Table of contents for issues of Lecture Notes in Computer Science

Last update: Sat Oct 14 16:24:17 MDT 2017                Valid HTML 3.2!

Volume 7450, 2012
Volume 7451, 2012
Volume 7452, 2012
Volume 7453, 2012
Volume 7454, 2012
Volume 7455, 2012
Volume 7456, 2012
Volume 7457, 2012
Volume 7458, 2012
Volume 7459, 2012
Volume 7460, 2012
Volume 7461, 2012
Volume 7462, 2012
Volume 7463, 2012
Volume 7464, 2012
Volume 7465, 2012
Volume 7466, 2012
Volume 7467, 2012
Volume 7468, 2012
Volume 7469, 2012
Volume 7470, 2012
Volume 7471, 2012
Volume 7472, 2012
Volume 7473, 2012
Volume 7474, 2012
Volume 7476, 2012
Volume 7477, 2012
Volume 7478, 2012
Volume 7479, 2012
Volume 7481, 2012
Volume 7482, 2012
Volume 7483, 2012
Volume 7484, 2012
Volume 7485, 2012
Volume 7486, 2012
Volume 7487, 2012
Volume 7488, 2012
Volume 7489, 2012
Volume 7490, 2012
Volume 7491, 2012
Volume 7492, 2012
Volume 7493, 2012
Volume 7494, 2012
Volume 7495, 2012
Volume 7496, 2012
Volume 7497, 2012
Volume 7498, 2012
Volume 7499, 2012


Lecture Notes in Computer Science
Volume 7450, 2012

             Ibrahima Gueye and   
               Idrissa Sarr and   
                  Hubert Naacke   TransElas: Elastic Transaction
                                  Monitoring for Web2.0 Applications . . . 1--12
             Sushil Jajodia and   
              Witold Litwin and   
                 Thomas Schwarz   Recoverable Encryption through Noised
                                  Secret over a Large Cloud  . . . . . . . 13--24
                 Byunggu Yu and   
          Alfredo Cuzzocrea and   
                 Dong Jeong and   
               Sergey Maydebura   A Bigtable/MapReduce-Based Cloud
                                  Infrastructure for Effectively and
                                  Efficiently Managing Large-Scale Sensor
                                  Networks . . . . . . . . . . . . . . . . 25--36
                Diana Moise and   
        Alexandra Carpen-Amarie   MapReduce Applications in the Cloud: a
                                  Cost Evaluation of Computation and
                                  Storage  . . . . . . . . . . . . . . . . 37--48
         Mohamed Amin Sakka and   
                   Bruno Defude   Scalability Issues in Designing and
                                  Implementing Semantic Provenance
                                  Management Systems . . . . . . . . . . . 49--61
            Balwinder Sodhi and   
                T. V. Prabhakar   Performance Characteristics of
                                  Virtualized Platforms from Applications
                                  Perspective  . . . . . . . . . . . . . . 62--74
                Qiming Chen and   
                    Meichun Hsu   Open Execution Engines of Stream
                                  Analysis Operations  . . . . . . . . . . 75--87
                  George Pallis   Improving Content Delivery by Exploiting
                                  the Utility of CDN Servers . . . . . . . 88--99
            Eugenio Cesario and   
          Carlo Mastroianni and   
                 Domenico Talia   Using Mining@Home for Distributed
                                  Ensemble Learning  . . . . . . . . . . . 100--111
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7451, 2012

             Filipe Portela and   
       Manuel Filipe Santos and   
        José Machado and   
        Álvaro Silva and   
                   Fernando Rua   Intelligent Data Acquisition and Scoring
                                  System for Intensive Medicine  . . . . . 1--15
     Maribel Yasmina Santos and   
                 Jorge Cruz and   
   Artur Teles de Araújo   Data Mining in the Study of the Chronic
                                  Obstructive Pulmonary Disease  . . . . . 16--30
             Miroslav Bursa and   
              Lenka Lhotska and   
            Vaclav Chudacek and   
                Jiri Spilka and   
                 Petr Janku and   
                   Martin Huser   Practical Problems and Solutions in
                                  Hospital Information System Data Mining  31--39
            Dominic Girardi and   
       Michael Giretzlehner and   
                Josef Küng   Using Generic Meta-Data-Models for
                                  Clustering Medical Data  . . . . . . . . 40--53
Cátia Santos-Pereira and   
       Alexandre B. Augusto and   
          Manuel E. Correia and   
                   Ana Ferreira   A Mobile Based Authorization Mechanism
                                  for Patient Managed Role Based Access
                                  Control  . . . . . . . . . . . . . . . . 54--68
            Mersini Paschou and   
            Efrosini Sourla and   
         George Basagiannis and   
          Evangelos Sakkopoulos   Care@HOME: a Mobile Monitoring System
                                  for Patient Treatment and Blood Pressure
                                  Tracking . . . . . . . . . . . . . . . . 69--83
           Anna Hristoskova and   
              Veselka Boeva and   
               Elena Tsiporkova   An Integrative Clustering Approach
                                  Combining Particle Swarm Optimization
                                  and Formal Concept Analysis  . . . . . . 84--98
           Francesco Folino and   
                  Clara Pizzuti   Link Prediction Approaches for Disease
                                  Networks . . . . . . . . . . . . . . . . 99--108
          Michelangelo Ceci and   
             Fabio Fumarola and   
         Pietro Hiram Guzzi and   
             Federica Mandreoli   Toward a Semantic Framework for the
                                  Querying, Mining and Visualization of
                                  Cancer Microenvironment Data . . . . . . 109--123
                 Adam Wyner and   
                 Luke Riley and   
           Robert Hoehndorf and   
                  Samuel Croset   Argumentation to Represent and Reason
                                  over Biological Systems  . . . . . . . . 124--138
                    Karol Kozak   The Use of Design Specificity in
                                  Standardized Mean Difference for
                                  Analysis of High throughput RNA
                                  Interference Screens . . . . . . . . . . 139--150
           Catia M. Machado and   
         Francisco M. Couto and   
     Alexandra R. Fernandes and   
                  Susana Santos   Toward a Translational Medicine Approach
                                  for Hypertrophic Cardiomyopathy  . . . . 151--165
          Andreas Holzinger and   
           Reinhold Scherer and   
              Martin Seeber and   
             Johanna Wagner and   
        Gernot Müller-Putz   Computational Sensemaking on Examples of
                                  Knowledge Discovery from Neuroscience
                                  Data: Towards Enhancing Stroke
                                  Rehabilitation . . . . . . . . . . . . . 166--168
          Jan Havlík and   
    Lucie Ku\vcerová and   
        Imrich Kohút and   
        Jan Dvo\vrák and   
        Vratislav Fabián   The Database of the Cardiovascular
                                  System Related Signals . . . . . . . . . 169--170
          Jan Havlík and   
            Ond\vrej Fousek and   
               Miroslav Lo\vzek   Patient Monitoring Using Bioimpedance
                                  Signal . . . . . . . . . . . . . . . . . 171--172
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7452, 2012

        Roland Traunmüller   Knowledge Management in Government: New
                                  Perspectives . . . . . . . . . . . . . . 1--9
              Alexander Prosser   eParticipation --- Did We Deliver What
                                  We Promised? . . . . . . . . . . . . . . 10--18
         Emmanuel Nyakwende and   
                  Ali Al Mazari   Factors Affecting the Development of
                                  e-Government in Saudi Arabia . . . . . . 19--28
        Wichian Chutimaskul and   
                 Suree Funilkul   The Framework for Monitoring the
                                  Development Process and Inspection of
                                  Government Information System and
                                  Technology: a Case Study in Thailand . . 29--43
                La Anh Tuan and   
                  John Debenham   Online Tender Evaluation: VietNam
                                  Government e-Procurement System  . . . . 44--51
        Sergiusz Strykowski and   
           Rafa\l Wojciechowski   Composable Modeling and Execution of
                                  Administrative Procedures  . . . . . . . 52--66
         Igor T. Hawryszkiewycz   A Design Framework for Collaboration in
                                  Systems of Systems . . . . . . . . . . . 67--78
             Chih-Hui Hsiao and   
              Hui-Chih Wang and   
                  Her-Sen Doong   A Study of Factors Influencing
                                  e-Government Service Acceptance
                                  Intention: a Multiple Perspective
                                  Approach . . . . . . . . . . . . . . . . 79--87
            Thomas Zefferer and   
                   Vesna Krnjic   Towards User-Friendly e-Government
                                  Solutions: Usability Evaluation of
                                  Austrian Smart-Card Integration
                                  Techniques . . . . . . . . . . . . . . . 88--102
        Swapnil Shrivastava and   
                 Zia Saquib and   
                Gopinath P. and   
                 Peeyush Chomal   Unique Identity Enabled Service Delivery
                                  through NSDG . . . . . . . . . . . . . . 103--111
           Serenella Carota and   
           Flavio Corradini and   
           Damiano Falcioni and   
          Maria Laura Maggiulli   FedCohesion: Federated Identity
                                  Management in the Marche Region  . . . . 112--124
           Damiano Falcioni and   
              Andrea Polini and   
         Alberto Polzonetti and   
                     Barbara Re   Livelock and Deadlock Detection for PA
                                  Inter-organizational Business Processes  125--139
      Laura González and   
         Raúl Ruggia and   
                 Jorge Abin and   
Guzmán Llambías and   
                Raquel Sosa and   
                   Bruno Rienzi   A Service-Oriented Integration Platform
                                  to Support a Joined-Up E-Government
                                  Approach: The Uruguayan Experience . . . 140--154
José Félix Muñoz and   
               Carlos Bobed and   
         Francisco Serón   Modeling Administrative Procedures to
                                  Improve Information to the Public  . . . 155--169
              John Debenham and   
                  Simeon Simoff   The Co-Creation Machine: Managing
                                  Co-Creative Processes for the Crowd  . . 170--177
         Artur Afonso Sousa and   
               Pedro Agante and   
     Luís Borges Gouveia   A Worked Proposal on eParticipation for
                                  State Wide Elections . . . . . . . . . . 178--190
           Sergey Ablameyko and   
            Nikolai Kalosha and   
          Sergey Bratchenya and   
                   Vitali Lipen   Test Implementation of the ``Guarantor''
                                  Internet Voting System: Design
                                  Principles, Operation, and Approbation   191--201
             Katalin Ternai and   
     Ildikó Szabó   EBEST Platform Supporting SMEs to Manage
                                  Supply Chain and Collaborate . . . . . . 202--215
              Ourania Hatzi and   
            Mara Nikolaidou and   
Panagiotis Katsivelis-Perakis and   
               Valentino Hudhra   Using Social Network Technology to
                                  Provide e-Administration Services as
                                  Collaborative Tasks  . . . . . . . . . . 216--230
                Sangin Park and   
               Yeontai Choi and   
               Dukyun Hwang and   
                     Miyon Paek   Do Different Types of SNS Have Different
                                  Impacts on Participatory Social Capital? 231--241
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7453, 2012

         Tadayuki Matsumura and   
                 Tetsuya Yamada   IT-Cooling Collaborative Control Methods
                                  for Battery-Aware IT-Systems Targeting
                                  India  . . . . . . . . . . . . . . . . . 1--17
               Afef Denguir and   
   François Trousset and   
                 Jacky Montmain   Research for IT Driven Energy Efficiency
                                  Based on a Multidimensional Comfort
                                  Control$^*$  . . . . . . . . . . . . . . 18--32
                 Deb Polson and   
                Cassandra Selin   The ECOS Green Buildings Project: Data
                                  Dramatization, Visualization and
                                  Manipulation . . . . . . . . . . . . . . 33--43
              Hallgeir Lien and   
               Lasse Natvig and   
          Abdullah Al Hasib and   
            Jan Christian Meyer   Case Studies of Multi-core Energy
                                  Efficiency in Task Based Programs  . . . 44--54
      José I. Aliaga and   
             Manuel F. Dolz and   
   Alberto F. Martín and   
                    Rafael Mayo   Leveraging Task-Parallelism in
                                  Energy-Efficient ILU Preconditioners . . 55--63
              Saif ul Islam and   
              Jean-Marc Pierson   Evaluating Energy Consumption in CDN
                                  Servers  . . . . . . . . . . . . . . . . 64--78
   Alexandre Mello Ferreira and   
            Barbara Pernici and   
              Pierluigi Plebani   Green Performance Indicators Aggregation
                                  through Composed Weighting System  . . . 79--93
          Thanh Binh Nguyen and   
              Fabian Wagner and   
               Wolfgang Schoepp   EC4MACS --- An Integrated Assessment
                                  Toolbox of Well-Established Modeling
                                  Tools to Explore the Synergies and
                                  Interactions between Climate Change, Air
                                  Quality and Other Policy Objectives  . . 94--108
            Benjamin Bertin and   
           Marian Scuturici and   
           Jean-Marie Pinon and   
                Emmanuel Risler   Semantic Modelling of Dependency
                                  Relations between Life Cycle Analysis
                                  Processes  . . . . . . . . . . . . . . . 109--124
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . I--X


Lecture Notes in Computer Science
Volume 7454, 2012

           Jos C. M. Baeten and   
                 Bas Luttik and   
               Paul van Tilburg   Turing Meets Milner  . . . . . . . . . . 1--20
              Gordon D. Plotkin   Concurrency and the Algebraic Theory of
                                  Effects  . . . . . . . . . . . . . . . . 21--22
                  Brian Randell   A Turing Enigma  . . . . . . . . . . . . 23--36
                   Peter Sewell   False Concurrency and Strange-but-True
                                  Machines . . . . . . . . . . . . . . . . 37--38
Béatrice Bérard and   
               Serge Haddad and   
           Mathieu Sassolas and   
              Nathalie Sznajder   Concurrent Games on VASS with Inhibition 39--52
      Wojciech Czerwi\'nski and   
               Piotr Hofman and   
               S\lawomir Lasota   Reachability Problem for Weak
                                  Multi-Pushdown Automata  . . . . . . . . 53--68
                 Nengkun Yu and   
                 Mingsheng Ying   Reachability and Termination Analysis of
                                  Concurrent Quantum Programs  . . . . . . 69--83
                   Guy Avni and   
                 Orna Kupferman   Making Weighted Containment Feasible: a
                                  Heuristic Based on Simulation and
                                  Abstraction  . . . . . . . . . . . . . . 84--99
            Sandie Balaguer and   
                 Thomas Chatain   Avoiding Shared Clocks in Networks of
                                  Timed Automata . . . . . . . . . . . . . 100--114
      Krishnendu Chatterjee and   
            Mickael Randour and   
    Jean-François Raskin   Strategy Synthesis for Multi-Dimensional
                                  Quantitative Objectives  . . . . . . . . 115--131
            Emmanuel Filiot and   
        Raffaella Gentilini and   
    Jean-François Raskin   Quantitative Languages Defined by
                                  Functional Automata  . . . . . . . . . . 132--146
           Romain Brenguier and   
         Stefan Göller and   
                    Ocan Sankur   A Comparison of Succinctly Represented
                                  Finite-State Systems . . . . . . . . . . 147--161
                  Antti Valmari   All Linear-Time Congruences for Familiar
                                  Operators Part 2: Infinite LTSs  . . . . 162--176
            Arnaud Da Costa and   
François Laroussinie and   
                 Nicolas Markey   Quantified CTL: Expressiveness and Model
                                  Checking . . . . . . . . . . . . . . . . 177--192
             Fabio Mogavero and   
             Aniello Murano and   
           Giuseppe Perelli and   
                 Moshe Y. Vardi   What Makes Atl* Decidable? A Decidable
                                  Fragment of Strategy Logic . . . . . . . 193--208
              Tzu-Chun Chen and   
                    Kohei Honda   Specifying Stateful Asynchronous
                                  Properties for Distributed Programs  . . 209--224
               Julien Lange and   
                  Emilio Tuosto   Synthesising Choreographies from Local
                                  Session Types  . . . . . . . . . . . . . 225--239
                Fides Aarts and   
          Faranak Heidarian and   
               Frits Vaandrager   A Theory of History Dependent
                                  Abstractions for Learning Interface
                                  Automata . . . . . . . . . . . . . . . . 240--255
             Alexey Gotsman and   
                  Hongseok Yang   Linearizability with Ownership Transfer  256--271
           Romain Demangeon and   
                    Kohei Honda   Nested Protocols in Session Types  . . . 272--286
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7455, 2012

       Thomas Ågotnes and   
             Hans van Ditmarsch   Coalitional Public Announcement Games    1--15
                 Jianye Hao and   
             Songzheng Song and   
                   Yang Liu and   
                    Jun Sun and   
                    Lin Gui and   
              Jin Song Dong and   
                  Ho-fung Leung   Probabilistic Model Checking Multi-agent
                                  Behaviors in Dispersion Games Using
                                  Counter Abstraction  . . . . . . . . . . 16--30
               Koen V. Hindriks   Debugging Is Explaining  . . . . . . . . 31--45
                 Jianye Hao and   
                  Ho-fung Leung   An Efficient Negotiation Protocol to
                                  Achieve Socially Optimal Allocation  . . 46--60
                  Ayman Ghoneim   Reassignment-Based Strategy-Proof
                                  Mechanisms for Interdependent Task
                                  Allocation . . . . . . . . . . . . . . . 61--76
             Yingqian Zhang and   
                   Sicco Verwer   Mechanism for Robust Procurements  . . . 77--91
               Cyril Poulet and   
           Vincent Corruble and   
     Amal El Fallah Seghrouchni   Auction-Based Strategies for the
                                  Open-System Patrolling Task  . . . . . . 92--106
              Gerrit Anders and   
            Florian Siefert and   
 Jan-Philipp Steghöfer and   
                  Wolfgang Reif   A Decentralized Multi-agent Algorithm
                                  for the Set Partitioning Problem . . . . 107--121
                 Dai Hamada and   
             Toshiharu Sugawara   Two-Sided Parameter Learning of Role
                                  Selections for Efficient Team Formation  122--136
           Toshihiro Matsui and   
             Marius Silaghi and   
        Katsutoshi Hirayama and   
               Makoto Yokoo and   
                 Hiroshi Matsuo   Distributed Search Method with Bounded
                                  Cost Vectors on Multiple Objective DCOPs 137--152
Feyza Merve Hafìzo\uglu and   
                     Sandip Sen   Analysis of Opinion Spread through
                                  Migration and Adoption in Agent
                                  Communities  . . . . . . . . . . . . . . 153--167
Bastin Tony Roy Savarimuthu and   
           Lam-Son Lê and   
                   Aditya Ghose   From Green Norms to Policies ---
                                  Combining Bottom-Up and Top-Down
                                  Approaches . . . . . . . . . . . . . . . 168--183
                     Han Yu and   
                 Zhiqi Shen and   
                          Bo An   An Adaptive Witness Selection Method for
                                  Reputation-Based Trust Models  . . . . . 184--198
                Jeremy Pitt and   
               Julia Schaumeier   Provision and Appropriation of
                                  Common-Pool Resources without Full
                                  Disclosure . . . . . . . . . . . . . . . 199--213
               Takayuki Ito and   
               Ryo Kanamori and   
              Jun Takahashi and   
         Ivan Marsa Maestre and   
              Enrique de la Hoz   Effect of Anticipatory Stigmergy on
                                  Decentralized Traffic Congestion Control 214--227
           Viet Xuan Truong and   
            Hiep Xuan Huynh and   
               Minh Ngoc Le and   
                 Alexis Drogoul   Modeling a Surveillance Network Based on
                                  Unit Disk Graph Technique ---
                                  Application for Monitoring the Invasion
                                  of Insects in Mekong Delta Region  . . . 228--242
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7456, 2012

             Andrea Asperti and   
               Wilmer Ricciotti   Formalizing Turing Machines  . . . . . . 1--25
           Ekaterina Fokina and   
                Sy Friedman and   
              André Nies   Equivalence Relations That Are
                                  $\Sigma^0_3$ Complete for Computable
                                  Reducibility . . . . . . . . . . . . . . 26--33
            Laura Kallmeyer and   
                 Rainer Osswald   An Analysis of Directed Motion
                                  Expressions with Lexicalized Tree
                                  Adjoining Grammars and Frame Semantics   34--55
                George Metcalfe   Admissible Rules: From Characterizations
                                  to Applications  . . . . . . . . . . . . 56--69
             Volker Diekert and   
                  Anca Muscholl   On Distributed Monitoring of
                                  Asynchronous Systems . . . . . . . . . . 70--84
             Nicole Schweikardt   On the Expressive Power of Logics with
                                  Invariant Uses of Arithmetic Predicates  85--87
                 Peter Selinger   Logical Methods in Quantum Information
                                  Theory . . . . . . . . . . . . . . . . . 88--88
             Hans van Ditmarsch   Quantifying Notes  . . . . . . . . . . . 89--109
             Sergio Abriola and   
          Santiago Figueira and   
                  Gabriel Senno   Linearizing Bad Sequences: Upper Bounds
                                  for the Product and Majoring Well
                                  Quasi-orders . . . . . . . . . . . . . . 110--126
                Benedikt Ahrens   Initiality for Typed Syntax and
                                  Semantics  . . . . . . . . . . . . . . . 127--141
              Carlos Areces and   
               Raul Fervari and   
             Guillaume Hoffmann   Moving Arrows and Four Model Checking
                                  Results  . . . . . . . . . . . . . . . . 142--153
                Paolo Baldi and   
           Agata Ciabattoni and   
                  Lara Spendier   Standard Completeness for Extensions of
                                  MTL: An Automated Approach . . . . . . . 154--167
           Alexandru Baltag and   
                Bryan Renne and   
                    Sonja Smets   The Logic of Justified Belief Change,
                                  Soft Evidence and Defeasible Knowledge   168--190
         Nick Bezhanishvili and   
              Clemens Kupke and   
             Prakash Panangaden   Minimization via Duality . . . . . . . . 191--205
           Claudio Callejas and   
         João Marcos and   
Benjamín René Callejas Bedregal   On Some Subclasses of the Fodor--Roubens
                                  Fuzzy Bi-implication . . . . . . . . . . 206--215
 Alejandro Díaz-Caro and   
                  Barbara Petit   Linearity in the Non-deterministic
                                  Call-by-Value Setting  . . . . . . . . . 216--231
                 Amin Farjudian   Polynomial-Time Solution of Initial
                                  Value Problems Using Polynomial
                                  Enclosures . . . . . . . . . . . . . . . 232--245
        Willem L. Fouché   Algorithmic Randomness and Ramsey
                                  Properties of Countable Homogeneous
                                  Structures . . . . . . . . . . . . . . . 246--256
                 Sebastian Link   Propositional Reasoning about Saturated
                                  Conditional Probabilistic Independence   257--267
   Márcio M. Ribeiro and   
            Marcelo E. Coniglio   Contracting Logics . . . . . . . . . . . 268--281
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7457, 2012

   AbdulRahman A. Al-Sewari and   
                 Kamal Z. Zamli   Constraints Dependent T-Way Test Suite
                                  Generation Using Harmony Search Strategy 1--11
          Siti Hajar Othman and   
                Ghassan Beydoun   Evaluating Disaster Management Knowledge
                                  Model by Using a Frequency-Based
                                  Selection Technique  . . . . . . . . . . 12--27
                  Fengqi An and   
               Xiongcai Cai and   
                   Arcot Sowmya   Perceptual Evaluation of Automatic
                                  $2.5$D Cartoon Modelling . . . . . . . . 28--42
                Nader Hanna and   
           Deborah Richards and   
            Michael J. Jacobson   Automatic Acquisition of User Models of
                                  Interaction to Evaluate the Usability of
                                  Virtual Environments . . . . . . . . . . 43--57
                  Zhao Chen and   
         Md. Sumon Shahriar and   
                 Byeong Ho Kang   User-Centric Recommendation-Based
                                  Approximate Information Retrieval from
                                  Marine Sensor Data . . . . . . . . . . . 58--72
Ana Ximena Halabi Echeverry and   
               Deborah Richards   Addressing Challenges for Knowledge
                                  Discovery from Data in the Domain of
                                  Seaport Integration  . . . . . . . . . . 73--85
             Chuen Tse Kuah and   
                  Kuan Yew Wong   Data Envelopment Analysis for Evaluating
                                  Knowledge Acquisition and Creation . . . 86--93
                 Dung T. Ho and   
                     Tru H. Cao   A High-Order Hidden Markov Model for
                                  Emotion Detection from Textual Data  . . 94--105
           Norshuhani Zamin and   
                 Alan Oxley and   
           Zainab Abu Bakar and   
              Syed Ahmad Farhan   A Lazy Man's Way to Part-of-Speech
                                  Tagging  . . . . . . . . . . . . . . . . 106--117
            Filippo Galgani and   
               Paul Compton and   
                 Achim Hoffmann   Knowledge Acquisition for Categorization
                                  of Legal Case Reports  . . . . . . . . . 118--132
            Kyohei Ishikawa and   
                  Hayato Ohwada   Extraction of How-to Type
                                  Question-Answering Sentences Using Query
                                  Sets . . . . . . . . . . . . . . . . . . 133--139
            Ahmed Boulemden and   
                   Yamina Tlili   Image Indexing and Retrieval with
                                  Pachinko Allocation Model: Application
                                  on Local and Global Features . . . . . . 140--146
             Andrei Kelarev and   
            Richard Dazeley and   
           Andrew Stranieri and   
              John Yearwood and   
                Herbert Jelinek   Detection of CAN by Ensemble Classifiers
                                  Based on Ripple Down Rules . . . . . . . 147--159
              Myung Hee Kim and   
                   Paul Compton   Improving Open Information Extraction
                                  for Informal Web Documents with
                                  Ripple-Down Rules  . . . . . . . . . . . 160--174
               Yang Sok Kim and   
               Paul Compton and   
                 Byeong Ho Kang   Ripple-Down Rules with Censored
                                  Production Rules . . . . . . . . . . . . 175--187
            Omaru Maruatona and   
              Peter Vamplew and   
                Richard Dazeley   RM and RDM, a Preliminary Evaluation of
                                  Two Prudent RDR Techniques . . . . . . . 188--194
                  Karen Ang and   
                      Ethel Ong   Planning Children's Stories Using Agent
                                  Models . . . . . . . . . . . . . . . . . 195--208
                Nader Hanna and   
               Deborah Richards   A Framework for a Multi-agent
                                  Collaborative Virtual Learning
                                  Environment (MACVILLE) Based on Activity
                                  Theory . . . . . . . . . . . . . . . . . 209--220
           Shahrinaz Ismail and   
         Mohd Sharifuddin Ahmad   Emergence of Personal Knowledge
                                  Management Processes within Multi-agent
                                  Roles  . . . . . . . . . . . . . . . . . 221--228
                 Amara Atif and   
                Peter Busch and   
               Deborah Richards   Towards an Ontology-Based Approach to
                                  Knowledge Management of Graduate
                                  Attributes in Higher Education . . . . . 229--243
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7458, 2012

                 Hiroaki Kitano   Systems Biology Powered by Artificial
                                  Intelligence . . . . . . . . . . . . . . 1--1
                Francesca Rossi   Preference Reasoning and Aggregation:
                                  Between AI and Social Choice . . . . . . 2--2
       Shantanu Chakraborty and   
               Takayuki Ito and   
                Tomonobu Senjyu   Economical Operation of Thermal
                                  Generating Units Integrated with Smart
                                  Houses . . . . . . . . . . . . . . . . . 3--14
              Mahsa Chitsaz and   
                 Kewen Wang and   
        Michael Blumenstein and   
                      Guilin Qi   Concept Learning for ${\cal EL}^{++}$ by
                                  Refinement and Reinforcement . . . . . . 15--26
              Maike Erdmann and   
            Duc Dung Nguyen and   
           Tomoya Takeyoshi and   
                Gen Hattori and   
             Kazunori Matsumoto   Hierarchical Training of Multiple SVMs
                                  for Personalized Web Filtering . . . . . 27--39
            Filippo Galgani and   
               Paul Compton and   
                 Achim Hoffmann   Citation Based Summarisation of Legal
                                  Texts  . . . . . . . . . . . . . . . . . 40--52
                Gaopeng Gou and   
                   Di Huang and   
                   Yunhong Wang   A Novel Video Face Clustering Algorithm
                                  Based on Divide and Conquer Strategy . . 53--63
                Gaopeng Gou and   
                   Di Huang and   
                   Yunhong Wang   A Hybrid Local Feature for Face
                                  Recognition  . . . . . . . . . . . . . . 64--75
               Miha Gr\vcar and   
             Vid Podpe\vcan and   
               Borut Sluban and   
                 Igor Mozeti\vc   Ontology Querying Support in Semantic
                                  Annotation Process . . . . . . . . . . . 76--87
                 Jianye Hao and   
                  Ho-fung Leung   Learning to Achieve Socially Optimal
                                  Solutions in General-Sum Games . . . . . 88--99
                 Jianye Hao and   
                  Ho-fung Leung   Incorporating Fairness into Agent
                                  Interactions Modeled as Two-Player
                                  Normal-Form Games  . . . . . . . . . . . 100--111
               Jijian Huang and   
                    Hui Xue and   
                    Yuqing Zhai   Semi-Supervised Discriminatively
                                  Regularized Classifier with Pairwise
                                  Constraints  . . . . . . . . . . . . . . 112--123
                Jihye Hwang and   
              Kyung-tai Kim and   
                     Eun Yi Kim   Outdoor Situation Recognition Using
                                  Support Vector Machine for the Blind and
                                  the Visually Impaired  . . . . . . . . . 124--132
           Akihiro Inokuchi and   
              Ayumu Yamaoka and   
             Takashi Washio and   
             Yuji Matsumoto and   
               Masayuki Asahara   Mining Rules for Rewriting States in a
                                  Transition-Based Dependency Parser . . . 133--145
               Takayuki Ito and   
               Ryo Kanamori and   
              Jun Takahashi and   
  Iván Marsa Maestre and   
              Enrique de la Hoz   The Comparison of Stigmergy Strategies
                                  for Decentralized Traffic Congestion
                                  Control: Preliminary Results . . . . . . 146--156
             Yusuke Iwasawa and   
             Ikuko Eguchi Yairi   Life-Logging of Wheelchair Driving on
                                  Web Maps for Visualizing Potential
                                  Accidents and Incidents  . . . . . . . . 157--169
             Hamid A. Jalab and   
               Rabha W. Ibrahim   Texture Feature Extraction Based on
                                  Fractional Mask Convolution with Cesáro
                                  Means for Content-Based Image Retrieval  170--179
                  Yifan Jin and   
                 Kewen Wang and   
                       Lian Wen   Possibilistic Reasoning in Multi-Context
                                  Systems: Preliminary Report  . . . . . . 180--193
               Kye-Sung Kim and   
              Su-Jeong Choi and   
             Seong-Bae Park and   
                    Sang-Jo Lee   A Two-Step Zero Pronoun Resolution by
                                  Reducing Candidate Cardinality . . . . . 194--205
               Yang Sok Kim and   
           Alfred Krzywicki and   
               Wayne Wobcke and   
           Ashesh Mahidadia and   
                   Paul Compton   Hybrid Techniques to Address Cold Start
                                  Problems for People to People
                                  Recommendation in Social Networks  . . . 206--217
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7459, 2012

              Elli Fragkaki and   
                 Lujo Bauer and   
                  Limin Jia and   
                   David Swasey   Modeling and Enhancing Android's
                                  Permission System  . . . . . . . . . . . 1--18
               James Kelley and   
           Roberto Tamassia and   
            Nikos Triandopoulos   Hardening Access Control and Data
                                  Protection in GFS-like File Systems  . . 19--36
          Jonathan Crussell and   
               Clint Gibler and   
                       Hao Chen   Attack of the Clones: Detecting Cloned
                                  Applications on Android Markets  . . . . 37--54
            Arnar Birgisson and   
               Daniel Hedin and   
               Andrei Sabelfeld   Boosting the Permissiveness of Dynamic
                                  Information-Flow Tracking by Testing . . 55--72
             Serdar Erbatur and   
           Santiago Escobar and   
               Deepak Kapur and   
               Zhiqiang Liu and   
              Christopher Lynch   Effective Symbolic Protocol Analysis via
                                  Equational Irreducibility Conditions . . 73--90
                Henning Schnoor   Deciding Epistemic and Strategic
                                  Properties of Cryptographic Protocols    91--108
            Arif Akram Khan and   
              Philip W. L. Fong   Satisfiability and Feasibility in a
                                  Relationship-Based Workflow
                                  Authorization Model  . . . . . . . . . . 109--126
      Sebastian Mödersheim   Deciding Security for a Fragment of
                                  ASLan  . . . . . . . . . . . . . . . . . 127--144
      Massimiliano Albanese and   
   Alessandra De Benedictis and   
             Sushil Jajodia and   
                Paulo Shakarian   A Probabilistic Framework for
                                  Localization of Attackers in MANETs  . . 145--162
                 Ruben Rios and   
              Jorge Cuellar and   
                   Javier Lopez   Robust Probabilistic Fake Packet
                                  Injection for Receiver-Location Privacy
                                  in WSN . . . . . . . . . . . . . . . . . 163--180
               Adam J. Aviv and   
                Micah Sherr and   
                 Matt Blaze and   
              Jonathan M. Smith   Privacy-Aware Message Exchanges for
                                  Geographically Routed Human Movement
                                  Networks . . . . . . . . . . . . . . . . 181--198
              Italo Dacosta and   
            Mustaque Ahamad and   
                Patrick Traynor   Trust No One Else: Detecting MITM
                                  Attacks against SSL/TLS without
                                  Third-Parties  . . . . . . . . . . . . . 199--216
                 Ralph Holz and   
           Thomas Riedmaier and   
           Nils Kammenhuber and   
                    Georg Carle   X.509 Forensics: Detecting and
                                  Localising the SSL/TLS Men-in-the-Middle 217--234
                Simon Eberz and   
          Martin Strohmeier and   
           Matthias Wilhelm and   
                Ivan Martinovic   A Practical Man-In-The-Middle Attack on
                                  Signal-Based Key Generation Protocols    235--252
         Ahmad-Reza Sadeghi and   
             Steffen Schulz and   
             Vijay Varadharajan   The Silence of the LANs: Efficient
                                  Leakage Resilience for IPsec VPNs  . . . 253--270
              Amir Herzberg and   
                   Haya Shulman   Security of Patched DNS  . . . . . . . . 271--288
                   Qijun Gu and   
                 Kyle Jones and   
                 Wanyu Zang and   
                    Meng Yu and   
                       Peng Liu   Revealing Abuses of Channel Assignment
                                  Protocols in Multi-channel Wireless
                                  Networks: An Investigation Logic
                                  Approach . . . . . . . . . . . . . . . . 289--306
          Mishari Almishari and   
                    Gene Tsudik   Exploring Linkability of User Reviews    307--324
               Naipeng Dong and   
                Hugo Jonker and   
                       Jun Pang   Formal Analysis of Privacy in an eHealth
                                  Protocol . . . . . . . . . . . . . . . . 325--342
                 Jinkyu Koo and   
                Xiaojun Lin and   
                 Saurabh Bagchi   PRIVATUS: Wallet-Friendly Privacy
                                  Protection for Smart Meters  . . . . . . 343--360
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7460, 2012

              Gilles Barthe and   
   Benjamin Grégoire and   
Santiago Zanella Béguelin   Computer-Aided Cryptographic Proofs  . . 1--2
                 Dino Distefano   A Voyage to the Deep-Heap  . . . . . . . 3--3
          Shriram Krishnamurthi   Semantics and Analyses for JavaScript
                                  and the Web  . . . . . . . . . . . . . . 4--4
            Jonathan K. Lee and   
              Jens Palsberg and   
             Rupak Majumdar and   
                      Hong Hong   Efficient May Happen in Parallel
                                  Analysis for Async-Finish Parallelism    5--23
              Eric Goubault and   
               Sylvie Putot and   
          Franck Védrine   Modular Static Analysis with Zonotopes   24--40
              Jacob M. Howe and   
                      Andy King   Polyhedral Analysis Using Parametric
                                  Objectives . . . . . . . . . . . . . . . 41--57
              David Cachera and   
              Thomas Jensen and   
               Arnaud Jobin and   
               Florent Kirchner   Inference of Polynomial Invariants for
                                  Imperative Programs: a Farewell to
                                  Gröbner Bases . . . . . . . . . . . . . . 58--74
          Arnault Ioualalen and   
                Matthieu Martel   A New Abstract Domain for the
                                  Representation of Mathematically
                                  Equivalent Expressions . . . . . . . . . 75--93
                  Tie Cheng and   
                   Xavier Rival   An Abstract Domain to Infer Types over
                                  Zones in Spreadsheets  . . . . . . . . . 94--110
              Aditya Thakur and   
                 Matt Elder and   
                    Thomas Reps   Bilateral Algorithms for Symbolic
                                  Abstraction  . . . . . . . . . . . . . . 111--128
         Roberto Giacobazzi and   
             Isabella Mastroeni   Making Abstract Interpretation
                                  Incomplete: Modeling the Potency of
                                  Obfuscation  . . . . . . . . . . . . . . 129--145
          Alejandro Sanchez and   
    Sriram Sankaranarayanan and   
César Sánchez and   
             Bor-Yuh Evan Chang   Invariant Generation for Parametrized
                                  Systems Using Self-reflection  . . . . . 146--163
        Parosh Aziz Abdulla and   
        Mohamed Faouzi Atig and   
               Yu-Fang Chen and   
           Carl Leonardsson and   
                   Ahmed Rezine   Automatic Fence Insertion in Integer
                                  Programs via Predicate Abstraction . . . 164--180
              Peter Calvert and   
                   Alan Mycroft   Control Flow Analysis for the Join
                                  Calculus . . . . . . . . . . . . . . . . 181--197
          Nicolas Halbwachs and   
                   Julien Henry   When the Decreasing Sequence Fails . . . 198--213
          Sebastian Biallas and   
           Jörg Brauer and   
                  Andy King and   
              Stefan Kowalewski   Loop Leaping with Closures . . . . . . . 214--230
               Joxan Jaffar and   
      Vijayaraghavan Murali and   
             Jorge A. Navas and   
              Andrew E. Santosa   Path-Sensitive Backward Slicing  . . . . 231--247
     Dimitra Giannakopoulou and   
       Zvonimir Rakamari\'c and   
               Vishwanath Raman   Symbolic Learning of Component
                                  Interfaces . . . . . . . . . . . . . . . 248--264
            Uday P. Khedker and   
               Alan Mycroft and   
           Prashant Singh Rawat   Liveness-Based Pointer Analysis  . . . . 265--282
               Julien Henry and   
             David Monniaux and   
                   Matthieu Moy   Succinct Representations for Abstract
                                  Interpretation . . . . . . . . . . . . . 283--299
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7461, 2012

                  Oliver Kramer   A Particle Swarm Embedding Algorithm for
                                  Nonlinear Dimensionality Reduction . . . 1--12
           Khalid M. Salama and   
                Alex A. Freitas   ABC-Miner: An Ant-Based Bayesian
                                  Classification Algorithm . . . . . . . . 13--24
              Mieke Massink and   
          Manuele Brambilla and   
              Diego Latella and   
               Marco Dorigo and   
                Mauro Birattari   Analysing Robot Swarm Decision-Making
                                  with Bio-PEPA  . . . . . . . . . . . . . 25--36
     Leonardo C. T. Bezerra and   
Manuel López-Ibáñez and   
            Thomas Stützle   Automatic Generation of Multi-objective
                                  ACO Algorithms for the Bi-objective
                                  Knapsack . . . . . . . . . . . . . . . . 37--48
   Mohammad Majid al-Rifaie and   
                  Tim Blackwell   Bare Bones Particle Swarms with Jumps    49--60
                Sergi Mateo and   
             Christian Blum and   
                 Pascal Fua and   
            Engin Türetgen   Hybrid Algorithms for the Minimum-Weight
                                  Rooted Arborescence Problem  . . . . . . 61--72
            Matthew Medland and   
       Fernando E. B. Otero and   
                Alex A. Freitas   Improving the cAnt-Miner$_{PB}$
                                  Classification Algorithm . . . . . . . . 73--84
                Jorge Gomes and   
               Paulo Urbano and   
       Anders Lyhne Christensen   Introducing Novelty Search in
                                  Evolutionary Swarm Robotics  . . . . . . 85--96
               Adiel Ismail and   
         Andries P. Engelbrecht   Measuring Diversity in the Cooperative
                                  Particle Swarm Optimizer . . . . . . . . 97--108
              Giovanni Pini and   
              Arne Brutschy and   
        Gianpiero Francesca and   
               Marco Dorigo and   
                Mauro Birattari   Multi-armed Bandit Formulation of the
                                  Task Partitioning Problem in Swarm
                                  Robotics . . . . . . . . . . . . . . . . 109--120
          Barend J. Leonard and   
         Andries P. Engelbrecht   Scalability Study of Particle Swarm
                                  Optimizers in Dynamic Environments . . . 121--132
             Lachlan Murray and   
                 Jon Timmis and   
                   Andy Tyrrell   Self-reconfigurable Modular e-pucks  . . 133--144
            James Worcester and   
                   M. Ani Hsieh   Task Partitioning via Ant Colony
                                  Optimization for Distributed Assembly    145--155
               Adiel Ismail and   
         Andries P. Engelbrecht   The Self-adaptive Comprehensive Learning
                                  Particle Swarm Optimizer . . . . . . . . 156--167
                   Heiko Hamann   Towards Swarm Calculus: Universal
                                  Properties of Swarm Performance and
                                  Collective Decisions . . . . . . . . . . 168--179
           Yannis Marinakis and   
             Magdalene Marinaki   A Hybrid Particle Swarm Optimization
                                  Algorithm for the Open Vehicle Routing
                                  Problem  . . . . . . . . . . . . . . . . 180--187
       Filipe V. Nepomuceno and   
         Andries P. Engelbrecht   A Self-adaptive Heterogeneous PSO
                                  Inspired by Ants . . . . . . . . . . . . 188--195
                 Yotam Elor and   
           Alfred M. Bruckstein   A ``Thermodynamic'' Approach to
                                  Multi-robot Cooperative Localization
                                  with Noisy Sensors . . . . . . . . . . . 196--203
                Dong Do Duc and   
                Huy Q. Dinh and   
             Thanh Hai Dang and   
               Kris Laukens and   
                Xuan Huan Hoang   AcoSeeD: An Ant Colony Optimization for
                                  Finding Optimal Spaced Seeds in
                                  Biological Sequence Search . . . . . . . 204--211
                   Rui Fang and   
                Zequn Huang and   
                Louis Rossi and   
               Chien-Chung Shen   Analysis of Ant-Based Routing with
                                  Wireless Medium Access Control . . . . . 212--219
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7462, 2012

         Abhinav Srivastava and   
               Himanshu Raj and   
            Jonathon Giffin and   
                   Paul England   Trusted VM Snapshots in Untrusted Cloud
                                  Infrastructures  . . . . . . . . . . . . 1--21
             Martim Carbone and   
            Matthew Conover and   
             Bruce Montague and   
                      Wenke Lee   Secure and Robust Monitoring of Virtual
                                  Machines through Guest-Assisted
                                  Introspection  . . . . . . . . . . . . . 22--41
             Shengzhi Zhang and   
                       Peng Liu   Assessing the Trustworthiness of Drivers 42--63
           Olivier Thonnard and   
                Leyla Bilge and   
             Gavin O'Gorman and   
        Seán Kiernan and   
                     Martin Lee   Industrial Espionage and Targeted
                                  Attacks: Understanding the
                                  Characteristics of an Escalating Threat  64--85
        Victor van der Veen and   
         Nitish dutt-Sharma and   
          Lorenzo Cavallaro and   
                    Herbert Bos   Memory Errors: The Past, the Present,
                                  and the Future . . . . . . . . . . . . . 86--106
               Dongkyun Ahn and   
                    Gyungho Lee   A Memory Access Validation Scheme
                                  against Payload Injection Attacks  . . . 107--126
            Jennifer Mankin and   
                    David Kaeli   Dione: a Flexible Disk Monitoring and
                                  Analysis Framework . . . . . . . . . . . 127--146
                     Zhi Xu and   
               Hungyuan Hsu and   
                   Xin Chen and   
                 Sencun Zhu and   
                  Ali R. Hurson   AK-PPM: An Authenticated Packet
                                  Attribution Scheme for Mobile Ad Hoc
                                  Networks . . . . . . . . . . . . . . . . 147--168
            Tobias Lauinger and   
                Engin Kirda and   
               Pietro Michiardi   Paying for Piracy? An Analysis of
                                  One-Click Hosters' Controversial Reward
                                  Schemes  . . . . . . . . . . . . . . . . 169--189
             Samuel Marchal and   
Jérôme François and   
                 Radu State and   
                   Thomas Engel   Proactive Discovery of Phishing Related
                                  Domain Names . . . . . . . . . . . . . . 190--209
            Daisuke Mashima and   
      Alvaro A. Cárdenas   Evaluating Electricity Theft Detectors
                                  in Smart Grid Networks . . . . . . . . . 210--229
              Jialong Zhang and   
                  Chao Yang and   
                 Zhaoyan Xu and   
                      Guofei Gu   PoisonAmplifier: a Guided Approach of
                                  Discovering Compromised Websites through
                                  Reversing Search Poisoning Attacks . . . 230--253
           Sebastian Lekies and   
           Nick Nikiforakis and   
            Walter Tighzert and   
             Frank Piessens and   
                   Martin Johns   DEMACRO: Defense against Malicious
                                  Cross-Domain Requests  . . . . . . . . . 254--273
        Timon Van Overveldt and   
        Christopher Kruegel and   
                 Giovanni Vigna   FlashDetect: ActionScript 3 Malware
                                  Detection  . . . . . . . . . . . . . . . 274--293
                    Jie Chu and   
                   Zihui Ge and   
              Richard Huber and   
                    Ping Ji and   
             Jennifer Yates and   
                   Yung-Chao Yu   ALERT-ID: Analyze Logs of the Network
                                  Element in Real Time for Intrusion
                                  Detection  . . . . . . . . . . . . . . . 294--313
             Bernhard Amann and   
               Robin Sommer and   
             Aashish Sharma and   
                      Seth Hall   A Lone Wolf No More: Supporting Network
                                  Intrusion Detection with Real-Time
                                  Intelligence . . . . . . . . . . . . . . 314--333
         Victor C. Valgenti and   
             Jatin Chhugani and   
                    Yan Sun and   
            Nadathur Satish and   
                Min Sik Kim and   
                   Changkyu Kim   GPP-Grep: High-Speed Regular Expression
                                  Processing Engine on General Purpose
                                  Processors . . . . . . . . . . . . . . . 334--353
    Dina Had\vziosmanovi\'c and   
          Lorenzo Simionato and   
            Damiano Bolzoni and   
               Emmanuele Zambon   $N$-Gram against the Machine: On the
                                  Feasibility of the $N$-Gram Network
                                  Analysis for Binary Protocols  . . . . . 354--373
               Shah Mahmood and   
                    Yvo Desmedt   Online Social Networks, a Criminals
                                  Multipurpose Toolbox (Poster Abstract)   374--375
                  Cui Xiang and   
                Shi Jinqiao and   
                  Liao Peng and   
                     Liu Chaoge   The Triple-Channel Model: Toward Robust
                                  and Efficient Advanced Botnets (Poster
                                  Abstract)  . . . . . . . . . . . . . . . 376--377
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7463, 2012

              Alper Aydemir and   
        Erik Järleberg and   
            Samuel Prentice and   
                Patric Jensfelt   Predicting What Lies Ahead in the
                                  Topology of Indoor Environments  . . . . 1--16
        Zoltan-Csaba Marton and   
     Ferenc Balint-Benczedi and   
                 Florian Seidel   Object Categorization in Clutter Using
                                  Additive Features and Hashing of
                                  Part-Graph Descriptors . . . . . . . . . 17--33
            Richard Bormann and   
                Jan Fischer and   
             Georg Arbeiter and   
                 Alexander Verl   Efficient Object Categorization with the
                                  Surface-Approximation Polynomials
                                  Descriptor . . . . . . . . . . . . . . . 34--53
               Nikos Mitsou and   
           Roderick de Nijs and   
                 David Lenz and   
            Johannes Frimberger   Online Semantic Mapping of Urban
                                  Environments . . . . . . . . . . . . . . 54--73
             Torsten Fiolka and   
    Jörg Stückler and   
           Dominik A. Klein and   
                    Dirk Schulz   SURE: Surface Entropy for Distinctive
                                  $3$D Features  . . . . . . . . . . . . . 74--93
        Paloma de la Puente and   
                   Andrea Censi   Dense Map Inference with User-Defined
                                  Priors: From Priorlets to Scan
                                  Eigenvariations  . . . . . . . . . . . . 94--113
             Georg Arbeiter and   
            Richard Bormann and   
                Jan Fischer and   
             Martin Hägele   Towards Geometric Mapping for
                                  Semi-autonomous Mobile Robots  . . . . . 114--127
        Christoph Hertzberg and   
         René Wagner and   
                      Udo Frese   Tutorial on Quick and Easy Model Fitting
                                  Using the SLoM Framework . . . . . . . . 128--142
             Bernhard E. Riecke   Are Left-Right Hemisphere Errors in
                                  Point-to-Origin Tasks in VR Caused by
                                  Failure to Incorporate Heading Changes?  143--162
        Nicholas A. Giudice and   
                    Hengshan Li   The Effects of Visual Granularity on
                                  Indoor Spatial Learning Assisted by
                                  Mobile $3$D Information Displays . . . . 163--172
           Stefanie Pietsch and   
                   Petra Jansen   The Relationship between Coordination
                                  Skill and Mental Rotation Ability  . . . 173--181
              Alexia Galati and   
           Marios N. Avraamides   Collaborating in Spatial Tasks: Partners
                                  Adapt the Perspective of Their
                                  Descriptions, Coordination Strategies,
                                  and Memory Representations . . . . . . . 182--195
            Linsey A. Smith and   
                  Dedre Gentner   Using Spatial Analogy to Facilitate
                                  Graph Learning . . . . . . . . . . . . . 196--209
              Eva Neidhardt and   
                   Michael Popp   Activity Effects on Path Integration
                                  Tasks for Children in Different
                                  Environments . . . . . . . . . . . . . . 210--219
            Sarah Neuburger and   
                Vera Heuser and   
               Petra Jansen and   
           Claudia Quaiser-Pohl   Influence of Rotational Axis and
                                  Gender-Stereotypical Nature of Rotation
                                  Stimuli on the Mental-Rotation
                                  Performance of Male and Female Fifth
                                  Graders  . . . . . . . . . . . . . . . . 220--229
            Sander Lestrade and   
              Nina Reshöft   Towards a Revision of the Typology of
                                  Motion Verbs . . . . . . . . . . . . . . 230--241
          Alexander Klippel and   
               Jinlong Yang and   
   Jan Oliver Wallgrün and   
                    Frank Dylla   Assessing Similarities of Qualitative
                                  Spatio-temporal Relations  . . . . . . . 242--261
          Chiara Meneghetti and   
        Francesca Pazzaglia and   
                Rossana De Beni   The Mental Representation Derived from
                                  Spatial Descriptions is North-Up
                                  Oriented: The Role of Visuo-spatial
                                  Abilities  . . . . . . . . . . . . . . . 262--278
             Thora Tenbrink and   
                    Marco Ragni   Linguistic Principles for Spatial
                                  Relational Reasoning . . . . . . . . . . 279--298
               Kris Lohmann and   
              Christopher Habel   Extended Verbal Assistance Facilitates
                                  Knowledge Acquisition of Virtual Tactile
                                  Maps . . . . . . . . . . . . . . . . . . 299--318
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7464, 2012

              Georg Gottlob and   
                Marco Manna and   
                  Michael Morak   On the Complexity of Ontological
                                  Reasoning under Disjunctive Existential
                                  Rules  . . . . . . . . . . . . . . . . . 1--18
          Christian Komusiewicz   New Races in Parameterized Algorithmics  19--30
               Antonino Salibra   Scott Is Always Simple . . . . . . . . . 31--45
             Nicole Schweikardt   A Toolkit for Proving Limitations of the
                                  Expressive Power of Logics . . . . . . . 46--47
                   Esko Ukkonen   How to Reconstruct a Genome  . . . . . . 48--48
               Igor Walukiewicz   Simple Models for Recursive Schemes  . . 49--60
           Gerhard J. Woeginger   Transportation under Nasty Side
                                  Constraints  . . . . . . . . . . . . . . 61--62
             Mihalis Yannakakis   Computation of Least Fixed Points  . . . 63--63
              Lauri Ahlroth and   
                  Pekka Orponen   Unordered Constraint Satisfaction Games  64--75
             Tatsuya Akutsu and   
                Takeyuki Tamura   A Polynomial-Time Algorithm for
                                  Computing the Maximum Common Subgraph of
                                  Outerplanar Graphs of Bounded Degree . . 76--87
              Eric Allender and   
              Harry Buhrman and   
                  Luke Friedman   Reductions to the Set of Random Strings:
                                  The Resource-Bounded Case  . . . . . . . 88--99
            Vikraman Arvind and   
           Johannes Köbler   Approximate Graph Isomorphism  . . . . . 100--111
            Vikraman Arvind and   
            Partha Mukhopadhyay   Near-Optimal Expanding Generator Sets
                                  for Solvable Permutation Groups  . . . . 112--123
              Eugene Asarin and   
                 Nicolas Basset   Generating Functions of Timed Languages  124--135
            Cristina Bazgan and   
                  Morgan Chopin   The Robust Set Problem: Parameterized
                                  Complexity and Approximation . . . . . . 136--147
               Paul C. Bell and   
            Mika Hirvensalo and   
                   Igor Potapov   Mortality for $2 \times 2$ Matrices Is
                                  NP-Hard  . . . . . . . . . . . . . . . . 148--159
          Dietmar Berwanger and   
                 \Lukasz Kaiser   Solving Counter Parity Games . . . . . . 160--171
              Therese Biedl and   
                 Peter Floderus   Drawing Planar Graphs on Points Inside a
                                  Polygon  . . . . . . . . . . . . . . . . 172--183
              Davide Bil\`o and   
                      Anna Zych   New Advances in Reoptimizing the Minimum
                                  Steiner Tree Problem . . . . . . . . . . 184--197
         Markus Bläser and   
                   Bodo Manthey   Smoothed Complexity Theory . . . . . . . 198--209
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7465, 2012

           Kristian Beckers and   
              Stefan Eicker and   
    Stephan Faßbender and   
             Maritta Heisel and   
                 Holger Schmidt   Ontology-Based Identification of
                                  Research Gaps and Immature Research
                                  Areas  . . . . . . . . . . . . . . . . . 1--16
               Gerald Bader and   
            Amin Anjomshoaa and   
                    A. Min Tjoa   A Context-Aware Mashup Integration
                                  Guideline for Enterprise 2.0 . . . . . . 17--30
    Mostafa Kiani Deh Kiani and   
            Barat Ghobadian and   
             Fathollah Ommi and   
            Gholamhassan Najafi   Artificial Neural Networks Approach for
                                  the Prediction of Thermal Balance of SI
                                  Engine Using Ethanol-Gasoline Blends . . 31--43
Jesús M. Almendros-Jiménez   Validation of XML Documents with SWRL    44--57
      Theresia Gschwandtner and   
      Johannes Gärtner and   
            Wolfgang Aigner and   
                  Silvia Miksch   A Taxonomy of Dirty Time-Oriented Data   58--72
                Marius Ebel and   
                   Martin Hulin   Combining Relational and Semi-structured
                                  Databases for an Inquiry Application . . 73--84
            Martin Gilje Jaatun   Hunting for Aardvarks: Can Software
                                  Security Be Measured?  . . . . . . . . . 85--92
           Kristian Beckers and   
                 Maritta Heisel   A Foundation for Requirements Analysis
                                  of Privacy Preserving Software . . . . . 93--107
          Andreas Holzinger and   
             Evgenia Popova and   
           Bernhard Peischl and   
                 Martina Ziefle   On Complexity Reduction of User
                                  Interfaces for Safety-Critical Systems   108--122
        Martin Gilje Jaatun and   
             Karin Bernsmed and   
                 Astrid Undheim   Security SLAs --- An Idea Whose Time Has
                                  Come?  . . . . . . . . . . . . . . . . . 123--130
      Aneta Poniszewska-Maranda   UML Representation of Extended
                                  Role-Based Access Control Model with the
                                  Use of Usage Control Concept . . . . . . 131--145
           Eckehard Hermann and   
             Udo Litschauer and   
          Jürgen Fuß   A Formal Equivalence Classes Based
                                  Method for Security Policy Conformance
                                  Checking . . . . . . . . . . . . . . . . 146--160
           Tanja A\vzderska and   
        Borka Jerman Bla\vzi\vc   Trust as an Organismic Trait of
                                  E-Commerce Systems . . . . . . . . . . . 161--175
          Andreas Holzinger and   
             Peter Treitler and   
                 Wolfgang Slany   Making Apps Useable on Multiple
                                  Different Mobile Platforms: On
                                  Interoperability for Business
                                  Application Development on Smartphones   176--189
            Mersini Paschou and   
      Evangelos Sakkopoulos and   
            Efrosini Sourla and   
          Athanasios Tsakalidis   Enhancing Business APPification Using
                                  SMS Text Messages: Metrics, Strategies
                                  and Alternatives . . . . . . . . . . . . 190--202
          Daniele Montanari and   
            Piera Laura Puglisi   Near Duplicate Document Detection for
                                  Large Information Flows  . . . . . . . . 203--217
                  Pedro Furtado   TinyStream Sensors . . . . . . . . . . . 218--232
               Hiroshi Sato and   
           Hisashi Kurasawa and   
               Takeru Inoue and   
          Motonori Nakamura and   
               Hajime Matsumura   Distributed Sampling Storage for
                                  Statistical Analysis of Massive Sensor
                                  Data . . . . . . . . . . . . . . . . . . 233--243
            Rachid Aknouche and   
               Ounas Asfari and   
            Fadila Bentayeb and   
                  Omar Boussaid   Integrating Query Context and User
                                  Context in an Information Retrieval
                                  Model Based on Expanded Language
                                  Modeling . . . . . . . . . . . . . . . . 244--258
                   Guang-Ho Cha   Indexing and Search for Fast Music
                                  Identification . . . . . . . . . . . . . 259--271
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7466, 2012

           Klaus-Dieter Althoff   Case-Based Reasoning and Expert Systems  1--1
                    Yolanda Gil   Reproducibility and Efficiency of
                                  Scientific Data Analysis: Scientific
                                  Workflows and Case-Based Reasoning . . . 2--2
         Mobyen Uddin Ahmed and   
                     Peter Funk   A Computer Aided System for
                                  Post-operative Pain Treatment Combining
                                  Knowledge Discovery and Case-Based
                                  Reasoning  . . . . . . . . . . . . . . . 3--16
               Kerstin Bach and   
           Klaus-Dieter Althoff   Developing Case-Based Reasoning
                                  Applications Using myCBR 3 . . . . . . . 17--31
            Alexandra Coman and   
Héctor Muñoz-Avila   Diverse Plan Generation by Plan
                                  Adaptation and by First-Principles
                                  Planning: a Comparative Study  . . . . . 32--46
         Sebastian Dieterle and   
                 Ralph Bergmann   Case-Based Appraisal of Internet Domains 47--61
                Ruihai Dong and   
                  Markus Schaal   Harnessing the Experience Web to Support
                                  User-Generated Product Reviews . . . . . 62--76
       Valmi Dufour-Lussier and   
                Florence Le Ber   Adapting Spatial and Temporal Cases  . . 77--91
 Gonzalo Flórez-Puga and   
Guillermo Jiménez-Díaz   eCo: Managing a Library of Reusable
                                  Behaviours . . . . . . . . . . . . . . . 92--106
             Odd Erik Gundersen   Toward Measuring the Similarity of
                                  Complex Event Sequences in Real-Time . . 107--121
         Mario Gómez and   
                    Enric Plaza   Case-Based Project Scheduling  . . . . . 122--136
             Julien Henriet and   
           Pierre-Emmanuel Leni   Adapting Numerical Representations of
                                  Lung Contours Using Case-Based Reasoning
                                  and Artificial Neural Networks . . . . . 137--151
               Barry Hurley and   
               Barry O'Sullivan   Adaptation in a CBR-Based Solver
                                  Portfolio for the Satisfiability Problem 152--166
           Rupa Jagannathan and   
                 Sanja Petrovic   A Local Rule-Based Attribute Weighting
                                  Scheme for a Case-Based Reasoning System
                                  for Radiotherapy Treatment Planning  . . 167--181
                Ulit Jaidee and   
Héctor Muñoz-Avila   Learning and Reusing Goal-Specific
                                  Policies for Goal-Driven Autonomy  . . . 182--195
               Vahid Jalali and   
                    David Leake   Custom Accessibility-Based CCBR Question
                                  Selection by Ongoing User Classification 196--210
                Debarun Kar and   
             Sutanu Chakraborti   Feature Weighting and Confidence Based
                                  Prediction for Case Based Reasoning
                                  Systems  . . . . . . . . . . . . . . . . 211--225
             Sergio Manzano and   
 Santiago Ontañón   A Case-Based Approach to Mutual
                                  Adaptation of Taxonomic Ontologies . . . 226--240
                 David McSherry   A Lazy Learning Approach to Explaining
                                  Case-Based Reasoning Solutions . . . . . 241--254
               Mirjam Minor and   
             Mohd. Siblee Islam   Confidence in Workflow Adaptation  . . . 255--268
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7467, 2012

     Jean-Paul A. Barth\`es and   
                 Alistair Jones   Ambiguity in Multimodal Interaction with
                                  Multi-touch Multi-user Graphics Tables   1--13
             Davide Gazz\`e and   
     Mariantonietta N. La Polla   WorkMail: Collaborative Document
                                  Workflow Management by Email . . . . . . 14--23
                    Jang Ho Lee   Real-Time Mobile Distance Learning
                                  System for Smartphone  . . . . . . . . . 24--32
              Takashi Aruga and   
               Nobuyoshi Yabuki   Cooperative Information Management of
                                  Degradation of Structures in Operation
                                  and Management . . . . . . . . . . . . . 33--40
               Aaron Costin and   
             Nipesh Pradhananga   Real-Time Resource Location Tracking in
                                  Building Information Models (BIM)  . . . 41--48
           Nobuyoshi Yabuki and   
                    Yuta Ashida   Cooperative Integration of Product Model
                                  and Sensor Data Model for Knowledge
                                  Discovery  . . . . . . . . . . . . . . . 49--52
             Wojciech Indyk and   
             Tomasz Kajdanowicz   Cooperative Decision Making Algorithm
                                  for Large Networks Using MapReduce
                                  Programming Model  . . . . . . . . . . . 53--56
               Navid Ahmadi and   
             Mehdi Jazayeri and   
                 Monica Landoni   Enabling Cooperative Educational Game
                                  Design on the Web  . . . . . . . . . . . 57--64
               Mikhail Fominykh   Learning Computer-Mediated Cooperation
                                  in $3$D Visualization Projects . . . . . 65--72
                  Sven Ubik and   
Ji\vrí Navrátil and   
                   Petr \vZejdl   Real-Time Stereoscopic Streaming of
                                  Medical Surgeries for Collaborative
                                  eLearning  . . . . . . . . . . . . . . . 73--77
       Hugo Sereno Ferreira and   
              Tiago Boldt Sousa   Scalable Integration of Multiple Health
                                  Sensor Data for Observing Medical
                                  Patterns . . . . . . . . . . . . . . . . 78--84
              Miguel Garcia and   
                  Diana Bri and   
                   Jaime Lloret   Collaborating Using Intergroup
                                  Communications in Group-Based Wireless
                                  Sensor Networks: Another Way for Saving
                                  Energy . . . . . . . . . . . . . . . . . 85--93
                  Cong Chen and   
                 Kang Zhang and   
                  Takayuki Itoh   Empirical Evidence of Tags Supporting
                                  High-Level Awareness . . . . . . . . . . 94--101
                 Sylvia Encheva   Rough Sets Methods for Working with
                                  Uncertainty  . . . . . . . . . . . . . . 102--109
             Sylvia Encheva and   
                   Sharil Tumin   Project Proposals Ranking Based on
                                  Closed Sets Properties . . . . . . . . . 110--113
            Catherine Elsen and   
        Françoise Darses   What Do Strokes Teach Us about
                                  Collaborative Design?  . . . . . . . . . 114--125
                  Ingeun Yi and   
                Seongki Lee and   
                  Sunyoung Jang   Communication between Physical and
                                  Virtual Models in Designing Smart
                                  Buildings  . . . . . . . . . . . . . . . 126--133
                Yanwei Zhao and   
                  Huan Wang and   
                  Huanhuan Hong   Cased-Based Reasoning Based on Extension
                                  Theory for Conflict Resolution in
                                  Cooperative Design . . . . . . . . . . . 134--142
      Sushardjanti Felasari and   
                  Chengzhi Peng   The Role of a City's Collective Memory
                                  in Supporting Cooperative Urban Design
                                  Learning . . . . . . . . . . . . . . . . 143--150
         Marina Z. Solesvik and   
              Tatiana Iakovleva   Simulation and Optimization in
                                  Collaborative Ship Design: Innovative
                                  Approach . . . . . . . . . . . . . . . . 151--154
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7468, 2012

             David McGookin and   
            Stephen A. Brewster   Understanding Auditory Navigation to
                                  Physical Landmarks . . . . . . . . . . . 1--10
                Emma Murphy and   
          Camille Moussette and   
             Charles Verron and   
           Catherine Guastavino   Supporting Sounds: Design and Evaluation
                                  of an Audio-Haptic Interface . . . . . . 11--20
                  Junlei Yu and   
              Christopher Habel   A Haptic-Audio Interface for Acquiring
                                  Spatial Knowledge about Apartments . . . 21--30
          David Cuartielles and   
     Andreas Göransson and   
                Tony Olsson and   
           Ståle Stenslie   Mobile Haptic Technology Development
                                  through Artistic Exploration . . . . . . 31--40
               Dominik Bial and   
         Thorsten Appelmann and   
              Enrico Rukzio and   
               Albrecht Schmidt   Improving Cyclists Training with Tactile
                                  Feedback on Feet . . . . . . . . . . . . 41--50
           Janko Timmermann and   
          Benjamin Poppinga and   
               Susanne Boll and   
                   Wilko Heuten   HapticPulse --- Reveal Your Heart Rate
                                  in Physical Activities . . . . . . . . . 51--60
           Niels C. Nilsson and   
               Rolf Nordahl and   
               Luca Turchet and   
               Stefania Serafin   Audio-Haptic Simulation of Walking on
                                  Virtual Ground Surfaces to Enhance
                                  Realism  . . . . . . . . . . . . . . . . 61--70
                   Johan Kildal   Interacting with Deformable User
                                  Interfaces: Effect of Material Stiffness
                                  and Type of Deformation Gesture  . . . . 71--80
 Karljohan Lundin Palmerius and   
           Gunnar Höst and   
          Konrad Schönborn   An Interactive and Multi-sensory
                                  Learning Environment for Nano Education  81--90
              Martin Halvey and   
          Michael Henderson and   
        Stephen A. Brewster and   
              Graham Wilson and   
              Stephen A. Hughes   Augmenting Media with Thermal
                                  Stimulation  . . . . . . . . . . . . . . 91--100
          Koray Tahiro\uglu and   
               Johan Kildal and   
            Teemu Ahmaniemi and   
            Simon Overstall and   
         Valtteri Wikström   Embodied Interactions with Audio-Tactile
                                  Virtual Objects in AHNE  . . . . . . . . 101--110
          Benjamin Poppinga and   
              Martin Pielot and   
               Wilko Heuten and   
                   Susanne Boll   Towards an Objective Comparison of
                                  Scanning-Based Interaction Techniques    111--120
              M. Ercan Altinsoy   Knocking Sound as Quality Sign for
                                  Household Appliances and the Evaluation
                                  of the Audio-Haptic Interaction  . . . . 121--130
           Lorenzo Picinali and   
         Christopher Feakes and   
            Davide A. Mauro and   
               Brian F. G. Katz   Spectral Discrimination Thresholds
                                  Comparing Audio and Haptics for Complex
                                  Stimuli  . . . . . . . . . . . . . . . . 131--140
               Trevor Hogan and   
                  Eva Hornecker   How Does Representation Modality Affect
                                  User-Experience of Data Artifacts? . . . 141--151
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7469, 2012

           Oleksiy Mazhelis and   
                 Eetu Luoma and   
                    Henna Warma   Defining an Internet-of-Things Ecosystem 1--14
              Seppo Leminen and   
            Mika Westerlund and   
            Mervi Rajahonka and   
              Riikka Siuruainen   Towards IOT Ecosystems and Business
                                  Models . . . . . . . . . . . . . . . . . 15--26
                 Andrej Kos and   
            Damijan Pristov and   
               Urban Sedlar and   
               Janez Sterle and   
                 Mojca Volk and   
                Toma\vz Vidonja   Open and Scalable IoT Platform and Its
                                  Applications for Real Time Access Line
                                  Monitoring and Alarm Correlation . . . . 27--38
         Konstantinos Kotis and   
            Artem Katasonov and   
                   Jarkko Leino   Aligning Smart and Control Entities in
                                  the IoT  . . . . . . . . . . . . . . . . 39--50
             Andrey Boytsov and   
           Arkady Zaslavsky and   
                Zahraa Abdallah   Where Have You Been? Using Location
                                  Clustering and Context Awareness to
                                  Understand Places of Interest  . . . . . 51--62
              Dmitry Namiot and   
           Manfred Sneps-Sneppe   Where Are They Now --- Safe Location
                                  Sharing  . . . . . . . . . . . . . . . . 63--74
         Ekaterina Dashkova and   
                  Andrei Gurtov   Survey on Congestion Control Mechanisms
                                  for Wireless Sensor Networks . . . . . . 75--85
              Vitaly Petrov and   
             Sergey Andreev and   
            Andrey Turlikov and   
            Yevgeni Koucheryavy   On IEEE 802.16m Overload Control for
                                  Smart Grid Deployments . . . . . . . . . 86--94
      Abdelrahman Abuarqoub and   
         Mohammad Hammoudeh and   
                  Tariq Alsboui   An Overview of Information Extraction
                                  from Mobile Wireless Sensor Networks . . 95--106
  Mohammadali Heidari Jozam and   
            Erfaneh Allameh and   
             Bauke De Vries and   
               Harry Timmermans   VR-Smart Home  . . . . . . . . . . . . . 107--118
Oscar Rodríguez Rocha and   
    Luis Javier Suarez-Meza and   
               Boris Moltchanov   Smart Space Governing through Service
                                  Mashups  . . . . . . . . . . . . . . . . 119--127
               Yury Korolev and   
              Dmitry Korzun and   
                     Ivan Galov   Smart Space Applications Integration: a
                                  Mediation Formalism and Design for
                                  Smart-M3 . . . . . . . . . . . . . . . . 128--139
          Alexander Smirnov and   
             Nikolay Shilov and   
           Alexey Kashevnik and   
                 Nikolay Teslya   Smart Logistic Service for Dynamic
                                  Ridesharing  . . . . . . . . . . . . . . 140--151
             Yves Vanrompay and   
                Yolande Berbers   A Methodological Approach to Quality of
                                  Future Context for Proactive Smart
                                  Systems  . . . . . . . . . . . . . . . . 152--163
           Natan Blaunstein and   
     Michael Borisovich Sergeev   Integration of Advanced LTE Technology
                                  and MIMO Network Based on Adaptive
                                  Multi-beam Antennas  . . . . . . . . . . 164--173
            Alexey Khoryaev and   
             Mikhail Shilov and   
           Sergey Panteleev and   
          Andrey Chervyakov and   
                 Artyom Lomayev   Feasibility Analysis of Dynamic
                                  Adjustment of TDD Configurations in
                                  Macro-Femto Heterogeneous LTE Networks   174--185
        Mikhail Gerasimenko and   
             Sergey Andreev and   
        Yevgeni Koucheryavy and   
               Alexey Trushanin   Performance Comparison of System Level
                                  Simulators for 3GPP LTE Uplink . . . . . 186--197
              Dmitry Petrov and   
                Ilmari Repo and   
                 Marko Lampinen   Performance of Multiflow Aggregation
                                  Scheme for HSDPA with Joint Intra-site
                                  Scheduling and in Presence of CQI
                                  Imperfections  . . . . . . . . . . . . . 198--207
           Irina A. Gudkova and   
        Konstantin E. Samouylov   Modelling a Radio Admission Control
                                  Scheme for Video Telephony Service in
                                  Wireless Networks  . . . . . . . . . . . 208--215
                    Wei Liu and   
                Yueyun Chen and   
                     Yudong Yao   Multi-point Cooperative Fountain Codes
                                  Multicast for LTE Cellular System  . . . 216--224
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7470, 2012

                Nate Foster and   
           Kazutaka Matsuda and   
         Janis Voigtländer   Three Complementary Approaches to
                                  Bidirectional Programming  . . . . . . . 1--46
                     Ralf Hinze   Generic Programming with Adjunctions . . 47--129
                  Oleg Kiselyov   Typed Tagless Final Interpreters . . . . 130--174
                 Jeremy G. Siek   The C++0x ``Concepts'' Effort  . . . . . 175--216
          Stephanie Weirich and   
               Chris Casinghino   Generic Programming with Dependent Types 217--258
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7471, 2012

       Surangika Ranathunga and   
             Stephen Cranefield   Interfacing a Cognitive Agent Platform
                                  with Second Life . . . . . . . . . . . . 1--21
            Joost van Oijen and   
      Lo\"\is Vanhée and   
                   Frank Dignum   CIGA: a Middleware for Intelligent
                                  Agents in Virtual Environments . . . . . 22--37
               Jakub Gemrot and   
                 Cyril Brom and   
                  Joanna Bryson   How to Compare Usability of Techniques
                                  for the Specification of Virtual Agents'
                                  Behavior? An Experimental Pilot Study
                                  with Human Subjects  . . . . . . . . . . 38--62
       Edward Chao-Chun Kao and   
                    Von-Wun Soo   Dialog Designs in Virtual Drama:
                                  Balancing Agency and Scripted Dialogs    63--78
                Yundong Cai and   
                     Zhiqi Shen   Learning by Playing in Agent-Oriented
                                  Virtual Learning Environment . . . . . . 79--93
            Takeo Tsukamoto and   
                    Yumi Muroya   Collection and Analysis of Multimodal
                                  Interaction in Direction-Giving
                                  Dialogues: Towards an Automatic Gesture
                                  Selection Mechanism for Metaverse
                                  Avatars  . . . . . . . . . . . . . . . . 94--105
               Joost Westra and   
               Frank Dignum and   
                Virginia Dignum   Organizing Scalable Adaptation in
                                  Serious Games  . . . . . . . . . . . . . 106--122
         Alex Yu-Hung Chien and   
                    Von-Wun Soo   Inferring Pragmatics from Dialogue
                                  Contexts in Simulated Virtual Agent
                                  Games  . . . . . . . . . . . . . . . . . 123--138
         Sergio Alvarez-Napagao   Socially-Aware Emergent Narrative  . . . 139--150
       Michael Wißner and   
                Wouter Beek and   
                  Esther Lozano   Increasing Learners' Motivation through
                                  Pedagogical Agents: The Cast of Virtual
                                  Characters in the DynaLearn ILE  . . . . 151--165
               Meirav Hadad and   
                  Avi Rosenfeld   ADAPT: Abstraction Hierarchies to Better
                                  Simulate Teamwork under Dynamics . . . . 166--182
            Sabrina Campano and   
               Etienne de Sevin   An Architecture for Affective Behaviour
                                  Based on the Conservation of Resources   183--194
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7472, 2012

               Jiliang Tang and   
                 Xufei Wang and   
                       Huan Liu   Integrating Social Media Data for
                                  Community Detection  . . . . . . . . . . 1--20
          Martin Atzmueller and   
                Stephan Doerfel   Face-to-Face Contacts at a Conference:
                                  Dynamics of Communities and Roles  . . . 21--39
             Philipp Singer and   
                 Claudia Wagner   Factors Influencing the Co-evolution of
                                  Social and Content Networks in Online
                                  Social Media . . . . . . . . . . . . . . 40--59
             Ursula Redmond and   
                Martin Harrigan   Mining Dense Structures to Uncover
                                  Anomalous Behaviour in Financial Network
                                  Data . . . . . . . . . . . . . . . . . . 60--76
          Florian Lemmerich and   
              Martin Atzmueller   Describing Locations Using Tags and
                                  Images: Explorative Pattern Mining in
                                  Social Media . . . . . . . . . . . . . . 77--96
            Annalisa Appice and   
              Michelangelo Ceci   Learning and Transferring Geographically
                                  Weighted Regression Trees across Time    97--117
            Pietro Guccione and   
                Annalisa Appice   Trend Cluster Based Kriging
                                  Interpolation in Sensor Data Networks    118--137
                    Else Nygren   Simulation of User Participation and
                                  Interaction in Online Discussion Groups  138--157
          Ricardo Tesoriero and   
                Mohamed Bourimi   Model-Driven Privacy and Security in
                                  Multi-modal Social Media UIs . . . . . . 158--181
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7473, 2012

              Shan Jianfang and   
                   Liu Zongtian   A Novel Event Network Matching Algorithm 1--14
              Kunpeng Jiang and   
                Huifang Guo and   
              Shengping Zhu and   
                     Julong Lan   Static Patterns Matching for High Speed
                                  Networks . . . . . . . . . . . . . . . . 15--22
                     Niu Li and   
                   Han Xiaoting   Information Propagation in Online Social
                                  Networks Based on User Behavior  . . . . 23--30
                     Xin Li and   
                  Yue-fang Yang   Research on Operation and Management of
                                  Railway Transport of Dangerous Goods in
                                  Third-Party Logistics Enterprises  . . . 31--36
                  Jing Shen and   
                      Yusong Du   A Password Authentication Scheme against
                                  Smart Card Security Breach . . . . . . . 37--44
                     Bo Han and   
                  Qing Wang and   
                 Fajiang Yu and   
                   Xianda Zhang   A Vulnerability Attack Graph Generation
                                  Method Based on Scripts  . . . . . . . . 45--50
           Zailani Abdullah and   
              Tutut Herawan and   
                A. Noraziah and   
              Mustafa Mat Deris   DFP-Growth: An Efficient Algorithm for
                                  Mining Frequent Patterns in Dynamic
                                  Database . . . . . . . . . . . . . . . . 51--58
                Xizhe Zhang and   
               Guolong Zhao and   
                Tianyang Lv and   
                   Ying Yin and   
                      Bin Zhang   Analysis on Key Nodes Behavior for
                                  Complex Software Network . . . . . . . . 59--66
                Junling Ren and   
                       Li Zhang   Webpage Information Hiding Algorithm
                                  Based on Integration of Tags and Data    67--74
                    Wei Zhu and   
                   Ping Sun and   
                Ying nan Ma and   
                   Rui Song and   
                 Shi wei He and   
                     Ke Hui Liu   Location Method of Underground Pipeline
                                  Monitoring Point Based on Cavity
                                  Detection  . . . . . . . . . . . . . . . 75--81
               Qichun Zhong and   
                    Jinghong Hu   Research on Purified Internet
                                  Environment for College Students . . . . 82--87
                  Qianmu Li and   
                 Qiugan Shi and   
                    Jun Hou and   
                    Yong Qi and   
                     Hong Zhang   A Mobile-Certificate Security Method of
                                  Satellite-Earth Integration Networks . . 88--97
              Wen-Hsing Lai and   
                  Siou-Lin Wang   Duration Modeling for Emotional Speech   98--103
               Hongwei Zhao and   
                  Xiao Chen and   
                  Wei Huang and   
               Pingping Liu and   
                    Lingjiao Ma   Research on Image Retrieval Based on
                                  Color and Shape Features . . . . . . . . 104--111
                Kaihua Wang and   
             Wenxiang Zhang and   
                     Zhanji Gui   Existence and Simulations of Periodic
                                  Solution for Impulsive Predator-Prey
                                  System with Stage Structure for the
                                  Predator . . . . . . . . . . . . . . . . 112--119
                    Yan Yan and   
                Kaihua Wang and   
                     Zhanji Gui   Dynamics and Simulations of
                                  Multi-species Competition-Predator
                                  System with Impulsive  . . . . . . . . . 120--127
                  Ying Chen and   
                  Shaobai Zhang   Research on the Distal Supervised
                                  Learning Model of Speech Inversion . . . 128--135
            Ruei-Chang Chen and   
              Shih-Fong Lee and   
                 Yeong-Chau Kuo   Low Power Pulse Width Modulation Design
                                  for Class D Audio Amplifier Systems  . . 136--143
                   Guan Wei and   
                     Lv Yuanhai   A New Logic Method for Education
                                  Resource Software Guarantee  . . . . . . 144--151
                Zhenjie Hou and   
             Junsheng Huang and   
                  Jianhua Zhang   Research on $3$D Object Rounding
                                  Photography Systems and Technology . . . 152--158
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7474, 2012

    Laura Leal-Taixé and   
               Gerard Pons-Moll   Exploiting Pedestrian Interaction via
                                  Global Optimization and Social Behaviors 1--26
          Nicolai Schneider and   
                  Stefan Gehrig   An Evaluation Framework for Stereo-Based
                                  Driver Assistance  . . . . . . . . . . . 27--51
            Sandino Morales and   
                  Simon Hermann   Real-World Stereo-Analysis Evaluation    52--77
        Yoshihiko Mochizuki and   
                  Atsushi Imiya   Pyramid Transform and Scale-Space
                                  Analysis in Image Analysis . . . . . . . 78--109
                Ralf Dragon and   
              Michele Fenzi and   
                  Wolf Siberski   Towards Feature-Based Situation
                                  Assessment for Airport Apron Video
                                  Surveillance . . . . . . . . . . . . . . 110--130
             Yong-Dian Jian and   
                 Doru C. Balcan   Generalized Subgraph Preconditioners for
                                  Large-Scale Bundle Adjustment  . . . . . 131--150
           Ioannis Brilakis and   
                        Fei Dai   Achievements and Challenges in
                                  Recognizing and Reconstructing Civil
                                  Infrastructure . . . . . . . . . . . . . 151--176
                  Dan Raviv and   
         Alexander M. Bronstein   Equi-affine Invariant Geometries of
                                  Articulated Objects  . . . . . . . . . . 177--190
            Torsten Sattler and   
              Bastian Leibe and   
                   Leif Kobbelt   Towards Fast Image-Based Localization on
                                  a City-Scale . . . . . . . . . . . . . . 191--211
             Anne Sedlazeck and   
                  Reinhard Koch   Perspective and Non-perspective Camera
                                  Models in Underwater Imaging ---
                                  Overview and Error Analysis  . . . . . . 212--242
               Juergen Gall and   
                    Nima Razavi   An Introduction to Random Forests for
                                  Multi-class Object Detection . . . . . . 243--263
              Jan D. Wegner and   
             Bodo Rosenhahn and   
                Uwe Sörgel   Segmentation and Classification of
                                  Objects with Implicit Scene Context  . . 264--284
               Helmut Mayer and   
                  Jan Bartelsen   Dense $3$D Reconstruction from Wide
                                  Baseline Image Sets  . . . . . . . . . . 285--304
           Gerard Pons-Moll and   
        Laura Leal-Taixé   Data-Driven Manifolds for Outdoor Motion
                                  Capture  . . . . . . . . . . . . . . . . 305--328
          Daniel Kondermann and   
                Steffen Abraham   On Performance Analysis of Optical Flow
                                  Algorithms . . . . . . . . . . . . . . . 329--355
                Glen Debard and   
               Peter Karsmakers   Camera-Based Fall Detection on Real
                                  World Data . . . . . . . . . . . . . . . 356--375
             Sid Yingze Bao and   
                Silvio Savarese   Semantic Structure from Motion: a Novel
                                  Framework for Joint Object Recognition
                                  and $3$D Reconstruction  . . . . . . . . 376--397
              Ronny Klowsky and   
             Patrick Mücke   Hierarchical Surface Reconstruction from
                                  Multi-resolution Point Samples . . . . . 398--418
                Ralf Reulke and   
         Dominik Rueß and   
               Kristian Manthey   Traffic Observation and Situation
                                  Assessment . . . . . . . . . . . . . . . 419--441
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7476, 2012

   Björn Fröhlich and   
                Erik Rodner and   
                Joachim Denzler   As Time Goes by--- Anytime Semantic
                                  Segmentation with Iterative Context
                                  Forests  . . . . . . . . . . . . . . . . 1--10
                Georg Zankl and   
              Yll Haxhimusa and   
                     Adrian Ion   Interactive Labeling of Image
                                  Segmentation Hierarchies . . . . . . . . 11--20
    Naveen Shankar Nagaraja and   
                 Peter Ochs and   
                    Kun Liu and   
                    Thomas Brox   Hierarchy of Localized Random Forests
                                  for Video Annotation . . . . . . . . . . 21--30
           Coloma Ballester and   
              Lluis Garrido and   
              Vanel Lazcano and   
                Vicent Caselles   A TV-L1 Optical Flow Method with
                                  Occlusion Detection  . . . . . . . . . . 31--40
      Alexander Shekhovtsov and   
             Pushmeet Kohli and   
                 Carsten Rother   Curvature Prior for MRF-Based
                                  Segmentation and Shape Inpainting  . . . 41--51
             Kevin Schelten and   
                    Stefan Roth   Mean Field for Continuous High-Order
                                  MRFs . . . . . . . . . . . . . . . . . . 52--61
                     Qi Gao and   
                    Stefan Roth   How Well Do Filter-Based MRFs Model
                                  Natural Images?  . . . . . . . . . . . . 62--72
       Christopher Schroers and   
             Henning Zimmer and   
             Levi Valgaerts and   
        Andrés Bruhn and   
                  Oliver Demetz   Anisotropic Range Image Integration  . . 73--82
           Thorsten Schmidt and   
             Margret Keuper and   
            Taras Pasternak and   
                Klaus Palme and   
               Olaf Ronneberger   Modeling of Sparsely Sampled Tubular
                                  Surfaces Using Coupled Curves  . . . . . 83--92
           Simon Winkelbach and   
                 Jens Spehr and   
              Dirk Buchholz and   
                Markus Rilk and   
              Friedrich M. Wahl   Shape (Self-)Similarity and
                                  Dissimilarity Rating for Segmentation
                                  and Matching . . . . . . . . . . . . . . 93--102
        Benjamin Ummenhofer and   
                    Thomas Brox   Dense $3$D Reconstruction with a
                                  Hand-Held Camera . . . . . . . . . . . . 103--112
               Aitor Aldoma and   
           Federico Tombari and   
           Radu Bogdan Rusu and   
                  Markus Vincze   OUR-CVFH --- Oriented, Unique and
                                  Repeatable Clustered Viewpoint Feature
                                  Histogram for Object Recognition and
                                  6DOF Pose Estimation . . . . . . . . . . 113--122
              Michele Fenzi and   
                Ralf Dragon and   
    Laura Leal-Taixé and   
             Bodo Rosenhahn and   
            Jörn Ostermann   $3$D Object Recognition and Pose
                                  Estimation for Multiple Objects Using
                                  Multi-Prioritized RANSAC and Model
                                  Updating . . . . . . . . . . . . . . . . 123--133
                Hakan Bilen and   
        Vinay P. Namboodiri and   
                Luc J. Van Gool   Classification with Global, Local and
                                  Shared Features  . . . . . . . . . . . . 134--143
           Thorsten Franzel and   
                Uwe Schmidt and   
                    Stefan Roth   Object Detection in Multi-view X-Ray
                                  Images . . . . . . . . . . . . . . . . . 144--154
          Ferdinand Hahmann and   
        Heike Ruppertshofen and   
           Gordon Böer and   
            Ralf Stannarius and   
                  Hauke Schramm   Eye Localization Using the
                                  Discriminative Generalized Hough
                                  Transform  . . . . . . . . . . . . . . . 155--164
          Andreas Rune Fugl and   
              Andreas Jordt and   
     Henrik Gordon Petersen and   
               Morten Willatzen   Simultaneous Estimation of Material
                                  Properties and Pose for Deformable
                                  Objects from Depth and Color Images  . . 165--174
      Sebastian von Enzberg and   
                Bernd Michaelis   Surface Quality Inspection of Deformable
                                  Parts with Variable B-Spline Surfaces    175--184
                Fabian Zach and   
            Christian Riess and   
              Elli Angelopoulou   Automated Image Forgery Detection
                                  through Classification of JPEG Ghosts    185--194
      Martin Köstinger and   
              Peter M. Roth and   
                  Horst Bischof   Synergy-Based Learning of Facial
                                  Identity . . . . . . . . . . . . . . . . 195--204
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7477, 2012

              Bassam Mokbel and   
            Sebastian Gross and   
                 Markus Lux and   
             Niels Pinkwart and   
                 Barbara Hammer   How to Quantitatively Compare Data
                                  Dissimilarities for Unsupervised Machine
                                  Learning?  . . . . . . . . . . . . . . . 1--13
            Daniela Hofmann and   
                 Barbara Hammer   Kernel Robust Soft Learning Vector
                                  Quantization . . . . . . . . . . . . . . 14--23
             Davide Maltoni and   
                   Erik M. Rehn   Incremental Learning by Message Passing
                                  in Hierarchical Temporal Memory  . . . . 24--35
             Ludwig Lausser and   
      Christoph Müssel and   
                Hans A. Kestler   Representative Prototype Sets for Data
                                  Characterization and Classification  . . 36--47
           Takashi Nagatani and   
                     Shigeo Abe   Feature Selection by Block Addition and
                                  Block Deletion . . . . . . . . . . . . . 48--59
               Michel Tokic and   
              Günther Palm   Gradient Algorithms for
                                  Exploration/Exploitation Trade-Offs:
                                  Global and Local Variants  . . . . . . . 60--71
            Edmondo Trentin and   
                  Marco Bongini   Towards a Novel Probabilistic Graphical
                                  Model of Sequential Data: Fundamental
                                  Notions and a Solution to the Problem of
                                  Parameter Learning . . . . . . . . . . . 72--81
              Marco Bongini and   
                Edmondo Trentin   Towards a Novel Probabilistic Graphical
                                  Model of Sequential Data: a Solution to
                                  the Problem of Structure Learning and an
                                  Empirical Evaluation . . . . . . . . . . 82--92
            Andrey V. Savchenko   Statistical Recognition of a Set of
                                  Patterns Using Novel Probability Neural
                                  Network  . . . . . . . . . . . . . . . . 93--103
             Miriam Schmidt and   
          Günther Palm and   
            Friedhelm Schwenker   On Graph-Associated Matrices and Their
                                  Eigenvalues for Optical Character
                                  Recognition  . . . . . . . . . . . . . . 104--114
José Ricardo Gonçalves Manzan and   
             Shigueo Nomura and   
                 Keiji Yamanaka   Improving Iris Recognition through New
                                  Target Vectors in MLP Artificial Neural
                                  Networks . . . . . . . . . . . . . . . . 115--126
Antonio García-Manso and   
Carlos J. García-Orellana and   
Ramón Gallardo-Caballero   Robustness of a CAD System on Digitized
                                  Mammograms . . . . . . . . . . . . . . . 127--138
                Kaushik Roy and   
               Mohamed S. Kamel   Facial Expression Recognition Using Game
                                  Theory . . . . . . . . . . . . . . . . . 139--150
     Alessandro Zamberletti and   
              Ignazio Gallo and   
           Simone Albertini and   
              Marco Vanetti and   
                  Angelo Nodari   Classification of Segmented Objects
                                  through a Multi-net Approach . . . . . . 151--162
        Vasileios Korfiatis and   
             Simone Tassani and   
          George K. Matsopoulos   A Decision Support System for the
                                  Prediction of the Trabecular Fracture
                                  Zone . . . . . . . . . . . . . . . . . . 163--174
           Kelwin Fernandez and   
                 Carolina Chang   Teeth/Palate and Interdental
                                  Segmentation Using Artificial Neural
                                  Networks . . . . . . . . . . . . . . . . 175--185
               Sascha Meudt and   
            Friedhelm Schwenker   On Instance Selection in Audio Based
                                  Emotion Recognition  . . . . . . . . . . 186--192
        Matthias Hillebrand and   
        Ulrich Kreßel and   
      Christian Wöhler and   
                  Franz Kummert   Traffic Sign Classifier Adaption by
                                  Semi-supervised Co-training  . . . . . . 193--200
            Paul T. Pearson and   
              Cameron I. Cooper   Using Self Organizing Maps to Analyze
                                  Demographics and Swing State Voting in
                                  the 2008 U.S. Presidential Election  . . 201--212
           Osvaldo de Souza and   
  Paulo César Cortez and   
    Francisco A. T. F. da Silva   Grayscale Images and RGB Video:
                                  Compression by Morphological Neural
                                  Network  . . . . . . . . . . . . . . . . 213--224
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7478, 2012

               Amin Abdalla and   
                Andrew U. Frank   Combining Trip and Task Planning: How to
                                  Get from A to Passport . . . . . . . . . 1--14
      Chris Anderson-Tarver and   
               Mike Gleason and   
            Barbara Buttenfield   Automated Centerline Delineation to
                                  Enrich the National Hydrography Dataset  15--28
               Kevin Buchin and   
          Bettina Speckmann and   
             Sander Verdonschot   Evolution Strategies for Optimizing
                                  Rectangular Cartograms . . . . . . . . . 29--42
               Maike Buchin and   
              Somayeh Dodge and   
              Bettina Speckmann   Context-Aware Similarity of Trajectories 43--56
              Yao-Yi Chiang and   
              Craig A. Knoblock   Generating Named Road Vector Data from
                                  Raster Maps  . . . . . . . . . . . . . . 57--71
            Matthew P. Dube and   
               Max J. Egenhofer   An Ordering of Convex Topological
                                  Relations  . . . . . . . . . . . . . . . 72--86
                 Julien Gaffuri   Toward Web Mapping with Vector Data  . . 87--101
       Carsten Keßler and   
         Krzysztof Janowicz and   
                 Tomi Kauppinen   \tt spatial@linkedscience --- Exploring
                                  the Research Field of GIScience with
                                  Linked Data  . . . . . . . . . . . . . . 102--115
        Nicolas Maisonneuve and   
                Bastien Chopard   Crowdsourcing Satellite Imagery
                                  Analysis: Study of Parallel and
                                  Iterative Models . . . . . . . . . . . . 116--131
              Pradeep Mohan and   
                   Xun Zhou and   
                 Shashi Shekhar   Quantifying Resolution Sensitivity of
                                  Spatial Autocorrelation: a Resolution
                                  Correlogram Approach . . . . . . . . . . 132--145
              Silvia Nittel and   
           Christopher Dorr and   
               John C. Whittier   LocalAlert: Simulating Decentralized
                                  Ad-Hoc Collaboration in Emergency
                                  Situations . . . . . . . . . . . . . . . 146--159
               Avinash Rude and   
                     Kate Beard   High-Level Event Detection in Spatially
                                  Distributed Time Series  . . . . . . . . 160--172
Thiago Luís Lopes Siqueira   Towards Vague Geographic Data Warehouses 173--186
                  Guibo Sun and   
                    Hui Lin and   
                    Rongrong Li   Measuring the Influence of Built
                                  Environment on Walking Behavior: An
                                  Accessibility Approach . . . . . . . . . 187--197
                Guillaume Touya   Social Welfare to Assess the Global
                                  Legibility of a Generalized Map  . . . . 198--211
   Jan Oliver Wallgrün and   
               Jinlong Yang and   
              Alexander Klippel   Investigations into the Cognitive
                                  Conceptualization and Similarity
                                  Assessment of Spatial Scenes . . . . . . 212--225
             Lisa A. Walton and   
                Michael Worboys   A Qualitative Bigraph Model for Indoor
                                  Space  . . . . . . . . . . . . . . . . . 226--240
          Toyohide Watanabe and   
                Kosuke Yamamoto   Dynamic Refuse Collection Strategy Based
                                  on Adjacency Relationship between Euler
                                  Cycles . . . . . . . . . . . . . . . . . 241--257
                   Ting Wei and   
                     Scott Bell   Impact of Indoor Location Information
                                  Reliability on Users' Trust of an Indoor
                                  Positioning System . . . . . . . . . . . 258--269
                  Nancy Wiegand   Ontology for the Engineering of
                                  Geospatial Systems . . . . . . . . . . . 270--283
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7479, 2012

               Marco Porsch and   
               Thomas Bauschert   A Testbed Analysis of the Effects of
                                  IEEE 802.11s Power Save on Mesh Link
                                  Performance  . . . . . . . . . . . . . . 1--11
     Muhammad Irfan Rafique and   
               Thomas Bauschert   Path Selection and Adaptive Selection of
                                  Smart Antenna Transmission Schemes in
                                  Multi-hop Wireless Networks  . . . . . . 12--22
              Cristina Cano and   
             Boris Bellalta and   
                  Miquel Oliver   Receiver-Initiated vs. Short-Preamble
                                  Burst MAC Approaches for Multi-channel
                                  Wireless Sensor Networks . . . . . . . . 23--32
             Albert Domingo and   
             Boris Bellalta and   
                  Miquel Oliver   White Spaces in UHF Band: Catalonia Case
                                  Study and Impact of the Digital Dividend 33--40
             Zahra Tavakoli and   
            Sebastian Meier and   
              Alexander Vensmer   A Framework for Security Context
                                  Migration in a Firewall Secured Virtual
                                  Machine Environment  . . . . . . . . . . 41--51
      Zoltán Czirkos and   
     Gábor Hosszú   Enhancing Collaborative Intrusion
                                  Detection Methods Using a Kademlia
                                  Overlay Network  . . . . . . . . . . . . 52--63
             Pavel \vCeleda and   
      Radek Krej\vcí and   
     Vojt\vech Krmí\vcek   Flow-Based Security Issue Detection in
                                  Building Automation and Control Networks 64--75
     Gy\Hoz\Ho Gódor and   
             Sándor Imre   Hash-Based Mutual Authentication
                                  Protocol for Low-Cost RFID Systems . . . 76--87
           Christiaan Ottow and   
            Frank van Vliet and   
       Pieter-Tjerk de Boer and   
                      Aiko Pras   The Impact of IPv6 on Penetration
                                  Testing  . . . . . . . . . . . . . . . . 88--99
               Iyas Alloush and   
           Vanea Chiprianov and   
             Yvon Kermarrec and   
             Siegfried Rouvrais   Linking Telecom Service High-Level
                                  Abstract Models to Simulators Based on
                                  Model Transformations: The IMS Case
                                  Study  . . . . . . . . . . . . . . . . . 100--111
           Stefan Türk and   
                   Ying Liu and   
                Rico Radeke and   
                   Ralf Lehnert   Network Migration Optimization Using
                                  Genetic Algorithms . . . . . . . . . . . 112--123
         Patcharee Thongtra and   
          Finn Arve Aagesen and   
            Kornschnok Dittawit   OWL-Based Node Capability Parameter
                                  Configuration  . . . . . . . . . . . . . 124--135
             Konrad Walczyk and   
                   Annie Gravey   Techno-Economic Comparison of
                                  Next-Generation Access Networks for the
                                  French Market  . . . . . . . . . . . . . 136--147
           Christos Tsiaras and   
          Martin Waldburger and   
    Guilherme Sperb Machado and   
                  Andrei Vancea   The Design of a Single Funding Point
                                  Charging Architecture  . . . . . . . . . 148--160
             Volker Richter and   
                Rico Radeke and   
                   Ralf Lehnert   A Two Layer Guaranteed and Sustained
                                  Rate Based Scheduler for IEEE
                                  802.16-2009 Based WiMAX Networks . . . . 161--172
Régel González Usach and   
           Mirja Kühlewind   Implementation and Evaluation of Coupled
                                  Congestion Control for Multipath TCP . . 173--182
      Bjòrn J. Villa and   
           Poul E. Heegaard and   
              Anders Instefjord   Improving Fairness for Adaptive HTTP
                                  Video Streaming  . . . . . . . . . . . . 183--193
           Jakub Marsza\lkowski   Prototype of High Performance Scalable
                                  Advertising Server with Local Memory
                                  Storage and Centralised Processing . . . 194--203
        Mihály Orosz and   
     Gábor Hosszú   Responsible Source Multicasting  . . . . 204--214
             Adrian Noguero and   
               Isidro Calvo and   
               Luis Almeida and   
                  Unai Gangoiti   A Model for System Resources in Flexible
                                  Time-Triggered Middleware Architectures  215--226
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7481, 2012

        Wil M. P. van der Aalst   A Decade of Business Process Management
                                  Conferences: Personal Reflections on a
                                  Developing Discipline  . . . . . . . . . 1--16
         Alejandro Buchmann and   
               Stefan Appel and   
        Tobias Freudenreich and   
           Sebastian Frischbier   From Calls to Events: Architecting
                                  Future BPM Systems . . . . . . . . . . . 17--32
                  Jan Claes and   
        Irene Vanderfeesten and   
            Hajo A. Reijers and   
             Jakob Pinggera and   
              Matthias Weidlich   Tying Process Model Quality to the
                                  Modeling Process: The Impact of
                                  Structuring, Movement, and Speed . . . . 33--48
               Jana Koehler and   
           Joerg Hofstetter and   
                 Roland Woodtly   Capabilities and Levels of Maturity in
                                  IT-Based Case Management . . . . . . . . 49--64
     Rami-Habib Eid-Sabbagh and   
              Remco Dijkman and   
                  Mathias Weske   Business Process Architecture: Use and
                                  Correctness  . . . . . . . . . . . . . . 65--81
      Massimiliano de Leoni and   
       Fabrizio Maria Maggi and   
        Wil M. P. van der Aalst   Aligning Event Logs and Declarative
                                  Process Models for Conformance Checking  82--97
Jan Martijn E. M. van der Werf and   
           H. M. W. Verbeek and   
        Wil M. P. van der Aalst   Context-Aware Compliance Checking  . . . 98--113
          Sebastian Banescu and   
           Milan Petkovi\'c and   
                 Nicola Zannone   Measuring Privacy Compliance Using
                                  Fitness Metrics  . . . . . . . . . . . . 114--119
            Antonio Estruch and   
José Antonio Heredia Álvaro   Event-Driven Manufacturing Process
                                  Management Approach  . . . . . . . . . . 120--133
       Stefano Tranquillini and   
         Patrik Spieß and   
             Florian Daniel and   
        Stamatis Karnouskos and   
                   Fabio Casati   Process-Based Design and Integration of
                                  Wireless Sensor Network Applications . . 134--149
              Ognjen Scekic and   
           Hong-Linh Truong and   
               Schahram Dustdar   Modeling Rewards and Incentive
                                  Mechanisms for Social BPM  . . . . . . . 150--155
        Cédric Favre and   
              Hagen Völzer   The Difficulty of Replacing an Inclusive
                                  OR-Join  . . . . . . . . . . . . . . . . 156--171
             Rafael Accorsi and   
                Andreas Lehmann   Automatic Information Flow Analysis of
                                  Business Process Models  . . . . . . . . 172--187
              Marian Benner and   
              Matthias Book and   
      Tobias Brückmann and   
               Volker Gruhn and   
                 Thomas Richter   Managing and Tracing the Traversal of
                                  Process Clouds with Templates, Agendas
                                  and Artifacts  . . . . . . . . . . . . . 188--193
             Mourad Amziani and   
              Tarek Melliti and   
                     Samir Tata   A Generic Framework for Service-Based
                                  Business Process Elasticity in the Cloud 194--199
                    Juan Li and   
               Ross Jeffery and   
               Kam Hay Fung and   
                 Liming Zhu and   
                  Qing Wang and   
                   He Zhang and   
                       Xiwei Xu   A Business Process-Driven Approach for
                                  Requirements Dependency Analysis . . . . 200--215
             David Martinho and   
      António Rito Silva   A Recommendation Algorithm to Capture
                                  End-Users' Tacit Knowledge . . . . . . . 216--222
Adela del-Río-Ortega and   
Manuel Resinas Arias de Reyna and   
       Amador Durán Toro   Defining Process Performance Indicators
                                  by Using Templates and Patterns  . . . . 223--228
               Dirk Fahland and   
        Wil M. P. van der Aalst   Repairing Process Models to Reflect
                                  Reality  . . . . . . . . . . . . . . . . 229--245
               Zhiqiang Yan and   
              Remco Dijkman and   
                    Paul Grefen   FNet: An Index for Advanced Business
                                  Process Querying . . . . . . . . . . . . 246--261
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7482, 2012

           Md. Sadim Mahmud and   
               Sylvia L. Osborn   Tradeoff Analysis of Relational Database
                                  Storage of Privacy Preferences . . . . . 1--13
             Maryam Shoaran and   
                 Alex Thomo and   
                     Jens Weber   Differential Privacy in Practice . . . . 14--24
       Steven Euijong Whang and   
           Hector Garcia-Molina   A Model for Quantifying Information
                                  Leakage  . . . . . . . . . . . . . . . . 25--44
              Daniel Janusz and   
                Martin Kost and   
       Johann-Christoph Freytag   Privacy Protocol for Linking Distributed
                                  Medical Data . . . . . . . . . . . . . . 45--57
             Wen Qiang Wang and   
         Dinh Tien Tuan Anh and   
              Hock Beng Lim and   
                Anwitaman Datta   Cloud and the City: Facilitating
                                  Flexible Access Control over
                                  Data-Streams . . . . . . . . . . . . . . 58--74
          Barbara Carminati and   
              Elena Ferrari and   
              Michele Guglielmi   Policies for Composed Emergencies in
                                  Support of Disaster Management . . . . . 75--92
                 Bijit Hore and   
             Ee-Chien Chang and   
          Mamadou H. Diallo and   
                Sharad Mehrotra   Indexing Encrypted Documents for
                                  Supporting Efficient Keyword Search  . . 93--110
             Chunwang Zhang and   
                 Junjie Jin and   
             Ee-Chien Chang and   
                Sharad Mehrotra   Secure Quasi-Realtime Collaborative
                                  Editing over Low-Cost Storage Services   111--129
               Stepan Kozak and   
                David Novak and   
                   Pavel Zezula   Secure Metric-Based Index for Similarity
                                  Cloud  . . . . . . . . . . . . . . . . . 130--147
            Meghyn Bienvenu and   
              Daniel Deutch and   
             Fabian M. Suchanek   Provenance for Web 2.0 Data  . . . . . . 148--155
                Sean Thorpe and   
           Tyrone Grandison and   
               Indrajit Ray and   
                   Abbie Barbir   Towards Enabling Behavioral Trust among
                                  Participating Cloud Forensic Data Center
                                  Agencies . . . . . . . . . . . . . . . . 156--161
                  Mina Deng and   
                Marco Nalin and   
           Milan Petkovi\'c and   
              Ilaria Baroni and   
                Abitabile Marco   Towards Trustworthy Health Platform
                                  Cloud  . . . . . . . . . . . . . . . . . 162--175
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7483, 2012

               Manas Pathak and   
               Jose Portelo and   
                Bhiksha Raj and   
                Isabel Trancoso   Privacy-Preserving Speaker
                                  Authentication . . . . . . . . . . . . . 1--22
             Florian Mendel and   
               Tomislav Nad and   
              Stefan Scherz and   
          Martin Schläffer   Differential Attacks on Reduced
                                  RIPEMD-160 . . . . . . . . . . . . . . . 23--38
               Bogdan Groza and   
               Bogdan Warinschi   Revisiting Difficulty Notions for Client
                                  Puzzles and DoS Resilience . . . . . . . 39--54
                Noboru Kunihiro   On Optimal Bounds of Small Inverse
                                  Problems and Approximate GCD Problems
                                  with Higher Degree . . . . . . . . . . . 55--69
             Sanna Suoranta and   
       André Andrade and   
                    Tuomas Aura   Strong Authentication with Mobile Phone  70--85
         Chaitrali Amrutkar and   
            Patrick Traynor and   
           Paul C. van Oorschot   Measuring SSL Indicators on Mobile
                                  Browsers: Extended Life, or End of the
                                  Road?  . . . . . . . . . . . . . . . . . 86--103
                Jens Bender and   
   Özgür Dagdelen and   
              Marc Fischlin and   
             Dennis Kügler   Domain-Specific Pseudonymous Signatures
                                  for the German Identity Card . . . . . . 104--119
                 Falko Strenzke   Solutions for the Storage Problem of
                                  McEliece Public and Private Keys on
                                  Memory-Constrained Platforms . . . . . . 120--135
                Samiran Bag and   
                Aritra Dhar and   
                  Pinaki Sarkar   100% Connectivity for Location Aware
                                  Code Based KPD in Clustered WSN: Merging
                                  Blocks . . . . . . . . . . . . . . . . . 136--150
                   Lei Zhao and   
                  Debin Gao and   
                      Lina Wang   Learning Fine-Grained Structured Input
                                  for Memory Corruption Detection  . . . . 151--167
               Sami Alsouri and   
               Jan Sinschek and   
               Andreas Sewe and   
                Eric Bodden and   
                    Mira Mezini   Dynamic Anomaly Detection for More
                                  Trustworthy Outsourced Computation . . . 168--187
              Jiangang Wang and   
                Xiaohong Li and   
                  Xuhui Liu and   
                Xinshu Dong and   
                Junjie Wang and   
                  Zhenkai Liang   An Empirical Study of Dangerous
                                  Behaviors in Firefox Extensions  . . . . 188--203
              Michael Clear and   
                  Karl Reid and   
              Desmond Ennis and   
              Arthur Hughes and   
                  Hitesh Tewari   Collaboration-Preserving Authenticated
                                  Encryption for Operational
                                  Transformation Systems . . . . . . . . . 204--223
       Christoph Bösch and   
                 Qiang Tang and   
              Pieter Hartel and   
                  Willem Jonker   Selective Document Retrieval from
                                  Encrypted Database . . . . . . . . . . . 224--241
              Andreas Peter and   
               Max Kronberg and   
                 Wilke Trei and   
           Stefan Katzenbeisser   Additively Homomorphic Encryption with a
                                  Double Decryption Mechanism, Revisited   242--257
            Atsushi Fujioka and   
              Taiichi Saito and   
                   Keita Xagawa   Secure Hierarchical Identity-Based
                                  Identification without Random Oracles    258--273
                 E. Ghadafi and   
                    N. P. Smart   Efficient Two-Move Blind Signatures in
                                  the Common Reference String Model  . . . 274--289
                  Jinwei Hu and   
             Khaled M. Khan and   
                    Yun Bai and   
                      Yan Zhang   Compliance Checking for
                                  Usage-Constrained Credentials in Trust
                                  Negotiation Systems  . . . . . . . . . . 290--305
        Peter Drábik and   
           Fabio Martinelli and   
               Charles Morisset   A Quantitative Approach for Inexact
                                  Enforcement of Security Policies . . . . 306--321
                Nezar Nassr and   
            Nidal Aboudagga and   
                 Eric Steegmans   OSDM: An Organizational Supervised
                                  Delegation Model for RBAC  . . . . . . . 322--337
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7484, 2012

            Burkhard Monien and   
           Christian Scheideler   Selfish Distributed Optimization . . . . 1--2
                  Omer Rana and   
           Marios Dikaiakos and   
             Daniel S. Katz and   
                Christine Morin   Topic 1: Support Tools and Environments  3--3
                Yi Wen Wong and   
           Tomasz Dubrownik and   
              Wai Teng Tang and   
                Wen Jun Tan and   
                    Rubing Duan   Tulipse: a Visualization Framework for
                                  User-Guided Parallelization  . . . . . . 4--15
           Fabrizio Marozzo and   
            Francesc Lordan and   
             Roger Rafanell and   
              Daniele Lezzi and   
                 Domenico Talia   Enabling Cloud Interoperability with
                                  COMPSs . . . . . . . . . . . . . . . . . 16--27
         Alexandru Calotoiu and   
          Christian Siebert and   
                     Felix Wolf   Pattern-Independent Detection of Manual
                                  Collectives in MPI Programs  . . . . . . 28--39
        Geoffrey C. Hulette and   
         Matthew J. Sottile and   
                Allen D. Malony   A Type-Based Approach to Separating
                                  Protocol from Application Logic  . . . . 40--51
            Allen D. Malony and   
              Helen Karatza and   
        William Knottenbelt and   
                    Sally McKee   Topic 2: Performance Prediction and
                                  Evaluation . . . . . . . . . . . . . . . 52--53
                    Ami Marowka   Energy Consumption Modeling for Hybrid
                                  Computing  . . . . . . . . . . . . . . . 54--64
            Alvaro Aguilera and   
              Michael Kluge and   
             Thomas William and   
              Wolfgang E. Nagel   HPC File Systems in Wide Area Networks:
                                  Understanding the Performance of Lustre
                                  over WAN . . . . . . . . . . . . . . . . 65--76
               Jeremy Logan and   
               Scott Klasky and   
               Hasan Abbasi and   
                   Qing Liu and   
          George Ostrouchov and   
                Manish Parashar   Understanding I/O Performance Using I/O
                                  Skeletal Applications  . . . . . . . . . 77--88
   Pablo de Oliveira Castro and   
                 Eric Petit and   
     Jean Christophe Beyler and   
                  William Jalby   ASK: Adaptive Sampling Kit for
                                  Performance Characterization . . . . . . 89--101
                 Shuai Jiao and   
                Paolo Ienne and   
                Xiaochun Ye and   
                    Da Wang and   
                Dongrui Fan and   
                    Ninghui Sun   CRAW/P: a Workload Partition Method for
                                  the Efficient Parallel Simulation of
                                  Manycores  . . . . . . . . . . . . . . . 102--114
             Denis Trystram and   
              Ioannis Milis and   
                  Zhihui Du and   
             Uwe Schwiegelshohn   Topic 3: Scheduling and Load Balancing   115--115
          Stephane Chretien and   
            Jean-Marc Nicod and   
           Laurent Philippe and   
       Veronika Rehn-Sonigo and   
                    Lamiel Toch   Job Scheduling Using Successive Linear
                                  Programming Approximations of a Sparse
                                  Model  . . . . . . . . . . . . . . . . . 116--127
                 Eric Angel and   
           Evripidis Bampis and   
                 Fadi Kacem and   
              Dimitrios Letsios   Speed Scaling on Parallel Processors
                                  with Migration . . . . . . . . . . . . . 128--140
               Ankur Narang and   
         Abhinav Srivastava and   
                Ramnik Jain and   
             R. K. Shyamasundar   Dynamic Distributed Scheduling Algorithm
                                  for State Space Search . . . . . . . . . 141--154
            Vladimir Janjic and   
                  Kevin Hammond   Using Load Information in Work-Stealing
                                  on Distributed Systems with Non-uniform
                                  Communication Latencies  . . . . . . . . 155--166
              Peter Sanders and   
                   Jochen Speck   Energy Efficient Frequency Scaling and
                                  Scheduling for Malleable Tasks . . . . . 167--178
        Marcelo Veiga Neves and   
              Tiago Ferreto and   
           César De Rose   Scheduling MapReduce Jobs in HPC
                                  Clusters . . . . . . . . . . . . . . . . 179--190
              Gladys Utrera and   
                Siham Tabik and   
            Julita Corbalan and   
           Jesús Labarta   A Job Scheduling Approach for Multi-core
                                  Clusters Based on Virtual Malleability   191--203
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7485, 2012

                  Xiang Xie and   
                    Rui Xue and   
                      Rui Zhang   Deterministic Public Key Encryption and
                                  Identity-Based Encryption from Lattices
                                  in the Auxiliary-Input Setting . . . . . 1--18
               Craig Gentry and   
                Shai Halevi and   
              Chris Peikert and   
                 Nigel P. Smart   Ring Switching in BGV-Style Homomorphic
                                  Encryption . . . . . . . . . . . . . . . 19--37
         Ivan Damgård and   
       Adriana López-Alt   Zero-Knowledge Proofs with Low Amortized
                                  Communication from Lattice Assumptions   38--56
              Jan Camenisch and   
              Gregory Neven and   
            Markus Rückert   Fully Anonymous Attribute Tokens from
                                  Lattices . . . . . . . . . . . . . . . . 57--75
              Jan Camenisch and   
         Maria Dubovitskaya and   
          Kristiyan Haralambiev   Efficient Structure-Preserving Signature
                                  Scheme from Standard Assumptions . . . . 76--94
              Olivier Blazy and   
          David Pointcheval and   
                Damien Vergnaud   Compact Round-Optimal Partially-Blind
                                  Signatures . . . . . . . . . . . . . . . 95--112
              Marc Fischlin and   
               Anja Lehmann and   
        Dominique Schröder   History-Free Sequential Aggregate
                                  Signatures . . . . . . . . . . . . . . . 113--130
              Melissa Chase and   
              Markulf Kohlweiss   A New Hash-and-Sign Approach and
                                  Structure-Preserving Signatures from
                                  DLIN . . . . . . . . . . . . . . . . . . 131--148
               Steven Myers and   
                 Mona Sergi and   
                    abhi shelat   Blackbox Construction of a More Than
                                  Non-Malleable CCA 1 Encryption Scheme
                                  from Plaintext Awareness . . . . . . . . 149--165
            Duong Hieu Phan and   
          David Pointcheval and   
                 Mario Strefler   Decentralized Dynamic Broadcast
                                  Encryption . . . . . . . . . . . . . . . 166--183
            Kohei Kasamatsu and   
           Takahiro Matsuda and   
                Keita Emura and   
      Nuttapong Attrapadung and   
               Goichiro Hanaoka   Time-Specific Encryption from
                                  Forward-Secure Encryption  . . . . . . . 184--204
        Vladimir Kolesnikov and   
               Ranjit Kumaresan   Improved Secure Two-Party Computation
                                  via Information-Theoretic Garbled
                                  Circuits . . . . . . . . . . . . . . . . 205--221
               Joshua Baron and   
           Karim El Defrawy and   
           Kirill Minkovich and   
           Rafail Ostrovsky and   
                  Eric Tressler   5PM: Secure Pattern Matching . . . . . . 222--240
         Ivan Damgård and   
              Marcel Keller and   
            Enrique Larraia and   
            Christian Miles and   
                 Nigel P. Smart   Implementing AES via an
                                  Actively/Covertly Secure
                                  Dishonest-Majority MPC Protocol  . . . . 241--263
            Seung Geol Choi and   
         Dana Dachman-Soled and   
                      Moti Yung   On the Centrality of Off-Line E-Cash to
                                  Concrete Partial Information Games . . . 264--280
                Ran Canetti and   
                 Margarita Vald   Universally Composable Security with
                                  Local Adversaries  . . . . . . . . . . . 281--301
              Masaya Yasuda and   
          Takeshi Shimoyama and   
                 Jun Kogure and   
                    Tetsuya Izu   On the Strength Comparison of the ECDLP
                                  and the IFP  . . . . . . . . . . . . . . 302--325
           Gottfried Herold and   
               Alexander Meurer   New Attacks for Knapsack Based
                                  Cryptosystems  . . . . . . . . . . . . . 326--342
     Céline Blondeau and   
    Beno\^\it Gérard and   
                   Kaisa Nyberg   Multiple Differential Cryptanalysis
                                  Using LLR and $\chi^2$ Statistics  . . . 343--360
                  Enrico Thomae   Quo Vadis Quaternion? Cryptanalysis of
                                  Rainbow over Non-commutative Rings . . . 361--373
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7486, 2012

                     Dov Gabbay   Bipolar Argumentation Frames and
                                  Contrary to Duty Obligations,
                                  Preliminary Report . . . . . . . . . . . 1--24
              Gerhard Lakemeyer   Multi-agent Only-Knowing . . . . . . . . 25--25
                Emiliano Lorini   Logics for Reasoning about Agents'
                                  Attitudes in Strategic Contexts  . . . . 26--26
                   Isaac Pinyol   A Time-Situated Meta-logic for
                                  Characterizing Goal-Processing Bounded
                                  Agents . . . . . . . . . . . . . . . . . 27--42
                 Ho-Pun Lam and   
          Guido Governatori and   
                      Ken Satoh   Distributed Defeasible Speculative
                                  Reasoning in Ambient Environment . . . . 43--60
               Frank Dignum and   
                Virginia Dignum   A Formal Semantics for Agent
                                  (Re)Organization . . . . . . . . . . . . 61--76
          Dimitar P. Guelev and   
                   Catalin Dima   Epistemic ATL with Perfect Recall, Past
                                  and Strategy Contexts  . . . . . . . . . 77--93
                 Matei Popovici   Using Evolution Graphs for Describing
                                  Topology-Aware Prediction Models in
                                  Large Clusters . . . . . . . . . . . . . 94--109
            Isabelle Mirbel and   
                 Serena Villata   Enhancing Goal-Based Requirements
                                  Consistency: An Argumentation-Based
                                  Approach . . . . . . . . . . . . . . . . 110--127
               Nils Bulling and   
        Michael Köster and   
                 Matei Popovici   A Game Theoretic Approach for Optimal
                                  Network Topologies in Opportunistic
                                  Networks . . . . . . . . . . . . . . . . 128--145
              Martin Homola and   
             Matthias Knorr and   
              João Leite   MKNF Knowledge Bases in Multi-Context
                                  Systems  . . . . . . . . . . . . . . . . 146--162
                 Ben Wright and   
            Enrico Pontelli and   
                   Tran Cao Son   Implementing Reversible Processes in
                                  Multi-agent Action Languages Using
                                  Answer Set Planning  . . . . . . . . . . 163--180
            Cristian Gratie and   
             Adina Magda Florea   Full Hybrid $\mu$-Calculus, Its
                                  Bisimulation Invariance and Application
                                  to Argumentation . . . . . . . . . . . . 181--194
                 Dov Gabbay and   
             Odinaldo Rodrigues   A Numerical Approach to the Merging of
                                  Argumentation Networks . . . . . . . . . 195--212
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7487, 2012

            Magdalena Ortiz and   
                Mantas \vSimkus   Reasoning and Query Answering in
                                  Description Logics . . . . . . . . . . . 1--53
              Georg Gottlob and   
               Giorgio Orsi and   
                 Andreas Pieris   Datalog and Its Extensions for Semantic
                                  Web Databases  . . . . . . . . . . . . . 54--77
             Marcelo Arenas and   
             Jorge Pérez   Federation and Navigation in SPARQL 1.1  78--111
           Markus Krötzsch   OWL 2 Profiles: An Introduction to
                                  Lightweight Ontology Languages . . . . . 112--183
              Sergio Flesca and   
                 Tim Furche and   
                      Linda Oro   Reasoning and Ontologies in Data
                                  Extraction . . . . . . . . . . . . . . . 184--210
                  Guilin Qi and   
                    Jianfeng Du   Reasoning with Uncertain and
                                  Inconsistent OWL Ontologies  . . . . . . 211--244
              Danh Le-Phuoc and   
        Josiane Xavier Parreira   Linked Stream Data Processing  . . . . . 245--289
         Manolis Koubarakis and   
           Manos Karpathiotakis   Data Models and Query Languages for
                                  Linked Geospatial Data . . . . . . . . . 290--328
        François Bry and   
            Sebastian Schaffert   Semantic Wikis: Approaches,
                                  Applications, and Perspectives . . . . . 329--369
                 Francesca Toni   Reasoning on the Web with
                                  Assumption-Based Argumentation . . . . . 370--386
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7488, 2012

             Taylor Cassidy and   
                    Heng Ji and   
                Hongbo Deng and   
                 Jing Zheng and   
                     Jiawei Han   Analysis and Refinement of Cross-Lingual
                                  Entity Linking . . . . . . . . . . . . . 1--12
             Ragnar Nordlie and   
                     Nils Pharo   Seven Years of INEX Interactive
                                  Retrieval Experiments --- Lessons and
                                  Challenges . . . . . . . . . . . . . . . 13--23
              Allan Hanbury and   
        Henning Müller and   
                Georg Langs and   
    Marc André Weber and   
                Bjoern H. Menze   Bringing the Algorithms to the Data:
                                  Cloud--Based Benchmarking for Medical
                                  Image Analysis . . . . . . . . . . . . . 24--29
      Julia J. Jürgens and   
              Preben Hansen and   
          Christa Womser-Hacker   Going beyond CLEF-IP: The `Reality' for
                                  Patent Searchers?  . . . . . . . . . . . 30--35
                Nicola Orio and   
         Cynthia C. S. Liem and   
           Geoffroy Peeters and   
                  Markus Schedl   MusiClef: Multimodal Music Tagging Task  36--41
          Richard Berendsen and   
             Manos Tsagkias and   
           Maarten de Rijke and   
                     Edgar Meij   Generating Pseudo Test Collections for
                                  Learning to Rank Scientific Articles . . 42--53
              Florina Piroi and   
                 Mihai Lupu and   
                  Allan Hanbury   Effects of Language and Topic Size in
                                  Patent IR: An Empirical Study  . . . . . 54--66
                Parth Gupta and   
Alberto Barrón-Cedeño and   
                    Paolo Rosso   Cross-Language High Similarity Search
                                  Using a Conceptual Thesaurus . . . . . . 67--75
              Anita Keszler and   
      Levente Kovács and   
   Tamás Szirányi   The Appearance of the Giant Component in
                                  Descriptor Graphs and Its Application
                                  for Descriptor Selection . . . . . . . . 76--81
               Xueliang Yan and   
               Guanglai Gao and   
               Xiangdong Su and   
                 Hongxi Wei and   
             Xueliang Zhang and   
                    Qianqian Lu   Hidden Markov Model for Term Weighting
                                  in Verbose Queries . . . . . . . . . . . 82--87
          Maristella Agosti and   
         Emanuele Di Buccio and   
               Nicola Ferro and   
              Ivano Masiero and   
                 Simone Peruzzo   DIRECTions: Design and Specification of
                                  an IR Evaluation Infrastructure  . . . . 88--99
Petra Galu\vs\vcáková and   
               Pavel Pecina and   
                    Jan Haji\vc   Penalty Functions for Evaluation
                                  Measures of Unsegmented Speech Retrieval 100--111
             Marco Angelini and   
               Nicola Ferro and   
      Kalervo Järvelin and   
          Heikki Keskustalo and   
                    Ari Pirkola   Cumulated Relative Position: a Metric
                                  for Ranking Evaluation . . . . . . . . . 112--123
                 Philipp Schaer   Better than Their Reputation? On the
                                  Reliability of Relevance Assessments
                                  with Students  . . . . . . . . . . . . . 124--135
          Jens Kürsten and   
                Maximilian Eibl   Comparing IR System Components Using
                                  Beanplots  . . . . . . . . . . . . . . . 136--137
             Pinaki Bhaskar and   
           Sivaji Bandyopadhyay   Language Independent Query Focused
                                  Snippet Generation . . . . . . . . . . . 138--140
      Solange de L. Pertile and   
             Viviane P. Moreira   A Test Collection to Evaluate Plagiarism
                                  by Missing or Incorrect References . . . 141--143
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7489, 2012

               Michael Khoo and   
                 Catherine Hall   What Would `Google' Do? Users' Mental
                                  Models of a Digital Library Search
                                  Engine . . . . . . . . . . . . . . . . . 1--12
                 Dana McKay and   
               Annika Hinze and   
                 Ralf Heese and   
     Nicholas Vanderschantz and   
                 Claire Timpany   An Exploration of ebook Selection
                                  Behavior in Academic Library Collections 13--24
              Fernando Loizides   Information Seekers' Visual Focus during
                                  Time Constraint Document Triage  . . . . 25--31
             Nina Tahmasebi and   
             Gerhard Gossen and   
                   Thomas Risse   Which Words Do You Remember? Temporal
                                  Properties of Language Use in Digital
                                  Archives . . . . . . . . . . . . . . . . 32--37
                    Dongwon Lee   Toward Mobile-Friendly Libraries: The
                                  Status Quo . . . . . . . . . . . . . . . 38--50
               Annika Hinze and   
               David Bainbridge   Listen to Tipple: Creating a Mobile
                                  Digital Library with Location-Triggered
                                  Audio Books  . . . . . . . . . . . . . . 51--56
               Annika Hinze and   
                     Amay Dighe   Re-finding Physical Documents: Extending
                                  a Digital Library into a Human-Centred
                                  Workplace  . . . . . . . . . . . . . . . 57--63
           Mark S. Sweetnam and   
          Maristella Agosti and   
                Nicola Orio and   
             Chiara Ponchia and   
           Christina M. Steiner   User Needs for Enhanced Engagement with
                                  Cultural Heritage Collections  . . . . . 64--75
                 Anne Adams and   
                 Pauline Ngimwa   Digital Library Sustainability and
                                  Design Processes . . . . . . . . . . . . 76--88
               Adam Dudczak and   
           Mi\losz Kmieciak and   
                   Marcin Werla   Creation of Textual Versions of
                                  Historical Documents from Polish Digital
                                  Libraries  . . . . . . . . . . . . . . . 89--94
         Marco Büchler and   
              Gregory Crane and   
               Maria Moritz and   
                   Alison Babeu   Increasing Recall for Text Re-use in
                                  Historical Documents to Support Research
                                  in the Humanities  . . . . . . . . . . . 95--100
                   Anqi Cui and   
                 Liner Yang and   
                  Dejun Hou and   
                Min-Yen Kan and   
                  Yiqun Liu and   
                  Min Zhang and   
                    Shaoping Ma   PrEV: Preservation Explorer and Vault
                                  for Web 2.0 User-Generated Content . . . 101--112
               Rudolf Mayer and   
             Andreas Rauber and   
   Martin Alexander Neumann and   
               John Thomson and   
         Gonçalo Antunes   Preserving Scientific Processes from
                                  Design to Publications . . . . . . . . . 113--124
        Hany M. SalahEldeen and   
              Michael L. Nelson   Losing My Revolution: How Many Resources
                                  Shared on Social Media Have Been Lost?   125--137
              Maria Sumbana and   
Marcos André Gonçalves and   
              Rodrigo Silva and   
            Jussara Almeida and   
                 Adriano Veloso   Automatic Vandalism Detection in
                                  Wikipedia with Active Associative
                                  Classification . . . . . . . . . . . . . 138--143
             Electra Sutton and   
             Chloe Reynolds and   
             Fredric C. Gey and   
                  Ray R. Larson   Applying Digital Library Technologies to
                                  Nuclear Forensics  . . . . . . . . . . . 144--149
            Katarina Boland and   
            Dominique Ritze and   
                 Kai Eckert and   
               Brigitte Mathiak   Identifying References to Datasets in
                                  Publications . . . . . . . . . . . . . . 150--161
                  M. Mahoui and   
             C. Boston-Clay and   
                   R. Stein and   
                  N. Tirupattur   Collaborative Tagging of Art Digital
                                  Libraries: Who Should Be Tagging?  . . . 162--172
         Emanuele Di Buccio and   
    Giorgio Maria Di Nunzio and   
             Gianmaria Silvello   A System for Exposing Linguistic Linked
                                  Open Data  . . . . . . . . . . . . . . . 173--178
                Richard Gartner   Linking the Parliamentary Record: a New
                                  Approach to Metadata for Legislative
                                  Proceedings  . . . . . . . . . . . . . . 179--184
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7490, 2012

                  William Gropp   MPI 3 and Beyond: Why MPI Is Successful
                                  and What Challenges It Faces . . . . . . 1--9
            Ulrich Brüning   MPI Functions and Their Impact on
                                  Interconnect Hardware  . . . . . . . . . 10--10
                Shinji Sumimoto   The MPI Communication Library for the K
                                  Computer: Its Design and Implementation  11--11
                Anthony Danalis   MPI and Compiler Technology: a Love-Hate
                                  Relationship . . . . . . . . . . . . . . 12--13
              William Gropp and   
                 Ewing Lusk and   
                  Rajeev Thakur   Advanced MPI Including New MPI-3
                                  Features . . . . . . . . . . . . . . . . 14--14
              Markus Geimer and   
             Michael Gerndt and   
              Sameer Shende and   
                Bert Wesarg and   
                    Brian Wylie   Hands-on Practical Hybrid Parallel
                                  Application Performance Engineering  . . 15--15
                   Xin Zhao and   
Gopalakrishnan Santhanaraman and   
                  William Gropp   Adaptive Strategy for One-Sided
                                  Communication in MPICH2  . . . . . . . . 16--26
           Brian W. Barrett and   
             Ron Brightwell and   
             Keith D. Underwood   A Low Impact Flow Control Implementation
                                  for Offload Communication Interfaces . . 27--36
            Sylvain Didelot and   
         Patrick Carribault and   
        Marc Pérache and   
                  William Jalby   Improving MPI Communication Overlap with
                                  Collaborative Polling  . . . . . . . . . 37--46
           Kazumi Yoshinaga and   
             Yuichi Tsujita and   
               Atsushi Hori and   
                Mikiko Sato and   
                  Mitaro Namiki   Delegation-Based MPI Communications for
                                  a Hybrid Parallel Computer with
                                  Many-Core Architecture . . . . . . . . . 47--56
                James Dinan and   
              David Goodell and   
              William Gropp and   
              Rajeev Thakur and   
                   Pavan Balaji   Efficient Multithreaded Context ID
                                  Allocation in MPI  . . . . . . . . . . . 57--66
                Nikhil Jain and   
               JohnMark Lau and   
                 Laxmikant Kale   Collectives on Two-Tier Direct Networks  67--77
 Manjunath Gorentla Venkata and   
          Richard L. Graham and   
             Joshua S. Ladd and   
                   Pavel Shamis   Exploiting Atomic Operations for Barrier
                                  on Cray XE/XK Systems  . . . . . . . . . 78--88
          Simone Pellegrini and   
            Torsten Hoefler and   
               Thomas Fahringer   Exact Dependence Analysis for Increased
                                  Communication Overlap  . . . . . . . . . 89--99
      Jesper Larsson Träff   \tt mpicroscope: Towards an MPI
                                  Benchmark Tool for Performance Guideline
                                  Verification . . . . . . . . . . . . . . 100--109
                 D. Bureddy and   
                    H. Wang and   
               A. Venkatesh and   
                 S. Potluri and   
                    D. K. Panda   OMB-GPU: a Micro-Benchmark Suite for
                                  Evaluating MPI Libraries on GPU Clusters 110--120
             Timo Schneider and   
       Robert Gerstenberger and   
                Torsten Hoefler   Micro-applications for Communication
                                  Data Access Patterns and MPI Datatypes   121--131
            Torsten Hoefler and   
                James Dinan and   
            Darius Buntinas and   
               Pavan Balaji and   
               Brian W. Barrett   Leveraging MPI's One-Sided Communication
                                  Interface for Shared-Memory Programming  132--141
Isaías A. Comprés Ureña and   
             Michael Gerndt and   
               Carsten Trinitis   Wait-Free Message Passing Protocol for
                                  Non-coherent Shared Memory Architectures 142--152
               Atsushi Hori and   
          Toyohisa Kameyama and   
             Yuichi Tsujita and   
              Mitaro Namiki and   
                Yutaka Ishikawa   An Efficient Kernel-Level Blocking MPI
                                  Implementation . . . . . . . . . . . . . 153--162
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7491, 2012

             Tobias Glasmachers   Convergence of the IGO-Flow of Isotropic
                                  Gaussian Distributions on Convex
                                  Quadratic Problems . . . . . . . . . . . 1--10
            Andrea Mambrini and   
               Dirk Sudholt and   
                        Xin Yao   Homogeneous and Heterogeneous Island
                                  Models for the Set Cover Problem . . . . 11--20
           Alberto Moraglio and   
          Krzysztof Krawiec and   
               Colin G. Johnson   Geometric Semantic Genetic Programming   21--31
                Johannes Textor   Efficient Negative Selection Algorithms
                                  by Sampling and Approximate Counting . . 32--41
             Youhei Akimoto and   
                 Anne Auger and   
                Nikolaus Hansen   Convergence of the Continuous Time
                                  Trajectories of Isotropic Evolution
                                  Strategies on Monotonic
                                  $\mathcal{C}^2$-composite Functions  . . 42--51
           Andrew M. Sutton and   
                  Frank Neumann   A Parameterized Runtime Analysis of
                                  Simple Evolutionary Algorithms for
                                  Makespan Scheduling  . . . . . . . . . . 52--61
                  Chao Qian and   
                    Yang Yu and   
                   Zhi-Hua Zhou   On Algorithm-Dependent Boundary Case
                                  Identification for Problem Classes . . . 62--71
          Alexandre Chotard and   
                 Anne Auger and   
                Nikolaus Hansen   Cumulative Step-Size Adaptation on
                                  Linear Functions . . . . . . . . . . . . 72--81
                 Dirk V. Arnold   On the Behaviour of the $(1, \lambda) -
                                  \sigma$ SA-ES for a Constrained Linear
                                  Problem  . . . . . . . . . . . . . . . . 82--91
            Darrell Whitley and   
              Wenxiang Chen and   
                     Adele Howe   An Empirical Evaluation of $O(1)$
                                  Steepest Descent for NK-Landscapes . . . 92--101
               Tommaso Urli and   
              Markus Wagner and   
                  Frank Neumann   Experimental Supplements to the
                                  Computational Complexity Analysis of
                                  Genetic Programming for Problems
                                  Modelling Isolated Program Semantics . . 102--112
          Timo Kötzing and   
                 Hendrik Molter   ACO Beats EA on a Dynamic Pseudo-Boolean
                                  Function . . . . . . . . . . . . . . . . 113--122
             Dimo Brockhoff and   
Manuel López-Ibáñez and   
              Boris Naujoks and   
            Günter Rudolph   Runtime Analysis of Simple Interactive
                                  Evolutionary Biobjective Optimization
                                  Algorithms . . . . . . . . . . . . . . . 123--132
              Markus Wagner and   
                  Frank Neumann   Parsimony Pressure versus
                                  Multi-objective Optimization for
                                  Variable Length Representations  . . . . 133--142
             Alessia Amelio and   
                  Clara Pizzuti   An Evolutionary and Graph-Based Method
                                  for Image Segmentation . . . . . . . . . 143--152
           Roberto Ugolotti and   
       Youssef S. G. Nashed and   
                Stefano Cagnoni   Real-Time GPU Based Road Sign Detection
                                  and Classification . . . . . . . . . . . 153--162
          Michaela Sikulova and   
                 Lukas Sekanina   Acceleration of Evolutionary Image
                                  Filter Design Using Coevolution in
                                  Cartesian GP . . . . . . . . . . . . . . 163--172
             Martin Pelikan and   
          Mark W. Hauschild and   
                Pier Luca Lanzi   Transfer Learning, Soft Distance-Based
                                  Bias, and the Hierarchical BOA . . . . . 173--183
               Markus Thill and   
               Patrick Koch and   
                 Wolfgang Konen   Reinforcement Learning with $N$-tuples
                                  on the Game Connect-$4$  . . . . . . . . 184--194
               Patrick Koch and   
                 Wolfgang Konen   Efficient Sampling and Handling of
                                  Variance in Tuning Data Mining Models    195--205
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7492, 2012

              Kalyanmoy Deb and   
             Sunith Bandaru and   
                Cem Celal Tutum   Temporal Evolution of Design Principles
                                  in Engineering Systems: Analogies with
                                  Human Evolution  . . . . . . . . . . . . 1--10
             Antony Waldock and   
                 David W. Corne   Exploiting Prior Information in
                                  Multi-objective Route Planning . . . . . 11--21
             Naoya Kowatari and   
                Akira Oyama and   
      Hernán Aguirre and   
                 Kiyoshi Tanaka   Analysis on Population Size and
                                  Neighborhood Recombination on
                                  Many-Objective Optimization  . . . . . . 22--31
                Julia Handl and   
                 Joshua Knowles   Clustering Criteria in Multiobjective
                                  Data Clustering  . . . . . . . . . . . . 32--41
               Adam Ghandar and   
       Zbigniew Michalewicz and   
                 Ralf Zurbruegg   Enhancing Profitability through
                                  Interpretability in Algorithmic Trading
                                  with a Multiobjective Evolutionary Fuzzy
                                  System . . . . . . . . . . . . . . . . . 42--51
              Shlomo Israel and   
                Amiram Moshaiov   Bootstrapping Aggregate Fitness
                                  Selection with Evolutionary
                                  Multi-Objective Optimization . . . . . . 52--61
                   Wei Peng and   
                   Qingfu Zhang   Network Topology Planning Using MOEA/D
                                  with Objective-Guided Operators  . . . . 62--71
             Hoang N. Luong and   
             Peter A. N. Bosman   Elitist Archiving for Multi-Objective
                                  Evolutionary Algorithms: To Adapt or Not
                                  to Adapt . . . . . . . . . . . . . . . . 72--81
          Mario Garza-Fabre and   
    Eduardo Rodriguez-Tello and   
        Gregorio Toscano-Pulido   An Improved Multiobjectivization
                                  Strategy for HP Model-Based Protein
                                  Structure Prediction . . . . . . . . . . 82--92
                     Hui Li and   
                 Xiaolei Su and   
                 Zongben Xu and   
                   Qingfu Zhang   MOEA/D with Iterative Thresholding
                                  Algorithm for Sparse Optimization
                                  Problems . . . . . . . . . . . . . . . . 93--101
     Alessandro G. Di Nuovo and   
             Giuseppe Ascia and   
               Vincenzo Catania   A Study on Evolutionary Multi-Objective
                                  Optimization with Fuzzy Approximation
                                  for Computational Expensive Problems . . 102--111
    Panwadee Tangpattanakul and   
         Nicolas Jozefowiez and   
                   Pierre Lopez   Multi-objective Optimization for
                                  Selecting and Scheduling Observations by
                                  Agile Earth Observing Satellites . . . . 112--121
            Amiram Moshaiov and   
                     Yafit Snir   Tailoring $\epsilon$-MOEA to
                                  Concept-Based Problems . . . . . . . . . 122--131
            Hisao Ishibuchi and   
                Naoya Akedo and   
                  Yusuke Nojima   Recombination of Similar Parents in
                                  SMS-EMOA on Many-Objective 0/1 Knapsack
                                  Problems . . . . . . . . . . . . . . . . 132--142
     Francisco J. Rodriguez and   
Carlos García-Martínez and   
             Christian Blum and   
                  Manuel Lozano   An Artificial Bee Colony Algorithm for
                                  the Unrelated Parallel Machines
                                  Scheduling Problem . . . . . . . . . . . 143--152
        Carlos M. Fernandes and   
             Juan J. Merelo and   
              Agostinho C. Rosa   Controlling the Parameters of the
                                  Particle Swarm Optimization with a
                                  Self-Organized Criticality Model . . . . 153--163
              Andrew McNabb and   
                    Kevin Seppi   The Apiary Topology: Emergent Behavior
                                  in Communities of Particle Swarms  . . . 164--173
             Shigeyoshi Tsutsui   ACO on Multiple GPUs with CUDA for
                                  Faster Solution of QAPs  . . . . . . . . 174--184
                    Jan Bim and   
         Giorgos Karafotias and   
                 S. K. Smit and   
                A. E. Eiben and   
                 Evert Haasdijk   It's Fate: a Self-organising
                                  Evolutionary Algorithm . . . . . . . . . 185--194
           Alan P. Reynolds and   
        Asaad Abdollahzadeh and   
             David W. Corne and   
              Mike Christie and   
                   Brian Davies   Guide Objective Assisted Particle Swarm
                                  Optimization and Its Application to
                                  History Matching . . . . . . . . . . . . 195--204
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7493, 2012

                Lars Bollen and   
             Hannie Gijlers and   
           Wouter van Joolingen   Computer-Supported Collaborative Drawing
                                  in Primary School Education ---
                                  Technical Realization and Empirical
                                  Findings . . . . . . . . . . . . . . . . 1--16
         Katharina Emmerich and   
              Katja Neuwald and   
          Julia Othlinghaus and   
           Sabrina Ziebarth and   
                H. Ulrich Hoppe   Training Conflict Management in a
                                  Collaborative Virtual Environment  . . . 17--32
       Osmel Bordiés and   
          Eloy Villasclaras and   
         Yannis Dimitriadis and   
            Adolfo Ruiz-Calleja   Reusability of Data Flow Designs in
                                  Complex CSCL Scripts: Evaluation Results
                                  from a Case Study  . . . . . . . . . . . 33--40
               Armando Cruz and   
     António Correia and   
               Hugo Paredes and   
           Benjamim Fonseca and   
                 Leonel Morgado   Towards an Overarching Classification
                                  Model of CSCW and Groupware: a
                                  Socio-technical Perspective  . . . . . . 41--56
            Alexander Nolte and   
                 Michael Prilla   Normal Users Cooperating on Process
                                  Models: Is It Possible at All? . . . . . 57--72
        Francisco Gutierrez and   
             Nelson Baloian and   
            Sergio F. Ochoa and   
                 Gustavo Zurita   Designing the Software Support for
                                  Partially Virtual Communities  . . . . . 73--88
                 Michael Prilla   Supporting Social Tasks of Individuals:
                                  a Matter of Access to Cooperation
                                  Systems  . . . . . . . . . . . . . . . . 89--96
           Gustavo A. Oliva and   
       Francisco W. Santana and   
    Kleverton C. M. de Oliveira   Characterizing Key Developers: a Case
                                  Study with Apache Ant  . . . . . . . . . 97--112
 Andréa M. Magdaleno and   
           Renata M. Araujo and   
    Cláudia M. L. Werner   An Exploratory Study on Collaboration
                                  Understanding in Software Development
                                  Social Networks  . . . . . . . . . . . . 113--120
                    Shi Shi and   
          Thomas Largillier and   
               Julita Vassileva   Keeping Up with Friends' Updates on
                                  Facebook . . . . . . . . . . . . . . . . 121--128
            Benjamin Weyers and   
             Wolfram Luther and   
             Nelson Baloian and   
                   Jose A. Pino   Formal Modeling of Multi-user Interfaces
                                  in Cooperative Work  . . . . . . . . . . 129--136
          Thomas Largillier and   
               Julita Vassileva   Using Collective Trust for Group
                                  Formation  . . . . . . . . . . . . . . . 137--144
     Irene-Angelica Chounta and   
               Nikolaos Avouris   Time Series Analysis of Collaborative
                                  Activities . . . . . . . . . . . . . . . 145--152
             Andreas Harrer and   
              Thomas Irgang and   
             Norbert Sattes and   
                Kerstin Pfahler   SoCCR --- Optimistic Concurrency Control
                                  for the Web-Based Collaborative
                                  Framework Metafora . . . . . . . . . . . 153--160
                Lars Bollen and   
          Sabrina C. Eimler and   
                Marc Jansen and   
                     Jan Engler   Enabling and Evaluating Mobile Learning
                                  Scenarios with Multiple Input Channels   161--175
    Didac Gil de La Iglesia and   
             Marcelo Milrad and   
               Jesper Andersson   Software Requirements to Support QoS in
                                  Collaborative M-Learning Activities  . . 176--183
             Dan Kohen-Vacs and   
              Arianit Kurti and   
             Marcelo Milrad and   
                     Miky Ronen   Systems Integration Challenges for
                                  Supporting Cross Context Collaborative
                                  Pedagogical Scenarios  . . . . . . . . . 184--191
              Daniel Cernea and   
                Simone Mora and   
              Alfredo Perez and   
                Achim Ebert and   
             Andreas Kerren and   
                Monica Divitini   Tangible and Wearable User Interfaces
                                  for Supporting Collaboration among
                                  Emergency Workers  . . . . . . . . . . . 192--199
Sírius Thadeu Ferreira da Silva and   
            Jonice Oliveira and   
            Marcos R. S. Borges   Contextual Analysis of the Victims'
                                  Social Network for People Recommendation
                                  on the Emergency Scenario  . . . . . . . 200--207
           Sabrina Ziebarth and   
               Nils Malzahn and   
                H. Ulrich Hoppe   Matchballs --- a Multi-Agent-System for
                                  Ontology-Based Collaborative Learning
                                  Games  . . . . . . . . . . . . . . . . . 208--222
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7494, 2012

              Todd J. Green and   
                Molham Aref and   
         Grigoris Karvounarakis   LogicBlox, Platform and Language: a
                                  Tutorial . . . . . . . . . . . . . . . . 1--8
                  Yuri Gurevich   Datalog: a Perspective and the Potential 9--20
            Marie-Laure Mugnier   Existential Rules: a Graph-Based View    21--26
                  Axel Polleres   How (Well) Do Datalog, SPARQL and RIF
                                  Interplay? . . . . . . . . . . . . . . . 27--30
              Mario Alviano and   
               Nicola Leone and   
                Marco Manna and   
          Giorgio Terracina and   
           Pierfrancesco Veltri   Magic-Sets for Datalog with Existential
                                  Quantifiers  . . . . . . . . . . . . . . 31--43
             Tom J. Ameloot and   
            Jan Van den Bussche   On the CRON Conjecture . . . . . . . . . 44--55
                   Stefan Brass   Order in Datalog with Applications to
                                  Declarative Output . . . . . . . . . . . 56--67
            Cristina Civili and   
                Riccardo Rosati   A Broad Class of First-Order Rewritable
                                  Tuple-Generating Dependencies  . . . . . 68--80
           Onofrio Febbraro and   
            Giovanni Grasso and   
               Nicola Leone and   
             Kristian Reale and   
                Francesco Ricca   Datalog Development Tools  . . . . . . . 81--85
             Jaffer Gardezi and   
              Leopoldo Bertossi   Query Rewriting Using Datalog for
                                  Duplicate Resolution . . . . . . . . . . 86--98
              Matteo Interlandi   Reasoning about Knowledge in Distributed
                                  Systems Using Datalog  . . . . . . . . . 99--110
           Sven Köhler and   
     Bertram Ludäscher and   
             Yannis Smaragdakis   Declarative Datalog Debugging for Mere
                                  Mortals  . . . . . . . . . . . . . . . . 111--122
         Thomas Lukasiewicz and   
      Maria Vanina Martinez and   
              Gerardo I. Simari   Inconsistency-Tolerant Query Rewriting
                                  for Linear Datalog$\pm$  . . . . . . . . 123--134
         William R. Marczak and   
               Peter Alvaro and   
                Neil Conway and   
      Joseph M. Hellerstein and   
                    David Maier   Confluence Analysis for Distributed
                                  Programs: a Model-Theoretic Approach . . 135--147
              Daniel Ritter and   
                  Till Westmann   Business Network Reconstruction Using
                                  Datalog  . . . . . . . . . . . . . . . . 148--152
           Domenico Sacc\`a and   
                  Edoardo Serra   Data Exchange in Datalog Is Mainly a
                                  Matter of Choice . . . . . . . . . . . . 153--164
              Marianne Shaw and   
          Paraschos Koutris and   
                  Bill Howe and   
                      Dan Suciu   Optimizing Large-Scale Semi-Na\"\ive
                                  Datalog Evaluation in Hadoop . . . . . . 165--176
                  Carlo Zaniolo   Logical Foundations of Continuous Query
                                  Languages for Data Streams . . . . . . . 177--189
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7495, 2012

             Jan M. Baetens and   
               Bernard De Baets   Topological Perturbations and Their
                                  Effect on the Dynamics of Totalistic
                                  Cellular Automata  . . . . . . . . . . . 1--10
                Sukanta Das and   
           Avik Chakraborty and   
               Biplab K. Sikdar   Counting Cycles in Reversible Cellular
                                  Automata . . . . . . . . . . . . . . . . 11--19
Dominique Désérable   Propagative Mode in a Lattice-Grain CA:
                                  Time Evolution and Timestep
                                  Synchronization  . . . . . . . . . . . . 20--31
           Toshikazu Ishida and   
               Shuichi Inokuchi   Limit Cycle for Composited Cellar
                                  Automata . . . . . . . . . . . . . . . . 32--41
              Martin Kutrib and   
                Andreas Malcher   Iterative Arrays: Little Resources Big
                                  Size Impact  . . . . . . . . . . . . . . 42--51
           Debdeep Mukhopadhyay   Generating Expander Graphs Using
                                  Cellular Automata  . . . . . . . . . . . 52--62
               Nazma Naskar and   
           Avik Chakraborty and   
              Pradipta Maji and   
                    Sukanta Das   Analysis of Reachability Tree for
                                  Identification of Cyclic and Acyclic CA
                                  States . . . . . . . . . . . . . . . . . 63--72
                  Fumio Ohi and   
              Takanori Ichikawa   Confliction-Like Dynamics of Rule 20 ECA
                                  of Wolfram Class II  . . . . . . . . . . 73--82
              Susumu Adachi and   
                    Jia Lee and   
            Ferdinand Peper and   
            Teijiro Isokawa and   
                 Katsunobu Imai   Determining the Critical Temperature of
                                  the Continuous-State Game of Life  . . . 83--90
          Tomasz M. Gwizda\l\la   The Dynamics of Disproportionality Index
                                  for Cellular Automata Based
                                  Sociophysical Models . . . . . . . . . . 91--100
            Luidnel Maignan and   
          Jean-Baptiste Yun\`es   A Spatio-temporal Algorithmic Point of
                                  View on Firing Squad Synchronisation
                                  Problem  . . . . . . . . . . . . . . . . 101--110
        Gina M. B. Oliveira and   
                Paulo M. Vidica   A Coevolutionary Approach to Cellular
                                  Automata-Based Task Scheduling . . . . . 111--120
              Anna Piwonska and   
      Franciszek Seredynski and   
                Miroslaw Szaban   Searching Cellular Automata Rules for
                                  Solving Two-Dimensional Binary
                                  Classification Problem . . . . . . . . . 121--130
       Epaminondas Sidiropoulos   Multi-objective Cellular Automata
                                  Optimization . . . . . . . . . . . . . . 131--140
            Stylianos Scarlatos   Behavior of Social Dynamical Models I:
                                  Fixation in the Symmetric Cyclic System  141--150
           Adam Adamopoulos and   
            Stylianos Scarlatos   Behavior of Social Dynamical Models II:
                                  Clustering for Some Multitype Particle
                                  Systems with Confidence Threshold  . . . 151--160
         Anastasiya Sharifulina   Investigation of Stable Patterns Formed
                                  by Totalistic Cellular Automata
                                  Evolution  . . . . . . . . . . . . . . . 161--170
               Hiroshi Umeo and   
                   Keisuke Kubo   Recent Developments in Constructing
                                  Square Synchronizers . . . . . . . . . . 171--183
Baltasar Trancón y Widemann   Structural Operational Semantics for
                                  Cellular Automata  . . . . . . . . . . . 184--193
             Machi Zawidzki and   
            Katsuhiro Nishinari   Controlling the Opacity of a Building
                                  Envelope by a Triangular Two-Color
                                  Two-Dimensional Cellular Automaton . . . 194--203
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7496, 2012

                   Masayuki Abe   Tools over Bilinear Groups for Modular
                                  Design of Cryptographic Tasks  . . . . . 1--1
           Dennis Y. W. Liu and   
                 Duncan S. Wong   One-Move Convertible Nominative
                                  Signature in the Standard Model  . . . . 2--20
               Shengke Zeng and   
               Zhiguang Qin and   
                    Qing Lu and   
                       Qinyi Li   Efficient and Random Oracle-Free
                                  Conditionally Anonymous Ring Signature   21--34
     S. Sharmila Deva Selvi and   
              S. Sree Vivek and   
  Dhinakaran Vinayagamurthy and   
                C. Pandu Rangan   ID Based Signcryption Scheme in Standard
                                  Model  . . . . . . . . . . . . . . . . . 35--52
                 Cheng Chen and   
                   Jie Chen and   
               Hoon Wei Lim and   
             Zhenfeng Zhang and   
                   Dengguo Feng   Combined Public-Key Schemes: The Case of
                                  ABE and ABS  . . . . . . . . . . . . . . 53--69
             Ioana Boureanu and   
                 Serge Vaudenay   Several Weak Bit-Commitments Using
                                  Seal-Once Tamper-Evident Devices . . . . 70--87
                 Margus Niitsoo   Deterministic Random Oracles . . . . . . 88--103
                 Oana Ciobotaru   On the (Non-)Equivalence of UC Security
                                  Notions  . . . . . . . . . . . . . . . . 104--124
                    Bo Yang and   
                   Mingwu Zhang   LR-UESDE: a Continual-Leakage Resilient
                                  Encryption with Unbounded Extensible Set
                                  Delegation . . . . . . . . . . . . . . . 125--142
                    Yu Chen and   
             Zongyang Zhang and   
                Dongdai Lin and   
                     Zhenfu Cao   Anonymous Identity-Based Hash Proof
                                  System and Its Applications  . . . . . . 143--160
               Yunmei Zhang and   
              Joseph K. Liu and   
                Xinyi Huang and   
                  Man Ho Au and   
                   Willy Susilo   Efficient Escrow-Free Identity-Based
                                  Signature  . . . . . . . . . . . . . . . 161--174
             Mototsugu Nishioka   Perfect Keyword Privacy in PEKS Systems  175--192
               Tapas Pandit and   
                     Rana Barua   Efficient Fully Secure Attribute-Based
                                  Encryption Schemes for General Access
                                  Structures . . . . . . . . . . . . . . . 193--214
           Masayuki Yoshino and   
            Noboru Kunihiro and   
               Ken Naganuma and   
                 Hisayoshi Sato   Symmetric Inner-Product Predicate
                                  Encryption Based on Three Groups . . . . 215--234
              Takanori Suga and   
            Takashi Nishide and   
                Kouichi Sakurai   Secure Keyword Search Using Bloom Filter
                                  with Specified Character Positions . . . 235--252
                 Cheng Chen and   
             Zhenfeng Zhang and   
                   Dengguo Feng   Fully Secure Doubly-Spatial Encryption
                                  under Simple Assumptions . . . . . . . . 253--263
                 Zheng Yang and   
              Jörg Schwenk   Strongly Authenticated Key Exchange
                                  Protocol from Bilinear Groups without
                                  Random Oracles . . . . . . . . . . . . . 264--275
                 Yanfei Guo and   
                 Zhenfeng Zhang   Authenticated Key Exchange with Entities
                                  from Different Settings and Varied
                                  Groups . . . . . . . . . . . . . . . . . 276--287
 Mohammad Reza Reyhanitabar and   
                   Willy Susilo   On Capabilities of Hash Domain Extenders
                                  to Preserve Enhanced Security Properties 288--299
               Zhaohui Tang and   
               Hoon Wei Lim and   
                  Huaxiong Wang   Revisiting a Secret Sharing Approach to
                                  Network Codes  . . . . . . . . . . . . . 300--317
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7497, 2012

                 Gerhard Brewka   Multi-context Systems: Specifying the
                                  Interaction of Knowledge Bases
                                  Declaratively  . . . . . . . . . . . . . 1--4
                Tommaso Di Noia   Semantic Matchmaking and Ranking: Beyond
                                  Deduction in Retrieval Scenarios . . . . 5--8
           Stefan Borgwardt and   
         Rafael Peñaloza   A Tableau Algorithm for Fuzzy
                                  Description Logics over Residuated De
                                  Morgan Lattices  . . . . . . . . . . . . 9--24
            Diego Calvanese and   
        Giuseppe De Giacomo and   
             Domenico Lembo and   
              Marco Montali and   
                   Ario Santoso   Ontology-Based Governance of Data-Aware
                                  Processes  . . . . . . . . . . . . . . . 25--41
            Cristina Civili and   
                Riccardo Rosati   Query Patterns for Existential Rules . . 42--57
               Thomas Eiter and   
               Michael Fink and   
                Daria Stepanova   Semantic Independence in DL-Programs . . 58--74
Víctor Gutiérrez-Basulto and   
Yazmín Angélica Ibáñez-García and   
               Roman Kontchakov   An Update on Query Answering with
                                  Restricted Forms of Negation . . . . . . 75--89
Víctor Gutiérrez-Basulto and   
                 Szymon Klarman   Towards a Unifying Approach to
                                  Representing and Querying Temporal Data
                                  in Description Logics  . . . . . . . . . 90--105
              Tomi Janhunen and   
                  Vesa Luukkala   Meta Programming with Answer Sets for
                                  Smart Spaces . . . . . . . . . . . . . . 106--121
  Mélanie König and   
           Michel Lecl\`ere and   
        Marie-Laure Mugnier and   
           Michaël Thomazo   A Sound and Complete Backward Chaining
                                  Algorithm for Existential Rules  . . . . 122--138
               Senlin Liang and   
                  Michael Kifer   Deriving Predicate Statistics for Logic
                                  Rules  . . . . . . . . . . . . . . . . . 139--155
         Thomas Lukasiewicz and   
      Maria Vanina Martinez and   
              Gerardo I. Simari   Consistent Answers in Probabilistic
                                  Datalog$\pm$ Ontologies  . . . . . . . . 156--171
            Eleni Tsalapati and   
            Giorgos Stoilos and   
             Giorgos Stamou and   
                George Koletsos   Query Rewriting under Ontology
                                  Contraction  . . . . . . . . . . . . . . 172--187
        Jürgen Umbrich and   
                Aidan Hogan and   
              Axel Polleres and   
                  Stefan Decker   Improving the Recall of Live Linked Data
                                  Querying through Reasoning . . . . . . . 188--204
         Rosamaria Barilaro and   
               Nicola Leone and   
            Francesco Ricca and   
              Giorgio Terracina   Distributed Ontology Based Data Access
                                  via Logic Programming  . . . . . . . . . 205--208
       Valentinos Evripidou and   
                 Francesca Toni   Argumentation and Voting for an
                                  Intelligent User Empowering Business
                                  Directory on the Web . . . . . . . . . . 209--212
                 Wolfgang Faber   A Polynomial Reduction from ASPDA to ASP 213--216
            Enrico Franconi and   
                  Nhung Ngo and   
              Evgeny Sherkhonov   The Definability Abduction Problem for
                                  Data Exchange  . . . . . . . . . . . . . 217--220
                  Beibei Hu and   
            Theodore Patkos and   
         Abdelghani Chibani and   
                  Yacine Amirat   Rule-Based Context Assessment in Smart
                                  Cities . . . . . . . . . . . . . . . . . 221--224
             Matthias Knorr and   
David Carral Martínez and   
             Pascal Hitzler and   
             Adila A. Krisnadhi   Recent Advances in Integrating OWL and
                                  Rules (Technical Communication)  . . . . 225--228
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7498, 2012

                    John Rushby   The Versatile Synchronous Observer . . . 1--1
                Wolfram Schulte   Thirteen Years of Automated Code
                                  Analysis at Microsoft  . . . . . . . . . 2--2
             Araceli Acosta and   
              Cecilia Kilmurray   Model Checking Propositional Deontic
                                  Temporal Logic via a $\mu$-Calculus
                                  Characterization . . . . . . . . . . . . 3--18
             Haniel Barbosa and   
           David Déharbe   An Approach Using the B Method to Formal
                                  Verification of PLC Programs in an
                                  Industrial Setting . . . . . . . . . . . 19--34
        Fernando A. F. Braz and   
                  Jader S. Cruz   Palytoxin Inhibits the Sodium-Potassium
                                  Pump --- An Investigation of an
                                  Electrophysiological Model Using
                                  Probabilistic Model Checking . . . . . . 35--50
         Ernesto C. B. de Matos   BETA: a B Based Testing Approach . . . . 51--66
           Gustavo Carvalho and   
            Diogo Falcão   A Process Algebra Based Strategy for
                                  Generating Test Vectors from SCR
                                  Specifications . . . . . . . . . . . . . 67--82
Simone André da Costa Cavalheiro   Specification Patterns for Properties
                                  over Reachable States of Graph Grammars  83--98
                 Jim Davies and   
             Jeremy Gibbons and   
                  David Milward   Compositionality and Refinement in
                                  Model-Driven Engineering . . . . . . . . 99--114
        André Didier and   
                 Alexandre Mota   Identifying Hardware Failures
                                  Systematically . . . . . . . . . . . . . 115--130
              Yanhong Huang and   
               Yongxin Zhao and   
                     Jianqi Shi   Investigating Time Properties of
                                  Interrupt-Driven Programs  . . . . . . . 131--146
        Germán Regis and   
           Nicolás Ricci   Specifying and Verifying Declarative
                                  Fluent Temporal Logic Properties of
                                  Workflows  . . . . . . . . . . . . . . . 147--162
           Christoph Schulz and   
              Michael Löwe   Composition of Model Transformations: A
                                  Categorical Framework  . . . . . . . . . 163--178
            Emil Sekerinski and   
                     Tian Zhang   Verification Rules for Exception
                                  Handling in Eiffel . . . . . . . . . . . 179--193
              Subodh Sharma and   
          Ganesh Gopalakrishnan   A Sound Reduction of Persistent-Sets for
                                  Deadlock Detection in MPI Applications   194--209
             Dante Zanarini and   
                Carlos Luna and   
                    Luis Sierra   Alternating-Time Temporal Logic in the
                                  Calculus of (Co)Inductive Constructions  210--225
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7499, 2012

                      Anonymous   Front Matter . . . . . . . . . . . . . . 1--1
                Adam Kilgarriff   Getting to Know Your Corpus  . . . . . . 3--15
              Ruslan Mitkov and   
              Richard Evans and   
        Constantin Or\uasan and   
            Iustin Dornescu and   
                    Miguel Rios   Coreference Resolution: To What Extent
                                  Does It Help NLP Applications? . . . . . 16--27
                      Anonymous   Front Matter . . . . . . . . . . . . . . 29--29
       \Lukasz Kobyli\'nski and   
                Mateusz Kope\'c   Semantic Similarity Functions in Word
                                  Sense Disambiguation . . . . . . . . . . 31--38
              Thomas Scholz and   
              Stefan Conrad and   
                Lutz Hillekamps   Opinion Mining on a German Corpus of a
                                  Media Response Analysis  . . . . . . . . 39--46
                David Pinto and   
     Darnes Vilariño and   
    Yuridiana Alemán and   
        Helena Gómez and   
                     Nahun Loya   The Soundex Phonetic Algorithm Revisited
                                  for SMS Text Representation  . . . . . . 47--55
Magda \vSev\vcíková and   
Ji\vrí Mírovský   Sentence Modality Assignment in the
                                  Prague Dependency Treebank . . . . . . . 56--63
       Dimitrios Kokkinakis and   
            Markus Forsberg and   
 Sofie Johansson Kokkinakis and   
                    Frida Smith   Literacy Demands and Information to
                                  Cancer Patients  . . . . . . . . . . . . 64--71
           Aleksander Wawer and   
            Konrad Go\luchowski   Expanding Opinion Attribute Lexicons . . 72--80
          Adam Radziszewski and   
             Szymon Aceda\'nski   Taggers Gonna Tag: An Argument against
                                  Evaluating Disambiguation Capacities of
                                  Morphosyntactic Taggers  . . . . . . . . 81--87
          Marcin Woli\'nski and   
             Andrzej Zaborowski   An Ambiguity Aware Treebank Search Tool  88--94
           Georgios Petasis and   
                  Mara Tsoumari   A New Annotation Tool for Aligned
                                  Bilingual Corpora  . . . . . . . . . . . 95--104
            Frane \vSari\'c and   
              Jan \vSnajder and   
       Bojana Dalbelo Ba\vsi\'c   Optimizing Sentence Boundary Detection
                                  for Croatian . . . . . . . . . . . . . . 105--111
              Filip Grali\'nski   Mining the Web for Idiomatic Expressions
                                  Using Metalinguistic Markers . . . . . . 112--118
       Katarzyna Krasnowska and   
            Witold Kiera\'s and   
          Marcin Woli\'nski and   
     Adam Przepiórkowski   Using Tree Transducers for Detecting
                                  Errors in a Treebank of Polish . . . . . 119--126
Tomá\vs Jelínek and   
 Barbora \vStindlová and   
             Alexandr Rosen and   
                     Jirka Hana   Combining Manual and Automatic
                                  Annotation of a Learner Corpus . . . . . 127--134
         Márton Kiss and   
        Ágoston Nagy and   
            Veronika Vincze and   
       Attila Almási and   
       Zoltán Alexin and   
            János Csirik   A Manually Annotated Corpus of
                                  Pharmaceutical Patents . . . . . . . . . 135--142
          Adam Radziszewski and   
                 Adam Pawlaczek   Large-Scale Experiments with NP Chunking
                                  of Polish  . . . . . . . . . . . . . . . 143--149
               Milena Slavcheva   Mapping a Lexical Semantic Resource to a
                                  Common Framework of Computational
                                  Lexicons . . . . . . . . . . . . . . . . 150--157
Václava Kettnerová and   
Markéta Lopatková and   
      Zde\vnka Ure\vsová   The Rule-Based Approach to Czech
                                  Grammaticalized Alternations . . . . . . 158--165
             Goran Glava\vs and   
              Jan \vSnajder and   
       Bojana Dalbelo Ba\vsi\'c   Semi-supervised Acquisition of Croatian
                                  Sentiment Lexicon  . . . . . . . . . . . 166--173
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??