| Paper Id | Title | First Name | Surname | 
        
	  | 32 | Taking Lessons from Cognitive Psychologists to Design our Content Browsing Tools? | Francis | ROUSSEAUX | 
        
	  | 44 | Business Process Verification using a Pi-Calculus Virtual Machine | Marcos Vanine | Nader | 
        
	  | 49 | From OLAP Query Algebra to Graphical OLAP Query Language | Ronan | TOURNIER | 
        
	  | 53 | Expressing variability for patterns re-use | Nicolas | Arnaud | 
        
	  | 54 | Days of Responsibility per Network Failure | Ning | Chang | 
        
	  | 57 | New Transform for Improving Compression Performance in Natural Language Text | Ashutosh | Gupta | 
        
	  | 62 | On the Representation of Ideas | Ron | Summers | 
        
	  | 68 | Remote Control based on Multi Agents Systems | Hicham | MEDROMI | 
        
	  | 78 | Economic Approaches to Information Security Management: Current Practice and Future Challenges | Xiaomeng | Su | 
        
	  | 103 | An information system upon information systems for managing and coordinating information system development process | Thang | Le Dinh | 
        
	  | 110 | Comparing the Trust and Security Models of Four Mobile Agent Platforms | Michail | Fragkakis |