Last update: 
            
                Sat Jan 20 07:22:45 MST 2018
            
            
                          
            
                
            
        
Adrianna Kozierkiewicz-Hetma\'nska   Comparison of One-Level and Two-Level
                                  Consensuses Satisfying the 2-Optimality
                                  Criterion  . . . . . . . . . . . . . . . 1--10
            Marcin Maleszka and   
       Bernadetta Mianowska and   
              Ngoc-Thanh Nguyen   A Heuristic Method for Collaborative
                                  Recommendation Using Hierarchical User
                                  Profiles . . . . . . . . . . . . . . . . 11--20
             Quoc Uy Nguyen and   
            Trong Hai Duong and   
                   Sanggil Kang   Solving Conflict on Collaborative
                                  Knowledge via Social Networking Using
                                  Consensus Choice . . . . . . . . . . . . 21--30
              Xuan Hau Pham and   
              Jason J. Jung and   
              Ngoc-Thanh Nguyen   Integrating Multiple Experts for
                                  Correction Process in Interactive
                                  Recommendation Systems . . . . . . . . . 31--40
                  Tin Huynh and   
                     Kiem Hoang   Modeling Collaborative Knowledge of
                                  Publishing Activities for Research
                                  Recommendation . . . . . . . . . . . . . 41--50
         Thanh-Trung Nguyen and   
                 Phi-Khu Nguyen   A New Approach for Problem of Sequential
                                  Pattern Mining . . . . . . . . . . . . . 51--60
             Van-Dung Hoang and   
                   My-Ha Le and   
                   Kang-Hyun Jo   Robust Human Detection Using Multiple
                                  Scale of Cell Based Histogram of
                                  Oriented Gradients and AdaBoost Learning 61--71
           Nguyen Thanh Son and   
                 Duong Tuan Anh   Discovering Time Series Motifs Based on
                                  Multidimensional Index and Early
                                  Abandoning . . . . . . . . . . . . . . . 72--82
               Duc-Thuan Vo and   
                Cheol-Young Ock   A Hybrid Approach of Pattern Extraction
                                  and Semi-supervised Learning for
                                  Vietnamese Named Entity Recognition  . . 83--93
          Roman Pawlikowski and   
           Krzysztof Ociepa and   
  Urszula Markowska-Kaczmar and   
            Pawel B. Myszkowski   Information Extraction from Geographical
                                  Overview Maps  . . . . . . . . . . . . . 94--103
          Bogus\law Cyganek and   
              Micha\l Wo\'zniak   Pixel-Based Object Detection and
                                  Tracking with Ensemble of Support Vector
                                  Machines and Extended Structural Tensor  104--113
                     Bay Vo and   
                     Bac Le and   
                  Jason J. Jung   A Tree-Based Approach for Mining
                                  Frequent Weighted Utility Itemsets . . . 114--123
            Trong Nhan Phan and   
                Tran Khanh Dang   A Novel Trajectory Privacy-Preserving
                                  Future Time Index Structure in Moving
                                  Object Databases . . . . . . . . . . . . 124--134
           Grzegorz Skorupa and   
          Rados\law Katarzyniak   Summarizing Knowledge Base with Modal
                                  Conditionals . . . . . . . . . . . . . . 135--144
                Ali Selamat and   
             S. O. Olatunji and   
       Abdul Azeez Abdul Raheem   Modeling PVT Properties of Crude Oil
                                  Systems Based on Type-$2$ Fuzzy Logic
                                  Approach and Sensitivity Based Linear
                                  Learning Method  . . . . . . . . . . . . 145--155
      Agnieszka Jastrzebska and   
              Wladyslaw Homenda   On Structuring of the Space of Needs in
                                  the Framework of Fuzzy Sets Theory . . . 156--165
                Tomasz Wilk and   
              Micha\l Wo\'zniak   Comparison of Fuzzy Combiner Training
                                  Methods  . . . . . . . . . . . . . . . . 166--173
            Trong Hieu Tran and   
                    Quoc Bao Vo   An Axiomatic Model for Merging
                                  Stratified Belief Bases by Negotiation   174--184
             Witold Pedrycz and   
              Wladyslaw Homenda   From Fuzzy Cognitive Maps to Granular
                                  Cognitive Maps . . . . . . . . . . . . . 185--193
            Manas S. Hardas and   
                    Lisa Purvis   Bayesian Vote Weighting in Crowdsourcing
                                  Systems  . . . . . . . . . . . . . . . . 194--203
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
             Tomasz Sitarek and   
              Wladyslaw Homenda   Generic Operations in the Structured
                                  Space of the Music . . . . . . . . . . . 1--10
        Duong Thi Anh Hoang and   
                Ngoc Sy Ngo and   
              Binh Thanh Nguyen   Collective Cubing Platform towards
                                  Definition and Analysis of Warehouse
                                  Cubes  . . . . . . . . . . . . . . . . . 11--20
                Phuoc Vinh Tran   To Approach Cylindrical Coordinates to
                                  Represent Multivariable Spatio-temporal
                                  Data . . . . . . . . . . . . . . . . . . 21--28
              Tutut Herawan and   
                A. Noraziah and   
           Zailani Abdullah and   
          Mustafa Mat Deris and   
               Jemal H. Abawajy   EFP-M2: Efficient Model for Mining
                                  Frequent Patterns in Transactional
                                  Database . . . . . . . . . . . . . . . . 29--38
           Halina Kwasnicka and   
                Pawel Siemionko   Improved Sammon Mapping Method for
                                  Visualization of Multidimensional Data   39--48
 Marcin Miros\law Pietranik and   
              Ngoc Thanh Nguyen   Ontology Relation Alignment Based on
                                  Attribute Semantics  . . . . . . . . . . 49--58
            Young Chan Moon and   
                Ho Min Jung and   
                  Chuck Yoo and   
                 Young Woong Ko   Data Deduplication Using Dynamic
                                  Chunking Algorithm . . . . . . . . . . . 59--68
              Huynh Tu Dang and   
               Ha Manh Tran and   
              Phach Ngoc Vu and   
               An Truong Nguyen   Applying MapReduce Framework to
                                  Peer-to-Peer Computing Applications  . . 69--78
          Krzysztof W\kecel and   
           Tomasz Kaczmarek and   
               Agata Filipowska   Scalable Adaptation of Web Applications
                                  to Users' Behavior . . . . . . . . . . . 79--88
 César Andrés and   
                  Rui Abreu and   
    Alberto Núñez   OCE: An Online Colaborative Editor . . . 89--98
       Mohammed Nazim Uddin and   
            Trong Hai Duong and   
                 Visal Sean and   
                    Geun-Sik Jo   Construction of Semantic User Profile
                                  for Personalized Web Search  . . . . . . 99--108
                Adam Grzech and   
      Krzysztof Juszczyszyn and   
            Pawe\l Stelmach and   
                  \Lukasz Falas   Link Prediction in Dynamic Networks of
                                  Services Emerging during Deployment and
                                  Execution of Web Services  . . . . . . . 109--120
            Mahran Al-Zyoud and   
                 Imad Salah and   
                    Nadim Obeid   Towards a Model of Context Awareness
                                  Using Web Services . . . . . . . . . . . 121--131
           Leszek Borzemski and   
            Michal Danielak and   
        Anna Kaminska-Chuchmala   Short-Term Spatio-temporal Forecasts of
                                  Web Performance by Means of Turning
                                  Bands Method . . . . . . . . . . . . . . 132--141
 Przemys\law B\la\'skiewicz and   
      Miros\law Kuty\lowski and   
              Wojciech Wodo and   
                    Kamil Wolny   Extreme Propagation in an Ad-Hoc Radio
                                  Network- Revisited . . . . . . . . . . . 142--151
          Dang Thanh Chuong and   
                 Vu Duy Loi and   
              Vo Viet Minh Nhat   A Model for the Performance Analysis of
                                  SPL-OBS Core Nodes with Deflection
                                  Routing  . . . . . . . . . . . . . . . . 152--161
                 Sylvia Encheva   Ordering of Potential Collaboration
                                  Options  . . . . . . . . . . . . . . . . 162--171
            Ching-Shen Dong and   
              Ananth Srinivasan   Interface Design for Decision Systems    172--181
        Grzegorz Fedczyszyn and   
            Leszek Koszalka and   
         Iwona Pozniak-Koszalka   Opponent Modeling in Texas Hold'em Poker 182--191
                   Jacek Mercik   On Axiomatization of Power Index of Veto 192--200
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
               Mousumi Dutt and   
             Arindam Biswas and   
            Partha Bhowmick and   
        Bhargab B. Bhattacharya   On Finding Shortest Isothetic Path
                                  inside a Digital Object  . . . . . . . . 1--15
         Nilanjana Karmakar and   
             Arindam Biswas and   
                Partha Bhowmick   Fast Slicing of Orthogonal Covers Using
                                  DCEL . . . . . . . . . . . . . . . . . . 16--30
                 Peter Veelaert   Fast Combinatorial Algorithm for Tightly
                                  Separating Hyperplanes . . . . . . . . . 31--44
                    Li Chen and   
                    Soma Biswas   Digital Curvatures Applied to $3$D
                                  Object Analysis and Recognition: a Case
                                  Study  . . . . . . . . . . . . . . . . . 45--58
              Fumiki Sekiya and   
               Akihiro Sugimoto   Discrete Polynomial Curve Fitting to
                                  Noisy Data . . . . . . . . . . . . . . . 59--74
Ana Marcela Herrera-Navarro and   
Hugo Jiménez-Hernández and   
Iván Ramón Terol-Villalobos   A Probabilistic Measure of Circularity   75--89
               Tetsuo Asano and   
                   Sergey Bereg   A New Framework for Connected Components
                                  Labeling of Binary Images  . . . . . . . 90--102
               Tetsuo Asano and   
               Sergey Bereg and   
                   Lilian Buzer   Small Work Space Algorithms for Some
                                  Basic Problems on Binary Images  . . . . 103--114
                 Josef \vSlapal   Adjacencies for Structuring the Digital
                                  Plane  . . . . . . . . . . . . . . . . . 115--127
        Péter Kardos and   
Kálmán Palágyi   On Topology Preservation for Triangular
                                  Thinning Algorithms  . . . . . . . . . . 128--142
                   Benedek Nagy   Cellular Topology on the Triangular Grid 143--153
          K. G. Subramanian and   
             Ibrahim Venkat and   
               Petra Wiederhold   A P System Model for Contextual Array
                                  Languages  . . . . . . . . . . . . . . . 154--165
                 D. Lalitha and   
              K. Rangarajan and   
       Durairaj Gnanaraj Thomas   Rectangular Arrays and Petri Nets  . . . 166--180
         Thangasamy Kamaraj and   
       Durairaj Gnanaraj Thomas   Regional Hexagonal Tile Rewriting
                                  Grammars . . . . . . . . . . . . . . . . 181--195
         Thangasamy Kamaraj and   
   Durairaj Gnanaraj Thomas and   
                  H. Geetha and   
                     T. Kalyani   Partial Commutation on Array Languages   196--208
                 Anja Attig and   
                   Petra Perner   Incremental Learning of the Model for
                                  Watershed-Based Image Segmentation . . . 209--222
            Damien Gonzalez and   
     Rémy Malgouyres and   
         Henri-Alex Esbelin and   
                   Chafik Samir   Fast Level-Wise Convolution  . . . . . . 223--233
                   Phuc Ngo and   
            Yukiko Kenmochi and   
             Nicolas Passat and   
                  Hugues Talbot   Combinatorial Properties of $2$D
                                  Discrete Rigid Transformations under
                                  Pixel-Invariance Constraints . . . . . . 234--248
            Anupama Potluri and   
          Chakravarthy Bhagvati   Novel Morphological Algorithms for
                                  Dominating Sets on Graphs with
                                  Applications to Image Analysis . . . . . 249--262
             Norbert Hantos and   
 Péter Balázs and   
Kálmán Palágyi   Binary Image Reconstruction from Two
                                  Projections and Skeletal Information . . 263--273
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
                      Dan Boneh   Pairing-Based Cryptography: Past,
                                  Present, and Future  . . . . . . . . . . 1--1
                 Chuanming Zong   Some Mathematical Mysteries in Lattices  2--3
               Masayuki Abe and   
              Melissa Chase and   
             Bernardo David and   
          Markulf Kohlweiss and   
                  Ryo Nishimaki   Constant-Size Structure-Preserving
                                  Signatures: Generic Constructions and
                                  Simple Assumptions . . . . . . . . . . . 4--24
            Michael Gerbush and   
              Allison Lewko and   
               Adam O'Neill and   
                   Brent Waters   Dual Form Signatures: An Approach for
                                  Proving Security from Static Assumptions 25--42
             Takuya Hayashi and   
          Takeshi Shimoyama and   
          Naoyuki Shinohara and   
                Tsuyoshi Takagi   Breaking Pairing-Based Cryptosystems
                                  Using $\eta_T$ Pairing over ${\rm
                                  GF}(3^{97})$ . . . . . . . . . . . . . . 43--60
                   Jae Hong Seo   On the (Im)possibility of Projecting
                                  Property in Prime-Order Setting  . . . . 61--79
              Jorge Luis Villar   Optimal Reductions of Some Decisional
                                  Problems to the Rank Problem . . . . . . 80--97
            Sebastian Faust and   
               Carmit Hazay and   
        Jesper Buus Nielsen and   
       Peter Sebastian Nordholt   Signature Schemes Secure against
                                  Hard-to-Invert Leakage . . . . . . . . . 98--115
             Yehuda Lindell and   
                  Eran Omri and   
                   Hila Zarosim   Completeness for Symmetric Two-Party
                                  Functionalities- Revisited . . . . . . . 116--133
              Mihir Bellare and   
            Viet Tung Hoang and   
                Phillip Rogaway   Adaptively Secure Garbling with
                                  Applications to One-Time Programs and
                                  Secure Outsourcing . . . . . . . . . . . 134--153
                 Scott Ames and   
            Rosario Gennaro and   
Muthuramakrishnan Venkitasubramaniam   The Generalized Randomized Iterate and
                                  Its Application to New Efficient
                                  Constructions of UOWHFs from Regular
                                  One-Way Functions  . . . . . . . . . . . 154--171
               Meicheng Liu and   
                  Yin Zhang and   
                    Dongdai Lin   Perfect Algebraic Immune Functions . . . 172--189
             Florian Mendel and   
             Vincent Rijmen and   
                  Deniz Toz and   
     Kerem Varìcì   Differential Analysis of the LED Block
                                  Cipher . . . . . . . . . . . . . . . . . 190--207
             Julia Borghoff and   
              Anne Canteaut and   
           Tim Güneysu and   
           Elif Bilge Kavun and   
              Miroslav Knezevic   PRINCE --- a Low-Latency Block Cipher
                                  for Pervasive Computing Applications . . 208--225
            Gaëtan Leurent   Analysis of Differential Attacks in ARX
                                  Constructions  . . . . . . . . . . . . . 226--243
            Andrey Bogdanov and   
             Gregor Leander and   
               Kaisa Nyberg and   
                    Meiqin Wang   Integral and Multidimensional Linear
                                  Distinguishers with Correlation Zero . . 244--261
                 Hongjun Wu and   
                  Tao Huang and   
           Phuong Ha Nguyen and   
              Huaxiong Wang and   
                       San Ling   Differential Attacks against Stream
                                  Cipher ZUC . . . . . . . . . . . . . . . 262--277
             Rodolphe Lampe and   
            Jacques Patarin and   
                 Yannick Seurin   An Asymptotically Tight Security
                                  Analysis of the Iterated Even-Mansour
                                  Cipher . . . . . . . . . . . . . . . . . 278--295
               Liting Zhang and   
                 Wenling Wu and   
                    Han Sui and   
                      Peng Wang   3kf9: Enhancing 3GPP-MAC beyond the
                                  Birthday Bound . . . . . . . . . . . . . 296--312
            Dimitar Jetchev and   
             Onur Özen and   
                   Martijn Stam   Understanding Adaptivity: Random Systems
                                  Revisited  . . . . . . . . . . . . . . . 313--330
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
               Amihood Amir and   
         Alberto Apostolico and   
             Estrella Eisenberg   Detecting Approximate Periodic Patterns  1--12
               Grey Ballard and   
               James Demmel and   
                     Olga Holtz   Graph Expansion Analysis for
                                  Communication Costs of Fast Rectangular
                                  Matrix Multiplication  . . . . . . . . . 13--36
              Nikhil Bansal and   
               Anupam Gupta and   
       Ravishankar Krishnaswamy   Multicast Routing for Energy
                                  Minimization Using Speed Scaling . . . . 37--51
                  Guy Baram and   
                     Tami Tamir   Reoptimization of the Minimum Total
                                  Flow-Time Scheduling Problem . . . . . . 52--66
               Neal Barcelo and   
                  Miao Zhou and   
                Daniel Cole and   
                 Michael Nugent   Energy Efficient Caching for
                                  Phase-Change Memory  . . . . . . . . . . 67--81
               Neal Barcelo and   
                 Sungjin Im and   
           Benjamin Moseley and   
                     Kirk Pruhs   Shortest-Elapsed-Time-First on a
                                  Multiprocessor . . . . . . . . . . . . . 82--92
           Gernot Veit Batz and   
          Robert Geisberger and   
                   Dennis Luxen   Efficient Route Compression for Hybrid
                                  Route Planning . . . . . . . . . . . . . 93--107
              Shiri Chechik and   
            Quentin Godfroy and   
                    David Peleg   Multipath Spanners via Fault-Tolerant
                                  Spanners . . . . . . . . . . . . . . . . 108--119
              Morgan Chopin and   
   André Nichterlein and   
               Rolf Niedermeier   Constant Thresholds Can Make Target Set
                                  Selection Tractable  . . . . . . . . . . 120--133
                   Fabio Cunial   Faster Variance Computation for Patterns
                                  with Gaps  . . . . . . . . . . . . . . . 134--147
       Gianlorenzo D'Angelo and   
                Mattia D'Emidio   Enhancing the Computation of Distributed
                                  Shortest Paths on Real Dynamic Networks  148--158
             Benjamin Doerr and   
               Mahmoud Fouz and   
               Tobias Friedrich   Experimental Analysis of Rumor Spreading
                                  in Social Networks . . . . . . . . . . . 159--173
            Mourad El Ouali and   
              Helena Fohlin and   
                Anand Srivastav   A Randomised Approximation Algorithm for
                                  the Partial Vertex Cover Problem in
                                  Hypergraphs  . . . . . . . . . . . . . . 174--187
               Fabian Fuchs and   
         Markus Völker and   
                Dorothea Wagner   Simulation-Based Analysis of Topology
                                  Control Algorithms for Wireless Ad Hoc
                                  Networks . . . . . . . . . . . . . . . . 188--202
        Michael T. Goodrich and   
           Daniel S. Hirschberg   Cache-Oblivious Dictionaries and
                                  Multimaps with Negligible Failure
                                  Probability  . . . . . . . . . . . . . . 203--218
          Robert Görke and   
               Roland Kluge and   
                  Andrea Schumm   An Efficient Generator for Clustered
                                  Dynamic Random Networks  . . . . . . . . 219--233
                Peter Kling and   
          Andreas Cord-Landwehr   Slow Down and Sleep for Profit in Online
                                  Deadline Scheduling  . . . . . . . . . . 234--247
               Kirill Kogan and   
   Alejandro López-Ortiz   FIFO Queueing Policies for Packets with
                                  Heterogeneous Processing . . . . . . . . 248--260
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
                Andrea Moio and   
           Attilio Giordana and   
                   Dino Mendola   An Anti-tampering Algorithm Based on an
                                  Artificial Intelligence Approach . . . . 1--10
                      Jan Rauch   Domain Knowledge and Data Mining with
                                  Association Rules --- a Logical Point of
                                  View . . . . . . . . . . . . . . . . . . 11--20
         Pawe\l Betli\'nski and   
             Dominik \'Sl\kezak   The Problem of Finding the Sparsest
                                  Bayesian Network for an Input Data Set
                                  is NP-Hard . . . . . . . . . . . . . . . 21--30
    Philippe Fournier-Viger and   
               Vincent S. Tseng   Mining Top-$K$ Non-redundant Association
                                  Rules  . . . . . . . . . . . . . . . . . 31--40
                 Matej Guid and   
            Martin Mo\vzina and   
               Vida Groznik and   
             Dejan Georgiev and   
             Aleksander Sadikov   ABML Knowledge Refinement Loop: a Case
                                  Study  . . . . . . . . . . . . . . . . . 41--50
          Jennifer Lavergne and   
                Ryan Benton and   
              Vijay V. Raghavan   Min-Max Itemset Trees for Dense and
                                  Categorical Datasets . . . . . . . . . . 51--60
          Jennifer Lavergne and   
                Ryan Benton and   
              Vijay V. Raghavan   TRARM-RelSup: Targeted Rare Association
                                  Rule Mining Using Itemset Trees and the
                                  Relative Support Measure . . . . . . . . 61--70
            Shusaku Tsumoto and   
                   Shoji Hirano   Incremental Rules Induction Method Based
                                  on Three Rule Layers . . . . . . . . . . 71--80
                 Asma Ammar and   
               Zied Elouedi and   
                  Pawan Lingras   RPKM: The Rough Possibilistic $K$-Modes  81--86
                 Jan Kohout and   
                   Roman Neruda   Exploration and Exploitation Operators
                                  for Genetic Graph Clustering Algorithm   87--92
           Patrick G. Clark and   
    Jerzy W. Grzymala-Busse and   
             Martin Kuehnhausen   Local Probabilistic Approximations for
                                  Incomplete Data  . . . . . . . . . . . . 93--98
           Piotr Andruszkiewicz   On the Relations between Retention
                                  Replacement, Additive Perturbation, and
                                  Randomisations for Nominal Attributes in
                                  Privacy Preserving Data Mining . . . . . 99--104
               Sujata Ghosh and   
          Thiri Haymar Kyaw and   
               Rineke Verbrugge   Decision Support for Extensive Form
                                  Negotiation Games  . . . . . . . . . . . 105--114
                 Yuxin Meng and   
                 Wenjuan Li and   
                   Lam-for Kwok   Intelligent Alarm Filter Using
                                  Knowledge-Based Alert Verification in
                                  Network Intrusion Detection  . . . . . . 115--124
                   Chao Gao and   
                     Jiming Liu   Clustering-Based Media Analysis for
                                  Understanding Human Emotional Reactions
                                  in an Extreme Event  . . . . . . . . . . 125--135
            Gabriel Pestana and   
             Joachim Metter and   
         Sebastian Heuchler and   
                     Pedro Reis   An Event-Driven Architecture for
                                  Spatio-temporal Surveillance of Business
                                  Activities . . . . . . . . . . . . . . . 136--142
             \Lukasz Brocki and   
          Krzysztof Marasek and   
             Danijel Kor\vzinek   Multiple Model Text Normalization for
                                  the Polish Language  . . . . . . . . . . 143--148
          Janardhana Punuru and   
                   Jianhua Chen   Discovering Semantic Relations Using
                                  Prepositional Phrases  . . . . . . . . . 149--154
    Alina Wróblewska and   
                   Marcin Sydow   DEBORA: Dependency-Based Method for
                                  Extracting Entity-Relationship Triples
                                  from Open-Domain Texts in Polish . . . . 155--161
         Grzegorz Protaziuk and   
     Anna Wróblewska and   
            Robert Bembenik and   
              Henryk Rybi\'nski   Lexical Ontology Layer --- a Bridge
                                  between Text and Concepts  . . . . . . . 162--171
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
                    Lu Xiao and   
                       Ming Fan   Does Social Network Always Promote
                                  Entrepreneurial Intentions? Part I:
                                  Theoretical Model  . . . . . . . . . . . 1--7
              Samreen Feroz and   
               Amatal Habib and   
            Maryam Siddiqua and   
               Sobia Saleem and   
               Nisar Ahmed Shar   Association of Anti-Histamine Drugs with
                                  Brain Tumor  . . . . . . . . . . . . . . 8--15
                      Qiuyu Zhu   Estimating Principal Point and Nonlinear
                                  Parameters of Camera from a Planar
                                  Calibration Image  . . . . . . . . . . . 16--24
                Vipul Arora and   
               Laxmidhar Behera   Design of Distribution Independent Noise
                                  Filters with Online PDF Estimation . . . 25--32
                     Xia Wu and   
                    Juan Li and   
                         Li Yao   Determining Effective Connectivity from
                                  FMRI Data Using a Gaussian Dynamic
                                  Bayesian Network . . . . . . . . . . . . 33--39
               A. G. Radwan and   
               Ahmed S. Elwakil   Transient-Time Fractional-Space
                                  Trigonometry and Application . . . . . . 40--47
    Manjusri Wickramasinghe and   
         Jayantha Rajapakse and   
             Damminda Alahakoon   Understanding Individual Play Sequences
                                  Using Growing Self Organizing Maps . . . 48--55
             Noor Almaadeed and   
                Amar Aggoun and   
                    Abbes Amira   Audio-Visual Feature Fusion for Speaker
                                  Identification . . . . . . . . . . . . . 56--67
                Xiaoxu Kang and   
              Marc Schieber and   
               Nitish V. Thakor   Decoding Cognitive States from Neural
                                  Activities of Somatosensory Cortex . . . 68--75
     Kleanthis C. Neokleous and   
       Marios N. Avraamides and   
        Costas K. Neocleous and   
            Christos N. Schizas   Cognitive Modeling of Dilution Effects
                                  in Visual Search . . . . . . . . . . . . 76--83
               Wajid Mumtaz and   
                  Likun Xia and   
          Aamir Saeed Malik and   
          Mohd Azhar Mohd Yasin   Complexity Analysis of EEG Data during
                                  Rest State and Visual Stimulus . . . . . 84--91
               Ahmed Al-Ani and   
               Bram Van Dun and   
              Harvey Dillon and   
                   Alaleh Rabie   Analysis of Alertness Status of Subjects
                                  Undergoing the Cortical Auditory Evoked
                                  Potential Hearing Test . . . . . . . . . 92--99
            Preetinder Kaur and   
                Madhu Goyal and   
                         Jie Lu   Price Forecasting Using Dynamic
                                  Assessment of Market Conditions and
                                  Agent's Bidding Behavior . . . . . . . . 100--108
          Takafumi Kanamori and   
                   Akiko Takeda   Non-convex Optimization on Stiefel
                                  Manifold and Applications to Machine
                                  Learning . . . . . . . . . . . . . . . . 109--116
        Liviu Petrisor Dinu and   
         Radu-Tudor Ionescu and   
                 Marius Popescu   Local Patch Dissimilarity for Images . . 117--126
                Dehua Zhang and   
                 Derong Liu and   
                    Qinglai Wei   Nearly Optimal Control for Nonlinear
                                  Systems with Dead-Zone Control Input
                                  Based on the Iterative ADP Approach  . . 127--134
           Sadjia Benkhider and   
              Oualid Dahmri and   
                   Habiba Drias   A Memetic Approach for the Knowledge
                                  Extraction . . . . . . . . . . . . . . . 135--141
                Xiaohua Liu and   
               Haoran Liang and   
                Haiwei Dong and   
              Nikolaos Mavridis   Development of a Novel Conversational
                                  Calculator Based on Remote Online
                                  Computation  . . . . . . . . . . . . . . 142--151
               Saima Hassan and   
             Abbas Khosravi and   
           Jafreezal Jaafar and   
            Samir B. Belhaouari   Load Forecasting Accuracy through
                                  Combination of Trimmed Forecasts . . . . 152--159
         Julian Szyma\'nski and   
              W\lodzis\law Duch   Self Organizing Maps for Visualization
                                  of Categories  . . . . . . . . . . . . . 160--167
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
             Freha Mezzoudj and   
                Assia Benyettou   On the Optimization of Multiclass
                                  Support Vector Machines Dedicated to
                                  Speech Recognition . . . . . . . . . . . 1--8
               Yangming Guo and   
                 Xiaolei Li and   
               Guanghan Bai and   
                    Jiezhong Ma   Time Series Prediction Method Based on
                                  LS-SVR with Modified Gaussian RBF  . . . 9--17
                   Ran Wang and   
                Guoyou Wang and   
                 Zhong Chen and   
                Jianguo Liu and   
                         Yu Shi   An Improved Method of Identification
                                  Based on Thermal Palm Vein Image . . . . 18--24
                Majeed Safa and   
           Sandhya Samarasinghe   Modelling Energy Use and Fuel
                                  Consumption in Wheat Production Using
                                  Indirect Factors and Artificial Neural
                                  Networks . . . . . . . . . . . . . . . . 25--32
                 Anam Tariq and   
             Arslan Shaukat and   
                  Shoab A. Khan   A Gaussian Mixture Model Based System
                                  for Detection of Macula in Fundus Images 33--40
              Tobias Brosch and   
                  Heiko Neumann   The Brain's Sequential Parallelism:
                                  Perceptual Decision-Making and Early
                                  Sensory Responses  . . . . . . . . . . . 41--50
                Shinsuke Koyama   Estimating Neural Firing Rates: An
                                  Empirical Bayes Approach . . . . . . . . 51--59
Jose Salvador Sánchez and   
      Vicente García and   
      Ana Isabel Marqués   Assessment of Financial Risk Prediction
                                  Models with Multi-criteria Decision
                                  Making Methods . . . . . . . . . . . . . 60--67
      Vicente García and   
  Ana Isabel Marqués and   
   Jose Salvador Sánchez   Improving Risk Predictions by
                                  Preprocessing Imbalanced Credit Data . . 68--75
         Mohamed Aymen Slim and   
         Maroua El Kastouri and   
             Afef Abdelkrim and   
               Mohamed Benrejeb   Hybrid Validation of Handwriting Process
                                  Modelling  . . . . . . . . . . . . . . . 76--84
Abdulrahman Alalshekmubarak and   
               Amir Hussain and   
                  Qiu-Feng Wang   Off-Line Handwritten Arabic Word
                                  Recognition Using SVMs with Normalized
                                  Poly Kernel  . . . . . . . . . . . . . . 85--91
                      Jinhua Xu   Bayesian Modeling of Visual Attention    92--99
               Xu-Cheng Yin and   
               Kaizhu Huang and   
               Hong-Wei Hao and   
               Khalid Iqbal and   
                   Zhi-Bin Wang   Classifier Ensemble Using a Heuristic
                                  Learning with Sparsity and Diversity . . 100--107
          Takashi Mitsuishi and   
         Takanori Terashima and   
               Yasunari Shidama   Optimization of SIRMs Fuzzy Model Using
                                  \Lukasiewicz Logic . . . . . . . . . . . 108--116
            Nariman Mahdavi and   
             Jürgen Kurths   Synchronization of Hopfield Like Chaotic
                                  Neural Networks with Structure Based
                                  Learning . . . . . . . . . . . . . . . . 117--124
          Andrew P. Papli\'nski   Incremental Self-Organizing Map (iSOM)
                                  in Categorization of Visual Objects  . . 125--132
                 Dror Cohen and   
          Andrew P. Papli\'nski   The Elastic Net as Visual Category
                                  Representation: Visualisation and
                                  Classification . . . . . . . . . . . . . 133--140
             Sebastien Naze and   
                      Jan Treur   A Computational Model for Development of
                                  Post-Traumatic Stress Disorders by
                                  Hebbian Learning . . . . . . . . . . . . 141--151
           Toshikazu Samura and   
            Yasuomi D. Sato and   
               Yuji Ikegaya and   
             Hatsuo Hayashi and   
                 Takeshi Aihara   Power-Law Scaling of Synchronization
                                  Robustly Reproduced in the Hippocampal
                                  CA3 Slice Culture Model with Small-World
                                  Topology . . . . . . . . . . . . . . . . 152--159
       Hamidreza Jamalabadi and   
         Hossein Nasrollahi and   
      Majid Nili Ahmadabadi and   
            Babak Nadjar Araabi   A Dynamic Bio-inspired Model of
                                  Categorization . . . . . . . . . . . . . 160--167
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
              Do-Thanh Sang and   
               Dong-Min Woo and   
                 Dong-Chul Park   Centroid Neural Network with Simulated
                                  Annealing and Its Application to Color
                                  Image Segmentation . . . . . . . . . . . 1--8
                       Ali Awad   Efficient Non-linear Filter for Impulse
                                  Noise Removal in Document Images . . . . 9--16
             Souhir Bouaziz and   
               Habib Dhahri and   
                  Adel M. Alimi   Evolving Flexible Beta Operator Neural
                                  Trees (FBONT) for Time Series
                                  Forecasting  . . . . . . . . . . . . . . 17--24
                 Wentao Fan and   
                 Nizar Bouguila   Nonparametric Localized Feature
                                  Selection via a Dirichlet Process
                                  Mixture of Generalized Dirichlet
                                  Distributions  . . . . . . . . . . . . . 25--33
 Kiatichai Treerattanapitak and   
         Chuleerat Jaruskulchai   Generalized Agglomerative Fuzzy
                                  Clustering . . . . . . . . . . . . . . . 34--41
                   Ming Liu and   
                    Lei Lin and   
                  Lili Shan and   
                   Chengjie Sun   A Novel Self-Adaptive Clustering
                                  Algorithm for Dynamic Data . . . . . . . 42--49
                 Chaojie Li and   
             David Yang Gao and   
                       Chao Liu   Impulsive Synchronization of State
                                  Delayed Discrete Complex Networks with
                                  Switching Topology . . . . . . . . . . . 50--57
                Liming Yuan and   
                 Songbo Liu and   
            Qingcheng Huang and   
                Jiafeng Liu and   
                 Xianglong Tang   Salient Instance Selection for
                                  Multiple-Instance Learning . . . . . . . 58--67
              Meng Qingfeng and   
                 Du Jianguo and   
                        Li Zhen   Motivating Retail Marketing Efforts
                                  under Fairness Concerns in Small-World
                                  Networks: a Multi-agent Simulation . . . 68--75
                Dunwei Gong and   
                  Jian Chen and   
                Xiaoyan Sun and   
                     Yong Zhang   Application of Variational Granularity
                                  Language Sets in Interactive Genetic
                                  Algorithms . . . . . . . . . . . . . . . 76--83
             Tatsuya Yokota and   
           Andrzej Cichocki and   
             Yukihiko Yamashita   Linked PARAFAC/CP Tensor Decomposition
                                  and Its Fast Implementation for
                                  Multi-block Tensor Analysis  . . . . . . 84--91
                   Gang Xie and   
                Hong-Bo Guo and   
                Yu-Chu Tian and   
                    Maolin Tang   A Human-Simulated Immune Evolutionary
                                  Computation Approach . . . . . . . . . . 92--99
                 Lu Zhenwei and   
              Zhao Lingling and   
                Su Xiaohong and   
                      Ma Peijun   A STPHD-Based Multi-sensor Fusion Method 100--107
               Satoshi Hara and   
                 Takashi Washio   Group Sparse Inverse Covariance
                                  Selection with a Dual Augmented
                                  Lagrangian Method  . . . . . . . . . . . 108--115
                 Yinglu Liu and   
               Xu-Yao Zhang and   
               Kaizhu Huang and   
                 Xinwen Hou and   
                  Cheng-Lin Liu   Multiple Outlooks Learning with Support
                                  Vector Machines  . . . . . . . . . . . . 116--124
              P. K. Srijith and   
                Shirish Shevade   Multi-Task Learning Using Shared and
                                  Task Specific Information  . . . . . . . 125--132
             Sepehr Eghbali and   
      Majid Nili Ahmadabadi and   
        Babak Nadjar Araabi and   
                  Maryam Mirian   Learning Attentive Fusion of Multiple
                                  Bayesian Network Classifiers . . . . . . 133--140
          Amira Samy Talaat and   
              Amir F. Atiya and   
           Sahar A. Mokhtar and   
               Ahmed Al-Ani and   
                    Magda Fayek   Multiclass Penalized Likelihood Pattern
                                  Classification Algorithm . . . . . . . . 141--148
           Piotr P\lo\'nski and   
              Krzysztof Zaremba   Self-Organising Maps for Classification
                                  with Metropolis--Hastings Algorithm for
                                  Supervision  . . . . . . . . . . . . . . 149--156
                Yinghua Han and   
               Jinkuan Wang and   
                 Qiang Zhao and   
                       Peng Han   Decoupled $2$-D DOA Estimation Algorithm
                                  Based on Cross-Correlation Matrix for
                                  Coherently Distributed Source  . . . . . 157--165
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
            Theodor Dan Popescu   Neural Network Learning for Blind Source
                                  Separation with Application in Dam
                                  Safety Monitoring  . . . . . . . . . . . 1--8
            Jayamol Mathews and   
              Madhu S. Nair and   
                        Liza Jo   Improved BTC Algorithm for Gray Scale
                                  Images Using $K$-Means Quad Clustering   9--17
      Christoph Sulzbachner and   
         Martin Humenberger and   
         Ágoston Srp and   
                   Ferenc Vajda   Optimization of a Neural Network for
                                  Computer Vision Based Fall Detection
                                  with Fixed-Point Arithmetic  . . . . . . 18--26
                     Yan Tu and   
                   Zijiang Yang   Customer Relationship Management Using
                                  Partial Focus Feature Reduction  . . . . 27--35
       Muhammad Usman Akram and   
             Mahmood Akhtar and   
                M. Younus Javed   An Automated System for the Grading of
                                  Diabetic Maculopathy in Fundus Images    36--43
                Yun-zhi Zou and   
                 Xin-kun Wu and   
              Wen-bin Zhang and   
                  Chang-yin Sun   An Iterative Method for a Class of
                                  Generalized Global Dynamical System
                                  Involving Fuzzy Mappings in Hilbert
                                  Spaces . . . . . . . . . . . . . . . . . 44--51
           Jesada Kajornrit and   
               Kok Wai Wong and   
                  Chun Che Fung   Estimation of Missing Precipitation
                                  Records Using Modular Artificial Neural
                                  Networks . . . . . . . . . . . . . . . . 52--59
                 Ameer H. Morad   Office Employees Authentication Based on
                                  E-exam Techniques  . . . . . . . . . . . 60--65
             Karthik Nagesh and   
             M. Narasimha Murty   Obtaining Single Document Summaries
                                  Using Latent Dirichlet Allocation  . . . 66--74
              Chu-Kiong Loo and   
                  Ali Memariani   Object Recognition Using Sparse
                                  Representation of Overcomplete
                                  Dictionary . . . . . . . . . . . . . . . 75--82
                  Jia Zheng and   
                Mengyao Zhu and   
                  Junwei He and   
                    Xiaoqing Yu   PEAQ Compatible Audio Quality Estimation
                                  Using Computational Auditory Model . . . 83--90
                Sagar Dewan and   
         Srinivasa Chakravarthy   A System for Offline Character
                                  Recognition Using Auto-encoder Networks  91--99
                Xiaoyan Yan and   
                   Bo Liang and   
                    Tao Ban and   
               Shanqing Guo and   
                    Liming Wang   TrafficS: a Behavior-Based Network
                                  Traffic Classification Benchmark System
                                  with Traffic Sampling Functionality  . . 100--107
                 Iyad Abu Doush   Harmony Search with Multi-Parent
                                  Crossover for Solving IEEE-CEC2011
                                  Competition Problems . . . . . . . . . . 108--114
           Wojciech Kacalak and   
                Maciej Majewski   New Intelligent Interactive Automated
                                  Systems for Design of Machine Elements
                                  and Assemblies . . . . . . . . . . . . . 115--122
                    Xiao Fu and   
                    Jin Liu and   
               Haopeng Wang and   
                  Bin Zhang and   
                        Rui Gao   Rough Sets and Neural Networks Based
                                  Aerial Images Segmentation Method  . . . 123--131
                   Shen Ren and   
             Michael Barlow and   
              Hussein A. Abbass   Frontal Cortex Neural Activities Shift
                                  Cognitive Resources Away from Facial
                                  Activities in Real-Time Problem Solving  132--139
               Geon-min Kim and   
             Chang-hyun Kim and   
                  Soo-young Lee   Implement Real-Time Polyphonic Pitch
                                  Detection and Feedback System for the
                                  Melodic Instrument Player  . . . . . . . 140--147
            Naotake Kamiura and   
               Ayumu Saitoh and   
            Teijiro Isokawa and   
            Nobuyuki Matsui and   
                Hitoshi Tabuchi   Classification of Interview Sheets Using
                                  Self-Organizing Maps for Determination
                                  of Ophthalmic Examinations . . . . . . . 148--155
              Slamet Widodo and   
               Tomoo Shiigi and   
             Naing Min Than and   
               Yuichi Ogawa and   
                   Naoshi Kondo   Sound-Based Ranging System in Greenhouse
                                  Environment with Multipath Effect
                                  Compensation Using Artificial Neural
                                  Network  . . . . . . . . . . . . . . . . 156--163
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
                    Lu Xiao and   
                       Ming Fan   Does Social Network always Promote
                                  Entrepreneurial Intentions? Part II:
                                  Empirical Analysis . . . . . . . . . . . 1--8
                 Xuzhi Wang and   
               Yangyang Jia and   
                 Xiang Feng and   
                   Shuai Yu and   
                 Hengyong Jiang   Rasterization System for Mobile Device   9--16
                 Xuzhi Wang and   
                  Wei Xiong and   
                 Xiang Feng and   
                   Shuai Yu and   
                 Hengyong Jiang   Study on Rasterization Algorithm for
                                  Graphics Acceleration System . . . . . . 17--24
              Yoshifusa Ito and   
             Hiroyuki Izumi and   
             Cidambi Srinivasan   Simultaneous Learning of Several
                                  Bayesian and Mahalanobis Discriminant
                                  Functions by a Neural Network with
                                  Memory Nodes . . . . . . . . . . . . . . 25--33
           Andrzej \'Sluzek and   
         Mariusz Paradowski and   
                  Duanduan Yang   Reinforcement of Keypoint Matching by
                                  Co-segmentation in Object Retrieval:
                                  Face Recognition Case Study  . . . . . . 34--41
               Hiroaki Kudo and   
                Takuya Kume and   
                 Noboru Ohnishi   Effect of Luminance Gradients in
                                  Measurement of Differential Limen  . . . 42--49
             Weicheng Huang and   
             Shuichi Kurogi and   
                Takeshi Nishida   Robust Controller for Flexible
                                  Specifications Using Difference Signals
                                  and Competitive Associative Nets . . . . 50--58
                  Kohei Ono and   
             Shuichi Kurogi and   
                Takeshi Nishida   Moments of Predictive Deviations for
                                  Ensemble Diversity Measures to Estimate
                                  the Performance of Time Series
                                  Prediction . . . . . . . . . . . . . . . 59--66
                  Satoru Morita   Self-Organized Three Dimensional Feature
                                  Extraction of MRI and CT . . . . . . . . 67--74
                    Yao Yao and   
                    Xin Xin and   
                       Ping Guo   OMP or BP? A Comparison Study of Image
                                  Fusion Based on Joint Sparse
                                  Representation . . . . . . . . . . . . . 75--82
                  P. M. Yan and   
                  Meng Yang and   
                  Hui Huang and   
                       J. F. Li   An Improved Approach to Super Resolution
                                  Based on PET Imaging . . . . . . . . . . 83--90
               Zhi-Bin Wang and   
               Hong-Wei Hao and   
                     Yan Li and   
               Xu-Cheng Yin and   
                       Shu Tian   Pedestrian Analysis and Counting System
                                  with Videos  . . . . . . . . . . . . . . 91--99
                    Ya Zhao and   
                    Xiaodong Gu   Vehicle License Plate Localization and
                                  License Number Recognition Using
                                  Unit-Linking Pulse Coupled Neural
                                  Network  . . . . . . . . . . . . . . . . 100--108
              Shenghui Zhou and   
                   Qing Liu and   
               Jianming Guo and   
                 Yuanyuan Jiang   ROI-HOG and LBP Based Human Detection
                                  via Shape Part-Templates Matching  . . . 109--115
       Rossella Cancelliere and   
                  Mario Gai and   
         Thierry Arti\`eres and   
              Patrick Gallinari   Matrix Pseudoinversion for Image Neural
                                  Processing . . . . . . . . . . . . . . . 116--125
                Jan Mattner and   
               Sascha Lange and   
              Martin Riedmiller   Learn to Swing Up and Balance a Real
                                  Pole Based on Raw Visual Input Data  . . 126--133
              Alan W. Y. Lo and   
                 Benben Liu and   
               Ray C. C. Cheung   GPU-Based Biclustering for Neural
                                  Information Processing . . . . . . . . . 134--141
               Haifeng Sima and   
                Lixiong Liu and   
                       Ping Guo   Color Image Segmentation Based on
                                  Regional Saliency  . . . . . . . . . . . 142--150
                Man To Wong and   
               Xiangjian He and   
                Hung Nguyen and   
                  Wei-Chang Yeh   Mass Classification in Digitized
                                  Mammograms Using Texture Features and
                                  Artificial Neural Network  . . . . . . . 151--158
                 Zhongyi Hu and   
                   Qing Liu and   
              Shenghui Zhou and   
             Mingjing Huang and   
                       Fei Teng   Image Dehazing Algorithm Based on
                                  Atmosphere Scatters Approximation Model  159--168
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
           Vinod Vaikuntanathan   How to Compute on Encrypted Data . . . . 1--15
                  Orr Dunkelman   From Multiple Encryption to Knapsacks
                                  --- Efficient Dissection of Composite
                                  Problems . . . . . . . . . . . . . . . . 16--16
         Thorsten Kleinjung and   
           Arjen K. Lenstra and   
                   Dan Page and   
                 Nigel P. Smart   Using the Cloud to Determine Key
                                  Strengths  . . . . . . . . . . . . . . . 17--39
            Hemanta K. Maji and   
          Manoj Prabhakaran and   
                   Mike Rosulek   A Unified Characterization of
                                  Completeness and Triviality for Secure
                                  Function Evaluation  . . . . . . . . . . 40--59
            Sebastian Faust and   
          Markulf Kohlweiss and   
     Giorgia Azzurra Marson and   
                Daniele Venturi   On the Non-malleability of the
                                  Fiat--Shamir Transform . . . . . . . . . 60--79
              Arpita Maitra and   
                    Goutam Paul   Another Look at Symmetric Incoherent
                                  Optimal Eavesdropping against BB84 . . . 80--99
               Chaya Ganesh and   
                Vipul Goyal and   
                    Satya Lokam   On-Line/Off-Line Leakage Resilient
                                  Secure Computation Protocols . . . . . . 100--119
              Claude Carlet and   
            Jean-Luc Danger and   
            Sylvain Guilley and   
               Houssem Maghrebi   Leakage Squeezing of Order Two . . . . . 120--139
         Christophe Clavier and   
                Benoit Feix and   
           Georges Gagnerot and   
          Christophe Giraud and   
            Myl\`ene Roussellet   ROSETTA for Single Trace Analysis  . . . 140--155
            Mario Lamberger and   
             Florian Mendel and   
                 Vincent Rijmen   Collision Attack on the Hamsi-256
                                  Compression Function . . . . . . . . . . 156--171
         Tuomas Kortelainen and   
                Ari Vesanen and   
               Juha Kortelainen   Generalized Iterated Hash Functions
                                  Revisited: New Complexity Bounds for
                                  Multicollision Attacks . . . . . . . . . 172--190
            Subhadeep Banik and   
            Subhamoy Maitra and   
                 Santanu Sarkar   A Differential Fault Attack on the Grain
                                  Family under Reasonable Assumptions  . . 191--208
          Thierry P. Berger and   
                  Marine Minier   Cryptanalysis of Pseudo-random
                                  Generators Based on Vectorial FCSRs  . . 209--224
             Patrick Derbez and   
        Pierre-Alain Fouque and   
      Jérémy Jean   Faster Chosen-Key Distinguishers on
                                  Reduced-Round AES  . . . . . . . . . . . 225--243
                 Jiqiang Lu and   
             Yongzhuang Wei and   
               Jongsung Kim and   
                   Enes Pasalic   The Higher-Order Meet-in-the-Middle
                                  Attack and Its Application to the
                                  Camellia Block Cipher  . . . . . . . . . 244--264
                      Yu Sasaki   Double-SP Is Weaker Than Single-SP:
                                  Rebound Attacks on Feistel Ciphers with
                                  Several Rounds . . . . . . . . . . . . . 265--282
                Shengbao Wu and   
                 Mingsheng Wang   Automatic Search of Truncated Impossible
                                  Differentials for Word-Oriented Block
                                  Ciphers  . . . . . . . . . . . . . . . . 283--302
               Jung Woo Kim and   
                Jungjoo Seo and   
                   Jin Hong and   
                Kunsoo Park and   
                  Sung-Ryul Kim   High-Speed Parallel Implementations of
                                  the Rainbow Method in a Heterogeneous
                                  System . . . . . . . . . . . . . . . . . 303--316
        Daniel J. Bernstein and   
                    Tanja Lange   Computing Small Discrete Logarithms
                                  Faster . . . . . . . . . . . . . . . . . 317--338
           Ingo von Maurich and   
               Tim Güneysu   Embedded Syndrome-Based Hashing  . . . . 339--357
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
                      Mi Li and   
               Dongning Han and   
                 Shengfu Lu and   
                  Zheng Liu and   
                     Ning Zhong   Associative Information Processing in
                                  Parahippocampal Place Area (PPA): An
                                  fMRI Study . . . . . . . . . . . . . . . 1--9
                  Qingyuan Tian   Language Acquisition Is an Optimized
                                  Process Balanced between Holistic and
                                  Compositive  . . . . . . . . . . . . . . 10--17
               Chin Ian Lou and   
             Daria Migotina and   
          Joao P. Rodrigues and   
                Joao Semedo and   
                   Feng Wan and   
                    Peng Un Mak   Object Recognition Test in Peripheral
                                  Vision: a Study on the Influence of
                                  Object Color, Pattern and Shape  . . . . 18--26
                 Sanxia Fan and   
                 Xuyan Wang and   
               Zhizhou Liao and   
               Zhoujun Long and   
                Haiyan Zhou and   
                      Yulin Qin   Basic Level Advantage during Information
                                  Retrieval: An ERP Study  . . . . . . . . 27--37
               Zhoujun Long and   
                 Xuyan Wang and   
            Xiangsheng Shen and   
                 Sanxia Fan and   
                Haiyan Zhou and   
                      Yulin Qin   A Skill Learning during Heuristic
                                  Problem Solving: An fMRI Study . . . . . 38--49
                 Xuyan Wang and   
               Zhoujun Long and   
                 Sanxia Fan and   
                  Weiyan Yu and   
                Haiyan Zhou and   
                      Yulin Qin   The Role of Category Label in Adults'
                                  Inductive Reasoning  . . . . . . . . . . 50--60
                Yuki Ueyama and   
                 Eizo Miyashita   Estimation of Visual Feedback
                                  Contribution to Limb Stiffness in
                                  Visuomotor Control . . . . . . . . . . . 61--72
                Haiyan Zhou and   
                Yukun Xiong and   
               Zhoujun Long and   
                 Sanxia Fan and   
                 Xuyan Wang and   
                  Yulin Qin and   
                     Ning Zhong   Rule Acquisition in the Proceeding of
                                  Heuristic Sudoku Solving . . . . . . . . 73--84
    Redwan Abdo A. Mohammed and   
  Samah Abdulfatah Mohammed and   
                   Lars Schwabe   BatGaze: a New Tool to Measure Depth
                                  Features at the Center of Gaze during
                                  Free Viewing . . . . . . . . . . . . . . 85--96
    Redwan Abdo A. Mohammed and   
                   Lars Schwabe   A Brain Informatics Approach to Explain
                                  the Oblique Effect via Depth Statistics  97--106
              Azizi Ab Aziz and   
             Faudziah Ahmad and   
             Houzifa M. Hintaya   An Agent Model for Temporal Dynamics
                                  Analysis of a Person with Chronic
                                  Fatigue Syndrome . . . . . . . . . . . . 107--118
              Zhijiang Wang and   
                 Jiming Liu and   
                 Ning Zhong and   
                  Yulin Qin and   
                Haiyan Zhou and   
                  Jian Yang and   
                    Kuncheng Li   A Na\"\ive Hypergraph Model of Brain
                                  Networks . . . . . . . . . . . . . . . . 119--129
              Do Young Choi and   
              Kun Chang Lee and   
                Seong Wook Chae   The Effect of Individual Psychological
                                  Characteristics on Creativity
                                  Revelation: Emphasis with Psychological
                                  Empowerment and Intrinsic Motivation . . 130--139
                Alexander Ryjov   Modeling and Optimization of Information
                                  Retrieval for Perception-Based
                                  Information  . . . . . . . . . . . . . . 140--149
                Yu-Wen Chen and   
                      Hsing Mei   Sleep Physiological Dynamics Simulation
                                  with Fuzzy Set . . . . . . . . . . . . . 150--161
     Lorenzo Dell'Arciprete and   
               Brian Murphy and   
         Fabio Massimo Zanzotto   Parallels between Machine and Brain
                                  Decoding . . . . . . . . . . . . . . . . 162--174
             Rafael Ramirez and   
          Zacharias Vamvakousis   Detecting Emotion from EEG Signals Using
                                  the Emotive Epoc Device  . . . . . . . . 175--184
                 Guohun Zhu and   
                     Yan Li and   
                  Peng Paul Wen   An Efficient Visibility Graph Similarity
                                  Algorithm and Its Application on Sleep
                                  Stages Classification  . . . . . . . . . 185--195
               Chun-An Chou and   
     Kittipat ``Bot'' Kampa and   
             Sonya H. Mehta and   
           Rosalia F. Tungaraza   Information-Theoretic Based Feature
                                  Selection for Multi-Voxel Pattern
                                  Analysis of fMRI Data  . . . . . . . . . 196--208
               Adham Atyabi and   
         Sean P. Fitzgibbon and   
             David M. W. Powers   Multiplication of EEG Samples through
                                  Replicating, Biasing, and Overlapping    209--219
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
            Christopher Kruegel   Fighting Malicious Software  . . . . . . 1--15
         Chaitrali Amrutkar and   
                Kapil Singh and   
              Arunabh Verma and   
                Patrick Traynor   VulnerableMe: Measuring Systemic
                                  Weaknesses in Mobile Browser Security    16--34
              Andres Ojamaa and   
           Karl Düüna   Security Assessment of Node.js Platform  35--43
                 Prasad Naldurg   Foundations of Dynamic Access Control    44--58
         Khalid Zaman Bijon and   
               Ram Krishnan and   
                    Ravi Sandhu   Risk-Aware RBAC Sessions . . . . . . . . 59--74
               Soumya Maity and   
                Soumya K. Ghosh   A Cognitive Trust Model for Access
                                  Control Framework in MANET . . . . . . . 75--88
              Khalifa Toumi and   
 César Andrés and   
                    Ana Cavalli   Trust-orBAC: a Trust Access Control
                                  Model in Multi-Organization Environments 89--103
          Matthew L. Bolton and   
         Celeste M. Wallace and   
                 Lenore D. Zuck   On Policies and Intents  . . . . . . . . 104--118
               Arne Swinnen and   
              Raoul Strackx and   
        Pieter Philippaerts and   
                 Frank Piessens   ProtoLeaks: a Reliable and
                                  Protocol-Independent Network Covert
                                  Channel  . . . . . . . . . . . . . . . . 119--133
                Goutam Paul and   
               Ian Davidson and   
             Imon Mukherjee and   
                     S. S. Ravi   Keyless Steganography in Spatial Domain
                                  Using Energetic Pixels . . . . . . . . . 134--148
             Ruchira Naskar and   
       Rajat Subhra Chakraborty   Fuzzy Inference Rule Based Reversible
                                  Watermarking for Digital Images  . . . . 149--163
            Vivek Natarajan and   
                    Yi Yang and   
                     Sencun Zhu   Secure Trust Metadata Management for
                                  Mobile Ad-Hoc Networks . . . . . . . . . 164--180
               Rakesh Matam and   
              Somanath Tripathy   Defence against Wormhole Attacks in
                                  Wireless Mesh Networks . . . . . . . . . 181--193
             Sarita Agrawal and   
              Rodrigo Roman and   
              Manik Lal Das and   
             Anish Mathuria and   
                   Javier Lopez   A Novel Key Update Protocol in Mobile
                                  Sensor Networks  . . . . . . . . . . . . 194--207
    Anup Kumar Bhattacharya and   
                Abhijit Das and   
     Dipanwita Roychoudhury and   
                   Aravind Iyer   Autonomous Certification with List-Based
                                  Revocation for Secure V2V Communication  208--222
                  Weihan Li and   
            Brajendra Panda and   
                  Qussai Yaseen   Mitigating Insider Threat on Database
                                  Integrity  . . . . . . . . . . . . . . . 223--237
           Jaydeep Howlader and   
                Jayanta Kar and   
                Ashis Kumar Mal   Coercion Resistant MIX for Electronic
                                  Auction  . . . . . . . . . . . . . . . . 238--248
             Girish Chandra and   
                  Divakar Yadav   Verification of Money Atomicity in
                                  Digital Cash Based Payment System  . . . 249--264
            Alberto Peinado and   
   Amparo Fúster-Sabater   Cryptographic Analysis of a Type of
                                  Sequence Generators  . . . . . . . . . . 265--276
            Soumyadev Maity and   
                  R. C. Hansdah   Certificate-Less On-Demand Public Key
                                  Management (CLPKM) for Self-organized
                                  MANETs . . . . . . . . . . . . . . . . . 277--293
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
               Fengling Han and   
               Ron van Schyndel   M-Identity and Its Authentication
                                  Protocol for Secure Mobile Commerce
                                  Applications . . . . . . . . . . . . . . 1--10
         Avinash Srinivasan and   
                         Jie Wu   SafeCode --- Safeguarding Security and
                                  Privacy of User Data on Stolen iOS
                                  Devices  . . . . . . . . . . . . . . . . 11--20
            Alexandre Braga and   
           Rafael Cividanes and   
        Ismael Ávila and   
              Claudia Tambascia   Protection Aspects of Iconic Passwords
                                  on Mobile Devices  . . . . . . . . . . . 21--32
                Mariem Graa and   
      Nora Cuppens-Boulahia and   
Frédéric Cuppens and   
                    Ana Cavalli   Detecting Control Flow in Smartphones:
                                  Combining Static and Dynamic Analyses    33--47
              Jemal Abawajy and   
                 Andrei Kelarev   A Multi-tier Ensemble Construction of
                                  Classifiers for Phishing Email Detection
                                  and Filtering  . . . . . . . . . . . . . 48--56
                  Yong Feng and   
                    Bo Wang and   
               Fengling Han and   
                 Xinghuo Yu and   
                     Zahir Tari   Chattering-Free Terminal Sliding-Mode
                                  Observer for Anomaly Detection . . . . . 57--65
            Paul A. Watters and   
                    Nigel Phair   Detecting Illicit Drugs on Social Media
                                  Using Automated Social Media
                                  Intelligence Analysis (ASMIA)  . . . . . 66--76
       Juan Pablo Timpanaro and   
         Isabelle Chrisment and   
                 Olivier Festor   Improving Content Availability in the
                                  I2P Anonymous File-Sharing Environment   77--92
            Mark Stegelmann and   
                 Dogan Kesdogan   V2GPriv: Vehicle-to-Grid Privacy in the
                                  Smart Grid . . . . . . . . . . . . . . . 93--107
          Daniel Angermeier and   
  Konstantin Böttinger and   
              Andreas Ibing and   
                Dieter Schuster   A Secure Architecture for Smart Meter
                                  Systems  . . . . . . . . . . . . . . . . 108--122
                  Geng Yang and   
                 Qiang Zhou and   
                Xiaolong Xu and   
                    Jian Xu and   
                  Chunming Rong   A Novel Identity-Based Key Management
                                  and Encryption Scheme for Distributed
                                  System . . . . . . . . . . . . . . . . . 123--138
       Ferdous A. Barbhuiya and   
              Tonmoy Saikia and   
                  Sukumar Nandi   An Anomaly Based Approach for HID Attack
                                  Detection Using Keystroke Dynamics . . . 139--152
         Avinash Srinivasan and   
           Lashidhar Chennupati   Robust Authentication of Public Access
                                  Points Using Digital Certificates --- a
                                  Novel Approach . . . . . . . . . . . . . 153--164
                    Han Fei and   
                   Qin Jing and   
                Zhao Huawei and   
                     Hu Jiankun   A General Transformation from KP-ABE to
                                  Searchable Encryption  . . . . . . . . . 165--178
              Luca Ferretti and   
          Michele Colajanni and   
                Mirco Marchetti   Supporting Security and Consistency for
                                  Cloud Database . . . . . . . . . . . . . 179--193
                 Ronald Petrlic   Proxy Re-encryption in a
                                  Privacy-Preserving Cloud Computing DRM
                                  Scheme . . . . . . . . . . . . . . . . . 194--211
             Satoru Akimoto and   
              Yoshiaki Hori and   
                Kouichi Sakurai   Collaborative Behavior Visualization and
                                  Its Detection by Observing Darknet
                                  Traffic  . . . . . . . . . . . . . . . . 212--226
                    Craig Valli   SSH --- Somewhat Secure Host . . . . . . 227--235
Nimalaprakasan Skandhakumar and   
               Farzad Salim and   
                 Jason Reid and   
                      Ed Dawson   Physical Access Control Administration
                                  Using Building Information Models  . . . 236--250
              Yongming Yang and   
               Zulong Zhang and   
               Fengling Han and   
                    Kunming Lin   Multiple Factors Based Evaluation of
                                  Fingerprint Images Quality . . . . . . . 251--264
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
           Saber M. Elsayed and   
            Ruhul A. Sarker and   
                 Daryl L. Essam   The Influence of the Number of Initial
                                  Feasible Solutions on the Performance of
                                  an Evolutionary Optimization Algorithm   1--11
                Kiyoharu Tagawa   Concurrent Differential Evolution Based
                                  on Generational Model for Multi-core
                                  CPUs . . . . . . . . . . . . . . . . . . 12--21
                 Wenlong Fu and   
              Mark Johnston and   
                  Mengjie Zhang   Figure of Merit Based Fitness Functions
                                  in Genetic Programming for Edge
                                  Detection  . . . . . . . . . . . . . . . 22--31
         Amadeo Ascó and   
          Jason A. D. Atkin and   
                Edmund K. Burke   An Evolutionary Algorithm for the
                                  Over-constrained Airport Baggage Sorting
                                  Station Assignment Problem . . . . . . . 32--41
               Dung H. Phan and   
                 Junichi Suzuki   A Non-parametric Statistical Dominance
                                  Operator for Noisy Multiobjective
                                  Optimization . . . . . . . . . . . . . . 42--51
               Marwa Khater and   
               Elham Salehi and   
                     Robin Gras   The Emergence of New Genes in EcoSim and
                                  Its Effect on Fitness  . . . . . . . . . 52--61
         Mohsen Davarynejad and   
              Zary Forghany and   
               Jan van den Berg   Mass-Dispersed Gravitational Search
                                  Algorithm for Gene Regulatory Network
                                  Model Parameter Identification . . . . . 62--72
                  Bin Zhang and   
               Kamran Shafi and   
              Hussein A. Abbass   A Density Based Approach to the Access
                                  Point Layout Smart Distribution Grid
                                  Design Optimization Problem  . . . . . . 73--82
           Mostafa Ellabaan and   
              Xianshun Chen and   
               Nguyen Quang Huy   Multi-modal Valley-Adaptive Memetic
                                  Algorithm for Efficient Discovery of
                                  First-Order Saddle Points  . . . . . . . 83--92
            Hisao Ishibuchi and   
            Masakazu Yamane and   
                  Yusuke Nojima   Ensemble Fuzzy Rule-Based Classifier
                                  Design by Parallel Distributed Fuzzy
                                  GBML Algorithms  . . . . . . . . . . . . 93--103
               Ahmed Kafafy and   
            Ahmed Bounekkar and   
       Stéphane Bonnevay   HEMH2: An Improved Hybrid Evolutionary
                                  Metaheuristics for 0/1 Multiobjective
                                  Knapsack Problems  . . . . . . . . . . . 104--116
        Prashant Singh Rana and   
              Harish Sharma and   
         Mahua Bhattacharya and   
                  Anupam Shukla   Guided Reproduction in Differential
                                  Evolution  . . . . . . . . . . . . . . . 117--127
                 Una Benlic and   
                    Jin-Kao Hao   A Study of Breakout Local Search for the
                                  Minimum Sum Coloring Problem . . . . . . 128--137
              Masaya Nakata and   
            Pier Luca Lanzi and   
                 Keiki Takadama   XCS with Adaptive Action Mapping . . . . 138--147
                Cuong C. Vu and   
                Lam Thu Bui and   
              Hussein A. Abbass   DEAL: a Direction-Guided Evolutionary
                                  Algorithm  . . . . . . . . . . . . . . . 148--157
          Susanne Rosenthal and   
            Nail El-Sourani and   
              Markus Borschbach   Introduction of a Mutation Specific Fast
                                  Non-dominated Sorting GA Evolved for
                                  Biochemical Optimizations  . . . . . . . 158--167
                 Eman Sayed and   
                Daryl Essam and   
                   Ruhul Sarker   Using Hybrid Dependency Identification
                                  with a Memetic Algorithm for Large Scale
                                  Optimization Problems  . . . . . . . . . 168--177
           Rohitash Chandra and   
              Mengjie Zhang and   
                    Lifeng Peng   Application of Cooperative Convolution
                                  Optimization for $^{13}$C Metabolic Flux
                                  Analysis: Simulation of Isotopic
                                  Labeling Patterns Based on Tandem Mass
                                  Spectrometry Measurements  . . . . . . . 178--187
            Hoang Xuan Huan and   
                Dong Do Duc and   
                 Nguyen Manh Ha   An Efficient Two-Phase Ant Colony
                                  Optimization Algorithm for the Closest
                                  String Problem . . . . . . . . . . . . . 188--197
               Kamran Shafi and   
         Kathryn E. Merrick and   
                    Essam Debie   Evolution of Intrinsic Motives in
                                  Multi-agent Simulations  . . . . . . . . 198--207
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
                  Chao Wang and   
               Yunhong Wang and   
                Zhaoxiang Zhang   Incremental Learning of Patch-Based Bag
                                  of Facial Words Representation for
                                  Online Face Recognition in Videos  . . . 1--9
              Adam Borowiak and   
              Ulrich Reiter and   
              U. Peter Svensson   Evaluation of Audio Quality Requirements
                                  over Extended Periods of Time Using Long
                                  Duration Audiovisual Content . . . . . . 10--20
                  Liang Tao and   
                Horace H. S. Ip   Hashing with Cauchy Graph  . . . . . . . 21--32
                  Sang Phan and   
              Thanh Duc Ngo and   
                     Vu Lam and   
                   Son Tran and   
                Duy-Dinh Le and   
              Duc Anh Duong and   
                Shin'ichi Satoh   Multimedia Event Detection Using
                                  Segment-Based Approach for Motion
                                  Feature  . . . . . . . . . . . . . . . . 33--44
             Stefan Romberg and   
              Moritz August and   
          Christian X. Ries and   
                Rainer Lienhart   Robust Feature Bundling  . . . . . . . . 45--56
                 Yang Liang and   
                Mingli Song and   
                  Jiajun Bu and   
                      Chun Chen   Colorization for Gray Scale Facial Image
                                  by Locality-Constrained Linear Coding    57--67
              Xiaozhou Zhou and   
               Pierre Boulanger   New Eye Contact Correction Using Radial
                                  Basis Function for Wide Baseline
                                  Videoconference System . . . . . . . . . 68--79
                  Wenxin Yu and   
               Weichen Wang and   
               Zhengyan Guo and   
                   Satoshi Goto   An Integrated Hole-Filling Algorithm for
                                  View Synthesis . . . . . . . . . . . . . 80--92
               Shenggao Zhu and   
              Hugh Anderson and   
                        Ye Wang   A Real-Time On-Chip Algorithm for
                                  IMU-Based Gait Measurement . . . . . . . 93--104
               Shenggao Zhu and   
              Hugh Anderson and   
                        Ye Wang   Reducing the Power Consumption of an
                                  IMU-Based Gait Measurement System  . . . 105--116
                 Yuxia Wang and   
                 Yuan Zhang and   
                     Rui Lu and   
               Pamela C. Cosman   SSIM-Based End-to-End Distortion
                                  Modeling for H.264 Video Coding  . . . . 117--128
                    Lei Sun and   
                 Zhenyu Liu and   
                Takeshi Ikenaga   A Videoconferencing-Oriented
                                  Hybrid-Domain H.264/SVC to H.264/AVC
                                  Spatial Transcoder . . . . . . . . . . . 129--141
               Chongwu Tang and   
              Xiaokang Yang and   
                  Guangtao Zhai   Robust Noise Estimation Based on Noise
                                  Injection  . . . . . . . . . . . . . . . 142--152
                 Jinjian Wu and   
                     Fei Qi and   
                  Guangming Shi   Image Quality Assessment Based on
                                  Improved Structural SIMilarity . . . . . 153--163
              Chun-Chi Chen and   
             Wen-Hsiao Peng and   
                 Shih-Chun Chou   Multi-hypothesis Temporal Prediction
                                  Using Template Matching Prediction and
                                  Block Motion Compensation for High
                                  Efficiency Video Coding  . . . . . . . . 164--175
                    Hong Lu and   
                   Kai Chen and   
               Guobao Jiang and   
               Renzhong Wei and   
                  Xiangyang Xue   Leveraging Exemplar and Saliency Model
                                  for Image Search Reranking . . . . . . . 176--185
                 Shuxin Qin and   
               Xiaoyang Zhu and   
                  Haitao Yu and   
                Shuiying Ge and   
                Yiping Yang and   
                  Yongshi Jiang   Real-Time Markerless Hand Gesture
                                  Recognition with Depth Camera  . . . . . 186--197
              Zhaoqiang Xia and   
                 Jinye Peng and   
                Xiaoyi Feng and   
                   Jianping Fan   Social Tag Enrichment via Automatic
                                  Abstract Tag Refinement  . . . . . . . . 198--209
        Charles-Henri Quivy and   
                 Itsuo Kumazawa   ``\ldotsIt's Orange and Small, and White
                                  Stripes\ldots''  . . . . . . . . . . . . 210--221
               Arpit Shukla and   
             Karan Nathwani and   
                Rajesh M. Hegde   An Adaptive Non Reference Anchor Array
                                  Framework for Distant Speech Recognition 222--231
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
                 Yadong Zhu and   
                Yuanhai Xue and   
                Jiafeng Guo and   
                 Yanyan Lan and   
                Xueqi Cheng and   
                    Xiaoming Yu   Exploring and Exploiting Proximity
                                  Statistic for Information Retrieval
                                  Model  . . . . . . . . . . . . . . . . . 1--13
               Zongcheng Ji and   
                     Fei Xu and   
                       Bin Wang   A Category-integrated Language Model for
                                  Question Retrieval in Community Question
                                  Answering  . . . . . . . . . . . . . . . 14--25
              Tetsuya Sakai and   
               Zhicheng Dou and   
                Ruihua Song and   
                   Noriko Kando   The Reusability of a Diversified Search
                                  Test Collection  . . . . . . . . . . . . 26--38
              Tetsuya Sakai and   
                 Makoto P. Kato   One Click One Revisited: Enhancing
                                  Evaluation Based on Information Units    39--51
                   Zhen Yue and   
               Shuguang Han and   
                      Daqing He   A Comparison of Action Transitions in
                                  Individual and Collaborative Exploratory
                                  Web Search . . . . . . . . . . . . . . . 52--63
                Minghui Qiu and   
                 Yaliang Li and   
                     Jing Jiang   Query-Oriented Keyphrase Extraction  . . 64--75
               Jinpeng Wang and   
             Wayne Xin Zhao and   
                    Rui Yan and   
                Haitian Wei and   
               Jian-Yun Nie and   
                    Xiaoming Li   Using Lexical and Thematic Knowledge for
                                  Name Disambiguation  . . . . . . . . . . 76--88
                   Xueni Li and   
               Shaowu Zhang and   
                 Liang Yang and   
                    Hongfei Lin   Sells Out or Piles Up? A Sentiment
                                  Autoregressive Model for Predicting
                                  Sales Performance  . . . . . . . . . . . 89--102
                  Zhenyu Qi and   
                   Kang Liu and   
                       Jun Zhao   Are Human-Input Seeds Good Enough for
                                  Entity Set Expansion? Seeds Rewriting by
                                  Leveraging Wikipedia Semantic Knowledge  103--113
                  Antti Puurula   Combining Modifications to Multinomial
                                  Naive Bayes for Text Classification  . . 114--125
               Junta Mizuno and   
               Eric Nichols and   
            Yotaro Watanabe and   
                   Kentaro Inui   Organizing Information on the Web
                                  through Agreement-Conflict Relation
                                  Classification . . . . . . . . . . . . . 126--137
             Mitsuo Yoshida and   
                     Yuki Arase   Exploiting Twitter for Spiking Query
                                  Classification . . . . . . . . . . . . . 138--149
                Kejiang Ren and   
               Shaowu Zhang and   
                    Hongfei Lin   Where Are You Settling Down:
                                  Geo-locating Twitter Users Based on
                                  Tweets and Social Networks . . . . . . . 150--161
             Chang-Woo Chun and   
               Jung-Tae Lee and   
             Seung-Wook Lee and   
                  Hae-Chang Rim   Detecting Informative Messages Based on
                                  User History in Twitter  . . . . . . . . 162--173
             Changhao Jiang and   
                  Min Zhang and   
                    Bin Gao and   
                    Tie-Yan Liu   A Study on Potential Head Advertisers in
                                  Sponsored Search . . . . . . . . . . . . 174--186
              Tianshu Chang and   
                Hongfei Lin and   
                       Yuan Lin   Feature Transformation Method Enhanced
                                  Vandalism Detection in Wikipedia . . . . 187--198
                 Junting Ye and   
                 Yanan Qian and   
                  Qinghua Zheng   PLIDMiner: a Quality Based Approach for
                                  Researcher's Homepage Discovery  . . . . 199--210
                     Kai Lu and   
             Guanyuan Zhang and   
                     Rui Li and   
                Shuai Zhang and   
                       Bin Wang   Exploiting and Exploring Hierarchical
                                  Structure in Music Recommendation  . . . 211--225
            Leszek Kaliciak and   
              Ben Horsburgh and   
                 Dawei Song and   
         Nirmalie Wiratunga and   
                       Jeff Pan   Enhancing Music Information Retrieval by
                                  Incorporating Image-Based Local Features 226--237
                  Liang Shi and   
                       Bin Wang   Yet Another Sorting-Based Solution to
                                  the Reassignment of Document Identifiers 238--249
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
                Debayan Deb and   
                  Kalyanmoy Deb   Investigation of Mutation Schemes in
                                  Real-Parameter Genetic Algorithms  . . . 1--8
                 Kaizhou Z. Gao   Discrete Harmony Search Algorithm for
                                  Dynamic FJSSP in Remanufacturing
                                  Engineering  . . . . . . . . . . . . . . 9--16
               Soham Sarkar and   
                   Swagatam Das   Multilevel Image Thresholding Based on
                                  Tsallis Entropy and Differential
                                  Evolution  . . . . . . . . . . . . . . . 17--24
             Dipankar Maity and   
                    Udit Halder   Convergence and Boundary Estimation of
                                  the Particle Dynamics in Generalized
                                  Particle Swarm Optimization  . . . . . . 25--32
                Sudipta Das and   
                Durbadal Mandal   Application of Differential Evolution
                                  with Best of Random Mutation Strategy on
                                  Asymmetric Location Only Synthesis of
                                  Broadside Circular Antenna Array . . . . 33--40
              Tinu Varghese and   
               R. Sheela Kumari   Performance Evaluation of Bacterial
                                  Foraging Optimization Algorithm for the
                                  Early Diagnosis and Tracking of
                                  Alzheimer's Disease  . . . . . . . . . . 41--48
             J. Senthilnath and   
                  P. B. Shreyas   Multi-sensor Satellite Image Analysis
                                  Using Niche Genetic Algorithm for Flood
                                  Assessment . . . . . . . . . . . . . . . 49--56
   Ananthanaryanan Rathinam and   
                Ripunjoy Phukan   Solution to Economic Load Dispatch
                                  Problem Based on FIREFLY Algorithm and
                                  Its Comparison with BFO, CBFO-S and
                                  CBFO-Hybrid  . . . . . . . . . . . . . . 57--65
                  Layak Ali and   
            Samrat L. Sabat and   
                 Siba K. Udgata   MESFET DC Model Parameter Extraction
                                  Using Adaptive Accelerated Exploration
                                  Particle Swarm Optimizer . . . . . . . . 66--73
       Kalam Narendar Reddy and   
                 Vadlamani Ravi   Kernel Group Method of Data Handling:
                                  Application to Regression Problems . . . 74--81
             Sanjay Agrawal and   
                Rutuparna Panda   An Efficient Algorithm for Gray Level
                                  Image Enhancement Using Cuckoo Search    82--89
              Sumanta Panda and   
           Debadutta Mishra and   
                   B. B. Biswal   A Multi-objective Workspace Optimization
                                  of 3R Manipulator Using Modified PSO . . 90--97
    Éderson R. Silva and   
            Paulo R. Guardieiro   An Analysis of Genetic Algorithm Based
                                  Anycast Routing in Delay and Disruption
                                  Tolerant Networks  . . . . . . . . . . . 98--105
      Bidishna Bhattacharya and   
           Kamal Krishna Mandal   Reactive Power Optimization Using Hybrid
                                  Cultural Algorithm . . . . . . . . . . . 106--115
               Bhimsen Tudu and   
                Preetam Roy and   
                   Sajjan Kumar   Techno-Economic Feasibility Analysis of
                                  Hybrid Renewable Energy System Using
                                  Improved Version of Particle Swarm
                                  Optimization . . . . . . . . . . . . . . 116--123
        Tirimula Rao Benala and   
                     Rajib Mall   Software Effort Prediction Using Fuzzy
                                  Clustering and Functional Link
                                  Artificial Neural Networks . . . . . . . 124--132
             Manas R. Nayak and   
                 Subrat K. Dash   Optimal Placement and Sizing of
                                  Distributed Generation in Radial
                                  Distribution System Using Differential
                                  Evolution Algorithm  . . . . . . . . . . 133--142
          Daniel G. Ferrari and   
        Leandro Nunes de Castro   Clustering Algorithm Recommendation: a
                                  Meta-learning Approach . . . . . . . . . 143--150
            Subhodip Biswas and   
              Digbalay Bose and   
                   Souvik Kundu   A Clustering Particle Based Artificial
                                  Bee Colony Algorithm for Dynamic
                                  Environment  . . . . . . . . . . . . . . 151--159
               Souvik Kundu and   
            Subhodip Biswas and   
                   Swagatam Das   A Selective Teaching-Learning Based
                                  Niching Technique with Local
                                  Diversification Strategy . . . . . . . . 160--168
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
        Srinivasan H. Sengamedu   Scalable Analytics --- Algorithms and
                                  Systems  . . . . . . . . . . . . . . . . 1--7
     Vijay Srinivas Agneeswaran   Big-Data --- Theoretical, Engineering
                                  and Analytics Perspective  . . . . . . . 8--15
                 Tony Basil and   
      Bollepalli S. Chandra and   
         Choudur Lakshminarayan   A Comparison of Statistical Machine
                                  Learning Methods in Heartbeat Detection
                                  and Classification . . . . . . . . . . . 16--25
                Ammar Yasir and   
    Mittapally Kumara Swamy and   
    Polepalli Krishna Reddy and   
                 Subhash Bhalla   Enhanced Query-By-Object Approach for
                                  Information Requirement Elicitation in
                                  Large Databases  . . . . . . . . . . . . 26--41
               Rajeev Gupta and   
             Himanshu Gupta and   
                 Mukesh Mohania   Cloud Computing and Big Data Analytics:
                                  What Is New from Databases Perspective?  42--61
    Polepalli Krishna Reddy and   
         Basi Bhaskar Reddy and   
                    D. Rama Rao   A Model of Virtual Crop Labs as a Cloud
                                  Computing Application for Enhancing
                                  Practical Agricultural Education . . . . 62--76
                Ammar Yasir and   
    Mittapally Kumara Swamy and   
        Polepalli Krishna Reddy   Exploiting Schema and Documentation for
                                  Summarizing Relational Databases . . . . 77--90
              Ullas Nambiar and   
           Tanveer Faruquie and   
             Shamanth Kumar and   
            Fred Morstatter and   
                       Huan Liu   Faceted Browsing over Social Media . . . 91--100
                Anand Gupta and   
          Manpreet Kathuria and   
                Arjun Singh and   
            Ashish Sachdeva and   
                   Shruti Bhati   Analog Textual Entailment and Spectral
                                  Clustering (ATESC) Based Summarization   101--110
                Jatin Kumar and   
                 Tushar Rao and   
               Saket Srivastava   Economics of Gold Price
                                  Movement-Forecasting Analysis Using
                                  Macro-economic, Investor Fear and
                                  Investor Behavior Features . . . . . . . 111--121
              Joung Woo Ryu and   
       Mehmed M. Kantardzic and   
              Myung-Won Kim and   
                     A. Ra Khil   An Efficient Method of Building an
                                  Ensemble of Classifiers in Streaming
                                  Data . . . . . . . . . . . . . . . . . . 122--133
       Sraban Kumar Mohanty and   
                 Gopalan Sajith   I/O Efficient Algorithms for Block
                                  Hessenberg Reduction Using Panel
                                  Approach . . . . . . . . . . . . . . . . 134--147
                Anand Gupta and   
           Prashant Khurana and   
                 Raveena Mathur   Luring Conditions and Their Proof of
                                  Necessity through Mathematical Modelling 148--157
              Myung-Won Kim and   
                 Eun-Ju Kim and   
              Won-Moon Song and   
             Sung-Yeol Song and   
                     A. Ra Khil   Efficient Recommendation for Smart TV
                                  Contents . . . . . . . . . . . . . . . . 158--167
          T. V. Vijay Kumar and   
                  Santosh Kumar   Materialized View Selection Using
                                  Simulated Annealing  . . . . . . . . . . 168--179
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
                 Greg Morrisett   Scalable Formal Machine Models . . . . . 1--3
                   Xavier Leroy   Mechanized Semantics for Compiler
                                  Verification . . . . . . . . . . . . . . 4--6
              Gilles Barthe and   
   Benjamin Grégoire and   
              César Kunz   Automation in Computer-Aided
                                  Cryptography: Proofs, Attacks and
                                  Designs  . . . . . . . . . . . . . . . . 7--8
                Naoki Kobayashi   Program Certification by Higher-Order
                                  Model Checking . . . . . . . . . . . . . 9--10
            Valentin Robert and   
                   Xavier Leroy   A Formally-Verified Alias Analysis . . . 11--26
              Jianzhou Zhao and   
                Steve Zdancewic   Mechanized Verification of Computing
                                  Dominators for Formalizing Compilers . . 27--42
        Dominic P. Mulligan and   
         Claudio Sacerdoti Coen   On the Correctness of an Optimising
                                  Assembler for the Intel MCS-51
                                  Microprocessor . . . . . . . . . . . . . 43--59
                 Brian Campbell   An Executable Semantics for CompCert C   60--75
    Pierre-Nicolas Tollitte and   
             David Delahaye and   
               Catherine Dubois   Producing Certified Functional Code from
                                  Inductive Specifications . . . . . . . . 76--91
                  Lukas Bulwahn   The New Quickcheck for Isabelle  . . . . 92--108
             Andrei Popescu and   
        Johannes Hölzl and   
                  Tobias Nipkow   Proving Concurrent Noninterference . . . 109--125
                Toby Murray and   
            Daniel Matichuk and   
                Matthew Brassil   Noninterference for Operating System
                                  Kernels  . . . . . . . . . . . . . . . . 126--142
         Alexander Vaynberg and   
                     Zhong Shao   Compositional Verification of a Baby
                                  Virtual Memory Manager . . . . . . . . . 143--159
                 Keisuke Nakano   Shall We Juggle, Coinductively?  . . . . 160--172
            Beniamino Accattoli   Proof Pearl: Abella Formalization of
                                  $\lambda$-Calculus Cube Property . . . . 173--187
              Hing-Lun Chan and   
                Michael Norrish   A String of Pearls: Proofs of Fermat's
                                  Little Theorem . . . . . . . . . . . . . 188--207
              Kaustuv Chaudhuri   Compact Proof Certificates for Linear
                                  Logic  . . . . . . . . . . . . . . . . . 208--223
          Christian Doczkal and   
                    Gert Smolka   Constructive Completeness for Modal
                                  Logic with Transitive Closure  . . . . . 224--239
             Andrea Asperti and   
               Wilmer Ricciotti   Rating Disambiguation Errors . . . . . . 240--255
                   Pierre Neron   A Formal Proof of Square Root and
                                  Division Elimination in Embedded
                                  Programs . . . . . . . . . . . . . . . . 256--272
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
           Edmund M. Clarke and   
                William Klieber   Model Checking and the State Explosion
                                  Problem  . . . . . . . . . . . . . . . . 1--30
          Patrice Godefroid and   
             Shuvendu K. Lahiri   From Program to Logic: An Introduction   31--44
       Christine Paulin-Mohring   Introduction to the Coq Proof-Assistant
                                  for Practical Software Verification  . . 45--95
César A. Muñoz and   
               Ramiro A. Demasi   Advanced Theorem Proving Techniques in
                                  PVS and Applications . . . . . . . . . . 96--132
           Julian Tschannen and   
            Carlo Alberto Furia   Automatic Verification of Advanced
                                  Object-Oriented Features: The AutoProof
                                  Approach . . . . . . . . . . . . . . . . 133--155
               Luke Herbert and   
             K. Rustan M. Leino   Using Dafny, an Automatic Program
                                  Verifier . . . . . . . . . . . . . . . . 156--181
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
         Hristijan Gjoreski and   
            Mitja Lu\vstrek and   
                  Matja\vz Gams   Context-Based Fall Detection Using
                                  Inertial and Location Sensors  . . . . . 1--16
   Tobias Grosse-Puppendahl and   
               Eugen Berlin and   
                  Marko Borazio   Enhancing Accelerometer-Based Activity
                                  Recognition with Capacitive Proximity
                                  Sensing  . . . . . . . . . . . . . . . . 17--32
              Sara Bongartz and   
                Yucheng Jin and   
            Fabio Patern\`o and   
                 Joerg Rett and   
                 Carmen Santoro   Adaptive User Interfaces for Smart
                                  Environments with the Support of
                                  Model-Based Languages  . . . . . . . . . 33--48
          Sebastian Osswald and   
 Alexander Meschtscherjakov and   
              Nicole Mirnig and   
            Karl-Armin Kraessig   Back of the Steering Wheel Interaction:
                                  The Car Braille Keyer  . . . . . . . . . 49--64
                Eric Struse and   
             Julian Seifert and   
   Sebastian Üllenbeck and   
              Enrico Rukzio and   
               Christopher Wolf   PermissionWatcher: Creating User
                                  Awareness of Application Permissions in
                                  Mobile Systems . . . . . . . . . . . . . 65--80
Kaisa Väänänen-Vainio-Mattila and   
              Tomi Haustola and   
    Jonna Häkkilä and   
                  Minna Karukka   Exploring Non-verbal Communication of
                                  Presence between Young Children and
                                  Their Parents through the Embodied Teddy
                                  Bear . . . . . . . . . . . . . . . . . . 81--96
         Joris Ijsselmuiden and   
  Ann-Kristin Grosselfinger and   
           David Münch and   
                  Michael Arens   Automatic Behavior Understanding in
                                  Crisis Response Control Rooms  . . . . . 97--112
             Ewald Strasser and   
               Astrid Weiss and   
               Thomas Grill and   
          Sebastian Osswald and   
              Manfred Tscheligi   Combining Implicit and Explicit Methods
                                  for the Evaluation of an Ambient
                                  Persuasive Factory Display . . . . . . . 113--128
   Valérian Guivarch and   
       Valérie Camps and   
    André Péninou   Context Awareness in Ambient Systems by
                                  an Adaptive Multi-Agent Approach . . . . 129--144
               Jethro Shell and   
                 Simon Coupland   Towards Fuzzy Transfer Learning for
                                  Intelligent Environments . . . . . . . . 145--160
         Radu-Daniel Vatavu and   
   C\uat\ualin-Marian Chera and   
                   Wei-Tek Tsai   Gesture Profile for Web Services: An
                                  Event-Driven Architecture to Support
                                  Gestural Interfaces for Smart
                                  Environments . . . . . . . . . . . . . . 161--176
             Pedro Chahuara and   
             Anthony Fleury and   
     François Portet and   
                  Michel Vacher   Using Markov Logic Network for On-Line
                                  Activity Recognition from Non-visual
                                  Home Automation Sensors  . . . . . . . . 177--192
     Bo\vzidara Cvetkovi\'c and   
         Bo\vstjan Kalu\vza and   
            Mitja Lu\vstrek and   
                  Matja\vz Gams   Multi-Classifier Adaptive Training:
                                  Specialising an Activity Recognition
                                  Classifier Using Semi-supervised
                                  Learning . . . . . . . . . . . . . . . . 193--207
          Mohamed A. Sehili and   
         Benjamin Lecouteux and   
              Michel Vacher and   
     François Portet and   
                    Dan Istrate   Sound Environment Analysis in Smart Home 208--223
            Doris Zachhuber and   
               Thomas Grill and   
             Ondrej Polacek and   
              Manfred Tscheligi   Contextual Wizard of Oz  . . . . . . . . 224--239
       Berardina De Carolis and   
            Stefano Ferilli and   
                Nicole Novielli   Recognizing the User Social Attitude in
                                  Multimodal Interaction in Smart
                                  Environments . . . . . . . . . . . . . . 240--255
            Leila S. Shafti and   
              Pablo A. Haya and   
Manuel García-Herranz and   
           Eduardo Pérez   Evolutionary Feature Extraction to Infer
                                  Behavioral Patterns in Ambient
                                  Intelligence . . . . . . . . . . . . . . 256--271
       Ekaterina Kurdyukova and   
             Stephan Hammer and   
         Elisabeth André   Personalization of Content on Public
                                  Displays Driven by the Recognition of
                                  Group Context  . . . . . . . . . . . . . 272--287
               Michael Zaki and   
                  Peter Forbrig   Towards the Generation of Assistive User
                                  Interfaces for Smart Meeting Rooms Based
                                  on Activity Patterns . . . . . . . . . . 288--295
              Saskia Robben and   
               Kyra Bergman and   
              Sven Haitjema and   
           Yannick de Lange and   
                 Ben Kröse   Reducing Dementia Related Wandering
                                  Behaviour with an Interactive Wall . . . 296--303
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
        
               Yanfeng Wang and   
                 Wenling Wu and   
                  Xiaoli Yu and   
                      Lei Zhang   Security on LBlock against Biclique
                                  Cryptanalysis  . . . . . . . . . . . . . 1--14
                 Keting Jia and   
                       Leibo Li   Improved Impossible Differential Attacks
                                  on Reduced-Round MISTY1  . . . . . . . . 15--27
             Satoshi Tanaka and   
                  Tung Chou and   
                Bo-Yin Yang and   
             Chen-Mou Cheng and   
                Kouichi Sakurai   Efficient Parallel Evaluation of
                                  Multivariate Quadratic Polynomials on
                                  GPUs . . . . . . . . . . . . . . . . . . 28--42
                Wentao Zhao and   
                    Xin Hai and   
                Shaojing Fu and   
                    Chao Li and   
                   Yanfeng Wang   Enumeration of Even-Variable Boolean
                                  Functions with Maximum Algebraic
                                  Immunity . . . . . . . . . . . . . . . . 43--54
               Hwajeong Seo and   
                      Howon Kim   Multi-precision Multiplication for
                                  Public-Key Cryptography on Embedded
                                  Microprocessors  . . . . . . . . . . . . 55--67
                Hyunmin Kim and   
             Vladimir Rozic and   
             Ingrid Verbauwhede   Three Phase Dynamic Current Mode Logic:
                                  a More Secure DyCML to Achieve a More
                                  Balanced Power Consumption . . . . . . . 68--81
               JeaHoon Park and   
                    JaeCheol Ha   Improved Differential Fault Analysis on
                                  Block Cipher ARIA  . . . . . . . . . . . 82--95
     Pairat Thorncharoensri and   
               Willy Susilo and   
                          Yi Mu   Multi-Level Controlled Signature . . . . 96--110
                 Liangze Li and   
                      Fan Zhang   Tate Pairing Computation on Generalized
                                  Hessian Curves . . . . . . . . . . . . . 111--123
           Mario Larangeira and   
                 Keisuke Tanaka   Reduction-Centric Non-programmable
                                  Security Proof for the Full Domain Hash
                                  in the Random Oracle Model . . . . . . . 124--143
              Hyun-Sun Kang and   
                Chang-Seop Park   An Authentication and Key Management
                                  Scheme for the Proxy Mobile IPv6 . . . . 144--160
László Aszalós and   
                  Andrea Huszti   Payment Approval for PayWord . . . . . . 161--176
            Jung Yeon Hwang and   
               Sungwook Eom and   
             Ku-Young Chang and   
              Pil Joong Lee and   
                   DaeHun Nyang   Anonymity-Based Authenticated Key
                                  Agreement with Full Binding Property . . 177--191
                Junghoon Oh and   
                Namheun Son and   
                Sangjin Lee and   
                    Kyungho Lee   A Study for Classification of Web
                                  Browser Log and Timeline Visualization   192--207
    François Durvaux and   
    Beno\^\it Gérard and   
  Stéphanie Kerckhof and   
         François Koeune   Intellectual Property Protection for
                                  Integrated Systems Using Soft Physical
                                  Hash Functions . . . . . . . . . . . . . 208--225
                Shun-Te Liu and   
               Yi-Ming Chen and   
                 Hui-Ching Hung   $N$-Victims: An Approach to Determine
                                  $N$-Victims for APT Investigations . . . 226--240
                 Jaeun Choi and   
                 Gisung Kim and   
             Tae Ghyoon Kim and   
                      Sehun Kim   An Efficient Filtering Method for
                                  Detecting Malicous Web Pages . . . . . . 241--253
                   Eric Lin and   
                John Aycock and   
                Mohammad Mannan   Lightweight Client-Side Methods for
                                  Detecting Email Forgery  . . . . . . . . 254--269
              Yang-seo Choi and   
                Ik-Kyun Kim and   
                 Jin-Tae Oh and   
                  Jong-Soo Jang   AIGG Threshold Based HTTP GET Flooding
                                  Attack Detection . . . . . . . . . . . . 270--284
                Hyunjoo Kim and   
              Byoungkoo Kim and   
                 Daewon Kim and   
                Ik-Kyun Kim and   
               Tai-Myoung Chung   Implementation of GESNIC for Web Server
                                  Protection against HTTP GET Flooding
                                  Attacks  . . . . . . . . . . . . . . . . 285--295
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??