Last update: Sat Oct 14 16:23:45 MDT 2017
Volume 7400, 2012Josep Carmona The Label Splitting Problem . . . . . . 1--23 Philippe Darondeau and Laurie Ricker Distributed Control of Discrete-Event Systems: a First Step . . . . . . . . . 24--45 Lom-Messan Hillah and Fabrice Kordon and Charles Lakos and Laure Petrucci Extending pnml Scope: a Framework to Combine Petri Nets Types . . . . . . . . 46--70 Ekkart Kindler Modelling Local and Global Behaviour: Petri Nets and Event Coordination . . . 71--93 Ala-Eddine Ben Salem and Alexandre Duret-Lutz and Fabrice Kordon Model Checking Using Generalized Testing Automata . . . . . . . . . . . . . . . . 94--122 Nicolas Sedlmajer and Didier Buchs and Steve Hostettler and Alban Linard and Edmundo López Bóbeda A Domain Specific Language Approach for Genetic Regulatory Mechanisms Analysis 123--145 Michael Westergaard Verifying Parallel Algorithms and Programs Using Coloured Petri Nets . . . 146--168 Fabrice Kordon and Alban Linard and Didier Buchs and Maximilien Colange and Sami Evangelista Report on the Model Checking Contest at Petri Nets 2011 . . . . . . . . . . . . 169--196 Christine Choppy and Anna Dedova and Sami Evangelista and Ka\"\is Kla\"\i and Laure Petrucci Modelling and Formal Verification of the NEO Protocol . . . . . . . . . . . . . . 197--225 Sonya Arnold and Jonathan Billington An Initial Coloured Petri Net Model of the Hypertext Transfer Protocol Operating over the Transmission Control Protocol . . . . . . . . . . . . . . . . 226--250 Suriadi Suriadi and Chun Ouyang and Ernest Foo Privacy Compliance Verification in Cryptographic Protocols . . . . . . . . 251--276 Dario Bruneo and Francesco Longo and Antonio Puliafito Modeling Energy-Aware Cloud Federations with SRNs . . . . . . . . . . . . . . . 277--307 Stefano Marrone and Nicola Mazzocca and Roberto Nardone and Roberta Presta and Simon Pietro Romano A SAN-Based Modeling Approach to Performance Evaluation of an IMS-Compliant Conferencing Framework . . 308--333 Boudewijn F. van Dongen and Jörg Desel and Wil M. P. van der Aalst Aggregating Causal Runs into Workflow Nets . . . . . . . . . . . . . . . . . . 334--363 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Michalis Mavrovouniotis and Shengxiang Yang An Immigrants Scheme Based on Environmental Information for Ant Colony Optimization for the Dynamic Travelling Salesman Problem . . . . . . . . . . . . 1--12 Alan Díaz-Manríquez and Gregorio Toscano-Pulido and Ricardo Landa-Becerra A Surrogate-Based Intelligent Variation Operator for Multiobjective Optimization 13--24 Viviane Grunert da Fonseca and Carlos M. Fonseca The Relationship between the Covered Fraction, Completeness and Hypervolume Indicators . . . . . . . . . . . . . . . 25--36 Marc Schoenauer and Fabien Teytaud and Olivier Teytaud A Rigorous Runtime Analysis for Quasi-Random Restarts and Decreasing Stepsize . . . . . . . . . . . . . . . . 37--48 Sébastien Vérel and Fabio Daolio and Gabriela Ochoa and Marco Tomassini Local Optima Networks with Escape Edges 49--60 Evelyne Lutton and Julie Foucquier and Nathalie Perrot and Jean Louchet and Jean-Daniel Fekete Visual Analysis of Population Scatterplots . . . . . . . . . . . . . . 61--72 Robert-Jan Huijsman and Evert Haasdijk and A. E. Eiben An On-Line On-Board Distributed Algorithm for Evolutionary Robotics . . 73--84 Do\ugan Aydìn and Tianjun Liao and Marco A. Montes de Oca and Thomas Stützle Improving Performance via Population Growth and Local Search: The Case of the Artificial Bee Colony Algorithm . . . . 85--96 Ogier Maitre and Nicolas Lachiche and Pierre Collet Two Ports of a Full Evolutionary Algorithm onto GPGPU . . . . . . . . . . 97--108 Denis Robilliard and Cyril Fonlupt and Virginie Marion-Poty and Amine Boumaza A Multilevel Tabu Search with Backtracking for Exploring Weak Schur Numbers . . . . . . . . . . . . . . . . 109--119 Eduardo Rodriguez-Tello and Luis Carlos Betancourt An Improved Memetic Algorithm for the Antibandwidth Problem . . . . . . . . . 121--132 Vincent van der Goes Adaptive Play in a Pollution Bargaining Game . . . . . . . . . . . . . . . . . . 133--144 Mátyás Brendel and Marc Schoenauer Learn-and-Optimize: a Parameter Tuning Framework for Evolutionary AI Planning 145--155 Ivanoe De Falco and Antonio Della Cioppa and Domenico Maisto and Umberto Scafuri A Model Based on Biological Invasions for Island Evolutionary Algorithms . . . 157--168 Jorge Sebastian Hernández-Domínguez and Gregorio Toscano-Pulido and Carlos A. Coello Coello A Multi-objective Particle Swarm Optimizer Enhanced with a Differential Evolution Scheme . . . . . . . . . . . . 169--180 Benjamin Inden and Yaochu Jin and Robert Haschke and Helge Ritter Evolution of Multisensory Integration in Large Neural Fields . . . . . . . . . . 181--192 Amine Boumaza Reducing the Learning Time of Tetris in Evolution Strategies . . . . . . . . . . 193--204 Benjamin Doerr and Carola Winzen Black-Box Complexity: Breaking the $O(n \log n)$ Barrier of \sc LeadingOnes . . 205--216 Robin Roche and Lhassane Idoumghar and Benjamin Blunier and Abdellatif Miraoui Imperialist Competitive Algorithm for Dynamic Optimization of Economic Dispatch in Power Systems . . . . . . . 217--228 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Jing (Selena) He and Shouling Ji and Yi Pan Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks . . . . . . . . . . . . . . . . 1--12 Adrian Kosowski and Alfredo Navarra Maximum Matching in Multi-Interface Networks . . . . . . . . . . . . . . . . 13--24 Evangelos Kranakis and Fraser MacQuarrie Stretch Factor in Wireless Sensor Networks with Directional Antennae . . . 25--36 Wei Ding and Guoliang Xue On the Minimum Diameter Cost-Constrained Steiner Tree Problem . . . . . . . . . . 37--48 Eddie Cheng and Ke Qiu and Zhizhang Shen The Edge-Centered Surface Area of the Arrangement Graph . . . . . . . . . . . 49--60 Eunjeong Yi On Zero Forcing Number of Permutation Graphs . . . . . . . . . . . . . . . . . 61--72 Basile Couetoux and Jérome Monnot Complexity Results for the Empire Problem in Collection of Stars . . . . . 73--82 Sudip Biswas and Stephane Durocher Hamiltonian Paths and Cycles in Planar Graphs . . . . . . . . . . . . . . . . . 83--94 Chaoyi Wang and Tian Liu and Wei Jiang and Ke Xu Feedback Vertex Sets on Tree Convex Bipartite Graphs . . . . . . . . . . . . 95--102 Karin Arikushi and Csaba D. Tóth Crossing Angles of Geometric Graphs . . 103--114 Martin Lackner and Reinhard Pichler Multicut on Graphs of Bounded Clique-Width . . . . . . . . . . . . . . 115--126 Chihao Zhang and Haitao Jiang and Binhai Zhu Radiation Hybrid Map Construction Problem Parameterized . . . . . . . . . 127--137 Yongding Zhu and Jinhui Xu On the Central Path Problem . . . . . . 138--150 Hong Liu and Peng Zhang On the Generalized Multiway Cut in Trees Problem . . . . . . . . . . . . . . . . 151--162 Zhewei Liang and Kaizhong Zhang Algorithms for Forest Local Similarity 163--175 Yelena Frid and Dan Gusfield Speedup of RNA Pseudoknotted Secondary Structure Recurrence Computation with the Four-Russians Method . . . . . . . . 176--187 Zhi-Zhong Chen and Lusheng Wang An Improved Approximation Algorithm for the Bandpass-2 Problem . . . . . . . . . 188--199 Mourad El Ouali and Gerold Jäger The $b$-Matching Problem in Hypergraphs: Hardness and Approximability . . . . . . 200--211 Qiang Zhang and Weiwei Wu and Minming Li Resource Scheduling with Supply Constraint and Linear Cost . . . . . . . 212--222 Iyad A. Kanj and Ge Xia On Certain Geometric Properties of the Yao--Yao Graphs . . . . . . . . . . . . 223--233 Anonymous Front Matter . . . . . . . . . . . . . . ??
Santosh S. Vempala Effective Principal Component Analysis 1--7 Pavel Zezula Future Trends in Similarity Searching 8--24 Juan Manuel Barrios and Benjamin Bustos and Tomá\vs Skopal Snake Table: a Dynamic Pivot Table for Streams of $k$-NN Searches . . . . . . . 25--39 Tomá\vs Skopal and Tomá\vs Barto\vs Algorithmic Exploration of Axiom Spaces for Efficient Similarity Search at Large Scale . . . . . . . . . . . . . . . . . 40--53 Eric Sadit Tellez and Edgar Chavez and Karina Figueroa Polyphasic Metric Index: Reaching the Practical Limits of Proximity Searching 54--69 Luis G. Ares and Nieves R. Brisaboa and Alberto Ordóñez Pereira and Oscar Pedreira Efficient Similarity Search in Metric Spaces with Cluster Reduction . . . . . 70--84 Jakub Loko\vc and P\vremysl \vCech and Ji\vrí Novák and Tomá\vs Skopal Cut-Region: a Compact Building Block for Hierarchical Metric Indexing . . . . . . 85--100 Bilegsaikhan Naidan and Magnus Lie Hetland Static-to-Dynamic Transformation for Metric Indexing Structures . . . . . . . 101--115 Luis Britos and A. Marcela Printista and Nora Reyes DSACL+-tree: a Dynamic Data Structure for Similarity Search in Secondary Memory . . . . . . . . . . . . . . . . . 116--131 Yury Malkov and Alexander Ponomarenko and Andrey Logvinov and Vladimir Krylov Scalable Distributed Algorithm for Approximate Nearest Neighbor Search Problem in High Dimensional General Metric Spaces . . . . . . . . . . . . . 132--147 Hisham Mohamed and Stéphane Marchand-Maillet Parallel Approaches to Permutation-Based Indexing Using Inverted Files . . . . . 148--161 Leonid Boytsov Super-Linear Indices for Approximate Dictionary Searching . . . . . . . . . . 162--176 Jakub Loko\vc and David Novák and Michal Batko and Tomá\vs Skopal Visual Image Search: Feature Signatures or/and Global Descriptors . . . . . . . 177--191 Tomá\vs Barto\vs and Tomá\vs Skopal Revisiting Techniques for Lowerbounding the Dynamic Time Warping Distance . . . 192--208 Richard Connor and Robert Moss A Multivariate Correlation Distance for Vector Spaces . . . . . . . . . . . . . 209--225 Michael E. Houle and Hisashi Kashima and Michael Nett Fast Similarity Computation in Factorized Tensors . . . . . . . . . . . 226--239 Jakub Loko\vc and Tomá\vs Gro\vsup and Tomá\vs Skopal SIR: The Smart Image Retrieval Engine 240--241 Ji\vrí Novák and Jakub Galgonek and David Hoksza and Tomá\vs Skopal SimTandem: Similarity Search in Tandem Mass Spectra . . . . . . . . . . . . . . 242--243 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ?? Hisham Mohamed and Stéphane Marchand-Maillet Erratum: Parallel Approaches to Permutation-Based Indexing Using Inverted Files . . . . . . . . . . . . . E1--E2
Jian Li and Luoyi Fu and Xinbing Wang Throughput and Delay with Network Coding in Hybrid Mobile Ad Hoc Networks: a Global Perspective . . . . . . . . . . . 1--19 Shengling Wang and Min Liu and Xiuzhen Cheng HERO --- a Home Based Routing in Pocket Switched Networks . . . . . . . . . . . 20--30 Wei Cheng and Dengyuan Wu and Xiuzhen Cheng Routing for Information Leakage Reduction in Multi-channel Multi-hop Ad-Hoc Social Networks . . . . . . . . . 31--42 Chunyang Wu and Fan Wu and Guihai Chen AMPLE: a Novel Incentive Approach to Adaptive-Width Channel Allocation in Multi-hop, Non-cooperative Wireless Networks . . . . . . . . . . . . . . . . 43--59 Kuai Xu and Feng Wang and Lin Gu and Jianhua Gao Characterizing Home Network Traffic: An Inside View . . . . . . . . . . . . . . 60--71 Zuying Wei and Tianrong Zhang and Fan Wu SHIELD: a Strategy-Proof and Highly Efficient Channel Auction Mechanism for Multi-radio Wireless Networks . . . . . 72--87 Nam Tuan Nguyen and Yichuan Wang and Xin Liu A Nonparametric Bayesian Approach for Opportunistic Data Transfer in Cellular Networks . . . . . . . . . . . . . . . . 88--99 Yangfan Zhou and Xinyu Chen and Michael R. Lyu Online Protocol Verification in Wireless Sensor Networks via Non-intrusive Behavior Profiling . . . . . . . . . . . 100--111 Na Xia and Ruji Feng and Lina Xu SPSA Based Packet Size Optimization Algorithm in Wireless Sensor Networks 112--119 Xianwei Sun and Scott C.-H. Huang and Minming Li Lower Bounds on Data Collection Time in Sensor Networks . . . . . . . . . . . . 120--131 Deying Li and Donghyun Kim and Qinghua Zhu Minimum Total Communication Power Connected Dominating Set in Wireless Networks . . . . . . . . . . . . . . . . 132--141 Jingsong Lv and Victor C. S. Lee and Minming Li Supporting Multi-level Quality of Services in Data Broadcast Systems . . . 142--153 Fatme El-Moukaddem and Eric Torng Maximizing Network Topology Lifetime Using Mobile Node Rotation . . . . . . . 154--165 Feng Zhao and Bin Li and Hongbin Chen Joint Beamforming and Power Allocation Algorithm for Cognitive MIMO Systems via Game Theory . . . . . . . . . . . . . . 166--177 Xiaorong Xu and Aiping Huang and Jianwu Zhang Bit Allocation Scheme with Primary Base Station Cooperation in Cognitive Radio Network . . . . . . . . . . . . . . . . 178--186 Manish Wadhwa and Chunsheng Xin and Min Song Optimal Spectrum Sharing for Contention-Based Cognitive Radio Wireless Networks . . . . . . . . . . . 187--196 Xiaohua Xu and Jiannong Cao and Peng-Jun Wan Fast Group Communication Scheduling in Duty-Cycled Multihop Wireless Sensor Networks . . . . . . . . . . . . . . . . 197--205 Mai Abdelhakim and Jian Ren and Tongtong Li Reliable Cooperative Sensing in Cognitive Networks . . . . . . . . . . . 206--217 Xuanyu Cao and Jinbei Zhang and Guanglin Zhang Heterogeneous Multicast Networks with Wireless Helping Networks . . . . . . . 218--234 Adam C. Champion and Xinfeng Li and Qiang Zhai Enclave: Promoting Unobtrusive and Secure Mobile Communications with a Ubiquitous Electronic World . . . . . . 235--247 Anonymous Front Matter . . . . . . . . . . . . . . ??
Lawrence C. Paulson MetiTarski: Past and Future . . . . . . 1--10 Gilles Barthe and Juan Manuel Crespo and Benjamin Grégoire and César Kunz Computer-Aided Cryptographic Proofs . . 11--27 André Platzer A Differential Operator Approach to Equational Differential Invariants . . . 28--48 Andrew Gacek Abella: a Tutorial . . . . . . . . . . . 49--50 Ruben Gamboa and John Cowles A Cantor Trio: Denumerability, the Reals, and the Real Algebraic Numbers 51--66 Cyril Cohen Construction of Real Algebraic Numbers in Coq . . . . . . . . . . . . . . . . . 67--82 Maxime Dén\`es and Anders Mörtberg and Vincent Siles A Refinement-Based Approach to Computational Algebra in Coq . . . . . . 83--98 David Greenaway and June Andronick and Gerwin Klein Bridging the Gap: Automatic Verified Abstraction of C . . . . . . . . . . . . 99--115 Tobias Nipkow Abstract Interpretation of Annotated Commands . . . . . . . . . . . . . . . . 116--132 Patrick Michel and Arnd Poetzsch-Heffter Verifying and Generating WP Transformers for Procedures on Complex Data . . . . . 133--148 Nils Anders Danielsson Bag Equivalence via a Proof-Relevant Membership Relation . . . . . . . . . . 149--165 Peter Lammich and Thomas Tuerk Applying Data Refinement for Monadic Programs to Hopcroft's Algorithm . . . . 166--182 Marino Miculan and Marco Paviotti Synthesis of Distributed Mobile Programs Using Monadic Types in Coq . . . . . . . 183--200 David Baelde and Pierre Courtieu and David Gross-Amblard and Christine Paulin-Mohring Towards Provably Robust Watermarking . . 201--216 Xingyuan Zhang and Christian Urban and Chunhan Wu Priority Inheritance Protocol Proved Correct . . . . . . . . . . . . . . . . 217--232 Reynald Affeldt and Manabu Hagiwara Formalization of Shannon's Theorems in SSReflect--Coq . . . . . . . . . . . . . 233--249 Dimitrios Vytiniotis and Thierry Coquand and David Wahlstedt Stop When You Are Almost-Full . . . . . 250--265 Christian Sternagel and René Thiemann Certification of Nontermination Proofs 266--282 Andrea Asperti A Compact Proof of Decidability for Regular Expression Equivalence . . . . . 283--298 William Mansky and Elsa L. Gunter Using Locales to Define a Rely-Guarantee Temporal Logic . . . . . . . . . . . . . 299--314 Anonymous Front Matter . . . . . . . . . . . . . . ??
Per Austrin and Ryan O'Donnell and John Wright A New Point of NP-Hardness for 2-to-1 Label Cover . . . . . . . . . . . . . . 1--12 Per Austrin and Toniann Pitassi and Yu Wu Inapproximability of Treewidth, One-Shot Pebbling, and Related Layout Problems 13--24 Pranjal Awasthi and Avrim Blum and Jamie Morgenstern and Or Sheffet Additive Approximation for Near-Perfect Phylogeny Construction . . . . . . . . . 25--36 Pranjal Awasthi and Or Sheffet Improved Spectral-Norm Bounds for Clustering . . . . . . . . . . . . . . . 37--49 Piotr Berman and Grigory Yaroslavtsev Primal-Dual Approximation Algorithms for Node-Weighted Network Design in Planar Graphs . . . . . . . . . . . . . . . . . 50--60 Petros Boufounos and Volkan Cevher and Anna C. Gilbert and Yi Li and Martin J. Strauss What's the Frequency, Kenneth?: Sublinear Fourier Sampling Off the Grid 61--72 Parinya Chalermsook and Julia Chuzhoy and Sampath Kannan and Sanjeev Khanna Improved Hardness Results for Profit Maximization Pricing Problems with Unlimited Supply . . . . . . . . . . . . 73--84 Ho-Leung Chan and Tak-Wah Lam and Rongbin Li Online Flow Time Scheduling in the Presence of Preemption Overhead . . . . 85--97 Chandra Chekuri and Alina Ene and Ali Vakilian Prize-Collecting Survivable Network Design in Node-Weighted Graphs . . . . . 98--109 Joseph Cheriyan and Zachary Friggstad and Zhihan Gao Approximating Minimum-Cost Connected T-Joins . . . . . . . . . . . . . . . . 110--121 Michael Dinitz and Gordon Wilfong iBGP and Constrained Connectivity . . . 122--133 Leah Epstein and \Lukasz Je\.z and Ji\vrí Sgall and Rob van Stee Online Scheduling of Jobs with Fixed Start Times on Related Machines . . . . 134--145 Cristina G. Fernandes and Luís A. A. Meira and Flávio K. Miyazawa and Lehilton L. C. Pedrosa A Systematic Approach to Bound Factor Revealing LPs and Its Application to the Metric and Squared Metric Facility Location Problems . . . . . . . . . . . 146--157 Venkatesan Guruswami and Yuan Zhou Approximating Bounded Occurrence Ordering CSPs . . . . . . . . . . . . . 158--169 Johan Håstad On the NP-Hardness of Max-Not-2 . . . . 170--181 Ishay Haviv The Remote Set Problem on Lattices . . . 182--193 Matthias Hellwig and Alexander Souza Approximation Algorithms for Generalized and Variable-Sized Bin Covering . . . . 194--205 Satoru Iwata and Prasad Tetali and Pushkar Tripathi Approximating Minimum Linear Ordering Problems . . . . . . . . . . . . . . . . 206--217 Samir Khuller and Barna Saha and Kanthi K. Sarpatwar New Approximation Results for Resource Replication Problems . . . . . . . . . . 218--230 Christian Konrad and Frédéric Magniez and Claire Mathieu Maximum Matching in Semi-streaming with Few Passes . . . . . . . . . . . . . . . 231--242 Anonymous Front Matter . . . . . . . . . . . . . . ??
Luís Felipe I. Cunha and Luis Antonio B. Kowada Transposition Diameter and Lonely Permutations . . . . . . . . . . . . . . 1--12 Pedro Feijao and Joao Meidanis Extending the Algebraic Formalism for Genome Rearrangements to Include Linear Chromosomes . . . . . . . . . . . . . . 13--24 Gustavo Rodrigues Galvão and Zanoni Dias On the Approximation Ratio of Algorithms for Sorting by Transpositions without Using Cycle Graphs . . . . . . . . . . . 25--36 A. A. Matroud and C. P. Tuffley and D. Bryant A Comparison of Three Heuristic Methods for Solving the Parsing Problem for Tandem Repeats . . . . . . . . . . . . . 37--48 Ronny Lorenz and Stephan H. Bernhart RNA Folding Algorithms with G-Quadruplexes . . . . . . . . . . . . . 49--60 César Manuel Vargas Benítez Molecular Dynamics for Simulating the Protein Folding Process Using the $3$D AB Off-Lattice Model . . . . . . . . . . 61--72 Halian Vilela and Tainá Raiol A Bioconductor Based Workflow for Z-DNA Region Detection and Biological Inference . . . . . . . . . . . . . . . 73--83 Fernando A. F. Braz and Jader S. Cruz A Probabilistic Model Checking Approach to Investigate the Palytoxin Effects on the Na$^+$ /K$^+$-ATPase . . . . . . . . 84--96 Mariana R. Mendoza and Guilherme C. da Fonseca RFMirTarget: a Random Forest Classifier for Human miRNA Target Gene Prediction 97--108 Eduardo G. Gusmão and Christoph Dieterich Prediction of Transcription Factor Binding Sites by Integrating DNase Digestion and Histone Modification . . . 109--119 Pablo A. Jaskowiak Evaluating Correlation Coefficients for Clustering Gene Expression Profiles of Cancer . . . . . . . . . . . . . . . . . 120--131 Rogério S. Rosa and Rafael H. S. Santos Associating Genotype Sequence Properties to Haplotype Inference Errors . . . . . 132--143 Sérgio Lifschitz and Carlos Juliano M. Viana Design and Implementation of ProteinWorldDB . . . . . . . . . . . . . 144--155 Ana T. Winck and Christian V. Quevedo A Comparative Analysis of Public Ligand Databases Based on Molecular Descriptors 156--167 Wellington S. Martins and Thiago F. Rangel Phylogenetic Distance Computation Using CUDA . . . . . . . . . . . . . . . . . . 168--178 Kary A. C. S. Ocaña and Daniel de Oliveira Exploring Molecular Evolution Reconstruction Using a Parallel Cloud Based Scientific Workflow . . . . . . . 179--191 José Fernando Garcia How Bioinformatics Enables Livestock Applied Sciences in the Genomic Era . . 192--201 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Andrew L. Szilard The Kind Hearted Dragon Prof. Sheng Yu, 1950--2012 . . . . . . . . . . . . . . . 1--6 Erzsébet Csuhaj-Varjú P and dP Automata: Unconventional versus Classical Automata . . . . . . . . . . . 7--22 Kazuo Iwama Recovering Strings in Oracles: Quantum and Classic . . . . . . . . . . . . . . 23--23 Juraj Hromkovi\vc and Rastislav Královi\vc and Richard Královi\vc and Richard \vStefanec Determinism vs. Nondeterminism for Two-Way Automata . . . . . . . . . . . . 24--39 Jarkko Kari Cellular Automata, the Collatz Conjecture and Powers of $3/2$ . . . . . 40--49 Janusz Brzozowski and Hellis Tamm Quotient Complexities of Atoms of Regular Languages . . . . . . . . . . . 50--61 Marie-Pierre Béal and Jean-Marc Champarnaud and Jean-Philippe Dubernard and Hadrien Jeanne Decidability of Geometricity of Regular Languages . . . . . . . . . . . . . . . 62--72 Markus L. Schmid Inside the Class of REGEX Languages . . 73--84 Yo-Sub Han and Sang-Ki Ko and Kai Salomaa Computing the Edit-Distance between a Regular Language and a Context-Free Language . . . . . . . . . . . . . . . . 85--96 Michael Hoffmann and Derek F. Holt and Matthew D. Owens and Richard M. Thomas Semigroups with a Context-Free Word Problem . . . . . . . . . . . . . . . . 97--108 Markus Holzer and Sebastian Jakobi and Ian McQuillan Generalized Derivations with Synchronized Context-Free Grammars . . . 109--120 Alexander Okhotin Non-erasing Variants of the Chomsky--Schützenberger Theorem . . . . . 121--129 Daniel Reidenbach and Markus L. Schmid Regular and Context-Free Pattern Languages over Small Alphabets . . . . . 130--141 Zoltan Ésik and Satoshi Okawa On Context-Free Languages of Scattered Words . . . . . . . . . . . . . . . . . 142--153 Tommi Lehtinen and Alexander Okhotin Homomorphisms Preserving Deterministic Context-Free Languages . . . . . . . . . 154--165 Viliam Geffert and Dana Pardubská Unary Coded NP-Complete Languages in ASPACE$(\log \log n)$ . . . . . . . . . 166--177 Andreas Krebs and Klaus-Jörn Lange Dense Completeness . . . . . . . . . . . 178--189 Markus Holzer and Sebastian Jakobi From Equivalence to Almost-Equivalence, and Beyond--- Minimizing Automata with Errors . . . . . . . . . . . . . . . . . 190--201 Christos A. Kapoutsis and Nans Lefebvre Analogs of Fagin's Theorem for Small Nondeterministic Finite Automata . . . . 202--213 Martin Kutrib and Andreas Malcher and Matthias Wendlandt States and Heads Do Count for Unary Multi-head Finite Automata . . . . . . . 214--225 Anonymous Front Matter . . . . . . . . . . . . . . ??
Norah Jones and Esyin Chew Social Software for Learning --- The Institutional Policy of the University of Glamorgan . . . . . . . . . . . . . . 1--8 Ronghuai Huang and Haisen Zhang and Yushun Li and Junfeng Yang A Framework of Designing Learning Activities for Mobile Learning . . . . . 9--22 Uro\vs Kr\vcadinac and Jelena Jovanovi\'c and Vladan Deved\vzi\'c Visualizing the Affective Structure of Students Interaction . . . . . . . . . . 23--34 Nga-Sin Lau and Lui Lam An Investigation of the Determinants Influencing Student Learning Motivation via Facebook Private Group in Teaching and Learning . . . . . . . . . . . . . . 35--44 Cheng-Huang Yen A Preliminary Study of Disturbing Silence in Asynchronous Discussion Forums . . . . . . . . . . . . . . . . . 45--56 Huiling Chen and Guoqing Zhao and Ningyi Xu The Analysis of Research Hotspots and Fronts of Knowledge Visualization Based on CiteSpace II . . . . . . . . . . . . 57--68 Shaoming Chai and Meirong Ding Practical Research on the Assessment of Online Collaborative English Learning --- a Case Study of Blackboard-Based Course ``Intercultural Communication'' 69--76 Shuang Li and Pengfeng Shi and Qi Tang A Case Study on Scaffolding Design for Wiki-Based Collaborative Knowledge Building . . . . . . . . . . . . . . . . 77--88 Simon K. S. Cheung A Study on the Use of Mobile Devices for Distance Learning . . . . . . . . . . . 89--98 Harrison Hao Yang The Development of Collaborative Action Research through Cloud Computing Document-Sharing Services and Blended Learning Process . . . . . . . . . . . . 99--108 Wenchong Li and Xiuping Tu Research on the Comprehensive Practice Course of Primary School Based on Knowledge Building . . . . . . . . . . . 109--119 Chin Kee Diu and Wai Yu Ng Cost Effective Methodology in E-Adoption for E-Training Providers . . . . . . . . 120--131 Yoko Hirata and Yoshihiro Hirata Learning Logs in Hybrid Language Learning: Students' Views and Preferences . . . . . . . . . . . . . . 132--143 Kanishka Bedi The Significance of Face-to-Face Instruction in Hybrid Executive Education . . . . . . . . . . . . . . . 144--154 Pingping Zuo and Su Mu and Xiaomeng Han A Social Network Analysis of Students' Online Interaction in Hybrid Learning --- a Case Study of ``Media and Teaching'' Course . . . . . . . . . . . 155--164 J. Lam and C. G. Duan A Review of Mobile Learning Environment in Higher Education Sector of Hong Kong: Technological and Social Perspectives 165--173 Yanyan Li and Li Wang Modeling Semantic Context for Active e-Learning in the Workplace . . . . . . 174--185 Xing Lu and Guodong Zhao and Jianfeng Jiang Influential Factors of Blended Learning in Chinese Colleges: From the Perspective of Instructor's Acceptance and Students' Satisfaction . . . . . . . 186--197 Ningyi Xu and Guoqing Zhao and Huiling Chen and Leisi Pei The Colored Concept Map and Its Application in Learning Assistance Program . . . . . . . . . . . . . . . . 198--209 Joseph Fong and Kenneth Ting Yan Wong and Tracy Wu PTA System: Mobile Computing Student Assessment by Parent and Teacher Association . . . . . . . . . . . . . . 210--220 Anonymous Front Matter . . . . . . . . . . . . . . ??
Mohsen Alimomeni and Reihaneh Safavi-Naini Guessing Secrecy . . . . . . . . . . . . 1--13 Anne Broadbent and Stacey Jeffery and Samuel Ranellucci Trading Robustness for Correctness and Privacy in Certain Multiparty Computations, beyond an Honest Majority 14--36 Ran Canetti and Ben Riva and Guy N. Rothblum Two Protocols for Delegation of Computation . . . . . . . . . . . . . . 37--61 Ronald Cramer and Ivan Damgård and Valerio Pastro On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations . . . . . . . . . . . . . . . 62--79 Bernardo Machado David and Anderson C. A. Nascimento Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions . . . . . . . . . . 80--99 Yevgeniy Dodis Shannon Impossibility, Revisited . . . . 100--110 Nico Döttling and Daniel Kraschewski and Jörn Müller-Quade Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation . . . . . . . . . . 111--128 Martin Hirt and Christoph Lucas and Ueli Maurer and Dominik Raub Passive Corruption in Statistical Multi-Party Computation . . . . . . . . 129--146 Marcel Keller and Gert Læssòe Mikkelsen and Andy Rupp Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols 147--166 Yohei Watanabe and Takenobu Seito and Junji Shikata Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes . . . . . . . . . . 167--186 Maki Yoshida and Toru Fujiwara and Marc Fossorier Optimum General Threshold Secret Sharing 187--204 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Yiyu Yao An Outline of a Theory of Three-Way Decisions . . . . . . . . . . . . . . . 1--17 Shaoyong Li and Tianrui Li and Chuan Luo A Multi-granulation Model under Dominance-Based Rough Set Approach . . . 18--25 Hailiang Wang and Mingtian Zhou A Refined Rough $k$-Means Clustering with Hybrid Threshold . . . . . . . . . 26--35 Anping Zeng and Tianrui Li and Junbo Zhang and Dun Liu An Incremental Approach for Updating Approximations of Rough Fuzzy Sets under the Variation of the Object Set . . . . 36--45 Patrick G. Clark and Jerzy W. Grzymala-Busse and Zdzislaw S. Hippe How Good Are Probabilistic Approximations for Rule Induction from Data with Missing Attribute Values? . . 46--55 Jerzy B\laszczy\'nski and Roman S\lowi\'nski and Marcin Szel\kag Induction of Ordinal Classification Rules from Incomplete Data . . . . . . . 56--65 Hai-Long Yang Interval Valued Fuzzy Rough Set Model on Two Different Universes and Its Application . . . . . . . . . . . . . . 66--72 Chien-Chung Chan Maximal Characteristic Sets and Neighborhoods Approach to Incomplete Information Systems . . . . . . . . . . 73--82 Bingzhen Sun and Weimin Ma and Haiyan Zhao and Xinxin Wang Probabilistic Fuzzy Rough Set Model over Two Universes . . . . . . . . . . . . . 83--93 Dominik \'Sl\kezak and Piotr Synak and Jakub Wróblewski and Janusz Borkowski and Graham Toppin Rough Optimizations of Complex Expressions in Infobright's RDBMS . . . 94--99 Yang Liu and Guohua Bai and Qinglei Zhou and Elisabeth Rakus-Andersson Rough Sets Based Inequality Rule Learner for Knowledge Discovery . . . . . . . . 100--105 Omar S. Soliman and Aboul Ella Hassanien A Computer Aided Diagnosis System for Breast Cancer Using Support Vector Machine . . . . . . . . . . . . . . . . 106--115 Yong Yang and Yunxia Lu A New Method of the Accurate Eye Corner Location . . . . . . . . . . . . . . . . 116--125 Isabelle Tamanini and Plácido Rogério Pinheiro and Cícero Nogueira dos Santos A Hybrid Approach of Verbal Decision Analysis and Machine Learning . . . . . 126--131 Long Chen and Banglan Liu and Wei Song An Efficient Data Integrity Verification Method Supporting Multi-granular Operation with Commutative Hash . . . . 132--141 Tomasz Xi\keski and Agnieszka Nowak-Brzezi\'nska and Alicja Wakulicz-Deja Density-Based Method for Clustering and Visualization of Complex Data . . . . . 142--149 Agnieszka Nowak-Brzezi\'nska and Tomasz Jach and Alicja Wakulicz-Deja Inference Processes Using Incomplete Knowledge in Decision Support Systems --- Chosen Aspects . . . . . . . . . . . 150--155 Andrzej Janusz and Wojciech \'Swieboda and Adam Krasuski and Hung Son Nguyen Interactive Document Indexing Method Based on Explicit Semantic Analysis . . 156--165 Bo Huang and Yan Yang and Amjad Mahmood and Hongjun Wang Microblog Topic Detection Based on LDA Model and Single-Pass Clustering . . . . 166--171 Marcin Szczuka and Pawe\l Betli\'nski and Kamil Herba Named Entity Matching in Publication Databases . . . . . . . . . . . . . . . 172--179 Anonymous Front Matter . . . . . . . . . . . . . . ??
Piotr Wasilewski and Andrzej Skowron A Characterization of Rough Separability 1--10 Guoyin Wang and Lihe Guan Data-Driven Valued Tolerance Relation 11--19 Weihua Xu and Wenxin Sun and Yufeng Liu Optimistic Multi-Granulation Fuzzy Rough Set Model Based on Triangular Norm . . . 20--27 Junyi Zhou and Xibei Yang Rough Set Model Based on Hybrid Tolerance Relation . . . . . . . . . . . 28--33 P. S. V. S. Sai Prasad and C. Raghavendra Rao Scalable Improved Quick Reduct: Sample Based . . . . . . . . . . . . . . . . . 34--39 Keyun Qin and Zhenming Song and Yang Xu Soft Rough Sets Based on Similarity Measures . . . . . . . . . . . . . . . . 40--48 Huan Liu and Yingcang Ma and Xuezhen Dai Theory of Truth Degrees in Three Valued Formed System RSL . . . . . . . . . . . 49--54 Weihua Xu and Yufeng Liu and Wenxin Sun Upper Approximation Reduction Based on Intuitionistic Fuzzy $\mathcal{T}$ Equivalence Information Systems . . . . 55--62 Yang Liu and Qinglei Zhou and Elisabeth Rakus-Andersson and Guohua Bai A Fuzzy-Rough Sets Based Compact Rule Induction Method for Classifying Hybrid Data . . . . . . . . . . . . . . . . . . 63--70 Junyi Chai and James N. K. Liu and Anming Li A New Intuitionistic Fuzzy Rough Set Approach for Decision Support . . . . . 71--80 Tsukasa Matsubayashi and Yuichi Kato and Tetsuro Saeki A New Rule Induction Method from a Decision Table Using a Statistical Test 81--90 Singh Kavita and Zaveri Mukesh and Raghuwanshi Mukesh A Rough Neurocomputing Approach for Illumination Invariant Face Recognition System . . . . . . . . . . . . . . . . . 91--100 Hongbo Zhao and Feng Jiang and Chunping Wang An Approximation Decision Entropy Based Decision Tree Algorithm and Its Application in Intrusion Detection . . . 101--106 \Lukasz Pa\lkowski and Jerzy B\laszczy\'nski and Jerzy Krysi\'nski and Roman S\lowi\'nski Application of Rough Set Theory to Prediction of Antimicrobial Activity of Bis-quaternary Ammonium Chlorides . . . 107--116 Dayong Deng and Lin Chen and Dianxun Yan Classification and Decision Based on Parallel Reducts and $F$-Rough Sets . . 117--122 Manish Joshi and Pawan Lingras Evidential Clustering or Rough Clustering: The Choice Is Yours . . . . 123--128 Salsabil Trabelsi and Zied Elouedi and Pawan Lingras Heuristic for Attribute Selection Using Belief Discernibility Matrix . . . . . . 129--138 Shusaku Tsumoto and Shoji Hirano Incremental Rules Induction Based on Rule Layers . . . . . . . . . . . . . . 139--148 Fawaz Alsolami and Igor Chikalov and Mikhail Moshkov and Beata Zielosko Optimization of Inhibitory Decision Rules Relative to Length and Coverage 149--154 Yong Yang and Zhengrong Chen Parallelized Computing of Attribute Core Based on Rough Set Theory and MapReduce 155--160 Anonymous Front Matter . . . . . . . . . . . . . . ??
Gwendoline Fox and Juliette Thuilier Predicting the Position of Attributive Adjectives in the French NP . . . . . . 1--15 Miroslav Janí\vcek Abductive Reasoning for Continual Dialogue Understanding . . . . . . . . . 16--31 Johann-Mattis List SCA: Phonetic Alignment Based on Sound Classes . . . . . . . . . . . . . . . . 32--51 Simon Pauw and Michael Spranger Embodied Quantifiers . . . . . . . . . . 52--66 Marcin W\lodarczak Ranked Multidimensional Dialogue Act Annotation . . . . . . . . . . . . . . . 67--77 Johannes Klaus Fichte The Good, the Bad, and the Odd: Cycles in Answer-Set Programs . . . . . . . . . 78--90 Meghdad Ghari Distributed Knowledge with Justifications . . . . . . . . . . . . . 91--108 Wesley H. Holliday Epistemic Logic, Relevant Alternatives, and the Dynamics of Context . . . . . . 109--129 Tin Perkov Towards a Generalization of Modal Definability . . . . . . . . . . . . . . 130--139 Rasmus K. Rendsvig Modeling Semantic Competence: a Critical Review of Frege's Puzzle about Identity 140--157 Antonius Weinzierl Comparing Inconsistency Resolutions in Multi-Context Systems . . . . . . . . . 158--174 Heather Burnett Vague Determiner Phrases and Distributive Predication . . . . . . . . 175--194 Hanna de Vries The Syntax and Semantics of Evaluative Degree Modification . . . . . . . . . . 195--211 Casper Storm Hansen A Kripkean Solution to Paradoxes of Denotation . . . . . . . . . . . . . . . 212--220 Jason Quinley Trust Games as a Model for Requests . . 221--233 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Aijun Bai and Xiaoping Chen and Patrick MacAlpine and Daniel Urieli and Samuel Barrett and Peter Stone WrightEagle and UT Austin Villa: RoboCup 2011 Simulation League Champions . . . . 1--12 Kanjanapan Sukvichai and Teeratath Ariyachartphadungkit and Krit Chaiso Robot Hardware, Software, and Technologies behind the SKUBA Robot Team 13--24 Tim Laue and Thomas Röfer and Katharina Gillmann and Felix Wenk and Colin Graf and Tobias Kastner B-Human 2011 --- Eliminating Game Delays 25--36 Daniel D. Lee and Seung-Joon Yi and Stephen McGill and Yida Zhang and Sven Behnke and Marcell Missura Robocup 2011 Humanoid League Winners . . 37--50 Jörg Stückler and David Droeschel and Kathrin Gräve and Dirk Holz and Jochen Kläß Towards Robust Mobility, Flexible Object Manipulation, and Intuitive Multimodal Interaction for Domestic Service Robots 51--62 Amy Eguchi and Nicky Hughes and Matthias Stocker and Jiayao Shen and Naomi Chikuma RoboCupJunior --- a Decade Later . . . . 63--77 Jörg Stückler and Sven Behnke Compliant Task-Space Control with Back-Drivable Servo Actuators . . . . . 78--89 Mohammad Norouzi and Freek De Bruijn and Jaime Valls Miró Planning Stable Paths for Urban Search and Rescue Robots . . . . . . . . . . . 90--101 Colin Graf and Thomas Röfer A Center of Mass Observing $3$D-LIPM Gait for the RoboCup Standard Platform League Humanoid . . . . . . . . . . . . 102--113 João Cunha and Nuno Lau and João Rodrigues Ball Interception Behaviour in Robotic Soccer . . . . . . . . . . . . . . . . . 114--125 Oliver Urbann and Sören Kerner and Stefan Tasse Rigid and Soft Body Simulation Featuring Realistic Walk Behaviour . . . . . . . . 126--136 Christian A. Mueller and Nico Hochgeschwender and Paul G. Ploeger Towards Robust Object Categorization for Mobile Robots with Combination of Classifiers . . . . . . . . . . . . . . 137--148 Saskia Metzler and Matthias Nieuwenhuisen and Sven Behnke Learning Visual Obstacle Detection Using Color Histogram Features . . . . . . . . 149--161 Hamid Moballegh and Naja von Schmude and Raúl Rojas Gradient Vector Griding: An Approach to Shape-Based Object Detection in RoboCup Scenarios . . . . . . . . . . . . . . . 162--173 Eran Sadeh-Or and Gal A. Kaminka AnySURF: Flexible Local Features Computation . . . . . . . . . . . . . . 174--185 Aris Valtazanos and Subramanian Ramamoorthy Online Motion Planning for Multi-robot Interaction Using Composable Reachable Sets . . . . . . . . . . . . . . . . . . 186--197 Andreas Schmitz and Marcell Missura and Sven Behnke Real-Time Trajectory Generation by Offline Footstep Planning for a Humanoid Soccer Robot . . . . . . . . . . . . . . 198--209 Feng Xue and Xiaoping Chen and Jinsu Liu and Daniele Nardi Real Time Biped Walking Gait Pattern Generator for a Real Robot . . . . . . . 210--221 Gregor Jochmann and Sören Kerner and Stefan Tasse and Oliver Urbann Efficient Multi-hypotheses Unscented Kalman Filtering for Robust Localization 222--233 Román Marchant and Pablo Guerrero and Javier Ruiz-del-Solar A Portable Ground-Truth System Based on a Laser Sensor . . . . . . . . . . . . . 234--245 Anonymous Front Matter . . . . . . . . . . . . . . ??
Viet Tung Hoang and Ben Morris and Phillip Rogaway An Enciphering Scheme Based on a Card Shuffle . . . . . . . . . . . . . . . . 1--13 Will Landecker and Thomas Shrimpton and R. Seth Terashima Tweakable Blockciphers with Beyond Birthday-Bound Security . . . . . . . . 14--30 Tetsu Iwata and Keisuke Ohashi and Kazuhiko Minematsu Breaking and Repairing GCM Security Proofs . . . . . . . . . . . . . . . . . 31--49 Mohamed Ahmed Abdelraheem and Martin Ågren On the Distribution of Linear Biases: Three Instructive Examples . . . . . . . 50--67 Eric Miles and Emanuele Viola Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs . . . . . . . . . . . . . . . . . 68--85 Jonathan Zittrain The End of Crypto . . . . . . . . . . . 86--86 Mike Rosulek Must You Know the Code of f to Securely Compute f? . . . . . . . . . . . . . . . 87--104 Sanjam Garg and Amit Sahai Adaptively Secure Multi-Party Computation with Dishonest Majority . . 105--123 Joël Alwen and Jonathan Katz and Ueli Maurer Collusion-Preserving Computation . . . . 124--143 Amos Beimel and Oriol Farr\`as and Yuval Mintz Secret Sharing Schemes for Very Dense Graphs . . . . . . . . . . . . . . . . . 144--161 Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee Functional Encryption with Bounded Collusions via Multi-party Computation 162--179 Allison Lewko and Brent Waters New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques . . . . . . 180--198 Amit Sahai and Hakan Seyalioglu and Brent Waters Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption . . . . . . . . . . . . . . . 199--217 Brent Waters Functional Encryption for Regular Languages . . . . . . . . . . . . . . . 218--235 Melissa Chase and Ivan Visconti Secure Database Commitments and Universal Arguments of Quasi Knowledge 236--254 Nir Bitansky and Alessandro Chiesa Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits . . . . . . . . . . . . . . . . 255--272 Tibor Jager and Florian Kohlar and Sven Schäge On the Security of TLS-DHE in the Standard Model . . . . . . . . . . . . . 273--293 Mihir Bellare and Stefano Tessaro and Alexander Vardy Semantic Security for the Wiretap Channel . . . . . . . . . . . . . . . . 294--311 Mihir Bellare and Thomas Ristenpart and Stefano Tessaro Multi-instance Security and Its Application to Password-Based Cryptography . . . . . . . . . . . . . . 312--329 Bart Mennink and Bart Preneel Hash Functions Based on Three Permutations: a Generic Security Analysis . . . . . . . . . . . . . . . . 330--347 Anonymous Front Matter . . . . . . . . . . . . . . ??
Wenfei Fan Data Quality: Theory and Practice . . . 1--16 Jiawei Han Construction of Web-Based, Service-Oriented Information Networks: a Data Mining Perspective . . . . . . . . 17--19 Rakesh Agrawal and Sreenivas Gollapudi and Anitha Kannan and Krishnaram Kenthapadi Electronic Textbooks and Data Mining . . 20--21 Shangfeng Mo and Hong Chen and Yinglong Li Topology-Based Data Compression in Wireless Sensor Networks . . . . . . . . 22--34 Long Tan A Residual Energy-Based Fairness Scheduling MAC Protocol for Wireless Sensor Networks . . . . . . . . . . . . 35--46 Guilin Li and Longjiang Guo and Jian Zhang and Minghong Liao Topology-Aided Geographic Routing Protocol for Wireless Sensor Networks 47--57 Nan Zhang and Jianhua Feng Polaris: a Fingerprint-Based Localization System over Wireless Networks . . . . . . . . . . . . . . . . 58--70 Jun-Feng Qu and Mengchi Liu A High-Performance Algorithm for Frequent Itemset Mining . . . . . . . . 71--82 Xiang Zhang and Cuifang Zhao and Peng Wang and Fengbo Zhou Mining Link Patterns in Linked Data . . 83--94 Kaisong Song and Daling Wang and Shi Feng and Dong Wang and Ge Yu Detecting Positive Opinion Leader Group from Forum . . . . . . . . . . . . . . . 95--101 Sumit Negi and Manish A. Bhide and Vishal S. Batra and Mukesh K. Mohania and Sunil Bajpai D'MART: a Tool for Building and Populating Data Warehouse Model from Existing Reports and Tables . . . . . . 102--113 Xin Lin and Jianliang Xu and Junzhong Gu Continuous Skyline Queries with Integrity Assurance in Outsourced Spatial Databases . . . . . . . . . . . 114--126 Yu Suzuki Assessing Quality Values of Wikipedia Articles Using Implicit Positive and Negative Ratings . . . . . . . . . . . . 127--138 Hao Wu and Lizhu Zhou Form-Based Instant Search and Query Autocompletion on Relational Data . . . 139--151 Yan Zhang and Long Yang and Hongzhi Wang Range Query Estimation for Dirty Data Management System . . . . . . . . . . . 152--164 Yu Sun and Jin Huang and Yueguo Chen and Xiaoyong Du and Rui Zhang Top-$k$ Most Incremental Location Selection with Capacity Constraint . . . 165--171 Renfei Li and Daling Wang and Yifei Zhang and Shi Feng and Ge Yu An Approach of Text-Based and Image-Based Multi-modal Search for Online Shopping . . . . . . . . . . . . 172--184 Reza Taghizadeh Hemayati and Weiyi Meng and Clement Yu Categorizing Search Results Using WordNet and Wikipedia . . . . . . . . . 185--197 Htoo Htoo and Yutaka Ohsawa and Noboru Sonehara and Masao Sakauchi Optimal Sequenced Route Query Algorithm Using Visited POI Graph . . . . . . . . 198--209 Jifeng Cui and Yong Zhang and Chao Li and ChunXiao Xing A Packaging Approach for Massive Amounts of Small Geospatial Files with HDFS . . 210--215 Anonymous Front Matter . . . . . . . . . . . . . . ??
Haixu Miao and Tiezheng Nie and Dejun Yue and Tiancheng Zhang and Jinshen Liu Algebra for Parallel XQuery Processing 1--10 Cong Wang and Hongzhi Wang Graph-Structured Data Compression Based on Frequent Subgraph Contraction . . . . 11--18 Xin Lin and Lingchen Zhou and Peng Chen and Junzhong Gu Privacy Preserving Reverse Nearest-Neighbor Queries Processing on Road Network . . . . . . . . . . . . . . 19--28 Jianmin Wu and Mizuho Iwaihara Wikipedia Revision Graph Extraction Based on $N$-Gram Cover . . . . . . . . 29--38 Meirui Ren and Jinsheng Duan and Hao Qu and Xinjing Wang and Lei Du Wireless Nerve: Invisible Anti-theft System in Wireless Sensor Network . . . 39--44 Zaobo He and Xiaoming Wang A Spatial-temporal Model for the Malware Propagation in MWSNs Based on the Reaction-Diffusion Equations . . . . . . 45--56 Long Tan and Liyan Chen The Application of a Node-Localization Algorithm of Wireless Sensor Network in Intelligent Transportation System . . . 57--68 Juan Luo and Lei Chen and Shan Fu and Renfa Li Parallel Network Virtualization Resource Management System . . . . . . . . . . . 69--77 Yang Zao and Liu Yan and Li Renfa The Analysis of Priority-Based Slotted CSMA/CA Algorithm in IEEE 802.15.4 Sensor Network . . . . . . . . . . . . . 78--86 Cheng Feng and Rui Zhang and Shouxu Jiang and Zhijun Li QoI-Based Data Gathering and Routing Guidance in VANETs . . . . . . . . . . . 87--98 Robin Jun Yang and Qiong Luo PTL: Partitioned Logging for Database Storage on Flash Solid State Drives . . 99--108 Shaikh Muhammad Allayear and Sung Soon Park and Shamim H. Ripon and Gyeong Hun Kim Adaptation Mechanism of iSCSI Protocol for NAS Storage Solution in Wireless Environment . . . . . . . . . . . . . . 109--118 Kitti Koonsanit and Chuleerat Jaruskulchai and Apisit Eiumnoh Band Selection for Hyperspectral Imagery with PCA-MIG . . . . . . . . . . . . . . 119--127 Jing Zhang and Xiaoguang Hong and Zhaohui Peng and Qingzhong Li NestedCube: Towards Online Analytical Processing on Information-Enhanced Multidimensional Network . . . . . . . . 128--139 Yi Liu and Luo Chen and Ning Jing and Wei Xiong MRFM: An Efficient Approach to Spatial Join Aggregate . . . . . . . . . . . . . 140--150 Xu Li and Xin Wang and Hong Shi and Zhaohua Sheng and Zhiyong Feng A Distributed Inverted Indexing Scheme for Large-Scale RDF Data . . . . . . . . 151--161 Wei Pan and Zhanhuai Li and Qun Chen and Shanglian Peng and Bo Suo and Jian Xu MSMapper: An Adaptive Split Assignment Scheme for MapReduce . . . . . . . . . . 162--172 Chunyu Zhang and Yong Su and Jiyang Chen and Wen Wang Driving Environment Reconstruction and Analysis System on Multi-sensor Network 173--180 Zhou Yu and Jian Shao and Fei Wu LuSH: a Generic High-Dimensional Index Framework . . . . . . . . . . . . . . . 181--191 Huaijie Zhu and Xiaochun Yang and Bin Wang and Yue Wang Improving Text Search on Hybrid Data . . 192--203 Anonymous Front Matter . . . . . . . . . . . . . . ??
Anindya Banerjee Modular Verification of Object-Based Programs . . . . . . . . . . . . . . . . 1--2 Thorsten Bormer and Marc Brockschmidt and Dino Distefano and Gidon Ernst The COST IC0701 Verification Competition 2011 . . . . . . . . . . . . . . . . . . 3--21 James J. Hunt The Practical Application of Formal Methods: Where Is the Benefit for Industry? . . . . . . . . . . . . . . . 22--32 Alan Mycroft Isolation Types and Multi-core Architectures . . . . . . . . . . . . . 33--48 Peter Y. H. Wong and Nikolay Diakov and Ina Schaefer Modelling Adaptable Distributed Object Oriented Systems Using the HATS Approach: a Fredhopper Case Study . . . 49--66 Gogul Balakrishnan and Naoto Maeda and Sriram Sankaranarayanan and Franjo Ivan\vci\'c and Aarti Gupta Modeling and Analyzing the Interaction of C and C++ Strings . . . . . . . . . . 67--85 Bernhard Beckert and Thorsten Bormer and Florian Merz and Carsten Sinz Integration of Bounded Model Checking and Deductive Verification . . . . . . . 86--104 Lucian Bentea and Olaf Owe A Probabilistic Framework for Object-Oriented Modeling and Analysis of Distributed Systems . . . . . . . . . . 105--122 Marc Brockschmidt and Thomas Ströder and Carsten Otto and Jürgen Giesl Automated Detection of Non-termination and \tt NullPointerExceptions for Java Bytecode . . . . . . . . . . . . . . . . 123--141 Jonathan Heinen and Henrik Barthels and Christina Jansen Juggrnaut --- An Abstract JVM . . . . . 142--159 Ángel Herranz and Julio Mariño A Verified Implementation of Priority Monitors in Java . . . . . . . . . . . . 160--177 Marieke Huisman and Tri Minh Ngo Scheduler-Specific Confidentiality for Multi-threaded Programs and Its Logic-Based Verification . . . . . . . . 178--195 Einar Broch Johnsen and Rudolf Schlatte and S. Lizeth Tapia Tarifa A Formal Model of User-Defined Resources in Resource-Restricted Deployment Scenarios . . . . . . . . . . . . . . . 196--213 Vlad Rusu and Dorel Lucanu A $\mathbb{K}$-Based Formal Framework for Domain-Specific Modelling Languages 214--231 Christoph Scheben and Peter H. Schmitt Verification of Information Flow Properties of Java Programs without Approximations . . . . . . . . . . . . . 232--249 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Giorgio Ausiello and Giuseppe F. Italiano and Luigi Laura and Umberto Nanni and Fabiano Sarracco Structure Theorems for Optimum Hyperpaths in Directed Hypergraphs . . . 1--14 Mike Hewitt and George L. Nemhauser and Martin Savelsbergh Branch-and-Price Guided Search . . . . . 15--18 Christos H. Papadimitriou The New Faces of Combinatorial Optimization . . . . . . . . . . . . . . 19--23 Valentina Cacchiani and Alberto Caprara and Paolo Toth Models and Algorithms for the Train Unit Assignment Problem . . . . . . . . . . . 24--35 Breno Piva and Cid C. de Souza The Minimum Stabbing Triangulation Problem: IP Models and Computational Evaluation . . . . . . . . . . . . . . . 36--47 Matteo Fischetti and Leo Liberti Orbital Shrinking . . . . . . . . . . . 48--58 James Ostrowski Using Symmetry to Optimize Over the Sherali--Adams Relaxation . . . . . . . 59--70 Jianqiang Cheng and Céline Gicquel and Abdel Lisser A Second-Order Cone Programming Approximation to Joint Chance-Constrained Linear Programs . . . 71--80 Agn\`es Gorge and Abdel Lisser and Riadh Zorgati Semidefinite Relaxations for Mixed $0$--$1$ Second-Order Cone Program . . . 81--92 Pierre Fouilhoux and Aurélien Questel The Non-Disjoint $m$-Ring-Star Problem: Polyhedral Results and SDH/SONET Network Design . . . . . . . . . . . . . . . . . 93--104 Sylvie Borne and Roland Grappe and Mathieu Lacroix The Uncapacitated Asymmetric Traveling Salesman Problem with Multiple Stacks 105--116 Mathieu Lacroix and A. Ridha Mahjoub and Sébastien Martin Polyhedral Analysis and Branch-and-Cut for the Structural Analysis Problem . . 117--128 Yuri Faenza and Samuel Fiorini and Roland Grappe and Hans Raj Tiwary Extended Formulations, Nonnegative Factorizations, and Randomized Communication Protocols . . . . . . . . 129--140 Gábor Braun and Sebastian Pokutta An Algebraic Approach to Symmetric Extended Formulations . . . . . . . . . 141--152 Satoru Fujishige and Jens Maßberg Dual Consistent Systems of Linear Inequalities and Cardinality Constrained Polytopes . . . . . . . . . . . . . . . 153--164 A. S. Freire and V. Acuña and P. Crescenzi and C. E. Ferreira and V. Lacroix and P. V. Milreu Minimum Ratio Cover of Matrix Columns by Extreme Rays of Its Induced Cone . . . . 165--177 Laura Galli and Konstantinos Kaparis and Adam N. Letchford Gap Inequalities for the Max-Cut Problem: a Cutting-Plane Algorithm . . . 178--188 Trivikram Dokka and Ioannis Mourtos and Frits C. R. Spieksma Fast Separation Algorithms for Three-Index Assignment Problems . . . . 189--200 Luis Gouveia and Markus Leitner and Ivana Ljubi\'c On the Hop Constrained Steiner Tree Problem with Multiple Root Nodes . . . . 201--212 Marie-Emilie Voge and François Clautiaux Theoretical Investigation of Aggregation in Pseudo-polynomial Network-Flow Models 213--224 Anonymous Front Matter . . . . . . . . . . . . . . ??
Marijn Koolen and Gabriella Kazai and Jaap Kamps and Antoine Doucet and Monica Landoni Overview of the INEX 2011 Books and Social Search Track . . . . . . . . . . 1--29 Frans Adriaans and Jaap Kamps and Marijn Koolen The Importance of Document Ranking and User-Generated Content for Faceted Search and Book Suggestions . . . . . . 30--44 Toine Bogers and Kirstine Wilfred Christensen and Birger Larsen RSLIS at INEX 2011: Social Book Search Track . . . . . . . . . . . . . . . . . 45--56 Hervé Déjean Using Page Breaks for Book Structuring 57--67 Romain Deveaud and Eric SanJuan and Patrice Bellot Social Recommendation and External Resources for Book Search . . . . . . . 68--79 Henry A. Feild and Marc-Allen Cartright and James Allan The University of Massachusetts Amherst's Participation in the INEX 2011 Prove It Track . . . . . . . . . . . . . 80--85 Emmanuel Giguet and Nadine Lucas The Book Structure Extraction Competition with the Resurgence Full Content Software at Caen University . . 86--97 Caihua Liu and Jiajun Chen and Xiaofeng Zhang and Jie Liu and Yalou Huang TOC Structure Extraction from OCR-ed Books . . . . . . . . . . . . . . . . . 98--108 Michael Preminger and Ragnar Nordlie OUC's Participation in the 2011 INEX Book Track . . . . . . . . . . . . . . . 109--117 Qiuyue Wang and Georgina Ramírez and Maarten Marx and Martin Theobald and Jaap Kamps Overview of the INEX 2011 Data-Centric Track . . . . . . . . . . . . . . . . . 118--137 Cyril Laitang and Karen Pinel-Sauvagnat and Mohand Boughanem Edit Distance for XML Information Retrieval: Some Experiments on the Datacentric Track of INEX 2011 . . . . . 138--145 Georgina Ramírez UPF at INEX 2011: Books and Social Search Track and Data-Centric Track . . 146--154 Anne Schuth and Maarten Marx University of Amsterdam Data Centric Ad Hoc and Faceted Search Runs . . . . . . 155--160 Darnes Vilariño Ayala and David Pinto and Saúl León Silverio and Esteban Castillo BUAP: a Recursive Approach to the Data-Centric Track of INEX 2011 . . . . 161--166 Qiuyue Wang and Yantao Gan and Yu Sun RUC@INEX 2011 Data-Centric Track . . . . 167--179 Tanakorn Wichaiwong and Chuleerat Jaruskulchai MEXIR at INEX-2011 . . . . . . . . . . . 180--187 Eric SanJuan and Véronique Moriceau and Xavier Tannier and Patrice Bellot and Josiane Mothe Overview of the INEX 2011 Question Answering Track (QA@INEX) . . . . . . . 188--206 Pinaki Bhaskar and Somnath Banerjee and Snehasis Neogi and Sivaji Bandyopadhyay A Hybrid QA System with Focused IR and Automatic Summarization for INEX 2011 207--218 Liana Ermakova and Josiane Mothe IRIT at INEX: Question Answering Task 219--226 Ana Lilia Laureano-Cruces and Javier Ramírez-Rodríguez A Graph-Based Summarization System at QA@INEX Track 2011 . . . . . . . . . . . 227--231 Anonymous Front Matter . . . . . . . . . . . . . . ??
Intaek Leem and Mary Wu and Chonggun Kim An Algorithm for Resource Allocation without Inter-cluster Collisions in WSN 1--8 Joonki Min and Jookyoung Kim and Youngmi Kwon Data Compression Technique for Wireless Sensor Networks . . . . . . . . . . . . 9--16 Jeong-hyun Cho and Yong-do Choi and Sung-ho Kim A Bandwidth Reservation Method for Multicast Streaming Service . . . . . . 17--24 Dongho Kim Hybrid-ARQ with Rate Compatible LDPC Codes . . . . . . . . . . . . . . . . . 25--32 Shu Li and Jeong Geun Kim Inter-session and Intra-session Network Coding for Wireless Sensor Networks . . 33--40 Seong Cheol Kim and Jun Heon Jeon and Hyun Joo Park QoS Aware Energy-Efficient (QAEE) MAC Protocol for Energy Harvesting Wireless Sensor Networks . . . . . . . . . . . . 41--48 Kyungrak Lee and Juhyun Maeng and Inwhee Joe A New Channel Access Scheme for Multi-user Voice Communications in IEEE 802.15.4 Networks . . . . . . . . . . . 49--56 Hyun-Ho Shin and Byung-Seo Kim Performance Evaluations on Local-Repair of AODV Protocol over IP-Based Ad-Hoc Networks . . . . . . . . . . . . . . . . 57--63 Aries Kusdaryono and Gan Bayar and Lee Kyoung Oh Base Station Assisted Hierarchical Routing Protocol in Wireless Sensor Networks . . . . . . . . . . . . . . . . 64--71 Hee Jae Shin and Do Hyun Bae and Jin Suk Kim Derivation of Coverage in Sensor Network Using a Quad-Tree Partitioning Scheme 72--78 A. S. M. Sanwar Hosen and Gihwan Cho Applying a Minimum Routing Cost Spanning Tree to Many-to-Many in Wireless Sensor Networks . . . . . . . . . . . . . . . . 79--86 Ryota Imanishi and Yuki Kondo and Young-Bok Choi and Hiromi Okada An Effective Traffic Control Method for Real-Time and Reliable Bursts in OBS Networks . . . . . . . . . . . . . . . . 87--97 Ye Hoon Lee A Transmit Power Control Method for DS/CDMA Communication Systems Using Successive Interference Cancelation . . 98--105 SeokHoon Kang and Gwanggil Jeon and Young-Sup Lee Improved Energy Aware Routing Protocol in Mobile Ad Hoc Network . . . . . . . . 106--113 Junyeong Bok and Heung-Gyoon Ryu Analysis of Receiver Feedback Closed Loop Pre-distortion to Compensate for Nonlinear HPA and Foliage Attenuation 114--121 Le Thanh Tuan and Daeseung Yoo and Hyungjoo Kim and Gwangja Jin and Byungtae Jang and Soong Hwan Ro The Modified Proportional Fair Packet Scheduling Algorithm for Multimedia Traffic in LTE System . . . . . . . . . 122--129 Kwang Kiun Yoo and Ronny Yongho Kim HiNet: Radio Frequency Communication Based Train Control (RF-CBTC) System Jointly Using Hierarchical Modulation and Network Coding . . . . . . . . . . . 130--137 Wonsun Bong and Yong Cheol Kim Fingerprint Wi--Fi Radio Map Interpolated by Discontinuity Preserving Smoothing . . . . . . . . . . . . . . . 138--145 Ingi Lee and Hwan-Seung Yong Common Sense Knowledge Based Hybrid Interestingness Measures for Data Mining 146--154 Nasimul Noman and Leon Palafox and Hitoshi Iba On Model Selection Criteria in Reverse Engineering Gene Networks Using RNN Model . . . . . . . . . . . . . . . . . 155--164 Anonymous Front Matter . . . . . . . . . . . . . . ??
Kelly Vassie and Giuseppe Morlino Natural and Artificial Systems: Compare, Model or Engineer? . . . . . . . . . . . 1--11 Jòrgen Christian Larsen and David Brandt and Kasper Stoy LocoKit: a Robot Construction Kit for Studying and Developing Functional Morphologies . . . . . . . . . . . . . . 12--22 Iñaki Rañó An Introduction to the Analysis of Braitenberg Vehicles $2$ and $3$ Using Phase Plane Portrait . . . . . . . . . . 23--32 Cristiano Alessandro and Juan Pablo Carbajal and Andrea d'Avella Synthesis and Adaptation of Effective Motor Synergies for the Solution of Reaching Tasks . . . . . . . . . . . . . 33--43 Jose Nunez-Varela and Balaraman Ravindran and Jeremy L. Wyatt Gaze Allocation Analysis for a Visually Guided Manipulation Task . . . . . . . . 44--53 Matej Hoffmann and Nico M. Schmidt and Rolf Pfeifer and Andreas K. Engel and Alexander Maye Using Sensorimotor Contingencies for Terrain Discrimination and Adaptive Walking Behavior in the Quadruped Robot Puppy . . . . . . . . . . . . . . . . . 54--64 Beata J. Grzyb and Angel P. del Pobil and Linda B. Smith How Walking Influences the Development of Absolute Distance Perception . . . . 65--74 Boris Durán and Serge Thill Modelling Interaction in Multi-modal Affordance Processing with Neural Dynamics . . . . . . . . . . . . . . . . 75--84 Ana Carolina Silva and Cristina Peixoto dos Santos A Bio-inspired Model Reliably Predicts the Collision of Approaching Objects under Different Light Conditions . . . . 85--95 Naveen Kuppuswamy and Hugo Gravato Marques and Helmut Hauser Synthesising a Motor-Primitive Inspired Control Architecture for Redundant Compliant Robots . . . . . . . . . . . . 96--105 Alexander Maye and Andreas K. Engel Using Sensorimotor Contingencies for Prediction and Action Planning . . . . . 106--116 Michele Folgheraiter and Mathias Jordan and Jan Albiez and Frank Kirchner A Bio-inspired Control System for a Wearable Human-Machine Interface . . . . 117--126 Sejoon Ahn and DaeEun Kim A Finite Element Method of Electric Image in Weakly Electric Fish . . . . . 127--135 Adrien Jauffret and Nicolas Cuperlier and Philippe Gaussier and Philippe Tarroux Multimodal Integration of Visual Place Cells and Grid Cells for Navigation Tasks of a Real Robot . . . . . . . . . 136--145 Tim Waegeman and Francis Wyffels and Benjamin Schrauwen Towards a Neural Hierarchy of Time Scales for Motor Control . . . . . . . . 146--155 Cai Li and Robert Lowe and Tom Ziemke Modelling Walking Behaviors Based on CPGs: a Simplified Bio-inspired Architecture . . . . . . . . . . . . . . 156--166 Marco Antonelli and Beata J. Grzyb and Vicente Castelló and Angel P. del Pobil Plastic Representation of the Reachable Space for a Humanoid Robot . . . . . . . 167--176 Charles Ollion and Stéphane Doncieux Towards Behavioral Consistency in Neuroevolution . . . . . . . . . . . . . 177--186 Christian Rempis and Frank Pasemann Evolving Variants of Neuro-Control Using Constraint Masks . . . . . . . . . . . . 187--197 Borys Wróbel and Micha\l Joachimczak and Alberto Montebelli and Robert Lowe The Search for Beauty: Evolution of Minimal Cognition in an Animat Controlled by a Gene Regulatory Network and Powered by a Metabolic System . . . 198--208 Anonymous Front Matter . . . . . . . . . . . . . . ??
Sabine Lehmann and Ben Gottesman and Robert Grabowski and Mayo Kudo Applying CNL Authoring Support to Improve Machine Translation of Forum Data . . . . . . . . . . . . . . . . . . 1--10 Sébastien Ferré SQUALL: a Controlled Natural Language for Querying and Updating RDF Graphs . . 11--25 Rolf Schwitter Answer Set Programming via Controlled Natural Language Processing . . . . . . 26--43 Richard Power OWL Simplified English: a Finite-State Language for Ontology Editing . . . . . 44--60 William R. Murray and Tomas Singliar Spatiotemporal Extensions to a Controlled Natural Language . . . . . . 61--78 Kaarel Kaljurand and Tanel Alumäe Controlled Natural Language in Speech Recognition Based User Interfaces . . . 79--94 Faegheh Hasibi An Adaptation Technique for GF-Based Dialogue Systems . . . . . . . . . . . . 95--109 Kaarel Kaljurand General Architecture of a Controlled Natural Language Based Multilingual Semantic Wiki . . . . . . . . . . . . . 110--120 Normunds Gruzitis and Peteris Paikens and Guntis Barzdins FrameNet Resource Grammar Library for GF 121--137 Stefan Höfler Legislative Drafting Guidelines: How Different Are They from Controlled Language Rules for Technical Writing? 138--151 Palmira Marrafa and Raquel Amaro and Nuno Freire and Sara Mendes Portuguese Controlled Language: Coping with Ambiguity . . . . . . . . . . . . . 152--166 Brian Davis and Ramona Enache and Jeroen van Grondelle Multilingual Verbalisation of Modular Ontologies Using GF and lemon . . . . . 167--184 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Sébastien Briais and Stéphane Caron and Jean-Michel Cioranesco and Jean-Luc Danger $3$D Hardware Canaries . . . . . . . . . 1--22 Sergei Skorobogatov and Christopher Woods Breakthrough Silicon Scanning Discovers Backdoor in Military Chip . . . . . . . 23--40 Alexander Schlösser and Dmitry Nedospasov and Juliane Krämer and Susanna Orlic Simple Photonic Emission Analysis of AES 41--57 Andrew Moss and Elisabeth Oswald and Dan Page and Michael Tunstall Compiler Assisted Masking . . . . . . . 58--75 Begül Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen and Georg Stütz Threshold Implementations of All $3 \times 3$ and $4 \times 4$ S-Boxes . . . 76--91 Amir Moradi and Oliver Mischke How Far Should Theory Be from Practice? 92--106 Blandine Debraize Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking . . . . . . . . . . . . . . . . 107--121 Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar A Differential Fault Attack on the Grain Family of Stream Ciphers . . . . . . . . 122--139 Yossef Oren and Mathieu Renauld and François-Xavier Standaert and Avishai Wool Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model . . . . 140--154 Oscar Reparaz and Benedikt Gierlichs and Ingrid Verbauwhede Selecting Time Samples for Multivariate DPA Attacks . . . . . . . . . . . . . . 155--174 Beno\^\it Gérard and François-Xavier Standaert Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting . . . . . . . . . . 175--192 Marcel Medwed and François-Xavier Standaert and Antoine Joux Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs . . . . . . . . . 193--212 Sebastian Faust and Krzysztof Pietrzak and Joachim Schipper Practical Leakage-Resilient Symmetric Cryptography . . . . . . . . . . . . . . 213--232 Yunsi Fei and Qiasi Luo and A. Adam Ding A Statistical Model for DPA with Novel Algorithmic Confusion Analysis . . . . . 233--250 Ulrich Rührmair and Marten van Dijk Practical Security Analysis of PUF-Based Two-Player Protocols . . . . . . . . . . 251--267 Vincent van der Leest and Bart Preneel and Erik van der Sluis Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment . . . . . . . . . . . . . . . 268--282 Stefan Katzenbeisser and Ünal Kocaba\cs and Vladimir Ro\vzi\'c and Ahmad-Reza Sadeghi PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon . . . . 283--301 Roel Maes and Anthony Van Herrewege and Ingrid Verbauwhede PUFKY: a Fully Functional PUF-Based Cryptographic Key Generator . . . . . . 302--319 Daniel J. Bernstein and Peter Schwabe NEON Crypto . . . . . . . . . . . . . . 320--339 Stefan Heyse and Tim Güneysu Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware . . . . . . . . 340--355 Anonymous Front Matter . . . . . . . . . . . . . . ??
Goren Gordon and Ehud Ahissar A Curious Emergence of Reaching . . . . 1--12 Torbjòrn S. Dahl and Alexandros Paraschos A Force-Distance Model of Humanoid Arm Withdrawal Reflexes . . . . . . . . . . 13--24 Muhammad Nasiruddin Mahyuddin and Guido Herrmann and Said Ghani Khan A Novel Adaptive Control Algorithm in Application to a Humanoid Robot Arm . . 25--36 Iñaki Rañó and Jean-Stephane Jokeit A Wandering Braitenberg Vehicle $2 b$ That Densely Covers a Bounded Workspace 37--48 Jartuwat Rajruangrabin and Isura Ranatunga and Dan O. Popa Adaptive Interface Mapping for Intuitive Teleoperation of Multi-DOF Robots . . . 49--60 Carlos Santos and Manuel Mazo Jr. and Felipe Espinosa Adaptive Self-triggered Control of a Remotely Operated Robot . . . . . . . . 61--72 Nadeesha Oliver Ranasinghe and Wei-Min Shen Autonomous Surveillance Tolerant to Interference . . . . . . . . . . . . . . 73--83 Dejanira Araiza-Illan and Tony J. Dodd Bio-inspired Autonomous Navigation and Escape from Pursuers with Potential Functions . . . . . . . . . . . . . . . 84--95 Christopher M. Harris and Jonathan Waddington Biomimetics of Choice Behaviour for Autonomous Agents . . . . . . . . . . . 96--104 Alan Broun and Chris Beck and Tony Pipe and Majid Mirmehdi and Chris Melhuish Building a Kinematic Model of a Robot's Arm with a Depth Camera . . . . . . . . 105--116 Sreeja Kochuvila and Shikha Tripathi and Sudarshan T. S. B. Control of a Compass Gait Biped Robot Based on Partial Feedback Linearization 117--127 Florian Vaussard and Philippe Rétornaz and David Hamel and Francesco Mondada Cutting Down the Energy Consumed by Domestic Robots: Insights from Robotic Vacuum Cleaners . . . . . . . . . . . . 128--139 Nils Axel Andersen and Ole Ravn Designing Competitions for Education in Robotics . . . . . . . . . . . . . . . . 140--151 J. Ernesto Solanes and Leopoldo Armesto and Josep Tornero and Pau Muñoz-Benavent and Vicent Girbés Dual-Rate Non-Linear High Order Holds for Visual Servoing Applications . . . . 152--163 S. Byrne and W. Naeem and R. S. Ferguson Efficient Local Sampling for Motion Planning of a Robotic Manipulator . . . 164--175 Terry Tritton and Joanna Hall and Angela Rowe and Sophie Valentine and Alicja Jedrzejewska Engaging with Robots While Giving Simple Instructions . . . . . . . . . . . . . . 176--184 Dominik Aufderheide and Werner Krybus and Ulf Witkowski Experiences with LEGO MINDSTORMS as an Embedded and Robotics Plattform within the Undergraduate Curriculum . . . . . . 185--196 Ekaterina Nikandrova and Janne Laaksonen and Ville Kyrki Explorative Sensor-Based Grasp Planning 197--208 Chris Iverach-Brereton and Andrew Winton and Jacky Baltes Ice Skating Humanoid Robot . . . . . . . 209--219 Chris Burbridge and Richard Dearden Learning the Geometric Meaning of Symbolic Abstractions for Manipulation Planning . . . . . . . . . . . . . . . . 220--231 Anonymous Front Matter . . . . . . . . . . . . . . ??
Germano Resconi and Chris Hinde Introduction to Active Sets and Unification . . . . . . . . . . . . . . 1--36 B. John Oommen and M. Khaled Hashem Modeling a Teacher in a Tutorial- like System Using Learning Automata . . . . . 37--62 Ale\vs Horák and Miroslav Prýmek and Tadeusz Sikora Power Network Reliability Computations Using Multi-agent Simulation . . . . . . 63--81 Henryk Piech Sequence Automata for Researching Consensus Levels . . . . . . . . . . . . 82--101 Hiroshi Takahashi An Analysis of the Influence of Fundamental Indexing on Financial Markets through Agent-Based Modeling: The Fundamentalist and Fundamental Indexing . . . . . . . . . . . . . . . . 102--120 Sodany Kiv and Yves Wautelet and Manuel Kolp Agent-Driven Integration Architecture for Component-Based Software Development 121--147 Annabel Latham and Keeley Crockett Adaptive Tutoring in an Intelligent Conversational Agent System . . . . . . 148--167 Jan Treur Biological and Computational Perspectives on the Emergence of Social Phenomena: Shared Understanding and Collective Power . . . . . . . . . . . . 168--191 Olivier Szymanezyk and Tom Duckett Agent-Based Crowd Simulation in Airports Using Games Technology . . . . . . . . . 192--213 Marcin Maleszka and Ngoc Thanh Nguyen Approximate Algorithms for Solving $O_1$ Consensus Problems Using Complex Tree Structure . . . . . . . . . . . . . . . 214--227 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
J. Bano and A. Hostettler and S. A. Nicolau and C. Doignon and H. S. Wu and M. H. Huang and L. Soler Simulation of the Abdominal Wall and Its Arteries after Pneumoperitoneum for Guidance of Port Positioning in Laparoscopic Surgery . . . . . . . . . . 1--11 Yoshitaka Masutani and Mitsutaka Nemoto and Shohei Hanaoka and Naoto Hayashi and Kuni Ohtomo Appearance Similarity Flow for Quantification of Anatomical Landmark Uncertainty in Medical Images . . . . . 12--21 Zhenwen Wei and Caiming Zhang and Xingqiang Yang and Xiaofeng Zhang Segmentation of Brain Tumors in CT Images Using Level Sets . . . . . . . . 22--31 Spyridon Bakas and Andreas Hoppe and Katerina Chatzimichail and Vasileios Galariotis Focal Liver Lesion Tracking in CEUS for Characterisation Based on Dynamic Behaviour . . . . . . . . . . . . . . . 32--41 Maryam Hajiesmaeili and Bashir Bagherinakhjavanlo and Jamshid Dehmeshki and Tim Ellis Segmentation of the Hippocampus for Detection of Alzheimer's Disease . . . . 42--50 Daniel Asarnow and Rahul Singh Segmentation of Parasites for High-Content Screening Using Phase Congruency and Grayscale Morphology . . 51--60 Jian Ye and Igor Yanovsky and Bin Dong and Rima Gandlin and Achi Brandt and Stanley Osher Multigrid Narrow Band Surface Reconstruction via Level Set Functions 61--70 Xiao Chen and Guangming Wang and Ying Zhu and G. Scott Owen Real-Time Simulation of Ship Motions in Waves . . . . . . . . . . . . . . . . . 71--80 Damon Blanchette and Emmanuel Agu Adaptive Spectral Mapping for Real-Time Dispersive Refraction . . . . . . . . . 81--91 Powei Feng and Joe Warren A Dual Method for Constructing Multi-material Solids from Ray-Reps . . 92--103 David Sedlacek and Jiri Zara User Driven $3$D Reconstruction Environment . . . . . . . . . . . . . . 104--114 Ashish Amresh and John Femiani and Christoph Fünfzig Methods for Approximating Loop Subdivision Using Tessellation Enabled GPUs . . . . . . . . . . . . . . . . . . 115--125 Kun Liu and Rhaleb Zayer Bundle Adjustment Constrained Smoothing for Multi-view Point Cloud Data . . . . 126--137 Houman Rastgar and Eric Dubois and Liang Zhang Guided Sampling in Multiple View Robust Motion Estimation Using Regression Diagnostics . . . . . . . . . . . . . . 138--147 Paul Doliotis and Vassilis Athitsos and Dimitrios Kosmopoulos and Stavros Perantonis Hand Shape and $3$D Pose Estimation Using Depth Data from a Single Cluttered Frame . . . . . . . . . . . . . . . . . 148--158 Billy Ray Fortenbury and Gutemberg Guerra-Filho Fusing Low-Resolution Depth Maps into High-Resolution Stereo Matching . . . . 159--168 Ricardo Galego and Alexandre Bernardino and José Gaspar Auto-Calibration of Pan-Tilt Cameras Including Radial Distortion and Zoom . . 169--178 Billy Ray Fortenbury and Gutemberg Guerra-Filho Robust $2$D/$3$D Calibration Using RANSAC Registration . . . . . . . . . . 179--188 M. A. Cataño and J. Climent Keypoint Detection Based on the Unimodality Test of HOGs . . . . . . . . 189--198 Bo Li and Afzal Godil and Henry Johan Non-rigid and Partial $3$D Model Retrieval Using Hybrid Shape Descriptor and Meta Similarity . . . . . . . . . . 199--209 Anonymous Front Matter . . . . . . . . . . . . . . ??
Heinz Hofbauer and Christian Rathgeb and Andreas Uhl and Peter Wild Iris Recognition in Image Domain: Quality-Metric Based Comparators . . . . 1--10 Jan Sedmidubsky and Jakub Valcik and Michal Balazia and Pavel Zezula Gait Recognition Based on Normalized Walk Cycles . . . . . . . . . . . . . . 11--20 Hwi-Gang Kim and Eun Jung Lee and Gang-Joon Yoon and Sung-Dae Yang and Eui Chul Lee and Sang Min Yoon Illumination Normalization for SIFT Based Finger Vein Authentication . . . . 21--30 Irene Kotsia and Weiwei Guo and Ioannis Patras Higher Rank Support Tensor Machines . . 31--40 Inho Choi and Daijin Kim Multi-scale Integral Modified Census Transform for Eye Detection . . . . . . 41--50 Avinash Wesley and Pradeep Buddharaju and Robert Pienta and Ioannis Pavlidis A Comparative Analysis of Thermal and Visual Modalities for Automated Facial Expression Recognition . . . . . . . . . 51--60 Hammadi Nait-Charif and Allen Breen and Paul Thompson Vertebrae Tracking in Lumbar Spinal Video-Fluoroscopy Using Particle Filters with Semi-automatic Initialisation . . . 61--69 Giorgio Panin Mutual Information for Multi-modal, Discontinuity-Preserving Image Registration . . . . . . . . . . . . . . 70--81 Muhammad Hussain and Salabat Khan and Ghulam Muhammad and George Bebis Mass Detection in Digital Mammograms Using Optimized Gabor Filter Bank . . . 82--91 Federico M. Sukno and John L. Waddington and Paul F. Whelan Comparing $3$D Descriptors for Local Search of Craniofacial Landmarks . . . . 92--103 Utsab Saha and Rahul Singh Vision-Based Tracking of Complex Macroparasites for High-Content Phenotypic Drug Screening . . . . . . . 104--114 Jonas De Vylder and Jan Aelterman and Mado Vandewoestyne and Trees Lepez and Dieter Deforce Cell Nuclei Detection Using Globally Optimal Active Contours with Shape Prior 115--124 Akintola Kolawole and Alireza Tavakkoli A Novel Gait Recognition System Based on Hidden Markov Models . . . . . . . . . . 125--134 Abubakrelsedik Karali and Mohamed ElHelw Motion History of Skeletal Volumes for Human Action Recognition . . . . . . . . 135--144 Sang Min Yoon and Gang-Joon Yoon Compressive Matting . . . . . . . . . . 145--154 Tatsuya Yatagawa and Yasushi Yamaguchi A Template-Based Completion Framework for Videos with Dynamic Backgrounds . . 155--165 Sherif Azary and Andreas Savakis $3$D Action Classification Using Sparse Spatio-temporal Feature Representations 166--175 George Kamberov and Matt Burlick and Lazaros Karydas and Olga Koteoglou SCAR: Dynamic Adaptation for Person Detection and Persistence Analysis in Unconstrained Videos . . . . . . . . . . 176--187 Georgios Galanopoulos and Constantin Papaodysseus and Dimitiris Arabadjis and Michael Exarhos Exploiting $3$D Digital Representations of Ancient Inscriptions to Identify Their Writer . . . . . . . . . . . . . . 188--198 Ali Alsam and Hans Jakob Rivertz and Puneet Sharma What the Eye Did Not See --- a Fusion Approach to Image Coding . . . . . . . . 199--208 Anonymous Front Matter . . . . . . . . . . . . . . ??
Bahar Behsaz and Ján Ma\vnuch and Ladislav Stacho Turing Universality of Step-Wise and Stage Assembly at Temperature 1 . . . . 1--11 Robert Brijder and Joris J. M. Gillis A Type System for DNAQL . . . . . . . . 12--24 Ho-Lin Chen and David Doty and David Soloveichik Deterministic Function Computation with Chemical Reaction Networks . . . . . . . 25--42 Anne Condon and Bonnie Kirkpatrick and Ján Ma\vnuch Reachability Bounds for Chemical Reaction Networks and Strand Displacement Systems . . . . . . . . . . 43--57 Eugen Czeizler and Alexandru Popa Synthesizing Minimal Tile Sets for Complex Patterns in the Framework of Patterned DNA Self-Assembly . . . . . . 58--72 Max H. Garzon and Kiran C. Bobba A Geometric Approach to Gibbs Energy Landscapes and Optimal DNA Codeword Design . . . . . . . . . . . . . . . . . 73--85 Anton Kan and Koh-ichiroh Shohda and Akira Suyama A DNA Based Molecular Logic Gate Capable of a Variety of Logical Operations . . . 86--97 Lila Kari and Steffen Kopecki Deciding Whether a Regular Language Is Generated by a Splicing System . . . . . 98--109 Iñaki Sainz de Murieta and Alfonso Rodríguez-Patón Probabilistic Reasoning with a Bayesian DNA Device Based on Strand Displacement 110--122 Carsten Svaneborg and Harold Fellermann DNA Self-Assembly and Computation Studied with a Coarse-Grained Dynamic Bonded Model . . . . . . . . . . . . . . 123--134 Chris Thachuk and Anne Condon Space and Energy Efficient Computation with DNA Strand Displacement Systems . . 135--149 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Binay Bhattacharya and Tsunehiko Kameda A Linear Time Algorithm for Computing Minmax Regret 1-Median on a Tree . . . . 1--12 Ragesh Jaiswal and Amit Kumar and Sandeep Sen A Simple $D^2$-Sampling Based PTAS for $k$-Means and other Clustering Problems 13--24 Evripidis Bampis and Dimitrios Letsios and Ioannis Milis Speed Scaling for Maximum Lateness . . . 25--36 Peter Floderus and Miros\law Kowaluk and Andrzej Lingas Induced Subgraph Isomorphism: Are Some Patterns Substantially Easier Than Others? . . . . . . . . . . . . . . . . 37--48 Ivona Bezáková and Zachary Langley Contiguous Minimum Single-Source-Multi-Sink Cuts in Weighted Planar Graphs . . . . . . . . . 49--60 Xin Han and Yasushi Kawase and Kazuhisa Makino Online Knapsack Problem with Removal Cost . . . . . . . . . . . . . . . . . . 61--73 Mingyu Xiao and Hiroshi Nagamochi An Improved Exact Algorithm for TSP in Degree-4 Graphs . . . . . . . . . . . . 74--85 Juanjo Rué and Ignasi Sau and Dimitrios M. Thilikos Dynamic Programming for $H$-minor-free Graphs . . . . . . . . . . . . . . . . . 86--97 Monaldo Mastrolilli and Georgios Stamoulis Restricted Max-Min Fair Allocations with Inclusion-Free Intervals . . . . . . . . 98--108 Maxim A. Babenko and Kamil Salikhov and Stepan Artamonov An Improved Algorithm for Packing T-Paths in Inner Eulerian Networks . . . 109--120 René van Bevern Towards Optimal and Expressive Kernelization for $d$-Hitting Set . . . 121--132 Jean-François Couturier and Pinar Heggernes and Pim van 't Hof Maximum Number of Minimal Feedback Vertex Sets in Chordal Graphs and Cographs . . . . . . . . . . . . . . . . 133--144 Pan Peng A Local Algorithm for Finding Dense Bipartite-Like Subgraphs . . . . . . . . 145--156 Ton Kloks and Sheung-Hung Poon and Chin-Ting Ung and Yue-Li Wang Algorithms for the Strong Chromatic Index of Halin Graphs, Distance-Hereditary Graphs and Maximal Outerplanar Graphs . . . . . . . . . . . 157--168 Biing-Feng Wang and Chih-Hsuan Li On the Minimum Degree Hypergraph Problem with Subset Size Two and the Red-Blue Set Cover Problem with the Consecutive Ones Property . . . . . . . . . . . . . 169--180 L. Sunil Chandran and Deepak Rajendraprasad Rainbow Colouring of Split and Threshold Graphs . . . . . . . . . . . . . . . . . 181--192 Alexandru Popa Approximating the Rainbow --- Better Lower and Upper Bounds . . . . . . . . . 193--203 Rémy Belmonte and Pinar Heggernes and Pim van 't Hof and Reza Saei Ramsey Numbers for Line Graphs and Perfect Graphs . . . . . . . . . . . . . 204--215 Oswin Aichholzer and Matias Korman and Alexander Pilz Geodesic Order Types . . . . . . . . . . 216--227 Stephane Durocher and Saeed Mehrabi Computing Partitions of Rectilinear Polygons with Minimum Stabbing Number 228--239 Anonymous Front Matter . . . . . . . . . . . . . . ??
Mohammad Shafiul Alam and Md. Monirul Islam and Kazuyuki Murase Artificial Bee Colony Algorithm with Improved Explorations for Numerical Function Optimization . . . . . . . . . 1--8 Murilo Zangari and Wesley Romão and Ademir Aparecido Constantino Extensions of Ant-Miner Algorithm to Deal with Class Imbalance Problem . . . 9--18 Zareen Mehboob and Hujun Yin and Sophie M. Wuerger and Laura M. Parkes Multivoxel Pattern Analysis Using Information-Preserving EMD . . . . . . . 19--26 Rafael Stubs Parpinelli and Heitor Silvério Lopes Population Resizing Using Nonlinear Dynamics in an Ecology-Based Approach 27--34 Piyabute Fuangkhon and Thitipong Tanprasert Multi-class Contour Preserving Classification . . . . . . . . . . . . . 35--42 Luke M. Davis and Barry-John Theobald and Anthony Bagnall Automated Bone Age Assessment Using Feature Extraction . . . . . . . . . . . 43--51 Washington Silva and Ginalber Serra A Hybrid Approach Based on DCT-Genetic-Fuzzy Inference System for Speech Recognition . . . . . . . . . . . 52--59 Yong Shi and Brian Graham An Approach to Reshaping Clusters for Nearest Neighbor Search . . . . . . . . 60--67 Jon Hills and Luke M. Davis and Anthony Bagnall Interestingness Measures for Fixed Consequent Rules . . . . . . . . . . . . 68--75 Jing Huo and Yang Gao and Wanqi Yang and Hujun Yin Abnormal Event Detection via Multi-Instance Dictionary Learning . . . 76--83 Luneque Silva Junior and Nadia Nedjah and Luiza de Macedo Mourelle Static Packet Routing in NoC Platform Using ACO-Based Algorithms . . . . . . . 84--91 Cordeiro F. R. and Lima S. M. L. and Silva-Filho A. G. and Santos W. P. Segmentation of Mammography by Applying Extreme Learning Machine in Tumor Detection . . . . . . . . . . . . . . . 92--100 Tiago Henrique dos Santos and Alessandro Goedtel and Sérgio Augusto Oliveira da Silva An ANN Speed Observer Applied to Three-Phase Induction Motor . . . . . . 101--108 José M. Fernández-de-Alba and Pablo Campillo and Rubén Fuentes-Fernández and Juan Pavón Opportunistic Sensor Interpretation in a Virtual Smart Environment . . . . . . . 109--116 Ricardo de Souza Jacomini and Marcelo Zanchetta do Nascimento and Rogério Daniel Dantas Comparison of PCA and ANOVA for Information Selection of CC and MLO Views in Classification of Mammograms 117--126 Rosana Veroneze and André R. Gonçalves and Fernando J. Von Zuben A Multiobjective Analysis of Adaptive Clustering Algorithms for the Definition of RBF Neural Network Centers in Regression Problems . . . . . . . . . . 127--134 Michel M. dos Santos and Mêuser J. S. Valença and Wellington P. dos Santos Mean Multiclass Type I and II Errors for Training Multilayer Perceptron with Particle Swarm in Image Segmentation . . 135--142 Chidambaram Chidambaram and Marlon Subtil Marçal and Leyza Baldo Dorini and Hugo Vieira Neto An Improved ABC Algorithm Approach Using SURF for Face Identification . . . . . . 143--150 Ariadne A. Costa and Antonio C. Roque and Silvio Morato and Renato Tinós A Model Based on Genetic Algorithm for Investigation of the Behavior of Rats in the Elevated Plus-Maze . . . . . . . . . 151--158 Ahmed A. A. Esmin and Stan Matwin Data Clustering Using Hybrid Particle Swarm Optimization . . . . . . . . . . . 159--166 Anonymous Front Matter . . . . . . . . . . . . . . ??
Martín Abadi Software Security: a Formal Perspective 1--5 Asaf Degani Formal Methods in the Wild: Trains, Planes, & Automobile . . . . . . . . . . 6--6 Alan Wassyng Who Are We, and What Are We Doing Here? 7--9 Fides Aarts and Faranak Heidarian and Harco Kuppens and Petur Olsen Automata Learning through Counterexample Guided Abstraction Refinement . . . . . 10--27 María Alpuente and Demis Ballis and Francisco Frechina and Daniel Romero Julienne: a Trace Slicer for Conditional Rewrite Theories . . . . . . . . . . . . 28--32 Étienne André and Laurent Fribourg and Ulrich Kühne and Romain Soulat IMITATOR 2.5: a Tool for Analyzing Robustness in Scheduling Problems . . . 33--36 Virginia Aponte and Pierre Courtieu and Yannick Moy and Marc Sango Maximal and Compositional Pattern-Based Loop Invariants . . . . . . . . . . . . 37--51 Mikael Asplund and Atif Manzoor and Mélanie Bouroche and Siobh\`an Clarke A Formal Approach to Autonomous Vehicle Coordination . . . . . . . . . . . . . . 52--67 Howard Barringer and Yli\`es Falcone and Klaus Havelund and Giles Reger Quantified Event Automata: Towards Expressive and Efficient Runtime Monitors . . . . . . . . . . . . . . . . 68--84 Andreas Bauer and Yli\`es Falcone Decentralised LTL Monitoring . . . . . . 85--100 Soufiene Benkirane and Rachel Norman and Erin Scott and Carron Shankland Measles Epidemics and PEPA: An Exploration of Historic Disease Dynamics Using Process Algebra . . . . . . . . . 101--115 Matthieu Carlier and Catherine Dubois and Arnaud Gotlieb A Certified Constraint Solver over Finite Domains . . . . . . . . . . . . . 116--131 Maria Christakis and Peter Müller and Valentin Wüstholz Collaborative Verification and Testing with Explicit Assumptions . . . . . . . 132--146 Denis Cousineau and Damien Doligez and Leslie Lamport and Stephan Merz TLA$^+$ Proofs . . . . . . . . . . . . . 147--154 Nicolás D'Ippolito and Victor Braberman and Nir Piterman The Modal Transition System Control Problem . . . . . . . . . . . . . . . . 155--170 Julien Dormoy and Olga Kouchnarenko and Arnaud Lanoix When Structural Refinement of Components Keeps Temporal Properties over Reconfigurations . . . . . . . . . . . . 171--186 Evren Ermis and Martin Schäf and Thomas Wies Error Invariants . . . . . . . . . . . . 187--201 Mathieu Giorgino and Martin Strecker Correctness of Pointer Manipulating Algorithms Illustrated by a Verified BDD Construction . . . . . . . . . . . . . . 202--216 James Heather and Steve Schneider A Formal Framework for Modelling Coercion Resistance and Receipt Freeness 217--231 Robert M. Hierons and Mercedes G. Merayo and Manuel Núñez Using Time to Add Order to Distributed Testing . . . . . . . . . . . . . . . . 232--246 Anonymous Front Matter . . . . . . . . . . . . . . ??
Nouha Abid and Silvano Dal Zilio Real-Time Specification Patterns and Tools . . . . . . . . . . . . . . . . . 1--15 Elvira Albert and Bjarte M. Òstvold Automated Extraction of Abstract Behavioural Models from JMS Applications 16--31 Nicolas Ayache and Roberto M. Amadio Certifying and Reasoning on Cost Annotations in C Programs . . . . . . . 32--46 Christel Baier and Marcus Daum and Benjamin Engel Waiting for Locks: How Long Does It Usually Take? . . . . . . . . . . . . . 47--62 Victor Bandur and Wolfram Kahl and Alan Wassyng Microcontroller Assembly Synthesis from Timed Automaton Task Specifications . . 63--77 Jiri Barnat and Jan Beran and Lubos Brim Tool Chain to Support Automated Formal Verification of Avionics Simulink Designs . . . . . . . . . . . . . . . . 78--92 Edd Barrett and Andy King Range Analysis of Binaries with Minimal Effort . . . . . . . . . . . . . . . . . 93--107 Lo\"\ic Correnson and Julien Signoles Combining Analyses for C Program Verification . . . . . . . . . . . . . . 108--130 Sjoerd Cranen Model Checking the FlexRay Startup Phase 131--145 Rainer Droste and Christoph Läsche Model-Based Risk Assessment Supporting Development of HSE Plans for Safe Offshore Operations . . . . . . . . . . 146--161 Luca Ferrucci and Dino Mandrioli Modular Automated Verification of Flexible Manufacturing Systems with Metric Temporal Logic and Non-Standard Analysis . . . . . . . . . . . . . . . . 162--176 Vlad Popa and Wolfgang Schwitzer Optimizing the Robustness of Software against Communication Latencies in Distributed Reactive Embedded Systems 177--191 Konrad Siek and Pawe\l T. Wojciechowski A Formal Design of a Tool for Static Analysis of Upper Bounds on Object Calls in Java . . . . . . . . . . . . . . . . 192--206 Ji\vrí Slabý and Jan Strej\vcek and Marek Trtík Checking Properties Described by State Machines: On Synergy of Instrumentation, Slicing, and Symbolic Execution . . . . 207--221 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Robert Kowalski and Fariba Sadri A Logic-Based Framework for Reactive Systems . . . . . . . . . . . . . . . . 1--15 Marie-Laure Mugnier Ontology-Based Query Answering with Existential Rules . . . . . . . . . . . 16--16 Valerio Cosentino and Jordi Cabot and Patrick Albert and Philippe Bauquel and Jacques Perronnet A Model Driven Reverse Engineering Framework for Extracting Business Rules Out of a Java Application . . . . . . . 17--31 Mustafa Hashmi and Guido Governatori and Moe Thandar Wynn Business Process Data Compliance . . . . 32--46 Bruno Berstel-Da Silva Formalizing Both Refraction-Based and Sequential Executions of Production Rule Programs . . . . . . . . . . . . . . . . 47--61 Adil El Ghali and Amina Chniti and Hugues Citeau Bringing OWL Ontologies to the Business Rules Users . . . . . . . . . . . . . . 62--76 Abdooulaye Guissé and François Lévy and Adeline Nazarenko From Regulatory Texts to BRMS: How to Guide the Acquisition of Business Rules? 77--91 Saleem Malik and Imran Sarwar Bajwa A Rule Based Approach for Business Rule Generation from Business Process Models 92--99 Adrian Paschke and Harold Boley and Zhili Zhao and Kia Teymourian and Tara Athan Reaction RuleML 1.0: Standardized Semantic Reaction Rules . . . . . . . . 100--119 Theodore Patkos and Abdelghani Chibani and Dimitris Plexousakis and Yacine Amirat A Production Rule-Based Framework for Causal and Epistemic Reasoning . . . . . 120--135 Katerina Ksystra and Nikolaos Triantafyllou and Petros Stefaneas On the Algebraic Semantics of Reactive Rules . . . . . . . . . . . . . . . . . 136--150 Stefano Bragaglia and Federico Chesani and Paola Mello and Davide Sottara A Rule-Based Calculus and Processing of Complex Events . . . . . . . . . . . . . 151--166 Stefania Costantini and Giovanni De Gasperis Complex Reactivity with Preferences in Rule-Based Agents . . . . . . . . . . . 167--181 Hans Weigand and Adrian Paschke The Pragmatic Web: Putting Rules in Context . . . . . . . . . . . . . . . . 182--192 Kalliopi Kravari and Nick Bassiliades HARM: a Hybrid Rule-Based Agent Reputation Model Based on Temporal Defeasible Logic . . . . . . . . . . . . 193--207 Benjamin Jailly and Christophe Gravier and Julien Subercaze and Marius Preda and Jacques Fayolle Whispering Interactions to the End User Using Rules . . . . . . . . . . . . . . 208--214 Iosif Viktoratos and Athanasios Tsadiras and Nick Bassiliades Personalizing Location Information through Rule-Based Policies . . . . . . 215--223 Yan Tang Demey and Trung-Kien Tran Using $\mathcal{SOIQ}$(D) to Formalize Semantics within a Semantic Decision Table . . . . . . . . . . . . . . . . . 224--239 Sotiris Batsakis and Euripides G. M. Petrakis Imposing Restrictions over Temporal Properties in OWL: a Rule-Based Approach 240--247 Jesús M. Almendros-Jiménez OWL RL in Logic Programming: Querying, Reasoning and Inconsistency Explanations 248--255 Anonymous Front Matter . . . . . . . . . . . . . . ??
Kazufumi Nishida and Koji Nakano and Yasuaki Ito Accelerating the Dynamic Programming for the Optimal Polygon Triangulation on the GPU . . . . . . . . . . . . . . . . . . 1--15 Xu Huang and Dharmendra Sharma and Muhammad Ahmed Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks . . 16--29 Shin-Yeu Lin and Xian-Chang Guo Parallel Algorithm for Nonlinear Network Optimization Problems and Real-Time Applications . . . . . . . . . . . . . . 30--40 Max Schneider and Nikola Belic and Christoph Sambale and Ulrich Hofmann and Dietmar Fey Optimization of a Short-Range Proximity Effect Correction Algorithm in E-Beam Lithography Using GPGPUs . . . . . . . . 41--55 Nikolaos Alachiotis and Pavlos Pavlidis and Alexandros Stamatakis Exploiting Multi-grain Parallelism for Efficient Selective Sweep Detection . . 56--68 Eraldo P. Marinho and Alexandro Baldassin Vectorized Algorithms for Quadtree Construction and Descent . . . . . . . . 69--82 Vu Thien Nga Nguyen and Raimund Kirner and Frank Penczek A Multi-level Monitoring Framework for Stream-Based Coordination Programs . . . 83--98 Koji Nakano An Optimal Parallel Prefix-Sums Algorithm on the Memory Machine Models for GPUs . . . . . . . . . . . . . . . . 99--113 Sebastian Schaetz and Martin Uecker A Multi-GPU Programming Library for Real-Time Applications . . . . . . . . . 114--128 Sarad Venugopalan and Oliver Sinnen Optimal Linear Programming Solutions for Multiprocessor Scheduling with Communication Delays . . . . . . . . . . 129--138 Yoshihiro Ichinomiya and Motoki Amagasaki and Masahiro Iida and Morihiro Kuga A Bitstream Relocation Technique to Improve Flexibility of Partial Reconfiguration . . . . . . . . . . . . 139--152 Chuan Wang and Jianhua Gu and Yunlan Wang and Tianhai Zhao A Hybrid Heuristic-Genetic Algorithm for Task Scheduling in Heterogeneous Multi-core System . . . . . . . . . . . 153--170 Li Wang and Jing Liu and Jingtong Hu and Qingfeng Zhuge and Duo Liu and Edwin H.-M. Sha Efficient Task Assignment on Heterogeneous Multicore Systems Considering Communication Overhead . . . 171--185 Eddy Caron and Frédéric Desprez and Adrian Muresan and Frédéric Suter Budget Constrained Resource Allocation for Non-deterministic Workflows on an IaaS Cloud . . . . . . . . . . . . . . . 186--201 Hiroki Nakahara and Hiroyuki Nakanishi and Tsutomu Sasao On a Wideband Fast Fourier Transform Using Piecewise Linear Approximations: Application to a Radio Telescope Spectrometer . . . . . . . . . . . . . . 202--217 Wadoud Bousdira and Frédéric Loulergue and Julien Tesson A Verified Library of Algorithmic Skeletons on Evenly Distributed Arrays 218--232 Takayuki Umeda and Keiichiro Fukazawa Performance Measurement of Parallel Vlasov Code for Space Plasma on Various Scalar-Type Supercomputer Systems . . . 233--240 Andrew A. Haigh and Bradley E. Treeby and Eric C. McCreath Ultrasound Simulation on the Cell Broadband Engine Using the Westervelt Equation . . . . . . . . . . . . . . . . 241--252 Nianmin Yao and Yong Han and Shaobin Cai and Qilong Han Study on the Data Flow Balance in NFS Server with iSCSI . . . . . . . . . . . 253--272 Christoph M. Kirsch and Hannes Payer and Harald Röck and Ana Sokolova Performance, Scalability, and Semantics of Concurrent FIFO Queues . . . . . . . 273--287 Anonymous Front Matter . . . . . . . . . . . . . . ??
Jih-Ching Chiu and Kai-Ming Yang and Chen-Ang Wong Analytical Modeling for Multi-transaction Bus on Distributed Systems . . . . . . . . . . . . . . . . 1--9 LihChyun Shu and Ying-Cheng Su and Chang-Ming Tasi and Huey-Min Sun Leveraging the Strengths of Transactional Memory While Maintaining System Performance for a Multiplayer Gaming Application . . . . . . . . . . . 10--20 Il-Young Kim and Jong-Kook Kim Enhancing the Performance of a Distributed Mobile Computing Environment by Topology Construction . . . . . . . . 21--30 Yi Dai and Ke-fei Wang and Wei-xia Xu and He-ying Zhang and Shao-gang Wang Frame Error Rate Testing for High Speed Optical Interconnect . . . . . . . . . . 31--39 Ehsan Atoofian and Amir Ghanbari Bavarsad Maintaining Consistency in Software Transactional Memory through Dynamic Versioning Tuning . . . . . . . . . . . 40--49 Da-Ren Chen and Chiun-Chieh Hsu and You-Shyang Chen and Jun-Fu Guo Solving a 2-Covered Path Problem with Variable Radii for Wireless Sensor Networks . . . . . . . . . . . . . . . . 50--61 Yoshimasa Ohnishi and Takaichi Yoshida Design of an Application-Dependent Static-Based Shared Memory Network . . . 62--71 Anh P. Nguyen and Thuc D. Nguyen Determining Quality of S-Boxes Using Pseudo Random Sequences Generated from Stream Ciphers . . . . . . . . . . . . . 72--79 Weixing Ji and Yizhuo Wang and Zhi Huang and Junqing Zhao and Xi Li Exploring Object-Level Parallelism on Chip Multi-processors . . . . . . . . . 80--89 Yi-Chun Wang and Justie Su-Tzu Juan The Hamiltonicity of WK-Recursive Pyramid . . . . . . . . . . . . . . . . 90--99 Djawida Dib and Nikos Parlavantzas and Christine Morin Towards Multi-level Adaptation for Distributed Operating Systems and Applications . . . . . . . . . . . . . . 100--109 Chih-Chiang Wei FIDs Classifier for Artificial Intelligence and Its Application . . . . 110--119 Ahmad Shukri Mohd Noor and Mustafa Mat Deris and Tutut Herawan and Mohamad Nor Hassan On Affirmative Adaptive Failure Detection . . . . . . . . . . . . . . . 120--129 Wen-Ta Lee and Min-Sheng Chang and Wei-Chieh Shen A New Low Latency Parallel Turbo Decoder Employing Parallel Phase Decoding Method 130--139 Fouad B. Chedid A Regular Group Quorum System of Degree $\lceil \sqrt{n\slash 2}\rceil$ . . . . 140--147 Fouad B. Chedid A Note on Developing Optimal and Scalable Parallel Two-List Algorithms 148--155 Kai Peng and Hua Zou and Rongheng Lin and Fangchun Yang Small Business-Oriented Index Construction of Cloud Data . . . . . . . 156--165 Jie Liu and Lihua Chi and Chunye Gong and Han Xu and Jie Jiang and Yihui Yan and Qingfeng Hu High-Performance Matrix Multiply on a Massively Multithreaded Fiteng1000 Processor . . . . . . . . . . . . . . . 166--176 Dongjin Yu and Wei Wu and Suhang Zheng and Zhixiang Zhu BIDE-Based Parallel Mining of Frequent Closed Sequences with MapReduce . . . . 177--186 Sung Il Kim and Jong-Kook Kim and Hyoung Uk Ha and Tae Ho Kim and Kyu Hyun Choi Efficient Task Scheduling for Hard Real-Time Tasks in Asymmetric Multicore Processors . . . . . . . . . . . . . . . 187--196 Anonymous Front Matter . . . . . . . . . . . . . . ??
A. Thomas and B. John Oommen Optimal ``Anti-Bayesian'' Parametric Pattern Classification Using Order Statistics Criteria . . . . . . . . . . 1--13 Asja Fischer and Christian Igel An Introduction to Restricted Boltzmann Machines . . . . . . . . . . . . . . . . 14--36 Zicheng Liu Human Activity Recognition with $2$D and $3$D Cameras . . . . . . . . . . . . . . 37--37 Gabriel Taubin Smooth Signed Distance Surface Reconstruction and Applications . . . . 38--45 Juan P. Wachs Robot, Pass Me the Scissors! How Robots Can Assist Us in the Operating Room . . 46--57 José Antonio Rodriguez-Serrano Pattern Recognition in Transportation 58--58 Andrea Bottino and Aldo Laurentini The Intrinsic Dimensionality of Attractiveness: a Study in Face Profiles 59--66 Ajay Jaiswal and Nitin Kumar and R. K. Agrawal A Hybrid of Principal Component Analysis and Partial Least Squares for Face Recognition across Pose . . . . . . . . 67--73 Enrique Ramón-Balmaseda and Javier Lorenzo-Navarro and Modesto Castrillón-Santana Gender Classification in Large Databases 74--81 Modesto Castrillón-Santana and Daniel Hernández-Sosa and Javier Lorenzo-Navarro Combining Face and Facial Feature Detectors for Face Detection Performance Improvement . . . . . . . . . . . . . . 82--89 Ariel Morelli Andres and Sebastian Padovani and Mariano Tepper and Marta Mejail and Julio Jacobo Randomized Face Recognition on Partially Occluded Images . . . . . . . . . . . . 90--97 Noslen Hernández and Yoanna Martínez-Díaz and Dania Porro-Muñoz and Heydi Méndez-Vázquez Face Recognition: Would Going Back to Functional Nature Be a Good Idea? . . . 98--105 Yoanna Martínez-Díaz and Heydi Méndez-Vázquez and Yenisel Plasencia-Calaña Dissimilarity Representations Based on Multi-Block LBP for Face Detection . . . 106--113 Marta Gomez-Barrero and Javier Galbally and Pedro Tome and Julian Fierrez On the Vulnerability of Iris-Based Systems to a Software Attack Based on a Genetic Algorithm . . . . . . . . . . . 114--121 Fabio A. González and David Bermeo and Laura Ramos and Olfa Nasraoui On the Robustness of Kernel-Based Clustering . . . . . . . . . . . . . . . 122--129 Diego Hernán Peluffo-Ordóñez and Carlos Daniel Acosta-Medina An Improved Multi-Class Spectral Clustering Based on Normalized Cuts . . 130--137 Hernán C. Ahumada and Pablo M. Granitto A Simple Hybrid Method for Semi-Supervised Learning . . . . . . . . 138--145 Vladimir V. Ryazanov Clustering of Incomplete Data and Evaluation of Clustering Quality . . . . 146--153 Miguel A. Duval-Poo and Joan Sosa-García and Alejandro Guerra-Gandón and Sandro Vega-Pons A New Classifier Combination Scheme Using Clustering Ensemble . . . . . . . 154--161 Miriam Mónica Duarte-Villaseñor and Jesús Ariel Carrasco-Ochoa Nested Dichotomies Based on Clustering 162--169 Anonymous Front Matter . . . . . . . . . . . . . . ??
S. A. Abramov and M. Petkov\vsek On Polynomial Solutions of Linear Partial Differential and ($q$-)Difference Equations . . . . . . . 1--11 Prabhanjan Ananth and Ambedkar Dukkipati An Algebraic Characterization of Rainbow Connectivity . . . . . . . . . . . . . . 12--21 Alexander Batkhin Application of the Method of Asymptotic Solution to One Multi-Parameter Problem 22--33 Marco Bodrato and Alberto Zanoni A New Algorithm for Long Integer Cube Computation with Some Insight into Higher Powers . . . . . . . . . . . . . 34--46 Pavel Bourdykine and Stephen M. Watt Lightweight Abstraction for Mathematical Computation in Java . . . . . . . . . . 47--59 Alexander D. Bruno and Victor F. Edneral Calculation of Normal Forms of the Euler--Poisson Equations . . . . . . . . 60--71 Dzmitry A. Budzko and Alexander N. Prokopenya Stability of Equilibrium Positions in the Spatial Circular Restricted Four-Body Problem . . . . . . . . . . . 72--83 Hassan Errami and Werner M. Seiler Computing Hopf Bifurcations in Chemical Reaction Networks Using Reaction Coordinates . . . . . . . . . . . . . . 84--97 Vladimir Gerdt and Amir Hashemi Comprehensive Involutive Systems . . . . 98--116 Mark Giesbrecht and Albert Heinle A Polynomial-Time Algorithm for the Jacobson Form of a Matrix of Ore Polynomials . . . . . . . . . . . . . . 117--128 Jaume Giné and Colin Christopher and Mateja Pre\vsern The Resonant Center Problem for a 2:-3 Resonant Cubic Lotka--Volterra System 129--142 Dima Grigoriev and Andreas Weber Complexity of Solving Systems with Few Independent Monomials and Applications to Mass-Action Kinetics . . . . . . . . 143--154 Alexander Gusev and Sergue Vinitsky Symbolic-Numerical Calculations of High-$|m|$ Rydberg States and Decay Rates in Strong Magnetic Fields . . . . 155--171 Amir Hashemi and Michael Schweinfurter Quasi-stability versus Genericity . . . 172--184 Gregor Kemper Invariant Theory: Applications and Computations . . . . . . . . . . . . . . 185--185 Jia Li and Jin-San Cheng and Elias P. Tsigaridas Local Generic Position for Root Isolation of Zero-Dimensional Triangular Polynomial Systems . . . . . . . . . . . 186--197 Steffen Marcus and Marc Moreno Maza and Paul Vrbik On Fulton's Algorithm for Computing Intersection Multiplicities . . . . . . 198--211 Marc Mezzarobba A Note on the Space Complexity of Fast D-Finite Function Evaluation . . . . . . 212--223 Marc Moreno Maza and Éric Schost and Paul Vrbik Inversion Modulo Zero-Dimensional Regular Chains . . . . . . . . . . . . . 224--235 Michael Monagan and Roman Pearce Sparse Polynomial Powering Using Heaps 236--247 Anonymous Front Matter . . . . . . . . . . . . . . ??
Fathul Wahid The Current State of Research on eGovernment in Developing Countries: a Literature Review . . . . . . . . . . . 1--12 Nurdin Nurdin and Rosemary Stockdale and Helana Scheepers The Influence of External Institutional Pressures on Local E-Government Adoption and Implementation: a Coercive Perspective within an Indonesian Local E-Government Context . . . . . . . . . . 13--26 Yvon van den Boer and Lidwien van de Wijngaert and Willem Pieterson and Rex Arendsen On the Interaction of Source and Channel Choice in the Government-to-Business Context . . . . . . . . . . . . . . . . 27--39 Suha Alawadhi and Armando Aldama-Nalda and Hafedh Chourabi and J. Ramon Gil-Garcia and Sofia Leung Building Understanding of Smart City Initiatives . . . . . . . . . . . . . . 40--53 Nicole Maarse and Marijn Janssen The Need to Adjust Lean to the Public Sector . . . . . . . . . . . . . . . . . 54--65 Katarina L. Gidlund `Demand Driven Development of Public e-Services' . . . . . . . . . . . . . . 66--77 Damiano Falcioni and Andrea Polini and Alberto Polzonetti and Barbara Re Improving PA Business Processes through Modeling, Analysis, and Reengineering 78--89 Anneke Zuiderwijk and Marijn Janssen and Ronald Meijer and Sunil Choenni and Yannis Charalabidis Issues and Guiding Principles for Opening Governmental Judicial Research Data . . . . . . . . . . . . . . . . . . 90--101 Panagiotis Panagiotopoulos and Alinaghi Ziaee Bigdeli and Steven Sams `5 Days in August' --- How London Local Authorities Used Twitter during the 2011 Riots . . . . . . . . . . . . . . . . . 102--113 Mark Scannell and Frank Bannister Shared Services in Irish Local Government . . . . . . . . . . . . . . . 114--125 André Andrade and Luiz Antonio Joia Information Technology and the Efficiency of the Brazilian Judiciary System . . . . . . . . . . . . . . . . . 126--136 Walter T. de Vries and Gianluca Miscione The Tool That Has to Build Itself: The Case of Dutch Geo-Data . . . . . . . . . 137--148 Bernd Zwattendorfer and Arne Tauber and Klaus Stranacher and Peter Reichstädter Cross-Border Legal Identity Management 149--161 Juha Lemmetti and Samuli Pekkola Understanding Enterprise Architecture: Perceptions by the Finnish Public Sector 162--173 Arild Jansen The Understanding of ICTs in Public Sector and Its Impact on Governance . . 174--186 Anne Fleur van Veenstra and Marijn Janssen Investigating Outcomes of T-Government Using a Public Value Management Approach 187--197 Òystein Sæbò E-government in Tanzania: Current Status and Future Challenges . . . . . . . . . 198--209 Mauricio Solar and Gastón Concha and Luis Meijueiro A Model to Assess Open Government Data in Public Agencies . . . . . . . . . . . 210--221 John Krogstie Comparing Private and Public Sector on Information Systems Development and Maintenance Efficiency . . . . . . . . . 222--233 Dalibor Stanimirovic and Tina Jukic and Janja Nograsek and Mirko Vintar Analysis of the Methodologies for Evaluation of E-Government Policies . . 234--245 Anonymous Front Matter . . . . . . . . . . . . . . ??
Peter Dahlgren Social Media and Counter-Democracy: The Contingences of Participation . . . . . 1--12 Steffen Albrecht E-Consultations: a Review of Current Practice and a Proposal for Opening Up the Process . . . . . . . . . . . . . . 13--24 Marius Rohde Johannessen and Leif Skiftenes Flak and Òystein Sæbò Choosing the Right Medium for Municipal eParticipation Based on Stakeholder Expectations . . . . . . . . . . . . . . 25--36 Åke Grönlund and Iryna Susha A Communication Genre Perspective on e-Petitioning: The Case of the Citizens' Initiative . . . . . . . . . . . . . . . 37--48 Eleni Panopoulou and Efpraxia Dalakiouridou and Efthimios Tambouris and Konstantinos Tarabanis Citizens' Evaluation of an Online Argument Visualisation Platform for eParticipation . . . . . . . . . . . . . 49--60 Neil Benn and Ann Macintosh PolicyCommons --- Visualizing Arguments in Policy Consultation . . . . . . . . . 61--72 Shun Shiramatsu and Robin M. E. Swezey and Hiroyuki Sano and Norifumi Hirata and Tadachika Ozono Structuring Japanese Regional Information Gathered from the Web as Linked Open Data for Use in Concern Assessment . . . . . . . . . . . . . . . 73--84 Georg Aichholzer and Doris Allhutter and Stefan Strauß Using Online Carbon Calculators for Participation in Local Climate Initiatives . . . . . . . . . . . . . . 85--96 Sabrina Scherer and Maria A. Wimmer Reference Process Model for Participatory Budgeting in Germany . . . 97--111 Olivier Glassey and Camille-Angelo Aglione Getting Teenagers to Participate: a Survey of the Youth Council of the City of Lausanne . . . . . . . . . . . . . . 112--119 Adam Z. Wyner and Katie Atkinson and Trevor Bench-Capon Model Based Critique of Policy Proposals 120--131 Roman Klinger and Philipp Senger and Sumit Madan and Michal Jacovi Online Communities Support Policy-Making: The Need for Data Analysis . . . . . . . . . . . . . . . . 132--143 Cleyton Slaviero and Ana Cristina Bicharra Garcia and Cristiano Maciel Exploiting eParticipation Using an Ontological Approach . . . . . . . . . . 144--155 Yannis Charalabidis and Anna Triantafillou and Vangelis Karkaletsis and Euripidis Loukis Public Policy Formulation through Non Moderated Crowdsourcing in Social Media 156--169 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Paola Bonizzoni The Holy Grail: Finding the Genetic Bases of Phenotypic Characters . . . . . 1--1 Cristian S. Calude and Elena Calude and Melissa S. Queen Inductive Complexity of P versus NP Problem . . . . . . . . . . . . . . . . 2--9 René Doursat Advances in Embryomorphic Engineering 10--10 Jack H. Lutz Reasoning As Though . . . . . . . . . . 11--11 Maurice Margenstern Universality and the Halting Problem for Cellular Automata in Hyperbolic Spaces: The Side of the Halting Problem . . . . 12--33 Matthew J. Patitz An Introduction to Tile-Based Self-assembly . . . . . . . . . . . . . 34--62 Antoine Spicher and Olivier Michel and Jean-Louis Giavitto Spatial Computing in MGS . . . . . . . . 63--69 Erzsébet Csuhaj-Varjú and Marian Gheorghe and Mike Stannett P Systems Controlled by General Topologies . . . . . . . . . . . . . . . 70--81 Rudolf Freund and Yurii Rogozhin and Sergey Verlan P Systems with Minimal Left and Right Insertion and Deletion . . . . . . . . . 82--93 Sama Goliaei and Mohammad-Hadi Foroughmand-Araabi Lower Bounds on the Complexity of the Wavelength-Based Machine . . . . . . . . 94--105 Cristian Grozea and Florin Manea and Mike Müller and Dirk Nowotka String Matching with Involutions . . . . 106--117 Frederic Gruau and Luidnel Maignan Distributed Execution of Automata Networks on a Computing Medium: Introducing IfAny Machines . . . . . . . 118--129 Gerd Gruenert and Gabi Escuela and Peter Dittrich Symbol Representations in Evolving Droplet Computers . . . . . . . . . . . 130--140 Joachim Hertel Inductive Complexity of Goodstein's Theorem . . . . . . . . . . . . . . . . 141--151 Matthew R. Lakin and Amanda Minnich and Terran Lane and Darko Stefanovic Towards a Biomolecular Learning Machine 152--163 Pietro Milici Tractional Motion Machines: Tangent-Managing Planar Mechanisms as Analog Computers and Educational Artifacts . . . . . . . . . . . . . . . 164--173 J. Andres Montoya Computing with Sand: On the Complexity of Recognizing Two-dimensional Sandpile Critical Configurations . . . . . . . . 174--185 Stefano Nichele and Gunnar Tufte Genome Parameters as Information to Forecast Emergent Developmental Behaviors . . . . . . . . . . . . . . . 186--197 Susan Stepney and Samson Abramsky and Matthias Bechmann and Jerzy Gorecki and Viv Kendon Heterotic Computing Examples with Optics, Bacteria, and Chemicals . . . . 198--209 Sami Torbey and Selim G. Akl Reliable Node Placement in Wireless Sensor Networks Using Cellular Automata 210--221 Anonymous Front Matter . . . . . . . . . . . . . . ??
Tim Furche and Georg Gottlob and Christian Schallhart DIADEM: Domains to Databases . . . . . . 1--8 Yamine Ait-Ameur and Idir Ait-Sadoune Stepwise Development of Formal Models for Web Services Compositions: Modelling and Property Verification . . . . . . . 9--9 Huayu Wu and Ruiming Tang and Tok Wang Ling and Yong Zeng and Stéphane Bressan A Hybrid Approach for General XML Query Processing . . . . . . . . . . . . . . . 10--25 Martin F. O'Connor and Mark Roantree SCOOTER: a Compact and Scalable Dynamic Labeling Scheme for XML Updates . . . . 26--40 Canwei Zhuang and Shaorong Feng Reuse the Deleted Labels for Vector Order-Based Dynamic XML Labeling Schemes 41--54 Yi Ou and Jianliang Xu and Theo Härder Towards an Efficient Flash-Based Mid-Tier Cache . . . . . . . . . . . . . 55--70 Alka Bhushan and Nandlal L. Sarda and P. V. Rami Reddy Evacuation Planning of Large Buildings Using Ladders . . . . . . . . . . . . . 71--85 Meduri Venkata Vamsikrishna and Zhan Su and Kian-Lee Tan A Write Efficient PCM-Aware Sort . . . . 86--100 Flavio Ferrarotti and Sven Hartmann and Sebastian Link and Mauricio Marin and Emir Muñoz Performance Analysis of Algorithms to Reason about XML Keys . . . . . . . . . 101--115 Kosetsu Ikeda and Nobutaka Suzuki Finding Top-$K$ Correct XPath Queries of User's Incorrect XPath Query . . . . . . 116--130 H. S. Bruhathi and Jayant R. Haritsa Analyzing Plan Diagrams of XQuery Optimizers . . . . . . . . . . . . . . . 131--146 Somchai Chatvichienchai Spreadsheet Metadata Extraction: a Layout-Based Approach . . . . . . . . . 147--160 Thushari Atapattu and Katrina Falkner and Nickolas Falkner Automated Extraction of Semantic Concepts from Semi-structured Data: Supporting Computer-Based Education through the Analysis of Lecture Notes 161--175 Hilário Oliveira and Rinaldo Lima and João Gomes and Rafael Ferreira and Fred Freitas A Confidence--Weighted Metric for Unsupervised Ontology Population from Web Texts . . . . . . . . . . . . . . . 176--190 Imen Ben Sassi and Chiraz Trabelsi and Amel Bouzeghoub and Sadok Ben Yahia Situation-Aware User's Interests Prediction for Query Enrichment . . . . 191--205 Karam Abdulahhad and Jean-Pierre Chevallet and Catherine Berrut The Effective Relevance Link between a Document and a Query . . . . . . . . . . 206--218 Tassadit Bouadi and Marie-Odile Cordier and René Quiniou Incremental Computation of Skyline Queries with Dynamic Preferences . . . . 219--233 R. Uday Kiran and Masaru Kitsuregawa Efficient Discovery of Correlated Patterns in Transactional Databases Using Items' Support Intervals . . . . . 234--248 Albert Tort and Antoni Olivé and Maria-Ribera Sancho On Checking Executable Conceptual Schema Validity by Testing . . . . . . . . . . 249--264 Wenyu Huo and Vassilis J. Tsotras Querying Transaction--Time Databases under Branched Schema Evolution . . . . 265--280 Anonymous Front Matter . . . . . . . . . . . . . . ??
Cristhian A. D. Deagustini and Santiago E. Fulladoza Dalibón and Sebastián Gottifredi Consistent Query Answering Using Relational Databases through Argumentation . . . . . . . . . . . . . 1--15 John Jenkins and Isha Arkatkar and Sriram Lakshminarasimhan and Neil Shah and Eric R. Schendel Analytics-Driven Lossless Data Compression for Rapid In-situ Indexing, Storing, and Querying . . . . . . . . . 16--30 Xiuming Yu and Meijing Li and Incheon Paik and Keun Ho Ryu Prediction of Web User Behavior by Discovering Temporal Relational Rules from Web Log Data . . . . . . . . . . . 31--38 José Luis Navarro-Galindo and José Samos and M. José Muñoz-Alférez A Hybrid Approach to Text Categorization Applied to Semantic Annotation . . . . . 39--47 Corrado Loglisci and Dino Ienco and Mathieu Roche and Maguelonne Teisseire and Donato Malerba An Unsupervised Framework for Topological Relations Extraction from Geographic Documents . . . . . . . . . . 48--55 Javier Nieves and Igor Santos and Pablo G. Bringas Combination of Machine-Learning Algorithms for Fault Prediction in High-Precision Foundries . . . . . . . . 56--70 Ruiming Tang and Reynold Cheng and Huayu Wu and Stéphane Bressan A Framework for Conditioning Uncertain Relational Data . . . . . . . . . . . . 71--87 Yuki Awano and Qiang Ma and Masatoshi Yoshikawa Cause Analysis of New Incidents by Using Failure Knowledge Database . . . . . . . 88--102 Rania Khéfifi and Pascal Poizat and Fatiha Sa\"\is Modeling and Querying Context-Aware Personal Information Spaces . . . . . . 103--110 Amir Bahmani and Sahra Sedigh and Ali Hurson Ontology-Based Recommendation Algorithms for Personalized Education . . . . . . . 111--120 Eya Ben Ahmed and Ahlem Nabli and Fa\"\iez Gargouri Towards Quantitative Constraints Ranking in Data Clustering . . . . . . . . . . . 121--128 Kyu-Hwang Kang and Seung-Hwan Lim and Sang-Wook Kim and Min-Hee Jang and Byeong-Soo Jeong A Topic-Oriented Analysis of Information Diffusion in a Blogosphere . . . . . . . 129--140 Keisuke Hasegawa and Qiang Ma and Masatoshi Yoshikawa Trip Tweets Search by Considering Spatio-temporal Continuity of User Behavior . . . . . . . . . . . . . . . . 141--155 Raymond Vermaas and Damir Vandic and Flavius Frasincar Incremental Cosine Computations for Search and Exploration of Tag Spaces . . 156--167 Shuichi Kurabayashi and Yasushi Kiyoki Impression-Aware Video Stream Retrieval System with Temporal Color-Sentiment Analysis and Visualization . . . . . . . 168--182 Miguel Liroz-Gistau and Reza Akbarinia and Esther Pacitti and Fabio Porto and Patrick Valduriez Dynamic Workload-Based Partitioning for Large-Scale Databases . . . . . . . . . 183--190 Lisbeth Rodríguez and Xiaoou Li Dynamic Vertical Partitioning of Multimedia Databases Using Active Rules 191--198 Jacek Jedrzejczak and Tomasz Koszlajda and Robert Wrembel RTDW-bench: Benchmark for Testing Refreshing Performance of Real-Time Data Warehouse . . . . . . . . . . . . . . . 199--206 Pedro Furtado Middleware and Language for Sensor Streams . . . . . . . . . . . . . . . . 207--214 Gianluca Correndo and Antonio Penta and Nicholas Gibbins and Nigel Shadbolt Statistical Analysis of the owl:sameAs Network for Aligning Concepts in the Linking Open Data Cloud . . . . . . . . 215--230 Anonymous Front Matter . . . . . . . . . . . . . . ??
Zineb El Akkaoui and José-Norberto Mazón and Alejandro Vaisman and Esteban Zimányi BPMN-Based Conceptual Modeling of ETL Processes . . . . . . . . . . . . . . . 1--14 Alfredo Cuzzocrea and Robson do N. Fidalgo Enhancing Coverage and Expressive Power of Spatial Data Warehousing Modeling: The SDWM Approach . . . . . . . . . . . 15--29 Matteo Golfarelli and Stefano Rizzi and Elisa Turricchia Sprint Planning Optimization in Agile Data Warehouse Design . . . . . . . . . 30--41 Faten Atigui and Franck Ravat and Olivier Teste and Gilles Zurfluh Using OCL for Automatically Producing Multidimensional Models and ETL Processes . . . . . . . . . . . . . . . 42--53 Thomas Benker and Carsten Jürck A Case Study on Model-Driven Data Warehouse Development . . . . . . . . . 54--64 Petar Jovanovic and Oscar Romero and Alkis Simitsis and Alberto Abelló Integrating ETL Processes from Information Requirements . . . . . . . . 65--80 Norah Alrayes and Wo-Shun Luk Automatic Transformation of Multi-dimensional Web Tables into Data Cubes . . . . . . . . . . . . . . . . . 81--92 Ali Hassan and Franck Ravat and Olivier Teste and Ronan Tournier and Gilles Zurfluh Differentiated Multiple Aggregations in Multidimensional Databases . . . . . . . 93--104 Muhammad Marwan Muhammad Fuad Genetic Algorithms-Based Symbolic Aggregate Approximation . . . . . . . . 105--116 Wiem Abdelbaki and Riadh Ben Messaoud and Sadok Ben Yahia A Neural-Based Approach for Extending OLAP to Prediction . . . . . . . . . . . 117--129 João Bártolo Gomes and Shonali Krishnaswamy and Mohamed M. Gaber and Pedro A. C. Sousa Mobile Activity Recognition Using Ubiquitous Data Stream Mining . . . . . 130--141 Christoph Gröger and Johannes Schlaudraff and Florian Niedermann and Bernhard Mitschang Warehousing Manufacturing Data . . . . . 142--155 Amira Kerkad and Ladjel Bellatreche and Dominique Geniet Queen-Bee: Query Interaction-Aware for Buffer Allocation and Scheduling Problem 156--167 Suan Lee and Jinho Kim and Yang-Sae Moon and Wookey Lee Efficient Distributed Parallel Top-Down Computation of ROLAP Data Cube Using MapReduce . . . . . . . . . . . . . . . 168--179 Kazuyo Narita and Shinji Nakadai and Takuya Araki Landmark-Join: Hash-Join Based String Similarity Joins with Edit Distance Constraints . . . . . . . . . . . . . . 180--191 Damla Oguz and Belgin Ergenc Incremental Itemset Mining Based on Matrix Apriori Algorithm . . . . . . . . 192--204 Jun-Feng Qu and Mengchi Liu A Fast Algorithm for Frequent Itemset Mining Using Patricia* Structures . . . 205--216 Hang Yang and Simon Fong and Yain-Whar Si Multi-objective Optimization for Incremental Decision Tree Learning . . . 217--228 Sandra de Amo and Mouhamadou Saliou Diallo and Cheikh Talibouya Diop and Arnaud Giacometti Mining Contextual Preference Rules for Building User Profiles . . . . . . . . . 229--242 Dan A. Simovici and Paul Fomenky and Werner Kunz Polarities, Axiallities and Marketability of Items . . . . . . . . . 243--252 Anonymous Front Matter . . . . . . . . . . . . . . ??
Tobias Hirsch and Luigi Lo Iacono and Ina Wechsung How Much Network Security Must Be Visible in Web Browsers? . . . . . . . . 1--16 Bastian Braun and Stefan Kucher and Martin Johns and Joachim Posegga A User-Level Authentication Scheme to Mitigate Web Session-Based Vulnerabilities . . . . . . . . . . . . 17--29 Matteo Maria Casalino and Romuald Thion and Mohand-Said Hacid Access Control Configuration for J2EE Web Applications: a Formal Perspective 30--35 Waldo Delport and Martin S. Olivier Cloud Separation: Stuck Inside the Cloud 36--49 Kashif Syed and Pavol Zavarsky and Dale Lindskog and Ron Ruhl and Shaun Aghili Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process . . . 50--64 Michael Netter and Sabri Hassan and Günther Pernul An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control . . . . . . . . . . . . . . . . 65--78 Aliaksandr Lazouski and Fabio Martinelli and Paolo Mori A Prototype for Enforcing Usage Control Policies Based on XACML . . . . . . . . 79--92 Francisco Moyano and Carmen Fernandez-Gago and Javier Lopez A Conceptual Framework for Trust Models 93--104 Vit Bukac and Pavel Tucek and Martin Deutsch Advances and Challenges in Standalone Host-Based Intrusion Detection Systems 105--117 Marcin Gorawski and Michal Lorek and Michal Gorawski Encrypted Adaptive Storage Model --- Analysis and Performance Tests . . . . . 118--128 Michael Dorn and Peter Wackersreuther and Christian Böhm Efficient Comparison of Encrypted Biometric Templates . . . . . . . . . . 129--142 Rouzbeh Behnia and Swee-Huay Heng and Che-Sheng Gan Short and Efficient Identity-Based Undeniable Signature Scheme . . . . . . 143--148 Giuseppe D'Acquisto and Marta Flamini and Maurizio Naldi Damage Sharing May Not Be Enough: An Analysis of an Ex-ante Regulation Policy for Data Breaches . . . . . . . . . . . 149--160 Hanno Langweg and Lisa Rajbhandari Flexible Regulation with Privacy Points 161--166 Rainer Schick and Christoph Ruland On the Security of the Non-Repudiation of Forwarding Service . . . . . . . . . 167--178 Hisain Elshaafi and Jimmy McGibney and Dmitri Botvich Profitability and Cost Management of Trustworthy Composite Services . . . . . 179--191 Ta Vinh Thong and Levente Buttyán Query Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases . . . . . . . . . 192--206 Ali Salem and Salah Triki and Hanêne Ben-Abdallah and Nouria Harbi and Omar Boussaid Verification of Security Coherence in Data Warehouse Designs . . . . . . . . . 207--213 Luca Vigan\`o Towards the Secure Provision and Consumption in the Internet of Services 214--215 Martin Johns and Joachim Posegga WebSand: Server-Driven Outbound Web-Application Sandboxing . . . . . . . 216--217 Anonymous Front Matter . . . . . . . . . . . . . . ??