Web Spam, Propaganda and Trust

1 downloads 0 Views 626KB Size Report
ranking, which follows marketing practices of the real world. Mixing search results with paid ..... 0.175_http://www.the-worldwide-affiliate-network.com/.
Web Spam, Propaganda and Trust Panagiotis T. Metaxas

Joseph DeStefano

Computer Science Department Wellesley College Wellesley, MA 02481, USA

Math and Computer Science Department College of the Holy Cross Worcester, MA 01610, USA

[email protected]

[email protected]

ABSTRACT

General Terms

Web spamming, the practice of introducing artificial text and links into web pages to affect the results of searches, has been recognized as a major problem for search engines. It is also a serious problem for users because they are not aware of it and they tend to confuse trusting the search engine with trusting the results of a search. In this paper, we first analyze the influence that web spam has on the evolution of the search engines and we identify the strong relationship of spamming methods to propagandistic techniques in society. Our analysis provides a foundation to understanding why spamming works and offers new insight on how to address it. In particular, it suggest that one could use anti-propagandistic techniques in the web to recognize spam. The second part of the paper demonstrates such a technique, called backwards propagation of distrust. In society, recognition of an untrustworthy message (in the opinion of a particular person or other social entity) is a reason for questioning the entities that recommend the message. Entities that are found to strongly support untrustworthy messages become untrustworthy themselves. So, social distrust is propagated backwards for a number of steps. Our algorithm simulates this social behavior on the web graph. In our algorithm, starting from an untrustworthy (according to the end user) site s, we examine its trust neighborhood, that is, the neighborhood of sites that link to s in a few steps. Evaluating the sites-members of the neighborhood we identify a biconnected component (BCCs) with a high percentage of untrustworthy sites. BCCs are formed when there are multiple paths to reach s, thus indicating a concerted effort to promote s. This is not the case when starting from a trustworthy site. Our tool explores thousands of nodes within minutes and could be deployed at the browser-level, making it possible to resolve the moral question of who should be making the decision of weeding out spammers in favor of the end user. Our approach can lead to browser-level web spam filters that work in synergy with the powerful search engines to deliver personalized, trusted web results.

Algorithms, Experimentation, Social Networks, Propaganda, Trust

Categories and Subject Descriptors H.3.3 [Information Storage and Retrieval]: Information Search and Retrieval; H.3.m [Information Storage and Retrieval]: Miscellaneous Copyright is held by the author/owner(s). AIRWeb2005, May 10, 2005, Chiba, Japan.

Keywords search, Web graph, link structure, PageRank, HITS, Web spam

1.

INTRODUCTION

Web spamming is often defined as the practice of manipulating web pages in order to cause search engines to rank some web pages higher than they would without any manipulation1 . Spammers aim at search engines, but target the end users. Their motive is usually commercial, but can also be political, or religious. One of the reasons behind the users’ difficulty to distinguish trustworthy from untrustworthy information comes from the success that both search engines and spammers have enjoyed in the last decade. Users have come to trust search engines as a means of finding information, and spammers have successfully managed to get them to transfer that trust to the results of each search. From their side, the search engines have put considerable effort in delivering spam-free query results and have developed sophisticated ranking strategies. Two such ranking strategies that have received major attention are the wellknown PageRank [6] and HITS [28] algorithms. Achieving high PageRank has become a sort of obsession for many companies’ IT departments, and the raison d’ˆetre of spamming companies. Some estimates indicate that at least 8% of all pages indexed is spam [12] while experts consider web spamming the single most difficult challenge web searching is facing today. [23]. Search engines typically see web spam as an interference to their operations and would like to restrict it, but there can be no algorithm that can recognize spamming sites based solely on graph isomorphism [5]. First, however, we need to understand why spamming works beyond the technical details, because spamming is a social problem first, then a technical one. In this paper we show its extensive relationship to social propaganda, and evidence of its influence on the evolution of search engines. 1 We should mention here that there is not a complete agreement on the definition of web spam among authors, which leads to some confusion. Moreover, to people unfamiliar with web spam, the term is mistaken for email spam. A more descriptive name for it would be “search engine ranking manipulation.”

Our approach can explain the reasons web spamming has been so successful and suggest new algorithmic ways of dealing with it. Finally, we discuss what we believe should be a frame for the long-term approach to web spam. The rest of this paper is organized as follows. The next section gives an overview of the problem of web spamming and information reliability for a general audience. Section 3 discussed the relationship between webgraph and the trust social network while the following section analyzes the evolution of search engines as their response to spam. Section 5 describes the backward propagation of distrust method and the following section presents some of our experimental results running this algorithm. Section 7 discusses some related research and the final section has our conclusions and some discussion of future directions of this work.

2.

BACKGROUND

The web has changed the way we inform and get informed. Every organization has a web site and people are increasingly comfortable accessing it for information for any question they may have. The exploding size of the web necessitated the development of search engines and web directories. Most people with online access use a search engine to get informed and make decisions that may have medical, financial, cultural, political, security or other important implications [10, 40, 24, 32]. Moreover, 85% of the time, people do not look past the first ten results returned by the search engine [38]. Given this, it is not surprising that anyone with a web presence struggles for a place in the top ten positions of relevant web search results. The importance of the top-10 placement has given birth to a new industry, which claims to sell know-how for prominent placement in search results and includes companies, publications, and even conferences. Some of them are willing to bend the truth in order to fool the search engines and their customers, by creating web pages containing web spam [12]. The creators of web spam are often specialized companies selling their expertise as a service, but can also be the web masters of the companies and organizations that would be their customers. Spammers attack search engines through text and link manipulations [23, 19]: • Text spam: This includes excessively repeating text and/or adding irrelevant text on the page that will cause incorrect calculation of page relevance; adding misleading meta-keywords or irrelevant “anchor text” that will cause incorrect application of rank heuristics. • Link spam: This technique aims to change the perceived structure of the webgraph in order to cause incorrect calculation of page reputation. Such examples are the so-called “link-farms”, “mutual admiration societies”, page “awards”, domain flooding (plethora of domains that re-direct to a target site), etc. Both kinds of spam aim to boost the ranking of spammed web pages. Sometimes cloaking is included as a third spamming technique [23, 20]. Cloaking aims to serve different pages to search engine robots and to web browsers (users). These pages could be created statically or dynamically. Static pages, for example, may employ hidden links and/or hidden text with colors or small font sizes noticeable by a crawler but not by a human. Dynamic pages might change content on the fly depending on the visitor, submit millions of pages

to “add-URL” forms of search engines, etc. We consider the false links and text themselves to be the spam, while, strictly speaking, cloaking is not spam, but a tool that helps spammers hide their attacks. Since anyone can be an author on the web, these practices have naturally created a question of information reliability. An audience used to trusting the written word of newspapers and books is unable, unprepared or unwilling to think critically about the information obtained from the web. A recent study [17] found that while college students regard the web as a primary source of information, many do not check more than a single source, and have trouble recognizing trustworthy sources online. In particular, two out of three students are consistently unable to differentiate between facts and advertising claims, even “infomercials.” Very few of them would double-check for validity. At the same time, they have considerable confidence in their abilities to distinguish trustworthy sites from non-trustworthy ones, especially when they feel technically competent. We have no reason to believe that the general public will perform any better than well-educated students. In fact, a recent analysis of internet related fraud by a major Wall Street law firm [10] puts the blame squarely on the investors for the success of stock fraud cases.

3.

THE WEBGRAPH AS A SOCIAL NET

The web is typically represented by a directed graph [8]. The nodes in the webgraph are the pages (or sites) that reside on servers on the internet. Arcs correspond to hyperlinks that appear on web pages (or sites). Web spammers are trying to alter the web graph in ways beneficial to them. The theory of social networks of Trust [41] also uses directed graphs to represent relationships between social entities. The nodes correspond to social entities (people, institutions, ideas). Arcs correspond to recommendations between the entities they connect. Propagandists are trying to alter the trust social net in ways beneficial to them. This connection is more than just a similarity in descriptions. The web itself is a social creation, and both PageRank and HITS are socially inspired ranking algorithms. [6, 28, 36]. Socially inspired systems are subject to socially inspired attacks, however. Not surprisingly then, the theory of propaganda detection [31] can provide intuition into the dynamics of the web graph. First developed in the beginning of World War II by the Institute for Propaganda Analysis [15, 31], the theory of propaganda detection identifies several techniques that propagandists often employ in order to manipulate perception. Name calling, glittering generalities, testimonial, bandwagon and transfer are the more well-known of them. PageRank is based on the assumption that the reputation of an entity (a web page in this case) can be measured as a function of both the number and reputation of other entities linking to it. A link to a web page is counted as a “vote of confidence” to this web site, and in turn, the reputation of a page is divided among those it is recommending 2 . The implicit assumption is that hyperlink “voting” is taking place independently, without prior agreement or central 2 Since HTML does not provide for “positive” and “negative” links, all links are taken as positive. This is not always true, but is considered a reasonable assumption. Recently, Google introduced the “nofollow” attribute for hyperlinks, but it is very unlikely that web spammers will use it.

Graph Theory node node weight node weight computation arc arc arc arc arc

meaning weight weight computation weight range

Web Graph web page or site rank (accord. to SE) ranking formula automatic hyperlink vote of confidence degree of confidence ranking formula [0 . . . 1]

Trust Social Network social entity reputation (accord. to user) based on top recommenders on demand trust opinion recommendation degree of entrustment arbitrary, semi-consistent [distrust . . . trust]

Table 1: Graph theoretic correspondence between the Webgraph and the Trust Social Network. control. Spammers, like social propagandists, form structures that are able to gather a large number of such “votes of confidence” by design, thus breaking the assumption of independence in a hyperlink. Table 1 has the correspondence between graph theoretic terms, the web graph according to a search engine, and the trust social network of a particular user.

4.

EVOLUTION OF SEARCH ENGINES

In the early 90’s, when the web numbered just a few million servers, the first generation search engines were ranking search results using classic information retrieval techniques: the more rare words two documents share, the more similar they are considered to be. [37, 22] A search query Q is simply a short document and the results of a search for Q are ranked according to their (normalized) similarity to the query. The first attack to this “tf.idf ranking,” as it is known, came from within the search engines. Around 1995, search engines started selling search keywords to advertisers as a way of generating revenue: If a search query contained a “sold” keyword, the results would include targeted advertisement and a higher ranking for the link to the sponsor’s web site. This is the first time we have a socially inspired ranking, which follows marketing practices of the real world. Mixing search results with paid advertisement raised serious ethical questions, but also showed the way to financial profits to spammers who started their own attacks by creating pages containing many rare keywords to obtain a higher ranking score. In terms of propaganda theory, the spammers employed a variation of the technique of glittering generalities to confuse the first generation search engines [31, pg. 47]: The propagandist associates one or more suggestive words without evidence to alter the conceived value of a person or idea. To avoid spammers search engines would keep secret their exact ranking algorithm. Secrecy is no defense, however, since secret rules were figured out by experimentation and reverse engineering. (e.g., [35, 33]). Second generation search engines started employing more sophisticated ranking techniques in an effort to nullify the effects of glittering generalities. One of the more successful techniques was based on the “link voting principle”: Each web site s has value equal to its “popularity”, which is influenced by the set Bs of sites pointing to site s. Lycos became the champion of this ranking technique and

had its own popularity skyrocket around 1996.[34]. Doing so, it was also distancing itself from the ethical questions introduced by combining advertising with ranking. Unfortunately, this ranking method did not succeed in stopping spammers either. Spammers started creating clusters of interconnected web sites that had identical or similar contents with the site they were promoting, which subsequently became known as “link farms” (LF). The link voting principle was socially inspired, so spammers used the well known propagandistic method of bandwagon to circumvent it [31, pg. 105]: With it, the propagandist attempts to convince us that all members of a group to which we belong are accepting his program and that we must therefore follow our crowd and “jump on the band wagon”. Similarly, the spammer is promoting the impression of a high degree of popularity by inter-linking many internally controlled sites that will eventually all share high ranking. The introduction of PageRank in 1998 was a major development for search engines, because it seemed to provide a more sophisticated anti-spamming solution. Under PageRank, not every link contributes equally to the “reputation” of a page. Instead, links from highly reputable pages contribute much higher than links from other sites. That way, the site networks developed by spammers would not influence much their PageRank, and Google became the search engine of choice. HITS is another socially-inspired ranking which has also received a lot of attention. [28]. The HITS algorithm divides the sites related to a query between “hubs” and “authorities”. Hubs are sites that contain many links to authorities, while authorities are sites pointed to by the hubs and they both gain reputation. PageRank and HITS marked the development of the third generation search engines 3 . Unfortunately, spammers have again found ways of circumventing them. In PageRank, a page enjoys absolute reputation: its reputation is not restricted on some particular issue. Spammers deploy sites with expertise on irrelevant subjects, and they justifiably acquire high ranking on their expert sites. Then they bandwagon their networked sites with the expert sites, creating a “mutual admiration society” (MAS). This is the well-known propagandistic technique of testimonials [31, pg. 74]: Well known people (entertainers, public figures, etc.) offer their opinion on issues about which they are not experts. HITS has also shown to be highly spammable by this tech3

[7] considers the search engines in our 2nd and 3rd generation to be in the same group. We believe that both the ranking and attack methods put them in different categories.

nique due to the fact that its effectiveness depends on the accuracy of the initial neighborhood calculation. The table below summarizes our findings for the first three generations of search engines and the correspondence between web spam and social propaganda. SE 1st Gen 2nd Gen 3rd Gen

Ranking Doc Similarity + Site popularity + Page reputation

Spamming keyword stuffing + link farms + mutual admiration societies

Propaganda glittering generalities + bandwagon + testimonials

Web search corporations are reportedly busy developing the engines of the next generation [7]. The new search engines hope to be able to recognize “the need behind the query” of the user. Given the success the spammers have enjoyed so far, one wonders how will they spam the fourth generation engines. Is it possible to create a ranking that is not spammable? Put another way, can the web as a social space be free of propaganda? Seen in this light, it appears that we are trying to create in cyberspace what societies have not succeeded in creating in their social space. This may not be possible. However, we can learn to live in a web with spam as we live in society with propaganda, given appropriate education and technology.

5.

AN ANTI-PROPAGANDISTIC METHOD

Web Spam seems to be the driving force behind the evolution of search engines in their effort to provide quality results. So far, the battle with web spam is only waged at the search engine level, though the end users are the ones affected directly by it. When users query a popular search engine for questions that happen to be the target of unreliable advertisement (e.g., “Can human growth hormone increase muscle mass?”) or happen to be controversial in nature (e.g., “is ADHD a real disease?”), they find plethora of responses that can be considered untrustworthy. For example, the first query provides almost exclusively links to human growth hormone (hGH) products that, among other benefits, would significantly increase muscle mass without increased exercise, decrease fat without change in diet or habits, enhance sexual performance, increase the good cholesterol while decreasing the bad, re-grow hair, decrease blood pressure, remove wrinkles, and increase memory retention. Similarly, in the second query one finds an unbalanced view of attentiondeficit, hyperactivity disorder (ADHD) that does not include the opinion of major institutions such as the American Psychiatric Association or clinicians in major research universities. To the inexperienced user it may appear that the search engine promotes untrustworthy, unreliable or unbalanced views. What really happens, of course, is that these queries have been the target of spammers. Since spammers employ propagandistic techniques, it makes sense to design anti-propagandistic methods for defending against them. These methods need to be user-initiated. We are considering trustworthiness to be a personal decision, not an absolute quality of a site. One person’s gospel is another’s political propaganda, and our goal is to design methods that help individuals make more informed deci-

sions about the quality of the information they find on the web. Here is one way that people defend against propaganda in every day life: In society, when an untrustworthy recommendation is detected, it gives us a reason to reconsider the trustworthiness of the recommender. Recommenders who strongly support an untrustworthy recommendation become untrustworthy themselves. This process is selectively repeated a few times, propagating the distrust backwards to those who strongly support the recommendation. The results of this process become part of our belief system and are used to filter future information. We set out to test whether a similar process might work on the web. Our algorithm takes as input the URL of the server s containing a page that the user determined to be untrustworthy. This page could have come to the user through web search results (like the ones above) or via the suggestion of some trusted associate (e.g., a society that the user belongs to). Starting from s we build a breadth-first search (bfs) tree of the sites that link to s in a few “clicks” (Figure 1). We do not explore the web neighborhood directly in this step. Instead, we use the Google API [16] for finding the backlinks. We call the directed graph that is revealed by the backlinks, the “trust neighborhood” of s. The question arises on whether we should distrust all of the sites in the trust neighborhood of s or not. Is it reasonable to become suspicious of every site pointing to s in a few steps? They are “voting in confidence” after all. Such a radical approach is not what we do in everyday life. Rather, we selectively propagate distrust only to those that most strongly support an untrustworthy recommendation. Thus, we decided to take a conservative approach and examine only those sites that show a more concerted effort in supporting s. In particular, we focused on the biconnected component (BCC) that includes s (Figure 2). A BCC is a graph that cannot be broken into disconnected pieces by deleting any single vertex. An important characteristic of the BCC is there are at least two independent paths from any of its vertices to s. Strictly speaking, the BCC is computed on the undirected graph. But since the trust neighborhood is generated through the bfs, the cross edges (in bfs terminology) create cycles in the undirected graph (Figure 1). Each cycle found in the BCC must have at least one “ring leader”, from which there are two directed paths to s, one leaving through the discovery edge and the other through the cross edge. We view the existence of multiple paths from ring leaders to s as evidence of strong support of s. The BCC reveals the members of this support group. More formally, the algorithm is as follows: Input: Untrustworthy site s. S = {s} Using BFS for depth D do: Find the set U of sites linking to sites in S using the Google API (up to B backlinks / site) Ignore blogs, directories, edu’s S = S + U Compute and output the BCC of S that includes s

Figure 1: An example of a breadth-first search tree in the trust neighborhood of site 1. Note that some nodes (12, 13, 16 and 29) have multiple paths to site 1. We call these nodes “ring leaders” that show a concerted effort to support 1.

To be able to implement the above algorithm at the browser side, we restrict the following parameters: First, the BFS’s depth D is set to 3. We are not interested in exploring a large chunk of the web, just a small neighborhood around s. Second, we limit the number B of backlink requests from the Google API to 30 per site. Finally, we introduced in advance a set of stop sites that are not to be explored further. A stop site is one that should not be included in the trust neighborhood either because the trustworthiness of such a site is irrelevant, or because it cannot be defined. In the first category we placed URLs of educational institutions (domains ending in .edu). Academicians are not in the business of pointing to commercial sites. When they do, they do not often convey trust in the site. In the latter we placed a few well known Directories (URLs ending in yahoo.com, dmoz.org, etc.) and Blog sites (URLs containing the string ’blog’ or ’forum’). Anyone can put an entry into an unsupervised blog or directory. No effort to create an exhaustive list of blogs or directories was made. With these restrictions, our algorithm can be implemented on an average workstation and produce graphs with up to a few thousand nodes within minutes. Note that the slowest step is the query of the backlinks. More recently, a threaded version of the program can explore several thousand sites in minutes.

6.

Figure 2: The BCC of the trust neighborhood of site 1 is drawn in a circular fashion for clarity.

EXPERIMENTAL RESULTS

In our experiments, we examined the trust graphs of eight untrustworthy and two trustworthy sites, collected from the search results of the first hGH query and of query “Benefits of Calcium supplements”. In the table 2 below these sites are labeled as U-1 to U-8 and T-1 to T-2, respectively. See Figure 3 for an example of one such site (U-1). We run the experiments between September 17 and November 5, 2004. We should note here that all sites have comparable PageRank. In fact, all but U-1 and T-1 have PageRank 5. The remaining two sites have PageRank 6. (Pageranks were recorded at the time of the experiments.) To determine the trustworthiness of each site we had an evaluator look at a sample of the sites of the BCC. Due to the significant manual labor involved, only 20% of the total 1,396 BCC sites were sampled and evaluated. To select the sample sites, we employed stratified sampling with skip interval 5. The stratum used was similarity of the site to the starting site. Each site in the sample was classified as either Trustworthy, Untrustworthy, or Non-determined. The last category includes a variety of sites for which the evaluator could not clearly classify due to the language used in the site, the subject matter, or the fact that a Blog or Directory can not fall simply into one of the U/T categories. (Not every blog contains the string “blog” in their URL.) The experiments show that the trustworthiness of the starting site was a very good predictor for the trustworthiness of the BCC sites. In fact, there were very few trustworthy sites in the trust graph of sites U-1 to U-8. As one might expect, a trustworthy site is unlikely to deliberately link to an untrustworthy site, or even to a site that “associates” itself with an untrustworthy one. In other words, the “vote of confidence” analogy holds true for sites that are responsibly

Evaluation of Trust Neighborhoods

100%

80%

Percent of U and T sites in neighborhood

60% T 40%

U

20%

0% U-1

U-2

U-3

U-4

U-5

U-6

U-7

U-8

T-1

T-2

8 Untrustworthy and 2 Trustworthy starting sites

ra g le o c y m :/w tp h _ 5 3 .1 0

re x lu ic n o s a m :/w tp h _ 5 .6 0

m c g n u k a rid flo :/w tp h _ 6 3 .1 0

m -c re fa o s :/w tp h _ .1 0

a e ln o c s :/w tp h _ 6 8 .1 0

c iln m ro e z :/w tp h _ 7 .2 0

m -k n u o c is d :/w tp h _ 4 8 .1 0

m io c a :/w tp h _ .2 0

m c s in lro a :/w tp h ._ 0

m o k li-c e a s :/w tp h _ 8 .1 0

firc e o ls u n a :/m tp h _ 4 2 .1 0

m o rc g e -d a s in :/w tp h _ 8 .2 0

lm a -e n u o c is d :/w tp h _ 3 .8 0

m e u n o lic a :/b tp h _ 2 .5 0

m ro n a c u d :/e tp h _ .2 0

fo lin :/a tp h _ 6 .1 0

m y c a x re fo :/w tp h _ 3 4 .2 0

o c e lb m a k :/w tp h _ 3 5 .1 0

g c ra s in e m -o k :/u tp h _ 5 8 .1 0

i lb -e s o n y k a z :/w tp h _ 3 .2 0

rs u o ld a z e n :/w tp h _ .7 0

io 0 c d n a s rk u :/w tp h _ 8 3 .1 0 u m o lc q fs rk n a d e b :/w tp h _ 4 .2

a n o s e :/w tp h _ 2 5 .1 0

c s i-o v la e :/w tp h _ 3 .9 0

m ic o x fle n y s :/w tp h _ 3 6 .4 0

m lc io a e :/w tp h _ 3 8 .1 0

m c n o d ls e v ra :/w tp h _ 2 8 .1 0

n u ic d -ls e m :/ro tp h _ 7 1 .2 0

m c s e iv n fla o :/w tp h _ 5 9 .1 0

c s e iv ld a rm u o :/w tp h _ 3 5 .2 0

o c d m s e :/w tp h _ 6 .1 0

m c s -re y d lio a :/b tp h _ 4 .9 0

m s n lo e rc a :/b tp h _ 7 .1 0

m c re -g s o n y k a z :/w tp h _ 5 .1 0

m c a -v o d in :/w tp h _ .1 0

n ry v c is ld e o :/w tp h _ 2 .1 0

m 0 o c ln e v ira :/w tp h _ 8 6 .3 0 m c y d rli-o s u a :/w tp h _ 1 .5

m o c -a e n d y s :/w tp h _ 3 .1 0

c y ilb v a re o m :/w tp h _ 5 .9 0

m n riv s o lc a :/w tp h _ 5 .1 0

k riln a e c :/w tp h _ 3 .9 0

m c s u lo e v ra z n :/w tp h _ 9 0 .1 z b u ic d ls e -o n :/ja tp h _ 7 9 .1 0

u c m o d k g in e b :/w tp h _ 2 3 .1 0

m e frc n io s a :/w tp h _ 5 .6 0

k u o rv e l-s c a fin :/w tp h _ .1 0

m o ic u g rn a le :/w tp h _ .4 0

m o c -a :/w tp h _ 3 4 .1 0

m o c jily d :/w tp h _ 2 .1 0

o s g a :/w tp h _ 9 .1 0

rg s n e o :/w tp h _ 3 .7 0

m o s k ric d n e b :/w tp h _ 6 1 .2 0 r0 m s a -c lie n o :/w tp h _ 5 .1

s ru lc a e :/w tp h _ 8 9 .1 0

m o a rc e d s in :/w tp h _ 4 1 .3 0

e s n o k y m :/w tp h _ 4 .1 0

m o ig ls n re a c :/w tp h _ 3 4 .1 0

m s c ie rn la u o :/w tp h _ 4 .7 0

k u rg o 9 -7 s b :/w tp h _ 6 5 .1 0 m k o b c -a y e rv u s :/w tp h _ 9 .3 0

m o rc v 4 e k s a b :/w tp h _ 2 7 .1 0

c a v ld o :/m tp h ._ 0

m c ig o re :/w tp h _ 1 .2 0

z b o n d re c y m fix :/w tp h _ 5 1 .2 0

m o jc k in fre :/w tp h _ 5 .2 0

k u c s y a rlid o :/w tp h _ 7 4 .1 0

m o lc z ra s n ik b :/w tp h _ 5 .2 0 lrc in s u -b e m o :/w tp h _ 1 .3 0

o rc e g a m s k :/lin tp h _ 9 .1 0 rv u n ifc a -s y lo m e :/w tp h _ 8 .2 0

u a m o iy c b lw :/e tp h _ 7 .9 0

k u o ln r-ie a c :/w tp h _ 8 .4 0

m c x fe o s :/w tp h _ 4 .2 0

m n -z c u o s re :/w tp h _ 3 7 .1 0

o ifc rm n e :/w tp h _ 7 3 .1 0

m c a n o ld u b :/w tp h _ 9 .1 0

m c u y 4 la n o d :/w tp h _ 9 .2 0

-le o in d :/g tp h ._ 0

m o c e rk la :/w tp h _ .3 0

m fc o s v n a :/w tp h _ 3 .1 0

m c 4 o :/w tp h _ 3 .2 0 m c v g in -s le b rd fo a :/w tp h _ 3 8 .1 0

o n lm u r-s e b y c :/w tp h _ 6 .4 0

Figure 4: Histogram of the results in table 2.

n x a e m :/w tp h _ 7 .3 0

m o c e li-rv a b :/w tp h _ 7 6 .1 0

m o rc ie :/w tp h _ .1 0

m o c n e v ra 3 2 b :/u tp h _ 7 6 .1 0

m c ils o n ru a :/w tp h _ 2 .1 0

a b m o lc fu :/w tp h _ 8 2 .3 0

m c o e ru :/w tp h _ 4 .1 0

m o c e g ly ru :/w tp h _ 1 6 .2 0

m jc o d n :/w tp h _ 3 .1 0

m c lfn id v re o :/s tp h _ 8 3 .1 0

m o u y d in c :/w tp h _ 4 .2 0

c n m o ld a b :/w tp h _ 3 4 .2 0

m o rs ln -c d a e :/w tp h _ 4 .3 0

o y m a s u d ric n e g :/w tp h _ 2 4 .1 0 0 c ira k :/w tp h _ 4 .2

c v m -ire lo a k :/w tp h _ 8 1 .2 0

u o y l4 a c i-x rm n e :/w tp h _ 1 .2 0

m o d g a c x e k lin :/w tp h _ 8 .2 0 m o fc ls e :/w tp h _ 1 4 .3 0

s fin a g e :/m tp h _ 4 6 .2 0

u 2 v -a n re c s :/w tp h _ 6 8 .1 0

m c rd fa o s :/w tp h _ 6 .2 0

m o c e lv a ig rn :/d tp h _ 4 .2 0

m o a s c :/w tp h _ 1 3 .2 0

m o c x e d n ig :/w tp h _ 4 .9 0

m o c k lin fs je :/w tp h _ 8 4 .2 0

m n o y lc a :/w tp h _ 9 .4 0 m y -c ie rld o :/w tp h _ 8 3 .1 0

rg o s u :/w tp h ._ 0

l n y z jo :/w tp h _ 4 3 .1 0

m o c rfile a s 5 :/w tp h _ 1 4 .2 0

m c liy a n o rs e :/w tp h _ 5 8 .2 0 m s fid n o c e :/w tp h _ 7 8 .2 0 k u ls e d a rc o :/w tp h _ 7 4 .1 0 i a m ro n b :/w tp h _ 5 2 .0 m o ilc d s b e :/w tp h _ 1 .3 0

e d c g a ilm :/w tp h _ .7 0

m ric u -n a b lo g :/w tp h _ 5 .3 0

m o c rin b e w :/g tp h ._ 0 c n m le s u o b a :/w tp h _ 7 .3 0

lo u n m k c a b :/w tp h _ 3 5 .2 0 ifo n -g m re u s :/w tp h _ 4 .3 0

o lc a im n :/w tp h _ 8 7 .1 0

s u ly e r-d g ia v :/w tp h _ 1 .9 0

m lro a ic n e x :/w tp h _ 4 7 .2 0

o c n m le u -s 1 :/w tp h _ 9 4 .2 0

e n o ls ia c :/w tp h _ 3 2 .1 0 0 m in c -s le b rd fo a :/w tp h _ 6 .2

m c o ls a e 9 :/w tp h _ 2 5 .1 0 g o n -lm d e c ru :/s tp h _ 7 2 .1 0

g d re o u s :/w tp h _ 8 5 .1 0 m n u o r-y a le c :/w tp h _ 9 2 .1 0

m o c ilrg :/w tp h _ 5 3 .2 0

e lo y c rm a :/w tp h _ 6 .8 0

c s rb o m a :/e tp h _ 1 .4 0 c re fa o s m 3 x :/w tp h _ 4 6 .2 0

n y c rm -a e :/w tp h _ 5 .1 0

e m liu ra o c :/w tp h _ 8 1 .2 0 c iz b e m ro g :/w tp h _ 6 8 .1 0

o c d e lim n u z :/w tp h _ 4 .1 0

m a s y o c ire d :/w tp h _ 7 4 .2 0 0 k u o c m a :/w tp h _ .5

u a y lg o n c e im :/w tp h _ 1 6 .2 0 m c o n fix w s rb :/e tp h _ 4 .1 0

rg o c s lfin a e :/w tp h _ 1 .3 0

c e n z la u rm fo :/w tp h _ 6 .2 0

m c irx s o n y :/w tp h _ 7 .2 0

e n m o rc a :/w tp h _ 8 2 .3 0

rg o q s d a :/w tp h _ 5 .1 0

is o d n e :/w tp h _ 8 .3 0

rlifc -y s u a o n e :/m tp h _ 7 8 .3 0

ic m ro e a :/w tp h _ .2 0 m c lo ig s fa z e :/w tp h _ 6 5 .1 0

m o c k ifa g rb e u s :/w tp h _ 3 .5 0 o c g k rm e n liy a u q :/w tp h _ 7 .1 0 0 fo rin s e :/w tp h _ 6 .2

m c k b s -lo ig e :/w tp h _ 4 8 .1 0 o c q s fn e a lim u :/w tp h _ 9 .1 0

c m g iro n a s :/w tp h _ 6 .2 0

z rb g ia v d e :/m tp h _ 3 5 .2 0

0 k u c -ie n d a ro b :/w tp h _ 6 2 .1 lm o e is c n fra :/w tp h _ 3 5 .2 0

m ie s c u rd lo g :/w tp h _ 2 7 .1 0 m rc o s :/w tp h _ 1 .2 0

8 7 :/6 tp h _ 9 .1 0

m c l7 o rx ig v :/w tp h _ .9 0

o s fn e l-d a rim :/w tp h _ 8 4 .2 0 o c rm g e v s la :/w tp h _ 6 .1 0

y n rm u g fe o c :/w tp h _ 8 .1 0

m o c s u x n a re g :/w tp h _ 1 .2 0

m o y rs lic e g n a :/w tp h _ 8 3 .2 0

m o c n 7 v :/w tp h _ 4 .2 0

o s a m lik c :/w tp h _ 4 9 .1 0

fo in e m d a :/w tp h _ 1 .2 0

rd c e u g :/w tp h _ 5 .1 0 c n lfy s -m d e riz o u a :/w tp h _ 1 7 .2 0

m c s id l-k a o :/w tp h _ 8 7 .2 0

k u c s e o g -rin a :/w tp h _ 7 9 .1 0

m c iy u q l-rn a o :/w tp h _ 7 .2 0

o c g n rk film -a b e :/w tp h _ 3 5 .2 0

m o s d e c a :/w tp h _ 9 5 .2 0

ilc b o -m n re :/w tp h _ 7 .1 0

m c ig s o e -n :/w tp h _ 7 9 .1 0

o s -e g rin :/w tp h _ 1 6 .2 0

m o c z ie s :/w tp h _ 5 3 .1 0

m u lia s n o -c b e d :/w tp h _ 8 3 .1 0

o c in rz s a m b e :/w tp h _ 7 1 .2 0

m o c b :/w tp h _ 2 6 .1 0

m o ifc g e n :/w tp h _ 9 .7 0

m c ra e lf-in o z :/w tp h _ .2 0

m s o g ile c ra :/w tp h _ 7 6 .1 0

m o c k in d b :/w tp h _ 5 .2 0 m o 4 rc u l-is a n e d :/w tp h _ 6 3 .1 0

m c -d a b in ls e o :/w tp h _ 7 2 .1 0

im v d a n l-o e c :/w tp h _ 5 7 .1 0

l e fm s ra n o c :/w tp h _ 5 8 .2 0

iz n rg o d a le :/w tp h _ 7 .2 0

z b 1 4 g in e rk a m :/w tp h ._ 0

a c ird b y k :/s tp h _ 1 3 .2 0

lm o c s e fin :/w tp h _ 2 7 .1 0

c v -s e a rg o m :/w tp h _ 9 6 .1 0

n s -ilo a e k c u b :/w tp h _ 2 1 .3 0

m o e z a c g ru d :/w tp h _ 6 .9 0

jc y -n s e a rg o m :/w tp h _ 2 3 .1 0

lm a n is re -c d o g :/w tp h _ 7 6 .1 0

m c s o re -a k u :/w tp h _ 8 9 .1 0

f rg m lia s n o -c b e d :/w tp h _ 1 .5 0

e s n rlo a -c 4 :/w tp h _ 3 .1 0

m c x a rn o k :/w tp h _ 9 .2 0

m g in d a k c -o s re fu :/w tp h _ 5 .1 0

l a rc e s n o m :/w tp h _ 4 3 .1 0

in s a rc u o y :/w tp h _ 5 2 .1 0

m o is -c rja e n :/w tp h _ 2 .1 0

o c n u m :/ja tp h _ 6 3 .1 0

m c u s o g -in fre :/w tp h _ .7 0

k u ie n o c :/w tp h _ 7 .1 0

je flu c rd m i-a o n :/w tp h _ 5 9 .1 0

m o c s g -a ry n e :/w tp h _ 1 .5 0

m o c s y u b ia v :/w tp h _ 9 5 .2 0

iz lf-b e s :/w tp h _ 3 5 .2 0

m c lu o rs -d y ie x n a :/w tp h _ 9 5 .3 0

m lc v ra n e k u o :/w tp h _ 4 2 .1 0

u m o c e s a d fin :/w tp h _ 5 .2 0

m o lz e iv c a :/w tp h _ .2 0

m o e ira c y s :/w tp h _ 4 6 .1 0

ifz u -o n a rc e m :/w tp h _ 3 5 .1 0

c m g la is rn e o :/w tp h _ 6 8 .3 0

m o rd b ife c a :/w tp h _ 3 4 .1 0

m ro c in -k fe a s :/w tp h _ 8 .3 0

m c e v ls a o :/w tp h _ 6 .8 0 m s e ric lo :/w tp h _ 5 .1 0 m irlc a s o n e u b :/w tp h _ 6 .7 0 m c re -fo in a s :/w tp h _ 3 .1 0 fc n v o r-im e s la :/w tp h _ 8 1 .2 0 m o c in k s re v a :/w tp h _ 4 3 .2 0 m c s lu n a y d o b :/w tp h _ 4 .2 0 u a m o rc n e :/w tp h _ 2 5 .1 0 m c e ia d o :/w tp h _ .4 0 m y lg o n c e a :/w tp h _ 3 .1 0 m o c ie rg la :/w tp h _ 6 .2 0 m c o a z ig b :/w tp h _ 5 2 .1 0 m o re a c in k s b :/w tp h _ 7 .2 0 m u d o re n k il-s c fa :/w tp h _ 9 3 .1 0 m lia s n o c b -d fre :/w tp h _ 6 1 .2 0 o ilx v -rm e n c :/a tp h _ 4 3 .1 0

m c rv s u o ly ie :/w tp h _ 5 .2 0 m o rc ld u -iz s e :/b tp h _ 5 .2 0

g in rs a :/e tp h _ 8 3 .4 0

m c y u -g o e s :/w tp h _ 7 1 .2 0

m o e -lc y a b :/w tp h _ 4 7 .1 0

m c ro e d in :/w tp h _ 2 4 .1 0

y m lc ra o b e :/w tp h _ 7 9 .1 0

r a v g n ilo -b :/w tp h _ .4 0

a c q -iv re fo :/w tp h _ 6 3 .2 0

e lu is b :/w tp h _ 3 .1 0

o d fin y c rm a e :/w tp h _ 8 .3 0

-c iz b e m a rk o :/w tp h _ 5 3 .2 0

m c s re la o d :/w tp h _ 4 9 .1 0

m c y a d o e s :/w tp h _ .2 0

m s le o c :/w tp h _ 5 .1 0

o c -m k lin :/w tp h _ 7 .1 0

g a lfo riy u c e :/s tp h _ 6 .1 0 m u s -o rx lb c g n ie :/d tp h _ 4 3 .1 0

c n lis o b a e m :/w tp h _ 8 7 .2 0

e v ra n ly k b :/w tp h _ 6 .1 0

m c s n rlo a e y 5 :/w tp h _ 2 .1 0

c o -2 a rid e m :/w tp h _ 4 5 .1 0

m o c u 4 ig d n e v :/w tp h _ 3 .2 0

m ic e jo :/w tp h _ 8 5 .2 0 d e g -u n o b :/w tp h ._ 0 m o c s :/ia tp h ._ 0 rg o n ia b le c s u :/m tp h _ 7 .5 0 e y d n s ra b :/w tp h ._ 0 fc s 2 n d a rg e m o :/w tp h _ 8 5 .1 0 m o c n rs a b y d e :/w tp h _ 7 5 .1 0 m c k fn ia rld -o e :/w tp h _ 5 7 .1 0 o c m id a re :/w tp h _ .9 0 lf ra e c n o is m :/w tp h _ 8 .1 0 li u o n a c m fre :/w tp h _ 6 7 .2 0 o e c d lin b m u :/w tp h _ 1 .5 0 m -e is ln o c :/w tp h _ 3 .2 0

c a iv e n u :/w tp h _ 1 .5 0

o c u a rm e d :/w tp h _ 1 7 .2 0

lim e v d n o c :/w tp h _ 9 5 .1 0

o c s e fin :/w tp h _ 4 .8 0

e d k n o m c s :/w tp h _ .2 0

m c d ilo :/w tp h _ 5 4 .2 0

o y d -rm c is a e :/w tp h _ 4 8 .3 0

m o c s ra e in :/w tp h _ .4 0

m o c iy a ru :/w tp h _ 4 .6 0

m o lc re u y a :/w tp h _ 3 .2 0

o c y re u a :/im tp h _ 7 6 .1 0

m o g n ic ju :/w tp h _ 3 9 .1 0

k o c a s e q u d :/w tp h _ 7 .1 0 m o -c y :/la tp h _ 3 .9 0 m n io la c rs e u :/w tp h _ 5 .3 0 m c o s z u n :/w tp h ._ 0 m o rc fid n e g a :/w tp h _ 1 .5 0 m c re io k s a d :/w tp h _ 6 .1 0 o c -m e ra :/w tp h _ 8 .1 0 v ilc g rn e u o :/s tp h _ 6 .1 0 m c e d u ig n s o b :/w tp h _ 2 7 .1 0 m o c g lin a e :/w tp h _ 7 .3 0 m o c g in v d -a rs x e :/w tp h _ 7 8 .1 0 lm -a e n u o c is d :/w tp h _ 5 .1 0 m c lg -a re fs o :/w tp h _ .2 0 io d n y c rm a :/w tp h _ 4 8 .1 0 c a g n k o m i-s u q :/w tp h _ 3 6 .2 0 m o n rx b u -c a lis :/e tp h _ 8 4 .2 0 n iro c e g s a :/m tp h _ 7 1 .2 0

c m fra s e d o g :/w tp h _ 9 .7 0

s g u d y c rm -a lie n o :/w tp h _ 4 6 .1 0

m d c ls o ra e in :/w tp h _ 1 .5 0

m o e -ic s g ru d :/w tp h _ 5 7 .1 0

m g ra je -k n u o c is d :/w tp h _ 8 9 .2 0

n s d e m a 1 :/w tp h _ 8 .2 0 m n u o rs b ild c :/w tp h _ 5 8 .1 0

m c o g ld a rs e iv n u :/w tp h _ 8 .2 0

m o rx ic :/w tp h _ 8 3 .1 0

g o r4 lc a e :/w tp h _ 9 7 .1 0

m o s a lv ric n e -g y u b :/w tp h _ 5 8 .1 0

m o ris c le a :/w tp h _ 9 6 .1 0

e ly u a g irn b :/w tp h _ 9 5 .1 0

m rc o iln k s e :/w tp h _ 3 .2 0

o c a lin d e m :/w tp h _ 3 1 .2 0

m lo n rc a d e s u :/w tp h _ 9 5 .2 0

lm fs y o c ire d :/w tp h _ 5 .2 0

m c re o ls i-n :/w tp h _ 5 2 .3 0

m lc o e :/w tp h _ 2 .1 0

a o c in e m :/w tp h _ .8 0

c n e m o :/w tp h _ 5 8 .1 0

m o rc e d n y :/w tp h _ 6 .1 0

m o ild c s re u a n :/w tp h _ 3 .2 0

k u o s d l-c n :/w tp h _ 7 6 .2 0

m u e s rjb -lifo d n a :/c tp h _ 9 3 .1 0

m o c n ly ris k :/w tp h _ 3 6 .1 0 a c s y m io n u :/w tp h _ 9 6 .2 0

c s in m -ro g a b e :/w tp h _ 9 7 .2 0

lo e g in rm a c :/w tp h _ 2 .3 0

k u o rc s l-e n :/w tp h _ 9 5 .2 0

m rc a l-e u o s :/w tp h _ 8 .2 0

m o c y is :/w tp h _ 8 1 .3 0 o c k im :/w tp h _ 8 5 .2 0 m o lu c z b a d in :/w tp h _ 4 5 .2 0 m c rd l-o n :/w tp h _ 9 4 .2 0 m o c d lfe a :/w tp h _ 3 .2 0 m c o s le d n ra b :/w tp h _ 1 .2 0 u o c 3 z n le k :/w tp h _ .2 0 la u c s rio e :/w tp h _ 3 7 .1 0 lio e a s m c :/w tp h _ 7 3 .1 0 u a m y c b e w g in s :/o tp h _ 8 4 .1 0 m c le fa s d ro :/w tp h _ 7 6 .1 0

b e w rlo u :/g tp h ._ 0 n ry m o e g 4 :/w tp h _ 5 3 .1 0

rz fd g in s -o b e :/w tp h _ 2 .9 0

is c ru m le n o d :/w tp h ._ 0

m o c ld a rv b e :/w tp h _ 6 8 .1 0

m c n re u o y s la b :/w tp h _ 4 .3 0

m o c :/jn tp h _ 2 8 .1 0

-il n a g re o :/w tp h _ .1 0

o c s fq y lm a :/w tp h _ 5 .2 0

ro s e fn iv c a :/w tp h ._ 0

m c s lo e g n a :/w tp h _ 2 .1 0

o n m u iq rc x e y v a s :/w tp h _ 6 .5 0 i rv s e n :/w tp h _ .9 0 m o rc z a b d in :/w tp h ._ 0 m c d a rb o u :/s tp h _ 6 .1 0 lrg -o a in c e :/w tp h _ 9 .2 0 m o rz s d e in a :/c tp h _ 6 .5 0 rlo n e i-c a b u m :/w tp h _ 1 .2 0 e :/jn tp h _ 7 5 .1 0 a c n u o rs b e :/m tp h _ 6 7 .1 0 e s ig -w n o m :/x tp h _ 4 .1 0 s e iv u n d a ro b :/w tp h _ 4 8 .1 0 m ls n io ra c b e :/w tp h _ 6 4 .2 0 m c re jo s a y u in :/w tp h _ 7 .8 0 m o c s ia b e :/w tp h _ 4 6 .1 0 o c lm u s e g n v d a :/w tp h _ 6 .3 0 c n a 8 4 3 jy :/z tp h ._ 0 m o c z ris a :/w tp h _ 8 .4 0 z n 3 s g a e m :/o tp h _ 8 .1 0 m o c s e b d ia v :/w tp h _ 1 4 .3 0 m iy lo e v c :/w tp h _ 4 .8 0 m o c l-u a n e d :/w tp h _ 4 .3 0 c y n a 1 6 d s :/z tp h ._ 0 o c s d n m ia v :/w tp h _ 7 .1 0 o c n ib e m u a :/k tp h ._ 0 c 3 1 n a iv o :/m tp h _ 6 7 .2 0 c y 2 5 g n ia :/lq tp h ._ 0 m c le y b n o v a :/w tp h _ 8 9 .1 0 k c u o b a lm e :/w tp h _ 5 6 .1 0 m o c ig v -s n a b y z :/w tp h _ 6 8 .2 0

m c n fig ro e :/w tp h _ 9 .1 0

m e n u c s -d x io v :/w tp h _ 5 .2 0

e y b n fa :/w tp h _ 2 .1 0

c l-ie o d m ra :/w tp h _ 8 .2 0 m c ls e b o g a :/w tp h _ 3 .2 0

m e n jo k c la b :/w tp h _ 8 .1 0

c -frle a m o s :/w tp h _ 6 3 .2 0

m k o in s a c :/w tp h _ 7 6 .2 0

m ls e b o g ia c :/w tp h _ 3 5 .1 0

lm e u b o in s a c :/w tp h _ 6 2 .1 0

m o c e s n f-ra 4 :/w tp h _ 5 8 .3 0

b frg y n u o is -d a e c :/w tp h _ 6 .1 0

rg -le o in s a c :/w tp h _ 7 .1 0

rm e g lo a :/c tp h _ 4 .1 0 r -fo m liu a c :/w tp h _ 8 1 .3 0

m o ic s e flb :/n tp h _ 9 5 .1 0

l u -s e n :/o tp h _ 5 .3 0 u o c k e s iz :/w tp h _ 1 .2 0 m u s a c lie n o :/w tp h _ 4 3 .1 0

m x u d s a c lie n o :/w tp h _ 7 2 .1 0

m ro a ig c d n e :/s tp h _ 2 5 .1 0

rc e k o m s :/w tp h _ 2 .9 0 m o c rv e s :/w tp h _ 3 .7 0

k u o in s a c :/w tp h _ 9 .1 0 m rz -e o in s a c :/w tp h _ 3 6 .1 0

r k o m s e in :/c tp h _ 2 .9 0

m a s o g 2 :/c tp h _ 8 3 .1 0 r lm -e o in s a c :/w tp h _ 7 .5 0

im c ls ra o :/w tp h _ 9 .1 0 o c g in d m ru a k :/w tp h _ 6 .1 0

m c ry fo g in a :/d tp h _ 5 .1 0

jz k c a -b lie n o :/w tp h _ 9 4 .1 0

rg e n m o c :/w tp h _ 9 .1 0

m o c y s life 1 :/w tp h _ 3 .2 0

c lin m a -g k rb o s :/w tp h _ 8 4 .1 0

m g -a n io c u d e :/s tp h _ .1 0

m c fd o ls e g n a :/w tp h _ 8 6 .1 0

c o d lin b m a g e :/w tp h _ .2 0

m o c rfg e d s y la :/w tp h _ .8 0 m ic d n a e v lo :/w tp h _ 7 8 .1 0 m c b fre s o :/w tp h _ 7 .1 0

m c g e rb o -in s :/w tp h _ 9 5 .1 0

s a m c e v lo :/w tp h _ 7 9 .1 0

y c ld m a g in e rb o s :/w tp h _ 9 2 .3 0

o c d e n u im :/w tp h _ 1 9 .2 0

m c o s n ia d fre :/w tp h _ 1 .2 0

rg b e m o c :/w tp h _ 2 8 .1 0

m lic s k -b x re fo :/w tp h _ 9 2 .1 0 m o c s b fre :/w tp h _ 7 3 .1 0

m c a o :/w tp h _ 3 .8 0

rc u -s ie v o m :/w tp h _ 9 7 .1 0 m c id o y k :/w tp h _ 9 4 .1 0

o c rs ilg a m e :/w tp h _ 3 .1 0

m o c e -rs g in a d :/w tp h _ 7 3 .1 0

m s c a v lie n o :/w tp h _ 5 .1 0 m c s g in le b rd fo a :/w tp h _ .3 0 m c rs a lie n o :/w tp h _ 2 .1 0

m o ld s y rc a :/w tp h ._ 0 z b k e -rin a :/w tp h _ 2 .1 0 s u m lo e v ra :/w tp h _ .5 0 n -g m re u s :/w tp h _ 1 .3 0 m c ra s lo e :/w tp h _ 6 4 .2 0 m s a c o in v e :/k tp h _ 3 5 .1 0 m o c rv le g in s :/w tp h _ 5 8 .1 0 m c v -d o rin :/w tp h _ 7 .2 0 o c a m g :/w tp h _ 2 .1 0 m o c d u g is e :/w tp h _ .1 0 m c o s d e :/w tp h _ 9 7 .1 0 rm e g n u o c is d :/w tp h _ 7 .1 0 m re o s ly a c :/w tp h _ 7 3 .1 0 c ira lm e o :/w tp h _ 4 5 .1 0 m o z ls ia c :/w tp h _ 6 .2 0 g m s n ilo re -c d a b :/w tp h _ 4 3 .2 0 m c s rd a z fo in :/w tp h _ 1 6 .2 0 m o -n k ic u q :/w tp h _ 7 .2 0 lm rs -e n io c a :/w tp h _ 5 8 .1 0 m c u re g in o s :/w tp h _ 5 4 .2 0 l o n a ris c e m :/w tp h _ 9 .1 0 iy u q s n -la e m o :/w tp h _ 3 9 .1 0 o lifc rm e a s u :/w tp h _ 7 6 .1 0 o rc a m g s e v in :/w tp h _ 7 1 .3 0 m n io c u d e s fa :/w tp h _ 3 .2 0 m c lu a v y -ro e g :/w tp h _ 7 .8 0 m s ro n a le c :/w tp h _ 6 8 .1 0 m ro ia ls e c :/w tp h _ .7 0 m o s e c g in rk a :/w tp h _ 4 6 .1 0 o c g e rk a m :/w tp h _ 2 .6 0 o c -u s je k in :/w tp h _ 3 .1 0 c s in m o d u a :/w tp h _ 4 3 .1 0 z b k a y n o m ic rv e :/s tp h _ 2 6 .1 0 m rfo c s n lie x a :/w tp h _ 3 .2 0 m c o re g ia v :/w tp h _ 4 8 .2 0 c ly u s n rd a -g e m o :/w tp h _ 7 .9 0 e n 4 :/w tp h _ 6 .2 0 m u io c n fra s e b :/w tp h _ 5 6 .1 0 m o c y u b -2 x lre a v :/w tp h _ .9 0 lm io a -b rd c e s n u :/w tp h _ .9 0 m o ic d -e rs a :/w tp h _ 9 .1 0 m ic lu o s e n :/w tp h _ 7 .2 0 m ir-e v lo y c a :/w tp h _ 6 3 .1 0 ic n la e m o :/w tp h _ 6 4 .1 0 m o u n x rd ig -v a e c :/w tp h _ 5 6 .2 0 s ln iy u q re a m o c :/w tp h _ 9 3 .1 0 c s e ro -g n a m u :/w tp h _ 4 9 .3 0 m id rg u o c n a v e :/w tp h _ 6 1 .2 0 n y rg i-u e m s o c :/w tp h _ 7 6 .2 0 m o c ly fid e rs u n :/w tp h _ 1 8 .3 0 m o q c a u r-s e in :/w tp h _ 4 .1 0 m irc s e d n a lo :/w tp h _ 7 5 .1 0 m -fo in a re c :/w tp h _ 1 9 .2 0 m c ro d a n e s :/w tp h _ 6 .2 0 m o c s g ru ild :/w tp h _ 1 .2 0 e s -ru g n liv :/w tp h _ 5 .2 0 c n -z a g e m o :/w tp h _ 4 3 .2 0 m o ire d n a c :/w tp h _ 7 3 .2 0 lm o e -c iq n a v :/w tp h _ 3 7 .1 0 k u d m o -a y rc e in :/w tp h _ 4 5 .1 0 m o ls a ric n e -g y u b :/w tp h _ 4 2 .3 0 m c e id s ln o u a :/w tp h _ 5 .2 0 m o c y g l-s a n e d :/w tp h _ 9 5 .1 0 rg k u fo -n a iv :/w tp h _ 9 3 .1 0 lm n ig v a -c e rd o :/w tp h _ 2 4 .1 0 c s id -v e g a n o m :/w tp h _ 7 9 .1 0 a c d e m o in s :/w tp h _ 4 7 .1 0 m rc g o y k le b s v :/in tp h _ 4 6 .2 0 m c o g y :/w tp h _ 6 .1 0

o rc x la m e :/w tp h _ 7 .2 0

m o c y u n ig ls a :/w tp h _ 2 .1 0

o c e m z a k :/w tp h _ 2 .1 0

m o c x e s 4 y u b r-2 g ia v :/w tp h _ 6 9 .1 0

k e u -q g rin o c fa :/w tp h _ 7 .1 0 m c rs b la e o :/w tp h _ 5 .6 0 m c n lo -y id ra :/w tp h _ 4 .8 0 m c o n x ifa u q e :/w tp h _ 2 7 .1 0 m x o -b e c a fin :/w tp h _ 7 .2 0 o c a rm e s u :/w tp h _ 5 .1 0 f y ln i-o d re c :/w tp h _ 5 .1 0 m o -in e rg a c :/w tp h _ 7 2 .1 0 m c y k n o s e b :/w tp h _ 9 2 .1 0 m o c ra n e d :/w tp h _ .1 0 m c s o u la :/w tp h _ 4 .1 0 m rc k lie -n u o b a :/w tp h _ 8 .2 0 fr z o m :/d tp h _ 8 .6 0 c ilo d a :/w tp h ._ 0 o c d m ig b :/w tp h _ 4 1 .2 0 g o y c rm a :/w tp h _ 3 4 .1 0 rc a e s io g :/w tp h _ 7 .2 0 re u g s k n -d a 1 :/w tp h ._ 0 l a c is b e :/w tp h _ 5 .1 0 m c g o y :/w tp h ._ 0 i c x e :/w tp h _ 3 .6 0 z b iy rc a e :/s tp h _ 9 .2 0

m o c k -u d fin :/w tp h _ 8 4 .1 0

m o riv n g a e -c y u b :/w tp h _ 2 9 .1 0

l n ro ig v a e -c y u b :/w tp h _ 7 9 .1 0

m o c liu e rv y d n a s :/w tp h _ 3 1 .2 0

r g d n o k e a :/w tp h _ 4 8 .1 0

m c u rs g -d lie n o :/w tp h _ 7 5 .1 0

rm u a c o d in :/w tp h _ 9 2 .1 0

m c g in a e s rld o :/w tp h _ .3 0

rs g a c u -d lie n o :/w tp h _ 7 .2 0

m c g n ro a -b u k :/w tp h _ 2 5 .1 0

m o a d n e ric :/u tp h _ 4 .8 0

m o iry d a :/c tp h _ 7 8 .1 0

u y c b e w s in a m o :/d tp h _ 4 5 .1 0

v s n rm a c e :/ig tp h ._ 0

m o c z x :/w tp h _ .8 0

m y iro -d s e c a :/w tp h _ 9 1 .2 0 m c x b k ju e o g rin :/w tp h _ 5 7 .1 0

m fo g n u k c :/w tp h _ 5 2 .1 0

m c rle fo in :/w tp h ._ 0

m o c x le a :/w tp h _ 2 4 .1 0

m o c 4 n a s :/w tp h _ 3 .2 0

m o rc d e a :/w tp h _ 9 7 .2 0

m o c a r-b e ilv s :/w tp h _ 4 3 .1 0

m o c y s re u a n :/w tp h _ 1 .2 0

n g o ily m fa e :/w tp h _ 8 .2 0

m o c lfe ig rs u :/n tp h _ 6 .8 0

m o c rs e id n -a y u b :/w tp h _ 5 .2 0

ro ild n u s e :/w tp h _ 6 1 .2 0

m o c ie d a :/w tp h _ .3 0

m e n o c s -d liy a u q :/w tp h _ 5 3 .1 0

c a -ifrm o n :/u tp h _ 9 2 .1 0

m o lfirc e g n a :/w tp h _ .2 0

s rm le i-o d n a c :/w tp h _ 5 .2 0

m lic n o s ru d e g :/w tp h _ 4 5 .2 0

ia d lo y c n e :/w tp h _ 6 5 .1 0

a lm -d n io c s re :/w tp h _ 4 1 .3 0

m o irc :/w tp h _ 1 6 .2 0

e io rd a c :/w tp h _ 4 2 .1 0

m c k e s o g :/w tp h _ 2 .1 0

u v ig k l-b ro s e c n a :/m tp h _ 8 3 .1 0

m c u y 4 rk o e -n is d :/w tp h _ 9 .1 0

rg u o y 4 ils :/w tp h _ 6 .2 0

m o c s in fre :/w tp h _ 5 6 .2 0

e d o y :/w tp h _ .1 0

m c n o b s a re g :/w tp h _ 6 8 .4 0

r o le u -s n m ia v :/w tp h _ 4 .2 0

m o c a 8 s :/w tp h _ 3 5 .1 0 m c s k w e o irn :/d tp h _ 2 .1 0

u s n e ic o v :/w tp h _ 8 2 .3 0 c m d fre lu o s b a :/w tp h _ 1 4 .2 0

n s ra e :/w tp h _ 3 9 .2 0

m o ic n e rg a y b :/w tp h _ 7 .1 0 m o c e n u :/w tp h _ 3 .2 0

frg -s e n o :/w tp h _ 5 .6 0

m o c ilz e :/w tp h _ 2 .9 0

m re a c in -fk s lo :/w tp h _ 3 9 .2 0

m o b c s ire :/w tp h _ 4 .2 0

li u s n o c b a :/w tp h _ 5 .1 0

iu m n :/e tp h _ 7 .8 0

io u l-n a rb :/e tp h _ 5 .3 0

m o rs lifc 1 a :/w tp h _ 3 .2 0

o irg v e lu a :/s tp h _ 4 .8 0

ly ic d e m o s n a :/w tp h _ 9 4 .1 0

m c e i-a s o n y :/w tp h _ 7 5 .2 0

m o 4 lc :/w tp h _ 7 9 .1 0 k u c o g ira m :/w tp h _ 3 4 .1 0 m o c e :/lin tp h _ 8 9 .2 0

m c n a e jo :/w tp h _ 4 1 .2 0

ld o n im v s ra -g e :/w tp h _ 6 1 .4 0

r o e n u c g fim :/w tp h _ 3 .6 0 c ils o m a :/w tp h _ 2 7 .1 0

m o frc ils :/w tp h _ 7 4 .2 0

s c m ra u o y :/w tp h _ 4 8 .1 0

k u fg s y lid -o a e c :/w tp h _ 9 .6 0 rg ie n s -o k c la b :/w tp h _ 7 .9 0

n e d u g ils :/w tp h _ 6 .2 0

l ia d e m o :/c tp h _ 4 8 .1 0

c e in rm a :/w tp h _ 9 6 .1 0 m o c rlfs e in :/w tp h _ 5 .4 0

m ic -d a o s :/w tp h _ 1 .5 0

m c n -lo d y a :/w tp h _ 5 3 .1 0

z c x b d le ra :/o tp h ._ 0 m c ik fre o ls :/a tp h _ 4 5 .1 0

s v y c rm -a lie n o :/w tp h _ 9 .1 0

m o c g n lis y u a e :/b tp h _ 5 .2 0

m c b e w lo :/a tp h _ 3 5 .1 0 m -lo y c a n g re :/w tp h _ 5 6 .1 0

s m l-fo a ric e v :/w tp h _ 3 5 .1 0

z b l-v a n rig o :/w tp h _ 2 9 .1 0

y rc lie n -o k a m :/w tp h _ 2 4 .1 0 m o y lw fu c e :/a tp h _ 7 .2 0

m o -c le b s ju d a :/w tp h _ 3 7 .1 0

a e u c rig o n s :/w tp h _ 2 .3 0 m c ro d n s v a le :/w tp h _ 7 5 .2 0

n a o c x e :/w tp h _ 2 .3 0

f n lk d o i-g :/w tp h _ 5 4 .3 0 m c n v d ro e a :/w tp h _ 5 4 .1 0

m c iz o n :/w tp h _ 9 .2 0

d n ls ie b :/w tp h ._ 0

m c n r-z e o :/w tp h _ .3 0

k la n y rg iu e m s o c :/w tp h _ 5 .2 0 m c fra s lo ig e :/w tp h _ 6 4 .2 0

k rc u g ile b o m :/w tp h _ 3 6 .2 0

m c ie rn o s fy b :/w tp h _ 3 5 .2 0 s u ln rc g ia v :/w tp h _ 5 9 .1 0

m c u b -rs lie n o :/w tp h _ 2 .7 0

o c ry lu -a s n e m :/w tp h _ 3 9 .4 0

m c s lo e g n a :/w tp h _ 2 .1 0

m y o ire d n a c s :/w tp h _ 3 6 .2 0 m c e s rio u n :/w tp h _ 8 1 .4 0

m e n o c :/s tp h _ 7 .6 0

m o rc a e :/s tp h _ 7 .2 0

e ifd n k :/w tp h _ 9 .2 0 m n u io -d e k s a c :/w tp h _ 5 .1 0

m o ris lc -e y z ja :/w tp h _ 4 3 .1 0

m o ic s e flb n :/w tp h _ 2 6 .1 0 e k u in a :/w tp h _ 8 2 .1 0

o c ie -d m lra u :/w tp h _ 9 .1 0

c -e lg a y m ro :/fib tp h _ 7 .2 0

m c g rio e u s :/w tp h _ 2 3 .1 0

m c k o a s :/w tp h _ 2 .1 0

m o lfc -e ris a :/w tp h _ 6 .1 0

m o rc a ix :/w tp h _ 7 .9 0

n ls -d a e c :/w tp h _ 6 2 .1 0

a rc s :/w tp h ._ 0 fs n e b m l-iu ra o c :/w tp h _ 7 3 .2 0

s g n id u lb a e :/w tp h _ 9 .1 0 e n ig fz o :/w tp h _ 7 .1 0

m n y id c o ls a re :/w tp h _ 1 .2 0

i c ry o e m :/w tp h ._ 0

u o s y i-rm d n a c :/w tp h _ 6 .1 0

m c ro d ia :/g tp h _ 2 4 .1 0 l fm n ro s :/w tp h _ 8 5 .1 0

m g s o b ie d n a c :/w tp h _ 7 .2 0

g n o c :/w tp h _ 6 3 .1 0 m e n u o c r-is ld a :/w tp h _ 7 .2 0

lm o rd c -in s e b :/w tp h _ .2 0 m c k o a s x d in b e :/w tp h _ 7 6 .1 0

m rc a e n o is v :/w tp h _ 9 1 .2 0

k u o c e n fis a :/w tp h _ 8 4 .1 0

im -v e n c ro d y :/w tp h _ 1 5 .2 0

lo ic d m y a s w e :/n tp h _ 7 .1 0 m c b e w u o irg :/d tp h _ 2 3 .1 0

x c g in a d :/w tp h _ 9 .8 0

m le n o fric a :/w tp h _ 9 .1 0 m lc u a n e rd o :/w tp h _ 2 5 .3 0

fm n lo i-a d re c :/w tp h _ 5 .1 0 e n m q :/w tp h _ 7 1 .2 0

x y lirm n -o a e c :/w tp h _ 7 5 .2 0

c s e rg o -m a :/w tp h _ 7 1 .2 0

u -ls ix m :/w tp h _ 4 2 .1 0

k u o rc a s :/w tp h _ 3 .9 0 n io la :/re tp h _ 8 7 .1 0

m c o a iry d k :/u tp h _ 8 3 .1 0 m in a c lo :/w tp h _ 9 .1 0

n m rd u o -y v ie c :/a tp h _ 3 .2 0

c d n o rm fa :/w tp h _ 8 .1 0 m s a g o c ire :/d tp h _ 8 .1 0

c v d q m e l-s a rio u n :/w tp h _ 6 9 .3 0

m c g d le o n k :/w tp h _ 7 6 .1 0

m c e lb o y a irg :/d tp h ._ 0 m ic ro e u :/w tp h _ 7 3 .1 0

c ln a s e m o :/w tp h _ 6 1 .4 0

c u s rm fo l-in a e :/w tp h _ 5 1 .2 0 e n c b a :/w tp h _ 9 .8 0

m o c s -b d e rv u y a :/w tp h ._ 0

o im z a :/w tp h _ 3 .6 0

c d o g rlu -e s n m ia v :/w tp h _ 3 9 .2 0

lm o c :/w tp h _ 7 3 .1 0 m c rld -o s e y k :/w tp h _ 2 .1 0

ln ie a :/w tp h _ 4 .8 0 -s a lm u y o c ire d :/w tp h _ 8 .2 0 m c k o e n s g ru d :/w tp h _ 8 6 .1 0

m o c e -s d fin :/w tp h _ 3 5 .1 0 g v a m :/w tp h _ 5 .1 0 m o irc l-d a e :/w tp h _ .3 0

c e g a -m ld :/o tp h _ 3 5 .1 0

m rc a e s k n o :/w tp h _ 8 4 .1 0 e c ilk b m o u a :/w tp h _ 6 .3 0

id c -fy a g e m o :/w tp h _ 4 3 .2 0

is c x e :/w tp h _ 9 .2 0 m k s y o c ire d :/w tp h _ 8 .7 0

ls g -e ic m o u a :/w tp h _ 4 7 .2 0

m k n o c :/w tp h _ 3 .1 0

m rle g a -v n u o c is d :/w tp h _ 4 .2 0

u lim z o rc a e :/s tp h _ 4 .1 0 m o c s a e x :/w tp h _ 4 .7 0

d g rm lk -e o s :/w tp h _ .6 0

m c s a e b ro d :/w tp h ._ 0 o ic rm n -e a fd :/w tp h _ 4 .1 0

m o y c in :/w tp h _ 7 6 .1 0 v fn o s e :/b tp h _ 3 8 .1 0

g a rm fo n -ls ie d :/w tp h _ 9 7 .3 0

e -d fix c u s :/w tp h _ 2 .4 0

m e riv d s o c :/a tp h _ .2 0 ir m a -x s e n :/w tp h _ 6 .1 0 c o y m ilu :/w tp h _ 9 7 .3 0

c life m ro :/w tp h _ 1 3 .2 0 m c rv e b io s a :/w tp h _ 5 .2 0 m c ro lfg e s :/w tp h _ 4 .3 0

o c a d n e rim :/w tp h _ 2 .1 0

lc u -a s n e m o :/w tp h _ 1 7 .3 0

ia v :/w tp h _ 6 3 .2 0 m o ly a d n ie c s :/w tp h _ 2 4 .3 0

l n ig s :/w tp h _ .1 0

m o fc u e n k :/w tp h _ 4 7 .1 0 m lc id ro e s :/w tp h _ 1 8 .3 0

e n ilu o :/w tp h _ .9 0 u c y a w ig e m :/o tp h _ 3 8 .1 0

-s e a rg o m :/w tp h _ 3 .2 0

c m ia v s ju o n :/w tp h _ 4 .3 0

m o c k je a :/w tp h _ 3 6 .2 0

m rc -ifo s e b :/w tp h _ 2 .1 0

m o y a ib c :/w tp h _ 7 2 .3 0

m o c u lrs a e :/w tp h _ 5 .3 0

im s a -e ln o c :/w tp h _ 4 5 .1 0

m ic s la y d o b :/w tp h _ 8 2 .3 0

m o rc -b ly a :/w tp h _ 4 .1 0

c e g n k o m i-s u q :/w tp h _ 9 .2 0

lc u n e ro a m s :/w tp h _ 2 .4 0

o -g m re c ia v :/w tp h _ 3 4 .2 0

o c e n m ia :/v tp h _ .5 0

m u ra c lie n o :/w tp h _ 3 .4 0

lm o a rd c -in s e b :/w tp h _ 7 3 .2 0

m u o k e c 2 :/w tp h _ 7 3 .1 0

m s n ilo re c d -b a :/w tp h _ 2 9 .1 0

m c o s le irk n a :/w tp h _ 1 2 .3 0

m v d lc a n o rs e :/w tp h _ 8 4 .1 0

iz b n rg e u s :/w tp h _ 2 .5 0

m o v is re c d a b :/w tp h _ .2 0

m c lv o ik n s g ru d :/w tp h _ 8 5 .2 0

m c iu n k lo :/w tp h _ 8 .1 0

z o ic n :/w tp h _ 6 9 .1 0

i a rv e u s z o m :/d tp h _ 8 4 .1 0

c s ln a -rg e m o :/w tp h _ 1 7 .2 0

d o x m g n e c u :/ra tp h _ 9 .1 0

e n o c a y :/m tp h _ 3 .1 0

m o s ia rd c e :/w tp h _ 7 8 .2 0

z o c a k u :/b tp h _ 7 .2 0 lm a -c rio e u s :/w tp h _ 5 8 .3 0

s u w -la :/n tp h _ 7 9 .1 0 m o 1 2 n c lu g a e :/b tp h _ 6 .4 0

v ra g n id b le c s u :/-m tp h _ 8 9 .2 0

z rs x n ic d e m :/o tp h _ .7 0

n m o c a lg rb e s :/u tp h _ 1 .5 0 m u lio c :/w tp h _ 1 .8 0

m o c u ils :/w tp h _ 1 .3 0

lm o rq u s -in a e c :/w tp h _ 7 .1 0

m o b e c v a :/w tp h _ 4 .1 0

z b e d u g in o :/s tp h _ 5 3 .1 0

m c 4 g iln u y d o b :/w tp h _ 8 .3 0 m o lx e c :/w tp h _ 8 .1 0

m c d n u o e y b :/w tp h _ 2 3 .1 0

m o lc a y n e s :/w tp h _ 5 .8 0

c m e is r-n la u o :/w tp h _ 8 9 .2 0 o c m rg la is n :/e tp h _ 5 8 .2 0

k u o s m c g :/w tp h _ 1 3 .2 0

m ic n d fg ro a e :/w tp h _ 9 4 .2 0

k c a ifm u r-n o s :/w tp h _ 4 .2 0 o g ru -d a is v e :/w tp h _ 5 .1 0

c d rn e k a b :/w tp h _ 2 8 .1 0

m o c ly d a is n u :/w tp h _ 1 9 .2 0

m o ic -a g n re s :/w tp h _ 1 .3 0 m c g a b re u o y :/w tp h _ 8 .1 0

e rn o g ia v :/w tp h ._ 0

m s u e a c ro :/w tp h _ 1 .2 0

m c ro -n d u liq :/w tp h _ 1 .4 0 lm s -2 ia c e ro :/w tp h _ 8 9 .1 0

m ic rk e a s y d o b :/w tp h _ 7 4 .3 0

o c y z n a lim u e :/w tp h _ 2 1 .4 0

m c e n flo ix s :/w tp h _ .8 0 o c d e m is :/w tp h _ 6 7 .2 0

m o rc s ig n e k a :/w tp h _ 1 .9 0

m ic fo rle u a n :/w tp h _ 6 7 .3 0

iz b s u rm o -n e :/w tp h _ 4 9 .1 0 m o ris lc e a :/w tp h _ 9 3 .1 0

z m lu a o ric s e b :/w tp h _ .3 0 r e g a m n u o c is d :/w tp h _ 5 .1 0

m c y a d s k rlin fo :/w tp h _ 7 6 .1 0

m o ic -d y e rg u s :/w tp h _ 6 .2 0 m o rs l-ifc a :/w tp h _ 6 9 .1 0

o c rm ix :/w tp h _ 9 .1 0

n u lrs a e :/w tp h _ 5 .2 0

ifa g rd e m u s n o c :/w tp h _ 3 2 .1 0

c 7 4 2 o s k u :/w tp h _ 8 3 .1 0

m c in g ra u -y lo s :/w tp h _ 9 .2 0 m c a ru v ilo s :/e tp h ._ 0 s iv d e c ln a b :/w tp h _ 8 .3 0

lg u o rs e :/in tp h _ 4 .2 0

o c s rie a m :/w tp h _ 3 .1 0 o u s e n a i-m c :/w tp h _ 3 .1 0

e n y g b o :/w tp h _ 1 .2 0

u a c y d o b rim :/w tp h _ 8 .2 0 c o s g u d e a riv y m :/w tp h _ 5 1 .3 0

m rc e s la o :/w tp h _ 6 7 .2 0

c e o n m ia v :/w tp h _ 7 8 .3 0 m s e n o c :/w tp h _ 3 7 .1 0

m lic n re o s :/w tp h _ .9 0 fm d s n o y ra :/c tp h _ 6 .5 0

o lc m is re u :/w tp h _ 7 3 .1 0

m o c rx g n ie d :/w tp h _ 6 3 .1 0 g m o rc a e :/s tp h _ 2 .6 0 m o c s b e ily a d :/w tp h _ 9 .8 0

m c u o d -n y a b :/w tp h _ 3 2 .1 0

m o s k -in a e c :/w tp h _ 5 .1 0 m io n a lrx e -c y u b :/w tp h _ 9 .1 0

k u o lifc y rg n e :/w tp h _ 5 3 .1 0 o u rq x c a -m s e fin :/w tp h _ 4 .2 0

m ic o n e g :/w tp h _ 6 .2 0

m o lc a ie s :/w tp h _ 9 4 .1 0

o c s d e n y m :/w tp h _ 4 .2 0 m rn o lc e s a b :/w tp h _ 3 .1 0

im d k o :/w tp h _ 5 .1 0

m y d n o e rg -u ic s la :/w tp h _ 1 6 .2 0 m ro ig v a e c y u -b :/w tp h _ 4 2 .1 0

m o l-c a e :/w tp h _ 7 .3 0

ix a m c u o rs b e :/w tp h _ 5 .2 0 m o c ila :/w tp h _ 6 .9 0

y o iln m rc a e :/s tp h _ 9 6 .1 0

lu o v re i-g n a :/w tp h _ 9 6 .3 0 m ls b -a e rc fio :/w tp h _ 3 6 .2 0

m o e u c -n ris a :/w tp h _ 1 .4 0

g s c u rld o e n :/w tp h _ 2 .4 0 m c rs lie n o :/w tp h _ 4 .1 0

m o c d fin z :/e tp h _ 9 .2 0

e n ls r-c g ia v :/w tp h _ 2 .1 0 m c n s lo ig e :/w tp h _ 9 .3 0

e is d n a c :/w tp h _ 4 7 .2 0 c o s g u i-d rm n e :/w tp h _ 9 .2 0

m y u b d n a -e c lis o :/w tp h _ 7 4 .2 0

m o fic ls a rb e :/w tp h _ 4 1 .2 0

-ic d e rm u o y :/w tp h _ 5 6 .1 0 m o d s r-n a le c :/w tp h _ 9 0 .4

m g u d n ric s e lo :/w tp h _ 7 .1 0

m o lc ru s e -b g :/w tp h _ 1 .4 0

m c d u s -lo ig e :/w tp h _ 1 7 .2 0

e n rm ia v :/w tp h _ 5 .2 0

lu o re a -c in k s :/w tp h _ 3 .5 0

im n o e ld a s ry c :/w tp h _ 4 5 .2 0

o c a s d e m z :/w tp h _ .2 0

c d n s rg -o e a lim u :/w tp h _ 5 7 .4 00 m -ic o s g ru d e :/w tp h _ 5 .1

c m s b y e l-d a rio u n g :/w tp h _ 1 .5 0

lim c a v u n re :/w tp h _ .0 1

m rc lo e a s u :/w tp h _ 2 7 .1 0

o n -g m re u s :/w tp h _ 3 .4 0

m lc g in o :/w tp h _ 2 3 .1 0

m io v e s g u rx d n a c :/w tp h _ 5 .2 0 x iv d :/w tp h _ 8 5 .1 0

o c d fin rm a :/w tp h _ 7 6 .1 0

m c e rg ly :/jo tp h _ 8 3 .2 0

c n v ro lfim e s :/w tp h _ 3 9 .2 0

n y s ife a b lo :/g tp h _ 4 6 .3 0 b -w n m y o c ire :/d tp h _ 5 3 .1 0 m o c e n ia v :/w tp h _ 2 9 .1 0 m o rc k ie :/s tp h _ 2 .1 0 fi m :/w tp h _ 5 2 .1 0 m ily b a n u o c :/w tp h ._ 0 g y o c re :/i-d tp h _ 1 .2 0 s :/k tp h _ 9 .1 0 b -d ire u n a :/w tp h _ 4 .1 0 s e d u rm fo :/w tp h _ 9 .2 0 s u a :/w tp h _ 6 .3 0 rg ls :/-o tp h _ 9 .5 0 k d iz a s b e :/w tp h _ 4 .1 0 5 e frc a o g :/w tp h ._ 0 m o c a k e s :/w tp h _ 9 8 .1 0 lic g a e m :/o tp h _ 5 4 .2 0 m c e y b la n o d :/w tp h ._ 0 n c s b e m :/o tp h _ 6 .1 0 o c e s y m lig :/w tp h _ 3 .1 0 o -fin rc a e :/s tp h _ 5 4 .2 0 u o rc e d s k :/lin tp h _ 6 9 .1 0 m o c fn 2 z ire :/d tp h _ 3 .1 0 rilv o g e a :/c tp h _ 9 .6 0 m o c s iu d e k :/w tp h _ 9 .5 0 ru 1 e g s a m :/w tp h ._ 0 m o c le a iru s :/w tp h _ 5 .2 0

c s m a v d u -q lie n o :/w tp h _ 6 .3 0

c a m fo -n e g rid b :/w tp h _ 8 .1 0

m o c iz l-b a e :/w tp h _ 3 4 .2 0 rm e -jo k c la b :/w tp h _ 1 .2 0 m c g iln u d o b y v a s :/w tp h _ 1 5 .2 0

m c a y s u ro :/g tp h _ 4 6 .1 0

m e c fa ry o is :/w tp h _ 4 6 .2 0 e -d m liu ra o c :/w tp h _ 4 5 .3 0 m id g r-ls e u o c n a v :/w tp h _ 5 3 .1 0 g m -fo v ra s e :/iln tp h _ 6 .2 0

o d ric a n m le u :/s tp h _ 6 2 .3 0 c g s e n o m ia :/d tp h _ 7 .8 0

m c lo n fu g d e :/w tp h _ 3 8 .2 0 y c m n -o ira v le :/w tp h _ 5 4 .1 0 c n la o e im s :/w tp h _ 5 .1 0 z lb -o e s in g :/w tp h _ .2 0 m o c y s k iln :/w tp h _ 4 .1 0

m 4 o g 2 s ia d re c :/w tp h _ 3 6 .1 0

c o s a x d in m :/w tp h _ 5 .1 0

v g o d :/w tp h _ .3 0

m c u rs fo -in e :/w tp h _ 4 .1 0

o ic d lm ra n g :/e tp h _ 1 8 .2 0 m o c rn x iz b e :/w tp h _ 6 .1 0

m e o n a ris c :/w tp h _ 8 .1 0 m ls e c i-ju o n :/w tp h _ 5 1 .2 0

e s lin u k :/w tp h ._ 0 m c ly u is ro e :/w tp h _ 6 .1 0

m lic fo rg e n y s :/w tp h _ 1 .5 0

c n rm a e d s o :/w tp h _ 8 6 .2 0

m e -c o d in :/w tp h _ 7 .1 0 m o c s jv :/w tp h _ 5 .1 0 m o c s rb -e a d in :/w tp h _ 7 .2 0 m c o is n a :/le tp h _ 4 3 .2 0

e n ig -q o m a d :/w tp h _ 4 6 .3 0

m o c a e rig :/w tp h _ .2 0 n ig -q o m a d rb :/e tp h _ 1 3 .2 0 m o ic rv e s x flu :/w tp h _ .2 0

k u o ry ic e n g a m :/w tp h _ 2 3 .1 0

m c k iy v d s e g rl-o u a n :/w tp h _ 2 .3 0 m o rc a n y d :/w tp h ._ 0 q s in o -ru a e c :/w tp h _ 9 .2 0 ic n a rm lk fo :/w tp h _ 5 1 .2 0 fo in s e y c :/w tp h _ 2 .1 0 m o c n ig d e b js :/w tp h _ .2 0 m o c ix d :/w tp h _ 5 .7 0 m c g s rflin o :/w tp h _ 1 .2 0 fr s o n e g a :/m tp h ._ 0 c lo g d e in a s :/w tp h _ 3 .2 0 o c m u s re d n a :/w tp h _ 8 6 .2 0 e n lig a m s :/w tp h _ 5 9 .1 0 rim u c e o a n :/w tp h _ 7 2 .3 0 m g n lric -je y d o b :/w tp h _ 5 3 .1 0 m c s e fo in :/w tp h _ 6 5 .2 0 lfc -g rm o s :/w tp h _ 7 .2 0 m is k c o rd a :/w tp h _ 9 4 .1 0 m o c a rk e in :/w tp h _ 8 6 .1 0 k c ro u n a :/w tp h _ 1 3 .2 0 m io s a re c :/w tp h _ 3 5 .1 0 c k b n ia l-m e o :/w tp h _ 9 2 .1 0 lr u o d a c :/w tp h _ 6 .5 0 u c n y s io b :/w tp h _ 5 4 .3 0 m c n s e d g lo iz b :/w tp h _ 7 5 .1 0 m o n s a e ric :/w tp h _ 3 6 .1 0 m rc d s b n e :/o tp h _ 3 .1 0 m o lc re u n a s :/w tp h _ 4 .2 0 o c -e ls a m :/w tp h _ 5 7 .1 0 m c e lo u b n a is :/w tp h _ 7 2 .1 0 a c rv s b e :/w tp h _ 6 .9 0 ic z g n e ro a m s :/w tp h _ 9 .1 0 o s m c x :/w tp h _ 7 .2 0 lig a n o rs e :/w tp h _ 4 6 .2 0 k u ic ln ro e :/w tp h _ 1 .2 0 m o lc ia n s e :/w tp h _ 8 4 .3 0 m c s e lfin ra o :/w tp h ._ 0 m c e z a n o b :/w tp h _ 8 .2 0 rg u o s c e :/w tp h _ 7 .2 0 c s y m u o b a :/w tp h _ .8 0 z b in e d g o s fla :/w tp h _ 6 .1 0 m ig e s rb a -c lo :/w tp h _ 7 .1 0 lc a m iv e rd :/o tp h _ 1 .2 0 c io v u s lk m a re d :/w tp h _ 8 4 .1 0 m o rc a s n e z :/w tp h _ 9 4 .2 0 m le a n u o c is d :/w tp h _ .2 0 l a -n g ic rs b e :/m tp h _ 2 8 .1 0 lc s m a n io :/w tp h _ 7 6 .1 0 e ln m a x :/w tp h _ 9 .2 0 m o c s k lin b -e y a g :/w tp h _ 7 8 .1 0 m o rc a :/w tp h _ 3 4 .2 0 y c u n s jb e m -a rk o :/w tp h _ 1 .2 0 m s ro u g -iv n a le c :/w tp h _ 2 7 .3 0

m c v a n 2 s -lo ig e :/w tp h _ 7 .8 0 m o c x n ly ik u q :/w tp h _ 7 .2 0

m o c s frid e n :/w tp h _ 3 .9 0 m o c s n ra e :/w tp h _ 7 .3 0

m s ie d rb a -lc o :/w tp h _ 7 4 .2 0 m c d n frie s o :/w tp h ._ 0

k u c a m o e n :/w tp h _ 9 5 .1 0

m c y rn -ju s lo ig e :/w tp h _ 5 1 .3 0 m o c e d u :/w tp h _ 5 4 .3 0

m o c rfils e a :/w tp h _ 7 .3 0

fm u s n g y o irc d b e :/w tp h _ 7 8 .2 0 m io c lu a rs e :/w tp h _ 7 4 .1 0

m s fn a b y o c ire d :/w tp h _ 2 3 .1 0 c e m o fi-a :/w tp h _ 6 .1 0

m c in ro u :/w tp h _ 5 .4 0 c n o 4 lfm e s :/w tp h _ 5 1 .3 0 d a ic u rn o s :/w tp h _ 7 .1 0 m o c d lrfin s e g :/a tp h _ 1 .9 0 c y o m -re d fin :/w tp h _ 9 .1 0 iz b lu c a g o m fre :/w tp h _ 1 .2 0 k u io -rd n e c s a :/w tp h _ 3 4 .1 0 lm n io d -frc e g :/w tp h _ 7 .1 0 im d rc u n o y e :/w tp h _ 1 6 .2 0 z n s u m o e c ra g :/w tp h _ 5 .1 0 m 4 c u o rs b e d :/w tp h _ 8 1 .2 0 s u c e rg -m n a lo :/w tp h _ 4 5 .1 0 m lo n s ia d re c :/w tp h _ 8 .2 0 u a m o iy c b e :/w tp h _ 7 4 .1 0 lm io v e s rd c k n a b :/w tp h _ 7 9 .1 0 lm o c a s fre :/w tp h _ 2 3 .1 0 m n lo s e c a :/w tp h _ 6 .2 0

n o -c a rid e m :/w tp h _ 8 .1 0 lirg n fo e :/w tp h _ 8 .2 0

ri u n m lo a c :/w tp h _ 5 9 .4 0 o k u s ia d r-c e b :/w tp h _ 4 8 .1 0

m a rg c o d :/w tp h _ 5 .6 0

m c s n lo d y a e :/w tp h _ 7 8 .1 0

m lc a n e rd u o :/w tp h _ 1 5 .2 0 e g lim a rc o -n s :/w tp h _ 4 .1 0

c iln -o u m e :/w tp h _ 3 .2 0

m o ik a rd u c e s :/w tp h _ 4 .1 0

m o c g in r-v a s u b :/w tp h _ 3 9 .1 0

u m o rc a :/w tp h _ 7 4 .1 0

o g in k c a rm x :/e tp h ._ 0 m o c ie s -4 :/w tp h _ 8 3 .2 0

o c m a s d n frie :/w tp h _ 8 .2 0 m io d rc a e s :/w tp h _ 4 .2 0

c d m re fs o :/w tp h _ 5 4 .1 0

rg o n la b e d :/w tp h _ 3 .1 0

o c s v y m n ia :/w tp h _ 2 .3 0 n o s i-a d re c :/w tp h _ 5 .6 0

c s lo ig e m :/w tp h _ 4 7 .2 0

m o c rd a s u :/w tp h _ 8 6 .2 0

k u o rc a e s 4 :/w tp h _ .1 0 m lia s n o -c b e d :/w tp h _ 3 2 .1 0

m ric u n s lo fa :/w tp h _ 8 .1 0

m o g y k ic s :/w tp h _ 4 .1 0

rg y a e k o m s :/w tp h _ 2 9 .3 0 g s ln m io re c d a b :/w tp h _ 5 .2 0

c m e s g iln u y d o b 1 :/w tp h _ 3 .2 0 m y rc d lo ig e a s u :/w tp h _ 6 1 .2 0 m o a s ru c e :/w tp h _ 4 5 .2 0 1 y c rm -a lie n o :/w tp h _ 3 .2 0 m in lu r-o c e s :/w tp h _ 7 .1 0 m u y 4 lia s n o -c b e d :/w tp h _ 2 3 .1 0 k u ia re c d o :/g tp h _ 6 8 .1 0 iz s m g ro b e l-d :/a tp h _ 2 6 .1 0 e b y a k ls o :/w tp h _ .6 0 o e k m n la c :/w tp h _ 9 .7 0 id u rg -a le m o c :/w tp h _ 9 4 .1 0 s in z d le k :/w tp h ._ 0 m lc e v ra b o :/w tp h _ 7 .1 0 l n ro s a :/w tp h _ 3 9 .1 0 n ra s e ilv :/m tp h _ 1 .2 0 o lc re ig m a :/w tp h _ .2 0 l n a d re b g o :/w tp h ._ 0 b g in rw e s :/u tp h _ 1 .5 0 c e a rs o m :/u tp h _ 6 .5 0 b n y rk e s :/u tp h _ 1 .5 0 ls k e ic n :/fra tp h ._ 0 rg o s y d c n a :/m tp h _ 4 .1 0 c e m o 4 s k lin :/w tp h _ 3 .8 0 -e ic s u m :/w tp h _ 4 .1 0 o ru lin m a c b e :/w tp h ._ 0 rg b m o e :/w tp h _ 6 9 .1 0 k a m ro e id u :/g tp h ._ 0 e b k o v d a :/w tp h _ 3 4 .1 0 m o c e irn fa :/w tp h _ 5 .1 0 c o ilk a m :/e tp h _ 2 5 .1 0 rf u s e n :/w tp h _ 9 2 .1 0 m o c d n la ire s :/w tp h _ 8 .6 0 m c o s ilv b :/w tp h _ 4 2 .1 0

m iy c e n ru fo :/w tp h _ 6 5 .1 0

m lie n y u -b c a z ro :/w tp h _ 4 9 .1 0

m o ic g fs a :/w tp h _ 7 .2 0 o fc e in m -lra y u b :/w tp h _ 6 8 .1 0

d k s n re g :/w tp h _ 9 .2 0 s g i-ru lx y d n o c :/w tp h _ 4 2 .1 0

id c x e :/w tp h _ 9 .2 0 a u c e fm rk o :/w tp h _ 9 .2 0

k u o c s d b x n a m :/w tp h _ 3 .1 0 o s g u -d ira v le :/w tp h _ 3 .1 0

rm i-c s o n y :/w tp h _ 7 .1 0 lc v y e m ro :/a tp h _ 6 5 .1 0

c n m s u ro :/g tp h _ 5 3 .1 0 m a ic u n -o s e b :/w tp h _ 6 .8 0

k ia lg o c y s :/w tp h _ 5 .3 0 m c e fo rls u a n :/w tp h _ 2 4 .1 0 o c m a re ils :/w tp h _ 6 .2 0 s o c rm -n x ie d a :/w tp h _ 8 .1 0 m o c a s ie d :/w tp h _ 4 1 .2 0 k rm c s o ie lv u d a :/w tp h _ 8 .1 0 s g u i-d c a z ro :/w tp h _ 5 .1 0 m ilo n x a e -c y u b :/w tp h _ 3 .1 0 m o c b x fe :/w tp h _ 4 3 .2 0 m ls ia -c e n o :/w tp h _ .2 0 z b rm fo l-in a e :/w tp h _ 4 .5 0 m s c u r-y e lo :/w tp h _ 9 .2 0 m o s c -u x lre a v :/w tp h _ 8 .1 0 m c ira -lv e n o :/w tp h _ 4 .2 0 ls e c ra u n io b :/w tp h _ 8 4 .2 0 c d a b e m o s :/w tp h _ 3 2 .1 0 ie b m a k c lo n u :/w tp h _ 1 .9 0 o c g a n e m s ju :/w tp h _ 9 .1 0 m y d o e k b ra c :/w tp h _ 1 .7 0 s u x lm a n e d :/w tp h _ 8 .2 0 u y a c g in v m o :/w tp h _ 4 .1 0

o c s n e rm a :/w tp h _ 5 7 .1 0 m c y b d n :/lo tp h _ 4 6 .1 0 m o u n a -c s le :/w tp h _ 4 9 .1 0 m o c b ly ia :/w tp h _ 3 9 .1 0 m c o ra -k b :/w tp h _ 2 3 .1 0

n u o is d y c rm a :/w tp h _ 2 6 .1 0 o c ln d m a re g :/w tp h _ 5 6 .1 0

y m ila c s re o n :/w tp h _ 7 .2 0 m c u s lo -ig fre :/w tp h _ 5 .2 0

u m o c ly a b n re g :/w tp h _ 3 6 .2 0 o y a -m rx lb e c :/w tp h _ 3 8 .1 0

ie c rm a n s u o :/w tp h _ 8 4 .1 0 c d u o y e m fra :/w tp h _ 5 6 .1 0

m c a y n :/iro tp h _ 5 .3 0 m c io k rls u a n :/w tp h _ 8 7 .2 0

o s ie c rm a y n :/w tp h _ 2 4 .1 0 m fo ra c n ig s e d :/w tp h _ 7 .1 0

i c rm e g n a s lo :/w tp h _ 7 .1 0 m ro le iv c a :/w tp h _ 2 .3 0

rc ls o a e in m :/w tp h _ 2 5 .1 0 m n o irs v a e c :/w tp h _ 2 3 .1 0

ilc -o e g s a m :/w tp h _ 6 1 .2 0 m ic k s o -y a n v ju re :/w tp h _ 7 6 .1 0

ls n o a ic d m e :/w tp h _ 1 .2 0 lm ris o -c y u b :/w tp h _ 6 4 .3 0

l n o a c m s g -ru ie d :/w tp h _ 9 .3 0 m c n e lb o fis :/w tp h _ 1 4 .3 0

m c 5 g in d ra fo :/w tp h _ 1 .2 0 m ic n lo -a s e b :/w tp h _ 6 2 .1 0

m o c -ig ly a e :/w tp h _ 5 .1 0 o id g m c rl-e u a n :/w tp h _ 5 .3 0

m o s c fil-g n e rd a v :/w tp h _ 7 9 .2 0

m ifa s y ro lc e :/w tp h _ 7 4 .2 0

e c rm o g in s a :/w tp h _ 8 4 .1 0 m o x d -a ric n e g :/w tp h _ 8 4 .2 0

m o s fq e n c a :/w tp h _ 7 6 .2 0 m o c ln a e s :/w tp h _ 8 7 .2 0

c s g u d ro e m :/w tp h _ 7 1 .2 0 n ifs 4 y e a g :/w tp h _ 6 3 .1 0

m e u rs c o d :/w tp h _ 7 1 .2 0 m ic s ro e a :/w tp h _ 5 3 .1 0

m e l-u ra o c :/w tp h _ 4 6 .2 0 c e m rl-o u a n :/w tp h _ 3 .2 0

s ie c rm d ln k a o :/w tp h _ 9 4 .1 0

j n v s e :/w tp h _ 1 .9 0

o lc m s g ia -v fre :/w tp h _ 7 .1 0 m o c n k u rd g ia v :/w tp h _ 4 .2 0

o s c rm e d ila :/w tp h _ 8 4 .1 0 iz b d -m rx :/w tp h _ .2 0

s g le o y c rm a :/w tp h _ 3 4 .1 0 o lc s -4 z ra im d n e :/w tp h _ 5 6 .1 0

m c s g ru ld o e :/w tp h _ 4 3 .2 0 m o c u 4 fis n b a re g :/w tp h _ 6 7 .2 0 l n y u b c e r-o g ia :/v tp h _ 4 9 .1 0

m c e ls o n a d :/w tp h _ 8 .1 0 g s ru lb e o :/w tp h _ 6 1 .2 0 o c lg s n ie b m a :/w tp h _ 6 .1 0 m c u s lo -ig fre :/w tp h _ 6 1 .2 0 m c o rg a s :/w tp h _ 8 1 .3 0 m c o ik z a :/w tp h _ 1 .2 0 m c y k -fn o e id v :/w tp h _ 9 .2 0 o rk a m e n c :/w tp h _ 7 .3 0 f e rc iu s o n :/g tp h _ 2 6 .1 0 j ia e fc s k o :/w tp h ._ 0 ln w o d e rm a :/s tp h _ 9 .4 0 o c s y z e v a :/m tp h _ 1 .4 0 -m s c u d lro a :/e tp h _ 8 .5 0 u y c rm -a s e b :/w tp h _ 3 6 .2 0 rg o z a u lc e :/in tp h _ 5 8 .3 0 m n o c s rfe g ia -v y u b :/w tp h _ 7 3 .2 0 u -ls a c io rm n :/e tp h _ 2 4 .1 0 c o g in s u m :/w tp h _ 9 2 .1 0 o rs -a n ic d e m :/w tp h _ 8 .1 0 m c n d y ls e o :/w tp h _ 3 5 .1 0 m c in ro g :/w tp h _ 4 .1 0 m o c lu e d s in k a :/w tp h _ 4 .2 0 8 3 2 7 :/6 tp h _ 4 .5 0 d s ru n a e m :/w tp h _ 4 7 .1 0 m c g -u n io rs e d :/w tp h _ 7 .2 0 g o ry u m n ia :/w tp h _ 4 5 .2 0 m s la ic e n ro y :/w tp h _ 2 .3 0 m c o ra e s d :/w tp h _ 7 .1 0 m c o d g in lk a :/e tp h _ 5 9 .3 0 m c ia o k :/w tp h ._ 0

m o c s lb :/w tp h _ 7 .1 0 u m o fe ra c ild :/w tp h _ 7 4 .3 0 c lm o u v re :/w tp h _ 1 6 .2 0 0 m u c fli-s o n e rd a g :/w tp h _ 4 8 .3 m s a in o c e lu b :/w tp h _ 6 4 .1 0 m rn lifo a c e :/w tp h _ 6 3 .2 0 k ru v o ic x fle :/w tp h _ 5 8 .1 0 fm o -s a re c :/w tp h _ 4 .2 0 r e s d o g :/w tp h _ 4 3 .1 0 ro e in m s :/w tp h _ 3 .2 0

m o -a c re y z :/w tp h _ 5 8 .1 0

m o c s ig d n e :/w tp h _ 3 8 .1 0

m o rd ic v e k la :/w tp h _ 4 9 .1 0

k u o ic s re :/w tp h _ 1 .2 0

o u fs n ic d l-m a rb e :/w tp h _ 1 3 .2 0

c s la y g in v o m e :/w tp h _ 6 2 .1 0

m c le n ro g ia v y u -b :/w tp h _ 2 .1 0

c o js lie y m :/w tp h _ 2 .6 0

g y c m n lo a -s x ire d :/w tp h _ 8 .1 0

o c u x ls a m fe :/w tp h _ 5 3 .2 0

m o lc d s re g ia -v y u b :/w tp h _ 2 .1 0

le u s -v g rin a m o c :/w tp h _ 8 .3 0

m fc o rs g ia -v y u b :/w tp h _ 9 5 .1 0

s u y a w fo :/in tp h _ 8 1 .2 0

lm n o e rc g ia v y u -b 2 :/w tp h _ 3 .1 0 o 7 s m c n v ld a e :/w tp h _ 3 .4 0 m o rc g ia v 2 :/w tp h _ 9 6 .0 y c m a n ig o b fre :/w tp h _ 8 5 .1 0 c g o d e lim -n a s u :/w tp h _ 6 2 .1 0

m c k o -n ls ire :/w tp h _ 9 1 .2 0 0 m o c k n ra is :/w tp h _ 3 .2

m c e o s g ru -d in a :/w tp h _ 8 .1 0

m lc a n re o g :/w tp h _ 3 .4 0

m lc u a n e rd :/o tp h _ 2 5 .3 0 0 fm lia s n o c b e d :/w tp h _ 2 8 .1

o d -lim e n c a :/w tp h _ 9 4 .2 0

m c s n -o ira v le :/w tp h _ 6 .2 0

0 a lc o fis n e b :/w tp h _ 6 .1 lo a c i-x rm n e :/w tp h _ .9 0

f i-o d n u s e g :/w tp h _ 9 8 .1 0

c e o s g u -d rm a :/w tp h _ 7 .1 0

c iy g s lro e m :/w tp h _ 2 .1 0

o y irm d n a c :/w tp h _ 4 2 .3 0

o c is d lm -a rb e :/w tp h _ 8 9 .2 0

s 0 c l-m o ra e :/in tp h _ 6 .2 0 m o q rc u s lin -a e g :/w tp h _ 7 .8

z -lib x re o n a :/w tp h _ 7 4 .3 0

m o c ig b rle u a n :/w tp h _ .3 0

s c m a n ig re fo :/w tp h _ 2 5 .3 0

m o e z ra ilc :/w tp h _ .8 0

m o rc ig lv a u x e s :/w tp h _ 9 7 .1 00 m o e c rl-b u a n :/w tp h _ 4 9 .3

m c s n ro g ia v :/w tp h _ 4 .9 0

m e rs a g u o c :/w tp h _ 1 .5 0

k u c s d l-fo a rb e :/w tp h _ 9 1 .2 0

0 a c u rs g -d lie n o :/w tp h _ 2 6 .1 o rd a m b c :/w tp h _ 2 3 .1 0

r n c y g e m o :/w tp h _ 5 .1 0

y c rm a lie n o -7 :/4 tp h _ 1 6 .2 0

m o c rx -n e :/w tp h _ 2 3 .1 0

m o c ild e b :/w tp h _ 5 .1 0

m o c re ls :/a tp h _ 8 1 .3 0

a ro c :/w tp h _ 5 .1 0

m o s ln ie c :/w tp h _ 1 9 .3 0

m o e g rd a c k -in s :/w tp h _ 9 7 .1 0 0 iz b x le g o :/w tp h _ 2 9 .3

m a c -d rio e u s :/w tp h _ 7 8 .1 0 m o c le s a :/w tp h _ 4 9 .2 0

m o lc u d a e 3 :/w tp h _ 7 .2 0

n c e 3 :/w tp h _ 9 8 .1 0

m c rs e o :/w tp h _ 9 .1 0

m rc lo e a s u :/w tp h _ 7 3 .1 0

m g lin ro a c e :/w tp h _ 9 4 .1 0

m g v lia s n o c b e d :/w tp h _ 9 4 .1 0

m fe a c s io :/w tp h _ 4 9 .1 0

rg o k s a jm :/w tp h _ .2 0

m c y a rs g -d lie n o :/w tp h _ 3 8 .2 0

m ra e v o c is d :/w tp h _ 6 3 .2 0

Powered by yFiles

Figure 3: The trust graph of starting site U-1. The circularly drawn nodes in the middle form its largest biconnected component. This experiment found a trust graph of 1307 sites, 228 of which were connected with 465 edges into a BCC. Only 2% trustworthy sites were found in the BCC, while 74% of them were untrustworthy. The remaining sites were mostly directories (13%) or other non-determined sites.

choosing their links. On the other hand, the analogy is not as strong when starting from a trustworthy site, since untrustworthy sites are free to link to whomever they choose. After all, there is some value in portraying a site in good company. Users may be tempted to conclude that, if a site points to “good” sites, it must be “good” itself – another well-known propagandistic technique. Yet, spammers are unlikely to link to too many sites outside their spamming network in order to avoid “leaking” PageRank [5]. Research in the past has focused on the identification of web communities through the use of bipartite cores [29] or maximum flow in dense subgraphs [14]. These ideas do not apply to our construction. For one, we are not trying to identify a community of the starting site, but a sample of its trust neighborhood. In fact, we never look at the links coming out of s (or any other site) directly. One of the benefits of our method is that we do not need to explore the web graph explicitly, which would be impossible for a client computer.

7.

RELATED WORK

Web spamming has received a lot of attention lately [1, 3, 4, 5, 12, 13, 20, 22, 23, 25, 29, 32, 33, 35]. The first papers to raise the issue were [33, 23]. The spammers’ success was noted in [4, 10, 12, 13, 17, 24]. Web search was explained in [2]. The related topic of cognitive hacking was introduced in [11]. Characteristics of spamming sites based on diversion from power laws are presented in [12]. Current tricks employed by spammers are detailed in [19]. An analysis of the popular PageRank method employed by many search engines today and ways to maximize it in a spamming network is described in [5]. TrustRank, a modification to the PageRank to take into account the evaluations of a few seed pages by human editors, employees of a search engine, is presented in [20]. Techniques for identifying automatically link farms of spam pages will be presented in [42]. A comprehensive treatment on social networks is presented in [41]. The connection between the Web and social networks was explicitly noted in [30, 36] and implicitly used

S U-1 U-2 U-3 U-4 U-5 U-6 U-7 U-8 T-1 T-2

|VG | 1307 1380 875 457 716 312 81 1547 1429 241

|EG | 1544 1716 985 509 807 850 191 1849 1566 247

|VBCC | 228 266 97 63 105 228 32 200 164 13

|EBCC | 465 593 189 115 189 763 143 430 273 17

Trust. 2% 4% 0% 0% 0% 9% 0% 5% 56% 77%

Untr. 74% 78% 80% 69% 64% 60% 100% 70% 3% 15%

Table 2: Sizes of the explored graphs and their BCC’s for eight untrustworthy (U-1 to U-8) and two trustworthy (T-1 and T-2) starting sites. Column |VG | contains the number of vertices that our algorithm found in the trust neighborhood of starting site s (starting from site s and exploring in breadth-first search the backlinks of s. Column |EG | has the number of edges in the trust neighborhood. Columns |VBCC | and |EBCC | contains the numbers of edges of the largest biconnected component within G. The last two columns contain the estimated percentages of trustworthy and untrustworthy sites found in the BCCs. 20% of each BCC were evaluated using stratified sampling with stratum a site’s similarity to the starting site.

in [6, 28]. In fact, Kleinberg’s work explores many of these connections (e.g., [27]). Identification of web communities was explored in [29, 14]. Propagation methods for trust and distrust are discussed in [18]. Work on topic-sensitive and personalized web search is presented in [21, 26]. The effect that search engines have on page popularity was discussed in [9].

8.

CONCLUSIONS

In this paper we have argued that web spam is to cyberworld what propaganda is to society. As far as we know, this is the first time this relationship is noted. As evidence of the importance of this analogy, we have shown that the evolution of search engines can be simply understood as the search engines’ response defending against spam.4 New search engines are not invented every few years, as it is sometimes reported; they are developed when researchers have a good answer to spam. Further, our findings suggests that anti-spamming techniques can now be developed by mimicking anti-propagandistic methods. In particular, we have presented automatic ways of recognizing trust graphs on the web based on the biconnected component around some starting site. Experimental results from a number of such instances show our algorithm’s ability of recognizing parts of a spamming network. With such results, the question arises as to what one should do once one recognizes a spamming network. This is a question that has not attracted much attention in the past. The default approach is that a search engine would delete such networks from its indices [12] or might downgrade them by some prespecified amount [20]. Both of these approaches, however, require a universal agreement of what constitutes spam. Such an agreement cannot exist; one person’s spam may be another person’s treasure. Should the search engines determine what is trustworthy and what is not? Willing or not, they are the de facto arbiters of what information users see [39]. As in a popular cartoon, a kid responds to the old man who has been look4

We do not imply here that web spam is the sole force behind the evolution of the search engines, but that it is a dominant one.

ing all his life for the meaning of life: “If it is not on Google or eBay, it does not exist.” We believe that it is the users’ right and responsibility to decide what is acceptable for them. Their browser, their window to cyberworld, should enhance their ability to make this decision. User education is fundamental: People should know how search engines work and why, and how information appears on the web. But they should also have a browser that can help them determine the validity and trustworthiness of information. The tool we described in an earlier section is a first step in this direction. Ultimately, it would be used along with a set of trust certificates that contains the portable trust preferences of the user, a set of preferences that the user can accumulate over time. Organizations that the user joins and trusts may also add to this set. A combination of search engines capable of providing indexed content and structure [21], including identified neighborhoods, with a browser capable of filtering those neighborhoods through the user’s trust preferences, would provide a new level of reliability to the user’s information gathering. Sharing ranking decisions with the end user will make it much harder for spammers to tune to a single metric.

8.1

Future Work

In our experiments we also devised a simple method to evaluate the similarity of the contents of each site to the starting site s. After the trust neighborhood was explored, we fetched and concatenated a few pages from each site (randomly choosing from the links that appeared in the domain URL) into a document. Then, we tried to determine the similarity of each such document to the document of the starting site. Similarity was determined using the tf.idf ranking on the universe of the sites explored. We are aware that having a limited universe of documents does not give the best similarity results, but we wanted to get a feeling of whether our method could further be used to distinguish between “link farms” and “mutual admiration societies”. The initial results were encouraging (see Fig. 5), showing a higher percentage of untrustworthy sites among those most similar to s. Nevertheless, more work is needed in this area.

Several possible extensions can be considered in this work. Generating graphs with more backlinks per site, comparing the evolution of trust neighborhoods over time, examining the density of the BCCs, and finding a more reliable way to compute similarity are some of them. We also expect that the results would be strengthened if one considers the triconnected (or higher) components of the trust neighborhood.

9.

ACKNOWLEDGEMENTS

The authors would like to thank Mirena Chausheva, Meredith Beaton-Lacoste, Scott Anderson and Scott Dynes for their valuable contributions. They would also like to thank David “Pablo” Cohn and the anonymous referees for their suggestions. The graphs shown in this paper were drawn using the yEd package [43].

10.

Figure 5: The list of sites similar to the starting site U-1 (at the end of the list). The hilited sites are those that participate in the BCC. The number in front of the URL corresponds to its calculated similarity to the starting site.

REFERENCES

[1] B. Amento, L. Terveen, and W. Hill. Does authority mean quality? Predicting expert quality ratings of web documents. In Proceedings of the Twenty-Third Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, 2000. [2] A. Arasu, J. Cho, H. Garcia-Molina, A. Paepcke, and S. Raghavan. Searching the web. ACM Transactions on Internet Technology, 1(1):2–43, June 2001. [3] K. Bharat, A. Z. Broder, J. Dean, and M. R. Henzinger. A comparison of techniques to find mirrored hosts on the WWW. Journal of the American Society of Information Science, 51(12):1114–1122, 2000. [4] K. Bharat, B.-W. Chang, M. R. Henzinger, and M. Ruhl. Who links to whom: Mining linkage between web sites. In Proceedings of the 2001 IEEE International Conference on Data Mining, pages 51–58. IEEE Computer Society, 2001. [5] M. Bianchini, M. Gori, and F. Scarselli. PageRank and web communities. In Web Intelligence Conference 2003, Oct. 2003. [6] S. Brin and L. Page. The anatomy of a large-scale hypertextual Web search engine. Computer Networks and ISDN Systems, 30(1–7):107–117, 1998. [7] A. Broder. A taxonomy of web search. SIGIR Forum, 36(2):3–10, 2002. [8] A. Broder, R. Kumar, F. Maghoul, P. Raghavan, S. Rajagopalan, R. Stata, A. Tomkins, and J. Wiener. Graph structure in the web. Comput. Networks, 33(1-6):309–320, 2000. [9] J. Cho and S. Roy. Impact of search engines on page popularity. In WWW 2004, May 2004. [10] T. S. Corey. Catching on-line traders in a web of lies: The perils of internet stock fraud. Ford Marrin Esposito, Witmeyer & Glesser, LLP, May 2001. http://www.fmew.com/archive/lies/. [11] G. Cybenko, A. Giani, and P. Thompson. Cognitive hacking: A battle for the mind. Computer, 35(8):50–56, 2002. [12] D. Fetterly, M. Manasse, and M. Najork. Spam, damn spam, and statistics. In WebDB2004, June 2004. [13] D. Fetterly, M. Manasse, M. Najork, and J. Wiener. A large-scale study of the evolution of web pages. In

[14]

[15] [16] [17]

[18]

[19]

[20]

[21]

[22] [23]

[24]

[25]

[26]

[27]

[28]

[29]

[30]

[31]

[32]

Proceedings of the twelfth international conference on World Wide Web, pages 669–678. ACM Press, 2003. G. W. Flake, S. Lawrence, C. L. Giles, and F. Coetzee. Self-organization of the web and identification of communities. IEEE Computer, 35(3):66–71, 2002. I. for Propaganda Analysis. How to detect propaganda. Propaganda Analysis, 1(2), 1937. Google. The Google API. http://www.google.com/apis/. L. Graham and P. T. Metaxas. “Of course it’s true; i saw it on the internet!”: Critical thinking in the internet era. Commun. ACM, 46(5):70–75, 2003. R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. Propagation of trust and distrust. In WWW 2004, May 2004. Z. Gyongui and H. Garcia-Molina. Web spam taxonomy. Technical Report TR 2004-25, Stanford University, 2004. Z. Gyongui, H. Garcia-Molina, and J. Pedersen. Combating web spam with TrustRank. In VLDB 2004, Aug. 2004. T. H. Haveliwala. Topic-sensitive pagerank. In Proceedings of the eleventh international conference on World Wide Web, pages 517–526. ACM Press, 2002. M. R. Henzinger. Hyperlink analysis for the web. IEEE Internet Computing, 5(1):45–50, 2001. M. R. Henzinger, R. Motwani, and C. Silverstein. Challenges in web search engines. SIGIR Forum, 36(2):11–22, 2002. M. Hindman, K. Tsioutsiouliklis, and J. Johnson. Googlearchy: How a few heavily-linked sites dominate politics on the web. In Annual Meeting of the Midwest Political Science Association, April 3-6 2003. L. Introna and H. Nissenbaum. Defining the web: The politics of search engines. Computer, 33(1):54–62, 2000. G. Jeh and J. Widom. Scaling personalized web search. In Proceedings of the twelfth international conference on World Wide Web, pages 271–279. ACM Press, 2003. J. Kleinberg. The small-world phenomenon: an algorithm perspective. In STOC ’00: Proceedings of the thirty-second annual ACM symposium on Theory of computing, pages 163–170. ACM Press, 2000. J. M. Kleinberg. Authoritative sources in a hyperlinked environment. Journal of the ACM, 46(5):604–632, 1999. R. Kumar, P. Raghavan, S. Rajagopalan, and A. Tomkins. Trawling the Web for emerging cyber-communities. Computer Networks (Amsterdam, Netherlands: 1999), 31(11–16):1481–1493, 1999. R. Kumar, P. Raghavan, S. Rajagopalan, and A. Tomkins. The web and social networks. IEEE Computer, 35(11):32–36, 2002. A. M. Lee and E. B. Lee(eds.). The Fine Art of Propaganda. The Institute for Propaganda Analysis. Harcourt, Brace and Co., 1939. C. A. Lynch. When documents deceive: trust and provenance as new factors for information retrieval in a tangled web. J. Am. Soc. Inf. Sci. Technol., 52(1):12–17, 2001.

[33] M. Marchiori. The quest for correct information on the web: hyper search engines. Comput. Netw. ISDN Syst., 29(8-13):1225–1235, 1997. [34] M. L. Maulding. Lycos: Design choices in an internet search service. IEEE Expert, January-February(12):8–11, 1997. [35] G. Pringle, L. Allison, and D. L. Dowe. What is a tall poppy among web pages? In Proceedings of the seventh international conference on World Wide Web 7, pages 369–377. Elsevier Science Publishers B. V., 1998. [36] P. Raghavan. Social networks: From the web to the enterprise. IEEE Internet Computing, 6(1):91–94, 2002. [37] G. Salton. Dynamic document processing. Commun. ACM, 15(7):658–668, 1972. [38] C. Silverstein, H. Marais, M. Henzinger, and M. Moricz. Analysis of a very large web search engine query log. SIGIR Forum, 33(1):6–12, 1999. [39] M. Totty and M. Mangalindan. As google becomes web’s gatekeeper, sites fight to get in. In Wall Street Journal CCXLI(39), February 26 2003. [40] A. Vedder. Medical data, new information technologies and the need for normative principles other than privacy rules. In Law and Medicine. M. Freeman and A. Lewis (Eds.), (Series Current Legal Issues), pages 441–459. Oxford University Press, 2000. [41] S. Wasserman and K. Faust. Social Network Analysis: Methods and Applications. Cambridge University Press, 1994. [42] B. Wu and B. Davison. Identifying link farm spam pages. In WWW 2005, May 2005. [43] yWorks. yEd – java graph editor, v. 2.2.1. http://www.yworks.com/en/products yed about.htm.