Last update:
Sat Aug 31 12:36:59 MDT 2024
Xi Guo and
Chuan Xiao and
Yoshiharu Ishikawa Combination Skyline Queries . . . . . . 1--30
Gabriele Kern-Isberner and
Christoph Beierle Comparing and Evaluating Approaches to
Probabilistic Reasoning: Theory,
Implementation, and Applications . . . . 31--75
Bernhard Thalheim The Science and Art of Conceptual
Modelling . . . . . . . . . . . . . . . 76--105
Lasanthi Heendaliya and
Dan Lin and
Ali Hurson Predictive Line Queries for Traffic
Prediction . . . . . . . . . . . . . . . 106--133
Athanasia Asiki and
Dimitrios Tsoumakos A DHT-Based System for the Management of
Loosely Structured, Multidimensional
Data . . . . . . . . . . . . . . . . . . 134--166
Béatrice Bouchou and
Mirian Halfeld-Ferrari A Grammarware for the Incremental
Validation of Integrity Constraints on
XML Documents under Multiple Updates . . 167--197
Huiping Cao and
Shawn Bowers Database Support for Enabling
Data-Discovery Queries over
Semantically-Annotated Observational
Data . . . . . . . . . . . . . . . . . . 198--228
Jingyu Han and
Kejia Chen and
Dawei Jiang Probabilistically Ranking Web Article
Quality Based on Evolution Patterns . . 229--258
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Thomas E. Hampshire and
Holger R. Roth and
Darren J. Boone and
Greg Slabaugh and
Steve Halligan Prone to Supine CT Colonography
Registration Using a Landmark and
Intensity Composite Method . . . . . . . 1--9
Holger R. Roth and
Darren J. Boone and
Steve Halligan and
Thomas E. Hampshire External Clinical Validation of Prone
and Supine CT Colonography Registration 10--19
Rui Shi and
Wei Zeng and
Jerome Zhengrong Liang and
Xianfeng David Gu Efficient Topological Cleaning for
Visual Colon Surface Flattening . . . . 20--29
Janne J. Näppi and
Se Hyung Kim and
Hiroyuki Yoshida Adaptive Volumetric Detection of Lesions
for Minimal-Preparation Dual-Energy CT
Colonography . . . . . . . . . . . . . . 30--39
Janne J. Näppi and
Masanori Imuta and
Yasuyuki Yamashita and
Hiroyuki Yoshida Computer-Aided Detection for
Ultra-Low-Dose CT Colonography . . . . . 40--48
Chang Won Kim and
Jong Hyo Kim Application of CT Simulation Technique
for Virtual Ultra-Low-Dose Trial in CT
Colonography . . . . . . . . . . . . . . 49--57
Zepa Yang and
Hyeong-min Jin and
Jong Hyo Kim Application of CT Simulation Technique
for Virtual Fecal Tagging in CTC . . . . 58--68
Janne J. Näppi and
Don Rockey and
Daniele Regge and
Hiroyuki Yoshida Application of CT Acquisition Parameters
as Features in Computer-Aided Detection
for CT Colonography . . . . . . . . . . 69--77
Sang Ho Lee and
Janne J. Näppi and
Hiroyuki Yoshida Comparative Performance of
State-of-the-Art Classifiers in
Computer-Aided Detection for CT
Colonography . . . . . . . . . . . . . . 78--87
Wenli Cai and
June-Goo Lee and
Da Zhang and
Christina Piel and
Hiroyuki Yoshida Piecewise Structural Diffusion Defined
on Shape Index for Noise Reduction in
Dual-Energy CT Images . . . . . . . . . 88--96
Dwarikanath Mahapatra and
Peter Schueffler and
Jeroen A. W. Tielbeek and
Joachim M. Buhmann A Supervised Learning Based Approach to
Detect Crohn's Disease in Abdominal MR
Volumes . . . . . . . . . . . . . . . . 97--106
Mehmet Yigitsoy and
Sonja Kirchhoff and
Maximilian F. Reiser and
Nassir Navab Out-of-Plane Motion Compensation in
Cine-MRI . . . . . . . . . . . . . . . . 107--115
Ruwan Nawarathna and
JungHwan Oh and
Jayantha Muthukudage and
Wallapak Tavanapong and
Johnny Wong Real-Time Phase Boundary Detection for
Colonoscopy Videos Using Motion Vector
Templates . . . . . . . . . . . . . . . 116--125
Sho Tomoshige and
Elco Oost and
Akinobu Shimizu and
Hidefumi Watanabe and
Hidefumi Kobatake Relaxed Conditional Statistical Shape
Models and Their Application to
Non-contrast Liver Segmentation . . . . 126--136
Silja Kiriyanthan and
Ketut Fundana and
Tahir Majeed and
Philippe C. Cattin A Landmark-Based Primal-Dual Approach
for Discontinuity Preserving
Registration . . . . . . . . . . . . . . 137--146
Golnoosh Samei and
Christine Tanner and
Gabor Székely Predicting Liver Motion Using Exemplar
Models . . . . . . . . . . . . . . . . . 147--157
Sanat Upadhyay and
Manos Papadakis and
Saurabh Jain and
Gregory Gladish Semi-automatic Discrimination of Normal
Tissue and Liver Cancer Lesions in
Contrast Enhanced X-Ray CT-Scans . . . . 158--167
Ha Manh Luu and
Adriaan Moelker and
Camiel Klink and
Adrienne Mendrik and
Wiro Niessen Evaluation of Diffusion Filters for $3$D
CTA Liver Vessel Enhancement . . . . . . 168--177
Weimin Huang and
Wei Xiong and
Jiayin Zhou and
Jing Zhang and
Tao Yang and
Jiang Liu and
Yi Su $3$D Shape Analysis for
Liver-Gallbladder Anatomical Structure
Retrieval . . . . . . . . . . . . . . . 178--187
Jianfei Liu and
Shijun Wang and
Marius G. Linguraru and
Ronald M. Summers Tumor Sensitive Matching Flow: An
Approach for Ovarian Cancer Metastasis
Detection and Segmentation . . . . . . . 188--197
Anonymous Front Matter . . . . . . . . . . . . . . ??
Mike P. Papazoglou Cloud Blueprint: a Model-Driven Approach
to Configuring Federated Clouds . . . . 1--1
Eric Féron Model-Based Auto Coding of Embedded
Control Software with Full Semantics . . 2--2
Roula Karam and
Piero Fraternali and
Alessandro Bozzon and
Luca Galli Modeling End-Users as Contributors in
Human Computation Applications . . . . . 3--15
Diego Rodríguez-Gracia and
Javier Criado and
Luis Iribarne and
Nicolás Padilla Runtime Adaptation of Architectural
Models: An Approach for Adapting User
Interfaces . . . . . . . . . . . . . . . 16--30
Carlo Batini and
Marco Comerio and
Gianluigi Viscusi Managing Quality of Large Set of
Conceptual Schemas in Public
Administration: Methods and Experiences 31--42
Sébastien Maitrehenry and
Sylvain Metge and
Yamine A\"\it-Ameur and
Pierre Bieber An MDE-Based Synthesis of Aircraft
Safety Models . . . . . . . . . . . . . 43--54
Selma Djeddai and
Martin Strecker and
Mohamed Mezghiche Integrating a Formal Development for
DSLs into Meta-modeling . . . . . . . . 55--66
Emsaieb Geepalla and
Behzad Bordbar and
Joel Last Transformation of Spatio-Temporal Role
Based Access Control Specification to
Alloy . . . . . . . . . . . . . . . . . 67--78
Nesrine Ben Mustapha and
Marie-Aude Aufaure and
Hajer Baazaoui Zghal and
Henda Ben Ghezala Modular Ontological Warehouse for
Adaptative Information Search . . . . . 79--90
Meriem Djezzar and
Mounir Hemam and
Zizette Boufaida Ontological Re-classification of
Individuals: a Multi-viewpoints Approach 91--102
Jesús M. Almendros-Jiménez and
Luis Iribarne Transformation and Validation with SWRL
and OWL of ODM-Based Models . . . . . . 103--115
Takashi Yanagisawa and
Takao Miura Context-Based Query Using Dependency
Structures Based on Latent Topic Model 116--128
Nour El Islem Karabadji and
Hassina Seridi and
Ilyes Khelf and
Lakhdar Laouar Decision Tree Selection in an Industrial
Machine Fault Diagnostics . . . . . . . 129--140
Fairouz Dahi and
Nora Bounour Crosscutting Concerns Identification
Approach Based on the Sequence Diagram
Analysis . . . . . . . . . . . . . . . . 141--152
Franck Barbier and
Eric Cariou Inductive UML . . . . . . . . . . . . . 153--161
Anthony Fernandes Pires and
Thomas Polacsek and
Stéphane Duprat Formal Software Verification at Model
and at Source Code Levels . . . . . . . 162--169
Rania Soussi and
Marie-Aude Aufaure Enterprise Ontology Learning for
Heterogeneous Graphs Extraction . . . . 170--177
Sa\"\id Taktak and
Jamel Feki Toward Propagating the Evolution of Data
Warehouse on Data Marts . . . . . . . . 178--185
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Lee Harland Open PHACTS: a Semantic Knowledge
Infrastructure for Public and Commercial
Drug Discovery Research . . . . . . . . 1--7
Camille Pradel Allowing End Users to Query Graph-Based
Knowledge Bases . . . . . . . . . . . . 8--15
Victor de Boer and
Michiel Hildebrand and
Lora Aroyo and
Pieter De Leenheer and
Chris Dijkshoorn Nichesourcing: Harnessing the Power of
Crowds of Experts . . . . . . . . . . . 16--20
Jodi Schneider and
Brian Davis and
Adam Wyner Dimensions of Argumentation in Social
Media . . . . . . . . . . . . . . . . . 21--25
Claudia d'Amato and
Volha Bryl and
Luciano Serafini Semantic Knowledge Discovery from
Heterogeneous Data Sources . . . . . . . 26--31
Arash Joorabchi and
Abdulhussain E. Mahdi Automatic Subject Metadata Generation
for Scientific Documents Using Wikipedia
and Genetic Algorithms . . . . . . . . . 32--41
Sébastien Ferré and
Sebastian Rudolph Advocatus Diaboli --- Exploratory
Enrichment of Ontologies with Negative
Constraints . . . . . . . . . . . . . . 42--56
Lorenz Bühmann and
Jens Lehmann Universal OWL Axiom Enrichment for Large
Knowledge Bases . . . . . . . . . . . . 57--71
Chiraz Latiri and
Lamia Ben Ghezaiel and
Mohamed Ben Ahmed Proxemic Conceptual Network Based on
Ontology Enrichment for Representing
Documents in IR . . . . . . . . . . . . 72--86
Daniel Gerber and
Axel-Cyrille Ngonga Ngomo Extracting Multilingual Natural-Language
Patterns for RDF Predicates . . . . . . 87--96
Myung Hee Kim and
Paul Compton Improving the Performance of a Named
Entity Recognition System with Knowledge
Acquisition . . . . . . . . . . . . . . 97--113
Valentina Presutti and
Francesco Draicchio and
Aldo Gangemi Knowledge Extraction Based on Discourse
Representation Theory and Linguistic
Frames . . . . . . . . . . . . . . . . . 114--129
Sara Tonelli and
Volha Bryl and
Claudio Giuliano and
Luciano Serafini Investigating the Semantics of Frame
Elements . . . . . . . . . . . . . . . . 130--143
Manuel Atencia and
Jérôme David and
François Scharffe Keys and Pseudo-Keys Detection for Web
Datasets Cleansing and Interlinking . . 144--153
Renata Dividino and
Gerd Gröner and
Stefan Scheglmann and
Matthias Thimm Ranking RDF with Provenance via
Preference Aggregation . . . . . . . . . 154--163
Jürgen Umbrich and
Marcel Karnstedt and
Aidan Hogan and
Josiane Xavier Parreira Freshening up while Staying Fast:
Towards Hybrid SPARQL Queries . . . . . 164--174
Sebastian Hellmann and
Jens Lehmann and
Sören Auer Linked-Data Aware URI Schemes for
Referencing Text Fragments . . . . . . . 175--184
Alice Hermann and
Sébastien Ferré and
Mireille Ducassé An Interactive Guidance Process
Supporting Consistent Updates of RDFS
Graphs . . . . . . . . . . . . . . . . . 185--199
Stéphane Campinas and
Renaud Delbru and
Giovanni Tummarello Effective Retrieval Model for Entity
with Multi-valued Attributes: BM25MF and
Beyond . . . . . . . . . . . . . . . . . 200--215
Eva Blomqvist and
Azam Seil Sepour and
Valentina Presutti Ontology Testing- Methodology and Tool 216--226
Anonymous Front Matter . . . . . . . . . . . . . . ??
Ji\vrí Wiedermann Computability and Non-computability
Issues in Amorphous Computing . . . . . 1--9
Davide Ancona and
Giovanni Lagorio Static Single Information Form for
Abstract Compilation . . . . . . . . . . 10--27
Suna Bensch and
Markus Holzer and
Martin Kutrib and
Andreas Malcher Input-Driven Stack Automata . . . . . . 28--42
Marijke Hans L. Bodlaender Probabilistic Inference and Monadic
Second Order Logic . . . . . . . . . . . 43--56
Marijke Hans L. Bodlaender and
Cor A. J. Hurkens Cinderella versus the Wicked Stepmother 57--71
Michele Boreale and
Michela Paolini Worst- and Average-Case Privacy Breaches
in Randomization Mechanisms . . . . . . 72--86
Tomasz Brengos Weak Bisimulations for Coalgebras over
Ordered Functors . . . . . . . . . . . . 87--103
Arnaud Carayol and
Zoltán Ésik A Context-Free Linear Ordering with an
Undecidable First-Order Theory . . . . . 104--118
Yuxin Deng and
Yuan Feng Open Bisimulation for Quantum Processes 119--133
Fabio Gadducci and
Giacoma Valentina Monreale and
Ugo Montanari A Modular LTS for Open Reactive Systems 134--148
Petr Jan\vcar and
Prateek Karandikar and
Philippe Schnoebelen Unidirectional Channel Systems Can Be
Tested . . . . . . . . . . . . . . . . . 149--163
Galina Jirásková and
Tomá\vs Masopust On Properties and State Complexity of
Deterministic State-Partition Automata 164--178
Galina Jirásková and
Benedek Nagy On Union-Free and Deterministic
Union-Free Languages . . . . . . . . . . 179--192
Alexander Kurz and
Tomoyuki Suzuki and
Emilio Tuosto A Characterisation of Languages on
Infinite Alphabets with Nominal Regular
Expressions . . . . . . . . . . . . . . 193--208
Philipp Küfner and
Uwe Nestmann and
Christina Rickmann Formal Verification of Distributed
Algorithms . . . . . . . . . . . . . . . 209--224
Salvatore La Torre and
Margherita Napoli A Temporal Logic for Multi-threaded
Programs . . . . . . . . . . . . . . . . 225--239
Hongyu Liang The Algorithmic Complexity of
$k$-Domatic Partition of Graphs . . . . 240--249
Bas Luttik Unique Parallel Decomposition in
Branching and Weak Bisimulation
Semantics . . . . . . . . . . . . . . . 250--264
Gerald Lüttgen and
Walter Vogler Modal Interface Automata . . . . . . . . 265--279
Emmanuel Beffara and
Virgile Mogbil Proofs as Executions . . . . . . . . . . 280--294
Anonymous Front Matter . . . . . . . . . . . . . . ??
Amihood Amir and
Avivit Levy Approximate Period Detection and
Correction . . . . . . . . . . . . . . . 1--15
Ricardo Baeza-Yates and
Yoelle Maarek Usage Data in Web Search: Benefits and
Limitations . . . . . . . . . . . . . . 16--16
Ian Witten Semantic Document Representation: Do It
with Wikification . . . . . . . . . . . 17--17
Artur Abdullin and
Olfa Nasraoui Clustering Heterogeneous Data with
Mutual Semi-supervision . . . . . . . . 18--29
Andrés Abeliuk and
Gonzalo Navarro Compressed Suffix Trees for Repetitive
Texts . . . . . . . . . . . . . . . . . 30--41
Amihood Amir and
Haim Paryenty and
Liam Roditty Configurations and Minority in the
String Consensus Problem . . . . . . . . 42--53
Xiangdong An and
Nick Cercone and
Hai Wang A Study on Novelty Evaluation in
Biomedical Information Retrieval . . . . 54--60
Golnaz Badkobeh and
Maxime Crochemore Computing the Maximal-Exponent Repeats
of an Overlap-Free String in Linear Time 61--72
Krisztian Balog and
Robert Neumayer Collection Ranking and Selection for
Federated Entity Search . . . . . . . . 73--85
Hideo Bannai and
Shunsuke Inenaga Efficient LZ78 Factorization of Grammar
Compressed Text . . . . . . . . . . . . 86--98
Timo Beller and
Katharina Berger Space-Efficient Computation of Maximal
and Supermaximal Repeats in Genome
Sequences . . . . . . . . . . . . . . . 99--110
Lamjed Ben Jabeur and
Lynda Tamine Active Microbloggers: Identifying
Influencers, Leaders and Discussers in
Microblogging Networks . . . . . . . . . 111--117
Etienne Birmelé and
Pierluigi Crescenzi Efficient Bubble Enumeration in Directed
Graphs . . . . . . . . . . . . . . . . . 118--129
Guillaume Blin and
Minghui Jiang The Longest Common Subsequence Problem
with Crossing-Free Arc-Annotated
Sequences . . . . . . . . . . . . . . . 130--142
Felipe Bravo-Marquez and
Manuel Manriquez A Zipf-Like Distant Supervision Approach
for Multi-document Summarization Using
Wikinews Articles . . . . . . . . . . . 143--154
Nieves R. Brisaboa and
Ana Cerdeira-Pena Ranked Document Retrieval in (Almost) No
Space . . . . . . . . . . . . . . . . . 155--160
B. Barla Cambazoglu Impact of Regionalization on Performance
of Web Search Engine Result Caches . . . 161--166
Francisco Claude and
Gonzalo Navarro The Wavelet Matrix . . . . . . . . . . . 167--179
Francisco Claude and
Gonzalo Navarro Improved Grammar-Based Compressed
Indexes . . . . . . . . . . . . . . . . 180--192
Clément de Groc and
Xavier Tannier Experiments on Pseudo Relevance Feedback
Using Graph Random Walks . . . . . . . . 193--198
Anonymous Front Matter . . . . . . . . . . . . . . ??
Dirk Beyer and
Alexander K. Petrenko Linux Driver Verification . . . . . . . 1--6
Joost Kok and
Anna-Lena Lamprecht and
Fons J. Verbeek and
Mark D. Wilkinson Bioscientific Data Processing and
Modeling . . . . . . . . . . . . . . . . 7--11
Hernando Sanchez-Faddeev and
Michael T. M. Emmerich and
Fons J. Verbeek and
Andrew H. Henry Using Multiobjective Optimization and
Energy Minimization to Design an
Isoform-Selective Ligand of the 14-3-3
Protein . . . . . . . . . . . . . . . . 12--24
Kuan Yan and
Fons J. Verbeek Segmentation for High-Throughput Image
Analysis: Watershed Masked Clustering 25--41
Alexander E. Nezhinsky and
Fons J. Verbeek Efficient and Robust Shape Retrieval
from Deformable Templates . . . . . . . 42--55
Ian Wood and
Ben Vandervalk and
Luke McCarthy and
Mark D. Wilkinson OWL-DL Domain-Models as Abstract
Workflows . . . . . . . . . . . . . . . 56--66
Andrea Braun von Reinersdorff and
Tiziana Margaria and
Christoph Rasche Processes and Data Integration in the
Networked Healthcare . . . . . . . . . . 67--69
Tiziana Margaria and
Steve Boßelmann and
Bertold Kujath Simple Modeling of Executable Role-Based
Workflows: An Application in the
Healthcare Domain . . . . . . . . . . . 70--72
Andreas Holubek and
Christian Metzger Considerations for Healthcare
Applications in a Platform as a Service
Environment . . . . . . . . . . . . . . 73--74
Markus Doedt and
Thomas Göke and
Jan Pardo and
Bernhard Steffen Reha-Sports: The Challenge of Small
Margin Healthcare Accounting . . . . . . 75--77
Björn Lisper and
Johan Nordlander and
Sophie Quinton Timing Constraints: Theory Meets
Practice . . . . . . . . . . . . . . . . 78--79
Björn Lisper and
Johan Nordlander A Simple and Flexible Timing Constraint
Logic . . . . . . . . . . . . . . . . . 80--95
Sophie Quinton and
Rolf Ernst Generalized Weakly-Hard Constraints . . 96--110
Marie-Agn\`es Peraldi-Frati and
Arda Goknil and
Morayo Adedjouma and
Pierre Yves Gueguen Modeling a BSG-E Automotive System with
the Timing Augmented Description
Language . . . . . . . . . . . . . . . . 111--125
Iakovos Ouranos and
Kazuhiro Ogata and
Petros Stefaneas Formal Analysis of TESLA Protocol in the
Timed OTS/CafeOBJ Method . . . . . . . . 126--142
Ning Ge and
Marc Pantel and
Xavier Crégut Formal Specification and Verification of
Task Time Constraints for Real-Time
Systems . . . . . . . . . . . . . . . . 143--157
Raimund Kirner The WCET Analysis Tool CalcWcet167 . . . 158--172
Klaus Birken Abstract Execution for Event-Driven
Systems --- An Application from
Automotive/Infotainment Development . . 173--186
Alessandro Fantechi and
Francesco Flammini and
Stefania Gnesi Formal Methods for Intelligent
Transportation Systems . . . . . . . . . 187--189
Francesco Flammini and
Stefano Marrone and
Nicola Mazzocca and
Roberto Nardone Model-Driven V&V Processes for Computer
Based Control Systems: a Unifying
Perspective . . . . . . . . . . . . . . 190--204
Anonymous Front Matter . . . . . . . . . . . . . . ??
Yehuda Afek and
Haim Kaplan and
Boris Korenfeld and
Adam Morrison and
Robert E. Tarjan CBTree: a Practical Concurrent
Self-Adjusting Search Tree . . . . . . . 1--15
Faith Ellen and
Vijaya Ramachandran and
Philipp Woelfel Efficient Fetch-and-Increment . . . . . 16--30
Alexey Gotsman and
Madanlal Musuvathi and
Hongseok Yang Show No Weakness: Sequentially
Consistent Specifications of TSO
Libraries . . . . . . . . . . . . . . . 31--45
Julian Anaya and
Jérémie Chalopin and
Jurek Czyzowicz and
Arnaud Labourel and
Andrzej Pelc Collecting Information by Power-Aware
Mobile Agents . . . . . . . . . . . . . 46--60
Ofer Feinerman and
Amos Korman Memory Lower Bounds for Randomized
Collaborative Search and Implications
for Biology . . . . . . . . . . . . . . 61--75
Chen Chen and
Roman Vitenberg and
Hans-Arno Jacobsen A Generalized Algorithm for
Publish/Subscribe Overlay Design and Its
Fast Implementation . . . . . . . . . . 76--90
Keren Censor-Hillel and
Bernhard Haeupler and
Nancy Lynch and
Muriel Médard Bounded-Contention Coding for Wireless
Networks in the High SNR Regime . . . . 91--105
Tomasz Jurdzinski and
Dariusz R. Kowalski Distributed Backbone Structure for
Algorithms in the SINR Model of Wireless
Networks . . . . . . . . . . . . . . . . 106--120
Marcin Bienkowski and
Tomasz Jurdzinski and
Miroslaw Korzeniowski and
Dariusz R. Kowalski Distributed Online and Stochastic
Queuing on a Multiple Access Channel . . 121--135
Atish Das Sarma and
Anisur Rahaman Molla and
Gopal Pandurangan Fast Distributed Computation in Dynamic
Networks via Random Walks . . . . . . . 136--150
Atish Das Sarma and
Ashwin Lall and
Danupon Nanongkai and
Amitabh Trehan Dense Subgraphs on Dynamic Networks . . 151--165
Bernhard Haeupler and
Fabian Kuhn Lower Bounds on Information
Dissemination in Dynamic Networks . . . 166--180
Mika Göös and
Jukka Suomela No Sublogarithmic-Time Approximation
Scheme for Bipartite Vertex Cover . . . 181--194
Danny Dolev and
Christoph Lenzen and
Shir Peled ``Tri, Tri Again'': Finding Triangles
and Small Subgraphs in a Distributed
Setting . . . . . . . . . . . . . . . . 195--209
Andrzej Czygrinow and
Michal Han\'ckowiak and
Edyta Szyma\'nska and
Wojciech Wawrzyniak Distributed $2$-Approximation Algorithm
for the Semi-matching Problem . . . . . 210--222
Mohsen Ghaffari and
Bernhard Haeupler and
Nancy Lynch and
Calvin Newport Bounds on Contention Management in Radio
Networks . . . . . . . . . . . . . . . . 223--237
Sebastian Daum and
Fabian Kuhn and
Calvin Newport Efficient Symmetry Breaking in
Multi-Channel Radio Networks . . . . . . 238--252
Alexandre Maurer and
Sébastien Tixeuil On Byzantine Broadcast in Loosely
Connected Networks . . . . . . . . . . . 253--266
Abhijeet Pareek and
Philipp Woelfel RMR-Efficient Randomized Abortable
Mutual Exclusion . . . . . . . . . . . . 267--281
Prasad Jayanti and
Zhiyu Liu Abortable Reader-Writer Locks Are No
More Complex Than Abortable Mutex Locks 282--296
Anonymous Front Matter . . . . . . . . . . . . . . ??
Ewen Denney and
Ganesh Pai A Lightweight Methodology for Safety
Case Assembly . . . . . . . . . . . . . 1--12
André Alexandersen Hauge and
Ketil Stòlen A Pattern-Based Method for Safe Control
Systems Exemplified within Nuclear Power
Production . . . . . . . . . . . . . . . 13--24
Silvia Gil Casals and
Philippe Owezarski and
Gilles Descargues Risk Assessment for Airworthiness
Security . . . . . . . . . . . . . . . . 25--36
Christoph Läsche and
Eckard Böde and
Thomas Peikenkamp A Method for Guided Hazard
Identification and Risk Mitigation for
Offshore Operations . . . . . . . . . . 37--48
Manfred Schäfer Risk Analysis and Software Integrity
Protection for 4G Network Elements in
ASMONIA . . . . . . . . . . . . . . . . 49--61
Christoph Woskowski Applying Industrial-Strength Testing
Techniques to Critical Care Medical
Equipment . . . . . . . . . . . . . . . 62--73
Viacheslav Izosimov and
Urban Ingelsson and
Andreas Wallin Requirement Decomposition and
Testability in Development of
Safety-Critical Automotive Components 74--86
Jan Krause and
Elke Hintze and
Stephan Magnus and
Christian Diedrich Model Based Specification, Verification,
and Test Generation for a Safety
Fieldbus Profile . . . . . . . . . . . . 87--98
Ernest Edifor and
Martin Walker and
Neil Gordon Quantification of Priority-OR Gates in
Temporal Fault Trees . . . . . . . . . . 99--110
Michael Glaß and
Heng Yu and
Felix Reimann and
Jürgen Teich Cross-Level Compositional Reliability
Analysis for Embedded Systems . . . . . 111--124
Tobias Hoppe and
Sven Kuhlmann and
Stefan Kiltz and
Jana Dittmann IT-Forensic Automotive Investigations on
the Example of Route Reconstruction on
Automotive System and Communication Data 125--136
Hans-Hermann Bock and
Jens Braband and
Birgit Milius and
Hendrik Schäbe Towards an IT Security Protection
Profile for Safety-Related Communication
in Railway Automation . . . . . . . . . 137--148
Felix Wieczorek and
Christoph Krauß and
Frank Schiller and
Claudia Eckert Towards Secure Fieldbus Communication 149--160
Andrey Zakonov and
Anatoly Shalyto Extracting EFSMs of Web Applications for
Formal Requirements Specification . . . 161--172
Irene Bicchierai and
Giacomo Bucci and
Carlo Nocentini and
Enrico Vicario An Ontological Approach to
Systematization of SW-FMEA . . . . . . . 173--184
Roberto Baldoni and
Giorgia Lodi and
Luca Montanari and
Guido Mariotta and
Marco Rizzuto Online Black-Box Failure Prediction for
Mission Critical Distributed Systems . . 185--197
Domenico Di Leo and
Fatemeh Ayatolahi and
Behrooz Sangchoolie and
Johan Karlsson On the Impact of Hardware Faults --- An
Investigation of the Relationship
between Workload Inputs and Failure Mode
Distributions . . . . . . . . . . . . . 198--209
Anton Tarasyuk and
Inna Pereverzeva and
Elena Troubitsyna and
Timo Latvala and
Laura Nummila Formal Development and Assessment of a
Reconfigurable On-board Satellite System 210--222
Olof Hannius and
Johan Karlsson Impact of Soft Errors in a Jet Engine
Controller . . . . . . . . . . . . . . . 223--234
Ludovic Pintard and
Christel Seguin and
Jean-Paul Blanquart Which Automata for Which Safety
Assessment Step of Satellite FDIR? . . . 235--246
Anonymous Front Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . 1--1
Alejandra Ruiz and
Tim P. Kelly and
Mehrdad Sabetzadeh and
Didier Van Den Abeele Introduction to Sassur 2012 . . . . . . 3--7
Ewen Denney and
Ganesh Pai and
Josef Pohl AdvoCATE: An Assurance Case Automation
Toolset . . . . . . . . . . . . . . . . 8--21
Alejandra Ruiz and
Ibrahim Habli and
Huáscar Espinoza Towards a Case-Based Reasoning Approach
for Safety Assurance Reuse . . . . . . . 22--35
Jasen Markovski and
J. M. van de Mortel-Fronczak Modeling for Safety in a
Synthesis-Centric Systems Engineering
Framework . . . . . . . . . . . . . . . 36--49
Fabien Belmonte and
Elie Soubiran A Model Based Approach for Safety
Analysis . . . . . . . . . . . . . . . . 50--63
Jose Luis de la Vara and
Sunil Nair and
Eric Verhulst and
Janusz Studzizba and
Piotr Pepek Towards a Model-Based Evolutionary Chain
of Evidence for Compliance with Safety
Standards . . . . . . . . . . . . . . . 64--78
Xingyu Zhao and
Dajian Zhang and
Minyan Lu and
Fuping Zeng A New Approach to Assessment of
Confidence in Assurance Cases . . . . . 79--91
Eric Verhulst and
Bernhard H. C. Sputh An Unified Meta-model for Trustworthy
Systems Engineering . . . . . . . . . . 92--105
Anna Lanzaro and
Antonio Pecchia and
Marcello Cinque and
Domenico Cotroneo and
Ricardo Barbosa A Preliminary Fault Injection Framework
for Evaluating Multicore Systems . . . . 106--116
Daniel Kästner and
Marc Schlickling and
Markus Pister and
Christoph Cullmann and
Gernot Gebhard Meeting Real-Time Requirements with
Multi-core Processors . . . . . . . . . 117--131
Patrick J. Graydon and
Tim P. Kelly Assessing Software Interference
Management When Modifying Safety-Related
Software . . . . . . . . . . . . . . . . 132--145
Anonymous Front Matter . . . . . . . . . . . . . . 147--147
António Casimiro and
Jörg Kaiser Introduction to ASCoMS 2012 . . . . . . 149--150
Luís Marques and
António Casimiro Towards Dependable and Stable Perception
in Smart Environments with Timing and
Value Faults . . . . . . . . . . . . . . 151--161
Sebastian Zug and
Tino Brade and
Jörg Kaiser and
Sasanka Potluri An Approach Supporting Fault-Propagation
Analysis for Smart Sensor Systems . . . 162--173
Kenneth Östberg and
Rolf Johansson Use of Quality Metrics for Functional
Safety in Systems of Cooperative
Vehicles . . . . . . . . . . . . . . . . 174--179
Christian Berger From Autonomous Vehicles to Safer Cars:
Selected Challenges for the Software
Engineering . . . . . . . . . . . . . . 180--189
Oscar Ljungkrantz and
Henrik Lönn and
Hans Blom and
Cecilia Ekelin and
Daniel Karlsson Modelling of Safety-Related Timing
Constraints for Automotive Embedded
Systems . . . . . . . . . . . . . . . . 190--201
Anonymous Front Matter . . . . . . . . . . . . . . 203--203
Christian Esposito and
Marco Platania and
Francesco Brancati Introduction to DESEC4LCCI 2012 . . . . 205--208
Leonardo Montecchi and
Paolo Lollini and
Andrea Bondavalli and
Ernesto La Mattina Quantitative Security Evaluation of a
Multi-biometric Authentication System 209--221
Luigi Romano and
Salvatore D'Antonio and
Valerio Formicola and
Luigi Coppolino Protecting the WSN Zones of a Critical
Infrastructure via Enhanced SIEM
Technology . . . . . . . . . . . . . . . 222--234
Anonymous Front Matter . . . . . . . . . . . . . . ??
Takako Aikawa and
Kentaro Yamamoto and
Hitoshi Isahara The Impact of Crowdsourcing Post-editing
with the Collaborative Translation
Framework . . . . . . . . . . . . . . . 1--10
Shaoyu Chen and
Tadahiro Matsumoto Translation of Quantifiers in
Japanese--Chinese Machine Translation 11--22
Hitoshi Isahara Toward Practical Use of Machine
Translation . . . . . . . . . . . . . . 23--27
Jun Sakata and
Masato Tokuhisa and
Jin'ichi Murakami Phrase-Level Pattern-Based Machine
Translation Based on Analogical Mapping
Method . . . . . . . . . . . . . . . . . 28--39
Haithem Afli and
Lo\"\ic Barrault and
Holger Schwenk Parallel Texts Extraction from
Multimodal Comparable Corpora . . . . . 40--51
Gan Jin and
Natallia Khatseyeva A Reliable Communication System to
Maximize the Communication Quality . . . 52--63
Gaël Lejeune and
Romain Brixtel and
Antoine Doucet and
Nadine Lucas DAnIEL: Language Independent
Character-Based News Surveillance . . . 64--75
Jian Qu and
Akira Shimazu and
Minh Le Nguyen OOV Term Translation, Context
Information and Definition Extraction
Based on OOV Term Type Prediction . . . 76--87
Fatiha Sadat Exploiting a Web-Based Encyclopedia as a
Knowledge Base for the Extraction of
Multilingual Terminology . . . . . . . . 88--96
Jyoti Srivastava and
Sudip Sanyal Segmenting Long Sentence Pairs to
Improve Word Alignment in English--Hindi
Parallel Corpora . . . . . . . . . . . . 97--107
Hoai-Thu Vuong and
Dao Ngoc Tu and
Minh Le Nguyen and
Vinh Van Nguyen Shallow Syntactic Preprocessing for
Statistical Machine Translation . . . . 108--117
Paul Brillant Feuto Njonko and
Sylviane Cardey-Greenfield and
Peter Greenfield Linguistic Rules Based Approach for
Automatic Restoration of Accents on
French Texts . . . . . . . . . . . . . . 118--125
Masood Ghayoomi Word Clustering for Persian Statistical
Parsing . . . . . . . . . . . . . . . . 126--137
Wannachai Kampeera and
Sylviane Cardey-Greenfield Building a Lexically and
Semantically-Rich Resource for
Paraphrase Processing . . . . . . . . . 138--143
Bartosz Zaborowski and
Adam Przepiórkowski Tagset Conversion with Decision Trees 144--155
Elizaveta Zimina Fitting a Round Peg in a Square Hole:
Japanese Resource Grammar in GF . . . . 156--167
Ahmed H. Aliwy Arabic Language Analyzer with Lemma
Extraction and Rich Tagset . . . . . . . 168--179
Jorge J. García Flores and
Pierre Zweigenbaum and
Zhao Yue and
William Turner Tracking Researcher Mobility on the Web
Using Snippet Semantic Analysis . . . . 180--191
Konrad Go\luchowski and
Adam Przepiórkowski Semantic Role Labelling without Deep
Syntactic Parsing . . . . . . . . . . . 192--197
Przemys\law Jarz\kebowski and
Adam Przepiórkowski Temporal Information Extraction with
Cross-Language Projected Data . . . . . 198--209
Anonymous Front Matter . . . . . . . . . . . . . . ??
Thomas P. Kersten and
Maren Lindstaedt Image-Based Low-Cost Systems for
Automatic $3$D Recording and Modelling
of Archaeological Finds and Objects . . 1--10
Dieter Fritsch and
Mohammed Abdel-Wahab and
Alessandro Cefalu and
Konrad Wenzel Photogrammetric Point Cloud Collection
with Multi-camera Systems . . . . . . . 11--20
Immo Trinks and
Wolfgang Neubauer and
Michael Doneus Prospecting Archaeological Landscapes 21--29
Fabian Hollaus and
Melanie Gau and
Robert Sablatnig Multispectral Image Acquisition of
Ancient Manuscripts . . . . . . . . . . 30--39
Fabio Remondino and
Silvio Del Pizzo and
Thomas P. Kersten and
Salvatore Troisi Low-Cost and Open-Source Solutions for
Automated Image Orientation --- a
Critical Overview . . . . . . . . . . . 40--54
Thomas P. Kersten and
Friedrich Keller and
Jerome Saenger and
Jochen Schiewe Automated Generation of an Historic $4$D
City Model of Hamburg and Its
Visualisation with the GE Engine . . . . 55--65
Marcello Balzani and
Carlo Bughi and
Federico Ferrari and
Luca Rossato and
Alessandra Tursi Alberti's Box: The Cultural Multimedia
Project on the Architectures of Leon
Battista Alberti . . . . . . . . . . . . 66--75
Wassim Moussa and
Mohammed Abdel-Wahab and
Dieter Fritsch Automatic Fusion of Digital Images and
Laser Scanner Data for Heritage
Preservation . . . . . . . . . . . . . . 76--85
Eirini Bernikola and
Elsa Tsiranidou and
Vivi Tornari and
Vincent Detalle and
Jean Luc Bodnar Mapping of Defect Structural
Micro-morphology in the Documentation of
Conservation Approaches . . . . . . . . 86--96
Dafni Sidiropoulou-Velidou and
Andreas Georgopoulos and
José Luis Lerma Exploitation of Thermal Imagery for the
Detection of Pathologies in Monuments 97--108
Nikolaos Doulamis and
Christos Yiakoumettis and
George Miaoulis On-line Spectral Learning in Exploring
$3$D Large Scale Geo-Referred Scenes . . 109--118
Pierre Drap and
Djamal Merad and
Julien Seinturier and
Jean-Marc Bo\"\i and
Daniela Peloso An Information System for Medieval
Archaeology Based on Photogrammetry and
Archaeological Database: The Shawbak
Castle Project . . . . . . . . . . . . . 119--128
Athos Agapiou and
Diofantos G. Hadjimitsis and
Andreas Georgopoulos and
Apostolos Sarris Towards an Archaeological Index:
Identification of the Spectral Regions
of Stress Vegetation due to Buried
Archaeological Remains . . . . . . . . . 129--138
Elena Gigliarelli and
Donato Carlea and
Angela Corcella and
Heleni Porfyriou Historical Social Housing: Smart
Analysis and Design for Conservation and
Energy Regeneration . . . . . . . . . . 139--148
Karina Rodriguez Echavarria and
Jaime Kaminski and
David Arnold $3$D Heritage on Mobile Devices:
Scenarios and Opportunities . . . . . . 149--158
Philippe Fleury and
Sophie Madeleine Reviving Ancient Rome: Virtual Reality
at the Service of Cultural Heritage . . 159--169
Georg Zotti and
Wolfgang Neubauer Virtual Reconstructions in a Desktop
Planetarium for Demonstrations in
Cultural Astronomy . . . . . . . . . . . 170--180
Belén Jiménez Fernández-Palacios and
Alessandro Rizzi and
Francesco Nex Augmented Reality for Archaeological
Finds . . . . . . . . . . . . . . . . . 181--190
Hafizur Rahaman and
Rana Das and
Shehzad Zahir Virtual Heritage: Exploring Photorealism 191--200
Thomas P. Kersten and
Maren Lindstaedt Virtual Architectural $3$D Model of the
Imperial Cathedral (Kaiserdom) of
Königslutter, Germany through Terrestrial
Laser Scanning . . . . . . . . . . . . . 201--210
Anonymous Front Matter . . . . . . . . . . . . . . ??
Arjan Blom and
Gerhard de Koning Gans and
Erik Poll and
Joeri de Ruiter and
Roel Verdult Designed to Fail: a USB-Connected Reader
for Online Banking . . . . . . . . . . . 1--16
Benjamin Adolphi and
Hanno Langweg Security Add-Ons for Mobile Platforms 17--30
Torben Jensen and
Heine Pedersen and
Mads Chr. Olesen and
René Rydhof Hansen THAPS: Automated Vulnerability Scanning
of PHP Applications . . . . . . . . . . 31--46
Teodor Sommestad and
Jonas Hallberg Cyber Security Exercises and
Competitions as a Platform for Cyber
Security Experiments . . . . . . . . . . 47--60
Tony Proctor The Development of Cyber Security
Warning, Advice and Report Points . . . 61--72
Ramona Groner and
Philipp Brune Towards an Empirical Examination of IT
Security Infrastructures in SME . . . . 73--88
Fabio Massacci and
Federica Paci How to Select a Security Requirements
Method? A Comparative Study with
Students and Practitioners . . . . . . . 89--104
Job Noorman and
Nick Nikiforakis and
Frank Piessens There Is Safety in Numbers: Preventing
Control-Flow Hijacking by Duplication 105--120
Dimiter Milushev and
Dave Clarke Coinductive Unwinding of
Security-Relevant Hyperproperties . . . 121--136
Björn Ståhl and
Per Mellstrand Retooling and Securing Systemic
Debugging . . . . . . . . . . . . . . . 137--152
Kirsi Helkala and
Nils Kalstad Svendsen and
Per Thorsheim and
Anders Wiehe Cracking Associative Passwords . . . . . 153--168
Jan Zibuschka and
Lothar Fritsch A Hybrid Approach for Highly Available
and Secure Storage of Pseudo-SSO
Credentials . . . . . . . . . . . . . . 169--183
Behrooz Sangchoolie and
Mazdak Rajabi Nasab and
Tomas Olovsson and
Wolfgang John Assessing the Quality of Packet-Level
Traces Collected on Internet Backbone
Links . . . . . . . . . . . . . . . . . 184--198
Jason W. Clark Everything But the Kitchen Sink:
Determining the Effect of Multiple
Attacks on Privacy Preserving Technology
Users . . . . . . . . . . . . . . . . . 199--214
Huiying Duan and
Cäcilia Zirn Can We Identify Manipulative Behavior
and the Corresponding Suspects on Review
Websites Using Supervised Learning? . . 215--230
Tobias Pulls Privacy-Friendly Cloud Storage for the
Data Track . . . . . . . . . . . . . . . 231--246
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Fatiha Djebbar and
Beghdad Ayad Audio Steganalysis Based on Lossless
Data-Compression Techniques . . . . . . 1--9
Yang-Wai Chow and
Willy Susilo and
Duncan S. Wong Enhancing the Perceived Visual Quality
of a Size Invariant Visual Cryptography
Scheme . . . . . . . . . . . . . . . . . 10--21
Carlos Gañán and
Jose L. Muñoz and
Oscar Esparza and
Jorge Mata-Díaz and
Juanjo Alins Impact of the Revocation Service in PKI
Prices . . . . . . . . . . . . . . . . . 22--32
Hatem M. Bahig and
Ashraf Bhery and
Dieaa I. Nassr Cryptanalysis of Multi-Prime RSA with
Small Prime Difference . . . . . . . . . 33--44
Jun Xu and
Lei Hu and
Siwei Sun Implicit Polynomial Recovery and
Cryptanalysis of a Combinatorial Key
Cryptosystem . . . . . . . . . . . . . . 45--57
Shusheng Liu and
Zheng Gong and
Libin Wang Improved Related-Key Differential
Attacks on Reduced-Round LBlock . . . . 58--69
Yajuan Tang Countermeasures on Application Level
Low-Rate Denial-of-Service Attack . . . 70--80
Zouheir Trabelsi and
Liren Zhang and
Safaa Zeidan Firewall Packet Filtering Optimization
Using Statistical Traffic Awareness Test 81--92
John Felix and
Charles Joseph and
Ali A. Ghorbani Group Behavior Metrics for P2P Botnet
Detection . . . . . . . . . . . . . . . 93--104
Yuan Ma and
Luning Xia and
Jingqiang Lin and
Jiwu Jing and
Zongbin Liu and
Xingjie Yu Hardware Performance Optimization and
Evaluation of SM3 Hash Algorithm on FPGA 105--118
Hao Xiong and
Cong Zhang and
Tsz Hon Yuen and
Echo P. Zhang and
Siu Ming Yiu and
Sihan Qing Continual Leakage-Resilient Dynamic
Secret Sharing in the Split-State Model 119--130
Wilko Henecka and
Nigel Bean and
Matthew Roughan Conversion of Real-Numbered
Privacy-Preserving Problems into the
Integer Domain . . . . . . . . . . . . . 131--141
Yang Wang and
Man Ho Au and
Willy Susilo Perfect Ambiguous Optimistic Fair
Exchange . . . . . . . . . . . . . . . . 142--153
Xiaoqiong Pang and
Bo Yang and
Qiong Huang Privacy-Preserving Noisy Keyword Search
in Cloud Computing . . . . . . . . . . . 154--166
Tsz Hon Yuen and
Joseph K. Liu and
Xinyi Huang and
Man Ho Au and
Willy Susilo and
Jianying Zhou Forward Secure Attribute-Based
Signatures . . . . . . . . . . . . . . . 167--177
Ning Ding and
Dawu Gu On Constant-Round Precise Zero-Knowledge 178--190
Jingwei Li and
Chunfu Jia and
Jin Li and
Xiaofeng Chen Outsourcing Encryption of
Attribute-Based Encryption with
MapReduce . . . . . . . . . . . . . . . 191--201
Atsushi Fujioka and
Taiichi Saito and
Keita Xagawa Security Enhancement of Identity-Based
Identification with Reversibility . . . 202--213
Raja Naeem Akram and
Konstantinos Markantonakis and
Keith Mayes Coopetitive Architecture to Support a
Dynamic and Scalable NFC Based Mobile
Services Architecture . . . . . . . . . 214--227
Jiawei Zhu and
Zhi Guan and
Yang Yang and
Liangwen Yu and
Huiping Sun and
Zhong Chen Permission-Based Abnormal Application
Detection for Android . . . . . . . . . 228--239
Anonymous Front Matter . . . . . . . . . . . . . . ??
Gavin C. Cawley Over-Fitting in Model Selection and Its
Avoidance . . . . . . . . . . . . . . . 1--1
Paola Sebastiani Intelligent Data Analysis of Human
Genetic Data . . . . . . . . . . . . . . 2--6
Arno Siebes Queries for Data Analysis . . . . . . . 7--22
Zaenal Akbar and
Violeta N. Ivanova and
Michael R. Berthold Parallel Data Mining Revisited. Better,
Not Faster . . . . . . . . . . . . . . . 23--34
Renato Cordeiro de Amorim and
Trevor Fenner Weighting Features for Partition around
Medoids Using the Minkowski Metric . . . 35--44
Renato Cordeiro de Amorim and
Peter Komisarczuk On Initializations for the Minkowski
Weighted K-Means . . . . . . . . . . . . 45--55
Maurice Berk and
Giovanni Montana A Skew-$t$-Normal Multi-level
Reduced-Rank Functional PCA Model for
the Analysis of Replicated Genomics Time
Course Data . . . . . . . . . . . . . . 56--66
Mehrez Boulares and
Mohamed Jemni Methodological Foundation for Sign
Language $3$D Motion Trajectory Analysis 67--77
Christian Braune and
Christian Borgelt and
Sonja Grün Assembly Detection in Continuous Neural
Spike Train Data . . . . . . . . . . . . 78--89
Josep Carmona and
Ricard Gavald\`a Online Techniques for Dealing with
Concept Drift in Process Mining . . . . 90--102
Jun Chen and
Mahdi Mahfouf and
Chris Bingham and
Yu Zhang and
Zhijing Yang and
Michael Gallimore An Evolutionary Based Clustering
Algorithm Applied to Dada Compression
for Industrial Systems . . . . . . . . . 103--113
Wouter Duivesteijn and
Eneldo Loza Mencía and
Johannes Fürnkranz and
Arno Knobbe Multi-label LeGo --- Enhancing
Multi-label Classifiers with Local
Patterns . . . . . . . . . . . . . . . . 114--125
Andrej Gisbrecht and
Daniela Hofmann and
Barbara Hammer Discriminative Dimensionality Reduction
Mappings . . . . . . . . . . . . . . . . 126--138
Alípio M. Jorge and
João Mendes-Moreira and
Jorge Freire de Sousa and
Carlos Soares Finding Interesting Contexts for
Explaining Deviations in Bus Trip
Duration Using Distribution Rules . . . 139--149
Frank Klawonn and
Nada Abidi and
Evelin Berger and
Lothar Jänsch Curve Fitting for Short Time Series Data
from High Throughput Experiments with
Correction for Biological Variation . . 150--160
Kleanthis-Nikolaos Kontonasios and
Tijl DeBie Formalizing Complex Prior Information to
Quantify Subjective Interestingness of
Frequent Pattern Sets . . . . . . . . . 161--171
Christine Largeron and
Christophe Moulin and
Mathias Géry MCut: a Thresholding Strategy for
Multi-label Classification . . . . . . . 172--183
Matthijs van Leeuwen and
Diyah Puspitaningrum Improving Tag Recommendation Using Few
Associations . . . . . . . . . . . . . . 184--194
Eric Malmi and
Juha Raitio and
Oskar Kohonen and
Krista Lagus and
Timo Honkela Identifying Anomalous Social Contexts
from Mobile Proximity Data Using
Binomial Mixture Models . . . . . . . . 195--206
Jean-Philippe Métivier and
Patrice Boizumault and
Bruno Crémilleux and
Mehdi Khiari Constrained Clustering Using SAT . . . . 207--218
Anonymous Front Matter . . . . . . . . . . . . . . ??
Kirsty Kitto and
Fabio Boschetti and
Peter Bruza The Quantum Inspired Modelling of
Changing Attitudes and Self-organising
Societies . . . . . . . . . . . . . . . 1--12
François Dubois and
Isabelle Greff and
Thomas Hélie On Least Action Principles for Discrete
Quantum Scales . . . . . . . . . . . . . 13--23
Dominic Widdows and
Trevor Cohen Real, Complex, and Binary Semantic
Vectors . . . . . . . . . . . . . . . . 24--35
Diederik Aerts and
Jan Broekaert and
Liane Gabora and
Tomas Veloz The Guppy Effect as Interference . . . . 36--47
Diederik Aerts and
Sandro Sozzo and
Jocelyn Tapia A Quantum Model for the Ellsberg and
Machina Paradoxes . . . . . . . . . . . 48--59
Masanari Asano and
Irina Basieva and
Andrei Khrennikov and
Masanori Ohya A Quantum-Like Model of \em Escherichia
coli's Metabolism Based on Adaptive
Dynamics . . . . . . . . . . . . . . . . 60--67
Giuseppe Vitiello Fractals, Dissipation and Coherent
States . . . . . . . . . . . . . . . . . 68--79
Jerome R. Busemeyer and
Zheng Wang and
Jennifer S. Trueblood Hierarchical Bayesian Estimation of
Quantum Decision Model Parameters . . . 80--89
Trevor Cohen and
Dominic Widdows and
Lance De Vine and
Roger Schvaneveldt Many Paths Lead to Discovery: Analogical
Retrieval of Cancer Therapies . . . . . 90--101
Ariane Lambert-Mogiliansky and
Jerome R. Busemeyer Emergence and Instability of Individual
Identity . . . . . . . . . . . . . . . . 102--113
Diederik Aerts and
Sandro Sozzo Entanglement of Conceptual Entities in
Quantum Model Theory (QMod) . . . . . . 114--125
Diederik Aerts and
Sandro Sozzo Quantum Model Theory (QMod): Modeling
Contextual Emergent Entangled
Interfering Entities . . . . . . . . . . 126--137
Masanari Asano and
Irina Basieva and
Andrei Khrennikov and
Masanori Ohya Quantum-Like Representation of
Irrational Inference . . . . . . . . . . 138--147
Christian Flender and
Günter Müller Type Indeterminacy in Privacy Decisions:
The Privacy Paradox Revisited . . . . . 148--159
Masanari Asano and
Irina Basieva and
Andrei Khrennikov and
Masanori Ohya Adaptive Dynamics and Its Application to
Context Dependent Systems Breaking the
Classical Probability Law . . . . . . . 160--171
David Galea and
Peter Bruza and
Kirsty Kitto and
Douglas Nelson Modelling Word Activation in Semantic
Networks: Three Scaled Entanglement
Models Compared . . . . . . . . . . . . 172--183
Ehtibar N. Dzhafarov and
Janne V. Kujala Quantum Entanglement and the Issue of
Selective Influences in Psychology: An
Overview . . . . . . . . . . . . . . . . 184--195
Thomas Filk Quantum-Like Behavior of Classical
Systems . . . . . . . . . . . . . . . . 196--206
Sándor Darányi and
Peter Wittek Connecting the Dots: Mass, Energy, Word
Meaning, and Particle-Wave Duality . . . 207--217
Michel Gondran and
Sébastien Lepaul Indiscernability and Mean Field, a Base
of Quantum Interaction . . . . . . . . . 218--226
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Jesse Gray and
Cynthia Breazeal Manipulating Mental States through
Physical Action . . . . . . . . . . . . 1--14
Jaap Ham and
Mirjam van Esch and
Yvonne Limpens and
Jente de Pee and
John-John Cabibihan The Automaticity of Social Behavior
towards Robots: The Influence of
Cognitive Load on Interpersonal Distance
to Approachable versus Less Approachable
Robots . . . . . . . . . . . . . . . . . 15--25
Caixia Liu and
Jaap Ham and
Eric Postma and
Cees Midden and
Bart Joosten and
Martijn Goudbeek How to Make a Robot Smile? Perception of
Emotional Expressions from
Digitally-Extracted Facial Landmark
Configurations . . . . . . . . . . . . . 26--34
Gabriele Trovato and
Tatsuhiro Kishi and
Nobutsuna Endo and
Kenji Hashimoto and
Atsuo Takanishi A Cross-Cultural Study on Generation of
Culture Dependent Facial Expressions of
Humanoid Social Robot . . . . . . . . . 35--44
Mary-Anne Williams Robot Social Intelligence . . . . . . . 45--55
Evgenios Vlachos and
Henrik Schärfe Android Emotions Revealed . . . . . . . 56--65
Ben Robins and
Kerstin Dautenhahn and
Paul Dickerson Embodiment and Cognitive Learning ---
Can a Humanoid Robot Help Children with
Autism to Learn about Tactile Social
Behaviour? . . . . . . . . . . . . . . . 66--75
Alvin Wong and
Yeow Kee Tan and
Adrian Tay and
Anthony Wong and
Dilip Kumar Limbu and
Tran Anh Dung A User Trial Study to Understand Play
Behaviors of Autistic Children Using a
Social Robot . . . . . . . . . . . . . . 76--85
Laura Boccanfuso and
Eva Juarez Perez and
Myra Robinson and
Jason M. O'Kane Collecting Heart Rate Using a High
Precision, Non-contact, Single-Point
Infrared Temperature Sensor . . . . . . 86--97
Michihiro Shimada and
Takayuki Kanda and
Satoshi Koizumi How Can a Social Robot Facilitate
Children's Collaboration? . . . . . . . 98--107
Barbara Klein and
Glenda Cook Emotional Robotics in Elder Care --- a
Comparison of Findings in the UK and
Germany . . . . . . . . . . . . . . . . 108--117
Haibin Yan and
Marcelo H. Ang Jr. and
Aun Neow Poo Dorothy Robotubby: a Robotic Nanny . . . 118--127
Susanne Frennert and
Britt Östlund and
Håkan Eftring Would Granny Let an Assistive Robot into
Her Home? . . . . . . . . . . . . . . . 128--137
Tobias Körtner and
Alexandra Schmid and
Daliah Batko-Klein and
Christoph Gisinger and
Andreas Huber How Social Robots Make Older Users
Really Feel Well --- a Method to Assess
Users' Concepts of a Social Robotic
Assistant . . . . . . . . . . . . . . . 138--147
Rebecca Q. Stafford and
Bruce A. MacDonald and
Elizabeth Broadbent Identifying Specific Reasons Behind
Unmet Needs May Inform More Specific
Eldercare Robot Design . . . . . . . . . 148--157
Akira Yamazaki and
Ryosuke Masuda Various Foods Handling Movement of
Chopstick-Equipped Meal Assistant Robot
and There Evaluation . . . . . . . . . . 158--167
Sophya Yumakulov and
Dean Yergens and
Gregor Wolbring Imagery of Disabled People within Social
Robotics Research . . . . . . . . . . . 168--177
I-Han Kuo and
Chandimal Jayawardena and
Elizabeth Broadbent and
Rebecca Q. Stafford HRI Evaluation of a Healthcare Service
Robot . . . . . . . . . . . . . . . . . 178--187
Claudia B. Rebola and
Gbolabo Ogunmakin and
Patricio A. Vela Automated Behavioral Mapping for
Monitoring Social Interactions among
Older Adults . . . . . . . . . . . . . . 188--198
Julia Fink Anthropomorphism and Human Likeness in
the Design of Robots and Human-Robot
Interaction . . . . . . . . . . . . . . 199--208
Anonymous Front Matter . . . . . . . . . . . . . . ??
Bruce Christianson Introduction: Bringing Protocols to Life
(Transcript of Discussion) . . . . . . . 1--2
Todd R. Andel and
Alec Yasinsac Secure Internet Voting Protocol for
Overseas Military Voters . . . . . . . . 3--14
Todd R. Andel Secure Internet Voting Protocol for
Overseas Military Voters (Transcript of
Discussion) . . . . . . . . . . . . . . 15--22
Feng Hao and
Brian Randell and
Dylan Clarke Self-enforcing Electronic Voting . . . . 23--31
Feng Hao Self-enforcing Electronic Voting
(Transcript of Discussion) . . . . . . . 32--40
Phillip J. Brooke and
Richard F. Paige and
Christopher Power Approaches to Modelling Security
Scenarios with Domain-Specific Languages 41--54
Phillip J. Brooke Approaches to Modelling Security
Scenarios with Domain-Specific
Languages(Transcript of Discussion) . . 55--59
Sandy Clark and
Matt Blaze and
Jonathan M. Smith The Casino and the OODA Loop . . . . . . 60--63
Matt Blaze The Casino and the OODA Loop: Why Our
Protocols Always Eventually Fail
(Transcript of Discussion) . . . . . . . 64--75
Joseph Bonneau Statistical Metrics for Individual
Password Strength . . . . . . . . . . . 76--86
Joseph Bonneau Statistical Metrics for Individual
Password Strength (Transcript of
Discussion) . . . . . . . . . . . . . . 87--95
Tiffany Hyun-Jin Kim and
Virgil Gligor and
Adrian Perrig Street-Level Trust Semantics for
Attribute Authentication . . . . . . . . 96--115
Virgil Gligor Street-Level Trust Semantics for
Attribute Authentication (Transcript of
Discussion) . . . . . . . . . . . . . . 116--125
Dylan Clarke and
Feng Hao and
Brian Randell Analysis of Issues and Challenges of
E-Voting in the UK . . . . . . . . . . . 126--135
Dylan Clarke Analysis of Issues and Challenges of
E-Voting in the UK (Transcript of
Discussion) . . . . . . . . . . . . . . 136--144
Ross Anderson Protocol Governance: The Elite, or the
Mob? . . . . . . . . . . . . . . . . . . 145--145
Ross Anderson Protocol Governance: The Elite, or the
Mob? (Transcript of Discussion) . . . . 146--160
Yuko Murayama and
Yasuhiro Fujihara and
Yoshia Saito and
Dai Nishioka Usability Issues in Security . . . . . . 161--171
Yuko Murayama Usability Issues in Security (Transcript
of Discussion) . . . . . . . . . . . . . 172--180
Shah Mahmood and
Yvo Desmedt Usable Privacy by Visual and Interactive
Control of Information Flow . . . . . . 181--188
Anonymous Front Matter . . . . . . . . . . . . . . ??
Neville A. Stanton Human Factors Engineering as the
Methodological Babel Fish: Translating
User Needs into Software Design . . . . 1--17
Emilia Mendes Improving Software Effort Estimation
Using an Expert-Centred Approach . . . . 18--33
Lucio Davide Spano and
Antonio Cisternino and
Fabio Patern\`o A Compositional Model for Gesture
Definition . . . . . . . . . . . . . . . 34--52
Llúcia Masip and
Célia Martinie and
Marco Winckler and
Philippe Palanque and
Toni Granollers A Design Process for Exhibiting Design
Choices and Trade-Offs in (Potentially)
Conflicting User Interface Guidelines 53--71
Célia Martinie and
Philippe Palanque and
David Navarre and
Eric Barboni A Development Process for Usable Large
Scale Interactive Critical Systems:
Application to Satellite Ground Segments 72--93
Kati Kuusinen and
Tommi Mikkonen and
Santtu Pakarinen Agile User Experience Development in a
Large Software Organization: Good
Expertise but Limited Impact . . . . . . 94--111
Carlos Eduardo Silva and
José Creissac Campos Can GUI Implementation Markup Languages
Be Used for Modelling? . . . . . . . . . 112--129
Chris Roast Constraining and Creating Solutions ---
Reflections on the Analysis of Early
Design . . . . . . . . . . . . . . . . . 130--145
Artur H. Kronbauer and
Celso A. S. Santos and
Vaninha Vieira Smartphone Applications Usability
Evaluation: a Hybrid Model and Its
Implementation . . . . . . . . . . . . . 146--163
Thomas Grill and
Ondrej Polacek and
Manfred Tscheligi Methods towards API Usability: a
Structural Analysis of Usability Problem
Categories . . . . . . . . . . . . . . . 164--180
Joël Vogt and
Kris Luyten and
Jan Van den Bergh and
Karin Coninx and
Andreas Meier Putting Dementia into Context . . . . . 181--198
Jose Danado and
Fabio Patern\`o Puzzle: a Visual-Based Environment for
End User Development in Touch-Based
Mobile Phones . . . . . . . . . . . . . 199--216
Shamal Faily and
John Lyle and
Andre Paul and
Andrea Atzeni and
Dieter Blomme and
Heiko Desruelle Requirements Sensemaking Using Concept
Maps . . . . . . . . . . . . . . . . . . 217--232
Anne-Marie Déry-Pinna and
Audrey Occello and
Michel Riveill Towards Conflict Management in User
Interface Composition Driven by Business
Needs . . . . . . . . . . . . . . . . . 233--250
Oumout Chouseinoglou and
Semih Bilgen A Model for Assessing Organizational
Learning in Software Development
Organizations . . . . . . . . . . . . . 251--258
Kay Behrenbruch and
Martin Atzmüller and
Christoph Evers and
Ludger Schmidt and
Gerd Stumme A Personality Based Design Approach
Using Subgroup Discovery . . . . . . . . 259--266
Brigit van Loggem Assessing Use Complexity of Software: a
Tool for Documentation Designers . . . . 267--274
Amin Rasooli and
Peter Forbrig and
Fattaneh Tagivareh Collecting Users Profiles for Web
Applications . . . . . . . . . . . . . . 275--282
Elton R. Vieira and
Carina Alves and
Letícia Duboc Creativity Patterns Guide: Support for
the Application of Creativity Techniques
in Requirements Engineering . . . . . . 283--290
Malte Ressin and
Cecilia Oyugi and
José Abdelnour-Nocera and
David Lee and
Dharam Panesar Exploring Local Cultural Perspectives in
User Interface Development in an Indian
Offshoring Context: a View from the UK 291--298
Anonymous Front Matter . . . . . . . . . . . . . . ??
Pedro Centieiro and
Teresa Romão and
A. Eduardo Dias Applaud Having Fun: a Mobile Game to
Cheer Your Favourite Sports Team . . . . 1--16
Kazuyuki Fujita and
Hiroyuki Kidokoro and
Yuichi Itoh Paranga: An Interactive Flipbook . . . . 17--30
Taku Hachisu and
Hiroyuki Kajimoto Augmentation of Toothbrush by Modulating
Sounds Resulting from Brushing . . . . . 31--43
Shigeyuki Hirai and
Yoshinobu Sakakibara and
Seiho Hayakawa Bathcratch: Touch and Sound-Based DJ
Controller Implemented on a Bathtub . . 44--56
Hiroyuki Kanke and
Yoshinari Takegawa and
Tsutomu Terada and
Masahiko Tsukamoto Airstic Drum: a Drumstick for
Integration of Real and Virtual Drums 57--69
Fausto Mourato and
Fernando Birra and
Manuel Próspero dos Santos Enhancing Level Difficulty and
Additional Content in Platform
Videogames through Graph Analysis . . . 70--84
Tatsuhiko Okazaki and
Tsutomu Terada and
Masahiko Tsukamoto A System for Supporting Performers in
Stuffed Suits . . . . . . . . . . . . . 85--100
André Pereira and
Rui Prada and
Ana Paiva Socially Present Board Game Opponents 101--116
Kiyoshi Shin and
Kosuke Kaneko and
Yu Matsui and
Koji Mikami and
Masaru Nagaku Localizing Global Game Jam: Designing
Game Development for Collaborative
Learning in the Social Context . . . . . 117--132
Dhaval Vyas and
Yanqing Cui and
Jarno Ojala and
Guido Grassel Producing while Consuming: Social
Interaction around Photos Shared within
Private Group . . . . . . . . . . . . . 133--150
Shih-Han Chan and
Stéphane Natkin and
Guillaume Tiger and
Alexandre Topol Extensible Sound Description in COLLADA:
a Unique File for a Rich Sound Design 151--166
Tai-Yun Chen and
Hung-Wei Hsu and
Wen-Kai Tai and
Chin-Chen Chang An Automatic Race Track Generating
System . . . . . . . . . . . . . . . . . 167--181
Yongsoon Choi and
Rahul Parsani and
Xavier Roman and
Anshul Vikram Pandey and
Adrian David Cheok Light Perfume: Designing a Wearable
Lighting and Olfactory Accessory for
Empathic Interactions . . . . . . . . . 182--197
Chris Deaker and
Masood Masoodian and
Bill Rogers A Survey of Players' Opinions on
Interface Customization in World of
Warcraft . . . . . . . . . . . . . . . . 198--213
Dimitris Grammenos and
George Margetis and
Panagiotis Koutlemanis and
Xenophon Zabulis 53.090 Virtual Rusks = 510 Real Smiles
Using a Fun Exergame Installation for
Advertising Traditional Food Products 214--229
Kaj Grònbæk and
Karen Johanne Kortbek and
Claus Mòller and
Jesper Nielsen and
Liselott Stenfeldt Designing Playful Interactive
Installations for Urban Environments ---
The SwingScape Experience . . . . . . . 230--245
Olivier Guy and
Ronan Champagnat Flashback in Interactive Storytelling 246--261
Robert Howland and
Sachi Urano and
Junichi Hoshino SanjigenJiten: Computer Assisted
Language Learning System within a $3$D
Game Environment . . . . . . . . . . . . 262--273
Yuko Konya and
Itiro Siio A Caption Presentation System for the
Hearing Impaired People Attending
Theatrical Performances . . . . . . . . 274--286
Kinyo Kou and
Yoichiro Kawaguchi Emergent Gait Evolution of Quadruped
Artificial Life . . . . . . . . . . . . 287--296
Anonymous Front Matter . . . . . . . . . . . . . . ??
Oana Andrei and
Muffy Calder Trend-Based Analysis of a Population
Model of the AKAP Scaffold Protein . . . 1--25
Alessio Angius and
András Horváth and
Verena Wolf Quasi Product Form Approximation for
Markov Models of Reaction Networks . . . 26--52
Ezio Bartocci and
Pietro Li\`o and
Emanuela Merelli and
Nicola Paoletti Multiple Verification in Complex
Biological Systems: The Bone Remodelling
Case Study . . . . . . . . . . . . . . . 53--76
L. Brim and
J. Fabriková and
S. Dra\vzan and
D. \vSafránek On Approximative Reachability Analysis
of Biochemical Dynamical Systems . . . . 77--101
Andrzej Ehrenfeucht and
Jetty Kleijn and
Maciej Koutny and
Grzegorz Rozenberg Minimal Reaction Systems . . . . . . . . 102--122
Cristian Versari and
Gianluigi Zavattaro Complex Functional Rates in Rule-Based
Languages for Biochemistry . . . . . . . 123--150
Qixia Yuan and
Panuwat Trairatphisan and
Jun Pang and
Sjouke Mauw and
Monique Wiesinger Probabilistic Model Checking of the PDGF
Signaling Pathway . . . . . . . . . . . 151--180
Andrzej Mizera and
Eugen Czeizler and
Ion Petre Self-assembly Models of Variable
Resolution . . . . . . . . . . . . . . . 181--203
Rodrick Wallace Metabolic Constraints on the Evolution
of Genetic Codes: Did Multiple
Preaerobic' Ecosystem Transitions
Entrain Richer Dialects via Serial
Endosymbiosis? . . . . . . . . . . . . . 204--232
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
George Nagy Estimation, Learning, and Adaptation:
Systems That Improve with Use . . . . . 1--10
Kenichi Kanatani Optimization Techniques for Geometric
Estimation: Beyond Minimization . . . . 11--30
Ale\vs Leonardis Hierarchical Compositional
Representations of Object Structure . . 31--32
Lin Han and
Luca Rossi and
Andrea Torsello and
Richard C. Wilson and
Edwin R. Hancock Information Theoretic Prototype
Selection for Unattributed Graphs . . . 33--41
Benoit Gaüz\`ere and
Luc Brun and
Didier Villemin Graph Kernels: Crossing Information from
Different Patterns Using Graph Edit
Distance . . . . . . . . . . . . . . . . 42--50
Robert P. W. Duin and
Ana L. N. Fred and
Marco Loog and
El\.zbieta P\kekalska Mode Seeking Clustering by KNN and Mean
Shift Evaluated . . . . . . . . . . . . 51--59
Zhouyu Fu and
Guojun Lu and
Kai-Ming Ting and
Dengsheng Zhang Learning Sparse Kernel Classifiers in
the Primal . . . . . . . . . . . . . . . 60--69
Lucas Franek and
Xiaoyi Jiang Evolutionary Weighted Mean Based
Framework for Generalized Median
Computation with Application to Strings 70--78
Lu Bai and
Edwin R. Hancock Graph Complexity from the
Jensen--Shannon Divergence . . . . . . . 79--88
Aasa Feragen Complexity of Computing Distances
between Geometric Trees . . . . . . . . 89--97
Xavier Cortés and
Francesc Serratosa and
Albert Solé-Ribalta Active Graph Matching Based on Pairwise
Probabilities between Nodes . . . . . . 98--106
Nicola Rebagliati and
Albert Solé-Ribalta and
Marcello Pelillo and
Francesc Serratosa On the Relation between the Common
Labelling and the Median Graph . . . . . 107--115
Silvio Jamil F. Guimarães and
Jean Cousty and
Yukiko Kenmochi and
Laurent Najman A Hierarchical Image Segmentation
Algorithm Based on an Observation Scale 116--125
Martin Tschirsich and
Arjan Kuijper A Discrete Scale Space Neighborhood for
Robust Deep Structure Extraction . . . . 126--134
Jaume Gibert and
Ernest Valveny and
Horst Bunke and
Alicia Fornés On the Correlation of Graph Edit
Distance and $L_1$ Distance in the
Attribute Statistics Embedding Space . . 135--143
Luca Rossi and
Andrea Torsello and
Edwin R. Hancock Approximate Axial Symmetries from
Continuous Time Quantum Walks . . . . . 144--152
Sergej Lewin and
Xiaoyi Jiang and
Achim Clausing A Clustering-Based Ensemble Technique
for Shape Decomposition . . . . . . . . 153--161
Martin Tschirsich and
Arjan Kuijper Laplacian Eigenimages in Discrete Scale
Space . . . . . . . . . . . . . . . . . 162--170
Laura Antanas and
Paolo Frasconi and
Fabrizio Costa and
Tinne Tuytelaars and
Luc De Raedt A Relational Kernel-Based Framework for
Hierarchical Image Understanding . . . . 171--180
Lu Bai and
Edwin R. Hancock and
Peng Ren A Jensen--Shannon Kernel for Hypergraphs 181--189
Anonymous Front Matter . . . . . . . . . . . . . . ??
Jean-Paul Laumond A Geometric Perspective of
Anthropomorphic Embodied Actions . . . . 1--1
Yoshiyuki Sankai Cybernics: Fusion of Human, Machine and
Information . . . . . . . . . . . . . . 2--2
Michael Beetz If Abstraction Is the Answer, What Is
the Question?--- Reasoning for Everyday
Manipulation Tasks . . . . . . . . . . . 3--3
Salvatore M. Anzalone and
Yuichiro Yoshikawa and
Hiroshi Ishiguro and
Emanuele Menegatti Towards Partners Profiling in Human
Robot Interaction Contexts . . . . . . . 4--15
Blagovest Vladimirov and
Hyun Kim and
Namshik Park Motivation-Based Autonomous Behavior
Control of Robotic Computer . . . . . . 16--27
Kazuyoshi Wada and
Keisuke Takayama and
Yusuke Suganuma and
Toshihiko Suzuki An Evaluation Method for Smart Variable
Space in Living Space . . . . . . . . . 28--39
Konrad Ku\lakowski and
Tomasz Szmuc Modeling Robot Behavior with CCL . . . . 40--51
Robert Coleman and
Vladimir Estivill-Castro and
René Hexel and
Carl Lusty Visual-Trace Simulation of Concurrent
Finite-State Machines for Validation and
Model-Checking of Complex Behaviour . . 52--64
Evan Drumwright Fast Dynamic Simulation of Highly
Articulated Robots with Contact via
$\Theta(n^2)$ Time Dense Generalized
Inertia Matrix Inversion . . . . . . . . 65--76
Xiaogang Xiong and
Ryo Kikuuwe and
Motoji Yamamoto A Differential-Algebraic Multistate
Friction Model . . . . . . . . . . . . . 77--88
Andreas Rune Fugl and
Henrik Gordon Petersen and
Morten Willatzen Simulation of Flexible Objects in
Robotics . . . . . . . . . . . . . . . . 89--100
Florian Lier and
Simon Schulz and
Ingo Lütkebohle Continuous Integration for Iterative
Validation of Simulated Robot Models . . 101--112
Arne Nordmann and
Matthias Rolf and
Sebastian Wrede Software Abstractions for Simulation and
Control of a Continuum Robot . . . . . . 113--124
Paul Kilgo and
Eugene Syriani and
Monica Anderson A Visual Modeling Language for RDIS and
ROS Nodes Using AToM$^3$ . . . . . . . . 125--136
Andrew Kimmel and
Andrew Dobson and
Zakary Littlefield and
Athanasios Krontiris and
James Marble PRACSYS: An Extensible Architecture for
Composing Motion Controllers and
Planners . . . . . . . . . . . . . . . . 137--148
Saadia Dhouib and
Selma Kchir and
Serge Stinckwich and
Tewfik Ziadi and
Mikal Ziane RobotML, a Domain-Specific Language to
Design, Simulate and Deploy Robotic
Applications . . . . . . . . . . . . . . 149--160
Luca Gherardi and
Davide Brugali and
Daniele Comotti A Java vs. C++ Performance Evaluation: a
$3$D Modeling Benchmark . . . . . . . . 161--172
Gordon Klaus and
Kyrre Glette and
Jim Tòrresen A Comparison of Sampling Strategies for
Parameter Estimation of a Robot
Simulator . . . . . . . . . . . . . . . 173--184
Masahiro Shiomi and
Francesco Zanlungo and
Kotaro Hayashi and
Takayuki Kanda A Framework with a Pedestrian Simulator
for Deploying Robots into a Real
Environment . . . . . . . . . . . . . . 185--196
Gilberto Echeverria and
Séverin Lemaignan and
Arnaud Degroote and
Simon Lacroix and
Michael Karg Simulating Complex Robotic Scenarios
with MORSE . . . . . . . . . . . . . . . 197--208
Anonymous Front Matter . . . . . . . . . . . . . . ??
Yiming Jing and
Gail-Joon Ahn and
Hongxin Hu Model-Based Conformance Testing for
Android . . . . . . . . . . . . . . . . 1--18
Takanori Yasuda and
Tsuyoshi Takagi and
Kouichi Sakurai Application of Scalar Multiplication of
Edwards Curves to Pairing-Based
Cryptography . . . . . . . . . . . . . . 19--36
Chien-Ning Chen and
Nisha Jacob and
Sebastian Kutzner and
San Ling and
Axel Poschmann Standardized Signature Algorithms on
Ultra-constrained 4-Bit MCU . . . . . . 37--50
Kenta Nekado and
Yasuyuki Nogami and
Kengo Iokibe Very Short Critical Path Implementation
of AES with Direct Logic Gates . . . . . 51--68
Kazuki Yoneyama One-Round Authenticated Key Exchange
with Strong Forward Secrecy in the
Standard Model against Constrained
Adversary . . . . . . . . . . . . . . . 69--86
S. Sree Vivek and
S. Sharmila Deva Selvi and
C. Pandu Rangan Compact Stateful Encryption Schemes with
Ciphertext Verifiability . . . . . . . . 87--104
Geong Sen Poh and
Moesfa Soeheila Mohamad and
Muhammad Reza Z'aba Structured Encryption for Conceptual
Graphs . . . . . . . . . . . . . . . . . 105--122
Akinori Kawachi and
Hirotoshi Takebe and
Keisuke Tanaka Symmetric-Key Encryption Scheme with
Multi-ciphertext Non-malleability . . . 123--137
Takanori Isobe and
Toshihiro Ohigashi and
Masakatu Morii Slide Cryptanalysis of Lightweight
Stream Cipher RAKAPOSHI . . . . . . . . 138--155
Yu Sasaki and
Lei Wang and
Yasuhiro Takasaki and
Kazuo Sakiyama and
Kazuo Ohta Boomerang Distinguishers for Full
HAS-160 Compression Function . . . . . . 156--169
Lei Wang and
Yu Sasaki and
Kazuo Sakiyama and
Kazuo Ohta Polynomial-Advantage Cryptanalysis of
$3$D Cipher and $3$D-Based Hash Function 170--181
Jingjing Wang and
Kefei Chen and
Shixiong Zhu Annihilators of Fast Discrete Fourier
Spectra Attacks . . . . . . . . . . . . 182--196
Jiqiang Lu and
Yongzhuang Wei and
Enes Pasalic and
Pierre-Alain Fouque Meet-in-the-Middle Attack on Reduced
Versions of the Camellia Block Cipher 197--215
Susumu Kiyoshima and
Yoshifumi Manabe and
Tatsuaki Okamoto Efficient Concurrent Oblivious Transfer
in Super-Polynomial-Simulation Security 216--232
Youwen Zhu and
Tsuyoshi Takagi and
Liusheng Huang Efficient Secure Primitive for Privacy
Preserving Distributed Computations . . 233--243
Itsuki Suzuki and
Maki Yoshida and
Toru Fujiwara Generic Construction of GUC Secure
Commitment in the KRK Model . . . . . . 244--260
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Twan van Laarhoven and
Elena Marchiori Robust Community Detection Methods with
Resolution Parameter for Complex
Detection in Protein Protein Interaction
Networks . . . . . . . . . . . . . . . . 1--13
Pedro J. Ballester Machine Learning Scoring Functions Based
on Random Forest and Support Vector
Regression . . . . . . . . . . . . . . . 14--25
Sami Laroum and
Béatrice Duval and
Dominique Tessier and
Jin-Kao Hao A Genetic Algorithm for Scale-Based
Translocon Simulation . . . . . . . . . 26--37
Yifeng Li and
Alioune Ngom and
Luis Rueda A Framework of Gene Subset Selection
Using Multiobjective Evolutionary
Algorithm . . . . . . . . . . . . . . . 38--48
Masae Hosoda and
Yukie Akune and
Kiyoko F. Aoki-Kinoshita Multiple Tree Alignment with Weights
Applied to Carbohydrates to Extract
Binding Recognition Patterns . . . . . . 49--58
Shuzhong Zhang and
Kun Wang and
Cody Ashby and
Bilian Chen and
Xiuzhen Huang A Unified Adaptive Co-identification
Framework for High-D Expression Data . . 59--70
Chendra Hadi Suryanto and
Hiroto Saigo and
Kazuhiro Fukui Protein Clustering on a Grassmann
Manifold . . . . . . . . . . . . . . . . 71--81
Boris Shabash and
Kay Wiese and
Edward Glen Improving the Portability and
Performance of jViz.RNA --- a Dynamic
RNA Visualization Software . . . . . . . 82--93
Lavneet Singh and
Girija Chetty and
Dharmendra Sharma A Novel Machine Learning Approach for
Detecting the Brain Abnormalities from
MRI Structural Images . . . . . . . . . 94--105
Gabriel Keeble-Gagn\`ere and
Johan Nyström-Persson and
Matthew I. Bellgard and
Kenji Mizuguchi An Open Framework for Extensible
Multi-stage Bioinformatics Software . . 106--117
João Cardoso and
Paulo Vilaça and
Simão Soares and
Miguel Rocha An Algorithm to Assemble
Gene-Protein-Reaction Associations for
Genome-Scale Metabolic Model
Reconstruction . . . . . . . . . . . . . 118--128
Marcelo Maraschin and
Amélia Somensi-Zeggio and
Simone K. Oliveira and
Shirley Kuhnen A Machine Learning and Chemometrics
Assisted Interpretation of Spectroscopic
Data --- a NMR-Based Metabolomics
Platform for the Assessment of Brazilian
Propolis . . . . . . . . . . . . . . . . 129--140
Y.-H. Taguchi and
Akira Okamoto Principal Component Analysis for
Bacterial Proteomic Analysis . . . . . . 141--152
Nikolay Razin and
Dmitry Sungurov and
Vadim Mottl and
Ivan Torshin and
Valentina Sulimova Application of the Multi-modal Relevance
Vector Machine to the Problem of Protein
Secondary Structure Prediction . . . . . 153--165
Fabienne Thomarat and
Fabien Lauer and
Yann Guermeur Cascading Discriminant and Generative
Models for Protein Secondary Structure
Prediction . . . . . . . . . . . . . . . 166--177
Masahito Ohue and
Yuri Matsuzaki and
Takashi Ishida and
Yutaka Akiyama Improvement of the Protein--Protein
Docking Prediction by Introducing a
Simple Hydrophobic Interaction Model: An
Application to Interaction Pathway
Analysis . . . . . . . . . . . . . . . . 178--187
Cem Meydan and
Osman Ugur Sezerman Representation of Protein Secondary
Structure Using Bond-Orientational Order
Parameters . . . . . . . . . . . . . . . 188--197
Yifeng Li and
Alioune Ngom Diagnose the Premalignant Pancreatic
Cancer Using High Dimensional Linear
Machine . . . . . . . . . . . . . . . . 198--209
Raunaq Malhotra and
Shruthi Prabhakara and
Raj Acharya Predicting V(D)J Recombination Using
Conditional Random Fields . . . . . . . 210--221
Dusan Popovic and
Alejandro Sifrim and
Georgios A. Pavlopoulos and
Yves Moreau and
Bart De Moor A Simple Genetic Algorithm for Biomarker
Mining . . . . . . . . . . . . . . . . . 222--232
Anonymous Front Matter . . . . . . . . . . . . . . ??
Zhenhua Qu and
Weiqi Luo and
Jiwu Huang Identifying Shifted Double JPEG
Compression Artifacts for Non-intrusive
Digital Image Forensics . . . . . . . . 1--8
Shouhong Ding and
Feiyue Huang and
Zhifeng Xie and
Yongjian Wu and
Lizhuang Ma A Novel Customized Recompression
Framework for Massive Internet Images 9--16
Xueying Qin and
Rui Zhang and
Lili Lin and
Fan Zhong and
Guanyu Xing and
Qunsheng Peng Decomposition Equation of Basis Images
with Consideration of Global
Illumination . . . . . . . . . . . . . . 17--24
Zhongqiang Wang and
Li Zhu Intrinsic Image Decomposition with Local
Smooth Assumption and Global Color
Assumption . . . . . . . . . . . . . . . 25--32
Jing Li and
Gang Zeng and
Rui Gan and
Hongbin Zha and
Long Wang A Game-Theoretical Approach to Image
Segmentation . . . . . . . . . . . . . . 33--42
Yu Guo and
Xiaowu Chen and
Bin Zhou and
Qinping Zhao Clothed and Naked Human Shapes
Estimation from a Single Image . . . . . 43--50
Xiaohui Wang and
Jia Jia and
Hanyu Liao and
Lianhong Cai Image Colorization with an Affective
Word . . . . . . . . . . . . . . . . . . 51--58
Na Chen and
Viktor K. Prasanna Semantic Image Clustering Using Object
Relation Network . . . . . . . . . . . . 59--66
Guo-Xin Zhang and
Yu-Kun Lai and
Shi-Min Hu Efficient Solid Texture Synthesis Using
Gradient Solids . . . . . . . . . . . . 67--74
Hanqi Fan and
Qunsheng Peng and
Yizhou Yu A Robust Algorithm for Denoising Meshes
with High-Resolution Details . . . . . . 75--82
Jieyi Zhao and
Min Tang and
Ruofeng Tong Mesh Segmentation for Parallel
Decompression on GPU . . . . . . . . . . 83--90
Qian-Yi Zhou and
Ulrich Neumann Modeling Residential Urban Areas from
Dense Aerial LiDAR Point Clouds . . . . 91--98
Yanlin Weng and
Dongping Li and
Yiying Tong Constrained Texture Mapping on
Subdivision Surfaces . . . . . . . . . . 99--106
Qiang Fan and
Chun Qi Similar Region Contrast Based Salient
Object Detection . . . . . . . . . . . . 107--114
Yongwei Miao and
Jieqing Feng and
Jinrong Wang and
Renato Pajarola A Shape Enhancement Technique Based on
Multi-channel Salience Measure . . . . . 115--121
Yong-Liang Yang and
Chao-Hui Shen Multi-scale Salient Feature Extraction
on Mesh Models . . . . . . . . . . . . . 122--129
Jie Wang and
Caiming Zhang and
Yuanfeng Zhou and
Yu Wei and
Yi Liu Global Contrast of Superpixels Based
Salient Region Detection . . . . . . . . 130--137
Lei Zhang and
Yao Zhao and
Zhenfeng Zhu Incremental Shared Subspace Learning for
Multi-label Classification . . . . . . . 138--145
Yong-Jin Liu and
Qiu-Fang Fu and
Ye Liu and
Xiao-Lan Fu $2$D-Line-Drawing-Based $3$D Object
Recognition . . . . . . . . . . . . . . 146--153
Yanhui Xiao and
Zhenfeng Zhu and
Yao Zhao Graph Regularized ICA for Over-Complete
Feature Learning . . . . . . . . . . . . 154--161
Anonymous Front Matter . . . . . . . . . . . . . . ??
XiaoXiao Feng and
Koichi Matsumoto and
Shigeo Sugimoto Uncovering the Secrets of Daoism \em Fus
Using Digital Dao-Fa Hui-Yuan . . . . . 1--10
Ryan Baumann and
Christopher Blackwell and
W. Brent Seales Automatic Perspective Correction of
Manuscript Images . . . . . . . . . . . 11--18
Chao Wang and
Ling Zhuang and
Jiangqin Wu and
Feng Zhou An Ontology-Based Fuzzy Matching
Approach to Semantic Retrieval of
Historical Place Names . . . . . . . . . 19--28
Amjad Usman and
Sharifullah Khan Exploiting Semantics in Subject-Based
Searching of DSpace . . . . . . . . . . 29--38
Kazuya Fujikawa and
Hideo Joho and
Shin'ichi Nakayama Constraint Can Affect Human Perception,
Behaviour, and Performance of Search . . 39--48
Lighton Phiri and
Kyle Williams and
Miles Robinson and
Stuart Hammar and
Hussein Suleman Bonolo: a General Digital Library System
for File-Based Collections . . . . . . . 49--58
Emi Ishita and
Yukiko Watanabe and
Ai Yamaguchi and
Takako Oda and
Yuiko Higa and
Miki Horiuchi The Ratio of Conference Papers in
Citations of Engineering Dissertations
at Kyushu University . . . . . . . . . . 59--62
Tanja Mer\vcun and
Maja \vZumer and
Trond Aalberg Presenting and Exploring the Complexity
of Bibliographic Relationships . . . . . 63--66
R. Guruprasad and
Khaiser Nikam and
P. Marimuthu Use Patterns of Aerospace E-Indexing,
Abstracting and Citation Services: a
Research Study of Aerospace Scientists
and Engineers of Bangalore . . . . . . . 67--72
Christopher C. Yang and
Xuning Tang and
Min Song and
Suyeon Kim A Trend Analysis of Domain-Specific
Literatures with Content and Co-author
Network Similarity . . . . . . . . . . . 73--76
Rushdi Shams and
Robert E. Mercer Improving Supervised Keyphrase Indexer
Classification of Keyphrases with Text
Denoising . . . . . . . . . . . . . . . 77--86
Tetsuya Mihara and
Mitsuharu Nagamori and
Shigeo Sugimoto A Metadata-Centric Approach to a
Production and Browsing Platform of
Manga . . . . . . . . . . . . . . . . . 87--96
Yundong Cai and
Yin-Leng Theng and
Qimeng Cai and
Zhi Ling and
Yangbo Ou and
Gladys Theng Crowdsourcing Metadata Schema Generation
for Chinese-Style Costume Digital
Library . . . . . . . . . . . . . . . . 97--105
Esther Meng-Yoke Tan and
Dion Hoe-Lian Goh and
Yin-Leng Theng and
Schubert Foo Social Interaction Patterns during
Mobile Information Seeking . . . . . . . 106--115
Liangju Zheng and
Weiming Lu and
Meng Zhang and
Baofeng Zhang and
Baogang Wei A Scalable, Adaptive, Self-management
and Fault-Tolerant Architecture for
Digital Library . . . . . . . . . . . . 116--125
Ei Pa Pa Pe-Than and
Dion Hoe-Lian Goh and
Chei Sian Lee Enjoyment of a Mobile Information
Sharing Game: Perspectives from Needs
Satisfaction and Information Quality . . 126--135
Suparp Kanyacome and
Smarn Loipha and
Somchai Numprasertchai Needs of Collaborative Digital Library
for Secondary School Students in
Thailand . . . . . . . . . . . . . . . . 136--139
Marius Nel and
Kyle Williams and
Hussein Suleman Evaluating Large Image Support for
DSpace . . . . . . . . . . . . . . . . . 140--143
Hsiao-Tieh Pu and
Ying-Han Chang User Navigation for Online Video
Leisure: An Exploratory Study . . . . . 144--147
Maja \vZumer and
Athena Salaba and
Yin Zhang User Verification of the FRBR Conceptual
Model and Testing of FRBR Prototypes . . 148--151
Anonymous Front Matter . . . . . . . . . . . . . . ??
Mario Tokoro Toward Practical Application of Formal
Methods in Software Lifecycle Processes 1--1
Darren Cofer Formal Methods in the Aerospace
Industry: Follow the Money . . . . . . . 2--3
Robert E. Shostak Applying Term Rewriting to Speech
Recognition of Numbers . . . . . . . . . 4--4
Duy-Khanh Le and
Wei-Ngan Chin and
Yong-Meng Teo Variable Permissions for Concurrency
Verification . . . . . . . . . . . . . . 5--21
Xiaoxiao Yang and
Yu Zhang and
Ming Fu and
Xinyu Feng A Concurrent Temporal Programming Model
with Atomic Blocks . . . . . . . . . . . 22--37
Granville Barnett and
Shengchao Qin A Composable Mixed Mode Concurrency
Control Semantics for Transactional
Programs . . . . . . . . . . . . . . . . 38--53
Edmond Gjondrekaj and
Michele Loreti and
Rosario Pugliese and
Francesco Tiezzi and
Carlo Pinciroli Towards a Formal Verification
Methodology for Collective Robotic
Systems . . . . . . . . . . . . . . . . 54--70
Einar Broch Johnsen and
Rudolf Schlatte and
Silvia Lizeth Tapia Tarifa Modeling Resource-Aware Virtualized
Applications for the Cloud in Real-Time
ABS . . . . . . . . . . . . . . . . . . 71--86
Kazuhiro Ogata and
Phan Thi Thanh Huyen Specification and Model Checking of the
Chandy and Lamport Distributed Snapshot
Algorithm in Rewriting Logic . . . . . . 87--102
Chunyan Mu Quantitative Program Dependence Graphs 103--118
Tarek Mhamdi and
Osman Hasan and
Sofi\`ene Tahar Quantitative Analysis of Information
Flow Using Theorem Proving . . . . . . . 119--134
Mahsa Varshosaz and
Ramtin Khosravi Modeling and Verification of
Probabilistic Actor Systems Using
pRebeca . . . . . . . . . . . . . . . . 135--150
Qiu Zongyan and
Hong Ali and
Liu Yijing Modular Verification of OO Programs with
Interfaces . . . . . . . . . . . . . . . 151--166
François Bobot and
Jean-Christophe Filliâtre Separation Predicates: a Taste of
Separation Logic in First-Order Logic 167--181
William L. Harrison and
Adam Procter and
Gerard Allwein The Confinement Problem in the Presence
of Faults . . . . . . . . . . . . . . . 182--197
Fabian Büttner and
Marina Egea and
Jordi Cabot and
Martin Gogolla Verification of ATL Transformations
Using Transformation Models and Model
Finders . . . . . . . . . . . . . . . . 198--213
Shang-Wei Lin and
Yang Liu and
Pao-Ann Hsiung and
Jun Sun and
Jin Song Dong Automatic Generation of Provably Correct
Embedded Systems . . . . . . . . . . . . 214--229
Wen Su and
Jean-Raymond Abrial and
Huibiao Zhu Complementary Methodologies for
Developing Hybrid Systems with Event-B 230--248
Takashi Tomita and
Shin Hiura and
Shigeki Hagihara and
Naoki Yonezaki A Temporal Logic with Mean-Payoff
Constraints . . . . . . . . . . . . . . 249--265
Meng Han and
Zhenhua Duan and
Xiaobing Wang Time Constraints with Temporal Logic
Programming . . . . . . . . . . . . . . 266--282
Anonymous Front Matter . . . . . . . . . . . . . . ??
Naouel Moha and
Francis Palma and
Mathieu Nayrolles and
Benjamin Joyen Conseil Specification and Detection of SOA
Antipatterns . . . . . . . . . . . . . . 1--16
Francesco Belardinelli and
Alessio Lomuscio and
Fabio Patrizi Verification of GSM-Based
Artifact-Centric Systems through Finite
Abstraction . . . . . . . . . . . . . . 17--31
João Claudio Américo and
Didier Donsez Service Component Architecture
Extensions for Dynamic Systems . . . . . 32--47
Bikram Sengupta and
Anshu Jain and
Kamal Bhattacharya and
Hong-Linh Truong and
Schahram Dustdar Who Do You Call? Problem Resolution
through Social Compute Units . . . . . . 48--62
Tri A. Kurniawan and
Aditya K. Ghose and
Hoa Khanh Dam and
Lam-Son Lê Relationship-Preserving Change
Propagation in Process Ecosystems . . . 63--78
Hari S. Gupta and
Bikram Sengupta Scheduling Service Tickets in Shared
Delivery . . . . . . . . . . . . . . . . 79--95
Hong-Linh Truong and
Schahram Dustdar and
Kamal Bhattacharya Programming Hybrid Services in the Cloud 96--110
Zhen Ye and
Athman Bouguettaya and
Xiaofang Zhou QoS-Aware Cloud Service Composition
Based on Economic Models . . . . . . . . 111--126
Erik Wittern and
Jörn Kuhlenkamp and
Michael Menzel Cloud Service Selection Based on
Variability Modeling . . . . . . . . . . 127--141
Marcus Roy and
Ingo Weber and
Boualem Benatallah Extending Enterprise Service Design
Knowledge Using Clustering . . . . . . . 142--157
Erik Wittern and
Nelly Schuster and
Jörn Kuhlenkamp and
Stefan Tai Participatory Service Design through
Composed and Coordinated Service Feature
Models . . . . . . . . . . . . . . . . . 158--172
Jian Yu and
Jun Han and
Quan Z. Sheng and
Steven O. Gunarso PerCAS: An Approach to Enabling Dynamic
and Personalized Adaptation for
Context-Aware Services . . . . . . . . . 173--190
Yedendra Babu Shrinivasan and
Gargi Banerjee Dasgupta and
Nirmit Desai and
Jayan Nallacherry A Method for Assessing Influence
Relationships among KPIs of Service
Systems . . . . . . . . . . . . . . . . 191--205
Tharindu Patikirikorala and
Indika Kumara and
Alan Colman and
Jun Han and
Liuping Wang Dynamic Performance Management in
Multi-tenanted Business Process Servers
Using Nonlinear Control . . . . . . . . 206--221
Aymen Baouab and
Olivier Perrin and
Claude Godart An Optimized Derivation of Event Queries
to Monitor Choreography Violations . . . 222--236
Rene Ramacher and
Lars Mönch Dynamic Service Selection with
End-to-End Constrained Uncertain QoS
Attributes . . . . . . . . . . . . . . . 237--251
Dragan Ivanovi\'c and
Manuel Carro and
Manuel V. Hermenegildo A Constraint-Based Approach to Quality
Assurance in Service Choreographies . . 252--267
Kuan Lu and
Ramin Yahyapour and
Edwin Yaqub and
Constantinos Kotsokalis Structural Optimization of Reduced
Ordered Binary Decision Diagrams for SLA
Negotiation in IaaS of Cloud Computing 268--282
Zachary J. Oster and
Syed Adeel Ali and
Ganesh Ram Santhanam and
Samik Basu and
Partha S. Roop A Service Composition Framework Based on
Goal-Oriented Requirements Engineering,
Model Checking, and Qualitative
Preference Analysis . . . . . . . . . . 283--297
Hongbing Wang and
Jie Zhang and
Wenlong Sun and
Hongye Song and
Guibing Guo and
Xiang Zhou WCP-Nets: a Weighted Extension to
CP-Nets for Web Service Selection . . . 298--312
Anonymous Front Matter . . . . . . . . . . . . . . ??
Vinicius Oliverio and
Estevam R. Hruschka, Jr. Contradiction Detection and Ontology
Extension in a Never-Ending Learning
System . . . . . . . . . . . . . . . . . 1--10
Arturo Yee and
Matías Alvarado Pattern Recognition and Monte-Carlo Tree
Search for Go Gaming Better Automation 11--20
José Luis Chacón and
Ramón Pino Pérez Exploring the Rationality of Some
Syntactic Merging Operators . . . . . . 21--30
Isel Grau and
Gonzalo Nápoles and
Maikel León and
Ricardo Grau Fuzzy Cognitive Maps for Modelling,
Predicting and Interpreting HIV Drug
Resistance . . . . . . . . . . . . . . . 31--40
Hilário Tomaz and
Rinaldo Lima and
João Emanoel and
Fred Freitas An Unsupervised Method for Ontology
Population from the Web . . . . . . . . 41--50
Jonatan Gomez and
Elizabeth León and
Olfa Nasraoui Minimum Cluster Size Estimation and
Cluster Refinement for the Randomized
Gravitational Clustering Algorithm . . . 51--60
Elizabeth León and
Jonatan Gómez and
Fabián Giraldo Online Cluster Prototype Generation for
the Gravitational Clustering Algorithm 61--70
Leandro A. F. Fernandes and
Ana Cristina Bicharra García Association Rule Visualization and
Pruning through Response-Style Data
Organization and Clustering . . . . . . 71--80
Melissa Rodrigues and
João Gama and
Carlos Abreu Ferreira Identifying Relationships in
Transactional Data . . . . . . . . . . . 81--90
Willian Zalewski and
Fabiano Silva and
Huei Diana Lee and
Andre Gustavo Maletzke and
Feng Chung Wu Time Series Discretization Based on the
Approximation of the Local Slope
Information . . . . . . . . . . . . . . 91--100
José Hernández Santiago and
Jair Cervantes and
Asdrúbal López-Chau and
Farid García Lamont Enhancing the Performance of SVM on
Skewed Data Sets by Exciting Support
Vectors . . . . . . . . . . . . . . . . 101--110
Pawe\l Skrobanek and
Olgierd Unold and
Ewa Walkowicz and
Henryk Maciejewski and
Maciej Dobrowolski Study on the Impact of Affinity on the
Results of Data Mining in Biological
Populations . . . . . . . . . . . . . . 111--119
Luiz Melo Romão and
Julio César Nievola Hierarchical Classification of Gene
Ontology with Learning Classifier
Systems . . . . . . . . . . . . . . . . 120--129
Ricardo Timarán Pereira and
Maria Clara Yepez Chamorro and
Andrés Calderón Romero Detecting Survival Patterns in Women
with Invasive Cervical Cancer with
Decision Trees . . . . . . . . . . . . . 130--139
Leandro A. Pasa and
José Alfredo F. Costa and
Marcelo C. Tosin and
Fábio A. Procópio de Paiva Using SOM Maps for Clustering and
Visualization of Diamond Films Deposited
by HFCVD Process . . . . . . . . . . . . 140--148
Tiago P. F. de Lima and
Adenilton J. da Silva and
Teresa B. Ludermir Selection and Fusion of Neural Networks
via Differential Evolution . . . . . . . 149--158
Yenny Villuendas-Rey and
Yailé Caballero-Mota and
María Matilde García-Lorenzo Prototype Selection with Compact Sets
and Extended Rough Sets . . . . . . . . 159--168
Nele Verbiest and
Enislay Ramentol and
Chris Cornelis and
Francisco Herrera Improving SMOTE with Fuzzy Rough
Prototype Selection to Detect Noise in
Imbalanced Classification Data . . . . . 169--178
Carlos Cobos and
Leydy Muñoz and
Martha Mendoza and
Elizabeth León and
Enrique Herrera-Viedma Fitness Function Obtained from a Genetic
Programming Approach for Web Document
Clustering Using Evolutionary Algorithms 179--188
Jean Metz and
Luís F. D. de Abreu and
Everton A. Cherman and
Maria C. Monard On the Estimation of Predictive
Evaluation Measure Baselines for
Multi-label Learning . . . . . . . . . . 189--198
Anonymous Front Matter . . . . . . . . . . . . . . ??
Benjamin Johnson and
Pascal Schöttle and
Rainer Böhme Where to Hide the Bits? . . . . . . . . 1--17
Mehrdad Nojoumian and
Douglas R. Stinson Socio-Rational Secret Sharing as a New
Direction in Rational Cryptography . . . 18--37
Jeremiah Blocki and
Nicolas Christin and
Anupam Datta and
Arunesh Sinha Audit Mechanisms for Provable Risk
Management and Accountable Data
Governance . . . . . . . . . . . . . . . 38--59
SingRu (Celine) Hoe and
Murat Kantarcioglu and
Alain Bensoussan A Game Theoretical Analysis of
Lemonizing Cybercriminal Black Markets 60--77
Lemonia Dritsoula and
Patrick Loiseau and
John Musacchio Computing the Nash Equilibria of
Intruder Classification Games . . . . . 78--97
Ahto Buldas and
Roman Stepanenko Upper Bounds for Adversaries' Utility in
Attack Trees . . . . . . . . . . . . . . 98--117
Jingqiang Lin and
Peng Liu and
Jiwu Jing Using Signaling Games to Model the
Multi-step Attack-Defense Scenarios on
Confidentiality . . . . . . . . . . . . 118--137
Alan Nochenson and
C. F. Larry Heimann Simulation and Game-Theoretic Analysis
of an Attacker-Defender Game . . . . . . 138--151
Aron Laszka and
Dávid Szeszlér and
Levente Buttyán Linear Loss Function for the Network
Blocking Game: An Efficient Model for
Measuring Network Robustness and Link
Criticality . . . . . . . . . . . . . . 152--170
Andrew Clark and
Quanyan Zhu and
Radha Poovendran and
Tamer Ba\csar Deceptive Routing in Relay Networks . . 171--185
Assane Gueye and
Vladimir Marbukh A Game-Theoretic Framework for Network
Security Vulnerability Assessment and
Mitigation . . . . . . . . . . . . . . . 186--200
Radek Píbil and
Viliam Lisý and
Christopher Kiekintveld and
Branislav Bo\vsanský and
Michal P\vechou\vcek Game Theoretic Model of Strategic
Honeypot Selection in Computer Networks 201--220
M. Patrick Collins A Cost-Based Mechanism for Evaluating
the Effectiveness of Moving Target
Defenses . . . . . . . . . . . . . . . . 221--233
Viet Pham and
Carlos Cid Are We Compromised? Modelling Security
Assessment Games . . . . . . . . . . . . 234--247
Kevin D. Bowers and
Marten van Dijk and
Robert Griffin and
Ari Juels and
Alina Oprea Defending against the Unknown Enemy:
Applying FlipIt to System Security . . . 248--263
Saurabh Amin and
Galina A. Schwartz and
Hamidou Tembine Incentives and Security in Electricity
Distribution Networks . . . . . . . . . 264--280
Yee Wei Law and
Tansu Alpcan and
Marimuthu Palaniswami and
Subhrakanti Dey Security Games and Risk Minimization for
Automatic Generation Control in Smart
Grid . . . . . . . . . . . . . . . . . . 281--295
Robert Nix and
Murat Kantarcioglu Contractual Agreement Design for
Enforcing Honesty in Cloud Outsourcing 296--308
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Giovanni Sartor Compliance with Normative Systems . . . 1--32
Micha\l Araszkiewicz Coherence-Based Account of the Doctrine
of Consistent Interpretation . . . . . . 33--47
Ugo Pagallo Three Roads to Complexity, AI and the
Law of Robots: On Crimes, Contracts, and
Torts . . . . . . . . . . . . . . . . . 48--60
Yueh-Hsuan Weng and
Sophie Ting Hong Zhao The Legal Challenges of Networked
Robotics: From the Safety Intelligence
Perspective . . . . . . . . . . . . . . 61--72
Daniele Bourcier and
Primavera De Filippi Cloud Computting: New Research
Perspectives for Computers and Law . . . 73--92
Tommaso Agnoloni and
Maria-Teresa Sagri and
Daniela Tiscornia Balancing Rights and Values in the
Italian Courts: a Benchmark for a
Quantitative Analysis . . . . . . . . . 93--105
Radboud Winkels and
Jelle de Ruyter Survival of the Fittest: Network
Analysis of Dutch Supreme Court Cases 106--115
Marcello Ceci and
Monica Palmirani Ontology Framework for Judgment
Modelling . . . . . . . . . . . . . . . 116--130
Guido Boella and
Llio Humphreys and
Marco Martin and
Piercarlo Rossi and
Leendert van der Torre Eunomos, a Legal Document and Knowledge
Management System to Build Legal
Services . . . . . . . . . . . . . . . . 131--146
Enrico Francesconi Axioms on a Semantic Model for
Legislation for Accessing and Reasoning
over Normative Provisions . . . . . . . 147--161
Enrico Francesconi and
Ginevra Peruginelli An Open Access Policy for Legal
Informatics Dissemination and Sharing 162--170
Pompeu Casanovas and
Enric Plaza Advancing an Open Access Publication
Model for Legal Information Institutes 171--188
Clara Smith and
Agustín Ambrossio and
Leandro Mendoza and
Antonino Rotolo Combinations of Normal and Non-normal
Modal Logics for Modeling Collective
Trust in Normative MAS . . . . . . . . . 189--203
Migle Laukyte Software Agents as Boundary Objects . . 204--216
Andrew Vincent Argumentation and Intuitive Decision
Making: Criminal Sentencing and Sentence
Indication . . . . . . . . . . . . . . . 217--234
Alexander Boer and
Tom van Engers Application of Model-Based Diagnosis to
Multi-Agent Systems Representing Public
Administration . . . . . . . . . . . . . 235--244
Marcello Ceci and
Leonardo Lesmo and
Alessandro Mazzei and
Monica Palmirani Semantic Annotation of Legal Texts
through a FrameNet-Based Approach . . . 245--255
Anderson Bertoldi and
Rove Luiza de Oliveira Chishman Developing a Frame-Based Lexicon for the
Brazilian Legal Language: The Case of
the Criminal\_Process Frame . . . . . . 256--270
Mat\vej My\vska and
Terezie Smejkalová and
Jaromír \vSavelka and
Martin \vSkop Creative Commons and Grand Challenge to
Make Legal Language Simple . . . . . . . 271--285
Meritxell Fernández-Barrera and
Pompeu Casanovas From User Needs to Expert Knowledge:
Mapping Laymen Queries with Ontologies
in the Domain of Consumer Mediation . . 286--308
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Yuxin Meng and
Lam-for Kwok Enhancing List-Based Packet Filter Using
IP Verification Mechanism against IP
Spoofing Attack in Network Intrusion
Detection . . . . . . . . . . . . . . . 1--14
Silvio Ranise and
Alessandro Armando On the Automated Analysis of Safety in
Usage Control: a New Decidability Result 15--28
Steffen Wagner and
Sascha Wessel and
Frederic Stumpf Attestation of Mobile Baseband Stacks 29--43
Tae-Gyu Lee and
Gi-Soo Chung A Scalable Link Model for Local Optical
Wireless Networks . . . . . . . . . . . 44--57
Cristina Alcaraz and
Javier Lopez Addressing Situational Awareness in
Critical Domains of a Smart Grid . . . . 58--71
Amani S. Ibrahim and
James Hamlyn-Harris and
John Grundy and
Mohamed Almorsy Identifying OS Kernel Objects for
Run-Time Security Analysis . . . . . . . 72--85
Tae-Gyu Lee and
Gi-Soo Chung Background Transfer Method for
Ubiquitous Computing . . . . . . . . . . 86--99
Shengli Liu and
Fangguo Zhang and
Kefei Chen Selective Opening Chosen Ciphertext
Security Directly from the DDH
Assumption . . . . . . . . . . . . . . . 100--112
Shaohua Tang and
Lingling Xu Proxy Signature Scheme Based on
Isomorphisms of Polynomials . . . . . . 113--125
Fei Tang and
Changlu Lin and
Pinhui Ke Universal Designated Verifier
Signcryption . . . . . . . . . . . . . . 126--134
Juan Pablo Timpanaro and
Isabelle Chrisment and
Olivier Festor A Bird's Eye View on the I2P Anonymous
File-Sharing Environment . . . . . . . . 135--148
Samaneh Mahdavifar and
Mahdi Abadi and
Mohsen Kahani and
Hassan Mahdikhani A Clustering-Based Approach for
Personalized Privacy Preserving
Publication of Moving Object Trajectory
Data . . . . . . . . . . . . . . . . . . 149--165
Alif Wahid and
Christopher Leckie and
Chenfeng Zhou Estimating the Number of Hosts
Corresponding to an Address while
Preserving Anonymity . . . . . . . . . . 166--179
Qi Han and
Yinghui Zhang and
Xiaofeng Chen and
Hui Li and
Jiaxiang Quan Efficient and Robust Identity-Based
Handoff Authentication in Wireless
Networks . . . . . . . . . . . . . . . . 180--191
Yifan Zhao and
Swee-Won Lo and
Robert H. Deng and
Xuhua Ding An Improved Authentication Scheme for
H.264/SVC and Its Performance Evaluation
over Non-stationary Wireless Mobile
Networks . . . . . . . . . . . . . . . . 192--205
Kaiqi Xiong The Performance of Public Key-Based
Authentication Protocols . . . . . . . . 206--219
Long-Hai Li and
Cheng-Qiang Huang and
Shao-Feng Fu Boardroom Voting Scheme with
Unconditionally Secret Ballots Based on
DC-Net . . . . . . . . . . . . . . . . . 220--232
Yue Yu and
Michael Fry and
Bernhard Plattner and
Paul Smith and
Alberto Schaeffer-Filho Resilience Strategies for Networked
Malware Detection and Remediation . . . 233--247
Eitan Menahem and
Rami Pusiz and
Yuval Elovici Detecting Spammers via Aggregated
Historical Data Set . . . . . . . . . . 248--262
Amani S. Ibrahim and
John Grundy and
James Hamlyn-Harris and
Mohamed Almorsy Operating System Kernel Data
Disambiguation to Support Security
Analysis . . . . . . . . . . . . . . . . 263--276
Anonymous Front Matter . . . . . . . . . . . . . . ??