M. Chakraborty and N. .. Deb, and Nabendu Chaki Context Driven Approach for Enterprise Architecture Framework, p.277

P. Chakraborty and A. , Sarkar Localization based Anti-Void Clustering Approach (LAVCA) for Energy Efficient Routing in Wireless Sensor Network, p.290

M. Golasowski, J. Bispo-martinovi?, K. Slaninová, J. M. , and .. , Cardoso Clustering of Mobile Subscriber's Location Statistics for Travel Demand Zones Diversity 315 Marcin Luckner, Aneta Ros?an, Izabela Krzemi?ska, Jaros?aw Legierski, and Robert Kunicki Share Market Sectoral Indices Movement Forecast with Lagged Correlation and Association Rule Mining, 327 Giridhar Maji, Soumya Sen, and Amitrajit Sarkar Task Allocation Strategies for FPGA Based Heterogeneous System on Chip, p.341

A. Majumder, S. Saha, and .. , and Amlan Chakrabarti Productivity Oriented Cooperative Approach to Scheduling IT Project Tasks, p.354

T. Nowicki and R. , Waszkowski Sequential Purchase Recommendation System for E-Commerce Sites, p.366

S. Saini, S. Saumya, J. Prakash-singh, and .. , Industrial Management and Other Applications Risk Assessment in a Parallel Production System with the Use of FMEA Method and Linguistic Variables, p.379

O. Chebbi, E. Fatnassi-contents, X. ?widerski, K. ?mieta?ska, J. Kurek et al., Type Surface Defects in Furniture Elements with the Use of Textural Features Jaros?aw Górski, and Arkadiusz Or?owski Smart Building Climate Control Considering Indoor and Outdoor Parameters, 402 Micha? Kruk, 412 Batyrkhan Omarov, Aigerim Altayeva, and Young Im Cho Service Strategies in Two-Server Tandem Configurations ? Modeling and Investigation

E. Fatnassi, H. Kaabi-fractional, and .. , Order Linear Systems Modeling in Time and Frequency Domains 502 Wiktor Jakowluk Maximization of, Attractiveness EV Tourist Routes, p.514

J. Karbowska-chilinska, P. Design, and .. , 526 Adam Klimowicz XX Contents Self-organizing Traffic Signal Control with Prioritization Strategy Aided by Vehicular Sensor Network, 536 Marcin Lewandowski, Bart?omiej P?aczek, and Marcin Bernas Infinite Impulse Response Approximations to the Non-integer Order Integrator Using Cuckoo Search Algorithm . . . . . . . . . . . . . . . . . . . . . . . . 548

S. Mahata, S. Kumar-saha, and .. , Rajib Kar, and Durbadal Mandal Designing Moore FSM with Transformation of State Codes, p.557

K. Mielcarek, A. Barkalov, and L. , Titarenko Efficient Simulation of Interacting Particle Systems in Continuous Space and Time, 569 Tomasz O?a?ski Sampling Method for the Flow Shop with Uncertain Parameters . . . . . . . . . . 580

P. Rajba, M. Wodecki-state, and .. , Assignment of Finite-State Machines by Using the Values of Input Variables, p.592

V. Salauyou, M. Ostapczuk-nonnegative, and .. , Matrix Factorization Based Decomposition for Time Series Modelling, p.604

T. Sidekerskien?, M. Wo?niak, and .. , and Robertas Dama?evi?ius Various Aspects of Computer Security Evil-AP -Mobile Man-in-the-Middle Threat, p.617

K. Bre?ski, M. Cho?uj, and M. , Luckner Intention to Adopt the Cash on Delivery (COD) Payment Model for E-commerce Transactions: An Empirical Study 628 Mohanad Halaweh A Signature Scheme Based on Implicit and Explicit Certificates Against k-Traitors Collusion Attack, 638 Tomasz Hyla and Jerzy Peja?

R. Kozik and R. M?odzikowski, and Micha? Chora? Application of XGBoost Algorithm in Fingerprinting Localisation Task, p.661

M. Luckner, B. Topolski, and M. , Mazurek Contents XXI Developing Countermeasures against Cloning of Identity Tokens in Legacy Systems 672 Pavel Moravec and Michal Krumnikl Analysis of Specific Personal Information Protection Assessment in the Social Security and Tax Number System of Local Governments in Japan, 685 Sanggyu Shin, p.697