Last update:
Thu Mar 22 11:51:22 MDT 2018
Gheorghe Adam and
Sanda Adam Bayesian Automatic Adaptive Quadrature:
An Overview . . . . . . . . . . . . . . 1--16
Volker Friese Computational Challenges for the CBM
Experiment . . . . . . . . . . . . . . . 17--27
Vladimir P. Gerdt Consistency Analysis of Finite
Difference Approximations to PDE Systems 28--42
Vladimir P. Gerdt and
Alexander N. Prokopenya The Circuit Model of Quantum Computation
and Its Simulation with Mathematica . . 43--55
Ulrich H. E. Hansmann Proteins Studied by Computer Simulations 56--65
Juha Honkonen Functional Methods in Stochastic Systems 66--78
Vladimir V. Kornyak Mathematical Modeling of Finite Quantum
Systems . . . . . . . . . . . . . . . . 79--93
Vladimir S. Melezhik Multi-channel Computations in
Low-Dimensional Few-Body Physics . . . . 94--107
Serguey V. Zemskov and
Henk M. Jonkers and
Fred J. Vermolen Mathematical Models to Predict the
Critical Conditions for Bacterial
Self-healing of Concrete . . . . . . . . 108--121
Ciprian Sorin Acatrinei A New Discretization Scheme in Field
Theory . . . . . . . . . . . . . . . . . 122--127
Nikolay V. Antonov and
Nikolay M. Gulitskiy Two-Loop Calculation of the Anomalous
Exponents in the Kazantsev--Kraichnan
Model of Magnetic Hydrodynamics . . . . 128--135
Edik A. Ayryan and
Alexander A. Egorov and
Leonid A. Sevastyanov and
Konstantin P. Lovetskiy Mathematical Modeling of Irregular
Integrated Optical Waveguides . . . . . 136--147
Ivan Da\vno Two Notes on Continuous-Time
Neurodynamical Systems . . . . . . . . . 148--153
Michal Hnati\vc and
Juha Honkonen and
Tomá\vs Lu\vcivjanský On the Mathematical Modelling of the
Annihilation Process . . . . . . . . . . 154--159
Marián Kle\vs\vc and
\vStefan Schrötter The Crossing Numbers of Join of Paths
and Cycles with Two Graphs of Order Five 160--167
Eva Litavcová and
Miron Pavlu\vs and
Ján Seman and
Ibrohim Sarhadov Exact Solution of a Moisture Drying
System with Phase Transition . . . . . . 168--173
Leonid Sevastyanov and
Alexander Zorin and
Alexander Gorbachev Pseudo-Differential Operators in an
Operational Model of the Quantum
Measurement of Observables . . . . . . . 174--181
Alina Suzko and
Elena Velicheva Exactly Solvable Models for the
Generalized Schrödinger Equation . . . . 182--188
Sanda Adam and
Gheorghe Adam Floating Point Degree of Precision in
Numerical Quadrature . . . . . . . . . . 189--194
Ilkizar V. Amirkhanov and
Taisia P. Puzynina and
Igor V. Puzynin and
Ibrohim Sarhadov Numerical Simulations of Heat and
Moisture Transfer Subject to the Phase
Transition . . . . . . . . . . . . . . . 195--200
Anonymous Front Matter . . . . . . . . . . . . . . ??
Mikko Särelä and
Christian Esteve Rothenberg and
András Zahemszky and
Pekka Nikander and
Jörg Ott BloomCasting: Security in Bloom Filter
Based Multicast . . . . . . . . . . . . 1--16
Sanna Suoranta and
Jani Heikkinen and
Pekka Silvekoski Authentication Session Migration . . . . 17--32
Miika Komu and
Sasu Tarkoma and
Andrey Lukyanenko Mitigation of Unsolicited Traffic across
Domains with Host Identities and Puzzles 33--48
Ravishankar Borgaonkar and
Kevin Redon and
Jean-Pierre Seifert Experimental Analysis of the Femtocell
Location Verification Techniques . . . . 49--54
Erka Koivunen ``Why Wasn't I Notified?'': Information
Security Incident Reporting Demystified 55--70
Pern Hui Chia and
Andreas P. Heiner and
N. Asokan Use of Ratings from Personalized
Communities for Trustworthy Application
Installation . . . . . . . . . . . . . . 71--88
Gunnar Kreitz and
Mads Dam and
Douglas Wikström Practical Private Information
Aggregation in Large Networks . . . . . 89--103
Magnus Almgren and
Wolfgang John Tracking Malicious Hosts on a 10Gbps
Backbone Link . . . . . . . . . . . . . 104--120
Elahe Kani-Zabihi and
Lizzie Coles-Kemp Service Users' Requirements for Tools to
Support Effective On-line Privacy and
Consent Practices . . . . . . . . . . . 121--135
Dominik Herrmann and
Christoph Gerber and
Christian Banse and
Hannes Federrath Analyzing Characteristic Host Access
Patterns for Re-identification of Web
User Sessions . . . . . . . . . . . . . 136--154
Jason Crampton and
Michael Huth A Framework for the Modular
Specification and Orchestration of
Authorization Policies . . . . . . . . . 155--170
Kari Kostiainen and
N. Asokan and
Jan-Erik Ekberg Credential Disabling from Trusted
Execution Environments . . . . . . . . . 171--186
Olga Gadyatskaya and
Fabio Massacci and
Federica Paci and
Sergey Stankevich Java Card Architecture for Autonomous
Yet Secure Evolution of Smart Cards
Applications . . . . . . . . . . . . . . 187--192
Filippo Del Tedesco and
Alejandro Russo and
David Sands Implementing Erasure Policies Using
Taint Analysis . . . . . . . . . . . . . 193--209
Juan José Conti and
Alejandro Russo A Taint Mode for Python via a Library 210--222
Philippe De Ryck and
Maarten Decat and
Lieven Desmet and
Frank Piessens and
Wouter Joosen Security of Web Mashups: a Survey . . . 223--238
Jonas Magazinius and
Phu H. Phung and
David Sands Safe Wrappers and Sane Policies for Self
Protecting JavaScript . . . . . . . . . 239--255
Jose Quaresma and
Christian W. Probst Protocol Implementation Generator . . . 256--268
Billy Bob Brumley Secure and Fast Implementations of Two
Involution Ciphers . . . . . . . . . . . 269--282
Markku-Juhani O. Saarinen The PASSERINE Public Key Encryption and
Authentication Mechanism . . . . . . . . 283--288
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Jessica Fridrich Modern Trends in Steganography and
Steganalysis . . . . . . . . . . . . . . 1--1
Nasir Memon Photo Forensics --- There Is More to a
Picture than Meets the Eye . . . . . . . 2--2
Vasily Sachnev and
Hyoung Joong Kim An Improved Matrix Encoding Scheme for
JPEG Steganography . . . . . . . . . . . 3--15
Shunquan Tan Steganalysis of LSB Matching Revisited
for Consecutive Pixels Using B-Spline
Functions . . . . . . . . . . . . . . . 16--29
Xinghao Jiang and
Tanfeng Sun and
Yue Zhou and
Yun Q. Shi A Drift Compensation Algorithm for
H.264/AVC Video Robust Watermarking
Scheme . . . . . . . . . . . . . . . . . 30--41
Junxiang Wang and
Jiangqun Ni and
Jinwei Pan A High Performance Multi-layer
Reversible Data Hiding Scheme Using
Two-Step Embedding . . . . . . . . . . . 42--56
Kazuo Ohzeki and
YuanYu Wei and
Yutaka Hirakawa and
Kiyotsugu Sato A New Watermarking Method with
Obfuscated Quasi-Chirp Transform . . . . 57--71
Hui Wang and
Anthony T. S. Ho and
Xi Zhao A Novel Fast Self-restoration
Semi-fragile Watermarking Algorithm for
Image Content Authentication Resistant
to JPEG Compression . . . . . . . . . . 72--85
Baiying Lei and
Ing Yann Soon and
Zhen Li A Robust Audio Watermarking Scheme Based
on Lifting Wavelet Transform and
Singular Value Decomposition . . . . . . 86--96
Alper Koz and
Claude Delpha Adaptive Selection of Embedding
Locations for Spread Spectrum
Watermarking of Compressed Audio . . . . 97--110
Takayuki Yamada and
Seiichi Gohshi and
Isao Echizen IR Hiding: Method to Prevent
Re-recording Screen Image Built in Short
Wavelength Pass Filter Detection Method
Using Specular Reflection . . . . . . . 111--125
Jong Yun Jun and
Kunho Kim and
Jae-Pil Heo and
Sung-eui Yoon IRIW: Image Retrieval Based Image
Watermarking for Large-Scale Image
Databases . . . . . . . . . . . . . . . 126--141
Fan Chen and
Hongjie He and
Yaoran Huo and
Hongxia Wang Self-recovery Fragile Watermarking
Scheme with Variable Watermark Payload 142--155
Huawei Tian and
Zheng Wang and
Yao Zhao and
Rongrong Ni and
Lunming Qin Spread Spectrum-Based Multi-bit
Watermarking for Free-View Video . . . . 156--166
Hongmei Liu and
Lei Li and
Jian Li and
Jiwu Huang Three Novel Algorithms for Hiding Data
in PDF Files Based on Incremental
Updates . . . . . . . . . . . . . . . . 167--180
Takaaki Yamada and
Yoshiyasu Takahashi Use of ``Emergable Watermarks'' as Copy
Indicators for Securing Video Content 181--195
Jonathan Weir and
WeiQi Yan Authenticating Visual Cryptography
Shares Using $2$D Barcodes . . . . . . . 196--210
Feng Liu and
Teng Guo and
ChuanKun Wu and
Ching-Nung Yang Flexible Visual Cryptography Scheme
without Distortion . . . . . . . . . . . 211--227
Yasushi Yamaguchi An Extended Visual Cryptography Scheme
for Continuous-Tone Images . . . . . . . 228--242
Xudong Zhao and
Shilin Wang and
Shenghong Li and
Jianhua Li A Comprehensive Study on Third Order
Statistical Features for Image Splicing
Detection . . . . . . . . . . . . . . . 243--256
Anonymous Front Matter . . . . . . . . . . . . . . ??
Marin Bertier and
Marko Obrovac and
Cédric Tedeschi A Protocol for the Atomic Capture of
Multiple Molecules on Large Scale
Platforms . . . . . . . . . . . . . . . 1--15
Annette Bieniusa and
Thomas Fuhrmann Lifting the Barriers --- Reducing
Latencies with Transparent Transactional
Memory . . . . . . . . . . . . . . . . . 16--30
Jingshu Chen and
Sandeep Kulkarni Application of Automated Revision for
UML Models: a Case Study . . . . . . . . 31--45
Alain Cournier and
Swan Dubois and
Anissa Lamani Snap-Stabilizing Message Forwarding
Algorithm on Tree Topologies . . . . . . 46--60
Tyler Crain and
Damien Imbs and
Michel Raynal Towards a Universal Construction for
Transaction-Based Multiprocess Programs 61--75
Carole Delporte-Gallet and
Hugues Fauconnier Byzantine Agreement with Homonyms in
Synchronous Systems . . . . . . . . . . 76--90
Ali Ebnenasir and
Reza Hajisheykhi Facilitating the Design of Fault
Tolerance in Transaction Level SystemC
Programs . . . . . . . . . . . . . . . . 91--105
Guy Even and
Moti Medina and
Gregor Schaffrath Competitive and Deterministic Embeddings
of Virtual Networks . . . . . . . . . . 106--121
Sotirios Kentros and
Aggelos Kiayias Solving the At-Most-Once Problem with
Nearly Optimal Effectiveness . . . . . . 122--137
Abhinav Mehta and
Shashank Agrawal and
Kannan Srinathan Interplay between (Im)perfectness,
Synchrony and Connectivity: The Case of
Reliable Message Transmission . . . . . 138--152
Nuno Santos and
André Schiper Tuning Paxos for High-Throughput with
Batching and Pipelining . . . . . . . . 153--167
Amine Abidi and
Sonia Mettali Gammar and
Farouk Kamoun Hybrid Approach for Experimental
Networking Research . . . . . . . . . . 168--178
Mahima Agumbe Suresh and
Radu Stoleru and
Ron Denton Towards Optimal Event Detection and
Localization in Acyclic Flow Networks 179--196
Roberto Baldoni and
Silvia Bonomi and
Adriano Cerocchi Virtual Tree: a Robust Overlay Network
for Ensuring Interval Valid Queries in
Dynamic Distributed Systems . . . . . . 197--200
Yin-Chung Hsu and
Yen-Ting Chen and
Chiu-Kuo Liang Distributed Coverage-Enhancing
Algorithms in Directional Sensor
Networks with Rotatable Sensors . . . . 201--213
Dinesh Dash and
Arijit Bishnu and
Arobinda Gupta Finding the Quality of Line Coverage of
a Sensor Network . . . . . . . . . . . . 214--217
Emiliano De Cristofaro and
Roberto Di Pietro Preserving Query Privacy in Urban
Sensing Systems . . . . . . . . . . . . 218--233
Sarang Deshpande and
Krishna M. Sivalingam Adaptive Velocity Based Guided
Navigation in Wireless Sensor Networks 234--248
Mauro Conti and
Roberto Di Pietro and
Angelo Spognardi Wireless Sensor Replica Detection in
Mobile Environments . . . . . . . . . . 249--264
Christian Esposito and
Stefano Russo and
Roberto Beraldi Achieving Reliable and Timely Event
Dissemination over WAN . . . . . . . . . 265--280
Anonymous Front Matter . . . . . . . . . . . . . . ??
Javier Lopez and
Roberto Setola and
Stephen D. Wolthusen Overview of Critical Information
Infrastructure Protection . . . . . . . 1--14
Myriam Dunn Cavelty and
Manuel Suter The Art of CIIP Strategy: Taking Stock
of Content and Processes . . . . . . . . 15--38
Andrea Glorioso and
Andrea Servida Infrastructure Sectors and the
Information Infrastructure . . . . . . . 39--51
Eric Luiijf Understanding Cyber Threats and
Vulnerabilities . . . . . . . . . . . . 52--67
Nils Kalstad Svendsen and
Stephen D. Wolthusen Modelling Approaches . . . . . . . . . . 68--97
Massimiliano Raciti and
Jordi Cucurull and
Simin Nadjm-Tehrani Anomaly Detection in Water Management
Systems . . . . . . . . . . . . . . . . 98--119
Cristina Alcaraz and
Gerardo Fernandez and
Fernando Carvajal Security Aspects of SCADA and DCS
Environments . . . . . . . . . . . . . . 120--149
Julian L. Rrushi SCADA Protocol Vulnerabilities . . . . . 150--176
Abdelmajid Khelil and
Daniel Germanus and
Neeraj Suri Protection of SCADA Communication
Channels . . . . . . . . . . . . . . . . 177--196
Ettore Bompard and
Paolo Cuccia and
Marcelo Masera and
Igor Nai Fovino Cyber Vulnerability in Power Systems
Operation and Control . . . . . . . . . 197--234
Stig O. Johnsen and
Andreas Aas and
Ying Qian Sector-Specific Information
Infrastructure Issues in the Oil, Gas,
and Petrochemical Sector . . . . . . . . 235--279
Stuart Goldman and
Huseyin Uzunalioglu Telecommunications . . . . . . . . . . . 280--300
Bernhard Hämmerli Financial Services Industry . . . . . . 301--329
Mark Hartong and
Rajn Goel and
Duminda Wijesekera Transportation . . . . . . . . . . . . . 330--355
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Alan Hanjalic A New Gap to Bridge: Where to Go Next in
Social Media Retrieval? . . . . . . . . 1--1
John R. Smith Mining Multimedia Data for Meaning . . . 2--2
Ralf Steinmetz and
Stefan Göbel Challenges in Serious Gaming as Emerging
Multimedia Technology for Education,
Training, Sports and Health . . . . . . 3--3
Hichem Bannour and
Céline Hudelot Building Semantic Hierarchies Faithful
to Image Semantics . . . . . . . . . . . 4--15
Daniel Kuettel and
Matthieu Guillaumin and
Vittorio Ferrari Combining Image-Level and Segment-Level
Models for Automatic Annotation . . . . 16--28
Svebor Karaman and
Jenny Benois-Pineau and
Rémi Mégret and
Aurélie Bugeau Multi-layer Local Graph Words for Object
Recognition . . . . . . . . . . . . . . 29--39
Markus Mühling and
Ralph Ewerth and
Jun Zhou and
Bernd Freisleben Multimodal Video Concept Detection via
Bag of Auditory Words and Multiple
Kernel Learning . . . . . . . . . . . . 40--50
Bogdan Ionescu and
Klaus Seyerlehner and
Christoph Rasche and
Constantin Vertan and
Patrick Lambert Content-Based Video Description for
Automatic Video Genre Categorization . . 51--62
Pere Obrador and
Michele A. Saad and
Poonam Suryanarayan and
Nuria Oliver Towards Category-Based Aesthetic Models
of Photographs . . . . . . . . . . . . . 63--76
Ehsan Younessian and
Deepu Rajan Scene Signatures for Unconstrained News
Video Stories . . . . . . . . . . . . . 77--88
Zhiguo Yang and
Yuxin Peng and
Jianguo Xiao Visual Vocabulary Optimization with
Spatial Context for Image Annotation and
Classification . . . . . . . . . . . . . 89--102
Xiaowei Ding and
Yi Xu and
Lei Deng and
Xiaokang Yang Colorization Using Quaternion Algebra
with Automatic Scribble Generation . . . 103--114
Rados\law Mantiuk and
Micha\l Kowalik and
Adam Nowosielski and
Bartosz Bazyluk Do-It-Yourself Eye Tracker: Low-Cost
Pupil-Based Eye Tracker for Computer
Graphics Applications . . . . . . . . . 115--125
Longfei Zhang and
Yue Gao and
Alexander Hauptmann and
Rongrong Ji and
Gangyi Ding and
Boaz Super Symbiotic Black-Box Tracker . . . . . . 126--137
Tina Walber and
Ansgar Scherp and
Steffen Staab Identifying Objects in Images from
Analyzing the Users' Gaze Movements for
Provided Tags . . . . . . . . . . . . . 138--148
Xiaojian Zhao and
Jin Yuan and
Richang Hong and
Meng Wang and
Zhoujun Li and
Tat-Seng Chua On Video Recommendation over Social
Network . . . . . . . . . . . . . . . . 149--160
Taiga Yoshida and
Go Irie and
Takashi Satou and
Akira Kojima and
Suguru Higashino Improving Item Recommendation Based on
Social Tag Ranking . . . . . . . . . . . 161--172
Zhen-zhong Lan and
Lei Bao and
Shoou-I Yu and
Wei Liu and
Alexander G. Hauptmann Double Fusion for Multimedia Event
Detection . . . . . . . . . . . . . . . 173--185
Ehsan Younessian and
Deepu Rajan Multi-modal Solution for Unconstrained
News Story Retrieval . . . . . . . . . . 186--195
Ardhendu Behera and
Anthony G. Cohn and
David C. Hogg Workflow Activity Monitoring Using
Dynamics of Pair-Wise Qualitative
Spatial Relations . . . . . . . . . . . 196--209
Anonymous Front Matter . . . . . . . . . . . . . . ??
Hengfei Li and
Nir Oren and
Timothy J. Norman Probabilistic Argumentation Frameworks 1--16
Ringo Baumann and
Gerhard Brewka and
Renata Wong Splitting Argumentation Frameworks: An
Empirical Evaluation . . . . . . . . . . 17--31
Wolfgang Dvo\vrák On the Complexity of Computing the
Justification Status of an Argument . . 32--49
Rolando Medellin-Gasque and
Katie Atkinson and
Peter McBurney and
Trevor Bench-Capon Arguments over Co-operative Plans . . . 50--66
Luke Riley and
Katie Atkinson and
Terry Payne and
Elizabeth Black An Implemented Dialogue System for
Inquiry and Persuasion . . . . . . . . . 67--84
Wietske Visser and
Koen V. Hindriks and
Catholijn M. Jonker An Argumentation Framework for
Qualitative Multi-criteria Preferences 85--98
Stefano Bistarelli and
Francesco Santini Modeling and Solving AFs with a
Constraint-Based Tool: ConArg . . . . . 99--116
Nicolás D. Rotstein and
Nir Oren and
Timothy J. Norman Resource Boundedness and Argumentation 117--131
Elizabeth Black and
Katie Bentley An Empirical Study of a Deliberation
Dialogue System . . . . . . . . . . . . 132--146
Patrick Krümpelmann and
Matthias Thimm and
Marcelo A. Falappa and
Alejandro J. García Selective Revision by Deductive
Argumentation . . . . . . . . . . . . . 147--162
Paulo Maio and
Nuno Silva A Three-Layer Argumentation Framework 163--180
Maria Laura Cobo and
Diego C. Martinez and
Guillermo R. Simari Stable Extensions in Timed Argumentation
Frameworks . . . . . . . . . . . . . . . 181--196
Pietro Baroni and
Federico Cerutti and
Paul E. Dunne and
Massimiliano Giacomin Computing with Infinite Argumentation
Frameworks: The Case of AFRAs . . . . . 197--214
Tjitze Rienstra and
Alan Perotti and
Serena Villata and
Dov M. Gabbay and
Leendert van der Torre Multi-sorted Argumentation . . . . . . . 215--231
Guido Boella and
Dov M. Gabbay and
Alan Perotti and
Leendert van der Torre and
Serena Villata Conditional Labelling for Abstract
Argumentation . . . . . . . . . . . . . 232--248
Francesca Toni and
Paolo Torroni Bottom-Up Argumentation . . . . . . . . 249--262
Xiuyi Fan and
Francesca Toni A First Step towards Argumentation
Dialogues for Discovery . . . . . . . . 263--279
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Bo Kågström and
Daniel Kressner and
Meiyue Shao On Aggressive Early Deflation in
Parallel Variants of the QR Algorithm 1--10
Klaus Mosegaard Limits to Nonlinear Inversion . . . . . 11--21
Fred G. Gustavson Cache Blocking . . . . . . . . . . . . . 22--32
Jose Luis Vázquez-Poletti and
Gonzalo Barderas and
Ignacio M. Llorente and
Pilar Romero A Model for Efficient Onboard
Actualization of an Instrumental
Cyclogram for the Mars MetNet Mission on
a Public Cloud Infrastructure . . . . . 33--42
Sylvain Contassot-Vivier and
Thomas Jost and
Stéphane Vialle Impact of Asynchronism on GPU
Accelerated Parallel Iterative
Computations . . . . . . . . . . . . . . 43--53
Victor Kostin and
Vadim Lisitsa and
Galina Reshetova and
Vladimir Tcheverda Simulation of Seismic Waves Propagation
in Multiscale Media: Impact of
Cavernous/Fractured Reservoirs . . . . . 54--64
Andreas Adelmann and
Peter Arbenz and
Yves Ineichen Improvements of a Fast Parallel Poisson
Solver on Irregular Domains . . . . . . 65--74
Eryk Laskowski and
Marek Tudruj and
Ivanoe De Falco and
Umberto Scafuri and
Ernesto Tarantino Distributed Java Programs Initial
Mapping Based on Extremal Optimization 75--85
Ewa Niewiadomska-Szynkiewicz and
Michal Marks Software Environment for Parallel
Optimization of Complex Systems . . . . 86--96
Snorri Agnarsson Parallel Programming in Morpho . . . . . 97--107
Kenneth Skovhede and
Morten N. Larsen and
Brian Vinter Extending Distributed Shared Memory for
the Cell Broadband Engine to a Channel
Model . . . . . . . . . . . . . . . . . 108--118
Janusz Borkowski and
Marek Tudruj and
Adam Smyk and
Damian Kopanski Global Asynchronous Parallel Program
Control for Multicore Processors . . . . 119--130
Matthias Lieber and
Verena Grützun and
Ralf Wolke and
Matthias S. Müller and
Wolfgang E. Nagel Highly Scalable Dynamic Load Balancing
in the Atmospheric Modeling System
COSMO-SPECS+FD4 . . . . . . . . . . . . 131--141
Bård Fjukstad and
Tor-Magne Stien Hagen and
Daniel Stòdle and
Phuong Hoai Ha Interactive Weather Simulation and
Visualization on a Display Wall with
Many-Core Compute Nodes . . . . . . . . 142--151
Matthias Petschow and
Paolo Bientinesi The Algorithm of Multiple Relatively
Robust Representations for Multi-core
Processors . . . . . . . . . . . . . . . 152--161
José I. Aliaga and
Matthias Bollhöfer and
Alberto F. Martín and
Enrique S. Quintana-Ortí Parallelization of Multilevel ILU
Preconditioners on Distributed-Memory
Multiprocessors . . . . . . . . . . . . 162--172
José María Cecilia and
José Manuel García and
Manuel Ujaldón CUDA $2$D Stencil Computations for the
Jacobi Method . . . . . . . . . . . . . 173--183
Adam Smyk and
Marek Tudruj Streaming Model Computation of the FDTD
Problem . . . . . . . . . . . . . . . . 184--192
Anna Matsekh and
Alexei Skurikhin and
Lakshman Prasad and
Edward Rosten Numerical Aspects of Spectral
Segmentation on Polygonal Grids . . . . 193--203
Jacek Strzelczyk and
Stanislawa Porzycka Parallel Kriging Algorithm for Unevenly
Spaced Data . . . . . . . . . . . . . . 204--212
Anonymous Front Matter . . . . . . . . . . . . . . ??
Luke Czapla and
Alexey Siretskiy and
John Grime and
Malek O. Khan Free Energy Monte Carlo Simulations on a
Distributed Network . . . . . . . . . . 1--12
Nuria Plattner and
Sharif Kunikeev and
David L. Freeman and
Jimmie D. Doll Numerical Investigation of the Cumulant
Expansion for Fourier Path Integrals . . 13--22
Peter Klüpfel and
Simon Klüpfel and
Kiril Tsemekhman and
Hannes Jónsson Optimization of Functionals of
Orthonormal Functions in the Absence of
Unitary Invariance . . . . . . . . . . . 23--33
Andreas Pedersen and
Jean-Claude Berthet and
Hannes Jónsson Simulated Annealing with Coarse Graining
and Distributed Computing . . . . . . . 34--44
Dóróthea M. Einarsdóttir and
Andri Arnaldsson and
Finnbogi Óskarsson and
Hannes Jónsson Path Optimization with Application to
Tunneling . . . . . . . . . . . . . . . 45--55
Martin Lilleeng Sætra and
André Rigland Brodtkorb Shallow Water Simulations on Multiple
GPUs . . . . . . . . . . . . . . . . . . 56--66
Patrick M. Widener and
Tahsin Kurc and
Wenjin Chen and
Fusheng Wang and
Lin Yang and
Jun Hu High Performance Computing Techniques
for Scaling Image Analysis Workflows . . 67--77
Christian Stussak and
Peter Schenzel Parallel Computation of Bivariate
Polynomial Resultants on Graphics
Processing Units . . . . . . . . . . . . 78--87
Peter Benner and
Pablo Ezzatti and
Daniel Kressner and
Enrique S. Quintana-Ortí and
Alfredo Remón Accelerating Model Reduction of Large
Linear Systems with Graphics Processors 88--97
Òystein E. Krog and
Anne C. Elster Fast GPU-Based Fluid Simulations Using
SPH . . . . . . . . . . . . . . . . . . 98--109
Andrew Davidson and
John Owens Toward Techniques for Auto-tuning GPU
Algorithms . . . . . . . . . . . . . . . 110--119
Andrzej Marciniak An Interval Version of the
Crank--Nicolson Method --- The First
Approach . . . . . . . . . . . . . . . . 120--126
Marco Nehmeier and
Stefan Siegel and
Jürgen Wolff von Gudenberg Parallel Detection of Interval
Overlapping . . . . . . . . . . . . . . 127--136
Bart\lomiej Jacek Kubica and
Adam Wo\'zniak Using the Second-Order Information in
Pareto-set Computations of a
Multi-criteria Problem . . . . . . . . . 137--147
Gerd Bohlender and
Ulrich Kulisch Comments on Fast and Exact Accumulation
of Products . . . . . . . . . . . . . . 148--156
Ma\lgorzata A. Jankowska An Interval Finite Difference Method of
Crank--Nicolson Type for Solving the
One-Dimensional Heat Conduction Equation
with Mixed Boundary Conditions . . . . . 157--167
Walter Krämer and
Michael Zimmer and
Werner Hofschuster Using C-XSC for High Performance
Verified Computing . . . . . . . . . . . 168--178
Nguyen Hong Diep Efficient Implementation of Interval
Matrix Multiplication . . . . . . . . . 179--188
Markward Britsch The Computing Framework for Physics
Analysis at LHCb . . . . . . . . . . . . 189--195
Helmut Neukirchen Taming the Raven --- Testing the Random
Access, Visualization and Exploration
Network RAVEN . . . . . . . . . . . . . 196--205
Anonymous Front Matter . . . . . . . . . . . . . . ??
Abhishek Parakh and
Subhash Kak A New Small World Lattice . . . . . . . 1--8
Siddesh G. M. and
Srinivasa K. G. SLA- Driven Dynamic Resource Allocation
on Clouds . . . . . . . . . . . . . . . 9--18
Jagadeesh Balasubramaniyan and
Sumalatha Ramachandran An Intelligent Cloud System Adopting
File Pre-fetching . . . . . . . . . . . 19--27
Marcin Bazyd\lo and
Szymon Francuzik and
Cezary Sobaniec and
Dariusz Wawrzyniak Replication Infrastructure for RESTful
Web Services . . . . . . . . . . . . . . 28--37
Joon-Mo Yang and
Jun-Yong Park and
Ryum-Duck Oh Context Awareness Acquisition for Safety
Sensor Data Processing on Industrial
Sensor Network . . . . . . . . . . . . . 38--47
D. Paulraj and
S. Swamynathan Content Based Service Discovery in
Semantic Web Services Using WordNet . . 48--56
Demian Antony D'Mello and
Manasa Shetty and
Akshatha Prabhu and
Akshaya and
Adithi Shenoy Optimal Selection of Web Services for
Efficient QoS Driven Web Service
Compositions . . . . . . . . . . . . . . 57--66
Deivamani Mallayya and
Baskaran Ramachandran Reconfigurable Web Service Composition
Using Belief Revision . . . . . . . . . 67--76
PonHarshavardhanan and
J. Akilandeswari and
K. A. Anjali Krishna Semantic Web Service Discovery with
Structural Level Matching of Operations 77--84
Aditya Narang and
Sagar Prakash Joglekar and
Karthikeyan Balaji Dhanapal A Novel Way of Tracking People in an
Indoor Area . . . . . . . . . . . . . . 85--94
Tushar Kanti Bera and
Samir Kumar Biswas and
K. Rajan and
J. Nagaraju Image Reconstruction in Electrical
Impedance Tomography (EIT) with
Projection Error Propagation-based
Regularization (PEPR): a Practical
Phantom Study . . . . . . . . . . . . . 95--105
J. Rekha and
J. Bhattacharya and
S. Majumder Improved Hand Tracking and Isolation
from Face by ICondensation Multi Clue
Algorithm for Continuous Indian Sign
Language Recognition . . . . . . . . . . 106--116
Arpitha M. D. and
Megha P. Arakeri and
G. Ram Mohan Reddy An Approach for Color Edge Detection
with Automatic Threshold Detection . . . 117--124
Anand T. V. and
Madhu S. Nair and
Rao Tatavarti Detection of Straight Lines Using Rule
Directed Pixel Comparison (RDPC) Method 125--134
Praveen Cyriac and
Philomina Simon Performance Analysis of Pedestrian
Detection at Night Time with Different
Classifiers . . . . . . . . . . . . . . 135--145
A. Benjamin Joseph and
Baskaran Ramachandran Enhanced Quality Preserved Image
Compression Technique Using Edge
Assisted Wavelet Based Interpolation . . 146--153
T. Ashwini Reddy and
K. Renuka Devi and
Suryakanth V. Gangashetty Multilayer Feedforward Neural Network
Models for Pattern Recognition Tasks in
Earthquake Engineering . . . . . . . . . 154--162
Pawan Bhaladhare and
Devesh Jinwala A Sensitive Attribute Based Clustering
Method for $k$-Anonymization . . . . . . 163--170
Siddhaling Urolagin and
Prema K. V. and
N. V. Subba Reddy Generalization Capability of Artificial
Neural Network Incorporated with Pruning
Method . . . . . . . . . . . . . . . . . 171--178
Sudha Subramani and
Sathiyabhama Balasubramaniam Post Mining of Diversified Multiple
Decision Trees for Actionable Knowledge
Discovery . . . . . . . . . . . . . . . 179--187
Anonymous Front Matter . . . . . . . . . . . . . . ??
Jacek Kitowski and
Micha\l Tura\la PL-Grid: Foundations and Perspectives of
National Computing Infrastructure . . . 1--14
Marcin Radecki and
Tadeusz Szymocha Integrating Various Grid Middleware
Components and User Services into a
Single Platform . . . . . . . . . . . . 15--26
Marcin Radecki and
Tomasz Szepieniec Towards Professional Service Operations
in Grids . . . . . . . . . . . . . . . . 27--39
Bartosz Bosak and
Jacek Komasa and
Piotr Kopta New Capabilities in QosCosGrid
Middleware for Advanced Job Management,
Advance Reservation and Co-allocation of
Computing Resources --- Quantum
Chemistry Application Use Case . . . . . 40--55
Krzysztof Benedyczak and
Marcin Stolarek Seamless Access to the PL-Grid
e-Infrastructure Using UNICORE
Middleware . . . . . . . . . . . . . . . 56--72
Marcin Jarz\kab and
Jacek Kosi\'nski User-Oriented Provisioning of Secure
Virtualized Infrastructure . . . . . . . 73--88
Jan Meizner and
Eryk Ciepiela and
Piotr Nowakowski Flexible and Extendable Mechanism
Enabling Secure Access to
e-Infrastructures and Storage of
Confidential Data for the GridSpace2
Virtual Laboratory . . . . . . . . . . . 89--101
Gerard Frankowski SARA --- System for Inventory and Static
Security Control in a Grid
Infrastructure . . . . . . . . . . . . . 102--113
Bart\lomiej Balcerek and
Bartosz Szurgot ACARM-ng: Next Generation Correlation
Framework . . . . . . . . . . . . . . . 114--127
Bart\lomiej Balcerek and
Gerard Frankowski Security Best Practices: Applying
Defense-in-Depth Strategy to Protect the
NGI\_PL . . . . . . . . . . . . . . . . 128--141
W\lodzimierz Funika and
Filip Szura Automation of System Monitoring Based on
Fuzzy Logic or Rules; Comparison of Two
Designed Approaches with Regard to
Computational Infrastructures . . . . . 142--156
Renata S\lota and
Dariusz Król A Toolkit for Storage QoS Provisioning
for Data-Intensive Applications . . . . 157--170
Tomasz Szepieniec and
Ma\lgorzata Tomanek Implementation of Service Level
Management in PL-Grid Infrastructure . . 171--181
Bartosz Bosak and
Jan Konczak Highly Integrated Environment for
Parallel Application Development Using
QosCosGrid Middleware . . . . . . . . . 182--190
Bartek Palak and
Pawe\l Wolniewicz User-Friendly Frameworks for Accessing
Computational Resources . . . . . . . . 191--204
Piotr Dziubecki and
Piotr Grabowski Online Web-Based Science Gateway for
Nanotechnology Research . . . . . . . . 205--216
Daniel Har\ke\.zlak and
Marek Kasztelnik Scripting Language Extensions Offered by
the GridSpace Experiment Platform . . . 217--227
Eryk Ciepiela and
Piotr Nowakowski Managing Entire Lifecycles of e-Science
Applications in the GridSpace2 Virtual
Laboratory --- From Motivation through
Idea to Operable Web-Accessible
Environment Built on Top of PL-Grid
e-Infrastructure . . . . . . . . . . . . 228--239
Eryk Ciepiela and
Leszek Zaraska GridSpace2 Virtual Laboratory Case
Study: Implementation of Algorithms for
Quantitative Analysis of Grain
Morphology in Self-assembled Hexagonal
Lattices According to the Hillebrand
Method . . . . . . . . . . . . . . . . . 240--251
Tomasz Jadczyk and
Maciej Malawski Examining Protein Folding Process
Simulation and Searching for Common
Structure Motifs in a Protein Family as
Experiments in the GridSpace2 Virtual
Laboratory . . . . . . . . . . . . . . . 252--264
Anonymous Front Matter . . . . . . . . . . . . . . ??
Sebastian S. Bauer and
Rolf Hennicker and
Martin Wirsing Building a Modal Interface Theory for
Concurrency and Data . . . . . . . . . . 1--12
Hans-Dieter Ehrich My ADT Shrine . . . . . . . . . . . . . 13--24
Jan Kofro\vn and
Franti\vsek Plá\vsil Evolving SOA in the Q-ImPrESS Project 25--26
Paolo Baldan and
Clara Bertolissi Sharing in the Graph Rewriting Calculus 27--41
Roberto Bruni and
Anne Kersten and
Ivan Lanese and
Giorgio Spagnolo A New Strategy for Distributed
Compensations with Interruption in
Long-Running Transactions . . . . . . . 42--60
Pablo F. Castro and
Tom S. E. Maibaum Towards a First-Order Deontic Action
Logic . . . . . . . . . . . . . . . . . 61--75
Christine Choppy and
Gianna Reggio \sc Casl-Mdl, Modelling Dynamic Systems
with a Formal Foundation and a UML-Like
Notation . . . . . . . . . . . . . . . . 76--97
Mihai Codescu Lambda Expressions in \sc Casl
Architectural Specifications . . . . . . 98--117
Mihai Codescu and
Fulya Horozal and
Michael Kohlhase and
Till Mossakowski and
Florian Rabe A Proof Theoretic Interpretation of
Model Theoretic Hiding . . . . . . . . . 118--138
Mihai Codescu and
Fulya Horozal and
Michael Kohlhase and
Till Mossakowski and
Florian Rabe Towards Logical Frameworks in the
Heterogeneous Tool Set Hets . . . . . . 139--159
Andrea Corradini and
Fabio Gadducci and
Leila Ribeiro An Institution for Graph Transformation 160--174
Timothy Bourke and
Alexandre David and
Kim G. Larsen and
Axel Legay and
Didier Lime and
Ulrik Nyman New Results on Timed Specifications . . 175--192
Hans-Jörg Kreowski and
Sabine Kuske and
Caroline von Totth Combining Graph Transformation and
Algebraic Specification into Model
Transformation . . . . . . . . . . . . . 193--208
Ana Paula Maldonado and
Luís Monteiro and
Markus Roggenbach Towards Bialgebraic Semantics for the
Linear Time --- Branching Time Spectrum 209--225
Grzegorz Marczy\'nski Algebraic Signatures Enriched by
Dependency Structure . . . . . . . . . . 226--250
Liam O'Reilly and
Till Mossakowski and
Markus Roggenbach Compositional Modelling and Reasoning in
an Institution for Processes and Data 251--269
Daniel Seidel and
Janis Voigtländer Proving Properties about Functions on
Lists Involving Element Tests . . . . . 270--286
Adrián Riesco Test-Case Generation for Maude
Functional Modules . . . . . . . . . . . 287--301
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Alexandros Paramythis and
Lydia Lau and
Stavros Demetriadis and
Manolis Tzagarakis Adaptive Support for Team Collaboration 1--4
Liliana Ardissono and
Gianni Bosio and
Marino Segnan A Visualization Model Supporting an
Efficient Context Resumption in
Collaboration Environments . . . . . . . 5--17
Toby Dragon and
Bruce M. McLaren and
Manolis Mavrikis and
Eirini Geraniou Scaffolding Collaborative Learning
Opportunities: Integrating Microworld
Use and Argumentation . . . . . . . . . 18--30
Fabian Abel and
Vania Dimitrova and
Eelco Herder and
Geert-Jan Houben Augmenting User Models with Real World
Experiences to Enhance Personalization
and Adaptation . . . . . . . . . . . . . 31--34
Sandro Rodriguez Garzon and
Mark Poguntke The Personal Adaptive In-Car HMI:
Integration of External Applications for
Personalized Use . . . . . . . . . . . . 35--46
Adam Moore and
Victoria Macarthur and
Owen Conlan Core Aspects of Affective Metacognitive
User Models . . . . . . . . . . . . . . 47--59
Amit Tiroshi and
Tsvi Kuflik and
Judy Kay and
Bob Kummerfeld Recommender Systems and the Social Web 60--70
Ahmad Ammari and
Vania Dimitrova and
Dimoklis Despotakis Identifying Relevant YouTube Comments to
Derive Socially Augmented User Models: a
Semantically Enriched Machine Learning
Approach . . . . . . . . . . . . . . . . 71--85
Francesco Ricci and
Giovanni Semeraro and
Marco de Gemmis and
Pasquale Lops Decision Making and Recommendation
Acceptance Issues in Recommender Systems 86--91
Roland Bader and
Wolfgang Woerndl and
Andreas Karitnig and
Gerhard Leitner Designing an Explanation Interface for
Proactive Recommendations in Automotive
Scenarios . . . . . . . . . . . . . . . 92--104
Alexander Felfernig and
Christoph Zehentner and
Gerald Ninaus and
Harald Grabner and
Walid Maalej Group Decision Support for Requirements
Negotiation . . . . . . . . . . . . . . 105--116
Olga C. Santos and
Milos Kravcik and
Diana Pérez-Marín Personalization Approaches in Learning
Environments . . . . . . . . . . . . . . 117--121
Alberto Redondo-Hernández and
Diana Pérez-Marín A Procedure to Automatically Adapt
Questions in Student--Pedagogic
Conversational Agent Dialogues . . . . . 122--134
Iolanda Leite and
André Pereira and
Ginevra Castellano and
Samuel Mascarenhas and
Carlos Martinho Modelling Empathy in Social Robotic
Companions . . . . . . . . . . . . . . . 135--147
Mary Muir and
Cristina Conati Understanding Student Attention to
Adaptive Hints with Eye-Tracking . . . . 148--160
Marcel Berthold and
Pablo Lachmann and
Alexander Nussbaumer and
Sergei Pachtchenko Psycho-pedagogical Mash-Up Design for
Personalising the Learning Environment 161--175
Federica Cena and
Antonina Dattolo and
Ernesto William De Luca and
Pasquale Lops and
Till Plumbaum Semantic Adaptive Social Web . . . . . . 176--180
Ignacio Fernández-Tobías and
Iván Cantador and
Alejandro Bellogín Semantic Disambiguation and
Contextualisation of Social Tags . . . . 181--197
Antonina Dattolo and
Emanuela Pitassi Folkview: a Multi-agent System Approach
to Modeling Folksonomies . . . . . . . . 198--212
Udeep Tandukar and
Julita Vassileva Selective Propagation of Social Data in
Decentralized Online Social Network . . 213--224
Anonymous Front Matter . . . . . . . . . . . . . . ??
Thotreingam Kasar and
Angarai G. Ramakrishnan Multi-script and Multi-oriented Text
Localization from Scene Images . . . . . 1--14
Chucai Yi and
Yingli Tian Assistive Text Reading from Complex
Background for Blind Persons . . . . . . 15--28
Carlos Merino-Gracia and
Karel Lenc and
Majid Mirmehdi A Head-Mounted Device for Recognizing
Text in Natural Scenes . . . . . . . . . 29--41
Aruni Roy Chowdhury and
Ujjwal Bhattacharya and
Swapan K. Parui Text Detection of Two Major Indian
Scripts in Natural Scene Images . . . . 42--57
Chao Zeng and
Wenjing Jia and
Xiangjian He An Algorithm for Colour-Based Natural
Scene Text Segmentation . . . . . . . . 58--68
Yuanping Zhu and
Jun Sun and
Satoshi Naoi Recognizing Natural Scene Characters by
Convolutional Neural Network and Bimodal
Image Enhancement . . . . . . . . . . . 69--82
Qiong Liu and
Chunyuan Liao PaperUI . . . . . . . . . . . . . . . . 83--100
Faisal Shafait and
Michael Patrick Cutter and
Joost van Beusekom and
Syed Saqib Bukhari Decapod: a Flexible, Low Cost
Digitization Solution for Small and
Medium Archives . . . . . . . . . . . . 101--111
Szilárd Vajda and
Leonard Rothacker and
Gernot A. Fink A Method for Camera-Based Interactive
Whiteboard Reading . . . . . . . . . . . 112--125
Syed Saqib Bukhari and
Faisal Shafait and
Thomas M. Breuel Border Noise Removal of Camera-Captured
Document Images Using Page Frame
Detection . . . . . . . . . . . . . . . 126--137
Syed Saqib Bukhari and
Faisal Shafait and
Thomas M. Breuel An Image Based Performance Evaluation
Method for Page Dewarping Algorithms
Using SIFT Features . . . . . . . . . . 138--149
Robert Nagy and
Anders Dicker and
Klaus Meyer-Wegener NEOCR: a Configurable Dataset for
Natural Image Text Recognition . . . . . 150--163
Syed Saqib Bukhari and
Faisal Shafait and
Thomas M. Breuel The IUPR Dataset of Camera-Captured
Document Images . . . . . . . . . . . . 164--171
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Mihhail Aizatulin and
François Dupressoir Verifying Cryptographic Code in C: Some
Experience and the Csec Challenge . . . 1--20
Willem De Groef and
Dominique Devriese and
Frank Piessens Better Security and Privacy for Web
Browsers: a Survey of Techniques, and a
New Implementation . . . . . . . . . . . 21--38
Mário S. Alvim and
Miguel E. Andrés Differential Privacy: On the Trade-Off
between Utility and Information Leakage 39--54
Luciano Bello and
Eduardo Bonelli On-the-Fly Inlining of Dynamic
Dependency Monitors for Secure
Information Flow . . . . . . . . . . . . 55--69
Barbara Espinoza and
Geoffrey Smith Min-Entropy Leakage of Channels in
Cascade . . . . . . . . . . . . . . . . 70--84
Riccardo Focardi and
Flaminia L. Luccio Secure Recharge of Disposable RFID
Tickets . . . . . . . . . . . . . . . . 85--99
Simon N. Foley and
Samane Abdi Avoiding Delegation Subterfuge Using
Linked Local Permission Names . . . . . 100--114
Arnaud Fontaine and
Samuel Hym and
Isabelle Simplot-Ryl Verifiable Control Flow Policies for
Java Bytecode . . . . . . . . . . . . . 115--130
Sibylle Fröschle and
Nils Sommer Concepts and Proofs for Configuring
PKCS#11 . . . . . . . . . . . . . . . . 131--147
Richard Gay and
Heiko Mantel and
Barbara Sprick Service Automata . . . . . . . . . . . . 148--163
Thomas Gibson-Robinson and
Gavin Lowe Analysing Applications Layered on
Unilaterally Authenticating Protocols 164--181
Robert Grabowski and
Martin Hofmann and
Keqin Li Type-Based Enforcement of Secure
Programming Guidelines --- Code
Injection Prevention at SAP . . . . . . 182--197
Timothy L. Hinrichs and
William C. Garrison III TBA: a Hybrid of Logic and Extensional
Access Control Systems . . . . . . . . . 198--213
Sebastian Mödersheim Diffie--Hellman without Difficulty . . . 214--229
Behnam Sattarzadeh and
Mehran S. Fallah Is Cryptyc Able to Detect Insider
Attacks? . . . . . . . . . . . . . . . . 230--244
Ben Smyth and
Mark Ryan and
Liqun Chen Formal Analysis of Anonymity in
ECC-Based Direct Anonymous Attestation
Schemes . . . . . . . . . . . . . . . . 245--262
Mohammad Torabi Dashti and
Jan Cederquist Risk Balance in Optimistic
Non-repudiation Protocols . . . . . . . 263--277
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Joost-Pieter Katoen Model Checking: One Can Do Much More
Than You Think! . . . . . . . . . . . . 1--14
Jan A. Bergstra and
Alban Ponse Proposition Algebra and Short-Circuit
Logic . . . . . . . . . . . . . . . . . 15--31
Luca Aceto and
Arnar Birgisson and
Anna Ingólfsdóttir Decompositional Reasoning about the
History of Parallel Processes . . . . . 32--47
Shekoufeh Kolahdouz-Rahimi and
Kevin Lano A Model-Based Development Approach for
Model Transformations . . . . . . . . . 48--63
Christian Lambertz and
Mila Majster-Cederbaum Analyzing Component-Based Systems on the
Basis of Architectural Constraints . . . 64--79
Hassan Haghighi and
Mohammad Mahdi Javanmard Constructive Development of
Probabilistic Programs . . . . . . . . . 80--95
Mohammad Mahdi Jaghoori Composing Real-Time Concurrent Objects
Refinement, Compatibility and
Schedulability . . . . . . . . . . . . . 96--111
Jan Friso Groote and
Tim W. D. M. Kouters Specification Guidelines to Avoid the
State Space Explosion Problem . . . . . 112--127
Romain Demangeon and
Daniel Hirschkoff Strong Normalisation in $ \lambda
$-Calculi with References . . . . . . . 128--142
Yuxin Deng and
Matthew Hennessy Compositional Reasoning for Markov
Decision Processes . . . . . . . . . . . 143--157
Einar Broch Johnsen and
Thi Mai Thuong Tran and
Olaf Owe Safe Locking for Multi-threaded Java . . 158--173
Yi-Ling Hwong and
Vincent J. J. Kusters Analysing the Control Software of the
Compact Muon Solenoid Experiment at the
Large Hadron Collider . . . . . . . . . 174--189
Minyoung Kim and
Mark-Oliver Stehr and
Carolyn Talcott A Distributed Logic for Networked
Cyber-Physical Systems . . . . . . . . . 190--205
Hallstein Asheim Hansen and
Gerardo Schneider Reachability Analysis of Non-linear
Planar Autonomous Systems . . . . . . . 206--220
Qiusong Yang and
Bei Zhang and
Jian Zhai and
Mingshu Li Attacking the Dimensionality Problem of
Parameterized Systems via Bounded
Reachability Graphs . . . . . . . . . . 221--235
Maryam Kamali and
Luigia Petre and
Kaisa Sere Refinement-Based Modeling of $3$D NoCs 236--252
Hamid Reza Asaadi and
Ramtin Khosravi Towards Model-Based Testing of
Electronic Funds Transfer Systems . . . 253--267
Luca Aceto and
Ignacio Fábregas Relating Modal Refinements,
Covariant-Contravariant Simulations and
Partial Bisimulations . . . . . . . . . 268--283
Chaodong He and
Yuxi Fu and
Hongfei Fu Decidability of Behavioral Equivalences
in Process Calculi with Name Scoping . . 284--298
Roméo Courbis Rewriting Approximations for Properties
Verification over CCS Specifications . . 299--315
Anonymous Front Matter . . . . . . . . . . . . . . ??
Ehab ElGindy and
Alia Abdelmoty Enhancing the Quality of Place Resources
in Geo-folksonomies . . . . . . . . . . 1--12
Huaishuai Wang and
Peiquan Jin and
Lei Zhao and
Lanlan Zhang and
Lihua Yue Generating Semantic-Based Trajectories
for Indoor Moving Objects . . . . . . . 13--25
Ying Fang and
Jiaheng Cao and
Junzhou Wang and
Yuwei Peng and
Wei Song HTPR*-Tree: An Efficient Index for
Moving Objects to Support Predictive
Query and Partial History Query . . . . 26--39
Michael Meyers and
Bruce A. Ralston Developing Rich Web GIS Applications for
Visual Analytics . . . . . . . . . . . . 40--50
Htoo Htoo and
Yutaka Ohsawa and
Noboru Sonehara Single-Source Multi-Target A* Algorithm
for POI Queries on Road Network . . . . 51--62
Weimo Liu and
Yinan Jing and
Kunjie Chen and
Weiwei Sun Combining Top-$k$ Query in Road Networks 63--75
Qingqing Zhang and
Peiquan Jin and
Sheng Lin and
Lihua Yue Extracting Focused Locations for Web
Pages . . . . . . . . . . . . . . . . . 76--89
Yuchi Ma and
Chunyan Qu and
Tingting Liu and
Ning Yang and
Changjie Tang Searching Similar Trajectories in Real
Time: An Effectiveness and Efficiency
Study . . . . . . . . . . . . . . . . . 90--102
Filip K\vri\vzka and
Michal Krátký and
Radim Ba\vca and
Peter Chovanec Multidimensional Implementation of
Stream ADT . . . . . . . . . . . . . . . 103--112
Ruiming Tang and
Huayu Wu and
Stéphane Bressan Measuring XML Structured-ness with
Entropy . . . . . . . . . . . . . . . . 113--123
Yue Wang and
Hongzhi Wang and
Yang Wang and
Hong Gao Similarity Join on XML Based on
$k$-Generation Set Distance . . . . . . 124--135
Caiyun Yao and
Jiaheng Lu and
Wei Wang and
Xiaofang Zhou XML Query Processing Using Views . . . . 136--139
Xia Li and
Zhanhuai Li and
PeiYing Wang and
Qun Chen and
Lijun Zhang and
Ning Li XIO-SLCA: Optimize SLCA for Effective
Keyword Search in XML Documents . . . . 140--149
Fahad Alahmari and
Eric Pardede The Development of XML Stored Procedures
in XML Enabled Databases . . . . . . . . 150--159
Jingjiao Li and
Limei Sun and
Jiao Wang A Slope One Collaborative Filtering
Recommendation Algorithm Using Uncertain
Neighbors Optimizing . . . . . . . . . . 160--166
Di He and
Zhiyong Peng and
Liang Hong and
Yu Zhang A Social Reputation Management for Web
Communities . . . . . . . . . . . . . . 167--174
Dongzhan Zhang and
Chao Xu A Collaborative Filtering Recommendation
System by Unifying User Similarity and
Item Similarity . . . . . . . . . . . . 175--184
Rongrong Li and
Weixiang Zhai and
Zhiyong Peng Supporting Query over Dynamic
Combination of Data Sources for Social
Media . . . . . . . . . . . . . . . . . 185--196
Kaisong Song and
Daling Wang and
Shi Feng and
Ge Yu Detecting Opinion Leader Dynamically in
Chinese News Comments . . . . . . . . . 197--209
Daling Wang and
Shi Feng and
Chao Yan and
Ge Yu An Approach of Semi-automatic Public
Sentiment Analysis for Opinion and
District . . . . . . . . . . . . . . . . 210--222
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Jeremy M. Wolfe The Rules of Guidance in Visual Search 1--10
N. K. Suryadevara and
T. Quazi and
Subhas C. Mukhopadhyay Smart Sensing System for Human Emotion
and Behaviour Recognition . . . . . . . 11--22
Nikhil Ranjan Pal Fuzzy Rule-Based Approaches to
Dimensionality Reduction . . . . . . . . 23--27
Osamu Yamaguchi Face Recognition Technology and Its
Real-World Application . . . . . . . . . 28--34
Atanendu Sekhar Mandal Contextual Effects in the Visual Cortex
Area 1 (V1) and Camouflage Perception 35--41
Dana Sugu and
Amita Chatterjee Affective Information Processing and
Representations . . . . . . . . . . . . 42--49
Rakesh S. and
Kailash Atal and
Ashish Arora and
Pulak Purkait and
Bhabatosh Chanda Face Image Retrieval Based on Probe
Sketch Using SIFT Feature Descriptors 50--57
Asok Bandyopadhyay and
Bhaswati Mukherjee and
Bidyut Baran Chaudhuri Effect of Perceptual Anchorage Points on
Recognition of Bangla Characters . . . . 58--65
Ashish Bakshi and
Kuntal Ghosh Scaling Properties of Mach Bands and
Perceptual Models . . . . . . . . . . . 66--74
Apurba Das and
Suparna Parua Psycho-Visual Evaluation of Contrast
Enhancement Algorithms by Adaptive
Neuro-Fuzzy Inference System . . . . . . 75--83
Fumito Hamada and
Edson T. Miyamoto Theory of Mind in Man-Machine
Interactions . . . . . . . . . . . . . . 84--89
Naman Dauthal and
Surya Prakash and
Phalguni Gupta Face Recognition System Invariant to
Light-Camera Setup . . . . . . . . . . . 90--97
Sarvesh Vishwakarma and
Anupam Agrawal Representing Feature Quantization
Approach Using Spatial-Temporal Relation
for Action Recognition . . . . . . . . . 98--105
Siddharth S. Rautaray and
Anand Kumar and
Anupam Agrawal Human Computer Interaction with Hand
Gestures in Virtual Environment . . . . 106--113
Amit Konar and
Aruna Chakraborty and
Anisha Halder and
Rajshree Mandal and
Ramadoss Janarthanan Interval Type-$2$ Fuzzy Model for
Emotion Recognition from Facial
Expression . . . . . . . . . . . . . . . 114--121
Nandini Bondale and
Gaurav Gupta Augmenting Language Tools for Effective
Communication . . . . . . . . . . . . . 122--128
Debmalya Sinha and
Anupam Basu Design and Evaluation of a Cognition
Aware File Browser for Users in Rural
India . . . . . . . . . . . . . . . . . 129--136
Amit Singhal and
Santanu Chaudhury and
Sumantra Dutta Roy Shiksha: a Novel Architecture for
Tele-teaching Using Handwriting as a
Perceptually Significant Temporal Media 137--144
Chandrani Saha and
Washef Ahmed and
Soma Mitra A New Motion Based Fully Automatic
Facial Expression Recognition System . . 145--154
Koichi Yoshida and
Emiko Ishikawa and
Maltesh Joshi and
Hervé Lechat and
Fatma Ayouni Profiling Scotch Malt Whisky Spirits
from Different Distilleries Using an
Electronic Nose and an Expert Sensory
Panel . . . . . . . . . . . . . . . . . 155--162
Anonymous Front Matter . . . . . . . . . . . . . . ??
Raghunath Nambiar and
Nicholas Wakou Shaping the Landscape of Industry
Standard Benchmarks: Contributions of
the Transaction Processing Performance
Council (TPC) . . . . . . . . . . . . . 1--9
Florian Funke and
Alfons Kemper Metrics for Measuring the Performance of
the Mixed Workload CH-benCHmark . . . . 10--30
Daniel Schall and
Volker Hoefner and
Manuel Kern Towards an Enhanced Benchmark Advocating
Energy-Efficient Systems . . . . . . . . 31--45
Umeshwar Dayal and
Kevin Wilkinson Optimization of Analytic Data Flows for
Next Generation Business Intelligence
Applications . . . . . . . . . . . . . . 46--66
Anja Bog and
Kai Sachs and
Alexander Zeier Normalization in a Mixed OLTP and OLAP
Workload Scenario . . . . . . . . . . . 67--82
Torsten Grabs Measuring Performance of Complex Event
Processing Systems . . . . . . . . . . . 83--96
Karl Huppler Benchmarking with Your Head in the Cloud 97--110
Yantao Li and
Charles Levine Extending TPC-E to Measure Availability
in Database Systems . . . . . . . . . . 111--122
Robert Gottstein and
Ilia Petrov SI-CV: Snapshot Isolation with
Co-located Versions . . . . . . . . . . 123--136
Alain Crolotte and
Ahmad Ghazal Introducing Skew into the TPC-H
Benchmark . . . . . . . . . . . . . . . 137--145
Christina Delimitrou and
Sriram Sankar Time and Cost-Efficient Modeling and
Generation of Large-Scale TPCC/TPCE/TPCH
Workloads . . . . . . . . . . . . . . . 146--162
Avrilia Floratou and
Jignesh M. Patel When Free Is Not Really Free: What Does
It Cost to Run a Database Workload in
the Cloud? . . . . . . . . . . . . . . . 163--179
Jianhai Chen and
Dawei Huang and
Bei Wang A Fine-Grained Performance-Based
Decision Model for Virtualization
Application Solution . . . . . . . . . . 180--195
Meikel Poess and
Tilmann Rabl and
Michael Frank A PDGF Implementation for TPC-H . . . . 196--212
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Stéphane Bonneaud and
Kevin Rio and
Pierre Chevaillier and
William H. Warren Accounting for Patterns of Collective
Behavior in Crowd Locomotor Dynamics for
Realistic Simulations . . . . . . . . . 1--11
Julien Valentin and
Florent Coudret and
Eric Gouard\`eres and
Wilfrid Lefer Human Behaviour Modelling for Simulating
Evacuation of Buildings on Fire . . . . 12--23
Lin Zhang and
Qing Liu Application of Simulation and Virtual
Reality to Physical Education and
Athletic Training . . . . . . . . . . . 24--33
Wei Hua and
Wenzhuo Yang and
Zilong Dong and
Guofeng Zhang Depth-Varying Human Video Sprite
Synthesis . . . . . . . . . . . . . . . 34--47
Yejin Kim and
Michael Neff Automating Expressive Locomotion
Generation . . . . . . . . . . . . . . . 48--61
Wenshan Fan and
Bin Wang and
Bin Chan and
Jean-Claude Paul and
Jiaguang Sun Recovering Geometric Detail by Octree
Normal Maps . . . . . . . . . . . . . . 62--73
Jianxin Luo and
Guiqiang Ni and
Ping Cui and
Jinsong Jiang and
Yifeng Duan and
Guyu Hu Quad-Tree Atlas Ray Casting: a GPU Based
Framework for Terrain Visualization and
Its Applications . . . . . . . . . . . . 74--85
Shao-Shin Hung and
Chih Ming Chiu and
Tsou Tsun Fu and
Jung-Tsung Chen and
Derchian Tsaih Clustering Spatial Data for Aggregate
Query Processing in Walkthrough: a
Hypergraph Approach . . . . . . . . . . 86--98
Yujian Gao and
Aimin Hao and
Qinping Zhao Skin-Detached Surface for Interactive
Large Mesh Editing . . . . . . . . . . . 99--109
Shiguang Liu and
Tai An and
Zheng Gong and
Ichiro Hagiwara Physically Based Simulation of Solid
Objects' Burning . . . . . . . . . . . . 110--120
Chao Wang and
Yu Wu and
Tingting Zhu and
Hongbo Li and
Mingliang Xu Tunneling Blasting Simulation for
Digital Mine . . . . . . . . . . . . . . 121--128
Gustavo Aranda and
Tomas Trescak and
Marc Esteva and
Inmaculada Rodriguez and
Carlos Carrascosa Massively Multiplayer Online Games
Developed with Agents . . . . . . . . . 129--138
Zhiying He and
Xiaohui Liang and
Qinping Zhao A Novel Skeletonization and Animation
Approach for Point Models . . . . . . . 139--150
Xin Zhang and
Zi'ang Ding and
Chuan Zhu and
Wei Chen and
Qunsheng Peng View-Dependent Line Drawings for $3$D
Scenes . . . . . . . . . . . . . . . . . 151--160
Nicolas Szilas and
Monica Axelrad and
Urs Richle Propositions for Innovative Forms of
Digital Interactive Storytelling Based
on Narrative Theories and Practices . . 161--179
Shengnan Chen and
Zhigeng Pan and
Mingmin Zhang A Virtual Informal Learning System for
Cultural Heritage . . . . . . . . . . . 180--187
Xingquan Cai and
Jie Li and
Haiyan Sun and
Jinhong Li Multi-samples Texture Synthesis for
Dynamic Terrain Based on Constraint
Conditions . . . . . . . . . . . . . . . 188--196
Zhicheng Liu and
Zhijun Fang PCA and FLD in DWT Domain . . . . . . . 197--204
Shidu Dong and
Xiaofan Yang and
Huaqiu Wang and
Xiang Liu and
Hengyang Liu Area Measurement Method of Paint Bubble
Based on Computer Vision . . . . . . . . 205--213
Xifan Shi and
Xianghua Chen and
Tiefeng Cai A High Precision Fresco Scanner . . . . 214--221
Anonymous Front Matter . . . . . . . . . . . . . . ??
Ahmed Bouajjani and
Cezara Dr\uagoi Abstract Domains for Automated Reasoning
about List-Manipulating Programs with
Infinite Data . . . . . . . . . . . . . 1--22
Ranjit Jhala Software Verification with Liquid Types 23--23
Tobias Nipkow Teaching Semantics with a Proof
Assistant: No More LSD Trip Proofs . . . 24--38
Aws Albarghouthi and
Arie Gurfinkel Whale: An Interpolation-Based Algorithm
for Inter-procedural Verification . . . 39--55
Samik Basu and
Tevfik Bultan and
Meriem Ouederni Synchronizability for Verification of
Asynchronously Communicating Systems . . 56--71
Amir M. Ben-Amram and
Samir Genaim On the Termination of Integer Loops . . 72--87
Laura Bozzelli and
Sophie Pinchinat Verification of Gap-Order Constraint
Abstractions of Counter Systems . . . . 88--103
Dmitry Bugaychenko On Application of Multi-Rooted Binary
Decision Diagrams to Probabilistic Model
Checking . . . . . . . . . . . . . . . . 104--118
Sagar Chaki and
Arie Gurfinkel and
Ofer Strichman Regression Verification for
Multi-threaded Programs . . . . . . . . 119--135
Nathaniel Charlton and
Ben Horsfall Crowfoot: a Verifier for Higher-Order
Store Programs . . . . . . . . . . . . . 136--151
Krishnendu Chatterjee and
Vishwanath Raman Synthesizing Protocols for Digital
Contract Signing . . . . . . . . . . . . 152--168
Rayna Dimitrova and
Bernd Finkbeiner Model Checking Information Flow in
Reactive Systems . . . . . . . . . . . . 169--185
Evren Ermis and
Jochen Hoenicke Splitting via Interpolants . . . . . . . 186--201
Pietro Ferrara and
Peter Müller Automatic Inference of Access
Permissions . . . . . . . . . . . . . . 202--218
Bernd Finkbeiner and
Swen Jacobs Lazy Synthesis . . . . . . . . . . . . . 219--234
Khalil Ghorbal and
Franjo Ivan\vci\'c Donut Domains: Efficient Non-convex
Domains for Abstract Interpretation . . 235--250
Falk Howar and
Bernhard Steffen and
Bengt Jonsson Inferring Canonical Register Automata 251--266
Johannes Kinder and
Dmitry Kravchenko Alternating Control Flow Reconstruction 267--282
Uri Klein and
Nir Piterman and
Amir Pnueli Effective Synthesis of Asynchronous
Systems from GR(1) Specifications . . . 283--298
Woosuk Lee and
Wonchan Lee and
Kwangkeun Yi Sound Non-statistical Clustering of
Static Analysis Alarms . . . . . . . . . 299--314
Anonymous Front Matter . . . . . . . . . . . . . . ??
Boon Thau Loo and
Harjot Gill and
Changbin Liu Recent Advances in Declarative
Networking . . . . . . . . . . . . . . . 1--16
Don Stewart Make Things Now! Pragmatic Functional
Programming in Haskell . . . . . . . . . 17--17
Mayer Goldberg and
Guy Wiener A Declarative Approach for Software
Modeling . . . . . . . . . . . . . . . . 18--32
Sergio Antoy and
Michael Hanus Contracts and Specifications for
Functional Logic Programming . . . . . . 33--47
Pedro M. Martins and
Julie A. McCann The Environment as an Argument . . . . . 48--62
Yuliya Lierler and
Shaden Smith Weighted-Sequence Problem: ASP vs CASP
and Declarative vs Problem-Oriented
Solving . . . . . . . . . . . . . . . . 63--77
Marcello Balduccini and
Yulia Lierler Practical and Methodological Aspects of
the Use of Cutting-Edge ASP Tools . . . 78--92
Christian Theil Have and
Henning Christiansen Efficient Tabling of Structured Data
Using Indexing and Program
Transformation . . . . . . . . . . . . . 93--107
Dario Campagna and
Beata Sarna-Starosta Optimizing Inequality Joins in Datalog
with Approximated Constraint Propagation 108--122
Elvira Albert and
Puri Arenas Symbolic Execution of Concurrent Objects
in CLP . . . . . . . . . . . . . . . . . 123--137
Pablo Chico de Guzmán and
Amadeo Casas A Segment-Swapping Approach for
Executing Trapped Computations . . . . . 138--152
Michael Lesniak Palovca: Describing and Executing Graph
Algorithms in Haskell . . . . . . . . . 153--167
Kenny Q. Zhu and
Kathleen Fisher and
David Walker LearnPADS$^{++}$: Incremental Inference
of Ad Hoc Data Formats . . . . . . . . . 168--182
Jeroen Bransen and
Arie Middelkoop The Kennedy--Warren Algorithm Revisited:
Ordering Attribute Grammars . . . . . . 183--197
Nicholas Coleman Distributed Policy Specification and
Interpretation with Classified
Advertisements . . . . . . . . . . . . . 198--211
Andy Gill and
Bowe Neuenschwander Handshaking in Kansas Lava Using Patch
Logic . . . . . . . . . . . . . . . . . 212--226
Daniel Winograd-Cort and
Hai Liu and
Paul Hudak Virtualizing Real-World Objects in FRP 227--241
Edwin Brady and
Kevin Hammond Resource-Safe Systems Programming with
Embedded Domain Specific Languages . . . 242--257
David Broman and
Henrik Nilsson Node-Based Connection Semantics for
Equation-Based Object-Oriented Modeling
Languages . . . . . . . . . . . . . . . 258--272
Paul Tarau A Declarative Specification of
Tree-Based Symbolic Arithmetic
Computations . . . . . . . . . . . . . . 273--288
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Aminul Haque and
Saadat M. Alhashmi and
Rajendran Parthiban An Inspiration for Solving Grid Resource
Management Problems Using Multiple
Economic Models . . . . . . . . . . . . 1--16
Melanie Siebenhaar and
The An Binh Nguyen and
Ulrich Lampe and
Dieter Schuller and
Ralf Steinmetz Concurrent Negotiations in Cloud-Based
Systems . . . . . . . . . . . . . . . . 17--31
Joris Roovers and
Kurt Vanmechelen and
Jan Broeckhove A Reverse Auction Market for Cloud
Resources . . . . . . . . . . . . . . . 32--45
Mohammad Mahdi Kashef and
Jörn Altmann A Cost Model for Hybrid Clouds . . . . . 46--60
Hristo Stefanov and
Slinger Jansen and
Ronald Batenburg and
Eugene van Heusden and
Ravi Khadka How to Do Successful Chargeback for
Cloud Services . . . . . . . . . . . . . 61--75
Andreas Menychtas and
Sergio Garcia Gomez and
Andrea Giessmann and
Anna Gatzioura A Marketplace Framework for Trading
Cloud-Based Services . . . . . . . . . . 76--89
Mario Macías and
Jordi Guitart Client Classification Policies for SLA
Negotiation and Allocation in Shared
Cloud Datacenters . . . . . . . . . . . 90--104
Wei Zheng and
Rizos Sakellariou Budget-Deadline Constrained Workflow
Planning for Admission Control in
Market-Oriented Environments . . . . . . 105--119
Wubin Li and
Johan Tordsson and
Erik Elmroth Virtual Machine Placement for
Predictable and Time-Constrained Peak
Loads . . . . . . . . . . . . . . . . . 120--134
Ioan Petri and
Omer F. Rana and
Yacine Regzui and
Gheorghe Cosmin Silaghi Risk Assessment in Service Provider
Communities . . . . . . . . . . . . . . 135--147
Jörn Künsemöller and
Holger Karl A Game-Theoretical Approach to the
Benefits of Cloud Computing . . . . . . 148--160
Shubhashis Sengupta and
K. M. Annervaz Planning for Optimal Multi-site Data
Distribution for Disaster Recovery . . . 161--172
Wei Shi and
Dapeng Ju and
Dongsheng Wang Saga: a Cost Efficient File System Based
on Cloud Storage Service . . . . . . . . 173--184
A. Stephen McGough Developing a Cost-Effective Virtual
Cluster on the Cloud . . . . . . . . . . 185--197
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Dominique Méry and
Neeraj Kumar Singh Medical Protocol Diagnosis Using Formal
Methods . . . . . . . . . . . . . . . . 1--20
Jim Davies and
Jeremy Gibbons and
Radu Calinescu and
Charles Crichton and
Steve Harris and
Andrew Tsui Form Follows Function . . . . . . . . . 21--38
Thomas Hildebrandt and
Raghava Rao Mukkamala and
Tijs Slaats Declarative Modelling and Safe
Distribution of Healthcare Workflows . . 39--56
Cristiano Bertolini and
Martin Schäf and
Volker Stolz Towards a Formal Integrated Model of
Collaborative Healthcare Workflows . . . 57--74
Wendy MacCaull and
Fazle Rabbi NOVA Workflow: a Workflow Management
Tool Targeting Health Services Delivery 75--92
Jozef Hooman and
Robert Huis in 't Veld and
Mathijs Schuts Experiences with a Compositional Model
Checker in the Healthcare Domain . . . . 93--110
Fazle Rabbi and
Ahmed Shah Mashiyat and
Wendy MacCaull Model Checking Workflow Monitors and Its
Application to a Pain Management Process 111--128
Deshendran Moodley and
Anban W. Pillay and
Christopher J. Seebregts Position Paper: Researching and
Developing Open Architectures for
National Health Information Systems in
Developing African Countries . . . . . . 129--139
Dominique Méry and
Neeraj Kumar Singh Formalization of Heart Models Based on
the Conduction of Electrical Impulses
and Cellular Automata . . . . . . . . . 140--159
Hao Xu and
Tom Maibaum An Event-B Approach to Timing Issues
Applied to the Generic Insulin Infusion
Pump . . . . . . . . . . . . . . . . . . 160--176
Jens H. Weber-Jahnke and
Fieran Mason-Blakley On the Safety of Electronic Medical
Records . . . . . . . . . . . . . . . . 177--194
Naipeng Dong and
Hugo Jonker and
Jun Pang Challenges in eHealth: From Enabling to
Enforcing Privacy . . . . . . . . . . . 195--206
Samuel Tusubira Kalyango and
Gilbert Maiga A Technique for Strengthening Weak
Passwords in Electronic Medical Record
Systems . . . . . . . . . . . . . . . . 207--224
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Wolfgang Paul Cyber War, Formal Verification and
Certified Infrastructure . . . . . . . . 1--1
Paolo Herms and
Claude Marché and
Benjamin Monate A Certified Multi-prover Verification
Condition Generator . . . . . . . . . . 2--17
Sabine Schmaltz and
Andrey Shadrin Integrated Semantics of
Intermediate-Language C and
Macro-Assembler for Pervasive Formal
Verification of Operating Systems and
Hypervisors from VerisoftXT . . . . . . 18--33
Gregory Kulczycki and
Hampton Smith The Location Linking Concept: a Basis
for Verification of Code Using Pointers 34--49
Nadia Polikarpova and
Micha\l Moskal Verifying Implementations of Security
Protocols by Refinement . . . . . . . . 50--65
Thomas Wies and
Marco Muñiz and
Viktor Kuncak Deciding Functional Lists with Sublist
Sets . . . . . . . . . . . . . . . . . . 66--81
K. Rustan and
M. Leino Developing Verified Programs with Dafny 82--82
Jean-Christophe Filliâtre Verifying Two Lines of C with Why3: An
Exercise in Program Verification . . . . 83--97
Milena Vujo\vsevi\'c-Jani\vci\'c and
Viktor Kuncak Development and Evaluation of LAV: An
SMT-Based Error Finding Platform . . . . 98--113
Martin Brain and
Florian Schanda A Lightweight Technique for Distributed
and Incremental Program Verification . . 114--129
Loren Segal and
Patrice Chalin A Comparison of Intermediate
Verification Languages: Boogie and
Sireum/Pilar . . . . . . . . . . . . . . 130--145
Florian Merz and
Stephan Falke LLBMC: Bounded Model Checking of C and
C++ Programs Using a Compiler IR . . . . 146--161
Rupak Majumdar The Marriage of Exploration and
Deduction . . . . . . . . . . . . . . . 162--162
Nguyen Van Tang and
Daisuke Souma Modeling and Validating the Train Fare
Calculation and Adjustment System Using
VDM++ . . . . . . . . . . . . . . . . . 163--178
Hannes Mehnert and
Filip Sieczkowski Formalized Verification of Snapshotable
Trees: Separation and Sharing . . . . . 179--195
Ioannis T. Kassios and
Peter Müller Comparing Verification Condition
Generation with Symbolic Execution: An
Experience Report . . . . . . . . . . . 196--208
Eyad Alkassar and
Ernie Cohen and
Mikhail Kovalev Verification of TLB Virtualization
Implemented in C . . . . . . . . . . . . 209--224
Amalinda Post and
Jochen Hoenicke Formalization and Analysis of Real-Time
Requirements: a Feasibility Study at
BOSCH . . . . . . . . . . . . . . . . . 225--240
Francesco Logozzo Our Experience with the CodeContracts
Static Checker . . . . . . . . . . . . . 241--242
Abderrahmane Feliachi and
Marie-Claude Gaudel Isabelle/Circus: a Process Specification
and Verification Environment . . . . . . 243--260
Anonymous Front Matter . . . . . . . . . . . . . . ??
Thomas Eiter and
Thomas Krennwallner and
Patrik Schneider and
Guohui Xiao Uniform Evaluation of Nonmonotonic
DL-Programs . . . . . . . . . . . . . . 1--22
Thomas Schwentick Foundations of XML Based on Logic and
Automata: a Snapshot . . . . . . . . . . 23--33
Ofer Arieli and
Anna Zamansky Inconsistency-Tolerance in
Knowledge-Based Systems by
Dissimilarities . . . . . . . . . . . . 34--50
Joachim Biskup and
Cornelia Tadros Revising Belief without Revealing
Secrets . . . . . . . . . . . . . . . . 51--70
Jürgen Bock and
Sebastian Rudolph and
Michael Mutter More Than the Sum of Its Parts ---
Holistic Ontology Alignment by
Population-Based Optimisation . . . . . 71--90
Luciano Caroprese and
Ester Zumpano Handling Preferences in P2P Systems . . 91--106
Andrea Cohen and
Alejandro J. García and
Guillermo R. Simari Backing and Undercutting in Abstract
Argumentation Frameworks . . . . . . . . 107--123
George H. L. Fletcher and
Marc Gyssens and
Dirk Leinders and
Jan Van den Bussche and
Dirk Van Gucht The Impact of Transitive Closure on the
Boolean Expressiveness of Navigational
Query Languages on Graphs . . . . . . . 124--143
Eve Garnaud and
Sofian Maabout and
Mohamed Mosbah Using Functional Dependencies for
Reducing the Size of a Data Cube . . . . 144--163
Sven Hartmann and
Henning Köhler and
Sebastian Link and
Bernhard Thalheim Armstrong Databases and Reasoning for
Functional Dependencies and Cardinality
Constraints over Partial Bags . . . . . 164--183
Stephen J. Hegner FD Covers and Universal Complements of
Simple Projections . . . . . . . . . . . 184--202
Gyula O. H. Katona and
Krisztián Tichler Encoding Databases Satisfying a Given
Set of Dependencies . . . . . . . . . . 203--223
Annika Krämer and
Christoph Beierle On Lifted Inference for a Relational
Probabilistic Conditional Logic with
Maximum Entropy Semantics . . . . . . . 224--243
András J. Molnár and
András A. Benczúr and
Csaba István Sidló Flexible and Efficient Distributed
Resolution of Large Entities . . . . . . 244--263
Aleksandar Perovi\'c and
Dragan Doder and
Zoran Ognjanovi\'c On Real-Valued Evaluation of
Propositional Formulas . . . . . . . . . 264--277
Olivier Pivert and
Henri Prade Detecting Suspect Answers in the
Presence of Inconsistent Information . . 278--297
Krishnan Rajagopalan and
Venkatesh Srinivasan and
Alex Thomo Learning the News in Social Networks . . 298--311
Abdur Rakib and
Rokan Uddin Faruqui and
Wendy MacCaull Verifying Resource Requirements for
Ontology-Driven Rule-Based Agents . . . 312--331
Martín Rezk and
Michael Kifer Formalizing Production Systems with
Rule-Based Ontologies . . . . . . . . . 332--351
Domenico Sacc\`a and
Edoardo Serra and
Antonella Guzzo Count Constraints and the Inverse OLAP
Problem: Definition, Complexity and a
Step toward Aggregate Data Exchange . . 352--369
Anonymous Front Matter . . . . . . . . . . . . . . ??
N. Asokan and
Cynthia Kuo Usable Mobile Security . . . . . . . . . 1--6
Dusko Pavlovic and
Catherine Meadows Actor-Network Procedures . . . . . . . . 7--26
Yoram Moses Knowledge as a Window into Distributed
Coordination . . . . . . . . . . . . . . 27--34
Lynne E. Parker Decision Making as Optimization in
Multi-robot Teams . . . . . . . . . . . 35--49
Nibedita Adhikari and
C. R. Tripathy Mstar: a New Two Level Interconnection
Network . . . . . . . . . . . . . . . . 50--61
C. Anudeep and
Manik Lal Das An Improved Scheme for False Data
Filtering in Wireless Sensor Networks 62--70
Jhansi Vazram Bolla and
Valli Kumari Vatsavayi Anonymity and Security in Mobile Ad Hoc
Networks . . . . . . . . . . . . . . . . 71--82
Ayan Dutta and
Sruti Gan Chaudhuri Circle Formation by Asynchronous Fat
Robots with Limited Visibility . . . . . 83--93
V. Geetha and
N. Sreenath High Concurrency for Continuously
Evolving OODBMS . . . . . . . . . . . . 94--105
J. Hanumanthappa and
D. H. Manjaiah A New Scheme for IPv6 BD-TTCS Translator 106--116
Shankara Narayanan Krishna Nash Equilibrium in Weighted Concurrent
Timed Games with Reachability Objectives 117--128
Tarun Kumar and
Parikshit Sondhi and
Ankush Mittal Parallelization of PageRank on Multicore
Processors . . . . . . . . . . . . . . . 129--140
Chun-Guang Ma and
Ding Wang and
Qi-Ming Zhang Cryptanalysis and Improvement of Sood et
al.'s Dynamic ID-Based Authentication
Scheme . . . . . . . . . . . . . . . . . 141--152
Hrushikesha Mohanty An Algebra of Social Distance . . . . . 153--165
Anil Mundra and
Anish Mathuria and
Manik Lal Das Detecting Flaws in Dynamic Hierarchical
Key Management Schemes Using
Specification Animation . . . . . . . . 166--176
Bhawani S. Panda and
D. Pushparaj Shetty Strong Minimum Energy Minimum
Interference Topology in Wireless Sensor
Networks . . . . . . . . . . . . . . . . 177--187
Arun Pande and
Sanjay Kimbahune Distributed Processing and Internet
Technology to Solve Challenges of
Primary Healthcare in India . . . . . . 188--199
Nidhi Patel and
Sanjay Srivastava Packet Forwarding Strategies for
Cooperation Enforcement in Mobile Ad Hoc
Wireless Networks . . . . . . . . . . . 200--211
R. S. M. Lakshmi Patibandla A Study on Scalability of Services and
Privacy Issues in Cloud Computing . . . 212--230
Chhavi Rana and
Sanjay Kumar Jain A Recommendation Model for Handling
Dynamics in User Profile . . . . . . . . 231--241
Anonymous Front Matter . . . . . . . . . . . . . . ??
Beniamino Di Martino and
Dana Petcu CCPI 2011: Workshop on Cloud Computing
Projects and Initiatives . . . . . . . . 1--3
Magdalena Slawinska and
Jaroslaw Slawinski and
Vaidy Sunderam Towards Cross-Platform Cloud Computing 5--14
Giuseppe Cicotti and
Luigi Coppolino and
Rosario Cristaldi and
Salvatore D'Antonio and
Luigi Romano QoS Monitoring in a Cloud Services
Environment: The SRT-15 Approach . . . . 15--24
Daniele Lezzi and
Roger Rafanell and
Abel Carrión and
Ignacio Blanquer Espert and
Vicente Hernández Enabling e-Science Applications on the
Cloud with COMPSs . . . . . . . . . . . 25--34
Spyridon V. Gogouvitis and
George Kousiouris and
George Vafiadis and
Elliot K. Kolodner OPTIMIS and VISION Cloud: How to Manage
Data in Clouds . . . . . . . . . . . . . 35--44
Roberto Palmieri and
Pierangelo di Sanzo and
Francesco Quaglia and
Paolo Romano Integrated Monitoring of Infrastructures
and Applications in Cloud Environments 45--53
Siegfried Benkner and
Jesus Bisbal and
Gerhard Engelbrecht and
Rod D. Hose and
Yuriy Kaniovskyi Towards Collaborative Data Management in
the VPH-Share Project . . . . . . . . . 54--63
Matti Heikkurinen and
Owen Appleton SLM and SDM Challenges in Federated
Infrastructures . . . . . . . . . . . . 64--72
Houssam Haitof Rapid Prototyping of Architectures on
the Cloud Using Semantic Resource
Description . . . . . . . . . . . . . . 73--82
Teodor-Florin Forti\cs and
Gorka Esnal Lopez and
Imanol Padillo Cruz and
Gábor Ferschl and
Tamás Máhr Cloud Patterns for mOSAIC-Enabled
Scientific Applications . . . . . . . . 83--93
A. Cuomo and
M. Rak and
S. Venticinque and
U. Villano Enhancing an Autonomic Cloud
Architecture with Mobile Agents . . . . 94--103
Yih Leong Sun and
Terence Harmer and
Alan Stewart and
Peter Wright Mapping Application Requirements to
Cloud Resources . . . . . . . . . . . . 104--112
Marco Danelutto and
Frédéric Desprez and
Vladimir Getov and
Wolfgang Ziegler CoreGRID/ERCIM Workshop on Grids, Clouds
and P2P Computing --- CGWS2011 . . . . . 113--114
Françoise Baude A Perspective on the CoreGRID Grid
Component Model . . . . . . . . . . . . 115--116
Cristian Klein and
Christian Pérez Towards Scheduling Evolving Applications 117--127
Marco Danelutto and
P. Kilpatrick and
C. Montangero and
L. Semini Model Checking Support for Conflict
Resolution in Multiple Non-functional
Concern Management . . . . . . . . . . . 128--138
Carlo Bertolli and
Gabriele Mencagli and
Marco Vanneschi Consistent Rollback Protocols for
Autonomic ASSISTANT Applications . . . . 139--148
Dominik Meiländer and
Alexander Ploss and
Frank Glinka and
Sergei Gorlatch A Dynamic Resource Management System for
Real-Time Online Applications on Clouds 149--158
Emanuele Carlini and
Massimo Coppola and
Patrizio Dazzi and
Laura Ricci and
Giacomo Righetti Cloud Federations in Contrail . . . . . 159--168
Muhammad Junaid Malik and
Thomas Fahringer and
Radu Prodan Semi-automatic Composition of Ontologies
for ASKALON Grid Workflows . . . . . . . 169--180
Vilmos Rajcsányi and
Zsolt Németh The Chemical Machine: an Interpreter for
the Higher Order Chemical Language . . . 181--190
Carlo Bertolli and
Adam Betts and
Gihan Mudalige and
Mike Giles and
Paul Kelly Design and Performance of the OP2
Library for Unstructured Mesh
Applications . . . . . . . . . . . . . . 191--200
Raja Tlili and
Yahya Slimani Mining Association Rules on Grid
Platforms . . . . . . . . . . . . . . . 201--210
Stephen L. Scott and
Geoffroy Vallée and
Thomas Naughton 5th Workshop on System-Level
Virtualization for High Performance
Computing (HPCVirt 2011) . . . . . . . . 211--211
Qasim Ali and
Vladimir Kiriansky and
Josh Simons and
Puneet Zaroo Performance Evaluation of HPC Benchmarks
on VMware's ESXi Server . . . . . . . . 213--222
Benjamin Serebrin and
Daniel Hecht Virtualizing Performance Counters . . . 223--233
Thomas Naughton and
Geoffroy Vallée and
Christian Engelmann and
Stephen L. Scott A Case for Virtual Machine Based Fault
Injection in a High-Performance
Computing Environment . . . . . . . . . 234--243
Martti Forsell and
Jesper Larsson Träff HPPC 2010: 5th Workshop on Highly
Parallel Processing on a Chip . . . . . 245--247
Fuat Keceli and
Tali Moreshet and
Uzi Vishkin Thermal Management of a Many-Core
Processor under Fine-Grained Parallelism 249--259
Paul Keir and
Paul W. Cockshott and
Andrew Richards Mainstream Parallel Array Programming on
Cell . . . . . . . . . . . . . . . . . . 260--269
Richard Membarth and
Anton Lokhmotov and
Jürgen Teich Generating GPU Code from a High-Level
Representation for Image Processing
Kernels . . . . . . . . . . . . . . . . 270--280
Thomas Canhao Xu and
Pasi Liljeberg and
Hannu Tenhunen A Greedy Heuristic Approximation
Scheduling Algorithm for $3$D Multicore
Processors . . . . . . . . . . . . . . . 281--291
Stefania Corsaro and
Pasqua D'Ambra and
Francesca Perla Algorithms and Programming Tools for
Next-Generation High-Performance
Scientific Software HPSS 2011 . . . . . 293--294
Iain S. Duff European Exascale Software Initiative:
Numerical Libraries, Solvers and
Algorithms . . . . . . . . . . . . . . . 295--304
Hasan Metin Aktulga and
Chao Yang and
Ümit V. Çatalyürek and
Pieter Maris and
James P. Vary On Reducing I/O Overheads in Large-Scale
Invariant Subspace Projections . . . . . 305--314
Chris Baker and
Erik Boman and
Mike Heroux and
Eric Keiter and
Siva Rajamanickam and
Rich Schiek Enabling Next-Generation Parallel
Circuit Simulation with Trilinos . . . . 315--323
Martin Berzins and
Qingyu Meng and
John Schmidt and
James C. Sutherland DAG-Based Software Frameworks for PDEs 324--333
Kamer Kaya and
François-Henry Rouet and
Bora Uçar On Partitioning Problems with Complex
Objectives . . . . . . . . . . . . . . . 334--344
Ichitaro Yamazaki and
Kesheng Wu A Communication-Avoiding Thick-Restart
Lanczos Method on a Distributed-Memory
System . . . . . . . . . . . . . . . . . 345--354
Ioan Ovidiu Hupca and
Joel Falcou and
Laura Grigori and
Radek Stompor Spherical Harmonic Transform with GPUs 355--366
Davide Barbieri and
Valeria Cardellini and
Salvatore Filippone and
Damian Rouson Design Patterns for Scientific
Computations on Sparse Matrices . . . . 367--376
Hans Henrik Brandenborg Sòrensen High-Performance Matrix-Vector
Multiplication on the GPU . . . . . . . 377--386
Jens Gustedt and
Emmanuel Jeanvoine Relaxed Synchronization with Ordered
Read-Write Locks . . . . . . . . . . . . 387--397
Ernesto E. Prudencio and
Karl W. Schulz The Parallel C++ Statistical Library
`QUESO': Quantification of Uncertainty
for Estimation, Simulation and
Optimization . . . . . . . . . . . . . . 398--407
Jan Dünnweber and
Valentin Mihaylov and
René Glettler and
Volker Maiborn and
Holger Wolff Use of HPC-Techniques for Large-Scale
Data Migration . . . . . . . . . . . . . 408--415
George Bosilca Algorithms, Models and Tools for
Parallel Computing on Heterogeneous
Platforms (HeteroPar 2011) . . . . . . . 417--417
Jean-Marc Nicod and
Laurent Philippe and
Lamiel Toch A Genetic Algorithm with Communication
Costs to Schedule Workflows on a
SOA-Grid . . . . . . . . . . . . . . . . 419--428
Jinpil Lee and
Minh Tuan Tran and
Tetsuya Odajima and
Taisuke Boku and
Mitsuhisa Sato An Extension of XcalableMP PGAS
Lanaguage for Multi-node GPU Clusters 429--439
Hamid Arabnejad and
Jorge G. Barbosa Performance Evaluation of List Based
Scheduling on Heterogeneous Systems . . 440--449
David Clarke and
Alexey Lastovetsky and
Vladimir Rychkov Column-Based Matrix Partitioning for
Parallel Matrix Multiplication on
Heterogeneous Processors Based on
Functional Performance Models . . . . . 450--459
Gennaro Cordasco and
Rosario De Chiara and
Ada Mancuso and
Dario Mazzeo and
Vittorio Scarano A Framework for Distributing Agent-Based
Simulations . . . . . . . . . . . . . . 460--470
Jacques M. Bahi and
Raphaël Couturier and
Lilia Ziane Khodja Parallel Sparse Linear Solver GMRES for
GPU Clusters with Compression of
Exchanged Data . . . . . . . . . . . . . 471--480
Marek B\la\.zewicz and
Mi\losz Ci\.znicki and
Piotr Kopta and
Krzysztof Kurowski and
Pawe\l Lichocki Two-Dimensional Discrete Wavelet
Transform on Large Images for Hybrid
Computing Architectures: GPU and CELL 481--490
Aleksandar Ilic and
Leonel Sousa Scheduling Divisible Loads on
Heterogeneous Desktop Systems with
Limited Memory . . . . . . . . . . . . . 491--501
Ma. Guadalupe Sánchez and
Vicente Vidal and
Jordi Bataller Peer Group and Fuzzy Metric to Remove
Noise in Images Using Heterogeneous
Computing . . . . . . . . . . . . . . . 502--510
Girish Nandagudi and
Jaspal Subhlok and
Edgar Gabriel and
Judit Gimenez Estimation of MPI Application
Performance on Volunteer Environments 511--520
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Mario Cannataro HiBB 2011: $ 2^{\rm nd} $ Workshop on
High Performance Bioinformatics and
Biomedicine . . . . . . . . . . . . . . 1--2
Marco Aldinucci and
Mario Coppo and
Ferruccio Damiani and
Maurizio Drocco and
Eva Sciacca On Parallelizing On-Line Statistics for
Stochastic Biological Simulations . . . 3--12
Astrid Rheinländer and
Ulf Leser Scalable Sequence Similarity Search and
Join in Main Memory on Multi-cores . . . 13--22
Gaurang Mehta and
Ewa Deelman and
James A. Knowles and
Ting Chen and
Ying Wang and
Jens Vöckler Enabling Data and Compute Intensive
Workflows in Bioinformatics . . . . . . 23--32
Luigi Grasso and
Nuria Medina-Medina and
Rosana Montes-Soldado and
María M. Abad-Grau Homogenizing Access to Highly
Time-Consuming Biomedical Applications
through a Web-Based Interface . . . . . 33--42
Mario Cannataro and
Pietro Hiram Guzzi Distributed Management and Analysis of
Omics Data . . . . . . . . . . . . . . . 43--52
Thomas Schaaf and
Adam S. Z. Belloum and
Owen Appleton and
Joan Serrat-Fernández Managing and Delivering Grid Services
(MDGS) . . . . . . . . . . . . . . . . . 53--53
Gilles Mathieu and
Hél\`ene Cordier Resource Allocation for the French
National Grid Initiative . . . . . . . . 55--63
Tomasz Szepieniec and
Joanna Kocot and
Thomas Schaaf and
Owen Appleton and
Matti Heikkurinen On Importance of Service Level
Management in Grids . . . . . . . . . . 64--75
Bartosz Balis and
Renata Slota and
Jacek Kitowski and
Marian Bubak On-Line Monitoring of Service-Level
Agreements in the Grid . . . . . . . . . 76--85
Dana Petcu Challenges of Future e-Infrastructure
Governance . . . . . . . . . . . . . . . 86--95
Antonella Galizia and
Alfonso Quarati and
Michael Schiffers and
Mark Yampolskiy Influences between Performance Based
Scheduling and Service Level Agreements 96--105
Massimiliano Rak and
Rocco Aversa and
Salvatore Venticinque and
Beniamino Di Martino User Centric Service Level Management in
mOSAIC Applications . . . . . . . . . . 106--115
Reginald Cushing and
Spiros Koulouzis and
Rudolf Strijkers and
Adam S. Z. Belloum and
Marian Bubak Service Level Management for Executable
Papers . . . . . . . . . . . . . . . . . 116--123
Silvia Knittl and
Thomas Schaaf and
Ilya Saverchenko Change Management in e-Infrastructures
to Support Service Level Agreements . . 124--133
Michael Gerndt PROPER 2011: Fourth Workshop on
Productivity and Performance Tools for
HPC Application Development . . . . . . 135--135
Olaf Krzikalla and
Kim Feldhoff and
Ralph Müller-Pfefferkorn and
Wolfgang E. Nagel Scout: a Source-to-Source Transformator
for SIMD-Optimizations . . . . . . . . . 137--145
Yury Oleynik and
Michael Gerndt Scalable Automatic Performance Analysis
on IBM BlueGene/P Systems . . . . . . . 146--155
Wyatt Spear and
Allen D. Malony and
Chee Wai Lee and
Scott Biersdorff and
Sameer Shende An Approach to Creating Performance
Visualizations in a Parallel Profile
Analysis Tool . . . . . . . . . . . . . 156--165
N. Dandapanthula and
H. Subramoni and
J. Vienne and
K. Kandalla and
S. Sur and
Dhabaleswar K. Panda INAM --- a Scalable InfiniBand Network
Analysis and Monitoring Tool . . . . . . 166--177
Ananta Tiwari and
Michael A. Laurenzano and
Laura Carrington and
Allan Snavely Auto-tuning for Energy Usage in
Scientific Applications . . . . . . . . 178--187
Pasquale Cantiello and
Beniamino Di Martino Automatic Source Code Transformation for
GPUs Based on Program Comprehension . . 188--197
Christian Iwainsky and
Ralph Altenfeld and
Dieter an Mey and
Christian Bischof Enhancing Brainware Productivity through
a Performance Tuning Workflow . . . . . 198--207
Stephen L. Scott and
Chokchai (Box) Leangsuksun Workshop on Resiliency in High
Performance Computing (Resilience) in
Clusters, Clouds, and Grids . . . . . . 209--209
Patricia Kovatch and
Matthew Ezell and
Ryan Braby The Malthusian Catastrophe Is Upon Us!
Are the Largest HPC Machines Ever Up? 211--220
Rolf Riesen and
Kurt B. Ferreira and
Maria Ruiz Varela and
Michela Taufer and
Arun Rodrigues Simulating Application Resilience at
Exascale . . . . . . . . . . . . . . . . 221--230
J. Brandt and
F. Chen and
A. Gentile and
Chokchai (Box) Leangsuksun and
J. Mayo and
P. Pebay and
D. Roe Framework for Enabling System
Understanding . . . . . . . . . . . . . 231--240
Patrick G. Bridges and
Mark Hoemmen and
Kurt B. Ferreira and
Michael A. Heroux and
Philip Soltero Cooperative Application/OS DRAM Fault
Recovery . . . . . . . . . . . . . . . . 241--250
David Fiala and
Kurt B. Ferreira and
Frank Mueller and
Christian Engelmann A Tunable, Software-Based DRAM Error
Detection and Correction Library for HPC 251--261
José Carlos Sancho and
Ana Jokanovic and
Jesus Labarta Reducing the Impact of Soft Errors on
Fabric-Based Collective Communications 262--271
Zhe Ma and
Trevor Carlson and
Wim Heirman and
Lieven Eeckhout Evaluating Application Vulnerability to
Soft Errors in Multi-level Cache
Hierarchy . . . . . . . . . . . . . . . 272--281
Nathan DeBardeleben and
Sean Blanchard and
Qiang Guan and
Ziming Zhang and
Song Fu Experimental Framework for Injecting
Logic Errors in a Virtual Machine to
Profile Applications for Soft Error
Resilience . . . . . . . . . . . . . . . 282--291
Thanadech Thanakornworakij and
Rajan Sharma and
Blaine Scroggs and
Chokchai (Box) Leangsuksun High Availability on Cloud with HA-OSCAR 292--301
Dewan Ibtesham and
Dorian Arnold and
Kurt B. Ferreira and
Patrick G. Bridges On the Viability of Checkpoint
Compression for Extreme Scale Fault
Tolerance . . . . . . . . . . . . . . . 302--311
Raghunath Rajachandrasekar and
Xiangyong Ouyang and
Xavier Besseron and
Vilobh Meshram Can Checkpoint/Restart Mechanisms
Benefit from Hierarchical Data Staging? 312--321
Xavier Besseron and
Thierry Gautier Impact of Over-Decomposition on
Coordinated Checkpoint/Rollback Protocol 322--332
Anders Hast and
Josef Weidendorfer and
Jan-Philipp Weiss UCHPC 2011: Fourth Workshop on
UnConventional High Performance
Computing . . . . . . . . . . . . . . . 333--334
Tetsuro Horikawa and
Michio Honda and
Jin Nakazawa and
Kazunori Takashio and
Hideyuki Tokuda PACUE: Processor Allocator Considering
User Experience . . . . . . . . . . . . 335--344
Alin Murara\csu and
Josef Weidendorfer and
Arndt Bode Workload Balancing on Heterogeneous
Systems: a Case Study of Sparse Grid
Interpolation . . . . . . . . . . . . . 345--354
Tristan Cabel and
Joseph Charles and
Stéphane Lanteri Performance Evaluation of a Multi-GPU
Enabled Finite Element Method for
Computational Electromagnetics . . . . . 355--364
Thomas Canhao Xu and
Pasi Liljeberg and
Hannu Tenhunen Study of Hierarchical $N$-Body Methods
for Network-on-Chip Architectures . . . 365--374
Alexander Heinecke and
Michael Klemm and
Dirk Pflüger and
Arndt Bode and
Hans-Joachim Bungartz Extending a Highly Parallel Data Mining
Algorithm to the
Intel$^{{\textregistered }}$ Many
Integrated Core Architecture . . . . . . 375--384
Michael Alexander and
Gianluigi Zanetti VHPC 2011: 6th Workshop on
Virtualization in High-Performance Cloud
Computing . . . . . . . . . . . . . . . 385--385
Sangwook Kim and
Hwanju Kim and
Joonwon Lee Group-Based Memory Deduplication for
Virtualized Clouds . . . . . . . . . . . 387--397
Anastassios Nanos and
Nikos Nikoleris and
Stratos Psomadakis and
Elisavet Kozyri A Smart HPC Interconnect for Clusters of
Virtual Machines . . . . . . . . . . . . 398--406
Dimitris Aragiorgis and
Anastassios Nanos and
Nectarios Koziris Coexisting Scheduling Policies Boosting
I/O Virtual Machines . . . . . . . . . . 407--415
J. Briffaut and
E. Lefebvre and
J. Rouzaud-Cornabas and
C. Toinard PIGA-Virt: an Advanced Distributed MAC
Protection of Virtual Systems . . . . . 416--425
Stefania Costache and
Nikos Parlavantzas and
Christine Morin and
Samuel Kortas An Economic Approach for Application QoS
Management in Clouds . . . . . . . . . . 426--435
Piotr Luszczek and
Eric Meek and
Shirley Moore and
Dan Terpstra and
Vincent M. Weaver Evaluation of the HPC Challenge
Benchmarks in Virtualized Environments 436--445
Adrien L\`ebre and
Paolo Anedda and
Massimo Gaggero and
Flavien Quesnel DISCOVERY, Beyond the Clouds . . . . . . 446--456
Flavien Quesnel and
Adrien L\`ebre Cooperative Dynamic Scheduling of
Virtual Machines in Distributed Systems 457--466
Romeo Kienzler and
Rémy Bruggmann and
Anand Ranganathan and
Nesime Tatbul Large-Scale DNA Sequence Analysis in the
Cloud: a Stream-Based Approach . . . . . 467--476
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Peter Widmayer Combinatorial Optimization with Noisy
Inputs: How Can We Separate the Wheat
from the Chaff? . . . . . . . . . . . . 1--1
Kazuo Iwama Approximability of Stable Matching
Problems . . . . . . . . . . . . . . . . 2--2
Sue Whitesides On Three-Dimensional Graph Drawing and
Embedding . . . . . . . . . . . . . . . 3--4
Takeaki Uno and
Ryuhei Uehara and
Shin-ichi Nakano Bounding the Number of Reduced Trees,
Cographs, and Series-Parallel Graphs by
Compression . . . . . . . . . . . . . . 5--16
R. Krithika and
N. S. Narayanaswamy Generalized Above Guarantee Vertex Cover
and $r$-Partization . . . . . . . . . . 17--27
Sang Won Bae and
Kyung-Yong Chwa Farthest Voronoi Diagrams under Travel
Time Metrics . . . . . . . . . . . . . . 28--39
Sang Won Bae Tight Bound for Farthest-Color Voronoi
Diagrams of Line Segments . . . . . . . 40--51
Ananda Swarup Das and
Prosenjit Gupta and
Anil Kishore Kalavagattu and
Jatin Agarwal Range Aggregate Maximal Points in the
Plane . . . . . . . . . . . . . . . . . 52--63
Trivikram Dokka and
Anastasia Kouvela and
Frits C. R. Spieksma Approximating the Multi-level Bottleneck
Assignment Problem . . . . . . . . . . . 64--75
Nicolas Boria and
Jérôme Monnot and
Vangelis Th. Paschos Reoptimization of the Maximum Weighted $
P_k $-Free Subgraph Problem under Vertex
Insertion . . . . . . . . . . . . . . . 76--87
Franz J. Brandenburg and
Andreas Gleißner and
Andreas Hofmeier Comparing and Aggregating Partial Orders
with Kendall Tau Distances . . . . . . . 88--99
Biing-Feng Wang and
Jhih-Hong Ye and
Pei-Jung Chen On the Round-Trip $1$-Center and
$1$-Median Problems . . . . . . . . . . 100--111
Sammi Abida Salma and
Md. Saidur Rahman Triangle-Free Outerplanar $3$-Graphs Are
Pairwise Compatibility Graphs . . . . . 112--123
Tiziana Calamoneri and
Rossella Petreschi and
Blerina Sinaimeri On Relaxing the Constraints in Pairwise
Compatibility Graphs . . . . . . . . . . 124--135
Md. Iqbal Hossain and
Debajyoti Mondal and
Md. Saidur Rahman and
Sammi Abida Salma Universal Line-Sets for Drawing Planar
$3$-Trees . . . . . . . . . . . . . . . 136--147
Stephane Durocher and
Debajyoti Mondal On the Hardness of Point-Set
Embeddability . . . . . . . . . . . . . 148--159
Tanaeem M. Moosa and
Sumaiya Nazeen and
M. Sohel Rahman and
Rezwana Reaz Linear Time Inference of Strings from
Cover Arrays Using a Binary Alphabet . . 160--172
Amr Elmasry and
Jyrki Katajainen Fat Heaps without Regular Counters . . . 173--185
Martin Fink and
Jan-Henrik Haunert and
Tamara Mchedlidze and
Joachim Spoerhase and
Alexander Wolff Drawing Graphs with Vertices at
Specified Positions and Crossings at
Large Angles . . . . . . . . . . . . . . 186--197
Christian Bachmaier and
Marco Matzeder Drawing Unordered Trees on $k$-Grids . . 198--210
Anonymous Front Matter . . . . . . . . . . . . . . ??
Stefan Unterschütz and
Christian Renner and
Volker Turau Opportunistic, Receiver-Initiated
Data-Collection Protocol . . . . . . . . 1--16
Philipp Hurni and
Ulrich Bürgi and
Markus Anwander and
Torsten Braun TCP Performance Optimizations for
Wireless Sensor Networks . . . . . . . . 17--32
Marek Klonowski and
Kamil Wolny Immune Size Approximation Algorithms in
Ad Hoc Radio Network . . . . . . . . . . 33--48
Peng Wang and
Chinya Ravishankar Foisting and Stealing of Keys in Sensor
Networks . . . . . . . . . . . . . . . . 49--64
Ilias Leontiadis and
Christos Efstratiou and
Cecilia Mascolo and
Jon Crowcroft SenShare: Transforming Sensor Networks
into Multi-application Sensing
Infrastructures . . . . . . . . . . . . 65--81
Christian Haas and
Joachim Wilke and
Viktor Stöhr Realistic Simulation of Energy
Consumption in Wireless Sensor Networks 82--97
JeongGil Ko and
Kevin Klues and
Christian Richter and
Wanja Hofer and
Branislav Kusy Low Power or High Performance? A
Tradeoff Whose Time Has Come (and Nearly
Gone) . . . . . . . . . . . . . . . . . 98--114
Lanny Sitanayah and
Kenneth N. Brown and
Cormac J. Sreenan Fault-Tolerant Relay Deployment Based on
Length-Constrained Connectivity and
Rerouting Centrality in Wireless Sensor
Networks . . . . . . . . . . . . . . . . 115--130
Hossein Fotouhi and
Marco Zuniga and
Mário Alves and
Anis Koubaa and
Pedro Marrón Smart-HOP: a Reliable Handoff Mechanism
for Mobile Wireless Sensor Networks . . 131--146
Flavio Fabbri and
Marco Zuniga and
Daniele Puccinelli and
Pedro Marrón On the Optimal Blacklisting Threshold
for Link Selection in Wireless Sensor
Networks . . . . . . . . . . . . . . . . 147--162
Paolo Pettinato and
Niklas Wirström and
Joakim Eriksson and
Thiemo Voigt Multi-channel Two-Way Time of Flight
Sensor Network Ranging . . . . . . . . . 163--178
Bernhard Buchli and
Felix Sutton and
Jan Beutel GPS-Equipped Wireless Sensor Network
Node for High-Accuracy Positioning
Applications . . . . . . . . . . . . . . 179--195
Daniele Alessandrelli and
Andrea Azzar\`a and
Matteo Petracca and
Christian Nastasi and
Paolo Pagano ScanTraffic: Smart Camera Network for
Traffic Information Collection . . . . . 196--211
Andrey Somov and
Christine C. Ho and
Roberto Passerone and
James W. Evans and
Paul K. Wright Towards Extending Sensor Node Lifetime
with Printed Supercapacitors . . . . . . 212--227
David Hasenfratz and
Olga Saukh and
Lothar Thiele On-the-Fly Calibration of Low-Cost Gas
Sensors . . . . . . . . . . . . . . . . 228--244
Andrey Somov and
Alexander Baranov and
Alexey Savkin and
Mikhail Ivanov and
Lucia Calliari Energy-Aware Gas Sensing Using Wireless
Sensor Networks . . . . . . . . . . . . 245--260
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Guillaume Barbu and
Philippe Hoogvorst Application-Replay Attack on Java Cards:
When the Garbage Collector Gets Confused 1--13
Kristian Beckers and
Stephan Faßbender Supporting the Development and
Documentation of ISO 27001 Information
Security Management Systems through
Security Requirements Engineering
Approaches . . . . . . . . . . . . . . . 14--21
Peter T. Breuer and
Jonathan P. Bowen Typed Assembler for a RISC
Crypto-Processor . . . . . . . . . . . . 22--29
Matteo Maria Casalino and
Henrik Plate Transversal Policy Conflict Detection 30--37
Samson Gejibo and
Federico Mancini Challenges in Implementing an End-to-End
Secure Protocol for Java ME-Based Mobile
Data Collection in Low-Budget Settings 38--45
Máté Kovács and
Helmut Seidl Runtime Enforcement of Information Flow
Security in Tree Manipulating Processes 46--59
Massimiliano Masi and
Rosario Pugliese Formalisation and Implementation of the
XACML Access Control Mechanism . . . . . 60--74
Francisco Moyano and
Carmen Fernandez-Gago A Task Ordering Approach for Automatic
Trust Establishment . . . . . . . . . . 75--88
Viet Hung Nguyen and
Fabio Massacci An Idea of an Independent Validation of
Vulnerability Discovery Models . . . . . 89--96
Martín Ochoa and
Jan Jürjens and
Daniel Warzecha A Sound Decision Procedure for the
Compositionality of Secrecy . . . . . . 97--105
Rahul Potharaju and
Andrew Newell Plagiarizing Smartphone Applications:
Attack Strategies and Defense Techniques 106--120
Mehrdad Saadatmand and
Antonio Cicchetti Design of Adaptive Security Mechanisms
for Real-Time Embedded Systems . . . . . 121--134
George Stergiopoulos and
Bill Tsoumas Hunting Application-Level Logical Errors 135--142
Huafei Zhu and
Hong Xiao Optimal Trust Mining and Computing on
Keyed MapReduce . . . . . . . . . . . . 143--150
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Solomon Marcus The Art of Reaching the Age of Sixty . . 1--19
Hermann Maurer Calude as Father of One of the Computer
Science Journals . . . . . . . . . . . . 20--30
Laurent Bienvenu and
Alexander Shen Random Semicomputable Reals Revisited 31--45
Douglas S. Bridges and
Luminita S. V\^\i\ct\ua Constructing the Infimum of Two
Projections . . . . . . . . . . . . . . 46--58
Paul Brodhead and
Rod Downey and
Keng Meng Ng Bounded Randomness . . . . . . . . . . . 59--70
Cezar Câmpeanu A Note on Blum Static Complexity
Measures . . . . . . . . . . . . . . . . 71--80
Michael J. Dinneen A Program-Size Complexity Measure for
Mathematical Problems and Conjectures 81--93
Monica Dumitrescu On Degrees of Randomness and Genetic
Randomness . . . . . . . . . . . . . . . 94--104
R\=usi\cn\vs Freivalds Hartmanis--Stearns Conjecture on Real
Time and Transcendence . . . . . . . . . 105--119
Ziyuan Gao and
Frank Stephan and
Guohua Wu and
Akihiro Yamamoto Learning Families of Closed Sets in
Matroids . . . . . . . . . . . . . . . . 120--139
Helmut Jürgensen Invariance and Universality of
Complexity . . . . . . . . . . . . . . . 140--158
Antonín Ku\vcera and
André Nies Demuth's Path to Randomness . . . . . . 159--173
Yuri I. Manin A Computability Challenge: Asymptotic
Bounds for Error-Correcting Codes . . . 174--182
Jacques Patarin Some Transfinite Generalisations of
Gödel's Incompleteness Theorem . . . . . 183--193
Ludwig Staiger On Oscillation-Free Chaitin $h$-Random
Sequences . . . . . . . . . . . . . . . 194--202
Kohtaro Tadaki Phase Transition between
Unidirectionality and Bidirectionality 203--223
Hector Zenil Computer Runtimes and the Length of
Proofs . . . . . . . . . . . . . . . . . 224--240
Marius Zimand Symmetry of Information: a Closer Look 241--246
Gregory Chaitin How Much Information Can There Be in a
Real Number? . . . . . . . . . . . . . . 247--251
S. Barry Cooper Mathematics, Metaphysics and the
Multiverse . . . . . . . . . . . . . . . 252--267
Anonymous Front Matter . . . . . . . . . . . . . . ??
Arne Ansper Designing a Governmental Backbone . . . 1--3
Priit Vinkel Internet Voting in Estonia . . . . . . . 4--12
Hakem Beitollahi and
Geert Deconinck A Ring Based Onion Circuit for Hidden
Services . . . . . . . . . . . . . . . . 13--30
Károly Boda and
Ádám Máté Földes and
Gábor György Gulyás and
Sándor Imre User Tracking on the Web via
Cross-Browser Fingerprinting . . . . . . 31--46
Mathias Claes and
Vincent van der Leest and
An Braeken Comparison of SRAM and FF PUF in 65nm
Technology . . . . . . . . . . . . . . . 47--64
Jordi Cucurull and
Simin Nadjm-Tehrani and
Massimiliano Raciti Modular Anomaly Detection for Smartphone
Ad Hoc Communication . . . . . . . . . . 65--81
Jérôme Dossogne and
Frédéric Lafitte Mental Voting Booths . . . . . . . . . . 82--97
Kazutomo Hamamoto and
Yasuyuki Tahara and
Akihiko Ohsuga Methods for Privacy Protection
Considering Status of Service Provider
and User Community . . . . . . . . . . . 98--113
Kirsi Helkala and
Nils Kalstad Svendsen The Security and Memorability of
Passwords Generated by Using an
Association Element and a Personal
Factor . . . . . . . . . . . . . . . . . 114--130
Elahe Kani-Zabihi and
Martin Helmhout Increasing Service Users' Privacy
Awareness by Introducing On-Line
Interactive Privacy Features . . . . . . 131--148
Frédérick Lemay and
Raphaël Khoury and
Nadia Tawbi Optimized Inlining of Runtime Monitors 149--161
Radu Lupu and
Eugen Borcoci and
Tinku Rasheed Identity-Based Key Derivation Method for
Low Delay Inter-domain Handover
Re-authentication Service . . . . . . . 162--175
Veelasha Moonsamy and
Ronghua Tian and
Lynn Batten Feature Reduction to Speed Up Malware
Classification . . . . . . . . . . . . . 176--188
Assem Nazar and
Mark M. Seeger and
Harald Baier Rooting Android --- Extending the ADB by
an Auto-connecting WiFi-Accessible
Service . . . . . . . . . . . . . . . . 189--204
Jaydip Sen and
Subhamoy Maitra An Attack on Privacy Preserving Data
Aggregation Protocol for Wireless Sensor
Networks . . . . . . . . . . . . . . . . 205--222
Deian Stefan and
Alejandro Russo and
David Mazi\`eres and
John C. Mitchell Disjunction Category Labels . . . . . . 223--239
Inger Anne Tòndel Visualization Control for Event-Based
Public Display Systems Used in a
Hospital Setting . . . . . . . . . . . . 240--255
Erich Wenger and
Michael Hutter Exploring the Design Space of Prime
Field vs. Binary Field ECC-Hardware
Implementations . . . . . . . . . . . . 256--271
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Eike Best and
Philippe Darondeau Petri Net Distributability . . . . . . . 1--18
Roberto Bruni and
Hernán Melgratti and
Ugo Montanari Connector Algebras, Petri Nets, and BIP 19--38
Peter Buneman Models of Provenance . . . . . . . . . . 39--39
Rupak Majumdar End-to-End Guarantees in Embedded
Control Systems . . . . . . . . . . . . 40--40
Andreas Zeller Mining Precise Specifications . . . . . 41--41
Thomas Baar and
Philipp Kumar Detecting Entry Points in Java Libraries 42--54
Michael Beyer and
Sabine Glesner Static Analysis of Run-Time Modes in
Synchronous Process Network . . . . . . 55--67
Elena Bozhenkova Compositional Methods in
Characterization of Timed Event
Structures . . . . . . . . . . . . . . . 68--76
Rafael Caballero and
Yolanda García-Ruiz Algorithmic Debugging of SQL Views . . . 77--85
Roman Dubtsov Timed Transition Systems with
Independence and Marked Scott Domains:
An Adjunction . . . . . . . . . . . . . 86--94
Michael A. H. Fried and
Anna Fensel An Extensible System for Enhancing
Social Conference Experience . . . . . . 95--110
Natalia O. Garanina Exponential Acceleration of Model
Checking for Perfect Recall Systems . . 111--124
Robert Glück Bootstrapping Compiler Generators from
Partial Evaluators . . . . . . . . . . . 125--141
Natalya S. Gribovskaya A Logic Characteristic for Timed
Extensions of Partial Order Based
Equivalences . . . . . . . . . . . . . . 142--152
Geoff W. Hamilton and
Neil D. Jones Proving the Correctness of Unfold/Fold
Program Transformations Using
Bisimulation . . . . . . . . . . . . . . 153--169
Mauro Jaskelioff and
Alejandro Russo Secure Multi-execution in Haskell . . . 170--178
Alexey Khoroshilov and
Vadim Mutilin and
Eugene Novikov Towards an Open Framework for C
Verification Tools Benchmarking . . . . 179--192
Andrei V. Klimov Solving Coverability Problem for
Monotonic Counter Systems by
Supercompilation . . . . . . . . . . . . 193--209
Ilya Klyuchnikov and
Sergei A. Romanenko Multi-result Supercompilation as
Branching Growth of the Penultimate
Level in Metasystem Transitions . . . . 210--226
Jens Knoop and
Laura Kovács and
Jakob Zwirchmayr Symbolic Loop Bound Computation for WCET
Analysis . . . . . . . . . . . . . . . . 227--242
Anonymous Front Matter . . . . . . . . . . . . . . ??
Yutaka Kawai and
Noboru Kunihiro Secret Handshake Scheme with
Request-Based-Revealing . . . . . . . . 1--16
Kristian Gjòsteen and
Òystein Thuen Password-Based Signatures . . . . . . . 17--33
Jean Lancrenon and
Roland Gillard Isolating Partial Information of
Indistinguishable Encryptions . . . . . 34--48
Haitham S. Al-Sinani and
Chris J. Mitchell A Universal Client-Based Identity
Management Tool . . . . . . . . . . . . 49--74
Mark Stegelmann and
Dogan Kesdogan Design and Evaluation of a
Privacy-Preserving Architecture for
Vehicle-to-Grid Interaction . . . . . . 75--90
Ton van Deursen and
Sa\vsa Radomirovi\'c Insider Attacks and Privacy of RFID
Protocols . . . . . . . . . . . . . . . 91--105
Flavio D. Garcia and
Eric R. Verheul and
Bart Jacobs Cell-Based Roadpricing . . . . . . . . . 106--122
Olivier Pereira Ballot Aggregation and Mixnet Based
Open-Audit Elections . . . . . . . . . . 123--127
Peter Gutmann PKI as Part of an Integrated Risk
Management Strategy for Web Security . . 128--146
Gauthier Van Damme and
Nicolas Luyckx and
Karel Wouters A PKI-Based Mobile Banking Demonstrator 147--158
Moez Ben M'Barka and
Julien P. Stern Certification Validation: Back to the
Past . . . . . . . . . . . . . . . . . . 159--175
Johannes Winter and
Kurt Dietrich A Hijacker's Guide to the LPC Bus . . . 176--193
An Braeken and
Antonio De La Piedro and
Karel Wouters Secure Event Logging in Sensor Networks 194--208
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Klaus Jansen Approximation Algorithms for Scheduling
and Packing Problems . . . . . . . . . . 1--8
Zeev Nutov Approximating Subset $k$-Connectivity
Problems . . . . . . . . . . . . . . . . 9--20
Sebastián Marbán and
Cyriel Rutten and
Tjark Vredeveld Learning in Stochastic Machine
Scheduling . . . . . . . . . . . . . . . 21--34
Wolfgang Bein and
Naoki Hatta and
Nelson Hernandez-Cons An Online Algorithm Optimally
Self-tuning to Congestion for Power
Management Problems . . . . . . . . . . 35--48
Cristina Bazgan and
Laurent Gourv\`es and
Jérôme Monnot Single Approximation for Biobjective Max
TSP . . . . . . . . . . . . . . . . . . 49--62
Ljiljana Brankovic and
Henning Fernau Parameterized Approximation Algorithms
for Hitting Set . . . . . . . . . . . . 63--76
Nadine Schwartges and
Joachim Spoerhase Approximation Algorithms for the Maximum
Leaf Spanning Tree Problem on Acyclic
Digraphs . . . . . . . . . . . . . . . . 77--88
Kai-Simon Goetzmann and
Sebastian Stiller Optimization over Integers with
Robustness in Cost and Few Constraints 89--101
Tomá\vs Ebenlendr and
Ji\vrí Sgall A Lower Bound on Deterministic Online
Algorithms for Scheduling on Related
Machines without Preemption . . . . . . 102--108
Klaus Jansen and
Christina Robenek Scheduling Jobs on Identical and Uniform
Processors Revisited . . . . . . . . . . 109--122
David B. Shmoys and
Gwen Spencer Approximation Algorithms for Fragmenting
a Graph against a Stochastically-Located
Threat . . . . . . . . . . . . . . . . . 123--136
Jianqiao Zhu and
Ho-Leung Chan and
Tak-Wah Lam Non-clairvoyant Weighted Flow Time
Scheduling on Different Multi-processor
Models . . . . . . . . . . . . . . . . . 137--149
Reza Dorrigiv and
Alejandro López-Ortiz A New Perspective on List Update:
Probabilistic Locality and Working Set 150--163
Gerth Stòlting Brodal and
Gabriel Moruz OnlineMin: a Fast Strongly Competitive
Randomized Paging Algorithm . . . . . . 164--175
Katarzyna Paluch Faster and Simpler Approximation of
Stable Matchings . . . . . . . . . . . . 176--187
Anke van Zuylen Simpler $ 3 / 4 $-Approximation
Algorithms for MAX SAT . . . . . . . . . 188--197
Marc P. Renault and
Adi Rosén On Online Algorithms with Advice for the
$k$-Server Problem . . . . . . . . . . . 198--210
Rolf Harren and
Walter Kern Improved Lower Bound for Online Strip
Packing . . . . . . . . . . . . . . . . 211--218
Yishay Mansour and
Boaz Patt-Shamir and
Dror Rawitz Competitive Router Scheduling with
Structured Data . . . . . . . . . . . . 219--232
Cristina Bazgan and
Laurent Gourv\`es and
Jérôme Monnot Approximation with a Fixed Number of
Solutions of Some Biobjective
Maximization Problems . . . . . . . . . 233--246
Anonymous Front Matter . . . . . . . . . . . . . . ??
Holger Bock Axelsen Time Complexity of Tape Reduction for
Reversible Turing Machines . . . . . . . 1--13
Tetsuo Yokoyama and
Holger Bock Axelsen and
Robert Glück Towards a Reversible Functional Language 14--29
Michael Kirkedal Thomsen and
Holger Bock Axelsen and
Robert Glück A Reversible Processor Architecture and
Its Reversible Logic Design . . . . . . 30--42
Md. Mazder Rahman and
Gerhard W. Dueck and
Anindita Banerjee Optimization of Reversible Circuits
Using Reconfigured Templates . . . . . . 43--53
Claudio Moraga Hybrid $ {\rm GF}(2) $--Boolean
Expressions \ldots for Quantum Computing
Circuits . . . . . . . . . . . . . . . . 54--63
Mathias Soeken and
Stefan Frehse and
Robert Wille and
Rolf Drechsler RevKit: An Open Source Toolkit for the
Design of Reversible Circuits . . . . . 64--76
Zahra Sasanian and
D. Michael Miller Transforming MCT Circuits to NCVW
Circuits . . . . . . . . . . . . . . . . 77--88
Atsushi Matsuo and
Shigeru Yamashita Changing the Gate Order for Optimal LNN
Conversion . . . . . . . . . . . . . . . 89--101
Stéphane Burignat and
Mariusz Olczak and
Micha\l Klimczak and
Alexis De Vos Towards the Limits of Cascaded
Reversible (Quantum-Inspired) Circuits 102--111
Stéphane Burignat and
Michael Kirkedal Thomsen and
Micha\l Klimczak Interfacing Reversible Pass-Transistor
CMOS Chips with Conventional Restoring
CMOS Circuits . . . . . . . . . . . . . 112--122
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Ebisa Negeri and
Nico Baken Distributed Storage Management Using
Dynamic Pricing in a Self-Organized
Energy Community . . . . . . . . . . . . 1--12
Laurent Paquereau and
Bjarne E. Helvik Ant-Based Systems for Wireless Networks:
Retrospect and Prospects . . . . . . . . 13--23
Tiziano Squartini and
Diego Garlaschelli Triadic Motifs and Dyadic
Self-Organization in the World Trade
Network . . . . . . . . . . . . . . . . 24--35
Dalibor \vStys and
Petr Jizba and
\vSt\vepán Papá\vcek and
Tomá\vs Náhlík and
Petr Císa\vr On Measurement of Internal Variables of
Complex Self-Organized Systems and Their
Relation to Multifractal Spectra . . . . 36--47
Holger Prothmann and
Sven Tomforde and
Johannes Lyda and
Jürgen Branke and
Jörg Hähner Self-Organised Routing for Road Networks 48--59
Hanna Kavalionak and
Alberto Montresor P2P and Cloud: a Marriage of Convenience
for Replica Management . . . . . . . . . 60--71
Dharani Punithan and
R. I. (Bob) McKay Self-Organizing Spatio-temporal Pattern
Formation in Two-Dimensional Daisyworld 72--83
Muntasir Al-Asfoor and
Brendan Neville and
Maria Fasli Heuristic Resource Search in a
Self-Organised Distributed Multi Agent
System . . . . . . . . . . . . . . . . . 84--89
Georgi Yordanov Georgiev A Quantitative Measure, Mechanism and
Attractor for Self-Organization in
Networked Complex Systems . . . . . . . 90--95
Efrat Blumenfeld-Lieberthal and
Juval Portugali MetroNet: a Metropolitan Simulation
Model Based on Commuting Processes . . . 96--103
Alexander Gogolev and
Christian Bettstetter Robustness of Self-Organizing Consensus
Algorithms: Initial Results from a
Simulation-Based Study . . . . . . . . . 104--108
Stephen M. Majercik Initial Experiments in Using
Communication Swarms to Improve the
Performance of Swarm Systems . . . . . . 109--114
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Joerg Evermann and
Ivan Porres Doctoral Symposium at MoDELS 2011 . . . 1--3
Henning Agt Supporting Software Language Engineering
by Automated Domain Knowledge
Acquisition . . . . . . . . . . . . . . 4--11
Muhammad Atif Qureshi Interoperability of Software Engineering
Metamodels . . . . . . . . . . . . . . . 12--19
Marion Brandsteidl and
Andreas Winter Software Modeling in Education: The 7th
Educators' Symposium at MoDELS 2011 . . 20--24
Dan Chiorean and
Vladiela Petra\cscu and
Ileana Ober Using Constraints in Teaching Software
Modeling . . . . . . . . . . . . . . . . 25--39
Jon Whittle and
John Hutchinson Mismatches between Industry Practice and
Teaching of Model-Driven Software
Development . . . . . . . . . . . . . . 40--47
Òystein Haugen VARY --- Variability for You . . . . . . 48--52
Andreas Svendsen and
Xiaorui Zhang and
Òystein Haugen and
Birger Mòller-Pedersen Towards Evolution of Generic Variability
Models . . . . . . . . . . . . . . . . . 53--67
Mohammad Abu-Matar and
Hassan Gomaa Feature-Based Variability Meta-modeling
for Service-Oriented Product Lines . . . 68--82
Vasco Amaral and
Cécile Hardebolle and
Hans Vangheluwe and
László Lengyel and
Peter Bunus Summary of the Workshop on
Multi-Paradigm Modelling: Concepts and
Tools . . . . . . . . . . . . . . . . . 83--88
Antonio Cicchetti and
Federico Ciccozzi and
Thomas Leveque Supporting Incremental Synchronization
in Hybrid Multi-view Modelling . . . . . 89--103
Frédéric Boulanger and
Ayman Dogui and
Cécile Hardebolle and
Christophe Jacquet Semantic Adaptation Using CCSL Clock
Constraints . . . . . . . . . . . . . . 104--118
Michel R. V. Chaudron and
Marcela Genero and
Silvia Abrahão and
Parastoo Mohagheghi and
Lars Pareto Summary of the First International
Workshop on Experiences and Empirical
Studies in Software Modelling . . . . . 119--122
Stefan Zugal and
Jakob Pinggera and
Barbara Weber and
Jan Mendling and
Hajo A. Reijers Assessing the Impact of Hierarchy on
Model Understandability --- a Cognitive
Perspective . . . . . . . . . . . . . . 123--133
Ana M. Fernández-Sáez and
Marcela Genero and
Michel R. V. Chaudron Does the Level of Detail of UML Models
Affect the Maintainability of Source
Code? . . . . . . . . . . . . . . . . . 134--148
Nelly Bencomo and
Gordon Blair and
Robert France and
Betty H. C. Cheng and
Cédric Jeanneret Summary of the $ 6^{\rm th} $
International Workshop on
Models@run.time . . . . . . . . . . . . 149--151
Carlo Ghezzi and
Andrea Mocci and
Mario Sangiorgio Runtime Monitoring of Functional
Component Changes with Behavior Models 152--166
Thomas Vogel and
Holger Giese Requirements and Assessment of Languages
and Frameworks for Adaptation Models . . 167--182
Levi Lúcio and
Stephan Weißleder and
Frédéric Fondement and
Harald Cichos MoDeVVa 2011 Workshop Summary . . . . . 183--186
Andreas Svendsen and
Òystein Haugen and
Birger Mòller-Pedersen Specifying a Testing Oracle for Train
Stations --- Going beyond with Product
Line Technology . . . . . . . . . . . . 187--201
Anonymous Front Matter . . . . . . . . . . . . . . ??
Junichi Hashimoto and
Akihiro Kishimoto and
Kazuki Yoshizoe Accelerated UCT and Its Application to
Two-Player Games . . . . . . . . . . . . 1--12
Gabriel Van Eyck and
Martin Müller Revisiting Move Groups in Monte--Carlo
Tree Search . . . . . . . . . . . . . . 13--23
Petr Baudi\vs and
Jean-loup Gailly PACHI: State of the Art Open Source Go
Program . . . . . . . . . . . . . . . . 24--38
Hendrik Baier and
Mark H. M. Winands Time Management for Monte--Carlo Tree
Search in Go . . . . . . . . . . . . . . 39--51
Richard J. Lorentz An MCTS Program to Play EinStein Würfelt
Nicht! . . . . . . . . . . . . . . . . . 52--59
Jan A. Stankiewicz and
Mark H. M. Winands Monte--Carlo Tree Search Enhancements
for Havannah . . . . . . . . . . . . . . 60--71
J. (Pim) A. M. Nijssen and
Mark H. M. Winands Playout Search for Monte--Carlo Tree
Search in Multi-player Games . . . . . . 72--83
Cheng-Wei Chou and
Ping-Chiang Chou and
Hassen Doghmen Towards a Solution of 7x7 Go with
Meta-MCTS . . . . . . . . . . . . . . . 84--95
Bruno Bouzy and
Marc Métivier and
Damien Pellier MCTS Experiments on the Voronoi Game . . 96--107
Jiao Wang and
Shiyuan Li and
Jitong Chen and
Xin Wei and
Huizhan Lv 4*4-Pattern and Bayesian Learning in
Monte--Carlo Go . . . . . . . . . . . . 108--120
I-Chen Wu and
Hsin-Ti Tsai and
Hung-Hsuan Lin and
Yi-Shan Lin Temporal Difference Learning for
Connect6 . . . . . . . . . . . . . . . . 121--133
Nikolaos Papahristou and
Ioannis Refanidis Improving Temporal Difference Learning
Performance in Backgammon Variants . . . 134--145
Rémi Coulom CLOP: Confident Local Optimization for
Noisy Black-Box Parameter Tuning . . . . 146--157
Tomoyuki Kaneko and
Kunihito Hoki Analysis of Evaluation-Function Learning
by Comparison of Sibling Nodes . . . . . 158--169
Todd W. Neller and
Steven Hnath Approximating Optimal Dudo Play with
Fixed-Strategy Iteration Counterfactual
Regret Minimization . . . . . . . . . . 170--183
Kunihito Hoki and
Tomoyuki Kaneko The Global Landscape of Objective
Functions for the Optimization of Shogi
Piece Values with a Game-Tree Search . . 184--195
Abdallah Saffidine and
Nicolas Jouandeau and
Tristan Cazenave Solving breakthrough with Race Patterns
and Job-Level Proof Number Search . . . 196--207
Yoshiaki Yamaguchi and
Kazunori Yamaguchi and
Tetsuro Tanaka Infinite Connect-Four Is Solved: Draw 208--219
Henry Brausen and
Ryan B. Hayward and
Martin Müller and
Abdul Qadir Blunder Cost in Go and Hex . . . . . . . 220--229
Kenneth W. Regan and
Bartlomiej Macieja and
Guy McC. Haworth Understanding Distributions of Chess
Performances . . . . . . . . . . . . . . 230--243
Anonymous Front Matter . . . . . . . . . . . . . . ??
Wiebe van der Hoek Control and Delegation . . . . . . . . . 1--2
Louise A. Dennis Plan Indexing for State-Based Plans . . 3--15
Michael Winikoff An Integrated Formal Framework for
Reasoning about Goal Interactions . . . 16--32
Shahriar Bijani and
David Robertson and
David Aspinall Probing Attacks on Multi-Agent Systems
Using Electronic Institutions . . . . . 33--50
Akìn Günay and
Pìnar Yolum Detecting Conflicts in Commitments . . . 51--66
Tran Cao Son and
Enrico Pontelli and
Chiaki Sakama Formalizing Commitments Using Action
Languages . . . . . . . . . . . . . . . 67--83
David Robertson Lightweight Coordination Calculus for
Agent Systems: Retrospective and
Prospective . . . . . . . . . . . . . . 84--89
Amit K. Chopra and
Munindar P. Singh The Evolution of Interoperability . . . 90--94
Viviana Mascardi and
Davide Ancona 1000 Years of Coo-BDI . . . . . . . . . 95--101
Andrés García-Camino and
Juan-Antonio Rodríguez-Aguilar and
Carles Sierra A Distributed Architecture for
Norm-Aware Agent Societies: a
Retrospective . . . . . . . . . . . . . 102--110
Álvaro F. Moreira and
Renata Vieira and
Rafael H. Bordini Speech-Act Based Communication: Progress
in the Formal Semantics and in the
Implementation of Multi-agent Oriented
Programming Languages . . . . . . . . . 111--116
Nicoletta Fornara and
Marco Colombetti Specifying and Enforcing Norms in
Artificial Institutions: a Retrospective
Review . . . . . . . . . . . . . . . . . 117--119
Paolo Torroni and
Federico Chesani and
Paola Mello and
Marco Montali A Retrospective on the Reactive Event
Calculus and Commitment Modeling
Language . . . . . . . . . . . . . . . . 120--127
David Corsar and
Alison Chorley and
Wamberto W. Vasconcelos Web Service Composition via
Organisation-Based (Re)Planning . . . . 128--148
Rafael H. Bordini Agent and Multi-Agent Software
Engineering: Modelling, Programming, and
Verification . . . . . . . . . . . . . . 149--151
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Bjòrnar Solhaug and
Ketil Stòlen Uncertainty, Subjectivity, Trust and
Risk: How It All Fits together . . . . . 1--5
Audun Jòsang Trust Extortion on the Internet . . . . 6--21
Carsten Rudolph Trust Areas: a Security Paradigm for the
Future Internet . . . . . . . . . . . . 22--27
Stephen Marsh and
Sylvie Noël and
Tim Storer and
Yao Wang Non-standards for Trust: Foreground
Trust and Second Thoughts for Mobile
Security . . . . . . . . . . . . . . . . 28--39
Jamie Morgenstern and
Deepak Garg and
Frank Pfenning A Proof-Carrying File System with
Revocable and Use-Once Certificates . . 40--55
Valerio Genovese and
Deepak Garg New Modalities for Access Control
Logics: Permission, Control and
Ratification . . . . . . . . . . . . . . 56--71
Neyire Deniz Sarier Security Notions of Biometric Remote
Authentication Revisited . . . . . . . . 72--89
Sascha Müller and
Stefan Katzenbeisser Hiding the Policy in Cryptographic
Access Control . . . . . . . . . . . . . 90--105
Klaus Rechert and
Benjamin Greschbach Location Privacy in Relation to Trusted
Peers . . . . . . . . . . . . . . . . . 106--121
Wojciech Jamroga and
Sjouke Mauw and
Matthijs Melissen Fairness in Non-Repudiation Protocols 122--139
Liang Chen and
Jason Crampton Risk-Aware Role-Based Access Control . . 140--156
Alessandro Armando and
Silvio Ranise Automated Analysis of Infinite State
Workflows with Access Control Policies 157--174
Henrich C. Pöhls and
Focke Höhne The Role of Data Integrity in EU Digital
Signature Legislation --- Achieving
Statutory Trust for Sanitizable
Signature Schemes . . . . . . . . . . . 175--192
Ulrich Greveler and
Benjamin Justus and
Dennis Löhr Mutual Remote Attestation: Enabling
System Cloning for TPM Based Platforms 193--206
Pablo Najera and
Rodrigo Roman and
Javier Lopez Secure Architecure for the Integration
of RFID and Sensors in Personal Networks 207--222
Syed Sadiqur Rahman and
Sadie Creese and
Michael Goldsmith Accepting Information with a Pinch of
Salt: Handling Untrusted Information
Sources . . . . . . . . . . . . . . . . 223--238
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Chitralekha Gupta and
Preeti Rao Objective Assessment of Ornamentation in
Indian Classical Singing . . . . . . . . 1--25
Moujhuri Patra and
Soubhik Chakraborty and
Dipak Ghosh Optimized Neural Architecture for Time
Series Prediction Using Raga Notes . . . 26--33
Sankalp Gulati and
Vishweshwara Rao and
Preeti Rao Meter Detection from Audio for Indian
Music . . . . . . . . . . . . . . . . . 34--43
Shashi Bhushan Singh and
Soubhik Chakraborty and
Keashav Mohan Jha Assessment of Level of Recovery of
Cognitive Impairment in the
Cerebrovascular Accident and Head
Injuries Cases: Therapeutic Impact of
North Indian Ragas . . . . . . . . . . . 44--52
Matthias Braeunig and
Ranjan Sengupta and
Anirban Patranabis On Tanpura Drone and Brain Electrical
Correlates . . . . . . . . . . . . . . . 53--65
Jun Wu and
Shigeki Sagayama Musical Instrument Identification Based
on New Boosting Algorithm with
Probabilistic Decisions . . . . . . . . 66--78
Kristoffer Jensen Music Genre Classification Using an
Auditory Memory Model . . . . . . . . . 79--88
Yago de Quay Interactive Music 3.0: Empowering People
to Participate Musically Inside
Nightclubs . . . . . . . . . . . . . . . 89--97
Joe Cheri Ross and
John Samuel Hierarchical Clustering of Music
Database Based on HMM and Markov Chain
for Search Efficiency . . . . . . . . . 98--103
Ryan Stables and
Cham Athwal and
Jamie Bullock Fundamental Frequency Modulation in
Singing Voice Synthesis . . . . . . . . 104--119
Kristian Nymoen and
Jim Torresen and
Rolf Inge Godòy and
Alexander Refsum Jensenius A Statistical Approach to Analyzing
Sound Tracings . . . . . . . . . . . . . 120--145
Thibaud Necciari and
Peter Balazs and
Richard Kronland-Martinet and
Sòlvi Ystad and
Bernhard Laback Auditory Time-Frequency Masking:
Psychoacoustical Data and Application to
Audio Representations . . . . . . . . . 146--171
Mitsuko Aramaki and
Richard Kronland-Martinet and
Sòlvi Ystad Perceptual Control of Environmental
Sound Synthesis . . . . . . . . . . . . 172--186
Utpal Bhattacharjee Recognition of Assamese Phonemes Using
RNN Based Recognizer . . . . . . . . . . 187--196
Asoke Kumar Datta and
Arup Saha A System for Analysis of Large Scale
Speech Data for the Development of Rules
of Intonation for Speech Synthesis . . . 197--206
Sanghamitra Mohanty and
Basanta Kumar Swain Adaptive and Iterative Wiener Filter for
Oriya Speech Processing Applications . . 207--214
Asoke Kumar Datta and
Bhaswati Mukherjee On the Role of Formants in Cognition of
Vowels and Place of Articulation of
Plosives . . . . . . . . . . . . . . . . 215--234
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Viviana Bono and
Sara Capecchi and
Ilaria Castellani A Reputation System for Multirole
Sessions . . . . . . . . . . . . . . . . 1--24
Tzu-Chun Chen and
Laura Bocchi and
Pierre-Malo Deniélou Asynchronous Distributed Monitoring for
Multiparty Session Enforcement . . . . . 25--45
Bernd Werther and
Nicklas Hoch E-Mobility as a Challenge for New ICT
Solutions in the Car Industry . . . . . 46--57
Carme \`Alvarez and
Amalia Duch and
Maria Serna and
Dimitrios Thilikos On the Existence of Nash Equilibria in
Strategic Search Games . . . . . . . . . 58--72
Gilles Barthe and
Exequiel Rivas Static Enforcement of Information Flow
Policies for a Concurrent JVM-like
Language . . . . . . . . . . . . . . . . 73--88
Marco Bernardo Weak Markovian Bisimulation Congruences
and Exact CTMC-Level Aggregations for
Sequential Processes . . . . . . . . . . 89--103
Maria Grazia Buscemi and
Mario Coppo Constraints for Service Contracts . . . 104--120
Liqun Chen and
Ming-Feng Lee and
Bogdan Warinschi Security of the Enhanced TCG Privacy-CA
Solution . . . . . . . . . . . . . . . . 121--141
Liliana D'Errico and
Michele Loreti Context Aware Specification and
Verification of Distributed Systems . . 142--159
Rocco De Nicola and
Andrea Margheri and
Francesco Tiezzi Orchestrating Tuple-Based Languages . . 160--178
Dominic Duggan and
Ye Wu Transactional Correctness for Secure
Nested Transactions . . . . . . . . . . 179--196
Joaquim Gabarro and
Maria Serna and
Alan Stewart Orchestrating Unreliable Services:
Strategic and Probabilistic Approaches
to Reliability . . . . . . . . . . . . . 197--211
Hernán Melgratti and
Christian Roldán On Correlation Sets and Correlation
Exceptions in ActiveBPEL . . . . . . . . 212--226
Chenyi Zhang Conditional Information Flow Policies
and Unwinding Relations . . . . . . . . 227--241
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
James Reinders Only the First Steps of the Parallel
Evolution Have Been Taken Thus Far . . . 1--9
Marta Garcia and
Julita Corbalan and
Rosa Maria Badia and
Jesus Labarta A Dynamic Load Balancing Approach with
SMPSuperscalar and MPI . . . . . . . . . 10--23
Iris Christadler and
Giovanni Erbacci and
Alan D. Simpson Performance and Productivity of New
Programming Languages . . . . . . . . . 24--35
Alexander Heinecke and
Michael Klemm and
Hans Pabst and
Dirk Pflüger Towards High-Performance Implementations
of a Custom HPC Kernel Using \reg Array
Building Blocks . . . . . . . . . . . . 36--47
Charly Bechara and
Nicolas Ventroux and
Daniel Etiemble AHDAM: An Asymmetric Homogeneous with
Dynamic Allocator Manycore Chip . . . . 48--59
Micha\l Fularz and
Marek Kraft and
Adam Schmidt and
Andrzej Kasi\'nski FPGA Implementation of the Robust
Essential Matrix Estimation with RANSAC
and the $8$-Point and the $5$-Point
Method . . . . . . . . . . . . . . . . . 60--71
Wlodzimierz Bielecki and
Marek Palkowski Using Free Scheduling for Programming
Graphic Cards . . . . . . . . . . . . . 72--83
Katsuya Kawanami and
Noriyuki Fujimoto GPU Accelerated Computation of the
Longest Common Subsequence . . . . . . . 84--95
Oscar Hernandez and
Wei Ding and
Barbara Chapman and
Christos Kartsaklis and
Ramanan Sankaran Experiences with High-Level Programming
Directives for Porting Applications to
GPUs . . . . . . . . . . . . . . . . . . 96--107
Bas O. Fagginger Auer and
Rob H. Bisseling A GPU Algorithm for Greedy Graph
Matching . . . . . . . . . . . . . . . . 108--119
Dorian Krause and
Mark Potse and
Thomas Dickopf and
Rolf Krause and
Angelo Auricchio and
Frits Prinzen Hybrid Parallelization of a Large-Scale
Heart Model . . . . . . . . . . . . . . 120--132
Jiri Kraus and
Malte Förster Efficient AMG on Heterogeneous Systems 133--146
Karl Rupp and
Ansgar Jüngel and
Tibor Grasser A GPU-Accelerated Parallel
Preconditioner for the Solution of the
Boltzmann Transport Equation for
Semiconductors . . . . . . . . . . . . . 147--157
Vincent Heuveline and
Dimitar Lukarski and
Nico Trost and
Jan-Philipp Weiss Parallel Smoothers for Matrix-Based
Geometric Multigrid Methods on Locally
Refined Meshes Using Multicore CPUs and
GPUs . . . . . . . . . . . . . . . . . . 158--171
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Krasimir Angelov and
Ramona Enache Typeful Ontologies with Direct
Multilingual Verbalization . . . . . . . 1--20
Alexandra Bünzli and
Stefan Höfler Controlling Ambiguities in Legislative
Language . . . . . . . . . . . . . . . . 21--42
Marcos Cramer and
Bernhard Schröder Interpreting Plurals in the Naproche CNL 43--52
Pradeep Dantuluri and
Brian Davis and
Pierre Ludwick Engineering a Controlled Natural
Language into Semantic MediaWiki . . . . 53--72
Norbert E. Fuchs First-Order Reasoning for Attempto
Controlled English . . . . . . . . . . . 73--94
Tobias Kuhn Codeco: a Practical Notation for
Controlled English Grammars in
Predictive Editors . . . . . . . . . . . 95--114
Aarne Ranta and
Ramona Enache and
Grégoire Détrez Controlled Language for Everyday Use:
The MOLTO Phrasebook . . . . . . . . . . 115--136
John J. Camilleri and
Gordon J. Pace and
Michael Rosner Controlled Natural Language in a Game
for Legal Assistance . . . . . . . . . . 137--153
Rolf Schwitter Working with Events and States in PENG
Light . . . . . . . . . . . . . . . . . 154--174
Silvie Spreeuwenberg and
Jeroen van Grondelle and
Ronald Heller Using CNL Techniques and Pattern
Sentences to Involve Domain Experts in
Modeling . . . . . . . . . . . . . . . . 175--193
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Kohei Honda Understanding Distributed Services
through the $ \pi $-Calculus . . . . . . 1--1
Étienne Lozes and
Jules Villard Reliable Contracts for Unreliable
Half-Duplex Communications . . . . . . . 2--16
Fangzhe Chang and
Pavithra Prabhakar and
Ramesh Viswanathan Behavior Based Service Composition . . . 17--31
Beno\^\it Masson and
Lo\"\ic Hélouët and
Albert Benveniste Compatibility of Data-Centric Web
Services . . . . . . . . . . . . . . . . 32--47
Hugo A. López and
Jorge A. Pérez Time and Exceptional Behavior in
Multiparty Structured Interactions . . . 48--63
Manuel Mazzara and
Faisal Abouzaid and
Nicola Dragoni Toward Design, Modelling and Analysis of
Dynamic Workflow Reconfigurations . . . 64--78
José Antonio Mateo and
Valentín Valero and
Gregorio Díaz An Operational Semantics of BPEL
Orchestrations Integrating Web Services
Resource Framework . . . . . . . . . . . 79--94
Elie Fares and
Jean-Paul Bodeveix and
Mamoun Filali Design of a BPEL Verification Tool . . . 95--110
Roberto Bruni and
Andrea Corradini and
Gianluigi Ferrari Applying Process Analysis to the Italian
eGovernment Enterprise Architecture . . 111--127
Juan Pedro Silva Gallino and
Miguel de Miguel Domain-Specific Multi-modeling of
Security Concerns in Service-Oriented
Architectures . . . . . . . . . . . . . 128--142
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Ugo Dal Lago and
Paolo Parisen Toldin A Higher-Order Characterization of
Probabilistic Polynomial Time . . . . . 1--18
Emanuele Cesena and
Marco Pedicini and
Luca Roversi Typing a Core Binary-Field Arithmetic in
a Light Logic . . . . . . . . . . . . . 19--35
Manuel Montenegro and
Olha Shkaravska and
Marko van Eekelen and
Ricardo Peña Interpolation-Based Height Analysis for
Improving a Recurrence Solver . . . . . 36--53
Pedro Lopez-Garcia and
Luthfi Darmawan and
Francisco Bueno and
Manuel Hermenegildo Interval-Based Resource Usage
Verification: Formalization and
Prototype . . . . . . . . . . . . . . . 54--71
Roberto M. Amadio and
Yann Régis-Gianas Certifying and Reasoning on Cost
Annotations of Functional Programs . . . 72--89
Mihail As\uavoae and
Irina M\uariuca As\uavoae and
Dorel Lucanu On Abstractions for Timing Analysis in
the $ \mathbb {K} $ Framework . . . . . 90--107
Vítor Rodrigues and
João Pedro Pedroso and
Mário Florido and
Simão Melo de Sousa Certifying Execution Time . . . . . . . 108--125
Christoph A. Herrmann and
Kevin Hammond Counter Automata for Parameterised
Timing Analysis of Box-Based Systems . . 126--141
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Andreas Heinig and
Vincent J. Mooney and
Florian Schmoll and
Peter Marwedel and
Krishna Palem Classification-Based Improvement of
Application Robustness and Quality of
Service in Probabilistic Computer
Systems . . . . . . . . . . . . . . . . 1--12
Christian Brehm and
Matthias May and
Christina Gimmler and
Norbert Wehn A Case Study on Error Resilient
Architectures for Wireless Communication 13--24
Oussama Tahan and
Mohamed Shawky Using Dynamic Task Level Redundancy for
OpenMP Fault Tolerance . . . . . . . . . 25--36
Yang Xu and
Rafael Rosales and
Bo Wang and
Martin Streubühr and
Ralph Hasholzner and
Christian Haubelt A Very Fast and Quasi-accurate
Power-State-Based System-Level Power
Modeling Methodology . . . . . . . . . . 37--49
Nikita Nikitin and
Jordi Cortadella Static Task Mapping for Tiled Chip
Multiprocessors with Multiple Voltage
Islands . . . . . . . . . . . . . . . . 50--62
Andreas Barthels and
Joachim Fröschl and
Hans-Ulrich Michel and
Uwe Baumgarten An Architecture for Power Management in
Automotive Systems . . . . . . . . . . . 63--73
Isaías A. Comprés Ureña and
Michael Riepen and
Michael Konow and
Michael Gerndt Invasive MPI on Intel's Single-Chip
Cloud Computer . . . . . . . . . . . . . 74--85
Davide Zoni and
Patrick Bellasi and
William Fornaciari A Low-Overhead Heuristic for Mixed
Workload Resource Partitioning in
Cluster-Based Architectures . . . . . . 86--97
Frédéric Boniol and
Hugues Cassé and
Eric Noulard and
Claire Pagetti Deterministic Execution Model on COTS
Hardware . . . . . . . . . . . . . . . . 98--110
Pascal Schleuniger and
Sally A. McKee and
Sven Karlsson Design Principles for Synthesizable
Processor Cores . . . . . . . . . . . . 111--122
Panayiotis Petrides and
George Nicolaides and
Pedro Trancoso HPC Performance Domains on Multi-core
Processors with Virtualization . . . . . 123--134
Jens Brandenburg and
Benno Stabernack A Generic and Non-intrusive Profiling
Methodology for SystemC Multi-core
Platform Simulation Models . . . . . . . 135--146
Richard Membarth and
Jan-Hugo Lupp and
Frank Hannig and
Jürgen Teich and
Mario Körner Dynamic Task-Scheduling and Resource
Management for GPU Accelerators in
Medical Imaging . . . . . . . . . . . . 147--159
Volker Hampel and
Thilo Pionteck and
Erik Maehle An Approach for Performance Estimation
of Hybrid Systems with FPGAs and GPUs as
Coprocessors . . . . . . . . . . . . . . 160--171
Sebastian Mattheis and
Tobias Schuele and
Andreas Raabe and
Thomas Henties and
Urs Gleim Work Stealing Strategies for Parallel
Stream Processing in Soft Real-Time
Systems . . . . . . . . . . . . . . . . 172--183
Matthew Bielby and
Miles Gould and
Nigel Topham Design Space Exploration of Hybrid Ultra
Low Power Branch Predictors . . . . . . 184--199
Ademola Fawibe and
Jared Sherman and
Krishna Kavi and
Mike Ignatowski and
David Mayhew New Memory Organizations for $3$D DRAM
and PCMs . . . . . . . . . . . . . . . . 200--211
Hao Zhang and
Hiroki Matsutani and
Yasuhiro Take and
Tadahiro Kuroda and
Hideharu Amano Vertical Link On/Off Control Methods for
Wireless $3$-D NoCs . . . . . . . . . . 212--224
Atis Elsts and
Rihards Balass and
Janis Judvaitis and
Reinholds Zviedris and
Girts Strazdins SADmote: a Robust and Cost-Effective
Device for Environmental Monitoring . . 225--237
Gadi Oxman and
Shlomo Weiss and
Yitzhak (Tsahi) Birk Streamlined Network-on-Chip for
Multicore Embedded Architectures . . . . 238--249
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Elvira Albert and
Puri Arenas and
Samir Genaim Automatic Inference of Resource
Consumption Bounds . . . . . . . . . . . 1--11
Aart Middeldorp Matrix Interpretations for Polynomial
Derivational Complexity of Rewrite
Systems . . . . . . . . . . . . . . . . 12--12
Boris Motik Parameterized Complexity and
Fixed-Parameter Tractability of
Description Logic Reasoning . . . . . . 13--14
Amir Aavani and
Xiongnan (Newman) Wu Enfragmo: a System for Modelling and
Solving Search Problems with Logic . . . 15--22
Beniamino Accattoli and
Delia Kesner The Permutative $ \lambda $-Calculus . . 23--36
Jesse Alama and
Daniel Kühlwein and
Josef Urban Automated and Human Proofs in General
Mathematics: An Initial Comparison . . . 37--45
Francesco Alberti and
Roberto Bruttomesso Lazy Abstraction with Interpolants for
Arrays . . . . . . . . . . . . . . . . . 46--61
María Alpuente and
Demis Ballis Backward Trace Slicing for Conditional
Rewrite Theories . . . . . . . . . . . . 62--76
Grigoris Antoniou and
Thomas Eiter and
Kewen Wang Forgetting for Defeasible Logic . . . . 77--91
David Aspinall and
Ewen Denney and
Christoph Lüth Querying Proofs . . . . . . . . . . . . 92--106
Franz Baader and
Alexander Okhotin Solving Language Equations and
Disequations with Applications to
Disunification in Description Logics and
Monadic Set Constraints . . . . . . . . 107--121
Nikola Bene\vs and
Jan K\vretínský Dual-Priced Modal Transition Systems
with Time Durations . . . . . . . . . . 122--137
Stefan Borgwardt and
Barbara Morawska Finding Finite Herbrand Models . . . . . 138--152
Lukas Bulwahn Smart Testing of Functional Programs in
Isabelle . . . . . . . . . . . . . . . . 153--167
Peter Bulychev and
Alexandre David Monitor-Based Statistical Model Checking
for Weighted Metric Temporal Logic . . . 168--182
José Luis Chacón and
Ramón Pino Pérez Duality between Merging Operators and
Social Contraction Operators . . . . . . 183--196
Arnaud Fietzke and
Evgeny Kruglov Automatic Generation of Invariants for
Circular Derivations in SUP(LA) . . . . 197--211
The Anh Han and
Ari Saptawijaya Moral Reasoning under Uncertainty . . . 212--227
Stefan Hetzl and
Alexander Leitsch Towards Algorithmic Cut-Introduction . . 228--242
Hadi Katebi and
Karem A. Sakallah Conflict Anticipation in the Search for
Graph Automorphisms . . . . . . . . . . 243--257
Anonymous Front Matter . . . . . . . . . . . . . . ??
Srinivas Bangalore Thinking Outside the Box for Natural
Language Processing . . . . . . . . . . 1--16
Aitor González and
German Rigau and
Mauro Castillo A Graph-Based Method to Improve WordNet
Domains . . . . . . . . . . . . . . . . 17--28
Sava\cs Yìldìrìm and
Tu\ugba Yìldìz Corpus-Driven Hyponym Acquisition for
Turkish Language . . . . . . . . . . . . 29--41
Renato Domínguez García and
Sebastian Schmidt and
Christoph Rensing and
Ralf Steinmetz Automatic Taxonomy Extraction in
Different Languages Using Wikipedia and
Minimal Language-Specific Information 42--53
He Tan and
Rajaram Kaliyaperumal and
Nirupama Benis Ontology-Driven Construction of Domain
Corpus with Frame Semantics Annotations 54--65
Qaiser Abbas Building a Hierarchical Annotated Corpus
of Urdu: The URDU.KON-TB Treebank . . . 66--79
Francisco J. Carreras-Riudavets and
Juan C. Rodríguez-del-Pino and
Zenón Hernández-Figueroa A Morphological Analyzer Using Hash
Tables in Main Memory (MAHT) and a
Lexical Knowledge Base . . . . . . . . . 80--91
N. Vasudevan and
Pushpak Bhattacharyya Optimal Stem Identification in Presence
of Suffix List . . . . . . . . . . . . . 92--103
Ramadan Alfared and
Denis Béchet On the Adequacy of Three POS Taggers and
a Dependency Parser . . . . . . . . . . 104--116
Kishorjit Nongmeikapam and
Aribam Umananda Sharma and
Laishram Martina Devi and
Nepoleon Keisam Will the Identification of Reduplicated
Multiword Expression (RMWE) Improve the
Performance of SVM Based Manipuri POS
Tagging? . . . . . . . . . . . . . . . . 117--129
Vladislav Kubo\vn and
Markéta Lopatková and
Martin Plátek On Formalization of Word Order
Properties . . . . . . . . . . . . . . . 130--141
Md. Izhar Ashraf and
Sitabhra Sinha Core-Periphery Organization of Graphemes
in Written Sequences: Decreasing
Positional Rigidity with Increasing Core
Order . . . . . . . . . . . . . . . . . 142--153
Nicolas Béchet and
Peggy Cellier and
Thierry Charnois and
Bruno Crémilleux Discovering Linguistic Patterns Using
Sequence Mining . . . . . . . . . . . . 154--165
Solen Quiniou and
Peggy Cellier and
Thierry Charnois and
Dominique Legallois What about Sequential Data Mining
Techniques to Identify Linguistic
Patterns for Stylistics? . . . . . . . . 166--177
Imran Sarwar Bajwa and
Mark Lee and
Behzad Bordbar Resolving Syntactic Ambiguities in
Natural Language Specification of
Constraints . . . . . . . . . . . . . . 178--187
Chamila Liyanage and
Randil Pushpananda and
Dulip Lakmal Herath and
Ruvan Weerasinghe A Computational Grammar of Sinhala . . . 188--200
Bahar Salehi and
Narjes Askarian and
Afsaneh Fazly Automatic Identification of Persian
Light Verb Constructions . . . . . . . . 201--210
Sudakshina Dutta and
Anupam Basu A Cognitive Approach to Word Sense
Disambiguation . . . . . . . . . . . . . 211--224
Yoan Gutiérrez and
Sonia Vázquez and
Andrés Montoyo A graph-Based Approach to WSD Using
Relevant Semantic Trees and $N$-Cliques
Model . . . . . . . . . . . . . . . . . 225--237
Kiem-Hieu Nguyen and
Cheol-Young Ock Using Wiktionary to Improve Lexical
Disambiguation in Multiple Languages . . 238--248
Anonymous Front Matter . . . . . . . . . . . . . . ??
Mari-Sanna Paukkeri and
Jaakko Väyrynen and
Antti Arppe Exploring Extensive Linguistic Feature
Sets in Near-Synonym Lexical Choice . . 1--12
Ralf Klabunde and
Sebastian Reuße and
Björn Schlünder Abduction in Games for a Flexible
Approach to Discourse Planning . . . . . 13--24
Salim Roukos and
Abraham Ittycheriah and
Jian-Ming Xu Document-Specific Statistical Machine
Translation for Improving Human
Translation Productivity . . . . . . . . 25--39
Tsuyoshi Okita and
Josef van Genabith Minimum Bayes Risk Decoding with
Enlarged Hypothesis Space in System
Combination . . . . . . . . . . . . . . 40--51
Hailong Cao and
Eiichiro Sumita and
Tiejun Zhao and
Sheng Li Phrasal Syntactic Category Sequence
Model for Phrase-Based MT . . . . . . . 52--59
Prashant Mathur and
Soma Paul Integration of a Noun Compound
Translator Tool with Moses for
English--Hindi Machine Translation and
Evaluation . . . . . . . . . . . . . . . 60--71
Rima Harastani and
Béatrice Daille and
Emmanuel Morin Neoclassical Compound Alignments from
Comparable Corpora . . . . . . . . . . . 72--82
Amir Hazem and
Emmanuel Morin QAlign: a New Method for Bilingual
Lexicon Extraction from Comparable
Corpora . . . . . . . . . . . . . . . . 83--96
Florian Petran Aligning the Un-Alignable --- a Pilot
Study Using a Noisy Corpus of
Nonstandardized, Semi-parallel Texts . . 97--109
Antoni Oliver and
Salvador Climent Parallel Corpora for WordNet
Construction: Machine Translation vs.
Automatic Sense Tagging . . . . . . . . 110--121
Keiji Yasuda and
Andrew Finch and
Eiichiro Sumita Method to Build a Bilingual Lexicon for
Speech-to-Speech Translation Systems . . 122--131
Nandita Tripathi and
Michael Oakes and
Stefan Wermter A Fast Subspace Text Categorization
Method Using Parallel Classifiers . . . 132--143
Dequan Zheng and
Chenghe Zhang and
Geli Fei and
Tiejun Zhao Research on Text Categorization Based on
a Weakly-Supervised Transfer Learning
Method . . . . . . . . . . . . . . . . . 144--156
Alberto Pérez García-Plaza and
Víctor Fresno and
Raquel Martínez Fuzzy Combinations of Criteria: An
Application to Web Page Representation
for Clustering . . . . . . . . . . . . . 157--168
Prajol Shrestha and
Christine Jacquin and
Béatrice Daille Clustering Short Text and Its Evaluation 169--180
Carlos Castillo and
Héctor Valero and
José Guadalupe Ramos and
Josep Silva Information Extraction from Webpages
Based on DOM Distances . . . . . . . . . 181--193
Qi Li and
Javier Artiles and
Taylor Cassidy and
Heng Ji Combining Flat and Structured Approaches
for Temporal Slot Filling or: How Much
to Compress? . . . . . . . . . . . . . . 194--205
Dina Wonsever and
Aiala Rosá and
Marisa Malcuori and
Guillermo Moncecchi and
Alan Descoins Event Annotation Schemes and Event
Recognition in Spanish Texts . . . . . . 206--218
Béatrice Arnulphy and
Xavier Tannier and
Anne Vilnat Automatically Generated Noun Lexicons
for Event Extraction . . . . . . . . . . 219--231
John Carroll and
Rob Koeling and
Shivani Puri Lexical Acquisition for Clinical Text
Mining Using Distributional Similarity 232--246
Anonymous Front Matter . . . . . . . . . . . . . . ??
Eugene Asarin Measuring Information in Timed Languages 1--2
Bernard Boigelot and
Julien Brusten and
Jean-François Degbomont Automata-Based Symbolic Representations
of Polyhedra . . . . . . . . . . . . . . 3--20
Gilles Dowek Around the Physical Church--Turing
Thesis: Cellular Automata, Formal
Languages, and the Principles of Quantum
Theory . . . . . . . . . . . . . . . . . 21--37
Rod Downey A Parameterized Complexity Tutorial . . 38--56
Jack H. Lutz The Computer Science of DNA
Nanotechnology . . . . . . . . . . . . . 57--57
Parosh Aziz Abdulla and
Mohamed Faouzi Atig and
Jari Stenman The Minimal Cost Reachability Problem in
Priced Timed Pushdown Systems . . . . . 58--69
Siva Anantharaman and
Christopher Bouchard and
Paliath Narendran and
Michael Rusinowitch Unification Modulo Chaining . . . . . . 70--82
Vikraman Arvind and
Yadu Vasudev Isomorphism Testing of Boolean Functions
Computable by Constant-Depth Circuits 83--94
Holger Bock Axelsen Reversible Multi-head Finite Automata
Characterize Reversible Logarithmic
Space . . . . . . . . . . . . . . . . . 95--105
Mikhail Barash and
Alexander Okhotin Defining Contexts in Context-Free
Grammars . . . . . . . . . . . . . . . . 106--118
Philip Bille and
Inge Li Gòrtz and
Jesper Kristensen Longest Common Extensions via
Fingerprinting . . . . . . . . . . . . . 119--130
Philip Bille and
Morten Stöckel Fast and Cache-Oblivious Dynamic
Programming with Local Dependencies . . 131--142
Beate Bollig and
Tobias Pröger An Efficient Implicit OBDD-Based
Algorithm for Maximal Matchings . . . . 143--154
Laura Bozzelli Strong Termination for Gap-Order
Constraint Abstractions of Counter
Systems . . . . . . . . . . . . . . . . 155--168
Julien Cervelle Covering Space in the Besicovitch
Topology . . . . . . . . . . . . . . . . 169--178
Jean-Marc Champarnaud and
Hadrien Jeanne and
Ludovic Mignot Approximate Regular Expressions and
Their Derivatives . . . . . . . . . . . 179--191
Gabriel Ciobanu and
G. Michele Pinna Catalytic Petri Nets Are Turing Complete 192--203
Alberto Dennunzio and
Enrico Formenti and
Julien Provillard Computational Complexity of Rule
Distributions of Non-uniform Cellular
Automata . . . . . . . . . . . . . . . . 204--215
Danny Dubé and
Mario Latendresse and
Pascal Tesson Conservative Groupoids Recognize Only
Regular Languages . . . . . . . . . . . 216--227
Michal Fori\vsek and
Lucia Keller and
Monika Steinová Advice Complexity of Online Coloring for
Paths . . . . . . . . . . . . . . . . . 228--239
Anonymous Front Matter . . . . . . . . . . . . . . ??
Artiom Alhazov Properties of Membrane Systems . . . . . 1--13
Jacob Beal Bridging Biology and Engineering
Together with Spatial Computing . . . . 14--18
Jean-Louis Giavitto The Modeling and the Simulation of the
Fluid Machines of Synthetic Biology . . 19--34
Radu Nicolescu Parallel and Distributed Algorithms in P
Systems . . . . . . . . . . . . . . . . 35--50
György Vaszil Variants of Distributed P Automata and
the Efficient Parallelizability of
Languages . . . . . . . . . . . . . . . 51--61
Oana Agrigoroaiei and
Gabriel Ciobanu Quantitative Causality in Membrane
Systems . . . . . . . . . . . . . . . . 62--72
Artiom Alhazov and
Alexander Krassovitskiy and
Yurii Rogozhin Circular Post Machines and P Systems
with Exo-insertion and Deletion . . . . 73--86
Francis George C. Cabarle and
Henry Adorna and
Miguel A. Martínez A Spiking Neural P System Simulator
Based on CUDA . . . . . . . . . . . . . 87--103
Lud\vek Cienciala and
Lucie Ciencialová and
Miroslav Langer Modularity in P Colonies with Checking
Rules . . . . . . . . . . . . . . . . . 104--119
Erzsébet Csuhaj-Varjú and
György Vaszil Finite dP Automata versus Multi-head
Finite Automata . . . . . . . . . . . . 120--138
Michael J. Dinneen and
Yun-Bum Kim and
Radu Nicolescu An Adaptive Algorithm for P System
Synchronization . . . . . . . . . . . . 139--164
Pierluigi Frisco and
Gordon Govan P Systems with Active Membranes
Operating under Minimal Parallelism . . 165--181
Thomas Hinze and
Christian Bodenstein and
Benedict Schau and
Ines Heiland and
Stefan Schuster Chemical Analog Computers for Clock
Frequency Control Based on P Modules . . 182--202
Xiaoli Huang and
Gexiang Zhang and
Haina Rong and
Florentin Ipate Evolutionary Design of a Simple Membrane
System . . . . . . . . . . . . . . . . . 203--214
Florentin Ipate and
Raluca Lefticaru and
Ignacio Pérez-Hurtado and
Mario J. Pérez-Jiménez Formal Verification of P Systems with
Active Membranes through Model Checking 215--225
Sergiu Ivanov Basic Concurrency Resolution in
Clock-Free P Systems . . . . . . . . . . 226--242
Linqiang Pan and
Jun Wang and
Hendrik Jan Hoogeboom Asynchronous Extended Spiking Neural P
Systems with Astrocytes . . . . . . . . 243--256
Luis F. Macías--Ramos and
Ignacio Pérez--Hurtado and
Manuel García--Quismondo A P-Lingua Based Simulator for Spiking
Neural P Systems . . . . . . . . . . . . 257--281
Vincenzo Manca and
Rosario Lombardo Computing with Multi-membranes . . . . . 282--299
Luca Marchetti and
Vincenzo Manca A Methodology Based on MP Theory for
Gene Expression Analysis . . . . . . . . 300--313
Anonymous Front Matter . . . . . . . . . . . . . . ??
Jun Fang and
Zhisheng Huang and
Frank van Harmelen A Method of Contrastive Reasoning with
Inconsistent Ontologies . . . . . . . . 1--16
Yuan Ren and
Jeff Z. Pan and
Kevin Lee Parallel ABox Reasoning of $ {\mathcal
{EL}} $ Ontologies . . . . . . . . . . . 17--32
Kisung Kim and
Bongki Moon and
Hyoung-Joo Kim RP-Filter: a Path-Based Triple Filtering
Method for Efficient SPARQL Query
Processing . . . . . . . . . . . . . . . 33--47
Hang Zhang and
Wei Hu and
Yuzhong Qu Constructing Virtual Documents for
Ontology Matching Using MapReduce . . . 48--63
Valeria Fionda and
Giuseppe Pirró Semantic Flow Networks: Semantic
Interoperability in Networks of
Ontologies . . . . . . . . . . . . . . . 64--79
Zhichun Wang and
Zhigang Wang and
Juanzi Li and
Jeff Z. Pan Building a Large Scale Knowledge Base
from Chinese Wiki Encyclopedia . . . . . 80--95
Kouji Kozaki and
Keisuke Hihara and
Riiciro Mizoguchi Dynamic \em Is --- a Hierarchy
Generation System Based on User's
Viewpoint . . . . . . . . . . . . . . . 96--111
Lihua Zhao and
Ryutaro Ichise Mid-Ontology Learning from Linked Data 112--127
Irene Celino and
Daniele Dell'Aglio An Ontological Formulation and an OPM
Profile for Causality in Planning
Applications . . . . . . . . . . . . . . 128--143
Jianfeng Du and
Shuai Wang and
Guilin Qi and
Jeff Z. Pan and
Yong Hu A New Matchmaking Approach Based on
Abductive Conjunctive Query Answering 144--159
Qi Gao and
Fabian Abel and
Geert-Jan Houben GeniUS: Generic User Modeling Library
for the Social Semantic Web . . . . . . 160--175
Yuan Tian and
Jürgen Umbrich and
Yong Yu Enhancing Source Selection for Live
Queries over Linked Data via Query Log
Mining . . . . . . . . . . . . . . . . . 176--191
Mengdong Yang and
Gang Wu Semantic Caching for Semantic Web
Applications . . . . . . . . . . . . . . 192--209
Xin Wang and
Thanassis Tiropanis and
Hugh C. Davis Evaluating Graph Traversal Algorithms
for Distributed SPARQL Query
Optimization . . . . . . . . . . . . . . 210--225
Gong Cheng and
Feng Ji and
Shengmei Luo and
Weiyi Ge and
Yuzhong Qu BipRank: Ranking and Summarizing RDF
Vocabulary Descriptions . . . . . . . . 226--241
Ross Horne and
Vladimiro Sassone and
Nicholas Gibbins Operational Semantics for SPARQL Update 242--257
Peiqin Gu and
Huajun Chen Knowledge-Driven Diagnostic System for
Traditional Chinese Medicine . . . . . . 258--267
Wenlei Zhou and
Haofen Wang and
Jiansong Chao and
Weinan Zhang and
Yong Yu LODDO: Using Linked Open Data
Description Overlap to Measure Semantic
Relatedness between Named Entities . . . 268--283
Andriy Nikolov and
Mathieu d'Aquin and
Enrico Motta What Should I Link to? Identifying
Relevant Sources and Classes for Data
Linking . . . . . . . . . . . . . . . . 284--299
Armin Haller and
Tudor Groza and
Florian Rosenberg Interacting with Linked Data via
Semantically Annotated Widgets . . . . . 300--317
Anonymous Front Matter . . . . . . . . . . . . . . ??
Howard Barringer and
Klaus Havelund Internal versus External DSLs for Trace
Analysis . . . . . . . . . . . . . . . . 1--3
Chao Wang and
Malay Ganai Predicting Concurrency Failures in the
Generalized Execution Traces of x86
Executables . . . . . . . . . . . . . . 4--18
Borzoo Bonakdarpour and
Sebastian Fischmeister Runtime Monitoring of Time-Sensitive
Systems . . . . . . . . . . . . . . . . 19--33
Martin Leucker Teaching Runtime Verification . . . . . 34--48
Sharad Malik Runtime Verification: a Computer
Architecture Perspective . . . . . . . . 49--62
Lukasz Ziarek and
Siddharth Tiwary and
Suresh Jagannathan Isolating Determinism in Multi-threaded
Programs . . . . . . . . . . . . . . . . 63--77
Horatiu Jula and
Silviu Andrica and
George Candea Efficiency Optimizations for
Implementations of Deadlock Immunity . . 78--93
Edwin Westbrook and
Jisheng Zhao and
Zoran Budimli\'c and
Vivek Sarkar Permission Regions for Race-Free
Parallelism . . . . . . . . . . . . . . 94--109
Konstantin Serebryany and
Alexander Potapenko and
Timur Iskhodzhanov and
Dmitriy Vyukov Dynamic Race Detection with LLVM
Compiler . . . . . . . . . . . . . . . . 110--114
Narcisa Andreea Milea and
Siau Cheng Khoo and
David Lo and
Cristian Pop NORT: Runtime Anomaly-Based Monitoring
of Malicious Behavior for Windows . . . 115--130
Fabrizio Maria Maggi and
Michael Westergaard and
Marco Montali and
Wil M. P. van der Aalst Runtime Verification of LTL-Based
Declarative Process Models . . . . . . . 131--146
Eugene Asarin and
Alexandre Donzé and
Oded Maler and
Dejan Nickovic Parametric Identification of Temporal
Properties . . . . . . . . . . . . . . . 147--160
William N. Sumner and
Christian Hammer and
Julian Dolby Marathon: Detecting Atomic-Set
Serializability Violations with Conflict
Graphs . . . . . . . . . . . . . . . . . 161--176
Bohuslav K\vrena and
Zden\vek Letko and
Tomá\vs Vojnar Coverage Metrics for Saturation-Based
and Search-Based Testing of Concurrent
Software . . . . . . . . . . . . . . . . 177--192
Scott D. Stoller and
Ezio Bartocci and
Justin Seyster and
Radu Grosu and
Klaus Havelund Runtime Verification with State
Estimation . . . . . . . . . . . . . . . 193--207
Samaneh Navabpour and
Chun Wah Wallace Wu and
Borzoo Bonakdarpour and
Sebastian Fischmeister Efficient Techniques for Near-Optimal
Instrumentation in Time-Triggered
Runtime Verification . . . . . . . . . . 208--222
Paolo Arcaini and
Angelo Gargantini and
Elvinia Riccobene CoMA: Conformance Monitoring of Java
Programs by Abstract State Machines . . 223--238
Thomas Reinbacher and
Jörg Brauer and
Daniel Schachinger and
Andreas Steininger Automated Test-Trace Inspection for
Microcontroller Binary Code . . . . . . 239--244
Steven P. Reiss and
Alexander Tarvo What Is My Program Doing? Program
Dynamics in Programmer's Terms . . . . . 245--259
David Basin and
Felix Klaedtke and
Eugen Z\ualinescu Algorithms for Monitoring Real-Time
Properties . . . . . . . . . . . . . . . 260--275
Anonymous Front Matter . . . . . . . . . . . . . . ??
Kristian Gjòsteen The Norwegian Internet Voting Protocol 1--18
Oliver Spycher and
Melanie Volkamer and
Reto Koenig Transparency and Technical Measures to
Establish Trust in Norwegian Internet
Voting . . . . . . . . . . . . . . . . . 19--35
Jordi Puiggalí Allepuz and
Sandra Guasch Castelló Internet Voting System with Cast as
Intended Verification . . . . . . . . . 36--52
Henry DeYoung and
Carsten Schürmann Linear Logical Voting Protocols . . . . 53--70
Michael Schläpfer and
Rolf Haenni and
Reto Koenig and
Oliver Spycher Efficient Vote Authorization in
Coercion-Resistant Internet Voting . . . 71--88
Mario Heiderich and
Tilman Frosch and
Marcus Niemietz and
Jörg Schwenk The Bug That Made Me President: a
Browser- and Web-Security Case Study on
Helios Voting . . . . . . . . . . . . . 89--103
Rui Joaquim and
Carlos Ribeiro An Efficient and Highly Sound Voter
Verification Technique and Its
Implementation . . . . . . . . . . . . . 104--121
Aleksander Essex and
Christian Henrich and
Urs Hengartner Single Layer Optical-Scan Voting with
Fully Distributed Trust . . . . . . . . 122--139
David Chaum and
Alex Florescu and
Mridul Nandi and
Stefan Popoveniuc and
Jan Rubio and
Poorvi L. Vora Paperless Independently-Verifiable
Voting . . . . . . . . . . . . . . . . . 140--157
Denise Demirel and
Maria Henning and
Peter Y. A. Ryan and
Steve Schneider and
Melanie Volkamer Feasibility Analysis of Prêt \`a Voter
for German Federal Elections . . . . . . 158--173
Steve Schneider and
Sriramkrishnan Srinivasan and
Chris Culnane and
James Heather and
Zhe Xia Prêt á Voter with Write-Ins . . . . . . . 174--189
Sergiu Bursuc and
Gurchetan S. Grewal and
Mark D. Ryan Trivitas: Voters Directly Verifying
Votes . . . . . . . . . . . . . . . . . 190--207
Sven Heiberg and
Peeter Laud and
Jan Willemson The Application of I-Voting for Estonian
Parliamentary Elections of 2011 . . . . 208--223
Richard Buckland and
Vanessa Teague and
Roland Wen Towards Best Practice for E-election
Systems . . . . . . . . . . . . . . . . 224--241
James Heather and
Morgan Llewellyn and
Vanessa Teague and
Roland Wen On the Side-Effects of Introducing
E-Voting . . . . . . . . . . . . . . . . 242--256
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Peter Auer Invited Talk: UCRL and Autonomous
Exploration . . . . . . . . . . . . . . 1--1
Kristian Kersting Invited Talk: Increasing
Representational Power and Scaling
Inference in Reinforcement Learning . . 2--2
Peter Stone Invited Talk: PRISM --- Practical RL:
Representation, Interaction, Synthesis,
and Mortality . . . . . . . . . . . . . 3--3
Csaba Szepesvári Invited Talk: Towards Robust
Reinforcement Learning Algorithms . . . 4--4
Francis Maes and
Louis Wehenkel and
Damien Ernst Automatic Discovery of Ranking Formulas
for Playing with Multi-armed Bandits . . 5--17
Sylvie C. W. Ong and
Yuri Grinberg and
Joelle Pineau Goal-Directed Online Learning of
Predictive Models . . . . . . . . . . . 18--29
Matthew Robards and
Peter Sunehag Gradient Based Algorithms with Loss
Functions and Kernels for Improved
On-Policy Control . . . . . . . . . . . 30--41
Mauricio Araya-López and
Olivier Buffet and
Vincent Thomas and
François Charpillet Active Learning of MDP Models . . . . . 42--53
Boris Lesner and
Bruno Zanuttini Handling Ambiguous Effects in Action
Learning . . . . . . . . . . . . . . . . 54--65
Phuong Nguyen and
Peter Sunehag and
Marcus Hutter Feature Reinforcement Learning in
Practice . . . . . . . . . . . . . . . . 66--77
Charles Elkan Reinforcement Learning with a Bilinear Q
Function . . . . . . . . . . . . . . . . 78--88
Matthieu Geist and
Bruno Scherrer $ \ell_1 $-Penalized Projected Bellman
Residual . . . . . . . . . . . . . . . . 89--101
Matthew W. Hoffman and
Alessandro Lazaric and
Mohammad Ghavamzadeh and
Rémi Munos Regularized Least Squares Temporal
Difference Learning with Nested $ \ell_2
$ and $ \ell_1 $ Penalization . . . . . 102--114
Bruno Scherrer and
Matthieu Geist Recursive Least-Squares Learning with
Eligibility Traces . . . . . . . . . . . 115--127
Nikolaos Tziortziotis and
Konstantinos Blekas Value Function Approximation through
Sparse Bayesian Modeling . . . . . . . . 128--139
Pablo Samuel Castro and
Doina Precup Automatic Construction of Temporally
Extended Actions for MDPs Using
Bisimulation Metrics . . . . . . . . . . 140--152
Kfir Y. Levy and
Nahum Shimkin Unified Inter and Intra Options Learning
Using Policy Gradient Methods . . . . . 153--164
Munu Sairamesh and
Balaraman Ravindran Options with Exceptions . . . . . . . . 165--176
Christos Dimitrakakis Robust Bayesian Reinforcement Learning
through Tight Lower Bounds . . . . . . . 177--188
Francis Maes and
Louis Wehenkel and
Damien Ernst Optimized Look-ahead Tree Search
Policies . . . . . . . . . . . . . . . . 189--200
Anonymous Front Matter . . . . . . . . . . . . . . ??
Andreas Berger and
Eduard Natale Assessing the Real-World Dynamics of DNS 1--14
Vinicius Gehlen and
Alessandro Finamore and
Marco Mellia and
Maurizio M. Munaf\`o Uncovering the Big Players of the Web 15--28
Steffen Gebert and
Rastin Pries and
Daniel Schlosser and
Klaus Heck Internet Access Traffic Measurement and
Analysis . . . . . . . . . . . . . . . . 29--42
Liang Chen and
Xingang Shi and
Dah Ming Chiu From ISP Address Announcement Patterns
to Routing Scalability . . . . . . . . . 43--47
Juan Pablo Timpanaro and
Isabelle Chrisment and
Olivier Festor I2P's Usage Characterization . . . . . . 48--51
Claudio Testa and
Dario Rossi and
Ashwin Rao and
Arnaud Legout Experimental Assessment of BitTorrent
Completion Time in Heterogeneous TCP/uTP
Swarms . . . . . . . . . . . . . . . . . 52--65
Pierdomenico Fiadino and
Danilo Valerio and
Fabio Ricciato and
Karin Anna Hummel Steps towards the Extraction of
Vehicular Mobility Patterns from 3G
Signaling Data . . . . . . . . . . . . . 66--80
Jan Jusko and
Martin Rehak Identifying Skype Nodes in the Network
Exploiting Mutual Contacts . . . . . . . 81--84
Alfonso Iacovazzi and
Andrea Baiocchi Padding and Fragmentation for Masking
Packet Length Statistics . . . . . . . . 85--88
Cihangir Be\csikta\cs and
Hacì Ali Mantar Real-Time Traffic Classification Based
on Cosine Similarity Using
Sub-application Vectors . . . . . . . . 89--92
Karel Bartos and
Martin Rehak Towards Efficient Flow Sampling
Technique for Anomaly Detection . . . . 93--106
Aymen Hafsaoui and
Guillaume Urvoy-Keller and
Matti Siekkinen and
Denis Collange Detecting and Profiling TCP Connections
Experiencing Abnormal Performance . . . 107--120
Yuval Shavitt and
Noa Zilberman Geographical Internet PoP Level Maps . . 121--124
Heng Cui and
Ernst Biersack Distributed Troubleshooting of Web
Sessions Using Clustering . . . . . . . 125--128
Pehr Söderman and
Markus Hidell and
Peter Sjödin Using Metadata to Improve Experiment
Reliability in Shared Environments . . . 129--142
Luca Deri and
Simone Mainardi and
Francesco Fusco \tt tsdb: a Compressed Database for Time
Series . . . . . . . . . . . . . . . . . 143--156
Nicola Bonelli and
Andrea Di Pietro and
Stefano Giordano and
Gregorio Procissi Flexible High Performance Traffic
Generation on Commodity Multi--core
Platforms . . . . . . . . . . . . . . . 157--170
João Marco C. Silva and
Solange Rito Lima Improving Network Measurement Efficiency
through Multiadaptive Sampling . . . . . 171--174
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Colin Bellinger and
B. John Oommen On the Pattern Recognition and
Classification of Stochastically
Episodic Events . . . . . . . . . . . . 1--35
Linh Anh Nguyen and
Andrzej Sza\las Paraconsistent Reasoning for Semantic
Web Agents . . . . . . . . . . . . . . . 36--55
Zulfiqar A. Memon and
Jan Treur An Agent Model for Cognitive and
Affective Empathic Understanding of
Other Agents . . . . . . . . . . . . . . 56--83
Jacek Jakie\la and
Pawe\l Litwin and
Marcin Olech Multiagent Based Simulation as a Supply
Chain Analysis Workbench . . . . . . . . 84--104
Leszek Kotulski and
Adam S\kedziwy On the Effective Distribution and
Maintenance of Knowledge Represented by
Complementary Graphs . . . . . . . . . . 105--120
Magdalena Godlewska Agent System for Managing Distributed
Mobile Interactive Documents in
Knowledge-Based Organizations . . . . . 121--145
Bart\lomiej Józef Dzie\'nkowski Agent Cooperation within Adversarial
Teams in Dynamic Environment --- Key
Issues and Development Trends . . . . . 146--169
Bogumil Kaminski and
Maciej Latek On Pricing Strategies of Boundedly
Rational Telecommunication Operators . . 170--180
Norihiro Kamide Reasoning about Time-Dependent
Multi-agents: Foundations of Theorem
Proving and Model Checking . . . . . . . 181--201
Filippo Neri Learning Predictive Models for Financial
Time Series by Using Agent Based
Simulations . . . . . . . . . . . . . . 202--221
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Lieven De Lathauwer Block Component Analysis, a New Concept
for Blind Source Separation . . . . . . 1--8
Tomer Michaeli and
Daniel Sigalov and
Yonina C. Eldar Partially Linear Estimation with
Application to Image Deblurring Using
Blurred/Noisy Image Pairs . . . . . . . 9--16
Zhitang Chen and
Laiwan Chan Causal Discovery for Linear Non-Gaussian
Acyclic Models in the Presence of Latent
Gaussian Confounders . . . . . . . . . . 17--24
Stefan Haufe and
Vadim V. Nikulin and
Guido Nolte Alleviating the Influence of Weak Data
Asymmetries on Granger-Causal Analyses 25--33
Zhiyao Duan and
Gautham J. Mysore and
Paris Smaragdis Online PLCA for Real-Time
Semi-supervised Source Separation . . . 34--41
Benedikt Loesch and
Bin Yang Cramér--Rao Bound for Circular Complex
Independent Component Analysis . . . . . 42--49
Ke Wang and
Xiao-Feng Gong and
Qiu-Hua Lin Complex Non-Orthogonal Joint
Diagonalization Based on LU and LQ
Decompositions . . . . . . . . . . . . . 50--57
Yannick Deville and
Alain Deville Exact and Approximate Quantum
Independent Component Analysis for Qubit
Uncoupling . . . . . . . . . . . . . . . 58--65
Hao Shen and
Martin Kleinsteuber A Matrix Joint Diagonalization Approach
for Complex Independent Vector Analysis 66--73
Hao Shen and
Martin Kleinsteuber Algebraic Solutions to Complex Blind
Source Separation . . . . . . . . . . . 74--81
Arie Yeredor On the Separation Performance of the
Strong Uncorrelating Transformation When
Applied to Generalized Covariance and
Pseudo-covariance Matrices . . . . . . . 82--90
Juha Karhunen and
Tele Hao and
Jarkko Ylipaavalniemi A Canonical Correlation Analysis Based
Method for Improving BSS of Two Related
Data Sets . . . . . . . . . . . . . . . 91--98
Julian Mathias Becker and
Martin Spiertz and
Volker Gnann A Probability-Based Combination Method
for Unsupervised Clustering with
Application to Blind Source Separation 99--106
Alon Slapak and
Arie Yeredor Charrelation Matrix Based ICA . . . . . 107--114
Jason A. Palmer and
Scott Makeig Contrast Functions for Independent
Subspace Analysis . . . . . . . . . . . 115--122
Jarkko Ylipaavalniemi and
Nima Reyhani and
Ricardo Vigário Distributional Convergence of Subspace
Estimates in FastICA: a Bootstrap Study 123--130
Sylvain Le Corff and
Gersende Fort and
Eric Moulines New Online EM Algorithms for General
Hidden Markov Models. Application to the
SLAM Problem . . . . . . . . . . . . . . 131--138
Miguel Almeida and
Ricardo Vigário and
José Bioucas-Dias The Role of Whitening for Separation of
Synchronous Sources . . . . . . . . . . 139--146
Frank C. Meinecke Simultaneous Diagonalization of
Skew-Symmetric Matrices in the
Symplectic Group . . . . . . . . . . . . 147--154
Dana Lahat and
Jean-François Cardoso and
Hagit Messer Joint Block Diagonalization Algorithms
for Optimal Separation of
Multidimensional Components . . . . . . 155--162
Anonymous Front Matter . . . . . . . . . . . . . . ??
Changhyun Lee and
D. K. Lee and
Sue Moon Unmasking the Growing UDP Traffic in a
Campus Network . . . . . . . . . . . . . 1--10
Nadi Sarrar and
Gregor Maier and
Bernhard Ager and
Robin Sommer and
Steve Uhlig Investigating IPv6 Traffic . . . . . . . 11--20
Ahlem Reggani and
Fabian Schneider and
Renata Teixeira An End-Host View on Local Traffic at
Home and Work . . . . . . . . . . . . . 21--31
Mikko V. J. Heikkinen and
Arthur W. Berger Comparison of User Traffic
Characteristics on Mobile-Access versus
Fixed-Access Networks . . . . . . . . . 32--41
Christian Lyra and
Carmem S. Hara and
Elias P. Duarte, Jr. BackStreamDB: a Distributed System for
Backbone Traffic Monitoring Providing
Arbitrary Measurements in Real-Time . . 42--52
Lukasz Golab and
Theodore Johnson and
Subhabrata Sen and
Jennifer Yates A Sequence-Oriented Stream Warehouse
Paradigm for Network Monitoring
Applications . . . . . . . . . . . . . . 53--63
Nicola Bonelli and
Andrea Di Pietro and
Stefano Giordano and
Gregorio Procissi On Multi--gigabit Packet Capturing with
Multi--core Commodity Hardware . . . . . 64--73
Yordanos Beyene and
Michalis Faloutsos and
Harsha V. Madhyastha SyFi: a Systematic Approach for
Estimating Stateful Firewall Performance 74--84
Charalampos Rotsos and
Nadi Sarrar and
Steve Uhlig and
Rob Sherwood and
Andrew W. Moore OFLOPS: An Open Framework for OpenFlow
Switch Evaluation . . . . . . . . . . . 85--95
Lucas DiCioccio and
Renata Teixeira and
Martin May and
Christian Kreibich Probe and Pray: Using UPnP for Home
Network Measurements . . . . . . . . . . 96--105
Moshe Rutgaizer and
Yuval Shavitt and
Omer Vertman and
Noa Zilberman Detecting Pedophile Activity in
BitTorrent Networks . . . . . . . . . . 106--115
Maria Konte and
Nick Feamster Re-wiring Activity of Malicious Networks 116--125
Rafael R. R. Barbosa and
Ramin Sadre and
Aiko Pras Difficulties in Modeling SCADA Traffic:
a Comparative Analysis . . . . . . . . . 126--135
Ahmed Elmokashfi and
Amund Kvalbein and
Jie Xiang and
Kristian R. Evensen Characterizing Delays in Norwegian $3$G
Networks . . . . . . . . . . . . . . . . 136--146
Xiaozheng Tie and
Kishore Ramachandran and
Rajesh Mahindra On 60 GHz Wireless Link Performance in
Indoor Environments . . . . . . . . . . 147--157
Sipat Triukose and
Sebastien Ardon and
Anirban Mahanti and
Aaditeshwar Seth Geolocating IP Addresses in Cellular
Data Networks . . . . . . . . . . . . . 158--167
Oana Goga and
Renata Teixeira Speed Measurements of Residential
Internet Access . . . . . . . . . . . . 168--178
Nevil Brownlee One-Way Traffic Monitoring with iatmon 179--188
Walter de Donato and
Pietro Marchetta and
Antonio Pescapé A Hands-on Look at Active Probing Using
the IP Prespecified Timestamp Option . . 189--199
Matthias Wählisch and
Thomas C. Schmidt and
Markus de Brün and
Thomas Häberlen Exposing a Nation-Centric View on the
German Internet --- a Change in
Perspective on AS-Level . . . . . . . . 200--210
Anonymous Front Matter . . . . . . . . . . . . . . ??
Thomas Schilling Constraint-Free Type Error Slicing . . . 1--16
Vladimir Komendantsky Subtyping by Folding an Inductive
Relation into a Coinductive One . . . . 17--32
Edwin Brady Epic --- a Library for Generating
Compilers . . . . . . . . . . . . . . . 33--48
Laurence E. Day and
Graham Hutton Towards Modular Compilers for Effects 49--64
Jean-Christophe Filliâtre and
K. Kalyanasundaram Functory: a Distributed Computing
Library for Objective Caml . . . . . . . 65--81
Christopher Brown and
Hans-Wolfgang Loidl and
Kevin Hammond ParaForming: Forming Parallel Haskell
Programs Using Novel Refactoring
Techniques . . . . . . . . . . . . . . . 82--97
Jost Berthold and
Andrzej Filinski and
Fritz Henglein and
Ken Friis Larsen and
Mogens Steffensen Functional High Performance Financial IT 98--113
Michael Lesniak Thread-Safe Priority Queues in Haskell
Based on Skiplists . . . . . . . . . . . 114--129
Milan Straka Adams' Trees Revisited . . . . . . . . . 130--145
Marco T. Morazán Functional Video Games in CS1 II . . . . 146--162
Jeroen Henrix and
Rinus Plasmeijer and
Peter Achten GiN: a Graphical Language and Tool for
Defining iTask Workflows . . . . . . . . 163--178
Germán Andrés Delbianco and
Mauro Jaskelioff and
Alberto Pardo Applicative Shortcut Fusion . . . . . . 179--194
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Soren Lauesen Why the Electronic Land Registry Failed 1--15
Barbara Paech and
Robert Heinrich and
Gabriele Zorn-Pauli and
Andreas Jung and
Siamak Tadjiky Answering a Request for Proposal ---
Challenges and Proposed Solutions . . . 16--29
Md. Rashed Iqbal Nekvi and
Nazim H. Madhavji and
Remo Ferrari and
Brian Berenbach Impediments to Requirements-Compliance 30--36
Eltjo R. Poort and
Nick Martens and
Inge van de Weerd and
Hans van Vliet How Architects See Non-Functional
Requirements: Beware of Modifiability 37--51
Anne Koziolek Research Preview: Prioritizing Quality
Requirements Based on Software
Architecture Evaluation Feedback . . . . 52--58
Junjie Wang and
Juan Li and
Qing Wang and
He Zhang and
Haitao Wang A Simulation Approach for Impact
Analysis of Requirement Volatility
Considering Dependency Change . . . . . 59--76
Nguyen Duc Anh and
Daniela S. Cruzes and
Reidar Conradi and
Martin Höst and
Xavier Franch Collaborative Resolution of Requirements
Mismatches When Adopting Open Source
Components . . . . . . . . . . . . . . . 77--93
Tim Gülke and
Bernhard Rumpe and
Martin Jansen and
Joachim Axmann High-Level Requirements Management and
Complexity Costs in Automotive
Development Projects: a Problem
Statement . . . . . . . . . . . . . . . 94--100
Martin Mahaux and
Alistair Mavin and
Patrick Heymans Choose Your Creativity: Why and How
Creativity in Requirements Engineering
Means Different Things to Different
People . . . . . . . . . . . . . . . . . 101--116
Christian Raspotnig and
Andreas Opdahl Supporting Failure Mode and Effect
Analysis: a Case Study with Failure
Sequence Diagrams . . . . . . . . . . . 117--131
Mohammad Jabed Morshed Chowdhury and
Raimundas Matulevi\vcius and
Guttorm Sindre and
Peter Karpati Aligning Mal-activity Diagrams and
Security Risk Management for Security
Requirements Definitions . . . . . . . . 132--139
Nicolas Genon and
Patrice Caire and
Hubert Toussaint and
Patrick Heymans and
Daniel Moody Towards a More Semantically Transparent
i* Visual Syntax . . . . . . . . . . . . 140--146
Sebastian Adam Providing Software Product Line
Knowledge to Requirements Engineers ---
a Template for Elicitation Instructions 147--164
Eric Knauss and
Kurt Schneider Supporting Learning Organisations in
Writing Better Requirements Documents
Based on Heuristic Critiques . . . . . . 165--171
Olawande Daramola and
Thomas Moser and
Guttorm Sindre and
Stefan Biffl Managing Implicit Requirements Using
Semantic Case-Based Reasoning Research
Preview . . . . . . . . . . . . . . . . 172--178
Jane Cleland-Huang and
Mats Heimdahl and
Jane Huffman Hayes and
Robyn Lutz and
Patrick Maeder Trace Queries for Safety Requirements in
High Assurance Systems . . . . . . . . . 179--193
Yang Li and
Walid Maalej Which Traceability Visualization Is
Suitable in This Context? A Comparative
Study . . . . . . . . . . . . . . . . . 194--210
Daniel Berry and
Ricardo Gacitua and
Pete Sawyer and
Sri Fatimah Tjong The Case for Dumb Requirements
Engineering Tools . . . . . . . . . . . 211--217
Elia Bruni and
Alessio Ferrari and
Norbert Seyff and
Gabriele Tolomei Automatic Analysis of Multimodal
Requirements: a Research Preview . . . . 218--224
Elke Hochmüller 10 Myths of Software Quality . . . . . . 225--231
Anonymous Front Matter . . . . . . . . . . . . . . ??
Grzegorz Skorupa and
Wojciech Lorkiewicz and
Rados\law Katarzyniak A Multi-agent Strategy for Integration
of Imprecise Descriptions . . . . . . . 1--10
Kazimierz Wilkosz and
Zofia Kruczkiewicz and
Tomasz Babczy\'nski Performance Evaluation of
Multiagent-System Oriented Models for
Efficient Power System Topology
Verification . . . . . . . . . . . . . . 11--20
Nguyen Tran Minh Khue and
Nhon Van Do Building a Model of an Intelligent
Multi-Agent System Based on Distributed
Knowledge Bases for Solving Problems
Automatically . . . . . . . . . . . . . 21--32
Fu-Shiung Hsieh and
Jim-Bon Lin Temporal Reasoning in Multi-agent
Workflow Systems Based on Formal Models 33--42
Vinh Gia Nhi Nguyen and
Hiep Xuan Huynh and
Alexis Drogoul Assessing Rice Area Infested by Brown
Plant Hopper Using Agent-Based and
Dynamically Upscaling Approach . . . . . 43--52
Vishnuvardhan Mannava and
T. Ramesh A Service Administration Design Pattern
for Dynamically Configuring
Communication Services in Autonomic
Computing Systems . . . . . . . . . . . 53--63
Jialin Liu Chemical Process Fault Diagnosis Based
on Sensor Validation Approach . . . . . 64--73
Krzysztof Brzostowski and
Jaros\law Drapa\la and
Jerzy \'Swi\katek System Analysis Techniques in eHealth
Systems: a Case Study . . . . . . . . . 74--85
Hsueh-Wu Wang and
Ying-Ming Wu and
Yen-Ling Lu and
Ying-Tung Hsiao Detection of Facial Features on Color
Face Images . . . . . . . . . . . . . . 86--101
YuLung Wu Adaptive Learning Diagnosis Mechanisms
for E-Learning . . . . . . . . . . . . . 102--110
Wei-Ming Yeh New Integration Technology for Video
Virtual Reality . . . . . . . . . . . . 111--117
Hai-Cheng Chu and
Szu-Wei Yang Innovative Semantic Web Services for
Next Generation Academic Electronic
Library via Web 3.0 via Distributed
Artificial Intelligence . . . . . . . . 118--124
Shyi-Ming Chen and
Yun-Hou Huang and
Rung-Ching Chen and
Szu-Wei Yang and
Tian-Wei Sheu Using Fuzzy Reasoning Techniques and the
Domain Ontology for Anti-Diabetic Drugs
Recommendation . . . . . . . . . . . . . 125--135
Jia-Shing Sheu and
Yi-Ching Kao and
Hao Chu Content-Aware Image Resizing Based on
Aesthetic . . . . . . . . . . . . . . . 136--145
Nhon Do and
Thu-Le Pham A Functional Knowledge Model and
Application . . . . . . . . . . . . . . 146--155
Trong Hai Duong and
Hai Bang Truong and
Ngoc Thanh Nguyen Local Neighbor Enrichment for Ontology
Integration . . . . . . . . . . . . . . 156--166
Hsiang-Chuan Liu and
Shang-Ling Ou and
Hsien-Chang Tsai and
Yih-Chang Ou and
Yen-Kuei Yu A Novel Choquet Integral Composition
Forecasting Model Based on M-Density . . 167--176
Shota Sugiyama and
Hidemi Yamachi and
Munehiro Takimoto and
Yasushi Kambayashi Aggregating Multiple Robots with
Serialization . . . . . . . . . . . . . 177--186
Hai Bang Truong and
Ngoc Thanh Nguyen A Multi-attribute and Multi-valued Model
for Fuzzy Ontology Integrationon
Instance Level . . . . . . . . . . . . . 187--197
Keisuke Satta and
Munehiro Takimoto and
Yasushi Kambayashi Making Autonomous Robots Form Lines . . 198--207
Anonymous Front Matter . . . . . . . . . . . . . . ??
Long Thanh Ngo and
Binh Huy Pham Approach to Image Segmentation Based on
Interval Type-2 Fuzzy Subtractive
Clustering . . . . . . . . . . . . . . . 1--10
M. Javad Zomorodian and
Ali Adeli and
Mehrnoosh Sinaee and
Sattar Hashemi Improving Nearest Neighbor
Classification by Elimination of Noisy
Irrelevant Features . . . . . . . . . . 11--21
Naveen Kumar and
Anamika Gupta and
Vasudha Bhatnagar Lattice Based Associative Classifier . . 22--31
Shu-Ling Shieh and
Tsu-Chun Lin and
Yu-Chin Szu An Efficient Clustering Algorithm Based
on Histogram Threshold . . . . . . . . . 32--39
Mary Wu and
InTaek Leem and
Jason J. Jung and
ChongGun Kim A Resource Reuse Method in Cluster
Sensor Networks in Ad Hoc Networks . . . 40--50
Hyon Hee Kim and
Jinnam Jo and
Donggeon Kim Generation of Tag-Based User Profiles
for Clustering Users in a Social Music
Site . . . . . . . . . . . . . . . . . . 51--61
Tzu-Fu Chiu and
Chao-Fu Hong and
Yu-Ting Chiu A Proposed IPC-Based Clustering and
Applied to Technology Strategy
Formulation . . . . . . . . . . . . . . 62--72
Rajermani Thinakaran and
Elankovan Sundararajan Cluster Control Management as Cluster
Middleware . . . . . . . . . . . . . . . 73--82
Xin He and
Huiyun Jing and
Qi Han and
Xiamu Niu A Novel Nonparametric Approach for
Saliency Detection Using Multiple
Features . . . . . . . . . . . . . . . . 83--90
Huiyun Jing and
Xin He and
Qi Han and
Xiamu Niu Motion Vector Based Information Hiding
Algorithm for H.264/AVC against Motion
Vector Steganalysis . . . . . . . . . . 91--98
Xiamu Niu and
Zhongwei Shuai and
Yongqiang Lin and
Xuehu Yan A Novel Coding Method for Multiple
System Barcode Based on QR Code . . . . 99--108
Xiaolv Guo and
Shu-Chuan Chu and
Lin-Lin Tang and
John F. Roddick and
Jeng-Shyang Pan A Research on Behavior of Sleepy Lizards
Based on KNN Algorithm . . . . . . . . . 109--118
Lijun Yan and
Shu-Chuan Chu and
John F. Roddick and
Jeng-Shyang Pan Directional Discriminant Analysis Based
on Nearest Feature Line . . . . . . . . 119--128
Cheonshik Kim and
Dongkyoo Shin and
Dongil Shin and
Ching-Nung Yang A $ (2, 2) $ Secret Sharing Scheme Based
on Hamming Code and AMBTC . . . . . . . 129--139
Jen-Chi Huang and
Wen-Shyong Hsieh An Automatic Image Inpainting Method for
Rigid Moving Object . . . . . . . . . . 140--147
Wu-Chih Hu and
Jung-Fu Hsu Automatic Image Matting Using
Component-Hue-Difference-Based Spectral
Matting . . . . . . . . . . . . . . . . 148--157
Hooman Aghaebrahimi Samani and
Jeffrey Tzu Kwan Valino Koh and
Elham Saadatian Towards Robotics Leadership: An Analysis
of Leadership Characteristics and the
Roles Robots Will Inherit in Future
Human Society . . . . . . . . . . . . . 158--165
Meinu Quan and
Xuan Hau Pham and
Jason J. Jung and
Dosam Hwang Understanding Information Propagation on
Online Social Tagging Systems: a Case
Study on Flickr . . . . . . . . . . . . 166--174
Namho Chung and
Chulmo Koo and
Seung-Bae Park Why People Share Information in Social
Network Sites? Integrating with Uses and
Gratification and Social Identity
Theories . . . . . . . . . . . . . . . . 175--184
Chien-wen Shen and
Ping-Yu Hsu and
Yen-Ting Peng The Impact of Data Environment and
Profitability on Business Intelligence
Adoption . . . . . . . . . . . . . . . . 185--193
Anonymous Front Matter . . . . . . . . . . . . . . ??
Young Wook Seo and
Seong Wook Chae and
Kun Chang Lee The Impact of Human Brand Image Appeal
on Visual Attention and Purchase
Intentions at an E-commerce Website . . 1--9
Seong Wook Chae and
Young Wook Seo and
Kun Chang Lee Exploring Human Brands in Online
Shopping: An Eye-Tracking Approach . . . 10--18
Nam Yong Jo and
Kun Chang Lee and
Dae Sung Lee Task Performance under Stressed and
Non-stressed Conditions: Emphasis on
Physiological Approaches . . . . . . . . 19--26
Min Hee Hahn and
Do Young Choi and
Kun Chang Lee Characteristics of Decision-Making for
Different Levels of Product Involvement
Depending on the Degree of Trust
Transfer: a Comparison of Cognitive
Decision-Making Criteria and
Physiological Responses . . . . . . . . 27--36
Do Young Choi and
Min Hee Hahn and
Kun Chang Lee A Comparison of Buying Decision Patterns
by Product Involvement: An Eye-Tracking
Approach . . . . . . . . . . . . . . . . 37--46
Dae Sung Lee and
Kun Chang Lee and
Nam Yong Jo The Influence of Team-Member Exchange on
Self-reported Creativity in the Korean
Information and Communication Technology
(ICT) Industry . . . . . . . . . . . . . 47--54
Lingzhi Wang Semi-parametric Smoothing Regression
Model Based on GA for Financial Time
Series Forecasting . . . . . . . . . . . 55--64
Mythili Asaithambi and
Sujatha C. Manoharan and
Srinivasan Subramanian Classification of Respiratory
Abnormalities Using Adaptive Neuro Fuzzy
Inference System . . . . . . . . . . . . 65--73
Nai-Hua Chen An Ant Colony Optimization and Bayesian
Network Structure Application for the
Asymmetric Traveling Salesman Problem 74--78
S. A. Jafari and
S. Mashohor and
Abd. R. Ramli and
M. Hamiruce Marhaban Expert Pruning Based on Genetic
Algorithm in Regression Problems . . . . 79--88
Amirhossein Ghodrati and
Shahriar Lotfi A Hybrid CS/PSO Algorithm for Global
Optimization . . . . . . . . . . . . . . 89--98
Amirhossein Ghodrati and
Mohammad V. Malakooti and
Mansooreh Soleimani A Hybrid ICA/PSO Algorithm by Adding
Independent Countries for Large Scale
Global Optimization . . . . . . . . . . 99--108
Fatemeh Ramezani and
Shahriar Lotfi The Modified Differential Evolution
Algorithm (MDEA) . . . . . . . . . . . . 109--118
M. A. Soltani-Sarvestani and
Shahriar Lotfi and
Fatemeh Ramezani Quad Countries Algorithm (QCA) . . . . . 119--129
Vishnuvardhan Mannava and
T. Ramesh An Aspectual Feature Module Based
Adaptive Design Pattern for Autonomic
Computing Systems . . . . . . . . . . . 130--140
Noorhuzaimi Karimah Mohd Noor and
Shahrul Azman Noah and
Mohd Juzaiddin Ab Aziz Malay Anaphor and Antecedent Candidate
Identification: a Proposed Solution . . 141--151
V. Viswanathan and
Ilango Krishnamurthi Ranking Semantic Associations between
Two Entities --- Extended Model . . . . 152--162
Svetlana Machova and
Jana Kleckova The Quantum of Language: a Metaphorical
View of Mind Dimension . . . . . . . . . 163--168
Hee-Cheol Kim An Experimental Study to Explore
Usability Problems of Interactive Voice
Response Systems . . . . . . . . . . . . 169--177
Piotr Chyna\l and
Jerzy M. Szyma\'nski and
Janusz Sobecki Using Eyetracking in a Mobile
Applications Usability Testing . . . . . 178--186
Anonymous Front Matter . . . . . . . . . . . . . . ??
Karel Heyse and
Brahim Al Farisi and
Karel Bruneel and
Dirk Stroobandt Automating Reconfiguration Chain
Generation for SRL-Based Run-Time
Reconfiguration . . . . . . . . . . . . 1--12
Kizheppatt Vipin and
Suhaib A. Fahmy Architecture-Aware
Reconfiguration-Centric Floorplanning
for Partial Reconfiguration . . . . . . 13--25
Wang Luzhou and
Kentaro Sano and
Satoru Yamamoto Domain-Specific Language and Compiler
for Stencil Computation on FPGA-Based
Systolic Computational-Memory Array . . 26--39
Yongjoo Kim and
Jongeun Lee and
Jinyong Lee and
Toan X. Mai and
Ingoo Heo and
Yunheung Paek Exploiting Both Pipelining and Data
Parallelism with SIMD Reconfigurable
Architecture . . . . . . . . . . . . . . 40--52
Florent de Dinechin and
Laurent-Stéphane Didier Table-Based Division by Small Integer
Constants . . . . . . . . . . . . . . . 53--63
Qiang Liu and
Wayne Luk Heterogeneous Systems for Energy
Efficient Scientific Computing . . . . . 64--75
S. Arash Ostadzadeh and
Roel Meeuws and
Imran Ashraf and
Carlo Galuzzi and
Koen Bertels The $ Q^2 $ Profiling Framework: Driving
Application Mapping for Heterogeneous
Reconfigurable Platforms . . . . . . . . 76--88
Tassadaq Hussain and
Muhammad Shafiq and
Miquel Peric\`as and
Nacho Navarro and
Eduard Ayguadé PPMC: a Programmable Pattern Based
Memory Controller . . . . . . . . . . . 89--101
Fakhar Anjam and
Quan Kong and
Roel Seedorf and
Stephan Wong A Run-Time Task Migration Scheme for an
Adjustable Issue-Slots Multi-core
Processor . . . . . . . . . . . . . . . 102--113
Geoffrey Ndu and
Jim Garside Boosting Single Thread Performance in
Mobile Processors via Reconfigurable
Acceleration . . . . . . . . . . . . . . 114--125
Gang Zhou and
Li Li and
Harald Michalik Complexity Analysis of Finite Field
Digit Serial Multipliers on FPGAs . . . 126--137
Shinya Takamaeda-Yamazaki and
Shintaro Sano and
Yoshito Sakaguchi and
Naoki Fujieda and
Kenji Kise ScalableCore System: a Scalable
Many-Core Simulator by Employing over
100 FPGAs . . . . . . . . . . . . . . . 138--150
Sen Ma and
Miaoqing Huang and
Eugene Cartwright and
David Andrews Scalable Memory Hierarchies for Embedded
Manycore Systems . . . . . . . . . . . . 151--162
Takahiro Watanabe and
Minoru Watanabe Triple Module Redundancy of a Laser
Array Driver Circuit for Optically
Reconfigurable Gate Arrays . . . . . . . 163--173
Wei Ting Loke and
Yajun Ha A Routing Architecture for FPGAs with
Dual-VT Switch Box and Logic Clusters 174--186
Qiwei Jin and
Diwei Dong and
Anson H. T. Tse and
Gary C. T. Chow and
David B. Thomas and
Wayne Luk Multi-level Customisation Framework for
Curve Based Monte Carlo Financial
Simulations . . . . . . . . . . . . . . 187--201
Hiroki Nakahara and
Tsutomu Sasao and
Munehiro Matsuura A Low-Cost and High-Performance Virus
Scanning Engine Using a Binary CAM
Emulator and an MPU . . . . . . . . . . 202--214
Mohamad Sofian Abu Talip and
Takayuki Akamine and
Yasunori Osana and
Naoyuki Fujita Cost Effective Implementation of Flux
Limiter Functions Using Partial
Reconfiguration . . . . . . . . . . . . 215--226
Grigorios Mingas and
Christos-Savvas Bouganis Parallel Tempering MCMC Acceleration
Using Reconfigurable Hardware . . . . . 227--238
Abid Rafique and
Nachiket Kapre and
George A. Constantinides A High Throughput FPGA-Based
Implementation of the Lanczos Method for
the Symmetric Extremal Eigenvalue
Problem . . . . . . . . . . . . . . . . 239--250
Anonymous Front Matter . . . . . . . . . . . . . . ??