Table of contents for issues of Lecture Notes in Computer Science

Last update: Sat Oct 14 16:22:41 MDT 2017                Valid HTML 3.2!

Volume 7300, 2012
Volume 7301, 2012
Volume 7302, 2012
Volume 7303, 2012
Volume 7304, 2012
Volume 7305, 2012
Volume 7306, 2012
Volume 7307, 2012
Volume 7308, 2012
Volume 7309, 2012
Volume 7310, 2012
Volume 7311, 2012
Volume 7312, 2012
Volume 7313, 2012
Volume 7314, 2012
Volume 7315, 2012
Volume 7316, 2012
Volume 7317, 2012
Volume 7319, 2012
Volume 7320, 2012
Volume 7321, 2012
Volume 7322, 2012
Volume 7323, 2012
Volume 7324, 2012
Volume 7325, 2012
Volume 7327, 2012
Volume 7328, 2012
Volume 7329, 2012
Volume 7330, 2012
Volume 7331, 2012
Volume 7332, 2012
Volume 7333, 2012
Volume 7334, 2012
Volume 7335, 2012
Volume 7336, 2012
Volume 7337, 2012
Volume 7338, 2012
Volume 7339, 2012
Volume 7340, 2012
Volume 7341, 2012
Volume 7342, 2012
Volume 7343, 2012
Volume 7344, 2012
Volume 7345, 2012
Volume 7346, 2012
Volume 7347, 2012
Volume 7348, 2012
Volume 7349, 2012


Lecture Notes in Computer Science
Volume 7300, 2012

            M. Sakthi Balan and   
          Helmut Jürgensen   Peptide Computers  . . . . . . . . . . . 1--29
Hans-Joachim Böckenhauer and   
          Juraj Hromkovi\vc and   
                Dennis Komm and   
      Richard Královi\vc   On the Power of Randomness versus Advice
                                  in Online Computation  . . . . . . . . . 30--43
        Andrzej Ehrenfeucht and   
               Jetty Kleijn and   
              Maciej Koutny and   
             Grzegorz Rozenberg   Relevance of Entities in Reaction
                                  Systems  . . . . . . . . . . . . . . . . 44--55
               Sigrid Ewert and   
                     Max Rabkin   Generalized Random Context Picture
                                  Grammars: The State of the Art . . . . . 56--74
                 Henning Fernau   Cooperating Distributed Tree Automata    75--85
                  Markus Holzer   A Note on Combined Derivation Modes for
                                  Cooperating Distributed Grammar Systems  86--98
                 Mari Huova and   
          Juhani Karhumäki   Equations in the Partial Semigroup of
                                  Words with Overlapping Products  . . . . 99--110
              Martin Kutrib and   
                 Friedrich Otto   On CD-Systems of Stateless Deterministic
                                  Two-Phase RR(1)-Automata . . . . . . . . 111--137
          Klaus-Jörn Lange   The Boolean Formula Value Problem as
                                  Formal Language  . . . . . . . . . . . . 138--144
               Florin Manea and   
              Robert Mercas and   
                 Victor Mitrana   Hairpin Lengthening and Shortening of
                                  Regular Languages  . . . . . . . . . . . 145--159
           Alexander Meduna and   
                     Petr Zemek   One-Sided Random Context Grammars with
                                  Leftmost Derivations . . . . . . . . . . 160--173
             Taishin Y. Nishida   Earley's Parsing Algorithm and $k$-Petri
                                  Net Controlled Grammars  . . . . . . . . 174--185
          Alexander Okhotin and   
               Xiaoxue Piao and   
                    Kai Salomaa   Descriptional Complexity of Input-Driven
                                  Pushdown Automata  . . . . . . . . . . . 186--206
                Gheorghe P\uaun   Towards ``Fypercomputations'' (in
                                  Membrane Computing)  . . . . . . . . . . 207--220
                   Arto Salomaa   Undecidability of State Complexities
                                  Using Mirror Images  . . . . . . . . . . 221--235
                 Ludwig Staiger   Asymptotic Subword Complexity  . . . . . 236--245
                    Ralf Stiebe   On Grammars Controlled by Parikh Vectors 246--264
             György Vaszil   On the Nonterminal Complexity of Tree
                                  Controlled Grammars  . . . . . . . . . . 265--272
             Shenggen Zheng and   
                 Daowen Qiu and   
                  Lvzhou Li and   
                   Jozef Gruska   One-Way Finite Automata with Quantum and
                                  Classical States . . . . . . . . . . . . 273--290
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7301, 2012

                 Ryan Rossi and   
               Jennifer Neville   Time-Evolving Relational Classification
                                  and Ensemble Methods . . . . . . . . . . 1--13
                    Xiao Li and   
                   Da Kuang and   
                Charles X. Ling   Active Learning for Hierarchical Text
                                  Classification . . . . . . . . . . . . . 14--25
               Colin DeLong and   
             Jaideep Srivastava   TeamSkill Evolved: Mixed Classification
                                  Schemes for Team-Based Multi-player
                                  Games  . . . . . . . . . . . . . . . . . 26--37
          Ratnadip Adhikari and   
                  R. K. Agrawal   A Novel Weighted Ensemble Technique for
                                  Time Series Forecasting  . . . . . . . . 38--49
              Houssam Salem and   
       Pramuditha Suraweera and   
           Geoffrey I. Webb and   
             Janice R. Boughton   Techniques for Efficient Learning
                                  without Search . . . . . . . . . . . . . 50--61
                  JuiHsi Fu and   
                   SingLing Lee   An Aggressive Margin-Based Algorithm for
                                  Incremental Learning . . . . . . . . . . 62--73
              Tam T. Nguyen and   
                Kuiyu Chang and   
                 Siu Cheung Hui   Two-View Online Learning . . . . . . . . 74--85
                Zhihua Liao and   
                     Zili Zhang   A Generic Classifier-Ensemble Approach
                                  for Biomedical Named Entity Recognition  86--97
   Djamel Abdelkader Zighed and   
            Diala Ezzeddine and   
                    Fabien Rico   Neighborhood Random Classification . . . 98--108
       Katsiaryna Mirylenka and   
      George Giannakopoulos and   
                Themis Palpanas   SRF: a Framework for the Study of
                                  Classifier Behavior under Training Set
                                  Mislabeling Noise  . . . . . . . . . . . 109--121
              T. Ryan Hoens and   
                    Qi Qian and   
           Nitesh V. Chawla and   
                   Zhi-Hua Zhou   Building Decision Trees for the
                                  Multi-class Imbalance Problem  . . . . . 122--134
                 Bingguo Li and   
               Xiaojun Chen and   
             Mark Junjie Li and   
        Joshua Zhexue Huang and   
                Shengzhong Feng   Scalable Random Forests for Massive Data 135--146
                  Baoxun Xu and   
        Joshua Zhexue Huang and   
            Graham Williams and   
             Mark Junjie Li and   
                     Yunming Ye   Hybrid Random Forests: Advantages of
                                  Mixed Trees in Classifying Text Data . . 147--158
                     Bin Fu and   
                Zhihai Wang and   
                   Rong Pan and   
                Guandong Xu and   
                    Peter Dolog   Learning Tree Structure of Label
                                  Dependency for Multi-label Learning  . . 159--170
                 Zhichun Fu and   
                   Jun Zhou and   
             Peter Christen and   
                       Mac Boot   Multiple Instance Learning for Group
                                  Record Linkage . . . . . . . . . . . . . 171--182
            Yasuyuki Shirai and   
               Koji Tsuruma and   
               Yuko Sakurai and   
              Satoshi Oyama and   
               Shin-ichi Minato   Incremental Set Recommendation Based on
                                  Class Differences  . . . . . . . . . . . 183--194
                    Yue Liu and   
                    Lin Dai and   
                Weitao Zhou and   
                    Heyan Huang   Active Learning for Cross Language Text
                                  Categorization . . . . . . . . . . . . . 195--206
                   Han Xiao and   
              Thomas Stibor and   
                 Claudia Eckert   Evasion Attack of Multi-class Linear
                                  Classifiers  . . . . . . . . . . . . . . 207--218
                   Da Kuang and   
            Charles X. Ling and   
                         Jun Du   Foundation of Mining Class-Imbalanced
                                  Data . . . . . . . . . . . . . . . . . . 219--230
               Eileen A. Ni and   
                Charles X. Ling   Active Learning with $c$-Certainty . . . 231--242
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7302, 2012

            Hai-Long Nguyen and   
             Yew-Kwong Woon and   
               Wee-Keong Ng and   
                         Li Wan   Heterogeneous Ensemble for Feature
                                  Drifts in Data Streams . . . . . . . . . 1--12
               Hanen Brahmi and   
                Imen Brahmi and   
                Sadok Ben Yahia   OMC-IDS: At the Cross-Roads of OLAP
                                  Mining and Intrusion Detection . . . . . 13--24
                 Jierui Xie and   
          Boleslaw K. Szymanski   Towards Linear Time Overlapping
                                  Community Detection in Social Networks   25--36
               Yun Sing Koh and   
               Russel Pears and   
                 Gillian Dobbie   WeightTransmitter: Weighted Association
                                  Rule Mining Using Landmark Weights . . . 37--48
                Daiki Inaba and   
             Ken-ichi Fukui and   
              Kazuhisa Sato and   
        Junichirou Mizusaki and   
                 Masayuki Numao   Co-occurring Cluster Mining for Damage
                                  Patterns Analysis of a Fuel Cell . . . . 49--60
             Souad Bouasker and   
             Tarek Hamrouni and   
                Sadok Ben Yahia   New Exact Concise Representation of Rare
                                  Correlated Patterns: Application to
                                  Intrusion Detection  . . . . . . . . . . 61--72
                    Rong Lu and   
                 Zhiheng Xu and   
                 Yang Zhang and   
                      Qing Yang   Life Activity Modeling of News Event on
                                  Twitter Using Energy Function  . . . . . 73--84
               Leman Akoglu and   
    Pedro O. S. Vaz de Melo and   
             Christos Faloutsos   Quantifying Reciprocity in Large
                                  Weighted Communication Networks  . . . . 85--96
                    Rui Yan and   
                    Zi Yuan and   
                Xiaojun Wan and   
                  Yan Zhang and   
                    Xiaoming Li   Hierarchical Graph Summarization:
                                  Leveraging Hybrid Information through
                                  Visible and Invisible Linkage  . . . . . 97--108
               Bingyue Peng and   
                Yujing Wang and   
                   Jian-Tao Sun   Mining Mobile Users' Activities Based on
                                  Search Query Text and Context  . . . . . 109--120
            Arpan Chaudhury and   
       Partha Basuchowdhuri and   
             Subhashis Majumder   Spread of Information in a Social
                                  Network Using Influential Nodes  . . . . 121--132
        P. Gowtham Srinivas and   
           P. Krishna Reddy and   
                 S. Bhargav and   
              R. Uday Kiran and   
              D. Satheesh Kumar   Discovering Coverage Patterns for Banner
                                  Advertisement Placement  . . . . . . . . 133--144
             Juang-Lin Duan and   
              Shashi Prasad and   
                  Jen-Wei Huang   Discovering Unknown But Interesting
                                  Items on Personal Social Network . . . . 145--156
       Hugo Alatrista Salas and   
             Sandra Bringay and   
Frédéric Flouvat and   
         Nazha Selmaoui-Folcher   The Pattern Next Door: Towards
                                  Spatio-sequential Pattern Discovery  . . 157--168
         Takazumi Matsumoto and   
                    Edward Hung   Accelerating Outlier Detection with
                                  Uncertain Data Using Graphics Processors 169--180
      Pierre-Nicolas Mougel and   
         Christophe Rigotti and   
             Olivier Gandrillon   Finding Collections of $k$-Clique
                                  Percolated Components in Attributed
                                  Graphs . . . . . . . . . . . . . . . . . 181--192
               Xiongcai Cai and   
               Michael Bain and   
           Alfred Krzywicki and   
               Wayne Wobcke and   
               Yang Sok Kim and   
                   Paul Compton   Reciprocal and Heterogeneous Link
                                  Prediction in Social Networks  . . . . . 193--204
                    Kai Liu and   
          William K. Cheung and   
                     Jiming Liu   Detecting Multiple Stochastic Network
                                  Motifs in Network Data . . . . . . . . . 205--217
              Alice Marascu and   
           Suleiman A. Khan and   
                Themis Palpanas   Scalable Similarity Matching in
                                  Streaming Time Series  . . . . . . . . . 218--230
            Chiraz Trabelsi and   
              Nader Jelassi and   
                Sadok Ben Yahia   Scalable Mining of Frequent Tri-concepts
                                  from Folksonomies  . . . . . . . . . . . 231--242
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7303, 2012

             Bertrand Meyer and   
        Alexander Kogtenkov and   
                     Anton Akhi   Processors and Their Collection  . . . . 1--15
               Lionel C. Briand   Tackling the Testing and Verification of
                                  Multicore and Concurrent Software as a
                                  Search Problem . . . . . . . . . . . . . 16--17
      Constantin Christmann and   
               Erik Hebisch and   
              Anette Weisbecker   Oversubscription of Computational
                                  Resources on Multicore Desktop Systems   18--29
         Martin Schindewolf and   
                  Wolfgang Karl   Capturing Transactional Memory
                                  Application's Behavior --- The
                                  Prerequisite for Performance Analysis    30--41
                 Jan Waller and   
            Wilhelm Hasselbring   A Comparison of the Influence of
                                  Different Multi-core Processors on the
                                  Runtime Overhead for Application-Level
                                  Monitoring . . . . . . . . . . . . . . . 42--53
           Ronald Strebelow and   
             Christian Prehofer   Analysis of Event Processing Design
                                  Patterns and Their Performance
                                  Dependency on I/O Notification
                                  Mechanisms . . . . . . . . . . . . . . . 54--65
      Jan H. Schönherr and   
                Bianca Lutz and   
                   Jan Richling   Non-intrusive Coscheduling for General
                                  Purpose Operating Systems  . . . . . . . 66--77
       Korbinian Molitorisz and   
            Jochen Schimmel and   
                     Frank Otto   Automatic Parallelization Using
                                  AutoFutures  . . . . . . . . . . . . . . 78--81
           Andreas Hollmann and   
                 Michael Gerndt   Invasive Computing: An Application
                                  Assisted Resource Management Approach    82--85
          Gábor Imre and   
                  Gergely Mezei   Parallel Graph Transformations on
                                  Multicore Systems  . . . . . . . . . . . 86--89
                  Georg Gut and   
          Christian Allmann and   
            Markus Schurius and   
                Karsten Schmidt   Reduction of Electronic Control Units in
                                  Electric Vehicles Using Multicore
                                  Technology . . . . . . . . . . . . . . . 90--93
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7304, 2012

      Gábor Bergmann and   
   Ábel Hegedüs and   
     Ákos Horváth   Integrating Efficient Model Queries in
                                  State-of-the-Art EMF Tools . . . . . . . 1--8
Néstor Cataño and   
              Sorren Hanvey and   
                   Camilo Rueda   Poporo: a Formal Methods Tool for
                                  Fast-Checking of Social Network Privacy
                                  Policies . . . . . . . . . . . . . . . . 9--16
                Luis Corral and   
           Alberto Sillitti and   
                Giancarlo Succi   DroidSense: a Mobile Tool to Analyze
                                  Software Development Processes by
                                  Measuring Team Proximity . . . . . . . . 17--33
            Julien DeAntoni and   
  Frédéric Mallet   TimeSquare: Treat Your Models with
                                  Logical Time . . . . . . . . . . . . . . 34--41
          Anna Derezi\'nska and   
                  Marcin Rudnik   Quality Evaluation of Object-Oriented
                                  and Standard Mutation Operators Applied
                                  to C# Programs . . . . . . . . . . . . . 42--57
           Jean-Marie Favre and   
           Ralf Lämmel and   
              Thomas Schmorleiz   101companies: a Community Project on
                                  Software Technologies and Software
                                  Languages  . . . . . . . . . . . . . . . 58--74
        Francesco Fiamberti and   
                Daniela Micucci   An Object-Oriented Application Framework
                                  for the Development of Real-Time Systems 75--90
           Michaela Greiler and   
           Arie van Deursen and   
                   Andy Zaidman   Measuring Test Case Similarity to
                                  Support Test Suite Understanding . . . . 91--107
              Kamil Je\vzek and   
               Premek Brada and   
     Luká\vs Holý   Enhancing OSGi with Explicit, Vendor
                                  Independent Extra-Functional Properties  108--123
           Jan Vraný and   
                 Jan Kur\vs and   
                Claus Gittinger   Efficient Method Lookup Customization
                                  for Smalltalk  . . . . . . . . . . . . . 124--139
               Daniel Langr and   
        Pavel Tvrdík and   
         Tomá\vs Dytrych   Fake Run-Time Selection of Template
                                  Arguments in C++ . . . . . . . . . . . . 140--154
               Yannis Lilis and   
                Anthony Savidis   Supporting Compile-Time Debugging and
                                  Precise Error Reporting in Meta-programs 155--170
                Stefan Marr and   
                   Theo D'Hondt   Identifying a Unifying Mechanism for the
                                  Implementation of Concurrency
                                  Abstractions on Multi-language Virtual
                                  Machines . . . . . . . . . . . . . . . . 171--186
             Hannes Mehnert and   
               Jonathan Aldrich   Verification of Snapshotable Trees Using
                                  Access Permissions and Typestate . . . . 187--201
                Nicholas Ng and   
             Nobuko Yoshida and   
                    Kohei Honda   Multiparty Session C: Safe Parallel
                                  Programming with Message Optimisation    202--218
        Martín Ochoa and   
           Jan Jürjens and   
           Jorge Cuéllar   Non-interference on UML State-Charts . . 219--235
               Mark J. Olah and   
                 David Mohr and   
               Darko Stefanovic   Representing Uniqueness Constraints in
                                  Object-Relational Mapping  . . . . . . . 236--251
             Andrzej Olszak and   
                   Eric Bouwers   Detection of Seed Methods for
                                  Quantification of Feature Confinement    252--268
             Mathias Soeken and   
               Robert Wille and   
                 Rolf Drechsler   Assisted Behavior Driven Development
                                  Using Natural Language Processing  . . . 269--287
                  Ashish Sureka   Learning to Classify Bug Reports into
                                  Components . . . . . . . . . . . . . . . 288--303
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7305, 2012

              Andreas Kuehlmann   The Technology and Psychology of Testing
                                  Your Code as You Develop It  . . . . . . 1--1
        Corina S. P\uas\uareanu   Combining Model Checking and Symbolic
                                  Execution for Software Testing . . . . . 2--2
         Alessandro Armando and   
       Giancarlo Pellegrino and   
            Roberto Carbone and   
                  Alessio Merlo   From Model-Checking to Automated Testing
                                  of Security Protocols: Bridging the Gap  3--18
           Valeria Bengolea and   
           Nazareno Aguirre and   
              Darko Marinov and   
               Marcelo F. Frias   Using Coverage Criteria on RepOK to
                                  Reduce Bounded-Exhaustive Test Suites    19--34
           Matthieu Carlier and   
           Catherine Dubois and   
                 Arnaud Gotlieb   A First Step in the Design of a Formally
                                  Verified Constraint-Based Testing Tool:
                                  FocalTest  . . . . . . . . . . . . . . . 35--50
           Joseph R. Kiniry and   
        Daniel M. Zimmerman and   
                   Ralph Hyland   Testing Library Specifications by
                                  Verifying Conformance Tests  . . . . . . 51--66
               Malte Lochau and   
               Ina Schaefer and   
           Jochen Kamischke and   
                    Sascha Lity   Incremental Model-Based Testing of
                                  Delta-Oriented Software Product Lines    67--82
Hernán Ponce de León and   
                Stefan Haar and   
               Delphine Longuet   Conformance Relations for Labeled Event
                                  Structures . . . . . . . . . . . . . . . 83--98
Sébastien Chédor and   
       Thierry Jéron and   
              Christophe Morvan   Test Generation from Recursive Tiles
                                  Systems  . . . . . . . . . . . . . . . . 99--114
              Valerio Senni and   
               Fabio Fioravanti   Generation of Test Data Structures Using
                                  Constraint Logic Programming . . . . . . 115--131
            Martin Sulzmann and   
                   Axel Zechner   Constructive Finite Trace Analysis with
                                  Linear Temporal Logic  . . . . . . . . . 132--148
               Petra Brosch and   
                   Uwe Egly and   
         Sebastian Gabmeyer and   
               Gerti Kappel and   
              Martina Seidl and   
                   Hans Tompits   Towards Scenario-Based Testing of UML
                                  Diagrams . . . . . . . . . . . . . . . . 149--155
          Jens Brüning and   
             Martin Gogolla and   
                Lars Hamann and   
                 Mirco Kuhlmann   Evaluating and Debugging OCL Expressions
                                  in UML Models  . . . . . . . . . . . . . 156--162
             Nadia Creignou and   
                   Uwe Egly and   
                  Martina Seidl   A Framework for the Specification of
                                  Random SAT and QSAT Formulas . . . . . . 163--168
           Nikolai Kosmatov and   
             Nicky Williams and   
            Bernard Botella and   
               Muriel Roger and   
                   Omar Chebaro   A Lesson on Structural Testing with \tt
                                  PathCrawler-online.com . . . . . . . . . 169--175
           Nikolai Kosmatov and   
                 Nicky Williams   Tutorial on Automated Structural Testing
                                  with PathCrawler . . . . . . . . . . . . 176--176
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7306, 2012

               Marius Bozga and   
              Mohamad Jaber and   
             Nikolaos Maris and   
                 Joseph Sifakis   Modeling Dynamic Architectures Using
                                  Dy-BIP . . . . . . . . . . . . . . . . . 1--16
                    Paul Istoan   Defining Composition Operators for BPMN  17--34
              Arnaud Lanoix and   
          Olga Kouchnarenko and   
               Samuel Colin and   
               Vincent Poirriez   Relaxing B Sharing Restrictions within
                                  CSP||B . . . . . . . . . . . . . . . . . 35--50
           Mauro Caporuscio and   
               Marco Funaro and   
                   Carlo Ghezzi   \sc PaCE: a Data-Flow Coordination
                                  Language for Asynchronous Network-Based
                                  Applications . . . . . . . . . . . . . . 51--67
         Antonina Danylenko and   
                 Welf Löwe   Adaptation of Legacy Codes to
                                  Context-Aware Composition Using
                                  Aspect-Oriented Programming  . . . . . . 68--85
            Danilo Ansaloni and   
              Walter Binder and   
         Christoph Bockisch and   
                Eric Bodden and   
                 Kardelen Hatun   Challenges for Refinement and
                                  Composition of Instrumentations:
                                  Position Paper . . . . . . . . . . . . . 86--96
           Stijn Timbermont and   
             Coen De Roover and   
                   Theo D'Hondt   Constructing Customized Interpreters
                                  from Reusable Evaluators Using Game  . . 97--113
      Abdeldjalil Boudjadar and   
         Jean-Paul Bodeveix and   
                  Mamoun Filali   Revising and Extending the Uppaal
                                  Communication Mechanism  . . . . . . . . 114--131
     Syed Muhammad Ali Shah and   
              Jens Dietrich and   
             Catherine McCartin   On the Automated Modularisation of Java
                                  Programs Using Service Locators  . . . . 132--147
              Marc Hesenius and   
 Carlos Dario Orozco Medina and   
             Dominikus Herzberg   Touching Factor: Software Development on
                                  Tablets  . . . . . . . . . . . . . . . . 148--161
                 Walter Cazzola   Domain-Specific Languages in Few Steps   162--177
             Nicola Boffoli and   
             Danilo Caivano and   
       Daniela Castelluccia and   
              Giuseppe Visaggio   Business Process Lines and Decision
                                  Tables Driving Flexibility by Selection  178--193
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7307, 2012

       James F. Terwilliger and   
              Anthony Cleve and   
                Carlo A. Curino   How Clean Is Your Sandbox? . . . . . . . 1--23
                  Sagar Sen and   
           Jean-Marie Mottu and   
               Massimo Tisi and   
                    Jordi Cabot   Using Models of Partial Knowledge to
                                  Test Model Transformations . . . . . . . 24--39
                  Esther Guerra   Specification-Driven Test Generation for
                                  Model Transformations  . . . . . . . . . 40--55
         Antonio Vallecillo and   
                 Martin Gogolla   Typing Model Transformations Using
                                  Tracts . . . . . . . . . . . . . . . . . 56--71
              Suzana Andova and   
   Mark G. J. van den Brand and   
                    Luc Engelen   Reusable and Correct Endogenous Model
                                  Transformations  . . . . . . . . . . . . 72--88
               Hugo Pacheco and   
                   Alcino Cunha   Multifocal: a Strategic Bidirectional
                                  Transformation Language for XML Schemas  89--104
        Jácome Cunha and   
   João P. Fernandes and   
               Jorge Mendes and   
               Hugo Pacheco and   
            João Saraiva   Bidirectional Transformation of
                                  Model-Driven Spreadsheets  . . . . . . . 105--120
         Jeroen van den Bos and   
             Tijs van der Storm   Domain-Specific Optimization in Digital
                                  Forensics  . . . . . . . . . . . . . . . 121--136
María Fernández-Ropero and   
Ricardo Pérez-Castillo and   
              Barbara Weber and   
                 Mario Piattini   Empirical Assessment of Business Model
                                  Transformations Based on Model
                                  Simulation . . . . . . . . . . . . . . . 137--151
       Marcel F. van Amstel and   
   Mark G. J. van den Brand and   
           Alexander Serebrenik   Traceability Visualization in Model
                                  Transformations with TraceVis  . . . . . 152--159
                Lars George and   
                 Arif Wider and   
               Markus Scheidgen   Type-Safe Model Transformation Languages
                                  as Internal DSLs in Scala  . . . . . . . 160--175
Jesús Sánchez Cuadrado   Towards a Family of Model Transformation
                                  Languages  . . . . . . . . . . . . . . . 176--191
            Dennis Wagelaar and   
            Ludovico Iovino and   
           Davide Di Ruscio and   
            Alfonso Pierantonio   Translational Semantics of a
                                  Co-evolution Specific Language with the
                                  EMF Transformation Virtual Machine . . . 192--207
             Colin Atkinson and   
               Ralph Gerbig and   
               Christian Tunjic   Towards Multi-level Aware Model
                                  Transformations  . . . . . . . . . . . . 208--223
       Gergely Varró and   
         Frederik Deckwerth and   
              Martin Wieber and   
               Andy Schürr   An Algorithm for Generating
                                  Model-Sensitive Search Plans for EMF
                                  Models . . . . . . . . . . . . . . . . . 224--239
Baltasar Trancón y Widemann and   
                  Markus Lepper   Paisley: Pattern Matching \`a la Carte   240--247
             Andreas Demuth and   
  Roberto E. Lopez-Herrejon and   
                Alexander Egyed   Constraint-Driven Modeling through
                                  Transformation . . . . . . . . . . . . . 248--263
              Piotr Kosiuczenko   The Impact of Class Model Redesign on
                                  State Machines . . . . . . . . . . . . . 264--279
              Manuel Wimmer and   
               Gerti Kappel and   
             Angelika Kusel and   
      Werner Retschitzegger and   
   Johannes Schönböck   Fact or Fiction --- Reuse in Rule-Based
                                  Model-to-Model Transformation Languages  280--295
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7308, 2012

             Marco Panunzio and   
               Tullio Vardanega   Ada Ravenscar Code Archetypes for
                                  Component-Based Development  . . . . . . 1--17
         Sergio Sáez and   
                 Jorge Real and   
                  Alfons Crespo   An Integrated Framework for
                                  Multiprocessor, Multimoded Real-Time
                                  Applications . . . . . . . . . . . . . . 18--34
Marisol García-Valls and   
Felipe Ibáñez-Vázquez   Integrating Middleware for Timely
                                  Reconfiguration of Distributed Soft
                                  Real-Time Systems with Ada DSA . . . . . 35--48
        José F. Ruiz and   
              Cyrille Comar and   
                    Yannick Moy   Source Code as the Key Artifact in
                                  Requirement-Based Development: The Case
                                  of Ada 2012  . . . . . . . . . . . . . . 49--59
            Theodor Tempelmeier   Teaching `Concepts of Programming
                                  Languages' with Ada  . . . . . . . . . . 60--74
           Christian Forler and   
               Stefan Lucks and   
                   Jakob Wenzel   Designing the API for a Cryptographic
                                  Library  . . . . . . . . . . . . . . . . 75--88
Patricia López Martínez and   
               Tullio Vardanega   Handling Synchronization Requirements
                                  under Separation of Concerns in
                                  Model-Driven Component-Based Development 89--104
   José Miguel Faria and   
        João Martins and   
              Jorge Sousa Pinto   An Approach to Model Checking Ada
                                  Programs . . . . . . . . . . . . . . . . 105--118
             Andrew Edmunds and   
       Abdolbaghi Rezazadeh and   
                 Michael Butler   Formal Modelling for Ada
                                  Implementations: Tasking Event-B . . . . 119--132
                 Alexei Iliasov   Augmenting Formal Development with Use
                                  Case Reasoning . . . . . . . . . . . . . 133--146
           Inna Pereverzeva and   
          Elena Troubitsyna and   
                 Linas Laibinis   Formal Goal-Oriented Development of
                                  Resilient MAS in Event-B . . . . . . . . 147--161
               Pak-Lok Poon and   
            Tsong Yueh Chen and   
                      T. H. Tse   Choices, Choices: Comparing between
                                  CHOC'LATE and the Classification-Tree
                                  Methodology  . . . . . . . . . . . . . . 162--176
Kristoffer Nyborg Gregertsen and   
                 Amund Skavhaug   Improving the Performance of Execution
                                  Time Control by Using a Hardware Time
                                  Management Unit  . . . . . . . . . . . . 177--192
       Mark Louis Fairbairn and   
                     Alan Burns   Implementing and Verifying EDF
                                  Preemption-Level Resource Control  . . . 193--206
    Florian Pölzlbauer and   
                  Iain Bate and   
                  Eugen Brenner   Efficient Constraint Handling during
                                  Designing Reliable Automotive Real-Time
                                  Systems  . . . . . . . . . . . . . . . . 207--220
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7309, 2012

                   Lo\"\ic Mazo   A Framework for Label Images . . . . . . 1--10
               Rafael Ayala and   
Desamparados Fernández-Ternero   Perfect Discrete Morse Functions on
                                  Triangulated 3-Manifolds . . . . . . . . 11--19
          Guillaume Damiand and   
            Rocio Gonzalez-Diaz   Removal Operations in $n$ D Generalized
                                  Maps for Efficient Homology Computation  20--29
            Erald Vuçini   Enhancing the Reconstruction from
                                  Non-uniform Point Sets Using Persistence
                                  Information  . . . . . . . . . . . . . . 30--38
Francisco Peña-Cantillana and   
                Ainhoa Berciano   Parallel Skeletonizing of Digital Images
                                  by Using Cellular Automata . . . . . . . 39--48
      Jónathan Heras and   
      Maxime Dén\`es and   
                     Gadea Mata   Towards a Certified Computation of
                                  Homology Groups for Digital Images . . . 49--57
                Ana Pacheco and   
                     Pedro Real   An Efficient Algorithm to Compute
                                  Subsets of Points in $\mathbb{Z}$$^{n}$  58--67
              Hubert Wagner and   
             Pawe\l D\lotko and   
                  Marian Mrozek   Computational Topology in Text Mining    68--78
  Mohammed Mostefa Mesmoudi and   
              Leila De Floriani   Concentrated Curvature for Mean
                                  Curvature Estimation in Triangulated
                                  Surfaces . . . . . . . . . . . . . . . . 79--87
           Carmen Escribano and   
                Antonio Giraldo   Deletion of (26,6)-Simple Points as
                                  Multivalued Retractions  . . . . . . . . 88--97
           Lidija \vComi\'c and   
              Leila De Floriani   Topological Operators on Cell Complexes
                                  in Arbitrary Dimensions  . . . . . . . . 98--107
             Javier Carnero and   
        Helena Molina-Abril and   
                     Pedro Real   Triangle Mesh Compression and
                                  Homological Spanning Forests . . . . . . 108--116
              Piotr Brendel and   
             Pawe\l D\lotko and   
                  Marian Mrozek   Homology Computations via Acyclic
                                  Subspace . . . . . . . . . . . . . . . . 117--127
               Andrea Cerri and   
           Barbara Di Fabio and   
                  Filippo Medri   Multi-scale Approximation of the
                                  Matching Distance for Shape Retrieval    128--138
          Antonio Gutierrez and   
                 David Monaghan   Persistent Homology for $3$D
                                  Reconstruction Evaluation  . . . . . . . 139--147
         Francesca Cagliari and   
                  Massimo Ferri   Persistence Modules, Shape Description,
                                  and Completeness . . . . . . . . . . . . 148--156
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7310, 2012

               Aysha Akther and   
              Heung-Nam Kim and   
            Majdi Rawashdeh and   
         Abdulmotaleb El Saddik   Applying Latent Semantic Analysis to
                                  Tag-Based Community Recommendations  . . 1--12
           Maher Alhossaini and   
            J. Christopher Beck   Macro Learning in Planning as Parameter
                                  Configuration  . . . . . . . . . . . . . 13--24
       Mohammad Ali Bagheri and   
                 Qigang Gao and   
                Sergio Escalera   Efficient Pairwise Classification Using
                                  Local Cross Off Strategy . . . . . . . . 25--36
           Victoria Bobicev and   
            Marina Sokolova and   
               Yasser Jafer and   
                  David Schramm   Learning Sentiments from Tweets with
                                  Personal Health Information  . . . . . . 37--48
                Dave Carter and   
                   Diana Inkpen   Searching for Poor Quality Machine
                                  Translated Text: Learning the Difference
                                  between Human Writing and Machine
                                  Translations . . . . . . . . . . . . . . 49--60
    Philippe Fournier-Viger and   
               Cheng-Wei Wu and   
               Vincent S. Tseng   Mining Top-K Association Rules . . . . . 61--73
               Yuanyuan Guo and   
                Harry Zhang and   
                  Bruce Spencer   Cost-Sensitive Self-Training . . . . . . 74--84
             Federico Heras and   
            Antonio Morgado and   
             Joao Marques-Silva   An Empirical Study of Encodings for
                                  Group MaxSAT . . . . . . . . . . . . . . 85--96
                   Aaron Hunter   Actions, Preferences, and Logic Programs 97--108
                 Farah Juma and   
                Eric I. Hsu and   
            Sheila A. McIlraith   Preference-Based Planning via MaxSAT . . 109--120
           Alistair Kennedy and   
            Anna Kazantseva and   
               Diana Inkpen and   
                Stan Szpakowicz   Getting Emotional about News
                                  Summarization  . . . . . . . . . . . . . 121--132
             Fouzia Mousumi and   
                    Kevin Grant   Exploiting the Probability of
                                  Observation for Efficient Bayesian
                                  Network Inference  . . . . . . . . . . . 133--144
             Zeinab Noorian and   
              Mahdi Noorian and   
            Michael Fleming and   
                  Stephen Marsh   A Strategic Reputation-Based Mechanism
                                  for Mobile Ad Hoc Networks . . . . . . . 145--157
          Baskaran Sankaran and   
              Majid Razmara and   
           Atefeh Farzindar and   
               Wael Khreich and   
                  Fred Popowich   Domain Adaptation Techniques for Machine
                                  Translation and Their Evaluation in a
                                  Real-World Setting . . . . . . . . . . . 158--169
                  Hang Shao and   
             Nathalie Japkowicz   Applying Least Angle Regression to ELM   170--180
              Shiven Sharma and   
            Colin Bellinger and   
             Nathalie Japkowicz   Clustering Based One-Class
                                  Classification for Compliance
                                  Verification of the Comprehensive
                                  Nuclear-Test-Ban Treaty  . . . . . . . . 181--193
           Daniel L. Silver and   
                  Liangliang Tu   Image Morphing: Transfer Learning
                                  between Tasks That Have Multiple Outputs 194--205
                       Xing Tan   A Formal Study on the Dualities in
                                  Temporal Projection Problems . . . . . . 206--217
       Craig D. S. Thompson and   
              Michael C. Horsch   Predicting Good Propagation Methods for
                                  Constraint Satisfaction  . . . . . . . . 218--229
           Jacek Wo\lkowicz and   
                 Vlado Ke\vselj   Analysis of Important Factors for
                                  Measuring Similarity of Symbolic Music
                                  Using $n$-gram-Based, Bag-of-Words
                                  Approach . . . . . . . . . . . . . . . . 230--241
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7311, 2012

             Piero P. Bonissone   Lazy Meta-Learning: Creating Customized
                                  Model Ensembles on Demand  . . . . . . . 1--23
         Risto Miikkulainen and   
             Eliana Feasley and   
                   Leif Johnson   Multiagent Learning through
                                  Neuroevolution . . . . . . . . . . . . . 24--46
                    Lloyd Watts   Reverse-Engineering the Human Auditory
                                  Pathway  . . . . . . . . . . . . . . . . 47--59
                        Xin Yao   Unpacking and Understanding Evolutionary
                                  Algorithms . . . . . . . . . . . . . . . 60--76
             Daniel Ashlock and   
         Cameron McGuinness and   
                  Wendy Ashlock   Representation in Evolutionary
                                  Computation  . . . . . . . . . . . . . . 77--97
           Zbigniew Michalewicz   Quo Vadis, Evolutionary Computation? . . 98--121
               Vui Ann Shim and   
                   Kay Chen Tan   Probabilistic Graphical Approaches for
                                  Learning, Modeling, and Sampling in
                                  Evolutionary Multi-objective
                                  Optimization . . . . . . . . . . . . . . 122--144
               Bernard De Baets   The Quest for Transitivity, a Showcase
                                  of Fuzzy Relational Calculus . . . . . . 145--165
                    Maria Rifqi   Cognition-Inspired Fuzzy Modelling . . . 166--184
                   Kazuo Tanaka   A Unified Fuzzy Model-Based Framework
                                  for Modeling and Control of Complex
                                  Systems: From Flying Vehicle Control to
                                  Brain-Machine Cooperative Control  . . . 185--208
            Vladimir Cherkassky   Predictive Learning, Knowledge Discovery
                                  and Philosophy of Science  . . . . . . . 209--233
                 Nikola Kasabov   Evolving Spiking Neural Networks and
                                  Neurogenetic Systems for Spatio- and
                                  Spectro-Temporal Data Modelling and
                                  Pattern Recognition  . . . . . . . . . . 234--260
               Chenhui Yang and   
                Hongwei Mao and   
                  Yuan Yuan and   
                     Bing Cheng   Uncovering the Neural Code Using a Rat
                                  Model during a Learning Control Task . . 261--279
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7312, 2012

              Kshitij Mehta and   
              Edgar Gabriel and   
                Barbara Chapman   Specification and Performance Evaluation
                                  of Parallel I/O Interfaces for OpenMP    1--14
  Alexandre E. Eichenberger and   
         Christian Terboven and   
               Michael Wong and   
                  Dieter an Mey   The Design of OpenMP Thread Affinity . . 15--28
               Sara Royuela and   
            Alejandro Duran and   
               Chunhua Liao and   
              Daniel J. Quinlan   Auto-scoping for OpenMP Tasks  . . . . . 29--43
            Barna L. Bihari and   
               Michael Wong and   
                   Amy Wang and   
      Bronis R. de Supinski and   
                      Wang Chen   A Case for Including Transactions in
                                  OpenMP II: Hardware Transactional Memory 44--58
              Michael Klemm and   
            Alejandro Duran and   
                Xinmin Tian and   
               Hideki Saito and   
                Diego Caballero   Extending OpenMP* with Vector Constructs
                                  for Modern Multicore SIMD Architectures  59--72
              Oussama Tahan and   
              Mats Brorsson and   
                 Mohamed Shawky   Introducing Task Cancellation to OpenMP  73--87
               Peter Thoman and   
             Herbert Jordan and   
          Simone Pellegrini and   
               Thomas Fahringer   Automatic OpenMP Loop Scheduling: a
                                  Combined Compiler and Runtime Approach   88--101
  François Broquedis and   
            Thierry Gautier and   
                Vincent Danjean   libOMP, an Efficient OpenMP Runtime
                                  System for Both Fork-Join and Data Flow
                                  Paradigms  . . . . . . . . . . . . . . . 102--115
                    Li Chen and   
              Baojiang Shou and   
               Xionghui Hou and   
                      Lei Huang   A Compiler-Assisted Runtime-Prefetching
                                  Scheme for Heterogeneous Platforms . . . 116--129
                  Larry Meadows   Experiments with WRF on Intel\reg Many
                                  Integrated Core (Intel MIC) Architecture 130--139
             Hongzhang Shan and   
           Erich Strohmaier and   
             James Amundson and   
                  Eric G. Stern   Optimizing the Advanced Accelerator
                                  Simulation Framework Synergia Using
                                  OpenMP . . . . . . . . . . . . . . . . . 140--153
               Haoqiang Jin and   
               Mark Kellogg and   
                Piyush Mehrotra   Using Compiler Directives for
                                  Accelerating CFD Applications on GPUs    154--168
                 Amit Sabne and   
           Putt Sakdhnagool and   
               Rudolf Eigenmann   Effects of Compiler Optimizations in
                                  OpenMP to CUDA Translation . . . . . . . 169--181
         Christian Terboven and   
               Dirk Schmidl and   
                 Tim Cramer and   
                  Dieter an Mey   Assessing OpenMP Tasking Implementations
                                  on NUMA Architectures  . . . . . . . . . 182--195
               Dirk Schmidl and   
            Peter Philippen and   
              Daniel Lorenz and   
      Christian Rössel and   
                  Markus Geimer   Performance Analysis Techniques for
                                  Task-Based OpenMP Applications . . . . . 196--209
          Spiros N. Agathos and   
  Panagiotis E. Hadjidoukas and   
      Vassilios V. Dimakopoulos   Task-Based Execution of Nested OpenMP
                                  Loops  . . . . . . . . . . . . . . . . . 210--222
    Matthias S. Müller and   
                 John Baron and   
        William C. Brantley and   
                 Huiyu Feng and   
              Daniel Hackenberg   SPEC OMP2012--- An Application Benchmark
                                  Suite for Parallel Systems Using OpenMP  223--236
                 Cheng Wang and   
      Sunita Chandrasekaran and   
                Barbara Chapman   An OpenMP 3.1 Validation Testsuite . . . 237--249
            Francesca Perla and   
                  Paolo Zanetti   Performance Analysis of an Hybrid
                                  MPI/OpenMP ALM Software for Life
                                  Insurance Policies on Multi-core
                                  Architectures  . . . . . . . . . . . . . 250--253
      Aur\`ele Mahéo and   
            Souad Kolia\"\i and   
         Patrick Carribault and   
        Marc Pérache and   
                  William Jalby   Adaptive OpenMP for Large NUMA Nodes . . 254--257
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7313, 2012

                 Martin Odersky   When Compilers Are Mirrors . . . . . . . 1--1
    Bruno C. d. S. Oliveira and   
                William R. Cook   Extensibility for the Masses . . . . . . 2--27
              Romain Robbes and   
   David Röthlisberger and   
             Éric Tanter   Extensions during Software Evolution: Do
                                  Objects Meet Their Promise?  . . . . . . 28--52
      Christoph Reichenbach and   
         Yannis Smaragdakis and   
                  Neil Immerman   PQL: a Purely-Declarative Java Extension
                                  for Parallel Programming . . . . . . . . 53--78
                Stas Negara and   
            Mohsen Vakilian and   
              Nicholas Chen and   
           Ralph E. Johnson and   
                      Danny Dig   Is It Dangerous to Use Version Control
                                  Histories to Study Source Code
                                  Evolution? . . . . . . . . . . . . . . . 79--103
    Floréal Morandat and   
               Brandon Hill and   
                 Leo Osvald and   
                      Jan Vitek   Evaluating the Design of the R Language  104--131
              Jesse Doherty and   
                 Laurie Hendren   McSAF: a Static Analysis Framework for
                                  MATLAB . . . . . . . . . . . . . . . . . 132--155
         Johan Östlund and   
                Tobias Wrigstad   Multiple Aggregate Entry Points for
                                  Ownership Types  . . . . . . . . . . . . 156--180
                  Wei Huang and   
               Werner Dietl and   
               Ana Milanova and   
               Michael D. Ernst   Inference and Checking of Object
                                  Ownership  . . . . . . . . . . . . . . . 181--206
                 Yoav Zibin and   
           David Cunningham and   
             Igor Peshansky and   
                 Vijay Saraswat   Object Initialization in X10 . . . . . . 207--231
                Tobias Wrigstad   Structured Aliasing  . . . . . . . . . . 232--232
              Gavin Bierman and   
              Claudio Russo and   
          Geoffrey Mainland and   
                Erik Meijer and   
                 Mads Torgersen   Pause 'n' Play: Formalizing Asynchronous
                                  C$^\sharp$ . . . . . . . . . . . . . . . 233--257
                 Lukas Rytz and   
             Martin Odersky and   
                 Philipp Haller   Lightweight Polymorphic Effects  . . . . 258--282
       Sebastian Burckhardt and   
      Manuel Fähndrich and   
                Daan Leijen and   
               Benjamin P. Wood   Cloud Types for Eventual Consistency . . 283--307
               Khilan Gudka and   
                 Tim Harris and   
                Susan Eisenbach   Lock Inference in the Presence of Large
                                  Libraries  . . . . . . . . . . . . . . . 308--332
              Rezwana Karim and   
               Mohan Dhawan and   
            Vinod Ganapathy and   
               Chung-chieh Shan   An Analysis of the Mozilla Jetpack
                                  Extension Framework  . . . . . . . . . . 333--355
                 Joseph Gil and   
                  Yuval Shimron   Smaller Footprint for Java Collections   356--382
               Mohan Dhawan and   
           Chung-chieh Shan and   
                Vinod Ganapathy   Enhancing JavaScript with Transactions   383--408
       Grzegorz Kossakowski and   
                  Nada Amin and   
                Tiark Rompf and   
                 Martin Odersky   JavaScript as an Embedded DSL  . . . . . 409--434
             Manu Sridharan and   
               Julian Dolby and   
             Satish Chandra and   
           Max Schäfer and   
                      Frank Tip   Correlation Tracking for Points-To
                                  Analysis of JavaScript . . . . . . . . . 435--458
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7314, 2012

               Chesoong Kim and   
                Olga Dudina and   
            Alexander Dudin and   
                   Sergey Dudin   Queueing System MAP /M /N as a Model of
                                  Call Center with Call-Back Option  . . . 1--15
             Tuan Phung-Duc and   
                 Wouter Rogiest   Two Way Communication Retrial Queues
                                  with Balanced Call Blending  . . . . . . 16--31
             Herwig Bruneel and   
               Tom Maertens and   
              Bart Steyaert and   
              Dieter Claeys and   
                   Dieter Fiems   Analysis of a Two-Class FCFS Queueing
                                  System with Interclass Correlation . . . 32--46
              Wojciech M. Kempa   The Virtual Waiting Time in a
                                  Finite-Buffer Queue with a Single
                                  Vacation Policy  . . . . . . . . . . . . 47--60
               Zsolt Saffer and   
             Sergey Andreev and   
            Yevgeni Koucheryavy   Analysis of Periodically Gated Vacation
                                  Model and Its Application to IEEE 802.16
                                  Network  . . . . . . . . . . . . . . . . 61--75
       Idriss-Ismael Aouled and   
              Hind Castel-Taleb   Combined CAC and Forced Handoff for
                                  Mobile Network Performability  . . . . . 76--90
             Anh Tuan Giang and   
                 Anthony Busson   Modeling CSMA/CA in VANET  . . . . . . . 91--105
             Marco Gribaudo and   
           Pietro Piazzolla and   
               Giuseppe Serazzi   Consolidation and Replication of VMs
                                  Matching Performance Objectives  . . . . 106--120
             Herwig Bruneel and   
           Joris Walraevens and   
              Dieter Claeys and   
            Sabine Wittevrongel   Analysis of a Discrete-Time Queue with
                                  Geometrically Distributed Service
                                  Capacities . . . . . . . . . . . . . . . 121--135
              Ana Bu\vsi\'c and   
               Bruno Gaujal and   
             Florence Perronnin   Perfect Sampling of Networks with Finite
                                  and Infinite Capacity Queues . . . . . . 136--149
           Eline De Cuypere and   
              Koen De Turck and   
                   Dieter Fiems   A Queueing Theoretic Approach to
                                  Decoupling Inventory . . . . . . . . . . 150--164
          Iryna Tsimashenka and   
        William Knottenbelt and   
                 Peter Harrison   Controlling Variability in Split-Merge
                                  Systems  . . . . . . . . . . . . . . . . 165--177
       Jean-Michel Fourneau and   
               Franck Quessette   Some Improvements for the Computation of
                                  the Steady-State Distribution of a
                                  Markov Chain by Monotone Sequences of
                                  Vectors  . . . . . . . . . . . . . . . . 178--192
             Anton Stefanek and   
          Richard A. Hayden and   
           Mark Mac Gonagle and   
              Jeremy T. Bradley   Mean-Field Analysis of Markov Models
                                  with Reward Feedback . . . . . . . . . . 193--211
          Simonetta Balsamo and   
        Gian-Luca Dei Rossi and   
                   Andrea Marin   Lumping and Reversed Processes in
                                  Cooperating Automata . . . . . . . . . . 212--226
              Koen De Turck and   
           Sofian De Clercq and   
        Sabine Wittevrongel and   
             Herwig Bruneel and   
                   Dieter Fiems   Transform-Domain Solutions of Poisson's
                                  Equation with Applications to the
                                  Asymptotic Variance  . . . . . . . . . . 227--239
                Ingemar Kaj and   
        Victorien Konané   Analytical and Stochastic Modelling of
                                  Battery Cell Dynamics  . . . . . . . . . 240--254
               Eitan Altman and   
                   Dieter Fiems   Branching Processes, the Max--Plus
                                  Algebra and Network Calculus . . . . . . 255--270
Gábor Horváth and   
           Philipp Reinecke and   
        Miklós Telek and   
                 Katinka Wolter   Efficient Generation of PH-Distributed
                                  Random Variates  . . . . . . . . . . . . 271--285
           Nicholas Nechval and   
            Maris Purgailis and   
            Uldis Rozevskis and   
                 Inta Bruna and   
             Konstantin Nechval   Finding Prediction Limits for a Future
                                  Number of Failures in the Prescribed
                                  Time Interval under Parametric
                                  Uncertainty  . . . . . . . . . . . . . . 286--301
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7315, 2012

             Im\`ene Jraidi and   
            Pierre Chalfoun and   
                 Claude Frasson   Implicit Strategies for Intelligent
                                  Tutoring Systems . . . . . . . . . . . . 1--10
                   Amy Ogan and   
       Samantha Finkelstein and   
                Erin Walker and   
               Ryan Carlson and   
                Justine Cassell   Rudeness and Rapport: Insults and
                                  Learning Gains in Peer Tutoring  . . . . 11--21
                   Yugo Hayashi   On Pedagogical Effects of
                                  Learner-Support Agents in Collaborative
                                  Interaction  . . . . . . . . . . . . . . 22--32
                       Li Zhang   Exploration of Affect Detection Using
                                  Semantic Cues in Virtual Improvisation   33--39
            Jason M. Harley and   
    François Bouchet and   
                  Roger Azevedo   Measuring Learners' Co-Occurring
                                  Emotional Responses during Their
                                  Interaction with a Pedagogical Agent in
                                  MetaTutor  . . . . . . . . . . . . . . . 40--45
    David Hilton Shanabrook and   
                Ivon Arroyo and   
         Beverly Park Woolf and   
               Winslow Burleson   Visualization of Student Activity
                                  Patterns within Intelligent Tutoring
                                  Systems  . . . . . . . . . . . . . . . . 46--51
       Joseph F. Grafsgaard and   
     Kristy Elizabeth Boyer and   
                James C. Lester   Toward a Machine Learning Framework for
                                  Understanding Affective Tutorial
                                  Interaction  . . . . . . . . . . . . . . 52--58
      Amber Chauncey Strain and   
              Roger Azevedo and   
                 Sidney D'Mello   Exploring Relationships between
                                  Learners' Affective States,
                                  Metacognitive Processes, and Learning
                                  Outcomes . . . . . . . . . . . . . . . . 59--64
            Maher Chaouachi and   
                 Claude Frasson   Mental Workload, Engagement and
                                  Emotions: An Exploratory Study for
                                  Intelligent Tutoring Systems . . . . . . 65--71
           Keith W. Brawner and   
           Benjamin S. Goldberg   Real-Time Monitoring of ECG and GSR
                                  Signals during Computer-Based Training   72--77
         Md. Sazzad Hussain and   
            Hamed Monkaresi and   
                Rafael A. Calvo   Categorical vs. Dimensional
                                  Representations in Multimodal Affect
                                  Detection during Learning  . . . . . . . 78--83
            Pierre Chalfoun and   
                 Claude Frasson   Cognitive Priming: Assessing the Use of
                                  Non-conscious Perception to Enhance
                                  Learner's Reasoning Ability  . . . . . . 84--89
                  Dovan Rai and   
                 Joseph E. Beck   Math Learning Environment with Game-Like
                                  Elements: An Incremental Approach for
                                  Enhancing Student Engagement and
                                  Learning Effectiveness . . . . . . . . . 90--100
             Noboru Matsuda and   
         Evelyn Yarzebinski and   
            Victoria Keiser and   
              Rohan Raizada and   
            Gabriel Stylianides   Motivational Factors for Learning by
                                  Teaching . . . . . . . . . . . . . . . . 101--111
                  Mary Muir and   
                Cristina Conati   An Analysis of Attention to
                                  Student-Adaptive Hints in an Educational
                                  Game . . . . . . . . . . . . . . . . . . 112--122
            Mathieu Muratet and   
        Elisabeth Delozanne and   
            Patrice Torguet and   
               Fabienne Viallet   Serious Game and Students' Learning
                                  Motivation: Effect of Context Using
                                  Prog&Play . . . . . . . . . . . . . . . . 123--128
              Lotfi Derbali and   
                 Claude Frasson   Exploring the Effects of Prior
                                  Video-Game Experience on Learner's
                                  Motivation during Interactions with
                                  HeapMotiv  . . . . . . . . . . . . . . . 129--134
             Bertrand Marne and   
                John Wisdom and   
    Benjamin Huynh-Kim-Bang and   
                Jean-Marc Labat   A Design Pattern Library for Mutual
                                  Understanding and Cooperation in Serious
                                  Game Design  . . . . . . . . . . . . . . 135--140
          Jennifer Sabourin and   
             Lucy R. Shores and   
           Bradford W. Mott and   
                James C. Lester   Predicting Student Self-regulation
                                  Strategies in Game-Based Learning
                                  Environments . . . . . . . . . . . . . . 141--150
                  Ning Wang and   
          David V. Pynadath and   
              Stacy C. Marsella   Toward Automatic Verification of
                                  Multiagent Systems for Training
                                  Simulations  . . . . . . . . . . . . . . 151--161
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7316, 2012

           Egon Börger and   
         Antonio Cisternino and   
               Vincenzo Gervasi   Contribution to a Rigorous Analysis of
                                  Web Application Frameworks . . . . . . . 1--20
               Ian J. Hayes and   
               Robert J. Colvin   Integrated Operational Semantics:
                                  Small-Step, Big-Step and Multi-step  . . 21--35
              Paolo Arcaini and   
            Francesco Bolis and   
              Angelo Gargantini   Test Generation for Sequential Nets of
                                  Abstract State Machines  . . . . . . . . 36--50
             Richard Banach and   
                Huibiao Zhu and   
                     Wen Su and   
                    Xiaofeng Wu   ASM and Controller Synthesis . . . . . . 51--64
             Richard Banach and   
                Huibiao Zhu and   
                     Wen Su and   
                    Xiaofeng Wu   Continuous ASM, and a Pacemaker Sensing
                                  Fragment . . . . . . . . . . . . . . . . 65--78
               Vincenzo Gervasi   An ASM Model of Concurrency in a Web
                                  Browser  . . . . . . . . . . . . . . . . 79--93
          Beno\^\it Fraikin and   
              Marc Frappier and   
               Richard St-Denis   Modeling the Supervisory Control Theory
                                  with Alloy . . . . . . . . . . . . . . . 94--107
       Aleksandar Milicevic and   
                 Daniel Jackson   Preventing Arithmetic Overflows in Alloy 108--121
           Vajih Montaghami and   
                  Derek Rayside   Extending Alloy with Partial Instances   122--135
             Timothy Nelson and   
        Daniel J. Dougherty and   
               Kathi Fisler and   
          Shriram Krishnamurthi   Toward a More Complete Alloy . . . . . . 136--149
         Amirhossein Vakili and   
                   Nancy A. Day   Temporal Logic Model Checking in Alloy   150--163
                  Ting Wang and   
                     Dongyao Ji   Active Attacking Multicast Key
                                  Management Protocol Using Alloy  . . . . 164--177
        Jean-Raymond Abrial and   
                     Wen Su and   
                    Huibiao Zhu   Formalizing Hybrid Systems with Event-B  178--193
       David Déharbe and   
            Pascal Fontaine and   
                Yoann Guyot and   
                 Laurent Voisin   SMT Solvers for Rodin  . . . . . . . . . 194--207
               Gudmund Grov and   
             Andrew Ireland and   
             Maria Teresa Llano   Refinement Plans for Informed Formal
                                  Design . . . . . . . . . . . . . . . . . 208--222
         Stefan Hallerstede and   
                 Thai Son Hoang   Refinement by Interface Instantiation    223--237
        David Mentré and   
       Claude Marché and   
Jean-Christophe Filliâtre and   
                  Masashi Asuka   Discharging Proof Obligations from
                                  Atelier B Using Multiple Automated
                                  Provers  . . . . . . . . . . . . . . . . 238--251
             Cliff B. Jones and   
          Matthew J. Lovert and   
              L. Jason Steggles   A Semantic Analysis of Logics That Cope
                                  with Partial Terms . . . . . . . . . . . 252--265
   Claus Ballegaard Nielsen and   
           Kenneth Lausdahl and   
              Peter Gorm Larsen   Combining VDM with Executable Code . . . 266--279
 Maximiliano Cristiá and   
                Claudia Frydman   Extending the Test Template Framework to
                                  Deal with Axiomatic Descriptions,
                                  Quantifiers and Set Comprehensions . . . 280--293
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7317, 2012

               Aaron R. Bradley   Understanding IC3  . . . . . . . . . . . 1--14
                   Donald Knuth   Satisfiability and The Art of Computer
                                  Programming  . . . . . . . . . . . . . . 15--15
              Adrian Balint and   
              Uwe Schöning   Choosing Probability Distributions for
                                  Stochastic Local Search and the Role of
                                  Make versus Break  . . . . . . . . . . . 16--29
       Alexandra Goultiaeva and   
                 Fahiem Bacchus   Off the Trail: Re-examining the CDCL
                                  Algorithm  . . . . . . . . . . . . . . . 30--43
          Maria Luisa Bonet and   
                       Sam Buss   An Improved Separation of Regular
                                  Resolution from Pool Resolution and
                                  Clause Learning  . . . . . . . . . . . . 44--57
        Friedrich Slivovsky and   
                 Stefan Szeider   Computing Resolution-Path Dependencies
                                  in Linear Time . . . . . . . . . . . . . 58--71
              Serge Gaspers and   
                 Stefan Szeider   Strong Backdoors to Nested
                                  Satisfiability . . . . . . . . . . . . . 72--85
           Allen Van Gelder and   
             Samuel B. Wood and   
                Florian Lonsing   Extended Failed-Literal Preprocessing
                                  for Quantified Boolean Formulas  . . . . 86--99
                       Uwe Egly   On Sequent Systems and Resolution for
                                  QBFs . . . . . . . . . . . . . . . . . . 100--113
    Mikolá\vs Janota and   
            William Klieber and   
         Joao Marques-Silva and   
                  Edmund Clarke   Solving QBF with Counterexample Guided
                                  Refinement . . . . . . . . . . . . . . . 114--128
          Valeriy Balabanov and   
    Hui-Ju Katherine Chiang and   
          Jie-Hong Roland Jiang   Henkin Quantifiers and Boolean Formulae  129--142
               Vijay Ganesh and   
       Charles W. O'Donnell and   
                  Mate Soos and   
           Srinivas Devadas and   
               Martin C. Rinard   Lynx: a Programmatic SAT Solver for the
                                  RNA-Folding Problem  . . . . . . . . . . 143--156
            Kry\vstof Hoder and   
         Nikolaj Bjòrner   Generalized Property Directed
                                  Reachability . . . . . . . . . . . . . . 157--171
              Stefano Ermon and   
              Ronan Le Bras and   
             Carla P. Gomes and   
                Bart Selman and   
             R. Bruce van Dover   SMT-Aided Combinatorial Materials
                                  Discovery  . . . . . . . . . . . . . . . 172--185
                 Jian Zhang and   
                  Feifei Ma and   
                 Zhiqiang Zhang   Faulty Interaction Identification via
                                  Constraint Solving and Optimization  . . 186--199
            Gilles Audemard and   
          Beno\^\it Hoessen and   
            Sa\"\id Jabbour and   
         Jean-Marie Lagniez and   
           Cédric Piette   Revisiting Clause Exchange in Parallel
                                  SAT Solving  . . . . . . . . . . . . . . 200--213
 Antti E. J. Hyvärinen and   
                Norbert Manthey   Designing Scalable Parallel SAT Solvers  214--227
                     Lin Xu and   
               Frank Hutter and   
                Holger Hoos and   
             Kevin Leyton-Brown   Evaluating Component Solver
                                  Contributions to Portfolio-Based
                                  Algorithm Selectors  . . . . . . . . . . 228--241
            Alexander Nadel and   
                  Vadim Ryvchin   Efficient SAT Solving under Assumptions  242--255
            Alexander Nadel and   
              Vadim Ryvchin and   
                 Ofer Strichman   Preprocessing in Incremental SAT . . . . 256--269
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7319, 2012

                     Kun Li and   
                     Man Lu and   
                Fenglong Lu and   
                     Qin Lv and   
                   Li Shang and   
              Dragan Maksimovic   Personalized Driving Behavior Monitoring
                                  and Analysis for Emerging Hybrid
                                  Vehicles . . . . . . . . . . . . . . . . 1--19
             Takuya Maekawa and   
              Yasue Kishino and   
          Yutaka Yanagisawa and   
                Yasushi Sakurai   Mimic Sensors: Battery-Shaped Sensor
                                  Node for Detecting Electrical Events of
                                  Handheld Devices . . . . . . . . . . . . 20--38
               Inseok Hwang and   
               Hyukjae Jang and   
                Taiwoo Park and   
                  Aram Choi and   
                Youngki Lee and   
                  Chanyou Hwang   Leveraging Children's Behavioral
                                  Distribution and Singularities in New
                                  Interactive Environments: Study in
                                  Kindergarten Field Trips . . . . . . . . 39--56
        Pablo Samuel Castro and   
               Daqing Zhang and   
                     Shijian Li   Urban Traffic Modelling and Prediction
                                  Using Large Scale Taxi GPS Traces  . . . 57--72
             Shoji Tominaga and   
        Masamichi Shimosaka and   
                  Rui Fukui and   
                  Tomomasa Sato   A Unified Framework for Modeling and
                                  Predicting Going-Out Behavior  . . . . . 73--90
                Neal Lathia and   
            Daniele Quercia and   
                  Jon Crowcroft   The Hidden Image of the City: Sensing
                                  Community Well-Being from Urban Mobility 91--98
             Olof Görnerup   Scalable Mining of Common Routes in
                                  Mobile Communication Network Traffic
                                  Data . . . . . . . . . . . . . . . . . . 99--106
               Oliver Bates and   
            Adrian K. Clear and   
              Adrian Friday and   
                 Mike Hazas and   
                  Janine Morley   Accounting for Energy-Reliant Services
                                  within Everyday Life at Home . . . . . . 107--124
                 Jiakang Lu and   
               Kamin Whitehouse   Smart Blueprints: Automatically
                                  Generated Maps of Homes and the Devices
                                  Within Them  . . . . . . . . . . . . . . 125--142
            Sarah Mennicken and   
                Elaine M. Huang   Hacking the Natural Habitat: An
                                  In-the-Wild Study of Smart Homes, Their
                                  Development, and the People Who Live in
                                  Them . . . . . . . . . . . . . . . . . . 143--160
                    Ming Li and   
              Lars Mahnkopf and   
                   Leif Kobbelt   The Design of a Segway AR-Tactile
                                  Navigation System  . . . . . . . . . . . 161--178
               SeungJun Kim and   
              Jin-Hyuk Hong and   
                Kevin A. Li and   
              Jodi Forlizzi and   
                   Anind K. Dey   Route Guidance Modality for Elder Driver
                                  Navigation . . . . . . . . . . . . . . . 179--196
            David Molyneaux and   
              Shahram Izadi and   
                  David Kim and   
             Otmar Hilliges and   
               Steve Hodges and   
                      Xiang Cao   Interactive Environment-Aware Handheld
                                  Projectors for Pervasive Computing
                                  Spaces . . . . . . . . . . . . . . . . . 197--215
             Nicolas Villar and   
                James Scott and   
               Steve Hodges and   
               Kerry Hammil and   
                   Colin Miller   .NET Gadgeteer: a Platform for Custom
                                  Devices  . . . . . . . . . . . . . . . . 216--233
             Takuya Maekawa and   
              Yasue Kishino and   
          Yutaka Yanagisawa and   
                Yasushi Sakurai   Recognizing Handheld Electrical Device
                                  Usage with Hand-Worn Coil of Wire  . . . 234--252
               Bilal Hameed and   
              Farhan Rashid and   
            Frank Dürr and   
                 Kurt Rothermel   Self-calibration of RFID Reader
                                  Probabilities in a Smart Real-Time
                                  Factory  . . . . . . . . . . . . . . . . 253--270
            Teemu Pulkkinen and   
                  Petteri Nurmi   AWESOM: Automatic Discrete Partitioning
                                  of Indoor Spaces for WiFi Fingerprinting 271--288
        Kari Rye Schougaard and   
   Kaj Grònbæk and   
                 Tejs Scharling   Indoor Pedestrian Navigation Based on
                                  Hybrid Route Planning and Location
                                  Modeling . . . . . . . . . . . . . . . . 289--306
           Daisuke Kamisaka and   
          Takafumi Watanabe and   
          Shigeki Muramatsu and   
                 Arei Kobayashi   Estimating Position Relation between Two
                                  Pedestrians Using Mobile Phones  . . . . 307--324
           Takamasa Higuchi and   
         Hirozumi Yamaguchi and   
                Teruo Higashino   Clearing a Crowd: Context-Supported
                                  Neighbor Positioning for People-Centric
                                  Navigation . . . . . . . . . . . . . . . 325--342
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7320, 2012

                     Bran Selic   The Less Well Known UML  . . . . . . . . 1--20
              Suzana Andova and   
       Mark G. J. van den Brand   MDE Basics with a DSL Focus  . . . . . . 21--57
                Jordi Cabot and   
                 Martin Gogolla   Object Constraint Language (OCL): a
                                  Definitive Guide . . . . . . . . . . . . 58--90
           Davide Di Ruscio and   
                   Romina Eramo   Model Transformations  . . . . . . . . . 91--136
               Holger Giese and   
               Leen Lambers and   
                   Basil Becker   Graph Transformations for MDE,
                                  Adaptation, and Models at Runtime  . . . 137--191
              Guido de Caso and   
               Victor Braberman   Abstractions for Validation in Action    192--218
           Dorina C. Petriu and   
                 Mohammad Alhaj   Software Performance Modeling  . . . . . 219--262
                 Steffen Becker   Model Transformations in Non-functional
                                  Analysis . . . . . . . . . . . . . . . . 263--289
       Vittorio Cortellessa and   
             Antinisca Di Marco   Software Performance Antipatterns:
                                  Modeling and Analysis  . . . . . . . . . 290--335
               Petra Brosch and   
               Gerti Kappel and   
                  Philip Langer   An Introduction to Model Versioning  . . 336--398
         Antonio Vallecillo and   
                 Martin Gogolla   Formal Specification and Testing of
                                  Model Transformations  . . . . . . . . . 399--437
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7321, 2012

           Egon Börger and   
         Antonio Cisternino and   
               Vincenzo Gervasi   Contribution to a Rigorous Analysis of
                                  Web Application Frameworks . . . . . . . 1--20
               Muffy Calder and   
              Michele Sevegnani   Process Algebra for Event-Driven Runtime
                                  Verification: a Case Study of Wireless
                                  Network Management . . . . . . . . . . . 21--23
             Dominik Hansen and   
               Michael Leuschel   Translating TLA$^+$ to B for Validation
                                  with ProB  . . . . . . . . . . . . . . . 24--38
             Brijesh Dongol and   
                   Ian J. Hayes   Rely/Guarantee Reasoning for
                                  Teleo-reactive Programs over Multiple
                                  Time Bands . . . . . . . . . . . . . . . 39--53
             Yoshinao Isobe and   
               Faron Moller and   
               Hoang Nga Nguyen   Safety and Line Capacity in Railways ---
                                  An Approach in Timed CSP . . . . . . . . 54--68
            Jesper Berthing and   
        Pontus Boström and   
                     Kaisa Sere   Refinement-Based Development of Timed
                                  Systems  . . . . . . . . . . . . . . . . 69--83
              Tim Blackmore and   
            David Halliwell and   
              Philip Barker and   
                   Kerstin Eder   Analysing and Closing Simulation
                                  Coverage by Automatic Generation and
                                  Verification of Formal Properties from
                                  Coverage Reports . . . . . . . . . . . . 84--98
               Fuyuan Zhang and   
           Flemming Nielson and   
             Hanne Riis Nielson   Model Checking as Static Analysis:
                                  Revisited  . . . . . . . . . . . . . . . 99--112
               Van Chan Ngo and   
         Jean-Pierre Talpin and   
                Thierry Gautier   Formal Verification of Compiler
                                  Transformations on Polychronous
                                  Equations  . . . . . . . . . . . . . . . 113--127
              Herbert Rocha and   
           Raimundo Barreto and   
                 Lucas Cordeiro   Understanding Programming Bugs in ANSI-C
                                  Software Using Bounded Model Checking
                                  Counter-Examples . . . . . . . . . . . . 128--142
          Fatemeh Kazemeyni and   
        Einar Broch Johnsen and   
                       Olaf Owe   MULE-Based Wireless Sensor Networks:
                                  Probabilistic Modeling and Quantitative
                                  Analysis . . . . . . . . . . . . . . . . 143--157
           Matthias Woehrle and   
               Rena Bakhshi and   
          Mohammad Reza Mousavi   Mechanized Extraction of Topology
                                  Anti-patterns in Wireless Networks . . . 158--173
            Leonard Lensink and   
             Sjaak Smetsers and   
              Marko van Eekelen   A Proof Framework for Concurrent
                                  Programs . . . . . . . . . . . . . . . . 174--190
         Riccardo Bresciani and   
             Andrew Butterfield   A UTP Semantics of pGCL as a Homogeneous
                                  Relation . . . . . . . . . . . . . . . . 191--205
                HaiYun Tian and   
          Phillip J. Brooke and   
              Anne-Gwenn Bosser   Behaviour-Based Cheat Detection in
                                  Multiplayer Games with Event-B . . . . . 206--220
          Denisa Diaconescu and   
             Ioana Leustean and   
               Luigia Petre and   
                     Kaisa Sere   Refinement-Preserving Translation from
                                  Event-B to Register-Voice Interactive
                                  Systems  . . . . . . . . . . . . . . . . 221--236
             Anton Tarasyuk and   
          Elena Troubitsyna and   
                 Linas Laibinis   Formal Modelling and Verification of
                                  Service-Oriented Systems in
                                  Probabilistic Event-B  . . . . . . . . . 237--252
            Jasen Markovski and   
           Dirk A. van Beek and   
                     Jos Baeten   Partially-Supervised Plants: Embedding
                                  Control Requirements in Plant Components 253--267
               Jozef Hooman and   
             Arjan J. Mooij and   
                 Hans van Wezep   Early Fault Detection in Industry Using
                                  Models at Various Abstraction Levels . . 268--282
                     Ran Ji and   
                  Richard Bubel   PE-KeY: a Partial Evaluator for Java
                                  Programs . . . . . . . . . . . . . . . . 283--295
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7322, 2012

               Pieter Agten and   
           Nick Nikiforakis and   
              Raoul Strackx and   
            Willem De Groef and   
                 Frank Piessens   Recent Developments in Low-Level
                                  Software Security  . . . . . . . . . . . 1--16
                   Paul Kearney   Towards a C$^2$I Platform for Combating
                                  the Cyber-Threat . . . . . . . . . . . . 17--19
                Dieter Gollmann   Veracity, Plausibility, and Reputation   20--28
Julio Cesar Hernandez-Castro and   
          Pedro Peris-Lopez and   
          Masoumeh Safkhani and   
                 Nasour Bagheri   Another Fallen Hash-Based RFID
                                  Authentication Protocol  . . . . . . . . 29--37
   G. Kirubavathi Venkatesh and   
            R. Anitha Nadarajan   HTTP Botnet Detection Using Adaptive
                                  Learning Rate Multilayer Feed-Forward
                                  Neural Network . . . . . . . . . . . . . 38--48
                 Fanbao Liu and   
                        Tao Xie   How to Break EAP-MD5 . . . . . . . . . . 49--57
                  Jian Zhou and   
                  Jiwu Jing and   
                   Ji Xiang and   
                       Lei Wang   Privacy Preserving Social Network
                                  Publication on Bipartite Graphs  . . . . 58--70
          Delphine Christin and   
Pablo Sánchez López and   
          Andreas Reinhardt and   
               Matthias Hollick   Privacy Bubbles: User-Centered Privacy
                                  Control for Mobile Content Sharing
                                  Applications . . . . . . . . . . . . . . 71--86
          Shinsaku Kiyomoto and   
         Kazuhide Fukushima and   
                  Yutaka Miyake   Privacy Preservation of User History
                                  Graph  . . . . . . . . . . . . . . . . . 87--96
          Matteo Dell'Amico and   
              Gabriel Serme and   
      Muhammad Sabir Idrees and   
    Anderson Santana de Olivera   HiPoLDS: a Security Policy Language for
                                  Distributed Systems  . . . . . . . . . . 97--112
                Nezar Nassr and   
                 Eric Steegmans   ROAC: a Role-Oriented Access Control
                                  Model  . . . . . . . . . . . . . . . . . 113--127
               Chaya Ganesh and   
                C. Pandu Rangan   Optimal Parameters for Efficient
                                  Two-Party Computation Protocols  . . . . 128--143
        Jens-Matthias Bohli and   
                 Wenting Li and   
                    Jan Seedorf   Assisting Server for Secure Multi-Party
                                  Computation  . . . . . . . . . . . . . . 144--159
      Rachid El Bansarkhani and   
               Mohammed Meziani   An Efficient Lattice-Based Secret
                                  Sharing Construction . . . . . . . . . . 160--168
            Youssef Souissi and   
            Nicolas Debande and   
                 Sami Mekki and   
            Sylvain Guilley and   
                   Ali Maalaoui   On the Optimality of Correlation Power
                                  Attack on Embedded Cryptographic Systems 169--178
      Ferhat Karakoç and   
       Hüseyin Demirci and   
        A. Emre Harmancì   Impossible Differential Cryptanalysis of
                                  Reduced-Round LBlock . . . . . . . . . . 179--188
Johann Großschädl and   
                   Dan Page and   
                 Stefan Tillich   Efficient Java Implementation of
                                  Elliptic Curve Cryptography for
                                  J2ME-Enabled Mobile Devices  . . . . . . 189--207
         Daniel Schreckling and   
            Joachim Posegga and   
      Johannes Köstler and   
                Matthias Schaff   Kynoid: Real-Time Enforcement of
                                  Fine-Grained, User-Defined, and
                                  Data-Centric Security Policies for
                                  Android  . . . . . . . . . . . . . . . . 208--223
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7323, 2012

                  Fan Chung and   
              Alexander Tsiatas   Hypergraph Coloring Games and Voter
                                  Models . . . . . . . . . . . . . . . . . 1--16
           Soroush Alamdari and   
                Abbas Mehrabian   On a DAG Partitioning Problem  . . . . . 17--28
               Colin Cooper and   
                Alan Frieze and   
                 Pawe\l Pra\lat   Some Typical Properties of the Spatial
                                  Preferred Attachment Model . . . . . . . 29--40
            Christian Borgs and   
               Michael Brautbar   A Sublinear Time Algorithm for PageRank
                                  Computations . . . . . . . . . . . . . . 41--53
     Konstantin Avrachenkov and   
                   Nelly Litvak   Quick Detection of Nodes with Large
                                  Degrees  . . . . . . . . . . . . . . . . 54--65
                  Fan Chung and   
                     Wenbo Zhao   Ranking and Sparsifying a Connection
                                  Graph  . . . . . . . . . . . . . . . . . 66--77
                Ashish Goel and   
                 Farnaz Ronaghi   A Game-Theoretic Model of Attention in
                                  Social Networks  . . . . . . . . . . . . 78--92
                Alan Frieze and   
     Charalampos E. Tsourakakis   On Certain Properties of Random
                                  Apollonian Networks  . . . . . . . . . . 93--112
                  Yanhua Li and   
               Zhi-Li Zhang and   
                        Jie Bao   Mutual or Unrequited Love: Identifying
                                  Stable Clusters in Social Networks with
                                  Uni- and Bi-directional Links  . . . . . 113--125
              Ryan A. Rossi and   
                David F. Gleich   Dynamic PageRank Using Evolving
                                  Teleportation  . . . . . . . . . . . . . 126--137
                  Fan Chung and   
                  Paul Horn and   
                   Jacob Hughes   Multi-commodity Allocation for Dynamic
                                  Demands Using PageRank Vectors . . . . . 138--152
                Jaideep Ray and   
                  Ali Pinar and   
                   C. Seshadhri   Are We There Yet? When to Stop a Markov
                                  Chain while Generating Random Graphs . . 153--164
               Colin Cooper and   
              Tomasz Radzik and   
                Yiannis Siantos   A Fast Algorithm to Find All High Degree
                                  Vertices in Graphs with a Power Law
                                  Degree Sequence  . . . . . . . . . . . . 165--178
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7324, 2012

              Zhihong Zhang and   
               Edwin R. Hancock   Localized Graph-Based Feature Selection
                                  for Clustering . . . . . . . . . . . . . 1--10
                  A. Thomas and   
                 B. John Oommen   Optimal ``Anti-Bayesian'' Parametric
                                  Pattern Classification for the
                                  Exponential Family Using Order
                                  Statistics Criteria  . . . . . . . . . . 11--18
      Salma Kammoun Jarraya and   
      Rania Rebai Boukhriss and   
            Mohamed Hammami and   
            Hanene Ben-Abdallah   Cast Shadow Detection Based on
                                  Semi-supervised Learning . . . . . . . . 19--26
               Helena Aidos and   
                       Ana Fred   $k$-Nearest Neighbor Classification
                                  Using Dissimilarity Increments . . . . . 27--33
     Mohammed Sadeq Al-Rawi and   
  João Paulo Silva Cunha   Using Permutation Tests to Study How the
                                  Dimensionality, the Number of Classes,
                                  and the Number of Samples Affect
                                  Classification Analysis  . . . . . . . . 34--42
       Alexander Kolesnikov and   
                 Elena Trichina   Determining the Number of Clusters with
                                  Rate-Distortion Curve Modeling . . . . . 43--50
            Aymen Sellaouti and   
               Atef Hamouda and   
             Aline Deruyver and   
          Cédric Wemmert   Hierarchical Classification-Based Region
                                  Growing (HCBRG): a Collaborative
                                  Approach for Object Segmentation and
                                  Classification . . . . . . . . . . . . . 51--60
   Nicolau Gonçalves and   
         Ricardo Vigário   Clustering through SOM Consistency . . . 61--68
                    D. Glew and   
               Edward R. Vrscay   Max and Min Values of the Structural
                                  Similarity Function $S(x, a)$ on the
                                  $L^2$ Sphere $S_R(a)$, $a \in
                                  \mathbb{R}^N$  . . . . . . . . . . . . . 69--78
                    Xun Shi and   
           Neil D. B. Bruce and   
                John K. Tsotsos   Biologically Motivated Local Contextual
                                  Modulation Improves Low-Level Visual
                                  Feature Representations  . . . . . . . . 79--88
                Ajay Mittal and   
              Sanjeev Sofat and   
              Edwin Hancock and   
        Stéphane Mousset   A Statistical Operator for Detecting
                                  Weak Edges in Low Contrast Images  . . . 89--96
            Miguel Oliveira and   
             Angel D. Sappa and   
            Vítor Santos   Color Correction Using $3$D Gaussian
                                  Mixture Models . . . . . . . . . . . . . 97--106
               Anna Tomaszewska   Blind Noise Level Detection  . . . . . . 107--114
              Charles Guyon and   
           Thierry Bouwmans and   
                 El-Hadi Zahzah   Foreground Detection by Robust PCA
                                  Solved via a Linearized Alternating
                                  Direction Method . . . . . . . . . . . . 115--122
                  Peng Peng and   
                     Ze-Nian Li   A Mixture of Experts Approach to
                                  Multi-strategy Image Quality Assessment  123--130
                    D. Glew and   
               Edward R. Vrscay   Self-similarity of Images in the Wavelet
                                  Domain in Terms of $\ell^2$ and
                                  Structural Similarity (SSIM) . . . . . . 131--140
                Irfan Ahmad and   
               Sabri A. Mahmoud   Arabic Bank Check Analysis and Zone
                                  Extraction . . . . . . . . . . . . . . . 141--148
          Michael Gadermayr and   
                    Andreas Uhl   Image Segmentation of Vickers
                                  Indentations Using Shape from Focus  . . 149--157
               Diogo Pratas and   
               Armando J. Pinho   On the Detection of Unknown Locally
                                  Repeating Patterns in Images . . . . . . 158--165
               Sajid Saleem and   
                 Abdul Bais and   
               Robert Sablatnig   A Performance Evaluation of SIFT and
                                  SURF for Multispectral Image Matching    166--173
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7325, 2012

                Andreas Uhl and   
                     Peter Wild   Multi-stage Visible Wavelength and Near
                                  Infrared Iris Segmentation Framework . . 1--10
  Hélder P. Oliveira and   
        Filipe Magalhães   Two Unconstrained Biometric Databases    11--19
                Kaushik Roy and   
               Mohamed S. Kamel   Multibiometric System Using Level Set
                                  Method and Particle Swarm Optimization   20--29
     Garsah Farhan Al-Qarni and   
                  Farzin Deravi   Explicit Integration of Identity
                                  Information from Skin Regions to Improve
                                  Face Recognition . . . . . . . . . . . . 30--37
        Hélder Matos and   
  Hélder P. Oliveira and   
        Filipe Magalhães   Hand-Geometry Based Recognition System   38--45
               Lu Bing Zhou and   
                       Han Wang   Local Gradient Increasing Pattern (LGIP)
                                  for Facial Representation and Gender
                                  Recognition  . . . . . . . . . . . . . . 46--53
      Ntethelelo A. Mngenge and   
    Fulufhelo V. Nelwamondo and   
         Tendani Malumedzha and   
                 Ntsika Msimang   Quality-Based Fingerprint Segmentation   54--63
               Robert Niese and   
            Ayoub Al-Hamadi and   
                Bernd Michaelis   A New Multi-camera Based Facial
                                  Expression Analysis Concept  . . . . . . 64--71
           Maria De Marsico and   
              Michele Nappi and   
                  Daniel Riccio   Entropy in Biometric Face Template
                                  Analysis . . . . . . . . . . . . . . . . 72--79
                Andreas Uhl and   
                     Peter Wild   Combining Face with Face-Part Detectors
                                  under Gaussian Assumption  . . . . . . . 80--89
                F. Dornaika and   
                 A. Bosaghzadeh   Generalized Local Discriminant Embedding
                                  for Face Recognition . . . . . . . . . . 90--97
            Ricard Borr\`as and   
          \`Agata Lapedriza and   
                    Laura Igual   Depth Information in Human Gait
                                  Analysis: An Experimental Study on
                                  Gender Recognition . . . . . . . . . . . 98--105
               Rachit Dubey and   
                Bingbing Ni and   
                  Pierre Moulin   A Depth Camera Based Fall Recognition
                                  System for the Elderly . . . . . . . . . 106--113
        Hervé Lahamy and   
                   Derek Lichti   Heuristic and Voxel-Based Signature for
                                  Hand Posture Recognition Using a Range
                                  Camera . . . . . . . . . . . . . . . . . 114--121
            Abdunnaser Diaf and   
          Boubakeur Boufama and   
                Rachid Benlamri   A Compound Eigenspace for Recognizing
                                  Directed Human Activities  . . . . . . . 122--129
   Pedro Gil-Jiménez and   
Beatriz Losilla-López and   
        Rafael Torres-Cueco and   
        Aurélio Campilho   Hand Detection and Tracking Using the
                                  Skeleton of the Blob for Medical
                                  Rehabilitation Applications  . . . . . . 130--137
           Minh-Phuong Tran and   
       Renaud Péteri and   
            Maitine Bergounioux   Denoising $3$D Medical Images Using a
                                  Second Order Variational Model and
                                  Wavelet Shrinkage  . . . . . . . . . . . 138--145
                  Jinwei Xu and   
                   Tuan D. Pham   Robust Impulse-Noise Filtering for
                                  Biomedical Images Using Numerical
                                  Interpolation  . . . . . . . . . . . . . 146--155
              Mark Lyksborg and   
              Rasmus Larsen and   
Per Soelberg Sòrensen and   
         Morten Blinkenberg and   
                    Ellen Garde   Segmenting Multiple Sclerosis Lesions
                                  Using a Spatially Constrained K-Nearest
                                  Neighbour Approach . . . . . . . . . . . 156--163
       Isabel N. Figueiredo and   
         Juan Carlos Moreno and   
        V. B. Surya Prasath and   
            Pedro N. Figueiredo   A Segmentation Model and Application to
                                  Endoscopic Images  . . . . . . . . . . . 164--171
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7327, 2012

                Wolfgang Ketter   Competitive Simulations: Lessons Learned
                                  from the Trading Agent Competition . . . 1--1
                   Michael Luck   Behaviour Regulation and Normative
                                  Systems  . . . . . . . . . . . . . . . . 2--2
                Kimon Valavanis   Challenges in Unmanned Systems Swarms: a
                                  Wireless, Multi-agent Distributed System
                                  Perspective  . . . . . . . . . . . . . . 3--3
                Marin Lujak and   
           Holger Billhardt and   
                Sascha Ossowski   On Mobile Target Allocation with
                                  Incomplete Information in Defensive
                                  Environments . . . . . . . . . . . . . . 4--13
         Ljiljana \vSeri\'c and   
               Maja \vStula and   
         Darko Stipani\vcev and   
                 Maja Braovi\'c   Bayesian Proprioceptor for Forest Fire
                                  Observer Network . . . . . . . . . . . . 14--23
       Franti\vsek \vCapkovi\vc   Supervision of Agents Modelling
                                  Evacuation at Crisis Situations  . . . . 24--33
              Romina Torres and   
              Denise Rivera and   
               Hernan Astudillo   Web Service Compositions Which Emerge
                                  from Virtual Organizations with Fair
                                  Agreements . . . . . . . . . . . . . . . 34--43
Adrianna Kozierkiewicz-Hetmanska   Evaluation of an Intelligent Tutoring
                                  System Incorporating Learning Profile to
                                  Determine Learning Scenario  . . . . . . 44--53
            Nguyen-Thinh Le and   
                 Niels Pinkwart   Strategy-Based Learning through
                                  Communication with Humans  . . . . . . . 54--64
           Dariusz Choinski and   
                   Michal Senik   Ontology Based Knowledge Management and
                                  Learning in Multi-Agent System . . . . . 65--74
               Lidia Ogiela and   
                Marek R. Ogiela   Data Analysis Systems and Cognitive
                                  Modelling Processes  . . . . . . . . . . 75--83
            Marcin Maleszka and   
              Ngoc Thanh Nguyen   Path-Oriented Integration Method for
                                  Complex Trees  . . . . . . . . . . . . . 84--93
           Mihaela Vrani\'c and   
               Damir Pintar and   
                 Zoran Sko\vcir   Integrating Quantitative Attributes in
                                  Hierarchical Clustering of Transactional
                                  Data . . . . . . . . . . . . . . . . . . 94--103
               Pavle Skocir and   
               Luka Marusic and   
            Marinko Marusic and   
                     Ana Petric   The MARS --- a Multi-Agent
                                  Recommendation System for Games on
                                  Mobile Phones  . . . . . . . . . . . . . 104--113
              Damir Juri\'c and   
                Marko Banek and   
               \vSandor Dembitz   Informativeness of Inflective Noun
                                  Bigrams in Croatian  . . . . . . . . . . 114--123
              Paul Anderson and   
            Shahriar Bijani and   
              Alexandros Vichos   Multi-agent Negotiation of Virtual
                                  Machine Migration Using the Lightweight
                                  Coordination Calculus  . . . . . . . . . 124--133
             Cheng-Lin Yang and   
            Yun-Heh Chen-Burger   On-Line Communities Making Scense: a
                                  Hybrid Micro-Blogging Platform Community
                                  Analysis Framework . . . . . . . . . . . 134--143
Ricardo J. Rodríguez and   
   Rafael Tolosana-Calasanz and   
                   Omer F. Rana   Measuring the Effectiveness of Throttled
                                  Data Transfers on Data-Intensive
                                  Workflows  . . . . . . . . . . . . . . . 144--153
         Gayathri Nadarajan and   
            Yun-Heh Chen-Burger   Goal, Video Description and Capability
                                  Ontologies for Fish4Knowledge Domain . . 154--163
                 Ivan Voras and   
              Marin Orli\'c and   
            Branko Mihaljevi\'c   An Early Comparison of Commercial and
                                  Open-Source Cloud Platforms for
                                  Scientific Environments  . . . . . . . . 164--173
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7328, 2012

              Michele Missikoff   The Future of Enterprise Systems in a
                                  Fully Networked Society  . . . . . . . . 1--18
             Krzysztof Kurowski   Challenges for Future Platforms,
                                  Services and Networked Applications  . . 19--30
               Marlon Dumas and   
           Marcello La Rosa and   
               Jan Mendling and   
          Raul Mäesalu and   
                Hajo A. Reijers   Understanding Business Process Models:
                                  The Costs and Benefits of Structuredness 31--46
                Razvan Petrusel   Aggregating Individual Models of
                                  Decision-Making Processes  . . . . . . . 47--63
             Henrik Leopold and   
               Jan Mendling and   
               Artem Polyvyanyy   Generating Natural Language Texts from
                                  Business Process Models  . . . . . . . . 64--79
         Benjamin Schmeling and   
                Anis Charfi and   
               Marko Martin and   
                    Mira Mezini   Towards Conflict-Free Composition of
                                  Non-functional Concerns  . . . . . . . . 80--94
 Iván S. Razo-Zapata and   
         Pieter De Leenheer and   
               Jaap Gordijn and   
                 Hans Akkermans   Fuzzy Verification of Service Value
                                  Networks . . . . . . . . . . . . . . . . 95--110
         Nikolay Mehandjiev and   
 Freddy Lécué and   
           Martin Carpenter and   
                 Fethi A. Rabhi   Cooperative Service Composition  . . . . 111--126
               Juan de Lara and   
              Esther Guerra and   
Jesús Sánchez-Cuadrado   Abstracting Modelling Languages: a
                                  Reutilization Approach . . . . . . . . . 127--143
          Julius Köpke and   
                    Johann Eder   Logical Invalidations of Semantic
                                  Annotations  . . . . . . . . . . . . . . 144--159
               Paolo Atzeni and   
         Francesca Bugiotti and   
                     Luca Rossi   Uniform Access to Non-relational
                                  Database Systems: The SOS Platform . . . 160--174
                Ali Ghaddar and   
            Dalila Tamzalit and   
                  Ali Assaf and   
                  Abdalla Bitar   Variability as a Service: Outsourcing
                                  Variability Management in Multi-tenant
                                  SaaS Applications  . . . . . . . . . . . 175--189
      Carl-Mikael Lönn and   
         Elin Uppström and   
                Petia Wohed and   
           Gustaf Juell-Skielse   Configurable Process Models for the
                                  Swedish Public Sector  . . . . . . . . . 190--205
            Fabiano Dalpiaz and   
                  Raian Ali and   
                 Paolo Giorgini   Aligning Software Configuration with
                                  Business and IT Context  . . . . . . . . 206--221
               Robert Engel and   
    Wil M. P. van der Aalst and   
             Marco Zapletal and   
              Christian Pichler   Mining Inter-organizational Business
                                  Process Models from EDI Messages: a Case
                                  Study from the Automotive Sector . . . . 222--237
               Linh Thao Ly and   
             Conrad Indiono and   
        Jürgen Mangler and   
           Stefanie Rinderle-Ma   Data Transformation and Semantic Log
                                  Purging for Process Mining . . . . . . . 238--253
Seppe K. L. M. vanden Broucke and   
           Jochen De Weerdt and   
               Bart Baesens and   
                 Jan Vanthienen   Improved Artificial Negative Event
                                  Generation to Enhance Process Event Logs 254--269
          Fabrizio M. Maggi and   
R. P. Jagadeesh Chandra Bose and   
        Wil M. P. van der Aalst   Efficient Discovery of Understandable
                                  Declarative Process Models from Event
                                  Logs . . . . . . . . . . . . . . . . . . 270--285
        Evangelia Daskalaki and   
           Dimitris Plexousakis   OtO Matching System: a Multi-strategy
                                  Approach to Instance Matching  . . . . . 286--300
       Muhammad Ashad Kabir and   
                    Jun Han and   
                    Jian Yu and   
                    Alan Colman   SCIMS: a Social Context Information
                                  Management System for Socially-Aware
                                  Applications . . . . . . . . . . . . . . 301--317
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7329, 2012

  Gabriella Sanniti di Baja and   
                  L. Serino and   
                  Carlo Arcelli   From Linear Representations to Object
                                  Parts  . . . . . . . . . . . . . . . . . 1--12
          Sven J. Dickinson and   
           Alex Levinshtein and   
          Cristian Sminchisescu   Perceptual Grouping Using Superpixels    13--22
             Humberto Sossa and   
           Beatriz A. Garro and   
              Juan Villegas and   
       Carlos Avilés and   
                 Gustavo Olague   Automatic Design of Artificial Neural
                                  Networks and Associative Memories for
                                  Pattern Classification and Pattern
                                  Restoration  . . . . . . . . . . . . . . 23--34
               Maria Frucci and   
              Carlo Arcelli and   
      Gabriella Sanniti di Baja   An Automatic Image Scaling Up Algorithm  35--44
            Humberto Madrid and   
               Valia Guerra and   
                 Marielba Rojas   Sampling Techniques for Monte Carlo
                                  Matrix Multiplication with Applications
                                  to Image Processing  . . . . . . . . . . 45--54
Felipe Hernández-Rodríguez and   
          Mario Castelán   Extended Photometric Sampling for
                                  Surface Shape Recovery . . . . . . . . . 55--64
José Luis Silván-Cárdenas   A Segmentation Method for Tree Crown
                                  Detection and Modelling from LiDAR
                                  Measurements . . . . . . . . . . . . . . 65--74
                 Michal Kawulok   Texture Analysis for Skin Probability
                                  Maps Refinement  . . . . . . . . . . . . 75--84
Pablo M. Aguilar-González and   
                   Vitaly Kober   Composite Correlation Filters for
                                  Detection of Geometrically Distorted
                                  Objects Using Noisy Training Images  . . 85--93
Alejandro A. Ramírez-Acosta and   
Mireya S. García-Vázquez and   
                  Mariko Nakano   Adaptive Spatial Concealment of Damaged
                                  Coded Images . . . . . . . . . . . . . . 94--106
Leonardo Saldivar-Piñon and   
    Mario I. Chacon-Murguia and   
      Rafael Sandoval-Rodriguez   Human Sign Recognition for Robot
                                  Manipulation . . . . . . . . . . . . . . 107--116
         Marina V. Sokolova and   
Antonio Fernández-Caballero   Fuzzy Sets for Human Fall Pattern
                                  Recognition  . . . . . . . . . . . . . . 117--126
José Guadalupe Rico Espino and   
José-Joel Gonzalez-Barbosa and   
Roberto Augusto Gómez Loenzo   Vision System for $3$D Reconstruction
                                  with Telecentric Lens  . . . . . . . . . 127--136
        David J. Rios Soria and   
           Satu Elisa Schaeffer   A Tool for Hand-Sign Recognition . . . . 137--146
Miguel Angel Medina-Pérez and   
Milton García-Borroto and   
Andres Eduardo Gutierrez-Rodríguez   Improving the Multiple Alignments
                                  Strategy for Fingerprint Verification    147--154
         Claudia Cruz-Perez and   
           Oleg Starostenko and   
       Fernando Uceda-Ponga and   
         Vicente Alarcon-Aquino   Breaking reCAPTCHAs with Unpredictable
                                  Collapse: Heuristic Character
                                  Segmentation and Recognition . . . . . . 155--165
 Cosme E. Santiesteban Toca and   
Milton García-Borroto and   
          Jesus S. Aguilar Ruiz   Using Short-Range Interactions and
                                  Simulated Genetic Strategy to Improve
                                  the Protein Contact Map Prediction . . . 166--175
            Rodolfo Navarro and   
              Elena Acevedo and   
            Antonio Acevedo and   
        Fabiola Martínez   Associative Model for Solving the
                                  Wall-Following Problem . . . . . . . . . 176--186
          Eric Sadit Tellez and   
            Edgar Chávez   The List of Clusters Revisited . . . . . 187--196
               Hamid Parvin and   
               Sajad Parvin and   
               Zahra Rezaei and   
                Moslem Mohamadi   A Heuristically Perturbation of Dataset
                                  to Achieve a Diverse Ensemble of
                                  Classifiers  . . . . . . . . . . . . . . 197--206
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7330, 2012

                 Abed Malti and   
             Adrien Bartoli and   
                   Toby Collins   Template-Based Conformal
                                  Shape-from-Motion-and-Shading for
                                  Laparoscopy  . . . . . . . . . . . . . . 1--10
               Toby Collins and   
                 Adrien Bartoli   Towards Live Monocular $3$D Laparoscopy
                                  Using Shading and Specularity
                                  Information  . . . . . . . . . . . . . . 11--21
              Omid Mohareri and   
             Mahdi Ramezani and   
                Troy Adebar and   
         Purang Abolmaesumi and   
             Septimiu Salcudean   Automatic Detection and Localization of
                                  da Vinci Tool Tips in $3$D Ultrasound    22--32
             Michael C. Yip and   
              David G. Lowe and   
      Septimiu E. Salcudean and   
              Robert N. Rohling   Real-Time Methods for Long-Term Tissue
                                  Feature Tracking in Endoscopic Scenes    33--43
            Mohammad Najafi and   
              Narges Afsham and   
         Purang Abolmaesumi and   
                 Robert Rohling   A Closed-Form Differential Formulation
                                  for Ultrasound Spatial Calibration . . . 44--53
              Patrik Arnold and   
            Frank Preiswerk and   
                 Beat Fasel and   
              Rares Salomir and   
                Klaus Scheffler   Model-Based Respiratory Motion
                                  Compensation in MRgHIFU  . . . . . . . . 54--63
        Ilker Hacihaliloglu and   
            David R. Wilson and   
            Michael Gilbart and   
               Michael Hunt and   
             Purang Abolmaesumi   Non-iterative Multi-modal Partial View
                                  to Full View Image Registration Using
                                  Local Phase-Based Image Projections  . . 64--73
           Steffen Schumann and   
             Moritz Tannast and   
           Mathias Bergmann and   
              Michael Thali and   
                  Lutz-P. Nolte   A Hierarchical Strategy for
                                  Reconstruction of $3$D Acetabular
                                  Surface Models from $2$D Calibrated
                                  X-Ray Images . . . . . . . . . . . . . . 74--83
                 John Moore and   
              Chris Wedlake and   
          Daniel Bainbridge and   
           Gerard Guiraudon and   
                Michael Chu and   
                      Bob Kiaii   A Navigation Platform for Guidance of
                                  Beating Heart Transapical Mitral Valve
                                  Repair . . . . . . . . . . . . . . . . . 84--93
         Sebastian Kaeppler and   
            Alexander Brost and   
                Martin Koch and   
                     Wen Wu and   
              Felix Bourier and   
                  Terrence Chen   Motion Estimation Model for Cardiac and
                                  Respiratory Motion Compensation  . . . . 94--103
               YingLiang Ma and   
               Rashed Karim and   
           R. James Housden and   
             Geert Gijsbers and   
                 Roland Bullens   Cardiac Unfold: a Novel Technique for
                                  Image-Guided Cardiac Catheterization
                                  Procedures . . . . . . . . . . . . . . . 104--114
          Laura J. Brattain and   
        Nikolay V. Vasilyev and   
                 Robert D. Howe   Enabling $3$D Ultrasound Procedure
                                  Guidance through Enhanced Visualization  115--124
            Dante De Nigris and   
           D. Louis Collins and   
                      Tal Arbel   Fast and Robust Registration Based on
                                  Gradient Orientations: Case Study
                                  Matching Intra-operative Ultrasound to
                                  Pre-operative MRI in Neurosurgery  . . . 125--134
                Yiming Xiao and   
                Lara Bailey and   
      M. Mallar Chakravarty and   
           Silvain Beriault and   
               Abbas F. Sadikot   Atlas-Based Segmentation of the
                                  Subthalamic Nucleus, Red Nucleus, and
                                  Substantia Nigra for Deep Brain
                                  Stimulation by Incorporating Multiple
                                  MRI Contrasts  . . . . . . . . . . . . . 135--145
               Ali Bigdelou and   
           Aslì Okur and   
       Max-Emanuel Hoffmann and   
              Bamshad Azizi and   
                   Nassir Navab   Towards Systematic Usability Evaluations
                                  for the OR: An Introduction to OR-Use
                                  Framework  . . . . . . . . . . . . . . . 146--156
          Albert Hernansanz and   
             Davide Zerbato and   
         Lorenza Gasperotti and   
           Michele Scandola and   
                  Paolo Fiorini   Improving the Development of Surgical
                                  Skills with Virtual Fixtures in
                                  Simulation . . . . . . . . . . . . . . . 157--166
               Lingling Tao and   
            Ehsan Elhamifar and   
          Sanjeev Khudanpur and   
           Gregory D. Hager and   
              René Vidal   Sparse Hidden Markov Models for Surgical
                                  Gesture Classification and Skill
                                  Evaluation . . . . . . . . . . . . . . . 167--177
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7331, 2012

      Zvi Retchkiman Konigsberg   The Biological Interaction Stability
                                  Problem  . . . . . . . . . . . . . . . . 1--10
                 Komla A. Folly   Population-Based Incremental with
                                  Adaptive Learning Rate Strategy  . . . . 11--20
                    Ling Yu and   
                    Peng Xu and   
                        Xi Chen   A SI-Based Algorithm for Structural
                                  Damage Detection . . . . . . . . . . . . 21--28
                Jinlong Cao and   
                   Hongyuan Gao   A Quantum-inspired Bacterial Swarming
                                  Optimization Algorithm for Discrete
                                  Optimization Problems  . . . . . . . . . 29--36
              Anirban Kundu and   
                     Chunlin Ji   Swarm Intelligence in Cloud Environment  37--44
                    Bo Xing and   
               Wen-Jing Gao and   
    Fulufhelo V. Nelwamondo and   
            Kimberly Battle and   
              Tshilidzi Marwala   Swarm Intelligence Supported
                                  e-Remanufacturing  . . . . . . . . . . . 45--52
              Ming-Feng Yeh and   
                  Cheng Wen and   
                 Min-Shyang Leu   Grey-Based Particle Swarm Optimization
                                  Algorithm  . . . . . . . . . . . . . . . 53--62
                      Ya Li and   
                     Dan Li and   
                      Dong Wang   Quantum-Behaved Particle Swarm
                                  Optimization Algorithm Based on Border
                                  Mutation and Chaos for Vehicle Routing
                                  Problem  . . . . . . . . . . . . . . . . 63--73
                Wei-xing Li and   
                  Qian Zhou and   
                     Yu Zhu and   
                       Feng Pan   An Improved MOPSO with a Crowding
                                  Distance Based External Archive
                                  Maintenance Strategy . . . . . . . . . . 74--82
                 T. O. Ting and   
                  Yuhui Shi and   
                  Shi Cheng and   
                   Sanghyuk Lee   Exponential Inertia Weight for Particle
                                  Swarm Optimization . . . . . . . . . . . 83--90
                Jiarui Zhou and   
                    Zhen Ji and   
                 Zexuan Zhu and   
                    Siping Chen   A Coevolutionary Memetic Particle Swarm
                                  Optimizer  . . . . . . . . . . . . . . . 91--100
                    Wei Wei and   
               Weihui Zhang and   
                 Yuan Jiang and   
                         Hao Li   Handling Multi-optimization with
                                  Gender-Hierarchy Based Particle Swarm
                                  Optimizer  . . . . . . . . . . . . . . . 101--108
             Guoliang Huang and   
                Xinling Shi and   
                    Zhenzhou An   The Comparative Study of Different
                                  Number of Particles in Clustering Based
                                  on Two-Layer Particle Swarm Optimization 109--115
                  Yubo Tian and   
                Donghui Gao and   
                    Xiaolong Li   Improved Particle Swarm Optimization
                                  with Wavelet-Based Mutation Operation    116--124
                 Yuhong Chi and   
                 Fuchun Sun and   
              Langfan Jiang and   
                Chunming Yu and   
                     Ping Zhang   Elastic Boundary for Particle Swarm
                                  Optimization . . . . . . . . . . . . . . 125--132
             Ming-Tang Tsai and   
                     Szu-Wzi Wu   Optimization Locations of Wind Turbines
                                  with the Particle Swarm Optimization . . 133--141
               Zhanghui Liu and   
                    Xiaoli Wang   A PSO-Based Algorithm for Load Balancing
                                  in Virtual Machines of Cloud Computing
                                  Environment  . . . . . . . . . . . . . . 142--147
                Xiufang Lin and   
                    Jun Sun and   
              Vasile Palade and   
                   Wei Fang and   
                 Xiaojun Wu and   
                       Wenbo Xu   Training ANFIS Parameters with a
                                  Quantum-behaved Particle Swarm
                                  Optimization Algorithm . . . . . . . . . 148--155
                   Ying Sun and   
                    Yue-lin Gao   Research on Improved Model of Loans
                                  Portfolio Optimization Based on Adaptive
                                  Particle Swarm Optimization Algorithm    156--163
                   Penchen Chou   High-Dimension Optimization Problems
                                  Using Specified Particle Swarm
                                  Optimization . . . . . . . . . . . . . . 164--172
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7332, 2012

         Seyed Naser Razavi and   
               Nicolas Gaud and   
   Abderrafiâa Koukam and   
                 Naser Mozayani   An Automatic Learning System to Derive
                                  Multipole and Local Expansions for the
                                  Fast Multipole Method  . . . . . . . . . 1--10
                  Cheng Liu and   
                 Yong Liang and   
                Xin-Ze Luan and   
            Kwong-Sak Leung and   
              Tak-Ming Chan and   
                    Zong-Ben Xu   Iterative $L_{1/2}$ Regularization
                                  Algorithm for Variable Selection in the
                                  Cox Proportional Hazards Model . . . . . 11--17
                Junbo Zhang and   
                 Fuping Pan and   
                   Yongyong Yan   Automatic Scoring on English Passage
                                  Reading Quality  . . . . . . . . . . . . 18--25
                    Bo Song and   
                     Miaoyan Li   An e-Learning System Based on GWT and
                                  Berkeley DB  . . . . . . . . . . . . . . 26--32
                   Jie Xiao and   
                       Liang He   An Expandable Recommendation System on
                                  IPTV . . . . . . . . . . . . . . . . . . 33--40
                 Wei-Chen Cheng   Intrinsic Protein Distribution on
                                  Manifolds Embedded in Low-Dimensional
                                  Space  . . . . . . . . . . . . . . . . . 41--48
                Zhuhong You and   
                 Yingke Lei and   
                    Zhen Ji and   
                     Zexuan Zhu   A Novel Approach to Modelling
                                  Protein-Protein Interaction Networks . . 49--57
              Jiuling Zhang and   
               Beixing Deng and   
                        Xing Li   Additive Order Preserving Encryption
                                  Based Encrypted Documents Ranking in
                                  Secure Cloud Storage . . . . . . . . . . 58--65
                    Jian Wu and   
                   Siyong Xiong   Research of Web Image Retrieval
                                  Technology Based on Hu Invariant Moments 66--73
                   Xi Huang and   
                   Ying Tan and   
                      Xingui He   A Classifier Based on Minimum Circum
                                  Circle . . . . . . . . . . . . . . . . . 74--83
                Xiquan Yang and   
                Meijia Wang and   
                   Lin Fang and   
                    Lin Yue and   
                     Yinghua Lv   Research on Domain-Specific Features
                                  Clustering Based Spectral Clustering . . 84--92
                       Yang Wei   An Iterative Approach to Keywords
                                  Extraction . . . . . . . . . . . . . . . 93--99
               Rupeng Liang and   
                 Hongwei Li and   
                  Jian Chen and   
                  Leilei Ma and   
                        Hu Chen   Knowledge Annotation Framework Oriented
                                  Geospatial Semantic Web Service
                                  Management . . . . . . . . . . . . . . . 100--107
               Wenjuan Zang and   
                 Yankui Liu and   
                    Zhenhong Li   Optimizing Supplier Selection with
                                  Disruptions by Chance-Constrained
                                  Programming  . . . . . . . . . . . . . . 108--116
      Abdelghani Bellaachia and   
                    Anasse Bari   Flock by Leader: a Novel Machine
                                  Learning Biologically Inspired
                                  Clustering Algorithm . . . . . . . . . . 117--126
          Amel Grissa Touzi and   
                Amira Aloui and   
                  Rim Mahouachi   Cluster\_KDD: a Visual Clustering and
                                  Knowledge Discovery Platform Based on
                                  Concept Lattice  . . . . . . . . . . . . 127--136
                     Zhe Qu and   
                       Qin Wang   Design and Implementation of an
                                  Intelligent Automatic Question Answering
                                  System Based on Data Mining  . . . . . . 137--146
              Huanglin Zeng and   
                    Xuefei Tang   Comprehensive Evaluation of Chinese
                                  Liquor Quality Based on Improved
                                  Gray-Clustering Analysis . . . . . . . . 147--154
                Xiquan Yang and   
                    Rui Gao and   
                Zhengfu Han and   
                        Xin Sui   Ontology-Based Hazard Information
                                  Extraction from Chinese Food Complaint
                                  Documents  . . . . . . . . . . . . . . . 155--163
                    Qun Liu and   
                     Yi Gao and   
                   Zhiming Peng   A Novel Collaborative Filtering
                                  Algorithm Based on Social Network  . . . 164--174
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7333, 2012

          Francesco Versaci and   
                 Keshav Pingali   Processor Allocation for Optimistic
                                  Parallelization of Irregular Programs    1--14
            Constantin Timm and   
        Markus Görlich and   
             Frank Weichert and   
             Peter Marwedel and   
           Heinrich Müller   Feedback-Based Global Instruction
                                  Scheduling for GPGPU Applications  . . . 15--28
             Murilo Boratto and   
               Pedro Alonso and   
               Carla Ramiro and   
             Marcos Barreto and   
                 Leandro Coelho   Parallel Algorithm for Landform
                                  Attributes Representation on Multicore
                                  and Multi-GPU Systems  . . . . . . . . . 29--43
              Italo Epicoco and   
                Silvia Mocavero   The Performance Model of an Enhanced
                                  Parallel Algorithm for the SOR Method    44--56
Juan Francisco Sanjuan-Estrada and   
   Leocadio Gonzalez Casado and   
       Immaculada García   Performance Driven Cooperation between
                                  Kernel and Auto-tuning Multi-threaded
                                  Interval B&B Applications . . . . . . . . 57--70
       Ahmed Shamsul Arefin and   
             Carlos Riveros and   
            Regina Berretta and   
                  Pablo Moscato   $k$ NN-Bor\ocircuvka--GPU: a Fast and
                                  Scalable MST Construction from $k$ NN
                                  Graphs on GPU  . . . . . . . . . . . . . 71--86
                 Habib Shah and   
            Rozaida Ghazali and   
            Nazri Mohd Nawi and   
              Mustafa Mat Deris   Global Hybrid Ant Bee Colony Algorithm
                                  for Training Artificial Neural Networks  87--100
         Daniel S. F. Alves and   
 Felipe M. G. França and   
   Luiza de Macedo Mourelle and   
                   Nadia Nedjah   The Effect of Intelligent Escape on
                                  Distributed SER-Based Search . . . . . . 101--112
          Luneque Silva Jr. and   
               Nadia Nedjah and   
   Luiza de Macedo Mourelle and   
Fábio Gonçalves Pessanha   ACO-Based Static Routing for
                                  Network-on-Chips . . . . . . . . . . . . 113--124
        Leonardo G. Fonseca and   
        Heder S. Bernardino and   
            Helio J. C. Barbosa   A Genetic Algorithm Assisted by a
                                  Locally Weighted Regression Surrogate
                                  Model  . . . . . . . . . . . . . . . . . 125--135
Rafael Mathias de Mendonça and   
               Nadia Nedjah and   
       Luiza de Macedo Mourelle   Swarm Robots with Queue Organization
                                  Using Infrared Communication . . . . . . 136--147
  Rogério M. Calazan and   
               Nadia Nedjah and   
       Luiza de Macedo Mourelle   Swarm Grid: a Proposal for High
                                  Performance of Parallel Particle Swarm
                                  Optimization Using GPGPU . . . . . . . . 148--160
   Samir A. Mohamed Elsayed and   
    Sanguthevar Rajasekaran and   
                  Reda A. Ammar   An Artificial Immune System Approach to
                                  Associative Classification . . . . . . . 161--171
Sanderson L. Gonzaga de Oliveira   A Review on Delaunay Refinement
                                  Techniques . . . . . . . . . . . . . . . 172--187
            Kushan Ahmadian and   
               Marina Gavrilova   Axis-Parallel Dimension Reduction for
                                  Biometric Research . . . . . . . . . . . 188--197
Sanderson L. Gonzaga de Oliveira   An Overview of Procedures for Refining
                                  Triangulations . . . . . . . . . . . . . 198--213
               Joonsoo Choi and   
                 Jaewee Heo and   
             Kwang-Soo Hahn and   
                      Junho Kim   DEM Interpolation from Contours Using
                                  Medial Axis Transformation . . . . . . . 214--227
José Luiz de Souza Filho and   
        Roger Correia Silva and   
        Dhiego Oliveira Sad and   
              Renan Dembogurski   Analysis of a High Definition
                                  Camera-Projector Video System for
                                  Geometry Reconstruction  . . . . . . . . 228--239
           Tiago F. Pereira and   
         Marcus A. Angeloni and   
Flávio O. Simões and   
   José Eduardo C. Silva   Video-Based Face Verification with Local
                                  Binary Patterns and SVM Using GMM
                                  Supervectors . . . . . . . . . . . . . . 240--252
                 Marta Fort and   
           J. Antoni Sellar\`es   GPU-Based Influence Regions Optimization 253--266
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7334, 2012

       Annunziata de Felice and   
          Isabella Martucci and   
         Dario Antonio Schirone   Knowledge and Innovation in
                                  Manufacturing Sector: The Case of
                                  Wedding Dresses in Southern Italy  . . . 1--16
     Dario Antonio Schirone and   
                 Germano Torkan   Marketing Strategies: Support and
                                  Enhancement of Core Business . . . . . . 17--26
          Gianluigi De Mare and   
          Antonio Nestic\`o and   
               Francesco Tajani   The Rational Quantification of Social
                                  Housing  . . . . . . . . . . . . . . . . 27--43
            Mauro Dell'Orco and   
            Michele Ottomanelli   Simulation of Users Decision in
                                  Transport Mode Choice Using Neuro-Fuzzy
                                  Approach . . . . . . . . . . . . . . . . 44--53
              Maria Cerreta and   
              Simona Panaro and   
             Daniele Cannatella   Multidimensional Spatial Decision-Making
                                  Process: Local Shared Values in Action   54--70
       Francesco Campobasso and   
               Annarita Fanizzi   A Proposal for a Stepwise Fuzzy
                                  Regression: An Application to the
                                  Italian University System  . . . . . . . 71--87
          Paola Perchinunno and   
         Dario Antonio Schirone   Cluster Analysis for Strategic
                                  Management: a Case Study of IKEA . . . . 88--101
         Silvestro Montrone and   
              Paola Perchinunno   Clustering for the Localization of
                                  Degraded Urban Areas . . . . . . . . . . 102--115
            Pasquale Balena and   
       Giovanna Mangialardi and   
            Carmelo Maria Torre   A BEP Analysis of Energy Supply for
                                  Sustainable Urban Microgrids . . . . . . 116--127
           Sebastiano Carbonara   The Effect of Infrastructural Works on
                                  Urban Property Values: The asse
                                  attrezzato in Pescara, Italy . . . . . . 128--143
             Marco Selicato and   
        Carmelo Maria Torre and   
              Giovanni La Trofa   Prospect of Integrate Monitoring: a
                                  Multidimensional Approach  . . . . . . . 144--156
         Luigi Fusco Girard and   
            Carmelo Maria Torre   The Use of Ahp in a Multiactor
                                  Evaluation for Urban Development
                                  Programs: a Case Study . . . . . . . . . 157--167
              Maria Cerreta and   
               Pasquale De Toro   Assessing Urban Transformations: a SDSS
                                  for the Master Plan of Castel Capuano,
                                  Naples . . . . . . . . . . . . . . . . . 168--180
Luis Paulo da Silva Carvalho and   
         Paulo Caetano da Silva   Computational Context to Promote
                                  Geographic Information Systems toward
                                  Human-Centric Perspectives . . . . . . . 181--193
          Mehran Ghandehari and   
               Farid Karimipour   Voronoi-Based Curve Reconstruction:
                                  Issues and Solutions . . . . . . . . . . 194--207
           Julia Gonschorek and   
         Lucia Tyrallová   Geovisualization and Geostatistics: a
                                  Concept for the Numerical and Visual
                                  Analysis of Geographic Mass Data . . . . 208--219
     Lucia Tyrallová and   
               Julia Gonschorek   Spatio-Explorative Analysis and Its
                                  Benefits for a GIS-integrated Automated
                                  Feature Identification . . . . . . . . . 220--233
            Adriano Fiorese and   
        Paulo Simões and   
               Fernando Boavida   Peer Selection in P2P Service Overlays
                                  Using Geographical Location Criteria . . 234--248
              Morton E. O'Kelly   Models for Spatial Interaction Data:
                                  Computation and Interpretation of
                                  Accessibility  . . . . . . . . . . . . . 249--262
                 Daniel Lederer   Am I Safe in My Home? Fear of Crime
                                  Analyzed with Spatial Statistics Methods
                                  in a Central European City . . . . . . . 263--274
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7335, 2012

             Humberto Rocha and   
              Joana M. Dias and   
        Brigida C. Ferreira and   
           Maria do Carmo Lopes   Incorporating Radial Basis Functions in
                                  Pattern Search Methods: Application to
                                  Beam Angle Optimization in Radiotherapy
                                  Treatment Planning . . . . . . . . . . . 1--16
         Ana Paula Teixeira and   
                 Regina Almeida   On the Complexity of a Mehrotra-Type
                                  Predictor-Corrector Algorithm  . . . . . 17--29
          Tiago Costa Gomes and   
   Filipe Pereira e Alvelos and   
         Maria Sameiro Carvalho   Design of Wood Biomass Supply Chains . . 30--44
      Eligius M. T. Hendrix and   
               Rene Haijema and   
              Roberto Rossi and   
         Karin G. J. Pauls-Worm   On Solving a Stochastic Programming
                                  Model for Perishable Inventory Control   45--56
      Ana Maria A. C. Rocha and   
       M. Fernanda P. Costa and   
       Edite M. G. P. Fernandes   An Artificial Fish Swarm Filter-Based
                                  Method for Constrained Global
                                  Optimization . . . . . . . . . . . . . . 57--71
        Md. Abul Kalam Azad and   
      Ana Maria A. C. Rocha and   
       Edite M. G. P. Fernandes   Solving Multidimensional 0--1 Knapsack
                                  Problem with an Artificial Fish Swarm
                                  Algorithm  . . . . . . . . . . . . . . . 72--86
               Pankaj Gupta and   
               Shilpi Verma and   
          Mukesh Kumar Mehlawat   Optimization Model of COTS Selection
                                  Based on Cohesion and Coupling for
                                  Modular Software Systems under Multiple
                                  Applications Environment . . . . . . . . 87--102
      Florbela P. Fernandes and   
       M. Fernanda P. Costa and   
       Edite M. G. P. Fernandes   A Derivative-Free Filter Driven
                                  Multistart Technique for Global
                                  Optimization . . . . . . . . . . . . . . 103--118
   José L. Berenguel and   
         Leocadio G. Casado and   
           I. García and   
      Eligius M. T. Hendrix and   
                     F. Messine   On Lower Bounds Using Additively
                                  Separable Terms in Interval B&B . . . . . 119--132
     José Figueiredo and   
    José A. Oliveira and   
                  Luis Dias and   
        Guilherme A. B. Pereira   A Genetic Algorithm for the Job Shop on
                                  an ASRS Warehouse  . . . . . . . . . . . 133--146
         Ana C. M. Ferreira and   
      Ana Maria A. C. Rocha and   
   Senhorinha F. C. F. Teixeira   On Solving the Profit Maximization of
                                  Small Cogeneration Systems . . . . . . . 147--158
      Eligius M. T. Hendrix and   
         Leocadio G. Casado and   
                   Paula Amaral   Global Optimization Simplex Bisection
                                  Revisited Based on Considerations by
                                  Reiner Horst . . . . . . . . . . . . . . 159--173
            Manuel Ferreira and   
    José Carlos Teixeira   Application of Variance Analysis to the
                                  Combustion of Residual Oils  . . . . . . 174--186
       Carla A. S. Geraldes and   
     Maria Sameiro Carvalho and   
        Guilherme A. B. Pereira   Warehouse Design and Planning: a
                                  Mathematical Programming Approach  . . . 187--201
José Carlos Teixeira and   
              Ricardo Lomba and   
Senhorinha F. C. F. Teixeira and   
               Pedro Lobarinhas   Application of CFD Tools to Optimize
                                  Natural Building Ventilation Design  . . 202--216
               Junghoon Lee and   
            Gyung-Leen Park and   
               Min-Jae Kang and   
              Ho-Young Kwak and   
              Sang Joon Lee and   
                    Jikwang Han   Middleware Integration for Ubiquitous
                                  Sensor Networks in Agriculture . . . . . 217--226
                Hokwon Song and   
               Changwoo Min and   
                Jeehong Kim and   
                   Young Ik Eom   Usage Pattern-Based Prefetching: Quick
                                  Application Launch on Mobile Devices . . 227--237
                Sunwook Bae and   
                Hokwon Song and   
               Changwoo Min and   
                Jeehong Kim and   
                   Young Ik Eom   EIMOS: Enhancing Interactivity in Mobile
                                  Operating Systems  . . . . . . . . . . . 238--247
             Young-Hyuk Kim and   
                Il-Kown Lim and   
                Jae-Pil Lee and   
              Jae-Gwang Lee and   
                  Jae-Kwang Lee   Development of Mobile Hybrid
                                  MedIntegraWeb App for Interoperation
                                  between $u$-RPMS and HIS . . . . . . . . 248--258
                 Duc Tai Le and   
               Thang Le Duc and   
                 Hyunseung Choo   A Distributed Lifetime-Maximizing Scheme
                                  for Connected Target Coverage in WSNs    259--271
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7336, 2012

  Eduardo Augusto Silvestre and   
       Michel dos Santos Soares   Modeling Road Traffic Signals Control
                                  Using UML and the MARTE Profile  . . . . 1--15
   Michel dos Santos Soares and   
         Daniel Souza Cioquetta   Analysis of Techniques for Documenting
                                  User Requirements  . . . . . . . . . . . 16--28
José Luis Ordiales Coscia and   
               Marco Crasso and   
            Cristian Mateos and   
               Alejandro Zunino   Predicting Web Service Maintainability
                                  via Object-Oriented Metrics: a
                                  Statistics-Based Approach  . . . . . . . 29--39
                 Matthias Biehl   Early Automated Verification of Tool
                                  Chain Design . . . . . . . . . . . . . . 40--50
           Vitor A. Batista and   
      Daniela C. C. Peixoto and   
        Wilson Pádua and   
Clarindo Isaías P. S. Pádua   Using UML Stereotypes to Support the
                                  Requirement Engineering: a Case Study    51--66
   Gleison S. do Nascimento and   
              Cirano Iochpe and   
       Lucinéia Thom and   
        André C. Kalsing   Identifying Business Rules to Legacy
                                  Systems Reengineering Based on BPM and
                                  SOA  . . . . . . . . . . . . . . . . . . 67--82
           Mohamed A. El-Zawawy   Abstraction Analysis and Certified Flow
                                  and Context Sensitive Points-to Relation
                                  for Distributed Programs . . . . . . . . 83--99
                  Yan Zhang and   
                     Yi Liu and   
                   Zhiyi Ma and   
                Xuying Zhao and   
              Xiaokun Zhang and   
                     Tian Zhang   An Approach to Measure Understandability
                                  of Extended UML Based on Metamodel . . . 100--115
José Alfonso Aguilar and   
      Irene Garrigós and   
 Jose-Norberto Mazón and   
         Anibal Zaldívar   Dealing with Dependencies among
                                  Functional and Non-functional
                                  Requirements for Impact Analysis in Web
                                  Engineering  . . . . . . . . . . . . . . 116--131
   Eudisley Gomes dos Anjos and   
         Ruan Delgado Gomes and   
        Mário Zenha-Rela   Assessing Maintainability Metrics in
                                  Software Architectures Using COSMIC and
                                  UML  . . . . . . . . . . . . . . . . . . 132--146
          Kusum Lata Pandey and   
            Suneeta Agarwal and   
               Sanjay Misra and   
                  Rajesh Prasad   Plagiarism Detection in Software Using
                                  Efficient String Matching  . . . . . . . 147--156
               Ruchi Shukla and   
               Mukul Shukla and   
                A. K. Misra and   
                 T. Marwala and   
                   W. A. Clarke   Dynamic Software Maintenance Effort
                                  Estimation Modeling Using Neural
                                  Network, Rule Engine and
                                  Multi-regression Approach  . . . . . . . 157--169
                 Hendrik Decker   New Measures for Maintaining the Quality
                                  of Databases . . . . . . . . . . . . . . 170--185
                Ali Orhan Aydin   A New Way to Determine External Quality
                                  of ERP Software  . . . . . . . . . . . . 186--201
        Jácome Cunha and   
   João P. Fernandes and   
               Hugo Ribeiro and   
            João Saraiva   Towards a Catalog of Spreadsheet Smells  202--216
              Pedro Martins and   
                Paulo Lopes and   
   João P. Fernandes and   
        João Saraiva and   
      João M. P. Cardoso   Program and Aspect Metrics for MATLAB    217--233
               Sanjay Misra and   
              Murat Koyuncu and   
               Marco Crasso and   
            Cristian Mateos and   
               Alejandro Zunino   A Suite of Cognitive Complexity Metrics  234--247
            Adewole Adewumi and   
               Sanjay Misra and   
         Nicholas Ikhu-Omoregbe   Complexity Metrics for Cascading Style
                                  Sheets . . . . . . . . . . . . . . . . . 248--257
             Yasser A. Khan and   
           Mahmoud O. Elish and   
               Mohamed El-Attar   A Systematic Review on the Impact of CK
                                  Metrics on the Functional Correctness of
                                  Object-Oriented Classes  . . . . . . . . 258--273
André Ricardo Abed Grégio and   
         Vitor Monte Afonso and   
Dario Simões Fernandes Filho   Pinpointing Malicious Activities through
                                  Network and System-Level Malware
                                  Execution Behavior . . . . . . . . . . . 274--285
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7337, 2012

              Bernhard Thalheim   Syntax, Semantics and Pragmatics of
                                  Conceptual Modelling . . . . . . . . . . 1--10
      Heiner Stuckenschmidt and   
              Cäcilia Zirn   Multi-dimensional Analysis of Political
                                  Documents  . . . . . . . . . . . . . . . 11--22
               Theodoros Lappas   Fake Reviews: The Malicious Perspective  23--34
            Manfred Klenner and   
              Stefanos Petrakis   Polarity Preference of Verbs: What Could
                                  Verbs Reveal about the Polarity of Their
                                  Objects? . . . . . . . . . . . . . . . . 35--46
               Antje Schlaf and   
          Amit Kirschenbaum and   
               Robert Remus and   
                    Thomas Efer   Labeling Queries for a People Search
                                  Engine . . . . . . . . . . . . . . . . . 47--57
         Anurag Dwarakanath and   
            Shubhashis Sengupta   Litmus: Generation of Test Cases from
                                  Functional Requirements in Natural
                                  Language . . . . . . . . . . . . . . . . 58--69
      Sara Botelho Silveira and   
          António Branco   Extracting Multi-document Summaries with
                                  a Double Clustering Approach . . . . . . 70--81
       Georgios Kontonasios and   
       Ioannis Korkontzelos and   
               Sophia Ananiadou   Developing Multilingual Text Mining
                                  Workflows in UIMA and U-Compare  . . . . 82--93
José M. Perea-Ortega and   
L. Alfonso Ureña-López   Geographic Expansion of Queries to
                                  Improve the Geographic Information
                                  Retrieval Task . . . . . . . . . . . . . 94--103
               Yllias Chali and   
             Sadid A. Hasan and   
                    Kaisar Imam   Learning Good Decompositions of Complex
                                  Questions  . . . . . . . . . . . . . . . 104--115
             Le Minh Nguyen and   
                  Akira Shimazu   A Semi Supervised Learning Model for
                                  Mapping Sentences to Logical form with
                                  Ambiguous Supervision  . . . . . . . . . 116--127
              Johannes Leveling   On the Effect of Stopword Removal for
                                  SMS-Based FAQ Retrieval  . . . . . . . . 128--139
         Christopher Boston and   
            Sandra Carberry and   
                       Hui Fang   Wikimantic: Disambiguation for Short
                                  Queries  . . . . . . . . . . . . . . . . 140--151
         Maciej Ogrodniczuk and   
     Adam Przepiórkowski   Polish Language Processing Chains for
                                  Multilingual Information Systems . . . . 152--157
          Volodymyr Kysenko and   
                  Karl Rupp and   
        Oleksandr Marchenko and   
           Siegfried Selberherr   GPU-Accelerated Non-negative Matrix
                                  Factorization for Text Mining  . . . . . 158--163
        Alessandra Giordani and   
           Alessandro Moschitti   Generating SQL Queries Using Natural
                                  Language Syntactic Dependencies and
                                  Metadata . . . . . . . . . . . . . . . . 164--170
              Lars Buitinck and   
                   Maarten Marx   Two-Stage Named-Entity Recognition Using
                                  Averaged Perceptrons . . . . . . . . . . 171--176
                    Niels Bloom   Using Natural Language Processing to
                                  Improve Document Categorization with
                                  Associative Networks . . . . . . . . . . 177--182
                  Chaker Jebari   MLICC: a Multi-Label and Incremental
                                  Centroid-Based Classification of Web
                                  Pages by Genre . . . . . . . . . . . . . 183--190
              Gerwin Kramer and   
                Gosse Bouma and   
          Dennis Hendriksen and   
               Mathijs Homminga   Classifying Image Galleries into a
                                  Taxonomy Using Metadata and Wikipedia    191--196
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7338, 2012

                David Maier and   
               V. M. Megler and   
 António M. Baptista and   
             Alex Jaramillo and   
                 Charles Seaton   Navigating Oceans of Data  . . . . . . . 1--19
          Kostas Patroumpas and   
        Marios Papamichalis and   
                   Timos Sellis   Probabilistic Range Monitoring of
                                  Streaming Uncertain Positions in
                                  GeoSocial Networks . . . . . . . . . . . 20--37
           Thomas Bernecker and   
         Hans-Peter Kriegel and   
              Matthias Renz and   
            Florian Verhein and   
             Andreas Züfle   Probabilistic Frequent Pattern Growth
                                  for Itemset Mining in Uncertain
                                  Databases  . . . . . . . . . . . . . . . 38--55
                   Xike Xie and   
              Reynold Cheng and   
                   Man Lung Yiu   Evaluating Trajectory Queries over
                                  Imprecise Location Data  . . . . . . . . 56--74
                 Dongbo Dai and   
                  Jiang Xie and   
               Huiran Zhang and   
                     Jiaqi Dong   Efficient Range Queries over Uncertain
                                  Strings  . . . . . . . . . . . . . . . . 75--95
                 Nina Hubig and   
         Andreas Züfle and   
              Tobias Emrich and   
        Mario A. Nascimento and   
                  Matthias Renz   Continuous Probabilistic Sum Queries in
                                  Wireless Sensor Networks with Ranges . . 96--105
             Lars Dannecker and   
        Matthias Böehm and   
            Wolfgang Lehner and   
            Gregor Hackenbroich   Partitioning and Multi-core
                                  Parallelization of Multi-equation
                                  Forecast Models  . . . . . . . . . . . . 106--123
                    Mian Lu and   
                  Yuwei Tan and   
                Jiuxin Zhao and   
                     Ge Bai and   
                      Qiong Luo   Integrating GPU-Accelerated Sequence
                                  Alignment and SNP Detection for Genome
                                  Resequencing Analysis  . . . . . . . . . 124--140
             Akrivi Vlachou and   
       Christos Doulkeridis and   
                  Maria Halkidi   Discovering Representative Skyline
                                  Points over Distributed Data . . . . . . 141--158
 László Dobos and   
Tamás Budavári and   
                   Nolan Li and   
        Alexander S. Szalay and   
           István Csabai   SkyQuery: An Implementation of a
                                  Parallel Probabilistic Join Engine for
                                  Cross-Identification of Multiple
                                  Astronomical Databases . . . . . . . . . 159--167
             Ryadh Dahimene and   
            Cedric Du Mouza and   
                  Michel Scholl   Efficient Filtering in Micro-blogging
                                  Systems: We Won't Get Flooded Again  . . 168--176
   André Koschmieder and   
                      Ulf Leser   Regular Path Queries on Large Graphs . . 177--194
                 Xuesong Lu and   
        Stéphane Bressan   Sampling Connected Induced Subgraphs
                                  Uniformly at Random  . . . . . . . . . . 195--212
               Elena Valari and   
              Maria Kontaki and   
      Apostolos N. Papadopoulos   Discovery of Top-$k$ Dense Subgraphs in
                                  Dynamic Graph Collections  . . . . . . . 213--230
                  Weiren Yu and   
                  Jiajin Le and   
                 Xuemin Lin and   
                   Wenjie Zhang   On the Efficiency of Estimating
                                  Penetrating Rank on Large Graphs . . . . 231--249
              Xiaofei Zhang and   
                   Lei Chen and   
                       Min Wang   Towards Efficient Join Processing over
                                  Large RDF Graph Using MapReduce  . . . . 250--259
               Yannis Ioannidis   Panel on ``Data Infrastructures and Data
                                  Management Research: Close Relatives or
                                  Total Strangers?'' . . . . . . . . . . . 260--261
                 Dandy Fenz and   
               Dustin Lange and   
    Astrid Rheinländer and   
              Felix Naumann and   
                      Ulf Leser   Efficient Similarity Search in Very
                                  Large String Sets  . . . . . . . . . . . 262--279
     Stephan Günnemann and   
             Brigitte Boden and   
                   Thomas Seidl   Substructure Clustering: a Novel Mining
                                  Paradigm for Arbitrary Data Types  . . . 280--297
             Philipp Kranen and   
             Marwan Hassani and   
                   Thomas Seidl   BT* --- An Advanced Algorithm for
                                  Anytime Classification . . . . . . . . . 298--315
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7339, 2012

          Marcin Grzegorzek and   
                   Paula Lubina   Blood Vessel Segmentation in HRT Images
                                  for Glaucoma Early Detection . . . . . . 1--12
           Robert Koprowski and   
             Slawomir Teper and   
            Edward Wylegala and   
          Zygmunt Wróbel   Enhancing the Quality of Layer Detection
                                  in Tomographic Images of the Eye . . . . 13--23
                 Tomasz Pieciak   Segmentation of the Left Ventricle Using
                                  Active Contour Method with Gradient
                                  Vector Flow Forces in Short-Axis MRI . . 24--35
              Pawe\l Szwarc and   
                 Jacek Kawa and   
                     Ewa Pietka   White Matter Segmentation from MR Images
                                  in Subjects with Brain Tumours . . . . . 36--46
              Pawe\l Badura and   
                     Ewa Pietka   3D Fuzzy Liver Tumor Segmentation  . . . 47--57
          Joanna Czajkowska and   
              Monika Bugdol and   
                     Ewa Pietka   Kernelized Fuzzy C-Means Method and
                                  Gaussian Mixture Model in Unsupervised
                                  Cascade Clustering . . . . . . . . . . . 58--66
     Joanna Jaworek-Korjakowska   Automatic Detection of Melanomas: An
                                  Application Based on the ABCD Criteria   67--76
      Magdalena Jasionowska and   
            Artur Przelaskowski   Subtle Directional Mammographic Findings
                                  in Multiscale Domain . . . . . . . . . . 77--84
           Pawe\l Filipczuk and   
            Weronika Wojtak and   
             Andrzej Obuchowicz   Automatic Nuclei Detection on
                                  Cytological Images Using the Firefly
                                  Optimization Algorithm . . . . . . . . . 85--92
             Piotr Zarychta and   
               Henryk Konik and   
        Anna Zarychta-Bargie\la   Computer Assisted Location of the Lower
                                  Limb Mechanical Axis . . . . . . . . . . 93--100
            Grzegorz Ostrek and   
            Artur Przelaskowski   Automatic Early Stroke Recognition
                                  Algorithm in CT Images . . . . . . . . . 101--109
              Ewa Majchrzak and   
     Miros\law Dziewo\'nski and   
              Mariusz Nowak and   
              Marek Kawecki and   
                Micha\l Bachorz   The Design of a System for Assisting
                                  Burn and Chronic Wound Diagnosis . . . . 110--117
           Pawe\l Popielski and   
          Zygmunt Wróbel   The Feature Detection on the Homogeneous
                                  Surfaces with Projected Pattern  . . . . 118--128
        Artur Przelaskowski and   
                  Rafal Jozwiak   Sensed Compression with Cosine and
                                  Noiselet Measurements for Medical
                                  Imaging  . . . . . . . . . . . . . . . . 129--142
              Marcin Rudzki and   
              Monika Bugdol and   
             Tomasz Ponikiewski   An Image Processing Approach to
                                  Determination of Steel Fibers
                                  Orientation in Reinforced Concrete . . . 143--150
          Juliusz L. Kulikowski   Multichannel Biomedical Signals Analysis
                                  Based on a Split-and-Collect Approach    151--160
            Branko Babusiak and   
                    Michal Gala   Detection of Abnormalities in ECG  . . . 161--171
 Brygida Przywara-Chowaniec and   
            Lech Polo\'nski and   
         Maciej Gawlikowski and   
               Tadeusz Pustelny   Research into the Possibility to Use
                                  Impedance Rheocardiography in a
                                  Non-invasive Assessment of Haemodynamic
                                  Condition of Patients with Heart
                                  Diseases . . . . . . . . . . . . . . . . 172--182
Teresa Podsiadly-Marczykowska and   
              Hanna Goszczynska   Ontology of EEG Mapping --- Preliminary
                                  Research . . . . . . . . . . . . . . . . 183--198
            Marek Kurzynski and   
             Andrzej Wolczowski   Control System of Bioprosthetic Hand
                                  Based on Advanced Analysis of Biosignals
                                  and Feedback from the Prosthesis Sensors 199--208
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7340, 2012

           Layachi Bentabet and   
                      Hui Zhang   Bayesian Image Matting Using Infrared
                                  and Color Cues . . . . . . . . . . . . . 1--8
             Steven Le Moan and   
            Ferdinand Deger and   
            Alamin Mansouri and   
                Yvon Voisin and   
               Jon Y. Hardeberg   Salient Pixels and Dimensionality
                                  Reduction for Display of
                                  Multi/Hyperspectral Images . . . . . . . 9--16
             Aissam Bekkari and   
           Soufiane Idbraim and   
        Azeddine Elhassouny and   
              Driss Mammass and   
               Mostafa El yassa   SVM and Haralick Features for
                                  Classification of High Resolution
                                  Satellite Images from Urban Areas  . . . 17--26
      Grzegorz M\kaczkowski and   
              Robert Sitnik and   
             Jakub Krzes\lowski   Data Acquisition Enhancement in Shape
                                  and Multispectral Color Measurements of
                                  $3$D Objects . . . . . . . . . . . . . . 27--35
    Ahmed Drissi El Maliani and   
       Mohammed El Hassouni and   
        Yannick Berthoumieu and   
              Driss Aboutajdine   Multi-model Approach for Multicomponent
                                  Texture Classification . . . . . . . . . 36--44
              Raju Shrestha and   
            Jon Yngve Hardeberg   Simultaneous Multispectral Imaging and
                                  Illuminant Estimation Using a Stereo
                                  Camera . . . . . . . . . . . . . . . . . 45--55
        Azeddine Elhassouny and   
           Soufiane Idbraim and   
            Aissam Bekkarri and   
              Driss Mammass and   
                Danielle Ducrot   Multisource Fusion/Classification Using
                                  ICM and DSmT with New Decision Rule  . . 56--64
              Zouhir Mahani and   
                Jalal Zahid and   
                Sahar Saoud and   
          Mohammed El Rhabi and   
                Abdelilah Hakim   Text Enhancement by PDE's Based Methods  65--76
               Hicham Badri and   
       Mohammed El Hassouni and   
              Driss Aboutajdine   Kernel-Based Laplacian Smoothing Method
                                  for $3$D Mesh Denoising  . . . . . . . . 77--84
                 Yahia Said and   
            Taoufik Saidani and   
                Fethi Smach and   
               Mohamed Atri and   
                 Hichem Snoussi   Embedded Real-Time Video Processing
                                  System on FPGA . . . . . . . . . . . . . 85--92
               Ashish Khare and   
           Richa Srivastava and   
                    Rajiv Singh   Edge Preserving Image Fusion Based on
                                  Contourlet Transform . . . . . . . . . . 93--102
               Issam Qaffou and   
             Mohamed Sadgal and   
                 Aziz Elfazziki   Selecting Vision Operators and Fixing
                                  Their Optimal Parameters Values Using
                                  Reinforcement Learning . . . . . . . . . 103--112
       Hossein Ziaei Nafchi and   
        Hamidreza Rashidy Kanan   A Phase Congruency Based Document
                                  Binarization . . . . . . . . . . . . . . 113--121
         Abdellah Skoudarli and   
           Mokhtar Nibouche and   
                    Amina Serir   Porting a H264/AVC Adaptive in Loop
                                  Deblocking Filter to a TI DM6437EVM DSP  122--130
                Leila Falek and   
             Hocine Teffahi and   
                   Amar Djeradi   Methodology for Acoustic
                                  Characterization of a Labial Constraint
                                  in Speech Production . . . . . . . . . . 131--141
             Mohamed Tayebi and   
                 Mrahi Bouziani   Performance of OFDM in Radio Mobile
                                  Channel  . . . . . . . . . . . . . . . . 142--148
                  H. Chaibi and   
                 R. Saadane and   
               My A. Faqihi and   
                    M. Belkasmi   Spatial Correlation Characterization for
                                  UWB Indoor Channel Based on Measurements 149--156
           Shahram Hosseini and   
            Yannick Deville and   
             Sonia El Amine and   
                 Hicham Saylani   Nonlinear Blind Source Separation
                                  Applied to a Simple Bijective Model  . . 157--165
       El Hassan Ait Laasri and   
       Es-Sa\"\id Akhouayri and   
                 Dris Agliz and   
             Abderrahman Atmani   Seismic Signal Discrimination between
                                  Earthquakes and Quarry Blasts Using
                                  Fuzzy Logic Approach . . . . . . . . . . 166--174
          Zakaria Mohammadi and   
             Rachid Saadane and   
              Driss Aboutajdine   Ultra Wide-Band Channel Characterization
                                  Using Generalized Gamma Distributions    175--182
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7341, 2012

                   Feng Hao and   
                   Dylan Clarke   Security Analysis of a Multi-factor
                                  Authenticated Key Exchange Protocol  . . 1--11
              Vu Duc Nguyen and   
              Yang-Wai Chow and   
                   Willy Susilo   Breaking an Animated CAPTCHA Scheme  . . 12--29
            Assaf Ben-David and   
               Omer Berkman and   
               Yossi Matias and   
               Sarvar Patel and   
                   Cem Paya and   
                      Moti Yung   Contextual OTP: Mitigating Emerging
                                  Man-in-the-Middle Attacks with Wireless
                                  Hardware Tokens  . . . . . . . . . . . . 30--47
                  Nan Zhang and   
              Jingqiang Lin and   
                  Jiwu Jing and   
                       Neng Gao   RIKE: Using Revocable Identities to
                                  Support Key Escrow in PKIs . . . . . . . 48--65
           Tilo Müller and   
          Benjamin Taubmann and   
              Felix C. Freiling   TreVisor . . . . . . . . . . . . . . . . 66--83
                  Basel Alomair   Authenticated Encryption: How Reordering
                                  Can Impact Performance . . . . . . . . . 84--99
                   Haibin Zhang   Length-Doubling Ciphers and Tweakable
                                  Ciphers  . . . . . . . . . . . . . . . . 100--116
               Wentao Zhang and   
                  Bozhan Su and   
                 Wenling Wu and   
               Dengguo Feng and   
                    Chuankun Wu   Extending Higher-Order Integral: An
                                  Efficient Unified Algorithm of
                                  Constructing Integral Distinguishers for
                                  Block Ciphers  . . . . . . . . . . . . . 117--134
            Atsushi Fujioka and   
              Taiichi Saito and   
                   Keita Xagawa   Security Enhancements by OR-Proof in
                                  Identity-Based Identification  . . . . . 135--152
                    Yu Chen and   
             Zongyang Zhang and   
                Dongdai Lin and   
                     Zhenfu Cao   Identity-Based Extractable Hash Proofs
                                  and Their Applications . . . . . . . . . 153--170
                Kai Samelin and   
      Henrich C. Pöhls and   
             Arne Bilzhause and   
            Joachim Posegga and   
                Hermann de Meer   On Structural Signatures for Tree Data
                                  Structures . . . . . . . . . . . . . . . 171--187
                  Xiang Xie and   
                    Rui Xue and   
                      Rui Zhang   Inner-Product Lossy Trapdoor Functions
                                  and Applications . . . . . . . . . . . . 188--205
             Afonso Arriaga and   
             Manuel Barbosa and   
                  Pooya Farshim   On the Joint Security of Signature and
                                  Encryption Schemes under Randomness
                                  Reuse: Efficiency and Security
                                  Amplification  . . . . . . . . . . . . . 206--223
                  Helger Lipmaa   Secure Accumulators from Euclidean Rings
                                  without Trusted Setup  . . . . . . . . . 224--240
               Zhiqiang Liu and   
                    Dawu Gu and   
                     Ya Liu and   
                         Wei Li   Linear Fault Analysis of Block Ciphers   241--256
                 Yuki Asano and   
          Shingo Yanagihara and   
                    Tetsu Iwata   Cryptanalysis of 256-Bit Key HyRAL via
                                  Equivalent Keys  . . . . . . . . . . . . 257--274
                  Yu Sasaki and   
                       Lei Wang   Distinguishers beyond Three Rounds of
                                  the RIPEMD-128/-160 Compression
                                  Functions  . . . . . . . . . . . . . . . 275--292
              Fangguo Zhang and   
                 Qiping Lin and   
                    Shengli Liu   Zero-Value Point Attacks on Kummer-Based
                                  Cryptosystem . . . . . . . . . . . . . . 293--310
               Gilles Piret and   
               Thomas Roche and   
                  Claude Carlet   PICARO --- a Block Cipher Allowing
                                  Efficient Higher-Order Side-Channel
                                  Resistance . . . . . . . . . . . . . . . 311--328
                     Xin Ye and   
              Thomas Eisenbarth   Wide Collisions in Practice  . . . . . . 329--343
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7342, 2012

              Gilles Barthe and   
   Benjamin Grégoire and   
Santiago Zanella Béguelin   Probabilistic Relational Hoare Logics
                                  for Computer-Aided Security Proofs . . . 1--6
                 Tony Hoare and   
             Stephan van Staden   The Laws of Programming Unify Process
                                  Calculi  . . . . . . . . . . . . . . . . 7--22
                   Dan R. Ghica   The Geometry of Synthesis  . . . . . . . 23--24
              Alexander Lux and   
               Heiko Mantel and   
                Matthias Perner   Scheduler-Independent Declassification   25--47
                 Carroll Morgan   Elementary Probability Theory in the
                                  Eindhoven Style  . . . . . . . . . . . . 48--73
               Louis Mandel and   
               Florence Plateau   Scheduling and Buffer Sizing of
                                  $n$-Synchronous Systems  . . . . . . . . 74--101
             Brijesh Dongol and   
                   Ian J. Hayes   Deriving Real-Time Action Systems
                                  Controllers from Multiscale System
                                  Specifications . . . . . . . . . . . . . 102--131
                Ilya Sergey and   
              Jan Midtgaard and   
                    Dave Clarke   Calculating Graph Algorithms for
                                  Dominance and Shortest Path  . . . . . . 132--156
               Roland Backhouse   First-Past-the-Post Games  . . . . . . . 157--176
              Han-Hing Dang and   
           Bernhard Möller   Reverse Exchange for Concurrency and
                                  Local Reasoning  . . . . . . . . . . . . 177--197
                Walter Guttmann   Unifying Correctness Statements  . . . . 198--219
         Alasdair Armstrong and   
               Simon Foster and   
                   Georg Struth   Dependently Typed Programming Based on
                                  Automated Theorem Proving  . . . . . . . 220--240
       Bernhard Möller and   
             Patrick Roocks and   
                  Markus Endres   An Algebraic Calculus of Database
                                  Preferences  . . . . . . . . . . . . . . 241--262
                   Patrick Bahr   Modular Tree Automata  . . . . . . . . . 263--299
                  Ross Paterson   Constructing Applicative Functors  . . . 300--323
                     Ralf Hinze   Kan Extensions for Program Optimisation
                                  Or: Art and Dan Explain an Old Trick . . 324--362
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7343, 2012

                   Frank Houdek   Improving Requirements Engineering
                                  Processes  . . . . . . . . . . . . . . . 1--2
                Anu Raninen and   
                Tanja Toroi and   
               Hannu Vainio and   
                Jarmo J. Ahonen   Defect Data Analysis as Input for
                                  Software Process Improvement . . . . . . 3--16
            Henri Heiskanen and   
              Mika Maunumaa and   
                    Mika Katara   A Test Process Improvement Model for
                                  Automated Test Generation  . . . . . . . 17--31
Verónica Ñaupac and   
             Robert Arisaca and   
          Abraham Dávila   Software Process Improvement and
                                  Certification of a Small Company Using
                                  the NTP 291 100 (MoProSoft)  . . . . . . 32--43
              Nuno Ferreira and   
                Nuno Santos and   
         Ricardo J. Machado and   
             Dragan Ga\vsevi\'c   Derivation of Process-Oriented Logical
                                  Architectures: An Elicitation Approach
                                  for Cloud Design . . . . . . . . . . . . 44--58
           Vieri del Bianco and   
              Luigi Lavazza and   
                 Sandro Morasca   A Proposal for Simplified Model-Based
                                  Cost Estimation Models . . . . . . . . . 59--73
               Oscar Castro and   
          Angelina Espinoza and   
Alfonso Martínez-Martínez   Estimating the Software Product Value
                                  during the Development Process . . . . . 74--88
         Hironori Washizaki and   
            Toshikazu Koike and   
               Rieko Namiki and   
                Hiroyuki Tanabe   Reusability Metrics for Program Source
                                  Code Written in C Language and Their
                                  Evaluation . . . . . . . . . . . . . . . 89--103
               Martin Höst   Modeling the Effects of Project
                                  Management Strategies on Long-Term
                                  Product Knowledge  . . . . . . . . . . . 104--115
           Kevin Vlaanderen and   
            Peter van Stijn and   
          Sjaak Brinkkemper and   
              Inge van de Weerd   Growing into Agility: Process
                                  Implementation Paths for Scrum . . . . . 116--130
  John Wilmar Castro Llanos and   
Silvia Teresita Acuña Castillo   Differences between Traditional and Open
                                  Source Development Activities  . . . . . 131--144
     Pilar Rodríguez and   
             Jouni Markkula and   
                Markku Oivo and   
                 Juan Garbajosa   Analyzing the Drivers of the Combination
                                  of Lean and Agile in Software
                                  Development Companies  . . . . . . . . . 145--159
             Nils Brede Moe and   
           Sebastian Barney and   
          Aybüke Aurum and   
             Mahvish Khurum and   
                   Claes Wohlin   Fostering and Sustaining Innovation in a
                                  Fast Growing Agile Company . . . . . . . 160--174
 Richard Berntsson Svensson and   
          Aybüke Aurum and   
              Barbara Paech and   
              Tony Gorschek and   
                  Devesh Sharma   Software Architecture as a Means of
                                  Communication in a Globally Distributed
                                  Software Development Context . . . . . . 175--189
              Darja \vSmite and   
                 Zane Galvi\cna   Socio-technical Congruence Sabotaged by
                                  a Hidden Onshore Outsourcing
                                  Relationship: Lessons Learned from an
                                  Empirical Study  . . . . . . . . . . . . 190--202
          Miguel J. Monasor and   
     Aurora Vizcaíno and   
                 Mario Piattini   Providing Training in GSD by Using a
                                  Virtual Environment  . . . . . . . . . . 203--217
              Marko Jäntti   Improving IT Service Desk and Service
                                  Management Processes in Finnish Tax
                                  Administration: a Case Study on Service
                                  Engineering  . . . . . . . . . . . . . . 218--232
            Sebastian Meyer and   
              Anna Averbakh and   
        Torsten Ronneberger and   
                 Kurt Schneider   Experiences from Establishing Knowledge
                                  Management in a Joint Research Project   233--247
           Susanne Halstead and   
              Rosario Ortiz and   
       Mario Córdova and   
            Miguel Seguí   The Impact of Lack in Domain or
                                  Technology Experience on the Accuracy of
                                  Expert Effort Estimates in Software
                                  Projects . . . . . . . . . . . . . . . . 248--259
            Noriko Hanakawa and   
                   Masaki Obana   A Metrics for Meeting Quality on a
                                  Software Requirement Acquisition Phase   260--274
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7344, 2012

            Jan-Erik Ekberg and   
       Alexandra Afanasyeva and   
                      N. Asokan   Authenticated Encryption Primitives for
                                  Size-Constrained Trusted Computing . . . 1--18
                 Matt Smart and   
                    Eike Ritter   Auditable Envelopes: Tracking Anonymity
                                  Revocation Using Trusted Computing . . . 19--33
             Amit Vasudevan and   
                Bryan Parno and   
                    Ning Qu and   
           Virgil D. Gligor and   
                  Adrian Perrig   Lockdown: Towards a Safe and Practical
                                  Architecture for Security Applications
                                  on Commodity Platforms . . . . . . . . . 34--54
     Emiliano De Cristofaro and   
                    Gene Tsudik   Experimenting with Fast Private Set
                                  Intersection . . . . . . . . . . . . . . 55--73
    Daniel Sangorrín and   
               Shinya Honda and   
                 Hiroaki Takada   Reliable Device Sharing Mechanisms for
                                  Dual-OS Embedded Trusted Computing . . . 74--91
                Zahid Hasan and   
         Alina Krischkowsky and   
              Manfred Tscheligi   Modelling User-Centered-Trust (UCT) in
                                  Software Systems: Interplay of Trust,
                                  Affect and Acceptance Model  . . . . . . 92--109
                  Julian Murphy   Clockless Physical Unclonable Functions  110--121
              Martin Pirker and   
            Johannes Winter and   
                   Ronald Toegl   Lightweight Distributed Heterogeneous
                                  Attested Android Clouds  . . . . . . . . 122--141
        Ünal Kocaba\cs and   
              Andreas Peter and   
       Stefan Katzenbeisser and   
             Ahmad-Reza Sadeghi   Converse PUF-Based Authentication  . . . 142--158
             Amit Vasudevan and   
             Emmanuel Owusu and   
               Zongwei Zhou and   
              James Newsome and   
             Jonathan M. McCune   Trustworthy Execution on Mobile Devices:
                                  What Security Properties Can My Mobile
                                  Platform Give Me?  . . . . . . . . . . . 159--178
           Joshua Schiffman and   
      Hayawardh Vijayakumar and   
                   Trent Jaeger   Verifying System Integrity by Proxy  . . 179--200
             Yueqiang Cheng and   
                     Xuhua Ding   Virtualization Based Password Protection
                                  against Malware in Untrusted Operating
                                  Systems  . . . . . . . . . . . . . . . . 201--218
       Alexandra Dmitrienko and   
         Ahmad-Reza Sadeghi and   
           Sandeep Tamrakar and   
            Christian Wachsmann   SmartTokens: Delegable Access Control
                                  with NFC-Enabled Smartphones . . . . . . 219--238
                   Apurva Kumar   A Belief Logic for Analyzing Security of
                                  Web Protocols  . . . . . . . . . . . . . 239--254
         Cornelius Namiluko and   
                  Andrew Martin   Provenance-Based Model for Verifying
                                  Trust-Properties . . . . . . . . . . . . 255--272
                  Liang Cai and   
                       Hao Chen   On the Practicality of Motion Based
                                  Keystroke Inference Attack . . . . . . . 273--290
               Clint Gibler and   
          Jonathan Crussell and   
            Jeremy Erickson and   
                       Hao Chen   AndroidLeaks: Automatically Detecting
                                  Potential Privacy Leaks in Android
                                  Applications on a Large Scale  . . . . . 291--307
          Iacovos Kirlappos and   
            M. Angela Sasse and   
                   Nigel Harvey   Why Trust Seals Don't Work: a Study of
                                  User Perceptions and Behavior  . . . . . 308--324
              Saijing Zheng and   
                    Pan Shi and   
                    Heng Xu and   
                    Cheng Zhang   Launching the New Profile on Facebook:
                                  Understanding the Triggers and Outcomes
                                  of Users' Privacy Concerns . . . . . . . 325--339
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7345, 2012

                    Qing He and   
                    Ye Duan and   
                  Danyang Zhang   Automatic Detailed Localization of
                                  Facial Features  . . . . . . . . . . . . 1--9
               Ozer Ozdikis and   
               Pinar Senkul and   
                  Siyamed Sinir   Confidence-Based Incremental
                                  Classification for Objects with Limited
                                  Attributes in Vertical Search  . . . . . 10--19
              Huaming Huang and   
            Kishan Mehrotra and   
             Chilukuri K. Mohan   Algorithms for Detecting Outliers via
                                  Clustering and Ranks . . . . . . . . . . 20--29
           Takuya Yoshimura and   
               Yutaro Fujii and   
                   Takayuki Ito   Grouping Co-occurrence Filtering Based
                                  on Bayesian Filtering  . . . . . . . . . 30--39
             Chunsheng Yang and   
                 Yubin Yang and   
                        Jie Liu   Model Fusion-Based Batch Learning with
                                  Application to Oil Spills Detection  . . 40--47
           Marzena Kryszkiewicz   Efficient Determination of Binary
                                  Non-negative Vector Neighbors with
                                  Regard to Cosine Similarity  . . . . . . 48--57
         Katsutoshi Itoyama and   
              Tetsuya Ogata and   
               Hiroshi G. Okuno   Automatic Chord Recognition Based on
                                  Probabilistic Integration of Acoustic
                                  Features, Bass Sounds, and Chord
                                  Transition . . . . . . . . . . . . . . . 58--67
                Haiguang Li and   
                    Zhao Li and   
            Robert T. White and   
                     Xindong Wu   A Real-Time Transportation Prediction
                                  System . . . . . . . . . . . . . . . . . 68--77
                Henry Z. Lo and   
            Dan A. Simovici and   
                       Wei Ding   Several Remarks on Mining Frequent
                                  Trajectories in Graphs . . . . . . . . . 78--87
                 Daiheng Ni and   
                   Hong Liu and   
                   Wei Ding and   
              Yuanchang Xie and   
              Honggang Wang and   
             Hossein Pishro-Nik   Cyber-Physical Integration to Connect
                                  Vehicles for Transformed Transportation
                                  Safety and Efficiency  . . . . . . . . . 88--94
                Tzu-Yang Yu and   
      Christopher Niezrecki and   
                  Farhad Ansari   Multi-modal Remote Sensing System for
                                  Transportation Infrastructure Inspection
                                  and Monitoring . . . . . . . . . . . . . 95--103
              Axel Tidemann and   
  Finn Olav Bjòrnson and   
                   Agnar Aamodt   Operational Support in Fish Farming
                                  through Case-Based Reasoning . . . . . . 104--113
            Yasser Mohammad and   
           Yoshimasa Ohmoto and   
                Toyoaki Nishida   CPMD: a Matlab Toolbox for Change Point
                                  and Constrained Motif Discovery  . . . . 114--123
               Binu M. Nair and   
               Vijayan K. Asari   Time Invariant Gesture Recognition by
                                  Modelling Body Posture Space . . . . . . 124--133
                       Xing Tan   Go beyond the SCOPE: a Temporal
                                  Situation Calculus-Based Software Tool
                                  for Time Petri Nets  . . . . . . . . . . 134--143
               Xiaochen Lai and   
                 Quanli Liu and   
                   Wei Wang and   
                   Likun Li and   
                   Simin Lu and   
                          Di Wu   An Algorithm of Channel Assignment of
                                  MAC Layer in Ad Hoc Network Based on
                                  Dynamic Game with Perfect and Complete
                                  Information  . . . . . . . . . . . . . . 144--155
            Dai Quoc Nguyen and   
            Dat Quoc Nguyen and   
                   Son Bao Pham   A Semantic Approach for Question
                                  Analysis . . . . . . . . . . . . . . . . 156--165
       Peter Großmann and   
    Steffen Hölldobler and   
            Norbert Manthey and   
            Karl Nachtigall and   
                     Jens Opitz   Solving Periodic Event Scheduling
                                  Problems with SAT  . . . . . . . . . . . 166--175
               Dan E. Tamir and   
            Charles R. King and   
                  Mark McKenney   Improving the Performance of
                                  Constructive Multi-Start Search Using
                                  Record-Keeping . . . . . . . . . . . . . 176--186
                      Li Ma and   
               Babak Forouraghi   A Modified Particle Swarm Optimizer for
                                  Engineering Design . . . . . . . . . . . 187--196
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7346, 2012

               Peer Stelldinger   Connect the Dots: The Reconstruction of
                                  Region Boundaries from Contour Sampling
                                  Points . . . . . . . . . . . . . . . . . 1--13
        Jacques-Olivier Lachaud   Digital Shape Analysis with Maximal
                                  Segments . . . . . . . . . . . . . . . . 14--27
  Mohammed Mostefa Mesmoudi and   
              Leila De Floriani   Discrete Curvature Estimation Methods
                                  for Triangulated Surfaces  . . . . . . . 28--42
              Pierre Soille and   
                 Laurent Najman   On Morphological Hierarchical
                                  Representations for Image Processing and
                                  Spatial Data Clustering  . . . . . . . . 43--67
           Fred N. Kiwanuka and   
        Michael H. F. Wilkinson   Radial Moment Invariants for Attribute
                                  Filtering in $3$D  . . . . . . . . . . . 68--81
               David Coeurjolly   Volumetric Analysis of Digital Objects
                                  Using Distance Transformation:
                                  Performance Issues and Extensions  . . . 82--92
         Ullrich Köthe and   
          Björn Andres and   
            Thorben Kröger   Geometric Analysis of $3$D Electron
                                  Microscopy Data  . . . . . . . . . . . . 93--108
         Mihály Gara and   
Tamás Sámuel Tasi and   
     Péter Balázs   Machine Learning as a Preprocessing
                                  Phase in Discrete Tomography . . . . . . 109--124
      Michaël Heyvaert and   
                 Peter Veelaert   Fast Planarity Estimation and Region
                                  Growing on GPU . . . . . . . . . . . . . 125--139
           Roland Levillain and   
          Thierry Géraud   Writing Reusable Digital Topology
                                  Algorithms in a Generic Image Processing
                                  Framework  . . . . . . . . . . . . . . . 140--153
              Igor Gurevich and   
              Artem Myagkov and   
                   Vera Yashina   A New Image-Mining Technique for
                                  Automation of Parkinson's Disease
                                  Research . . . . . . . . . . . . . . . . 154--167
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7347, 2012

                     Tony Hoare   Net Models for Concurrent Object
                                  Behaviour  . . . . . . . . . . . . . . . 1--2
               Alain Finkel and   
          Jean Goubault-Larrecq   The Theory of WSTS: The Case of Complete
                                  WSTS . . . . . . . . . . . . . . . . . . 3--31
             Thomas Mailund and   
          Anders E. Halager and   
            Michael Westergaard   Using Colored Petri Nets to Construct
                                  Coalescent Hidden Markov Models:
                                  Automatic Translation from Demographic
                                  Specifications to Efficient Inference
                                  Methods  . . . . . . . . . . . . . . . . 32--50
           Marc Solé and   
                  Josep Carmona   An SMT-Based Discovery Algorithm for
                                  C-Nets . . . . . . . . . . . . . . . . . 51--71
        Wil M. P. van der Aalst   Decomposing Process Mining Problems
                                  Using Passages . . . . . . . . . . . . . 72--91
               Guan Jun Liu and   
                    Jun Sun and   
                   Yang Liu and   
                  Jin Song Dong   Complexity of the Soundness Problem of
                                  Bounded Workflow Nets  . . . . . . . . . 92--107
María Martos-Salgado and   
          Fernando Rosa-Velardo   Cost Soundness for Priced
                                  Resource-Constrained Workflow Nets . . . 108--127
                   Eric Badouel   On the $\alpha$-Reconstructibility of
                                  Workflow Nets  . . . . . . . . . . . . . 128--147
          Matthias Weidlich and   
       Jan Martijn van der Werf   On Profiles and Footprints ---
                                  Relational Semantics for Petri Nets  . . 148--167
               Dirk Fahland and   
             Robert Prüfer   Data and Abstraction for Scenario-Based
                                  Modeling with Petri Nets . . . . . . . . 168--187
                        Xu Wang   Maximal Confluent Processes  . . . . . . 188--207
              Antti Valmari and   
                   Henri Hansen   Old and New Algorithms for Minimal
                                  Coverability Sets  . . . . . . . . . . . 208--227
            Andreas Lehmann and   
              Niels Lohmann and   
                   Karsten Wolf   Stubborn Sets for Simple Linear Time
                                  Properties . . . . . . . . . . . . . . . 228--247
           Sami Evangelista and   
        Lars Michael Kristensen   Hybrid On-the-Fly LTL Model Checking
                                  with the Sweep-Line Method . . . . . . . 248--267
                   Astrid Rakow   Safety Slicing Petri Nets  . . . . . . . 268--287
         Veronica Gil-Costa and   
                 Jair Lobos and   
    Alonso Inostrosa-Psijas and   
                 Mauricio Marin   Capacity Planning for Vertical Search
                                  Engines: An Approach Based on Coloured
                                  Petri Nets . . . . . . . . . . . . . . . 288--307
            Joyce Nakatumba and   
        Michael Westergaard and   
        Wil M. P. van der Aalst   An Infrastructure for Cost-Effective
                                  Testing of Operational Support
                                  Algorithms Based on Colored Petri Nets   308--327
              Debjyoti Bera and   
            Kees M. van Hee and   
       Jan Martijn van der Werf   Designing Weakly Terminating ROS Systems 328--347
Frédéric Cristini and   
              Catherine Tessier   Nets-within-Nets to Model Innovative
                                  Space System Architectures . . . . . . . 348--367
             Frank Heitmann and   
Michael Köhler-Bußmeier   $P$- and $T$-Systems in the
                                  Nets-within-Nets-Formalism . . . . . . . 368--387
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7348, 2012

                James M. Ostell   Entrez: The NCBI Search and Discovery
                                  Engine . . . . . . . . . . . . . . . . . 1--4
          Silke Trißl and   
            Philipp Hussels and   
                      Ulf Leser   InterOnto --- Ranking Inter-Ontology
                                  Links  . . . . . . . . . . . . . . . . . 5--20
               Joseph Benik and   
                Caren Chang and   
             Louiqa Raschid and   
         Maria-Esther Vidal and   
                Guillermo Palma   Finding Cross Genome Patterns in
                                  Annotation Graphs  . . . . . . . . . . . 21--36
             Ruhaila Maskat and   
            Norman W. Paton and   
              Suzanne M. Embury   Pay-as-You-Go Ranking of Schema Mappings
                                  Using Query Logs . . . . . . . . . . . . 37--52
                     Ken Barker   Combining Structured and Unstructured
                                  Knowledge Sources for Question Answering
                                  in Watson  . . . . . . . . . . . . . . . 53--55
    E. Patrick Shironoshita and   
          Yves R. Jean-Mary and   
             Ray M. Bradley and   
               Patricia Buendia   Cancer Data Integration and Querying
                                  with GeneTegra . . . . . . . . . . . . . 56--70
            Chimezie Ogbuji and   
                        Rong Xu   Integrating Large, Disparate Biomedical
                                  Ontologies to Boost Organ Development
                                  Network Connectivity . . . . . . . . . . 71--82
             John D. Burger and   
              Emily Doughty and   
                  Sam Bayer and   
       David Tresner-Kirsch and   
                    Ben Wellner   Validating Candidate Gene-Mutation
                                  Relations in MEDLINE Abstracts via
                                  Crowdsourcing  . . . . . . . . . . . . . 83--91
                James J. Cimino   The Biomedical Translational Research
                                  Information System: Clinical Data
                                  Integration at the National Institutes
                                  of Health  . . . . . . . . . . . . . . . 92--92
            Daniele Segagni and   
             Matteo Gabetta and   
          Valentina Tibollo and   
           Alberto Zambelli and   
               Silvia G. Priori   ONCO-i2b2: Improve Patients Selection
                                  through Case-Based Information Retrieval
                                  Techniques . . . . . . . . . . . . . . . 93--99
        Dina Demner-Fushman and   
               Swapna Abhyankar   Syntactic-Semantic Frames for Clinical
                                  Cohort Identification Queries  . . . . . 100--112
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7349, 2012

                   Ed Seidewitz   Executable UML: From Multi-domain to
                                  Multi-core . . . . . . . . . . . . . . . 1--1
               Henrik Lönn   Models Meeting Automotive Design
                                  Challenges . . . . . . . . . . . . . . . 2--3
    Sébastien Mosser and   
        Mireille Blay-Fornarino   A Commutative Model Composition Operator
                                  to Support Software Adaptation . . . . . 4--19
        Anjelika Votintseva and   
                 Petra Witschel   Comparative Study of Model-Based and
                                  Multi-Domain System Engineering
                                  Approaches for Industrial Settings . . . 20--31
             Mirco Kuhlmann and   
                 Martin Gogolla   Strengthening SAT-Based Validation of
                                  UML/OCL Models by Representing
                                  Collections as Relations . . . . . . . . 32--48
              Maged Elaasar and   
                   Yvan Labiche   Model Interchange Testing: a Process and
                                  a Case Study . . . . . . . . . . . . . . 49--61
         Thomas Goldschmidt and   
                Wolfgang Mahnke   An Internal Domain-Specific Language for
                                  Constructing OPC UA Queries and Event
                                  Filters  . . . . . . . . . . . . . . . . 62--73
              Lionel Briand and   
               Yvan Labiche and   
                     Yanhua Liu   Combining UML Sequence and State Machine
                                  Diagrams for Data-Flow Based Integration
                                  Testing  . . . . . . . . . . . . . . . . 74--89
          Gehan M. K. Selim and   
                 Shige Wang and   
                 James R. Cordy   Model Transformations for Migrating
                                  Legacy Models: An Industrial Case Study  90--101
  István Ráth and   
   Ábel Hegedüs and   
     Dániel Varró   Derived Features for EMF by Integrating
                                  Advanced Model Queries . . . . . . . . . 102--117
       Dimitrios S. Kolovos and   
                  Louis M. Rose   A Lightweight Approach for Managing XML
                                  Documents with MDE Languages . . . . . . 118--132
                    Tao Yue and   
                    Shaukat Ali   Bridging the Gap between Requirements
                                  and Aspect State Machines to Support
                                  Non-functional Testing: Industrial Case
                                  Studies  . . . . . . . . . . . . . . . . 133--145
       Jorge Pinna Puissant and   
      Ragnhild Van Der Straeten   Badger: a Regression Planner to Resolve
                                  Design Model Inconsistencies . . . . . . 146--161
                    Gefei Zhang   Aspect-Oriented Modeling of Mutual
                                  Exclusion in UML State Machines  . . . . 162--177
        Rolf-Helge Pfeiffer and   
             Andrzej W\kasowski   TexMo: a Multi-language Development
                                  Environment  . . . . . . . . . . . . . . 178--193
             Colin Atkinson and   
               Ralph Gerbig and   
                 Bastian Kennel   On-the-Fly Emendation of Multi-level
                                  Models . . . . . . . . . . . . . . . . . 194--209
                  Jan Rieke and   
                 Oliver Sudmann   Specifying Refinement Relations in
                                  Vertical Model Transformations . . . . . 210--225
             Razieh Behjati and   
               Shiva Nejati and   
                        Tao Yue   Model-Based Automated and Guided
                                  Configuration of Embedded Software
                                  Systems  . . . . . . . . . . . . . . . . 226--243
        Fabian Büttner and   
                    Jordi Cabot   Lightweight String Reasoning for OCL . . 244--258
               Juan de Lara and   
                  Esther Guerra   Domain-Specific Textual Meta-Modelling
                                  Languages for Model Driven Engineering   259--274
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??