Last update:
Sat Oct 14 16:23:14 MDT 2017
Andreas Friesen and
Wolfgang Theilmann and
Markus Heller and
Jens Lemcke and
Christof Momm On Some Challenges in Business Systems
Management and Engineering for the
Networked Enterprise of the Future . . . 1--15
Youakim Badr and
Yong Peng and
Frédérique Biennier Digital Ecosystems for Business
e-Services in Knowledge-Intensive Firms 16--31
Birgit Hofreiter and
Christian Huemer and
Gerti Kappel and
Dieter Mayrhofer and
Jan vom Brocke Inter-organizational Reference Models
--- May Inter-organizational Systems
Profit from Reference Modeling? . . . . 32--47
Valeria Cardellini and
Emiliano Casalicchio and
Vincenzo Grassi and
Francesco Lo Presti On Guaranteeing Global Dependability
Properties in Collaborative Business
Process Management . . . . . . . . . . . 48--70
Eric Dubois and
Sylvain Kubicki and
Sophie Ramel and
André Rifaut Capturing and Aligning Assurance
Requirements for Business Services
Systems . . . . . . . . . . . . . . . . 71--92
Marco Anisetti and
Claudio A. Ardagna and
Ernesto Damiani Container-Level Security Certification
of Services . . . . . . . . . . . . . . 93--108
Leszek A. Maciaszek An Architectural Style for Trustworthy
Adaptive Service Based Applications . . 109--121
Michael Parkin and
Mike P. Papazoglou A Conceptual Architecture for
Business-Aware Transaction Management 122--137
Jörg Niemöller and
Eugen Freiter and
Konstantinos Vandikas and
Raphaël Quinet and
Roman Levenshteyn Composition in Heterogeneous Service
Networks: Requirements and Solutions . . 138--158
Fabrizio Smith and
Michele Missikoff and
Maurizio Proietti Ontology-Based Querying of Composite
Services . . . . . . . . . . . . . . . . 159--180
Ismael Bouassida Rodriguez and
Riadh Ben Halima and
Khalil Drira and
Christophe Chassot A Graph Grammar-Based Dynamic
Reconfiguration for Virtualized Web
Service-Based Composite Architectures 181--196
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Alexander Clark Logical Grammars, Logical Theories . . . 1--20
Christophe Fouqueré and
Myriam Quatrini Ludics and Natural Language: First
Approaches . . . . . . . . . . . . . . . 21--44
Nicholas Asher The Non Cooperative Basis of
Implicatures . . . . . . . . . . . . . . 45--57
Thomas Graf Movement-Generalized Minimalist Grammars 58--73
Yuri Ishishita and
Daisuke Bekki Toward the Formulation of Presupposition
by Illative Combinatory Logic . . . . . 74--85
Boris Karlov Abstract Automata and a Normal Form for
Categorial Dependency Grammars . . . . . 86--102
Gregory M. Kobele Importing Montagovian Dynamics into
Minimalism . . . . . . . . . . . . . . . 103--118
Gregory M. Kobele and
Jens Michaelis CoTAGs and ACGs . . . . . . . . . . . . 119--134
Yusuke Kubota and
Robert Levine Gapping as Like-Category Coordination 135--150
Stepan Kuznetsov $L$-Completeness of the Lambek Calculus
with the Reversal Operation . . . . . . 151--160
Zhe Lin Distributive Full Nonassociative Lambek
Calculus with S4-Modalities Is
Context-Free . . . . . . . . . . . . . . 161--172
Zhaohui Luo Common Nouns as Types . . . . . . . . . 173--185
Hiroko Ozaki and
Daisuke Bekki Extractability as the Deduction Theorem
in Subdirectional Combinatory Logic . . 186--200
Andrew Plummer and
Carl Pollard Agnostic Possible Worlds Semantics . . . 201--212
Kurt Ranalter Abstract Machines for Argumentation . . 213--228
Alexey Sorokin On the Completeness of Lambek Calculus
with Respect to Cofinite Language Models 229--233
Tao Xue and
Zhaohui Luo Dot-types and Their Implementation . . . 234--249
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Catherine Plaisant Life on the Line: Interacting with
Temporal Event Sequence Representations 1--2
Dave Barker-Plummer and
John Etchemendy and
Michael Murray and
Emma Pease and
Nik Swoboda Learning to Use the Openbox: a Framework
for the Implementation of Heterogeneous
Reasoning . . . . . . . . . . . . . . . 3--3
Peter Chapman and
Luana Micallef 3rd International Workshop on Euler
Diagrams . . . . . . . . . . . . . . . . 4--4
Richard Cox and
Jonathan San Diego Technology Enhanced Diagrams Research
Workshop . . . . . . . . . . . . . . . . 5--5
Cagatay Goncu and
Kim Marriott Accessible Graphics: Graphics for Vision
Impaired People . . . . . . . . . . . . 6--6
Lisa A. Best Graduate Student Symposium of Diagrams
2012 . . . . . . . . . . . . . . . . . . 7--7
Richard Burns and
Sandra Carberry and
Stephanie Elzer and
Daniel Chester Automatically Recognizing Intended
Messages in Grouped Bar Charts . . . . . 8--22
Barbara Tversky and
James E. Corter and
Lixiu Yu and
David L. Mason and
Jeffrey V. Nickerson Representing Category and Continuum:
Visualizing Thought . . . . . . . . . . 23--34
Emmanuel Manalo and
Yuri Uesaka Elucidating the Mechanism of Spontaneous
Diagram Use in Explanations: How
Cognitive Processing of Text and
Diagrammatic Representations Are
Influenced by Individual and
Task-Related Factors . . . . . . . . . . 35--50
Michael Wybrow and
Kim Marriott and
Peter J. Stuckey Orthogonal Hyperedge Routing . . . . . . 51--64
Lars Kristian Klauske and
Christoph Daniel Schulze and
Miro Spönemann and
Reinhard von Hanxleden Improved Layout for Data Flow Diagrams
with Port Constraints . . . . . . . . . 65--79
Christian Ernstbrunner and
Josef Pichler Aesthetic Layout of Wiring Diagrams . . 80--94
Cengiz Acartürk Points, Lines and Arrows in Statistical
Graphs . . . . . . . . . . . . . . . . . 95--101
Michael Burch and
Michael Raschke and
Miriam Greis and
Daniel Weiskopf Enriching Indented Pixel Tree Plots with
Node-Oriented Quantitative, Categorical,
Relational, and Time-Series Data . . . . 102--116
Michael T. Bradley and
Andrew Brand and
A. Luke MacNeill Interpreting Effect Size Estimates
through Graphic Analysis of Raw Data
Distributions . . . . . . . . . . . . . 117--123
Takeshi Sugio and
Atsushi Shimojima and
Yasuhiro Katagiri Psychological Evidence of Mental
Segmentation in Table Reading . . . . . 124--131
Ryo Takemura Proof-Theoretical Investigation of Venn
Diagrams: a Logic Translation and Free
Rides . . . . . . . . . . . . . . . . . 132--147
Paolo Bottoni and
Gennaro Costagliola and
Andrew Fish Euler Diagram Encodings . . . . . . . . 148--162
Matej Urbas and
Mateja Jamnik and
Gem Stapleton and
Jean Flower Speedith: a Diagrammatic Reasoner for
Spider Diagrams . . . . . . . . . . . . 163--177
Peter C.-H. Cheng Algebra Diagrams: a HANDi Introduction 178--192
Anonymous Front Matter . . . . . . . . . . . . . . ??
Vijay V. Vazirani Can the Theory of Algorithms Ratify the
``Invisible Hand of the Market''? . . . 1--5
Maxim Babenko and
Ivan Pouzyrevsky Resilient Quicksort and Selection . . . 6--17
Sebastian S. Bauer and
Uli Fahrenberg and
Axel Legay and
Claus Thrane General Quantitative Specification
Theories with Modalities . . . . . . . . 18--30
Michael Blondin and
Pierre McKenzie The Complexity of Intersecting Finite
Automata Having Few Final States . . . . 31--42
Bart\lomiej Bosek and
Stefan Felsner and
Kolja Knauer and
Grzegorz Matecki News about Semiantichains and Unichain
Coverings . . . . . . . . . . . . . . . 43--51
Dmitry V. Chistikov Checking Tests for Read-Once Functions
over Arbitrary Bases . . . . . . . . . . 52--63
Nachshon Cohen and
Zeev Nutov Approximating Minimum Power
Edge-Multi-Covers . . . . . . . . . . . 64--75
Evgeny Demenkov A Lower Bound on Circuit Complexity of
Vector Function in $U_2$ . . . . . . . . 76--80
Evgeny Demenkov and
Alexander S. Kulikov and
Ivan Mihajlin and
Hiroki Morizumi Computing All MOD-Functions
Simultaneously . . . . . . . . . . . . . 81--88
Volker Diekert and
Manfred Kufleitner Bounded Synchronization Delay in
Omega-Rational Expressions . . . . . . . 89--98
Martin Dietzfelbinger and
Michael Rink Towards Optimal Degree-Distributions for
Left-Perfect Matchings in Random
Bipartite Graphs . . . . . . . . . . . . 99--111
Stefan Dobrev and
Evangelos Kranakis and
Oscar Morales Ponce and
Milan Pl\vzík Robust Sensor Range for Constructing
Strongly Connected Spanning Digraphs in
UDGs . . . . . . . . . . . . . . . . . . 112--124
Amr Elmasry and
Jyrki Katajainen Worst-Case Optimal Priority Queues via
Extended Regular Counters . . . . . . . 125--137
Eli Fox-Epstein and
Danny Krizanc The Complexity of Minor-Ancestral Graph
Properties with Forbidden Pairs . . . . 138--147
Andreas Goerdt and
Lutz Falke Satisfiability Thresholds beyond
$k$-XORSAT . . . . . . . . . . . . . . . 148--159
Petr A. Golovach and
Bernard Lidický and
Barnaby Martin and
Daniël Paulusma Finding Vertex-Surjective Graph
Homomorphisms . . . . . . . . . . . . . 160--171
Pinar Heggernes and
Sigve H. Sæther Broadcast Domination on Block Graphs in
Linear Time . . . . . . . . . . . . . . 172--183
Bernhard Heinemann Characterizing Certain Topological
Specifications . . . . . . . . . . . . . 184--195
Galina Jirásková Descriptional Complexity of Operations
on Alternating and Boolean Automata . . 196--204
Timo Jolivet and
Jarkko Kari Consistency of Multidimensional
Combinatorial Substitutions . . . . . . 205--216
Anonymous Front Matter . . . . . . . . . . . . . . ??
Ron Shamir Gene Regulation, Protein Networks and
Disease: a Computational Perspective . . 1--1
Gonzalo Navarro Wavelet Trees for All . . . . . . . . . 2--26
Maxime Crochemore and
Costas S. Iliopoulos and
Tomasz Kociumaka and
Marcin Kubica The Maximum Number of Squares in a Tree 27--40
A\"\ida Ouangraoua and
Mathieu Raffinot Faster and Simpler Minimal Conflicting
Set Identification . . . . . . . . . . . 41--55
Sharon Bruckner and
Falk Hüffner and
Christian Komusiewicz and
Rolf Niedermeier and
Sven Thiel Partitioning into Colorful Components by
Minimum Edge Deletions . . . . . . . . . 56--69
Dima Blokh and
Danny Segev and
Roded Sharan Approximation Algorithms and Hardness
Results for Shortest Path Based Graph
Orientations . . . . . . . . . . . . . . 70--82
Dany Breslauer and
Leszek G\kasieniec and
Roberto Grossi Constant-Time Word-Size String Matching 83--96
Raphaël Clifford and
Markus Jalsenius and
Ely Porat and
Benjamin Sach Pattern Matching in Multiple Streams . . 97--109
Omar AitMous and
Frédérique Bassino and
Cyril Nicaud An Efficient Linear Pseudo-minimization
Algorithm for Aho--Corasick Automata . . 110--123
Christian Hundt and
Florian Wendland Efficient Two-Dimensional Pattern
Matching with Scaling and Rotation and
Higher-Order Interpolation . . . . . . . 124--137
Guillaume Blin and
Laurent Bulteau and
Minghui Jiang and
Pedro J. Tejada and
Stéphane Vialette Hardness of Longest Common Subsequence
for Sequences with Bounded Run-Lengths 138--148
Ferdinando Cicalese and
Eduardo Laber and
Oren Weimann and
Raphael Yuster Near Linear Time Construction of an
Approximate Index for All Maximum
Consecutive Sub-sums of a Sequence . . . 149--158
Anne Condon and
Ján Ma\vnuch and
Chris Thachuk The Complexity of String Partitioning 159--172
Wing-Kai Hon and
Rahul Shah and
Sharma V. Thankachan Towards an Optimal Space-and-Query-Time
Index for Top- k Document Retrieval . . 173--184
Wing-Kai Hon and
Rahul Shah and
Sharma V. Thankachan and
Jeffrey Scott Vitter Document Listing for Queries with
Excluded Pattern . . . . . . . . . . . . 185--195
Gregory Kucherov and
Yakov Nekrich and
Tatiana Starikovskaya Cross-Document Pattern Matching . . . . 196--207
Michael P. Ferguson FEMTO: Fast Search of Large Sequence
Collections . . . . . . . . . . . . . . 208--219
Keisuke Goto and
Hideo Bannai and
Shunsuke Inenaga and
Masayuki Takeda Speeding Up $q$-Gram Mining on
Grammar-Based Compressed Texts . . . . . 220--231
Pawe\l Gawrychowski Simple and Efficient LZW-Compressed
Multiple Pattern Matching . . . . . . . 232--242
Enno Ohlebusch and
Timo Beller and
Mohamed I. Abouelhoda Computing the Burrows--Wheeler Transform
of a String and Its Reverse . . . . . . 243--256
Anonymous Front Matter . . . . . . . . . . . . . . ??
Ioannis Caragiannis and
Christos Kalaitzis Space Lower Bounds for Low-Stretch
Greedy Embeddings . . . . . . . . . . . 1--12
Shiri Chechik and
David Peleg The Fault Tolerant Capacitated
$k$-Center Problem . . . . . . . . . . . 13--24
Yuval Emek and
Pierre Fraigniaud and
Amos Korman Notions of Connectivity in Overlay
Networks . . . . . . . . . . . . . . . . 25--35
Amotz Bar-Noy and
Ben Baumer and
Dror Rawitz Changing of the Guards: Strip Cover with
Duty Cycling . . . . . . . . . . . . . . 36--47
Henning Hasemann and
Juho Hirvonen Deterministic Local Algorithms, Unique
Identifiers, and Fractional Graph
Colouring . . . . . . . . . . . . . . . 48--60
Peter Kling and
Friedhelm Meyer auf der Heide An Algorithm for Online Facility Leasing 61--72
Martin Biely and
Peter Robinson and
Ulrich Schmid Agreement in Directed Dynamic Networks 73--84
Majid Khabbazian and
Stephane Durocher Bounding Interference in Wireless Ad Hoc
Networks with Nodes in Random Position 85--98
Mohsen Eftekhari Hesari and
Evangelos Kranakis Strong Connectivity of Sensor Networks
with Double Antennae . . . . . . . . . . 99--110
Dongxiao Yu and
Qiang-Sheng Hua and
Yuexuan Wang Distributed Multiple-Message Broadcast
in Wireless Ad-Hoc Networks under the
SINR Model . . . . . . . . . . . . . . . 111--122
Eyjólfur Ingi Ásgeirsson Wireless Network Stability in the SINR
Model . . . . . . . . . . . . . . . . . 123--134
Heger Arfaoui and
Pierre Fraigniaud What Can Be Computed without
Communications? . . . . . . . . . . . . 135--146
Vittorio Bil\`o and
Michele Flammini On Bidimensional Congestion Games . . . 147--158
Michele Flammini and
Vasco Gallotti Mobile Network Creation Games . . . . . 159--170
Carole Delporte-Gallet and
Hugues Fauconnier Homonyms with Forgeable Identifiers . . 171--182
Xavier Vilaça and
Oksana Denysyuk Asynchrony and Collusion in the
$N$-party BAR Transfer Problem . . . . . 183--194
Dan Alistarh and
Hagit Attiya and
Rachid Guerraoui Early Deciding Synchronous Renaming in
$O(\log f)$ Rounds or Less . . . . . . . 195--206
Jérémie Chalopin and
Yves Métivier On Snapshots and Stable Properties
Detection in Anonymous Fully Distributed
Systems (Extended Abstract) . . . . . . 207--218
Andreas Larsson and
Philippas Tsigas Self-stabilizing $(k,r)$-Clustering in
Clock Rate-Limited Systems . . . . . . . 219--230
Michel Raynal and
Julien Stainer Increasing the Power of the Iterated
Immediate Snapshot Model with Failure
Detectors . . . . . . . . . . . . . . . 231--242
Anonymous Front Matter . . . . . . . . . . . . . . ??
Parvaz Mahdabi and
Fabio Crestani Learning-Based Pseudo-Relevance Feedback
for Patent Retrieval . . . . . . . . . . 1--11
Katharina Wäschle and
Stefan Riezler Analyzing Parallelism and Domain
Similarities in the MAREC Patent Corpus 12--27
Khanh-Ly Nguyen and
Sung-Hyon Myaeng Query Enhancement for Patent
Prior-Art-Search Based on Keyterm
Dependency Relations and Semantic Tags 28--42
Víctor M. Prieto and
Manuel Álvarez and
Rafael López-García and
Fidel Cacheda Analysis and Detection of Web Spam by
Means of Web Content . . . . . . . . . . 43--57
Anastasia Moumtzidou and
Stefanos Vrochidis and
Sara Tonelli and
Ioannis Kompatsiaris Discovery of Environmental Nodes in the
Web . . . . . . . . . . . . . . . . . . 58--72
Pavlos Fafalios and
Ioannis Kitsos and
Yannis Marketakis and
Claudio Baldassarre Web Searching with Entity Mining at
Query Time . . . . . . . . . . . . . . . 73--88
Tobias Schleser and
Doris Ipsmiller and
Roland Mörzinger Patent and Norm Exploration with the m2n
Knowledge Discovery Suite . . . . . . . 89--93
Juan Carlos Gomez and
Marie-Francine Moens Hierarchical Classification of Web
Documents by Stratified Discriminant
Analysis . . . . . . . . . . . . . . . . 94--108
Stefanos Vrochidis and
Anastasia Moumtzidou and
Gerard Ypma and
Ioannis Kompatsiaris PatMedia: Augmenting Patent Search with
Content-Based Image Retrieval . . . . . 109--112
Kimmo Kettunen and
Paavo Arvola Generating Variant Keyword Forms for a
Morphologically Complex Language Leads
to Successful Information Retrieval with
Finnish . . . . . . . . . . . . . . . . 113--126
Wolfgang Tannebaum and
Andreas Rauber Analyzing Query Logs of USPTO Examiners
to Identify Useful Query Terms in Patent
Documents for Query Expansion in Patent
Searching: a Preliminary Study . . . . . 127--136
Luepol Pipanmaekaporn and
Yuefeng Li Discovering Relevant Features for
Effective Query Formulation . . . . . . 137--151
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Mohammad Ghodsi and
Anil Maheshwari and
Mostafa Nouri $\alpha$-Visibility . . . . . . . . . . 1--12
Jessica Sherette and
Carola Wenk Partial Matching between Surfaces Using
Fréchet Distance . . . . . . . . . . . . 13--23
Takehiro Ito and
Shin-Ichi Nakano and
Yoshio Okamoto and
Yota Otachi A Polynomial-Time Approximation Scheme
for the Geometric Unique Coverage
Problem on Unit Squares . . . . . . . . 24--35
Adrian Dumitrescu and
Joseph S. B. Mitchell and
Pawe\l \.Zyli\'nski Watchman Routes for Lines and Segments 36--47
Mohammad Ali Abam and
Zahed Rahmati and
Alireza Zarei Kinetic Pie Delaunay Graph and Its
Applications . . . . . . . . . . . . . . 48--58
Andreas Gemsa and
D. T. Lee and
Chih-Hung Liu and
Dorothea Wagner Higher Order City Voronoi Diagrams . . . 59--70
Babak Behsaz and
Mohammad R. Salavatipour On Minimum Sum of Radii and Diameters
Clustering . . . . . . . . . . . . . . . 71--82
Tomas Hruz and
Marcel Schöngens A Simple Framework for the Generalized
Nearest Neighbor Problem . . . . . . . . 83--94
Marek Cygan Deterministic Parameterized Connected
Vertex Cover . . . . . . . . . . . . . . 95--106
Esha Ghosh and
Sudeshna Kolay and
Mrinal Kumar and
Pranabendu Misra Faster Parameterized Algorithms for
Deletion to Split Graphs . . . . . . . . 107--118
Eun Jung Kim and
Christophe Paul and
Geevarghese Philip A Single-Exponential FPT Algorithm for
the $K_4$-Minor Cover Problem . . . . . 119--130
Yijie Han and
Tadao Takaoka An $O(n^3 \log \log n / \log^2 n)$ Time
Algorithm for All Pairs Shortest Paths 131--141
Aistis Atminas and
Vadim V. Lozin and
Igor Razgon Linear Time Algorithm for Computing a
Small Biclique in Graphs without Long
Induced Paths . . . . . . . . . . . . . 142--152
Petr A. Golovach and
Daniël Paulusma and
Erik Jan van Leeuwen Induced Disjoint Paths in AT-Free Graphs 153--164
Archontia C. Giannopoulou and
Iosif Salem and
Dimitris Zoros Effective Computation of Immersion
Obstructions for Unions of Graph Classes 165--176
Danny Z. Chen and
Yan Gu and
Jian Li and
Haitao Wang Algorithms on Minimizing the Maximum
Sensor Movement for Barrier Coverage of
a Linear Domain . . . . . . . . . . . . 177--188
Oleksiy Busaryev and
Sergio Cabello and
Chao Chen and
Tamal K. Dey Annotating Simplices with a Homology
Basis and Its Applications . . . . . . . 189--200
Rom Aschner and
Matthew J. Katz and
Gila Morgenstern Do Directional Antennas Facilitate in
Reducing Interferences? . . . . . . . . 201--212
Adrian Dumitrescu and
Sariel Har-Peled and
Csaba D. Tóth Minimum Convex Partitions and Maximum
Empty Polytopes . . . . . . . . . . . . 213--224
Markus Bläser and
Konstatinos Panagiotou A Probabilistic Analysis of
Christofides' Algorithm . . . . . . . . 225--236
Anonymous Front Matter . . . . . . . . . . . . . . ??
Wolfgang Thomas Synthesis and Some of Its Challenges . . 1--1
David L. Dill Model Checking Cell Biology . . . . . . 2--2
Rastislav Bodik and
Emina Torlak Synthesizing Programs with Constraint
Solvers . . . . . . . . . . . . . . . . 3--3
Aaron R. Bradley IC3 and beyond: Incremental, Inductive
Verification . . . . . . . . . . . . . . 4--4
Chris J. Myers Formal Verification of Genetic Circuits 5--5
Micha\l Moskal From C to Infinity and Back: Unbounded
Auto-active Verification with VCC . . . 6--6
Jan K\vretínský and
Javier Esparza Deterministic Automata for the
$(F,G)$-Fragment of LTL . . . . . . . . 7--22
Tomá\vs Brázdil and
Krishnendu Chatterjee and
Antonín Ku\vcera and
Petr Novotný Efficient Controller Synthesis for
Consumption Games with Multiple Resource
Types . . . . . . . . . . . . . . . . . 23--38
Rüdiger Ehlers ACTL $\cap$ LTL Synthesis . . . . . . . 39--54
Yu-Fang Chen and
Bow-Yaw Wang Learning Boolean Functions Incrementally 55--70
Rahul Sharma and
Aditya V. Nori and
Alex Aiken Interpolants as Classifiers . . . . . . 71--87
Wonchan Lee and
Bow-Yaw Wang and
Kwangkeun Yi Termination Analysis with Algorithmic
Learning . . . . . . . . . . . . . . . . 88--104
Marc Brockschmidt and
Richard Musiol and
Carsten Otto and
Jürgen Giesl Automated Termination Proofs for Java
Programs with Cyclic Data . . . . . . . 105--122
Javier Esparza and
Andreas Gaiser and
Stefan Kiefer Proving Termination of Probabilistic
Programs Using Patterns . . . . . . . . 123--138
Arnaud J. Venet The Gauge Domain: Scalable Analysis of
Linear Inequality Invariants . . . . . . 139--154
Josh Berdine and
Arlen Cox and
Samin Ishtiaq and
Christoph M. Wintersteiger Diagnosing Abstraction Failure for
Separation Logic--Based Analyses . . . . 155--173
Aditya Thakur and
Thomas Reps A Method for Symbolic Computation of
Abstract Operations . . . . . . . . . . 174--192
Simone Fulvio Rollini and
Ondrej Sery and
Natasha Sharygina Leveraging Interpolant Strength in Model
Checking . . . . . . . . . . . . . . . . 193--209
Mohamed Faouzi Atig and
Ahmed Bouajjani and
Michael Emmi and
Akash Lal Detecting Fair Non-termination in
Multithreaded Programs . . . . . . . . . 210--226
Vineet Kahlon and
Chao Wang Lock Removal for Concurrent Trace
Programs . . . . . . . . . . . . . . . . 227--242
Anonymous Front Matter . . . . . . . . . . . . . . ??
Claire R. Donoghue and
Anil Rao and
Anthony M. J. Bull and
Daniel Rueckert Robust Global Registration through
Geodesic Paths on an Empirical Manifold
with Knee MRI from the Osteoarthritis
Initiative (OAI) . . . . . . . . . . . . 1--10
Yi Hong and
Yundi Shi and
Martin Styner and
Mar Sanchez and
Marc Niethammer Simple Geodesic Regression for Image
Time-Series . . . . . . . . . . . . . . 11--20
Ryan D. Datteri and
Beno\^\it M. Dawant Automatic Detection of the Magnitude and
Spatial Location of Error in Non-rigid
Registration . . . . . . . . . . . . . . 21--30
Nicholas J. Tustison and
Brian B. Avants Diffeomorphic Directly Manipulated
Free-Form Deformation Image Registration
via Vector Field Flows . . . . . . . . . 31--39
Daniel Forsberg and
Gunnar Farnebäck and
Hans Knutsson and
Carl-Fredrik Westin Multi-modal Image Registration Using
Polynomial Expansion and Mutual
Information . . . . . . . . . . . . . . 40--49
Firdaus Janoos and
Petter Risholm and
William Wells III Bayesian Characterization of Uncertainty
in Multi-modal Image Registration . . . 50--59
Wei Sun and
Wiro J. Niessen and
Stefan Klein Hierarchical vs. Simultaneous
Multiresolution Strategies for Nonrigid
Image Registration . . . . . . . . . . . 60--69
David Thivierge-Gaulin and
Chen-Rui Chou and
Atilla P. Kiraly and
Christophe Chefd'Hotel $3$D--$2$D Registration Based on
Mesh-Derived Image Bisection . . . . . . 70--78
Marc Modat and
M. Jorge Cardoso and
Pankaj Daga and
David Cash and
Nick C. Fox and
Sébastien Ourselin Inverse-Consistent Symmetric Free Form
Deformation . . . . . . . . . . . . . . 79--88
Fitsum A. Reda and
Jack H. Noble and
Robert F. Labadie and
Beno\^\it M. Dawant Fully Automatic Surface-Based Pre- to
Intra-operative CT Registration for
Cochlear Implant . . . . . . . . . . . . 89--98
Istvan Csapo and
Brad Davis and
Yundi Shi and
Mar Sanchez and
Martin Styner and
Marc Niethammer Temporally-Dependent Image Similarity
Measure for Longitudinal Analysis . . . 99--109
Beno\^\it Compte and
Adrien Bartoli and
Daniel Pizarro Constant Flow Sampling: a Method to
Automatically Select the Regularization
Parameter in Image Registration . . . . 110--119
Takanori Watanabe and
Clayton Scott Spatial Confidence Regions for
Quantifying and Visualizing Registration
Uncertainty . . . . . . . . . . . . . . 120--130
Diego D. B. Carvalho and
Stefan Klein and
Zeynettin Akkus and
Gerrit L. ten Kate and
Hui Tang Registration of Free-Hand Ultrasound and
MRI of Carotid Arteries through
Combination of Point-Based and
Intensity-Based Algorithms . . . . . . . 131--140
Amin Katouzian and
Athanasios Karamalis and
Jennifer Lisauskas and
Abouzar Eslami and
Nassir Navab IVUS-Histology Image Registration . . . 141--149
Boris N. Oreshkin and
Tal Arbel Optimization over Random and Gradient
Probabilistic Pixel Sampling for Fast,
Robust Multi-resolution Image
Registration . . . . . . . . . . . . . . 150--159
\vZiga \vSpiclin and
Bo\vstjan Likar and
Franjo Pernu\vs Quad-tree Based Entropy Estimator for
Fast and Robust Brain Image Registration 160--169
Aditya Gupta and
Maria Escolar and
Cheryl Dietrich and
John Gilmore and
Guido Gerig and
Martin Styner $3$D Tensor Normalization for Improved
Accuracy in DTI Tensor Registration
Methods . . . . . . . . . . . . . . . . 170--179
Anand A. Joshi and
David W. Shattuck and
Richard M. Leahy A Method for Automated Cortical Surface
Registration and Labeling . . . . . . . 180--189
Lars Ruthotto and
Erlend Hodneland and
Jan Modersitzki Registration of Dynamic Contrast
Enhanced MRI with Local Rigidity
Constraint . . . . . . . . . . . . . . . 190--198
Anonymous Front Matter . . . . . . . . . . . . . . ??
Trevor Bench-Capon Marek Sergot: a Memoir . . . . . . . . . 1--3
Steve Barker and
Andrew J. I. Jones and
Antonis Kakas and
Robert A. Kowalski and
Alessio Lomuscio The Scientific Contribution of Marek
Sergot . . . . . . . . . . . . . . . . . 4--11
Robert A. Kowalski and
Fariba Sadri Teleo-Reactive Abductive Logic Programs 12--32
Paolo Mancarella and
Francesca Toni Semi-negative Abductive Logic Programs
with Implicative Integrity Constraints:
Semantics and Properties . . . . . . . . 33--51
Dov M. Gabbay What Is Negation as Failure? . . . . . . 52--78
Dario Della Monica and
Angelo Montanari and
Pietro Sala The Importance of the Past in Interval
Temporal Logics: The Case of
Propositional Neighborhood Logic . . . . 79--102
Evgenios Hadjisoteriou and
Antonis Kakas Argumentation and the Event Calculus . . 103--122
Stefano Bragaglia and
Federico Chesani and
Paola Mello and
Marco Montali and
Paolo Torroni Reactive Event Calculus for Monitoring
Global Computing Applications . . . . . 123--146
Justin Blount and
Michael Gelfond Reasoning about the Intentions of Agents 147--171
Alessio Lomuscio and
Wojciech Penczek Symbolic Model Checking for
Temporal-Epistemic Logic . . . . . . . . 172--195
Koen V. Hindriks and
Wiebe van der Hoek and
John-Jules Ch. Meyer GOAL Agents Instantiate Intention Logic 196--219
Trevor Bench-Capon Open Texture and Argumentation: What
Makes an Argument Persuasive? . . . . . 220--233
Paul E. Dunne Irrationality in Persuasive
Argumentation . . . . . . . . . . . . . 234--248
Henry Prakken Some Reflections on Two Current Trends
in Formal Argumentation . . . . . . . . 249--272
Andrew J. I. Jones and
Steven O. Kimbrough On the Representation of Normative
Sentences in FOL . . . . . . . . . . . . 273--294
Xavier Parent Why Be Afraid of Identity? . . . . . . . 295--307
Marco Alberti and
Marco Gavanelli and
Evelina Lamma Deon$^+$: Abduction and Constraints for
Normative Reasoning . . . . . . . . . . 308--328
Paolo Turrini and
Xavier Parent and
Leendert van der Torre and
Silvano Colombo Tosatto Contrary-To-Duties in Games . . . . . . 329--348
Steve Barker Logical Approaches to Authorization
Policies . . . . . . . . . . . . . . . . 349--373
Naftaly H. Minsky Decentralized Governance of Distributed
Systems via Interaction Control . . . . 374--400
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Melissa L. Hill and
Kela Liu and
James G. Mainprize and
Ronald B. Levitin and
Rushin Shojaii Pre-clinical Evaluation of Tumour
Angiogenesis with Contrast-Enhanced
Breast Tomosynthesis . . . . . . . . . . 1--8
Yue-Houng Hu and
David A. Scaduto and
Wei Zhao The Effect of Amorphous Selenium
Thickness on Imaging Performance of
Contrast Enhanced Digital Breast
Tomosynthesis . . . . . . . . . . . . . 9--16
Juan-Pablo Cruz-Bastida and
Iván Rosado-Méndez and
Héctor Pérez-Ponce and
Yolanda Villaseñor Contrast Optimization in Clinical
Contrast-Enhanced Digital Mammography
Images . . . . . . . . . . . . . . . . . 17--23
David A. Scaduto and
Wei Zhao Determination of System Geometrical
Parameters and Consistency between Scans
for Contrast-Enhanced Digital Breast
Tomosynthesis . . . . . . . . . . . . . 24--31
Sara Gavenonis and
Kristen Lau and
Roshan Karunamuni and
Yiheng Zhang and
Baorui Ren and
Chris Ruth Initial Experience with Dual-Energy
Contrast-Enhanced Digital Breast
Tomosynthesis in the Characterization of
Breast Cancer . . . . . . . . . . . . . 32--39
Wenda He and
Erika R. E. Denton and
Reyer Zwiggelaar Mammographic Segmentation and Risk
Classification Using a Novel Binary
Model Based Bayes Classifier . . . . . . 40--47
Thomy Mertzanidou and
John H. Hipwell and
Lianghao Han and
Zeike Taylor and
Henkjan Huisman Intensity-Based MRI to X-ray Mammography
Registration with an Integrated Fast
Biomechanical Transformation . . . . . . 48--55
Diksha Sharma and
Aldo Badano Comparison of Experimental, mantis, and
hybrid mantis X-ray Response for a
Breast Imaging CsI Detector . . . . . . 56--63
Fabián Narváez and
Eduardo Romero Breast Mass Classification Using
Orthogonal Moments . . . . . . . . . . . 64--71
Stefano Young and
Andreu Badal and
Kyle J. Myers and
Subok Park A Task-Specific Argument for
Variable-Exposure Breast Tomosynthesis 72--79
Tushita Patel and
Kelly Klanian and
Zongyi Gong and
Mark B. Williams Detective Quantum Efficiency of a
CsI-CMOS X-ray Detector for Breast
Tomosynthesis Operating in High Dynamic
Range and High Sensitivity Modes . . . . 80--87
Jan M. Lesniak and
Guido van Schie and
Christine Tanner and
Bram Platel and
Henkjan Huisman Multimodal Classification of Breast
Masses in Mammography and MRI Using
Unimodal Feature Selection and Decision
Fusion . . . . . . . . . . . . . . . . . 88--95
Jelena Bozek and
Michiel Kallenberg and
Mislav Grgic and
Nico Karssemeijer Comparison of Lesion Size Using Area and
Volume in Full Field Digital Mammograms 96--103
Masami Ando and
Qingkai Huo and
Shu Ichihara and
Tokiko Endo and
Tetsuya Yuasa and
Naoki Sunaguchi Very High Contrast and Very High Spatial
Resolution $2$-D, $2.5$-D and $3$-D
Breast Tissue Visualization under X-ray
Dark Field Imaging . . . . . . . . . . . 104--110
Alessandro Bria and
Claudio Marrocco and
Mario Molinara and
Francesco Tortorella Detecting Clusters of
Microcalcifications with a Cascade-Based
Approach . . . . . . . . . . . . . . . . 111--118
Nachiko Uchiyama and
Takayuki Kinoshita and
Takashi Hojo and
Sota Asaga and
Junko Suzuki Diagnostic Impact of Adjunction of
Digital Breast Tomosynthesis (DBT) to
Full Field Digital Mammography (FFDM)
and in Comparison with Full Field
Digital Mammography (FFDM) . . . . . . . 119--126
Sadaf Hashmi and
Jamie C. Sergeant and
Julie Morris and
Sigrid Whiteside and
Paula Stavrinos Ethnic Variation in Volumetric Breast
Density . . . . . . . . . . . . . . . . 127--133
Mariela A. Porras-Chaverri and
John R. Vetter and
Ralph Highnam Personalizing Mammographic Dosimetry
Using Multilayered Anatomy-Based Breast
Models . . . . . . . . . . . . . . . . . 134--140
Ingrid Reiser and
Beverly A. Lau and
Robert M. Nishikawa and
Predrag R. Bakic A Directional Small-Scale Tissue Model
for an Anthropomorphic Breast Phantom 141--148
Feiyu Chen and
David D. Pokrajac and
Xiquan Shi and
Fengshan Liu and
Andrew D. A. Maidment Simulation of Three Material Partial
Volume Averaging in a Software Breast
Phantom . . . . . . . . . . . . . . . . 149--156
Anonymous Front Matter . . . . . . . . . . . . . . ??
Jesse Alama and
Lionel Mamane and
Josef Urban Dependencies in Formal Mathematics:
Applications and Extraction for Coq and
Mizar . . . . . . . . . . . . . . . . . 1--16
Andrea Asperti Proof, Message and Certificate . . . . . 17--31
Timothy Bourke and
Matthias Daum and
Gerwin Klein and
Rafal Kolanski Challenges and Experiences in Managing
Large-Scale Proofs . . . . . . . . . . . 32--48
Catalin David and
Constantin Jucovschi and
Andrea Kohlhase and
Michael Kohlhase Semantic Alliance: a Framework for
Semantic Allies . . . . . . . . . . . . 49--64
Fulya Horozal and
Michael Kohlhase and
Florian Rabe Extending MKM Formats at the Statement
Level . . . . . . . . . . . . . . . . . 65--80
Rui Hu and
Vadim Mazalov and
Stephen M. Watt A Streaming Digital Ink Framework for
Multi-party Collaboration . . . . . . . 81--95
Constantin Jucovschi Cost-Effective Integration of MKM
Semantic Services into Editing
Environments . . . . . . . . . . . . . . 96--110
Paul Libbrecht and
Sandra Rebholz and
Daniel Herding and
Wolfgang Müller and
Felix Tscheulin Understanding the Learners' Actions when
Using Mathematics Learning Tools . . . . 111--126
Vesna Marinkovi\'c and
Predrag Jani\vci\'c Towards Understanding Triangle
Construction Problems . . . . . . . . . 127--142
Florian Rabe A Query Language for Formal Mathematical
Libraries . . . . . . . . . . . . . . . 143--158
Alan P. Sexton Abramowitz and Stegun --- a Resource for
Mathematical Document Analysis . . . . . 159--168
Carst Tankink and
Christoph Lange and
Josef Urban Point-and-Write --- Documenting Formal
Mathematics by Reference . . . . . . . . 169--185
Iain Whiteside and
David Aspinall and
Gudmund Grov An Essence of SSReflect . . . . . . . . 186--201
Jacques Carette and
Russell O'Connor Theory Presentation Combinators . . . . 202--215
Jónathan Heras and
María Poza and
Julio Rubio Verifying an Algorithm Computing
Discrete Vector Fields for Digital
Imaging . . . . . . . . . . . . . . . . 216--230
Muhammad Taimoor Khan and
Wolfgang Schreiner Towards the Formal Specification and
Verification of Maple Programs . . . . . 231--247
Filip Mari\'c and
Miodrag \vZivkovi\'c and
Bojan Vu\vckovi\'c Formalizing Frankl's Conjecture:
FC-Families . . . . . . . . . . . . . . 248--263
Mladen Nikoli\'c and
Predrag Jani\vci\'c CDCL-Based Abstract State Transition
System for Coherent Logic . . . . . . . 264--279
David J. Wilson and
Russell J. Bradford and
James H. Davenport Speeding Up Cylindrical Algebraic
Decomposition by Gröbner Bases . . . . . 280--294
Gabriel Dos Reis A System for Axiomatic Programming . . . 295--309
Anonymous Front Matter . . . . . . . . . . . . . . ??
Jacek Cicho\'n and
Jakub Lemiesz and
Marcin Zawada On Message Complexity of Extrema
Propagation Techniques . . . . . . . . . 1--13
Sang Hyuk Lee and
Tomasz Radzik Improved Approximation Bounds for
Maximum Lifetime Problems in Wireless
Ad-Hoc Network . . . . . . . . . . . . . 14--27
Sabrina Merkel and
Sanaz Mostaghim and
Hartmut Schmeck Distributed Geometric Distance
Estimation in Ad Hoc Networks . . . . . 28--41
Alexandre Mouradian and
Isabelle Augé-Blum $1$-D Coordinate Based on Local
Information for MAC and Routing Issues
in WSNs . . . . . . . . . . . . . . . . 42--55
Evangelos Kranakis and
Fraser MacQuarie and
Oscar Morales-Ponce and
Jorge Urrutia Uninterrupted Coverage of a Planar
Region with Rotating Directional
Antennae . . . . . . . . . . . . . . . . 56--68
Radu Ioan Ciobanu and
Ciprian Dobre and
Valentin Cristea Social Aspects to Support Opportunistic
Networks in an Academic Environment . . 69--82
Mikael Asplund and
Simin Nadjm-Tehrani Analysing Delay-Tolerant Networks with
Correlated Mobility . . . . . . . . . . 83--97
Waldir Moreira and
Manuel de Souza and
Paulo Mendes and
Susana Sargento Study on the Effect of Network Dynamics
on Opportunistic Routing . . . . . . . . 98--111
Micha\l Wódczak Autonomic Cooperative Networking for
Vehicular Communications . . . . . . . . 112--125
Shikha Sarkar and
Lina Stankovic and
Ivan Andonovic Protocol Design for Farm Animal
Monitoring Using Simulation . . . . . . 126--138
Guanyu Wang and
Qiang-Sheng Hua and
Yuexuan Wang Minimum Latency Aggregation Scheduling
for Arbitrary Tree Topologies under the
SINR Model . . . . . . . . . . . . . . . 139--152
Jacques M. Bahi and
Abdallah Makhoul and
Maguy Medlej An Optimized In-Network Aggregation
Scheme for Data Collection in Periodic
Sensor Networks . . . . . . . . . . . . 153--166
Nicholas M. Boers and
Ioanis Nikolaidis and
Pawel Gburzynski Impulsive Interference Avoidance in
Dense Wireless Sensor Networks . . . . . 167--180
Wei Shi and
Meng Yao and
Jean-Pierre Corriveau Resilient Secure Localization and
Detection of Colluding Attackers in WSNs 181--192
Dan Tao and
Shaojie Tang and
Huadong Ma Low Cost Data Gathering Using Mobile
Hybrid Sensor Networks . . . . . . . . . 193--206
Daniel Bimschas and
Oliver Kleine and
Dennis Pfisterer Debugging the Internet of Things: a
6LoWPAN/CoAP Testbed Infrastructure . . 207--220
Álvaro Torres and
Carlos T. Calafate and
Juan-Carlos Cano and
Pietro Manzoni Evaluating the Effectiveness of a QoS
Framework for MANETs in a Real Testbed 221--234
Thomas Scherer and
Clemens Lombriser and
Wolfgang Schott and
Hong Linh Truong and
Beat Weiss Wireless Sensor Network for Continuous
Temperature Monitoring in Air-Cooled
Data Centers: Applications and
Measurement Results . . . . . . . . . . 235--248
Tzu Hao Li and
Alexey Borisenko and
Miodrag Bolic Open Platform Semi-passive RFID Tag . . 249--259
Sandra Sendra and
Jose V. Lamparero and
Jaime Lloret and
Miguel Ardid Study of the Optimum Frequency at 2.4GHz
ISM Band for Underwater Wireless Ad Hoc
Communications . . . . . . . . . . . . . 260--273
Anonymous Front Matter . . . . . . . . . . . . . . ??
Nikolaj Bjòrner Taking Satisfiability to the Next Level
with Z3 . . . . . . . . . . . . . . . . 1--8
Yuri Matiyasevich Enlarging the Scope of Applicability of
Successful Techniques for Automated
Reasoning in Mathematics . . . . . . . . 9--9
Robert Nieuwenhuis SAT and SMT Are Still Resolution:
Questions and Challenges . . . . . . . . 10--13
Siva Anantharaman and
Serdar Erbatur and
Christopher Lynch and
Paliath Narendran Unification Modulo Synchronous
Distributivity . . . . . . . . . . . . . 14--29
Franz Baader and
Stefan Borgwardt and
Barbara Morawska SAT Encoding of Unification in
$\mathcal{ELH}_{R^+}$ w.r.t.
Cycle-Restricted Ontologies . . . . . . 30--44
Franz Baader and
Julian Mendez and
Barbara Morawska UEL: Unification Solver for the
Description Logic $\mathcal{EL}$ ---
System Description . . . . . . . . . . . 45--51
Matthias Baaz and
Ori Lahav and
Anna Zamansky Effective Finite-Valued Semantics for
Labelled Calculi . . . . . . . . . . . . 52--66
François Bobot and
Sylvain Conchon and
Evelyne Contejean and
Mohamed Iguernelala and
Assia Mahboubi A Simplex-Based Extension of
Fourier--Motzkin for Solving Linear
Integer Arithmetic . . . . . . . . . . . 67--81
Stefan Borgwardt and
Felix Distel and
Rafael Peñaloza How Fuzzy Is My Fuzzy Description Logic? 82--96
Taus Brock-Nannestad and
Carsten Schürmann Truthful Monadic Abstractions . . . . . 97--110
Chad E. Brown Satallax: An Automatic Higher-Order
Prover . . . . . . . . . . . . . . . . . 111--117
Roberto Bruttomesso and
Silvio Ghilardi and
Silvio Ranise From Strong Amalgamability to Modularity
of Quantifier-Free Interpolation . . . . 118--133
Melisachew Wudage Chekol and
Jérôme Euzenat and
Pierre Genev\`es and
Nabil Laya\"\ida SPARQL Query Containment under RDFS
Entailment Regime . . . . . . . . . . . 134--148
Frank de Boer and
Marcello Bonsangue and
Jurriaan Rot Automated Verification of Recursive
Programs with Pointers . . . . . . . . . 149--163
Stéphanie Delaune and
Steve Kremer and
Daniel Pasaila Security Protocols, Constraint Systems,
and Group Theories . . . . . . . . . . . 164--178
Stéphane Demri and
Amit Kumar Dhar and
Arnaud Sangnier Taming Past LTL and Flat Counter Systems 179--193
Mnacho Echenim and
Nicolas Peltier A Calculus for Generating Ground
Explanations . . . . . . . . . . . . . . 194--209
Moshe Emmer and
Zurab Khasidashvili and
Konstantin Korovin and
Christoph Sticksel EPR-Based Bounded Model Checking at Word
Level . . . . . . . . . . . . . . . . . 210--224
Fabian Emmes and
Tim Enger and
Jürgen Giesl Proving Non-looping Non-termination
Automatically . . . . . . . . . . . . . 225--240
Stephan Falke and
Deepak Kapur Rewriting Induction + Linear Arithmetic
= Decision Procedure . . . . . . . . . . 241--255
Anonymous Front Matter . . . . . . . . . . . . . . ??
Wolfgang Reisig A Fresh Look at Petri Net Extensions . . 1--9
Karsten Gabriel and
Hartmut Ehrig Modelling of Communication Platforms
Using Algebraic High-Level Nets and
Their Processes . . . . . . . . . . . . 10--25
Herbert Weber Modeling Revisited . . . . . . . . . . . 26--35
Marco Konersmann and
Michael Goedicke A Conceptual Framework and Experimental
Workbench for Architectures . . . . . . 36--52
Djamshid Tavangarian Virtual Computing: The Emperor's New
Clothes? . . . . . . . . . . . . . . . . 53--70
Frank Leymann Linked Compute Units and Linked
Experiments: Using Topology and
Orchestration Technology for Flexible
Support of Scientific Applications . . . 71--80
Kristian Beckers and
Stephan Faßbender Pattern-Based Context Establishment for
Service-Oriented Architectures . . . . . 81--101
Michael P. Papazoglou Cloud Blueprints for Integrating and
Managing Cloud Federations . . . . . . . 102--119
Ingolf Krüger and
Barry Demchak Dynamic Service Composition and
Deployment with OpenRichServices . . . . 120--146
Kirill Mechitov and
Gul Agha An Architecture for Dynamic
Service-Oriented Computing in Networked
Embedded Systems . . . . . . . . . . . . 147--164
Christoph Rensing and
Stephan Tittel Location-Based Services for Technology
Enhanced Learning and Teaching . . . . . 165--179
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Daniel J. Olsher COGPARSE: Brain-Inspired
Knowledge-Driven Full Semantics Parsing 1--11
Thomas Mazzocco and
Erik Cambria and
Amir Hussain and
Qiu-Feng Wang Sentic Neural Networks: a Novel
Cognitive Model for Affective Common
Sense Reasoning . . . . . . . . . . . . 12--21
Terry G. Rawlinson and
Shulan Lu and
Patrick Coleman Individual Differences in Working Memory
Capacity and Presence in Virtual
Environments . . . . . . . . . . . . . . 22--30
Kamran Farooq and
Amir Hussain and
Stephen Leslie and
Chris Eckl and
Calum MacRae and
Warner Slack An Ontology Driven and Bayesian Network
Based Cardiovascular Decision Support
Framework . . . . . . . . . . . . . . . 31--41
Kamran Farooq and
Amir Hussain and
Stephen Leslie and
Chris Eckl and
Calum MacRae and
Warner Slack Semantically Inspired Electronic
Healthcare Records . . . . . . . . . . . 42--51
Hui Wei and
Zheng Dong A CSP-Based Orientation Detection Model 52--61
Murat Perit Çakìr and
Abdullah Murat \cSenyi\ugit and
Daryal Murat Akay and
Hasan Ayaz and
Veysi \.I\csler Evaluation of UAS Camera Operator
Interfaces in a Simulated Task
Environment: An Optical Brain Imaging
Approach . . . . . . . . . . . . . . . . 62--71
Chunguang Li and
Lining Sun Cerebral Activation Patterns in the
Preparation and Movement Periods of
Spontaneous and Evoked Movements . . . . 72--81
Erfu Yang and
Amir Hussain and
Kevin Gurney Neurobiologically-Inspired Soft
Switching Control of Autonomous Vehicles 82--91
Amir Hussain and
Rudwan Abdullah and
Erfu Yang and
Kevin Gurney An Intelligent Multiple-Controller
Framework for the Integrated Control of
Autonomous Vehicles . . . . . . . . . . 92--101
Derek Harter Evolution of Small-World Properties in
Embodied Networks . . . . . . . . . . . 102--111
Yujuan Qi and
Yanjiang Wang and
Tingting Xue Brain Memory Inspired Template Updating
Modeling for Robust Moving Object
Tracking Using Particle Filter . . . . . 112--119
Juan Huo and
Alan Murray VLSI Implementation of Barn Owl Superior
Colliculus Network for Visual and
Auditory Integration . . . . . . . . . . 120--128
Fuluo Wang and
Yourui Huang and
Ming Shi and
Shanshan Wu Membrane Computing Optimization Method
Based on Catalytic Factor . . . . . . . 129--137
Murat Ozgoren and
Merve Tetik and
Kurtulus Izzetoglu and
Adile Oniz and
Banu Onaral Effect of Body Position on NIRS Based
Hemodynamic Measures from Prefrontal
Cortex . . . . . . . . . . . . . . . . . 138--146
Hasan Ayaz and
Scott Bunce and
Patricia Shewokis and
Kurtulus Izzetoglu and
Ben Willems Using Brain Activity to Predict Task
Performance and Operator Efficiency . . 147--155
Ligang Wang and
Jie Kong and
Jing Luo and
Wenbin Gao and
Xianju Guo ``Arousal'' or ``Activation''
Dysfunction in the Frontal Region of
Children with
Attention--Deficit/Hyperactivity
Disorder: Evidence from an
Electroencephalogram Study . . . . . . . 156--163
Marco Fagiani and
Emanuele Principi and
Stefano Squartini and
Francesco Piazza A New Italian Sign Language Database . . 164--173
Gahangir Hossain and
Mark H. Myers and
Robert Kozma Study of Phase Relationships in ECoG
Signals Using Hilbert--Huang Transforms 174--182
Scott C. Bunce and
Kurtulus Izzetoglu and
Meltem Izzetoglu and
Hasan Ayaz and
Kambiz Pourrezaei Treatment Status Predicts Differential
Prefrontal Cortical Responses to Alcohol
and Natural Reinforcer Cues among
Alcohol Dependent Individuals . . . . . 183--191
Anonymous Front Matter . . . . . . . . . . . . . . ??
Alexander A. Frolov and
Du\vsan Húsek and
Pavel Yu. Polyakov Attractor Neural Network Combined with
Likelihood Maximization Algorithm for
Boolean Factor Analysis . . . . . . . . 1--10
Zaiyong Tang and
Kallol Bagchi and
Youqin Pan and
Gary J. Koehler Pruning Feedforward Neural Network
Search Space Using Local Lipschitz
Constants . . . . . . . . . . . . . . . 11--20
Wook-Dong Kim and
Sung-Kwun Oh and
Hyun-Ki Kim Context FCM-Based Radial Basis Function
Neural Networks with the Aid of Fuzzy
Clustering . . . . . . . . . . . . . . . 21--28
Li-Jie Zhao and
Jian Tang and
Tian-you Chai Modeling Spectral Data Based on Mutual
Information and Kernel Extreme Learning
Machines . . . . . . . . . . . . . . . . 29--36
Jing Wang and
Haibo He and
Yuan Cao and
Jin Xu and
Dongbin Zhao A Hierarchical Neural Network
Architecture for Classification . . . . 37--46
Zhende Ke and
Yiwen Yang and
Yunong Zhang Discrete-Time ZNN Algorithms for
Time-Varying Quadratic Programming
Subject to Time-Varying Equality
Constraint . . . . . . . . . . . . . . . 47--54
Xibin Zhu and
Frank-Michael Schleif and
Barbara Hammer Patch Processing for Relational Learning
Vector Quantization . . . . . . . . . . 55--63
Zheng Zhang A Neural Network Model for Currency
Arbitrage Detection . . . . . . . . . . 64--71
Shuxia Lu and
Guiqiang Zhang and
Xizhao Wang A Rank Reduced Matrix Method in Extreme
Learning Machine . . . . . . . . . . . . 72--79
Wentao Mao and
Mei Tian and
Guirong Yan and
Xianfang Wang Research of Dynamic Load Identification
Based on Extreme Learning Machine . . . 80--89
Wei Huang and
Sung-Kwun Oh Fuzzy Relation-Based Polynomial Neural
Networks Based on Hybrid Optimization 90--97
Yunong Zhang and
Yunjia Xie and
Hongzhou Tan Time-Varying Moore--Penrose Inverse
Solving Shows Different Zhang Functions
Leading to Different ZNN Models . . . . 98--105
Kun Zhang and
Cuirong Wang and
Baoyan Wang A Multi-object Segmentation Algorithm
Based on Background Modeling and Region
Growing . . . . . . . . . . . . . . . . 106--115
Wei-Feng Zhang and
Peng Yang and
Dao-Qing Dai and
Arye Nehorai Reflectance Estimation Using Local
Regression Methods . . . . . . . . . . . 116--122
Lei Gu Applying a Novel Decision Rule to the
Semi-supervised Clustering Method Based
on One-Class SVM . . . . . . . . . . . . 123--131
He Huang and
Xiaoping Chen State Estimation of Markovian Jump
Neural Networks with Mixed Time Delays 132--139
Qiaojie Li and
Zhoushun Zheng and
Shuang Wang and
Jiankang Liu Lattice Boltzmann Model for Nonlinear
Heat Equations . . . . . . . . . . . . . 140--148
Wenyu Yang and
Jie Yang and
Wei Wu A Modified One-Layer Spiking Neural
Network Involves Derivative of the State
Function at Firing Time . . . . . . . . 149--158
Yingwei Zhang and
Chuang Wang Modeling and Monitoring of Multimodes
Process . . . . . . . . . . . . . . . . 159--168
Yingwei Zhang and
Hailong Zhang Data-Based Modeling and Monitoring for
Multimode Processes Using Local Tangent
Space Alignment . . . . . . . . . . . . 169--178
Anonymous Front Matter . . . . . . . . . . . . . . ??
Dazhong Ma and
Jinhai Liu and
Zhanshan Wang The Pattern Classification Based on
Fuzzy Min-max Neural Network with New
Algorithm . . . . . . . . . . . . . . . 1--9
Li-jie Zhao and
Tian-you Chai and
Xiao-kun Diao and
De-cheng Yuan Multi-class Classification with
One-Against-One Using Probabilistic
Extreme Learning Machine . . . . . . . . 10--19
Shangfei Wang and
Shan He and
Hua Zhu Similarity Measurement and Feature
Selection Using Genetic Algorithm . . . 20--29
Ting Wang and
Sheng-Uei Guan and
Fei Liu Entropic Feature Discrimination Ability
for Pattern Classification Based on
Neural IAL . . . . . . . . . . . . . . . 30--37
Wook-Dong Kim and
Sung-Kwun Oh and
Jeong-Tae Kim Design of Optimized Radial Basis
Function Neural Networks Classifier with
the Aid of Fuzzy Clustering and Data
Preprocessing Method . . . . . . . . . . 38--45
Yongsheng Dong and
Jinwen Ma An Efficient Histogram-Based Texture
Classification Method with Weighted
Symmetrized Kullback--Leibler Divergence 46--55
Qiaoge Zhang and
Zhigang Liu and
Gang Chen The Recognition Study of Impulse and
Oscillation Transient Based on Spectral
Kurtosis and Neural Network . . . . . . 56--63
Min Han and
Xiaoxin Liu Forward Feature Selection Based on
Approximate Markov Blanket . . . . . . . 64--72
Tianshu Wu and
Kunqing Xie and
Chengkai Nie and
Guojie Song An Adaption of Relief for Redundant
Feature Elimination . . . . . . . . . . 73--81
Jian Tang and
Li-Jie Zhao and
Yi-miao Li and
Tian-you Chai and
S. Joe Qin Feature Selection of Frequency Spectrum
for Modeling Difficulty to Measure
Process Parameters . . . . . . . . . . . 82--91
Zunyi Tang and
Shuxue Ding Nonnegative Dictionary Learning by
Nonnegative Matrix Factorization with a
Sparsity Constraint . . . . . . . . . . 92--101
Dongyue Chen and
Zongwen Chen and
Xiaosheng Yu A New Method for Hand Detection Based on
Hough Forest . . . . . . . . . . . . . . 102--109
Jia Li and
Changyong Niu and
Ming Fan Multi-scale Convolutional Neural
Networks for Natural Scene License Plate
Detection . . . . . . . . . . . . . . . 110--119
Zhao Liu and
Guiyu Feng and
Dewen Hu Robust Mean Shift Tracking with
Background Information . . . . . . . . . 120--129
Lijuan Jia and
Dandan Song and
Linmi Tao and
Yao Lu Heart Sounds Classification with a Fuzzy
Neural Network Method with Structure
Learning . . . . . . . . . . . . . . . . 130--140
Ting Zhang and
Guosheng Yang and
Xinkai Kuai On Cortex Mechanism Hierarchy Model for
Facial Expression Recognition:
Multi-database Evaluation Results . . . 141--148
Mehreen Saeed LEFT--Logical Expressions Feature
Transformation: a Framework for
Transformation of Symbolic Features . . 149--158
Songping Mai and
Yixin Zhao and
Chun Zhang and
Zhihua Wang A Time-Frequency Aware Cochlear Implant:
Algorithm and System . . . . . . . . . . 159--168
Xiaosheng Yu and
Chengdong Wu and
Dongyue Chen and
Ting Zhou and
Tong Jia Gradient Vector Flow Based on
Anisotropic Diffusion . . . . . . . . . 169--178
Kai Huang and
Liqing Zhang and
Yang Wu ECG Classification Based on
Non-cardiology Feature . . . . . . . . . 179--186
Anonymous Front Matter . . . . . . . . . . . . . . ??
Florian Hess Generalised Jacobians in Cryptography
and Coding Theory . . . . . . . . . . . 1--15
Gerardo Vega and
Carlos A. Vázquez The Weight Distribution of a Family of
Reducible Cyclic Codes . . . . . . . . . 16--28
Olav Geil and
Stefano Martin and
Ryutaroh Matsumoto A New Method for Constructing Small-Bias
Spaces from Hermitian Codes . . . . . . 29--44
Pierre-Louis Cayrel and
Sidi Mohamed El Yousfi Alaoui and
Gerhrad Hoffmann and
Pascal Véron An Improved Threshold Ring Signature
Scheme Based on Error Correcting Codes 45--63
Alexander Pott and
Qi Wang and
Yue Zhou Sequences and Functions Derived from
Projective Planes and Their Difference
Sets . . . . . . . . . . . . . . . . . . 64--80
Lin Sok and
Patrick Solé On Formally Self-dual Boolean Functions
in 2,4 and 6 Variables . . . . . . . . . 81--91
Boris Batteux On the Algebraic Normal Form and Walsh
Spectrum of Symmetric Functions over
Finite Rings . . . . . . . . . . . . . . 92--107
Lilya Budaghyan and
Oleksandr Kazymyrov Verification of Restricted
EA-Equivalence for Vectorial Boolean
Functions . . . . . . . . . . . . . . . 108--118
Shay Gueron and
Vlad Krasnov Software Implementation of Modular
Exponentiation, Using Advanced Vector
Instructions Architectures . . . . . . . 119--135
Nadia El Mrabet and
Nicolas Gama Efficient Multiplication over Extension
Fields . . . . . . . . . . . . . . . . . 136--151
Danuta Pamula and
Arnaud Tisserand ${\rm GF}(2^m)$ Finite-Field Multipliers
with Reduced Activity Variations . . . . 152--167
Razvan Barbulescu and
Jérémie Detrey and
Nicolas Estibals and
Paul Zimmermann Finding Optimal Formulae for Bilinear
Maps . . . . . . . . . . . . . . . . . . 168--186
Benedikt Driessen and
Christof Paar Solving Binary Linear Equation Systems
over the Rationals and Binaries . . . . 187--195
Sami Omar and
Raouf Ouni and
Saber Bouanani Hashing with Elliptic Curve
$L$-Functions . . . . . . . . . . . . . 196--207
Emmanuel Thomé Square Root Algorithms for the Number
Field Sieve . . . . . . . . . . . . . . 208--224
Ryuichi Harasawa and
Yutaka Sueyoshi and
Aichi Kudo Improving the Berlekamp Algorithm for
Binomials $x^n - a$ . . . . . . . . . . 225--235
Sumanta Sarkar and
Srimanta Bhattacharya and
Ayça Çe\csmelio\uglu On Some Permutation Binomials of the
Form $x^{\frac{2^n - 1}{k} + 1} + a x$
over $\mathbb{F}_{2^n}$: Existence and
Count . . . . . . . . . . . . . . . . . 236--246
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . 1--1
Michael A. Langston Fixed-Parameter Tractability, A
Prehistory . . . . . . . . . . . . . . . 3--16
Rod Downey The Birth and Early Years of
Parameterized Complexity . . . . . . . . 17--38
Neal Koblitz Crypto Galore! . . . . . . . . . . . . . 39--50
Todd Wareham Flyby: Life Before, During, and After
Graduate Studies with Mike Fellows . . . 51--55
Ulrike Stege The Impact of Parameterized Complexity
to Interdisciplinary Problem Solving . . 56--68
Venkatesh Raman Vertex Cover, Dominating Set and My
Encounters with Parameterized Complexity
and Mike Fellows . . . . . . . . . . . . 69--73
Jan Arne Telle Mike Fellows: Weaving the Web of
Mathematics and Adventure . . . . . . . 74--79
Frances Rosamond Passion Plays: Melodramas about
Mathematics . . . . . . . . . . . . . . 80--87
Anonymous Front Matter . . . . . . . . . . . . . . 89--89
Rod Downey A Basic Parameterized Complexity Primer 91--128
Daniel Lokshtanov and
Neeldhara Misra and
Saket Saurabh Kernelization --- Preprocessing with a
Guarantee . . . . . . . . . . . . . . . 129--161
Jianer Chen and
Iyad A. Kanj Parameterized Complexity and
Subexponential-Time Computability . . . 162--195
Hans L. Bodlaender Fixed-Parameter Tractability of
Treewidth and Pathwidth . . . . . . . . 196--227
Dimitrios M. Thilikos Graph Minors and Parameterized Algorithm
Design . . . . . . . . . . . . . . . . . 228--256
Gregory Gutin and
Anders Yeo Constraint Satisfaction Problems
Parameterized above or below Tight
Bounds: a Survey . . . . . . . . . . . . 257--286
Serge Gaspers and
Stefan Szeider Backdoors to Satisfaction . . . . . . . 287--317
Nadja Betzler and
Robert Bredereck and
Jiehua Chen and
Rolf Niedermeier Studies in Computational Aspects of
Voting . . . . . . . . . . . . . . . . . 318--363
Yijia Chen and
Jörg Flum A Parameterized Halting Problem . . . . 364--397
Tim Bell and
Frances Rosamond and
Nancy Casey Computer Science Unplugged and Related
Projects in Math and Computer Science
Popularization . . . . . . . . . . . . . 398--456
Fedor V. Fomin and
Dániel Marx FPT Suspects and Tough Customers: Open
Problems of Downey and Fellows . . . . . 457--468
Dániel Marx What's Next? Future Directions in
Parameterized Complexity . . . . . . . . 469--496
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Leendert van der Torre Logics for Security and Privacy . . . . 1--7
Yuan Cheng and
Jaehong Park and
Ravi Sandhu A User-to-User Relationship-Based Access
Control Model for Online Social Networks 8--24
Alessandro Armando and
Silvio Ranise Automated and Efficient Analysis of
Role-Based Access Control with
Attributes . . . . . . . . . . . . . . . 25--40
Xin Jin and
Ram Krishnan and
Ravi Sandhu A Unified Attribute-Based Access Control
Model Covering DAC, MAC and RBAC . . . . 41--55
Joachim Biskup and
Sven Hartmann and
Sebastian Link and
Jan-Hendrik Lochner and
Torsten Schlotmann Signature-Based Inference-Usability
Confinement for Relational Databases
under Functional and Join Dependencies 56--73
Rosa Karimi Adl and
Mina Askari and
Ken Barker and
Reihaneh Safavi-Naini Privacy Consensus in Anonymization
Systems via Game Theory . . . . . . . . 74--89
Gianluca Dini and
Pericle Perazzo Uniform Obfuscation for Location Privacy 90--105
Ravi Singh Pippal and
Jaidhar C. D. and
Shashikala Tapaswi Security Vulnerabilities of User
Authentication Scheme Using Smart Card 106--113
Ding Wang and
Chun-guang Ma and
Peng Wu Secure Password-Based Remote User
Authentication Scheme with Non-tamper
Resistant Smart Cards . . . . . . . . . 114--121
Tiana Razafindralambo and
Guillaume Bouffard and
Jean-Louis Lanet A Friendly Framework for Hidding fault
enabled virus for Java Based Smartcard 122--128
Robert Nix and
Murat Kantarcioglu and
Keesook J. Han Approximate Privacy-Preserving Data
Mining on Vertically Partitioned Data 129--144
Jonathan L. Dautrich and
Chinya V. Ravishankar Security Limitations of Using Secret
Sharing for Data Outsourcing . . . . . . 145--160
Danish Mehmood and
Basit Shafiq and
Jaideep Vaidya and
Yuan Hong and
Nabil Adam Privacy-Preserving Subgraph Discovery 161--176
Simon N. Foley and
William M. Fitzgerald Decentralized Semantic Threat Graphs . . 177--192
Rami Sharon and
Ehud Gudes Code Type Revealing Using Experiments
Framework . . . . . . . . . . . . . . . 193--206
Nikolay Yakovets and
Jarek Gryz and
Stephanie Hazlewood and
Paul van Run From MDM to DB2: a Case Study of
Security Enforcement Migration . . . . . 207--222
Smitha Sundareswaran and
Anna Cinzia Squicciarini XSS-Dec: a Hybrid Solution to Mitigate
Cross-Site Scripting Attacks . . . . . . 223--238
Abhijith Shastry and
Murat Kantarcioglu and
Yan Zhou and
Bhavani Thuraisingham Randomizing Smartphone Malware Profiles
against Statistical Mining Techniques 239--254
Hamed Saljooghinejad and
Wilson Naik Bhukya Layered Security Architecture for
Masquerade Attack Detection . . . . . . 255--262
Abbas Taheri Soodejani and
Mohammad Ali Hadavi and
Rasool Jalili $k$-Anonymity-Based Horizontal
Fragmentation to Preserve Privacy in
Data Outsourcing . . . . . . . . . . . . 263--273
Anonymous Front Matter . . . . . . . . . . . . . . ??
Kaori Tosu and
Noboru Kunihiro Optimal Bounds for Multi-Prime
$\Phi$-Hiding Assumption . . . . . . . . 1--14
Atsushi Fujioka and
Mark Manulis and
Koutarou Suzuki and
Berkant Ustao\uglu Sufficient Condition for Ephemeral
Key-Leakage Resilient Tripartite Key
Exchange . . . . . . . . . . . . . . . . 15--28
Haruna Higo and
Keisuke Tanaka and
Akihiro Yamada and
Kenji Yasunaga A Game-Theoretic Perspective on
Oblivious Transfer . . . . . . . . . . . 29--42
Yuji Nagashima and
Noboru Kunihiro Faster Algorithm for Solving Hard
Knapsacks for Moderate Message Length 43--56
Peter Lory and
Manuel Liedel Accelerating the Secure Distributed
Computation of the Mean by a Chebyshev
Expansion . . . . . . . . . . . . . . . 57--70
Takanori Isobe and
Kyoji Shibutani Security Analysis of the Lightweight
Block Ciphers XTEA, LED and Piccolo . . 71--86
Yu Sasaki and
Sareh Emami and
Deukjo Hong and
Ashish Kumar Improved Known-Key Distinguishers on
Feistel--SP Ciphers and Application to
Camellia . . . . . . . . . . . . . . . . 87--100
Jiazhe Chen and
Leibo Li Low Data Complexity Attack on Reduced
Camellia-256 . . . . . . . . . . . . . . 101--114
Xianmeng Meng and
Xuexin Zheng Cryptanalysis of RSA with a Small
Parameter . . . . . . . . . . . . . . . 115--123
Jintai Ding and
Yanbin Pan and
Yingpu Deng An Algebraic Broadcast Attack against
NTRU . . . . . . . . . . . . . . . . . . 124--137
Mufeed ALMashrafi and
Harry Bartlett and
Leonie Simpson and
Ed Dawson and
Kenneth Koon-Ho Wong Analysis of Indirect Message Injection
for MAC Generation Using Stream Ciphers 138--151
Ewan Fleischmann and
Christian Forler and
Stefan Lucks and
Jakob Wenzel Weimar-DM: a Highly Secure Double-Length
Compression Function . . . . . . . . . . 152--165
K. Preetha Mathew and
Sachin Vasant and
Sridhar Venkatesan and
C. Pandu Rangan An Efficient IND-CCA2 Secure Variant of
the Niederreiter Encryption Scheme in
the Standard Model . . . . . . . . . . . 166--179
Kirill Morozov and
Tsuyoshi Takagi Zero-Knowledge Protocols for the
McEliece Encryption . . . . . . . . . . 180--193
Jothi Rangasamy and
Douglas Stebila and
Colin Boyd and
Juan Manuel González-Nieto Effort-Release Public-Key Encryption
from Cryptographic Puzzles . . . . . . . 194--207
Manh Ha Nguyen and
Keisuke Tanaka and
Kenji Yasunaga Leakage-Resilience of Stateless/Stateful
Public-Key Encryption from Hash Proofs 208--222
Kun Peng and
Matt Henricksen How to Fix Two RSA-Based PVSS Schemes---
Exploration and Solution . . . . . . . . 223--234
Kaoru Kurosawa and
Ryo Nojima and
Le Trieu Phong Relation between Verifiable Random
Functions and Convertible Undeniable
Signatures, and New Constructions . . . 235--246
Xiao Tan and
Duncan S. Wong Generalized First Pre-image Tractable
Random Oracle Model and Signature
Schemes . . . . . . . . . . . . . . . . 247--260
Haibo Tian and
Xiaofeng Chen and
Jin Li A Short Non-delegatable Strong
Designated Verifier Signature . . . . . 261--279
Anonymous Front Matter . . . . . . . . . . . . . . ??
Anu Gupta and
Subhrojyoti Sarkar An Efficient High Frequency and Low
Power Analog Multiplier in Current
Domain . . . . . . . . . . . . . . . . . 1--9
Biswajit Maity and
Pradip Mandal Design of Push-Pull Dynamic Leaker
Circuit for a Low Power Embedded Voltage
Regulator . . . . . . . . . . . . . . . 10--18
Priyanka Choudhury and
Sambhu Nath Pradhan Power Modeling of Power Gated FSM and
Its Low Power Realization by
Simultaneous Partitioning and State
Encoding Using Genetic Algorithm . . . . 19--29
Rahul Shrestha and
Roy Paily Design and Implementation of a Linear
Feedback Shift Register Interleaver for
Turbo Decoding . . . . . . . . . . . . . 30--39
Gunti Nagendra Babu and
Brajesh Kumar Kaushik and
Anand Bulusu and
Manoj Kumar Majumder Low Complexity Encoder for Crosstalk
Reduction in RLC Modeled Interconnects 40--45
Ashutosh Nandi and
Ashok K. Saxena and
Sudeb Dasgupta Analog Performance Analysis of Dual-$k$
Spacer Based Underlap FinFET . . . . . . 46--51
R. Jayagowri and
K. S. Gurumurthy Implementation of Gating Technique with
Modified Scan Flip-Flop for Low Power
Testing of VLSI Chips . . . . . . . . . 52--58
Surajit Kumar Roy and
Dona Roy and
Chandan Giri and
Hafizur Rahaman Post-bond Stack Testing for $3$D Stacked
IC . . . . . . . . . . . . . . . . . . . 59--68
Soumyadip Bandyopadhyay and
Kunal Banerjee and
Dipankar Sarkar and
Chittaranjan R. Mandal Translation Validation for PRES+ Models
of Parallel Behaviours via an FSMD
Equivalence Checker . . . . . . . . . . 69--78
Prabir Saha and
Arindam Banerjee and
Anup Dandapat and
Partha Bhattacharyya Design of High Speed Vedic Multiplier
for Decimal Number System . . . . . . . 79--88
Mamata Dalui and
Biplab K. Sikdar An Efficient Test Design for CMPs Cache
Coherence Realizing MESI Protocol . . . 89--98
Debapriya Basu Roy and
Debdeep Mukhopadhyay An Efficient High Speed Implementation
of Flexible Characteristic-2 Multipliers
on FPGAs . . . . . . . . . . . . . . . . 99--110
Subrata Das and
Partha Sarathi Dasgupta and
Samar Sensarma Arithmetic Algorithms for Ternary Number
System . . . . . . . . . . . . . . . . . 111--120
Dushyant Juneja and
Sougata Kar and
Procheta Chatterjee and
Siddhartha Sen SOI MEMS Based Over-Sampling
Accelerometer Design with $\Delta\Sigma$
Output . . . . . . . . . . . . . . . . . 121--128
Goutam Rana and
Samir Kumar Lahiri and
Chirasree Roy Chaudhuri Design Optimization of a Wide Band MEMS
Resonator for Efficient Energy
Harvesting . . . . . . . . . . . . . . . 129--138
Chandrabhan Kushwah and
Santosh K. Vishvakarma Ultra-Low Power Sub-threshold SRAM Cell
Design to Improve Read Static Noise
Margin . . . . . . . . . . . . . . . . . 139--146
Arun Dobriyal and
Rahul Gonnabattula and
Pallab Dasgupta and
Chittaranjan R. Mandal Workload Driven Power Domain
Partitioning . . . . . . . . . . . . . . 147--155
Rituparna Dasgupta and
Dipankar Saha and
Jagannath Samanta and
Sayan Chatterjee Implementation of a New Offset Generator
Block for the Low-Voltage, Low-Power
Self Biased Threshold Voltage Extractor
Circuit . . . . . . . . . . . . . . . . 156--165
Manas Kumar Hati and
Tarun Kanti Bhattacharyya A High Speed, Low Jitter and Fast
Acquisition CMOS Phase Frequency
Detector for Charge Pump PLL . . . . . . 166--171
Jaynarayan T. Tudu and
Deepak Malani and
Virendra Singh ILP Based Approach for Input Vector
Controlled (IVC) Toggle Maximization in
Combinational Circuits . . . . . . . . . 172--179
Anonymous Front Matter . . . . . . . . . . . . . . ??
Sabyasachi Karati and
Abhijit Das and
Dipanwita Roychowdhury and
Bhargav Bellur Batch Verification of ECDSA Signatures 1--18
Sidi Mohamed El Yousfi Alaoui and
Özgür Dagdelen and
Pascal Véron and
David Galindo Extended Security Arguments for
Signature Schemes . . . . . . . . . . . 19--34
Sébastien Canard and
Amandine Jambert and
Roch Lescuyer Sanitizable Signatures with Several
Signers and Sanitizers . . . . . . . . . 35--52
Jingjing Wang and
Xiangxue Li and
Kefei Chen and
Wenzheng Zhang Attack Based on Direct Sum Decomposition
against the Nonlinear Filter Generator 53--66
Julien Bringer and
Hervé Chabanne and
Mélanie Favre Fuzzy Vault for Multiple Users . . . . . 67--81
Reihaneh Safavi-Naini and
Mohammed Ashraful Alam Tuhin Bounds and Constructions for $1$-Round
$(0, \delta)$-Secure Message
Transmission against Generalized
Adversary . . . . . . . . . . . . . . . 82--98
Mohammed Meziani and
Gerhard Hoffmann and
Pierre-Louis Cayrel Improving the Performance of the SYND
Stream Cipher . . . . . . . . . . . . . 99--116
Jiazhe Chen and
Meiqin Wang and
Bart Preneel Impossible Differential Cryptanalysis of
the Lightweight Block Ciphers TEA, XTEA
and HIGHT . . . . . . . . . . . . . . . 117--137
Yu Sasaki and
Lei Wang and
Yasuhide Sakai and
Kazuo Sakiyama and
Kazuo Ohta Three-Subset Meet-in-the-Middle Attack
on Reduced XTEA . . . . . . . . . . . . 138--154
Yue Sun and
Meiqin Wang and
Shujia Jiang and
Qiumei Sun Differential Cryptanalysis of
Reduced-Round ICEBERG . . . . . . . . . 155--171
Thomas Eisenbarth and
Zheng Gong and
Tim Güneysu and
Stefan Heyse and
Sebastiaan Indesteege Compact Implementation and Performance
Evaluation of Block Ciphers in ATtiny
Devices . . . . . . . . . . . . . . . . 172--187
Enrico Thomae and
Christopher Wolf Cryptanalysis of Enhanced TTS, STS and
All Its Variants, or: Why Cross-Terms
Are Important . . . . . . . . . . . . . 188--202
Augustin P. Sarr and
Philippe Elbaz--Vincent A Complementary Analysis of the (s)YZ
and DIKE Protocols . . . . . . . . . . . 203--220
Abderrahmane Nitaj A New Attack on RSA and CRT-RSA . . . . 221--233
Frederik Armknecht and
Stefan Katzenbeisser and
Andreas Peter Shift-Type Homomorphic Encryption and
Its Application to Fully Homomorphic
Encryption . . . . . . . . . . . . . . . 234--251
Ewan Fleischmann and
Christian Forler and
Stefan Lucks The Collision Security of MDC-4 . . . . 252--269
Jiali Choy and
Huihui Yap and
Khoongming Khoo and
Jian Guo and
Thomas Peyrin and
Axel Poschmann SPN-Hash: Improving the Provable
Resistance against Differential
Collision Attacks . . . . . . . . . . . 270--286
Elena Andreeva and
Bart Mennink and
Bart Preneel and
Marjan \vSkrobot Security Analysis and Comparison of the
SHA-3 Finalists BLAKE, Gròstl, JH,
Keccak, and Skein . . . . . . . . . . . 287--305
Thierry P. Berger and
Joffrey D'Hayer and
Kevin Marquet and
Marine Minier and
Gaël Thomas The GLUON Family: a Lightweight Hash
Function Family Based on FCSRs . . . . . 306--323
Peter Schwabe and
Bo-Yin Yang and
Shang-Yi Yang SHA-3 on ARM11 Processors . . . . . . . 324--341
Anonymous Front Matter . . . . . . . . . . . . . . ??
Joseph Ayers and
Daniel Blustein and
Anthony Westphal A Conserved Biomimetic Control
Architecture for Walking, Swimming and
Flying Robots . . . . . . . . . . . . . 1--12
Luis Bobo and
Ivan Herreros and
Paul F. M. J. Verschure A Digital Neuromorphic Implementation of
Cerebellar Associative Learning . . . . 13--25
Roberto Bortoletto and
Massimo Sartori and
Fuben He and
Enrico Pagello Simulating an Elastic Bipedal Robot
Based on Musculoskeletal Modeling . . . 26--37
Alexander S. Boxerbaum and
Kathryn A. Daltorio and
Hillel J. Chiel and
Roger D. Quinn A Soft-Body Controller with Ubiquitous
Sensor Feedback . . . . . . . . . . . . 38--49
Frédéric Boyer and
Vincent Lebastard Exploration of Objects by an Underwater
Robot with Electric Sense . . . . . . . 50--61
Ken Caluwaerts and
Antoine Favre-Félix and
Mariacarla Staffa and
Steve N'Guyen and
Christophe Grand Neuro-inspired Navigation Strategies
Shifting for Robots: Integration of a
Multiple Landmark Taxon Strategy . . . . 62--73
Federico Carpi and
Gabriele Frediani and
Danilo De Rossi Bioinspired Tunable Lens Driven by
Electroactive Polymer Artificial Muscles 74--82
Eris Chinellato and
Marco Antontelli and
Angel P. del Pobil A Pilot Study on Saccadic Adaptation
Experiments with Robots . . . . . . . . 83--94
Sanjay Dastoor and
Sam Weiss and
Hannah Stuart and
Mark Cutkosky Jumping Robot with a Tunable Suspension
Based on Artificial Muscles . . . . . . 95--106
Naveed Ejaz and
Reiko J. Tanaka and
Holger G. Krapp Static versus Adaptive Gain Control
Strategy for Visuo-motor Stabilization 107--119
Thierry Hoinville and
Rüdiger Wehner and
Holk Cruse Learning and Retrieval of Memory
Elements in a Navigation Task . . . . . 120--131
Tim Landgraf and
Michael Oertel and
Andreas Kirbach and
Randolf Menzel and
Raúl Rojas Imitation of the Honeybee Dance
Communication System by Means of a
Biomimetic Robot . . . . . . . . . . . . 132--143
André Luvizotto and
César Rennó-Costa and
Paul Verschure A Framework for Mobile Robot Navigation
Using a Temporal Population Code . . . . 144--155
Encarni Marcos and
Armin Duff and
Martí Sánchez-Fibla and
Paul F. M. J. Verschure Generalization of Integrator Models to
Foraging: a Robot Study Using the DAC9
Model . . . . . . . . . . . . . . . . . 156--167
Ben Mitchinson and
Martin J. Pearson and
Anthony G. Pipe and
Tony J. Prescott The Emergence of Action Sequences from
Spatial Attention: Insight from
Rodent-Like Robots . . . . . . . . . . . 168--179
Vishwanathan Mohan and
Pietro Morasso How Past Experience, Imitation and
Practice Can Be Combined to Swiftly
Learn to Use Novel ``Tools'': Insights
from Skill Learning Experiments with
Baby Humanoids . . . . . . . . . . . . . 180--191
Dimitri Ognibene and
Eris Chinellato and
Miguel Sarabia and
Yiannis Demiris Towards Contextual Action Recognition
and Target Localization with Active
Allocation of Attention . . . . . . . . 192--203
Ana Brându\csa Pavel and
Cristian Ioan Vasile and
Ioan Dumitrache Robot Localization Implemented with
Enzymatic Numerical $P$ Systems . . . . 204--215
Andrew Philippides and
Bart Baddeley and
Philip Husbands and
Paul Graham How Can Embodiment Simplify the Problem
of View-Based Navigation? . . . . . . . 216--227
Mikhail I. Rabinovich and
Pablo Varona The Dynamical Modeling of Cognitive
Robot-Human Centered Interaction . . . . 228--237
Anonymous Front Matter . . . . . . . . . . . . . . ??
Pavel Turkov and
Olga Krasotkina and
Vadim Mottl Bayesian Approach to the Concept Drift
in the Pattern Recognition Problems . . 1--10
Michelangelo Ceci and
Annalisa Appice and
Herna L. Viktor and
Donato Malerba and
Eric Paquet Transductive Relational Classification
in the Co-training Paradigm . . . . . . 11--25
Rong Yang and
Zhenyuan Wang Generalized Nonlinear Classification
Model Based on Cross-Oriented Choquet
Integral . . . . . . . . . . . . . . . . 26--39
Hai Thanh Nguyen and
Katrin Franke A General $L_p$-norm Support Vector
Machine via Mixed $0$--$1$ Programming 40--49
László Kovács Reduction of Distance Computations in
Selection of Pivot Elements for Balanced
GHT Structure . . . . . . . . . . . . . 50--62
Dieter William Joenssen and
Udo Bankhofer Hot Deck Methods for Imputing Missing
Data . . . . . . . . . . . . . . . . . . 63--75
Saket Bharambe and
Harshit Dubey and
Vikram Pudi BINER . . . . . . . . . . . . . . . . . 76--85
Kartick Chandra Mondal and
Nicolas Pasquier and
Anirban Mukhopadhyay and
Ujjwal Maulik A New Approach for Association Rule
Mining and Bi-clustering Using Formal
Concept Analysis . . . . . . . . . . . . 86--101
Aixiang Li and
Makoto Haraguchi and
Yoshiaki Okubo Top-$N$ Minimization Approach for
Indicative Correlation Change Mining . . 102--116
Rui Leite and
Pavel Brazdil and
Joaquin Vanschoren Selecting Classification Algorithms with
Active Testing . . . . . . . . . . . . . 117--131
Amit Thombre Comparing Logistic Regression, Neural
Networks, C5.0 and M5' Classification
Techniques . . . . . . . . . . . . . . . 132--140
Upendra Sapkota and
Barrett R. Bryant and
Alan Sprague Unsupervised Grammar Inference Using the
Minimum Description Length Principle . . 141--153
Thais Mayumi Oshiro and
Pedro Santoro Perez and
José Augusto Baranauskas How Many Trees in a Random Forest? . . . 154--168
Tao Xu and
David Chiu and
Iker Gondra Constructing Target Concept in Multiple
Instance Learning Using Maximum Partial
Entropy . . . . . . . . . . . . . . . . 169--182
Heni Bouhamed and
Afif Masmoudi and
Thierry Lecroq and
Ahmed Reba\"\i A New Learning Structure Heuristic of
Bayesian Networks from Data . . . . . . 183--197
Nikolaos Pitelis and
Anastasios Tefas Discriminant Subspace Learning Based on
Support Vectors Machines . . . . . . . . 198--212
Nong Thi Hoa and
Bui The Duy A New Learning Strategy of General BAMs 213--221
Godfried T. Toussaint and
Constantin Berzan Proximity-Graph Instance-Based Learning,
Support Vector Machines, and High
Dimensionality: An Empirical Comparison 222--236
Javid Ebrahimi and
Mohammad Saniee Abadeh Semi Supervised Clustering: a Pareto
Approach . . . . . . . . . . . . . . . . 237--251
Andreia Silva and
Cláudia Antunes Semi-supervised Clustering: a Case Study 252--263
Anonymous Front Matter . . . . . . . . . . . . . . ??
Rainer Schmidt and
Heike Weiss and
Georg Fuellen Application of Classification Algorithms
on IDDM Rat Data . . . . . . . . . . . . 1--8
Isabelle Bichindaritz Research Themes in the Case-Based
Reasoning in Health Sciences Core
Literature . . . . . . . . . . . . . . . 9--23
Arnis Kirshners and
Serge Parshutin and
Marcis Leja Research on Application of Data Mining
Methods to Diagnosing Gastric Cancer . . 24--37
Gabor I. Nagy and
Krisztian Buza SOHAC: Efficient Storage of Tick Data
That Supports Search and Analysis . . . 38--51
Hongyan Liu and
Zhiyuan Yao and
Tomas Eklund and
Barbro Back Electricity Consumption Time Series
Profiling: a Data Mining Application in
Energy Industry . . . . . . . . . . . . 52--66
Pedro Santos and
Luisa F. Villa and
Aníbal Reñones and
Andrés Bustillo and
Jesús Maudes Wind Turbines Fault Diagnosis Using
Ensemble Classifiers . . . . . . . . . . 67--76
Luís Moreira-Matias and
Carlos Ferreira and
João Gama and
João Mendes-Moreira Bus Bunching Detection by Mining
Sequences of Headway Deviations . . . . 77--91
Ronnie Alves and
Pedro Ferreira and
Joel Ribeiro and
Orlando Belo Detecting Abnormal Patterns in Call
Graphs Based on the Aggregation of
Relevant Vertex Measures . . . . . . . . 92--102
Andriy Ivannikov and
Mikko Jegoroff and
Tommi Kärkkäinen Real-Time Mass Flow Estimation in
Circulating Fluidized Bed . . . . . . . 103--112
Ons Lejri and
Moncef Tagina Representation in Case-Based Reasoning
Applied to Control Reconfiguration . . . 113--120
Jef Vanlaer and
Pieter Van den Kerkhof and
Geert Gins and
Jan F. M. Van Impe The Influence of Input and Output
Measurement Noise on Batch-End Quality
Prediction with Partial Least Squares 121--135
Kaoru Shimada An Evolving Associative Classifier for
Incomplete Database . . . . . . . . . . 136--150
Laura Welcker and
Stephan Koch and
Frank Dellmann Improving Classifier Performance by
Knowledge-Driven Data Preparation . . . 151--165
Eunkyoung Park and
Younghee Kim and
Ieejoon Kim and
Jaeyeol Yoon and
Jiyeon Lim and
Ungmo Kim CWFM: Closed Contingency Weighted
Frequent Itemsets Mining . . . . . . . . 166--177
Leon Bobrowski and
Tomasz \Lukaszuk Prognostic Modeling with High
Dimensional and Censored Data . . . . . 178--193
Eya Ben Ahmed and
Ahlem Nabli and
Fa\"\iez Gargouri $\mathcal{SHACUN}$: Semi-supervised
Hierarchical Active Clustering Based on
Ranking Constraints . . . . . . . . . . 194--208
Xiaochun Wang and
Xia Li Wang and
D. Mitch Wilkes A Minimum Spanning Tree-Inspired
Clustering-Based Outlier Detection
Technique . . . . . . . . . . . . . . . 209--223
Samir A. Mohamed Elsayed and
Sanguthevar Rajasekaran and
Reda A. Ammar ML-DS: a Novel Deterministic Sampling
Algorithm for Association Rules Mining 224--235
Wies\law Paja and
Mariusz Wrzesie\'n Decision Rules Development Using Set of
Generic Operations Approach . . . . . . 236--242
Sebastian Klenk and
Jürgen Dippon and
Andre Burkovski and
Gunther Heidemann Redundant Dictionary Spaces as a General
Concept for the Analysis of
Non-vectorial Data . . . . . . . . . . . 243--257
Anonymous Front Matter . . . . . . . . . . . . . . ??
Albert Clapés and
Miguel Reyes and
Sergio Escalera User Identification and Object
Recognition in Clutter Scenes Based on
RGB-Depth Analysis . . . . . . . . . . . 1--11
Margara Tejera and
Adrian Hilton Compression Techniques for $3$D Video
Mesh Sequences . . . . . . . . . . . . . 12--25
Sòren Hauberg and
Kim Steenstrup Pedersen Spatial Measures between Human Poses for
Classification and Understanding . . . . 26--36
Rune Havnung Bakken and
Adrian Hilton Real-Time Pose Estimation Using
Constrained Dynamics . . . . . . . . . . 37--46
Junghyun Ahn and
Stéphane Gobron and
David Garcia An NVC Emotional Model for
Conversational Virtual Humans in a $3$D
Chatting Environment . . . . . . . . . . 47--57
Stéphane Gobron and
Junghyun Ahn and
David Garcia An Event-Based Architecture to Manage
Virtual Human Non-Verbal Communication
in $3$D Chatting Environment . . . . . . 58--68
María del Puy Carretero and
Aitor Ardanza Improving Gestural Communication in
Virtual Characters . . . . . . . . . . . 69--81
Sergio Navarro and
Adolfo López-Méndez Multi-view Body Tracking with a
Detector-Driven Hierarchical Particle
Filter . . . . . . . . . . . . . . . . . 82--91
Bogdan Kwolek and
Tomasz Krzeszowski Real-Time Multi-view Human Motion
Tracking Using Particle Swarm
Optimization with Resampling . . . . . . 92--101
Alexandros Neophytou and
Adrian Hilton A Comparative Study of Surface
Representations Used in Statistical
Human Models . . . . . . . . . . . . . . 102--113
Ran Xu and
Priyanshu Agarwal and
Suren Kumar Combining Skeletal Pose with Local
Motion for Human Activity Recognition 114--123
Claudio Loconsole and
Nuno Barbosa A New Marker-Less $3$D Kinect-Based
System for Facial Anthropometric
Measurements . . . . . . . . . . . . . . 124--133
Kensuke Kitamura and
Noriko Takemura and
Yoshio Iwai Automatic Detection of Unconscious
Reactions to Illuminance Changes in
Illumination . . . . . . . . . . . . . . 134--143
Stuart Bennett and
Joan Lasenby Deformation Measurement of a Human Chest
Experiencing Global Motion . . . . . . . 144--152
Thomas Jensen and
Henrik Rasmussen Automatic Estimation of Movement
Statistics of People . . . . . . . . . . 153--162
Seth Holladay and
Parris Egbert Granular Material Deposition for
Simulation and Texturing . . . . . . . . 163--172
Nader Mahmoud and
Stephane A. Nicolau Fast $3$D Structure From Motion with
Missing Points from Registration of
Partial Reconstructions . . . . . . . . 173--183
Xiangyang Ju and
Balvinder Khambay and
Emer O'Leary Evaluation of the Reproducibility of
Non-verbal Facial Animations . . . . . . 184--193
Francisco Ramos and
Oscar Ripolles and
Miguel Chover Continuous Level of Detail for Large
Scale Rendering of $3$D Animated
Polygonal Models . . . . . . . . . . . . 194--203
Wenjuan Gong and
Jordi Gonz\`alez A New Image Dataset on Human
Interactions . . . . . . . . . . . . . . 204--209
Anonymous Front Matter . . . . . . . . . . . . . . ??
Shlomo Berkovsky and
Jill Freyne and
Gregory Smith Personalized Network Updates: Increasing
Social Interactions and Contributions in
Social Networks . . . . . . . . . . . . 1--13
Fabian Bohnert and
Ingrid Zukerman and
David W. Albrecht Realistic Simulation of Museum Visitors'
Movements as a Tool for Assessing
Sensor-Based User Models . . . . . . . . 14--25
Fabian Bohnert and
Ingrid Zukerman and
Junaidy Laures GECKOmmender: Personalised Theme and
Tour Recommendations for Museums . . . . 26--37
Federica Cena and
Silvia Likavec and
Francesco Osborne Property-Based Interest Propagation in
Ontology-Based User Model . . . . . . . 38--50
Federico Cirett Galán and
Carole R. Beal EEG Estimates of Engagement and
Cognitive Workload Predict Math Problem
Solving Outcomes . . . . . . . . . . . . 51--62
Maunendra Sankar Desarkar and
Roopam Saxena and
Sudeshna Sarkar Preference Relation Based Matrix
Factorization for Recommender Systems 63--75
John Finnson and
Jie Zhang and
Thomas Tran and
Umar Farooq Minhas and
Robin Cohen A Framework for Modeling Trustworthiness
of Users in Mobile Vehicular Ad-Hoc
Networks and Its Validation through
Simulated Traffic Flow . . . . . . . . . 76--87
Qi Gao and
Fabian Abel and
Geert-Jan Houben and
Yong Yu A Comparative Study of Users'
Microblogging Behavior on Sina Weibo and
Twitter . . . . . . . . . . . . . . . . 88--101
Yue Gong and
Joseph E. Beck and
Carolina Ruiz Modeling Multiple Distributions of
Student Performances to Improve
Predictive Accuracy . . . . . . . . . . 102--113
Guibing Guo and
Jie Zhang and
Daniel Thalmann A Simple But Effective Method to
Incorporate Trusted Neighbors in
Recommender Systems . . . . . . . . . . 114--125
Samad Kardan and
Cristina Conati Exploring Gaze Data for Determining User
Learning with an Interactive Simulation 126--138
Melanie Larizza and
Ingrid Zukerman and
Fabian Bohnert and
R. Andrew Russell and
Lucy Busija Studies to Determine User Requirements
Regarding In-Home Monitoring Systems . . 139--150
Martin Leginus and
Peter Dolog and
Valdas \vZemaitis Improving Tensor Based Recommenders with
Clustering . . . . . . . . . . . . . . . 151--163
Janette Lehmann and
Mounia Lalmas and
Elad Yom-Tov and
Georges Dupret Models of User Engagement . . . . . . . 164--175
Monika Mandl and
Alexander Felfernig Improving the Performance of Unit
Critiquing . . . . . . . . . . . . . . . 176--187
Cataldo Musto and
Fedelucio Narducci and
Pasquale Lops and
Giovanni Semeraro and
Marco de Gemmis Enhanced Semantic TV-Show Representation
for Personalized Electronic Program
Guides . . . . . . . . . . . . . . . . . 188--199
Vidhya Navalpakkam and
Ravi Kumar and
Lihong Li and
D. Sivakumar Attention and Selection in Online Choice
Tasks . . . . . . . . . . . . . . . . . 200--211
Ingrid Nunes and
Simon Miles and
Michael Luck and
Carlos J. P. de Lucena Investigating Explanations to Justify
Choice . . . . . . . . . . . . . . . . . 212--224
Luiz Augusto Pizzato and
Joshua Akehurst and
Cameron Silvestrini and
Kalina Yacef The Effect of Suspicious Profiles on
People Recommenders . . . . . . . . . . 225--236
Alan Said and
Brijnesh J. Jain and
Sascha Narr and
Till Plumbaum Users and Noise: The Magic Barrier of
Recommender Systems . . . . . . . . . . 237--248
Anonymous Front Matter . . . . . . . . . . . . . . ??
Lei Wei and
Alexei Sourin and
Zoran Najdovski Function-Based Single and Dual Point
Haptic Interaction in Cyberworlds . . . 1--16
Vladimir Aleshin and
Valery Afanasiev Visual $3$D Perception of Motion
Environment and Visibility Factors in
Virtual Space . . . . . . . . . . . . . 17--33
Joëlle Tilmanne and
Thierry Dutoit Continuous Control of Style and Style
Transitions through Linear Interpolation
in Hidden Markov Model Based Walk
Synthesis . . . . . . . . . . . . . . . 34--54
Vaisagh Viswanathan and
Michael Lees Modeling and Analyzing the Human
Cognitive Limits for Perception in Crowd
Simulation . . . . . . . . . . . . . . . 55--76
Roman V. Yampolskiy and
Gyuchoon Cho Experiments in Artimetrics: Avatar Face
Recognition . . . . . . . . . . . . . . 77--94
Kenji Ohmori and
Tosiyasu L. Kunii Visualization of Joinery Using Homotopy
Theory and Attaching Maps . . . . . . . 95--114
Toshio Kodama and
Yoichi Seki and
Tosiyasu L. Kunii Example of Business Applications Using
the Numerical Value and Exponential
Calculation of the Cellular Data System 115--133
Erika Harrison and
Ali Mahdavi-Amiri Analysis of Inverse Snyder Optimizations 134--148
Yichen Li and
Mingqiang Wei and
Jianhuang Wu Error-Controllable Simplification of
Point Cloud . . . . . . . . . . . . . . 149--162
Yang Wenzhen and
Pan Zhigen and
Chen Wenhua Physically-Based Haptic Rendering for
Virtual Hand Interaction . . . . . . . . 163--178
Gianluca Mura The Advanced Open Metaplastic Platform
for Cyber Art . . . . . . . . . . . . . 179--190
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . I--XII
Yuan Gao and
Kai Salomaa In Memoriam Sheng Yu . . . . . . . . . . 1--4
Janusz Brzozowski In Search of Most Complex Regular
Languages . . . . . . . . . . . . . . . 5--24
Andrzej Ehrenfeucht and
Grzegorz Rozenberg A Formal Framework for Processes
Inspired by the Functioning of Living
Cells . . . . . . . . . . . . . . . . . 25--27
Paul Gastin and
Benjamin Monmege Adding Pebbles to Weighted Automata . . 28--51
José N. Oliveira Typed Linear Algebra for Weigthed
(Probabilistic) Automata . . . . . . . . 52--65
Cyril Allauzen and
Michael Riley A Pushdown Transducer Extension for the
OpenFst Library . . . . . . . . . . . . 66--77
Joshua Amavi and
Jacques Chabin and
Pierre Réty Weak Inclusion for Recursive XML Types 78--89
Mikhail V. Berlinkov Synchronizing Automata on Quasi-Eulerian
Digraph . . . . . . . . . . . . . . . . 90--100
Tullio Ceccherini-Silberstein and
Michel Coornaert and
Francesca Fiorenzi and
Zoran \vSuni\'c Cellular Automata on Regular Rooted
Trees . . . . . . . . . . . . . . . . . 101--112
Stefano Crespi Reghizzi and
Pierluigi L. San Pietro Strict Local Testability with Consensus
Equals Regularity . . . . . . . . . . . 113--124
Pierpaolo Degano and
Gian-Luigi Ferrari and
Gianluca Mezzetti Nominal Automata for Resource Usage
Control . . . . . . . . . . . . . . . . 125--137
Manfred Droste and
Bundit Pibaljommee Weighted Nested Word Automata and Logics
over Strong Bimonoids . . . . . . . . . 138--148
Simone Faro and
Thierry Lecroq A Fast Suffix Automata Based Algorithm
for Exact Online String Matching . . . . 149--158
Fedor Fominykh and
Mikhail Volkov P(l)aying for Synchronization . . . . . 159--170
Vladimir V. Gusev Synchronizing Automata of Bounded Rank 171--179
Daniel Go\vc and
Dane Henshall and
Jeffrey Shallit Automatic Theorem-Proving in
Combinatorics on Words . . . . . . . . . 180--191
Oscar H. Ibarra and
Nicholas Q. Tran How to Synchronize the Heads of a
Multitape Automaton . . . . . . . . . . 192--204
Franz Jahn and
Manfred Kufleitner and
Alexander Lauser Regular Ideal Languages and Their
Boolean Combinations . . . . . . . . . . 205--216
Artur Je\.z and
Andreas Maletti Hyper-minimization for Deterministic
Tree Automata . . . . . . . . . . . . . 217--228
Galina Jirásková and
Tomá\vs Masopust On the State and Computational
Complexity of the Reverse of Acyclic
Minimal DFAs . . . . . . . . . . . . . . 229--239
Anonymous Front Matter . . . . . . . . . . . . . . ??
Shizhi Chen and
D. Michael Quintian and
YingLi Tian Towards a Visual Speech Learning System
for the Deaf by Matching Dynamic Lip
Shapes . . . . . . . . . . . . . . . . . 1--9
Makoto Kobayashi and
Takuya Suzuki and
Daisuke Wakatsuki Teaching Support Software for Hearing
Impaired Students Who Study Computer
Operation . . . . . . . . . . . . . . . 10--17
Petr Hladík and
Tomá\vs G\ocircura The Hybrid Book --- One Document for All
in the Latest Development . . . . . . . 18--24
Andrea Petz and
Klaus Miesenberger Dealing with Changes in Supporting
Students with Disabilities in Higher
Education . . . . . . . . . . . . . . . 25--32
Lisa Featherstone and
Simon Ball Putting the Disabled Student in Charge:
Introduction to the Special Thematic
Session . . . . . . . . . . . . . . . . 33--35
Lars Ballieu Christensen and
Tanja Stevns Biblus --- a Digital Library to Support
Integration of Visually Impaired in
Mainstream Education . . . . . . . . . . 36--42
Alistair McNaught and
Lisa Featherstone Alternative Approaches to Alternative
Formats --- Changing Expectations by
Challenging Myths . . . . . . . . . . . 43--50
Mike Wald and
E. A. Draffan and
Russell Newman and
Sebastian Skuse and
Chris Phethean Access Toolkit for Education . . . . . . 51--58
Poorna Kushalnagar and
Benjamin Williams and
Raja S. Kushalnagar Community-Based Participatory Approach:
Students as Partners in Educational
Accessible Technology Research . . . . . 59--64
Paloma Cantón and
Ángel L. González and
Gonzalo Mariscal and
Carlos Ruiz Applying New Interaction Paradigms to
the Education of Children with Special
Educational Needs . . . . . . . . . . . 65--72
Fern Faux and
David Finch and
Lisa Featherstone InStep: a Video Database Assessment Tool 73--76
Lars Ballieu Christensen and
Sean J. Keegan and
Tanja Stevns SCRIBE: a Model for Implementing
Robobraille in a Higher Education
Institution . . . . . . . . . . . . . . 77--83
Wiebke Köhlmann Identifying Barriers to Collaborative
Learning for the Blind . . . . . . . . . 84--91
Raja S. Kushalnagar and
Poorna Kushalnagar and
Jeffrey B. Pelz Deaf and Hearing Students' Eye Gaze
Collaboration . . . . . . . . . . . . . 92--99
José Antonio Borges and
Dolores Tomé The Musibraille Project --- Enabling the
Inclusion of Blind Students in Music
Courses . . . . . . . . . . . . . . . . 100--107
Mike Wald Important New Enhancements to Inclusive
Learning Using Recorded Lectures . . . . 108--115
Mamoru Fujiyoshi and
Akio Fujiyoshi and
Akiko Ohsawa and
Toshiaki Aomatsu and
Haruhiko Sawazaki Development of New Auditory Testing
Media with Invisible $2$-Dimensional
Codes for Test-Takers with Print
Disabilities . . . . . . . . . . . . . . 116--123
John Gardner and
Courtney Christensen More Accessible Math . . . . . . . . . . 124--129
Katsuhito Yamaguchi and
Masakazu Suzuki Accessible Authoring Tool for DAISY
Ranging from Mathematics to Others . . . 130--137
Wanda Gonzúrová and
Pavel Hrabák Blind Friendly LaTeX . . . . . . . . . . 138--141
Anonymous Front Matter . . . . . . . . . . . . . . ??
Lars Emil Knudsen and
Harald Holone A Multimodal Approach to Accessible Web
Content on Smartphones . . . . . . . . . 1--8
Roberto Manduchi Mobile Vision as Assistive Technology
for the Blind: An Experimental Study . . 9--16
Shuihua Wang and
Yingli Tian Camera-Based Signage Detection and
Recognition for Blind Persons . . . . . 17--24
James M. Coughlan and
Huiying Shen The Crosswatch Traffic Intersection
Analyzer: a Roadmap for the Future . . . 25--28
Jesus Zegarra and
René Farcy GPS and Inertial Measurement Unit (IMU)
as a Navigation System for the Visually
Impaired . . . . . . . . . . . . . . . . 29--32
Edgardo Molina and
Zhigang Zhu and
Yingli Tian Visual Nouns for Indoor/Outdoor
Navigation . . . . . . . . . . . . . . . 33--40
Huiying Shen and
James M. Coughlan Towards a Real-Time System for Finding
and Reading Signs for Visually Impaired
Users . . . . . . . . . . . . . . . . . 41--47
Yoonjung Choi and
Ki-Hyung Hong User Requirements for Camera-Based
Mobile Applications on Touch Screen
Devices for Blind People . . . . . . . . 48--51
Mehrez Boulares and
Mohamed Jemni A Route Planner Interpretation Service
for Hard of Hearing People . . . . . . . 52--58
Martin Spindler and
Michael Weber and
Denise Prescher and
Mei Miao and
Gerhard Weber Translating Floor Plans into Directions 59--66
Tracey J. Mehigan and
Ian Pitt Harnessing Wireless Technologies for
Campus Navigation by Blind Students and
Visitors . . . . . . . . . . . . . . . . 67--74
Vladimir Kulyukin and
Tanwir Zaman and
Abhishek Andhavarapu and
Aliasgar Kutiyanawala Eyesight Sharing in Blind Grocery
Shopping: Remote P2P Caregiving through
Cloud Computing . . . . . . . . . . . . 75--82
Stefan Almer and
Josef Kolbitsch and
Johannes Oberzaucher and
Martin Ebner Assessment Test Framework for Collecting
and Evaluating Fall-Related Data Using
Mobile Devices . . . . . . . . . . . . . 83--90
Werner Bischof and
Elmar Krajnc and
Markus Dornhofer and
Michael Ulm NAVCOM--WLAN Communication between
Public Transport Vehicles and Smart
Phones to Support Visually Impaired and
Blind People . . . . . . . . . . . . . . 91--98
Shigeki Miyoshi and
Sumihiro Kawano and
Mayumi Shirasawa and
Kyoko Isoda and
Michiko Hasuike Mobile-Type Remote Captioning System for
Deaf or Hard-of-Hearing People and the
Experience of Remote Supports after the
Great East Japan Earthquake . . . . . . 99--104
Bogdan Zamfir and
Robert Tedesco and
Brian Reichow Handheld ``App'' Offering Visual Support
to Students with Autism Spectrum
Disorders (ASDs) . . . . . . . . . . . . 105--112
Zdenek Bumbalek and
Jan Zelenka and
Lukas Kencl Cloud-Based Assistive
Speech-Transcription Services . . . . . 113--116
Yumi Hwang and
Daejin Shin and
Chang-Yeal Yang and
Seung-Yeun Lee and
Jin Kim and
Byunggoo Kong Developing a Voice User Interface with
Improved Usability for People with
Dysarthria . . . . . . . . . . . . . . . 117--124
Frank G. Palmer and
Zhigang Zhu and
Tony Ro Wearable Range-Vibrotactile Field:
Design and Evaluation . . . . . . . . . 125--132
Adam Kupryjanow and
Piotr Suchomski and
Piotr Odya and
Andrzej Czyzewski System Supporting Speech Perception in
Special Educational Needs Schoolchildren 133--136
Anonymous Front Matter . . . . . . . . . . . . . . ??
Claude Castelluccia and
Mohamed-Ali Kaafar and
Minh-Dung Tran Betrayed by Your Ads! . . . . . . . . . 1--17
George Danezis and
Markulf Kohlweiss and
Benjamin Livshits and
Alfredo Rial Private Client-Side Profiling with
Random Forests and Hidden Markov Models 18--37
Fernando Pérez-González and
Carmela Troncoso Understanding Statistical Disclosure: a
Least Squares Approach . . . . . . . . . 38--57
Xun Gong and
Nikita Borisov and
Negar Kiyavash and
Nabil Schear Website Detection Using Remote Traffic
Analysis . . . . . . . . . . . . . . . . 58--78
Wen Ming Liu and
Lingyu Wang and
Kui Ren and
Pengsu Cheng and
Mourad Debbabi $k$-Indistinguishable Traffic Padding in
Web Applications . . . . . . . . . . . . 79--99
Yossi Gilad and
Amir Herzberg Spying in the Dark: TCP and Tor Traffic
Analysis . . . . . . . . . . . . . . . . 100--119
Dima Alhadidi and
Noman Mohammed and
Benjamin C. M. Fung and
Mourad Debbabi Secure Distributed Framework for
Achieving $\epsilon$-Differential
Privacy . . . . . . . . . . . . . . . . 120--139
T.-H. Hubert Chan and
Mingfei Li and
Elaine Shi and
Wenchang Xu Differentially Private Continual
Monitoring of Heavy Hitters from
Distributed Streams . . . . . . . . . . 140--159
Chengfang Fang and
Ee-Chien Chang Adaptive Differentially Private
Histogram of Low-Dimensional Data . . . 160--179
Erik-Oliver Blass and
Roberto Di Pietro and
Refik Molva and
Melek Önen PRISM --- Privacy-Preserving Search in
MapReduce . . . . . . . . . . . . . . . 180--200
Martin Pirker and
Daniel Slamanig and
Johannes Winter Practical Privacy Preserving Cloud
Resource-Payment for Constrained Clients 201--220
Marek Jawurek and
Florian Kerschbaum Fault-Tolerant Privacy-Preserving
Statistics . . . . . . . . . . . . . . . 221--238
David Fifield and
Nate Hardison and
Jonathan Ellithorpe and
Emily Stark and
Dan Boneh Evading Censorship with Browser-Based
Proxies . . . . . . . . . . . . . . . . 239--258
Nick Nikiforakis and
Steven Van Acker and
Frank Piessens and
Wouter Joosen Exploring the Ecosystem of
Referrer-Anonymizing Services . . . . . 259--278
Vaibhav Garg and
L. Jean Camp and
Katherine Connelly and
Lesa Lorenzen-Huber Risk Communication Design: Video vs.
Text . . . . . . . . . . . . . . . . . . 279--298
Andrew W. E. McDonald and
Sadia Afroz and
Aylin Caliskan and
Ariel Stolerman and
Rachel Greenstadt Use Fewer Instances of the Letter ``i'':
Toward Writing Style Anonymization . . . 299--318
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Thomas Ball and
Nikolaj Bjòrner and
Leonardo de Moura and
Kenneth L. McMillan and
Margus Veanes Beyond First-Order Satisfaction: Fixed
Points, Interpolants, Automata and
Polynomials . . . . . . . . . . . . . . 1--6
Paul Dan Marinescu and
Cristian Cadar High-Coverage Symbolic Patch Testing . . 7--21
Andrey Rybalchenko Towards Automatic Synthesis of Software
Verification Tools . . . . . . . . . . . 22--22
Andreas Zeller Mining Models . . . . . . . . . . . . . 23--23
Stefan Leue and
Mitra Tabaei Befrouei Counterexample Explanation by Anomaly
Detection . . . . . . . . . . . . . . . 24--42
Sami Evangelista and
Lars Michael Kristensen Combining the Sweep-Line Method with the
Use of an External-Memory Priority Queue 43--61
Hao Zheng and
Emmanuel Rodriguez and
Yingying Zhang and
Chris Myers A Compositional Minimization Approach
for Large Asynchronous Design
Verification . . . . . . . . . . . . . . 62--79
Alexander Ditter and
Milan \vCe\vska and
Gerald Lüttgen On Parallel Software Verification Using
Boolean Equation Systems . . . . . . . . 80--97
Anton J. Wijs and
Dragan Bo\vsna\vcki Improving GPU Sparse Matrix-Vector
Multiplication for Probabilistic Model
Checking . . . . . . . . . . . . . . . . 98--116
Theo C. Ruys and
Pim Kars Gossiping Girls Are All Alike . . . . . 117--136
Shravan Garlapati and
Sandeep K. Shukla Formal Verification of Hierarchically
Distributed Agent Based Protection
Scheme in Smart Grid . . . . . . . . . . 137--154
Gerard J. Holzmann Parallelizing the Spin Model Checker . . 155--171
Ethan Burns and
Rong Zhou Parallel Model Checking Using
Abstraction . . . . . . . . . . . . . . 172--190
Reng Zeng and
Zhuo Sun and
Su Liu and
Xudong He McPatom: a Predictive Analysis Tool for
Atomicity Violation Using Model Checking 191--207
Divjyot Sethi and
Muralidhar Talupur and
Daniel Schwartz-Narbonne and
Sharad Malik Parameterized Model Checking of Fine
Grained Concurrency . . . . . . . . . . 208--226
Jonathan Bogdoll and
Alexandre David and
Arnd Hartmanns and
Holger Hermanns \tt mctau: Bridging the Gap between
Modest and UPPAAL . . . . . . . . . . . 227--233
Heinz Riener and
Görschwin Fey FAuST: a Framework for Formal
Verification, Automated Debugging, and
Software Test Generation . . . . . . . . 234--240
Martin Sulzmann and
Axel Zechner Model Checking DSL-Generated C Source
Code . . . . . . . . . . . . . . . . . . 241--247
Jürgen Christ and
Jochen Hoenicke and
Alexander Nutz SMTInterpol: An Interpolating SMT Solver 248--254
Yong Jiang and
Zongyan Qiu S2N: Model Transformation from SPIN to
NuSMV . . . . . . . . . . . . . . . . . 255--260
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Jean-Baptiste Jeannin and
Dexter Kozen Computing with Capsules . . . . . . . . 1--19
Christos A. Kapoutsis Minicomplexity . . . . . . . . . . . . . 20--42
André Platzer Logical Analysis of Hybrid Systems . . . 43--49
Pedro V. Silva Groups and Automata: a Perfect Match . . 50--63
Fernando Arroyo and
Juan Castellanos and
Victor Mitrana Uniform Distributed Pushdown Automata
Systems . . . . . . . . . . . . . . . . 64--75
Zuzana Bednárová and
Viliam Geffert and
Carlo Mereghetti and
Beatrice Palano Removing Nondeterminism in Constant
Height Pushdown Automata . . . . . . . . 76--88
Maria Paola Bianchi and
Markus Holzer and
Sebastian Jakobi and
Giovanni Pighizzini On Inverse Operations and Their
Descriptional Complexity . . . . . . . . 89--102
Francine Blanchet-Sadri and
Sean Simmons Deciding Representability of Sets of
Words of Equal Length . . . . . . . . . 103--116
Janusz Brzozowski and
Baiyu Li Syntactic Complexities of Some Classes
of Star-Free Languages . . . . . . . . . 117--129
Cezar Câmpeanu Randomness Behaviour in Blum Universal
Static Complexity Spaces . . . . . . . . 130--140
Jürgen Dassow and
Ronny Harbich Production Complexity of Some Operations
on Context-Free Languages . . . . . . . 141--154
Yuan Gao and
Lila Kari State Complexity of Star and Square of
Union of k Regular Languages . . . . . . 155--168
Markus Holzer and
Sebastian Jakobi State Complexity of Chop Operations on
Unary and Finite Languages . . . . . . . 169--182
Artur Je\.z and
Alexander Okhotin On the Number of Nonterminal Symbols in
Unambiguous Conjunctive Grammars . . . . 183--195
Galina Jirásková and
Ond\vrej Klíma Descriptional Complexity of Biautomata 196--208
Andreas Malcher and
Katja Meckel and
Carlo Mereghetti and
Beatrice Palano Descriptional Complexity of Pushdown
Store Languages . . . . . . . . . . . . 209--221
Florin Manea and
Bianca Truthe On Internal Contextual Grammars with
Subregular Selection Languages . . . . . 222--235
Alexander Meduna and
Luká\vs Vrábel and
Petr Zemek An Infinite Hierarchy of Language
Families Resulting from Stateless
Pushdown Automata with Limited Pushdown
Alphabets . . . . . . . . . . . . . . . 236--243
Friedrich Otto Centralized PC Systems of Pushdown
Automata versus Multi-head Pushdown
Automata . . . . . . . . . . . . . . . . 244--251
Alexandros Palioudakis and
Kai Salomaa and
Selim G. Akl State Complexity and Limited
Nondeterminism . . . . . . . . . . . . . 252--265
Anonymous Front Matter . . . . . . . . . . . . . . ??
Matthias Heinrich and
Franz Josef Grüneberger and
Thomas Springer and
Martin Gaedke Reusable Awareness Widgets for
Collaborative Web Applications --- a
Non-invasive Approach . . . . . . . . . 1--15
Feng Xiao and
Tomoya Noro and
Takehiro Tokuda News-Topic Oriented Hashtag
Recommendation in Twitter Based on
Characteristic Co-occurrence Word
Detection . . . . . . . . . . . . . . . 16--30
Michael Nebeling and
Stefania Leone and
Moira C. Norrie Crowdsourced Web Engineering and Design 31--45
Damir Vandic and
Flavius Frasincar and
Frederik Hogenboom Scaling Pair-Wise Similarity-Based
Algorithms in Tagging Spaces . . . . . . 46--60
Martin Leginus and
Peter Dolog and
Ricardo Lage and
Frederico Durao Methodologies for Improved Tag Cloud
Generation with Clustering . . . . . . . 61--75
Devis Bianchini and
Valeria De Antonellis and
Michele Melchiori Semantic Collaborative Tagging for Web
APIs Sharing and Reuse . . . . . . . . . 76--90
Cristóbal Arellano and
Oscar Díaz and
Jon Iturrioz Opening Personalization to Partners: An
Architecture of Participation for
Websites . . . . . . . . . . . . . . . . 91--105
Mairon Belchior and
Daniel Schwabe and
Fernando Silva Parreiras Role-Based Access Control for
Model-Driven Web Applications . . . . . 106--120
Manar H. Alalfi and
James R. Cordy and
Thomas R. Dean Recovering Role-Based Access Control
Security Models from Dynamic Web
Applications . . . . . . . . . . . . . . 121--136
Alessandro Bozzon and
Marco Brambilla and
Piero Fraternali and
Marco Tagliasacchi Diversification for Multi-domain Result
Sets . . . . . . . . . . . . . . . . . . 137--152
Ke Tao and
Fabian Abel and
Claudia Hauff and
Geert-Jan Houben Twinder: a Search Engine for Twitter
Streams . . . . . . . . . . . . . . . . 153--168
Elena Ilina and
Claudia Hauff and
Ilknur Celik and
Fabian Abel and
Geert-Jan Houben Social Event Detection on Twitter . . . 169--176
Damien Leprovost and
Lylia Abrouk and
Nadine Cullot and
David Gross-Amblard Temporal Semantic Centrality for the
Analysis of Communication Networks . . . 177--184
Manuel Wimmer and
Nathalie Moreno and
Antonio Vallecillo Systematic Evolution of WebML Models by
Coupled Transformations . . . . . . . . 185--199
Julián Grigera and
José Matías Rivero and
Esteban Robles Luna and
Franco Giacosa and
Gustavo Rossi From Requirements to Web Applications in
an Agile Model-Driven Approach . . . . . 200--214
Nora Koch and
Alexander Knapp and
Sergej Kozuruba Assessment of Effort Reduction due to
Model-to-Model Transformations in the
Web Domain . . . . . . . . . . . . . . . 215--222
Yulkeidi Martínez and
Cristina Cachero and
Santiago Meliá Evaluating the Impact of a Model-Driven
Web Engineering Approach on the
Productivity and the Satisfaction of
Software Development Teams . . . . . . . 223--237
Shabnam Mirshokraie and
Ali Mesbah JSART: JavaScript Assertion-Based
Regression Testing . . . . . . . . . . . 238--252
Sara Comai and
Davide Mazza and
Andrea Guarinoni A Framework for the Development of
Haptic-Enhanced Web Applications . . . . 253--267
Sergio Firmenich and
Vincent Gaits and
Silvia Gordillo and
Gustavo Rossi and
Marco Winckler Supporting Users Tasks with Personal
Information Management and Web Forms
Augmentation . . . . . . . . . . . . . . 268--282
Anonymous Front Matter . . . . . . . . . . . . . . ??
Olaf Beyersdorff and
Oliver Kutz Proof Complexity of Non-classical Logics 1--54
Jan Broersen and
Leendert van der Torre Ten Problems of Deontic Logic and
Normative Reasoning in Computer Science 55--88
Ugo Dal Lago A Short Introduction to Implicit
Computational Complexity . . . . . . . . 89--109
Sujata Ghosh and
R. Ramanujam Strategies in Games: a Logic-Automata
Study . . . . . . . . . . . . . . . . . 110--159
Davide Grossi and
Gabriella Pigozzi Introduction to Judgment Aggregation . . 160--209
Wojciech Jamroga and
Wojciech Penczek Specification and Verification of
Multi-Agent Systems . . . . . . . . . . 210--263
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Xia Hong and
Sheng Chen PSO Assisted NURB Neural Network
Identification . . . . . . . . . . . . . 1--9
Lukasz Cielecki and
Olgierd Unold $2$D Discontinuous Function
Approximation with Real-Valued
Grammar-Based Classifier System . . . . 10--17
Zhi-Zeng Li and
Xue-Yan Song and
Ji-Zhou Sun and
Zhao-Tong Huang A Scatter Search Methodology for the
Aircraft Conflict Resolution Problem . . 18--24
Datong Xie and
Lixin Ding and
Shenwen Wang and
Zhaolu Guo and
Yurong Hu and
Chengwang Xie Self-adaptive Differential Evolution
Based Multi-objective Optimization
Incorporating Local Search and
Indicator-Based Selection . . . . . . . 25--33
Tianpei Zhou Application of Data Mining in Coal Mine
Safety Decision System Based on Rough
Set . . . . . . . . . . . . . . . . . . 34--41
Xianghua Lu and
Weijing Wang Study on Web Text Feature Selection
Based on Rough Set . . . . . . . . . . . 42--48
Luyi Bai and
Zongmin Ma A Generalized Approach for Determining
Fuzzy Temporal Relations . . . . . . . . 49--56
Hongyan Xing and
Daowen Qiu Applications on Information Flow and
Biomedical Treatment of FDES Based on
Fuzzy Sequential Machines Theory . . . . 57--64
Yabin Shao and
Zengtai Gong Discontinuous Fuzzy Systems and Henstock
Integrals of Fuzzy Number Valued
Functions . . . . . . . . . . . . . . . 65--72
Haiping Yu and
Fengying Yang A Phased Adaptive PSO Algorithm for
Multimodal Function Optimization . . . . 73--79
Guoliang Huang and
Xinling Shi and
Zhenzhou An and
He Sun The Comparative Study of Different
Number of Particles in Clustering Based
on Three-Layer Particle Swarm
Optimization . . . . . . . . . . . . . . 80--86
Yang Weon Lee Implementation of Mutual Localization of
Multi-robot Using Particle Filter . . . 87--94
Milad Malekzadeh and
Alireza Khosravi and
Saeed Alighale and
Hamed Azami Optimization of Orthogonal Poly Phase
Coding Waveform Based on Bees Algorithm
and Artificial Bee Colony for MIMO Radar 95--102
Yinli Dong and
Shuisheng Zhou SVM Regularizer Models on RKHS vs. on
$R^m$ . . . . . . . . . . . . . . . . . 103--111
Xing Zhang Research on Performance Comprehensive
Evaluation of Thermal Power Plant under
Low-Carbon Economy . . . . . . . . . . . 112--119
Hui Zhang and
Qing Guo and
Costas S. Iliopoulos Computing the Minimum $\lambda$-Cover in
Weighted Sequences . . . . . . . . . . . 120--127
Huantong Geng and
Haifeng Zhu and
Rui Xing and
Tingting Wu A Novel Hybrid Evolutionary Algorithm
for Solving Multi-Objective Optimization
Problems . . . . . . . . . . . . . . . . 128--136
Huynh Thi Thanh Binh and
Pham Vu Long and
Nguyen Ngoc Dat and
Nguyen Sy Thai Ha Heuristic Algorithms for Solving
Survivable Network Design Problem with
Simultaneous Unicast and Anycast Flows 137--144
Xueling Li and
Min Zhu and
Xiaolai Li and
Hong-Qiang Wang and
Shulin Wang Protein-Protein Binding Affinity
Prediction Based on an SVR Ensemble . . 145--151
Xiaoli Wei and
Xue Shi and
Seongho Kim and
Craig McClain and
Xiang Zhang A Novel Two-Stage Alignment Method for
Liquid Chromatography Mass
Spectrometry-Based Metabolomics . . . . 152--159
Anonymous Front Matter . . . . . . . . . . . . . . ??
Xiaoming Liu and
Bo Li and
Jun Liu and
Xin Xu and
Zhilin Feng Mass Diagnosis in Mammography with
Mutual Information Based Feature
Selection and Support Vector Machine . . 1--8
Xuyang Lou and
Qian Ye and
Ke Lou and
Baotong Cui Mean Square Exponential Stability of
Hybrid Neural Networks with Uncertain
Switching Probabilities . . . . . . . . 9--17
Ming-xuan Sun Time-Varying Neurocomputing: An
Iterative Learning Perspective . . . . . 18--26
Hong Wang and
Huijuan Shi Knowledge Reduction Based on Evidence
Reasoning Theory in Interval Ordered
Information Systems . . . . . . . . . . 27--34
Yong-Heng Zhang and
Feng Zhang Research on New Algorithm of
Topic-Oriented Crawler and Duplicated
Web Pages Detection . . . . . . . . . . 35--42
Xiaochun Lv and
Hanming Gu Direct Search Simulated Annealing for
Nonlinear Global Optimization of
Rayleigh Waves . . . . . . . . . . . . . 43--50
Ke-Fan Yu and
Ke-Han Zeng Four-Quadrant Division with HNN for
Euclidean TSP . . . . . . . . . . . . . 51--58
Hai-Qin Xu and
Yong-Sheng Ding and
Hao Liu and
Xiao-Li Li An Immune Genetic Algorithm with
Orthogonal Initialization for Analog
Circuit Design . . . . . . . . . . . . . 59--66
Yi-Kui Zhai and
Ying Xu and
Jun-Ying Gan A Novel Artificial Fish Swarm Algorithm
Based on Multi-objective Optimization 67--73
Pawe\l Skrobanek and
Henryk Maciejewski and
Maciej Dobrowolski and
Olgierd Unold and
Ewa Walkowicz Comparison of Data Exploration Methods
and the BLUP Method in Application to
the Animals Breeding . . . . . . . . . . 74--81
Shan-Wen Zhang and
Chuan-Lei Zhang Two-Dimensional Locality Discriminant
Projection for Plant Leaf Classification 82--88
Zhan-Li Sun and
Ting-Ting Sun and
Yang Liu An Eigengene-Based Classifier Committee
Learning Algorithm for Tumor
Classification . . . . . . . . . . . . . 89--94
Vitoantonio Bevilacqua and
Maurizio Triggiani and
Vito Gallo and
Isabella Cafagna An Expert System for an Innovative
Discrimination Tool of Commercial Table
Grapes . . . . . . . . . . . . . . . . . 95--102
Zhaowen Li and
Ninghua Gao Soft Rough Sets and Topologies . . . . . 103--110
Peng Lu and
Chi Liu and
Daoren Yuan and
Yusong Li Sudden-Target Search Algorithm of
Monitor Area Based on Visual Information
Processing Model . . . . . . . . . . . . 111--118
Jie Yu and
Haihong Zhao and
Fangfang Liu User Real-Time Interest Prediction Based
on Collaborative Filtering and
Interactive Computing for Academic
Recommendation . . . . . . . . . . . . . 119--127
Lu Cao and
Yoshinori Kobayashi and
Yoshinori Kuno Spatial-Based Feature for Locating
Objects . . . . . . . . . . . . . . . . 128--137
Jian-Fei Luo and
Bao-Yuan Wu and
Qiu-Shi Lin and
Fei Shen and
Zhong-Cheng Wu A Novel $F$-Pad for Handwriting Force
Information Acquisition . . . . . . . . 138--144
Jia Liu and
Hua Zhou and
Kai-yu Tong Stability of a Predator-Prey Model with
Modified Holling-Type II Functional
Response . . . . . . . . . . . . . . . . 145--150
Qing-Hua Zhou and
Jing Cui and
Juan Xie Using Multiple Objective Functions in
the Dynamic Model of Metabolic Networks
of \em Escherichia coli . . . . . . . . 151--158
Anonymous Front Matter . . . . . . . . . . . . . . ??
Dimitris Achlioptas and
Ricardo Menchaca-Mendez Unsatisfiability Bounds for Random CSPs
from an Energetic Interpolation Method 1--12
Anil Ada and
Arkadev Chattopadhyay and
Omar Fawzi and
Phuong Nguyen The NOF Multiparty Communication
Complexity of Composed Functions . . . . 13--24
Andris Ambainis and
Art\=urs Ba\vckurs and
Kaspars Balodis and
Dmitrijs Krav\vcenko and
Raitis Ozols Quantum Strategies Are Better Than
Classical in Almost Any XOR Game . . . . 25--37
Yossi Azar and
Iftah Gamzu Efficient Submodular Function
Maximization under Linear Packing
Constraints . . . . . . . . . . . . . . 38--50
László Babai and
Paolo Codenotti and
Youming Qiao Polynomial-Time Isomorphism Test for
Groups with No Abelian Normal Subgroups 51--62
Maria Florina Balcan and
Yingyu Liang Clustering under Perturbation Resilience 63--74
Siddharth Barman and
Seeun Umboh and
Shuchi Chawla and
David Malec Secretary Problems with Convex Costs . . 75--87
Joshua Baron and
Rafail Ostrovsky and
Ivan Visconti Nearly Simultaneously Resettable
Black-Box Zero Knowledge . . . . . . . . 88--99
Bruno Bauwens Complexity of Complexity and Maximal
Plain versus Prefix-Free Kolmogorov
Complexity . . . . . . . . . . . . . . . 100--108
Aditya Bhaskara and
Moses Charikar and
Rajsekar Manokaran and
Aravindan Vijayaraghavan On Quadratic Programming with a Ratio
Objective . . . . . . . . . . . . . . . 109--120
Prosenjit Bose and
Sébastien Collette and
Rolf Fagerberg and
Stefan Langerman De-amortizing Binary Search Trees . . . 121--132
Karl Bringmann and
Konstantinos Panagiotou Efficient Sampling Methods for Discrete
Distributions . . . . . . . . . . . . . 133--144
Niv Buchbinder and
Joseph (Seffi) Naor and
R. Ravi and
Mohit Singh Approximation Algorithms for Online
Weighted Rank Function Maximization
under Matroid Constraints . . . . . . . 145--156
Jaroslaw Byrka and
Bartosz Rybicki Improved LP-Rounding Approximation
Algorithm for $k$-level Uncapacitated
Facility Location . . . . . . . . . . . 157--169
Deeparnab Chakrabarty and
Zhiyi Huang Testing Coverage Functions . . . . . . . 170--181
T.-H. Hubert Chan and
Mingfei Li and
Li Ning Sparse Fault-Tolerant Spanners for
Doubling Metrics with Bounded
Hop-Diameter or Degree . . . . . . . . . 182--193
Moses Charikar and
Shi Li A Dependent LP-Rounding Approach for the
$k$-Median Problem . . . . . . . . . . . 194--205
Chandra Chekuri and
Alina Ene and
Ali Vakilian Node-Weighted Network Design in Planar
and Minor-Closed Families of Graphs . . 206--217
Danny Z. Chen and
Haitao Wang Computing the Visibility Polygon of an
Island in a Polygonal Domain . . . . . . 218--229
Rajesh Chitnis and
Marek Cygan and
Mohammadtaghi Hajiaghayi and
Dániel Marx Directed Subset Feedback Vertex Set Is
Fixed-Parameter Tractable . . . . . . . 230--241
Anonymous Front Matter . . . . . . . . . . . . . . ??
Riccardo Colini-Baldeschi and
Monika Henzinger and
Stefano Leonardi and
Martin Starnberger On Multiple Keyword Sponsored Search
Auctions with Budgets . . . . . . . . . 1--12
Gilles Dowek A Theory Independent Curry--De
Bruijn--Howard Correspondence . . . . . 13--15
David Harel Standing on the Shoulders of a Giant . . 16--22
Kohei Honda Session Types and Distributed Computing 23--23
Daniel A. Spielman Algorithms, Graph Theory, and the
Solution of Laplacian Linear Equations 24--26
Berthold Vöcking Randomized Mechanisms for Multi-unit
Auctions . . . . . . . . . . . . . . . . 27--29
Luca Aceto and
Arnaud Carayol and
Zoltán Ésik and
Anna Ingólfsdóttir Algebraic Synchronization Trees and
Processes . . . . . . . . . . . . . . . 30--41
Rajeev Alur and
Loris D'Antoni Streaming Tree Transducers . . . . . . . 42--53
Pablo Arrighi and
Gilles Dowek Causal Graph Dynamics . . . . . . . . . 54--66
Albert Atserias and
Anuj Dawar Degree Lower Bounds of Tower-Type for
Approximating Formulas with Parity
Quantifiers . . . . . . . . . . . . . . 67--78
Michael Benedikt and
Pierre Bourhis and
Pierre Senellart Monadic Datalog Containment . . . . . . 79--91
Miko\laj Boja\'nczyk and
S\lawomir Lasota A Machine-Independent Characterization
of Timed Languages . . . . . . . . . . . 92--103
Miko\laj Boja\'nczyk and
Thomas Place Regular Languages of Infinite Trees That
Are Boolean Combinations of Open Sets 104--115
Miko\laj Boja\'nczyk and
Thomas Place Toward Model Theory with Data Values . . 116--127
Patricia Bouyer and
Nicolas Markey and
Ocan Sankur Robust Reachability in Timed Automata: A
Game-Based Approach . . . . . . . . . . 128--140
Tomá\vs Brázdil and
Antonín Ku\vcera and
Petr Novotný and
Dominik Wojtczak Minimizing Expected Termination Time in
One-Counter Markov Decision Processes 141--152
Christopher Broadbent Prefix Rewriting for Nested-Words and
Collapsible Pushdown Automata . . . . . 153--164
Chris Broadbent and
Arnaud Carayol and
Matthew Hague and
Olivier Serre A Saturation Method for Collapsible
Pushdown Systems . . . . . . . . . . . . 165--176
Volker Diekert and
Manfred Kufleitner and
Klaus Reinhardt and
Tobias Walter Regular Languages Are Church--Rosser
Congruential . . . . . . . . . . . . . . 177--188
John Fearnley and
Sven Schewe Time and Parallelizability Results for
Parity Games with Bounded Treewidth . . 189--200
Anonymous Front Matter . . . . . . . . . . . . . . ??
Robert Demolombe Causality in the Context of Multiple
Agents . . . . . . . . . . . . . . . . . 1--15
Silvano Colombo Tosatto and
Guido Boella Visualizing Normative Systems: An
Abstract Approach . . . . . . . . . . . 16--30
Paolo Turrini Agreements as Norms . . . . . . . . . . 31--45
Guido Governatori and
Antonino Rotolo and
Erica Calardo Possible World Semantics for Defeasible
Deontic Logic . . . . . . . . . . . . . 46--60
Ricardo Gonçalves and
José Júlio Alferes An Embedding of Input-Output Logic in
Deontic Logic Programs . . . . . . . . . 61--75
Louwe B. Kuijer Sanction Semantics and Contrary-to-Duty
Obligations . . . . . . . . . . . . . . 76--90
Dov Gabbay Temporal Deontic Logic for the
Generalised Chisholm Set of Contrary to
Duty Obligations . . . . . . . . . . . . 91--107
Emiliano Lorini On the Logical Foundations of Moral
Agency . . . . . . . . . . . . . . . . . 108--122
Régis Riveret and
Antonino Rotolo and
Giovanni Sartor Norms and Learning in Probabilistic
Logic-Based Agents . . . . . . . . . . . 123--138
Olivier Roy and
Albert J. J. Anglberger and
Norbert Gratzl The Logic of Obligation as Weakest
Permission . . . . . . . . . . . . . . . 139--150
Christian Straßer and
Mathieu Beirlaen An Andersonian Deontic Logic with
Contextualized Sanctions . . . . . . . . 151--169
Andreas Herzig and
Tiago de Lima and
Emiliano Lorini A Computationally Grounded Dynamic Logic
of Agency, with an Application to Legal
Actions . . . . . . . . . . . . . . . . 170--183
Piotr Kulicki and
Robert Trypuz A Deontic Action Logic with Sequential
Composition of Actions . . . . . . . . . 184--198
Jan Broersen and
Dov Gabbay and
Leendert van der Torre Discussion Paper: Changing Norms Is
Changing Obligation Change . . . . . . . 199--214
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . 1--1
Hieu Cuong Nguyen and
Stefan Katzenbeisser Robust Resampling Detection in Digital
Images . . . . . . . . . . . . . . . . . 3--15
Karl Kümmel and
Tobias Scheidat and
Claus Vielhauer and
Jana Dittmann Feature Selection on Handwriting
Biometrics: Security Aspects of
Artificial Forgeries . . . . . . . . . . 16--25
Saloomeh Shariati and
François Koeune and
François-Xavier Standaert Security Analysis of Image-Based PUFs
for Anti-counterfeiting . . . . . . . . 26--38
Mouhamadou L. Diong and
Patrick Bas and
Chloé Pelle and
Wadih Sawaya Document Authentication Using $2$D
Codes: Maximizing the Decoding
Performance Using Statistical Inference 39--54
Patrik Bichsel and
Jan Camenisch and
Bart De Decker and
Jorn Lapon and
Vincent Naessens Data-Minimizing Authentication Goes
Mobile . . . . . . . . . . . . . . . . . 55--71
Zhuo Wei and
Xuhua Ding and
Robert Huijie Deng and
Yongdong Wu No Tradeoff between Confidentiality and
Performance: An Analysis on H.264/SVC
Partial Encryption . . . . . . . . . . . 72--86
Anonymous Front Matter . . . . . . . . . . . . . . 87--87
Andrey Makrushin and
Tobias Kiertscher and
Robert Fischer and
Stefan Gruhn and
Claus Vielhauer Computer-Aided Contact-Less Localization
of Latent Fingerprints in Low-Resolution
CWL Scans . . . . . . . . . . . . . . . 89--98
Graeme Horsman and
Christopher Laing and
Paul Vickers A Method for Reducing the Risk of Errors
in Digital Forensic Investigations . . . 99--106
Tobias Scheidat and
Karl Kümmel and
Claus Vielhauer Short Term Template Aging Effects on
Biometric Dynamic Handwriting
Authentication Performance . . . . . . . 107--116
Roland Schmitz and
Shujun Li and
Christos Grecos and
Xinpeng Zhang A New Approach to Commutative
Watermarking-Encryption . . . . . . . . 117--130
Steffen Wendzel and
Jörg Keller Systematic Engineering of Control
Protocols for Covert Channels . . . . . 131--144
Elke Franz and
Stefan Pfennig and
André Fischer Efficiency of Secure Network Coding
Schemes . . . . . . . . . . . . . . . . 145--159
Amar Siad A New Approach for Private Searches on
Public-Key Encrypted Data . . . . . . . 160--173
M. Maachaoui and
A. Abou El Kalam and
C. Fraboul and
A. Ait Ouahman Multi-level Authentication Based Single
Sign-On for IMS Services . . . . . . . . 174--187
Anonymous Front Matter . . . . . . . . . . . . . . 189--189
Patrick Bas and
Teddy Furon Are 128 Bits Long Keys Possible in
Watermarking? . . . . . . . . . . . . . 191--191
William Perrizo and
Arjun G. Roy Predicate-Tree Based Pretty Good Privacy
of Data . . . . . . . . . . . . . . . . 192--194
Hanno Langweg OOXML File Analysis of the July 22nd
Terrorist Manual . . . . . . . . . . . . 195--197
Milica Milutinovic and
Vincent Naessens and
Bart De Decker Privacy-Preserving Scheduling Mechanism
for eHealth Systems . . . . . . . . . . 198--200
Jürgen Fuß and
Wolfgang Kastl and
Robert Kolmhofer and
Georg Schönberger and
Florian Wex Cuteforce Analyzer: Implementing a
Heterogeneous Bruteforce Cluster with
Specialized Coprocessors . . . . . . . . 201--203
André Zúquete and
Pedro Correia and
Miguel Rocha A Framework for Enforcing User-Based
Authorization Policies on Packet Filter
Firewalls . . . . . . . . . . . . . . . 204--206
Anonymous Front Matter . . . . . . . . . . . . . . ??
Arno Bastenhof Polarized Montagovian Semantics for the
Lambek--Grishin Calculus . . . . . . . . 1--16
Denis Béchet and
Alexander Dikovsky and
Annie Foret Two Models of Learning Iterated
Dependencies . . . . . . . . . . . . . . 17--32
Jeroen Bransen The Lambek--Grishin Calculus Is
NP-Complete . . . . . . . . . . . . . . 33--49
Berthold Crysmann Resumption and Island-Hood in Hausa . . 50--65
Michael Dekhtyar and
Alexander Dikovsky and
Boris Karlov Iterated Dependencies and Kleene
Iteration . . . . . . . . . . . . . . . 66--81
Denys Duchier and
Thi-Bich-Hanh Dao and
Yannick Parmentier and
Willy Lesaint Property Grammar Parsing Seen as a
Constraint Optimization Problem . . . . 82--96
Thomas Graf Reference-Set Constraints as Linear Tree
Transductions via Controlled Optimality
Systems . . . . . . . . . . . . . . . . 97--113
Scott Martin and
Carl Pollard Hyperintensional Dynamic Semantics . . . 114--129
Vedrana Mihali\vcek and
Carl Pollard Distinguishing Phenogrammar from
Tectogrammar Simplifies the Analysis of
Interrogatives . . . . . . . . . . . . . 130--145
Glyn Morrill and
Oriol Valentín Generalized Discontinuity . . . . . . . 146--161
Sylvain Pogodalla and
Florent Pompigne Controlling Extraction in Abstract
Categorial Grammars . . . . . . . . . . 162--177
Byeong-Uk Yi Plural Quantifications and Generalized
Quantifiers . . . . . . . . . . . . . . 178--191
Ryo Yoshinaka and
Alexander Clark Polynomial Time Learning of Some
Multiple Context-Free Languages with a
Minimally Adequate Teacher . . . . . . . 192--207
Thomas Graf Locality and the Complexity of
Minimalist Derivation Tree Languages . . 208--227
Petr Homola Building a Formal Grammar for a
Polysynthetic Language . . . . . . . . . 228--242
András Kornai Eliminating Ditransitives . . . . . . . 243--261
Stepan Kuznetsov Lambek Grammars with the Unit . . . . . 262--266
Hans Leiß Resolving Plural Ambiguities by Type
Reconstruction . . . . . . . . . . . . . 267--286
Scott Martin Weak Familiarity and Anaphoric
Accessibility in Dynamic Semantics . . . 287--306
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Barbara Pernici and
Cinzia Cappiello and
Maria Grazia Fugini and
Pierluigi Plebani Setting Energy Efficiency Goals in Data
Centers: The GAMES Approach . . . . . . 1--12
Sonja Klingert and
Andreas Berl and
Michael Beck and
Radu Serban and
Marco di Girolamo Sustainable Energy Management in Data
Centers through Collaboration . . . . . 13--24
Micha vor dem Berge and
Georges Da Costa and
Andreas Kopecki and
Ariel Oleksiak Modeling and Simulation of Data Center
Energy-Efficiency in CoolEmAll . . . . . 25--36
Wolfgang Ziegler SLAs for Energy-Efficient Data Centres:
The Standards-Based Approach of the
OPTIMIS Project . . . . . . . . . . . . 37--46
Ywes Israel and
Thomas Leitert The GreenIT DC-Benchmarking Tool: From
Scientific Theory to Real Life . . . . . 47--53
Christian Bunse and
Sonja Klingert and
Thomas Schulze GreenSLAs: Supporting Energy-Efficiency
through Contracts . . . . . . . . . . . 54--68
Vlasia Anagnostopoulou and
Susmit Biswas and
Heba Saadeldeen and
Ricardo Bianchini and
Tao Yang Power-Aware Resource Allocation for CPU-
and Memory-Intense Internet Services . . 69--80
Marco Guazzone and
Cosimo Anglano and
Massimo Canonico Exploiting VM Migration for the
Automated Power and Performance
Management of Green Cloud Computing
Systems . . . . . . . . . . . . . . . . 81--92
Drazen Lucanin and
Michael Maurer and
Toni Mastelic and
Ivona Brandic Energy Efficient Service Delivery in
Clouds in Compliance with the Kyoto
Protocol . . . . . . . . . . . . . . . . 93--104
Mikko Pervilä and
Mikko Rantanen and
Jussi Kangasharju Implementation and Evaluation of a Wired
Data Center Sensor Network . . . . . . . 105--116
Edward Curry and
Souleiman Hasan and
Mark White and
Hugh Melvin An Environmental Chargeback for Data
Center and Cloud Computing Consumers . . 117--128
Dang Minh Quan and
Andrey Somov and
Corentin Dupont Energy Usage and Carbon Emission
Optimization Mechanism for Federated
Data Centers . . . . . . . . . . . . . . 129--140
Ghislain Landry Tsafack Chetsa and
Laurent Lefevre and
Jean-Marc Pierson and
Patricia Stolf DNA-Inspired Scheme for Building the
Energy Profile of HPC Systems . . . . . 141--152
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Hyoungshick Kim and
John Tang and
Ross Anderson Social Authentication: Harder Than It
Looks . . . . . . . . . . . . . . . . . 1--15
Sonia Chiasson and
Chris Deschamps The MVP Web-Based Authentication
Framework . . . . . . . . . . . . . . . 16--24
Joseph Bonneau and
Sören Preibusch and
Ross Anderson A Birthday Present Every Eleven Wallets?
The Security of Customer-Chosen Banking
PINs . . . . . . . . . . . . . . . . . . 25--40
Tyler Moore and
Jie Han and
Richard Clayton The Postmodern Ponzi Scheme: Empirical
Analysis of High-Yield Investment
Programs . . . . . . . . . . . . . . . . 41--56
Dan Bogdanov and
Riivo Talviste and
Jan Willemson Deploying Secure Multi-Party Computation
for Financial Data Analysis . . . . . . 57--64
Christopher Thorpe and
Steven R. Willis Cryptographic Rule-Based Trading . . . . 65--72
Zi Lin and
Denis Foo Kune and
Nicholas Hopper Efficient Private Proximity Testing with
GSM Location Sketches . . . . . . . . . 73--88
Benjamin Johnson and
John Chuang and
Jens Grossklags Metrics for Measuring ISP Badness: The
Case of Spam . . . . . . . . . . . . . . 89--97
Tao Wang and
Kevin Bauer and
Clara Forero Congestion-Aware Path Selection for Tor 98--113
Scott Wolchok and
Eric Wustrow and
Dawn Isabel Attacking the Washington, D.C. Internet
Voting System . . . . . . . . . . . . . 114--128
Rainer Böhme Security Audits Revisited . . . . . . . 129--147
Attila A. Yavuz and
Peng Ning and
Michael K. Reiter Efficient, Compromise Resilient and
Append-Only Cryptographic Schemes for
Secure Audit Logging . . . . . . . . . . 148--163
Morten Dahl and
Chao Ning and
Tomas Toft On Secure Two-Party Integer Division . . 164--178
Rafik Chaabouni and
Helger Lipmaa and
Bingsheng Zhang A Non-interactive Range Proof with
Constant Communication . . . . . . . . . 179--199
T.-H. Hubert Chan and
Elaine Shi and
Dawn Song Privacy-Preserving Stream Aggregation
with Fault Tolerance . . . . . . . . . . 200--214
Daniel Slamanig Dynamic Accumulator Based Discretionary
Access Control for Outsourced Storage
with Unlinkable Access . . . . . . . . . 215--222
Mariana Raykova and
Hang Zhao and
Steven M. Bellovin Privacy Enhanced Access Control for
Outsourced Data Sharing . . . . . . . . 223--238
Andres Molina-Markham and
George Danezis and
Kevin Fu Designing Privacy-Preserving Smart
Meters with Low-Cost Microcontrollers 239--253
Benjamin Mood and
Lara Letaw and
Kevin Butler Memory-Efficient Garbled Circuit
Generation for Mobile Devices . . . . . 254--268
Payman Mohassel and
Salman Niksefat Oblivious Decision Programs from
Oblivious Transfer: Efficient Reductions 269--284
Anonymous Front Matter . . . . . . . . . . . . . . ??
Joseph Bonneau and
Ekaterina Shutova Linguistic Properties of Multi-word
Passphrases . . . . . . . . . . . . . . 1--12
Marcelo Carlos and
Geraint Price Understanding the Weaknesses of
Human-Protocol Interaction . . . . . . . 13--26
Alexei Czeskis and
Jacob Appelbaum High Stakes: Designing a Privacy
Preserving Registry . . . . . . . . . . 27--43
Alexei Czeskis and
Dirk Balfanz Protected Login . . . . . . . . . . . . 44--52
Zheng Dong Enabling Users to Self-manage Networks:
Collaborative Anomaly Detection in
Wireless Personal Area Networks . . . . 53--67
Patrick Gage Kelley and
Sunny Consolvo and
Lorrie Faith Cranor and
Jaeyeon Jung and
Norman Sadeh A Conundrum of Permissions: Installing
Applications on an Android Smartphone 68--79
Fanny Lalonde Lévesque and
Carlton R. Davis and
José M. Fernandez and
Sonia Chiasson Methodology for a Field Study of
Anti-malware Software . . . . . . . . . 80--85
Sameer Patil and
Yann Le Gall and
Adam J. Lee and
Apu Kapadia My Privacy Policy: Exploring End-user
Specification of Free-form Location
Access Rules . . . . . . . . . . . . . . 86--97
Andrew G. West and
Pedram Hayati and
Vidyasagar Potdar and
Insup Lee Spamming for Science: Active Measurement
in Web 2.0 Abuse Research . . . . . . . 98--111
Michael Bailey and
Erin Kenneally and
David Dittrich A Refined Ethical Impact Assessment Tool
and a Case Study of Its Application . . 112--123
Serge Egelman and
Joseph Bonneau and
Sonia Chiasson and
David Dittrich and
Stuart Schechter It's Not Stealing If You Need It: a
Panel on the Ethics of Performing
Research Using Public Data of Illicit
Origin . . . . . . . . . . . . . . . . . 124--132
Ross Anderson Ethics Committees and IRBs: Boon, or
Bane, or More Research Needed? . . . . . 133--135
José M. Fernandez and
Andrew S. Patrick and
Lenore D. Zuck Ethical and Secure Data Sharing across
Borders . . . . . . . . . . . . . . . . 136--140
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Samson Abramsky and
Jonathan Zvesper From Lawvere to Brandenburger-Keisler:
Interactive Forms of Diagonalization and
Self-reference . . . . . . . . . . . . . 1--19
Marcello M. Bonsangue and
Jan Rutten and
Joost Winter Defining Context-Free Power Series
Coalgebraically . . . . . . . . . . . . 20--39
Pawe\l Soboci\'nski Relational Presheaves as Labelled
Transition Systems . . . . . . . . . . . 40--50
Ji\vrí Adámek and
Stefan Milius and
Lawrence S. Moss On Finitary Functors and Their
Presentations . . . . . . . . . . . . . 51--70
Giorgio Bacci and
Marino Miculan Structural Operational Semantics for
Continuous State Probabilistic Processes 71--89
Vincenzo Ciancia and
Yde Venema Stream Automata Are Coalgebras . . . . . 90--108
Bart Jacobs and
Alexandra Silva and
Ana Sokolova Trace Semantics via Determinization . . 109--129
Alexander Kurz and
Daniela Petri\csan and
Paula Severi An Alpha-Corecursion Principle for the
Infinitary Lambda Calculus . . . . . . . 130--149
Johannes Marti and
Yde Venema Lax Extensions of Coalgebra Functors . . 150--169
Eleftherios Matsikoudis and
Edward A. Lee From Transitions to Executions . . . . . 170--190
Dusko Pavlovic Tracing the Man in the Middle in
Monoidal Categories . . . . . . . . . . 191--217
Celia Picard and
Ralph Matthes Permutations in Coinductive Graph
Representation . . . . . . . . . . . . . 218--237
Toby Wilkinson Internal Models for Coalgebraic Modal
Logics . . . . . . . . . . . . . . . . . 238--258
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??