Table of contents for issues of Lecture Notes in Computer Science

Last update: Sat Mar 30 12:29:36 MDT 2019                Valid HTML 3.2!

Volume 7600, 2012
Volume 7601, 2012
Volume 7602, 2012
Volume 7603, 2012
Volume 7604, 2012
Volume 7608, 2012
Volume 7610, 2012
Volume 7611, 2012
Volume 7612, 2012
Volume 7613, 2012
Volume 7614, 2012
Volume 7616, 2012
Volume 7617, 2012
Volume 7618, 2012
Volume 7619, 2012
Volume 7620, 2012
Volume 7621, 2012
Volume 7622, 2012
Volume 7623, 2012
Volume 7624, 2012
Volume 7625, 2012
Volume 7626, 2012
Volume 7628, 2012
Volume 7631, 2012
Volume 7632, 2012
Volume 7633, 2012
Volume 7634, 2012
Volume 7635, 2012
Volume 7636, 2012
Volume 7637, 2012
Volume 7638, 2012
Volume 7639, 2012
Volume 7645, 2012


Lecture Notes in Computer Science
Volume 7600, 2012

                     Xi Guo and   
                 Chuan Xiao and   
             Yoshiharu Ishikawa   Combination Skyline Queries  . . . . . . 1--30
     Gabriele Kern-Isberner and   
              Christoph Beierle   Comparing and Evaluating Approaches to
                                  Probabilistic Reasoning: Theory,
                                  Implementation, and Applications . . . . 31--75
              Bernhard Thalheim   The Science and Art of Conceptual
                                  Modelling  . . . . . . . . . . . . . . . 76--105
        Lasanthi Heendaliya and   
                    Dan Lin and   
                     Ali Hurson   Predictive Line Queries for Traffic
                                  Prediction . . . . . . . . . . . . . . . 106--133
            Athanasia Asiki and   
            Dimitrios Tsoumakos   A DHT-Based System for the Management of
                                  Loosely Structured, Multidimensional
                                  Data . . . . . . . . . . . . . . . . . . 134--166
    Béatrice Bouchou and   
         Mirian Halfeld-Ferrari   A Grammarware for the Incremental
                                  Validation of Integrity Constraints on
                                  XML Documents under Multiple Updates . . 167--197
                Huiping Cao and   
                   Shawn Bowers   Database Support for Enabling
                                  Data-Discovery Queries over
                                  Semantically-Annotated Observational
                                  Data . . . . . . . . . . . . . . . . . . 198--228
                 Jingyu Han and   
                 Kejia Chen and   
                    Dawei Jiang   Probabilistically Ranking Web Article
                                  Quality Based on Evolution Patterns  . . 229--258
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7601, 2012

        Thomas E. Hampshire and   
             Holger R. Roth and   
            Darren J. Boone and   
              Greg Slabaugh and   
                 Steve Halligan   Prone to Supine CT Colonography
                                  Registration Using a Landmark and
                                  Intensity Composite Method . . . . . . . 1--9
             Holger R. Roth and   
            Darren J. Boone and   
             Steve Halligan and   
            Thomas E. Hampshire   External Clinical Validation of Prone
                                  and Supine CT Colonography Registration  10--19
                    Rui Shi and   
                   Wei Zeng and   
     Jerome Zhengrong Liang and   
              Xianfeng David Gu   Efficient Topological Cleaning for
                                  Visual Colon Surface Flattening  . . . . 20--29
        Janne J. Näppi and   
               Se Hyung Kim and   
               Hiroyuki Yoshida   Adaptive Volumetric Detection of Lesions
                                  for Minimal-Preparation Dual-Energy CT
                                  Colonography . . . . . . . . . . . . . . 30--39
        Janne J. Näppi and   
             Masanori Imuta and   
         Yasuyuki Yamashita and   
               Hiroyuki Yoshida   Computer-Aided Detection for
                                  Ultra-Low-Dose CT Colonography . . . . . 40--48
              Chang Won Kim and   
                   Jong Hyo Kim   Application of CT Simulation Technique
                                  for Virtual Ultra-Low-Dose Trial in CT
                                  Colonography . . . . . . . . . . . . . . 49--57
                  Zepa Yang and   
             Hyeong-min Jin and   
                   Jong Hyo Kim   Application of CT Simulation Technique
                                  for Virtual Fecal Tagging in CTC . . . . 58--68
        Janne J. Näppi and   
                 Don Rockey and   
              Daniele Regge and   
               Hiroyuki Yoshida   Application of CT Acquisition Parameters
                                  as Features in Computer-Aided Detection
                                  for CT Colonography  . . . . . . . . . . 69--77
                Sang Ho Lee and   
        Janne J. Näppi and   
               Hiroyuki Yoshida   Comparative Performance of
                                  State-of-the-Art Classifiers in
                                  Computer-Aided Detection for CT
                                  Colonography . . . . . . . . . . . . . . 78--87
                  Wenli Cai and   
               June-Goo Lee and   
                   Da Zhang and   
             Christina Piel and   
               Hiroyuki Yoshida   Piecewise Structural Diffusion Defined
                                  on Shape Index for Noise Reduction in
                                  Dual-Energy CT Images  . . . . . . . . . 88--96
      Dwarikanath Mahapatra and   
           Peter Schueffler and   
      Jeroen A. W. Tielbeek and   
             Joachim M. Buhmann   A Supervised Learning Based Approach to
                                  Detect Crohn's Disease in Abdominal MR
                                  Volumes  . . . . . . . . . . . . . . . . 97--106
            Mehmet Yigitsoy and   
            Sonja Kirchhoff and   
       Maximilian F. Reiser and   
                   Nassir Navab   Out-of-Plane Motion Compensation in
                                  Cine-MRI . . . . . . . . . . . . . . . . 107--115
           Ruwan Nawarathna and   
                JungHwan Oh and   
       Jayantha Muthukudage and   
        Wallapak Tavanapong and   
                    Johnny Wong   Real-Time Phase Boundary Detection for
                                  Colonoscopy Videos Using Motion Vector
                                  Templates  . . . . . . . . . . . . . . . 116--125
              Sho Tomoshige and   
                  Elco Oost and   
            Akinobu Shimizu and   
          Hidefumi Watanabe and   
              Hidefumi Kobatake   Relaxed Conditional Statistical Shape
                                  Models and Their Application to
                                  Non-contrast Liver Segmentation  . . . . 126--136
          Silja Kiriyanthan and   
              Ketut Fundana and   
               Tahir Majeed and   
             Philippe C. Cattin   A Landmark-Based Primal-Dual Approach
                                  for Discontinuity Preserving
                                  Registration . . . . . . . . . . . . . . 137--146
             Golnoosh Samei and   
           Christine Tanner and   
           Gabor Székely   Predicting Liver Motion Using Exemplar
                                  Models . . . . . . . . . . . . . . . . . 147--157
             Sanat Upadhyay and   
            Manos Papadakis and   
               Saurabh Jain and   
                Gregory Gladish   Semi-automatic Discrimination of Normal
                                  Tissue and Liver Cancer Lesions in
                                  Contrast Enhanced X-Ray CT-Scans . . . . 158--167
                Ha Manh Luu and   
            Adriaan Moelker and   
               Camiel Klink and   
           Adrienne Mendrik and   
                   Wiro Niessen   Evaluation of Diffusion Filters for $3$D
                                  CTA Liver Vessel Enhancement . . . . . . 168--177
               Weimin Huang and   
                  Wei Xiong and   
                Jiayin Zhou and   
                 Jing Zhang and   
                   Tao Yang and   
                  Jiang Liu and   
                          Yi Su   $3$D Shape Analysis for
                                  Liver-Gallbladder Anatomical Structure
                                  Retrieval  . . . . . . . . . . . . . . . 178--187
                Jianfei Liu and   
                Shijun Wang and   
        Marius G. Linguraru and   
              Ronald M. Summers   Tumor Sensitive Matching Flow: An
                                  Approach for Ovarian Cancer Metastasis
                                  Detection and Segmentation . . . . . . . 188--197
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7602, 2012

             Mike P. Papazoglou   Cloud Blueprint: a Model-Driven Approach
                                  to Configuring Federated Clouds  . . . . 1--1
              Eric Féron   Model-Based Auto Coding of Embedded
                                  Control Software with Full Semantics . . 2--2
                Roula Karam and   
           Piero Fraternali and   
          Alessandro Bozzon and   
                     Luca Galli   Modeling End-Users as Contributors in
                                  Human Computation Applications . . . . . 3--15
Diego Rodríguez-Gracia and   
              Javier Criado and   
              Luis Iribarne and   
         Nicolás Padilla   Runtime Adaptation of Architectural
                                  Models: An Approach for Adapting User
                                  Interfaces . . . . . . . . . . . . . . . 16--30
               Carlo Batini and   
              Marco Comerio and   
              Gianluigi Viscusi   Managing Quality of Large Set of
                                  Conceptual Schemas in Public
                                  Administration: Methods and Experiences  31--42
Sébastien Maitrehenry and   
              Sylvain Metge and   
        Yamine A\"\it-Ameur and   
                  Pierre Bieber   An MDE-Based Synthesis of Aircraft
                                  Safety Models  . . . . . . . . . . . . . 43--54
              Selma Djeddai and   
            Martin Strecker and   
              Mohamed Mezghiche   Integrating a Formal Development for
                                  DSLs into Meta-modeling  . . . . . . . . 55--66
           Emsaieb Geepalla and   
             Behzad Bordbar and   
                      Joel Last   Transformation of Spatio-Temporal Role
                                  Based Access Control Specification to
                                  Alloy  . . . . . . . . . . . . . . . . . 67--78
       Nesrine Ben Mustapha and   
         Marie-Aude Aufaure and   
       Hajer Baazaoui Zghal and   
              Henda Ben Ghezala   Modular Ontological Warehouse for
                                  Adaptative Information Search  . . . . . 79--90
             Meriem Djezzar and   
               Mounir Hemam and   
               Zizette Boufaida   Ontological Re-classification of
                                  Individuals: a Multi-viewpoints Approach 91--102
Jesús M. Almendros-Jiménez and   
                  Luis Iribarne   Transformation and Validation with SWRL
                                  and OWL of ODM-Based Models  . . . . . . 103--115
         Takashi Yanagisawa and   
                    Takao Miura   Context-Based Query Using Dependency
                                  Structures Based on Latent Topic Model   116--128
    Nour El Islem Karabadji and   
             Hassina Seridi and   
                Ilyes Khelf and   
                 Lakhdar Laouar   Decision Tree Selection in an Industrial
                                  Machine Fault Diagnostics  . . . . . . . 129--140
               Fairouz Dahi and   
                   Nora Bounour   Crosscutting Concerns Identification
                                  Approach Based on the Sequence Diagram
                                  Analysis . . . . . . . . . . . . . . . . 141--152
             Franck Barbier and   
                    Eric Cariou   Inductive UML  . . . . . . . . . . . . . 153--161
    Anthony Fernandes Pires and   
            Thomas Polacsek and   
         Stéphane Duprat   Formal Software Verification at Model
                                  and at Source Code Levels  . . . . . . . 162--169
               Rania Soussi and   
             Marie-Aude Aufaure   Enterprise Ontology Learning for
                                  Heterogeneous Graphs Extraction  . . . . 170--177
             Sa\"\id Taktak and   
                     Jamel Feki   Toward Propagating the Evolution of Data
                                  Warehouse on Data Marts  . . . . . . . . 178--185
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7603, 2012

                    Lee Harland   Open PHACTS: a Semantic Knowledge
                                  Infrastructure for Public and Commercial
                                  Drug Discovery Research  . . . . . . . . 1--7
                 Camille Pradel   Allowing End Users to Query Graph-Based
                                  Knowledge Bases  . . . . . . . . . . . . 8--15
             Victor de Boer and   
         Michiel Hildebrand and   
                 Lora Aroyo and   
         Pieter De Leenheer and   
               Chris Dijkshoorn   Nichesourcing: Harnessing the Power of
                                  Crowds of Experts  . . . . . . . . . . . 16--20
             Jodi Schneider and   
                Brian Davis and   
                     Adam Wyner   Dimensions of Argumentation in Social
                                  Media  . . . . . . . . . . . . . . . . . 21--25
            Claudia d'Amato and   
                 Volha Bryl and   
               Luciano Serafini   Semantic Knowledge Discovery from
                                  Heterogeneous Data Sources . . . . . . . 26--31
            Arash Joorabchi and   
          Abdulhussain E. Mahdi   Automatic Subject Metadata Generation
                                  for Scientific Documents Using Wikipedia
                                  and Genetic Algorithms . . . . . . . . . 32--41
Sébastien Ferré and   
              Sebastian Rudolph   Advocatus Diaboli --- Exploratory
                                  Enrichment of Ontologies with Negative
                                  Constraints  . . . . . . . . . . . . . . 42--56
        Lorenz Bühmann and   
                   Jens Lehmann   Universal OWL Axiom Enrichment for Large
                                  Knowledge Bases  . . . . . . . . . . . . 57--71
              Chiraz Latiri and   
         Lamia Ben Ghezaiel and   
              Mohamed Ben Ahmed   Proxemic Conceptual Network Based on
                                  Ontology Enrichment for Representing
                                  Documents in IR  . . . . . . . . . . . . 72--86
              Daniel Gerber and   
      Axel-Cyrille Ngonga Ngomo   Extracting Multilingual Natural-Language
                                  Patterns for RDF Predicates  . . . . . . 87--96
              Myung Hee Kim and   
                   Paul Compton   Improving the Performance of a Named
                                  Entity Recognition System with Knowledge
                                  Acquisition  . . . . . . . . . . . . . . 97--113
         Valentina Presutti and   
        Francesco Draicchio and   
                   Aldo Gangemi   Knowledge Extraction Based on Discourse
                                  Representation Theory and Linguistic
                                  Frames . . . . . . . . . . . . . . . . . 114--129
               Sara Tonelli and   
                 Volha Bryl and   
           Claudio Giuliano and   
               Luciano Serafini   Investigating the Semantics of Frame
                                  Elements . . . . . . . . . . . . . . . . 130--143
             Manuel Atencia and   
  Jérôme David and   
       François Scharffe   Keys and Pseudo-Keys Detection for Web
                                  Datasets Cleansing and Interlinking  . . 144--153
            Renata Dividino and   
           Gerd Gröner and   
          Stefan Scheglmann and   
                 Matthias Thimm   Ranking RDF with Provenance via
                                  Preference Aggregation . . . . . . . . . 154--163
        Jürgen Umbrich and   
           Marcel Karnstedt and   
                Aidan Hogan and   
        Josiane Xavier Parreira   Freshening up while Staying Fast:
                                  Towards Hybrid SPARQL Queries  . . . . . 164--174
         Sebastian Hellmann and   
               Jens Lehmann and   
                Sören Auer   Linked-Data Aware URI Schemes for
                                  Referencing Text Fragments . . . . . . . 175--184
              Alice Hermann and   
Sébastien Ferré and   
        Mireille Ducassé   An Interactive Guidance Process
                                  Supporting Consistent Updates of RDFS
                                  Graphs . . . . . . . . . . . . . . . . . 185--199
   Stéphane Campinas and   
              Renaud Delbru and   
            Giovanni Tummarello   Effective Retrieval Model for Entity
                                  with Multi-valued Attributes: BM25MF and
                                  Beyond . . . . . . . . . . . . . . . . . 200--215
              Eva Blomqvist and   
           Azam Seil Sepour and   
             Valentina Presutti   Ontology Testing- Methodology and Tool   216--226
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7604, 2012

       Ji\vrí Wiedermann   Computability and Non-computability
                                  Issues in Amorphous Computing  . . . . . 1--9
              Davide Ancona and   
               Giovanni Lagorio   Static Single Information Form for
                                  Abstract Compilation . . . . . . . . . . 10--27
                Suna Bensch and   
              Markus Holzer and   
              Martin Kutrib and   
                Andreas Malcher   Input-Driven Stack Automata  . . . . . . 28--42
     Marijke Hans L. Bodlaender   Probabilistic Inference and Monadic
                                  Second Order Logic . . . . . . . . . . . 43--56
 Marijke Hans L. Bodlaender and   
              Cor A. J. Hurkens   Cinderella versus the Wicked Stepmother  57--71
            Michele Boreale and   
                Michela Paolini   Worst- and Average-Case Privacy Breaches
                                  in Randomization Mechanisms  . . . . . . 72--86
                 Tomasz Brengos   Weak Bisimulations for Coalgebras over
                                  Ordered Functors . . . . . . . . . . . . 87--103
             Arnaud Carayol and   
      Zoltán Ésik   A Context-Free Linear Ordering with an
                                  Undecidable First-Order Theory . . . . . 104--118
                 Yuxin Deng and   
                      Yuan Feng   Open Bisimulation for Quantum Processes  119--133
             Fabio Gadducci and   
 Giacoma Valentina Monreale and   
                  Ugo Montanari   A Modular LTS for Open Reactive Systems  134--148
              Petr Jan\vcar and   
         Prateek Karandikar and   
           Philippe Schnoebelen   Unidirectional Channel Systems Can Be
                                  Tested . . . . . . . . . . . . . . . . . 149--163
Galina Jirásková and   
        Tomá\vs Masopust   On Properties and State Complexity of
                                  Deterministic State-Partition Automata   164--178
Galina Jirásková and   
                   Benedek Nagy   On Union-Free and Deterministic
                                  Union-Free Languages . . . . . . . . . . 179--192
             Alexander Kurz and   
            Tomoyuki Suzuki and   
                  Emilio Tuosto   A Characterisation of Languages on
                                  Infinite Alphabets with Nominal Regular
                                  Expressions  . . . . . . . . . . . . . . 193--208
        Philipp Küfner and   
               Uwe Nestmann and   
             Christina Rickmann   Formal Verification of Distributed
                                  Algorithms . . . . . . . . . . . . . . . 209--224
         Salvatore La Torre and   
              Margherita Napoli   A Temporal Logic for Multi-threaded
                                  Programs . . . . . . . . . . . . . . . . 225--239
                   Hongyu Liang   The Algorithmic Complexity of
                                  $k$-Domatic Partition of Graphs  . . . . 240--249
                     Bas Luttik   Unique Parallel Decomposition in
                                  Branching and Weak Bisimulation
                                  Semantics  . . . . . . . . . . . . . . . 250--264
        Gerald Lüttgen and   
                  Walter Vogler   Modal Interface Automata . . . . . . . . 265--279
           Emmanuel Beffara and   
                 Virgile Mogbil   Proofs as Executions . . . . . . . . . . 280--294
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7608, 2012

               Amihood Amir and   
                    Avivit Levy   Approximate Period Detection and
                                  Correction . . . . . . . . . . . . . . . 1--15
        Ricardo Baeza-Yates and   
                  Yoelle Maarek   Usage Data in Web Search: Benefits and
                                  Limitations  . . . . . . . . . . . . . . 16--16
                     Ian Witten   Semantic Document Representation: Do It
                                  with Wikification  . . . . . . . . . . . 17--17
             Artur Abdullin and   
                  Olfa Nasraoui   Clustering Heterogeneous Data with
                                  Mutual Semi-supervision  . . . . . . . . 18--29
      Andrés Abeliuk and   
                Gonzalo Navarro   Compressed Suffix Trees for Repetitive
                                  Texts  . . . . . . . . . . . . . . . . . 30--41
               Amihood Amir and   
              Haim Paryenty and   
                   Liam Roditty   Configurations and Minority in the
                                  String Consensus Problem . . . . . . . . 42--53
               Xiangdong An and   
               Nick Cercone and   
                       Hai Wang   A Study on Novelty Evaluation in
                                  Biomedical Information Retrieval . . . . 54--60
            Golnaz Badkobeh and   
              Maxime Crochemore   Computing the Maximal-Exponent Repeats
                                  of an Overlap-Free String in Linear Time 61--72
            Krisztian Balog and   
                Robert Neumayer   Collection Ranking and Selection for
                                  Federated Entity Search  . . . . . . . . 73--85
               Hideo Bannai and   
               Shunsuke Inenaga   Efficient LZ78 Factorization of Grammar
                                  Compressed Text  . . . . . . . . . . . . 86--98
                Timo Beller and   
               Katharina Berger   Space-Efficient Computation of Maximal
                                  and Supermaximal Repeats in Genome
                                  Sequences  . . . . . . . . . . . . . . . 99--110
          Lamjed Ben Jabeur and   
                   Lynda Tamine   Active Microbloggers: Identifying
                                  Influencers, Leaders and Discussers in
                                  Microblogging Networks . . . . . . . . . 111--117
     Etienne Birmelé and   
            Pierluigi Crescenzi   Efficient Bubble Enumeration in Directed
                                  Graphs . . . . . . . . . . . . . . . . . 118--129
             Guillaume Blin and   
                  Minghui Jiang   The Longest Common Subsequence Problem
                                  with Crossing-Free Arc-Annotated
                                  Sequences  . . . . . . . . . . . . . . . 130--142
       Felipe Bravo-Marquez and   
               Manuel Manriquez   A Zipf-Like Distant Supervision Approach
                                  for Multi-document Summarization Using
                                  Wikinews Articles  . . . . . . . . . . . 143--154
         Nieves R. Brisaboa and   
              Ana Cerdeira-Pena   Ranked Document Retrieval in (Almost) No
                                  Space  . . . . . . . . . . . . . . . . . 155--160
            B. Barla Cambazoglu   Impact of Regionalization on Performance
                                  of Web Search Engine Result Caches . . . 161--166
           Francisco Claude and   
                Gonzalo Navarro   The Wavelet Matrix . . . . . . . . . . . 167--179
           Francisco Claude and   
                Gonzalo Navarro   Improved Grammar-Based Compressed
                                  Indexes  . . . . . . . . . . . . . . . . 180--192
     Clément de Groc and   
                 Xavier Tannier   Experiments on Pseudo Relevance Feedback
                                  Using Graph Random Walks . . . . . . . . 193--198
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7610, 2012

                 Dirk Beyer and   
          Alexander K. Petrenko   Linux Driver Verification  . . . . . . . 1--6
                  Joost Kok and   
        Anna-Lena Lamprecht and   
            Fons J. Verbeek and   
              Mark D. Wilkinson   Bioscientific Data Processing and
                                  Modeling . . . . . . . . . . . . . . . . 7--11
   Hernando Sanchez-Faddeev and   
     Michael T. M. Emmerich and   
            Fons J. Verbeek and   
                Andrew H. Henry   Using Multiobjective Optimization and
                                  Energy Minimization to Design an
                                  Isoform-Selective Ligand of the 14-3-3
                                  Protein  . . . . . . . . . . . . . . . . 12--24
                   Kuan Yan and   
                Fons J. Verbeek   Segmentation for High-Throughput Image
                                  Analysis: Watershed Masked Clustering    25--41
     Alexander E. Nezhinsky and   
                Fons J. Verbeek   Efficient and Robust Shape Retrieval
                                  from Deformable Templates  . . . . . . . 42--55
                   Ian Wood and   
             Ben Vandervalk and   
              Luke McCarthy and   
              Mark D. Wilkinson   OWL-DL Domain-Models as Abstract
                                  Workflows  . . . . . . . . . . . . . . . 56--66
Andrea Braun von Reinersdorff and   
           Tiziana Margaria and   
               Christoph Rasche   Processes and Data Integration in the
                                  Networked Healthcare . . . . . . . . . . 67--69
           Tiziana Margaria and   
      Steve Boßelmann and   
                 Bertold Kujath   Simple Modeling of Executable Role-Based
                                  Workflows: An Application in the
                                  Healthcare Domain  . . . . . . . . . . . 70--72
            Andreas Holubek and   
              Christian Metzger   Considerations for Healthcare
                                  Applications in a Platform as a Service
                                  Environment  . . . . . . . . . . . . . . 73--74
               Markus Doedt and   
           Thomas Göke and   
                  Jan Pardo and   
               Bernhard Steffen   Reha-Sports: The Challenge of Small
                                  Margin Healthcare Accounting . . . . . . 75--77
          Björn Lisper and   
           Johan Nordlander and   
                 Sophie Quinton   Timing Constraints: Theory Meets
                                  Practice . . . . . . . . . . . . . . . . 78--79
          Björn Lisper and   
               Johan Nordlander   A Simple and Flexible Timing Constraint
                                  Logic  . . . . . . . . . . . . . . . . . 80--95
             Sophie Quinton and   
                     Rolf Ernst   Generalized Weakly-Hard Constraints  . . 96--110
Marie-Agn\`es Peraldi-Frati and   
                Arda Goknil and   
           Morayo Adedjouma and   
            Pierre Yves Gueguen   Modeling a BSG-E Automotive System with
                                  the Timing Augmented Description
                                  Language . . . . . . . . . . . . . . . . 111--125
            Iakovos Ouranos and   
             Kazuhiro Ogata and   
               Petros Stefaneas   Formal Analysis of TESLA Protocol in the
                                  Timed OTS/CafeOBJ Method . . . . . . . . 126--142
                    Ning Ge and   
                Marc Pantel and   
           Xavier Crégut   Formal Specification and Verification of
                                  Task Time Constraints for Real-Time
                                  Systems  . . . . . . . . . . . . . . . . 143--157
                 Raimund Kirner   The WCET Analysis Tool CalcWcet167 . . . 158--172
                   Klaus Birken   Abstract Execution for Event-Driven
                                  Systems --- An Application from
                                  Automotive/Infotainment Development  . . 173--186
        Alessandro Fantechi and   
         Francesco Flammini and   
                 Stefania Gnesi   Formal Methods for Intelligent
                                  Transportation Systems . . . . . . . . . 187--189
         Francesco Flammini and   
            Stefano Marrone and   
            Nicola Mazzocca and   
                Roberto Nardone   Model-Driven V&V Processes for Computer
                                  Based Control Systems: a Unifying
                                  Perspective  . . . . . . . . . . . . . . 190--204
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7611, 2012

                Yehuda Afek and   
                Haim Kaplan and   
            Boris Korenfeld and   
              Adam Morrison and   
               Robert E. Tarjan   CBTree: a Practical Concurrent
                                  Self-Adjusting Search Tree . . . . . . . 1--15
                Faith Ellen and   
        Vijaya Ramachandran and   
                Philipp Woelfel   Efficient Fetch-and-Increment  . . . . . 16--30
             Alexey Gotsman and   
         Madanlal Musuvathi and   
                  Hongseok Yang   Show No Weakness: Sequentially
                                  Consistent Specifications of TSO
                                  Libraries  . . . . . . . . . . . . . . . 31--45
               Julian Anaya and   
Jérémie Chalopin and   
            Jurek Czyzowicz and   
            Arnaud Labourel and   
                   Andrzej Pelc   Collecting Information by Power-Aware
                                  Mobile Agents  . . . . . . . . . . . . . 46--60
             Ofer Feinerman and   
                    Amos Korman   Memory Lower Bounds for Randomized
                                  Collaborative Search and Implications
                                  for Biology  . . . . . . . . . . . . . . 61--75
                  Chen Chen and   
            Roman Vitenberg and   
             Hans-Arno Jacobsen   A Generalized Algorithm for
                                  Publish/Subscribe Overlay Design and Its
                                  Fast Implementation  . . . . . . . . . . 76--90
        Keren Censor-Hillel and   
          Bernhard Haeupler and   
                Nancy Lynch and   
           Muriel Médard   Bounded-Contention Coding for Wireless
                                  Networks in the High SNR Regime  . . . . 91--105
          Tomasz Jurdzinski and   
            Dariusz R. Kowalski   Distributed Backbone Structure for
                                  Algorithms in the SINR Model of Wireless
                                  Networks . . . . . . . . . . . . . . . . 106--120
          Marcin Bienkowski and   
          Tomasz Jurdzinski and   
      Miroslaw Korzeniowski and   
            Dariusz R. Kowalski   Distributed Online and Stochastic
                                  Queuing on a Multiple Access Channel . . 121--135
            Atish Das Sarma and   
       Anisur Rahaman Molla and   
              Gopal Pandurangan   Fast Distributed Computation in Dynamic
                                  Networks via Random Walks  . . . . . . . 136--150
            Atish Das Sarma and   
                Ashwin Lall and   
          Danupon Nanongkai and   
                 Amitabh Trehan   Dense Subgraphs on Dynamic Networks  . . 151--165
          Bernhard Haeupler and   
                    Fabian Kuhn   Lower Bounds on Information
                                  Dissemination in Dynamic Networks  . . . 166--180
        Mika Göös and   
                  Jukka Suomela   No Sublogarithmic-Time Approximation
                                  Scheme for Bipartite Vertex Cover  . . . 181--194
                Danny Dolev and   
           Christoph Lenzen and   
                     Shir Peled   ``Tri, Tri Again'': Finding Triangles
                                  and Small Subgraphs in a Distributed
                                  Setting  . . . . . . . . . . . . . . . . 195--209
          Andrzej Czygrinow and   
        Michal Han\'ckowiak and   
          Edyta Szyma\'nska and   
            Wojciech Wawrzyniak   Distributed $2$-Approximation Algorithm
                                  for the Semi-matching Problem  . . . . . 210--222
            Mohsen Ghaffari and   
          Bernhard Haeupler and   
                Nancy Lynch and   
                 Calvin Newport   Bounds on Contention Management in Radio
                                  Networks . . . . . . . . . . . . . . . . 223--237
             Sebastian Daum and   
                Fabian Kuhn and   
                 Calvin Newport   Efficient Symmetry Breaking in
                                  Multi-Channel Radio Networks . . . . . . 238--252
           Alexandre Maurer and   
       Sébastien Tixeuil   On Byzantine Broadcast in Loosely
                                  Connected Networks . . . . . . . . . . . 253--266
            Abhijeet Pareek and   
                Philipp Woelfel   RMR-Efficient Randomized Abortable
                                  Mutual Exclusion . . . . . . . . . . . . 267--281
             Prasad Jayanti and   
                      Zhiyu Liu   Abortable Reader-Writer Locks Are No
                                  More Complex Than Abortable Mutex Locks  282--296
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7612, 2012

                Ewen Denney and   
                     Ganesh Pai   A Lightweight Methodology for Safety
                                  Case Assembly  . . . . . . . . . . . . . 1--12
André Alexandersen Hauge and   
            Ketil Stòlen   A Pattern-Based Method for Safe Control
                                  Systems Exemplified within Nuclear Power
                                  Production . . . . . . . . . . . . . . . 13--24
          Silvia Gil Casals and   
         Philippe Owezarski and   
              Gilles Descargues   Risk Assessment for Airworthiness
                                  Security . . . . . . . . . . . . . . . . 25--36
      Christoph Läsche and   
           Eckard Böde and   
              Thomas Peikenkamp   A Method for Guided Hazard
                                  Identification and Risk Mitigation for
                                  Offshore Operations  . . . . . . . . . . 37--48
           Manfred Schäfer   Risk Analysis and Software Integrity
                                  Protection for 4G Network Elements in
                                  ASMONIA  . . . . . . . . . . . . . . . . 49--61
            Christoph Woskowski   Applying Industrial-Strength Testing
                                  Techniques to Critical Care Medical
                                  Equipment  . . . . . . . . . . . . . . . 62--73
        Viacheslav Izosimov and   
            Urban Ingelsson and   
                 Andreas Wallin   Requirement Decomposition and
                                  Testability in Development of
                                  Safety-Critical Automotive Components    74--86
                 Jan Krause and   
                Elke Hintze and   
             Stephan Magnus and   
             Christian Diedrich   Model Based Specification, Verification,
                                  and Test Generation for a Safety
                                  Fieldbus Profile . . . . . . . . . . . . 87--98
              Ernest Edifor and   
              Martin Walker and   
                    Neil Gordon   Quantification of Priority-OR Gates in
                                  Temporal Fault Trees . . . . . . . . . . 99--110
         Michael Glaß and   
                    Heng Yu and   
              Felix Reimann and   
              Jürgen Teich   Cross-Level Compositional Reliability
                                  Analysis for Embedded Systems  . . . . . 111--124
               Tobias Hoppe and   
              Sven Kuhlmann and   
               Stefan Kiltz and   
                  Jana Dittmann   IT-Forensic Automotive Investigations on
                                  the Example of Route Reconstruction on
                                  Automotive System and Communication Data 125--136
          Hans-Hermann Bock and   
               Jens Braband and   
              Birgit Milius and   
            Hendrik Schäbe   Towards an IT Security Protection
                                  Profile for Safety-Related Communication
                                  in Railway Automation  . . . . . . . . . 137--148
            Felix Wieczorek and   
      Christoph Krauß and   
             Frank Schiller and   
                 Claudia Eckert   Towards Secure Fieldbus Communication    149--160
             Andrey Zakonov and   
                Anatoly Shalyto   Extracting EFSMs of Web Applications for
                                  Formal Requirements Specification  . . . 161--172
           Irene Bicchierai and   
              Giacomo Bucci and   
            Carlo Nocentini and   
                 Enrico Vicario   An Ontological Approach to
                                  Systematization of SW-FMEA . . . . . . . 173--184
            Roberto Baldoni and   
               Giorgia Lodi and   
             Luca Montanari and   
             Guido Mariotta and   
                  Marco Rizzuto   Online Black-Box Failure Prediction for
                                  Mission Critical Distributed Systems . . 185--197
            Domenico Di Leo and   
          Fatemeh Ayatolahi and   
        Behrooz Sangchoolie and   
                 Johan Karlsson   On the Impact of Hardware Faults --- An
                                  Investigation of the Relationship
                                  between Workload Inputs and Failure Mode
                                  Distributions  . . . . . . . . . . . . . 198--209
             Anton Tarasyuk and   
           Inna Pereverzeva and   
          Elena Troubitsyna and   
               Timo Latvala and   
                  Laura Nummila   Formal Development and Assessment of a
                                  Reconfigurable On-board Satellite System 210--222
               Olof Hannius and   
                 Johan Karlsson   Impact of Soft Errors in a Jet Engine
                                  Controller . . . . . . . . . . . . . . . 223--234
            Ludovic Pintard and   
            Christel Seguin and   
            Jean-Paul Blanquart   Which Automata for Which Safety
                                  Assessment Step of Satellite FDIR? . . . 235--246
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7613, 2012

                      Anonymous   Front Matter . . . . . . . . . . . . . . 1--1
             Alejandra Ruiz and   
               Tim P. Kelly and   
         Mehrdad Sabetzadeh and   
          Didier Van Den Abeele   Introduction to Sassur 2012  . . . . . . 3--7
                Ewen Denney and   
                 Ganesh Pai and   
                     Josef Pohl   AdvoCATE: An Assurance Case Automation
                                  Toolset  . . . . . . . . . . . . . . . . 8--21
             Alejandra Ruiz and   
              Ibrahim Habli and   
        Huáscar Espinoza   Towards a Case-Based Reasoning Approach
                                  for Safety Assurance Reuse . . . . . . . 22--35
            Jasen Markovski and   
   J. M. van de Mortel-Fronczak   Modeling for Safety in a
                                  Synthesis-Centric Systems Engineering
                                  Framework  . . . . . . . . . . . . . . . 36--49
            Fabien Belmonte and   
                  Elie Soubiran   A Model Based Approach for Safety
                                  Analysis . . . . . . . . . . . . . . . . 50--63
       Jose Luis de la Vara and   
                 Sunil Nair and   
              Eric Verhulst and   
           Janusz Studzizba and   
                    Piotr Pepek   Towards a Model-Based Evolutionary Chain
                                  of Evidence for Compliance with Safety
                                  Standards  . . . . . . . . . . . . . . . 64--78
                Xingyu Zhao and   
               Dajian Zhang and   
                  Minyan Lu and   
                    Fuping Zeng   A New Approach to Assessment of
                                  Confidence in Assurance Cases  . . . . . 79--91
              Eric Verhulst and   
           Bernhard H. C. Sputh   An Unified Meta-model for Trustworthy
                                  Systems Engineering  . . . . . . . . . . 92--105
               Anna Lanzaro and   
            Antonio Pecchia and   
            Marcello Cinque and   
          Domenico Cotroneo and   
                Ricardo Barbosa   A Preliminary Fault Injection Framework
                                  for Evaluating Multicore Systems . . . . 106--116
        Daniel Kästner and   
           Marc Schlickling and   
              Markus Pister and   
         Christoph Cullmann and   
                 Gernot Gebhard   Meeting Real-Time Requirements with
                                  Multi-core Processors  . . . . . . . . . 117--131
         Patrick J. Graydon and   
                   Tim P. Kelly   Assessing Software Interference
                                  Management When Modifying Safety-Related
                                  Software . . . . . . . . . . . . . . . . 132--145
                      Anonymous   Front Matter . . . . . . . . . . . . . . 147--147
    António Casimiro and   
               Jörg Kaiser   Introduction to ASCoMS 2012  . . . . . . 149--150
        Luís Marques and   
        António Casimiro   Towards Dependable and Stable Perception
                                  in Smart Environments with Timing and
                                  Value Faults . . . . . . . . . . . . . . 151--161
              Sebastian Zug and   
                 Tino Brade and   
           Jörg Kaiser and   
                Sasanka Potluri   An Approach Supporting Fault-Propagation
                                  Analysis for Smart Sensor Systems  . . . 162--173
       Kenneth Östberg and   
                 Rolf Johansson   Use of Quality Metrics for Functional
                                  Safety in Systems of Cooperative
                                  Vehicles . . . . . . . . . . . . . . . . 174--179
               Christian Berger   From Autonomous Vehicles to Safer Cars:
                                  Selected Challenges for the Software
                                  Engineering  . . . . . . . . . . . . . . 180--189
          Oscar Ljungkrantz and   
           Henrik Lönn and   
                  Hans Blom and   
             Cecilia Ekelin and   
                Daniel Karlsson   Modelling of Safety-Related Timing
                                  Constraints for Automotive Embedded
                                  Systems  . . . . . . . . . . . . . . . . 190--201
                      Anonymous   Front Matter . . . . . . . . . . . . . . 203--203
         Christian Esposito and   
             Marco Platania and   
             Francesco Brancati   Introduction to DESEC4LCCI 2012  . . . . 205--208
         Leonardo Montecchi and   
              Paolo Lollini and   
          Andrea Bondavalli and   
             Ernesto La Mattina   Quantitative Security Evaluation of a
                                  Multi-biometric Authentication System    209--221
               Luigi Romano and   
        Salvatore D'Antonio and   
          Valerio Formicola and   
                Luigi Coppolino   Protecting the WSN Zones of a Critical
                                  Infrastructure via Enhanced SIEM
                                  Technology . . . . . . . . . . . . . . . 222--234
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7614, 2012

              Takako Aikawa and   
           Kentaro Yamamoto and   
                Hitoshi Isahara   The Impact of Crowdsourcing Post-editing
                                  with the Collaborative Translation
                                  Framework  . . . . . . . . . . . . . . . 1--10
                Shaoyu Chen and   
             Tadahiro Matsumoto   Translation of Quantifiers in
                                  Japanese--Chinese Machine Translation    11--22
                Hitoshi Isahara   Toward Practical Use of Machine
                                  Translation  . . . . . . . . . . . . . . 23--27
                 Jun Sakata and   
            Masato Tokuhisa and   
              Jin'ichi Murakami   Phrase-Level Pattern-Based Machine
                                  Translation Based on Analogical Mapping
                                  Method . . . . . . . . . . . . . . . . . 28--39
               Haithem Afli and   
           Lo\"\ic Barrault and   
                 Holger Schwenk   Parallel Texts Extraction from
                                  Multimodal Comparable Corpora  . . . . . 40--51
                    Gan Jin and   
            Natallia Khatseyeva   A Reliable Communication System to
                                  Maximize the Communication Quality . . . 52--63
          Gaël Lejeune and   
             Romain Brixtel and   
             Antoine Doucet and   
                   Nadine Lucas   DAnIEL: Language Independent
                                  Character-Based News Surveillance  . . . 64--75
                    Jian Qu and   
              Akira Shimazu and   
                 Minh Le Nguyen   OOV Term Translation, Context
                                  Information and Definition Extraction
                                  Based on OOV Term Type Prediction  . . . 76--87
                   Fatiha Sadat   Exploiting a Web-Based Encyclopedia as a
                                  Knowledge Base for the Extraction of
                                  Multilingual Terminology . . . . . . . . 88--96
           Jyoti Srivastava and   
                   Sudip Sanyal   Segmenting Long Sentence Pairs to
                                  Improve Word Alignment in English--Hindi
                                  Parallel Corpora . . . . . . . . . . . . 97--107
             Hoai-Thu Vuong and   
                Dao Ngoc Tu and   
             Minh Le Nguyen and   
                Vinh Van Nguyen   Shallow Syntactic Preprocessing for
                                  Statistical Machine Translation  . . . . 108--117
 Paul Brillant Feuto Njonko and   
 Sylviane Cardey-Greenfield and   
               Peter Greenfield   Linguistic Rules Based Approach for
                                  Automatic Restoration of Accents on
                                  French Texts . . . . . . . . . . . . . . 118--125
                Masood Ghayoomi   Word Clustering for Persian Statistical
                                  Parsing  . . . . . . . . . . . . . . . . 126--137
         Wannachai Kampeera and   
     Sylviane Cardey-Greenfield   Building a Lexically and
                                  Semantically-Rich Resource for
                                  Paraphrase Processing  . . . . . . . . . 138--143
         Bartosz Zaborowski and   
     Adam Przepiórkowski   Tagset Conversion with Decision Trees    144--155
               Elizaveta Zimina   Fitting a Round Peg in a Square Hole:
                                  Japanese Resource Grammar in GF  . . . . 156--167
                 Ahmed H. Aliwy   Arabic Language Analyzer with Lemma
                                  Extraction and Rich Tagset . . . . . . . 168--179
Jorge J. García Flores and   
         Pierre Zweigenbaum and   
                   Zhao Yue and   
                 William Turner   Tracking Researcher Mobility on the Web
                                  Using Snippet Semantic Analysis  . . . . 180--191
        Konrad Go\luchowski and   
     Adam Przepiórkowski   Semantic Role Labelling without Deep
                                  Syntactic Parsing  . . . . . . . . . . . 192--197
  Przemys\law Jarz\kebowski and   
     Adam Przepiórkowski   Temporal Information Extraction with
                                  Cross-Language Projected Data  . . . . . 198--209
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7616, 2012

          Thomas P. Kersten and   
               Maren Lindstaedt   Image-Based Low-Cost Systems for
                                  Automatic $3$D Recording and Modelling
                                  of Archaeological Finds and Objects  . . 1--10
             Dieter Fritsch and   
       Mohammed Abdel-Wahab and   
          Alessandro Cefalu and   
                  Konrad Wenzel   Photogrammetric Point Cloud Collection
                                  with Multi-camera Systems  . . . . . . . 11--20
                Immo Trinks and   
          Wolfgang Neubauer and   
                 Michael Doneus   Prospecting Archaeological Landscapes    21--29
             Fabian Hollaus and   
                Melanie Gau and   
               Robert Sablatnig   Multispectral Image Acquisition of
                                  Ancient Manuscripts  . . . . . . . . . . 30--39
            Fabio Remondino and   
           Silvio Del Pizzo and   
          Thomas P. Kersten and   
               Salvatore Troisi   Low-Cost and Open-Source Solutions for
                                  Automated Image Orientation --- a
                                  Critical Overview  . . . . . . . . . . . 40--54
          Thomas P. Kersten and   
           Friedrich Keller and   
             Jerome Saenger and   
                 Jochen Schiewe   Automated Generation of an Historic $4$D
                                  City Model of Hamburg and Its
                                  Visualisation with the GE Engine . . . . 55--65
           Marcello Balzani and   
                Carlo Bughi and   
           Federico Ferrari and   
               Luca Rossato and   
               Alessandra Tursi   Alberti's Box: The Cultural Multimedia
                                  Project on the Architectures of Leon
                                  Battista Alberti . . . . . . . . . . . . 66--75
              Wassim Moussa and   
       Mohammed Abdel-Wahab and   
                 Dieter Fritsch   Automatic Fusion of Digital Images and
                                  Laser Scanner Data for Heritage
                                  Preservation . . . . . . . . . . . . . . 76--85
           Eirini Bernikola and   
            Elsa Tsiranidou and   
               Vivi Tornari and   
            Vincent Detalle and   
                Jean Luc Bodnar   Mapping of Defect Structural
                                  Micro-morphology in the Documentation of
                                  Conservation Approaches  . . . . . . . . 86--96
 Dafni Sidiropoulou-Velidou and   
       Andreas Georgopoulos and   
         José Luis Lerma   Exploitation of Thermal Imagery for the
                                  Detection of Pathologies in Monuments    97--108
          Nikolaos Doulamis and   
      Christos Yiakoumettis and   
                George Miaoulis   On-line Spectral Learning in Exploring
                                  $3$D Large Scale Geo-Referred Scenes . . 109--118
                Pierre Drap and   
               Djamal Merad and   
          Julien Seinturier and   
           Jean-Marc Bo\"\i and   
                 Daniela Peloso   An Information System for Medieval
                                  Archaeology Based on Photogrammetry and
                                  Archaeological Database: The Shawbak
                                  Castle Project . . . . . . . . . . . . . 119--128
              Athos Agapiou and   
   Diofantos G. Hadjimitsis and   
       Andreas Georgopoulos and   
               Apostolos Sarris   Towards an Archaeological Index:
                                  Identification of the Spectral Regions
                                  of Stress Vegetation due to Buried
                                  Archaeological Remains . . . . . . . . . 129--138
          Elena Gigliarelli and   
              Donato Carlea and   
            Angela Corcella and   
               Heleni Porfyriou   Historical Social Housing: Smart
                                  Analysis and Design for Conservation and
                                  Energy Regeneration  . . . . . . . . . . 139--148
Karina Rodriguez Echavarria and   
             Jaime Kaminski and   
                   David Arnold   $3$D Heritage on Mobile Devices:
                                  Scenarios and Opportunities  . . . . . . 149--158
            Philippe Fleury and   
               Sophie Madeleine   Reviving Ancient Rome: Virtual Reality
                                  at the Service of Cultural Heritage  . . 159--169
                Georg Zotti and   
              Wolfgang Neubauer   Virtual Reconstructions in a Desktop
                                  Planetarium for Demonstrations in
                                  Cultural Astronomy . . . . . . . . . . . 170--180
Belén Jiménez Fernández-Palacios and   
           Alessandro Rizzi and   
                  Francesco Nex   Augmented Reality for Archaeological
                                  Finds  . . . . . . . . . . . . . . . . . 181--190
            Hafizur Rahaman and   
                   Rana Das and   
                  Shehzad Zahir   Virtual Heritage: Exploring Photorealism 191--200
          Thomas P. Kersten and   
               Maren Lindstaedt   Virtual Architectural $3$D Model of the
                                  Imperial Cathedral (Kaiserdom) of
                                  Königslutter, Germany through Terrestrial
                                  Laser Scanning . . . . . . . . . . . . . 201--210
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7617, 2012

                 Arjan Blom and   
     Gerhard de Koning Gans and   
                  Erik Poll and   
            Joeri de Ruiter and   
                   Roel Verdult   Designed to Fail: a USB-Connected Reader
                                  for Online Banking . . . . . . . . . . . 1--16
           Benjamin Adolphi and   
                  Hanno Langweg   Security Add-Ons for Mobile Platforms    17--30
              Torben Jensen and   
             Heine Pedersen and   
           Mads Chr. Olesen and   
      René Rydhof Hansen   THAPS: Automated Vulnerability Scanning
                                  of PHP Applications  . . . . . . . . . . 31--46
           Teodor Sommestad and   
                 Jonas Hallberg   Cyber Security Exercises and
                                  Competitions as a Platform for Cyber
                                  Security Experiments . . . . . . . . . . 47--60
                   Tony Proctor   The Development of Cyber Security
                                  Warning, Advice and Report Points  . . . 61--72
              Ramona Groner and   
                  Philipp Brune   Towards an Empirical Examination of IT
                                  Security Infrastructures in SME  . . . . 73--88
             Fabio Massacci and   
                  Federica Paci   How to Select a Security Requirements
                                  Method? A Comparative Study with
                                  Students and Practitioners . . . . . . . 89--104
                Job Noorman and   
           Nick Nikiforakis and   
                 Frank Piessens   There Is Safety in Numbers: Preventing
                                  Control-Flow Hijacking by Duplication    105--120
           Dimiter Milushev and   
                    Dave Clarke   Coinductive Unwinding of
                                  Security-Relevant Hyperproperties  . . . 121--136
     Björn Ståhl and   
                 Per Mellstrand   Retooling and Securing Systemic
                                  Debugging  . . . . . . . . . . . . . . . 137--152
              Kirsi Helkala and   
      Nils Kalstad Svendsen and   
              Per Thorsheim and   
                   Anders Wiehe   Cracking Associative Passwords . . . . . 153--168
              Jan Zibuschka and   
                 Lothar Fritsch   A Hybrid Approach for Highly Available
                                  and Secure Storage of Pseudo-SSO
                                  Credentials  . . . . . . . . . . . . . . 169--183
        Behrooz Sangchoolie and   
        Mazdak Rajabi Nasab and   
             Tomas Olovsson and   
                  Wolfgang John   Assessing the Quality of Packet-Level
                                  Traces Collected on Internet Backbone
                                  Links  . . . . . . . . . . . . . . . . . 184--198
                 Jason W. Clark   Everything But the Kitchen Sink:
                                  Determining the Effect of Multiple
                                  Attacks on Privacy Preserving Technology
                                  Users  . . . . . . . . . . . . . . . . . 199--214
               Huiying Duan and   
              Cäcilia Zirn   Can We Identify Manipulative Behavior
                                  and the Corresponding Suspects on Review
                                  Websites Using Supervised Learning?  . . 215--230
                   Tobias Pulls   Privacy-Friendly Cloud Storage for the
                                  Data Track . . . . . . . . . . . . . . . 231--246
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7618, 2012

             Fatiha Djebbar and   
                   Beghdad Ayad   Audio Steganalysis Based on Lossless
                                  Data-Compression Techniques  . . . . . . 1--9
              Yang-Wai Chow and   
               Willy Susilo and   
                 Duncan S. Wong   Enhancing the Perceived Visual Quality
                                  of a Size Invariant Visual Cryptography
                                  Scheme . . . . . . . . . . . . . . . . . 10--21
 Carlos Gañán and   
       Jose L. Muñoz and   
              Oscar Esparza and   
     Jorge Mata-Díaz and   
                   Juanjo Alins   Impact of the Revocation Service in PKI
                                  Prices . . . . . . . . . . . . . . . . . 22--32
             Hatem M. Bahig and   
               Ashraf Bhery and   
                 Dieaa I. Nassr   Cryptanalysis of Multi-Prime RSA with
                                  Small Prime Difference . . . . . . . . . 33--44
                     Jun Xu and   
                     Lei Hu and   
                      Siwei Sun   Implicit Polynomial Recovery and
                                  Cryptanalysis of a Combinatorial Key
                                  Cryptosystem . . . . . . . . . . . . . . 45--57
               Shusheng Liu and   
                 Zheng Gong and   
                     Libin Wang   Improved Related-Key Differential
                                  Attacks on Reduced-Round LBlock  . . . . 58--69
                    Yajuan Tang   Countermeasures on Application Level
                                  Low-Rate Denial-of-Service Attack  . . . 70--80
           Zouheir Trabelsi and   
                Liren Zhang and   
                   Safaa Zeidan   Firewall Packet Filtering Optimization
                                  Using Statistical Traffic Awareness Test 81--92
                 John Felix and   
             Charles Joseph and   
                Ali A. Ghorbani   Group Behavior Metrics for P2P Botnet
                                  Detection  . . . . . . . . . . . . . . . 93--104
                    Yuan Ma and   
                 Luning Xia and   
              Jingqiang Lin and   
                  Jiwu Jing and   
                Zongbin Liu and   
                     Xingjie Yu   Hardware Performance Optimization and
                                  Evaluation of SM3 Hash Algorithm on FPGA 105--118
                  Hao Xiong and   
                 Cong Zhang and   
               Tsz Hon Yuen and   
              Echo P. Zhang and   
               Siu Ming Yiu and   
                     Sihan Qing   Continual Leakage-Resilient Dynamic
                                  Secret Sharing in the Split-State Model  119--130
              Wilko Henecka and   
                 Nigel Bean and   
                Matthew Roughan   Conversion of Real-Numbered
                                  Privacy-Preserving Problems into the
                                  Integer Domain . . . . . . . . . . . . . 131--141
                  Yang Wang and   
                  Man Ho Au and   
                   Willy Susilo   Perfect Ambiguous Optimistic Fair
                                  Exchange . . . . . . . . . . . . . . . . 142--153
             Xiaoqiong Pang and   
                    Bo Yang and   
                    Qiong Huang   Privacy-Preserving Noisy Keyword Search
                                  in Cloud Computing . . . . . . . . . . . 154--166
               Tsz Hon Yuen and   
              Joseph K. Liu and   
                Xinyi Huang and   
                  Man Ho Au and   
               Willy Susilo and   
                  Jianying Zhou   Forward Secure Attribute-Based
                                  Signatures . . . . . . . . . . . . . . . 167--177
                  Ning Ding and   
                        Dawu Gu   On Constant-Round Precise Zero-Knowledge 178--190
                 Jingwei Li and   
                 Chunfu Jia and   
                     Jin Li and   
                  Xiaofeng Chen   Outsourcing Encryption of
                                  Attribute-Based Encryption with
                                  MapReduce  . . . . . . . . . . . . . . . 191--201
            Atsushi Fujioka and   
              Taiichi Saito and   
                   Keita Xagawa   Security Enhancement of Identity-Based
                                  Identification with Reversibility  . . . 202--213
           Raja Naeem Akram and   
 Konstantinos Markantonakis and   
                    Keith Mayes   Coopetitive Architecture to Support a
                                  Dynamic and Scalable NFC Based Mobile
                                  Services Architecture  . . . . . . . . . 214--227
                 Jiawei Zhu and   
                   Zhi Guan and   
                  Yang Yang and   
                Liangwen Yu and   
                Huiping Sun and   
                     Zhong Chen   Permission-Based Abnormal Application
                                  Detection for Android  . . . . . . . . . 228--239
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7619, 2012

                Gavin C. Cawley   Over-Fitting in Model Selection and Its
                                  Avoidance  . . . . . . . . . . . . . . . 1--1
               Paola Sebastiani   Intelligent Data Analysis of Human
                                  Genetic Data . . . . . . . . . . . . . . 2--6
                    Arno Siebes   Queries for Data Analysis  . . . . . . . 7--22
               Zaenal Akbar and   
         Violeta N. Ivanova and   
            Michael R. Berthold   Parallel Data Mining Revisited. Better,
                                  Not Faster . . . . . . . . . . . . . . . 23--34
  Renato Cordeiro de Amorim and   
                  Trevor Fenner   Weighting Features for Partition around
                                  Medoids Using the Minkowski Metric . . . 35--44
  Renato Cordeiro de Amorim and   
              Peter Komisarczuk   On Initializations for the Minkowski
                                  Weighted K-Means . . . . . . . . . . . . 45--55
               Maurice Berk and   
               Giovanni Montana   A Skew-$t$-Normal Multi-level
                                  Reduced-Rank Functional PCA Model for
                                  the Analysis of Replicated Genomics Time
                                  Course Data  . . . . . . . . . . . . . . 56--66
            Mehrez Boulares and   
                  Mohamed Jemni   Methodological Foundation for Sign
                                  Language $3$D Motion Trajectory Analysis 67--77
           Christian Braune and   
          Christian Borgelt and   
                Sonja Grün   Assembly Detection in Continuous Neural
                                  Spike Train Data . . . . . . . . . . . . 78--89
              Josep Carmona and   
               Ricard Gavald\`a   Online Techniques for Dealing with
                                  Concept Drift in Process Mining  . . . . 90--102
                   Jun Chen and   
              Mahdi Mahfouf and   
              Chris Bingham and   
                   Yu Zhang and   
               Zhijing Yang and   
              Michael Gallimore   An Evolutionary Based Clustering
                                  Algorithm Applied to Dada Compression
                                  for Industrial Systems . . . . . . . . . 103--113
         Wouter Duivesteijn and   
  Eneldo Loza Mencía and   
    Johannes Fürnkranz and   
                    Arno Knobbe   Multi-label LeGo --- Enhancing
                                  Multi-label Classifiers with Local
                                  Patterns . . . . . . . . . . . . . . . . 114--125
           Andrej Gisbrecht and   
            Daniela Hofmann and   
                 Barbara Hammer   Discriminative Dimensionality Reduction
                                  Mappings . . . . . . . . . . . . . . . . 126--138
     Alípio M. Jorge and   
 João Mendes-Moreira and   
      Jorge Freire de Sousa and   
                  Carlos Soares   Finding Interesting Contexts for
                                  Explaining Deviations in Bus Trip
                                  Duration Using Distribution Rules  . . . 139--149
              Frank Klawonn and   
                 Nada Abidi and   
              Evelin Berger and   
             Lothar Jänsch   Curve Fitting for Short Time Series Data
                                  from High Throughput Experiments with
                                  Correction for Biological Variation  . . 150--160
Kleanthis-Nikolaos Kontonasios and   
                     Tijl DeBie   Formalizing Complex Prior Information to
                                  Quantify Subjective Interestingness of
                                  Frequent Pattern Sets  . . . . . . . . . 161--171
         Christine Largeron and   
          Christophe Moulin and   
            Mathias Géry   MCut: a Thresholding Strategy for
                                  Multi-label Classification . . . . . . . 172--183
       Matthijs van Leeuwen and   
           Diyah Puspitaningrum   Improving Tag Recommendation Using Few
                                  Associations . . . . . . . . . . . . . . 184--194
                 Eric Malmi and   
                Juha Raitio and   
              Oskar Kohonen and   
               Krista Lagus and   
                   Timo Honkela   Identifying Anomalous Social Contexts
                                  from Mobile Proximity Data Using
                                  Binomial Mixture Models  . . . . . . . . 195--206
Jean-Philippe Métivier and   
         Patrice Boizumault and   
    Bruno Crémilleux and   
                   Mehdi Khiari   Constrained Clustering Using SAT . . . . 207--218
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7620, 2012

               Kirsty Kitto and   
            Fabio Boschetti and   
                    Peter Bruza   The Quantum Inspired Modelling of
                                  Changing Attitudes and Self-organising
                                  Societies  . . . . . . . . . . . . . . . 1--12
     François Dubois and   
             Isabelle Greff and   
            Thomas Hélie   On Least Action Principles for Discrete
                                  Quantum Scales . . . . . . . . . . . . . 13--23
            Dominic Widdows and   
                   Trevor Cohen   Real, Complex, and Binary Semantic
                                  Vectors  . . . . . . . . . . . . . . . . 24--35
             Diederik Aerts and   
              Jan Broekaert and   
               Liane Gabora and   
                    Tomas Veloz   The Guppy Effect as Interference . . . . 36--47
             Diederik Aerts and   
               Sandro Sozzo and   
                  Jocelyn Tapia   A Quantum Model for the Ellsberg and
                                  Machina Paradoxes  . . . . . . . . . . . 48--59
             Masanari Asano and   
              Irina Basieva and   
          Andrei Khrennikov and   
                  Masanori Ohya   A Quantum-Like Model of \em Escherichia
                                  coli's Metabolism Based on Adaptive
                                  Dynamics . . . . . . . . . . . . . . . . 60--67
              Giuseppe Vitiello   Fractals, Dissipation and Coherent
                                  States . . . . . . . . . . . . . . . . . 68--79
        Jerome R. Busemeyer and   
                 Zheng Wang and   
          Jennifer S. Trueblood   Hierarchical Bayesian Estimation of
                                  Quantum Decision Model Parameters  . . . 80--89
               Trevor Cohen and   
            Dominic Widdows and   
              Lance De Vine and   
             Roger Schvaneveldt   Many Paths Lead to Discovery: Analogical
                                  Retrieval of Cancer Therapies  . . . . . 90--101
 Ariane Lambert-Mogiliansky and   
            Jerome R. Busemeyer   Emergence and Instability of Individual
                                  Identity . . . . . . . . . . . . . . . . 102--113
             Diederik Aerts and   
                   Sandro Sozzo   Entanglement of Conceptual Entities in
                                  Quantum Model Theory (QMod)  . . . . . . 114--125
             Diederik Aerts and   
                   Sandro Sozzo   Quantum Model Theory (QMod): Modeling
                                  Contextual Emergent Entangled
                                  Interfering Entities . . . . . . . . . . 126--137
             Masanari Asano and   
              Irina Basieva and   
          Andrei Khrennikov and   
                  Masanori Ohya   Quantum-Like Representation of
                                  Irrational Inference . . . . . . . . . . 138--147
          Christian Flender and   
        Günter Müller   Type Indeterminacy in Privacy Decisions:
                                  The Privacy Paradox Revisited  . . . . . 148--159
             Masanari Asano and   
              Irina Basieva and   
          Andrei Khrennikov and   
                  Masanori Ohya   Adaptive Dynamics and Its Application to
                                  Context Dependent Systems Breaking the
                                  Classical Probability Law  . . . . . . . 160--171
                David Galea and   
                Peter Bruza and   
               Kirsty Kitto and   
                 Douglas Nelson   Modelling Word Activation in Semantic
                                  Networks: Three Scaled Entanglement
                                  Models Compared  . . . . . . . . . . . . 172--183
       Ehtibar N. Dzhafarov and   
                Janne V. Kujala   Quantum Entanglement and the Issue of
                                  Selective Influences in Psychology: An
                                  Overview . . . . . . . . . . . . . . . . 184--195
                    Thomas Filk   Quantum-Like Behavior of Classical
                                  Systems  . . . . . . . . . . . . . . . . 196--206
Sándor Darányi and   
                   Peter Wittek   Connecting the Dots: Mass, Energy, Word
                                  Meaning, and Particle-Wave Duality . . . 207--217
             Michel Gondran and   
        Sébastien Lepaul   Indiscernability and Mean Field, a Base
                                  of Quantum Interaction . . . . . . . . . 218--226
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7621, 2012

                 Jesse Gray and   
               Cynthia Breazeal   Manipulating Mental States through
                                  Physical Action  . . . . . . . . . . . . 1--14
                   Jaap Ham and   
            Mirjam van Esch and   
             Yvonne Limpens and   
               Jente de Pee and   
            John-John Cabibihan   The Automaticity of Social Behavior
                                  towards Robots: The Influence of
                                  Cognitive Load on Interpersonal Distance
                                  to Approachable versus Less Approachable
                                  Robots . . . . . . . . . . . . . . . . . 15--25
                 Caixia Liu and   
                   Jaap Ham and   
                Eric Postma and   
                Cees Midden and   
               Bart Joosten and   
               Martijn Goudbeek   How to Make a Robot Smile? Perception of
                                  Emotional Expressions from
                                  Digitally-Extracted Facial Landmark
                                  Configurations . . . . . . . . . . . . . 26--34
           Gabriele Trovato and   
            Tatsuhiro Kishi and   
             Nobutsuna Endo and   
            Kenji Hashimoto and   
                Atsuo Takanishi   A Cross-Cultural Study on Generation of
                                  Culture Dependent Facial Expressions of
                                  Humanoid Social Robot  . . . . . . . . . 35--44
             Mary-Anne Williams   Robot Social Intelligence  . . . . . . . 45--55
           Evgenios Vlachos and   
            Henrik Schärfe   Android Emotions Revealed  . . . . . . . 56--65
                 Ben Robins and   
         Kerstin Dautenhahn and   
                 Paul Dickerson   Embodiment and Cognitive Learning ---
                                  Can a Humanoid Robot Help Children with
                                  Autism to Learn about Tactile Social
                                  Behaviour? . . . . . . . . . . . . . . . 66--75
                 Alvin Wong and   
               Yeow Kee Tan and   
                 Adrian Tay and   
               Anthony Wong and   
          Dilip Kumar Limbu and   
                  Tran Anh Dung   A User Trial Study to Understand Play
                                  Behaviors of Autistic Children Using a
                                  Social Robot . . . . . . . . . . . . . . 76--85
           Laura Boccanfuso and   
           Eva Juarez Perez and   
              Myra Robinson and   
                Jason M. O'Kane   Collecting Heart Rate Using a High
                                  Precision, Non-contact, Single-Point
                                  Infrared Temperature Sensor  . . . . . . 86--97
          Michihiro Shimada and   
             Takayuki Kanda and   
                Satoshi Koizumi   How Can a Social Robot Facilitate
                                  Children's Collaboration?  . . . . . . . 98--107
              Barbara Klein and   
                    Glenda Cook   Emotional Robotics in Elder Care --- a
                                  Comparison of Findings in the UK and
                                  Germany  . . . . . . . . . . . . . . . . 108--117
                 Haibin Yan and   
         Marcelo H. Ang Jr. and   
                   Aun Neow Poo   Dorothy Robotubby: a Robotic Nanny . . . 118--127
           Susanne Frennert and   
         Britt Östlund and   
            Håkan Eftring   Would Granny Let an Assistive Robot into
                                  Her Home?  . . . . . . . . . . . . . . . 128--137
        Tobias Körtner and   
           Alexandra Schmid and   
         Daliah Batko-Klein and   
         Christoph Gisinger and   
                  Andreas Huber   How Social Robots Make Older Users
                                  Really Feel Well --- a Method to Assess
                                  Users' Concepts of a Social Robotic
                                  Assistant  . . . . . . . . . . . . . . . 138--147
        Rebecca Q. Stafford and   
         Bruce A. MacDonald and   
            Elizabeth Broadbent   Identifying Specific Reasons Behind
                                  Unmet Needs May Inform More Specific
                                  Eldercare Robot Design . . . . . . . . . 148--157
             Akira Yamazaki and   
                 Ryosuke Masuda   Various Foods Handling Movement of
                                  Chopstick-Equipped Meal Assistant Robot
                                  and There Evaluation . . . . . . . . . . 158--167
           Sophya Yumakulov and   
               Dean Yergens and   
                Gregor Wolbring   Imagery of Disabled People within Social
                                  Robotics Research  . . . . . . . . . . . 168--177
                  I-Han Kuo and   
      Chandimal Jayawardena and   
        Elizabeth Broadbent and   
            Rebecca Q. Stafford   HRI Evaluation of a Healthcare Service
                                  Robot  . . . . . . . . . . . . . . . . . 178--187
          Claudia B. Rebola and   
          Gbolabo Ogunmakin and   
               Patricio A. Vela   Automated Behavioral Mapping for
                                  Monitoring Social Interactions among
                                  Older Adults . . . . . . . . . . . . . . 188--198
                     Julia Fink   Anthropomorphism and Human Likeness in
                                  the Design of Robots and Human-Robot
                                  Interaction  . . . . . . . . . . . . . . 199--208
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7622, 2012

             Bruce Christianson   Introduction: Bringing Protocols to Life
                                  (Transcript of Discussion) . . . . . . . 1--2
              Todd R. Andel and   
                  Alec Yasinsac   Secure Internet Voting Protocol for
                                  Overseas Military Voters . . . . . . . . 3--14
                  Todd R. Andel   Secure Internet Voting Protocol for
                                  Overseas Military Voters (Transcript of
                                  Discussion)  . . . . . . . . . . . . . . 15--22
                   Feng Hao and   
              Brian Randell and   
                   Dylan Clarke   Self-enforcing Electronic Voting . . . . 23--31
                       Feng Hao   Self-enforcing Electronic Voting
                                  (Transcript of Discussion) . . . . . . . 32--40
          Phillip J. Brooke and   
           Richard F. Paige and   
              Christopher Power   Approaches to Modelling Security
                                  Scenarios with Domain-Specific Languages 41--54
              Phillip J. Brooke   Approaches to Modelling Security
                                  Scenarios with Domain-Specific
                                  Languages(Transcript of Discussion)  . . 55--59
                Sandy Clark and   
                 Matt Blaze and   
              Jonathan M. Smith   The Casino and the OODA Loop . . . . . . 60--63
                     Matt Blaze   The Casino and the OODA Loop: Why Our
                                  Protocols Always Eventually Fail
                                  (Transcript of Discussion) . . . . . . . 64--75
                 Joseph Bonneau   Statistical Metrics for Individual
                                  Password Strength  . . . . . . . . . . . 76--86
                 Joseph Bonneau   Statistical Metrics for Individual
                                  Password Strength (Transcript of
                                  Discussion)  . . . . . . . . . . . . . . 87--95
       Tiffany Hyun-Jin Kim and   
              Virgil Gligor and   
                  Adrian Perrig   Street-Level Trust Semantics for
                                  Attribute Authentication . . . . . . . . 96--115
                  Virgil Gligor   Street-Level Trust Semantics for
                                  Attribute Authentication (Transcript of
                                  Discussion)  . . . . . . . . . . . . . . 116--125
               Dylan Clarke and   
                   Feng Hao and   
                  Brian Randell   Analysis of Issues and Challenges of
                                  E-Voting in the UK . . . . . . . . . . . 126--135
                   Dylan Clarke   Analysis of Issues and Challenges of
                                  E-Voting in the UK (Transcript of
                                  Discussion)  . . . . . . . . . . . . . . 136--144
                  Ross Anderson   Protocol Governance: The Elite, or the
                                  Mob? . . . . . . . . . . . . . . . . . . 145--145
                  Ross Anderson   Protocol Governance: The Elite, or the
                                  Mob? (Transcript of Discussion)  . . . . 146--160
              Yuko Murayama and   
          Yasuhiro Fujihara and   
               Yoshia Saito and   
                   Dai Nishioka   Usability Issues in Security . . . . . . 161--171
                  Yuko Murayama   Usability Issues in Security (Transcript
                                  of Discussion) . . . . . . . . . . . . . 172--180
               Shah Mahmood and   
                    Yvo Desmedt   Usable Privacy by Visual and Interactive
                                  Control of Information Flow  . . . . . . 181--188
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7623, 2012

             Neville A. Stanton   Human Factors Engineering as the
                                  Methodological Babel Fish: Translating
                                  User Needs into Software Design  . . . . 1--17
                  Emilia Mendes   Improving Software Effort Estimation
                                  Using an Expert-Centred Approach . . . . 18--33
         Lucio Davide Spano and   
         Antonio Cisternino and   
                Fabio Patern\`o   A Compositional Model for Gesture
                                  Definition . . . . . . . . . . . . . . . 34--52
        Llúcia Masip and   
      Célia Martinie and   
             Marco Winckler and   
          Philippe Palanque and   
                Toni Granollers   A Design Process for Exhibiting Design
                                  Choices and Trade-Offs in (Potentially)
                                  Conflicting User Interface Guidelines    53--71
      Célia Martinie and   
          Philippe Palanque and   
              David Navarre and   
                   Eric Barboni   A Development Process for Usable Large
                                  Scale Interactive Critical Systems:
                                  Application to Satellite Ground Segments 72--93
              Kati Kuusinen and   
             Tommi Mikkonen and   
               Santtu Pakarinen   Agile User Experience Development in a
                                  Large Software Organization: Good
                                  Expertise but Limited Impact . . . . . . 94--111
       Carlos Eduardo Silva and   
    José Creissac Campos   Can GUI Implementation Markup Languages
                                  Be Used for Modelling? . . . . . . . . . 112--129
                    Chris Roast   Constraining and Creating Solutions ---
                                  Reflections on the Analysis of Early
                                  Design . . . . . . . . . . . . . . . . . 130--145
         Artur H. Kronbauer and   
         Celso A. S. Santos and   
                 Vaninha Vieira   Smartphone Applications Usability
                                  Evaluation: a Hybrid Model and Its
                                  Implementation . . . . . . . . . . . . . 146--163
               Thomas Grill and   
             Ondrej Polacek and   
              Manfred Tscheligi   Methods towards API Usability: a
                                  Structural Analysis of Usability Problem
                                  Categories . . . . . . . . . . . . . . . 164--180
             Joël Vogt and   
                Kris Luyten and   
          Jan Van den Bergh and   
               Karin Coninx and   
                  Andreas Meier   Putting Dementia into Context  . . . . . 181--198
                Jose Danado and   
                Fabio Patern\`o   Puzzle: a Visual-Based Environment for
                                  End User Development in Touch-Based
                                  Mobile Phones  . . . . . . . . . . . . . 199--216
               Shamal Faily and   
                  John Lyle and   
                 Andre Paul and   
              Andrea Atzeni and   
              Dieter Blomme and   
                Heiko Desruelle   Requirements Sensemaking Using Concept
                                  Maps . . . . . . . . . . . . . . . . . . 217--232
Anne-Marie Déry-Pinna and   
             Audrey Occello and   
                 Michel Riveill   Towards Conflict Management in User
                                  Interface Composition Driven by Business
                                  Needs  . . . . . . . . . . . . . . . . . 233--250
       Oumout Chouseinoglou and   
                   Semih Bilgen   A Model for Assessing Organizational
                                  Learning in Software Development
                                  Organizations  . . . . . . . . . . . . . 251--258
            Kay Behrenbruch and   
      Martin Atzmüller and   
            Christoph Evers and   
             Ludger Schmidt and   
                    Gerd Stumme   A Personality Based Design Approach
                                  Using Subgroup Discovery . . . . . . . . 259--266
              Brigit van Loggem   Assessing Use Complexity of Software: a
                                  Tool for Documentation Designers . . . . 267--274
               Amin Rasooli and   
              Peter Forbrig and   
             Fattaneh Tagivareh   Collecting Users Profiles for Web
                                  Applications . . . . . . . . . . . . . . 275--282
            Elton R. Vieira and   
               Carina Alves and   
           Letícia Duboc   Creativity Patterns Guide: Support for
                                  the Application of Creativity Techniques
                                  in Requirements Engineering  . . . . . . 283--290
               Malte Ressin and   
              Cecilia Oyugi and   
José Abdelnour-Nocera and   
                  David Lee and   
                 Dharam Panesar   Exploring Local Cultural Perspectives in
                                  User Interface Development in an Indian
                                  Offshoring Context: a View from the UK   291--298
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7624, 2012

            Pedro Centieiro and   
        Teresa Romão and   
                A. Eduardo Dias   Applaud Having Fun: a Mobile Game to
                                  Cheer Your Favourite Sports Team . . . . 1--16
            Kazuyuki Fujita and   
          Hiroyuki Kidokoro and   
                    Yuichi Itoh   Paranga: An Interactive Flipbook . . . . 17--30
               Taku Hachisu and   
              Hiroyuki Kajimoto   Augmentation of Toothbrush by Modulating
                                  Sounds Resulting from Brushing . . . . . 31--43
            Shigeyuki Hirai and   
       Yoshinobu Sakakibara and   
                 Seiho Hayakawa   Bathcratch: Touch and Sound-Based DJ
                                  Controller Implemented on a Bathtub  . . 44--56
             Hiroyuki Kanke and   
         Yoshinari Takegawa and   
             Tsutomu Terada and   
             Masahiko Tsukamoto   Airstic Drum: a Drumstick for
                                  Integration of Real and Virtual Drums    57--69
             Fausto Mourato and   
             Fernando Birra and   
Manuel Próspero dos Santos   Enhancing Level Difficulty and
                                  Additional Content in Platform
                                  Videogames through Graph Analysis  . . . 70--84
          Tatsuhiko Okazaki and   
             Tsutomu Terada and   
             Masahiko Tsukamoto   A System for Supporting Performers in
                                  Stuffed Suits  . . . . . . . . . . . . . 85--100
       André Pereira and   
                  Rui Prada and   
                      Ana Paiva   Socially Present Board Game Opponents    101--116
               Kiyoshi Shin and   
              Kosuke Kaneko and   
                  Yu Matsui and   
                Koji Mikami and   
                  Masaru Nagaku   Localizing Global Game Jam: Designing
                                  Game Development for Collaborative
                                  Learning in the Social Context . . . . . 117--132
                Dhaval Vyas and   
                Yanqing Cui and   
                Jarno Ojala and   
                  Guido Grassel   Producing while Consuming: Social
                                  Interaction around Photos Shared within
                                  Private Group  . . . . . . . . . . . . . 133--150
              Shih-Han Chan and   
     Stéphane Natkin and   
            Guillaume Tiger and   
                Alexandre Topol   Extensible Sound Description in COLLADA:
                                  a Unique File for a Rich Sound Design    151--166
               Tai-Yun Chen and   
               Hung-Wei Hsu and   
                Wen-Kai Tai and   
                Chin-Chen Chang   An Automatic Race Track Generating
                                  System . . . . . . . . . . . . . . . . . 167--181
              Yongsoon Choi and   
              Rahul Parsani and   
               Xavier Roman and   
       Anshul Vikram Pandey and   
             Adrian David Cheok   Light Perfume: Designing a Wearable
                                  Lighting and Olfactory Accessory for
                                  Empathic Interactions  . . . . . . . . . 182--197
               Chris Deaker and   
           Masood Masoodian and   
                    Bill Rogers   A Survey of Players' Opinions on
                                  Interface Customization in World of
                                  Warcraft . . . . . . . . . . . . . . . . 198--213
         Dimitris Grammenos and   
            George Margetis and   
     Panagiotis Koutlemanis and   
               Xenophon Zabulis   53.090 Virtual Rusks = 510 Real Smiles
                                  Using a Fun Exergame Installation for
                                  Advertising Traditional Food Products    214--229
   Kaj Grònbæk and   
      Karen Johanne Kortbek and   
        Claus Mòller and   
             Jesper Nielsen and   
             Liselott Stenfeldt   Designing Playful Interactive
                                  Installations for Urban Environments ---
                                  The SwingScape Experience  . . . . . . . 230--245
                Olivier Guy and   
               Ronan Champagnat   Flashback in Interactive Storytelling    246--261
             Robert Howland and   
                Sachi Urano and   
                Junichi Hoshino   SanjigenJiten: Computer Assisted
                                  Language Learning System within a $3$D
                                  Game Environment . . . . . . . . . . . . 262--273
                 Yuko Konya and   
                     Itiro Siio   A Caption Presentation System for the
                                  Hearing Impaired People Attending
                                  Theatrical Performances  . . . . . . . . 274--286
                  Kinyo Kou and   
             Yoichiro Kawaguchi   Emergent Gait Evolution of Quadruped
                                  Artificial Life  . . . . . . . . . . . . 287--296
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7625, 2012

                Oana Andrei and   
                   Muffy Calder   Trend-Based Analysis of a Population
                                  Model of the AKAP Scaffold Protein . . . 1--25
             Alessio Angius and   
András Horváth and   
                    Verena Wolf   Quasi Product Form Approximation for
                                  Markov Models of Reaction Networks . . . 26--52
              Ezio Bartocci and   
               Pietro Li\`o and   
           Emanuela Merelli and   
                Nicola Paoletti   Multiple Verification in Complex
                                  Biological Systems: The Bone Remodelling
                                  Case Study . . . . . . . . . . . . . . . 53--76
                    L. Brim and   
        J. Fabriková and   
                S. Dra\vzan and   
           D. \vSafránek   On Approximative Reachability Analysis
                                  of Biochemical Dynamical Systems . . . . 77--101
        Andrzej Ehrenfeucht and   
               Jetty Kleijn and   
              Maciej Koutny and   
             Grzegorz Rozenberg   Minimal Reaction Systems . . . . . . . . 102--122
           Cristian Versari and   
            Gianluigi Zavattaro   Complex Functional Rates in Rule-Based
                                  Languages for Biochemistry . . . . . . . 123--150
                 Qixia Yuan and   
      Panuwat Trairatphisan and   
                   Jun Pang and   
                Sjouke Mauw and   
              Monique Wiesinger   Probabilistic Model Checking of the PDGF
                                  Signaling Pathway  . . . . . . . . . . . 151--180
             Andrzej Mizera and   
             Eugen Czeizler and   
                      Ion Petre   Self-assembly Models of Variable
                                  Resolution . . . . . . . . . . . . . . . 181--203
                Rodrick Wallace   Metabolic Constraints on the Evolution
                                  of Genetic Codes: Did Multiple
                                  Preaerobic' Ecosystem Transitions
                                  Entrain Richer Dialects via Serial
                                  Endosymbiosis? . . . . . . . . . . . . . 204--232
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7626, 2012

                    George Nagy   Estimation, Learning, and Adaptation:
                                  Systems That Improve with Use  . . . . . 1--10
               Kenichi Kanatani   Optimization Techniques for Geometric
                                  Estimation: Beyond Minimization  . . . . 11--30
               Ale\vs Leonardis   Hierarchical Compositional
                                  Representations of Object Structure  . . 31--32
                    Lin Han and   
                 Luca Rossi and   
            Andrea Torsello and   
          Richard C. Wilson and   
               Edwin R. Hancock   Information Theoretic Prototype
                                  Selection for Unattributed Graphs  . . . 33--41
      Benoit Gaüz\`ere and   
                   Luc Brun and   
                Didier Villemin   Graph Kernels: Crossing Information from
                                  Different Patterns Using Graph Edit
                                  Distance . . . . . . . . . . . . . . . . 42--50
          Robert P. W. Duin and   
             Ana L. N. Fred and   
                 Marco Loog and   
          El\.zbieta P\kekalska   Mode Seeking Clustering by KNN and Mean
                                  Shift Evaluated  . . . . . . . . . . . . 51--59
                  Zhouyu Fu and   
                  Guojun Lu and   
              Kai-Ming Ting and   
                Dengsheng Zhang   Learning Sparse Kernel Classifiers in
                                  the Primal . . . . . . . . . . . . . . . 60--69
               Lucas Franek and   
                   Xiaoyi Jiang   Evolutionary Weighted Mean Based
                                  Framework for Generalized Median
                                  Computation with Application to Strings  70--78
                     Lu Bai and   
               Edwin R. Hancock   Graph Complexity from the
                                  Jensen--Shannon Divergence . . . . . . . 79--88
                   Aasa Feragen   Complexity of Computing Distances
                                  between Geometric Trees  . . . . . . . . 89--97
       Xavier Cortés and   
         Francesc Serratosa and   
     Albert Solé-Ribalta   Active Graph Matching Based on Pairwise
                                  Probabilities between Nodes  . . . . . . 98--106
          Nicola Rebagliati and   
 Albert Solé-Ribalta and   
           Marcello Pelillo and   
             Francesc Serratosa   On the Relation between the Common
                                  Labelling and the Median Graph . . . . . 107--115
Silvio Jamil F. Guimarães and   
                Jean Cousty and   
            Yukiko Kenmochi and   
                 Laurent Najman   A Hierarchical Image Segmentation
                                  Algorithm Based on an Observation Scale  116--125
          Martin Tschirsich and   
                  Arjan Kuijper   A Discrete Scale Space Neighborhood for
                                  Robust Deep Structure Extraction . . . . 126--134
               Jaume Gibert and   
             Ernest Valveny and   
                Horst Bunke and   
           Alicia Fornés   On the Correlation of Graph Edit
                                  Distance and $L_1$ Distance in the
                                  Attribute Statistics Embedding Space . . 135--143
                 Luca Rossi and   
            Andrea Torsello and   
               Edwin R. Hancock   Approximate Axial Symmetries from
                                  Continuous Time Quantum Walks  . . . . . 144--152
               Sergej Lewin and   
               Xiaoyi Jiang and   
                 Achim Clausing   A Clustering-Based Ensemble Technique
                                  for Shape Decomposition  . . . . . . . . 153--161
          Martin Tschirsich and   
                  Arjan Kuijper   Laplacian Eigenimages in Discrete Scale
                                  Space  . . . . . . . . . . . . . . . . . 162--170
              Laura Antanas and   
             Paolo Frasconi and   
             Fabrizio Costa and   
           Tinne Tuytelaars and   
                   Luc De Raedt   A Relational Kernel-Based Framework for
                                  Hierarchical Image Understanding . . . . 171--180
                     Lu Bai and   
           Edwin R. Hancock and   
                       Peng Ren   A Jensen--Shannon Kernel for Hypergraphs 181--189
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7628, 2012

              Jean-Paul Laumond   A Geometric Perspective of
                                  Anthropomorphic Embodied Actions . . . . 1--1
               Yoshiyuki Sankai   Cybernics: Fusion of Human, Machine and
                                  Information  . . . . . . . . . . . . . . 2--2
                  Michael Beetz   If Abstraction Is the Answer, What Is
                                  the Question?--- Reasoning for Everyday
                                  Manipulation Tasks . . . . . . . . . . . 3--3
      Salvatore M. Anzalone and   
         Yuichiro Yoshikawa and   
           Hiroshi Ishiguro and   
             Emanuele Menegatti   Towards Partners Profiling in Human
                                  Robot Interaction Contexts . . . . . . . 4--15
       Blagovest Vladimirov and   
                   Hyun Kim and   
                   Namshik Park   Motivation-Based Autonomous Behavior
                                  Control of Robotic Computer  . . . . . . 16--27
             Kazuyoshi Wada and   
           Keisuke Takayama and   
            Yusuke Suganuma and   
               Toshihiko Suzuki   An Evaluation Method for Smart Variable
                                  Space in Living Space  . . . . . . . . . 28--39
         Konrad Ku\lakowski and   
                   Tomasz Szmuc   Modeling Robot Behavior with CCL . . . . 40--51
             Robert Coleman and   
   Vladimir Estivill-Castro and   
          René Hexel and   
                     Carl Lusty   Visual-Trace Simulation of Concurrent
                                  Finite-State Machines for Validation and
                                  Model-Checking of Complex Behaviour  . . 52--64
                Evan Drumwright   Fast Dynamic Simulation of Highly
                                  Articulated Robots with Contact via
                                  $\Theta(n^2)$ Time Dense Generalized
                                  Inertia Matrix Inversion . . . . . . . . 65--76
             Xiaogang Xiong and   
                Ryo Kikuuwe and   
                Motoji Yamamoto   A Differential-Algebraic Multistate
                                  Friction Model . . . . . . . . . . . . . 77--88
          Andreas Rune Fugl and   
     Henrik Gordon Petersen and   
               Morten Willatzen   Simulation of Flexible Objects in
                                  Robotics . . . . . . . . . . . . . . . . 89--100
               Florian Lier and   
               Simon Schulz and   
           Ingo Lütkebohle   Continuous Integration for Iterative
                                  Validation of Simulated Robot Models . . 101--112
              Arne Nordmann and   
              Matthias Rolf and   
                Sebastian Wrede   Software Abstractions for Simulation and
                                  Control of a Continuum Robot . . . . . . 113--124
                 Paul Kilgo and   
             Eugene Syriani and   
                Monica Anderson   A Visual Modeling Language for RDIS and
                                  ROS Nodes Using AToM$^3$ . . . . . . . . 125--136
              Andrew Kimmel and   
              Andrew Dobson and   
         Zakary Littlefield and   
       Athanasios Krontiris and   
                   James Marble   PRACSYS: An Extensible Architecture for
                                  Composing Motion Controllers and
                                  Planners . . . . . . . . . . . . . . . . 137--148
              Saadia Dhouib and   
                Selma Kchir and   
           Serge Stinckwich and   
               Tewfik Ziadi and   
                    Mikal Ziane   RobotML, a Domain-Specific Language to
                                  Design, Simulate and Deploy Robotic
                                  Applications . . . . . . . . . . . . . . 149--160
              Luca Gherardi and   
             Davide Brugali and   
                Daniele Comotti   A Java vs. C++ Performance Evaluation: a
                                  $3$D Modeling Benchmark  . . . . . . . . 161--172
               Gordon Klaus and   
               Kyrre Glette and   
            Jim Tòrresen   A Comparison of Sampling Strategies for
                                  Parameter Estimation of a Robot
                                  Simulator  . . . . . . . . . . . . . . . 173--184
            Masahiro Shiomi and   
         Francesco Zanlungo and   
             Kotaro Hayashi and   
                 Takayuki Kanda   A Framework with a Pedestrian Simulator
                                  for Deploying Robots into a Real
                                  Environment  . . . . . . . . . . . . . . 185--196
        Gilberto Echeverria and   
   Séverin Lemaignan and   
            Arnaud Degroote and   
              Simon Lacroix and   
                   Michael Karg   Simulating Complex Robotic Scenarios
                                  with MORSE . . . . . . . . . . . . . . . 197--208
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7631, 2012

                Yiming Jing and   
              Gail-Joon Ahn and   
                     Hongxin Hu   Model-Based Conformance Testing for
                                  Android  . . . . . . . . . . . . . . . . 1--18
            Takanori Yasuda and   
            Tsuyoshi Takagi and   
                Kouichi Sakurai   Application of Scalar Multiplication of
                                  Edwards Curves to Pairing-Based
                                  Cryptography . . . . . . . . . . . . . . 19--36
            Chien-Ning Chen and   
                Nisha Jacob and   
          Sebastian Kutzner and   
                   San Ling and   
                 Axel Poschmann   Standardized Signature Algorithms on
                                  Ultra-constrained 4-Bit MCU  . . . . . . 37--50
               Kenta Nekado and   
            Yasuyuki Nogami and   
                   Kengo Iokibe   Very Short Critical Path Implementation
                                  of AES with Direct Logic Gates . . . . . 51--68
                Kazuki Yoneyama   One-Round Authenticated Key Exchange
                                  with Strong Forward Secrecy in the
                                  Standard Model against Constrained
                                  Adversary  . . . . . . . . . . . . . . . 69--86
              S. Sree Vivek and   
     S. Sharmila Deva Selvi and   
                C. Pandu Rangan   Compact Stateful Encryption Schemes with
                                  Ciphertext Verifiability . . . . . . . . 87--104
              Geong Sen Poh and   
    Moesfa Soeheila Mohamad and   
            Muhammad Reza Z'aba   Structured Encryption for Conceptual
                                  Graphs . . . . . . . . . . . . . . . . . 105--122
            Akinori Kawachi and   
           Hirotoshi Takebe and   
                 Keisuke Tanaka   Symmetric-Key Encryption Scheme with
                                  Multi-ciphertext Non-malleability  . . . 123--137
             Takanori Isobe and   
         Toshihiro Ohigashi and   
                 Masakatu Morii   Slide Cryptanalysis of Lightweight
                                  Stream Cipher RAKAPOSHI  . . . . . . . . 138--155
                  Yu Sasaki and   
                   Lei Wang and   
          Yasuhiro Takasaki and   
             Kazuo Sakiyama and   
                     Kazuo Ohta   Boomerang Distinguishers for Full
                                  HAS-160 Compression Function . . . . . . 156--169
                   Lei Wang and   
                  Yu Sasaki and   
             Kazuo Sakiyama and   
                     Kazuo Ohta   Polynomial-Advantage Cryptanalysis of
                                  $3$D Cipher and $3$D-Based Hash Function 170--181
              Jingjing Wang and   
                 Kefei Chen and   
                   Shixiong Zhu   Annihilators of Fast Discrete Fourier
                                  Spectra Attacks  . . . . . . . . . . . . 182--196
                 Jiqiang Lu and   
             Yongzhuang Wei and   
               Enes Pasalic and   
            Pierre-Alain Fouque   Meet-in-the-Middle Attack on Reduced
                                  Versions of the Camellia Block Cipher    197--215
           Susumu Kiyoshima and   
           Yoshifumi Manabe and   
               Tatsuaki Okamoto   Efficient Concurrent Oblivious Transfer
                                  in Super-Polynomial-Simulation Security  216--232
                 Youwen Zhu and   
            Tsuyoshi Takagi and   
                 Liusheng Huang   Efficient Secure Primitive for Privacy
                                  Preserving Distributed Computations  . . 233--243
              Itsuki Suzuki and   
               Maki Yoshida and   
                  Toru Fujiwara   Generic Construction of GUC Secure
                                  Commitment in the KRK Model  . . . . . . 244--260
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7632, 2012

         Twan van Laarhoven and   
                Elena Marchiori   Robust Community Detection Methods with
                                  Resolution Parameter for Complex
                                  Detection in Protein Protein Interaction
                                  Networks . . . . . . . . . . . . . . . . 1--13
             Pedro J. Ballester   Machine Learning Scoring Functions Based
                                  on Random Forest and Support Vector
                                  Regression . . . . . . . . . . . . . . . 14--25
                Sami Laroum and   
      Béatrice Duval and   
          Dominique Tessier and   
                    Jin-Kao Hao   A Genetic Algorithm for Scale-Based
                                  Translocon Simulation  . . . . . . . . . 26--37
                  Yifeng Li and   
               Alioune Ngom and   
                     Luis Rueda   A Framework of Gene Subset Selection
                                  Using Multiobjective Evolutionary
                                  Algorithm  . . . . . . . . . . . . . . . 38--48
               Masae Hosoda and   
                Yukie Akune and   
       Kiyoko F. Aoki-Kinoshita   Multiple Tree Alignment with Weights
                                  Applied to Carbohydrates to Extract
                                  Binding Recognition Patterns . . . . . . 49--58
             Shuzhong Zhang and   
                   Kun Wang and   
                 Cody Ashby and   
                Bilian Chen and   
                  Xiuzhen Huang   A Unified Adaptive Co-identification
                                  Framework for High-D Expression Data . . 59--70
      Chendra Hadi Suryanto and   
               Hiroto Saigo and   
                 Kazuhiro Fukui   Protein Clustering on a Grassmann
                                  Manifold . . . . . . . . . . . . . . . . 71--81
              Boris Shabash and   
                  Kay Wiese and   
                    Edward Glen   Improving the Portability and
                                  Performance of jViz.RNA --- a Dynamic
                                  RNA Visualization Software . . . . . . . 82--93
              Lavneet Singh and   
              Girija Chetty and   
              Dharmendra Sharma   A Novel Machine Learning Approach for
                                  Detecting the Brain Abnormalities from
                                  MRI Structural Images  . . . . . . . . . 94--105
   Gabriel Keeble-Gagn\`ere and   
 Johan Nyström-Persson and   
        Matthew I. Bellgard and   
                Kenji Mizuguchi   An Open Framework for Extensible
                                  Multi-stage Bioinformatics Software  . . 106--117
        João Cardoso and   
        Paulo Vilaça and   
        Simão Soares and   
                   Miguel Rocha   An Algorithm to Assemble
                                  Gene-Protein-Reaction Associations for
                                  Genome-Scale Metabolic Model
                                  Reconstruction . . . . . . . . . . . . . 118--128
          Marcelo Maraschin and   
Amélia Somensi-Zeggio and   
         Simone K. Oliveira and   
                 Shirley Kuhnen   A Machine Learning and Chemometrics
                                  Assisted Interpretation of Spectroscopic
                                  Data --- a NMR-Based Metabolomics
                                  Platform for the Assessment of Brazilian
                                  Propolis . . . . . . . . . . . . . . . . 129--140
              Y.-H. Taguchi and   
                  Akira Okamoto   Principal Component Analysis for
                                  Bacterial Proteomic Analysis . . . . . . 141--152
              Nikolay Razin and   
            Dmitry Sungurov and   
                Vadim Mottl and   
               Ivan Torshin and   
             Valentina Sulimova   Application of the Multi-modal Relevance
                                  Vector Machine to the Problem of Protein
                                  Secondary Structure Prediction . . . . . 153--165
          Fabienne Thomarat and   
               Fabien Lauer and   
                  Yann Guermeur   Cascading Discriminant and Generative
                                  Models for Protein Secondary Structure
                                  Prediction . . . . . . . . . . . . . . . 166--177
              Masahito Ohue and   
             Yuri Matsuzaki and   
             Takashi Ishida and   
                 Yutaka Akiyama   Improvement of the Protein--Protein
                                  Docking Prediction by Introducing a
                                  Simple Hydrophobic Interaction Model: An
                                  Application to Interaction Pathway
                                  Analysis . . . . . . . . . . . . . . . . 178--187
                 Cem Meydan and   
            Osman Ugur Sezerman   Representation of Protein Secondary
                                  Structure Using Bond-Orientational Order
                                  Parameters . . . . . . . . . . . . . . . 188--197
                  Yifeng Li and   
                   Alioune Ngom   Diagnose the Premalignant Pancreatic
                                  Cancer Using High Dimensional Linear
                                  Machine  . . . . . . . . . . . . . . . . 198--209
            Raunaq Malhotra and   
         Shruthi Prabhakara and   
                    Raj Acharya   Predicting V(D)J Recombination Using
                                  Conditional Random Fields  . . . . . . . 210--221
              Dusan Popovic and   
           Alejandro Sifrim and   
    Georgios A. Pavlopoulos and   
                Yves Moreau and   
                   Bart De Moor   A Simple Genetic Algorithm for Biomarker
                                  Mining . . . . . . . . . . . . . . . . . 222--232
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7633, 2012

                 Zhenhua Qu and   
                  Weiqi Luo and   
                     Jiwu Huang   Identifying Shifted Double JPEG
                                  Compression Artifacts for Non-intrusive
                                  Digital Image Forensics  . . . . . . . . 1--8
              Shouhong Ding and   
               Feiyue Huang and   
                Zhifeng Xie and   
                Yongjian Wu and   
                    Lizhuang Ma   A Novel Customized Recompression
                                  Framework for Massive Internet Images    9--16
                Xueying Qin and   
                  Rui Zhang and   
                   Lili Lin and   
                  Fan Zhong and   
                Guanyu Xing and   
                  Qunsheng Peng   Decomposition Equation of Basis Images
                                  with Consideration of Global
                                  Illumination . . . . . . . . . . . . . . 17--24
            Zhongqiang Wang and   
                         Li Zhu   Intrinsic Image Decomposition with Local
                                  Smooth Assumption and Global Color
                                  Assumption . . . . . . . . . . . . . . . 25--32
                    Jing Li and   
                  Gang Zeng and   
                    Rui Gan and   
                Hongbin Zha and   
                      Long Wang   A Game-Theoretical Approach to Image
                                  Segmentation . . . . . . . . . . . . . . 33--42
                     Yu Guo and   
                Xiaowu Chen and   
                   Bin Zhou and   
                   Qinping Zhao   Clothed and Naked Human Shapes
                                  Estimation from a Single Image . . . . . 43--50
               Xiaohui Wang and   
                    Jia Jia and   
                 Hanyu Liao and   
                   Lianhong Cai   Image Colorization with an Affective
                                  Word . . . . . . . . . . . . . . . . . . 51--58
                    Na Chen and   
             Viktor K. Prasanna   Semantic Image Clustering Using Object
                                  Relation Network . . . . . . . . . . . . 59--66
              Guo-Xin Zhang and   
                 Yu-Kun Lai and   
                     Shi-Min Hu   Efficient Solid Texture Synthesis Using
                                  Gradient Solids  . . . . . . . . . . . . 67--74
                  Hanqi Fan and   
              Qunsheng Peng and   
                      Yizhou Yu   A Robust Algorithm for Denoising Meshes
                                  with High-Resolution Details . . . . . . 75--82
                 Jieyi Zhao and   
                   Min Tang and   
                   Ruofeng Tong   Mesh Segmentation for Parallel
                                  Decompression on GPU . . . . . . . . . . 83--90
               Qian-Yi Zhou and   
                 Ulrich Neumann   Modeling Residential Urban Areas from
                                  Dense Aerial LiDAR Point Clouds  . . . . 91--98
                Yanlin Weng and   
                Dongping Li and   
                    Yiying Tong   Constrained Texture Mapping on
                                  Subdivision Surfaces . . . . . . . . . . 99--106
                  Qiang Fan and   
                        Chun Qi   Similar Region Contrast Based Salient
                                  Object Detection . . . . . . . . . . . . 107--114
               Yongwei Miao and   
               Jieqing Feng and   
               Jinrong Wang and   
                Renato Pajarola   A Shape Enhancement Technique Based on
                                  Multi-channel Salience Measure . . . . . 115--121
            Yong-Liang Yang and   
                  Chao-Hui Shen   Multi-scale Salient Feature Extraction
                                  on Mesh Models . . . . . . . . . . . . . 122--129
                   Jie Wang and   
              Caiming Zhang and   
              Yuanfeng Zhou and   
                     Yu Wei and   
                         Yi Liu   Global Contrast of Superpixels Based
                                  Salient Region Detection . . . . . . . . 130--137
                  Lei Zhang and   
                   Yao Zhao and   
                   Zhenfeng Zhu   Incremental Shared Subspace Learning for
                                  Multi-label Classification . . . . . . . 138--145
               Yong-Jin Liu and   
                Qiu-Fang Fu and   
                     Ye Liu and   
                    Xiao-Lan Fu   $2$D-Line-Drawing-Based $3$D Object
                                  Recognition  . . . . . . . . . . . . . . 146--153
                Yanhui Xiao and   
               Zhenfeng Zhu and   
                       Yao Zhao   Graph Regularized ICA for Over-Complete
                                  Feature Learning . . . . . . . . . . . . 154--161
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7634, 2012

              XiaoXiao Feng and   
           Koichi Matsumoto and   
                Shigeo Sugimoto   Uncovering the Secrets of Daoism \em Fus
                                  Using Digital Dao-Fa Hui-Yuan  . . . . . 1--10
               Ryan Baumann and   
      Christopher Blackwell and   
                W. Brent Seales   Automatic Perspective Correction of
                                  Manuscript Images  . . . . . . . . . . . 11--18
                  Chao Wang and   
                Ling Zhuang and   
                Jiangqin Wu and   
                      Feng Zhou   An Ontology-Based Fuzzy Matching
                                  Approach to Semantic Retrieval of
                                  Historical Place Names . . . . . . . . . 19--28
                Amjad Usman and   
               Sharifullah Khan   Exploiting Semantics in Subject-Based
                                  Searching of DSpace  . . . . . . . . . . 29--38
            Kazuya Fujikawa and   
                 Hideo Joho and   
             Shin'ichi Nakayama   Constraint Can Affect Human Perception,
                                  Behaviour, and Performance of Search . . 39--48
              Lighton Phiri and   
              Kyle Williams and   
             Miles Robinson and   
              Stuart Hammar and   
                Hussein Suleman   Bonolo: a General Digital Library System
                                  for File-Based Collections . . . . . . . 49--58
                 Emi Ishita and   
            Yukiko Watanabe and   
               Ai Yamaguchi and   
                 Takako Oda and   
                 Yuiko Higa and   
                  Miki Horiuchi   The Ratio of Conference Papers in
                                  Citations of Engineering Dissertations
                                  at Kyushu University . . . . . . . . . . 59--62
             Tanja Mer\vcun and   
               Maja \vZumer and   
                  Trond Aalberg   Presenting and Exploring the Complexity
                                  of Bibliographic Relationships . . . . . 63--66
              R. Guruprasad and   
              Khaiser Nikam and   
                   P. Marimuthu   Use Patterns of Aerospace E-Indexing,
                                  Abstracting and Citation Services: a
                                  Research Study of Aerospace Scientists
                                  and Engineers of Bangalore . . . . . . . 67--72
        Christopher C. Yang and   
                Xuning Tang and   
                   Min Song and   
                     Suyeon Kim   A Trend Analysis of Domain-Specific
                                  Literatures with Content and Co-author
                                  Network Similarity . . . . . . . . . . . 73--76
               Rushdi Shams and   
               Robert E. Mercer   Improving Supervised Keyphrase Indexer
                                  Classification of Keyphrases with Text
                                  Denoising  . . . . . . . . . . . . . . . 77--86
             Tetsuya Mihara and   
         Mitsuharu Nagamori and   
                Shigeo Sugimoto   A Metadata-Centric Approach to a
                                  Production and Browsing Platform of
                                  Manga  . . . . . . . . . . . . . . . . . 87--96
                Yundong Cai and   
             Yin-Leng Theng and   
                 Qimeng Cai and   
                   Zhi Ling and   
                  Yangbo Ou and   
                   Gladys Theng   Crowdsourcing Metadata Schema Generation
                                  for Chinese-Style Costume Digital
                                  Library  . . . . . . . . . . . . . . . . 97--105
       Esther Meng-Yoke Tan and   
          Dion Hoe-Lian Goh and   
             Yin-Leng Theng and   
                   Schubert Foo   Social Interaction Patterns during
                                  Mobile Information Seeking . . . . . . . 106--115
              Liangju Zheng and   
                 Weiming Lu and   
                 Meng Zhang and   
              Baofeng Zhang and   
                    Baogang Wei   A Scalable, Adaptive, Self-management
                                  and Fault-Tolerant Architecture for
                                  Digital Library  . . . . . . . . . . . . 116--125
           Ei Pa Pa Pe-Than and   
          Dion Hoe-Lian Goh and   
                  Chei Sian Lee   Enjoyment of a Mobile Information
                                  Sharing Game: Perspectives from Needs
                                  Satisfaction and Information Quality . . 126--135
           Suparp Kanyacome and   
               Smarn Loipha and   
         Somchai Numprasertchai   Needs of Collaborative Digital Library
                                  for Secondary School Students in
                                  Thailand . . . . . . . . . . . . . . . . 136--139
                 Marius Nel and   
              Kyle Williams and   
                Hussein Suleman   Evaluating Large Image Support for
                                  DSpace . . . . . . . . . . . . . . . . . 140--143
              Hsiao-Tieh Pu and   
                 Ying-Han Chang   User Navigation for Online Video
                                  Leisure: An Exploratory Study  . . . . . 144--147
               Maja \vZumer and   
              Athena Salaba and   
                      Yin Zhang   User Verification of the FRBR Conceptual
                                  Model and Testing of FRBR Prototypes . . 148--151
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7635, 2012

                   Mario Tokoro   Toward Practical Application of Formal
                                  Methods in Software Lifecycle Processes  1--1
                   Darren Cofer   Formal Methods in the Aerospace
                                  Industry: Follow the Money . . . . . . . 2--3
              Robert E. Shostak   Applying Term Rewriting to Speech
                                  Recognition of Numbers . . . . . . . . . 4--4
               Duy-Khanh Le and   
              Wei-Ngan Chin and   
                  Yong-Meng Teo   Variable Permissions for Concurrency
                                  Verification . . . . . . . . . . . . . . 5--21
              Xiaoxiao Yang and   
                   Yu Zhang and   
                    Ming Fu and   
                     Xinyu Feng   A Concurrent Temporal Programming Model
                                  with Atomic Blocks . . . . . . . . . . . 22--37
          Granville Barnett and   
                  Shengchao Qin   A Composable Mixed Mode Concurrency
                                  Control Semantics for Transactional
                                  Programs . . . . . . . . . . . . . . . . 38--53
          Edmond Gjondrekaj and   
             Michele Loreti and   
           Rosario Pugliese and   
           Francesco Tiezzi and   
                Carlo Pinciroli   Towards a Formal Verification
                                  Methodology for Collective Robotic
                                  Systems  . . . . . . . . . . . . . . . . 54--70
        Einar Broch Johnsen and   
            Rudolf Schlatte and   
     Silvia Lizeth Tapia Tarifa   Modeling Resource-Aware Virtualized
                                  Applications for the Cloud in Real-Time
                                  ABS  . . . . . . . . . . . . . . . . . . 71--86
             Kazuhiro Ogata and   
           Phan Thi Thanh Huyen   Specification and Model Checking of the
                                  Chandy and Lamport Distributed Snapshot
                                  Algorithm in Rewriting Logic . . . . . . 87--102
                     Chunyan Mu   Quantitative Program Dependence Graphs   103--118
               Tarek Mhamdi and   
                Osman Hasan and   
                Sofi\`ene Tahar   Quantitative Analysis of Information
                                  Flow Using Theorem Proving . . . . . . . 119--134
            Mahsa Varshosaz and   
                Ramtin Khosravi   Modeling and Verification of
                                  Probabilistic Actor Systems Using
                                  pRebeca  . . . . . . . . . . . . . . . . 135--150
                Qiu Zongyan and   
                   Hong Ali and   
                     Liu Yijing   Modular Verification of OO Programs with
                                  Interfaces . . . . . . . . . . . . . . . 151--166
      François Bobot and   
Jean-Christophe Filliâtre   Separation Predicates: a Taste of
                                  Separation Logic in First-Order Logic    167--181
        William L. Harrison and   
               Adam Procter and   
                 Gerard Allwein   The Confinement Problem in the Presence
                                  of Faults  . . . . . . . . . . . . . . . 182--197
        Fabian Büttner and   
                Marina Egea and   
                Jordi Cabot and   
                 Martin Gogolla   Verification of ATL Transformations
                                  Using Transformation Models and Model
                                  Finders  . . . . . . . . . . . . . . . . 198--213
              Shang-Wei Lin and   
                   Yang Liu and   
             Pao-Ann Hsiung and   
                    Jun Sun and   
                  Jin Song Dong   Automatic Generation of Provably Correct
                                  Embedded Systems . . . . . . . . . . . . 214--229
                     Wen Su and   
        Jean-Raymond Abrial and   
                    Huibiao Zhu   Complementary Methodologies for
                                  Developing Hybrid Systems with Event-B   230--248
             Takashi Tomita and   
                 Shin Hiura and   
           Shigeki Hagihara and   
                 Naoki Yonezaki   A Temporal Logic with Mean-Payoff
                                  Constraints  . . . . . . . . . . . . . . 249--265
                   Meng Han and   
               Zhenhua Duan and   
                  Xiaobing Wang   Time Constraints with Temporal Logic
                                  Programming  . . . . . . . . . . . . . . 266--282
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7636, 2012

                Naouel Moha and   
              Francis Palma and   
          Mathieu Nayrolles and   
         Benjamin Joyen Conseil   Specification and Detection of SOA
                                  Antipatterns . . . . . . . . . . . . . . 1--16
     Francesco Belardinelli and   
           Alessio Lomuscio and   
                  Fabio Patrizi   Verification of GSM-Based
                                  Artifact-Centric Systems through Finite
                                  Abstraction  . . . . . . . . . . . . . . 17--31
João Claudio Américo and   
                  Didier Donsez   Service Component Architecture
                                  Extensions for Dynamic Systems . . . . . 32--47
            Bikram Sengupta and   
                 Anshu Jain and   
         Kamal Bhattacharya and   
           Hong-Linh Truong and   
               Schahram Dustdar   Who Do You Call? Problem Resolution
                                  through Social Compute Units . . . . . . 48--62
           Tri A. Kurniawan and   
            Aditya K. Ghose and   
              Hoa Khanh Dam and   
               Lam-Son Lê   Relationship-Preserving Change
                                  Propagation in Process Ecosystems  . . . 63--78
              Hari S. Gupta and   
                Bikram Sengupta   Scheduling Service Tickets in Shared
                                  Delivery . . . . . . . . . . . . . . . . 79--95
           Hong-Linh Truong and   
           Schahram Dustdar and   
             Kamal Bhattacharya   Programming Hybrid Services in the Cloud 96--110
                    Zhen Ye and   
         Athman Bouguettaya and   
                  Xiaofang Zhou   QoS-Aware Cloud Service Composition
                                  Based on Economic Models . . . . . . . . 111--126
               Erik Wittern and   
       Jörn Kuhlenkamp and   
                 Michael Menzel   Cloud Service Selection Based on
                                  Variability Modeling . . . . . . . . . . 127--141
                 Marcus Roy and   
                 Ingo Weber and   
             Boualem Benatallah   Extending Enterprise Service Design
                                  Knowledge Using Clustering . . . . . . . 142--157
               Erik Wittern and   
             Nelly Schuster and   
       Jörn Kuhlenkamp and   
                     Stefan Tai   Participatory Service Design through
                                  Composed and Coordinated Service Feature
                                  Models . . . . . . . . . . . . . . . . . 158--172
                    Jian Yu and   
                    Jun Han and   
              Quan Z. Sheng and   
              Steven O. Gunarso   PerCAS: An Approach to Enabling Dynamic
                                  and Personalized Adaptation for
                                  Context-Aware Services . . . . . . . . . 173--190
  Yedendra Babu Shrinivasan and   
    Gargi Banerjee Dasgupta and   
               Nirmit Desai and   
              Jayan Nallacherry   A Method for Assessing Influence
                                  Relationships among KPIs of Service
                                  Systems  . . . . . . . . . . . . . . . . 191--205
    Tharindu Patikirikorala and   
              Indika Kumara and   
                Alan Colman and   
                    Jun Han and   
                   Liuping Wang   Dynamic Performance Management in
                                  Multi-tenanted Business Process Servers
                                  Using Nonlinear Control  . . . . . . . . 206--221
               Aymen Baouab and   
             Olivier Perrin and   
                  Claude Godart   An Optimized Derivation of Event Queries
                                  to Monitor Choreography Violations . . . 222--236
              Rene Ramacher and   
                Lars Mönch   Dynamic Service Selection with
                                  End-to-End Constrained Uncertain QoS
                                  Attributes . . . . . . . . . . . . . . . 237--251
          Dragan Ivanovi\'c and   
               Manuel Carro and   
         Manuel V. Hermenegildo   A Constraint-Based Approach to Quality
                                  Assurance in Service Choreographies  . . 252--267
                    Kuan Lu and   
            Ramin Yahyapour and   
                Edwin Yaqub and   
        Constantinos Kotsokalis   Structural Optimization of Reduced
                                  Ordered Binary Decision Diagrams for SLA
                                  Negotiation in IaaS of Cloud Computing   268--282
           Zachary J. Oster and   
             Syed Adeel Ali and   
       Ganesh Ram Santhanam and   
                 Samik Basu and   
                 Partha S. Roop   A Service Composition Framework Based on
                                  Goal-Oriented Requirements Engineering,
                                  Model Checking, and Qualitative
                                  Preference Analysis  . . . . . . . . . . 283--297
              Hongbing Wang and   
                  Jie Zhang and   
                Wenlong Sun and   
                Hongye Song and   
                Guibing Guo and   
                     Xiang Zhou   WCP-Nets: a Weighted Extension to
                                  CP-Nets for Web Service Selection  . . . 298--312
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7637, 2012

          Vinicius Oliverio and   
       Estevam R. Hruschka, Jr.   Contradiction Detection and Ontology
                                  Extension in a Never-Ending Learning
                                  System . . . . . . . . . . . . . . . . . 1--10
                 Arturo Yee and   
         Matías Alvarado   Pattern Recognition and Monte-Carlo Tree
                                  Search for Go Gaming Better Automation   11--20
José Luis Chacón and   
 Ramón Pino Pérez   Exploring the Rationality of Some
                                  Syntactic Merging Operators  . . . . . . 21--30
                  Isel Grau and   
     Gonzalo Nápoles and   
         Maikel León and   
                   Ricardo Grau   Fuzzy Cognitive Maps for Modelling,
                                  Predicting and Interpreting HIV Drug
                                  Resistance . . . . . . . . . . . . . . . 31--40
       Hilário Tomaz and   
               Rinaldo Lima and   
        João Emanoel and   
                   Fred Freitas   An Unsupervised Method for Ontology
                                  Population from the Web  . . . . . . . . 41--50
              Jonatan Gomez and   
      Elizabeth León and   
                  Olfa Nasraoui   Minimum Cluster Size Estimation and
                                  Cluster Refinement for the Randomized
                                  Gravitational Clustering Algorithm . . . 51--60
      Elizabeth León and   
       Jonatan Gómez and   
          Fabián Giraldo   Online Cluster Prototype Generation for
                                  the Gravitational Clustering Algorithm   61--70
    Leandro A. F. Fernandes and   
Ana Cristina Bicharra García   Association Rule Visualization and
                                  Pruning through Response-Style Data
                                  Organization and Clustering  . . . . . . 71--80
          Melissa Rodrigues and   
           João Gama and   
          Carlos Abreu Ferreira   Identifying Relationships in
                                  Transactional Data . . . . . . . . . . . 81--90
           Willian Zalewski and   
              Fabiano Silva and   
             Huei Diana Lee and   
     Andre Gustavo Maletzke and   
                  Feng Chung Wu   Time Series Discretization Based on the
                                  Approximation of the Local Slope
                                  Information  . . . . . . . . . . . . . . 91--100
José Hernández Santiago and   
             Jair Cervantes and   
Asdrúbal López-Chau and   
     Farid García Lamont   Enhancing the Performance of SVM on
                                  Skewed Data Sets by Exciting Support
                                  Vectors  . . . . . . . . . . . . . . . . 101--110
           Pawe\l Skrobanek and   
              Olgierd Unold and   
              Ewa Walkowicz and   
         Henryk Maciejewski and   
             Maciej Dobrowolski   Study on the Impact of Affinity on the
                                  Results of Data Mining in Biological
                                  Populations  . . . . . . . . . . . . . . 111--119
     Luiz Melo Romão and   
     Julio César Nievola   Hierarchical Classification of Gene
                                  Ontology with Learning Classifier
                                  Systems  . . . . . . . . . . . . . . . . 120--129
Ricardo Timarán Pereira and   
 Maria Clara Yepez Chamorro and   
Andrés Calderón Romero   Detecting Survival Patterns in Women
                                  with Invasive Cervical Cancer with
                                  Decision Trees . . . . . . . . . . . . . 130--139
            Leandro A. Pasa and   
José Alfredo F. Costa and   
           Marcelo C. Tosin and   
Fábio A. Procópio de Paiva   Using SOM Maps for Clustering and
                                  Visualization of Diamond Films Deposited
                                  by HFCVD Process . . . . . . . . . . . . 140--148
        Tiago P. F. de Lima and   
      Adenilton J. da Silva and   
             Teresa B. Ludermir   Selection and Fusion of Neural Networks
                                  via Differential Evolution . . . . . . . 149--158
       Yenny Villuendas-Rey and   
Yailé Caballero-Mota and   
María Matilde García-Lorenzo   Prototype Selection with Compact Sets
                                  and Extended Rough Sets  . . . . . . . . 159--168
              Nele Verbiest and   
           Enislay Ramentol and   
             Chris Cornelis and   
              Francisco Herrera   Improving SMOTE with Fuzzy Rough
                                  Prototype Selection to Detect Noise in
                                  Imbalanced Classification Data . . . . . 169--178
               Carlos Cobos and   
         Leydy Muñoz and   
             Martha Mendoza and   
      Elizabeth León and   
         Enrique Herrera-Viedma   Fitness Function Obtained from a Genetic
                                  Programming Approach for Web Document
                                  Clustering Using Evolutionary Algorithms 179--188
                  Jean Metz and   
 Luís F. D. de Abreu and   
         Everton A. Cherman and   
                Maria C. Monard   On the Estimation of Predictive
                                  Evaluation Measure Baselines for
                                  Multi-label Learning . . . . . . . . . . 189--198
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7638, 2012

           Benjamin Johnson and   
       Pascal Schöttle and   
              Rainer Böhme   Where to Hide the Bits?  . . . . . . . . 1--17
          Mehrdad Nojoumian and   
             Douglas R. Stinson   Socio-Rational Secret Sharing as a New
                                  Direction in Rational Cryptography . . . 18--37
            Jeremiah Blocki and   
           Nicolas Christin and   
               Anupam Datta and   
                  Arunesh Sinha   Audit Mechanisms for Provable Risk
                                  Management and Accountable Data
                                  Governance . . . . . . . . . . . . . . . 38--59
        SingRu (Celine) Hoe and   
         Murat Kantarcioglu and   
               Alain Bensoussan   A Game Theoretical Analysis of
                                  Lemonizing Cybercriminal Black Markets   60--77
          Lemonia Dritsoula and   
            Patrick Loiseau and   
                 John Musacchio   Computing the Nash Equilibria of
                                  Intruder Classification Games  . . . . . 78--97
                Ahto Buldas and   
               Roman Stepanenko   Upper Bounds for Adversaries' Utility in
                                  Attack Trees . . . . . . . . . . . . . . 98--117
              Jingqiang Lin and   
                   Peng Liu and   
                      Jiwu Jing   Using Signaling Games to Model the
                                  Multi-step Attack-Defense Scenarios on
                                  Confidentiality  . . . . . . . . . . . . 118--137
             Alan Nochenson and   
            C. F. Larry Heimann   Simulation and Game-Theoretic Analysis
                                  of an Attacker-Defender Game . . . . . . 138--151
                Aron Laszka and   
Dávid Szeszlér and   
         Levente Buttyán   Linear Loss Function for the Network
                                  Blocking Game: An Efficient Model for
                                  Measuring Network Robustness and Link
                                  Criticality  . . . . . . . . . . . . . . 152--170
               Andrew Clark and   
                Quanyan Zhu and   
           Radha Poovendran and   
                  Tamer Ba\csar   Deceptive Routing in Relay Networks  . . 171--185
               Assane Gueye and   
               Vladimir Marbukh   A Game-Theoretic Framework for Network
                                  Security Vulnerability Assessment and
                                  Mitigation . . . . . . . . . . . . . . . 186--200
         Radek Píbil and   
         Viliam Lisý and   
    Christopher Kiekintveld and   
Branislav Bo\vsanský and   
           Michal P\vechou\vcek   Game Theoretic Model of Strategic
                                  Honeypot Selection in Computer Networks  201--220
             M. Patrick Collins   A Cost-Based Mechanism for Evaluating
                                  the Effectiveness of Moving Target
                                  Defenses . . . . . . . . . . . . . . . . 221--233
                  Viet Pham and   
                     Carlos Cid   Are We Compromised? Modelling Security
                                  Assessment Games . . . . . . . . . . . . 234--247
            Kevin D. Bowers and   
            Marten van Dijk and   
             Robert Griffin and   
                  Ari Juels and   
                    Alina Oprea   Defending against the Unknown Enemy:
                                  Applying FlipIt to System Security . . . 248--263
               Saurabh Amin and   
         Galina A. Schwartz and   
                Hamidou Tembine   Incentives and Security in Electricity
                                  Distribution Networks  . . . . . . . . . 264--280
                Yee Wei Law and   
               Tansu Alpcan and   
      Marimuthu Palaniswami and   
                Subhrakanti Dey   Security Games and Risk Minimization for
                                  Automatic Generation Control in Smart
                                  Grid . . . . . . . . . . . . . . . . . . 281--295
                 Robert Nix and   
             Murat Kantarcioglu   Contractual Agreement Design for
                                  Enforcing Honesty in Cloud Outsourcing   296--308
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7639, 2012

                Giovanni Sartor   Compliance with Normative Systems  . . . 1--32
           Micha\l Araszkiewicz   Coherence-Based Account of the Doctrine
                                  of Consistent Interpretation . . . . . . 33--47
                    Ugo Pagallo   Three Roads to Complexity, AI and the
                                  Law of Robots: On Crimes, Contracts, and
                                  Torts  . . . . . . . . . . . . . . . . . 48--60
            Yueh-Hsuan Weng and   
          Sophie Ting Hong Zhao   The Legal Challenges of Networked
                                  Robotics: From the Safety Intelligence
                                  Perspective  . . . . . . . . . . . . . . 61--72
           Daniele Bourcier and   
           Primavera De Filippi   Cloud Computting: New Research
                                  Perspectives for Computers and Law . . . 73--92
           Tommaso Agnoloni and   
         Maria-Teresa Sagri and   
              Daniela Tiscornia   Balancing Rights and Values in the
                                  Italian Courts: a Benchmark for a
                                  Quantitative Analysis  . . . . . . . . . 93--105
            Radboud Winkels and   
                Jelle de Ruyter   Survival of the Fittest: Network
                                  Analysis of Dutch Supreme Court Cases    106--115
              Marcello Ceci and   
               Monica Palmirani   Ontology Framework for Judgment
                                  Modelling  . . . . . . . . . . . . . . . 116--130
               Guido Boella and   
             Llio Humphreys and   
               Marco Martin and   
            Piercarlo Rossi and   
         Leendert van der Torre   Eunomos, a Legal Document and Knowledge
                                  Management System to Build Legal
                                  Services . . . . . . . . . . . . . . . . 131--146
             Enrico Francesconi   Axioms on a Semantic Model for
                                  Legislation for Accessing and Reasoning
                                  over Normative Provisions  . . . . . . . 147--161
         Enrico Francesconi and   
            Ginevra Peruginelli   An Open Access Policy for Legal
                                  Informatics Dissemination and Sharing    162--170
           Pompeu Casanovas and   
                    Enric Plaza   Advancing an Open Access Publication
                                  Model for Legal Information Institutes   171--188
                Clara Smith and   
   Agustín Ambrossio and   
            Leandro Mendoza and   
                Antonino Rotolo   Combinations of Normal and Non-normal
                                  Modal Logics for Modeling Collective
                                  Trust in Normative MAS . . . . . . . . . 189--203
                  Migle Laukyte   Software Agents as Boundary Objects  . . 204--216
                 Andrew Vincent   Argumentation and Intuitive Decision
                                  Making: Criminal Sentencing and Sentence
                                  Indication . . . . . . . . . . . . . . . 217--234
             Alexander Boer and   
                 Tom van Engers   Application of Model-Based Diagnosis to
                                  Multi-Agent Systems Representing Public
                                  Administration . . . . . . . . . . . . . 235--244
              Marcello Ceci and   
             Leonardo Lesmo and   
          Alessandro Mazzei and   
               Monica Palmirani   Semantic Annotation of Legal Texts
                                  through a FrameNet-Based Approach  . . . 245--255
          Anderson Bertoldi and   
Rove Luiza de Oliveira Chishman   Developing a Frame-Based Lexicon for the
                                  Brazilian Legal Language: The Case of
                                  the Criminal\_Process Frame  . . . . . . 256--270
            Mat\vej My\vska and   
  Terezie Smejkalová and   
   Jaromír \vSavelka and   
                  Martin \vSkop   Creative Commons and Grand Challenge to
                                  Make Legal Language Simple . . . . . . . 271--285
Meritxell Fernández-Barrera and   
               Pompeu Casanovas   From User Needs to Expert Knowledge:
                                  Mapping Laymen Queries with Ontologies
                                  in the Domain of Consumer Mediation  . . 286--308
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7645, 2012

                 Yuxin Meng and   
                   Lam-for Kwok   Enhancing List-Based Packet Filter Using
                                  IP Verification Mechanism against IP
                                  Spoofing Attack in Network Intrusion
                                  Detection  . . . . . . . . . . . . . . . 1--14
              Silvio Ranise and   
             Alessandro Armando   On the Automated Analysis of Safety in
                                  Usage Control: a New Decidability Result 15--28
             Steffen Wagner and   
              Sascha Wessel and   
                Frederic Stumpf   Attestation of Mobile Baseband Stacks    29--43
                Tae-Gyu Lee and   
                   Gi-Soo Chung   A Scalable Link Model for Local Optical
                                  Wireless Networks  . . . . . . . . . . . 44--57
           Cristina Alcaraz and   
                   Javier Lopez   Addressing Situational Awareness in
                                  Critical Domains of a Smart Grid . . . . 58--71
           Amani S. Ibrahim and   
        James Hamlyn-Harris and   
                John Grundy and   
                Mohamed Almorsy   Identifying OS Kernel Objects for
                                  Run-Time Security Analysis . . . . . . . 72--85
                Tae-Gyu Lee and   
                   Gi-Soo Chung   Background Transfer Method for
                                  Ubiquitous Computing . . . . . . . . . . 86--99
                Shengli Liu and   
              Fangguo Zhang and   
                     Kefei Chen   Selective Opening Chosen Ciphertext
                                  Security Directly from the DDH
                                  Assumption . . . . . . . . . . . . . . . 100--112
               Shaohua Tang and   
                    Lingling Xu   Proxy Signature Scheme Based on
                                  Isomorphisms of Polynomials  . . . . . . 113--125
                   Fei Tang and   
                Changlu Lin and   
                      Pinhui Ke   Universal Designated Verifier
                                  Signcryption . . . . . . . . . . . . . . 126--134
       Juan Pablo Timpanaro and   
         Isabelle Chrisment and   
                 Olivier Festor   A Bird's Eye View on the I2P Anonymous
                                  File-Sharing Environment . . . . . . . . 135--148
         Samaneh Mahdavifar and   
                Mahdi Abadi and   
              Mohsen Kahani and   
              Hassan Mahdikhani   A Clustering-Based Approach for
                                  Personalized Privacy Preserving
                                  Publication of Moving Object Trajectory
                                  Data . . . . . . . . . . . . . . . . . . 149--165
                 Alif Wahid and   
         Christopher Leckie and   
                  Chenfeng Zhou   Estimating the Number of Hosts
                                  Corresponding to an Address while
                                  Preserving Anonymity . . . . . . . . . . 166--179
                     Qi Han and   
              Yinghui Zhang and   
              Xiaofeng Chen and   
                     Hui Li and   
                  Jiaxiang Quan   Efficient and Robust Identity-Based
                                  Handoff Authentication in Wireless
                                  Networks . . . . . . . . . . . . . . . . 180--191
                 Yifan Zhao and   
                Swee-Won Lo and   
             Robert H. Deng and   
                     Xuhua Ding   An Improved Authentication Scheme for
                                  H.264/SVC and Its Performance Evaluation
                                  over Non-stationary Wireless Mobile
                                  Networks . . . . . . . . . . . . . . . . 192--205
                    Kaiqi Xiong   The Performance of Public Key-Based
                                  Authentication Protocols . . . . . . . . 206--219
                Long-Hai Li and   
          Cheng-Qiang Huang and   
                   Shao-Feng Fu   Boardroom Voting Scheme with
                                  Unconditionally Secret Ballots Based on
                                  DC-Net . . . . . . . . . . . . . . . . . 220--232
                     Yue Yu and   
                Michael Fry and   
          Bernhard Plattner and   
                 Paul Smith and   
        Alberto Schaeffer-Filho   Resilience Strategies for Networked
                                  Malware Detection and Remediation  . . . 233--247
              Eitan Menahem and   
                 Rami Pusiz and   
                  Yuval Elovici   Detecting Spammers via Aggregated
                                  Historical Data Set  . . . . . . . . . . 248--262
           Amani S. Ibrahim and   
                John Grundy and   
        James Hamlyn-Harris and   
                Mohamed Almorsy   Operating System Kernel Data
                                  Disambiguation to Support Security
                                  Analysis . . . . . . . . . . . . . . . . 263--276
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??