Table of contents for issues of Lecture Notes in Computer Science

Last update: Sat Jan 20 07:22:45 MST 2018                Valid HTML 3.2!

Volume 7653, 2012
Volume 7654, 2012
Volume 7655, 2012
Volume 7658, 2012
Volume 7659, 2012
Volume 7661, 2012
Volume 7663, 2012
Volume 7664, 2012
Volume 7665, 2012
Volume 7666, 2012
Volume 7667, 2012
Volume 7668, 2012
Volume 7670, 2012
Volume 7671, 2012
Volume 7672, 2012
Volume 7673, 2012
Volume 7674, 2012
Volume 7675, 2012
Volume 7677, 2012
Volume 7678, 2012
Volume 7679, 2012
Volume 7682, 2012
Volume 7683, 2012
Volume 7690, 2012


Lecture Notes in Computer Science
Volume 7653, 2012

Adrianna Kozierkiewicz-Hetma\'nska   Comparison of One-Level and Two-Level
                                  Consensuses Satisfying the 2-Optimality
                                  Criterion  . . . . . . . . . . . . . . . 1--10
            Marcin Maleszka and   
       Bernadetta Mianowska and   
              Ngoc-Thanh Nguyen   A Heuristic Method for Collaborative
                                  Recommendation Using Hierarchical User
                                  Profiles . . . . . . . . . . . . . . . . 11--20
             Quoc Uy Nguyen and   
            Trong Hai Duong and   
                   Sanggil Kang   Solving Conflict on Collaborative
                                  Knowledge via Social Networking Using
                                  Consensus Choice . . . . . . . . . . . . 21--30
              Xuan Hau Pham and   
              Jason J. Jung and   
              Ngoc-Thanh Nguyen   Integrating Multiple Experts for
                                  Correction Process in Interactive
                                  Recommendation Systems . . . . . . . . . 31--40
                  Tin Huynh and   
                     Kiem Hoang   Modeling Collaborative Knowledge of
                                  Publishing Activities for Research
                                  Recommendation . . . . . . . . . . . . . 41--50
         Thanh-Trung Nguyen and   
                 Phi-Khu Nguyen   A New Approach for Problem of Sequential
                                  Pattern Mining . . . . . . . . . . . . . 51--60
             Van-Dung Hoang and   
                   My-Ha Le and   
                   Kang-Hyun Jo   Robust Human Detection Using Multiple
                                  Scale of Cell Based Histogram of
                                  Oriented Gradients and AdaBoost Learning 61--71
           Nguyen Thanh Son and   
                 Duong Tuan Anh   Discovering Time Series Motifs Based on
                                  Multidimensional Index and Early
                                  Abandoning . . . . . . . . . . . . . . . 72--82
               Duc-Thuan Vo and   
                Cheol-Young Ock   A Hybrid Approach of Pattern Extraction
                                  and Semi-supervised Learning for
                                  Vietnamese Named Entity Recognition  . . 83--93
          Roman Pawlikowski and   
           Krzysztof Ociepa and   
  Urszula Markowska-Kaczmar and   
            Pawel B. Myszkowski   Information Extraction from Geographical
                                  Overview Maps  . . . . . . . . . . . . . 94--103
          Bogus\law Cyganek and   
              Micha\l Wo\'zniak   Pixel-Based Object Detection and
                                  Tracking with Ensemble of Support Vector
                                  Machines and Extended Structural Tensor  104--113
                     Bay Vo and   
                     Bac Le and   
                  Jason J. Jung   A Tree-Based Approach for Mining
                                  Frequent Weighted Utility Itemsets . . . 114--123
            Trong Nhan Phan and   
                Tran Khanh Dang   A Novel Trajectory Privacy-Preserving
                                  Future Time Index Structure in Moving
                                  Object Databases . . . . . . . . . . . . 124--134
           Grzegorz Skorupa and   
          Rados\law Katarzyniak   Summarizing Knowledge Base with Modal
                                  Conditionals . . . . . . . . . . . . . . 135--144
                Ali Selamat and   
             S. O. Olatunji and   
       Abdul Azeez Abdul Raheem   Modeling PVT Properties of Crude Oil
                                  Systems Based on Type-$2$ Fuzzy Logic
                                  Approach and Sensitivity Based Linear
                                  Learning Method  . . . . . . . . . . . . 145--155
      Agnieszka Jastrzebska and   
              Wladyslaw Homenda   On Structuring of the Space of Needs in
                                  the Framework of Fuzzy Sets Theory . . . 156--165
                Tomasz Wilk and   
              Micha\l Wo\'zniak   Comparison of Fuzzy Combiner Training
                                  Methods  . . . . . . . . . . . . . . . . 166--173
            Trong Hieu Tran and   
                    Quoc Bao Vo   An Axiomatic Model for Merging
                                  Stratified Belief Bases by Negotiation   174--184
             Witold Pedrycz and   
              Wladyslaw Homenda   From Fuzzy Cognitive Maps to Granular
                                  Cognitive Maps . . . . . . . . . . . . . 185--193
            Manas S. Hardas and   
                    Lisa Purvis   Bayesian Vote Weighting in Crowdsourcing
                                  Systems  . . . . . . . . . . . . . . . . 194--203
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7654, 2012

             Tomasz Sitarek and   
              Wladyslaw Homenda   Generic Operations in the Structured
                                  Space of the Music . . . . . . . . . . . 1--10
        Duong Thi Anh Hoang and   
                Ngoc Sy Ngo and   
              Binh Thanh Nguyen   Collective Cubing Platform towards
                                  Definition and Analysis of Warehouse
                                  Cubes  . . . . . . . . . . . . . . . . . 11--20
                Phuoc Vinh Tran   To Approach Cylindrical Coordinates to
                                  Represent Multivariable Spatio-temporal
                                  Data . . . . . . . . . . . . . . . . . . 21--28
              Tutut Herawan and   
                A. Noraziah and   
           Zailani Abdullah and   
          Mustafa Mat Deris and   
               Jemal H. Abawajy   EFP-M2: Efficient Model for Mining
                                  Frequent Patterns in Transactional
                                  Database . . . . . . . . . . . . . . . . 29--38
           Halina Kwasnicka and   
                Pawel Siemionko   Improved Sammon Mapping Method for
                                  Visualization of Multidimensional Data   39--48
 Marcin Miros\law Pietranik and   
              Ngoc Thanh Nguyen   Ontology Relation Alignment Based on
                                  Attribute Semantics  . . . . . . . . . . 49--58
            Young Chan Moon and   
                Ho Min Jung and   
                  Chuck Yoo and   
                 Young Woong Ko   Data Deduplication Using Dynamic
                                  Chunking Algorithm . . . . . . . . . . . 59--68
              Huynh Tu Dang and   
               Ha Manh Tran and   
              Phach Ngoc Vu and   
               An Truong Nguyen   Applying MapReduce Framework to
                                  Peer-to-Peer Computing Applications  . . 69--78
          Krzysztof W\kecel and   
           Tomasz Kaczmarek and   
               Agata Filipowska   Scalable Adaptation of Web Applications
                                  to Users' Behavior . . . . . . . . . . . 79--88
 César Andrés and   
                  Rui Abreu and   
    Alberto Núñez   OCE: An Online Colaborative Editor . . . 89--98
       Mohammed Nazim Uddin and   
            Trong Hai Duong and   
                 Visal Sean and   
                    Geun-Sik Jo   Construction of Semantic User Profile
                                  for Personalized Web Search  . . . . . . 99--108
                Adam Grzech and   
      Krzysztof Juszczyszyn and   
            Pawe\l Stelmach and   
                  \Lukasz Falas   Link Prediction in Dynamic Networks of
                                  Services Emerging during Deployment and
                                  Execution of Web Services  . . . . . . . 109--120
            Mahran Al-Zyoud and   
                 Imad Salah and   
                    Nadim Obeid   Towards a Model of Context Awareness
                                  Using Web Services . . . . . . . . . . . 121--131
           Leszek Borzemski and   
            Michal Danielak and   
        Anna Kaminska-Chuchmala   Short-Term Spatio-temporal Forecasts of
                                  Web Performance by Means of Turning
                                  Bands Method . . . . . . . . . . . . . . 132--141
 Przemys\law B\la\'skiewicz and   
      Miros\law Kuty\lowski and   
              Wojciech Wodo and   
                    Kamil Wolny   Extreme Propagation in an Ad-Hoc Radio
                                  Network- Revisited . . . . . . . . . . . 142--151
          Dang Thanh Chuong and   
                 Vu Duy Loi and   
              Vo Viet Minh Nhat   A Model for the Performance Analysis of
                                  SPL-OBS Core Nodes with Deflection
                                  Routing  . . . . . . . . . . . . . . . . 152--161
                 Sylvia Encheva   Ordering of Potential Collaboration
                                  Options  . . . . . . . . . . . . . . . . 162--171
            Ching-Shen Dong and   
              Ananth Srinivasan   Interface Design for Decision Systems    172--181
        Grzegorz Fedczyszyn and   
            Leszek Koszalka and   
         Iwona Pozniak-Koszalka   Opponent Modeling in Texas Hold'em Poker 182--191
                   Jacek Mercik   On Axiomatization of Power Index of Veto 192--200
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7655, 2012

               Mousumi Dutt and   
             Arindam Biswas and   
            Partha Bhowmick and   
        Bhargab B. Bhattacharya   On Finding Shortest Isothetic Path
                                  inside a Digital Object  . . . . . . . . 1--15
         Nilanjana Karmakar and   
             Arindam Biswas and   
                Partha Bhowmick   Fast Slicing of Orthogonal Covers Using
                                  DCEL . . . . . . . . . . . . . . . . . . 16--30
                 Peter Veelaert   Fast Combinatorial Algorithm for Tightly
                                  Separating Hyperplanes . . . . . . . . . 31--44
                    Li Chen and   
                    Soma Biswas   Digital Curvatures Applied to $3$D
                                  Object Analysis and Recognition: a Case
                                  Study  . . . . . . . . . . . . . . . . . 45--58
              Fumiki Sekiya and   
               Akihiro Sugimoto   Discrete Polynomial Curve Fitting to
                                  Noisy Data . . . . . . . . . . . . . . . 59--74
Ana Marcela Herrera-Navarro and   
Hugo Jiménez-Hernández and   
Iván Ramón Terol-Villalobos   A Probabilistic Measure of Circularity   75--89
               Tetsuo Asano and   
                   Sergey Bereg   A New Framework for Connected Components
                                  Labeling of Binary Images  . . . . . . . 90--102
               Tetsuo Asano and   
               Sergey Bereg and   
                   Lilian Buzer   Small Work Space Algorithms for Some
                                  Basic Problems on Binary Images  . . . . 103--114
                 Josef \vSlapal   Adjacencies for Structuring the Digital
                                  Plane  . . . . . . . . . . . . . . . . . 115--127
        Péter Kardos and   
Kálmán Palágyi   On Topology Preservation for Triangular
                                  Thinning Algorithms  . . . . . . . . . . 128--142
                   Benedek Nagy   Cellular Topology on the Triangular Grid 143--153
          K. G. Subramanian and   
             Ibrahim Venkat and   
               Petra Wiederhold   A P System Model for Contextual Array
                                  Languages  . . . . . . . . . . . . . . . 154--165
                 D. Lalitha and   
              K. Rangarajan and   
       Durairaj Gnanaraj Thomas   Rectangular Arrays and Petri Nets  . . . 166--180
         Thangasamy Kamaraj and   
       Durairaj Gnanaraj Thomas   Regional Hexagonal Tile Rewriting
                                  Grammars . . . . . . . . . . . . . . . . 181--195
         Thangasamy Kamaraj and   
   Durairaj Gnanaraj Thomas and   
                  H. Geetha and   
                     T. Kalyani   Partial Commutation on Array Languages   196--208
                 Anja Attig and   
                   Petra Perner   Incremental Learning of the Model for
                                  Watershed-Based Image Segmentation . . . 209--222
            Damien Gonzalez and   
     Rémy Malgouyres and   
         Henri-Alex Esbelin and   
                   Chafik Samir   Fast Level-Wise Convolution  . . . . . . 223--233
                   Phuc Ngo and   
            Yukiko Kenmochi and   
             Nicolas Passat and   
                  Hugues Talbot   Combinatorial Properties of $2$D
                                  Discrete Rigid Transformations under
                                  Pixel-Invariance Constraints . . . . . . 234--248
            Anupama Potluri and   
          Chakravarthy Bhagvati   Novel Morphological Algorithms for
                                  Dominating Sets on Graphs with
                                  Applications to Image Analysis . . . . . 249--262
             Norbert Hantos and   
 Péter Balázs and   
Kálmán Palágyi   Binary Image Reconstruction from Two
                                  Projections and Skeletal Information . . 263--273
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7658, 2012

                      Dan Boneh   Pairing-Based Cryptography: Past,
                                  Present, and Future  . . . . . . . . . . 1--1
                 Chuanming Zong   Some Mathematical Mysteries in Lattices  2--3
               Masayuki Abe and   
              Melissa Chase and   
             Bernardo David and   
          Markulf Kohlweiss and   
                  Ryo Nishimaki   Constant-Size Structure-Preserving
                                  Signatures: Generic Constructions and
                                  Simple Assumptions . . . . . . . . . . . 4--24
            Michael Gerbush and   
              Allison Lewko and   
               Adam O'Neill and   
                   Brent Waters   Dual Form Signatures: An Approach for
                                  Proving Security from Static Assumptions 25--42
             Takuya Hayashi and   
          Takeshi Shimoyama and   
          Naoyuki Shinohara and   
                Tsuyoshi Takagi   Breaking Pairing-Based Cryptosystems
                                  Using $\eta_T$ Pairing over ${\rm
                                  GF}(3^{97})$ . . . . . . . . . . . . . . 43--60
                   Jae Hong Seo   On the (Im)possibility of Projecting
                                  Property in Prime-Order Setting  . . . . 61--79
              Jorge Luis Villar   Optimal Reductions of Some Decisional
                                  Problems to the Rank Problem . . . . . . 80--97
            Sebastian Faust and   
               Carmit Hazay and   
        Jesper Buus Nielsen and   
       Peter Sebastian Nordholt   Signature Schemes Secure against
                                  Hard-to-Invert Leakage . . . . . . . . . 98--115
             Yehuda Lindell and   
                  Eran Omri and   
                   Hila Zarosim   Completeness for Symmetric Two-Party
                                  Functionalities- Revisited . . . . . . . 116--133
              Mihir Bellare and   
            Viet Tung Hoang and   
                Phillip Rogaway   Adaptively Secure Garbling with
                                  Applications to One-Time Programs and
                                  Secure Outsourcing . . . . . . . . . . . 134--153
                 Scott Ames and   
            Rosario Gennaro and   
Muthuramakrishnan Venkitasubramaniam   The Generalized Randomized Iterate and
                                  Its Application to New Efficient
                                  Constructions of UOWHFs from Regular
                                  One-Way Functions  . . . . . . . . . . . 154--171
               Meicheng Liu and   
                  Yin Zhang and   
                    Dongdai Lin   Perfect Algebraic Immune Functions . . . 172--189
             Florian Mendel and   
             Vincent Rijmen and   
                  Deniz Toz and   
     Kerem Varìcì   Differential Analysis of the LED Block
                                  Cipher . . . . . . . . . . . . . . . . . 190--207
             Julia Borghoff and   
              Anne Canteaut and   
           Tim Güneysu and   
           Elif Bilge Kavun and   
              Miroslav Knezevic   PRINCE --- a Low-Latency Block Cipher
                                  for Pervasive Computing Applications . . 208--225
            Gaëtan Leurent   Analysis of Differential Attacks in ARX
                                  Constructions  . . . . . . . . . . . . . 226--243
            Andrey Bogdanov and   
             Gregor Leander and   
               Kaisa Nyberg and   
                    Meiqin Wang   Integral and Multidimensional Linear
                                  Distinguishers with Correlation Zero . . 244--261
                 Hongjun Wu and   
                  Tao Huang and   
           Phuong Ha Nguyen and   
              Huaxiong Wang and   
                       San Ling   Differential Attacks against Stream
                                  Cipher ZUC . . . . . . . . . . . . . . . 262--277
             Rodolphe Lampe and   
            Jacques Patarin and   
                 Yannick Seurin   An Asymptotically Tight Security
                                  Analysis of the Iterated Even-Mansour
                                  Cipher . . . . . . . . . . . . . . . . . 278--295
               Liting Zhang and   
                 Wenling Wu and   
                    Han Sui and   
                      Peng Wang   3kf9: Enhancing 3GPP-MAC beyond the
                                  Birthday Bound . . . . . . . . . . . . . 296--312
            Dimitar Jetchev and   
             Onur Özen and   
                   Martijn Stam   Understanding Adaptivity: Random Systems
                                  Revisited  . . . . . . . . . . . . . . . 313--330
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7659, 2012

               Amihood Amir and   
         Alberto Apostolico and   
             Estrella Eisenberg   Detecting Approximate Periodic Patterns  1--12
               Grey Ballard and   
               James Demmel and   
                     Olga Holtz   Graph Expansion Analysis for
                                  Communication Costs of Fast Rectangular
                                  Matrix Multiplication  . . . . . . . . . 13--36
              Nikhil Bansal and   
               Anupam Gupta and   
       Ravishankar Krishnaswamy   Multicast Routing for Energy
                                  Minimization Using Speed Scaling . . . . 37--51
                  Guy Baram and   
                     Tami Tamir   Reoptimization of the Minimum Total
                                  Flow-Time Scheduling Problem . . . . . . 52--66
               Neal Barcelo and   
                  Miao Zhou and   
                Daniel Cole and   
                 Michael Nugent   Energy Efficient Caching for
                                  Phase-Change Memory  . . . . . . . . . . 67--81
               Neal Barcelo and   
                 Sungjin Im and   
           Benjamin Moseley and   
                     Kirk Pruhs   Shortest-Elapsed-Time-First on a
                                  Multiprocessor . . . . . . . . . . . . . 82--92
           Gernot Veit Batz and   
          Robert Geisberger and   
                   Dennis Luxen   Efficient Route Compression for Hybrid
                                  Route Planning . . . . . . . . . . . . . 93--107
              Shiri Chechik and   
            Quentin Godfroy and   
                    David Peleg   Multipath Spanners via Fault-Tolerant
                                  Spanners . . . . . . . . . . . . . . . . 108--119
              Morgan Chopin and   
   André Nichterlein and   
               Rolf Niedermeier   Constant Thresholds Can Make Target Set
                                  Selection Tractable  . . . . . . . . . . 120--133
                   Fabio Cunial   Faster Variance Computation for Patterns
                                  with Gaps  . . . . . . . . . . . . . . . 134--147
       Gianlorenzo D'Angelo and   
                Mattia D'Emidio   Enhancing the Computation of Distributed
                                  Shortest Paths on Real Dynamic Networks  148--158
             Benjamin Doerr and   
               Mahmoud Fouz and   
               Tobias Friedrich   Experimental Analysis of Rumor Spreading
                                  in Social Networks . . . . . . . . . . . 159--173
            Mourad El Ouali and   
              Helena Fohlin and   
                Anand Srivastav   A Randomised Approximation Algorithm for
                                  the Partial Vertex Cover Problem in
                                  Hypergraphs  . . . . . . . . . . . . . . 174--187
               Fabian Fuchs and   
         Markus Völker and   
                Dorothea Wagner   Simulation-Based Analysis of Topology
                                  Control Algorithms for Wireless Ad Hoc
                                  Networks . . . . . . . . . . . . . . . . 188--202
        Michael T. Goodrich and   
           Daniel S. Hirschberg   Cache-Oblivious Dictionaries and
                                  Multimaps with Negligible Failure
                                  Probability  . . . . . . . . . . . . . . 203--218
          Robert Görke and   
               Roland Kluge and   
                  Andrea Schumm   An Efficient Generator for Clustered
                                  Dynamic Random Networks  . . . . . . . . 219--233
                Peter Kling and   
          Andreas Cord-Landwehr   Slow Down and Sleep for Profit in Online
                                  Deadline Scheduling  . . . . . . . . . . 234--247
               Kirill Kogan and   
   Alejandro López-Ortiz   FIFO Queueing Policies for Packets with
                                  Heterogeneous Processing . . . . . . . . 248--260
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7661, 2012

                Andrea Moio and   
           Attilio Giordana and   
                   Dino Mendola   An Anti-tampering Algorithm Based on an
                                  Artificial Intelligence Approach . . . . 1--10
                      Jan Rauch   Domain Knowledge and Data Mining with
                                  Association Rules --- a Logical Point of
                                  View . . . . . . . . . . . . . . . . . . 11--20
         Pawe\l Betli\'nski and   
             Dominik \'Sl\kezak   The Problem of Finding the Sparsest
                                  Bayesian Network for an Input Data Set
                                  is NP-Hard . . . . . . . . . . . . . . . 21--30
    Philippe Fournier-Viger and   
               Vincent S. Tseng   Mining Top-$K$ Non-redundant Association
                                  Rules  . . . . . . . . . . . . . . . . . 31--40
                 Matej Guid and   
            Martin Mo\vzina and   
               Vida Groznik and   
             Dejan Georgiev and   
             Aleksander Sadikov   ABML Knowledge Refinement Loop: a Case
                                  Study  . . . . . . . . . . . . . . . . . 41--50
          Jennifer Lavergne and   
                Ryan Benton and   
              Vijay V. Raghavan   Min-Max Itemset Trees for Dense and
                                  Categorical Datasets . . . . . . . . . . 51--60
          Jennifer Lavergne and   
                Ryan Benton and   
              Vijay V. Raghavan   TRARM-RelSup: Targeted Rare Association
                                  Rule Mining Using Itemset Trees and the
                                  Relative Support Measure . . . . . . . . 61--70
            Shusaku Tsumoto and   
                   Shoji Hirano   Incremental Rules Induction Method Based
                                  on Three Rule Layers . . . . . . . . . . 71--80
                 Asma Ammar and   
               Zied Elouedi and   
                  Pawan Lingras   RPKM: The Rough Possibilistic $K$-Modes  81--86
                 Jan Kohout and   
                   Roman Neruda   Exploration and Exploitation Operators
                                  for Genetic Graph Clustering Algorithm   87--92
           Patrick G. Clark and   
    Jerzy W. Grzymala-Busse and   
             Martin Kuehnhausen   Local Probabilistic Approximations for
                                  Incomplete Data  . . . . . . . . . . . . 93--98
           Piotr Andruszkiewicz   On the Relations between Retention
                                  Replacement, Additive Perturbation, and
                                  Randomisations for Nominal Attributes in
                                  Privacy Preserving Data Mining . . . . . 99--104
               Sujata Ghosh and   
          Thiri Haymar Kyaw and   
               Rineke Verbrugge   Decision Support for Extensive Form
                                  Negotiation Games  . . . . . . . . . . . 105--114
                 Yuxin Meng and   
                 Wenjuan Li and   
                   Lam-for Kwok   Intelligent Alarm Filter Using
                                  Knowledge-Based Alert Verification in
                                  Network Intrusion Detection  . . . . . . 115--124
                   Chao Gao and   
                     Jiming Liu   Clustering-Based Media Analysis for
                                  Understanding Human Emotional Reactions
                                  in an Extreme Event  . . . . . . . . . . 125--135
            Gabriel Pestana and   
             Joachim Metter and   
         Sebastian Heuchler and   
                     Pedro Reis   An Event-Driven Architecture for
                                  Spatio-temporal Surveillance of Business
                                  Activities . . . . . . . . . . . . . . . 136--142
             \Lukasz Brocki and   
          Krzysztof Marasek and   
             Danijel Kor\vzinek   Multiple Model Text Normalization for
                                  the Polish Language  . . . . . . . . . . 143--148
          Janardhana Punuru and   
                   Jianhua Chen   Discovering Semantic Relations Using
                                  Prepositional Phrases  . . . . . . . . . 149--154
    Alina Wróblewska and   
                   Marcin Sydow   DEBORA: Dependency-Based Method for
                                  Extracting Entity-Relationship Triples
                                  from Open-Domain Texts in Polish . . . . 155--161
         Grzegorz Protaziuk and   
     Anna Wróblewska and   
            Robert Bembenik and   
              Henryk Rybi\'nski   Lexical Ontology Layer --- a Bridge
                                  between Text and Concepts  . . . . . . . 162--171
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7663, 2012

                    Lu Xiao and   
                       Ming Fan   Does Social Network Always Promote
                                  Entrepreneurial Intentions? Part I:
                                  Theoretical Model  . . . . . . . . . . . 1--7
              Samreen Feroz and   
               Amatal Habib and   
            Maryam Siddiqua and   
               Sobia Saleem and   
               Nisar Ahmed Shar   Association of Anti-Histamine Drugs with
                                  Brain Tumor  . . . . . . . . . . . . . . 8--15
                      Qiuyu Zhu   Estimating Principal Point and Nonlinear
                                  Parameters of Camera from a Planar
                                  Calibration Image  . . . . . . . . . . . 16--24
                Vipul Arora and   
               Laxmidhar Behera   Design of Distribution Independent Noise
                                  Filters with Online PDF Estimation . . . 25--32
                     Xia Wu and   
                    Juan Li and   
                         Li Yao   Determining Effective Connectivity from
                                  FMRI Data Using a Gaussian Dynamic
                                  Bayesian Network . . . . . . . . . . . . 33--39
               A. G. Radwan and   
               Ahmed S. Elwakil   Transient-Time Fractional-Space
                                  Trigonometry and Application . . . . . . 40--47
    Manjusri Wickramasinghe and   
         Jayantha Rajapakse and   
             Damminda Alahakoon   Understanding Individual Play Sequences
                                  Using Growing Self Organizing Maps . . . 48--55
             Noor Almaadeed and   
                Amar Aggoun and   
                    Abbes Amira   Audio-Visual Feature Fusion for Speaker
                                  Identification . . . . . . . . . . . . . 56--67
                Xiaoxu Kang and   
              Marc Schieber and   
               Nitish V. Thakor   Decoding Cognitive States from Neural
                                  Activities of Somatosensory Cortex . . . 68--75
     Kleanthis C. Neokleous and   
       Marios N. Avraamides and   
        Costas K. Neocleous and   
            Christos N. Schizas   Cognitive Modeling of Dilution Effects
                                  in Visual Search . . . . . . . . . . . . 76--83
               Wajid Mumtaz and   
                  Likun Xia and   
          Aamir Saeed Malik and   
          Mohd Azhar Mohd Yasin   Complexity Analysis of EEG Data during
                                  Rest State and Visual Stimulus . . . . . 84--91
               Ahmed Al-Ani and   
               Bram Van Dun and   
              Harvey Dillon and   
                   Alaleh Rabie   Analysis of Alertness Status of Subjects
                                  Undergoing the Cortical Auditory Evoked
                                  Potential Hearing Test . . . . . . . . . 92--99
            Preetinder Kaur and   
                Madhu Goyal and   
                         Jie Lu   Price Forecasting Using Dynamic
                                  Assessment of Market Conditions and
                                  Agent's Bidding Behavior . . . . . . . . 100--108
          Takafumi Kanamori and   
                   Akiko Takeda   Non-convex Optimization on Stiefel
                                  Manifold and Applications to Machine
                                  Learning . . . . . . . . . . . . . . . . 109--116
        Liviu Petrisor Dinu and   
         Radu-Tudor Ionescu and   
                 Marius Popescu   Local Patch Dissimilarity for Images . . 117--126
                Dehua Zhang and   
                 Derong Liu and   
                    Qinglai Wei   Nearly Optimal Control for Nonlinear
                                  Systems with Dead-Zone Control Input
                                  Based on the Iterative ADP Approach  . . 127--134
           Sadjia Benkhider and   
              Oualid Dahmri and   
                   Habiba Drias   A Memetic Approach for the Knowledge
                                  Extraction . . . . . . . . . . . . . . . 135--141
                Xiaohua Liu and   
               Haoran Liang and   
                Haiwei Dong and   
              Nikolaos Mavridis   Development of a Novel Conversational
                                  Calculator Based on Remote Online
                                  Computation  . . . . . . . . . . . . . . 142--151
               Saima Hassan and   
             Abbas Khosravi and   
           Jafreezal Jaafar and   
            Samir B. Belhaouari   Load Forecasting Accuracy through
                                  Combination of Trimmed Forecasts . . . . 152--159
         Julian Szyma\'nski and   
              W\lodzis\law Duch   Self Organizing Maps for Visualization
                                  of Categories  . . . . . . . . . . . . . 160--167
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7664, 2012

             Freha Mezzoudj and   
                Assia Benyettou   On the Optimization of Multiclass
                                  Support Vector Machines Dedicated to
                                  Speech Recognition . . . . . . . . . . . 1--8
               Yangming Guo and   
                 Xiaolei Li and   
               Guanghan Bai and   
                    Jiezhong Ma   Time Series Prediction Method Based on
                                  LS-SVR with Modified Gaussian RBF  . . . 9--17
                   Ran Wang and   
                Guoyou Wang and   
                 Zhong Chen and   
                Jianguo Liu and   
                         Yu Shi   An Improved Method of Identification
                                  Based on Thermal Palm Vein Image . . . . 18--24
                Majeed Safa and   
           Sandhya Samarasinghe   Modelling Energy Use and Fuel
                                  Consumption in Wheat Production Using
                                  Indirect Factors and Artificial Neural
                                  Networks . . . . . . . . . . . . . . . . 25--32
                 Anam Tariq and   
             Arslan Shaukat and   
                  Shoab A. Khan   A Gaussian Mixture Model Based System
                                  for Detection of Macula in Fundus Images 33--40
              Tobias Brosch and   
                  Heiko Neumann   The Brain's Sequential Parallelism:
                                  Perceptual Decision-Making and Early
                                  Sensory Responses  . . . . . . . . . . . 41--50
                Shinsuke Koyama   Estimating Neural Firing Rates: An
                                  Empirical Bayes Approach . . . . . . . . 51--59
Jose Salvador Sánchez and   
      Vicente García and   
      Ana Isabel Marqués   Assessment of Financial Risk Prediction
                                  Models with Multi-criteria Decision
                                  Making Methods . . . . . . . . . . . . . 60--67
      Vicente García and   
  Ana Isabel Marqués and   
   Jose Salvador Sánchez   Improving Risk Predictions by
                                  Preprocessing Imbalanced Credit Data . . 68--75
         Mohamed Aymen Slim and   
         Maroua El Kastouri and   
             Afef Abdelkrim and   
               Mohamed Benrejeb   Hybrid Validation of Handwriting Process
                                  Modelling  . . . . . . . . . . . . . . . 76--84
Abdulrahman Alalshekmubarak and   
               Amir Hussain and   
                  Qiu-Feng Wang   Off-Line Handwritten Arabic Word
                                  Recognition Using SVMs with Normalized
                                  Poly Kernel  . . . . . . . . . . . . . . 85--91
                      Jinhua Xu   Bayesian Modeling of Visual Attention    92--99
               Xu-Cheng Yin and   
               Kaizhu Huang and   
               Hong-Wei Hao and   
               Khalid Iqbal and   
                   Zhi-Bin Wang   Classifier Ensemble Using a Heuristic
                                  Learning with Sparsity and Diversity . . 100--107
          Takashi Mitsuishi and   
         Takanori Terashima and   
               Yasunari Shidama   Optimization of SIRMs Fuzzy Model Using
                                  \Lukasiewicz Logic . . . . . . . . . . . 108--116
            Nariman Mahdavi and   
             Jürgen Kurths   Synchronization of Hopfield Like Chaotic
                                  Neural Networks with Structure Based
                                  Learning . . . . . . . . . . . . . . . . 117--124
          Andrew P. Papli\'nski   Incremental Self-Organizing Map (iSOM)
                                  in Categorization of Visual Objects  . . 125--132
                 Dror Cohen and   
          Andrew P. Papli\'nski   The Elastic Net as Visual Category
                                  Representation: Visualisation and
                                  Classification . . . . . . . . . . . . . 133--140
             Sebastien Naze and   
                      Jan Treur   A Computational Model for Development of
                                  Post-Traumatic Stress Disorders by
                                  Hebbian Learning . . . . . . . . . . . . 141--151
           Toshikazu Samura and   
            Yasuomi D. Sato and   
               Yuji Ikegaya and   
             Hatsuo Hayashi and   
                 Takeshi Aihara   Power-Law Scaling of Synchronization
                                  Robustly Reproduced in the Hippocampal
                                  CA3 Slice Culture Model with Small-World
                                  Topology . . . . . . . . . . . . . . . . 152--159
       Hamidreza Jamalabadi and   
         Hossein Nasrollahi and   
      Majid Nili Ahmadabadi and   
            Babak Nadjar Araabi   A Dynamic Bio-inspired Model of
                                  Categorization . . . . . . . . . . . . . 160--167
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7665, 2012

              Do-Thanh Sang and   
               Dong-Min Woo and   
                 Dong-Chul Park   Centroid Neural Network with Simulated
                                  Annealing and Its Application to Color
                                  Image Segmentation . . . . . . . . . . . 1--8
                       Ali Awad   Efficient Non-linear Filter for Impulse
                                  Noise Removal in Document Images . . . . 9--16
             Souhir Bouaziz and   
               Habib Dhahri and   
                  Adel M. Alimi   Evolving Flexible Beta Operator Neural
                                  Trees (FBONT) for Time Series
                                  Forecasting  . . . . . . . . . . . . . . 17--24
                 Wentao Fan and   
                 Nizar Bouguila   Nonparametric Localized Feature
                                  Selection via a Dirichlet Process
                                  Mixture of Generalized Dirichlet
                                  Distributions  . . . . . . . . . . . . . 25--33
 Kiatichai Treerattanapitak and   
         Chuleerat Jaruskulchai   Generalized Agglomerative Fuzzy
                                  Clustering . . . . . . . . . . . . . . . 34--41
                   Ming Liu and   
                    Lei Lin and   
                  Lili Shan and   
                   Chengjie Sun   A Novel Self-Adaptive Clustering
                                  Algorithm for Dynamic Data . . . . . . . 42--49
                 Chaojie Li and   
             David Yang Gao and   
                       Chao Liu   Impulsive Synchronization of State
                                  Delayed Discrete Complex Networks with
                                  Switching Topology . . . . . . . . . . . 50--57
                Liming Yuan and   
                 Songbo Liu and   
            Qingcheng Huang and   
                Jiafeng Liu and   
                 Xianglong Tang   Salient Instance Selection for
                                  Multiple-Instance Learning . . . . . . . 58--67
              Meng Qingfeng and   
                 Du Jianguo and   
                        Li Zhen   Motivating Retail Marketing Efforts
                                  under Fairness Concerns in Small-World
                                  Networks: a Multi-agent Simulation . . . 68--75
                Dunwei Gong and   
                  Jian Chen and   
                Xiaoyan Sun and   
                     Yong Zhang   Application of Variational Granularity
                                  Language Sets in Interactive Genetic
                                  Algorithms . . . . . . . . . . . . . . . 76--83
             Tatsuya Yokota and   
           Andrzej Cichocki and   
             Yukihiko Yamashita   Linked PARAFAC/CP Tensor Decomposition
                                  and Its Fast Implementation for
                                  Multi-block Tensor Analysis  . . . . . . 84--91
                   Gang Xie and   
                Hong-Bo Guo and   
                Yu-Chu Tian and   
                    Maolin Tang   A Human-Simulated Immune Evolutionary
                                  Computation Approach . . . . . . . . . . 92--99
                 Lu Zhenwei and   
              Zhao Lingling and   
                Su Xiaohong and   
                      Ma Peijun   A STPHD-Based Multi-sensor Fusion Method 100--107
               Satoshi Hara and   
                 Takashi Washio   Group Sparse Inverse Covariance
                                  Selection with a Dual Augmented
                                  Lagrangian Method  . . . . . . . . . . . 108--115
                 Yinglu Liu and   
               Xu-Yao Zhang and   
               Kaizhu Huang and   
                 Xinwen Hou and   
                  Cheng-Lin Liu   Multiple Outlooks Learning with Support
                                  Vector Machines  . . . . . . . . . . . . 116--124
              P. K. Srijith and   
                Shirish Shevade   Multi-Task Learning Using Shared and
                                  Task Specific Information  . . . . . . . 125--132
             Sepehr Eghbali and   
      Majid Nili Ahmadabadi and   
        Babak Nadjar Araabi and   
                  Maryam Mirian   Learning Attentive Fusion of Multiple
                                  Bayesian Network Classifiers . . . . . . 133--140
          Amira Samy Talaat and   
              Amir F. Atiya and   
           Sahar A. Mokhtar and   
               Ahmed Al-Ani and   
                    Magda Fayek   Multiclass Penalized Likelihood Pattern
                                  Classification Algorithm . . . . . . . . 141--148
           Piotr P\lo\'nski and   
              Krzysztof Zaremba   Self-Organising Maps for Classification
                                  with Metropolis--Hastings Algorithm for
                                  Supervision  . . . . . . . . . . . . . . 149--156
                Yinghua Han and   
               Jinkuan Wang and   
                 Qiang Zhao and   
                       Peng Han   Decoupled $2$-D DOA Estimation Algorithm
                                  Based on Cross-Correlation Matrix for
                                  Coherently Distributed Source  . . . . . 157--165
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7666, 2012

            Theodor Dan Popescu   Neural Network Learning for Blind Source
                                  Separation with Application in Dam
                                  Safety Monitoring  . . . . . . . . . . . 1--8
            Jayamol Mathews and   
              Madhu S. Nair and   
                        Liza Jo   Improved BTC Algorithm for Gray Scale
                                  Images Using $K$-Means Quad Clustering   9--17
      Christoph Sulzbachner and   
         Martin Humenberger and   
         Ágoston Srp and   
                   Ferenc Vajda   Optimization of a Neural Network for
                                  Computer Vision Based Fall Detection
                                  with Fixed-Point Arithmetic  . . . . . . 18--26
                     Yan Tu and   
                   Zijiang Yang   Customer Relationship Management Using
                                  Partial Focus Feature Reduction  . . . . 27--35
       Muhammad Usman Akram and   
             Mahmood Akhtar and   
                M. Younus Javed   An Automated System for the Grading of
                                  Diabetic Maculopathy in Fundus Images    36--43
                Yun-zhi Zou and   
                 Xin-kun Wu and   
              Wen-bin Zhang and   
                  Chang-yin Sun   An Iterative Method for a Class of
                                  Generalized Global Dynamical System
                                  Involving Fuzzy Mappings in Hilbert
                                  Spaces . . . . . . . . . . . . . . . . . 44--51
           Jesada Kajornrit and   
               Kok Wai Wong and   
                  Chun Che Fung   Estimation of Missing Precipitation
                                  Records Using Modular Artificial Neural
                                  Networks . . . . . . . . . . . . . . . . 52--59
                 Ameer H. Morad   Office Employees Authentication Based on
                                  E-exam Techniques  . . . . . . . . . . . 60--65
             Karthik Nagesh and   
             M. Narasimha Murty   Obtaining Single Document Summaries
                                  Using Latent Dirichlet Allocation  . . . 66--74
              Chu-Kiong Loo and   
                  Ali Memariani   Object Recognition Using Sparse
                                  Representation of Overcomplete
                                  Dictionary . . . . . . . . . . . . . . . 75--82
                  Jia Zheng and   
                Mengyao Zhu and   
                  Junwei He and   
                    Xiaoqing Yu   PEAQ Compatible Audio Quality Estimation
                                  Using Computational Auditory Model . . . 83--90
                Sagar Dewan and   
         Srinivasa Chakravarthy   A System for Offline Character
                                  Recognition Using Auto-encoder Networks  91--99
                Xiaoyan Yan and   
                   Bo Liang and   
                    Tao Ban and   
               Shanqing Guo and   
                    Liming Wang   TrafficS: a Behavior-Based Network
                                  Traffic Classification Benchmark System
                                  with Traffic Sampling Functionality  . . 100--107
                 Iyad Abu Doush   Harmony Search with Multi-Parent
                                  Crossover for Solving IEEE-CEC2011
                                  Competition Problems . . . . . . . . . . 108--114
           Wojciech Kacalak and   
                Maciej Majewski   New Intelligent Interactive Automated
                                  Systems for Design of Machine Elements
                                  and Assemblies . . . . . . . . . . . . . 115--122
                    Xiao Fu and   
                    Jin Liu and   
               Haopeng Wang and   
                  Bin Zhang and   
                        Rui Gao   Rough Sets and Neural Networks Based
                                  Aerial Images Segmentation Method  . . . 123--131
                   Shen Ren and   
             Michael Barlow and   
              Hussein A. Abbass   Frontal Cortex Neural Activities Shift
                                  Cognitive Resources Away from Facial
                                  Activities in Real-Time Problem Solving  132--139
               Geon-min Kim and   
             Chang-hyun Kim and   
                  Soo-young Lee   Implement Real-Time Polyphonic Pitch
                                  Detection and Feedback System for the
                                  Melodic Instrument Player  . . . . . . . 140--147
            Naotake Kamiura and   
               Ayumu Saitoh and   
            Teijiro Isokawa and   
            Nobuyuki Matsui and   
                Hitoshi Tabuchi   Classification of Interview Sheets Using
                                  Self-Organizing Maps for Determination
                                  of Ophthalmic Examinations . . . . . . . 148--155
              Slamet Widodo and   
               Tomoo Shiigi and   
             Naing Min Than and   
               Yuichi Ogawa and   
                   Naoshi Kondo   Sound-Based Ranging System in Greenhouse
                                  Environment with Multipath Effect
                                  Compensation Using Artificial Neural
                                  Network  . . . . . . . . . . . . . . . . 156--163
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7667, 2012

                    Lu Xiao and   
                       Ming Fan   Does Social Network always Promote
                                  Entrepreneurial Intentions? Part II:
                                  Empirical Analysis . . . . . . . . . . . 1--8
                 Xuzhi Wang and   
               Yangyang Jia and   
                 Xiang Feng and   
                   Shuai Yu and   
                 Hengyong Jiang   Rasterization System for Mobile Device   9--16
                 Xuzhi Wang and   
                  Wei Xiong and   
                 Xiang Feng and   
                   Shuai Yu and   
                 Hengyong Jiang   Study on Rasterization Algorithm for
                                  Graphics Acceleration System . . . . . . 17--24
              Yoshifusa Ito and   
             Hiroyuki Izumi and   
             Cidambi Srinivasan   Simultaneous Learning of Several
                                  Bayesian and Mahalanobis Discriminant
                                  Functions by a Neural Network with
                                  Memory Nodes . . . . . . . . . . . . . . 25--33
           Andrzej \'Sluzek and   
         Mariusz Paradowski and   
                  Duanduan Yang   Reinforcement of Keypoint Matching by
                                  Co-segmentation in Object Retrieval:
                                  Face Recognition Case Study  . . . . . . 34--41
               Hiroaki Kudo and   
                Takuya Kume and   
                 Noboru Ohnishi   Effect of Luminance Gradients in
                                  Measurement of Differential Limen  . . . 42--49
             Weicheng Huang and   
             Shuichi Kurogi and   
                Takeshi Nishida   Robust Controller for Flexible
                                  Specifications Using Difference Signals
                                  and Competitive Associative Nets . . . . 50--58
                  Kohei Ono and   
             Shuichi Kurogi and   
                Takeshi Nishida   Moments of Predictive Deviations for
                                  Ensemble Diversity Measures to Estimate
                                  the Performance of Time Series
                                  Prediction . . . . . . . . . . . . . . . 59--66
                  Satoru Morita   Self-Organized Three Dimensional Feature
                                  Extraction of MRI and CT . . . . . . . . 67--74
                    Yao Yao and   
                    Xin Xin and   
                       Ping Guo   OMP or BP? A Comparison Study of Image
                                  Fusion Based on Joint Sparse
                                  Representation . . . . . . . . . . . . . 75--82
                  P. M. Yan and   
                  Meng Yang and   
                  Hui Huang and   
                       J. F. Li   An Improved Approach to Super Resolution
                                  Based on PET Imaging . . . . . . . . . . 83--90
               Zhi-Bin Wang and   
               Hong-Wei Hao and   
                     Yan Li and   
               Xu-Cheng Yin and   
                       Shu Tian   Pedestrian Analysis and Counting System
                                  with Videos  . . . . . . . . . . . . . . 91--99
                    Ya Zhao and   
                    Xiaodong Gu   Vehicle License Plate Localization and
                                  License Number Recognition Using
                                  Unit-Linking Pulse Coupled Neural
                                  Network  . . . . . . . . . . . . . . . . 100--108
              Shenghui Zhou and   
                   Qing Liu and   
               Jianming Guo and   
                 Yuanyuan Jiang   ROI-HOG and LBP Based Human Detection
                                  via Shape Part-Templates Matching  . . . 109--115
       Rossella Cancelliere and   
                  Mario Gai and   
         Thierry Arti\`eres and   
              Patrick Gallinari   Matrix Pseudoinversion for Image Neural
                                  Processing . . . . . . . . . . . . . . . 116--125
                Jan Mattner and   
               Sascha Lange and   
              Martin Riedmiller   Learn to Swing Up and Balance a Real
                                  Pole Based on Raw Visual Input Data  . . 126--133
              Alan W. Y. Lo and   
                 Benben Liu and   
               Ray C. C. Cheung   GPU-Based Biclustering for Neural
                                  Information Processing . . . . . . . . . 134--141
               Haifeng Sima and   
                Lixiong Liu and   
                       Ping Guo   Color Image Segmentation Based on
                                  Regional Saliency  . . . . . . . . . . . 142--150
                Man To Wong and   
               Xiangjian He and   
                Hung Nguyen and   
                  Wei-Chang Yeh   Mass Classification in Digitized
                                  Mammograms Using Texture Features and
                                  Artificial Neural Network  . . . . . . . 151--158
                 Zhongyi Hu and   
                   Qing Liu and   
              Shenghui Zhou and   
             Mingjing Huang and   
                       Fei Teng   Image Dehazing Algorithm Based on
                                  Atmosphere Scatters Approximation Model  159--168
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7668, 2012

           Vinod Vaikuntanathan   How to Compute on Encrypted Data . . . . 1--15
                  Orr Dunkelman   From Multiple Encryption to Knapsacks
                                  --- Efficient Dissection of Composite
                                  Problems . . . . . . . . . . . . . . . . 16--16
         Thorsten Kleinjung and   
           Arjen K. Lenstra and   
                   Dan Page and   
                 Nigel P. Smart   Using the Cloud to Determine Key
                                  Strengths  . . . . . . . . . . . . . . . 17--39
            Hemanta K. Maji and   
          Manoj Prabhakaran and   
                   Mike Rosulek   A Unified Characterization of
                                  Completeness and Triviality for Secure
                                  Function Evaluation  . . . . . . . . . . 40--59
            Sebastian Faust and   
          Markulf Kohlweiss and   
     Giorgia Azzurra Marson and   
                Daniele Venturi   On the Non-malleability of the
                                  Fiat--Shamir Transform . . . . . . . . . 60--79
              Arpita Maitra and   
                    Goutam Paul   Another Look at Symmetric Incoherent
                                  Optimal Eavesdropping against BB84 . . . 80--99
               Chaya Ganesh and   
                Vipul Goyal and   
                    Satya Lokam   On-Line/Off-Line Leakage Resilient
                                  Secure Computation Protocols . . . . . . 100--119
              Claude Carlet and   
            Jean-Luc Danger and   
            Sylvain Guilley and   
               Houssem Maghrebi   Leakage Squeezing of Order Two . . . . . 120--139
         Christophe Clavier and   
                Benoit Feix and   
           Georges Gagnerot and   
          Christophe Giraud and   
            Myl\`ene Roussellet   ROSETTA for Single Trace Analysis  . . . 140--155
            Mario Lamberger and   
             Florian Mendel and   
                 Vincent Rijmen   Collision Attack on the Hamsi-256
                                  Compression Function . . . . . . . . . . 156--171
         Tuomas Kortelainen and   
                Ari Vesanen and   
               Juha Kortelainen   Generalized Iterated Hash Functions
                                  Revisited: New Complexity Bounds for
                                  Multicollision Attacks . . . . . . . . . 172--190
            Subhadeep Banik and   
            Subhamoy Maitra and   
                 Santanu Sarkar   A Differential Fault Attack on the Grain
                                  Family under Reasonable Assumptions  . . 191--208
          Thierry P. Berger and   
                  Marine Minier   Cryptanalysis of Pseudo-random
                                  Generators Based on Vectorial FCSRs  . . 209--224
             Patrick Derbez and   
        Pierre-Alain Fouque and   
      Jérémy Jean   Faster Chosen-Key Distinguishers on
                                  Reduced-Round AES  . . . . . . . . . . . 225--243
                 Jiqiang Lu and   
             Yongzhuang Wei and   
               Jongsung Kim and   
                   Enes Pasalic   The Higher-Order Meet-in-the-Middle
                                  Attack and Its Application to the
                                  Camellia Block Cipher  . . . . . . . . . 244--264
                      Yu Sasaki   Double-SP Is Weaker Than Single-SP:
                                  Rebound Attacks on Feistel Ciphers with
                                  Several Rounds . . . . . . . . . . . . . 265--282
                Shengbao Wu and   
                 Mingsheng Wang   Automatic Search of Truncated Impossible
                                  Differentials for Word-Oriented Block
                                  Ciphers  . . . . . . . . . . . . . . . . 283--302
               Jung Woo Kim and   
                Jungjoo Seo and   
                   Jin Hong and   
                Kunsoo Park and   
                  Sung-Ryul Kim   High-Speed Parallel Implementations of
                                  the Rainbow Method in a Heterogeneous
                                  System . . . . . . . . . . . . . . . . . 303--316
        Daniel J. Bernstein and   
                    Tanja Lange   Computing Small Discrete Logarithms
                                  Faster . . . . . . . . . . . . . . . . . 317--338
           Ingo von Maurich and   
               Tim Güneysu   Embedded Syndrome-Based Hashing  . . . . 339--357
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7670, 2012

                      Mi Li and   
               Dongning Han and   
                 Shengfu Lu and   
                  Zheng Liu and   
                     Ning Zhong   Associative Information Processing in
                                  Parahippocampal Place Area (PPA): An
                                  fMRI Study . . . . . . . . . . . . . . . 1--9
                  Qingyuan Tian   Language Acquisition Is an Optimized
                                  Process Balanced between Holistic and
                                  Compositive  . . . . . . . . . . . . . . 10--17
               Chin Ian Lou and   
             Daria Migotina and   
          Joao P. Rodrigues and   
                Joao Semedo and   
                   Feng Wan and   
                    Peng Un Mak   Object Recognition Test in Peripheral
                                  Vision: a Study on the Influence of
                                  Object Color, Pattern and Shape  . . . . 18--26
                 Sanxia Fan and   
                 Xuyan Wang and   
               Zhizhou Liao and   
               Zhoujun Long and   
                Haiyan Zhou and   
                      Yulin Qin   Basic Level Advantage during Information
                                  Retrieval: An ERP Study  . . . . . . . . 27--37
               Zhoujun Long and   
                 Xuyan Wang and   
            Xiangsheng Shen and   
                 Sanxia Fan and   
                Haiyan Zhou and   
                      Yulin Qin   A Skill Learning during Heuristic
                                  Problem Solving: An fMRI Study . . . . . 38--49
                 Xuyan Wang and   
               Zhoujun Long and   
                 Sanxia Fan and   
                  Weiyan Yu and   
                Haiyan Zhou and   
                      Yulin Qin   The Role of Category Label in Adults'
                                  Inductive Reasoning  . . . . . . . . . . 50--60
                Yuki Ueyama and   
                 Eizo Miyashita   Estimation of Visual Feedback
                                  Contribution to Limb Stiffness in
                                  Visuomotor Control . . . . . . . . . . . 61--72
                Haiyan Zhou and   
                Yukun Xiong and   
               Zhoujun Long and   
                 Sanxia Fan and   
                 Xuyan Wang and   
                  Yulin Qin and   
                     Ning Zhong   Rule Acquisition in the Proceeding of
                                  Heuristic Sudoku Solving . . . . . . . . 73--84
    Redwan Abdo A. Mohammed and   
  Samah Abdulfatah Mohammed and   
                   Lars Schwabe   BatGaze: a New Tool to Measure Depth
                                  Features at the Center of Gaze during
                                  Free Viewing . . . . . . . . . . . . . . 85--96
    Redwan Abdo A. Mohammed and   
                   Lars Schwabe   A Brain Informatics Approach to Explain
                                  the Oblique Effect via Depth Statistics  97--106
              Azizi Ab Aziz and   
             Faudziah Ahmad and   
             Houzifa M. Hintaya   An Agent Model for Temporal Dynamics
                                  Analysis of a Person with Chronic
                                  Fatigue Syndrome . . . . . . . . . . . . 107--118
              Zhijiang Wang and   
                 Jiming Liu and   
                 Ning Zhong and   
                  Yulin Qin and   
                Haiyan Zhou and   
                  Jian Yang and   
                    Kuncheng Li   A Na\"\ive Hypergraph Model of Brain
                                  Networks . . . . . . . . . . . . . . . . 119--129
              Do Young Choi and   
              Kun Chang Lee and   
                Seong Wook Chae   The Effect of Individual Psychological
                                  Characteristics on Creativity
                                  Revelation: Emphasis with Psychological
                                  Empowerment and Intrinsic Motivation . . 130--139
                Alexander Ryjov   Modeling and Optimization of Information
                                  Retrieval for Perception-Based
                                  Information  . . . . . . . . . . . . . . 140--149
                Yu-Wen Chen and   
                      Hsing Mei   Sleep Physiological Dynamics Simulation
                                  with Fuzzy Set . . . . . . . . . . . . . 150--161
     Lorenzo Dell'Arciprete and   
               Brian Murphy and   
         Fabio Massimo Zanzotto   Parallels between Machine and Brain
                                  Decoding . . . . . . . . . . . . . . . . 162--174
             Rafael Ramirez and   
          Zacharias Vamvakousis   Detecting Emotion from EEG Signals Using
                                  the Emotive Epoc Device  . . . . . . . . 175--184
                 Guohun Zhu and   
                     Yan Li and   
                  Peng Paul Wen   An Efficient Visibility Graph Similarity
                                  Algorithm and Its Application on Sleep
                                  Stages Classification  . . . . . . . . . 185--195
               Chun-An Chou and   
     Kittipat ``Bot'' Kampa and   
             Sonya H. Mehta and   
           Rosalia F. Tungaraza   Information-Theoretic Based Feature
                                  Selection for Multi-Voxel Pattern
                                  Analysis of fMRI Data  . . . . . . . . . 196--208
               Adham Atyabi and   
         Sean P. Fitzgibbon and   
             David M. W. Powers   Multiplication of EEG Samples through
                                  Replicating, Biasing, and Overlapping    209--219
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7671, 2012

            Christopher Kruegel   Fighting Malicious Software  . . . . . . 1--15
         Chaitrali Amrutkar and   
                Kapil Singh and   
              Arunabh Verma and   
                Patrick Traynor   VulnerableMe: Measuring Systemic
                                  Weaknesses in Mobile Browser Security    16--34
              Andres Ojamaa and   
           Karl Düüna   Security Assessment of Node.js Platform  35--43
                 Prasad Naldurg   Foundations of Dynamic Access Control    44--58
         Khalid Zaman Bijon and   
               Ram Krishnan and   
                    Ravi Sandhu   Risk-Aware RBAC Sessions . . . . . . . . 59--74
               Soumya Maity and   
                Soumya K. Ghosh   A Cognitive Trust Model for Access
                                  Control Framework in MANET . . . . . . . 75--88
              Khalifa Toumi and   
 César Andrés and   
                    Ana Cavalli   Trust-orBAC: a Trust Access Control
                                  Model in Multi-Organization Environments 89--103
          Matthew L. Bolton and   
         Celeste M. Wallace and   
                 Lenore D. Zuck   On Policies and Intents  . . . . . . . . 104--118
               Arne Swinnen and   
              Raoul Strackx and   
        Pieter Philippaerts and   
                 Frank Piessens   ProtoLeaks: a Reliable and
                                  Protocol-Independent Network Covert
                                  Channel  . . . . . . . . . . . . . . . . 119--133
                Goutam Paul and   
               Ian Davidson and   
             Imon Mukherjee and   
                     S. S. Ravi   Keyless Steganography in Spatial Domain
                                  Using Energetic Pixels . . . . . . . . . 134--148
             Ruchira Naskar and   
       Rajat Subhra Chakraborty   Fuzzy Inference Rule Based Reversible
                                  Watermarking for Digital Images  . . . . 149--163
            Vivek Natarajan and   
                    Yi Yang and   
                     Sencun Zhu   Secure Trust Metadata Management for
                                  Mobile Ad-Hoc Networks . . . . . . . . . 164--180
               Rakesh Matam and   
              Somanath Tripathy   Defence against Wormhole Attacks in
                                  Wireless Mesh Networks . . . . . . . . . 181--193
             Sarita Agrawal and   
              Rodrigo Roman and   
              Manik Lal Das and   
             Anish Mathuria and   
                   Javier Lopez   A Novel Key Update Protocol in Mobile
                                  Sensor Networks  . . . . . . . . . . . . 194--207
    Anup Kumar Bhattacharya and   
                Abhijit Das and   
     Dipanwita Roychoudhury and   
                   Aravind Iyer   Autonomous Certification with List-Based
                                  Revocation for Secure V2V Communication  208--222
                  Weihan Li and   
            Brajendra Panda and   
                  Qussai Yaseen   Mitigating Insider Threat on Database
                                  Integrity  . . . . . . . . . . . . . . . 223--237
           Jaydeep Howlader and   
                Jayanta Kar and   
                Ashis Kumar Mal   Coercion Resistant MIX for Electronic
                                  Auction  . . . . . . . . . . . . . . . . 238--248
             Girish Chandra and   
                  Divakar Yadav   Verification of Money Atomicity in
                                  Digital Cash Based Payment System  . . . 249--264
            Alberto Peinado and   
   Amparo Fúster-Sabater   Cryptographic Analysis of a Type of
                                  Sequence Generators  . . . . . . . . . . 265--276
            Soumyadev Maity and   
                  R. C. Hansdah   Certificate-Less On-Demand Public Key
                                  Management (CLPKM) for Self-organized
                                  MANETs . . . . . . . . . . . . . . . . . 277--293
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7672, 2012

               Fengling Han and   
               Ron van Schyndel   M-Identity and Its Authentication
                                  Protocol for Secure Mobile Commerce
                                  Applications . . . . . . . . . . . . . . 1--10
         Avinash Srinivasan and   
                         Jie Wu   SafeCode --- Safeguarding Security and
                                  Privacy of User Data on Stolen iOS
                                  Devices  . . . . . . . . . . . . . . . . 11--20
            Alexandre Braga and   
           Rafael Cividanes and   
        Ismael Ávila and   
              Claudia Tambascia   Protection Aspects of Iconic Passwords
                                  on Mobile Devices  . . . . . . . . . . . 21--32
                Mariem Graa and   
      Nora Cuppens-Boulahia and   
Frédéric Cuppens and   
                    Ana Cavalli   Detecting Control Flow in Smartphones:
                                  Combining Static and Dynamic Analyses    33--47
              Jemal Abawajy and   
                 Andrei Kelarev   A Multi-tier Ensemble Construction of
                                  Classifiers for Phishing Email Detection
                                  and Filtering  . . . . . . . . . . . . . 48--56
                  Yong Feng and   
                    Bo Wang and   
               Fengling Han and   
                 Xinghuo Yu and   
                     Zahir Tari   Chattering-Free Terminal Sliding-Mode
                                  Observer for Anomaly Detection . . . . . 57--65
            Paul A. Watters and   
                    Nigel Phair   Detecting Illicit Drugs on Social Media
                                  Using Automated Social Media
                                  Intelligence Analysis (ASMIA)  . . . . . 66--76
       Juan Pablo Timpanaro and   
         Isabelle Chrisment and   
                 Olivier Festor   Improving Content Availability in the
                                  I2P Anonymous File-Sharing Environment   77--92
            Mark Stegelmann and   
                 Dogan Kesdogan   V2GPriv: Vehicle-to-Grid Privacy in the
                                  Smart Grid . . . . . . . . . . . . . . . 93--107
          Daniel Angermeier and   
  Konstantin Böttinger and   
              Andreas Ibing and   
                Dieter Schuster   A Secure Architecture for Smart Meter
                                  Systems  . . . . . . . . . . . . . . . . 108--122
                  Geng Yang and   
                 Qiang Zhou and   
                Xiaolong Xu and   
                    Jian Xu and   
                  Chunming Rong   A Novel Identity-Based Key Management
                                  and Encryption Scheme for Distributed
                                  System . . . . . . . . . . . . . . . . . 123--138
       Ferdous A. Barbhuiya and   
              Tonmoy Saikia and   
                  Sukumar Nandi   An Anomaly Based Approach for HID Attack
                                  Detection Using Keystroke Dynamics . . . 139--152
         Avinash Srinivasan and   
           Lashidhar Chennupati   Robust Authentication of Public Access
                                  Points Using Digital Certificates --- a
                                  Novel Approach . . . . . . . . . . . . . 153--164
                    Han Fei and   
                   Qin Jing and   
                Zhao Huawei and   
                     Hu Jiankun   A General Transformation from KP-ABE to
                                  Searchable Encryption  . . . . . . . . . 165--178
              Luca Ferretti and   
          Michele Colajanni and   
                Mirco Marchetti   Supporting Security and Consistency for
                                  Cloud Database . . . . . . . . . . . . . 179--193
                 Ronald Petrlic   Proxy Re-encryption in a
                                  Privacy-Preserving Cloud Computing DRM
                                  Scheme . . . . . . . . . . . . . . . . . 194--211
             Satoru Akimoto and   
              Yoshiaki Hori and   
                Kouichi Sakurai   Collaborative Behavior Visualization and
                                  Its Detection by Observing Darknet
                                  Traffic  . . . . . . . . . . . . . . . . 212--226
                    Craig Valli   SSH --- Somewhat Secure Host . . . . . . 227--235
Nimalaprakasan Skandhakumar and   
               Farzad Salim and   
                 Jason Reid and   
                      Ed Dawson   Physical Access Control Administration
                                  Using Building Information Models  . . . 236--250
              Yongming Yang and   
               Zulong Zhang and   
               Fengling Han and   
                    Kunming Lin   Multiple Factors Based Evaluation of
                                  Fingerprint Images Quality . . . . . . . 251--264
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7673, 2012

           Saber M. Elsayed and   
            Ruhul A. Sarker and   
                 Daryl L. Essam   The Influence of the Number of Initial
                                  Feasible Solutions on the Performance of
                                  an Evolutionary Optimization Algorithm   1--11
                Kiyoharu Tagawa   Concurrent Differential Evolution Based
                                  on Generational Model for Multi-core
                                  CPUs . . . . . . . . . . . . . . . . . . 12--21
                 Wenlong Fu and   
              Mark Johnston and   
                  Mengjie Zhang   Figure of Merit Based Fitness Functions
                                  in Genetic Programming for Edge
                                  Detection  . . . . . . . . . . . . . . . 22--31
         Amadeo Ascó and   
          Jason A. D. Atkin and   
                Edmund K. Burke   An Evolutionary Algorithm for the
                                  Over-constrained Airport Baggage Sorting
                                  Station Assignment Problem . . . . . . . 32--41
               Dung H. Phan and   
                 Junichi Suzuki   A Non-parametric Statistical Dominance
                                  Operator for Noisy Multiobjective
                                  Optimization . . . . . . . . . . . . . . 42--51
               Marwa Khater and   
               Elham Salehi and   
                     Robin Gras   The Emergence of New Genes in EcoSim and
                                  Its Effect on Fitness  . . . . . . . . . 52--61
         Mohsen Davarynejad and   
              Zary Forghany and   
               Jan van den Berg   Mass-Dispersed Gravitational Search
                                  Algorithm for Gene Regulatory Network
                                  Model Parameter Identification . . . . . 62--72
                  Bin Zhang and   
               Kamran Shafi and   
              Hussein A. Abbass   A Density Based Approach to the Access
                                  Point Layout Smart Distribution Grid
                                  Design Optimization Problem  . . . . . . 73--82
           Mostafa Ellabaan and   
              Xianshun Chen and   
               Nguyen Quang Huy   Multi-modal Valley-Adaptive Memetic
                                  Algorithm for Efficient Discovery of
                                  First-Order Saddle Points  . . . . . . . 83--92
            Hisao Ishibuchi and   
            Masakazu Yamane and   
                  Yusuke Nojima   Ensemble Fuzzy Rule-Based Classifier
                                  Design by Parallel Distributed Fuzzy
                                  GBML Algorithms  . . . . . . . . . . . . 93--103
               Ahmed Kafafy and   
            Ahmed Bounekkar and   
       Stéphane Bonnevay   HEMH2: An Improved Hybrid Evolutionary
                                  Metaheuristics for 0/1 Multiobjective
                                  Knapsack Problems  . . . . . . . . . . . 104--116
        Prashant Singh Rana and   
              Harish Sharma and   
         Mahua Bhattacharya and   
                  Anupam Shukla   Guided Reproduction in Differential
                                  Evolution  . . . . . . . . . . . . . . . 117--127
                 Una Benlic and   
                    Jin-Kao Hao   A Study of Breakout Local Search for the
                                  Minimum Sum Coloring Problem . . . . . . 128--137
              Masaya Nakata and   
            Pier Luca Lanzi and   
                 Keiki Takadama   XCS with Adaptive Action Mapping . . . . 138--147
                Cuong C. Vu and   
                Lam Thu Bui and   
              Hussein A. Abbass   DEAL: a Direction-Guided Evolutionary
                                  Algorithm  . . . . . . . . . . . . . . . 148--157
          Susanne Rosenthal and   
            Nail El-Sourani and   
              Markus Borschbach   Introduction of a Mutation Specific Fast
                                  Non-dominated Sorting GA Evolved for
                                  Biochemical Optimizations  . . . . . . . 158--167
                 Eman Sayed and   
                Daryl Essam and   
                   Ruhul Sarker   Using Hybrid Dependency Identification
                                  with a Memetic Algorithm for Large Scale
                                  Optimization Problems  . . . . . . . . . 168--177
           Rohitash Chandra and   
              Mengjie Zhang and   
                    Lifeng Peng   Application of Cooperative Convolution
                                  Optimization for $^{13}$C Metabolic Flux
                                  Analysis: Simulation of Isotopic
                                  Labeling Patterns Based on Tandem Mass
                                  Spectrometry Measurements  . . . . . . . 178--187
            Hoang Xuan Huan and   
                Dong Do Duc and   
                 Nguyen Manh Ha   An Efficient Two-Phase Ant Colony
                                  Optimization Algorithm for the Closest
                                  String Problem . . . . . . . . . . . . . 188--197
               Kamran Shafi and   
         Kathryn E. Merrick and   
                    Essam Debie   Evolution of Intrinsic Motives in
                                  Multi-agent Simulations  . . . . . . . . 198--207
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7674, 2012

                  Chao Wang and   
               Yunhong Wang and   
                Zhaoxiang Zhang   Incremental Learning of Patch-Based Bag
                                  of Facial Words Representation for
                                  Online Face Recognition in Videos  . . . 1--9
              Adam Borowiak and   
              Ulrich Reiter and   
              U. Peter Svensson   Evaluation of Audio Quality Requirements
                                  over Extended Periods of Time Using Long
                                  Duration Audiovisual Content . . . . . . 10--20
                  Liang Tao and   
                Horace H. S. Ip   Hashing with Cauchy Graph  . . . . . . . 21--32
                  Sang Phan and   
              Thanh Duc Ngo and   
                     Vu Lam and   
                   Son Tran and   
                Duy-Dinh Le and   
              Duc Anh Duong and   
                Shin'ichi Satoh   Multimedia Event Detection Using
                                  Segment-Based Approach for Motion
                                  Feature  . . . . . . . . . . . . . . . . 33--44
             Stefan Romberg and   
              Moritz August and   
          Christian X. Ries and   
                Rainer Lienhart   Robust Feature Bundling  . . . . . . . . 45--56
                 Yang Liang and   
                Mingli Song and   
                  Jiajun Bu and   
                      Chun Chen   Colorization for Gray Scale Facial Image
                                  by Locality-Constrained Linear Coding    57--67
              Xiaozhou Zhou and   
               Pierre Boulanger   New Eye Contact Correction Using Radial
                                  Basis Function for Wide Baseline
                                  Videoconference System . . . . . . . . . 68--79
                  Wenxin Yu and   
               Weichen Wang and   
               Zhengyan Guo and   
                   Satoshi Goto   An Integrated Hole-Filling Algorithm for
                                  View Synthesis . . . . . . . . . . . . . 80--92
               Shenggao Zhu and   
              Hugh Anderson and   
                        Ye Wang   A Real-Time On-Chip Algorithm for
                                  IMU-Based Gait Measurement . . . . . . . 93--104
               Shenggao Zhu and   
              Hugh Anderson and   
                        Ye Wang   Reducing the Power Consumption of an
                                  IMU-Based Gait Measurement System  . . . 105--116
                 Yuxia Wang and   
                 Yuan Zhang and   
                     Rui Lu and   
               Pamela C. Cosman   SSIM-Based End-to-End Distortion
                                  Modeling for H.264 Video Coding  . . . . 117--128
                    Lei Sun and   
                 Zhenyu Liu and   
                Takeshi Ikenaga   A Videoconferencing-Oriented
                                  Hybrid-Domain H.264/SVC to H.264/AVC
                                  Spatial Transcoder . . . . . . . . . . . 129--141
               Chongwu Tang and   
              Xiaokang Yang and   
                  Guangtao Zhai   Robust Noise Estimation Based on Noise
                                  Injection  . . . . . . . . . . . . . . . 142--152
                 Jinjian Wu and   
                     Fei Qi and   
                  Guangming Shi   Image Quality Assessment Based on
                                  Improved Structural SIMilarity . . . . . 153--163
              Chun-Chi Chen and   
             Wen-Hsiao Peng and   
                 Shih-Chun Chou   Multi-hypothesis Temporal Prediction
                                  Using Template Matching Prediction and
                                  Block Motion Compensation for High
                                  Efficiency Video Coding  . . . . . . . . 164--175
                    Hong Lu and   
                   Kai Chen and   
               Guobao Jiang and   
               Renzhong Wei and   
                  Xiangyang Xue   Leveraging Exemplar and Saliency Model
                                  for Image Search Reranking . . . . . . . 176--185
                 Shuxin Qin and   
               Xiaoyang Zhu and   
                  Haitao Yu and   
                Shuiying Ge and   
                Yiping Yang and   
                  Yongshi Jiang   Real-Time Markerless Hand Gesture
                                  Recognition with Depth Camera  . . . . . 186--197
              Zhaoqiang Xia and   
                 Jinye Peng and   
                Xiaoyi Feng and   
                   Jianping Fan   Social Tag Enrichment via Automatic
                                  Abstract Tag Refinement  . . . . . . . . 198--209
        Charles-Henri Quivy and   
                 Itsuo Kumazawa   ``\ldotsIt's Orange and Small, and White
                                  Stripes\ldots''  . . . . . . . . . . . . 210--221
               Arpit Shukla and   
             Karan Nathwani and   
                Rajesh M. Hegde   An Adaptive Non Reference Anchor Array
                                  Framework for Distant Speech Recognition 222--231
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7675, 2012

                 Yadong Zhu and   
                Yuanhai Xue and   
                Jiafeng Guo and   
                 Yanyan Lan and   
                Xueqi Cheng and   
                    Xiaoming Yu   Exploring and Exploiting Proximity
                                  Statistic for Information Retrieval
                                  Model  . . . . . . . . . . . . . . . . . 1--13
               Zongcheng Ji and   
                     Fei Xu and   
                       Bin Wang   A Category-integrated Language Model for
                                  Question Retrieval in Community Question
                                  Answering  . . . . . . . . . . . . . . . 14--25
              Tetsuya Sakai and   
               Zhicheng Dou and   
                Ruihua Song and   
                   Noriko Kando   The Reusability of a Diversified Search
                                  Test Collection  . . . . . . . . . . . . 26--38
              Tetsuya Sakai and   
                 Makoto P. Kato   One Click One Revisited: Enhancing
                                  Evaluation Based on Information Units    39--51
                   Zhen Yue and   
               Shuguang Han and   
                      Daqing He   A Comparison of Action Transitions in
                                  Individual and Collaborative Exploratory
                                  Web Search . . . . . . . . . . . . . . . 52--63
                Minghui Qiu and   
                 Yaliang Li and   
                     Jing Jiang   Query-Oriented Keyphrase Extraction  . . 64--75
               Jinpeng Wang and   
             Wayne Xin Zhao and   
                    Rui Yan and   
                Haitian Wei and   
               Jian-Yun Nie and   
                    Xiaoming Li   Using Lexical and Thematic Knowledge for
                                  Name Disambiguation  . . . . . . . . . . 76--88
                   Xueni Li and   
               Shaowu Zhang and   
                 Liang Yang and   
                    Hongfei Lin   Sells Out or Piles Up? A Sentiment
                                  Autoregressive Model for Predicting
                                  Sales Performance  . . . . . . . . . . . 89--102
                  Zhenyu Qi and   
                   Kang Liu and   
                       Jun Zhao   Are Human-Input Seeds Good Enough for
                                  Entity Set Expansion? Seeds Rewriting by
                                  Leveraging Wikipedia Semantic Knowledge  103--113
                  Antti Puurula   Combining Modifications to Multinomial
                                  Naive Bayes for Text Classification  . . 114--125
               Junta Mizuno and   
               Eric Nichols and   
            Yotaro Watanabe and   
                   Kentaro Inui   Organizing Information on the Web
                                  through Agreement-Conflict Relation
                                  Classification . . . . . . . . . . . . . 126--137
             Mitsuo Yoshida and   
                     Yuki Arase   Exploiting Twitter for Spiking Query
                                  Classification . . . . . . . . . . . . . 138--149
                Kejiang Ren and   
               Shaowu Zhang and   
                    Hongfei Lin   Where Are You Settling Down:
                                  Geo-locating Twitter Users Based on
                                  Tweets and Social Networks . . . . . . . 150--161
             Chang-Woo Chun and   
               Jung-Tae Lee and   
             Seung-Wook Lee and   
                  Hae-Chang Rim   Detecting Informative Messages Based on
                                  User History in Twitter  . . . . . . . . 162--173
             Changhao Jiang and   
                  Min Zhang and   
                    Bin Gao and   
                    Tie-Yan Liu   A Study on Potential Head Advertisers in
                                  Sponsored Search . . . . . . . . . . . . 174--186
              Tianshu Chang and   
                Hongfei Lin and   
                       Yuan Lin   Feature Transformation Method Enhanced
                                  Vandalism Detection in Wikipedia . . . . 187--198
                 Junting Ye and   
                 Yanan Qian and   
                  Qinghua Zheng   PLIDMiner: a Quality Based Approach for
                                  Researcher's Homepage Discovery  . . . . 199--210
                     Kai Lu and   
             Guanyuan Zhang and   
                     Rui Li and   
                Shuai Zhang and   
                       Bin Wang   Exploiting and Exploring Hierarchical
                                  Structure in Music Recommendation  . . . 211--225
            Leszek Kaliciak and   
              Ben Horsburgh and   
                 Dawei Song and   
         Nirmalie Wiratunga and   
                       Jeff Pan   Enhancing Music Information Retrieval by
                                  Incorporating Image-Based Local Features 226--237
                  Liang Shi and   
                       Bin Wang   Yet Another Sorting-Based Solution to
                                  the Reassignment of Document Identifiers 238--249
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7677, 2012

                Debayan Deb and   
                  Kalyanmoy Deb   Investigation of Mutation Schemes in
                                  Real-Parameter Genetic Algorithms  . . . 1--8
                 Kaizhou Z. Gao   Discrete Harmony Search Algorithm for
                                  Dynamic FJSSP in Remanufacturing
                                  Engineering  . . . . . . . . . . . . . . 9--16
               Soham Sarkar and   
                   Swagatam Das   Multilevel Image Thresholding Based on
                                  Tsallis Entropy and Differential
                                  Evolution  . . . . . . . . . . . . . . . 17--24
             Dipankar Maity and   
                    Udit Halder   Convergence and Boundary Estimation of
                                  the Particle Dynamics in Generalized
                                  Particle Swarm Optimization  . . . . . . 25--32
                Sudipta Das and   
                Durbadal Mandal   Application of Differential Evolution
                                  with Best of Random Mutation Strategy on
                                  Asymmetric Location Only Synthesis of
                                  Broadside Circular Antenna Array . . . . 33--40
              Tinu Varghese and   
               R. Sheela Kumari   Performance Evaluation of Bacterial
                                  Foraging Optimization Algorithm for the
                                  Early Diagnosis and Tracking of
                                  Alzheimer's Disease  . . . . . . . . . . 41--48
             J. Senthilnath and   
                  P. B. Shreyas   Multi-sensor Satellite Image Analysis
                                  Using Niche Genetic Algorithm for Flood
                                  Assessment . . . . . . . . . . . . . . . 49--56
   Ananthanaryanan Rathinam and   
                Ripunjoy Phukan   Solution to Economic Load Dispatch
                                  Problem Based on FIREFLY Algorithm and
                                  Its Comparison with BFO, CBFO-S and
                                  CBFO-Hybrid  . . . . . . . . . . . . . . 57--65
                  Layak Ali and   
            Samrat L. Sabat and   
                 Siba K. Udgata   MESFET DC Model Parameter Extraction
                                  Using Adaptive Accelerated Exploration
                                  Particle Swarm Optimizer . . . . . . . . 66--73
       Kalam Narendar Reddy and   
                 Vadlamani Ravi   Kernel Group Method of Data Handling:
                                  Application to Regression Problems . . . 74--81
             Sanjay Agrawal and   
                Rutuparna Panda   An Efficient Algorithm for Gray Level
                                  Image Enhancement Using Cuckoo Search    82--89
              Sumanta Panda and   
           Debadutta Mishra and   
                   B. B. Biswal   A Multi-objective Workspace Optimization
                                  of 3R Manipulator Using Modified PSO . . 90--97
    Éderson R. Silva and   
            Paulo R. Guardieiro   An Analysis of Genetic Algorithm Based
                                  Anycast Routing in Delay and Disruption
                                  Tolerant Networks  . . . . . . . . . . . 98--105
      Bidishna Bhattacharya and   
           Kamal Krishna Mandal   Reactive Power Optimization Using Hybrid
                                  Cultural Algorithm . . . . . . . . . . . 106--115
               Bhimsen Tudu and   
                Preetam Roy and   
                   Sajjan Kumar   Techno-Economic Feasibility Analysis of
                                  Hybrid Renewable Energy System Using
                                  Improved Version of Particle Swarm
                                  Optimization . . . . . . . . . . . . . . 116--123
        Tirimula Rao Benala and   
                     Rajib Mall   Software Effort Prediction Using Fuzzy
                                  Clustering and Functional Link
                                  Artificial Neural Networks . . . . . . . 124--132
             Manas R. Nayak and   
                 Subrat K. Dash   Optimal Placement and Sizing of
                                  Distributed Generation in Radial
                                  Distribution System Using Differential
                                  Evolution Algorithm  . . . . . . . . . . 133--142
          Daniel G. Ferrari and   
        Leandro Nunes de Castro   Clustering Algorithm Recommendation: a
                                  Meta-learning Approach . . . . . . . . . 143--150
            Subhodip Biswas and   
              Digbalay Bose and   
                   Souvik Kundu   A Clustering Particle Based Artificial
                                  Bee Colony Algorithm for Dynamic
                                  Environment  . . . . . . . . . . . . . . 151--159
               Souvik Kundu and   
            Subhodip Biswas and   
                   Swagatam Das   A Selective Teaching-Learning Based
                                  Niching Technique with Local
                                  Diversification Strategy . . . . . . . . 160--168
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7678, 2012

        Srinivasan H. Sengamedu   Scalable Analytics --- Algorithms and
                                  Systems  . . . . . . . . . . . . . . . . 1--7
     Vijay Srinivas Agneeswaran   Big-Data --- Theoretical, Engineering
                                  and Analytics Perspective  . . . . . . . 8--15
                 Tony Basil and   
      Bollepalli S. Chandra and   
         Choudur Lakshminarayan   A Comparison of Statistical Machine
                                  Learning Methods in Heartbeat Detection
                                  and Classification . . . . . . . . . . . 16--25
                Ammar Yasir and   
    Mittapally Kumara Swamy and   
    Polepalli Krishna Reddy and   
                 Subhash Bhalla   Enhanced Query-By-Object Approach for
                                  Information Requirement Elicitation in
                                  Large Databases  . . . . . . . . . . . . 26--41
               Rajeev Gupta and   
             Himanshu Gupta and   
                 Mukesh Mohania   Cloud Computing and Big Data Analytics:
                                  What Is New from Databases Perspective?  42--61
    Polepalli Krishna Reddy and   
         Basi Bhaskar Reddy and   
                    D. Rama Rao   A Model of Virtual Crop Labs as a Cloud
                                  Computing Application for Enhancing
                                  Practical Agricultural Education . . . . 62--76
                Ammar Yasir and   
    Mittapally Kumara Swamy and   
        Polepalli Krishna Reddy   Exploiting Schema and Documentation for
                                  Summarizing Relational Databases . . . . 77--90
              Ullas Nambiar and   
           Tanveer Faruquie and   
             Shamanth Kumar and   
            Fred Morstatter and   
                       Huan Liu   Faceted Browsing over Social Media . . . 91--100
                Anand Gupta and   
          Manpreet Kathuria and   
                Arjun Singh and   
            Ashish Sachdeva and   
                   Shruti Bhati   Analog Textual Entailment and Spectral
                                  Clustering (ATESC) Based Summarization   101--110
                Jatin Kumar and   
                 Tushar Rao and   
               Saket Srivastava   Economics of Gold Price
                                  Movement-Forecasting Analysis Using
                                  Macro-economic, Investor Fear and
                                  Investor Behavior Features . . . . . . . 111--121
              Joung Woo Ryu and   
       Mehmed M. Kantardzic and   
              Myung-Won Kim and   
                     A. Ra Khil   An Efficient Method of Building an
                                  Ensemble of Classifiers in Streaming
                                  Data . . . . . . . . . . . . . . . . . . 122--133
       Sraban Kumar Mohanty and   
                 Gopalan Sajith   I/O Efficient Algorithms for Block
                                  Hessenberg Reduction Using Panel
                                  Approach . . . . . . . . . . . . . . . . 134--147
                Anand Gupta and   
           Prashant Khurana and   
                 Raveena Mathur   Luring Conditions and Their Proof of
                                  Necessity through Mathematical Modelling 148--157
              Myung-Won Kim and   
                 Eun-Ju Kim and   
              Won-Moon Song and   
             Sung-Yeol Song and   
                     A. Ra Khil   Efficient Recommendation for Smart TV
                                  Contents . . . . . . . . . . . . . . . . 158--167
          T. V. Vijay Kumar and   
                  Santosh Kumar   Materialized View Selection Using
                                  Simulated Annealing  . . . . . . . . . . 168--179
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7679, 2012

                 Greg Morrisett   Scalable Formal Machine Models . . . . . 1--3
                   Xavier Leroy   Mechanized Semantics for Compiler
                                  Verification . . . . . . . . . . . . . . 4--6
              Gilles Barthe and   
   Benjamin Grégoire and   
              César Kunz   Automation in Computer-Aided
                                  Cryptography: Proofs, Attacks and
                                  Designs  . . . . . . . . . . . . . . . . 7--8
                Naoki Kobayashi   Program Certification by Higher-Order
                                  Model Checking . . . . . . . . . . . . . 9--10
            Valentin Robert and   
                   Xavier Leroy   A Formally-Verified Alias Analysis . . . 11--26
              Jianzhou Zhao and   
                Steve Zdancewic   Mechanized Verification of Computing
                                  Dominators for Formalizing Compilers . . 27--42
        Dominic P. Mulligan and   
         Claudio Sacerdoti Coen   On the Correctness of an Optimising
                                  Assembler for the Intel MCS-51
                                  Microprocessor . . . . . . . . . . . . . 43--59
                 Brian Campbell   An Executable Semantics for CompCert C   60--75
    Pierre-Nicolas Tollitte and   
             David Delahaye and   
               Catherine Dubois   Producing Certified Functional Code from
                                  Inductive Specifications . . . . . . . . 76--91
                  Lukas Bulwahn   The New Quickcheck for Isabelle  . . . . 92--108
             Andrei Popescu and   
        Johannes Hölzl and   
                  Tobias Nipkow   Proving Concurrent Noninterference . . . 109--125
                Toby Murray and   
            Daniel Matichuk and   
                Matthew Brassil   Noninterference for Operating System
                                  Kernels  . . . . . . . . . . . . . . . . 126--142
         Alexander Vaynberg and   
                     Zhong Shao   Compositional Verification of a Baby
                                  Virtual Memory Manager . . . . . . . . . 143--159
                 Keisuke Nakano   Shall We Juggle, Coinductively?  . . . . 160--172
            Beniamino Accattoli   Proof Pearl: Abella Formalization of
                                  $\lambda$-Calculus Cube Property . . . . 173--187
              Hing-Lun Chan and   
                Michael Norrish   A String of Pearls: Proofs of Fermat's
                                  Little Theorem . . . . . . . . . . . . . 188--207
              Kaustuv Chaudhuri   Compact Proof Certificates for Linear
                                  Logic  . . . . . . . . . . . . . . . . . 208--223
          Christian Doczkal and   
                    Gert Smolka   Constructive Completeness for Modal
                                  Logic with Transitive Closure  . . . . . 224--239
             Andrea Asperti and   
               Wilmer Ricciotti   Rating Disambiguation Errors . . . . . . 240--255
                   Pierre Neron   A Formal Proof of Square Root and
                                  Division Elimination in Embedded
                                  Programs . . . . . . . . . . . . . . . . 256--272
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7682, 2012

           Edmund M. Clarke and   
                William Klieber   Model Checking and the State Explosion
                                  Problem  . . . . . . . . . . . . . . . . 1--30
          Patrice Godefroid and   
             Shuvendu K. Lahiri   From Program to Logic: An Introduction   31--44
       Christine Paulin-Mohring   Introduction to the Coq Proof-Assistant
                                  for Practical Software Verification  . . 45--95
César A. Muñoz and   
               Ramiro A. Demasi   Advanced Theorem Proving Techniques in
                                  PVS and Applications . . . . . . . . . . 96--132
           Julian Tschannen and   
            Carlo Alberto Furia   Automatic Verification of Advanced
                                  Object-Oriented Features: The AutoProof
                                  Approach . . . . . . . . . . . . . . . . 133--155
               Luke Herbert and   
             K. Rustan M. Leino   Using Dafny, an Automatic Program
                                  Verifier . . . . . . . . . . . . . . . . 156--181
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7683, 2012

         Hristijan Gjoreski and   
            Mitja Lu\vstrek and   
                  Matja\vz Gams   Context-Based Fall Detection Using
                                  Inertial and Location Sensors  . . . . . 1--16
   Tobias Grosse-Puppendahl and   
               Eugen Berlin and   
                  Marko Borazio   Enhancing Accelerometer-Based Activity
                                  Recognition with Capacitive Proximity
                                  Sensing  . . . . . . . . . . . . . . . . 17--32
              Sara Bongartz and   
                Yucheng Jin and   
            Fabio Patern\`o and   
                 Joerg Rett and   
                 Carmen Santoro   Adaptive User Interfaces for Smart
                                  Environments with the Support of
                                  Model-Based Languages  . . . . . . . . . 33--48
          Sebastian Osswald and   
 Alexander Meschtscherjakov and   
              Nicole Mirnig and   
            Karl-Armin Kraessig   Back of the Steering Wheel Interaction:
                                  The Car Braille Keyer  . . . . . . . . . 49--64
                Eric Struse and   
             Julian Seifert and   
   Sebastian Üllenbeck and   
              Enrico Rukzio and   
               Christopher Wolf   PermissionWatcher: Creating User
                                  Awareness of Application Permissions in
                                  Mobile Systems . . . . . . . . . . . . . 65--80
Kaisa Väänänen-Vainio-Mattila and   
              Tomi Haustola and   
    Jonna Häkkilä and   
                  Minna Karukka   Exploring Non-verbal Communication of
                                  Presence between Young Children and
                                  Their Parents through the Embodied Teddy
                                  Bear . . . . . . . . . . . . . . . . . . 81--96
         Joris Ijsselmuiden and   
  Ann-Kristin Grosselfinger and   
           David Münch and   
                  Michael Arens   Automatic Behavior Understanding in
                                  Crisis Response Control Rooms  . . . . . 97--112
             Ewald Strasser and   
               Astrid Weiss and   
               Thomas Grill and   
          Sebastian Osswald and   
              Manfred Tscheligi   Combining Implicit and Explicit Methods
                                  for the Evaluation of an Ambient
                                  Persuasive Factory Display . . . . . . . 113--128
   Valérian Guivarch and   
       Valérie Camps and   
    André Péninou   Context Awareness in Ambient Systems by
                                  an Adaptive Multi-Agent Approach . . . . 129--144
               Jethro Shell and   
                 Simon Coupland   Towards Fuzzy Transfer Learning for
                                  Intelligent Environments . . . . . . . . 145--160
         Radu-Daniel Vatavu and   
   C\uat\ualin-Marian Chera and   
                   Wei-Tek Tsai   Gesture Profile for Web Services: An
                                  Event-Driven Architecture to Support
                                  Gestural Interfaces for Smart
                                  Environments . . . . . . . . . . . . . . 161--176
             Pedro Chahuara and   
             Anthony Fleury and   
     François Portet and   
                  Michel Vacher   Using Markov Logic Network for On-Line
                                  Activity Recognition from Non-visual
                                  Home Automation Sensors  . . . . . . . . 177--192
     Bo\vzidara Cvetkovi\'c and   
         Bo\vstjan Kalu\vza and   
            Mitja Lu\vstrek and   
                  Matja\vz Gams   Multi-Classifier Adaptive Training:
                                  Specialising an Activity Recognition
                                  Classifier Using Semi-supervised
                                  Learning . . . . . . . . . . . . . . . . 193--207
          Mohamed A. Sehili and   
         Benjamin Lecouteux and   
              Michel Vacher and   
     François Portet and   
                    Dan Istrate   Sound Environment Analysis in Smart Home 208--223
            Doris Zachhuber and   
               Thomas Grill and   
             Ondrej Polacek and   
              Manfred Tscheligi   Contextual Wizard of Oz  . . . . . . . . 224--239
       Berardina De Carolis and   
            Stefano Ferilli and   
                Nicole Novielli   Recognizing the User Social Attitude in
                                  Multimodal Interaction in Smart
                                  Environments . . . . . . . . . . . . . . 240--255
            Leila S. Shafti and   
              Pablo A. Haya and   
Manuel García-Herranz and   
           Eduardo Pérez   Evolutionary Feature Extraction to Infer
                                  Behavioral Patterns in Ambient
                                  Intelligence . . . . . . . . . . . . . . 256--271
       Ekaterina Kurdyukova and   
             Stephan Hammer and   
         Elisabeth André   Personalization of Content on Public
                                  Displays Driven by the Recognition of
                                  Group Context  . . . . . . . . . . . . . 272--287
               Michael Zaki and   
                  Peter Forbrig   Towards the Generation of Assistive User
                                  Interfaces for Smart Meeting Rooms Based
                                  on Activity Patterns . . . . . . . . . . 288--295
              Saskia Robben and   
               Kyra Bergman and   
              Sven Haitjema and   
           Yannick de Lange and   
                 Ben Kröse   Reducing Dementia Related Wandering
                                  Behaviour with an Interactive Wall . . . 296--303
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7690, 2012

               Yanfeng Wang and   
                 Wenling Wu and   
                  Xiaoli Yu and   
                      Lei Zhang   Security on LBlock against Biclique
                                  Cryptanalysis  . . . . . . . . . . . . . 1--14
                 Keting Jia and   
                       Leibo Li   Improved Impossible Differential Attacks
                                  on Reduced-Round MISTY1  . . . . . . . . 15--27
             Satoshi Tanaka and   
                  Tung Chou and   
                Bo-Yin Yang and   
             Chen-Mou Cheng and   
                Kouichi Sakurai   Efficient Parallel Evaluation of
                                  Multivariate Quadratic Polynomials on
                                  GPUs . . . . . . . . . . . . . . . . . . 28--42
                Wentao Zhao and   
                    Xin Hai and   
                Shaojing Fu and   
                    Chao Li and   
                   Yanfeng Wang   Enumeration of Even-Variable Boolean
                                  Functions with Maximum Algebraic
                                  Immunity . . . . . . . . . . . . . . . . 43--54
               Hwajeong Seo and   
                      Howon Kim   Multi-precision Multiplication for
                                  Public-Key Cryptography on Embedded
                                  Microprocessors  . . . . . . . . . . . . 55--67
                Hyunmin Kim and   
             Vladimir Rozic and   
             Ingrid Verbauwhede   Three Phase Dynamic Current Mode Logic:
                                  a More Secure DyCML to Achieve a More
                                  Balanced Power Consumption . . . . . . . 68--81
               JeaHoon Park and   
                    JaeCheol Ha   Improved Differential Fault Analysis on
                                  Block Cipher ARIA  . . . . . . . . . . . 82--95
     Pairat Thorncharoensri and   
               Willy Susilo and   
                          Yi Mu   Multi-Level Controlled Signature . . . . 96--110
                 Liangze Li and   
                      Fan Zhang   Tate Pairing Computation on Generalized
                                  Hessian Curves . . . . . . . . . . . . . 111--123
           Mario Larangeira and   
                 Keisuke Tanaka   Reduction-Centric Non-programmable
                                  Security Proof for the Full Domain Hash
                                  in the Random Oracle Model . . . . . . . 124--143
              Hyun-Sun Kang and   
                Chang-Seop Park   An Authentication and Key Management
                                  Scheme for the Proxy Mobile IPv6 . . . . 144--160
László Aszalós and   
                  Andrea Huszti   Payment Approval for PayWord . . . . . . 161--176
            Jung Yeon Hwang and   
               Sungwook Eom and   
             Ku-Young Chang and   
              Pil Joong Lee and   
                   DaeHun Nyang   Anonymity-Based Authenticated Key
                                  Agreement with Full Binding Property . . 177--191
                Junghoon Oh and   
                Namheun Son and   
                Sangjin Lee and   
                    Kyungho Lee   A Study for Classification of Web
                                  Browser Log and Timeline Visualization   192--207
    François Durvaux and   
    Beno\^\it Gérard and   
  Stéphanie Kerckhof and   
         François Koeune   Intellectual Property Protection for
                                  Integrated Systems Using Soft Physical
                                  Hash Functions . . . . . . . . . . . . . 208--225
                Shun-Te Liu and   
               Yi-Ming Chen and   
                 Hui-Ching Hung   $N$-Victims: An Approach to Determine
                                  $N$-Victims for APT Investigations . . . 226--240
                 Jaeun Choi and   
                 Gisung Kim and   
             Tae Ghyoon Kim and   
                      Sehun Kim   An Efficient Filtering Method for
                                  Detecting Malicous Web Pages . . . . . . 241--253
                   Eric Lin and   
                John Aycock and   
                Mohammad Mannan   Lightweight Client-Side Methods for
                                  Detecting Email Forgery  . . . . . . . . 254--269
              Yang-seo Choi and   
                Ik-Kyun Kim and   
                 Jin-Tae Oh and   
                  Jong-Soo Jang   AIGG Threshold Based HTTP GET Flooding
                                  Attack Detection . . . . . . . . . . . . 270--284
                Hyunjoo Kim and   
              Byoungkoo Kim and   
                 Daewon Kim and   
                Ik-Kyun Kim and   
               Tai-Myoung Chung   Implementation of GESNIC for Web Server
                                  Protection against HTTP GET Flooding
                                  Attacks  . . . . . . . . . . . . . . . . 285--295
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??