Last update:
Sat Jan 20 07:22:45 MST 2018
Adrianna Kozierkiewicz-Hetma\'nska Comparison of One-Level and Two-Level
Consensuses Satisfying the 2-Optimality
Criterion . . . . . . . . . . . . . . . 1--10
Marcin Maleszka and
Bernadetta Mianowska and
Ngoc-Thanh Nguyen A Heuristic Method for Collaborative
Recommendation Using Hierarchical User
Profiles . . . . . . . . . . . . . . . . 11--20
Quoc Uy Nguyen and
Trong Hai Duong and
Sanggil Kang Solving Conflict on Collaborative
Knowledge via Social Networking Using
Consensus Choice . . . . . . . . . . . . 21--30
Xuan Hau Pham and
Jason J. Jung and
Ngoc-Thanh Nguyen Integrating Multiple Experts for
Correction Process in Interactive
Recommendation Systems . . . . . . . . . 31--40
Tin Huynh and
Kiem Hoang Modeling Collaborative Knowledge of
Publishing Activities for Research
Recommendation . . . . . . . . . . . . . 41--50
Thanh-Trung Nguyen and
Phi-Khu Nguyen A New Approach for Problem of Sequential
Pattern Mining . . . . . . . . . . . . . 51--60
Van-Dung Hoang and
My-Ha Le and
Kang-Hyun Jo Robust Human Detection Using Multiple
Scale of Cell Based Histogram of
Oriented Gradients and AdaBoost Learning 61--71
Nguyen Thanh Son and
Duong Tuan Anh Discovering Time Series Motifs Based on
Multidimensional Index and Early
Abandoning . . . . . . . . . . . . . . . 72--82
Duc-Thuan Vo and
Cheol-Young Ock A Hybrid Approach of Pattern Extraction
and Semi-supervised Learning for
Vietnamese Named Entity Recognition . . 83--93
Roman Pawlikowski and
Krzysztof Ociepa and
Urszula Markowska-Kaczmar and
Pawel B. Myszkowski Information Extraction from Geographical
Overview Maps . . . . . . . . . . . . . 94--103
Bogus\law Cyganek and
Micha\l Wo\'zniak Pixel-Based Object Detection and
Tracking with Ensemble of Support Vector
Machines and Extended Structural Tensor 104--113
Bay Vo and
Bac Le and
Jason J. Jung A Tree-Based Approach for Mining
Frequent Weighted Utility Itemsets . . . 114--123
Trong Nhan Phan and
Tran Khanh Dang A Novel Trajectory Privacy-Preserving
Future Time Index Structure in Moving
Object Databases . . . . . . . . . . . . 124--134
Grzegorz Skorupa and
Rados\law Katarzyniak Summarizing Knowledge Base with Modal
Conditionals . . . . . . . . . . . . . . 135--144
Ali Selamat and
S. O. Olatunji and
Abdul Azeez Abdul Raheem Modeling PVT Properties of Crude Oil
Systems Based on Type-$2$ Fuzzy Logic
Approach and Sensitivity Based Linear
Learning Method . . . . . . . . . . . . 145--155
Agnieszka Jastrzebska and
Wladyslaw Homenda On Structuring of the Space of Needs in
the Framework of Fuzzy Sets Theory . . . 156--165
Tomasz Wilk and
Micha\l Wo\'zniak Comparison of Fuzzy Combiner Training
Methods . . . . . . . . . . . . . . . . 166--173
Trong Hieu Tran and
Quoc Bao Vo An Axiomatic Model for Merging
Stratified Belief Bases by Negotiation 174--184
Witold Pedrycz and
Wladyslaw Homenda From Fuzzy Cognitive Maps to Granular
Cognitive Maps . . . . . . . . . . . . . 185--193
Manas S. Hardas and
Lisa Purvis Bayesian Vote Weighting in Crowdsourcing
Systems . . . . . . . . . . . . . . . . 194--203
Anonymous Front Matter . . . . . . . . . . . . . . ??
Tomasz Sitarek and
Wladyslaw Homenda Generic Operations in the Structured
Space of the Music . . . . . . . . . . . 1--10
Duong Thi Anh Hoang and
Ngoc Sy Ngo and
Binh Thanh Nguyen Collective Cubing Platform towards
Definition and Analysis of Warehouse
Cubes . . . . . . . . . . . . . . . . . 11--20
Phuoc Vinh Tran To Approach Cylindrical Coordinates to
Represent Multivariable Spatio-temporal
Data . . . . . . . . . . . . . . . . . . 21--28
Tutut Herawan and
A. Noraziah and
Zailani Abdullah and
Mustafa Mat Deris and
Jemal H. Abawajy EFP-M2: Efficient Model for Mining
Frequent Patterns in Transactional
Database . . . . . . . . . . . . . . . . 29--38
Halina Kwasnicka and
Pawel Siemionko Improved Sammon Mapping Method for
Visualization of Multidimensional Data 39--48
Marcin Miros\law Pietranik and
Ngoc Thanh Nguyen Ontology Relation Alignment Based on
Attribute Semantics . . . . . . . . . . 49--58
Young Chan Moon and
Ho Min Jung and
Chuck Yoo and
Young Woong Ko Data Deduplication Using Dynamic
Chunking Algorithm . . . . . . . . . . . 59--68
Huynh Tu Dang and
Ha Manh Tran and
Phach Ngoc Vu and
An Truong Nguyen Applying MapReduce Framework to
Peer-to-Peer Computing Applications . . 69--78
Krzysztof W\kecel and
Tomasz Kaczmarek and
Agata Filipowska Scalable Adaptation of Web Applications
to Users' Behavior . . . . . . . . . . . 79--88
César Andrés and
Rui Abreu and
Alberto Núñez OCE: An Online Colaborative Editor . . . 89--98
Mohammed Nazim Uddin and
Trong Hai Duong and
Visal Sean and
Geun-Sik Jo Construction of Semantic User Profile
for Personalized Web Search . . . . . . 99--108
Adam Grzech and
Krzysztof Juszczyszyn and
Pawe\l Stelmach and
\Lukasz Falas Link Prediction in Dynamic Networks of
Services Emerging during Deployment and
Execution of Web Services . . . . . . . 109--120
Mahran Al-Zyoud and
Imad Salah and
Nadim Obeid Towards a Model of Context Awareness
Using Web Services . . . . . . . . . . . 121--131
Leszek Borzemski and
Michal Danielak and
Anna Kaminska-Chuchmala Short-Term Spatio-temporal Forecasts of
Web Performance by Means of Turning
Bands Method . . . . . . . . . . . . . . 132--141
Przemys\law B\la\'skiewicz and
Miros\law Kuty\lowski and
Wojciech Wodo and
Kamil Wolny Extreme Propagation in an Ad-Hoc Radio
Network- Revisited . . . . . . . . . . . 142--151
Dang Thanh Chuong and
Vu Duy Loi and
Vo Viet Minh Nhat A Model for the Performance Analysis of
SPL-OBS Core Nodes with Deflection
Routing . . . . . . . . . . . . . . . . 152--161
Sylvia Encheva Ordering of Potential Collaboration
Options . . . . . . . . . . . . . . . . 162--171
Ching-Shen Dong and
Ananth Srinivasan Interface Design for Decision Systems 172--181
Grzegorz Fedczyszyn and
Leszek Koszalka and
Iwona Pozniak-Koszalka Opponent Modeling in Texas Hold'em Poker 182--191
Jacek Mercik On Axiomatization of Power Index of Veto 192--200
Anonymous Front Matter . . . . . . . . . . . . . . ??
Mousumi Dutt and
Arindam Biswas and
Partha Bhowmick and
Bhargab B. Bhattacharya On Finding Shortest Isothetic Path
inside a Digital Object . . . . . . . . 1--15
Nilanjana Karmakar and
Arindam Biswas and
Partha Bhowmick Fast Slicing of Orthogonal Covers Using
DCEL . . . . . . . . . . . . . . . . . . 16--30
Peter Veelaert Fast Combinatorial Algorithm for Tightly
Separating Hyperplanes . . . . . . . . . 31--44
Li Chen and
Soma Biswas Digital Curvatures Applied to $3$D
Object Analysis and Recognition: a Case
Study . . . . . . . . . . . . . . . . . 45--58
Fumiki Sekiya and
Akihiro Sugimoto Discrete Polynomial Curve Fitting to
Noisy Data . . . . . . . . . . . . . . . 59--74
Ana Marcela Herrera-Navarro and
Hugo Jiménez-Hernández and
Iván Ramón Terol-Villalobos A Probabilistic Measure of Circularity 75--89
Tetsuo Asano and
Sergey Bereg A New Framework for Connected Components
Labeling of Binary Images . . . . . . . 90--102
Tetsuo Asano and
Sergey Bereg and
Lilian Buzer Small Work Space Algorithms for Some
Basic Problems on Binary Images . . . . 103--114
Josef \vSlapal Adjacencies for Structuring the Digital
Plane . . . . . . . . . . . . . . . . . 115--127
Péter Kardos and
Kálmán Palágyi On Topology Preservation for Triangular
Thinning Algorithms . . . . . . . . . . 128--142
Benedek Nagy Cellular Topology on the Triangular Grid 143--153
K. G. Subramanian and
Ibrahim Venkat and
Petra Wiederhold A P System Model for Contextual Array
Languages . . . . . . . . . . . . . . . 154--165
D. Lalitha and
K. Rangarajan and
Durairaj Gnanaraj Thomas Rectangular Arrays and Petri Nets . . . 166--180
Thangasamy Kamaraj and
Durairaj Gnanaraj Thomas Regional Hexagonal Tile Rewriting
Grammars . . . . . . . . . . . . . . . . 181--195
Thangasamy Kamaraj and
Durairaj Gnanaraj Thomas and
H. Geetha and
T. Kalyani Partial Commutation on Array Languages 196--208
Anja Attig and
Petra Perner Incremental Learning of the Model for
Watershed-Based Image Segmentation . . . 209--222
Damien Gonzalez and
Rémy Malgouyres and
Henri-Alex Esbelin and
Chafik Samir Fast Level-Wise Convolution . . . . . . 223--233
Phuc Ngo and
Yukiko Kenmochi and
Nicolas Passat and
Hugues Talbot Combinatorial Properties of $2$D
Discrete Rigid Transformations under
Pixel-Invariance Constraints . . . . . . 234--248
Anupama Potluri and
Chakravarthy Bhagvati Novel Morphological Algorithms for
Dominating Sets on Graphs with
Applications to Image Analysis . . . . . 249--262
Norbert Hantos and
Péter Balázs and
Kálmán Palágyi Binary Image Reconstruction from Two
Projections and Skeletal Information . . 263--273
Anonymous Front Matter . . . . . . . . . . . . . . ??
Dan Boneh Pairing-Based Cryptography: Past,
Present, and Future . . . . . . . . . . 1--1
Chuanming Zong Some Mathematical Mysteries in Lattices 2--3
Masayuki Abe and
Melissa Chase and
Bernardo David and
Markulf Kohlweiss and
Ryo Nishimaki Constant-Size Structure-Preserving
Signatures: Generic Constructions and
Simple Assumptions . . . . . . . . . . . 4--24
Michael Gerbush and
Allison Lewko and
Adam O'Neill and
Brent Waters Dual Form Signatures: An Approach for
Proving Security from Static Assumptions 25--42
Takuya Hayashi and
Takeshi Shimoyama and
Naoyuki Shinohara and
Tsuyoshi Takagi Breaking Pairing-Based Cryptosystems
Using $\eta_T$ Pairing over ${\rm
GF}(3^{97})$ . . . . . . . . . . . . . . 43--60
Jae Hong Seo On the (Im)possibility of Projecting
Property in Prime-Order Setting . . . . 61--79
Jorge Luis Villar Optimal Reductions of Some Decisional
Problems to the Rank Problem . . . . . . 80--97
Sebastian Faust and
Carmit Hazay and
Jesper Buus Nielsen and
Peter Sebastian Nordholt Signature Schemes Secure against
Hard-to-Invert Leakage . . . . . . . . . 98--115
Yehuda Lindell and
Eran Omri and
Hila Zarosim Completeness for Symmetric Two-Party
Functionalities- Revisited . . . . . . . 116--133
Mihir Bellare and
Viet Tung Hoang and
Phillip Rogaway Adaptively Secure Garbling with
Applications to One-Time Programs and
Secure Outsourcing . . . . . . . . . . . 134--153
Scott Ames and
Rosario Gennaro and
Muthuramakrishnan Venkitasubramaniam The Generalized Randomized Iterate and
Its Application to New Efficient
Constructions of UOWHFs from Regular
One-Way Functions . . . . . . . . . . . 154--171
Meicheng Liu and
Yin Zhang and
Dongdai Lin Perfect Algebraic Immune Functions . . . 172--189
Florian Mendel and
Vincent Rijmen and
Deniz Toz and
Kerem Varìcì Differential Analysis of the LED Block
Cipher . . . . . . . . . . . . . . . . . 190--207
Julia Borghoff and
Anne Canteaut and
Tim Güneysu and
Elif Bilge Kavun and
Miroslav Knezevic PRINCE --- a Low-Latency Block Cipher
for Pervasive Computing Applications . . 208--225
Gaëtan Leurent Analysis of Differential Attacks in ARX
Constructions . . . . . . . . . . . . . 226--243
Andrey Bogdanov and
Gregor Leander and
Kaisa Nyberg and
Meiqin Wang Integral and Multidimensional Linear
Distinguishers with Correlation Zero . . 244--261
Hongjun Wu and
Tao Huang and
Phuong Ha Nguyen and
Huaxiong Wang and
San Ling Differential Attacks against Stream
Cipher ZUC . . . . . . . . . . . . . . . 262--277
Rodolphe Lampe and
Jacques Patarin and
Yannick Seurin An Asymptotically Tight Security
Analysis of the Iterated Even-Mansour
Cipher . . . . . . . . . . . . . . . . . 278--295
Liting Zhang and
Wenling Wu and
Han Sui and
Peng Wang 3kf9: Enhancing 3GPP-MAC beyond the
Birthday Bound . . . . . . . . . . . . . 296--312
Dimitar Jetchev and
Onur Özen and
Martijn Stam Understanding Adaptivity: Random Systems
Revisited . . . . . . . . . . . . . . . 313--330
Anonymous Front Matter . . . . . . . . . . . . . . ??
Amihood Amir and
Alberto Apostolico and
Estrella Eisenberg Detecting Approximate Periodic Patterns 1--12
Grey Ballard and
James Demmel and
Olga Holtz Graph Expansion Analysis for
Communication Costs of Fast Rectangular
Matrix Multiplication . . . . . . . . . 13--36
Nikhil Bansal and
Anupam Gupta and
Ravishankar Krishnaswamy Multicast Routing for Energy
Minimization Using Speed Scaling . . . . 37--51
Guy Baram and
Tami Tamir Reoptimization of the Minimum Total
Flow-Time Scheduling Problem . . . . . . 52--66
Neal Barcelo and
Miao Zhou and
Daniel Cole and
Michael Nugent Energy Efficient Caching for
Phase-Change Memory . . . . . . . . . . 67--81
Neal Barcelo and
Sungjin Im and
Benjamin Moseley and
Kirk Pruhs Shortest-Elapsed-Time-First on a
Multiprocessor . . . . . . . . . . . . . 82--92
Gernot Veit Batz and
Robert Geisberger and
Dennis Luxen Efficient Route Compression for Hybrid
Route Planning . . . . . . . . . . . . . 93--107
Shiri Chechik and
Quentin Godfroy and
David Peleg Multipath Spanners via Fault-Tolerant
Spanners . . . . . . . . . . . . . . . . 108--119
Morgan Chopin and
André Nichterlein and
Rolf Niedermeier Constant Thresholds Can Make Target Set
Selection Tractable . . . . . . . . . . 120--133
Fabio Cunial Faster Variance Computation for Patterns
with Gaps . . . . . . . . . . . . . . . 134--147
Gianlorenzo D'Angelo and
Mattia D'Emidio Enhancing the Computation of Distributed
Shortest Paths on Real Dynamic Networks 148--158
Benjamin Doerr and
Mahmoud Fouz and
Tobias Friedrich Experimental Analysis of Rumor Spreading
in Social Networks . . . . . . . . . . . 159--173
Mourad El Ouali and
Helena Fohlin and
Anand Srivastav A Randomised Approximation Algorithm for
the Partial Vertex Cover Problem in
Hypergraphs . . . . . . . . . . . . . . 174--187
Fabian Fuchs and
Markus Völker and
Dorothea Wagner Simulation-Based Analysis of Topology
Control Algorithms for Wireless Ad Hoc
Networks . . . . . . . . . . . . . . . . 188--202
Michael T. Goodrich and
Daniel S. Hirschberg Cache-Oblivious Dictionaries and
Multimaps with Negligible Failure
Probability . . . . . . . . . . . . . . 203--218
Robert Görke and
Roland Kluge and
Andrea Schumm An Efficient Generator for Clustered
Dynamic Random Networks . . . . . . . . 219--233
Peter Kling and
Andreas Cord-Landwehr Slow Down and Sleep for Profit in Online
Deadline Scheduling . . . . . . . . . . 234--247
Kirill Kogan and
Alejandro López-Ortiz FIFO Queueing Policies for Packets with
Heterogeneous Processing . . . . . . . . 248--260
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Andrea Moio and
Attilio Giordana and
Dino Mendola An Anti-tampering Algorithm Based on an
Artificial Intelligence Approach . . . . 1--10
Jan Rauch Domain Knowledge and Data Mining with
Association Rules --- a Logical Point of
View . . . . . . . . . . . . . . . . . . 11--20
Pawe\l Betli\'nski and
Dominik \'Sl\kezak The Problem of Finding the Sparsest
Bayesian Network for an Input Data Set
is NP-Hard . . . . . . . . . . . . . . . 21--30
Philippe Fournier-Viger and
Vincent S. Tseng Mining Top-$K$ Non-redundant Association
Rules . . . . . . . . . . . . . . . . . 31--40
Matej Guid and
Martin Mo\vzina and
Vida Groznik and
Dejan Georgiev and
Aleksander Sadikov ABML Knowledge Refinement Loop: a Case
Study . . . . . . . . . . . . . . . . . 41--50
Jennifer Lavergne and
Ryan Benton and
Vijay V. Raghavan Min-Max Itemset Trees for Dense and
Categorical Datasets . . . . . . . . . . 51--60
Jennifer Lavergne and
Ryan Benton and
Vijay V. Raghavan TRARM-RelSup: Targeted Rare Association
Rule Mining Using Itemset Trees and the
Relative Support Measure . . . . . . . . 61--70
Shusaku Tsumoto and
Shoji Hirano Incremental Rules Induction Method Based
on Three Rule Layers . . . . . . . . . . 71--80
Asma Ammar and
Zied Elouedi and
Pawan Lingras RPKM: The Rough Possibilistic $K$-Modes 81--86
Jan Kohout and
Roman Neruda Exploration and Exploitation Operators
for Genetic Graph Clustering Algorithm 87--92
Patrick G. Clark and
Jerzy W. Grzymala-Busse and
Martin Kuehnhausen Local Probabilistic Approximations for
Incomplete Data . . . . . . . . . . . . 93--98
Piotr Andruszkiewicz On the Relations between Retention
Replacement, Additive Perturbation, and
Randomisations for Nominal Attributes in
Privacy Preserving Data Mining . . . . . 99--104
Sujata Ghosh and
Thiri Haymar Kyaw and
Rineke Verbrugge Decision Support for Extensive Form
Negotiation Games . . . . . . . . . . . 105--114
Yuxin Meng and
Wenjuan Li and
Lam-for Kwok Intelligent Alarm Filter Using
Knowledge-Based Alert Verification in
Network Intrusion Detection . . . . . . 115--124
Chao Gao and
Jiming Liu Clustering-Based Media Analysis for
Understanding Human Emotional Reactions
in an Extreme Event . . . . . . . . . . 125--135
Gabriel Pestana and
Joachim Metter and
Sebastian Heuchler and
Pedro Reis An Event-Driven Architecture for
Spatio-temporal Surveillance of Business
Activities . . . . . . . . . . . . . . . 136--142
\Lukasz Brocki and
Krzysztof Marasek and
Danijel Kor\vzinek Multiple Model Text Normalization for
the Polish Language . . . . . . . . . . 143--148
Janardhana Punuru and
Jianhua Chen Discovering Semantic Relations Using
Prepositional Phrases . . . . . . . . . 149--154
Alina Wróblewska and
Marcin Sydow DEBORA: Dependency-Based Method for
Extracting Entity-Relationship Triples
from Open-Domain Texts in Polish . . . . 155--161
Grzegorz Protaziuk and
Anna Wróblewska and
Robert Bembenik and
Henryk Rybi\'nski Lexical Ontology Layer --- a Bridge
between Text and Concepts . . . . . . . 162--171
Anonymous Front Matter . . . . . . . . . . . . . . ??
Lu Xiao and
Ming Fan Does Social Network Always Promote
Entrepreneurial Intentions? Part I:
Theoretical Model . . . . . . . . . . . 1--7
Samreen Feroz and
Amatal Habib and
Maryam Siddiqua and
Sobia Saleem and
Nisar Ahmed Shar Association of Anti-Histamine Drugs with
Brain Tumor . . . . . . . . . . . . . . 8--15
Qiuyu Zhu Estimating Principal Point and Nonlinear
Parameters of Camera from a Planar
Calibration Image . . . . . . . . . . . 16--24
Vipul Arora and
Laxmidhar Behera Design of Distribution Independent Noise
Filters with Online PDF Estimation . . . 25--32
Xia Wu and
Juan Li and
Li Yao Determining Effective Connectivity from
FMRI Data Using a Gaussian Dynamic
Bayesian Network . . . . . . . . . . . . 33--39
A. G. Radwan and
Ahmed S. Elwakil Transient-Time Fractional-Space
Trigonometry and Application . . . . . . 40--47
Manjusri Wickramasinghe and
Jayantha Rajapakse and
Damminda Alahakoon Understanding Individual Play Sequences
Using Growing Self Organizing Maps . . . 48--55
Noor Almaadeed and
Amar Aggoun and
Abbes Amira Audio-Visual Feature Fusion for Speaker
Identification . . . . . . . . . . . . . 56--67
Xiaoxu Kang and
Marc Schieber and
Nitish V. Thakor Decoding Cognitive States from Neural
Activities of Somatosensory Cortex . . . 68--75
Kleanthis C. Neokleous and
Marios N. Avraamides and
Costas K. Neocleous and
Christos N. Schizas Cognitive Modeling of Dilution Effects
in Visual Search . . . . . . . . . . . . 76--83
Wajid Mumtaz and
Likun Xia and
Aamir Saeed Malik and
Mohd Azhar Mohd Yasin Complexity Analysis of EEG Data during
Rest State and Visual Stimulus . . . . . 84--91
Ahmed Al-Ani and
Bram Van Dun and
Harvey Dillon and
Alaleh Rabie Analysis of Alertness Status of Subjects
Undergoing the Cortical Auditory Evoked
Potential Hearing Test . . . . . . . . . 92--99
Preetinder Kaur and
Madhu Goyal and
Jie Lu Price Forecasting Using Dynamic
Assessment of Market Conditions and
Agent's Bidding Behavior . . . . . . . . 100--108
Takafumi Kanamori and
Akiko Takeda Non-convex Optimization on Stiefel
Manifold and Applications to Machine
Learning . . . . . . . . . . . . . . . . 109--116
Liviu Petrisor Dinu and
Radu-Tudor Ionescu and
Marius Popescu Local Patch Dissimilarity for Images . . 117--126
Dehua Zhang and
Derong Liu and
Qinglai Wei Nearly Optimal Control for Nonlinear
Systems with Dead-Zone Control Input
Based on the Iterative ADP Approach . . 127--134
Sadjia Benkhider and
Oualid Dahmri and
Habiba Drias A Memetic Approach for the Knowledge
Extraction . . . . . . . . . . . . . . . 135--141
Xiaohua Liu and
Haoran Liang and
Haiwei Dong and
Nikolaos Mavridis Development of a Novel Conversational
Calculator Based on Remote Online
Computation . . . . . . . . . . . . . . 142--151
Saima Hassan and
Abbas Khosravi and
Jafreezal Jaafar and
Samir B. Belhaouari Load Forecasting Accuracy through
Combination of Trimmed Forecasts . . . . 152--159
Julian Szyma\'nski and
W\lodzis\law Duch Self Organizing Maps for Visualization
of Categories . . . . . . . . . . . . . 160--167
Anonymous Front Matter . . . . . . . . . . . . . . ??
Freha Mezzoudj and
Assia Benyettou On the Optimization of Multiclass
Support Vector Machines Dedicated to
Speech Recognition . . . . . . . . . . . 1--8
Yangming Guo and
Xiaolei Li and
Guanghan Bai and
Jiezhong Ma Time Series Prediction Method Based on
LS-SVR with Modified Gaussian RBF . . . 9--17
Ran Wang and
Guoyou Wang and
Zhong Chen and
Jianguo Liu and
Yu Shi An Improved Method of Identification
Based on Thermal Palm Vein Image . . . . 18--24
Majeed Safa and
Sandhya Samarasinghe Modelling Energy Use and Fuel
Consumption in Wheat Production Using
Indirect Factors and Artificial Neural
Networks . . . . . . . . . . . . . . . . 25--32
Anam Tariq and
Arslan Shaukat and
Shoab A. Khan A Gaussian Mixture Model Based System
for Detection of Macula in Fundus Images 33--40
Tobias Brosch and
Heiko Neumann The Brain's Sequential Parallelism:
Perceptual Decision-Making and Early
Sensory Responses . . . . . . . . . . . 41--50
Shinsuke Koyama Estimating Neural Firing Rates: An
Empirical Bayes Approach . . . . . . . . 51--59
Jose Salvador Sánchez and
Vicente García and
Ana Isabel Marqués Assessment of Financial Risk Prediction
Models with Multi-criteria Decision
Making Methods . . . . . . . . . . . . . 60--67
Vicente García and
Ana Isabel Marqués and
Jose Salvador Sánchez Improving Risk Predictions by
Preprocessing Imbalanced Credit Data . . 68--75
Mohamed Aymen Slim and
Maroua El Kastouri and
Afef Abdelkrim and
Mohamed Benrejeb Hybrid Validation of Handwriting Process
Modelling . . . . . . . . . . . . . . . 76--84
Abdulrahman Alalshekmubarak and
Amir Hussain and
Qiu-Feng Wang Off-Line Handwritten Arabic Word
Recognition Using SVMs with Normalized
Poly Kernel . . . . . . . . . . . . . . 85--91
Jinhua Xu Bayesian Modeling of Visual Attention 92--99
Xu-Cheng Yin and
Kaizhu Huang and
Hong-Wei Hao and
Khalid Iqbal and
Zhi-Bin Wang Classifier Ensemble Using a Heuristic
Learning with Sparsity and Diversity . . 100--107
Takashi Mitsuishi and
Takanori Terashima and
Yasunari Shidama Optimization of SIRMs Fuzzy Model Using
\Lukasiewicz Logic . . . . . . . . . . . 108--116
Nariman Mahdavi and
Jürgen Kurths Synchronization of Hopfield Like Chaotic
Neural Networks with Structure Based
Learning . . . . . . . . . . . . . . . . 117--124
Andrew P. Papli\'nski Incremental Self-Organizing Map (iSOM)
in Categorization of Visual Objects . . 125--132
Dror Cohen and
Andrew P. Papli\'nski The Elastic Net as Visual Category
Representation: Visualisation and
Classification . . . . . . . . . . . . . 133--140
Sebastien Naze and
Jan Treur A Computational Model for Development of
Post-Traumatic Stress Disorders by
Hebbian Learning . . . . . . . . . . . . 141--151
Toshikazu Samura and
Yasuomi D. Sato and
Yuji Ikegaya and
Hatsuo Hayashi and
Takeshi Aihara Power-Law Scaling of Synchronization
Robustly Reproduced in the Hippocampal
CA3 Slice Culture Model with Small-World
Topology . . . . . . . . . . . . . . . . 152--159
Hamidreza Jamalabadi and
Hossein Nasrollahi and
Majid Nili Ahmadabadi and
Babak Nadjar Araabi A Dynamic Bio-inspired Model of
Categorization . . . . . . . . . . . . . 160--167
Anonymous Front Matter . . . . . . . . . . . . . . ??
Do-Thanh Sang and
Dong-Min Woo and
Dong-Chul Park Centroid Neural Network with Simulated
Annealing and Its Application to Color
Image Segmentation . . . . . . . . . . . 1--8
Ali Awad Efficient Non-linear Filter for Impulse
Noise Removal in Document Images . . . . 9--16
Souhir Bouaziz and
Habib Dhahri and
Adel M. Alimi Evolving Flexible Beta Operator Neural
Trees (FBONT) for Time Series
Forecasting . . . . . . . . . . . . . . 17--24
Wentao Fan and
Nizar Bouguila Nonparametric Localized Feature
Selection via a Dirichlet Process
Mixture of Generalized Dirichlet
Distributions . . . . . . . . . . . . . 25--33
Kiatichai Treerattanapitak and
Chuleerat Jaruskulchai Generalized Agglomerative Fuzzy
Clustering . . . . . . . . . . . . . . . 34--41
Ming Liu and
Lei Lin and
Lili Shan and
Chengjie Sun A Novel Self-Adaptive Clustering
Algorithm for Dynamic Data . . . . . . . 42--49
Chaojie Li and
David Yang Gao and
Chao Liu Impulsive Synchronization of State
Delayed Discrete Complex Networks with
Switching Topology . . . . . . . . . . . 50--57
Liming Yuan and
Songbo Liu and
Qingcheng Huang and
Jiafeng Liu and
Xianglong Tang Salient Instance Selection for
Multiple-Instance Learning . . . . . . . 58--67
Meng Qingfeng and
Du Jianguo and
Li Zhen Motivating Retail Marketing Efforts
under Fairness Concerns in Small-World
Networks: a Multi-agent Simulation . . . 68--75
Dunwei Gong and
Jian Chen and
Xiaoyan Sun and
Yong Zhang Application of Variational Granularity
Language Sets in Interactive Genetic
Algorithms . . . . . . . . . . . . . . . 76--83
Tatsuya Yokota and
Andrzej Cichocki and
Yukihiko Yamashita Linked PARAFAC/CP Tensor Decomposition
and Its Fast Implementation for
Multi-block Tensor Analysis . . . . . . 84--91
Gang Xie and
Hong-Bo Guo and
Yu-Chu Tian and
Maolin Tang A Human-Simulated Immune Evolutionary
Computation Approach . . . . . . . . . . 92--99
Lu Zhenwei and
Zhao Lingling and
Su Xiaohong and
Ma Peijun A STPHD-Based Multi-sensor Fusion Method 100--107
Satoshi Hara and
Takashi Washio Group Sparse Inverse Covariance
Selection with a Dual Augmented
Lagrangian Method . . . . . . . . . . . 108--115
Yinglu Liu and
Xu-Yao Zhang and
Kaizhu Huang and
Xinwen Hou and
Cheng-Lin Liu Multiple Outlooks Learning with Support
Vector Machines . . . . . . . . . . . . 116--124
P. K. Srijith and
Shirish Shevade Multi-Task Learning Using Shared and
Task Specific Information . . . . . . . 125--132
Sepehr Eghbali and
Majid Nili Ahmadabadi and
Babak Nadjar Araabi and
Maryam Mirian Learning Attentive Fusion of Multiple
Bayesian Network Classifiers . . . . . . 133--140
Amira Samy Talaat and
Amir F. Atiya and
Sahar A. Mokhtar and
Ahmed Al-Ani and
Magda Fayek Multiclass Penalized Likelihood Pattern
Classification Algorithm . . . . . . . . 141--148
Piotr P\lo\'nski and
Krzysztof Zaremba Self-Organising Maps for Classification
with Metropolis--Hastings Algorithm for
Supervision . . . . . . . . . . . . . . 149--156
Yinghua Han and
Jinkuan Wang and
Qiang Zhao and
Peng Han Decoupled $2$-D DOA Estimation Algorithm
Based on Cross-Correlation Matrix for
Coherently Distributed Source . . . . . 157--165
Anonymous Front Matter . . . . . . . . . . . . . . ??
Theodor Dan Popescu Neural Network Learning for Blind Source
Separation with Application in Dam
Safety Monitoring . . . . . . . . . . . 1--8
Jayamol Mathews and
Madhu S. Nair and
Liza Jo Improved BTC Algorithm for Gray Scale
Images Using $K$-Means Quad Clustering 9--17
Christoph Sulzbachner and
Martin Humenberger and
Ágoston Srp and
Ferenc Vajda Optimization of a Neural Network for
Computer Vision Based Fall Detection
with Fixed-Point Arithmetic . . . . . . 18--26
Yan Tu and
Zijiang Yang Customer Relationship Management Using
Partial Focus Feature Reduction . . . . 27--35
Muhammad Usman Akram and
Mahmood Akhtar and
M. Younus Javed An Automated System for the Grading of
Diabetic Maculopathy in Fundus Images 36--43
Yun-zhi Zou and
Xin-kun Wu and
Wen-bin Zhang and
Chang-yin Sun An Iterative Method for a Class of
Generalized Global Dynamical System
Involving Fuzzy Mappings in Hilbert
Spaces . . . . . . . . . . . . . . . . . 44--51
Jesada Kajornrit and
Kok Wai Wong and
Chun Che Fung Estimation of Missing Precipitation
Records Using Modular Artificial Neural
Networks . . . . . . . . . . . . . . . . 52--59
Ameer H. Morad Office Employees Authentication Based on
E-exam Techniques . . . . . . . . . . . 60--65
Karthik Nagesh and
M. Narasimha Murty Obtaining Single Document Summaries
Using Latent Dirichlet Allocation . . . 66--74
Chu-Kiong Loo and
Ali Memariani Object Recognition Using Sparse
Representation of Overcomplete
Dictionary . . . . . . . . . . . . . . . 75--82
Jia Zheng and
Mengyao Zhu and
Junwei He and
Xiaoqing Yu PEAQ Compatible Audio Quality Estimation
Using Computational Auditory Model . . . 83--90
Sagar Dewan and
Srinivasa Chakravarthy A System for Offline Character
Recognition Using Auto-encoder Networks 91--99
Xiaoyan Yan and
Bo Liang and
Tao Ban and
Shanqing Guo and
Liming Wang TrafficS: a Behavior-Based Network
Traffic Classification Benchmark System
with Traffic Sampling Functionality . . 100--107
Iyad Abu Doush Harmony Search with Multi-Parent
Crossover for Solving IEEE-CEC2011
Competition Problems . . . . . . . . . . 108--114
Wojciech Kacalak and
Maciej Majewski New Intelligent Interactive Automated
Systems for Design of Machine Elements
and Assemblies . . . . . . . . . . . . . 115--122
Xiao Fu and
Jin Liu and
Haopeng Wang and
Bin Zhang and
Rui Gao Rough Sets and Neural Networks Based
Aerial Images Segmentation Method . . . 123--131
Shen Ren and
Michael Barlow and
Hussein A. Abbass Frontal Cortex Neural Activities Shift
Cognitive Resources Away from Facial
Activities in Real-Time Problem Solving 132--139
Geon-min Kim and
Chang-hyun Kim and
Soo-young Lee Implement Real-Time Polyphonic Pitch
Detection and Feedback System for the
Melodic Instrument Player . . . . . . . 140--147
Naotake Kamiura and
Ayumu Saitoh and
Teijiro Isokawa and
Nobuyuki Matsui and
Hitoshi Tabuchi Classification of Interview Sheets Using
Self-Organizing Maps for Determination
of Ophthalmic Examinations . . . . . . . 148--155
Slamet Widodo and
Tomoo Shiigi and
Naing Min Than and
Yuichi Ogawa and
Naoshi Kondo Sound-Based Ranging System in Greenhouse
Environment with Multipath Effect
Compensation Using Artificial Neural
Network . . . . . . . . . . . . . . . . 156--163
Anonymous Front Matter . . . . . . . . . . . . . . ??
Lu Xiao and
Ming Fan Does Social Network always Promote
Entrepreneurial Intentions? Part II:
Empirical Analysis . . . . . . . . . . . 1--8
Xuzhi Wang and
Yangyang Jia and
Xiang Feng and
Shuai Yu and
Hengyong Jiang Rasterization System for Mobile Device 9--16
Xuzhi Wang and
Wei Xiong and
Xiang Feng and
Shuai Yu and
Hengyong Jiang Study on Rasterization Algorithm for
Graphics Acceleration System . . . . . . 17--24
Yoshifusa Ito and
Hiroyuki Izumi and
Cidambi Srinivasan Simultaneous Learning of Several
Bayesian and Mahalanobis Discriminant
Functions by a Neural Network with
Memory Nodes . . . . . . . . . . . . . . 25--33
Andrzej \'Sluzek and
Mariusz Paradowski and
Duanduan Yang Reinforcement of Keypoint Matching by
Co-segmentation in Object Retrieval:
Face Recognition Case Study . . . . . . 34--41
Hiroaki Kudo and
Takuya Kume and
Noboru Ohnishi Effect of Luminance Gradients in
Measurement of Differential Limen . . . 42--49
Weicheng Huang and
Shuichi Kurogi and
Takeshi Nishida Robust Controller for Flexible
Specifications Using Difference Signals
and Competitive Associative Nets . . . . 50--58
Kohei Ono and
Shuichi Kurogi and
Takeshi Nishida Moments of Predictive Deviations for
Ensemble Diversity Measures to Estimate
the Performance of Time Series
Prediction . . . . . . . . . . . . . . . 59--66
Satoru Morita Self-Organized Three Dimensional Feature
Extraction of MRI and CT . . . . . . . . 67--74
Yao Yao and
Xin Xin and
Ping Guo OMP or BP? A Comparison Study of Image
Fusion Based on Joint Sparse
Representation . . . . . . . . . . . . . 75--82
P. M. Yan and
Meng Yang and
Hui Huang and
J. F. Li An Improved Approach to Super Resolution
Based on PET Imaging . . . . . . . . . . 83--90
Zhi-Bin Wang and
Hong-Wei Hao and
Yan Li and
Xu-Cheng Yin and
Shu Tian Pedestrian Analysis and Counting System
with Videos . . . . . . . . . . . . . . 91--99
Ya Zhao and
Xiaodong Gu Vehicle License Plate Localization and
License Number Recognition Using
Unit-Linking Pulse Coupled Neural
Network . . . . . . . . . . . . . . . . 100--108
Shenghui Zhou and
Qing Liu and
Jianming Guo and
Yuanyuan Jiang ROI-HOG and LBP Based Human Detection
via Shape Part-Templates Matching . . . 109--115
Rossella Cancelliere and
Mario Gai and
Thierry Arti\`eres and
Patrick Gallinari Matrix Pseudoinversion for Image Neural
Processing . . . . . . . . . . . . . . . 116--125
Jan Mattner and
Sascha Lange and
Martin Riedmiller Learn to Swing Up and Balance a Real
Pole Based on Raw Visual Input Data . . 126--133
Alan W. Y. Lo and
Benben Liu and
Ray C. C. Cheung GPU-Based Biclustering for Neural
Information Processing . . . . . . . . . 134--141
Haifeng Sima and
Lixiong Liu and
Ping Guo Color Image Segmentation Based on
Regional Saliency . . . . . . . . . . . 142--150
Man To Wong and
Xiangjian He and
Hung Nguyen and
Wei-Chang Yeh Mass Classification in Digitized
Mammograms Using Texture Features and
Artificial Neural Network . . . . . . . 151--158
Zhongyi Hu and
Qing Liu and
Shenghui Zhou and
Mingjing Huang and
Fei Teng Image Dehazing Algorithm Based on
Atmosphere Scatters Approximation Model 159--168
Anonymous Front Matter . . . . . . . . . . . . . . ??
Vinod Vaikuntanathan How to Compute on Encrypted Data . . . . 1--15
Orr Dunkelman From Multiple Encryption to Knapsacks
--- Efficient Dissection of Composite
Problems . . . . . . . . . . . . . . . . 16--16
Thorsten Kleinjung and
Arjen K. Lenstra and
Dan Page and
Nigel P. Smart Using the Cloud to Determine Key
Strengths . . . . . . . . . . . . . . . 17--39
Hemanta K. Maji and
Manoj Prabhakaran and
Mike Rosulek A Unified Characterization of
Completeness and Triviality for Secure
Function Evaluation . . . . . . . . . . 40--59
Sebastian Faust and
Markulf Kohlweiss and
Giorgia Azzurra Marson and
Daniele Venturi On the Non-malleability of the
Fiat--Shamir Transform . . . . . . . . . 60--79
Arpita Maitra and
Goutam Paul Another Look at Symmetric Incoherent
Optimal Eavesdropping against BB84 . . . 80--99
Chaya Ganesh and
Vipul Goyal and
Satya Lokam On-Line/Off-Line Leakage Resilient
Secure Computation Protocols . . . . . . 100--119
Claude Carlet and
Jean-Luc Danger and
Sylvain Guilley and
Houssem Maghrebi Leakage Squeezing of Order Two . . . . . 120--139
Christophe Clavier and
Benoit Feix and
Georges Gagnerot and
Christophe Giraud and
Myl\`ene Roussellet ROSETTA for Single Trace Analysis . . . 140--155
Mario Lamberger and
Florian Mendel and
Vincent Rijmen Collision Attack on the Hamsi-256
Compression Function . . . . . . . . . . 156--171
Tuomas Kortelainen and
Ari Vesanen and
Juha Kortelainen Generalized Iterated Hash Functions
Revisited: New Complexity Bounds for
Multicollision Attacks . . . . . . . . . 172--190
Subhadeep Banik and
Subhamoy Maitra and
Santanu Sarkar A Differential Fault Attack on the Grain
Family under Reasonable Assumptions . . 191--208
Thierry P. Berger and
Marine Minier Cryptanalysis of Pseudo-random
Generators Based on Vectorial FCSRs . . 209--224
Patrick Derbez and
Pierre-Alain Fouque and
Jérémy Jean Faster Chosen-Key Distinguishers on
Reduced-Round AES . . . . . . . . . . . 225--243
Jiqiang Lu and
Yongzhuang Wei and
Jongsung Kim and
Enes Pasalic The Higher-Order Meet-in-the-Middle
Attack and Its Application to the
Camellia Block Cipher . . . . . . . . . 244--264
Yu Sasaki Double-SP Is Weaker Than Single-SP:
Rebound Attacks on Feistel Ciphers with
Several Rounds . . . . . . . . . . . . . 265--282
Shengbao Wu and
Mingsheng Wang Automatic Search of Truncated Impossible
Differentials for Word-Oriented Block
Ciphers . . . . . . . . . . . . . . . . 283--302
Jung Woo Kim and
Jungjoo Seo and
Jin Hong and
Kunsoo Park and
Sung-Ryul Kim High-Speed Parallel Implementations of
the Rainbow Method in a Heterogeneous
System . . . . . . . . . . . . . . . . . 303--316
Daniel J. Bernstein and
Tanja Lange Computing Small Discrete Logarithms
Faster . . . . . . . . . . . . . . . . . 317--338
Ingo von Maurich and
Tim Güneysu Embedded Syndrome-Based Hashing . . . . 339--357
Anonymous Front Matter . . . . . . . . . . . . . . ??
Mi Li and
Dongning Han and
Shengfu Lu and
Zheng Liu and
Ning Zhong Associative Information Processing in
Parahippocampal Place Area (PPA): An
fMRI Study . . . . . . . . . . . . . . . 1--9
Qingyuan Tian Language Acquisition Is an Optimized
Process Balanced between Holistic and
Compositive . . . . . . . . . . . . . . 10--17
Chin Ian Lou and
Daria Migotina and
Joao P. Rodrigues and
Joao Semedo and
Feng Wan and
Peng Un Mak Object Recognition Test in Peripheral
Vision: a Study on the Influence of
Object Color, Pattern and Shape . . . . 18--26
Sanxia Fan and
Xuyan Wang and
Zhizhou Liao and
Zhoujun Long and
Haiyan Zhou and
Yulin Qin Basic Level Advantage during Information
Retrieval: An ERP Study . . . . . . . . 27--37
Zhoujun Long and
Xuyan Wang and
Xiangsheng Shen and
Sanxia Fan and
Haiyan Zhou and
Yulin Qin A Skill Learning during Heuristic
Problem Solving: An fMRI Study . . . . . 38--49
Xuyan Wang and
Zhoujun Long and
Sanxia Fan and
Weiyan Yu and
Haiyan Zhou and
Yulin Qin The Role of Category Label in Adults'
Inductive Reasoning . . . . . . . . . . 50--60
Yuki Ueyama and
Eizo Miyashita Estimation of Visual Feedback
Contribution to Limb Stiffness in
Visuomotor Control . . . . . . . . . . . 61--72
Haiyan Zhou and
Yukun Xiong and
Zhoujun Long and
Sanxia Fan and
Xuyan Wang and
Yulin Qin and
Ning Zhong Rule Acquisition in the Proceeding of
Heuristic Sudoku Solving . . . . . . . . 73--84
Redwan Abdo A. Mohammed and
Samah Abdulfatah Mohammed and
Lars Schwabe BatGaze: a New Tool to Measure Depth
Features at the Center of Gaze during
Free Viewing . . . . . . . . . . . . . . 85--96
Redwan Abdo A. Mohammed and
Lars Schwabe A Brain Informatics Approach to Explain
the Oblique Effect via Depth Statistics 97--106
Azizi Ab Aziz and
Faudziah Ahmad and
Houzifa M. Hintaya An Agent Model for Temporal Dynamics
Analysis of a Person with Chronic
Fatigue Syndrome . . . . . . . . . . . . 107--118
Zhijiang Wang and
Jiming Liu and
Ning Zhong and
Yulin Qin and
Haiyan Zhou and
Jian Yang and
Kuncheng Li A Na\"\ive Hypergraph Model of Brain
Networks . . . . . . . . . . . . . . . . 119--129
Do Young Choi and
Kun Chang Lee and
Seong Wook Chae The Effect of Individual Psychological
Characteristics on Creativity
Revelation: Emphasis with Psychological
Empowerment and Intrinsic Motivation . . 130--139
Alexander Ryjov Modeling and Optimization of Information
Retrieval for Perception-Based
Information . . . . . . . . . . . . . . 140--149
Yu-Wen Chen and
Hsing Mei Sleep Physiological Dynamics Simulation
with Fuzzy Set . . . . . . . . . . . . . 150--161
Lorenzo Dell'Arciprete and
Brian Murphy and
Fabio Massimo Zanzotto Parallels between Machine and Brain
Decoding . . . . . . . . . . . . . . . . 162--174
Rafael Ramirez and
Zacharias Vamvakousis Detecting Emotion from EEG Signals Using
the Emotive Epoc Device . . . . . . . . 175--184
Guohun Zhu and
Yan Li and
Peng Paul Wen An Efficient Visibility Graph Similarity
Algorithm and Its Application on Sleep
Stages Classification . . . . . . . . . 185--195
Chun-An Chou and
Kittipat ``Bot'' Kampa and
Sonya H. Mehta and
Rosalia F. Tungaraza Information-Theoretic Based Feature
Selection for Multi-Voxel Pattern
Analysis of fMRI Data . . . . . . . . . 196--208
Adham Atyabi and
Sean P. Fitzgibbon and
David M. W. Powers Multiplication of EEG Samples through
Replicating, Biasing, and Overlapping 209--219
Anonymous Front Matter . . . . . . . . . . . . . . ??
Christopher Kruegel Fighting Malicious Software . . . . . . 1--15
Chaitrali Amrutkar and
Kapil Singh and
Arunabh Verma and
Patrick Traynor VulnerableMe: Measuring Systemic
Weaknesses in Mobile Browser Security 16--34
Andres Ojamaa and
Karl Düüna Security Assessment of Node.js Platform 35--43
Prasad Naldurg Foundations of Dynamic Access Control 44--58
Khalid Zaman Bijon and
Ram Krishnan and
Ravi Sandhu Risk-Aware RBAC Sessions . . . . . . . . 59--74
Soumya Maity and
Soumya K. Ghosh A Cognitive Trust Model for Access
Control Framework in MANET . . . . . . . 75--88
Khalifa Toumi and
César Andrés and
Ana Cavalli Trust-orBAC: a Trust Access Control
Model in Multi-Organization Environments 89--103
Matthew L. Bolton and
Celeste M. Wallace and
Lenore D. Zuck On Policies and Intents . . . . . . . . 104--118
Arne Swinnen and
Raoul Strackx and
Pieter Philippaerts and
Frank Piessens ProtoLeaks: a Reliable and
Protocol-Independent Network Covert
Channel . . . . . . . . . . . . . . . . 119--133
Goutam Paul and
Ian Davidson and
Imon Mukherjee and
S. S. Ravi Keyless Steganography in Spatial Domain
Using Energetic Pixels . . . . . . . . . 134--148
Ruchira Naskar and
Rajat Subhra Chakraborty Fuzzy Inference Rule Based Reversible
Watermarking for Digital Images . . . . 149--163
Vivek Natarajan and
Yi Yang and
Sencun Zhu Secure Trust Metadata Management for
Mobile Ad-Hoc Networks . . . . . . . . . 164--180
Rakesh Matam and
Somanath Tripathy Defence against Wormhole Attacks in
Wireless Mesh Networks . . . . . . . . . 181--193
Sarita Agrawal and
Rodrigo Roman and
Manik Lal Das and
Anish Mathuria and
Javier Lopez A Novel Key Update Protocol in Mobile
Sensor Networks . . . . . . . . . . . . 194--207
Anup Kumar Bhattacharya and
Abhijit Das and
Dipanwita Roychoudhury and
Aravind Iyer Autonomous Certification with List-Based
Revocation for Secure V2V Communication 208--222
Weihan Li and
Brajendra Panda and
Qussai Yaseen Mitigating Insider Threat on Database
Integrity . . . . . . . . . . . . . . . 223--237
Jaydeep Howlader and
Jayanta Kar and
Ashis Kumar Mal Coercion Resistant MIX for Electronic
Auction . . . . . . . . . . . . . . . . 238--248
Girish Chandra and
Divakar Yadav Verification of Money Atomicity in
Digital Cash Based Payment System . . . 249--264
Alberto Peinado and
Amparo Fúster-Sabater Cryptographic Analysis of a Type of
Sequence Generators . . . . . . . . . . 265--276
Soumyadev Maity and
R. C. Hansdah Certificate-Less On-Demand Public Key
Management (CLPKM) for Self-organized
MANETs . . . . . . . . . . . . . . . . . 277--293
Anonymous Front Matter . . . . . . . . . . . . . . ??
Fengling Han and
Ron van Schyndel M-Identity and Its Authentication
Protocol for Secure Mobile Commerce
Applications . . . . . . . . . . . . . . 1--10
Avinash Srinivasan and
Jie Wu SafeCode --- Safeguarding Security and
Privacy of User Data on Stolen iOS
Devices . . . . . . . . . . . . . . . . 11--20
Alexandre Braga and
Rafael Cividanes and
Ismael Ávila and
Claudia Tambascia Protection Aspects of Iconic Passwords
on Mobile Devices . . . . . . . . . . . 21--32
Mariem Graa and
Nora Cuppens-Boulahia and
Frédéric Cuppens and
Ana Cavalli Detecting Control Flow in Smartphones:
Combining Static and Dynamic Analyses 33--47
Jemal Abawajy and
Andrei Kelarev A Multi-tier Ensemble Construction of
Classifiers for Phishing Email Detection
and Filtering . . . . . . . . . . . . . 48--56
Yong Feng and
Bo Wang and
Fengling Han and
Xinghuo Yu and
Zahir Tari Chattering-Free Terminal Sliding-Mode
Observer for Anomaly Detection . . . . . 57--65
Paul A. Watters and
Nigel Phair Detecting Illicit Drugs on Social Media
Using Automated Social Media
Intelligence Analysis (ASMIA) . . . . . 66--76
Juan Pablo Timpanaro and
Isabelle Chrisment and
Olivier Festor Improving Content Availability in the
I2P Anonymous File-Sharing Environment 77--92
Mark Stegelmann and
Dogan Kesdogan V2GPriv: Vehicle-to-Grid Privacy in the
Smart Grid . . . . . . . . . . . . . . . 93--107
Daniel Angermeier and
Konstantin Böttinger and
Andreas Ibing and
Dieter Schuster A Secure Architecture for Smart Meter
Systems . . . . . . . . . . . . . . . . 108--122
Geng Yang and
Qiang Zhou and
Xiaolong Xu and
Jian Xu and
Chunming Rong A Novel Identity-Based Key Management
and Encryption Scheme for Distributed
System . . . . . . . . . . . . . . . . . 123--138
Ferdous A. Barbhuiya and
Tonmoy Saikia and
Sukumar Nandi An Anomaly Based Approach for HID Attack
Detection Using Keystroke Dynamics . . . 139--152
Avinash Srinivasan and
Lashidhar Chennupati Robust Authentication of Public Access
Points Using Digital Certificates --- a
Novel Approach . . . . . . . . . . . . . 153--164
Han Fei and
Qin Jing and
Zhao Huawei and
Hu Jiankun A General Transformation from KP-ABE to
Searchable Encryption . . . . . . . . . 165--178
Luca Ferretti and
Michele Colajanni and
Mirco Marchetti Supporting Security and Consistency for
Cloud Database . . . . . . . . . . . . . 179--193
Ronald Petrlic Proxy Re-encryption in a
Privacy-Preserving Cloud Computing DRM
Scheme . . . . . . . . . . . . . . . . . 194--211
Satoru Akimoto and
Yoshiaki Hori and
Kouichi Sakurai Collaborative Behavior Visualization and
Its Detection by Observing Darknet
Traffic . . . . . . . . . . . . . . . . 212--226
Craig Valli SSH --- Somewhat Secure Host . . . . . . 227--235
Nimalaprakasan Skandhakumar and
Farzad Salim and
Jason Reid and
Ed Dawson Physical Access Control Administration
Using Building Information Models . . . 236--250
Yongming Yang and
Zulong Zhang and
Fengling Han and
Kunming Lin Multiple Factors Based Evaluation of
Fingerprint Images Quality . . . . . . . 251--264
Anonymous Front Matter . . . . . . . . . . . . . . ??
Saber M. Elsayed and
Ruhul A. Sarker and
Daryl L. Essam The Influence of the Number of Initial
Feasible Solutions on the Performance of
an Evolutionary Optimization Algorithm 1--11
Kiyoharu Tagawa Concurrent Differential Evolution Based
on Generational Model for Multi-core
CPUs . . . . . . . . . . . . . . . . . . 12--21
Wenlong Fu and
Mark Johnston and
Mengjie Zhang Figure of Merit Based Fitness Functions
in Genetic Programming for Edge
Detection . . . . . . . . . . . . . . . 22--31
Amadeo Ascó and
Jason A. D. Atkin and
Edmund K. Burke An Evolutionary Algorithm for the
Over-constrained Airport Baggage Sorting
Station Assignment Problem . . . . . . . 32--41
Dung H. Phan and
Junichi Suzuki A Non-parametric Statistical Dominance
Operator for Noisy Multiobjective
Optimization . . . . . . . . . . . . . . 42--51
Marwa Khater and
Elham Salehi and
Robin Gras The Emergence of New Genes in EcoSim and
Its Effect on Fitness . . . . . . . . . 52--61
Mohsen Davarynejad and
Zary Forghany and
Jan van den Berg Mass-Dispersed Gravitational Search
Algorithm for Gene Regulatory Network
Model Parameter Identification . . . . . 62--72
Bin Zhang and
Kamran Shafi and
Hussein A. Abbass A Density Based Approach to the Access
Point Layout Smart Distribution Grid
Design Optimization Problem . . . . . . 73--82
Mostafa Ellabaan and
Xianshun Chen and
Nguyen Quang Huy Multi-modal Valley-Adaptive Memetic
Algorithm for Efficient Discovery of
First-Order Saddle Points . . . . . . . 83--92
Hisao Ishibuchi and
Masakazu Yamane and
Yusuke Nojima Ensemble Fuzzy Rule-Based Classifier
Design by Parallel Distributed Fuzzy
GBML Algorithms . . . . . . . . . . . . 93--103
Ahmed Kafafy and
Ahmed Bounekkar and
Stéphane Bonnevay HEMH2: An Improved Hybrid Evolutionary
Metaheuristics for 0/1 Multiobjective
Knapsack Problems . . . . . . . . . . . 104--116
Prashant Singh Rana and
Harish Sharma and
Mahua Bhattacharya and
Anupam Shukla Guided Reproduction in Differential
Evolution . . . . . . . . . . . . . . . 117--127
Una Benlic and
Jin-Kao Hao A Study of Breakout Local Search for the
Minimum Sum Coloring Problem . . . . . . 128--137
Masaya Nakata and
Pier Luca Lanzi and
Keiki Takadama XCS with Adaptive Action Mapping . . . . 138--147
Cuong C. Vu and
Lam Thu Bui and
Hussein A. Abbass DEAL: a Direction-Guided Evolutionary
Algorithm . . . . . . . . . . . . . . . 148--157
Susanne Rosenthal and
Nail El-Sourani and
Markus Borschbach Introduction of a Mutation Specific Fast
Non-dominated Sorting GA Evolved for
Biochemical Optimizations . . . . . . . 158--167
Eman Sayed and
Daryl Essam and
Ruhul Sarker Using Hybrid Dependency Identification
with a Memetic Algorithm for Large Scale
Optimization Problems . . . . . . . . . 168--177
Rohitash Chandra and
Mengjie Zhang and
Lifeng Peng Application of Cooperative Convolution
Optimization for $^{13}$C Metabolic Flux
Analysis: Simulation of Isotopic
Labeling Patterns Based on Tandem Mass
Spectrometry Measurements . . . . . . . 178--187
Hoang Xuan Huan and
Dong Do Duc and
Nguyen Manh Ha An Efficient Two-Phase Ant Colony
Optimization Algorithm for the Closest
String Problem . . . . . . . . . . . . . 188--197
Kamran Shafi and
Kathryn E. Merrick and
Essam Debie Evolution of Intrinsic Motives in
Multi-agent Simulations . . . . . . . . 198--207
Anonymous Front Matter . . . . . . . . . . . . . . ??
Chao Wang and
Yunhong Wang and
Zhaoxiang Zhang Incremental Learning of Patch-Based Bag
of Facial Words Representation for
Online Face Recognition in Videos . . . 1--9
Adam Borowiak and
Ulrich Reiter and
U. Peter Svensson Evaluation of Audio Quality Requirements
over Extended Periods of Time Using Long
Duration Audiovisual Content . . . . . . 10--20
Liang Tao and
Horace H. S. Ip Hashing with Cauchy Graph . . . . . . . 21--32
Sang Phan and
Thanh Duc Ngo and
Vu Lam and
Son Tran and
Duy-Dinh Le and
Duc Anh Duong and
Shin'ichi Satoh Multimedia Event Detection Using
Segment-Based Approach for Motion
Feature . . . . . . . . . . . . . . . . 33--44
Stefan Romberg and
Moritz August and
Christian X. Ries and
Rainer Lienhart Robust Feature Bundling . . . . . . . . 45--56
Yang Liang and
Mingli Song and
Jiajun Bu and
Chun Chen Colorization for Gray Scale Facial Image
by Locality-Constrained Linear Coding 57--67
Xiaozhou Zhou and
Pierre Boulanger New Eye Contact Correction Using Radial
Basis Function for Wide Baseline
Videoconference System . . . . . . . . . 68--79
Wenxin Yu and
Weichen Wang and
Zhengyan Guo and
Satoshi Goto An Integrated Hole-Filling Algorithm for
View Synthesis . . . . . . . . . . . . . 80--92
Shenggao Zhu and
Hugh Anderson and
Ye Wang A Real-Time On-Chip Algorithm for
IMU-Based Gait Measurement . . . . . . . 93--104
Shenggao Zhu and
Hugh Anderson and
Ye Wang Reducing the Power Consumption of an
IMU-Based Gait Measurement System . . . 105--116
Yuxia Wang and
Yuan Zhang and
Rui Lu and
Pamela C. Cosman SSIM-Based End-to-End Distortion
Modeling for H.264 Video Coding . . . . 117--128
Lei Sun and
Zhenyu Liu and
Takeshi Ikenaga A Videoconferencing-Oriented
Hybrid-Domain H.264/SVC to H.264/AVC
Spatial Transcoder . . . . . . . . . . . 129--141
Chongwu Tang and
Xiaokang Yang and
Guangtao Zhai Robust Noise Estimation Based on Noise
Injection . . . . . . . . . . . . . . . 142--152
Jinjian Wu and
Fei Qi and
Guangming Shi Image Quality Assessment Based on
Improved Structural SIMilarity . . . . . 153--163
Chun-Chi Chen and
Wen-Hsiao Peng and
Shih-Chun Chou Multi-hypothesis Temporal Prediction
Using Template Matching Prediction and
Block Motion Compensation for High
Efficiency Video Coding . . . . . . . . 164--175
Hong Lu and
Kai Chen and
Guobao Jiang and
Renzhong Wei and
Xiangyang Xue Leveraging Exemplar and Saliency Model
for Image Search Reranking . . . . . . . 176--185
Shuxin Qin and
Xiaoyang Zhu and
Haitao Yu and
Shuiying Ge and
Yiping Yang and
Yongshi Jiang Real-Time Markerless Hand Gesture
Recognition with Depth Camera . . . . . 186--197
Zhaoqiang Xia and
Jinye Peng and
Xiaoyi Feng and
Jianping Fan Social Tag Enrichment via Automatic
Abstract Tag Refinement . . . . . . . . 198--209
Charles-Henri Quivy and
Itsuo Kumazawa ``\ldotsIt's Orange and Small, and White
Stripes\ldots'' . . . . . . . . . . . . 210--221
Arpit Shukla and
Karan Nathwani and
Rajesh M. Hegde An Adaptive Non Reference Anchor Array
Framework for Distant Speech Recognition 222--231
Anonymous Front Matter . . . . . . . . . . . . . . ??
Yadong Zhu and
Yuanhai Xue and
Jiafeng Guo and
Yanyan Lan and
Xueqi Cheng and
Xiaoming Yu Exploring and Exploiting Proximity
Statistic for Information Retrieval
Model . . . . . . . . . . . . . . . . . 1--13
Zongcheng Ji and
Fei Xu and
Bin Wang A Category-integrated Language Model for
Question Retrieval in Community Question
Answering . . . . . . . . . . . . . . . 14--25
Tetsuya Sakai and
Zhicheng Dou and
Ruihua Song and
Noriko Kando The Reusability of a Diversified Search
Test Collection . . . . . . . . . . . . 26--38
Tetsuya Sakai and
Makoto P. Kato One Click One Revisited: Enhancing
Evaluation Based on Information Units 39--51
Zhen Yue and
Shuguang Han and
Daqing He A Comparison of Action Transitions in
Individual and Collaborative Exploratory
Web Search . . . . . . . . . . . . . . . 52--63
Minghui Qiu and
Yaliang Li and
Jing Jiang Query-Oriented Keyphrase Extraction . . 64--75
Jinpeng Wang and
Wayne Xin Zhao and
Rui Yan and
Haitian Wei and
Jian-Yun Nie and
Xiaoming Li Using Lexical and Thematic Knowledge for
Name Disambiguation . . . . . . . . . . 76--88
Xueni Li and
Shaowu Zhang and
Liang Yang and
Hongfei Lin Sells Out or Piles Up? A Sentiment
Autoregressive Model for Predicting
Sales Performance . . . . . . . . . . . 89--102
Zhenyu Qi and
Kang Liu and
Jun Zhao Are Human-Input Seeds Good Enough for
Entity Set Expansion? Seeds Rewriting by
Leveraging Wikipedia Semantic Knowledge 103--113
Antti Puurula Combining Modifications to Multinomial
Naive Bayes for Text Classification . . 114--125
Junta Mizuno and
Eric Nichols and
Yotaro Watanabe and
Kentaro Inui Organizing Information on the Web
through Agreement-Conflict Relation
Classification . . . . . . . . . . . . . 126--137
Mitsuo Yoshida and
Yuki Arase Exploiting Twitter for Spiking Query
Classification . . . . . . . . . . . . . 138--149
Kejiang Ren and
Shaowu Zhang and
Hongfei Lin Where Are You Settling Down:
Geo-locating Twitter Users Based on
Tweets and Social Networks . . . . . . . 150--161
Chang-Woo Chun and
Jung-Tae Lee and
Seung-Wook Lee and
Hae-Chang Rim Detecting Informative Messages Based on
User History in Twitter . . . . . . . . 162--173
Changhao Jiang and
Min Zhang and
Bin Gao and
Tie-Yan Liu A Study on Potential Head Advertisers in
Sponsored Search . . . . . . . . . . . . 174--186
Tianshu Chang and
Hongfei Lin and
Yuan Lin Feature Transformation Method Enhanced
Vandalism Detection in Wikipedia . . . . 187--198
Junting Ye and
Yanan Qian and
Qinghua Zheng PLIDMiner: a Quality Based Approach for
Researcher's Homepage Discovery . . . . 199--210
Kai Lu and
Guanyuan Zhang and
Rui Li and
Shuai Zhang and
Bin Wang Exploiting and Exploring Hierarchical
Structure in Music Recommendation . . . 211--225
Leszek Kaliciak and
Ben Horsburgh and
Dawei Song and
Nirmalie Wiratunga and
Jeff Pan Enhancing Music Information Retrieval by
Incorporating Image-Based Local Features 226--237
Liang Shi and
Bin Wang Yet Another Sorting-Based Solution to
the Reassignment of Document Identifiers 238--249
Anonymous Front Matter . . . . . . . . . . . . . . ??
Debayan Deb and
Kalyanmoy Deb Investigation of Mutation Schemes in
Real-Parameter Genetic Algorithms . . . 1--8
Kaizhou Z. Gao Discrete Harmony Search Algorithm for
Dynamic FJSSP in Remanufacturing
Engineering . . . . . . . . . . . . . . 9--16
Soham Sarkar and
Swagatam Das Multilevel Image Thresholding Based on
Tsallis Entropy and Differential
Evolution . . . . . . . . . . . . . . . 17--24
Dipankar Maity and
Udit Halder Convergence and Boundary Estimation of
the Particle Dynamics in Generalized
Particle Swarm Optimization . . . . . . 25--32
Sudipta Das and
Durbadal Mandal Application of Differential Evolution
with Best of Random Mutation Strategy on
Asymmetric Location Only Synthesis of
Broadside Circular Antenna Array . . . . 33--40
Tinu Varghese and
R. Sheela Kumari Performance Evaluation of Bacterial
Foraging Optimization Algorithm for the
Early Diagnosis and Tracking of
Alzheimer's Disease . . . . . . . . . . 41--48
J. Senthilnath and
P. B. Shreyas Multi-sensor Satellite Image Analysis
Using Niche Genetic Algorithm for Flood
Assessment . . . . . . . . . . . . . . . 49--56
Ananthanaryanan Rathinam and
Ripunjoy Phukan Solution to Economic Load Dispatch
Problem Based on FIREFLY Algorithm and
Its Comparison with BFO, CBFO-S and
CBFO-Hybrid . . . . . . . . . . . . . . 57--65
Layak Ali and
Samrat L. Sabat and
Siba K. Udgata MESFET DC Model Parameter Extraction
Using Adaptive Accelerated Exploration
Particle Swarm Optimizer . . . . . . . . 66--73
Kalam Narendar Reddy and
Vadlamani Ravi Kernel Group Method of Data Handling:
Application to Regression Problems . . . 74--81
Sanjay Agrawal and
Rutuparna Panda An Efficient Algorithm for Gray Level
Image Enhancement Using Cuckoo Search 82--89
Sumanta Panda and
Debadutta Mishra and
B. B. Biswal A Multi-objective Workspace Optimization
of 3R Manipulator Using Modified PSO . . 90--97
Éderson R. Silva and
Paulo R. Guardieiro An Analysis of Genetic Algorithm Based
Anycast Routing in Delay and Disruption
Tolerant Networks . . . . . . . . . . . 98--105
Bidishna Bhattacharya and
Kamal Krishna Mandal Reactive Power Optimization Using Hybrid
Cultural Algorithm . . . . . . . . . . . 106--115
Bhimsen Tudu and
Preetam Roy and
Sajjan Kumar Techno-Economic Feasibility Analysis of
Hybrid Renewable Energy System Using
Improved Version of Particle Swarm
Optimization . . . . . . . . . . . . . . 116--123
Tirimula Rao Benala and
Rajib Mall Software Effort Prediction Using Fuzzy
Clustering and Functional Link
Artificial Neural Networks . . . . . . . 124--132
Manas R. Nayak and
Subrat K. Dash Optimal Placement and Sizing of
Distributed Generation in Radial
Distribution System Using Differential
Evolution Algorithm . . . . . . . . . . 133--142
Daniel G. Ferrari and
Leandro Nunes de Castro Clustering Algorithm Recommendation: a
Meta-learning Approach . . . . . . . . . 143--150
Subhodip Biswas and
Digbalay Bose and
Souvik Kundu A Clustering Particle Based Artificial
Bee Colony Algorithm for Dynamic
Environment . . . . . . . . . . . . . . 151--159
Souvik Kundu and
Subhodip Biswas and
Swagatam Das A Selective Teaching-Learning Based
Niching Technique with Local
Diversification Strategy . . . . . . . . 160--168
Anonymous Front Matter . . . . . . . . . . . . . . ??
Srinivasan H. Sengamedu Scalable Analytics --- Algorithms and
Systems . . . . . . . . . . . . . . . . 1--7
Vijay Srinivas Agneeswaran Big-Data --- Theoretical, Engineering
and Analytics Perspective . . . . . . . 8--15
Tony Basil and
Bollepalli S. Chandra and
Choudur Lakshminarayan A Comparison of Statistical Machine
Learning Methods in Heartbeat Detection
and Classification . . . . . . . . . . . 16--25
Ammar Yasir and
Mittapally Kumara Swamy and
Polepalli Krishna Reddy and
Subhash Bhalla Enhanced Query-By-Object Approach for
Information Requirement Elicitation in
Large Databases . . . . . . . . . . . . 26--41
Rajeev Gupta and
Himanshu Gupta and
Mukesh Mohania Cloud Computing and Big Data Analytics:
What Is New from Databases Perspective? 42--61
Polepalli Krishna Reddy and
Basi Bhaskar Reddy and
D. Rama Rao A Model of Virtual Crop Labs as a Cloud
Computing Application for Enhancing
Practical Agricultural Education . . . . 62--76
Ammar Yasir and
Mittapally Kumara Swamy and
Polepalli Krishna Reddy Exploiting Schema and Documentation for
Summarizing Relational Databases . . . . 77--90
Ullas Nambiar and
Tanveer Faruquie and
Shamanth Kumar and
Fred Morstatter and
Huan Liu Faceted Browsing over Social Media . . . 91--100
Anand Gupta and
Manpreet Kathuria and
Arjun Singh and
Ashish Sachdeva and
Shruti Bhati Analog Textual Entailment and Spectral
Clustering (ATESC) Based Summarization 101--110
Jatin Kumar and
Tushar Rao and
Saket Srivastava Economics of Gold Price
Movement-Forecasting Analysis Using
Macro-economic, Investor Fear and
Investor Behavior Features . . . . . . . 111--121
Joung Woo Ryu and
Mehmed M. Kantardzic and
Myung-Won Kim and
A. Ra Khil An Efficient Method of Building an
Ensemble of Classifiers in Streaming
Data . . . . . . . . . . . . . . . . . . 122--133
Sraban Kumar Mohanty and
Gopalan Sajith I/O Efficient Algorithms for Block
Hessenberg Reduction Using Panel
Approach . . . . . . . . . . . . . . . . 134--147
Anand Gupta and
Prashant Khurana and
Raveena Mathur Luring Conditions and Their Proof of
Necessity through Mathematical Modelling 148--157
Myung-Won Kim and
Eun-Ju Kim and
Won-Moon Song and
Sung-Yeol Song and
A. Ra Khil Efficient Recommendation for Smart TV
Contents . . . . . . . . . . . . . . . . 158--167
T. V. Vijay Kumar and
Santosh Kumar Materialized View Selection Using
Simulated Annealing . . . . . . . . . . 168--179
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Greg Morrisett Scalable Formal Machine Models . . . . . 1--3
Xavier Leroy Mechanized Semantics for Compiler
Verification . . . . . . . . . . . . . . 4--6
Gilles Barthe and
Benjamin Grégoire and
César Kunz Automation in Computer-Aided
Cryptography: Proofs, Attacks and
Designs . . . . . . . . . . . . . . . . 7--8
Naoki Kobayashi Program Certification by Higher-Order
Model Checking . . . . . . . . . . . . . 9--10
Valentin Robert and
Xavier Leroy A Formally-Verified Alias Analysis . . . 11--26
Jianzhou Zhao and
Steve Zdancewic Mechanized Verification of Computing
Dominators for Formalizing Compilers . . 27--42
Dominic P. Mulligan and
Claudio Sacerdoti Coen On the Correctness of an Optimising
Assembler for the Intel MCS-51
Microprocessor . . . . . . . . . . . . . 43--59
Brian Campbell An Executable Semantics for CompCert C 60--75
Pierre-Nicolas Tollitte and
David Delahaye and
Catherine Dubois Producing Certified Functional Code from
Inductive Specifications . . . . . . . . 76--91
Lukas Bulwahn The New Quickcheck for Isabelle . . . . 92--108
Andrei Popescu and
Johannes Hölzl and
Tobias Nipkow Proving Concurrent Noninterference . . . 109--125
Toby Murray and
Daniel Matichuk and
Matthew Brassil Noninterference for Operating System
Kernels . . . . . . . . . . . . . . . . 126--142
Alexander Vaynberg and
Zhong Shao Compositional Verification of a Baby
Virtual Memory Manager . . . . . . . . . 143--159
Keisuke Nakano Shall We Juggle, Coinductively? . . . . 160--172
Beniamino Accattoli Proof Pearl: Abella Formalization of
$\lambda$-Calculus Cube Property . . . . 173--187
Hing-Lun Chan and
Michael Norrish A String of Pearls: Proofs of Fermat's
Little Theorem . . . . . . . . . . . . . 188--207
Kaustuv Chaudhuri Compact Proof Certificates for Linear
Logic . . . . . . . . . . . . . . . . . 208--223
Christian Doczkal and
Gert Smolka Constructive Completeness for Modal
Logic with Transitive Closure . . . . . 224--239
Andrea Asperti and
Wilmer Ricciotti Rating Disambiguation Errors . . . . . . 240--255
Pierre Neron A Formal Proof of Square Root and
Division Elimination in Embedded
Programs . . . . . . . . . . . . . . . . 256--272
Anonymous Front Matter . . . . . . . . . . . . . . ??
Edmund M. Clarke and
William Klieber Model Checking and the State Explosion
Problem . . . . . . . . . . . . . . . . 1--30
Patrice Godefroid and
Shuvendu K. Lahiri From Program to Logic: An Introduction 31--44
Christine Paulin-Mohring Introduction to the Coq Proof-Assistant
for Practical Software Verification . . 45--95
César A. Muñoz and
Ramiro A. Demasi Advanced Theorem Proving Techniques in
PVS and Applications . . . . . . . . . . 96--132
Julian Tschannen and
Carlo Alberto Furia Automatic Verification of Advanced
Object-Oriented Features: The AutoProof
Approach . . . . . . . . . . . . . . . . 133--155
Luke Herbert and
K. Rustan M. Leino Using Dafny, an Automatic Program
Verifier . . . . . . . . . . . . . . . . 156--181
Anonymous Back Matter . . . . . . . . . . . . . . ??
Anonymous Front Matter . . . . . . . . . . . . . . ??
Hristijan Gjoreski and
Mitja Lu\vstrek and
Matja\vz Gams Context-Based Fall Detection Using
Inertial and Location Sensors . . . . . 1--16
Tobias Grosse-Puppendahl and
Eugen Berlin and
Marko Borazio Enhancing Accelerometer-Based Activity
Recognition with Capacitive Proximity
Sensing . . . . . . . . . . . . . . . . 17--32
Sara Bongartz and
Yucheng Jin and
Fabio Patern\`o and
Joerg Rett and
Carmen Santoro Adaptive User Interfaces for Smart
Environments with the Support of
Model-Based Languages . . . . . . . . . 33--48
Sebastian Osswald and
Alexander Meschtscherjakov and
Nicole Mirnig and
Karl-Armin Kraessig Back of the Steering Wheel Interaction:
The Car Braille Keyer . . . . . . . . . 49--64
Eric Struse and
Julian Seifert and
Sebastian Üllenbeck and
Enrico Rukzio and
Christopher Wolf PermissionWatcher: Creating User
Awareness of Application Permissions in
Mobile Systems . . . . . . . . . . . . . 65--80
Kaisa Väänänen-Vainio-Mattila and
Tomi Haustola and
Jonna Häkkilä and
Minna Karukka Exploring Non-verbal Communication of
Presence between Young Children and
Their Parents through the Embodied Teddy
Bear . . . . . . . . . . . . . . . . . . 81--96
Joris Ijsselmuiden and
Ann-Kristin Grosselfinger and
David Münch and
Michael Arens Automatic Behavior Understanding in
Crisis Response Control Rooms . . . . . 97--112
Ewald Strasser and
Astrid Weiss and
Thomas Grill and
Sebastian Osswald and
Manfred Tscheligi Combining Implicit and Explicit Methods
for the Evaluation of an Ambient
Persuasive Factory Display . . . . . . . 113--128
Valérian Guivarch and
Valérie Camps and
André Péninou Context Awareness in Ambient Systems by
an Adaptive Multi-Agent Approach . . . . 129--144
Jethro Shell and
Simon Coupland Towards Fuzzy Transfer Learning for
Intelligent Environments . . . . . . . . 145--160
Radu-Daniel Vatavu and
C\uat\ualin-Marian Chera and
Wei-Tek Tsai Gesture Profile for Web Services: An
Event-Driven Architecture to Support
Gestural Interfaces for Smart
Environments . . . . . . . . . . . . . . 161--176
Pedro Chahuara and
Anthony Fleury and
François Portet and
Michel Vacher Using Markov Logic Network for On-Line
Activity Recognition from Non-visual
Home Automation Sensors . . . . . . . . 177--192
Bo\vzidara Cvetkovi\'c and
Bo\vstjan Kalu\vza and
Mitja Lu\vstrek and
Matja\vz Gams Multi-Classifier Adaptive Training:
Specialising an Activity Recognition
Classifier Using Semi-supervised
Learning . . . . . . . . . . . . . . . . 193--207
Mohamed A. Sehili and
Benjamin Lecouteux and
Michel Vacher and
François Portet and
Dan Istrate Sound Environment Analysis in Smart Home 208--223
Doris Zachhuber and
Thomas Grill and
Ondrej Polacek and
Manfred Tscheligi Contextual Wizard of Oz . . . . . . . . 224--239
Berardina De Carolis and
Stefano Ferilli and
Nicole Novielli Recognizing the User Social Attitude in
Multimodal Interaction in Smart
Environments . . . . . . . . . . . . . . 240--255
Leila S. Shafti and
Pablo A. Haya and
Manuel García-Herranz and
Eduardo Pérez Evolutionary Feature Extraction to Infer
Behavioral Patterns in Ambient
Intelligence . . . . . . . . . . . . . . 256--271
Ekaterina Kurdyukova and
Stephan Hammer and
Elisabeth André Personalization of Content on Public
Displays Driven by the Recognition of
Group Context . . . . . . . . . . . . . 272--287
Michael Zaki and
Peter Forbrig Towards the Generation of Assistive User
Interfaces for Smart Meeting Rooms Based
on Activity Patterns . . . . . . . . . . 288--295
Saskia Robben and
Kyra Bergman and
Sven Haitjema and
Yannick de Lange and
Ben Kröse Reducing Dementia Related Wandering
Behaviour with an Interactive Wall . . . 296--303
Anonymous Front Matter . . . . . . . . . . . . . . ??
Yanfeng Wang and
Wenling Wu and
Xiaoli Yu and
Lei Zhang Security on LBlock against Biclique
Cryptanalysis . . . . . . . . . . . . . 1--14
Keting Jia and
Leibo Li Improved Impossible Differential Attacks
on Reduced-Round MISTY1 . . . . . . . . 15--27
Satoshi Tanaka and
Tung Chou and
Bo-Yin Yang and
Chen-Mou Cheng and
Kouichi Sakurai Efficient Parallel Evaluation of
Multivariate Quadratic Polynomials on
GPUs . . . . . . . . . . . . . . . . . . 28--42
Wentao Zhao and
Xin Hai and
Shaojing Fu and
Chao Li and
Yanfeng Wang Enumeration of Even-Variable Boolean
Functions with Maximum Algebraic
Immunity . . . . . . . . . . . . . . . . 43--54
Hwajeong Seo and
Howon Kim Multi-precision Multiplication for
Public-Key Cryptography on Embedded
Microprocessors . . . . . . . . . . . . 55--67
Hyunmin Kim and
Vladimir Rozic and
Ingrid Verbauwhede Three Phase Dynamic Current Mode Logic:
a More Secure DyCML to Achieve a More
Balanced Power Consumption . . . . . . . 68--81
JeaHoon Park and
JaeCheol Ha Improved Differential Fault Analysis on
Block Cipher ARIA . . . . . . . . . . . 82--95
Pairat Thorncharoensri and
Willy Susilo and
Yi Mu Multi-Level Controlled Signature . . . . 96--110
Liangze Li and
Fan Zhang Tate Pairing Computation on Generalized
Hessian Curves . . . . . . . . . . . . . 111--123
Mario Larangeira and
Keisuke Tanaka Reduction-Centric Non-programmable
Security Proof for the Full Domain Hash
in the Random Oracle Model . . . . . . . 124--143
Hyun-Sun Kang and
Chang-Seop Park An Authentication and Key Management
Scheme for the Proxy Mobile IPv6 . . . . 144--160
László Aszalós and
Andrea Huszti Payment Approval for PayWord . . . . . . 161--176
Jung Yeon Hwang and
Sungwook Eom and
Ku-Young Chang and
Pil Joong Lee and
DaeHun Nyang Anonymity-Based Authenticated Key
Agreement with Full Binding Property . . 177--191
Junghoon Oh and
Namheun Son and
Sangjin Lee and
Kyungho Lee A Study for Classification of Web
Browser Log and Timeline Visualization 192--207
François Durvaux and
Beno\^\it Gérard and
Stéphanie Kerckhof and
François Koeune Intellectual Property Protection for
Integrated Systems Using Soft Physical
Hash Functions . . . . . . . . . . . . . 208--225
Shun-Te Liu and
Yi-Ming Chen and
Hui-Ching Hung $N$-Victims: An Approach to Determine
$N$-Victims for APT Investigations . . . 226--240
Jaeun Choi and
Gisung Kim and
Tae Ghyoon Kim and
Sehun Kim An Efficient Filtering Method for
Detecting Malicous Web Pages . . . . . . 241--253
Eric Lin and
John Aycock and
Mohammad Mannan Lightweight Client-Side Methods for
Detecting Email Forgery . . . . . . . . 254--269
Yang-seo Choi and
Ik-Kyun Kim and
Jin-Tae Oh and
Jong-Soo Jang AIGG Threshold Based HTTP GET Flooding
Attack Detection . . . . . . . . . . . . 270--284
Hyunjoo Kim and
Byoungkoo Kim and
Daewon Kim and
Ik-Kyun Kim and
Tai-Myoung Chung Implementation of GESNIC for Web Server
Protection against HTTP GET Flooding
Attacks . . . . . . . . . . . . . . . . 285--295
Anonymous Front Matter . . . . . . . . . . . . . . ??