Last update:
Thu Mar 22 11:51:22 MDT 2018
Gheorghe Adam and Sanda Adam Bayesian Automatic Adaptive Quadrature: An Overview . . . . . . . . . . . . . . 1--16 Volker Friese Computational Challenges for the CBM Experiment . . . . . . . . . . . . . . . 17--27 Vladimir P. Gerdt Consistency Analysis of Finite Difference Approximations to PDE Systems 28--42 Vladimir P. Gerdt and Alexander N. Prokopenya The Circuit Model of Quantum Computation and Its Simulation with Mathematica . . 43--55 Ulrich H. E. Hansmann Proteins Studied by Computer Simulations 56--65 Juha Honkonen Functional Methods in Stochastic Systems 66--78 Vladimir V. Kornyak Mathematical Modeling of Finite Quantum Systems . . . . . . . . . . . . . . . . 79--93 Vladimir S. Melezhik Multi-channel Computations in Low-Dimensional Few-Body Physics . . . . 94--107 Serguey V. Zemskov and Henk M. Jonkers and Fred J. Vermolen Mathematical Models to Predict the Critical Conditions for Bacterial Self-healing of Concrete . . . . . . . . 108--121 Ciprian Sorin Acatrinei A New Discretization Scheme in Field Theory . . . . . . . . . . . . . . . . . 122--127 Nikolay V. Antonov and Nikolay M. Gulitskiy Two-Loop Calculation of the Anomalous Exponents in the Kazantsev--Kraichnan Model of Magnetic Hydrodynamics . . . . 128--135 Edik A. Ayryan and Alexander A. Egorov and Leonid A. Sevastyanov and Konstantin P. Lovetskiy Mathematical Modeling of Irregular Integrated Optical Waveguides . . . . . 136--147 Ivan Da\vno Two Notes on Continuous-Time Neurodynamical Systems . . . . . . . . . 148--153 Michal Hnati\vc and Juha Honkonen and Tomá\vs Lu\vcivjanský On the Mathematical Modelling of the Annihilation Process . . . . . . . . . . 154--159 Marián Kle\vs\vc and \vStefan Schrötter The Crossing Numbers of Join of Paths and Cycles with Two Graphs of Order Five 160--167 Eva Litavcová and Miron Pavlu\vs and Ján Seman and Ibrohim Sarhadov Exact Solution of a Moisture Drying System with Phase Transition . . . . . . 168--173 Leonid Sevastyanov and Alexander Zorin and Alexander Gorbachev Pseudo-Differential Operators in an Operational Model of the Quantum Measurement of Observables . . . . . . . 174--181 Alina Suzko and Elena Velicheva Exactly Solvable Models for the Generalized Schrödinger Equation . . . . 182--188 Sanda Adam and Gheorghe Adam Floating Point Degree of Precision in Numerical Quadrature . . . . . . . . . . 189--194 Ilkizar V. Amirkhanov and Taisia P. Puzynina and Igor V. Puzynin and Ibrohim Sarhadov Numerical Simulations of Heat and Moisture Transfer Subject to the Phase Transition . . . . . . . . . . . . . . . 195--200 Anonymous Front Matter . . . . . . . . . . . . . . ??
Mikko Särelä and Christian Esteve Rothenberg and András Zahemszky and Pekka Nikander and Jörg Ott BloomCasting: Security in Bloom Filter Based Multicast . . . . . . . . . . . . 1--16 Sanna Suoranta and Jani Heikkinen and Pekka Silvekoski Authentication Session Migration . . . . 17--32 Miika Komu and Sasu Tarkoma and Andrey Lukyanenko Mitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles 33--48 Ravishankar Borgaonkar and Kevin Redon and Jean-Pierre Seifert Experimental Analysis of the Femtocell Location Verification Techniques . . . . 49--54 Erka Koivunen ``Why Wasn't I Notified?'': Information Security Incident Reporting Demystified 55--70 Pern Hui Chia and Andreas P. Heiner and N. Asokan Use of Ratings from Personalized Communities for Trustworthy Application Installation . . . . . . . . . . . . . . 71--88 Gunnar Kreitz and Mads Dam and Douglas Wikström Practical Private Information Aggregation in Large Networks . . . . . 89--103 Magnus Almgren and Wolfgang John Tracking Malicious Hosts on a 10Gbps Backbone Link . . . . . . . . . . . . . 104--120 Elahe Kani-Zabihi and Lizzie Coles-Kemp Service Users' Requirements for Tools to Support Effective On-line Privacy and Consent Practices . . . . . . . . . . . 121--135 Dominik Herrmann and Christoph Gerber and Christian Banse and Hannes Federrath Analyzing Characteristic Host Access Patterns for Re-identification of Web User Sessions . . . . . . . . . . . . . 136--154 Jason Crampton and Michael Huth A Framework for the Modular Specification and Orchestration of Authorization Policies . . . . . . . . . 155--170 Kari Kostiainen and N. Asokan and Jan-Erik Ekberg Credential Disabling from Trusted Execution Environments . . . . . . . . . 171--186 Olga Gadyatskaya and Fabio Massacci and Federica Paci and Sergey Stankevich Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications . . . . . . . . . . . . . . 187--192 Filippo Del Tedesco and Alejandro Russo and David Sands Implementing Erasure Policies Using Taint Analysis . . . . . . . . . . . . . 193--209 Juan José Conti and Alejandro Russo A Taint Mode for Python via a Library 210--222 Philippe De Ryck and Maarten Decat and Lieven Desmet and Frank Piessens and Wouter Joosen Security of Web Mashups: a Survey . . . 223--238 Jonas Magazinius and Phu H. Phung and David Sands Safe Wrappers and Sane Policies for Self Protecting JavaScript . . . . . . . . . 239--255 Jose Quaresma and Christian W. Probst Protocol Implementation Generator . . . 256--268 Billy Bob Brumley Secure and Fast Implementations of Two Involution Ciphers . . . . . . . . . . . 269--282 Markku-Juhani O. Saarinen The PASSERINE Public Key Encryption and Authentication Mechanism . . . . . . . . 283--288 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Jessica Fridrich Modern Trends in Steganography and Steganalysis . . . . . . . . . . . . . . 1--1 Nasir Memon Photo Forensics --- There Is More to a Picture than Meets the Eye . . . . . . . 2--2 Vasily Sachnev and Hyoung Joong Kim An Improved Matrix Encoding Scheme for JPEG Steganography . . . . . . . . . . . 3--15 Shunquan Tan Steganalysis of LSB Matching Revisited for Consecutive Pixels Using B-Spline Functions . . . . . . . . . . . . . . . 16--29 Xinghao Jiang and Tanfeng Sun and Yue Zhou and Yun Q. Shi A Drift Compensation Algorithm for H.264/AVC Video Robust Watermarking Scheme . . . . . . . . . . . . . . . . . 30--41 Junxiang Wang and Jiangqun Ni and Jinwei Pan A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding . . . . . . . . . . . 42--56 Kazuo Ohzeki and YuanYu Wei and Yutaka Hirakawa and Kiyotsugu Sato A New Watermarking Method with Obfuscated Quasi-Chirp Transform . . . . 57--71 Hui Wang and Anthony T. S. Ho and Xi Zhao A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression . . . . . . . . . . 72--85 Baiying Lei and Ing Yann Soon and Zhen Li A Robust Audio Watermarking Scheme Based on Lifting Wavelet Transform and Singular Value Decomposition . . . . . . 86--96 Alper Koz and Claude Delpha Adaptive Selection of Embedding Locations for Spread Spectrum Watermarking of Compressed Audio . . . . 97--110 Takayuki Yamada and Seiichi Gohshi and Isao Echizen IR Hiding: Method to Prevent Re-recording Screen Image Built in Short Wavelength Pass Filter Detection Method Using Specular Reflection . . . . . . . 111--125 Jong Yun Jun and Kunho Kim and Jae-Pil Heo and Sung-eui Yoon IRIW: Image Retrieval Based Image Watermarking for Large-Scale Image Databases . . . . . . . . . . . . . . . 126--141 Fan Chen and Hongjie He and Yaoran Huo and Hongxia Wang Self-recovery Fragile Watermarking Scheme with Variable Watermark Payload 142--155 Huawei Tian and Zheng Wang and Yao Zhao and Rongrong Ni and Lunming Qin Spread Spectrum-Based Multi-bit Watermarking for Free-View Video . . . . 156--166 Hongmei Liu and Lei Li and Jian Li and Jiwu Huang Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates . . . . . . . . . . . . . . . . 167--180 Takaaki Yamada and Yoshiyasu Takahashi Use of ``Emergable Watermarks'' as Copy Indicators for Securing Video Content 181--195 Jonathan Weir and WeiQi Yan Authenticating Visual Cryptography Shares Using $2$D Barcodes . . . . . . . 196--210 Feng Liu and Teng Guo and ChuanKun Wu and Ching-Nung Yang Flexible Visual Cryptography Scheme without Distortion . . . . . . . . . . . 211--227 Yasushi Yamaguchi An Extended Visual Cryptography Scheme for Continuous-Tone Images . . . . . . . 228--242 Xudong Zhao and Shilin Wang and Shenghong Li and Jianhua Li A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection . . . . . . . . . . . . . . . 243--256 Anonymous Front Matter . . . . . . . . . . . . . . ??
Marin Bertier and Marko Obrovac and Cédric Tedeschi A Protocol for the Atomic Capture of Multiple Molecules on Large Scale Platforms . . . . . . . . . . . . . . . 1--15 Annette Bieniusa and Thomas Fuhrmann Lifting the Barriers --- Reducing Latencies with Transparent Transactional Memory . . . . . . . . . . . . . . . . . 16--30 Jingshu Chen and Sandeep Kulkarni Application of Automated Revision for UML Models: a Case Study . . . . . . . . 31--45 Alain Cournier and Swan Dubois and Anissa Lamani Snap-Stabilizing Message Forwarding Algorithm on Tree Topologies . . . . . . 46--60 Tyler Crain and Damien Imbs and Michel Raynal Towards a Universal Construction for Transaction-Based Multiprocess Programs 61--75 Carole Delporte-Gallet and Hugues Fauconnier Byzantine Agreement with Homonyms in Synchronous Systems . . . . . . . . . . 76--90 Ali Ebnenasir and Reza Hajisheykhi Facilitating the Design of Fault Tolerance in Transaction Level SystemC Programs . . . . . . . . . . . . . . . . 91--105 Guy Even and Moti Medina and Gregor Schaffrath Competitive and Deterministic Embeddings of Virtual Networks . . . . . . . . . . 106--121 Sotirios Kentros and Aggelos Kiayias Solving the At-Most-Once Problem with Nearly Optimal Effectiveness . . . . . . 122--137 Abhinav Mehta and Shashank Agrawal and Kannan Srinathan Interplay between (Im)perfectness, Synchrony and Connectivity: The Case of Reliable Message Transmission . . . . . 138--152 Nuno Santos and André Schiper Tuning Paxos for High-Throughput with Batching and Pipelining . . . . . . . . 153--167 Amine Abidi and Sonia Mettali Gammar and Farouk Kamoun Hybrid Approach for Experimental Networking Research . . . . . . . . . . 168--178 Mahima Agumbe Suresh and Radu Stoleru and Ron Denton Towards Optimal Event Detection and Localization in Acyclic Flow Networks 179--196 Roberto Baldoni and Silvia Bonomi and Adriano Cerocchi Virtual Tree: a Robust Overlay Network for Ensuring Interval Valid Queries in Dynamic Distributed Systems . . . . . . 197--200 Yin-Chung Hsu and Yen-Ting Chen and Chiu-Kuo Liang Distributed Coverage-Enhancing Algorithms in Directional Sensor Networks with Rotatable Sensors . . . . 201--213 Dinesh Dash and Arijit Bishnu and Arobinda Gupta Finding the Quality of Line Coverage of a Sensor Network . . . . . . . . . . . . 214--217 Emiliano De Cristofaro and Roberto Di Pietro Preserving Query Privacy in Urban Sensing Systems . . . . . . . . . . . . 218--233 Sarang Deshpande and Krishna M. Sivalingam Adaptive Velocity Based Guided Navigation in Wireless Sensor Networks 234--248 Mauro Conti and Roberto Di Pietro and Angelo Spognardi Wireless Sensor Replica Detection in Mobile Environments . . . . . . . . . . 249--264 Christian Esposito and Stefano Russo and Roberto Beraldi Achieving Reliable and Timely Event Dissemination over WAN . . . . . . . . . 265--280 Anonymous Front Matter . . . . . . . . . . . . . . ??
Javier Lopez and Roberto Setola and Stephen D. Wolthusen Overview of Critical Information Infrastructure Protection . . . . . . . 1--14 Myriam Dunn Cavelty and Manuel Suter The Art of CIIP Strategy: Taking Stock of Content and Processes . . . . . . . . 15--38 Andrea Glorioso and Andrea Servida Infrastructure Sectors and the Information Infrastructure . . . . . . . 39--51 Eric Luiijf Understanding Cyber Threats and Vulnerabilities . . . . . . . . . . . . 52--67 Nils Kalstad Svendsen and Stephen D. Wolthusen Modelling Approaches . . . . . . . . . . 68--97 Massimiliano Raciti and Jordi Cucurull and Simin Nadjm-Tehrani Anomaly Detection in Water Management Systems . . . . . . . . . . . . . . . . 98--119 Cristina Alcaraz and Gerardo Fernandez and Fernando Carvajal Security Aspects of SCADA and DCS Environments . . . . . . . . . . . . . . 120--149 Julian L. Rrushi SCADA Protocol Vulnerabilities . . . . . 150--176 Abdelmajid Khelil and Daniel Germanus and Neeraj Suri Protection of SCADA Communication Channels . . . . . . . . . . . . . . . . 177--196 Ettore Bompard and Paolo Cuccia and Marcelo Masera and Igor Nai Fovino Cyber Vulnerability in Power Systems Operation and Control . . . . . . . . . 197--234 Stig O. Johnsen and Andreas Aas and Ying Qian Sector-Specific Information Infrastructure Issues in the Oil, Gas, and Petrochemical Sector . . . . . . . . 235--279 Stuart Goldman and Huseyin Uzunalioglu Telecommunications . . . . . . . . . . . 280--300 Bernhard Hämmerli Financial Services Industry . . . . . . 301--329 Mark Hartong and Rajn Goel and Duminda Wijesekera Transportation . . . . . . . . . . . . . 330--355 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Alan Hanjalic A New Gap to Bridge: Where to Go Next in Social Media Retrieval? . . . . . . . . 1--1 John R. Smith Mining Multimedia Data for Meaning . . . 2--2 Ralf Steinmetz and Stefan Göbel Challenges in Serious Gaming as Emerging Multimedia Technology for Education, Training, Sports and Health . . . . . . 3--3 Hichem Bannour and Céline Hudelot Building Semantic Hierarchies Faithful to Image Semantics . . . . . . . . . . . 4--15 Daniel Kuettel and Matthieu Guillaumin and Vittorio Ferrari Combining Image-Level and Segment-Level Models for Automatic Annotation . . . . 16--28 Svebor Karaman and Jenny Benois-Pineau and Rémi Mégret and Aurélie Bugeau Multi-layer Local Graph Words for Object Recognition . . . . . . . . . . . . . . 29--39 Markus Mühling and Ralph Ewerth and Jun Zhou and Bernd Freisleben Multimodal Video Concept Detection via Bag of Auditory Words and Multiple Kernel Learning . . . . . . . . . . . . 40--50 Bogdan Ionescu and Klaus Seyerlehner and Christoph Rasche and Constantin Vertan and Patrick Lambert Content-Based Video Description for Automatic Video Genre Categorization . . 51--62 Pere Obrador and Michele A. Saad and Poonam Suryanarayan and Nuria Oliver Towards Category-Based Aesthetic Models of Photographs . . . . . . . . . . . . . 63--76 Ehsan Younessian and Deepu Rajan Scene Signatures for Unconstrained News Video Stories . . . . . . . . . . . . . 77--88 Zhiguo Yang and Yuxin Peng and Jianguo Xiao Visual Vocabulary Optimization with Spatial Context for Image Annotation and Classification . . . . . . . . . . . . . 89--102 Xiaowei Ding and Yi Xu and Lei Deng and Xiaokang Yang Colorization Using Quaternion Algebra with Automatic Scribble Generation . . . 103--114 Rados\law Mantiuk and Micha\l Kowalik and Adam Nowosielski and Bartosz Bazyluk Do-It-Yourself Eye Tracker: Low-Cost Pupil-Based Eye Tracker for Computer Graphics Applications . . . . . . . . . 115--125 Longfei Zhang and Yue Gao and Alexander Hauptmann and Rongrong Ji and Gangyi Ding and Boaz Super Symbiotic Black-Box Tracker . . . . . . 126--137 Tina Walber and Ansgar Scherp and Steffen Staab Identifying Objects in Images from Analyzing the Users' Gaze Movements for Provided Tags . . . . . . . . . . . . . 138--148 Xiaojian Zhao and Jin Yuan and Richang Hong and Meng Wang and Zhoujun Li and Tat-Seng Chua On Video Recommendation over Social Network . . . . . . . . . . . . . . . . 149--160 Taiga Yoshida and Go Irie and Takashi Satou and Akira Kojima and Suguru Higashino Improving Item Recommendation Based on Social Tag Ranking . . . . . . . . . . . 161--172 Zhen-zhong Lan and Lei Bao and Shoou-I Yu and Wei Liu and Alexander G. Hauptmann Double Fusion for Multimedia Event Detection . . . . . . . . . . . . . . . 173--185 Ehsan Younessian and Deepu Rajan Multi-modal Solution for Unconstrained News Story Retrieval . . . . . . . . . . 186--195 Ardhendu Behera and Anthony G. Cohn and David C. Hogg Workflow Activity Monitoring Using Dynamics of Pair-Wise Qualitative Spatial Relations . . . . . . . . . . . 196--209 Anonymous Front Matter . . . . . . . . . . . . . . ??
Hengfei Li and Nir Oren and Timothy J. Norman Probabilistic Argumentation Frameworks 1--16 Ringo Baumann and Gerhard Brewka and Renata Wong Splitting Argumentation Frameworks: An Empirical Evaluation . . . . . . . . . . 17--31 Wolfgang Dvo\vrák On the Complexity of Computing the Justification Status of an Argument . . 32--49 Rolando Medellin-Gasque and Katie Atkinson and Peter McBurney and Trevor Bench-Capon Arguments over Co-operative Plans . . . 50--66 Luke Riley and Katie Atkinson and Terry Payne and Elizabeth Black An Implemented Dialogue System for Inquiry and Persuasion . . . . . . . . . 67--84 Wietske Visser and Koen V. Hindriks and Catholijn M. Jonker An Argumentation Framework for Qualitative Multi-criteria Preferences 85--98 Stefano Bistarelli and Francesco Santini Modeling and Solving AFs with a Constraint-Based Tool: ConArg . . . . . 99--116 Nicolás D. Rotstein and Nir Oren and Timothy J. Norman Resource Boundedness and Argumentation 117--131 Elizabeth Black and Katie Bentley An Empirical Study of a Deliberation Dialogue System . . . . . . . . . . . . 132--146 Patrick Krümpelmann and Matthias Thimm and Marcelo A. Falappa and Alejandro J. García Selective Revision by Deductive Argumentation . . . . . . . . . . . . . 147--162 Paulo Maio and Nuno Silva A Three-Layer Argumentation Framework 163--180 Maria Laura Cobo and Diego C. Martinez and Guillermo R. Simari Stable Extensions in Timed Argumentation Frameworks . . . . . . . . . . . . . . . 181--196 Pietro Baroni and Federico Cerutti and Paul E. Dunne and Massimiliano Giacomin Computing with Infinite Argumentation Frameworks: The Case of AFRAs . . . . . 197--214 Tjitze Rienstra and Alan Perotti and Serena Villata and Dov M. Gabbay and Leendert van der Torre Multi-sorted Argumentation . . . . . . . 215--231 Guido Boella and Dov M. Gabbay and Alan Perotti and Leendert van der Torre and Serena Villata Conditional Labelling for Abstract Argumentation . . . . . . . . . . . . . 232--248 Francesca Toni and Paolo Torroni Bottom-Up Argumentation . . . . . . . . 249--262 Xiuyi Fan and Francesca Toni A First Step towards Argumentation Dialogues for Discovery . . . . . . . . 263--279 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Bo Kågström and Daniel Kressner and Meiyue Shao On Aggressive Early Deflation in Parallel Variants of the QR Algorithm 1--10 Klaus Mosegaard Limits to Nonlinear Inversion . . . . . 11--21 Fred G. Gustavson Cache Blocking . . . . . . . . . . . . . 22--32 Jose Luis Vázquez-Poletti and Gonzalo Barderas and Ignacio M. Llorente and Pilar Romero A Model for Efficient Onboard Actualization of an Instrumental Cyclogram for the Mars MetNet Mission on a Public Cloud Infrastructure . . . . . 33--42 Sylvain Contassot-Vivier and Thomas Jost and Stéphane Vialle Impact of Asynchronism on GPU Accelerated Parallel Iterative Computations . . . . . . . . . . . . . . 43--53 Victor Kostin and Vadim Lisitsa and Galina Reshetova and Vladimir Tcheverda Simulation of Seismic Waves Propagation in Multiscale Media: Impact of Cavernous/Fractured Reservoirs . . . . . 54--64 Andreas Adelmann and Peter Arbenz and Yves Ineichen Improvements of a Fast Parallel Poisson Solver on Irregular Domains . . . . . . 65--74 Eryk Laskowski and Marek Tudruj and Ivanoe De Falco and Umberto Scafuri and Ernesto Tarantino Distributed Java Programs Initial Mapping Based on Extremal Optimization 75--85 Ewa Niewiadomska-Szynkiewicz and Michal Marks Software Environment for Parallel Optimization of Complex Systems . . . . 86--96 Snorri Agnarsson Parallel Programming in Morpho . . . . . 97--107 Kenneth Skovhede and Morten N. Larsen and Brian Vinter Extending Distributed Shared Memory for the Cell Broadband Engine to a Channel Model . . . . . . . . . . . . . . . . . 108--118 Janusz Borkowski and Marek Tudruj and Adam Smyk and Damian Kopanski Global Asynchronous Parallel Program Control for Multicore Processors . . . . 119--130 Matthias Lieber and Verena Grützun and Ralf Wolke and Matthias S. Müller and Wolfgang E. Nagel Highly Scalable Dynamic Load Balancing in the Atmospheric Modeling System COSMO-SPECS+FD4 . . . . . . . . . . . . 131--141 Bård Fjukstad and Tor-Magne Stien Hagen and Daniel Stòdle and Phuong Hoai Ha Interactive Weather Simulation and Visualization on a Display Wall with Many-Core Compute Nodes . . . . . . . . 142--151 Matthias Petschow and Paolo Bientinesi The Algorithm of Multiple Relatively Robust Representations for Multi-core Processors . . . . . . . . . . . . . . . 152--161 José I. Aliaga and Matthias Bollhöfer and Alberto F. Martín and Enrique S. Quintana-Ortí Parallelization of Multilevel ILU Preconditioners on Distributed-Memory Multiprocessors . . . . . . . . . . . . 162--172 José María Cecilia and José Manuel García and Manuel Ujaldón CUDA $2$D Stencil Computations for the Jacobi Method . . . . . . . . . . . . . 173--183 Adam Smyk and Marek Tudruj Streaming Model Computation of the FDTD Problem . . . . . . . . . . . . . . . . 184--192 Anna Matsekh and Alexei Skurikhin and Lakshman Prasad and Edward Rosten Numerical Aspects of Spectral Segmentation on Polygonal Grids . . . . 193--203 Jacek Strzelczyk and Stanislawa Porzycka Parallel Kriging Algorithm for Unevenly Spaced Data . . . . . . . . . . . . . . 204--212 Anonymous Front Matter . . . . . . . . . . . . . . ??
Luke Czapla and Alexey Siretskiy and John Grime and Malek O. Khan Free Energy Monte Carlo Simulations on a Distributed Network . . . . . . . . . . 1--12 Nuria Plattner and Sharif Kunikeev and David L. Freeman and Jimmie D. Doll Numerical Investigation of the Cumulant Expansion for Fourier Path Integrals . . 13--22 Peter Klüpfel and Simon Klüpfel and Kiril Tsemekhman and Hannes Jónsson Optimization of Functionals of Orthonormal Functions in the Absence of Unitary Invariance . . . . . . . . . . . 23--33 Andreas Pedersen and Jean-Claude Berthet and Hannes Jónsson Simulated Annealing with Coarse Graining and Distributed Computing . . . . . . . 34--44 Dóróthea M. Einarsdóttir and Andri Arnaldsson and Finnbogi Óskarsson and Hannes Jónsson Path Optimization with Application to Tunneling . . . . . . . . . . . . . . . 45--55 Martin Lilleeng Sætra and André Rigland Brodtkorb Shallow Water Simulations on Multiple GPUs . . . . . . . . . . . . . . . . . . 56--66 Patrick M. Widener and Tahsin Kurc and Wenjin Chen and Fusheng Wang and Lin Yang and Jun Hu High Performance Computing Techniques for Scaling Image Analysis Workflows . . 67--77 Christian Stussak and Peter Schenzel Parallel Computation of Bivariate Polynomial Resultants on Graphics Processing Units . . . . . . . . . . . . 78--87 Peter Benner and Pablo Ezzatti and Daniel Kressner and Enrique S. Quintana-Ortí and Alfredo Remón Accelerating Model Reduction of Large Linear Systems with Graphics Processors 88--97 Òystein E. Krog and Anne C. Elster Fast GPU-Based Fluid Simulations Using SPH . . . . . . . . . . . . . . . . . . 98--109 Andrew Davidson and John Owens Toward Techniques for Auto-tuning GPU Algorithms . . . . . . . . . . . . . . . 110--119 Andrzej Marciniak An Interval Version of the Crank--Nicolson Method --- The First Approach . . . . . . . . . . . . . . . . 120--126 Marco Nehmeier and Stefan Siegel and Jürgen Wolff von Gudenberg Parallel Detection of Interval Overlapping . . . . . . . . . . . . . . 127--136 Bart\lomiej Jacek Kubica and Adam Wo\'zniak Using the Second-Order Information in Pareto-set Computations of a Multi-criteria Problem . . . . . . . . . 137--147 Gerd Bohlender and Ulrich Kulisch Comments on Fast and Exact Accumulation of Products . . . . . . . . . . . . . . 148--156 Ma\lgorzata A. Jankowska An Interval Finite Difference Method of Crank--Nicolson Type for Solving the One-Dimensional Heat Conduction Equation with Mixed Boundary Conditions . . . . . 157--167 Walter Krämer and Michael Zimmer and Werner Hofschuster Using C-XSC for High Performance Verified Computing . . . . . . . . . . . 168--178 Nguyen Hong Diep Efficient Implementation of Interval Matrix Multiplication . . . . . . . . . 179--188 Markward Britsch The Computing Framework for Physics Analysis at LHCb . . . . . . . . . . . . 189--195 Helmut Neukirchen Taming the Raven --- Testing the Random Access, Visualization and Exploration Network RAVEN . . . . . . . . . . . . . 196--205 Anonymous Front Matter . . . . . . . . . . . . . . ??
Abhishek Parakh and Subhash Kak A New Small World Lattice . . . . . . . 1--8 Siddesh G. M. and Srinivasa K. G. SLA- Driven Dynamic Resource Allocation on Clouds . . . . . . . . . . . . . . . 9--18 Jagadeesh Balasubramaniyan and Sumalatha Ramachandran An Intelligent Cloud System Adopting File Pre-fetching . . . . . . . . . . . 19--27 Marcin Bazyd\lo and Szymon Francuzik and Cezary Sobaniec and Dariusz Wawrzyniak Replication Infrastructure for RESTful Web Services . . . . . . . . . . . . . . 28--37 Joon-Mo Yang and Jun-Yong Park and Ryum-Duck Oh Context Awareness Acquisition for Safety Sensor Data Processing on Industrial Sensor Network . . . . . . . . . . . . . 38--47 D. Paulraj and S. Swamynathan Content Based Service Discovery in Semantic Web Services Using WordNet . . 48--56 Demian Antony D'Mello and Manasa Shetty and Akshatha Prabhu and Akshaya and Adithi Shenoy Optimal Selection of Web Services for Efficient QoS Driven Web Service Compositions . . . . . . . . . . . . . . 57--66 Deivamani Mallayya and Baskaran Ramachandran Reconfigurable Web Service Composition Using Belief Revision . . . . . . . . . 67--76 PonHarshavardhanan and J. Akilandeswari and K. A. Anjali Krishna Semantic Web Service Discovery with Structural Level Matching of Operations 77--84 Aditya Narang and Sagar Prakash Joglekar and Karthikeyan Balaji Dhanapal A Novel Way of Tracking People in an Indoor Area . . . . . . . . . . . . . . 85--94 Tushar Kanti Bera and Samir Kumar Biswas and K. Rajan and J. Nagaraju Image Reconstruction in Electrical Impedance Tomography (EIT) with Projection Error Propagation-based Regularization (PEPR): a Practical Phantom Study . . . . . . . . . . . . . 95--105 J. Rekha and J. Bhattacharya and S. Majumder Improved Hand Tracking and Isolation from Face by ICondensation Multi Clue Algorithm for Continuous Indian Sign Language Recognition . . . . . . . . . . 106--116 Arpitha M. D. and Megha P. Arakeri and G. Ram Mohan Reddy An Approach for Color Edge Detection with Automatic Threshold Detection . . . 117--124 Anand T. V. and Madhu S. Nair and Rao Tatavarti Detection of Straight Lines Using Rule Directed Pixel Comparison (RDPC) Method 125--134 Praveen Cyriac and Philomina Simon Performance Analysis of Pedestrian Detection at Night Time with Different Classifiers . . . . . . . . . . . . . . 135--145 A. Benjamin Joseph and Baskaran Ramachandran Enhanced Quality Preserved Image Compression Technique Using Edge Assisted Wavelet Based Interpolation . . 146--153 T. Ashwini Reddy and K. Renuka Devi and Suryakanth V. Gangashetty Multilayer Feedforward Neural Network Models for Pattern Recognition Tasks in Earthquake Engineering . . . . . . . . . 154--162 Pawan Bhaladhare and Devesh Jinwala A Sensitive Attribute Based Clustering Method for $k$-Anonymization . . . . . . 163--170 Siddhaling Urolagin and Prema K. V. and N. V. Subba Reddy Generalization Capability of Artificial Neural Network Incorporated with Pruning Method . . . . . . . . . . . . . . . . . 171--178 Sudha Subramani and Sathiyabhama Balasubramaniam Post Mining of Diversified Multiple Decision Trees for Actionable Knowledge Discovery . . . . . . . . . . . . . . . 179--187 Anonymous Front Matter . . . . . . . . . . . . . . ??
Jacek Kitowski and Micha\l Tura\la PL-Grid: Foundations and Perspectives of National Computing Infrastructure . . . 1--14 Marcin Radecki and Tadeusz Szymocha Integrating Various Grid Middleware Components and User Services into a Single Platform . . . . . . . . . . . . 15--26 Marcin Radecki and Tomasz Szepieniec Towards Professional Service Operations in Grids . . . . . . . . . . . . . . . . 27--39 Bartosz Bosak and Jacek Komasa and Piotr Kopta New Capabilities in QosCosGrid Middleware for Advanced Job Management, Advance Reservation and Co-allocation of Computing Resources --- Quantum Chemistry Application Use Case . . . . . 40--55 Krzysztof Benedyczak and Marcin Stolarek Seamless Access to the PL-Grid e-Infrastructure Using UNICORE Middleware . . . . . . . . . . . . . . . 56--72 Marcin Jarz\kab and Jacek Kosi\'nski User-Oriented Provisioning of Secure Virtualized Infrastructure . . . . . . . 73--88 Jan Meizner and Eryk Ciepiela and Piotr Nowakowski Flexible and Extendable Mechanism Enabling Secure Access to e-Infrastructures and Storage of Confidential Data for the GridSpace2 Virtual Laboratory . . . . . . . . . . . 89--101 Gerard Frankowski SARA --- System for Inventory and Static Security Control in a Grid Infrastructure . . . . . . . . . . . . . 102--113 Bart\lomiej Balcerek and Bartosz Szurgot ACARM-ng: Next Generation Correlation Framework . . . . . . . . . . . . . . . 114--127 Bart\lomiej Balcerek and Gerard Frankowski Security Best Practices: Applying Defense-in-Depth Strategy to Protect the NGI\_PL . . . . . . . . . . . . . . . . 128--141 W\lodzimierz Funika and Filip Szura Automation of System Monitoring Based on Fuzzy Logic or Rules; Comparison of Two Designed Approaches with Regard to Computational Infrastructures . . . . . 142--156 Renata S\lota and Dariusz Król A Toolkit for Storage QoS Provisioning for Data-Intensive Applications . . . . 157--170 Tomasz Szepieniec and Ma\lgorzata Tomanek Implementation of Service Level Management in PL-Grid Infrastructure . . 171--181 Bartosz Bosak and Jan Konczak Highly Integrated Environment for Parallel Application Development Using QosCosGrid Middleware . . . . . . . . . 182--190 Bartek Palak and Pawe\l Wolniewicz User-Friendly Frameworks for Accessing Computational Resources . . . . . . . . 191--204 Piotr Dziubecki and Piotr Grabowski Online Web-Based Science Gateway for Nanotechnology Research . . . . . . . . 205--216 Daniel Har\ke\.zlak and Marek Kasztelnik Scripting Language Extensions Offered by the GridSpace Experiment Platform . . . 217--227 Eryk Ciepiela and Piotr Nowakowski Managing Entire Lifecycles of e-Science Applications in the GridSpace2 Virtual Laboratory --- From Motivation through Idea to Operable Web-Accessible Environment Built on Top of PL-Grid e-Infrastructure . . . . . . . . . . . . 228--239 Eryk Ciepiela and Leszek Zaraska GridSpace2 Virtual Laboratory Case Study: Implementation of Algorithms for Quantitative Analysis of Grain Morphology in Self-assembled Hexagonal Lattices According to the Hillebrand Method . . . . . . . . . . . . . . . . . 240--251 Tomasz Jadczyk and Maciej Malawski Examining Protein Folding Process Simulation and Searching for Common Structure Motifs in a Protein Family as Experiments in the GridSpace2 Virtual Laboratory . . . . . . . . . . . . . . . 252--264 Anonymous Front Matter . . . . . . . . . . . . . . ??
Sebastian S. Bauer and Rolf Hennicker and Martin Wirsing Building a Modal Interface Theory for Concurrency and Data . . . . . . . . . . 1--12 Hans-Dieter Ehrich My ADT Shrine . . . . . . . . . . . . . 13--24 Jan Kofro\vn and Franti\vsek Plá\vsil Evolving SOA in the Q-ImPrESS Project 25--26 Paolo Baldan and Clara Bertolissi Sharing in the Graph Rewriting Calculus 27--41 Roberto Bruni and Anne Kersten and Ivan Lanese and Giorgio Spagnolo A New Strategy for Distributed Compensations with Interruption in Long-Running Transactions . . . . . . . 42--60 Pablo F. Castro and Tom S. E. Maibaum Towards a First-Order Deontic Action Logic . . . . . . . . . . . . . . . . . 61--75 Christine Choppy and Gianna Reggio \sc Casl-Mdl, Modelling Dynamic Systems with a Formal Foundation and a UML-Like Notation . . . . . . . . . . . . . . . . 76--97 Mihai Codescu Lambda Expressions in \sc Casl Architectural Specifications . . . . . . 98--117 Mihai Codescu and Fulya Horozal and Michael Kohlhase and Till Mossakowski and Florian Rabe A Proof Theoretic Interpretation of Model Theoretic Hiding . . . . . . . . . 118--138 Mihai Codescu and Fulya Horozal and Michael Kohlhase and Till Mossakowski and Florian Rabe Towards Logical Frameworks in the Heterogeneous Tool Set Hets . . . . . . 139--159 Andrea Corradini and Fabio Gadducci and Leila Ribeiro An Institution for Graph Transformation 160--174 Timothy Bourke and Alexandre David and Kim G. Larsen and Axel Legay and Didier Lime and Ulrik Nyman New Results on Timed Specifications . . 175--192 Hans-Jörg Kreowski and Sabine Kuske and Caroline von Totth Combining Graph Transformation and Algebraic Specification into Model Transformation . . . . . . . . . . . . . 193--208 Ana Paula Maldonado and Luís Monteiro and Markus Roggenbach Towards Bialgebraic Semantics for the Linear Time --- Branching Time Spectrum 209--225 Grzegorz Marczy\'nski Algebraic Signatures Enriched by Dependency Structure . . . . . . . . . . 226--250 Liam O'Reilly and Till Mossakowski and Markus Roggenbach Compositional Modelling and Reasoning in an Institution for Processes and Data 251--269 Daniel Seidel and Janis Voigtländer Proving Properties about Functions on Lists Involving Element Tests . . . . . 270--286 Adrián Riesco Test-Case Generation for Maude Functional Modules . . . . . . . . . . . 287--301 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Alexandros Paramythis and Lydia Lau and Stavros Demetriadis and Manolis Tzagarakis Adaptive Support for Team Collaboration 1--4 Liliana Ardissono and Gianni Bosio and Marino Segnan A Visualization Model Supporting an Efficient Context Resumption in Collaboration Environments . . . . . . . 5--17 Toby Dragon and Bruce M. McLaren and Manolis Mavrikis and Eirini Geraniou Scaffolding Collaborative Learning Opportunities: Integrating Microworld Use and Argumentation . . . . . . . . . 18--30 Fabian Abel and Vania Dimitrova and Eelco Herder and Geert-Jan Houben Augmenting User Models with Real World Experiences to Enhance Personalization and Adaptation . . . . . . . . . . . . . 31--34 Sandro Rodriguez Garzon and Mark Poguntke The Personal Adaptive In-Car HMI: Integration of External Applications for Personalized Use . . . . . . . . . . . . 35--46 Adam Moore and Victoria Macarthur and Owen Conlan Core Aspects of Affective Metacognitive User Models . . . . . . . . . . . . . . 47--59 Amit Tiroshi and Tsvi Kuflik and Judy Kay and Bob Kummerfeld Recommender Systems and the Social Web 60--70 Ahmad Ammari and Vania Dimitrova and Dimoklis Despotakis Identifying Relevant YouTube Comments to Derive Socially Augmented User Models: a Semantically Enriched Machine Learning Approach . . . . . . . . . . . . . . . . 71--85 Francesco Ricci and Giovanni Semeraro and Marco de Gemmis and Pasquale Lops Decision Making and Recommendation Acceptance Issues in Recommender Systems 86--91 Roland Bader and Wolfgang Woerndl and Andreas Karitnig and Gerhard Leitner Designing an Explanation Interface for Proactive Recommendations in Automotive Scenarios . . . . . . . . . . . . . . . 92--104 Alexander Felfernig and Christoph Zehentner and Gerald Ninaus and Harald Grabner and Walid Maalej Group Decision Support for Requirements Negotiation . . . . . . . . . . . . . . 105--116 Olga C. Santos and Milos Kravcik and Diana Pérez-Marín Personalization Approaches in Learning Environments . . . . . . . . . . . . . . 117--121 Alberto Redondo-Hernández and Diana Pérez-Marín A Procedure to Automatically Adapt Questions in Student--Pedagogic Conversational Agent Dialogues . . . . . 122--134 Iolanda Leite and André Pereira and Ginevra Castellano and Samuel Mascarenhas and Carlos Martinho Modelling Empathy in Social Robotic Companions . . . . . . . . . . . . . . . 135--147 Mary Muir and Cristina Conati Understanding Student Attention to Adaptive Hints with Eye-Tracking . . . . 148--160 Marcel Berthold and Pablo Lachmann and Alexander Nussbaumer and Sergei Pachtchenko Psycho-pedagogical Mash-Up Design for Personalising the Learning Environment 161--175 Federica Cena and Antonina Dattolo and Ernesto William De Luca and Pasquale Lops and Till Plumbaum Semantic Adaptive Social Web . . . . . . 176--180 Ignacio Fernández-Tobías and Iván Cantador and Alejandro Bellogín Semantic Disambiguation and Contextualisation of Social Tags . . . . 181--197 Antonina Dattolo and Emanuela Pitassi Folkview: a Multi-agent System Approach to Modeling Folksonomies . . . . . . . . 198--212 Udeep Tandukar and Julita Vassileva Selective Propagation of Social Data in Decentralized Online Social Network . . 213--224 Anonymous Front Matter . . . . . . . . . . . . . . ??
Thotreingam Kasar and Angarai G. Ramakrishnan Multi-script and Multi-oriented Text Localization from Scene Images . . . . . 1--14 Chucai Yi and Yingli Tian Assistive Text Reading from Complex Background for Blind Persons . . . . . . 15--28 Carlos Merino-Gracia and Karel Lenc and Majid Mirmehdi A Head-Mounted Device for Recognizing Text in Natural Scenes . . . . . . . . . 29--41 Aruni Roy Chowdhury and Ujjwal Bhattacharya and Swapan K. Parui Text Detection of Two Major Indian Scripts in Natural Scene Images . . . . 42--57 Chao Zeng and Wenjing Jia and Xiangjian He An Algorithm for Colour-Based Natural Scene Text Segmentation . . . . . . . . 58--68 Yuanping Zhu and Jun Sun and Satoshi Naoi Recognizing Natural Scene Characters by Convolutional Neural Network and Bimodal Image Enhancement . . . . . . . . . . . 69--82 Qiong Liu and Chunyuan Liao PaperUI . . . . . . . . . . . . . . . . 83--100 Faisal Shafait and Michael Patrick Cutter and Joost van Beusekom and Syed Saqib Bukhari Decapod: a Flexible, Low Cost Digitization Solution for Small and Medium Archives . . . . . . . . . . . . 101--111 Szilárd Vajda and Leonard Rothacker and Gernot A. Fink A Method for Camera-Based Interactive Whiteboard Reading . . . . . . . . . . . 112--125 Syed Saqib Bukhari and Faisal Shafait and Thomas M. Breuel Border Noise Removal of Camera-Captured Document Images Using Page Frame Detection . . . . . . . . . . . . . . . 126--137 Syed Saqib Bukhari and Faisal Shafait and Thomas M. Breuel An Image Based Performance Evaluation Method for Page Dewarping Algorithms Using SIFT Features . . . . . . . . . . 138--149 Robert Nagy and Anders Dicker and Klaus Meyer-Wegener NEOCR: a Configurable Dataset for Natural Image Text Recognition . . . . . 150--163 Syed Saqib Bukhari and Faisal Shafait and Thomas M. Breuel The IUPR Dataset of Camera-Captured Document Images . . . . . . . . . . . . 164--171 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Mihhail Aizatulin and François Dupressoir Verifying Cryptographic Code in C: Some Experience and the Csec Challenge . . . 1--20 Willem De Groef and Dominique Devriese and Frank Piessens Better Security and Privacy for Web Browsers: a Survey of Techniques, and a New Implementation . . . . . . . . . . . 21--38 Mário S. Alvim and Miguel E. Andrés Differential Privacy: On the Trade-Off between Utility and Information Leakage 39--54 Luciano Bello and Eduardo Bonelli On-the-Fly Inlining of Dynamic Dependency Monitors for Secure Information Flow . . . . . . . . . . . . 55--69 Barbara Espinoza and Geoffrey Smith Min-Entropy Leakage of Channels in Cascade . . . . . . . . . . . . . . . . 70--84 Riccardo Focardi and Flaminia L. Luccio Secure Recharge of Disposable RFID Tickets . . . . . . . . . . . . . . . . 85--99 Simon N. Foley and Samane Abdi Avoiding Delegation Subterfuge Using Linked Local Permission Names . . . . . 100--114 Arnaud Fontaine and Samuel Hym and Isabelle Simplot-Ryl Verifiable Control Flow Policies for Java Bytecode . . . . . . . . . . . . . 115--130 Sibylle Fröschle and Nils Sommer Concepts and Proofs for Configuring PKCS#11 . . . . . . . . . . . . . . . . 131--147 Richard Gay and Heiko Mantel and Barbara Sprick Service Automata . . . . . . . . . . . . 148--163 Thomas Gibson-Robinson and Gavin Lowe Analysing Applications Layered on Unilaterally Authenticating Protocols 164--181 Robert Grabowski and Martin Hofmann and Keqin Li Type-Based Enforcement of Secure Programming Guidelines --- Code Injection Prevention at SAP . . . . . . 182--197 Timothy L. Hinrichs and William C. Garrison III TBA: a Hybrid of Logic and Extensional Access Control Systems . . . . . . . . . 198--213 Sebastian Mödersheim Diffie--Hellman without Difficulty . . . 214--229 Behnam Sattarzadeh and Mehran S. Fallah Is Cryptyc Able to Detect Insider Attacks? . . . . . . . . . . . . . . . . 230--244 Ben Smyth and Mark Ryan and Liqun Chen Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes . . . . . . . . . . . . . . . . 245--262 Mohammad Torabi Dashti and Jan Cederquist Risk Balance in Optimistic Non-repudiation Protocols . . . . . . . 263--277 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Joost-Pieter Katoen Model Checking: One Can Do Much More Than You Think! . . . . . . . . . . . . 1--14 Jan A. Bergstra and Alban Ponse Proposition Algebra and Short-Circuit Logic . . . . . . . . . . . . . . . . . 15--31 Luca Aceto and Arnar Birgisson and Anna Ingólfsdóttir Decompositional Reasoning about the History of Parallel Processes . . . . . 32--47 Shekoufeh Kolahdouz-Rahimi and Kevin Lano A Model-Based Development Approach for Model Transformations . . . . . . . . . 48--63 Christian Lambertz and Mila Majster-Cederbaum Analyzing Component-Based Systems on the Basis of Architectural Constraints . . . 64--79 Hassan Haghighi and Mohammad Mahdi Javanmard Constructive Development of Probabilistic Programs . . . . . . . . . 80--95 Mohammad Mahdi Jaghoori Composing Real-Time Concurrent Objects Refinement, Compatibility and Schedulability . . . . . . . . . . . . . 96--111 Jan Friso Groote and Tim W. D. M. Kouters Specification Guidelines to Avoid the State Space Explosion Problem . . . . . 112--127 Romain Demangeon and Daniel Hirschkoff Strong Normalisation in $ \lambda $-Calculi with References . . . . . . . 128--142 Yuxin Deng and Matthew Hennessy Compositional Reasoning for Markov Decision Processes . . . . . . . . . . . 143--157 Einar Broch Johnsen and Thi Mai Thuong Tran and Olaf Owe Safe Locking for Multi-threaded Java . . 158--173 Yi-Ling Hwong and Vincent J. J. Kusters Analysing the Control Software of the Compact Muon Solenoid Experiment at the Large Hadron Collider . . . . . . . . . 174--189 Minyoung Kim and Mark-Oliver Stehr and Carolyn Talcott A Distributed Logic for Networked Cyber-Physical Systems . . . . . . . . . 190--205 Hallstein Asheim Hansen and Gerardo Schneider Reachability Analysis of Non-linear Planar Autonomous Systems . . . . . . . 206--220 Qiusong Yang and Bei Zhang and Jian Zhai and Mingshu Li Attacking the Dimensionality Problem of Parameterized Systems via Bounded Reachability Graphs . . . . . . . . . . 221--235 Maryam Kamali and Luigia Petre and Kaisa Sere Refinement-Based Modeling of $3$D NoCs 236--252 Hamid Reza Asaadi and Ramtin Khosravi Towards Model-Based Testing of Electronic Funds Transfer Systems . . . 253--267 Luca Aceto and Ignacio Fábregas Relating Modal Refinements, Covariant-Contravariant Simulations and Partial Bisimulations . . . . . . . . . 268--283 Chaodong He and Yuxi Fu and Hongfei Fu Decidability of Behavioral Equivalences in Process Calculi with Name Scoping . . 284--298 Roméo Courbis Rewriting Approximations for Properties Verification over CCS Specifications . . 299--315 Anonymous Front Matter . . . . . . . . . . . . . . ??
Ehab ElGindy and Alia Abdelmoty Enhancing the Quality of Place Resources in Geo-folksonomies . . . . . . . . . . 1--12 Huaishuai Wang and Peiquan Jin and Lei Zhao and Lanlan Zhang and Lihua Yue Generating Semantic-Based Trajectories for Indoor Moving Objects . . . . . . . 13--25 Ying Fang and Jiaheng Cao and Junzhou Wang and Yuwei Peng and Wei Song HTPR*-Tree: An Efficient Index for Moving Objects to Support Predictive Query and Partial History Query . . . . 26--39 Michael Meyers and Bruce A. Ralston Developing Rich Web GIS Applications for Visual Analytics . . . . . . . . . . . . 40--50 Htoo Htoo and Yutaka Ohsawa and Noboru Sonehara Single-Source Multi-Target A* Algorithm for POI Queries on Road Network . . . . 51--62 Weimo Liu and Yinan Jing and Kunjie Chen and Weiwei Sun Combining Top-$k$ Query in Road Networks 63--75 Qingqing Zhang and Peiquan Jin and Sheng Lin and Lihua Yue Extracting Focused Locations for Web Pages . . . . . . . . . . . . . . . . . 76--89 Yuchi Ma and Chunyan Qu and Tingting Liu and Ning Yang and Changjie Tang Searching Similar Trajectories in Real Time: An Effectiveness and Efficiency Study . . . . . . . . . . . . . . . . . 90--102 Filip K\vri\vzka and Michal Krátký and Radim Ba\vca and Peter Chovanec Multidimensional Implementation of Stream ADT . . . . . . . . . . . . . . . 103--112 Ruiming Tang and Huayu Wu and Stéphane Bressan Measuring XML Structured-ness with Entropy . . . . . . . . . . . . . . . . 113--123 Yue Wang and Hongzhi Wang and Yang Wang and Hong Gao Similarity Join on XML Based on $k$-Generation Set Distance . . . . . . 124--135 Caiyun Yao and Jiaheng Lu and Wei Wang and Xiaofang Zhou XML Query Processing Using Views . . . . 136--139 Xia Li and Zhanhuai Li and PeiYing Wang and Qun Chen and Lijun Zhang and Ning Li XIO-SLCA: Optimize SLCA for Effective Keyword Search in XML Documents . . . . 140--149 Fahad Alahmari and Eric Pardede The Development of XML Stored Procedures in XML Enabled Databases . . . . . . . . 150--159 Jingjiao Li and Limei Sun and Jiao Wang A Slope One Collaborative Filtering Recommendation Algorithm Using Uncertain Neighbors Optimizing . . . . . . . . . . 160--166 Di He and Zhiyong Peng and Liang Hong and Yu Zhang A Social Reputation Management for Web Communities . . . . . . . . . . . . . . 167--174 Dongzhan Zhang and Chao Xu A Collaborative Filtering Recommendation System by Unifying User Similarity and Item Similarity . . . . . . . . . . . . 175--184 Rongrong Li and Weixiang Zhai and Zhiyong Peng Supporting Query over Dynamic Combination of Data Sources for Social Media . . . . . . . . . . . . . . . . . 185--196 Kaisong Song and Daling Wang and Shi Feng and Ge Yu Detecting Opinion Leader Dynamically in Chinese News Comments . . . . . . . . . 197--209 Daling Wang and Shi Feng and Chao Yan and Ge Yu An Approach of Semi-automatic Public Sentiment Analysis for Opinion and District . . . . . . . . . . . . . . . . 210--222 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Jeremy M. Wolfe The Rules of Guidance in Visual Search 1--10 N. K. Suryadevara and T. Quazi and Subhas C. Mukhopadhyay Smart Sensing System for Human Emotion and Behaviour Recognition . . . . . . . 11--22 Nikhil Ranjan Pal Fuzzy Rule-Based Approaches to Dimensionality Reduction . . . . . . . . 23--27 Osamu Yamaguchi Face Recognition Technology and Its Real-World Application . . . . . . . . . 28--34 Atanendu Sekhar Mandal Contextual Effects in the Visual Cortex Area 1 (V1) and Camouflage Perception 35--41 Dana Sugu and Amita Chatterjee Affective Information Processing and Representations . . . . . . . . . . . . 42--49 Rakesh S. and Kailash Atal and Ashish Arora and Pulak Purkait and Bhabatosh Chanda Face Image Retrieval Based on Probe Sketch Using SIFT Feature Descriptors 50--57 Asok Bandyopadhyay and Bhaswati Mukherjee and Bidyut Baran Chaudhuri Effect of Perceptual Anchorage Points on Recognition of Bangla Characters . . . . 58--65 Ashish Bakshi and Kuntal Ghosh Scaling Properties of Mach Bands and Perceptual Models . . . . . . . . . . . 66--74 Apurba Das and Suparna Parua Psycho-Visual Evaluation of Contrast Enhancement Algorithms by Adaptive Neuro-Fuzzy Inference System . . . . . . 75--83 Fumito Hamada and Edson T. Miyamoto Theory of Mind in Man-Machine Interactions . . . . . . . . . . . . . . 84--89 Naman Dauthal and Surya Prakash and Phalguni Gupta Face Recognition System Invariant to Light-Camera Setup . . . . . . . . . . . 90--97 Sarvesh Vishwakarma and Anupam Agrawal Representing Feature Quantization Approach Using Spatial-Temporal Relation for Action Recognition . . . . . . . . . 98--105 Siddharth S. Rautaray and Anand Kumar and Anupam Agrawal Human Computer Interaction with Hand Gestures in Virtual Environment . . . . 106--113 Amit Konar and Aruna Chakraborty and Anisha Halder and Rajshree Mandal and Ramadoss Janarthanan Interval Type-$2$ Fuzzy Model for Emotion Recognition from Facial Expression . . . . . . . . . . . . . . . 114--121 Nandini Bondale and Gaurav Gupta Augmenting Language Tools for Effective Communication . . . . . . . . . . . . . 122--128 Debmalya Sinha and Anupam Basu Design and Evaluation of a Cognition Aware File Browser for Users in Rural India . . . . . . . . . . . . . . . . . 129--136 Amit Singhal and Santanu Chaudhury and Sumantra Dutta Roy Shiksha: a Novel Architecture for Tele-teaching Using Handwriting as a Perceptually Significant Temporal Media 137--144 Chandrani Saha and Washef Ahmed and Soma Mitra A New Motion Based Fully Automatic Facial Expression Recognition System . . 145--154 Koichi Yoshida and Emiko Ishikawa and Maltesh Joshi and Hervé Lechat and Fatma Ayouni Profiling Scotch Malt Whisky Spirits from Different Distilleries Using an Electronic Nose and an Expert Sensory Panel . . . . . . . . . . . . . . . . . 155--162 Anonymous Front Matter . . . . . . . . . . . . . . ??
Raghunath Nambiar and Nicholas Wakou Shaping the Landscape of Industry Standard Benchmarks: Contributions of the Transaction Processing Performance Council (TPC) . . . . . . . . . . . . . 1--9 Florian Funke and Alfons Kemper Metrics for Measuring the Performance of the Mixed Workload CH-benCHmark . . . . 10--30 Daniel Schall and Volker Hoefner and Manuel Kern Towards an Enhanced Benchmark Advocating Energy-Efficient Systems . . . . . . . . 31--45 Umeshwar Dayal and Kevin Wilkinson Optimization of Analytic Data Flows for Next Generation Business Intelligence Applications . . . . . . . . . . . . . . 46--66 Anja Bog and Kai Sachs and Alexander Zeier Normalization in a Mixed OLTP and OLAP Workload Scenario . . . . . . . . . . . 67--82 Torsten Grabs Measuring Performance of Complex Event Processing Systems . . . . . . . . . . . 83--96 Karl Huppler Benchmarking with Your Head in the Cloud 97--110 Yantao Li and Charles Levine Extending TPC-E to Measure Availability in Database Systems . . . . . . . . . . 111--122 Robert Gottstein and Ilia Petrov SI-CV: Snapshot Isolation with Co-located Versions . . . . . . . . . . 123--136 Alain Crolotte and Ahmad Ghazal Introducing Skew into the TPC-H Benchmark . . . . . . . . . . . . . . . 137--145 Christina Delimitrou and Sriram Sankar Time and Cost-Efficient Modeling and Generation of Large-Scale TPCC/TPCE/TPCH Workloads . . . . . . . . . . . . . . . 146--162 Avrilia Floratou and Jignesh M. Patel When Free Is Not Really Free: What Does It Cost to Run a Database Workload in the Cloud? . . . . . . . . . . . . . . . 163--179 Jianhai Chen and Dawei Huang and Bei Wang A Fine-Grained Performance-Based Decision Model for Virtualization Application Solution . . . . . . . . . . 180--195 Meikel Poess and Tilmann Rabl and Michael Frank A PDGF Implementation for TPC-H . . . . 196--212 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Stéphane Bonneaud and Kevin Rio and Pierre Chevaillier and William H. Warren Accounting for Patterns of Collective Behavior in Crowd Locomotor Dynamics for Realistic Simulations . . . . . . . . . 1--11 Julien Valentin and Florent Coudret and Eric Gouard\`eres and Wilfrid Lefer Human Behaviour Modelling for Simulating Evacuation of Buildings on Fire . . . . 12--23 Lin Zhang and Qing Liu Application of Simulation and Virtual Reality to Physical Education and Athletic Training . . . . . . . . . . . 24--33 Wei Hua and Wenzhuo Yang and Zilong Dong and Guofeng Zhang Depth-Varying Human Video Sprite Synthesis . . . . . . . . . . . . . . . 34--47 Yejin Kim and Michael Neff Automating Expressive Locomotion Generation . . . . . . . . . . . . . . . 48--61 Wenshan Fan and Bin Wang and Bin Chan and Jean-Claude Paul and Jiaguang Sun Recovering Geometric Detail by Octree Normal Maps . . . . . . . . . . . . . . 62--73 Jianxin Luo and Guiqiang Ni and Ping Cui and Jinsong Jiang and Yifeng Duan and Guyu Hu Quad-Tree Atlas Ray Casting: a GPU Based Framework for Terrain Visualization and Its Applications . . . . . . . . . . . . 74--85 Shao-Shin Hung and Chih Ming Chiu and Tsou Tsun Fu and Jung-Tsung Chen and Derchian Tsaih Clustering Spatial Data for Aggregate Query Processing in Walkthrough: a Hypergraph Approach . . . . . . . . . . 86--98 Yujian Gao and Aimin Hao and Qinping Zhao Skin-Detached Surface for Interactive Large Mesh Editing . . . . . . . . . . . 99--109 Shiguang Liu and Tai An and Zheng Gong and Ichiro Hagiwara Physically Based Simulation of Solid Objects' Burning . . . . . . . . . . . . 110--120 Chao Wang and Yu Wu and Tingting Zhu and Hongbo Li and Mingliang Xu Tunneling Blasting Simulation for Digital Mine . . . . . . . . . . . . . . 121--128 Gustavo Aranda and Tomas Trescak and Marc Esteva and Inmaculada Rodriguez and Carlos Carrascosa Massively Multiplayer Online Games Developed with Agents . . . . . . . . . 129--138 Zhiying He and Xiaohui Liang and Qinping Zhao A Novel Skeletonization and Animation Approach for Point Models . . . . . . . 139--150 Xin Zhang and Zi'ang Ding and Chuan Zhu and Wei Chen and Qunsheng Peng View-Dependent Line Drawings for $3$D Scenes . . . . . . . . . . . . . . . . . 151--160 Nicolas Szilas and Monica Axelrad and Urs Richle Propositions for Innovative Forms of Digital Interactive Storytelling Based on Narrative Theories and Practices . . 161--179 Shengnan Chen and Zhigeng Pan and Mingmin Zhang A Virtual Informal Learning System for Cultural Heritage . . . . . . . . . . . 180--187 Xingquan Cai and Jie Li and Haiyan Sun and Jinhong Li Multi-samples Texture Synthesis for Dynamic Terrain Based on Constraint Conditions . . . . . . . . . . . . . . . 188--196 Zhicheng Liu and Zhijun Fang PCA and FLD in DWT Domain . . . . . . . 197--204 Shidu Dong and Xiaofan Yang and Huaqiu Wang and Xiang Liu and Hengyang Liu Area Measurement Method of Paint Bubble Based on Computer Vision . . . . . . . . 205--213 Xifan Shi and Xianghua Chen and Tiefeng Cai A High Precision Fresco Scanner . . . . 214--221 Anonymous Front Matter . . . . . . . . . . . . . . ??
Ahmed Bouajjani and Cezara Dr\uagoi Abstract Domains for Automated Reasoning about List-Manipulating Programs with Infinite Data . . . . . . . . . . . . . 1--22 Ranjit Jhala Software Verification with Liquid Types 23--23 Tobias Nipkow Teaching Semantics with a Proof Assistant: No More LSD Trip Proofs . . . 24--38 Aws Albarghouthi and Arie Gurfinkel Whale: An Interpolation-Based Algorithm for Inter-procedural Verification . . . 39--55 Samik Basu and Tevfik Bultan and Meriem Ouederni Synchronizability for Verification of Asynchronously Communicating Systems . . 56--71 Amir M. Ben-Amram and Samir Genaim On the Termination of Integer Loops . . 72--87 Laura Bozzelli and Sophie Pinchinat Verification of Gap-Order Constraint Abstractions of Counter Systems . . . . 88--103 Dmitry Bugaychenko On Application of Multi-Rooted Binary Decision Diagrams to Probabilistic Model Checking . . . . . . . . . . . . . . . . 104--118 Sagar Chaki and Arie Gurfinkel and Ofer Strichman Regression Verification for Multi-threaded Programs . . . . . . . . 119--135 Nathaniel Charlton and Ben Horsfall Crowfoot: a Verifier for Higher-Order Store Programs . . . . . . . . . . . . . 136--151 Krishnendu Chatterjee and Vishwanath Raman Synthesizing Protocols for Digital Contract Signing . . . . . . . . . . . . 152--168 Rayna Dimitrova and Bernd Finkbeiner Model Checking Information Flow in Reactive Systems . . . . . . . . . . . . 169--185 Evren Ermis and Jochen Hoenicke Splitting via Interpolants . . . . . . . 186--201 Pietro Ferrara and Peter Müller Automatic Inference of Access Permissions . . . . . . . . . . . . . . 202--218 Bernd Finkbeiner and Swen Jacobs Lazy Synthesis . . . . . . . . . . . . . 219--234 Khalil Ghorbal and Franjo Ivan\vci\'c Donut Domains: Efficient Non-convex Domains for Abstract Interpretation . . 235--250 Falk Howar and Bernhard Steffen and Bengt Jonsson Inferring Canonical Register Automata 251--266 Johannes Kinder and Dmitry Kravchenko Alternating Control Flow Reconstruction 267--282 Uri Klein and Nir Piterman and Amir Pnueli Effective Synthesis of Asynchronous Systems from GR(1) Specifications . . . 283--298 Woosuk Lee and Wonchan Lee and Kwangkeun Yi Sound Non-statistical Clustering of Static Analysis Alarms . . . . . . . . . 299--314 Anonymous Front Matter . . . . . . . . . . . . . . ??
Boon Thau Loo and Harjot Gill and Changbin Liu Recent Advances in Declarative Networking . . . . . . . . . . . . . . . 1--16 Don Stewart Make Things Now! Pragmatic Functional Programming in Haskell . . . . . . . . . 17--17 Mayer Goldberg and Guy Wiener A Declarative Approach for Software Modeling . . . . . . . . . . . . . . . . 18--32 Sergio Antoy and Michael Hanus Contracts and Specifications for Functional Logic Programming . . . . . . 33--47 Pedro M. Martins and Julie A. McCann The Environment as an Argument . . . . . 48--62 Yuliya Lierler and Shaden Smith Weighted-Sequence Problem: ASP vs CASP and Declarative vs Problem-Oriented Solving . . . . . . . . . . . . . . . . 63--77 Marcello Balduccini and Yulia Lierler Practical and Methodological Aspects of the Use of Cutting-Edge ASP Tools . . . 78--92 Christian Theil Have and Henning Christiansen Efficient Tabling of Structured Data Using Indexing and Program Transformation . . . . . . . . . . . . . 93--107 Dario Campagna and Beata Sarna-Starosta Optimizing Inequality Joins in Datalog with Approximated Constraint Propagation 108--122 Elvira Albert and Puri Arenas Symbolic Execution of Concurrent Objects in CLP . . . . . . . . . . . . . . . . . 123--137 Pablo Chico de Guzmán and Amadeo Casas A Segment-Swapping Approach for Executing Trapped Computations . . . . . 138--152 Michael Lesniak Palovca: Describing and Executing Graph Algorithms in Haskell . . . . . . . . . 153--167 Kenny Q. Zhu and Kathleen Fisher and David Walker LearnPADS$^{++}$: Incremental Inference of Ad Hoc Data Formats . . . . . . . . . 168--182 Jeroen Bransen and Arie Middelkoop The Kennedy--Warren Algorithm Revisited: Ordering Attribute Grammars . . . . . . 183--197 Nicholas Coleman Distributed Policy Specification and Interpretation with Classified Advertisements . . . . . . . . . . . . . 198--211 Andy Gill and Bowe Neuenschwander Handshaking in Kansas Lava Using Patch Logic . . . . . . . . . . . . . . . . . 212--226 Daniel Winograd-Cort and Hai Liu and Paul Hudak Virtualizing Real-World Objects in FRP 227--241 Edwin Brady and Kevin Hammond Resource-Safe Systems Programming with Embedded Domain Specific Languages . . . 242--257 David Broman and Henrik Nilsson Node-Based Connection Semantics for Equation-Based Object-Oriented Modeling Languages . . . . . . . . . . . . . . . 258--272 Paul Tarau A Declarative Specification of Tree-Based Symbolic Arithmetic Computations . . . . . . . . . . . . . . 273--288 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Aminul Haque and Saadat M. Alhashmi and Rajendran Parthiban An Inspiration for Solving Grid Resource Management Problems Using Multiple Economic Models . . . . . . . . . . . . 1--16 Melanie Siebenhaar and The An Binh Nguyen and Ulrich Lampe and Dieter Schuller and Ralf Steinmetz Concurrent Negotiations in Cloud-Based Systems . . . . . . . . . . . . . . . . 17--31 Joris Roovers and Kurt Vanmechelen and Jan Broeckhove A Reverse Auction Market for Cloud Resources . . . . . . . . . . . . . . . 32--45 Mohammad Mahdi Kashef and Jörn Altmann A Cost Model for Hybrid Clouds . . . . . 46--60 Hristo Stefanov and Slinger Jansen and Ronald Batenburg and Eugene van Heusden and Ravi Khadka How to Do Successful Chargeback for Cloud Services . . . . . . . . . . . . . 61--75 Andreas Menychtas and Sergio Garcia Gomez and Andrea Giessmann and Anna Gatzioura A Marketplace Framework for Trading Cloud-Based Services . . . . . . . . . . 76--89 Mario Macías and Jordi Guitart Client Classification Policies for SLA Negotiation and Allocation in Shared Cloud Datacenters . . . . . . . . . . . 90--104 Wei Zheng and Rizos Sakellariou Budget-Deadline Constrained Workflow Planning for Admission Control in Market-Oriented Environments . . . . . . 105--119 Wubin Li and Johan Tordsson and Erik Elmroth Virtual Machine Placement for Predictable and Time-Constrained Peak Loads . . . . . . . . . . . . . . . . . 120--134 Ioan Petri and Omer F. Rana and Yacine Regzui and Gheorghe Cosmin Silaghi Risk Assessment in Service Provider Communities . . . . . . . . . . . . . . 135--147 Jörn Künsemöller and Holger Karl A Game-Theoretical Approach to the Benefits of Cloud Computing . . . . . . 148--160 Shubhashis Sengupta and K. M. Annervaz Planning for Optimal Multi-site Data Distribution for Disaster Recovery . . . 161--172 Wei Shi and Dapeng Ju and Dongsheng Wang Saga: a Cost Efficient File System Based on Cloud Storage Service . . . . . . . . 173--184 A. Stephen McGough Developing a Cost-Effective Virtual Cluster on the Cloud . . . . . . . . . . 185--197 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Dominique Méry and Neeraj Kumar Singh Medical Protocol Diagnosis Using Formal Methods . . . . . . . . . . . . . . . . 1--20 Jim Davies and Jeremy Gibbons and Radu Calinescu and Charles Crichton and Steve Harris and Andrew Tsui Form Follows Function . . . . . . . . . 21--38 Thomas Hildebrandt and Raghava Rao Mukkamala and Tijs Slaats Declarative Modelling and Safe Distribution of Healthcare Workflows . . 39--56 Cristiano Bertolini and Martin Schäf and Volker Stolz Towards a Formal Integrated Model of Collaborative Healthcare Workflows . . . 57--74 Wendy MacCaull and Fazle Rabbi NOVA Workflow: a Workflow Management Tool Targeting Health Services Delivery 75--92 Jozef Hooman and Robert Huis in 't Veld and Mathijs Schuts Experiences with a Compositional Model Checker in the Healthcare Domain . . . . 93--110 Fazle Rabbi and Ahmed Shah Mashiyat and Wendy MacCaull Model Checking Workflow Monitors and Its Application to a Pain Management Process 111--128 Deshendran Moodley and Anban W. Pillay and Christopher J. Seebregts Position Paper: Researching and Developing Open Architectures for National Health Information Systems in Developing African Countries . . . . . . 129--139 Dominique Méry and Neeraj Kumar Singh Formalization of Heart Models Based on the Conduction of Electrical Impulses and Cellular Automata . . . . . . . . . 140--159 Hao Xu and Tom Maibaum An Event-B Approach to Timing Issues Applied to the Generic Insulin Infusion Pump . . . . . . . . . . . . . . . . . . 160--176 Jens H. Weber-Jahnke and Fieran Mason-Blakley On the Safety of Electronic Medical Records . . . . . . . . . . . . . . . . 177--194 Naipeng Dong and Hugo Jonker and Jun Pang Challenges in eHealth: From Enabling to Enforcing Privacy . . . . . . . . . . . 195--206 Samuel Tusubira Kalyango and Gilbert Maiga A Technique for Strengthening Weak Passwords in Electronic Medical Record Systems . . . . . . . . . . . . . . . . 207--224 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Wolfgang Paul Cyber War, Formal Verification and Certified Infrastructure . . . . . . . . 1--1 Paolo Herms and Claude Marché and Benjamin Monate A Certified Multi-prover Verification Condition Generator . . . . . . . . . . 2--17 Sabine Schmaltz and Andrey Shadrin Integrated Semantics of Intermediate-Language C and Macro-Assembler for Pervasive Formal Verification of Operating Systems and Hypervisors from VerisoftXT . . . . . . 18--33 Gregory Kulczycki and Hampton Smith The Location Linking Concept: a Basis for Verification of Code Using Pointers 34--49 Nadia Polikarpova and Micha\l Moskal Verifying Implementations of Security Protocols by Refinement . . . . . . . . 50--65 Thomas Wies and Marco Muñiz and Viktor Kuncak Deciding Functional Lists with Sublist Sets . . . . . . . . . . . . . . . . . . 66--81 K. Rustan and M. Leino Developing Verified Programs with Dafny 82--82 Jean-Christophe Filliâtre Verifying Two Lines of C with Why3: An Exercise in Program Verification . . . . 83--97 Milena Vujo\vsevi\'c-Jani\vci\'c and Viktor Kuncak Development and Evaluation of LAV: An SMT-Based Error Finding Platform . . . . 98--113 Martin Brain and Florian Schanda A Lightweight Technique for Distributed and Incremental Program Verification . . 114--129 Loren Segal and Patrice Chalin A Comparison of Intermediate Verification Languages: Boogie and Sireum/Pilar . . . . . . . . . . . . . . 130--145 Florian Merz and Stephan Falke LLBMC: Bounded Model Checking of C and C++ Programs Using a Compiler IR . . . . 146--161 Rupak Majumdar The Marriage of Exploration and Deduction . . . . . . . . . . . . . . . 162--162 Nguyen Van Tang and Daisuke Souma Modeling and Validating the Train Fare Calculation and Adjustment System Using VDM++ . . . . . . . . . . . . . . . . . 163--178 Hannes Mehnert and Filip Sieczkowski Formalized Verification of Snapshotable Trees: Separation and Sharing . . . . . 179--195 Ioannis T. Kassios and Peter Müller Comparing Verification Condition Generation with Symbolic Execution: An Experience Report . . . . . . . . . . . 196--208 Eyad Alkassar and Ernie Cohen and Mikhail Kovalev Verification of TLB Virtualization Implemented in C . . . . . . . . . . . . 209--224 Amalinda Post and Jochen Hoenicke Formalization and Analysis of Real-Time Requirements: a Feasibility Study at BOSCH . . . . . . . . . . . . . . . . . 225--240 Francesco Logozzo Our Experience with the CodeContracts Static Checker . . . . . . . . . . . . . 241--242 Abderrahmane Feliachi and Marie-Claude Gaudel Isabelle/Circus: a Process Specification and Verification Environment . . . . . . 243--260 Anonymous Front Matter . . . . . . . . . . . . . . ??
Thomas Eiter and Thomas Krennwallner and Patrik Schneider and Guohui Xiao Uniform Evaluation of Nonmonotonic DL-Programs . . . . . . . . . . . . . . 1--22 Thomas Schwentick Foundations of XML Based on Logic and Automata: a Snapshot . . . . . . . . . . 23--33 Ofer Arieli and Anna Zamansky Inconsistency-Tolerance in Knowledge-Based Systems by Dissimilarities . . . . . . . . . . . . 34--50 Joachim Biskup and Cornelia Tadros Revising Belief without Revealing Secrets . . . . . . . . . . . . . . . . 51--70 Jürgen Bock and Sebastian Rudolph and Michael Mutter More Than the Sum of Its Parts --- Holistic Ontology Alignment by Population-Based Optimisation . . . . . 71--90 Luciano Caroprese and Ester Zumpano Handling Preferences in P2P Systems . . 91--106 Andrea Cohen and Alejandro J. García and Guillermo R. Simari Backing and Undercutting in Abstract Argumentation Frameworks . . . . . . . . 107--123 George H. L. Fletcher and Marc Gyssens and Dirk Leinders and Jan Van den Bussche and Dirk Van Gucht The Impact of Transitive Closure on the Boolean Expressiveness of Navigational Query Languages on Graphs . . . . . . . 124--143 Eve Garnaud and Sofian Maabout and Mohamed Mosbah Using Functional Dependencies for Reducing the Size of a Data Cube . . . . 144--163 Sven Hartmann and Henning Köhler and Sebastian Link and Bernhard Thalheim Armstrong Databases and Reasoning for Functional Dependencies and Cardinality Constraints over Partial Bags . . . . . 164--183 Stephen J. Hegner FD Covers and Universal Complements of Simple Projections . . . . . . . . . . . 184--202 Gyula O. H. Katona and Krisztián Tichler Encoding Databases Satisfying a Given Set of Dependencies . . . . . . . . . . 203--223 Annika Krämer and Christoph Beierle On Lifted Inference for a Relational Probabilistic Conditional Logic with Maximum Entropy Semantics . . . . . . . 224--243 András J. Molnár and András A. Benczúr and Csaba István Sidló Flexible and Efficient Distributed Resolution of Large Entities . . . . . . 244--263 Aleksandar Perovi\'c and Dragan Doder and Zoran Ognjanovi\'c On Real-Valued Evaluation of Propositional Formulas . . . . . . . . . 264--277 Olivier Pivert and Henri Prade Detecting Suspect Answers in the Presence of Inconsistent Information . . 278--297 Krishnan Rajagopalan and Venkatesh Srinivasan and Alex Thomo Learning the News in Social Networks . . 298--311 Abdur Rakib and Rokan Uddin Faruqui and Wendy MacCaull Verifying Resource Requirements for Ontology-Driven Rule-Based Agents . . . 312--331 Martín Rezk and Michael Kifer Formalizing Production Systems with Rule-Based Ontologies . . . . . . . . . 332--351 Domenico Sacc\`a and Edoardo Serra and Antonella Guzzo Count Constraints and the Inverse OLAP Problem: Definition, Complexity and a Step toward Aggregate Data Exchange . . 352--369 Anonymous Front Matter . . . . . . . . . . . . . . ??
N. Asokan and Cynthia Kuo Usable Mobile Security . . . . . . . . . 1--6 Dusko Pavlovic and Catherine Meadows Actor-Network Procedures . . . . . . . . 7--26 Yoram Moses Knowledge as a Window into Distributed Coordination . . . . . . . . . . . . . . 27--34 Lynne E. Parker Decision Making as Optimization in Multi-robot Teams . . . . . . . . . . . 35--49 Nibedita Adhikari and C. R. Tripathy Mstar: a New Two Level Interconnection Network . . . . . . . . . . . . . . . . 50--61 C. Anudeep and Manik Lal Das An Improved Scheme for False Data Filtering in Wireless Sensor Networks 62--70 Jhansi Vazram Bolla and Valli Kumari Vatsavayi Anonymity and Security in Mobile Ad Hoc Networks . . . . . . . . . . . . . . . . 71--82 Ayan Dutta and Sruti Gan Chaudhuri Circle Formation by Asynchronous Fat Robots with Limited Visibility . . . . . 83--93 V. Geetha and N. Sreenath High Concurrency for Continuously Evolving OODBMS . . . . . . . . . . . . 94--105 J. Hanumanthappa and D. H. Manjaiah A New Scheme for IPv6 BD-TTCS Translator 106--116 Shankara Narayanan Krishna Nash Equilibrium in Weighted Concurrent Timed Games with Reachability Objectives 117--128 Tarun Kumar and Parikshit Sondhi and Ankush Mittal Parallelization of PageRank on Multicore Processors . . . . . . . . . . . . . . . 129--140 Chun-Guang Ma and Ding Wang and Qi-Ming Zhang Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme . . . . . . . . . . . . . . . . . 141--152 Hrushikesha Mohanty An Algebra of Social Distance . . . . . 153--165 Anil Mundra and Anish Mathuria and Manik Lal Das Detecting Flaws in Dynamic Hierarchical Key Management Schemes Using Specification Animation . . . . . . . . 166--176 Bhawani S. Panda and D. Pushparaj Shetty Strong Minimum Energy Minimum Interference Topology in Wireless Sensor Networks . . . . . . . . . . . . . . . . 177--187 Arun Pande and Sanjay Kimbahune Distributed Processing and Internet Technology to Solve Challenges of Primary Healthcare in India . . . . . . 188--199 Nidhi Patel and Sanjay Srivastava Packet Forwarding Strategies for Cooperation Enforcement in Mobile Ad Hoc Wireless Networks . . . . . . . . . . . 200--211 R. S. M. Lakshmi Patibandla A Study on Scalability of Services and Privacy Issues in Cloud Computing . . . 212--230 Chhavi Rana and Sanjay Kumar Jain A Recommendation Model for Handling Dynamics in User Profile . . . . . . . . 231--241 Anonymous Front Matter . . . . . . . . . . . . . . ??
Beniamino Di Martino and Dana Petcu CCPI 2011: Workshop on Cloud Computing Projects and Initiatives . . . . . . . . 1--3 Magdalena Slawinska and Jaroslaw Slawinski and Vaidy Sunderam Towards Cross-Platform Cloud Computing 5--14 Giuseppe Cicotti and Luigi Coppolino and Rosario Cristaldi and Salvatore D'Antonio and Luigi Romano QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach . . . . 15--24 Daniele Lezzi and Roger Rafanell and Abel Carrión and Ignacio Blanquer Espert and Vicente Hernández Enabling e-Science Applications on the Cloud with COMPSs . . . . . . . . . . . 25--34 Spyridon V. Gogouvitis and George Kousiouris and George Vafiadis and Elliot K. Kolodner OPTIMIS and VISION Cloud: How to Manage Data in Clouds . . . . . . . . . . . . . 35--44 Roberto Palmieri and Pierangelo di Sanzo and Francesco Quaglia and Paolo Romano Integrated Monitoring of Infrastructures and Applications in Cloud Environments 45--53 Siegfried Benkner and Jesus Bisbal and Gerhard Engelbrecht and Rod D. Hose and Yuriy Kaniovskyi Towards Collaborative Data Management in the VPH-Share Project . . . . . . . . . 54--63 Matti Heikkurinen and Owen Appleton SLM and SDM Challenges in Federated Infrastructures . . . . . . . . . . . . 64--72 Houssam Haitof Rapid Prototyping of Architectures on the Cloud Using Semantic Resource Description . . . . . . . . . . . . . . 73--82 Teodor-Florin Forti\cs and Gorka Esnal Lopez and Imanol Padillo Cruz and Gábor Ferschl and Tamás Máhr Cloud Patterns for mOSAIC-Enabled Scientific Applications . . . . . . . . 83--93 A. Cuomo and M. Rak and S. Venticinque and U. Villano Enhancing an Autonomic Cloud Architecture with Mobile Agents . . . . 94--103 Yih Leong Sun and Terence Harmer and Alan Stewart and Peter Wright Mapping Application Requirements to Cloud Resources . . . . . . . . . . . . 104--112 Marco Danelutto and Frédéric Desprez and Vladimir Getov and Wolfgang Ziegler CoreGRID/ERCIM Workshop on Grids, Clouds and P2P Computing --- CGWS2011 . . . . . 113--114 Françoise Baude A Perspective on the CoreGRID Grid Component Model . . . . . . . . . . . . 115--116 Cristian Klein and Christian Pérez Towards Scheduling Evolving Applications 117--127 Marco Danelutto and P. Kilpatrick and C. Montangero and L. Semini Model Checking Support for Conflict Resolution in Multiple Non-functional Concern Management . . . . . . . . . . . 128--138 Carlo Bertolli and Gabriele Mencagli and Marco Vanneschi Consistent Rollback Protocols for Autonomic ASSISTANT Applications . . . . 139--148 Dominik Meiländer and Alexander Ploss and Frank Glinka and Sergei Gorlatch A Dynamic Resource Management System for Real-Time Online Applications on Clouds 149--158 Emanuele Carlini and Massimo Coppola and Patrizio Dazzi and Laura Ricci and Giacomo Righetti Cloud Federations in Contrail . . . . . 159--168 Muhammad Junaid Malik and Thomas Fahringer and Radu Prodan Semi-automatic Composition of Ontologies for ASKALON Grid Workflows . . . . . . . 169--180 Vilmos Rajcsányi and Zsolt Németh The Chemical Machine: an Interpreter for the Higher Order Chemical Language . . . 181--190 Carlo Bertolli and Adam Betts and Gihan Mudalige and Mike Giles and Paul Kelly Design and Performance of the OP2 Library for Unstructured Mesh Applications . . . . . . . . . . . . . . 191--200 Raja Tlili and Yahya Slimani Mining Association Rules on Grid Platforms . . . . . . . . . . . . . . . 201--210 Stephen L. Scott and Geoffroy Vallée and Thomas Naughton 5th Workshop on System-Level Virtualization for High Performance Computing (HPCVirt 2011) . . . . . . . . 211--211 Qasim Ali and Vladimir Kiriansky and Josh Simons and Puneet Zaroo Performance Evaluation of HPC Benchmarks on VMware's ESXi Server . . . . . . . . 213--222 Benjamin Serebrin and Daniel Hecht Virtualizing Performance Counters . . . 223--233 Thomas Naughton and Geoffroy Vallée and Christian Engelmann and Stephen L. Scott A Case for Virtual Machine Based Fault Injection in a High-Performance Computing Environment . . . . . . . . . 234--243 Martti Forsell and Jesper Larsson Träff HPPC 2010: 5th Workshop on Highly Parallel Processing on a Chip . . . . . 245--247 Fuat Keceli and Tali Moreshet and Uzi Vishkin Thermal Management of a Many-Core Processor under Fine-Grained Parallelism 249--259 Paul Keir and Paul W. Cockshott and Andrew Richards Mainstream Parallel Array Programming on Cell . . . . . . . . . . . . . . . . . . 260--269 Richard Membarth and Anton Lokhmotov and Jürgen Teich Generating GPU Code from a High-Level Representation for Image Processing Kernels . . . . . . . . . . . . . . . . 270--280 Thomas Canhao Xu and Pasi Liljeberg and Hannu Tenhunen A Greedy Heuristic Approximation Scheduling Algorithm for $3$D Multicore Processors . . . . . . . . . . . . . . . 281--291 Stefania Corsaro and Pasqua D'Ambra and Francesca Perla Algorithms and Programming Tools for Next-Generation High-Performance Scientific Software HPSS 2011 . . . . . 293--294 Iain S. Duff European Exascale Software Initiative: Numerical Libraries, Solvers and Algorithms . . . . . . . . . . . . . . . 295--304 Hasan Metin Aktulga and Chao Yang and Ümit V. Çatalyürek and Pieter Maris and James P. Vary On Reducing I/O Overheads in Large-Scale Invariant Subspace Projections . . . . . 305--314 Chris Baker and Erik Boman and Mike Heroux and Eric Keiter and Siva Rajamanickam and Rich Schiek Enabling Next-Generation Parallel Circuit Simulation with Trilinos . . . . 315--323 Martin Berzins and Qingyu Meng and John Schmidt and James C. Sutherland DAG-Based Software Frameworks for PDEs 324--333 Kamer Kaya and François-Henry Rouet and Bora Uçar On Partitioning Problems with Complex Objectives . . . . . . . . . . . . . . . 334--344 Ichitaro Yamazaki and Kesheng Wu A Communication-Avoiding Thick-Restart Lanczos Method on a Distributed-Memory System . . . . . . . . . . . . . . . . . 345--354 Ioan Ovidiu Hupca and Joel Falcou and Laura Grigori and Radek Stompor Spherical Harmonic Transform with GPUs 355--366 Davide Barbieri and Valeria Cardellini and Salvatore Filippone and Damian Rouson Design Patterns for Scientific Computations on Sparse Matrices . . . . 367--376 Hans Henrik Brandenborg Sòrensen High-Performance Matrix-Vector Multiplication on the GPU . . . . . . . 377--386 Jens Gustedt and Emmanuel Jeanvoine Relaxed Synchronization with Ordered Read-Write Locks . . . . . . . . . . . . 387--397 Ernesto E. Prudencio and Karl W. Schulz The Parallel C++ Statistical Library `QUESO': Quantification of Uncertainty for Estimation, Simulation and Optimization . . . . . . . . . . . . . . 398--407 Jan Dünnweber and Valentin Mihaylov and René Glettler and Volker Maiborn and Holger Wolff Use of HPC-Techniques for Large-Scale Data Migration . . . . . . . . . . . . . 408--415 George Bosilca Algorithms, Models and Tools for Parallel Computing on Heterogeneous Platforms (HeteroPar 2011) . . . . . . . 417--417 Jean-Marc Nicod and Laurent Philippe and Lamiel Toch A Genetic Algorithm with Communication Costs to Schedule Workflows on a SOA-Grid . . . . . . . . . . . . . . . . 419--428 Jinpil Lee and Minh Tuan Tran and Tetsuya Odajima and Taisuke Boku and Mitsuhisa Sato An Extension of XcalableMP PGAS Lanaguage for Multi-node GPU Clusters 429--439 Hamid Arabnejad and Jorge G. Barbosa Performance Evaluation of List Based Scheduling on Heterogeneous Systems . . 440--449 David Clarke and Alexey Lastovetsky and Vladimir Rychkov Column-Based Matrix Partitioning for Parallel Matrix Multiplication on Heterogeneous Processors Based on Functional Performance Models . . . . . 450--459 Gennaro Cordasco and Rosario De Chiara and Ada Mancuso and Dario Mazzeo and Vittorio Scarano A Framework for Distributing Agent-Based Simulations . . . . . . . . . . . . . . 460--470 Jacques M. Bahi and Raphaël Couturier and Lilia Ziane Khodja Parallel Sparse Linear Solver GMRES for GPU Clusters with Compression of Exchanged Data . . . . . . . . . . . . . 471--480 Marek B\la\.zewicz and Mi\losz Ci\.znicki and Piotr Kopta and Krzysztof Kurowski and Pawe\l Lichocki Two-Dimensional Discrete Wavelet Transform on Large Images for Hybrid Computing Architectures: GPU and CELL 481--490 Aleksandar Ilic and Leonel Sousa Scheduling Divisible Loads on Heterogeneous Desktop Systems with Limited Memory . . . . . . . . . . . . . 491--501 Ma. Guadalupe Sánchez and Vicente Vidal and Jordi Bataller Peer Group and Fuzzy Metric to Remove Noise in Images Using Heterogeneous Computing . . . . . . . . . . . . . . . 502--510 Girish Nandagudi and Jaspal Subhlok and Edgar Gabriel and Judit Gimenez Estimation of MPI Application Performance on Volunteer Environments 511--520 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Mario Cannataro HiBB 2011: $ 2^{\rm nd} $ Workshop on High Performance Bioinformatics and Biomedicine . . . . . . . . . . . . . . 1--2 Marco Aldinucci and Mario Coppo and Ferruccio Damiani and Maurizio Drocco and Eva Sciacca On Parallelizing On-Line Statistics for Stochastic Biological Simulations . . . 3--12 Astrid Rheinländer and Ulf Leser Scalable Sequence Similarity Search and Join in Main Memory on Multi-cores . . . 13--22 Gaurang Mehta and Ewa Deelman and James A. Knowles and Ting Chen and Ying Wang and Jens Vöckler Enabling Data and Compute Intensive Workflows in Bioinformatics . . . . . . 23--32 Luigi Grasso and Nuria Medina-Medina and Rosana Montes-Soldado and María M. Abad-Grau Homogenizing Access to Highly Time-Consuming Biomedical Applications through a Web-Based Interface . . . . . 33--42 Mario Cannataro and Pietro Hiram Guzzi Distributed Management and Analysis of Omics Data . . . . . . . . . . . . . . . 43--52 Thomas Schaaf and Adam S. Z. Belloum and Owen Appleton and Joan Serrat-Fernández Managing and Delivering Grid Services (MDGS) . . . . . . . . . . . . . . . . . 53--53 Gilles Mathieu and Hél\`ene Cordier Resource Allocation for the French National Grid Initiative . . . . . . . . 55--63 Tomasz Szepieniec and Joanna Kocot and Thomas Schaaf and Owen Appleton and Matti Heikkurinen On Importance of Service Level Management in Grids . . . . . . . . . . 64--75 Bartosz Balis and Renata Slota and Jacek Kitowski and Marian Bubak On-Line Monitoring of Service-Level Agreements in the Grid . . . . . . . . . 76--85 Dana Petcu Challenges of Future e-Infrastructure Governance . . . . . . . . . . . . . . . 86--95 Antonella Galizia and Alfonso Quarati and Michael Schiffers and Mark Yampolskiy Influences between Performance Based Scheduling and Service Level Agreements 96--105 Massimiliano Rak and Rocco Aversa and Salvatore Venticinque and Beniamino Di Martino User Centric Service Level Management in mOSAIC Applications . . . . . . . . . . 106--115 Reginald Cushing and Spiros Koulouzis and Rudolf Strijkers and Adam S. Z. Belloum and Marian Bubak Service Level Management for Executable Papers . . . . . . . . . . . . . . . . . 116--123 Silvia Knittl and Thomas Schaaf and Ilya Saverchenko Change Management in e-Infrastructures to Support Service Level Agreements . . 124--133 Michael Gerndt PROPER 2011: Fourth Workshop on Productivity and Performance Tools for HPC Application Development . . . . . . 135--135 Olaf Krzikalla and Kim Feldhoff and Ralph Müller-Pfefferkorn and Wolfgang E. Nagel Scout: a Source-to-Source Transformator for SIMD-Optimizations . . . . . . . . . 137--145 Yury Oleynik and Michael Gerndt Scalable Automatic Performance Analysis on IBM BlueGene/P Systems . . . . . . . 146--155 Wyatt Spear and Allen D. Malony and Chee Wai Lee and Scott Biersdorff and Sameer Shende An Approach to Creating Performance Visualizations in a Parallel Profile Analysis Tool . . . . . . . . . . . . . 156--165 N. Dandapanthula and H. Subramoni and J. Vienne and K. Kandalla and S. Sur and Dhabaleswar K. Panda INAM --- a Scalable InfiniBand Network Analysis and Monitoring Tool . . . . . . 166--177 Ananta Tiwari and Michael A. Laurenzano and Laura Carrington and Allan Snavely Auto-tuning for Energy Usage in Scientific Applications . . . . . . . . 178--187 Pasquale Cantiello and Beniamino Di Martino Automatic Source Code Transformation for GPUs Based on Program Comprehension . . 188--197 Christian Iwainsky and Ralph Altenfeld and Dieter an Mey and Christian Bischof Enhancing Brainware Productivity through a Performance Tuning Workflow . . . . . 198--207 Stephen L. Scott and Chokchai (Box) Leangsuksun Workshop on Resiliency in High Performance Computing (Resilience) in Clusters, Clouds, and Grids . . . . . . 209--209 Patricia Kovatch and Matthew Ezell and Ryan Braby The Malthusian Catastrophe Is Upon Us! Are the Largest HPC Machines Ever Up? 211--220 Rolf Riesen and Kurt B. Ferreira and Maria Ruiz Varela and Michela Taufer and Arun Rodrigues Simulating Application Resilience at Exascale . . . . . . . . . . . . . . . . 221--230 J. Brandt and F. Chen and A. Gentile and Chokchai (Box) Leangsuksun and J. Mayo and P. Pebay and D. Roe Framework for Enabling System Understanding . . . . . . . . . . . . . 231--240 Patrick G. Bridges and Mark Hoemmen and Kurt B. Ferreira and Michael A. Heroux and Philip Soltero Cooperative Application/OS DRAM Fault Recovery . . . . . . . . . . . . . . . . 241--250 David Fiala and Kurt B. Ferreira and Frank Mueller and Christian Engelmann A Tunable, Software-Based DRAM Error Detection and Correction Library for HPC 251--261 José Carlos Sancho and Ana Jokanovic and Jesus Labarta Reducing the Impact of Soft Errors on Fabric-Based Collective Communications 262--271 Zhe Ma and Trevor Carlson and Wim Heirman and Lieven Eeckhout Evaluating Application Vulnerability to Soft Errors in Multi-level Cache Hierarchy . . . . . . . . . . . . . . . 272--281 Nathan DeBardeleben and Sean Blanchard and Qiang Guan and Ziming Zhang and Song Fu Experimental Framework for Injecting Logic Errors in a Virtual Machine to Profile Applications for Soft Error Resilience . . . . . . . . . . . . . . . 282--291 Thanadech Thanakornworakij and Rajan Sharma and Blaine Scroggs and Chokchai (Box) Leangsuksun High Availability on Cloud with HA-OSCAR 292--301 Dewan Ibtesham and Dorian Arnold and Kurt B. Ferreira and Patrick G. Bridges On the Viability of Checkpoint Compression for Extreme Scale Fault Tolerance . . . . . . . . . . . . . . . 302--311 Raghunath Rajachandrasekar and Xiangyong Ouyang and Xavier Besseron and Vilobh Meshram Can Checkpoint/Restart Mechanisms Benefit from Hierarchical Data Staging? 312--321 Xavier Besseron and Thierry Gautier Impact of Over-Decomposition on Coordinated Checkpoint/Rollback Protocol 322--332 Anders Hast and Josef Weidendorfer and Jan-Philipp Weiss UCHPC 2011: Fourth Workshop on UnConventional High Performance Computing . . . . . . . . . . . . . . . 333--334 Tetsuro Horikawa and Michio Honda and Jin Nakazawa and Kazunori Takashio and Hideyuki Tokuda PACUE: Processor Allocator Considering User Experience . . . . . . . . . . . . 335--344 Alin Murara\csu and Josef Weidendorfer and Arndt Bode Workload Balancing on Heterogeneous Systems: a Case Study of Sparse Grid Interpolation . . . . . . . . . . . . . 345--354 Tristan Cabel and Joseph Charles and Stéphane Lanteri Performance Evaluation of a Multi-GPU Enabled Finite Element Method for Computational Electromagnetics . . . . . 355--364 Thomas Canhao Xu and Pasi Liljeberg and Hannu Tenhunen Study of Hierarchical $N$-Body Methods for Network-on-Chip Architectures . . . 365--374 Alexander Heinecke and Michael Klemm and Dirk Pflüger and Arndt Bode and Hans-Joachim Bungartz Extending a Highly Parallel Data Mining Algorithm to the Intel$^{{\textregistered }}$ Many Integrated Core Architecture . . . . . . 375--384 Michael Alexander and Gianluigi Zanetti VHPC 2011: 6th Workshop on Virtualization in High-Performance Cloud Computing . . . . . . . . . . . . . . . 385--385 Sangwook Kim and Hwanju Kim and Joonwon Lee Group-Based Memory Deduplication for Virtualized Clouds . . . . . . . . . . . 387--397 Anastassios Nanos and Nikos Nikoleris and Stratos Psomadakis and Elisavet Kozyri A Smart HPC Interconnect for Clusters of Virtual Machines . . . . . . . . . . . . 398--406 Dimitris Aragiorgis and Anastassios Nanos and Nectarios Koziris Coexisting Scheduling Policies Boosting I/O Virtual Machines . . . . . . . . . . 407--415 J. Briffaut and E. Lefebvre and J. Rouzaud-Cornabas and C. Toinard PIGA-Virt: an Advanced Distributed MAC Protection of Virtual Systems . . . . . 416--425 Stefania Costache and Nikos Parlavantzas and Christine Morin and Samuel Kortas An Economic Approach for Application QoS Management in Clouds . . . . . . . . . . 426--435 Piotr Luszczek and Eric Meek and Shirley Moore and Dan Terpstra and Vincent M. Weaver Evaluation of the HPC Challenge Benchmarks in Virtualized Environments 436--445 Adrien L\`ebre and Paolo Anedda and Massimo Gaggero and Flavien Quesnel DISCOVERY, Beyond the Clouds . . . . . . 446--456 Flavien Quesnel and Adrien L\`ebre Cooperative Dynamic Scheduling of Virtual Machines in Distributed Systems 457--466 Romeo Kienzler and Rémy Bruggmann and Anand Ranganathan and Nesime Tatbul Large-Scale DNA Sequence Analysis in the Cloud: a Stream-Based Approach . . . . . 467--476 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Peter Widmayer Combinatorial Optimization with Noisy Inputs: How Can We Separate the Wheat from the Chaff? . . . . . . . . . . . . 1--1 Kazuo Iwama Approximability of Stable Matching Problems . . . . . . . . . . . . . . . . 2--2 Sue Whitesides On Three-Dimensional Graph Drawing and Embedding . . . . . . . . . . . . . . . 3--4 Takeaki Uno and Ryuhei Uehara and Shin-ichi Nakano Bounding the Number of Reduced Trees, Cographs, and Series-Parallel Graphs by Compression . . . . . . . . . . . . . . 5--16 R. Krithika and N. S. Narayanaswamy Generalized Above Guarantee Vertex Cover and $r$-Partization . . . . . . . . . . 17--27 Sang Won Bae and Kyung-Yong Chwa Farthest Voronoi Diagrams under Travel Time Metrics . . . . . . . . . . . . . . 28--39 Sang Won Bae Tight Bound for Farthest-Color Voronoi Diagrams of Line Segments . . . . . . . 40--51 Ananda Swarup Das and Prosenjit Gupta and Anil Kishore Kalavagattu and Jatin Agarwal Range Aggregate Maximal Points in the Plane . . . . . . . . . . . . . . . . . 52--63 Trivikram Dokka and Anastasia Kouvela and Frits C. R. Spieksma Approximating the Multi-level Bottleneck Assignment Problem . . . . . . . . . . . 64--75 Nicolas Boria and Jérôme Monnot and Vangelis Th. Paschos Reoptimization of the Maximum Weighted $ P_k $-Free Subgraph Problem under Vertex Insertion . . . . . . . . . . . . . . . 76--87 Franz J. Brandenburg and Andreas Gleißner and Andreas Hofmeier Comparing and Aggregating Partial Orders with Kendall Tau Distances . . . . . . . 88--99 Biing-Feng Wang and Jhih-Hong Ye and Pei-Jung Chen On the Round-Trip $1$-Center and $1$-Median Problems . . . . . . . . . . 100--111 Sammi Abida Salma and Md. Saidur Rahman Triangle-Free Outerplanar $3$-Graphs Are Pairwise Compatibility Graphs . . . . . 112--123 Tiziana Calamoneri and Rossella Petreschi and Blerina Sinaimeri On Relaxing the Constraints in Pairwise Compatibility Graphs . . . . . . . . . . 124--135 Md. Iqbal Hossain and Debajyoti Mondal and Md. Saidur Rahman and Sammi Abida Salma Universal Line-Sets for Drawing Planar $3$-Trees . . . . . . . . . . . . . . . 136--147 Stephane Durocher and Debajyoti Mondal On the Hardness of Point-Set Embeddability . . . . . . . . . . . . . 148--159 Tanaeem M. Moosa and Sumaiya Nazeen and M. Sohel Rahman and Rezwana Reaz Linear Time Inference of Strings from Cover Arrays Using a Binary Alphabet . . 160--172 Amr Elmasry and Jyrki Katajainen Fat Heaps without Regular Counters . . . 173--185 Martin Fink and Jan-Henrik Haunert and Tamara Mchedlidze and Joachim Spoerhase and Alexander Wolff Drawing Graphs with Vertices at Specified Positions and Crossings at Large Angles . . . . . . . . . . . . . . 186--197 Christian Bachmaier and Marco Matzeder Drawing Unordered Trees on $k$-Grids . . 198--210 Anonymous Front Matter . . . . . . . . . . . . . . ??
Stefan Unterschütz and Christian Renner and Volker Turau Opportunistic, Receiver-Initiated Data-Collection Protocol . . . . . . . . 1--16 Philipp Hurni and Ulrich Bürgi and Markus Anwander and Torsten Braun TCP Performance Optimizations for Wireless Sensor Networks . . . . . . . . 17--32 Marek Klonowski and Kamil Wolny Immune Size Approximation Algorithms in Ad Hoc Radio Network . . . . . . . . . . 33--48 Peng Wang and Chinya Ravishankar Foisting and Stealing of Keys in Sensor Networks . . . . . . . . . . . . . . . . 49--64 Ilias Leontiadis and Christos Efstratiou and Cecilia Mascolo and Jon Crowcroft SenShare: Transforming Sensor Networks into Multi-application Sensing Infrastructures . . . . . . . . . . . . 65--81 Christian Haas and Joachim Wilke and Viktor Stöhr Realistic Simulation of Energy Consumption in Wireless Sensor Networks 82--97 JeongGil Ko and Kevin Klues and Christian Richter and Wanja Hofer and Branislav Kusy Low Power or High Performance? A Tradeoff Whose Time Has Come (and Nearly Gone) . . . . . . . . . . . . . . . . . 98--114 Lanny Sitanayah and Kenneth N. Brown and Cormac J. Sreenan Fault-Tolerant Relay Deployment Based on Length-Constrained Connectivity and Rerouting Centrality in Wireless Sensor Networks . . . . . . . . . . . . . . . . 115--130 Hossein Fotouhi and Marco Zuniga and Mário Alves and Anis Koubaa and Pedro Marrón Smart-HOP: a Reliable Handoff Mechanism for Mobile Wireless Sensor Networks . . 131--146 Flavio Fabbri and Marco Zuniga and Daniele Puccinelli and Pedro Marrón On the Optimal Blacklisting Threshold for Link Selection in Wireless Sensor Networks . . . . . . . . . . . . . . . . 147--162 Paolo Pettinato and Niklas Wirström and Joakim Eriksson and Thiemo Voigt Multi-channel Two-Way Time of Flight Sensor Network Ranging . . . . . . . . . 163--178 Bernhard Buchli and Felix Sutton and Jan Beutel GPS-Equipped Wireless Sensor Network Node for High-Accuracy Positioning Applications . . . . . . . . . . . . . . 179--195 Daniele Alessandrelli and Andrea Azzar\`a and Matteo Petracca and Christian Nastasi and Paolo Pagano ScanTraffic: Smart Camera Network for Traffic Information Collection . . . . . 196--211 Andrey Somov and Christine C. Ho and Roberto Passerone and James W. Evans and Paul K. Wright Towards Extending Sensor Node Lifetime with Printed Supercapacitors . . . . . . 212--227 David Hasenfratz and Olga Saukh and Lothar Thiele On-the-Fly Calibration of Low-Cost Gas Sensors . . . . . . . . . . . . . . . . 228--244 Andrey Somov and Alexander Baranov and Alexey Savkin and Mikhail Ivanov and Lucia Calliari Energy-Aware Gas Sensing Using Wireless Sensor Networks . . . . . . . . . . . . 245--260 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Guillaume Barbu and Philippe Hoogvorst Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused 1--13 Kristian Beckers and Stephan Faßbender Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches . . . . . . . . . . . . . . . 14--21 Peter T. Breuer and Jonathan P. Bowen Typed Assembler for a RISC Crypto-Processor . . . . . . . . . . . . 22--29 Matteo Maria Casalino and Henrik Plate Transversal Policy Conflict Detection 30--37 Samson Gejibo and Federico Mancini Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings 38--45 Máté Kovács and Helmut Seidl Runtime Enforcement of Information Flow Security in Tree Manipulating Processes 46--59 Massimiliano Masi and Rosario Pugliese Formalisation and Implementation of the XACML Access Control Mechanism . . . . . 60--74 Francisco Moyano and Carmen Fernandez-Gago A Task Ordering Approach for Automatic Trust Establishment . . . . . . . . . . 75--88 Viet Hung Nguyen and Fabio Massacci An Idea of an Independent Validation of Vulnerability Discovery Models . . . . . 89--96 Martín Ochoa and Jan Jürjens and Daniel Warzecha A Sound Decision Procedure for the Compositionality of Secrecy . . . . . . 97--105 Rahul Potharaju and Andrew Newell Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques 106--120 Mehrdad Saadatmand and Antonio Cicchetti Design of Adaptive Security Mechanisms for Real-Time Embedded Systems . . . . . 121--134 George Stergiopoulos and Bill Tsoumas Hunting Application-Level Logical Errors 135--142 Huafei Zhu and Hong Xiao Optimal Trust Mining and Computing on Keyed MapReduce . . . . . . . . . . . . 143--150 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Solomon Marcus The Art of Reaching the Age of Sixty . . 1--19 Hermann Maurer Calude as Father of One of the Computer Science Journals . . . . . . . . . . . . 20--30 Laurent Bienvenu and Alexander Shen Random Semicomputable Reals Revisited 31--45 Douglas S. Bridges and Luminita S. V\^\i\ct\ua Constructing the Infimum of Two Projections . . . . . . . . . . . . . . 46--58 Paul Brodhead and Rod Downey and Keng Meng Ng Bounded Randomness . . . . . . . . . . . 59--70 Cezar Câmpeanu A Note on Blum Static Complexity Measures . . . . . . . . . . . . . . . . 71--80 Michael J. Dinneen A Program-Size Complexity Measure for Mathematical Problems and Conjectures 81--93 Monica Dumitrescu On Degrees of Randomness and Genetic Randomness . . . . . . . . . . . . . . . 94--104 R\=usi\cn\vs Freivalds Hartmanis--Stearns Conjecture on Real Time and Transcendence . . . . . . . . . 105--119 Ziyuan Gao and Frank Stephan and Guohua Wu and Akihiro Yamamoto Learning Families of Closed Sets in Matroids . . . . . . . . . . . . . . . . 120--139 Helmut Jürgensen Invariance and Universality of Complexity . . . . . . . . . . . . . . . 140--158 Antonín Ku\vcera and André Nies Demuth's Path to Randomness . . . . . . 159--173 Yuri I. Manin A Computability Challenge: Asymptotic Bounds for Error-Correcting Codes . . . 174--182 Jacques Patarin Some Transfinite Generalisations of Gödel's Incompleteness Theorem . . . . . 183--193 Ludwig Staiger On Oscillation-Free Chaitin $h$-Random Sequences . . . . . . . . . . . . . . . 194--202 Kohtaro Tadaki Phase Transition between Unidirectionality and Bidirectionality 203--223 Hector Zenil Computer Runtimes and the Length of Proofs . . . . . . . . . . . . . . . . . 224--240 Marius Zimand Symmetry of Information: a Closer Look 241--246 Gregory Chaitin How Much Information Can There Be in a Real Number? . . . . . . . . . . . . . . 247--251 S. Barry Cooper Mathematics, Metaphysics and the Multiverse . . . . . . . . . . . . . . . 252--267 Anonymous Front Matter . . . . . . . . . . . . . . ??
Arne Ansper Designing a Governmental Backbone . . . 1--3 Priit Vinkel Internet Voting in Estonia . . . . . . . 4--12 Hakem Beitollahi and Geert Deconinck A Ring Based Onion Circuit for Hidden Services . . . . . . . . . . . . . . . . 13--30 Károly Boda and Ádám Máté Földes and Gábor György Gulyás and Sándor Imre User Tracking on the Web via Cross-Browser Fingerprinting . . . . . . 31--46 Mathias Claes and Vincent van der Leest and An Braeken Comparison of SRAM and FF PUF in 65nm Technology . . . . . . . . . . . . . . . 47--64 Jordi Cucurull and Simin Nadjm-Tehrani and Massimiliano Raciti Modular Anomaly Detection for Smartphone Ad Hoc Communication . . . . . . . . . . 65--81 Jérôme Dossogne and Frédéric Lafitte Mental Voting Booths . . . . . . . . . . 82--97 Kazutomo Hamamoto and Yasuyuki Tahara and Akihiko Ohsuga Methods for Privacy Protection Considering Status of Service Provider and User Community . . . . . . . . . . . 98--113 Kirsi Helkala and Nils Kalstad Svendsen The Security and Memorability of Passwords Generated by Using an Association Element and a Personal Factor . . . . . . . . . . . . . . . . . 114--130 Elahe Kani-Zabihi and Martin Helmhout Increasing Service Users' Privacy Awareness by Introducing On-Line Interactive Privacy Features . . . . . . 131--148 Frédérick Lemay and Raphaël Khoury and Nadia Tawbi Optimized Inlining of Runtime Monitors 149--161 Radu Lupu and Eugen Borcoci and Tinku Rasheed Identity-Based Key Derivation Method for Low Delay Inter-domain Handover Re-authentication Service . . . . . . . 162--175 Veelasha Moonsamy and Ronghua Tian and Lynn Batten Feature Reduction to Speed Up Malware Classification . . . . . . . . . . . . . 176--188 Assem Nazar and Mark M. Seeger and Harald Baier Rooting Android --- Extending the ADB by an Auto-connecting WiFi-Accessible Service . . . . . . . . . . . . . . . . 189--204 Jaydip Sen and Subhamoy Maitra An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks . . . . . . . . . . . . . . . . 205--222 Deian Stefan and Alejandro Russo and David Mazi\`eres and John C. Mitchell Disjunction Category Labels . . . . . . 223--239 Inger Anne Tòndel Visualization Control for Event-Based Public Display Systems Used in a Hospital Setting . . . . . . . . . . . . 240--255 Erich Wenger and Michael Hutter Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations . . . . . . . . . . . . 256--271 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Eike Best and Philippe Darondeau Petri Net Distributability . . . . . . . 1--18 Roberto Bruni and Hernán Melgratti and Ugo Montanari Connector Algebras, Petri Nets, and BIP 19--38 Peter Buneman Models of Provenance . . . . . . . . . . 39--39 Rupak Majumdar End-to-End Guarantees in Embedded Control Systems . . . . . . . . . . . . 40--40 Andreas Zeller Mining Precise Specifications . . . . . 41--41 Thomas Baar and Philipp Kumar Detecting Entry Points in Java Libraries 42--54 Michael Beyer and Sabine Glesner Static Analysis of Run-Time Modes in Synchronous Process Network . . . . . . 55--67 Elena Bozhenkova Compositional Methods in Characterization of Timed Event Structures . . . . . . . . . . . . . . . 68--76 Rafael Caballero and Yolanda García-Ruiz Algorithmic Debugging of SQL Views . . . 77--85 Roman Dubtsov Timed Transition Systems with Independence and Marked Scott Domains: An Adjunction . . . . . . . . . . . . . 86--94 Michael A. H. Fried and Anna Fensel An Extensible System for Enhancing Social Conference Experience . . . . . . 95--110 Natalia O. Garanina Exponential Acceleration of Model Checking for Perfect Recall Systems . . 111--124 Robert Glück Bootstrapping Compiler Generators from Partial Evaluators . . . . . . . . . . . 125--141 Natalya S. Gribovskaya A Logic Characteristic for Timed Extensions of Partial Order Based Equivalences . . . . . . . . . . . . . . 142--152 Geoff W. Hamilton and Neil D. Jones Proving the Correctness of Unfold/Fold Program Transformations Using Bisimulation . . . . . . . . . . . . . . 153--169 Mauro Jaskelioff and Alejandro Russo Secure Multi-execution in Haskell . . . 170--178 Alexey Khoroshilov and Vadim Mutilin and Eugene Novikov Towards an Open Framework for C Verification Tools Benchmarking . . . . 179--192 Andrei V. Klimov Solving Coverability Problem for Monotonic Counter Systems by Supercompilation . . . . . . . . . . . . 193--209 Ilya Klyuchnikov and Sergei A. Romanenko Multi-result Supercompilation as Branching Growth of the Penultimate Level in Metasystem Transitions . . . . 210--226 Jens Knoop and Laura Kovács and Jakob Zwirchmayr Symbolic Loop Bound Computation for WCET Analysis . . . . . . . . . . . . . . . . 227--242 Anonymous Front Matter . . . . . . . . . . . . . . ??
Yutaka Kawai and Noboru Kunihiro Secret Handshake Scheme with Request-Based-Revealing . . . . . . . . 1--16 Kristian Gjòsteen and Òystein Thuen Password-Based Signatures . . . . . . . 17--33 Jean Lancrenon and Roland Gillard Isolating Partial Information of Indistinguishable Encryptions . . . . . 34--48 Haitham S. Al-Sinani and Chris J. Mitchell A Universal Client-Based Identity Management Tool . . . . . . . . . . . . 49--74 Mark Stegelmann and Dogan Kesdogan Design and Evaluation of a Privacy-Preserving Architecture for Vehicle-to-Grid Interaction . . . . . . 75--90 Ton van Deursen and Sa\vsa Radomirovi\'c Insider Attacks and Privacy of RFID Protocols . . . . . . . . . . . . . . . 91--105 Flavio D. Garcia and Eric R. Verheul and Bart Jacobs Cell-Based Roadpricing . . . . . . . . . 106--122 Olivier Pereira Ballot Aggregation and Mixnet Based Open-Audit Elections . . . . . . . . . . 123--127 Peter Gutmann PKI as Part of an Integrated Risk Management Strategy for Web Security . . 128--146 Gauthier Van Damme and Nicolas Luyckx and Karel Wouters A PKI-Based Mobile Banking Demonstrator 147--158 Moez Ben M'Barka and Julien P. Stern Certification Validation: Back to the Past . . . . . . . . . . . . . . . . . . 159--175 Johannes Winter and Kurt Dietrich A Hijacker's Guide to the LPC Bus . . . 176--193 An Braeken and Antonio De La Piedro and Karel Wouters Secure Event Logging in Sensor Networks 194--208 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Klaus Jansen Approximation Algorithms for Scheduling and Packing Problems . . . . . . . . . . 1--8 Zeev Nutov Approximating Subset $k$-Connectivity Problems . . . . . . . . . . . . . . . . 9--20 Sebastián Marbán and Cyriel Rutten and Tjark Vredeveld Learning in Stochastic Machine Scheduling . . . . . . . . . . . . . . . 21--34 Wolfgang Bein and Naoki Hatta and Nelson Hernandez-Cons An Online Algorithm Optimally Self-tuning to Congestion for Power Management Problems . . . . . . . . . . 35--48 Cristina Bazgan and Laurent Gourv\`es and Jérôme Monnot Single Approximation for Biobjective Max TSP . . . . . . . . . . . . . . . . . . 49--62 Ljiljana Brankovic and Henning Fernau Parameterized Approximation Algorithms for Hitting Set . . . . . . . . . . . . 63--76 Nadine Schwartges and Joachim Spoerhase Approximation Algorithms for the Maximum Leaf Spanning Tree Problem on Acyclic Digraphs . . . . . . . . . . . . . . . . 77--88 Kai-Simon Goetzmann and Sebastian Stiller Optimization over Integers with Robustness in Cost and Few Constraints 89--101 Tomá\vs Ebenlendr and Ji\vrí Sgall A Lower Bound on Deterministic Online Algorithms for Scheduling on Related Machines without Preemption . . . . . . 102--108 Klaus Jansen and Christina Robenek Scheduling Jobs on Identical and Uniform Processors Revisited . . . . . . . . . . 109--122 David B. Shmoys and Gwen Spencer Approximation Algorithms for Fragmenting a Graph against a Stochastically-Located Threat . . . . . . . . . . . . . . . . . 123--136 Jianqiao Zhu and Ho-Leung Chan and Tak-Wah Lam Non-clairvoyant Weighted Flow Time Scheduling on Different Multi-processor Models . . . . . . . . . . . . . . . . . 137--149 Reza Dorrigiv and Alejandro López-Ortiz A New Perspective on List Update: Probabilistic Locality and Working Set 150--163 Gerth Stòlting Brodal and Gabriel Moruz OnlineMin: a Fast Strongly Competitive Randomized Paging Algorithm . . . . . . 164--175 Katarzyna Paluch Faster and Simpler Approximation of Stable Matchings . . . . . . . . . . . . 176--187 Anke van Zuylen Simpler $ 3 / 4 $-Approximation Algorithms for MAX SAT . . . . . . . . . 188--197 Marc P. Renault and Adi Rosén On Online Algorithms with Advice for the $k$-Server Problem . . . . . . . . . . . 198--210 Rolf Harren and Walter Kern Improved Lower Bound for Online Strip Packing . . . . . . . . . . . . . . . . 211--218 Yishay Mansour and Boaz Patt-Shamir and Dror Rawitz Competitive Router Scheduling with Structured Data . . . . . . . . . . . . 219--232 Cristina Bazgan and Laurent Gourv\`es and Jérôme Monnot Approximation with a Fixed Number of Solutions of Some Biobjective Maximization Problems . . . . . . . . . 233--246 Anonymous Front Matter . . . . . . . . . . . . . . ??
Holger Bock Axelsen Time Complexity of Tape Reduction for Reversible Turing Machines . . . . . . . 1--13 Tetsuo Yokoyama and Holger Bock Axelsen and Robert Glück Towards a Reversible Functional Language 14--29 Michael Kirkedal Thomsen and Holger Bock Axelsen and Robert Glück A Reversible Processor Architecture and Its Reversible Logic Design . . . . . . 30--42 Md. Mazder Rahman and Gerhard W. Dueck and Anindita Banerjee Optimization of Reversible Circuits Using Reconfigured Templates . . . . . . 43--53 Claudio Moraga Hybrid $ {\rm GF}(2) $--Boolean Expressions \ldots for Quantum Computing Circuits . . . . . . . . . . . . . . . . 54--63 Mathias Soeken and Stefan Frehse and Robert Wille and Rolf Drechsler RevKit: An Open Source Toolkit for the Design of Reversible Circuits . . . . . 64--76 Zahra Sasanian and D. Michael Miller Transforming MCT Circuits to NCVW Circuits . . . . . . . . . . . . . . . . 77--88 Atsushi Matsuo and Shigeru Yamashita Changing the Gate Order for Optimal LNN Conversion . . . . . . . . . . . . . . . 89--101 Stéphane Burignat and Mariusz Olczak and Micha\l Klimczak and Alexis De Vos Towards the Limits of Cascaded Reversible (Quantum-Inspired) Circuits 102--111 Stéphane Burignat and Michael Kirkedal Thomsen and Micha\l Klimczak Interfacing Reversible Pass-Transistor CMOS Chips with Conventional Restoring CMOS Circuits . . . . . . . . . . . . . 112--122 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Ebisa Negeri and Nico Baken Distributed Storage Management Using Dynamic Pricing in a Self-Organized Energy Community . . . . . . . . . . . . 1--12 Laurent Paquereau and Bjarne E. Helvik Ant-Based Systems for Wireless Networks: Retrospect and Prospects . . . . . . . . 13--23 Tiziano Squartini and Diego Garlaschelli Triadic Motifs and Dyadic Self-Organization in the World Trade Network . . . . . . . . . . . . . . . . 24--35 Dalibor \vStys and Petr Jizba and \vSt\vepán Papá\vcek and Tomá\vs Náhlík and Petr Císa\vr On Measurement of Internal Variables of Complex Self-Organized Systems and Their Relation to Multifractal Spectra . . . . 36--47 Holger Prothmann and Sven Tomforde and Johannes Lyda and Jürgen Branke and Jörg Hähner Self-Organised Routing for Road Networks 48--59 Hanna Kavalionak and Alberto Montresor P2P and Cloud: a Marriage of Convenience for Replica Management . . . . . . . . . 60--71 Dharani Punithan and R. I. (Bob) McKay Self-Organizing Spatio-temporal Pattern Formation in Two-Dimensional Daisyworld 72--83 Muntasir Al-Asfoor and Brendan Neville and Maria Fasli Heuristic Resource Search in a Self-Organised Distributed Multi Agent System . . . . . . . . . . . . . . . . . 84--89 Georgi Yordanov Georgiev A Quantitative Measure, Mechanism and Attractor for Self-Organization in Networked Complex Systems . . . . . . . 90--95 Efrat Blumenfeld-Lieberthal and Juval Portugali MetroNet: a Metropolitan Simulation Model Based on Commuting Processes . . . 96--103 Alexander Gogolev and Christian Bettstetter Robustness of Self-Organizing Consensus Algorithms: Initial Results from a Simulation-Based Study . . . . . . . . . 104--108 Stephen M. Majercik Initial Experiments in Using Communication Swarms to Improve the Performance of Swarm Systems . . . . . . 109--114 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Joerg Evermann and Ivan Porres Doctoral Symposium at MoDELS 2011 . . . 1--3 Henning Agt Supporting Software Language Engineering by Automated Domain Knowledge Acquisition . . . . . . . . . . . . . . 4--11 Muhammad Atif Qureshi Interoperability of Software Engineering Metamodels . . . . . . . . . . . . . . . 12--19 Marion Brandsteidl and Andreas Winter Software Modeling in Education: The 7th Educators' Symposium at MoDELS 2011 . . 20--24 Dan Chiorean and Vladiela Petra\cscu and Ileana Ober Using Constraints in Teaching Software Modeling . . . . . . . . . . . . . . . . 25--39 Jon Whittle and John Hutchinson Mismatches between Industry Practice and Teaching of Model-Driven Software Development . . . . . . . . . . . . . . 40--47 Òystein Haugen VARY --- Variability for You . . . . . . 48--52 Andreas Svendsen and Xiaorui Zhang and Òystein Haugen and Birger Mòller-Pedersen Towards Evolution of Generic Variability Models . . . . . . . . . . . . . . . . . 53--67 Mohammad Abu-Matar and Hassan Gomaa Feature-Based Variability Meta-modeling for Service-Oriented Product Lines . . . 68--82 Vasco Amaral and Cécile Hardebolle and Hans Vangheluwe and László Lengyel and Peter Bunus Summary of the Workshop on Multi-Paradigm Modelling: Concepts and Tools . . . . . . . . . . . . . . . . . 83--88 Antonio Cicchetti and Federico Ciccozzi and Thomas Leveque Supporting Incremental Synchronization in Hybrid Multi-view Modelling . . . . . 89--103 Frédéric Boulanger and Ayman Dogui and Cécile Hardebolle and Christophe Jacquet Semantic Adaptation Using CCSL Clock Constraints . . . . . . . . . . . . . . 104--118 Michel R. V. Chaudron and Marcela Genero and Silvia Abrahão and Parastoo Mohagheghi and Lars Pareto Summary of the First International Workshop on Experiences and Empirical Studies in Software Modelling . . . . . 119--122 Stefan Zugal and Jakob Pinggera and Barbara Weber and Jan Mendling and Hajo A. Reijers Assessing the Impact of Hierarchy on Model Understandability --- a Cognitive Perspective . . . . . . . . . . . . . . 123--133 Ana M. Fernández-Sáez and Marcela Genero and Michel R. V. Chaudron Does the Level of Detail of UML Models Affect the Maintainability of Source Code? . . . . . . . . . . . . . . . . . 134--148 Nelly Bencomo and Gordon Blair and Robert France and Betty H. C. Cheng and Cédric Jeanneret Summary of the $ 6^{\rm th} $ International Workshop on [email protected] . . . . . . . . . . . . 149--151 Carlo Ghezzi and Andrea Mocci and Mario Sangiorgio Runtime Monitoring of Functional Component Changes with Behavior Models 152--166 Thomas Vogel and Holger Giese Requirements and Assessment of Languages and Frameworks for Adaptation Models . . 167--182 Levi Lúcio and Stephan Weißleder and Frédéric Fondement and Harald Cichos MoDeVVa 2011 Workshop Summary . . . . . 183--186 Andreas Svendsen and Òystein Haugen and Birger Mòller-Pedersen Specifying a Testing Oracle for Train Stations --- Going beyond with Product Line Technology . . . . . . . . . . . . 187--201 Anonymous Front Matter . . . . . . . . . . . . . . ??
Junichi Hashimoto and Akihiro Kishimoto and Kazuki Yoshizoe Accelerated UCT and Its Application to Two-Player Games . . . . . . . . . . . . 1--12 Gabriel Van Eyck and Martin Müller Revisiting Move Groups in Monte--Carlo Tree Search . . . . . . . . . . . . . . 13--23 Petr Baudi\vs and Jean-loup Gailly PACHI: State of the Art Open Source Go Program . . . . . . . . . . . . . . . . 24--38 Hendrik Baier and Mark H. M. Winands Time Management for Monte--Carlo Tree Search in Go . . . . . . . . . . . . . . 39--51 Richard J. Lorentz An MCTS Program to Play EinStein Würfelt Nicht! . . . . . . . . . . . . . . . . . 52--59 Jan A. Stankiewicz and Mark H. M. Winands Monte--Carlo Tree Search Enhancements for Havannah . . . . . . . . . . . . . . 60--71 J. (Pim) A. M. Nijssen and Mark H. M. Winands Playout Search for Monte--Carlo Tree Search in Multi-player Games . . . . . . 72--83 Cheng-Wei Chou and Ping-Chiang Chou and Hassen Doghmen Towards a Solution of 7x7 Go with Meta-MCTS . . . . . . . . . . . . . . . 84--95 Bruno Bouzy and Marc Métivier and Damien Pellier MCTS Experiments on the Voronoi Game . . 96--107 Jiao Wang and Shiyuan Li and Jitong Chen and Xin Wei and Huizhan Lv 4*4-Pattern and Bayesian Learning in Monte--Carlo Go . . . . . . . . . . . . 108--120 I-Chen Wu and Hsin-Ti Tsai and Hung-Hsuan Lin and Yi-Shan Lin Temporal Difference Learning for Connect6 . . . . . . . . . . . . . . . . 121--133 Nikolaos Papahristou and Ioannis Refanidis Improving Temporal Difference Learning Performance in Backgammon Variants . . . 134--145 Rémi Coulom CLOP: Confident Local Optimization for Noisy Black-Box Parameter Tuning . . . . 146--157 Tomoyuki Kaneko and Kunihito Hoki Analysis of Evaluation-Function Learning by Comparison of Sibling Nodes . . . . . 158--169 Todd W. Neller and Steven Hnath Approximating Optimal Dudo Play with Fixed-Strategy Iteration Counterfactual Regret Minimization . . . . . . . . . . 170--183 Kunihito Hoki and Tomoyuki Kaneko The Global Landscape of Objective Functions for the Optimization of Shogi Piece Values with a Game-Tree Search . . 184--195 Abdallah Saffidine and Nicolas Jouandeau and Tristan Cazenave Solving breakthrough with Race Patterns and Job-Level Proof Number Search . . . 196--207 Yoshiaki Yamaguchi and Kazunori Yamaguchi and Tetsuro Tanaka Infinite Connect-Four Is Solved: Draw 208--219 Henry Brausen and Ryan B. Hayward and Martin Müller and Abdul Qadir Blunder Cost in Go and Hex . . . . . . . 220--229 Kenneth W. Regan and Bartlomiej Macieja and Guy McC. Haworth Understanding Distributions of Chess Performances . . . . . . . . . . . . . . 230--243 Anonymous Front Matter . . . . . . . . . . . . . . ??
Wiebe van der Hoek Control and Delegation . . . . . . . . . 1--2 Louise A. Dennis Plan Indexing for State-Based Plans . . 3--15 Michael Winikoff An Integrated Formal Framework for Reasoning about Goal Interactions . . . 16--32 Shahriar Bijani and David Robertson and David Aspinall Probing Attacks on Multi-Agent Systems Using Electronic Institutions . . . . . 33--50 Akìn Günay and Pìnar Yolum Detecting Conflicts in Commitments . . . 51--66 Tran Cao Son and Enrico Pontelli and Chiaki Sakama Formalizing Commitments Using Action Languages . . . . . . . . . . . . . . . 67--83 David Robertson Lightweight Coordination Calculus for Agent Systems: Retrospective and Prospective . . . . . . . . . . . . . . 84--89 Amit K. Chopra and Munindar P. Singh The Evolution of Interoperability . . . 90--94 Viviana Mascardi and Davide Ancona 1000 Years of Coo-BDI . . . . . . . . . 95--101 Andrés García-Camino and Juan-Antonio Rodríguez-Aguilar and Carles Sierra A Distributed Architecture for Norm-Aware Agent Societies: a Retrospective . . . . . . . . . . . . . 102--110 Álvaro F. Moreira and Renata Vieira and Rafael H. Bordini Speech-Act Based Communication: Progress in the Formal Semantics and in the Implementation of Multi-agent Oriented Programming Languages . . . . . . . . . 111--116 Nicoletta Fornara and Marco Colombetti Specifying and Enforcing Norms in Artificial Institutions: a Retrospective Review . . . . . . . . . . . . . . . . . 117--119 Paolo Torroni and Federico Chesani and Paola Mello and Marco Montali A Retrospective on the Reactive Event Calculus and Commitment Modeling Language . . . . . . . . . . . . . . . . 120--127 David Corsar and Alison Chorley and Wamberto W. Vasconcelos Web Service Composition via Organisation-Based (Re)Planning . . . . 128--148 Rafael H. Bordini Agent and Multi-Agent Software Engineering: Modelling, Programming, and Verification . . . . . . . . . . . . . . 149--151 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Bjòrnar Solhaug and Ketil Stòlen Uncertainty, Subjectivity, Trust and Risk: How It All Fits together . . . . . 1--5 Audun Jòsang Trust Extortion on the Internet . . . . 6--21 Carsten Rudolph Trust Areas: a Security Paradigm for the Future Internet . . . . . . . . . . . . 22--27 Stephen Marsh and Sylvie Noël and Tim Storer and Yao Wang Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security . . . . . . . . . . . . . . . . 28--39 Jamie Morgenstern and Deepak Garg and Frank Pfenning A Proof-Carrying File System with Revocable and Use-Once Certificates . . 40--55 Valerio Genovese and Deepak Garg New Modalities for Access Control Logics: Permission, Control and Ratification . . . . . . . . . . . . . . 56--71 Neyire Deniz Sarier Security Notions of Biometric Remote Authentication Revisited . . . . . . . . 72--89 Sascha Müller and Stefan Katzenbeisser Hiding the Policy in Cryptographic Access Control . . . . . . . . . . . . . 90--105 Klaus Rechert and Benjamin Greschbach Location Privacy in Relation to Trusted Peers . . . . . . . . . . . . . . . . . 106--121 Wojciech Jamroga and Sjouke Mauw and Matthijs Melissen Fairness in Non-Repudiation Protocols 122--139 Liang Chen and Jason Crampton Risk-Aware Role-Based Access Control . . 140--156 Alessandro Armando and Silvio Ranise Automated Analysis of Infinite State Workflows with Access Control Policies 157--174 Henrich C. Pöhls and Focke Höhne The Role of Data Integrity in EU Digital Signature Legislation --- Achieving Statutory Trust for Sanitizable Signature Schemes . . . . . . . . . . . 175--192 Ulrich Greveler and Benjamin Justus and Dennis Löhr Mutual Remote Attestation: Enabling System Cloning for TPM Based Platforms 193--206 Pablo Najera and Rodrigo Roman and Javier Lopez Secure Architecure for the Integration of RFID and Sensors in Personal Networks 207--222 Syed Sadiqur Rahman and Sadie Creese and Michael Goldsmith Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources . . . . . . . . . . . . . . . . 223--238 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Chitralekha Gupta and Preeti Rao Objective Assessment of Ornamentation in Indian Classical Singing . . . . . . . . 1--25 Moujhuri Patra and Soubhik Chakraborty and Dipak Ghosh Optimized Neural Architecture for Time Series Prediction Using Raga Notes . . . 26--33 Sankalp Gulati and Vishweshwara Rao and Preeti Rao Meter Detection from Audio for Indian Music . . . . . . . . . . . . . . . . . 34--43 Shashi Bhushan Singh and Soubhik Chakraborty and Keashav Mohan Jha Assessment of Level of Recovery of Cognitive Impairment in the Cerebrovascular Accident and Head Injuries Cases: Therapeutic Impact of North Indian Ragas . . . . . . . . . . . 44--52 Matthias Braeunig and Ranjan Sengupta and Anirban Patranabis On Tanpura Drone and Brain Electrical Correlates . . . . . . . . . . . . . . . 53--65 Jun Wu and Shigeki Sagayama Musical Instrument Identification Based on New Boosting Algorithm with Probabilistic Decisions . . . . . . . . 66--78 Kristoffer Jensen Music Genre Classification Using an Auditory Memory Model . . . . . . . . . 79--88 Yago de Quay Interactive Music 3.0: Empowering People to Participate Musically Inside Nightclubs . . . . . . . . . . . . . . . 89--97 Joe Cheri Ross and John Samuel Hierarchical Clustering of Music Database Based on HMM and Markov Chain for Search Efficiency . . . . . . . . . 98--103 Ryan Stables and Cham Athwal and Jamie Bullock Fundamental Frequency Modulation in Singing Voice Synthesis . . . . . . . . 104--119 Kristian Nymoen and Jim Torresen and Rolf Inge Godòy and Alexander Refsum Jensenius A Statistical Approach to Analyzing Sound Tracings . . . . . . . . . . . . . 120--145 Thibaud Necciari and Peter Balazs and Richard Kronland-Martinet and Sòlvi Ystad and Bernhard Laback Auditory Time-Frequency Masking: Psychoacoustical Data and Application to Audio Representations . . . . . . . . . 146--171 Mitsuko Aramaki and Richard Kronland-Martinet and Sòlvi Ystad Perceptual Control of Environmental Sound Synthesis . . . . . . . . . . . . 172--186 Utpal Bhattacharjee Recognition of Assamese Phonemes Using RNN Based Recognizer . . . . . . . . . . 187--196 Asoke Kumar Datta and Arup Saha A System for Analysis of Large Scale Speech Data for the Development of Rules of Intonation for Speech Synthesis . . . 197--206 Sanghamitra Mohanty and Basanta Kumar Swain Adaptive and Iterative Wiener Filter for Oriya Speech Processing Applications . . 207--214 Asoke Kumar Datta and Bhaswati Mukherjee On the Role of Formants in Cognition of Vowels and Place of Articulation of Plosives . . . . . . . . . . . . . . . . 215--234 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Viviana Bono and Sara Capecchi and Ilaria Castellani A Reputation System for Multirole Sessions . . . . . . . . . . . . . . . . 1--24 Tzu-Chun Chen and Laura Bocchi and Pierre-Malo Deniélou Asynchronous Distributed Monitoring for Multiparty Session Enforcement . . . . . 25--45 Bernd Werther and Nicklas Hoch E-Mobility as a Challenge for New ICT Solutions in the Car Industry . . . . . 46--57 Carme \`Alvarez and Amalia Duch and Maria Serna and Dimitrios Thilikos On the Existence of Nash Equilibria in Strategic Search Games . . . . . . . . . 58--72 Gilles Barthe and Exequiel Rivas Static Enforcement of Information Flow Policies for a Concurrent JVM-like Language . . . . . . . . . . . . . . . . 73--88 Marco Bernardo Weak Markovian Bisimulation Congruences and Exact CTMC-Level Aggregations for Sequential Processes . . . . . . . . . . 89--103 Maria Grazia Buscemi and Mario Coppo Constraints for Service Contracts . . . 104--120 Liqun Chen and Ming-Feng Lee and Bogdan Warinschi Security of the Enhanced TCG Privacy-CA Solution . . . . . . . . . . . . . . . . 121--141 Liliana D'Errico and Michele Loreti Context Aware Specification and Verification of Distributed Systems . . 142--159 Rocco De Nicola and Andrea Margheri and Francesco Tiezzi Orchestrating Tuple-Based Languages . . 160--178 Dominic Duggan and Ye Wu Transactional Correctness for Secure Nested Transactions . . . . . . . . . . 179--196 Joaquim Gabarro and Maria Serna and Alan Stewart Orchestrating Unreliable Services: Strategic and Probabilistic Approaches to Reliability . . . . . . . . . . . . . 197--211 Hernán Melgratti and Christian Roldán On Correlation Sets and Correlation Exceptions in ActiveBPEL . . . . . . . . 212--226 Chenyi Zhang Conditional Information Flow Policies and Unwinding Relations . . . . . . . . 227--241 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
James Reinders Only the First Steps of the Parallel Evolution Have Been Taken Thus Far . . . 1--9 Marta Garcia and Julita Corbalan and Rosa Maria Badia and Jesus Labarta A Dynamic Load Balancing Approach with SMPSuperscalar and MPI . . . . . . . . . 10--23 Iris Christadler and Giovanni Erbacci and Alan D. Simpson Performance and Productivity of New Programming Languages . . . . . . . . . 24--35 Alexander Heinecke and Michael Klemm and Hans Pabst and Dirk Pflüger Towards High-Performance Implementations of a Custom HPC Kernel Using \reg Array Building Blocks . . . . . . . . . . . . 36--47 Charly Bechara and Nicolas Ventroux and Daniel Etiemble AHDAM: An Asymmetric Homogeneous with Dynamic Allocator Manycore Chip . . . . 48--59 Micha\l Fularz and Marek Kraft and Adam Schmidt and Andrzej Kasi\'nski FPGA Implementation of the Robust Essential Matrix Estimation with RANSAC and the $8$-Point and the $5$-Point Method . . . . . . . . . . . . . . . . . 60--71 Wlodzimierz Bielecki and Marek Palkowski Using Free Scheduling for Programming Graphic Cards . . . . . . . . . . . . . 72--83 Katsuya Kawanami and Noriyuki Fujimoto GPU Accelerated Computation of the Longest Common Subsequence . . . . . . . 84--95 Oscar Hernandez and Wei Ding and Barbara Chapman and Christos Kartsaklis and Ramanan Sankaran Experiences with High-Level Programming Directives for Porting Applications to GPUs . . . . . . . . . . . . . . . . . . 96--107 Bas O. Fagginger Auer and Rob H. Bisseling A GPU Algorithm for Greedy Graph Matching . . . . . . . . . . . . . . . . 108--119 Dorian Krause and Mark Potse and Thomas Dickopf and Rolf Krause and Angelo Auricchio and Frits Prinzen Hybrid Parallelization of a Large-Scale Heart Model . . . . . . . . . . . . . . 120--132 Jiri Kraus and Malte Förster Efficient AMG on Heterogeneous Systems 133--146 Karl Rupp and Ansgar Jüngel and Tibor Grasser A GPU-Accelerated Parallel Preconditioner for the Solution of the Boltzmann Transport Equation for Semiconductors . . . . . . . . . . . . . 147--157 Vincent Heuveline and Dimitar Lukarski and Nico Trost and Jan-Philipp Weiss Parallel Smoothers for Matrix-Based Geometric Multigrid Methods on Locally Refined Meshes Using Multicore CPUs and GPUs . . . . . . . . . . . . . . . . . . 158--171 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Krasimir Angelov and Ramona Enache Typeful Ontologies with Direct Multilingual Verbalization . . . . . . . 1--20 Alexandra Bünzli and Stefan Höfler Controlling Ambiguities in Legislative Language . . . . . . . . . . . . . . . . 21--42 Marcos Cramer and Bernhard Schröder Interpreting Plurals in the Naproche CNL 43--52 Pradeep Dantuluri and Brian Davis and Pierre Ludwick Engineering a Controlled Natural Language into Semantic MediaWiki . . . . 53--72 Norbert E. Fuchs First-Order Reasoning for Attempto Controlled English . . . . . . . . . . . 73--94 Tobias Kuhn Codeco: a Practical Notation for Controlled English Grammars in Predictive Editors . . . . . . . . . . . 95--114 Aarne Ranta and Ramona Enache and Grégoire Détrez Controlled Language for Everyday Use: The MOLTO Phrasebook . . . . . . . . . . 115--136 John J. Camilleri and Gordon J. Pace and Michael Rosner Controlled Natural Language in a Game for Legal Assistance . . . . . . . . . . 137--153 Rolf Schwitter Working with Events and States in PENG Light . . . . . . . . . . . . . . . . . 154--174 Silvie Spreeuwenberg and Jeroen van Grondelle and Ronald Heller Using CNL Techniques and Pattern Sentences to Involve Domain Experts in Modeling . . . . . . . . . . . . . . . . 175--193 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Kohei Honda Understanding Distributed Services through the $ \pi $-Calculus . . . . . . 1--1 Étienne Lozes and Jules Villard Reliable Contracts for Unreliable Half-Duplex Communications . . . . . . . 2--16 Fangzhe Chang and Pavithra Prabhakar and Ramesh Viswanathan Behavior Based Service Composition . . . 17--31 Beno\^\it Masson and Lo\"\ic Hélouët and Albert Benveniste Compatibility of Data-Centric Web Services . . . . . . . . . . . . . . . . 32--47 Hugo A. López and Jorge A. Pérez Time and Exceptional Behavior in Multiparty Structured Interactions . . . 48--63 Manuel Mazzara and Faisal Abouzaid and Nicola Dragoni Toward Design, Modelling and Analysis of Dynamic Workflow Reconfigurations . . . 64--78 José Antonio Mateo and Valentín Valero and Gregorio Díaz An Operational Semantics of BPEL Orchestrations Integrating Web Services Resource Framework . . . . . . . . . . . 79--94 Elie Fares and Jean-Paul Bodeveix and Mamoun Filali Design of a BPEL Verification Tool . . . 95--110 Roberto Bruni and Andrea Corradini and Gianluigi Ferrari Applying Process Analysis to the Italian eGovernment Enterprise Architecture . . 111--127 Juan Pedro Silva Gallino and Miguel de Miguel Domain-Specific Multi-modeling of Security Concerns in Service-Oriented Architectures . . . . . . . . . . . . . 128--142 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Ugo Dal Lago and Paolo Parisen Toldin A Higher-Order Characterization of Probabilistic Polynomial Time . . . . . 1--18 Emanuele Cesena and Marco Pedicini and Luca Roversi Typing a Core Binary-Field Arithmetic in a Light Logic . . . . . . . . . . . . . 19--35 Manuel Montenegro and Olha Shkaravska and Marko van Eekelen and Ricardo Peña Interpolation-Based Height Analysis for Improving a Recurrence Solver . . . . . 36--53 Pedro Lopez-Garcia and Luthfi Darmawan and Francisco Bueno and Manuel Hermenegildo Interval-Based Resource Usage Verification: Formalization and Prototype . . . . . . . . . . . . . . . 54--71 Roberto M. Amadio and Yann Régis-Gianas Certifying and Reasoning on Cost Annotations of Functional Programs . . . 72--89 Mihail As\uavoae and Irina M\uariuca As\uavoae and Dorel Lucanu On Abstractions for Timing Analysis in the $ \mathbb {K} $ Framework . . . . . 90--107 Vítor Rodrigues and João Pedro Pedroso and Mário Florido and Simão Melo de Sousa Certifying Execution Time . . . . . . . 108--125 Christoph A. Herrmann and Kevin Hammond Counter Automata for Parameterised Timing Analysis of Box-Based Systems . . 126--141 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Andreas Heinig and Vincent J. Mooney and Florian Schmoll and Peter Marwedel and Krishna Palem Classification-Based Improvement of Application Robustness and Quality of Service in Probabilistic Computer Systems . . . . . . . . . . . . . . . . 1--12 Christian Brehm and Matthias May and Christina Gimmler and Norbert Wehn A Case Study on Error Resilient Architectures for Wireless Communication 13--24 Oussama Tahan and Mohamed Shawky Using Dynamic Task Level Redundancy for OpenMP Fault Tolerance . . . . . . . . . 25--36 Yang Xu and Rafael Rosales and Bo Wang and Martin Streubühr and Ralph Hasholzner and Christian Haubelt A Very Fast and Quasi-accurate Power-State-Based System-Level Power Modeling Methodology . . . . . . . . . . 37--49 Nikita Nikitin and Jordi Cortadella Static Task Mapping for Tiled Chip Multiprocessors with Multiple Voltage Islands . . . . . . . . . . . . . . . . 50--62 Andreas Barthels and Joachim Fröschl and Hans-Ulrich Michel and Uwe Baumgarten An Architecture for Power Management in Automotive Systems . . . . . . . . . . . 63--73 Isaías A. Comprés Ureña and Michael Riepen and Michael Konow and Michael Gerndt Invasive MPI on Intel's Single-Chip Cloud Computer . . . . . . . . . . . . . 74--85 Davide Zoni and Patrick Bellasi and William Fornaciari A Low-Overhead Heuristic for Mixed Workload Resource Partitioning in Cluster-Based Architectures . . . . . . 86--97 Frédéric Boniol and Hugues Cassé and Eric Noulard and Claire Pagetti Deterministic Execution Model on COTS Hardware . . . . . . . . . . . . . . . . 98--110 Pascal Schleuniger and Sally A. McKee and Sven Karlsson Design Principles for Synthesizable Processor Cores . . . . . . . . . . . . 111--122 Panayiotis Petrides and George Nicolaides and Pedro Trancoso HPC Performance Domains on Multi-core Processors with Virtualization . . . . . 123--134 Jens Brandenburg and Benno Stabernack A Generic and Non-intrusive Profiling Methodology for SystemC Multi-core Platform Simulation Models . . . . . . . 135--146 Richard Membarth and Jan-Hugo Lupp and Frank Hannig and Jürgen Teich and Mario Körner Dynamic Task-Scheduling and Resource Management for GPU Accelerators in Medical Imaging . . . . . . . . . . . . 147--159 Volker Hampel and Thilo Pionteck and Erik Maehle An Approach for Performance Estimation of Hybrid Systems with FPGAs and GPUs as Coprocessors . . . . . . . . . . . . . . 160--171 Sebastian Mattheis and Tobias Schuele and Andreas Raabe and Thomas Henties and Urs Gleim Work Stealing Strategies for Parallel Stream Processing in Soft Real-Time Systems . . . . . . . . . . . . . . . . 172--183 Matthew Bielby and Miles Gould and Nigel Topham Design Space Exploration of Hybrid Ultra Low Power Branch Predictors . . . . . . 184--199 Ademola Fawibe and Jared Sherman and Krishna Kavi and Mike Ignatowski and David Mayhew New Memory Organizations for $3$D DRAM and PCMs . . . . . . . . . . . . . . . . 200--211 Hao Zhang and Hiroki Matsutani and Yasuhiro Take and Tadahiro Kuroda and Hideharu Amano Vertical Link On/Off Control Methods for Wireless $3$-D NoCs . . . . . . . . . . 212--224 Atis Elsts and Rihards Balass and Janis Judvaitis and Reinholds Zviedris and Girts Strazdins SADmote: a Robust and Cost-Effective Device for Environmental Monitoring . . 225--237 Gadi Oxman and Shlomo Weiss and Yitzhak (Tsahi) Birk Streamlined Network-on-Chip for Multicore Embedded Architectures . . . . 238--249 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Elvira Albert and Puri Arenas and Samir Genaim Automatic Inference of Resource Consumption Bounds . . . . . . . . . . . 1--11 Aart Middeldorp Matrix Interpretations for Polynomial Derivational Complexity of Rewrite Systems . . . . . . . . . . . . . . . . 12--12 Boris Motik Parameterized Complexity and Fixed-Parameter Tractability of Description Logic Reasoning . . . . . . 13--14 Amir Aavani and Xiongnan (Newman) Wu Enfragmo: a System for Modelling and Solving Search Problems with Logic . . . 15--22 Beniamino Accattoli and Delia Kesner The Permutative $ \lambda $-Calculus . . 23--36 Jesse Alama and Daniel Kühlwein and Josef Urban Automated and Human Proofs in General Mathematics: An Initial Comparison . . . 37--45 Francesco Alberti and Roberto Bruttomesso Lazy Abstraction with Interpolants for Arrays . . . . . . . . . . . . . . . . . 46--61 María Alpuente and Demis Ballis Backward Trace Slicing for Conditional Rewrite Theories . . . . . . . . . . . . 62--76 Grigoris Antoniou and Thomas Eiter and Kewen Wang Forgetting for Defeasible Logic . . . . 77--91 David Aspinall and Ewen Denney and Christoph Lüth Querying Proofs . . . . . . . . . . . . 92--106 Franz Baader and Alexander Okhotin Solving Language Equations and Disequations with Applications to Disunification in Description Logics and Monadic Set Constraints . . . . . . . . 107--121 Nikola Bene\vs and Jan K\vretínský Dual-Priced Modal Transition Systems with Time Durations . . . . . . . . . . 122--137 Stefan Borgwardt and Barbara Morawska Finding Finite Herbrand Models . . . . . 138--152 Lukas Bulwahn Smart Testing of Functional Programs in Isabelle . . . . . . . . . . . . . . . . 153--167 Peter Bulychev and Alexandre David Monitor-Based Statistical Model Checking for Weighted Metric Temporal Logic . . . 168--182 José Luis Chacón and Ramón Pino Pérez Duality between Merging Operators and Social Contraction Operators . . . . . . 183--196 Arnaud Fietzke and Evgeny Kruglov Automatic Generation of Invariants for Circular Derivations in SUP(LA) . . . . 197--211 The Anh Han and Ari Saptawijaya Moral Reasoning under Uncertainty . . . 212--227 Stefan Hetzl and Alexander Leitsch Towards Algorithmic Cut-Introduction . . 228--242 Hadi Katebi and Karem A. Sakallah Conflict Anticipation in the Search for Graph Automorphisms . . . . . . . . . . 243--257 Anonymous Front Matter . . . . . . . . . . . . . . ??
Srinivas Bangalore Thinking Outside the Box for Natural Language Processing . . . . . . . . . . 1--16 Aitor González and German Rigau and Mauro Castillo A Graph-Based Method to Improve WordNet Domains . . . . . . . . . . . . . . . . 17--28 Sava\cs Yìldìrìm and Tu\ugba Yìldìz Corpus-Driven Hyponym Acquisition for Turkish Language . . . . . . . . . . . . 29--41 Renato Domínguez García and Sebastian Schmidt and Christoph Rensing and Ralf Steinmetz Automatic Taxonomy Extraction in Different Languages Using Wikipedia and Minimal Language-Specific Information 42--53 He Tan and Rajaram Kaliyaperumal and Nirupama Benis Ontology-Driven Construction of Domain Corpus with Frame Semantics Annotations 54--65 Qaiser Abbas Building a Hierarchical Annotated Corpus of Urdu: The URDU.KON-TB Treebank . . . 66--79 Francisco J. Carreras-Riudavets and Juan C. Rodríguez-del-Pino and Zenón Hernández-Figueroa A Morphological Analyzer Using Hash Tables in Main Memory (MAHT) and a Lexical Knowledge Base . . . . . . . . . 80--91 N. Vasudevan and Pushpak Bhattacharyya Optimal Stem Identification in Presence of Suffix List . . . . . . . . . . . . . 92--103 Ramadan Alfared and Denis Béchet On the Adequacy of Three POS Taggers and a Dependency Parser . . . . . . . . . . 104--116 Kishorjit Nongmeikapam and Aribam Umananda Sharma and Laishram Martina Devi and Nepoleon Keisam Will the Identification of Reduplicated Multiword Expression (RMWE) Improve the Performance of SVM Based Manipuri POS Tagging? . . . . . . . . . . . . . . . . 117--129 Vladislav Kubo\vn and Markéta Lopatková and Martin Plátek On Formalization of Word Order Properties . . . . . . . . . . . . . . . 130--141 Md. Izhar Ashraf and Sitabhra Sinha Core-Periphery Organization of Graphemes in Written Sequences: Decreasing Positional Rigidity with Increasing Core Order . . . . . . . . . . . . . . . . . 142--153 Nicolas Béchet and Peggy Cellier and Thierry Charnois and Bruno Crémilleux Discovering Linguistic Patterns Using Sequence Mining . . . . . . . . . . . . 154--165 Solen Quiniou and Peggy Cellier and Thierry Charnois and Dominique Legallois What about Sequential Data Mining Techniques to Identify Linguistic Patterns for Stylistics? . . . . . . . . 166--177 Imran Sarwar Bajwa and Mark Lee and Behzad Bordbar Resolving Syntactic Ambiguities in Natural Language Specification of Constraints . . . . . . . . . . . . . . 178--187 Chamila Liyanage and Randil Pushpananda and Dulip Lakmal Herath and Ruvan Weerasinghe A Computational Grammar of Sinhala . . . 188--200 Bahar Salehi and Narjes Askarian and Afsaneh Fazly Automatic Identification of Persian Light Verb Constructions . . . . . . . . 201--210 Sudakshina Dutta and Anupam Basu A Cognitive Approach to Word Sense Disambiguation . . . . . . . . . . . . . 211--224 Yoan Gutiérrez and Sonia Vázquez and Andrés Montoyo A graph-Based Approach to WSD Using Relevant Semantic Trees and $N$-Cliques Model . . . . . . . . . . . . . . . . . 225--237 Kiem-Hieu Nguyen and Cheol-Young Ock Using Wiktionary to Improve Lexical Disambiguation in Multiple Languages . . 238--248 Anonymous Front Matter . . . . . . . . . . . . . . ??
Mari-Sanna Paukkeri and Jaakko Väyrynen and Antti Arppe Exploring Extensive Linguistic Feature Sets in Near-Synonym Lexical Choice . . 1--12 Ralf Klabunde and Sebastian Reuße and Björn Schlünder Abduction in Games for a Flexible Approach to Discourse Planning . . . . . 13--24 Salim Roukos and Abraham Ittycheriah and Jian-Ming Xu Document-Specific Statistical Machine Translation for Improving Human Translation Productivity . . . . . . . . 25--39 Tsuyoshi Okita and Josef van Genabith Minimum Bayes Risk Decoding with Enlarged Hypothesis Space in System Combination . . . . . . . . . . . . . . 40--51 Hailong Cao and Eiichiro Sumita and Tiejun Zhao and Sheng Li Phrasal Syntactic Category Sequence Model for Phrase-Based MT . . . . . . . 52--59 Prashant Mathur and Soma Paul Integration of a Noun Compound Translator Tool with Moses for English--Hindi Machine Translation and Evaluation . . . . . . . . . . . . . . . 60--71 Rima Harastani and Béatrice Daille and Emmanuel Morin Neoclassical Compound Alignments from Comparable Corpora . . . . . . . . . . . 72--82 Amir Hazem and Emmanuel Morin QAlign: a New Method for Bilingual Lexicon Extraction from Comparable Corpora . . . . . . . . . . . . . . . . 83--96 Florian Petran Aligning the Un-Alignable --- a Pilot Study Using a Noisy Corpus of Nonstandardized, Semi-parallel Texts . . 97--109 Antoni Oliver and Salvador Climent Parallel Corpora for WordNet Construction: Machine Translation vs. Automatic Sense Tagging . . . . . . . . 110--121 Keiji Yasuda and Andrew Finch and Eiichiro Sumita Method to Build a Bilingual Lexicon for Speech-to-Speech Translation Systems . . 122--131 Nandita Tripathi and Michael Oakes and Stefan Wermter A Fast Subspace Text Categorization Method Using Parallel Classifiers . . . 132--143 Dequan Zheng and Chenghe Zhang and Geli Fei and Tiejun Zhao Research on Text Categorization Based on a Weakly-Supervised Transfer Learning Method . . . . . . . . . . . . . . . . . 144--156 Alberto Pérez García-Plaza and Víctor Fresno and Raquel Martínez Fuzzy Combinations of Criteria: An Application to Web Page Representation for Clustering . . . . . . . . . . . . . 157--168 Prajol Shrestha and Christine Jacquin and Béatrice Daille Clustering Short Text and Its Evaluation 169--180 Carlos Castillo and Héctor Valero and José Guadalupe Ramos and Josep Silva Information Extraction from Webpages Based on DOM Distances . . . . . . . . . 181--193 Qi Li and Javier Artiles and Taylor Cassidy and Heng Ji Combining Flat and Structured Approaches for Temporal Slot Filling or: How Much to Compress? . . . . . . . . . . . . . . 194--205 Dina Wonsever and Aiala Rosá and Marisa Malcuori and Guillermo Moncecchi and Alan Descoins Event Annotation Schemes and Event Recognition in Spanish Texts . . . . . . 206--218 Béatrice Arnulphy and Xavier Tannier and Anne Vilnat Automatically Generated Noun Lexicons for Event Extraction . . . . . . . . . . 219--231 John Carroll and Rob Koeling and Shivani Puri Lexical Acquisition for Clinical Text Mining Using Distributional Similarity 232--246 Anonymous Front Matter . . . . . . . . . . . . . . ??
Eugene Asarin Measuring Information in Timed Languages 1--2 Bernard Boigelot and Julien Brusten and Jean-François Degbomont Automata-Based Symbolic Representations of Polyhedra . . . . . . . . . . . . . . 3--20 Gilles Dowek Around the Physical Church--Turing Thesis: Cellular Automata, Formal Languages, and the Principles of Quantum Theory . . . . . . . . . . . . . . . . . 21--37 Rod Downey A Parameterized Complexity Tutorial . . 38--56 Jack H. Lutz The Computer Science of DNA Nanotechnology . . . . . . . . . . . . . 57--57 Parosh Aziz Abdulla and Mohamed Faouzi Atig and Jari Stenman The Minimal Cost Reachability Problem in Priced Timed Pushdown Systems . . . . . 58--69 Siva Anantharaman and Christopher Bouchard and Paliath Narendran and Michael Rusinowitch Unification Modulo Chaining . . . . . . 70--82 Vikraman Arvind and Yadu Vasudev Isomorphism Testing of Boolean Functions Computable by Constant-Depth Circuits 83--94 Holger Bock Axelsen Reversible Multi-head Finite Automata Characterize Reversible Logarithmic Space . . . . . . . . . . . . . . . . . 95--105 Mikhail Barash and Alexander Okhotin Defining Contexts in Context-Free Grammars . . . . . . . . . . . . . . . . 106--118 Philip Bille and Inge Li Gòrtz and Jesper Kristensen Longest Common Extensions via Fingerprinting . . . . . . . . . . . . . 119--130 Philip Bille and Morten Stöckel Fast and Cache-Oblivious Dynamic Programming with Local Dependencies . . 131--142 Beate Bollig and Tobias Pröger An Efficient Implicit OBDD-Based Algorithm for Maximal Matchings . . . . 143--154 Laura Bozzelli Strong Termination for Gap-Order Constraint Abstractions of Counter Systems . . . . . . . . . . . . . . . . 155--168 Julien Cervelle Covering Space in the Besicovitch Topology . . . . . . . . . . . . . . . . 169--178 Jean-Marc Champarnaud and Hadrien Jeanne and Ludovic Mignot Approximate Regular Expressions and Their Derivatives . . . . . . . . . . . 179--191 Gabriel Ciobanu and G. Michele Pinna Catalytic Petri Nets Are Turing Complete 192--203 Alberto Dennunzio and Enrico Formenti and Julien Provillard Computational Complexity of Rule Distributions of Non-uniform Cellular Automata . . . . . . . . . . . . . . . . 204--215 Danny Dubé and Mario Latendresse and Pascal Tesson Conservative Groupoids Recognize Only Regular Languages . . . . . . . . . . . 216--227 Michal Fori\vsek and Lucia Keller and Monika Steinová Advice Complexity of Online Coloring for Paths . . . . . . . . . . . . . . . . . 228--239 Anonymous Front Matter . . . . . . . . . . . . . . ??
Artiom Alhazov Properties of Membrane Systems . . . . . 1--13 Jacob Beal Bridging Biology and Engineering Together with Spatial Computing . . . . 14--18 Jean-Louis Giavitto The Modeling and the Simulation of the Fluid Machines of Synthetic Biology . . 19--34 Radu Nicolescu Parallel and Distributed Algorithms in P Systems . . . . . . . . . . . . . . . . 35--50 György Vaszil Variants of Distributed P Automata and the Efficient Parallelizability of Languages . . . . . . . . . . . . . . . 51--61 Oana Agrigoroaiei and Gabriel Ciobanu Quantitative Causality in Membrane Systems . . . . . . . . . . . . . . . . 62--72 Artiom Alhazov and Alexander Krassovitskiy and Yurii Rogozhin Circular Post Machines and P Systems with Exo-insertion and Deletion . . . . 73--86 Francis George C. Cabarle and Henry Adorna and Miguel A. Martínez A Spiking Neural P System Simulator Based on CUDA . . . . . . . . . . . . . 87--103 Lud\vek Cienciala and Lucie Ciencialová and Miroslav Langer Modularity in P Colonies with Checking Rules . . . . . . . . . . . . . . . . . 104--119 Erzsébet Csuhaj-Varjú and György Vaszil Finite dP Automata versus Multi-head Finite Automata . . . . . . . . . . . . 120--138 Michael J. Dinneen and Yun-Bum Kim and Radu Nicolescu An Adaptive Algorithm for P System Synchronization . . . . . . . . . . . . 139--164 Pierluigi Frisco and Gordon Govan P Systems with Active Membranes Operating under Minimal Parallelism . . 165--181 Thomas Hinze and Christian Bodenstein and Benedict Schau and Ines Heiland and Stefan Schuster Chemical Analog Computers for Clock Frequency Control Based on P Modules . . 182--202 Xiaoli Huang and Gexiang Zhang and Haina Rong and Florentin Ipate Evolutionary Design of a Simple Membrane System . . . . . . . . . . . . . . . . . 203--214 Florentin Ipate and Raluca Lefticaru and Ignacio Pérez-Hurtado and Mario J. Pérez-Jiménez Formal Verification of P Systems with Active Membranes through Model Checking 215--225 Sergiu Ivanov Basic Concurrency Resolution in Clock-Free P Systems . . . . . . . . . . 226--242 Linqiang Pan and Jun Wang and Hendrik Jan Hoogeboom Asynchronous Extended Spiking Neural P Systems with Astrocytes . . . . . . . . 243--256 Luis F. Macías--Ramos and Ignacio Pérez--Hurtado and Manuel García--Quismondo A P-Lingua Based Simulator for Spiking Neural P Systems . . . . . . . . . . . . 257--281 Vincenzo Manca and Rosario Lombardo Computing with Multi-membranes . . . . . 282--299 Luca Marchetti and Vincenzo Manca A Methodology Based on MP Theory for Gene Expression Analysis . . . . . . . . 300--313 Anonymous Front Matter . . . . . . . . . . . . . . ??
Jun Fang and Zhisheng Huang and Frank van Harmelen A Method of Contrastive Reasoning with Inconsistent Ontologies . . . . . . . . 1--16 Yuan Ren and Jeff Z. Pan and Kevin Lee Parallel ABox Reasoning of $ {\mathcal {EL}} $ Ontologies . . . . . . . . . . . 17--32 Kisung Kim and Bongki Moon and Hyoung-Joo Kim RP-Filter: a Path-Based Triple Filtering Method for Efficient SPARQL Query Processing . . . . . . . . . . . . . . . 33--47 Hang Zhang and Wei Hu and Yuzhong Qu Constructing Virtual Documents for Ontology Matching Using MapReduce . . . 48--63 Valeria Fionda and Giuseppe Pirró Semantic Flow Networks: Semantic Interoperability in Networks of Ontologies . . . . . . . . . . . . . . . 64--79 Zhichun Wang and Zhigang Wang and Juanzi Li and Jeff Z. Pan Building a Large Scale Knowledge Base from Chinese Wiki Encyclopedia . . . . . 80--95 Kouji Kozaki and Keisuke Hihara and Riiciro Mizoguchi Dynamic \em Is --- a Hierarchy Generation System Based on User's Viewpoint . . . . . . . . . . . . . . . 96--111 Lihua Zhao and Ryutaro Ichise Mid-Ontology Learning from Linked Data 112--127 Irene Celino and Daniele Dell'Aglio An Ontological Formulation and an OPM Profile for Causality in Planning Applications . . . . . . . . . . . . . . 128--143 Jianfeng Du and Shuai Wang and Guilin Qi and Jeff Z. Pan and Yong Hu A New Matchmaking Approach Based on Abductive Conjunctive Query Answering 144--159 Qi Gao and Fabian Abel and Geert-Jan Houben GeniUS: Generic User Modeling Library for the Social Semantic Web . . . . . . 160--175 Yuan Tian and Jürgen Umbrich and Yong Yu Enhancing Source Selection for Live Queries over Linked Data via Query Log Mining . . . . . . . . . . . . . . . . . 176--191 Mengdong Yang and Gang Wu Semantic Caching for Semantic Web Applications . . . . . . . . . . . . . . 192--209 Xin Wang and Thanassis Tiropanis and Hugh C. Davis Evaluating Graph Traversal Algorithms for Distributed SPARQL Query Optimization . . . . . . . . . . . . . . 210--225 Gong Cheng and Feng Ji and Shengmei Luo and Weiyi Ge and Yuzhong Qu BipRank: Ranking and Summarizing RDF Vocabulary Descriptions . . . . . . . . 226--241 Ross Horne and Vladimiro Sassone and Nicholas Gibbins Operational Semantics for SPARQL Update 242--257 Peiqin Gu and Huajun Chen Knowledge-Driven Diagnostic System for Traditional Chinese Medicine . . . . . . 258--267 Wenlei Zhou and Haofen Wang and Jiansong Chao and Weinan Zhang and Yong Yu LODDO: Using Linked Open Data Description Overlap to Measure Semantic Relatedness between Named Entities . . . 268--283 Andriy Nikolov and Mathieu d'Aquin and Enrico Motta What Should I Link to? Identifying Relevant Sources and Classes for Data Linking . . . . . . . . . . . . . . . . 284--299 Armin Haller and Tudor Groza and Florian Rosenberg Interacting with Linked Data via Semantically Annotated Widgets . . . . . 300--317 Anonymous Front Matter . . . . . . . . . . . . . . ??
Howard Barringer and Klaus Havelund Internal versus External DSLs for Trace Analysis . . . . . . . . . . . . . . . . 1--3 Chao Wang and Malay Ganai Predicting Concurrency Failures in the Generalized Execution Traces of x86 Executables . . . . . . . . . . . . . . 4--18 Borzoo Bonakdarpour and Sebastian Fischmeister Runtime Monitoring of Time-Sensitive Systems . . . . . . . . . . . . . . . . 19--33 Martin Leucker Teaching Runtime Verification . . . . . 34--48 Sharad Malik Runtime Verification: a Computer Architecture Perspective . . . . . . . . 49--62 Lukasz Ziarek and Siddharth Tiwary and Suresh Jagannathan Isolating Determinism in Multi-threaded Programs . . . . . . . . . . . . . . . . 63--77 Horatiu Jula and Silviu Andrica and George Candea Efficiency Optimizations for Implementations of Deadlock Immunity . . 78--93 Edwin Westbrook and Jisheng Zhao and Zoran Budimli\'c and Vivek Sarkar Permission Regions for Race-Free Parallelism . . . . . . . . . . . . . . 94--109 Konstantin Serebryany and Alexander Potapenko and Timur Iskhodzhanov and Dmitriy Vyukov Dynamic Race Detection with LLVM Compiler . . . . . . . . . . . . . . . . 110--114 Narcisa Andreea Milea and Siau Cheng Khoo and David Lo and Cristian Pop NORT: Runtime Anomaly-Based Monitoring of Malicious Behavior for Windows . . . 115--130 Fabrizio Maria Maggi and Michael Westergaard and Marco Montali and Wil M. P. van der Aalst Runtime Verification of LTL-Based Declarative Process Models . . . . . . . 131--146 Eugene Asarin and Alexandre Donzé and Oded Maler and Dejan Nickovic Parametric Identification of Temporal Properties . . . . . . . . . . . . . . . 147--160 William N. Sumner and Christian Hammer and Julian Dolby Marathon: Detecting Atomic-Set Serializability Violations with Conflict Graphs . . . . . . . . . . . . . . . . . 161--176 Bohuslav K\vrena and Zden\vek Letko and Tomá\vs Vojnar Coverage Metrics for Saturation-Based and Search-Based Testing of Concurrent Software . . . . . . . . . . . . . . . . 177--192 Scott D. Stoller and Ezio Bartocci and Justin Seyster and Radu Grosu and Klaus Havelund Runtime Verification with State Estimation . . . . . . . . . . . . . . . 193--207 Samaneh Navabpour and Chun Wah Wallace Wu and Borzoo Bonakdarpour and Sebastian Fischmeister Efficient Techniques for Near-Optimal Instrumentation in Time-Triggered Runtime Verification . . . . . . . . . . 208--222 Paolo Arcaini and Angelo Gargantini and Elvinia Riccobene CoMA: Conformance Monitoring of Java Programs by Abstract State Machines . . 223--238 Thomas Reinbacher and Jörg Brauer and Daniel Schachinger and Andreas Steininger Automated Test-Trace Inspection for Microcontroller Binary Code . . . . . . 239--244 Steven P. Reiss and Alexander Tarvo What Is My Program Doing? Program Dynamics in Programmer's Terms . . . . . 245--259 David Basin and Felix Klaedtke and Eugen Z\ualinescu Algorithms for Monitoring Real-Time Properties . . . . . . . . . . . . . . . 260--275 Anonymous Front Matter . . . . . . . . . . . . . . ??
Kristian Gjòsteen The Norwegian Internet Voting Protocol 1--18 Oliver Spycher and Melanie Volkamer and Reto Koenig Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting . . . . . . . . . . . . . . . . . 19--35 Jordi Puiggalí Allepuz and Sandra Guasch Castelló Internet Voting System with Cast as Intended Verification . . . . . . . . . 36--52 Henry DeYoung and Carsten Schürmann Linear Logical Voting Protocols . . . . 53--70 Michael Schläpfer and Rolf Haenni and Reto Koenig and Oliver Spycher Efficient Vote Authorization in Coercion-Resistant Internet Voting . . . 71--88 Mario Heiderich and Tilman Frosch and Marcus Niemietz and Jörg Schwenk The Bug That Made Me President: a Browser- and Web-Security Case Study on Helios Voting . . . . . . . . . . . . . 89--103 Rui Joaquim and Carlos Ribeiro An Efficient and Highly Sound Voter Verification Technique and Its Implementation . . . . . . . . . . . . . 104--121 Aleksander Essex and Christian Henrich and Urs Hengartner Single Layer Optical-Scan Voting with Fully Distributed Trust . . . . . . . . 122--139 David Chaum and Alex Florescu and Mridul Nandi and Stefan Popoveniuc and Jan Rubio and Poorvi L. Vora Paperless Independently-Verifiable Voting . . . . . . . . . . . . . . . . . 140--157 Denise Demirel and Maria Henning and Peter Y. A. Ryan and Steve Schneider and Melanie Volkamer Feasibility Analysis of Prêt \`a Voter for German Federal Elections . . . . . . 158--173 Steve Schneider and Sriramkrishnan Srinivasan and Chris Culnane and James Heather and Zhe Xia Prêt á Voter with Write-Ins . . . . . . . 174--189 Sergiu Bursuc and Gurchetan S. Grewal and Mark D. Ryan Trivitas: Voters Directly Verifying Votes . . . . . . . . . . . . . . . . . 190--207 Sven Heiberg and Peeter Laud and Jan Willemson The Application of I-Voting for Estonian Parliamentary Elections of 2011 . . . . 208--223 Richard Buckland and Vanessa Teague and Roland Wen Towards Best Practice for E-election Systems . . . . . . . . . . . . . . . . 224--241 James Heather and Morgan Llewellyn and Vanessa Teague and Roland Wen On the Side-Effects of Introducing E-Voting . . . . . . . . . . . . . . . . 242--256 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Peter Auer Invited Talk: UCRL and Autonomous Exploration . . . . . . . . . . . . . . 1--1 Kristian Kersting Invited Talk: Increasing Representational Power and Scaling Inference in Reinforcement Learning . . 2--2 Peter Stone Invited Talk: PRISM --- Practical RL: Representation, Interaction, Synthesis, and Mortality . . . . . . . . . . . . . 3--3 Csaba Szepesvári Invited Talk: Towards Robust Reinforcement Learning Algorithms . . . 4--4 Francis Maes and Louis Wehenkel and Damien Ernst Automatic Discovery of Ranking Formulas for Playing with Multi-armed Bandits . . 5--17 Sylvie C. W. Ong and Yuri Grinberg and Joelle Pineau Goal-Directed Online Learning of Predictive Models . . . . . . . . . . . 18--29 Matthew Robards and Peter Sunehag Gradient Based Algorithms with Loss Functions and Kernels for Improved On-Policy Control . . . . . . . . . . . 30--41 Mauricio Araya-López and Olivier Buffet and Vincent Thomas and François Charpillet Active Learning of MDP Models . . . . . 42--53 Boris Lesner and Bruno Zanuttini Handling Ambiguous Effects in Action Learning . . . . . . . . . . . . . . . . 54--65 Phuong Nguyen and Peter Sunehag and Marcus Hutter Feature Reinforcement Learning in Practice . . . . . . . . . . . . . . . . 66--77 Charles Elkan Reinforcement Learning with a Bilinear Q Function . . . . . . . . . . . . . . . . 78--88 Matthieu Geist and Bruno Scherrer $ \ell_1 $-Penalized Projected Bellman Residual . . . . . . . . . . . . . . . . 89--101 Matthew W. Hoffman and Alessandro Lazaric and Mohammad Ghavamzadeh and Rémi Munos Regularized Least Squares Temporal Difference Learning with Nested $ \ell_2 $ and $ \ell_1 $ Penalization . . . . . 102--114 Bruno Scherrer and Matthieu Geist Recursive Least-Squares Learning with Eligibility Traces . . . . . . . . . . . 115--127 Nikolaos Tziortziotis and Konstantinos Blekas Value Function Approximation through Sparse Bayesian Modeling . . . . . . . . 128--139 Pablo Samuel Castro and Doina Precup Automatic Construction of Temporally Extended Actions for MDPs Using Bisimulation Metrics . . . . . . . . . . 140--152 Kfir Y. Levy and Nahum Shimkin Unified Inter and Intra Options Learning Using Policy Gradient Methods . . . . . 153--164 Munu Sairamesh and Balaraman Ravindran Options with Exceptions . . . . . . . . 165--176 Christos Dimitrakakis Robust Bayesian Reinforcement Learning through Tight Lower Bounds . . . . . . . 177--188 Francis Maes and Louis Wehenkel and Damien Ernst Optimized Look-ahead Tree Search Policies . . . . . . . . . . . . . . . . 189--200 Anonymous Front Matter . . . . . . . . . . . . . . ??
Andreas Berger and Eduard Natale Assessing the Real-World Dynamics of DNS 1--14 Vinicius Gehlen and Alessandro Finamore and Marco Mellia and Maurizio M. Munaf\`o Uncovering the Big Players of the Web 15--28 Steffen Gebert and Rastin Pries and Daniel Schlosser and Klaus Heck Internet Access Traffic Measurement and Analysis . . . . . . . . . . . . . . . . 29--42 Liang Chen and Xingang Shi and Dah Ming Chiu From ISP Address Announcement Patterns to Routing Scalability . . . . . . . . . 43--47 Juan Pablo Timpanaro and Isabelle Chrisment and Olivier Festor I2P's Usage Characterization . . . . . . 48--51 Claudio Testa and Dario Rossi and Ashwin Rao and Arnaud Legout Experimental Assessment of BitTorrent Completion Time in Heterogeneous TCP/uTP Swarms . . . . . . . . . . . . . . . . . 52--65 Pierdomenico Fiadino and Danilo Valerio and Fabio Ricciato and Karin Anna Hummel Steps towards the Extraction of Vehicular Mobility Patterns from 3G Signaling Data . . . . . . . . . . . . . 66--80 Jan Jusko and Martin Rehak Identifying Skype Nodes in the Network Exploiting Mutual Contacts . . . . . . . 81--84 Alfonso Iacovazzi and Andrea Baiocchi Padding and Fragmentation for Masking Packet Length Statistics . . . . . . . . 85--88 Cihangir Be\csikta\cs and Hacì Ali Mantar Real-Time Traffic Classification Based on Cosine Similarity Using Sub-application Vectors . . . . . . . . 89--92 Karel Bartos and Martin Rehak Towards Efficient Flow Sampling Technique for Anomaly Detection . . . . 93--106 Aymen Hafsaoui and Guillaume Urvoy-Keller and Matti Siekkinen and Denis Collange Detecting and Profiling TCP Connections Experiencing Abnormal Performance . . . 107--120 Yuval Shavitt and Noa Zilberman Geographical Internet PoP Level Maps . . 121--124 Heng Cui and Ernst Biersack Distributed Troubleshooting of Web Sessions Using Clustering . . . . . . . 125--128 Pehr Söderman and Markus Hidell and Peter Sjödin Using Metadata to Improve Experiment Reliability in Shared Environments . . . 129--142 Luca Deri and Simone Mainardi and Francesco Fusco \tt tsdb: a Compressed Database for Time Series . . . . . . . . . . . . . . . . . 143--156 Nicola Bonelli and Andrea Di Pietro and Stefano Giordano and Gregorio Procissi Flexible High Performance Traffic Generation on Commodity Multi--core Platforms . . . . . . . . . . . . . . . 157--170 João Marco C. Silva and Solange Rito Lima Improving Network Measurement Efficiency through Multiadaptive Sampling . . . . . 171--174 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Colin Bellinger and B. John Oommen On the Pattern Recognition and Classification of Stochastically Episodic Events . . . . . . . . . . . . 1--35 Linh Anh Nguyen and Andrzej Sza\las Paraconsistent Reasoning for Semantic Web Agents . . . . . . . . . . . . . . . 36--55 Zulfiqar A. Memon and Jan Treur An Agent Model for Cognitive and Affective Empathic Understanding of Other Agents . . . . . . . . . . . . . . 56--83 Jacek Jakie\la and Pawe\l Litwin and Marcin Olech Multiagent Based Simulation as a Supply Chain Analysis Workbench . . . . . . . . 84--104 Leszek Kotulski and Adam S\kedziwy On the Effective Distribution and Maintenance of Knowledge Represented by Complementary Graphs . . . . . . . . . . 105--120 Magdalena Godlewska Agent System for Managing Distributed Mobile Interactive Documents in Knowledge-Based Organizations . . . . . 121--145 Bart\lomiej Józef Dzie\'nkowski Agent Cooperation within Adversarial Teams in Dynamic Environment --- Key Issues and Development Trends . . . . . 146--169 Bogumil Kaminski and Maciej Latek On Pricing Strategies of Boundedly Rational Telecommunication Operators . . 170--180 Norihiro Kamide Reasoning about Time-Dependent Multi-agents: Foundations of Theorem Proving and Model Checking . . . . . . . 181--201 Filippo Neri Learning Predictive Models for Financial Time Series by Using Agent Based Simulations . . . . . . . . . . . . . . 202--221 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Lieven De Lathauwer Block Component Analysis, a New Concept for Blind Source Separation . . . . . . 1--8 Tomer Michaeli and Daniel Sigalov and Yonina C. Eldar Partially Linear Estimation with Application to Image Deblurring Using Blurred/Noisy Image Pairs . . . . . . . 9--16 Zhitang Chen and Laiwan Chan Causal Discovery for Linear Non-Gaussian Acyclic Models in the Presence of Latent Gaussian Confounders . . . . . . . . . . 17--24 Stefan Haufe and Vadim V. Nikulin and Guido Nolte Alleviating the Influence of Weak Data Asymmetries on Granger-Causal Analyses 25--33 Zhiyao Duan and Gautham J. Mysore and Paris Smaragdis Online PLCA for Real-Time Semi-supervised Source Separation . . . 34--41 Benedikt Loesch and Bin Yang Cramér--Rao Bound for Circular Complex Independent Component Analysis . . . . . 42--49 Ke Wang and Xiao-Feng Gong and Qiu-Hua Lin Complex Non-Orthogonal Joint Diagonalization Based on LU and LQ Decompositions . . . . . . . . . . . . . 50--57 Yannick Deville and Alain Deville Exact and Approximate Quantum Independent Component Analysis for Qubit Uncoupling . . . . . . . . . . . . . . . 58--65 Hao Shen and Martin Kleinsteuber A Matrix Joint Diagonalization Approach for Complex Independent Vector Analysis 66--73 Hao Shen and Martin Kleinsteuber Algebraic Solutions to Complex Blind Source Separation . . . . . . . . . . . 74--81 Arie Yeredor On the Separation Performance of the Strong Uncorrelating Transformation When Applied to Generalized Covariance and Pseudo-covariance Matrices . . . . . . . 82--90 Juha Karhunen and Tele Hao and Jarkko Ylipaavalniemi A Canonical Correlation Analysis Based Method for Improving BSS of Two Related Data Sets . . . . . . . . . . . . . . . 91--98 Julian Mathias Becker and Martin Spiertz and Volker Gnann A Probability-Based Combination Method for Unsupervised Clustering with Application to Blind Source Separation 99--106 Alon Slapak and Arie Yeredor Charrelation Matrix Based ICA . . . . . 107--114 Jason A. Palmer and Scott Makeig Contrast Functions for Independent Subspace Analysis . . . . . . . . . . . 115--122 Jarkko Ylipaavalniemi and Nima Reyhani and Ricardo Vigário Distributional Convergence of Subspace Estimates in FastICA: a Bootstrap Study 123--130 Sylvain Le Corff and Gersende Fort and Eric Moulines New Online EM Algorithms for General Hidden Markov Models. Application to the SLAM Problem . . . . . . . . . . . . . . 131--138 Miguel Almeida and Ricardo Vigário and José Bioucas-Dias The Role of Whitening for Separation of Synchronous Sources . . . . . . . . . . 139--146 Frank C. Meinecke Simultaneous Diagonalization of Skew-Symmetric Matrices in the Symplectic Group . . . . . . . . . . . . 147--154 Dana Lahat and Jean-François Cardoso and Hagit Messer Joint Block Diagonalization Algorithms for Optimal Separation of Multidimensional Components . . . . . . 155--162 Anonymous Front Matter . . . . . . . . . . . . . . ??
Changhyun Lee and D. K. Lee and Sue Moon Unmasking the Growing UDP Traffic in a Campus Network . . . . . . . . . . . . . 1--10 Nadi Sarrar and Gregor Maier and Bernhard Ager and Robin Sommer and Steve Uhlig Investigating IPv6 Traffic . . . . . . . 11--20 Ahlem Reggani and Fabian Schneider and Renata Teixeira An End-Host View on Local Traffic at Home and Work . . . . . . . . . . . . . 21--31 Mikko V. J. Heikkinen and Arthur W. Berger Comparison of User Traffic Characteristics on Mobile-Access versus Fixed-Access Networks . . . . . . . . . 32--41 Christian Lyra and Carmem S. Hara and Elias P. Duarte, Jr. BackStreamDB: a Distributed System for Backbone Traffic Monitoring Providing Arbitrary Measurements in Real-Time . . 42--52 Lukasz Golab and Theodore Johnson and Subhabrata Sen and Jennifer Yates A Sequence-Oriented Stream Warehouse Paradigm for Network Monitoring Applications . . . . . . . . . . . . . . 53--63 Nicola Bonelli and Andrea Di Pietro and Stefano Giordano and Gregorio Procissi On Multi--gigabit Packet Capturing with Multi--core Commodity Hardware . . . . . 64--73 Yordanos Beyene and Michalis Faloutsos and Harsha V. Madhyastha SyFi: a Systematic Approach for Estimating Stateful Firewall Performance 74--84 Charalampos Rotsos and Nadi Sarrar and Steve Uhlig and Rob Sherwood and Andrew W. Moore OFLOPS: An Open Framework for OpenFlow Switch Evaluation . . . . . . . . . . . 85--95 Lucas DiCioccio and Renata Teixeira and Martin May and Christian Kreibich Probe and Pray: Using UPnP for Home Network Measurements . . . . . . . . . . 96--105 Moshe Rutgaizer and Yuval Shavitt and Omer Vertman and Noa Zilberman Detecting Pedophile Activity in BitTorrent Networks . . . . . . . . . . 106--115 Maria Konte and Nick Feamster Re-wiring Activity of Malicious Networks 116--125 Rafael R. R. Barbosa and Ramin Sadre and Aiko Pras Difficulties in Modeling SCADA Traffic: a Comparative Analysis . . . . . . . . . 126--135 Ahmed Elmokashfi and Amund Kvalbein and Jie Xiang and Kristian R. Evensen Characterizing Delays in Norwegian $3$G Networks . . . . . . . . . . . . . . . . 136--146 Xiaozheng Tie and Kishore Ramachandran and Rajesh Mahindra On 60 GHz Wireless Link Performance in Indoor Environments . . . . . . . . . . 147--157 Sipat Triukose and Sebastien Ardon and Anirban Mahanti and Aaditeshwar Seth Geolocating IP Addresses in Cellular Data Networks . . . . . . . . . . . . . 158--167 Oana Goga and Renata Teixeira Speed Measurements of Residential Internet Access . . . . . . . . . . . . 168--178 Nevil Brownlee One-Way Traffic Monitoring with iatmon 179--188 Walter de Donato and Pietro Marchetta and Antonio Pescapé A Hands-on Look at Active Probing Using the IP Prespecified Timestamp Option . . 189--199 Matthias Wählisch and Thomas C. Schmidt and Markus de Brün and Thomas Häberlen Exposing a Nation-Centric View on the German Internet --- a Change in Perspective on AS-Level . . . . . . . . 200--210 Anonymous Front Matter . . . . . . . . . . . . . . ??
Thomas Schilling Constraint-Free Type Error Slicing . . . 1--16 Vladimir Komendantsky Subtyping by Folding an Inductive Relation into a Coinductive One . . . . 17--32 Edwin Brady Epic --- a Library for Generating Compilers . . . . . . . . . . . . . . . 33--48 Laurence E. Day and Graham Hutton Towards Modular Compilers for Effects 49--64 Jean-Christophe Filliâtre and K. Kalyanasundaram Functory: a Distributed Computing Library for Objective Caml . . . . . . . 65--81 Christopher Brown and Hans-Wolfgang Loidl and Kevin Hammond ParaForming: Forming Parallel Haskell Programs Using Novel Refactoring Techniques . . . . . . . . . . . . . . . 82--97 Jost Berthold and Andrzej Filinski and Fritz Henglein and Ken Friis Larsen and Mogens Steffensen Functional High Performance Financial IT 98--113 Michael Lesniak Thread-Safe Priority Queues in Haskell Based on Skiplists . . . . . . . . . . . 114--129 Milan Straka Adams' Trees Revisited . . . . . . . . . 130--145 Marco T. Morazán Functional Video Games in CS1 II . . . . 146--162 Jeroen Henrix and Rinus Plasmeijer and Peter Achten GiN: a Graphical Language and Tool for Defining iTask Workflows . . . . . . . . 163--178 Germán Andrés Delbianco and Mauro Jaskelioff and Alberto Pardo Applicative Shortcut Fusion . . . . . . 179--194 Anonymous Back Matter . . . . . . . . . . . . . . ?? Anonymous Front Matter . . . . . . . . . . . . . . ??
Soren Lauesen Why the Electronic Land Registry Failed 1--15 Barbara Paech and Robert Heinrich and Gabriele Zorn-Pauli and Andreas Jung and Siamak Tadjiky Answering a Request for Proposal --- Challenges and Proposed Solutions . . . 16--29 Md. Rashed Iqbal Nekvi and Nazim H. Madhavji and Remo Ferrari and Brian Berenbach Impediments to Requirements-Compliance 30--36 Eltjo R. Poort and Nick Martens and Inge van de Weerd and Hans van Vliet How Architects See Non-Functional Requirements: Beware of Modifiability 37--51 Anne Koziolek Research Preview: Prioritizing Quality Requirements Based on Software Architecture Evaluation Feedback . . . . 52--58 Junjie Wang and Juan Li and Qing Wang and He Zhang and Haitao Wang A Simulation Approach for Impact Analysis of Requirement Volatility Considering Dependency Change . . . . . 59--76 Nguyen Duc Anh and Daniela S. Cruzes and Reidar Conradi and Martin Höst and Xavier Franch Collaborative Resolution of Requirements Mismatches When Adopting Open Source Components . . . . . . . . . . . . . . . 77--93 Tim Gülke and Bernhard Rumpe and Martin Jansen and Joachim Axmann High-Level Requirements Management and Complexity Costs in Automotive Development Projects: a Problem Statement . . . . . . . . . . . . . . . 94--100 Martin Mahaux and Alistair Mavin and Patrick Heymans Choose Your Creativity: Why and How Creativity in Requirements Engineering Means Different Things to Different People . . . . . . . . . . . . . . . . . 101--116 Christian Raspotnig and Andreas Opdahl Supporting Failure Mode and Effect Analysis: a Case Study with Failure Sequence Diagrams . . . . . . . . . . . 117--131 Mohammad Jabed Morshed Chowdhury and Raimundas Matulevi\vcius and Guttorm Sindre and Peter Karpati Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions . . . . . . . . 132--139 Nicolas Genon and Patrice Caire and Hubert Toussaint and Patrick Heymans and Daniel Moody Towards a More Semantically Transparent i* Visual Syntax . . . . . . . . . . . . 140--146 Sebastian Adam Providing Software Product Line Knowledge to Requirements Engineers --- a Template for Elicitation Instructions 147--164 Eric Knauss and Kurt Schneider Supporting Learning Organisations in Writing Better Requirements Documents Based on Heuristic Critiques . . . . . . 165--171 Olawande Daramola and Thomas Moser and Guttorm Sindre and Stefan Biffl Managing Implicit Requirements Using Semantic Case-Based Reasoning Research Preview . . . . . . . . . . . . . . . . 172--178 Jane Cleland-Huang and Mats Heimdahl and Jane Huffman Hayes and Robyn Lutz and Patrick Maeder Trace Queries for Safety Requirements in High Assurance Systems . . . . . . . . . 179--193 Yang Li and Walid Maalej Which Traceability Visualization Is Suitable in This Context? A Comparative Study . . . . . . . . . . . . . . . . . 194--210 Daniel Berry and Ricardo Gacitua and Pete Sawyer and Sri Fatimah Tjong The Case for Dumb Requirements Engineering Tools . . . . . . . . . . . 211--217 Elia Bruni and Alessio Ferrari and Norbert Seyff and Gabriele Tolomei Automatic Analysis of Multimodal Requirements: a Research Preview . . . . 218--224 Elke Hochmüller 10 Myths of Software Quality . . . . . . 225--231 Anonymous Front Matter . . . . . . . . . . . . . . ??
Grzegorz Skorupa and Wojciech Lorkiewicz and Rados\law Katarzyniak A Multi-agent Strategy for Integration of Imprecise Descriptions . . . . . . . 1--10 Kazimierz Wilkosz and Zofia Kruczkiewicz and Tomasz Babczy\'nski Performance Evaluation of Multiagent-System Oriented Models for Efficient Power System Topology Verification . . . . . . . . . . . . . . 11--20 Nguyen Tran Minh Khue and Nhon Van Do Building a Model of an Intelligent Multi-Agent System Based on Distributed Knowledge Bases for Solving Problems Automatically . . . . . . . . . . . . . 21--32 Fu-Shiung Hsieh and Jim-Bon Lin Temporal Reasoning in Multi-agent Workflow Systems Based on Formal Models 33--42 Vinh Gia Nhi Nguyen and Hiep Xuan Huynh and Alexis Drogoul Assessing Rice Area Infested by Brown Plant Hopper Using Agent-Based and Dynamically Upscaling Approach . . . . . 43--52 Vishnuvardhan Mannava and T. Ramesh A Service Administration Design Pattern for Dynamically Configuring Communication Services in Autonomic Computing Systems . . . . . . . . . . . 53--63 Jialin Liu Chemical Process Fault Diagnosis Based on Sensor Validation Approach . . . . . 64--73 Krzysztof Brzostowski and Jaros\law Drapa\la and Jerzy \'Swi\katek System Analysis Techniques in eHealth Systems: a Case Study . . . . . . . . . 74--85 Hsueh-Wu Wang and Ying-Ming Wu and Yen-Ling Lu and Ying-Tung Hsiao Detection of Facial Features on Color Face Images . . . . . . . . . . . . . . 86--101 YuLung Wu Adaptive Learning Diagnosis Mechanisms for E-Learning . . . . . . . . . . . . . 102--110 Wei-Ming Yeh New Integration Technology for Video Virtual Reality . . . . . . . . . . . . 111--117 Hai-Cheng Chu and Szu-Wei Yang Innovative Semantic Web Services for Next Generation Academic Electronic Library via Web 3.0 via Distributed Artificial Intelligence . . . . . . . . 118--124 Shyi-Ming Chen and Yun-Hou Huang and Rung-Ching Chen and Szu-Wei Yang and Tian-Wei Sheu Using Fuzzy Reasoning Techniques and the Domain Ontology for Anti-Diabetic Drugs Recommendation . . . . . . . . . . . . . 125--135 Jia-Shing Sheu and Yi-Ching Kao and Hao Chu Content-Aware Image Resizing Based on Aesthetic . . . . . . . . . . . . . . . 136--145 Nhon Do and Thu-Le Pham A Functional Knowledge Model and Application . . . . . . . . . . . . . . 146--155 Trong Hai Duong and Hai Bang Truong and Ngoc Thanh Nguyen Local Neighbor Enrichment for Ontology Integration . . . . . . . . . . . . . . 156--166 Hsiang-Chuan Liu and Shang-Ling Ou and Hsien-Chang Tsai and Yih-Chang Ou and Yen-Kuei Yu A Novel Choquet Integral Composition Forecasting Model Based on M-Density . . 167--176 Shota Sugiyama and Hidemi Yamachi and Munehiro Takimoto and Yasushi Kambayashi Aggregating Multiple Robots with Serialization . . . . . . . . . . . . . 177--186 Hai Bang Truong and Ngoc Thanh Nguyen A Multi-attribute and Multi-valued Model for Fuzzy Ontology Integrationon Instance Level . . . . . . . . . . . . . 187--197 Keisuke Satta and Munehiro Takimoto and Yasushi Kambayashi Making Autonomous Robots Form Lines . . 198--207 Anonymous Front Matter . . . . . . . . . . . . . . ??
Long Thanh Ngo and Binh Huy Pham Approach to Image Segmentation Based on Interval Type-2 Fuzzy Subtractive Clustering . . . . . . . . . . . . . . . 1--10 M. Javad Zomorodian and Ali Adeli and Mehrnoosh Sinaee and Sattar Hashemi Improving Nearest Neighbor Classification by Elimination of Noisy Irrelevant Features . . . . . . . . . . 11--21 Naveen Kumar and Anamika Gupta and Vasudha Bhatnagar Lattice Based Associative Classifier . . 22--31 Shu-Ling Shieh and Tsu-Chun Lin and Yu-Chin Szu An Efficient Clustering Algorithm Based on Histogram Threshold . . . . . . . . . 32--39 Mary Wu and InTaek Leem and Jason J. Jung and ChongGun Kim A Resource Reuse Method in Cluster Sensor Networks in Ad Hoc Networks . . . 40--50 Hyon Hee Kim and Jinnam Jo and Donggeon Kim Generation of Tag-Based User Profiles for Clustering Users in a Social Music Site . . . . . . . . . . . . . . . . . . 51--61 Tzu-Fu Chiu and Chao-Fu Hong and Yu-Ting Chiu A Proposed IPC-Based Clustering and Applied to Technology Strategy Formulation . . . . . . . . . . . . . . 62--72 Rajermani Thinakaran and Elankovan Sundararajan Cluster Control Management as Cluster Middleware . . . . . . . . . . . . . . . 73--82 Xin He and Huiyun Jing and Qi Han and Xiamu Niu A Novel Nonparametric Approach for Saliency Detection Using Multiple Features . . . . . . . . . . . . . . . . 83--90 Huiyun Jing and Xin He and Qi Han and Xiamu Niu Motion Vector Based Information Hiding Algorithm for H.264/AVC against Motion Vector Steganalysis . . . . . . . . . . 91--98 Xiamu Niu and Zhongwei Shuai and Yongqiang Lin and Xuehu Yan A Novel Coding Method for Multiple System Barcode Based on QR Code . . . . 99--108 Xiaolv Guo and Shu-Chuan Chu and Lin-Lin Tang and John F. Roddick and Jeng-Shyang Pan A Research on Behavior of Sleepy Lizards Based on KNN Algorithm . . . . . . . . . 109--118 Lijun Yan and Shu-Chuan Chu and John F. Roddick and Jeng-Shyang Pan Directional Discriminant Analysis Based on Nearest Feature Line . . . . . . . . 119--128 Cheonshik Kim and Dongkyoo Shin and Dongil Shin and Ching-Nung Yang A $ (2, 2) $ Secret Sharing Scheme Based on Hamming Code and AMBTC . . . . . . . 129--139 Jen-Chi Huang and Wen-Shyong Hsieh An Automatic Image Inpainting Method for Rigid Moving Object . . . . . . . . . . 140--147 Wu-Chih Hu and Jung-Fu Hsu Automatic Image Matting Using Component-Hue-Difference-Based Spectral Matting . . . . . . . . . . . . . . . . 148--157 Hooman Aghaebrahimi Samani and Jeffrey Tzu Kwan Valino Koh and Elham Saadatian Towards Robotics Leadership: An Analysis of Leadership Characteristics and the Roles Robots Will Inherit in Future Human Society . . . . . . . . . . . . . 158--165 Meinu Quan and Xuan Hau Pham and Jason J. Jung and Dosam Hwang Understanding Information Propagation on Online Social Tagging Systems: a Case Study on Flickr . . . . . . . . . . . . 166--174 Namho Chung and Chulmo Koo and Seung-Bae Park Why People Share Information in Social Network Sites? Integrating with Uses and Gratification and Social Identity Theories . . . . . . . . . . . . . . . . 175--184 Chien-wen Shen and Ping-Yu Hsu and Yen-Ting Peng The Impact of Data Environment and Profitability on Business Intelligence Adoption . . . . . . . . . . . . . . . . 185--193 Anonymous Front Matter . . . . . . . . . . . . . . ??
Young Wook Seo and Seong Wook Chae and Kun Chang Lee The Impact of Human Brand Image Appeal on Visual Attention and Purchase Intentions at an E-commerce Website . . 1--9 Seong Wook Chae and Young Wook Seo and Kun Chang Lee Exploring Human Brands in Online Shopping: An Eye-Tracking Approach . . . 10--18 Nam Yong Jo and Kun Chang Lee and Dae Sung Lee Task Performance under Stressed and Non-stressed Conditions: Emphasis on Physiological Approaches . . . . . . . . 19--26 Min Hee Hahn and Do Young Choi and Kun Chang Lee Characteristics of Decision-Making for Different Levels of Product Involvement Depending on the Degree of Trust Transfer: a Comparison of Cognitive Decision-Making Criteria and Physiological Responses . . . . . . . . 27--36 Do Young Choi and Min Hee Hahn and Kun Chang Lee A Comparison of Buying Decision Patterns by Product Involvement: An Eye-Tracking Approach . . . . . . . . . . . . . . . . 37--46 Dae Sung Lee and Kun Chang Lee and Nam Yong Jo The Influence of Team-Member Exchange on Self-reported Creativity in the Korean Information and Communication Technology (ICT) Industry . . . . . . . . . . . . . 47--54 Lingzhi Wang Semi-parametric Smoothing Regression Model Based on GA for Financial Time Series Forecasting . . . . . . . . . . . 55--64 Mythili Asaithambi and Sujatha C. Manoharan and Srinivasan Subramanian Classification of Respiratory Abnormalities Using Adaptive Neuro Fuzzy Inference System . . . . . . . . . . . . 65--73 Nai-Hua Chen An Ant Colony Optimization and Bayesian Network Structure Application for the Asymmetric Traveling Salesman Problem 74--78 S. A. Jafari and S. Mashohor and Abd. R. Ramli and M. Hamiruce Marhaban Expert Pruning Based on Genetic Algorithm in Regression Problems . . . . 79--88 Amirhossein Ghodrati and Shahriar Lotfi A Hybrid CS/PSO Algorithm for Global Optimization . . . . . . . . . . . . . . 89--98 Amirhossein Ghodrati and Mohammad V. Malakooti and Mansooreh Soleimani A Hybrid ICA/PSO Algorithm by Adding Independent Countries for Large Scale Global Optimization . . . . . . . . . . 99--108 Fatemeh Ramezani and Shahriar Lotfi The Modified Differential Evolution Algorithm (MDEA) . . . . . . . . . . . . 109--118 M. A. Soltani-Sarvestani and Shahriar Lotfi and Fatemeh Ramezani Quad Countries Algorithm (QCA) . . . . . 119--129 Vishnuvardhan Mannava and T. Ramesh An Aspectual Feature Module Based Adaptive Design Pattern for Autonomic Computing Systems . . . . . . . . . . . 130--140 Noorhuzaimi Karimah Mohd Noor and Shahrul Azman Noah and Mohd Juzaiddin Ab Aziz Malay Anaphor and Antecedent Candidate Identification: a Proposed Solution . . 141--151 V. Viswanathan and Ilango Krishnamurthi Ranking Semantic Associations between Two Entities --- Extended Model . . . . 152--162 Svetlana Machova and Jana Kleckova The Quantum of Language: a Metaphorical View of Mind Dimension . . . . . . . . . 163--168 Hee-Cheol Kim An Experimental Study to Explore Usability Problems of Interactive Voice Response Systems . . . . . . . . . . . . 169--177 Piotr Chyna\l and Jerzy M. Szyma\'nski and Janusz Sobecki Using Eyetracking in a Mobile Applications Usability Testing . . . . . 178--186 Anonymous Front Matter . . . . . . . . . . . . . . ??
Karel Heyse and Brahim Al Farisi and Karel Bruneel and Dirk Stroobandt Automating Reconfiguration Chain Generation for SRL-Based Run-Time Reconfiguration . . . . . . . . . . . . 1--12 Kizheppatt Vipin and Suhaib A. Fahmy Architecture-Aware Reconfiguration-Centric Floorplanning for Partial Reconfiguration . . . . . . 13--25 Wang Luzhou and Kentaro Sano and Satoru Yamamoto Domain-Specific Language and Compiler for Stencil Computation on FPGA-Based Systolic Computational-Memory Array . . 26--39 Yongjoo Kim and Jongeun Lee and Jinyong Lee and Toan X. Mai and Ingoo Heo and Yunheung Paek Exploiting Both Pipelining and Data Parallelism with SIMD Reconfigurable Architecture . . . . . . . . . . . . . . 40--52 Florent de Dinechin and Laurent-Stéphane Didier Table-Based Division by Small Integer Constants . . . . . . . . . . . . . . . 53--63 Qiang Liu and Wayne Luk Heterogeneous Systems for Energy Efficient Scientific Computing . . . . . 64--75 S. Arash Ostadzadeh and Roel Meeuws and Imran Ashraf and Carlo Galuzzi and Koen Bertels The $ Q^2 $ Profiling Framework: Driving Application Mapping for Heterogeneous Reconfigurable Platforms . . . . . . . . 76--88 Tassadaq Hussain and Muhammad Shafiq and Miquel Peric\`as and Nacho Navarro and Eduard Ayguadé PPMC: a Programmable Pattern Based Memory Controller . . . . . . . . . . . 89--101 Fakhar Anjam and Quan Kong and Roel Seedorf and Stephan Wong A Run-Time Task Migration Scheme for an Adjustable Issue-Slots Multi-core Processor . . . . . . . . . . . . . . . 102--113 Geoffrey Ndu and Jim Garside Boosting Single Thread Performance in Mobile Processors via Reconfigurable Acceleration . . . . . . . . . . . . . . 114--125 Gang Zhou and Li Li and Harald Michalik Complexity Analysis of Finite Field Digit Serial Multipliers on FPGAs . . . 126--137 Shinya Takamaeda-Yamazaki and Shintaro Sano and Yoshito Sakaguchi and Naoki Fujieda and Kenji Kise ScalableCore System: a Scalable Many-Core Simulator by Employing over 100 FPGAs . . . . . . . . . . . . . . . 138--150 Sen Ma and Miaoqing Huang and Eugene Cartwright and David Andrews Scalable Memory Hierarchies for Embedded Manycore Systems . . . . . . . . . . . . 151--162 Takahiro Watanabe and Minoru Watanabe Triple Module Redundancy of a Laser Array Driver Circuit for Optically Reconfigurable Gate Arrays . . . . . . . 163--173 Wei Ting Loke and Yajun Ha A Routing Architecture for FPGAs with Dual-VT Switch Box and Logic Clusters 174--186 Qiwei Jin and Diwei Dong and Anson H. T. Tse and Gary C. T. Chow and David B. Thomas and Wayne Luk Multi-level Customisation Framework for Curve Based Monte Carlo Financial Simulations . . . . . . . . . . . . . . 187--201 Hiroki Nakahara and Tsutomu Sasao and Munehiro Matsuura A Low-Cost and High-Performance Virus Scanning Engine Using a Binary CAM Emulator and an MPU . . . . . . . . . . 202--214 Mohamad Sofian Abu Talip and Takayuki Akamine and Yasunori Osana and Naoyuki Fujita Cost Effective Implementation of Flux Limiter Functions Using Partial Reconfiguration . . . . . . . . . . . . 215--226 Grigorios Mingas and Christos-Savvas Bouganis Parallel Tempering MCMC Acceleration Using Reconfigurable Hardware . . . . . 227--238 Abid Rafique and Nachiket Kapre and George A. Constantinides A High Throughput FPGA-Based Implementation of the Lanczos Method for the Symmetric Extremal Eigenvalue Problem . . . . . . . . . . . . . . . . 239--250 Anonymous Front Matter . . . . . . . . . . . . . . ??