Table of contents for issues of Lecture Notes in Computer Science

Last update: Sat Apr 27 11:16:55 MDT 2019                Valid HTML 3.2!

Volume 7200, 2012
Volume 7201, 2012
Volume 7202, 2012
Volume 7203, 2012
Volume 7204, 2012
Volume 7205, 2012
Volume 7206, 2012
Volume 7207, 2012
Volume 7208, 2012
Volume 7209, 2012
Volume 7210, 2012
Volume 7211, 2012
Volume 7212, 2012
Volume 7213, 2012
Volume 7214, 2012
Volume 7215, 2012
Volume 7216, 2012
Volume 7217, 2012
Volume 7218, 2012
Volume 7220, 2012
Volume 7221, 2012
Volume 7222, 2012
Volume 7223, 2012
Volume 7224, 2012
Volume 7225, 2012
Volume 7226, 2012
Volume 7227, 2012
Volume 7228, 2012
Volume 7230, 2012
Volume 7231, 2012
Volume 7232, 2012
Volume 7234, 2012
Volume 7235, 2012
Volume 7236, 2012
Volume 7238, 2012
Volume 7239, 2012
Volume 7240, 2012
Volume 7241, 2012
Volume 7243, 2012
Volume 7244, 2012
Volume 7245, 2012
Volume 7246, 2012
Volume 7247, 2012
Volume 7248, 2012


Lecture Notes in Computer Science
Volume 7200, 2012

          Giuseppe Anastasi and   
             Emilio Bellini and   
        Elisabetta Di Nitto and   
               Carlo Ghezzi and   
                  Letizia Tanca   Introduction . . . . . . . . . . . . . . 1--5
          Giuseppe Anastasi and   
             Emilio Bellini and   
        Elisabetta Di Nitto and   
               Carlo Ghezzi and   
                  Letizia Tanca   Reference Case Study . . . . . . . . . . 7--13
                      Anonymous   Front Matter . . . . . . . . . . . . . . 15--16
                 Emilio Bellini   Which Collaboration Strategy for the
                                  Networked Enterprise in Wine Industry?
                                  Technological and Organizational
                                  Challenges . . . . . . . . . . . . . . . 17--30
             Emilio Bellini and   
          Claudio Dell' Era and   
               Roberto Verganti   A Design-Driven Approach for the
                                  Innovation Management within Networked
                                  Enterprises  . . . . . . . . . . . . . . 31--57
            Bruno Basalisco and   
                   Guido M. Rey   Enhancing the Networked Enterprise for
                                  SMEs: a Service Platforms-Oriented
                                  Industrial Policy  . . . . . . . . . . . 59--81
                      Anonymous   Front Matter . . . . . . . . . . . . . . 83--84
   Nicol\`o M. Calcavecchia and   
        Elisabetta Di Nitto and   
           Daniel J. Dubois and   
                   Carlo Ghezzi   Complex Autonomic Systems for Networked
                                  Enterprises: Mechanisms, Solutions and
                                  Design Approaches  . . . . . . . . . . . 85--113
            Gerardo Canfora and   
          Giancarlo Tretola and   
                  Eugenio Zimeo   Autonomic Workflow and Business Process
                                  Modelling for Networked Enterprises  . . 115--142
          Antonia Bertolino and   
       Guglielmo De Angelis and   
   Felicita Di Giandomenico and   
                  Eda Marchetti   Verification and Analysis of Autonomic
                                  Systems for Networked Enterprises  . . . 143--169
                      Anonymous   Front Matter . . . . . . . . . . . . . . 171--173
         Marcello Montedoro and   
               Giorgio Orsi and   
            Licia Sbattella and   
                Roberto Tedesco   Ontology-Based Knowledge Elicitation: An
                                  Architecture . . . . . . . . . . . . . . 175--191
            Licia Sbattella and   
                Roberto Tedesco   Knowledge Extraction from Natural
                                  Language Processing  . . . . . . . . . . 193--219
   Alireza Rezaei Mahdiraji and   
                Bruno Rossi and   
           Alberto Sillitti and   
                Giancarlo Succi   Knowledge Extraction from Events Flows   221--236
         Cristiana Bolchini and   
          Elisa Quintarelli and   
         Fabio A. Schreiber and   
       Maria Teresa Baldassarre   Context-Aware Knowledge Querying in a
                                  Networked Enterprise . . . . . . . . . . 237--258
               Giorgio Orsi and   
                  Letizia Tanca   On-the-Fly and Context-Aware Integration
                                  of Heterogeneous Data Sources  . . . . . 259--276
         Cristiana Bolchini and   
          Elisa Quintarelli and   
                  Letizia Tanca   Context Support for Designing Analytical
                                  Queries  . . . . . . . . . . . . . . . . 277--289
                      Anonymous   Front Matter . . . . . . . . . . . . . . 291--293
              Cesare Alippi and   
           Giacomo Boracchi and   
            Romolo Camplani and   
                  Manuel Roveri   Wireless Sensor Networks for Monitoring
                                  Vineyards  . . . . . . . . . . . . . . . 295--310
          Giuseppe Anastasi and   
                Marco Conti and   
         Mario Di Francesco and   
               Ilaria Giannetti   Design, Implementation, and Field
                                  Experimentation of a Long-Lived
                                  Multi-hop Sensor Network for Vineyard
                                  Monitoring . . . . . . . . . . . . . . . 311--327
        Gaetano F. Anastasi and   
                Enrico Bini and   
                Giuseppe Lipari   Extracting Data from WSNs: a
                                  Service-Oriented Approach  . . . . . . . 329--356
         Fabio A. Schreiber and   
            Romolo Camplani and   
                     Guido Rota   Extracting Data from WSNs: a
                                  Data-Oriented Approach . . . . . . . . . 357--373
              Marcello Mura and   
           Simone Campanoni and   
         William Fornaciari and   
             Mariagiovanna Sami   Optimal Design of Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 375--395
      Mario G. C. A. Cimino and   
           Francesco Marcelloni   Enabling Traceability in the Wine Supply
                                  Chain  . . . . . . . . . . . . . . . . . 397--412
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7201, 2012

                Hans Daduna and   
                Lars Peter Saul   Availability in Large Networks: Global
                                  Characteristics from Local Unreliability
                                  Properties . . . . . . . . . . . . . . . 1--15
                 Feng Zhang and   
                   Jinting Wang   Stochastic Analysis of a Finite Source
                                  Retrial Queue with Spares and Orbit
                                  Search . . . . . . . . . . . . . . . . . 16--30
              Minh Lê and   
                     Max Walter   Bounds for Two-Terminal Network
                                  Reliability with Dependent Basic Events  31--45
           Matthias Meitner and   
            Francesca Saglietti   Software Reliability Testing Covering
                                  Subsystem Interactions . . . . . . . . . 46--60
                 Kai Höfig   Failure-Dependent Timing Analysis --- a
                                  New Methodology for Probabilistic
                                  Worst-Case Execution Time Analysis . . . 61--75
               Sebastian Vastag   A Calculus for SLA Delay Properties  . . 76--90
             Nikola Ivkovic and   
               Dario Kresic and   
      Kai-Steffen Hielscher and   
                Reinhard German   Verifying Worst Case Delays in
                                  Controller Area Network  . . . . . . . . 91--105
        Marijn R. Jongerden and   
         Boudewijn R. Haverkort   Lifetime Improvement by Battery
                                  Scheduling . . . . . . . . . . . . . . . 106--120
                   Arpit Sharma   Weighted Probabilistic Equivalence
                                  Preserves $\omega$-Regular Properties    121--135
          Sonja Georgievska and   
                  Suzana Andova   Probabilistic CSP: Preserving the Laws
                                  via Restricted Schedulers  . . . . . . . 136--150
Luis María Ferrer Fioriti and   
                Holger Hermanns   Heuristics for Probabilistic Timed
                                  Automata with Abstraction Refinement . . 151--165
                Ramin Sadre and   
                 Anne Remke and   
             Sjors Hettinga and   
            Boudewijn Haverkort   Simulative and Analytical Evaluation for
                                  ASD-Based Embedded Software  . . . . . . 166--181
      Alireza Abdollahpouri and   
             Bernd E. Wolfinger   Reducing Channel Zapping Delay in
                                  WiMAX-Based IPTV Systems . . . . . . . . 182--196
                  Shu Huang and   
                   Ilia Baldine   Performance Evaluation of 10GE NICs with
                                  SR-IOV Support: I/O Virtualization and
                                  Network Stack Optimizations  . . . . . . 197--205
             Ulrich Winkler and   
               Wasif Gilani and   
                  Alan Marshall   Business Driven BCM SLA Translation for
                                  Service Oriented Systems . . . . . . . . 206--220
                  Ralf Jahr and   
            Horia Calborean and   
              Lucian Vintan and   
                   Theo Ungerer   Boosting Design Space Explorations with
                                  Existing or Automatically Learned
                                  Knowledge  . . . . . . . . . . . . . . . 221--235
           Michael Hoefling and   
              Michael Menth and   
            Christian Kniep and   
                   Marcus Camen   IBPM: An Open-Source-Based Framework for
                                  InfiniBand Performance Monitoring  . . . 236--239
    Philipp M. Eittenberger and   
                 Udo R. Krieger   A Workbench for Internet Traffic
                                  Analysis . . . . . . . . . . . . . . . . 240--243
        Alexander Gouberman and   
               Martin Riedl and   
            Johann Schuster and   
                  Markus Siegle   A Modelling and Analysis Environment for
                                  LARES  . . . . . . . . . . . . . . . . . 244--248
           Jonathan Bogdoll and   
             Arnd Hartmanns and   
                Holger Hermanns   Simulation and Statistical Model
                                  Checking for Modestly Nondeterministic
                                  Models . . . . . . . . . . . . . . . . . 249--252
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7202, 2012

                 Binbin Lin and   
              Chiyuan Zhang and   
                     Xiaofei He   Orthogonal Projection Analysis . . . . . 1--8
               Zhi-Yong Liu and   
                  Hong Qiao and   
                         Lei Xu   A Weight Regularized Relaxation Based
                                  Graph Matching Algorithm . . . . . . . . 9--16
               Shuyuan Yang and   
                  DiJun Zuo and   
                   Min Wang and   
                   Licheng Jiao   Online Sequential Extreme Learning of
                                  Sparse Ridgelet Kernel Regressor for
                                  Nonlinear Time-Series Prediction . . . . 17--26
                 Zaihu Pang and   
                  Xihong Wu and   
                         Lei Xu   A Comparative Study of RPCL and MCE
                                  Based Discriminative Training Methods
                                  for LVCSR  . . . . . . . . . . . . . . . 27--34
                 Zhiqian Wu and   
         Masafumi Hashimoto and   
                Baolong Guo and   
             Kazuhiko Takahashi   A Path Prediction Method for
                                  Human-Accompanying Mobile Robot Based on
                                  Neural Network . . . . . . . . . . . . . 35--42
              Xiaojie Zhang and   
                  Bendu Bai and   
                        Ying Li   Tri-training Based on Neural Network
                                  Ensemble Algorithm . . . . . . . . . . . 43--49
         Kazuhiko Takahashi and   
            Motoki Kurokawa and   
             Masafumi Hashimoto   Remarks on Multi-layer Quantum Neural
                                  Network Controller Trained by Real-Coded
                                  Genetic Algorithm  . . . . . . . . . . . 50--57
              Chun-guang Li and   
                Xianbiao Qi and   
                    Jun Guo and   
                        Bo Xiao   An Evaluation on Different Graphs for
                                  Semi-supervised Learning . . . . . . . . 58--65
                Yangyang Li and   
                      Bo Wu and   
                    Lc Jiao and   
                    Ruochen Liu   Memetic Algorithm with Double Mutation
                                  for Numerical Optimization . . . . . . . 66--73
                   Biao Hou and   
                   Xi Cheng and   
                Hua Qiong Jiang   Target Reconstruction Using
                                  Manifold-Based Compressive Sensing . . . 74--80
                     Lin Li and   
               Xiu-jiu Yuan and   
                       Hong Liu   An Iterative Method for the Least
                                  Squares Anti-bisymmetric Solution of the
                                  Matrix Equation $A X = B$  . . . . . . . 81--88
                   Wei Wang and   
                Wei-ping He and   
                    Lei Lei and   
                     Wen-tao Li   The Regional Detection of $2$D Barcode
                                  in Complicated Backgrounds of Metal
                                  Parts  . . . . . . . . . . . . . . . . . 89--96
                 Luoxia Liu and   
                      Bendu Bai   Searching for the Best Matching Atoms
                                  Based on Multi-swarm Co-operative PSO    97--103
              Dongwei Zhang and   
                       Ying Guo   A Novel Algorithm for CPM-Signal
                                  Endpoint Detection Based on Auto
                                  Correlation  . . . . . . . . . . . . . . 104--111
                 Zhen Zhang and   
              Yanning Zhang and   
                    Rui Yao and   
                  Haisen Li and   
                         Yu Zhu   Generalized Kernel Density Estimation
                                  Based Robust Estimator and Its
                                  Application  . . . . . . . . . . . . . . 112--121
               Tae-Hyun Kim and   
             Dong-Chul Park and   
               Dong-Min Woo and   
            Taikyeong Jeong and   
                  Soo-Young Min   Multi-class Classifier-Based AdaBoost
                                  Algorithm  . . . . . . . . . . . . . . . 122--127
                   Yong Xia and   
                  Zhe Zhang and   
               Lingfeng Wen and   
                   Pei Dong and   
               David Dagan Feng   GA and AdaBoost-Based Feature Selection
                                  and Combination for Automated
                                  Identification of Dementia Using FDG-PET
                                  Imaging  . . . . . . . . . . . . . . . . 128--135
                  Xing Shen and   
              Shuheng Zhang and   
                    Rui Yao and   
                Yaqing Chen and   
                Yue-Min Zhu and   
                       Su Zhang   Discrimination between Benign and
                                  Malignant Breast Cancers in Ultrasound
                                  Images Based on Cost-Sensitive Boosting  136--144
                    Yu Zhou and   
                   Cong Rao and   
                     Qin Lu and   
                  Xiang Bai and   
                      Wenyu Liu   Multiple Feature Fusion for Object
                                  Tracking . . . . . . . . . . . . . . . . 145--152
                Wenying Gao and   
               Ling-Li Zeng and   
                   Hui Shen and   
                       Dewen Hu   Estimating Medication Status via
                                  Resting-State Functional Connectivity in
                                  Major Depression . . . . . . . . . . . . 153--159
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7203, 2012

             Jerzy Wa\'sniewski   A Look Back: 57 Years of Scientific
                                  Computing  . . . . . . . . . . . . . . . 1--9
                   Ning Liu and   
      Christopher Carothers and   
                 Jason Cope and   
               Philip Carns and   
                Robert Ross and   
                     Adam Crume   Modeling a Leadership-Scale Storage
                                  System . . . . . . . . . . . . . . . . . 10--19
            Marcin Bazyd\lo and   
           Szymon Francuzik and   
            Cezary Sobaniec and   
             Dariusz Wawrzyniak   Combining Optimistic and Pessimistic
                                  Replication  . . . . . . . . . . . . . . 20--29
         Jerzy Brzezi\'nski and   
       Dariusz Dwornikowski and   
       \Lukasz Pi\katkowski and   
            Grzegorz Soba\'nski   $K$-Resilient Session Guarantees
                                  Synchronization Protocol for Mobile
                                  Ad-Hoc Networks  . . . . . . . . . . . . 30--39
         Jerzy Brzezi\'nski and   
           Micha\l Kalewski and   
             Dariusz Wawrzyniak   On Time Constraints of Reliable
                                  Broadcast Protocols for Ad Hoc Networks
                                  with the Liveness Property . . . . . . . 40--49
               Marek Tudruj and   
                \Lukasz Ma\'sko   Data Transfers on the Fly for
                                  Hierarchical Systems of Chip
                                  Multi-Processors . . . . . . . . . . . . 50--59
          Fred G. Gustavson and   
         Jerzy Wa\'sniewski and   
         José R. Herrero   New Level-3 BLAS Kernels for Cholesky
                                  Factorization  . . . . . . . . . . . . . 60--69
            Leszek Marcinkowski   Parallel Preconditioner for
                                  Nonconforming Adini Discretization of a
                                  Plate Problem on Nonconforming Meshes    70--79
Carl Christian Kjelgaard Mikkelsen and   
         Bo Kågström   Incomplete Cyclic Reduction of Banded
                                  and Strictly Diagonally Dominant Linear
                                  Systems  . . . . . . . . . . . . . . . . 80--91
               Samuel Neves and   
                  Filipe Araujo   Fast and Small Nonlinear Pseudorandom
                                  Number Generators for Computer
                                  Simulation . . . . . . . . . . . . . . . 92--101
               Henryk Piech and   
           Olga Siedlecka-Lamch   Parallel Quantum Algorithm for Finding
                                  the Consistency of Saaty's Matrices  . . 102--111
          Eugeniusz Zieniuk and   
         Krzysztof Szerszen and   
               Marta Kapturczak   A Numerical Approach to the
                                  Determination of $3$D Stokes Flow in
                                  Polygonal Domains Using PIES . . . . . . 112--121
              Fred G. Gustavson   Cache Blocking for Linear Algebra
                                  Algorithms . . . . . . . . . . . . . . . 122--132
           Dulceneia Becker and   
              Marc Baboulin and   
                  Jack Dongarra   Reducing the Amount of Pivoting in
                                  Symmetric Indefinite Systems . . . . . . 133--142
                Julian Hall and   
                     Qi Huangfu   A High Performance Dual Revised Simplex
                                  Solver . . . . . . . . . . . . . . . . . 143--151
               Vaclav Hapla and   
                    David Horak   TFETI Coarse Space Projectors
                                  Parallelization Strategies . . . . . . . 152--162
                Andreas Jocksch   FFTs and Multiple Collective
                                  Communication on Multiprocessor-Node
                                  Architectures  . . . . . . . . . . . . . 163--172
                Ivan Lirkov and   
           Marcin Paprzycki and   
                   Maria Ganzha   Performance Analysis of Parallel
                                  Alternating Directions Algorithm for
                                  Time Dependent Problems  . . . . . . . . 173--182
                 Riccardo Murri   A Novel Parallel Algorithm for Gaussian
                                  Elimination of Sparse Unsymmetric
                                  Matrices . . . . . . . . . . . . . . . . 183--193
                Tomasz Olas and   
          Roman Wyrzykowski and   
                   Pawel Gepner   Parallel FEM Adaptation on Hierarchical
                                  Architectures  . . . . . . . . . . . . . 194--205
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7204, 2012

         Wojciech Bo\.zejko and   
        Mariusz Uchro\'nski and   
            Mieczys\law Wodecki   Parallel Cost Function Determination on
                                  GPU for the Job Shop Scheduling Problem  1--10
                Weiwei Chen and   
                    Ewa Deelman   Partitioning and Scheduling Workflows
                                  across Multiple Sites with Storage
                                  Constraints  . . . . . . . . . . . . . . 11--20
          Maciej Drozdowski and   
           Pawe\l Marciniak and   
            Grzegorz Pawlak and   
                  Maciej P\laza   Grid Branch-and-Bound for Permutation
                                  Flowshop . . . . . . . . . . . . . . . . 21--30
          Joachim Gehweiler and   
                Peter Kling and   
  Friedhelm Meyer auf der Heide   An Experimental Comparison of Load
                                  Balancing Strategies in a Web Computing
                                  Environment  . . . . . . . . . . . . . . 31--40
            Piotr Switalski and   
          Franciszek Seredynski   A Grid Scheduling Based on Generalized
                                  Extremal Optimization for Parallel Job
                                  Model  . . . . . . . . . . . . . . . . . 41--50
               Marek Tudruj and   
                \Lukasz Ma\'sko   Scheduling Parallel Programs Based on
                                  Architecture--Supported Regions  . . . . 51--60
Victor Hugo Yaurima-Basaldua and   
           Andrei Tchernykh and   
             Yair Castro-Garcia   Genetic Algorithm Calibration for Two
                                  Objective Scheduling Parallel Jobs on
                                  Hierarchical Grids . . . . . . . . . . . 61--70
             Uwe Bawidamann and   
                 Marco Nehmeier   Expression Templates and OpenCL  . . . . 71--80
               Tobias Berka and   
            Helge Hagenauer and   
             Marian Vajter\vsic   Portable Explicit Threading and
                                  Concurrent Programming for MPI
                                  Applications . . . . . . . . . . . . . . 81--90
                Noman Javed and   
Frédéric Loulergue   Verification of a Heat Diffusion
                                  Simulation Written with Orléans Skeleton
                                  Library  . . . . . . . . . . . . . . . . 91--100
        Tomasz Müldner and   
            Christopher Fry and   
               Tyler Corbin and   
        Jan Krzysztof Mizio\lek   Parallelization of an XML Data
                                  Compressor on Multi-cores  . . . . . . . 101--110
   Rafael Sachetto Oliveira and   
     Bernardo Martins Rocha and   
   Ronan Mendonça Amorim   Comparing CUDA, OpenCL and OpenGL
                                  Implementations of the Cardiac
                                  Monodomain Equations . . . . . . . . . . 111--120
          Dimitris Saougkos and   
        Aristeidis Mastoras and   
                   George Manis   Fine Grained Parallelism in Recursive
                                  Function Calls . . . . . . . . . . . . . 121--130
              Bartosz Balis and   
               Grzegorz Dyk and   
                   Marian Bubak   On-Line Grid Monitoring Based on
                                  Distributed Query Processing . . . . . . 131--140
          Arkadiusz Chrobot and   
              Maciej Lasota and   
         Grzegorz \Lukawski and   
             Krzysztof Sapiecha   Distributed Memory Virtualization with
                                  the Use of SDDSfL  . . . . . . . . . . . 141--150
             Pawe\l Czarnul and   
          Micha\l Wójcik   Dynamic Compatibility Matching of
                                  Services for Distributed Workflow
                                  Execution  . . . . . . . . . . . . . . . 151--160
               Tomasz Haupt and   
              Nitin Sukhija and   
            Mark F. Horstemeyer   Cyberinfrastructure Support for
                                  Engineering Virtual Organization for
                                  CyberDesign  . . . . . . . . . . . . . . 161--170
             Pawe\l Koperek and   
            W\lodzimierz Funika   Dynamic Business Metrics-driven Resource
                                  Provisioning in Cloud Environments . . . 171--180
               Zdzislaw Onderka   Stochastic Control of the Scalable High
                                  Performance Distributed Computations . . 181--190
               Maciej Panka and   
            Michal Chlebiej and   
       Krzysztof Benedyczak and   
                    Piotr Ba\la   Distributed Collaborative Visualization
                                  on Mobile Devices Using Interactive
                                  Video Streaming Techniques . . . . . . . 191--200
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7205, 2012

           Elias Bareinboim and   
               Carlos Brito and   
                    Judea Pearl   Local Characterizations of Causal
                                  Bayesian Networks  . . . . . . . . . . . 1--17
                Olivier Carloni   Boolean Formulas of Simple Conceptual
                                  Graphs ( $\mathcal{SGBF}$ )  . . . . . . 18--67
        Stefania Costantini and   
            Alessandro Provetti   Conflict, Consistency and
                                  Truth-Dependencies in Graph
                                  Representations of Answer Set Logic
                                  Programs . . . . . . . . . . . . . . . . 68--90
            Natalia Flerova and   
                Emma Rollon and   
                   Rina Dechter   Bucket and Mini-bucket Schemes for $M$
                                  Best Solutions over Graphical Models . . 91--118
 Jérôme Fortin and   
             Rallou Thomopoulos   Supporting Argumentation Systems by
                                  Graph Representation and Computation . . 119--136
           Alexandre Niveau and   
        Hél\`ene Fargier   Representing CSPs with Set-Labeled
                                  Diagrams: a Compilation Map  . . . . . . 137--171
             Camille Pradel and   
      Ollivier Haemmerlé   A Semantic Web Interface Using Patterns:
                                  The SWIP System  . . . . . . . . . . . . 172--187
         Daniel R. Schlegel and   
              Stuart C. Shapiro   Visually Interacting with a Knowledge
                                  Base Using Frames, Logic, and
                                  Propositional Graphs . . . . . . . . . . 188--207
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7206, 2012

             Dimitra Anastasiou   Gestures in Assisted Living Environments 1--12
   Georgios Kouroupetroglou and   
            Alexandros Pino and   
         Athanasios Balmpakakis   Using Wiimote for $2$D and $3$D Pointing
                                  Tasks: Gesture Performance Evaluation    13--23
         Przemys\law G\lomb and   
        Micha\l Romaszewski and   
           Sebastian Opozda and   
               Arkadiusz Sochan   Choosing and Modeling the Hand Gesture
                                  Database for a Natural User Interface    24--35
Maurice H. P. H. van Beurden and   
    Wijnand A. Ijsselsteijn and   
           Yvonne A. W. de Kort   User Experience of Gesture Based
                                  Interfaces: a Comparison with
                                  Traditional Interaction Methods on
                                  Pragmatic and Hedonic Qualities  . . . . 36--47
Alexandros Kontogeorgakopoulos and   
       Georgios Kouroupetroglou   Low Cost Force-Feedback Interaction with
                                  Haptic Digital Audio Effects . . . . . . 48--56
               Mingyuan Chu and   
                    Sotaro Kita   The Role of Spontaneous Gestures in
                                  Spatial Problem Solving  . . . . . . . . 57--68
              Mariusz Kozak and   
            Kristian Nymoen and   
         Rolf Inge Godòy   Effects of Spectral Features of Sound on
                                  Gesture Type and Timing  . . . . . . . . 69--80
                Fiora Pirri and   
              Matia Pizzoli and   
                   Matei Mancas   Human-Motion Saliency in Complex Scenes  81--92
                 Marilyn Panayi   What, Why, Where and How Do Children
                                  Think? Towards a Dynamic Model of
                                  Spatial Cognition as Action  . . . . . . 93--105
          Katerina El Raheb and   
               Yannis Ioannidis   A Labanotation Based Ontology for
                                  Representing Dance Movement  . . . . . . 106--117
              Onno Crasborn and   
               Menzo Windhouwer   ISOcat Data Categories for Signed
                                  Language Resources . . . . . . . . . . . 118--128
          Andy Lücking and   
            Sebastian Ptock and   
               Kirsten Bergmann   Assessing Agreement on Segmentations by
                                  Means of Staccato, the Segmentation
                                  Agreement Calculator according to
                                  Thomann  . . . . . . . . . . . . . . . . 129--138
              Hannes Rieser and   
           Kirsten Bergmann and   
                    Stefan Kopp   How Do Iconic Gestures Convey
                                  Visuo-Spatial Information? Bringing
                                  Together Empirical, Theoretical, and
                                  Simulation Studies . . . . . . . . . . . 139--150
             Maxime Delorme and   
             Michael Filhol and   
              Annelies Braffort   Thumb Modelling for the Generation of
                                  Sign Language  . . . . . . . . . . . . . 151--160
               Sylvie Gibet and   
Pierre-François Marteau and   
                    Kyle Duarte   Toward a Motor Theory of Sign Language
                                  Perception . . . . . . . . . . . . . . . 161--172
          Annelies Braffort and   
Emilie Chételat-Pelé   Analysis and Description of Blinking in
                                  French Sign Language for Automatic
                                  Generation . . . . . . . . . . . . . . . 173--182
       Athanasia-Lida Dimou and   
            Theodore Goulas and   
                Eleni Efthimiou   Grammar/Prosody Modelling in Greek Sign
                                  Language: Towards the Definition of
                                  Built-In Sign Synthesis Rules  . . . . . 183--193
                 Michael Filhol   Combining Two Synchronisation Methods in
                                  a Linguistic Model to Describe Sign
                                  Language . . . . . . . . . . . . . . . . 194--203
           Matilde Gonzalez and   
              Christophe Collet   Sign Segmentation Using Dynamics and
                                  Hand Configuration for Semi-automatic
                                  Annotation of Sign Language Corpora  . . 204--215
              Gianluca Giorgolo   Integration of Gesture and Verbal
                                  Language: a Formal Semantics Approach    216--227
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7207, 2012

                 Hector Geffner   Inference and Learning in Planning . . . 1--1
              Richard S. Sutton   Beyond Reward: The Problem of Knowledge
                                  and Data . . . . . . . . . . . . . . . . 2--6
                     Toby Walsh   Exploiting Constraints . . . . . . . . . 7--13
                  James Cussens   Online Bayesian Inference for the
                                  Parameters of PRISM Programs . . . . . . 14--19
            Hassan Khosravi and   
             Oliver Schulte and   
                Jianfeng Hu and   
                  Tianxiang Gao   Learning Compact Markov Logic Networks
                                  with Decision Trees  . . . . . . . . . . 20--25
 Frédéric Koriche   Relational Networks of Conditional
                                  Preferences  . . . . . . . . . . . . . . 26--32
              Joris Renkens and   
         Guy Van den Broeck and   
              Siegfried Nijssen   $k$-Optimal: a Novel Approximate
                                  Inference Algorithm for ProbLog  . . . . 33--38
             Oliver Schulte and   
            Hassan Khosravi and   
                       Tong Man   Learning Directed Relational Models with
                                  Recursive Dependencies . . . . . . . . . 39--44
              Dalal Alrajeh and   
           Alessandra Russo and   
          Sebastian Uchitel and   
                    Jeff Kramer   Integrating Model Checking and Inductive
                                  Logic Programming  . . . . . . . . . . . 45--60
              Elena Bellodi and   
               Fabrizio Riguzzi   Learning the Structure of Probabilistic
                                  Logic Programs . . . . . . . . . . . . . 61--75
   Radomír \vCernoch and   
         Filip \vZelezný   Subgroup Discovery Using Bump Hunting on
                                  Multi-relational Histograms  . . . . . . 76--90
            Domenico Corapi and   
           Alessandra Russo and   
                      Emil Lupu   Inductive Logic Programming in Answer
                                  Set Programming  . . . . . . . . . . . . 91--97
               Brahim Douar and   
            Michel Liquiere and   
              Chiraz Latiri and   
                  Yahya Slimani   Graph-Based Relational Learning with a
                                  Polynomial Time Projection Algorithm . . 98--112
              Krishna Dubba and   
                Mehul Bhatt and   
                Frank Dylla and   
              David C. Hogg and   
                Anthony G. Cohn   Interleaved Inductive-Abductive
                                  Reasoning for Learning Complex Event
                                  Models . . . . . . . . . . . . . . . . . 113--129
      Carlos Abreu Ferreira and   
           João Gama and   
      Vítor Santos Costa   Predictive Sequence Miner in ILP
                                  Learning . . . . . . . . . . . . . . . . 130--144
            Nuno A. Fonseca and   
  Vítor Santos Costa and   
                    Rui Camacho   Conceptual Clustering of
                                  Multi-Relational Data  . . . . . . . . . 145--159
         Joris J. M. Gillis and   
            Jan Van den Bussche   Expressive Power of Safe First-Order
                                  Logical Decision Trees . . . . . . . . . 160--172
                  Katsumi Inoue   DNF Hypotheses in Explanatory Induction  173--188
          Masakazu Ishihata and   
           Yoshitaka Kameya and   
                   Taisuke Sato   Variational Bayes Inference for
                                  Logic-Based Probabilistic Models on BDDs 189--203
        Parisa Kordjamshidi and   
             Paolo Frasconi and   
        Martijn Van Otterlo and   
           Marie-Francine Moens   Relational Learning for Spatial Relation
                                  Extraction from Natural Language . . . . 204--220
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7208, 2012

                Yu-Neng Fan and   
               Ching-Chin Chern   An Agent Model for Incremental Rough
                                  Set-Based Rule Induction in Customer
                                  Relationship Management  . . . . . . . . 1--12
        Jaume Jordán and   
               Stella Heras and   
          Vicente Julián   Case-Based Argumentation Infrastructure
                                  for Agent Societies  . . . . . . . . . . 13--24
               Piotr Skupin and   
             Mieczyslaw Metzger   The Application of Multi-Agent System in
                                  Monitoring and Control of Nonlinear
                                  Bioprocesses . . . . . . . . . . . . . . 25--36
          Jorge Agüero and   
             Miguel Rebollo and   
          Carlos Carrascosa and   
          Vicente Julián   Agent Capability Taxonomy for Dynamic
                                  Environments . . . . . . . . . . . . . . 37--48
                David Griol and   
        Javier Carbó and   
      José Manuel Molina   Modeling Internet as a User-Adapted
                                  Speech Service . . . . . . . . . . . . . 49--60
               Ricardo Cruz and   
        Andrés Ortiz and   
           Ana M. Barbancho and   
               Isabel Barbancho   Unsupervised Classification of Audio
                                  Signals by Self-Organizing Maps and
                                  Bayesian Labeling  . . . . . . . . . . . 61--70
                 IL-Ho Yang and   
               Min-Seok Kim and   
               Byung-Min So and   
              Myung-Jae Kim and   
                      Ha-Jin Yu   Robust Speaker Identification Using
                                  Ensembles of Kernel Principal Component
                                  Analysis . . . . . . . . . . . . . . . . 71--78
Andrés Sanz-García and   
Julio Fernández-Ceniceros and   
Fernando Antoñanzas-Torres   Application of Genetic Algorithms to
                                  Optimize a Truncated Mean $k$-Nearest
                                  Neighbours Regressor for Hotel
                                  Reservation Forecasting  . . . . . . . . 79--90
              Elnaz Davoodi and   
           Mohsen Afsharchi and   
                Keivan Kianmehr   A Social Network-Based Approach to
                                  Expert Recommendation System . . . . . . 91--102
             Javier de Lope and   
      Darío Maravall and   
         Yadira Quiñonez   Decentralized Multi-tasks Distribution
                                  in Heterogeneous Robot Teams by Means of
                                  Ant Colony Optimization and Learning
                                  Automata . . . . . . . . . . . . . . . . 103--114
         Agnieszka Owczarek and   
               Krzysztof \'Slot   Lipreading Procedure for Liveness
                                  Verification in Video Authentication
                                  Systems  . . . . . . . . . . . . . . . . 115--124
               S. Zeghlache and   
                  D. Saigaa and   
                    K. Kara and   
          Abdelghani Harrag and   
                   A. Bouguerra   Fuzzy Sliding Mode Control with
                                  Chattering Elimination for a Quadrotor
                                  Helicopter in Vertical Flight  . . . . . 125--136
            Giuliano Armano and   
              Camelia Chira and   
                    Nima Hatami   Ensemble of Binary Learners for Reliable
                                  Text Categorization with a Reject Option 137--146
           Ewa Pi\katkowska and   
                  Jerzy Martyna   Spontaneous Facial Expression
                                  Recognition: Automatic Aggression
                                  Detection  . . . . . . . . . . . . . . . 147--158
        Virginia Yannibelli and   
           Analía Amandi   A Memetic Approach to Project Scheduling
                                  that Maximizes the Effectiveness of the
                                  Human Resources Assigned to Project
                                  Activities . . . . . . . . . . . . . . . 159--173
               R. M. Konijn and   
                   W. Kowalczyk   Hunting for Fraudsters in Random Forests 174--185
       Vladimir Bukhtoyarov and   
            Eugene Semenkin and   
                Andrey Shabalov   Neural Networks Ensembles Approach for
                                  Simulation of Solar Arrays Degradation
                                  Process  . . . . . . . . . . . . . . . . 186--195
               Rattan Priya and   
       Bruno Feres de Souza and   
   André L. D. Rossi and   
André C. P. L. F. de Carvalho   Using Genetic Algorithms to Improve
                                  Prediction of Execution Times of ML
                                  Tasks  . . . . . . . . . . . . . . . . . 196--207
             Dragan Simi\'c and   
               Svetlana Simi\'c   Hybrid Artificial Intelligence
                                  Approaches on Vehicle Routing Problem in
                                  Logistics Distribution . . . . . . . . . 208--220
                 Yuchen Liu and   
                   Kai Xiao and   
                 Alei Liang and   
                   Haibing Guan   Fuzzy C-means Clustering with Bilateral
                                  Filtering for Medical Image Segmentation 221--230
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7209, 2012

           Gjorgji Madjarov and   
              Dejan Gjorgjevikj   Hybrid Decision Tree Architecture
                                  Utilizing Local SVMs for Multi-Label
                                  Classification . . . . . . . . . . . . . 1--12
                Shina Sheen and   
            S. V. Aishwarya and   
                  R. Anitha and   
             S. V. Raghavan and   
                  S. M. Bhaskar   Ensemble Pruning Using Harmony Search    13--24
 José A. Sáez and   
                Mikel Galar and   
       Julián Luengo and   
              Francisco Herrera   A First Study on Decomposition
                                  Strategies with Data with Class Noise
                                  Using Decision Trees . . . . . . . . . . 25--35
            Miroslaw Kordos and   
                Piotr Kania and   
              Pawel Budzyna and   
            Marcin Blachnik and   
              Tadeusz Wieczorek   Combining the Advantages of Neural
                                  Networks and Decision Trees for
                                  Regression Problems in a Steel
                                  Temperature Prediction System  . . . . . 36--45
         Tomasz Kajdanowicz and   
         Slawomir Plamowski and   
        Przemyslaw Kazienko and   
                 Wojciech Indyk   Transfer Learning Approach to Debt
                                  Portfolio Appraisal  . . . . . . . . . . 46--55
            Henrietta Toman and   
              Laszlo Kovacs and   
                Agnes Jonas and   
                Lajos Hajdu and   
                   Andras Hajdu   Generalized Weighted Majority Voting
                                  with an Application to Algorithms Having
                                  Spatial Output . . . . . . . . . . . . . 56--67
                 Maciej Grzenda   Towards the Reduction of Data Used for
                                  the Classification of Network Flows  . . 68--77
   A. Martín del Rey and   
G. Rodríguez Sánchez and   
          A. de la Villa Cuenca   Encrypting Digital Images Using Cellular
                                  Automata . . . . . . . . . . . . . . . . 78--88
          Zorana Bankovi\'c and   
                David Fraga and   
        Juan Carlos Vallejo and   
            José M. Moya   Self-Organizing Maps versus Growing
                                  Neural Gas in Detecting Data Outliers
                                  for Security Applications  . . . . . . . 89--96
      Rafael Álvarez and   
  Francisco Martínez and   
José-Francisco Vicent and   
                 Antonio Zamora   Cryptographic Applications of $3 \times
                                  3$ Block Upper Triangular Matrices . . . 97--104
       Ruben Vazquez-Medina and   
José Luis Del-Río-Correa and   
César Enrique Rojas-López   Digital Chaotic Noise Using Tent Map
                                  without Scaling and Discretization
                                  Process  . . . . . . . . . . . . . . . . 105--115
            Nenad Toma\vsev and   
               Dunja Mladeni\'c   Hubness-Aware Shared Neighbor Distances
                                  for High-Dimensional $k$-Nearest
                                  Neighbor Classification  . . . . . . . . 116--127
Rubén Jaramillo-Vacio and   
     Alberto Ochoa-Zezzatti and   
              Armando Rios-Lira   Comparison of Competitive Learning for
                                  SOM Used in Classification of Partial
                                  Discharge  . . . . . . . . . . . . . . . 128--138
         Krystyna Napierala and   
              Jerzy Stefanowski   Identification of Different Types of
                                  Minority Class Examples in Imbalanced
                                  Data . . . . . . . . . . . . . . . . . . 139--150
     Ana M. Martínez and   
           Geoffrey I. Webb and   
            M. Julia Flores and   
    José A. Gámez   Non-Disjoint Discretization for
                                  Aggregating One-Dependence Estimator
                                  Classifiers  . . . . . . . . . . . . . . 151--162
       Stefanos Ougiaroglou and   
       Georgios Evangelidis and   
             Dimitris A. Dervos   An Adaptive Hybrid and Cluster-Based
                                  Model for Speeding Up the $k$-NN
                                  Classifier . . . . . . . . . . . . . . . 163--175
      Joaquín Derrac and   
             Isaac Triguero and   
     Salvador García and   
              Francisco Herrera   A Co-evolutionary Framework for Nearest
                                  Neighbor Enhancement: Combining Instance
                                  and Feature Weighting with Instance
                                  Selection  . . . . . . . . . . . . . . . 176--187
           Francisco Charte and   
             Antonio Rivera and   
María José del Jesus and   
              Francisco Herrera   Improving Multi-label Classifiers via
                                  Label Reduction with Association Rules   188--199
              Olgierd Unold and   
         Maciej Dobrowolski and   
         Henryk Maciejewski and   
            Pawel Skrobanek and   
                  Ewa Walkowicz   A GA-Based Wrapper Feature Selection for
                                  Animal Breeding Data Mining  . . . . . . 200--209
       Stefanos Ougiaroglou and   
           Georgios Evangelidis   A Simple Noise-Tolerant Abstraction
                                  Algorithm for Fast $k$-NN Classification 210--221
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7210, 2012

            Ralf Karrenberg and   
                 Sebastian Hack   Improving Performance of OpenCL on CPUs  1--20
           Swapneela Unkule and   
         Christopher Shaltz and   
                     Apan Qasem   Automatic Restructuring of GPU Kernels
                                  for Exploiting Inter-thread Data
                                  Locality . . . . . . . . . . . . . . . . 21--40
                Mark Marron and   
     Ond\vrej Lhoták and   
               Anindya Banerjee   Programming Paradigm Driven Heap
                                  Analysis . . . . . . . . . . . . . . . . 41--60
              Sandeep Putta and   
                   Rupesh Nasre   Parallel Replication-Based Points-To
                                  Analysis . . . . . . . . . . . . . . . . 61--80
                   Cong Hou and   
               George Vulov and   
             Daniel Quinlan and   
            David Jefferson and   
               Richard Fujimoto   A New Method for Program Inversion . . . 81--100
                Jun Shirako and   
               Kamal Sharma and   
              Naznin Fauzia and   
    Louis-Noël Pouchet and   
                   J. Ramanujam   Analytical Bounds for Optimal Tile Size
                                  Selection  . . . . . . . . . . . . . . . 101--121
                 Taeho Kwon and   
                    Zhendong Su   Static Detection of Unsafe Component
                                  Loadings . . . . . . . . . . . . . . . . 122--143
                  Jing Yang and   
         Gogul Balakrishnan and   
                Naoto Maeda and   
         Franjo Ivan\vci\'c and   
                Aarti Gupta and   
                  Nishant Sinha   Object Model Construction for
                                  Inheritance in C++ and Its Applications
                                  to Program Analysis  . . . . . . . . . . 144--164
              Leaf Petersen and   
                      Neal Glew   GC-Safe Interprocedural Unboxing . . . . 165--184
       Muhammad Umar Farooq and   
                   Lei Chen and   
               Lizy Kurian John   Compiler Support for Value-Based
                                  Indirect Branch Prediction . . . . . . . 185--199
      Chuck (Chengyan) Zhao and   
         J. Gregory Steffan and   
             Cristiana Amza and   
                 Allan Kielstra   Compiler Support for Fine-Grain
                                  Software-Only Checkpointing  . . . . . . 200--219
        Alexandra Jimborean and   
           Luis Mastrangelo and   
           Vincent Loechner and   
                Philippe Clauss   VMAD: An Advanced Dynamic Program
                                  Analysis and Instrumentation Framework   220--239
               Kevin Streit and   
          Clemens Hammacher and   
             Andreas Zeller and   
                 Sebastian Hack   Sambamba: a Runtime System for Online
                                  Adaptive Parallelization . . . . . . . . 240--243
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7211, 2012

              Bjarne Stroustrup   Foundations of C++ . . . . . . . . . . . 1--25
        Mohamed Faouzi Atig and   
                Ahmed Bouajjani   What's Decidable about Weak Memory
                                  Models?  . . . . . . . . . . . . . . . . 26--46
              Gilles Barthe and   
           Delphine Demange and   
                David Pichardie   A Formally Verified SSA-Based Middle-End 47--66
       Sebastian Burckhardt and   
                Daan Leijen and   
          Manuel Fähndrich   Eventually Consistent Transactions . . . 67--86
       Sebastian Burckhardt and   
                 Alexey Gotsman   Concurrent Library Correctness on the
                                  TSO Memory Model . . . . . . . . . . . . 87--107
               Rohit Chadha and   
   \cStefan Ciobâc\ua and   
                   Steve Kremer   Automated Verification of Equivalence
                                  Properties of Cryptographic Protocols    108--127
              Stephen Chang and   
             Matthias Felleisen   The Call-by-Need Lambda Calculus,
                                  Revisited  . . . . . . . . . . . . . . . 128--147
                Taolue Chen and   
              Chris Chilton and   
                  Bengt Jonsson   A Compositional Specification Theory for
                                  Component Behaviours . . . . . . . . . . 148--168
             Patrick Cousot and   
                Michael Monerau   Probabilistic Abstract Interpretation    169--193
Pierre-Malo Deniélou and   
                 Nobuko Yoshida   Multiparty Session Types Meet
                                  Communicating Automata . . . . . . . . . 194--213
          Christos Dimoulas and   
            Sam Tobin-Hochstadt   Complete Monitors for Behavioral
                                  Contracts  . . . . . . . . . . . . . . . 214--233
                Paul Downen and   
                 Zena M. Ariola   A Systematic Approach to Delimited
                                  Control with Multiple Prompts  . . . . . 234--253
                Kento Emoto and   
          Sebastian Fischer and   
                   Zhenjiang Hu   Generate, Test, and Aggregate  . . . . . 254--273
           Lisbeth Fajstrup and   
       Éric Goubault and   
              Emmanuel Haucourt   Trace Spaces: An Efficient New Technique
                                  for State-Space Reduction  . . . . . . . 274--294
             Ansgar Fehnker and   
           Rob van Glabbeek and   
              Peter Höfner   A Process Algebra for Wireless Mesh
                                  Networks . . . . . . . . . . . . . . . . 295--315
            Axel Habermaier and   
                Alexander Knapp   On the Correctness of the SIMT Execution
                                  Model of GPUs  . . . . . . . . . . . . . 316--335
              Peter Hawkins and   
                 Alex Aiken and   
                Kathleen Fisher   Reasoning about Lock Placements  . . . . 336--356
                  Jun Inoue and   
                     Walid Taha   Reasoning about Multi-stage Programs . . 357--376
       Jonas Braband Jensen and   
                  Lars Birkedal   Fictional Separation Logic . . . . . . . 377--396
      Jacques-Henri Jourdan and   
    François Pottier and   
                   Xavier Leroy   Validating LR (1) Parsers  . . . . . . . 397--416
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7212, 2012

        Wil M. P. van der Aalst   Distributed Process Discovery and
                                  Conformance Checking . . . . . . . . . . 1--25
           Davide Di Ruscio and   
            Ivano Malavolta and   
              Henry Muccini and   
           Patrizio Pelliccione   Model-Driven Techniques to Enhance
                                  Architectural Languages Interoperability 26--42
         Sebastian S. Bauer and   
            Alexandre David and   
             Rolf Hennicker and   
      Kim Guldstrand Larsen and   
                     Axel Legay   Moving from Specifications to Contracts
                                  in Component-Based Design  . . . . . . . 43--58
               Kyungmin Bae and   
  Peter Csaba Ölveczky and   
       José Meseguer and   
             Abdullah Al-Nayeem   The SynchAADL2Maude Tool . . . . . . . . 59--62
  José Luiz Fiadeiro and   
           Antónia Lopes   Consistency of Service Composition . . . 63--77
             Jonas Eckhardt and   
      Tobias Mühlbauer and   
              Musab AlTurki and   
       José Meseguer and   
                 Martin Wirsing   Stable Availability under Denial of
                                  Service Attacks through Formal Patterns  78--93
            Stefan Naujokat and   
        Anna-Lena Lamprecht and   
               Bernhard Steffen   Loose Programming with PROPHETS  . . . . 94--98
                  Vineet Kahlon   Schedule Insensitivity Reduction . . . . 99--114
                Leo Hatvani and   
            Paul Pettersson and   
             Cristina Seceleanu   Adaptive Task Automata: a Framework for
                                  Verifying Adaptive Embedded Systems  . . 115--129
              Elvira Albert and   
              Richard Bubel and   
               Samir Genaim and   
         Reiner Hähnle and   
Guillermo Román-Díez   Verified Resource Guarantees for Heap
                                  Manipulating Programs  . . . . . . . . . 130--145
       Fabrizio Maria Maggi and   
              Marco Montali and   
        Wil M. P. van der Aalst   An Operational Decision Support
                                  Framework for Monitoring Business
                                  Constraints  . . . . . . . . . . . . . . 146--162
              Zinovy Diskin and   
                Tom Maibaum and   
            Krzysztof Czarnecki   Intermodeling, Queries, and Kleisli
                                  Categories . . . . . . . . . . . . . . . 163--177
              Frank Hermann and   
              Hartmut Ehrig and   
              Claudia Ermel and   
                Fernando Orejas   Concurrent Model Synchronization with
                                  Conflict Resolution Based on Triple
                                  Graph Grammars . . . . . . . . . . . . . 178--193
           Julian Bradfield and   
                Perdita Stevens   Recursive Checkonly QVT-R
                                  Transformations with General when and
                                  where Clauses via the Modal Mu Calculus  194--208
             Maarten de Mol and   
              Arend Rensink and   
                  James J. Hunt   Graph Transforming Java Data . . . . . . 209--223
                 Rick Salay and   
           Michalis Famelis and   
                 Marsha Chechik   Language Independent Refinement Using
                                  Partial Modeling . . . . . . . . . . . . 224--239
              Roberto Bruni and   
           Andrea Corradini and   
             Fabio Gadducci and   
     Alberto Lluch Lafuente and   
                  Andrea Vandin   A Conceptual Framework for Adaptation    240--254
           Thomas Thüm and   
               Ina Schaefer and   
           Martin Kuhlemann and   
                  Sven Apel and   
                   Gunter Saake   Applying Design by Contract to
                                  Feature-Oriented Programming . . . . . . 255--269
               Jiangfan Shi and   
              Myra B. Cohen and   
               Matthew B. Dwyer   Integration Testing of Software Product
                                  Lines Using Compositional Symbolic
                                  Execution  . . . . . . . . . . . . . . . 270--284
                Julia Rubin and   
                 Marsha Chechik   Combining Related Products into Product
                                  Lines  . . . . . . . . . . . . . . . . . 285--300
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7213, 2012

             Andrea Cal\`\i and   
              Georg Gottlob and   
                   Giorgio Orsi   Querying UML Class Diagrams  . . . . . . 1--25
                  Glynn Winskel   Bicategories of Concurrent Games . . . . 26--41
               Robert Atkey and   
                 Neil Ghani and   
                    Bart Jacobs   Fibrational Induction Meets Effects  . . 42--57
Ji\vrí Adámek and   
                 Filippo Bonchi   A Coalgebraic Perspective on
                                  Minimization and Determinization . . . . 58--73
                Danel Ahman and   
              James Chapman and   
                  Tarmo Uustalu   When Is a Container a Comonad? . . . . . 74--88
Ji\vrí Adámek and   
              Stefan Milius and   
               Lawrence S. Moss   Well-Pointed Coalgebras (Extended
                                  Abstract)  . . . . . . . . . . . . . . . 89--103
                   Ana Bove and   
                   Peter Dybjer   Combining Interactive and Automatic
                                  Reasoning in First Order Theories of
                                  Functional Programs  . . . . . . . . . . 104--118
          Dariusz Biernacki and   
             Sergue\"\i Lenglet   Applicative Bisimulations for
                                  Delimited-Control Operators  . . . . . . 119--134
       Sebastian Preugschat and   
                   Thomas Wilke   Effective Characterizations of Simple
                                  Fragments of Temporal Logic Using
                                  Prophetic Automata . . . . . . . . . . . 135--149
             Stefan Breuers and   
           Christof Löding   Improved Ramsey-Based Büchi
                                  Complementation  . . . . . . . . . . . . 150--164
               Helmut Seidl and   
             Andreas Reuß   Extending ${\cal H}_1$-Clauses with Path
                                  Disequalities  . . . . . . . . . . . . . 165--179
           Radha Jagadeesan and   
              Gustavo Petri and   
                    James Riely   Brookes Is Relaxed, Almost!  . . . . . . 180--194
             Marco Bernardo and   
                Rocco De Nicola   Revisiting Trace and Testing
                                  Equivalences for Nondeterministic and
                                  Probabilistic Processes  . . . . . . . . 195--209
                 Kirstin Peters   Is It a ``Good'' Encoding of Mixed
                                  Choice?  . . . . . . . . . . . . . . . . 210--224
               Silvia Crafa and   
                Daniele Varacca   Event Structure Semantics of Parallel
                                  Extrusion in the Pi-Calculus . . . . . . 225--239
        Daniel Gorín and   
             Lutz Schröder   Narcissists Are Easy, Stepmothers Are
                                  Hard . . . . . . . . . . . . . . . . . . 240--254
             Alexander Kurz and   
                Tomoyuki Suzuki   On Nominal Regular Languages with
                                  Binders  . . . . . . . . . . . . . . . . 255--269
          Krishnendu Chatterjee   Robustness of Structurally Equivalent
                                  Concurrent Parity Games  . . . . . . . . 270--285
             Thomas Brihaye and   
     Véronique Bruy\`ere   Subgame Perfection for Equilibria in
                                  Quantitative Reachability Games  . . . . 286--300
            Patricia Bouyer and   
               Romain Brenguier   Concurrent Games with Ordered Objectives 301--315
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7214, 2012

                Holger Hermanns   Quantitative Models for a Not So Dumb
                                  Grid . . . . . . . . . . . . . . . . . . 1--1
       Razieh Nokhbeh Zaeem and   
             Divya Gopinath and   
           Sarfraz Khurshid and   
            Kathryn S. McKinley   History-Aware Data Structure Repair
                                  Using SAT  . . . . . . . . . . . . . . . 2--17
               David Hardin and   
               Konrad Slind and   
             Michael Whalen and   
                 Tuan-Hung Pham   The Guardol Language and Verification
                                  System . . . . . . . . . . . . . . . . . 18--32
                  Arlen Cox and   
    Sriram Sankaranarayanan and   
             Bor-Yuh Evan Chang   A Bit Too Precise? Bounded Verification
                                  of Quantized Digital Filters . . . . . . 33--47
              Vijay D'Silva and   
             Leopold Haller and   
            Daniel Kroening and   
             Michael Tautschnig   Numeric Bounds Analysis with
                                  Conflict-Driven Learning . . . . . . . . 48--63
           Oliver Friedmann and   
                   Martin Lange   Ramsey-Based Analysis of Parity Automata 64--78
     Ond\vrej Lengál and   
Ji\vrí \vSimá\vcek and   
          Tomá\vs Vojnar   VATA: a Library for Efficient
                                  Manipulation of Non-deterministic Tree
                                  Automata . . . . . . . . . . . . . . . . 79--94
      Tomá\vs Babiak and   
Mojmír K\vretínský and   
   Vojt\vech \vRehák and   
                 Jan Strej\vcek   LTL to Büchi Automata Translation: Fast
                                  and More Deterministic . . . . . . . . . 95--109
                    Fu Song and   
                 Tayssir Touili   Pushdown Model Checking for Malware
                                  Detection  . . . . . . . . . . . . . . . 110--125
            Kevin W. Hamlen and   
             Micah M. Jones and   
                  Meera Sridhar   Aspect-Oriented Runtime Monitor
                                  Certification  . . . . . . . . . . . . . 126--140
Frédéric Lang and   
                  Radu Mateescu   Partial Model Checking Using Networks of
                                  Labelled Transition Systems and Boolean
                                  Equation Systems . . . . . . . . . . . . 141--156
           Aws Albarghouthi and   
             Arie Gurfinkel and   
                 Marsha Chechik   From Under-Approximations to
                                  Over-Approximations and Back . . . . . . 157--172
             Ansgar Fehnker and   
           Rob van Glabbeek and   
          Peter Höfner and   
           Annabelle McIver and   
                Marius Portmann   Automated Analysis of AODV Using UPPAAL  173--187
               Zhihao Jiang and   
             Miroslav Pajic and   
              Salar Moarref and   
                Rajeev Alur and   
                Rahul Mangharam   Modeling and Verification of a Dual
                                  Chamber Implantable Pacemaker  . . . . . 188--203
        Parosh Aziz Abdulla and   
        Mohamed Faouzi Atig and   
               Yu-Fang Chen and   
           Carl Leonardsson and   
                   Ahmed Rezine   Counter-Example Guided Fence Insertion
                                  under TSO  . . . . . . . . . . . . . . . 204--219
                Huafeng Jin and   
         Tuba Yavuz-Kahveci and   
             Beverly A. Sanders   Java Memory Model-Aware Model Checking   220--236
            Corneliu Popeea and   
             Andrey Rybalchenko   Compositional Termination Proofs for
                                  Multi-threaded Programs  . . . . . . . . 237--251
               Marius Bozga and   
                 Radu Iosif and   
         Filip Kone\vcný   Deciding Conditional Termination . . . . 252--266
         Alessandro Armando and   
                Wihem Arsac and   
            Tigran Avanesov and   
           Michele Barletta and   
                  Alberto Calvi   The AVANTSSAR Platform for the Automated
                                  Validation of Trust and Security of
                                  Service-Oriented Architectures . . . . . 267--282
                 Anduo Wang and   
            Carolyn Talcott and   
     Alexander J. T. Gurney and   
              Boon Thau Loo and   
                  Andre Scedrov   Reduction-Based Formal Analysis of BGP
                                  Instances  . . . . . . . . . . . . . . . 283--298
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7215, 2012

                  Cynthia Dwork   Differential Privacy and the Power of
                                  (Formalizing) Negative Thinking  . . . . 1--2
                 Bruno Blanchet   Security Protocol Verification: Symbolic
                                  and Computational Models . . . . . . . . 3--29
   Véronique Cortier and   
               Jan Degrieck and   
       Stéphanie Delaune   Analysing Routing Protocols: Four Nodes
                                  Topologies Are Sufficient  . . . . . . . 30--50
             Jason Franklin and   
                Sagar Chaki and   
                   Anupam Datta   Parametric Verification of Address Space
                                  Separation . . . . . . . . . . . . . . . 51--68
              Miriam Paiola and   
                 Bruno Blanchet   Verification of Security Protocols with
                                  Lists: From Length One to Unbounded
                                  Length . . . . . . . . . . . . . . . . . 69--88
             Myrto Arapinis and   
              Sergiu Bursuc and   
                      Mark Ryan   Privacy Supporting Cloud Computing:
                                  ConfiChair, a Case Study . . . . . . . . 89--108
   Véronique Cortier and   
               Cyrille Wiedling   A Formal Analysis of the Norwegian
                                  E-voting Protocol  . . . . . . . . . . . 109--128
                David Basin and   
                Cas Cremers and   
                    Simon Meier   Provably Repairing the ISO/IEC 9798
                                  Standard for Entity Authentication . . . 129--148
         Hubert Comon-Lundh and   
   Véronique Cortier and   
               Guillaume Scerri   Security Proof with Dishonest Keys . . . 149--168
             Myrto Arapinis and   
              Sergiu Bursuc and   
                   Mark D. Ryan   Reduction of Equational Theories for
                                  Verification of Trace Equivalence:
                                  Re-encryption, Associativity and
                                  Commutativity  . . . . . . . . . . . . . 169--188
                Gergei Bana and   
             Hubert Comon-Lundh   Towards Unconditional Soundness:
                                  Computationally Complete Symbolic
                                  Attacker . . . . . . . . . . . . . . . . 189--208
              Gilles Barthe and   
   Benjamin Grégoire and   
                 Sylvain Heraud   Verified Indifferentiable Hashing into
                                  Elliptic Curves  . . . . . . . . . . . . 209--228
               Anupam Datta and   
               Divya Sharma and   
                  Arunesh Sinha   Provable De-anonymization of Large
                                  Datasets with Sparse Dimensions  . . . . 229--248
              Ting-Fang Yen and   
              Michael K. Reiter   Revisiting Botnet Models and Their
                                  Implications for Takedown Strategies . . 249--268
                    Mu Yang and   
          Vladimiro Sassone and   
              Sardaouna Hamadou   A Game-Theoretic Analysis of Cooperation
                                  in Anonymity Networks  . . . . . . . . . 269--289
                  Eike Best and   
             Philippe Darondeau   Deciding Selective Declassification of
                                  Petri Nets . . . . . . . . . . . . . . . 290--308
                David Basin and   
        Vincent Jugé and   
                 Felix Klaedtke   Enforceable Security Policies Revisited  309--328
           Dimiter Milushev and   
                    Dave Clarke   Towards Incrementalization of Holistic
                                  Hyperproperties  . . . . . . . . . . . . 329--348
           Matteo Centenaro and   
           Riccardo Focardi and   
             Flaminia L. Luccio   Type-Based Analysis of PKCS#11 Key
                                  Management . . . . . . . . . . . . . . . 349--368
              Torben Amtoft and   
               Josiah Dodds and   
                  Zhi Zhang and   
                   Andrew Appel   A Certificate Infrastructure for
                                  Machine-Checked Proofs of Conditional
                                  Information Flow . . . . . . . . . . . . 369--389
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7216, 2012

        Antonis M. Hadjiantonis   Introduction to Telecommunication
                                  Economics  . . . . . . . . . . . . . . . 1--2
         Sandro Mendonça   Introduction to Evolution and Regulation
                                  of Communication Ecosystems  . . . . . . 3--4
               Sergio Ramos and   
José Luis Gómez-Barroso and   
          Claudio Feijóo   Evolution and Regulation of Mobile
                                  Ecosystems: European Information Society
                                  Policies for the Mobile Search Domain    5--13
                   Morten Falch   International Roaming of Mobile
                                  Services: The Need for Regulation  . . . 14--21
          Zsuzsanna Kósa   Mobile Regulation for the Future . . . . 22--32
         Sandro Mendonça   Trademarks as a Telecommunications
                                  Indicator for Industrial Analysis and
                                  Policy . . . . . . . . . . . . . . . . . 33--41
        Antonis M. Hadjiantonis   Introduction to Social and Policy
                                  Implications of Communication
                                  Technologies . . . . . . . . . . . . . . 42--43
  Louis-François Pau and   
                 Pedro Puga and   
                  Hong Chen and   
                  Zviad Kirtava   Mobile Communications of the Needy and
                                  Poor: Affordability Indicators, European
                                  Data, Social Tariffs . . . . . . . . . . 44--55
    Frederic Vannieuwenborg and   
              Zviad Kirtava and   
          Lambros Lambrinos and   
               Jan Van Ooteghem   Implications of mHealth Service
                                  Deployments: a Comparison between
                                  Dissimilar European Countries  . . . . . 56--66
           Daphna Shwarts-Asher   Social Communication Behaviors of
                                  Virtual Leaders  . . . . . . . . . . . . 67--77
               Bartolomeo Sapio   Policy Implications of Digital
                                  Television . . . . . . . . . . . . . . . 78--88
                   Bruno Tuffin   Introduction to Economics and Governance
                                  of Future Networks . . . . . . . . . . . 89--90
José Luis Gómez-Barroso and   
          Claudio Feijóo   Public Intervention in the Deployment of
                                  NGNs . . . . . . . . . . . . . . . . . . 91--99
         Idongesit Williams and   
                   Morten Falch   Public Private Partnerships and Next
                                  Generation Networks  . . . . . . . . . . 100--107
      Patrick Maillé and   
               Peter Reichl and   
                   Bruno Tuffin   Internet Governance and Economics of
                                  Network Neutrality . . . . . . . . . . . 108--116
      Louis-François Pau   Green Networks and Green Tariffs as
                                  Driven by User Service Demand  . . . . . 117--125
                   Morten Falch   Environmental Impact of ICT on the
                                  Transport Sector . . . . . . . . . . . . 126--137
            Sofie Verbrugge and   
           Jan Van Ooteghem and   
                Koen Casier and   
        Marlies Van der Wee and   
                  Mathieu Tahon   Cost-Efficient NGN Rollout . . . . . . . 138--147
                Lauri Frank and   
                 Eetu Luoma and   
           Oleksiy Mazhelis and   
            Mirja Pulkkinen and   
            Pasi Tyrväinen   Software Business in the
                                  Telecommunications Sector  . . . . . . . 148--155
                    Iztok Starc   Introduction to Future Networks
                                  Management Architectures and Mechanisms  156--157
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7217, 2012

                      Anonymous   Front Matter . . . . . . . . . . . . . . 1--1
             Shakil M. Khan and   
         Yves Lespérance   Logical Foundations for a Rational BDI
                                  Agent Programming Language (Extended
                                  Version) . . . . . . . . . . . . . . . . 3--21
           Pankaj R. Telang and   
          Munindar P. Singh and   
               Neil Yorke-Smith   Relating Goal and Commitment Semantics   22--37
                      Anonymous   Front Matter . . . . . . . . . . . . . . 39--39
           Carlos M. Toledo and   
          Rafael H. Bordini and   
               Omar Chiotti and   
          María R. Galli   Developing a Knowledge Management
                                  Multi-Agent System Using JaCaMo  . . . . 41--57
         Radek Píbil and   
         Peter Novák and   
                 Cyril Brom and   
                   Jakub Gemrot   Notes on Pragmatic Agent-Programming
                                  with Jason . . . . . . . . . . . . . . . 58--73
       Surangika Ranathunga and   
         Stephen Cranefield and   
                  Martin Purvis   Integrating Expectation Monitoring into
                                  BDI Agents . . . . . . . . . . . . . . . 74--91
                      Anonymous   Front Matter . . . . . . . . . . . . . . 93--93
        Michael Köster and   
                  Peter Lohmann   Abstraction for Model Checking Modular
                                  Interpreted Systems over ATL . . . . . . 95--113
             Ammar Mohammed and   
                 Ulrich Furbach   MAS: Qualitative and Quantitative
                                  Reasoning  . . . . . . . . . . . . . . . 114--132
   Sung-Shik T. Q. Jongmans and   
           Koen V. Hindriks and   
         M. Birna van Riemsdijk   State Space Reduction for Model Checking
                                  Agent Programs . . . . . . . . . . . . . 133--151
                      Anonymous   Front Matter . . . . . . . . . . . . . . 153--153
            Tristan Behrens and   
        Michael Köster and   
       Federico Schlesinger and   
            Jürgen Dix and   
            Jomi F. Hübner   The Multi-agent Programming Contest
                                  2011: a Résumé . . . . . . . . . . . . . . 155--172
                Marc Dekker and   
             Pieter Hameete and   
           Michiel Hegemans and   
          Sebastiaan Leysen and   
            Joris van den Oever   HactarV2: An Agent Team Strategy Based
                                  on Implicit Coordination . . . . . . . . 173--184
    Mikko Berggren Ettienne and   
               Steen Vester and   
        Jòrgen Villadsen   Implementing a Multi-Agent System in
                                  Python with an Auction-Based Agreement
                                  Approach . . . . . . . . . . . . . . . . 185--196
               Dominic Carr and   
               Sean Russell and   
                Balazs Pete and   
            G. M. P. O'Hare and   
                 Rem W. Collier   Bogtrotters in Space . . . . . . . . . . 197--207
              Sahar Mirzayi and   
              Vahid Nateghi and   
              Fatemeh Eskandari   A Gaia-Driven Approach for Competitive
                                  Multi-Agent Systems  . . . . . . . . . . 208--216
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7218, 2012

         Philippe Schlenker and   
             Jonathan Lamberton   Formal Indices and Iconicity in ASL  . . 1--11
                    Seth Yalcin   Context Probabilism  . . . . . . . . . . 12--21
                    Martin Aher   Free Choice in Deontic Inquisitive
                                  Semantics (DIS)  . . . . . . . . . . . . 22--31
               Robin Cooper and   
              Jonathan Ginzburg   Negative Inquisitiveness and
                                  Alternatives-Based Negation  . . . . . . 32--41
                 Edgar Onea and   
               Markus Steinbach   Where Question, Conditionals and Topics
                                  Converge . . . . . . . . . . . . . . . . 42--51
                  Wataru Uegaki   Inquisitive Knowledge Attribution and
                                  the Gettier Problem  . . . . . . . . . . 52--61
                Gemma Barber\`a   When Wide Scope Is Not Enough: Scope and
                                  Topicality of Discourse Referents  . . . 62--71
               Kathryn Davidson   When Disjunction Looks Like Conjunction:
                                  Pragmatic Consequences in ASL  . . . . . 72--81
                     Josep Quer   Quantificational Strategies across
                                  Language Modalities  . . . . . . . . . . 82--91
           Ronnie B. Wilbur and   
                Evie Malaia and   
                  Robin A. Shay   Degree Modification and Intensification
                                  in American Sign Language Adjectives . . 92--101
Márta Abrusán and   
          Kriszta Szendröi   Experimenting with the King of France    102--111
               Gemma Boleda and   
               Stefan Evert and   
               Berit Gehrke and   
                 Louise McNally   Adjectives as Saturators vs. Modifiers:
                                  Statistical Evidence . . . . . . . . . . 112--121
          Adrian Brasoveanu and   
               Jakub Dotla\vcil   Licensing Sentence-Internal Readings in
                                  English  . . . . . . . . . . . . . . . . 122--132
              Lisa Bylinina and   
                Stas Zadorozhny   Evaluative Adjectives, Scale Structure,
                                  and Ways of Being Polite . . . . . . . . 133--142
            Emmanuel Chemla and   
                     Lewis Bott   Processing: Free Choice at No Cost . . . 143--149
               Alex Djalali and   
                 Sven Lauer and   
              Christopher Potts   Corpus Evidence for Preference-Driven
                                  Interpretation . . . . . . . . . . . . . 150--159
                   Ralf Naumann   Relating ERP-Effects to Theories of
                                  Belief Update and Combining Systems  . . 160--169
          Francesca Panzeri and   
              Francesca Foppolo   Can Children Tell Us Something about the
                                  Semantics of Adjectives? . . . . . . . . 170--179
         Janina Radó and   
                    Oliver Bott   Underspecified Representations of Scope
                                  Ambiguity? . . . . . . . . . . . . . . . 180--189
             Agata Maria Renans   Projective Behaviour of Nur ---
                                  Quantitative Experimental Research . . . 190--199
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7220, 2012

               Fu-Chien Kao and   
            Han-Chien Hsieh and   
                      Wei-Te Li   Analysis of Brainwave Characteristics
                                  for Playing Heterogeneous Computer Games 1--11
                       Li Zhang   Exploitation in Context-Sensitive Affect
                                  Sensing from Improvisational Interaction 12--23
               Jonghee Park and   
                   Woontack Woo   Hybrid Document Matching Method for Page
                                  Identification of Digilog Books  . . . . 24--34
    Mohd Fairuz Shiratuddin and   
                   Kok Wai Wong   Game Design Considerations When Using
                                  Non-touch Based Natural User Interface   35--45
               Li-Chun Wang and   
                  Ming-Puu Chen   Effects of the Sequence of Game-Play and
                                  Game-Design on Novices' Motivation,
                                  Flow, and Performance  . . . . . . . . . 46--55
               Sujing Zhang and   
                        Feng Li   Behavioral Traits of the Online
                                  Parent-Child Game Players: a Case Study
                                  and Its Inspirations . . . . . . . . . . 56--68
             Florian Berger and   
           Wolfgang Müller   Towards an Open Source Game Engine for
                                  Teaching and Research  . . . . . . . . . 69--76
            Long-Chyr Chang and   
               Heien-Kun Chiang   Designing a Mixed Digital Signage and
                                  Multi-touch Interaction for Social
                                  Learning . . . . . . . . . . . . . . . . 77--87
                  I-Tsun Chiang   Old Dogs Can Learn New Tricks: Exploring
                                  Effective Strategies to Facilitate
                                  Somatosensory Video Games for
                                  Institutionalized Older Veterans . . . . 88--100
             Shih-Ching Yeh and   
              Wu-Yuin Hwang and   
            Jing-Liang Wang and   
                  Yuin-Ren Chen   Effects of Multi-symbols on Enhancing
                                  Virtual Reality Based Collaborative Task 101--111
                  Sheng Liu and   
                  Ting Fang and   
             Shengyong Chen and   
               Hanyang Tong and   
             Changchun Yuan and   
                    Zichen Chen   Particle Filter with Affine
                                  Transformation for Multiple Key Points
                                  Tracking . . . . . . . . . . . . . . . . 112--126
                 Liang Zeng and   
                      Bo Wu and   
              Jiangfan Ning and   
                  Jiawen Ma and   
                       Sikun Li   Meshless Simulation of Plastic
                                  Deformation and Crack  . . . . . . . . . 127--137
                   Yong Luo and   
                   Yan Zhao and   
                  Lei Cheng and   
               Jianxin Wang and   
                    Xuchong Liu   Lossless Visible Three-Dimensional
                                  Watermark of Digital Elevation Model
                                  Data . . . . . . . . . . . . . . . . . . 138--147
               Zhiquan Feng and   
                    Bo Yang and   
                      Yi Li and   
                Haokui Tang and   
               Yanwei Zheng and   
              Minming Zhang and   
                    Zhigeng Pan   $3$D Articulated Hand Tracking Based on
                                  Behavioral Model . . . . . . . . . . . . 148--165
                 Liping Lin and   
              Yongtian Wang and   
          Katsuhito Akahane and   
                    Makoto Sato   SPIDAR-Pen: a 2T1R Pen-Based Interface
                                  with Co-located Haptic-Visual Display    166--177
              Liliang Zhang and   
                    Zhigeng Pan   Generation of IFS Fractal Images Based
                                  on Hidden Markov Model . . . . . . . . . 178--187
                  Yong Wang and   
                  Liangliang Hu   High Performance Hybrid Streaming Scheme
                                  and VCR Support  . . . . . . . . . . . . 188--199
             Xianying Huang and   
                    Weiwei Chen   A Modular Image Search Engine Based on
                                  Key Words and Color Features . . . . . . 200--209
                    Gang Ji and   
                  Yehua Zhu and   
                  Yongzhi Zhang   The Corroded Defect Rating System of
                                  Coating Material Based on Computer
                                  Vision . . . . . . . . . . . . . . . . . 210--220
                 Yang Zhang and   
                    Chuanyun Xu   Service Replacement Algorithm Using
                                  Complex Network  . . . . . . . . . . . . 221--231
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7221, 2012

          George Feuerlicht and   
              Howard Foster and   
        Winfried Lamersdorf and   
                Guadalupe Ortiz   Seventh International Workshop on
                                  Engineering Service-Oriented
                                  Applications (WESOA 2011)  . . . . . . . 1--2
              Howard Foster and   
             George Spanoudakis   Taming the Cloud: Safety, Certification
                                  and Compliance for Software Services . . 3--8
           Evan D. Morrison and   
            Aditya K. Ghose and   
                 Hoa K. Dam and   
             Kerry G. Hinge and   
        Konstantin Hoesch-Klohe   Strategic Alignment of Business
                                  Processes  . . . . . . . . . . . . . . . 9--21
Héctor Fernández and   
     Cédric Tedeschi and   
                  Thierry Priol   Decentralized Workflow Coordination
                                  through Molecular Composition  . . . . . 22--32
     Dominik Meiländer and   
        Antonio Bucchiarone and   
           Cinzia Cappiello and   
            Elisabetta Di Nitto   Using a Lifecycle Model for Developing
                                  and Executing Real-Time Online
                                  Applications on Clouds . . . . . . . . . 33--43
              Patricia Lago and   
                Maryam Razavian   A Pragmatic Approach for Analysis and
                                  Design of Service Inventories  . . . . . 44--53
              Niels Lohmann and   
                   Martin Nyolt   Artifact-Centric Modeling Using BPMN . . 54--65
      Angineh Barkhordarian and   
            Frederik Demuth and   
             Kristof Hamann and   
                 Minh Hoang and   
                 Sonja Weichler   Migratability of BPMN 2.0 Process
                                  Instances  . . . . . . . . . . . . . . . 66--75
             Casandra Holotescu   Asynchronous Learning for Service
                                  Composition  . . . . . . . . . . . . . . 76--86
             Peter Bartalos and   
                 M. Brian Blake   Engineering Energy-Aware Web Services
                                  toward Dynamically-Green Computing . . . 87--96
            Flavio De Paoli and   
                  Ioan Toma and   
           Carlos Pedrinaci and   
                   Marcel Tilly   Introduction to the Fifth Workshop on
                                  Non-Functional Properties and Service
                                  Level Agreements Management in
                                  Service-Oriented Computing (NFPSLAM-SOC
                                  2011)  . . . . . . . . . . . . . . . . . 97--99
             Florian Wagner and   
            Fuyuki Ishikawa and   
               Shinichi Honiden   Applying QoS-Aware Service Selection on
                                  Functionally Diverse Services  . . . . . 100--113
           Monia Ben Brahim and   
               Tarak Chaari and   
            Maher Ben Jemaa and   
                 Mohamed Jmaiel   Semantic Matching of WS-SecurityPolicy
                                  Assertions . . . . . . . . . . . . . . . 114--130
             Benjamin Klatt and   
               Franz Brosch and   
                Zoya Durdik and   
           Christoph Rathfelder   Quality Prediction in Service
                                  Composition Frameworks . . . . . . . . . 131--146
       Chrysostomos Zeginis and   
      Konstantina Konsolaki and   
          Kyriakos Kritikos and   
           Dimitris Plexousakis   ECMAF: An Event-Based Cross-Layer
                                  Service Monitoring and Adaptation
                                  Framework  . . . . . . . . . . . . . . . 147--161
              Quan Z. Sheng and   
            Cesare Pautasso and   
              Sonia Ben Mokhtar   Phd Symposium Preface  . . . . . . . . . 162--163
                Marcos Palacios   Defining an SLA-Aware Method to Test
                                  Service-Oriented Systems . . . . . . . . 164--170
                 Thomas Stocker   Data Flow-Oriented Process Mining to
                                  Support Security Audits  . . . . . . . . 171--176
         Waldemar Ferreira Neto   Adaptable UI for Web Service
                                  Composition: a Model-Driven Approach . . 177--182
                        Zhen Ye   Economic Model Based Cloud Service
                                  Composition  . . . . . . . . . . . . . . 183--188
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7222, 2012

            Johannes Winter and   
               Paul Wiegele and   
              Martin Pirker and   
               Ronald Tögl   A Flexible Software Development and
                                  Emulation Framework for ARM TrustZone    1--15
               Chunhua Chen and   
          Chris J. Mitchell and   
                   Shaohua Tang   Building General Purpose Security
                                  Services on Trusted Computing  . . . . . 16--31
                Gina Kounga and   
                     Liqun Chen   Enforcing Sticky Policies with TPM and
                                  Virtualization . . . . . . . . . . . . . 32--47
            Jan-Erik Ekberg and   
               Sandeep Tamrakar   Mass Transit Ticketing with NFC Mobile
                                  Phones . . . . . . . . . . . . . . . . . 48--65
               David Derler and   
            Klaus Potzmader and   
            Johannes Winter and   
                  Kurt Dietrich   Anonymous Ticketing for NFC-Enabled
                                  Mobile Phones  . . . . . . . . . . . . . 66--83
               Qinggang Yue and   
                   Feng Liu and   
                        Rui Xue   Some Improvements to the Cost-Based
                                  Framework for Analyzing Denial of
                                  Service Attacks  . . . . . . . . . . . . 84--101
                     Wei Li and   
                    Dawu Gu and   
               Zhiqiang Liu and   
                     Ya Liu and   
                   Xiaohu Huang   Fault Detection of the MacGuffin Cipher
                                  against Differential Fault Attack  . . . 102--112
               Zijian Zhang and   
               Liehuang Zhu and   
                  Feng Wang and   
                Lejian Liao and   
                   Cong Guo and   
                  Hongyuan Wang   Computationally Sound Symbolic Analysis
                                  of EAP-TNC Protocol  . . . . . . . . . . 113--128
 Christopher Jämthagen and   
                Martin Hell and   
                     Ben Smeets   A Technique for Remote Detection of
                                  Certain Virtual Machine Monitors . . . . 129--137
                 Yiyuan Luo and   
                 Xuejia Lai and   
                     Zheng Gong   Indifferentiability of Domain Extension
                                  Modes for Hash Functions . . . . . . . . 138--155
                  Kimmo Halunen   Multicollisions and Graph-Based Hash
                                  Functions  . . . . . . . . . . . . . . . 156--167
                       Kun Peng   A General, Flexible and Efficient Proof
                                  of Inclusion and Exclusion . . . . . . . 168--183
          Danilo Gligoroski and   
Rune Steinsmo Òdegård and   
         Rune Erlend Jensen and   
                 Ludovic Perret   MQQ-SIG  . . . . . . . . . . . . . . . . 184--203
         Shin'ichiro Matsuo and   
           Daisuke Moriyama and   
                      Moti Yung   Multifactor Authenticated Key Renewal    204--220
      Miros\law Kuty\lowski and   
         \Lukasz Krzywiecki and   
         Przemys\law Kubiak and   
                   Micha\l Koza   Restricted Identification Scheme and
                                  Diffie--Hellman Linking Problem  . . . . 221--238
                   Dong Hao and   
           Avishek Adhikari and   
                Kouichi Sakurai   Mixed-Strategy Game Based Trust
                                  Management for Clustered Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 239--257
      Thouraya Bouabana-Tebibel   Hash Chains at the Basis of a Secure
                                  Reactive Routing Protocol  . . . . . . . 258--270
            Patrick Koeberl and   
                Jiangtao Li and   
                  Roel Maes and   
                Anand Rajan and   
              Claire Vishik and   
           Marcin Wójcik   Evaluation of a PUF Device
                                  Authentication Scheme on a Discrete
                                  0.13um SRAM  . . . . . . . . . . . . . . 271--288
               Pengqi Cheng and   
                     Yan Gu and   
                  Zihong Lv and   
               Jianfei Wang and   
                 Wenlei Zhu and   
                  Zhen Chen and   
                    Jiwei Huang   A Performance Analysis of Identity-Based
                                  Encryption Schemes . . . . . . . . . . . 289--303
             Ernie Brickell and   
                 Liqun Chen and   
                    Jiangtao Li   A (Corrected) DAA Scheme Using Batch
                                  Proof and Verification . . . . . . . . . 304--337
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7223, 2012

        Alexander P. Turner and   
           Michael A. Lones and   
             Luis A. Fuente and   
              Susan Stepney and   
                   Leo S. Caves   Using Artificial Epigenetic Regulatory
                                  Networks to Control Complex Tasks within
                                  Chaotic Systems  . . . . . . . . . . . . 1--11
Peter Martin Ferdinand Emmrich and   
   Hannah Elizabeth Roberts and   
                  Vera Pancaldi   A Gene Regulatory Network Simulation of
                                  Heterosis  . . . . . . . . . . . . . . . 12--16
           Shahrad Jamshidi and   
              Heike Siebert and   
             Alexander Bockmayr   Comparing Discrete and Piecewise Affine
                                  Differential Equation Models of Gene
                                  Regulatory Networks  . . . . . . . . . . 17--24
             Fabien Corblin and   
               Eric Fanchon and   
           Laurent Trilling and   
          Claudine Chaouiya and   
                 Denis Thieffry   Automatic Inference of Regulatory and
                                  Dynamical Properties from Incomplete
                                  Gene Interaction and Expression Data . . 25--30
           Marko Djordjevic and   
       Konstantin Severinov and   
           Magdalena Djordjevic   CRISPR Transcript Processing: An Unusual
                                  Mechanism for Rapid Production of
                                  Desired Molecules  . . . . . . . . . . . 31--34
         Nicolae Radu Zabet and   
                   Boris Adryan   A Comprehensive Computational Model to
                                  Simulate Transcription Factor Binding in
                                  Prokaryotes  . . . . . . . . . . . . . . 35--37
             Luis A. Fuente and   
           Michael A. Lones and   
        Alexander P. Turner and   
              Susan Stepney and   
                   Leo S. Caves   Evolved Artificial Signalling Networks
                                  for the Control of a Conservative
                                  Complex Dynamical System . . . . . . . . 38--49
    Bertrand R. Caré and   
           Hédi A. Soula   The Effect of Membrane Receptor
                                  Clustering on Spatio-temporal Cell
                                  Signalling Dynamics  . . . . . . . . . . 50--61
            Jacques Colinge and   
                    Uwe Rix and   
          Keiryn L. Bennett and   
           Giulio Superti-Furga   Systems Biology Analysis of Kinase
                                  Inhibitor Protein Target Profiles in
                                  Leukemia Treatments  . . . . . . . . . . 62--66
           Daniel D. Seaton and   
                    J. Krishnan   Multispecific Interactions in Enzymatic
                                  Signalling Cascades  . . . . . . . . . . 67--73
            Dhriti Sengupta and   
                    Sudip Kundu   Role of Physico-chemical Properties of
                                  Amino Acids in Protein's Structural
                                  Organization: a Network Perspective  . . 74--81
              Kristen Feher and   
      Kathrin Jürchott and   
                 Joachim Selbig   Tailored Strategies for the Analysis of
                                  Metabolomic Data . . . . . . . . . . . . 82--89
               Gordon Klaus and   
               Kyrre Glette and   
              Mats Hòvin   Evolving Locomotion for a Simulated
                                  12-DOF Quadruped Robot . . . . . . . . . 90--98
                Antje Beyer and   
              Ralf Eberhard and   
               Nir Piterman and   
      Michael O. Hengartner and   
                    Alex Hajnal   Predictive Modelling of Stem Cell
                                  Differentiation and Apoptosis in \em C.
                                  elegans  . . . . . . . . . . . . . . . . 99--104
          Nicholas S. Flann and   
           Hamid Mohamadlou and   
           Gregory J. Podgorski   Criticality of Spatiotemporal Dynamics
                                  in Contact Mediated Pattern Formation    105--116
        Duncan J. MacGregor and   
             Tom F. Clayton and   
                    Gareth Leng   The Vasopressin System --- Asynchronous
                                  Burst Firing as a Signal Encoding
                                  Mechanism  . . . . . . . . . . . . . . . 117--130
            Thiago M. Pinto and   
         Maria J. Schilstra and   
                 Volker Steuber   The Effective Calcium/Calmodulin
                                  Concentration Determines the Sensitivity
                                  of CaMKII to the Frequency of Calcium
                                  Oscillations . . . . . . . . . . . . . . 131--135
               Alex Metaxas and   
               Reinoud Maex and   
             Volker Steuber and   
                  Rod Adams and   
                     Neil Davey   The Effect of Different Types of
                                  Synaptic Plasticity on the Performance
                                  of Associative Memory Networks with
                                  Excitatory and Inhibitory
                                  Sub-populations  . . . . . . . . . . . . 136--142
              James Stovold and   
                  Simon O'Keefe   Simulating Neurons in Reaction-Diffusion
                                  Chemistry  . . . . . . . . . . . . . . . 143--149
         Richard B. Greaves and   
                  Mark Read and   
                 Jon Timmis and   
            Paul S. Andrews and   
                    Vipin Kumar   Extending an Established Simulation:
                                  Exploration of the Possible Effects
                                  Using a Case Study in Experimental
                                  Autoimmune Encephalomyelitis . . . . . . 150--161
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7224, 2012

               Vera Hollink and   
                   Jiyin He and   
                 Arjen de Vries   Explaining Query Modifications . . . . . 1--12
           Edward Bortnikov and   
               Pinar Donmez and   
                Amit Kagian and   
                   Ronny Lempel   Modeling Transactional Queries via
                                  Templates  . . . . . . . . . . . . . . . 13--24
              Morgan Harvey and   
                David Elsweiler   Exploring Query Patterns in Email Search 25--36
            Abdigani Diriye and   
           Giridhar Kumaran and   
                     Jeff Huang   Interactive Search Support for Difficult
                                  Web Queries  . . . . . . . . . . . . . . 37--49
              Julien Gaugaz and   
           Patrick Siehndel and   
         Gianluca Demartini and   
              Tereza Iofciu and   
                Mihai Georgescu   Predicting the Future Impact of News
                                  Events . . . . . . . . . . . . . . . . . 50--62
            Tamara Polajnar and   
            Richard Glassey and   
                 Leif Azzopardi   Detection of News Feeds Items
                                  Appropriate for Children . . . . . . . . 63--72
              Morgan Harvey and   
                Mark Carman and   
                David Elsweiler   Comparing Tweets and Tags for URLs . . . 73--84
              Claudia Hauff and   
               Geert-Jan Houben   Geo-Location Estimation of Flickr
                                  Images: Social Web Based Enrichment  . . 85--96
              Jin Young Kim and   
                 W. Bruce Croft   A Field Relevance Model for Structured
                                  Document Retrieval . . . . . . . . . . . 97--108
                     Hao Wu and   
                       Hui Fang   Relation Based Term Weighting
                                  Regularization . . . . . . . . . . . . . 109--120
                Zhenlei Yan and   
                       Jie Zhou   A New Approach to Answerer
                                  Recommendation in Community Question
                                  Answering Services . . . . . . . . . . . 121--132
            Robert Neumayer and   
            Krisztian Balog and   
     Kjetil Nòrvåg   On the Modeling of Entities for Ad-Hoc
                                  Entity Search in the Web of Data . . . . 133--145
          Richard Berendsen and   
           Bogomil Kovachev and   
 Evangelia-Paraskevi Nastou and   
               Maarten de Rijke   Result Disambiguation in Web People
                                  Search . . . . . . . . . . . . . . . . . 146--157
              Stephen Robertson   On Smoothing Average Precision . . . . . 158--169
             Maria Eskevich and   
                Walid Magdy and   
             Gareth J. F. Jones   New Metrics for Meaningful Evaluation of
                                  Informally Structured Speech Retrieval   170--181
             Mehdi Hosseini and   
             Ingemar J. Cox and   
  Nata\vsa Mili\'c-Frayling and   
            Gabriella Kazai and   
                   Vishwa Vinay   On Aggregating Labels from Multiple
                                  Crowd Workers to Infer Relevance of
                                  Documents  . . . . . . . . . . . . . . . 182--194
           Claudio Lucchese and   
            Raffaele Perego and   
         Fabrizio Silvestri and   
                 Hossein Vahabi   How Random Walks Can Help Tourism  . . . 195--206
   Rao Muhammad Adeel Nawab and   
             Mark Stevenson and   
                    Paul Clough   Retrieving Candidate Plagiarised
                                  Documents Using Query Expansion  . . . . 207--218
           Parikshit Sondhi and   
     V. G. Vinod Vydiswaran and   
                ChengXiang Zhai   Reliability Prediction of Webpages in
                                  the Medical Domain . . . . . . . . . . . 219--231
                   Tony Tam and   
             Artur Ferreira and   
   André Lourenço   Automatic Foldering of Email Messages:A
                                  Combination Approach . . . . . . . . . . 232--243
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7225, 2012

              John P. Gallagher   Analysis of Logic Programs Using Regular
                                  Tree Languages . . . . . . . . . . . . . 1--3
                 Fritz Henglein   Dynamic Symbolic Computation for
                                  Domain-Specific Language Implementation  4--24
              Elvira Albert and   
   Miguel Gómez-Zamalloa   Resource-Driven CLP-Based Test Case
                                  Generation . . . . . . . . . . . . . . . 25--41
Jesús M. Almendros-Jiménez and   
               Rafael Caballero   A Declarative Embedding of XQuery in a
                                  Functional-Logic Language  . . . . . . . 42--56
              Pedro Cabalar and   
          Stéphane Demri   Automata-Based Computation of Temporal
                                  Equilibrium Models . . . . . . . . . . . 57--72
           Rafael Caballero and   
           Adrián Riesco   Simplifying Questions in Maude
                                  Declarative Debugger by Transforming
                                  Proof Trees  . . . . . . . . . . . . . . 73--89
      Céline Dandois and   
                    Wim Vanhoof   Clones in Logic Programs and How to
                                  Detect Them  . . . . . . . . . . . . . . 90--105
           Fabio Fioravanti and   
             Alberto Pettorossi   Using Real Relaxations during Program
                                  Specialization . . . . . . . . . . . . . 106--122
            Soichiro Hidaka and   
                   Zhenjiang Hu   Marker-Directed Optimization of UnCAL
                                  Graph Transformations  . . . . . . . . . 123--138
     José F. Morales and   
         Manuel V. Hermenegildo   Modular Extensions for Modular (Logic)
                                  Languages  . . . . . . . . . . . . . . . 139--154
                    Paulo Moura   Meta-predicate Semantics . . . . . . . . 155--172
   Maribel Fernández and   
       Hél\`ene Kirchner   A Strategy Language for Graph Rewriting  173--188
              Paolo Pilozzi and   
               Danny De Schreye   Improved Termination Analysis of CHR
                                  Using Self-sustainability Analysis . . . 189--204
                  Hirohisa Seki   Proving Properties of Co-Logic Programs
                                  by Unfold/Fold Transformations . . . . . 205--220
                Jon Sneyers and   
               Danny De Schreye   Probabilistic Termination of CHRiSM
                                  Programs . . . . . . . . . . . . . . . . 221--236
        Thomas Ströder and   
                   Fabian Emmes   A Linear Operational Semantics for
                                  Termination and Complexity Analysis of
                                  ISO Prolog . . . . . . . . . . . . . . . 237--252
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7226, 2012

                 Cesare Tinelli   SMT-Based Model Checking . . . . . . . . 1--1
                Andrew W. Appel   Verified Software Toolchain  . . . . . . 2--2
                 Patrick Cousot   Formal Verification by Abstract
                                  Interpretation . . . . . . . . . . . . . 3--7
                Dennis Guck and   
               Tingting Han and   
        Joost-Pieter Katoen and   
 Martin R. Neuhäußer   Quantitative Timed Analysis of
                                  Interactive Markov Chains  . . . . . . . 8--23
            Alessio Ferrari and   
        Alessandro Fantechi and   
                 Stefania Gnesi   Lessons Learnt from the Adoption of
                                  Formal Model-Based Development . . . . . 24--38
          Karolina Zurowska and   
                 Juergen Dingel   Symbolic Execution of Communicating and
                                  Hierarchically Composed UML-RT State
                                  Machines . . . . . . . . . . . . . . . . 39--53
           Jörg Brauer and   
                     Axel Simon   Inferring Definite Counterexamples
                                  through Under-Approximation  . . . . . . 54--69
                  Ross Gore and   
          Paul F. Reynolds, Jr.   Modifying Test Suite Composition to
                                  Enable Effective Predicate-Level
                                  Statistical Debugging  . . . . . . . . . 70--84
         Nicolas Brisebarre and   
            Mioara Jolde\cs and   
   Érik Martin-Dorel and   
                 Micaela Mayero   Rigorous Polynomial Approximation Using
                                  Taylor Models in Coq . . . . . . . . . . 85--99
Étienne André and   
           Laurent Fribourg and   
                  Romain Soulat   Enhancing the Inverse Method with State
                                  Merging  . . . . . . . . . . . . . . . . 100--105
             Alexander Herz and   
                  Kalmer Apinis   Class-Modular, Class-Escape and
                                  Points-to Analysis for Object-Oriented
                                  Languages  . . . . . . . . . . . . . . . 106--119
                Pascal Cuoq and   
            Benjamin Monate and   
               Anne Pacalet and   
               Virgile Prevosto   Testing Static Analyzers with Randomly
                                  Generated Programs . . . . . . . . . . . 120--125
               Darren Cofer and   
               Andrew Gacek and   
              Steven Miller and   
              Michael W. Whalen   Compositional Verification of
                                  Architectural Models . . . . . . . . . . 126--140
              Anaheed Ayoub and   
                BaekGyu Kim and   
                  Insup Lee and   
                  Oleg Sokolsky   A Safety Case Pattern for Model-Based
                                  Development Approach . . . . . . . . . . 141--146
      Heber Herencia-Zapana and   
          Romain Jobredeaux and   
                       Sam Owre   PVS Linear Algebra Libraries for
                                  Verification of Control Software
                                  Algorithms in C/ACSL . . . . . . . . . . 147--161
                  Wenbin Li and   
         Jane Huffman Hayes and   
       Miros\law Truszczy\'nski   Temporal Action Language (TAL): a
                                  Controlled Language for Consistency
                                  Checking of Natural Language Temporal
                                  Requirements . . . . . . . . . . . . . . 162--167
    Norbert Th. Müller and   
               Christian Uhrhan   Some Steps into Verification of Exact
                                  Real Arithmetic  . . . . . . . . . . . . 168--173
              Andreas Bauer and   
  Jan-Christoph Küster and   
                   Gil Vegliach   Runtime Verification Meets Android
                                  Security . . . . . . . . . . . . . . . . 174--180
                 Xinxin Liu and   
                   Bingtian Xue   Specification in PDL with Recursion  . . 181--194
               Aditi Tagore and   
               Diego Zaccai and   
                 Bruce W. Weide   Automatically Proving Thousands of
                                  Verification Conditions Using an SMT
                                  Solver: An Empirical Study . . . . . . . 195--209
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7227, 2012

            Kiran Lakkaraju and   
             Samarth Swarup and   
                     Les Gasser   Consensus under Constraints: Modeling
                                  the Great English Vowel Shift  . . . . . 1--8
        Katherine Y. Chuang and   
            Christopher C. Yang   A Study of Informational Support
                                  Exchanges in MedHelp Alcoholism
                                  Community  . . . . . . . . . . . . . . . 9--17
        Mohammad-Ali Abbasi and   
                Sun-Ki Chai and   
                       Huan Liu   Real-World Behavior Analysis through a
                                  Social Media Lens  . . . . . . . . . . . 18--26
        Mathew D. McCubbins and   
                    Mark Turner   The Mythology of Game Theory . . . . . . 27--34
           Barton Paulhamus and   
                  Alison Ebaugh   Crowdsourced Cyber Defense: Lessons from
                                  a Large-Scale, Game-Based Approach to
                                  Threat Identification on a Live Network  35--42
            Yaniv Altshuler and   
               Michael Fire and   
                  Nadav Aharony   How Many Makes a Crowd? On the Evolution
                                  of Learning as a Factor of Community
                                  Coverage . . . . . . . . . . . . . . . . 43--52
              Kalin Agrawal and   
          William H. Batchelder   Cultural Consensus Theory: Aggregating
                                  Signed Graphs under a Balance Constraint 53--60
              David Melamed and   
                Eric Schoon and   
                 Ronald Breiger   Using Organizational Similarity to
                                  Identify Statistical Interactions for
                                  Improving Situational Awareness of CBRN
                                  Activities . . . . . . . . . . . . . . . 61--68
            Thomas W. Moore and   
              Patrick D. Finley   Opinion Dynamics in Gendered Social
                                  Networks: An Examination of Female
                                  Engagement Teams in Afghanistan  . . . . 69--77
      Subhadeep Chakraborty and   
               Matthew M. Mench   Socio-cultural Evolution of Opinion
                                  Dynamics in Networked Societies  . . . . 78--86
                   Mi Zhang and   
        Christopher C. Yang and   
                      Jiexun Li   A Comparative Study of Smoking Cessation
                                  Intervention Programs on Social Media    87--96
            Yaniv Altshuler and   
                        Wei Pan   Trends Prediction Using Social Diffusion
                                  Models . . . . . . . . . . . . . . . . . 97--104
             Michele Coscia and   
                Fosca Giannotti   Towards Democratic Group Detection in
                                  Complex Networks . . . . . . . . . . . . 105--113
                Gaurav Tuli and   
             Madhav Marathe and   
                     S. S. Ravi   Addiction Dynamics May Explain the Slow
                                  Decline of Smoking Prevalence  . . . . . 114--122
   Muhammad Aurangzeb Ahmad and   
                  Zoheb Borbora   Love All, Trust a Few: Link Prediction
                                  for Trust and Psycho-social Factors in
                                  MMOs . . . . . . . . . . . . . . . . . . 123--130
               Kouzou Ohara and   
               Kazumi Saito and   
                Masahiro Kimura   Effect of In/Out-Degree Correlation on
                                  Influence Degree of Two Contrasting
                                  Information Diffusion Models . . . . . . 131--138
   Juan F. Mancilla-Caceres and   
                     Wen Pu and   
                      Eyal Amir   A Computer-in-the-Loop Approach for
                                  Detecting Bullies in the Classroom . . . 139--146
    Jessica Glicken Turnley and   
                  Peter A. Chew   Beyond Validation: Alternative Uses and
                                  Associated Assessments of Goodness for
                                  Computational Social Models  . . . . . . 147--155
            Hung-Hsuan Chen and   
                      Liang Gou   Predicting Recent Links in FOAF Networks 156--163
               Clayton Fink and   
           Jonathon Kopecky and   
                     Nathan Bos   Mapping the Twitterverse in the
                                  Developing World: An Analysis of Social
                                  Media Use in Nigeria . . . . . . . . . . 164--171
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7228, 2012

            Hisham Al-Assam and   
                 Ali Abboud and   
                Harin Sellahewa   Exploiting Relative Entropy and Quality
                                  Analysis in Cumulative Partial Biometric
                                  Fusion . . . . . . . . . . . . . . . . . 1--18
           Andrey Makrushin and   
                Tobias Scheidat   Improving Reliability of Biometric Hash
                                  Generation through the Selection of
                                  Dynamic Handwriting Features . . . . . . 19--41
                    Thomas Gloe   Feature-Based Forensic Camera Model
                                  Identification . . . . . . . . . . . . . 42--62
          Sascha Zmudzinski and   
              Martin Steinebach   Watermark Embedding Using Audio
                                  Fingerprinting . . . . . . . . . . . . . 63--79
         Christian Kraetzer and   
                  Jana Dittmann   Plausibility Considerations on
                                  Steganalysis as a Security Mechanism ---
                                  Discussions on the Example of Audio
                                  Steganalysis . . . . . . . . . . . . . . 80--101
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7230, 2012

      Hajnal Andréka and   
    Szabolcs Mikulás and   
    István Németi   Residuated Kleene Algebras . . . . . . . 1--11
             Filippo Bonchi and   
      Marcello M. Bonsangue and   
        Jan J. M. M. Rutten and   
                Alexandra Silva   Brzozowski's Algorithm (Co)Algebraically 12--23
            Marco Carmosino and   
              Neil Immerman and   
                 Charles Jordan   Experimental Descriptive Complexity  . . 24--34
                     Hubie Chen   Meditations on Quantified Constraint
                                  Satisfaction . . . . . . . . . . . . . . 35--49
                Bruce R. Donald   The Compass That Steered Robotics  . . . 50--65
                      Neal Glew   Subtyping for $F$-Bounded Quantifiers
                                  and Equirecursive Types  . . . . . . . . 66--82
      Pawe\l Górecki and   
                   Jerzy Tiuryn   Inferring Evolutionary Scenarios in the
                                  Duplication, Loss and Horizontal Gene
                                  Transfer Model . . . . . . . . . . . . . 83--105
          Jean-Baptiste Jeannin   Capsules and Closures: a Small-Step
                                  Approach . . . . . . . . . . . . . . . . 106--123
               Christoph Kreitz   Nuprl as Logical Framework for
                                  Automating Proofs in Category Theory . . 124--148
              Clemens Kupke and   
            Jan J. M. M. Rutten   On the Final Coalgebra of Automatic
                                  Sequences  . . . . . . . . . . . . . . . 149--164
         Henryk Michalewski and   
              Damian Niwi\'nski   On Topological Completeness of Regular
                                  Tree Languages . . . . . . . . . . . . . 165--179
           Lawrence S. Moss and   
             Erik Wennstrom and   
                Glen T. Whitney   A Complete Logical System for the
                                  Equality of Recursive Terms for Sets . . 180--203
                  Jens Palsberg   Overloading Is NP-Complete . . . . . . . 204--218
              Sophia Knight and   
               Radu Mardare and   
             Prakash Panangaden   Combining Epistemic Logic and
                                  Hennessy--Milner Logic . . . . . . . . . 219--243
               Rohit Parikh and   
Ça\ugìl Ta\csdemir and   
                 Andreas Witzel   Choice and Uncertainty in Games  . . . . 244--255
                Jakob Rehof and   
                Pawe\l Urzyczyn   The Complexity of Inhabitation with
                                  Explicit Intersection  . . . . . . . . . 256--270
                   Arto Salomaa   On State Sequences Defined by Reaction
                                  Systems  . . . . . . . . . . . . . . . . 271--282
                    Alexa Sharp   On Distance Coloring . . . . . . . . . . 283--297
                  Glynn Winskel   Winning, Losing and Drawing in
                                  Concurrent Games with Perfect or
                                  Imperfect Information  . . . . . . . . . 298--317
               Kamal Aboul-Hosn   Reflections on a Time with Dexter Kozen  318--321
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7231, 2012

            Leonard Goldschmidt   Telehealth Strategies and Information
                                  Technology Transform Patient Care within
                                  the U.S. Department of Veterans Affairs  1--2
                  Michael Steyn   From Clinical Data to Knowledge Mining
                                  for Decision Making within Hospitals . . 3--3
                 Xiaodan Yu and   
                 Dawn Owens and   
               Deepak Khazanchi   Building Socioemotional Environments in
                                  Metaverses for Virtual Teams in
                                  Healthcare: a Conceptual Exploration . . 4--12
          Dortje Löper and   
              Meike Klettke and   
               Ilvio Bruder and   
                  Andreas Heuer   Integrating Healthcare-Related
                                  Information Using the
                                  Entity-Attribute-Value Storage Model . . 13--24
              Frank Klawonn and   
                Katja Crull and   
               Akiko Kukita and   
                  Frank Pessler   Median Polish with Power Transformations
                                  as an Alternative for the Analysis of
                                  Contingency Tables with Patient Data . . 25--35
              Rui Henriques and   
         Cláudia Antunes   An Integrated Approach for Healthcare
                                  Planning over Multi-dimensional Data
                                  Using Long-Term Prediction . . . . . . . 36--48
              Hao Lan Zhang and   
               Weitao Jiang and   
                  Huiqin Wu and   
                     Libing Shu   A Novel Automated Recognition System
                                  Based on Medical Machining CAD Models    49--59
                   David Hansen   Challenges and Opportunities for Health
                                  Information Systems Research . . . . . . 60--60
                 Stanley Chiang   E-health in Australia --- a General
                                  Practitioner's Perspective . . . . . . . 61--61
                    Terry Young   Medical Devices: Panel Discussion  . . . 62--62
              Guiqiang Chen and   
                Jianjun Liu and   
                     Liqin Wang   Color Image Sharing Method Based on
                                  Lagrange's Interpolating Polynomial  . . 63--75
                  E. Larios and   
                   Y. Zhang and   
                     K. Yan and   
                      Z. Di and   
 S. LeDévédec and   
                 F. Groffen and   
                  F. J. Verbeek   Automation in Cytomics: a Modern RDBMS
                                  Based Platform for Image Analysis and
                                  Management in High-Throughput Screening
                                  Experiments  . . . . . . . . . . . . . . 76--87
       Ana Salazar-Gonzalez and   
                 Yongmin Li and   
                   Djibril Kaba   MRF Reconstruction of Retinal Images for
                                  the Optic Disc Segmentation  . . . . . . 88--99
                   Jie Zhao and   
                   Li Zhang and   
                  Wei Zheng and   
                   Hua Tian and   
               Dong-mei Hao and   
                   Song-hong Wu   Normalized Cut Segmentation of Thyroid
                                  Tumor Image Based on Fractional
                                  Derivatives  . . . . . . . . . . . . . . 100--109
               Nianyin Zeng and   
                Zidong Wang and   
                  Yurong Li and   
                         Min Du   Cellular Neural Networks for Gold
                                  Immunochromatographic Strip Image
                                  Segmentation . . . . . . . . . . . . . . 110--120
                    Dan Wei and   
              Weiwei Zhuang and   
             Qingshan Jiang and   
                     Yanjie Wei   A New Classification Method for Human
                                  Gene Splice Site Prediction  . . . . . . 121--130
                    Jing He and   
              Yanchun Zhang and   
             Guangyan Huang and   
                  Yefei Xin and   
                Xiaohui Liu and   
                  Hao Lan Zhang   An Association Rule Analysis Framework
                                  for Complex Physiological and Genetic
                                  Data . . . . . . . . . . . . . . . . . . 131--142
                  Jien Kato and   
                        Yu Wang   Analysis of Nursery School Observations
                                  for Understanding Children's Behavior    143--151
                   Xiang Ji and   
               Soon Ae Chun and   
                   James Geller   Epidemic Outbreak and Spread Detection
                                  System Based on Twitter Data . . . . . . 152--163
            Takashi Okumura and   
                   Yuka Tateisi   A Lightweight Approach for Extracting
                                  Disease-Symptom Relation with MetaMap
                                  toward Automated Generation of Disease
                                  Knowledge Base . . . . . . . . . . . . . 164--172
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7232, 2012

                 Fuchun Guo and   
                      Yi Mu and   
               Willy Susilo and   
             Vijay Varadharajan   A Pre-computable Signature Scheme with
                                  Efficient Verification for RFID  . . . . 1--16
                Kai Samelin and   
      Henrich C. Pöhls and   
             Arne Bilzhause and   
            Joachim Posegga and   
                Hermann de Meer   Redactable Signatures for Independent
                                  Removal of Structure and Content . . . . 17--33
                 Xianhui Lu and   
                     Bao Li and   
                Qixiang Mei and   
                      Yamin Liu   Improved Efficiency of Chosen Ciphertext
                                  Secure Encryption from Factoring . . . . 34--45
              Chong-zhi Gao and   
               Dongqing Xie and   
                    Baodian Wei   Deniable Encryptions Secure against
                                  Adaptive Chosen Ciphertext Attack  . . . 46--62
         Hubert Comon-Lundh and   
              Masami Hagiya and   
            Yusuke Kawamoto and   
                Hideki Sakurada   Computational Soundness of
                                  Indistinguishability Properties without
                                  Computable Parsing . . . . . . . . . . . 63--79
                Dongxia Bai and   
                       Leibo Li   New Impossible Differential Attacks on
                                  Camellia . . . . . . . . . . . . . . . . 80--96
                     Ya Liu and   
                    Dawu Gu and   
               Zhiqiang Liu and   
                         Wei Li   Impossible Differential Attacks on
                                  Reduced-Round LBlock . . . . . . . . . . 97--108
              Takuma Koyama and   
                   Lei Wang and   
                  Yu Sasaki and   
             Kazuo Sakiyama and   
                     Kazuo Ohta   New Truncated Differential Cryptanalysis
                                  on $3$D Block Cipher . . . . . . . . . . 109--125
   Christian L. F. Corniaux and   
                Hossein Ghodosi   $T$-out-of-$n$ Distributed Oblivious
                                  Transfer Protocols in Non-adaptive and
                                  Adaptive Settings  . . . . . . . . . . . 126--143
          Preetha Mathew K. and   
              Sachin Vasant and   
         Sridhar Venkatesan and   
                C. Pandu Rangan   A Code-Based $1$-out-of-$N$ Oblivious
                                  Transfer Based on McEliece Assumptions   144--157
                   Lei Wang and   
                   Ji Xiang and   
                  Jiwu Jing and   
                 Lingchen Zhang   Towards Fine-Grained Access Control on
                                  Browser Extensions . . . . . . . . . . . 158--169
              Yang-Wai Chow and   
                   Willy Susilo   Enhanced STE3D-CAP: a Novel $3$D CAPTCHA
                                  Family . . . . . . . . . . . . . . . . . 170--181
   Nathaniel Wesley Filardo and   
              Giuseppe Ateniese   High-Entropy Visual Identification for
                                  Touch Screen Devices . . . . . . . . . . 182--198
             Chuah Chai Wen and   
              Edward Dawson and   
Juan Manuel González Nieto and   
                 Leonie Simpson   A Framework for Security Analysis of Key
                                  Derivation Functions . . . . . . . . . . 199--216
                   Teng Guo and   
                   Feng Liu and   
                    ChuanKun Wu   On the Equivalence of Two Definitions of
                                  Visual Cryptography Scheme . . . . . . . 217--227
          Naoyuki Shinohara and   
          Takeshi Shimoyama and   
             Takuya Hayashi and   
                Tsuyoshi Takagi   Key Length Estimation of Pairing-Based
                                  Cryptosystems Using $\eta_T$ Pairing . . 228--244
               Kazuya Izawa and   
              Atsuko Miyaji and   
                 Kazumasa Omote   Lightweight Integrity for XOR Network
                                  Coding in Wireless Sensor Networks . . . 245--258
             Johannes Braun and   
              Moritz Horsch and   
            Alexander Wiesmaier   iPIN and mTAN for Secure eID
                                  Applications . . . . . . . . . . . . . . 259--276
                  Manuel Liedel   Secure Distributed Computation of the
                                  Square Root and Applications . . . . . . 277--288
                  Tian Shuo and   
                  He Yeping and   
                   Ding Baozeng   Prevent Kernel Return-Oriented
                                  Programming Attacks Using Hardware
                                  Virtualization . . . . . . . . . . . . . 289--300
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7234, 2012

                 Paulo de Souza   Keynote Speech: Technological
                                  Breakthroughs in Environmental Sensor
                                  Networks . . . . . . . . . . . . . . . . 1--1
                    Li Yang and   
                Xiedong Cao and   
                     Jie Li and   
                Cundang Wei and   
                Shiyong Cao and   
                  Dan Zhang and   
                     Zhidi Chen   A New Formal Description Model of
                                  Network Attacking and Defence Knowledge
                                  of Oil and Gas Field SCADA System  . . . 2--10
                 Xiling Sun and   
                  Jiajie Xu and   
               Zhiming Ding and   
                     Xu Gao and   
                      Kuien Liu   An Efficient Overload Control Strategy
                                  in Cloud . . . . . . . . . . . . . . . . 11--18
                Xiedong Cao and   
                Cundang Wei and   
                     Jie Li and   
                    Li Yang and   
                  Dan Zhang and   
                      Gang Tang   The Geological Disasters Defense Expert
                                  System of the Massive Pipeline Network
                                  SCADA System Based on FNN  . . . . . . . 19--26
               Zhuoluo Yang and   
                 Jinguo You and   
                       Min Zhou   TDSC: a Two-phase Duplicate String
                                  Compression Algorithm  . . . . . . . . . 27--34
               Ziqiang Deng and   
               Husheng Liao and   
                     Hongyu Gao   Twig Pattern Matching Running on XML
                                  Streams  . . . . . . . . . . . . . . . . 35--42
                 Xingsen Li and   
            Zhongbiao Xiang and   
               Haolan Zhang and   
                 Zhengxiang Zhu   A Novel Method for Extension
                                  Transformation Knowledge Discovering . . 43--50
                  Keyan Liu and   
               Shaohua Song and   
               Ningnan Zhou and   
                       Yanyu Ma   A Flexible Parallel Runtime for Large
                                  Scale Block-Based Matrix Multiplication  51--59
                    Yang Li and   
                    Kefu Xu and   
               Jianlong Tan and   
                         Li Guo   Group Detection and Relation Analysis
                                  Research for Web Social Network  . . . . 60--67
                    Wei Guo and   
                Lidong Zhai and   
                     Li Guo and   
                    Jinqiao Shi   Worm Propagation Control Based on
                                  Spatial Correlation in Wireless Sensor
                                  Network  . . . . . . . . . . . . . . . . 68--77
                Hongchen Wu and   
                Xinjun Wang and   
               Zhaohui Peng and   
               Qingzhong Li and   
                        Lin Lin   PointBurst: Towards a Trust-Relationship
                                  Framework for Improved Social
                                  Recommendations  . . . . . . . . . . . . 78--88
               Junghoon Lee and   
                Hye-Jin Kim and   
            Gyung-Leen Park and   
              Ho-Young Kwak and   
                   Moo Yong Lee   Analysis Framework for Electric Vehicle
                                  Sharing Systems Using Vehicle Movement
                                  Data Stream  . . . . . . . . . . . . . . 89--94
               Chunyan Yang and   
                 Xiaomei Li and   
                      Weihua Li   Research on Customer Segmentation Based
                                  on Extension Classification  . . . . . . 95--105
           Chuang-Kai Chiou and   
               Judy C. R. Tseng   An Incremental Mining Algorithm for
                                  Association Rules Based on Minimal
                                  Perfect Hashing and Pruning  . . . . . . 106--113
           Daisuke Yokomoto and   
             Kensaku Makita and   
              Hiroko Suzuki and   
               Daichi Koike and   
                Takehito Utsuro   LDA-Based Topic Modeling in Labeling
                                  Blog Posts with Wikipedia Entries  . . . 114--124
       Clement. H. C. Leung and   
                      Yuanxi Li   The Correlation between Semantic Visual
                                  Similarity and Ontology-Based Concept
                                  Similarity in Effective Web Image Search 125--130
      Vishnuvardhan Mannava and   
                      T. Ramesh   An Adaptive Design Pattern for
                                  Invocation of Synchronous and
                                  Asynchronous Web Services in Autonomic
                                  Computing Systems  . . . . . . . . . . . 131--142
               Zhaoyun Ding and   
                    Yan Jia and   
                   Bin Zhou and   
                         Yi Han   Mining Tribe-Leaders Based on the
                                  Frequent Pattern of Propagation  . . . . 143--153
                 Jianyi Guo and   
                   Jun Zhao and   
                Zhengtao Yu and   
                     Lei Su and   
                  Nianshu Jiang   Research on Semantic Label Extraction of
                                  Domain Entity Relation Based on CRF and
                                  Rules  . . . . . . . . . . . . . . . . . 154--162
              Zheng Lvexing and   
                Lv Xueqiang and   
                    Liu Kun and   
                    Du Yuncheng   Recognition of Chinese Personal Names
                                  Based on CRFs and Law of Names . . . . . 163--170
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7235, 2012

               Thomas Moyer and   
               Trent Jaeger and   
               Patrick McDaniel   Scalable Integrity-Guaranteed AJAX . . . 1--19
             Vijay Varadharajan   Security and Trust in the Web  . . . . . 20--21
                   Haoji Hu and   
               Chaofeng Sha and   
              Xiaoling Wang and   
                    Aoying Zhou   Estimate Unlabeled-Data-Distribution for
                                  Semi-supervised PU Learning  . . . . . . 22--33
                Yusuke Yamamoto   Disputed Sentence Suggestion towards
                                  Credibility-Oriented Web Search  . . . . 34--45
               Jamal Yousaf and   
                  Juanzi Li and   
                Haisu Zhang and   
                        Lei Hou   Exploration and Visualization of
                                  Administrator Network in Wikipedia . . . 46--59
               Jianquan Liu and   
              Hanxiong Chen and   
            Kazutaka Furuse and   
              Hiroyuki Kitagawa   An Efficient Algorithm for Arbitrary
                                  Reverse Furthest Neighbor Queries  . . . 60--72
               Jiaying Wang and   
              Xiaochun Yang and   
                   Bin Wang and   
                    Huaijie Zhu   Memory-Aware BWT by Segmenting Sequences
                                  to Support Subsequence Search  . . . . . 73--84
                Lijun Zhang and   
                Zhanhuai Li and   
                   Qun Chen and   
                     Xia Li and   
                    Ning Li and   
                       Ying Lou   Mining Frequent Association Tag
                                  Sequences for Clustering XML Documents   85--96
                 Haoran Xie and   
                    Qing Li and   
                     Xudong Mao   Context-Aware Personalized Search Based
                                  on User and Resource Profiles in
                                  Folksonomies . . . . . . . . . . . . . . 97--108
        Salman Ahmed Shaikh and   
              Hiroyuki Kitagawa   Distance-Based Outlier Detection on
                                  Uncertain Data of Gaussian Distribution  109--121
                 Weijian Ni and   
                   Tong Liu and   
                  Qingtian Zeng   Extracting Keyphrase Set with High
                                  Diversity and Coverage Using Structural
                                  SVM  . . . . . . . . . . . . . . . . . . 122--133
                  Zhuo Peng and   
               Chaokun Wang and   
                     Lu Han and   
               Jingchao Hao and   
                    Xiaoping Ou   Discovering the Most Potential Stars in
                                  Social Networks with Infra-skyline
                                  Queries  . . . . . . . . . . . . . . . . 134--145
                 Bing Cheng and   
                Tianqi Chen and   
                  Diyi Yang and   
               Weinan Zhang and   
             Yongqiang Wang and   
                        Yong Yu   Feature Based Informative Model for
                                  Discriminating Favorite Items from
                                  Unrated Ones . . . . . . . . . . . . . . 146--157
               Yuki Hattori and   
                 Akiyo Nadamoto   Search for Minority Information from
                                  Wikipedia Based on Similarity of
                                  Majority Information . . . . . . . . . . 158--169
                  Yanhua Du and   
                      Xitong Li   An Incremental Approach to Analyzing
                                  Temporal Constraints of Workflow
                                  Processes  . . . . . . . . . . . . . . . 170--182
             Chenjing Zhang and   
                   Le Chang and   
               Chaofeng Sha and   
              Xiaoling Wang and   
                    Aoying Zhou   Keywords Filtering over Probabilistic
                                  XML Data . . . . . . . . . . . . . . . . 183--194
                 Qian Zhang and   
                   Biao Qin and   
                      Shan Wang   $H$-Tree: a Hybrid Structure for
                                  Confidence Computation in Probabilistic
                                  Databases  . . . . . . . . . . . . . . . 195--206
            Takuya Yokotani and   
           Hung-Hsuan Huang and   
                  Kyoji Kawagoe   Predicting Online Auction Final Prices
                                  Using Time Series Splitting and
                                  Clustering . . . . . . . . . . . . . . . 207--218
                     Lei Li and   
               Wenxing Hong and   
                         Tao Li   Taxonomy-Oriented Recommendation towards
                                  Recommendation with Stage  . . . . . . . 219--230
                    Xiwu Gu and   
                 Ruixuan Li and   
                 Kunmei Wen and   
                   Bei Peng and   
                    Weijun Xiao   A GPU-Based Accelerator for Chinese Word
                                  Segmentation . . . . . . . . . . . . . . 231--242
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7236, 2012

                 Junjun Yin and   
              James D. Carswell   Effects of Variations in $3$D Spatial
                                  Search Techniques on Mobile Query Speed
                                  vs. Accuracy . . . . . . . . . . . . . . 1--16
    Betül Aydìn and   
 Jérôme Gensel and   
          Sylvie Calabretto and   
                   Bruno Tellez   ARCAMA-$3$D --- a Context-Aware
                                  Augmented Reality Mobile Platform for
                                  Environmental Discovery  . . . . . . . . 17--26
          Francesco Cutugno and   
        Vincenza Anna Leano and   
           Gianluca Mignini and   
                Roberto Rinaldi   Speech and Multimodal Interaction in
                                  Mobile GIS Search: a Case of Study . . . 27--32
       Viacheslav Filonenko and   
             Charlie Cullen and   
              James D. Carswell   Asynchronous Ultrasonic Trilateration
                                  for Indoor Positioning of Mobile Phones  33--46
              Dimitar Misev and   
               Mihaela Rusu and   
                  Peter Baumann   A Semantic Resolver for Coordinate
                                  Reference Systems  . . . . . . . . . . . 47--56
        Francesco Cerasuolo and   
          Francesco Cutugno and   
            Vincenza Anna Leano   Visualization with a New Visual Metaphor
                                  for Hierarchical and Stratified Temporal
                                  Domain . . . . . . . . . . . . . . . . . 57--71
           Davide De Chiara and   
         Vincenzo Del Fatto and   
             Monica Sebillo and   
              Genoveffa Tortora   Tag@Map: a Web-Based Application for
                                  Visually Analyzing Geographic
                                  Information through Georeferenced Tag
                                  Clouds . . . . . . . . . . . . . . . . . 72--81
     Reinaldo Bezerra Braga and   
                  Ali Tahir and   
         Michela Bertolotto and   
            Hervé Martin   Clustering User Trajectories to Find
                                  Patterns for Social Interaction
                                  Applications . . . . . . . . . . . . . . 82--97
       Pablo Martinez Lerin and   
           Daisuke Yamamoto and   
              Naohisa Takahashi   Making a Pictorial and Verbal Travel
                                  Trace from a GPS Trace . . . . . . . . . 98--115
          Kostas Patroumpas and   
                   Timos Sellis   Event Processing and Real-Time
                                  Monitoring over Streaming Traffic Data   116--133
     Reinaldo Bezerra Braga and   
Sócrates de Moraes Medeiros da Costa and   
      Windson Viana de Carvalho   A Context-Aware Web Content Generator
                                  Based on Personal Tracking . . . . . . . 134--150
           Andrea Ballatore and   
            David C. Wilson and   
             Michela Bertolotto   A Holistic Semantic Similarity Measure
                                  for Viewports in Interactive Maps  . . . 151--166
              Gavin McArdle and   
              Mathieu Petit and   
                  Cyril Ray and   
           Christophe Claramunt   Recommendations Based on Region and
                                  Spatial Profiles . . . . . . . . . . . . 167--184
             Alban Gabillon and   
              Patrick Capolsini   Enforcing Protection Mechanisms for
                                  Geographic Data  . . . . . . . . . . . . 185--202
                Anna Ciampi and   
            Annalisa Appice and   
            Pietro Guccione and   
                 Donato Malerba   Integrating Trend Clusters for
                                  Spatio-temporal Interpolation of Missing
                                  Sensor Data  . . . . . . . . . . . . . . 203--220
           Mohamed Bakillah and   
              Steve H. L. Liang   Discovering Sensor Services with Social
                                  Network Analysis and Expanded SQWRL
                                  Querying . . . . . . . . . . . . . . . . 221--238
            Marcello Cinque and   
         Christian Esposito and   
                Flavio Frattini   Leveraging Power of Transmission for
                                  Range-Free Localization of Tiny Sensors  239--256
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7238, 2012

              Divesh Srivastava   Enabling Real Time Data Analysis . . . . 1--1
                  Sang Kyun Cha   A New Paradigm of Thinking and
                                  Architecture for Real-Time Information
                                  Processing at Fingertips . . . . . . . . 2--2
              Hai Thanh Mai and   
                  Jaeho Kim and   
                  Myoung Ho Kim   Improving the Accuracy of Histograms for
                                  Geographic Data Objects  . . . . . . . . 3--17
               Yuxiang Wang and   
                Junzhou Luo and   
                  Aibo Song and   
                 Jiahui Jin and   
                      Fang Dong   Improving Online Aggregation Performance
                                  for Skewed Data Distribution . . . . . . 18--32
               Thanh-Huy Le and   
           Haytham Elghazel and   
       Mohand-Saíd Hacid   A Relational-Based Approach for
                                  Aggregated Search in Graph Databases . . 33--47
            Van Bao Tran Le and   
             Sebastian Link and   
                 Mozhgan Memari   Discovery of Keys from SQL Tables  . . . 48--62
              Kan Ngamakeur and   
           Sira Yongchareon and   
                   Chengfei Liu   A Framework for Realizing
                                  Artifact-Centric Business Processes in
                                  Service-Oriented Architecture  . . . . . 63--78
                Guohui Ding and   
                   Han Dong and   
                    Guoren Wang   Appearance-Order-Based Schema Matching   79--94
               Junfeng Zhou and   
                Zhifeng Bao and   
                Ziyang Chen and   
                  Tok Wang Ling   Fast Result Enumeration for Keyword
                                  Queries on XML Data  . . . . . . . . . . 95--109
             Erwin Leonardi and   
         Sourav S. Bhowmick and   
                    Fengrong Li   Stars on Steroids: Fast Evaluation of
                                  Multi-source Star Twig Queries in RDBMS  110--125
                  Jixue Liu and   
               Chengfei Liu and   
               Theo Haerder and   
                  Jeffery Xu Yu   Updating Typical XML Views . . . . . . . 126--140
                    Fang Du and   
                Yueguo Chen and   
                    Xiaoyong Du   Partitioned Indexes for Entity Search
                                  over RDF Knowledge Bases . . . . . . . . 141--155
             Ba Quan Truong and   
         Sourav S. Bhowmick and   
                 Curtis Dyreson   SINBAD: Towards Structure-Independent
                                  Querying of Common Neighbors in XML
                                  Databases  . . . . . . . . . . . . . . . 156--171
               Junfeng Zhou and   
                Zhifeng Bao and   
                Ziyang Chen and   
               Guoxiang Lan and   
                 Xudong Lin and   
                  Tok Wang Ling   Top-Down SLCA Computation Based on List
                                  Partition  . . . . . . . . . . . . . . . 172--184
               Ya-Hui Chang and   
             Po-Hsien Chien and   
                   Yu-Kai Chang   Efficiently Identifying Contributors for
                                  XML Keyword Search . . . . . . . . . . . 185--196
                  Xin Huang and   
                 Hong Cheng and   
                 Jiong Yang and   
              Jeffery Xu Yu and   
              Hongliang Fei and   
                       Jun Huan   Semi-supervised Clustering of Graph
                                  Objects: a Subgraph Mining Approach  . . 197--212
                   Huan Xia and   
                  Juanzi Li and   
                   Jie Tang and   
           Marie-Francine Moens   Plink-LDA: Using Link as Prior
                                  Information in Topic Modeling  . . . . . 213--227
                 Ira Assent and   
             Philipp Kranen and   
            Corinna Baldauf and   
                   Thomas Seidl   AnyOut: Anytime Outlier Detection on
                                  Streaming Data . . . . . . . . . . . . . 228--242
           Minh Nhut Nguyen and   
                 Xiao-Li Li and   
                   See-Kiong Ng   Ensemble Based Positive Unlabeled
                                  Learning for Time Series Classification  243--257
         Md. Mamunur Rashid and   
           Md. Rezaul Karim and   
           Byeong-Soo Jeong and   
                    Ho-Jin Choi   Efficient Mining Regularly Frequent
                                  Patterns in Transactional Databases  . . 258--271
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7239, 2012

         Trieu Minh Nhut Le and   
                      Jinli Cao   Top-$k$ Best Probability Queries on
                                  Probabilistic Data . . . . . . . . . . . 1--16
                    Mei Bai and   
               Junchang Xin and   
                    Guoren Wang   Probabilistic Reverse Skyline Query
                                  Processing over Uncertain Data Stream    17--32
             Christoph Lofi and   
        Ulrich Güntzer and   
                Wolf-Tilo Balke   Malleability-Aware Skyline Computation
                                  on Linked Open Data  . . . . . . . . . . 33--47
               Ghim-Eng Yap and   
                 Xiao-Li Li and   
                   Philip S. Yu   Effective Next-Items Recommendation via
                                  Personalized Sequential Pattern Mining   48--64
                  Yanwei Xu and   
                Jihong Guan and   
             Yoshiharu Ishikawa   Scalable Top- k Keyword Search in
                                  Relational Databases . . . . . . . . . . 65--80
             Patrick Roocks and   
              Markus Endres and   
               Stefan Mandl and   
          Werner Kießling   Composition and Efficient Evaluation of
                                  Context-Aware Preference Queries . . . . 81--95
                 Weiwei Sun and   
                   Peng Liu and   
                Jingjing Wu and   
                Yongrui Qin and   
                   Baihua Zheng   An Automaton-Based Index Scheme for
                                  On-Demand XML Data Broadcast . . . . . . 96--110
             Haritha Bellam and   
               Saladi Rahul and   
                 Krishnan Rajan   Colored Range Searching on Internal
                                  Memory . . . . . . . . . . . . . . . . . 111--125
                  Weimo Liu and   
                 Weiwei Sun and   
                Chunan Chen and   
                  Yan Huang and   
                 Yinan Jing and   
                    Kunjie Chen   Circle of Friend Query in Geo-Social
                                  Networks . . . . . . . . . . . . . . . . 126--137
             Satoshi Hikida and   
               Hieu Hanh Le and   
                   Haruo Yokota   A Power Saving Storage Method That
                                  Considers Individual Disk Rotation . . . 138--149
                Linlin Ding and   
               Junchang Xin and   
                Guoren Wang and   
                     Shan Huang   ComMapReduce: An Improvement of
                                  MapReduce with Lightweight Communication
                                  Mechanisms . . . . . . . . . . . . . . . 150--168
                Yingjie Shi and   
              Xiaofeng Meng and   
                   Bingbing Liu   Halt or Continue: Estimating Progress of
                                  Queries in the Cloud . . . . . . . . . . 169--184
                 Todd Eavis and   
                    Ahmad Taleb   Towards a Scalable, Performance-Oriented
                                  OLAP Storage Engine  . . . . . . . . . . 185--202
            Shunsuke Nishii and   
              Toyotaro Suzumura   Highly Scalable Speech Processing on
                                  Data Stream Management System  . . . . . 203--212
            Shinichiro Tago and   
               Tatsuya Asai and   
              Takashi Katoh and   
           Hiroaki Morikawa and   
                Hiroya Inakoshi   EVIS: a Fast and Scalable Episode
                                  Matching Engine for Massively Parallel
                                  Data Streams . . . . . . . . . . . . . . 213--223
               Seokjin Hong and   
           Rana Prasad Sahu and   
             M. R. Srikanth and   
             Supriya Mandal and   
                  Kyoung-Gu Woo   Real-Time Analysis of ECG Data Using
                                  Mobile Data Stream Management System . . 224--233
                  Hyeok Han and   
                   Seong-il Jin   A Main Memory Based Spatial DBMS: Kairos 234--242
               Sungjoon Lim and   
                 Taesul Seo and   
               Changhan Lee and   
                  Soungsoo Shin   Study on the International
                                  Standardization for the Semantic
                                  Metadata Mapping Procedure . . . . . . . 243--249
       Raphaël Thollot and   
   Nicolas Kuchmann-Beauger and   
             Marie-Aude Aufaure   Semantics and Usage Statistics for
                                  Multi-dimensional Query Expansion  . . . 250--260
               Haitang Feng and   
           Nicolas Lumineau and   
   Mohand-Saíd Hacid and   
                  Richard Domps   Hierarchy-Based Update Propagation in
                                  Decision Support Systems . . . . . . . . 261--271
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7240, 2012

                     Bumsoo Kim   Commercial SSD Products--- Status Quo
                                  and Next . . . . . . . . . . . . . . . . 1--1
                      Yi Ou and   
               Theo Härder   Improving Database Performance Using a
                                  Flash-Based Write Cache  . . . . . . . . 2--13
                   Rui Wang and   
                  Lihua Yue and   
                Peiquan Jin and   
                    Junjie Wang   $h$-Buffer: An Adaptive Buffer
                                  Management Scheme for Flash-Based
                                  Storage Devices  . . . . . . . . . . . . 14--27
                  Yulei Fan and   
                    Wei Cao and   
                  Xiaofeng Meng   A Study of Space Reclamation on
                                  Flash-Based Append-only Storage
                                  Management . . . . . . . . . . . . . . . 28--39
                Junjie Wang and   
                  Lihua Yue and   
                Peiquan Jin and   
                       Rui Wang   A Dual-Grained FTL for Flash Memory  . . 40--52
Gylfi \THór Gudmundsson and   
            Laurent Amsaleg and   
Björn \THór Jónsson   Impact of Storage Technology on the
                                  Efficiency of Cluster-Based
                                  High-Dimensional Index Creation  . . . . 53--64
              Maciej Pawlik and   
                Wojciech Macyna   Implementation of the Aggregated
                                  $R$-Tree over Flash Memory . . . . . . . 65--72
               Qingling Cao and   
              Zhichao Liang and   
                  Yulei Fan and   
                  Xiaofeng Meng   A Flash-Based Decomposition Storage
                                  Model  . . . . . . . . . . . . . . . . . 73--80
               Xavier Chaze and   
               Amal Bouejla and   
                Aldo Napoli and   
           Franck Guarnieri and   
                   Thibaut Eude   The Contribution of Bayesian Networks to
                                  Manage Risks of Maritime Piracy against
                                  Oil Offshore Fields  . . . . . . . . . . 81--91
                 Gihong Kim and   
               Bonghee Hong and   
                    Joonho Kwon   A Scalable Object Based Discovery
                                  Service for Global Tracing of RFID
                                  Products . . . . . . . . . . . . . . . . 92--103
                Guandong Xu and   
                      Zongda Wu   On Smart and Accurate Contextual
                                  Advertising  . . . . . . . . . . . . . . 104--104
              Kyung-Mi Park and   
                 Hogun Park and   
             Hyoung-Gon Kim and   
                     Heedong Ko   Review Summarization Based on Linguistic
                                  Knowledge  . . . . . . . . . . . . . . . 105--114
                     Lin Li and   
                Huifan Xiao and   
                    Guandong Xu   Finding Related Micro-blogs Based on
                                  WordNet  . . . . . . . . . . . . . . . . 115--122
               Yonghun Park and   
              Kyoungsoo Bok and   
                     Jaesoo Yoo   An Efficient Path Nearest Neighbor Query
                                  Processing Scheme for Location Based
                                  Services . . . . . . . . . . . . . . . . 123--129
               Ok-Ran Jeong and   
                      Jehwan Oh   Social Community Based Blog Search
                                  Framework  . . . . . . . . . . . . . . . 130--141
                  Xian Chen and   
               Hyoseop Shin and   
                     Minsoo Lee   LSA as Ground Truth for Recommending
                                  ``Flickr-Aware'' Representative Tags . . 142--153
Frédéric Cuppens and   
      Nora Cuppens-Boulahia and   
       Eduardo Pena Viña   Adaptive Access Control Enforcement in
                                  Social Network Using Aspect Weaving  . . 154--167
             Shoko Wakamiya and   
                  Ryong Lee and   
               Kazutoshi Sumiya   Exploring Reflection of Urban Society
                                  through Cyber-Physical Crowd Behavior on
                                  Location-Based Social Network  . . . . . 168--179
      Carson Kai-Sang Leung and   
                Syed K. Tanbeer   Mining Social Networks for Significant
                                  Friend Groups  . . . . . . . . . . . . . 180--192
             Nidhi R. Arora and   
                 Wookey Lee and   
         Simon Soon-Hyoung Park   Ranking Structural Parameters for Social
                                  Networks . . . . . . . . . . . . . . . . 193--203
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7241, 2012

              Johan Jeuring and   
                Alex Gerdes and   
                Bastiaan Heeren   A Programming Tutor for Haskell  . . . . 1--45
           Rinus Plasmeijer and   
               Peter Achten and   
                     Bas Lijnse   Defining Multi-user Web Applications
                                  with iTasks  . . . . . . . . . . . . . . 46--92
             Andrew Butterfield   Reasoning about I/O in Functional
                                  Programs . . . . . . . . . . . . . . . . 93--141
                    Rita Loogen   Eden --- Parallel Functional Programming
                                  with Haskell . . . . . . . . . . . . . . 142--206
                 Clemens Grelck   Single Assignment C (SAC) High
                                  Productivity Meets High Performance  . . 207--278
            Greg Michaelson and   
                   Gudmund Grov   Reasoning about Multi-process Systems
                                  with the Box Calculus  . . . . . . . . . 279--338
                   Simon Marlow   Parallel and Concurrent Programming in
                                  Haskell  . . . . . . . . . . . . . . . . 339--401
              Emil Axelsson and   
                   Mary Sheeran   Feldspar: Application and Implementation 402--439
        Melinda Tóth and   
      István Bozó   Static Analysis of Complex Software
                                  Systems Implemented in Erlang  . . . . . 440--498
       Gábor Páli   Extending Little Languages into Big
                                  Systems  . . . . . . . . . . . . . . . . 499--516
   Viliam Slodi\vcák and   
                    Pavol Macko   Some New Approaches in Functional
                                  Programming Based on Categories  . . . . 517--532
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7243, 2012

      António Branco and   
                   Filipe Nunes   Verb Analysis in a Highly Inflective
                                  Language with an MFF Algorithm . . . . . 1--11
     Vera Vasilévski and   
       Leonor Scliar-Cabral and   
Márcio José Araújo   Automatic Analysis of Portuguese Verb
                                  Morphology . . . . . . . . . . . . . . . 12--23
             Jorge Baptista and   
         Lucas Nunes Vieira and   
       Cláudio Diniz and   
                    Nuno Mamede   Coordination of-mente Ending Adverbs in
                                  Portuguese: an Integrated Solution . . . 24--34
                Raquel Reis and   
        António Teixeira   Morphosyntactic Analysis of Language in
                                  Children with Autism Spectrum Disorder   35--45
 José Pedro Ferreira and   
    António Lourinho and   
              Margarita Correia   Lince, an End User Tool for the
                                  Implementation of the Spelling Reform of
                                  Portuguese . . . . . . . . . . . . . . . 46--55
          Gracinda Carvalho and   
         Isabel Falé and   
     David Martins de Matos and   
                    Vitor Rocio   Searching a Mixed Corpus in the Light of
                                  the New Portuguese Orthographic Norm . . 56--62
              Pablo Gamallo and   
                  Marcos Garcia   Extraction of Bilingual Cognates from
                                  Wikipedia  . . . . . . . . . . . . . . . 63--72
           Britta D. Zeller and   
          Sebastian Padó   Corpus-Based Acquisition of Support Verb
                                  Constructions for Portuguese . . . . . . 73--84
             Lucelene Lopes and   
                  Renata Vieira   Improving Portuguese Term Extraction . . 85--92
Clarissa Castellã Xavier and   
Vera Lúcia Strube de Lima   A Method for Automatically Extracting
                                  Domain Semantic Networks from Wikipedia  93--98
            Francisco Costa and   
          António Branco   Extracting Temporal Information from
                                  Portuguese Texts . . . . . . . . . . . . 99--105
              Olga Craveiro and   
             Joaquim Macedo and   
               Henrique Madeira   It Is the Time for Portuguese Texts! . . 106--112
Michel Généreux and   
             Iris Hendrickx and   
           Amália Mendes   A Large Portuguese Corpus On-Line:
                                  Cleaning and Preprocessing . . . . . . . 113--120
      Alberto Simões and   
Álvaro Iriarte Sanromán and   
José Joáo Almeida   Dicionário--Aberto: a Source of Resources
                                  for the Portuguese Language Processing   121--127
     Vládia Pinheiro and   
              Vasco Furtado and   
           Tarcisio Pequeno and   
                  Caio Ferreira   Towards a Common Sense Base in
                                  Portuguese for the Linked Open Data
                                  Cloud  . . . . . . . . . . . . . . . . . 128--138
             Ana R. Luís   Weak Object Pronouns in Brazilian
                                  Portuguese: An LFG Analysis  . . . . . . 139--145
        Eraldo R. Fernandes and   
          Ruy L. Milidiú   Entropy-Guided Feature Generation for
                                  Structured Learning of Portuguese
                                  Dependency Parsing . . . . . . . . . . . 146--156
         Daniel Emilio Beck and   
      Helena de Medeiros Caseli   Bayesian Induction of Syntactic Language
                                  Models for Brazilian Portuguese  . . . . 157--167
                Rui Correia and   
             Jorge Baptista and   
            Maxine Eskenazi and   
                    Nuno Mamede   Automatic Generation of Cloze Question
                                  Stems  . . . . . . . . . . . . . . . . . 168--178
           David S. Batista and   
    João D. Ferreira and   
         Francisco M. Couto and   
          Mário J. Silva   Toponym Disambiguation Using
                                  Ontology-Based Semantic Similarity . . . 179--185
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7244, 2012

                 Tom Castle and   
               Colin G. Johnson   Evolving High-Level Imperative Program
                                  Trees with Strongly Formed Genetic
                                  Programming  . . . . . . . . . . . . . . 1--12
             Alban Cotillon and   
            Philip Valencia and   
                    Raja Jurdak   Android Genetic Programming Framework    13--24
    Dimitris C. Dracopoulos and   
          Dimitrios Effraimidis   Genetic Programming for Generalised
                                  Helicopter Hovering Control  . . . . . . 25--36
        Gerard David Howard and   
                 Larry Bull and   
               Andrew Adamatzky   Cartesian Genetic Programming for
                                  Memristive Logic Circuits  . . . . . . . 37--48
                  David Jackson   A New, Node-Focused Model for Genetic
                                  Programming  . . . . . . . . . . . . . . 49--60
              Krzysztof Krawiec   Medial Crossovers for Genetic
                                  Programming  . . . . . . . . . . . . . . 61--72
           Penousal Machado and   
        João Correia and   
                    Juan Romero   Improving Face Detection . . . . . . . . 73--84
                Eoin Murphy and   
               Erik Hemberg and   
             Miguel Nicolau and   
            Michael O'Neill and   
               Anthony Brabazon   Grammar Bias and Initialisation in
                                  Grammar Based Genetic Programming  . . . 85--96
          Kourosh Neshatian and   
                  Mengjie Zhang   Improving Relevance Measures Using
                                  Genetic Programming  . . . . . . . . . . 97--108
            Quang Uy Nguyen and   
           Xuan Hoai Nguyen and   
            Michael O'Neill and   
            Alexandros Agapitos   An Investigation of Fitness Sharing with
                                  Semantic and Syntactic Distance Metrics  109--120
                  Su Nguyen and   
              Mengjie Zhang and   
              Mark Johnston and   
                   Kay Chen Tan   Evolving Reusable Operation-Based
                                  Due-Date Assignment Models for Job Shop
                                  Scheduling with Genetic Programming  . . 121--133
             Miguel Nicolau and   
           Matthew Saunders and   
            Michael O'Neill and   
              Bruce Osborne and   
               Anthony Brabazon   Evolving Interpolating Models of Net
                                  Ecosystem CO$_2$ Exchange Using
                                  Grammatical Evolution  . . . . . . . . . 134--145
             Juan Luis Olmo and   
José Raúl Romero and   
       Sebastián Ventura   Multi-Objective Ant Programming for
                                  Mining Classification Rules  . . . . . . 146--157
           Andrew J. Parkes and   
           Ender Özcan and   
                Matthew R. Hyde   Matrix Analysis of Genetic Programming
                                  Mutation . . . . . . . . . . . . . . . . 158--169
                 Tom Seaton and   
           Julian F. Miller and   
                     Tim Clarke   An Ecological Approach to Measuring
                                  Locality in Linear Genotype to Phenotype
                                  Maps . . . . . . . . . . . . . . . . . . 170--181
 Michaela \vSikulová and   
        Luká\vs Sekanina   Coevolution in Cartesian Genetic
                                  Programming  . . . . . . . . . . . . . . 182--193
     Tobiá\vs Smolka and   
              Petr \vSvenda and   
    Luká\vs Sekanina and   
         Vashek Matyá\vs   Evolutionary Design of Message Efficient
                                  Secrecy Amplification Protocols  . . . . 194--205
              Jorge Tavares and   
           Francisco B. Pereira   Automatic Design of Ant Algorithms with
                                  Grammatical Evolution  . . . . . . . . . 206--217
       Ivo Gonçalves and   
                 Sara Silva and   
              Joana B. Melo and   
    João M. B. Carreiras   Random Sampling Technique for
                                  Overfitting Control in Genetic
                                  Programming  . . . . . . . . . . . . . . 218--229
               MinHyeok Kim and   
     Robert Ian (Bob) McKay and   
              Dong-Kyun Kim and   
               Xuan Hoai Nguyen   Evolutionary Operator Self-adaptation
                                  with Diverse Operators . . . . . . . . . 230--241
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7245, 2012

Julián Domínguez and   
                   Enrique Alba   A Methodology for Comparing the
                                  Execution Time of Metaheuristics Running
                                  on Different Hardware  . . . . . . . . . 1--12
         Martin Schwengerer and   
              Sandro Pirkwieser   A Variable Neighborhood Search Approach
                                  for the Two-Echelon Location-Routing
                                  Problem  . . . . . . . . . . . . . . . . 13--24
         Thais Ávila and   
Ángel Corberán and   
                    Isaac Plana   An ILS-Based Metaheuristic for the
                                  Stacker Crane Problem  . . . . . . . . . 25--36
                Jaber Jemai and   
                Manel Zekri and   
                Khaled Mellouli   An NSGA-II Algorithm for the Green
                                  Vehicle Routing Problem  . . . . . . . . 37--48
    Rudinei Martins de Oliveira   Clustering Search Heuristic for Solving
                                  a Continuous Berth Allocation Problem    49--62
           Penny L. Holborn and   
           Jonathan M. Thompson   Combining Heuristic and Exact Methods to
                                  Solve the Vehicle Routing Problem with
                                  Pickups, Deliveries and Time Windows . . 63--74
          Noura Al Moubayed and   
               Andrei Petrovski   $D^2$ MOPSO: Multi-Objective Particle
                                  Swarm Optimizer Based on Decomposition
                                  and Dominance  . . . . . . . . . . . . . 75--86
             Mohsen Rahmani and   
                Ruben A. Romero   Domain Reduction Using GRASP
                                  Construction Phase for Transmission
                                  Expansion Planning Problem . . . . . . . 87--98
          Florian Allerding and   
                     Marc Premm   Electrical Load Management in Smart
                                  Homes Using Evolutionary Algorithms  . . 99--110
          Francisco Chicano and   
                   Enrique Alba   Exact Computation of the
                                  Fitness-Distance Correlation for
                                  Pseudoboolean Functions with One Global
                                  Optimum  . . . . . . . . . . . . . . . . 111--123
            Marco Gavanelli and   
               Maddalena Nonato   Genetic Algorithms for Scheduling
                                  Devices Operation in a Water
                                  Distribution System in Response to
                                  Contamination Events . . . . . . . . . . 124--135
             Gabriela Ochoa and   
               Matthew Hyde and   
                    Tim Curtois   HyFlex: a Benchmark Framework for
                                  Cross-Domain Heuristic Search  . . . . . 136--147
   Ji\vrí Kubalík   Hyper-Heuristic Based on Iterated Local
                                  Search Driven by Evolutionary Algorithm  148--159
                   Samir Loudni   Intensification/Diversification-Driven
                                  ILS for a Graph Coloring Problem . . . . 160--171
     Francisco J. Rodriguez and   
                 Christian Blum   Iterated Greedy Algorithms for the
                                  Maximal Covering Location Problem  . . . 172--181
          Mario Garza-Fabre and   
        Eduardo Rodriguez-Tello   Multiobjectivizing the HP Model for
                                  Protein Structure Prediction . . . . . . 182--193
              Wahabou Abdou and   
               Christelle Bloch   Multi-Pareto-Ranking Evolutionary
                                  Algorithm  . . . . . . . . . . . . . . . 194--205
Jérémie Dubois-Lacoste and   
Manuel López-Ibáñez   Pareto Local Search Algorithms for
                                  Anytime Bi-objective Optimization  . . . 206--217
                     Jun He and   
                  Feidun He and   
                   Hongbin Dong   Pure Strategy or Mixed Strategy? . . . . 218--229
               Adnan Fakeih and   
                   Ahmed Kattan   Recurrent Genetic Algorithms: Sustaining
                                  Evolvability . . . . . . . . . . . . . . 230--242
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7246, 2012

              Timmy Manning and   
                     Paul Walsh   Automatic Task Decomposition for the
                                  NeuroEvolution of Augmenting Topologies
                                  (NEAT) Algorithm . . . . . . . . . . . . 1--12
               Luca Manzoni and   
             Mauro Castelli and   
             Leonardo Vanneschi   Evolutionary Reaction Systems  . . . . . 13--25
             Lars Rosenbaum and   
               Andreas Jahn and   
                   Andreas Zell   Optimizing the Edge Weights in Optimal
                                  Assignment Methods for Virtual Screening
                                  with Particle Swarm Optimization . . . . 26--37
          Christian Darabos and   
            Mario Giacobini and   
                    Ting Hu and   
                 Jason H. Moore   Lévy--Flight Genetic Programming: Towards
                                  a New Mutation Paradigm  . . . . . . . . 38--49
              Simone Marini and   
            Alessandra Conversi   Understanding Zooplankton Long Term
                                  Variability through Genetic Programming  50--61
             Holger Franken and   
            Alexander Seitz and   
             Rainer Lehmann and   
    Hans-Ulrich Häring and   
                 Norbert Stefan   Inferring Disease-Related Metabolite
                                  Dependencies with a Bayesian
                                  Optimization Algorithm . . . . . . . . . 62--73
            Marco S. Nobile and   
            Daniela Besozzi and   
            Paolo Cazzaniga and   
            Giancarlo Mauri and   
                  Dario Pescini   A GPU-Based Multi-swarm PSO Method for
                                  Parameter Estimation in Stochastic
                                  Biological Systems Exploiting
                                  Discrete-Time Target Series  . . . . . . 74--85
  Flávio L. Pinheiro and   
        Francisco C. Santos and   
               Jorge M. Pacheco   Tracking the Evolution of Cooperation in
                                  Complex Networked Populations  . . . . . 86--96
         Leonardo Vanneschi and   
             Matteo Mondini and   
            Martino Bertoni and   
             Alberto Ronchi and   
                 Mattia Stefano   GeNet: a Graph-Based Genetic Programming
                                  Framework for the Reverse Engineering of
                                  Gene Regulatory Networks . . . . . . . . 97--109
David L. González-Álvarez and   
Miguel A. Vega-Rodríguez and   
    Juan A. Gómez-Pulido   Comparing Multiobjective Artificial Bee
                                  Colony Adaptations for Discovering DNA
                                  Motifs . . . . . . . . . . . . . . . . . 110--121
                 Qinxin Pan and   
          Christian Darabos and   
                 Jason H. Moore   The Role of Mutations in Whole Genome
                                  Duplication  . . . . . . . . . . . . . . 122--133
         Emily R. Holzinger and   
             Scott M. Dudek and   
              Alex T. Frase and   
             Brooke Fridley and   
              Prabhakar Chalise   Comparison of Methods for
                                  Meta-dimensional Data Analysis Using in
                                  Silico and Biological Data Sets  . . . . 134--143
Sergio Santander-Jiménez and   
Miguel A. Vega-Rodríguez and   
    Juan A. Gómez-Pulido   Inferring Phylogenetic Trees Using a
                                  Multiobjective Artificial Bee Colony
                                  Algorithm  . . . . . . . . . . . . . . . 144--155
Gualberto Asencio-Cortés and   
Jesús S. Aguilar-Ruiz and   
Alfonso E. Márquez-Chamorro   Prediction of Mitochondrial Matrix
                                  Protein Structures Based on Feature
                                  Selection and Fragment Assembly  . . . . 156--167
            Kesav Kancherla and   
             Srinivas Mukkamala   Feature Selection for Lung Cancer
                                  Detection Using SVM Based Recursive
                                  Feature Elimination Method . . . . . . . 168--176
        Alexander V. Spirov and   
         Nina E. Golyandina and   
          David M. Holloway and   
            Theodore Alexandrov   Measuring Gene Expression Noise in Early
                                  \em Drosophila Embryos: The Highly
                                  Dynamic Compartmentalized
                                  Micro-environment of the Blastoderm Is
                                  One of the Main Sources of Noise . . . . 177--188
  Delaney Granizo-Mackenzie and   
                 Jason H. Moore   Artificial Immune Systems Perform
                                  Valuable Work When Detecting Epistasis
                                  in Human Genetic Datasets  . . . . . . . 189--200
         Carrie C. Buchanan and   
            John R. Wallace and   
              Alex T. Frase and   
             Eric S. Torstenson   A Biologically Informed Method for
                                  Detecting Associations with Rare
                                  Variants . . . . . . . . . . . . . . . . 201--210
              Clara Pizzuti and   
            Simona E. Rombo and   
                Elena Marchiori   Complex Detection in Protein-Protein
                                  Interaction Networks: a Compact Overview
                                  for Researchers and Practitioners  . . . 211--223
 Cosme E. Santiesteban-Toca and   
Gualberto Asencio-Cortés and   
Alfonso E. Márquez-Chamorro   Short-Range Interactions and Decision
                                  Tree-Based Protein Contact Map Predictor 224--233
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7247, 2012

         Rui Filipe Antunes and   
          Frederic Fol Leymarie   Generative Choreography: Animating in
                                  Real-Time Dancing Avatars  . . . . . . . 1--10
               Steve Bergen and   
                  Brian J. Ross   Aesthetic $3$D Model Evolution . . . . . 11--22
             Jonathan Byrne and   
                   Erik Hemberg   A Local Search Interface for Interactive
                                  Evolutionary Architectural Design  . . . 23--34
                   Simon Colton   Evolving a Library of Artistic Scene
                                  Descriptors  . . . . . . . . . . . . . . 35--47
              E. den Heijer and   
                    A. E. Eiben   Evolving Pop Art Using Scalable Vector
                                  Graphics . . . . . . . . . . . . . . . . 48--59
              E. den Heijer and   
                    A. E. Eiben   Maintaining Population Diversity in
                                  Evolutionary Art . . . . . . . . . . . . 60--71
            Arne Eigenfeldt and   
              Philippe Pasquier   Populations of Populations: Composing
                                  with Multiple Evolutionary Algorithms    72--83
 Francisco Fernández and   
        Francisco Chávez   Fuzzy Rule Based System Ensemble for
                                  Music Genre Classification . . . . . . . 84--95
            José Fornari   A Computational Environment for the
                                  Evolutionary Sound Synthesis of
                                  Birdsongs  . . . . . . . . . . . . . . . 96--107
                Gary Greenfield   A Platform for Evolving Controllers for
                                  Simulated Drawing Robots . . . . . . . . 108--116
          Gregory S. Hornby and   
                   Josh Bongard   Learning Comparative User Models for
                                  Accelerating Human-Computer
                                  Collaborative Search . . . . . . . . . . 117--128
               Colin G. Johnson   Fitness in Evolutionary Art and Music:
                                  What Has Been Used and What Could Be
                                  Used?  . . . . . . . . . . . . . . . . . 129--140
Maximos A. Kaliakatsos--Papakostas   Interactive Evolution of 8-Bit Melodies
                                  with Genetic Programming towards Finding
                                  Aesthetic Measures for Sound . . . . . . 141--152
                    Yang Li and   
                Changjun Hu and   
                  Ming Chen and   
                    Jingyuan Hu   Investigating Aesthetic Features to
                                  Model Human Preference in Evolutionary
                                  Art  . . . . . . . . . . . . . . . . . . 153--164
                 Phil Lopes and   
                   Paulo Urbano   The Traveling Percussionist  . . . . . . 165--175
Róisín Loughran and   
              Jacqueline Walker   Genetic Programming for Musical Sound
                                  Analysis . . . . . . . . . . . . . . . . 176--186
           Penousal Machado and   
        João Correia and   
                    Juan Romero   Expression-Based Evolution of Faces  . . 187--198
                James McDermott   Graph Grammars as a Representation for
                                  Interactive Evolutionary $3$D Design . . 199--210
                      Anonymous   Polyphonic Transcription: Exploring a
                                  Hybrid of Tone Models and Particle Swarm
                                  Optimisation . . . . . . . . . . . . . . 211--222
          Benjamin D. Smith and   
                 Guy E. Garnett   Reinforcement Learning and the Creative,
                                  Automated Music Improviser . . . . . . . 223--234
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7248, 2012

José Manuel Lanza-Gutiérrez and   
Juan Antonio Gómez-Pulido and   
Miguel A. Vega-Rodríguez   Optimizing Energy Consumption in
                                  Heterogeneous Wireless Sensor Networks
                                  by Means of Evolutionary Algorithms  . . 1--10
            Patrick LaRoche and   
      A. Nur Zincir-Heywood and   
             Malcolm I. Heywood   Network Protocol Discovery and Analysis
                                  via Live Interaction . . . . . . . . . . 11--20
             Steffen Limmer and   
                Dietmar Fey and   
             Ulrich Lohmann and   
              Jürgen Jahns   Evolutionary Design of Active Free Space
                                  Optical Networks Based on Digital Mirror
                                  Devices  . . . . . . . . . . . . . . . . 21--30
           Nourredine Tabia and   
          Alexandre Gondran and   
               Oumaya Baala and   
             Alexandre Caminada   Frequency Robustness Optimization with
                                  Respect to Traffic Distribution for LTE
                                  System . . . . . . . . . . . . . . . . . 31--41
María Arsuaga-Ríos and   
 Francisco Prieto-Castrillo and   
Miguel A. Vega-Rodríguez   Small-World Optimization Applied to Job
                                  Scheduling on Grid Environments from a
                                  Multi-Objective Perspective  . . . . . . 42--51
Pablo García-Sánchez and   
                A. E. Eiben and   
             Evert Haasdijk and   
                    Berend Weel   Testing Diversity-Enhancing Migration
                                  Policies for Hybrid On-Line Evolution of
                                  Robot Controllers  . . . . . . . . . . . 52--62
           Tüze Kuyucu and   
                 Ivan Tanev and   
            Katsunori Shimohara   Evolutionary Optimization of
                                  Pheromone-Based Stigmergic Communication 63--72
              Maciej Pacula and   
                Jason Ansel and   
          Saman Amarasinghe and   
               Una-May O'Reilly   Hyperparameter Tuning in Bandit-Based
                                  Adaptive Operator Selection  . . . . . . 73--82
                Hendrik Richter   Analyzing Dynamic Fitness Landscapes of
                                  the Targeting Problem of Chaotic Systems 83--92
               Pedro Trueba and   
             Abraham Prieto and   
           Francisco Bellas and   
       Pilar Caamaño and   
                Richard J. Duro   Self-organization and Specialization in
                                  Multiagent Systems through Open-Ended
                                  Natural Evolution  . . . . . . . . . . . 93--102
              Mikdam Turkey and   
                  Riccardo Poli   An Empirical Tool for Analysing the
                                  Collective Behaviour of Population-Based
                                  Algorithms . . . . . . . . . . . . . . . 103--113
            Crown Guan Wang and   
                 Kwok Yip Szeto   Sales Potential Optimization on Directed
                                  Social Networks: a Quasi-Parallel
                                  Genetic Algorithm Approach . . . . . . . 114--123
                Berend Weel and   
             Evert Haasdijk and   
                    A. E. Eiben   The Emergence of Multi-cellular Robot
                                  Organisms through On-Line On-Board
                                  Evolution  . . . . . . . . . . . . . . . 124--134
        Alexandros Agapitos and   
            Michael O'Neill and   
               Anthony Brabazon   Evolving Seasonal Forecasting Models
                                  with Genetic Programming in the Context
                                  of Pricing Weather-Derivatives . . . . . 135--144
           Jonathan Arriaga and   
Manuel Valenzuela-Rendón   Steepest Ascent Hill Climbing for
                                  Portfolio Selection  . . . . . . . . . . 145--154
             Antonia Azzini and   
              Mauro Dragoni and   
        Andrea G. B. Tettamanzi   A Neuro-evolutionary Approach to
                                  Intraday Financial Modeling  . . . . . . 155--164
   Feijoo E. Colomine Duran and   
               Carlos Cotta and   
Antonio J. Fernández-Leiva   A Comparative Study of Multi-objective
                                  Evolutionary Algorithms to Optimize the
                                  Selection of Investment Portfolios with
                                  Cardinality Constraints  . . . . . . . . 165--173
      Iván Contreras and   
José Ignacio Hidalgo and   
Laura Núñez-Letamendia   A GA Combining Technical and Fundamental
                                  Analysis for Trading the Stock Market    174--183
                   Michael Mayo   Evolutionary Data Selection for
                                  Enhancing Models of Intraday Forex Time
                                  Series . . . . . . . . . . . . . . . . . 184--193
               Michael Cook and   
               Simon Colton and   
                     Jeremy Gow   Initial Results from Co-operative
                                  Co-evolution for Automated Platformer
                                  Design . . . . . . . . . . . . . . . . . 194--203
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??