Abstract is missing.
- Message from the Workshop Chairs: CDS 2013Norihiro Ishikawa, Yoshia Saito, Hiroshi Mineno. [doi]
- Customizing k-Gram Based Birthmark through Partial Matching in Detecting Software TheftsHyun-il Lim. 1-4 [doi]
- Fingerprint Clustering for Forensic Data IndexingWei-Ho Tsai, Cin-Hao Ma. 5-10 [doi]
- Cloud Server Aided Computation for ElGamal Elliptic Curve CryptosystemNarn-Yih Lee, Zih-Ling Chen, Fu-Kun Chen. 11-15 [doi]
- Towards a Better Similarity Measure for Keyword Profiling via ClusteringY. Liang, K. P. Chow, Lucas Chi Kwong Hui, J. Fang, S. M. Yiu, Shuhui Hou. 16-20 [doi]
- Development and Evaluation of Guideline Total Support System for Evidence Preservation by Using an Android PhoneWataru Takahashi, Ryoichi Sasaki, Tetsutaro Uehara. 21-26 [doi]
- Understanding Requirements for Online Services Based on Users' Behavioural Data AnalysisQing Zhou, Lin Liu. 27-34 [doi]
- An Adaptive Control Strategy for Managing Concurrent Service Requests in Service-Based SystemsWen-Long Zhu, Bei-Bei Yin, Kai-Yuan Cai, Dazhi Huang, Stephen S. Yau. 35-40 [doi]
- A Feedback-Based Approach to Validate SWRL Rules for Developing Situation-Aware SoftwareJoonseok Park, Keunhyuk Yeom. 41-46 [doi]
- A Case Study of Adaptive Combinatorial TestingChanghai Nie, Siyang Chen, Hareton Leung, Kai-Yuan Cai. 47-52 [doi]
- Service-Oriented Maintainability Modeling and Analysis for a Cloud ComputingYoshinobu Tamura, Shigeru Yamada. 53-58 [doi]
- Reducing the Number of Initial Database States for Integration TestingHaruto Tanno, Takashi Hoshino. 59-64 [doi]
- Opportunities for Clone Detection in Test Case RecommendationMostafa Erfani, Iman Keivanloo, Juergen Rilling. 65-70 [doi]
- Using Dependency Relations to Improve Test Case Generation from UML StatechartsValentin Chimisliu, Franz Wotawa. 71-76 [doi]
- Incrementally Applicable t-Wise Combinatorial Test Suites for High-Strength Interaction TestingAndrea Calvagna, Emiliano Tramontana. 77-82 [doi]
- A Multi-order Markov Chain Based Scheme for Anomaly DetectionWenyao Sha, Yongxin Zhu, Tian Huang, Meikang Qiu, Yan Zhu, Qiannan Zhang. 83-88 [doi]
- Hybrid Authorization Conflict Detection by Inferring Partial Data in RDF Access ControlJaehoon Kim. 89-94 [doi]
- Heuristic Path Pruning Algorithm Based on Error Handling Pattern Recognition in Detecting VulnerabilityDong Chen, Yang Zhang, Liang Cheng, Yi Deng, Xiaoshan Sun. 95-100 [doi]
- Using Security and Domain Ontologies for Security Requirements AnalysisAmina Souag, Camille Salinesi, Isabelle Wattiau, Haris Mouratidis. 101-107 [doi]
- A Petri Net Based Model for Trustworthy Software Process CompositionXuan Zhang, Tong Li 0004, Zhongwen Xie, Fei Dai 0002, Jin-Zhuo Liu. 108-114 [doi]
- Transparent Security-Sensitive Process Protection via VMM-Based Process ShadowingXiaoguang Wang, Yong Qi, Yue-hua Dai, Jianbao Ren. 115-120 [doi]
- Privacy-Preserving Two-Party k-Means Clustering in Malicious ModelRahena Akhter, Rownak Jahan Chowdhury, Keita Emura, Tamzida Islam, Mohammad Shahriar Rahman, Nusrat Rubaiyat. 121-126 [doi]
- Privacy-Aware Community Sensing Using Randomized ResponseShunsuke Aoki, Masayuki Iwai, Kaoru Sezaki. 127-132 [doi]
- An Abstraction Method of Behaviors for Process AlgebraJinho On, Yeongbok Choe, Moonkun Lee. 133-138 [doi]
- Cost Optimization Strategy for Iterative Integration of Multi-critical Functions in IMA and TTEthernet ArchitectureMichael Lauer, John Mullins, Moez Yeddes. 139-144 [doi]
- Conceptual Modeling of the Organisational Aspects for Distributed Applications: The Semantic Lifting ApproachVedran Hrgovcic, Dimitris Karagiannis, Robert Woitsch. 145-150 [doi]
- A Practical Software Model for Content Aggregation in Browsers Using Recent Advances in HTML5Marat Zhanikeev. 151-156 [doi]
- Building Adaptive Accessible Context-Aware for User Interface Tailored to Disable UsersLamia Zouhaier, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed. 157-162 [doi]
- An Integrated Formal Model for Context-Aware SystemsEun-Sun Cho, Tae-Seob Yoon, Joong-Hyun Choi, Joon-Young Paik, Sumi Helal. 163-168 [doi]
- ArgoAWS-UML: Modeling Tool for Adaptive Web ServicesChiraz El Hog, Raoudha Ben Djemaa, Ikram Amous. 169-174 [doi]
- Modeling and Verification of Call Setup Dynamics of LTE Communication SystemsIshtiaq Ahmed Choudhry, Nazir Ahmad Zafar, Mohammed Al-Zahrani. 175-180 [doi]
- Model Checking for SpaceWire Link Interface Design Using UppaalPing Luo, Rui Wang, Xiaojuan Li, Yong Guan, Hongxing Wei, Jie Zhang. 181-186 [doi]
- Refinement Based Modeling of Workflow Applications Using UML Activity DiagramsAhlem Ben Younes, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed, Rahma Jlassi. 187-192 [doi]
- Predictive Notification Service of Privacy Invasion on Posting Pictures to SNSShigeru Shimada, Isao Echizen. 193-199 [doi]
- Towards Privacy-Friendly Transparency Services in Inter-organizational Business ProcessesMeiko Jensen. 200-205 [doi]
- An LOF-Based Adaptive Anomaly Detection Scheme for Cloud ComputingTian Huang, Yan Zhu, Qiannan Zhang, Yongxin Zhu, Dongyang Wang, Meikang Qiu, Lei Liu. 206-211 [doi]
- A File-Distribution Approach to Achieve High Availability and Confidentiality for Data Storage on Multi-cloudYuuki Kajiura, Atsushi Kanai, Shigeaki Tanimoto, Hiroyuki Sato. 212-217 [doi]
- Easy Access to Provenance: An Essential Step Towards Trust on the WebTom De Nies, Sam Coppens, Ruben Verborgh, Miel Vander Sande, Erik Mannens, Rik Van de Walle, Danius T. Michaelides, Luc Moreau. 218-223 [doi]
- Formal Modeling of Trust-Based Access Control in Dynamic CoalitionsNadim Sarrouh. 224-229 [doi]
- Investigating the Relevance of Linked Open Data Sets with SPARQL QueriesThomas Holst, Edzard Höfig. 230-235 [doi]
- Implementation of Metadata Quality Metrics and Application on Public Government DataKonrad Johannes Reiche, Edzard Höfig. 236-241 [doi]
- A Device for Transparent Probabilistic Packet MarkingMasayuki Okada, Nasato Goto, Akira Kanaoka, Eiji Okamoto. 242-247 [doi]
- Towards Unified Vulnerability Assessment with Open DataAkihito Nakamura. 248-253 [doi]
- Using a Trust Model to Reduce False Positives of SIP Flooding Attack Detection in IMSNoppawat Chaisamran, Takeshi Okuda, Suguru Yamaguchi. 254-259 [doi]
- Security Software Based on Windows NDIS Filter DriversShin-Shung Chen, Tzong-Yih Kuo, Yu-Wen Chen. 260-264 [doi]
- A Patrol Guidance Mechanism in a Context-Aware EnvironmentChin-Chih Chang, Judy C. R. Tseng, Hao-Yun Chang. 265-270 [doi]
- System Evolution for Unknown Context through Multi-action EvaluationAsanga Nimalasena, Vladimir Getov. 271-276 [doi]
- A Knowledge-Based Development Approach with Fact and Service for End-User in Cloud ComputingRui Zhou, Jing Li, Jinghan Wang, Guowei Wang. 277-282 [doi]
- UBI-Tree: Indexing Method for Schema-Less SearchYutaka Arakawa, Takayuki Nakamura, Motonori Nakamura, Hajime Matsumura. 283-288 [doi]
- A P2P Delivery Method for Sensor Data Stream Based on Load Estimation from Collection CyclesTomoya Kawakami, Yoshimasa Ishi, Tomoki Yoshihisa, Yuuichi Teranishi. 289-294 [doi]
- The Service Design of Intelligent Robot (iRobot) for EntertainmentTung-Hsiang Chou. 295-299 [doi]
- Game theoretic analysis of the value exchange systemSumiko Miyata, Hirotsugu Kinoshita, Tetsuya Morizumi, Li Chao. 300-305 [doi]
- Closed-Circuit Television-Enabled Service: A Review of Security and Privacy IssuesYu-Lung Wu, Chi-Jui Chang, Yu-Hui Tao. 306-309 [doi]
- The Study of Brand Perception through Social Network Sites and Corporate Social Responsibility ProgramsRungsiman Nararatwong, Nagul Cooharojananone, Nattarat Pongsupankij, Rajalida Lipikorn, Kanokwan Atchariyachanvanich. 310-315 [doi]
- A Problem Solver for Scheduling Workflows in Multi-agents Systems Based on Petri NetsFu-Shiung Hsieh, Jim-Bon Lin. 316-321 [doi]
- Social Network Data Retrieving Using Semantic TechnologyReen-Cheng Wang, Ting-Han Su, Cheng-Peng Ma, Shih-Hung Chen, Hsi-Ho Huang. 322-327 [doi]
- Design and Implementation of a Novel Weighted Shortest Path Algorithm for Maze Solving RobotsBehnam Rahnama, Makbule Canan Ozdemir, Yunus Kiran, Atilla Elçi. 328-332 [doi]
- Towards an Information Extraction System Based on Ontology to Match Resumes and JobsDuygu Çelik, Askyn Karakas, Gulsen Bal, Cem Gultunca, Atilla Elçi, Basak Buluz, Murat Can Alevli. 333-338 [doi]
- Efficiency of Parallelisation of Genetic Algorithms in the Data Analysis ContextDimitri Perrin, Christophe Duhamel. 339-344 [doi]
- Toward an mHealth Intervention for Smoking CessationG. M. Tanimul Ahsan, Ivor D. Addo, Sheikh Iqbal Ahamed, Daniel Petereit, Shalini Kanekar, Linda Burhansstipanov, Linda U. Krebs. 345-350 [doi]
- Performance Evaluation of Cloud-Based Parallel ComputingYuto Nakai, Dimitri Perrin, Hiroyuki Ohsaki, Ray Walshe. 351-355 [doi]
- Automatic Indexing and Creating Semantic Networks for Agricultural Science Papers in the Polish LanguagePiotr Wrzeciono, Waldemar Karwowski. 356-360 [doi]
- Heterogeneous Closed Information Sources and Open ServicesTeruhisa Hochin. 361-366 [doi]
- Privacy Preserved Attribute Aggregation to Avoid Correlation of User Activities across Shibboleth SPsMotonori Nakamura, Takeshi Nishimura, Kazutsuna Yamaji, Hiroyuki Sato, Yasuo Okabe. 367-372 [doi]
- Implementation and Evaluation of the Well-Distribution Algorithm for an Overlay NetworkTakuma Oide, Atsushi Takeda, Takuo Suganuma, Akiko Takahashi. 373-378 [doi]
- Privacy Enhancing Proxies in Attribute Releases: Two ApproachesHiroyuki Sato, Yasuo Okabe, Takeshi Nishimura, Kazutsuna Yamaji, Motonori Nakamura. 379-384 [doi]
- Flexible Access and Priority Control System Based on 802.1X Authentication in Time of DisasterToshiki Watanabe, Shunichi Kinoshita, Yasuhiro Yamasaki, Hideaki Goto, Hideaki Sone. 385-390 [doi]
- Interactive Augmented Reality Game for Enhancing Library Instruction in Elementary SchoolsYi-Shiang Wang, Chih-Ming Chen, Chin-Ming Hong, Yen-Nung Tsai. 391-396 [doi]
- A Customized Visiting Route Service under RFID EnvironmentChieh-Yuan Tsai, Bo-Han Lai. 397-402 [doi]
- Enhancing Diversity-Accuracy Technique on User-Based Top-N Recommendation AlgorithmsWichian Premchaiswadi, Pittaya Poompuang, Nipat Jongsawat, Nucharee Premchaiswadi. 403-408 [doi]
- Affective Robot Enabled Capacity and Quality Improvement of Nursing Home Aged Care Services in AustraliaRajiv Khosla, Mei-Tai Chu, Khanh Nguyen. 409-414 [doi]
- Analyzing Distribution of Implicit Semantic Information in Web ServicesXiaocao Hu, Zhiyong Feng, Shizhan Chen. 415-420 [doi]
- An Activity Ontology for Context-Aware Health Promotion ApplicationAnindhita Dewabharata, Don Ming-Hui Wen, Shuo-Yan Chou. 421-426 [doi]
- Forecasting Reading Anxiety to Promote Reading Performance Based on Annotation BehaviorTing-Yun Lu, Mi Lin, Chih-Ming Chen, Jhih-Hao Wu. 427-432 [doi]
- Definition and Detection of Control-Flow Anti-patterns in Process ModelsZhaogang Han, Peng Gong, Li Zhang, Jiming Ling, Wenqing Huang. 433-438 [doi]
- A Structural Analysis of SLAs and Dependencies Using Conceptual Modelling ApproachWilliam W. Song, Aijaz Soomro, Yang Li, Qin Liu. 439-444 [doi]
- Auction-Based Resource Provisioning with SLA Consideration on Multi-cloud SystemsChi-Chung Chang, Kuan-Chou Lai, Chao-Tung Yang. 445-450 [doi]
- Implementation of Video and Medical Image Services in CloudChao-Tung Yang, Kuan-Lung Huang, William C. Chu, Kuan-Chou Lai, Chih-Hung Chang, Chih-Wei Lu. 451-456 [doi]
- Cloud Migration for SMEs in a Service Oriented ApproachNicolas Nussbaumer, Xiaodong Liu. 457-462 [doi]
- An Improvement to Data Service in Cloud Computing with Content Sensitive Transaction Analysis and AdaptationChih-Wei Lu, Chih-Ming Hsieh, Chih-Hung Chang, Chao-Tung Yang. 463-468 [doi]
- A Software-Reuse Method from Model1 to SSH2Xiaoyu Wang, Hongwei Ruan, Yan Wang, Hua Li, Hongji Yang. 469-474 [doi]
- A Three-Dimensional Approach to Evolving SoftwareShang Zheng, Hongji Yang. 475-480 [doi]
- Analyzing and Predicting Software Quality Trends Using Financial PatternsAseel Hmood, Juergen Rilling. 481-486 [doi]
- A Hybrid Cloud Storage Architecture for Service Operational High AvailabilityYen-Hung Kuo, Yu-Lin Jeng, Juei-Nan Chen. 487-492 [doi]
- Delivering Dependable Reusable Components by Expressing and Enforcing Design DecisionsAndrea Calvagna, Emiliano Tramontana. 493-498 [doi]
- Automatically Characterising Components with Concerns and Reducing TanglingEmiliano Tramontana. 499-504 [doi]
- Utilization of Method Graphs to Measure Cohesion in Object Oriented SoftwareAtakan Aral, Tolga Ovatman. 505-510 [doi]
- An UML Behavior Diagram Based Automatic Testing ApproachChih-Hung Chang, Chih-Wei Lu, William C. Chu, Xin-Hao Huang, Dianxiang Xu, Tse-Chuan Hsu, Yu-Bin Lai. 511-516 [doi]
- Power Allocation Algorithms of PoE for On-Demand Power SupplyMasaya Yokohata, Tomotaka Maeda, Yasuo Okabe. 517-522 [doi]
- An Implementation of a Still Picture Internet Broadcasting System with Audience-Oriented QoS Control for Smartphones and PCs AudienceYuki Nakano, Natsuki Hirota, Yoshia Saito, Yuko Murayama. 523-527 [doi]
- Towards a Multi-screen Application Model for the WebLouay Bassbouss, Max Tritschler, Stephan Steglich, Kiyoshi Tanaka, Yasuhiko Miyazaki. 528-533 [doi]
- Elevator Acceleration Sensing: Design and Estimation Recognition Algorithm Using CrowdsourcingTianhui Yang, Katsuhiko Kaji, Nobuo Kawaguchi. 534-539 [doi]
- Multiagent System for Priority-Based Load Shedding in MicrogridTakumi Kato, Hideyuki Takahashi, Kazuto Sasai, Yujin Lim, Hak-Man Kim, Gen Kitagata, Tetsuo Kinoshita. 540-545 [doi]
- Projection-Based User Interface for Smart Home EnvironmentsChin-Yang Lin, Yi-Bin Lin. 546-549 [doi]
- A Home Gateway Box with Meter, Probe and L2 QoS Policy EdgeMarat Zhanikeev. 550-555 [doi]
- An ADS-B Based Secure Geographical Routing Protocol for Aeronautical Ad Hoc NetworksMohamed Slim Ben Mahmoud, Nicolas Larrieu. 556-562 [doi]
- On the Use of Congestion Information for Rerouting in the Disaster Evacuation Guidance Using Opportunistic CommunicationAkihiro Fujihara, Hiroyoshi Miwa. 563-568 [doi]
- Consideration of Network Selection Criteria on IP Mobility Communications Quality by Real-Time Status and/or Statistical InformationYasuhiro Ohishi, Kaori Maeda, Takemi Sahara, Naoki Hayashi, Reiji Aibara. 569-574 [doi]
- An Optimal Route Selection Mechanism for Outbound Connection on IPv6 Site Multihoming EnvironmentTakuya Yamaguchi, Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Koki Okamoto, Motonori Nakamura. 575-580 [doi]
- E-Mail Priority Delivery System with Dynamic Whitelist in the Layer 3 SwitchGada, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura. 581-586 [doi]
- Domain Registration Date Retrieval System of URLs in E-Mail Messages for Improving Spam DiscriminationMasayuki Matsuoka, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura, Masato Minda. 587-592 [doi]
- Identifying User Authentication Methods on Connections for SSH Dictionary Attack DetectionAkihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga. 593-598 [doi]
- A Scalable Server Load Balancing Method Using IP Address StealingKunihiko Toumura, Naokazu Nemoto. 599-603 [doi]
- Analysis of Temporal Latency Variation on Network Coordinate System for Host Selection in Large-Scale Distributed NetworkHiroshi Yamamoto, Katsuyuki Yamazaki. 604-609 [doi]
- Parallel Evolutionary P2P Networking Technique Evaluating Network Topologies SequentiallyKei Ohnishi, Mario Köppen. 610-615 [doi]
- Knaster Procedure for Proportional Fair Wireless Channel AllocationMario Köppen, Kei Ohnishi, Masato Tsuru. 616-620 [doi]
- A Distributed Protective Approach for Multiechelon Supply SystemsXiaoyi Zhang, Zheng Zheng, Yueni Zhu, Kai-Yuan Cai. 621-626 [doi]
- Target Application Grouping Function Considering Software Updates on Application Execution Control SystemDaisuke Okamoto, Masanori Fujiwara, Keita Kawano, Nariyoshi Yamai. 627-632 [doi]
- Effects of Moral Judgement, Emotional Control and Problem Solving on Information Ethics of Gifted Students in Computer ScienceHan-Sung Kim, Sooleen Nam, Won-Gyu Lee, Kichun Nam, DaiYoung Kwon. 633-638 [doi]
- Development and Application of the Information Ethical Sensitivity Measurement Tool for College Students in KoreaSoAh Gwak, Hansung Kim, WonGyu Lee. 639-643 [doi]
- Method for Keeping Small Distance from Users to Servers during Failures by Link ProtectionNao Maeda, Hiroyoshi Miwa. 644-649 [doi]
- Managing Networks Independently of the Physical Topology by Service Defined NetworkYasuhiro Teramoto, Rei Atarashi, Yoshifumi Atarashi, Yasuo Okabe. 650-655 [doi]
- Supporting the Software Development Process Using Social Media: Experiences with Student ProjectsReyes Juárez-Ramírez, Rafael Pimienta-Romo, Violeta Ocegueda-Miramontes. 656-661 [doi]
- Gaining Industrial Confidence for the Introduction of Domain-Specific LanguagesArjan J. Mooij, Jozef Hooman, Rob Albers. 662-667 [doi]
- Industrial Requirements on Evolution of an Embedded System ArchitectureDaniel Hallmans, Thomas Nolte, Stig Larsson. 668-673 [doi]
- Partitioning Decision Process for Embedded Hardware and Software DeploymentGaetana Sapienza, Tiberiu Seceleanu, Ivica Crnkovic. 674-680 [doi]
- Refactoring and automated testing of distributed ERP systemsKhalid Ebanhesaten, Franz-Felix Fussl, Detlef Streitferdt. 681-684 [doi]
- Certifiable Development Process for Information Processing in the Measurement Domain on the Base of 3W-ModelsIrina Gushchina, Wolfgang Fengler, Jirka Ciemala, Detlef Streitferdt. 685-690 [doi]
- Analyzing Distributed Java Applications by Automatic CentralizationLei Ma, Cyrille Artho, Hiroyuki Sato. 691-696 [doi]
- Efficient Construction of Presentation Integration for Web-Based and Desktop Development ToolsMatthias Biehl, Josune de Sosa, Martin Törngren, Oscar Diaz. 697-702 [doi]
- PetaFlow - An Example of Communication and Computational Technologies with Social ImpactAlexandre Ancel, Ingo Assenmacher, Ken-ichi Baba, Julien Cisonni, Yo Fujiso, P. Goncalves, Matthieu Imbert, Koji Koyamada, P. Neyron, Kazunori Nozaki, Hiroyuki Ohsaki, Anne-Cécile Orgerie, Xavier Pelorson, Bruno Raffin, Naohisa Sakamoto, Eisaku Sakane, Shinji Shimojo, Annemie Van Hirtum, Shigeo Wada. 703-708 [doi]
- Parallel Caching for Scientific VisualizationAlexandre Ancel, Bruno Raffin, Ingo Assenmacher, Annemie Van Hirtum, Yo Fujiso, Kazunori Nozaki. 709-712 [doi]
- A Scalable Approach to Avoid Incast Problem from Application LayerYukai Yang, Hirotake Abe, Ken-ichi Baba, Shinji Shimojo. 713-718 [doi]
- Multi-constrained Routing Algorithm: A Networking EvaluationVan Dan Nguyen, Thomas Begin, Isabelle Guérin Lassous. 719-723 [doi]
- An Architectural Design of a Job Management System Leveraging Software Defined NetworkYasuhiro Watashiba, Susumu Date, Hirotake Abe, Kohei Ichikawa, Hiroaki Yamanaka, Eiji Kawai, Haruo Takemura. 724-729 [doi]
- A Note on the Accuracy of Several Existing Approximations for M/Ph/m QueuesThomas Begin, Alexandre Brandwajn. 730-735 [doi]
- A Practical Study on Distributed Resolution Service for ICNYuncheng Zhu, Akihiro Nakao. 736-741 [doi]
- Service-Oriented Router-Based CDN System: An SoR-Based CDN Infrastructure Implementation on a Real Network EnvironmentJanaka Wijekoon, Shinichi Ishida, Erwin Harahap, Hiroaki Nishi. 742-747 [doi]
- Packet Classification Using Multi-iteration RFCChun-Hui Tsai, Hung-Mao Chu, Pi-Chung Wang. 748-753 [doi]
- DRANs: Resilient Disaster Recovery Access NetworksQuang Tran Minh, Kien Nguyen, Shigeki Yamada. 754-759 [doi]
- Flow Control for Higher Resiliency in Wide Area Distributed Cloud ComputingHitoshi Yabusaki, Masakuni Agetsuma, Hiroshi Nakagoe, Koichi Murayama, Hiroyuki Osaki, Masami Hiramatsu, Takatoshi Kato. 760-764 [doi]
- Hybrid Control Model for Flow-Based NetworksOthman M. M. Othman, Koji Okamura. 765-770 [doi]