tomita and Shin Hiura and Shigeki Hagihara and Naoki Yonezaki A Temporal Logic with Mean-Payoff Constraints . . . . . . . . . . . . . . 249--265 Meng Han and Zhenhua Duan and Xiaobing Wang Time Constraints with Temporal Logic Programming . . . . . . . . . . . . . . 266--282 Anonymous Front Matter . . . . . . . . . . . . . . ??
Naouel Moha and Francis Palma and Mathieu Nayrolles and Benjamin Joyen Conseil Specification and Detection of SOA Antipatterns . . . . . . . . . . . . . . 1--16 Francesco Belardinelli and Alessio Lomuscio and Fabio Patrizi Verification of GSM-Based Artifact-Centric Systems through Finite Abstraction . . . . . . . . . . . . . . 17--31 João Claudio Américo and Didier Donsez Service Component Architecture Extensions for Dynamic Systems . . . . . 32--47 Bikram Sengupta and Anshu Jain and Kamal Bhattacharya and Hong-Linh Truong and Schahram Dustdar Who Do You Call? Problem Resolution through Social Compute Units . . . . . . 48--62 Tri A. Kurniawan and Aditya K. Ghose and Hoa Khanh Dam and Lam-Son Lê Relationship-Preserving Change Propagation in Process Ecosystems . . . 63--78 Hari S. Gupta and Bikram Sengupta Scheduling Service Tickets in Shared Delivery . . . . . . . . . . . . . . . . 79--95 Hong-Linh Truong and Schahram Dustdar and Kamal Bhattacharya Programming Hybrid Services in the Cloud 96--110 Zhen Ye and Athman Bouguettaya and Xiaofang Zhou QoS-Aware Cloud Service Composition Based on Economic Models . . . . . . . . 111--126 Erik Wittern and Jörn Kuhlenkamp and Michael Menzel Cloud Service Selection Based on Variability Modeling . . . . . . . . . . 127--141 Marcus Roy and Ingo Weber and Boualem Benatallah Extending Enterprise Service Design Knowledge Using Clustering . . . . . . . 142--157 Erik Wittern and Nelly Schuster and Jörn Kuhlenkamp and Stefan Tai Participatory Service Design through Composed and Coordinated Service Feature Models . . . . . . . . . . . . . . . . . 158--172 Jian Yu and Jun Han and Quan Z. Sheng and Steven O. Gunarso PerCAS: An Approach to Enabling Dynamic and Personalized Adaptation for Context-Aware Services . . . . . . . . . 173--190 Yedendra Babu Shrinivasan and Gargi Banerjee Dasgupta and Nirmit Desai and Jayan Nallacherry A Method for Assessing Influence Relationships among KPIs of Service Systems . . . . . . . . . . . . . . . . 191--205 Tharindu Patikirikorala and Indika Kumara and Alan Colman and Jun Han and Liuping Wang Dynamic Performance Management in Multi-tenanted Business Process Servers Using Nonlinear Control . . . . . . . . 206--221 Aymen Baouab and Olivier Perrin and Claude Godart An Optimized Derivation of Event Queries to Monitor Choreography Violations . . . 222--236 Rene Ramacher and Lars Mönch Dynamic Service Selection with End-to-End Constrained Uncertain QoS Attributes . . . . . . . . . . . . . . . 237--251 Dragan Ivanovi\'c and Manuel Carro and Manuel V. Hermenegildo A Constraint-Based Approach to Quality Assurance in Service Choreographies . . 252--267 Kuan Lu and Ramin Yahyapour and Edwin Yaqub and Constantinos Kotsokalis Structural Optimization of Reduced Ordered Binary Decision Diagrams for SLA Negotiation in IaaS of Cloud Computing 268--282 Zachary J. Oster and Syed Adeel Ali and Ganesh Ram Santhanam and Samik Basu and Partha S. Roop A Service Composition Framework Based on Goal-Oriented Requirements Engineering, Model Checking, and Qualitative Preference Analysis . . . . . . . . . . 283--297 Hongbing Wang and Jie Zhang and Wenlong Sun and Hongye Song and Guibing Guo and Xiang Zhou WCP-Nets: a Weighted Extension to CP-Nets for Web Service Selection . . . 298--312 Anonymous Front Matter . . . . . . . . . . . . . . ??
Vinicius Oliverio and Estevam R. Hruschka, Jr. Contradiction Detection and Ontology Extension in a Never-Ending Learning System . . . . . . . . . . . . . . . . . 1--10 Arturo Yee and Matías Alvarado Pattern Recognition and Monte-Carlo Tree Search for Go Gaming Better Automation 11--20 José Luis Chacón and Ramón Pino Pérez Exploring the Rationality of Some Syntactic Merging Operators . . . . . . 21--30 Isel Grau and Gonzalo Nápoles and Maikel León and Ricardo Grau Fuzzy Cognitive Maps for Modelling, Predicting and Interpreting HIV Drug Resistance . . . . . . . . . . . . . . . 31--40 Hilário Tomaz and Rinaldo Lima and João Emanoel and Fred Freitas An Unsupervised Method for Ontology Population from the Web . . . . . . . . 41--50 Jonatan Gomez and Elizabeth León and Olfa Nasraoui Minimum Cluster Size Estimation and Cluster Refinement for the Randomized Gravitational Clustering Algorithm . . . 51--60 Elizabeth León and Jonatan Gómez and Fabián Giraldo Online Cluster Prototype Generation for the Gravitational Clustering Algorithm 61--70 Leandro A. F. Fernandes and Ana Cristina Bicharra García Association Rule Visualization and Pruning through Response-Style Data Organization and Clustering . . . . . . 71--80 Melissa Rodrigues and João Gama and Carlos Abreu Ferreira Identifying Relationships in Transactional Data . . . . . . . . . . . 81--90 Willian Zalewski and Fabiano Silva and Huei Diana Lee and Andre Gustavo Maletzke and Feng Chung Wu Time Series Discretization Based on the Approximation of the Local Slope Information . . . . . . . . . . . . . . 91--100 José Hernández Santiago and Jair Cervantes and Asdrúbal López-Chau and Farid García Lamont Enhancing the Performance of SVM on Skewed Data Sets by Exciting Support Vectors . . . . . . . . . . . . . . . . 101--110 Pawe\l Skrobanek and Olgierd Unold and Ewa Walkowicz and Henryk Maciejewski and Maciej Dobrowolski Study on the Impact of Affinity on the Results of Data Mining in Biological Populations . . . . . . . . . . . . . . 111--119 Luiz Melo Romão and Julio César Nievola Hierarchical Classification of Gene Ontology with Learning Classifier Systems . . . . . . . . . . . . . . . . 120--129 Ricardo Timarán Pereira and Maria Clara Yepez Chamorro and Andrés Calderón Romero Detecting Survival Patterns in Women with Invasive Cervical Cancer with Decision Trees . . . . . . . . . . . . . 130--139 Leandro A. Pasa and José Alfredo F. Costa and Marcelo C. Tosin and Fábio A. Procópio de Paiva Using SOM Maps for Clustering and Visualization of Diamond Films Deposited by HFCVD Process . . . . . . . . . . . . 140--148 Tiago P. F. de Lima and Adenilton J. da Silva and Teresa B. Ludermir Selection and Fusion of Neural Networks via Differential Evolution . . . . . . . 149--158 Yenny Villuendas-Rey and Yailé Caballero-Mota and María Matilde García-Lorenzo Prototype Selection with Compact Sets and Extended Rough Sets . . . . . . . . 159--168 Nele Verbiest and Enislay Ramentol and Chris Cornelis and Francisco Herrera Improving SMOTE with Fuzzy Rough Prototype Selection to Detect Noise in Imbalanced Classification Data . . . . . 169--178 Carlos Cobos and Leydy Muñoz and Martha Mendoza and Elizabeth León and Enrique Herrera-Viedma Fitness Function Obtained from a Genetic Programming Approach for Web Document Clustering Using Evolutionary Algorithms 179--188 Jean Metz and Luís F. D. de Abreu and Everton A. Cherman and Maria C. Monard On the Estimation of Predictive Evaluation Measure Baselines for Multi-label Learning . . . . . . . . . . 189--198 Anonymous Front Matter . . . . . . . . . . . . . . ??
Benjamin Johnson and Pascal Schöttle and Rainer Böhme Where to Hide the Bits? . . . . . . . . 1--17 Mehrdad Nojoumian and Douglas R. Stinson Socio-Rational Secret Sharing as a New Direction in Rational Cryptography . . . 18--37 Jeremiah Blocki and Nicolas Christin and Anupam Datta and Arunesh Sinha Audit Mechanisms for Provable Risk Management and Accountable Data Governance . . . . . . . . . . . . . . . 38--59 SingRu (Celine) Hoe and Murat Kantarcioglu and Alain Bensoussan A Game Theoretical Analysis of Lemonizing Cybercriminal Black Markets 60--77 Lemonia Dritsoula and Patrick Loiseau and John Musacchio Computing the Nash Equilibria of Intruder Classification Games . . . . . 78--97 Ahto Buldas and Roman Stepanenko Upper Bounds for Adversaries' Utility in Attack Trees . . . . . . . . . . . . . . 98--117 Jingqiang Lin and Peng Liu and Jiwu Jing Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality . . . . . . . . . . . . 118--137 Alan Nochenson and C. F. Larry Heimann Simulation and Game-Theoretic Analysis of an Attacker-Defender Game . . . . . . 138--151 Aron Laszka and Dávid Szeszlér and Levente Buttyán Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link Criticality . . . . . . . . . . . . . . 152--170 Andrew Clark and Quanyan Zhu and Radha Poovendran and Tamer Ba\csar Deceptive Routing in Relay Networks . . 171--185 Assane Gueye and Vladimir Marbukh A Game-Theoretic Framework for Network Security Vulnerability Assessment and Mitigation . . . . . . . . . . . . . . . 186--200 Radek Píbil and Viliam Lisý and Christopher Kiekintveld and Branislav Bo\vsanský and Michal P\vechou\vcek Game Theoretic Model of Strategic Honeypot Selection in Computer Networks 201--220 M. Patrick Collins A Cost-Based Mechanism for Evaluating the Effectiveness of Moving Target Defenses . . . . . . . . . . . . . . . . 221--233 Viet Pham and Carlos Cid Are We Compromised? Modelling Security Assessment Games . . . . . . . . . . . . 234--247 Kevin D. Bowers and Marten van Dijk and Robert Griffin and Ari Juels and Alina Oprea Defending against the Unknown Enemy: Applying FlipIt to System Security . . . 248--263 Saurabh Amin and Galina A. Schwartz and Hamidou Tembine Incentives and Security in Electricity Distribution Networks . . . . . . . . . 264--280 Yee Wei Law and Tansu Alpcan and Marimuthu Palaniswami and Subhrakanti Dey Security Games and Risk Minimization for Automatic Generation Control in Smart Grid . . . . . . . . . . . . . . . . . . 281--295 Robert Nix and Murat Kantarcioglu Contractual Agreement Design for Enforcing Honesty in Cloud Outsourcing 296--308 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Giovanni Sartor Compliance with Normative Systems . . . 1--32 Micha\l Araszkiewicz Coherence-Based Account of the Doctrine of Consistent Interpretation . . . . . . 33--47 Ugo Pagallo Three Roads to Complexity, AI and the Law of Robots: On Crimes, Contracts, and Torts . . . . . . . . . . . . . . . . . 48--60 Yueh-Hsuan Weng and Sophie Ting Hong Zhao The Legal Challenges of Networked Robotics: From the Safety Intelligence Perspective . . . . . . . . . . . . . . 61--72 Daniele Bourcier and Primavera De Filippi Cloud Computting: New Research Perspectives for Computers and Law . . . 73--92 Tommaso Agnoloni and Maria-Teresa Sagri and Daniela Tiscornia Balancing Rights and Values in the Italian Courts: a Benchmark for a Quantitative Analysis . . . . . . . . . 93--105 Radboud Winkels and Jelle de Ruyter Survival of the Fittest: Network Analysis of Dutch Supreme Court Cases 106--115 Marcello Ceci and Monica Palmirani Ontology Framework for Judgment Modelling . . . . . . . . . . . . . . . 116--130 Guido Boella and Llio Humphreys and Marco Martin and Piercarlo Rossi and Leendert van der Torre Eunomos, a Legal Document and Knowledge Management System to Build Legal Services . . . . . . . . . . . . . . . . 131--146 Enrico Francesconi Axioms on a Semantic Model for Legislation for Accessing and Reasoning over Normative Provisions . . . . . . . 147--161 Enrico Francesconi and Ginevra Peruginelli An Open Access Policy for Legal Informatics Dissemination and Sharing 162--170 Pompeu Casanovas and Enric Plaza Advancing an Open Access Publication Model for Legal Information Institutes 171--188 Clara Smith and Agustín Ambrossio and Leandro Mendoza and Antonino Rotolo Combinations of Normal and Non-normal Modal Logics for Modeling Collective Trust in Normative MAS . . . . . . . . . 189--203 Migle Laukyte Software Agents as Boundary Objects . . 204--216 Andrew Vincent Argumentation and Intuitive Decision Making: Criminal Sentencing and Sentence Indication . . . . . . . . . . . . . . . 217--234 Alexander Boer and Tom van Engers Application of Model-Based Diagnosis to Multi-Agent Systems Representing Public Administration . . . . . . . . . . . . . 235--244 Marcello Ceci and Leonardo Lesmo and Alessandro Mazzei and Monica Palmirani Semantic Annotation of Legal Texts through a FrameNet-Based Approach . . . 245--255 Anderson Bertoldi and Rove Luiza de Oliveira Chishman Developing a Frame-Based Lexicon for the Brazilian Legal Language: The Case of the Criminal\_Process Frame . . . . . . 256--270 Mat\vej My\vska and Terezie Smejkalová and Jaromír \vSavelka and Martin \vSkop Creative Commons and Grand Challenge to Make Legal Language Simple . . . . . . . 271--285 Meritxell Fernández-Barrera and Pompeu Casanovas From User Needs to Expert Knowledge: Mapping Laymen Queries with Ontologies in the Domain of Consumer Mediation . . 286--308 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Yuxin Meng and Lam-for Kwok Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection . . . . . . . . . . . . . . . 1--14 Silvio Ranise and Alessandro Armando On the Automated Analysis of Safety in Usage Control: a New Decidability Result 15--28 Steffen Wagner and Sascha Wessel and Frederic Stumpf Attestation of Mobile Baseband Stacks 29--43 Tae-Gyu Lee and Gi-Soo Chung A Scalable Link Model for Local Optical Wireless Networks . . . . . . . . . . . 44--57 Cristina Alcaraz and Javier Lopez Addressing Situational Awareness in Critical Domains of a Smart Grid . . . . 58--71 Amani S. Ibrahim and James Hamlyn-Harris and John Grundy and Mohamed Almorsy Identifying OS Kernel Objects for Run-Time Security Analysis . . . . . . . 72--85 Tae-Gyu Lee and Gi-Soo Chung Background Transfer Method for Ubiquitous Computing . . . . . . . . . . 86--99 Shengli Liu and Fangguo Zhang and Kefei Chen Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption . . . . . . . . . . . . . . . 100--112 Shaohua Tang and Lingling Xu Proxy Signature Scheme Based on Isomorphisms of Polynomials . . . . . . 113--125 Fei Tang and Changlu Lin and Pinhui Ke Universal Designated Verifier Signcryption . . . . . . . . . . . . . . 126--134 Juan Pablo Timpanaro and Isabelle Chrisment and Olivier Festor A Bird's Eye View on the I2P Anonymous File-Sharing Environment . . . . . . . . 135--148 Samaneh Mahdavifar and Mahdi Abadi and Mohsen Kahani and Hassan Mahdikhani A Clustering-Based Approach for Personalized Privacy Preserving Publication of Moving Object Trajectory Data . . . . . . . . . . . . . . . . . . 149--165 Alif Wahid and Christopher Leckie and Chenfeng Zhou Estimating the Number of Hosts Corresponding to an Address while Preserving Anonymity . . . . . . . . . . 166--179 Qi Han and Yinghui Zhang and Xiaofeng Chen and Hui Li and Jiaxiang Quan Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks . . . . . . . . . . . . . . . . 180--191 Yifan Zhao and Swee-Won Lo and Robert H. Deng and Xuhua Ding An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks . . . . . . . . . . . . . . . . 192--205 Kaiqi Xiong The Performance of Public Key-Based Authentication Protocols . . . . . . . . 206--219 Long-Hai Li and Cheng-Qiang Huang and Shao-Feng Fu Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-Net . . . . . . . . . . . . . . . . . 220--232 Yue Yu and Michael Fry and Bernhard Plattner and Paul Smith and Alberto Schaeffer-Filho Resilience Strategies for Networked Malware Detection and Remediation . . . 233--247 Eitan Menahem and Rami Pusiz and Yuval Elovici Detecting Spammers via Aggregated Historical Data Set . . . . . . . . . . 248--262 Amani S. Ibrahim and John Grundy and James Hamlyn-Harris and Mohamed Almorsy Operating System Kernel Data Disambiguation to Support Security Analysis . . . . . . . . . . . . . . . . 263--276 Anonymous Front Matter . . . . . . . . . . . . . . ??