Abstract is missing.
- Low or No Cost Distributed Evolutionary ComputationJuan J. Merelo. 3-4 [doi]
- Automated Algorithm Configuration: Advances and ProspectsThomas Stützle. 5 [doi]
- Statistical Inference for Intelligent Lighting: A Pilot StudyAravind Kota Gopalakrishna, Tanir Ozcelebi, Antonio Liotta, Johan J. Lukkien. 9-18 [doi]
- How Musical Selection Impacts the Performance of the Interaction with the ComputerMickael da Costa, Davide Carneiro, Marcelo Dias, Paulo Novais. 19-28 [doi]
- Detection of Distraction and Fatigue in Groups through the Analysis of Interaction Patterns with ComputersAndré Pimenta, Davide Carneiro, Paulo Novais, José Neves. 29-39 [doi]
- Lifestyle Recommendation System for Treating MalnutritionCristina Bianca Pop, Viorica R. Chifu, Ioan Salomie, Adela Stetco, Roxana Plaian. 41-46 [doi]
- Distributed Event Processing for Goal-Oriented WorkflowsKai Jander, Lars Braubach, Winfried Lamersdorf. 49-58 [doi]
- Agent Based Negotiation of Decentralized Energy ProductionLuca Tasquier, Marco Scialdone, Rocco Aversa, Salvatore Venticinque. 59-67 [doi]
- Models of Autonomy and Coordination: Integrating Subjective and Objective Approaches in Agent Development FrameworksStefano Mariani, Andrea Omicini, Luca Sangiorgi. 69-79 [doi]
- Distributed Runtime Verification of JADE Multiagent SystemsDaniela Briola, Viviana Mascardi, Davide Ancona. 81-91 [doi]
- A Genetic Approach for Virtual Computer Network DesignIgor Saenko, Igor V. Kotenko. 95-105 [doi]
- Gene Expression Programming for Evolving Two-Dimensional Cellular Automata in a Distributed EnvironmentCésar Manuel Vargas Benítez, Wagner Rodrigo Weinert, Heitor Silvério Lopes. 107-117 [doi]
- A Methodology to Develop Service Oriented Evolutionary AlgorithmsPablo García-Sánchez, A. M. Mora, Pedro A. Castillo Valdivieso, J. González, Juan J. Merelo. 119-125 [doi]
- Simulation of Bio-inspired Security Mechanisms against Network Infrastructure AttacksIgor V. Kotenko, Andrey Shorov. 127-133 [doi]
- Improving Grid Nodes Coalitions by Using ReputationPasquale De Meo, Fabrizio Messina, Domenico Rosaci, Giuseppe M. L. Sarné. 137-146 [doi]
- User-Centric Cloud Intermediation ServicesLuís Nogueira, Jorge Coelho. 147-153 [doi]
- Multi-agent Negotiation of Decentralized Energy Production in Smart Micro-gridAlba Amato, Beniamino Di Martino, Marco Scialdone, Salvatore Venticinque. 155-160 [doi]
- Towards Elastic Component-Based Cloud ApplicationsAlexander Pokahr, Lars Braubach. 161-171 [doi]
- Mixed Clustering Methods to Forecast Baseball TrendsHéctor D. Menéndez, Miguel Vázquez, David Camacho. 175-184 [doi]
- SACOC: A Spectral-Based ACO Clustering AlgorithmHéctor D. Menéndez, Fernando E. B. Otero, David Camacho. 185-194 [doi]
- Anomalous Web Payload Detection: Evaluating the Resilience of 1-Grams Based ClassifiersSergio Pastrana, Carmen Torrano-Gimenez, Hai Thanh Nguyen, Agustín Orfila. 195-200 [doi]
- Online Gamers Classification Using K-meansFernando Palero, Cristian Ramírez-Atencia, David Camacho. 201-208 [doi]
- Semantic Information Fusion of Linked Open Data and Social Big Data for the Creation of an Extended Corporate CRM DatabaseAna I. Torre-Bastida, Esther Villar-Rodriguez, Javier Del Ser, Sergio Gil-Lopez. 211-221 [doi]
- Time-Frequency Social Data Analytics for Understanding Social Big DataDuc T. Nguyen, Dosam Hwang, Jason J. Jung. 223-228 [doi]
- Modeling Open Accessibility Data of Public TransportPaloma Cáceres, Almudena Sierra-Alonso, Carlos E. Cuesta, Belén Vela, José María Cavero Barca. 229-236 [doi]
- A Machine Learning Attack against the Civil Rights CAPTCHACarlos Javier Hernández Castro, David F. Barrero, María Dolores Rodríguez-Moreno. 239-248 [doi]
- Regression from Distributed Data Sources Using Discrete Neighborhood Representations and Modified Stalked Generalization ModelsHéctor Allende-Cid, Claudio Moraga, Héctor Allende, Raúl Monge. 249-258 [doi]
- On a Machine Learning Approach for the Detection of Impersonation Attacks in Social NetworksEsther Villar-Rodriguez, Javier Del Ser, Sancho Salcedo-Sanz. 259-268 [doi]
- A Study of Machine Learning Techniques for Daily Solar Energy Forecasting Using Numerical Weather ModelsRicardo Aler, Ricardo Martín, José María Valls, Inés María Galván. 269-278 [doi]
- AGGE: A Novel Method to Automatically Generate Rule Induction Classifiers Using Grammatical EvolutionRomaissaa Mazouni, Abdellatif Rahmoun. 279-288 [doi]
- Expansion Quality of Epidemic ProtocolsPasu Poonpakdee, Giuseppe Di Fatta. 291-300 [doi]
- Ontology and Rules-Based Model to Reason on Useful Contextual Information for Providing Appropriate Services in U-Healthcare SystemsAmina HameurLaine, Kenza Abdelaziz, Philippe Roose, Mohamed-Khireddine Kholladi. 301-310 [doi]
- Following the Problem Organisation: A Design Strategy for Engineering EmergenceVictor Noël, Franco Zambonelli. 311-317 [doi]
- Core Heuristics for Preference-Based Scheduling in Virtual Organizations of Utility GridsVictor V. Toporkov, Anna S. Toporkova, Alexey Tselishchev, Dmitry Yemelyanov, Petr Potekhin. 321-330 [doi]
- Locality Aware Task Scheduling in Parallel Data Stream ProcessingZbynek Falt, Martin Krulis, David Bednárek, Jakub Yaghob, Filip Zavoral. 331-342 [doi]
- A Survey of Social Web Mining Applications for Disease Outbreak DetectionGema Bello Orgaz, Julio Hernandez-Castro, David Camacho. 345-356 [doi]
- Social Tagging Analytics for Processing Unlabeled Resources: A Case Study on Non-geotagged PhotosTuong Tri Nguyen, Dosam Hwang, Jason J. Jung. 357-367 [doi]
- 2D-SocialNetworks: AWay to Virally Distribute Popular Information Avoiding SpamPasquale De Meo, Fabrizio Messina, Domenico Rosaci, Giuseppe M. L. Sarné. 369-375 [doi]
- The Effect of Topology on the Attachment Process in Trust NetworksVincenza Carchiolo, Alessandro Longheu, Michele Malgeri, Giuseppe Mangioni. 377-382 [doi]
- Data Fusion in a Multi Agent System for Person Detection and Tracking in an Intelligent RoomMatei Chiperi, Mihai Trascau, Irina Mocanu, Adina Magda Florea. 385-394 [doi]
- Emergence of Norms in Multi-agent Societies: Influence of Population Size and TopologyMarius Tudor Benea, Mihai Trascau. 395-401 [doi]
- From Intentions to Plans: A Contextual Planning GuidanceAhmed-Chawki Chaouche, Amal El Fallah-Seghrouchni, Jean-Michel Ilié, Djamel-Eddine Saïdouni. 403-413 [doi]
- A Parallel and a Distributed Implementation of the Core Paths Graph AlgorithmDomenico Pascarella, Salvatore Venticinque, Rocco Aversa, Massimiliano Mattei, Luciano Blasi. 417-426 [doi]
- A Semantic Driven Approach for Requirements VerificationGabriella Gigante, Francesco Gargiulo, Massimo Ficco. 427-436 [doi]
- An Hybrid Architecture to Enhance Attacks Detection on IT infrastructureMario Sicuranza, Giovanni Paragliola, Cesario Di Sarno, Alessia Garofalo. 437-442 [doi]
- A View-Based Acces Control Model for EHR SystemsMario Sicuranza, Angelo Esposito, Mario Ciampi. 443-452 [doi]
- Resilient Semantic Sensor MiddlewareGianpio Benincasa, Giuseppe D'Aniello, Matteo Gaeta, Vincenzo Loia, Francesco Orciuoli. 453-463 [doi]
- Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case StudyLuigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Carmine Massei, Luigi Romano. 465-474 [doi]