Table of contents for issues of Lecture Notes in Computer Science

Last update: Sat Oct 14 16:23:45 MDT 2017                Valid HTML 3.2!

Volume 7400, 2012
Volume 7401, 2012
Volume 7402, 2012
Volume 7404, 2012
Volume 7405, 2012
Volume 7406, 2012
Volume 7408, 2012
Volume 7409, 2012
Volume 7410, 2012
Volume 7411, 2012
Volume 7412, 2012
Volume 7413, 2012
Volume 7414, 2012
Volume 7415, 2012
Volume 7416, 2012
Volume 7417, 2012
Volume 7418, 2012
Volume 7419, 2012
Volume 7421, 2012
Volume 7422, 2012
Volume 7424, 2012
Volume 7425, 2012
Volume 7426, 2012
Volume 7427, 2012
Volume 7428, 2012
Volume 7429, 2012
Volume 7430, 2012
Volume 7431, 2012
Volume 7432, 2012
Volume 7433, 2012
Volume 7434, 2012
Volume 7435, 2012
Volume 7436, 2012
Volume 7437, 2012
Volume 7438, 2012
Volume 7439, 2012
Volume 7440, 2012
Volume 7441, 2012
Volume 7442, 2012
Volume 7443, 2012
Volume 7444, 2012
Volume 7445, 2012
Volume 7446, 2012
Volume 7447, 2012
Volume 7448, 2012
Volume 7449, 2012


Lecture Notes in Computer Science
Volume 7400, 2012

                  Josep Carmona   The Label Splitting Problem  . . . . . . 1--23
         Philippe Darondeau and   
                  Laurie Ricker   Distributed Control of Discrete-Event
                                  Systems: a First Step  . . . . . . . . . 24--45
          Lom-Messan Hillah and   
             Fabrice Kordon and   
              Charles Lakos and   
                 Laure Petrucci   Extending pnml Scope: a Framework to
                                  Combine Petri Nets Types . . . . . . . . 46--70
                 Ekkart Kindler   Modelling Local and Global Behaviour:
                                  Petri Nets and Event Coordination  . . . 71--93
       Ala-Eddine Ben Salem and   
       Alexandre Duret-Lutz and   
                 Fabrice Kordon   Model Checking Using Generalized Testing
                                  Automata . . . . . . . . . . . . . . . . 94--122
          Nicolas Sedlmajer and   
               Didier Buchs and   
           Steve Hostettler and   
               Alban Linard and   
Edmundo López Bóbeda   A Domain Specific Language Approach for
                                  Genetic Regulatory Mechanisms Analysis   123--145
            Michael Westergaard   Verifying Parallel Algorithms and
                                  Programs Using Coloured Petri Nets . . . 146--168
             Fabrice Kordon and   
               Alban Linard and   
               Didier Buchs and   
         Maximilien Colange and   
               Sami Evangelista   Report on the Model Checking Contest at
                                  Petri Nets 2011  . . . . . . . . . . . . 169--196
           Christine Choppy and   
                Anna Dedova and   
           Sami Evangelista and   
            Ka\"\is Kla\"\i and   
                 Laure Petrucci   Modelling and Formal Verification of the
                                  NEO Protocol . . . . . . . . . . . . . . 197--225
               Sonya Arnold and   
            Jonathan Billington   An Initial Coloured Petri Net Model of
                                  the Hypertext Transfer Protocol
                                  Operating over the Transmission Control
                                  Protocol . . . . . . . . . . . . . . . . 226--250
            Suriadi Suriadi and   
                Chun Ouyang and   
                     Ernest Foo   Privacy Compliance Verification in
                                  Cryptographic Protocols  . . . . . . . . 251--276
               Dario Bruneo and   
            Francesco Longo and   
              Antonio Puliafito   Modeling Energy-Aware Cloud Federations
                                  with SRNs  . . . . . . . . . . . . . . . 277--307
            Stefano Marrone and   
            Nicola Mazzocca and   
            Roberto Nardone and   
             Roberta Presta and   
            Simon Pietro Romano   A SAN-Based Modeling Approach to
                                  Performance Evaluation of an
                                  IMS-Compliant Conferencing Framework . . 308--333
    Boudewijn F. van Dongen and   
            Jörg Desel and   
        Wil M. P. van der Aalst   Aggregating Causal Runs into Workflow
                                  Nets . . . . . . . . . . . . . . . . . . 334--363
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7401, 2012

    Michalis Mavrovouniotis and   
                Shengxiang Yang   An Immigrants Scheme Based on
                                  Environmental Information for Ant Colony
                                  Optimization for the Dynamic Travelling
                                  Salesman Problem . . . . . . . . . . . . 1--12
Alan Díaz-Manríquez and   
    Gregorio Toscano-Pulido and   
          Ricardo Landa-Becerra   A Surrogate-Based Intelligent Variation
                                  Operator for Multiobjective Optimization 13--24
 Viviane Grunert da Fonseca and   
              Carlos M. Fonseca   The Relationship between the Covered
                                  Fraction, Completeness and Hypervolume
                                  Indicators . . . . . . . . . . . . . . . 25--36
            Marc Schoenauer and   
             Fabien Teytaud and   
                Olivier Teytaud   A Rigorous Runtime Analysis for
                                  Quasi-Random Restarts and Decreasing
                                  Stepsize . . . . . . . . . . . . . . . . 37--48
Sébastien Vérel and   
               Fabio Daolio and   
             Gabriela Ochoa and   
                Marco Tomassini   Local Optima Networks with Escape Edges  49--60
             Evelyne Lutton and   
            Julie Foucquier and   
            Nathalie Perrot and   
               Jean Louchet and   
             Jean-Daniel Fekete   Visual Analysis of Population
                                  Scatterplots . . . . . . . . . . . . . . 61--72
        Robert-Jan Huijsman and   
             Evert Haasdijk and   
                    A. E. Eiben   An On-Line On-Board Distributed
                                  Algorithm for Evolutionary Robotics  . . 73--84
       Do\ugan Aydìn and   
               Tianjun Liao and   
     Marco A. Montes de Oca and   
            Thomas Stützle   Improving Performance via Population
                                  Growth and Local Search: The Case of the
                                  Artificial Bee Colony Algorithm  . . . . 85--96
               Ogier Maitre and   
           Nicolas Lachiche and   
                  Pierre Collet   Two Ports of a Full Evolutionary
                                  Algorithm onto GPGPU . . . . . . . . . . 97--108
           Denis Robilliard and   
              Cyril Fonlupt and   
       Virginie Marion-Poty and   
                  Amine Boumaza   A Multilevel Tabu Search with
                                  Backtracking for Exploring Weak Schur
                                  Numbers  . . . . . . . . . . . . . . . . 109--119
    Eduardo Rodriguez-Tello and   
         Luis Carlos Betancourt   An Improved Memetic Algorithm for the
                                  Antibandwidth Problem  . . . . . . . . . 121--132
           Vincent van der Goes   Adaptive Play in a Pollution Bargaining
                                  Game . . . . . . . . . . . . . . . . . . 133--144
Mátyás Brendel and   
                Marc Schoenauer   Learn-and-Optimize: a Parameter Tuning
                                  Framework for Evolutionary AI Planning   145--155
            Ivanoe De Falco and   
       Antonio Della Cioppa and   
            Domenico Maisto and   
                Umberto Scafuri   A Model Based on Biological Invasions
                                  for Island Evolutionary Algorithms . . . 157--168
Jorge Sebastian Hernández-Domínguez and   
    Gregorio Toscano-Pulido and   
        Carlos A. Coello Coello   A Multi-objective Particle Swarm
                                  Optimizer Enhanced with a Differential
                                  Evolution Scheme . . . . . . . . . . . . 169--180
             Benjamin Inden and   
                 Yaochu Jin and   
             Robert Haschke and   
                   Helge Ritter   Evolution of Multisensory Integration in
                                  Large Neural Fields  . . . . . . . . . . 181--192
                  Amine Boumaza   Reducing the Learning Time of Tetris in
                                  Evolution Strategies . . . . . . . . . . 193--204
             Benjamin Doerr and   
                  Carola Winzen   Black-Box Complexity: Breaking the $O(n
                                  \log n)$ Barrier of \sc LeadingOnes  . . 205--216
                Robin Roche and   
         Lhassane Idoumghar and   
           Benjamin Blunier and   
             Abdellatif Miraoui   Imperialist Competitive Algorithm for
                                  Dynamic Optimization of Economic
                                  Dispatch in Power Systems  . . . . . . . 217--228
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7402, 2012

           Jing (Selena) He and   
                Shouling Ji and   
                         Yi Pan   Load-Balanced Virtual Backbone
                                  Construction for Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 1--12
            Adrian Kosowski and   
                Alfredo Navarra   Maximum Matching in Multi-Interface
                                  Networks . . . . . . . . . . . . . . . . 13--24
         Evangelos Kranakis and   
              Fraser MacQuarrie   Stretch Factor in Wireless Sensor
                                  Networks with Directional Antennae . . . 25--36
                   Wei Ding and   
                   Guoliang Xue   On the Minimum Diameter Cost-Constrained
                                  Steiner Tree Problem . . . . . . . . . . 37--48
                Eddie Cheng and   
                     Ke Qiu and   
                  Zhizhang Shen   The Edge-Centered Surface Area of the
                                  Arrangement Graph  . . . . . . . . . . . 49--60
                    Eunjeong Yi   On Zero Forcing Number of Permutation
                                  Graphs . . . . . . . . . . . . . . . . . 61--72
            Basile Couetoux and   
           Jérome Monnot   Complexity Results for the Empire
                                  Problem in Collection of Stars . . . . . 73--82
               Sudip Biswas and   
              Stephane Durocher   Hamiltonian Paths and Cycles in Planar
                                  Graphs . . . . . . . . . . . . . . . . . 83--94
                Chaoyi Wang and   
                   Tian Liu and   
                  Wei Jiang and   
                          Ke Xu   Feedback Vertex Sets on Tree Convex
                                  Bipartite Graphs . . . . . . . . . . . . 95--102
             Karin Arikushi and   
           Csaba D. Tóth   Crossing Angles of Geometric Graphs  . . 103--114
             Martin Lackner and   
               Reinhard Pichler   Multicut on Graphs of Bounded
                                  Clique-Width . . . . . . . . . . . . . . 115--126
               Chihao Zhang and   
               Haitao Jiang and   
                     Binhai Zhu   Radiation Hybrid Map Construction
                                  Problem Parameterized  . . . . . . . . . 127--137
               Yongding Zhu and   
                      Jinhui Xu   On the Central Path Problem  . . . . . . 138--150
                   Hong Liu and   
                     Peng Zhang   On the Generalized Multiway Cut in Trees
                                  Problem  . . . . . . . . . . . . . . . . 151--162
               Zhewei Liang and   
                 Kaizhong Zhang   Algorithms for Forest Local Similarity   163--175
                Yelena Frid and   
                   Dan Gusfield   Speedup of RNA Pseudoknotted Secondary
                                  Structure Recurrence Computation with
                                  the Four-Russians Method . . . . . . . . 176--187
             Zhi-Zhong Chen and   
                   Lusheng Wang   An Improved Approximation Algorithm for
                                  the Bandpass-2 Problem . . . . . . . . . 188--199
            Mourad El Ouali and   
              Gerold Jäger   The $b$-Matching Problem in Hypergraphs:
                                  Hardness and Approximability . . . . . . 200--211
                Qiang Zhang and   
                  Weiwei Wu and   
                     Minming Li   Resource Scheduling with Supply
                                  Constraint and Linear Cost . . . . . . . 212--222
               Iyad A. Kanj and   
                         Ge Xia   On Certain Geometric Properties of the
                                  Yao--Yao Graphs  . . . . . . . . . . . . 223--233
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7404, 2012

             Santosh S. Vempala   Effective Principal Component Analysis   1--7
                   Pavel Zezula   Future Trends in Similarity Searching    8--24
        Juan Manuel Barrios and   
            Benjamin Bustos and   
          Tomá\vs Skopal   Snake Table: a Dynamic Pivot Table for
                                  Streams of $k$-NN Searches . . . . . . . 25--39
      Tomá\vs Skopal and   
        Tomá\vs Barto\vs   Algorithmic Exploration of Axiom Spaces
                                  for Efficient Similarity Search at Large
                                  Scale  . . . . . . . . . . . . . . . . . 40--53
          Eric Sadit Tellez and   
               Edgar Chavez and   
                Karina Figueroa   Polyphasic Metric Index: Reaching the
                                  Practical Limits of Proximity Searching  54--69
               Luis G. Ares and   
         Nieves R. Brisaboa and   
Alberto Ordóñez Pereira and   
                 Oscar Pedreira   Efficient Similarity Search in Metric
                                  Spaces with Cluster Reduction  . . . . . 70--84
              Jakub Loko\vc and   
           P\vremysl \vCech and   
 Ji\vrí Novák and   
          Tomá\vs Skopal   Cut-Region: a Compact Building Block for
                                  Hierarchical Metric Indexing . . . . . . 85--100
        Bilegsaikhan Naidan and   
             Magnus Lie Hetland   Static-to-Dynamic Transformation for
                                  Metric Indexing Structures . . . . . . . 101--115
                Luis Britos and   
       A. Marcela Printista and   
                     Nora Reyes   DSACL+-tree: a Dynamic Data Structure
                                  for Similarity Search in Secondary
                                  Memory . . . . . . . . . . . . . . . . . 116--131
                Yury Malkov and   
      Alexander Ponomarenko and   
            Andrey Logvinov and   
                Vladimir Krylov   Scalable Distributed Algorithm for
                                  Approximate Nearest Neighbor Search
                                  Problem in High Dimensional General
                                  Metric Spaces  . . . . . . . . . . . . . 132--147
             Hisham Mohamed and   
Stéphane Marchand-Maillet   Parallel Approaches to Permutation-Based
                                  Indexing Using Inverted Files  . . . . . 148--161
                 Leonid Boytsov   Super-Linear Indices for Approximate
                                  Dictionary Searching . . . . . . . . . . 162--176
              Jakub Loko\vc and   
         David Novák and   
               Michal Batko and   
          Tomá\vs Skopal   Visual Image Search: Feature Signatures
                                  or/and Global Descriptors  . . . . . . . 177--191
    Tomá\vs Barto\vs and   
          Tomá\vs Skopal   Revisiting Techniques for Lowerbounding
                                  the Dynamic Time Warping Distance  . . . 192--208
             Richard Connor and   
                    Robert Moss   A Multivariate Correlation Distance for
                                  Vector Spaces  . . . . . . . . . . . . . 209--225
           Michael E. Houle and   
            Hisashi Kashima and   
                   Michael Nett   Fast Similarity Computation in
                                  Factorized Tensors . . . . . . . . . . . 226--239
              Jakub Loko\vc and   
    Tomá\vs Gro\vsup and   
          Tomá\vs Skopal   SIR: The Smart Image Retrieval Engine    240--241
 Ji\vrí Novák and   
             Jakub Galgonek and   
               David Hoksza and   
          Tomá\vs Skopal   SimTandem: Similarity Search in Tandem
                                  Mass Spectra . . . . . . . . . . . . . . 242--243
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??
             Hisham Mohamed and   
Stéphane Marchand-Maillet   Erratum: Parallel Approaches to
                                  Permutation-Based Indexing Using
                                  Inverted Files . . . . . . . . . . . . . E1--E2


Lecture Notes in Computer Science
Volume 7405, 2012

                    Jian Li and   
                   Luoyi Fu and   
                   Xinbing Wang   Throughput and Delay with Network Coding
                                  in Hybrid Mobile Ad Hoc Networks: a
                                  Global Perspective . . . . . . . . . . . 1--19
             Shengling Wang and   
                    Min Liu and   
                  Xiuzhen Cheng   HERO --- a Home Based Routing in Pocket
                                  Switched Networks  . . . . . . . . . . . 20--30
                  Wei Cheng and   
                Dengyuan Wu and   
                  Xiuzhen Cheng   Routing for Information Leakage
                                  Reduction in Multi-channel Multi-hop
                                  Ad-Hoc Social Networks . . . . . . . . . 31--42
                Chunyang Wu and   
                     Fan Wu and   
                    Guihai Chen   AMPLE: a Novel Incentive Approach to
                                  Adaptive-Width Channel Allocation in
                                  Multi-hop, Non-cooperative Wireless
                                  Networks . . . . . . . . . . . . . . . . 43--59
                    Kuai Xu and   
                  Feng Wang and   
                     Lin Gu and   
                    Jianhua Gao   Characterizing Home Network Traffic: An
                                  Inside View  . . . . . . . . . . . . . . 60--71
                 Zuying Wei and   
             Tianrong Zhang and   
                         Fan Wu   SHIELD: a Strategy-Proof and Highly
                                  Efficient Channel Auction Mechanism for
                                  Multi-radio Wireless Networks  . . . . . 72--87
            Nam Tuan Nguyen and   
               Yichuan Wang and   
                        Xin Liu   A Nonparametric Bayesian Approach for
                                  Opportunistic Data Transfer in Cellular
                                  Networks . . . . . . . . . . . . . . . . 88--99
               Yangfan Zhou and   
                 Xinyu Chen and   
                 Michael R. Lyu   Online Protocol Verification in Wireless
                                  Sensor Networks via Non-intrusive
                                  Behavior Profiling . . . . . . . . . . . 100--111
                     Na Xia and   
                  Ruji Feng and   
                        Lina Xu   SPSA Based Packet Size Optimization
                                  Algorithm in Wireless Sensor Networks    112--119
                Xianwei Sun and   
          Scott C.-H. Huang and   
                     Minming Li   Lower Bounds on Data Collection Time in
                                  Sensor Networks  . . . . . . . . . . . . 120--131
                  Deying Li and   
               Donghyun Kim and   
                    Qinghua Zhu   Minimum Total Communication Power
                                  Connected Dominating Set in Wireless
                                  Networks . . . . . . . . . . . . . . . . 132--141
                Jingsong Lv and   
           Victor C. S. Lee and   
                     Minming Li   Supporting Multi-level Quality of
                                  Services in Data Broadcast Systems . . . 142--153
         Fatme El-Moukaddem and   
                     Eric Torng   Maximizing Network Topology Lifetime
                                  Using Mobile Node Rotation . . . . . . . 154--165
                  Feng Zhao and   
                     Bin Li and   
                   Hongbin Chen   Joint Beamforming and Power Allocation
                                  Algorithm for Cognitive MIMO Systems via
                                  Game Theory  . . . . . . . . . . . . . . 166--177
                Xiaorong Xu and   
               Aiping Huang and   
                   Jianwu Zhang   Bit Allocation Scheme with Primary Base
                                  Station Cooperation in Cognitive Radio
                                  Network  . . . . . . . . . . . . . . . . 178--186
              Manish Wadhwa and   
              Chunsheng Xin and   
                       Min Song   Optimal Spectrum Sharing for
                                  Contention-Based Cognitive Radio
                                  Wireless Networks  . . . . . . . . . . . 187--196
                 Xiaohua Xu and   
               Jiannong Cao and   
                   Peng-Jun Wan   Fast Group Communication Scheduling in
                                  Duty-Cycled Multihop Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 197--205
             Mai Abdelhakim and   
                   Jian Ren and   
                    Tongtong Li   Reliable Cooperative Sensing in
                                  Cognitive Networks . . . . . . . . . . . 206--217
                 Xuanyu Cao and   
               Jinbei Zhang and   
                 Guanglin Zhang   Heterogeneous Multicast Networks with
                                  Wireless Helping Networks  . . . . . . . 218--234
           Adam C. Champion and   
                 Xinfeng Li and   
                     Qiang Zhai   Enclave: Promoting Unobtrusive and
                                  Secure Mobile Communications with a
                                  Ubiquitous Electronic World  . . . . . . 235--247
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7406, 2012

            Lawrence C. Paulson   MetiTarski: Past and Future  . . . . . . 1--10
              Gilles Barthe and   
         Juan Manuel Crespo and   
   Benjamin Grégoire and   
              César Kunz   Computer-Aided Cryptographic Proofs  . . 11--27
           André Platzer   A Differential Operator Approach to
                                  Equational Differential Invariants . . . 28--48
                   Andrew Gacek   Abella: a Tutorial . . . . . . . . . . . 49--50
               Ruben Gamboa and   
                    John Cowles   A Cantor Trio: Denumerability, the
                                  Reals, and the Real Algebraic Numbers    51--66
                    Cyril Cohen   Construction of Real Algebraic Numbers
                                  in Coq . . . . . . . . . . . . . . . . . 67--82
      Maxime Dén\`es and   
       Anders Mörtberg and   
                  Vincent Siles   A Refinement-Based Approach to
                                  Computational Algebra in Coq . . . . . . 83--98
            David Greenaway and   
             June Andronick and   
                   Gerwin Klein   Bridging the Gap: Automatic Verified
                                  Abstraction of C . . . . . . . . . . . . 99--115
                  Tobias Nipkow   Abstract Interpretation of Annotated
                                  Commands . . . . . . . . . . . . . . . . 116--132
             Patrick Michel and   
          Arnd Poetzsch-Heffter   Verifying and Generating WP Transformers
                                  for Procedures on Complex Data . . . . . 133--148
         Nils Anders Danielsson   Bag Equivalence via a Proof-Relevant
                                  Membership Relation  . . . . . . . . . . 149--165
              Peter Lammich and   
                   Thomas Tuerk   Applying Data Refinement for Monadic
                                  Programs to Hopcroft's Algorithm . . . . 166--182
             Marino Miculan and   
                 Marco Paviotti   Synthesis of Distributed Mobile Programs
                                  Using Monadic Types in Coq . . . . . . . 183--200
               David Baelde and   
            Pierre Courtieu and   
        David Gross-Amblard and   
       Christine Paulin-Mohring   Towards Provably Robust Watermarking . . 201--216
             Xingyuan Zhang and   
            Christian Urban and   
                     Chunhan Wu   Priority Inheritance Protocol Proved
                                  Correct  . . . . . . . . . . . . . . . . 217--232
            Reynald Affeldt and   
                Manabu Hagiwara   Formalization of Shannon's Theorems in
                                  SSReflect--Coq . . . . . . . . . . . . . 233--249
       Dimitrios Vytiniotis and   
            Thierry Coquand and   
                David Wahlstedt   Stop When You Are Almost-Full  . . . . . 250--265
        Christian Sternagel and   
           René Thiemann   Certification of Nontermination Proofs   266--282
                 Andrea Asperti   A Compact Proof of Decidability for
                                  Regular Expression Equivalence . . . . . 283--298
             William Mansky and   
                 Elsa L. Gunter   Using Locales to Define a Rely-Guarantee
                                  Temporal Logic . . . . . . . . . . . . . 299--314
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7408, 2012

                Per Austrin and   
             Ryan O'Donnell and   
                    John Wright   A New Point of NP-Hardness for 2-to-1
                                  Label Cover  . . . . . . . . . . . . . . 1--12
                Per Austrin and   
            Toniann Pitassi and   
                          Yu Wu   Inapproximability of Treewidth, One-Shot
                                  Pebbling, and Related Layout Problems    13--24
            Pranjal Awasthi and   
                 Avrim Blum and   
          Jamie Morgenstern and   
                     Or Sheffet   Additive Approximation for Near-Perfect
                                  Phylogeny Construction . . . . . . . . . 25--36
            Pranjal Awasthi and   
                     Or Sheffet   Improved Spectral-Norm Bounds for
                                  Clustering . . . . . . . . . . . . . . . 37--49
               Piotr Berman and   
           Grigory Yaroslavtsev   Primal-Dual Approximation Algorithms for
                                  Node-Weighted Network Design in Planar
                                  Graphs . . . . . . . . . . . . . . . . . 50--60
           Petros Boufounos and   
              Volkan Cevher and   
            Anna C. Gilbert and   
                      Yi Li and   
              Martin J. Strauss   What's the Frequency, Kenneth?:
                                  Sublinear Fourier Sampling Off the Grid  61--72
        Parinya Chalermsook and   
              Julia Chuzhoy and   
             Sampath Kannan and   
                 Sanjeev Khanna   Improved Hardness Results for Profit
                                  Maximization Pricing Problems with
                                  Unlimited Supply . . . . . . . . . . . . 73--84
              Ho-Leung Chan and   
                Tak-Wah Lam and   
                     Rongbin Li   Online Flow Time Scheduling in the
                                  Presence of Preemption Overhead  . . . . 85--97
            Chandra Chekuri and   
                  Alina Ene and   
                   Ali Vakilian   Prize-Collecting Survivable Network
                                  Design in Node-Weighted Graphs . . . . . 98--109
            Joseph Cheriyan and   
          Zachary Friggstad and   
                     Zhihan Gao   Approximating Minimum-Cost Connected
                                  T-Joins  . . . . . . . . . . . . . . . . 110--121
             Michael Dinitz and   
                 Gordon Wilfong   iBGP and Constrained Connectivity  . . . 122--133
               Leah Epstein and   
              \Lukasz Je\.z and   
        Ji\vrí Sgall and   
                   Rob van Stee   Online Scheduling of Jobs with Fixed
                                  Start Times on Related Machines  . . . . 134--145
      Cristina G. Fernandes and   
    Luís A. A. Meira and   
  Flávio K. Miyazawa and   
         Lehilton L. C. Pedrosa   A Systematic Approach to Bound Factor
                                  Revealing LPs and Its Application to the
                                  Metric and Squared Metric Facility
                                  Location Problems  . . . . . . . . . . . 146--157
       Venkatesan Guruswami and   
                      Yuan Zhou   Approximating Bounded Occurrence
                                  Ordering CSPs  . . . . . . . . . . . . . 158--169
             Johan Håstad   On the NP-Hardness of Max-Not-2  . . . . 170--181
                    Ishay Haviv   The Remote Set Problem on Lattices . . . 182--193
           Matthias Hellwig and   
                Alexander Souza   Approximation Algorithms for Generalized
                                  and Variable-Sized Bin Covering  . . . . 194--205
               Satoru Iwata and   
              Prasad Tetali and   
               Pushkar Tripathi   Approximating Minimum Linear Ordering
                                  Problems . . . . . . . . . . . . . . . . 206--217
              Samir Khuller and   
                 Barna Saha and   
            Kanthi K. Sarpatwar   New Approximation Results for Resource
                                  Replication Problems . . . . . . . . . . 218--230
           Christian Konrad and   
Frédéric Magniez and   
                 Claire Mathieu   Maximum Matching in Semi-streaming with
                                  Few Passes . . . . . . . . . . . . . . . 231--242
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7409, 2012

Luís Felipe I. Cunha and   
         Luis Antonio B. Kowada   Transposition Diameter and Lonely
                                  Permutations . . . . . . . . . . . . . . 1--12
               Pedro Feijao and   
                  Joao Meidanis   Extending the Algebraic Formalism for
                                  Genome Rearrangements to Include Linear
                                  Chromosomes  . . . . . . . . . . . . . . 13--24
Gustavo Rodrigues Galvão and   
                    Zanoni Dias   On the Approximation Ratio of Algorithms
                                  for Sorting by Transpositions without
                                  Using Cycle Graphs . . . . . . . . . . . 25--36
              A. A. Matroud and   
              C. P. Tuffley and   
                      D. Bryant   A Comparison of Three Heuristic Methods
                                  for Solving the Parsing Problem for
                                  Tandem Repeats . . . . . . . . . . . . . 37--48
               Ronny Lorenz and   
            Stephan H. Bernhart   RNA Folding Algorithms with
                                  G-Quadruplexes . . . . . . . . . . . . . 49--60
César Manuel Vargas Benítez   Molecular Dynamics for Simulating the
                                  Protein Folding Process Using the $3$D
                                  AB Off-Lattice Model . . . . . . . . . . 61--72
              Halian Vilela and   
             Tainá Raiol   A Bioconductor Based Workflow for Z-DNA
                                  Region Detection and Biological
                                  Inference  . . . . . . . . . . . . . . . 73--83
        Fernando A. F. Braz and   
                  Jader S. Cruz   A Probabilistic Model Checking Approach
                                  to Investigate the Palytoxin Effects on
                                  the Na$^+$ /K$^+$-ATPase . . . . . . . . 84--96
         Mariana R. Mendoza and   
        Guilherme C. da Fonseca   RFMirTarget: a Random Forest Classifier
                                  for Human miRNA Target Gene Prediction   97--108
   Eduardo G. Gusmão and   
            Christoph Dieterich   Prediction of Transcription Factor
                                  Binding Sites by Integrating DNase
                                  Digestion and Histone Modification . . . 109--119
             Pablo A. Jaskowiak   Evaluating Correlation Coefficients for
                                  Clustering Gene Expression Profiles of
                                  Cancer . . . . . . . . . . . . . . . . . 120--131
     Rogério S. Rosa and   
            Rafael H. S. Santos   Associating Genotype Sequence Properties
                                  to Haplotype Inference Errors  . . . . . 132--143
    Sérgio Lifschitz and   
        Carlos Juliano M. Viana   Design and Implementation of
                                  ProteinWorldDB . . . . . . . . . . . . . 144--155
               Ana T. Winck and   
           Christian V. Quevedo   A Comparative Analysis of Public Ligand
                                  Databases Based on Molecular Descriptors 156--167
      Wellington S. Martins and   
               Thiago F. Rangel   Phylogenetic Distance Computation Using
                                  CUDA . . . . . . . . . . . . . . . . . . 168--178
 Kary A. C. S. Ocaña and   
             Daniel de Oliveira   Exploring Molecular Evolution
                                  Reconstruction Using a Parallel Cloud
                                  Based Scientific Workflow  . . . . . . . 179--191
    José Fernando Garcia   How Bioinformatics Enables Livestock
                                  Applied Sciences in the Genomic Era  . . 192--201
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7410, 2012

              Andrew L. Szilard   The Kind Hearted Dragon Prof. Sheng Yu,
                                  1950--2012 . . . . . . . . . . . . . . . 1--6
Erzsébet Csuhaj-Varjú   P and dP Automata: Unconventional versus
                                  Classical Automata . . . . . . . . . . . 7--22
                    Kazuo Iwama   Recovering Strings in Oracles: Quantum
                                  and Classic  . . . . . . . . . . . . . . 23--23
          Juraj Hromkovi\vc and   
Rastislav Královi\vc and   
  Richard Královi\vc and   
             Richard \vStefanec   Determinism vs. Nondeterminism for
                                  Two-Way Automata . . . . . . . . . . . . 24--39
                    Jarkko Kari   Cellular Automata, the Collatz
                                  Conjecture and Powers of $3/2$ . . . . . 40--49
          Janusz Brzozowski and   
                    Hellis Tamm   Quotient Complexities of Atoms of
                                  Regular Languages  . . . . . . . . . . . 50--61
   Marie-Pierre Béal and   
      Jean-Marc Champarnaud and   
    Jean-Philippe Dubernard and   
                 Hadrien Jeanne   Decidability of Geometricity of Regular
                                  Languages  . . . . . . . . . . . . . . . 62--72
               Markus L. Schmid   Inside the Class of REGEX Languages  . . 73--84
                 Yo-Sub Han and   
                 Sang-Ki Ko and   
                    Kai Salomaa   Computing the Edit-Distance between a
                                  Regular Language and a Context-Free
                                  Language . . . . . . . . . . . . . . . . 85--96
           Michael Hoffmann and   
              Derek F. Holt and   
           Matthew D. Owens and   
              Richard M. Thomas   Semigroups with a Context-Free Word
                                  Problem  . . . . . . . . . . . . . . . . 97--108
              Markus Holzer and   
           Sebastian Jakobi and   
                  Ian McQuillan   Generalized Derivations with
                                  Synchronized Context-Free Grammars . . . 109--120
              Alexander Okhotin   Non-erasing Variants of the
                                  Chomsky--Schützenberger Theorem . . . . . 121--129
          Daniel Reidenbach and   
               Markus L. Schmid   Regular and Context-Free Pattern
                                  Languages over Small Alphabets . . . . . 130--141
         Zoltan Ésik and   
                  Satoshi Okawa   On Context-Free Languages of Scattered
                                  Words  . . . . . . . . . . . . . . . . . 142--153
             Tommi Lehtinen and   
              Alexander Okhotin   Homomorphisms Preserving Deterministic
                                  Context-Free Languages . . . . . . . . . 154--165
             Viliam Geffert and   
          Dana Pardubská   Unary Coded NP-Complete Languages in
                                  ASPACE$(\log \log n)$  . . . . . . . . . 166--177
              Andreas Krebs and   
          Klaus-Jörn Lange   Dense Completeness . . . . . . . . . . . 178--189
              Markus Holzer and   
               Sebastian Jakobi   From Equivalence to Almost-Equivalence,
                                  and Beyond--- Minimizing Automata with
                                  Errors . . . . . . . . . . . . . . . . . 190--201
      Christos A. Kapoutsis and   
                  Nans Lefebvre   Analogs of Fagin's Theorem for Small
                                  Nondeterministic Finite Automata . . . . 202--213
              Martin Kutrib and   
            Andreas Malcher and   
             Matthias Wendlandt   States and Heads Do Count for Unary
                                  Multi-head Finite Automata . . . . . . . 214--225
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7411, 2012

                Norah Jones and   
                     Esyin Chew   Social Software for Learning --- The
                                  Institutional Policy of the University
                                  of Glamorgan . . . . . . . . . . . . . . 1--8
             Ronghuai Huang and   
               Haisen Zhang and   
                  Yushun Li and   
                   Junfeng Yang   A Framework of Designing Learning
                                  Activities for Mobile Learning . . . . . 9--22
         Uro\vs Kr\vcadinac and   
         Jelena Jovanovi\'c and   
            Vladan Deved\vzi\'c   Visualizing the Affective Structure of
                                  Students Interaction . . . . . . . . . . 23--34
                Nga-Sin Lau and   
                        Lui Lam   An Investigation of the Determinants
                                  Influencing Student Learning Motivation
                                  via Facebook Private Group in Teaching
                                  and Learning . . . . . . . . . . . . . . 35--44
                Cheng-Huang Yen   A Preliminary Study of Disturbing
                                  Silence in Asynchronous Discussion
                                  Forums . . . . . . . . . . . . . . . . . 45--56
               Huiling Chen and   
               Guoqing Zhao and   
                      Ningyi Xu   The Analysis of Research Hotspots and
                                  Fronts of Knowledge Visualization Based
                                  on CiteSpace II  . . . . . . . . . . . . 57--68
              Shaoming Chai and   
                   Meirong Ding   Practical Research on the Assessment of
                                  Online Collaborative English Learning
                                  --- a Case Study of Blackboard-Based
                                  Course ``Intercultural Communication''   69--76
                  Shuang Li and   
               Pengfeng Shi and   
                        Qi Tang   A Case Study on Scaffolding Design for
                                  Wiki-Based Collaborative Knowledge
                                  Building . . . . . . . . . . . . . . . . 77--88
             Simon K. S. Cheung   A Study on the Use of Mobile Devices for
                                  Distance Learning  . . . . . . . . . . . 89--98
              Harrison Hao Yang   The Development of Collaborative Action
                                  Research through Cloud Computing
                                  Document-Sharing Services and Blended
                                  Learning Process . . . . . . . . . . . . 99--108
                Wenchong Li and   
                     Xiuping Tu   Research on the Comprehensive Practice
                                  Course of Primary School Based on
                                  Knowledge Building . . . . . . . . . . . 109--119
               Chin Kee Diu and   
                      Wai Yu Ng   Cost Effective Methodology in E-Adoption
                                  for E-Training Providers . . . . . . . . 120--131
                Yoko Hirata and   
               Yoshihiro Hirata   Learning Logs in Hybrid Language
                                  Learning: Students' Views and
                                  Preferences  . . . . . . . . . . . . . . 132--143
                  Kanishka Bedi   The Significance of Face-to-Face
                                  Instruction in Hybrid Executive
                                  Education  . . . . . . . . . . . . . . . 144--154
               Pingping Zuo and   
                      Su Mu and   
                   Xiaomeng Han   A Social Network Analysis of Students'
                                  Online Interaction in Hybrid Learning
                                  --- a Case Study of ``Media and
                                  Teaching'' Course  . . . . . . . . . . . 155--164
                     J. Lam and   
                     C. G. Duan   A Review of Mobile Learning Environment
                                  in Higher Education Sector of Hong Kong:
                                  Technological and Social Perspectives    165--173
                  Yanyan Li and   
                        Li Wang   Modeling Semantic Context for Active
                                  e-Learning in the Workplace  . . . . . . 174--185
                    Xing Lu and   
               Guodong Zhao and   
                 Jianfeng Jiang   Influential Factors of Blended Learning
                                  in Chinese Colleges: From the
                                  Perspective of Instructor's Acceptance
                                  and Students' Satisfaction . . . . . . . 186--197
                  Ningyi Xu and   
               Guoqing Zhao and   
               Huiling Chen and   
                      Leisi Pei   The Colored Concept Map and Its
                                  Application in Learning Assistance
                                  Program  . . . . . . . . . . . . . . . . 198--209
                Joseph Fong and   
      Kenneth Ting Yan Wong and   
                       Tracy Wu   PTA System: Mobile Computing Student
                                  Assessment by Parent and Teacher
                                  Association  . . . . . . . . . . . . . . 210--220
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7412, 2012

           Mohsen Alimomeni and   
          Reihaneh Safavi-Naini   Guessing Secrecy . . . . . . . . . . . . 1--13
             Anne Broadbent and   
             Stacey Jeffery and   
              Samuel Ranellucci   Trading Robustness for Correctness and
                                  Privacy in Certain Multiparty
                                  Computations, beyond an Honest Majority  14--36
                Ran Canetti and   
                   Ben Riva and   
                Guy N. Rothblum   Two Protocols for Delegation of
                                  Computation  . . . . . . . . . . . . . . 37--61
              Ronald Cramer and   
         Ivan Damgård and   
                 Valerio Pastro   On the Amortized Complexity of Zero
                                  Knowledge Protocols for Multiplicative
                                  Relations  . . . . . . . . . . . . . . . 62--79
     Bernardo Machado David and   
      Anderson C. A. Nascimento   Universally Composable Oblivious
                                  Transfer from Lossy Encryption and the
                                  McEliece Assumptions . . . . . . . . . . 80--99
                 Yevgeniy Dodis   Shannon Impossibility, Revisited . . . . 100--110
         Nico Döttling and   
         Daniel Kraschewski and   
    Jörn Müller-Quade   Statistically Secure Linear-Rate
                                  Dimension Extension for Oblivious Affine
                                  Function Evaluation  . . . . . . . . . . 111--128
                Martin Hirt and   
            Christoph Lucas and   
                Ueli Maurer and   
                   Dominik Raub   Passive Corruption in Statistical
                                  Multi-Party Computation  . . . . . . . . 129--146
              Marcel Keller and   
Gert Læssòe Mikkelsen and   
                      Andy Rupp   Efficient Threshold Zero-Knowledge with
                                  Applications to User-Centric Protocols   147--166
             Yohei Watanabe and   
             Takenobu Seito and   
                  Junji Shikata   Information-Theoretic Timed-Release
                                  Security: Key-Agreement, Encryption, and
                                  Authentication Codes . . . . . . . . . . 167--186
               Maki Yoshida and   
              Toru Fujiwara and   
                 Marc Fossorier   Optimum General Threshold Secret Sharing 187--204
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7413, 2012

                       Yiyu Yao   An Outline of a Theory of Three-Way
                                  Decisions  . . . . . . . . . . . . . . . 1--17
                Shaoyong Li and   
                 Tianrui Li and   
                      Chuan Luo   A Multi-granulation Model under
                                  Dominance-Based Rough Set Approach . . . 18--25
              Hailiang Wang and   
                  Mingtian Zhou   A Refined Rough $k$-Means Clustering
                                  with Hybrid Threshold  . . . . . . . . . 26--35
                Anping Zeng and   
                 Tianrui Li and   
                Junbo Zhang and   
                        Dun Liu   An Incremental Approach for Updating
                                  Approximations of Rough Fuzzy Sets under
                                  the Variation of the Object Set  . . . . 36--45
           Patrick G. Clark and   
    Jerzy W. Grzymala-Busse and   
              Zdzislaw S. Hippe   How Good Are Probabilistic
                                  Approximations for Rule Induction from
                                  Data with Missing Attribute Values?  . . 46--55
      Jerzy B\laszczy\'nski and   
         Roman S\lowi\'nski and   
                Marcin Szel\kag   Induction of Ordinal Classification
                                  Rules from Incomplete Data . . . . . . . 56--65
                  Hai-Long Yang   Interval Valued Fuzzy Rough Set Model on
                                  Two Different Universes and Its
                                  Application  . . . . . . . . . . . . . . 66--72
               Chien-Chung Chan   Maximal Characteristic Sets and
                                  Neighborhoods Approach to Incomplete
                                  Information Systems  . . . . . . . . . . 73--82
               Bingzhen Sun and   
                  Weimin Ma and   
                Haiyan Zhao and   
                    Xinxin Wang   Probabilistic Fuzzy Rough Set Model over
                                  Two Universes  . . . . . . . . . . . . . 83--93
         Dominik \'Sl\kezak and   
                Piotr Synak and   
    Jakub Wróblewski and   
           Janusz Borkowski and   
                  Graham Toppin   Rough Optimizations of Complex
                                  Expressions in Infobright's RDBMS  . . . 94--99
                   Yang Liu and   
                 Guohua Bai and   
               Qinglei Zhou and   
      Elisabeth Rakus-Andersson   Rough Sets Based Inequality Rule Learner
                                  for Knowledge Discovery  . . . . . . . . 100--105
            Omar S. Soliman and   
           Aboul Ella Hassanien   A Computer Aided Diagnosis System for
                                  Breast Cancer Using Support Vector
                                  Machine  . . . . . . . . . . . . . . . . 106--115
                  Yong Yang and   
                      Yunxia Lu   A New Method of the Accurate Eye Corner
                                  Location . . . . . . . . . . . . . . . . 116--125
          Isabelle Tamanini and   
Plácido Rogério Pinheiro and   
Cícero Nogueira dos Santos   A Hybrid Approach of Verbal Decision
                                  Analysis and Machine Learning  . . . . . 126--131
                  Long Chen and   
                Banglan Liu and   
                       Wei Song   An Efficient Data Integrity Verification
                                  Method Supporting Multi-granular
                                  Operation with Commutative Hash  . . . . 132--141
            Tomasz Xi\keski and   
Agnieszka Nowak-Brzezi\'nska and   
           Alicja Wakulicz-Deja   Density-Based Method for Clustering and
                                  Visualization of Complex Data  . . . . . 142--149
Agnieszka Nowak-Brzezi\'nska and   
                Tomasz Jach and   
           Alicja Wakulicz-Deja   Inference Processes Using Incomplete
                                  Knowledge in Decision Support Systems
                                  --- Chosen Aspects . . . . . . . . . . . 150--155
             Andrzej Janusz and   
        Wojciech \'Swieboda and   
              Adam Krasuski and   
                Hung Son Nguyen   Interactive Document Indexing Method
                                  Based on Explicit Semantic Analysis  . . 156--165
                   Bo Huang and   
                   Yan Yang and   
              Amjad Mahmood and   
                   Hongjun Wang   Microblog Topic Detection Based on LDA
                                  Model and Single-Pass Clustering . . . . 166--171
             Marcin Szczuka and   
         Pawe\l Betli\'nski and   
                    Kamil Herba   Named Entity Matching in Publication
                                  Databases  . . . . . . . . . . . . . . . 172--179
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7414, 2012

           Piotr Wasilewski and   
                Andrzej Skowron   A Characterization of Rough Separability 1--10
                Guoyin Wang and   
                      Lihe Guan   Data-Driven Valued Tolerance Relation    11--19
                  Weihua Xu and   
                 Wenxin Sun and   
                     Yufeng Liu   Optimistic Multi-Granulation Fuzzy Rough
                                  Set Model Based on Triangular Norm . . . 20--27
                 Junyi Zhou and   
                     Xibei Yang   Rough Set Model Based on Hybrid
                                  Tolerance Relation . . . . . . . . . . . 28--33
     P. S. V. S. Sai Prasad and   
             C. Raghavendra Rao   Scalable Improved Quick Reduct: Sample
                                  Based  . . . . . . . . . . . . . . . . . 34--39
                  Keyun Qin and   
              Zhenming Song and   
                        Yang Xu   Soft Rough Sets Based on Similarity
                                  Measures . . . . . . . . . . . . . . . . 40--48
                   Huan Liu and   
                Yingcang Ma and   
                    Xuezhen Dai   Theory of Truth Degrees in Three Valued
                                  Formed System RSL  . . . . . . . . . . . 49--54
                  Weihua Xu and   
                 Yufeng Liu and   
                     Wenxin Sun   Upper Approximation Reduction Based on
                                  Intuitionistic Fuzzy $\mathcal{T}$
                                  Equivalence Information Systems  . . . . 55--62
                   Yang Liu and   
               Qinglei Zhou and   
  Elisabeth Rakus-Andersson and   
                     Guohua Bai   A Fuzzy-Rough Sets Based Compact Rule
                                  Induction Method for Classifying Hybrid
                                  Data . . . . . . . . . . . . . . . . . . 63--70
                 Junyi Chai and   
            James N. K. Liu and   
                      Anming Li   A New Intuitionistic Fuzzy Rough Set
                                  Approach for Decision Support  . . . . . 71--80
       Tsukasa Matsubayashi and   
                Yuichi Kato and   
                  Tetsuro Saeki   A New Rule Induction Method from a
                                  Decision Table Using a Statistical Test  81--90
               Singh Kavita and   
              Zaveri Mukesh and   
             Raghuwanshi Mukesh   A Rough Neurocomputing Approach for
                                  Illumination Invariant Face Recognition
                                  System . . . . . . . . . . . . . . . . . 91--100
                Hongbo Zhao and   
                 Feng Jiang and   
                  Chunping Wang   An Approximation Decision Entropy Based
                                  Decision Tree Algorithm and Its
                                  Application in Intrusion Detection . . . 101--106
         \Lukasz Pa\lkowski and   
      Jerzy B\laszczy\'nski and   
          Jerzy Krysi\'nski and   
             Roman S\lowi\'nski   Application of Rough Set Theory to
                                  Prediction of Antimicrobial Activity of
                                  Bis-quaternary Ammonium Chlorides  . . . 107--116
                Dayong Deng and   
                   Lin Chen and   
                    Dianxun Yan   Classification and Decision Based on
                                  Parallel Reducts and $F$-Rough Sets  . . 117--122
               Manish Joshi and   
                  Pawan Lingras   Evidential Clustering or Rough
                                  Clustering: The Choice Is Yours  . . . . 123--128
          Salsabil Trabelsi and   
               Zied Elouedi and   
                  Pawan Lingras   Heuristic for Attribute Selection Using
                                  Belief Discernibility Matrix . . . . . . 129--138
            Shusaku Tsumoto and   
                   Shoji Hirano   Incremental Rules Induction Based on
                                  Rule Layers  . . . . . . . . . . . . . . 139--148
             Fawaz Alsolami and   
              Igor Chikalov and   
            Mikhail Moshkov and   
                 Beata Zielosko   Optimization of Inhibitory Decision
                                  Rules Relative to Length and Coverage    149--154
                  Yong Yang and   
                 Zhengrong Chen   Parallelized Computing of Attribute Core
                                  Based on Rough Set Theory and MapReduce  155--160
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7415, 2012

             Gwendoline Fox and   
              Juliette Thuilier   Predicting the Position of Attributive
                                  Adjectives in the French NP  . . . . . . 1--15
      Miroslav Janí\vcek   Abductive Reasoning for Continual
                                  Dialogue Understanding . . . . . . . . . 16--31
             Johann-Mattis List   SCA: Phonetic Alignment Based on Sound
                                  Classes  . . . . . . . . . . . . . . . . 32--51
                 Simon Pauw and   
               Michael Spranger   Embodied Quantifiers . . . . . . . . . . 52--66
             Marcin W\lodarczak   Ranked Multidimensional Dialogue Act
                                  Annotation . . . . . . . . . . . . . . . 67--77
          Johannes Klaus Fichte   The Good, the Bad, and the Odd: Cycles
                                  in Answer-Set Programs . . . . . . . . . 78--90
                  Meghdad Ghari   Distributed Knowledge with
                                  Justifications . . . . . . . . . . . . . 91--108
             Wesley H. Holliday   Epistemic Logic, Relevant Alternatives,
                                  and the Dynamics of Context  . . . . . . 109--129
                     Tin Perkov   Towards a Generalization of Modal
                                  Definability . . . . . . . . . . . . . . 130--139
             Rasmus K. Rendsvig   Modeling Semantic Competence: a Critical
                                  Review of Frege's Puzzle about Identity  140--157
             Antonius Weinzierl   Comparing Inconsistency Resolutions in
                                  Multi-Context Systems  . . . . . . . . . 158--174
                Heather Burnett   Vague Determiner Phrases and
                                  Distributive Predication . . . . . . . . 175--194
                 Hanna de Vries   The Syntax and Semantics of Evaluative
                                  Degree Modification  . . . . . . . . . . 195--211
            Casper Storm Hansen   A Kripkean Solution to Paradoxes of
                                  Denotation . . . . . . . . . . . . . . . 212--220
                  Jason Quinley   Trust Games as a Model for Requests  . . 221--233
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7416, 2012

                  Aijun Bai and   
              Xiaoping Chen and   
          Patrick MacAlpine and   
              Daniel Urieli and   
             Samuel Barrett and   
                    Peter Stone   WrightEagle and UT Austin Villa: RoboCup
                                  2011 Simulation League Champions . . . . 1--12
       Kanjanapan Sukvichai and   
Teeratath Ariyachartphadungkit and   
                    Krit Chaiso   Robot Hardware, Software, and
                                  Technologies behind the SKUBA Robot Team 13--24
                   Tim Laue and   
          Thomas Röfer and   
         Katharina Gillmann and   
                 Felix Wenk and   
                 Colin Graf and   
                 Tobias Kastner   B-Human 2011 --- Eliminating Game Delays 25--36
              Daniel D. Lee and   
              Seung-Joon Yi and   
             Stephen McGill and   
                 Yida Zhang and   
                Sven Behnke and   
                Marcell Missura   Robocup 2011 Humanoid League Winners . . 37--50
    Jörg Stückler and   
            David Droeschel and   
         Kathrin Gräve and   
                  Dirk Holz and   
         Jochen Kläß   Towards Robust Mobility, Flexible Object
                                  Manipulation, and Intuitive Multimodal
                                  Interaction for Domestic Service Robots  51--62
                 Amy Eguchi and   
               Nicky Hughes and   
           Matthias Stocker and   
                Jiayao Shen and   
                  Naomi Chikuma   RoboCupJunior --- a Decade Later . . . . 63--77
    Jörg Stückler and   
                    Sven Behnke   Compliant Task-Space Control with
                                  Back-Drivable Servo Actuators  . . . . . 78--89
           Mohammad Norouzi and   
            Freek De Bruijn and   
        Jaime Valls Miró   Planning Stable Paths for Urban Search
                                  and Rescue Robots  . . . . . . . . . . . 90--101
                 Colin Graf and   
              Thomas Röfer   A Center of Mass Observing $3$D-LIPM
                                  Gait for the RoboCup Standard Platform
                                  League Humanoid  . . . . . . . . . . . . 102--113
          João Cunha and   
                   Nuno Lau and   
          João Rodrigues   Ball Interception Behaviour in Robotic
                                  Soccer . . . . . . . . . . . . . . . . . 114--125
              Oliver Urbann and   
          Sören Kerner and   
                   Stefan Tasse   Rigid and Soft Body Simulation Featuring
                                  Realistic Walk Behaviour . . . . . . . . 126--136
       Christian A. Mueller and   
       Nico Hochgeschwender and   
                Paul G. Ploeger   Towards Robust Object Categorization for
                                  Mobile Robots with Combination of
                                  Classifiers  . . . . . . . . . . . . . . 137--148
             Saskia Metzler and   
     Matthias Nieuwenhuisen and   
                    Sven Behnke   Learning Visual Obstacle Detection Using
                                  Color Histogram Features . . . . . . . . 149--161
            Hamid Moballegh and   
           Naja von Schmude and   
              Raúl Rojas   Gradient Vector Griding: An Approach to
                                  Shape-Based Object Detection in RoboCup
                                  Scenarios  . . . . . . . . . . . . . . . 162--173
              Eran Sadeh-Or and   
                 Gal A. Kaminka   AnySURF: Flexible Local Features
                                  Computation  . . . . . . . . . . . . . . 174--185
            Aris Valtazanos and   
        Subramanian Ramamoorthy   Online Motion Planning for Multi-robot
                                  Interaction Using Composable Reachable
                                  Sets . . . . . . . . . . . . . . . . . . 186--197
            Andreas Schmitz and   
            Marcell Missura and   
                    Sven Behnke   Real-Time Trajectory Generation by
                                  Offline Footstep Planning for a Humanoid
                                  Soccer Robot . . . . . . . . . . . . . . 198--209
                   Feng Xue and   
              Xiaoping Chen and   
                  Jinsu Liu and   
                  Daniele Nardi   Real Time Biped Walking Gait Pattern
                                  Generator for a Real Robot . . . . . . . 210--221
            Gregor Jochmann and   
          Sören Kerner and   
               Stefan Tasse and   
                  Oliver Urbann   Efficient Multi-hypotheses Unscented
                                  Kalman Filtering for Robust Localization 222--233
      Román Marchant and   
             Pablo Guerrero and   
          Javier Ruiz-del-Solar   A Portable Ground-Truth System Based on
                                  a Laser Sensor . . . . . . . . . . . . . 234--245
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7417, 2012

            Viet Tung Hoang and   
                 Ben Morris and   
                Phillip Rogaway   An Enciphering Scheme Based on a Card
                                  Shuffle  . . . . . . . . . . . . . . . . 1--13
             Will Landecker and   
           Thomas Shrimpton and   
              R. Seth Terashima   Tweakable Blockciphers with Beyond
                                  Birthday-Bound Security  . . . . . . . . 14--30
                Tetsu Iwata and   
             Keisuke Ohashi and   
             Kazuhiko Minematsu   Breaking and Repairing GCM Security
                                  Proofs . . . . . . . . . . . . . . . . . 31--49
  Mohamed Ahmed Abdelraheem and   
             Martin Ågren   On the Distribution of Linear Biases:
                                  Three Instructive Examples . . . . . . . 50--67
                 Eric Miles and   
                 Emanuele Viola   Substitution-Permutation Networks,
                                  Pseudorandom Functions, and Natural
                                  Proofs . . . . . . . . . . . . . . . . . 68--85
              Jonathan Zittrain   The End of Crypto  . . . . . . . . . . . 86--86
                   Mike Rosulek   Must You Know the Code of f to Securely
                                  Compute f? . . . . . . . . . . . . . . . 87--104
                Sanjam Garg and   
                     Amit Sahai   Adaptively Secure Multi-Party
                                  Computation with Dishonest Majority  . . 105--123
            Joël Alwen and   
              Jonathan Katz and   
                    Ueli Maurer   Collusion-Preserving Computation . . . . 124--143
                Amos Beimel and   
             Oriol Farr\`as and   
                    Yuval Mintz   Secret Sharing Schemes for Very Dense
                                  Graphs . . . . . . . . . . . . . . . . . 144--161
            Sergey Gorbunov and   
       Vinod Vaikuntanathan and   
                    Hoeteck Wee   Functional Encryption with Bounded
                                  Collusions via Multi-party Computation   162--179
              Allison Lewko and   
                   Brent Waters   New Proof Methods for Attribute-Based
                                  Encryption: Achieving Full Security
                                  through Selective Techniques . . . . . . 180--198
                 Amit Sahai and   
           Hakan Seyalioglu and   
                   Brent Waters   Dynamic Credentials and Ciphertext
                                  Delegation for Attribute-Based
                                  Encryption . . . . . . . . . . . . . . . 199--217
                   Brent Waters   Functional Encryption for Regular
                                  Languages  . . . . . . . . . . . . . . . 218--235
              Melissa Chase and   
                  Ivan Visconti   Secure Database Commitments and
                                  Universal Arguments of Quasi Knowledge   236--254
               Nir Bitansky and   
              Alessandro Chiesa   Succinct Arguments from Multi-prover
                                  Interactive Proofs and Their Efficiency
                                  Benefits . . . . . . . . . . . . . . . . 255--272
                Tibor Jager and   
             Florian Kohlar and   
               Sven Schäge   On the Security of TLS-DHE in the
                                  Standard Model . . . . . . . . . . . . . 273--293
              Mihir Bellare and   
            Stefano Tessaro and   
                Alexander Vardy   Semantic Security for the Wiretap
                                  Channel  . . . . . . . . . . . . . . . . 294--311
              Mihir Bellare and   
          Thomas Ristenpart and   
                Stefano Tessaro   Multi-instance Security and Its
                                  Application to Password-Based
                                  Cryptography . . . . . . . . . . . . . . 312--329
               Bart Mennink and   
                   Bart Preneel   Hash Functions Based on Three
                                  Permutations: a Generic Security
                                  Analysis . . . . . . . . . . . . . . . . 330--347
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7418, 2012

                     Wenfei Fan   Data Quality: Theory and Practice  . . . 1--16
                     Jiawei Han   Construction of Web-Based,
                                  Service-Oriented Information Networks: a
                                  Data Mining Perspective  . . . . . . . . 17--19
             Rakesh Agrawal and   
        Sreenivas Gollapudi and   
              Anitha Kannan and   
          Krishnaram Kenthapadi   Electronic Textbooks and Data Mining . . 20--21
               Shangfeng Mo and   
                  Hong Chen and   
                    Yinglong Li   Topology-Based Data Compression in
                                  Wireless Sensor Networks . . . . . . . . 22--34
                       Long Tan   A Residual Energy-Based Fairness
                                  Scheduling MAC Protocol for Wireless
                                  Sensor Networks  . . . . . . . . . . . . 35--46
                  Guilin Li and   
              Longjiang Guo and   
                 Jian Zhang and   
                  Minghong Liao   Topology-Aided Geographic Routing
                                  Protocol for Wireless Sensor Networks    47--57
                  Nan Zhang and   
                   Jianhua Feng   Polaris: a Fingerprint-Based
                                  Localization System over Wireless
                                  Networks . . . . . . . . . . . . . . . . 58--70
                Jun-Feng Qu and   
                    Mengchi Liu   A High-Performance Algorithm for
                                  Frequent Itemset Mining  . . . . . . . . 71--82
                Xiang Zhang and   
               Cuifang Zhao and   
                  Peng Wang and   
                    Fengbo Zhou   Mining Link Patterns in Linked Data  . . 83--94
               Kaisong Song and   
                Daling Wang and   
                   Shi Feng and   
                  Dong Wang and   
                          Ge Yu   Detecting Positive Opinion Leader Group
                                  from Forum . . . . . . . . . . . . . . . 95--101
                 Sumit Negi and   
            Manish A. Bhide and   
            Vishal S. Batra and   
          Mukesh K. Mohania and   
                   Sunil Bajpai   D'MART: a Tool for Building and
                                  Populating Data Warehouse Model from
                                  Existing Reports and Tables  . . . . . . 102--113
                    Xin Lin and   
               Jianliang Xu and   
                    Junzhong Gu   Continuous Skyline Queries with
                                  Integrity Assurance in Outsourced
                                  Spatial Databases  . . . . . . . . . . . 114--126
                      Yu Suzuki   Assessing Quality Values of Wikipedia
                                  Articles Using Implicit Positive and
                                  Negative Ratings . . . . . . . . . . . . 127--138
                     Hao Wu and   
                     Lizhu Zhou   Form-Based Instant Search and Query
                                  Autocompletion on Relational Data  . . . 139--151
                  Yan Zhang and   
                  Long Yang and   
                   Hongzhi Wang   Range Query Estimation for Dirty Data
                                  Management System  . . . . . . . . . . . 152--164
                     Yu Sun and   
                  Jin Huang and   
                Yueguo Chen and   
                Xiaoyong Du and   
                      Rui Zhang   Top-$k$ Most Incremental Location
                                  Selection with Capacity Constraint . . . 165--171
                  Renfei Li and   
                Daling Wang and   
                Yifei Zhang and   
                   Shi Feng and   
                          Ge Yu   An Approach of Text-Based and
                                  Image-Based Multi-modal Search for
                                  Online Shopping  . . . . . . . . . . . . 172--184
   Reza Taghizadeh Hemayati and   
                 Weiyi Meng and   
                     Clement Yu   Categorizing Search Results Using
                                  WordNet and Wikipedia  . . . . . . . . . 185--197
                  Htoo Htoo and   
              Yutaka Ohsawa and   
            Noboru Sonehara and   
                 Masao Sakauchi   Optimal Sequenced Route Query Algorithm
                                  Using Visited POI Graph  . . . . . . . . 198--209
                 Jifeng Cui and   
                 Yong Zhang and   
                    Chao Li and   
                  ChunXiao Xing   A Packaging Approach for Massive Amounts
                                  of Small Geospatial Files with HDFS  . . 210--215
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7419, 2012

                 Haixu Miao and   
               Tiezheng Nie and   
                  Dejun Yue and   
            Tiancheng Zhang and   
                    Jinshen Liu   Algebra for Parallel XQuery Processing   1--10
                  Cong Wang and   
                   Hongzhi Wang   Graph-Structured Data Compression Based
                                  on Frequent Subgraph Contraction . . . . 11--18
                    Xin Lin and   
              Lingchen Zhou and   
                  Peng Chen and   
                    Junzhong Gu   Privacy Preserving Reverse
                                  Nearest-Neighbor Queries Processing on
                                  Road Network . . . . . . . . . . . . . . 19--28
                 Jianmin Wu and   
                Mizuho Iwaihara   Wikipedia Revision Graph Extraction
                                  Based on $N$-Gram Cover  . . . . . . . . 29--38
                 Meirui Ren and   
              Jinsheng Duan and   
                     Hao Qu and   
               Xinjing Wang and   
                         Lei Du   Wireless Nerve: Invisible Anti-theft
                                  System in Wireless Sensor Network  . . . 39--44
                   Zaobo He and   
                  Xiaoming Wang   A Spatial-temporal Model for the Malware
                                  Propagation in MWSNs Based on the
                                  Reaction-Diffusion Equations . . . . . . 45--56
                   Long Tan and   
                     Liyan Chen   The Application of a Node-Localization
                                  Algorithm of Wireless Sensor Network in
                                  Intelligent Transportation System  . . . 57--68
                   Juan Luo and   
                   Lei Chen and   
                    Shan Fu and   
                       Renfa Li   Parallel Network Virtualization Resource
                                  Management System  . . . . . . . . . . . 69--77
                   Yang Zao and   
                    Liu Yan and   
                       Li Renfa   The Analysis of Priority-Based Slotted
                                  CSMA/CA Algorithm in IEEE 802.15.4
                                  Sensor Network . . . . . . . . . . . . . 78--86
                 Cheng Feng and   
                  Rui Zhang and   
               Shouxu Jiang and   
                      Zhijun Li   QoI-Based Data Gathering and Routing
                                  Guidance in VANETs . . . . . . . . . . . 87--98
             Robin Jun Yang and   
                      Qiong Luo   PTL: Partitioned Logging for Database
                                  Storage on Flash Solid State Drives  . . 99--108
   Shaikh Muhammad Allayear and   
             Sung Soon Park and   
            Shamim H. Ripon and   
                 Gyeong Hun Kim   Adaptation Mechanism of iSCSI Protocol
                                  for NAS Storage Solution in Wireless
                                  Environment  . . . . . . . . . . . . . . 109--118
            Kitti Koonsanit and   
     Chuleerat Jaruskulchai and   
                 Apisit Eiumnoh   Band Selection for Hyperspectral Imagery
                                  with PCA-MIG . . . . . . . . . . . . . . 119--127
                 Jing Zhang and   
             Xiaoguang Hong and   
               Zhaohui Peng and   
                   Qingzhong Li   NestedCube: Towards Online Analytical
                                  Processing on Information-Enhanced
                                  Multidimensional Network . . . . . . . . 128--139
                     Yi Liu and   
                   Luo Chen and   
                  Ning Jing and   
                      Wei Xiong   MRFM: An Efficient Approach to Spatial
                                  Join Aggregate . . . . . . . . . . . . . 140--150
                      Xu Li and   
                   Xin Wang and   
                   Hong Shi and   
              Zhaohua Sheng and   
                   Zhiyong Feng   A Distributed Inverted Indexing Scheme
                                  for Large-Scale RDF Data . . . . . . . . 151--161
                    Wei Pan and   
                Zhanhuai Li and   
                   Qun Chen and   
             Shanglian Peng and   
                     Bo Suo and   
                        Jian Xu   MSMapper: An Adaptive Split Assignment
                                  Scheme for MapReduce . . . . . . . . . . 162--172
               Chunyu Zhang and   
                    Yong Su and   
                Jiyang Chen and   
                       Wen Wang   Driving Environment Reconstruction and
                                  Analysis System on Multi-sensor Network  173--180
                    Zhou Yu and   
                  Jian Shao and   
                         Fei Wu   LuSH: a Generic High-Dimensional Index
                                  Framework  . . . . . . . . . . . . . . . 181--191
                Huaijie Zhu and   
              Xiaochun Yang and   
                   Bin Wang and   
                       Yue Wang   Improving Text Search on Hybrid Data . . 192--203
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7421, 2012

               Anindya Banerjee   Modular Verification of Object-Based
                                  Programs . . . . . . . . . . . . . . . . 1--2
            Thorsten Bormer and   
          Marc Brockschmidt and   
             Dino Distefano and   
                    Gidon Ernst   The COST IC0701 Verification Competition
                                  2011 . . . . . . . . . . . . . . . . . . 3--21
                  James J. Hunt   The Practical Application of Formal
                                  Methods: Where Is the Benefit for
                                  Industry?  . . . . . . . . . . . . . . . 22--32
                   Alan Mycroft   Isolation Types and Multi-core
                                  Architectures  . . . . . . . . . . . . . 33--48
           Peter Y. H. Wong and   
             Nikolay Diakov and   
                   Ina Schaefer   Modelling Adaptable Distributed Object
                                  Oriented Systems Using the HATS
                                  Approach: a Fredhopper Case Study  . . . 49--66
         Gogul Balakrishnan and   
                Naoto Maeda and   
    Sriram Sankaranarayanan and   
         Franjo Ivan\vci\'c and   
                    Aarti Gupta   Modeling and Analyzing the Interaction
                                  of C and C++ Strings . . . . . . . . . . 67--85
           Bernhard Beckert and   
            Thorsten Bormer and   
               Florian Merz and   
                   Carsten Sinz   Integration of Bounded Model Checking
                                  and Deductive Verification . . . . . . . 86--104
              Lucian Bentea and   
                       Olaf Owe   A Probabilistic Framework for
                                  Object-Oriented Modeling and Analysis of
                                  Distributed Systems  . . . . . . . . . . 105--122
          Marc Brockschmidt and   
        Thomas Ströder and   
               Carsten Otto and   
              Jürgen Giesl   Automated Detection of Non-termination
                                  and \tt NullPointerExceptions for Java
                                  Bytecode . . . . . . . . . . . . . . . . 123--141
            Jonathan Heinen and   
            Henrik Barthels and   
               Christina Jansen   Juggrnaut --- An Abstract JVM  . . . . . 142--159
       Ángel Herranz and   
            Julio Mariño   A Verified Implementation of Priority
                                  Monitors in Java . . . . . . . . . . . . 160--177
            Marieke Huisman and   
                   Tri Minh Ngo   Scheduler-Specific Confidentiality for
                                  Multi-threaded Programs and Its
                                  Logic-Based Verification . . . . . . . . 178--195
        Einar Broch Johnsen and   
            Rudolf Schlatte and   
         S. Lizeth Tapia Tarifa   A Formal Model of User-Defined Resources
                                  in Resource-Restricted Deployment
                                  Scenarios  . . . . . . . . . . . . . . . 196--213
                  Vlad Rusu and   
                   Dorel Lucanu   A $\mathbb{K}$-Based Formal Framework
                                  for Domain-Specific Modelling Languages  214--231
          Christoph Scheben and   
               Peter H. Schmitt   Verification of Information Flow
                                  Properties of Java Programs without
                                  Approximations . . . . . . . . . . . . . 232--249
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7422, 2012

           Giorgio Ausiello and   
       Giuseppe F. Italiano and   
                Luigi Laura and   
              Umberto Nanni and   
               Fabiano Sarracco   Structure Theorems for Optimum
                                  Hyperpaths in Directed Hypergraphs . . . 1--14
                Mike Hewitt and   
        George L. Nemhauser and   
             Martin Savelsbergh   Branch-and-Price Guided Search . . . . . 15--18
      Christos H. Papadimitriou   The New Faces of Combinatorial
                                  Optimization . . . . . . . . . . . . . . 19--23
        Valentina Cacchiani and   
            Alberto Caprara and   
                     Paolo Toth   Models and Algorithms for the Train Unit
                                  Assignment Problem . . . . . . . . . . . 24--35
                 Breno Piva and   
                Cid C. de Souza   The Minimum Stabbing Triangulation
                                  Problem: IP Models and Computational
                                  Evaluation . . . . . . . . . . . . . . . 36--47
           Matteo Fischetti and   
                    Leo Liberti   Orbital Shrinking  . . . . . . . . . . . 48--58
                James Ostrowski   Using Symmetry to Optimize Over the
                                  Sherali--Adams Relaxation  . . . . . . . 59--70
            Jianqiang Cheng and   
      Céline Gicquel and   
                   Abdel Lisser   A Second-Order Cone Programming
                                  Approximation to Joint
                                  Chance-Constrained Linear Programs . . . 71--80
              Agn\`es Gorge and   
               Abdel Lisser and   
                  Riadh Zorgati   Semidefinite Relaxations for Mixed
                                  $0$--$1$ Second-Order Cone Program . . . 81--92
           Pierre Fouilhoux and   
        Aurélien Questel   The Non-Disjoint $m$-Ring-Star Problem:
                                  Polyhedral Results and SDH/SONET Network
                                  Design . . . . . . . . . . . . . . . . . 93--104
               Sylvie Borne and   
              Roland Grappe and   
                Mathieu Lacroix   The Uncapacitated Asymmetric Traveling
                                  Salesman Problem with Multiple Stacks    105--116
            Mathieu Lacroix and   
           A. Ridha Mahjoub and   
        Sébastien Martin   Polyhedral Analysis and Branch-and-Cut
                                  for the Structural Analysis Problem  . . 117--128
                Yuri Faenza and   
             Samuel Fiorini and   
              Roland Grappe and   
                Hans Raj Tiwary   Extended Formulations, Nonnegative
                                  Factorizations, and Randomized
                                  Communication Protocols  . . . . . . . . 129--140
         Gábor Braun and   
              Sebastian Pokutta   An Algebraic Approach to Symmetric
                                  Extended Formulations  . . . . . . . . . 141--152
           Satoru Fujishige and   
             Jens Maßberg   Dual Consistent Systems of Linear
                                  Inequalities and Cardinality Constrained
                                  Polytopes  . . . . . . . . . . . . . . . 153--164
               A. S. Freire and   
            V. Acuña and   
               P. Crescenzi and   
             C. E. Ferreira and   
                 V. Lacroix and   
                   P. V. Milreu   Minimum Ratio Cover of Matrix Columns by
                                  Extreme Rays of Its Induced Cone . . . . 165--177
                Laura Galli and   
       Konstantinos Kaparis and   
              Adam N. Letchford   Gap Inequalities for the Max-Cut
                                  Problem: a Cutting-Plane Algorithm . . . 178--188
            Trivikram Dokka and   
            Ioannis Mourtos and   
           Frits C. R. Spieksma   Fast Separation Algorithms for
                                  Three-Index Assignment Problems  . . . . 189--200
               Luis Gouveia and   
             Markus Leitner and   
                 Ivana Ljubi\'c   On the Hop Constrained Steiner Tree
                                  Problem with Multiple Root Nodes . . . . 201--212
          Marie-Emilie Voge and   
      François Clautiaux   Theoretical Investigation of Aggregation
                                  in Pseudo-polynomial Network-Flow Models 213--224
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7424, 2012

              Marijn Koolen and   
            Gabriella Kazai and   
                 Jaap Kamps and   
             Antoine Doucet and   
                 Monica Landoni   Overview of the INEX 2011 Books and
                                  Social Search Track  . . . . . . . . . . 1--29
             Frans Adriaans and   
                 Jaap Kamps and   
                  Marijn Koolen   The Importance of Document Ranking and
                                  User-Generated Content for Faceted
                                  Search and Book Suggestions  . . . . . . 30--44
               Toine Bogers and   
Kirstine Wilfred Christensen and   
                  Birger Larsen   RSLIS at INEX 2011: Social Book Search
                                  Track  . . . . . . . . . . . . . . . . . 45--56
     Hervé Déjean   Using Page Breaks for Book Structuring   57--67
             Romain Deveaud and   
               Eric SanJuan and   
                 Patrice Bellot   Social Recommendation and External
                                  Resources for Book Search  . . . . . . . 68--79
             Henry A. Feild and   
       Marc-Allen Cartright and   
                    James Allan   The University of Massachusetts
                                  Amherst's Participation in the INEX 2011
                                  Prove It Track . . . . . . . . . . . . . 80--85
            Emmanuel Giguet and   
                   Nadine Lucas   The Book Structure Extraction
                                  Competition with the Resurgence Full
                                  Content Software at Caen University  . . 86--97
                 Caihua Liu and   
                Jiajun Chen and   
             Xiaofeng Zhang and   
                    Jie Liu and   
                    Yalou Huang   TOC Structure Extraction from OCR-ed
                                  Books  . . . . . . . . . . . . . . . . . 98--108
          Michael Preminger and   
                 Ragnar Nordlie   OUC's Participation in the 2011 INEX
                                  Book Track . . . . . . . . . . . . . . . 109--117
                Qiuyue Wang and   
    Georgina Ramírez and   
               Maarten Marx and   
            Martin Theobald and   
                     Jaap Kamps   Overview of the INEX 2011 Data-Centric
                                  Track  . . . . . . . . . . . . . . . . . 118--137
              Cyril Laitang and   
      Karen Pinel-Sauvagnat and   
               Mohand Boughanem   Edit Distance for XML Information
                                  Retrieval: Some Experiments on the
                                  Datacentric Track of INEX 2011 . . . . . 138--145
        Georgina Ramírez   UPF at INEX 2011: Books and Social
                                  Search Track and Data-Centric Track  . . 146--154
                Anne Schuth and   
                   Maarten Marx   University of Amsterdam Data Centric Ad
                                  Hoc and Faceted Search Runs  . . . . . . 155--160
Darnes Vilariño Ayala and   
                David Pinto and   
Saúl León Silverio and   
               Esteban Castillo   BUAP: a Recursive Approach to the
                                  Data-Centric Track of INEX 2011  . . . . 161--166
                Qiuyue Wang and   
                 Yantao Gan and   
                         Yu Sun   RUC@INEX 2011 Data-Centric Track . . . . 167--179
        Tanakorn Wichaiwong and   
         Chuleerat Jaruskulchai   MEXIR at INEX-2011 . . . . . . . . . . . 180--187
               Eric SanJuan and   
  Véronique Moriceau and   
             Xavier Tannier and   
             Patrice Bellot and   
                  Josiane Mothe   Overview of the INEX 2011 Question
                                  Answering Track (QA@INEX)  . . . . . . . 188--206
             Pinaki Bhaskar and   
           Somnath Banerjee and   
             Snehasis Neogi and   
           Sivaji Bandyopadhyay   A Hybrid QA System with Focused IR and
                                  Automatic Summarization for INEX 2011    207--218
             Liana Ermakova and   
                  Josiane Mothe   IRIT at INEX: Question Answering Task    219--226
  Ana Lilia Laureano-Cruces and   
Javier Ramírez-Rodríguez   A Graph-Based Summarization System at
                                  QA@INEX Track 2011 . . . . . . . . . . . 227--231
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7425, 2012

                Intaek Leem and   
                    Mary Wu and   
                   Chonggun Kim   An Algorithm for Resource Allocation
                                  without Inter-cluster Collisions in WSN  1--8
                 Joonki Min and   
              Jookyoung Kim and   
                   Youngmi Kwon   Data Compression Technique for Wireless
                                  Sensor Networks  . . . . . . . . . . . . 9--16
             Jeong-hyun Cho and   
               Yong-do Choi and   
                    Sung-ho Kim   A Bandwidth Reservation Method for
                                  Multicast Streaming Service  . . . . . . 17--24
                     Dongho Kim   Hybrid-ARQ with Rate Compatible LDPC
                                  Codes  . . . . . . . . . . . . . . . . . 25--32
                     Shu Li and   
                 Jeong Geun Kim   Inter-session and Intra-session Network
                                  Coding for Wireless Sensor Networks  . . 33--40
            Seong Cheol Kim and   
              Jun Heon Jeon and   
                  Hyun Joo Park   QoS Aware Energy-Efficient (QAEE) MAC
                                  Protocol for Energy Harvesting Wireless
                                  Sensor Networks  . . . . . . . . . . . . 41--48
               Kyungrak Lee and   
               Juhyun Maeng and   
                     Inwhee Joe   A New Channel Access Scheme for
                                  Multi-user Voice Communications in IEEE
                                  802.15.4 Networks  . . . . . . . . . . . 49--56
               Hyun-Ho Shin and   
                  Byung-Seo Kim   Performance Evaluations on Local-Repair
                                  of AODV Protocol over IP-Based Ad-Hoc
                                  Networks . . . . . . . . . . . . . . . . 57--63
           Aries Kusdaryono and   
                  Gan Bayar and   
                  Lee Kyoung Oh   Base Station Assisted Hierarchical
                                  Routing Protocol in Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 64--71
               Hee Jae Shin and   
                Do Hyun Bae and   
                    Jin Suk Kim   Derivation of Coverage in Sensor Network
                                  Using a Quad-Tree Partitioning Scheme    72--78
      A. S. M. Sanwar Hosen and   
                     Gihwan Cho   Applying a Minimum Routing Cost Spanning
                                  Tree to Many-to-Many in Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 79--86
             Ryota Imanishi and   
                 Yuki Kondo and   
             Young-Bok Choi and   
                   Hiromi Okada   An Effective Traffic Control Method for
                                  Real-Time and Reliable Bursts in OBS
                                  Networks . . . . . . . . . . . . . . . . 87--97
                    Ye Hoon Lee   A Transmit Power Control Method for
                                  DS/CDMA Communication Systems Using
                                  Successive Interference Cancelation  . . 98--105
              SeokHoon Kang and   
              Gwanggil Jeon and   
                  Young-Sup Lee   Improved Energy Aware Routing Protocol
                                  in Mobile Ad Hoc Network . . . . . . . . 106--113
               Junyeong Bok and   
                Heung-Gyoon Ryu   Analysis of Receiver Feedback Closed
                                  Loop Pre-distortion to Compensate for
                                  Nonlinear HPA and Foliage Attenuation    114--121
              Le Thanh Tuan and   
               Daeseung Yoo and   
               Hyungjoo Kim and   
                Gwangja Jin and   
              Byungtae Jang and   
                  Soong Hwan Ro   The Modified Proportional Fair Packet
                                  Scheduling Algorithm for Multimedia
                                  Traffic in LTE System  . . . . . . . . . 122--129
             Kwang Kiun Yoo and   
               Ronny Yongho Kim   HiNet: Radio Frequency Communication
                                  Based Train Control (RF-CBTC) System
                                  Jointly Using Hierarchical Modulation
                                  and Network Coding . . . . . . . . . . . 130--137
                Wonsun Bong and   
                 Yong Cheol Kim   Fingerprint Wi--Fi Radio Map
                                  Interpolated by Discontinuity Preserving
                                  Smoothing  . . . . . . . . . . . . . . . 138--145
                   Ingi Lee and   
                Hwan-Seung Yong   Common Sense Knowledge Based Hybrid
                                  Interestingness Measures for Data Mining 146--154
              Nasimul Noman and   
               Leon Palafox and   
                    Hitoshi Iba   On Model Selection Criteria in Reverse
                                  Engineering Gene Networks Using RNN
                                  Model  . . . . . . . . . . . . . . . . . 155--164
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7426, 2012

               Kelly Vassie and   
               Giuseppe Morlino   Natural and Artificial Systems: Compare,
                                  Model or Engineer? . . . . . . . . . . . 1--11
Jòrgen Christian Larsen and   
               David Brandt and   
                    Kasper Stoy   LocoKit: a Robot Construction Kit for
                                  Studying and Developing Functional
                                  Morphologies . . . . . . . . . . . . . . 12--22
Iñaki Rañó   An Introduction to the Analysis of
                                  Braitenberg Vehicles $2$ and $3$ Using
                                  Phase Plane Portrait . . . . . . . . . . 23--32
       Cristiano Alessandro and   
        Juan Pablo Carbajal and   
                Andrea d'Avella   Synthesis and Adaptation of Effective
                                  Motor Synergies for the Solution of
                                  Reaching Tasks . . . . . . . . . . . . . 33--43
          Jose Nunez-Varela and   
        Balaraman Ravindran and   
                Jeremy L. Wyatt   Gaze Allocation Analysis for a Visually
                                  Guided Manipulation Task . . . . . . . . 44--53
             Matej Hoffmann and   
            Nico M. Schmidt and   
               Rolf Pfeifer and   
           Andreas K. Engel and   
                 Alexander Maye   Using Sensorimotor Contingencies for
                                  Terrain Discrimination and Adaptive
                                  Walking Behavior in the Quadruped Robot
                                  Puppy  . . . . . . . . . . . . . . . . . 54--64
             Beata J. Grzyb and   
         Angel P. del Pobil and   
                 Linda B. Smith   How Walking Influences the Development
                                  of Absolute Distance Perception  . . . . 65--74
         Boris Durán and   
                    Serge Thill   Modelling Interaction in Multi-modal
                                  Affordance Processing with Neural
                                  Dynamics . . . . . . . . . . . . . . . . 75--84
         Ana Carolina Silva and   
    Cristina Peixoto dos Santos   A Bio-inspired Model Reliably Predicts
                                  the Collision of Approaching Objects
                                  under Different Light Conditions . . . . 85--95
          Naveen Kuppuswamy and   
       Hugo Gravato Marques and   
                  Helmut Hauser   Synthesising a Motor-Primitive Inspired
                                  Control Architecture for Redundant
                                  Compliant Robots . . . . . . . . . . . . 96--105
             Alexander Maye and   
               Andreas K. Engel   Using Sensorimotor Contingencies for
                                  Prediction and Action Planning . . . . . 106--116
       Michele Folgheraiter and   
             Mathias Jordan and   
                 Jan Albiez and   
                 Frank Kirchner   A Bio-inspired Control System for a
                                  Wearable Human-Machine Interface . . . . 117--126
                 Sejoon Ahn and   
                     DaeEun Kim   A Finite Element Method of Electric
                                  Image in Weakly Electric Fish  . . . . . 127--135
            Adrien Jauffret and   
          Nicolas Cuperlier and   
          Philippe Gaussier and   
               Philippe Tarroux   Multimodal Integration of Visual Place
                                  Cells and Grid Cells for Navigation
                                  Tasks of a Real Robot  . . . . . . . . . 136--145
               Tim Waegeman and   
            Francis Wyffels and   
             Benjamin Schrauwen   Towards a Neural Hierarchy of Time
                                  Scales for Motor Control . . . . . . . . 146--155
                     Cai Li and   
                Robert Lowe and   
                     Tom Ziemke   Modelling Walking Behaviors Based on
                                  CPGs: a Simplified Bio-inspired
                                  Architecture . . . . . . . . . . . . . . 156--166
            Marco Antonelli and   
             Beata J. Grzyb and   
    Vicente Castelló and   
             Angel P. del Pobil   Plastic Representation of the Reachable
                                  Space for a Humanoid Robot . . . . . . . 167--176
             Charles Ollion and   
       Stéphane Doncieux   Towards Behavioral Consistency in
                                  Neuroevolution . . . . . . . . . . . . . 177--186
           Christian Rempis and   
                 Frank Pasemann   Evolving Variants of Neuro-Control Using
                                  Constraint Masks . . . . . . . . . . . . 187--197
        Borys Wróbel and   
        Micha\l Joachimczak and   
         Alberto Montebelli and   
                    Robert Lowe   The Search for Beauty: Evolution of
                                  Minimal Cognition in an Animat
                                  Controlled by a Gene Regulatory Network
                                  and Powered by a Metabolic System  . . . 198--208
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7427, 2012

             Sabine Lehmann and   
              Ben Gottesman and   
           Robert Grabowski and   
                      Mayo Kudo   Applying CNL Authoring Support to
                                  Improve Machine Translation of Forum
                                  Data . . . . . . . . . . . . . . . . . . 1--10
  Sébastien Ferré   SQUALL: a Controlled Natural Language
                                  for Querying and Updating RDF Graphs . . 11--25
                 Rolf Schwitter   Answer Set Programming via Controlled
                                  Natural Language Processing  . . . . . . 26--43
                  Richard Power   OWL Simplified English: a Finite-State
                                  Language for Ontology Editing  . . . . . 44--60
          William R. Murray and   
                 Tomas Singliar   Spatiotemporal Extensions to a
                                  Controlled Natural Language  . . . . . . 61--78
           Kaarel Kaljurand and   
              Tanel Alumäe   Controlled Natural Language in Speech
                                  Recognition Based User Interfaces  . . . 79--94
                 Faegheh Hasibi   An Adaptation Technique for GF-Based
                                  Dialogue Systems . . . . . . . . . . . . 95--109
               Kaarel Kaljurand   General Architecture of a Controlled
                                  Natural Language Based Multilingual
                                  Semantic Wiki  . . . . . . . . . . . . . 110--120
          Normunds Gruzitis and   
            Peteris Paikens and   
                Guntis Barzdins   FrameNet Resource Grammar Library for GF 121--137
             Stefan Höfler   Legislative Drafting Guidelines: How
                                  Different Are They from Controlled
                                  Language Rules for Technical Writing?    138--151
            Palmira Marrafa and   
               Raquel Amaro and   
                Nuno Freire and   
                    Sara Mendes   Portuguese Controlled Language: Coping
                                  with Ambiguity . . . . . . . . . . . . . 152--166
                Brian Davis and   
              Ramona Enache and   
           Jeroen van Grondelle   Multilingual Verbalisation of Modular
                                  Ontologies Using GF and lemon  . . . . . 167--184
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7428, 2012

    Sébastien Briais and   
      Stéphane Caron and   
     Jean-Michel Cioranesco and   
                Jean-Luc Danger   $3$D Hardware Canaries . . . . . . . . . 1--22
        Sergei Skorobogatov and   
              Christopher Woods   Breakthrough Silicon Scanning Discovers
                                  Backdoor in Military Chip  . . . . . . . 23--40
   Alexander Schlösser and   
          Dmitry Nedospasov and   
        Juliane Krämer and   
                  Susanna Orlic   Simple Photonic Emission Analysis of AES 41--57
                Andrew Moss and   
           Elisabeth Oswald and   
                   Dan Page and   
               Michael Tunstall   Compiler Assisted Masking  . . . . . . . 58--75
          Begül Bilgin and   
              Svetla Nikova and   
           Ventzislav Nikov and   
             Vincent Rijmen and   
               Georg Stütz   Threshold Implementations of All $3
                                  \times 3$ and $4 \times 4$ S-Boxes . . . 76--91
                Amir Moradi and   
                 Oliver Mischke   How Far Should Theory Be from Practice?  92--106
              Blandine Debraize   Efficient and Provably Secure Methods
                                  for Switching from Arithmetic to Boolean
                                  Masking  . . . . . . . . . . . . . . . . 107--121
            Subhadeep Banik and   
            Subhamoy Maitra and   
                 Santanu Sarkar   A Differential Fault Attack on the Grain
                                  Family of Stream Ciphers . . . . . . . . 122--139
                Yossef Oren and   
            Mathieu Renauld and   
François-Xavier Standaert and   
                   Avishai Wool   Algebraic Side-Channel Attacks Beyond
                                  the Hamming Weight Leakage Model . . . . 140--154
              Oscar Reparaz and   
         Benedikt Gierlichs and   
             Ingrid Verbauwhede   Selecting Time Samples for Multivariate
                                  DPA Attacks  . . . . . . . . . . . . . . 155--174
    Beno\^\it Gérard and   
François-Xavier Standaert   Unified and Optimized Linear Collision
                                  Attacks and Their Application in a
                                  Non-profiled Setting . . . . . . . . . . 175--192
              Marcel Medwed and   
François-Xavier Standaert and   
                   Antoine Joux   Towards Super-Exponential Side-Channel
                                  Security with Efficient
                                  Leakage-Resilient PRFs . . . . . . . . . 193--212
            Sebastian Faust and   
         Krzysztof Pietrzak and   
               Joachim Schipper   Practical Leakage-Resilient Symmetric
                                  Cryptography . . . . . . . . . . . . . . 213--232
                  Yunsi Fei and   
                  Qiasi Luo and   
                   A. Adam Ding   A Statistical Model for DPA with Novel
                                  Algorithmic Confusion Analysis . . . . . 233--250
       Ulrich Rührmair and   
                Marten van Dijk   Practical Security Analysis of PUF-Based
                                  Two-Player Protocols . . . . . . . . . . 251--267
      Vincent van der Leest and   
               Bart Preneel and   
             Erik van der Sluis   Soft Decision Error Correction for
                                  Compact Memory-Based PUFs Using a Single
                                  Enrollment . . . . . . . . . . . . . . . 268--282
       Stefan Katzenbeisser and   
        Ünal Kocaba\cs and   
         Vladimir Ro\vzi\'c and   
             Ahmad-Reza Sadeghi   PUFs: Myth, Fact or Busted? A Security
                                  Evaluation of Physically Unclonable
                                  Functions (PUFs) Cast in Silicon . . . . 283--301
                  Roel Maes and   
      Anthony Van Herrewege and   
             Ingrid Verbauwhede   PUFKY: a Fully Functional PUF-Based
                                  Cryptographic Key Generator  . . . . . . 302--319
        Daniel J. Bernstein and   
                  Peter Schwabe   NEON Crypto  . . . . . . . . . . . . . . 320--339
               Stefan Heyse and   
               Tim Güneysu   Towards One Cycle per Bit Asymmetric
                                  Encryption: Code-Based Cryptography on
                                  Reconfigurable Hardware  . . . . . . . . 340--355
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7429, 2012

               Goren Gordon and   
                   Ehud Ahissar   A Curious Emergence of Reaching  . . . . 1--12
    Torbjòrn S. Dahl and   
           Alexandros Paraschos   A Force-Distance Model of Humanoid Arm
                                  Withdrawal Reflexes  . . . . . . . . . . 13--24
Muhammad Nasiruddin Mahyuddin and   
             Guido Herrmann and   
                Said Ghani Khan   A Novel Adaptive Control Algorithm in
                                  Application to a Humanoid Robot Arm  . . 25--36
Iñaki Rañó and   
           Jean-Stephane Jokeit   A Wandering Braitenberg Vehicle $2 b$
                                  That Densely Covers a Bounded Workspace  37--48
     Jartuwat Rajruangrabin and   
            Isura Ranatunga and   
                    Dan O. Popa   Adaptive Interface Mapping for Intuitive
                                  Teleoperation of Multi-DOF Robots  . . . 49--60
              Carlos Santos and   
            Manuel Mazo Jr. and   
                Felipe Espinosa   Adaptive Self-triggered Control of a
                                  Remotely Operated Robot  . . . . . . . . 61--72
 Nadeesha Oliver Ranasinghe and   
                   Wei-Min Shen   Autonomous Surveillance Tolerant to
                                  Interference . . . . . . . . . . . . . . 73--83
      Dejanira Araiza-Illan and   
                   Tony J. Dodd   Bio-inspired Autonomous Navigation and
                                  Escape from Pursuers with Potential
                                  Functions  . . . . . . . . . . . . . . . 84--95
      Christopher M. Harris and   
            Jonathan Waddington   Biomimetics of Choice Behaviour for
                                  Autonomous Agents  . . . . . . . . . . . 96--104
                 Alan Broun and   
                 Chris Beck and   
                  Tony Pipe and   
             Majid Mirmehdi and   
                 Chris Melhuish   Building a Kinematic Model of a Robot's
                                  Arm with a Depth Camera  . . . . . . . . 105--116
           Sreeja Kochuvila and   
            Shikha Tripathi and   
             Sudarshan T. S. B.   Control of a Compass Gait Biped Robot
                                  Based on Partial Feedback Linearization  117--127
           Florian Vaussard and   
   Philippe Rétornaz and   
                David Hamel and   
              Francesco Mondada   Cutting Down the Energy Consumed by
                                  Domestic Robots: Insights from Robotic
                                  Vacuum Cleaners  . . . . . . . . . . . . 128--139
         Nils Axel Andersen and   
                       Ole Ravn   Designing Competitions for Education in
                                  Robotics . . . . . . . . . . . . . . . . 140--151
         J. Ernesto Solanes and   
           Leopoldo Armesto and   
              Josep Tornero and   
  Pau Muñoz-Benavent and   
           Vicent Girbés   Dual-Rate Non-Linear High Order Holds
                                  for Visual Servoing Applications . . . . 152--163
                   S. Byrne and   
                   W. Naeem and   
                 R. S. Ferguson   Efficient Local Sampling for Motion
                                  Planning of a Robotic Manipulator  . . . 164--175
              Terry Tritton and   
                Joanna Hall and   
                Angela Rowe and   
           Sophie Valentine and   
            Alicja Jedrzejewska   Engaging with Robots While Giving Simple
                                  Instructions . . . . . . . . . . . . . . 176--184
        Dominik Aufderheide and   
              Werner Krybus and   
                  Ulf Witkowski   Experiences with LEGO MINDSTORMS as an
                                  Embedded and Robotics Plattform within
                                  the Undergraduate Curriculum . . . . . . 185--196
       Ekaterina Nikandrova and   
            Janne Laaksonen and   
                    Ville Kyrki   Explorative Sensor-Based Grasp Planning  197--208
     Chris Iverach-Brereton and   
              Andrew Winton and   
                   Jacky Baltes   Ice Skating Humanoid Robot . . . . . . . 209--219
            Chris Burbridge and   
                Richard Dearden   Learning the Geometric Meaning of
                                  Symbolic Abstractions for Manipulation
                                  Planning . . . . . . . . . . . . . . . . 220--231
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7430, 2012

            Germano Resconi and   
                    Chris Hinde   Introduction to Active Sets and
                                  Unification  . . . . . . . . . . . . . . 1--36
             B. John Oommen and   
               M. Khaled Hashem   Modeling a Teacher in a Tutorial- like
                                  System Using Learning Automata . . . . . 37--62
        Ale\vs Horák and   
     Miroslav Prýmek and   
                 Tadeusz Sikora   Power Network Reliability Computations
                                  Using Multi-agent Simulation . . . . . . 63--81
                   Henryk Piech   Sequence Automata for Researching
                                  Consensus Levels . . . . . . . . . . . . 82--101
              Hiroshi Takahashi   An Analysis of the Influence of
                                  Fundamental Indexing on Financial
                                  Markets through Agent-Based Modeling:
                                  The Fundamentalist and Fundamental
                                  Indexing . . . . . . . . . . . . . . . . 102--120
                 Sodany Kiv and   
              Yves Wautelet and   
                    Manuel Kolp   Agent-Driven Integration Architecture
                                  for Component-Based Software Development 121--147
             Annabel Latham and   
                Keeley Crockett   Adaptive Tutoring in an Intelligent
                                  Conversational Agent System  . . . . . . 148--167
                      Jan Treur   Biological and Computational
                                  Perspectives on the Emergence of Social
                                  Phenomena: Shared Understanding and
                                  Collective Power . . . . . . . . . . . . 168--191
         Olivier Szymanezyk and   
                    Tom Duckett   Agent-Based Crowd Simulation in Airports
                                  Using Games Technology . . . . . . . . . 192--213
            Marcin Maleszka and   
              Ngoc Thanh Nguyen   Approximate Algorithms for Solving $O_1$
                                  Consensus Problems Using Complex Tree
                                  Structure  . . . . . . . . . . . . . . . 214--227
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7431, 2012

                    J. Bano and   
              A. Hostettler and   
              S. A. Nicolau and   
                 C. Doignon and   
                   H. S. Wu and   
                M. H. Huang and   
                       L. Soler   Simulation of the Abdominal Wall and Its
                                  Arteries after Pneumoperitoneum for
                                  Guidance of Port Positioning in
                                  Laparoscopic Surgery . . . . . . . . . . 1--11
         Yoshitaka Masutani and   
           Mitsutaka Nemoto and   
             Shohei Hanaoka and   
              Naoto Hayashi and   
                    Kuni Ohtomo   Appearance Similarity Flow for
                                  Quantification of Anatomical Landmark
                                  Uncertainty in Medical Images  . . . . . 12--21
                Zhenwen Wei and   
              Caiming Zhang and   
             Xingqiang Yang and   
                 Xiaofeng Zhang   Segmentation of Brain Tumors in CT
                                  Images Using Level Sets  . . . . . . . . 22--31
             Spyridon Bakas and   
              Andreas Hoppe and   
     Katerina Chatzimichail and   
           Vasileios Galariotis   Focal Liver Lesion Tracking in CEUS for
                                  Characterisation Based on Dynamic
                                  Behaviour  . . . . . . . . . . . . . . . 32--41
        Maryam Hajiesmaeili and   
  Bashir Bagherinakhjavanlo and   
          Jamshid Dehmeshki and   
                      Tim Ellis   Segmentation of the Hippocampus for
                                  Detection of Alzheimer's Disease . . . . 42--50
             Daniel Asarnow and   
                    Rahul Singh   Segmentation of Parasites for
                                  High-Content Screening Using Phase
                                  Congruency and Grayscale Morphology  . . 51--60
                    Jian Ye and   
              Igor Yanovsky and   
                   Bin Dong and   
               Rima Gandlin and   
                Achi Brandt and   
                  Stanley Osher   Multigrid Narrow Band Surface
                                  Reconstruction via Level Set Functions   61--70
                  Xiao Chen and   
             Guangming Wang and   
                   Ying Zhu and   
                  G. Scott Owen   Real-Time Simulation of Ship Motions in
                                  Waves  . . . . . . . . . . . . . . . . . 71--80
           Damon Blanchette and   
                   Emmanuel Agu   Adaptive Spectral Mapping for Real-Time
                                  Dispersive Refraction  . . . . . . . . . 81--91
                 Powei Feng and   
                     Joe Warren   A Dual Method for Constructing
                                  Multi-material Solids from Ray-Reps  . . 92--103
             David Sedlacek and   
                      Jiri Zara   User Driven $3$D Reconstruction
                                  Environment  . . . . . . . . . . . . . . 104--114
              Ashish Amresh and   
               John Femiani and   
         Christoph Fünfzig   Methods for Approximating Loop
                                  Subdivision Using Tessellation Enabled
                                  GPUs . . . . . . . . . . . . . . . . . . 115--125
                    Kun Liu and   
                   Rhaleb Zayer   Bundle Adjustment Constrained Smoothing
                                  for Multi-view Point Cloud Data  . . . . 126--137
             Houman Rastgar and   
                Eric Dubois and   
                    Liang Zhang   Guided Sampling in Multiple View Robust
                                  Motion Estimation Using Regression
                                  Diagnostics  . . . . . . . . . . . . . . 138--147
              Paul Doliotis and   
          Vassilis Athitsos and   
      Dimitrios Kosmopoulos and   
             Stavros Perantonis   Hand Shape and $3$D Pose Estimation
                                  Using Depth Data from a Single Cluttered
                                  Frame  . . . . . . . . . . . . . . . . . 148--158
       Billy Ray Fortenbury and   
         Gutemberg Guerra-Filho   Fusing Low-Resolution Depth Maps into
                                  High-Resolution Stereo Matching  . . . . 159--168
             Ricardo Galego and   
       Alexandre Bernardino and   
             José Gaspar   Auto-Calibration of Pan-Tilt Cameras
                                  Including Radial Distortion and Zoom . . 169--178
       Billy Ray Fortenbury and   
         Gutemberg Guerra-Filho   Robust $2$D/$3$D Calibration Using
                                  RANSAC Registration  . . . . . . . . . . 179--188
        M. A. Cataño and   
                     J. Climent   Keypoint Detection Based on the
                                  Unimodality Test of HOGs . . . . . . . . 189--198
                      Bo Li and   
                Afzal Godil and   
                    Henry Johan   Non-rigid and Partial $3$D Model
                                  Retrieval Using Hybrid Shape Descriptor
                                  and Meta Similarity  . . . . . . . . . . 199--209
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7432, 2012

             Heinz Hofbauer and   
          Christian Rathgeb and   
                Andreas Uhl and   
                     Peter Wild   Iris Recognition in Image Domain:
                                  Quality-Metric Based Comparators . . . . 1--10
            Jan Sedmidubsky and   
               Jakub Valcik and   
             Michal Balazia and   
                   Pavel Zezula   Gait Recognition Based on Normalized
                                  Walk Cycles  . . . . . . . . . . . . . . 11--20
               Hwi-Gang Kim and   
               Eun Jung Lee and   
             Gang-Joon Yoon and   
              Sung-Dae Yang and   
               Eui Chul Lee and   
                  Sang Min Yoon   Illumination Normalization for SIFT
                                  Based Finger Vein Authentication . . . . 21--30
               Irene Kotsia and   
                 Weiwei Guo and   
                 Ioannis Patras   Higher Rank Support Tensor Machines  . . 31--40
                  Inho Choi and   
                     Daijin Kim   Multi-scale Integral Modified Census
                                  Transform for Eye Detection  . . . . . . 41--50
             Avinash Wesley and   
         Pradeep Buddharaju and   
              Robert Pienta and   
               Ioannis Pavlidis   A Comparative Analysis of Thermal and
                                  Visual Modalities for Automated Facial
                                  Expression Recognition . . . . . . . . . 51--60
        Hammadi Nait-Charif and   
                Allen Breen and   
                  Paul Thompson   Vertebrae Tracking in Lumbar Spinal
                                  Video-Fluoroscopy Using Particle Filters
                                  with Semi-automatic Initialisation . . . 61--69
                  Giorgio Panin   Mutual Information for Multi-modal,
                                  Discontinuity-Preserving Image
                                  Registration . . . . . . . . . . . . . . 70--81
           Muhammad Hussain and   
               Salabat Khan and   
            Ghulam Muhammad and   
                   George Bebis   Mass Detection in Digital Mammograms
                                  Using Optimized Gabor Filter Bank  . . . 82--91
          Federico M. Sukno and   
         John L. Waddington and   
                 Paul F. Whelan   Comparing $3$D Descriptors for Local
                                  Search of Craniofacial Landmarks . . . . 92--103
                 Utsab Saha and   
                    Rahul Singh   Vision-Based Tracking of Complex
                                  Macroparasites for High-Content
                                  Phenotypic Drug Screening  . . . . . . . 104--114
            Jonas De Vylder and   
              Jan Aelterman and   
         Mado Vandewoestyne and   
                Trees Lepez and   
                 Dieter Deforce   Cell Nuclei Detection Using Globally
                                  Optimal Active Contours with Shape Prior 115--124
          Akintola Kolawole and   
              Alireza Tavakkoli   A Novel Gait Recognition System Based on
                                  Hidden Markov Models . . . . . . . . . . 125--134
      Abubakrelsedik Karali and   
                 Mohamed ElHelw   Motion History of Skeletal Volumes for
                                  Human Action Recognition . . . . . . . . 135--144
              Sang Min Yoon and   
                 Gang-Joon Yoon   Compressive Matting  . . . . . . . . . . 145--154
           Tatsuya Yatagawa and   
              Yasushi Yamaguchi   A Template-Based Completion Framework
                                  for Videos with Dynamic Backgrounds  . . 155--165
               Sherif Azary and   
                Andreas Savakis   $3$D Action Classification Using Sparse
                                  Spatio-temporal Feature Representations  166--175
            George Kamberov and   
               Matt Burlick and   
            Lazaros Karydas and   
                 Olga Koteoglou   SCAR: Dynamic Adaptation for Person
                                  Detection and Persistence Analysis in
                                  Unconstrained Videos . . . . . . . . . . 176--187
      Georgios Galanopoulos and   
    Constantin Papaodysseus and   
        Dimitiris Arabadjis and   
                Michael Exarhos   Exploiting $3$D Digital Representations
                                  of Ancient Inscriptions to Identify
                                  Their Writer . . . . . . . . . . . . . . 188--198
                  Ali Alsam and   
         Hans Jakob Rivertz and   
                  Puneet Sharma   What the Eye Did Not See --- a Fusion
                                  Approach to Image Coding . . . . . . . . 199--208
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7433, 2012

               Bahar Behsaz and   
        Ján Ma\vnuch and   
                Ladislav Stacho   Turing Universality of Step-Wise and
                                  Stage Assembly at Temperature 1  . . . . 1--11
             Robert Brijder and   
             Joris J. M. Gillis   A Type System for DNAQL  . . . . . . . . 12--24
                Ho-Lin Chen and   
                 David Doty and   
              David Soloveichik   Deterministic Function Computation with
                                  Chemical Reaction Networks . . . . . . . 25--42
                Anne Condon and   
         Bonnie Kirkpatrick and   
            Ján Ma\vnuch   Reachability Bounds for Chemical
                                  Reaction Networks and Strand
                                  Displacement Systems . . . . . . . . . . 43--57
             Eugen Czeizler and   
                 Alexandru Popa   Synthesizing Minimal Tile Sets for
                                  Complex Patterns in the Framework of
                                  Patterned DNA Self-Assembly  . . . . . . 58--72
              Max H. Garzon and   
                 Kiran C. Bobba   A Geometric Approach to Gibbs Energy
                                  Landscapes and Optimal DNA Codeword
                                  Design . . . . . . . . . . . . . . . . . 73--85
                  Anton Kan and   
         Koh-ichiroh Shohda and   
                   Akira Suyama   A DNA Based Molecular Logic Gate Capable
                                  of a Variety of Logical Operations . . . 86--97
                  Lila Kari and   
                Steffen Kopecki   Deciding Whether a Regular Language Is
                                  Generated by a Splicing System . . . . . 98--109
Iñaki Sainz de Murieta and   
Alfonso Rodríguez-Patón   Probabilistic Reasoning with a Bayesian
                                  DNA Device Based on Strand Displacement  110--122
          Carsten Svaneborg and   
              Harold Fellermann   DNA Self-Assembly and Computation
                                  Studied with a Coarse-Grained Dynamic
                                  Bonded Model . . . . . . . . . . . . . . 123--134
              Chris Thachuk and   
                    Anne Condon   Space and Energy Efficient Computation
                                  with DNA Strand Displacement Systems . . 135--149
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7434, 2012

         Binay Bhattacharya and   
               Tsunehiko Kameda   A Linear Time Algorithm for Computing
                                  Minmax Regret 1-Median on a Tree . . . . 1--12
             Ragesh Jaiswal and   
                 Amit Kumar and   
                    Sandeep Sen   A Simple $D^2$-Sampling Based PTAS for
                                  $k$-Means and other Clustering Problems  13--24
           Evripidis Bampis and   
          Dimitrios Letsios and   
                  Ioannis Milis   Speed Scaling for Maximum Lateness . . . 25--36
             Peter Floderus and   
          Miros\law Kowaluk and   
                 Andrzej Lingas   Induced Subgraph Isomorphism: Are Some
                                  Patterns Substantially Easier Than
                                  Others?  . . . . . . . . . . . . . . . . 37--48
Ivona Bezáková and   
                Zachary Langley   Contiguous Minimum
                                  Single-Source-Multi-Sink Cuts in
                                  Weighted Planar Graphs . . . . . . . . . 49--60
                    Xin Han and   
             Yasushi Kawase and   
                Kazuhisa Makino   Online Knapsack Problem with Removal
                                  Cost . . . . . . . . . . . . . . . . . . 61--73
                Mingyu Xiao and   
              Hiroshi Nagamochi   An Improved Exact Algorithm for TSP in
                                  Degree-4 Graphs  . . . . . . . . . . . . 74--85
          Juanjo Rué and   
                 Ignasi Sau and   
          Dimitrios M. Thilikos   Dynamic Programming for $H$-minor-free
                                  Graphs . . . . . . . . . . . . . . . . . 86--97
        Monaldo Mastrolilli and   
             Georgios Stamoulis   Restricted Max-Min Fair Allocations with
                                  Inclusion-Free Intervals . . . . . . . . 98--108
           Maxim A. Babenko and   
             Kamil Salikhov and   
               Stepan Artamonov   An Improved Algorithm for Packing
                                  T-Paths in Inner Eulerian Networks . . . 109--120
         René van Bevern   Towards Optimal and Expressive
                                  Kernelization for $d$-Hitting Set  . . . 121--132
Jean-François Couturier and   
            Pinar Heggernes and   
                 Pim van 't Hof   Maximum Number of Minimal Feedback
                                  Vertex Sets in Chordal Graphs and
                                  Cographs . . . . . . . . . . . . . . . . 133--144
                       Pan Peng   A Local Algorithm for Finding Dense
                                  Bipartite-Like Subgraphs . . . . . . . . 145--156
                  Ton Kloks and   
           Sheung-Hung Poon and   
              Chin-Ting Ung and   
                    Yue-Li Wang   Algorithms for the Strong Chromatic
                                  Index of Halin Graphs,
                                  Distance-Hereditary Graphs and Maximal
                                  Outerplanar Graphs . . . . . . . . . . . 157--168
            Biing-Feng Wang and   
                  Chih-Hsuan Li   On the Minimum Degree Hypergraph Problem
                                  with Subset Size Two and the Red-Blue
                                  Set Cover Problem with the Consecutive
                                  Ones Property  . . . . . . . . . . . . . 169--180
          L. Sunil Chandran and   
          Deepak Rajendraprasad   Rainbow Colouring of Split and Threshold
                                  Graphs . . . . . . . . . . . . . . . . . 181--192
                 Alexandru Popa   Approximating the Rainbow --- Better
                                  Lower and Upper Bounds . . . . . . . . . 193--203
       Rémy Belmonte and   
            Pinar Heggernes and   
             Pim van 't Hof and   
                      Reza Saei   Ramsey Numbers for Line Graphs and
                                  Perfect Graphs . . . . . . . . . . . . . 204--215
           Oswin Aichholzer and   
              Matias Korman and   
                 Alexander Pilz   Geodesic Order Types . . . . . . . . . . 216--227
          Stephane Durocher and   
                  Saeed Mehrabi   Computing Partitions of Rectilinear
                                  Polygons with Minimum Stabbing Number    228--239
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7435, 2012

      Mohammad Shafiul Alam and   
          Md. Monirul Islam and   
                Kazuyuki Murase   Artificial Bee Colony Algorithm with
                                  Improved Explorations for Numerical
                                  Function Optimization  . . . . . . . . . 1--8
             Murilo Zangari and   
        Wesley Romão and   
   Ademir Aparecido Constantino   Extensions of Ant-Miner Algorithm to
                                  Deal with Class Imbalance Problem  . . . 9--18
             Zareen Mehboob and   
                  Hujun Yin and   
          Sophie M. Wuerger and   
                Laura M. Parkes   Multivoxel Pattern Analysis Using
                                  Information-Preserving EMD . . . . . . . 19--26
    Rafael Stubs Parpinelli and   
   Heitor Silvério Lopes   Population Resizing Using Nonlinear
                                  Dynamics in an Ecology-Based Approach    27--34
         Piyabute Fuangkhon and   
           Thitipong Tanprasert   Multi-class Contour Preserving
                                  Classification . . . . . . . . . . . . . 35--42
              Luke M. Davis and   
        Barry-John Theobald and   
                Anthony Bagnall   Automated Bone Age Assessment Using
                                  Feature Extraction . . . . . . . . . . . 43--51
           Washington Silva and   
                 Ginalber Serra   A Hybrid Approach Based on
                                  DCT-Genetic-Fuzzy Inference System for
                                  Speech Recognition . . . . . . . . . . . 52--59
                   Yong Shi and   
                   Brian Graham   An Approach to Reshaping Clusters for
                                  Nearest Neighbor Search  . . . . . . . . 60--67
                  Jon Hills and   
              Luke M. Davis and   
                Anthony Bagnall   Interestingness Measures for Fixed
                                  Consequent Rules . . . . . . . . . . . . 68--75
                   Jing Huo and   
                   Yang Gao and   
                 Wanqi Yang and   
                      Hujun Yin   Abnormal Event Detection via
                                  Multi-Instance Dictionary Learning . . . 76--83
       Luneque Silva Junior and   
               Nadia Nedjah and   
       Luiza de Macedo Mourelle   Static Packet Routing in NoC Platform
                                  Using ACO-Based Algorithms . . . . . . . 84--91
             Cordeiro F. R. and   
              Lima S. M. L. and   
          Silva-Filho A. G. and   
                   Santos W. P.   Segmentation of Mammography by Applying
                                  Extreme Learning Machine in Tumor
                                  Detection  . . . . . . . . . . . . . . . 92--100
  Tiago Henrique dos Santos and   
         Alessandro Goedtel and   
Sérgio Augusto Oliveira da Silva   An ANN Speed Observer Applied to
                                  Three-Phase Induction Motor  . . . . . . 101--108
José M. Fernández-de-Alba and   
             Pablo Campillo and   
Rubén Fuentes-Fernández and   
              Juan Pavón   Opportunistic Sensor Interpretation in a
                                  Virtual Smart Environment  . . . . . . . 109--116
  Ricardo de Souza Jacomini and   
Marcelo Zanchetta do Nascimento and   
   Rogério Daniel Dantas   Comparison of PCA and ANOVA for
                                  Information Selection of CC and MLO
                                  Views in Classification of Mammograms    117--126
            Rosana Veroneze and   
André R. Gonçalves and   
          Fernando J. Von Zuben   A Multiobjective Analysis of Adaptive
                                  Clustering Algorithms for the Definition
                                  of RBF Neural Network Centers in
                                  Regression Problems  . . . . . . . . . . 127--134
       Michel M. dos Santos and   
Mêuser J. S. Valença and   
       Wellington P. dos Santos   Mean Multiclass Type I and II Errors for
                                  Training Multilayer Perceptron with
                                  Particle Swarm in Image Segmentation . . 135--142
    Chidambaram Chidambaram and   
Marlon Subtil Marçal and   
         Leyza Baldo Dorini and   
               Hugo Vieira Neto   An Improved ABC Algorithm Approach Using
                                  SURF for Face Identification . . . . . . 143--150
           Ariadne A. Costa and   
           Antonio C. Roque and   
              Silvio Morato and   
            Renato Tinós   A Model Based on Genetic Algorithm for
                                  Investigation of the Behavior of Rats in
                                  the Elevated Plus-Maze . . . . . . . . . 151--158
          Ahmed A. A. Esmin and   
                    Stan Matwin   Data Clustering Using Hybrid Particle
                                  Swarm Optimization . . . . . . . . . . . 159--166
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7436, 2012

            Martín Abadi   Software Security: a Formal Perspective  1--5
                    Asaf Degani   Formal Methods in the Wild: Trains,
                                  Planes, & Automobile  . . . . . . . . . . 6--6
                   Alan Wassyng   Who Are We, and What Are We Doing Here?  7--9
                Fides Aarts and   
          Faranak Heidarian and   
              Harco Kuppens and   
                    Petur Olsen   Automata Learning through Counterexample
                                  Guided Abstraction Refinement  . . . . . 10--27
      María Alpuente and   
               Demis Ballis and   
         Francisco Frechina and   
                  Daniel Romero   Julienne: a Trace Slicer for Conditional
                                  Rewrite Theories . . . . . . . . . . . . 28--32
Étienne André and   
           Laurent Fribourg and   
          Ulrich Kühne and   
                  Romain Soulat   IMITATOR 2.5: a Tool for Analyzing
                                  Robustness in Scheduling Problems  . . . 33--36
            Virginia Aponte and   
            Pierre Courtieu and   
                Yannick Moy and   
                     Marc Sango   Maximal and Compositional Pattern-Based
                                  Loop Invariants  . . . . . . . . . . . . 37--51
             Mikael Asplund and   
               Atif Manzoor and   
    Mélanie Bouroche and   
               Siobh\`an Clarke   A Formal Approach to Autonomous Vehicle
                                  Coordination . . . . . . . . . . . . . . 52--67
           Howard Barringer and   
            Yli\`es Falcone and   
             Klaus Havelund and   
                    Giles Reger   Quantified Event Automata: Towards
                                  Expressive and Efficient Runtime
                                  Monitors . . . . . . . . . . . . . . . . 68--84
              Andreas Bauer and   
                Yli\`es Falcone   Decentralised LTL Monitoring . . . . . . 85--100
         Soufiene Benkirane and   
              Rachel Norman and   
                 Erin Scott and   
               Carron Shankland   Measles Epidemics and PEPA: An
                                  Exploration of Historic Disease Dynamics
                                  Using Process Algebra  . . . . . . . . . 101--115
           Matthieu Carlier and   
           Catherine Dubois and   
                 Arnaud Gotlieb   A Certified Constraint Solver over
                                  Finite Domains . . . . . . . . . . . . . 116--131
           Maria Christakis and   
          Peter Müller and   
         Valentin Wüstholz   Collaborative Verification and Testing
                                  with Explicit Assumptions  . . . . . . . 132--146
            Denis Cousineau and   
             Damien Doligez and   
             Leslie Lamport and   
                   Stephan Merz   TLA$^+$ Proofs . . . . . . . . . . . . . 147--154
  Nicolás D'Ippolito and   
           Victor Braberman and   
                   Nir Piterman   The Modal Transition System Control
                                  Problem  . . . . . . . . . . . . . . . . 155--170
              Julien Dormoy and   
          Olga Kouchnarenko and   
                  Arnaud Lanoix   When Structural Refinement of Components
                                  Keeps Temporal Properties over
                                  Reconfigurations . . . . . . . . . . . . 171--186
                Evren Ermis and   
          Martin Schäf and   
                    Thomas Wies   Error Invariants . . . . . . . . . . . . 187--201
           Mathieu Giorgino and   
                Martin Strecker   Correctness of Pointer Manipulating
                                  Algorithms Illustrated by a Verified BDD
                                  Construction . . . . . . . . . . . . . . 202--216
              James Heather and   
                Steve Schneider   A Formal Framework for Modelling
                                  Coercion Resistance and Receipt Freeness 217--231
          Robert M. Hierons and   
         Mercedes G. Merayo and   
     Manuel Núñez   Using Time to Add Order to Distributed
                                  Testing  . . . . . . . . . . . . . . . . 232--246
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7437, 2012

                 Nouha Abid and   
              Silvano Dal Zilio   Real-Time Specification Patterns and
                                  Tools  . . . . . . . . . . . . . . . . . 1--15
              Elvira Albert and   
       Bjarte M. Òstvold   Automated Extraction of Abstract
                                  Behavioural Models from JMS Applications 16--31
             Nicolas Ayache and   
              Roberto M. Amadio   Certifying and Reasoning on Cost
                                  Annotations in C Programs  . . . . . . . 32--46
             Christel Baier and   
                Marcus Daum and   
                 Benjamin Engel   Waiting for Locks: How Long Does It
                                  Usually Take?  . . . . . . . . . . . . . 47--62
              Victor Bandur and   
               Wolfram Kahl and   
                   Alan Wassyng   Microcontroller Assembly Synthesis from
                                  Timed Automaton Task Specifications  . . 63--77
                Jiri Barnat and   
                  Jan Beran and   
                     Lubos Brim   Tool Chain to Support Automated Formal
                                  Verification of Avionics Simulink
                                  Designs  . . . . . . . . . . . . . . . . 78--92
                Edd Barrett and   
                      Andy King   Range Analysis of Binaries with Minimal
                                  Effort . . . . . . . . . . . . . . . . . 93--107
          Lo\"\ic Correnson and   
                Julien Signoles   Combining Analyses for C Program
                                  Verification . . . . . . . . . . . . . . 108--130
                  Sjoerd Cranen   Model Checking the FlexRay Startup Phase 131--145
              Rainer Droste and   
          Christoph Läsche   Model-Based Risk Assessment Supporting
                                  Development of HSE Plans for Safe
                                  Offshore Operations  . . . . . . . . . . 146--161
              Luca Ferrucci and   
                 Dino Mandrioli   Modular Automated Verification of
                                  Flexible Manufacturing Systems with
                                  Metric Temporal Logic and Non-Standard
                                  Analysis . . . . . . . . . . . . . . . . 162--176
                  Vlad Popa and   
             Wolfgang Schwitzer   Optimizing the Robustness of Software
                                  against Communication Latencies in
                                  Distributed Reactive Embedded Systems    177--191
                Konrad Siek and   
        Pawe\l T. Wojciechowski   A Formal Design of a Tool for Static
                                  Analysis of Upper Bounds on Object Calls
                                  in Java  . . . . . . . . . . . . . . . . 192--206
 Ji\vrí Slabý and   
             Jan Strej\vcek and   
             Marek Trtík   Checking Properties Described by State
                                  Machines: On Synergy of Instrumentation,
                                  Slicing, and Symbolic Execution  . . . . 207--221
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7438, 2012

            Robert Kowalski and   
                   Fariba Sadri   A Logic-Based Framework for Reactive
                                  Systems  . . . . . . . . . . . . . . . . 1--15
            Marie-Laure Mugnier   Ontology-Based Query Answering with
                                  Existential Rules  . . . . . . . . . . . 16--16
          Valerio Cosentino and   
                Jordi Cabot and   
             Patrick Albert and   
           Philippe Bauquel and   
              Jacques Perronnet   A Model Driven Reverse Engineering
                                  Framework for Extracting Business Rules
                                  Out of a Java Application  . . . . . . . 17--31
             Mustafa Hashmi and   
          Guido Governatori and   
               Moe Thandar Wynn   Business Process Data Compliance . . . . 32--46
         Bruno Berstel-Da Silva   Formalizing Both Refraction-Based and
                                  Sequential Executions of Production Rule
                                  Programs . . . . . . . . . . . . . . . . 47--61
              Adil El Ghali and   
               Amina Chniti and   
                  Hugues Citeau   Bringing OWL Ontologies to the Business
                                  Rules Users  . . . . . . . . . . . . . . 62--76
   Abdooulaye Guissé and   
François Lévy and   
              Adeline Nazarenko   From Regulatory Texts to BRMS: How to
                                  Guide the Acquisition of Business Rules? 77--91
               Saleem Malik and   
             Imran Sarwar Bajwa   A Rule Based Approach for Business Rule
                                  Generation from Business Process Models  92--99
             Adrian Paschke and   
               Harold Boley and   
                 Zhili Zhao and   
             Kia Teymourian and   
                     Tara Athan   Reaction RuleML 1.0: Standardized
                                  Semantic Reaction Rules  . . . . . . . . 100--119
            Theodore Patkos and   
         Abdelghani Chibani and   
       Dimitris Plexousakis and   
                  Yacine Amirat   A Production Rule-Based Framework for
                                  Causal and Epistemic Reasoning . . . . . 120--135
           Katerina Ksystra and   
     Nikolaos Triantafyllou and   
               Petros Stefaneas   On the Algebraic Semantics of Reactive
                                  Rules  . . . . . . . . . . . . . . . . . 136--150
          Stefano Bragaglia and   
           Federico Chesani and   
                Paola Mello and   
                 Davide Sottara   A Rule-Based Calculus and Processing of
                                  Complex Events . . . . . . . . . . . . . 151--166
        Stefania Costantini and   
           Giovanni De Gasperis   Complex Reactivity with Preferences in
                                  Rule-Based Agents  . . . . . . . . . . . 167--181
               Hans Weigand and   
                 Adrian Paschke   The Pragmatic Web: Putting Rules in
                                  Context  . . . . . . . . . . . . . . . . 182--192
           Kalliopi Kravari and   
               Nick Bassiliades   HARM: a Hybrid Rule-Based Agent
                                  Reputation Model Based on Temporal
                                  Defeasible Logic . . . . . . . . . . . . 193--207
            Benjamin Jailly and   
         Christophe Gravier and   
           Julien Subercaze and   
               Marius Preda and   
                Jacques Fayolle   Whispering Interactions to the End User
                                  Using Rules  . . . . . . . . . . . . . . 208--214
           Iosif Viktoratos and   
        Athanasios Tsadiras and   
               Nick Bassiliades   Personalizing Location Information
                                  through Rule-Based Policies  . . . . . . 215--223
             Yan Tang Demey and   
                Trung-Kien Tran   Using $\mathcal{SOIQ}$(D) to Formalize
                                  Semantics within a Semantic Decision
                                  Table  . . . . . . . . . . . . . . . . . 224--239
           Sotiris Batsakis and   
       Euripides G. M. Petrakis   Imposing Restrictions over Temporal
                                  Properties in OWL: a Rule-Based Approach 240--247
Jesús M. Almendros-Jiménez   OWL RL in Logic Programming: Querying,
                                  Reasoning and Inconsistency Explanations 248--255
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7439, 2012

           Kazufumi Nishida and   
                Koji Nakano and   
                    Yasuaki Ito   Accelerating the Dynamic Programming for
                                  the Optimal Polygon Triangulation on the
                                  GPU  . . . . . . . . . . . . . . . . . . 1--15
                   Xu Huang and   
          Dharmendra Sharma and   
                 Muhammad Ahmed   Security Computing for the Resiliency of
                                  Protecting from Internal Attacks in
                                  Distributed Wireless Sensor Networks . . 16--29
               Shin-Yeu Lin and   
                 Xian-Chang Guo   Parallel Algorithm for Nonlinear Network
                                  Optimization Problems and Real-Time
                                  Applications . . . . . . . . . . . . . . 30--40
              Max Schneider and   
               Nikola Belic and   
          Christoph Sambale and   
             Ulrich Hofmann and   
                    Dietmar Fey   Optimization of a Short-Range Proximity
                                  Effect Correction Algorithm in E-Beam
                                  Lithography Using GPGPUs . . . . . . . . 41--55
        Nikolaos Alachiotis and   
            Pavlos Pavlidis and   
          Alexandros Stamatakis   Exploiting Multi-grain Parallelism for
                                  Efficient Selective Sweep Detection  . . 56--68
          Eraldo P. Marinho and   
            Alexandro Baldassin   Vectorized Algorithms for Quadtree
                                  Construction and Descent . . . . . . . . 69--82
        Vu Thien Nga Nguyen and   
             Raimund Kirner and   
                  Frank Penczek   A Multi-level Monitoring Framework for
                                  Stream-Based Coordination Programs . . . 83--98
                    Koji Nakano   An Optimal Parallel Prefix-Sums
                                  Algorithm on the Memory Machine Models
                                  for GPUs . . . . . . . . . . . . . . . . 99--113
          Sebastian Schaetz and   
                  Martin Uecker   A Multi-GPU Programming Library for
                                  Real-Time Applications . . . . . . . . . 114--128
          Sarad Venugopalan and   
                  Oliver Sinnen   Optimal Linear Programming Solutions for
                                  Multiprocessor Scheduling with
                                  Communication Delays . . . . . . . . . . 129--138
       Yoshihiro Ichinomiya and   
           Motoki Amagasaki and   
              Masahiro Iida and   
                  Morihiro Kuga   A Bitstream Relocation Technique to
                                  Improve Flexibility of Partial
                                  Reconfiguration  . . . . . . . . . . . . 139--152
                 Chuan Wang and   
                 Jianhua Gu and   
                Yunlan Wang and   
                   Tianhai Zhao   A Hybrid Heuristic-Genetic Algorithm for
                                  Task Scheduling in Heterogeneous
                                  Multi-core System  . . . . . . . . . . . 153--170
                    Li Wang and   
                   Jing Liu and   
                Jingtong Hu and   
             Qingfeng Zhuge and   
                    Duo Liu and   
                Edwin H.-M. Sha   Efficient Task Assignment on
                                  Heterogeneous Multicore Systems
                                  Considering Communication Overhead . . . 171--185
                 Eddy Caron and   
Frédéric Desprez and   
             Adrian Muresan and   
   Frédéric Suter   Budget Constrained Resource Allocation
                                  for Non-deterministic Workflows on an
                                  IaaS Cloud . . . . . . . . . . . . . . . 186--201
            Hiroki Nakahara and   
         Hiroyuki Nakanishi and   
                  Tsutomu Sasao   On a Wideband Fast Fourier Transform
                                  Using Piecewise Linear Approximations:
                                  Application to a Radio Telescope
                                  Spectrometer . . . . . . . . . . . . . . 202--217
            Wadoud Bousdira and   
Frédéric Loulergue and   
                  Julien Tesson   A Verified Library of Algorithmic
                                  Skeletons on Evenly Distributed Arrays   218--232
             Takayuki Umeda and   
             Keiichiro Fukazawa   Performance Measurement of Parallel
                                  Vlasov Code for Space Plasma on Various
                                  Scalar-Type Supercomputer Systems  . . . 233--240
            Andrew A. Haigh and   
          Bradley E. Treeby and   
               Eric C. McCreath   Ultrasound Simulation on the Cell
                                  Broadband Engine Using the Westervelt
                                  Equation . . . . . . . . . . . . . . . . 241--252
                Nianmin Yao and   
                   Yong Han and   
                Shaobin Cai and   
                     Qilong Han   Study on the Data Flow Balance in NFS
                                  Server with iSCSI  . . . . . . . . . . . 253--272
        Christoph M. Kirsch and   
               Hannes Payer and   
           Harald Röck and   
                   Ana Sokolova   Performance, Scalability, and Semantics
                                  of Concurrent FIFO Queues  . . . . . . . 273--287
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7440, 2012

             Jih-Ching Chiu and   
              Kai-Ming Yang and   
                  Chen-Ang Wong   Analytical Modeling for
                                  Multi-transaction Bus on Distributed
                                  Systems  . . . . . . . . . . . . . . . . 1--9
               LihChyun Shu and   
              Ying-Cheng Su and   
            Chang-Ming Tasi and   
                   Huey-Min Sun   Leveraging the Strengths of
                                  Transactional Memory While Maintaining
                                  System Performance for a Multiplayer
                                  Gaming Application . . . . . . . . . . . 10--20
               Il-Young Kim and   
                  Jong-Kook Kim   Enhancing the Performance of a
                                  Distributed Mobile Computing Environment
                                  by Topology Construction . . . . . . . . 21--30
                     Yi Dai and   
                Ke-fei Wang and   
                 Wei-xia Xu and   
              He-ying Zhang and   
                 Shao-gang Wang   Frame Error Rate Testing for High Speed
                                  Optical Interconnect . . . . . . . . . . 31--39
             Ehsan Atoofian and   
         Amir Ghanbari Bavarsad   Maintaining Consistency in Software
                                  Transactional Memory through Dynamic
                                  Versioning Tuning  . . . . . . . . . . . 40--49
                Da-Ren Chen and   
            Chiun-Chieh Hsu and   
            You-Shyang Chen and   
                     Jun-Fu Guo   Solving a 2-Covered Path Problem with
                                  Variable Radii for Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 50--61
          Yoshimasa Ohnishi and   
               Takaichi Yoshida   Design of an Application-Dependent
                                  Static-Based Shared Memory Network . . . 62--71
              Anh P. Nguyen and   
                 Thuc D. Nguyen   Determining Quality of S-Boxes Using
                                  Pseudo Random Sequences Generated from
                                  Stream Ciphers . . . . . . . . . . . . . 72--79
                 Weixing Ji and   
                Yizhuo Wang and   
                  Zhi Huang and   
               Junqing Zhao and   
                          Xi Li   Exploring Object-Level Parallelism on
                                  Chip Multi-processors  . . . . . . . . . 80--89
               Yi-Chun Wang and   
             Justie Su-Tzu Juan   The Hamiltonicity of WK-Recursive
                                  Pyramid  . . . . . . . . . . . . . . . . 90--99
                Djawida Dib and   
         Nikos Parlavantzas and   
                Christine Morin   Towards Multi-level Adaptation for
                                  Distributed Operating Systems and
                                  Applications . . . . . . . . . . . . . . 100--109
                Chih-Chiang Wei   FIDs Classifier for Artificial
                                  Intelligence and Its Application . . . . 110--119
     Ahmad Shukri Mohd Noor and   
          Mustafa Mat Deris and   
              Tutut Herawan and   
             Mohamad Nor Hassan   On Affirmative Adaptive Failure
                                  Detection  . . . . . . . . . . . . . . . 120--129
                 Wen-Ta Lee and   
            Min-Sheng Chang and   
                 Wei-Chieh Shen   A New Low Latency Parallel Turbo Decoder
                                  Employing Parallel Phase Decoding Method 130--139
                Fouad B. Chedid   A Regular Group Quorum System of Degree
                                  $\lceil \sqrt{n\slash 2}\rceil$  . . . . 140--147
                Fouad B. Chedid   A Note on Developing Optimal and
                                  Scalable Parallel Two-List Algorithms    148--155
                   Kai Peng and   
                    Hua Zou and   
               Rongheng Lin and   
                  Fangchun Yang   Small Business-Oriented Index
                                  Construction of Cloud Data . . . . . . . 156--165
                    Jie Liu and   
                  Lihua Chi and   
                Chunye Gong and   
                     Han Xu and   
                  Jie Jiang and   
                  Yihui Yan and   
                    Qingfeng Hu   High-Performance Matrix Multiply on a
                                  Massively Multithreaded Fiteng1000
                                  Processor  . . . . . . . . . . . . . . . 166--176
                 Dongjin Yu and   
                     Wei Wu and   
               Suhang Zheng and   
                   Zhixiang Zhu   BIDE-Based Parallel Mining of Frequent
                                  Closed Sequences with MapReduce  . . . . 177--186
                Sung Il Kim and   
              Jong-Kook Kim and   
               Hyoung Uk Ha and   
                 Tae Ho Kim and   
                  Kyu Hyun Choi   Efficient Task Scheduling for Hard
                                  Real-Time Tasks in Asymmetric Multicore
                                  Processors . . . . . . . . . . . . . . . 187--196
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7441, 2012

                  A. Thomas and   
                 B. John Oommen   Optimal ``Anti-Bayesian'' Parametric
                                  Pattern Classification Using Order
                                  Statistics Criteria  . . . . . . . . . . 1--13
               Asja Fischer and   
                 Christian Igel   An Introduction to Restricted Boltzmann
                                  Machines . . . . . . . . . . . . . . . . 14--36
                    Zicheng Liu   Human Activity Recognition with $2$D and
                                  $3$D Cameras . . . . . . . . . . . . . . 37--37
                 Gabriel Taubin   Smooth Signed Distance Surface
                                  Reconstruction and Applications  . . . . 38--45
                  Juan P. Wachs   Robot, Pass Me the Scissors! How Robots
                                  Can Assist Us in the Operating Room  . . 46--57
José Antonio Rodriguez-Serrano   Pattern Recognition in Transportation    58--58
             Andrea Bottino and   
                Aldo Laurentini   The Intrinsic Dimensionality of
                                  Attractiveness: a Study in Face Profiles 59--66
               Ajay Jaiswal and   
                Nitin Kumar and   
                  R. K. Agrawal   A Hybrid of Principal Component Analysis
                                  and Partial Least Squares for Face
                                  Recognition across Pose  . . . . . . . . 67--73
Enrique Ramón-Balmaseda and   
     Javier Lorenzo-Navarro and   
Modesto Castrillón-Santana   Gender Classification in Large Databases 74--81
Modesto Castrillón-Santana and   
Daniel Hernández-Sosa and   
         Javier Lorenzo-Navarro   Combining Face and Facial Feature
                                  Detectors for Face Detection Performance
                                  Improvement  . . . . . . . . . . . . . . 82--89
       Ariel Morelli Andres and   
         Sebastian Padovani and   
             Mariano Tepper and   
               Marta Mejail and   
                   Julio Jacobo   Randomized Face Recognition on Partially
                                  Occluded Images  . . . . . . . . . . . . 90--97
    Noslen Hernández and   
Yoanna Martínez-Díaz and   
   Dania Porro-Muñoz and   
Heydi Méndez-Vázquez   Face Recognition: Would Going Back to
                                  Functional Nature Be a Good Idea?  . . . 98--105
Yoanna Martínez-Díaz and   
Heydi Méndez-Vázquez and   
Yenisel Plasencia-Calaña   Dissimilarity Representations Based on
                                  Multi-Block LBP for Face Detection . . . 106--113
        Marta Gomez-Barrero and   
            Javier Galbally and   
                 Pedro Tome and   
                 Julian Fierrez   On the Vulnerability of Iris-Based
                                  Systems to a Software Attack Based on a
                                  Genetic Algorithm  . . . . . . . . . . . 114--121
   Fabio A. González and   
               David Bermeo and   
                Laura Ramos and   
                  Olfa Nasraoui   On the Robustness of Kernel-Based
                                  Clustering . . . . . . . . . . . . . . . 122--129
Diego Hernán Peluffo-Ordóñez and   
    Carlos Daniel Acosta-Medina   An Improved Multi-Class Spectral
                                  Clustering Based on Normalized Cuts  . . 130--137
   Hernán C. Ahumada and   
              Pablo M. Granitto   A Simple Hybrid Method for
                                  Semi-Supervised Learning . . . . . . . . 138--145
           Vladimir V. Ryazanov   Clustering of Incomplete Data and
                                  Evaluation of Clustering Quality . . . . 146--153
        Miguel A. Duval-Poo and   
    Joan Sosa-García and   
Alejandro Guerra-Gandón and   
               Sandro Vega-Pons   A New Classifier Combination Scheme
                                  Using Clustering Ensemble  . . . . . . . 154--161
Miriam Mónica Duarte-Villaseñor and   
Jesús Ariel Carrasco-Ochoa   Nested Dichotomies Based on Clustering   162--169
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7442, 2012

              S. A. Abramov and   
                 M. Petkov\vsek   On Polynomial Solutions of Linear
                                  Partial Differential and
                                  ($q$-)Difference Equations . . . . . . . 1--11
          Prabhanjan Ananth and   
             Ambedkar Dukkipati   An Algebraic Characterization of Rainbow
                                  Connectivity . . . . . . . . . . . . . . 12--21
              Alexander Batkhin   Application of the Method of Asymptotic
                                  Solution to One Multi-Parameter Problem  22--33
              Marco Bodrato and   
                 Alberto Zanoni   A New Algorithm for Long Integer Cube
                                  Computation with Some Insight into
                                  Higher Powers  . . . . . . . . . . . . . 34--46
           Pavel Bourdykine and   
                Stephen M. Watt   Lightweight Abstraction for Mathematical
                                  Computation in Java  . . . . . . . . . . 47--59
         Alexander D. Bruno and   
              Victor F. Edneral   Calculation of Normal Forms of the
                                  Euler--Poisson Equations . . . . . . . . 60--71
          Dzmitry A. Budzko and   
        Alexander N. Prokopenya   Stability of Equilibrium Positions in
                                  the Spatial Circular Restricted
                                  Four-Body Problem  . . . . . . . . . . . 72--83
              Hassan Errami and   
               Werner M. Seiler   Computing Hopf Bifurcations in Chemical
                                  Reaction Networks Using Reaction
                                  Coordinates  . . . . . . . . . . . . . . 84--97
             Vladimir Gerdt and   
                   Amir Hashemi   Comprehensive Involutive Systems . . . . 98--116
            Mark Giesbrecht and   
                  Albert Heinle   A Polynomial-Time Algorithm for the
                                  Jacobson Form of a Matrix of Ore
                                  Polynomials  . . . . . . . . . . . . . . 117--128
          Jaume Giné and   
          Colin Christopher and   
               Mateja Pre\vsern   The Resonant Center Problem for a 2:-3
                                  Resonant Cubic Lotka--Volterra System    129--142
             Dima Grigoriev and   
                  Andreas Weber   Complexity of Solving Systems with Few
                                  Independent Monomials and Applications
                                  to Mass-Action Kinetics  . . . . . . . . 143--154
            Alexander Gusev and   
                Sergue Vinitsky   Symbolic-Numerical Calculations of
                                  High-$|m|$ Rydberg States and Decay
                                  Rates in Strong Magnetic Fields  . . . . 155--171
               Amir Hashemi and   
          Michael Schweinfurter   Quasi-stability versus Genericity  . . . 172--184
                  Gregor Kemper   Invariant Theory: Applications and
                                  Computations . . . . . . . . . . . . . . 185--185
                     Jia Li and   
              Jin-San Cheng and   
            Elias P. Tsigaridas   Local Generic Position for Root
                                  Isolation of Zero-Dimensional Triangular
                                  Polynomial Systems . . . . . . . . . . . 186--197
             Steffen Marcus and   
           Marc Moreno Maza and   
                     Paul Vrbik   On Fulton's Algorithm for Computing
                                  Intersection Multiplicities  . . . . . . 198--211
                Marc Mezzarobba   A Note on the Space Complexity of Fast
                                  D-Finite Function Evaluation . . . . . . 212--223
           Marc Moreno Maza and   
         Éric Schost and   
                     Paul Vrbik   Inversion Modulo Zero-Dimensional
                                  Regular Chains . . . . . . . . . . . . . 224--235
            Michael Monagan and   
                   Roman Pearce   Sparse Polynomial Powering Using Heaps   236--247
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7443, 2012

                   Fathul Wahid   The Current State of Research on
                                  eGovernment in Developing Countries: a
                                  Literature Review  . . . . . . . . . . . 1--12
              Nurdin Nurdin and   
         Rosemary Stockdale and   
               Helana Scheepers   The Influence of External Institutional
                                  Pressures on Local E-Government Adoption
                                  and Implementation: a Coercive
                                  Perspective within an Indonesian Local
                                  E-Government Context . . . . . . . . . . 13--26
          Yvon van den Boer and   
   Lidwien van de Wijngaert and   
           Willem Pieterson and   
                   Rex Arendsen   On the Interaction of Source and Channel
                                  Choice in the Government-to-Business
                                  Context  . . . . . . . . . . . . . . . . 27--39
              Suha Alawadhi and   
       Armando Aldama-Nalda and   
            Hafedh Chourabi and   
        J. Ramon Gil-Garcia and   
                    Sofia Leung   Building Understanding of Smart City
                                  Initiatives  . . . . . . . . . . . . . . 40--53
              Nicole Maarse and   
                 Marijn Janssen   The Need to Adjust Lean to the Public
                                  Sector . . . . . . . . . . . . . . . . . 54--65
            Katarina L. Gidlund   `Demand Driven Development of Public
                                  e-Services'  . . . . . . . . . . . . . . 66--77
           Damiano Falcioni and   
              Andrea Polini and   
         Alberto Polzonetti and   
                     Barbara Re   Improving PA Business Processes through
                                  Modeling, Analysis, and Reengineering    78--89
          Anneke Zuiderwijk and   
             Marijn Janssen and   
              Ronald Meijer and   
              Sunil Choenni and   
            Yannis Charalabidis   Issues and Guiding Principles for
                                  Opening Governmental Judicial Research
                                  Data . . . . . . . . . . . . . . . . . . 90--101
 Panagiotis Panagiotopoulos and   
     Alinaghi Ziaee Bigdeli and   
                    Steven Sams   `5 Days in August' --- How London Local
                                  Authorities Used Twitter during the 2011
                                  Riots  . . . . . . . . . . . . . . . . . 102--113
              Mark Scannell and   
                Frank Bannister   Shared Services in Irish Local
                                  Government . . . . . . . . . . . . . . . 114--125
       André Andrade and   
              Luiz Antonio Joia   Information Technology and the
                                  Efficiency of the Brazilian Judiciary
                                  System . . . . . . . . . . . . . . . . . 126--136
         Walter T. de Vries and   
              Gianluca Miscione   The Tool That Has to Build Itself: The
                                  Case of Dutch Geo-Data . . . . . . . . . 137--148
        Bernd Zwattendorfer and   
                Arne Tauber and   
           Klaus Stranacher and   
        Peter Reichstädter   Cross-Border Legal Identity Management   149--161
              Juha Lemmetti and   
                 Samuli Pekkola   Understanding Enterprise Architecture:
                                  Perceptions by the Finnish Public Sector 162--173
                   Arild Jansen   The Understanding of ICTs in Public
                                  Sector and Its Impact on Governance  . . 174--186
    Anne Fleur van Veenstra and   
                 Marijn Janssen   Investigating Outcomes of T-Government
                                  Using a Public Value Management Approach 187--197
Òystein Sæbò   E-government in Tanzania: Current Status
                                  and Future Challenges  . . . . . . . . . 198--209
             Mauricio Solar and   
       Gastón Concha and   
                 Luis Meijueiro   A Model to Assess Open Government Data
                                  in Public Agencies . . . . . . . . . . . 210--221
                  John Krogstie   Comparing Private and Public Sector on
                                  Information Systems Development and
                                  Maintenance Efficiency . . . . . . . . . 222--233
       Dalibor Stanimirovic and   
                 Tina Jukic and   
             Janja Nograsek and   
                   Mirko Vintar   Analysis of the Methodologies for
                                  Evaluation of E-Government Policies  . . 234--245
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7444, 2012

                 Peter Dahlgren   Social Media and Counter-Democracy: The
                                  Contingences of Participation  . . . . . 1--12
               Steffen Albrecht   E-Consultations: a Review of Current
                                  Practice and a Proposal for Opening Up
                                  the Process  . . . . . . . . . . . . . . 13--24
   Marius Rohde Johannessen and   
        Leif Skiftenes Flak and   
Òystein Sæbò   Choosing the Right Medium for Municipal
                                  eParticipation Based on Stakeholder
                                  Expectations . . . . . . . . . . . . . . 25--36
    Åke Grönlund and   
                    Iryna Susha   A Communication Genre Perspective on
                                  e-Petitioning: The Case of the Citizens'
                                  Initiative . . . . . . . . . . . . . . . 37--48
           Eleni Panopoulou and   
     Efpraxia Dalakiouridou and   
        Efthimios Tambouris and   
         Konstantinos Tarabanis   Citizens' Evaluation of an Online
                                  Argument Visualisation Platform for
                                  eParticipation . . . . . . . . . . . . . 49--60
                  Neil Benn and   
                  Ann Macintosh   PolicyCommons --- Visualizing Arguments
                                  in Policy Consultation . . . . . . . . . 61--72
            Shun Shiramatsu and   
         Robin M. E. Swezey and   
              Hiroyuki Sano and   
            Norifumi Hirata and   
                Tadachika Ozono   Structuring Japanese Regional
                                  Information Gathered from the Web as
                                  Linked Open Data for Use in Concern
                                  Assessment . . . . . . . . . . . . . . . 73--84
           Georg Aichholzer and   
            Doris Allhutter and   
            Stefan Strauß   Using Online Carbon Calculators for
                                  Participation in Local Climate
                                  Initiatives  . . . . . . . . . . . . . . 85--96
            Sabrina Scherer and   
                Maria A. Wimmer   Reference Process Model for
                                  Participatory Budgeting in Germany . . . 97--111
            Olivier Glassey and   
         Camille-Angelo Aglione   Getting Teenagers to Participate: a
                                  Survey of the Youth Council of the City
                                  of Lausanne  . . . . . . . . . . . . . . 112--119
              Adam Z. Wyner and   
             Katie Atkinson and   
             Trevor Bench-Capon   Model Based Critique of Policy Proposals 120--131
              Roman Klinger and   
             Philipp Senger and   
                Sumit Madan and   
                  Michal Jacovi   Online Communities Support
                                  Policy-Making: The Need for Data
                                  Analysis . . . . . . . . . . . . . . . . 132--143
           Cleyton Slaviero and   
Ana Cristina Bicharra Garcia and   
               Cristiano Maciel   Exploiting eParticipation Using an
                                  Ontological Approach . . . . . . . . . . 144--155
        Yannis Charalabidis and   
         Anna Triantafillou and   
       Vangelis Karkaletsis and   
               Euripidis Loukis   Public Policy Formulation through Non
                                  Moderated Crowdsourcing in Social Media  156--169
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7445, 2012

                Paola Bonizzoni   The Holy Grail: Finding the Genetic
                                  Bases of Phenotypic Characters . . . . . 1--1
         Cristian S. Calude and   
               Elena Calude and   
               Melissa S. Queen   Inductive Complexity of P versus NP
                                  Problem  . . . . . . . . . . . . . . . . 2--9
            René Doursat   Advances in Embryomorphic Engineering    10--10
                   Jack H. Lutz   Reasoning As Though  . . . . . . . . . . 11--11
            Maurice Margenstern   Universality and the Halting Problem for
                                  Cellular Automata in Hyperbolic Spaces:
                                  The Side of the Halting Problem  . . . . 12--33
              Matthew J. Patitz   An Introduction to Tile-Based
                                  Self-assembly  . . . . . . . . . . . . . 34--62
            Antoine Spicher and   
             Olivier Michel and   
            Jean-Louis Giavitto   Spatial Computing in MGS . . . . . . . . 63--69
Erzsébet Csuhaj-Varjú and   
            Marian Gheorghe and   
                  Mike Stannett   P Systems Controlled by General
                                  Topologies . . . . . . . . . . . . . . . 70--81
              Rudolf Freund and   
             Yurii Rogozhin and   
                  Sergey Verlan   P Systems with Minimal Left and Right
                                  Insertion and Deletion . . . . . . . . . 82--93
               Sama Goliaei and   
Mohammad-Hadi Foroughmand-Araabi   Lower Bounds on the Complexity of the
                                  Wavelength-Based Machine . . . . . . . . 94--105
            Cristian Grozea and   
               Florin Manea and   
           Mike Müller and   
                   Dirk Nowotka   String Matching with Involutions . . . . 106--117
             Frederic Gruau and   
                Luidnel Maignan   Distributed Execution of Automata
                                  Networks on a Computing Medium:
                                  Introducing IfAny Machines . . . . . . . 118--129
              Gerd Gruenert and   
               Gabi Escuela and   
                 Peter Dittrich   Symbol Representations in Evolving
                                  Droplet Computers  . . . . . . . . . . . 130--140
                 Joachim Hertel   Inductive Complexity of Goodstein's
                                  Theorem  . . . . . . . . . . . . . . . . 141--151
           Matthew R. Lakin and   
             Amanda Minnich and   
                Terran Lane and   
               Darko Stefanovic   Towards a Biomolecular Learning Machine  152--163
                  Pietro Milici   Tractional Motion Machines:
                                  Tangent-Managing Planar Mechanisms as
                                  Analog Computers and Educational
                                  Artifacts  . . . . . . . . . . . . . . . 164--173
              J. Andres Montoya   Computing with Sand: On the Complexity
                                  of Recognizing Two-dimensional Sandpile
                                  Critical Configurations  . . . . . . . . 174--185
            Stefano Nichele and   
                   Gunnar Tufte   Genome Parameters as Information to
                                  Forecast Emergent Developmental
                                  Behaviors  . . . . . . . . . . . . . . . 186--197
              Susan Stepney and   
            Samson Abramsky and   
          Matthias Bechmann and   
              Jerzy Gorecki and   
                     Viv Kendon   Heterotic Computing Examples with
                                  Optics, Bacteria, and Chemicals  . . . . 198--209
                Sami Torbey and   
                   Selim G. Akl   Reliable Node Placement in Wireless
                                  Sensor Networks Using Cellular Automata  210--221
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7446, 2012

                 Tim Furche and   
              Georg Gottlob and   
           Christian Schallhart   DIADEM: Domains to Databases . . . . . . 1--8
           Yamine Ait-Ameur and   
               Idir Ait-Sadoune   Stepwise Development of Formal Models
                                  for Web Services Compositions: Modelling
                                  and Property Verification  . . . . . . . 9--9
                   Huayu Wu and   
               Ruiming Tang and   
              Tok Wang Ling and   
                  Yong Zeng and   
        Stéphane Bressan   A Hybrid Approach for General XML Query
                                  Processing . . . . . . . . . . . . . . . 10--25
         Martin F. O'Connor and   
                  Mark Roantree   SCOOTER: a Compact and Scalable Dynamic
                                  Labeling Scheme for XML Updates  . . . . 26--40
              Canwei Zhuang and   
                  Shaorong Feng   Reuse the Deleted Labels for Vector
                                  Order-Based Dynamic XML Labeling Schemes 41--54
                      Yi Ou and   
               Jianliang Xu and   
               Theo Härder   Towards an Efficient Flash-Based
                                  Mid-Tier Cache . . . . . . . . . . . . . 55--70
               Alka Bhushan and   
           Nandlal L. Sarda and   
               P. V. Rami Reddy   Evacuation Planning of Large Buildings
                                  Using Ladders  . . . . . . . . . . . . . 71--85
Meduri Venkata Vamsikrishna and   
                    Zhan Su and   
                   Kian-Lee Tan   A Write Efficient PCM-Aware Sort . . . . 86--100
          Flavio Ferrarotti and   
              Sven Hartmann and   
             Sebastian Link and   
             Mauricio Marin and   
              Emir Muñoz   Performance Analysis of Algorithms to
                                  Reason about XML Keys  . . . . . . . . . 101--115
              Kosetsu Ikeda and   
                Nobutaka Suzuki   Finding Top-$K$ Correct XPath Queries of
                                  User's Incorrect XPath Query . . . . . . 116--130
             H. S. Bruhathi and   
              Jayant R. Haritsa   Analyzing Plan Diagrams of XQuery
                                  Optimizers . . . . . . . . . . . . . . . 131--146
        Somchai Chatvichienchai   Spreadsheet Metadata Extraction: a
                                  Layout-Based Approach  . . . . . . . . . 147--160
          Thushari Atapattu and   
            Katrina Falkner and   
               Nickolas Falkner   Automated Extraction of Semantic
                                  Concepts from Semi-structured Data:
                                  Supporting Computer-Based Education
                                  through the Analysis of Lecture Notes    161--175
    Hilário Oliveira and   
               Rinaldo Lima and   
          João Gomes and   
            Rafael Ferreira and   
                   Fred Freitas   A Confidence--Weighted Metric for
                                  Unsupervised Ontology Population from
                                  Web Texts  . . . . . . . . . . . . . . . 176--190
             Imen Ben Sassi and   
            Chiraz Trabelsi and   
            Amel Bouzeghoub and   
                Sadok Ben Yahia   Situation-Aware User's Interests
                                  Prediction for Query Enrichment  . . . . 191--205
           Karam Abdulahhad and   
      Jean-Pierre Chevallet and   
               Catherine Berrut   The Effective Relevance Link between a
                                  Document and a Query . . . . . . . . . . 206--218
            Tassadit Bouadi and   
        Marie-Odile Cordier and   
            René Quiniou   Incremental Computation of Skyline
                                  Queries with Dynamic Preferences . . . . 219--233
              R. Uday Kiran and   
             Masaru Kitsuregawa   Efficient Discovery of Correlated
                                  Patterns in Transactional Databases
                                  Using Items' Support Intervals . . . . . 234--248
                Albert Tort and   
        Antoni Olivé and   
            Maria-Ribera Sancho   On Checking Executable Conceptual Schema
                                  Validity by Testing  . . . . . . . . . . 249--264
                  Wenyu Huo and   
            Vassilis J. Tsotras   Querying Transaction--Time Databases
                                  under Branched Schema Evolution  . . . . 265--280
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7447, 2012

 Cristhian A. D. Deagustini and   
Santiago E. Fulladoza Dalibón and   
    Sebastián Gottifredi   Consistent Query Answering Using
                                  Relational Databases through
                                  Argumentation  . . . . . . . . . . . . . 1--15
               John Jenkins and   
              Isha Arkatkar and   
   Sriram Lakshminarasimhan and   
                  Neil Shah and   
               Eric R. Schendel   Analytics-Driven Lossless Data
                                  Compression for Rapid In-situ Indexing,
                                  Storing, and Querying  . . . . . . . . . 16--30
                 Xiuming Yu and   
                 Meijing Li and   
               Incheon Paik and   
                    Keun Ho Ryu   Prediction of Web User Behavior by
                                  Discovering Temporal Relational Rules
                                  from Web Log Data  . . . . . . . . . . . 31--38
José Luis Navarro-Galindo and   
          José Samos and   
M. José Muñoz-Alférez   A Hybrid Approach to Text Categorization
                                  Applied to Semantic Annotation . . . . . 39--47
           Corrado Loglisci and   
                 Dino Ienco and   
              Mathieu Roche and   
       Maguelonne Teisseire and   
                 Donato Malerba   An Unsupervised Framework for
                                  Topological Relations Extraction from
                                  Geographic Documents . . . . . . . . . . 48--55
              Javier Nieves and   
                Igor Santos and   
               Pablo G. Bringas   Combination of Machine-Learning
                                  Algorithms for Fault Prediction in
                                  High-Precision Foundries . . . . . . . . 56--70
               Ruiming Tang and   
              Reynold Cheng and   
                   Huayu Wu and   
        Stéphane Bressan   A Framework for Conditioning Uncertain
                                  Relational Data  . . . . . . . . . . . . 71--87
                 Yuki Awano and   
                   Qiang Ma and   
            Masatoshi Yoshikawa   Cause Analysis of New Incidents by Using
                                  Failure Knowledge Database . . . . . . . 88--102
       Rania Khéfifi and   
              Pascal Poizat and   
                 Fatiha Sa\"\is   Modeling and Querying Context-Aware
                                  Personal Information Spaces  . . . . . . 103--110
               Amir Bahmani and   
               Sahra Sedigh and   
                     Ali Hurson   Ontology-Based Recommendation Algorithms
                                  for Personalized Education . . . . . . . 111--120
              Eya Ben Ahmed and   
                Ahlem Nabli and   
              Fa\"\iez Gargouri   Towards Quantitative Constraints Ranking
                                  in Data Clustering . . . . . . . . . . . 121--128
             Kyu-Hwang Kang and   
             Seung-Hwan Lim and   
              Sang-Wook Kim and   
               Min-Hee Jang and   
               Byeong-Soo Jeong   A Topic-Oriented Analysis of Information
                                  Diffusion in a Blogosphere . . . . . . . 129--140
           Keisuke Hasegawa and   
                   Qiang Ma and   
            Masatoshi Yoshikawa   Trip Tweets Search by Considering
                                  Spatio-temporal Continuity of User
                                  Behavior . . . . . . . . . . . . . . . . 141--155
            Raymond Vermaas and   
               Damir Vandic and   
              Flavius Frasincar   Incremental Cosine Computations for
                                  Search and Exploration of Tag Spaces . . 156--167
        Shuichi Kurabayashi and   
                 Yasushi Kiyoki   Impression-Aware Video Stream Retrieval
                                  System with Temporal Color-Sentiment
                                  Analysis and Visualization . . . . . . . 168--182
        Miguel Liroz-Gistau and   
             Reza Akbarinia and   
             Esther Pacitti and   
                Fabio Porto and   
              Patrick Valduriez   Dynamic Workload-Based Partitioning for
                                  Large-Scale Databases  . . . . . . . . . 183--190
   Lisbeth Rodríguez and   
                      Xiaoou Li   Dynamic Vertical Partitioning of
                                  Multimedia Databases Using Active Rules  191--198
          Jacek Jedrzejczak and   
           Tomasz Koszlajda and   
                 Robert Wrembel   RTDW-bench: Benchmark for Testing
                                  Refreshing Performance of Real-Time Data
                                  Warehouse  . . . . . . . . . . . . . . . 199--206
                  Pedro Furtado   Middleware and Language for Sensor
                                  Streams  . . . . . . . . . . . . . . . . 207--214
          Gianluca Correndo and   
              Antonio Penta and   
           Nicholas Gibbins and   
                 Nigel Shadbolt   Statistical Analysis of the owl:sameAs
                                  Network for Aligning Concepts in the
                                  Linking Open Data Cloud  . . . . . . . . 215--230
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7448, 2012

           Zineb El Akkaoui and   
José-Norberto Mazón and   
          Alejandro Vaisman and   
         Esteban Zimányi   BPMN-Based Conceptual Modeling of ETL
                                  Processes  . . . . . . . . . . . . . . . 1--14
          Alfredo Cuzzocrea and   
           Robson do N. Fidalgo   Enhancing Coverage and Expressive Power
                                  of Spatial Data Warehousing Modeling:
                                  The SDWM Approach  . . . . . . . . . . . 15--29
          Matteo Golfarelli and   
              Stefano Rizzi and   
               Elisa Turricchia   Sprint Planning Optimization in Agile
                                  Data Warehouse Design  . . . . . . . . . 30--41
               Faten Atigui and   
               Franck Ravat and   
              Olivier Teste and   
                 Gilles Zurfluh   Using OCL for Automatically Producing
                                  Multidimensional Models and ETL
                                  Processes  . . . . . . . . . . . . . . . 42--53
              Thomas Benker and   
             Carsten Jürck   A Case Study on Model-Driven Data
                                  Warehouse Development  . . . . . . . . . 54--64
            Petar Jovanovic and   
               Oscar Romero and   
             Alkis Simitsis and   
          Alberto Abelló   Integrating ETL Processes from
                                  Information Requirements . . . . . . . . 65--80
              Norah Alrayes and   
                    Wo-Shun Luk   Automatic Transformation of
                                  Multi-dimensional Web Tables into Data
                                  Cubes  . . . . . . . . . . . . . . . . . 81--92
                 Ali Hassan and   
               Franck Ravat and   
              Olivier Teste and   
             Ronan Tournier and   
                 Gilles Zurfluh   Differentiated Multiple Aggregations in
                                  Multidimensional Databases . . . . . . . 93--104
  Muhammad Marwan Muhammad Fuad   Genetic Algorithms-Based Symbolic
                                  Aggregate Approximation  . . . . . . . . 105--116
             Wiem Abdelbaki and   
         Riadh Ben Messaoud and   
                Sadok Ben Yahia   A Neural-Based Approach for Extending
                                  OLAP to Prediction . . . . . . . . . . . 117--129
João Bártolo Gomes and   
       Shonali Krishnaswamy and   
           Mohamed M. Gaber and   
              Pedro A. C. Sousa   Mobile Activity Recognition Using
                                  Ubiquitous Data Stream Mining  . . . . . 130--141
      Christoph Gröger and   
       Johannes Schlaudraff and   
         Florian Niedermann and   
             Bernhard Mitschang   Warehousing Manufacturing Data . . . . . 142--155
               Amira Kerkad and   
         Ladjel Bellatreche and   
               Dominique Geniet   Queen-Bee: Query Interaction-Aware for
                                  Buffer Allocation and Scheduling Problem 156--167
                   Suan Lee and   
                  Jinho Kim and   
              Yang-Sae Moon and   
                     Wookey Lee   Efficient Distributed Parallel Top-Down
                                  Computation of ROLAP Data Cube Using
                                  MapReduce  . . . . . . . . . . . . . . . 168--179
              Kazuyo Narita and   
             Shinji Nakadai and   
                   Takuya Araki   Landmark-Join: Hash-Join Based String
                                  Similarity Joins with Edit Distance
                                  Constraints  . . . . . . . . . . . . . . 180--191
                 Damla Oguz and   
                  Belgin Ergenc   Incremental Itemset Mining Based on
                                  Matrix Apriori Algorithm . . . . . . . . 192--204
                Jun-Feng Qu and   
                    Mengchi Liu   A Fast Algorithm for Frequent Itemset
                                  Mining Using Patricia* Structures  . . . 205--216
                  Hang Yang and   
                 Simon Fong and   
                   Yain-Whar Si   Multi-objective Optimization for
                                  Incremental Decision Tree Learning . . . 217--228
              Sandra de Amo and   
   Mouhamadou Saliou Diallo and   
      Cheikh Talibouya Diop and   
              Arnaud Giacometti   Mining Contextual Preference Rules for
                                  Building User Profiles . . . . . . . . . 229--242
            Dan A. Simovici and   
               Paul Fomenky and   
                    Werner Kunz   Polarities, Axiallities and
                                  Marketability of Items . . . . . . . . . 243--252
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7449, 2012

              Tobias Hirsch and   
            Luigi Lo Iacono and   
                   Ina Wechsung   How Much Network Security Must Be
                                  Visible in Web Browsers? . . . . . . . . 1--16
              Bastian Braun and   
              Stefan Kucher and   
               Martin Johns and   
                Joachim Posegga   A User-Level Authentication Scheme to
                                  Mitigate Web Session-Based
                                  Vulnerabilities  . . . . . . . . . . . . 17--29
      Matteo Maria Casalino and   
              Romuald Thion and   
              Mohand-Said Hacid   Access Control Configuration for J2EE
                                  Web Applications: a Formal Perspective   30--35
              Waldo Delport and   
              Martin S. Olivier   Cloud Separation: Stuck Inside the Cloud 36--49
                Kashif Syed and   
             Pavol Zavarsky and   
              Dale Lindskog and   
                   Ron Ruhl and   
                   Shaun Aghili   Proposed Control Procedure to Mitigate
                                  the Risks of Strategic Information
                                  Outflow in the Recruitment Process . . . 50--64
             Michael Netter and   
               Sabri Hassan and   
            Günther Pernul   An Autonomous Social Web Privacy
                                  Infrastructure with Context-Aware Access
                                  Control  . . . . . . . . . . . . . . . . 65--78
        Aliaksandr Lazouski and   
           Fabio Martinelli and   
                     Paolo Mori   A Prototype for Enforcing Usage Control
                                  Policies Based on XACML  . . . . . . . . 79--92
           Francisco Moyano and   
      Carmen Fernandez-Gago and   
                   Javier Lopez   A Conceptual Framework for Trust Models  93--104
                  Vit Bukac and   
                Pavel Tucek and   
                 Martin Deutsch   Advances and Challenges in Standalone
                                  Host-Based Intrusion Detection Systems   105--117
            Marcin Gorawski and   
               Michal Lorek and   
                Michal Gorawski   Encrypted Adaptive Storage Model ---
                                  Analysis and Performance Tests . . . . . 118--128
               Michael Dorn and   
       Peter Wackersreuther and   
            Christian Böhm   Efficient Comparison of Encrypted
                                  Biometric Templates  . . . . . . . . . . 129--142
             Rouzbeh Behnia and   
             Swee-Huay Heng and   
                  Che-Sheng Gan   Short and Efficient Identity-Based
                                  Undeniable Signature Scheme  . . . . . . 143--148
        Giuseppe D'Acquisto and   
              Marta Flamini and   
                 Maurizio Naldi   Damage Sharing May Not Be Enough: An
                                  Analysis of an Ex-ante Regulation Policy
                                  for Data Breaches  . . . . . . . . . . . 149--160
              Hanno Langweg and   
               Lisa Rajbhandari   Flexible Regulation with Privacy Points  161--166
              Rainer Schick and   
               Christoph Ruland   On the Security of the Non-Repudiation
                                  of Forwarding Service  . . . . . . . . . 167--178
            Hisain Elshaafi and   
             Jimmy McGibney and   
                 Dmitri Botvich   Profitability and Cost Management of
                                  Trustworthy Composite Services . . . . . 179--191
              Ta Vinh Thong and   
         Levente Buttyán   Query Auditing for Protecting Max/Min
                                  Values of Sensitive Attributes in
                                  Statistical Databases  . . . . . . . . . 192--206
                  Ali Salem and   
                Salah Triki and   
  Hanêne Ben-Abdallah and   
               Nouria Harbi and   
                  Omar Boussaid   Verification of Security Coherence in
                                  Data Warehouse Designs . . . . . . . . . 207--213
                  Luca Vigan\`o   Towards the Secure Provision and
                                  Consumption in the Internet of Services  214--215
               Martin Johns and   
                Joachim Posegga   WebSand: Server-Driven Outbound
                                  Web-Application Sandboxing . . . . . . . 216--217
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??