Last update:
Sat Oct 14 16:23:45 MDT 2017
Josep Carmona The Label Splitting Problem . . . . . . 1--23
Philippe Darondeau and
Laurie Ricker Distributed Control of Discrete-Event
Systems: a First Step . . . . . . . . . 24--45
Lom-Messan Hillah and
Fabrice Kordon and
Charles Lakos and
Laure Petrucci Extending pnml Scope: a Framework to
Combine Petri Nets Types . . . . . . . . 46--70
Ekkart Kindler Modelling Local and Global Behaviour:
Petri Nets and Event Coordination . . . 71--93
Ala-Eddine Ben Salem and
Alexandre Duret-Lutz and
Fabrice Kordon Model Checking Using Generalized Testing
Automata . . . . . . . . . . . . . . . . 94--122
Nicolas Sedlmajer and
Didier Buchs and
Steve Hostettler and
Alban Linard and
Edmundo López Bóbeda A Domain Specific Language Approach for
Genetic Regulatory Mechanisms Analysis 123--145
Michael Westergaard Verifying Parallel Algorithms and
Programs Using Coloured Petri Nets . . . 146--168
Fabrice Kordon and
Alban Linard and
Didier Buchs and
Maximilien Colange and
Sami Evangelista Report on the Model Checking Contest at
Petri Nets 2011 . . . . . . . . . . . . 169--196
Christine Choppy and
Anna Dedova and
Sami Evangelista and
Ka\"\is Kla\"\i and
Laure Petrucci Modelling and Formal Verification of the
NEO Protocol . . . . . . . . . . . . . . 197--225
Sonya Arnold and
Jonathan Billington An Initial Coloured Petri Net Model of
the Hypertext Transfer Protocol
Operating over the Transmission Control
Protocol . . . . . . . . . . . . . . . . 226--250
Suriadi Suriadi and
Chun Ouyang and
Ernest Foo Privacy Compliance Verification in
Cryptographic Protocols . . . . . . . . 251--276
Dario Bruneo and
Francesco Longo and
Antonio Puliafito Modeling Energy-Aware Cloud Federations
with SRNs . . . . . . . . . . . . . . . 277--307
Stefano Marrone and
Nicola Mazzocca and
Roberto Nardone and
Roberta Presta and
Simon Pietro Romano A SAN-Based Modeling Approach to
Performance Evaluation of an
IMS-Compliant Conferencing Framework . . 308--333
Boudewijn F. van Dongen and
Jörg Desel and
Wil M. P. van der Aalst Aggregating Causal Runs into Workflow
Nets . . . . . . . . . . . . . . . . . . 334--363
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Michalis Mavrovouniotis and
Shengxiang Yang An Immigrants Scheme Based on
Environmental Information for Ant Colony
Optimization for the Dynamic Travelling
Salesman Problem . . . . . . . . . . . . 1--12
Alan Díaz-Manríquez and
Gregorio Toscano-Pulido and
Ricardo Landa-Becerra A Surrogate-Based Intelligent Variation
Operator for Multiobjective Optimization 13--24
Viviane Grunert da Fonseca and
Carlos M. Fonseca The Relationship between the Covered
Fraction, Completeness and Hypervolume
Indicators . . . . . . . . . . . . . . . 25--36
Marc Schoenauer and
Fabien Teytaud and
Olivier Teytaud A Rigorous Runtime Analysis for
Quasi-Random Restarts and Decreasing
Stepsize . . . . . . . . . . . . . . . . 37--48
Sébastien Vérel and
Fabio Daolio and
Gabriela Ochoa and
Marco Tomassini Local Optima Networks with Escape Edges 49--60
Evelyne Lutton and
Julie Foucquier and
Nathalie Perrot and
Jean Louchet and
Jean-Daniel Fekete Visual Analysis of Population
Scatterplots . . . . . . . . . . . . . . 61--72
Robert-Jan Huijsman and
Evert Haasdijk and
A. E. Eiben An On-Line On-Board Distributed
Algorithm for Evolutionary Robotics . . 73--84
Do\ugan Aydìn and
Tianjun Liao and
Marco A. Montes de Oca and
Thomas Stützle Improving Performance via Population
Growth and Local Search: The Case of the
Artificial Bee Colony Algorithm . . . . 85--96
Ogier Maitre and
Nicolas Lachiche and
Pierre Collet Two Ports of a Full Evolutionary
Algorithm onto GPGPU . . . . . . . . . . 97--108
Denis Robilliard and
Cyril Fonlupt and
Virginie Marion-Poty and
Amine Boumaza A Multilevel Tabu Search with
Backtracking for Exploring Weak Schur
Numbers . . . . . . . . . . . . . . . . 109--119
Eduardo Rodriguez-Tello and
Luis Carlos Betancourt An Improved Memetic Algorithm for the
Antibandwidth Problem . . . . . . . . . 121--132
Vincent van der Goes Adaptive Play in a Pollution Bargaining
Game . . . . . . . . . . . . . . . . . . 133--144
Mátyás Brendel and
Marc Schoenauer Learn-and-Optimize: a Parameter Tuning
Framework for Evolutionary AI Planning 145--155
Ivanoe De Falco and
Antonio Della Cioppa and
Domenico Maisto and
Umberto Scafuri A Model Based on Biological Invasions
for Island Evolutionary Algorithms . . . 157--168
Jorge Sebastian Hernández-Domínguez and
Gregorio Toscano-Pulido and
Carlos A. Coello Coello A Multi-objective Particle Swarm
Optimizer Enhanced with a Differential
Evolution Scheme . . . . . . . . . . . . 169--180
Benjamin Inden and
Yaochu Jin and
Robert Haschke and
Helge Ritter Evolution of Multisensory Integration in
Large Neural Fields . . . . . . . . . . 181--192
Amine Boumaza Reducing the Learning Time of Tetris in
Evolution Strategies . . . . . . . . . . 193--204
Benjamin Doerr and
Carola Winzen Black-Box Complexity: Breaking the $O(n
\log n)$ Barrier of \sc LeadingOnes . . 205--216
Robin Roche and
Lhassane Idoumghar and
Benjamin Blunier and
Abdellatif Miraoui Imperialist Competitive Algorithm for
Dynamic Optimization of Economic
Dispatch in Power Systems . . . . . . . 217--228
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Jing (Selena) He and
Shouling Ji and
Yi Pan Load-Balanced Virtual Backbone
Construction for Wireless Sensor
Networks . . . . . . . . . . . . . . . . 1--12
Adrian Kosowski and
Alfredo Navarra Maximum Matching in Multi-Interface
Networks . . . . . . . . . . . . . . . . 13--24
Evangelos Kranakis and
Fraser MacQuarrie Stretch Factor in Wireless Sensor
Networks with Directional Antennae . . . 25--36
Wei Ding and
Guoliang Xue On the Minimum Diameter Cost-Constrained
Steiner Tree Problem . . . . . . . . . . 37--48
Eddie Cheng and
Ke Qiu and
Zhizhang Shen The Edge-Centered Surface Area of the
Arrangement Graph . . . . . . . . . . . 49--60
Eunjeong Yi On Zero Forcing Number of Permutation
Graphs . . . . . . . . . . . . . . . . . 61--72
Basile Couetoux and
Jérome Monnot Complexity Results for the Empire
Problem in Collection of Stars . . . . . 73--82
Sudip Biswas and
Stephane Durocher Hamiltonian Paths and Cycles in Planar
Graphs . . . . . . . . . . . . . . . . . 83--94
Chaoyi Wang and
Tian Liu and
Wei Jiang and
Ke Xu Feedback Vertex Sets on Tree Convex
Bipartite Graphs . . . . . . . . . . . . 95--102
Karin Arikushi and
Csaba D. Tóth Crossing Angles of Geometric Graphs . . 103--114
Martin Lackner and
Reinhard Pichler Multicut on Graphs of Bounded
Clique-Width . . . . . . . . . . . . . . 115--126
Chihao Zhang and
Haitao Jiang and
Binhai Zhu Radiation Hybrid Map Construction
Problem Parameterized . . . . . . . . . 127--137
Yongding Zhu and
Jinhui Xu On the Central Path Problem . . . . . . 138--150
Hong Liu and
Peng Zhang On the Generalized Multiway Cut in Trees
Problem . . . . . . . . . . . . . . . . 151--162
Zhewei Liang and
Kaizhong Zhang Algorithms for Forest Local Similarity 163--175
Yelena Frid and
Dan Gusfield Speedup of RNA Pseudoknotted Secondary
Structure Recurrence Computation with
the Four-Russians Method . . . . . . . . 176--187
Zhi-Zhong Chen and
Lusheng Wang An Improved Approximation Algorithm for
the Bandpass-2 Problem . . . . . . . . . 188--199
Mourad El Ouali and
Gerold Jäger The $b$-Matching Problem in Hypergraphs:
Hardness and Approximability . . . . . . 200--211
Qiang Zhang and
Weiwei Wu and
Minming Li Resource Scheduling with Supply
Constraint and Linear Cost . . . . . . . 212--222
Iyad A. Kanj and
Ge Xia On Certain Geometric Properties of the
Yao--Yao Graphs . . . . . . . . . . . . 223--233
Anonymous Front Matter . . . . . . . . . . . . . . ??
Santosh S. Vempala Effective Principal Component Analysis 1--7
Pavel Zezula Future Trends in Similarity Searching 8--24
Juan Manuel Barrios and
Benjamin Bustos and
Tomá\vs Skopal Snake Table: a Dynamic Pivot Table for
Streams of $k$-NN Searches . . . . . . . 25--39
Tomá\vs Skopal and
Tomá\vs Barto\vs Algorithmic Exploration of Axiom Spaces
for Efficient Similarity Search at Large
Scale . . . . . . . . . . . . . . . . . 40--53
Eric Sadit Tellez and
Edgar Chavez and
Karina Figueroa Polyphasic Metric Index: Reaching the
Practical Limits of Proximity Searching 54--69
Luis G. Ares and
Nieves R. Brisaboa and
Alberto Ordóñez Pereira and
Oscar Pedreira Efficient Similarity Search in Metric
Spaces with Cluster Reduction . . . . . 70--84
Jakub Loko\vc and
P\vremysl \vCech and
Ji\vrí Novák and
Tomá\vs Skopal Cut-Region: a Compact Building Block for
Hierarchical Metric Indexing . . . . . . 85--100
Bilegsaikhan Naidan and
Magnus Lie Hetland Static-to-Dynamic Transformation for
Metric Indexing Structures . . . . . . . 101--115
Luis Britos and
A. Marcela Printista and
Nora Reyes DSACL+-tree: a Dynamic Data Structure
for Similarity Search in Secondary
Memory . . . . . . . . . . . . . . . . . 116--131
Yury Malkov and
Alexander Ponomarenko and
Andrey Logvinov and
Vladimir Krylov Scalable Distributed Algorithm for
Approximate Nearest Neighbor Search
Problem in High Dimensional General
Metric Spaces . . . . . . . . . . . . . 132--147
Hisham Mohamed and
Stéphane Marchand-Maillet Parallel Approaches to Permutation-Based
Indexing Using Inverted Files . . . . . 148--161
Leonid Boytsov Super-Linear Indices for Approximate
Dictionary Searching . . . . . . . . . . 162--176
Jakub Loko\vc and
David Novák and
Michal Batko and
Tomá\vs Skopal Visual Image Search: Feature Signatures
or/and Global Descriptors . . . . . . . 177--191
Tomá\vs Barto\vs and
Tomá\vs Skopal Revisiting Techniques for Lowerbounding
the Dynamic Time Warping Distance . . . 192--208
Richard Connor and
Robert Moss A Multivariate Correlation Distance for
Vector Spaces . . . . . . . . . . . . . 209--225
Michael E. Houle and
Hisashi Kashima and
Michael Nett Fast Similarity Computation in
Factorized Tensors . . . . . . . . . . . 226--239
Jakub Loko\vc and
Tomá\vs Gro\vsup and
Tomá\vs Skopal SIR: The Smart Image Retrieval Engine 240--241
Ji\vrí Novák and
Jakub Galgonek and
David Hoksza and
Tomá\vs Skopal SimTandem: Similarity Search in Tandem
Mass Spectra . . . . . . . . . . . . . . 242--243
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Hisham Mohamed and
Stéphane Marchand-Maillet Erratum: Parallel Approaches to
Permutation-Based Indexing Using
Inverted Files . . . . . . . . . . . . . E1--E2
Jian Li and
Luoyi Fu and
Xinbing Wang Throughput and Delay with Network Coding
in Hybrid Mobile Ad Hoc Networks: a
Global Perspective . . . . . . . . . . . 1--19
Shengling Wang and
Min Liu and
Xiuzhen Cheng HERO --- a Home Based Routing in Pocket
Switched Networks . . . . . . . . . . . 20--30
Wei Cheng and
Dengyuan Wu and
Xiuzhen Cheng Routing for Information Leakage
Reduction in Multi-channel Multi-hop
Ad-Hoc Social Networks . . . . . . . . . 31--42
Chunyang Wu and
Fan Wu and
Guihai Chen AMPLE: a Novel Incentive Approach to
Adaptive-Width Channel Allocation in
Multi-hop, Non-cooperative Wireless
Networks . . . . . . . . . . . . . . . . 43--59
Kuai Xu and
Feng Wang and
Lin Gu and
Jianhua Gao Characterizing Home Network Traffic: An
Inside View . . . . . . . . . . . . . . 60--71
Zuying Wei and
Tianrong Zhang and
Fan Wu SHIELD: a Strategy-Proof and Highly
Efficient Channel Auction Mechanism for
Multi-radio Wireless Networks . . . . . 72--87
Nam Tuan Nguyen and
Yichuan Wang and
Xin Liu A Nonparametric Bayesian Approach for
Opportunistic Data Transfer in Cellular
Networks . . . . . . . . . . . . . . . . 88--99
Yangfan Zhou and
Xinyu Chen and
Michael R. Lyu Online Protocol Verification in Wireless
Sensor Networks via Non-intrusive
Behavior Profiling . . . . . . . . . . . 100--111
Na Xia and
Ruji Feng and
Lina Xu SPSA Based Packet Size Optimization
Algorithm in Wireless Sensor Networks 112--119
Xianwei Sun and
Scott C.-H. Huang and
Minming Li Lower Bounds on Data Collection Time in
Sensor Networks . . . . . . . . . . . . 120--131
Deying Li and
Donghyun Kim and
Qinghua Zhu Minimum Total Communication Power
Connected Dominating Set in Wireless
Networks . . . . . . . . . . . . . . . . 132--141
Jingsong Lv and
Victor C. S. Lee and
Minming Li Supporting Multi-level Quality of
Services in Data Broadcast Systems . . . 142--153
Fatme El-Moukaddem and
Eric Torng Maximizing Network Topology Lifetime
Using Mobile Node Rotation . . . . . . . 154--165
Feng Zhao and
Bin Li and
Hongbin Chen Joint Beamforming and Power Allocation
Algorithm for Cognitive MIMO Systems via
Game Theory . . . . . . . . . . . . . . 166--177
Xiaorong Xu and
Aiping Huang and
Jianwu Zhang Bit Allocation Scheme with Primary Base
Station Cooperation in Cognitive Radio
Network . . . . . . . . . . . . . . . . 178--186
Manish Wadhwa and
Chunsheng Xin and
Min Song Optimal Spectrum Sharing for
Contention-Based Cognitive Radio
Wireless Networks . . . . . . . . . . . 187--196
Xiaohua Xu and
Jiannong Cao and
Peng-Jun Wan Fast Group Communication Scheduling in
Duty-Cycled Multihop Wireless Sensor
Networks . . . . . . . . . . . . . . . . 197--205
Mai Abdelhakim and
Jian Ren and
Tongtong Li Reliable Cooperative Sensing in
Cognitive Networks . . . . . . . . . . . 206--217
Xuanyu Cao and
Jinbei Zhang and
Guanglin Zhang Heterogeneous Multicast Networks with
Wireless Helping Networks . . . . . . . 218--234
Adam C. Champion and
Xinfeng Li and
Qiang Zhai Enclave: Promoting Unobtrusive and
Secure Mobile Communications with a
Ubiquitous Electronic World . . . . . . 235--247
Anonymous Front Matter . . . . . . . . . . . . . . ??
Lawrence C. Paulson MetiTarski: Past and Future . . . . . . 1--10
Gilles Barthe and
Juan Manuel Crespo and
Benjamin Grégoire and
César Kunz Computer-Aided Cryptographic Proofs . . 11--27
André Platzer A Differential Operator Approach to
Equational Differential Invariants . . . 28--48
Andrew Gacek Abella: a Tutorial . . . . . . . . . . . 49--50
Ruben Gamboa and
John Cowles A Cantor Trio: Denumerability, the
Reals, and the Real Algebraic Numbers 51--66
Cyril Cohen Construction of Real Algebraic Numbers
in Coq . . . . . . . . . . . . . . . . . 67--82
Maxime Dén\`es and
Anders Mörtberg and
Vincent Siles A Refinement-Based Approach to
Computational Algebra in Coq . . . . . . 83--98
David Greenaway and
June Andronick and
Gerwin Klein Bridging the Gap: Automatic Verified
Abstraction of C . . . . . . . . . . . . 99--115
Tobias Nipkow Abstract Interpretation of Annotated
Commands . . . . . . . . . . . . . . . . 116--132
Patrick Michel and
Arnd Poetzsch-Heffter Verifying and Generating WP Transformers
for Procedures on Complex Data . . . . . 133--148
Nils Anders Danielsson Bag Equivalence via a Proof-Relevant
Membership Relation . . . . . . . . . . 149--165
Peter Lammich and
Thomas Tuerk Applying Data Refinement for Monadic
Programs to Hopcroft's Algorithm . . . . 166--182
Marino Miculan and
Marco Paviotti Synthesis of Distributed Mobile Programs
Using Monadic Types in Coq . . . . . . . 183--200
David Baelde and
Pierre Courtieu and
David Gross-Amblard and
Christine Paulin-Mohring Towards Provably Robust Watermarking . . 201--216
Xingyuan Zhang and
Christian Urban and
Chunhan Wu Priority Inheritance Protocol Proved
Correct . . . . . . . . . . . . . . . . 217--232
Reynald Affeldt and
Manabu Hagiwara Formalization of Shannon's Theorems in
SSReflect--Coq . . . . . . . . . . . . . 233--249
Dimitrios Vytiniotis and
Thierry Coquand and
David Wahlstedt Stop When You Are Almost-Full . . . . . 250--265
Christian Sternagel and
René Thiemann Certification of Nontermination Proofs 266--282
Andrea Asperti A Compact Proof of Decidability for
Regular Expression Equivalence . . . . . 283--298
William Mansky and
Elsa L. Gunter Using Locales to Define a Rely-Guarantee
Temporal Logic . . . . . . . . . . . . . 299--314
Anonymous Front Matter . . . . . . . . . . . . . . ??
Per Austrin and
Ryan O'Donnell and
John Wright A New Point of NP-Hardness for 2-to-1
Label Cover . . . . . . . . . . . . . . 1--12
Per Austrin and
Toniann Pitassi and
Yu Wu Inapproximability of Treewidth, One-Shot
Pebbling, and Related Layout Problems 13--24
Pranjal Awasthi and
Avrim Blum and
Jamie Morgenstern and
Or Sheffet Additive Approximation for Near-Perfect
Phylogeny Construction . . . . . . . . . 25--36
Pranjal Awasthi and
Or Sheffet Improved Spectral-Norm Bounds for
Clustering . . . . . . . . . . . . . . . 37--49
Piotr Berman and
Grigory Yaroslavtsev Primal-Dual Approximation Algorithms for
Node-Weighted Network Design in Planar
Graphs . . . . . . . . . . . . . . . . . 50--60
Petros Boufounos and
Volkan Cevher and
Anna C. Gilbert and
Yi Li and
Martin J. Strauss What's the Frequency, Kenneth?:
Sublinear Fourier Sampling Off the Grid 61--72
Parinya Chalermsook and
Julia Chuzhoy and
Sampath Kannan and
Sanjeev Khanna Improved Hardness Results for Profit
Maximization Pricing Problems with
Unlimited Supply . . . . . . . . . . . . 73--84
Ho-Leung Chan and
Tak-Wah Lam and
Rongbin Li Online Flow Time Scheduling in the
Presence of Preemption Overhead . . . . 85--97
Chandra Chekuri and
Alina Ene and
Ali Vakilian Prize-Collecting Survivable Network
Design in Node-Weighted Graphs . . . . . 98--109
Joseph Cheriyan and
Zachary Friggstad and
Zhihan Gao Approximating Minimum-Cost Connected
T-Joins . . . . . . . . . . . . . . . . 110--121
Michael Dinitz and
Gordon Wilfong iBGP and Constrained Connectivity . . . 122--133
Leah Epstein and
\Lukasz Je\.z and
Ji\vrí Sgall and
Rob van Stee Online Scheduling of Jobs with Fixed
Start Times on Related Machines . . . . 134--145
Cristina G. Fernandes and
Luís A. A. Meira and
Flávio K. Miyazawa and
Lehilton L. C. Pedrosa A Systematic Approach to Bound Factor
Revealing LPs and Its Application to the
Metric and Squared Metric Facility
Location Problems . . . . . . . . . . . 146--157
Venkatesan Guruswami and
Yuan Zhou Approximating Bounded Occurrence
Ordering CSPs . . . . . . . . . . . . . 158--169
Johan Håstad On the NP-Hardness of Max-Not-2 . . . . 170--181
Ishay Haviv The Remote Set Problem on Lattices . . . 182--193
Matthias Hellwig and
Alexander Souza Approximation Algorithms for Generalized
and Variable-Sized Bin Covering . . . . 194--205
Satoru Iwata and
Prasad Tetali and
Pushkar Tripathi Approximating Minimum Linear Ordering
Problems . . . . . . . . . . . . . . . . 206--217
Samir Khuller and
Barna Saha and
Kanthi K. Sarpatwar New Approximation Results for Resource
Replication Problems . . . . . . . . . . 218--230
Christian Konrad and
Frédéric Magniez and
Claire Mathieu Maximum Matching in Semi-streaming with
Few Passes . . . . . . . . . . . . . . . 231--242
Anonymous Front Matter . . . . . . . . . . . . . . ??
Luís Felipe I. Cunha and
Luis Antonio B. Kowada Transposition Diameter and Lonely
Permutations . . . . . . . . . . . . . . 1--12
Pedro Feijao and
Joao Meidanis Extending the Algebraic Formalism for
Genome Rearrangements to Include Linear
Chromosomes . . . . . . . . . . . . . . 13--24
Gustavo Rodrigues Galvão and
Zanoni Dias On the Approximation Ratio of Algorithms
for Sorting by Transpositions without
Using Cycle Graphs . . . . . . . . . . . 25--36
A. A. Matroud and
C. P. Tuffley and
D. Bryant A Comparison of Three Heuristic Methods
for Solving the Parsing Problem for
Tandem Repeats . . . . . . . . . . . . . 37--48
Ronny Lorenz and
Stephan H. Bernhart RNA Folding Algorithms with
G-Quadruplexes . . . . . . . . . . . . . 49--60
César Manuel Vargas Benítez Molecular Dynamics for Simulating the
Protein Folding Process Using the $3$D
AB Off-Lattice Model . . . . . . . . . . 61--72
Halian Vilela and
Tainá Raiol A Bioconductor Based Workflow for Z-DNA
Region Detection and Biological
Inference . . . . . . . . . . . . . . . 73--83
Fernando A. F. Braz and
Jader S. Cruz A Probabilistic Model Checking Approach
to Investigate the Palytoxin Effects on
the Na$^+$ /K$^+$-ATPase . . . . . . . . 84--96
Mariana R. Mendoza and
Guilherme C. da Fonseca RFMirTarget: a Random Forest Classifier
for Human miRNA Target Gene Prediction 97--108
Eduardo G. Gusmão and
Christoph Dieterich Prediction of Transcription Factor
Binding Sites by Integrating DNase
Digestion and Histone Modification . . . 109--119
Pablo A. Jaskowiak Evaluating Correlation Coefficients for
Clustering Gene Expression Profiles of
Cancer . . . . . . . . . . . . . . . . . 120--131
Rogério S. Rosa and
Rafael H. S. Santos Associating Genotype Sequence Properties
to Haplotype Inference Errors . . . . . 132--143
Sérgio Lifschitz and
Carlos Juliano M. Viana Design and Implementation of
ProteinWorldDB . . . . . . . . . . . . . 144--155
Ana T. Winck and
Christian V. Quevedo A Comparative Analysis of Public Ligand
Databases Based on Molecular Descriptors 156--167
Wellington S. Martins and
Thiago F. Rangel Phylogenetic Distance Computation Using
CUDA . . . . . . . . . . . . . . . . . . 168--178
Kary A. C. S. Ocaña and
Daniel de Oliveira Exploring Molecular Evolution
Reconstruction Using a Parallel Cloud
Based Scientific Workflow . . . . . . . 179--191
José Fernando Garcia How Bioinformatics Enables Livestock
Applied Sciences in the Genomic Era . . 192--201
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Andrew L. Szilard The Kind Hearted Dragon Prof. Sheng Yu,
1950--2012 . . . . . . . . . . . . . . . 1--6
Erzsébet Csuhaj-Varjú P and dP Automata: Unconventional versus
Classical Automata . . . . . . . . . . . 7--22
Kazuo Iwama Recovering Strings in Oracles: Quantum
and Classic . . . . . . . . . . . . . . 23--23
Juraj Hromkovi\vc and
Rastislav Královi\vc and
Richard Královi\vc and
Richard \vStefanec Determinism vs. Nondeterminism for
Two-Way Automata . . . . . . . . . . . . 24--39
Jarkko Kari Cellular Automata, the Collatz
Conjecture and Powers of $3/2$ . . . . . 40--49
Janusz Brzozowski and
Hellis Tamm Quotient Complexities of Atoms of
Regular Languages . . . . . . . . . . . 50--61
Marie-Pierre Béal and
Jean-Marc Champarnaud and
Jean-Philippe Dubernard and
Hadrien Jeanne Decidability of Geometricity of Regular
Languages . . . . . . . . . . . . . . . 62--72
Markus L. Schmid Inside the Class of REGEX Languages . . 73--84
Yo-Sub Han and
Sang-Ki Ko and
Kai Salomaa Computing the Edit-Distance between a
Regular Language and a Context-Free
Language . . . . . . . . . . . . . . . . 85--96
Michael Hoffmann and
Derek F. Holt and
Matthew D. Owens and
Richard M. Thomas Semigroups with a Context-Free Word
Problem . . . . . . . . . . . . . . . . 97--108
Markus Holzer and
Sebastian Jakobi and
Ian McQuillan Generalized Derivations with
Synchronized Context-Free Grammars . . . 109--120
Alexander Okhotin Non-erasing Variants of the
Chomsky--Schützenberger Theorem . . . . . 121--129
Daniel Reidenbach and
Markus L. Schmid Regular and Context-Free Pattern
Languages over Small Alphabets . . . . . 130--141
Zoltan Ésik and
Satoshi Okawa On Context-Free Languages of Scattered
Words . . . . . . . . . . . . . . . . . 142--153
Tommi Lehtinen and
Alexander Okhotin Homomorphisms Preserving Deterministic
Context-Free Languages . . . . . . . . . 154--165
Viliam Geffert and
Dana Pardubská Unary Coded NP-Complete Languages in
ASPACE$(\log \log n)$ . . . . . . . . . 166--177
Andreas Krebs and
Klaus-Jörn Lange Dense Completeness . . . . . . . . . . . 178--189
Markus Holzer and
Sebastian Jakobi From Equivalence to Almost-Equivalence,
and Beyond--- Minimizing Automata with
Errors . . . . . . . . . . . . . . . . . 190--201
Christos A. Kapoutsis and
Nans Lefebvre Analogs of Fagin's Theorem for Small
Nondeterministic Finite Automata . . . . 202--213
Martin Kutrib and
Andreas Malcher and
Matthias Wendlandt States and Heads Do Count for Unary
Multi-head Finite Automata . . . . . . . 214--225
Anonymous Front Matter . . . . . . . . . . . . . . ??
Norah Jones and
Esyin Chew Social Software for Learning --- The
Institutional Policy of the University
of Glamorgan . . . . . . . . . . . . . . 1--8
Ronghuai Huang and
Haisen Zhang and
Yushun Li and
Junfeng Yang A Framework of Designing Learning
Activities for Mobile Learning . . . . . 9--22
Uro\vs Kr\vcadinac and
Jelena Jovanovi\'c and
Vladan Deved\vzi\'c Visualizing the Affective Structure of
Students Interaction . . . . . . . . . . 23--34
Nga-Sin Lau and
Lui Lam An Investigation of the Determinants
Influencing Student Learning Motivation
via Facebook Private Group in Teaching
and Learning . . . . . . . . . . . . . . 35--44
Cheng-Huang Yen A Preliminary Study of Disturbing
Silence in Asynchronous Discussion
Forums . . . . . . . . . . . . . . . . . 45--56
Huiling Chen and
Guoqing Zhao and
Ningyi Xu The Analysis of Research Hotspots and
Fronts of Knowledge Visualization Based
on CiteSpace II . . . . . . . . . . . . 57--68
Shaoming Chai and
Meirong Ding Practical Research on the Assessment of
Online Collaborative English Learning
--- a Case Study of Blackboard-Based
Course ``Intercultural Communication'' 69--76
Shuang Li and
Pengfeng Shi and
Qi Tang A Case Study on Scaffolding Design for
Wiki-Based Collaborative Knowledge
Building . . . . . . . . . . . . . . . . 77--88
Simon K. S. Cheung A Study on the Use of Mobile Devices for
Distance Learning . . . . . . . . . . . 89--98
Harrison Hao Yang The Development of Collaborative Action
Research through Cloud Computing
Document-Sharing Services and Blended
Learning Process . . . . . . . . . . . . 99--108
Wenchong Li and
Xiuping Tu Research on the Comprehensive Practice
Course of Primary School Based on
Knowledge Building . . . . . . . . . . . 109--119
Chin Kee Diu and
Wai Yu Ng Cost Effective Methodology in E-Adoption
for E-Training Providers . . . . . . . . 120--131
Yoko Hirata and
Yoshihiro Hirata Learning Logs in Hybrid Language
Learning: Students' Views and
Preferences . . . . . . . . . . . . . . 132--143
Kanishka Bedi The Significance of Face-to-Face
Instruction in Hybrid Executive
Education . . . . . . . . . . . . . . . 144--154
Pingping Zuo and
Su Mu and
Xiaomeng Han A Social Network Analysis of Students'
Online Interaction in Hybrid Learning
--- a Case Study of ``Media and
Teaching'' Course . . . . . . . . . . . 155--164
J. Lam and
C. G. Duan A Review of Mobile Learning Environment
in Higher Education Sector of Hong Kong:
Technological and Social Perspectives 165--173
Yanyan Li and
Li Wang Modeling Semantic Context for Active
e-Learning in the Workplace . . . . . . 174--185
Xing Lu and
Guodong Zhao and
Jianfeng Jiang Influential Factors of Blended Learning
in Chinese Colleges: From the
Perspective of Instructor's Acceptance
and Students' Satisfaction . . . . . . . 186--197
Ningyi Xu and
Guoqing Zhao and
Huiling Chen and
Leisi Pei The Colored Concept Map and Its
Application in Learning Assistance
Program . . . . . . . . . . . . . . . . 198--209
Joseph Fong and
Kenneth Ting Yan Wong and
Tracy Wu PTA System: Mobile Computing Student
Assessment by Parent and Teacher
Association . . . . . . . . . . . . . . 210--220
Anonymous Front Matter . . . . . . . . . . . . . . ??
Mohsen Alimomeni and
Reihaneh Safavi-Naini Guessing Secrecy . . . . . . . . . . . . 1--13
Anne Broadbent and
Stacey Jeffery and
Samuel Ranellucci Trading Robustness for Correctness and
Privacy in Certain Multiparty
Computations, beyond an Honest Majority 14--36
Ran Canetti and
Ben Riva and
Guy N. Rothblum Two Protocols for Delegation of
Computation . . . . . . . . . . . . . . 37--61
Ronald Cramer and
Ivan Damgård and
Valerio Pastro On the Amortized Complexity of Zero
Knowledge Protocols for Multiplicative
Relations . . . . . . . . . . . . . . . 62--79
Bernardo Machado David and
Anderson C. A. Nascimento Universally Composable Oblivious
Transfer from Lossy Encryption and the
McEliece Assumptions . . . . . . . . . . 80--99
Yevgeniy Dodis Shannon Impossibility, Revisited . . . . 100--110
Nico Döttling and
Daniel Kraschewski and
Jörn Müller-Quade Statistically Secure Linear-Rate
Dimension Extension for Oblivious Affine
Function Evaluation . . . . . . . . . . 111--128
Martin Hirt and
Christoph Lucas and
Ueli Maurer and
Dominik Raub Passive Corruption in Statistical
Multi-Party Computation . . . . . . . . 129--146
Marcel Keller and
Gert Læssòe Mikkelsen and
Andy Rupp Efficient Threshold Zero-Knowledge with
Applications to User-Centric Protocols 147--166
Yohei Watanabe and
Takenobu Seito and
Junji Shikata Information-Theoretic Timed-Release
Security: Key-Agreement, Encryption, and
Authentication Codes . . . . . . . . . . 167--186
Maki Yoshida and
Toru Fujiwara and
Marc Fossorier Optimum General Threshold Secret Sharing 187--204
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Yiyu Yao An Outline of a Theory of Three-Way
Decisions . . . . . . . . . . . . . . . 1--17
Shaoyong Li and
Tianrui Li and
Chuan Luo A Multi-granulation Model under
Dominance-Based Rough Set Approach . . . 18--25
Hailiang Wang and
Mingtian Zhou A Refined Rough $k$-Means Clustering
with Hybrid Threshold . . . . . . . . . 26--35
Anping Zeng and
Tianrui Li and
Junbo Zhang and
Dun Liu An Incremental Approach for Updating
Approximations of Rough Fuzzy Sets under
the Variation of the Object Set . . . . 36--45
Patrick G. Clark and
Jerzy W. Grzymala-Busse and
Zdzislaw S. Hippe How Good Are Probabilistic
Approximations for Rule Induction from
Data with Missing Attribute Values? . . 46--55
Jerzy B\laszczy\'nski and
Roman S\lowi\'nski and
Marcin Szel\kag Induction of Ordinal Classification
Rules from Incomplete Data . . . . . . . 56--65
Hai-Long Yang Interval Valued Fuzzy Rough Set Model on
Two Different Universes and Its
Application . . . . . . . . . . . . . . 66--72
Chien-Chung Chan Maximal Characteristic Sets and
Neighborhoods Approach to Incomplete
Information Systems . . . . . . . . . . 73--82
Bingzhen Sun and
Weimin Ma and
Haiyan Zhao and
Xinxin Wang Probabilistic Fuzzy Rough Set Model over
Two Universes . . . . . . . . . . . . . 83--93
Dominik \'Sl\kezak and
Piotr Synak and
Jakub Wróblewski and
Janusz Borkowski and
Graham Toppin Rough Optimizations of Complex
Expressions in Infobright's RDBMS . . . 94--99
Yang Liu and
Guohua Bai and
Qinglei Zhou and
Elisabeth Rakus-Andersson Rough Sets Based Inequality Rule Learner
for Knowledge Discovery . . . . . . . . 100--105
Omar S. Soliman and
Aboul Ella Hassanien A Computer Aided Diagnosis System for
Breast Cancer Using Support Vector
Machine . . . . . . . . . . . . . . . . 106--115
Yong Yang and
Yunxia Lu A New Method of the Accurate Eye Corner
Location . . . . . . . . . . . . . . . . 116--125
Isabelle Tamanini and
Plácido Rogério Pinheiro and
Cícero Nogueira dos Santos A Hybrid Approach of Verbal Decision
Analysis and Machine Learning . . . . . 126--131
Long Chen and
Banglan Liu and
Wei Song An Efficient Data Integrity Verification
Method Supporting Multi-granular
Operation with Commutative Hash . . . . 132--141
Tomasz Xi\keski and
Agnieszka Nowak-Brzezi\'nska and
Alicja Wakulicz-Deja Density-Based Method for Clustering and
Visualization of Complex Data . . . . . 142--149
Agnieszka Nowak-Brzezi\'nska and
Tomasz Jach and
Alicja Wakulicz-Deja Inference Processes Using Incomplete
Knowledge in Decision Support Systems
--- Chosen Aspects . . . . . . . . . . . 150--155
Andrzej Janusz and
Wojciech \'Swieboda and
Adam Krasuski and
Hung Son Nguyen Interactive Document Indexing Method
Based on Explicit Semantic Analysis . . 156--165
Bo Huang and
Yan Yang and
Amjad Mahmood and
Hongjun Wang Microblog Topic Detection Based on LDA
Model and Single-Pass Clustering . . . . 166--171
Marcin Szczuka and
Pawe\l Betli\'nski and
Kamil Herba Named Entity Matching in Publication
Databases . . . . . . . . . . . . . . . 172--179
Anonymous Front Matter . . . . . . . . . . . . . . ??
Piotr Wasilewski and
Andrzej Skowron A Characterization of Rough Separability 1--10
Guoyin Wang and
Lihe Guan Data-Driven Valued Tolerance Relation 11--19
Weihua Xu and
Wenxin Sun and
Yufeng Liu Optimistic Multi-Granulation Fuzzy Rough
Set Model Based on Triangular Norm . . . 20--27
Junyi Zhou and
Xibei Yang Rough Set Model Based on Hybrid
Tolerance Relation . . . . . . . . . . . 28--33
P. S. V. S. Sai Prasad and
C. Raghavendra Rao Scalable Improved Quick Reduct: Sample
Based . . . . . . . . . . . . . . . . . 34--39
Keyun Qin and
Zhenming Song and
Yang Xu Soft Rough Sets Based on Similarity
Measures . . . . . . . . . . . . . . . . 40--48
Huan Liu and
Yingcang Ma and
Xuezhen Dai Theory of Truth Degrees in Three Valued
Formed System RSL . . . . . . . . . . . 49--54
Weihua Xu and
Yufeng Liu and
Wenxin Sun Upper Approximation Reduction Based on
Intuitionistic Fuzzy $\mathcal{T}$
Equivalence Information Systems . . . . 55--62
Yang Liu and
Qinglei Zhou and
Elisabeth Rakus-Andersson and
Guohua Bai A Fuzzy-Rough Sets Based Compact Rule
Induction Method for Classifying Hybrid
Data . . . . . . . . . . . . . . . . . . 63--70
Junyi Chai and
James N. K. Liu and
Anming Li A New Intuitionistic Fuzzy Rough Set
Approach for Decision Support . . . . . 71--80
Tsukasa Matsubayashi and
Yuichi Kato and
Tetsuro Saeki A New Rule Induction Method from a
Decision Table Using a Statistical Test 81--90
Singh Kavita and
Zaveri Mukesh and
Raghuwanshi Mukesh A Rough Neurocomputing Approach for
Illumination Invariant Face Recognition
System . . . . . . . . . . . . . . . . . 91--100
Hongbo Zhao and
Feng Jiang and
Chunping Wang An Approximation Decision Entropy Based
Decision Tree Algorithm and Its
Application in Intrusion Detection . . . 101--106
\Lukasz Pa\lkowski and
Jerzy B\laszczy\'nski and
Jerzy Krysi\'nski and
Roman S\lowi\'nski Application of Rough Set Theory to
Prediction of Antimicrobial Activity of
Bis-quaternary Ammonium Chlorides . . . 107--116
Dayong Deng and
Lin Chen and
Dianxun Yan Classification and Decision Based on
Parallel Reducts and $F$-Rough Sets . . 117--122
Manish Joshi and
Pawan Lingras Evidential Clustering or Rough
Clustering: The Choice Is Yours . . . . 123--128
Salsabil Trabelsi and
Zied Elouedi and
Pawan Lingras Heuristic for Attribute Selection Using
Belief Discernibility Matrix . . . . . . 129--138
Shusaku Tsumoto and
Shoji Hirano Incremental Rules Induction Based on
Rule Layers . . . . . . . . . . . . . . 139--148
Fawaz Alsolami and
Igor Chikalov and
Mikhail Moshkov and
Beata Zielosko Optimization of Inhibitory Decision
Rules Relative to Length and Coverage 149--154
Yong Yang and
Zhengrong Chen Parallelized Computing of Attribute Core
Based on Rough Set Theory and MapReduce 155--160
Anonymous Front Matter . . . . . . . . . . . . . . ??
Gwendoline Fox and
Juliette Thuilier Predicting the Position of Attributive
Adjectives in the French NP . . . . . . 1--15
Miroslav Janí\vcek Abductive Reasoning for Continual
Dialogue Understanding . . . . . . . . . 16--31
Johann-Mattis List SCA: Phonetic Alignment Based on Sound
Classes . . . . . . . . . . . . . . . . 32--51
Simon Pauw and
Michael Spranger Embodied Quantifiers . . . . . . . . . . 52--66
Marcin W\lodarczak Ranked Multidimensional Dialogue Act
Annotation . . . . . . . . . . . . . . . 67--77
Johannes Klaus Fichte The Good, the Bad, and the Odd: Cycles
in Answer-Set Programs . . . . . . . . . 78--90
Meghdad Ghari Distributed Knowledge with
Justifications . . . . . . . . . . . . . 91--108
Wesley H. Holliday Epistemic Logic, Relevant Alternatives,
and the Dynamics of Context . . . . . . 109--129
Tin Perkov Towards a Generalization of Modal
Definability . . . . . . . . . . . . . . 130--139
Rasmus K. Rendsvig Modeling Semantic Competence: a Critical
Review of Frege's Puzzle about Identity 140--157
Antonius Weinzierl Comparing Inconsistency Resolutions in
Multi-Context Systems . . . . . . . . . 158--174
Heather Burnett Vague Determiner Phrases and
Distributive Predication . . . . . . . . 175--194
Hanna de Vries The Syntax and Semantics of Evaluative
Degree Modification . . . . . . . . . . 195--211
Casper Storm Hansen A Kripkean Solution to Paradoxes of
Denotation . . . . . . . . . . . . . . . 212--220
Jason Quinley Trust Games as a Model for Requests . . 221--233
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Aijun Bai and
Xiaoping Chen and
Patrick MacAlpine and
Daniel Urieli and
Samuel Barrett and
Peter Stone WrightEagle and UT Austin Villa: RoboCup
2011 Simulation League Champions . . . . 1--12
Kanjanapan Sukvichai and
Teeratath Ariyachartphadungkit and
Krit Chaiso Robot Hardware, Software, and
Technologies behind the SKUBA Robot Team 13--24
Tim Laue and
Thomas Röfer and
Katharina Gillmann and
Felix Wenk and
Colin Graf and
Tobias Kastner B-Human 2011 --- Eliminating Game Delays 25--36
Daniel D. Lee and
Seung-Joon Yi and
Stephen McGill and
Yida Zhang and
Sven Behnke and
Marcell Missura Robocup 2011 Humanoid League Winners . . 37--50
Jörg Stückler and
David Droeschel and
Kathrin Gräve and
Dirk Holz and
Jochen Kläß Towards Robust Mobility, Flexible Object
Manipulation, and Intuitive Multimodal
Interaction for Domestic Service Robots 51--62
Amy Eguchi and
Nicky Hughes and
Matthias Stocker and
Jiayao Shen and
Naomi Chikuma RoboCupJunior --- a Decade Later . . . . 63--77
Jörg Stückler and
Sven Behnke Compliant Task-Space Control with
Back-Drivable Servo Actuators . . . . . 78--89
Mohammad Norouzi and
Freek De Bruijn and
Jaime Valls Miró Planning Stable Paths for Urban Search
and Rescue Robots . . . . . . . . . . . 90--101
Colin Graf and
Thomas Röfer A Center of Mass Observing $3$D-LIPM
Gait for the RoboCup Standard Platform
League Humanoid . . . . . . . . . . . . 102--113
João Cunha and
Nuno Lau and
João Rodrigues Ball Interception Behaviour in Robotic
Soccer . . . . . . . . . . . . . . . . . 114--125
Oliver Urbann and
Sören Kerner and
Stefan Tasse Rigid and Soft Body Simulation Featuring
Realistic Walk Behaviour . . . . . . . . 126--136
Christian A. Mueller and
Nico Hochgeschwender and
Paul G. Ploeger Towards Robust Object Categorization for
Mobile Robots with Combination of
Classifiers . . . . . . . . . . . . . . 137--148
Saskia Metzler and
Matthias Nieuwenhuisen and
Sven Behnke Learning Visual Obstacle Detection Using
Color Histogram Features . . . . . . . . 149--161
Hamid Moballegh and
Naja von Schmude and
Raúl Rojas Gradient Vector Griding: An Approach to
Shape-Based Object Detection in RoboCup
Scenarios . . . . . . . . . . . . . . . 162--173
Eran Sadeh-Or and
Gal A. Kaminka AnySURF: Flexible Local Features
Computation . . . . . . . . . . . . . . 174--185
Aris Valtazanos and
Subramanian Ramamoorthy Online Motion Planning for Multi-robot
Interaction Using Composable Reachable
Sets . . . . . . . . . . . . . . . . . . 186--197
Andreas Schmitz and
Marcell Missura and
Sven Behnke Real-Time Trajectory Generation by
Offline Footstep Planning for a Humanoid
Soccer Robot . . . . . . . . . . . . . . 198--209
Feng Xue and
Xiaoping Chen and
Jinsu Liu and
Daniele Nardi Real Time Biped Walking Gait Pattern
Generator for a Real Robot . . . . . . . 210--221
Gregor Jochmann and
Sören Kerner and
Stefan Tasse and
Oliver Urbann Efficient Multi-hypotheses Unscented
Kalman Filtering for Robust Localization 222--233
Román Marchant and
Pablo Guerrero and
Javier Ruiz-del-Solar A Portable Ground-Truth System Based on
a Laser Sensor . . . . . . . . . . . . . 234--245
Anonymous Front Matter . . . . . . . . . . . . . . ??
Viet Tung Hoang and
Ben Morris and
Phillip Rogaway An Enciphering Scheme Based on a Card
Shuffle . . . . . . . . . . . . . . . . 1--13
Will Landecker and
Thomas Shrimpton and
R. Seth Terashima Tweakable Blockciphers with Beyond
Birthday-Bound Security . . . . . . . . 14--30
Tetsu Iwata and
Keisuke Ohashi and
Kazuhiko Minematsu Breaking and Repairing GCM Security
Proofs . . . . . . . . . . . . . . . . . 31--49
Mohamed Ahmed Abdelraheem and
Martin Ågren On the Distribution of Linear Biases:
Three Instructive Examples . . . . . . . 50--67
Eric Miles and
Emanuele Viola Substitution-Permutation Networks,
Pseudorandom Functions, and Natural
Proofs . . . . . . . . . . . . . . . . . 68--85
Jonathan Zittrain The End of Crypto . . . . . . . . . . . 86--86
Mike Rosulek Must You Know the Code of f to Securely
Compute f? . . . . . . . . . . . . . . . 87--104
Sanjam Garg and
Amit Sahai Adaptively Secure Multi-Party
Computation with Dishonest Majority . . 105--123
Joël Alwen and
Jonathan Katz and
Ueli Maurer Collusion-Preserving Computation . . . . 124--143
Amos Beimel and
Oriol Farr\`as and
Yuval Mintz Secret Sharing Schemes for Very Dense
Graphs . . . . . . . . . . . . . . . . . 144--161
Sergey Gorbunov and
Vinod Vaikuntanathan and
Hoeteck Wee Functional Encryption with Bounded
Collusions via Multi-party Computation 162--179
Allison Lewko and
Brent Waters New Proof Methods for Attribute-Based
Encryption: Achieving Full Security
through Selective Techniques . . . . . . 180--198
Amit Sahai and
Hakan Seyalioglu and
Brent Waters Dynamic Credentials and Ciphertext
Delegation for Attribute-Based
Encryption . . . . . . . . . . . . . . . 199--217
Brent Waters Functional Encryption for Regular
Languages . . . . . . . . . . . . . . . 218--235
Melissa Chase and
Ivan Visconti Secure Database Commitments and
Universal Arguments of Quasi Knowledge 236--254
Nir Bitansky and
Alessandro Chiesa Succinct Arguments from Multi-prover
Interactive Proofs and Their Efficiency
Benefits . . . . . . . . . . . . . . . . 255--272
Tibor Jager and
Florian Kohlar and
Sven Schäge On the Security of TLS-DHE in the
Standard Model . . . . . . . . . . . . . 273--293
Mihir Bellare and
Stefano Tessaro and
Alexander Vardy Semantic Security for the Wiretap
Channel . . . . . . . . . . . . . . . . 294--311
Mihir Bellare and
Thomas Ristenpart and
Stefano Tessaro Multi-instance Security and Its
Application to Password-Based
Cryptography . . . . . . . . . . . . . . 312--329
Bart Mennink and
Bart Preneel Hash Functions Based on Three
Permutations: a Generic Security
Analysis . . . . . . . . . . . . . . . . 330--347
Anonymous Front Matter . . . . . . . . . . . . . . ??
Wenfei Fan Data Quality: Theory and Practice . . . 1--16
Jiawei Han Construction of Web-Based,
Service-Oriented Information Networks: a
Data Mining Perspective . . . . . . . . 17--19
Rakesh Agrawal and
Sreenivas Gollapudi and
Anitha Kannan and
Krishnaram Kenthapadi Electronic Textbooks and Data Mining . . 20--21
Shangfeng Mo and
Hong Chen and
Yinglong Li Topology-Based Data Compression in
Wireless Sensor Networks . . . . . . . . 22--34
Long Tan A Residual Energy-Based Fairness
Scheduling MAC Protocol for Wireless
Sensor Networks . . . . . . . . . . . . 35--46
Guilin Li and
Longjiang Guo and
Jian Zhang and
Minghong Liao Topology-Aided Geographic Routing
Protocol for Wireless Sensor Networks 47--57
Nan Zhang and
Jianhua Feng Polaris: a Fingerprint-Based
Localization System over Wireless
Networks . . . . . . . . . . . . . . . . 58--70
Jun-Feng Qu and
Mengchi Liu A High-Performance Algorithm for
Frequent Itemset Mining . . . . . . . . 71--82
Xiang Zhang and
Cuifang Zhao and
Peng Wang and
Fengbo Zhou Mining Link Patterns in Linked Data . . 83--94
Kaisong Song and
Daling Wang and
Shi Feng and
Dong Wang and
Ge Yu Detecting Positive Opinion Leader Group
from Forum . . . . . . . . . . . . . . . 95--101
Sumit Negi and
Manish A. Bhide and
Vishal S. Batra and
Mukesh K. Mohania and
Sunil Bajpai D'MART: a Tool for Building and
Populating Data Warehouse Model from
Existing Reports and Tables . . . . . . 102--113
Xin Lin and
Jianliang Xu and
Junzhong Gu Continuous Skyline Queries with
Integrity Assurance in Outsourced
Spatial Databases . . . . . . . . . . . 114--126
Yu Suzuki Assessing Quality Values of Wikipedia
Articles Using Implicit Positive and
Negative Ratings . . . . . . . . . . . . 127--138
Hao Wu and
Lizhu Zhou Form-Based Instant Search and Query
Autocompletion on Relational Data . . . 139--151
Yan Zhang and
Long Yang and
Hongzhi Wang Range Query Estimation for Dirty Data
Management System . . . . . . . . . . . 152--164
Yu Sun and
Jin Huang and
Yueguo Chen and
Xiaoyong Du and
Rui Zhang Top-$k$ Most Incremental Location
Selection with Capacity Constraint . . . 165--171
Renfei Li and
Daling Wang and
Yifei Zhang and
Shi Feng and
Ge Yu An Approach of Text-Based and
Image-Based Multi-modal Search for
Online Shopping . . . . . . . . . . . . 172--184
Reza Taghizadeh Hemayati and
Weiyi Meng and
Clement Yu Categorizing Search Results Using
WordNet and Wikipedia . . . . . . . . . 185--197
Htoo Htoo and
Yutaka Ohsawa and
Noboru Sonehara and
Masao Sakauchi Optimal Sequenced Route Query Algorithm
Using Visited POI Graph . . . . . . . . 198--209
Jifeng Cui and
Yong Zhang and
Chao Li and
ChunXiao Xing A Packaging Approach for Massive Amounts
of Small Geospatial Files with HDFS . . 210--215
Anonymous Front Matter . . . . . . . . . . . . . . ??
Haixu Miao and
Tiezheng Nie and
Dejun Yue and
Tiancheng Zhang and
Jinshen Liu Algebra for Parallel XQuery Processing 1--10
Cong Wang and
Hongzhi Wang Graph-Structured Data Compression Based
on Frequent Subgraph Contraction . . . . 11--18
Xin Lin and
Lingchen Zhou and
Peng Chen and
Junzhong Gu Privacy Preserving Reverse
Nearest-Neighbor Queries Processing on
Road Network . . . . . . . . . . . . . . 19--28
Jianmin Wu and
Mizuho Iwaihara Wikipedia Revision Graph Extraction
Based on $N$-Gram Cover . . . . . . . . 29--38
Meirui Ren and
Jinsheng Duan and
Hao Qu and
Xinjing Wang and
Lei Du Wireless Nerve: Invisible Anti-theft
System in Wireless Sensor Network . . . 39--44
Zaobo He and
Xiaoming Wang A Spatial-temporal Model for the Malware
Propagation in MWSNs Based on the
Reaction-Diffusion Equations . . . . . . 45--56
Long Tan and
Liyan Chen The Application of a Node-Localization
Algorithm of Wireless Sensor Network in
Intelligent Transportation System . . . 57--68
Juan Luo and
Lei Chen and
Shan Fu and
Renfa Li Parallel Network Virtualization Resource
Management System . . . . . . . . . . . 69--77
Yang Zao and
Liu Yan and
Li Renfa The Analysis of Priority-Based Slotted
CSMA/CA Algorithm in IEEE 802.15.4
Sensor Network . . . . . . . . . . . . . 78--86
Cheng Feng and
Rui Zhang and
Shouxu Jiang and
Zhijun Li QoI-Based Data Gathering and Routing
Guidance in VANETs . . . . . . . . . . . 87--98
Robin Jun Yang and
Qiong Luo PTL: Partitioned Logging for Database
Storage on Flash Solid State Drives . . 99--108
Shaikh Muhammad Allayear and
Sung Soon Park and
Shamim H. Ripon and
Gyeong Hun Kim Adaptation Mechanism of iSCSI Protocol
for NAS Storage Solution in Wireless
Environment . . . . . . . . . . . . . . 109--118
Kitti Koonsanit and
Chuleerat Jaruskulchai and
Apisit Eiumnoh Band Selection for Hyperspectral Imagery
with PCA-MIG . . . . . . . . . . . . . . 119--127
Jing Zhang and
Xiaoguang Hong and
Zhaohui Peng and
Qingzhong Li NestedCube: Towards Online Analytical
Processing on Information-Enhanced
Multidimensional Network . . . . . . . . 128--139
Yi Liu and
Luo Chen and
Ning Jing and
Wei Xiong MRFM: An Efficient Approach to Spatial
Join Aggregate . . . . . . . . . . . . . 140--150
Xu Li and
Xin Wang and
Hong Shi and
Zhaohua Sheng and
Zhiyong Feng A Distributed Inverted Indexing Scheme
for Large-Scale RDF Data . . . . . . . . 151--161
Wei Pan and
Zhanhuai Li and
Qun Chen and
Shanglian Peng and
Bo Suo and
Jian Xu MSMapper: An Adaptive Split Assignment
Scheme for MapReduce . . . . . . . . . . 162--172
Chunyu Zhang and
Yong Su and
Jiyang Chen and
Wen Wang Driving Environment Reconstruction and
Analysis System on Multi-sensor Network 173--180
Zhou Yu and
Jian Shao and
Fei Wu LuSH: a Generic High-Dimensional Index
Framework . . . . . . . . . . . . . . . 181--191
Huaijie Zhu and
Xiaochun Yang and
Bin Wang and
Yue Wang Improving Text Search on Hybrid Data . . 192--203
Anonymous Front Matter . . . . . . . . . . . . . . ??
Anindya Banerjee Modular Verification of Object-Based
Programs . . . . . . . . . . . . . . . . 1--2
Thorsten Bormer and
Marc Brockschmidt and
Dino Distefano and
Gidon Ernst The COST IC0701 Verification Competition
2011 . . . . . . . . . . . . . . . . . . 3--21
James J. Hunt The Practical Application of Formal
Methods: Where Is the Benefit for
Industry? . . . . . . . . . . . . . . . 22--32
Alan Mycroft Isolation Types and Multi-core
Architectures . . . . . . . . . . . . . 33--48
Peter Y. H. Wong and
Nikolay Diakov and
Ina Schaefer Modelling Adaptable Distributed Object
Oriented Systems Using the HATS
Approach: a Fredhopper Case Study . . . 49--66
Gogul Balakrishnan and
Naoto Maeda and
Sriram Sankaranarayanan and
Franjo Ivan\vci\'c and
Aarti Gupta Modeling and Analyzing the Interaction
of C and C++ Strings . . . . . . . . . . 67--85
Bernhard Beckert and
Thorsten Bormer and
Florian Merz and
Carsten Sinz Integration of Bounded Model Checking
and Deductive Verification . . . . . . . 86--104
Lucian Bentea and
Olaf Owe A Probabilistic Framework for
Object-Oriented Modeling and Analysis of
Distributed Systems . . . . . . . . . . 105--122
Marc Brockschmidt and
Thomas Ströder and
Carsten Otto and
Jürgen Giesl Automated Detection of Non-termination
and \tt NullPointerExceptions for Java
Bytecode . . . . . . . . . . . . . . . . 123--141
Jonathan Heinen and
Henrik Barthels and
Christina Jansen Juggrnaut --- An Abstract JVM . . . . . 142--159
Ángel Herranz and
Julio Mariño A Verified Implementation of Priority
Monitors in Java . . . . . . . . . . . . 160--177
Marieke Huisman and
Tri Minh Ngo Scheduler-Specific Confidentiality for
Multi-threaded Programs and Its
Logic-Based Verification . . . . . . . . 178--195
Einar Broch Johnsen and
Rudolf Schlatte and
S. Lizeth Tapia Tarifa A Formal Model of User-Defined Resources
in Resource-Restricted Deployment
Scenarios . . . . . . . . . . . . . . . 196--213
Vlad Rusu and
Dorel Lucanu A $\mathbb{K}$-Based Formal Framework
for Domain-Specific Modelling Languages 214--231
Christoph Scheben and
Peter H. Schmitt Verification of Information Flow
Properties of Java Programs without
Approximations . . . . . . . . . . . . . 232--249
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Giorgio Ausiello and
Giuseppe F. Italiano and
Luigi Laura and
Umberto Nanni and
Fabiano Sarracco Structure Theorems for Optimum
Hyperpaths in Directed Hypergraphs . . . 1--14
Mike Hewitt and
George L. Nemhauser and
Martin Savelsbergh Branch-and-Price Guided Search . . . . . 15--18
Christos H. Papadimitriou The New Faces of Combinatorial
Optimization . . . . . . . . . . . . . . 19--23
Valentina Cacchiani and
Alberto Caprara and
Paolo Toth Models and Algorithms for the Train Unit
Assignment Problem . . . . . . . . . . . 24--35
Breno Piva and
Cid C. de Souza The Minimum Stabbing Triangulation
Problem: IP Models and Computational
Evaluation . . . . . . . . . . . . . . . 36--47
Matteo Fischetti and
Leo Liberti Orbital Shrinking . . . . . . . . . . . 48--58
James Ostrowski Using Symmetry to Optimize Over the
Sherali--Adams Relaxation . . . . . . . 59--70
Jianqiang Cheng and
Céline Gicquel and
Abdel Lisser A Second-Order Cone Programming
Approximation to Joint
Chance-Constrained Linear Programs . . . 71--80
Agn\`es Gorge and
Abdel Lisser and
Riadh Zorgati Semidefinite Relaxations for Mixed
$0$--$1$ Second-Order Cone Program . . . 81--92
Pierre Fouilhoux and
Aurélien Questel The Non-Disjoint $m$-Ring-Star Problem:
Polyhedral Results and SDH/SONET Network
Design . . . . . . . . . . . . . . . . . 93--104
Sylvie Borne and
Roland Grappe and
Mathieu Lacroix The Uncapacitated Asymmetric Traveling
Salesman Problem with Multiple Stacks 105--116
Mathieu Lacroix and
A. Ridha Mahjoub and
Sébastien Martin Polyhedral Analysis and Branch-and-Cut
for the Structural Analysis Problem . . 117--128
Yuri Faenza and
Samuel Fiorini and
Roland Grappe and
Hans Raj Tiwary Extended Formulations, Nonnegative
Factorizations, and Randomized
Communication Protocols . . . . . . . . 129--140
Gábor Braun and
Sebastian Pokutta An Algebraic Approach to Symmetric
Extended Formulations . . . . . . . . . 141--152
Satoru Fujishige and
Jens Maßberg Dual Consistent Systems of Linear
Inequalities and Cardinality Constrained
Polytopes . . . . . . . . . . . . . . . 153--164
A. S. Freire and
V. Acuña and
P. Crescenzi and
C. E. Ferreira and
V. Lacroix and
P. V. Milreu Minimum Ratio Cover of Matrix Columns by
Extreme Rays of Its Induced Cone . . . . 165--177
Laura Galli and
Konstantinos Kaparis and
Adam N. Letchford Gap Inequalities for the Max-Cut
Problem: a Cutting-Plane Algorithm . . . 178--188
Trivikram Dokka and
Ioannis Mourtos and
Frits C. R. Spieksma Fast Separation Algorithms for
Three-Index Assignment Problems . . . . 189--200
Luis Gouveia and
Markus Leitner and
Ivana Ljubi\'c On the Hop Constrained Steiner Tree
Problem with Multiple Root Nodes . . . . 201--212
Marie-Emilie Voge and
François Clautiaux Theoretical Investigation of Aggregation
in Pseudo-polynomial Network-Flow Models 213--224
Anonymous Front Matter . . . . . . . . . . . . . . ??
Marijn Koolen and
Gabriella Kazai and
Jaap Kamps and
Antoine Doucet and
Monica Landoni Overview of the INEX 2011 Books and
Social Search Track . . . . . . . . . . 1--29
Frans Adriaans and
Jaap Kamps and
Marijn Koolen The Importance of Document Ranking and
User-Generated Content for Faceted
Search and Book Suggestions . . . . . . 30--44
Toine Bogers and
Kirstine Wilfred Christensen and
Birger Larsen RSLIS at INEX 2011: Social Book Search
Track . . . . . . . . . . . . . . . . . 45--56
Hervé Déjean Using Page Breaks for Book Structuring 57--67
Romain Deveaud and
Eric SanJuan and
Patrice Bellot Social Recommendation and External
Resources for Book Search . . . . . . . 68--79
Henry A. Feild and
Marc-Allen Cartright and
James Allan The University of Massachusetts
Amherst's Participation in the INEX 2011
Prove It Track . . . . . . . . . . . . . 80--85
Emmanuel Giguet and
Nadine Lucas The Book Structure Extraction
Competition with the Resurgence Full
Content Software at Caen University . . 86--97
Caihua Liu and
Jiajun Chen and
Xiaofeng Zhang and
Jie Liu and
Yalou Huang TOC Structure Extraction from OCR-ed
Books . . . . . . . . . . . . . . . . . 98--108
Michael Preminger and
Ragnar Nordlie OUC's Participation in the 2011 INEX
Book Track . . . . . . . . . . . . . . . 109--117
Qiuyue Wang and
Georgina Ramírez and
Maarten Marx and
Martin Theobald and
Jaap Kamps Overview of the INEX 2011 Data-Centric
Track . . . . . . . . . . . . . . . . . 118--137
Cyril Laitang and
Karen Pinel-Sauvagnat and
Mohand Boughanem Edit Distance for XML Information
Retrieval: Some Experiments on the
Datacentric Track of INEX 2011 . . . . . 138--145
Georgina Ramírez UPF at INEX 2011: Books and Social
Search Track and Data-Centric Track . . 146--154
Anne Schuth and
Maarten Marx University of Amsterdam Data Centric Ad
Hoc and Faceted Search Runs . . . . . . 155--160
Darnes Vilariño Ayala and
David Pinto and
Saúl León Silverio and
Esteban Castillo BUAP: a Recursive Approach to the
Data-Centric Track of INEX 2011 . . . . 161--166
Qiuyue Wang and
Yantao Gan and
Yu Sun RUC@INEX 2011 Data-Centric Track . . . . 167--179
Tanakorn Wichaiwong and
Chuleerat Jaruskulchai MEXIR at INEX-2011 . . . . . . . . . . . 180--187
Eric SanJuan and
Véronique Moriceau and
Xavier Tannier and
Patrice Bellot and
Josiane Mothe Overview of the INEX 2011 Question
Answering Track (QA@INEX) . . . . . . . 188--206
Pinaki Bhaskar and
Somnath Banerjee and
Snehasis Neogi and
Sivaji Bandyopadhyay A Hybrid QA System with Focused IR and
Automatic Summarization for INEX 2011 207--218
Liana Ermakova and
Josiane Mothe IRIT at INEX: Question Answering Task 219--226
Ana Lilia Laureano-Cruces and
Javier Ramírez-Rodríguez A Graph-Based Summarization System at
QA@INEX Track 2011 . . . . . . . . . . . 227--231
Anonymous Front Matter . . . . . . . . . . . . . . ??
Intaek Leem and
Mary Wu and
Chonggun Kim An Algorithm for Resource Allocation
without Inter-cluster Collisions in WSN 1--8
Joonki Min and
Jookyoung Kim and
Youngmi Kwon Data Compression Technique for Wireless
Sensor Networks . . . . . . . . . . . . 9--16
Jeong-hyun Cho and
Yong-do Choi and
Sung-ho Kim A Bandwidth Reservation Method for
Multicast Streaming Service . . . . . . 17--24
Dongho Kim Hybrid-ARQ with Rate Compatible LDPC
Codes . . . . . . . . . . . . . . . . . 25--32
Shu Li and
Jeong Geun Kim Inter-session and Intra-session Network
Coding for Wireless Sensor Networks . . 33--40
Seong Cheol Kim and
Jun Heon Jeon and
Hyun Joo Park QoS Aware Energy-Efficient (QAEE) MAC
Protocol for Energy Harvesting Wireless
Sensor Networks . . . . . . . . . . . . 41--48
Kyungrak Lee and
Juhyun Maeng and
Inwhee Joe A New Channel Access Scheme for
Multi-user Voice Communications in IEEE
802.15.4 Networks . . . . . . . . . . . 49--56
Hyun-Ho Shin and
Byung-Seo Kim Performance Evaluations on Local-Repair
of AODV Protocol over IP-Based Ad-Hoc
Networks . . . . . . . . . . . . . . . . 57--63
Aries Kusdaryono and
Gan Bayar and
Lee Kyoung Oh Base Station Assisted Hierarchical
Routing Protocol in Wireless Sensor
Networks . . . . . . . . . . . . . . . . 64--71
Hee Jae Shin and
Do Hyun Bae and
Jin Suk Kim Derivation of Coverage in Sensor Network
Using a Quad-Tree Partitioning Scheme 72--78
A. S. M. Sanwar Hosen and
Gihwan Cho Applying a Minimum Routing Cost Spanning
Tree to Many-to-Many in Wireless Sensor
Networks . . . . . . . . . . . . . . . . 79--86
Ryota Imanishi and
Yuki Kondo and
Young-Bok Choi and
Hiromi Okada An Effective Traffic Control Method for
Real-Time and Reliable Bursts in OBS
Networks . . . . . . . . . . . . . . . . 87--97
Ye Hoon Lee A Transmit Power Control Method for
DS/CDMA Communication Systems Using
Successive Interference Cancelation . . 98--105
SeokHoon Kang and
Gwanggil Jeon and
Young-Sup Lee Improved Energy Aware Routing Protocol
in Mobile Ad Hoc Network . . . . . . . . 106--113
Junyeong Bok and
Heung-Gyoon Ryu Analysis of Receiver Feedback Closed
Loop Pre-distortion to Compensate for
Nonlinear HPA and Foliage Attenuation 114--121
Le Thanh Tuan and
Daeseung Yoo and
Hyungjoo Kim and
Gwangja Jin and
Byungtae Jang and
Soong Hwan Ro The Modified Proportional Fair Packet
Scheduling Algorithm for Multimedia
Traffic in LTE System . . . . . . . . . 122--129
Kwang Kiun Yoo and
Ronny Yongho Kim HiNet: Radio Frequency Communication
Based Train Control (RF-CBTC) System
Jointly Using Hierarchical Modulation
and Network Coding . . . . . . . . . . . 130--137
Wonsun Bong and
Yong Cheol Kim Fingerprint Wi--Fi Radio Map
Interpolated by Discontinuity Preserving
Smoothing . . . . . . . . . . . . . . . 138--145
Ingi Lee and
Hwan-Seung Yong Common Sense Knowledge Based Hybrid
Interestingness Measures for Data Mining 146--154
Nasimul Noman and
Leon Palafox and
Hitoshi Iba On Model Selection Criteria in Reverse
Engineering Gene Networks Using RNN
Model . . . . . . . . . . . . . . . . . 155--164
Anonymous Front Matter . . . . . . . . . . . . . . ??
Kelly Vassie and
Giuseppe Morlino Natural and Artificial Systems: Compare,
Model or Engineer? . . . . . . . . . . . 1--11
Jòrgen Christian Larsen and
David Brandt and
Kasper Stoy LocoKit: a Robot Construction Kit for
Studying and Developing Functional
Morphologies . . . . . . . . . . . . . . 12--22
Iñaki Rañó An Introduction to the Analysis of
Braitenberg Vehicles $2$ and $3$ Using
Phase Plane Portrait . . . . . . . . . . 23--32
Cristiano Alessandro and
Juan Pablo Carbajal and
Andrea d'Avella Synthesis and Adaptation of Effective
Motor Synergies for the Solution of
Reaching Tasks . . . . . . . . . . . . . 33--43
Jose Nunez-Varela and
Balaraman Ravindran and
Jeremy L. Wyatt Gaze Allocation Analysis for a Visually
Guided Manipulation Task . . . . . . . . 44--53
Matej Hoffmann and
Nico M. Schmidt and
Rolf Pfeifer and
Andreas K. Engel and
Alexander Maye Using Sensorimotor Contingencies for
Terrain Discrimination and Adaptive
Walking Behavior in the Quadruped Robot
Puppy . . . . . . . . . . . . . . . . . 54--64
Beata J. Grzyb and
Angel P. del Pobil and
Linda B. Smith How Walking Influences the Development
of Absolute Distance Perception . . . . 65--74
Boris Durán and
Serge Thill Modelling Interaction in Multi-modal
Affordance Processing with Neural
Dynamics . . . . . . . . . . . . . . . . 75--84
Ana Carolina Silva and
Cristina Peixoto dos Santos A Bio-inspired Model Reliably Predicts
the Collision of Approaching Objects
under Different Light Conditions . . . . 85--95
Naveen Kuppuswamy and
Hugo Gravato Marques and
Helmut Hauser Synthesising a Motor-Primitive Inspired
Control Architecture for Redundant
Compliant Robots . . . . . . . . . . . . 96--105
Alexander Maye and
Andreas K. Engel Using Sensorimotor Contingencies for
Prediction and Action Planning . . . . . 106--116
Michele Folgheraiter and
Mathias Jordan and
Jan Albiez and
Frank Kirchner A Bio-inspired Control System for a
Wearable Human-Machine Interface . . . . 117--126
Sejoon Ahn and
DaeEun Kim A Finite Element Method of Electric
Image in Weakly Electric Fish . . . . . 127--135
Adrien Jauffret and
Nicolas Cuperlier and
Philippe Gaussier and
Philippe Tarroux Multimodal Integration of Visual Place
Cells and Grid Cells for Navigation
Tasks of a Real Robot . . . . . . . . . 136--145
Tim Waegeman and
Francis Wyffels and
Benjamin Schrauwen Towards a Neural Hierarchy of Time
Scales for Motor Control . . . . . . . . 146--155
Cai Li and
Robert Lowe and
Tom Ziemke Modelling Walking Behaviors Based on
CPGs: a Simplified Bio-inspired
Architecture . . . . . . . . . . . . . . 156--166
Marco Antonelli and
Beata J. Grzyb and
Vicente Castelló and
Angel P. del Pobil Plastic Representation of the Reachable
Space for a Humanoid Robot . . . . . . . 167--176
Charles Ollion and
Stéphane Doncieux Towards Behavioral Consistency in
Neuroevolution . . . . . . . . . . . . . 177--186
Christian Rempis and
Frank Pasemann Evolving Variants of Neuro-Control Using
Constraint Masks . . . . . . . . . . . . 187--197
Borys Wróbel and
Micha\l Joachimczak and
Alberto Montebelli and
Robert Lowe The Search for Beauty: Evolution of
Minimal Cognition in an Animat
Controlled by a Gene Regulatory Network
and Powered by a Metabolic System . . . 198--208
Anonymous Front Matter . . . . . . . . . . . . . . ??
Sabine Lehmann and
Ben Gottesman and
Robert Grabowski and
Mayo Kudo Applying CNL Authoring Support to
Improve Machine Translation of Forum
Data . . . . . . . . . . . . . . . . . . 1--10
Sébastien Ferré SQUALL: a Controlled Natural Language
for Querying and Updating RDF Graphs . . 11--25
Rolf Schwitter Answer Set Programming via Controlled
Natural Language Processing . . . . . . 26--43
Richard Power OWL Simplified English: a Finite-State
Language for Ontology Editing . . . . . 44--60
William R. Murray and
Tomas Singliar Spatiotemporal Extensions to a
Controlled Natural Language . . . . . . 61--78
Kaarel Kaljurand and
Tanel Alumäe Controlled Natural Language in Speech
Recognition Based User Interfaces . . . 79--94
Faegheh Hasibi An Adaptation Technique for GF-Based
Dialogue Systems . . . . . . . . . . . . 95--109
Kaarel Kaljurand General Architecture of a Controlled
Natural Language Based Multilingual
Semantic Wiki . . . . . . . . . . . . . 110--120
Normunds Gruzitis and
Peteris Paikens and
Guntis Barzdins FrameNet Resource Grammar Library for GF 121--137
Stefan Höfler Legislative Drafting Guidelines: How
Different Are They from Controlled
Language Rules for Technical Writing? 138--151
Palmira Marrafa and
Raquel Amaro and
Nuno Freire and
Sara Mendes Portuguese Controlled Language: Coping
with Ambiguity . . . . . . . . . . . . . 152--166
Brian Davis and
Ramona Enache and
Jeroen van Grondelle Multilingual Verbalisation of Modular
Ontologies Using GF and lemon . . . . . 167--184
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Sébastien Briais and
Stéphane Caron and
Jean-Michel Cioranesco and
Jean-Luc Danger $3$D Hardware Canaries . . . . . . . . . 1--22
Sergei Skorobogatov and
Christopher Woods Breakthrough Silicon Scanning Discovers
Backdoor in Military Chip . . . . . . . 23--40
Alexander Schlösser and
Dmitry Nedospasov and
Juliane Krämer and
Susanna Orlic Simple Photonic Emission Analysis of AES 41--57
Andrew Moss and
Elisabeth Oswald and
Dan Page and
Michael Tunstall Compiler Assisted Masking . . . . . . . 58--75
Begül Bilgin and
Svetla Nikova and
Ventzislav Nikov and
Vincent Rijmen and
Georg Stütz Threshold Implementations of All $3
\times 3$ and $4 \times 4$ S-Boxes . . . 76--91
Amir Moradi and
Oliver Mischke How Far Should Theory Be from Practice? 92--106
Blandine Debraize Efficient and Provably Secure Methods
for Switching from Arithmetic to Boolean
Masking . . . . . . . . . . . . . . . . 107--121
Subhadeep Banik and
Subhamoy Maitra and
Santanu Sarkar A Differential Fault Attack on the Grain
Family of Stream Ciphers . . . . . . . . 122--139
Yossef Oren and
Mathieu Renauld and
François-Xavier Standaert and
Avishai Wool Algebraic Side-Channel Attacks Beyond
the Hamming Weight Leakage Model . . . . 140--154
Oscar Reparaz and
Benedikt Gierlichs and
Ingrid Verbauwhede Selecting Time Samples for Multivariate
DPA Attacks . . . . . . . . . . . . . . 155--174
Beno\^\it Gérard and
François-Xavier Standaert Unified and Optimized Linear Collision
Attacks and Their Application in a
Non-profiled Setting . . . . . . . . . . 175--192
Marcel Medwed and
François-Xavier Standaert and
Antoine Joux Towards Super-Exponential Side-Channel
Security with Efficient
Leakage-Resilient PRFs . . . . . . . . . 193--212
Sebastian Faust and
Krzysztof Pietrzak and
Joachim Schipper Practical Leakage-Resilient Symmetric
Cryptography . . . . . . . . . . . . . . 213--232
Yunsi Fei and
Qiasi Luo and
A. Adam Ding A Statistical Model for DPA with Novel
Algorithmic Confusion Analysis . . . . . 233--250
Ulrich Rührmair and
Marten van Dijk Practical Security Analysis of PUF-Based
Two-Player Protocols . . . . . . . . . . 251--267
Vincent van der Leest and
Bart Preneel and
Erik van der Sluis Soft Decision Error Correction for
Compact Memory-Based PUFs Using a Single
Enrollment . . . . . . . . . . . . . . . 268--282
Stefan Katzenbeisser and
Ünal Kocaba\cs and
Vladimir Ro\vzi\'c and
Ahmad-Reza Sadeghi PUFs: Myth, Fact or Busted? A Security
Evaluation of Physically Unclonable
Functions (PUFs) Cast in Silicon . . . . 283--301
Roel Maes and
Anthony Van Herrewege and
Ingrid Verbauwhede PUFKY: a Fully Functional PUF-Based
Cryptographic Key Generator . . . . . . 302--319
Daniel J. Bernstein and
Peter Schwabe NEON Crypto . . . . . . . . . . . . . . 320--339
Stefan Heyse and
Tim Güneysu Towards One Cycle per Bit Asymmetric
Encryption: Code-Based Cryptography on
Reconfigurable Hardware . . . . . . . . 340--355
Anonymous Front Matter . . . . . . . . . . . . . . ??
Goren Gordon and
Ehud Ahissar A Curious Emergence of Reaching . . . . 1--12
Torbjòrn S. Dahl and
Alexandros Paraschos A Force-Distance Model of Humanoid Arm
Withdrawal Reflexes . . . . . . . . . . 13--24
Muhammad Nasiruddin Mahyuddin and
Guido Herrmann and
Said Ghani Khan A Novel Adaptive Control Algorithm in
Application to a Humanoid Robot Arm . . 25--36
Iñaki Rañó and
Jean-Stephane Jokeit A Wandering Braitenberg Vehicle $2 b$
That Densely Covers a Bounded Workspace 37--48
Jartuwat Rajruangrabin and
Isura Ranatunga and
Dan O. Popa Adaptive Interface Mapping for Intuitive
Teleoperation of Multi-DOF Robots . . . 49--60
Carlos Santos and
Manuel Mazo Jr. and
Felipe Espinosa Adaptive Self-triggered Control of a
Remotely Operated Robot . . . . . . . . 61--72
Nadeesha Oliver Ranasinghe and
Wei-Min Shen Autonomous Surveillance Tolerant to
Interference . . . . . . . . . . . . . . 73--83
Dejanira Araiza-Illan and
Tony J. Dodd Bio-inspired Autonomous Navigation and
Escape from Pursuers with Potential
Functions . . . . . . . . . . . . . . . 84--95
Christopher M. Harris and
Jonathan Waddington Biomimetics of Choice Behaviour for
Autonomous Agents . . . . . . . . . . . 96--104
Alan Broun and
Chris Beck and
Tony Pipe and
Majid Mirmehdi and
Chris Melhuish Building a Kinematic Model of a Robot's
Arm with a Depth Camera . . . . . . . . 105--116
Sreeja Kochuvila and
Shikha Tripathi and
Sudarshan T. S. B. Control of a Compass Gait Biped Robot
Based on Partial Feedback Linearization 117--127
Florian Vaussard and
Philippe Rétornaz and
David Hamel and
Francesco Mondada Cutting Down the Energy Consumed by
Domestic Robots: Insights from Robotic
Vacuum Cleaners . . . . . . . . . . . . 128--139
Nils Axel Andersen and
Ole Ravn Designing Competitions for Education in
Robotics . . . . . . . . . . . . . . . . 140--151
J. Ernesto Solanes and
Leopoldo Armesto and
Josep Tornero and
Pau Muñoz-Benavent and
Vicent Girbés Dual-Rate Non-Linear High Order Holds
for Visual Servoing Applications . . . . 152--163
S. Byrne and
W. Naeem and
R. S. Ferguson Efficient Local Sampling for Motion
Planning of a Robotic Manipulator . . . 164--175
Terry Tritton and
Joanna Hall and
Angela Rowe and
Sophie Valentine and
Alicja Jedrzejewska Engaging with Robots While Giving Simple
Instructions . . . . . . . . . . . . . . 176--184
Dominik Aufderheide and
Werner Krybus and
Ulf Witkowski Experiences with LEGO MINDSTORMS as an
Embedded and Robotics Plattform within
the Undergraduate Curriculum . . . . . . 185--196
Ekaterina Nikandrova and
Janne Laaksonen and
Ville Kyrki Explorative Sensor-Based Grasp Planning 197--208
Chris Iverach-Brereton and
Andrew Winton and
Jacky Baltes Ice Skating Humanoid Robot . . . . . . . 209--219
Chris Burbridge and
Richard Dearden Learning the Geometric Meaning of
Symbolic Abstractions for Manipulation
Planning . . . . . . . . . . . . . . . . 220--231
Anonymous Front Matter . . . . . . . . . . . . . . ??
Germano Resconi and
Chris Hinde Introduction to Active Sets and
Unification . . . . . . . . . . . . . . 1--36
B. John Oommen and
M. Khaled Hashem Modeling a Teacher in a Tutorial- like
System Using Learning Automata . . . . . 37--62
Ale\vs Horák and
Miroslav Prýmek and
Tadeusz Sikora Power Network Reliability Computations
Using Multi-agent Simulation . . . . . . 63--81
Henryk Piech Sequence Automata for Researching
Consensus Levels . . . . . . . . . . . . 82--101
Hiroshi Takahashi An Analysis of the Influence of
Fundamental Indexing on Financial
Markets through Agent-Based Modeling:
The Fundamentalist and Fundamental
Indexing . . . . . . . . . . . . . . . . 102--120
Sodany Kiv and
Yves Wautelet and
Manuel Kolp Agent-Driven Integration Architecture
for Component-Based Software Development 121--147
Annabel Latham and
Keeley Crockett Adaptive Tutoring in an Intelligent
Conversational Agent System . . . . . . 148--167
Jan Treur Biological and Computational
Perspectives on the Emergence of Social
Phenomena: Shared Understanding and
Collective Power . . . . . . . . . . . . 168--191
Olivier Szymanezyk and
Tom Duckett Agent-Based Crowd Simulation in Airports
Using Games Technology . . . . . . . . . 192--213
Marcin Maleszka and
Ngoc Thanh Nguyen Approximate Algorithms for Solving $O_1$
Consensus Problems Using Complex Tree
Structure . . . . . . . . . . . . . . . 214--227
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
J. Bano and
A. Hostettler and
S. A. Nicolau and
C. Doignon and
H. S. Wu and
M. H. Huang and
L. Soler Simulation of the Abdominal Wall and Its
Arteries after Pneumoperitoneum for
Guidance of Port Positioning in
Laparoscopic Surgery . . . . . . . . . . 1--11
Yoshitaka Masutani and
Mitsutaka Nemoto and
Shohei Hanaoka and
Naoto Hayashi and
Kuni Ohtomo Appearance Similarity Flow for
Quantification of Anatomical Landmark
Uncertainty in Medical Images . . . . . 12--21
Zhenwen Wei and
Caiming Zhang and
Xingqiang Yang and
Xiaofeng Zhang Segmentation of Brain Tumors in CT
Images Using Level Sets . . . . . . . . 22--31
Spyridon Bakas and
Andreas Hoppe and
Katerina Chatzimichail and
Vasileios Galariotis Focal Liver Lesion Tracking in CEUS for
Characterisation Based on Dynamic
Behaviour . . . . . . . . . . . . . . . 32--41
Maryam Hajiesmaeili and
Bashir Bagherinakhjavanlo and
Jamshid Dehmeshki and
Tim Ellis Segmentation of the Hippocampus for
Detection of Alzheimer's Disease . . . . 42--50
Daniel Asarnow and
Rahul Singh Segmentation of Parasites for
High-Content Screening Using Phase
Congruency and Grayscale Morphology . . 51--60
Jian Ye and
Igor Yanovsky and
Bin Dong and
Rima Gandlin and
Achi Brandt and
Stanley Osher Multigrid Narrow Band Surface
Reconstruction via Level Set Functions 61--70
Xiao Chen and
Guangming Wang and
Ying Zhu and
G. Scott Owen Real-Time Simulation of Ship Motions in
Waves . . . . . . . . . . . . . . . . . 71--80
Damon Blanchette and
Emmanuel Agu Adaptive Spectral Mapping for Real-Time
Dispersive Refraction . . . . . . . . . 81--91
Powei Feng and
Joe Warren A Dual Method for Constructing
Multi-material Solids from Ray-Reps . . 92--103
David Sedlacek and
Jiri Zara User Driven $3$D Reconstruction
Environment . . . . . . . . . . . . . . 104--114
Ashish Amresh and
John Femiani and
Christoph Fünfzig Methods for Approximating Loop
Subdivision Using Tessellation Enabled
GPUs . . . . . . . . . . . . . . . . . . 115--125
Kun Liu and
Rhaleb Zayer Bundle Adjustment Constrained Smoothing
for Multi-view Point Cloud Data . . . . 126--137
Houman Rastgar and
Eric Dubois and
Liang Zhang Guided Sampling in Multiple View Robust
Motion Estimation Using Regression
Diagnostics . . . . . . . . . . . . . . 138--147
Paul Doliotis and
Vassilis Athitsos and
Dimitrios Kosmopoulos and
Stavros Perantonis Hand Shape and $3$D Pose Estimation
Using Depth Data from a Single Cluttered
Frame . . . . . . . . . . . . . . . . . 148--158
Billy Ray Fortenbury and
Gutemberg Guerra-Filho Fusing Low-Resolution Depth Maps into
High-Resolution Stereo Matching . . . . 159--168
Ricardo Galego and
Alexandre Bernardino and
José Gaspar Auto-Calibration of Pan-Tilt Cameras
Including Radial Distortion and Zoom . . 169--178
Billy Ray Fortenbury and
Gutemberg Guerra-Filho Robust $2$D/$3$D Calibration Using
RANSAC Registration . . . . . . . . . . 179--188
M. A. Cataño and
J. Climent Keypoint Detection Based on the
Unimodality Test of HOGs . . . . . . . . 189--198
Bo Li and
Afzal Godil and
Henry Johan Non-rigid and Partial $3$D Model
Retrieval Using Hybrid Shape Descriptor
and Meta Similarity . . . . . . . . . . 199--209
Anonymous Front Matter . . . . . . . . . . . . . . ??
Heinz Hofbauer and
Christian Rathgeb and
Andreas Uhl and
Peter Wild Iris Recognition in Image Domain:
Quality-Metric Based Comparators . . . . 1--10
Jan Sedmidubsky and
Jakub Valcik and
Michal Balazia and
Pavel Zezula Gait Recognition Based on Normalized
Walk Cycles . . . . . . . . . . . . . . 11--20
Hwi-Gang Kim and
Eun Jung Lee and
Gang-Joon Yoon and
Sung-Dae Yang and
Eui Chul Lee and
Sang Min Yoon Illumination Normalization for SIFT
Based Finger Vein Authentication . . . . 21--30
Irene Kotsia and
Weiwei Guo and
Ioannis Patras Higher Rank Support Tensor Machines . . 31--40
Inho Choi and
Daijin Kim Multi-scale Integral Modified Census
Transform for Eye Detection . . . . . . 41--50
Avinash Wesley and
Pradeep Buddharaju and
Robert Pienta and
Ioannis Pavlidis A Comparative Analysis of Thermal and
Visual Modalities for Automated Facial
Expression Recognition . . . . . . . . . 51--60
Hammadi Nait-Charif and
Allen Breen and
Paul Thompson Vertebrae Tracking in Lumbar Spinal
Video-Fluoroscopy Using Particle Filters
with Semi-automatic Initialisation . . . 61--69
Giorgio Panin Mutual Information for Multi-modal,
Discontinuity-Preserving Image
Registration . . . . . . . . . . . . . . 70--81
Muhammad Hussain and
Salabat Khan and
Ghulam Muhammad and
George Bebis Mass Detection in Digital Mammograms
Using Optimized Gabor Filter Bank . . . 82--91
Federico M. Sukno and
John L. Waddington and
Paul F. Whelan Comparing $3$D Descriptors for Local
Search of Craniofacial Landmarks . . . . 92--103
Utsab Saha and
Rahul Singh Vision-Based Tracking of Complex
Macroparasites for High-Content
Phenotypic Drug Screening . . . . . . . 104--114
Jonas De Vylder and
Jan Aelterman and
Mado Vandewoestyne and
Trees Lepez and
Dieter Deforce Cell Nuclei Detection Using Globally
Optimal Active Contours with Shape Prior 115--124
Akintola Kolawole and
Alireza Tavakkoli A Novel Gait Recognition System Based on
Hidden Markov Models . . . . . . . . . . 125--134
Abubakrelsedik Karali and
Mohamed ElHelw Motion History of Skeletal Volumes for
Human Action Recognition . . . . . . . . 135--144
Sang Min Yoon and
Gang-Joon Yoon Compressive Matting . . . . . . . . . . 145--154
Tatsuya Yatagawa and
Yasushi Yamaguchi A Template-Based Completion Framework
for Videos with Dynamic Backgrounds . . 155--165
Sherif Azary and
Andreas Savakis $3$D Action Classification Using Sparse
Spatio-temporal Feature Representations 166--175
George Kamberov and
Matt Burlick and
Lazaros Karydas and
Olga Koteoglou SCAR: Dynamic Adaptation for Person
Detection and Persistence Analysis in
Unconstrained Videos . . . . . . . . . . 176--187
Georgios Galanopoulos and
Constantin Papaodysseus and
Dimitiris Arabadjis and
Michael Exarhos Exploiting $3$D Digital Representations
of Ancient Inscriptions to Identify
Their Writer . . . . . . . . . . . . . . 188--198
Ali Alsam and
Hans Jakob Rivertz and
Puneet Sharma What the Eye Did Not See --- a Fusion
Approach to Image Coding . . . . . . . . 199--208
Anonymous Front Matter . . . . . . . . . . . . . . ??
Bahar Behsaz and
Ján Ma\vnuch and
Ladislav Stacho Turing Universality of Step-Wise and
Stage Assembly at Temperature 1 . . . . 1--11
Robert Brijder and
Joris J. M. Gillis A Type System for DNAQL . . . . . . . . 12--24
Ho-Lin Chen and
David Doty and
David Soloveichik Deterministic Function Computation with
Chemical Reaction Networks . . . . . . . 25--42
Anne Condon and
Bonnie Kirkpatrick and
Ján Ma\vnuch Reachability Bounds for Chemical
Reaction Networks and Strand
Displacement Systems . . . . . . . . . . 43--57
Eugen Czeizler and
Alexandru Popa Synthesizing Minimal Tile Sets for
Complex Patterns in the Framework of
Patterned DNA Self-Assembly . . . . . . 58--72
Max H. Garzon and
Kiran C. Bobba A Geometric Approach to Gibbs Energy
Landscapes and Optimal DNA Codeword
Design . . . . . . . . . . . . . . . . . 73--85
Anton Kan and
Koh-ichiroh Shohda and
Akira Suyama A DNA Based Molecular Logic Gate Capable
of a Variety of Logical Operations . . . 86--97
Lila Kari and
Steffen Kopecki Deciding Whether a Regular Language Is
Generated by a Splicing System . . . . . 98--109
Iñaki Sainz de Murieta and
Alfonso Rodríguez-Patón Probabilistic Reasoning with a Bayesian
DNA Device Based on Strand Displacement 110--122
Carsten Svaneborg and
Harold Fellermann DNA Self-Assembly and Computation
Studied with a Coarse-Grained Dynamic
Bonded Model . . . . . . . . . . . . . . 123--134
Chris Thachuk and
Anne Condon Space and Energy Efficient Computation
with DNA Strand Displacement Systems . . 135--149
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Binay Bhattacharya and
Tsunehiko Kameda A Linear Time Algorithm for Computing
Minmax Regret 1-Median on a Tree . . . . 1--12
Ragesh Jaiswal and
Amit Kumar and
Sandeep Sen A Simple $D^2$-Sampling Based PTAS for
$k$-Means and other Clustering Problems 13--24
Evripidis Bampis and
Dimitrios Letsios and
Ioannis Milis Speed Scaling for Maximum Lateness . . . 25--36
Peter Floderus and
Miros\law Kowaluk and
Andrzej Lingas Induced Subgraph Isomorphism: Are Some
Patterns Substantially Easier Than
Others? . . . . . . . . . . . . . . . . 37--48
Ivona Bezáková and
Zachary Langley Contiguous Minimum
Single-Source-Multi-Sink Cuts in
Weighted Planar Graphs . . . . . . . . . 49--60
Xin Han and
Yasushi Kawase and
Kazuhisa Makino Online Knapsack Problem with Removal
Cost . . . . . . . . . . . . . . . . . . 61--73
Mingyu Xiao and
Hiroshi Nagamochi An Improved Exact Algorithm for TSP in
Degree-4 Graphs . . . . . . . . . . . . 74--85
Juanjo Rué and
Ignasi Sau and
Dimitrios M. Thilikos Dynamic Programming for $H$-minor-free
Graphs . . . . . . . . . . . . . . . . . 86--97
Monaldo Mastrolilli and
Georgios Stamoulis Restricted Max-Min Fair Allocations with
Inclusion-Free Intervals . . . . . . . . 98--108
Maxim A. Babenko and
Kamil Salikhov and
Stepan Artamonov An Improved Algorithm for Packing
T-Paths in Inner Eulerian Networks . . . 109--120
René van Bevern Towards Optimal and Expressive
Kernelization for $d$-Hitting Set . . . 121--132
Jean-François Couturier and
Pinar Heggernes and
Pim van 't Hof Maximum Number of Minimal Feedback
Vertex Sets in Chordal Graphs and
Cographs . . . . . . . . . . . . . . . . 133--144
Pan Peng A Local Algorithm for Finding Dense
Bipartite-Like Subgraphs . . . . . . . . 145--156
Ton Kloks and
Sheung-Hung Poon and
Chin-Ting Ung and
Yue-Li Wang Algorithms for the Strong Chromatic
Index of Halin Graphs,
Distance-Hereditary Graphs and Maximal
Outerplanar Graphs . . . . . . . . . . . 157--168
Biing-Feng Wang and
Chih-Hsuan Li On the Minimum Degree Hypergraph Problem
with Subset Size Two and the Red-Blue
Set Cover Problem with the Consecutive
Ones Property . . . . . . . . . . . . . 169--180
L. Sunil Chandran and
Deepak Rajendraprasad Rainbow Colouring of Split and Threshold
Graphs . . . . . . . . . . . . . . . . . 181--192
Alexandru Popa Approximating the Rainbow --- Better
Lower and Upper Bounds . . . . . . . . . 193--203
Rémy Belmonte and
Pinar Heggernes and
Pim van 't Hof and
Reza Saei Ramsey Numbers for Line Graphs and
Perfect Graphs . . . . . . . . . . . . . 204--215
Oswin Aichholzer and
Matias Korman and
Alexander Pilz Geodesic Order Types . . . . . . . . . . 216--227
Stephane Durocher and
Saeed Mehrabi Computing Partitions of Rectilinear
Polygons with Minimum Stabbing Number 228--239
Anonymous Front Matter . . . . . . . . . . . . . . ??
Mohammad Shafiul Alam and
Md. Monirul Islam and
Kazuyuki Murase Artificial Bee Colony Algorithm with
Improved Explorations for Numerical
Function Optimization . . . . . . . . . 1--8
Murilo Zangari and
Wesley Romão and
Ademir Aparecido Constantino Extensions of Ant-Miner Algorithm to
Deal with Class Imbalance Problem . . . 9--18
Zareen Mehboob and
Hujun Yin and
Sophie M. Wuerger and
Laura M. Parkes Multivoxel Pattern Analysis Using
Information-Preserving EMD . . . . . . . 19--26
Rafael Stubs Parpinelli and
Heitor Silvério Lopes Population Resizing Using Nonlinear
Dynamics in an Ecology-Based Approach 27--34
Piyabute Fuangkhon and
Thitipong Tanprasert Multi-class Contour Preserving
Classification . . . . . . . . . . . . . 35--42
Luke M. Davis and
Barry-John Theobald and
Anthony Bagnall Automated Bone Age Assessment Using
Feature Extraction . . . . . . . . . . . 43--51
Washington Silva and
Ginalber Serra A Hybrid Approach Based on
DCT-Genetic-Fuzzy Inference System for
Speech Recognition . . . . . . . . . . . 52--59
Yong Shi and
Brian Graham An Approach to Reshaping Clusters for
Nearest Neighbor Search . . . . . . . . 60--67
Jon Hills and
Luke M. Davis and
Anthony Bagnall Interestingness Measures for Fixed
Consequent Rules . . . . . . . . . . . . 68--75
Jing Huo and
Yang Gao and
Wanqi Yang and
Hujun Yin Abnormal Event Detection via
Multi-Instance Dictionary Learning . . . 76--83
Luneque Silva Junior and
Nadia Nedjah and
Luiza de Macedo Mourelle Static Packet Routing in NoC Platform
Using ACO-Based Algorithms . . . . . . . 84--91
Cordeiro F. R. and
Lima S. M. L. and
Silva-Filho A. G. and
Santos W. P. Segmentation of Mammography by Applying
Extreme Learning Machine in Tumor
Detection . . . . . . . . . . . . . . . 92--100
Tiago Henrique dos Santos and
Alessandro Goedtel and
Sérgio Augusto Oliveira da Silva An ANN Speed Observer Applied to
Three-Phase Induction Motor . . . . . . 101--108
José M. Fernández-de-Alba and
Pablo Campillo and
Rubén Fuentes-Fernández and
Juan Pavón Opportunistic Sensor Interpretation in a
Virtual Smart Environment . . . . . . . 109--116
Ricardo de Souza Jacomini and
Marcelo Zanchetta do Nascimento and
Rogério Daniel Dantas Comparison of PCA and ANOVA for
Information Selection of CC and MLO
Views in Classification of Mammograms 117--126
Rosana Veroneze and
André R. Gonçalves and
Fernando J. Von Zuben A Multiobjective Analysis of Adaptive
Clustering Algorithms for the Definition
of RBF Neural Network Centers in
Regression Problems . . . . . . . . . . 127--134
Michel M. dos Santos and
Mêuser J. S. Valença and
Wellington P. dos Santos Mean Multiclass Type I and II Errors for
Training Multilayer Perceptron with
Particle Swarm in Image Segmentation . . 135--142
Chidambaram Chidambaram and
Marlon Subtil Marçal and
Leyza Baldo Dorini and
Hugo Vieira Neto An Improved ABC Algorithm Approach Using
SURF for Face Identification . . . . . . 143--150
Ariadne A. Costa and
Antonio C. Roque and
Silvio Morato and
Renato Tinós A Model Based on Genetic Algorithm for
Investigation of the Behavior of Rats in
the Elevated Plus-Maze . . . . . . . . . 151--158
Ahmed A. A. Esmin and
Stan Matwin Data Clustering Using Hybrid Particle
Swarm Optimization . . . . . . . . . . . 159--166
Anonymous Front Matter . . . . . . . . . . . . . . ??
Martín Abadi Software Security: a Formal Perspective 1--5
Asaf Degani Formal Methods in the Wild: Trains,
Planes, & Automobile . . . . . . . . . . 6--6
Alan Wassyng Who Are We, and What Are We Doing Here? 7--9
Fides Aarts and
Faranak Heidarian and
Harco Kuppens and
Petur Olsen Automata Learning through Counterexample
Guided Abstraction Refinement . . . . . 10--27
María Alpuente and
Demis Ballis and
Francisco Frechina and
Daniel Romero Julienne: a Trace Slicer for Conditional
Rewrite Theories . . . . . . . . . . . . 28--32
Étienne André and
Laurent Fribourg and
Ulrich Kühne and
Romain Soulat IMITATOR 2.5: a Tool for Analyzing
Robustness in Scheduling Problems . . . 33--36
Virginia Aponte and
Pierre Courtieu and
Yannick Moy and
Marc Sango Maximal and Compositional Pattern-Based
Loop Invariants . . . . . . . . . . . . 37--51
Mikael Asplund and
Atif Manzoor and
Mélanie Bouroche and
Siobh\`an Clarke A Formal Approach to Autonomous Vehicle
Coordination . . . . . . . . . . . . . . 52--67
Howard Barringer and
Yli\`es Falcone and
Klaus Havelund and
Giles Reger Quantified Event Automata: Towards
Expressive and Efficient Runtime
Monitors . . . . . . . . . . . . . . . . 68--84
Andreas Bauer and
Yli\`es Falcone Decentralised LTL Monitoring . . . . . . 85--100
Soufiene Benkirane and
Rachel Norman and
Erin Scott and
Carron Shankland Measles Epidemics and PEPA: An
Exploration of Historic Disease Dynamics
Using Process Algebra . . . . . . . . . 101--115
Matthieu Carlier and
Catherine Dubois and
Arnaud Gotlieb A Certified Constraint Solver over
Finite Domains . . . . . . . . . . . . . 116--131
Maria Christakis and
Peter Müller and
Valentin Wüstholz Collaborative Verification and Testing
with Explicit Assumptions . . . . . . . 132--146
Denis Cousineau and
Damien Doligez and
Leslie Lamport and
Stephan Merz TLA$^+$ Proofs . . . . . . . . . . . . . 147--154
Nicolás D'Ippolito and
Victor Braberman and
Nir Piterman The Modal Transition System Control
Problem . . . . . . . . . . . . . . . . 155--170
Julien Dormoy and
Olga Kouchnarenko and
Arnaud Lanoix When Structural Refinement of Components
Keeps Temporal Properties over
Reconfigurations . . . . . . . . . . . . 171--186
Evren Ermis and
Martin Schäf and
Thomas Wies Error Invariants . . . . . . . . . . . . 187--201
Mathieu Giorgino and
Martin Strecker Correctness of Pointer Manipulating
Algorithms Illustrated by a Verified BDD
Construction . . . . . . . . . . . . . . 202--216
James Heather and
Steve Schneider A Formal Framework for Modelling
Coercion Resistance and Receipt Freeness 217--231
Robert M. Hierons and
Mercedes G. Merayo and
Manuel Núñez Using Time to Add Order to Distributed
Testing . . . . . . . . . . . . . . . . 232--246
Anonymous Front Matter . . . . . . . . . . . . . . ??
Nouha Abid and
Silvano Dal Zilio Real-Time Specification Patterns and
Tools . . . . . . . . . . . . . . . . . 1--15
Elvira Albert and
Bjarte M. Òstvold Automated Extraction of Abstract
Behavioural Models from JMS Applications 16--31
Nicolas Ayache and
Roberto M. Amadio Certifying and Reasoning on Cost
Annotations in C Programs . . . . . . . 32--46
Christel Baier and
Marcus Daum and
Benjamin Engel Waiting for Locks: How Long Does It
Usually Take? . . . . . . . . . . . . . 47--62
Victor Bandur and
Wolfram Kahl and
Alan Wassyng Microcontroller Assembly Synthesis from
Timed Automaton Task Specifications . . 63--77
Jiri Barnat and
Jan Beran and
Lubos Brim Tool Chain to Support Automated Formal
Verification of Avionics Simulink
Designs . . . . . . . . . . . . . . . . 78--92
Edd Barrett and
Andy King Range Analysis of Binaries with Minimal
Effort . . . . . . . . . . . . . . . . . 93--107
Lo\"\ic Correnson and
Julien Signoles Combining Analyses for C Program
Verification . . . . . . . . . . . . . . 108--130
Sjoerd Cranen Model Checking the FlexRay Startup Phase 131--145
Rainer Droste and
Christoph Läsche Model-Based Risk Assessment Supporting
Development of HSE Plans for Safe
Offshore Operations . . . . . . . . . . 146--161
Luca Ferrucci and
Dino Mandrioli Modular Automated Verification of
Flexible Manufacturing Systems with
Metric Temporal Logic and Non-Standard
Analysis . . . . . . . . . . . . . . . . 162--176
Vlad Popa and
Wolfgang Schwitzer Optimizing the Robustness of Software
against Communication Latencies in
Distributed Reactive Embedded Systems 177--191
Konrad Siek and
Pawe\l T. Wojciechowski A Formal Design of a Tool for Static
Analysis of Upper Bounds on Object Calls
in Java . . . . . . . . . . . . . . . . 192--206
Ji\vrí Slabý and
Jan Strej\vcek and
Marek Trtík Checking Properties Described by State
Machines: On Synergy of Instrumentation,
Slicing, and Symbolic Execution . . . . 207--221
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Robert Kowalski and
Fariba Sadri A Logic-Based Framework for Reactive
Systems . . . . . . . . . . . . . . . . 1--15
Marie-Laure Mugnier Ontology-Based Query Answering with
Existential Rules . . . . . . . . . . . 16--16
Valerio Cosentino and
Jordi Cabot and
Patrick Albert and
Philippe Bauquel and
Jacques Perronnet A Model Driven Reverse Engineering
Framework for Extracting Business Rules
Out of a Java Application . . . . . . . 17--31
Mustafa Hashmi and
Guido Governatori and
Moe Thandar Wynn Business Process Data Compliance . . . . 32--46
Bruno Berstel-Da Silva Formalizing Both Refraction-Based and
Sequential Executions of Production Rule
Programs . . . . . . . . . . . . . . . . 47--61
Adil El Ghali and
Amina Chniti and
Hugues Citeau Bringing OWL Ontologies to the Business
Rules Users . . . . . . . . . . . . . . 62--76
Abdooulaye Guissé and
François Lévy and
Adeline Nazarenko From Regulatory Texts to BRMS: How to
Guide the Acquisition of Business Rules? 77--91
Saleem Malik and
Imran Sarwar Bajwa A Rule Based Approach for Business Rule
Generation from Business Process Models 92--99
Adrian Paschke and
Harold Boley and
Zhili Zhao and
Kia Teymourian and
Tara Athan Reaction RuleML 1.0: Standardized
Semantic Reaction Rules . . . . . . . . 100--119
Theodore Patkos and
Abdelghani Chibani and
Dimitris Plexousakis and
Yacine Amirat A Production Rule-Based Framework for
Causal and Epistemic Reasoning . . . . . 120--135
Katerina Ksystra and
Nikolaos Triantafyllou and
Petros Stefaneas On the Algebraic Semantics of Reactive
Rules . . . . . . . . . . . . . . . . . 136--150
Stefano Bragaglia and
Federico Chesani and
Paola Mello and
Davide Sottara A Rule-Based Calculus and Processing of
Complex Events . . . . . . . . . . . . . 151--166
Stefania Costantini and
Giovanni De Gasperis Complex Reactivity with Preferences in
Rule-Based Agents . . . . . . . . . . . 167--181
Hans Weigand and
Adrian Paschke The Pragmatic Web: Putting Rules in
Context . . . . . . . . . . . . . . . . 182--192
Kalliopi Kravari and
Nick Bassiliades HARM: a Hybrid Rule-Based Agent
Reputation Model Based on Temporal
Defeasible Logic . . . . . . . . . . . . 193--207
Benjamin Jailly and
Christophe Gravier and
Julien Subercaze and
Marius Preda and
Jacques Fayolle Whispering Interactions to the End User
Using Rules . . . . . . . . . . . . . . 208--214
Iosif Viktoratos and
Athanasios Tsadiras and
Nick Bassiliades Personalizing Location Information
through Rule-Based Policies . . . . . . 215--223
Yan Tang Demey and
Trung-Kien Tran Using $\mathcal{SOIQ}$(D) to Formalize
Semantics within a Semantic Decision
Table . . . . . . . . . . . . . . . . . 224--239
Sotiris Batsakis and
Euripides G. M. Petrakis Imposing Restrictions over Temporal
Properties in OWL: a Rule-Based Approach 240--247
Jesús M. Almendros-Jiménez OWL RL in Logic Programming: Querying,
Reasoning and Inconsistency Explanations 248--255
Anonymous Front Matter . . . . . . . . . . . . . . ??
Kazufumi Nishida and
Koji Nakano and
Yasuaki Ito Accelerating the Dynamic Programming for
the Optimal Polygon Triangulation on the
GPU . . . . . . . . . . . . . . . . . . 1--15
Xu Huang and
Dharmendra Sharma and
Muhammad Ahmed Security Computing for the Resiliency of
Protecting from Internal Attacks in
Distributed Wireless Sensor Networks . . 16--29
Shin-Yeu Lin and
Xian-Chang Guo Parallel Algorithm for Nonlinear Network
Optimization Problems and Real-Time
Applications . . . . . . . . . . . . . . 30--40
Max Schneider and
Nikola Belic and
Christoph Sambale and
Ulrich Hofmann and
Dietmar Fey Optimization of a Short-Range Proximity
Effect Correction Algorithm in E-Beam
Lithography Using GPGPUs . . . . . . . . 41--55
Nikolaos Alachiotis and
Pavlos Pavlidis and
Alexandros Stamatakis Exploiting Multi-grain Parallelism for
Efficient Selective Sweep Detection . . 56--68
Eraldo P. Marinho and
Alexandro Baldassin Vectorized Algorithms for Quadtree
Construction and Descent . . . . . . . . 69--82
Vu Thien Nga Nguyen and
Raimund Kirner and
Frank Penczek A Multi-level Monitoring Framework for
Stream-Based Coordination Programs . . . 83--98
Koji Nakano An Optimal Parallel Prefix-Sums
Algorithm on the Memory Machine Models
for GPUs . . . . . . . . . . . . . . . . 99--113
Sebastian Schaetz and
Martin Uecker A Multi-GPU Programming Library for
Real-Time Applications . . . . . . . . . 114--128
Sarad Venugopalan and
Oliver Sinnen Optimal Linear Programming Solutions for
Multiprocessor Scheduling with
Communication Delays . . . . . . . . . . 129--138
Yoshihiro Ichinomiya and
Motoki Amagasaki and
Masahiro Iida and
Morihiro Kuga A Bitstream Relocation Technique to
Improve Flexibility of Partial
Reconfiguration . . . . . . . . . . . . 139--152
Chuan Wang and
Jianhua Gu and
Yunlan Wang and
Tianhai Zhao A Hybrid Heuristic-Genetic Algorithm for
Task Scheduling in Heterogeneous
Multi-core System . . . . . . . . . . . 153--170
Li Wang and
Jing Liu and
Jingtong Hu and
Qingfeng Zhuge and
Duo Liu and
Edwin H.-M. Sha Efficient Task Assignment on
Heterogeneous Multicore Systems
Considering Communication Overhead . . . 171--185
Eddy Caron and
Frédéric Desprez and
Adrian Muresan and
Frédéric Suter Budget Constrained Resource Allocation
for Non-deterministic Workflows on an
IaaS Cloud . . . . . . . . . . . . . . . 186--201
Hiroki Nakahara and
Hiroyuki Nakanishi and
Tsutomu Sasao On a Wideband Fast Fourier Transform
Using Piecewise Linear Approximations:
Application to a Radio Telescope
Spectrometer . . . . . . . . . . . . . . 202--217
Wadoud Bousdira and
Frédéric Loulergue and
Julien Tesson A Verified Library of Algorithmic
Skeletons on Evenly Distributed Arrays 218--232
Takayuki Umeda and
Keiichiro Fukazawa Performance Measurement of Parallel
Vlasov Code for Space Plasma on Various
Scalar-Type Supercomputer Systems . . . 233--240
Andrew A. Haigh and
Bradley E. Treeby and
Eric C. McCreath Ultrasound Simulation on the Cell
Broadband Engine Using the Westervelt
Equation . . . . . . . . . . . . . . . . 241--252
Nianmin Yao and
Yong Han and
Shaobin Cai and
Qilong Han Study on the Data Flow Balance in NFS
Server with iSCSI . . . . . . . . . . . 253--272
Christoph M. Kirsch and
Hannes Payer and
Harald Röck and
Ana Sokolova Performance, Scalability, and Semantics
of Concurrent FIFO Queues . . . . . . . 273--287
Anonymous Front Matter . . . . . . . . . . . . . . ??
Jih-Ching Chiu and
Kai-Ming Yang and
Chen-Ang Wong Analytical Modeling for
Multi-transaction Bus on Distributed
Systems . . . . . . . . . . . . . . . . 1--9
LihChyun Shu and
Ying-Cheng Su and
Chang-Ming Tasi and
Huey-Min Sun Leveraging the Strengths of
Transactional Memory While Maintaining
System Performance for a Multiplayer
Gaming Application . . . . . . . . . . . 10--20
Il-Young Kim and
Jong-Kook Kim Enhancing the Performance of a
Distributed Mobile Computing Environment
by Topology Construction . . . . . . . . 21--30
Yi Dai and
Ke-fei Wang and
Wei-xia Xu and
He-ying Zhang and
Shao-gang Wang Frame Error Rate Testing for High Speed
Optical Interconnect . . . . . . . . . . 31--39
Ehsan Atoofian and
Amir Ghanbari Bavarsad Maintaining Consistency in Software
Transactional Memory through Dynamic
Versioning Tuning . . . . . . . . . . . 40--49
Da-Ren Chen and
Chiun-Chieh Hsu and
You-Shyang Chen and
Jun-Fu Guo Solving a 2-Covered Path Problem with
Variable Radii for Wireless Sensor
Networks . . . . . . . . . . . . . . . . 50--61
Yoshimasa Ohnishi and
Takaichi Yoshida Design of an Application-Dependent
Static-Based Shared Memory Network . . . 62--71
Anh P. Nguyen and
Thuc D. Nguyen Determining Quality of S-Boxes Using
Pseudo Random Sequences Generated from
Stream Ciphers . . . . . . . . . . . . . 72--79
Weixing Ji and
Yizhuo Wang and
Zhi Huang and
Junqing Zhao and
Xi Li Exploring Object-Level Parallelism on
Chip Multi-processors . . . . . . . . . 80--89
Yi-Chun Wang and
Justie Su-Tzu Juan The Hamiltonicity of WK-Recursive
Pyramid . . . . . . . . . . . . . . . . 90--99
Djawida Dib and
Nikos Parlavantzas and
Christine Morin Towards Multi-level Adaptation for
Distributed Operating Systems and
Applications . . . . . . . . . . . . . . 100--109
Chih-Chiang Wei FIDs Classifier for Artificial
Intelligence and Its Application . . . . 110--119
Ahmad Shukri Mohd Noor and
Mustafa Mat Deris and
Tutut Herawan and
Mohamad Nor Hassan On Affirmative Adaptive Failure
Detection . . . . . . . . . . . . . . . 120--129
Wen-Ta Lee and
Min-Sheng Chang and
Wei-Chieh Shen A New Low Latency Parallel Turbo Decoder
Employing Parallel Phase Decoding Method 130--139
Fouad B. Chedid A Regular Group Quorum System of Degree
$\lceil \sqrt{n\slash 2}\rceil$ . . . . 140--147
Fouad B. Chedid A Note on Developing Optimal and
Scalable Parallel Two-List Algorithms 148--155
Kai Peng and
Hua Zou and
Rongheng Lin and
Fangchun Yang Small Business-Oriented Index
Construction of Cloud Data . . . . . . . 156--165
Jie Liu and
Lihua Chi and
Chunye Gong and
Han Xu and
Jie Jiang and
Yihui Yan and
Qingfeng Hu High-Performance Matrix Multiply on a
Massively Multithreaded Fiteng1000
Processor . . . . . . . . . . . . . . . 166--176
Dongjin Yu and
Wei Wu and
Suhang Zheng and
Zhixiang Zhu BIDE-Based Parallel Mining of Frequent
Closed Sequences with MapReduce . . . . 177--186
Sung Il Kim and
Jong-Kook Kim and
Hyoung Uk Ha and
Tae Ho Kim and
Kyu Hyun Choi Efficient Task Scheduling for Hard
Real-Time Tasks in Asymmetric Multicore
Processors . . . . . . . . . . . . . . . 187--196
Anonymous Front Matter . . . . . . . . . . . . . . ??
A. Thomas and
B. John Oommen Optimal ``Anti-Bayesian'' Parametric
Pattern Classification Using Order
Statistics Criteria . . . . . . . . . . 1--13
Asja Fischer and
Christian Igel An Introduction to Restricted Boltzmann
Machines . . . . . . . . . . . . . . . . 14--36
Zicheng Liu Human Activity Recognition with $2$D and
$3$D Cameras . . . . . . . . . . . . . . 37--37
Gabriel Taubin Smooth Signed Distance Surface
Reconstruction and Applications . . . . 38--45
Juan P. Wachs Robot, Pass Me the Scissors! How Robots
Can Assist Us in the Operating Room . . 46--57
José Antonio Rodriguez-Serrano Pattern Recognition in Transportation 58--58
Andrea Bottino and
Aldo Laurentini The Intrinsic Dimensionality of
Attractiveness: a Study in Face Profiles 59--66
Ajay Jaiswal and
Nitin Kumar and
R. K. Agrawal A Hybrid of Principal Component Analysis
and Partial Least Squares for Face
Recognition across Pose . . . . . . . . 67--73
Enrique Ramón-Balmaseda and
Javier Lorenzo-Navarro and
Modesto Castrillón-Santana Gender Classification in Large Databases 74--81
Modesto Castrillón-Santana and
Daniel Hernández-Sosa and
Javier Lorenzo-Navarro Combining Face and Facial Feature
Detectors for Face Detection Performance
Improvement . . . . . . . . . . . . . . 82--89
Ariel Morelli Andres and
Sebastian Padovani and
Mariano Tepper and
Marta Mejail and
Julio Jacobo Randomized Face Recognition on Partially
Occluded Images . . . . . . . . . . . . 90--97
Noslen Hernández and
Yoanna Martínez-Díaz and
Dania Porro-Muñoz and
Heydi Méndez-Vázquez Face Recognition: Would Going Back to
Functional Nature Be a Good Idea? . . . 98--105
Yoanna Martínez-Díaz and
Heydi Méndez-Vázquez and
Yenisel Plasencia-Calaña Dissimilarity Representations Based on
Multi-Block LBP for Face Detection . . . 106--113
Marta Gomez-Barrero and
Javier Galbally and
Pedro Tome and
Julian Fierrez On the Vulnerability of Iris-Based
Systems to a Software Attack Based on a
Genetic Algorithm . . . . . . . . . . . 114--121
Fabio A. González and
David Bermeo and
Laura Ramos and
Olfa Nasraoui On the Robustness of Kernel-Based
Clustering . . . . . . . . . . . . . . . 122--129
Diego Hernán Peluffo-Ordóñez and
Carlos Daniel Acosta-Medina An Improved Multi-Class Spectral
Clustering Based on Normalized Cuts . . 130--137
Hernán C. Ahumada and
Pablo M. Granitto A Simple Hybrid Method for
Semi-Supervised Learning . . . . . . . . 138--145
Vladimir V. Ryazanov Clustering of Incomplete Data and
Evaluation of Clustering Quality . . . . 146--153
Miguel A. Duval-Poo and
Joan Sosa-García and
Alejandro Guerra-Gandón and
Sandro Vega-Pons A New Classifier Combination Scheme
Using Clustering Ensemble . . . . . . . 154--161
Miriam Mónica Duarte-Villaseñor and
Jesús Ariel Carrasco-Ochoa Nested Dichotomies Based on Clustering 162--169
Anonymous Front Matter . . . . . . . . . . . . . . ??
S. A. Abramov and
M. Petkov\vsek On Polynomial Solutions of Linear
Partial Differential and
($q$-)Difference Equations . . . . . . . 1--11
Prabhanjan Ananth and
Ambedkar Dukkipati An Algebraic Characterization of Rainbow
Connectivity . . . . . . . . . . . . . . 12--21
Alexander Batkhin Application of the Method of Asymptotic
Solution to One Multi-Parameter Problem 22--33
Marco Bodrato and
Alberto Zanoni A New Algorithm for Long Integer Cube
Computation with Some Insight into
Higher Powers . . . . . . . . . . . . . 34--46
Pavel Bourdykine and
Stephen M. Watt Lightweight Abstraction for Mathematical
Computation in Java . . . . . . . . . . 47--59
Alexander D. Bruno and
Victor F. Edneral Calculation of Normal Forms of the
Euler--Poisson Equations . . . . . . . . 60--71
Dzmitry A. Budzko and
Alexander N. Prokopenya Stability of Equilibrium Positions in
the Spatial Circular Restricted
Four-Body Problem . . . . . . . . . . . 72--83
Hassan Errami and
Werner M. Seiler Computing Hopf Bifurcations in Chemical
Reaction Networks Using Reaction
Coordinates . . . . . . . . . . . . . . 84--97
Vladimir Gerdt and
Amir Hashemi Comprehensive Involutive Systems . . . . 98--116
Mark Giesbrecht and
Albert Heinle A Polynomial-Time Algorithm for the
Jacobson Form of a Matrix of Ore
Polynomials . . . . . . . . . . . . . . 117--128
Jaume Giné and
Colin Christopher and
Mateja Pre\vsern The Resonant Center Problem for a 2:-3
Resonant Cubic Lotka--Volterra System 129--142
Dima Grigoriev and
Andreas Weber Complexity of Solving Systems with Few
Independent Monomials and Applications
to Mass-Action Kinetics . . . . . . . . 143--154
Alexander Gusev and
Sergue Vinitsky Symbolic-Numerical Calculations of
High-$|m|$ Rydberg States and Decay
Rates in Strong Magnetic Fields . . . . 155--171
Amir Hashemi and
Michael Schweinfurter Quasi-stability versus Genericity . . . 172--184
Gregor Kemper Invariant Theory: Applications and
Computations . . . . . . . . . . . . . . 185--185
Jia Li and
Jin-San Cheng and
Elias P. Tsigaridas Local Generic Position for Root
Isolation of Zero-Dimensional Triangular
Polynomial Systems . . . . . . . . . . . 186--197
Steffen Marcus and
Marc Moreno Maza and
Paul Vrbik On Fulton's Algorithm for Computing
Intersection Multiplicities . . . . . . 198--211
Marc Mezzarobba A Note on the Space Complexity of Fast
D-Finite Function Evaluation . . . . . . 212--223
Marc Moreno Maza and
Éric Schost and
Paul Vrbik Inversion Modulo Zero-Dimensional
Regular Chains . . . . . . . . . . . . . 224--235
Michael Monagan and
Roman Pearce Sparse Polynomial Powering Using Heaps 236--247
Anonymous Front Matter . . . . . . . . . . . . . . ??
Fathul Wahid The Current State of Research on
eGovernment in Developing Countries: a
Literature Review . . . . . . . . . . . 1--12
Nurdin Nurdin and
Rosemary Stockdale and
Helana Scheepers The Influence of External Institutional
Pressures on Local E-Government Adoption
and Implementation: a Coercive
Perspective within an Indonesian Local
E-Government Context . . . . . . . . . . 13--26
Yvon van den Boer and
Lidwien van de Wijngaert and
Willem Pieterson and
Rex Arendsen On the Interaction of Source and Channel
Choice in the Government-to-Business
Context . . . . . . . . . . . . . . . . 27--39
Suha Alawadhi and
Armando Aldama-Nalda and
Hafedh Chourabi and
J. Ramon Gil-Garcia and
Sofia Leung Building Understanding of Smart City
Initiatives . . . . . . . . . . . . . . 40--53
Nicole Maarse and
Marijn Janssen The Need to Adjust Lean to the Public
Sector . . . . . . . . . . . . . . . . . 54--65
Katarina L. Gidlund `Demand Driven Development of Public
e-Services' . . . . . . . . . . . . . . 66--77
Damiano Falcioni and
Andrea Polini and
Alberto Polzonetti and
Barbara Re Improving PA Business Processes through
Modeling, Analysis, and Reengineering 78--89
Anneke Zuiderwijk and
Marijn Janssen and
Ronald Meijer and
Sunil Choenni and
Yannis Charalabidis Issues and Guiding Principles for
Opening Governmental Judicial Research
Data . . . . . . . . . . . . . . . . . . 90--101
Panagiotis Panagiotopoulos and
Alinaghi Ziaee Bigdeli and
Steven Sams `5 Days in August' --- How London Local
Authorities Used Twitter during the 2011
Riots . . . . . . . . . . . . . . . . . 102--113
Mark Scannell and
Frank Bannister Shared Services in Irish Local
Government . . . . . . . . . . . . . . . 114--125
André Andrade and
Luiz Antonio Joia Information Technology and the
Efficiency of the Brazilian Judiciary
System . . . . . . . . . . . . . . . . . 126--136
Walter T. de Vries and
Gianluca Miscione The Tool That Has to Build Itself: The
Case of Dutch Geo-Data . . . . . . . . . 137--148
Bernd Zwattendorfer and
Arne Tauber and
Klaus Stranacher and
Peter Reichstädter Cross-Border Legal Identity Management 149--161
Juha Lemmetti and
Samuli Pekkola Understanding Enterprise Architecture:
Perceptions by the Finnish Public Sector 162--173
Arild Jansen The Understanding of ICTs in Public
Sector and Its Impact on Governance . . 174--186
Anne Fleur van Veenstra and
Marijn Janssen Investigating Outcomes of T-Government
Using a Public Value Management Approach 187--197
Òystein Sæbò E-government in Tanzania: Current Status
and Future Challenges . . . . . . . . . 198--209
Mauricio Solar and
Gastón Concha and
Luis Meijueiro A Model to Assess Open Government Data
in Public Agencies . . . . . . . . . . . 210--221
John Krogstie Comparing Private and Public Sector on
Information Systems Development and
Maintenance Efficiency . . . . . . . . . 222--233
Dalibor Stanimirovic and
Tina Jukic and
Janja Nograsek and
Mirko Vintar Analysis of the Methodologies for
Evaluation of E-Government Policies . . 234--245
Anonymous Front Matter . . . . . . . . . . . . . . ??
Peter Dahlgren Social Media and Counter-Democracy: The
Contingences of Participation . . . . . 1--12
Steffen Albrecht E-Consultations: a Review of Current
Practice and a Proposal for Opening Up
the Process . . . . . . . . . . . . . . 13--24
Marius Rohde Johannessen and
Leif Skiftenes Flak and
Òystein Sæbò Choosing the Right Medium for Municipal
eParticipation Based on Stakeholder
Expectations . . . . . . . . . . . . . . 25--36
Åke Grönlund and
Iryna Susha A Communication Genre Perspective on
e-Petitioning: The Case of the Citizens'
Initiative . . . . . . . . . . . . . . . 37--48
Eleni Panopoulou and
Efpraxia Dalakiouridou and
Efthimios Tambouris and
Konstantinos Tarabanis Citizens' Evaluation of an Online
Argument Visualisation Platform for
eParticipation . . . . . . . . . . . . . 49--60
Neil Benn and
Ann Macintosh PolicyCommons --- Visualizing Arguments
in Policy Consultation . . . . . . . . . 61--72
Shun Shiramatsu and
Robin M. E. Swezey and
Hiroyuki Sano and
Norifumi Hirata and
Tadachika Ozono Structuring Japanese Regional
Information Gathered from the Web as
Linked Open Data for Use in Concern
Assessment . . . . . . . . . . . . . . . 73--84
Georg Aichholzer and
Doris Allhutter and
Stefan Strauß Using Online Carbon Calculators for
Participation in Local Climate
Initiatives . . . . . . . . . . . . . . 85--96
Sabrina Scherer and
Maria A. Wimmer Reference Process Model for
Participatory Budgeting in Germany . . . 97--111
Olivier Glassey and
Camille-Angelo Aglione Getting Teenagers to Participate: a
Survey of the Youth Council of the City
of Lausanne . . . . . . . . . . . . . . 112--119
Adam Z. Wyner and
Katie Atkinson and
Trevor Bench-Capon Model Based Critique of Policy Proposals 120--131
Roman Klinger and
Philipp Senger and
Sumit Madan and
Michal Jacovi Online Communities Support
Policy-Making: The Need for Data
Analysis . . . . . . . . . . . . . . . . 132--143
Cleyton Slaviero and
Ana Cristina Bicharra Garcia and
Cristiano Maciel Exploiting eParticipation Using an
Ontological Approach . . . . . . . . . . 144--155
Yannis Charalabidis and
Anna Triantafillou and
Vangelis Karkaletsis and
Euripidis Loukis Public Policy Formulation through Non
Moderated Crowdsourcing in Social Media 156--169
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Paola Bonizzoni The Holy Grail: Finding the Genetic
Bases of Phenotypic Characters . . . . . 1--1
Cristian S. Calude and
Elena Calude and
Melissa S. Queen Inductive Complexity of P versus NP
Problem . . . . . . . . . . . . . . . . 2--9
René Doursat Advances in Embryomorphic Engineering 10--10
Jack H. Lutz Reasoning As Though . . . . . . . . . . 11--11
Maurice Margenstern Universality and the Halting Problem for
Cellular Automata in Hyperbolic Spaces:
The Side of the Halting Problem . . . . 12--33
Matthew J. Patitz An Introduction to Tile-Based
Self-assembly . . . . . . . . . . . . . 34--62
Antoine Spicher and
Olivier Michel and
Jean-Louis Giavitto Spatial Computing in MGS . . . . . . . . 63--69
Erzsébet Csuhaj-Varjú and
Marian Gheorghe and
Mike Stannett P Systems Controlled by General
Topologies . . . . . . . . . . . . . . . 70--81
Rudolf Freund and
Yurii Rogozhin and
Sergey Verlan P Systems with Minimal Left and Right
Insertion and Deletion . . . . . . . . . 82--93
Sama Goliaei and
Mohammad-Hadi Foroughmand-Araabi Lower Bounds on the Complexity of the
Wavelength-Based Machine . . . . . . . . 94--105
Cristian Grozea and
Florin Manea and
Mike Müller and
Dirk Nowotka String Matching with Involutions . . . . 106--117
Frederic Gruau and
Luidnel Maignan Distributed Execution of Automata
Networks on a Computing Medium:
Introducing IfAny Machines . . . . . . . 118--129
Gerd Gruenert and
Gabi Escuela and
Peter Dittrich Symbol Representations in Evolving
Droplet Computers . . . . . . . . . . . 130--140
Joachim Hertel Inductive Complexity of Goodstein's
Theorem . . . . . . . . . . . . . . . . 141--151
Matthew R. Lakin and
Amanda Minnich and
Terran Lane and
Darko Stefanovic Towards a Biomolecular Learning Machine 152--163
Pietro Milici Tractional Motion Machines:
Tangent-Managing Planar Mechanisms as
Analog Computers and Educational
Artifacts . . . . . . . . . . . . . . . 164--173
J. Andres Montoya Computing with Sand: On the Complexity
of Recognizing Two-dimensional Sandpile
Critical Configurations . . . . . . . . 174--185
Stefano Nichele and
Gunnar Tufte Genome Parameters as Information to
Forecast Emergent Developmental
Behaviors . . . . . . . . . . . . . . . 186--197
Susan Stepney and
Samson Abramsky and
Matthias Bechmann and
Jerzy Gorecki and
Viv Kendon Heterotic Computing Examples with
Optics, Bacteria, and Chemicals . . . . 198--209
Sami Torbey and
Selim G. Akl Reliable Node Placement in Wireless
Sensor Networks Using Cellular Automata 210--221
Anonymous Front Matter . . . . . . . . . . . . . . ??
Tim Furche and
Georg Gottlob and
Christian Schallhart DIADEM: Domains to Databases . . . . . . 1--8
Yamine Ait-Ameur and
Idir Ait-Sadoune Stepwise Development of Formal Models
for Web Services Compositions: Modelling
and Property Verification . . . . . . . 9--9
Huayu Wu and
Ruiming Tang and
Tok Wang Ling and
Yong Zeng and
Stéphane Bressan A Hybrid Approach for General XML Query
Processing . . . . . . . . . . . . . . . 10--25
Martin F. O'Connor and
Mark Roantree SCOOTER: a Compact and Scalable Dynamic
Labeling Scheme for XML Updates . . . . 26--40
Canwei Zhuang and
Shaorong Feng Reuse the Deleted Labels for Vector
Order-Based Dynamic XML Labeling Schemes 41--54
Yi Ou and
Jianliang Xu and
Theo Härder Towards an Efficient Flash-Based
Mid-Tier Cache . . . . . . . . . . . . . 55--70
Alka Bhushan and
Nandlal L. Sarda and
P. V. Rami Reddy Evacuation Planning of Large Buildings
Using Ladders . . . . . . . . . . . . . 71--85
Meduri Venkata Vamsikrishna and
Zhan Su and
Kian-Lee Tan A Write Efficient PCM-Aware Sort . . . . 86--100
Flavio Ferrarotti and
Sven Hartmann and
Sebastian Link and
Mauricio Marin and
Emir Muñoz Performance Analysis of Algorithms to
Reason about XML Keys . . . . . . . . . 101--115
Kosetsu Ikeda and
Nobutaka Suzuki Finding Top-$K$ Correct XPath Queries of
User's Incorrect XPath Query . . . . . . 116--130
H. S. Bruhathi and
Jayant R. Haritsa Analyzing Plan Diagrams of XQuery
Optimizers . . . . . . . . . . . . . . . 131--146
Somchai Chatvichienchai Spreadsheet Metadata Extraction: a
Layout-Based Approach . . . . . . . . . 147--160
Thushari Atapattu and
Katrina Falkner and
Nickolas Falkner Automated Extraction of Semantic
Concepts from Semi-structured Data:
Supporting Computer-Based Education
through the Analysis of Lecture Notes 161--175
Hilário Oliveira and
Rinaldo Lima and
João Gomes and
Rafael Ferreira and
Fred Freitas A Confidence--Weighted Metric for
Unsupervised Ontology Population from
Web Texts . . . . . . . . . . . . . . . 176--190
Imen Ben Sassi and
Chiraz Trabelsi and
Amel Bouzeghoub and
Sadok Ben Yahia Situation-Aware User's Interests
Prediction for Query Enrichment . . . . 191--205
Karam Abdulahhad and
Jean-Pierre Chevallet and
Catherine Berrut The Effective Relevance Link between a
Document and a Query . . . . . . . . . . 206--218
Tassadit Bouadi and
Marie-Odile Cordier and
René Quiniou Incremental Computation of Skyline
Queries with Dynamic Preferences . . . . 219--233
R. Uday Kiran and
Masaru Kitsuregawa Efficient Discovery of Correlated
Patterns in Transactional Databases
Using Items' Support Intervals . . . . . 234--248
Albert Tort and
Antoni Olivé and
Maria-Ribera Sancho On Checking Executable Conceptual Schema
Validity by Testing . . . . . . . . . . 249--264
Wenyu Huo and
Vassilis J. Tsotras Querying Transaction--Time Databases
under Branched Schema Evolution . . . . 265--280
Anonymous Front Matter . . . . . . . . . . . . . . ??
Cristhian A. D. Deagustini and
Santiago E. Fulladoza Dalibón and
Sebastián Gottifredi Consistent Query Answering Using
Relational Databases through
Argumentation . . . . . . . . . . . . . 1--15
John Jenkins and
Isha Arkatkar and
Sriram Lakshminarasimhan and
Neil Shah and
Eric R. Schendel Analytics-Driven Lossless Data
Compression for Rapid In-situ Indexing,
Storing, and Querying . . . . . . . . . 16--30
Xiuming Yu and
Meijing Li and
Incheon Paik and
Keun Ho Ryu Prediction of Web User Behavior by
Discovering Temporal Relational Rules
from Web Log Data . . . . . . . . . . . 31--38
José Luis Navarro-Galindo and
José Samos and
M. José Muñoz-Alférez A Hybrid Approach to Text Categorization
Applied to Semantic Annotation . . . . . 39--47
Corrado Loglisci and
Dino Ienco and
Mathieu Roche and
Maguelonne Teisseire and
Donato Malerba An Unsupervised Framework for
Topological Relations Extraction from
Geographic Documents . . . . . . . . . . 48--55
Javier Nieves and
Igor Santos and
Pablo G. Bringas Combination of Machine-Learning
Algorithms for Fault Prediction in
High-Precision Foundries . . . . . . . . 56--70
Ruiming Tang and
Reynold Cheng and
Huayu Wu and
Stéphane Bressan A Framework for Conditioning Uncertain
Relational Data . . . . . . . . . . . . 71--87
Yuki Awano and
Qiang Ma and
Masatoshi Yoshikawa Cause Analysis of New Incidents by Using
Failure Knowledge Database . . . . . . . 88--102
Rania Khéfifi and
Pascal Poizat and
Fatiha Sa\"\is Modeling and Querying Context-Aware
Personal Information Spaces . . . . . . 103--110
Amir Bahmani and
Sahra Sedigh and
Ali Hurson Ontology-Based Recommendation Algorithms
for Personalized Education . . . . . . . 111--120
Eya Ben Ahmed and
Ahlem Nabli and
Fa\"\iez Gargouri Towards Quantitative Constraints Ranking
in Data Clustering . . . . . . . . . . . 121--128
Kyu-Hwang Kang and
Seung-Hwan Lim and
Sang-Wook Kim and
Min-Hee Jang and
Byeong-Soo Jeong A Topic-Oriented Analysis of Information
Diffusion in a Blogosphere . . . . . . . 129--140
Keisuke Hasegawa and
Qiang Ma and
Masatoshi Yoshikawa Trip Tweets Search by Considering
Spatio-temporal Continuity of User
Behavior . . . . . . . . . . . . . . . . 141--155
Raymond Vermaas and
Damir Vandic and
Flavius Frasincar Incremental Cosine Computations for
Search and Exploration of Tag Spaces . . 156--167
Shuichi Kurabayashi and
Yasushi Kiyoki Impression-Aware Video Stream Retrieval
System with Temporal Color-Sentiment
Analysis and Visualization . . . . . . . 168--182
Miguel Liroz-Gistau and
Reza Akbarinia and
Esther Pacitti and
Fabio Porto and
Patrick Valduriez Dynamic Workload-Based Partitioning for
Large-Scale Databases . . . . . . . . . 183--190
Lisbeth Rodríguez and
Xiaoou Li Dynamic Vertical Partitioning of
Multimedia Databases Using Active Rules 191--198
Jacek Jedrzejczak and
Tomasz Koszlajda and
Robert Wrembel RTDW-bench: Benchmark for Testing
Refreshing Performance of Real-Time Data
Warehouse . . . . . . . . . . . . . . . 199--206
Pedro Furtado Middleware and Language for Sensor
Streams . . . . . . . . . . . . . . . . 207--214
Gianluca Correndo and
Antonio Penta and
Nicholas Gibbins and
Nigel Shadbolt Statistical Analysis of the owl:sameAs
Network for Aligning Concepts in the
Linking Open Data Cloud . . . . . . . . 215--230
Anonymous Front Matter . . . . . . . . . . . . . . ??
Zineb El Akkaoui and
José-Norberto Mazón and
Alejandro Vaisman and
Esteban Zimányi BPMN-Based Conceptual Modeling of ETL
Processes . . . . . . . . . . . . . . . 1--14
Alfredo Cuzzocrea and
Robson do N. Fidalgo Enhancing Coverage and Expressive Power
of Spatial Data Warehousing Modeling:
The SDWM Approach . . . . . . . . . . . 15--29
Matteo Golfarelli and
Stefano Rizzi and
Elisa Turricchia Sprint Planning Optimization in Agile
Data Warehouse Design . . . . . . . . . 30--41
Faten Atigui and
Franck Ravat and
Olivier Teste and
Gilles Zurfluh Using OCL for Automatically Producing
Multidimensional Models and ETL
Processes . . . . . . . . . . . . . . . 42--53
Thomas Benker and
Carsten Jürck A Case Study on Model-Driven Data
Warehouse Development . . . . . . . . . 54--64
Petar Jovanovic and
Oscar Romero and
Alkis Simitsis and
Alberto Abelló Integrating ETL Processes from
Information Requirements . . . . . . . . 65--80
Norah Alrayes and
Wo-Shun Luk Automatic Transformation of
Multi-dimensional Web Tables into Data
Cubes . . . . . . . . . . . . . . . . . 81--92
Ali Hassan and
Franck Ravat and
Olivier Teste and
Ronan Tournier and
Gilles Zurfluh Differentiated Multiple Aggregations in
Multidimensional Databases . . . . . . . 93--104
Muhammad Marwan Muhammad Fuad Genetic Algorithms-Based Symbolic
Aggregate Approximation . . . . . . . . 105--116
Wiem Abdelbaki and
Riadh Ben Messaoud and
Sadok Ben Yahia A Neural-Based Approach for Extending
OLAP to Prediction . . . . . . . . . . . 117--129
João Bártolo Gomes and
Shonali Krishnaswamy and
Mohamed M. Gaber and
Pedro A. C. Sousa Mobile Activity Recognition Using
Ubiquitous Data Stream Mining . . . . . 130--141
Christoph Gröger and
Johannes Schlaudraff and
Florian Niedermann and
Bernhard Mitschang Warehousing Manufacturing Data . . . . . 142--155
Amira Kerkad and
Ladjel Bellatreche and
Dominique Geniet Queen-Bee: Query Interaction-Aware for
Buffer Allocation and Scheduling Problem 156--167
Suan Lee and
Jinho Kim and
Yang-Sae Moon and
Wookey Lee Efficient Distributed Parallel Top-Down
Computation of ROLAP Data Cube Using
MapReduce . . . . . . . . . . . . . . . 168--179
Kazuyo Narita and
Shinji Nakadai and
Takuya Araki Landmark-Join: Hash-Join Based String
Similarity Joins with Edit Distance
Constraints . . . . . . . . . . . . . . 180--191
Damla Oguz and
Belgin Ergenc Incremental Itemset Mining Based on
Matrix Apriori Algorithm . . . . . . . . 192--204
Jun-Feng Qu and
Mengchi Liu A Fast Algorithm for Frequent Itemset
Mining Using Patricia* Structures . . . 205--216
Hang Yang and
Simon Fong and
Yain-Whar Si Multi-objective Optimization for
Incremental Decision Tree Learning . . . 217--228
Sandra de Amo and
Mouhamadou Saliou Diallo and
Cheikh Talibouya Diop and
Arnaud Giacometti Mining Contextual Preference Rules for
Building User Profiles . . . . . . . . . 229--242
Dan A. Simovici and
Paul Fomenky and
Werner Kunz Polarities, Axiallities and
Marketability of Items . . . . . . . . . 243--252
Anonymous Front Matter . . . . . . . . . . . . . . ??
Tobias Hirsch and
Luigi Lo Iacono and
Ina Wechsung How Much Network Security Must Be
Visible in Web Browsers? . . . . . . . . 1--16
Bastian Braun and
Stefan Kucher and
Martin Johns and
Joachim Posegga A User-Level Authentication Scheme to
Mitigate Web Session-Based
Vulnerabilities . . . . . . . . . . . . 17--29
Matteo Maria Casalino and
Romuald Thion and
Mohand-Said Hacid Access Control Configuration for J2EE
Web Applications: a Formal Perspective 30--35
Waldo Delport and
Martin S. Olivier Cloud Separation: Stuck Inside the Cloud 36--49
Kashif Syed and
Pavol Zavarsky and
Dale Lindskog and
Ron Ruhl and
Shaun Aghili Proposed Control Procedure to Mitigate
the Risks of Strategic Information
Outflow in the Recruitment Process . . . 50--64
Michael Netter and
Sabri Hassan and
Günther Pernul An Autonomous Social Web Privacy
Infrastructure with Context-Aware Access
Control . . . . . . . . . . . . . . . . 65--78
Aliaksandr Lazouski and
Fabio Martinelli and
Paolo Mori A Prototype for Enforcing Usage Control
Policies Based on XACML . . . . . . . . 79--92
Francisco Moyano and
Carmen Fernandez-Gago and
Javier Lopez A Conceptual Framework for Trust Models 93--104
Vit Bukac and
Pavel Tucek and
Martin Deutsch Advances and Challenges in Standalone
Host-Based Intrusion Detection Systems 105--117
Marcin Gorawski and
Michal Lorek and
Michal Gorawski Encrypted Adaptive Storage Model ---
Analysis and Performance Tests . . . . . 118--128
Michael Dorn and
Peter Wackersreuther and
Christian Böhm Efficient Comparison of Encrypted
Biometric Templates . . . . . . . . . . 129--142
Rouzbeh Behnia and
Swee-Huay Heng and
Che-Sheng Gan Short and Efficient Identity-Based
Undeniable Signature Scheme . . . . . . 143--148
Giuseppe D'Acquisto and
Marta Flamini and
Maurizio Naldi Damage Sharing May Not Be Enough: An
Analysis of an Ex-ante Regulation Policy
for Data Breaches . . . . . . . . . . . 149--160
Hanno Langweg and
Lisa Rajbhandari Flexible Regulation with Privacy Points 161--166
Rainer Schick and
Christoph Ruland On the Security of the Non-Repudiation
of Forwarding Service . . . . . . . . . 167--178
Hisain Elshaafi and
Jimmy McGibney and
Dmitri Botvich Profitability and Cost Management of
Trustworthy Composite Services . . . . . 179--191
Ta Vinh Thong and
Levente Buttyán Query Auditing for Protecting Max/Min
Values of Sensitive Attributes in
Statistical Databases . . . . . . . . . 192--206
Ali Salem and
Salah Triki and
Hanêne Ben-Abdallah and
Nouria Harbi and
Omar Boussaid Verification of Security Coherence in
Data Warehouse Designs . . . . . . . . . 207--213
Luca Vigan\`o Towards the Secure Provision and
Consumption in the Internet of Services 214--215
Martin Johns and
Joachim Posegga WebSand: Server-Driven Outbound
Web-Application Sandboxing . . . . . . . 216--217
Anonymous Front Matter . . . . . . . . . . . . . . ??