Last update:
Sat Jan 20 07:22:45 MST 2018
Adrianna Kozierkiewicz-Hetma\'nska Comparison of One-Level and Two-Level Consensuses Satisfying the 2-Optimality Criterion . . . . . . . . . . . . . . . 1--10 Marcin Maleszka and Bernadetta Mianowska and Ngoc-Thanh Nguyen A Heuristic Method for Collaborative Recommendation Using Hierarchical User Profiles . . . . . . . . . . . . . . . . 11--20 Quoc Uy Nguyen and Trong Hai Duong and Sanggil Kang Solving Conflict on Collaborative Knowledge via Social Networking Using Consensus Choice . . . . . . . . . . . . 21--30 Xuan Hau Pham and Jason J. Jung and Ngoc-Thanh Nguyen Integrating Multiple Experts for Correction Process in Interactive Recommendation Systems . . . . . . . . . 31--40 Tin Huynh and Kiem Hoang Modeling Collaborative Knowledge of Publishing Activities for Research Recommendation . . . . . . . . . . . . . 41--50 Thanh-Trung Nguyen and Phi-Khu Nguyen A New Approach for Problem of Sequential Pattern Mining . . . . . . . . . . . . . 51--60 Van-Dung Hoang and My-Ha Le and Kang-Hyun Jo Robust Human Detection Using Multiple Scale of Cell Based Histogram of Oriented Gradients and AdaBoost Learning 61--71 Nguyen Thanh Son and Duong Tuan Anh Discovering Time Series Motifs Based on Multidimensional Index and Early Abandoning . . . . . . . . . . . . . . . 72--82 Duc-Thuan Vo and Cheol-Young Ock A Hybrid Approach of Pattern Extraction and Semi-supervised Learning for Vietnamese Named Entity Recognition . . 83--93 Roman Pawlikowski and Krzysztof Ociepa and Urszula Markowska-Kaczmar and Pawel B. Myszkowski Information Extraction from Geographical Overview Maps . . . . . . . . . . . . . 94--103 Bogus\law Cyganek and Micha\l Wo\'zniak Pixel-Based Object Detection and Tracking with Ensemble of Support Vector Machines and Extended Structural Tensor 104--113 Bay Vo and Bac Le and Jason J. Jung A Tree-Based Approach for Mining Frequent Weighted Utility Itemsets . . . 114--123 Trong Nhan Phan and Tran Khanh Dang A Novel Trajectory Privacy-Preserving Future Time Index Structure in Moving Object Databases . . . . . . . . . . . . 124--134 Grzegorz Skorupa and Rados\law Katarzyniak Summarizing Knowledge Base with Modal Conditionals . . . . . . . . . . . . . . 135--144 Ali Selamat and S. O. Olatunji and Abdul Azeez Abdul Raheem Modeling PVT Properties of Crude Oil Systems Based on Type-$2$ Fuzzy Logic Approach and Sensitivity Based Linear Learning Method . . . . . . . . . . . . 145--155 Agnieszka Jastrzebska and Wladyslaw Homenda On Structuring of the Space of Needs in the Framework of Fuzzy Sets Theory . . . 156--165 Tomasz Wilk and Micha\l Wo\'zniak Comparison of Fuzzy Combiner Training Methods . . . . . . . . . . . . . . . . 166--173 Trong Hieu Tran and Quoc Bao Vo An Axiomatic Model for Merging Stratified Belief Bases by Negotiation 174--184 Witold Pedrycz and Wladyslaw Homenda From Fuzzy Cognitive Maps to Granular Cognitive Maps . . . . . . . . . . . . . 185--193 Manas S. Hardas and Lisa Purvis Bayesian Vote Weighting in Crowdsourcing Systems . . . . . . . . . . . . . . . . 194--203 Anonymous Front Matter . . . . . . . . . . . . . . ??
Tomasz Sitarek and Wladyslaw Homenda Generic Operations in the Structured Space of the Music . . . . . . . . . . . 1--10 Duong Thi Anh Hoang and Ngoc Sy Ngo and Binh Thanh Nguyen Collective Cubing Platform towards Definition and Analysis of Warehouse Cubes . . . . . . . . . . . . . . . . . 11--20 Phuoc Vinh Tran To Approach Cylindrical Coordinates to Represent Multivariable Spatio-temporal Data . . . . . . . . . . . . . . . . . . 21--28 Tutut Herawan and A. Noraziah and Zailani Abdullah and Mustafa Mat Deris and Jemal H. Abawajy EFP-M2: Efficient Model for Mining Frequent Patterns in Transactional Database . . . . . . . . . . . . . . . . 29--38 Halina Kwasnicka and Pawel Siemionko Improved Sammon Mapping Method for Visualization of Multidimensional Data 39--48 Marcin Miros\law Pietranik and Ngoc Thanh Nguyen Ontology Relation Alignment Based on Attribute Semantics . . . . . . . . . . 49--58 Young Chan Moon and Ho Min Jung and Chuck Yoo and Young Woong Ko Data Deduplication Using Dynamic Chunking Algorithm . . . . . . . . . . . 59--68 Huynh Tu Dang and Ha Manh Tran and Phach Ngoc Vu and An Truong Nguyen Applying MapReduce Framework to Peer-to-Peer Computing Applications . . 69--78 Krzysztof W\kecel and Tomasz Kaczmarek and Agata Filipowska Scalable Adaptation of Web Applications to Users' Behavior . . . . . . . . . . . 79--88 César Andrés and Rui Abreu and Alberto Núñez OCE: An Online Colaborative Editor . . . 89--98 Mohammed Nazim Uddin and Trong Hai Duong and Visal Sean and Geun-Sik Jo Construction of Semantic User Profile for Personalized Web Search . . . . . . 99--108 Adam Grzech and Krzysztof Juszczyszyn and Pawe\l Stelmach and \Lukasz Falas Link Prediction in Dynamic Networks of Services Emerging during Deployment and Execution of Web Services . . . . . . . 109--120 Mahran Al-Zyoud and Imad Salah and Nadim Obeid Towards a Model of Context Awareness Using Web Services . . . . . . . . . . . 121--131 Leszek Borzemski and Michal Danielak and Anna Kaminska-Chuchmala Short-Term Spatio-temporal Forecasts of Web Performance by Means of Turning Bands Method . . . . . . . . . . . . . . 132--141 Przemys\law B\la\'skiewicz and Miros\law Kuty\lowski and Wojciech Wodo and Kamil Wolny Extreme Propagation in an Ad-Hoc Radio Network- Revisited . . . . . . . . . . . 142--151 Dang Thanh Chuong and Vu Duy Loi and Vo Viet Minh Nhat A Model for the Performance Analysis of SPL-OBS Core Nodes with Deflection Routing . . . . . . . . . . . . . . . . 152--161 Sylvia Encheva Ordering of Potential Collaboration Options . . . . . . . . . . . . . . . . 162--171 Ching-Shen Dong and Ananth Srinivasan Interface Design for Decision Systems 172--181 Grzegorz Fedczyszyn and Leszek Koszalka and Iwona Pozniak-Koszalka Opponent Modeling in Texas Hold'em Poker 182--191 Jacek Mercik On Axiomatization of Power Index of Veto 192--200 Anonymous Front Matter . . . . . . . . . . . . . . ??
Mousumi Dutt and Arindam Biswas and Partha Bhowmick and Bhargab B. Bhattacharya On Finding Shortest Isothetic Path inside a Digital Object . . . . . . . . 1--15 Nilanjana Karmakar and Arindam Biswas and Partha Bhowmick Fast Slicing of Orthogonal Covers Using DCEL . . . . . . . . . . . . . . . . . . 16--30 Peter Veelaert Fast Combinatorial Algorithm for Tightly Separating Hyperplanes . . . . . . . . . 31--44 Li Chen and Soma Biswas Digital Curvatures Applied to $3$D Object Analysis and Recognition: a Case Study . . . . . . . . . . . . . . . . . 45--58 Fumiki Sekiya and Akihiro Sugimoto Discrete Polynomial Curve Fitting to Noisy Data . . . . . . . . . . . . . . . 59--74 Ana Marcela Herrera-Navarro and Hugo Jiménez-Hernández and Iván Ramón Terol-Villalobos A Probabilistic Measure of Circularity 75--89 Tetsuo Asano and Sergey Bereg A New Framework for Connected Components Labeling of Binary Images . . . . . . . 90--102 Tetsuo Asano and Sergey Bereg and Lilian Buzer Small Work Space Algorithms for Some Basic Problems on Binary Images . . . . 103--114 Josef \vSlapal Adjacencies for Structuring the Digital Plane . . . . . . . . . . . . . . . . . 115--127 Péter Kardos and Kálmán Palágyi On Topology Preservation for Triangular Thinning Algorithms . . . . . . . . . . 128--142 Benedek Nagy Cellular Topology on the Triangular Grid 143--153 K. G. Subramanian and Ibrahim Venkat and Petra Wiederhold A P System Model for Contextual Array Languages . . . . . . . . . . . . . . . 154--165 D. Lalitha and K. Rangarajan and Durairaj Gnanaraj Thomas Rectangular Arrays and Petri Nets . . . 166--180 Thangasamy Kamaraj and Durairaj Gnanaraj Thomas Regional Hexagonal Tile Rewriting Grammars . . . . . . . . . . . . . . . . 181--195 Thangasamy Kamaraj and Durairaj Gnanaraj Thomas and H. Geetha and T. Kalyani Partial Commutation on Array Languages 196--208 Anja Attig and Petra Perner Incremental Learning of the Model for Watershed-Based Image Segmentation . . . 209--222 Damien Gonzalez and Rémy Malgouyres and Henri-Alex Esbelin and Chafik Samir Fast Level-Wise Convolution . . . . . . 223--233 Phuc Ngo and Yukiko Kenmochi and Nicolas Passat and Hugues Talbot Combinatorial Properties of $2$D Discrete Rigid Transformations under Pixel-Invariance Constraints . . . . . . 234--248 Anupama Potluri and Chakravarthy Bhagvati Novel Morphological Algorithms for Dominating Sets on Graphs with Applications to Image Analysis . . . . . 249--262 Norbert Hantos and Péter Balázs and Kálmán Palágyi Binary Image Reconstruction from Two Projections and Skeletal Information . . 263--273 Anonymous Front Matter . . . . . . . . . . . . . . ??
Dan Boneh Pairing-Based Cryptography: Past, Present, and Future . . . . . . . . . . 1--1 Chuanming Zong Some Mathematical Mysteries in Lattices 2--3 Masayuki Abe and Melissa Chase and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions . . . . . . . . . . . 4--24 Michael Gerbush and Allison Lewko and Adam O'Neill and Brent Waters Dual Form Signatures: An Approach for Proving Security from Static Assumptions 25--42 Takuya Hayashi and Takeshi Shimoyama and Naoyuki Shinohara and Tsuyoshi Takagi Breaking Pairing-Based Cryptosystems Using $\eta_T$ Pairing over ${\rm GF}(3^{97})$ . . . . . . . . . . . . . . 43--60 Jae Hong Seo On the (Im)possibility of Projecting Property in Prime-Order Setting . . . . 61--79 Jorge Luis Villar Optimal Reductions of Some Decisional Problems to the Rank Problem . . . . . . 80--97 Sebastian Faust and Carmit Hazay and Jesper Buus Nielsen and Peter Sebastian Nordholt Signature Schemes Secure against Hard-to-Invert Leakage . . . . . . . . . 98--115 Yehuda Lindell and Eran Omri and Hila Zarosim Completeness for Symmetric Two-Party Functionalities- Revisited . . . . . . . 116--133 Mihir Bellare and Viet Tung Hoang and Phillip Rogaway Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing . . . . . . . . . . . 134--153 Scott Ames and Rosario Gennaro and Muthuramakrishnan Venkitasubramaniam The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions . . . . . . . . . . . 154--171 Meicheng Liu and Yin Zhang and Dongdai Lin Perfect Algebraic Immune Functions . . . 172--189 Florian Mendel and Vincent Rijmen and Deniz Toz and Kerem Varìcì Differential Analysis of the LED Block Cipher . . . . . . . . . . . . . . . . . 190--207 Julia Borghoff and Anne Canteaut and Tim Güneysu and Elif Bilge Kavun and Miroslav Knezevic PRINCE --- a Low-Latency Block Cipher for Pervasive Computing Applications . . 208--225 Gaëtan Leurent Analysis of Differential Attacks in ARX Constructions . . . . . . . . . . . . . 226--243 Andrey Bogdanov and Gregor Leander and Kaisa Nyberg and Meiqin Wang Integral and Multidimensional Linear Distinguishers with Correlation Zero . . 244--261 Hongjun Wu and Tao Huang and Phuong Ha Nguyen and Huaxiong Wang and San Ling Differential Attacks against Stream Cipher ZUC . . . . . . . . . . . . . . . 262--277 Rodolphe Lampe and Jacques Patarin and Yannick Seurin An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher . . . . . . . . . . . . . . . . . 278--295 Liting Zhang and Wenling Wu and Han Sui and Peng Wang 3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound . . . . . . . . . . . . . 296--312 Dimitar Jetchev and Onur Özen and Martijn Stam Understanding Adaptivity: Random Systems Revisited . . . . . . . . . . . . . . . 313--330 Anonymous Front Matter . . . . . . . . . . . . . . ??
Amihood Amir and Alberto Apostolico and Estrella Eisenberg Detecting Approximate Periodic Patterns 1--12 Grey Ballard and James Demmel and Olga Holtz Graph Expansion Analysis for Communication Costs of Fast Rectangular Matrix Multiplication . . . . . . . . . 13--36 Nikhil Bansal and Anupam Gupta and Ravishankar Krishnaswamy Multicast Routing for Energy Minimization Using Speed Scaling . . . . 37--51 Guy Baram and Tami Tamir Reoptimization of the Minimum Total Flow-Time Scheduling Problem . . . . . . 52--66 Neal Barcelo and Miao Zhou and Daniel Cole and Michael Nugent Energy Efficient Caching for Phase-Change Memory . . . . . . . . . . 67--81 Neal Barcelo and Sungjin Im and Benjamin Moseley and Kirk Pruhs Shortest-Elapsed-Time-First on a Multiprocessor . . . . . . . . . . . . . 82--92 Gernot Veit Batz and Robert Geisberger and Dennis Luxen Efficient Route Compression for Hybrid Route Planning . . . . . . . . . . . . . 93--107 Shiri Chechik and Quentin Godfroy and David Peleg Multipath Spanners via Fault-Tolerant Spanners . . . . . . . . . . . . . . . . 108--119 Morgan Chopin and André Nichterlein and Rolf Niedermeier Constant Thresholds Can Make Target Set Selection Tractable . . . . . . . . . . 120--133 Fabio Cunial Faster Variance Computation for Patterns with Gaps . . . . . . . . . . . . . . . 134--147 Gianlorenzo D'Angelo and Mattia D'Emidio Enhancing the Computation of Distributed Shortest Paths on Real Dynamic Networks 148--158 Benjamin Doerr and Mahmoud Fouz and Tobias Friedrich Experimental Analysis of Rumor Spreading in Social Networks . . . . . . . . . . . 159--173 Mourad El Ouali and Helena Fohlin and Anand Srivastav A Randomised Approximation Algorithm for the Partial Vertex Cover Problem in Hypergraphs . . . . . . . . . . . . . . 174--187 Fabian Fuchs and Markus Völker and Dorothea Wagner Simulation-Based Analysis of Topology Control Algorithms for Wireless Ad Hoc Networks . . . . . . . . . . . . . . . . 188--202 Michael T. Goodrich and Daniel S. Hirschberg Cache-Oblivious Dictionaries and Multimaps with Negligible Failure Probability . . . . . . . . . . . . . . 203--218 Robert Görke and Roland Kluge and Andrea Schumm An Efficient Generator for Clustered Dynamic Random Networks . . . . . . . . 219--233 Peter Kling and Andreas Cord-Landwehr Slow Down and Sleep for Profit in Online Deadline Scheduling . . . . . . . . . . 234--247 Kirill Kogan and Alejandro López-Ortiz FIFO Queueing Policies for Packets with Heterogeneous Processing . . . . . . . . 248--260 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Andrea Moio and Attilio Giordana and Dino Mendola An Anti-tampering Algorithm Based on an Artificial Intelligence Approach . . . . 1--10 Jan Rauch Domain Knowledge and Data Mining with Association Rules --- a Logical Point of View . . . . . . . . . . . . . . . . . . 11--20 Pawe\l Betli\'nski and Dominik \'Sl\kezak The Problem of Finding the Sparsest Bayesian Network for an Input Data Set is NP-Hard . . . . . . . . . . . . . . . 21--30 Philippe Fournier-Viger and Vincent S. Tseng Mining Top-$K$ Non-redundant Association Rules . . . . . . . . . . . . . . . . . 31--40 Matej Guid and Martin Mo\vzina and Vida Groznik and Dejan Georgiev and Aleksander Sadikov ABML Knowledge Refinement Loop: a Case Study . . . . . . . . . . . . . . . . . 41--50 Jennifer Lavergne and Ryan Benton and Vijay V. Raghavan Min-Max Itemset Trees for Dense and Categorical Datasets . . . . . . . . . . 51--60 Jennifer Lavergne and Ryan Benton and Vijay V. Raghavan TRARM-RelSup: Targeted Rare Association Rule Mining Using Itemset Trees and the Relative Support Measure . . . . . . . . 61--70 Shusaku Tsumoto and Shoji Hirano Incremental Rules Induction Method Based on Three Rule Layers . . . . . . . . . . 71--80 Asma Ammar and Zied Elouedi and Pawan Lingras RPKM: The Rough Possibilistic $K$-Modes 81--86 Jan Kohout and Roman Neruda Exploration and Exploitation Operators for Genetic Graph Clustering Algorithm 87--92 Patrick G. Clark and Jerzy W. Grzymala-Busse and Martin Kuehnhausen Local Probabilistic Approximations for Incomplete Data . . . . . . . . . . . . 93--98 Piotr Andruszkiewicz On the Relations between Retention Replacement, Additive Perturbation, and Randomisations for Nominal Attributes in Privacy Preserving Data Mining . . . . . 99--104 Sujata Ghosh and Thiri Haymar Kyaw and Rineke Verbrugge Decision Support for Extensive Form Negotiation Games . . . . . . . . . . . 105--114 Yuxin Meng and Wenjuan Li and Lam-for Kwok Intelligent Alarm Filter Using Knowledge-Based Alert Verification in Network Intrusion Detection . . . . . . 115--124 Chao Gao and Jiming Liu Clustering-Based Media Analysis for Understanding Human Emotional Reactions in an Extreme Event . . . . . . . . . . 125--135 Gabriel Pestana and Joachim Metter and Sebastian Heuchler and Pedro Reis An Event-Driven Architecture for Spatio-temporal Surveillance of Business Activities . . . . . . . . . . . . . . . 136--142 \Lukasz Brocki and Krzysztof Marasek and Danijel Kor\vzinek Multiple Model Text Normalization for the Polish Language . . . . . . . . . . 143--148 Janardhana Punuru and Jianhua Chen Discovering Semantic Relations Using Prepositional Phrases . . . . . . . . . 149--154 Alina Wróblewska and Marcin Sydow DEBORA: Dependency-Based Method for Extracting Entity-Relationship Triples from Open-Domain Texts in Polish . . . . 155--161 Grzegorz Protaziuk and Anna Wróblewska and Robert Bembenik and Henryk Rybi\'nski Lexical Ontology Layer --- a Bridge between Text and Concepts . . . . . . . 162--171 Anonymous Front Matter . . . . . . . . . . . . . . ??
Lu Xiao and Ming Fan Does Social Network Always Promote Entrepreneurial Intentions? Part I: Theoretical Model . . . . . . . . . . . 1--7 Samreen Feroz and Amatal Habib and Maryam Siddiqua and Sobia Saleem and Nisar Ahmed Shar Association of Anti-Histamine Drugs with Brain Tumor . . . . . . . . . . . . . . 8--15 Qiuyu Zhu Estimating Principal Point and Nonlinear Parameters of Camera from a Planar Calibration Image . . . . . . . . . . . 16--24 Vipul Arora and Laxmidhar Behera Design of Distribution Independent Noise Filters with Online PDF Estimation . . . 25--32 Xia Wu and Juan Li and Li Yao Determining Effective Connectivity from FMRI Data Using a Gaussian Dynamic Bayesian Network . . . . . . . . . . . . 33--39 A. G. Radwan and Ahmed S. Elwakil Transient-Time Fractional-Space Trigonometry and Application . . . . . . 40--47 Manjusri Wickramasinghe and Jayantha Rajapakse and Damminda Alahakoon Understanding Individual Play Sequences Using Growing Self Organizing Maps . . . 48--55 Noor Almaadeed and Amar Aggoun and Abbes Amira Audio-Visual Feature Fusion for Speaker Identification . . . . . . . . . . . . . 56--67 Xiaoxu Kang and Marc Schieber and Nitish V. Thakor Decoding Cognitive States from Neural Activities of Somatosensory Cortex . . . 68--75 Kleanthis C. Neokleous and Marios N. Avraamides and Costas K. Neocleous and Christos N. Schizas Cognitive Modeling of Dilution Effects in Visual Search . . . . . . . . . . . . 76--83 Wajid Mumtaz and Likun Xia and Aamir Saeed Malik and Mohd Azhar Mohd Yasin Complexity Analysis of EEG Data during Rest State and Visual Stimulus . . . . . 84--91 Ahmed Al-Ani and Bram Van Dun and Harvey Dillon and Alaleh Rabie Analysis of Alertness Status of Subjects Undergoing the Cortical Auditory Evoked Potential Hearing Test . . . . . . . . . 92--99 Preetinder Kaur and Madhu Goyal and Jie Lu Price Forecasting Using Dynamic Assessment of Market Conditions and Agent's Bidding Behavior . . . . . . . . 100--108 Takafumi Kanamori and Akiko Takeda Non-convex Optimization on Stiefel Manifold and Applications to Machine Learning . . . . . . . . . . . . . . . . 109--116 Liviu Petrisor Dinu and Radu-Tudor Ionescu and Marius Popescu Local Patch Dissimilarity for Images . . 117--126 Dehua Zhang and Derong Liu and Qinglai Wei Nearly Optimal Control for Nonlinear Systems with Dead-Zone Control Input Based on the Iterative ADP Approach . . 127--134 Sadjia Benkhider and Oualid Dahmri and Habiba Drias A Memetic Approach for the Knowledge Extraction . . . . . . . . . . . . . . . 135--141 Xiaohua Liu and Haoran Liang and Haiwei Dong and Nikolaos Mavridis Development of a Novel Conversational Calculator Based on Remote Online Computation . . . . . . . . . . . . . . 142--151 Saima Hassan and Abbas Khosravi and Jafreezal Jaafar and Samir B. Belhaouari Load Forecasting Accuracy through Combination of Trimmed Forecasts . . . . 152--159 Julian Szyma\'nski and W\lodzis\law Duch Self Organizing Maps for Visualization of Categories . . . . . . . . . . . . . 160--167 Anonymous Front Matter . . . . . . . . . . . . . . ??
Freha Mezzoudj and Assia Benyettou On the Optimization of Multiclass Support Vector Machines Dedicated to Speech Recognition . . . . . . . . . . . 1--8 Yangming Guo and Xiaolei Li and Guanghan Bai and Jiezhong Ma Time Series Prediction Method Based on LS-SVR with Modified Gaussian RBF . . . 9--17 Ran Wang and Guoyou Wang and Zhong Chen and Jianguo Liu and Yu Shi An Improved Method of Identification Based on Thermal Palm Vein Image . . . . 18--24 Majeed Safa and Sandhya Samarasinghe Modelling Energy Use and Fuel Consumption in Wheat Production Using Indirect Factors and Artificial Neural Networks . . . . . . . . . . . . . . . . 25--32 Anam Tariq and Arslan Shaukat and Shoab A. Khan A Gaussian Mixture Model Based System for Detection of Macula in Fundus Images 33--40 Tobias Brosch and Heiko Neumann The Brain's Sequential Parallelism: Perceptual Decision-Making and Early Sensory Responses . . . . . . . . . . . 41--50 Shinsuke Koyama Estimating Neural Firing Rates: An Empirical Bayes Approach . . . . . . . . 51--59 Jose Salvador Sánchez and Vicente García and Ana Isabel Marqués Assessment of Financial Risk Prediction Models with Multi-criteria Decision Making Methods . . . . . . . . . . . . . 60--67 Vicente García and Ana Isabel Marqués and Jose Salvador Sánchez Improving Risk Predictions by Preprocessing Imbalanced Credit Data . . 68--75 Mohamed Aymen Slim and Maroua El Kastouri and Afef Abdelkrim and Mohamed Benrejeb Hybrid Validation of Handwriting Process Modelling . . . . . . . . . . . . . . . 76--84 Abdulrahman Alalshekmubarak and Amir Hussain and Qiu-Feng Wang Off-Line Handwritten Arabic Word Recognition Using SVMs with Normalized Poly Kernel . . . . . . . . . . . . . . 85--91 Jinhua Xu Bayesian Modeling of Visual Attention 92--99 Xu-Cheng Yin and Kaizhu Huang and Hong-Wei Hao and Khalid Iqbal and Zhi-Bin Wang Classifier Ensemble Using a Heuristic Learning with Sparsity and Diversity . . 100--107 Takashi Mitsuishi and Takanori Terashima and Yasunari Shidama Optimization of SIRMs Fuzzy Model Using \Lukasiewicz Logic . . . . . . . . . . . 108--116 Nariman Mahdavi and Jürgen Kurths Synchronization of Hopfield Like Chaotic Neural Networks with Structure Based Learning . . . . . . . . . . . . . . . . 117--124 Andrew P. Papli\'nski Incremental Self-Organizing Map (iSOM) in Categorization of Visual Objects . . 125--132 Dror Cohen and Andrew P. Papli\'nski The Elastic Net as Visual Category Representation: Visualisation and Classification . . . . . . . . . . . . . 133--140 Sebastien Naze and Jan Treur A Computational Model for Development of Post-Traumatic Stress Disorders by Hebbian Learning . . . . . . . . . . . . 141--151 Toshikazu Samura and Yasuomi D. Sato and Yuji Ikegaya and Hatsuo Hayashi and Takeshi Aihara Power-Law Scaling of Synchronization Robustly Reproduced in the Hippocampal CA3 Slice Culture Model with Small-World Topology . . . . . . . . . . . . . . . . 152--159 Hamidreza Jamalabadi and Hossein Nasrollahi and Majid Nili Ahmadabadi and Babak Nadjar Araabi A Dynamic Bio-inspired Model of Categorization . . . . . . . . . . . . . 160--167 Anonymous Front Matter . . . . . . . . . . . . . . ??
Do-Thanh Sang and Dong-Min Woo and Dong-Chul Park Centroid Neural Network with Simulated Annealing and Its Application to Color Image Segmentation . . . . . . . . . . . 1--8 Ali Awad Efficient Non-linear Filter for Impulse Noise Removal in Document Images . . . . 9--16 Souhir Bouaziz and Habib Dhahri and Adel M. Alimi Evolving Flexible Beta Operator Neural Trees (FBONT) for Time Series Forecasting . . . . . . . . . . . . . . 17--24 Wentao Fan and Nizar Bouguila Nonparametric Localized Feature Selection via a Dirichlet Process Mixture of Generalized Dirichlet Distributions . . . . . . . . . . . . . 25--33 Kiatichai Treerattanapitak and Chuleerat Jaruskulchai Generalized Agglomerative Fuzzy Clustering . . . . . . . . . . . . . . . 34--41 Ming Liu and Lei Lin and Lili Shan and Chengjie Sun A Novel Self-Adaptive Clustering Algorithm for Dynamic Data . . . . . . . 42--49 Chaojie Li and David Yang Gao and Chao Liu Impulsive Synchronization of State Delayed Discrete Complex Networks with Switching Topology . . . . . . . . . . . 50--57 Liming Yuan and Songbo Liu and Qingcheng Huang and Jiafeng Liu and Xianglong Tang Salient Instance Selection for Multiple-Instance Learning . . . . . . . 58--67 Meng Qingfeng and Du Jianguo and Li Zhen Motivating Retail Marketing Efforts under Fairness Concerns in Small-World Networks: a Multi-agent Simulation . . . 68--75 Dunwei Gong and Jian Chen and Xiaoyan Sun and Yong Zhang Application of Variational Granularity Language Sets in Interactive Genetic Algorithms . . . . . . . . . . . . . . . 76--83 Tatsuya Yokota and Andrzej Cichocki and Yukihiko Yamashita Linked PARAFAC/CP Tensor Decomposition and Its Fast Implementation for Multi-block Tensor Analysis . . . . . . 84--91 Gang Xie and Hong-Bo Guo and Yu-Chu Tian and Maolin Tang A Human-Simulated Immune Evolutionary Computation Approach . . . . . . . . . . 92--99 Lu Zhenwei and Zhao Lingling and Su Xiaohong and Ma Peijun A STPHD-Based Multi-sensor Fusion Method 100--107 Satoshi Hara and Takashi Washio Group Sparse Inverse Covariance Selection with a Dual Augmented Lagrangian Method . . . . . . . . . . . 108--115 Yinglu Liu and Xu-Yao Zhang and Kaizhu Huang and Xinwen Hou and Cheng-Lin Liu Multiple Outlooks Learning with Support Vector Machines . . . . . . . . . . . . 116--124 P. K. Srijith and Shirish Shevade Multi-Task Learning Using Shared and Task Specific Information . . . . . . . 125--132 Sepehr Eghbali and Majid Nili Ahmadabadi and Babak Nadjar Araabi and Maryam Mirian Learning Attentive Fusion of Multiple Bayesian Network Classifiers . . . . . . 133--140 Amira Samy Talaat and Amir F. Atiya and Sahar A. Mokhtar and Ahmed Al-Ani and Magda Fayek Multiclass Penalized Likelihood Pattern Classification Algorithm . . . . . . . . 141--148 Piotr P\lo\'nski and Krzysztof Zaremba Self-Organising Maps for Classification with Metropolis--Hastings Algorithm for Supervision . . . . . . . . . . . . . . 149--156 Yinghua Han and Jinkuan Wang and Qiang Zhao and Peng Han Decoupled $2$-D DOA Estimation Algorithm Based on Cross-Correlation Matrix for Coherently Distributed Source . . . . . 157--165 Anonymous Front Matter . . . . . . . . . . . . . . ??
Theodor Dan Popescu Neural Network Learning for Blind Source Separation with Application in Dam Safety Monitoring . . . . . . . . . . . 1--8 Jayamol Mathews and Madhu S. Nair and Liza Jo Improved BTC Algorithm for Gray Scale Images Using $K$-Means Quad Clustering 9--17 Christoph Sulzbachner and Martin Humenberger and Ágoston Srp and Ferenc Vajda Optimization of a Neural Network for Computer Vision Based Fall Detection with Fixed-Point Arithmetic . . . . . . 18--26 Yan Tu and Zijiang Yang Customer Relationship Management Using Partial Focus Feature Reduction . . . . 27--35 Muhammad Usman Akram and Mahmood Akhtar and M. Younus Javed An Automated System for the Grading of Diabetic Maculopathy in Fundus Images 36--43 Yun-zhi Zou and Xin-kun Wu and Wen-bin Zhang and Chang-yin Sun An Iterative Method for a Class of Generalized Global Dynamical System Involving Fuzzy Mappings in Hilbert Spaces . . . . . . . . . . . . . . . . . 44--51 Jesada Kajornrit and Kok Wai Wong and Chun Che Fung Estimation of Missing Precipitation Records Using Modular Artificial Neural Networks . . . . . . . . . . . . . . . . 52--59 Ameer H. Morad Office Employees Authentication Based on E-exam Techniques . . . . . . . . . . . 60--65 Karthik Nagesh and M. Narasimha Murty Obtaining Single Document Summaries Using Latent Dirichlet Allocation . . . 66--74 Chu-Kiong Loo and Ali Memariani Object Recognition Using Sparse Representation of Overcomplete Dictionary . . . . . . . . . . . . . . . 75--82 Jia Zheng and Mengyao Zhu and Junwei He and Xiaoqing Yu PEAQ Compatible Audio Quality Estimation Using Computational Auditory Model . . . 83--90 Sagar Dewan and Srinivasa Chakravarthy A System for Offline Character Recognition Using Auto-encoder Networks 91--99 Xiaoyan Yan and Bo Liang and Tao Ban and Shanqing Guo and Liming Wang TrafficS: a Behavior-Based Network Traffic Classification Benchmark System with Traffic Sampling Functionality . . 100--107 Iyad Abu Doush Harmony Search with Multi-Parent Crossover for Solving IEEE-CEC2011 Competition Problems . . . . . . . . . . 108--114 Wojciech Kacalak and Maciej Majewski New Intelligent Interactive Automated Systems for Design of Machine Elements and Assemblies . . . . . . . . . . . . . 115--122 Xiao Fu and Jin Liu and Haopeng Wang and Bin Zhang and Rui Gao Rough Sets and Neural Networks Based Aerial Images Segmentation Method . . . 123--131 Shen Ren and Michael Barlow and Hussein A. Abbass Frontal Cortex Neural Activities Shift Cognitive Resources Away from Facial Activities in Real-Time Problem Solving 132--139 Geon-min Kim and Chang-hyun Kim and Soo-young Lee Implement Real-Time Polyphonic Pitch Detection and Feedback System for the Melodic Instrument Player . . . . . . . 140--147 Naotake Kamiura and Ayumu Saitoh and Teijiro Isokawa and Nobuyuki Matsui and Hitoshi Tabuchi Classification of Interview Sheets Using Self-Organizing Maps for Determination of Ophthalmic Examinations . . . . . . . 148--155 Slamet Widodo and Tomoo Shiigi and Naing Min Than and Yuichi Ogawa and Naoshi Kondo Sound-Based Ranging System in Greenhouse Environment with Multipath Effect Compensation Using Artificial Neural Network . . . . . . . . . . . . . . . . 156--163 Anonymous Front Matter . . . . . . . . . . . . . . ??
Lu Xiao and Ming Fan Does Social Network always Promote Entrepreneurial Intentions? Part II: Empirical Analysis . . . . . . . . . . . 1--8 Xuzhi Wang and Yangyang Jia and Xiang Feng and Shuai Yu and Hengyong Jiang Rasterization System for Mobile Device 9--16 Xuzhi Wang and Wei Xiong and Xiang Feng and Shuai Yu and Hengyong Jiang Study on Rasterization Algorithm for Graphics Acceleration System . . . . . . 17--24 Yoshifusa Ito and Hiroyuki Izumi and Cidambi Srinivasan Simultaneous Learning of Several Bayesian and Mahalanobis Discriminant Functions by a Neural Network with Memory Nodes . . . . . . . . . . . . . . 25--33 Andrzej \'Sluzek and Mariusz Paradowski and Duanduan Yang Reinforcement of Keypoint Matching by Co-segmentation in Object Retrieval: Face Recognition Case Study . . . . . . 34--41 Hiroaki Kudo and Takuya Kume and Noboru Ohnishi Effect of Luminance Gradients in Measurement of Differential Limen . . . 42--49 Weicheng Huang and Shuichi Kurogi and Takeshi Nishida Robust Controller for Flexible Specifications Using Difference Signals and Competitive Associative Nets . . . . 50--58 Kohei Ono and Shuichi Kurogi and Takeshi Nishida Moments of Predictive Deviations for Ensemble Diversity Measures to Estimate the Performance of Time Series Prediction . . . . . . . . . . . . . . . 59--66 Satoru Morita Self-Organized Three Dimensional Feature Extraction of MRI and CT . . . . . . . . 67--74 Yao Yao and Xin Xin and Ping Guo OMP or BP? A Comparison Study of Image Fusion Based on Joint Sparse Representation . . . . . . . . . . . . . 75--82 P. M. Yan and Meng Yang and Hui Huang and J. F. Li An Improved Approach to Super Resolution Based on PET Imaging . . . . . . . . . . 83--90 Zhi-Bin Wang and Hong-Wei Hao and Yan Li and Xu-Cheng Yin and Shu Tian Pedestrian Analysis and Counting System with Videos . . . . . . . . . . . . . . 91--99 Ya Zhao and Xiaodong Gu Vehicle License Plate Localization and License Number Recognition Using Unit-Linking Pulse Coupled Neural Network . . . . . . . . . . . . . . . . 100--108 Shenghui Zhou and Qing Liu and Jianming Guo and Yuanyuan Jiang ROI-HOG and LBP Based Human Detection via Shape Part-Templates Matching . . . 109--115 Rossella Cancelliere and Mario Gai and Thierry Arti\`eres and Patrick Gallinari Matrix Pseudoinversion for Image Neural Processing . . . . . . . . . . . . . . . 116--125 Jan Mattner and Sascha Lange and Martin Riedmiller Learn to Swing Up and Balance a Real Pole Based on Raw Visual Input Data . . 126--133 Alan W. Y. Lo and Benben Liu and Ray C. C. Cheung GPU-Based Biclustering for Neural Information Processing . . . . . . . . . 134--141 Haifeng Sima and Lixiong Liu and Ping Guo Color Image Segmentation Based on Regional Saliency . . . . . . . . . . . 142--150 Man To Wong and Xiangjian He and Hung Nguyen and Wei-Chang Yeh Mass Classification in Digitized Mammograms Using Texture Features and Artificial Neural Network . . . . . . . 151--158 Zhongyi Hu and Qing Liu and Shenghui Zhou and Mingjing Huang and Fei Teng Image Dehazing Algorithm Based on Atmosphere Scatters Approximation Model 159--168 Anonymous Front Matter . . . . . . . . . . . . . . ??
Vinod Vaikuntanathan How to Compute on Encrypted Data . . . . 1--15 Orr Dunkelman From Multiple Encryption to Knapsacks --- Efficient Dissection of Composite Problems . . . . . . . . . . . . . . . . 16--16 Thorsten Kleinjung and Arjen K. Lenstra and Dan Page and Nigel P. Smart Using the Cloud to Determine Key Strengths . . . . . . . . . . . . . . . 17--39 Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek A Unified Characterization of Completeness and Triviality for Secure Function Evaluation . . . . . . . . . . 40--59 Sebastian Faust and Markulf Kohlweiss and Giorgia Azzurra Marson and Daniele Venturi On the Non-malleability of the Fiat--Shamir Transform . . . . . . . . . 60--79 Arpita Maitra and Goutam Paul Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84 . . . 80--99 Chaya Ganesh and Vipul Goyal and Satya Lokam On-Line/Off-Line Leakage Resilient Secure Computation Protocols . . . . . . 100--119 Claude Carlet and Jean-Luc Danger and Sylvain Guilley and Houssem Maghrebi Leakage Squeezing of Order Two . . . . . 120--139 Christophe Clavier and Benoit Feix and Georges Gagnerot and Christophe Giraud and Myl\`ene Roussellet ROSETTA for Single Trace Analysis . . . 140--155 Mario Lamberger and Florian Mendel and Vincent Rijmen Collision Attack on the Hamsi-256 Compression Function . . . . . . . . . . 156--171 Tuomas Kortelainen and Ari Vesanen and Juha Kortelainen Generalized Iterated Hash Functions Revisited: New Complexity Bounds for Multicollision Attacks . . . . . . . . . 172--190 Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar A Differential Fault Attack on the Grain Family under Reasonable Assumptions . . 191--208 Thierry P. Berger and Marine Minier Cryptanalysis of Pseudo-random Generators Based on Vectorial FCSRs . . 209--224 Patrick Derbez and Pierre-Alain Fouque and Jérémy Jean Faster Chosen-Key Distinguishers on Reduced-Round AES . . . . . . . . . . . 225--243 Jiqiang Lu and Yongzhuang Wei and Jongsung Kim and Enes Pasalic The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher . . . . . . . . . 244--264 Yu Sasaki Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers with Several Rounds . . . . . . . . . . . . . 265--282 Shengbao Wu and Mingsheng Wang Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers . . . . . . . . . . . . . . . . 283--302 Jung Woo Kim and Jungjoo Seo and Jin Hong and Kunsoo Park and Sung-Ryul Kim High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System . . . . . . . . . . . . . . . . . 303--316 Daniel J. Bernstein and Tanja Lange Computing Small Discrete Logarithms Faster . . . . . . . . . . . . . . . . . 317--338 Ingo von Maurich and Tim Güneysu Embedded Syndrome-Based Hashing . . . . 339--357 Anonymous Front Matter . . . . . . . . . . . . . . ??
Mi Li and Dongning Han and Shengfu Lu and Zheng Liu and Ning Zhong Associative Information Processing in Parahippocampal Place Area (PPA): An fMRI Study . . . . . . . . . . . . . . . 1--9 Qingyuan Tian Language Acquisition Is an Optimized Process Balanced between Holistic and Compositive . . . . . . . . . . . . . . 10--17 Chin Ian Lou and Daria Migotina and Joao P. Rodrigues and Joao Semedo and Feng Wan and Peng Un Mak Object Recognition Test in Peripheral Vision: a Study on the Influence of Object Color, Pattern and Shape . . . . 18--26 Sanxia Fan and Xuyan Wang and Zhizhou Liao and Zhoujun Long and Haiyan Zhou and Yulin Qin Basic Level Advantage during Information Retrieval: An ERP Study . . . . . . . . 27--37 Zhoujun Long and Xuyan Wang and Xiangsheng Shen and Sanxia Fan and Haiyan Zhou and Yulin Qin A Skill Learning during Heuristic Problem Solving: An fMRI Study . . . . . 38--49 Xuyan Wang and Zhoujun Long and Sanxia Fan and Weiyan Yu and Haiyan Zhou and Yulin Qin The Role of Category Label in Adults' Inductive Reasoning . . . . . . . . . . 50--60 Yuki Ueyama and Eizo Miyashita Estimation of Visual Feedback Contribution to Limb Stiffness in Visuomotor Control . . . . . . . . . . . 61--72 Haiyan Zhou and Yukun Xiong and Zhoujun Long and Sanxia Fan and Xuyan Wang and Yulin Qin and Ning Zhong Rule Acquisition in the Proceeding of Heuristic Sudoku Solving . . . . . . . . 73--84 Redwan Abdo A. Mohammed and Samah Abdulfatah Mohammed and Lars Schwabe BatGaze: a New Tool to Measure Depth Features at the Center of Gaze during Free Viewing . . . . . . . . . . . . . . 85--96 Redwan Abdo A. Mohammed and Lars Schwabe A Brain Informatics Approach to Explain the Oblique Effect via Depth Statistics 97--106 Azizi Ab Aziz and Faudziah Ahmad and Houzifa M. Hintaya An Agent Model for Temporal Dynamics Analysis of a Person with Chronic Fatigue Syndrome . . . . . . . . . . . . 107--118 Zhijiang Wang and Jiming Liu and Ning Zhong and Yulin Qin and Haiyan Zhou and Jian Yang and Kuncheng Li A Na\"\ive Hypergraph Model of Brain Networks . . . . . . . . . . . . . . . . 119--129 Do Young Choi and Kun Chang Lee and Seong Wook Chae The Effect of Individual Psychological Characteristics on Creativity Revelation: Emphasis with Psychological Empowerment and Intrinsic Motivation . . 130--139 Alexander Ryjov Modeling and Optimization of Information Retrieval for Perception-Based Information . . . . . . . . . . . . . . 140--149 Yu-Wen Chen and Hsing Mei Sleep Physiological Dynamics Simulation with Fuzzy Set . . . . . . . . . . . . . 150--161 Lorenzo Dell'Arciprete and Brian Murphy and Fabio Massimo Zanzotto Parallels between Machine and Brain Decoding . . . . . . . . . . . . . . . . 162--174 Rafael Ramirez and Zacharias Vamvakousis Detecting Emotion from EEG Signals Using the Emotive Epoc Device . . . . . . . . 175--184 Guohun Zhu and Yan Li and Peng Paul Wen An Efficient Visibility Graph Similarity Algorithm and Its Application on Sleep Stages Classification . . . . . . . . . 185--195 Chun-An Chou and Kittipat ``Bot'' Kampa and Sonya H. Mehta and Rosalia F. Tungaraza Information-Theoretic Based Feature Selection for Multi-Voxel Pattern Analysis of fMRI Data . . . . . . . . . 196--208 Adham Atyabi and Sean P. Fitzgibbon and David M. W. Powers Multiplication of EEG Samples through Replicating, Biasing, and Overlapping 209--219 Anonymous Front Matter . . . . . . . . . . . . . . ??
Christopher Kruegel Fighting Malicious Software . . . . . . 1--15 Chaitrali Amrutkar and Kapil Singh and Arunabh Verma and Patrick Traynor VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security 16--34 Andres Ojamaa and Karl Düüna Security Assessment of Node.js Platform 35--43 Prasad Naldurg Foundations of Dynamic Access Control 44--58 Khalid Zaman Bijon and Ram Krishnan and Ravi Sandhu Risk-Aware RBAC Sessions . . . . . . . . 59--74 Soumya Maity and Soumya K. Ghosh A Cognitive Trust Model for Access Control Framework in MANET . . . . . . . 75--88 Khalifa Toumi and César Andrés and Ana Cavalli Trust-orBAC: a Trust Access Control Model in Multi-Organization Environments 89--103 Matthew L. Bolton and Celeste M. Wallace and Lenore D. Zuck On Policies and Intents . . . . . . . . 104--118 Arne Swinnen and Raoul Strackx and Pieter Philippaerts and Frank Piessens ProtoLeaks: a Reliable and Protocol-Independent Network Covert Channel . . . . . . . . . . . . . . . . 119--133 Goutam Paul and Ian Davidson and Imon Mukherjee and S. S. Ravi Keyless Steganography in Spatial Domain Using Energetic Pixels . . . . . . . . . 134--148 Ruchira Naskar and Rajat Subhra Chakraborty Fuzzy Inference Rule Based Reversible Watermarking for Digital Images . . . . 149--163 Vivek Natarajan and Yi Yang and Sencun Zhu Secure Trust Metadata Management for Mobile Ad-Hoc Networks . . . . . . . . . 164--180 Rakesh Matam and Somanath Tripathy Defence against Wormhole Attacks in Wireless Mesh Networks . . . . . . . . . 181--193 Sarita Agrawal and Rodrigo Roman and Manik Lal Das and Anish Mathuria and Javier Lopez A Novel Key Update Protocol in Mobile Sensor Networks . . . . . . . . . . . . 194--207 Anup Kumar Bhattacharya and Abhijit Das and Dipanwita Roychoudhury and Aravind Iyer Autonomous Certification with List-Based Revocation for Secure V2V Communication 208--222 Weihan Li and Brajendra Panda and Qussai Yaseen Mitigating Insider Threat on Database Integrity . . . . . . . . . . . . . . . 223--237 Jaydeep Howlader and Jayanta Kar and Ashis Kumar Mal Coercion Resistant MIX for Electronic Auction . . . . . . . . . . . . . . . . 238--248 Girish Chandra and Divakar Yadav Verification of Money Atomicity in Digital Cash Based Payment System . . . 249--264 Alberto Peinado and Amparo Fúster-Sabater Cryptographic Analysis of a Type of Sequence Generators . . . . . . . . . . 265--276 Soumyadev Maity and R. C. Hansdah Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs . . . . . . . . . . . . . . . . . 277--293 Anonymous Front Matter . . . . . . . . . . . . . . ??
Fengling Han and Ron van Schyndel M-Identity and Its Authentication Protocol for Secure Mobile Commerce Applications . . . . . . . . . . . . . . 1--10 Avinash Srinivasan and Jie Wu SafeCode --- Safeguarding Security and Privacy of User Data on Stolen iOS Devices . . . . . . . . . . . . . . . . 11--20 Alexandre Braga and Rafael Cividanes and Ismael Ávila and Claudia Tambascia Protection Aspects of Iconic Passwords on Mobile Devices . . . . . . . . . . . 21--32 Mariem Graa and Nora Cuppens-Boulahia and Frédéric Cuppens and Ana Cavalli Detecting Control Flow in Smartphones: Combining Static and Dynamic Analyses 33--47 Jemal Abawajy and Andrei Kelarev A Multi-tier Ensemble Construction of Classifiers for Phishing Email Detection and Filtering . . . . . . . . . . . . . 48--56 Yong Feng and Bo Wang and Fengling Han and Xinghuo Yu and Zahir Tari Chattering-Free Terminal Sliding-Mode Observer for Anomaly Detection . . . . . 57--65 Paul A. Watters and Nigel Phair Detecting Illicit Drugs on Social Media Using Automated Social Media Intelligence Analysis (ASMIA) . . . . . 66--76 Juan Pablo Timpanaro and Isabelle Chrisment and Olivier Festor Improving Content Availability in the I2P Anonymous File-Sharing Environment 77--92 Mark Stegelmann and Dogan Kesdogan V2GPriv: Vehicle-to-Grid Privacy in the Smart Grid . . . . . . . . . . . . . . . 93--107 Daniel Angermeier and Konstantin Böttinger and Andreas Ibing and Dieter Schuster A Secure Architecture for Smart Meter Systems . . . . . . . . . . . . . . . . 108--122 Geng Yang and Qiang Zhou and Xiaolong Xu and Jian Xu and Chunming Rong A Novel Identity-Based Key Management and Encryption Scheme for Distributed System . . . . . . . . . . . . . . . . . 123--138 Ferdous A. Barbhuiya and Tonmoy Saikia and Sukumar Nandi An Anomaly Based Approach for HID Attack Detection Using Keystroke Dynamics . . . 139--152 Avinash Srinivasan and Lashidhar Chennupati Robust Authentication of Public Access Points Using Digital Certificates --- a Novel Approach . . . . . . . . . . . . . 153--164 Han Fei and Qin Jing and Zhao Huawei and Hu Jiankun A General Transformation from KP-ABE to Searchable Encryption . . . . . . . . . 165--178 Luca Ferretti and Michele Colajanni and Mirco Marchetti Supporting Security and Consistency for Cloud Database . . . . . . . . . . . . . 179--193 Ronald Petrlic Proxy Re-encryption in a Privacy-Preserving Cloud Computing DRM Scheme . . . . . . . . . . . . . . . . . 194--211 Satoru Akimoto and Yoshiaki Hori and Kouichi Sakurai Collaborative Behavior Visualization and Its Detection by Observing Darknet Traffic . . . . . . . . . . . . . . . . 212--226 Craig Valli SSH --- Somewhat Secure Host . . . . . . 227--235 Nimalaprakasan Skandhakumar and Farzad Salim and Jason Reid and Ed Dawson Physical Access Control Administration Using Building Information Models . . . 236--250 Yongming Yang and Zulong Zhang and Fengling Han and Kunming Lin Multiple Factors Based Evaluation of Fingerprint Images Quality . . . . . . . 251--264 Anonymous Front Matter . . . . . . . . . . . . . . ??
Saber M. Elsayed and Ruhul A. Sarker and Daryl L. Essam The Influence of the Number of Initial Feasible Solutions on the Performance of an Evolutionary Optimization Algorithm 1--11 Kiyoharu Tagawa Concurrent Differential Evolution Based on Generational Model for Multi-core CPUs . . . . . . . . . . . . . . . . . . 12--21 Wenlong Fu and Mark Johnston and Mengjie Zhang Figure of Merit Based Fitness Functions in Genetic Programming for Edge Detection . . . . . . . . . . . . . . . 22--31 Amadeo Ascó and Jason A. D. Atkin and Edmund K. Burke An Evolutionary Algorithm for the Over-constrained Airport Baggage Sorting Station Assignment Problem . . . . . . . 32--41 Dung H. Phan and Junichi Suzuki A Non-parametric Statistical Dominance Operator for Noisy Multiobjective Optimization . . . . . . . . . . . . . . 42--51 Marwa Khater and Elham Salehi and Robin Gras The Emergence of New Genes in EcoSim and Its Effect on Fitness . . . . . . . . . 52--61 Mohsen Davarynejad and Zary Forghany and Jan van den Berg Mass-Dispersed Gravitational Search Algorithm for Gene Regulatory Network Model Parameter Identification . . . . . 62--72 Bin Zhang and Kamran Shafi and Hussein A. Abbass A Density Based Approach to the Access Point Layout Smart Distribution Grid Design Optimization Problem . . . . . . 73--82 Mostafa Ellabaan and Xianshun Chen and Nguyen Quang Huy Multi-modal Valley-Adaptive Memetic Algorithm for Efficient Discovery of First-Order Saddle Points . . . . . . . 83--92 Hisao Ishibuchi and Masakazu Yamane and Yusuke Nojima Ensemble Fuzzy Rule-Based Classifier Design by Parallel Distributed Fuzzy GBML Algorithms . . . . . . . . . . . . 93--103 Ahmed Kafafy and Ahmed Bounekkar and Stéphane Bonnevay HEMH2: An Improved Hybrid Evolutionary Metaheuristics for 0/1 Multiobjective Knapsack Problems . . . . . . . . . . . 104--116 Prashant Singh Rana and Harish Sharma and Mahua Bhattacharya and Anupam Shukla Guided Reproduction in Differential Evolution . . . . . . . . . . . . . . . 117--127 Una Benlic and Jin-Kao Hao A Study of Breakout Local Search for the Minimum Sum Coloring Problem . . . . . . 128--137 Masaya Nakata and Pier Luca Lanzi and Keiki Takadama XCS with Adaptive Action Mapping . . . . 138--147 Cuong C. Vu and Lam Thu Bui and Hussein A. Abbass DEAL: a Direction-Guided Evolutionary Algorithm . . . . . . . . . . . . . . . 148--157 Susanne Rosenthal and Nail El-Sourani and Markus Borschbach Introduction of a Mutation Specific Fast Non-dominated Sorting GA Evolved for Biochemical Optimizations . . . . . . . 158--167 Eman Sayed and Daryl Essam and Ruhul Sarker Using Hybrid Dependency Identification with a Memetic Algorithm for Large Scale Optimization Problems . . . . . . . . . 168--177 Rohitash Chandra and Mengjie Zhang and Lifeng Peng Application of Cooperative Convolution Optimization for $^{13}$C Metabolic Flux Analysis: Simulation of Isotopic Labeling Patterns Based on Tandem Mass Spectrometry Measurements . . . . . . . 178--187 Hoang Xuan Huan and Dong Do Duc and Nguyen Manh Ha An Efficient Two-Phase Ant Colony Optimization Algorithm for the Closest String Problem . . . . . . . . . . . . . 188--197 Kamran Shafi and Kathryn E. Merrick and Essam Debie Evolution of Intrinsic Motives in Multi-agent Simulations . . . . . . . . 198--207 Anonymous Front Matter . . . . . . . . . . . . . . ??
Chao Wang and Yunhong Wang and Zhaoxiang Zhang Incremental Learning of Patch-Based Bag of Facial Words Representation for Online Face Recognition in Videos . . . 1--9 Adam Borowiak and Ulrich Reiter and U. Peter Svensson Evaluation of Audio Quality Requirements over Extended Periods of Time Using Long Duration Audiovisual Content . . . . . . 10--20 Liang Tao and Horace H. S. Ip Hashing with Cauchy Graph . . . . . . . 21--32 Sang Phan and Thanh Duc Ngo and Vu Lam and Son Tran and Duy-Dinh Le and Duc Anh Duong and Shin'ichi Satoh Multimedia Event Detection Using Segment-Based Approach for Motion Feature . . . . . . . . . . . . . . . . 33--44 Stefan Romberg and Moritz August and Christian X. Ries and Rainer Lienhart Robust Feature Bundling . . . . . . . . 45--56 Yang Liang and Mingli Song and Jiajun Bu and Chun Chen Colorization for Gray Scale Facial Image by Locality-Constrained Linear Coding 57--67 Xiaozhou Zhou and Pierre Boulanger New Eye Contact Correction Using Radial Basis Function for Wide Baseline Videoconference System . . . . . . . . . 68--79 Wenxin Yu and Weichen Wang and Zhengyan Guo and Satoshi Goto An Integrated Hole-Filling Algorithm for View Synthesis . . . . . . . . . . . . . 80--92 Shenggao Zhu and Hugh Anderson and Ye Wang A Real-Time On-Chip Algorithm for IMU-Based Gait Measurement . . . . . . . 93--104 Shenggao Zhu and Hugh Anderson and Ye Wang Reducing the Power Consumption of an IMU-Based Gait Measurement System . . . 105--116 Yuxia Wang and Yuan Zhang and Rui Lu and Pamela C. Cosman SSIM-Based End-to-End Distortion Modeling for H.264 Video Coding . . . . 117--128 Lei Sun and Zhenyu Liu and Takeshi Ikenaga A Videoconferencing-Oriented Hybrid-Domain H.264/SVC to H.264/AVC Spatial Transcoder . . . . . . . . . . . 129--141 Chongwu Tang and Xiaokang Yang and Guangtao Zhai Robust Noise Estimation Based on Noise Injection . . . . . . . . . . . . . . . 142--152 Jinjian Wu and Fei Qi and Guangming Shi Image Quality Assessment Based on Improved Structural SIMilarity . . . . . 153--163 Chun-Chi Chen and Wen-Hsiao Peng and Shih-Chun Chou Multi-hypothesis Temporal Prediction Using Template Matching Prediction and Block Motion Compensation for High Efficiency Video Coding . . . . . . . . 164--175 Hong Lu and Kai Chen and Guobao Jiang and Renzhong Wei and Xiangyang Xue Leveraging Exemplar and Saliency Model for Image Search Reranking . . . . . . . 176--185 Shuxin Qin and Xiaoyang Zhu and Haitao Yu and Shuiying Ge and Yiping Yang and Yongshi Jiang Real-Time Markerless Hand Gesture Recognition with Depth Camera . . . . . 186--197 Zhaoqiang Xia and Jinye Peng and Xiaoyi Feng and Jianping Fan Social Tag Enrichment via Automatic Abstract Tag Refinement . . . . . . . . 198--209 Charles-Henri Quivy and Itsuo Kumazawa ``\ldotsIt's Orange and Small, and White Stripes\ldots'' . . . . . . . . . . . . 210--221 Arpit Shukla and Karan Nathwani and Rajesh M. Hegde An Adaptive Non Reference Anchor Array Framework for Distant Speech Recognition 222--231 Anonymous Front Matter . . . . . . . . . . . . . . ??
Yadong Zhu and Yuanhai Xue and Jiafeng Guo and Yanyan Lan and Xueqi Cheng and Xiaoming Yu Exploring and Exploiting Proximity Statistic for Information Retrieval Model . . . . . . . . . . . . . . . . . 1--13 Zongcheng Ji and Fei Xu and Bin Wang A Category-integrated Language Model for Question Retrieval in Community Question Answering . . . . . . . . . . . . . . . 14--25 Tetsuya Sakai and Zhicheng Dou and Ruihua Song and Noriko Kando The Reusability of a Diversified Search Test Collection . . . . . . . . . . . . 26--38 Tetsuya Sakai and Makoto P. Kato One Click One Revisited: Enhancing Evaluation Based on Information Units 39--51 Zhen Yue and Shuguang Han and Daqing He A Comparison of Action Transitions in Individual and Collaborative Exploratory Web Search . . . . . . . . . . . . . . . 52--63 Minghui Qiu and Yaliang Li and Jing Jiang Query-Oriented Keyphrase Extraction . . 64--75 Jinpeng Wang and Wayne Xin Zhao and Rui Yan and Haitian Wei and Jian-Yun Nie and Xiaoming Li Using Lexical and Thematic Knowledge for Name Disambiguation . . . . . . . . . . 76--88 Xueni Li and Shaowu Zhang and Liang Yang and Hongfei Lin Sells Out or Piles Up? A Sentiment Autoregressive Model for Predicting Sales Performance . . . . . . . . . . . 89--102 Zhenyu Qi and Kang Liu and Jun Zhao Are Human-Input Seeds Good Enough for Entity Set Expansion? Seeds Rewriting by Leveraging Wikipedia Semantic Knowledge 103--113 Antti Puurula Combining Modifications to Multinomial Naive Bayes for Text Classification . . 114--125 Junta Mizuno and Eric Nichols and Yotaro Watanabe and Kentaro Inui Organizing Information on the Web through Agreement-Conflict Relation Classification . . . . . . . . . . . . . 126--137 Mitsuo Yoshida and Yuki Arase Exploiting Twitter for Spiking Query Classification . . . . . . . . . . . . . 138--149 Kejiang Ren and Shaowu Zhang and Hongfei Lin Where Are You Settling Down: Geo-locating Twitter Users Based on Tweets and Social Networks . . . . . . . 150--161 Chang-Woo Chun and Jung-Tae Lee and Seung-Wook Lee and Hae-Chang Rim Detecting Informative Messages Based on User History in Twitter . . . . . . . . 162--173 Changhao Jiang and Min Zhang and Bin Gao and Tie-Yan Liu A Study on Potential Head Advertisers in Sponsored Search . . . . . . . . . . . . 174--186 Tianshu Chang and Hongfei Lin and Yuan Lin Feature Transformation Method Enhanced Vandalism Detection in Wikipedia . . . . 187--198 Junting Ye and Yanan Qian and Qinghua Zheng PLIDMiner: a Quality Based Approach for Researcher's Homepage Discovery . . . . 199--210 Kai Lu and Guanyuan Zhang and Rui Li and Shuai Zhang and Bin Wang Exploiting and Exploring Hierarchical Structure in Music Recommendation . . . 211--225 Leszek Kaliciak and Ben Horsburgh and Dawei Song and Nirmalie Wiratunga and Jeff Pan Enhancing Music Information Retrieval by Incorporating Image-Based Local Features 226--237 Liang Shi and Bin Wang Yet Another Sorting-Based Solution to the Reassignment of Document Identifiers 238--249 Anonymous Front Matter . . . . . . . . . . . . . . ??
Debayan Deb and Kalyanmoy Deb Investigation of Mutation Schemes in Real-Parameter Genetic Algorithms . . . 1--8 Kaizhou Z. Gao Discrete Harmony Search Algorithm for Dynamic FJSSP in Remanufacturing Engineering . . . . . . . . . . . . . . 9--16 Soham Sarkar and Swagatam Das Multilevel Image Thresholding Based on Tsallis Entropy and Differential Evolution . . . . . . . . . . . . . . . 17--24 Dipankar Maity and Udit Halder Convergence and Boundary Estimation of the Particle Dynamics in Generalized Particle Swarm Optimization . . . . . . 25--32 Sudipta Das and Durbadal Mandal Application of Differential Evolution with Best of Random Mutation Strategy on Asymmetric Location Only Synthesis of Broadside Circular Antenna Array . . . . 33--40 Tinu Varghese and R. Sheela Kumari Performance Evaluation of Bacterial Foraging Optimization Algorithm for the Early Diagnosis and Tracking of Alzheimer's Disease . . . . . . . . . . 41--48 J. Senthilnath and P. B. Shreyas Multi-sensor Satellite Image Analysis Using Niche Genetic Algorithm for Flood Assessment . . . . . . . . . . . . . . . 49--56 Ananthanaryanan Rathinam and Ripunjoy Phukan Solution to Economic Load Dispatch Problem Based on FIREFLY Algorithm and Its Comparison with BFO, CBFO-S and CBFO-Hybrid . . . . . . . . . . . . . . 57--65 Layak Ali and Samrat L. Sabat and Siba K. Udgata MESFET DC Model Parameter Extraction Using Adaptive Accelerated Exploration Particle Swarm Optimizer . . . . . . . . 66--73 Kalam Narendar Reddy and Vadlamani Ravi Kernel Group Method of Data Handling: Application to Regression Problems . . . 74--81 Sanjay Agrawal and Rutuparna Panda An Efficient Algorithm for Gray Level Image Enhancement Using Cuckoo Search 82--89 Sumanta Panda and Debadutta Mishra and B. B. Biswal A Multi-objective Workspace Optimization of 3R Manipulator Using Modified PSO . . 90--97 Éderson R. Silva and Paulo R. Guardieiro An Analysis of Genetic Algorithm Based Anycast Routing in Delay and Disruption Tolerant Networks . . . . . . . . . . . 98--105 Bidishna Bhattacharya and Kamal Krishna Mandal Reactive Power Optimization Using Hybrid Cultural Algorithm . . . . . . . . . . . 106--115 Bhimsen Tudu and Preetam Roy and Sajjan Kumar Techno-Economic Feasibility Analysis of Hybrid Renewable Energy System Using Improved Version of Particle Swarm Optimization . . . . . . . . . . . . . . 116--123 Tirimula Rao Benala and Rajib Mall Software Effort Prediction Using Fuzzy Clustering and Functional Link Artificial Neural Networks . . . . . . . 124--132 Manas R. Nayak and Subrat K. Dash Optimal Placement and Sizing of Distributed Generation in Radial Distribution System Using Differential Evolution Algorithm . . . . . . . . . . 133--142 Daniel G. Ferrari and Leandro Nunes de Castro Clustering Algorithm Recommendation: a Meta-learning Approach . . . . . . . . . 143--150 Subhodip Biswas and Digbalay Bose and Souvik Kundu A Clustering Particle Based Artificial Bee Colony Algorithm for Dynamic Environment . . . . . . . . . . . . . . 151--159 Souvik Kundu and Subhodip Biswas and Swagatam Das A Selective Teaching-Learning Based Niching Technique with Local Diversification Strategy . . . . . . . . 160--168 Anonymous Front Matter . . . . . . . . . . . . . . ??
Srinivasan H. Sengamedu Scalable Analytics --- Algorithms and Systems . . . . . . . . . . . . . . . . 1--7 Vijay Srinivas Agneeswaran Big-Data --- Theoretical, Engineering and Analytics Perspective . . . . . . . 8--15 Tony Basil and Bollepalli S. Chandra and Choudur Lakshminarayan A Comparison of Statistical Machine Learning Methods in Heartbeat Detection and Classification . . . . . . . . . . . 16--25 Ammar Yasir and Mittapally Kumara Swamy and Polepalli Krishna Reddy and Subhash Bhalla Enhanced Query-By-Object Approach for Information Requirement Elicitation in Large Databases . . . . . . . . . . . . 26--41 Rajeev Gupta and Himanshu Gupta and Mukesh Mohania Cloud Computing and Big Data Analytics: What Is New from Databases Perspective? 42--61 Polepalli Krishna Reddy and Basi Bhaskar Reddy and D. Rama Rao A Model of Virtual Crop Labs as a Cloud Computing Application for Enhancing Practical Agricultural Education . . . . 62--76 Ammar Yasir and Mittapally Kumara Swamy and Polepalli Krishna Reddy Exploiting Schema and Documentation for Summarizing Relational Databases . . . . 77--90 Ullas Nambiar and Tanveer Faruquie and Shamanth Kumar and Fred Morstatter and Huan Liu Faceted Browsing over Social Media . . . 91--100 Anand Gupta and Manpreet Kathuria and Arjun Singh and Ashish Sachdeva and Shruti Bhati Analog Textual Entailment and Spectral Clustering (ATESC) Based Summarization 101--110 Jatin Kumar and Tushar Rao and Saket Srivastava Economics of Gold Price Movement-Forecasting Analysis Using Macro-economic, Investor Fear and Investor Behavior Features . . . . . . . 111--121 Joung Woo Ryu and Mehmed M. Kantardzic and Myung-Won Kim and A. Ra Khil An Efficient Method of Building an Ensemble of Classifiers in Streaming Data . . . . . . . . . . . . . . . . . . 122--133 Sraban Kumar Mohanty and Gopalan Sajith I/O Efficient Algorithms for Block Hessenberg Reduction Using Panel Approach . . . . . . . . . . . . . . . . 134--147 Anand Gupta and Prashant Khurana and Raveena Mathur Luring Conditions and Their Proof of Necessity through Mathematical Modelling 148--157 Myung-Won Kim and Eun-Ju Kim and Won-Moon Song and Sung-Yeol Song and A. Ra Khil Efficient Recommendation for Smart TV Contents . . . . . . . . . . . . . . . . 158--167 T. V. Vijay Kumar and Santosh Kumar Materialized View Selection Using Simulated Annealing . . . . . . . . . . 168--179 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Greg Morrisett Scalable Formal Machine Models . . . . . 1--3 Xavier Leroy Mechanized Semantics for Compiler Verification . . . . . . . . . . . . . . 4--6 Gilles Barthe and Benjamin Grégoire and César Kunz Automation in Computer-Aided Cryptography: Proofs, Attacks and Designs . . . . . . . . . . . . . . . . 7--8 Naoki Kobayashi Program Certification by Higher-Order Model Checking . . . . . . . . . . . . . 9--10 Valentin Robert and Xavier Leroy A Formally-Verified Alias Analysis . . . 11--26 Jianzhou Zhao and Steve Zdancewic Mechanized Verification of Computing Dominators for Formalizing Compilers . . 27--42 Dominic P. Mulligan and Claudio Sacerdoti Coen On the Correctness of an Optimising Assembler for the Intel MCS-51 Microprocessor . . . . . . . . . . . . . 43--59 Brian Campbell An Executable Semantics for CompCert C 60--75 Pierre-Nicolas Tollitte and David Delahaye and Catherine Dubois Producing Certified Functional Code from Inductive Specifications . . . . . . . . 76--91 Lukas Bulwahn The New Quickcheck for Isabelle . . . . 92--108 Andrei Popescu and Johannes Hölzl and Tobias Nipkow Proving Concurrent Noninterference . . . 109--125 Toby Murray and Daniel Matichuk and Matthew Brassil Noninterference for Operating System Kernels . . . . . . . . . . . . . . . . 126--142 Alexander Vaynberg and Zhong Shao Compositional Verification of a Baby Virtual Memory Manager . . . . . . . . . 143--159 Keisuke Nakano Shall We Juggle, Coinductively? . . . . 160--172 Beniamino Accattoli Proof Pearl: Abella Formalization of $\lambda$-Calculus Cube Property . . . . 173--187 Hing-Lun Chan and Michael Norrish A String of Pearls: Proofs of Fermat's Little Theorem . . . . . . . . . . . . . 188--207 Kaustuv Chaudhuri Compact Proof Certificates for Linear Logic . . . . . . . . . . . . . . . . . 208--223 Christian Doczkal and Gert Smolka Constructive Completeness for Modal Logic with Transitive Closure . . . . . 224--239 Andrea Asperti and Wilmer Ricciotti Rating Disambiguation Errors . . . . . . 240--255 Pierre Neron A Formal Proof of Square Root and Division Elimination in Embedded Programs . . . . . . . . . . . . . . . . 256--272 Anonymous Front Matter . . . . . . . . . . . . . . ??
Edmund M. Clarke and William Klieber Model Checking and the State Explosion Problem . . . . . . . . . . . . . . . . 1--30 Patrice Godefroid and Shuvendu K. Lahiri From Program to Logic: An Introduction 31--44 Christine Paulin-Mohring Introduction to the Coq Proof-Assistant for Practical Software Verification . . 45--95 César A. Muñoz and Ramiro A. Demasi Advanced Theorem Proving Techniques in PVS and Applications . . . . . . . . . . 96--132 Julian Tschannen and Carlo Alberto Furia Automatic Verification of Advanced Object-Oriented Features: The AutoProof Approach . . . . . . . . . . . . . . . . 133--155 Luke Herbert and K. Rustan M. Leino Using Dafny, an Automatic Program Verifier . . . . . . . . . . . . . . . . 156--181 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Hristijan Gjoreski and Mitja Lu\vstrek and Matja\vz Gams Context-Based Fall Detection Using Inertial and Location Sensors . . . . . 1--16 Tobias Grosse-Puppendahl and Eugen Berlin and Marko Borazio Enhancing Accelerometer-Based Activity Recognition with Capacitive Proximity Sensing . . . . . . . . . . . . . . . . 17--32 Sara Bongartz and Yucheng Jin and Fabio Patern\`o and Joerg Rett and Carmen Santoro Adaptive User Interfaces for Smart Environments with the Support of Model-Based Languages . . . . . . . . . 33--48 Sebastian Osswald and Alexander Meschtscherjakov and Nicole Mirnig and Karl-Armin Kraessig Back of the Steering Wheel Interaction: The Car Braille Keyer . . . . . . . . . 49--64 Eric Struse and Julian Seifert and Sebastian Üllenbeck and Enrico Rukzio and Christopher Wolf PermissionWatcher: Creating User Awareness of Application Permissions in Mobile Systems . . . . . . . . . . . . . 65--80 Kaisa Väänänen-Vainio-Mattila and Tomi Haustola and Jonna Häkkilä and Minna Karukka Exploring Non-verbal Communication of Presence between Young Children and Their Parents through the Embodied Teddy Bear . . . . . . . . . . . . . . . . . . 81--96 Joris Ijsselmuiden and Ann-Kristin Grosselfinger and David Münch and Michael Arens Automatic Behavior Understanding in Crisis Response Control Rooms . . . . . 97--112 Ewald Strasser and Astrid Weiss and Thomas Grill and Sebastian Osswald and Manfred Tscheligi Combining Implicit and Explicit Methods for the Evaluation of an Ambient Persuasive Factory Display . . . . . . . 113--128 Valérian Guivarch and Valérie Camps and André Péninou Context Awareness in Ambient Systems by an Adaptive Multi-Agent Approach . . . . 129--144 Jethro Shell and Simon Coupland Towards Fuzzy Transfer Learning for Intelligent Environments . . . . . . . . 145--160 Radu-Daniel Vatavu and C\uat\ualin-Marian Chera and Wei-Tek Tsai Gesture Profile for Web Services: An Event-Driven Architecture to Support Gestural Interfaces for Smart Environments . . . . . . . . . . . . . . 161--176 Pedro Chahuara and Anthony Fleury and François Portet and Michel Vacher Using Markov Logic Network for On-Line Activity Recognition from Non-visual Home Automation Sensors . . . . . . . . 177--192 Bo\vzidara Cvetkovi\'c and Bo\vstjan Kalu\vza and Mitja Lu\vstrek and Matja\vz Gams Multi-Classifier Adaptive Training: Specialising an Activity Recognition Classifier Using Semi-supervised Learning . . . . . . . . . . . . . . . . 193--207 Mohamed A. Sehili and Benjamin Lecouteux and Michel Vacher and François Portet and Dan Istrate Sound Environment Analysis in Smart Home 208--223 Doris Zachhuber and Thomas Grill and Ondrej Polacek and Manfred Tscheligi Contextual Wizard of Oz . . . . . . . . 224--239 Berardina De Carolis and Stefano Ferilli and Nicole Novielli Recognizing the User Social Attitude in Multimodal Interaction in Smart Environments . . . . . . . . . . . . . . 240--255 Leila S. Shafti and Pablo A. Haya and Manuel García-Herranz and Eduardo Pérez Evolutionary Feature Extraction to Infer Behavioral Patterns in Ambient Intelligence . . . . . . . . . . . . . . 256--271 Ekaterina Kurdyukova and Stephan Hammer and Elisabeth André Personalization of Content on Public Displays Driven by the Recognition of Group Context . . . . . . . . . . . . . 272--287 Michael Zaki and Peter Forbrig Towards the Generation of Assistive User Interfaces for Smart Meeting Rooms Based on Activity Patterns . . . . . . . . . . 288--295 Saskia Robben and Kyra Bergman and Sven Haitjema and Yannick de Lange and Ben Kröse Reducing Dementia Related Wandering Behaviour with an Interactive Wall . . . 296--303 Anonymous Front Matter . . . . . . . . . . . . . . ??
Yanfeng Wang and Wenling Wu and Xiaoli Yu and Lei Zhang Security on LBlock against Biclique Cryptanalysis . . . . . . . . . . . . . 1--14 Keting Jia and Leibo Li Improved Impossible Differential Attacks on Reduced-Round MISTY1 . . . . . . . . 15--27 Satoshi Tanaka and Tung Chou and Bo-Yin Yang and Chen-Mou Cheng and Kouichi Sakurai Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs . . . . . . . . . . . . . . . . . . 28--42 Wentao Zhao and Xin Hai and Shaojing Fu and Chao Li and Yanfeng Wang Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity . . . . . . . . . . . . . . . . 43--54 Hwajeong Seo and Howon Kim Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors . . . . . . . . . . . . 55--67 Hyunmin Kim and Vladimir Rozic and Ingrid Verbauwhede Three Phase Dynamic Current Mode Logic: a More Secure DyCML to Achieve a More Balanced Power Consumption . . . . . . . 68--81 JeaHoon Park and JaeCheol Ha Improved Differential Fault Analysis on Block Cipher ARIA . . . . . . . . . . . 82--95 Pairat Thorncharoensri and Willy Susilo and Yi Mu Multi-Level Controlled Signature . . . . 96--110 Liangze Li and Fan Zhang Tate Pairing Computation on Generalized Hessian Curves . . . . . . . . . . . . . 111--123 Mario Larangeira and Keisuke Tanaka Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle Model . . . . . . . 124--143 Hyun-Sun Kang and Chang-Seop Park An Authentication and Key Management Scheme for the Proxy Mobile IPv6 . . . . 144--160 László Aszalós and Andrea Huszti Payment Approval for PayWord . . . . . . 161--176 Jung Yeon Hwang and Sungwook Eom and Ku-Young Chang and Pil Joong Lee and DaeHun Nyang Anonymity-Based Authenticated Key Agreement with Full Binding Property . . 177--191 Junghoon Oh and Namheun Son and Sangjin Lee and Kyungho Lee A Study for Classification of Web Browser Log and Timeline Visualization 192--207 François Durvaux and Beno\^\it Gérard and Stéphanie Kerckhof and François Koeune Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions . . . . . . . . . . . . . 208--225 Shun-Te Liu and Yi-Ming Chen and Hui-Ching Hung $N$-Victims: An Approach to Determine $N$-Victims for APT Investigations . . . 226--240 Jaeun Choi and Gisung Kim and Tae Ghyoon Kim and Sehun Kim An Efficient Filtering Method for Detecting Malicous Web Pages . . . . . . 241--253 Eric Lin and John Aycock and Mohammad Mannan Lightweight Client-Side Methods for Detecting Email Forgery . . . . . . . . 254--269 Yang-seo Choi and Ik-Kyun Kim and Jin-Tae Oh and Jong-Soo Jang AIGG Threshold Based HTTP GET Flooding Attack Detection . . . . . . . . . . . . 270--284 Hyunjoo Kim and Byoungkoo Kim and Daewon Kim and Ik-Kyun Kim and Tai-Myoung Chung Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks . . . . . . . . . . . . . . . . 285--295 Anonymous Front Matter . . . . . . . . . . . . . . ??