Last update: Sat Oct 14 16:24:17 MDT 2017
Volume 7450, 2012Ibrahima Gueye and Idrissa Sarr and Hubert Naacke TransElas: Elastic Transaction Monitoring for Web2.0 Applications . . . 1--12 Sushil Jajodia and Witold Litwin and Thomas Schwarz Recoverable Encryption through Noised Secret over a Large Cloud . . . . . . . 13--24 Byunggu Yu and Alfredo Cuzzocrea and Dong Jeong and Sergey Maydebura A Bigtable/MapReduce-Based Cloud Infrastructure for Effectively and Efficiently Managing Large-Scale Sensor Networks . . . . . . . . . . . . . . . . 25--36 Diana Moise and Alexandra Carpen-Amarie MapReduce Applications in the Cloud: a Cost Evaluation of Computation and Storage . . . . . . . . . . . . . . . . 37--48 Mohamed Amin Sakka and Bruno Defude Scalability Issues in Designing and Implementing Semantic Provenance Management Systems . . . . . . . . . . . 49--61 Balwinder Sodhi and T. V. Prabhakar Performance Characteristics of Virtualized Platforms from Applications Perspective . . . . . . . . . . . . . . 62--74 Qiming Chen and Meichun Hsu Open Execution Engines of Stream Analysis Operations . . . . . . . . . . 75--87 George Pallis Improving Content Delivery by Exploiting the Utility of CDN Servers . . . . . . . 88--99 Eugenio Cesario and Carlo Mastroianni and Domenico Talia Using Mining@Home for Distributed Ensemble Learning . . . . . . . . . . . 100--111 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Filipe Portela and Manuel Filipe Santos and José Machado and Álvaro Silva and Fernando Rua Intelligent Data Acquisition and Scoring System for Intensive Medicine . . . . . 1--15 Maribel Yasmina Santos and Jorge Cruz and Artur Teles de Araújo Data Mining in the Study of the Chronic Obstructive Pulmonary Disease . . . . . 16--30 Miroslav Bursa and Lenka Lhotska and Vaclav Chudacek and Jiri Spilka and Petr Janku and Martin Huser Practical Problems and Solutions in Hospital Information System Data Mining 31--39 Dominic Girardi and Michael Giretzlehner and Josef Küng Using Generic Meta-Data-Models for Clustering Medical Data . . . . . . . . 40--53 Cátia Santos-Pereira and Alexandre B. Augusto and Manuel E. Correia and Ana Ferreira A Mobile Based Authorization Mechanism for Patient Managed Role Based Access Control . . . . . . . . . . . . . . . . 54--68 Mersini Paschou and Efrosini Sourla and George Basagiannis and Evangelos Sakkopoulos Care@HOME: a Mobile Monitoring System for Patient Treatment and Blood Pressure Tracking . . . . . . . . . . . . . . . . 69--83 Anna Hristoskova and Veselka Boeva and Elena Tsiporkova An Integrative Clustering Approach Combining Particle Swarm Optimization and Formal Concept Analysis . . . . . . 84--98 Francesco Folino and Clara Pizzuti Link Prediction Approaches for Disease Networks . . . . . . . . . . . . . . . . 99--108 Michelangelo Ceci and Fabio Fumarola and Pietro Hiram Guzzi and Federica Mandreoli Toward a Semantic Framework for the Querying, Mining and Visualization of Cancer Microenvironment Data . . . . . . 109--123 Adam Wyner and Luke Riley and Robert Hoehndorf and Samuel Croset Argumentation to Represent and Reason over Biological Systems . . . . . . . . 124--138 Karol Kozak The Use of Design Specificity in Standardized Mean Difference for Analysis of High throughput RNA Interference Screens . . . . . . . . . . 139--150 Catia M. Machado and Francisco M. Couto and Alexandra R. Fernandes and Susana Santos Toward a Translational Medicine Approach for Hypertrophic Cardiomyopathy . . . . 151--165 Andreas Holzinger and Reinhold Scherer and Martin Seeber and Johanna Wagner and Gernot Müller-Putz Computational Sensemaking on Examples of Knowledge Discovery from Neuroscience Data: Towards Enhancing Stroke Rehabilitation . . . . . . . . . . . . . 166--168 Jan Havlík and Lucie Ku\vcerová and Imrich Kohút and Jan Dvo\vrák and Vratislav Fabián The Database of the Cardiovascular System Related Signals . . . . . . . . . 169--170 Jan Havlík and Ond\vrej Fousek and Miroslav Lo\vzek Patient Monitoring Using Bioimpedance Signal . . . . . . . . . . . . . . . . . 171--172 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Roland Traunmüller Knowledge Management in Government: New Perspectives . . . . . . . . . . . . . . 1--9 Alexander Prosser eParticipation --- Did We Deliver What We Promised? . . . . . . . . . . . . . . 10--18 Emmanuel Nyakwende and Ali Al Mazari Factors Affecting the Development of e-Government in Saudi Arabia . . . . . . 19--28 Wichian Chutimaskul and Suree Funilkul The Framework for Monitoring the Development Process and Inspection of Government Information System and Technology: a Case Study in Thailand . . 29--43 La Anh Tuan and John Debenham Online Tender Evaluation: VietNam Government e-Procurement System . . . . 44--51 Sergiusz Strykowski and Rafa\l Wojciechowski Composable Modeling and Execution of Administrative Procedures . . . . . . . 52--66 Igor T. Hawryszkiewycz A Design Framework for Collaboration in Systems of Systems . . . . . . . . . . . 67--78 Chih-Hui Hsiao and Hui-Chih Wang and Her-Sen Doong A Study of Factors Influencing e-Government Service Acceptance Intention: a Multiple Perspective Approach . . . . . . . . . . . . . . . . 79--87 Thomas Zefferer and Vesna Krnjic Towards User-Friendly e-Government Solutions: Usability Evaluation of Austrian Smart-Card Integration Techniques . . . . . . . . . . . . . . . 88--102 Swapnil Shrivastava and Zia Saquib and Gopinath P. and Peeyush Chomal Unique Identity Enabled Service Delivery through NSDG . . . . . . . . . . . . . . 103--111 Serenella Carota and Flavio Corradini and Damiano Falcioni and Maria Laura Maggiulli FedCohesion: Federated Identity Management in the Marche Region . . . . 112--124 Damiano Falcioni and Andrea Polini and Alberto Polzonetti and Barbara Re Livelock and Deadlock Detection for PA Inter-organizational Business Processes 125--139 Laura González and Raúl Ruggia and Jorge Abin and Guzmán Llambías and Raquel Sosa and Bruno Rienzi A Service-Oriented Integration Platform to Support a Joined-Up E-Government Approach: The Uruguayan Experience . . . 140--154 José Félix Muñoz and Carlos Bobed and Francisco Serón Modeling Administrative Procedures to Improve Information to the Public . . . 155--169 John Debenham and Simeon Simoff The Co-Creation Machine: Managing Co-Creative Processes for the Crowd . . 170--177 Artur Afonso Sousa and Pedro Agante and Luís Borges Gouveia A Worked Proposal on eParticipation for State Wide Elections . . . . . . . . . . 178--190 Sergey Ablameyko and Nikolai Kalosha and Sergey Bratchenya and Vitali Lipen Test Implementation of the ``Guarantor'' Internet Voting System: Design Principles, Operation, and Approbation 191--201 Katalin Ternai and Ildikó Szabó EBEST Platform Supporting SMEs to Manage Supply Chain and Collaborate . . . . . . 202--215 Ourania Hatzi and Mara Nikolaidou and Panagiotis Katsivelis-Perakis and Valentino Hudhra Using Social Network Technology to Provide e-Administration Services as Collaborative Tasks . . . . . . . . . . 216--230 Sangin Park and Yeontai Choi and Dukyun Hwang and Miyon Paek Do Different Types of SNS Have Different Impacts on Participatory Social Capital? 231--241 Anonymous Front Matter . . . . . . . . . . . . . . ??
Tadayuki Matsumura and Tetsuya Yamada IT-Cooling Collaborative Control Methods for Battery-Aware IT-Systems Targeting India . . . . . . . . . . . . . . . . . 1--17 Afef Denguir and François Trousset and Jacky Montmain Research for IT Driven Energy Efficiency Based on a Multidimensional Comfort Control$^*$ . . . . . . . . . . . . . . 18--32 Deb Polson and Cassandra Selin The ECOS Green Buildings Project: Data Dramatization, Visualization and Manipulation . . . . . . . . . . . . . . 33--43 Hallgeir Lien and Lasse Natvig and Abdullah Al Hasib and Jan Christian Meyer Case Studies of Multi-core Energy Efficiency in Task Based Programs . . . 44--54 José I. Aliaga and Manuel F. Dolz and Alberto F. Martín and Rafael Mayo Leveraging Task-Parallelism in Energy-Efficient ILU Preconditioners . . 55--63 Saif ul Islam and Jean-Marc Pierson Evaluating Energy Consumption in CDN Servers . . . . . . . . . . . . . . . . 64--78 Alexandre Mello Ferreira and Barbara Pernici and Pierluigi Plebani Green Performance Indicators Aggregation through Composed Weighting System . . . 79--93 Thanh Binh Nguyen and Fabian Wagner and Wolfgang Schoepp EC4MACS --- An Integrated Assessment Toolbox of Well-Established Modeling Tools to Explore the Synergies and Interactions between Climate Change, Air Quality and Other Policy Objectives . . 94--108 Benjamin Bertin and Marian Scuturici and Jean-Marie Pinon and Emmanuel Risler Semantic Modelling of Dependency Relations between Life Cycle Analysis Processes . . . . . . . . . . . . . . . 109--124 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . I--X
Jos C. M. Baeten and Bas Luttik and Paul van Tilburg Turing Meets Milner . . . . . . . . . . 1--20 Gordon D. Plotkin Concurrency and the Algebraic Theory of Effects . . . . . . . . . . . . . . . . 21--22 Brian Randell A Turing Enigma . . . . . . . . . . . . 23--36 Peter Sewell False Concurrency and Strange-but-True Machines . . . . . . . . . . . . . . . . 37--38 Béatrice Bérard and Serge Haddad and Mathieu Sassolas and Nathalie Sznajder Concurrent Games on VASS with Inhibition 39--52 Wojciech Czerwi\'nski and Piotr Hofman and S\lawomir Lasota Reachability Problem for Weak Multi-Pushdown Automata . . . . . . . . 53--68 Nengkun Yu and Mingsheng Ying Reachability and Termination Analysis of Concurrent Quantum Programs . . . . . . 69--83 Guy Avni and Orna Kupferman Making Weighted Containment Feasible: a Heuristic Based on Simulation and Abstraction . . . . . . . . . . . . . . 84--99 Sandie Balaguer and Thomas Chatain Avoiding Shared Clocks in Networks of Timed Automata . . . . . . . . . . . . . 100--114 Krishnendu Chatterjee and Mickael Randour and Jean-François Raskin Strategy Synthesis for Multi-Dimensional Quantitative Objectives . . . . . . . . 115--131 Emmanuel Filiot and Raffaella Gentilini and Jean-François Raskin Quantitative Languages Defined by Functional Automata . . . . . . . . . . 132--146 Romain Brenguier and Stefan Göller and Ocan Sankur A Comparison of Succinctly Represented Finite-State Systems . . . . . . . . . . 147--161 Antti Valmari All Linear-Time Congruences for Familiar Operators Part 2: Infinite LTSs . . . . 162--176 Arnaud Da Costa and François Laroussinie and Nicolas Markey Quantified CTL: Expressiveness and Model Checking . . . . . . . . . . . . . . . . 177--192 Fabio Mogavero and Aniello Murano and Giuseppe Perelli and Moshe Y. Vardi What Makes Atl* Decidable? A Decidable Fragment of Strategy Logic . . . . . . . 193--208 Tzu-Chun Chen and Kohei Honda Specifying Stateful Asynchronous Properties for Distributed Programs . . 209--224 Julien Lange and Emilio Tuosto Synthesising Choreographies from Local Session Types . . . . . . . . . . . . . 225--239 Fides Aarts and Faranak Heidarian and Frits Vaandrager A Theory of History Dependent Abstractions for Learning Interface Automata . . . . . . . . . . . . . . . . 240--255 Alexey Gotsman and Hongseok Yang Linearizability with Ownership Transfer 256--271 Romain Demangeon and Kohei Honda Nested Protocols in Session Types . . . 272--286 Anonymous Front Matter . . . . . . . . . . . . . . ??
Thomas Ågotnes and Hans van Ditmarsch Coalitional Public Announcement Games 1--15 Jianye Hao and Songzheng Song and Yang Liu and Jun Sun and Lin Gui and Jin Song Dong and Ho-fung Leung Probabilistic Model Checking Multi-agent Behaviors in Dispersion Games Using Counter Abstraction . . . . . . . . . . 16--30 Koen V. Hindriks Debugging Is Explaining . . . . . . . . 31--45 Jianye Hao and Ho-fung Leung An Efficient Negotiation Protocol to Achieve Socially Optimal Allocation . . 46--60 Ayman Ghoneim Reassignment-Based Strategy-Proof Mechanisms for Interdependent Task Allocation . . . . . . . . . . . . . . . 61--76 Yingqian Zhang and Sicco Verwer Mechanism for Robust Procurements . . . 77--91 Cyril Poulet and Vincent Corruble and Amal El Fallah Seghrouchni Auction-Based Strategies for the Open-System Patrolling Task . . . . . . 92--106 Gerrit Anders and Florian Siefert and Jan-Philipp Steghöfer and Wolfgang Reif A Decentralized Multi-agent Algorithm for the Set Partitioning Problem . . . . 107--121 Dai Hamada and Toshiharu Sugawara Two-Sided Parameter Learning of Role Selections for Efficient Team Formation 122--136 Toshihiro Matsui and Marius Silaghi and Katsutoshi Hirayama and Makoto Yokoo and Hiroshi Matsuo Distributed Search Method with Bounded Cost Vectors on Multiple Objective DCOPs 137--152 Feyza Merve Hafìzo\uglu and Sandip Sen Analysis of Opinion Spread through Migration and Adoption in Agent Communities . . . . . . . . . . . . . . 153--167 Bastin Tony Roy Savarimuthu and Lam-Son Lê and Aditya Ghose From Green Norms to Policies --- Combining Bottom-Up and Top-Down Approaches . . . . . . . . . . . . . . . 168--183 Han Yu and Zhiqi Shen and Bo An An Adaptive Witness Selection Method for Reputation-Based Trust Models . . . . . 184--198 Jeremy Pitt and Julia Schaumeier Provision and Appropriation of Common-Pool Resources without Full Disclosure . . . . . . . . . . . . . . . 199--213 Takayuki Ito and Ryo Kanamori and Jun Takahashi and Ivan Marsa Maestre and Enrique de la Hoz Effect of Anticipatory Stigmergy on Decentralized Traffic Congestion Control 214--227 Viet Xuan Truong and Hiep Xuan Huynh and Minh Ngoc Le and Alexis Drogoul Modeling a Surveillance Network Based on Unit Disk Graph Technique --- Application for Monitoring the Invasion of Insects in Mekong Delta Region . . . 228--242 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Andrea Asperti and Wilmer Ricciotti Formalizing Turing Machines . . . . . . 1--25 Ekaterina Fokina and Sy Friedman and André Nies Equivalence Relations That Are $\Sigma^0_3$ Complete for Computable Reducibility . . . . . . . . . . . . . . 26--33 Laura Kallmeyer and Rainer Osswald An Analysis of Directed Motion Expressions with Lexicalized Tree Adjoining Grammars and Frame Semantics 34--55 George Metcalfe Admissible Rules: From Characterizations to Applications . . . . . . . . . . . . 56--69 Volker Diekert and Anca Muscholl On Distributed Monitoring of Asynchronous Systems . . . . . . . . . . 70--84 Nicole Schweikardt On the Expressive Power of Logics with Invariant Uses of Arithmetic Predicates 85--87 Peter Selinger Logical Methods in Quantum Information Theory . . . . . . . . . . . . . . . . . 88--88 Hans van Ditmarsch Quantifying Notes . . . . . . . . . . . 89--109 Sergio Abriola and Santiago Figueira and Gabriel Senno Linearizing Bad Sequences: Upper Bounds for the Product and Majoring Well Quasi-orders . . . . . . . . . . . . . . 110--126 Benedikt Ahrens Initiality for Typed Syntax and Semantics . . . . . . . . . . . . . . . 127--141 Carlos Areces and Raul Fervari and Guillaume Hoffmann Moving Arrows and Four Model Checking Results . . . . . . . . . . . . . . . . 142--153 Paolo Baldi and Agata Ciabattoni and Lara Spendier Standard Completeness for Extensions of MTL: An Automated Approach . . . . . . . 154--167 Alexandru Baltag and Bryan Renne and Sonja Smets The Logic of Justified Belief Change, Soft Evidence and Defeasible Knowledge 168--190 Nick Bezhanishvili and Clemens Kupke and Prakash Panangaden Minimization via Duality . . . . . . . . 191--205 Claudio Callejas and João Marcos and Benjamín René Callejas Bedregal On Some Subclasses of the Fodor--Roubens Fuzzy Bi-implication . . . . . . . . . . 206--215 Alejandro Díaz-Caro and Barbara Petit Linearity in the Non-deterministic Call-by-Value Setting . . . . . . . . . 216--231 Amin Farjudian Polynomial-Time Solution of Initial Value Problems Using Polynomial Enclosures . . . . . . . . . . . . . . . 232--245 Willem L. Fouché Algorithmic Randomness and Ramsey Properties of Countable Homogeneous Structures . . . . . . . . . . . . . . . 246--256 Sebastian Link Propositional Reasoning about Saturated Conditional Probabilistic Independence 257--267 Márcio M. Ribeiro and Marcelo E. Coniglio Contracting Logics . . . . . . . . . . . 268--281 Anonymous Front Matter . . . . . . . . . . . . . . ??
AbdulRahman A. Al-Sewari and Kamal Z. Zamli Constraints Dependent T-Way Test Suite Generation Using Harmony Search Strategy 1--11 Siti Hajar Othman and Ghassan Beydoun Evaluating Disaster Management Knowledge Model by Using a Frequency-Based Selection Technique . . . . . . . . . . 12--27 Fengqi An and Xiongcai Cai and Arcot Sowmya Perceptual Evaluation of Automatic $2.5$D Cartoon Modelling . . . . . . . . 28--42 Nader Hanna and Deborah Richards and Michael J. Jacobson Automatic Acquisition of User Models of Interaction to Evaluate the Usability of Virtual Environments . . . . . . . . . . 43--57 Zhao Chen and Md. Sumon Shahriar and Byeong Ho Kang User-Centric Recommendation-Based Approximate Information Retrieval from Marine Sensor Data . . . . . . . . . . . 58--72 Ana Ximena Halabi Echeverry and Deborah Richards Addressing Challenges for Knowledge Discovery from Data in the Domain of Seaport Integration . . . . . . . . . . 73--85 Chuen Tse Kuah and Kuan Yew Wong Data Envelopment Analysis for Evaluating Knowledge Acquisition and Creation . . . 86--93 Dung T. Ho and Tru H. Cao A High-Order Hidden Markov Model for Emotion Detection from Textual Data . . 94--105 Norshuhani Zamin and Alan Oxley and Zainab Abu Bakar and Syed Ahmad Farhan A Lazy Man's Way to Part-of-Speech Tagging . . . . . . . . . . . . . . . . 106--117 Filippo Galgani and Paul Compton and Achim Hoffmann Knowledge Acquisition for Categorization of Legal Case Reports . . . . . . . . . 118--132 Kyohei Ishikawa and Hayato Ohwada Extraction of How-to Type Question-Answering Sentences Using Query Sets . . . . . . . . . . . . . . . . . . 133--139 Ahmed Boulemden and Yamina Tlili Image Indexing and Retrieval with Pachinko Allocation Model: Application on Local and Global Features . . . . . . 140--146 Andrei Kelarev and Richard Dazeley and Andrew Stranieri and John Yearwood and Herbert Jelinek Detection of CAN by Ensemble Classifiers Based on Ripple Down Rules . . . . . . . 147--159 Myung Hee Kim and Paul Compton Improving Open Information Extraction for Informal Web Documents with Ripple-Down Rules . . . . . . . . . . . 160--174 Yang Sok Kim and Paul Compton and Byeong Ho Kang Ripple-Down Rules with Censored Production Rules . . . . . . . . . . . . 175--187 Omaru Maruatona and Peter Vamplew and Richard Dazeley RM and RDM, a Preliminary Evaluation of Two Prudent RDR Techniques . . . . . . . 188--194 Karen Ang and Ethel Ong Planning Children's Stories Using Agent Models . . . . . . . . . . . . . . . . . 195--208 Nader Hanna and Deborah Richards A Framework for a Multi-agent Collaborative Virtual Learning Environment (MACVILLE) Based on Activity Theory . . . . . . . . . . . . . . . . . 209--220 Shahrinaz Ismail and Mohd Sharifuddin Ahmad Emergence of Personal Knowledge Management Processes within Multi-agent Roles . . . . . . . . . . . . . . . . . 221--228 Amara Atif and Peter Busch and Deborah Richards Towards an Ontology-Based Approach to Knowledge Management of Graduate Attributes in Higher Education . . . . . 229--243 Anonymous Front Matter . . . . . . . . . . . . . . ??
Hiroaki Kitano Systems Biology Powered by Artificial Intelligence . . . . . . . . . . . . . . 1--1 Francesca Rossi Preference Reasoning and Aggregation: Between AI and Social Choice . . . . . . 2--2 Shantanu Chakraborty and Takayuki Ito and Tomonobu Senjyu Economical Operation of Thermal Generating Units Integrated with Smart Houses . . . . . . . . . . . . . . . . . 3--14 Mahsa Chitsaz and Kewen Wang and Michael Blumenstein and Guilin Qi Concept Learning for ${\cal EL}^{++}$ by Refinement and Reinforcement . . . . . . 15--26 Maike Erdmann and Duc Dung Nguyen and Tomoya Takeyoshi and Gen Hattori and Kazunori Matsumoto Hierarchical Training of Multiple SVMs for Personalized Web Filtering . . . . . 27--39 Filippo Galgani and Paul Compton and Achim Hoffmann Citation Based Summarisation of Legal Texts . . . . . . . . . . . . . . . . . 40--52 Gaopeng Gou and Di Huang and Yunhong Wang A Novel Video Face Clustering Algorithm Based on Divide and Conquer Strategy . . 53--63 Gaopeng Gou and Di Huang and Yunhong Wang A Hybrid Local Feature for Face Recognition . . . . . . . . . . . . . . 64--75 Miha Gr\vcar and Vid Podpe\vcan and Borut Sluban and Igor Mozeti\vc Ontology Querying Support in Semantic Annotation Process . . . . . . . . . . . 76--87 Jianye Hao and Ho-fung Leung Learning to Achieve Socially Optimal Solutions in General-Sum Games . . . . . 88--99 Jianye Hao and Ho-fung Leung Incorporating Fairness into Agent Interactions Modeled as Two-Player Normal-Form Games . . . . . . . . . . . 100--111 Jijian Huang and Hui Xue and Yuqing Zhai Semi-Supervised Discriminatively Regularized Classifier with Pairwise Constraints . . . . . . . . . . . . . . 112--123 Jihye Hwang and Kyung-tai Kim and Eun Yi Kim Outdoor Situation Recognition Using Support Vector Machine for the Blind and the Visually Impaired . . . . . . . . . 124--132 Akihiro Inokuchi and Ayumu Yamaoka and Takashi Washio and Yuji Matsumoto and Masayuki Asahara Mining Rules for Rewriting States in a Transition-Based Dependency Parser . . . 133--145 Takayuki Ito and Ryo Kanamori and Jun Takahashi and Iván Marsa Maestre and Enrique de la Hoz The Comparison of Stigmergy Strategies for Decentralized Traffic Congestion Control: Preliminary Results . . . . . . 146--156 Yusuke Iwasawa and Ikuko Eguchi Yairi Life-Logging of Wheelchair Driving on Web Maps for Visualizing Potential Accidents and Incidents . . . . . . . . 157--169 Hamid A. Jalab and Rabha W. Ibrahim Texture Feature Extraction Based on Fractional Mask Convolution with Cesáro Means for Content-Based Image Retrieval 170--179 Yifan Jin and Kewen Wang and Lian Wen Possibilistic Reasoning in Multi-Context Systems: Preliminary Report . . . . . . 180--193 Kye-Sung Kim and Su-Jeong Choi and Seong-Bae Park and Sang-Jo Lee A Two-Step Zero Pronoun Resolution by Reducing Candidate Cardinality . . . . . 194--205 Yang Sok Kim and Alfred Krzywicki and Wayne Wobcke and Ashesh Mahidadia and Paul Compton Hybrid Techniques to Address Cold Start Problems for People to People Recommendation in Social Networks . . . 206--217 Anonymous Front Matter . . . . . . . . . . . . . . ??
Elli Fragkaki and Lujo Bauer and Limin Jia and David Swasey Modeling and Enhancing Android's Permission System . . . . . . . . . . . 1--18 James Kelley and Roberto Tamassia and Nikos Triandopoulos Hardening Access Control and Data Protection in GFS-like File Systems . . 19--36 Jonathan Crussell and Clint Gibler and Hao Chen Attack of the Clones: Detecting Cloned Applications on Android Markets . . . . 37--54 Arnar Birgisson and Daniel Hedin and Andrei Sabelfeld Boosting the Permissiveness of Dynamic Information-Flow Tracking by Testing . . 55--72 Serdar Erbatur and Santiago Escobar and Deepak Kapur and Zhiqiang Liu and Christopher Lynch Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions . . 73--90 Henning Schnoor Deciding Epistemic and Strategic Properties of Cryptographic Protocols 91--108 Arif Akram Khan and Philip W. L. Fong Satisfiability and Feasibility in a Relationship-Based Workflow Authorization Model . . . . . . . . . . 109--126 Sebastian Mödersheim Deciding Security for a Fragment of ASLan . . . . . . . . . . . . . . . . . 127--144 Massimiliano Albanese and Alessandra De Benedictis and Sushil Jajodia and Paulo Shakarian A Probabilistic Framework for Localization of Attackers in MANETs . . 145--162 Ruben Rios and Jorge Cuellar and Javier Lopez Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN . . . . . . . . . . . . . . . . . 163--180 Adam J. Aviv and Micah Sherr and Matt Blaze and Jonathan M. Smith Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks . . . . . . . . . . . . . . . . 181--198 Italo Dacosta and Mustaque Ahamad and Patrick Traynor Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties . . . . . . . . . . . . . 199--216 Ralph Holz and Thomas Riedmaier and Nils Kammenhuber and Georg Carle X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle 217--234 Simon Eberz and Martin Strohmeier and Matthias Wilhelm and Ivan Martinovic A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols 235--252 Ahmad-Reza Sadeghi and Steffen Schulz and Vijay Varadharajan The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs . . . 253--270 Amir Herzberg and Haya Shulman Security of Patched DNS . . . . . . . . 271--288 Qijun Gu and Kyle Jones and Wanyu Zang and Meng Yu and Peng Liu Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach . . . . . . . . . . . . . . . . 289--306 Mishari Almishari and Gene Tsudik Exploring Linkability of User Reviews 307--324 Naipeng Dong and Hugo Jonker and Jun Pang Formal Analysis of Privacy in an eHealth Protocol . . . . . . . . . . . . . . . . 325--342 Jinkyu Koo and Xiaojun Lin and Saurabh Bagchi PRIVATUS: Wallet-Friendly Privacy Protection for Smart Meters . . . . . . 343--360 Anonymous Front Matter . . . . . . . . . . . . . . ??
Gilles Barthe and Benjamin Grégoire and Santiago Zanella Béguelin Computer-Aided Cryptographic Proofs . . 1--2 Dino Distefano A Voyage to the Deep-Heap . . . . . . . 3--3 Shriram Krishnamurthi Semantics and Analyses for JavaScript and the Web . . . . . . . . . . . . . . 4--4 Jonathan K. Lee and Jens Palsberg and Rupak Majumdar and Hong Hong Efficient May Happen in Parallel Analysis for Async-Finish Parallelism 5--23 Eric Goubault and Sylvie Putot and Franck Védrine Modular Static Analysis with Zonotopes 24--40 Jacob M. Howe and Andy King Polyhedral Analysis Using Parametric Objectives . . . . . . . . . . . . . . . 41--57 David Cachera and Thomas Jensen and Arnaud Jobin and Florent Kirchner Inference of Polynomial Invariants for Imperative Programs: a Farewell to Gröbner Bases . . . . . . . . . . . . . . 58--74 Arnault Ioualalen and Matthieu Martel A New Abstract Domain for the Representation of Mathematically Equivalent Expressions . . . . . . . . . 75--93 Tie Cheng and Xavier Rival An Abstract Domain to Infer Types over Zones in Spreadsheets . . . . . . . . . 94--110 Aditya Thakur and Matt Elder and Thomas Reps Bilateral Algorithms for Symbolic Abstraction . . . . . . . . . . . . . . 111--128 Roberto Giacobazzi and Isabella Mastroeni Making Abstract Interpretation Incomplete: Modeling the Potency of Obfuscation . . . . . . . . . . . . . . 129--145 Alejandro Sanchez and Sriram Sankaranarayanan and César Sánchez and Bor-Yuh Evan Chang Invariant Generation for Parametrized Systems Using Self-reflection . . . . . 146--163 Parosh Aziz Abdulla and Mohamed Faouzi Atig and Yu-Fang Chen and Carl Leonardsson and Ahmed Rezine Automatic Fence Insertion in Integer Programs via Predicate Abstraction . . . 164--180 Peter Calvert and Alan Mycroft Control Flow Analysis for the Join Calculus . . . . . . . . . . . . . . . . 181--197 Nicolas Halbwachs and Julien Henry When the Decreasing Sequence Fails . . . 198--213 Sebastian Biallas and Jörg Brauer and Andy King and Stefan Kowalewski Loop Leaping with Closures . . . . . . . 214--230 Joxan Jaffar and Vijayaraghavan Murali and Jorge A. Navas and Andrew E. Santosa Path-Sensitive Backward Slicing . . . . 231--247 Dimitra Giannakopoulou and Zvonimir Rakamari\'c and Vishwanath Raman Symbolic Learning of Component Interfaces . . . . . . . . . . . . . . . 248--264 Uday P. Khedker and Alan Mycroft and Prashant Singh Rawat Liveness-Based Pointer Analysis . . . . 265--282 Julien Henry and David Monniaux and Matthieu Moy Succinct Representations for Abstract Interpretation . . . . . . . . . . . . . 283--299 Anonymous Front Matter . . . . . . . . . . . . . . ??
Oliver Kramer A Particle Swarm Embedding Algorithm for Nonlinear Dimensionality Reduction . . . 1--12 Khalid M. Salama and Alex A. Freitas ABC-Miner: An Ant-Based Bayesian Classification Algorithm . . . . . . . . 13--24 Mieke Massink and Manuele Brambilla and Diego Latella and Marco Dorigo and Mauro Birattari Analysing Robot Swarm Decision-Making with Bio-PEPA . . . . . . . . . . . . . 25--36 Leonardo C. T. Bezerra and Manuel López-Ibáñez and Thomas Stützle Automatic Generation of Multi-objective ACO Algorithms for the Bi-objective Knapsack . . . . . . . . . . . . . . . . 37--48 Mohammad Majid al-Rifaie and Tim Blackwell Bare Bones Particle Swarms with Jumps 49--60 Sergi Mateo and Christian Blum and Pascal Fua and Engin Türetgen Hybrid Algorithms for the Minimum-Weight Rooted Arborescence Problem . . . . . . 61--72 Matthew Medland and Fernando E. B. Otero and Alex A. Freitas Improving the cAnt-Miner$_{PB}$ Classification Algorithm . . . . . . . . 73--84 Jorge Gomes and Paulo Urbano and Anders Lyhne Christensen Introducing Novelty Search in Evolutionary Swarm Robotics . . . . . . 85--96 Adiel Ismail and Andries P. Engelbrecht Measuring Diversity in the Cooperative Particle Swarm Optimizer . . . . . . . . 97--108 Giovanni Pini and Arne Brutschy and Gianpiero Francesca and Marco Dorigo and Mauro Birattari Multi-armed Bandit Formulation of the Task Partitioning Problem in Swarm Robotics . . . . . . . . . . . . . . . . 109--120 Barend J. Leonard and Andries P. Engelbrecht Scalability Study of Particle Swarm Optimizers in Dynamic Environments . . . 121--132 Lachlan Murray and Jon Timmis and Andy Tyrrell Self-reconfigurable Modular e-pucks . . 133--144 James Worcester and M. Ani Hsieh Task Partitioning via Ant Colony Optimization for Distributed Assembly 145--155 Adiel Ismail and Andries P. Engelbrecht The Self-adaptive Comprehensive Learning Particle Swarm Optimizer . . . . . . . . 156--167 Heiko Hamann Towards Swarm Calculus: Universal Properties of Swarm Performance and Collective Decisions . . . . . . . . . . 168--179 Yannis Marinakis and Magdalene Marinaki A Hybrid Particle Swarm Optimization Algorithm for the Open Vehicle Routing Problem . . . . . . . . . . . . . . . . 180--187 Filipe V. Nepomuceno and Andries P. Engelbrecht A Self-adaptive Heterogeneous PSO Inspired by Ants . . . . . . . . . . . . 188--195 Yotam Elor and Alfred M. Bruckstein A ``Thermodynamic'' Approach to Multi-robot Cooperative Localization with Noisy Sensors . . . . . . . . . . . 196--203 Dong Do Duc and Huy Q. Dinh and Thanh Hai Dang and Kris Laukens and Xuan Huan Hoang AcoSeeD: An Ant Colony Optimization for Finding Optimal Spaced Seeds in Biological Sequence Search . . . . . . . 204--211 Rui Fang and Zequn Huang and Louis Rossi and Chien-Chung Shen Analysis of Ant-Based Routing with Wireless Medium Access Control . . . . . 212--219 Anonymous Front Matter . . . . . . . . . . . . . . ??
Abhinav Srivastava and Himanshu Raj and Jonathon Giffin and Paul England Trusted VM Snapshots in Untrusted Cloud Infrastructures . . . . . . . . . . . . 1--21 Martim Carbone and Matthew Conover and Bruce Montague and Wenke Lee Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection . . . . . . . . . . . . . 22--41 Shengzhi Zhang and Peng Liu Assessing the Trustworthiness of Drivers 42--63 Olivier Thonnard and Leyla Bilge and Gavin O'Gorman and Seán Kiernan and Martin Lee Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat 64--85 Victor van der Veen and Nitish dutt-Sharma and Lorenzo Cavallaro and Herbert Bos Memory Errors: The Past, the Present, and the Future . . . . . . . . . . . . . 86--106 Dongkyun Ahn and Gyungho Lee A Memory Access Validation Scheme against Payload Injection Attacks . . . 107--126 Jennifer Mankin and David Kaeli Dione: a Flexible Disk Monitoring and Analysis Framework . . . . . . . . . . . 127--146 Zhi Xu and Hungyuan Hsu and Xin Chen and Sencun Zhu and Ali R. Hurson AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks . . . . . . . . . . . . . . . . 147--168 Tobias Lauinger and Engin Kirda and Pietro Michiardi Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes . . . . . . . . . . . . . . . . 169--189 Samuel Marchal and Jérôme François and Radu State and Thomas Engel Proactive Discovery of Phishing Related Domain Names . . . . . . . . . . . . . . 190--209 Daisuke Mashima and Alvaro A. Cárdenas Evaluating Electricity Theft Detectors in Smart Grid Networks . . . . . . . . . 210--229 Jialong Zhang and Chao Yang and Zhaoyan Xu and Guofei Gu PoisonAmplifier: a Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks . . . 230--253 Sebastian Lekies and Nick Nikiforakis and Walter Tighzert and Frank Piessens and Martin Johns DEMACRO: Defense against Malicious Cross-Domain Requests . . . . . . . . . 254--273 Timon Van Overveldt and Christopher Kruegel and Giovanni Vigna FlashDetect: ActionScript 3 Malware Detection . . . . . . . . . . . . . . . 274--293 Jie Chu and Zihui Ge and Richard Huber and Ping Ji and Jennifer Yates and Yung-Chao Yu ALERT-ID: Analyze Logs of the Network Element in Real Time for Intrusion Detection . . . . . . . . . . . . . . . 294--313 Bernhard Amann and Robin Sommer and Aashish Sharma and Seth Hall A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence . . . . . . . . . . . . . . 314--333 Victor C. Valgenti and Jatin Chhugani and Yan Sun and Nadathur Satish and Min Sik Kim and Changkyu Kim GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose Processors . . . . . . . . . . . . . . . 334--353 Dina Had\vziosmanovi\'c and Lorenzo Simionato and Damiano Bolzoni and Emmanuele Zambon $N$-Gram against the Machine: On the Feasibility of the $N$-Gram Network Analysis for Binary Protocols . . . . . 354--373 Shah Mahmood and Yvo Desmedt Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract) 374--375 Cui Xiang and Shi Jinqiao and Liao Peng and Liu Chaoge The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract) . . . . . . . . . . . . . . . 376--377 Anonymous Front Matter . . . . . . . . . . . . . . ??
Alper Aydemir and Erik Järleberg and Samuel Prentice and Patric Jensfelt Predicting What Lies Ahead in the Topology of Indoor Environments . . . . 1--16 Zoltan-Csaba Marton and Ferenc Balint-Benczedi and Florian Seidel Object Categorization in Clutter Using Additive Features and Hashing of Part-Graph Descriptors . . . . . . . . . 17--33 Richard Bormann and Jan Fischer and Georg Arbeiter and Alexander Verl Efficient Object Categorization with the Surface-Approximation Polynomials Descriptor . . . . . . . . . . . . . . . 34--53 Nikos Mitsou and Roderick de Nijs and David Lenz and Johannes Frimberger Online Semantic Mapping of Urban Environments . . . . . . . . . . . . . . 54--73 Torsten Fiolka and Jörg Stückler and Dominik A. Klein and Dirk Schulz SURE: Surface Entropy for Distinctive $3$D Features . . . . . . . . . . . . . 74--93 Paloma de la Puente and Andrea Censi Dense Map Inference with User-Defined Priors: From Priorlets to Scan Eigenvariations . . . . . . . . . . . . 94--113 Georg Arbeiter and Richard Bormann and Jan Fischer and Martin Hägele Towards Geometric Mapping for Semi-autonomous Mobile Robots . . . . . 114--127 Christoph Hertzberg and René Wagner and Udo Frese Tutorial on Quick and Easy Model Fitting Using the SLoM Framework . . . . . . . . 128--142 Bernhard E. Riecke Are Left-Right Hemisphere Errors in Point-to-Origin Tasks in VR Caused by Failure to Incorporate Heading Changes? 143--162 Nicholas A. Giudice and Hengshan Li The Effects of Visual Granularity on Indoor Spatial Learning Assisted by Mobile $3$D Information Displays . . . . 163--172 Stefanie Pietsch and Petra Jansen The Relationship between Coordination Skill and Mental Rotation Ability . . . 173--181 Alexia Galati and Marios N. Avraamides Collaborating in Spatial Tasks: Partners Adapt the Perspective of Their Descriptions, Coordination Strategies, and Memory Representations . . . . . . . 182--195 Linsey A. Smith and Dedre Gentner Using Spatial Analogy to Facilitate Graph Learning . . . . . . . . . . . . . 196--209 Eva Neidhardt and Michael Popp Activity Effects on Path Integration Tasks for Children in Different Environments . . . . . . . . . . . . . . 210--219 Sarah Neuburger and Vera Heuser and Petra Jansen and Claudia Quaiser-Pohl Influence of Rotational Axis and Gender-Stereotypical Nature of Rotation Stimuli on the Mental-Rotation Performance of Male and Female Fifth Graders . . . . . . . . . . . . . . . . 220--229 Sander Lestrade and Nina Reshöft Towards a Revision of the Typology of Motion Verbs . . . . . . . . . . . . . . 230--241 Alexander Klippel and Jinlong Yang and Jan Oliver Wallgrün and Frank Dylla Assessing Similarities of Qualitative Spatio-temporal Relations . . . . . . . 242--261 Chiara Meneghetti and Francesca Pazzaglia and Rossana De Beni The Mental Representation Derived from Spatial Descriptions is North-Up Oriented: The Role of Visuo-spatial Abilities . . . . . . . . . . . . . . . 262--278 Thora Tenbrink and Marco Ragni Linguistic Principles for Spatial Relational Reasoning . . . . . . . . . . 279--298 Kris Lohmann and Christopher Habel Extended Verbal Assistance Facilitates Knowledge Acquisition of Virtual Tactile Maps . . . . . . . . . . . . . . . . . . 299--318 Anonymous Front Matter . . . . . . . . . . . . . . ??
Georg Gottlob and Marco Manna and Michael Morak On the Complexity of Ontological Reasoning under Disjunctive Existential Rules . . . . . . . . . . . . . . . . . 1--18 Christian Komusiewicz New Races in Parameterized Algorithmics 19--30 Antonino Salibra Scott Is Always Simple . . . . . . . . . 31--45 Nicole Schweikardt A Toolkit for Proving Limitations of the Expressive Power of Logics . . . . . . . 46--47 Esko Ukkonen How to Reconstruct a Genome . . . . . . 48--48 Igor Walukiewicz Simple Models for Recursive Schemes . . 49--60 Gerhard J. Woeginger Transportation under Nasty Side Constraints . . . . . . . . . . . . . . 61--62 Mihalis Yannakakis Computation of Least Fixed Points . . . 63--63 Lauri Ahlroth and Pekka Orponen Unordered Constraint Satisfaction Games 64--75 Tatsuya Akutsu and Takeyuki Tamura A Polynomial-Time Algorithm for Computing the Maximum Common Subgraph of Outerplanar Graphs of Bounded Degree . . 76--87 Eric Allender and Harry Buhrman and Luke Friedman Reductions to the Set of Random Strings: The Resource-Bounded Case . . . . . . . 88--99 Vikraman Arvind and Johannes Köbler Approximate Graph Isomorphism . . . . . 100--111 Vikraman Arvind and Partha Mukhopadhyay Near-Optimal Expanding Generator Sets for Solvable Permutation Groups . . . . 112--123 Eugene Asarin and Nicolas Basset Generating Functions of Timed Languages 124--135 Cristina Bazgan and Morgan Chopin The Robust Set Problem: Parameterized Complexity and Approximation . . . . . . 136--147 Paul C. Bell and Mika Hirvensalo and Igor Potapov Mortality for $2 \times 2$ Matrices Is NP-Hard . . . . . . . . . . . . . . . . 148--159 Dietmar Berwanger and \Lukasz Kaiser Solving Counter Parity Games . . . . . . 160--171 Therese Biedl and Peter Floderus Drawing Planar Graphs on Points Inside a Polygon . . . . . . . . . . . . . . . . 172--183 Davide Bil\`o and Anna Zych New Advances in Reoptimizing the Minimum Steiner Tree Problem . . . . . . . . . . 184--197 Markus Bläser and Bodo Manthey Smoothed Complexity Theory . . . . . . . 198--209 Anonymous Front Matter . . . . . . . . . . . . . . ??
Kristian Beckers and Stefan Eicker and Stephan Faßbender and Maritta Heisel and Holger Schmidt Ontology-Based Identification of Research Gaps and Immature Research Areas . . . . . . . . . . . . . . . . . 1--16 Gerald Bader and Amin Anjomshoaa and A. Min Tjoa A Context-Aware Mashup Integration Guideline for Enterprise 2.0 . . . . . . 17--30 Mostafa Kiani Deh Kiani and Barat Ghobadian and Fathollah Ommi and Gholamhassan Najafi Artificial Neural Networks Approach for the Prediction of Thermal Balance of SI Engine Using Ethanol-Gasoline Blends . . 31--43 Jesús M. Almendros-Jiménez Validation of XML Documents with SWRL 44--57 Theresia Gschwandtner and Johannes Gärtner and Wolfgang Aigner and Silvia Miksch A Taxonomy of Dirty Time-Oriented Data 58--72 Marius Ebel and Martin Hulin Combining Relational and Semi-structured Databases for an Inquiry Application . . 73--84 Martin Gilje Jaatun Hunting for Aardvarks: Can Software Security Be Measured? . . . . . . . . . 85--92 Kristian Beckers and Maritta Heisel A Foundation for Requirements Analysis of Privacy Preserving Software . . . . . 93--107 Andreas Holzinger and Evgenia Popova and Bernhard Peischl and Martina Ziefle On Complexity Reduction of User Interfaces for Safety-Critical Systems 108--122 Martin Gilje Jaatun and Karin Bernsmed and Astrid Undheim Security SLAs --- An Idea Whose Time Has Come? . . . . . . . . . . . . . . . . . 123--130 Aneta Poniszewska-Maranda UML Representation of Extended Role-Based Access Control Model with the Use of Usage Control Concept . . . . . . 131--145 Eckehard Hermann and Udo Litschauer and Jürgen Fuß A Formal Equivalence Classes Based Method for Security Policy Conformance Checking . . . . . . . . . . . . . . . . 146--160 Tanja A\vzderska and Borka Jerman Bla\vzi\vc Trust as an Organismic Trait of E-Commerce Systems . . . . . . . . . . . 161--175 Andreas Holzinger and Peter Treitler and Wolfgang Slany Making Apps Useable on Multiple Different Mobile Platforms: On Interoperability for Business Application Development on Smartphones 176--189 Mersini Paschou and Evangelos Sakkopoulos and Efrosini Sourla and Athanasios Tsakalidis Enhancing Business APPification Using SMS Text Messages: Metrics, Strategies and Alternatives . . . . . . . . . . . . 190--202 Daniele Montanari and Piera Laura Puglisi Near Duplicate Document Detection for Large Information Flows . . . . . . . . 203--217 Pedro Furtado TinyStream Sensors . . . . . . . . . . . 218--232 Hiroshi Sato and Hisashi Kurasawa and Takeru Inoue and Motonori Nakamura and Hajime Matsumura Distributed Sampling Storage for Statistical Analysis of Massive Sensor Data . . . . . . . . . . . . . . . . . . 233--243 Rachid Aknouche and Ounas Asfari and Fadila Bentayeb and Omar Boussaid Integrating Query Context and User Context in an Information Retrieval Model Based on Expanded Language Modeling . . . . . . . . . . . . . . . . 244--258 Guang-Ho Cha Indexing and Search for Fast Music Identification . . . . . . . . . . . . . 259--271 Anonymous Front Matter . . . . . . . . . . . . . . ??
Klaus-Dieter Althoff Case-Based Reasoning and Expert Systems 1--1 Yolanda Gil Reproducibility and Efficiency of Scientific Data Analysis: Scientific Workflows and Case-Based Reasoning . . . 2--2 Mobyen Uddin Ahmed and Peter Funk A Computer Aided System for Post-operative Pain Treatment Combining Knowledge Discovery and Case-Based Reasoning . . . . . . . . . . . . . . . 3--16 Kerstin Bach and Klaus-Dieter Althoff Developing Case-Based Reasoning Applications Using myCBR 3 . . . . . . . 17--31 Alexandra Coman and Héctor Muñoz-Avila Diverse Plan Generation by Plan Adaptation and by First-Principles Planning: a Comparative Study . . . . . 32--46 Sebastian Dieterle and Ralph Bergmann Case-Based Appraisal of Internet Domains 47--61 Ruihai Dong and Markus Schaal Harnessing the Experience Web to Support User-Generated Product Reviews . . . . . 62--76 Valmi Dufour-Lussier and Florence Le Ber Adapting Spatial and Temporal Cases . . 77--91 Gonzalo Flórez-Puga and Guillermo Jiménez-Díaz eCo: Managing a Library of Reusable Behaviours . . . . . . . . . . . . . . . 92--106 Odd Erik Gundersen Toward Measuring the Similarity of Complex Event Sequences in Real-Time . . 107--121 Mario Gómez and Enric Plaza Case-Based Project Scheduling . . . . . 122--136 Julien Henriet and Pierre-Emmanuel Leni Adapting Numerical Representations of Lung Contours Using Case-Based Reasoning and Artificial Neural Networks . . . . . 137--151 Barry Hurley and Barry O'Sullivan Adaptation in a CBR-Based Solver Portfolio for the Satisfiability Problem 152--166 Rupa Jagannathan and Sanja Petrovic A Local Rule-Based Attribute Weighting Scheme for a Case-Based Reasoning System for Radiotherapy Treatment Planning . . 167--181 Ulit Jaidee and Héctor Muñoz-Avila Learning and Reusing Goal-Specific Policies for Goal-Driven Autonomy . . . 182--195 Vahid Jalali and David Leake Custom Accessibility-Based CCBR Question Selection by Ongoing User Classification 196--210 Debarun Kar and Sutanu Chakraborti Feature Weighting and Confidence Based Prediction for Case Based Reasoning Systems . . . . . . . . . . . . . . . . 211--225 Sergio Manzano and Santiago Ontañón A Case-Based Approach to Mutual Adaptation of Taxonomic Ontologies . . . 226--240 David McSherry A Lazy Learning Approach to Explaining Case-Based Reasoning Solutions . . . . . 241--254 Mirjam Minor and Mohd. Siblee Islam Confidence in Workflow Adaptation . . . 255--268 Anonymous Front Matter . . . . . . . . . . . . . . ??
Jean-Paul A. Barth\`es and Alistair Jones Ambiguity in Multimodal Interaction with Multi-touch Multi-user Graphics Tables 1--13 Davide Gazz\`e and Mariantonietta N. La Polla WorkMail: Collaborative Document Workflow Management by Email . . . . . . 14--23 Jang Ho Lee Real-Time Mobile Distance Learning System for Smartphone . . . . . . . . . 24--32 Takashi Aruga and Nobuyoshi Yabuki Cooperative Information Management of Degradation of Structures in Operation and Management . . . . . . . . . . . . . 33--40 Aaron Costin and Nipesh Pradhananga Real-Time Resource Location Tracking in Building Information Models (BIM) . . . 41--48 Nobuyoshi Yabuki and Yuta Ashida Cooperative Integration of Product Model and Sensor Data Model for Knowledge Discovery . . . . . . . . . . . . . . . 49--52 Wojciech Indyk and Tomasz Kajdanowicz Cooperative Decision Making Algorithm for Large Networks Using MapReduce Programming Model . . . . . . . . . . . 53--56 Navid Ahmadi and Mehdi Jazayeri and Monica Landoni Enabling Cooperative Educational Game Design on the Web . . . . . . . . . . . 57--64 Mikhail Fominykh Learning Computer-Mediated Cooperation in $3$D Visualization Projects . . . . . 65--72 Sven Ubik and Ji\vrí Navrátil and Petr \vZejdl Real-Time Stereoscopic Streaming of Medical Surgeries for Collaborative eLearning . . . . . . . . . . . . . . . 73--77 Hugo Sereno Ferreira and Tiago Boldt Sousa Scalable Integration of Multiple Health Sensor Data for Observing Medical Patterns . . . . . . . . . . . . . . . . 78--84 Miguel Garcia and Diana Bri and Jaime Lloret Collaborating Using Intergroup Communications in Group-Based Wireless Sensor Networks: Another Way for Saving Energy . . . . . . . . . . . . . . . . . 85--93 Cong Chen and Kang Zhang and Takayuki Itoh Empirical Evidence of Tags Supporting High-Level Awareness . . . . . . . . . . 94--101 Sylvia Encheva Rough Sets Methods for Working with Uncertainty . . . . . . . . . . . . . . 102--109 Sylvia Encheva and Sharil Tumin Project Proposals Ranking Based on Closed Sets Properties . . . . . . . . . 110--113 Catherine Elsen and Françoise Darses What Do Strokes Teach Us about Collaborative Design? . . . . . . . . . 114--125 Ingeun Yi and Seongki Lee and Sunyoung Jang Communication between Physical and Virtual Models in Designing Smart Buildings . . . . . . . . . . . . . . . 126--133 Yanwei Zhao and Huan Wang and Huanhuan Hong Cased-Based Reasoning Based on Extension Theory for Conflict Resolution in Cooperative Design . . . . . . . . . . . 134--142 Sushardjanti Felasari and Chengzhi Peng The Role of a City's Collective Memory in Supporting Cooperative Urban Design Learning . . . . . . . . . . . . . . . . 143--150 Marina Z. Solesvik and Tatiana Iakovleva Simulation and Optimization in Collaborative Ship Design: Innovative Approach . . . . . . . . . . . . . . . . 151--154 Anonymous Front Matter . . . . . . . . . . . . . . ??
David McGookin and Stephen A. Brewster Understanding Auditory Navigation to Physical Landmarks . . . . . . . . . . . 1--10 Emma Murphy and Camille Moussette and Charles Verron and Catherine Guastavino Supporting Sounds: Design and Evaluation of an Audio-Haptic Interface . . . . . . 11--20 Junlei Yu and Christopher Habel A Haptic-Audio Interface for Acquiring Spatial Knowledge about Apartments . . . 21--30 David Cuartielles and Andreas Göransson and Tony Olsson and Ståle Stenslie Mobile Haptic Technology Development through Artistic Exploration . . . . . . 31--40 Dominik Bial and Thorsten Appelmann and Enrico Rukzio and Albrecht Schmidt Improving Cyclists Training with Tactile Feedback on Feet . . . . . . . . . . . . 41--50 Janko Timmermann and Benjamin Poppinga and Susanne Boll and Wilko Heuten HapticPulse --- Reveal Your Heart Rate in Physical Activities . . . . . . . . . 51--60 Niels C. Nilsson and Rolf Nordahl and Luca Turchet and Stefania Serafin Audio-Haptic Simulation of Walking on Virtual Ground Surfaces to Enhance Realism . . . . . . . . . . . . . . . . 61--70 Johan Kildal Interacting with Deformable User Interfaces: Effect of Material Stiffness and Type of Deformation Gesture . . . . 71--80 Karljohan Lundin Palmerius and Gunnar Höst and Konrad Schönborn An Interactive and Multi-sensory Learning Environment for Nano Education 81--90 Martin Halvey and Michael Henderson and Stephen A. Brewster and Graham Wilson and Stephen A. Hughes Augmenting Media with Thermal Stimulation . . . . . . . . . . . . . . 91--100 Koray Tahiro\uglu and Johan Kildal and Teemu Ahmaniemi and Simon Overstall and Valtteri Wikström Embodied Interactions with Audio-Tactile Virtual Objects in AHNE . . . . . . . . 101--110 Benjamin Poppinga and Martin Pielot and Wilko Heuten and Susanne Boll Towards an Objective Comparison of Scanning-Based Interaction Techniques 111--120 M. Ercan Altinsoy Knocking Sound as Quality Sign for Household Appliances and the Evaluation of the Audio-Haptic Interaction . . . . 121--130 Lorenzo Picinali and Christopher Feakes and Davide A. Mauro and Brian F. G. Katz Spectral Discrimination Thresholds Comparing Audio and Haptics for Complex Stimuli . . . . . . . . . . . . . . . . 131--140 Trevor Hogan and Eva Hornecker How Does Representation Modality Affect User-Experience of Data Artifacts? . . . 141--151 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Oleksiy Mazhelis and Eetu Luoma and Henna Warma Defining an Internet-of-Things Ecosystem 1--14 Seppo Leminen and Mika Westerlund and Mervi Rajahonka and Riikka Siuruainen Towards IOT Ecosystems and Business Models . . . . . . . . . . . . . . . . . 15--26 Andrej Kos and Damijan Pristov and Urban Sedlar and Janez Sterle and Mojca Volk and Toma\vz Vidonja Open and Scalable IoT Platform and Its Applications for Real Time Access Line Monitoring and Alarm Correlation . . . . 27--38 Konstantinos Kotis and Artem Katasonov and Jarkko Leino Aligning Smart and Control Entities in the IoT . . . . . . . . . . . . . . . . 39--50 Andrey Boytsov and Arkady Zaslavsky and Zahraa Abdallah Where Have You Been? Using Location Clustering and Context Awareness to Understand Places of Interest . . . . . 51--62 Dmitry Namiot and Manfred Sneps-Sneppe Where Are They Now --- Safe Location Sharing . . . . . . . . . . . . . . . . 63--74 Ekaterina Dashkova and Andrei Gurtov Survey on Congestion Control Mechanisms for Wireless Sensor Networks . . . . . . 75--85 Vitaly Petrov and Sergey Andreev and Andrey Turlikov and Yevgeni Koucheryavy On IEEE 802.16m Overload Control for Smart Grid Deployments . . . . . . . . . 86--94 Abdelrahman Abuarqoub and Mohammad Hammoudeh and Tariq Alsboui An Overview of Information Extraction from Mobile Wireless Sensor Networks . . 95--106 Mohammadali Heidari Jozam and Erfaneh Allameh and Bauke De Vries and Harry Timmermans VR-Smart Home . . . . . . . . . . . . . 107--118 Oscar Rodríguez Rocha and Luis Javier Suarez-Meza and Boris Moltchanov Smart Space Governing through Service Mashups . . . . . . . . . . . . . . . . 119--127 Yury Korolev and Dmitry Korzun and Ivan Galov Smart Space Applications Integration: a Mediation Formalism and Design for Smart-M3 . . . . . . . . . . . . . . . . 128--139 Alexander Smirnov and Nikolay Shilov and Alexey Kashevnik and Nikolay Teslya Smart Logistic Service for Dynamic Ridesharing . . . . . . . . . . . . . . 140--151 Yves Vanrompay and Yolande Berbers A Methodological Approach to Quality of Future Context for Proactive Smart Systems . . . . . . . . . . . . . . . . 152--163 Natan Blaunstein and Michael Borisovich Sergeev Integration of Advanced LTE Technology and MIMO Network Based on Adaptive Multi-beam Antennas . . . . . . . . . . 164--173 Alexey Khoryaev and Mikhail Shilov and Sergey Panteleev and Andrey Chervyakov and Artyom Lomayev Feasibility Analysis of Dynamic Adjustment of TDD Configurations in Macro-Femto Heterogeneous LTE Networks 174--185 Mikhail Gerasimenko and Sergey Andreev and Yevgeni Koucheryavy and Alexey Trushanin Performance Comparison of System Level Simulators for 3GPP LTE Uplink . . . . . 186--197 Dmitry Petrov and Ilmari Repo and Marko Lampinen Performance of Multiflow Aggregation Scheme for HSDPA with Joint Intra-site Scheduling and in Presence of CQI Imperfections . . . . . . . . . . . . . 198--207 Irina A. Gudkova and Konstantin E. Samouylov Modelling a Radio Admission Control Scheme for Video Telephony Service in Wireless Networks . . . . . . . . . . . 208--215 Wei Liu and Yueyun Chen and Yudong Yao Multi-point Cooperative Fountain Codes Multicast for LTE Cellular System . . . 216--224 Anonymous Front Matter . . . . . . . . . . . . . . ??
Nate Foster and Kazutaka Matsuda and Janis Voigtländer Three Complementary Approaches to Bidirectional Programming . . . . . . . 1--46 Ralf Hinze Generic Programming with Adjunctions . . 47--129 Oleg Kiselyov Typed Tagless Final Interpreters . . . . 130--174 Jeremy G. Siek The C++0x ``Concepts'' Effort . . . . . 175--216 Stephanie Weirich and Chris Casinghino Generic Programming with Dependent Types 217--258 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Surangika Ranathunga and Stephen Cranefield Interfacing a Cognitive Agent Platform with Second Life . . . . . . . . . . . . 1--21 Joost van Oijen and Lo\"\is Vanhée and Frank Dignum CIGA: a Middleware for Intelligent Agents in Virtual Environments . . . . . 22--37 Jakub Gemrot and Cyril Brom and Joanna Bryson How to Compare Usability of Techniques for the Specification of Virtual Agents' Behavior? An Experimental Pilot Study with Human Subjects . . . . . . . . . . 38--62 Edward Chao-Chun Kao and Von-Wun Soo Dialog Designs in Virtual Drama: Balancing Agency and Scripted Dialogs 63--78 Yundong Cai and Zhiqi Shen Learning by Playing in Agent-Oriented Virtual Learning Environment . . . . . . 79--93 Takeo Tsukamoto and Yumi Muroya Collection and Analysis of Multimodal Interaction in Direction-Giving Dialogues: Towards an Automatic Gesture Selection Mechanism for Metaverse Avatars . . . . . . . . . . . . . . . . 94--105 Joost Westra and Frank Dignum and Virginia Dignum Organizing Scalable Adaptation in Serious Games . . . . . . . . . . . . . 106--122 Alex Yu-Hung Chien and Von-Wun Soo Inferring Pragmatics from Dialogue Contexts in Simulated Virtual Agent Games . . . . . . . . . . . . . . . . . 123--138 Sergio Alvarez-Napagao Socially-Aware Emergent Narrative . . . 139--150 Michael Wißner and Wouter Beek and Esther Lozano Increasing Learners' Motivation through Pedagogical Agents: The Cast of Virtual Characters in the DynaLearn ILE . . . . 151--165 Meirav Hadad and Avi Rosenfeld ADAPT: Abstraction Hierarchies to Better Simulate Teamwork under Dynamics . . . . 166--182 Sabrina Campano and Etienne de Sevin An Architecture for Affective Behaviour Based on the Conservation of Resources 183--194 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Jiliang Tang and Xufei Wang and Huan Liu Integrating Social Media Data for Community Detection . . . . . . . . . . 1--20 Martin Atzmueller and Stephan Doerfel Face-to-Face Contacts at a Conference: Dynamics of Communities and Roles . . . 21--39 Philipp Singer and Claudia Wagner Factors Influencing the Co-evolution of Social and Content Networks in Online Social Media . . . . . . . . . . . . . . 40--59 Ursula Redmond and Martin Harrigan Mining Dense Structures to Uncover Anomalous Behaviour in Financial Network Data . . . . . . . . . . . . . . . . . . 60--76 Florian Lemmerich and Martin Atzmueller Describing Locations Using Tags and Images: Explorative Pattern Mining in Social Media . . . . . . . . . . . . . . 77--96 Annalisa Appice and Michelangelo Ceci Learning and Transferring Geographically Weighted Regression Trees across Time 97--117 Pietro Guccione and Annalisa Appice Trend Cluster Based Kriging Interpolation in Sensor Data Networks 118--137 Else Nygren Simulation of User Participation and Interaction in Online Discussion Groups 138--157 Ricardo Tesoriero and Mohamed Bourimi Model-Driven Privacy and Security in Multi-modal Social Media UIs . . . . . . 158--181 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Shan Jianfang and Liu Zongtian A Novel Event Network Matching Algorithm 1--14 Kunpeng Jiang and Huifang Guo and Shengping Zhu and Julong Lan Static Patterns Matching for High Speed Networks . . . . . . . . . . . . . . . . 15--22 Niu Li and Han Xiaoting Information Propagation in Online Social Networks Based on User Behavior . . . . 23--30 Xin Li and Yue-fang Yang Research on Operation and Management of Railway Transport of Dangerous Goods in Third-Party Logistics Enterprises . . . 31--36 Jing Shen and Yusong Du A Password Authentication Scheme against Smart Card Security Breach . . . . . . . 37--44 Bo Han and Qing Wang and Fajiang Yu and Xianda Zhang A Vulnerability Attack Graph Generation Method Based on Scripts . . . . . . . . 45--50 Zailani Abdullah and Tutut Herawan and A. Noraziah and Mustafa Mat Deris DFP-Growth: An Efficient Algorithm for Mining Frequent Patterns in Dynamic Database . . . . . . . . . . . . . . . . 51--58 Xizhe Zhang and Guolong Zhao and Tianyang Lv and Ying Yin and Bin Zhang Analysis on Key Nodes Behavior for Complex Software Network . . . . . . . . 59--66 Junling Ren and Li Zhang Webpage Information Hiding Algorithm Based on Integration of Tags and Data 67--74 Wei Zhu and Ping Sun and Ying nan Ma and Rui Song and Shi wei He and Ke Hui Liu Location Method of Underground Pipeline Monitoring Point Based on Cavity Detection . . . . . . . . . . . . . . . 75--81 Qichun Zhong and Jinghong Hu Research on Purified Internet Environment for College Students . . . . 82--87 Qianmu Li and Qiugan Shi and Jun Hou and Yong Qi and Hong Zhang A Mobile-Certificate Security Method of Satellite-Earth Integration Networks . . 88--97 Wen-Hsing Lai and Siou-Lin Wang Duration Modeling for Emotional Speech 98--103 Hongwei Zhao and Xiao Chen and Wei Huang and Pingping Liu and Lingjiao Ma Research on Image Retrieval Based on Color and Shape Features . . . . . . . . 104--111 Kaihua Wang and Wenxiang Zhang and Zhanji Gui Existence and Simulations of Periodic Solution for Impulsive Predator-Prey System with Stage Structure for the Predator . . . . . . . . . . . . . . . . 112--119 Yan Yan and Kaihua Wang and Zhanji Gui Dynamics and Simulations of Multi-species Competition-Predator System with Impulsive . . . . . . . . . 120--127 Ying Chen and Shaobai Zhang Research on the Distal Supervised Learning Model of Speech Inversion . . . 128--135 Ruei-Chang Chen and Shih-Fong Lee and Yeong-Chau Kuo Low Power Pulse Width Modulation Design for Class D Audio Amplifier Systems . . 136--143 Guan Wei and Lv Yuanhai A New Logic Method for Education Resource Software Guarantee . . . . . . 144--151 Zhenjie Hou and Junsheng Huang and Jianhua Zhang Research on $3$D Object Rounding Photography Systems and Technology . . . 152--158 Anonymous Front Matter . . . . . . . . . . . . . . ??
Laura Leal-Taixé and Gerard Pons-Moll Exploiting Pedestrian Interaction via Global Optimization and Social Behaviors 1--26 Nicolai Schneider and Stefan Gehrig An Evaluation Framework for Stereo-Based Driver Assistance . . . . . . . . . . . 27--51 Sandino Morales and Simon Hermann Real-World Stereo-Analysis Evaluation 52--77 Yoshihiko Mochizuki and Atsushi Imiya Pyramid Transform and Scale-Space Analysis in Image Analysis . . . . . . . 78--109 Ralf Dragon and Michele Fenzi and Wolf Siberski Towards Feature-Based Situation Assessment for Airport Apron Video Surveillance . . . . . . . . . . . . . . 110--130 Yong-Dian Jian and Doru C. Balcan Generalized Subgraph Preconditioners for Large-Scale Bundle Adjustment . . . . . 131--150 Ioannis Brilakis and Fei Dai Achievements and Challenges in Recognizing and Reconstructing Civil Infrastructure . . . . . . . . . . . . . 151--176 Dan Raviv and Alexander M. Bronstein Equi-affine Invariant Geometries of Articulated Objects . . . . . . . . . . 177--190 Torsten Sattler and Bastian Leibe and Leif Kobbelt Towards Fast Image-Based Localization on a City-Scale . . . . . . . . . . . . . . 191--211 Anne Sedlazeck and Reinhard Koch Perspective and Non-perspective Camera Models in Underwater Imaging --- Overview and Error Analysis . . . . . . 212--242 Juergen Gall and Nima Razavi An Introduction to Random Forests for Multi-class Object Detection . . . . . . 243--263 Jan D. Wegner and Bodo Rosenhahn and Uwe Sörgel Segmentation and Classification of Objects with Implicit Scene Context . . 264--284 Helmut Mayer and Jan Bartelsen Dense $3$D Reconstruction from Wide Baseline Image Sets . . . . . . . . . . 285--304 Gerard Pons-Moll and Laura Leal-Taixé Data-Driven Manifolds for Outdoor Motion Capture . . . . . . . . . . . . . . . . 305--328 Daniel Kondermann and Steffen Abraham On Performance Analysis of Optical Flow Algorithms . . . . . . . . . . . . . . . 329--355 Glen Debard and Peter Karsmakers Camera-Based Fall Detection on Real World Data . . . . . . . . . . . . . . . 356--375 Sid Yingze Bao and Silvio Savarese Semantic Structure from Motion: a Novel Framework for Joint Object Recognition and $3$D Reconstruction . . . . . . . . 376--397 Ronny Klowsky and Patrick Mücke Hierarchical Surface Reconstruction from Multi-resolution Point Samples . . . . . 398--418 Ralf Reulke and Dominik Rueß and Kristian Manthey Traffic Observation and Situation Assessment . . . . . . . . . . . . . . . 419--441 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Björn Fröhlich and Erik Rodner and Joachim Denzler As Time Goes by--- Anytime Semantic Segmentation with Iterative Context Forests . . . . . . . . . . . . . . . . 1--10 Georg Zankl and Yll Haxhimusa and Adrian Ion Interactive Labeling of Image Segmentation Hierarchies . . . . . . . . 11--20 Naveen Shankar Nagaraja and Peter Ochs and Kun Liu and Thomas Brox Hierarchy of Localized Random Forests for Video Annotation . . . . . . . . . . 21--30 Coloma Ballester and Lluis Garrido and Vanel Lazcano and Vicent Caselles A TV-L1 Optical Flow Method with Occlusion Detection . . . . . . . . . . 31--40 Alexander Shekhovtsov and Pushmeet Kohli and Carsten Rother Curvature Prior for MRF-Based Segmentation and Shape Inpainting . . . 41--51 Kevin Schelten and Stefan Roth Mean Field for Continuous High-Order MRFs . . . . . . . . . . . . . . . . . . 52--61 Qi Gao and Stefan Roth How Well Do Filter-Based MRFs Model Natural Images? . . . . . . . . . . . . 62--72 Christopher Schroers and Henning Zimmer and Levi Valgaerts and Andrés Bruhn and Oliver Demetz Anisotropic Range Image Integration . . 73--82 Thorsten Schmidt and Margret Keuper and Taras Pasternak and Klaus Palme and Olaf Ronneberger Modeling of Sparsely Sampled Tubular Surfaces Using Coupled Curves . . . . . 83--92 Simon Winkelbach and Jens Spehr and Dirk Buchholz and Markus Rilk and Friedrich M. Wahl Shape (Self-)Similarity and Dissimilarity Rating for Segmentation and Matching . . . . . . . . . . . . . . 93--102 Benjamin Ummenhofer and Thomas Brox Dense $3$D Reconstruction with a Hand-Held Camera . . . . . . . . . . . . 103--112 Aitor Aldoma and Federico Tombari and Radu Bogdan Rusu and Markus Vincze OUR-CVFH --- Oriented, Unique and Repeatable Clustered Viewpoint Feature Histogram for Object Recognition and 6DOF Pose Estimation . . . . . . . . . . 113--122 Michele Fenzi and Ralf Dragon and Laura Leal-Taixé and Bodo Rosenhahn and Jörn Ostermann $3$D Object Recognition and Pose Estimation for Multiple Objects Using Multi-Prioritized RANSAC and Model Updating . . . . . . . . . . . . . . . . 123--133 Hakan Bilen and Vinay P. Namboodiri and Luc J. Van Gool Classification with Global, Local and Shared Features . . . . . . . . . . . . 134--143 Thorsten Franzel and Uwe Schmidt and Stefan Roth Object Detection in Multi-view X-Ray Images . . . . . . . . . . . . . . . . . 144--154 Ferdinand Hahmann and Heike Ruppertshofen and Gordon Böer and Ralf Stannarius and Hauke Schramm Eye Localization Using the Discriminative Generalized Hough Transform . . . . . . . . . . . . . . . 155--164 Andreas Rune Fugl and Andreas Jordt and Henrik Gordon Petersen and Morten Willatzen Simultaneous Estimation of Material Properties and Pose for Deformable Objects from Depth and Color Images . . 165--174 Sebastian von Enzberg and Bernd Michaelis Surface Quality Inspection of Deformable Parts with Variable B-Spline Surfaces 175--184 Fabian Zach and Christian Riess and Elli Angelopoulou Automated Image Forgery Detection through Classification of JPEG Ghosts 185--194 Martin Köstinger and Peter M. Roth and Horst Bischof Synergy-Based Learning of Facial Identity . . . . . . . . . . . . . . . . 195--204 Anonymous Front Matter . . . . . . . . . . . . . . ??
Bassam Mokbel and Sebastian Gross and Markus Lux and Niels Pinkwart and Barbara Hammer How to Quantitatively Compare Data Dissimilarities for Unsupervised Machine Learning? . . . . . . . . . . . . . . . 1--13 Daniela Hofmann and Barbara Hammer Kernel Robust Soft Learning Vector Quantization . . . . . . . . . . . . . . 14--23 Davide Maltoni and Erik M. Rehn Incremental Learning by Message Passing in Hierarchical Temporal Memory . . . . 24--35 Ludwig Lausser and Christoph Müssel and Hans A. Kestler Representative Prototype Sets for Data Characterization and Classification . . 36--47 Takashi Nagatani and Shigeo Abe Feature Selection by Block Addition and Block Deletion . . . . . . . . . . . . . 48--59 Michel Tokic and Günther Palm Gradient Algorithms for Exploration/Exploitation Trade-Offs: Global and Local Variants . . . . . . . 60--71 Edmondo Trentin and Marco Bongini Towards a Novel Probabilistic Graphical Model of Sequential Data: Fundamental Notions and a Solution to the Problem of Parameter Learning . . . . . . . . . . . 72--81 Marco Bongini and Edmondo Trentin Towards a Novel Probabilistic Graphical Model of Sequential Data: a Solution to the Problem of Structure Learning and an Empirical Evaluation . . . . . . . . . . 82--92 Andrey V. Savchenko Statistical Recognition of a Set of Patterns Using Novel Probability Neural Network . . . . . . . . . . . . . . . . 93--103 Miriam Schmidt and Günther Palm and Friedhelm Schwenker On Graph-Associated Matrices and Their Eigenvalues for Optical Character Recognition . . . . . . . . . . . . . . 104--114 José Ricardo Gonçalves Manzan and Shigueo Nomura and Keiji Yamanaka Improving Iris Recognition through New Target Vectors in MLP Artificial Neural Networks . . . . . . . . . . . . . . . . 115--126 Antonio García-Manso and Carlos J. García-Orellana and Ramón Gallardo-Caballero Robustness of a CAD System on Digitized Mammograms . . . . . . . . . . . . . . . 127--138 Kaushik Roy and Mohamed S. Kamel Facial Expression Recognition Using Game Theory . . . . . . . . . . . . . . . . . 139--150 Alessandro Zamberletti and Ignazio Gallo and Simone Albertini and Marco Vanetti and Angelo Nodari Classification of Segmented Objects through a Multi-net Approach . . . . . . 151--162 Vasileios Korfiatis and Simone Tassani and George K. Matsopoulos A Decision Support System for the Prediction of the Trabecular Fracture Zone . . . . . . . . . . . . . . . . . . 163--174 Kelwin Fernandez and Carolina Chang Teeth/Palate and Interdental Segmentation Using Artificial Neural Networks . . . . . . . . . . . . . . . . 175--185 Sascha Meudt and Friedhelm Schwenker On Instance Selection in Audio Based Emotion Recognition . . . . . . . . . . 186--192 Matthias Hillebrand and Ulrich Kreßel and Christian Wöhler and Franz Kummert Traffic Sign Classifier Adaption by Semi-supervised Co-training . . . . . . 193--200 Paul T. Pearson and Cameron I. Cooper Using Self Organizing Maps to Analyze Demographics and Swing State Voting in the 2008 U.S. Presidential Election . . 201--212 Osvaldo de Souza and Paulo César Cortez and Francisco A. T. F. da Silva Grayscale Images and RGB Video: Compression by Morphological Neural Network . . . . . . . . . . . . . . . . 213--224 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Amin Abdalla and Andrew U. Frank Combining Trip and Task Planning: How to Get from A to Passport . . . . . . . . . 1--14 Chris Anderson-Tarver and Mike Gleason and Barbara Buttenfield Automated Centerline Delineation to Enrich the National Hydrography Dataset 15--28 Kevin Buchin and Bettina Speckmann and Sander Verdonschot Evolution Strategies for Optimizing Rectangular Cartograms . . . . . . . . . 29--42 Maike Buchin and Somayeh Dodge and Bettina Speckmann Context-Aware Similarity of Trajectories 43--56 Yao-Yi Chiang and Craig A. Knoblock Generating Named Road Vector Data from Raster Maps . . . . . . . . . . . . . . 57--71 Matthew P. Dube and Max J. Egenhofer An Ordering of Convex Topological Relations . . . . . . . . . . . . . . . 72--86 Julien Gaffuri Toward Web Mapping with Vector Data . . 87--101 Carsten Keßler and Krzysztof Janowicz and Tomi Kauppinen \tt spatial@linkedscience --- Exploring the Research Field of GIScience with Linked Data . . . . . . . . . . . . . . 102--115 Nicolas Maisonneuve and Bastien Chopard Crowdsourcing Satellite Imagery Analysis: Study of Parallel and Iterative Models . . . . . . . . . . . . 116--131 Pradeep Mohan and Xun Zhou and Shashi Shekhar Quantifying Resolution Sensitivity of Spatial Autocorrelation: a Resolution Correlogram Approach . . . . . . . . . . 132--145 Silvia Nittel and Christopher Dorr and John C. Whittier LocalAlert: Simulating Decentralized Ad-Hoc Collaboration in Emergency Situations . . . . . . . . . . . . . . . 146--159 Avinash Rude and Kate Beard High-Level Event Detection in Spatially Distributed Time Series . . . . . . . . 160--172 Thiago Luís Lopes Siqueira Towards Vague Geographic Data Warehouses 173--186 Guibo Sun and Hui Lin and Rongrong Li Measuring the Influence of Built Environment on Walking Behavior: An Accessibility Approach . . . . . . . . . 187--197 Guillaume Touya Social Welfare to Assess the Global Legibility of a Generalized Map . . . . 198--211 Jan Oliver Wallgrün and Jinlong Yang and Alexander Klippel Investigations into the Cognitive Conceptualization and Similarity Assessment of Spatial Scenes . . . . . . 212--225 Lisa A. Walton and Michael Worboys A Qualitative Bigraph Model for Indoor Space . . . . . . . . . . . . . . . . . 226--240 Toyohide Watanabe and Kosuke Yamamoto Dynamic Refuse Collection Strategy Based on Adjacency Relationship between Euler Cycles . . . . . . . . . . . . . . . . . 241--257 Ting Wei and Scott Bell Impact of Indoor Location Information Reliability on Users' Trust of an Indoor Positioning System . . . . . . . . . . . 258--269 Nancy Wiegand Ontology for the Engineering of Geospatial Systems . . . . . . . . . . . 270--283 Anonymous Front Matter . . . . . . . . . . . . . . ??
Marco Porsch and Thomas Bauschert A Testbed Analysis of the Effects of IEEE 802.11s Power Save on Mesh Link Performance . . . . . . . . . . . . . . 1--11 Muhammad Irfan Rafique and Thomas Bauschert Path Selection and Adaptive Selection of Smart Antenna Transmission Schemes in Multi-hop Wireless Networks . . . . . . 12--22 Cristina Cano and Boris Bellalta and Miquel Oliver Receiver-Initiated vs. Short-Preamble Burst MAC Approaches for Multi-channel Wireless Sensor Networks . . . . . . . . 23--32 Albert Domingo and Boris Bellalta and Miquel Oliver White Spaces in UHF Band: Catalonia Case Study and Impact of the Digital Dividend 33--40 Zahra Tavakoli and Sebastian Meier and Alexander Vensmer A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment . . . . . . . . . . 41--51 Zoltán Czirkos and Gábor Hosszú Enhancing Collaborative Intrusion Detection Methods Using a Kademlia Overlay Network . . . . . . . . . . . . 52--63 Pavel \vCeleda and Radek Krej\vcí and Vojt\vech Krmí\vcek Flow-Based Security Issue Detection in Building Automation and Control Networks 64--75 Gy\Hoz\Ho Gódor and Sándor Imre Hash-Based Mutual Authentication Protocol for Low-Cost RFID Systems . . . 76--87 Christiaan Ottow and Frank van Vliet and Pieter-Tjerk de Boer and Aiko Pras The Impact of IPv6 on Penetration Testing . . . . . . . . . . . . . . . . 88--99 Iyas Alloush and Vanea Chiprianov and Yvon Kermarrec and Siegfried Rouvrais Linking Telecom Service High-Level Abstract Models to Simulators Based on Model Transformations: The IMS Case Study . . . . . . . . . . . . . . . . . 100--111 Stefan Türk and Ying Liu and Rico Radeke and Ralf Lehnert Network Migration Optimization Using Genetic Algorithms . . . . . . . . . . . 112--123 Patcharee Thongtra and Finn Arve Aagesen and Kornschnok Dittawit OWL-Based Node Capability Parameter Configuration . . . . . . . . . . . . . 124--135 Konrad Walczyk and Annie Gravey Techno-Economic Comparison of Next-Generation Access Networks for the French Market . . . . . . . . . . . . . 136--147 Christos Tsiaras and Martin Waldburger and Guilherme Sperb Machado and Andrei Vancea The Design of a Single Funding Point Charging Architecture . . . . . . . . . 148--160 Volker Richter and Rico Radeke and Ralf Lehnert A Two Layer Guaranteed and Sustained Rate Based Scheduler for IEEE 802.16-2009 Based WiMAX Networks . . . . 161--172 Régel González Usach and Mirja Kühlewind Implementation and Evaluation of Coupled Congestion Control for Multipath TCP . . 173--182 Bjòrn J. Villa and Poul E. Heegaard and Anders Instefjord Improving Fairness for Adaptive HTTP Video Streaming . . . . . . . . . . . . 183--193 Jakub Marsza\lkowski Prototype of High Performance Scalable Advertising Server with Local Memory Storage and Centralised Processing . . . 194--203 Mihály Orosz and Gábor Hosszú Responsible Source Multicasting . . . . 204--214 Adrian Noguero and Isidro Calvo and Luis Almeida and Unai Gangoiti A Model for System Resources in Flexible Time-Triggered Middleware Architectures 215--226 Anonymous Front Matter . . . . . . . . . . . . . . ??
Wil M. P. van der Aalst A Decade of Business Process Management Conferences: Personal Reflections on a Developing Discipline . . . . . . . . . 1--16 Alejandro Buchmann and Stefan Appel and Tobias Freudenreich and Sebastian Frischbier From Calls to Events: Architecting Future BPM Systems . . . . . . . . . . . 17--32 Jan Claes and Irene Vanderfeesten and Hajo A. Reijers and Jakob Pinggera and Matthias Weidlich Tying Process Model Quality to the Modeling Process: The Impact of Structuring, Movement, and Speed . . . . 33--48 Jana Koehler and Joerg Hofstetter and Roland Woodtly Capabilities and Levels of Maturity in IT-Based Case Management . . . . . . . . 49--64 Rami-Habib Eid-Sabbagh and Remco Dijkman and Mathias Weske Business Process Architecture: Use and Correctness . . . . . . . . . . . . . . 65--81 Massimiliano de Leoni and Fabrizio Maria Maggi and Wil M. P. van der Aalst Aligning Event Logs and Declarative Process Models for Conformance Checking 82--97 Jan Martijn E. M. van der Werf and H. M. W. Verbeek and Wil M. P. van der Aalst Context-Aware Compliance Checking . . . 98--113 Sebastian Banescu and Milan Petkovi\'c and Nicola Zannone Measuring Privacy Compliance Using Fitness Metrics . . . . . . . . . . . . 114--119 Antonio Estruch and José Antonio Heredia Álvaro Event-Driven Manufacturing Process Management Approach . . . . . . . . . . 120--133 Stefano Tranquillini and Patrik Spieß and Florian Daniel and Stamatis Karnouskos and Fabio Casati Process-Based Design and Integration of Wireless Sensor Network Applications . . 134--149 Ognjen Scekic and Hong-Linh Truong and Schahram Dustdar Modeling Rewards and Incentive Mechanisms for Social BPM . . . . . . . 150--155 Cédric Favre and Hagen Völzer The Difficulty of Replacing an Inclusive OR-Join . . . . . . . . . . . . . . . . 156--171 Rafael Accorsi and Andreas Lehmann Automatic Information Flow Analysis of Business Process Models . . . . . . . . 172--187 Marian Benner and Matthias Book and Tobias Brückmann and Volker Gruhn and Thomas Richter Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts . . . . . . . . . . . . . 188--193 Mourad Amziani and Tarek Melliti and Samir Tata A Generic Framework for Service-Based Business Process Elasticity in the Cloud 194--199 Juan Li and Ross Jeffery and Kam Hay Fung and Liming Zhu and Qing Wang and He Zhang and Xiwei Xu A Business Process-Driven Approach for Requirements Dependency Analysis . . . . 200--215 David Martinho and António Rito Silva A Recommendation Algorithm to Capture End-Users' Tacit Knowledge . . . . . . . 216--222 Adela del-Río-Ortega and Manuel Resinas Arias de Reyna and Amador Durán Toro Defining Process Performance Indicators by Using Templates and Patterns . . . . 223--228 Dirk Fahland and Wil M. P. van der Aalst Repairing Process Models to Reflect Reality . . . . . . . . . . . . . . . . 229--245 Zhiqiang Yan and Remco Dijkman and Paul Grefen FNet: An Index for Advanced Business Process Querying . . . . . . . . . . . . 246--261 Anonymous Front Matter . . . . . . . . . . . . . . ??
Md. Sadim Mahmud and Sylvia L. Osborn Tradeoff Analysis of Relational Database Storage of Privacy Preferences . . . . . 1--13 Maryam Shoaran and Alex Thomo and Jens Weber Differential Privacy in Practice . . . . 14--24 Steven Euijong Whang and Hector Garcia-Molina A Model for Quantifying Information Leakage . . . . . . . . . . . . . . . . 25--44 Daniel Janusz and Martin Kost and Johann-Christoph Freytag Privacy Protocol for Linking Distributed Medical Data . . . . . . . . . . . . . . 45--57 Wen Qiang Wang and Dinh Tien Tuan Anh and Hock Beng Lim and Anwitaman Datta Cloud and the City: Facilitating Flexible Access Control over Data-Streams . . . . . . . . . . . . . . 58--74 Barbara Carminati and Elena Ferrari and Michele Guglielmi Policies for Composed Emergencies in Support of Disaster Management . . . . . 75--92 Bijit Hore and Ee-Chien Chang and Mamadou H. Diallo and Sharad Mehrotra Indexing Encrypted Documents for Supporting Efficient Keyword Search . . 93--110 Chunwang Zhang and Junjie Jin and Ee-Chien Chang and Sharad Mehrotra Secure Quasi-Realtime Collaborative Editing over Low-Cost Storage Services 111--129 Stepan Kozak and David Novak and Pavel Zezula Secure Metric-Based Index for Similarity Cloud . . . . . . . . . . . . . . . . . 130--147 Meghyn Bienvenu and Daniel Deutch and Fabian M. Suchanek Provenance for Web 2.0 Data . . . . . . 148--155 Sean Thorpe and Tyrone Grandison and Indrajit Ray and Abbie Barbir Towards Enabling Behavioral Trust among Participating Cloud Forensic Data Center Agencies . . . . . . . . . . . . . . . . 156--161 Mina Deng and Marco Nalin and Milan Petkovi\'c and Ilaria Baroni and Abitabile Marco Towards Trustworthy Health Platform Cloud . . . . . . . . . . . . . . . . . 162--175 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Manas Pathak and Jose Portelo and Bhiksha Raj and Isabel Trancoso Privacy-Preserving Speaker Authentication . . . . . . . . . . . . . 1--22 Florian Mendel and Tomislav Nad and Stefan Scherz and Martin Schläffer Differential Attacks on Reduced RIPEMD-160 . . . . . . . . . . . . . . . 23--38 Bogdan Groza and Bogdan Warinschi Revisiting Difficulty Notions for Client Puzzles and DoS Resilience . . . . . . . 39--54 Noboru Kunihiro On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree . . . . . . . . . . . 55--69 Sanna Suoranta and André Andrade and Tuomas Aura Strong Authentication with Mobile Phone 70--85 Chaitrali Amrutkar and Patrick Traynor and Paul C. van Oorschot Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road? . . . . . . . . . . . . . . . . . 86--103 Jens Bender and Özgür Dagdelen and Marc Fischlin and Dennis Kügler Domain-Specific Pseudonymous Signatures for the German Identity Card . . . . . . 104--119 Falko Strenzke Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-Constrained Platforms . . . . . . 120--135 Samiran Bag and Aritra Dhar and Pinaki Sarkar 100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks . . . . . . . . . . . . . . . . . 136--150 Lei Zhao and Debin Gao and Lina Wang Learning Fine-Grained Structured Input for Memory Corruption Detection . . . . 151--167 Sami Alsouri and Jan Sinschek and Andreas Sewe and Eric Bodden and Mira Mezini Dynamic Anomaly Detection for More Trustworthy Outsourced Computation . . . 168--187 Jiangang Wang and Xiaohong Li and Xuhui Liu and Xinshu Dong and Junjie Wang and Zhenkai Liang An Empirical Study of Dangerous Behaviors in Firefox Extensions . . . . 188--203 Michael Clear and Karl Reid and Desmond Ennis and Arthur Hughes and Hitesh Tewari Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems . . . . . . . . . 204--223 Christoph Bösch and Qiang Tang and Pieter Hartel and Willem Jonker Selective Document Retrieval from Encrypted Database . . . . . . . . . . . 224--241 Andreas Peter and Max Kronberg and Wilke Trei and Stefan Katzenbeisser Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited 242--257 Atsushi Fujioka and Taiichi Saito and Keita Xagawa Secure Hierarchical Identity-Based Identification without Random Oracles 258--273 E. Ghadafi and N. P. Smart Efficient Two-Move Blind Signatures in the Common Reference String Model . . . 274--289 Jinwei Hu and Khaled M. Khan and Yun Bai and Yan Zhang Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems . . . . . . . . . . 290--305 Peter Drábik and Fabio Martinelli and Charles Morisset A Quantitative Approach for Inexact Enforcement of Security Policies . . . . 306--321 Nezar Nassr and Nidal Aboudagga and Eric Steegmans OSDM: An Organizational Supervised Delegation Model for RBAC . . . . . . . 322--337 Anonymous Front Matter . . . . . . . . . . . . . . ??
Burkhard Monien and Christian Scheideler Selfish Distributed Optimization . . . . 1--2 Omer Rana and Marios Dikaiakos and Daniel S. Katz and Christine Morin Topic 1: Support Tools and Environments 3--3 Yi Wen Wong and Tomasz Dubrownik and Wai Teng Tang and Wen Jun Tan and Rubing Duan Tulipse: a Visualization Framework for User-Guided Parallelization . . . . . . 4--15 Fabrizio Marozzo and Francesc Lordan and Roger Rafanell and Daniele Lezzi and Domenico Talia Enabling Cloud Interoperability with COMPSs . . . . . . . . . . . . . . . . . 16--27 Alexandru Calotoiu and Christian Siebert and Felix Wolf Pattern-Independent Detection of Manual Collectives in MPI Programs . . . . . . 28--39 Geoffrey C. Hulette and Matthew J. Sottile and Allen D. Malony A Type-Based Approach to Separating Protocol from Application Logic . . . . 40--51 Allen D. Malony and Helen Karatza and William Knottenbelt and Sally McKee Topic 2: Performance Prediction and Evaluation . . . . . . . . . . . . . . . 52--53 Ami Marowka Energy Consumption Modeling for Hybrid Computing . . . . . . . . . . . . . . . 54--64 Alvaro Aguilera and Michael Kluge and Thomas William and Wolfgang E. Nagel HPC File Systems in Wide Area Networks: Understanding the Performance of Lustre over WAN . . . . . . . . . . . . . . . . 65--76 Jeremy Logan and Scott Klasky and Hasan Abbasi and Qing Liu and George Ostrouchov and Manish Parashar Understanding I/O Performance Using I/O Skeletal Applications . . . . . . . . . 77--88 Pablo de Oliveira Castro and Eric Petit and Jean Christophe Beyler and William Jalby ASK: Adaptive Sampling Kit for Performance Characterization . . . . . . 89--101 Shuai Jiao and Paolo Ienne and Xiaochun Ye and Da Wang and Dongrui Fan and Ninghui Sun CRAW/P: a Workload Partition Method for the Efficient Parallel Simulation of Manycores . . . . . . . . . . . . . . . 102--114 Denis Trystram and Ioannis Milis and Zhihui Du and Uwe Schwiegelshohn Topic 3: Scheduling and Load Balancing 115--115 Stephane Chretien and Jean-Marc Nicod and Laurent Philippe and Veronika Rehn-Sonigo and Lamiel Toch Job Scheduling Using Successive Linear Programming Approximations of a Sparse Model . . . . . . . . . . . . . . . . . 116--127 Eric Angel and Evripidis Bampis and Fadi Kacem and Dimitrios Letsios Speed Scaling on Parallel Processors with Migration . . . . . . . . . . . . . 128--140 Ankur Narang and Abhinav Srivastava and Ramnik Jain and R. K. Shyamasundar Dynamic Distributed Scheduling Algorithm for State Space Search . . . . . . . . . 141--154 Vladimir Janjic and Kevin Hammond Using Load Information in Work-Stealing on Distributed Systems with Non-uniform Communication Latencies . . . . . . . . 155--166 Peter Sanders and Jochen Speck Energy Efficient Frequency Scaling and Scheduling for Malleable Tasks . . . . . 167--178 Marcelo Veiga Neves and Tiago Ferreto and César De Rose Scheduling MapReduce Jobs in HPC Clusters . . . . . . . . . . . . . . . . 179--190 Gladys Utrera and Siham Tabik and Julita Corbalan and Jesús Labarta A Job Scheduling Approach for Multi-core Clusters Based on Virtual Malleability 191--203 Anonymous Front Matter . . . . . . . . . . . . . . ??
Xiang Xie and Rui Xue and Rui Zhang Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting . . . . . 1--18 Craig Gentry and Shai Halevi and Chris Peikert and Nigel P. Smart Ring Switching in BGV-Style Homomorphic Encryption . . . . . . . . . . . . . . . 19--37 Ivan Damgård and Adriana López-Alt Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions 38--56 Jan Camenisch and Gregory Neven and Markus Rückert Fully Anonymous Attribute Tokens from Lattices . . . . . . . . . . . . . . . . 57--75 Jan Camenisch and Maria Dubovitskaya and Kristiyan Haralambiev Efficient Structure-Preserving Signature Scheme from Standard Assumptions . . . . 76--94 Olivier Blazy and David Pointcheval and Damien Vergnaud Compact Round-Optimal Partially-Blind Signatures . . . . . . . . . . . . . . . 95--112 Marc Fischlin and Anja Lehmann and Dominique Schröder History-Free Sequential Aggregate Signatures . . . . . . . . . . . . . . . 113--130 Melissa Chase and Markulf Kohlweiss A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN . . . . . . . . . . . . . . . . . . 131--148 Steven Myers and Mona Sergi and abhi shelat Blackbox Construction of a More Than Non-Malleable CCA 1 Encryption Scheme from Plaintext Awareness . . . . . . . . 149--165 Duong Hieu Phan and David Pointcheval and Mario Strefler Decentralized Dynamic Broadcast Encryption . . . . . . . . . . . . . . . 166--183 Kohei Kasamatsu and Takahiro Matsuda and Keita Emura and Nuttapong Attrapadung and Goichiro Hanaoka Time-Specific Encryption from Forward-Secure Encryption . . . . . . . 184--204 Vladimir Kolesnikov and Ranjit Kumaresan Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits . . . . . . . . . . . . . . . . 205--221 Joshua Baron and Karim El Defrawy and Kirill Minkovich and Rafail Ostrovsky and Eric Tressler 5PM: Secure Pattern Matching . . . . . . 222--240 Ivan Damgård and Marcel Keller and Enrique Larraia and Christian Miles and Nigel P. Smart Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol . . . . 241--263 Seung Geol Choi and Dana Dachman-Soled and Moti Yung On the Centrality of Off-Line E-Cash to Concrete Partial Information Games . . . 264--280 Ran Canetti and Margarita Vald Universally Composable Security with Local Adversaries . . . . . . . . . . . 281--301 Masaya Yasuda and Takeshi Shimoyama and Jun Kogure and Tetsuya Izu On the Strength Comparison of the ECDLP and the IFP . . . . . . . . . . . . . . 302--325 Gottfried Herold and Alexander Meurer New Attacks for Knapsack Based Cryptosystems . . . . . . . . . . . . . 326--342 Céline Blondeau and Beno\^\it Gérard and Kaisa Nyberg Multiple Differential Cryptanalysis Using LLR and $\chi^2$ Statistics . . . 343--360 Enrico Thomae Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings . . . 361--373 Anonymous Front Matter . . . . . . . . . . . . . . ??
Dov Gabbay Bipolar Argumentation Frames and Contrary to Duty Obligations, Preliminary Report . . . . . . . . . . . 1--24 Gerhard Lakemeyer Multi-agent Only-Knowing . . . . . . . . 25--25 Emiliano Lorini Logics for Reasoning about Agents' Attitudes in Strategic Contexts . . . . 26--26 Isaac Pinyol A Time-Situated Meta-logic for Characterizing Goal-Processing Bounded Agents . . . . . . . . . . . . . . . . . 27--42 Ho-Pun Lam and Guido Governatori and Ken Satoh Distributed Defeasible Speculative Reasoning in Ambient Environment . . . . 43--60 Frank Dignum and Virginia Dignum A Formal Semantics for Agent (Re)Organization . . . . . . . . . . . . 61--76 Dimitar P. Guelev and Catalin Dima Epistemic ATL with Perfect Recall, Past and Strategy Contexts . . . . . . . . . 77--93 Matei Popovici Using Evolution Graphs for Describing Topology-Aware Prediction Models in Large Clusters . . . . . . . . . . . . . 94--109 Isabelle Mirbel and Serena Villata Enhancing Goal-Based Requirements Consistency: An Argumentation-Based Approach . . . . . . . . . . . . . . . . 110--127 Nils Bulling and Michael Köster and Matei Popovici A Game Theoretic Approach for Optimal Network Topologies in Opportunistic Networks . . . . . . . . . . . . . . . . 128--145 Martin Homola and Matthias Knorr and João Leite MKNF Knowledge Bases in Multi-Context Systems . . . . . . . . . . . . . . . . 146--162 Ben Wright and Enrico Pontelli and Tran Cao Son Implementing Reversible Processes in Multi-agent Action Languages Using Answer Set Planning . . . . . . . . . . 163--180 Cristian Gratie and Adina Magda Florea Full Hybrid $\mu$-Calculus, Its Bisimulation Invariance and Application to Argumentation . . . . . . . . . . . . 181--194 Dov Gabbay and Odinaldo Rodrigues A Numerical Approach to the Merging of Argumentation Networks . . . . . . . . . 195--212 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Magdalena Ortiz and Mantas \vSimkus Reasoning and Query Answering in Description Logics . . . . . . . . . . . 1--53 Georg Gottlob and Giorgio Orsi and Andreas Pieris Datalog and Its Extensions for Semantic Web Databases . . . . . . . . . . . . . 54--77 Marcelo Arenas and Jorge Pérez Federation and Navigation in SPARQL 1.1 78--111 Markus Krötzsch OWL 2 Profiles: An Introduction to Lightweight Ontology Languages . . . . . 112--183 Sergio Flesca and Tim Furche and Linda Oro Reasoning and Ontologies in Data Extraction . . . . . . . . . . . . . . . 184--210 Guilin Qi and Jianfeng Du Reasoning with Uncertain and Inconsistent OWL Ontologies . . . . . . 211--244 Danh Le-Phuoc and Josiane Xavier Parreira Linked Stream Data Processing . . . . . 245--289 Manolis Koubarakis and Manos Karpathiotakis Data Models and Query Languages for Linked Geospatial Data . . . . . . . . . 290--328 François Bry and Sebastian Schaffert Semantic Wikis: Approaches, Applications, and Perspectives . . . . . 329--369 Francesca Toni Reasoning on the Web with Assumption-Based Argumentation . . . . . 370--386 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Taylor Cassidy and Heng Ji and Hongbo Deng and Jing Zheng and Jiawei Han Analysis and Refinement of Cross-Lingual Entity Linking . . . . . . . . . . . . . 1--12 Ragnar Nordlie and Nils Pharo Seven Years of INEX Interactive Retrieval Experiments --- Lessons and Challenges . . . . . . . . . . . . . . . 13--23 Allan Hanbury and Henning Müller and Georg Langs and Marc André Weber and Bjoern H. Menze Bringing the Algorithms to the Data: Cloud--Based Benchmarking for Medical Image Analysis . . . . . . . . . . . . . 24--29 Julia J. Jürgens and Preben Hansen and Christa Womser-Hacker Going beyond CLEF-IP: The `Reality' for Patent Searchers? . . . . . . . . . . . 30--35 Nicola Orio and Cynthia C. S. Liem and Geoffroy Peeters and Markus Schedl MusiClef: Multimodal Music Tagging Task 36--41 Richard Berendsen and Manos Tsagkias and Maarten de Rijke and Edgar Meij Generating Pseudo Test Collections for Learning to Rank Scientific Articles . . 42--53 Florina Piroi and Mihai Lupu and Allan Hanbury Effects of Language and Topic Size in Patent IR: An Empirical Study . . . . . 54--66 Parth Gupta and Alberto Barrón-Cedeño and Paolo Rosso Cross-Language High Similarity Search Using a Conceptual Thesaurus . . . . . . 67--75 Anita Keszler and Levente Kovács and Tamás Szirányi The Appearance of the Giant Component in Descriptor Graphs and Its Application for Descriptor Selection . . . . . . . . 76--81 Xueliang Yan and Guanglai Gao and Xiangdong Su and Hongxi Wei and Xueliang Zhang and Qianqian Lu Hidden Markov Model for Term Weighting in Verbose Queries . . . . . . . . . . . 82--87 Maristella Agosti and Emanuele Di Buccio and Nicola Ferro and Ivano Masiero and Simone Peruzzo DIRECTions: Design and Specification of an IR Evaluation Infrastructure . . . . 88--99 Petra Galu\vs\vcáková and Pavel Pecina and Jan Haji\vc Penalty Functions for Evaluation Measures of Unsegmented Speech Retrieval 100--111 Marco Angelini and Nicola Ferro and Kalervo Järvelin and Heikki Keskustalo and Ari Pirkola Cumulated Relative Position: a Metric for Ranking Evaluation . . . . . . . . . 112--123 Philipp Schaer Better than Their Reputation? On the Reliability of Relevance Assessments with Students . . . . . . . . . . . . . 124--135 Jens Kürsten and Maximilian Eibl Comparing IR System Components Using Beanplots . . . . . . . . . . . . . . . 136--137 Pinaki Bhaskar and Sivaji Bandyopadhyay Language Independent Query Focused Snippet Generation . . . . . . . . . . . 138--140 Solange de L. Pertile and Viviane P. Moreira A Test Collection to Evaluate Plagiarism by Missing or Incorrect References . . . 141--143 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Michael Khoo and Catherine Hall What Would `Google' Do? Users' Mental Models of a Digital Library Search Engine . . . . . . . . . . . . . . . . . 1--12 Dana McKay and Annika Hinze and Ralf Heese and Nicholas Vanderschantz and Claire Timpany An Exploration of ebook Selection Behavior in Academic Library Collections 13--24 Fernando Loizides Information Seekers' Visual Focus during Time Constraint Document Triage . . . . 25--31 Nina Tahmasebi and Gerhard Gossen and Thomas Risse Which Words Do You Remember? Temporal Properties of Language Use in Digital Archives . . . . . . . . . . . . . . . . 32--37 Dongwon Lee Toward Mobile-Friendly Libraries: The Status Quo . . . . . . . . . . . . . . . 38--50 Annika Hinze and David Bainbridge Listen to Tipple: Creating a Mobile Digital Library with Location-Triggered Audio Books . . . . . . . . . . . . . . 51--56 Annika Hinze and Amay Dighe Re-finding Physical Documents: Extending a Digital Library into a Human-Centred Workplace . . . . . . . . . . . . . . . 57--63 Mark S. Sweetnam and Maristella Agosti and Nicola Orio and Chiara Ponchia and Christina M. Steiner User Needs for Enhanced Engagement with Cultural Heritage Collections . . . . . 64--75 Anne Adams and Pauline Ngimwa Digital Library Sustainability and Design Processes . . . . . . . . . . . . 76--88 Adam Dudczak and Mi\losz Kmieciak and Marcin Werla Creation of Textual Versions of Historical Documents from Polish Digital Libraries . . . . . . . . . . . . . . . 89--94 Marco Büchler and Gregory Crane and Maria Moritz and Alison Babeu Increasing Recall for Text Re-use in Historical Documents to Support Research in the Humanities . . . . . . . . . . . 95--100 Anqi Cui and Liner Yang and Dejun Hou and Min-Yen Kan and Yiqun Liu and Min Zhang and Shaoping Ma PrEV: Preservation Explorer and Vault for Web 2.0 User-Generated Content . . . 101--112 Rudolf Mayer and Andreas Rauber and Martin Alexander Neumann and John Thomson and Gonçalo Antunes Preserving Scientific Processes from Design to Publications . . . . . . . . . 113--124 Hany M. SalahEldeen and Michael L. Nelson Losing My Revolution: How Many Resources Shared on Social Media Have Been Lost? 125--137 Maria Sumbana and Marcos André Gonçalves and Rodrigo Silva and Jussara Almeida and Adriano Veloso Automatic Vandalism Detection in Wikipedia with Active Associative Classification . . . . . . . . . . . . . 138--143 Electra Sutton and Chloe Reynolds and Fredric C. Gey and Ray R. Larson Applying Digital Library Technologies to Nuclear Forensics . . . . . . . . . . . 144--149 Katarina Boland and Dominique Ritze and Kai Eckert and Brigitte Mathiak Identifying References to Datasets in Publications . . . . . . . . . . . . . . 150--161 M. Mahoui and C. Boston-Clay and R. Stein and N. Tirupattur Collaborative Tagging of Art Digital Libraries: Who Should Be Tagging? . . . 162--172 Emanuele Di Buccio and Giorgio Maria Di Nunzio and Gianmaria Silvello A System for Exposing Linguistic Linked Open Data . . . . . . . . . . . . . . . 173--178 Richard Gartner Linking the Parliamentary Record: a New Approach to Metadata for Legislative Proceedings . . . . . . . . . . . . . . 179--184 Anonymous Front Matter . . . . . . . . . . . . . . ??
William Gropp MPI 3 and Beyond: Why MPI Is Successful and What Challenges It Faces . . . . . . 1--9 Ulrich Brüning MPI Functions and Their Impact on Interconnect Hardware . . . . . . . . . 10--10 Shinji Sumimoto The MPI Communication Library for the K Computer: Its Design and Implementation 11--11 Anthony Danalis MPI and Compiler Technology: a Love-Hate Relationship . . . . . . . . . . . . . . 12--13 William Gropp and Ewing Lusk and Rajeev Thakur Advanced MPI Including New MPI-3 Features . . . . . . . . . . . . . . . . 14--14 Markus Geimer and Michael Gerndt and Sameer Shende and Bert Wesarg and Brian Wylie Hands-on Practical Hybrid Parallel Application Performance Engineering . . 15--15 Xin Zhao and Gopalakrishnan Santhanaraman and William Gropp Adaptive Strategy for One-Sided Communication in MPICH2 . . . . . . . . 16--26 Brian W. Barrett and Ron Brightwell and Keith D. Underwood A Low Impact Flow Control Implementation for Offload Communication Interfaces . . 27--36 Sylvain Didelot and Patrick Carribault and Marc Pérache and William Jalby Improving MPI Communication Overlap with Collaborative Polling . . . . . . . . . 37--46 Kazumi Yoshinaga and Yuichi Tsujita and Atsushi Hori and Mikiko Sato and Mitaro Namiki Delegation-Based MPI Communications for a Hybrid Parallel Computer with Many-Core Architecture . . . . . . . . . 47--56 James Dinan and David Goodell and William Gropp and Rajeev Thakur and Pavan Balaji Efficient Multithreaded Context ID Allocation in MPI . . . . . . . . . . . 57--66 Nikhil Jain and JohnMark Lau and Laxmikant Kale Collectives on Two-Tier Direct Networks 67--77 Manjunath Gorentla Venkata and Richard L. Graham and Joshua S. Ladd and Pavel Shamis Exploiting Atomic Operations for Barrier on Cray XE/XK Systems . . . . . . . . . 78--88 Simone Pellegrini and Torsten Hoefler and Thomas Fahringer Exact Dependence Analysis for Increased Communication Overlap . . . . . . . . . 89--99 Jesper Larsson Träff \tt mpicroscope: Towards an MPI Benchmark Tool for Performance Guideline Verification . . . . . . . . . . . . . . 100--109 D. Bureddy and H. Wang and A. Venkatesh and S. Potluri and D. K. Panda OMB-GPU: a Micro-Benchmark Suite for Evaluating MPI Libraries on GPU Clusters 110--120 Timo Schneider and Robert Gerstenberger and Torsten Hoefler Micro-applications for Communication Data Access Patterns and MPI Datatypes 121--131 Torsten Hoefler and James Dinan and Darius Buntinas and Pavan Balaji and Brian W. Barrett Leveraging MPI's One-Sided Communication Interface for Shared-Memory Programming 132--141 Isaías A. Comprés Ureña and Michael Gerndt and Carsten Trinitis Wait-Free Message Passing Protocol for Non-coherent Shared Memory Architectures 142--152 Atsushi Hori and Toyohisa Kameyama and Yuichi Tsujita and Mitaro Namiki and Yutaka Ishikawa An Efficient Kernel-Level Blocking MPI Implementation . . . . . . . . . . . . . 153--162 Anonymous Front Matter . . . . . . . . . . . . . . ??
Tobias Glasmachers Convergence of the IGO-Flow of Isotropic Gaussian Distributions on Convex Quadratic Problems . . . . . . . . . . . 1--10 Andrea Mambrini and Dirk Sudholt and Xin Yao Homogeneous and Heterogeneous Island Models for the Set Cover Problem . . . . 11--20 Alberto Moraglio and Krzysztof Krawiec and Colin G. Johnson Geometric Semantic Genetic Programming 21--31 Johannes Textor Efficient Negative Selection Algorithms by Sampling and Approximate Counting . . 32--41 Youhei Akimoto and Anne Auger and Nikolaus Hansen Convergence of the Continuous Time Trajectories of Isotropic Evolution Strategies on Monotonic $\mathcal{C}^2$-composite Functions . . 42--51 Andrew M. Sutton and Frank Neumann A Parameterized Runtime Analysis of Simple Evolutionary Algorithms for Makespan Scheduling . . . . . . . . . . 52--61 Chao Qian and Yang Yu and Zhi-Hua Zhou On Algorithm-Dependent Boundary Case Identification for Problem Classes . . . 62--71 Alexandre Chotard and Anne Auger and Nikolaus Hansen Cumulative Step-Size Adaptation on Linear Functions . . . . . . . . . . . . 72--81 Dirk V. Arnold On the Behaviour of the $(1, \lambda) - \sigma$ SA-ES for a Constrained Linear Problem . . . . . . . . . . . . . . . . 82--91 Darrell Whitley and Wenxiang Chen and Adele Howe An Empirical Evaluation of $O(1)$ Steepest Descent for NK-Landscapes . . . 92--101 Tommaso Urli and Markus Wagner and Frank Neumann Experimental Supplements to the Computational Complexity Analysis of Genetic Programming for Problems Modelling Isolated Program Semantics . . 102--112 Timo Kötzing and Hendrik Molter ACO Beats EA on a Dynamic Pseudo-Boolean Function . . . . . . . . . . . . . . . . 113--122 Dimo Brockhoff and Manuel López-Ibáñez and Boris Naujoks and Günter Rudolph Runtime Analysis of Simple Interactive Evolutionary Biobjective Optimization Algorithms . . . . . . . . . . . . . . . 123--132 Markus Wagner and Frank Neumann Parsimony Pressure versus Multi-objective Optimization for Variable Length Representations . . . . 133--142 Alessia Amelio and Clara Pizzuti An Evolutionary and Graph-Based Method for Image Segmentation . . . . . . . . . 143--152 Roberto Ugolotti and Youssef S. G. Nashed and Stefano Cagnoni Real-Time GPU Based Road Sign Detection and Classification . . . . . . . . . . . 153--162 Michaela Sikulova and Lukas Sekanina Acceleration of Evolutionary Image Filter Design Using Coevolution in Cartesian GP . . . . . . . . . . . . . . 163--172 Martin Pelikan and Mark W. Hauschild and Pier Luca Lanzi Transfer Learning, Soft Distance-Based Bias, and the Hierarchical BOA . . . . . 173--183 Markus Thill and Patrick Koch and Wolfgang Konen Reinforcement Learning with $N$-tuples on the Game Connect-$4$ . . . . . . . . 184--194 Patrick Koch and Wolfgang Konen Efficient Sampling and Handling of Variance in Tuning Data Mining Models 195--205 Anonymous Front Matter . . . . . . . . . . . . . . ??
Kalyanmoy Deb and Sunith Bandaru and Cem Celal Tutum Temporal Evolution of Design Principles in Engineering Systems: Analogies with Human Evolution . . . . . . . . . . . . 1--10 Antony Waldock and David W. Corne Exploiting Prior Information in Multi-objective Route Planning . . . . . 11--21 Naoya Kowatari and Akira Oyama and Hernán Aguirre and Kiyoshi Tanaka Analysis on Population Size and Neighborhood Recombination on Many-Objective Optimization . . . . . . 22--31 Julia Handl and Joshua Knowles Clustering Criteria in Multiobjective Data Clustering . . . . . . . . . . . . 32--41 Adam Ghandar and Zbigniew Michalewicz and Ralf Zurbruegg Enhancing Profitability through Interpretability in Algorithmic Trading with a Multiobjective Evolutionary Fuzzy System . . . . . . . . . . . . . . . . . 42--51 Shlomo Israel and Amiram Moshaiov Bootstrapping Aggregate Fitness Selection with Evolutionary Multi-Objective Optimization . . . . . . 52--61 Wei Peng and Qingfu Zhang Network Topology Planning Using MOEA/D with Objective-Guided Operators . . . . 62--71 Hoang N. Luong and Peter A. N. Bosman Elitist Archiving for Multi-Objective Evolutionary Algorithms: To Adapt or Not to Adapt . . . . . . . . . . . . . . . . 72--81 Mario Garza-Fabre and Eduardo Rodriguez-Tello and Gregorio Toscano-Pulido An Improved Multiobjectivization Strategy for HP Model-Based Protein Structure Prediction . . . . . . . . . . 82--92 Hui Li and Xiaolei Su and Zongben Xu and Qingfu Zhang MOEA/D with Iterative Thresholding Algorithm for Sparse Optimization Problems . . . . . . . . . . . . . . . . 93--101 Alessandro G. Di Nuovo and Giuseppe Ascia and Vincenzo Catania A Study on Evolutionary Multi-Objective Optimization with Fuzzy Approximation for Computational Expensive Problems . . 102--111 Panwadee Tangpattanakul and Nicolas Jozefowiez and Pierre Lopez Multi-objective Optimization for Selecting and Scheduling Observations by Agile Earth Observing Satellites . . . . 112--121 Amiram Moshaiov and Yafit Snir Tailoring $\epsilon$-MOEA to Concept-Based Problems . . . . . . . . . 122--131 Hisao Ishibuchi and Naoya Akedo and Yusuke Nojima Recombination of Similar Parents in SMS-EMOA on Many-Objective 0/1 Knapsack Problems . . . . . . . . . . . . . . . . 132--142 Francisco J. Rodriguez and Carlos García-Martínez and Christian Blum and Manuel Lozano An Artificial Bee Colony Algorithm for the Unrelated Parallel Machines Scheduling Problem . . . . . . . . . . . 143--152 Carlos M. Fernandes and Juan J. Merelo and Agostinho C. Rosa Controlling the Parameters of the Particle Swarm Optimization with a Self-Organized Criticality Model . . . . 153--163 Andrew McNabb and Kevin Seppi The Apiary Topology: Emergent Behavior in Communities of Particle Swarms . . . 164--173 Shigeyoshi Tsutsui ACO on Multiple GPUs with CUDA for Faster Solution of QAPs . . . . . . . . 174--184 Jan Bim and Giorgos Karafotias and S. K. Smit and A. E. Eiben and Evert Haasdijk It's Fate: a Self-organising Evolutionary Algorithm . . . . . . . . . 185--194 Alan P. Reynolds and Asaad Abdollahzadeh and David W. Corne and Mike Christie and Brian Davies Guide Objective Assisted Particle Swarm Optimization and Its Application to History Matching . . . . . . . . . . . . 195--204 Anonymous Front Matter . . . . . . . . . . . . . . ??
Lars Bollen and Hannie Gijlers and Wouter van Joolingen Computer-Supported Collaborative Drawing in Primary School Education --- Technical Realization and Empirical Findings . . . . . . . . . . . . . . . . 1--16 Katharina Emmerich and Katja Neuwald and Julia Othlinghaus and Sabrina Ziebarth and H. Ulrich Hoppe Training Conflict Management in a Collaborative Virtual Environment . . . 17--32 Osmel Bordiés and Eloy Villasclaras and Yannis Dimitriadis and Adolfo Ruiz-Calleja Reusability of Data Flow Designs in Complex CSCL Scripts: Evaluation Results from a Case Study . . . . . . . . . . . 33--40 Armando Cruz and António Correia and Hugo Paredes and Benjamim Fonseca and Leonel Morgado Towards an Overarching Classification Model of CSCW and Groupware: a Socio-technical Perspective . . . . . . 41--56 Alexander Nolte and Michael Prilla Normal Users Cooperating on Process Models: Is It Possible at All? . . . . . 57--72 Francisco Gutierrez and Nelson Baloian and Sergio F. Ochoa and Gustavo Zurita Designing the Software Support for Partially Virtual Communities . . . . . 73--88 Michael Prilla Supporting Social Tasks of Individuals: a Matter of Access to Cooperation Systems . . . . . . . . . . . . . . . . 89--96 Gustavo A. Oliva and Francisco W. Santana and Kleverton C. M. de Oliveira Characterizing Key Developers: a Case Study with Apache Ant . . . . . . . . . 97--112 Andréa M. Magdaleno and Renata M. Araujo and Cláudia M. L. Werner An Exploratory Study on Collaboration Understanding in Software Development Social Networks . . . . . . . . . . . . 113--120 Shi Shi and Thomas Largillier and Julita Vassileva Keeping Up with Friends' Updates on Facebook . . . . . . . . . . . . . . . . 121--128 Benjamin Weyers and Wolfram Luther and Nelson Baloian and Jose A. Pino Formal Modeling of Multi-user Interfaces in Cooperative Work . . . . . . . . . . 129--136 Thomas Largillier and Julita Vassileva Using Collective Trust for Group Formation . . . . . . . . . . . . . . . 137--144 Irene-Angelica Chounta and Nikolaos Avouris Time Series Analysis of Collaborative Activities . . . . . . . . . . . . . . . 145--152 Andreas Harrer and Thomas Irgang and Norbert Sattes and Kerstin Pfahler SoCCR --- Optimistic Concurrency Control for the Web-Based Collaborative Framework Metafora . . . . . . . . . . . 153--160 Lars Bollen and Sabrina C. Eimler and Marc Jansen and Jan Engler Enabling and Evaluating Mobile Learning Scenarios with Multiple Input Channels 161--175 Didac Gil de La Iglesia and Marcelo Milrad and Jesper Andersson Software Requirements to Support QoS in Collaborative M-Learning Activities . . 176--183 Dan Kohen-Vacs and Arianit Kurti and Marcelo Milrad and Miky Ronen Systems Integration Challenges for Supporting Cross Context Collaborative Pedagogical Scenarios . . . . . . . . . 184--191 Daniel Cernea and Simone Mora and Alfredo Perez and Achim Ebert and Andreas Kerren and Monica Divitini Tangible and Wearable User Interfaces for Supporting Collaboration among Emergency Workers . . . . . . . . . . . 192--199 Sírius Thadeu Ferreira da Silva and Jonice Oliveira and Marcos R. S. Borges Contextual Analysis of the Victims' Social Network for People Recommendation on the Emergency Scenario . . . . . . . 200--207 Sabrina Ziebarth and Nils Malzahn and H. Ulrich Hoppe Matchballs --- a Multi-Agent-System for Ontology-Based Collaborative Learning Games . . . . . . . . . . . . . . . . . 208--222 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Todd J. Green and Molham Aref and Grigoris Karvounarakis LogicBlox, Platform and Language: a Tutorial . . . . . . . . . . . . . . . . 1--8 Yuri Gurevich Datalog: a Perspective and the Potential 9--20 Marie-Laure Mugnier Existential Rules: a Graph-Based View 21--26 Axel Polleres How (Well) Do Datalog, SPARQL and RIF Interplay? . . . . . . . . . . . . . . . 27--30 Mario Alviano and Nicola Leone and Marco Manna and Giorgio Terracina and Pierfrancesco Veltri Magic-Sets for Datalog with Existential Quantifiers . . . . . . . . . . . . . . 31--43 Tom J. Ameloot and Jan Van den Bussche On the CRON Conjecture . . . . . . . . . 44--55 Stefan Brass Order in Datalog with Applications to Declarative Output . . . . . . . . . . . 56--67 Cristina Civili and Riccardo Rosati A Broad Class of First-Order Rewritable Tuple-Generating Dependencies . . . . . 68--80 Onofrio Febbraro and Giovanni Grasso and Nicola Leone and Kristian Reale and Francesco Ricca Datalog Development Tools . . . . . . . 81--85 Jaffer Gardezi and Leopoldo Bertossi Query Rewriting Using Datalog for Duplicate Resolution . . . . . . . . . . 86--98 Matteo Interlandi Reasoning about Knowledge in Distributed Systems Using Datalog . . . . . . . . . 99--110 Sven Köhler and Bertram Ludäscher and Yannis Smaragdakis Declarative Datalog Debugging for Mere Mortals . . . . . . . . . . . . . . . . 111--122 Thomas Lukasiewicz and Maria Vanina Martinez and Gerardo I. Simari Inconsistency-Tolerant Query Rewriting for Linear Datalog$\pm$ . . . . . . . . 123--134 William R. Marczak and Peter Alvaro and Neil Conway and Joseph M. Hellerstein and David Maier Confluence Analysis for Distributed Programs: a Model-Theoretic Approach . . 135--147 Daniel Ritter and Till Westmann Business Network Reconstruction Using Datalog . . . . . . . . . . . . . . . . 148--152 Domenico Sacc\`a and Edoardo Serra Data Exchange in Datalog Is Mainly a Matter of Choice . . . . . . . . . . . . 153--164 Marianne Shaw and Paraschos Koutris and Bill Howe and Dan Suciu Optimizing Large-Scale Semi-Na\"\ive Datalog Evaluation in Hadoop . . . . . . 165--176 Carlo Zaniolo Logical Foundations of Continuous Query Languages for Data Streams . . . . . . . 177--189 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Jan M. Baetens and Bernard De Baets Topological Perturbations and Their Effect on the Dynamics of Totalistic Cellular Automata . . . . . . . . . . . 1--10 Sukanta Das and Avik Chakraborty and Biplab K. Sikdar Counting Cycles in Reversible Cellular Automata . . . . . . . . . . . . . . . . 11--19 Dominique Désérable Propagative Mode in a Lattice-Grain CA: Time Evolution and Timestep Synchronization . . . . . . . . . . . . 20--31 Toshikazu Ishida and Shuichi Inokuchi Limit Cycle for Composited Cellar Automata . . . . . . . . . . . . . . . . 32--41 Martin Kutrib and Andreas Malcher Iterative Arrays: Little Resources Big Size Impact . . . . . . . . . . . . . . 42--51 Debdeep Mukhopadhyay Generating Expander Graphs Using Cellular Automata . . . . . . . . . . . 52--62 Nazma Naskar and Avik Chakraborty and Pradipta Maji and Sukanta Das Analysis of Reachability Tree for Identification of Cyclic and Acyclic CA States . . . . . . . . . . . . . . . . . 63--72 Fumio Ohi and Takanori Ichikawa Confliction-Like Dynamics of Rule 20 ECA of Wolfram Class II . . . . . . . . . . 73--82 Susumu Adachi and Jia Lee and Ferdinand Peper and Teijiro Isokawa and Katsunobu Imai Determining the Critical Temperature of the Continuous-State Game of Life . . . 83--90 Tomasz M. Gwizda\l\la The Dynamics of Disproportionality Index for Cellular Automata Based Sociophysical Models . . . . . . . . . . 91--100 Luidnel Maignan and Jean-Baptiste Yun\`es A Spatio-temporal Algorithmic Point of View on Firing Squad Synchronisation Problem . . . . . . . . . . . . . . . . 101--110 Gina M. B. Oliveira and Paulo M. Vidica A Coevolutionary Approach to Cellular Automata-Based Task Scheduling . . . . . 111--120 Anna Piwonska and Franciszek Seredynski and Miroslaw Szaban Searching Cellular Automata Rules for Solving Two-Dimensional Binary Classification Problem . . . . . . . . . 121--130 Epaminondas Sidiropoulos Multi-objective Cellular Automata Optimization . . . . . . . . . . . . . . 131--140 Stylianos Scarlatos Behavior of Social Dynamical Models I: Fixation in the Symmetric Cyclic System 141--150 Adam Adamopoulos and Stylianos Scarlatos Behavior of Social Dynamical Models II: Clustering for Some Multitype Particle Systems with Confidence Threshold . . . 151--160 Anastasiya Sharifulina Investigation of Stable Patterns Formed by Totalistic Cellular Automata Evolution . . . . . . . . . . . . . . . 161--170 Hiroshi Umeo and Keisuke Kubo Recent Developments in Constructing Square Synchronizers . . . . . . . . . . 171--183 Baltasar Trancón y Widemann Structural Operational Semantics for Cellular Automata . . . . . . . . . . . 184--193 Machi Zawidzki and Katsuhiro Nishinari Controlling the Opacity of a Building Envelope by a Triangular Two-Color Two-Dimensional Cellular Automaton . . . 194--203 Anonymous Front Matter . . . . . . . . . . . . . . ??
Masayuki Abe Tools over Bilinear Groups for Modular Design of Cryptographic Tasks . . . . . 1--1 Dennis Y. W. Liu and Duncan S. Wong One-Move Convertible Nominative Signature in the Standard Model . . . . 2--20 Shengke Zeng and Zhiguang Qin and Qing Lu and Qinyi Li Efficient and Random Oracle-Free Conditionally Anonymous Ring Signature 21--34 S. Sharmila Deva Selvi and S. Sree Vivek and Dhinakaran Vinayagamurthy and C. Pandu Rangan ID Based Signcryption Scheme in Standard Model . . . . . . . . . . . . . . . . . 35--52 Cheng Chen and Jie Chen and Hoon Wei Lim and Zhenfeng Zhang and Dengguo Feng Combined Public-Key Schemes: The Case of ABE and ABS . . . . . . . . . . . . . . 53--69 Ioana Boureanu and Serge Vaudenay Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices . . . . 70--87 Margus Niitsoo Deterministic Random Oracles . . . . . . 88--103 Oana Ciobotaru On the (Non-)Equivalence of UC Security Notions . . . . . . . . . . . . . . . . 104--124 Bo Yang and Mingwu Zhang LR-UESDE: a Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation . . . . . . . . . . . . . . . 125--142 Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao Anonymous Identity-Based Hash Proof System and Its Applications . . . . . . 143--160 Yunmei Zhang and Joseph K. Liu and Xinyi Huang and Man Ho Au and Willy Susilo Efficient Escrow-Free Identity-Based Signature . . . . . . . . . . . . . . . 161--174 Mototsugu Nishioka Perfect Keyword Privacy in PEKS Systems 175--192 Tapas Pandit and Rana Barua Efficient Fully Secure Attribute-Based Encryption Schemes for General Access Structures . . . . . . . . . . . . . . . 193--214 Masayuki Yoshino and Noboru Kunihiro and Ken Naganuma and Hisayoshi Sato Symmetric Inner-Product Predicate Encryption Based on Three Groups . . . . 215--234 Takanori Suga and Takashi Nishide and Kouichi Sakurai Secure Keyword Search Using Bloom Filter with Specified Character Positions . . . 235--252 Cheng Chen and Zhenfeng Zhang and Dengguo Feng Fully Secure Doubly-Spatial Encryption under Simple Assumptions . . . . . . . . 253--263 Zheng Yang and Jörg Schwenk Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles . . . . . . . . . . . . . 264--275 Yanfei Guo and Zhenfeng Zhang Authenticated Key Exchange with Entities from Different Settings and Varied Groups . . . . . . . . . . . . . . . . . 276--287 Mohammad Reza Reyhanitabar and Willy Susilo On Capabilities of Hash Domain Extenders to Preserve Enhanced Security Properties 288--299 Zhaohui Tang and Hoon Wei Lim and Huaxiong Wang Revisiting a Secret Sharing Approach to Network Codes . . . . . . . . . . . . . 300--317 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Gerhard Brewka Multi-context Systems: Specifying the Interaction of Knowledge Bases Declaratively . . . . . . . . . . . . . 1--4 Tommaso Di Noia Semantic Matchmaking and Ranking: Beyond Deduction in Retrieval Scenarios . . . . 5--8 Stefan Borgwardt and Rafael Peñaloza A Tableau Algorithm for Fuzzy Description Logics over Residuated De Morgan Lattices . . . . . . . . . . . . 9--24 Diego Calvanese and Giuseppe De Giacomo and Domenico Lembo and Marco Montali and Ario Santoso Ontology-Based Governance of Data-Aware Processes . . . . . . . . . . . . . . . 25--41 Cristina Civili and Riccardo Rosati Query Patterns for Existential Rules . . 42--57 Thomas Eiter and Michael Fink and Daria Stepanova Semantic Independence in DL-Programs . . 58--74 Víctor Gutiérrez-Basulto and Yazmín Angélica Ibáñez-García and Roman Kontchakov An Update on Query Answering with Restricted Forms of Negation . . . . . . 75--89 Víctor Gutiérrez-Basulto and Szymon Klarman Towards a Unifying Approach to Representing and Querying Temporal Data in Description Logics . . . . . . . . . 90--105 Tomi Janhunen and Vesa Luukkala Meta Programming with Answer Sets for Smart Spaces . . . . . . . . . . . . . . 106--121 Mélanie König and Michel Lecl\`ere and Marie-Laure Mugnier and Michaël Thomazo A Sound and Complete Backward Chaining Algorithm for Existential Rules . . . . 122--138 Senlin Liang and Michael Kifer Deriving Predicate Statistics for Logic Rules . . . . . . . . . . . . . . . . . 139--155 Thomas Lukasiewicz and Maria Vanina Martinez and Gerardo I. Simari Consistent Answers in Probabilistic Datalog$\pm$ Ontologies . . . . . . . . 156--171 Eleni Tsalapati and Giorgos Stoilos and Giorgos Stamou and George Koletsos Query Rewriting under Ontology Contraction . . . . . . . . . . . . . . 172--187 Jürgen Umbrich and Aidan Hogan and Axel Polleres and Stefan Decker Improving the Recall of Live Linked Data Querying through Reasoning . . . . . . . 188--204 Rosamaria Barilaro and Nicola Leone and Francesco Ricca and Giorgio Terracina Distributed Ontology Based Data Access via Logic Programming . . . . . . . . . 205--208 Valentinos Evripidou and Francesca Toni Argumentation and Voting for an Intelligent User Empowering Business Directory on the Web . . . . . . . . . . 209--212 Wolfgang Faber A Polynomial Reduction from ASPDA to ASP 213--216 Enrico Franconi and Nhung Ngo and Evgeny Sherkhonov The Definability Abduction Problem for Data Exchange . . . . . . . . . . . . . 217--220 Beibei Hu and Theodore Patkos and Abdelghani Chibani and Yacine Amirat Rule-Based Context Assessment in Smart Cities . . . . . . . . . . . . . . . . . 221--224 Matthias Knorr and David Carral Martínez and Pascal Hitzler and Adila A. Krisnadhi Recent Advances in Integrating OWL and Rules (Technical Communication) . . . . 225--228 Anonymous Front Matter . . . . . . . . . . . . . . ??
John Rushby The Versatile Synchronous Observer . . . 1--1 Wolfram Schulte Thirteen Years of Automated Code Analysis at Microsoft . . . . . . . . . 2--2 Araceli Acosta and Cecilia Kilmurray Model Checking Propositional Deontic Temporal Logic via a $\mu$-Calculus Characterization . . . . . . . . . . . . 3--18 Haniel Barbosa and David Déharbe An Approach Using the B Method to Formal Verification of PLC Programs in an Industrial Setting . . . . . . . . . . . 19--34 Fernando A. F. Braz and Jader S. Cruz Palytoxin Inhibits the Sodium-Potassium Pump --- An Investigation of an Electrophysiological Model Using Probabilistic Model Checking . . . . . . 35--50 Ernesto C. B. de Matos BETA: a B Based Testing Approach . . . . 51--66 Gustavo Carvalho and Diogo Falcão A Process Algebra Based Strategy for Generating Test Vectors from SCR Specifications . . . . . . . . . . . . . 67--82 Simone André da Costa Cavalheiro Specification Patterns for Properties over Reachable States of Graph Grammars 83--98 Jim Davies and Jeremy Gibbons and David Milward Compositionality and Refinement in Model-Driven Engineering . . . . . . . . 99--114 André Didier and Alexandre Mota Identifying Hardware Failures Systematically . . . . . . . . . . . . . 115--130 Yanhong Huang and Yongxin Zhao and Jianqi Shi Investigating Time Properties of Interrupt-Driven Programs . . . . . . . 131--146 Germán Regis and Nicolás Ricci Specifying and Verifying Declarative Fluent Temporal Logic Properties of Workflows . . . . . . . . . . . . . . . 147--162 Christoph Schulz and Michael Löwe Composition of Model Transformations: A Categorical Framework . . . . . . . . . 163--178 Emil Sekerinski and Tian Zhang Verification Rules for Exception Handling in Eiffel . . . . . . . . . . . 179--193 Subodh Sharma and Ganesh Gopalakrishnan A Sound Reduction of Persistent-Sets for Deadlock Detection in MPI Applications 194--209 Dante Zanarini and Carlos Luna and Luis Sierra Alternating-Time Temporal Logic in the Calculus of (Co)Inductive Constructions 210--225 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . 1--1 Adam Kilgarriff Getting to Know Your Corpus . . . . . . 3--15 Ruslan Mitkov and Richard Evans and Constantin Or\uasan and Iustin Dornescu and Miguel Rios Coreference Resolution: To What Extent Does It Help NLP Applications? . . . . . 16--27 Anonymous Front Matter . . . . . . . . . . . . . . 29--29 \Lukasz Kobyli\'nski and Mateusz Kope\'c Semantic Similarity Functions in Word Sense Disambiguation . . . . . . . . . . 31--38 Thomas Scholz and Stefan Conrad and Lutz Hillekamps Opinion Mining on a German Corpus of a Media Response Analysis . . . . . . . . 39--46 David Pinto and Darnes Vilariño and Yuridiana Alemán and Helena Gómez and Nahun Loya The Soundex Phonetic Algorithm Revisited for SMS Text Representation . . . . . . 47--55 Magda \vSev\vcíková and Ji\vrí Mírovský Sentence Modality Assignment in the Prague Dependency Treebank . . . . . . . 56--63 Dimitrios Kokkinakis and Markus Forsberg and Sofie Johansson Kokkinakis and Frida Smith Literacy Demands and Information to Cancer Patients . . . . . . . . . . . . 64--71 Aleksander Wawer and Konrad Go\luchowski Expanding Opinion Attribute Lexicons . . 72--80 Adam Radziszewski and Szymon Aceda\'nski Taggers Gonna Tag: An Argument against Evaluating Disambiguation Capacities of Morphosyntactic Taggers . . . . . . . . 81--87 Marcin Woli\'nski and Andrzej Zaborowski An Ambiguity Aware Treebank Search Tool 88--94 Georgios Petasis and Mara Tsoumari A New Annotation Tool for Aligned Bilingual Corpora . . . . . . . . . . . 95--104 Frane \vSari\'c and Jan \vSnajder and Bojana Dalbelo Ba\vsi\'c Optimizing Sentence Boundary Detection for Croatian . . . . . . . . . . . . . . 105--111 Filip Grali\'nski Mining the Web for Idiomatic Expressions Using Metalinguistic Markers . . . . . . 112--118 Katarzyna Krasnowska and Witold Kiera\'s and Marcin Woli\'nski and Adam Przepiórkowski Using Tree Transducers for Detecting Errors in a Treebank of Polish . . . . . 119--126 Tomá\vs Jelínek and Barbora \vStindlová and Alexandr Rosen and Jirka Hana Combining Manual and Automatic Annotation of a Learner Corpus . . . . . 127--134 Márton Kiss and Ágoston Nagy and Veronika Vincze and Attila Almási and Zoltán Alexin and János Csirik A Manually Annotated Corpus of Pharmaceutical Patents . . . . . . . . . 135--142 Adam Radziszewski and Adam Pawlaczek Large-Scale Experiments with NP Chunking of Polish . . . . . . . . . . . . . . . 143--149 Milena Slavcheva Mapping a Lexical Semantic Resource to a Common Framework of Computational Lexicons . . . . . . . . . . . . . . . . 150--157 Václava Kettnerová and Markéta Lopatková and Zde\vnka Ure\vsová The Rule-Based Approach to Czech Grammaticalized Alternations . . . . . . 158--165 Goran Glava\vs and Jan \vSnajder and Bojana Dalbelo Ba\vsi\'c Semi-supervised Acquisition of Croatian Sentiment Lexicon . . . . . . . . . . . 166--173 Anonymous Front Matter . . . . . . . . . . . . . . ??