Table of contents for issues of Lecture Notes in Computer Science

Last update: Thu Mar 22 11:51:22 MDT 2018                Valid HTML 3.2!

Volume 7125, 2012
Volume 7127, 2012
Volume 7128, 2012
Volume 7129, 2012
Volume 7130, 2012
Volume 7131, 2012
Volume 7132, 2012
Volume 7133, 2012
Volume 7134, 2012
Volume 7135, 2012
Volume 7136, 2012
Volume 7137, 2012
Volume 7138, 2012
Volume 7139, 2012
Volume 7140, 2012
Volume 7141, 2012
Volume 7142, 2012
Volume 7143, 2012
Volume 7144, 2012
Volume 7145, 2012
Volume 7148, 2012
Volume 7149, 2012
Volume 7150, 2012
Volume 7151, 2012
Volume 7152, 2012
Volume 7153, 2012
Volume 7154, 2012
Volume 7155, 2012
Volume 7156, 2012
Volume 7157, 2012
Volume 7158, 2012
Volume 7159, 2012
Volume 7160, 2012
Volume 7161, 2012
Volume 7162, 2012
Volume 7163, 2012
Volume 7164, 2012
Volume 7165, 2012
Volume 7166, 2012
Volume 7167, 2012
Volume 7168, 2012
Volume 7169, 2012
Volume 7170, 2012
Volume 7172, 2012
Volume 7173, 2012
Volume 7174, 2012
Volume 7175, 2012
Volume 7176, 2012
Volume 7177, 2012
Volume 7179, 2012
Volume 7180, 2012
Volume 7181, 2012
Volume 7182, 2012
Volume 7183, 2012
Volume 7184, 2012
Volume 7185, 2012
Volume 7186, 2012
Volume 7187, 2012
Volume 7188, 2012
Volume 7189, 2012
Volume 7190, 2012
Volume 7191, 2012
Volume 7192, 2012
Volume 7193, 2012
Volume 7195, 2012
Volume 7196, 2012
Volume 7197, 2012
Volume 7198, 2012
Volume 7199, 2012


Lecture Notes in Computer Science
Volume 7125, 2012

              Gheorghe Adam and   
                     Sanda Adam   Bayesian Automatic Adaptive Quadrature:
                                  An Overview  . . . . . . . . . . . . . . 1--16
                  Volker Friese   Computational Challenges for the CBM
                                  Experiment . . . . . . . . . . . . . . . 17--27
              Vladimir P. Gerdt   Consistency Analysis of Finite
                                  Difference Approximations to PDE Systems 28--42
          Vladimir P. Gerdt and   
        Alexander N. Prokopenya   The Circuit Model of Quantum Computation
                                  and Its Simulation with Mathematica  . . 43--55
          Ulrich H. E. Hansmann   Proteins Studied by Computer Simulations 56--65
                  Juha Honkonen   Functional Methods in Stochastic Systems 66--78
            Vladimir V. Kornyak   Mathematical Modeling of Finite Quantum
                                  Systems  . . . . . . . . . . . . . . . . 79--93
           Vladimir S. Melezhik   Multi-channel Computations in
                                  Low-Dimensional Few-Body Physics . . . . 94--107
         Serguey V. Zemskov and   
            Henk M. Jonkers and   
               Fred J. Vermolen   Mathematical Models to Predict the
                                  Critical Conditions for Bacterial
                                  Self-healing of Concrete . . . . . . . . 108--121
        Ciprian Sorin Acatrinei   A New Discretization Scheme in Field
                                  Theory . . . . . . . . . . . . . . . . . 122--127
         Nikolay V. Antonov and   
           Nikolay M. Gulitskiy   Two-Loop Calculation of the Anomalous
                                  Exponents in the Kazantsev--Kraichnan
                                  Model of Magnetic Hydrodynamics  . . . . 128--135
             Edik A. Ayryan and   
        Alexander A. Egorov and   
      Leonid A. Sevastyanov and   
        Konstantin P. Lovetskiy   Mathematical Modeling of Irregular
                                  Integrated Optical Waveguides  . . . . . 136--147
                    Ivan Da\vno   Two Notes on Continuous-Time
                                  Neurodynamical Systems . . . . . . . . . 148--153
            Michal Hnati\vc and   
              Juha Honkonen and   
Tomá\vs Lu\vcivjanský   On the Mathematical Modelling of the
                                  Annihilation Process . . . . . . . . . . 154--159
    Marián Kle\vs\vc and   
        \vStefan Schrötter   The Crossing Numbers of Join of Paths
                                  and Cycles with Two Graphs of Order Five 160--167
       Eva Litavcová and   
             Miron Pavlu\vs and   
           Ján Seman and   
               Ibrohim Sarhadov   Exact Solution of a Moisture Drying
                                  System with Phase Transition . . . . . . 168--173
         Leonid Sevastyanov and   
            Alexander Zorin and   
            Alexander Gorbachev   Pseudo-Differential Operators in an
                                  Operational Model of the Quantum
                                  Measurement of Observables . . . . . . . 174--181
                Alina Suzko and   
                Elena Velicheva   Exactly Solvable Models for the
                                  Generalized Schrödinger Equation  . . . . 182--188
                 Sanda Adam and   
                  Gheorghe Adam   Floating Point Degree of Precision in
                                  Numerical Quadrature . . . . . . . . . . 189--194
      Ilkizar V. Amirkhanov and   
         Taisia P. Puzynina and   
            Igor V. Puzynin and   
               Ibrohim Sarhadov   Numerical Simulations of Heat and
                                  Moisture Transfer Subject to the Phase
                                  Transition . . . . . . . . . . . . . . . 195--200
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7127, 2012

     Mikko Särelä and   
Christian Esteve Rothenberg and   
    András Zahemszky and   
             Pekka Nikander and   
                  Jörg Ott   BloomCasting: Security in Bloom Filter
                                  Based Multicast  . . . . . . . . . . . . 1--16
             Sanna Suoranta and   
             Jani Heikkinen and   
               Pekka Silvekoski   Authentication Session Migration . . . . 17--32
                 Miika Komu and   
               Sasu Tarkoma and   
              Andrey Lukyanenko   Mitigation of Unsolicited Traffic across
                                  Domains with Host Identities and Puzzles 33--48
     Ravishankar Borgaonkar and   
                Kevin Redon and   
            Jean-Pierre Seifert   Experimental Analysis of the Femtocell
                                  Location Verification Techniques . . . . 49--54
                  Erka Koivunen   ``Why Wasn't I Notified?'': Information
                                  Security Incident Reporting Demystified  55--70
              Pern Hui Chia and   
          Andreas P. Heiner and   
                      N. Asokan   Use of Ratings from Personalized
                                  Communities for Trustworthy Application
                                  Installation . . . . . . . . . . . . . . 71--88
              Gunnar Kreitz and   
                   Mads Dam and   
          Douglas Wikström   Practical Private Information
                                  Aggregation in Large Networks  . . . . . 89--103
             Magnus Almgren and   
                  Wolfgang John   Tracking Malicious Hosts on a 10Gbps
                                  Backbone Link  . . . . . . . . . . . . . 104--120
          Elahe Kani-Zabihi and   
              Lizzie Coles-Kemp   Service Users' Requirements for Tools to
                                  Support Effective On-line Privacy and
                                  Consent Practices  . . . . . . . . . . . 121--135
           Dominik Herrmann and   
           Christoph Gerber and   
            Christian Banse and   
               Hannes Federrath   Analyzing Characteristic Host Access
                                  Patterns for Re-identification of Web
                                  User Sessions  . . . . . . . . . . . . . 136--154
             Jason Crampton and   
                   Michael Huth   A Framework for the Modular
                                  Specification and Orchestration of
                                  Authorization Policies . . . . . . . . . 155--170
            Kari Kostiainen and   
                  N. Asokan and   
                Jan-Erik Ekberg   Credential Disabling from Trusted
                                  Execution Environments . . . . . . . . . 171--186
           Olga Gadyatskaya and   
             Fabio Massacci and   
              Federica Paci and   
              Sergey Stankevich   Java Card Architecture for Autonomous
                                  Yet Secure Evolution of Smart Cards
                                  Applications . . . . . . . . . . . . . . 187--192
        Filippo Del Tedesco and   
            Alejandro Russo and   
                    David Sands   Implementing Erasure Policies Using
                                  Taint Analysis . . . . . . . . . . . . . 193--209
     Juan José Conti and   
                Alejandro Russo   A Taint Mode for Python via a Library    210--222
           Philippe De Ryck and   
              Maarten Decat and   
              Lieven Desmet and   
             Frank Piessens and   
                  Wouter Joosen   Security of Web Mashups: a Survey  . . . 223--238
           Jonas Magazinius and   
               Phu H. Phung and   
                    David Sands   Safe Wrappers and Sane Policies for Self
                                  Protecting JavaScript  . . . . . . . . . 239--255
              Jose Quaresma and   
            Christian W. Probst   Protocol Implementation Generator  . . . 256--268
              Billy Bob Brumley   Secure and Fast Implementations of Two
                                  Involution Ciphers . . . . . . . . . . . 269--282
      Markku-Juhani O. Saarinen   The PASSERINE Public Key Encryption and
                                  Authentication Mechanism . . . . . . . . 283--288
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7128, 2012

               Jessica Fridrich   Modern Trends in Steganography and
                                  Steganalysis . . . . . . . . . . . . . . 1--1
                    Nasir Memon   Photo Forensics --- There Is More to a
                                  Picture than Meets the Eye . . . . . . . 2--2
             Vasily Sachnev and   
               Hyoung Joong Kim   An Improved Matrix Encoding Scheme for
                                  JPEG Steganography . . . . . . . . . . . 3--15
                   Shunquan Tan   Steganalysis of LSB Matching Revisited
                                  for Consecutive Pixels Using B-Spline
                                  Functions  . . . . . . . . . . . . . . . 16--29
              Xinghao Jiang and   
                Tanfeng Sun and   
                   Yue Zhou and   
                     Yun Q. Shi   A Drift Compensation Algorithm for
                                  H.264/AVC Video Robust Watermarking
                                  Scheme . . . . . . . . . . . . . . . . . 30--41
              Junxiang Wang and   
                Jiangqun Ni and   
                     Jinwei Pan   A High Performance Multi-layer
                                  Reversible Data Hiding Scheme Using
                                  Two-Step Embedding . . . . . . . . . . . 42--56
               Kazuo Ohzeki and   
                 YuanYu Wei and   
            Yutaka Hirakawa and   
                 Kiyotsugu Sato   A New Watermarking Method with
                                  Obfuscated Quasi-Chirp Transform . . . . 57--71
                   Hui Wang and   
           Anthony T. S. Ho and   
                        Xi Zhao   A Novel Fast Self-restoration
                                  Semi-fragile Watermarking Algorithm for
                                  Image Content Authentication Resistant
                                  to JPEG Compression  . . . . . . . . . . 72--85
                Baiying Lei and   
              Ing Yann Soon and   
                        Zhen Li   A Robust Audio Watermarking Scheme Based
                                  on Lifting Wavelet Transform and
                                  Singular Value Decomposition . . . . . . 86--96
                  Alper Koz and   
                  Claude Delpha   Adaptive Selection of Embedding
                                  Locations for Spread Spectrum
                                  Watermarking of Compressed Audio . . . . 97--110
            Takayuki Yamada and   
             Seiichi Gohshi and   
                   Isao Echizen   IR Hiding: Method to Prevent
                                  Re-recording Screen Image Built in Short
                                  Wavelength Pass Filter Detection Method
                                  Using Specular Reflection  . . . . . . . 111--125
               Jong Yun Jun and   
                  Kunho Kim and   
                Jae-Pil Heo and   
                  Sung-eui Yoon   IRIW: Image Retrieval Based Image
                                  Watermarking for Large-Scale Image
                                  Databases  . . . . . . . . . . . . . . . 126--141
                   Fan Chen and   
                 Hongjie He and   
                 Yaoran Huo and   
                   Hongxia Wang   Self-recovery Fragile Watermarking
                                  Scheme with Variable Watermark Payload   142--155
                Huawei Tian and   
                 Zheng Wang and   
                   Yao Zhao and   
                Rongrong Ni and   
                    Lunming Qin   Spread Spectrum-Based Multi-bit
                                  Watermarking for Free-View Video . . . . 156--166
                Hongmei Liu and   
                     Lei Li and   
                    Jian Li and   
                     Jiwu Huang   Three Novel Algorithms for Hiding Data
                                  in PDF Files Based on Incremental
                                  Updates  . . . . . . . . . . . . . . . . 167--180
             Takaaki Yamada and   
            Yoshiyasu Takahashi   Use of ``Emergable Watermarks'' as Copy
                                  Indicators for Securing Video Content    181--195
              Jonathan Weir and   
                      WeiQi Yan   Authenticating Visual Cryptography
                                  Shares Using $2$D Barcodes . . . . . . . 196--210
                   Feng Liu and   
                   Teng Guo and   
                ChuanKun Wu and   
                Ching-Nung Yang   Flexible Visual Cryptography Scheme
                                  without Distortion . . . . . . . . . . . 211--227
              Yasushi Yamaguchi   An Extended Visual Cryptography Scheme
                                  for Continuous-Tone Images . . . . . . . 228--242
                Xudong Zhao and   
                Shilin Wang and   
               Shenghong Li and   
                     Jianhua Li   A Comprehensive Study on Third Order
                                  Statistical Features for Image Splicing
                                  Detection  . . . . . . . . . . . . . . . 243--256
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7129, 2012

              Marin Bertier and   
              Marko Obrovac and   
         Cédric Tedeschi   A Protocol for the Atomic Capture of
                                  Multiple Molecules on Large Scale
                                  Platforms  . . . . . . . . . . . . . . . 1--15
           Annette Bieniusa and   
                Thomas Fuhrmann   Lifting the Barriers --- Reducing
                                  Latencies with Transparent Transactional
                                  Memory . . . . . . . . . . . . . . . . . 16--30
               Jingshu Chen and   
               Sandeep Kulkarni   Application of Automated Revision for
                                  UML Models: a Case Study . . . . . . . . 31--45
             Alain Cournier and   
                Swan Dubois and   
                  Anissa Lamani   Snap-Stabilizing Message Forwarding
                                  Algorithm on Tree Topologies . . . . . . 46--60
                Tyler Crain and   
                Damien Imbs and   
                  Michel Raynal   Towards a Universal Construction for
                                  Transaction-Based Multiprocess Programs  61--75
     Carole Delporte-Gallet and   
              Hugues Fauconnier   Byzantine Agreement with Homonyms in
                                  Synchronous Systems  . . . . . . . . . . 76--90
              Ali Ebnenasir and   
               Reza Hajisheykhi   Facilitating the Design of Fault
                                  Tolerance in Transaction Level SystemC
                                  Programs . . . . . . . . . . . . . . . . 91--105
                   Guy Even and   
                Moti Medina and   
              Gregor Schaffrath   Competitive and Deterministic Embeddings
                                  of Virtual Networks  . . . . . . . . . . 106--121
           Sotirios Kentros and   
                Aggelos Kiayias   Solving the At-Most-Once Problem with
                                  Nearly Optimal Effectiveness . . . . . . 122--137
              Abhinav Mehta and   
           Shashank Agrawal and   
               Kannan Srinathan   Interplay between (Im)perfectness,
                                  Synchrony and Connectivity: The Case of
                                  Reliable Message Transmission  . . . . . 138--152
                Nuno Santos and   
           André Schiper   Tuning Paxos for High-Throughput with
                                  Batching and Pipelining  . . . . . . . . 153--167
                Amine Abidi and   
       Sonia Mettali Gammar and   
                  Farouk Kamoun   Hybrid Approach for Experimental
                                  Networking Research  . . . . . . . . . . 168--178
       Mahima Agumbe Suresh and   
               Radu Stoleru and   
                     Ron Denton   Towards Optimal Event Detection and
                                  Localization in Acyclic Flow Networks    179--196
            Roberto Baldoni and   
              Silvia Bonomi and   
               Adriano Cerocchi   Virtual Tree: a Robust Overlay Network
                                  for Ensuring Interval Valid Queries in
                                  Dynamic Distributed Systems  . . . . . . 197--200
              Yin-Chung Hsu and   
              Yen-Ting Chen and   
                 Chiu-Kuo Liang   Distributed Coverage-Enhancing
                                  Algorithms in Directional Sensor
                                  Networks with Rotatable Sensors  . . . . 201--213
                Dinesh Dash and   
              Arijit Bishnu and   
                 Arobinda Gupta   Finding the Quality of Line Coverage of
                                  a Sensor Network . . . . . . . . . . . . 214--217
     Emiliano De Cristofaro and   
              Roberto Di Pietro   Preserving Query Privacy in Urban
                                  Sensing Systems  . . . . . . . . . . . . 218--233
           Sarang Deshpande and   
          Krishna M. Sivalingam   Adaptive Velocity Based Guided
                                  Navigation in Wireless Sensor Networks   234--248
                Mauro Conti and   
          Roberto Di Pietro and   
               Angelo Spognardi   Wireless Sensor Replica Detection in
                                  Mobile Environments  . . . . . . . . . . 249--264
         Christian Esposito and   
              Stefano Russo and   
                Roberto Beraldi   Achieving Reliable and Timely Event
                                  Dissemination over WAN . . . . . . . . . 265--280
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7130, 2012

               Javier Lopez and   
             Roberto Setola and   
           Stephen D. Wolthusen   Overview of Critical Information
                                  Infrastructure Protection  . . . . . . . 1--14
        Myriam Dunn Cavelty and   
                   Manuel Suter   The Art of CIIP Strategy: Taking Stock
                                  of Content and Processes . . . . . . . . 15--38
            Andrea Glorioso and   
                 Andrea Servida   Infrastructure Sectors and the
                                  Information Infrastructure . . . . . . . 39--51
                    Eric Luiijf   Understanding Cyber Threats and
                                  Vulnerabilities  . . . . . . . . . . . . 52--67
      Nils Kalstad Svendsen and   
           Stephen D. Wolthusen   Modelling Approaches . . . . . . . . . . 68--97
        Massimiliano Raciti and   
             Jordi Cucurull and   
            Simin Nadjm-Tehrani   Anomaly Detection in Water Management
                                  Systems  . . . . . . . . . . . . . . . . 98--119
           Cristina Alcaraz and   
          Gerardo Fernandez and   
              Fernando Carvajal   Security Aspects of SCADA and DCS
                                  Environments . . . . . . . . . . . . . . 120--149
               Julian L. Rrushi   SCADA Protocol Vulnerabilities . . . . . 150--176
          Abdelmajid Khelil and   
            Daniel Germanus and   
                    Neeraj Suri   Protection of SCADA Communication
                                  Channels . . . . . . . . . . . . . . . . 177--196
             Ettore Bompard and   
               Paolo Cuccia and   
             Marcelo Masera and   
                Igor Nai Fovino   Cyber Vulnerability in Power Systems
                                  Operation and Control  . . . . . . . . . 197--234
            Stig O. Johnsen and   
                Andreas Aas and   
                      Ying Qian   Sector-Specific Information
                                  Infrastructure Issues in the Oil, Gas,
                                  and Petrochemical Sector . . . . . . . . 235--279
             Stuart Goldman and   
            Huseyin Uzunalioglu   Telecommunications . . . . . . . . . . . 280--300
         Bernhard Hämmerli   Financial Services Industry  . . . . . . 301--329
               Mark Hartong and   
                  Rajn Goel and   
             Duminda Wijesekera   Transportation . . . . . . . . . . . . . 330--355
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7131, 2012

                  Alan Hanjalic   A New Gap to Bridge: Where to Go Next in
                                  Social Media Retrieval?  . . . . . . . . 1--1
                  John R. Smith   Mining Multimedia Data for Meaning . . . 2--2
             Ralf Steinmetz and   
              Stefan Göbel   Challenges in Serious Gaming as Emerging
                                  Multimedia Technology for Education,
                                  Training, Sports and Health  . . . . . . 3--3
             Hichem Bannour and   
          Céline Hudelot   Building Semantic Hierarchies Faithful
                                  to Image Semantics . . . . . . . . . . . 4--15
             Daniel Kuettel and   
        Matthieu Guillaumin and   
               Vittorio Ferrari   Combining Image-Level and Segment-Level
                                  Models for Automatic Annotation  . . . . 16--28
             Svebor Karaman and   
        Jenny Benois-Pineau and   
  Rémi Mégret and   
          Aurélie Bugeau   Multi-layer Local Graph Words for Object
                                  Recognition  . . . . . . . . . . . . . . 29--39
        Markus Mühling and   
               Ralph Ewerth and   
                   Jun Zhou and   
               Bernd Freisleben   Multimodal Video Concept Detection via
                                  Bag of Auditory Words and Multiple
                                  Kernel Learning  . . . . . . . . . . . . 40--50
             Bogdan Ionescu and   
          Klaus Seyerlehner and   
           Christoph Rasche and   
          Constantin Vertan and   
                Patrick Lambert   Content-Based Video Description for
                                  Automatic Video Genre Categorization . . 51--62
               Pere Obrador and   
            Michele A. Saad and   
        Poonam Suryanarayan and   
                   Nuria Oliver   Towards Category-Based Aesthetic Models
                                  of Photographs . . . . . . . . . . . . . 63--76
           Ehsan Younessian and   
                    Deepu Rajan   Scene Signatures for Unconstrained News
                                  Video Stories  . . . . . . . . . . . . . 77--88
                Zhiguo Yang and   
                 Yuxin Peng and   
                   Jianguo Xiao   Visual Vocabulary Optimization with
                                  Spatial Context for Image Annotation and
                                  Classification . . . . . . . . . . . . . 89--102
               Xiaowei Ding and   
                      Yi Xu and   
                   Lei Deng and   
                  Xiaokang Yang   Colorization Using Quaternion Algebra
                                  with Automatic Scribble Generation . . . 103--114
          Rados\law Mantiuk and   
            Micha\l Kowalik and   
           Adam Nowosielski and   
                Bartosz Bazyluk   Do-It-Yourself Eye Tracker: Low-Cost
                                  Pupil-Based Eye Tracker for Computer
                                  Graphics Applications  . . . . . . . . . 115--125
              Longfei Zhang and   
                    Yue Gao and   
        Alexander Hauptmann and   
                Rongrong Ji and   
                Gangyi Ding and   
                     Boaz Super   Symbiotic Black-Box Tracker  . . . . . . 126--137
                Tina Walber and   
              Ansgar Scherp and   
                  Steffen Staab   Identifying Objects in Images from
                                  Analyzing the Users' Gaze Movements for
                                  Provided Tags  . . . . . . . . . . . . . 138--148
              Xiaojian Zhao and   
                   Jin Yuan and   
               Richang Hong and   
                  Meng Wang and   
                 Zhoujun Li and   
                  Tat-Seng Chua   On Video Recommendation over Social
                                  Network  . . . . . . . . . . . . . . . . 149--160
              Taiga Yoshida and   
                    Go Irie and   
              Takashi Satou and   
               Akira Kojima and   
               Suguru Higashino   Improving Item Recommendation Based on
                                  Social Tag Ranking . . . . . . . . . . . 161--172
             Zhen-zhong Lan and   
                    Lei Bao and   
                 Shoou-I Yu and   
                    Wei Liu and   
         Alexander G. Hauptmann   Double Fusion for Multimedia Event
                                  Detection  . . . . . . . . . . . . . . . 173--185
           Ehsan Younessian and   
                    Deepu Rajan   Multi-modal Solution for Unconstrained
                                  News Story Retrieval . . . . . . . . . . 186--195
            Ardhendu Behera and   
            Anthony G. Cohn and   
                  David C. Hogg   Workflow Activity Monitoring Using
                                  Dynamics of Pair-Wise Qualitative
                                  Spatial Relations  . . . . . . . . . . . 196--209
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7132, 2012

                 Hengfei Li and   
                   Nir Oren and   
              Timothy J. Norman   Probabilistic Argumentation Frameworks   1--16
              Ringo Baumann and   
             Gerhard Brewka and   
                    Renata Wong   Splitting Argumentation Frameworks: An
                                  Empirical Evaluation . . . . . . . . . . 17--31
       Wolfgang Dvo\vrák   On the Complexity of Computing the
                                  Justification Status of an Argument  . . 32--49
    Rolando Medellin-Gasque and   
             Katie Atkinson and   
             Peter McBurney and   
             Trevor Bench-Capon   Arguments over Co-operative Plans  . . . 50--66
                 Luke Riley and   
             Katie Atkinson and   
                Terry Payne and   
                Elizabeth Black   An Implemented Dialogue System for
                                  Inquiry and Persuasion . . . . . . . . . 67--84
             Wietske Visser and   
           Koen V. Hindriks and   
            Catholijn M. Jonker   An Argumentation Framework for
                                  Qualitative Multi-criteria Preferences   85--98
         Stefano Bistarelli and   
              Francesco Santini   Modeling and Solving AFs with a
                                  Constraint-Based Tool: ConArg  . . . . . 99--116
 Nicolás D. Rotstein and   
                   Nir Oren and   
              Timothy J. Norman   Resource Boundedness and Argumentation   117--131
            Elizabeth Black and   
                  Katie Bentley   An Empirical Study of a Deliberation
                                  Dialogue System  . . . . . . . . . . . . 132--146
   Patrick Krümpelmann and   
             Matthias Thimm and   
         Marcelo A. Falappa and   
     Alejandro J. García   Selective Revision by Deductive
                                  Argumentation  . . . . . . . . . . . . . 147--162
                 Paulo Maio and   
                     Nuno Silva   A Three-Layer Argumentation Framework    163--180
           Maria Laura Cobo and   
          Diego C. Martinez and   
            Guillermo R. Simari   Stable Extensions in Timed Argumentation
                                  Frameworks . . . . . . . . . . . . . . . 181--196
              Pietro Baroni and   
           Federico Cerutti and   
              Paul E. Dunne and   
          Massimiliano Giacomin   Computing with Infinite Argumentation
                                  Frameworks: The Case of AFRAs  . . . . . 197--214
            Tjitze Rienstra and   
               Alan Perotti and   
             Serena Villata and   
              Dov M. Gabbay and   
         Leendert van der Torre   Multi-sorted Argumentation . . . . . . . 215--231
               Guido Boella and   
              Dov M. Gabbay and   
               Alan Perotti and   
     Leendert van der Torre and   
                 Serena Villata   Conditional Labelling for Abstract
                                  Argumentation  . . . . . . . . . . . . . 232--248
             Francesca Toni and   
                  Paolo Torroni   Bottom-Up Argumentation  . . . . . . . . 249--262
                  Xiuyi Fan and   
                 Francesca Toni   A First Step towards Argumentation
                                  Dialogues for Discovery  . . . . . . . . 263--279
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7133, 2012

     Bo Kågström and   
            Daniel Kressner and   
                    Meiyue Shao   On Aggressive Early Deflation in
                                  Parallel Variants of the QR Algorithm    1--10
                Klaus Mosegaard   Limits to Nonlinear Inversion  . . . . . 11--21
              Fred G. Gustavson   Cache Blocking . . . . . . . . . . . . . 22--32
Jose Luis Vázquez-Poletti and   
           Gonzalo Barderas and   
        Ignacio M. Llorente and   
                   Pilar Romero   A Model for Efficient Onboard
                                  Actualization of an Instrumental
                                  Cyclogram for the Mars MetNet Mission on
                                  a Public Cloud Infrastructure  . . . . . 33--42
   Sylvain Contassot-Vivier and   
                Thomas Jost and   
         Stéphane Vialle   Impact of Asynchronism on GPU
                                  Accelerated Parallel Iterative
                                  Computations . . . . . . . . . . . . . . 43--53
              Victor Kostin and   
              Vadim Lisitsa and   
           Galina Reshetova and   
             Vladimir Tcheverda   Simulation of Seismic Waves Propagation
                                  in Multiscale Media: Impact of
                                  Cavernous/Fractured Reservoirs . . . . . 54--64
           Andreas Adelmann and   
               Peter Arbenz and   
                  Yves Ineichen   Improvements of a Fast Parallel Poisson
                                  Solver on Irregular Domains  . . . . . . 65--74
             Eryk Laskowski and   
               Marek Tudruj and   
            Ivanoe De Falco and   
            Umberto Scafuri and   
              Ernesto Tarantino   Distributed Java Programs Initial
                                  Mapping Based on Extremal Optimization   75--85
Ewa Niewiadomska-Szynkiewicz and   
                   Michal Marks   Software Environment for Parallel
                                  Optimization of Complex Systems  . . . . 86--96
               Snorri Agnarsson   Parallel Programming in Morpho . . . . . 97--107
           Kenneth Skovhede and   
           Morten N. Larsen and   
                   Brian Vinter   Extending Distributed Shared Memory for
                                  the Cell Broadband Engine to a Channel
                                  Model  . . . . . . . . . . . . . . . . . 108--118
           Janusz Borkowski and   
               Marek Tudruj and   
                  Adam Smyk and   
                Damian Kopanski   Global Asynchronous Parallel Program
                                  Control for Multicore Processors . . . . 119--130
            Matthias Lieber and   
        Verena Grützun and   
                 Ralf Wolke and   
    Matthias S. Müller and   
              Wolfgang E. Nagel   Highly Scalable Dynamic Load Balancing
                                  in the Atmospheric Modeling System
                                  COSMO-SPECS+FD4  . . . . . . . . . . . . 131--141
        Bård Fjukstad and   
      Tor-Magne Stien Hagen and   
       Daniel Stòdle and   
                 Phuong Hoai Ha   Interactive Weather Simulation and
                                  Visualization on a Display Wall with
                                  Many-Core Compute Nodes  . . . . . . . . 142--151
          Matthias Petschow and   
               Paolo Bientinesi   The Algorithm of Multiple Relatively
                                  Robust Representations for Multi-core
                                  Processors . . . . . . . . . . . . . . . 152--161
      José I. Aliaga and   
    Matthias Bollhöfer and   
   Alberto F. Martín and   
Enrique S. Quintana-Ortí   Parallelization of Multilevel ILU
                                  Preconditioners on Distributed-Memory
                                  Multiprocessors  . . . . . . . . . . . . 162--172
José María Cecilia and   
José Manuel García and   
          Manuel Ujaldón   CUDA $2$D Stencil Computations for the
                                  Jacobi Method  . . . . . . . . . . . . . 173--183
                  Adam Smyk and   
                   Marek Tudruj   Streaming Model Computation of the FDTD
                                  Problem  . . . . . . . . . . . . . . . . 184--192
               Anna Matsekh and   
           Alexei Skurikhin and   
            Lakshman Prasad and   
                  Edward Rosten   Numerical Aspects of Spectral
                                  Segmentation on Polygonal Grids  . . . . 193--203
           Jacek Strzelczyk and   
            Stanislawa Porzycka   Parallel Kriging Algorithm for Unevenly
                                  Spaced Data  . . . . . . . . . . . . . . 204--212
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7134, 2012

                Luke Czapla and   
           Alexey Siretskiy and   
                 John Grime and   
                  Malek O. Khan   Free Energy Monte Carlo Simulations on a
                                  Distributed Network  . . . . . . . . . . 1--12
             Nuria Plattner and   
            Sharif Kunikeev and   
           David L. Freeman and   
                 Jimmie D. Doll   Numerical Investigation of the Cumulant
                                  Expansion for Fourier Path Integrals . . 13--22
         Peter Klüpfel and   
         Simon Klüpfel and   
           Kiril Tsemekhman and   
          Hannes Jónsson   Optimization of Functionals of
                                  Orthonormal Functions in the Absence of
                                  Unitary Invariance . . . . . . . . . . . 23--33
           Andreas Pedersen and   
        Jean-Claude Berthet and   
          Hannes Jónsson   Simulated Annealing with Coarse Graining
                                  and Distributed Computing  . . . . . . . 34--44
Dóróthea M. Einarsdóttir and   
           Andri Arnaldsson and   
  Finnbogi Óskarsson and   
          Hannes Jónsson   Path Optimization with Application to
                                  Tunneling  . . . . . . . . . . . . . . . 45--55
Martin Lilleeng Sætra and   
 André Rigland Brodtkorb   Shallow Water Simulations on Multiple
                                  GPUs . . . . . . . . . . . . . . . . . . 56--66
         Patrick M. Widener and   
                Tahsin Kurc and   
                Wenjin Chen and   
               Fusheng Wang and   
                   Lin Yang and   
                         Jun Hu   High Performance Computing Techniques
                                  for Scaling Image Analysis Workflows . . 67--77
          Christian Stussak and   
                 Peter Schenzel   Parallel Computation of Bivariate
                                  Polynomial Resultants on Graphics
                                  Processing Units . . . . . . . . . . . . 78--87
               Peter Benner and   
              Pablo Ezzatti and   
            Daniel Kressner and   
Enrique S. Quintana-Ortí and   
           Alfredo Remón   Accelerating Model Reduction of Large
                                  Linear Systems with Graphics Processors  88--97
     Òystein E. Krog and   
                 Anne C. Elster   Fast GPU-Based Fluid Simulations Using
                                  SPH  . . . . . . . . . . . . . . . . . . 98--109
            Andrew Davidson and   
                     John Owens   Toward Techniques for Auto-tuning GPU
                                  Algorithms . . . . . . . . . . . . . . . 110--119
              Andrzej Marciniak   An Interval Version of the
                                  Crank--Nicolson Method --- The First
                                  Approach . . . . . . . . . . . . . . . . 120--126
             Marco Nehmeier and   
              Stefan Siegel and   
Jürgen Wolff von Gudenberg   Parallel Detection of Interval
                                  Overlapping  . . . . . . . . . . . . . . 127--136
   Bart\lomiej Jacek Kubica and   
                 Adam Wo\'zniak   Using the Second-Order Information in
                                  Pareto-set Computations of a
                                  Multi-criteria Problem . . . . . . . . . 137--147
             Gerd Bohlender and   
                 Ulrich Kulisch   Comments on Fast and Exact Accumulation
                                  of Products  . . . . . . . . . . . . . . 148--156
       Ma\lgorzata A. Jankowska   An Interval Finite Difference Method of
                                  Crank--Nicolson Type for Solving the
                                  One-Dimensional Heat Conduction Equation
                                  with Mixed Boundary Conditions . . . . . 157--167
         Walter Krämer and   
             Michael Zimmer and   
             Werner Hofschuster   Using C-XSC for High Performance
                                  Verified Computing . . . . . . . . . . . 168--178
               Nguyen Hong Diep   Efficient Implementation of Interval
                                  Matrix Multiplication  . . . . . . . . . 179--188
               Markward Britsch   The Computing Framework for Physics
                                  Analysis at LHCb . . . . . . . . . . . . 189--195
              Helmut Neukirchen   Taming the Raven --- Testing the Random
                                  Access, Visualization and Exploration
                                  Network RAVEN  . . . . . . . . . . . . . 196--205
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7135, 2012

            Abhishek Parakh and   
                    Subhash Kak   A New Small World Lattice  . . . . . . . 1--8
              Siddesh G. M. and   
                Srinivasa K. G.   SLA- Driven Dynamic Resource Allocation
                                  on Clouds  . . . . . . . . . . . . . . . 9--18
 Jagadeesh Balasubramaniyan and   
         Sumalatha Ramachandran   An Intelligent Cloud System Adopting
                                  File Pre-fetching  . . . . . . . . . . . 19--27
            Marcin Bazyd\lo and   
           Szymon Francuzik and   
            Cezary Sobaniec and   
             Dariusz Wawrzyniak   Replication Infrastructure for RESTful
                                  Web Services . . . . . . . . . . . . . . 28--37
               Joon-Mo Yang and   
              Jun-Yong Park and   
                   Ryum-Duck Oh   Context Awareness Acquisition for Safety
                                  Sensor Data Processing on Industrial
                                  Sensor Network . . . . . . . . . . . . . 38--47
                 D. Paulraj and   
                 S. Swamynathan   Content Based Service Discovery in
                                  Semantic Web Services Using WordNet  . . 48--56
      Demian Antony D'Mello and   
              Manasa Shetty and   
            Akshatha Prabhu and   
                    Akshaya and   
                  Adithi Shenoy   Optimal Selection of Web Services for
                                  Efficient QoS Driven Web Service
                                  Compositions . . . . . . . . . . . . . . 57--66
         Deivamani Mallayya and   
          Baskaran Ramachandran   Reconfigurable Web Service Composition
                                  Using Belief Revision  . . . . . . . . . 67--76
         PonHarshavardhanan and   
           J. Akilandeswari and   
           K. A. Anjali Krishna   Semantic Web Service Discovery with
                                  Structural Level Matching of Operations  77--84
              Aditya Narang and   
     Sagar Prakash Joglekar and   
    Karthikeyan Balaji Dhanapal   A Novel Way of Tracking People in an
                                  Indoor Area  . . . . . . . . . . . . . . 85--94
          Tushar Kanti Bera and   
         Samir Kumar Biswas and   
                   K. Rajan and   
                    J. Nagaraju   Image Reconstruction in Electrical
                                  Impedance Tomography (EIT) with
                                  Projection Error Propagation-based
                                  Regularization (PEPR): a Practical
                                  Phantom Study  . . . . . . . . . . . . . 95--105
                   J. Rekha and   
            J. Bhattacharya and   
                    S. Majumder   Improved Hand Tracking and Isolation
                                  from Face by ICondensation Multi Clue
                                  Algorithm for Continuous Indian Sign
                                  Language Recognition . . . . . . . . . . 106--116
              Arpitha M. D. and   
           Megha P. Arakeri and   
             G. Ram Mohan Reddy   An Approach for Color Edge Detection
                                  with Automatic Threshold Detection . . . 117--124
                Anand T. V. and   
              Madhu S. Nair and   
                  Rao Tatavarti   Detection of Straight Lines Using Rule
                                  Directed Pixel Comparison (RDPC) Method  125--134
             Praveen Cyriac and   
                Philomina Simon   Performance Analysis of Pedestrian
                                  Detection at Night Time with Different
                                  Classifiers  . . . . . . . . . . . . . . 135--145
         A. Benjamin Joseph and   
          Baskaran Ramachandran   Enhanced Quality Preserved Image
                                  Compression Technique Using Edge
                                  Assisted Wavelet Based Interpolation . . 146--153
           T. Ashwini Reddy and   
             K. Renuka Devi and   
      Suryakanth V. Gangashetty   Multilayer Feedforward Neural Network
                                  Models for Pattern Recognition Tasks in
                                  Earthquake Engineering . . . . . . . . . 154--162
           Pawan Bhaladhare and   
                 Devesh Jinwala   A Sensitive Attribute Based Clustering
                                  Method for $k$-Anonymization . . . . . . 163--170
        Siddhaling Urolagin and   
                Prema K. V. and   
              N. V. Subba Reddy   Generalization Capability of Artificial
                                  Neural Network Incorporated with Pruning
                                  Method . . . . . . . . . . . . . . . . . 171--178
            Sudha Subramani and   
   Sathiyabhama Balasubramaniam   Post Mining of Diversified Multiple
                                  Decision Trees for Actionable Knowledge
                                  Discovery  . . . . . . . . . . . . . . . 179--187
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7136, 2012

             Jacek Kitowski and   
                Micha\l Tura\la   PL-Grid: Foundations and Perspectives of
                                  National Computing Infrastructure  . . . 1--14
             Marcin Radecki and   
               Tadeusz Szymocha   Integrating Various Grid Middleware
                                  Components and User Services into a
                                  Single Platform  . . . . . . . . . . . . 15--26
             Marcin Radecki and   
              Tomasz Szepieniec   Towards Professional Service Operations
                                  in Grids . . . . . . . . . . . . . . . . 27--39
              Bartosz Bosak and   
               Jacek Komasa and   
                    Piotr Kopta   New Capabilities in QosCosGrid
                                  Middleware for Advanced Job Management,
                                  Advance Reservation and Co-allocation of
                                  Computing Resources --- Quantum
                                  Chemistry Application Use Case . . . . . 40--55
       Krzysztof Benedyczak and   
                Marcin Stolarek   Seamless Access to the PL-Grid
                                  e-Infrastructure Using UNICORE
                                  Middleware . . . . . . . . . . . . . . . 56--72
            Marcin Jarz\kab and   
               Jacek Kosi\'nski   User-Oriented Provisioning of Secure
                                  Virtualized Infrastructure . . . . . . . 73--88
                Jan Meizner and   
              Eryk Ciepiela and   
               Piotr Nowakowski   Flexible and Extendable Mechanism
                                  Enabling Secure Access to
                                  e-Infrastructures and Storage of
                                  Confidential Data for the GridSpace2
                                  Virtual Laboratory . . . . . . . . . . . 89--101
              Gerard Frankowski   SARA --- System for Inventory and Static
                                  Security Control in a Grid
                                  Infrastructure . . . . . . . . . . . . . 102--113
       Bart\lomiej Balcerek and   
                Bartosz Szurgot   ACARM-ng: Next Generation Correlation
                                  Framework  . . . . . . . . . . . . . . . 114--127
       Bart\lomiej Balcerek and   
              Gerard Frankowski   Security Best Practices: Applying
                                  Defense-in-Depth Strategy to Protect the
                                  NGI\_PL  . . . . . . . . . . . . . . . . 128--141
        W\lodzimierz Funika and   
                    Filip Szura   Automation of System Monitoring Based on
                                  Fuzzy Logic or Rules; Comparison of Two
                                  Designed Approaches with Regard to
                                  Computational Infrastructures  . . . . . 142--156
              Renata S\lota and   
            Dariusz Król   A Toolkit for Storage QoS Provisioning
                                  for Data-Intensive Applications  . . . . 157--170
          Tomasz Szepieniec and   
            Ma\lgorzata Tomanek   Implementation of Service Level
                                  Management in PL-Grid Infrastructure . . 171--181
              Bartosz Bosak and   
                    Jan Konczak   Highly Integrated Environment for
                                  Parallel Application Development Using
                                  QosCosGrid Middleware  . . . . . . . . . 182--190
               Bartek Palak and   
              Pawe\l Wolniewicz   User-Friendly Frameworks for Accessing
                                  Computational Resources  . . . . . . . . 191--204
            Piotr Dziubecki and   
                Piotr Grabowski   Online Web-Based Science Gateway for
                                  Nanotechnology Research  . . . . . . . . 205--216
        Daniel Har\ke\.zlak and   
               Marek Kasztelnik   Scripting Language Extensions Offered by
                                  the GridSpace Experiment Platform  . . . 217--227
              Eryk Ciepiela and   
               Piotr Nowakowski   Managing Entire Lifecycles of e-Science
                                  Applications in the GridSpace2 Virtual
                                  Laboratory --- From Motivation through
                                  Idea to Operable Web-Accessible
                                  Environment Built on Top of PL-Grid
                                  e-Infrastructure . . . . . . . . . . . . 228--239
              Eryk Ciepiela and   
                 Leszek Zaraska   GridSpace2 Virtual Laboratory Case
                                  Study: Implementation of Algorithms for
                                  Quantitative Analysis of Grain
                                  Morphology in Self-assembled Hexagonal
                                  Lattices According to the Hillebrand
                                  Method . . . . . . . . . . . . . . . . . 240--251
             Tomasz Jadczyk and   
                Maciej Malawski   Examining Protein Folding Process
                                  Simulation and Searching for Common
                                  Structure Motifs in a Protein Family as
                                  Experiments in the GridSpace2 Virtual
                                  Laboratory . . . . . . . . . . . . . . . 252--264
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7137, 2012

         Sebastian S. Bauer and   
             Rolf Hennicker and   
                 Martin Wirsing   Building a Modal Interface Theory for
                                  Concurrency and Data . . . . . . . . . . 1--12
             Hans-Dieter Ehrich   My ADT Shrine  . . . . . . . . . . . . . 13--24
               Jan Kofro\vn and   
    Franti\vsek Plá\vsil   Evolving SOA in the Q-ImPrESS Project    25--26
               Paolo Baldan and   
               Clara Bertolissi   Sharing in the Graph Rewriting Calculus  27--41
              Roberto Bruni and   
               Anne Kersten and   
                Ivan Lanese and   
               Giorgio Spagnolo   A New Strategy for Distributed
                                  Compensations with Interruption in
                                  Long-Running Transactions  . . . . . . . 42--60
            Pablo F. Castro and   
              Tom S. E. Maibaum   Towards a First-Order Deontic Action
                                  Logic  . . . . . . . . . . . . . . . . . 61--75
           Christine Choppy and   
                  Gianna Reggio   \sc Casl-Mdl, Modelling Dynamic Systems
                                  with a Formal Foundation and a UML-Like
                                  Notation . . . . . . . . . . . . . . . . 76--97
                  Mihai Codescu   Lambda Expressions in \sc Casl
                                  Architectural Specifications . . . . . . 98--117
              Mihai Codescu and   
              Fulya Horozal and   
           Michael Kohlhase and   
           Till Mossakowski and   
                   Florian Rabe   A Proof Theoretic Interpretation of
                                  Model Theoretic Hiding . . . . . . . . . 118--138
              Mihai Codescu and   
              Fulya Horozal and   
           Michael Kohlhase and   
           Till Mossakowski and   
                   Florian Rabe   Towards Logical Frameworks in the
                                  Heterogeneous Tool Set Hets  . . . . . . 139--159
           Andrea Corradini and   
             Fabio Gadducci and   
                  Leila Ribeiro   An Institution for Graph Transformation  160--174
             Timothy Bourke and   
            Alexandre David and   
              Kim G. Larsen and   
                 Axel Legay and   
                Didier Lime and   
                    Ulrik Nyman   New Results on Timed Specifications  . . 175--192
    Hans-Jörg Kreowski and   
               Sabine Kuske and   
             Caroline von Totth   Combining Graph Transformation and
                                  Algebraic Specification into Model
                                  Transformation . . . . . . . . . . . . . 193--208
        Ana Paula Maldonado and   
       Luís Monteiro and   
              Markus Roggenbach   Towards Bialgebraic Semantics for the
                                  Linear Time --- Branching Time Spectrum  209--225
          Grzegorz Marczy\'nski   Algebraic Signatures Enriched by
                                  Dependency Structure . . . . . . . . . . 226--250
              Liam O'Reilly and   
           Till Mossakowski and   
              Markus Roggenbach   Compositional Modelling and Reasoning in
                                  an Institution for Processes and Data    251--269
              Daniel Seidel and   
         Janis Voigtländer   Proving Properties about Functions on
                                  Lists Involving Element Tests  . . . . . 270--286
           Adrián Riesco   Test-Case Generation for Maude
                                  Functional Modules . . . . . . . . . . . 287--301
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7138, 2012

      Alexandros Paramythis and   
                  Lydia Lau and   
        Stavros Demetriadis and   
             Manolis Tzagarakis   Adaptive Support for Team Collaboration  1--4
          Liliana Ardissono and   
               Gianni Bosio and   
                  Marino Segnan   A Visualization Model Supporting an
                                  Efficient Context Resumption in
                                  Collaboration Environments . . . . . . . 5--17
                Toby Dragon and   
           Bruce M. McLaren and   
           Manolis Mavrikis and   
                Eirini Geraniou   Scaffolding Collaborative Learning
                                  Opportunities: Integrating Microworld
                                  Use and Argumentation  . . . . . . . . . 18--30
                Fabian Abel and   
            Vania Dimitrova and   
               Eelco Herder and   
               Geert-Jan Houben   Augmenting User Models with Real World
                                  Experiences to Enhance Personalization
                                  and Adaptation . . . . . . . . . . . . . 31--34
    Sandro Rodriguez Garzon and   
                  Mark Poguntke   The Personal Adaptive In-Car HMI:
                                  Integration of External Applications for
                                  Personalized Use . . . . . . . . . . . . 35--46
                 Adam Moore and   
         Victoria Macarthur and   
                    Owen Conlan   Core Aspects of Affective Metacognitive
                                  User Models  . . . . . . . . . . . . . . 47--59
               Amit Tiroshi and   
                Tsvi Kuflik and   
                   Judy Kay and   
                 Bob Kummerfeld   Recommender Systems and the Social Web   60--70
               Ahmad Ammari and   
            Vania Dimitrova and   
            Dimoklis Despotakis   Identifying Relevant YouTube Comments to
                                  Derive Socially Augmented User Models: a
                                  Semantically Enriched Machine Learning
                                  Approach . . . . . . . . . . . . . . . . 71--85
            Francesco Ricci and   
          Giovanni Semeraro and   
            Marco de Gemmis and   
                  Pasquale Lops   Decision Making and Recommendation
                                  Acceptance Issues in Recommender Systems 86--91
               Roland Bader and   
           Wolfgang Woerndl and   
           Andreas Karitnig and   
                Gerhard Leitner   Designing an Explanation Interface for
                                  Proactive Recommendations in Automotive
                                  Scenarios  . . . . . . . . . . . . . . . 92--104
        Alexander Felfernig and   
        Christoph Zehentner and   
              Gerald Ninaus and   
             Harald Grabner and   
                   Walid Maalej   Group Decision Support for Requirements
                                  Negotiation  . . . . . . . . . . . . . . 105--116
             Olga C. Santos and   
              Milos Kravcik and   
Diana Pérez-Marín   Personalization Approaches in Learning
                                  Environments . . . . . . . . . . . . . . 117--121
Alberto Redondo-Hernández and   
Diana Pérez-Marín   A Procedure to Automatically Adapt
                                  Questions in Student--Pedagogic
                                  Conversational Agent Dialogues . . . . . 122--134
              Iolanda Leite and   
       André Pereira and   
         Ginevra Castellano and   
         Samuel Mascarenhas and   
                Carlos Martinho   Modelling Empathy in Social Robotic
                                  Companions . . . . . . . . . . . . . . . 135--147
                  Mary Muir and   
                Cristina Conati   Understanding Student Attention to
                                  Adaptive Hints with Eye-Tracking . . . . 148--160
            Marcel Berthold and   
             Pablo Lachmann and   
       Alexander Nussbaumer and   
             Sergei Pachtchenko   Psycho-pedagogical Mash-Up Design for
                                  Personalising the Learning Environment   161--175
              Federica Cena and   
           Antonina Dattolo and   
    Ernesto William De Luca and   
              Pasquale Lops and   
                  Till Plumbaum   Semantic Adaptive Social Web . . . . . . 176--180
Ignacio Fernández-Tobías and   
       Iván Cantador and   
      Alejandro Bellogín   Semantic Disambiguation and
                                  Contextualisation of Social Tags . . . . 181--197
           Antonina Dattolo and   
               Emanuela Pitassi   Folkview: a Multi-agent System Approach
                                  to Modeling Folksonomies . . . . . . . . 198--212
             Udeep Tandukar and   
               Julita Vassileva   Selective Propagation of Social Data in
                                  Decentralized Online Social Network  . . 213--224
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7139, 2012

          Thotreingam Kasar and   
        Angarai G. Ramakrishnan   Multi-script and Multi-oriented Text
                                  Localization from Scene Images . . . . . 1--14
                  Chucai Yi and   
                    Yingli Tian   Assistive Text Reading from Complex
                                  Background for Blind Persons . . . . . . 15--28
       Carlos Merino-Gracia and   
                 Karel Lenc and   
                 Majid Mirmehdi   A Head-Mounted Device for Recognizing
                                  Text in Natural Scenes . . . . . . . . . 29--41
        Aruni Roy Chowdhury and   
        Ujjwal Bhattacharya and   
                Swapan K. Parui   Text Detection of Two Major Indian
                                  Scripts in Natural Scene Images  . . . . 42--57
                  Chao Zeng and   
                Wenjing Jia and   
                   Xiangjian He   An Algorithm for Colour-Based Natural
                                  Scene Text Segmentation  . . . . . . . . 58--68
               Yuanping Zhu and   
                    Jun Sun and   
                   Satoshi Naoi   Recognizing Natural Scene Characters by
                                  Convolutional Neural Network and Bimodal
                                  Image Enhancement  . . . . . . . . . . . 69--82
                  Qiong Liu and   
                  Chunyuan Liao   PaperUI  . . . . . . . . . . . . . . . . 83--100
             Faisal Shafait and   
     Michael Patrick Cutter and   
         Joost van Beusekom and   
             Syed Saqib Bukhari   Decapod: a Flexible, Low Cost
                                  Digitization Solution for Small and
                                  Medium Archives  . . . . . . . . . . . . 101--111
       Szilárd Vajda and   
          Leonard Rothacker and   
                 Gernot A. Fink   A Method for Camera-Based Interactive
                                  Whiteboard Reading . . . . . . . . . . . 112--125
         Syed Saqib Bukhari and   
             Faisal Shafait and   
               Thomas M. Breuel   Border Noise Removal of Camera-Captured
                                  Document Images Using Page Frame
                                  Detection  . . . . . . . . . . . . . . . 126--137
         Syed Saqib Bukhari and   
             Faisal Shafait and   
               Thomas M. Breuel   An Image Based Performance Evaluation
                                  Method for Page Dewarping Algorithms
                                  Using SIFT Features  . . . . . . . . . . 138--149
                Robert Nagy and   
              Anders Dicker and   
            Klaus Meyer-Wegener   NEOCR: a Configurable Dataset for
                                  Natural Image Text Recognition . . . . . 150--163
         Syed Saqib Bukhari and   
             Faisal Shafait and   
               Thomas M. Breuel   The IUPR Dataset of Camera-Captured
                                  Document Images  . . . . . . . . . . . . 164--171
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7140, 2012

          Mihhail Aizatulin and   
     François Dupressoir   Verifying Cryptographic Code in C: Some
                                  Experience and the Csec Challenge  . . . 1--20
            Willem De Groef and   
         Dominique Devriese and   
                 Frank Piessens   Better Security and Privacy for Web
                                  Browsers: a Survey of Techniques, and a
                                  New Implementation . . . . . . . . . . . 21--38
      Mário S. Alvim and   
        Miguel E. Andrés   Differential Privacy: On the Trade-Off
                                  between Utility and Information Leakage  39--54
              Luciano Bello and   
                Eduardo Bonelli   On-the-Fly Inlining of Dynamic
                                  Dependency Monitors for Secure
                                  Information Flow . . . . . . . . . . . . 55--69
           Barbara Espinoza and   
                 Geoffrey Smith   Min-Entropy Leakage of Channels in
                                  Cascade  . . . . . . . . . . . . . . . . 70--84
           Riccardo Focardi and   
             Flaminia L. Luccio   Secure Recharge of Disposable RFID
                                  Tickets  . . . . . . . . . . . . . . . . 85--99
             Simon N. Foley and   
                    Samane Abdi   Avoiding Delegation Subterfuge Using
                                  Linked Local Permission Names  . . . . . 100--114
            Arnaud Fontaine and   
                 Samuel Hym and   
           Isabelle Simplot-Ryl   Verifiable Control Flow Policies for
                                  Java Bytecode  . . . . . . . . . . . . . 115--130
      Sibylle Fröschle and   
                    Nils Sommer   Concepts and Proofs for Configuring
                                  PKCS#11  . . . . . . . . . . . . . . . . 131--147
                Richard Gay and   
               Heiko Mantel and   
                 Barbara Sprick   Service Automata . . . . . . . . . . . . 148--163
     Thomas Gibson-Robinson and   
                     Gavin Lowe   Analysing Applications Layered on
                                  Unilaterally Authenticating Protocols    164--181
           Robert Grabowski and   
             Martin Hofmann and   
                       Keqin Li   Type-Based Enforcement of Secure
                                  Programming Guidelines --- Code
                                  Injection Prevention at SAP  . . . . . . 182--197
        Timothy L. Hinrichs and   
        William C. Garrison III   TBA: a Hybrid of Logic and Extensional
                                  Access Control Systems . . . . . . . . . 198--213
      Sebastian Mödersheim   Diffie--Hellman without Difficulty . . . 214--229
         Behnam Sattarzadeh and   
               Mehran S. Fallah   Is Cryptyc Able to Detect Insider
                                  Attacks? . . . . . . . . . . . . . . . . 230--244
                  Ben Smyth and   
                  Mark Ryan and   
                     Liqun Chen   Formal Analysis of Anonymity in
                                  ECC-Based Direct Anonymous Attestation
                                  Schemes  . . . . . . . . . . . . . . . . 245--262
     Mohammad Torabi Dashti and   
                 Jan Cederquist   Risk Balance in Optimistic
                                  Non-repudiation Protocols  . . . . . . . 263--277
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7141, 2012

            Joost-Pieter Katoen   Model Checking: One Can Do Much More
                                  Than You Think!  . . . . . . . . . . . . 1--14
            Jan A. Bergstra and   
                    Alban Ponse   Proposition Algebra and Short-Circuit
                                  Logic  . . . . . . . . . . . . . . . . . 15--31
                 Luca Aceto and   
            Arnar Birgisson and   
Anna Ingólfsdóttir   Decompositional Reasoning about the
                                  History of Parallel Processes  . . . . . 32--47
 Shekoufeh Kolahdouz-Rahimi and   
                     Kevin Lano   A Model-Based Development Approach for
                                  Model Transformations  . . . . . . . . . 48--63
         Christian Lambertz and   
         Mila Majster-Cederbaum   Analyzing Component-Based Systems on the
                                  Basis of Architectural Constraints . . . 64--79
            Hassan Haghighi and   
       Mohammad Mahdi Javanmard   Constructive Development of
                                  Probabilistic Programs . . . . . . . . . 80--95
        Mohammad Mahdi Jaghoori   Composing Real-Time Concurrent Objects
                                  Refinement, Compatibility and
                                  Schedulability . . . . . . . . . . . . . 96--111
           Jan Friso Groote and   
           Tim W. D. M. Kouters   Specification Guidelines to Avoid the
                                  State Space Explosion Problem  . . . . . 112--127
           Romain Demangeon and   
              Daniel Hirschkoff   Strong Normalisation in $ \lambda
                                  $-Calculi with References  . . . . . . . 128--142
                 Yuxin Deng and   
               Matthew Hennessy   Compositional Reasoning for Markov
                                  Decision Processes . . . . . . . . . . . 143--157
        Einar Broch Johnsen and   
        Thi Mai Thuong Tran and   
                       Olaf Owe   Safe Locking for Multi-threaded Java . . 158--173
              Yi-Ling Hwong and   
          Vincent J. J. Kusters   Analysing the Control Software of the
                                  Compact Muon Solenoid Experiment at the
                                  Large Hadron Collider  . . . . . . . . . 174--189
               Minyoung Kim and   
          Mark-Oliver Stehr and   
                Carolyn Talcott   A Distributed Logic for Networked
                                  Cyber-Physical Systems . . . . . . . . . 190--205
    Hallstein Asheim Hansen and   
              Gerardo Schneider   Reachability Analysis of Non-linear
                                  Planar Autonomous Systems  . . . . . . . 206--220
               Qiusong Yang and   
                  Bei Zhang and   
                  Jian Zhai and   
                     Mingshu Li   Attacking the Dimensionality Problem of
                                  Parameterized Systems via Bounded
                                  Reachability Graphs  . . . . . . . . . . 221--235
              Maryam Kamali and   
               Luigia Petre and   
                     Kaisa Sere   Refinement-Based Modeling of $3$D NoCs   236--252
          Hamid Reza Asaadi and   
                Ramtin Khosravi   Towards Model-Based Testing of
                                  Electronic Funds Transfer Systems  . . . 253--267
                 Luca Aceto and   
        Ignacio Fábregas   Relating Modal Refinements,
                                  Covariant-Contravariant Simulations and
                                  Partial Bisimulations  . . . . . . . . . 268--283
                Chaodong He and   
                    Yuxi Fu and   
                     Hongfei Fu   Decidability of Behavioral Equivalences
                                  in Process Calculi with Name Scoping . . 284--298
           Roméo Courbis   Rewriting Approximations for Properties
                                  Verification over CCS Specifications . . 299--315
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7142, 2012

               Ehab ElGindy and   
                 Alia Abdelmoty   Enhancing the Quality of Place Resources
                                  in Geo-folksonomies  . . . . . . . . . . 1--12
             Huaishuai Wang and   
                Peiquan Jin and   
                   Lei Zhao and   
               Lanlan Zhang and   
                      Lihua Yue   Generating Semantic-Based Trajectories
                                  for Indoor Moving Objects  . . . . . . . 13--25
                  Ying Fang and   
                Jiaheng Cao and   
               Junzhou Wang and   
                 Yuwei Peng and   
                       Wei Song   HTPR*-Tree: An Efficient Index for
                                  Moving Objects to Support Predictive
                                  Query and Partial History Query  . . . . 26--39
             Michael Meyers and   
               Bruce A. Ralston   Developing Rich Web GIS Applications for
                                  Visual Analytics . . . . . . . . . . . . 40--50
                  Htoo Htoo and   
              Yutaka Ohsawa and   
                Noboru Sonehara   Single-Source Multi-Target A* Algorithm
                                  for POI Queries on Road Network  . . . . 51--62
                  Weimo Liu and   
                 Yinan Jing and   
                Kunjie Chen and   
                     Weiwei Sun   Combining Top-$k$ Query in Road Networks 63--75
             Qingqing Zhang and   
                Peiquan Jin and   
                  Sheng Lin and   
                      Lihua Yue   Extracting Focused Locations for Web
                                  Pages  . . . . . . . . . . . . . . . . . 76--89
                   Yuchi Ma and   
                 Chunyan Qu and   
               Tingting Liu and   
                  Ning Yang and   
                  Changjie Tang   Searching Similar Trajectories in Real
                                  Time: An Effectiveness and Efficiency
                                  Study  . . . . . . . . . . . . . . . . . 90--102
           Filip K\vri\vzka and   
Michal Krátký and   
               Radim Ba\vca and   
                 Peter Chovanec   Multidimensional Implementation of
                                  Stream ADT . . . . . . . . . . . . . . . 103--112
               Ruiming Tang and   
                   Huayu Wu and   
        Stéphane Bressan   Measuring XML Structured-ness with
                                  Entropy  . . . . . . . . . . . . . . . . 113--123
                   Yue Wang and   
               Hongzhi Wang and   
                  Yang Wang and   
                       Hong Gao   Similarity Join on XML Based on
                                  $k$-Generation Set Distance  . . . . . . 124--135
                 Caiyun Yao and   
                 Jiaheng Lu and   
                   Wei Wang and   
                  Xiaofang Zhou   XML Query Processing Using Views . . . . 136--139
                     Xia Li and   
                Zhanhuai Li and   
               PeiYing Wang and   
                   Qun Chen and   
                Lijun Zhang and   
                        Ning Li   XIO-SLCA: Optimize SLCA for Effective
                                  Keyword Search in XML Documents  . . . . 140--149
             Fahad Alahmari and   
                   Eric Pardede   The Development of XML Stored Procedures
                                  in XML Enabled Databases . . . . . . . . 150--159
                Jingjiao Li and   
                  Limei Sun and   
                      Jiao Wang   A Slope One Collaborative Filtering
                                  Recommendation Algorithm Using Uncertain
                                  Neighbors Optimizing . . . . . . . . . . 160--166
                      Di He and   
               Zhiyong Peng and   
                 Liang Hong and   
                       Yu Zhang   A Social Reputation Management for Web
                                  Communities  . . . . . . . . . . . . . . 167--174
             Dongzhan Zhang and   
                        Chao Xu   A Collaborative Filtering Recommendation
                                  System by Unifying User Similarity and
                                  Item Similarity  . . . . . . . . . . . . 175--184
                Rongrong Li and   
              Weixiang Zhai and   
                   Zhiyong Peng   Supporting Query over Dynamic
                                  Combination of Data Sources for Social
                                  Media  . . . . . . . . . . . . . . . . . 185--196
               Kaisong Song and   
                Daling Wang and   
                   Shi Feng and   
                          Ge Yu   Detecting Opinion Leader Dynamically in
                                  Chinese News Comments  . . . . . . . . . 197--209
                Daling Wang and   
                   Shi Feng and   
                   Chao Yan and   
                          Ge Yu   An Approach of Semi-automatic Public
                                  Sentiment Analysis for Opinion and
                                  District . . . . . . . . . . . . . . . . 210--222
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7143, 2012

                Jeremy M. Wolfe   The Rules of Guidance in Visual Search   1--10
          N. K. Suryadevara and   
                   T. Quazi and   
         Subhas C. Mukhopadhyay   Smart Sensing System for Human Emotion
                                  and Behaviour Recognition  . . . . . . . 11--22
              Nikhil Ranjan Pal   Fuzzy Rule-Based Approaches to
                                  Dimensionality Reduction . . . . . . . . 23--27
                Osamu Yamaguchi   Face Recognition Technology and Its
                                  Real-World Application . . . . . . . . . 28--34
         Atanendu Sekhar Mandal   Contextual Effects in the Visual Cortex
                                  Area 1 (V1) and Camouflage Perception    35--41
                  Dana Sugu and   
               Amita Chatterjee   Affective Information Processing and
                                  Representations  . . . . . . . . . . . . 42--49
                  Rakesh S. and   
               Kailash Atal and   
               Ashish Arora and   
              Pulak Purkait and   
               Bhabatosh Chanda   Face Image Retrieval Based on Probe
                                  Sketch Using SIFT Feature Descriptors    50--57
         Asok Bandyopadhyay and   
         Bhaswati Mukherjee and   
         Bidyut Baran Chaudhuri   Effect of Perceptual Anchorage Points on
                                  Recognition of Bangla Characters . . . . 58--65
              Ashish Bakshi and   
                   Kuntal Ghosh   Scaling Properties of Mach Bands and
                                  Perceptual Models  . . . . . . . . . . . 66--74
                 Apurba Das and   
                  Suparna Parua   Psycho-Visual Evaluation of Contrast
                                  Enhancement Algorithms by Adaptive
                                  Neuro-Fuzzy Inference System . . . . . . 75--83
              Fumito Hamada and   
              Edson T. Miyamoto   Theory of Mind in Man-Machine
                                  Interactions . . . . . . . . . . . . . . 84--89
              Naman Dauthal and   
              Surya Prakash and   
                 Phalguni Gupta   Face Recognition System Invariant to
                                  Light-Camera Setup . . . . . . . . . . . 90--97
        Sarvesh Vishwakarma and   
                 Anupam Agrawal   Representing Feature Quantization
                                  Approach Using Spatial-Temporal Relation
                                  for Action Recognition . . . . . . . . . 98--105
      Siddharth S. Rautaray and   
                Anand Kumar and   
                 Anupam Agrawal   Human Computer Interaction with Hand
                                  Gestures in Virtual Environment  . . . . 106--113
                 Amit Konar and   
          Aruna Chakraborty and   
              Anisha Halder and   
            Rajshree Mandal and   
           Ramadoss Janarthanan   Interval Type-$2$ Fuzzy Model for
                                  Emotion Recognition from Facial
                                  Expression . . . . . . . . . . . . . . . 114--121
            Nandini Bondale and   
                   Gaurav Gupta   Augmenting Language Tools for Effective
                                  Communication  . . . . . . . . . . . . . 122--128
             Debmalya Sinha and   
                    Anupam Basu   Design and Evaluation of a Cognition
                                  Aware File Browser for Users in Rural
                                  India  . . . . . . . . . . . . . . . . . 129--136
               Amit Singhal and   
          Santanu Chaudhury and   
             Sumantra Dutta Roy   Shiksha: a Novel Architecture for
                                  Tele-teaching Using Handwriting as a
                                  Perceptually Significant Temporal Media  137--144
             Chandrani Saha and   
               Washef Ahmed and   
                     Soma Mitra   A New Motion Based Fully Automatic
                                  Facial Expression Recognition System . . 145--154
             Koichi Yoshida and   
             Emiko Ishikawa and   
              Maltesh Joshi and   
        Hervé Lechat and   
                   Fatma Ayouni   Profiling Scotch Malt Whisky Spirits
                                  from Different Distilleries Using an
                                  Electronic Nose and an Expert Sensory
                                  Panel  . . . . . . . . . . . . . . . . . 155--162
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7144, 2012

          Raghunath Nambiar and   
                 Nicholas Wakou   Shaping the Landscape of Industry
                                  Standard Benchmarks: Contributions of
                                  the Transaction Processing Performance
                                  Council (TPC)  . . . . . . . . . . . . . 1--9
              Florian Funke and   
                  Alfons Kemper   Metrics for Measuring the Performance of
                                  the Mixed Workload CH-benCHmark  . . . . 10--30
              Daniel Schall and   
             Volker Hoefner and   
                    Manuel Kern   Towards an Enhanced Benchmark Advocating
                                  Energy-Efficient Systems . . . . . . . . 31--45
             Umeshwar Dayal and   
                Kevin Wilkinson   Optimization of Analytic Data Flows for
                                  Next Generation Business Intelligence
                                  Applications . . . . . . . . . . . . . . 46--66
                   Anja Bog and   
                  Kai Sachs and   
                Alexander Zeier   Normalization in a Mixed OLTP and OLAP
                                  Workload Scenario  . . . . . . . . . . . 67--82
                  Torsten Grabs   Measuring Performance of Complex Event
                                  Processing Systems . . . . . . . . . . . 83--96
                   Karl Huppler   Benchmarking with Your Head in the Cloud 97--110
                  Yantao Li and   
                 Charles Levine   Extending TPC-E to Measure Availability
                                  in Database Systems  . . . . . . . . . . 111--122
           Robert Gottstein and   
                    Ilia Petrov   SI-CV: Snapshot Isolation with
                                  Co-located Versions  . . . . . . . . . . 123--136
             Alain Crolotte and   
                   Ahmad Ghazal   Introducing Skew into the TPC-H
                                  Benchmark  . . . . . . . . . . . . . . . 137--145
       Christina Delimitrou and   
                  Sriram Sankar   Time and Cost-Efficient Modeling and
                                  Generation of Large-Scale TPCC/TPCE/TPCH
                                  Workloads  . . . . . . . . . . . . . . . 146--162
           Avrilia Floratou and   
               Jignesh M. Patel   When Free Is Not Really Free: What Does
                                  It Cost to Run a Database Workload in
                                  the Cloud? . . . . . . . . . . . . . . . 163--179
               Jianhai Chen and   
                Dawei Huang and   
                       Bei Wang   A Fine-Grained Performance-Based
                                  Decision Model for Virtualization
                                  Application Solution . . . . . . . . . . 180--195
               Meikel Poess and   
               Tilmann Rabl and   
                  Michael Frank   A PDGF Implementation for TPC-H  . . . . 196--212
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7145, 2012

   Stéphane Bonneaud and   
                  Kevin Rio and   
         Pierre Chevaillier and   
              William H. Warren   Accounting for Patterns of Collective
                                  Behavior in Crowd Locomotor Dynamics for
                                  Realistic Simulations  . . . . . . . . . 1--11
            Julien Valentin and   
            Florent Coudret and   
          Eric Gouard\`eres and   
                  Wilfrid Lefer   Human Behaviour Modelling for Simulating
                                  Evacuation of Buildings on Fire  . . . . 12--23
                  Lin Zhang and   
                       Qing Liu   Application of Simulation and Virtual
                                  Reality to Physical Education and
                                  Athletic Training  . . . . . . . . . . . 24--33
                    Wei Hua and   
               Wenzhuo Yang and   
                Zilong Dong and   
                  Guofeng Zhang   Depth-Varying Human Video Sprite
                                  Synthesis  . . . . . . . . . . . . . . . 34--47
                  Yejin Kim and   
                   Michael Neff   Automating Expressive Locomotion
                                  Generation . . . . . . . . . . . . . . . 48--61
                Wenshan Fan and   
                   Bin Wang and   
                   Bin Chan and   
           Jean-Claude Paul and   
                   Jiaguang Sun   Recovering Geometric Detail by Octree
                                  Normal Maps  . . . . . . . . . . . . . . 62--73
                Jianxin Luo and   
                Guiqiang Ni and   
                   Ping Cui and   
              Jinsong Jiang and   
                Yifeng Duan and   
                        Guyu Hu   Quad-Tree Atlas Ray Casting: a GPU Based
                                  Framework for Terrain Visualization and
                                  Its Applications . . . . . . . . . . . . 74--85
             Shao-Shin Hung and   
             Chih Ming Chiu and   
               Tsou Tsun Fu and   
            Jung-Tsung Chen and   
                 Derchian Tsaih   Clustering Spatial Data for Aggregate
                                  Query Processing in Walkthrough: a
                                  Hypergraph Approach  . . . . . . . . . . 86--98
                 Yujian Gao and   
                  Aimin Hao and   
                   Qinping Zhao   Skin-Detached Surface for Interactive
                                  Large Mesh Editing . . . . . . . . . . . 99--109
               Shiguang Liu and   
                     Tai An and   
                 Zheng Gong and   
                Ichiro Hagiwara   Physically Based Simulation of Solid
                                  Objects' Burning . . . . . . . . . . . . 110--120
                  Chao Wang and   
                      Yu Wu and   
               Tingting Zhu and   
                  Hongbo Li and   
                   Mingliang Xu   Tunneling Blasting Simulation for
                                  Digital Mine . . . . . . . . . . . . . . 121--128
             Gustavo Aranda and   
              Tomas Trescak and   
                Marc Esteva and   
       Inmaculada Rodriguez and   
              Carlos Carrascosa   Massively Multiplayer Online Games
                                  Developed with Agents  . . . . . . . . . 129--138
                 Zhiying He and   
              Xiaohui Liang and   
                   Qinping Zhao   A Novel Skeletonization and Animation
                                  Approach for Point Models  . . . . . . . 139--150
                  Xin Zhang and   
                Zi'ang Ding and   
                  Chuan Zhu and   
                   Wei Chen and   
                  Qunsheng Peng   View-Dependent Line Drawings for $3$D
                                  Scenes . . . . . . . . . . . . . . . . . 151--160
             Nicolas Szilas and   
             Monica Axelrad and   
                     Urs Richle   Propositions for Innovative Forms of
                                  Digital Interactive Storytelling Based
                                  on Narrative Theories and Practices  . . 161--179
              Shengnan Chen and   
                Zhigeng Pan and   
                  Mingmin Zhang   A Virtual Informal Learning System for
                                  Cultural Heritage  . . . . . . . . . . . 180--187
               Xingquan Cai and   
                     Jie Li and   
                 Haiyan Sun and   
                     Jinhong Li   Multi-samples Texture Synthesis for
                                  Dynamic Terrain Based on Constraint
                                  Conditions . . . . . . . . . . . . . . . 188--196
               Zhicheng Liu and   
                    Zhijun Fang   PCA and FLD in DWT Domain  . . . . . . . 197--204
                 Shidu Dong and   
               Xiaofan Yang and   
                Huaqiu Wang and   
                  Xiang Liu and   
                   Hengyang Liu   Area Measurement Method of Paint Bubble
                                  Based on Computer Vision . . . . . . . . 205--213
                  Xifan Shi and   
              Xianghua Chen and   
                    Tiefeng Cai   A High Precision Fresco Scanner  . . . . 214--221
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7148, 2012

            Ahmed Bouajjani and   
                Cezara Dr\uagoi   Abstract Domains for Automated Reasoning
                                  about List-Manipulating Programs with
                                  Infinite Data  . . . . . . . . . . . . . 1--22
                   Ranjit Jhala   Software Verification with Liquid Types  23--23
                  Tobias Nipkow   Teaching Semantics with a Proof
                                  Assistant: No More LSD Trip Proofs . . . 24--38
           Aws Albarghouthi and   
                 Arie Gurfinkel   Whale: An Interpolation-Based Algorithm
                                  for Inter-procedural Verification  . . . 39--55
                 Samik Basu and   
              Tevfik Bultan and   
                Meriem Ouederni   Synchronizability for Verification of
                                  Asynchronously Communicating Systems . . 56--71
          Amir M. Ben-Amram and   
                   Samir Genaim   On the Termination of Integer Loops  . . 72--87
             Laura Bozzelli and   
               Sophie Pinchinat   Verification of Gap-Order Constraint
                                  Abstractions of Counter Systems  . . . . 88--103
             Dmitry Bugaychenko   On Application of Multi-Rooted Binary
                                  Decision Diagrams to Probabilistic Model
                                  Checking . . . . . . . . . . . . . . . . 104--118
                Sagar Chaki and   
             Arie Gurfinkel and   
                 Ofer Strichman   Regression Verification for
                                  Multi-threaded Programs  . . . . . . . . 119--135
         Nathaniel Charlton and   
                   Ben Horsfall   Crowfoot: a Verifier for Higher-Order
                                  Store Programs . . . . . . . . . . . . . 136--151
      Krishnendu Chatterjee and   
               Vishwanath Raman   Synthesizing Protocols for Digital
                                  Contract Signing . . . . . . . . . . . . 152--168
            Rayna Dimitrova and   
               Bernd Finkbeiner   Model Checking Information Flow in
                                  Reactive Systems . . . . . . . . . . . . 169--185
                Evren Ermis and   
                Jochen Hoenicke   Splitting via Interpolants . . . . . . . 186--201
             Pietro Ferrara and   
              Peter Müller   Automatic Inference of Access
                                  Permissions  . . . . . . . . . . . . . . 202--218
           Bernd Finkbeiner and   
                    Swen Jacobs   Lazy Synthesis . . . . . . . . . . . . . 219--234
             Khalil Ghorbal and   
             Franjo Ivan\vci\'c   Donut Domains: Efficient Non-convex
                                  Domains for Abstract Interpretation  . . 235--250
                 Falk Howar and   
           Bernhard Steffen and   
                  Bengt Jonsson   Inferring Canonical Register Automata    251--266
            Johannes Kinder and   
              Dmitry Kravchenko   Alternating Control Flow Reconstruction  267--282
                  Uri Klein and   
               Nir Piterman and   
                    Amir Pnueli   Effective Synthesis of Asynchronous
                                  Systems from GR(1) Specifications  . . . 283--298
                 Woosuk Lee and   
                Wonchan Lee and   
                   Kwangkeun Yi   Sound Non-statistical Clustering of
                                  Static Analysis Alarms . . . . . . . . . 299--314
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7149, 2012

              Boon Thau Loo and   
                Harjot Gill and   
                   Changbin Liu   Recent Advances in Declarative
                                  Networking . . . . . . . . . . . . . . . 1--16
                    Don Stewart   Make Things Now! Pragmatic Functional
                                  Programming in Haskell . . . . . . . . . 17--17
             Mayer Goldberg and   
                     Guy Wiener   A Declarative Approach for Software
                                  Modeling . . . . . . . . . . . . . . . . 18--32
               Sergio Antoy and   
                  Michael Hanus   Contracts and Specifications for
                                  Functional Logic Programming . . . . . . 33--47
           Pedro M. Martins and   
                Julie A. McCann   The Environment as an Argument . . . . . 48--62
             Yuliya Lierler and   
                   Shaden Smith   Weighted-Sequence Problem: ASP vs CASP
                                  and Declarative vs Problem-Oriented
                                  Solving  . . . . . . . . . . . . . . . . 63--77
        Marcello Balduccini and   
                  Yulia Lierler   Practical and Methodological Aspects of
                                  the Use of Cutting-Edge ASP Tools  . . . 78--92
       Christian Theil Have and   
           Henning Christiansen   Efficient Tabling of Structured Data
                                  Using Indexing and Program
                                  Transformation . . . . . . . . . . . . . 93--107
             Dario Campagna and   
           Beata Sarna-Starosta   Optimizing Inequality Joins in Datalog
                                  with Approximated Constraint Propagation 108--122
              Elvira Albert and   
                    Puri Arenas   Symbolic Execution of Concurrent Objects
                                  in CLP . . . . . . . . . . . . . . . . . 123--137
Pablo Chico de Guzmán and   
                   Amadeo Casas   A Segment-Swapping Approach for
                                  Executing Trapped Computations . . . . . 138--152
                Michael Lesniak   Palovca: Describing and Executing Graph
                                  Algorithms in Haskell  . . . . . . . . . 153--167
               Kenny Q. Zhu and   
            Kathleen Fisher and   
                   David Walker   LearnPADS$^{++}$: Incremental Inference
                                  of Ad Hoc Data Formats . . . . . . . . . 168--182
             Jeroen Bransen and   
                Arie Middelkoop   The Kennedy--Warren Algorithm Revisited:
                                  Ordering Attribute Grammars  . . . . . . 183--197
               Nicholas Coleman   Distributed Policy Specification and
                                  Interpretation with Classified
                                  Advertisements . . . . . . . . . . . . . 198--211
                  Andy Gill and   
            Bowe Neuenschwander   Handshaking in Kansas Lava Using Patch
                                  Logic  . . . . . . . . . . . . . . . . . 212--226
       Daniel Winograd-Cort and   
                    Hai Liu and   
                     Paul Hudak   Virtualizing Real-World Objects in FRP   227--241
                Edwin Brady and   
                  Kevin Hammond   Resource-Safe Systems Programming with
                                  Embedded Domain Specific Languages . . . 242--257
               David Broman and   
                 Henrik Nilsson   Node-Based Connection Semantics for
                                  Equation-Based Object-Oriented Modeling
                                  Languages  . . . . . . . . . . . . . . . 258--272
                     Paul Tarau   A Declarative Specification of
                                  Tree-Based Symbolic Arithmetic
                                  Computations . . . . . . . . . . . . . . 273--288
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7150, 2012

               Aminul Haque and   
         Saadat M. Alhashmi and   
            Rajendran Parthiban   An Inspiration for Solving Grid Resource
                                  Management Problems Using Multiple
                                  Economic Models  . . . . . . . . . . . . 1--16
         Melanie Siebenhaar and   
         The An Binh Nguyen and   
               Ulrich Lampe and   
            Dieter Schuller and   
                 Ralf Steinmetz   Concurrent Negotiations in Cloud-Based
                                  Systems  . . . . . . . . . . . . . . . . 17--31
              Joris Roovers and   
           Kurt Vanmechelen and   
                 Jan Broeckhove   A Reverse Auction Market for Cloud
                                  Resources  . . . . . . . . . . . . . . . 32--45
      Mohammad Mahdi Kashef and   
              Jörn Altmann   A Cost Model for Hybrid Clouds . . . . . 46--60
            Hristo Stefanov and   
             Slinger Jansen and   
           Ronald Batenburg and   
         Eugene van Heusden and   
                    Ravi Khadka   How to Do Successful Chargeback for
                                  Cloud Services . . . . . . . . . . . . . 61--75
          Andreas Menychtas and   
        Sergio Garcia Gomez and   
           Andrea Giessmann and   
                 Anna Gatzioura   A Marketplace Framework for Trading
                                  Cloud-Based Services . . . . . . . . . . 76--89
        Mario Macías and   
                  Jordi Guitart   Client Classification Policies for SLA
                                  Negotiation and Allocation in Shared
                                  Cloud Datacenters  . . . . . . . . . . . 90--104
                  Wei Zheng and   
              Rizos Sakellariou   Budget-Deadline Constrained Workflow
                                  Planning for Admission Control in
                                  Market-Oriented Environments . . . . . . 105--119
                   Wubin Li and   
             Johan Tordsson and   
                   Erik Elmroth   Virtual Machine Placement for
                                  Predictable and Time-Constrained Peak
                                  Loads  . . . . . . . . . . . . . . . . . 120--134
                 Ioan Petri and   
               Omer F. Rana and   
              Yacine Regzui and   
        Gheorghe Cosmin Silaghi   Risk Assessment in Service Provider
                                  Communities  . . . . . . . . . . . . . . 135--147
Jörn Künsemöller and   
                    Holger Karl   A Game-Theoretical Approach to the
                                  Benefits of Cloud Computing  . . . . . . 148--160
        Shubhashis Sengupta and   
                 K. M. Annervaz   Planning for Optimal Multi-site Data
                                  Distribution for Disaster Recovery . . . 161--172
                    Wei Shi and   
                  Dapeng Ju and   
                 Dongsheng Wang   Saga: a Cost Efficient File System Based
                                  on Cloud Storage Service . . . . . . . . 173--184
             A. Stephen McGough   Developing a Cost-Effective Virtual
                                  Cluster on the Cloud . . . . . . . . . . 185--197
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7151, 2012

      Dominique Méry and   
             Neeraj Kumar Singh   Medical Protocol Diagnosis Using Formal
                                  Methods  . . . . . . . . . . . . . . . . 1--20
                 Jim Davies and   
             Jeremy Gibbons and   
             Radu Calinescu and   
           Charles Crichton and   
               Steve Harris and   
                    Andrew Tsui   Form Follows Function  . . . . . . . . . 21--38
         Thomas Hildebrandt and   
      Raghava Rao Mukkamala and   
                    Tijs Slaats   Declarative Modelling and Safe
                                  Distribution of Healthcare Workflows . . 39--56
        Cristiano Bertolini and   
          Martin Schäf and   
                   Volker Stolz   Towards a Formal Integrated Model of
                                  Collaborative Healthcare Workflows . . . 57--74
             Wendy MacCaull and   
                    Fazle Rabbi   NOVA Workflow: a Workflow Management
                                  Tool Targeting Health Services Delivery  75--92
               Jozef Hooman and   
     Robert Huis in 't Veld and   
                 Mathijs Schuts   Experiences with a Compositional Model
                                  Checker in the Healthcare Domain . . . . 93--110
                Fazle Rabbi and   
        Ahmed Shah Mashiyat and   
                 Wendy MacCaull   Model Checking Workflow Monitors and Its
                                  Application to a Pain Management Process 111--128
         Deshendran Moodley and   
            Anban W. Pillay and   
       Christopher J. Seebregts   Position Paper: Researching and
                                  Developing Open Architectures for
                                  National Health Information Systems in
                                  Developing African Countries . . . . . . 129--139
      Dominique Méry and   
             Neeraj Kumar Singh   Formalization of Heart Models Based on
                                  the Conduction of Electrical Impulses
                                  and Cellular Automata  . . . . . . . . . 140--159
                     Hao Xu and   
                    Tom Maibaum   An Event-B Approach to Timing Issues
                                  Applied to the Generic Insulin Infusion
                                  Pump . . . . . . . . . . . . . . . . . . 160--176
       Jens H. Weber-Jahnke and   
           Fieran Mason-Blakley   On the Safety of Electronic Medical
                                  Records  . . . . . . . . . . . . . . . . 177--194
               Naipeng Dong and   
                Hugo Jonker and   
                       Jun Pang   Challenges in eHealth: From Enabling to
                                  Enforcing Privacy  . . . . . . . . . . . 195--206
   Samuel Tusubira Kalyango and   
                  Gilbert Maiga   A Technique for Strengthening Weak
                                  Passwords in Electronic Medical Record
                                  Systems  . . . . . . . . . . . . . . . . 207--224
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7152, 2012

                  Wolfgang Paul   Cyber War, Formal Verification and
                                  Certified Infrastructure . . . . . . . . 1--1
                Paolo Herms and   
       Claude Marché and   
                Benjamin Monate   A Certified Multi-prover Verification
                                  Condition Generator  . . . . . . . . . . 2--17
            Sabine Schmaltz and   
                 Andrey Shadrin   Integrated Semantics of
                                  Intermediate-Language C and
                                  Macro-Assembler for Pervasive Formal
                                  Verification of Operating Systems and
                                  Hypervisors from VerisoftXT  . . . . . . 18--33
          Gregory Kulczycki and   
                  Hampton Smith   The Location Linking Concept: a Basis
                                  for Verification of Code Using Pointers  34--49
          Nadia Polikarpova and   
                 Micha\l Moskal   Verifying Implementations of Security
                                  Protocols by Refinement  . . . . . . . . 50--65
                Thomas Wies and   
         Marco Muñiz and   
                  Viktor Kuncak   Deciding Functional Lists with Sublist
                                  Sets . . . . . . . . . . . . . . . . . . 66--81
                  K. Rustan and   
                       M. Leino   Developing Verified Programs with Dafny  82--82
Jean-Christophe Filliâtre   Verifying Two Lines of C with Why3: An
                                  Exercise in Program Verification . . . . 83--97
Milena Vujo\vsevi\'c-Jani\vci\'c and   
                  Viktor Kuncak   Development and Evaluation of LAV: An
                                  SMT-Based Error Finding Platform . . . . 98--113
               Martin Brain and   
                Florian Schanda   A Lightweight Technique for Distributed
                                  and Incremental Program Verification . . 114--129
                Loren Segal and   
                 Patrice Chalin   A Comparison of Intermediate
                                  Verification Languages: Boogie and
                                  Sireum/Pilar . . . . . . . . . . . . . . 130--145
               Florian Merz and   
                  Stephan Falke   LLBMC: Bounded Model Checking of C and
                                  C++ Programs Using a Compiler IR . . . . 146--161
                 Rupak Majumdar   The Marriage of Exploration and
                                  Deduction  . . . . . . . . . . . . . . . 162--162
            Nguyen Van Tang and   
                  Daisuke Souma   Modeling and Validating the Train Fare
                                  Calculation and Adjustment System Using
                                  VDM++  . . . . . . . . . . . . . . . . . 163--178
             Hannes Mehnert and   
              Filip Sieczkowski   Formalized Verification of Snapshotable
                                  Trees: Separation and Sharing  . . . . . 179--195
         Ioannis T. Kassios and   
              Peter Müller   Comparing Verification Condition
                                  Generation with Symbolic Execution: An
                                  Experience Report  . . . . . . . . . . . 196--208
              Eyad Alkassar and   
                Ernie Cohen and   
                Mikhail Kovalev   Verification of TLB Virtualization
                                  Implemented in C . . . . . . . . . . . . 209--224
              Amalinda Post and   
                Jochen Hoenicke   Formalization and Analysis of Real-Time
                                  Requirements: a Feasibility Study at
                                  BOSCH  . . . . . . . . . . . . . . . . . 225--240
              Francesco Logozzo   Our Experience with the CodeContracts
                                  Static Checker . . . . . . . . . . . . . 241--242
      Abderrahmane Feliachi and   
            Marie-Claude Gaudel   Isabelle/Circus: a Process Specification
                                  and Verification Environment . . . . . . 243--260
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7153, 2012

               Thomas Eiter and   
        Thomas Krennwallner and   
           Patrik Schneider and   
                    Guohui Xiao   Uniform Evaluation of Nonmonotonic
                                  DL-Programs  . . . . . . . . . . . . . . 1--22
              Thomas Schwentick   Foundations of XML Based on Logic and
                                  Automata: a Snapshot . . . . . . . . . . 23--33
                Ofer Arieli and   
                  Anna Zamansky   Inconsistency-Tolerance in
                                  Knowledge-Based Systems by
                                  Dissimilarities  . . . . . . . . . . . . 34--50
             Joachim Biskup and   
                Cornelia Tadros   Revising Belief without Revealing
                                  Secrets  . . . . . . . . . . . . . . . . 51--70
           Jürgen Bock and   
          Sebastian Rudolph and   
                 Michael Mutter   More Than the Sum of Its Parts ---
                                  Holistic Ontology Alignment by
                                  Population-Based Optimisation  . . . . . 71--90
          Luciano Caroprese and   
                  Ester Zumpano   Handling Preferences in P2P Systems  . . 91--106
               Andrea Cohen and   
 Alejandro J. García and   
            Guillermo R. Simari   Backing and Undercutting in Abstract
                                  Argumentation Frameworks . . . . . . . . 107--123
      George H. L. Fletcher and   
               Marc Gyssens and   
              Dirk Leinders and   
        Jan Van den Bussche and   
                 Dirk Van Gucht   The Impact of Transitive Closure on the
                                  Boolean Expressiveness of Navigational
                                  Query Languages on Graphs  . . . . . . . 124--143
                Eve Garnaud and   
             Sofian Maabout and   
                 Mohamed Mosbah   Using Functional Dependencies for
                                  Reducing the Size of a Data Cube . . . . 144--163
              Sven Hartmann and   
        Henning Köhler and   
             Sebastian Link and   
              Bernhard Thalheim   Armstrong Databases and Reasoning for
                                  Functional Dependencies and Cardinality
                                  Constraints over Partial Bags  . . . . . 164--183
              Stephen J. Hegner   FD Covers and Universal Complements of
                                  Simple Projections . . . . . . . . . . . 184--202
         Gyula O. H. Katona and   
       Krisztián Tichler   Encoding Databases Satisfying a Given
                                  Set of Dependencies  . . . . . . . . . . 203--223
         Annika Krämer and   
              Christoph Beierle   On Lifted Inference for a Relational
                                  Probabilistic Conditional Logic with
                                  Maximum Entropy Semantics  . . . . . . . 224--243
András J. Molnár and   
András A. Benczúr and   
Csaba István Sidló   Flexible and Efficient Distributed
                                  Resolution of Large Entities . . . . . . 244--263
       Aleksandar Perovi\'c and   
               Dragan Doder and   
             Zoran Ognjanovi\'c   On Real-Valued Evaluation of
                                  Propositional Formulas . . . . . . . . . 264--277
             Olivier Pivert and   
                    Henri Prade   Detecting Suspect Answers in the
                                  Presence of Inconsistent Information . . 278--297
       Krishnan Rajagopalan and   
       Venkatesh Srinivasan and   
                     Alex Thomo   Learning the News in Social Networks . . 298--311
                Abdur Rakib and   
        Rokan Uddin Faruqui and   
                 Wendy MacCaull   Verifying Resource Requirements for
                                  Ontology-Driven Rule-Based Agents  . . . 312--331
         Martín Rezk and   
                  Michael Kifer   Formalizing Production Systems with
                                  Rule-Based Ontologies  . . . . . . . . . 332--351
           Domenico Sacc\`a and   
              Edoardo Serra and   
                Antonella Guzzo   Count Constraints and the Inverse OLAP
                                  Problem: Definition, Complexity and a
                                  Step toward Aggregate Data Exchange  . . 352--369
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7154, 2012

                  N. Asokan and   
                    Cynthia Kuo   Usable Mobile Security . . . . . . . . . 1--6
             Dusko Pavlovic and   
              Catherine Meadows   Actor-Network Procedures . . . . . . . . 7--26
                    Yoram Moses   Knowledge as a Window into Distributed
                                  Coordination . . . . . . . . . . . . . . 27--34
                Lynne E. Parker   Decision Making as Optimization in
                                  Multi-robot Teams  . . . . . . . . . . . 35--49
          Nibedita Adhikari and   
                 C. R. Tripathy   Mstar: a New Two Level Interconnection
                                  Network  . . . . . . . . . . . . . . . . 50--61
                 C. Anudeep and   
                  Manik Lal Das   An Improved Scheme for False Data
                                  Filtering in Wireless Sensor Networks    62--70
        Jhansi Vazram Bolla and   
         Valli Kumari Vatsavayi   Anonymity and Security in Mobile Ad Hoc
                                  Networks . . . . . . . . . . . . . . . . 71--82
                 Ayan Dutta and   
            Sruti Gan Chaudhuri   Circle Formation by Asynchronous Fat
                                  Robots with Limited Visibility . . . . . 83--93
                  V. Geetha and   
                    N. Sreenath   High Concurrency for Continuously
                                  Evolving OODBMS  . . . . . . . . . . . . 94--105
           J. Hanumanthappa and   
                 D. H. Manjaiah   A New Scheme for IPv6 BD-TTCS Translator 106--116
     Shankara Narayanan Krishna   Nash Equilibrium in Weighted Concurrent
                                  Timed Games with Reachability Objectives 117--128
                Tarun Kumar and   
           Parikshit Sondhi and   
                  Ankush Mittal   Parallelization of PageRank on Multicore
                                  Processors . . . . . . . . . . . . . . . 129--140
              Chun-Guang Ma and   
                  Ding Wang and   
                  Qi-Ming Zhang   Cryptanalysis and Improvement of Sood et
                                  al.'s Dynamic ID-Based Authentication
                                  Scheme . . . . . . . . . . . . . . . . . 141--152
            Hrushikesha Mohanty   An Algebra of Social Distance  . . . . . 153--165
                Anil Mundra and   
             Anish Mathuria and   
                  Manik Lal Das   Detecting Flaws in Dynamic Hierarchical
                                  Key Management Schemes Using
                                  Specification Animation  . . . . . . . . 166--176
           Bhawani S. Panda and   
            D. Pushparaj Shetty   Strong Minimum Energy Minimum
                                  Interference Topology in Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 177--187
                 Arun Pande and   
               Sanjay Kimbahune   Distributed Processing and Internet
                                  Technology to Solve Challenges of
                                  Primary Healthcare in India  . . . . . . 188--199
                Nidhi Patel and   
              Sanjay Srivastava   Packet Forwarding Strategies for
                                  Cooperation Enforcement in Mobile Ad Hoc
                                  Wireless Networks  . . . . . . . . . . . 200--211
    R. S. M. Lakshmi Patibandla   A Study on Scalability of Services and
                                  Privacy Issues in Cloud Computing  . . . 212--230
                Chhavi Rana and   
              Sanjay Kumar Jain   A Recommendation Model for Handling
                                  Dynamics in User Profile . . . . . . . . 231--241
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7155, 2012

       Beniamino Di Martino and   
                     Dana Petcu   CCPI 2011: Workshop on Cloud Computing
                                  Projects and Initiatives . . . . . . . . 1--3
        Magdalena Slawinska and   
         Jaroslaw Slawinski and   
                 Vaidy Sunderam   Towards Cross-Platform Cloud Computing   5--14
           Giuseppe Cicotti and   
            Luigi Coppolino and   
          Rosario Cristaldi and   
        Salvatore D'Antonio and   
                   Luigi Romano   QoS Monitoring in a Cloud Services
                                  Environment: The SRT-15 Approach . . . . 15--24
              Daniele Lezzi and   
             Roger Rafanell and   
        Abel Carrión and   
    Ignacio Blanquer Espert and   
       Vicente Hernández   Enabling e-Science Applications on the
                                  Cloud with COMPSs  . . . . . . . . . . . 25--34
     Spyridon V. Gogouvitis and   
          George Kousiouris and   
            George Vafiadis and   
             Elliot K. Kolodner   OPTIMIS and VISION Cloud: How to Manage
                                  Data in Clouds . . . . . . . . . . . . . 35--44
           Roberto Palmieri and   
        Pierangelo di Sanzo and   
          Francesco Quaglia and   
                   Paolo Romano   Integrated Monitoring of Infrastructures
                                  and Applications in Cloud Environments   45--53
          Siegfried Benkner and   
               Jesus Bisbal and   
        Gerhard Engelbrecht and   
                Rod D. Hose and   
               Yuriy Kaniovskyi   Towards Collaborative Data Management in
                                  the VPH-Share Project  . . . . . . . . . 54--63
          Matti Heikkurinen and   
                  Owen Appleton   SLM and SDM Challenges in Federated
                                  Infrastructures  . . . . . . . . . . . . 64--72
                 Houssam Haitof   Rapid Prototyping of Architectures on
                                  the Cloud Using Semantic Resource
                                  Description  . . . . . . . . . . . . . . 73--82
     Teodor-Florin Forti\cs and   
          Gorka Esnal Lopez and   
        Imanol Padillo Cruz and   
       Gábor Ferschl and   
       Tamás Máhr   Cloud Patterns for mOSAIC-Enabled
                                  Scientific Applications  . . . . . . . . 83--93
                   A. Cuomo and   
                     M. Rak and   
             S. Venticinque and   
                     U. Villano   Enhancing an Autonomic Cloud
                                  Architecture with Mobile Agents  . . . . 94--103
              Yih Leong Sun and   
             Terence Harmer and   
               Alan Stewart and   
                   Peter Wright   Mapping Application Requirements to
                                  Cloud Resources  . . . . . . . . . . . . 104--112
            Marco Danelutto and   
Frédéric Desprez and   
             Vladimir Getov and   
               Wolfgang Ziegler   CoreGRID/ERCIM Workshop on Grids, Clouds
                                  and P2P Computing --- CGWS2011 . . . . . 113--114
         Françoise Baude   A Perspective on the CoreGRID Grid
                                  Component Model  . . . . . . . . . . . . 115--116
             Cristian Klein and   
         Christian Pérez   Towards Scheduling Evolving Applications 117--127
            Marco Danelutto and   
              P. Kilpatrick and   
              C. Montangero and   
                      L. Semini   Model Checking Support for Conflict
                                  Resolution in Multiple Non-functional
                                  Concern Management . . . . . . . . . . . 128--138
             Carlo Bertolli and   
          Gabriele Mencagli and   
                Marco Vanneschi   Consistent Rollback Protocols for
                                  Autonomic ASSISTANT Applications . . . . 139--148
     Dominik Meiländer and   
            Alexander Ploss and   
               Frank Glinka and   
                Sergei Gorlatch   A Dynamic Resource Management System for
                                  Real-Time Online Applications on Clouds  149--158
           Emanuele Carlini and   
            Massimo Coppola and   
             Patrizio Dazzi and   
                Laura Ricci and   
               Giacomo Righetti   Cloud Federations in Contrail  . . . . . 159--168
      Muhammad Junaid Malik and   
           Thomas Fahringer and   
                    Radu Prodan   Semi-automatic Composition of Ontologies
                                  for ASKALON Grid Workflows . . . . . . . 169--180
    Vilmos Rajcsányi and   
            Zsolt Németh   The Chemical Machine: an Interpreter for
                                  the Higher Order Chemical Language . . . 181--190
             Carlo Bertolli and   
                 Adam Betts and   
             Gihan Mudalige and   
                 Mike Giles and   
                     Paul Kelly   Design and Performance of the OP2
                                  Library for Unstructured Mesh
                                  Applications . . . . . . . . . . . . . . 191--200
                 Raja Tlili and   
                  Yahya Slimani   Mining Association Rules on Grid
                                  Platforms  . . . . . . . . . . . . . . . 201--210
           Stephen L. Scott and   
     Geoffroy Vallée and   
                Thomas Naughton   5th Workshop on System-Level
                                  Virtualization for High Performance
                                  Computing (HPCVirt 2011) . . . . . . . . 211--211
                  Qasim Ali and   
         Vladimir Kiriansky and   
                Josh Simons and   
                   Puneet Zaroo   Performance Evaluation of HPC Benchmarks
                                  on VMware's ESXi Server  . . . . . . . . 213--222
          Benjamin Serebrin and   
                   Daniel Hecht   Virtualizing Performance Counters  . . . 223--233
            Thomas Naughton and   
     Geoffroy Vallée and   
        Christian Engelmann and   
               Stephen L. Scott   A Case for Virtual Machine Based Fault
                                  Injection in a High-Performance
                                  Computing Environment  . . . . . . . . . 234--243
             Martti Forsell and   
      Jesper Larsson Träff   HPPC 2010: 5th Workshop on Highly
                                  Parallel Processing on a Chip  . . . . . 245--247
                Fuat Keceli and   
              Tali Moreshet and   
                    Uzi Vishkin   Thermal Management of a Many-Core
                                  Processor under Fine-Grained Parallelism 249--259
                  Paul Keir and   
          Paul W. Cockshott and   
                Andrew Richards   Mainstream Parallel Array Programming on
                                  Cell . . . . . . . . . . . . . . . . . . 260--269
           Richard Membarth and   
            Anton Lokhmotov and   
              Jürgen Teich   Generating GPU Code from a High-Level
                                  Representation for Image Processing
                                  Kernels  . . . . . . . . . . . . . . . . 270--280
           Thomas Canhao Xu and   
             Pasi Liljeberg and   
                 Hannu Tenhunen   A Greedy Heuristic Approximation
                                  Scheduling Algorithm for $3$D Multicore
                                  Processors . . . . . . . . . . . . . . . 281--291
           Stefania Corsaro and   
             Pasqua D'Ambra and   
                Francesca Perla   Algorithms and Programming Tools for
                                  Next-Generation High-Performance
                                  Scientific Software HPSS 2011  . . . . . 293--294
                   Iain S. Duff   European Exascale Software Initiative:
                                  Numerical Libraries, Solvers and
                                  Algorithms . . . . . . . . . . . . . . . 295--304
        Hasan Metin Aktulga and   
                  Chao Yang and   
Ümit V. Çatalyürek and   
               Pieter Maris and   
                  James P. Vary   On Reducing I/O Overheads in Large-Scale
                                  Invariant Subspace Projections . . . . . 305--314
                Chris Baker and   
                 Erik Boman and   
                Mike Heroux and   
                Eric Keiter and   
          Siva Rajamanickam and   
                    Rich Schiek   Enabling Next-Generation Parallel
                                  Circuit Simulation with Trilinos . . . . 315--323
             Martin Berzins and   
                Qingyu Meng and   
               John Schmidt and   
            James C. Sutherland   DAG-Based Software Frameworks for PDEs   324--333
                 Kamer Kaya and   
François-Henry Rouet and   
               Bora Uçar   On Partitioning Problems with Complex
                                  Objectives . . . . . . . . . . . . . . . 334--344
          Ichitaro Yamazaki and   
                     Kesheng Wu   A Communication-Avoiding Thick-Restart
                                  Lanczos Method on a Distributed-Memory
                                  System . . . . . . . . . . . . . . . . . 345--354
          Ioan Ovidiu Hupca and   
                Joel Falcou and   
              Laura Grigori and   
                  Radek Stompor   Spherical Harmonic Transform with GPUs   355--366
            Davide Barbieri and   
         Valeria Cardellini and   
        Salvatore Filippone and   
                  Damian Rouson   Design Patterns for Scientific
                                  Computations on Sparse Matrices  . . . . 367--376
Hans Henrik Brandenborg Sòrensen   High-Performance Matrix-Vector
                                  Multiplication on the GPU  . . . . . . . 377--386
               Jens Gustedt and   
             Emmanuel Jeanvoine   Relaxed Synchronization with Ordered
                                  Read-Write Locks . . . . . . . . . . . . 387--397
       Ernesto E. Prudencio and   
                 Karl W. Schulz   The Parallel C++ Statistical Library
                                  `QUESO': Quantification of Uncertainty
                                  for Estimation, Simulation and
                                  Optimization . . . . . . . . . . . . . . 398--407
         Jan Dünnweber and   
          Valentin Mihaylov and   
       René Glettler and   
             Volker Maiborn and   
                   Holger Wolff   Use of HPC-Techniques for Large-Scale
                                  Data Migration . . . . . . . . . . . . . 408--415
                 George Bosilca   Algorithms, Models and Tools for
                                  Parallel Computing on Heterogeneous
                                  Platforms (HeteroPar 2011) . . . . . . . 417--417
            Jean-Marc Nicod and   
           Laurent Philippe and   
                    Lamiel Toch   A Genetic Algorithm with Communication
                                  Costs to Schedule Workflows on a
                                  SOA-Grid . . . . . . . . . . . . . . . . 419--428
                 Jinpil Lee and   
             Minh Tuan Tran and   
            Tetsuya Odajima and   
               Taisuke Boku and   
                 Mitsuhisa Sato   An Extension of XcalableMP PGAS
                                  Lanaguage for Multi-node GPU Clusters    429--439
            Hamid Arabnejad and   
               Jorge G. Barbosa   Performance Evaluation of List Based
                                  Scheduling on Heterogeneous Systems  . . 440--449
               David Clarke and   
         Alexey Lastovetsky and   
               Vladimir Rychkov   Column-Based Matrix Partitioning for
                                  Parallel Matrix Multiplication on
                                  Heterogeneous Processors Based on
                                  Functional Performance Models  . . . . . 450--459
           Gennaro Cordasco and   
          Rosario De Chiara and   
                Ada Mancuso and   
               Dario Mazzeo and   
               Vittorio Scarano   A Framework for Distributing Agent-Based
                                  Simulations  . . . . . . . . . . . . . . 460--470
            Jacques M. Bahi and   
     Raphaël Couturier and   
             Lilia Ziane Khodja   Parallel Sparse Linear Solver GMRES for
                                  GPU Clusters with Compression of
                                  Exchanged Data . . . . . . . . . . . . . 471--480
         Marek B\la\.zewicz and   
         Mi\losz Ci\.znicki and   
                Piotr Kopta and   
         Krzysztof Kurowski and   
                Pawe\l Lichocki   Two-Dimensional Discrete Wavelet
                                  Transform on Large Images for Hybrid
                                  Computing Architectures: GPU and CELL    481--490
            Aleksandar Ilic and   
                   Leonel Sousa   Scheduling Divisible Loads on
                                  Heterogeneous Desktop Systems with
                                  Limited Memory . . . . . . . . . . . . . 491--501
Ma. Guadalupe Sánchez and   
              Vicente Vidal and   
                 Jordi Bataller   Peer Group and Fuzzy Metric to Remove
                                  Noise in Images Using Heterogeneous
                                  Computing  . . . . . . . . . . . . . . . 502--510
           Girish Nandagudi and   
             Jaspal Subhlok and   
              Edgar Gabriel and   
                  Judit Gimenez   Estimation of MPI Application
                                  Performance on Volunteer Environments    511--520
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7156, 2012

                Mario Cannataro   HiBB 2011: $ 2^{\rm nd} $ Workshop on
                                  High Performance Bioinformatics and
                                  Biomedicine  . . . . . . . . . . . . . . 1--2
            Marco Aldinucci and   
                Mario Coppo and   
          Ferruccio Damiani and   
            Maurizio Drocco and   
                    Eva Sciacca   On Parallelizing On-Line Statistics for
                                  Stochastic Biological Simulations  . . . 3--12
    Astrid Rheinländer and   
                      Ulf Leser   Scalable Sequence Similarity Search and
                                  Join in Main Memory on Multi-cores . . . 13--22
              Gaurang Mehta and   
                Ewa Deelman and   
           James A. Knowles and   
                  Ting Chen and   
                  Ying Wang and   
              Jens Vöckler   Enabling Data and Compute Intensive
                                  Workflows in Bioinformatics  . . . . . . 23--32
               Luigi Grasso and   
        Nuria Medina-Medina and   
      Rosana Montes-Soldado and   
      María M. Abad-Grau   Homogenizing Access to Highly
                                  Time-Consuming Biomedical Applications
                                  through a Web-Based Interface  . . . . . 33--42
            Mario Cannataro and   
             Pietro Hiram Guzzi   Distributed Management and Analysis of
                                  Omics Data . . . . . . . . . . . . . . . 43--52
              Thomas Schaaf and   
         Adam S. Z. Belloum and   
              Owen Appleton and   
   Joan Serrat-Fernández   Managing and Delivering Grid Services
                                  (MDGS) . . . . . . . . . . . . . . . . . 53--53
             Gilles Mathieu and   
        Hél\`ene Cordier   Resource Allocation for the French
                                  National Grid Initiative . . . . . . . . 55--63
          Tomasz Szepieniec and   
               Joanna Kocot and   
              Thomas Schaaf and   
              Owen Appleton and   
              Matti Heikkurinen   On Importance of Service Level
                                  Management in Grids  . . . . . . . . . . 64--75
              Bartosz Balis and   
               Renata Slota and   
             Jacek Kitowski and   
                   Marian Bubak   On-Line Monitoring of Service-Level
                                  Agreements in the Grid . . . . . . . . . 76--85
                     Dana Petcu   Challenges of Future e-Infrastructure
                                  Governance . . . . . . . . . . . . . . . 86--95
          Antonella Galizia and   
            Alfonso Quarati and   
          Michael Schiffers and   
                Mark Yampolskiy   Influences between Performance Based
                                  Scheduling and Service Level Agreements  96--105
           Massimiliano Rak and   
               Rocco Aversa and   
      Salvatore Venticinque and   
           Beniamino Di Martino   User Centric Service Level Management in
                                  mOSAIC Applications  . . . . . . . . . . 106--115
           Reginald Cushing and   
           Spiros Koulouzis and   
           Rudolf Strijkers and   
         Adam S. Z. Belloum and   
                   Marian Bubak   Service Level Management for Executable
                                  Papers . . . . . . . . . . . . . . . . . 116--123
              Silvia Knittl and   
              Thomas Schaaf and   
               Ilya Saverchenko   Change Management in e-Infrastructures
                                  to Support Service Level Agreements  . . 124--133
                 Michael Gerndt   PROPER 2011: Fourth Workshop on
                                  Productivity and Performance Tools for
                                  HPC Application Development  . . . . . . 135--135
             Olaf Krzikalla and   
               Kim Feldhoff and   
Ralph Müller-Pfefferkorn and   
              Wolfgang E. Nagel   Scout: a Source-to-Source Transformator
                                  for SIMD-Optimizations . . . . . . . . . 137--145
               Yury Oleynik and   
                 Michael Gerndt   Scalable Automatic Performance Analysis
                                  on IBM BlueGene/P Systems  . . . . . . . 146--155
                Wyatt Spear and   
            Allen D. Malony and   
               Chee Wai Lee and   
           Scott Biersdorff and   
                  Sameer Shende   An Approach to Creating Performance
                                  Visualizations in a Parallel Profile
                                  Analysis Tool  . . . . . . . . . . . . . 156--165
           N. Dandapanthula and   
               H. Subramoni and   
                  J. Vienne and   
                K. Kandalla and   
                     S. Sur and   
           Dhabaleswar K. Panda   INAM --- a Scalable InfiniBand Network
                                  Analysis and Monitoring Tool . . . . . . 166--177
              Ananta Tiwari and   
      Michael A. Laurenzano and   
           Laura Carrington and   
                  Allan Snavely   Auto-tuning for Energy Usage in
                                  Scientific Applications  . . . . . . . . 178--187
         Pasquale Cantiello and   
           Beniamino Di Martino   Automatic Source Code Transformation for
                                  GPUs Based on Program Comprehension  . . 188--197
         Christian Iwainsky and   
            Ralph Altenfeld and   
              Dieter an Mey and   
              Christian Bischof   Enhancing Brainware Productivity through
                                  a Performance Tuning Workflow  . . . . . 198--207
           Stephen L. Scott and   
     Chokchai (Box) Leangsuksun   Workshop on Resiliency in High
                                  Performance Computing (Resilience) in
                                  Clusters, Clouds, and Grids  . . . . . . 209--209
           Patricia Kovatch and   
              Matthew Ezell and   
                     Ryan Braby   The Malthusian Catastrophe Is Upon Us!
                                  Are the Largest HPC Machines Ever Up?    211--220
                Rolf Riesen and   
           Kurt B. Ferreira and   
          Maria Ruiz Varela and   
             Michela Taufer and   
                 Arun Rodrigues   Simulating Application Resilience at
                                  Exascale . . . . . . . . . . . . . . . . 221--230
                  J. Brandt and   
                    F. Chen and   
                 A. Gentile and   
 Chokchai (Box) Leangsuksun and   
                    J. Mayo and   
                   P. Pebay and   
                         D. Roe   Framework for Enabling System
                                  Understanding  . . . . . . . . . . . . . 231--240
         Patrick G. Bridges and   
               Mark Hoemmen and   
           Kurt B. Ferreira and   
          Michael A. Heroux and   
                 Philip Soltero   Cooperative Application/OS DRAM Fault
                                  Recovery . . . . . . . . . . . . . . . . 241--250
                David Fiala and   
           Kurt B. Ferreira and   
              Frank Mueller and   
            Christian Engelmann   A Tunable, Software-Based DRAM Error
                                  Detection and Correction Library for HPC 251--261
  José Carlos Sancho and   
              Ana Jokanovic and   
                  Jesus Labarta   Reducing the Impact of Soft Errors on
                                  Fabric-Based Collective Communications   262--271
                     Zhe Ma and   
             Trevor Carlson and   
                Wim Heirman and   
                Lieven Eeckhout   Evaluating Application Vulnerability to
                                  Soft Errors in Multi-level Cache
                                  Hierarchy  . . . . . . . . . . . . . . . 272--281
        Nathan DeBardeleben and   
             Sean Blanchard and   
                 Qiang Guan and   
               Ziming Zhang and   
                        Song Fu   Experimental Framework for Injecting
                                  Logic Errors in a Virtual Machine to
                                  Profile Applications for Soft Error
                                  Resilience . . . . . . . . . . . . . . . 282--291
 Thanadech Thanakornworakij and   
               Rajan Sharma and   
             Blaine Scroggs and   
     Chokchai (Box) Leangsuksun   High Availability on Cloud with HA-OSCAR 292--301
             Dewan Ibtesham and   
              Dorian Arnold and   
           Kurt B. Ferreira and   
             Patrick G. Bridges   On the Viability of Checkpoint
                                  Compression for Extreme Scale Fault
                                  Tolerance  . . . . . . . . . . . . . . . 302--311
 Raghunath Rajachandrasekar and   
           Xiangyong Ouyang and   
            Xavier Besseron and   
                 Vilobh Meshram   Can Checkpoint/Restart Mechanisms
                                  Benefit from Hierarchical Data Staging?  312--321
            Xavier Besseron and   
                Thierry Gautier   Impact of Over-Decomposition on
                                  Coordinated Checkpoint/Rollback Protocol 322--332
                Anders Hast and   
         Josef Weidendorfer and   
              Jan-Philipp Weiss   UCHPC 2011: Fourth Workshop on
                                  UnConventional High Performance
                                  Computing  . . . . . . . . . . . . . . . 333--334
           Tetsuro Horikawa and   
               Michio Honda and   
               Jin Nakazawa and   
          Kazunori Takashio and   
                Hideyuki Tokuda   PACUE: Processor Allocator Considering
                                  User Experience  . . . . . . . . . . . . 335--344
            Alin Murara\csu and   
         Josef Weidendorfer and   
                     Arndt Bode   Workload Balancing on Heterogeneous
                                  Systems: a Case Study of Sparse Grid
                                  Interpolation  . . . . . . . . . . . . . 345--354
              Tristan Cabel and   
             Joseph Charles and   
        Stéphane Lanteri   Performance Evaluation of a Multi-GPU
                                  Enabled Finite Element Method for
                                  Computational Electromagnetics . . . . . 355--364
           Thomas Canhao Xu and   
             Pasi Liljeberg and   
                 Hannu Tenhunen   Study of Hierarchical $N$-Body Methods
                                  for Network-on-Chip Architectures  . . . 365--374
         Alexander Heinecke and   
              Michael Klemm and   
          Dirk Pflüger and   
                 Arndt Bode and   
          Hans-Joachim Bungartz   Extending a Highly Parallel Data Mining
                                  Algorithm to the
                                  Intel$^{{\textregistered }}$ Many
                                  Integrated Core Architecture . . . . . . 375--384
          Michael Alexander and   
              Gianluigi Zanetti   VHPC 2011: 6th Workshop on
                                  Virtualization in High-Performance Cloud
                                  Computing  . . . . . . . . . . . . . . . 385--385
               Sangwook Kim and   
                 Hwanju Kim and   
                    Joonwon Lee   Group-Based Memory Deduplication for
                                  Virtualized Clouds . . . . . . . . . . . 387--397
          Anastassios Nanos and   
            Nikos Nikoleris and   
         Stratos Psomadakis and   
                Elisavet Kozyri   A Smart HPC Interconnect for Clusters of
                                  Virtual Machines . . . . . . . . . . . . 398--406
        Dimitris Aragiorgis and   
          Anastassios Nanos and   
              Nectarios Koziris   Coexisting Scheduling Policies Boosting
                                  I/O Virtual Machines . . . . . . . . . . 407--415
                J. Briffaut and   
                E. Lefebvre and   
        J. Rouzaud-Cornabas and   
                     C. Toinard   PIGA-Virt: an Advanced Distributed MAC
                                  Protection of Virtual Systems  . . . . . 416--425
          Stefania Costache and   
         Nikos Parlavantzas and   
            Christine Morin and   
                  Samuel Kortas   An Economic Approach for Application QoS
                                  Management in Clouds . . . . . . . . . . 426--435
             Piotr Luszczek and   
                  Eric Meek and   
              Shirley Moore and   
               Dan Terpstra and   
              Vincent M. Weaver   Evaluation of the HPC Challenge
                                  Benchmarks in Virtualized Environments   436--445
             Adrien L\`ebre and   
               Paolo Anedda and   
            Massimo Gaggero and   
                Flavien Quesnel   DISCOVERY, Beyond the Clouds . . . . . . 446--456
            Flavien Quesnel and   
                 Adrien L\`ebre   Cooperative Dynamic Scheduling of
                                  Virtual Machines in Distributed Systems  457--466
             Romeo Kienzler and   
      Rémy Bruggmann and   
          Anand Ranganathan and   
                  Nesime Tatbul   Large-Scale DNA Sequence Analysis in the
                                  Cloud: a Stream-Based Approach . . . . . 467--476
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7157, 2012

                 Peter Widmayer   Combinatorial Optimization with Noisy
                                  Inputs: How Can We Separate the Wheat
                                  from the Chaff?  . . . . . . . . . . . . 1--1
                    Kazuo Iwama   Approximability of Stable Matching
                                  Problems . . . . . . . . . . . . . . . . 2--2
                 Sue Whitesides   On Three-Dimensional Graph Drawing and
                                  Embedding  . . . . . . . . . . . . . . . 3--4
                Takeaki Uno and   
              Ryuhei Uehara and   
               Shin-ichi Nakano   Bounding the Number of Reduced Trees,
                                  Cographs, and Series-Parallel Graphs by
                                  Compression  . . . . . . . . . . . . . . 5--16
                R. Krithika and   
            N. S. Narayanaswamy   Generalized Above Guarantee Vertex Cover
                                  and $r$-Partization  . . . . . . . . . . 17--27
               Sang Won Bae and   
                Kyung-Yong Chwa   Farthest Voronoi Diagrams under Travel
                                  Time Metrics . . . . . . . . . . . . . . 28--39
                   Sang Won Bae   Tight Bound for Farthest-Color Voronoi
                                  Diagrams of Line Segments  . . . . . . . 40--51
          Ananda Swarup Das and   
            Prosenjit Gupta and   
   Anil Kishore Kalavagattu and   
                  Jatin Agarwal   Range Aggregate Maximal Points in the
                                  Plane  . . . . . . . . . . . . . . . . . 52--63
            Trivikram Dokka and   
          Anastasia Kouvela and   
           Frits C. R. Spieksma   Approximating the Multi-level Bottleneck
                                  Assignment Problem . . . . . . . . . . . 64--75
              Nicolas Boria and   
 Jérôme Monnot and   
           Vangelis Th. Paschos   Reoptimization of the Maximum Weighted $
                                  P_k $-Free Subgraph Problem under Vertex
                                  Insertion  . . . . . . . . . . . . . . . 76--87
       Franz J. Brandenburg and   
     Andreas Gleißner and   
               Andreas Hofmeier   Comparing and Aggregating Partial Orders
                                  with Kendall Tau Distances . . . . . . . 88--99
            Biing-Feng Wang and   
               Jhih-Hong Ye and   
                  Pei-Jung Chen   On the Round-Trip $1$-Center and
                                  $1$-Median Problems  . . . . . . . . . . 100--111
          Sammi Abida Salma and   
              Md. Saidur Rahman   Triangle-Free Outerplanar $3$-Graphs Are
                                  Pairwise Compatibility Graphs  . . . . . 112--123
         Tiziana Calamoneri and   
         Rossella Petreschi and   
              Blerina Sinaimeri   On Relaxing the Constraints in Pairwise
                                  Compatibility Graphs . . . . . . . . . . 124--135
          Md. Iqbal Hossain and   
           Debajyoti Mondal and   
          Md. Saidur Rahman and   
              Sammi Abida Salma   Universal Line-Sets for Drawing Planar
                                  $3$-Trees  . . . . . . . . . . . . . . . 136--147
          Stephane Durocher and   
               Debajyoti Mondal   On the Hardness of Point-Set
                                  Embeddability  . . . . . . . . . . . . . 148--159
           Tanaeem M. Moosa and   
             Sumaiya Nazeen and   
            M. Sohel Rahman and   
                   Rezwana Reaz   Linear Time Inference of Strings from
                                  Cover Arrays Using a Binary Alphabet . . 160--172
                Amr Elmasry and   
               Jyrki Katajainen   Fat Heaps without Regular Counters . . . 173--185
                Martin Fink and   
         Jan-Henrik Haunert and   
          Tamara Mchedlidze and   
          Joachim Spoerhase and   
                Alexander Wolff   Drawing Graphs with Vertices at
                                  Specified Positions and Crossings at
                                  Large Angles . . . . . . . . . . . . . . 186--197
        Christian Bachmaier and   
                 Marco Matzeder   Drawing Unordered Trees on $k$-Grids . . 198--210
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7158, 2012

    Stefan Unterschütz and   
           Christian Renner and   
                   Volker Turau   Opportunistic, Receiver-Initiated
                                  Data-Collection Protocol . . . . . . . . 1--16
              Philipp Hurni and   
          Ulrich Bürgi and   
            Markus Anwander and   
                  Torsten Braun   TCP Performance Optimizations for
                                  Wireless Sensor Networks . . . . . . . . 17--32
            Marek Klonowski and   
                    Kamil Wolny   Immune Size Approximation Algorithms in
                                  Ad Hoc Radio Network . . . . . . . . . . 33--48
                  Peng Wang and   
             Chinya Ravishankar   Foisting and Stealing of Keys in Sensor
                                  Networks . . . . . . . . . . . . . . . . 49--64
           Ilias Leontiadis and   
        Christos Efstratiou and   
            Cecilia Mascolo and   
                  Jon Crowcroft   SenShare: Transforming Sensor Networks
                                  into Multi-application Sensing
                                  Infrastructures  . . . . . . . . . . . . 65--81
             Christian Haas and   
              Joachim Wilke and   
              Viktor Stöhr   Realistic Simulation of Energy
                                  Consumption in Wireless Sensor Networks  82--97
                JeongGil Ko and   
                Kevin Klues and   
          Christian Richter and   
                Wanja Hofer and   
                 Branislav Kusy   Low Power or High Performance? A
                                  Tradeoff Whose Time Has Come (and Nearly
                                  Gone)  . . . . . . . . . . . . . . . . . 98--114
            Lanny Sitanayah and   
           Kenneth N. Brown and   
              Cormac J. Sreenan   Fault-Tolerant Relay Deployment Based on
                                  Length-Constrained Connectivity and
                                  Rerouting Centrality in Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 115--130
            Hossein Fotouhi and   
               Marco Zuniga and   
         Mário Alves and   
                Anis Koubaa and   
            Pedro Marrón   Smart-HOP: a Reliable Handoff Mechanism
                                  for Mobile Wireless Sensor Networks  . . 131--146
              Flavio Fabbri and   
               Marco Zuniga and   
         Daniele Puccinelli and   
            Pedro Marrón   On the Optimal Blacklisting Threshold
                                  for Link Selection in Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 147--162
            Paolo Pettinato and   
       Niklas Wirström and   
            Joakim Eriksson and   
                   Thiemo Voigt   Multi-channel Two-Way Time of Flight
                                  Sensor Network Ranging . . . . . . . . . 163--178
            Bernhard Buchli and   
               Felix Sutton and   
                     Jan Beutel   GPS-Equipped Wireless Sensor Network
                                  Node for High-Accuracy Positioning
                                  Applications . . . . . . . . . . . . . . 179--195
      Daniele Alessandrelli and   
            Andrea Azzar\`a and   
            Matteo Petracca and   
          Christian Nastasi and   
                   Paolo Pagano   ScanTraffic: Smart Camera Network for
                                  Traffic Information Collection . . . . . 196--211
               Andrey Somov and   
            Christine C. Ho and   
          Roberto Passerone and   
             James W. Evans and   
                 Paul K. Wright   Towards Extending Sensor Node Lifetime
                                  with Printed Supercapacitors . . . . . . 212--227
           David Hasenfratz and   
                 Olga Saukh and   
                  Lothar Thiele   On-the-Fly Calibration of Low-Cost Gas
                                  Sensors  . . . . . . . . . . . . . . . . 228--244
               Andrey Somov and   
          Alexander Baranov and   
              Alexey Savkin and   
             Mikhail Ivanov and   
                 Lucia Calliari   Energy-Aware Gas Sensing Using Wireless
                                  Sensor Networks  . . . . . . . . . . . . 245--260
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7159, 2012

            Guillaume Barbu and   
             Philippe Hoogvorst   Application-Replay Attack on Java Cards:
                                  When the Garbage Collector Gets Confused 1--13
           Kristian Beckers and   
        Stephan Faßbender   Supporting the Development and
                                  Documentation of ISO 27001 Information
                                  Security Management Systems through
                                  Security Requirements Engineering
                                  Approaches . . . . . . . . . . . . . . . 14--21
            Peter T. Breuer and   
              Jonathan P. Bowen   Typed Assembler for a RISC
                                  Crypto-Processor . . . . . . . . . . . . 22--29
      Matteo Maria Casalino and   
                   Henrik Plate   Transversal Policy Conflict Detection    30--37
              Samson Gejibo and   
               Federico Mancini   Challenges in Implementing an End-to-End
                                  Secure Protocol for Java ME-Based Mobile
                                  Data Collection in Low-Budget Settings   38--45
Máté Kovács and   
                   Helmut Seidl   Runtime Enforcement of Information Flow
                                  Security in Tree Manipulating Processes  46--59
          Massimiliano Masi and   
               Rosario Pugliese   Formalisation and Implementation of the
                                  XACML Access Control Mechanism . . . . . 60--74
           Francisco Moyano and   
          Carmen Fernandez-Gago   A Task Ordering Approach for Automatic
                                  Trust Establishment  . . . . . . . . . . 75--88
           Viet Hung Nguyen and   
                 Fabio Massacci   An Idea of an Independent Validation of
                                  Vulnerability Discovery Models . . . . . 89--96
        Martín Ochoa and   
           Jan Jürjens and   
                Daniel Warzecha   A Sound Decision Procedure for the
                                  Compositionality of Secrecy  . . . . . . 97--105
            Rahul Potharaju and   
                  Andrew Newell   Plagiarizing Smartphone Applications:
                                  Attack Strategies and Defense Techniques 106--120
         Mehrdad Saadatmand and   
              Antonio Cicchetti   Design of Adaptive Security Mechanisms
                                  for Real-Time Embedded Systems . . . . . 121--134
       George Stergiopoulos and   
                   Bill Tsoumas   Hunting Application-Level Logical Errors 135--142
                 Huafei Zhu and   
                      Hong Xiao   Optimal Trust Mining and Computing on
                                  Keyed MapReduce  . . . . . . . . . . . . 143--150
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7160, 2012

                 Solomon Marcus   The Art of Reaching the Age of Sixty . . 1--19
                 Hermann Maurer   Calude as Father of One of the Computer
                                  Science Journals . . . . . . . . . . . . 20--30
           Laurent Bienvenu and   
                 Alexander Shen   Random Semicomputable Reals Revisited    31--45
         Douglas S. Bridges and   
        Luminita S. V\^\i\ct\ua   Constructing the Infimum of Two
                                  Projections  . . . . . . . . . . . . . . 46--58
              Paul Brodhead and   
                 Rod Downey and   
                   Keng Meng Ng   Bounded Randomness . . . . . . . . . . . 59--70
           Cezar Câmpeanu   A Note on Blum Static Complexity
                                  Measures . . . . . . . . . . . . . . . . 71--80
             Michael J. Dinneen   A Program-Size Complexity Measure for
                                  Mathematical Problems and Conjectures    81--93
              Monica Dumitrescu   On Degrees of Randomness and Genetic
                                  Randomness . . . . . . . . . . . . . . . 94--104
         R\=usi\cn\vs Freivalds   Hartmanis--Stearns Conjecture on Real
                                  Time and Transcendence . . . . . . . . . 105--119
                 Ziyuan Gao and   
              Frank Stephan and   
                  Guohua Wu and   
               Akihiro Yamamoto   Learning Families of Closed Sets in
                                  Matroids . . . . . . . . . . . . . . . . 120--139
          Helmut Jürgensen   Invariance and Universality of
                                  Complexity . . . . . . . . . . . . . . . 140--158
    Antonín Ku\vcera and   
              André Nies   Demuth's Path to Randomness  . . . . . . 159--173
                  Yuri I. Manin   A Computability Challenge: Asymptotic
                                  Bounds for Error-Correcting Codes  . . . 174--182
                Jacques Patarin   Some Transfinite Generalisations of
                                  Gödel's Incompleteness Theorem  . . . . . 183--193
                 Ludwig Staiger   On Oscillation-Free Chaitin $h$-Random
                                  Sequences  . . . . . . . . . . . . . . . 194--202
                 Kohtaro Tadaki   Phase Transition between
                                  Unidirectionality and Bidirectionality   203--223
                   Hector Zenil   Computer Runtimes and the Length of
                                  Proofs . . . . . . . . . . . . . . . . . 224--240
                  Marius Zimand   Symmetry of Information: a Closer Look   241--246
                Gregory Chaitin   How Much Information Can There Be in a
                                  Real Number? . . . . . . . . . . . . . . 247--251
                S. Barry Cooper   Mathematics, Metaphysics and the
                                  Multiverse . . . . . . . . . . . . . . . 252--267
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7161, 2012

                    Arne Ansper   Designing a Governmental Backbone  . . . 1--3
                   Priit Vinkel   Internet Voting in Estonia . . . . . . . 4--12
           Hakem Beitollahi and   
                Geert Deconinck   A Ring Based Onion Circuit for Hidden
                                  Services . . . . . . . . . . . . . . . . 13--30
         Károly Boda and   
Ádám Máté Földes and   
Gábor György Gulyás and   
             Sándor Imre   User Tracking on the Web via
                                  Cross-Browser Fingerprinting . . . . . . 31--46
              Mathias Claes and   
      Vincent van der Leest and   
                     An Braeken   Comparison of SRAM and FF PUF in 65nm
                                  Technology . . . . . . . . . . . . . . . 47--64
             Jordi Cucurull and   
        Simin Nadjm-Tehrani and   
            Massimiliano Raciti   Modular Anomaly Detection for Smartphone
                                  Ad Hoc Communication . . . . . . . . . . 65--81
Jérôme Dossogne and   
 Frédéric Lafitte   Mental Voting Booths . . . . . . . . . . 82--97
          Kazutomo Hamamoto and   
            Yasuyuki Tahara and   
                 Akihiko Ohsuga   Methods for Privacy Protection
                                  Considering Status of Service Provider
                                  and User Community . . . . . . . . . . . 98--113
              Kirsi Helkala and   
          Nils Kalstad Svendsen   The Security and Memorability of
                                  Passwords Generated by Using an
                                  Association Element and a Personal
                                  Factor . . . . . . . . . . . . . . . . . 114--130
          Elahe Kani-Zabihi and   
                Martin Helmhout   Increasing Service Users' Privacy
                                  Awareness by Introducing On-Line
                                  Interactive Privacy Features . . . . . . 131--148
Frédérick Lemay and   
        Raphaël Khoury and   
                    Nadia Tawbi   Optimized Inlining of Runtime Monitors   149--161
                  Radu Lupu and   
              Eugen Borcoci and   
                  Tinku Rasheed   Identity-Based Key Derivation Method for
                                  Low Delay Inter-domain Handover
                                  Re-authentication Service  . . . . . . . 162--175
          Veelasha Moonsamy and   
               Ronghua Tian and   
                    Lynn Batten   Feature Reduction to Speed Up Malware
                                  Classification . . . . . . . . . . . . . 176--188
                Assem Nazar and   
             Mark M. Seeger and   
                   Harald Baier   Rooting Android --- Extending the ADB by
                                  an Auto-connecting WiFi-Accessible
                                  Service  . . . . . . . . . . . . . . . . 189--204
                 Jaydip Sen and   
                Subhamoy Maitra   An Attack on Privacy Preserving Data
                                  Aggregation Protocol for Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 205--222
               Deian Stefan and   
            Alejandro Russo and   
           David Mazi\`eres and   
               John C. Mitchell   Disjunction Category Labels  . . . . . . 223--239
       Inger Anne Tòndel   Visualization Control for Event-Based
                                  Public Display Systems Used in a
                                  Hospital Setting . . . . . . . . . . . . 240--255
               Erich Wenger and   
                 Michael Hutter   Exploring the Design Space of Prime
                                  Field vs. Binary Field ECC-Hardware
                                  Implementations  . . . . . . . . . . . . 256--271
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7162, 2012

                  Eike Best and   
             Philippe Darondeau   Petri Net Distributability . . . . . . . 1--18
              Roberto Bruni and   
    Hernán Melgratti and   
                  Ugo Montanari   Connector Algebras, Petri Nets, and BIP  19--38
                  Peter Buneman   Models of Provenance . . . . . . . . . . 39--39
                 Rupak Majumdar   End-to-End Guarantees in Embedded
                                  Control Systems  . . . . . . . . . . . . 40--40
                 Andreas Zeller   Mining Precise Specifications  . . . . . 41--41
                Thomas Baar and   
                  Philipp Kumar   Detecting Entry Points in Java Libraries 42--54
              Michael Beyer and   
                 Sabine Glesner   Static Analysis of Run-Time Modes in
                                  Synchronous Process Network  . . . . . . 55--67
               Elena Bozhenkova   Compositional Methods in
                                  Characterization of Timed Event
                                  Structures . . . . . . . . . . . . . . . 68--76
           Rafael Caballero and   
     Yolanda García-Ruiz   Algorithmic Debugging of SQL Views . . . 77--85
                  Roman Dubtsov   Timed Transition Systems with
                                  Independence and Marked Scott Domains:
                                  An Adjunction  . . . . . . . . . . . . . 86--94
        Michael A. H. Fried and   
                    Anna Fensel   An Extensible System for Enhancing
                                  Social Conference Experience . . . . . . 95--110
            Natalia O. Garanina   Exponential Acceleration of Model
                                  Checking for Perfect Recall Systems  . . 111--124
              Robert Glück   Bootstrapping Compiler Generators from
                                  Partial Evaluators . . . . . . . . . . . 125--141
         Natalya S. Gribovskaya   A Logic Characteristic for Timed
                                  Extensions of Partial Order Based
                                  Equivalences . . . . . . . . . . . . . . 142--152
          Geoff W. Hamilton and   
                  Neil D. Jones   Proving the Correctness of Unfold/Fold
                                  Program Transformations Using
                                  Bisimulation . . . . . . . . . . . . . . 153--169
           Mauro Jaskelioff and   
                Alejandro Russo   Secure Multi-execution in Haskell  . . . 170--178
         Alexey Khoroshilov and   
              Vadim Mutilin and   
                 Eugene Novikov   Towards an Open Framework for C
                                  Verification Tools Benchmarking  . . . . 179--192
               Andrei V. Klimov   Solving Coverability Problem for
                                  Monotonic Counter Systems by
                                  Supercompilation . . . . . . . . . . . . 193--209
           Ilya Klyuchnikov and   
            Sergei A. Romanenko   Multi-result Supercompilation as
                                  Branching Growth of the Penultimate
                                  Level in Metasystem Transitions  . . . . 210--226
                 Jens Knoop and   
        Laura Kovács and   
               Jakob Zwirchmayr   Symbolic Loop Bound Computation for WCET
                                  Analysis . . . . . . . . . . . . . . . . 227--242
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7163, 2012

               Yutaka Kawai and   
                Noboru Kunihiro   Secret Handshake Scheme with
                                  Request-Based-Revealing  . . . . . . . . 1--16
   Kristian Gjòsteen and   
           Òystein Thuen   Password-Based Signatures  . . . . . . . 17--33
             Jean Lancrenon and   
                 Roland Gillard   Isolating Partial Information of
                                  Indistinguishable Encryptions  . . . . . 34--48
       Haitham S. Al-Sinani and   
              Chris J. Mitchell   A Universal Client-Based Identity
                                  Management Tool  . . . . . . . . . . . . 49--74
            Mark Stegelmann and   
                 Dogan Kesdogan   Design and Evaluation of a
                                  Privacy-Preserving Architecture for
                                  Vehicle-to-Grid Interaction  . . . . . . 75--90
            Ton van Deursen and   
           Sa\vsa Radomirovi\'c   Insider Attacks and Privacy of RFID
                                  Protocols  . . . . . . . . . . . . . . . 91--105
           Flavio D. Garcia and   
            Eric R. Verheul and   
                    Bart Jacobs   Cell-Based Roadpricing . . . . . . . . . 106--122
                Olivier Pereira   Ballot Aggregation and Mixnet Based
                                  Open-Audit Elections . . . . . . . . . . 123--127
                  Peter Gutmann   PKI as Part of an Integrated Risk
                                  Management Strategy for Web Security . . 128--146
         Gauthier Van Damme and   
             Nicolas Luyckx and   
                  Karel Wouters   A PKI-Based Mobile Banking Demonstrator  147--158
           Moez Ben M'Barka and   
                Julien P. Stern   Certification Validation: Back to the
                                  Past . . . . . . . . . . . . . . . . . . 159--175
            Johannes Winter and   
                  Kurt Dietrich   A Hijacker's Guide to the LPC Bus  . . . 176--193
                 An Braeken and   
       Antonio De La Piedro and   
                  Karel Wouters   Secure Event Logging in Sensor Networks  194--208
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7164, 2012

                   Klaus Jansen   Approximation Algorithms for Scheduling
                                  and Packing Problems . . . . . . . . . . 1--8
                     Zeev Nutov   Approximating Subset $k$-Connectivity
                                  Problems . . . . . . . . . . . . . . . . 9--20
Sebastián Marbán and   
              Cyriel Rutten and   
                Tjark Vredeveld   Learning in Stochastic Machine
                                  Scheduling . . . . . . . . . . . . . . . 21--34
              Wolfgang Bein and   
                Naoki Hatta and   
          Nelson Hernandez-Cons   An Online Algorithm Optimally
                                  Self-tuning to Congestion for Power
                                  Management Problems  . . . . . . . . . . 35--48
            Cristina Bazgan and   
          Laurent Gourv\`es and   
     Jérôme Monnot   Single Approximation for Biobjective Max
                                  TSP  . . . . . . . . . . . . . . . . . . 49--62
         Ljiljana Brankovic and   
                 Henning Fernau   Parameterized Approximation Algorithms
                                  for Hitting Set  . . . . . . . . . . . . 63--76
          Nadine Schwartges and   
              Joachim Spoerhase   Approximation Algorithms for the Maximum
                                  Leaf Spanning Tree Problem on Acyclic
                                  Digraphs . . . . . . . . . . . . . . . . 77--88
        Kai-Simon Goetzmann and   
              Sebastian Stiller   Optimization over Integers with
                                  Robustness in Cost and Few Constraints   89--101
   Tomá\vs Ebenlendr and   
            Ji\vrí Sgall   A Lower Bound on Deterministic Online
                                  Algorithms for Scheduling on Related
                                  Machines without Preemption  . . . . . . 102--108
               Klaus Jansen and   
              Christina Robenek   Scheduling Jobs on Identical and Uniform
                                  Processors Revisited . . . . . . . . . . 109--122
            David B. Shmoys and   
                   Gwen Spencer   Approximation Algorithms for Fragmenting
                                  a Graph against a Stochastically-Located
                                  Threat . . . . . . . . . . . . . . . . . 123--136
               Jianqiao Zhu and   
              Ho-Leung Chan and   
                    Tak-Wah Lam   Non-clairvoyant Weighted Flow Time
                                  Scheduling on Different Multi-processor
                                  Models . . . . . . . . . . . . . . . . . 137--149
              Reza Dorrigiv and   
   Alejandro López-Ortiz   A New Perspective on List Update:
                                  Probabilistic Locality and Working Set   150--163
Gerth Stòlting Brodal and   
                  Gabriel Moruz   OnlineMin: a Fast Strongly Competitive
                                  Randomized Paging Algorithm  . . . . . . 164--175
               Katarzyna Paluch   Faster and Simpler Approximation of
                                  Stable Matchings . . . . . . . . . . . . 176--187
                Anke van Zuylen   Simpler $ 3 / 4 $-Approximation
                                  Algorithms for MAX SAT . . . . . . . . . 188--197
            Marc P. Renault and   
               Adi Rosén   On Online Algorithms with Advice for the
                                  $k$-Server Problem . . . . . . . . . . . 198--210
                Rolf Harren and   
                    Walter Kern   Improved Lower Bound for Online Strip
                                  Packing  . . . . . . . . . . . . . . . . 211--218
             Yishay Mansour and   
           Boaz Patt-Shamir and   
                    Dror Rawitz   Competitive Router Scheduling with
                                  Structured Data  . . . . . . . . . . . . 219--232
            Cristina Bazgan and   
          Laurent Gourv\`es and   
     Jérôme Monnot   Approximation with a Fixed Number of
                                  Solutions of Some Biobjective
                                  Maximization Problems  . . . . . . . . . 233--246
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7165, 2012

            Holger Bock Axelsen   Time Complexity of Tape Reduction for
                                  Reversible Turing Machines . . . . . . . 1--13
            Tetsuo Yokoyama and   
        Holger Bock Axelsen and   
              Robert Glück   Towards a Reversible Functional Language 14--29
   Michael Kirkedal Thomsen and   
        Holger Bock Axelsen and   
              Robert Glück   A Reversible Processor Architecture and
                                  Its Reversible Logic Design  . . . . . . 30--42
          Md. Mazder Rahman and   
           Gerhard W. Dueck and   
              Anindita Banerjee   Optimization of Reversible Circuits
                                  Using Reconfigured Templates . . . . . . 43--53
                 Claudio Moraga   Hybrid $ {\rm GF}(2) $--Boolean
                                  Expressions \ldots for Quantum Computing
                                  Circuits . . . . . . . . . . . . . . . . 54--63
             Mathias Soeken and   
              Stefan Frehse and   
               Robert Wille and   
                 Rolf Drechsler   RevKit: An Open Source Toolkit for the
                                  Design of Reversible Circuits  . . . . . 64--76
             Zahra Sasanian and   
              D. Michael Miller   Transforming MCT Circuits to NCVW
                                  Circuits . . . . . . . . . . . . . . . . 77--88
             Atsushi Matsuo and   
              Shigeru Yamashita   Changing the Gate Order for Optimal LNN
                                  Conversion . . . . . . . . . . . . . . . 89--101
   Stéphane Burignat and   
             Mariusz Olczak and   
           Micha\l Klimczak and   
                  Alexis De Vos   Towards the Limits of Cascaded
                                  Reversible (Quantum-Inspired) Circuits   102--111
   Stéphane Burignat and   
   Michael Kirkedal Thomsen and   
               Micha\l Klimczak   Interfacing Reversible Pass-Transistor
                                  CMOS Chips with Conventional Restoring
                                  CMOS Circuits  . . . . . . . . . . . . . 112--122
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7166, 2012

               Ebisa Negeri and   
                     Nico Baken   Distributed Storage Management Using
                                  Dynamic Pricing in a Self-Organized
                                  Energy Community . . . . . . . . . . . . 1--12
          Laurent Paquereau and   
               Bjarne E. Helvik   Ant-Based Systems for Wireless Networks:
                                  Retrospect and Prospects . . . . . . . . 13--23
          Tiziano Squartini and   
             Diego Garlaschelli   Triadic Motifs and Dyadic
                                  Self-Organization in the World Trade
                                  Network  . . . . . . . . . . . . . . . . 24--35
             Dalibor \vStys and   
                 Petr Jizba and   
\vSt\vepán Papá\vcek and   
Tomá\vs Náhlík and   
            Petr Císa\vr   On Measurement of Internal Variables of
                                  Complex Self-Organized Systems and Their
                                  Relation to Multifractal Spectra . . . . 36--47
           Holger Prothmann and   
              Sven Tomforde and   
              Johannes Lyda and   
         Jürgen Branke and   
          Jörg Hähner   Self-Organised Routing for Road Networks 48--59
           Hanna Kavalionak and   
              Alberto Montresor   P2P and Cloud: a Marriage of Convenience
                                  for Replica Management . . . . . . . . . 60--71
           Dharani Punithan and   
              R. I. (Bob) McKay   Self-Organizing Spatio-temporal Pattern
                                  Formation in Two-Dimensional Daisyworld  72--83
         Muntasir Al-Asfoor and   
            Brendan Neville and   
                    Maria Fasli   Heuristic Resource Search in a
                                  Self-Organised Distributed Multi Agent
                                  System . . . . . . . . . . . . . . . . . 84--89
       Georgi Yordanov Georgiev   A Quantitative Measure, Mechanism and
                                  Attractor for Self-Organization in
                                  Networked Complex Systems  . . . . . . . 90--95
Efrat Blumenfeld-Lieberthal and   
                Juval Portugali   MetroNet: a Metropolitan Simulation
                                  Model Based on Commuting Processes . . . 96--103
          Alexander Gogolev and   
          Christian Bettstetter   Robustness of Self-Organizing Consensus
                                  Algorithms: Initial Results from a
                                  Simulation-Based Study . . . . . . . . . 104--108
            Stephen M. Majercik   Initial Experiments in Using
                                  Communication Swarms to Improve the
                                  Performance of Swarm Systems . . . . . . 109--114
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7167, 2012

             Joerg Evermann and   
                    Ivan Porres   Doctoral Symposium at MoDELS 2011  . . . 1--3
                    Henning Agt   Supporting Software Language Engineering
                                  by Automated Domain Knowledge
                                  Acquisition  . . . . . . . . . . . . . . 4--11
          Muhammad Atif Qureshi   Interoperability of Software Engineering
                                  Metamodels . . . . . . . . . . . . . . . 12--19
         Marion Brandsteidl and   
                 Andreas Winter   Software Modeling in Education: The 7th
                                  Educators' Symposium at MoDELS 2011  . . 20--24
               Dan Chiorean and   
        Vladiela Petra\cscu and   
                    Ileana Ober   Using Constraints in Teaching Software
                                  Modeling . . . . . . . . . . . . . . . . 25--39
                Jon Whittle and   
                John Hutchinson   Mismatches between Industry Practice and
                                  Teaching of Model-Driven Software
                                  Development  . . . . . . . . . . . . . . 40--47
          Òystein Haugen   VARY --- Variability for You . . . . . . 48--52
           Andreas Svendsen and   
              Xiaorui Zhang and   
      Òystein Haugen and   
  Birger Mòller-Pedersen   Towards Evolution of Generic Variability
                                  Models . . . . . . . . . . . . . . . . . 53--67
         Mohammad Abu-Matar and   
                   Hassan Gomaa   Feature-Based Variability Meta-modeling
                                  for Service-Oriented Product Lines . . . 68--82
               Vasco Amaral and   
   Cécile Hardebolle and   
            Hans Vangheluwe and   
László Lengyel and   
                    Peter Bunus   Summary of the Workshop on
                                  Multi-Paradigm Modelling: Concepts and
                                  Tools  . . . . . . . . . . . . . . . . . 83--88
          Antonio Cicchetti and   
          Federico Ciccozzi and   
                 Thomas Leveque   Supporting Incremental Synchronization
                                  in Hybrid Multi-view Modelling . . . . . 89--103
Frédéric Boulanger and   
                Ayman Dogui and   
   Cécile Hardebolle and   
             Christophe Jacquet   Semantic Adaptation Using CCSL Clock
                                  Constraints  . . . . . . . . . . . . . . 104--118
      Michel R. V. Chaudron and   
             Marcela Genero and   
      Silvia Abrahão and   
        Parastoo Mohagheghi and   
                    Lars Pareto   Summary of the First International
                                  Workshop on Experiences and Empirical
                                  Studies in Software Modelling  . . . . . 119--122
               Stefan Zugal and   
             Jakob Pinggera and   
              Barbara Weber and   
               Jan Mendling and   
                Hajo A. Reijers   Assessing the Impact of Hierarchy on
                                  Model Understandability --- a Cognitive
                                  Perspective  . . . . . . . . . . . . . . 123--133
Ana M. Fernández-Sáez and   
             Marcela Genero and   
          Michel R. V. Chaudron   Does the Level of Detail of UML Models
                                  Affect the Maintainability of Source
                                  Code?  . . . . . . . . . . . . . . . . . 134--148
              Nelly Bencomo and   
               Gordon Blair and   
              Robert France and   
          Betty H. C. Cheng and   
        Cédric Jeanneret   Summary of the $ 6^{\rm th} $
                                  International Workshop on
                                  Models@run.time  . . . . . . . . . . . . 149--151
               Carlo Ghezzi and   
               Andrea Mocci and   
               Mario Sangiorgio   Runtime Monitoring of Functional
                                  Component Changes with Behavior Models   152--166
               Thomas Vogel and   
                   Holger Giese   Requirements and Assessment of Languages
                                  and Frameworks for Adaptation Models . . 167--182
          Levi Lúcio and   
    Stephan Weißleder and   
Frédéric Fondement and   
                  Harald Cichos   MoDeVVa 2011 Workshop Summary  . . . . . 183--186
           Andreas Svendsen and   
      Òystein Haugen and   
  Birger Mòller-Pedersen   Specifying a Testing Oracle for Train
                                  Stations --- Going beyond with Product
                                  Line Technology  . . . . . . . . . . . . 187--201
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7168, 2012

          Junichi Hashimoto and   
          Akihiro Kishimoto and   
                Kazuki Yoshizoe   Accelerated UCT and Its Application to
                                  Two-Player Games . . . . . . . . . . . . 1--12
           Gabriel Van Eyck and   
             Martin Müller   Revisiting Move Groups in Monte--Carlo
                                  Tree Search  . . . . . . . . . . . . . . 13--23
              Petr Baudi\vs and   
               Jean-loup Gailly   PACHI: State of the Art Open Source Go
                                  Program  . . . . . . . . . . . . . . . . 24--38
              Hendrik Baier and   
             Mark H. M. Winands   Time Management for Monte--Carlo Tree
                                  Search in Go . . . . . . . . . . . . . . 39--51
             Richard J. Lorentz   An MCTS Program to Play EinStein Würfelt
                                  Nicht! . . . . . . . . . . . . . . . . . 52--59
         Jan A. Stankiewicz and   
             Mark H. M. Winands   Monte--Carlo Tree Search Enhancements
                                  for Havannah . . . . . . . . . . . . . . 60--71
     J. (Pim) A. M. Nijssen and   
             Mark H. M. Winands   Playout Search for Monte--Carlo Tree
                                  Search in Multi-player Games . . . . . . 72--83
             Cheng-Wei Chou and   
           Ping-Chiang Chou and   
                 Hassen Doghmen   Towards a Solution of 7x7 Go with
                                  Meta-MCTS  . . . . . . . . . . . . . . . 84--95
                Bruno Bouzy and   
       Marc Métivier and   
                 Damien Pellier   MCTS Experiments on the Voronoi Game . . 96--107
                  Jiao Wang and   
                 Shiyuan Li and   
                Jitong Chen and   
                    Xin Wei and   
                     Huizhan Lv   4*4-Pattern and Bayesian Learning in
                                  Monte--Carlo Go  . . . . . . . . . . . . 108--120
                  I-Chen Wu and   
               Hsin-Ti Tsai and   
             Hung-Hsuan Lin and   
                    Yi-Shan Lin   Temporal Difference Learning for
                                  Connect6 . . . . . . . . . . . . . . . . 121--133
       Nikolaos Papahristou and   
              Ioannis Refanidis   Improving Temporal Difference Learning
                                  Performance in Backgammon Variants . . . 134--145
             Rémi Coulom   CLOP: Confident Local Optimization for
                                  Noisy Black-Box Parameter Tuning . . . . 146--157
            Tomoyuki Kaneko and   
                  Kunihito Hoki   Analysis of Evaluation-Function Learning
                                  by Comparison of Sibling Nodes . . . . . 158--169
             Todd W. Neller and   
                   Steven Hnath   Approximating Optimal Dudo Play with
                                  Fixed-Strategy Iteration Counterfactual
                                  Regret Minimization  . . . . . . . . . . 170--183
              Kunihito Hoki and   
                Tomoyuki Kaneko   The Global Landscape of Objective
                                  Functions for the Optimization of Shogi
                                  Piece Values with a Game-Tree Search . . 184--195
         Abdallah Saffidine and   
          Nicolas Jouandeau and   
               Tristan Cazenave   Solving breakthrough with Race Patterns
                                  and Job-Level Proof Number Search  . . . 196--207
         Yoshiaki Yamaguchi and   
         Kazunori Yamaguchi and   
                 Tetsuro Tanaka   Infinite Connect-Four Is Solved: Draw    208--219
              Henry Brausen and   
            Ryan B. Hayward and   
         Martin Müller and   
                    Abdul Qadir   Blunder Cost in Go and Hex . . . . . . . 220--229
           Kenneth W. Regan and   
         Bartlomiej Macieja and   
               Guy McC. Haworth   Understanding Distributions of Chess
                                  Performances . . . . . . . . . . . . . . 230--243
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7169, 2012

             Wiebe van der Hoek   Control and Delegation . . . . . . . . . 1--2
               Louise A. Dennis   Plan Indexing for State-Based Plans  . . 3--15
               Michael Winikoff   An Integrated Formal Framework for
                                  Reasoning about Goal Interactions  . . . 16--32
            Shahriar Bijani and   
            David Robertson and   
                 David Aspinall   Probing Attacks on Multi-Agent Systems
                                  Using Electronic Institutions  . . . . . 33--50
     Akìn Günay and   
             Pìnar Yolum   Detecting Conflicts in Commitments . . . 51--66
               Tran Cao Son and   
            Enrico Pontelli and   
                  Chiaki Sakama   Formalizing Commitments Using Action
                                  Languages  . . . . . . . . . . . . . . . 67--83
                David Robertson   Lightweight Coordination Calculus for
                                  Agent Systems: Retrospective and
                                  Prospective  . . . . . . . . . . . . . . 84--89
             Amit K. Chopra and   
              Munindar P. Singh   The Evolution of Interoperability  . . . 90--94
           Viviana Mascardi and   
                  Davide Ancona   1000 Years of Coo-BDI  . . . . . . . . . 95--101
Andrés García-Camino and   
Juan-Antonio Rodríguez-Aguilar and   
                  Carles Sierra   A Distributed Architecture for
                                  Norm-Aware Agent Societies: a
                                  Retrospective  . . . . . . . . . . . . . 102--110
   Álvaro F. Moreira and   
              Renata Vieira and   
              Rafael H. Bordini   Speech-Act Based Communication: Progress
                                  in the Formal Semantics and in the
                                  Implementation of Multi-agent Oriented
                                  Programming Languages  . . . . . . . . . 111--116
          Nicoletta Fornara and   
               Marco Colombetti   Specifying and Enforcing Norms in
                                  Artificial Institutions: a Retrospective
                                  Review . . . . . . . . . . . . . . . . . 117--119
              Paolo Torroni and   
           Federico Chesani and   
                Paola Mello and   
                  Marco Montali   A Retrospective on the Reactive Event
                                  Calculus and Commitment Modeling
                                  Language . . . . . . . . . . . . . . . . 120--127
               David Corsar and   
             Alison Chorley and   
        Wamberto W. Vasconcelos   Web Service Composition via
                                  Organisation-Based (Re)Planning  . . . . 128--148
              Rafael H. Bordini   Agent and Multi-Agent Software
                                  Engineering: Modelling, Programming, and
                                  Verification . . . . . . . . . . . . . . 149--151
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7170, 2012

     Bjòrnar Solhaug and   
            Ketil Stòlen   Uncertainty, Subjectivity, Trust and
                                  Risk: How It All Fits together . . . . . 1--5
            Audun Jòsang   Trust Extortion on the Internet  . . . . 6--21
                Carsten Rudolph   Trust Areas: a Security Paradigm for the
                                  Future Internet  . . . . . . . . . . . . 22--27
              Stephen Marsh and   
           Sylvie Noël and   
                 Tim Storer and   
                       Yao Wang   Non-standards for Trust: Foreground
                                  Trust and Second Thoughts for Mobile
                                  Security . . . . . . . . . . . . . . . . 28--39
          Jamie Morgenstern and   
                Deepak Garg and   
                 Frank Pfenning   A Proof-Carrying File System with
                                  Revocable and Use-Once Certificates  . . 40--55
           Valerio Genovese and   
                    Deepak Garg   New Modalities for Access Control
                                  Logics: Permission, Control and
                                  Ratification . . . . . . . . . . . . . . 56--71
            Neyire Deniz Sarier   Security Notions of Biometric Remote
                                  Authentication Revisited . . . . . . . . 72--89
         Sascha Müller and   
           Stefan Katzenbeisser   Hiding the Policy in Cryptographic
                                  Access Control . . . . . . . . . . . . . 90--105
              Klaus Rechert and   
            Benjamin Greschbach   Location Privacy in Relation to Trusted
                                  Peers  . . . . . . . . . . . . . . . . . 106--121
           Wojciech Jamroga and   
                Sjouke Mauw and   
              Matthijs Melissen   Fairness in Non-Repudiation Protocols    122--139
                 Liang Chen and   
                 Jason Crampton   Risk-Aware Role-Based Access Control . . 140--156
         Alessandro Armando and   
                  Silvio Ranise   Automated Analysis of Infinite State
                                  Workflows with Access Control Policies   157--174
      Henrich C. Pöhls and   
               Focke Höhne   The Role of Data Integrity in EU Digital
                                  Signature Legislation --- Achieving
                                  Statutory Trust for Sanitizable
                                  Signature Schemes  . . . . . . . . . . . 175--192
            Ulrich Greveler and   
            Benjamin Justus and   
               Dennis Löhr   Mutual Remote Attestation: Enabling
                                  System Cloning for TPM Based Platforms   193--206
               Pablo Najera and   
              Rodrigo Roman and   
                   Javier Lopez   Secure Architecure for the Integration
                                  of RFID and Sensors in Personal Networks 207--222
        Syed Sadiqur Rahman and   
               Sadie Creese and   
              Michael Goldsmith   Accepting Information with a Pinch of
                                  Salt: Handling Untrusted Information
                                  Sources  . . . . . . . . . . . . . . . . 223--238
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7172, 2012

          Chitralekha Gupta and   
                     Preeti Rao   Objective Assessment of Ornamentation in
                                  Indian Classical Singing . . . . . . . . 1--25
             Moujhuri Patra and   
        Soubhik Chakraborty and   
                    Dipak Ghosh   Optimized Neural Architecture for Time
                                  Series Prediction Using Raga Notes . . . 26--33
             Sankalp Gulati and   
           Vishweshwara Rao and   
                     Preeti Rao   Meter Detection from Audio for Indian
                                  Music  . . . . . . . . . . . . . . . . . 34--43
       Shashi Bhushan Singh and   
        Soubhik Chakraborty and   
              Keashav Mohan Jha   Assessment of Level of Recovery of
                                  Cognitive Impairment in the
                                  Cerebrovascular Accident and Head
                                  Injuries Cases: Therapeutic Impact of
                                  North Indian Ragas . . . . . . . . . . . 44--52
          Matthias Braeunig and   
            Ranjan Sengupta and   
             Anirban Patranabis   On Tanpura Drone and Brain Electrical
                                  Correlates . . . . . . . . . . . . . . . 53--65
                     Jun Wu and   
               Shigeki Sagayama   Musical Instrument Identification Based
                                  on New Boosting Algorithm with
                                  Probabilistic Decisions  . . . . . . . . 66--78
              Kristoffer Jensen   Music Genre Classification Using an
                                  Auditory Memory Model  . . . . . . . . . 79--88
                   Yago de Quay   Interactive Music 3.0: Empowering People
                                  to Participate Musically Inside
                                  Nightclubs . . . . . . . . . . . . . . . 89--97
             Joe Cheri Ross and   
                    John Samuel   Hierarchical Clustering of Music
                                  Database Based on HMM and Markov Chain
                                  for Search Efficiency  . . . . . . . . . 98--103
               Ryan Stables and   
                Cham Athwal and   
                  Jamie Bullock   Fundamental Frequency Modulation in
                                  Singing Voice Synthesis  . . . . . . . . 104--119
            Kristian Nymoen and   
               Jim Torresen and   
     Rolf Inge Godòy and   
     Alexander Refsum Jensenius   A Statistical Approach to Analyzing
                                  Sound Tracings . . . . . . . . . . . . . 120--145
           Thibaud Necciari and   
               Peter Balazs and   
  Richard Kronland-Martinet and   
         Sòlvi Ystad and   
                Bernhard Laback   Auditory Time-Frequency Masking:
                                  Psychoacoustical Data and Application to
                                  Audio Representations  . . . . . . . . . 146--171
            Mitsuko Aramaki and   
  Richard Kronland-Martinet and   
             Sòlvi Ystad   Perceptual Control of Environmental
                                  Sound Synthesis  . . . . . . . . . . . . 172--186
            Utpal Bhattacharjee   Recognition of Assamese Phonemes Using
                                  RNN Based Recognizer . . . . . . . . . . 187--196
          Asoke Kumar Datta and   
                      Arup Saha   A System for Analysis of Large Scale
                                  Speech Data for the Development of Rules
                                  of Intonation for Speech Synthesis . . . 197--206
        Sanghamitra Mohanty and   
            Basanta Kumar Swain   Adaptive and Iterative Wiener Filter for
                                  Oriya Speech Processing Applications . . 207--214
          Asoke Kumar Datta and   
             Bhaswati Mukherjee   On the Role of Formants in Cognition of
                                  Vowels and Place of Articulation of
                                  Plosives . . . . . . . . . . . . . . . . 215--234
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7173, 2012

               Viviana Bono and   
              Sara Capecchi and   
              Ilaria Castellani   A Reputation System for Multirole
                                  Sessions . . . . . . . . . . . . . . . . 1--24
              Tzu-Chun Chen and   
               Laura Bocchi and   
    Pierre-Malo Deniélou   Asynchronous Distributed Monitoring for
                                  Multiparty Session Enforcement . . . . . 25--45
              Bernd Werther and   
                   Nicklas Hoch   E-Mobility as a Challenge for New ICT
                                  Solutions in the Car Industry  . . . . . 46--57
            Carme \`Alvarez and   
                Amalia Duch and   
                Maria Serna and   
             Dimitrios Thilikos   On the Existence of Nash Equilibria in
                                  Strategic Search Games . . . . . . . . . 58--72
              Gilles Barthe and   
                 Exequiel Rivas   Static Enforcement of Information Flow
                                  Policies for a Concurrent JVM-like
                                  Language . . . . . . . . . . . . . . . . 73--88
                 Marco Bernardo   Weak Markovian Bisimulation Congruences
                                  and Exact CTMC-Level Aggregations for
                                  Sequential Processes . . . . . . . . . . 89--103
       Maria Grazia Buscemi and   
                    Mario Coppo   Constraints for Service Contracts  . . . 104--120
                 Liqun Chen and   
              Ming-Feng Lee and   
               Bogdan Warinschi   Security of the Enhanced TCG Privacy-CA
                                  Solution . . . . . . . . . . . . . . . . 121--141
           Liliana D'Errico and   
                 Michele Loreti   Context Aware Specification and
                                  Verification of Distributed Systems  . . 142--159
            Rocco De Nicola and   
            Andrea Margheri and   
               Francesco Tiezzi   Orchestrating Tuple-Based Languages  . . 160--178
             Dominic Duggan and   
                          Ye Wu   Transactional Correctness for Secure
                                  Nested Transactions  . . . . . . . . . . 179--196
            Joaquim Gabarro and   
                Maria Serna and   
                   Alan Stewart   Orchestrating Unreliable Services:
                                  Strategic and Probabilistic Approaches
                                  to Reliability . . . . . . . . . . . . . 197--211
    Hernán Melgratti and   
        Christian Roldán   On Correlation Sets and Correlation
                                  Exceptions in ActiveBPEL . . . . . . . . 212--226
                   Chenyi Zhang   Conditional Information Flow Policies
                                  and Unwinding Relations  . . . . . . . . 227--241
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7174, 2012

                 James Reinders   Only the First Steps of the Parallel
                                  Evolution Have Been Taken Thus Far . . . 1--9
               Marta Garcia and   
            Julita Corbalan and   
           Rosa Maria Badia and   
                  Jesus Labarta   A Dynamic Load Balancing Approach with
                                  SMPSuperscalar and MPI . . . . . . . . . 10--23
           Iris Christadler and   
           Giovanni Erbacci and   
                Alan D. Simpson   Performance and Productivity of New
                                  Programming Languages  . . . . . . . . . 24--35
         Alexander Heinecke and   
              Michael Klemm and   
                 Hans Pabst and   
              Dirk Pflüger   Towards High-Performance Implementations
                                  of a Custom HPC Kernel Using \reg Array
                                  Building Blocks  . . . . . . . . . . . . 36--47
             Charly Bechara and   
           Nicolas Ventroux and   
                Daniel Etiemble   AHDAM: An Asymmetric Homogeneous with
                                  Dynamic Allocator Manycore Chip  . . . . 48--59
             Micha\l Fularz and   
                Marek Kraft and   
               Adam Schmidt and   
             Andrzej Kasi\'nski   FPGA Implementation of the Robust
                                  Essential Matrix Estimation with RANSAC
                                  and the $8$-Point and the $5$-Point
                                  Method . . . . . . . . . . . . . . . . . 60--71
       Wlodzimierz Bielecki and   
                Marek Palkowski   Using Free Scheduling for Programming
                                  Graphic Cards  . . . . . . . . . . . . . 72--83
           Katsuya Kawanami and   
              Noriyuki Fujimoto   GPU Accelerated Computation of the
                                  Longest Common Subsequence . . . . . . . 84--95
            Oscar Hernandez and   
                   Wei Ding and   
            Barbara Chapman and   
        Christos Kartsaklis and   
               Ramanan Sankaran   Experiences with High-Level Programming
                                  Directives for Porting Applications to
                                  GPUs . . . . . . . . . . . . . . . . . . 96--107
      Bas O. Fagginger Auer and   
               Rob H. Bisseling   A GPU Algorithm for Greedy Graph
                                  Matching . . . . . . . . . . . . . . . . 108--119
              Dorian Krause and   
                 Mark Potse and   
             Thomas Dickopf and   
                Rolf Krause and   
           Angelo Auricchio and   
                  Frits Prinzen   Hybrid Parallelization of a Large-Scale
                                  Heart Model  . . . . . . . . . . . . . . 120--132
                 Jiri Kraus and   
             Malte Förster   Efficient AMG on Heterogeneous Systems   133--146
                  Karl Rupp and   
         Ansgar Jüngel and   
                  Tibor Grasser   A GPU-Accelerated Parallel
                                  Preconditioner for the Solution of the
                                  Boltzmann Transport Equation for
                                  Semiconductors . . . . . . . . . . . . . 147--157
          Vincent Heuveline and   
           Dimitar Lukarski and   
                 Nico Trost and   
              Jan-Philipp Weiss   Parallel Smoothers for Matrix-Based
                                  Geometric Multigrid Methods on Locally
                                  Refined Meshes Using Multicore CPUs and
                                  GPUs . . . . . . . . . . . . . . . . . . 158--171
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7175, 2012

           Krasimir Angelov and   
                  Ramona Enache   Typeful Ontologies with Direct
                                  Multilingual Verbalization . . . . . . . 1--20
      Alexandra Bünzli and   
             Stefan Höfler   Controlling Ambiguities in Legislative
                                  Language . . . . . . . . . . . . . . . . 21--42
              Marcos Cramer and   
         Bernhard Schröder   Interpreting Plurals in the Naproche CNL 43--52
          Pradeep Dantuluri and   
                Brian Davis and   
                 Pierre Ludwick   Engineering a Controlled Natural
                                  Language into Semantic MediaWiki . . . . 53--72
               Norbert E. Fuchs   First-Order Reasoning for Attempto
                                  Controlled English . . . . . . . . . . . 73--94
                    Tobias Kuhn   Codeco: a Practical Notation for
                                  Controlled English Grammars in
                                  Predictive Editors . . . . . . . . . . . 95--114
                Aarne Ranta and   
              Ramona Enache and   
  Grégoire Détrez   Controlled Language for Everyday Use:
                                  The MOLTO Phrasebook . . . . . . . . . . 115--136
          John J. Camilleri and   
             Gordon J. Pace and   
                 Michael Rosner   Controlled Natural Language in a Game
                                  for Legal Assistance . . . . . . . . . . 137--153
                 Rolf Schwitter   Working with Events and States in PENG
                                  Light  . . . . . . . . . . . . . . . . . 154--174
       Silvie Spreeuwenberg and   
       Jeroen van Grondelle and   
                  Ronald Heller   Using CNL Techniques and Pattern
                                  Sentences to Involve Domain Experts in
                                  Modeling . . . . . . . . . . . . . . . . 175--193
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7176, 2012

                    Kohei Honda   Understanding Distributed Services
                                  through the $ \pi $-Calculus . . . . . . 1--1
       Étienne Lozes and   
                  Jules Villard   Reliable Contracts for Unreliable
                                  Half-Duplex Communications . . . . . . . 2--16
              Fangzhe Chang and   
         Pavithra Prabhakar and   
             Ramesh Viswanathan   Behavior Based Service Composition . . . 17--31
           Beno\^\it Masson and   
Lo\"\ic Hélouët and   
              Albert Benveniste   Compatibility of Data-Centric Web
                                  Services . . . . . . . . . . . . . . . . 32--47
       Hugo A. López and   
          Jorge A. Pérez   Time and Exceptional Behavior in
                                  Multiparty Structured Interactions . . . 48--63
             Manuel Mazzara and   
            Faisal Abouzaid and   
                 Nicola Dragoni   Toward Design, Modelling and Analysis of
                                  Dynamic Workflow Reconfigurations  . . . 64--78
  José Antonio Mateo and   
     Valentín Valero and   
           Gregorio Díaz   An Operational Semantics of BPEL
                                  Orchestrations Integrating Web Services
                                  Resource Framework . . . . . . . . . . . 79--94
                 Elie Fares and   
         Jean-Paul Bodeveix and   
                  Mamoun Filali   Design of a BPEL Verification Tool . . . 95--110
              Roberto Bruni and   
           Andrea Corradini and   
              Gianluigi Ferrari   Applying Process Analysis to the Italian
                                  eGovernment Enterprise Architecture  . . 111--127
   Juan Pedro Silva Gallino and   
               Miguel de Miguel   Domain-Specific Multi-modeling of
                                  Security Concerns in Service-Oriented
                                  Architectures  . . . . . . . . . . . . . 128--142
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7177, 2012

               Ugo Dal Lago and   
           Paolo Parisen Toldin   A Higher-Order Characterization of
                                  Probabilistic Polynomial Time  . . . . . 1--18
            Emanuele Cesena and   
             Marco Pedicini and   
                   Luca Roversi   Typing a Core Binary-Field Arithmetic in
                                  a Light Logic  . . . . . . . . . . . . . 19--35
          Manuel Montenegro and   
            Olha Shkaravska and   
          Marko van Eekelen and   
            Ricardo Peña   Interpolation-Based Height Analysis for
                                  Improving a Recurrence Solver  . . . . . 36--53
         Pedro Lopez-Garcia and   
            Luthfi Darmawan and   
            Francisco Bueno and   
            Manuel Hermenegildo   Interval-Based Resource Usage
                                  Verification: Formalization and
                                  Prototype  . . . . . . . . . . . . . . . 54--71
          Roberto M. Amadio and   
       Yann Régis-Gianas   Certifying and Reasoning on Cost
                                  Annotations of Functional Programs . . . 72--89
           Mihail As\uavoae and   
  Irina M\uariuca As\uavoae and   
                   Dorel Lucanu   On Abstractions for Timing Analysis in
                                  the $ \mathbb {K} $ Framework  . . . . . 90--107
     Vítor Rodrigues and   
  João Pedro Pedroso and   
       Mário Florido and   
     Simão Melo de Sousa   Certifying Execution Time  . . . . . . . 108--125
      Christoph A. Herrmann and   
                  Kevin Hammond   Counter Automata for Parameterised
                                  Timing Analysis of Box-Based Systems . . 126--141
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7179, 2012

             Andreas Heinig and   
          Vincent J. Mooney and   
            Florian Schmoll and   
             Peter Marwedel and   
                  Krishna Palem   Classification-Based Improvement of
                                  Application Robustness and Quality of
                                  Service in Probabilistic Computer
                                  Systems  . . . . . . . . . . . . . . . . 1--12
            Christian Brehm and   
               Matthias May and   
          Christina Gimmler and   
                   Norbert Wehn   A Case Study on Error Resilient
                                  Architectures for Wireless Communication 13--24
              Oussama Tahan and   
                 Mohamed Shawky   Using Dynamic Task Level Redundancy for
                                  OpenMP Fault Tolerance . . . . . . . . . 25--36
                    Yang Xu and   
             Rafael Rosales and   
                    Bo Wang and   
      Martin Streubühr and   
           Ralph Hasholzner and   
              Christian Haubelt   A Very Fast and Quasi-accurate
                                  Power-State-Based System-Level Power
                                  Modeling Methodology . . . . . . . . . . 37--49
             Nikita Nikitin and   
               Jordi Cortadella   Static Task Mapping for Tiled Chip
                                  Multiprocessors with Multiple Voltage
                                  Islands  . . . . . . . . . . . . . . . . 50--62
           Andreas Barthels and   
       Joachim Fröschl and   
         Hans-Ulrich Michel and   
                 Uwe Baumgarten   An Architecture for Power Management in
                                  Automotive Systems . . . . . . . . . . . 63--73
Isaías A. Comprés Ureña and   
             Michael Riepen and   
              Michael Konow and   
                 Michael Gerndt   Invasive MPI on Intel's Single-Chip
                                  Cloud Computer . . . . . . . . . . . . . 74--85
                Davide Zoni and   
            Patrick Bellasi and   
             William Fornaciari   A Low-Overhead Heuristic for Mixed
                                  Workload Resource Partitioning in
                                  Cluster-Based Architectures  . . . . . . 86--97
Frédéric Boniol and   
        Hugues Cassé and   
               Eric Noulard and   
                 Claire Pagetti   Deterministic Execution Model on COTS
                                  Hardware . . . . . . . . . . . . . . . . 98--110
         Pascal Schleuniger and   
             Sally A. McKee and   
                  Sven Karlsson   Design Principles for Synthesizable
                                  Processor Cores  . . . . . . . . . . . . 111--122
        Panayiotis Petrides and   
          George Nicolaides and   
                 Pedro Trancoso   HPC Performance Domains on Multi-core
                                  Processors with Virtualization . . . . . 123--134
           Jens Brandenburg and   
               Benno Stabernack   A Generic and Non-intrusive Profiling
                                  Methodology for SystemC Multi-core
                                  Platform Simulation Models . . . . . . . 135--146
           Richard Membarth and   
              Jan-Hugo Lupp and   
               Frank Hannig and   
          Jürgen Teich and   
              Mario Körner   Dynamic Task-Scheduling and Resource
                                  Management for GPU Accelerators in
                                  Medical Imaging  . . . . . . . . . . . . 147--159
              Volker Hampel and   
             Thilo Pionteck and   
                    Erik Maehle   An Approach for Performance Estimation
                                  of Hybrid Systems with FPGAs and GPUs as
                                  Coprocessors . . . . . . . . . . . . . . 160--171
         Sebastian Mattheis and   
             Tobias Schuele and   
              Andreas Raabe and   
             Thomas Henties and   
                      Urs Gleim   Work Stealing Strategies for Parallel
                                  Stream Processing in Soft Real-Time
                                  Systems  . . . . . . . . . . . . . . . . 172--183
             Matthew Bielby and   
                Miles Gould and   
                   Nigel Topham   Design Space Exploration of Hybrid Ultra
                                  Low Power Branch Predictors  . . . . . . 184--199
             Ademola Fawibe and   
              Jared Sherman and   
               Krishna Kavi and   
            Mike Ignatowski and   
                   David Mayhew   New Memory Organizations for $3$D DRAM
                                  and PCMs . . . . . . . . . . . . . . . . 200--211
                  Hao Zhang and   
           Hiroki Matsutani and   
              Yasuhiro Take and   
            Tadahiro Kuroda and   
                 Hideharu Amano   Vertical Link On/Off Control Methods for
                                  Wireless $3$-D NoCs  . . . . . . . . . . 212--224
                 Atis Elsts and   
             Rihards Balass and   
            Janis Judvaitis and   
         Reinholds Zviedris and   
                Girts Strazdins   SADmote: a Robust and Cost-Effective
                                  Device for Environmental Monitoring  . . 225--237
                 Gadi Oxman and   
               Shlomo Weiss and   
           Yitzhak (Tsahi) Birk   Streamlined Network-on-Chip for
                                  Multicore Embedded Architectures . . . . 238--249
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7180, 2012

              Elvira Albert and   
                Puri Arenas and   
                   Samir Genaim   Automatic Inference of Resource
                                  Consumption Bounds . . . . . . . . . . . 1--11
                Aart Middeldorp   Matrix Interpretations for Polynomial
                                  Derivational Complexity of Rewrite
                                  Systems  . . . . . . . . . . . . . . . . 12--12
                    Boris Motik   Parameterized Complexity and
                                  Fixed-Parameter Tractability of
                                  Description Logic Reasoning  . . . . . . 13--14
                Amir Aavani and   
           Xiongnan (Newman) Wu   Enfragmo: a System for Modelling and
                                  Solving Search Problems with Logic . . . 15--22
        Beniamino Accattoli and   
                   Delia Kesner   The Permutative $ \lambda $-Calculus . . 23--36
                Jesse Alama and   
       Daniel Kühlwein and   
                    Josef Urban   Automated and Human Proofs in General
                                  Mathematics: An Initial Comparison . . . 37--45
          Francesco Alberti and   
            Roberto Bruttomesso   Lazy Abstraction with Interpolants for
                                  Arrays . . . . . . . . . . . . . . . . . 46--61
      María Alpuente and   
                   Demis Ballis   Backward Trace Slicing for Conditional
                                  Rewrite Theories . . . . . . . . . . . . 62--76
          Grigoris Antoniou and   
               Thomas Eiter and   
                     Kewen Wang   Forgetting for Defeasible Logic  . . . . 77--91
             David Aspinall and   
                Ewen Denney and   
            Christoph Lüth   Querying Proofs  . . . . . . . . . . . . 92--106
               Franz Baader and   
              Alexander Okhotin   Solving Language Equations and
                                  Disequations with Applications to
                                  Disunification in Description Logics and
                                  Monadic Set Constraints  . . . . . . . . 107--121
             Nikola Bene\vs and   
  Jan K\vretínský   Dual-Priced Modal Transition Systems
                                  with Time Durations  . . . . . . . . . . 122--137
           Stefan Borgwardt and   
               Barbara Morawska   Finding Finite Herbrand Models . . . . . 138--152
                  Lukas Bulwahn   Smart Testing of Functional Programs in
                                  Isabelle . . . . . . . . . . . . . . . . 153--167
             Peter Bulychev and   
                Alexandre David   Monitor-Based Statistical Model Checking
                                  for Weighted Metric Temporal Logic . . . 168--182
José Luis Chacón and   
 Ramón Pino Pérez   Duality between Merging Operators and
                                  Social Contraction Operators . . . . . . 183--196
             Arnaud Fietzke and   
                 Evgeny Kruglov   Automatic Generation of Invariants for
                                  Circular Derivations in SUP(LA)  . . . . 197--211
                The Anh Han and   
                Ari Saptawijaya   Moral Reasoning under Uncertainty  . . . 212--227
               Stefan Hetzl and   
              Alexander Leitsch   Towards Algorithmic Cut-Introduction . . 228--242
                Hadi Katebi and   
              Karem A. Sakallah   Conflict Anticipation in the Search for
                                  Graph Automorphisms  . . . . . . . . . . 243--257
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7181, 2012

             Srinivas Bangalore   Thinking Outside the Box for Natural
                                  Language Processing  . . . . . . . . . . 1--16
      Aitor González and   
               German Rigau and   
                 Mauro Castillo   A Graph-Based Method to Improve WordNet
                                  Domains  . . . . . . . . . . . . . . . . 17--28
Sava\cs Yìldìrìm and   
   Tu\ugba Yìldìz   Corpus-Driven Hyponym Acquisition for
                                  Turkish Language . . . . . . . . . . . . 29--41
Renato Domínguez García and   
          Sebastian Schmidt and   
          Christoph Rensing and   
                 Ralf Steinmetz   Automatic Taxonomy Extraction in
                                  Different Languages Using Wikipedia and
                                  Minimal Language-Specific Information    42--53
                     He Tan and   
      Rajaram Kaliyaperumal and   
                 Nirupama Benis   Ontology-Driven Construction of Domain
                                  Corpus with Frame Semantics Annotations  54--65
                   Qaiser Abbas   Building a Hierarchical Annotated Corpus
                                  of Urdu: The URDU.KON-TB Treebank  . . . 66--79
Francisco J. Carreras-Riudavets and   
Juan C. Rodríguez-del-Pino and   
Zenón Hernández-Figueroa   A Morphological Analyzer Using Hash
                                  Tables in Main Memory (MAHT) and a
                                  Lexical Knowledge Base . . . . . . . . . 80--91
               N. Vasudevan and   
          Pushpak Bhattacharyya   Optimal Stem Identification in Presence
                                  of Suffix List . . . . . . . . . . . . . 92--103
            Ramadan Alfared and   
            Denis Béchet   On the Adequacy of Three POS Taggers and
                                  a Dependency Parser  . . . . . . . . . . 104--116
     Kishorjit Nongmeikapam and   
     Aribam Umananda Sharma and   
      Laishram Martina Devi and   
                Nepoleon Keisam   Will the Identification of Reduplicated
                                  Multiword Expression (RMWE) Improve the
                                  Performance of SVM Based Manipuri POS
                                  Tagging? . . . . . . . . . . . . . . . . 117--129
          Vladislav Kubo\vn and   
Markéta Lopatková and   
           Martin Plátek   On Formalization of Word Order
                                  Properties . . . . . . . . . . . . . . . 130--141
           Md. Izhar Ashraf and   
                 Sitabhra Sinha   Core-Periphery Organization of Graphemes
                                  in Written Sequences: Decreasing
                                  Positional Rigidity with Increasing Core
                                  Order  . . . . . . . . . . . . . . . . . 142--153
      Nicolas Béchet and   
              Peggy Cellier and   
           Thierry Charnois and   
        Bruno Crémilleux   Discovering Linguistic Patterns Using
                                  Sequence Mining  . . . . . . . . . . . . 154--165
              Solen Quiniou and   
              Peggy Cellier and   
           Thierry Charnois and   
            Dominique Legallois   What about Sequential Data Mining
                                  Techniques to Identify Linguistic
                                  Patterns for Stylistics? . . . . . . . . 166--177
         Imran Sarwar Bajwa and   
                   Mark Lee and   
                 Behzad Bordbar   Resolving Syntactic Ambiguities in
                                  Natural Language Specification of
                                  Constraints  . . . . . . . . . . . . . . 178--187
           Chamila Liyanage and   
         Randil Pushpananda and   
        Dulip Lakmal Herath and   
              Ruvan Weerasinghe   A Computational Grammar of Sinhala . . . 188--200
               Bahar Salehi and   
            Narjes Askarian and   
                  Afsaneh Fazly   Automatic Identification of Persian
                                  Light Verb Constructions . . . . . . . . 201--210
           Sudakshina Dutta and   
                    Anupam Basu   A Cognitive Approach to Word Sense
                                  Disambiguation . . . . . . . . . . . . . 211--224
      Yoan Gutiérrez and   
       Sonia Vázquez and   
          Andrés Montoyo   A graph-Based Approach to WSD Using
                                  Relevant Semantic Trees and $N$-Cliques
                                  Model  . . . . . . . . . . . . . . . . . 225--237
           Kiem-Hieu Nguyen and   
                Cheol-Young Ock   Using Wiktionary to Improve Lexical
                                  Disambiguation in Multiple Languages . . 238--248
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7182, 2012

        Mari-Sanna Paukkeri and   
       Jaakko Väyrynen and   
                    Antti Arppe   Exploring Extensive Linguistic Feature
                                  Sets in Near-Synonym Lexical Choice  . . 1--12
              Ralf Klabunde and   
      Sebastian Reuße and   
      Björn Schlünder   Abduction in Games for a Flexible
                                  Approach to Discourse Planning . . . . . 13--24
               Salim Roukos and   
        Abraham Ittycheriah and   
                   Jian-Ming Xu   Document-Specific Statistical Machine
                                  Translation for Improving Human
                                  Translation Productivity . . . . . . . . 25--39
             Tsuyoshi Okita and   
             Josef van Genabith   Minimum Bayes Risk Decoding with
                                  Enlarged Hypothesis Space in System
                                  Combination  . . . . . . . . . . . . . . 40--51
                Hailong Cao and   
            Eiichiro Sumita and   
                Tiejun Zhao and   
                       Sheng Li   Phrasal Syntactic Category Sequence
                                  Model for Phrase-Based MT  . . . . . . . 52--59
            Prashant Mathur and   
                      Soma Paul   Integration of a Noun Compound
                                  Translator Tool with Moses for
                                  English--Hindi Machine Translation and
                                  Evaluation . . . . . . . . . . . . . . . 60--71
             Rima Harastani and   
     Béatrice Daille and   
                 Emmanuel Morin   Neoclassical Compound Alignments from
                                  Comparable Corpora . . . . . . . . . . . 72--82
                 Amir Hazem and   
                 Emmanuel Morin   QAlign: a New Method for Bilingual
                                  Lexicon Extraction from Comparable
                                  Corpora  . . . . . . . . . . . . . . . . 83--96
                 Florian Petran   Aligning the Un-Alignable --- a Pilot
                                  Study Using a Noisy Corpus of
                                  Nonstandardized, Semi-parallel Texts . . 97--109
              Antoni Oliver and   
               Salvador Climent   Parallel Corpora for WordNet
                                  Construction: Machine Translation vs.
                                  Automatic Sense Tagging  . . . . . . . . 110--121
               Keiji Yasuda and   
               Andrew Finch and   
                Eiichiro Sumita   Method to Build a Bilingual Lexicon for
                                  Speech-to-Speech Translation Systems . . 122--131
           Nandita Tripathi and   
              Michael Oakes and   
                 Stefan Wermter   A Fast Subspace Text Categorization
                                  Method Using Parallel Classifiers  . . . 132--143
               Dequan Zheng and   
              Chenghe Zhang and   
                   Geli Fei and   
                    Tiejun Zhao   Research on Text Categorization Based on
                                  a Weakly-Supervised Transfer Learning
                                  Method . . . . . . . . . . . . . . . . . 144--156
Alberto Pérez García-Plaza and   
       Víctor Fresno and   
         Raquel Martínez   Fuzzy Combinations of Criteria: An
                                  Application to Web Page Representation
                                  for Clustering . . . . . . . . . . . . . 157--168
            Prajol Shrestha and   
          Christine Jacquin and   
         Béatrice Daille   Clustering Short Text and Its Evaluation 169--180
            Carlos Castillo and   
       Héctor Valero and   
José Guadalupe Ramos and   
                    Josep Silva   Information Extraction from Webpages
                                  Based on DOM Distances . . . . . . . . . 181--193
                      Qi Li and   
             Javier Artiles and   
             Taylor Cassidy and   
                        Heng Ji   Combining Flat and Structured Approaches
                                  for Temporal Slot Filling or: How Much
                                  to Compress? . . . . . . . . . . . . . . 194--205
              Dina Wonsever and   
          Aiala Rosá and   
            Marisa Malcuori and   
        Guillermo Moncecchi and   
                  Alan Descoins   Event Annotation Schemes and Event
                                  Recognition in Spanish Texts . . . . . . 206--218
   Béatrice Arnulphy and   
             Xavier Tannier and   
                    Anne Vilnat   Automatically Generated Noun Lexicons
                                  for Event Extraction . . . . . . . . . . 219--231
               John Carroll and   
                Rob Koeling and   
                   Shivani Puri   Lexical Acquisition for Clinical Text
                                  Mining Using Distributional Similarity   232--246
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7183, 2012

                  Eugene Asarin   Measuring Information in Timed Languages 1--2
           Bernard Boigelot and   
             Julien Brusten and   
 Jean-François Degbomont   Automata-Based Symbolic Representations
                                  of Polyhedra . . . . . . . . . . . . . . 3--20
                   Gilles Dowek   Around the Physical Church--Turing
                                  Thesis: Cellular Automata, Formal
                                  Languages, and the Principles of Quantum
                                  Theory . . . . . . . . . . . . . . . . . 21--37
                     Rod Downey   A Parameterized Complexity Tutorial  . . 38--56
                   Jack H. Lutz   The Computer Science of DNA
                                  Nanotechnology . . . . . . . . . . . . . 57--57
        Parosh Aziz Abdulla and   
        Mohamed Faouzi Atig and   
                   Jari Stenman   The Minimal Cost Reachability Problem in
                                  Priced Timed Pushdown Systems  . . . . . 58--69
          Siva Anantharaman and   
       Christopher Bouchard and   
          Paliath Narendran and   
            Michael Rusinowitch   Unification Modulo Chaining  . . . . . . 70--82
            Vikraman Arvind and   
                   Yadu Vasudev   Isomorphism Testing of Boolean Functions
                                  Computable by Constant-Depth Circuits    83--94
            Holger Bock Axelsen   Reversible Multi-head Finite Automata
                                  Characterize Reversible Logarithmic
                                  Space  . . . . . . . . . . . . . . . . . 95--105
             Mikhail Barash and   
              Alexander Okhotin   Defining Contexts in Context-Free
                                  Grammars . . . . . . . . . . . . . . . . 106--118
               Philip Bille and   
       Inge Li Gòrtz and   
              Jesper Kristensen   Longest Common Extensions via
                                  Fingerprinting . . . . . . . . . . . . . 119--130
               Philip Bille and   
            Morten Stöckel   Fast and Cache-Oblivious Dynamic
                                  Programming with Local Dependencies  . . 131--142
               Beate Bollig and   
             Tobias Pröger   An Efficient Implicit OBDD-Based
                                  Algorithm for Maximal Matchings  . . . . 143--154
                 Laura Bozzelli   Strong Termination for Gap-Order
                                  Constraint Abstractions of Counter
                                  Systems  . . . . . . . . . . . . . . . . 155--168
                Julien Cervelle   Covering Space in the Besicovitch
                                  Topology . . . . . . . . . . . . . . . . 169--178
      Jean-Marc Champarnaud and   
             Hadrien Jeanne and   
                 Ludovic Mignot   Approximate Regular Expressions and
                                  Their Derivatives  . . . . . . . . . . . 179--191
            Gabriel Ciobanu and   
               G. Michele Pinna   Catalytic Petri Nets Are Turing Complete 192--203
          Alberto Dennunzio and   
            Enrico Formenti and   
              Julien Provillard   Computational Complexity of Rule
                                  Distributions of Non-uniform Cellular
                                  Automata . . . . . . . . . . . . . . . . 204--215
          Danny Dubé and   
          Mario Latendresse and   
                  Pascal Tesson   Conservative Groupoids Recognize Only
                                  Regular Languages  . . . . . . . . . . . 216--227
           Michal Fori\vsek and   
               Lucia Keller and   
         Monika Steinová   Advice Complexity of Online Coloring for
                                  Paths  . . . . . . . . . . . . . . . . . 228--239
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7184, 2012

                 Artiom Alhazov   Properties of Membrane Systems . . . . . 1--13
                     Jacob Beal   Bridging Biology and Engineering
                                  Together with Spatial Computing  . . . . 14--18
            Jean-Louis Giavitto   The Modeling and the Simulation of the
                                  Fluid Machines of Synthetic Biology  . . 19--34
                 Radu Nicolescu   Parallel and Distributed Algorithms in P
                                  Systems  . . . . . . . . . . . . . . . . 35--50
             György Vaszil   Variants of Distributed P Automata and
                                  the Efficient Parallelizability of
                                  Languages  . . . . . . . . . . . . . . . 51--61
          Oana Agrigoroaiei and   
                Gabriel Ciobanu   Quantitative Causality in Membrane
                                  Systems  . . . . . . . . . . . . . . . . 62--72
             Artiom Alhazov and   
    Alexander Krassovitskiy and   
                 Yurii Rogozhin   Circular Post Machines and P Systems
                                  with Exo-insertion and Deletion  . . . . 73--86
  Francis George C. Cabarle and   
               Henry Adorna and   
      Miguel A. Martínez   A Spiking Neural P System Simulator
                                  Based on CUDA  . . . . . . . . . . . . . 87--103
          Lud\vek Cienciala and   
   Lucie Ciencialová and   
                Miroslav Langer   Modularity in P Colonies with Checking
                                  Rules  . . . . . . . . . . . . . . . . . 104--119
Erzsébet Csuhaj-Varjú and   
             György Vaszil   Finite dP Automata versus Multi-head
                                  Finite Automata  . . . . . . . . . . . . 120--138
         Michael J. Dinneen and   
                Yun-Bum Kim and   
                 Radu Nicolescu   An Adaptive Algorithm for P System
                                  Synchronization  . . . . . . . . . . . . 139--164
           Pierluigi Frisco and   
                   Gordon Govan   P Systems with Active Membranes
                                  Operating under Minimal Parallelism  . . 165--181
               Thomas Hinze and   
       Christian Bodenstein and   
             Benedict Schau and   
               Ines Heiland and   
                Stefan Schuster   Chemical Analog Computers for Clock
                                  Frequency Control Based on P Modules . . 182--202
               Xiaoli Huang and   
              Gexiang Zhang and   
                 Haina Rong and   
                Florentin Ipate   Evolutionary Design of a Simple Membrane
                                  System . . . . . . . . . . . . . . . . . 203--214
            Florentin Ipate and   
           Raluca Lefticaru and   
Ignacio Pérez-Hurtado and   
Mario J. Pérez-Jiménez   Formal Verification of P Systems with
                                  Active Membranes through Model Checking  215--225
                  Sergiu Ivanov   Basic Concurrency Resolution in
                                  Clock-Free P Systems . . . . . . . . . . 226--242
               Linqiang Pan and   
                   Jun Wang and   
          Hendrik Jan Hoogeboom   Asynchronous Extended Spiking Neural P
                                  Systems with Astrocytes  . . . . . . . . 243--256
Luis F. Macías--Ramos and   
Ignacio Pérez--Hurtado and   
Manuel García--Quismondo   A P-Lingua Based Simulator for Spiking
                                  Neural P Systems . . . . . . . . . . . . 257--281
             Vincenzo Manca and   
               Rosario Lombardo   Computing with Multi-membranes . . . . . 282--299
             Luca Marchetti and   
                 Vincenzo Manca   A Methodology Based on MP Theory for
                                  Gene Expression Analysis . . . . . . . . 300--313
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7185, 2012

                   Jun Fang and   
             Zhisheng Huang and   
             Frank van Harmelen   A Method of Contrastive Reasoning with
                                  Inconsistent Ontologies  . . . . . . . . 1--16
                   Yuan Ren and   
                Jeff Z. Pan and   
                      Kevin Lee   Parallel ABox Reasoning of $ {\mathcal
                                  {EL}} $ Ontologies . . . . . . . . . . . 17--32
                 Kisung Kim and   
                Bongki Moon and   
                 Hyoung-Joo Kim   RP-Filter: a Path-Based Triple Filtering
                                  Method for Efficient SPARQL Query
                                  Processing . . . . . . . . . . . . . . . 33--47
                 Hang Zhang and   
                     Wei Hu and   
                     Yuzhong Qu   Constructing Virtual Documents for
                                  Ontology Matching Using MapReduce  . . . 48--63
             Valeria Fionda and   
          Giuseppe Pirró   Semantic Flow Networks: Semantic
                                  Interoperability in Networks of
                                  Ontologies . . . . . . . . . . . . . . . 64--79
               Zhichun Wang and   
               Zhigang Wang and   
                  Juanzi Li and   
                    Jeff Z. Pan   Building a Large Scale Knowledge Base
                                  from Chinese Wiki Encyclopedia . . . . . 80--95
               Kouji Kozaki and   
             Keisuke Hihara and   
              Riiciro Mizoguchi   Dynamic \em Is --- a Hierarchy
                                  Generation System Based on User's
                                  Viewpoint  . . . . . . . . . . . . . . . 96--111
                 Lihua Zhao and   
                 Ryutaro Ichise   Mid-Ontology Learning from Linked Data   112--127
               Irene Celino and   
             Daniele Dell'Aglio   An Ontological Formulation and an OPM
                                  Profile for Causality in Planning
                                  Applications . . . . . . . . . . . . . . 128--143
                Jianfeng Du and   
                 Shuai Wang and   
                  Guilin Qi and   
                Jeff Z. Pan and   
                        Yong Hu   A New Matchmaking Approach Based on
                                  Abductive Conjunctive Query Answering    144--159
                     Qi Gao and   
                Fabian Abel and   
               Geert-Jan Houben   GeniUS: Generic User Modeling Library
                                  for the Social Semantic Web  . . . . . . 160--175
                  Yuan Tian and   
        Jürgen Umbrich and   
                        Yong Yu   Enhancing Source Selection for Live
                                  Queries over Linked Data via Query Log
                                  Mining . . . . . . . . . . . . . . . . . 176--191
              Mengdong Yang and   
                        Gang Wu   Semantic Caching for Semantic Web
                                  Applications . . . . . . . . . . . . . . 192--209
                   Xin Wang and   
        Thanassis Tiropanis and   
                  Hugh C. Davis   Evaluating Graph Traversal Algorithms
                                  for Distributed SPARQL Query
                                  Optimization . . . . . . . . . . . . . . 210--225
                 Gong Cheng and   
                    Feng Ji and   
               Shengmei Luo and   
                   Weiyi Ge and   
                     Yuzhong Qu   BipRank: Ranking and Summarizing RDF
                                  Vocabulary Descriptions  . . . . . . . . 226--241
                 Ross Horne and   
          Vladimiro Sassone and   
               Nicholas Gibbins   Operational Semantics for SPARQL Update  242--257
                  Peiqin Gu and   
                    Huajun Chen   Knowledge-Driven Diagnostic System for
                                  Traditional Chinese Medicine . . . . . . 258--267
                Wenlei Zhou and   
                Haofen Wang and   
              Jiansong Chao and   
               Weinan Zhang and   
                        Yong Yu   LODDO: Using Linked Open Data
                                  Description Overlap to Measure Semantic
                                  Relatedness between Named Entities . . . 268--283
             Andriy Nikolov and   
            Mathieu d'Aquin and   
                   Enrico Motta   What Should I Link to? Identifying
                                  Relevant Sources and Classes for Data
                                  Linking  . . . . . . . . . . . . . . . . 284--299
               Armin Haller and   
                Tudor Groza and   
              Florian Rosenberg   Interacting with Linked Data via
                                  Semantically Annotated Widgets . . . . . 300--317
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7186, 2012

           Howard Barringer and   
                 Klaus Havelund   Internal versus External DSLs for Trace
                                  Analysis . . . . . . . . . . . . . . . . 1--3
                  Chao Wang and   
                    Malay Ganai   Predicting Concurrency Failures in the
                                  Generalized Execution Traces of x86
                                  Executables  . . . . . . . . . . . . . . 4--18
        Borzoo Bonakdarpour and   
         Sebastian Fischmeister   Runtime Monitoring of Time-Sensitive
                                  Systems  . . . . . . . . . . . . . . . . 19--33
                 Martin Leucker   Teaching Runtime Verification  . . . . . 34--48
                   Sharad Malik   Runtime Verification: a Computer
                                  Architecture Perspective . . . . . . . . 49--62
              Lukasz Ziarek and   
           Siddharth Tiwary and   
             Suresh Jagannathan   Isolating Determinism in Multi-threaded
                                  Programs . . . . . . . . . . . . . . . . 63--77
               Horatiu Jula and   
             Silviu Andrica and   
                  George Candea   Efficiency Optimizations for
                                  Implementations of Deadlock Immunity . . 78--93
            Edwin Westbrook and   
               Jisheng Zhao and   
           Zoran Budimli\'c and   
                   Vivek Sarkar   Permission Regions for Race-Free
                                  Parallelism  . . . . . . . . . . . . . . 94--109
      Konstantin Serebryany and   
        Alexander Potapenko and   
         Timur Iskhodzhanov and   
                 Dmitriy Vyukov   Dynamic Race Detection with LLVM
                                  Compiler . . . . . . . . . . . . . . . . 110--114
      Narcisa Andreea Milea and   
            Siau Cheng Khoo and   
                   David Lo and   
                   Cristian Pop   NORT: Runtime Anomaly-Based Monitoring
                                  of Malicious Behavior for Windows  . . . 115--130
       Fabrizio Maria Maggi and   
        Michael Westergaard and   
              Marco Montali and   
        Wil M. P. van der Aalst   Runtime Verification of LTL-Based
                                  Declarative Process Models . . . . . . . 131--146
              Eugene Asarin and   
     Alexandre Donzé and   
                 Oded Maler and   
                 Dejan Nickovic   Parametric Identification of Temporal
                                  Properties . . . . . . . . . . . . . . . 147--160
          William N. Sumner and   
           Christian Hammer and   
                   Julian Dolby   Marathon: Detecting Atomic-Set
                                  Serializability Violations with Conflict
                                  Graphs . . . . . . . . . . . . . . . . . 161--176
           Bohuslav K\vrena and   
             Zden\vek Letko and   
          Tomá\vs Vojnar   Coverage Metrics for Saturation-Based
                                  and Search-Based Testing of Concurrent
                                  Software . . . . . . . . . . . . . . . . 177--192
           Scott D. Stoller and   
              Ezio Bartocci and   
             Justin Seyster and   
                 Radu Grosu and   
                 Klaus Havelund   Runtime Verification with State
                                  Estimation . . . . . . . . . . . . . . . 193--207
          Samaneh Navabpour and   
        Chun Wah Wallace Wu and   
        Borzoo Bonakdarpour and   
         Sebastian Fischmeister   Efficient Techniques for Near-Optimal
                                  Instrumentation in Time-Triggered
                                  Runtime Verification . . . . . . . . . . 208--222
              Paolo Arcaini and   
          Angelo Gargantini and   
              Elvinia Riccobene   CoMA: Conformance Monitoring of Java
                                  Programs by Abstract State Machines  . . 223--238
          Thomas Reinbacher and   
           Jörg Brauer and   
         Daniel Schachinger and   
             Andreas Steininger   Automated Test-Trace Inspection for
                                  Microcontroller Binary Code  . . . . . . 239--244
            Steven P. Reiss and   
                Alexander Tarvo   What Is My Program Doing? Program
                                  Dynamics in Programmer's Terms . . . . . 245--259
                David Basin and   
             Felix Klaedtke and   
              Eugen Z\ualinescu   Algorithms for Monitoring Real-Time
                                  Properties . . . . . . . . . . . . . . . 260--275
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7187, 2012

       Kristian Gjòsteen   The Norwegian Internet Voting Protocol   1--18
             Oliver Spycher and   
           Melanie Volkamer and   
                    Reto Koenig   Transparency and Technical Measures to
                                  Establish Trust in Norwegian Internet
                                  Voting . . . . . . . . . . . . . . . . . 19--35
Jordi Puiggalí Allepuz and   
  Sandra Guasch Castelló   Internet Voting System with Cast as
                                  Intended Verification  . . . . . . . . . 36--52
              Henry DeYoung and   
         Carsten Schürmann   Linear Logical Voting Protocols  . . . . 53--70
     Michael Schläpfer and   
                Rolf Haenni and   
                Reto Koenig and   
                 Oliver Spycher   Efficient Vote Authorization in
                                  Coercion-Resistant Internet Voting . . . 71--88
            Mario Heiderich and   
              Tilman Frosch and   
            Marcus Niemietz and   
              Jörg Schwenk   The Bug That Made Me President: a
                                  Browser- and Web-Security Case Study on
                                  Helios Voting  . . . . . . . . . . . . . 89--103
                Rui Joaquim and   
                 Carlos Ribeiro   An Efficient and Highly Sound Voter
                                  Verification Technique and Its
                                  Implementation . . . . . . . . . . . . . 104--121
           Aleksander Essex and   
          Christian Henrich and   
                 Urs Hengartner   Single Layer Optical-Scan Voting with
                                  Fully Distributed Trust  . . . . . . . . 122--139
                David Chaum and   
              Alex Florescu and   
               Mridul Nandi and   
          Stefan Popoveniuc and   
                  Jan Rubio and   
                 Poorvi L. Vora   Paperless Independently-Verifiable
                                  Voting . . . . . . . . . . . . . . . . . 140--157
             Denise Demirel and   
              Maria Henning and   
           Peter Y. A. Ryan and   
            Steve Schneider and   
               Melanie Volkamer   Feasibility Analysis of Prêt \`a Voter
                                  for German Federal Elections . . . . . . 158--173
            Steve Schneider and   
  Sriramkrishnan Srinivasan and   
              Chris Culnane and   
              James Heather and   
                        Zhe Xia   Prêt á Voter with Write-Ins  . . . . . . . 174--189
              Sergiu Bursuc and   
        Gurchetan S. Grewal and   
                   Mark D. Ryan   Trivitas: Voters Directly Verifying
                                  Votes  . . . . . . . . . . . . . . . . . 190--207
               Sven Heiberg and   
                Peeter Laud and   
                  Jan Willemson   The Application of I-Voting for Estonian
                                  Parliamentary Elections of 2011  . . . . 208--223
           Richard Buckland and   
             Vanessa Teague and   
                     Roland Wen   Towards Best Practice for E-election
                                  Systems  . . . . . . . . . . . . . . . . 224--241
              James Heather and   
           Morgan Llewellyn and   
             Vanessa Teague and   
                     Roland Wen   On the Side-Effects of Introducing
                                  E-Voting . . . . . . . . . . . . . . . . 242--256
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7188, 2012

                     Peter Auer   Invited Talk: UCRL and Autonomous
                                  Exploration  . . . . . . . . . . . . . . 1--1
              Kristian Kersting   Invited Talk: Increasing
                                  Representational Power and Scaling
                                  Inference in Reinforcement Learning  . . 2--2
                    Peter Stone   Invited Talk: PRISM --- Practical RL:
                                  Representation, Interaction, Synthesis,
                                  and Mortality  . . . . . . . . . . . . . 3--3
        Csaba Szepesvári   Invited Talk: Towards Robust
                                  Reinforcement Learning Algorithms  . . . 4--4
               Francis Maes and   
             Louis Wehenkel and   
                   Damien Ernst   Automatic Discovery of Ranking Formulas
                                  for Playing with Multi-armed Bandits . . 5--17
           Sylvie C. W. Ong and   
              Yuri Grinberg and   
                  Joelle Pineau   Goal-Directed Online Learning of
                                  Predictive Models  . . . . . . . . . . . 18--29
            Matthew Robards and   
                  Peter Sunehag   Gradient Based Algorithms with Loss
                                  Functions and Kernels for Improved
                                  On-Policy Control  . . . . . . . . . . . 30--41
Mauricio Araya-López and   
             Olivier Buffet and   
             Vincent Thomas and   
     François Charpillet   Active Learning of MDP Models  . . . . . 42--53
               Boris Lesner and   
                Bruno Zanuttini   Handling Ambiguous Effects in Action
                                  Learning . . . . . . . . . . . . . . . . 54--65
              Phuong Nguyen and   
              Peter Sunehag and   
                  Marcus Hutter   Feature Reinforcement Learning in
                                  Practice . . . . . . . . . . . . . . . . 66--77
                  Charles Elkan   Reinforcement Learning with a Bilinear Q
                                  Function . . . . . . . . . . . . . . . . 78--88
             Matthieu Geist and   
                 Bruno Scherrer   $ \ell_1 $-Penalized Projected Bellman
                                  Residual . . . . . . . . . . . . . . . . 89--101
         Matthew W. Hoffman and   
         Alessandro Lazaric and   
       Mohammad Ghavamzadeh and   
              Rémi Munos   Regularized Least Squares Temporal
                                  Difference Learning with Nested $ \ell_2
                                  $ and $ \ell_1 $ Penalization  . . . . . 102--114
             Bruno Scherrer and   
                 Matthieu Geist   Recursive Least-Squares Learning with
                                  Eligibility Traces . . . . . . . . . . . 115--127
      Nikolaos Tziortziotis and   
            Konstantinos Blekas   Value Function Approximation through
                                  Sparse Bayesian Modeling . . . . . . . . 128--139
        Pablo Samuel Castro and   
                   Doina Precup   Automatic Construction of Temporally
                                  Extended Actions for MDPs Using
                                  Bisimulation Metrics . . . . . . . . . . 140--152
               Kfir Y. Levy and   
                  Nahum Shimkin   Unified Inter and Intra Options Learning
                                  Using Policy Gradient Methods  . . . . . 153--164
             Munu Sairamesh and   
            Balaraman Ravindran   Options with Exceptions  . . . . . . . . 165--176
          Christos Dimitrakakis   Robust Bayesian Reinforcement Learning
                                  through Tight Lower Bounds . . . . . . . 177--188
               Francis Maes and   
             Louis Wehenkel and   
                   Damien Ernst   Optimized Look-ahead Tree Search
                                  Policies . . . . . . . . . . . . . . . . 189--200
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7189, 2012

             Andreas Berger and   
                  Eduard Natale   Assessing the Real-World Dynamics of DNS 1--14
            Vinicius Gehlen and   
        Alessandro Finamore and   
               Marco Mellia and   
           Maurizio M. Munaf\`o   Uncovering the Big Players of the Web    15--28
             Steffen Gebert and   
               Rastin Pries and   
           Daniel Schlosser and   
                     Klaus Heck   Internet Access Traffic Measurement and
                                  Analysis . . . . . . . . . . . . . . . . 29--42
                 Liang Chen and   
                Xingang Shi and   
                  Dah Ming Chiu   From ISP Address Announcement Patterns
                                  to Routing Scalability . . . . . . . . . 43--47
       Juan Pablo Timpanaro and   
         Isabelle Chrisment and   
                 Olivier Festor   I2P's Usage Characterization . . . . . . 48--51
              Claudio Testa and   
                Dario Rossi and   
                 Ashwin Rao and   
                  Arnaud Legout   Experimental Assessment of BitTorrent
                                  Completion Time in Heterogeneous TCP/uTP
                                  Swarms . . . . . . . . . . . . . . . . . 52--65
       Pierdomenico Fiadino and   
             Danilo Valerio and   
             Fabio Ricciato and   
              Karin Anna Hummel   Steps towards the Extraction of
                                  Vehicular Mobility Patterns from 3G
                                  Signaling Data . . . . . . . . . . . . . 66--80
                  Jan Jusko and   
                   Martin Rehak   Identifying Skype Nodes in the Network
                                  Exploiting Mutual Contacts . . . . . . . 81--84
          Alfonso Iacovazzi and   
                Andrea Baiocchi   Padding and Fragmentation for Masking
                                  Packet Length Statistics . . . . . . . . 85--88
      Cihangir Be\csikta\cs and   
         Hacì Ali Mantar   Real-Time Traffic Classification Based
                                  on Cosine Similarity Using
                                  Sub-application Vectors  . . . . . . . . 89--92
               Karel Bartos and   
                   Martin Rehak   Towards Efficient Flow Sampling
                                  Technique for Anomaly Detection  . . . . 93--106
             Aymen Hafsaoui and   
     Guillaume Urvoy-Keller and   
            Matti Siekkinen and   
                 Denis Collange   Detecting and Profiling TCP Connections
                                  Experiencing Abnormal Performance  . . . 107--120
              Yuval Shavitt and   
                  Noa Zilberman   Geographical Internet PoP Level Maps . . 121--124
                   Heng Cui and   
                 Ernst Biersack   Distributed Troubleshooting of Web
                                  Sessions Using Clustering  . . . . . . . 125--128
         Pehr Söderman and   
              Markus Hidell and   
              Peter Sjödin   Using Metadata to Improve Experiment
                                  Reliability in Shared Environments . . . 129--142
                  Luca Deri and   
            Simone Mainardi and   
                Francesco Fusco   \tt tsdb: a Compressed Database for Time
                                  Series . . . . . . . . . . . . . . . . . 143--156
             Nicola Bonelli and   
           Andrea Di Pietro and   
           Stefano Giordano and   
              Gregorio Procissi   Flexible High Performance Traffic
                                  Generation on Commodity Multi--core
                                  Platforms  . . . . . . . . . . . . . . . 157--170
 João Marco C. Silva and   
              Solange Rito Lima   Improving Network Measurement Efficiency
                                  through Multiadaptive Sampling . . . . . 171--174
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7190, 2012

            Colin Bellinger and   
                 B. John Oommen   On the Pattern Recognition and
                                  Classification of Stochastically
                                  Episodic Events  . . . . . . . . . . . . 1--35
            Linh Anh Nguyen and   
                Andrzej Sza\las   Paraconsistent Reasoning for Semantic
                                  Web Agents . . . . . . . . . . . . . . . 36--55
          Zulfiqar A. Memon and   
                      Jan Treur   An Agent Model for Cognitive and
                                  Affective Empathic Understanding of
                                  Other Agents . . . . . . . . . . . . . . 56--83
             Jacek Jakie\la and   
              Pawe\l Litwin and   
                   Marcin Olech   Multiagent Based Simulation as a Supply
                                  Chain Analysis Workbench . . . . . . . . 84--104
            Leszek Kotulski and   
                 Adam S\kedziwy   On the Effective Distribution and
                                  Maintenance of Knowledge Represented by
                                  Complementary Graphs . . . . . . . . . . 105--120
            Magdalena Godlewska   Agent System for Managing Distributed
                                  Mobile Interactive Documents in
                                  Knowledge-Based Organizations  . . . . . 121--145
Bart\lomiej Józef Dzie\'nkowski   Agent Cooperation within Adversarial
                                  Teams in Dynamic Environment --- Key
                                  Issues and Development Trends  . . . . . 146--169
           Bogumil Kaminski and   
                   Maciej Latek   On Pricing Strategies of Boundedly
                                  Rational Telecommunication Operators . . 170--180
                Norihiro Kamide   Reasoning about Time-Dependent
                                  Multi-agents: Foundations of Theorem
                                  Proving and Model Checking . . . . . . . 181--201
                   Filippo Neri   Learning Predictive Models for Financial
                                  Time Series by Using Agent Based
                                  Simulations  . . . . . . . . . . . . . . 202--221
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7191, 2012

            Lieven De Lathauwer   Block Component Analysis, a New Concept
                                  for Blind Source Separation  . . . . . . 1--8
             Tomer Michaeli and   
             Daniel Sigalov and   
                Yonina C. Eldar   Partially Linear Estimation with
                                  Application to Image Deblurring Using
                                  Blurred/Noisy Image Pairs  . . . . . . . 9--16
               Zhitang Chen and   
                    Laiwan Chan   Causal Discovery for Linear Non-Gaussian
                                  Acyclic Models in the Presence of Latent
                                  Gaussian Confounders . . . . . . . . . . 17--24
               Stefan Haufe and   
           Vadim V. Nikulin and   
                    Guido Nolte   Alleviating the Influence of Weak Data
                                  Asymmetries on Granger-Causal Analyses   25--33
                Zhiyao Duan and   
          Gautham J. Mysore and   
                Paris Smaragdis   Online PLCA for Real-Time
                                  Semi-supervised Source Separation  . . . 34--41
            Benedikt Loesch and   
                       Bin Yang   Cramér--Rao Bound for Circular Complex
                                  Independent Component Analysis . . . . . 42--49
                    Ke Wang and   
             Xiao-Feng Gong and   
                    Qiu-Hua Lin   Complex Non-Orthogonal Joint
                                  Diagonalization Based on LU and LQ
                                  Decompositions . . . . . . . . . . . . . 50--57
            Yannick Deville and   
                  Alain Deville   Exact and Approximate Quantum
                                  Independent Component Analysis for Qubit
                                  Uncoupling . . . . . . . . . . . . . . . 58--65
                   Hao Shen and   
            Martin Kleinsteuber   A Matrix Joint Diagonalization Approach
                                  for Complex Independent Vector Analysis  66--73
                   Hao Shen and   
            Martin Kleinsteuber   Algebraic Solutions to Complex Blind
                                  Source Separation  . . . . . . . . . . . 74--81
                   Arie Yeredor   On the Separation Performance of the
                                  Strong Uncorrelating Transformation When
                                  Applied to Generalized Covariance and
                                  Pseudo-covariance Matrices . . . . . . . 82--90
              Juha Karhunen and   
                   Tele Hao and   
          Jarkko Ylipaavalniemi   A Canonical Correlation Analysis Based
                                  Method for Improving BSS of Two Related
                                  Data Sets  . . . . . . . . . . . . . . . 91--98
      Julian Mathias Becker and   
             Martin Spiertz and   
                   Volker Gnann   A Probability-Based Combination Method
                                  for Unsupervised Clustering with
                                  Application to Blind Source Separation   99--106
                Alon Slapak and   
                   Arie Yeredor   Charrelation Matrix Based ICA  . . . . . 107--114
            Jason A. Palmer and   
                   Scott Makeig   Contrast Functions for Independent
                                  Subspace Analysis  . . . . . . . . . . . 115--122
      Jarkko Ylipaavalniemi and   
               Nima Reyhani and   
         Ricardo Vigário   Distributional Convergence of Subspace
                                  Estimates in FastICA: a Bootstrap Study  123--130
           Sylvain Le Corff and   
              Gersende Fort and   
                  Eric Moulines   New Online EM Algorithms for General
                                  Hidden Markov Models. Application to the
                                  SLAM Problem . . . . . . . . . . . . . . 131--138
             Miguel Almeida and   
     Ricardo Vigário and   
       José Bioucas-Dias   The Role of Whitening for Separation of
                                  Synchronous Sources  . . . . . . . . . . 139--146
              Frank C. Meinecke   Simultaneous Diagonalization of
                                  Skew-Symmetric Matrices in the
                                  Symplectic Group . . . . . . . . . . . . 147--154
                 Dana Lahat and   
Jean-François Cardoso and   
                   Hagit Messer   Joint Block Diagonalization Algorithms
                                  for Optimal Separation of
                                  Multidimensional Components  . . . . . . 155--162
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7192, 2012

              Changhyun Lee and   
                  D. K. Lee and   
                       Sue Moon   Unmasking the Growing UDP Traffic in a
                                  Campus Network . . . . . . . . . . . . . 1--10
                Nadi Sarrar and   
               Gregor Maier and   
              Bernhard Ager and   
               Robin Sommer and   
                    Steve Uhlig   Investigating IPv6 Traffic . . . . . . . 11--20
              Ahlem Reggani and   
           Fabian Schneider and   
                Renata Teixeira   An End-Host View on Local Traffic at
                                  Home and Work  . . . . . . . . . . . . . 21--31
      Mikko V. J. Heikkinen and   
               Arthur W. Berger   Comparison of User Traffic
                                  Characteristics on Mobile-Access versus
                                  Fixed-Access Networks  . . . . . . . . . 32--41
             Christian Lyra and   
             Carmem S. Hara and   
           Elias P. Duarte, Jr.   BackStreamDB: a Distributed System for
                                  Backbone Traffic Monitoring Providing
                                  Arbitrary Measurements in Real-Time  . . 42--52
               Lukasz Golab and   
           Theodore Johnson and   
             Subhabrata Sen and   
                 Jennifer Yates   A Sequence-Oriented Stream Warehouse
                                  Paradigm for Network Monitoring
                                  Applications . . . . . . . . . . . . . . 53--63
             Nicola Bonelli and   
           Andrea Di Pietro and   
           Stefano Giordano and   
              Gregorio Procissi   On Multi--gigabit Packet Capturing with
                                  Multi--core Commodity Hardware . . . . . 64--73
            Yordanos Beyene and   
         Michalis Faloutsos and   
           Harsha V. Madhyastha   SyFi: a Systematic Approach for
                                  Estimating Stateful Firewall Performance 74--84
         Charalampos Rotsos and   
                Nadi Sarrar and   
                Steve Uhlig and   
               Rob Sherwood and   
                Andrew W. Moore   OFLOPS: An Open Framework for OpenFlow
                                  Switch Evaluation  . . . . . . . . . . . 85--95
            Lucas DiCioccio and   
            Renata Teixeira and   
                 Martin May and   
             Christian Kreibich   Probe and Pray: Using UPnP for Home
                                  Network Measurements . . . . . . . . . . 96--105
            Moshe Rutgaizer and   
              Yuval Shavitt and   
               Omer Vertman and   
                  Noa Zilberman   Detecting Pedophile Activity in
                                  BitTorrent Networks  . . . . . . . . . . 106--115
                Maria Konte and   
                  Nick Feamster   Re-wiring Activity of Malicious Networks 116--125
       Rafael R. R. Barbosa and   
                Ramin Sadre and   
                      Aiko Pras   Difficulties in Modeling SCADA Traffic:
                                  a Comparative Analysis . . . . . . . . . 126--135
           Ahmed Elmokashfi and   
             Amund Kvalbein and   
                  Jie Xiang and   
            Kristian R. Evensen   Characterizing Delays in Norwegian $3$G
                                  Networks . . . . . . . . . . . . . . . . 136--146
              Xiaozheng Tie and   
       Kishore Ramachandran and   
                Rajesh Mahindra   On 60 GHz Wireless Link Performance in
                                  Indoor Environments  . . . . . . . . . . 147--157
             Sipat Triukose and   
            Sebastien Ardon and   
            Anirban Mahanti and   
               Aaditeshwar Seth   Geolocating IP Addresses in Cellular
                                  Data Networks  . . . . . . . . . . . . . 158--167
                  Oana Goga and   
                Renata Teixeira   Speed Measurements of Residential
                                  Internet Access  . . . . . . . . . . . . 168--178
                 Nevil Brownlee   One-Way Traffic Monitoring with iatmon   179--188
           Walter de Donato and   
           Pietro Marchetta and   
         Antonio Pescapé   A Hands-on Look at Active Probing Using
                                  the IP Prespecified Timestamp Option . . 189--199
     Matthias Wählisch and   
          Thomas C. Schmidt and   
        Markus de Brün and   
           Thomas Häberlen   Exposing a Nation-Centric View on the
                                  German Internet --- a Change in
                                  Perspective on AS-Level  . . . . . . . . 200--210
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7193, 2012

               Thomas Schilling   Constraint-Free Type Error Slicing . . . 1--16
          Vladimir Komendantsky   Subtyping by Folding an Inductive
                                  Relation into a Coinductive One  . . . . 17--32
                    Edwin Brady   Epic --- a Library for Generating
                                  Compilers  . . . . . . . . . . . . . . . 33--48
            Laurence E. Day and   
                  Graham Hutton   Towards Modular Compilers for Effects    49--64
Jean-Christophe Filliâtre and   
             K. Kalyanasundaram   Functory: a Distributed Computing
                                  Library for Objective Caml . . . . . . . 65--81
          Christopher Brown and   
        Hans-Wolfgang Loidl and   
                  Kevin Hammond   ParaForming: Forming Parallel Haskell
                                  Programs Using Novel Refactoring
                                  Techniques . . . . . . . . . . . . . . . 82--97
              Jost Berthold and   
           Andrzej Filinski and   
             Fritz Henglein and   
           Ken Friis Larsen and   
              Mogens Steffensen   Functional High Performance Financial IT 98--113
                Michael Lesniak   Thread-Safe Priority Queues in Haskell
                                  Based on Skiplists . . . . . . . . . . . 114--129
                   Milan Straka   Adams' Trees Revisited . . . . . . . . . 130--145
        Marco T. Morazán   Functional Video Games in CS1 II . . . . 146--162
              Jeroen Henrix and   
           Rinus Plasmeijer and   
                   Peter Achten   GiN: a Graphical Language and Tool for
                                  Defining iTask Workflows . . . . . . . . 163--178
Germán Andrés Delbianco and   
           Mauro Jaskelioff and   
                  Alberto Pardo   Applicative Shortcut Fusion  . . . . . . 179--194
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7195, 2012

                  Soren Lauesen   Why the Electronic Land Registry Failed  1--15
              Barbara Paech and   
            Robert Heinrich and   
        Gabriele Zorn-Pauli and   
               Andreas Jung and   
                 Siamak Tadjiky   Answering a Request for Proposal ---
                                  Challenges and Proposed Solutions  . . . 16--29
     Md. Rashed Iqbal Nekvi and   
          Nazim H. Madhavji and   
               Remo Ferrari and   
                Brian Berenbach   Impediments to Requirements-Compliance   30--36
             Eltjo R. Poort and   
               Nick Martens and   
          Inge van de Weerd and   
                 Hans van Vliet   How Architects See Non-Functional
                                  Requirements: Beware of Modifiability    37--51
                  Anne Koziolek   Research Preview: Prioritizing Quality
                                  Requirements Based on Software
                                  Architecture Evaluation Feedback . . . . 52--58
                Junjie Wang and   
                    Juan Li and   
                  Qing Wang and   
                   He Zhang and   
                    Haitao Wang   A Simulation Approach for Impact
                                  Analysis of Requirement Volatility
                                  Considering Dependency Change  . . . . . 59--76
             Nguyen Duc Anh and   
          Daniela S. Cruzes and   
             Reidar Conradi and   
           Martin Höst and   
                  Xavier Franch   Collaborative Resolution of Requirements
                                  Mismatches When Adopting Open Source
                                  Components . . . . . . . . . . . . . . . 77--93
             Tim Gülke and   
             Bernhard Rumpe and   
              Martin Jansen and   
                 Joachim Axmann   High-Level Requirements Management and
                                  Complexity Costs in Automotive
                                  Development Projects: a Problem
                                  Statement  . . . . . . . . . . . . . . . 94--100
              Martin Mahaux and   
             Alistair Mavin and   
                Patrick Heymans   Choose Your Creativity: Why and How
                                  Creativity in Requirements Engineering
                                  Means Different Things to Different
                                  People . . . . . . . . . . . . . . . . . 101--116
        Christian Raspotnig and   
                 Andreas Opdahl   Supporting Failure Mode and Effect
                                  Analysis: a Case Study with Failure
                                  Sequence Diagrams  . . . . . . . . . . . 117--131
Mohammad Jabed Morshed Chowdhury and   
   Raimundas Matulevi\vcius and   
             Guttorm Sindre and   
                  Peter Karpati   Aligning Mal-activity Diagrams and
                                  Security Risk Management for Security
                                  Requirements Definitions . . . . . . . . 132--139
              Nicolas Genon and   
              Patrice Caire and   
           Hubert Toussaint and   
            Patrick Heymans and   
                   Daniel Moody   Towards a More Semantically Transparent
                                  i* Visual Syntax . . . . . . . . . . . . 140--146
                 Sebastian Adam   Providing Software Product Line
                                  Knowledge to Requirements Engineers ---
                                  a Template for Elicitation Instructions  147--164
                Eric Knauss and   
                 Kurt Schneider   Supporting Learning Organisations in
                                  Writing Better Requirements Documents
                                  Based on Heuristic Critiques . . . . . . 165--171
          Olawande Daramola and   
               Thomas Moser and   
             Guttorm Sindre and   
                   Stefan Biffl   Managing Implicit Requirements Using
                                  Semantic Case-Based Reasoning Research
                                  Preview  . . . . . . . . . . . . . . . . 172--178
         Jane Cleland-Huang and   
              Mats Heimdahl and   
         Jane Huffman Hayes and   
                 Robyn Lutz and   
                 Patrick Maeder   Trace Queries for Safety Requirements in
                                  High Assurance Systems . . . . . . . . . 179--193
                    Yang Li and   
                   Walid Maalej   Which Traceability Visualization Is
                                  Suitable in This Context? A Comparative
                                  Study  . . . . . . . . . . . . . . . . . 194--210
               Daniel Berry and   
            Ricardo Gacitua and   
                Pete Sawyer and   
              Sri Fatimah Tjong   The Case for Dumb Requirements
                                  Engineering Tools  . . . . . . . . . . . 211--217
                 Elia Bruni and   
            Alessio Ferrari and   
              Norbert Seyff and   
               Gabriele Tolomei   Automatic Analysis of Multimodal
                                  Requirements: a Research Preview . . . . 218--224
           Elke Hochmüller   10 Myths of Software Quality . . . . . . 225--231
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7196, 2012

           Grzegorz Skorupa and   
        Wojciech Lorkiewicz and   
          Rados\law Katarzyniak   A Multi-agent Strategy for Integration
                                  of Imprecise Descriptions  . . . . . . . 1--10
          Kazimierz Wilkosz and   
         Zofia Kruczkiewicz and   
            Tomasz Babczy\'nski   Performance Evaluation of
                                  Multiagent-System Oriented Models for
                                  Efficient Power System Topology
                                  Verification . . . . . . . . . . . . . . 11--20
      Nguyen Tran Minh Khue and   
                    Nhon Van Do   Building a Model of an Intelligent
                                  Multi-Agent System Based on Distributed
                                  Knowledge Bases for Solving Problems
                                  Automatically  . . . . . . . . . . . . . 21--32
            Fu-Shiung Hsieh and   
                    Jim-Bon Lin   Temporal Reasoning in Multi-agent
                                  Workflow Systems Based on Formal Models  33--42
        Vinh Gia Nhi Nguyen and   
            Hiep Xuan Huynh and   
                 Alexis Drogoul   Assessing Rice Area Infested by Brown
                                  Plant Hopper Using Agent-Based and
                                  Dynamically Upscaling Approach . . . . . 43--52
      Vishnuvardhan Mannava and   
                      T. Ramesh   A Service Administration Design Pattern
                                  for Dynamically Configuring
                                  Communication Services in Autonomic
                                  Computing Systems  . . . . . . . . . . . 53--63
                     Jialin Liu   Chemical Process Fault Diagnosis Based
                                  on Sensor Validation Approach  . . . . . 64--73
      Krzysztof Brzostowski and   
         Jaros\law Drapa\la and   
              Jerzy \'Swi\katek   System Analysis Techniques in eHealth
                                  Systems: a Case Study  . . . . . . . . . 74--85
              Hsueh-Wu Wang and   
               Ying-Ming Wu and   
                Yen-Ling Lu and   
                Ying-Tung Hsiao   Detection of Facial Features on Color
                                  Face Images  . . . . . . . . . . . . . . 86--101
                      YuLung Wu   Adaptive Learning Diagnosis Mechanisms
                                  for E-Learning . . . . . . . . . . . . . 102--110
                   Wei-Ming Yeh   New Integration Technology for Video
                                  Virtual Reality  . . . . . . . . . . . . 111--117
              Hai-Cheng Chu and   
                   Szu-Wei Yang   Innovative Semantic Web Services for
                                  Next Generation Academic Electronic
                                  Library via Web 3.0 via Distributed
                                  Artificial Intelligence  . . . . . . . . 118--124
             Shyi-Ming Chen and   
              Yun-Hou Huang and   
            Rung-Ching Chen and   
               Szu-Wei Yang and   
                  Tian-Wei Sheu   Using Fuzzy Reasoning Techniques and the
                                  Domain Ontology for Anti-Diabetic Drugs
                                  Recommendation . . . . . . . . . . . . . 125--135
             Jia-Shing Sheu and   
               Yi-Ching Kao and   
                        Hao Chu   Content-Aware Image Resizing Based on
                                  Aesthetic  . . . . . . . . . . . . . . . 136--145
                    Nhon Do and   
                    Thu-Le Pham   A Functional Knowledge Model and
                                  Application  . . . . . . . . . . . . . . 146--155
            Trong Hai Duong and   
            Hai Bang Truong and   
              Ngoc Thanh Nguyen   Local Neighbor Enrichment for Ontology
                                  Integration  . . . . . . . . . . . . . . 156--166
           Hsiang-Chuan Liu and   
              Shang-Ling Ou and   
           Hsien-Chang Tsai and   
               Yih-Chang Ou and   
                    Yen-Kuei Yu   A Novel Choquet Integral Composition
                                  Forecasting Model Based on M-Density . . 167--176
             Shota Sugiyama and   
             Hidemi Yamachi and   
          Munehiro Takimoto and   
             Yasushi Kambayashi   Aggregating Multiple Robots with
                                  Serialization  . . . . . . . . . . . . . 177--186
            Hai Bang Truong and   
              Ngoc Thanh Nguyen   A Multi-attribute and Multi-valued Model
                                  for Fuzzy Ontology Integrationon
                                  Instance Level . . . . . . . . . . . . . 187--197
              Keisuke Satta and   
          Munehiro Takimoto and   
             Yasushi Kambayashi   Making Autonomous Robots Form Lines  . . 198--207
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7197, 2012

             Long Thanh Ngo and   
                  Binh Huy Pham   Approach to Image Segmentation Based on
                                  Interval Type-2 Fuzzy Subtractive
                                  Clustering . . . . . . . . . . . . . . . 1--10
        M. Javad Zomorodian and   
                  Ali Adeli and   
           Mehrnoosh Sinaee and   
                 Sattar Hashemi   Improving Nearest Neighbor
                                  Classification by Elimination of Noisy
                                  Irrelevant Features  . . . . . . . . . . 11--21
               Naveen Kumar and   
              Anamika Gupta and   
              Vasudha Bhatnagar   Lattice Based Associative Classifier . . 22--31
             Shu-Ling Shieh and   
               Tsu-Chun Lin and   
                    Yu-Chin Szu   An Efficient Clustering Algorithm Based
                                  on Histogram Threshold . . . . . . . . . 32--39
                    Mary Wu and   
                InTaek Leem and   
              Jason J. Jung and   
                   ChongGun Kim   A Resource Reuse Method in Cluster
                                  Sensor Networks in Ad Hoc Networks . . . 40--50
               Hyon Hee Kim and   
                  Jinnam Jo and   
                   Donggeon Kim   Generation of Tag-Based User Profiles
                                  for Clustering Users in a Social Music
                                  Site . . . . . . . . . . . . . . . . . . 51--61
                Tzu-Fu Chiu and   
               Chao-Fu Hong and   
                   Yu-Ting Chiu   A Proposed IPC-Based Clustering and
                                  Applied to Technology Strategy
                                  Formulation  . . . . . . . . . . . . . . 62--72
       Rajermani Thinakaran and   
         Elankovan Sundararajan   Cluster Control Management as Cluster
                                  Middleware . . . . . . . . . . . . . . . 73--82
                     Xin He and   
                Huiyun Jing and   
                     Qi Han and   
                      Xiamu Niu   A Novel Nonparametric Approach for
                                  Saliency Detection Using Multiple
                                  Features . . . . . . . . . . . . . . . . 83--90
                Huiyun Jing and   
                     Xin He and   
                     Qi Han and   
                      Xiamu Niu   Motion Vector Based Information Hiding
                                  Algorithm for H.264/AVC against Motion
                                  Vector Steganalysis  . . . . . . . . . . 91--98
                  Xiamu Niu and   
             Zhongwei Shuai and   
              Yongqiang Lin and   
                      Xuehu Yan   A Novel Coding Method for Multiple
                                  System Barcode Based on QR Code  . . . . 99--108
                 Xiaolv Guo and   
              Shu-Chuan Chu and   
               Lin-Lin Tang and   
            John F. Roddick and   
                Jeng-Shyang Pan   A Research on Behavior of Sleepy Lizards
                                  Based on KNN Algorithm . . . . . . . . . 109--118
                  Lijun Yan and   
              Shu-Chuan Chu and   
            John F. Roddick and   
                Jeng-Shyang Pan   Directional Discriminant Analysis Based
                                  on Nearest Feature Line  . . . . . . . . 119--128
              Cheonshik Kim and   
              Dongkyoo Shin and   
                Dongil Shin and   
                Ching-Nung Yang   A $ (2, 2) $ Secret Sharing Scheme Based
                                  on Hamming Code and AMBTC  . . . . . . . 129--139
              Jen-Chi Huang and   
               Wen-Shyong Hsieh   An Automatic Image Inpainting Method for
                                  Rigid Moving Object  . . . . . . . . . . 140--147
                 Wu-Chih Hu and   
                    Jung-Fu Hsu   Automatic Image Matting Using
                                  Component-Hue-Difference-Based Spectral
                                  Matting  . . . . . . . . . . . . . . . . 148--157
 Hooman Aghaebrahimi Samani and   
Jeffrey Tzu Kwan Valino Koh and   
                Elham Saadatian   Towards Robotics Leadership: An Analysis
                                  of Leadership Characteristics and the
                                  Roles Robots Will Inherit in Future
                                  Human Society  . . . . . . . . . . . . . 158--165
                 Meinu Quan and   
              Xuan Hau Pham and   
              Jason J. Jung and   
                    Dosam Hwang   Understanding Information Propagation on
                                  Online Social Tagging Systems: a Case
                                  Study on Flickr  . . . . . . . . . . . . 166--174
                Namho Chung and   
                 Chulmo Koo and   
                 Seung-Bae Park   Why People Share Information in Social
                                  Network Sites? Integrating with Uses and
                                  Gratification and Social Identity
                                  Theories . . . . . . . . . . . . . . . . 175--184
             Chien-wen Shen and   
                Ping-Yu Hsu and   
                  Yen-Ting Peng   The Impact of Data Environment and
                                  Profitability on Business Intelligence
                                  Adoption . . . . . . . . . . . . . . . . 185--193
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7198, 2012

             Young Wook Seo and   
            Seong Wook Chae and   
                  Kun Chang Lee   The Impact of Human Brand Image Appeal
                                  on Visual Attention and Purchase
                                  Intentions at an E-commerce Website  . . 1--9
            Seong Wook Chae and   
             Young Wook Seo and   
                  Kun Chang Lee   Exploring Human Brands in Online
                                  Shopping: An Eye-Tracking Approach . . . 10--18
                Nam Yong Jo and   
              Kun Chang Lee and   
                   Dae Sung Lee   Task Performance under Stressed and
                                  Non-stressed Conditions: Emphasis on
                                  Physiological Approaches . . . . . . . . 19--26
               Min Hee Hahn and   
              Do Young Choi and   
                  Kun Chang Lee   Characteristics of Decision-Making for
                                  Different Levels of Product Involvement
                                  Depending on the Degree of Trust
                                  Transfer: a Comparison of Cognitive
                                  Decision-Making Criteria and
                                  Physiological Responses  . . . . . . . . 27--36
              Do Young Choi and   
               Min Hee Hahn and   
                  Kun Chang Lee   A Comparison of Buying Decision Patterns
                                  by Product Involvement: An Eye-Tracking
                                  Approach . . . . . . . . . . . . . . . . 37--46
               Dae Sung Lee and   
              Kun Chang Lee and   
                    Nam Yong Jo   The Influence of Team-Member Exchange on
                                  Self-reported Creativity in the Korean
                                  Information and Communication Technology
                                  (ICT) Industry . . . . . . . . . . . . . 47--54
                   Lingzhi Wang   Semi-parametric Smoothing Regression
                                  Model Based on GA for Financial Time
                                  Series Forecasting . . . . . . . . . . . 55--64
         Mythili Asaithambi and   
       Sujatha C. Manoharan and   
         Srinivasan Subramanian   Classification of Respiratory
                                  Abnormalities Using Adaptive Neuro Fuzzy
                                  Inference System . . . . . . . . . . . . 65--73
                   Nai-Hua Chen   An Ant Colony Optimization and Bayesian
                                  Network Structure Application for the
                                  Asymmetric Traveling Salesman Problem    74--78
               S. A. Jafari and   
                S. Mashohor and   
              Abd. R. Ramli and   
           M. Hamiruce Marhaban   Expert Pruning Based on Genetic
                                  Algorithm in Regression Problems . . . . 79--88
       Amirhossein Ghodrati and   
                 Shahriar Lotfi   A Hybrid CS/PSO Algorithm for Global
                                  Optimization . . . . . . . . . . . . . . 89--98
       Amirhossein Ghodrati and   
      Mohammad V. Malakooti and   
            Mansooreh Soleimani   A Hybrid ICA/PSO Algorithm by Adding
                                  Independent Countries for Large Scale
                                  Global Optimization  . . . . . . . . . . 99--108
           Fatemeh Ramezani and   
                 Shahriar Lotfi   The Modified Differential Evolution
                                  Algorithm (MDEA) . . . . . . . . . . . . 109--118
   M. A. Soltani-Sarvestani and   
             Shahriar Lotfi and   
               Fatemeh Ramezani   Quad Countries Algorithm (QCA) . . . . . 119--129
      Vishnuvardhan Mannava and   
                      T. Ramesh   An Aspectual Feature Module Based
                                  Adaptive Design Pattern for Autonomic
                                  Computing Systems  . . . . . . . . . . . 130--140
Noorhuzaimi Karimah Mohd Noor and   
         Shahrul Azman Noah and   
         Mohd Juzaiddin Ab Aziz   Malay Anaphor and Antecedent Candidate
                                  Identification: a Proposed Solution  . . 141--151
             V. Viswanathan and   
           Ilango Krishnamurthi   Ranking Semantic Associations between
                                  Two Entities --- Extended Model  . . . . 152--162
           Svetlana Machova and   
                  Jana Kleckova   The Quantum of Language: a Metaphorical
                                  View of Mind Dimension . . . . . . . . . 163--168
                  Hee-Cheol Kim   An Experimental Study to Explore
                                  Usability Problems of Interactive Voice
                                  Response Systems . . . . . . . . . . . . 169--177
              Piotr Chyna\l and   
       Jerzy M. Szyma\'nski and   
                 Janusz Sobecki   Using Eyetracking in a Mobile
                                  Applications Usability Testing . . . . . 178--186
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7199, 2012

                Karel Heyse and   
           Brahim Al Farisi and   
              Karel Bruneel and   
                Dirk Stroobandt   Automating Reconfiguration Chain
                                  Generation for SRL-Based Run-Time
                                  Reconfiguration  . . . . . . . . . . . . 1--12
           Kizheppatt Vipin and   
                Suhaib A. Fahmy   Architecture-Aware
                                  Reconfiguration-Centric Floorplanning
                                  for Partial Reconfiguration  . . . . . . 13--25
                Wang Luzhou and   
               Kentaro Sano and   
                Satoru Yamamoto   Domain-Specific Language and Compiler
                                  for Stencil Computation on FPGA-Based
                                  Systolic Computational-Memory Array  . . 26--39
                Yongjoo Kim and   
                Jongeun Lee and   
                Jinyong Lee and   
                Toan X. Mai and   
                  Ingoo Heo and   
                  Yunheung Paek   Exploiting Both Pipelining and Data
                                  Parallelism with SIMD Reconfigurable
                                  Architecture . . . . . . . . . . . . . . 40--52
        Florent de Dinechin and   
 Laurent-Stéphane Didier   Table-Based Division by Small Integer
                                  Constants  . . . . . . . . . . . . . . . 53--63
                  Qiang Liu and   
                      Wayne Luk   Heterogeneous Systems for Energy
                                  Efficient Scientific Computing . . . . . 64--75
        S. Arash Ostadzadeh and   
                Roel Meeuws and   
               Imran Ashraf and   
              Carlo Galuzzi and   
                   Koen Bertels   The $ Q^2 $ Profiling Framework: Driving
                                  Application Mapping for Heterogeneous
                                  Reconfigurable Platforms . . . . . . . . 76--88
           Tassadaq Hussain and   
            Muhammad Shafiq and   
           Miquel Peric\`as and   
              Nacho Navarro and   
          Eduard Ayguadé   PPMC: a Programmable Pattern Based
                                  Memory Controller  . . . . . . . . . . . 89--101
               Fakhar Anjam and   
                  Quan Kong and   
               Roel Seedorf and   
                   Stephan Wong   A Run-Time Task Migration Scheme for an
                                  Adjustable Issue-Slots Multi-core
                                  Processor  . . . . . . . . . . . . . . . 102--113
               Geoffrey Ndu and   
                    Jim Garside   Boosting Single Thread Performance in
                                  Mobile Processors via Reconfigurable
                                  Acceleration . . . . . . . . . . . . . . 114--125
                  Gang Zhou and   
                      Li Li and   
                Harald Michalik   Complexity Analysis of Finite Field
                                  Digit Serial Multipliers on FPGAs  . . . 126--137
  Shinya Takamaeda-Yamazaki and   
              Shintaro Sano and   
          Yoshito Sakaguchi and   
              Naoki Fujieda and   
                     Kenji Kise   ScalableCore System: a Scalable
                                  Many-Core Simulator by Employing over
                                  100 FPGAs  . . . . . . . . . . . . . . . 138--150
                     Sen Ma and   
             Miaoqing Huang and   
          Eugene Cartwright and   
                  David Andrews   Scalable Memory Hierarchies for Embedded
                                  Manycore Systems . . . . . . . . . . . . 151--162
          Takahiro Watanabe and   
                Minoru Watanabe   Triple Module Redundancy of a Laser
                                  Array Driver Circuit for Optically
                                  Reconfigurable Gate Arrays . . . . . . . 163--173
              Wei Ting Loke and   
                       Yajun Ha   A Routing Architecture for FPGAs with
                                  Dual-VT Switch Box and Logic Clusters    174--186
                  Qiwei Jin and   
                 Diwei Dong and   
            Anson H. T. Tse and   
            Gary C. T. Chow and   
            David B. Thomas and   
                      Wayne Luk   Multi-level Customisation Framework for
                                  Curve Based Monte Carlo Financial
                                  Simulations  . . . . . . . . . . . . . . 187--201
            Hiroki Nakahara and   
              Tsutomu Sasao and   
              Munehiro Matsuura   A Low-Cost and High-Performance Virus
                                  Scanning Engine Using a Binary CAM
                                  Emulator and an MPU  . . . . . . . . . . 202--214
   Mohamad Sofian Abu Talip and   
           Takayuki Akamine and   
             Yasunori Osana and   
                 Naoyuki Fujita   Cost Effective Implementation of Flux
                                  Limiter Functions Using Partial
                                  Reconfiguration  . . . . . . . . . . . . 215--226
           Grigorios Mingas and   
       Christos-Savvas Bouganis   Parallel Tempering MCMC Acceleration
                                  Using Reconfigurable Hardware  . . . . . 227--238
               Abid Rafique and   
             Nachiket Kapre and   
       George A. Constantinides   A High Throughput FPGA-Based
                                  Implementation of the Lanczos Method for
                                  the Symmetric Extremal Eigenvalue
                                  Problem  . . . . . . . . . . . . . . . . 239--250
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??