Last update:
Sat Oct 22 11:24:43 MDT 2022
Michael Elad and
Dmitry Datsenko Example-Based Regularization Deployed to
Super-Resolution Reconstruction of a
Single Image . . . . . . . . . . . . . . 15--30
Erol Gelenbe Editorial . . . . . . . . . . . . . . . 1--2
Yongzhi Cao A Hierarchy of Behavioral Equivalences
in the $\pi$-calculus with Noisy
Channels . . . . . . . . . . . . . . . . 3--20
Xiaowei Huang and
Li Jiao and
Weiming Lu Congruence Formats for Weak Readiness
Equivalence and Weak Possible Future
Equivalence . . . . . . . . . . . . . . 21--36
Xuejun Yang and
Ji Wang and
Xiaodong Yi Slicing Execution with Partial Weakest
Precondition for Model Abstraction of C
Programs . . . . . . . . . . . . . . . . 37--49
Daniel Cutting and
Aaron Quigley and
Björn Landfeldt Special Interest Messaging: a Comparison
of IGM Approaches . . . . . . . . . . . 50--68
Patrick Erik Bradley and
Norbert Paul Using the Relational Model to Capture
Topological Information of Spaces . . . 69--89
Wil M. P. van der Aalst and
Niels Lohmann and
Peter Massuthe and
Christian Stahl and
Karsten Wolf Multiparty Contracts: Agreeing and
Implementing Interorganizational
Processes . . . . . . . . . . . . . . . 90--106
Feng Liu and
ChuanKun Wu and
XiJun Lin Some Extensions on Threshold Visual
Cryptography Schemes . . . . . . . . . . 107--119
A. S. M. Sajeev and
Sakgasit Ramingwong Mum Effect as an Offshore Outsourcing
Risk: a Study of Differences in
Perceptions . . . . . . . . . . . . . . 120--126
Ricardo Jasinski Book Review: Jari Nurmi,
\booktitleProcessor Design ---
System-on-Chip Computing for ASICs and
FPGAs. Springer (2007). ISBN-13
978-1-4020-5529-4. 525 pp. Hardcover . . 127
Bo Hu and
Bin Hu and
Victor Callaghan and
Zongkai Lin Combining Theory and Systems Building in
Pervasive Computing . . . . . . . . . . 129--130
Junzhou Luo and
Weining Kong and
Liang Ge Implementation of Learning Path in
Process Control Model . . . . . . . . . 131--141
F. Rivera-illingworth and
V. Callaghan and
H. Hagras Detection of Normal and Novel Behaviours
in Ubiquitous Domestic Environments . . 142--151
Baopeng Zhang and
Yuanchun Shi and
Xin Xiao A Policy-Driven Service Composition
Method for Adaptation in Pervasive
Computing Environment . . . . . . . . . 152--165
Zheng-Yu Wu and
Han-Tao Song Ant-based Energy-aware Disjoint
Multipath Routing Algorithm for MANETs 166--176
Jinjiao Lin and
Chengxiang Song and
Haiyang Wang A Rule-based Method for Improving
Adaptability in Pervasive Systems . . . 177--190
Philip Moore and
Bin Hu and
Jizheng Wan Smart-Context: a Context Ontology for
Pervasive Mobile Computing . . . . . . . 191--207
Kumaara Velan Modelling Bidders in Sequential
Automated Auctions . . . . . . . . . . . 208--218
Zhao Wu and
Naixue Xiong and
Jong Hyuk Park and
Tai-Hoon Kim and
Lei Yuan A Simulation Model Supporting Time and
Non-time Metrics for Web Service
Composition . . . . . . . . . . . . . . 219--233
Mouna Allani and
Beno\^\it Garbinato and
Fernando Pedone Resource-Aware Multimedia Content
Delivery: a Gambling Approach . . . . . 234--248
Taskin Koçak Two Decades of Random Neural Networks 249--250
Stelios Timotheou The Random Neural Network: a Survey . . 251--267
Georgia Sakellari The Cognitive Packet Network: a Survey 268--279
Jian Wu and
Steve Furber A Multicast Routing Scheme for a
Universal Spiking Neural Network
Architecture . . . . . . . . . . . . . . 280--288
Mustafa Badaro\uglu and
Ugur Halici and
Isik Aybay and
Cuneyt Cerkez A Cascadable Random Neural Network Chip
with Reconfigurable Topology . . . . . . 289--303
Fionn Murtagh The Correspondence Analysis Platform for
Uncovering Deep Structure in Data and
Information . . . . . . . . . . . . . . 304--315
Ching-man Au Yeung and
Ho-Fung Leung A Formal Model of Ontology for Handling
Fuzzy Membership and Typicality of
Instances . . . . . . . . . . . . . . . 316--341
Ajoy K. Datta and
Lawrence L. Larmore and
Priyanka Vemula A Self-Stabilizing $O(k)$-Time
$k$-Clustering Algorithm . . . . . . . . 342--350
Chih-Yu Lin and
Yu-Chee Tseng and
Yung-Chih Liu Imprecision-Tolerant Location Management
for Object-Tracking Wireless Sensor
Network . . . . . . . . . . . . . . . . 351--364
Marcus Nilsson Computational Aspects of Monomial
Dynamical Systems . . . . . . . . . . . 365--369
Vladimir Anashin Non-Archimedean Ergodic Theory and
Pseudorandom Generators . . . . . . . . 370--392
Patrick Erik Bradley Mumford Dendrograms . . . . . . . . . . 393--404
Fionn Murtagh On Ultrametric Algorithmic Information 405--416
Jenny Benois-Pineau and
Andrei Khrennikov Significance Delta Reasoning with
$p$-Adic Neural Networks: Application to
Shot Change Detection in Video . . . . . 417--431
Branko Dragovich and
Alexandra Dragovich $p$-Adic Modelling of the Genome and the
Genetic Code . . . . . . . . . . . . . . 432--442
Anthony Karel Seda and
Pascal Hitzler Generalized Distance Functions in the
Theory of Computation . . . . . . . . . 443--464
Behzad Akbarpour and
Amr T. Abdel-Hamid and
Sofi\`ene Tahar and
John Harrison Verifying a Synthesized Implementation
of IEEE-754 Floating-Point Exponential
Function using HOL . . . . . . . . . . . 465--488
Mark Levene Book Review: Rokach Lior and Maimon
Oded, \booktitleData Mining with
Decision Trees: Theory and Applications.
World Scientific (2008). ISBN-13
978-981-277-171-1. 244 pp. Hardcover . . 489
Boran Gazi Book Review: Krzysztof J. Cios, Witold
Pedrycz, Roman W. Swiniarski and Lukasz
A. Kurgan, \booktitleData Mining: A
Knowledge Discovery Approach. Springer
(2007). ISBN-13 978-0-387-33333-5.
\pounds 55.99. 606 pp. Hardcover . . . . 489--490
Anonymous Introduction to the Special Issue on
Advances in Sensing, Information
Processing and Decision Making for
Coalition Operations within the US/UK
International Technology Alliance . . . 491--492
Duncan Gillies and
David Thornley and
Chatschik Bisdikian Probabilistic Approaches to Estimating
the Quality of Information in Military
Sensor Networks . . . . . . . . . . . . 493--502
Gita Sukthankar and
Katia Sycara Analyzing Team Decision-Making in
Tactical Scenarios . . . . . . . . . . . 503--512
Lei Chen and
Zijian Wang and
Boleslaw Szymanski and
Joel W. Branch and
Dinesh Verma and
Raju Damarla and
John Ibbotson Dynamic Service Execution in Sensor
Networks . . . . . . . . . . . . . . . . 513--527
Katia Sycara and
Timothy J. Norman and
Joseph A. Giampapa and
Martin J. Kollingbaum and
Chris Burnett and
Daniele Masato and
Mairi McCallum and
Michael H. Strub Agent Support for Policy-Driven
Collaborative Mission Planning . . . . . 528--540
Dinesh Verma and
Bong Jun Ko and
Petros Zerfos and
Kang-won Lee and
Ting He and
Matthew Duggan and
Kristian Stewart and
Ananthram Swami and
Nikoletta Sofra Understanding the Quality of Monitoring
for Network Management . . . . . . . . . 541--550
Zhongqiang Chen and
Yuan Zhang and
Zhongrong Chen A Categorization Framework for Common
Computer Vulnerabilities and Exposures 551--580
H. Rahaman and
J. Mathew and
D. K. Pradhan Secure Testable S-box Architecture for
Cryptographic Hardware Implementation 581--591
François Baccelli and
Bartlomiej Blaszczyszyn and
Paul Mühlethaler Time--Space Opportunistic Routing in
Wireless Ad hoc Networks: Algorithms and
Performance Optimization by Stochastic
Geometry . . . . . . . . . . . . . . . . 592--609
Mathew D. Penrose Discussant of Response to the
\booktitleComputer Journal Lecture by
François Baccelli . . . . . . . . . . . . 610--611
Takis Konstantopoulos Response to Prof. Baccelli's lecture on
Modelling of Wireless Communication
Networks by Stochastic Geometry . . . . 612--614
Rupak Majumdar Book Review: Paul Ammann and Jeff
Offutt, \booktitleIntroduction to
Software Testing. Cambridge University
Press (2008). ISBN-13 978-0-521-88038-1.
\pounds 32.99. 322 pp. Hardcover . . . . 615
François Laroussinie Book Review: Christel Baier and
Joost-Pieter Katoen,
\booktitlePrinciples of Model Checking.
MIT Press (May 2008). ISBN-13
978-0-262-02649-9. \pounds 44.95. 975
pp. Hardcover . . . . . . . . . . . . . 615--616
Neil F. Johnson Book Review: Frank Y. Shih,
\booktitleDigital Watermarking and
Steganography: Fundamentals and
Techniques. CRC/Taylor & Francis (2008).
ISBN-13 978-1-4200-4757-8. \pounds
46.99. 180 pp. Hardcover . . . . . . . . 616--617
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 619--622
Chien-Liang Chen and
Shao-Chi Chin and
Hsu-Chun Yen Reachability Analysis of Augmented
Marked Graphs via Integer Linear
Programming . . . . . . . . . . . . . . 623--633
Yu-Chen Kuo General Tree $k$-Coteries to Reduce the
Degradation of Quorums . . . . . . . . . 634--643
R. Marshall Modeling DNA/RNA Strings Using
Resistor--Capacitor (RC) Ladder Networks 644--660
Ro-Yu Wu and
Jou-Ming Chang and
Yue-Li Wang Loopless Generation of Non-regular Trees
with a Prescribed Branching Sequence . . 661--666
Jywe-Fei Fang The Bipancycle-Connectivity and the
$m$-Pancycle-Connectivity of the $k$-ary
$n$-cube . . . . . . . . . . . . . . . . 667--678
Roberto Barbuti and
Nicoletta De Francesco and
Luca Tesei An Abstract Interpretation Approach for
Enhancing the Java Bytecode Verifier . . 679--700
Shmuel T. Klein and
Miri Kopel Ben-Nissan On the Usefulness of Fibonacci
Compression Codes . . . . . . . . . . . 701--716
Dae-Hwan Kim and
Hyuk-Jae Lee Fine-Grain Register Allocation and
Instruction Scheduling in a Reference
Flow . . . . . . . . . . . . . . . . . . 717--740
Emilio J. Padrón and
Margarita Amor and
Montserrat Bóo and
Ramón Doallo Hierarchical Radiosity for
Multiresolution Systems Based on Normal
Tests . . . . . . . . . . . . . . . . . 741--752
Iren Valova and
Derek Beaton and
Dan MacLean and
John Hammond NIPSOM: Parallel Architecture and
Implementation of a Growing SOM . . . . 753--771
Anne Benoit and
Mourad Hakem and
Yves Robert Multi-criteria Scheduling of Precedence
Task Graphs on Heterogeneous Platforms 772--785
Xiaoyan Zhu and
Qinbao Song and
Zihan Jia A Weighted Voting-Based Associative
Classification Algorithm . . . . . . . . 786--801
Jen-Bang Feng and
Iuon-Chang Lin and
Yen-Ping Chu and
Shyh-Chang Tsaur Resampling Halftone Images Using
Interpolation and Error-Diffusion . . . 802--813
Hans Vandierendonck and
Sean Rul and
Koen De Bosschere Accelerating Multiple Sequence Alignment
with the Cell BE Processor . . . . . . . 814--826
Michael A. Bekos and
Michael Kaufmann and
Katerina Potika and
Antonios Symvonis Area-Feature Boundary Labeling . . . . . 827--841
Rich Picking and
Alexia Robinet and
Vic Grout and
John McGinn and
Armando Roy and
Simon Ellis and
Denise Oram A Case Study Using a Methodological
Approach to Developing User Interfaces
for Elderly and Disabled People . . . . 842--859
Peter G. Harrison Turning Back Time --- What Impact on
Performance? . . . . . . . . . . . . . . 860--868
Erol Gelenbe and
Stephen Gilmore Discussants' Comments on the
\booktitleComputer Journal Lecture by
Peter Harrison presented at the British
Computer Society on 24th February 2009 869--870
Alessandra Di Pierro and
Chris Hankin and
Herbert Wiklicky Program Analysis Probably Counts . . . . 871--880
Pasquale Malacaria Program Analysis Probably Counts:
Discussant Contribution for the
\booktitleComputer Journal Lecture by
Chris Hankin . . . . . . . . . . . . . . 881
Haneul Chon and
Taewhan Kim Resource Sharing Problem of Timing
Variation-Aware Task Scheduling and
Binding in MPSoC . . . . . . . . . . . . 883--894
Liang Xia and
Yongxin Zhu and
Jun Yang and
Jingwei Ye and
Zonghua Gu Implementing a Thermal-Aware Scheduler
in Linux Kernel on a Multi-Core
Processor . . . . . . . . . . . . . . . 895--903
Minje Jun and
Eui-Young Chung Design of On-Chip Crossbar Network
Topology Using Chained Edge Partitioning 904--917
Chung-Ming Huang and
Jian-Wei Li and
Chun-Ta Chen Distributed Hash Table-Based
Interrogating-Call Session Control
Function Network in the Internet
Protocol Multimedia Subsystem for
Efficient Query Services . . . . . . . . 918--933
Jongsung Kim and
Seokhie Hong Side-Channel Attack Using
Meet-in-the-Middle Technique . . . . . . 934--938
Iuon-Chang Lin and
Shih-Shan Tang and
Chung-Ming Wang Multicast Key Management without
Rekeying Processes . . . . . . . . . . . 939--950
Jenn-Wei Lin and
Ming-Feng Yang Robust Super-Peer-Based P2P File-Sharing
Systems . . . . . . . . . . . . . . . . 951--968
Chuan-Chi Weng and
Ching-Wen Chen and
Chang-Jung Ku and
Shiow-Fen Hwang A Bandwidth-Based Power-Aware Routing
Protocol with Low Route Discovery
Overhead in Mobile Ad hoc Networks . . . 969--990
Jonathan Tate and
Iain Bate Sensornet Protocol Tuning Using
Principled Engineering Methods . . . . . 991--1019
Georgios Loukas and
Gülay Öke Protection Against Denial of Service
Attacks: a Survey . . . . . . . . . . . 1020--1037
Isi Mitrani Management of Server Farms for
Performance and Profit . . . . . . . . . 1038--1044
Andreas Berl and
Erol Gelenbe and
Marco Di Girolamo and
Giovanni Giuliani and
Hermann De Meer and
Minh Quan Dang and
Kostas Pentikousis Energy-Efficient Cloud Computing . . . . 1045--1051
Erol Gelenbe and
Edith Ngai Adaptive Random Re-Routing for
Differentiated QoS in Sensor Networks 1052--1061
Tsu-Yang Wu and
Yuh-Min Tseng An ID-Based Mutual Authentication and
Key Exchange Protocol for Low-Power
Mobile Devices . . . . . . . . . . . . . 1062--1070
Xiuqiang He and
Zonghua Gu and
Yongxin Zhu Task Allocation and Optimization of
Distributed Embedded Systems with
Simulated Annealing and Geometric
Programming . . . . . . . . . . . . . . 1071--1091
Eyal Loz and
Guillermo Pineda-Villavicencio New Benchmarks for Large-Scale Networks
with Given Maximum Degree and Diameter 1092--1105
Denis Trcek Security Metrics Foundations for
Computer Security . . . . . . . . . . . 1106--1112
Morris Sloman and
Emil Lupu Engineering Policy-Based Ubiquitous
Systems . . . . . . . . . . . . . . . . 1113--1127
Robin Milner Discussant of Response to the
\booktitleComputer Journal Lecture by
Morris Sloman . . . . . . . . . . . . . 1128
Mark Levene Social Networks: An Introduction . . . . 1129
Elizabeth Harrin Growing Software: Proven Strategies for
Managing Software Engineers . . . . . . 1129--1130
Michael Elad and
Dmitry Datsenko Corrigendum: ``Example-Based
Regularization Deployed to
Super-Resolution Reconstruction of a
Single Image'' . . . . . . . . . . . . . 1131--1131
Sung Woo Chung and
Hsien-Hsin S. Lee and
Woo Hyong Lee Architecture/OS Support for Embedded
Multi-core Systems . . . . . . . . . . . 1134--1135
Fariba Sadri and
Kostas Stathis Special Issue on Artificial Societies
for Ambient Intelligence Editorial
Introduction . . . . . . . . . . . . . . 1136--1137
Jurriaan van Diggelen and
Robbert-Jan Beun and
Rogier M. van Eijk and
Peter J. Werkhoven Efficient Semantic Information Exchange
for Ambient Intelligence . . . . . . . . 1138--1151
Marco P. Locatelli and
Marco Loregian and
Giuseppe Vizzari Artificial Societies in a
Community-Based Approach to Ambient
Intelligence . . . . . . . . . . . . . . 1152--1168
Aitor Ibarguren and
Iñaki Maurtua and
Basilio Sierra Layered Architecture for Real-Time Sign
Recognition . . . . . . . . . . . . . . 1169--1183
Krysia Broda and
Christopher J. Hogger Designing Effective Policies for Minimal
Agents . . . . . . . . . . . . . . . . . 1184--1209
Fabio Patern\`o and
Carmen Santoro and
Antonio Scorcia Ambient Intelligence for Supporting Task
Continuity across Multiple Devices and
Implementation Languages . . . . . . . . 1210--1228
Patrice Caire and
Leendert van der Torre Convivial Ambient Technologies:
Requirements, Ontology and Design . . . 1229--1256
Alessandra Mileo and
Davide Merico and
Stefano Pinardi and
Roberto Bisiani A Logical Approach to Home Healthcare
with Intelligent Sensor-Network Support 1257--1276
Johnsen Kho and
Long Tran-Thanh and
Alex Rogers and
Nicholas R. Jennings An Agent-Based Distributed Coordination
Mechanism for Wireless Visual Sensor
Nodes Using Dynamic Programming . . . . 1277--1290
Guang-Ho Cha A Context-Aware Similarity Search for a
Handwritten Digit Image Database . . . . 1291--1301
Huzaifa Zafar and
Daniel D. Corkill Reducing Online Model-Development Time
by Agents Using Constraints Between
Shared Observations . . . . . . . . . . 1302--1314
Mücahid Kutlu and
Celal Cì\ugìr and
Ilyas Cicekli Generic Text Summarization for Turkish 1315--1323
Göksel Günlü and
Hasan S. Bilge Face Recognition with Discriminating
$3$D DCT Coefficients . . . . . . . . . 1324--1337
Jakub Mare\vcek Book Review: \booktitleHandbook of
Approximation Algorithms and
Metaheuristics . . . . . . . . . . . . . 1338--1339
N. R. Jennings and
A. Rogers and
S. Case and
R. Johnston and
D. Philpot Decentralized Data and Information
Systems: Theory and Practice . . . . . . 1341--1343
Michalis Smyrnakis and
David S. Leslie Dynamic Opponent Modelling in Fictitious
Play . . . . . . . . . . . . . . . . . . 1344--1359
Erol Gelenbe and
Stelios Timotheou and
David Nicholson Fast Distributed Near-Optimum Assignment
of Assets to Tasks . . . . . . . . . . . 1360--1369
Nicos G. Pavlidis and
Niall M. Adams and
David Nicholson and
David J. Hand Prospects for Bandit Solutions in Sensor
Management . . . . . . . . . . . . . . . 1370--1383
Nikolaos Dimakis and
Avgoustinos Filippoupolitis and
Erol Gelenbe Distributed Building Evacuation
Simulator for Smart Emergency Management 1384--1400
Christoforos Anagnostopoulos and
Niall M. Adams and
David J. Hand Streaming Covariance Selection with
Applications to Adaptive Querying in
Sensor Networks . . . . . . . . . . . . 1401--1414
Seung Min Lee and
Stephen J. Roberts Sequential Dynamic Classification Using
Latent Variable Models . . . . . . . . . 1415--1429
Roman Garnett and
Michael A. Osborne and
Steven Reece and
Alex Rogers and
Stephen J. Roberts Sequential Bayesian Prediction in the
Presence of Changepoints and Faults . . 1430--1446
Sarvapali D. Ramchurn and
Alessandro Farinelli and
Kathryn S. Macarthur and
Nicholas R. Jennings Decentralized Coordination in RoboCup
Rescue . . . . . . . . . . . . . . . . . 1447--1461
Archie C. Chapman and
Rosa Anna Micillo and
Ramachandra Kota and
Nicholas R. Jennings Decentralized Dynamic Task Allocation
Using Overlapping Potential Games . . . 1462--1477
Lein Harn and
Wen-Jung Hsin and
Changlu Lin Efficient On-line/Off-line Signature
Schemes Based on Multiple-Collision
Trapdoor Hash Families . . . . . . . . . 1478--1484
Roberto De Prisco and
Alfredo De Santis Cheating Immune Threshold Visual Secret
Sharing . . . . . . . . . . . . . . . . 1485--1496
Lélia Blin and
Christian Laforest and
Stephane Rovedakis and
Nicolas Thibault Hardness Results and Heuristic for
Multi-groups Interconnection . . . . . . 1497--1507
Adenilso Simão and
Alexandre Petrenko Fault Coverage-Driven Incremental Test
Generation . . . . . . . . . . . . . . . 1508--1522
Vicent Cholvi and
Antonio Fernández and
Ernesto Jiménez and
Pilar Manzano and
Michel Raynal A Methodological Construction of an
Efficient Sequentially Consistent
Distributed Shared Memory . . . . . . . 1523--1534
Michael Wetherfield Personal Recollections of Programming
Deuce in the Late 1950s . . . . . . . . 1535--1549
You-Chiun Wang and
Tomoaki Ohtsuki and
Athanasios (Thanos) Vasilakos and
Ashutosh Sabharwal and
Yuh-Shyan Chen and
Yu-Chee Tseng Algorithms, Protocols and Future
Applications of Wireless Sensor Networks 1551--1552
Orhan Dagdeviren and
Kayhan Erciyes Graph Matching-Based Distributed
Clustering and Backbone Formation
Algorithms for Sensor Networks . . . . . 1553--1575
Thanassis Giannetsos and
Tassos Dimitriou and
Ioannis Krontiris and
Neeli R. Prasad Arbitrary Code Injection through
Self-propagating Worms in von Neumann
Architecture Devices . . . . . . . . . . 1576--1593
Yuan Zhang and
Lichun Bao and
Shih-Hsien Yang and
Max Welling and
Di Wu Localization Algorithms for Wireless
Sensor Retrieval . . . . . . . . . . . . 1594--1605
Aaron Kiely and
Mingsen Xu and
Wen-Zhan Song and
Renjie Huang and
Behrooz Shirazi Adaptive Linear Filtering Compression on
Realtime Sensor Networks . . . . . . . . 1606--1620
Chih-Wei Yi and
Peng-Jun Wan and
Chao-Min Su and
Chen-Wei Huang The Critical Grid Size and Transmission
Radius for Local-Minimum-Free Grid
Routing in Wireless Ad Hoc and Sensor
Networks . . . . . . . . . . . . . . . . 1621--1631
Meng Zheng and
Wei Liang and
Haibin Yu and
Yang Xiao Cross Layer Optimization for
Energy-Constrained Wireless Sensor
Networks: Joint Rate Control and Routing 1632--1642
Long Cheng and
Yimin Chen and
Canfeng Chen and
Jian Ma and
Lei Shu and
Athanasios V. Vasilakos and
Naixue Xiong Efficient Query-Based Data Collection
for Mobile Wireless Monitoring
Applications . . . . . . . . . . . . . . 1643--1657
Jaime Lloret and
Sandra Sendra and
Hugo Coll and
Miguel Garcia Saving Energy in Wireless Local Area
Sensor Networks . . . . . . . . . . . . 1658--1673
Pruet Boonma and
Junichi Suzuki Moppet: a Model-Driven Performance
Engineering Framework for Wireless
Sensor Networks . . . . . . . . . . . . 1674--1690
Yu-Ying Shih and
Daniel Chao Sequence of Control in S$^3$PMR . . . . 1691--1703
Chung-Ming Huang and
Ming-Sian Lin and
Lik-Hou Chang The Design of Mobile Concurrent
Multipath Transfer in Multihomed
Wireless Mobile Networks . . . . . . . . 1704--1718
Jianxin Liao and
Qi Qi and
Xiaomin Zhu and
Yufei Cao and
Tonghong Li Enhanced IMS Handoff Mechanism for QoS
Support over Heterogeneous Network . . . 1719--1737
Maria Petrou and
Marco Elio Tabacchi and
Roberta Piroddi Networks of Concepts and Ideas . . . . . 1738--1751
Jon Crowcroft Internet Failures: an Emergent Sea of
Complex Systems and Critical Design
Errors? . . . . . . . . . . . . . . . . 1752--1757
Manfred Broy A Logical Basis for Component-Oriented
Software and Systems Engineering . . . . 1758--1782
Daniel Y. Chao Fewer Monitors and More Efficient
Controllability for Deadlock Control in
S$^3$PGR$^2$ (Systems of Simple
Sequential Processes with General
Resource Requirements) . . . . . . . . . 1783--1798
Qiang Liu and
George A. Constantinides and
Konstantinos Masselos and
Peter Y. K. Cheung Compiling C-like Languages to FPGA
Hardware: Some Novel Approaches
Targeting Data Memory Organization . . . 1--10
Mark S. Nixon and
Xin U. Liu and
Cem Direko\=glu and
David J. Hurley On Using Physical Analogies for Feature
and Shape Extraction in Computer Vision 11--25
Stefan Dantchev Dynamic Neighbourhood Cellular Automata 26--30
Corina C\^\irstea and
Alexander Kurz and
Dirk Pattinson and
Lutz Schröder and
Yde Venema Modal Logics are Coalgebraic . . . . . . 31--41
Glynn Winskel Events, Causality and Symmetry . . . . . 42--57
Andreas Bauer and
Jan Jürjens and
Yijun Yu Run-Time Security Traceability for
Evolving Systems . . . . . . . . . . . . 58--87
Kohei Honda and
Nobuko Yoshida A Unified Theory of Program Logics: an
Approach based on the $\pi$-Calculus . . 88--107
Heewan Park and
Hyun-il Lim and
Seokwoo Choi and
Taisook Han Detecting Common Modules in Java
Packages Based on Static Object Trace
Birthmark . . . . . . . . . . . . . . . 108--124
Sebastián Basterrech and
Samir Mohammed and
Gerardo Rubino and
Mostafa Soliman Levenberg--Marquardt Training Algorithms
for Random Neural Networks . . . . . . . 125--135
David Hartley EDSAC at 60---a Celebration of 60 Years
Since the First Program Ran on the EDSAC
at Cambridge . . . . . . . . . . . . . . 136--138
David Barron EDSAC: a Programmer Remembers . . . . . 139--142
Doron Swade Inventing the User: EDSAC in Context . . 143--147
D. Cavagnino and
A. E. Werbrouck An Analysis of Associated Dividends in
the DBM Algorithm for Division by
Constants Using Multiplication . . . . . 148--156
GuanJun Liu and
ChangJun Jiang and
Daniel Y. Chao A Necessary and Sufficient Condition for
the Liveness of Normal Nets . . . . . . 157--163
Jing Dong and
Tu Peng and
Yajing Zhao On Instantiation and Integration
Commutability of Design Pattern . . . . 164--184
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 185--186
A. Manzalini and
P. H. Deussen and
S. Nechifor and
M. Mamei and
R. Minerva and
C. Moiso and
A. Salden and
T. Wauters and
F. Zambonelli Self-optimized Cognitive Network of
Networks . . . . . . . . . . . . . . . . 189--196
Yosi Ben-Asher and
Sharoni Feldman and
Moran Feldman Dynamic Multipath Allocation in Ad Hoc
Networks . . . . . . . . . . . . . . . . 197--212
Giuseppe Anastasi and
Eleonora Borgia and
Marco Conti and
Enrico Gregori A Hybrid Adaptive Protocol for Reliable
Data Delivery in WSNS with Multiple
Mobile Sinks . . . . . . . . . . . . . . 213--229
Oliviu Ghica and
Goce Trajcevski and
Peter Scheuermann and
Nikolay Valtchanov and
Zachary Bischof Controlled Multi-Path Routing in Sensor
Networks Using Bézier Curves . . . . . . 230--254
Jywe-Fei Fang The Edge-Fault-Tolerant Bipancyclicity
of the Even $k$-ary $n$-cube . . . . . . 255--262
David Nicholson Defence Applications of Agent-Based
Information Fusion . . . . . . . . . . . 263--273
Thu-Ha Dao-Thi and
Jean-Michel Fourneau and
Minh-Anh Tran Multiple Class Symmetric G-networks with
Phase Type Service Times . . . . . . . . 274--284
Lucas Vespa and
Ning Weng and
Ramaswamy Ramaswamy MS-DFA: Multiple-Stride Pattern Matching
for Scalable Deep Packet Inspection . . 285--303
Mihaela Ulieru Book Review: Wired for Innovation: How
Information Technology is Reshaping the
Economy . . . . . . . . . . . . . . . . 304--305
A. Rogers Agent Technologies for Sensor Networks 307--308
Ettore Ferranti and
Niki Trigoni Practical Issues in Deploying Mobile
Agents to Explore a Sensor-Instrumented
Environment . . . . . . . . . . . . . . 309--320
Dirk Bade and
Winfried Lamersdorf An Agent-Based Event Processing
Middleware for Sensor Networks and RFID
Systems . . . . . . . . . . . . . . . . 321--331
Damla Turgut and
Ladislau Bölöni Heuristic Approaches for Transmission
Scheduling in Sensor Networks with
Multiple Mobile Sinks . . . . . . . . . 332--344
Shunichiro Suenaga and
Nobukazu Yoshioka and
Shinichi Honiden Group Migration by Mobile Agents in
Wireless Sensor Networks . . . . . . . . 345--355
Murat \cSensoy and
Thao Le and
Wamberto W. Vasconcelos and
Timothy J. Norman and
Alun D. Preece Resource Determination and Allocation in
Sensor Networks: a Hybrid Approach . . . 356--372
Sherine Abdelhak and
Rabi S. Chaudhuri and
Chandra S. Gurram and
Soumik Ghosh and
Magdy Bayoumi Energy-Aware Distributed $QR$
Decomposition on Wireless Sensor Nodes 373--391
Daniel D. Corkill Deploying Power-Aware, Wireless Sensor
Agents . . . . . . . . . . . . . . . . . 392--405
Edison Pignaton de Freitas and
Tales Heimfarth and
Carlos Eduardo Pereira and
Armando Morado Ferreira and
Flávio Rech Wagner and
Tony Larsson Multi-Agent Support in a Middleware for
Mission-Driven Heterogeneous Sensor
Networks . . . . . . . . . . . . . . . . 406--420
Andrew Markham and
Niki Trigoni The Automatic Evolution of Distributed
Controllers to Configure Sensor Network
Operation . . . . . . . . . . . . . . . 421--438
Francesco Aiello and
Giancarlo Fortino and
Raffaele Gravina and
Antonio Guerrieri A Java-Based Agent Platform for
Programming Wireless Sensor Networks . . 439--454
Meritxell Vinyals and
Juan A. Rodriguez-Aguilar and
Jesus Cerquides A Survey on Sensor Networks from a
Multiagent Perspective . . . . . . . . . 455--470
Antony Waldock and
David Nicholson A Framework for Cooperative Control
Applied to a Distributed Sensor Network 471--481
Partha Mukherjee and
Sandip Sen Comparing Reputation Schemes for
Detecting Malicious Nodes in Sensor
Networks . . . . . . . . . . . . . . . . 482--489
Richard Tynan and
Conor Muldoon and
Gregory O'Hare and
Michael O'Grady Coordinated Intelligent Power Management
and the Heterogeneous Sensing Coverage
Problem . . . . . . . . . . . . . . . . 490--502
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 503--504
Zuowen Tan An Off-line Electronic Cash Scheme Based
on Proxy Blind Signature . . . . . . . . 505--512
Fuchun Guo and
Yi Mu and
Willy Susilo Short Signatures with a Tighter Security
Reduction Without Random Oracles . . . . 513--524
Qiong Huang and
Duncan S. Wong and
Guomin Yang Heterogeneous Signcryption with Key
Privacy . . . . . . . . . . . . . . . . 525--536
Mehran S. Fallah and
Maryam Mouzarani A Game-based Sybil-resistant Strategy
for Reputation Systems in
Self-organizing Manets . . . . . . . . . 537--548
Biming Tian and
Song Han and
Sazia Parvin and
Jiankun Hu and
Sajal Das Self-Healing Key Distribution Schemes
for Wireless Networks: a Survey . . . . 549--569
Prasanta Gogoi and
D. K. Bhattacharyya and
B. Borah and
Jugal K. Kalita A Survey of Outlier Detection Methods in
Network Anomaly Identification . . . . . 570--588
Ender Yüksel and
Hanne Riis Nielson and
Flemming Nielson A Secure Key Establishment Protocol for
ZigBee Wireless Sensor Networks . . . . 589--601
Murat Ergun and
Albert Levi and
Erkay Savas Increasing Resiliency in Multi-phase
Wireless Sensor Networks: Generationwise
Key Predistribution Approach . . . . . . 602--616
David Taniar and
Maytham Safar and
Quoc Thai Tran and
Wenny Rahayu and
Jong Hyuk Park Spatial Network RNN Queries in GIS . . . 617--627
Chien-Lung Chan Information Security Risk Modeling Using
Bayesian Index . . . . . . . . . . . . . 628--638
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 639--640
Jeremy T. Bradley Computer Performance Evaluation: Preface 641--642
Nigel Thomas and
Yishi Zhao Mean value analysis for a class of Pepa
models . . . . . . . . . . . . . . . . . 643--652
Gianfranco Balbo and
Marco Beccuti and
Massimiliano De Pierro and
Giuliana Franceschinis First Passage Time Computation in Tagged
GSPNs with Queue Places . . . . . . . . 653--673
Connie U. Smith and
Catalina M. Lladó and
Ramon Puigjaner Model Interchange Format Specifications
for Experiments, Output and Results . . 674--690
Abigail S. Lebrecht and
Nicholas J. Dingle and
William J. Knottenbelt Analytical and Simulation Modelling of
Zoned RAID Systems . . . . . . . . . . . 691--707
Mehmet Serkan Apaydin and
Bülent Çatay and
Nicholas Patrick and
Bruce R. Donald NVR-BIP: Nuclear Vector Replacement
using Binary Integer Programming for NMR
Structure-Based Assignments . . . . . . 708--716
Ender Sevinç and
Ahmet Co\csar An Evolutionary Genetic Algorithm for
Optimization of Distributed Database
Queries . . . . . . . . . . . . . . . . 717--725
H. Sarbazi-Azad and
A. Khonsari and
M. Ould-Khaoua On the Topological Properties of
Grid-Based Interconnection Networks:
Surface Area and Volume of Radial
Spheres . . . . . . . . . . . . . . . . 726--737
Rìfat Benveniste and
Cem Ünsalan A Color Invariant for Line Stripe-Based
Range Scanners . . . . . . . . . . . . . 738--753
Marco Bozzano and
Alessandro Cimatti and
Joost-Pieter Katoen and
Viet Yen Nguyen and
Thomas Noll and
Marco Roveri Safety, Dependability and Performance
Analysis of Extended AADL Models . . . . 754--775
James F. Korsh Fast Generation of $t$-ary Trees . . . . 776--785
Ramon Bertran and
Marc Gonz\`alez and
Xavier Martorell and
Nacho Navarro and
Eduard Ayguadé Local Memory Design Space Exploration
for High-Performance Computing . . . . . 786--799
Murat Ali Bayir and
Murat Demirbas and
Ahmet Cosar A Web-Based Personalized Mobility
Service for Smartphone Applications . . 800--814
Minhaj Ahmad Khan Data Cache Prefetching With Dynamic
Adaptation . . . . . . . . . . . . . . . 815--823
Yen-Ju Chen and
Jia-Jie Liu and
Yue-Li Wang An Optimal Rotation Distance Set . . . . 824--830
Mark Levene Book Review: Search Engines: Information
Retrieval in Practice . . . . . . . . . 831--832
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 833--835
Django Armstrong and
Karim Djemame Performance Issues in Clouds: an
Evaluation of Virtual Image Propagation
and I/O Paravirtualization . . . . . . . 836--849
Erol Gelenbe and
Christina Morfopoulou A Framework for Energy-Aware Routing in
Packet Networks . . . . . . . . . . . . 850--859
Arshad Jhumka and
Matthew Leeke and
Sambid Shrestha On the Use of Fake Sources for Source
Location Privacy: Trade-Offs Between
Energy and Privacy . . . . . . . . . . . 860--874
Osama Younes and
Nigel Thomas An SRN Model of the IEEE 802.11 DCF MAC
Protocol in Multi-Hop Ad Hoc Networks
with Hidden Nodes . . . . . . . . . . . 875--893
Feng Liu and
Xiaoyu Song and
Qingping Tan and
Gang Chen Formal Analysis of Hybrid
Prefix/Carry-Select Arithmetic Systems 894--904
Qiang Li and
Qin-fen Hao and
Li-min Xiao and
Zhou-jun Li An Integrated Approach to Automatic
Management of Virtualized Resources in
Cloud Environments . . . . . . . . . . . 905--919
Yonghong Xiang and
Iain A. Stewart A Multipath Analysis of Biswapped
Networks . . . . . . . . . . . . . . . . 920--930
Kalika Suksomboon and
Panita Pongpaibool and
Yusheng Ji and
Chaodit Aswakul PC-Nash: QoS Provisioning Framework With
Path-Classification Scheme Under Nash
Equilibrium . . . . . . . . . . . . . . 931--943
Mustafa K. Gurcan and
Hadhrami Ab Ghani and
Jihai Zhou and
Anusorn Chungtragarn Bit Energy Consumption Minimization for
Multi-path Routing in Ad Hoc Networks 944--959
S. A. Jarvis UK Performance Engineering Workshop 2010 960--961
Jie Yu and
Zhoujun Li and
Peng Xiao and
Chengfang Fang and
Jia Xu and
Ee-Chien Chang ID Repetition in Structured P2P Networks 962--975
Guangyan Huang and
Yanchun Zhang and
Jing He and
Jinli Cao Fault Tolerance in Data Gathering
Wireless Sensor Networks . . . . . . . . 976--987
A. Sinan Akyurek and
Elif Uysal-Biyikoglu A Depth-optimal Low-complexity
Distributed Wireless Multicast Algorithm 988--1003
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1005--1009
Alex W. Stedmon and
Benjamin Hasseldine and
David Rice and
Mark Young and
Steve Markham and
Michael Hancox and
Edward Brickell and
Joanna Noble `MotorcycleSim': an Evaluation of Rider
Interaction with an Innovative
Motorcycle Simulator . . . . . . . . . . 1010--1025
Petr Hnetynka and
Liam Murphy and
John Murphy Comparing the Service Component
Architecture and Fractal Component Model 1026--1037
Tatjana Kapus Closing a System in the Dynamic
Input/Output Automata Model . . . . . . 1038--1048
Ahmad Taherkhani and
Ari Korhonen and
Lauri Malmi Recognizing Algorithms Using Language
Constructs, Software Metrics and Roles
of Variables: an Experiment with Sorting
Algorithms . . . . . . . . . . . . . . . 1049--1066
Paul E. Dunne On Constructing Minimal Formulae . . . . 1067--1075
Alessandro Basso and
Davide Cavagnino and
Victor Pomponiu and
Annamaria Vernone Blind Watermarking of Color Images Using
Karhunen--Lo\`eve Transform Keying . . . 1076--1090
Yuqing Wu and
Dirk Van Gucht and
Marc Gyssens and
Jan Paredaens A Study of a Positive Fragment of Path
Queries: Expressiveness, Normal Form and
Minimization . . . . . . . . . . . . . . 1091--1118
Harold Thimbleby Signposting in Documents . . . . . . . . 1119--1135
Chuen-Horng Lin and
Wei-Chih Lin Image Retrieval System Based on Adaptive
Color Histogram and Texture Features . . 1136--1147
David Pinto and
Paolo Rosso and
Héctor Jiménez-Salazar A Self-enriching Methodology for
Clustering Narrow Domain Short Texts . . 1148--1165
Sven Hartmann and
Uwe Leck and
Sebastian Link On Codd Families of Keys over Incomplete
Relations . . . . . . . . . . . . . . . 1166--1180
Tetsu Narumi and
Kenji Yasuoka and
Makoto Taiji and
Francesco Zerbetto and
Siegfried Höfinger Fast Calculation of Electrostatic
Potentials on the GPU or the ASIC
MD-GRAPE-3 . . . . . . . . . . . . . . . 1181--1187
Alexandre R. J. François An Architectural Framework for the
Design, Analysis and Implementation of
Interactive Systems . . . . . . . . . . 1188--1204
Yulai Xie Some Results on Minimum Discrete Bending
Energy Path in Simple Polygon . . . . . 1205--1210
Jia Lee and
Susumu Adachi and
Ferdinand Peper A Partitioned Cellular Automaton
Approach for Efficient Implementation of
Asynchronous Circuits . . . . . . . . . 1211--1220
Medeni Soysal and
A. Aydin Alatan Joint Utilization of Appearance,
Geometry and Chance for Scene Logo
Retrieval . . . . . . . . . . . . . . . 1221--1231
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1233--1234
Constandinos X. Mavromoustakis and
Helen D. Karatza Embedded Socio-oriented Model for
End-to-End Reliable Stream Schedules by
Using Collaborative Outsourcing in Mp2P
Systems . . . . . . . . . . . . . . . . 1235--1247
Amirhosein Taherkordi and
Frédéric Loiret and
Romain Rouvoy and
Frank Eliassen A Generic Component-Based Approach for
Programming, Composing and Tuning Sensor
Software . . . . . . . . . . . . . . . . 1248--1266
In Hwan Doh and
Jongmoo Choi and
Donghee Lee and
Sam H. Noh An Empirical Study of Deploying Storage
Class Memory into the I/O Path of
Portable Systems . . . . . . . . . . . . 1267--1281
José Luis March and
Julio Sahuquillo and
Houcine Hassan and
Salvador Petit and
José Duato A New Energy-Aware Dynamic Task Set
Partitioning Algorithm for Soft and Hard
Embedded Real-Time Systems . . . . . . . 1282--1294
Ali Ahmadinia and
Alireza Shahrabi A Highly Adaptive and Efficient Router
Architecture for Network-on-Chip . . . . 1295--1307
Minseong Kim and
Andy Wellings Multiprocessors and Asynchronous Event
Handling in the Real-Time Specification
for Java . . . . . . . . . . . . . . . . 1308--1324
Mohammed F. Mokbel and
Robert D. Kent and
Michael Wong An Abstract Semantically Rich Compiler
Collocative and Interpretative Model for
OpenMP Programs . . . . . . . . . . . . 1325--1343
Tiziana Calamoneri The $L(h, k)$-Labelling Problem: an
Updated Survey and Annotated
Bibliography . . . . . . . . . . . . . . 1344--1371
Antoine Bossard and
Keiichi Kaneko and
Shietung Peng A New Node-to-Set Disjoint-Path
Algorithm in Perfect Hierarchical
Hypercubes . . . . . . . . . . . . . . . 1372--1381
Eun-Chan Park and
Minjoong Rim Fair Coexistence MAC Protocol for
Contention-Based Heterogeneous Networks 1382--1397
Onur Yilmaz and
Orhan Dagdeviren and
Kayhan Erciyes Interference-Aware Dynamic Algorithms
for Energy-Efficient Topology Control in
Wireless Ad Hoc and Sensor Networks . . 1398--1411
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1413--1415
Shuo Xu and
Fan Yu and
Zhe Luo and
Ze Ji and
Duc Truong Pham and
Renxi Qiu Adaptive Bees Algorithm ---
Bioinspiration from Honeybee Foraging to
Optimize Fuel Economy of a Semi-Track
Air-Cushion Vehicle . . . . . . . . . . 1416--1426
Hugo Hernández and
Christian Blum Foundations of \sc Antcycle:
Self-synchronized Duty-cycling in Mobile
Sensor Networks . . . . . . . . . . . . 1427--1448
Wei-Po Lee and
Yu-Ting Hsiao An Adaptive GA--PSO Approach with Gene
Clustering to Infer S-system Models of
Gene Regulatory Networks . . . . . . . . 1449--1464
Hongxing Wei and
Youdong Chen and
Miao Liu and
Yingpeng Cai and
Tianmiao Wang Swarm Robots: from Self-assembly to
Locomotion . . . . . . . . . . . . . . . 1465--1474
Hanife Kebapci and
Berrin Yanikoglu and
Gozde Unal Plant Image Retrieval Using Color, Shape
and Texture Features . . . . . . . . . . 1475--1490
Maria Petrou and
Archontis Giannakidis Full Tomographic Reconstruction of $2$D
Vector Fields using Discrete Integral
Data . . . . . . . . . . . . . . . . . . 1491--1504
Gérard Sabah Natural Language Understanding, Where
Are We Going? Where Could We Go? . . . . 1505--1513
Stelios Timotheou Asset-Task Assignment Algorithms in the
Presence of Execution Uncertainty . . . 1514--1525
Serdar Cakir and
A. Enis Cetin Mel- and Mellin-cepstral Feature
Extraction Algorithms for Face
Recognition . . . . . . . . . . . . . . 1526--1534
Gözde Özbal and
Hìlal Karaman and
Ferda N. Alpaslan A Content-Boosted Collaborative
Filtering Approach for Movie
Recommendation Based on Local and Global
Similarity and Missing Data Prediction 1535--1546
S. B. Kotsiantis Cascade Generalization with Reweighting
Data for Handling Imbalanced Problems 1547--1559
Mark Levene Chess Metaphors, Artificial Intelligence
and the Human Mind . . . . . . . . . . . 1560--1560
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1561--1564
Monowar H. Bhuyan and
D. K. Bhattacharyya and
J. K. Kalita Surveying Port Scans and Their Detection
Methodologies . . . . . . . . . . . . . 1565--1581
Duc-Phong Le and
Chao-Liang Liu Refinements of Miller's Algorithm over
Weierstrass Curves Revisited . . . . . . 1582--1591
Salih Ergün A Truly Random Number Generator Based on
a Pulse-Excited Cross-Coupled Chaotic
Oscillator . . . . . . . . . . . . . . . 1592--1602
Ruben Rios and
Javier Lopez Exploiting Context-Awareness to Enhance
Source-Location Privacy in Wireless
Sensor Networks . . . . . . . . . . . . 1603--1615
Hossein Homaei and
Hamid Reza Shahriari Compositional Approach to Quantify the
Vulnerability of Computer Systems . . . 1616--1631
Kai Xi and
Yan Tang and
Jiankun Hu Correlation Keystroke Verification
Scheme for User Access Control in Cloud
Computing Environment . . . . . . . . . 1632--1644
Yong Yu and
Yi Mu and
Guilin Wang and
Ying Sun Cryptanalysis of an Off-Line Electronic
Cash Scheme Based on Proxy Blind
Signature . . . . . . . . . . . . . . . 1645--1651
Hassan Jameel Asghar and
Josef Pieprzyk and
Huaxiong Wang On the Hardness of the Sum of $k$ Mins
Problem . . . . . . . . . . . . . . . . 1652--1660
Jun Zhang and
Yang Xiang and
Wanlei Zhou and
Lei Ye and
Yi Mu Secure Image Retrieval Based on Visual
Content and Watermarking Protocol . . . 1661--1674
Lan Zhou and
Vijay Varadharajan and
Michael Hitchens Enforcing Role-Based Access Control for
Secure Data Storage in the Cloud . . . . 1675--1687
Lein Harn and
Chia-Yin Lee and
Changlu Lin and
Chin-Chen Chang Fully Deniable Message Authentication
Protocols Preserving Confidentiality . . 1688--1699
Yini Wang and
Sheng Wen and
Silvio Cesare and
Wanlei Zhou and
Yang Xiang The Microcosmic Model of Worm
Propagation . . . . . . . . . . . . . . 1700--1720
Erika Rosas and
Olivier Marin and
Xavier Bonnaire Corps: Building a Community of Reputable
Peers in Distributed Hash Tables . . . . 1721--1735
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1737--1740
Chenfeng Xu and
Hongsheng Xi and
Fengguang Wu Evaluation and Optimization of Kernel
File Readaheads Based on Markov Decision
Models . . . . . . . . . . . . . . . . . 1741--1755
Edgar G. Daylight Dijkstra's Rallying Cry for
Generalization: the Advent of the
Recursive Procedure, Late 1950s--Early
1960s . . . . . . . . . . . . . . . . . 1756--1772
Mitzi McCarthy and
Zhen He Efficient Updates for OLAP Range Queries
on Flash Memory . . . . . . . . . . . . 1773--1789
Tien Van Do Comparison of Allocation Schemes for
Virtual Machines in Energy-Aware Server
Farms . . . . . . . . . . . . . . . . . 1790--1797
Amir Kaivani and
Ghassem Jaberipur Decimal CORDIC Rotation based on
Selection by Rounding: Algorithm and
Architecture . . . . . . . . . . . . . . 1798--1809
Cagatay Turkay and
Emre Koc and
Selim Balcisoy Integrating Information Theory in
Agent-Based Crowd Simulation Behavior
Models . . . . . . . . . . . . . . . . . 1810--1820
Gabriel Rodríguez and
María J. Martín and
Patricia González and
Juan Touriño Analysis of Performance-impacting
Factors on Checkpointing Frameworks: the
CPPC Case Study . . . . . . . . . . . . 1821--1837
Jia-Jie Liu and
William Chung-Kung Yen and
Yen-Ju Chen An Optimal Algorithm for Untangling
Binary Trees via Rotations . . . . . . . 1838--1844
Ahmad Taherkhani Using Decision Tree Classifiers in
Source Code Analysis to Recognize
Algorithms: an Experiment with Sorting
Algorithms . . . . . . . . . . . . . . . 1845--1860
Francisco Vázquez and
Ester M. Garzón and
José Jesús Fernández Matrix Implementation of Simultaneous
Iterative Reconstruction Technique
(Sirt) on GPUs . . . . . . . . . . . . . 1861--1868
Tiziana Calamoneri The $L(2, 1)$-Labeling Problem on
Oriented Regular Grids . . . . . . . . . 1869--1875
Ionu\dt Popa SE-Compression: a Generalization of
Dictionary-Based Compression . . . . . . 1876--1881
Yang Liu and
Zhen He and
Yi-Ping Phoebe Chen and
Thi Nguyen External Sorting on Flash Memory Via
Natural Page Run Generation . . . . . . 1882--1990
Francisco Ortin Type Inference to Optimize a Hybrid
Statically and Dynamically Typed
Language . . . . . . . . . . . . . . . . 1901--1924
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1925--1927
Damianos Gavalas and
Grammati Pantziou and
Charalampos Konstantopoulos Mobility in Wireless Sensor Networks . . 1928--1930
Roland Kays and
Sameer Tilak and
Margaret Crofoot and
Tony Fountain and
Daniel Obando and
Alejandro Ortega and
Franz Kuemmeth and
Jamie Mandel and
George Swenson and
Thomas Lambert and
Ben Hirsch and
Martin Wikelski Tracking Animal Location and Activity
with an Automated Radio Telemetry System
in a Tropical Rainforest . . . . . . . . 1931--1948
Giuseppe Cardone and
Antonio Corradi and
Luca Foschini Cross-Network Opportunistic Collection
of Urgent Data in Wireless Sensor
Networks . . . . . . . . . . . . . . . . 1949--1962
Mahdi Zareei and
Alireza Taghizadeh and
Rahmat Budiarto and
Tat-Chee Wan EMS-MAC: Energy Efficient
Contention-Based Medium Access Control
Protocol for Mobile Sensor Networks . . 1963--1972
Olof Rensfelt and
Frederik Hermans and
Per Gunningberg and
Lars-Åke Larzon and
Erik Björnemo Repeatable Experiments with Mobile Nodes
in a Relocatable WSN Testbed . . . . . . 1973--1986
M. Emre Keskin and
I. Kuban Altinel and
Necati Aras and
Cem Ersoy Lifetime Maximization in Wireless Sensor
Networks Using a Mobile Sink with
Nonzero Traveling Time . . . . . . . . . 1987--1999
Zeqiang Chen and
Liping Di and
Genong Yu and
Nengcheng Chen Real-Time On-Demand Motion Video Change
Detection in the Sensor Web Environment 2000--2016
Kai-Ting Yang and
Ge-Ming Chiu A Hybrid Pull-Based with Piggybacked
Push Protocol for Cache Sharing . . . . 2017--2032
Jih-Ching Chiu and
Yu-Liang Chou and
Po-Kai Chen and
Ding-Siang Su A Unitable Computing Architecture for
Chip Multiprocessors . . . . . . . . . . 2033--2052
Yanbo Wu and
Quan Z. Sheng and
Damith C. Ranasinghe Facilitating Efficient Object Tracking
in Large-Scale Traceability Networks . . 2053--2071
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1--2
Kazuma Akamine and
Ken Fukuchi and
Akisato Kimura and
Shigeru Takagi Fully Automatic Extraction of Salient
Objects from Videos in Near Real Time 3--14
Daniel Ruijters and
Philippe Thévenaz GPU Prefilter for Accurate Cubic
B-spline Interpolation . . . . . . . . . 15--20
Sangpil Lee and
Won W. Ro Accelerated Network Coding with Dynamic
Stream Decomposition on Graphics
Processing Unit . . . . . . . . . . . . 21--34
Sumeer Goel and
Yasser Ismail and
Magdy Bayoumi High-speed Motion Estimation
Architecture for Real-time Video
Transmission . . . . . . . . . . . . . . 35--46
Ingrid Petric and
Bojan Cestnik and
Nada Lavrac and
Tanja Urbancic Outlier Detection in Cross-Context Link
Discovery for Creative Literature Mining 47--61
M. O\uguzhan Külekci and
Jeffrey Scott Vitter and
Bojian Xu Fast Pattern-Matching via $k$-bit
Filtering Based Text Decomposition . . . 62--68
Manuel Abellanas and
Antonio Leslie Bajuelos and
Inês Matos Minimizing the Range for $k$-Covered
Paths on Sensor Networks . . . . . . . . 69--81
Vid Podpecan and
Monika Zemenova and
Nada Lavrac Orange4Ws Environment for
Service-Oriented Data Mining . . . . . . 82--98
Dick Hamlet Science, Mathematics, Computer Science,
Software Engineering . . . . . . . . . . 99--110
Antonio Fariña and
Gonzalo Navarro and
José R. Paramá Boosting Text Compression with
Word-Based Statistical Encoding . . . . 111--131
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 133--135
S. A. Jarvis Editorial Performance Modelling,
Benchmarking and Simulation of
High-Performance Computing Systems . . . 136--137
S. J. Pennycook and
S. D. Hammond and
G. R. Mudalige and
S. A. Wright and
S. A. Jarvis On the Acceleration of Wavefront
Applications using Distributed Many-Core
Architectures . . . . . . . . . . . . . 138--153
Xingfu Wu and
Valerie Taylor Performance Characteristics of Hybrid
MPI/OpenMP Implementations of NAS
Parallel Benchmarks SP and BT on
Large-Scale Multicore Clusters . . . . . 154--167
M. B. Giles and
G. R. Mudalige and
Z. Sharif and
G. Markall and
P. H. J. Kelly Performance Analysis and Optimization of
the OP2 Framework on Many-Core
Architectures . . . . . . . . . . . . . 168--180
Ming-yu Hsieh and
Rolf Riesen and
Kevin Thompson and
William Song and
Arun Rodrigues SST: a Scalable Parallel Framework for
Architecture-Level Performance, Power,
Area and Thermal Simulation . . . . . . 181--191
Simon McIntosh-Smith and
Terry Wilson and
Amaurys Ávila Ibarra and
Jonathan Crisp and
Richard B. Sessions Benchmarking Energy Efficiency, Power
Costs and Carbon Emissions on
Heterogeneous Systems . . . . . . . . . 192--205
Sandeep Budanur and
Frank Mueller and
Todd Gamblin Memory Trace Compression and Replay for
SPMD Systems Using Extended PRSDs . . . 206--217
Sergio González-Valenzuela and
Son T. Vuong and
Victor C. M. Leung Leveraging Service Discovery in MANETs
with Mobile Directories . . . . . . . . 218--231
Dong-Heon Jung and
Soo-Mook Moon and
Sung-Hwan Bae Evaluation of a Java Ahead-of-Time
Compiler for Embedded Systems . . . . . 232--252
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 253--255
Jason J. Jung and
Dariusz Król Editorial: Engineering Knowledge and
Semantic Systems . . . . . . . . . . . . 256--257
Grzegorz Kukla and
Przemyslaw Kazienko and
Piotr Bródka and
Tomasz Filipowski Soclake: Social Latent Knowledge
Explorator . . . . . . . . . . . . . . . 258--276
ZongDa Wu and
GuanDong Xu and
YanChun Zhang and
Peter Dolog and
ChengLang Lu An Improved Contextual Advertising
Matching Approach based on Wikipedia
Knowledge . . . . . . . . . . . . . . . 277--292
Olcay Taner Yildiz Univariate Decision Tree Induction using
Maximum Margin Classification . . . . . 293--298
Gerasimos Spanakis and
Georgios Siolas and
Andreas Stafylopatis Exploiting Wikipedia Knowledge for
Conceptual Hierarchical Clustering of
Documents . . . . . . . . . . . . . . . 299--312
Mariano Rivera and
Oscar Dalmau and
Washington Mio and
Alonso Ramirez-Manzanares Spatial Sampling for Image Segmentation 313--324
Hideki Katagiri and
Ichiro Nishizaki and
Tomohiro Hayashida and
Takanori Kadoma Multiobjective Evolutionary Optimization
of Training and Topology of Recurrent
Neural Networks for Time-Series
Prediction . . . . . . . . . . . . . . . 325--336
Jason J. Jung Discovering Community of Lingual
Practice for Matching Multilingual Tags
from Folksonomies . . . . . . . . . . . 337--346
Muhammad Raza and
Farookh Khadeer Hussain and
Omar Khadeer Hussain Neural Network-Based Approach for
Predicting Trust Values Based on
Non-uniform Input in Mobile Applications 347--378
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 379--381
Jiankun Hu and
Yang Xiang and
Wanlei Zhou Advances in Network and System Security:
Editorial Statement . . . . . . . . . . 382--383
Leonardo B. Oliveira and
Aman Kansal and
Conrado P. L. Gouvêa and
Diego F. Aranha and
Julio López and
Bodhi Priyantha and
Michel Goraczko and
Feng Zhao Secure-TWS: Authenticating Node to
Multi-user Communication in Shared
Sensor Networks . . . . . . . . . . . . 384--396
Udaya Kiran Tupakula and
Vijay Varadharajan Dynamic State-Based Security
Architecture for Detecting Security
Attacks in Virtual Machines . . . . . . 397--409
Shui Yu and
Wanlei Zhou and
Weijia Jia and
Jiankun Hu Attacking Anonymous Web Browsing at
Local Area Networks Through Browsing
Dynamics . . . . . . . . . . . . . . . . 410--421
Xiaoxun Sun and
Hua Wang and
Jiuyong Li and
Yanchun Zhang Satisfying Privacy Requirements Before
Data Anonymization . . . . . . . . . . . 422--437
Biming Tian and
Song Han and
Sazia Parvin and
Jiankun Hu and
Sajal Das Erratum: Self-Healing Key Distribution
Schemes for Wireless Networks: a Survey 438--438
Hung-Yu Chien Improved Anonymous Multi-receiver
Identity-Based Encryption . . . . . . . 439--446
Xiangyang Luo and
Fenlin Liu and
Chunfang Yang and
Shiguo Lian and
Daoshun Wang On F5 Steganography in Images . . . . . 447--456
Xinyi Huang and
Yi Mu and
Willy Susilo and
Duncan S. Wong and
Wei Wu Certificateless Signatures: New Schemes
and Security Models . . . . . . . . . . 457--474
Yuh-Min Tseng and
Tung-Tso Tsai Efficient Revocable ID-Based Encryption
with a Public Channel . . . . . . . . . 475--486
Lina Zhu and
Li Feng and
Zuochang Zhang Predicting the Propagation Path of
Random Worm by Subnet Infection
Situation Using Fuzzy Reasoning . . . . 487--496
Lanfranco Lopriore Encrypted Pointers in Protection System
Design . . . . . . . . . . . . . . . . . 497--507
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 509--511
Nihal Pekergin Introduction to the Special Issue on
Probability Models in Performance
Analysis . . . . . . . . . . . . . . . . 512--514
Peter Whittle Neural Memories and Oscillatory
Operation . . . . . . . . . . . . . . . 515--521
Azaria Paz and
Jack W. Carlyle Chaotic Evolution via Generalized
Probabilistic Automata (Probabilistic
Arrays) . . . . . . . . . . . . . . . . 522--533
Tien Viet Nguyen and
François Baccelli A Stochastic Geometry Model for
Cognitive Radio Networks . . . . . . . . 534--552
Emmanuel Hyon and
Alain Jean-Marie Scheduling Services in a Queuing System
with Impatience and Setup Costs . . . . 553--563
H. Castel-Taleb and
I. Ismael-Aouled and
N. Pekergin Bounding Aggregations for Transient and
Stationary Performance Analysis of
Subnetworks . . . . . . . . . . . . . . 564--576
Thu-Ha Dao-Thi and
Jean-Michel Fourneau and
Minh-Anh Tran Erratum: Multiple Class Symmetric
G-networks with Phase Type Service Times 577--577
Mehmet Hakan Karaata and
Ozgur Sinanoglu and
Bader AlBdaiwi An Optimal Inherently Stabilizing
$2$-Neighborhood Crash Resilient
Protocol for Secure and Reliable Routing
in Hypercube Networks . . . . . . . . . 578--589
Jakub Stárka and
Martin Svoboda and
Jan Sochna and
Jirí Schejbal and
Irena Mlýnková and
David Bednárek Analyzer: a Complex System for Data
Analysis . . . . . . . . . . . . . . . . 590--615
Supriya Aggarwal and
Kavita Khare Design Techniques Targeting
Low-Area-Power-Delay Product in
Hyperbolic CORDIC Algorithm . . . . . . 616--628
Samuel Antão and
Jean-Claude Bajard and
Leonel Sousa RNS-Based Elliptic Curve Point
Multiplication for Massive Parallel
Architectures . . . . . . . . . . . . . 629--647
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 649--650
Wojciech Mazurczyk and
Krzysztof Szczypiorski Toward Effective and Reliable Digital
Forensics . . . . . . . . . . . . . . . 651--652
Jacques M. Bahi and
Jean-François Couchot and
Christophe Guyeux Steganography: a Class of Secure and
Robust Algorithms . . . . . . . . . . . 653--666
Gaurav Bhatnagar and
Q. M. Jonathan Wu and
Balasubramanian Raman Image and Video Encryption based on Dual
Space-Filling Curves . . . . . . . . . . 667--685
Xiaofeng Wang and
Nanning Zheng and
Jianru Xue and
Zhenli Liu A Novel Image Signature Method for
Content Authentication . . . . . . . . . 686--701
Hui Tian and
Hong Jiang and
Ke Zhou and
Dan Feng Transparency-Orientated Encoding
Strategies for Voice-over-IP
Steganography . . . . . . . . . . . . . 702--716
Chunfang Yang and
Fenlin Liu and
Shiguo Lian and
Xiangyang Luo and
Daoshun Wang Weighted Stego-Image Steganalysis of
Messages Hidden into Each Bit Plane . . 717--727
Ronaldo M. Salles and
Donato A. Marino, Jr. Strategies and Metric for Resilience in
Computer Networks . . . . . . . . . . . 728--739
João V. Gomes and
Pedro R. M. Inácio and
Manuela Pereira and
Mário M. Freire and
Paulo P. Monteiro Exploring Behavioral Patterns Through
Entropy in Multimedia Peer-to-Peer
Traffic . . . . . . . . . . . . . . . . 740--755
Chao-Hsien Lee and
Chung-Ming Huang and
Chia-Ching Yang and
Tai-Hsiang Wang CO-SVC-MDC-Based Cooperative Video
Streaming Over Vehicular Networks . . . 756--768
Antoine Bossard and
Keiichi Kaneko The Set-to-Set Disjoint-Path Problem in
Perfect Hierarchical Hypercubes . . . . 769--775
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 777--778
Simon Lavington A Synopsis of the Book \booktitleAlan
Turing and his Contemporaries: Building
the World's First Computers . . . . . . 779--787
P. Whittle A Natural Channel Coding for the Finite
and Infinite Time Axes . . . . . . . . . 788--798
Peter J. Denning Reflections on a Symposium on
Computation . . . . . . . . . . . . . . 799--802
Peter J. Denning and
Peter Wegner Introduction to What is Computation . . 803--804
Peter J. Denning Opening Statement: What is Computation? 805--810
Peter Wegner The Evolution of Computation . . . . . . 811--813
John S. Conery Computation is Symbol Manipulation . . . 814--816
Dennis J. Frailey Computation is Process . . . . . . . . . 817--819
Paul S. Rosenbloom Computing and Computation . . . . . . . 820--824
Ruzena Bajcsy Computation and Information . . . . . . 825--825
Dave Bacon Computation and Fundamental Physics . . 826--829
Lance Fortnow The Enduring Legacy of the Turing
Machine . . . . . . . . . . . . . . . . 830--831
Alfred V. Aho Computation and Computational Thinking 832--835
Joseph Traub What is the Right Computational Model
for Continuous Scientific Problems? . . 836--837
Jeffrey P. Buzen Computation, Uncertainty and Risk . . . 838--847
Erol Gelenbe Natural Computation . . . . . . . . . . 848--851
Melanie Mitchell Biological Computation . . . . . . . . . 852--855
Paolo Rocchi What is Information: Beyond the Jungle
of Information Theories . . . . . . . . 856--860
Peter A. Freeman Consideration of the Question ``What Is
Computation'' Considered Harmful . . . . 861--862
Peter J. Denning Closing Statement: What Have We Said
About Computation? . . . . . . . . . . . 863--865
Jane Hillston and
Mirco Tribastone and
Stephen Gilmore Stochastic Process Algebras: from
Individuals to Populations . . . . . . . 866--881
Jeremy T. Bradley and
Nigel Thomas and
Richard A. Hayden and
Anton Stefanek Invited Response to Computer Journal
Lecture by Prof. Jane Hillston . . . . . 882--886
Jinhai Cai Robust Filtering-Based Thinning
Algorithm for Pattern Recognition . . . 887--896
Jie Lin and
Don Adjeroh All-Against-All Circular Pattern
Matching . . . . . . . . . . . . . . . . 897--906
Bharat Jayaraman Special Issue on Security and
Performance of Networks and Clouds:
Guest Editor's Introduction . . . . . . 907--908
Rachit Agarwal and
Abhik Banerjee and
Vincent Gauthier and
Monique Becker and
Chai Kiat Yeo and
Bu Sung Lee Achieving Small-World Properties using
Bio-Inspired Techniques in Wireless
Networks . . . . . . . . . . . . . . . . 909--931
Yan Sun and
Qiangfeng Jiang and
Mukesh Singhal A Hill-Area-Restricted Geographic
Routing Protocol for Mobile Ad Hoc and
Sensor Networks . . . . . . . . . . . . 932--949
Omer H. Abdelrahman and
Erol Gelenbe Packet Delay and Energy Consumption in
Non-homogeneous Networks . . . . . . . . 950--964
Hongfang Yu and
Vishal Anand and
Chunming Qiao Virtual Infrastructure Design for
Surviving Physical Link Failures . . . . 965--978
Antonio Muñoz and
Javier Gonzalez and
Antonio Maña A Performance-Oriented Monitoring System
for Security Properties in Cloud
Computing Applications . . . . . . . . . 979--994
Timothy Wood and
K. K. Ramakrishnan and
Prashant Shenoy and
Jacobus Van der Merwe Enterprise-Ready Virtual Cloud Pools:
Vision, Opportunities and Challenges . . 995--1004
Shivsubramani Krishnamoorthy and
Preeti Bhargava and
Matthew Mah and
Ashok Agrawala Representing and Managing the Context of
a Situation . . . . . . . . . . . . . . 1005--1019
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1021--1022
Mark Burgin and
Eugene Eberbach Evolutionary Automata: Expressiveness
and Convergence of Evolutionary
Computation . . . . . . . . . . . . . . 1023--1029
Yang Wang and
Lin Wu and
Xiaodi Huang and
Xuemin Lin Human Action Recognition from Video
Sequences by Enforcing Tri-view
Constraints . . . . . . . . . . . . . . 1030--1040
Iyad F. Jafar and
Khalid A. Darabkh and
Ghazi M. Al-Sukkar A Rule-Based Fuzzy Inference System for
Adaptive Image Contrast Enhancement . . 1041--1057
Jianping Gou and
Zhang Yi and
Lan Du and
Taisong Xiong A Local Mean-Based $k$-Nearest Centroid
Neighbor Classifier . . . . . . . . . . 1058--1071
Alex Pappachen James and
Sima Dimitrijev Nearest Neighbor Classifier Based on
Nearest Feature Decisions . . . . . . . 1072--1087
Zhang Zhang and
Jun Cheng and
Jun Li and
Wei Bian and
Dacheng Tao Segment-Based Features for Time Series
Classification . . . . . . . . . . . . . 1088--1102
Kui Yu and
Xindong Wu and
Wei Ding and
Hao Wang Exploring Causal Relationships with
Streaming Features . . . . . . . . . . . 1103--1117
I-Ching Hsu Semantic Tag-based Profile Framework for
Social Tagging Systems . . . . . . . . . 1118--1129
Paul Conilione and
Dianhui Wang Fuzzy Approach for Semantic Face Image
Retrieval . . . . . . . . . . . . . . . 1130--1145
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1147--1147
Manoj Thomas and
Gurpreet Dhillon Interpreting Deep Structures of
Information Systems Security . . . . . . 1148--1156
Wei Wu and
Yi Mu and
Willy Susilo and
Xinyi Huang and
Li Xu A Provably Secure Construction of
Certificate-Based Encryption from
Certificateless Encryption . . . . . . . 1157--1168
Yu-Fang Chung and
Zhen-Yu Wu Casting Ballots over Internet Connection
Against Bribery and Coercion . . . . . . 1169--1179
Chang Xu and
Zhoujun Li and
Yi Mu and
Hua Guo and
Tao Guo Affiliation-Hiding Authenticated
Asymmetric Group Key Agreement . . . . . 1180--1191
Lin Ding and
Jie Guan Cryptanalysis of Loiss Stream Cipher . . 1192--1201
Jinguang Han and
Willy Susilo and
Yi Mu and
Jun Yan Attribute-Based Oblivious Access Control 1202--1215
Derek Pao and
Xing Wang Multi-Stride String Searching for
High-Speed Content Inspection . . . . . 1216--1231
Hyejin Son and
Taeyoon Kang and
Hwangnam Kim and
Jong-Bae Park and
Jae Hyung Roh A Fair and Secure Bandwidth Allocation
for Ami Mesh Network in Smart Grid . . . 1232--1243
Nimalaprakasan Skandhakumar and
Jason Reid and
Ed Dawson and
Robin Drogemuller and
Farzad Salim An Authorization Framework using
Building Information Models . . . . . . 1244--1264
João V. Gomes and
Pedro R. M. Inácio and
Manuela Pereira and
Mário M. Freire and
Paulo P. Monteiro Corrigendum: Exploring Behavioral
Patterns Through Entropy in Multimedia
Peer-to-Peer Traffic . . . . . . . . . . 1265--1265
Paul S. Rosenbloom Erratum: Computing and Computation . . . 1266--1266
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1267--1269
Haitao Dan and
Robert M. Hierons Controllability Problems in MSC-Based
Testing . . . . . . . . . . . . . . . . 1270--1287
Suraj Pandey and
Rajkumar Buyya Scheduling Workflow Applications Based
on Multi-source Parallel Data Retrieval
in Distributed Computing Networks . . . 1288--1308
Winfried K. Grassmann A Computer Built with Relays and a
Mechanical Memory, and Algol . . . . . . 1309--1316
Tayfun Kucukyilmaz and
Ata Turk and
Cevdet Aykanat A Parallel Framework for In-Memory
Construction of Term-Partitioned
Inverted Indexes . . . . . . . . . . . . 1317--1330
Doohwan Oh and
Won W. Ro Multi-Threading and Suffix Grouping on
Massive Multiple Pattern Matching
Algorithm . . . . . . . . . . . . . . . 1331--1346
Shmuel T. Klein and
Dana Shapira The String-to-Dictionary Matching
Problem . . . . . . . . . . . . . . . . 1347--1356
Mina Memar and
Mahmood Deypir and
Mohammad Hadi Sadreddini and
Seyyed Mostafa Fakhrahmad An Efficient Frequent Itemset Mining
Method over High-speed Data Streams . . 1357--1366
Hyungjung Seo and
Jaewon Seo and
Taewhan Kim Algorithms for Combined Inter- and
Intra-Task Dynamic Voltage Scaling . . . 1367--1382
Jie Ding and
Jane Hillston Numerically Representing Stochastic
Process Algebra Models . . . . . . . . . 1383--1397
Matthias Weidlich and
Remco Dijkman and
Mathias Weske Behaviour Equivalence and Compatibility
of Business Process Models with Complex
Correspondences . . . . . . . . . . . . 1398--1418
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1419--1419
Mohamed Adel Serhani and
Abdelghani Benharref and
Elarbi Badidi and
Salah Bouktif Scalable Federated Broker Management for
Selection of Web Services . . . . . . . 1420--1439
Antoine Bossard and
Keiichi Kaneko Node-to-Set Disjoint-Path Routing in
Hierarchical Cubic Networks . . . . . . 1440--1446
Oguzhan Erdem and
Cüneyt F. Bazlamaçci High-performance IP Lookup Engine with
Compact Clustered Trie Search . . . . . 1447--1466
Chuan-Gang Liu and
Chih-Hung Chao and
Chih-Wen Leou and
Jung-Shian Li Iterative Key Distribution Based on Mad
Neighborhood in Underwater Mobile Sensor
Networks . . . . . . . . . . . . . . . . 1467--1485
Dan Wang and
Xiaowei Han and
Hong Yang and
Binbin Hao On Global Adaptive Synchronization in
Weighted Complex Networks . . . . . . . 1486--1491
Debraj De and
Wen-Zhan Song and
Shaojie Tang and
Diane Cook EAR: an Energy and Activity-Aware
Routing Protocol for Wireless Sensor
Networks in Smart Environments . . . . . 1492--1506
Fabíola Greve and
Pierre Sens and
Luciana Arantes and
Véronique Simon Eventually Strong Failure Detector with
Unknown Membership . . . . . . . . . . . 1507--1524
Ozgur Sinanoglu Fault Model Independent, Maximal
Compaction of Test Responses in the
Presence of Unknown Response Bits . . . 1525--1537
Fairouz Kamareddine Capsule Reviews . . . . . . . . . . . . 1--1
Jan Bergstra and
Jens Blanck and
Faron Moller and
Stan Wainer Guest Editorial . . . . . . . . . . . . 2--2
Jan A. Bergstra and
Inge Bethke and
Alban Ponse Cancellation Meadows: a Generic Basis
Theorem and Some Applications . . . . . 3--14
Nick D. James and
Jeffery Zucker A Class of Contracting Stream Operators 15--33
Maciej Gazda and
Wan Fokkink Turning GSOS Rules into Equations for
Linear Time-Branching Time Semantics . . 34--44
Jens Blanck Interval Domains and Computable
Sequences: a Case Study of Domain
Reductions . . . . . . . . . . . . . . . 45--52
Bernhard Möller Modal Knowledge and Game Semirings . . . 53--69
Zoran \Dbaruri\'c and
Dragan Ga\vsevi\'c A Source Code Similarity System for
Plagiarism Detection . . . . . . . . . . 70--86
Estefanía Serral and
Pedro Valderas and
Vicente Pelechano Context-Adaptive Coordination of
Pervasive Services by Interpreting
Models during Runtime . . . . . . . . . 87--114
Thi Nguyen and
Zhen He and
Yi-Ping Phoebe Chen S$^e$TPR$^*$-tree: Efficient Buffering
for Spatiotemporal Indexes Via Shared
Execution . . . . . . . . . . . . . . . 115--137
Irfan Awan Editorial: Performance Engineering of
Communication Systems and Applications 139--140
S. A. Wright and
S. D. Hammond and
S. J. Pennycook and
R. F. Bird and
J. A. Herdman and
I. Miller and
A. Vadgama and
A. Bhalerao and
S. A. Jarvis Parallel File System Analysis Through
Application I/O Tracing . . . . . . . . 141--155
O. F. J. Perks and
D. A. Beckingsale and
S. D. Hammond and
I. Miller and
J. A. Herdman and
A. Vadgama and
A. H. Bhalerao and
L. He and
S. A. Jarvis Towards Automated Memory Model
Generation Via Event Tracing . . . . . . 156--174
Malik Jahan Khan and
Mian Muhammad Awais and
Shafay Shamail A Randomized Partitioning Approach for
CBR-Based Autonomic Systems to Improve
Retrieval Performance . . . . . . . . . 175--183
Constandinos X. Mavromoustakis and
Helen D. Karatza Performance Evaluation of Opportunistic
Resource-Sharing Scheme Using Socially
Oriented Outsourcing in Wireless Devices 184--197
Ramon Bertran and
Marc Gonz\`alez and
Xavier Martorell and
Nacho Navarro and
Eduard Ayguadé Counter-Based Power Modeling Methods:
Top-Down vs. Bottom-Up . . . . . . . . . 198--213
Sabela Ramos and
Guillermo L. Taboada and
Roberto R. Expósito and
Juan Touriño and
Ramón Doallo Design of Scalable Java Communication
Middleware for Multi-Core Systems . . . 214--228
Yi Xie and
J. Hu and
S. Tang and
X. Huang A Forward--Backward Algorithm for Nested
Hidden semi-Markov Model and Application
to Network Traffic . . . . . . . . . . . 229--238
Pingshan Liu and
Guimin Huang and
Shengzhong Feng and
Jianping Fan Event-Driven High-Priority First Data
Scheduling Scheme for P2P VoD Streaming 239--257
Hongbing Fan and
Yu-Liang Wu and
Ray C. C. Cheung Design Automation Framework for
Reconfigurable Interconnection Networks 258--269
Einoshin Suzuki Special Issue on Discovery Science:
Guest Editor's Introduction . . . . . . 271--273
Tobias Girschick and
Ulrich Rückert and
Stefan Kramer Adapted Transfer of Distance Measures
for Quantitative Structure-Activity
Relationships and Data-Driven Selection
of Source Datasets . . . . . . . . . . . 274--288
Laura Langohr and
Vid Podpe\vcan and
Marko Petek and
Igor Mozeti\vc and
Kristina Gruden and
Nada Lavra\vc and
Hannu Toivonen Contrasting Subgroup Discovery . . . . . 289--303
An\vze Vavpeti\vc and
Nada Lavra\vc Semantic Subgroup Discovery Systems and
Workflows in the SDM-Toolkit . . . . . . 304--320
Miha Gr\vcar and
Nejc Trdin and
Nada Lavra\vc A Methodology for Mining
Document-Enriched Heterogeneous
Information Networks . . . . . . . . . . 321--335
Dongsheng Duan and
Yuhua Li and
Ruixuan Li and
Zhengding Lu and
Aiming Wen MEI: Mutual Enhanced Infinite
Community-Topic Model for Analyzing
Text-Augmented Social Networks . . . . . 336--354
Hiromichi Nagao and
Tomoyuki Higuchi and
Satoshi Miura and
Daisuke Inazu Time-Series Modeling of Tide Gauge
Records for Monitoring of the Crustal
Activities Related to Oceanic Trench
Earthquakes Around Japan . . . . . . . . 355--364
Nina Gierasimczuk and
Dick de Jongh On the Complexity of Conclusive Update 365--377
Jiuyong Li and
Jixue Liu and
Hannu Toivonen and
Jianming Yong Effective Pruning for the Discovery of
Conditional Functional Dependencies . . 378--392
S. R. Kannan and
S. Ramthilagam and
R. Devi and
Yueh-Min Huang Novel Quadratic Fuzzy $c$-Means
Algorithms for Effective Data Clustering
Problems . . . . . . . . . . . . . . . . 393--406
Tsz Hon Yuen and
Joseph K. Liu and
Man Ho Au and
Willy Susilo and
Jianying Zhou Efficient Linkable and/or Threshold Ring
Signature Without Random Oracles . . . . 407--421
G. Vache Marconato and
M. Kaâniche and
V. Nicomette A Vulnerability Life Cycle-Based
Security Modeling and Evaluation
Approach . . . . . . . . . . . . . . . . 422--439
H. Janicke and
A. Cau and
F. Siewe and
H. Zedan Dynamic Access Control Policies:
Specification and Verification . . . . . 440--463
Mingwu Zhang and
Bo Yang and
Tsuyoshi Takagi Bounded Leakage-Resilient Functional
Encryption with Hidden Vector Predicate 464--477
Lanfranco Lopriore Protection Structures in Multithreaded
Systems . . . . . . . . . . . . . . . . 478--496
Joonsang Baek and
Quang Hieu Vu and
Abdulhadi Shoufan and
Andrew Jones and
Duncan S. Wong Stateful Public-Key Encryption Schemes
Forward-Secure Against State Exposure 497--507
Gianluca Dini and
Marco Tiloca HISS: a HIghly Scalable Scheme for Group
Rekeying . . . . . . . . . . . . . . . . 508--525
Marios C. Angelides Editorial: MPEG Applications and
Services . . . . . . . . . . . . . . . . 527--528
Luis Herranz and
José María Martínez Combining MPEG Tools to Generate Video
Summaries Adapted to the Terminal and
Network . . . . . . . . . . . . . . . . 529--553
R. Iqbal and
S. Shirmohammadi and
B. Hariri Modeling and Evaluation of a
Metadata-Based Adaptive P2P
Video-Streaming System . . . . . . . . . 554--572
Martín López-Nores and
Yolanda Blanco-Fernández and
José Juan Pazos-Arias Cloud-Based Personalization of New
Advertising and e-Commerce Models for
Video Consumption . . . . . . . . . . . 573--592
Harry Agius and
Marios C. Angelides and
Damon Daylamani Zad MC 2: a Framework and Service for MPEG-7
Content-Modelling Communities . . . . . 593--616
Anish Mittal and
Anush K. Moorthy and
Alan C. Bovik Visually Lossless H.264 Compression of
Natural Videos . . . . . . . . . . . . . 617--627
D. C. Gibbon and
Z. Liu and
A. Basso and
B. Shahraray Automated Content Metadata Extraction
Services Based on MPEG Standards . . . . 628--645
Benjamin J. Ford and
Haiping Xu and
Iren Valova A Real-Time Self-Adaptive Classifier for
Identifying Suspicious Bidders in Online
Auctions . . . . . . . . . . . . . . . . 646--663
Martin Richards How BCPL Evolved from CPL . . . . . . . 664--670
John Lloyd Special Issue on Dependable Software
Systems: Associate Editor's Introduction 671--673
Matthew Leeke and
Arshad Jhumka and
Sarabjot Singh Anand Towards the Design of Efficient Error
Detection Mechanisms for Transient Data
Errors . . . . . . . . . . . . . . . . . 674--692
Miguel Correia and
Nuno Ferreira Neves and
Paulo Verissimo BFT-TO: Intrusion Tolerance with Less
Replicas . . . . . . . . . . . . . . . . 693--715
Wenbing Zhao and
P. M. Melliar-Smith and
L. E. Moser Low Latency Fault Tolerance System . . . 716--740
Ian J. Hayes and
Alan Burns and
Brijesh Dongol and
Cliff B. Jones Comparing Degrees of Non-Determinism in
Expression Evaluation . . . . . . . . . 741--755
Ra'ed Al-Dujaily and
Terrence Mak and
Kai-Pui Lam and
Fei Xia and
Alex Yakovlev and
Chi-Sang Poon Dynamic On-Chip Thermal Optimization for
Three-Dimensional Networks-On-Chip . . . 756--770
Jinpyo Hong and
Hwangnam Kim A Dual Mobility Model with User
Profiling: Decoupling User Mobile
Patterns from Association Patterns . . . 771--784
Xiaoling Zhang and
Jianguo Qian $ L(p, q) $-Labeling and Integer Flow on
Planar Graphs . . . . . . . . . . . . . 785--792
José Raúl Romero and
Juan Ignacio Jaén and
Antonio Vallecillo A Tool for the Model-Based Specification
of Open Distributed Systems . . . . . . 793--818
Manuel Abellanas and
Jose M. Díaz-Báñez and
Pablo Pérez-Lantero and
Inmaculada Ventura Locating a Communication Path in a
Competitive Scenario . . . . . . . . . . 819--826
S. S. Ili\'c and
P. Spalevi\'c Using Wavelet Packets for Selectivity
Estimation . . . . . . . . . . . . . . . 827--842
M. Bóo and
M. Amor and
R. Concheiro and
M. Doggett Efficient Adaptive and Dynamic Mesh
Refinement Based on a Non-recursive
Strategy . . . . . . . . . . . . . . . . 843--851
O\uguzcan Dobrucali and
Billur Barshan Novel Compression Algorithm Based on
Sparse Sampling of $3$-D Laser Range
Scans . . . . . . . . . . . . . . . . . 852--870
Eddie Cheng and
Ke Qiu and
Zhizhang Shen A Generating Function Approach to the
Edge Surface Area of the Arrangement
Graphs . . . . . . . . . . . . . . . . . 871--881
Tiziana Calamoneri and
Dario Frascaria and
Blerina Sinaimeri All Graphs with at Most Seven Vertices
are Pairwise Compatibility Graphs . . . 882--886
E. N. Argyriou and
M. A. Bekos and
A. Symvonis Maximizing the Total Resolution of
Graphs . . . . . . . . . . . . . . . . . 887--900
Sajjad Mahmood and
Richard Lai RE-UML: a Component-Based System
Requirements Analysis Language . . . . . 901--922
Min Chen and
Victor C. M. Leung Green Mobile Networking and
Communications . . . . . . . . . . . . . 923--925
Wei Gong and
Kebin Liu and
Xiaoxu Li and
Xin Miao and
Tong Zhu Quality of Interaction for Sensor
Network Energy-Efficient Management . . 926--937
Daqiang Zhang and
Zhijun Yang and
Vaskar Raychoudhury and
Zhe Chen and
Jaime Lloret An Energy-Efficient Routing Protocol
Using Movement Trends in Vehicular Ad
hoc Networks . . . . . . . . . . . . . . 938--946
Jiafu Wan and
Hehua Yan and
Di Li and
Keliang Zhou and
Lu Zeng Cyber-Physical Systems for Optimal
Energy Management Scheme of Autonomous
Electric Vehicle . . . . . . . . . . . . 947--956
Kai Lin and
Xiaofei Wang and
Limei Peng and
Xuan Zhu Energy-Efficient $K$-Cover Problem in
Hybrid Sensor Networks . . . . . . . . . 957--967
Jiaojiao Liu and
Yige Wang and
Gang Wei Distributed Topology Control Based on
Coalition Formation Game in Wireless
Networks . . . . . . . . . . . . . . . . 968--976
Yichao Jin and
Yonggang Wen and
Qinghua Chen and
Zuqing Zhu An Empirical Investigation of the Impact
of Server Virtualization on Energy
Efficiency for Green Data Center . . . . 977--990
Xiaofei Liao and
Hai Jin and
Jia Yu and
Dingding Li A Performance Optimization Mechanism for
SSD in Virtualized Environment . . . . . 991--1000
Lei Lei and
Jing Zhao and
Zhangdui Zhong and
Kan Zheng Flow-Level Analysis of Energy Efficiency
Performance for Device-to-Device
Communications in OFDM Cellular Networks 1001--1009
Jing Zhang and
Xi Yang and
Qi Yao and
Xiaohu Ge and
Minho Jo and
Guoqiang Mao Cooperative Energy Efficiency Modeling
and Performance Analysis in Co-Channel
Interference Cellular Networks . . . . . 1010--1019
Wei-Ting Cho and
Ying-Xun Lai and
Chin-Feng Lai and
Yueh-Min Huang Appliance-Aware Activity Recognition
Mechanism for IoT Energy Management
System . . . . . . . . . . . . . . . . . 1020--1033
Yi Sun and
Yang Guo and
Yuming Ge and
Shan Lu and
Jihua Zhou and
Eryk Dutkiewicz Improving the Transmission Efficiency by
Considering Non-Cooperation in Ad Hoc
Networks . . . . . . . . . . . . . . . . 1034--1042
Douglas Mota Dias and
Marco Aurélio C. Pacheco Quantum-Inspired Linear Genetic
Programming as a Knowledge Management
System . . . . . . . . . . . . . . . . . 1043--1062
Jianping Gou and
Zhang Yi Locality-Based Discriminant Neighborhood
Embedding . . . . . . . . . . . . . . . 1063--1082
Jamshaid Ashraf and
Omar Khadeer Hussain and
Farookh Khadeer Hussain A Framework for Measuring Ontology Usage
on the Web . . . . . . . . . . . . . . . 1083--1101
Fasheng Wang and
Mingyu Lu Efficient Visual Tracking via
Hamiltonian Monte Carlo Markov Chain . . 1102--1112
Eakasit Pacharawongsakda and
Thanaruk Theeramunkong Multi-Label Classification Using
Dependent and Independent Dual Space
Reduction . . . . . . . . . . . . . . . 1113--1135
Erwan Le Martelot and
Chris Hankin Fast Multi-Scale Detection of Relevant
Communities in Large-Scale Networks . . 1136--1150
Young-Sik Jeong and
Damien Sauveron and
Jong Hyuk Park Advanced Security Technologies and
Services for Future Computing
Environments . . . . . . . . . . . . . . 1151--1153
Guangjie Han and
Jinfang Jiang and
Lei Shu and
Mohsen Guizani and
Shojiro Nishio A Two-Step Secure Localization for
Wireless Sensor Networks . . . . . . . . 1154--1166
Yao-Hsin Chou and
Shuo-Mao Chen and
Yu-Ting Lin and
Chi-Yuan Chen and
Han-Chieh Chao Using GHZ-State for Multiparty Quantum
Secret Sharing Without Code Table . . . 1167--1175
Bin Zhang and
Jiahai Yang and
Jianping Wu and
Ziyu Wang MBST: Detecting Packet-Level Traffic
Anomalies by Feature Stability . . . . . 1176--1188
Jong-Hyouk Lee and
Thierry Ernst IPv6 Security Issues in Cooperative
Intelligent Transportation Systems . . . 1189--1197
Andreu Pere Isern-Dey\`a and
Arnau Vives-Guasch and
Maci\`a Mut-Puigserver and
Magdalena Payeras-Capell\`a and
Jordi Castell\`a-Roca A Secure Automatic Fare Collection
System for Time-Based or Distance-Based
Services with Revocable Anonymity for
Users . . . . . . . . . . . . . . . . . 1198--1215
Aikaterini Mitrokotsa and
Pedro Peris-Lopez and
Christos Dimitrakakis and
Serge Vaudenay On Selecting the Nonce Length in
Distance-Bounding Protocols . . . . . . 1216--1227
Yinghui Zhang and
Xiaofeng Chen and
Hui Li Key-Evolving Hierarchical ID-Based
Signcryption . . . . . . . . . . . . . . 1228--1248
Yuanju Gan and
Lihua Wang and
Licheng Wang and
Ping Pan and
Yixian Yang Efficient Construction of CCA-Secure
Threshold PKE Based on Hashed
Diffie--Hellman Assumption . . . . . . . 1249--1257
Gerard Draper-Gil and
Josep-Lluís Ferrer-Gomila and
M. Francisca Hinarejos and
Jianying Zhou An Asynchronous Optimistic Protocol for
Atomic Multi-Two-Party Contract Signing 1258--1267
Wei Sun and
Tao Wen and
Quan Guo Improving the Start-up Performance of
the TFRC Protocol . . . . . . . . . . . 1269--1278
Massimo Melucci Deriving a Quantum Information Retrieval
Basis . . . . . . . . . . . . . . . . . 1279--1291
Chwan-Yi Shiah and
Yun-Sheng Yen Compression of Chinese Document Images
by Complex Shape Matching . . . . . . . 1292--1304
Robert M. Hierons Implementation Relations for Testing
Through Asynchronous Channels . . . . . 1305--1319
Mircea Merca Binary Diagrams for Storing Ascending
Compositions . . . . . . . . . . . . . . 1320--1327
Bingyue Peng and
Junjie Wu and
Hua Yuan and
Qingwei Guo and
Dacheng Tao ANEEC: a Quasi-Automatic System for
Massive Named Entity Extraction and
Categorization . . . . . . . . . . . . . 1328--1346
Baolei Cheng and
Jianxi Fan and
Xiaohua Jia and
Shukui Zhang and
Bangrui Chen Constructive Algorithm of Independent
Spanning Trees on Möbius Cubes . . . . . 1347--1362
Ioannis Dimitriou Analysis of a Priority Retrial Queue
with Dependent Vacation Scheme and
Application to Power Saving in Wireless
Communication Systems . . . . . . . . . 1363--1380
Stephen T. Hedetniemi and
David P. Jacobs and
K. E. Kennedy Linear-Time Self-Stabilizing Algorithms
for Disjoint Independent Sets . . . . . 1381--1387
Ro-Yu Wu and
Jou-Ming Chang and
An-Hang Chen and
Chun-Liang Liu Ranking and Unranking $t$-ary Trees in a
Gray-Code Order . . . . . . . . . . . . 1388--1395
Jacob Beal and
Stefan Dulman and
Olivier Michel and
Antoine Spicher Editorial . . . . . . . . . . . . . . . 1397--1398
Avgoustinos Filippoupolitis and
Gokce Gorbil and
Erol Gelenbe Spatial Computers for Emergency Support 1399--1416
Muhammad Jafar Sadeq and
Matt Duckham and
Michael F. Worboys Decentralized Detection of Topological
Events in Evolving Spatial Regions . . . 1417--1431
Alan Both and
Matt Duckham and
Patrick Laube and
Tim Wark and
Jeremy Yeoman Decentralized Monitoring of Moving
Objects in a Transportation Network
Augmented with Checkpoints . . . . . . . 1432--1449
David H. Ackley and
Daniel C. Cannon and
Lance R. Williams A Movable Architecture for Robust
Spatial Computing . . . . . . . . . . . 1450--1468
Qingzhi Liu and
Andrei Pruteanu and
Stefan Dulman Gradient-Based Distance Estimation for
Spatial Computers . . . . . . . . . . . 1469--1499
Jacob Beal and
Kyle Usbeck and
Brett Benyo On the Evaluation of Space--Time
Functions . . . . . . . . . . . . . . . 1500--1517
D. Rincón and
A. Agustí-Torra and
J. F. Botero and
F. Raspall and
D. Remondo and
X. Hesselbach and
M. T. Beck and
H. de Meer and
F. Niedermeier and
G. Giuliani A Novel Collaboration Paradigm for
Reducing Energy Consumption and Carbon
Dioxide Emissions in Data Centres . . . 1518--1536
Reinaldo A. Vallejos C. and
José M. Martínez V. A Fast Transformation of Markov Chains
and Their Respective Steady-State
Probability Distributions . . . . . . . 1--11
Artem Polyvyanyy and
Luciano García-Bañuelos and
Dirk Fahland and
Mathias Weske Maximal Structuring of Acyclic Process
Models . . . . . . . . . . . . . . . . . 12--35
Juan de Lara and
Esther Guerra and
Ruth Cobos and
Jaime Moreno-Llorena Extending Deep Meta-Modelling for
Practical Model-Driven Engineering . . . 36--58
Arnold L. Rosenberg Region Management by Finite-State Robots 59--72
Michel A. Reniers and
Rob Schoren and
Tim A. C. Willemse Results on Embeddings Between
State-Based and Event-Based Systems . . 73--92
Jinn-Shyong Yang and
Jou-Ming Chang Optimal Independent Spanning Trees on
Cartesian Product of Hybrid Graphs . . . 93--99
Iván Cores and
Gabriel Rodríguez and
Patricia González and
María J. Martín Failure Avoidance in MPI Applications
Using an Application-Level Approach . . 100--114
Yongjian Li and
Naiju Zeng and
William N. N. Hung and
Xiaoyu Song Combining Symmetry Reduction with
Generalized Symbolic Trajectory
Evaluation . . . . . . . . . . . . . . . 115--128
K. Subramani and
James Worthington On Certifying Instances of
Zero-Clairvoyant Scheduling . . . . . . 129--137
Alev Mutlu and
Pinar Senkul Improving Hit Ratio of ILP-based Concept
Discovery System with Memoization . . . 138--153
Kewen Liao and
Hong Shen LP-Based Approximation Algorithms for
Reliable Resource Allocation . . . . . . 154--164
Oana Agrigoroaiei and
Gabriel Ciobanu Rewriting Systems Over Indexed Multisets 165--179
Jongsung Kim and
Bo Hong and
Naveen Chilamkurti Advanced Computer Technologies and
Applications in Grid and Cloud Computing 181--182
Haibin Zhai and
Albert K. Wong and
Hai Jiang and
Yi Sun and
Jun Li and
Zhongcheng Li A Node-Link-Based P2P Cache Deployment
Algorithm in ISP Networks . . . . . . . 183--194
Ahmed Sallam and
Kenli Li A Multi-objective Virtual Machine
Migration Policy in Cloud Systems . . . 195--204
Aun Irtaza and
M. Arfan Jaffar and
Muhammad Tariq Mahmood Semantic Image Retrieval in a Grid
Computing Environment Using Support
Vector Machines . . . . . . . . . . . . 205--216
Hong-Chang Lee and
Jong-Eun Park and
Myung-Joon Lee C3ware: a Middleware Supporting
Collaborative Services over Cloud
Storage . . . . . . . . . . . . . . . . 217--224
Lin Yao and
Guowei Wu and
Jiankang Ren and
Yanwei Zhu and
Ying Li Guaranteeing Fault-Tolerant Requirement
Load Balancing Scheme Based on VM
Migration . . . . . . . . . . . . . . . 225--232
Joon-Sang Park and
Seung Jun Baek and
Kyogu Lee A Highly Parallelized Decoder for Random
Network Coding leveraging GPGPU . . . . 233--240
Ayad Ibrahim and
Hai Jin and
Ali A. Yassin and
Deqing Zou and
Peng Xu Towards Efficient Yet Privacy-Preserving
Approximate Search in Cloud Computing 241--254
Hong-Yi Chang and
Hsin-Che Lu and
Yu-Huei Huang and
Yuan-Wei Lin and
Yih-Jou Tzang Novel Auction Mechanism with Factor
Distribution Rule for Cloud Resource
Allocation . . . . . . . . . . . . . . . 255--262
Yong Tae Park and
Pranesh Sthapit and
Jae-Young Pyun Energy Efficient Data Fragmentation for
Ubiquitous Computing . . . . . . . . . . 263--272
Juan Caubet and
Carlos Gañán and
Oscar Esparza and
Jose L. Muñoz and
Jorge Mata-Díaz and
Juanjo Alins Certificate Revocation List Distribution
System for the KAD Network . . . . . . . 273--280
Neeraj Kumar and
Naveen Chilamkurti and
Sherali Zeadally and
Young-Sik Jeong Achieving Quality of Service (QoS) Using
Resource Allocation and Adaptive
Scheduling in Cloud Computing with Grid
Support . . . . . . . . . . . . . . . . 281--290
Zhipiao Liu and
Shangguang Wang and
Qibo Sun and
Hua Zou and
Fangchun Yang Cost-Aware Cloud Service Request
Scheduling for SaaS Providers . . . . . 291--301
Hwamin Lee and
Doosoon Park A Grid Service-Based Virtual Screening
System . . . . . . . . . . . . . . . . . 302--307
Tien-Dung Nguyen and
An Thuy Nguyen and
Man Doan Nguyen and
Mui Van Nguyen and
Eui-Nam Huh An Improvement of Resource Allocation
for Migration Process in Cloud
Environment . . . . . . . . . . . . . . 308--318
D. Piso and
J. D. Bruguera Obtaining Accurate Error Expressions and
Bounds for Floating-Point Multiplicative
Algorithms . . . . . . . . . . . . . . . 319--331
Antoine Bossard and
Keiichi Kaneko Set-to-Set Disjoint Paths Routing in
Hierarchical Cubic Networks . . . . . . 332--337
Hyun-Chul Kim and
Jaewook Lee and
Daewon Lee Transductive Gaussian Processes with
Applications to Object Pose Estimation 339--346
Fabrizio Riguzzi Speeding Up Inference for Probabilistic
Logic Programs . . . . . . . . . . . . . 347--363
Linjia Sun and
Xiaohui Liang and
Qinping Zhao Recursive Templates Segmentation and
Exemplars Matching for Human Parsing . . 364--377
Beaux P. Sharifi and
David I. Inouye and
Jugal K. Kalita Summarization of Twitter Microblogs . . 378--402
Rachel Chasin and
Daryl Woodward and
Jeremy Witmer and
Jugal Kalita Extracting and Displaying Temporal and
Geospatial Entities from Articles on
Historical Events . . . . . . . . . . . 403--426
John Reeder and
Michael Georgiopoulos Generative Neural Networks for
Multi-task Life-Long Learning . . . . . 427--450
Pitipong Chanloha and
Jatuporn Chinrungrueng and
Wipawee Usaha and
Chaodit Aswakul Cell Transmission Model-Based Multiagent
Q-Learning for Network-Scale Signal
Control With Transit Priority . . . . . 451--468
Ahmed Kheiri and
Ender Özcan Constructing Constrained-Version of
Magic Squares Using Selection
Hyper-heuristics . . . . . . . . . . . . 469--479
Fuchun Guo and
Yi Mu and
Willy Susilo and
Vijay Varadharajan Server-Aided Signature Verification for
Lightweight Devices . . . . . . . . . . 481--493
Salman Niksefat and
Babak Sadeghiyan and
Payman Mohassel and
Saeed Sadeghian ZIDS: a Privacy-Preserving Intrusion
Detection System Using Secure Two-Party
Computation Protocols . . . . . . . . . 494--509
Juan Manuel González Nieto and
Mark Manulis and
Dongdong Sun Forward-Secure Hierarchical Predicate
Encryption . . . . . . . . . . . . . . . 510--536
Monowar H. Bhuyan and
H. J. Kashyap and
D. K. Bhattacharyya and
J. K. Kalita Detecting Distributed Denial of Service
Attacks: Methods, Tools and Future
Directions . . . . . . . . . . . . . . . 537--556
Tao Han and
Weiming Zhang and
Chao Wang and
Nenghai Yu and
Yuefei Zhu Adaptive $ \pm 1 $ Steganography in
Extended Noisy Region . . . . . . . . . 557--566
Shengke Zeng and
Shaoquan Jiang A New Framework for Conditionally
Anonymous Ring Signature . . . . . . . . 567--578
Jinguang Han and
Willy Susilo and
Yi Mu and
Jun Yan Attribute-Based Data Transfer with
Filtering Scheme in Cloud Computing . . 579--591
Limin Shen and
Futai Zhang and
Yinxia Sun Efficient Revocable Certificateless
Encryption Secure in the Standard Model 592--601
Prasanta Gogoi and
D. K. Bhattacharyya and
B. Borah and
Jugal K. Kalita MLH-IDS: a Multi-Level Hybrid Intrusion
Detection Method . . . . . . . . . . . . 602--623
Faezeh Sadat Babamir and
Ali Norouzi Achieving Key Privacy and Invisibility
for Unattended Wireless Sensor Networks
in Healthcare . . . . . . . . . . . . . 624--635
Huaqun Wang Insecurity of `Improved Anonymous
Multi-Receiver Identity-Based
Encryption' . . . . . . . . . . . . . . 636--638
Joshua Amavi and
Béatrice Bouchou and
Agata Savary On Correcting XML Documents with Respect
to a Schema . . . . . . . . . . . . . . 639--674
Rekai González-Alberquilla and
Fernando Emmanuel Frati and
Luis Piñuel and
Karin Strauss and
Luis Ceze Data Race Detection with Minimal
Hardware Support . . . . . . . . . . . . 675--692
Victor Khomenko and
Andrey Mokhov Direct Construction of Complete Merged
Processes . . . . . . . . . . . . . . . 693--707
Chao Zhu and
Qiang Zhu and
Calisto Zuzarte Optimization of Monotonic Linear
Progressive Queries Based on Dynamic
Materialized Views . . . . . . . . . . . 708--730
Kuei-Hao Chen and
Guan-Shieng Huang and
Richard Chia-Tung Lee Bit-Parallel Algorithms for Exact
Circular String Matching . . . . . . . . 731--743
Lijun Lun and
Xin Chi and
Hui Xu The Relationship between Forward Slicing
and Backward Slicing for Software
Architecture . . . . . . . . . . . . . . 744--758
Patrick Graydon and
Iain Bate Realistic Safety Cases for the Timing of
Systems . . . . . . . . . . . . . . . . 759--774
Rada Chirkova Combined-Semantics Equivalence and
Minimization of Conjunctive Queries . . 775--795
Juan A. Rodriguez-Aguilar Special Issue on Optimization in
Multi-Agent Systems: Guest Editor's
Introduction . . . . . . . . . . . . . . 797--798
Jesus Cerquides and
Alessandro Farinelli and
Pedro Meseguer and
Sarvapali D. Ramchurn A Tutorial on Optimization for
Multi-Agent Systems . . . . . . . . . . 799--824
Sejoon Lim and
Daniela Rus Congestion-Aware Multi-Agent Path
Planning: Distributed Algorithm and
Applications . . . . . . . . . . . . . . 825--839
Hala Mostafa and
Partha Pal and
Patrick Hurley Message Passing for Distributed
QoS-Security Tradeoffs . . . . . . . . . 840--855
Meritxell Vinyals and
Kathryn S. Macarthur and
Alessandro Farinelli and
Sarvapali D. Ramchurn and
Nicholas R. Jennings A Message-Passing Approach to
Decentralized Parallel Machine
Scheduling . . . . . . . . . . . . . . . 856--874
Archie C. Chapman and
David S. Leslie and
Alex Rogers and
Nicholas R. Jennings Learning in Unknown Reward Games:
Application to Sensor Networks . . . . . 875--892
Jason Tsai and
Thanh H. Nguyen and
Nicholas Weller and
Milind Tambe Game-Theoretic Target Selection in
Contagion-Based Domains . . . . . . . . 893--905
Christian Bessiere and
Ismel Brito and
Patricia Gutierrez and
Pedro Meseguer Global Constraints in Distributed
Constraint Satisfaction and Optimization 906--923
Faisal Iradat and
Sergey Andreev and
Sayeed Ghani and
Syed Irfan Nabi and
Waseem Arain Revisiting Assumptions in Backoff
Process Modeling and Queueing Analysis
of Wireless Local Area Networks (WLANs) 924--938
Shih-Chang Huang D$^2$PS: Direction and Distance
Positioning System in Wireless Networks 939--951
Shan Ling and
Weidong Chen Node-to-Set Disjoint Paths in Biswapped
Networks . . . . . . . . . . . . . . . . 953--967
Gloria Ortega and
Francisco Vázquez and
Inmaculada García and
Ester M. Garzón FastSpMM: an Efficient Library for
Sparse Matrix Matrix Product on GPUs . . 968--979
Sushanta Karmakar and
A. Chandrakanth Reddy An Improved Algorithm for Distributed
Trigger Counting in Ring . . . . . . . . 980--986
Haitao Dan and
Robert M. Hierons The Oracle Problem When Testing from
MSCs . . . . . . . . . . . . . . . . . . 987--1001
Anthony Danalis and
Piotr Luszczek and
Gabriel Marin and
Jeffrey S. Vetter and
Jack Dongarra BlackjackBench: Portable Hardware
Characterization with Automated Results'
Analysis . . . . . . . . . . . . . . . . 1002--1016
Pablo Llopis and
Javier Garcia Blas and
Florin Isaila and
Jesus Carretero Survey of Energy-Efficient and
Power-Proportional Storage Systems . . . 1017--1032
Hui Kong and
Xiaoyu Song and
Dong Han and
Ming Gu and
Jiaguang Sun A New Barrier Certificate for Safety
Verification of Hybrid Systems . . . . . 1033--1045
Frank Zeyda and
Lalkhumsanga Lalkhumsanga and
Ana Cavalcanti and
Andy Wellings Circus Models for Safety-Critical Java
Programs . . . . . . . . . . . . . . . . 1046--1091
Jiufeng Zhou and
Lixin Han and
Yuan Yao and
Xiaoqin Zeng and
Feng Xu A Parallel Approach to Link Sign
Prediction in Large-Scale Online Social
Networks . . . . . . . . . . . . . . . . 1092--1104
Janardan Misra A Calculus of Incomplete Fusions . . . . 1105--1116
Dilek Demirbas and
Ismail Akturk and
Ozcan Ozturk and
U\ugur Güdükbay Application-Specific Heterogeneous
Network-on-Chip Design . . . . . . . . . 1117--1131
Arta Babaee and
Moez Draief Distributed Multivalued Consensus . . . 1132--1140
Libo Huang and
Zhiying Wang and
Nong Xiao and
Qiang Dou Efficient Utilization of SIMD Engines
for General-Purpose Processors . . . . . 1141--1154
David Poulain and
Joanna Tomasik and
Marc-Antoine Weisser and
Dominique Barth A Packing Problem Approach to Lightpath
Assignment in an Optical Ring . . . . . 1155--1166
Waheed Yasin and
Hamidah Ibrahim and
Nur Izura Udzir and
Nor Asilah Wati Abdul Hamid An Overview of Media Streams Caching in
Peer-to-Peer Systems . . . . . . . . . . 1167--1177
Yan Cui and
Yingxin Wang and
Yu Chen and
Yuanchun Shi Mitigating Resource Contention on
Multicore Systems via Scheduling . . . . 1178--1194
Wassim Ramadan and
Eugen Dedu and
Julien Bourgeois Oscillation-Free Video Adaptation at
Application Layer on Server Side and
Experiments Using DCCP . . . . . . . . . 1195--1210
Pingshan Liu and
Shengzhong Feng and
Guimin Huang and
Jianping Fan Bandwidth-Availability-Based Replication
Strategy for P2P VoD Systems . . . . . . 1211--1229
A. Ouqour and
Y. Jabrane and
B. Ait Es Said and
A. Ait Ouahman PAPR Reduction in OFDM via Active
Constellation Extension--Projection Onto
Convex Sets Combined with Particle Swarm
Optimization . . . . . . . . . . . . . . 1230--1237
Marjan Radi and
Behnam Dezfouli and
Kamalrulnizam Abu Bakar and
Shukor Abd Razak and
Malrey Lee Network Initialization in Low-Power
Wireless Networks: a Comprehensive Study 1238--1261
Chathuranga Widanapathirana and
Jonathan C. Li and
Milosh V. Ivanovich and
Paul G. Fitzpatrick and
Y. Ahmet \cSekercio\uglu Adaptive Statistical Signatures of
Network Soft-Failures in User Devices 1262--1278
Guandong Xu and
Aoying Zhou and
Nitin Agarwal Special Issue on Social Computing and
its Applications . . . . . . . . . . . . 1279--1280
Ming Gao and
Cheqing Jin and
Weining Qian and
Xueqing Gong Real-time and Personalized Search over a
Microblogging System . . . . . . . . . . 1281--1295
Micha\l K. Szczerbak and
François Toutain and
Ahmed Bouabdallah and
Jean-Marie Bonnin KRAMER: New Social Medium Based on
Collaborative Recognition of Important
Situations . . . . . . . . . . . . . . . 1296--1317
Hongbo Chen and
Jungang Xu and
Ben He Automated Essay Scoring by Capturing
Relative Writing Quality . . . . . . . . 1318--1330
Jianshan Sun and
Jian Ma and
Zhiying Liu and
Yajun Miao Leveraging Content and Connections for
Scientific Article Recommendation in
Social Computing Contexts . . . . . . . 1331--1342
Zhiang Wu and
Jie Cao and
Junjie Wu and
Youquan Wang and
Chunyang Liu Detecting Genuine Communities from
Large-Scale Social Networks: a
Pattern-Based Method . . . . . . . . . . 1343--1357
Longbing Cao Non-IIDness Learning in Behavioral and
Social Data . . . . . . . . . . . . . . 1358--1370
Mostafa Haghir Chehreghani An Efficient Algorithm for Approximate
Betweenness Centrality Computation . . . 1371--1382
Abraham Varghese and
Kannan Balakrishnan and
Reji Rajan Varghese and
Joseph S. Paul Content-Based Image Retrieval of Axial
Brain Slices Using a Novel LBP with a
Ternary Encoding . . . . . . . . . . . . 1383--1394
Huiyu Zhou and
Kotaro Hirasawa Traffic Density Prediction with
Time-Related Data Mining using Genetic
Network Programming . . . . . . . . . . 1395--1414
Haoran Xie and
Qing Li and
Xudong Mao and
Xiaodong Li and
Yi Cai and
Qianru Zheng Mining Latent User Community for
Tag-Based and Content-Based Search in
Social Media . . . . . . . . . . . . . . 1415--1430
Qibin Duan and
Dirk P. Kroese and
Tim Brereton and
Aaron Spettl and
Volker Schmidt Inverting Laguerre Tessellations . . . . 1431--1440
Chin-Chen Chang and
Ting-Fang Cheng A Secure Diverse Ticket-Sale System in a
Distributed Cloud Environment . . . . . 1441--1459
Lourdes López-García and
Luis J. Dominguez Perez and
Francisco Rodríguez-Henríquez A Pairing-Based Blind Signature E-Voting
Scheme . . . . . . . . . . . . . . . . . 1460--1471
Hui Cui and
Yi Mu and
Man Ho Au Signcryption Secure Against Linear
Related-Key Attacks . . . . . . . . . . 1472--1483
Duygu Karao\uglan and
Albert Levi A Survey on the Development of Security
Mechanisms for Body Area Networks . . . 1484--1512
Long Ngo and
Colin Boyd and
Juan González Nieto Automated Proofs for Computational
Indistinguishability . . . . . . . . . . 1513--1536
Yu Chen and
Zongyang Zhang and
Dongdai Lin and
Zhenfu Cao CCA-Secure IB--KEM from Identity-Based
Extractable Hash Proof System . . . . . 1537--1556
Ren-Junn Hwang and
Yu-Kai Hsiao Anonymous Routing Protocol Based on Weil
Pairing for Wireless Mesh Networks . . . 1557--1569
Shaoquan Jiang On Unconditional $ \mu $-Security of
Private Key Encryption . . . . . . . . . 1570--1579
Chang Xu and
Hua Guo and
Zhoujun Li and
Yi Mu Affiliation-Hiding Authenticated
Asymmetric Group Key Agreement Based on
Short Signature . . . . . . . . . . . . 1580--1590
Joaquim Gabarro and
Maria Serna and
Alan Stewart Analysing Web-Orchestrations Under
Stress Using Uncertainty Profiles . . . 1591--1615
Tiziana Calamoneri and
Antonio Frangioni and
Blerina Sinaimeri Pairwise Compatibility Graphs of
Caterpillars . . . . . . . . . . . . . . 1616--1623
Daniel Lemire and
Owen Kaser Strongly Universal String Hashing is
Fast . . . . . . . . . . . . . . . . . . 1624--1638
Chia-Lin Lee and
Tzong-Jye Liu A Self-Stabilizing Distance-$2$ Edge
Coloring Algorithm . . . . . . . . . . . 1639--1648
Billur Barshan and
Murat Cihan Yüksek Recognizing Daily and Sports Activities
in Two Open Source Machine Learning
Environments Using Body-Worn Sensor
Units . . . . . . . . . . . . . . . . . 1649--1667
Antonio L. Bajuelos and
Sergey Bereg and
Mafalda Martins Guarding Orthogonal Galleries with
Rectangular Rooms . . . . . . . . . . . 1668--1673
Rui Zhou and
Chengfei Liu and
Jianxin Li and
Junhu Wang and
Jeffrey Xu Yu Evaluating Irredundant Maximal Contained
Rewritings for XPath Queries on Views 1674--1692
Peter G. Harrison and
Andrea Marin Product-Forms in Multi-Way
Synchronizations . . . . . . . . . . . . 1693--1710
Sheau-Ru Tong and
Yuan-Tse Yu Adaptation of Near-Perfect Packet-Level
FEC Interleaving in Mobile Media
Streaming . . . . . . . . . . . . . . . 1711--1722
Qingting Wei and
Jihong Guan and
Shuigeng Zhou and
Xin Wang A New and Effective Approach to GML
Documents Compression . . . . . . . . . 1723--1740
David Novak and
Pavel Zezula Performance Study of Independent Anchor
Spaces for Similarity Searching . . . . 1741--1755
Xu Yang and
Deyuan Guo and
Hu He and
Haijing Tang and
Yanjun Zhang An Implementation of Message-Passing
Interface over VxWorks for Real-Time
Embedded Multi-Core Systems . . . . . . 1756--1764
Raed Al-Zubi and
Mohammed Hawa and
Ghazi Al-Sukkar and
Khalid A. Darabkh Markov-Based Distributed Approach for
Mitigating Self-Coexistence Problem in
IEEE 802.22 WRANs . . . . . . . . . . . 1765--1775
Hong-Yi Chang and
Chih-Chun Lai and
Yuan-Wei Lin A Fast SVC-Based Channel-Recommendation
System for an IPTV on a Cloud and P2P
Hybrid Platform . . . . . . . . . . . . 1776--1789
Sain Saginbekov and
Arshad Jhumka Towards Efficient Stabilizing Code
Dissemination in Wireless Sensor
Networks . . . . . . . . . . . . . . . . 1790--1816
Hwangnam Kim and
Hwantae Kim and
Wonkyun Park and
Mungyu Bae Disabling Misbehavior with Traffic
Constraints in WLANs . . . . . . . . . . 1817--1833
Heejung Yang and
Chin-Wan Chung Efficient Iceberg Query Processing in
Sensor Networks . . . . . . . . . . . . 1834--1851
Orhan Dagdeviren and
Vahid Khalilpour Akram An Energy-Efficient Distributed Cut
Vertex Detection Algorithm for Wireless
Sensor Networks . . . . . . . . . . . . 1852--1869
Marco Beccuti and
Giuliana Franceschinis and
Daniele Codetta-Raiteri and
Serge Haddad Computing Optimal Repair Strategies by
Means of NdRFT Modeling and Analysis . . 1870--1892
Prem Nath and
Chiranjeev Kumar Mobility Management Scheme for Fixed
Mobility Pattern Mobile Users in IPv4
Networks . . . . . . . . . . . . . . . . 1893--1911
V. S. Felix Enigo and
V. Ramachandran Enhancing the Scalability of Non-Spatial
Concurrent Queries in Wireless Sensor
Networks . . . . . . . . . . . . . . . . 1912--1924
Nikolay Grozev and
Rajkumar Buyya Performance Modelling and Simulation of
Three-Tier Applications in Cloud and
Multi-Cloud Environments . . . . . . . . 1--22
Marco Beccuti and
Chiara Fornari and
Giuliana Franceschinis and
Sami M. Halawani and
Omar Ba-Rukab and
Ab Rahman Ahmad and
Gianfranco Balbo From Symmetric Nets to Differential
Equations exploiting Model Symmetries 23--39
Shenlu Wang and
Muhammad Aamir Cheema and
Xuemin Lin Efficiently Monitoring Reverse
$k$-Nearest Neighbors in Spatial
Networks . . . . . . . . . . . . . . . . 40--56
Gianfranco Balbo and
Maria Grazia Vigliotti On the Analysis of a M/M/1 Queue with
Bulk Services . . . . . . . . . . . . . 57--74
Zhe Chen Control Systems on Automata and Grammars 75--94
James Pallister and
Simon J. Hollis and
Jeremy Bennett Identifying Compiler Options to Minimize
Energy Consumption for Embedded
Platforms . . . . . . . . . . . . . . . 95--109
Yang Wang and
Hua Li and
Menglan Hu Reusing Garbage Data for Efficient
Workflow Computation . . . . . . . . . . 110--125
James G. Dowty SMML Estimators for $1$-Dimensional
Continuous Data . . . . . . . . . . . . 126--133
Michal Klempa and
Michal Kozak and
Mário Mikula and
Robert Smetana and
Jakub Starka and
Michal \vSvirec and
Matej Vitásek and
Martin Ne\vcaský and
Irena Holubova (Mlýnková) jInfer: a Framework for XML Schema
Inference . . . . . . . . . . . . . . . 134--156
Albert Corominas and
Alberto García-Villoria and
Rafael Pastor Technical Note: Relating to the
Parameter Values Given by Nelder and
Mead in their Algorithm . . . . . . . . 157--159
Antonio Leslie Bajuelos and
Santiago Canales and
Gregorio Hernández and
Mafalda Martins and
Inês Matos Some Results on Open-Edge and Open
Mobile Guarding of Polygons and
Triangulations . . . . . . . . . . . . . 160--171
Omar Alsaleh and
Bella Bose and
Bechir Hamdaoui One-to-Many Node-Disjoint Paths Routing
in Dense Gaussian Networks . . . . . . . 173--187
Chung-Ming Huang and
Yih-Chung Chen and
Shih-Yang Lin Packet Scheduling and Congestion Control
Schemes for Multipath Datagram
Congestion Control Protocol . . . . . . 188--203
O\uguzhan Erdem and
Aydin Carus and
Hoang Le Value-Coded Trie Structure for
High-Performance IPv6 Lookup . . . . . . 204--214
P. Cappanera and
A. Lori and
G. Stea and
G. Vaglini On the Schedulability of
Deadline-Constrained Traffic in TDMA
Wireless Mesh Networks . . . . . . . . . 215--233
Sami Habib and
Paulvanna N. Marimuthu and
Naser Zaeri Carbon-aware Enterprise Network through
Redesign . . . . . . . . . . . . . . . . 234--245
Sen Su and
Qingjia Huang and
Jian Li and
Xiang Cheng and
Peng Xu and
Kai Shuang Enhanced Energy-Efficient Scheduling for
Parallel Tasks Using Partial Optimal
Slacking . . . . . . . . . . . . . . . . 246--257
S. A. Abid and
Mazliza Othman and
Nadir Shah and
Mazhar Ali and
A. R. Khan 3D-RP: a DHT-Based Routing Protocol for
MANETs . . . . . . . . . . . . . . . . . 258--279
Islam Elgedawy CRESCENT: a Reliable Framework for
Durable Composite Web Services
Management . . . . . . . . . . . . . . . 280--299
Mostafa Rezvani and
Mohammad Kazem Akbari and
Bahman Javadi Resource Allocation in Cloud Computing
Environments Based on Integer Linear
Programming . . . . . . . . . . . . . . 300--314
Chien-Fu Cheng and
Hsien-Chun Liao A Malicious-Resilient Protocol for
Consistent Scheduling Problem in the
Cloud Computing Environment . . . . . . 315--330
Mirka Miller and
R. Sundara Rajan and
N. Parthiban and
Indra Rajasingh Minimum Linear Arrangement of Incomplete
Hypercubes . . . . . . . . . . . . . . . 331--337
Shih-Chang Huang and
Hong-Yi Chang A Bidirectional Route Repair Method for
Wireless Mobile Ad Hoc Networks . . . . 338--353
Slim Kallel and
Mohamed Jmaiel and
Sumitra Reddy Enabling Technologies: Infrastructure
for Collaborative Enterprises . . . . . 355--355
Wassim Derguech and
Sami Bhiri and
Souleiman Hasan and
Edward Curry Using Formal Concept Analysis for
Organizing and Discovering Sensor
Capabilities . . . . . . . . . . . . . . 356--367
Zahra Movahedi and
Walid Gaaloul and
Sami Bhiri and
Bruno Defude Assisting Sensor-Based Application
Design and Instantiation Using Activity
Recommendation . . . . . . . . . . . . . 368--384
Afef Jmal Maâlej and
Moez Krichen Study on the Limitations of WS-BPEL
Compositions Under Load Conditions . . . 385--402
Ines Houidi and
Wajdi Louati and
Djamal Zeghlache Exact Multi-Objective Virtual Network
Embedding in Cloud Environments . . . . 403--415
Ryszard Janicki and
Mohammad Hadi Soudkhah On Classification with Pairwise
Comparisons, Support Vector Machines and
Feature Domain Overlapping . . . . . . . 416--431
María Arsuaga-Ríos and
Miguel A. Vega-Rodríguez Multiobjective Small-World Optimization
for Energy Saving in Grid Environments 432--447
Ajay Kumar and
Anil Kumar Verma An Improved Algorithm for the
Metamorphosis of Semi-Extended Regular
Expressions to Deterministic Finite
Automata . . . . . . . . . . . . . . . . 448--456
Lei Du and
Qinbao Song and
Lei Zhu and
Xiaoyan Zhu A Selective Detector Ensemble for
Concept Drift Detection . . . . . . . . 457--471
Omar Khadeer Hussain and
Zia-ur- Rahman and
Farookh Khadeer Hussain and
Jaipal Singh and
Naeem Khalid Janjua and
Elizabeth Chang A User-Based Early Warning Service
Management Framework in Cloud Computing 472--496
Jianxin Li and
Chengfei Liu and
Rui Zhou and
Jeffrey Xu Yu Query-Driven Frequent Co-Occurring Term
Computation over Relational Data Using
MapReduce . . . . . . . . . . . . . . . 497--513
Zhiyong Zhang Security, Trust and Risk in Multimedia
Social Networks . . . . . . . . . . . . 515--517
Constantinos Patsakis and
Athanasios Zigomitros and
Achilleas Papageorgiou and
Agusti Solanas Privacy and Security for Multimedia
Content shared on OSNs: Issues and
Countermeasures . . . . . . . . . . . . 518--535
Hui Zhu and
Cheng Huang and
Hui Li Information Diffusion Model Based on
Privacy Setting in Online Social
Networking Services . . . . . . . . . . 536--548
Hong Zhu and
Shengli Tian and
Kevin Lü Privacy-Preserving Data Publication with
Features of Independent $ \ell
$-Diversity . . . . . . . . . . . . . . 549--571
WeiTao Song and
Bin Hu Approach to Detecting Type-Flaw Attacks
Based on Extended Strand Spaces . . . . 572--587
Bin Yang and
Xingming Sun and
Xianyi Chen and
Jianjun Zhang and
Xu Li Exposing Photographic Splicing by
Detecting the Inconsistencies in Shadows 588--600
Ayesha Kanwal and
Rahat Masood and
Muhammad Awais Shibli and
Rafia Mumtaz Taxonomy for Trust Models in Cloud
Computing . . . . . . . . . . . . . . . 601--626
Qingqi Pei and
Dingyu Yan and
Lichuan Ma and
Zi Li and
Yang Liao A Strong and Weak Ties Feedback-Based
Trust Model in Multimedia Social
Networks . . . . . . . . . . . . . . . . 627--643
Zhen Yang and
Kaiming Gao and
Kefeng Fan and
Yingxu Lai Sensational Headline Identification By
Normalized Cross Entropy-Based Metric 644--655
Hui Lin and
Jia Hu and
Jianfeng Ma and
Li Xu and
Li Yang CRM: a New Dynamic Cross-Layer
Reputation Computation Model in Wireless
Networks . . . . . . . . . . . . . . . . 656--667
Zhiyong Zhang and
Kanliang Wang A Formal Analytic Approach to Credible
Potential Path and Mining Algorithms for
Multimedia Social Networks . . . . . . . 668--678
V. Natarajan and
Shina Sheen and
R. Anitha Multilevel Analysis to Detect Covert
Social Botnet in Multimedia Social
Networks . . . . . . . . . . . . . . . . 679--687
Guowei Wu and
Zuosong Liu and
Lin Yao and
Jing Deng and
Jie Wang A Trust Routing for Multimedia Social
Networks . . . . . . . . . . . . . . . . 688--699
Danmei Niu and
Lanlan Rui and
Cheng Zhong and
Xuesong Qiu A Composition and Recovery Strategy for
Mobile Social Network Service in
Disaster . . . . . . . . . . . . . . . . 700--708
Volkmar Lotz and
Francesco Di Cerbo and
Michele Bezzi and
Samuel Paul Kaluvuri and
Antonino Sabetta and
Slim Trabelsi Security Certification for Service-Based
Business Ecosystems . . . . . . . . . . 709--723
Qiang Tang and
Hua Ma and
Xiaofeng Chen Extend the Concept of Public Key
Encryption with Delegated Search . . . . 724--734
Mingwu Zhang and
Chunzhi Wang and
Tsuyoshi Takagi and
Yi Mu Functional Encryption Resilient to
Hard-to-Invert Leakage . . . . . . . . . 735--749
Yuh-Min Tseng and
Tung-Tso Tsai and
Sen-Shan Huang Leakage-Free ID-Based Signature . . . . 750--757
M. Francisca Hinarejos and
Andreu Pere Isern-Dey\`a and
Josep-Lluís Ferrer-Gomila and
Magdalena Payeras-Capell\`a MC-2D: an Efficient and Scalable
Multicoupon Scheme . . . . . . . . . . . 758--778
Ying-Kai Tang and
Sherman S. M. Chow and
Joseph K. Liu Comments on `Efficient Revocable
Certificateless Encryption Secure in the
Standard Model' . . . . . . . . . . . . 779--781
Lanfranco Lopriore Password Capabilities Revisited . . . . 782--791
Ke Gu and
Weijia Jia and
Chunlin Jiang Efficient Identity-Based Proxy Signature
in the Standard Model . . . . . . . . . 792--807
Debasish Das and
Utpal Sharma and
D. K. Bhattacharyya Detection of Cross-Site Scripting Attack
under Multiple Scenarios . . . . . . . . 808--822
Xinyu Fan and
Guomin Yang and
Yi Mu and
Yong Yu On Indistinguishability in Remote Data
Integrity Checking . . . . . . . . . . . 823--830
Alptekin Küpçü Official Arbitration with Secure Cloud
Storage Application . . . . . . . . . . 831--852
Jiguo Li and
Huiyun Teng and
Xinyi Huang and
Yichen Zhang and
Jianying Zhou A Forward-Secure Certificate-Based
Signature Scheme . . . . . . . . . . . . 853--866
Yong Yu and
Man Ho Au and
Yi Mu and
Willy Susilo and
Huai Wu Secure Delegation of Signing Power from
Factorization . . . . . . . . . . . . . 867--877
Hai L. Vu and
Kenneth K. Khaw and
Tsong Yueh Chen A New Approach for Network Vulnerability
Analysis . . . . . . . . . . . . . . . . 878--891
Stavros N. Shiaeles and
Maria Papadaki FHSD: an Improved IP Spoof Detection
Method for Web DDoS Attacks . . . . . . 892--903
Huacui Liu and
Chenhui Jin Lower Bounds of Differential and Linear
Active $S$-boxes for $3$D-like Structure 904--921
Yu-Chi Chen SPEKS: Secure Server-Designation Public
Key Encryption with Keyword Search
against Keyword Guessing Attacks . . . . 922--933
Cheng-Chi Lee and
Yan-Ming Lai Toward a Secure Single Sign-On Mechanism
for Distributed Computer Networks . . . 934--943
Franco Frattolillo Watermarking Protocols: Problems,
Challenges and a Possible Solution . . . 944--960
Abdulah Abdulah Zadeh and
Howard M. Heys Application of Simple Power Analysis to
Stream Ciphers Constructed Using
Feedback Shift Registers . . . . . . . . 961--972
Haider Salim Hmood and
Zhitang Li and
Hasan Khalaf Abdulwahid and
Yang Zhang Adaptive Caching Approach to Prevent DNS
Cache Poisoning Attack . . . . . . . . . 973--985
Sha Ma and
Mingwu Zhang and
Qiong Huang and
Bo Yang Public Key Encryption with Delegated
Equality Test in a Multi-User Setting 986--1002
Qiang Tang From Ephemerizer to Timed-Ephemerizer:
Achieve Assured Lifecycle Enforcement
for Sensitive Data . . . . . . . . . . . 1003--1020
Maryam Rajabzadeh Asaar and
Mahmoud Salmasizadeh and
Willy Susilo An Identity-Based Multi-Proxy
Multi-Signature Scheme Without Bilinear
Pairings and its Variants . . . . . . . 1021--1039
Gabriel Ciobanu and
Maciej Koutny PerTiMo: a Model of Spatial Migration
with Safe Access Permissions . . . . . . 1041--1060
Jie Lin and
Yue Jiang and
Don Adjeroh Circular Pattern Discovery . . . . . . . 1061--1073
Jia-Jie Liu and
Yue-Li Wang and
Yu-Shan Chiu Constrained Longest Common Subsequences
with Run-Length-Encoded Strings . . . . 1074--1084
Emilio Di Giacomo and
Walter Didimo and
Luca Grilli and
Giuseppe Liotta and
Salvatore Agostino Romeo Heuristics for the Maximum $2$-Layer RAC
Subgraph Problem . . . . . . . . . . . . 1085--1098
Ahmad Sabri and
Vincent Vajnovszki Two Reflected Gray Code-Based Orders on
Some Restricted Growth Sequences . . . . 1099--1111
Chia Shin Ou and
Chin Lung Lu and
R. C. T. Lee A Systematical and Parallel Approach to
Solve Problems Involving Special
Properties of Bit-Vectors . . . . . . . 1112--1121
Amy Affleck and
Aneesh Krishna and
Narasimaha R. Achuthan Non-Functional Requirements Framework: a
Mathematical Programming Approach . . . 1122--1139
Florentin Ipate and
Alin Stefanescu and
Ionut Dinca Model Learning and Test Generation Using
Cover Automata . . . . . . . . . . . . . 1140--1159
Antonio Badia and
Daniel Lemire Functional Dependencies with null
Markers . . . . . . . . . . . . . . . . 1160--1168
Petr Procházka and
Jan Holub Compression of a Set of Files with
Natural Language Content . . . . . . . . 1169--1185
Joel Fuentes and
Pablo Sáez and
Gilberto Gutiérrez and
Isaac D. Scherson A Method to Find Functional Dependencies
Through Refutations and Duality of
Hypergraphs . . . . . . . . . . . . . . 1186--1198
Chang-Ai Sun and
Yimeng Zai and
Huai Liu Evaluating and Comparing Fault-Based
Testing Strategies for General Boolean
Specifications: a Series of Experiments 1199--1213
Behrooz Parhami Digital Arithmetic in Nature:
Continuous-Digit RNS . . . . . . . . . . 1214--1223
Zhangbing Zhou and
Huansheng Ning and
Meikang Qiu and
Habib F. Rashvand Editorial: Green Energy Management and
Smart Grid . . . . . . . . . . . . . . . 1225--1226
Jianxin Li and
Jieyu Zhao and
Yi Li and
Lei Cui and
Bo Li and
Lu Liu and
John Panneerselvam iMIG: Toward an Adaptive Live Migration
Method for KVM Virtual Machines . . . . 1227--1242
Kehua Guo and
Biao Tian and
Jianhua Ma AMPS: an Adaptive Message Push Strategy
for the Energy Efficiency Optimization
in Mobile Terminals . . . . . . . . . . 1243--1253
Liyun Zuo and
Shoubin Dong and
Chunsheng Zhu and
Lei Shu and
Guangjie Han A Cloud Resource Evaluation Model Based
on Entropy Optimization and Ant Colony
Clustering . . . . . . . . . . . . . . . 1254--1266
Jianhui Zhang and
Zhi Li and
Feng Xia and
Shaojie Tang and
Xingfa Shen and
Bei Zhao Cooperative Scheduling for Adaptive Duty
Cycling in Asynchronous Sensor Networks 1267--1279
Guangjie Han and
Xun Li and
Jinfang Jiang and
Lei Shu and
Jaime Lloret Intrusion Detection Algorithm Based on
Neighbor Information Against Sinkhole
Attack in Wireless Sensor Networks . . . 1280--1292
Zhiyong Feng and
Bo Lan and
Zhen Zhang and
Shizhan Chen A Study of Semantic Web Services Network 1293--1305
Xiang Wang and
Ying Lu and
Yi Zhang and
Zexi Zhao and
Tongsheng Xia and
Limin Xiao Power Optimization in Logic Synthesis
for Mixed Polarity Reed--Muller Logic
Circuits . . . . . . . . . . . . . . . . 1306--1313
Domen Zupan\vci\vc and
Mitja Lu\vstrek and
Matja\vz Gams Multi-Agent Architecture for Control of
Heating and Cooling in a Residential
Space . . . . . . . . . . . . . . . . . 1314--1329
Linghe Kong and
Xiao-Yang Liu and
Meixia Tao and
Min-You Wu and
Yu Gu and
Long Cheng and
Jianwei Niu Resource-Efficient Data Gathering in
Sensor Networks for Environment
Reconstruction . . . . . . . . . . . . . 1330--1343
Jin Liu and
Juan Li and
Xiaoguang Niu and
Xiaohui Cui and
Yunchuan Sun GreenOCR: an Energy-Efficient Optimal
Clustering Routing Protocol . . . . . . 1344--1359
Yongzhao Zhan and
Shan Dai and
Qirong Mao and
Lu Liu and
Wei Sheng A Video Semantic Analysis Method Based
on Kernel Discriminative Sparse
Representation and Weighted KNN . . . . 1360--1372
He Li and
Mianxiong Dong and
Xiaofei Liao and
Hai Jin Deduplication-Based Energy Efficient
Storage System in Cloud Environment . . 1373--1383
Hamed Javidi and
Maziar Goudarzi TABEMS: Tariff-Aware Building Energy
Management System for Sustainability
through Better Use of Electricity . . . 1384--1398
Xiaolan Tang and
Juhua Pu and
Yang Gao and
Yu Xie and
Zhang Xiong GPS-Based Replica Deletion Scheme with
Anti-Packet Distribution for Vehicular
Networks . . . . . . . . . . . . . . . . 1399--1415
Antonio Frangioni and
Laura Galli and
Giovanni Stea Optimal Joint Path Computation and Rate
Allocation for Real-time Traffic . . . . 1416--1430
Andrew Larkin and
David E. Williams and
Molly L. Kile and
William M. Baird Developing a Smartphone Software Package
for Predicting Atmospheric Pollutant
Concentrations at Mobile Locations . . . 1431--1442
Nizam Ayyìldìz and
Ece Güran Schmidt and
Hasan Cengiz Güran S-DIRECT: Scalable and Dynamically
Reconfigurable TCAM Architecture for
High-Speed IP Lookup . . . . . . . . . . 1443--1455
Pavel Rajmic and
Jirí Ho\vsek and
Michal Fusek and
Sergey Andreev and
Július Stecík Simplified Probabilistic Modelling and
Analysis of Enhanced Distributed
Coordination Access in IEEE 802.11 . . . 1456--1468
Sang-Yeon Kim and
Dong-Wan Choi and
Chin-Wan Chung Finding a Friendly Community in Social
Networks Considering Bad Relationships 1469--1481
Hamid Saadatfar and
Hossein Deldari and
Mahmoud Naghibzadeh Improving the Scheduler's Energy Saving
Capability by Noting both Job and
Resource Characteristics . . . . . . . . 1482--1493
Viliam Simko and
David Hauzar and
Petr Hnetynka and
Tomas Bures and
Frantisek Plasil Formal Verification of Annotated Textual
Use-Cases . . . . . . . . . . . . . . . 1495--1529
Achal Kaushik and
Deo Prakash Vidyarthi A Green Energy Model for Resource
Allocation in Computational Grid . . . . 1530--1547
H. Ahmadifar and
G. Jaberipur A New Residue Number System with
$5$-Moduli Set: $ 2^{2 q}$, $ 2^q \pm
3$, $ 2^q \pm 1$ . . . . . . . . . . . . 1548--1565
Edem Kwedzo Bankas and
Kazeem Alagbe Gbolagade New MRC Adder-Based Reverse Converter
for the Moduli Set $ 2^n $, $ 2^{2 n +
1} - 1 $, $ 2^{2 n + 2} - 1 $ . . . . . 1566--1572
Qian Mao and
K. Bharanitharan and
Chin-Chen Chang A Proxy User Authentication Protocol
Using Source-Based Image Morphing . . . 1573--1584
Yi-wen Zhang and
Rui-feng Guo Low-Power Scheduling Algorithms for
Sporadic Task with Shared Resources in
Hard Real-Time Systems . . . . . . . . . 1585--1597
Chao-Liang Liu and
Wang-Jui Tsai and
Ting-Yi Chang and
Chun-Cheng Peng and
Peng-Shiang Wong Meaningful Share Generation for $ (2,
2)$-Multiple Visual Secret Sharing
Scheme Without Pixel Expansion . . . . . 1598--1606
Abdelkrim Abdelli Improving the State Space Computation of
the Time Stream Petri Nets Model . . . . 1607--1627
Yang Wang and
Wei Shi Dataflow-Based Scheduling for Scientific
Workflows in HPC with Storage
Constraints . . . . . . . . . . . . . . 1628--1644
Murat Yesilyurt and
Yildiray Yalman and
A. Turan Ozcerit A Robust Watermarking Method for MPEG-4
Based on Kurtosis . . . . . . . . . . . 1645--1655
Alexandre Petrenko and
Adenilso Simao Generalizing the DS-Methods for Testing
Non-Deterministic FSMs . . . . . . . . . 1656--1672
Niko Beerenwinkel and
Stefano Beretta and
Paola Bonizzoni and
Riccardo Dondi and
Yuri Pirola Covering Pairs in Directed Acyclic
Graphs . . . . . . . . . . . . . . . . . 1673--1686
Quan Z. Sheng and
Elhadi M. Shakshuki and
Jian Yu Ambient and Context-Aware Services for
the Future Web . . . . . . . . . . . . . 1687--1688
Khalid Elgazzar and
Sharief M. A. Oteafy and
Walid M. Ibrahim and
Hossam S. Hassanein A Resilient P2P Architecture for Mobile
Resource Sharing . . . . . . . . . . . . 1689--1700
Zahoor A. Khan and
Shyamala C. Sivakumar and
William J. Phillips and
Bill Robertson QPRR: QoS-Aware Peering Routing Protocol
for Reliability Sensitive Data in Body
Area Network Communication . . . . . . . 1701--1716
Alireza Nafarieh and
Shyamala Sivakumar and
William Robertson and
William Phillips SLA-Based Time-Aware Provisioning
Mechanisms in Shared Mesh Protected
Optical Networks . . . . . . . . . . . . 1717--1731
Heiko Desruelle and
Frank Gielen Context-Driven Progressive Enhancement
of Mobile Web Applications: a
Multicriteria Decision-Making Approach 1732--1746
Yanling Hu and
Anfeng Liu An Efficient Heuristic Subtraction
Deployment Strategy to Guarantee Quality
of Event Detection for WSNs . . . . . . 1747--1762
David Diez Hernandez and
Jaime Garcia-Reinoso and
Ivan Vidal SFP: Statistical Filtering Policy for
Caching in Content-Centric Networking 1763--1775
Xing Su and
Minjie Zhang and
Quan Bai Dynamic Task Allocation for
Heterogeneous Agents in Disaster
Environments Under Time, Space and
Communication Constraints . . . . . . . 1776--1791
Xiuchao Wu and
Kenneth N. Brown and
Cormac J. Sreenan Contact Probing Mechanisms for
Opportunistic Sensor Data Collection . . 1792--1810
Ping Xie and
Jianzhong Huang and
Qiang Cao and
Xiao Qin and
Changsheng Xie A New Non-MDS RAID-6 Code to Support
Fast Reconstruction and Balanced I/Os 1811--1825
Guangjun Qin and
Mingfa Zhu and
Limin Xiao and
Li Ruan Lessen Interflow Interference Using
Virtual Channels Partitioning . . . . . 1826--1841
Jaime Garcia-Reinoso and
Ivan Vidal and
David Diez and
Daniel Corujo and
Rui L. Aguiar Analysis and Enhancements to
Probabilistic Caching in Content-Centric
Networking . . . . . . . . . . . . . . . 1842--1856
Ahmed Kheiri and
Ender Ozcan Corrigendum: Constructing
Constrained-Version of Magic Squares
Using Selection Hyper-heuristics . . . . 1857--1857
Neil Y. Yen and
Uyen Trang Nguyen and
Jong Hyuk Park Mining Social Media for Knowledge
Discovery . . . . . . . . . . . . . . . 1859--1860
Thomas Steiner and
Ruben Verborgh and
Joaquim Gabarro and
Erik Mannens and
Rik Van de Walle Clustering Media Items Stemming from
Multiple Social Networks . . . . . . . . 1861--1875
Weiwei Yuan and
Donghai Guan and
Sungyoung Lee and
Jin Wang Skeleton Searching Strategy for
Recommender Searching Mechanism of
Trust-Aware Recommender Systems . . . . 1876--1883
Yongkoo Han and
Kisung Park and
Donghai Guan and
Sajal Halder and
Young-Koo Lee Topological Similarity-Based Feature
Selection for Graph Classification . . . 1884--1893
Lihua Zhou and
Kevin Lü Detecting Communities with Different
Sizes for Social Network Analysis . . . 1894--1908
Wu He and
Gongjun Yan Mining Blogs And Forums To Understand
the Use of Social Media in Customer
Co-creation . . . . . . . . . . . . . . 1909--1920
Chen Yang and
Jian Ma and
Thushari Silva and
Xiaoyan Liu and
Zhongsheng Hua A Multilevel Information Mining Approach
for Expert Recommendation in Online
Scientific Communities . . . . . . . . . 1921--1936
Lida Ghahremanlou and
Wanita Sherchan and
James A. Thom Geotagging Twitter Messages in Crisis
Management . . . . . . . . . . . . . . . 1937--1954
Seyed Mohammadhadi Daneshmand and
Amin Javari and
Seyed Ebrahim Abtahi and
Mahdi Jalili A Time-Aware Recommender System Based on
Dependency Network of Items . . . . . . 1955--1966
Naeem Khalid Janjua and
Omar Khadeer Hussain and
Farookh Khadeer Hussain and
Elizabeth Chang Philosophical and Logic-Based
Argumentation-Driven Reasoning
Approaches and their Realization on the
WWW: a Survey . . . . . . . . . . . . . 1967--1999
R. Rodríguez-Rodríguez and
F. Castro and
D. Chaver and
R. Gonzalez-Alberquilla and
L. Piñuel and
F. Tirado Write-Aware Replacement Policies for
PCM-Based Systems . . . . . . . . . . . 2000--2025
Muhammad Ashad Kabir and
Jun Han and
Jian Yu and
Alan Colman Inferring User Situations from
Interaction Events in Social Media . . . 2026--2043
Hiren Mewada and
Rahul Patel and
Suprava Patnaik A Novel Structure Tensor Modulated
Chan--Vese Model for Texture Image
Segmentation . . . . . . . . . . . . . . 2044--2060
Yi Liu and
Xiongzi Ge and
Xiaoxia Huang and
David H. C. Du MOLAR: a Cost-Efficient,
High-Performance SSD-Based Hybrid
Storage Cache . . . . . . . . . . . . . 2061--2078
Sadegh Aliakbary and
Jafar Habibi and
Ali Movaghar Feature Extraction from Degree
Distribution for Comparison and Analysis
of Complex Networks . . . . . . . . . . 2079--2091
Mehmet Al\.I Abbaso\uglu and
Bu\ugra Ged\.Ik and
Hakan Ferhatosmano\uglu Aggregate Profile Clustering for
Streaming Analytics . . . . . . . . . . 2092--2108
Yanmin Zhu and
Yin Wang and
George Forman and
Hong Wei Mining Large-Scale GPS Streams for
Connectivity Refinement of Road Maps . . 2109--2119
Lin Wu and
Xiaodi Huang and
John Shepherd and
Yang Wang Multi-Query Augmentation-Based Web
Landmark Photo Retrieval . . . . . . . . 2120--2134
Minaz Parmar and
Marios C. Angelides MAC-REALM: a Video Content Feature
Extraction and Modelling Framework . . . 2135--2171
Álvaro Rubio-Largo and
Miguel A. Vega-Rodríguez and
David L. González-Álvarez A Parallel Multiobjective Approach based
on Honey Bees for Traffic Grooming in
Optical Networks . . . . . . . . . . . . 2171--2191
David G. Rosado and
Nadira Lammari and
Jan Jürjens Special Issue on Secure Information
Systems Engineering . . . . . . . . . . 2193--2194
Maryam Sepehri and
Stelvio Cimato and
Ernesto Damiani Privacy-Preserving Query Processing by
Multi-Party Computation . . . . . . . . 2195--2212
Evangelia Kavakli and
Christos Kalloniatis and
Haralambos Mouratidis and
Stefanos Gritzalis Privacy as an Integral Part of the
Implementation of Cloud Solutions . . . 2213--2224
D. Marudhadevi and
V. Neelaya Dhatchayani and
V. S. Shankar Sriram A Trust Evaluation Model for Cloud
Computing Using Service Level Agreement 2225--2232
Oscar Rebollo and
Daniel Mellado and
Eduardo Fernandez-Medina ISGcloud: a Security Governance
Framework for Cloud Computing . . . . . 2233--2254
Thomas Quirchmayr and
Mark Strembeck A Discussion of Communication Schemes
for Process Execution Histories to
Enforce Entailment Constraints in
Process-Driven SOAs . . . . . . . . . . 2255--2279
Katarzyna Mazur and
Bogdan Ksiezopolski and
Zbigniew Kotulski The Robust Measurement Method for
Security Metrics Generation . . . . . . 2280--2296
Takeshi Takahashi and
Youki Kadobayashi Reference Ontology for Cybersecurity
Operational Information . . . . . . . . 2297--2312
Ricardo J. Rodríguez and
José Merseguer and
Simona Bernardi Modelling Security of Critical
Infrastructures: a Survivability
Assessment . . . . . . . . . . . . . . . 2313--2327
Jose Fran. Ruiz and
Antonio Maña and
Carsten Rudolph An Integrated Security and Systems
Engineering Process and Modelling
Framework . . . . . . . . . . . . . . . 2328--2350
Carlos Blanco and
Eduardo Fernández-Medina and
Juan Trujillo Modernizing Secure OLAP Applications
with a Model-Driven Approach . . . . . . 2351--2367
Kazim Yumbul and
Erkay Sava\cs Enhancing an Embedded Processor Core for
Efficient and Isolated Execution of
Cryptographic Algorithms . . . . . . . . 2368--2387
Udaya Tupakula and
Vijay Varadharajan Trust Enhanced Security for Tenant
Transactions in the Cloud Environment 2388--2403
Kenneth Radke and
Colin Boyd and
Juan Gonzalez Nieto and
Harry Bartlett CHURNs: Freshness Assurance for Humans 2404--2425
Chunfeng Lian and
Liaojun Pang and
Jimin Liang Generalized Random Grid-Based Visual
Secret Sharing for General Access
Structures . . . . . . . . . . . . . . . 2426--2442
Xing Wang and
Nga Lam Or and
Ziyan Lu and
Derek Pao Hardware Accelerator to Detect
Multi-Segment Virus Patterns . . . . . . 2443--2460
Chanying Huang and
Hwaseong Lee and
Hyoseung Kim and
Dong Hoon Lee mvSERS: a Secure Emergency Response
Solution for Mobile Healthcare in
Vehicular Environments . . . . . . . . . 2461--2475
Grazielle Vernize and
André Luiz Pires Guedes and
Luiz Carlos Pessoa Albini Malicious Nodes Identification for
Complex Network Based on Local Views . . 2476--2491
Jianghong Wei and
Wenfen Liu and
Xuexian Hu Forward-Secure Threshold Attribute-Based
Signature Scheme . . . . . . . . . . . . 2492--2506
Debiao He and
Mingwu Zhang and
Baowen Xu Insecurity of an Efficient
Identity-Based Proxy Signature in the
Standard Model . . . . . . . . . . . . . 2507--2508
Chang Xu and
Liehuang Zhu and
Zhoujun Li and
Feng Wang One-Round Affiliation-Hiding
Authenticated Asymmetric Group Key
Agreement with Semi-trusted Group
Authority . . . . . . . . . . . . . . . 2509--2519
Shi-Feng Sun and
Dawu Gu and
Zhengan Huang Fully Secure Wicked Identity-Based
Encryption Against Key Leakage Attacks 2520--2536
Zoran Djuric and
Dragan Gasevic FEIPS: a Secure Fair-Exchange Payment
System for Internet Transactions . . . . 2537--2556
Lanfranco Lopriore Password Management: Distribution,
Review and Revocation . . . . . . . . . 2557--2566
Amir Jalaly Bidgoly and
Behrouz Tork Ladani Modelling and Quantitative Verification
of Reputation Systems Against Malicious
Attackers . . . . . . . . . . . . . . . 2567--2582
Wien Hong and
Gwoboa Horng and
Chih-Wei Shiu and
Tung-Shou Chen and
Yu-Chi Chen Reversible Steganographic Method Using
Complexity Control and Human Visual
System . . . . . . . . . . . . . . . . . 2583--2594
Dong Lai Fu and
Xin Guang Peng and
Yu Li Yang Trusted Validation for Geolocation of
Cloud Data . . . . . . . . . . . . . . . 2595--2607
Shahid Alam and
Issa Traore and
Ibrahim Sogukpinar Annotated Control Flow Graph for
Metamorphic Malware Detection . . . . . 2608--2621
Md Saiful Islam and
Naif Alajlan Model-based Alignment of Heartbeat
Morphology for Enhancing Human
Recognition Capability . . . . . . . . . 2622--2635
Sk Hafizul Islam and
Fagen Li Leakage-Free and Provably Secure
Certificateless Signcryption Scheme
Using Bilinear Pairings . . . . . . . . 2636--2648
Pericle Perazzo and
Pavel Skvortsov and
Gianluca Dini On Designing Resilient Location-Privacy
Obfuscators . . . . . . . . . . . . . . 2649--2664
Yang Wang and
Willy Susilo and
Man Ho Au Revisiting Security Against the
Arbitrator in Optimistic Fair Exchange 2665--2676
Lin Ding and
Chenhui Jin and
Jie Guan and
Shaowu Zhang and
Ting Cui and
Dong Han and
Wei Zhao Cryptanalysis of WG Family of Stream
Ciphers . . . . . . . . . . . . . . . . 2677--2685
Kaibin Huang and
Raylin Tso and
Yu-Chi Chen and
Sk Md Mizanur Rahman and
Ahmad Almogren and
Atif Alamri PKE-AET: Public Key Encryption with
Authorized Equality Test . . . . . . . . 2686--2697
Nuttapong Attrapadung and
Keita Emura and
Goichiro Hanaoka and
Yusuke Sakai Revocable Group Signature with
Constant-Size Revocation List . . . . . 2698--2715
Erkay Sava\cs and
Cemal Yìlmaz A Generic Method for the Analysis of a
Class of Cache Attacks: a Case Study for
AES . . . . . . . . . . . . . . . . . . 2716--2737
Mayana Pereira and
Rafael Dowsley and
Anderson C. A. Nascimento and
Goichiro Hanaoka Public-Key Encryption Schemes with
Bounded CCA Security and Optimal
Ciphertext Length Based on the CDH and
HDH Assumptions . . . . . . . . . . . . 2738--2746
Wei Gao and
Guilin Wang and
Xueli Wang and
Kefei Chen Generic Construction of
Certificate-Based Encryption from
Certificateless Encryption Revisited . . 2747--2757
André Ricardo Abed Grégio and
Vitor Monte Afonso and
Dario Simões Fernandes Filho and
Paulo Lício de Geus and
Mario Jino Toward a Taxonomy of Malware Behaviors 2758--2777
Kaitai Liang and
Willy Susilo and
Joseph K. Liu and
Duncan S. Wong Efficient and Fully CCA Secure
Conditional Proxy Re-Encryption from
Hierarchical Identity-Based Encryption 2778--2792
Nina Yevtushenko and
Khaled El-Fakih and
Tiziano Villa and
Jie-Hong R. Jiang Deriving Compositionally Deadlock-Free
Components over Synchronous Automata
Compositions . . . . . . . . . . . . . . 2793--2803
Ahmet Kara and
Halit O\uguztüzün and
M. Nedim Alpdemir A Methodology for Resolution Mapping for
Cross-Resolution Simulation using
Event-B . . . . . . . . . . . . . . . . 2804--2823
Weiqiang Kong and
Leyuan Liu and
Takahiro Ando and
Hirokazu Yatsu and
Kenji Hisazumi and
Akira Fukuda Facilitating Multicore Bounded Model
Checking with Stateless Explicit-State
Exploration . . . . . . . . . . . . . . 2824--2840
Xiaowang Zhang and
Jan Van den Bussche On the Power of SPARQL in Expressing
Navigational Queries . . . . . . . . . . 2841--2851
Sung-In Jang and
Su-Kyung Yoon and
Kihyun Park and
Gi-Ho Park and
Shin-Dug Kim Data Classification Management with its
Interfacing Structure for Hybrid SLC/MLC
PRAM Main Memory . . . . . . . . . . . . 2852--2863
Shaowei Cai and
Chuan Luo and
Kaile Su Improving WalkSAT By Effective
Tie-Breaking and Efficient
Implementation . . . . . . . . . . . . . 2864--2875
Pablo Muñoz and
David F. Barrero and
María D. R-Moreno A Statistically Rigorous Analysis of
$2$D Path-Planning Algorithms . . . . . 2876--2891
Gauthier van den Hove On the Origin of Recursive Procedures 2892--2899
Paolo Arcaini and
Angelo Gargantini and
Elvinia Riccobene How to Optimize the Use of SAT and SMT
Solvers for Test Generation of Boolean
Expressions . . . . . . . . . . . . . . 2900--2920
Frank Gurski Linear Programming Formulations for
Computing Graph Layout Parameters . . . 2921--2927
Shiyu Yang and
Muhammad Aamir Cheema and
Xuemin Lin Impact Set: Computing Influence Using
Query Logs . . . . . . . . . . . . . . . 2928--2943
Xi Wang and
Alejandro Erickson and
Jianxi Fan and
Xiaohua Jia Hamiltonian Properties of DCell Networks 2944--2955
Giorgos Stoilos and
Tassos Venetis and
Giorgos Stamou A Fuzzy Extension to the OWL 2 RL
Ontology Language . . . . . . . . . . . 2956--2971
Jinn-Shyong Yang and
Sih-Syuan Luo and
Jou-Ming Chang Pruning Longer Branches of Independent
Spanning Trees on Folded Hyper-Stars . . 2972--2981
Thomas Roelleke and
Andreas Kaltenbrunner and
Ricardo Baeza-Yates Harmony Assumptions in Information
Retrieval and Social Networks . . . . . 2982--2999
A. S. M. Kayes and
Jun Han and
Alan Colman OntCAAC: an Ontology-Based Approach to
Context-Aware Access Control for
Software Services . . . . . . . . . . . 3000--3034
Hao Zheng and
Xiaoshe Dong and
Zhengdong Zhu and
Baoke Chen and
Yizhi Zhang and
Xingjun Zhang Research on Algorithms to Capture
Drivers' Write Operations . . . . . . . 3035--3056
Jorge F. Fabeiro and
Diego Andrade and
Basilio B. Fraguela and
Ramón Doallo Automatic Generation of Optimized OpenCL
Codes Using OCLoptimizer . . . . . . . . 3057--3073
Shenwei Huang and
Matthew Johnson and
Daniël Paulusma Narrowing the Complexity Gap for
Colouring $ (C_s, P_t) $-Free Graphs . . 3074--3088
Robert M. Hierons and
Uraz Cengiz Türker Incomplete Distinguishing Sequences for
Finite State Machines . . . . . . . . . 3089--3113
Yinglei Song and
Chunmei Liu and
Yongzhong Li A New Parameterized Algorithm for
Predicting the Secondary Structure of
RNA Sequences Including Pseudoknots . . 3114--3125
Emilio Di Giacomo and
Walter Didimo and
Giuseppe Liotta and
Henk Meijer and
Stephen K. Wismath Planar and Quasi-Planar Simultaneous
Geometric Embedding . . . . . . . . . . 3126--3140
Outi Sievi-Korte and
Kai Koskimies and
Erkki Mäkinen Techniques for Genetic Software
Architecture Design . . . . . . . . . . 3141--3170
László Lengyel and
Tamás Mészáros and
Márk Asztalos and
Péter Boros and
Attila Máté and
Gábor Madács and
Péter Hudák and
Kristóf Kovács and
András Tresch and
Hassan Charaf Quality Assured Model-Driven
Requirements Engineering and Software
Development . . . . . . . . . . . . . . 3171--3186
Kun Ma and
Fusen Dong and
Bo Yang Large-Scale Schema-Free Data
Deduplication Approach with Adaptive
Sliding Window Using MapReduce . . . . . 3187--3201
Amir Vahid Dastjerdi and
Rajkumar Buyya An Autonomous Time-Dependent SLA
Negotiation Strategy for Cloud Computing 3202--3216
Sérgio Esteves and
Paulo Ferreira and
Luís Veiga $ C^3 P $: a Re-Configurable Framework
to Design Cycle-sharing Computing Cloud
Platforms . . . . . . . . . . . . . . . 3217--3241
Yuhao Yi and
Zhongzhi Zhang and
Yuan Lin and
Guanrong Chen Small-World Topology Can Significantly
Improve the Performance of Noisy
Consensus in a Complex Network . . . . . 3242--3254
Huajun He and
Yang Zhao and
Jinfu Wu and
Ye Tian Cost-Aware Capacity Provisioning for
Internet Video Streaming CDNs . . . . . 3255--3270
R. Sundara Rajan and
Paul Manuel and
Indra Rajasingh and
N. Parthiban and
Mirka Miller A Lower Bound for Dilation of an
Embedding . . . . . . . . . . . . . . . 3271--3278
Yonggang Che and
Chuanfu Xu and
Jianbin Fang and
Yongxian Wang and
Zhenghua Wang Realistic Performance Characterization
of CFD Applications on Intel Many
Integrated Core Architecture . . . . . . 3279--3294
Wei Zhou and
Tao Jing and
Yan Huo and
Jin Qian and
Zhen Li Double Auction for Joint Channel and
Power Allocation in Cognitive Radio
Networks . . . . . . . . . . . . . . . . 3295--3305
Chun-Chieh Huang and
Ren-Song Ko A Study on Maximizing the Parallelism of
Macroscopically Derived Routing
Algorithms for WSNs . . . . . . . . . . 3306--3324
Rodrigo Andrade and
Márcio Ribeiro and
Henrique Rebêlo and
Paulo Borba and
Vaidas Gasiunas and
Lucas Satabin Assessing Idioms for a Flexible Feature
Binding Time . . . . . . . . . . . . . . 1--32
Robert M. Hierons A More Precise Implementation Relation
for Distributed Testing . . . . . . . . 33--46
Li Chunlin and
Li LaYuan Context-Aware Integrated Scheme for
Mobile Cloud Service Allocation . . . . 47--63
K. Hemant Kumar Reddy and
Diptendu Sinha Roy DPPACS: a Novel Data Partitioning and
Placement Aware Computation Scheduling
Scheme for Data-Intensive Cloud
Applications . . . . . . . . . . . . . . 64--82
Shay Gueron and
Vlad Krasnov Fast Quicksort Implementation Using AVX
Instructions . . . . . . . . . . . . . . 83--90
Sulin Song and
Shuming Zhou and
Xiaoyan Li Conditional Diagnosability of Burnt
Pancake Networks Under the PMC Model . . 91--105
Zaharije Radivojevi\'c and
Milo\vs Cvetanovi\'c and
Sa\vsa Stojanovi\'c Comparison of Binary Procedures: a Set
of Techniques for Evading Compiler
Transformations . . . . . . . . . . . . 106--118
Jie Zhao and
Rongcai Zhao and
Jinchen Xu Code Generation for Distributed-Memory
Architectures . . . . . . . . . . . . . 119--132
Carla Binucci and
Walter Didimo Computing Quasi-Upward Planar Drawings
of Mixed Graphs . . . . . . . . . . . . 133--150
Zhendong Shao and
Igor Averbakh and
Sandi Klav\vzar Labeling Dot-Cartesian and
Dot-Lexicographic Product Graphs with a
Condition at Distance Two . . . . . . . 151--158
You Wang and
Jun Bi Software-Defined Mobility Support in IP
Networks . . . . . . . . . . . . . . . . 159--177
Abdul Hameed and
Adnan Noor Mian Towards Better Traffic Localization of
Virtual LANs Using Genetic Algorithm . . 178--191
J. Araujo and
F. Giroire and
J. Moulierac and
Y. Liu and
R. Modrzejewski Energy Efficient Content Distribution 192--207
Sareh Fotuhi Piraghaj and
Rodrigo N. Calheiros and
Jeffrey Chan and
Amir Vahid Dastjerdi and
Rajkumar Buyya Virtual Machine Customization and Task
Mapping Architecture for Efficient
Allocation of Cloud Data Center
Resources . . . . . . . . . . . . . . . 208--224
Lélia Blin and
Maria Potop-Butucaru and
Stéphane Rovedakis and
Sébastien Tixeuil A New Self-Stabilizing Minimum Spanning
Tree Construction with Loop-Free
Property . . . . . . . . . . . . . . . . 225--243
Mahmood Naderan-Tahan and
Hamid Sarbazi-Azad Why Does Data Prefetching Not Work for
Modern Workloads? . . . . . . . . . . . 244--259
Md. Abu Layek and
TaeChoong Chung and
Eui-Nam Huh Adaptive Desktop Delivery Scheme for
Provisioning Quality of Experience in
Cloud Desktop as a Service . . . . . . . 260--274
J. Bahi and
W. Elghazel and
C. Guyeux and
M. Haddad and
M. Hakem and
K. Medjaher and
N. Zerhouni Resiliency in Distributed Sensor
Networks for Prognostics and Health
Management of the Monitoring Targets . . 275--284
Surya Nepal and
Suraj Pandey Guest Editorial: Cloud Computing and
Scientific Applications (CCSA) --- Big
Data Analysis in the Cloud . . . . . . . 285--286
Roberto R. Expósito and
Guillermo L. Taboada and
Sabela Ramos and
Juan Touriño and
Ramón Doallo Performance Evaluation of Data-Intensive
Computing Applications on a Public IaaS
Cloud . . . . . . . . . . . . . . . . . 287--307
Sami Yangui and
Samir Tata An OCCI Compliant Model for PaaS
Resources Description and Provisioning 308--324
Liang Li and
Endong Wang and
Xiaoshe Dong and
Zhengdong Zhu The Optimization of Memory Access
Congestion for MapReduce Applications on
Manycore Systems . . . . . . . . . . . . 325--337
Christian Napoli and
Giuseppe Pappalardo and
Emiliano Tramontana and
Gaetano Zappal\`a A Cloud-Distributed GPU Architecture for
Pattern Identification in Segmented
Detectors Big-Data Surveys . . . . . . . 338--352
T. Veni and
S. Mary Saira Bhanu MDedup++: Exploiting Temporal and
Spatial Page-Sharing Behaviors for
Memory Deduplication Enhancement . . . . 353--370
Sérgio Esteves and
Luís Veiga WaaS: Workflow-as-a-Service for the
Cloud with Scheduling of Continuous and
Data-Intensive Workflows . . . . . . . . 371--383
David L. González-Álvarez and
Miguel A. Vega-Rodríguez and
Álvaro Rubio-Largo A Comparative Study of Different Motif
Occurrence Models Applied to a Hybrid
Multiobjective Shuffle Frog Leaping
Algorithm . . . . . . . . . . . . . . . 384--402
Yan Kong and
Minjie Zhang and
Dayong Ye An Auction-Based Approach for Group Task
Allocation in an Open Network
Environment . . . . . . . . . . . . . . 403--422
Iyad F. Jafar and
Khalid A. Darabkh and
Raed T. Al-Zubi and
Rami A. Al Na'mneh Efficient Reversible Data Hiding Using
Multiple Predictors . . . . . . . . . . 423--438
Wuqiang Shen and
Shaohua Tang RGB, a Mixed Multivariate Signature
Scheme . . . . . . . . . . . . . . . . . 439--451
Leyou Zhang and
Yi Mu and
Qing Wu Compact Anonymous Hierarchical
Identity-Based Encryption with Constant
Size Private Keys . . . . . . . . . . . 452--461
Simeon Veloudis and
Nimal Nissanke A Novel Permission Hierarchy for RBAC
for Dealing with SoD in MAC Models . . . 462--492
Mingwu Zhang and
Yi Mu Token-Leakage Tolerant and Vector
Obfuscated IPE and Application in
Privacy-Preserving Two-Party
Point/Polynomial Evaluations . . . . . . 493--507
Joonsang Baek and
Duncan S. Wong and
Jin Li and
Man Ho Au Efficient Generic Construction of
CCA-Secure Identity-Based Encryption
from Randomness Extraction . . . . . . . 508--521
Peng Zhou and
Xiaojing Gu and
Rocky K. C. Chang Harvesting File Download Exploits in the
Web: a Hacker's View . . . . . . . . . . 522--540
Xinran Li and
Chen-Hui Jin and
Fang-Wei Fu Improved Results of Impossible
Differential Cryptanalysis on Reduced
FOX . . . . . . . . . . . . . . . . . . 541--548
Guo-Qiang Liu and
Chen-Hui Jin Linear Cryptanalysis of PRESENT-like
Ciphers with Secret Permutation . . . . 549--558
Jiannan Wei and
Guomin Yang and
Yi Mu and
Kaitai Liang Anonymous Proxy Signature with
Hierarchical Traceability . . . . . . . 559--569
Emma Osborn and
Andrew Simpson On Safety and Security Requirements in
Emerging Ubiquitous Computing Models . . 570--591
Hung-Yu Chien A Generic Approach to Improving
Diffie--Hellman Key Agreement Efficiency
for Thin Clients . . . . . . . . . . . . 592--601
Josh Chopin and
Hamid Laga and
Stanley J. Miklavcic The Influence of Object Shape on the
Convergence of Active Contour Models for
Image Segmentation . . . . . . . . . . . 603--615
Jia-Jie Liu and
Cheng-Ju Hsu and
Chien-Hung Lin Computing Global Secure Set on Trees . . 616--629
Riku Saikkonen and
Eljas Soisalon-Soininen Cache-Sensitive Memory Layout for
Dynamic Binary Trees . . . . . . . . . . 630--649
Konrad K. Dabrowski and
Daniël Paulusma Clique-Width of Graph Classes Defined by
Two Forbidden Induced Subgraphs . . . . 650--666
Natarajan Meghanathan Maximal Assortative Matching and Maximal
Dissortative Matching for Complex
Network Graphs . . . . . . . . . . . . . 667--684
Ju-Hee Choi and
Gi-Ho Park Demand-Aware NVM Capacity Management
Policy for Hybrid Cache Architecture . . 685--700
Jia-Chun Lin and
Fang-Yie Leu and
Ying-ping Chen Impacts of Task Re-Execution Policy on
MapReduce Jobs . . . . . . . . . . . . . 701--714
Zheng Hao and
Dong Xiaoshe and
Zhu Zhengdong and
Chen Baoke and
Bai Xiuxiu and
Zhang Xingjun and
Wang Endong Improving the Reliability of the
Operating System Inside a VM . . . . . . 715--740
Tao Zhang and
He Jiang and
Xiapu Luo and
Alvin T. S. Chan A Literature Review of Research in Bug
Resolution: Tasks, Challenges and Future
Directions . . . . . . . . . . . . . . . 741--773
Bernabe Dorronsoro and
Sergio Nesmachnow Parallel Soft Computing Techniques in
High-Performance Computing Systems . . . 775--776
Francisco Luna and
Gustavo R. Zavala and
Antonio J. Nebro and
Juan J. Durillo and
Carlos A. Coello Coello Distributed Multi-Objective
Metaheuristics for Real-World Structural
Optimization Problems . . . . . . . . . 777--792
Misun Yu and
Doo-Hwan Bae SimpleLock$^+$: Fast and Accurate Hybrid
Data Race Detection . . . . . . . . . . 793--809
Nadia Nedjah and
Rogério de Moraes Calazan and
Luiza de Macedo Mourelle Particle, Dimension and
Cooperation-Oriented PSO Parallelization
Strategies for Efficient High-Dimension
Problem Optimizations on Graphics
Processing Units . . . . . . . . . . . . 810--835
Guillermo Vigueras and
Juan M. Orduña On the Use of GPU for Accelerating
Communication-Aware Mapping Techniques 836--847
Jianliang Gao and
Ping Liu and
Xuedan Kang and
Lixia Zhang and
Jianxin Wang PRS: Parallel Relaxation Simulation for
Massive Graphs . . . . . . . . . . . . . 848--860
Zhuo Wang and
Tingting Hou and
Dawei Song and
Zhun Li and
Tianqi Kong Detecting Review Spammer Groups via
Bipartite Graph Projection . . . . . . . 861--874
Chris Gorman and
Iren Valova GORMANN: Gravitationally Organized
Related Mapping Artificial Neural
Network . . . . . . . . . . . . . . . . 875--888
D. Thenmozhi and
Chandrabose Aravindan An Automatic and Clause-Based Approach
to Learn Relations for Ontologies . . . 889--907
Mert Ozer and
Ilkcan Keles and
Hakki Toroslu and
Pinar Karagoz and
Hasan Davulcu Predicting the Location and Time of
Mobile Phone Users by Using Sequential
Pattern Mining Techniques . . . . . . . 908--922
Sangeeta Bhattacharya and
S. Selvakumar Multi-Measure Multi-Weight Ranking
Approach for the Identification of the
Network Features for the Detection of
DoS and Probe Attacks . . . . . . . . . 923--943
Joseph K. Liu and
Sze Ling Yeo and
Wun-She Yap and
Sherman S. M. Chow and
Duncan S. Wong and
Willy Susilo Faulty Instantiations of Threshold Ring
Signature from Threshold
Proof-of-Knowledge Protocol . . . . . . 945--954
Peng Jiang and
Yi Mu and
Fuchun Guo and
Xiaofen Wang and
Qiaoyan Wen Online/Offline Ciphertext Retrieval on
Resource Constrained Devices . . . . . . 955--969
Chunpeng Ge and
Willy Susilo and
Jiandong Wang and
Zhiqiu Huang and
Liming Fang and
Yongjun Ren A Key-Policy Attribute-Based Proxy
Re-Encryption Without Random Oracles . . 970--982
Zhen Liu and
Duncan S. Wong Practical Attribute-Based Encryption:
Traitor Tracing, Revocation and Large
Universe . . . . . . . . . . . . . . . . 983--1004
Amir Jalaly Bidgoly and
Behrouz Tork Ladani Modeling and Quantitative Verification
of Trust Systems Against Malicious
Attackers . . . . . . . . . . . . . . . 1005--1027
Jiguo Li and
Haiting Du and
Yichen Zhang Certificate-Based Key-Insulated
Signature in the Standard Model . . . . 1028--1039
Joseph K. Liu and
Willy Susilo and
Tsz Hon Yuen and
Man Ho Au and
Junbin Fang and
Zoe L. Jiang and
Jianying Zhou Efficient Privacy-Preserving Charging
Station Reservation System for Electric
Vehicles . . . . . . . . . . . . . . . . 1040--1053
Kunpeng Bai and
Chuankun Wu An AES-Like Cipher and Its White-Box
Implementation . . . . . . . . . . . . . 1054--1065
Jiguo Li and
Meilin Teng and
Yichen Zhang and
Qihong Yu A Leakage-Resilient CCA-Secure
Identity-Based Encryption Scheme . . . . 1066--1075
Mario Diego Munoz-Hernandez and
Miguel Morales-Sandoval and
Jose Juan Garcia-Hernandez An End-to-End Security Approach for
Digital Document Management . . . . . . 1076--1090
Haibo Yi and
Shaohua Tang Very Small FPGA Processor for
Multivariate Signatures . . . . . . . . 1091--1101
Haibo Yi and
Shaohua Tang and
Ranga Vemuri Fast Inversions in Small Finite Fields
by Using Binary Trees . . . . . . . . . 1102--1112
Xiang Zhao and
Yifan Chen and
Chuan Xiao and
Yoshiharu Ishikawa and
Jiuyang Tang Frequent Subgraph Mining Based on Pregel 1113--1128
Jorge Francisco Cutigi and
Adenilso Simao and
Simone R. S. Souza Reducing FSM-Based Test Suites with
Guaranteed Fault Coverage . . . . . . . 1129--1143
Pablo Pérez-Lantero Area and Perimeter of the Convex Hull of
Stochastic Points . . . . . . . . . . . 1144--1154
Hairong Yu and
Guohui Li and
Jianjun Li and
Lihchyun Shu DO$_{\rm cyclical}$: a Latency-Resistant
Cyclic Multi-Threading Approach for
Automatic Program Parallelization . . . 1155--1173
Indra Rajasingh and
Paul Manuel and
N. Parthiban and
D. Azubha Jemilet and
R. Sundara Rajan Transmission in Butterfly Networks . . . 1174--1179
Zbyn\vek K\vrivka and
Alexander Meduna and
Petr Zemek Phrase-Structure Grammars: Normal Forms
and Reduction . . . . . . . . . . . . . 1180--1185
Robert M. Hierons and
Uraz Cengiz Türker Distinguishing Sequences for Distributed
Testing: Adaptive Distinguishing
Sequences . . . . . . . . . . . . . . . 1186--1206
Huilin Liu and
Chen Chen and
JunChang Xin and
Liyuan Zhang Searching the Informative Subgraph Based
on the PeakGraph Model . . . . . . . . . 1207--1219
Hui Cui and
Robert H. Deng Revocable and Decentralized
Attribute-Based Encryption . . . . . . . 1220--1235
Weifeng Wang and
Li Jiao Trace Abstraction Refinement for Solving
Horn Clauses . . . . . . . . . . . . . . 1236--1251
Fabrizio Luccio and
Bernard Mans and
Luke Mathieson and
Linda Pagli Complete Balancing via Rotation . . . . 1252--1263
Rolando Trujillo-Rasua and
Ismael G. Yero Characterizing $1$-Metric
Antidimensional Trees and Unicyclic
Graphs . . . . . . . . . . . . . . . . . 1264--1273
Arambam Neelima and
Kh Manglem Singh Perceptual Hash Function based on
Scale-Invariant Feature Transform and
Singular Value Decomposition . . . . . . 1275--1281
Wei Ni Minimized Error Propagation Location
Method Based on Error Estimation . . . . 1282--1288
D. Thenmozhi and
Chandrabose Aravindan Paraphrase Identification by Using
Clause-Based Similarity Features and
Machine Translation Metrics . . . . . . 1289--1302
Alok Kumar Singh Kushwaha and
Rajeev Srivastava Maritime Object Segmentation Using
Dynamic Background Modeling and Shadow
Suppression . . . . . . . . . . . . . . 1303--1329
Willian Valmorbida and
Jorge Luis Victória Barbosa and
Débora Nice Ferrari Barbosa and
Sandro José Rigo U-Library: an Intelligent Model for
Ubiquitous Library Support . . . . . . . 1330--1344
Billur Barshan and
Aras Yurtman Investigating Inter-Subject and
Inter-Activity Variations in Activity
Recognition Using Wearable Motion
Sensors . . . . . . . . . . . . . . . . 1345--1362
Konstantinos Tsakalozos and
Spiros Evangelatos and
Fotis Psallidas and
Marcos R. Vieira and
Vassilis J. Tsotras and
Alex Delis DiVA: Using Application-Specific
Policies to `Dive' into Vector
Approximations . . . . . . . . . . . . . 1363--1382
Sunita Garhwal and
Ram Jiwari Parallel Fuzzy Regular Expression and
its Conversion to Epsilon-Free Fuzzy
Automaton . . . . . . . . . . . . . . . 1383--1391
Ohoud Nafea and
Sanaa Ghouzali and
Wadood Abdul and
Emad-ul-Haq Qazi Hybrid Multi-Biometric Template
Protection Using Watermarking . . . . . 1392--1407
Yair Neuman and
Yochai Cohen A Novel Methodology for Automatically
Measuring Psychological Dimensions in
Textual Data . . . . . . . . . . . . . . 1408--1414
Nilson Donizete Guerin, Jr. and
Flavio de Barros Vidal and
Bruno Macchiavello Text-dependent User Verification of
Handwritten Words and Signatures on
Mobile Devices . . . . . . . . . . . . . 1415--1425
Ümit Ekmekçi and
Zehra Çataltepe and
Güvenç Güngör and
Demir Can Kahya EigenBots for the Okey Social Board Game 1426--1432
Pilar González-Férez and
Juan Piernas and
Toni Cortes Improving I/O Performance Through an
In-Kernel Disk Simulator . . . . . . . . 1433--1452
Lois Orosa and
Javier D. Bruguera and
Elisardo Antelo Asymmetric Allocation in a Shared
Flexible Signature Module for Multicore
Processors . . . . . . . . . . . . . . . 1453--1469
Rui Hou and
Jigang Wu and
Yawen Chen and
Haibo Zhang Note on Edge-Colored Graphs for Networks
with Homogeneous Faults . . . . . . . . 1470--1478
A. S. Kang and
Renu Vig Comparative Performance Evaluation of
Modified Prototype Filter Bank
Multicarrier Cognitive Radio Under
Constraints of $ L_p $, K, N and D . . . 1479--1491
Yung-Ting Chuang and
P. M. Melliar-Smith and
Louise E. Moser and
Isaií Michel Lombera Statistical Estimation and Dynamic
Adaptation Algorithms for the iTrust
Publication, Search and Retrieval System 1492--1510
Hongzhi Zhao and
Yuan Xue RSD Fault Block Model for Highly
Efficient Fault-Tolerant Manhattan
Routing Algorithms in $2$D Mesh . . . . 1511--1526
L. Sivagami and
J. Martin Leo Manickam Cluster-Based MAC Protocol for Collision
Avoidance and TDMA Scheduling in
Underwater Wireless Sensor Networks . . 1527--1535
Yili Gong and
Chuang Hu and
Yanyan Xu and
Wenjie Wang A Distributed File System with Variable
Sized Objects for Enhanced Random Writes 1536--1550
I. S. Akila and
R. Venkatesan A Fuzzy Based Energy-aware Clustering
Architecture for Cooperative
Communication in WSN . . . . . . . . . . 1551--1562
Xiang Hu and
Li Jiao and
Zhijia Li Modelling and Performance Analysis of
IEEE 802.11 DCF Using Coloured Petri
Nets . . . . . . . . . . . . . . . . . . 1563--1580
Magdy M. Fadel and
Ali I. El-Desoky and
Amira Y. Haikel and
Labib M. Labib A Low-Storage Precise IP Traceback
Technique Based on Packet Marking and
Logging . . . . . . . . . . . . . . . . 1581--1592
Lan Zhou and
Vijay Varadharajan and
K. Gopinath A Secure Role-Based Cloud Storage System
For Encrypted Patient-Centric Health
Records . . . . . . . . . . . . . . . . 1593--1611
Mohannad J. Alhanahnah and
Arshad Jhumka and
Sahel Alouneh A Multidimension Taxonomy of Insider
Threats in Cloud Computing . . . . . . . 1612--1622
Fatemeh Imanimehr and
Mehran S. Fallah How Powerful Are Run-Time Monitors with
Static Information? . . . . . . . . . . 1623--1636
Shi-Feng Sun and
Joseph K. Liu and
Yu Yu and
Baodong Qin and
Dawu Gu RKA-Secure Public Key Encryptions
Against Efficiently Invertible Functions 1637--1658
Yanli Ren and
Ning Ding and
Xinpeng Zhang and
Haining Lu and
Dawu Gu Identity-Based Encryption with
Verifiable Outsourced Revocation . . . . 1659--1668
Junqing Gong and
Xiaolei Dong and
Zhenfu Cao and
Jie Chen Almost-Tight Identity Based Encryption
Against Selective Opening Attack . . . . 1669--1688
Hyung Tae Lee and
San Ling and
Jae Hong Seo and
Huaxiong Wang CCA2 Attack and Modification of Huang et
al.'s Public Key Encryption with
Authorized Equality Test . . . . . . . . 1689--1694
Jiangshan Yu and
Vincent Cheval and
Mark Ryan DTKI: a New Formalized PKI with
Verifiable Trusted Parties . . . . . . . 1695--1713
Jianghong Wei and
Xinyi Huang and
Wenfen Liu and
Xuexian Hu Practical Attribute-based Signature:
Traceability and Revocability . . . . . 1714--1734
Byungho Min and
Vijay Varadharajan Rethinking Software Component Security:
Software Component Level Integrity and
Cross Verification . . . . . . . . . . . 1735--1748
Minhaj Ahmad Khan A Transformation For Optimizing
String-Matching Algorithms For Long
Patterns . . . . . . . . . . . . . . . . 1749--1759
Walayat Hussain and
Farookh Khadeer Hussain and
Omar Khadeer Hussain and
Elizabeth Chang Provider-Based Optimized Personalized
Viable SLA (OPV-SLA) Framework to
Prevent SLA Violation . . . . . . . . . 1760--1783
Mariem Mefteh and
Nadia Bouassida and
Hanêne Ben-Abdallah Mining Feature Models from Functional
Requirements . . . . . . . . . . . . . . 1784--1804
Khaled El-Fakih and
Nina Yevtushenko Test Translation for Embedded Finite
State Machine Components . . . . . . . . 1805--1816
Farah A\"\it-Salaht and
Hind Castel-Taleb and
Jean-Michel Fourneau and
Nihal Pekergin Performance Analysis of a Queue by
Combining Stochastic Bounds, Real
Traffic Traces and Histograms . . . . . 1817--1830
P. Angelini and
G. Da Lozzo SEFE = C-Planarity? . . . . . . . . . . 1831--1838
Shiying Wang and
Zhenhua Wang and
Mujiangshan Wang The $2$-Extra Connectivity and $2$-Extra
Diagnosability of Bubble-Sort Star Graph
Networks . . . . . . . . . . . . . . . . 1839--1856
Liang Bao and
Fen Zhao and
Mengqing Shen and
Yutao Qi and
Ping Chen An Orthogonal Genetic Algorithm for
QoS-Aware Service Composition . . . . . 1857--1871
Simone Brognoli and
Gianfranco Lamperti and
Michele Scandale Incremental Determinization of Expanding
Automata . . . . . . . . . . . . . . . . 1872--1899
Sandi Klav\vzar and
Paul Manuel and
M. J. Nadjafi-Arani and
R. Sundara Rajan and
Cyriac Grigorious and
Sudeep Stephen Average Distance in Interconnection
Networks via Reduction Theorems for
Vertex-Weighted Graphs . . . . . . . . . 1900--1910
Weidong Chen and
Shan Ling Node-Pancyclic Properties of Biswapped
Networks Based on Cycles in Their Factor
Networks . . . . . . . . . . . . . . . . 1--12
Shuo-I Wang and
Fu-Hsing Wang Independent Spanning Trees in
RTCC-Pyramids . . . . . . . . . . . . . 13--26
Jian Yu and
Jun Han and
Jean-Guy Schneider and
Cameron Hine and
Steve Versteeg A Petri-Net-Based Virtual Deployment
Testing Environment for Enterprise
Software Systems . . . . . . . . . . . . 27--44
Aimal Rextin and
Patrick Healy Dynamic Upward Planarity Testing of
Single Source Embedded Digraphs . . . . 45--59
J. C. Saez and
A. Pousa and
R. Rodriíguez-Rodriíguez and
F. Castro and
M. Prieto-Matias PMCTrack: Delivering Performance
Monitoring Counter Support to the OS
Scheduler . . . . . . . . . . . . . . . 60--85
Alejandro Pérez and
Pablo Sánchez On the Use of C# Partial Classes for the
Implementation of Software Product Lines 86--109
Robert M. Hierons and
Uraz Cengiz Türker Distinguishing Sequences for Distributed
Testing: Preset Distinguishing Sequences 110--125
Maryam Shoaran and
Alex Thomo Editorial: Zero-Knowledge-Private
Counting of Group Triangles in Social
Networks . . . . . . . . . . . . . . . . 126--134
Emilio Di Giacomo and
Walter Didimo and
Giuseppe Liotta and
Fabrizio Montecchiani Area-Thickness Trade-Offs for
Straight-Line Drawings of Planar Graphs 135--142
Chang-ai Sun and
Lin Pan and
Qiaoling Wang and
Huai Liu and
Xiangyu Zhang An Empirical Study on Mutation Testing
of WS-BPEL Programs . . . . . . . . . . 143--158
Yali Lv and
Cheng-Kuan Lin and
Jianxi Fan Hamiltonian Cycle and Path Embeddings in
$k$-Ary $n$-Cubes Based on Structure
Faults . . . . . . . . . . . . . . . . . 60
Cyriac Grigorious and
Sudeep Stephen and
Bharati Rajan and
Mirka Miller On the Partition Dimension of Circulant
Graphs . . . . . . . . . . . . . . . . . 60
Seyyed Amir Ali Ghafourian Ghahramani and
Ali Mohammad Afshin Hemmatyar A Graph-based Performance Analysis of
the 802.11p MAC Protocol for Safety
Communications in Highway Vehicular Ad
Hoc Networks . . . . . . . . . . . . . . 60
Keyvan RahimiZadeh and
Morteza AnaLoui and
Peyman Kabiri and
Bahman Javadi Workload-Aware Placement of Multi-Tier
Applications in Virtualized Datacenters 60
Joshua Higgins and
Violeta Holmes and
Colin Venters Autonomous Discovery and Management in
Virtual Container Clusters . . . . . . . 60
Yen-Hung Chen and
Yuan-Cheng Lai and
Ching-Neng Lai and
Yang-Chi Li A Group Bandwidth Reservation Scheme to
Enhance the Driver's Safety in Vehicles
and Transport Environment . . . . . . . 60
Tong Liu and
Yanmin Zhu and
Hongzi Zhu and
Jiadi Yu and
Yuanyuan Yang and
Fan Ye Online Pricing for Efficient Renewable
Energy Sharing in a Sustainable
Microgrid . . . . . . . . . . . . . . . 60
Sebastian Maneth and
Alexandra Poulovassilis Data Science . . . . . . . . . . . . . . 60
Yang Cao and
Wenfei Fan and
Shuai Ma Virtual Network Mapping in Cloud
Computing: a Graph Pattern Matching
Approach . . . . . . . . . . . . . . . . 60
Lena Wiese and
Tim Waage and
Ferdinand Bollwein A Replication Scheme for Multiple
Fragmentations with Overlapping
Fragments . . . . . . . . . . . . . . . 60
Andreas Weiler and
Michael Grossniklaus and
Marc H. Scholl Editorial: Survey and Experimental
Analysis of Event Detection Techniques
for Twitter . . . . . . . . . . . . . . 60
Yu Liu and
Peter McBrien Transactional and Incremental Type
Inference from Data Updates . . . . . . 60
Reem Q. Al Fayez and
Mike Joy Using Linked Data for Integrating
Educational Medical Web Databases Based
on BioMedical Ontologies . . . . . . . . 60
Eleni Tsalapati and
Giorgos Stoilos and
Alexandros Chortaras and
Giorgos Stamou and
George Koletsos Query Rewriting Under Ontology Change 60
Adnan Idris and
Asifullah Khan Churn Prediction System for Telecom
using Filter--Wrapper and Ensemble
Classification . . . . . . . . . . . . . 60
Alireza Nazemi and
Ozra Ghezelsofla A Dual Neural Network Scheme for Solving
the Assignment Problem . . . . . . . . . 60
Prabavathy Balasundaram and
Chitra Babu and
Subha Devi M Improving Read Throughput of
Deduplicated Cloud Storage using
Frequent Pattern-Based Prefetching
Technique . . . . . . . . . . . . . . . 60
Tomasz Hyla and
Jerzy Peja\'s A Hess-Like Signature Scheme Based on
Implicit and Explicit Certificates . . . 457--475
Jeremy Maitin-Shepard and
Mehdi Tibouchi and
Diego F. Aranha Elliptic Curve Multiset Hash . . . . . . 476--490
Xi-Jun Lin and
Lin Sun and
Haipeng Qu and
Xiaoshuai Zhang Editorial: On the Security of the First
Leakage-Free Certificateless
Signcryption Scheme . . . . . . . . . . 491--496
Shaoquan Jiang Bounds for Message Authentication with
Distortion . . . . . . . . . . . . . . . 497--506
Jing Liu and
Yunyun Wu and
Xuezheng Liu and
Yunchun Zhang and
Gang Xue and
Wei Zhou and
Shaowen Yao On the (In)Security of Recent Group Key
Distribution Protocols . . . . . . . . . 507--526
Kenneth Radke and
Colin Boyd Security Proofs for Protocols Involving
Humans . . . . . . . . . . . . . . . . . 527--540
Leyou Zhang and
Jingxia Zhang and
Yi Mu Novel Leakage-Resilient Attribute-Based
Encryption from Hash Proof System . . . 541--554
Emi\.n \.Islam Tatli and
Bedi\.rhan Urgun WIVET --- Benchmarking Coverage
Qualities of Web Crawlers . . . . . . . 555--572
Muhammet Yildiz and
Berrin Yaniko\uglu and
Alisher Kholmatov and
Alper Kanak and
Umut Uluda\ug and
Hakan Erdo\ugan Biometric Layering with Fingerprints:
Template Security and Privacy Through
Multi-Biometric Template Fusion . . . . 573--587
Man Ho Au and
Joseph K. Liu and
Zhenfei Zhang and
Willy Susilo and
Jin Li and
Jianying Zhou Anonymous Announcement System (AAS) for
Electric Vehicle in VANETs . . . . . . . 588--599
Yujue Wang and
HweeHwa Pang Probabilistic Public Key Encryption for
Controlled Equijoin in Relational
Databases . . . . . . . . . . . . . . . 600--612
Wentan Yi and
Shaozhen Chen and
Yuchen Li Zero-correlation Linear Cryptanalysis of
SAFER Block Cipher Family Using the
Undisturbed Bits . . . . . . . . . . . . 613--624
Xiang Xu and
Shuming Zhou and
Jinqiang Li Reliability of Complete Cubic Networks
under the Condition of $g$-Good-Neighbor 625--635
Ornela Dardha and
Daniele Gorla and
Daniele Varacca Semantic Subtyping for Objects and
Classes . . . . . . . . . . . . . . . . 636--656
Stefan Edelkamp and
Amr Elmasry and
Jyrki Katajainen Heap Construction --- 50 Years Later . . 657--674
Wang Lin and
Min Wu and
Zhengfeng Yang and
Zhenbing Zeng Verification for Non-polynomial Hybrid
Systems Using Rational Invariants . . . 675--689
Yu Yang and
Hongbo Liu and
Hua Wang and
Ansheng Deng and
Colton Magnant On Algorithms for Enumerating Subtrees
of Hexagonal and Phenylene Chains . . . 690--710
Akinori Kawachi and
Yoshio Okamoto and
Keisuke Tanaka and
Kenji Yasunaga General Constructions of Rational Secret
Sharing with Expected Constant-Round
Reconstruction . . . . . . . . . . . . . 711--728
Wiktor B. Daszczuk Communication and Resource Deadlock
Analysis Using IMDS Formalism and Model
Checking . . . . . . . . . . . . . . . . 729--750
Cheng Zhou and
Zhonghai Yin and
Youqian Feng Events Algebra of Triggers . . . . . . . 751--760
Seungbum Jo and
Stelios Joannou and
Daisuke Okanohara and
Rajeev Raman and
Srinivasa Rao Satti Compressed Bit vectors Based on
Variable-to-Fixed Encodings . . . . . . 761--775
Wei Wu and
Jiguang Wan and
Ling Zhan and
Jibin Wang and
Changsheng Xie DROP: a New RAID Architecture for
Enhancing Shared RAID Performance . . . 777--790
Qiufen Xia and
Weifa Liang and
Zichuan Xu Data Locality-Aware Big Data Query
Evaluation in Distributed Clouds . . . . 791--809
Xiaoyin Li and
Lianshan Yan and
Wei Pan and
Bin Luo Secure and Robust DV-Hop Localization
Based on the Vector Refinement Feedback
Method for Wireless Sensor Networks . . 810--821
Meng-Shu Chiang and
Chung-Ming Huang and
Duy-Tuan Dao and
Binh-Chau Pham GB-PMIPv6: a Group-Based Handover
Control Scheme for PMIPv6 Using the
`Hitch on' Concept . . . . . . . . . . . 822--834
Ramzi Saifan and
Iyad Jafar and
Ghazi Al Sukkar Optimized Cooperative Spectrum Sensing
Algorithms in Cognitive Radio Networks 835--849
Jia Peng and
Yanmin Zhu and
Qingwen Zhao and
Hongzi Zhu and
Jian Cao and
Guangtao Xue and
Bo Li Fair Energy-Efficient Sensing Task
Allocation in Participatory Sensing with
Smartphones . . . . . . . . . . . . . . 850--865
Parisa Jalili Marandi and
Marco Primi and
Nicolas Schiper and
Fernando Pedone Ring Paxos: High-Throughput Atomic
Broadcast . . . . . . . . . . . . . . . 866--882
Ihsan Mert Ozcelik and
Ibrahim Korpeoglu and
Ashok Agrawala Energy Efficient IP-Connectivity with
IEEE 802.11 for Home M2M Networks . . . 883--897
Chen Ying and
Hao Huang and
Ajay Gopinathan and
Zongpeng Li A Prior-Free Spectrum Auction for
Approximate Revenue Maximization . . . . 898--910
Fan Zhang and
Tao Jing and
Yan Huo and
Kaiwei Jiang Throughput Optimization for Energy
Harvesting Cognitive Radio Networks with
Save-Then-Transmit Protocol . . . . . . 911--924
Li Chunlin and
Zhou Min and
Luo Youlong Efficient Load-Balancing Aware Cloud
Resource Scheduling for Mobile User . . 925--939
Susan Lomax and
Sunil Vadera A Cost-Sensitive Decision Tree Learning
Algorithm Based on a Multi-Armed Bandit
Framework . . . . . . . . . . . . . . . 941--956
Lin Zheng and
Fuxi Zhu and
Alshahrani Mohammed Attribute and Global Boosting: a Rating
Prediction Method in Context-Aware
Recommendation . . . . . . . . . . . . . 957--968
Salma Ben Jemaa and
Mohamed Hammami and
Hanene Ben-Abdallah Finger Surfaces Recognition Using Rank
Level Fusion . . . . . . . . . . . . . . 969--985
S. Thayammal and
D. Selvathi Edge Preserved Multispectral Image
Compression Using Extended Shearlet
Transform . . . . . . . . . . . . . . . 986--994
Karam Abdulahhad and
Jean-Pierre Chevallet and
Catherine Berrut Logics, Lattices and Probability: The
Missing Links to Information Retrieval 995--1018
Long Chen and
Joemon M. Jose and
Haitao Yu and
Fajie Yuan A Hybrid Approach for Question Retrieval
in Community Question Answerin . . . . . 1019--1031
Zhiping Peng and
Bo Xu and
Antonio Marcel Gates and
Delong Cui and
Weiwei Lin A Study of a Multi-Agent Organizational
Framework with Virtual Machine Clusters
as the Unit of Granularity in Cloud
Computing . . . . . . . . . . . . . . . 1032--1043
Joshua Goncalves and
Aneesh Krishna Incorporating Change Management Within
Dynamic Requirements-Based Model-Driven
Agent Development . . . . . . . . . . . 1044--1077
Jianbin Huang and
Yu Zhou and
Xiaolin Jia and
Heli Sun A Novel Social Event Organization
Approach for Diverse User Choices . . . 1078--1095
Angelo Furfaro and
Maria Carmela Groccia and
Simona E. Rombo $2$D Motif Basis Applied to the
Classification of Digital Images . . . . 1096--1109
Shuling Wang and
Flemming Nielson and
Hanne Riis Nielson and
Naijun Zhan Modelling and Verifying Communication
Failure of Hybrid Systems in HCSP . . . 1111--1130
Hailong Zhang and
Yongbin Zhou Mahalanobis Distance Similarity Measure
Based Higher Order Optimal Distinguisher 1131--1144
Zheng Yang and
Junyu Lai and
Chao Liu and
Wanping Liu and
Shuangqing Li Simpler Generic Constructions for
Strongly Secure One-round Key Exchange
from Weaker Assumptions . . . . . . . . 1145--1160
Yanwei Zhou and
Bo Yang Continuous Leakage-Resilient Public-Key
Encryption Scheme with CCA Security . . 1161--1172
Guglielmo Cola and
Marco Avvenuti and
Alessio Vecchio Real-Time Identification Using Gait
Pattern Analysis on a Standalone
Wearable Accelerometer . . . . . . . . . 1173--1186
Huifang Yu and
Bo Yang Pairing-Free and Secure Certificateless
Signcryption Scheme . . . . . . . . . . 1187--1196
Haibo Yi and
Weijian Li On the Importance of Checking
Multivariate Public Key Cryptography for
Side-Channel Attacks: The Case of enTTS
Scheme . . . . . . . . . . . . . . . . . 1197--1209
Junwei Zhou and
Hui Duan and
Kaitai Liang and
Qiao Yan and
Fei Chen and
F. Richard Yu and
Jieming Wu and
Jianyong Chen Securing Outsourced Data in the
Multi-Authority Cloud with Fine-Grained
Access Control and Efficient Attribute
Revocation . . . . . . . . . . . . . . . 1210--1222
Shabnam Seradji and
Mehran S. Fallah A Bayesian Game of Whitewashing in
Reputation Systems . . . . . . . . . . . 1223--1237
Gamze Tillem and
Erkay Sava\cs and
Kamer Kaya A New Method for Computational Private
Information Retrieval . . . . . . . . . 1238--1250
Yang Liu and
Andrew Simpson AdSelector: a Privacy-Preserving
Advertisement Selection Mechanism for
Mobile Devices . . . . . . . . . . . . . 1251--1270
Sergio L. S. Mergen and
Viviane P. Moreira DuelMerge: Merging with Fewer Moves . . 1271--1278
Gregorio Hernández and
Mafalda Martins Remote Monitoring by Edges and Faces of
Maximal Outerplanar Graphs . . . . . . . 1279--1288
Wei Gao and
Mohammad Reza Farahani Generalization Bounds and Uniform Bounds
for Multi-Dividing Ontology Algorithms
with Convex Ontology Loss Function . . . 1289--1299
Jose Quiroga and
Francisco Ortin SSA Transformations to Facilitate Type
Inference in Dynamically Typed Code . . 1300--1315
Fahimeh Ramezani and
Jie Lu and
Javid Taheri and
Albert Y. Zomaya A Multi-Objective Load Balancing System
for Cloud Environments . . . . . . . . . 1316--1337
Hu He and
Xu Yang and
Yanjun Zhang On Improving Performance and Energy
Efficiency for Register-File Connected
Clustered VLIW Architectures for
Embedded System Usage . . . . . . . . . 1338--1352
Chuanli Zhao and
Chou-Jung Hsu and
Win-Chin Lin and
Wen-Hsiang Wu and
Chin-Chia Wu An Investigation of Single-Machine
Due-Window Assignment with
Time-Dependent Processing Times and a
Controllable Rate-Modifying Activity . . 1353--1362
Lucas Bueno Ruas Oliveira and
Elena Leroux and
Katia Romero Felizardo and
Flavio Oquendo and
Elisa Yumi Nakagawa ArchSORS: a Software Process for
Designing Software Architectures of
Service-Oriented Robotic Systems . . . . 1363--1381
Jianbin Huang and
Xiaojing Sun and
Yu Zhou and
Heli Sun A Team Formation Model with Personnel
Work Hours and Project Workload
Quantified . . . . . . . . . . . . . . . 1382--1394
Nieves R. Brisaboa and
Guillermo de Bernardo and
Gilberto Gutiérrez and
Miguel R. Luaces and
José R. Paramá Efficiently Querying Vector and Raster
Data . . . . . . . . . . . . . . . . . . 1395--1413
Anonymous Special Issue on Software-Defined
Wireless Networks . . . . . . . . . . . 1415--1416
Xiao Liu and
Anfeng Liu and
Qingyong Deng and
Haolin Liu Large-Scale Programming Code
Dissemination for Software-Defined
Wireless Networks . . . . . . . . . . . 1417--1442
Yaser Jararweh and
Mohammad Alsmirat and
Mahmoud Al-Ayyoub and
Elhadj Benkhelifa and
Ala' Darabseh and
Brij Gupta and
Ahmad Doulat Software-Defined System Support for
Enabling Ubiquitous Mobile Edge
Computing . . . . . . . . . . . . . . . 1443--1457
Ramon dos Reis Fontes and
Mohamed Mahfoudi and
Walid Dabbous and
Thierry Turletti and
Christian Rothenberg How Far Can We Go? Towards Realistic
Software-Defined Wireless Networking
Experiments . . . . . . . . . . . . . . 1458--1471
Shichao Li and
Gang Zhu and
Siyu Lin and
Chao Shen and
Qian Gao and
Weiliang Xie and
Xiaoyu Qiao Ultra Dense Cells Management and
Resource Allocation in Green
Software-Defined Wireless Networks . . . 1472--1481
Seyed Hamed Rastegar and
Aliazam Abbasfar and
Vahid Shah-Mansouri Latency-Aware Sum-Rate Maximization for
5G Software-Defined Radio Access
Networks . . . . . . . . . . . . . . . . 1482--1497
Tao Song and
Yuchen Liu and
Yiding Wang and
Ruhui Ma and
Alei Liang and
Zhengwei Qi and
Haibing Guan Ashman: a Bandwidth Fragmentation-Based
Dynamic Flow Scheduling for Data Center
Networks . . . . . . . . . . . . . . . . 1498--1509
Ahmed Abdelaziz and
Ang Tan Fong and
Abdullah Gani and
Suleman Khan and
Faiz Alotaibi and
Muhammad Khurram Khan On Software-Defined Wireless Network
(SDWN) Network Virtualization:
Challenges and Open Issues . . . . . . . 1510--1519
Michael Rademacher and
Karl Jonas and
Florian Siebertz and
Adam Rzyska and
Moritz Schlebusch and
Markus Kessel Software-Defined Wireless Mesh
Networking: Current Status and
Challenges . . . . . . . . . . . . . . . 1520--1535
Shaohua Wan and
Yin Zhang Coverage Hole Bypassing in Wireless
Sensor Networks . . . . . . . . . . . . 1536--1544
Jianbin Huang and
Ze Lv and
Yu Zhou and
He Li and
Heli Sun and
others Forming Grouped Teams with Efficient
Collaboration in Social Networks . . . . 1545--1560
Saurav Acharya and
Byung Suk Lee and
Paul Hines Causal Prediction of Top-$k$ Event Types
Over Real-Time Event Streams . . . . . . 1561--1581
Lein Harn and
Ching-Fang Hsu A Practical Hybrid Group Key
Establishment for Secure Group
Communications . . . . . . . . . . . . . 1582--1589
Emna Fendri and
Mayssa Frikha and
Mohamed Hammami Adaptive Person Re-identification Based
on Visible Salient Body Parts in Large
Camera Network . . . . . . . . . . . . . 1590--1608
Hai-Xia Xu and
Wei Zhou and
Yao-Nan Wang and
Wei Wang and
Yan Mo Matrix Separation Based on LMaFit-Seed 1609--1618
Tung Doan Nguyen and
Quan Bai Enhance Trust Management in Composite
Services with Indirect Ratings . . . . . 1619--1632
Shervan Fekri-Ershad and
Farshad Tajeripour Impulse-Noise Resistant Color-Texture
Classification Approach Using Hybrid
Color Local Binary Patterns and
Kullback--Leibler Divergence . . . . . . 1633--1648
H. M. W. Verbeek and
W. M. P. van der Aalst and
J. Munoz-Gama Divide and Conquer: a Tool Framework for
Supporting Decomposed Discovery in
Process Mining . . . . . . . . . . . . . 1649--1674
Ming-Hung Wang and
Alex Chuan-Hsien Chang and
Kuan-Ta Chen and
Chin-Laung Lei Estimating Ideological Scores of
Facebook Pages: an Empirical Study in
Taiwan . . . . . . . . . . . . . . . . . 1675--1686
XiaoHong Han and
Yan Qiang and
Yuan Lan A Bird Flock Gravitational Search
Algorithm Based on the Collective
Response of Birds . . . . . . . . . . . 1687--1716
Lidia Fotia and
Fabrizio Messina and
Domenico Rosaci and
Giuseppe M. L. Sarné Using Local Trust for Forming Cohesive
Social Structures in Virtual Communities 1717--1727
Yang Lu and
Jiguo Li and
Jian Shen Weakness and Improvement of a
Certificate-Based Key-Insulated
Signature in the Standard Model . . . . 1729--1744
El-Sayed M. El-Alfy Detection of Phishing Websites Based on
Probabilistic Neural Networks and
$K$-Medoids Clustering . . . . . . . . . 1745--1759
Abderrahim Ait Wakrime Satisfiability-Based Privacy-Aware Cloud
Computing . . . . . . . . . . . . . . . 1760--1769
Jayashree Pougajendy and
Arun Raj Kumar Parthiban Detection of SIP-Based Denial of Service
Attack Using Dual Cost Formulation of
Support Vector Machine . . . . . . . . . 1770--1784
Ying Wu and
Jinyong Chang and
Rui Xue and
Rui Zhang Homomorphic MAC from Algebraic One-Way
Functions for Network Coding with Small
Key Size . . . . . . . . . . . . . . . . 1785--1800
Damien Vergnaud Comment on `Attribute-Based Signatures
for Supporting Anonymous Certification'
by N. Kaaniche and M. Laurent (ESORICS
2016) . . . . . . . . . . . . . . . . . 1801--1808
Jianchang Lai and
Yi Mu and
Fuchun Guo and
Rongmao Chen Fully Privacy-Preserving ID-Based
Broadcast Encryption with Authorization 1809--1821
Sha Ma Authorized Equi-join for Multiple Data
Contributors in the PKC-Based Setting 1822--1838
Howard M. Heys Statistical Cipher Feedback of Stream
Ciphers . . . . . . . . . . . . . . . . 1839--1851
Xiaofang Xia and
Wei Liang and
Yang Xiao and
Meng Zheng Difference-Comparison-based Malicious
Meter Inspection in Neighborhood Area
Networks in Smart Grid . . . . . . . . . 1852--1870
Weiran Liu and
Xiao Liu and
Jianwei Liu and
Qianhong Wu Auditing Revocable Privacy-Preserving
Access Control for EHRs in Clouds . . . 1871--1888
Xavier Bonnaire and
Rudyar Cortés and
Fabrice Kordon and
Olivier Marin ASCENT: a Provably Terminating
Decentralized Logging Service . . . . . 1889--1911
Dario Fiore and
María Isabel González Vasco and
Claudio Soriente Partitioned Group Password-Based
Authenticated Key Exchange . . . . . . . 1912--1922
Xin-ju Zhang Multi-state System Reliability Analysis
Based on Fuzzy Colored Petri Nets . . . 1--13
Chin-Chia Wu and
Shang-Chia Liu and
Chuanli Zhao and
Sheng-Zhi Wang and
Win-Chin Lin A Multi-Machine Order Scheduling with
Learning Using the Genetic Algorithm and
Particle Swarm Optimization . . . . . . 14--31
Jurairat Phuttharak and
Seng W. Loke LogicCrowd: Crowd-Powered Logic
Programming Based Mobile Applications 32--46
Ji-Bo Wang and
Lin Li Machine Scheduling with Deteriorating
Jobs and Modifying Maintenance
Activities . . . . . . . . . . . . . . . 47--53
Hon-Chan Chen and
Tzu-Liang Kung and
Lih-Hsing Hsu An Augmented Pancyclicity Problem of
Crossed Cubes . . . . . . . . . . . . . 54--62
Nidhi Kalra and
Ajay Kumar Deterministic Deep Pushdown Transducer
and its Parallel Version . . . . . . . . 63--73
J. C. Saez and
A. Pousa and
A. E. de Giusti and
M. Prieto-Matias On the Interplay Between Throughput,
Fairness and Energy Efficiency on
Asymmetric Multicore Processors . . . . 74--94
Nisha Chaurasia and
Shashikala Tapaswi and
Joydip Dhar A Resource Efficient Expectation
Maximization Clustering Approach for
Cloud . . . . . . . . . . . . . . . . . 95--104
Zhenyou Wang and
Cuntao Xiao and
Xianwei Lin and
Yuan-Yuan Lu Single Machine Total Absolute
Differences Penalties Minimization
Scheduling with a Deteriorating and
Resource-Dependent Maintenance Activity 105--110
Wojciech Mu\la and
Nathan Kurz and
Daniel Lemire Faster Population Counts Using AVX2
Instructions . . . . . . . . . . . . . . 111--120
Jou-Ming Chang and
Jinn-Shyong Yang and
Shyue-Ming Tang and
Kung-Jui Pai The Wide Diameters of Regular
Hyper-Stars and Folded Hyper-Stars . . . 121--128
Xiaoyan Li and
Jianxi Fan and
Cheng-Kuan Lin and
Xiaohua Jia Diagnosability Evaluation of the Data
Center Network DCell . . . . . . . . . . 129--143
Xiaodong Meng and
Minyi Guo and
Jingyu Zhang An Efficient Graph Query Framework with
Structural Recursion . . . . . . . . . . 144--157
Jianbin Huang and
Xiaojing Sun and
Yu Zhou and
Heli Sun Corrigendum: A Team Formation Model with
Personnel Work Hours and Project
Workload Quantified . . . . . . . . . . 158--158
Saurabh K. Pandey and
Mukesh A. Zaveri Quasi Random Deployment and Localization
in Layered Framework for the Internet of
Things . . . . . . . . . . . . . . . . . 159--179
Xiaolin Chang and
Tianju Wang and
Ricardo J. Rodríguez and
Zhenjiang Zhang Modeling and Analysis of High
Availability Techniques in a Virtualized
System . . . . . . . . . . . . . . . . . 180--198
Natarajan Meghanathan Complex Network Analysis-Based Graph
Theoretic Metrics to Determine Stable
Data Gathering Trees for Mobile Sensor
Networks . . . . . . . . . . . . . . . . 199--222
I Karthiga and
Sharmila Sankar Providing Secret Authentication in
Clustered Security Architecture for
Cloud-Based WBAN . . . . . . . . . . . . 223--232
Tahani H. Hussain and
Paulvanna N. Marimuthu and
Sami J. Habib Exploration of Storage Architectures for
Enterprise Network . . . . . . . . . . . 233--247
S. Sarathambekai and
K. Umamaheswari Multi-Objective Optimization Techniques
for Task Scheduling Problem in
Distributed Systems . . . . . . . . . . 248--263
Bang Chul Jung and
Jae Sook Yoo and
Woongsup Lee A Practical Physical-Layer Network
Coding with Spatial Modulation in
Two-Way Relay Networks . . . . . . . . . 264--272
Jigang Wu and
Long Chen and
Xu Wang and
Guiyuan Jiang and
Siew-kei Lam and
Thambipillai Srikanthan Algorithms for Replica Placement and
Update in Tree Network . . . . . . . . . 273--287
Lin Lyu and
Shengli Liu and
Shuai Han Public-Key Encryption with Tight
Simulation-Based Selective-Opening
Security . . . . . . . . . . . . . . . . 288--318
Mona Taghavi and
Jamal Bentahar and
Kaveh Bakhtiyari and
Chihab Hanachi New Insights Towards Developing
Recommender Systems . . . . . . . . . . 319--348
Iqbal H. Sarker and
Alan Colman and
Muhammad Ashad Kabir and
Jun Han Individualized Time-Series Segmentation
for Mining Mobile Phone User Behavior 349--368
Prashant Srivastava and
Ashish Khare Content-Based Image Retrieval using
Local Binary Curvelet Co-occurrence
Pattern --- A Multiresolution Technique 369--385
Vasilis Kolias and
Ioannis Anagnostopoulos and
Sherali Zeadally Structural analysis and classification
of search interfaces for the deep web 386--398
Jeremy Barnett and
Philip Treleaven Algorithmic Dispute Resolution --- The
Automation of Professional Dispute
Resolution Using AI and Blockchain
Technologies . . . . . . . . . . . . . . 399--408
Zhou Shao and
Muhammad Aamir Cheema and
David Taniar Trip Planning Queries in Indoor Venues 409--426
Chitra M. Subramanian and
Aneesh Krishna and
Arshinder Kaur Game Theory-Based Requirements Analysis
in the $ i^* $ Framework . . . . . . . . 427--446
Meng-Jia Zhang and
Kang Zhang and
Jie Li and
Yi-Na Li Visual Exploration of $3$D Geospatial
Networks in a Virtual Reality
Environment . . . . . . . . . . . . . . 447--458
Hazem Hiary and
Rawan Zaghloul and
Moh'd Belal Al-Zoubi Single-Image Shadow Detection using
Quaternion Cues . . . . . . . . . . . . 459--468
Jianhong Zhang and
Jian Mao On the Security of a Pairing-Free
Certificateless Signcryption Scheme . . 469--471
Emma Osborn and
Andrew Simpson Risk and the Small-Scale Cyber Security
Decision Making Dialogue --- a UK Case
Study . . . . . . . . . . . . . . . . . 472--495
Haiqin Wu and
Liangmin Wang and
Shunrong Jiang Secure Top-$k$ Preference Query for
Location-based Services in
Crowd-outsourcing Environments . . . . . 496--511
Tran Viet Xuan Phuong and
Guomin Yang and
Willy Susilo Criteria-Based Encryption . . . . . . . 512--525
Yanping Shen and
Kangfeng Zheng and
Chunhua Wu and
Mingwu Zhang and
Xinxin Niu and
Yixian Yang An Ensemble Method based on Selection
Using Bat Algorithm for Intrusion
Detection . . . . . . . . . . . . . . . 526--538
Xi-Jun Lin and
Lin Sun and
Haipeng Qu and
Dongxiao Liu Cryptanalysis of A Pairing-Free
Certificateless Signcryption Scheme . . 539--544
Siyuan Chen and
Peng Zeng and
Kim-Kwang Raymond Choo and
Xiaolei Dong Efficient Ring Signature and Group
Signature Schemes Based on $q$-ary
Identification Protocols . . . . . . . . 545--560
Qiqi Lai and
Bo Yang and
Yong Yu and
Yuan Chen and
Jian Bai Novel Smooth Hash Proof Systems Based on
Lattices . . . . . . . . . . . . . . . . 561--574
Husen Wang and
Qiang Tang Efficient Homomorphic Integer Polynomial
Evaluation Based on GSW FHE . . . . . . 575--585
Yanwei Zhou and
Bo Yang and
Yi Mu Continuous Leakage-Resilient
Identity-Based Encryption without Random
Oracles . . . . . . . . . . . . . . . . 586--600
Kamalkumar R. Macwan and
Sankita J. Patel $k$-NMF Anonymization in Social Network
Data Publishing . . . . . . . . . . . . 601--613
Kaushal A. Shah and
Devesh C. Jinwala Privacy Preserving, Verifiable and
Resilient Data Aggregation in Grid-Based
Networks . . . . . . . . . . . . . . . . 614--628
Shuanglong Kan and
Zhiqiu Huang Partial Order Reduction for the full
Class of State/Event Linear Temporal
Logic . . . . . . . . . . . . . . . . . 629--644
Lalit Mohan Goyal and
M. M. Sufyan Beg and
Tanvir Ahmad An Efficient Framework for Mining
Association Rules in the Distributed
Databases . . . . . . . . . . . . . . . 645--657
Liangze Yin and
Wei Dong and
Fei He and
Ji Wang A True-Concurrency Encoding for BMC of
Compositional Systems . . . . . . . . . 658--671
Mei-Mei Gu and
Rong-Xia Hao and
Yan-Quan Feng and
Ai-Mei Yu The $3$-extra Connectivity and Faulty
Diagnosability . . . . . . . . . . . . . 672--686
Edans F. O. Sandes and
George L. M. Teodoro and
Maria Emilia M. T. Walter and
Xavier Martorell and
Eduard Ayguade and
Alba C. M. A. Melo Formalization of Block Pruning: Reducing
the Number of Cells Computed in Exact
Biological Sequence Comparison
Algorithms . . . . . . . . . . . . . . . 687--713
Liqiong Xu and
Shuming Zhou and
Guanqin Lian and
Zuwen Luo A Kind of Conditional Connectivity of
Cayley Graphs Generated by $2$-trees . . 714--721
Mosong Zhou and
Xiaoshe Dong and
Heng Chen and
Xingjun Zhang A Runtime Available Resource Capacity
Evaluation Model Based on the Concept of
Similar Tasks . . . . . . . . . . . . . 722--744
Yi Qi and
Huan Li and
Zhongzhi Zhang Extended Corona Product as an Exactly
Tractable Model for Weighted
Heterogeneous Networks . . . . . . . . . 745--760
Shiying Wang and
Guozhen Zhang and
Kai Feng Edge Fault Tolerance of Cartesian
Product Graphs on Super Restricted Edge
Connectivity . . . . . . . . . . . . . . 761--772
Andrea Farruggia and
Travis Gagie and
Gonzalo Navarro and
Simon J. Puglisi and
Jouni Sirén Relative Suffix Trees . . . . . . . . . 773--788
Dan Feng and
Ma Yajie and
Zhou Fengxing and
Wang Xiaomao and
He Kai A Safety Message Broadcast Strategy in
Hybrid Vehicular Network Environment . . 789--797
Tua A. Tamba On Handelman's Representation of Network
Utility Maximization . . . . . . . . . . 798--807
Giuseppe Lettieri and
Vincenzo Maffione and
Luigi Rizzo A Study of I/O Performance of Virtual
Machines . . . . . . . . . . . . . . . . 808--831
Atul Tripathi and
Isha Pathak and
Deo Prakash Vidyarthi Energy Efficient VM Placement for
Effective Resource Utilization using
Modified Binary PSO . . . . . . . . . . 832--846
Jyotshana Kanti and
Geetam Singh Tomar Solution of sensing failure problem: an
improved two-stage detector . . . . . . 847--855
R. Rodríguez-Rodríguez and
J. Díaz and
F. Castro and
P. Ibáñez and
D. Chaver and
V. Viñals and
J. C. Saez and
M. Prieto-Matias and
L. Piñuel and
T. Monreal and
J. M. Llabería Reuse Detector: Improving the Management
of STT-RAM SLLCs . . . . . . . . . . . . 856--880
Nileshkumar R. Patel and
Shishir Kumar Energy-Efficient Approach for Effective
Estimation of Delimited Node Position
with Limited References . . . . . . . . 881--895
Ping Xie and
Jianzhong Huang and
Xiao Qin and
Changsheng Xie SmartRec: Fast Recovery from Single
Failures in Heterogeneous RAID-Coded
Storage Systems . . . . . . . . . . . . 896--911
Francisco José Esteban and
David Díaz and
Pilar Hernández and
Juan Antonio Caballero and
Gabriel Dorado and
Sergio Gálvez MC64-Cluster: Many-Core CPU Cluster
Architecture and Performance Analysis in
B-Tree Searches . . . . . . . . . . . . 912--925
Thompson Stephan and
K. Suresh Joseph Particle Swarm Optimization-Based Energy
Efficient Channel Assignment Technique
for Clustered Cognitive Radio Sensor
Networks . . . . . . . . . . . . . . . . 926--936
Tong Liu and
Yanmin Zhu and
Ting Wen and
Jiadi Yu Location Privacy-Preserving Method for
Auction-Based Incentive Mechanisms in
Mobile Crowd Sensing . . . . . . . . . . 937--948
Chao Tong and
Xiang Yin and
Jun Li and
Tongyu Zhu and
Renli Lv and
Liang Sun and
Joel J. P. C. Rodrigues A shilling attack detector based on
convolutional neural network for
collaborative recommender system in
social aware network . . . . . . . . . . 949--958
Jieren Cheng and
Jinghe Zhou and
Qiang Liu and
Xiangyan Tang and
Yanxiang Guo A DDoS Detection Method for Socially
Aware Networking Based on Forecasting
Fusion Feature Sequence . . . . . . . . 959--970
Noor Ullah and
Xiangjie Kong and
Liangtian Wan and
Honglong Chen and
Zhibo Wang and
Feng Xia A Social Utility-Based Dissemination
Scheme for Emergency Warning Messages in
Vehicular Social Networks . . . . . . . 971--986
Jiaqi Wang and
Yunyao Lu and
Xiaojie Wang and
Jing Dong and
Xiping Hu SAR: a Social-Aware Route Recommendation
System for Intelligent Transportation 987--997
Mostafa Haghir Chehreghani and
Albert Bifet and
Talel Abdessalem Discriminative Distance-Based Network
Indices with Application to Link
Prediction . . . . . . . . . . . . . . . 998--1014
Xiaogang Fu and
Jianyong Sun Reference-Inspired Many-Objective
Evolutionary Algorithm Based on
Decomposition . . . . . . . . . . . . . 1015--1037
Alexey Stakhov Mission-Critical Systems, Paradox of
Hamming Code, Row Hammer Effect, `Trojan
Horse' of the Binary System and Numeral
Systems with Irrational Bases . . . . . 1038--1063
Yonghong Hou and
Lin Xue and
Shuo Li and
Jiaming Xing User-Experience-Oriented Fuzzy Logic
Controller for Adaptive Streaming . . . 1064--1074
Wassim Derguech and
Sami Bhiri and
Edward Curry Using Ontologies for Business Capability
modelling: Describing What Services and
Processes Achieve . . . . . . . . . . . 1075--1098
C. Harriet Linda and
G. Wiselin Jiji Hierarchical Approach to Detect
Fractures in CT DICOM Images . . . . . . 1099--1108
Khalifa Toumi and
Mohamed Aouadi and
Ana R. Cavalli and
Wissam Mallouli and
Jordi Puiggal Allepuz and
Pol Valletb Montfort A Framework for Testing and Monitoring
Security Policies: Application to an
Electronic Voting System . . . . . . . . 1109--1122
Rong Wang and
Yan Zhu and
Tung-Shou Chen and
Chin-Chen Chang An Authentication Method Based on the
Turtle Shell Algorithm for
Privacy-Preserving Data Mining . . . . . 1123--1132
Haijiang Wang and
Xiaolei Dong and
Zhenfu Cao and
Dongmei Li Secure and Efficient Attribute-Based
Encryption with Keyword Search . . . . . 1133--1142
Gunikhan Sonowal and
K. S. Kuppusamy SmiDCA: an Anti-Smishing Model with
Machine Learning Approach . . . . . . . 1143--1157
Rongjia Li and
Chenhui Jin Meet-in-the-Middle Attacks on
Reduced-Round QARMA-64/128 . . . . . . . 1158--1165
Xiaojuan Zhang and
Xiutao Feng and
Dongdai Lin Fault Attack on ACORN v3 . . . . . . . . 1166--1179
Amir Daneshgar and
Fahimeh Mohebbipoor A Secure Self-Synchronized Stream Cipher 1180--1201
Baoguo Yuan and
Junfeng Wang and
Zhiyang Fang and
Li Qi A New Software Birthmark based on Weight
Sequences of Dynamic Control Flow Graph
for Plagiarism Detection . . . . . . . . 1202--1215
Jianye Huang and
Qiong Huang and
Willy Susilo Leakage-Resilient Dual-Form Signatures 1216--1227
Dianyan Xiao and
Yang Yu Klepto for Ring-LWE Encryption . . . . . 1228--1239
Jianchang Lai and
Yi Mu and
Fuchun Guo and
Peng Jiang and
Sha Ma Identity-Based Broadcast Encryption for
Inner Products . . . . . . . . . . . . . 1240--1251
Ya Liu and
Anren Yang and
Bo Dai and
Wei Li and
Zhiqiang Liu and
Dawu Gu and
Zhiqiang Zeng Improved Meet-in-the Middle Attacks on
Reduced-Round TWINE-128 . . . . . . . . 1252--1258
Baodong Qin and
Qinglan Zhao and
Dong Zheng Bounded Revocable and Outsourceable ABE
for Secure Data Sharing . . . . . . . . 1259--1268
Bei-yang Zhang and
Xie-dong Zhang and
Zhi-hua Zhang Nested-Stacking Genetic Algorithm for
the Optimal Placement of Sensors in
Bridge . . . . . . . . . . . . . . . . . 1269--1283
Jialei Liu and
Shangguang Wang and
Ao Zhou and
Xiang Xu and
Sathish A. P. Kumar and
Fangchun Yang Towards Bandwidth Guaranteed Virtual
Cluster Reallocation in the Cloud . . . 1284--1295
Zhi Chen and
Xiaolin Chang and
Zhen Han and
Lin Li Survivability Modeling and Analysis of
Cloud Service in Distributed Data
Centers . . . . . . . . . . . . . . . . 1296--1305
Walayat Hussain and
Farookh Khadeer Hussain and
Omar Hussain and
Ravindra Bagia and
Elizabeth Chang Risk-based framework for SLA violation
abatement from the cloud service
provider's perspective . . . . . . . . . 1306--1322
Jian Jin and
Ping Ji Scheduling jobs with resource-dependent
ready times and processing times
depending on their starting times and
positions . . . . . . . . . . . . . . . 1323--1328
Ji-Bo Wang and
Xin-Na Geng and
Lu Liu and
Jian-Jun Wang and
Yuan-Yuan Lu Single Machine CON/SLK Due Date
Assignment Scheduling with Controllable
Processing Time and Job-dependent
Learning Effects . . . . . . . . . . . . 1329--1337
Shufeng Kong and
Sanjiang Li and
Michael Sioutis Exploring Directional Path-Consistency
for Solving Constraint Networks . . . . 1338--1350
Simone Faro and
Arianna Pavone An Efficient Skip-Search Approach to
Swap Matching . . . . . . . . . . . . . 1351--1360
Nurul Liyana Mohamad Zulkufli and
Sherzod Turaev and
Mohd Izzuddin Mohd Tamrin and
Azeddine Messikh Watson--Crick Context-Free Grammars:
Grammar Simplifications and a Parsing
Algorithm . . . . . . . . . . . . . . . 1361--1373
Andrea Pinna and
Roberto Tonelli and
Matteo Orrú and
Michele Marchesi A Petri Nets Model for Blockchain
Analysis . . . . . . . . . . . . . . . . 1374--1388
Samuel Tweneboah-Koduah and
William J. Buchanan Security Risk Assessment of Critical
Infrastructure Systems: a Comparative
Study . . . . . . . . . . . . . . . . . 1389--1406
Pedro Álvarez and
Sergio Hernández and
Javier Fabra and
Joaquín Ezpeleta Cost-driven provisioning and execution
of a computing-intensive service on the
Amazon EC2 . . . . . . . . . . . . . . . 1407--1421
Ji-Bo Wang and
Lu Liu and
Jian-Jun Wang and
Lin Li Makespan minimization scheduling with
ready times, group technology and
shortening job processing times . . . . 1422--1428
Leonildo J. M. de Azevedo and
Júlio C. Estrella and
Luis H. V. Nakamura and
Marcos J. Santana and
Regina H. C. Santana and
Cláudio F. Motta Toledo and
Bruno G. Batista and
Stephan Reiff-Marganiec Optimized Service Level Agreement
Establishment in Cloud Computing . . . . 1429--1442
Zhenni Feng and
Yanmin Zhu and
Hui Cai and
Pingyi Luo Optimal Distributed Auction for Mobile
Crowd Sensing . . . . . . . . . . . . . 1443--1459
Yunus Ozen and
Cuneyt Bayilmis urgMAC: a New Traffic and QoS-aware
Cross-Layer MAC protocol for Wireless
Multimedia Sensor Networks . . . . . . . 1460--1467
Soumya Das and
Tamaghna Acharya Faulty Node Detection in HMM-Based
Cooperative Spectrum Sensing For
Cognitive Radio Networks . . . . . . . . 1468--1478
Reza Entezari-Maleki and
Kishor S. Trivedi and
Leonel Sousa and
Ali Movaghar Performability-Based Workflow Scheduling
in Grids . . . . . . . . . . . . . . . . 1479--1495
Maroua Meddeb and
Amine Dhraief and
Abdelfettah Belghith and
Thierry Monteil and
Khalil Drira and
Saad AlAhmadi Cache Freshness in Named Data Networking
for the Internet of Things . . . . . . . 1496--1511
Margarida Mamede and
José Legatheaux Martins and
João Horta BOUQUET --- Aggregating Network Paths in
Trees to Reduce Data-Plane Forwarding
State . . . . . . . . . . . . . . . . . 1512--1522
N. Gobalakrishnan and
C. Arun A New Multi-Objective Optimal
Programming Model for Task Scheduling
using Genetic Gray Wolf Optimization in
Cloud Computing . . . . . . . . . . . . 1523--1536
Frédéric Giroire and
Nicolas Huin and
Joanna Moulierac and
Truong Khoa Phan Energy-Aware Routing in Software-Defined
Network using Compression . . . . . . . 1537--1556
Anubis Graciela de Moraes Rossetto and
Cláudio F. R. Geyer and
Luciana Arantes and
Pierre Sens Impact FD: an Unreliable Failure
Detector Based on Process Relevance and
Confidence in the System . . . . . . . . 1557--1576
S. Renuga and
S. S. K. Jagatheeshwari Efficient Privacy-Preserving Data
Sanitization over Cloud Using Optimal
GSA Algorithm . . . . . . . . . . . . . 1577--1588
Himangshu Sarma and
Robert Porzel and
Jan D. Smeddinck and
Rainer Malaka and
Arun Baran Samaddar A Text to Animation System for Physical
Exercises . . . . . . . . . . . . . . . 1589--1604
Qirong Mao and
Feifei Zhang and
Liangjun Wang and
Sidian Luo and
Ming Dong Cascaded Multi-level Transformed
Dirichlet Process for Multi-pose Facial
Expression Recognition . . . . . . . . . 1605--1619
Ammar Sohail and
Muhammad Aamir Cheema and
David Taniar Social-Aware Spatial Top-k and Skyline
Queries . . . . . . . . . . . . . . . . 1620--1638
Md Mosaddek Khan and
Long Tran-Thanh and
Sarvapali D. Ramchurn and
Nicholas R. Jennings Speeding Up GDL-Based Message Passing
Algorithms for Large-Scale DCOPs . . . . 1639--1666
Sunny Rai and
Shampa Chakraverty and
Devendra K. Tayal and
Yash Kukreti A Study on Impact of Context on Metaphor
Detection . . . . . . . . . . . . . . . 1667--1682
Chandra Prakash and
Rajesh Kumar and
Namita Mittal Optimized Clustering Techniques for Gait
Profiling in Children with Cerebral
Palsy for Rehabilitation . . . . . . . . 1683--1694
Zhenjun Tang and
Ziqing Huang and
Heng Yao and
Xianquan Zhang and
Lv Chen and
Chunqiang Yu Perceptual Image Hashing with Weighted
DWT Features for Reduced-Reference Image
Quality Assessment . . . . . . . . . . . 1695--1709
Zhi-Fang Yang and
Chih-Ting Kuo and
Te-Hsi Kuo Authorization Identification by
Watermarking in Log-polar Coordinate
System . . . . . . . . . . . . . . . . . 1710--1723
Zhi-jie Liang and
Sheng-bin Liao and
Bing-zhang Hu $3$D Convolutional Neural Networks for
Dynamic Sign Language Recognition . . . 1724--1736
H. Hassanpour and
N. Nowrozian and
M. M. AlyanNezhadi and
N. Samadiani Image Zooming Using a Multi-layer Neural
Network . . . . . . . . . . . . . . . . 1737--1748
David W. Archer and
Dan Bogdanov and
Yehuda Lindell and
Liina Kamm and
Kurt Nielsen and
Jakob Illeborg Pagter and
Nigel P. Smart and
Rebecca N. Wright From Keys to Databases --- Real-World
Applications of Secure Multi-Party
Computation . . . . . . . . . . . . . . 1749--1771
Eunsung Lee and
Sang Woo Kim Non-interactive Conditional Proxy
Re-Signature in the Standard Model . . . 1772--1782
Tingting Lin and
Hailun Yan and
Xuejia Lai and
Yixin Zhong and
Yin Jia Security Evaluation and Improvement of a
White-Box SMS4 Implementation Based on
Affine Equivalence Algorithm . . . . . . 1783--1790
Xi-Jun Lin and
Lin Sun and
Haipeng Qu and
Dongxiao Liu On the Security of Secure
Server-Designation Public Key Encryption
with Keyword Search . . . . . . . . . . 1791--1793
Yunhua Wen and
Shengli Liu and
Ziyuan Hu and
Shuai Han Computational Robust Fuzzy Extractor . . 1794--1805
Yi Dou and
Henry C. B. Chan and
Man Ho Au Order-Hiding Range Query over Encrypted
Data without Search Pattern Leakage . . 1806--1824
Shuai Han and
Shengli Liu and
Lin Lyu and
Dawu Gu Tightly Secure Encryption Schemes
against Related-Key Attacks . . . . . . 1825--1844
Biao Wang and
Xueqing Wang and
Rui Xue and
Xinyi Huang Matrix FHE and Its Application in
Optimizing Bootstrapping . . . . . . . . 1845--1861
Yung-Ting Chuang and
Yi-Fan Lee Defense Mechanism for Malicious and
Selective Forwarding Attacks in Large
and Mobile Wireless Networks . . . . . . 1862--1879
Jinhui Liu and
Yong Yu and
Bo Yang and
Jianwei Jia and
Shijia Wang and
Houzhen Wang Structural Key Recovery of Simple Matrix
Encryption Scheme Family . . . . . . . . 1880--1896
Qingwen Guo and
Qiong Huang and
Guomin Yang Authorized Function Homomorphic
Signature . . . . . . . . . . . . . . . 1897--1908
Nazmun Naher and
Tanzima Hashem Think Ahead: Enabling Continuous Sharing
of Location Data in Real-Time with
Privacy Guarantee . . . . . . . . . . . 1--19
Shmuel T. Klein and
Dana Shapira Context Sensitive Rewriting Codes for
Flash Memory . . . . . . . . . . . . . . 20--29
Zbyn\vek K\vrivka and
Ji\vrí Ku\vcera and
Alexander Meduna Jumping Pure Grammars . . . . . . . . . 30--41
Chengcheng Mou and
Shaoping Chen and
Yi-Cheng Tu A Comparative Study of Dual-Tree
Algorithms for Computing Spatial
Distance Histograms . . . . . . . . . . 42--62
Yuan Lin and
Zhongzhi Zhang Non-Backtracking Centrality Based Random
Walk on Networks . . . . . . . . . . . . 63--80
Weiwei Liu and
Chong Jiang and
Ji-Bo Wang and
Yuan-Yuan Lu Single-machine scheduling with
simultaneous considerations of resource
allocation and deteriorating jobs . . . 81--89
Yu Tian and
Ming Xu and
Chong Jiang and
Ji-Bo Wang and
Xiao-Yuan Wang No-wait resource allocation flowshop
scheduling with learning effect under
limited cost availability . . . . . . . 90--96
Abel Cabrera Martínez and
Frank A. Hernández Mira and
José M. Sigarreta Almira and
Ismael G. Yero On Computational and Combinatorial
Properties of the Total Co-independent
Domination Number of Graphs . . . . . . 97--108
Vanderson Hafemann Fragal and
Adenilso Simao and
Mohammad Reza Mousavi and
Uraz Cengiz Turker Extending HSI Test Generation Method for
Software Product Lines . . . . . . . . . 109--129
Dong-Yuh Yang and
Yi-Chun Cho Analysis of the $N$-policy GI/M/1/K
Queueing Systems with Working Breakdowns
and Repairs . . . . . . . . . . . . . . 130--143
Shu-Li Zhao and
Rong-Xia Hao The Generalized Three-Connectivity of
Two Kinds of Cayley Graphs . . . . . . . 144--149
Bing Zhu and
Kenneth W. Shum and
Hui Li On the Duality and File Size Hierarchy
of Fractional Repetition Codes . . . . . 150--160
Bruno Guazzelli Batista and
Bruno Tardiole Kuehne and
Dionisio Machado Leite Filho and
Maycon Leone Maciel Peixoto Security Overhead on a Service with
Automatic Resource Management: a
Performance Analysis . . . . . . . . . . 161--173
Salman Taherizadeh and
Vlado Stankovski Dynamic Multi-level Auto-scaling Rules
for Containerized Applications . . . . . 174--197
Yeim-Kuan Chang and
Han-Chen Chen Fast Packet Classification using
Recursive Endpoint-Cutting and Bucket
Compression on FPGA . . . . . . . . . . 198--214
Fan Zhang and
Tao Jing and
Yan Huo and
Kaiwei Jiang Joint Optimization of Spectrum Sensing
and Transmit Power in Energy Harvesting
Cognitive Radio Sensor Networks . . . . 215--230
Matthieu Barjon and
Arnaud Casteigts and
Serge Chaumette and
Colette Johnen and
Yessin M. Neggaz Maintaining a Distributed Spanning
Forest in Highly Dynamic Networks . . . 231--246
Jianzhong Huang and
Panping Zhou and
Xiao Qin and
Yanqun Wang and
Changsheng Xie Optimizing Erasure-Coded Data Archival
for Replica-Based Storage Clusters . . . 247--262
C. BrijilalRuban and
B. Paramasivan Cluster-Based Secure Communication and
Certificate Revocation Scheme for VANET 263--275
Neetesh Kumar and
Deo Prakash Vidyarthi A Hybrid Heuristic for Load-Balanced
Scheduling of Heterogeneous Workload on
Heterogeneous Systems . . . . . . . . . 276--291
Ahmad Hiasat and
Leonel Sousa On the Design of RNS Inter-Modulo
Processing Units for the
Arithmetic-Friendly Moduli Sets $ 2^{n +
k} $, $ 2^n - 1 $, $ 2^{n + 1} - 1 $ . . 292--300
Xinjian Luo and
Xiaofeng Gao and
Guihai Chen Accelerate Data Retrieval by
Multi-Dimensional Indexing in
Switch-Centric Data Centers . . . . . . 301--320
Jesús M. Almendros-Jiménez and
Antonio Becerra-Terón and
Manuel Torres Integrating and Querying OpenStreetMap
and Linked Geo Open Data . . . . . . . . 321--345
Raphael Angulu and
Jules R. Tapamo and
Aderemi O. Adewumi Age-Group Estimation Using Feature and
Decision Level Fusion . . . . . . . . . 346--358
Ximing Li and
Ang Zhang and
Changchun Li and
Lantian Guo and
Wenting Wang and
Jihong Ouyang Relational Biterm Topic Model:
Short-Text Topic Modeling using Word
Embeddings . . . . . . . . . . . . . . . 359--372
Chris J. Mitchell Security issues in a group key
establishment protocol . . . . . . . . . 373--376
Asieh Ghanbarpour and
Hassan Naderi A Model-based Keyword Search Approach
for Detecting Top-$k$ Effective Answers 377--393
Michael Scriney and
Suzanne McCarthy and
Andrew McCarren and
Paolo Cappellari and
Mark Roantree Automating Data Mart Construction from
Semi-structured Data Sources . . . . . . 394--413
Hafiz Tayyeb Javed and
Mirza Omer Beg and
Hasan Mujtaba and
Hammad Majeed and
Muhammad Asim Fairness in Real-Time Energy Pricing for
Smart Grid Using Unsupervised Learning 414--429
Weihua Li and
Quan Bai and
Minjie Zhang A Multi-agent System for Modelling
Preference-Based Complex Influence
Diffusion in Social Networks . . . . . . 430--447
Zeynep Engin and
Philip Treleaven Algorithmic Government: Automating
Public Services and Supporting Civil
Servants in using Data Science
Technologies . . . . . . . . . . . . . . 448--460
Sandra Sampaio and
Mashael Aljubairah and
Hapsoro Adi Permana and
Pedro Sampaio A Conceptual Approach for Supporting
Traffic Data Wrangling Tasks . . . . . . 461--480
Gaoli Wang and
Zhenfu Cao and
Xiaolei Dong Improved Fault-Tolerant Aggregate
Signatures . . . . . . . . . . . . . . . 481--489
Hui Guo and
Zhenfeng Zhang and
Jing Xu and
Ningyu An Non-transferable Proxy Re-encryption . . 490--506
Fatemeh Rezaeibagha and
Yi Mu Efficient Micropayment of Cryptocurrency
from Blockchains . . . . . . . . . . . . 507--517
Van Tuyen Dang and
Truong Thu Huong and
Nguyen Huu Thanh and
Pham Ngoc Nam and
Nguyen Ngoc Thanh and
Alan Marshall SDN-Based SYN Proxy --- A Solution to
Enhance Performance of Attack Mitigation
Under TCP SYN Flood . . . . . . . . . . 518--534
Rongjia Li and
Chenhui Jin and
Ruya Fan Improved Integral Distinguishers on
Compression Function of GOST R Hash
Function . . . . . . . . . . . . . . . . 535--544
Kwangsu Lee and
Dong Hoon Lee and
Jong Hwan Park and
Moti Yung CCA Security for Self-Updatable
Encryption: Protecting Cloud Data When
Clients Read/Write Ciphertexts . . . . . 545--562
Ming Zeng and
Kai Zhang and
Haifeng Qian and
Xiaofeng Chen and
Jie Chen A Searchable Asymmetric Encryption
Scheme with Support for Boolean Queries
for Cloud Applications . . . . . . . . . 563--578
Hongyun Cai and
Fuzhi Zhang An Unsupervised Method for Detecting
Shilling Attacks in Recommender Systems
by Mining Item Relationship and
Identifying Target Items . . . . . . . . 579--597
Muhammed Ali Bingöl and
Osman Biçer and
Mehmet Sabir Kiraz and
Albert Levi An Efficient 2-Party Private Function
Evaluation Protocol Based on Half Gates 598--613
Keita Emura and
Hayato Kimura and
Toshihiro Ohigashi and
Tatsuya Suzuki Privacy-Preserving Aggregation of
Time-Series Data with Public
Verifiability from Simple Assumptions
and Its Implementations . . . . . . . . 614--630
Yi Zhao and
Yong Yu and
Bo Yang Leakage Resilient CCA Security in
Stronger Model: Branch Hidden ABO-LTFs
and Their Applications . . . . . . . . . 631--640
Mahmoud Darwich and
Mohsen Amini Salehi and
Ege Beyazit and
Magdy Bayoumi Cost-Efficient Cloud-Based Video
Streaming Through Measuring Hotness . . 641--656
Mira Gonen and
Dana Shapira and
James A. Storer Edit Distance with Multiple Block
Operations . . . . . . . . . . . . . . . 657--669
A. S. M. Kayes and
Jun Han and
Wenny Rahayu and
Tharam Dillon and
Md Saiful Islam and
Alan Colman A Policy Model and Framework for
Context-Aware Access Control to
Information Resources . . . . . . . . . 670--705
Shuang Zhao and
Jixiang Meng Arc Fault Tolerance of Maximally
Arc-Connected Networks Modeled By
Digraphs . . . . . . . . . . . . . . . . 706--714
Shiying Wang and
Mujiangshan Wang The strong connectivity of bubble-sort
star graphs . . . . . . . . . . . . . . 715--729
Alkida Balliu and
Pierre Fraigniaud Certification of Compact Low-Stretch
Routing Schemes . . . . . . . . . . . . 730--746
Yafei Zhai and
Limei Lin and
Li Xu and
Xinxin Zhang and
Yanze Huang The Conditional Diagnosability with
$g$-Good-Neighbor of Exchanged
Hypercubes . . . . . . . . . . . . . . . 747--756
Khaled El-Fakih and
Nina Yevtushenko and
Ayat Saleh Incremental and Heuristic Approaches for
Deriving Adaptive Distinguishing Test
Cases for Non-deterministic Finite-State
Machines . . . . . . . . . . . . . . . . 757--768
Yi Qi and
Yuhao Yi and
Zhongzhi Zhang Topological and Spectral Properties of
Small-World Hierarchical Graphs . . . . 769--784
Chunlin Li and
Jingpan Bai and
Shaofeng Du and
Chunguang Yang and
Youlong Luo Combining Tag Correlation and
Interactive Behaviors for Community
Discovery . . . . . . . . . . . . . . . 785--800
Zina Nakhla and
Kaouther Nouira and
Ahmed Ferchichi Prescription Adverse Drug Events System
(PrescADE) Based on Ontology and
Internet of Things . . . . . . . . . . . 801--805
Ian C. Pyle Software for the Linesman Radar Data
Processing System . . . . . . . . . . . 806--819
Faisal Ahmed and
Corentin Kervadec and
Yannick Le Moullec and
Gert Tamberg and
Paul Annus Autonomous Wireless Sensor Networks:
Implementation of Transient Computing
and Energy Prediction for Improved Node
Performance and Link Quality . . . . . . 820--837
Muhammad Usman and
Aris Cahyadi Risdianto and
Jungsu Han and
Jongwon Kim Interactive Visualization of SDN-Enabled
Multisite Cloud Playgrounds Leveraging
SmartX MultiView Visibility Framework 838--854
Ab Shaqoor Nengroo and
K. S. Kuppusamy `Advertisements or adverse-tisements?'
--- An accessibility barrier for persons
with visual impairments . . . . . . . . 855--868
Jianzhong Huang and
Jie Xia and
Xiao Qin and
Qiang Cao and
Changsheng Xie Optimization of Small Updates for
Erasure-Coded In-memory Stores . . . . . 869--883
Christine Niyizamwiyitira and
Lars Lundberg A Utilization-Based Schedulability Test
of Real-Time Systems Running on a
Multiprocessor Virtual Machine . . . . . 884--904
Xing Su and
Minjie Zhang and
Quan Bai Two Mathematical Programming-Based
Approaches for Wireless Mobile Robot
Deployment in Disaster Environments . . 905--918
Lamiaa F. Ibrahim and
Hesham A. Salman and
Sara Y. Sery and
Zaki Taha Using Clustering Techniques to Plan
Indoor Femtocell Base Stations Layout in
Multi-floors . . . . . . . . . . . . . . 919--930
Manju C. Thayammal and
M. Mary Linda Utility-Based Optimal Resource
Allocation in LTE-A Networks by Hybrid
ACO-TS with MFA Scheme . . . . . . . . . 931--942
Francesc D. Muñoz-Escoí and
Rubén de Juan-Marín and
José-Ramón García-Escrivá and
J. R. González de Mendívil and
José M. Bernabéu-Aubán CAP Theorem: Revision of Its Related
Consistency Models . . . . . . . . . . . 943--960
Lida Ghahremanlou and
Abdel-Rahman H. Tawil and
Paul Kearney and
Hossein Nevisi and
Xia Zhao and
Ali Abdallah A Survey of Open Data Platforms in Six
UK Smart City Initiatives . . . . . . . 961--976
Saber Amri and
Hela Ltifi and
Mounir Ben Ayed A Predictive Visual Analytics Evaluation
Approach Based on Adaptive Neuro-Fuzzy
Inference System . . . . . . . . . . . . 977--1000
Ibrahim Furkan Ince and
Yusuf Sait Erdem and
Faruk Bulut and
Md Haidar Sharif A Low-Cost Pupil Center Localization
Algorithm Based on Maximized Integral
Voting of Circular Hollow Kernels . . . 1001--1015
Xuezhi Yan and
Ruige Li and
Xiaoying Sun and
Guohong Liu Effects of Touch Force Profiles and
Waveforms of Electrostatic Tactile
Feedback on Touchscreen Pan Operation 1016--1035
M. Dhivya and
M. Renuka Devi Detection of Structural Defects in
Fabric Parts Using a Novel Edge
Detection Method . . . . . . . . . . . . 1036--1043
Alex Bogatu and
Norman W. Paton and
Alvaro A. A. Fernandes and
Martin Koehler Towards Automatic Data Format
Transformations: Data Wrangling at Scale 1044--1060
Alireza Nazemi and
Marziyeh Mortezaee A Novel Collaborate Neural Dynamic
System Model for Solving a Class of
Min-uMax Optimization Problems with an
Application in Portfolio Management . . 1061--1085
Xi-Jun Lin and
Lin Sun and
Haipeng Qu and
He-Qun Xian Cryptanalysis of a Compact Anonymous
HIBE with Constant Size Private Keys . . 1087--1091
Yanwei Zhou and
Bo Yang and
Hongxia Hou and
Lina Zhang and
Tao Wang and
Mingxiao Hu Continuous Leakage-Resilient
Identity-Based Encryption with Tight
Security . . . . . . . . . . . . . . . . 1092--1105
Jordan S. Queiroz and
Eduardo L. Feitosa A Web Browser Fingerprinting Method
Based on the Web Audio API . . . . . . . 1106--1120
Qian Wang and
Chenhui Jin A Method to Bound the Number of Active
S-Boxes for a Kind of AES-Like Structure 1121--1131
Jiahui Chen and
Jie Ling and
Jianting Ning and
Jintai Ding Identity-Based Signature Schemes for
Multivariate Public Key Cryptosystems 1132--1147
Nanyuan Cao and
Zhenfu Cao and
Zhen Liu and
Xiaolei Dong and
Xiaopeng Zhao All-But-Many Lossy Trapdoor Functions
under Decisional RSA Subgroup Assumption
and Application . . . . . . . . . . . . 1148--1157
Hanqiu Liu and
Chenhui Jin An Improvement of the CS Attack to DSC
Cipher . . . . . . . . . . . . . . . . . 1158--1165
Yuzhao Cui and
Qiong Huang and
Jianye Huang and
Hongbo Li and
Guomin Yang Ciphertext-Policy Attribute-Based
Encrypted Data Equality Test and
Classification . . . . . . . . . . . . . 1166--1177
Parvin Rastegari and
Willy Susilo and
Mohammad Dakhlalian Efficient Certificateless Signcryption
in the Standard Model: Revisiting Luo
and Wan's Scheme from Wireless Personal
Communications (2018) . . . . . . . . . 1178--1193
Thierry Mefenza and
Damien Vergnaud Cryptanalysis of Server-Aided RSA
Protocols with Private-Key Splitting . . 1194--1213
Jinguang Han and
Maoxuan Bei and
Liqun Chen and
Yang Xiang and
Jie Cao and
Fuchun Guo and
Weizhi Meng Attribute-Based Information Flow Control 1214--1231
Jinyong Chang and
Genqing Bian and
Yanyan Ji and
Maozhi Xu On the KDM--CCA Security from Partial
Trapdoor One-Way Family in the Random
Oracle Model . . . . . . . . . . . . . . 1232--1245
Natarajan Meghanathan Centrality and Partial Correlation
Coefficient-Based Assortativity Analysis
of Real-World Networks . . . . . . . . . 1247--1264
Kenji Yasunaga Error Correction by Structural
Simplicity: Correcting Samplable
Additive Errors . . . . . . . . . . . . 1265--1276
Shu-Li Zhao and
Rong-Xia Hao and
Lidong Wu The Generalized Connectivity of $ (n,
k)$-Bubble-Sort Graphs . . . . . . . . . 1277--1283
Khalil Mohamed and
Ayman El Shenawy and
Hany Harb A Hybrid Decentralized Coordinated
Approach for Multi-Robot Exploration
Task . . . . . . . . . . . . . . . . . . 1284--1300
Jinyong Wang and
Xiaoping Mi Open Source Software Reliability Model
with the Decreasing Trend of Fault
Detection Rate . . . . . . . . . . . . . 1301--1312
Yuxing Yang Characterizations of Minimum Structure-
and Substructure-Cuts of Hypercubes . . 1313--1321
Zhiwu Xu and
Ping Lu and
Haiming Chen Towards an Effective Syntax and a
Generator for Deterministic Standard
Regular Expressions . . . . . . . . . . 1322--1341
Tangliu Wen and
Lan Song and
Zhen You Proving Linearizability Using Reduction 1342--1364
Ying Jiang and
Jian Liu and
Gilles Dowek and
Kailiang Ji Towards Combining Model Checking and
Proof Checking . . . . . . . . . . . . . 1365--1402
Saurabh K Pandey and
Mukesh A Zaveri DoA-Based Event Localization Using
Uniform Concentric Circular Array in the
IoT Environment . . . . . . . . . . . . 1403--1425
Islam Elleuch and
Achraf Makni and
Rafik Bouaziz Cooperative Overtaking Assistance System
Based on V2V Communications and RTDB . . 1426--1449
Zikai Zhang and
Jigang Wu and
Long Chen and
Guiyuan Jiang and
Siew-Kei Lam Collaborative Task Offloading with
Computation Result Reusing for Mobile
Edge Computing . . . . . . . . . . . . . 1450--1462
Guijuan Wang and
Cheng-Kuan Lin and
Baolei Cheng and
Jianxi Fan and
Weibei Fan Structure Fault-Tolerance of the
Generalized Hypercube . . . . . . . . . 1463--1476
Hisham M Almasaeid Maximizing Achievable Transmission Time
in Cognitive Radio Networks Under
Sensor-Aided Crowdsourced Spectrum
Sensing . . . . . . . . . . . . . . . . 1477--1489
Hui Cai and
Yanmin Zhu and
Jie Li and
Jiadi Yu Double Auction for a Data Trading Market
with Preferences and Conflicts of
Interest . . . . . . . . . . . . . . . . 1490--1504
Mohamed A Bayoumi and
Tarek M Salem and
Samir M Koriem Improving the Mechanism of Detecting and
Measuring Holes in Ad hoc Wireless
Sensor Network . . . . . . . . . . . . . 1505--1514
Jianhua Fan and
Tao Liang and
Tongxiang Wang and
Jianwei Liu Identification and Localization of the
Jammer in Wireless Sensor Networks . . . 1515--1527
Moresh Madhukar Mukhedkar and
Uttam Kolekar Trust-Based Secure Routing in Mobile Ad
Hoc Network Using Hybrid Optimization
Algorithm . . . . . . . . . . . . . . . 1528--1545
Sarah Alhumoud Twitter Analysis for Intelligent
Transportation . . . . . . . . . . . . . 1547--1556
Sreenithya Sumesh and
Aneesh Krishna and
Chitra M. Subramanian Game Theory-Based Reasoning of Opposing
Non-functional Requirements using
Inter-actor Dependencies . . . . . . . . 1557--1583
Vasile Palade and
J. Gerard Wolff A Roadmap for the Development of the `SP
Machine' for Artificial Intelligence . . 1584--1604
Muhammad Adnan and
Muhammad Afzal and
Khadim Hussain Asif Ontology-Oriented Software Effort
Estimation System for E-commerce
Applications Based on Extreme
Programming and Scrum Methodologies . . 1605--1624
Jianbin Huang and
Qingquan Bian and
Heli Sun and
Yaming Yang and
Yu Zhou Parameter-free Community Detection
through Distance Dynamic Synchronization 1625--1638
Manashee Kalita and
Themrichon Tuithung and
Swanirbhar Majumder A New Steganography Method Using Integer
Wavelet Transform and Least Significant
Bit Substitution . . . . . . . . . . . . 1639--1655
N. Shankar and
S. Sathish Babu and
C. Viswanathan Femur Bone Volumetric Estimation for
Osteoporosis Classification Using
Optimization-Based Deep Belief Network
in X-Ray Images . . . . . . . . . . . . 1656--1670
Roger Santos Ferreira and
Denilson Alves Pereira BigFeel --- A Distributed Processing
Environment for the Integration of
Sentiment Analysis Methods . . . . . . . 1671--1683
Ond\vrej Zamazal Machine Learning Support for EU Funding
Project Categorization . . . . . . . . . 1684--1694
R. Vijayarajan and
P. Gnanasivam and
R. Avudaiammal Bio-Key Based AES for Personalized Image
Cryptography . . . . . . . . . . . . . . 1695--1705
Nghi Huynh and
Marc Frappier and
Herman Pooda and
Amel Mammar and
Régine Laleau SGAC: a Multi-Layered Access Control
Model with Conflict Resolution Strategy 1707--1733
Binlin Cheng and
Jinjun Liu and
Jiejie Chen and
Shudong Shi and
Xufu Peng and
Xingwen Zhang and
Haiqing Hai MoG: Behavior-Obfuscation Resistance
Malware Detection . . . . . . . . . . . 1734--1747
Yang Chen and
Wenmin Li and
Fei Gao and
Wei Yin and
Kaitai Liang and
Hua Zhang and
Qiaoyan Wen Efficient Attribute-Based Data Sharing
Scheme with Hidden Access Structures . . 1748--1760
Ya Liu and
Yifan Shi and
Dawu Gu and
Zhiqiang Zeng and
Fengyu Zhao and
Wei Li and
Zhiqiang Liu and
Yang Bao Improved Meet-in-the-Middle Attacks on
Reduced-Round Kiasu-BC and Joltik-BC . . 1761--1776
Zhen-Hui Han and
Xing-Shu Chen and
Xue-Mei Zeng and
Yi Zhu and
Ming-Yong Yin Detecting Proxy User Based on
Communication Behavior Portrait . . . . 1777--1792
Jianghua Zhong and
Dongdai Lin On Equivalence of Cascade Connections of
Two Nonlinear Feedback Shift Registers 1793--1804
Lele Chen and
Gaoli Wang and
GuoYan Zhang MILP-based Related-Key Rectangle Attack
and Its Application to GIFT, Khudra,
MIBS . . . . . . . . . . . . . . . . . . 1805--1821
Venkatraman Subbarayalu and
B Surendiran and
P Arun Raj Kumar Hybrid Network Intrusion Detection
System for Smart Environments Based on
Internet of Things . . . . . . . . . . . 1822--1839
Haibo Hong and
Licheng Wang and
Jun Shao and
Jianhua Yan and
Haseeb Ahmad and
Guiyi Wei and
Mande Xie and
Yixian Yang A Miniature CCA Public Key Encryption
Scheme Based on Non-abelian
Factorization Problem in Finite Groups
of Lie Type . . . . . . . . . . . . . . 1840--1848
San Ling and
Khoa Nguyen and
Huaxiong Wang and
Juanyang Zhang Server-Aided Revocable Predicate
Encryption: Formalization and
Lattice-Based Instantiation . . . . . . 1849--1862
Yonghong Hou and
Lin Xue and
Shuo Li and
Jiaming Xing Corrigendum: User-Experience-Oriented
Fuzzy Logic Controller for Adaptive
Streaming . . . . . . . . . . . . . . . 1937--1937
Binlin Cheng and
Jinjun Liu and
Chen Jiejie and
Shi Shudong and
Peng Xufu and
Zhang Xingwen and
Haiqing Hai Erratum to: MoG: Behavior-Obfuscation
Resistance Malware Detection . . . . . . 2846--2846