Table of contents for issues of Lecture Notes in Computer Science

Last update: Tue May 2 17:54:12 MDT 2023                Valid HTML 3.2!

Volume 7250, 2012
Volume 7251, 2012
Volume 7252, 2012
Volume 7253, 2012
Volume 7254, 2012
Volume 7255, 2012
Volume 7256, 2012
Volume 7257, 2012
Volume 7258, 2012
Volume 7259, 2012
Volume 7260, 2012
Volume 7261, 2012
Volume 7262, 2012
Volume 7264, 2012
Volume 7265, 2012
Volume 7266, 2012
Volume 7267, 2012
Volume 7268, 2012
Volume 7269, 2012
Volume 7270, 2012
Volume 7271, 2012
Volume 7272, 2012
Volume 7273, 2012
Volume 7274, 2012
Volume 7275, 2012
Volume 7276, 2012
Volume 7277, 2012
Volume 7278, 2012
Volume 7279, 2012
Volume 7280, 2012
Volume 7281, 2012
Volume 7282, 2012
Volume 7283, 2012
Volume 7284, 2012
Volume 7285, 2012
Volume 7286, 2012
Volume 7287, 2012
Volume 7288, 2012
Volume 7289, 2012
Volume 7290, 2012
Volume 7291, 2012
Volume 7292, 2012
Volume 7294, 2012
Volume 7295, 2012
Volume 7296, 2012
Volume 7297, 2012
Volume 7298, 2012
Volume 7299, 2012


Lecture Notes in Computer Science
Volume 7250, 2012

            Michael R. Berthold   Towards Bisociative Knowledge Discovery  1--10
            Werner Dubitzky and   
         Tobias Kötter and   
             Oliver Schmidt and   
            Michael R. Berthold   Towards Creative Information Exploration
                                  Based on Koestler's Concept of
                                  Bisociation  . . . . . . . . . . . . . . 11--32
         Tobias Kötter and   
            Michael R. Berthold   From Information Networks to Bisociative
                                  Information Networks . . . . . . . . . . 33--50
              Christian Borgelt   Network Creation: Overview . . . . . . . 51--53
                Marc Segond and   
              Christian Borgelt   Selecting the Links in BisoNets
                                  Generated from Document Collections  . . 54--65
        Matja\vz Jur\vsi\vc and   
               Borut Sluban and   
              Bojan Cestnik and   
               Miha Gr\vcar and   
                  Nada Lavra\vc   Bridging Concept Identification for
                                  Constructing Information Networks from
                                  Text Documents . . . . . . . . . . . . . 66--90
         Teemu Hynönen and   
    Sébastien Mahler and   
                 Hannu Toivonen   Discovery of Novel Term Associations in
                                  a Document Collection  . . . . . . . . . 91--103
                Marc Segond and   
              Christian Borgelt   Cover Similarity Based Item Set Mining   104--121
            Angelika Kimmig and   
             Esther Galbrun and   
             Hannu Toivonen and   
                   Luc De Raedt   Patterns and Logic for Reasoning with
                                  Networks . . . . . . . . . . . . . . . . 122--143
                 Hannu Toivonen   Network Analysis: Overview . . . . . . . 144--146
                Anton Dries and   
          Siegfried Nijssen and   
                   Luc De Raedt   BiQL: a Query Language for Analyzing
                                  Information Networks . . . . . . . . . . 147--165
                  Fang Zhou and   
    Sébastien Mahler and   
                 Hannu Toivonen   Review of BisoNet Abstraction Techniques 166--178
                  Fang Zhou and   
    Sébastien Mahler and   
                 Hannu Toivonen   Simplification of Networks by Edge
                                  Pruning  . . . . . . . . . . . . . . . . 179--198
             Hannu Toivonen and   
                  Fang Zhou and   
         Aleksi Hartikainen and   
                    Atte Hinkka   Network Compression by Node and Edge
                                  Mergers  . . . . . . . . . . . . . . . . 199--217
              Laura Langohr and   
                 Hannu Toivonen   Finding Representative Nodes in
                                  Probabilistic Graphs . . . . . . . . . . 218--229
         Tobias Kötter and   
            Michael R. Berthold   (Missing) Concept Discovery in
                                  Heterogeneous Information Networks . . . 230--245
               Kilian Thiel and   
            Michael R. Berthold   Node Similarities from Spreading
                                  Activation . . . . . . . . . . . . . . . 246--262
                  Uwe Nagel and   
               Kilian Thiel and   
         Tobias Kötter and   
             Dawid Pi\katek and   
            Michael R. Berthold   Towards Discovery of Subgraph
                                  Bisociations . . . . . . . . . . . . . . 263--284
        Andreas Nürnberger   Exploration: Overview  . . . . . . . . . 285--286
             Tatiana Gossen and   
             Marcus Nitsche and   
                Stefan Haun and   
        Andreas Nürnberger   Data Exploration for Bisociative
                                  Knowledge Discovery: a Brief Overview of
                                  Tools and Evaluation Methods . . . . . . 287--300
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7251, 2012

              Ryan Woolrych and   
                Andrew Sixsmith   Challenges of User-Centred Research in
                                  the Development of Ambient Assisted
                                  Living Systems . . . . . . . . . . . . . 1--8
                 Hen-I Yang and   
               Ryan Babbitt and   
                Johnny Wong and   
                  Carl K. Chang   A Framework for Service Morphing and
                                  Heterogeneous Service Discovery in Smart
                                  Environments . . . . . . . . . . . . . . 9--17
           James Barrientos and   
               Jeffrey Soar and   
                        Ying Su   Impact Analysis of Assessment,
                                  Consultation and Education Services to
                                  Support the Adoption of Smart Home
                                  Technologies, Innovations for Chronic
                                  Disease Prevention and Solutions for
                                  Independent Living . . . . . . . . . . . 18--25
         Anne-Sophie Parent and   
            Nena Georgantzi and   
                   Ilenia Gheno   Ensuring a Fruitful Future to Innovation
                                  and Research: Practical Guidance for the
                                  Involvement of Older People in Research  26--34
               Silvio Bonfiglio   Fostering a Continuum of Care  . . . . . 35--41
          Peter Leijdekkers and   
                    Valerie Gay   User Adoption of Mobile Apps for Chronic
                                  Disease Management: a Case Study Based
                                  on myFitnessCompanion\reg  . . . . . . . 42--49
             Jon A. Sanford and   
      Patricia C. Griffiths and   
                   Helen Hoenig   Effects of In-home Tele-Rehabilitation
                                  on Task Self-efficacy in Mobility
                                  Impaired Adults  . . . . . . . . . . . . 50--57
  Hél\`ene Corriveau and   
          Michel Tousignant and   
            Sylvie Gosselin and   
                 Patrick Boissy   The Use of Telerehabilitation to Provide
                                  an Exercise Program to Improve Balance
                                  in a Post-stroke Population: Preliminary
                                  Results  . . . . . . . . . . . . . . . . 58--65
              Hamid Mukhtar and   
                 Arshad Ali and   
              Sungyoung Lee and   
               Djamel Bela\"\id   Personalized Healthcare Self-management
                                  Using Social Persuasion  . . . . . . . . 66--73
         Paolo Emilio Puddu and   
             John M. Morgan and   
          Concetta Torromeo and   
                Nick Curzen and   
              Michele Schiariti   A Clinical Observational Study in the
                                  CHIRON Project: Rationale and Expected
                                  Results  . . . . . . . . . . . . . . . . 74--82
                  Chao Chen and   
               Daqing Zhang and   
                    Lin Sun and   
              Mossaab Hariz and   
                      Yang Yuan   Does Location Help Daily Activity
                                  Recognition? . . . . . . . . . . . . . . 83--90
     Antonio Andriatrimoson and   
             Nadia Abchiche and   
              Simon Galerne and   
                  Etienne Colle   A Robot-Environment Cooperation
                                  Architecture for the Safety of Elderly
                                  People at Home . . . . . . . . . . . . . 91--98
        Carlos Cavero Barca and   
Juan Mario Rodríguez and   
       Rosana Valle Soriano and   
                Alberto Rugnone   Medical Expert Support Tool (MEST): a
                                  Person-Centric Approach for Healthcare
                                  Management . . . . . . . . . . . . . . . 99--106
          Roberta Gazzarata and   
              Fabio Vergari and   
         Jan-Marc Verlinden and   
          Francesco Morandi and   
                    Simone Naso   The Integration of e-health into the
                                  Clinical Workflow --- Electronic Health
                                  Record and Standardization Efforts . . . 107--115
            Cristiana Corsi and   
               Johan De Bie and   
              David Mortara and   
                 Stefano Severi   Innovative Solutions in Health
                                  Monitoring at Home: The Real-Time
                                  Assessment of Serum Potassium
                                  Concentration from ECG . . . . . . . . . 116--123
                Ian Cleland and   
               Chris Nugent and   
               Dewar Finlay and   
              William Burns and   
              Jennifer Bougourd   Assessment of Custom Fitted Heart Rate
                                  Sensing Garments whilst undertaking
                                  Everyday Activities  . . . . . . . . . . 124--131
                  Hongbo Ni and   
          Bessam Abdulrazak and   
               Daqing Zhang and   
                     Shu Wu and   
               Xingshe Zhou and   
                    Kejian Miao   Multi-modal Non-intrusive Sleep Pattern
                                  Recognition in Elder Assistive
                                  Environment  . . . . . . . . . . . . . . 132--139
        Héctor Solar and   
      Erik Fernández and   
         Gennaro Tartarisco and   
           Giovanni Pioggia and   
         Bo\vzidara Cvetkovi\'c   A Non Invasive, Wearable Sensor Platform
                                  for Multi-parametric Remote Monitoring
                                  in CHF Patients  . . . . . . . . . . . . 140--147
            Willy All\`egre and   
              Thomas Burger and   
             Pascal Berruet and   
              Jean-Yves Antoine   A Non-intrusive Monitoring System for
                                  Ambient Assisted Living Service Delivery 148--156
            Andrew McDowell and   
              Mark Donnelly and   
               Chris Nugent and   
                Michael McGrath   Passive Sleep Actigraphy: Evaluating a
                                  Non-contact Method of Monitoring Sleep   157--164
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7252, 2012

                   Petra Perner   Learning an Ontology for Visual Tasks    1--16
            Sara Colantonio and   
             Massimo Martinelli   Ontology and Algorithms Integration for
                                  Image Analysis . . . . . . . . . . . . . 17--29
          Nikos Malandrakis and   
          Alexandros Potamianos   EmotiWord: Affective Lexicon Creation
                                  with Application to Interaction and
                                  Multimedia Data  . . . . . . . . . . . . 30--41
                 Pablo Ruiz and   
              Javier Mateos and   
                  Rafael Molina   A Bayesian Active Learning Framework for
                                  a Two-Class Classification Problem . . . 42--53
              Koray Kayabol and   
             Vladimir A. Krylov   Unsupervised Classification of SAR
                                  Images Using Hierarchical Agglomeration
                                  and EM . . . . . . . . . . . . . . . . . 54--65
Tamás Szirányi and   
          Dániel Szolgay   Geometrical and Textural Component
                                  Separation with Adaptive Scale Selection 66--77
               Donghoon Kim and   
                  Rozenn Dahyot   Bayesian Shape from Silhouettes  . . . . 78--89
          Levente Kovács   Shape Retrieval and Recognition on
                                  Mobile Devices . . . . . . . . . . . . . 90--101
              Furkan Keskin and   
           A. Enis Çetin   Directionally Selective Fractional
                                  Wavelet Transform Using a $2$-D
                                  Non-separable Unbalanced Lifting
                                  Structure  . . . . . . . . . . . . . . . 102--113
                Jungong Han and   
               Eric Pauwels and   
                  Paul de Zeeuw   Visible and Infrared Image Registration
                                  Employing Line-Based Geometric Analysis  114--125
         Pavel Vácha and   
                  Michal Haindl   Texture Recognition Using Robust
                                  Markovian Features . . . . . . . . . . . 126--137
              Michal Haindl and   
    Vojt\vech Havlí\vcek   A Plausible Texture Enlargement and
                                  Editing Compound Markovian Model . . . . 138--148
              Michal Haindl and   
       Michal Havlí\vcek   Bidirectional Texture Function
                                  Simultaneous Autoregressive Model  . . . 149--159
        Ji\vrí Filip and   
         Pavel Vácha and   
                  Michal Haindl   Analysis of Human Gaze Interactions with
                                  Texture and Shape  . . . . . . . . . . . 160--171
            Elisabet Carcel and   
                  Manuel Martos   Rich Internet Application for
                                  Semi-automatic Annotation of Semantic
                                  Shots on Keyframes . . . . . . . . . . . 172--182
       Emmanuelle Martienne and   
                Vincent Claveau   Labeling TV Stream Segments with
                                  Conditional Random Fields  . . . . . . . 183--194
              Jaime Gallego and   
            Montse Pard\`as and   
                  Montse Solano   Foreground Objects Segmentation for
                                  Moving Camera Scenarios Based on SCGMM   195--206
            Massimo Magrini and   
                  Davide Moroni   Real Time Image Analysis for
                                  Infomobility . . . . . . . . . . . . . . 207--218
             Szilard Szalai and   
   Tamás Szirányi   Tracking the Saliency Features in Images
                                  Based on Human Observation Statistics    219--233
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7253, 2012

           José Meseguer   Taming Distributed System Complexity
                                  through Formal Patterns  . . . . . . . . 1--2
                    John Rushby   Composing Safe Systems . . . . . . . . . 3--11
      Gyrd Brændeland and   
               Atle Refsdal and   
            Ketil Stòlen   A Denotational Model for Component-Based
                                  Risk Analysis  . . . . . . . . . . . . . 12--41
            Benjamin Aminof and   
             Fabio Mogavero and   
                 Aniello Murano   Synthesis of Hierarchical Systems  . . . 42--60
         Sebastian S. Bauer and   
          Kim Guldstrand Larsen   A Modal Specification Theory for
                                  Components with Data . . . . . . . . . . 61--78
              Roberto Bruni and   
         Alberto Lluch Lafuente   Evaluating the Performance of Model
                                  Transformation Styles in Maude . . . . . 79--96
                     Dan Li and   
                Xiaoshan Li and   
                Zhiming Liu and   
                   Volker Stolz   Interactive Transformations from
                                  Object-Oriented Models to
                                  Component-Based Models . . . . . . . . . 97--114
              Julien Dormoy and   
          Olga Kouchnarenko and   
                  Arnaud Lanoix   Runtime Verification of Temporal
                                  Patterns for Dynamic Reconfigurations of
                                  Components . . . . . . . . . . . . . . . 115--132
        Jose Pablo Escobedo and   
              Christophe Gaston   Timed Conformance Testing for
                                  Orchestrated Service Discovery . . . . . 133--150
        Gregor Gössler and   
               Gwen Salaün   Realizability of Choreographies for
                                  Services Interacting Asynchronously  . . 151--167
    Mohammad Mahdi Jaghoori and   
         Ólafur Hlynsson   Networks of Real-Time Actors . . . . . . 168--186
        Einar Broch Johnsen and   
                Rudolf Schlatte   A Formal Model of Object Mobility in
                                  Resource-Restricted Deployment Scenarios 187--204
Carroline Dewi Puspa Kencana Ramli   The Logic of XACML . . . . . . . . . . . 205--222
            Mounira Kezadri and   
        Beno\^\it Combemale and   
                    Marc Pantel   A Proof Assistant Based Formalization of
                                  MDE Components . . . . . . . . . . . . . 223--240
     Sébastien Limet and   
              Sophie Robert and   
                    Ahmed Turki   Controlling an Iteration-Wise Coherence
                                  in Dataflow  . . . . . . . . . . . . . . 241--258
José Antonio Martín and   
                  Antonio Brogi   Learning from Failures: a Lightweight
                                  Approach to Run-Time Behavioural
                                  Adaptation . . . . . . . . . . . . . . . 259--277
 Rabéa Ameur-Boulifa and   
             Raluca Halalai and   
                 Ludovic Henrio   Verifying Safety of Fault-Tolerant
                                  Distributed Components . . . . . . . . . 278--295
            Hamideh Sabouri and   
                Ramtin Khosravi   Reducing the Model Checking Cost of
                                  Product Lines Using Static Analysis
                                  Techniques . . . . . . . . . . . . . . . 296--312
          Alejandro Sanchez and   
    Luís Soares. Barbosa   Bigraphical Modelling of Architectural
                                  Patterns . . . . . . . . . . . . . . . . 313--330
             Davide Brugali and   
              Luca Gherardi and   
              Elvinia Riccobene   Coordinated Execution of Heterogeneous
                                  Service-Oriented Components by Abstract
                                  State Machines . . . . . . . . . . . . . 331--349
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7254, 2012

               Miguel Lurgi and   
                David Robertson   Multi-agent Coordination through
                                  Mutualistic Interactions . . . . . . . . 1--20
             Maaike Harbers and   
        Jeffrey M. Bradshaw and   
            Matthew Johnson and   
                 Paul Feltovich   Explanation in Human-Agent Teamwork  . . 21--37
             Kathleen Keogh and   
                  Liz Sonenberg   Adaptive Coordination in Distributed and
                                  Dynamic Agent Organizations  . . . . . . 38--57
                  Jie Jiang and   
            Virginia Dignum and   
                    Yao-Hua Tan   An Agent-Based Inter-organizational
                                  Collaboration Framework: OperA+  . . . . 58--74
    Charalampos Tampitsikas and   
            Stefano Bromuri and   
       Michael Ignaz Schumacher   MANET: a Model for First-Class
                                  Electronic Institutions  . . . . . . . . 75--92
          Sofia Panagiotidi and   
  Javier Vázquez-Salceda   Towards Practical Normative Agents: a
                                  Framework and an Implementation for
                                  Norm-Aware Planning  . . . . . . . . . . 93--109
          Ioan Alfred Letia and   
                     Anca Goron   Towards Justifying Norm Compliance . . . 110--128
                 Tina Balke and   
              Marina De Vos and   
                  Julian Padget   Normative Run-Time Reasoning for
                                  Institutionally-Situated BDI Agents  . . 129--148
         Stephen Cranefield and   
           Michael Winikoff and   
           Wamberto Vasconcelos   Modelling and Monitoring Interdependent
                                  Expectations . . . . . . . . . . . . . . 149--166
                 Tina Balke and   
               Daniel Villatoro   Operationalization of the Sanctioning
                                  Process in Utilitarian Artificial
                                  Societies  . . . . . . . . . . . . . . . 167--185
             Samhar Mahmoud and   
           Nathan Griffiths and   
             Jeroen Keppens and   
                   Michael Luck   Overcoming Omniscience for Norm
                                  Emergence in Axelrod's Metanorm Model    186--202
             Samhar Mahmoud and   
           Nathan Griffiths and   
             Jeroen Keppens and   
                   Michael Luck   Establishing Norms for Network
                                  Topologies . . . . . . . . . . . . . . . 203--220
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7255, 2012

                 Andrzej Janusz   Dynamic Rule-Based Similarity Model for
                                  DNA Microarray Data  . . . . . . . . . . 1--25
        M. E. Abd El-Monsef and   
            H. M. Abu-Donia and   
                    E. A. Marei   Multi-valued Approach to Near Set Theory 26--40
           Christopher J. Henry   Perceptual Indiscernibility, Rough Sets,
                                  Descriptively Near Sets, and Image
                                  Analysis . . . . . . . . . . . . . . . . 41--121
                        A. Mani   Dialectics of Counting and the
                                  Mathematics of Vagueness . . . . . . . . 122--180
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7256, 2012

                Hee-Kap Ahn and   
               Sang Won Bae and   
                 Otfried Cheong   A Generalization of the Convex Kakeya
                                  Problem  . . . . . . . . . . . . . . . . 1--12
                 Eric Angel and   
           Evripidis Bampis and   
                   Vincent Chau   Low Complexity Scheduling Algorithm
                                  Minimizing the Energy for Tasks with
                                  Agreeable Deadlines  . . . . . . . . . . 13--24
            Esther M. Arkin and   
José Miguel Díaz-Báñez   Bichromatic $2$-Center of Pairs of
                                  Points . . . . . . . . . . . . . . . . . 25--36
            Vikraman Arvind and   
            Partha Mukhopadhyay   Erd\Hos--Rényi Sequences and
                                  Deterministic Construction of Expanding
                                  Cayley Graphs  . . . . . . . . . . . . . 37--48
    Rafael da Ponte Barbosa and   
            Yoshiko Wakabayashi   A Better Approximation Ratio and an IP
                                  Formulation for a Sensor Cover Problem   49--60
Hans-Joachim Böckenhauer and   
                    Dennis Komm   On the Advice Complexity of the Knapsack
                                  Problem  . . . . . . . . . . . . . . . . 61--72
              Nicolas Boria and   
 Jérôme Monnot and   
           Vangelis Th. Paschos   Reoptimization of Some Maximum Weight
                                  Induced Hereditary Subgraph Problems . . 73--84
             Prosenjit Bose and   
             Rolf Fagerberg and   
       André van Renssen   On Plane Constrained Bounded-Degree
                                  Spanners . . . . . . . . . . . . . . . . 85--96
               Joshua Brody and   
               Hongyu Liang and   
                   Xiaoming Sun   Space-Efficient Approximation Scheme for
                                  Circular Earth Mover Distance  . . . . . 97--108
              Ana Bu\vsi\'c and   
              Nazim Fat\`es and   
                  Jean Mairesse   Density Classification on Infinite
                                  Lattices and Trees . . . . . . . . . . . 109--120
              Jean Cardinal and   
                  Matias Korman   Coloring Planar Homothets and
                                  Three-Dimensional Hypergraphs  . . . . . 121--132
   Armando Castañeda and   
            Maurice Herlihy and   
                Sergio Rajsbaum   An Equivariance Theorem with
                                  Applications to Renaming . . . . . . . . 133--144
   Armando Castañeda and   
                Damien Imbs and   
                Sergio Rajsbaum   Renaming Is Weaker Than Set Agreement
                                  But for Perfect Renaming: a Map of
                                  Sub-consensus Tasks  . . . . . . . . . . 145--156
              Eda Cesaratto and   
         Brigitte Vallée   Pseudorandomness of a Random Kronecker
                                  Sequence . . . . . . . . . . . . . . . . 157--171
               Richard Cole and   
            Vijaya Ramachandran   Revisiting the Cache Miss Analysis of
                                  Multithreaded Algorithms . . . . . . . . 172--183
            Robert Crowston and   
              Gregory Gutin and   
                     Mark Jones   Parameterized Complexity of MaxSat above
                                  Average  . . . . . . . . . . . . . . . . 184--194
                Marek Cygan and   
           Marcin Pilipczuk and   
              Micha\l Pilipczuk   Solving the $2$-Disjoint Connected
                                  Subgraphs Problem Faster Than $2^n$  . . 195--206
                  Daniel Dadush   A $O(1 / \epsilon^2)^n$-Time Sieving
                                  Algorithm for Approximate Integer
                                  Programming  . . . . . . . . . . . . . . 207--218
              Pooya Davoodi and   
               Michiel Smid and   
           Freek van Walderveen   Two-Dimensional Range Diameter Queries   219--230
   Domingos Dellamonica Jr. and   
           Yoshiharu Kohayakawa   An Improved Upper Bound on the Density
                                  of Universal Random Graphs . . . . . . . 231--242
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7257, 2012

            Arie Middelkoop and   
           Alexander B. Elyasov   Functional Instrumentation of
                                  ActionScript Programs with Asil  . . . . 1--16
              Edward Amsden and   
                  Matthew Fluet   Fairness for Transactional Events  . . . 17--34
              Patrick Maier and   
                   Phil Trinder   Implementing a High-Level
                                  Distributed-Memory Parallel Haskell in
                                  Haskell  . . . . . . . . . . . . . . . . 35--50
               Thomas Schilling   Challenges for a Trace-Based
                                  Just-In-Time Compiler for Haskell  . . . 51--68
             Jason S. Reich and   
                 Matthew Naylor   Lazy Generation of Canonical Test
                                  Programs . . . . . . . . . . . . . . . . 69--84
             Anders Persson and   
                  Emil Axelsson   Generic Monadic Constructs for Embedded
                                  Languages  . . . . . . . . . . . . . . . 85--99
              Stephen Chang and   
               Eli Barzilay and   
                  John Clements   From Stack Traces to Lazy Rewriting
                                  Sequences  . . . . . . . . . . . . . . . 100--115
             Pieter Koopman and   
                   Peter Achten   Model Based Testing with Logical
                                  Properties versus State Machines . . . . 116--133
                       Rex Page   Property-Based Testing and Verification:
                                  a Catalog of Classroom Examples  . . . . 134--147
       Michael Kirkedal Thomsen   Describing and Optimising Reversible
                                  Logic Using a Functional Language  . . . 148--163
                    Adam Megacz   Hardware Design with Generalized Arrows  164--180
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7258, 2012

                Alastair Butler   Logic and Engineering of Natural
                                  Language Semantics (LENLS) 8 . . . . . . 1--2
             Nicholas Asher and   
                  Jason Quinley   Begging Questions, Their Answers and
                                  Basic Cooperativity  . . . . . . . . . . 3--12
             Mauricio Hernandes   Players Who Are Learning How to Play: a
                                  Haskell Implementation of Awareness
                                  Dynamics . . . . . . . . . . . . . . . . 13--26
             Margot Colinet and   
    Grégoire Winterstein   Emphatic NPI/FCI and Adversative
                                  Discourse Relations, a Probabilistic
                                  Approach . . . . . . . . . . . . . . . . 27--39
                David Y. Oshima   The Japanese Particle yo in
                                  Declaratives: Relevance, Priority, and
                                  Blaming  . . . . . . . . . . . . . . . . 40--53
         J.-R. Hayashishita and   
                  Daisuke Bekki   Conjoined Nominal Expressions in
                                  Japanese . . . . . . . . . . . . . . . . 54--67
                Christina Unger   Dynamic Semantics as Monadic Computation 68--81
                  Satoru Suzuki   Measurement-Theoretic Foundations of
                                  Gradable-Predicate Logic . . . . . . . . 82--95
            Alastair Butler and   
                  Kei Yoshimoto   Towards a Self-selective and
                                  Self-healing Evaluation  . . . . . . . . 96--109
                  Shozo Ota and   
                  Ken Satoh and   
                Makoto Nakamura   The Fifth International Workshop on
                                  Juris-Informatics (JURISIN 2011) . . . . 110--111
            Robert Kowalski and   
                 Anthony Burton   WUENIC --- a Case Study in Rule-Based
                                  Knowledge Representation and Reasoning   112--125
             Hirokazu Igari and   
              Akira Shimazu and   
              Koichiro Ochimizu   Document Structure Analysis with
                                  Syntactic Model and Parsers: Application
                                  to Legal Judgments . . . . . . . . . . . 126--140
             Yasuhiro Ogawa and   
                Masaki Mori and   
               Katsuhiko Toyama   Recall-Oriented Evaluation Metrics for
                                  Consistent Translation of Japanese Legal
                                  Sentences  . . . . . . . . . . . . . . . 141--154
              Takanori Sato and   
                Shogo Okada and   
                  Katsumi Nitta   Deliberation Process Support System for
                                  Citizen Judge Trial Based on Structure
                                  of Factors . . . . . . . . . . . . . . . 155--169
             Katsuhiko Sano and   
            Shingo Hagiwara and   
                   Satoshi Tojo   An Intuitionistic Investigation of
                                  Prerequisite-Effect Structure  . . . . . 170--183
                 Koji Tsuda and   
               Shin-ichi Minato   Second Workshop on Algorithms for
                                  Large-Scale Information Processing in
                                  Knowledge Discovery (ALSIP)  . . . . . . 184--185
            Shoichi Higuchi and   
               Tomohiro Kan and   
         Yoshiyuki Yamamoto and   
                 Kouichi Hirata   An A* Algorithm for Computing Edit
                                  Distance between Rooted Labeled
                                  Unordered Trees  . . . . . . . . . . . . 186--196
              Yuichi Kameda and   
               Akihiro Yamamoto   Mining Closed Weighted Itemsets for
                                  Numerical Transaction Databases  . . . . 197--210
         Yoshiyuki Yamamoto and   
             Kouichi Hirata and   
               Tetsuji Kuboyama   On Computing Tractable Variations of
                                  Unordered Tree Edit Distance with
                                  Network Algorithms . . . . . . . . . . . 211--223
                Mayumi Bono and   
              Nobuhiro Furuyama   Multimodality in Multispace Interaction
                                  (MiMI) . . . . . . . . . . . . . . . . . 224--225
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7259, 2012

                  Yu Sasaki and   
                  Kazumaro Aoki   Improved Integral Analysis on Tweaked
                                  Lesamnta . . . . . . . . . . . . . . . . 1--17
   Thorsten Ernst Schilling and   
            Håvard Raddum   Analysis of Trivium Using Compressed
                                  Right Hand Side Equations  . . . . . . . 18--32
             Florian Mendel and   
               Tomislav Nad and   
          Martin Schläffer   Cryptanalysis of Round-Reduced HAS-160   33--47
            Daehyun Strobel and   
                  Christof Paar   An Efficient Method for Eliminating
                                  Random Delays in Power Traces of
                                  Embedded Software  . . . . . . . . . . . 48--60
              Hailong Zhang and   
               Yongbin Zhou and   
                   Dengguo Feng   An Efficient Leakage Characterization
                                  Method for Profiled Power Analysis
                                  Attacks  . . . . . . . . . . . . . . . . 61--73
              Hyung Tae Lee and   
                HongTae Kim and   
               Yoo-Jin Baek and   
                 Jung Hee Cheon   Correcting Errors in Private Keys
                                  Obtained from Cold Boot Attacks  . . . . 74--87
                Ryo Kikuchi and   
            Atsushi Fujioka and   
           Yoshiaki Okamoto and   
                  Taiichi Saito   Strong Security Notions for
                                  Timed-Release Public-Key Encryption
                                  Revisited  . . . . . . . . . . . . . . . 88--108
                   Song Luo and   
                Qingni Shen and   
                     Zhong Chen   Fully Secure Unidirectional
                                  Identity-Based Proxy Re-encryption . . . 109--126
                  Yong Qiao and   
              Yuexiang Yang and   
                     Jie He and   
                     Bo Liu and   
                   Yingzhi Zeng   Detecting Parasite P2P Botnet in
                                  eMule-like Networks through
                                  Quasi-periodicity Recognition  . . . . . 127--139
                   Kai Chen and   
                Yifeng Lian and   
                  Yingjun Zhang   AutoDunt: Dynamic Latent Dependence
                                  Analysis for Detection of Zero Day
                                  Vulnerability  . . . . . . . . . . . . . 140--154
        Juliane Krämer and   
          Dmitry Nedospasov and   
            Jean-Pierre Seifert   Weaknesses in Current RSA Signature
                                  Schemes  . . . . . . . . . . . . . . . . 155--168
                Shuguo Yang and   
               Yongbin Zhou and   
                   Jiye Liu and   
                   Danyang Chen   Back Propagation Neural Network Based
                                  Leakage Characterization for Practical
                                  Security Analysis of Cryptographic
                                  Implementations  . . . . . . . . . . . . 169--185
                Keita Emura and   
              Atsuko Miyaji and   
                 Kazumasa Omote   A Revocable Group Signature Scheme with
                                  the Property of Hiding the Number of
                                  Revoked Users  . . . . . . . . . . . . . 186--203
                Laila El Aimani   Generic Constructions for Verifiable
                                  Signcryption . . . . . . . . . . . . . . 204--218
                 Haibo Tian and   
              Xiaofeng Chen and   
             Zhengtao Jiang and   
                      Yusong Du   Non-delegatable Strong Designated
                                  Verifier Signature on Elliptic Curves    219--234
           Kyung Chul Jeong and   
              Dong Hoon Lee and   
                     Daewan Han   An Improved Known Plaintext Attack on
                                  PKZIP Encryption Algorithm . . . . . . . 235--247
                      Yi Lu and   
             Serge Vaudenay and   
                Willi Meier and   
                Liping Ding and   
                 Jianchun Jiang   Synthetic Linear Analysis: Improved
                                  Attacks on CubeHash and Rabbit . . . . . 248--260
                  Yusong Du and   
              Fangguo Zhang and   
                   Meicheng Liu   On the Resistance of Boolean Functions
                                  against Fast Algebraic Attacks . . . . . 261--274
                    Yu Chen and   
                 Liqun Chen and   
                 Zongyang Zhang   CCA Secure IB-KEM from the Computational
                                  Bilinear Diffie--Hellman Assumption in
                                  the Standard Model . . . . . . . . . . . 275--301
                 Marko Wolf and   
                Timo Gendrullis   Design, Implementation, and Evaluation
                                  of a Vehicular Hardware Security Module  302--318
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7260, 2012

 Antje Düsterhöft and   
                  Meike Klettke   Dedication to a Theory of Modelling  . . 1--6
                  Jan Paredaens   What about Constraints in RDF? . . . . . 7--18
                 Joachim Biskup   Some Remarks on Relational Database
                                  Schemes Having Few Minimal Keys  . . . . 19--28
             Gyula O. H. Katona   Random Databases with Correlated Data    29--35
        David Källberg and   
               Nikolaj Leonenko   Statistical Inference for Rényi Entropy
                                  Functionals  . . . . . . . . . . . . . . 36--51
               Egon Börger   The Subject-Oriented Approach to
                                  Software Design and the Abstract State
                                  Machines Method  . . . . . . . . . . . . 52--72
         Johann A. Makowsky and   
                 Elena V. Ravve   BCNF via Attribute Splitting . . . . . . 73--84
          Flavio Ferrarotti and   
                  Sven Hartmann   Foundations for a Fourth Normal Form
                                  over SQL-Like Databases  . . . . . . . . 85--100
              Stephen J. Hegner   Independent Update Reflections on
                                  Interdependent Database Views  . . . . . 101--115
        Alejandro L. Grosso and   
   José M. Turull Torres   SO$^{F}$: a Semantic Restriction over
                                  Second-Order Logic and Its
                                  Polynomial-Time Hierarchy  . . . . . . . 116--135
                      Qing Wang   Abstract State Machines for
                                  Data-Parallel Computing  . . . . . . . . 136--150
           Stephen W. Clyde and   
                David W. Embley   OSM-Logic: a Fact-Oriented,
                                  Time-Dependent Formalization of
                                  Object-oriented Systems Modeling . . . . 151--172
           Sudarshan Murthy and   
                    David Maier   Cloaking Data to Ease View Creation,
                                  Query Expression, and Query Execution    173--189
           Arne Sòlvberg   On Models of Concepts and Data . . . . . 190--196
               Gerti Kappel and   
                  Philip Langer   Model Transformation By-Example: a
                                  Survey of the First Wave . . . . . . . . 197--215
           Antonio Villegas and   
            Antoni Olivé   On Computing the Importance of
                                  Associations in Large Conceptual Schemas 216--230
               Oscar Pastor and   
          Juan Carlos Casamayor   Conceptual Modeling of Human Genome:
                                  Integration Challenges . . . . . . . . . 231--250
                         Hui Ma   Transforming Geometrically Enhanced
                                  Conceptual Model Schemas to GML  . . . . 251--267
            Marie Du\vzí   Extensional Logic of Hyperintensions . . 268--290
                 Hannu Jaakkola   Culture Sensitive Aspects in Software
                                  Engineering  . . . . . . . . . . . . . . 291--315
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7261, 2012

                    Armin Biere   Preprocessing and Inprocessing
                                  Techniques in SAT  . . . . . . . . . . . 1--1
                 Kathryn Kranen   Pioneering the Future of Verification: a
                                  Spiral of Technological and Business
                                  Innovation . . . . . . . . . . . . . . . 2--2
                     Ben Liblit   Automated Detection and Repair of
                                  Concurrency Bugs . . . . . . . . . . . . 3--3
          Klaus-Dieter Schubert   Verification Challenges of Workload
                                  Optimized Hardware Systems . . . . . . . 4--4
             Orna Kupferman and   
               Dorsa Sadigh and   
               Sanjit A. Seshia   Synthesis with Clairvoyance  . . . . . . 5--19
        Matthias Schlaipfer and   
             Georg Hofferek and   
                 Roderick Bloem   Generalized Reactivity(1) Synthesis
                                  without a Monolithic Strategy  . . . . . 20--34
                     Lei Bu and   
                  Yang Yang and   
                    Xuandong Li   IIS-Guided DFS for Efficient Bounded
                                  Reachability Analysis of Linear Hybrid
                                  Automata . . . . . . . . . . . . . . . . 35--49
         Marijn J. H. Heule and   
            Oliver Kullmann and   
             Siert Wieringa and   
                    Armin Biere   Cube and Conquer: Guiding CDCL SAT
                                  Solvers by Lookaheads  . . . . . . . . . 50--65
        Zurab Khasidashvili and   
                Alexander Nadel   Implicative Simultaneous Satisfiability
                                  and Applications . . . . . . . . . . . . 66--79
              B. A. Krishna and   
         Jonathan Michelson and   
             Vigyan Singhal and   
                      Alok Jain   Liveness vs Safety --- a Practical
                                  Viewpoint  . . . . . . . . . . . . . . . 80--94
                Arnab Sinha and   
               Sharad Malik and   
                  Chao Wang and   
                    Aarti Gupta   Predicting Serializability Violations:
                                  SMT-Based Search vs. DPOR-Based Search   95--114
               Qichang Chen and   
               Liqiang Wang and   
                   Zijiang Yang   SAM: Self-adaptive Dynamic Analysis for
                                  Multithreaded Programs . . . . . . . . . 115--129
               Michael Huth and   
            Jim Huan-Pu Kuo and   
                   Nir Piterman   Concurrent Small Progress Measures . . . 130--144
            Kenneth Johnson and   
                 Simon Reed and   
                 Radu Calinescu   Specification and Quantitative Analysis
                                  of Probabilistic Cloud Deployment
                                  Patterns . . . . . . . . . . . . . . . . 145--159
                Ondrej Sery and   
        Grigory Fedyukovich and   
              Natasha Sharygina   Interpolation-Based Function Summaries
                                  in Bounded Model Checking  . . . . . . . 160--175
          Thomas J. Ostrand and   
              Elaine J. Weyuker   Can File Level Characteristics Help
                                  Identify System Level Fault-Proneness?   176--189
             Ariel Birnbaum and   
           Laurent Fournier and   
          Steve Mittermaier and   
                        Avi Ziv   Reverse Coverage Analysis  . . . . . . . 190--202
        Peter Collingbourne and   
             Cristian Cadar and   
               Paul H. J. Kelly   Symbolic Testing of OpenCL Code  . . . . 203--218
                 Allon Adir and   
                 Ronen Levy and   
                   Tamer Salman   Dynamic Test Data Generation for Data
                                  Intensive Applications . . . . . . . . . 219--233
              Merav Aharony and   
             Emanuel Gofman and   
             Elena Guralnik and   
                Anatoly Koyfman   Injecting Floating-Point Testing
                                  Knowledge into Test Generators . . . . . 234--241
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7262, 2012

            Babak Alipanahi and   
            Nathan Krislock and   
                     Ali Ghodsi   Protein Structure by Semidefinite Facial
                                  Reduction  . . . . . . . . . . . . . . . 1--11
            Sivan Bercovici and   
             Jesse M. Rodriguez   Ancestry Inference in Complex Admixtures
                                  via Variable-Length Markov Chain Linkage
                                  Models . . . . . . . . . . . . . . . . . 12--28
              Stefan Canzar and   
          Mohammed El-Kebir and   
               René Pool   Charge Group Partitioning in
                                  Biomolecular Simulation  . . . . . . . . 29--43
           Hector Corrada Bravo   Increased Methylation Variation in
                                  Epigenetic Domains across Cancer Types   44--44
            Dan F. DeBlasio and   
              Travis J. Wheeler   Estimating the Accuracy of Multiple
                                  Alignments and its Use in Parameter
                                  Advising . . . . . . . . . . . . . . . . 45--59
         Matthew R. Francis and   
                Elana J. Fertig   Quantifying the Dynamics of Coupled
                                  Networks of Switches and Oscillators . . 60--61
             Melissa Gymrek and   
                David Golan and   
                 Saharon Rosset   lobSTR: a Short Tandem Repeat Profiler
                                  for Personal Genomes . . . . . . . . . . 62--63
                     Dan He and   
                   Buhm Han and   
                  Eleazar Eskin   Hap-seq: An Optimal Algorithm for
                                  Haplotype Phasing with Imputation Using
                                  Sequencing Data  . . . . . . . . . . . . 64--78
                      Lu He and   
               Fabio Vandin and   
              Gopal Pandurangan   Ballast: a Ball-Based Algorithm for
                                  Structural Motifs  . . . . . . . . . . . 79--93
           Patrick Holloway and   
                Krister Swenson   Evolution of Genome Organization by
                                  Duplication and Loss: An Alignment
                                  Approach . . . . . . . . . . . . . . . . 94--112
              Daniel Holtby and   
             Shuai Cheng Li and   
                        Ming Li   LoopWeaver --- Loop Modeling by the
                                  Weighted Scaling of Verified Proteins    113--126
                  Yan Huang and   
                     Yin Hu and   
                Corbin D. Jones   A Robust Method for Transcript
                                  Quantification with RNA-seq Data . . . . 127--147
            Marcus Kinsella and   
                   Vineet Bafna   Modeling the Breakage-Fusion-Bridge
                                  Mechanism: Combinatorics and Cancer
                                  Genomics . . . . . . . . . . . . . . . . 148--162
                    Yang Li and   
                Hong-Mei Li and   
                     Paul Burns   TrueSight: Self-training Algorithm for
                                  Splice Junction Detection Using RNA-seq  163--164
               Yaw-Ling Lin and   
               Charles Ward and   
                  Steven Skiena   Synthetic Sequence Design for Signal
                                  Location Search  . . . . . . . . . . . . 165--179
            Marc A. Marti-Renom   The Three-Dimensional Architecture of a
                                  Bacterial Genome and Its Alteration by
                                  Genetic Perturbation . . . . . . . . . . 180--180
           Andrew McPherson and   
                    Chunxiao Wu   Discovery of Complex Genomic
                                  Rearrangements in Cancer Using
                                  High-Throughput Sequencing . . . . . . . 181--182
               T. M. Murali and   
            Matthew D. Dyer and   
                   David Badger   Network-Based Prediction and Analysis of
                                  HIV Dependency Factors . . . . . . . . . 183--183
           Andrew S. Parker and   
               Karl E. Griswold   Structure-Guided Deimmunization of
                                  Therapeutic Proteins . . . . . . . . . . 184--198
         Dmitri Pervouchine and   
            Ekaterina Khrameeva   Evidence for Widespread Association of
                                  Mammalian Splicing and Conserved
                                  Long-Range RNA Structures  . . . . . . . 199--199
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7264, 2012

             Ping-Lin Chang and   
               Dongbin Chen and   
                   Daniel Cohen   $2$D/$3$D Registration of a Preoperative
                                  Model with Endoscopic Video Using
                                  Colour-Consistency . . . . . . . . . . . 1--12
               Simon Drouin and   
           Marta Kersten-Oertel   A Realistic Test and Development
                                  Environment for Mixed Reality in
                                  Neurosurgery . . . . . . . . . . . . . . 13--23
                Kenko Fujii and   
              Johannes Totz and   
               Guang-Zhong Yang   Visual Search Behaviour and Analysis of
                                  Augmented Visualisation for Minimally
                                  Invasive Surgery . . . . . . . . . . . . 24--35
       Kate Alicia Gavaghan and   
               Sylvain Anderegg   Augmented Reality Image Overlay
                                  Projection for Image Guided Open Liver
                                  Ablation of Metastatic Liver Cancer  . . 36--46
         Stamatia Giannarou and   
               Guang-Zhong Yang   Tissue Deformation Recovery with
                                  Gaussian Mixture Model Based Structure
                                  from Motion  . . . . . . . . . . . . . . 47--57
           Samantha Horvath and   
              John Galeotti and   
                        Bo Wang   Towards an Ultrasound Probe with Vision:
                                  Structured Light to Determine Surface
                                  Orientation  . . . . . . . . . . . . . . 58--64
        Jagadeesan Jayender and   
                 Inbar Spofford   Markov Modeling of Colonoscopy Gestures
                                  to Develop Skill Trainers  . . . . . . . 65--73
             Bernhard Kainz and   
          Rupert H. Portugaller   Volume Visualization in the Clinical
                                  Practice . . . . . . . . . . . . . . . . 74--84
              Pencilla Lang and   
                 Michael W. Chu   CT-US Registration for Guidance of
                                  Transcatheter Aortic Valve Implantation  85--92
          Cristian A. Linte and   
              Kurt E. Augustine   Enhanced Planning of Interventions for
                                  Spinal Deformity Correction Using
                                  Virtual Modeling and Visualization
                                  Techniques . . . . . . . . . . . . . . . 93--105
                 Coert Metz and   
             Michiel Schaap and   
                   Stefan Klein   Alignment of $4$D Coronary CTA with
                                  Monoplane X-ray Angiography  . . . . . . 106--116
               Naoki Suzuki and   
              Asaki Hattori and   
                  Satoshi Ieiri   VR Training System for Endoscopic
                                  Surgery Robot  . . . . . . . . . . . . . 117--129
                     Jue Wu and   
              Kathryn Davis and   
                  Allan Azarion   Brain Parcellation Aids in Electrode
                                  Localization in Epileptic Patients . . . 130--137
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7265, 2012

                    Jack Minker   To Vladimir Lifschitz on His 65th
                                  Birthday . . . . . . . . . . . . . . . . 1--13
         Neelakantan Kartha and   
                 Esra Erdem and   
               Joohyung Lee and   
                 Paolo Ferraris   Vladimir Lifschitz --- a Youth at 65 . . 14--23
            Marcello Balduccini   A ``Conservative'' Approach to Extending
                                  Answer Set Programming with Non-Herbrand
                                  Functions  . . . . . . . . . . . . . . . 24--39
               Chitta Baral and   
    Marcos Alvarez Gonzalez and   
                Aaron Gottesman   The Inverse Lambda Calculus Algorithm
                                  for Typed First Order Logic Lambda
                                  Calculus and Its Application to
                                  Translating English to FOL . . . . . . . 40--56
              Ringo Baumann and   
             Gerhard Brewka and   
   Wolfgang Dvo\vrák and   
                 Stefan Woltran   Parameterized Splitting: a Simple
                                  Modification-Based Approach  . . . . . . 57--71
     Nikolaj Bjòrner and   
              Guido de Caso and   
                  Yuri Gurevich   From Primal Infon Logic with Individual
                                  Variables to Datalog . . . . . . . . . . 72--86
              Alexander Bochman   Here and There among Logics for Logic
                                  Programming  . . . . . . . . . . . . . . 87--101
                  Pedro Cabalar   Causal Logic Programming . . . . . . . . 102--116
             Andrea Cal\`\i and   
              Georg Gottlob and   
               Giorgio Orsi and   
                 Andreas Pieris   On the Interaction of Existential Rules
                                  and Equality Constraints in Ontology
                                  Querying . . . . . . . . . . . . . . . . 117--133
              Xiaoping Chen and   
               Guoqiang Jin and   
                   Fangkai Yang   Extending Action Language $\mathcal{C}+$
                                  by Formalizing Composite Actions . . . . 134--148
        Stefania Costantini and   
           Andrea Formisano and   
                   David Pearce   Strong Equivalence of RASP Programs  . . 149--163
                James Delgrande   Considerations on Belief Revision in an
                                  Action Theory  . . . . . . . . . . . . . 164--177
              Marc Denecker and   
         Maurice Bruynooghe and   
                Joost Vennekens   Approximation Fixpoint Theory and the
                                  Semantics of Logic and Answers Set
                                  Programs . . . . . . . . . . . . . . . . 178--194
            Jürgen Dix and   
             Wolfgang Faber and   
             V. S. Subrahmanian   Privacy Preservation Using Multi-context
                                  Systems and Default Logic  . . . . . . . 195--210
               Thomas Eiter and   
             Cristina Feier and   
                   Michael Fink   Simulating Production Rules Using ACTHEX 211--228
                 Esra Erdem and   
                 Volkan Patoglu   Applications of Action Languages in
                                  Cognitive Robotics . . . . . . . . . . . 229--246
             Wolfgang Faber and   
               Nicola Leone and   
                   Simona Perri   The Intelligent Grounder of DLV  . . . . 247--264
Luis Fariñas del Cerro and   
               David Pearce and   
        Agustín Valverde   Bi-state Logic . . . . . . . . . . . . . 265--278
                  Dov M. Gabbay   An Equational Approach to Logic
                                  Programming  . . . . . . . . . . . . . . 279--295
              Martin Gebser and   
            Roland Kaufmann and   
                 Torsten Schaub   Gearing Up for Effective ASP Planning    296--310
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7266, 2012

          Andreas Fasbender and   
              Martin Gerdes and   
                   Sascha Smets   Cellular Networking Technologies in ITS
                                  Solutions: Opportunities and Challenges  1--13
      Muhammad Sabir Idrees and   
                   Yves Roudier   Effective and Efficient Security Policy
                                  Engines for Automotive On-Board Networks 14--26
                    Axel Sikora   Security Solutions for Highly Dynamic
                                  Car2X Networks in the KoFAS Initiative   27--39
            Zubaida Alazawi and   
       Mohmmad B. Abdljabar and   
           Saleh Altowaijri and   
               Anna Maria Vegni   ICDMS: An Intelligent Cloud Based
                                  Disaster Management System for Vehicular
                                  Networks . . . . . . . . . . . . . . . . 40--56
Krzysztof Ró\.zanowski and   
        Zbigniew Piotrowski and   
             Tadeusz Sondej and   
              Krzysztof Sawicki   Wireless Driver and Vehicle Surveillance
                                  System Based on IEEE 802.11 Networks . . 57--67
Krzysztof Ró\.zanowski and   
             Tadeusz Sondej and   
        Zbigniew Piotrowski and   
              Krzysztof Sawicki   Architecture of Car Measurement System
                                  for Driver Monitoring  . . . . . . . . . 68--79
 Carlos Gañán and   
       Jose L. Muñoz and   
              Oscar Esparza and   
     Jorge Mata-Díaz and   
                   Juanjo Alins   Toward Revocation Data Handling
                                  Efficiency in VANETs . . . . . . . . . . 80--90
            Muhammad Shoaib and   
            Wang-Cheol Song and   
                 Keun Hyung Kim   Cluster Based Data Aggregation in
                                  Vehicular Adhoc Network  . . . . . . . . 91--102
            Florent Kaisser and   
        Christophe Gransart and   
               Marion Berbineau   Simulations of VANET Scenarios with
                                  OPNET and SUMO . . . . . . . . . . . . . 103--112
         Bhushan G. Jagyasi and   
              Vikrant Kumar and   
                     Arun Pande   Human Participatory Sensing in Fixed
                                  Route Bus Information System . . . . . . 113--123
           Dariusz Kowalski and   
                 Zeev Nutov and   
                  Michael Segal   Scheduling of Vehicles in Transportation
                                  Networks . . . . . . . . . . . . . . . . 124--136
                Johan Bergs and   
         Erwin Van de Velde and   
                Daan Pareit and   
               Dries Naudts and   
                 Milos Rovcanin   Design and Prototype of a
                                  Train-to-Wayside Communication
                                  Architecture . . . . . . . . . . . . . . 137--150
                Navin Kumar and   
                   Nidhu Kumari   Conceptual Architectural Design of
                                  Indian Railway Intelligent
                                  Transportation Systems . . . . . . . . . 151--162
                Abhinav Jha and   
         Amit Kumar Agrawal and   
             Chirabrata Bhaumik   Automatic Alert Generation from Train to
                                  the People at Unmanned Level Crossings
                                  Using Principles of IoT  . . . . . . . . 163--173
     Patricia Noriega-Vivas and   
              Celeste Campo and   
        Carlos Garcia-Rubio and   
       Alicia Rodriguez-Carrion   MOFETA: a Network Architecture Based on
                                  MObile FEmtocells to Enhance Cellular
                                  Connectivity on TrAins . . . . . . . . . 174--185
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7267, 2012

                      Anonymous   Front Matter . . . . . . . . . . . . . . 1--1
             Krzysztof Bartecki   Neural Network-Based PCA: An Application
                                  to Approximation of a Distributed
                                  Parameter System . . . . . . . . . . . . 3--11
           Jaros\law Bilski and   
                 Jacek Smol\kag   Parallel Realisation of the Recurrent
                                  Multi Layer Perceptron Learning  . . . . 12--20
            Giacomo Capizzi and   
           Christian Napoli and   
                Lucio Patern\`o   An Innovative Hybrid Neuro-wavelet
                                  Method for Reconstruction of Missing
                                  Data in Astronomical Photometric Surveys 21--29
  Daniel Salles Chevitarese and   
            Dilza Szwarcman and   
                Marley Vellasco   Speeding Up the Training of Neural
                                  Networks with CUDA Technology  . . . . . 30--38
                Meng Joo Er and   
                     Piotr Duda   On the Uniform Convergence of the
                                  Orthogonal Series-Type Kernel Regression
                                  Neural Networks in a Time-Varying
                                  Environment  . . . . . . . . . . . . . . 39--46
                 Piotr Duda and   
             Yoichi Hayashi and   
                Maciej Jaworski   On the Strong Convergence of the
                                  Orthogonal Series-Type Kernel Regression
                                  Neural Networks in a Non-stationary
                                  Environment  . . . . . . . . . . . . . . 47--54
                 Piotr Duda and   
             Marcin Korytkowski   On the Strong Convergence of the
                                  Recursive Orthogonal Series-Type Kernel
                                  Probabilistic Neural Networks Handling
                                  Time-Varying Noise . . . . . . . . . . . 55--62
            Bogumi\l Fiksak and   
                Maciej Krawczak   Incidental Neural Networks as Nomograms
                                  Generators . . . . . . . . . . . . . . . 63--71
               Krzysztof Halawa   Selection of Activation Functions in the
                                  Last Hidden Layer of the Multilayer
                                  Perceptron . . . . . . . . . . . . . . . 72--80
                  Adrian Horzyk   Information Freedom and Associative
                                  Artificial Intelligence  . . . . . . . . 81--89
            Maciej Jaworski and   
                Meng Joo Er and   
                Lena Pietruczuk   On the Application of the Parzen-Type
                                  Kernel Regression Neural Network and
                                  Order Statistics for Learning in a
                                  Non-stationary Environment . . . . . . . 90--98
            Maciej Jaworski and   
                 Marcin Gabryel   On Learning in a Time-Varying
                                  Environment by Using a Probabilistic
                                  Neural Network and the Recursive Least
                                  Squares Method . . . . . . . . . . . . . 99--110
     Vladimir Kryzhanovskiy and   
          Irina Zhelavskaya and   
              Jakov Karandashev   Binary Perceptron Learning Algorithm
                                  Using Simplex-Method . . . . . . . . . . 111--118
              \Lukasz Laskowski   Objects Auto-selection from
                                  Stereo-Images Realised by
                                  Self-Correcting Neural Network . . . . . 119--125
           Maciej \Lawry\'nczuk   On-Line Trajectory-Based Linearisation
                                  of Neural Models for a Computationally
                                  Efficient Predictive Control Algorithm   126--134
              Vladimir Olej and   
                  Jana Filipova   Short Time Series of Website Visits
                                  Prediction by RBF Neural Networks and
                                  Support Vector Machine Regression  . . . 135--142
           Jaros\law Piersa and   
               Tomasz Schreiber   Spectra of the Spike-Flow Graphs in
                                  Geometrically Embedded Neural Networks   143--151
            Lena Pietruczuk and   
                    Meng Joo Er   Weak Convergence of the Parzen-Type
                                  Probabilistic Neural Network Handling
                                  Time-Varying Noise . . . . . . . . . . . 152--159
            Lena Pietruczuk and   
                 Yoichi Hayashi   Strong Convergence of the Recursive
                                  Parzen-Type Probabilistic Neural Network
                                  Handling Nonstationary Noise . . . . . . 160--168
           Piotr P\lo\'nski and   
              Krzysztof Zaremba   Improving Performance of Self-Organising
                                  Maps with Distance Metric Learning
                                  Method . . . . . . . . . . . . . . . . . 169--177
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7268, 2012

                      Anonymous   Front Matter . . . . . . . . . . . . . . 1--1
         Yalemisew M. Abgaz and   
             Muhammad Javed and   
                     Claus Pahl   Dependency Analysis in Ontology-Driven
                                  Content-Based Systems  . . . . . . . . . 3--12
  Vladimír Bartík   Measuring Web Page Similarity Based on
                                  Textual and Visual Properties  . . . . . 13--21
       Stanis\law Brodowski and   
               Andrzej Bielecki   New Specifics for a Hierarchial
                                  Estimator Meta-algorithm . . . . . . . . 22--29
           Dariusz Ceglarek and   
            Konstanty Haniewicz   Fast Plagiarism Detection by Sentence
                                  Hashing  . . . . . . . . . . . . . . . . 30--37
                    Harry Chang   Enriching Domain-Specific Language
                                  Models Using Domain Independent WWW
                                  $N$-Gram Corpus  . . . . . . . . . . . . 38--46
                  Pietro Codara   On the Structure of Indiscernibility
                                  Relations Compatible with a Partially
                                  Ordered Set  . . . . . . . . . . . . . . 47--55
                 Piotr Duda and   
            Maciej Jaworski and   
                Lena Pietruczuk   On Pre-processing Algorithms for Data
                                  Stream . . . . . . . . . . . . . . . . . 56--63
               Marek Grochowski   Simple Incremental Instance Selection
                                  Wrapper for Classification . . . . . . . 64--72
              Anamika Gupta and   
               Naveen Kumar and   
              Vasudha Bhatnagar   Mining of Multiobjective Non-redundant
                                  Association Rules in Data Streams  . . . 73--81
            Maciej Jaworski and   
                 Piotr Duda and   
                Lena Pietruczuk   On Fuzzy Clustering of Data Streams with
                                  Concept Drift  . . . . . . . . . . . . . 82--91
            Maciej Jaworski and   
            Lena Pietruczuk and   
                     Piotr Duda   On Resources Optimization in Fuzzy
                                  Clustering of Data Streams . . . . . . . 92--99
            Przemys\law Kl\kesk   A Comparison of Complexity Selection
                                  Approaches for Polynomials Based on:
                                  Vapnik--Chervonenkis Dimension,
                                  Rademacher Complexity and Covering
                                  Numbers  . . . . . . . . . . . . . . . . 100--110
            Marcin Korze\'n and   
            Przemys\law Kl\kesk   Sample Complexity of Linear Learning
                                  Machines with Different Restrictions
                                  over Weights . . . . . . . . . . . . . . 111--119
            Maciej Krawczak and   
            Gra\.zyna Szkatu\la   A Clustering Algorithm Based on
                                  Distinguishability for Nominal
                                  Attributes . . . . . . . . . . . . . . . 120--127
      Piotr \Lady\.zy\'nski and   
      Przemys\law Grzegorzewski   Retrieving Informative Content from Web
                                  Pages with Conditional Learning of
                                  Support Vector Machines and Semantic
                                  Analysis . . . . . . . . . . . . . . . . 128--135
         Henryk Maciejewski and   
              Ewa Walkowicz and   
              Olgierd Unold and   
               Pawe\l Skrobanek   Enhancing Recognition of a Weak Class
                                  --- Comparative Study Based on
                                  Biological Population Data Mining  . . . 136--143
                Marcin Michalak   Foundations of Rough Biclustering  . . . 144--151
            Marcin Michalak and   
               Marek Sikora and   
                 Patryk Ziarnik   ORG- Oblique Rules Generator . . . . . . 152--159
             Marcin Pluci\'nski   Mini-models --- Local Regression Models
                                  for the Function Approximation Learning  160--167
              Artur Starczewski   A Cluster Validity Index for Hard
                                  Clustering . . . . . . . . . . . . . . . 168--174
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7269, 2012

                      Anonymous   Front Matter . . . . . . . . . . . . . . 1--1
Djibrilla Amadou Kountché and   
   Nicolas Monmarché and   
                Mohamed Slimane   The \em Pachycondyla Apicalis Ants
                                  Search Strategy for Data Clustering
                                  Problems . . . . . . . . . . . . . . . . 3--11
           Jaros\law Arabas and   
               Ogier Maitre and   
                  Pierre Collet   PARADE: a Massively Parallel
                                  Differential Evolution Template for
                                  EASEA  . . . . . . . . . . . . . . . . . 12--20
                     Li Bai and   
                  David Feltell   A $3$D Discrete-Continuum Swarm
                                  Intelligence Simulation on GPU for Swarm
                                  Robotics and Biomedical Applications . . 21--29
 Kálmán Bolla and   
        Tamás Kovacs and   
           Gábor Fazekas   Gathering of Fat Robots with Limited
                                  Visibility and without Global Navigation 30--38
                 Petr Bujok and   
            Josef Tvrdík   Parallel Migration Model Employing
                                  Various Adaptive Variants of
                                  Differential Evolution . . . . . . . . . 39--47
          Roberto De Prisco and   
        Gianluca Zaccagnino and   
               Rocco Zaccagnino   A Differential Evolution Algorithm
                                  Assisted by ANFIS for Music Fingering    48--56
               Abbas El Dor and   
              Maurice Clerc and   
                 Patrick Siarry   Hybridization of Differential Evolution
                                  and Particle Swarm Optimization in a New
                                  Algorithm: DEPSO-2S  . . . . . . . . . . 57--65
           Iztok Fister Jr. and   
               Iztok Fister and   
                    Janez Brest   A Hybrid Artificial Bee Colony Algorithm
                                  for Graph $3$-Coloring . . . . . . . . . 66--74
                 Jeremy Fix and   
                 Matthieu Geist   Monte--Carlo Swarm Policy Search . . . . 75--83
             Giovanni Iacca and   
              Ferrante Neri and   
                Ernesto Mininno   Compact Bacterial Foraging Optimization  84--92
                     Andrew Koh   A Coevolutionary MiniMax Algorithm for
                                  the Detection of Nash Equilibrium  . . . 93--101
         Tomasz Krzeszowski and   
              Bogdan Kwolek and   
             Boguslaw Rymut and   
           Konrad Wojciechowski   Real-Time Tracking of Full-Body Motion
                                  Using Parallel Particle Swarm
                                  Optimization with a Pool of Best
                                  Particles  . . . . . . . . . . . . . . . 102--109
                Karol Opara and   
               Jaros\law Arabas   Decomposition and Metaoptimization of
                                  Mutation Operator in Differential
                                  Evolution  . . . . . . . . . . . . . . . 110--118
             Janusz Papli\'nski   Continuous Ant Colony Optimization for
                                  Identification of Time Delays in the
                                  Linear Plant . . . . . . . . . . . . . . 119--127
        M. Fatih Tasgetiren and   
                Quan-Ke Pan and   
            P. N. Suganthan and   
                Ozge Buyukdagli   A Variable Iterated Greedy Algorithm
                                  with Differential Evolution for Solving
                                  No-Idle Flowshops  . . . . . . . . . . . 128--135
        Josef Tvrdík and   
            Ivan K\vrivý   Differential Evolution with Competing
                                  Strategies Applied to Partitional
                                  Clustering . . . . . . . . . . . . . . . 136--144
             Matthieu Weber and   
                  Ferrante Neri   Contiguous Binomial Crossover in
                                  Differential Evolution . . . . . . . . . 145--153
              Ale\vs Zamuda and   
                    Janez Brest   Population Reduction Differential
                                  Evolution with Multiple Mutation
                                  Strategies in Real World Industry
                                  Challenges . . . . . . . . . . . . . . . 154--161
                      Anonymous   Front Matter . . . . . . . . . . . . . . 163--163
                Petr Cermak and   
                    Michal Mura   Genetic Optimization of Fuzzy Rule Based
                                  MAS Using Cognitive Analysis . . . . . . 165--173
          Marcin Czajkowski and   
                Marek Kretowski   Does Memetic Approach Improve Global
                                  Induction of Regression and Model Trees? 174--181
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7270, 2012

               Elisa Burato and   
                Matteo Cristani   The Process of Reaching Agreement in
                                  Meaning Negotiation  . . . . . . . . . . 1--42
           Veronica Jascanu and   
                Nicolae Jascanu   Formalizing Emotional E-Commerce Agents
                                  for a Simple Negotiation Protocol  . . . 43--60
          Giancarlo Fortino and   
                Francesco Rango   Engineering Multi-Agent Systems through
                                  Statecharts-Based JADE Agents and Tools  61--81
               Mahdi Zargayouna   Fleet Organization Models for Online
                                  Vehicle Routing Problems . . . . . . . . 82--102
     Vill\`evo Adanhounm\`e and   
      Théophile K. Dagba   Neural Smooth Function Approximation and
                                  Prediction with Adaptive Learning Rate   103--118
               James O'Shea and   
              Zuhair Bandar and   
                Keeley Crockett   A Multi-classifier Approach to Dialogue
                                  Act Classification Using Function Words  119--143
              Danuta Zakrzewska   Building Group Recommendations in
                                  E-Learning Systems . . . . . . . . . . . 144--163
        Wojciech Lorkiewicz and   
           Radoslaw Katarzyniak   Individual Semiosis in Multi-Agent
                                  Systems  . . . . . . . . . . . . . . . . 164--197
       Pierpaolo Di Bitonto and   
                  Maria Laterza   Evaluation of Multi-Agent Systems:
                                  Proposal and Validation of a Metric Plan 198--221
                Jaros\law W\kas   Egress Modeling through Cellular
                                  Automata Based Multi-Agent Systems . . . 222--235
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7271, 2012

        Dimitri Van Landuyt and   
         Steven Op de beeck and   
                Eddy Truyen and   
                  Wouter Joosen   Domain-Driven Discovery of Stable
                                  Abstractions for Pointcut Interfaces . . 1--52
            Jean-Yves Tigli and   
  Stéphane Lavirotte and   
            Gaëtan Rey and   
              Nicolas Ferry and   
                Vincent Hourdin   Aspect of Assembly: From Theory to
                                  Performance  . . . . . . . . . . . . . . 53--91
            Danilo Ansaloni and   
              Walter Binder and   
             Philippe Moret and   
           Alex Villazón   Dynamic Aspect-Oriented Programming in
                                  Java: The HotWave Experience . . . . . . 92--122
              Adrian Holzer and   
              Lukasz Ziarek and   
              K. R. Jayaram and   
                Patrick Eugster   Abstracting Context in Event-Based
                                  Software . . . . . . . . . . . . . . . . 123--167
             Daniel Lohmann and   
              Olaf Spinczyk and   
                Wanja Hofer and   
Wolfgang Schröder-Preikschat   The Aspect-Aware Design and
                                  Implementation of the CiAO
                                  Operating-System Family  . . . . . . . . 168--215
          Lodewijk Bergmans and   
              Wilke Havinga and   
                   Mehmet Aksit   First-Class Compositions . . . . . . . . 216--267
          Eyvind W. Axelsen and   
    Fredrik Sòrensen and   
             Stein Krogdahl and   
  Birger Mòller-Pedersen   Challenges in the Design of the Package
                                  Template Mechanism . . . . . . . . . . . 268--305
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7272, 2012

             Francisco Maia and   
                   Miguel Matos   Slead: Low-Memory, Steady Distributed
                                  Systems Slicing  . . . . . . . . . . . . 1--15
    François Fouquet and   
                  Erwan Daubert   Dissemination of Reconfiguration
                                  Policies on Mesh Networks  . . . . . . . 16--30
      Dimokritos Stamatakis and   
                Nikos Tsikoudis   Scalability of Replicated Metadata
                                  Services in Distributed File Systems . . 31--44
           Fatemeh Rahimian and   
            Thinh Le Nguyen Huu   Locality-Awareness in a Peer-to-Peer
                                  Publish/Subscribe Network  . . . . . . . 45--58
           Philippe De Ryck and   
               Nick Nikiforakis   Serene: Self-Reliant Client-Side
                                  Protection against Session Fixation  . . 59--72
           Linda Ariani Gunawan   Behavioral Singletons to Consistently
                                  Handle Global States of Security
                                  Patterns . . . . . . . . . . . . . . . . 73--86
               Diego Kreutz and   
        António Casimiro   A Trustworthy and Resilient Event Broker
                                  for Monitoring Cloud Infrastructures . . 87--95
              Miguel Borges and   
                Paulo Jesus and   
                 Carlos Baquero   Spectra: Robust Estimation of
                                  Distribution Functions in Networks . . . 96--103
                Jef Maerien and   
                   Pieter Agten   FAMoS: a Flexible Active Monitoring
                                  Service for Wireless Sensor Networks . . 104--117
          Abdulkader Benchi and   
  Frédéric Guidec   A Message Service for Opportunistic
                                  Computing in Disconnected MANETs . . . . 118--131
      Engineer Bainomugisha and   
                 Koosha Paridel   Flexub: Dynamic Subscriptions for
                                  Publish/Subscribe Systems in MANETs  . . 132--139
                  John Lyle and   
               Shamal Faily and   
           Ivan Fléchais   On the Design and Development of
                                  webinos: a Distributed Mobile
                                  Application Middleware . . . . . . . . . 140--147
             Graham Thomson and   
                Sotirios Terzis   A Middleware for Pervasive
                                  Situation-Awareness  . . . . . . . . . . 148--161
           Abdulrahman Azab and   
                    Hein Meling   Stroll: a Universal Filesystem-Based
                                  Interface for Seamless Task Deployment
                                  in Grid Computing  . . . . . . . . . . . 162--176
              Fredrik Degerlund   Scheduling of Compute-Intensive Code
                                  Generated from Event-B Models: An
                                  Empirical Efficiency Study . . . . . . . 177--184
Narasimha Raghavan Veeraragavan   Reliability Modeling and Analysis of
                                  Modern Distributed Interactive
                                  Multimedia Applications: a Case Study of
                                  a Distributed Opera Performance  . . . . 185--193
          Diana Elena Comes and   
                Christoph Evers   Designing Socio-technical Applications
                                  for Ubiquitous Computing . . . . . . . . 194--201
                 Ivan Voras and   
              Marin Orli\'c and   
                  Mario \vZagar   Something Old Is New Again: Reimagining
                                  the Oldest Social Networking Platform    202--207
          Preston Rodrigues and   
    Yérom-David Bromberg   ZigZag: a Middleware for Service
                                  Discovery in Future Internet . . . . . . 208--221
          Diana Elena Comes and   
                   Harun Baraki   BPRules and the BPR-Framework:
                                  Comprehensive Support for Managing QoS
                                  in Web Service Compositions  . . . . . . 222--235
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7273, 2012

          Michael Lienhardt and   
                    Ivan Lanese   A Reversible Abstract Machine and Its
                                  Space Overhead . . . . . . . . . . . . . 1--17
          Taylor T. Johnson and   
                    Sayan Mitra   A Small Model Theorem for Rectangular
                                  Hybrid Automata Networks . . . . . . . . 18--34
              Elvira Albert and   
      Antonio E. Flores-Montoya   Analysis of May-Happen-in-Parallel in
                                  Concurrent Objects . . . . . . . . . . . 35--51
                Bogdan Aman and   
            Gabriel Ciobanu and   
                  Maciej Koutny   Behavioural Equivalences over Migrating
                                  Processes with Timers  . . . . . . . . . 52--66
                  Kais Klai and   
                Jörg Desel   Checking Soundness of Business Processes
                                  Compositionally Using Symbolic
                                  Observation Graphs . . . . . . . . . . . 67--83
          Roland Kindermann and   
                 Tommi Junttila   Beyond Lassos: Complete SMT-Based
                                  Bounded Model Checking for Timed
                                  Automata . . . . . . . . . . . . . . . . 84--100
         Pavithra Prabhakar and   
             Mahesh Viswanathan   Conformance Testing of Boolean Programs
                                  with Multiple Faults . . . . . . . . . . 101--117
            Saddek Bensalem and   
               Marius Bozga and   
                  Jean Quilbeuf   Knowledge-Based Distributed Conflict
                                  Resolution for Multiparty Interactions
                                  and Priorities . . . . . . . . . . . . . 118--134
              Andrea Cerone and   
               Matthew Hennessy   Modelling Probabilistic Wireless
                                  Networks . . . . . . . . . . . . . . . . 135--151
           Dimiter Milushev and   
                   Wim Beck and   
                    Dave Clarke   Noninterference via Symbolic Execution   152--168
David Romero Hernández and   
         David de Frutos Escrig   Defining Distances for All Process
                                  Semantics  . . . . . . . . . . . . . . . 169--185
              Gilles Barthe and   
             Juan Manuel Crespo   Secure Multi-Execution through Static
                                  Program Transformation . . . . . . . . . 186--202
         Beno\^\it Delahaye and   
                 Uli Fahrenberg   Synchronous Interface Theories and Time
                                  Triggered Scheduling . . . . . . . . . . 203--218
           Samira Tasharofi and   
              Rajesh K. Karmani   TransDPOR: a Novel Dynamic Partial-Order
                                  Reduction Technique for Testing Actor
                                  Programs . . . . . . . . . . . . . . . . 219--234
           Giorgio Delzanno and   
                Arnaud Sangnier   Verification of Ad Hoc Networks with
                                  Node and Communication Failures  . . . . 235--250
          Clara Benac Earle and   
        Lars-Åke Fredlund   Verification of Timed Erlang Programs
                                  Using McErlang . . . . . . . . . . . . . 251--267
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7274, 2012

        Vitaliy Liptchinsky and   
            Roman Khazankin and   
               Hong-Linh Truong   Statelets: Coordination of Social
                                  Collaboration Processes  . . . . . . . . 1--16
                   Davide Rossi   A Social Software-Based Coordination
                                  Platform . . . . . . . . . . . . . . . . 17--28
Frederico Alvares de Oliveira Jr. and   
                  Remi Sharrock   Synchronization of Multiple Autonomic
                                  Control Loops: Application to Cloud
                                  Computing  . . . . . . . . . . . . . . . 29--43
           Marko van Dooren and   
                    Dave Clarke   Subobject Transactional Memory . . . . . 44--58
                Dave Clarke and   
     José Proença   Partial Connector Colouring  . . . . . . 59--73
            Ramtin Khosravi and   
                Hamideh Sabouri   Using Coordinated Actors to Model
                                  Families of Distributed Systems  . . . . 74--88
               Peter Dinges and   
                       Gul Agha   Scoped Synchronization Constraints for
                                  Large Scale Actor Systems  . . . . . . . 89--103
              Roberto Bruni and   
             Carla Ferreira and   
             Anne Kersten Kauer   First-Order Dynamic Logic for
                                  Compensable Processes  . . . . . . . . . 104--121
                Bogdan Aman and   
                Gabriel Ciobanu   Coordinating Parallel Mobile Ambients to
                                  Solve SAT Problem in Polynomial Number
                                  of Steps . . . . . . . . . . . . . . . . 122--136
           Micha\l Terepeta and   
         Hanne Riis Nielson and   
               Flemming Nielson   Recursive Advice for Coordination  . . . 137--151
              Mieke Massink and   
                  Diego Latella   Fluid Analysis of Foraging Ants  . . . . 152--165
              Stefan Dziwok and   
       Christian Heinzemann and   
                 Matthias Tichy   Real-Time Coordination Patterns for
                                  Advanced Mechatronic Systems . . . . . . 166--180
              Eline Philips and   
                 Jorge Vallejos   Group Orchestration in a Mobile
                                  Environment  . . . . . . . . . . . . . . 181--195
               Luigia Petre and   
             Petter Sandvik and   
                     Kaisa Sere   Node Coordination in Peer-to-Peer
                                  Networks . . . . . . . . . . . . . . . . 196--211
               Mirko Viroli and   
             Danilo Pianini and   
                     Jacob Beal   Linda in Space-Time: An Adaptive
                                  Coordination Model for Mobile Ad-Hoc
                                  Environments . . . . . . . . . . . . . . 212--229
              Eva Kühn and   
            Alexander Marek and   
                Thomas Scheller   A Space-Based Generic Pattern for
                                  Self-Initiative Load Clustering Agents   230--244
         Massimo Bartoletti and   
              Emilio Tuosto and   
                 Roberto Zunino   On the Realizability of Contracts in
                                  Dishonest Systems  . . . . . . . . . . . 245--260
           Pierpaolo Degano and   
             Gian-Luigi Ferrari   Types for Coordinating Secure
                                  Behavioural Variations . . . . . . . . . 261--276
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7275, 2012

             Michael Hutter and   
           Mario Kirschbaum and   
                Thomas Plos and   
     Jörn-Marc Schmidt and   
                 Stefan Mangard   Exploiting the Difference of
                                  Side-Channel Leakages  . . . . . . . . . 1--16
               Thomas Korak and   
                Thomas Plos and   
                 Michael Hutter   Attacking an AES-Enabled NFC Tag:
                                  Implications from Design to a Real-World
                                  Scenario . . . . . . . . . . . . . . . . 17--32
                 Mathias Wagner   700+ Attacks Published on Smart Cards:
                                  The Need for a Systematic Counter
                                  Strategy . . . . . . . . . . . . . . . . 33--38
                     Wei He and   
        Eduardo de la Torre and   
                  Teresa Riesgo   An Interleaved EPE-Immune PA-DPL
                                  Structure for Resisting Concentrated EM
                                  Side Channel Attacks on FPGA
                                  Implementation . . . . . . . . . . . . . 39--53
    Shohreh Sharif Mansouri and   
                  Elena Dubrova   An Architectural Countermeasure against
                                  Power Analysis Attacks for FSR-Based
                                  Stream Ciphers . . . . . . . . . . . . . 54--68
Jean-Sébastien Coron and   
          Christophe Giraud and   
            Emmanuel Prouff and   
                  Soline Renner   Conversion of Security Proofs from One
                                  Leakage Model to Another: a New Issue    69--81
                     Sven Bauer   Attacking Exponent Blinding in RSA
                                  without CRT  . . . . . . . . . . . . . . 82--88
               Jean Da Rolt and   
                Amitabh Das and   
          Giorgio Di Natale and   
         Marie-Lise Flottes and   
                 Bruno Rouzeyre   A New Scan Attack on RSA in Presence of
                                  Industrial Countermeasures . . . . . . . 89--104
          Camille Vuillaume and   
               Takashi Endo and   
                 Paul Wooderson   RSA Key Generation: New Attacks  . . . . 105--119
          Philipp Jovanovic and   
             Martin Kreuzer and   
                    Ilia Polian   A Fault Attack on the LED Block Cipher   120--134
                 Liang Zhao and   
            Takashi Nishide and   
                Kouichi Sakurai   Differential Fault Analysis of Full
                                  LBlock . . . . . . . . . . . . . . . . . 135--150
               Pierre Bayon and   
             Lilian Bossuet and   
               Alain Aubert and   
             Viktor Fischer and   
      François Poucheret   Contactless Electromagnetic Active
                                  Attack on Ring Oscillator Based True
                                  Random Number Generator  . . . . . . . . 151--166
                 Viktor Fischer   A Closer Look at Security in Random
                                  Number Generators Design . . . . . . . . 167--182
      Cédric Murdica and   
            Sylvain Guilley and   
            Jean-Luc Danger and   
         Philippe Hoogvorst and   
                 David Naccache   Same Values Power Analysis Using Special
                                  Points on Elliptic Curves  . . . . . . . 183--198
          Alexander Krüger   The Schindler--Itoh-attack in Case of
                                  Partial Information Leakage  . . . . . . 199--214
             Michael Zohner and   
             Michael Kasper and   
           Marc Stöttinger   Butterfly-Attack on Skein's Modular
                                  Addition . . . . . . . . . . . . . . . . 215--230
                Xinjie Zhao and   
                  Fan Zhang and   
                  Shize Guo and   
                   Tao Wang and   
                 Zhijie Shi and   
                Huiying Liu and   
                        Keke Ji   MDASCA: An Enhanced Algebraic
                                  Side-Channel Attack for Error Tolerance
                                  and New Leakage Model Exploitation . . . 231--248
             Annelie Heuser and   
                 Michael Zohner   Intelligent Machine Homicide . . . . . . 249--264
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7276, 2012

         Marco E. Lübbecke   Automatic Decomposition and
                                  Branch-and-Price--- a Status Report  . . 1--8
            Barbara Kempkes and   
  Friedhelm Meyer auf der Heide   Continuous Local Strategies for Robotic
                                  Formation Problems . . . . . . . . . . . 9--17
              Vitaly Osipov and   
              Peter Sanders and   
               Christian Schulz   Engineering Graph Partitioning
                                  Algorithms . . . . . . . . . . . . . . . 18--26
          Benjamin Albrecht and   
                    Volker Heun   Space Efficient Modifications to
                                  Structator--- a Fast Index-Based Search
                                  Tool for RNA Sequence-Structure Patterns 27--38
                 Eric Angel and   
          Romain Campigotto and   
             Christian Laforest   Implementation and Comparison of
                                  Heuristics for the Vertex Cover Problem
                                  on Huge Graphs . . . . . . . . . . . . . 39--50
            Annabell Berger and   
 Matthias Müller-Hannemann   How to Attack the NP-Complete Dag
                                  Realization Problem in Practice  . . . . 51--62
      Christina Büsing and   
         Fabio D'Andreagiovanni   New Results about Multi-band Uncertainty
                                  in Robust Optimization . . . . . . . . . 63--74
              Sonia Cafieri and   
              Pierre Hansen and   
      Lucas Létocart and   
                Leo Liberti and   
 Frédéric Messine   Compact Relaxations for Polynomial
                                  Programming Problems . . . . . . . . . . 75--86
              Alberto Costa and   
                    Leo Liberti   Relaxations of Multilinear Convex
                                  Envelopes: Dual Is Better Than Primal    87--98
        Pierluigi Crescenzi and   
             Roberto Grossi and   
             Leonardo Lanzi and   
                  Andrea Marino   On Computing the Diameter of Real-World
                                  Directed (Weighted) Graphs . . . . . . . 99--110
          Annalisa D'Andrea and   
                 Guido Proietti   Reoptimizing the Strengthened Metric TSP
                                  on Multiple Edge Weight Modifications    111--122
       Gianlorenzo D'Angelo and   
            Mattia D'Emidio and   
           Daniele Frigioni and   
               Vinicio Maurizio   Engineering a New Loop-Free Shortest
                                  Paths Routing Algorithm  . . . . . . . . 123--134
       Gianlorenzo D'Angelo and   
            Mattia D'Emidio and   
           Daniele Frigioni and   
                 Camillo Vitale   Fully Dynamic Maintenance of Arc-Flags
                                  in Road Networks . . . . . . . . . . . . 135--147
      Martin Dietzfelbinger and   
             Hendrik Peilke and   
                   Michael Rink   A More Reliable Greedy Heuristic for
                                  Maximum Matchings in Sparse Random
                                  Graphs . . . . . . . . . . . . . . . . . 148--159
                Amr Elmasry and   
           Jyrki Katajainen and   
                   Max Stenmark   Branch Mispredictions Don't Affect
                                  Mergesort  . . . . . . . . . . . . . . . 160--171
                Simone Faro and   
                 Thierry Lecroq   A Multiple Sliding Windows Approach to
                                  Speed Up String Matching Algorithms  . . 172--183
           Guillaume Fertin and   
       Hafedh Mohamed Babou and   
                     Irena Rusu   Algorithms for Subnetwork Mining in
                                  Heterogeneous Networks . . . . . . . . . 184--194
          Donatella Firmani and   
       Giuseppe F. Italiano and   
                Luigi Laura and   
                Alessio Orlandi   Computing Strong Articulation Points and
                                  Strong Bridges in Large Scale Graphs . . 195--207
         Giorgos Georgiadis and   
        Marina Papatriantafilou   Adaptive Distributed $b$-Matching in
                                  Overlays with Preferences  . . . . . . . 208--223
            Stelios Joannou and   
                   Rajeev Raman   Dynamizing Succinct Tree Representations 224--235
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7277, 2012

     Sarang Bharadwaj Masti and   
          Siva P. Meenakshi and   
           Serugudi V. Raghavan   VNEMX: Virtual Network Embedding
                                  Test-Bed Using MPLS and Xen  . . . . . . 1--12
   Panagiotis Papadimitriou and   
                Ines Houidi and   
               Wajdi Louati and   
           Djamal Zeghlache and   
                Christoph Werle   Towards Large-Scale Network
                                  Virtualization . . . . . . . . . . . . . 13--25
        Vasileios Lakafosis and   
        Sreenivas Addagatla and   
           Christian Belady and   
                   Suyash Sinha   Prometheus: a Wirelessly Interconnected,
                                  Pico-Datacenter Framework for the
                                  Developing World . . . . . . . . . . . . 26--39
              Olga Galinina and   
             Sergey Andreev and   
            Yevgeni Koucheryavy   Performance Analysis of Client Relay
                                  Cloud in Wireless Cellular Networks  . . 40--51
           Christos Liaskos and   
              Andreas Xeros and   
  Georgios I. Papadimitriou and   
                  Marios Lestas   Periodic Scheduling with Costs Revisited 52--63
           Christos Liaskos and   
       Ageliki Tsioliaridou and   
      Georgios I. Papadimitriou   More for Less  . . . . . . . . . . . . . 64--75
                  Junyu Lai and   
             Bernd E. Wolfinger   A Method to Improve the Channel
                                  Availability of IPTV Systems with Users
                                  Zapping Channels Sequentially  . . . . . 76--89
              Nedal Ababneh and   
           Nicholas Timmons and   
                   Jim Morrison   An Adaptive Bandwidth Allocation Scheme
                                  for Data Streaming over Body Area
                                  Networks . . . . . . . . . . . . . . . . 90--101
                Ehsan Ahvar and   
René Serral-Graci\`a and   
   Eva Marín-Tordera and   
             Xavier Masip-Bruin   EQR: a New Energy-Aware Query-Based
                                  Routing Protocol for Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 102--113
         Gerald Wagenknecht and   
            Markus Anwander and   
                  Torsten Braun   Performance Evaluation of Reliable
                                  Overlay Multicast in Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 114--125
     Desislava C. Dimitrova and   
             Islam Alyafawi and   
                  Torsten Braun   Experimental Comparison of Bluetooth and
                                  WiFi Signal Propagation for Indoor
                                  Localisation . . . . . . . . . . . . . . 126--137
             Kaushik Mondal and   
      Partha Sarathi Mandal and   
               Bhabani P. Sinha   Localization in Presence of Multipath
                                  Effect in Wireless Sensor Networks . . . 138--149
              Ausama Yousef and   
                Samer Rishe and   
    Andreas Mitschele-Thiel and   
                Abdalkarim Awad   RNBB: a Reliable Hybrid Broadcasting
                                  Algorithm for Ad-Hoc Networks  . . . . . 150--161
       Ghazale Hosseinabadi and   
                Nitin H. Vaidya   Exploiting Opportunistic Overhearing to
                                  Improve Performance of Mutual Exclusion
                                  in Wireless Ad Hoc Networks  . . . . . . 162--173
              Fraser Cadger and   
               Kevin Curran and   
                Jose Santos and   
                 Sandra Moffett   MANET Location Prediction Using Machine
                                  Learning Algorithms  . . . . . . . . . . 174--185
        José Marinho and   
               Edmundo Monteiro   Cooperative Sensing-Before-Transmit in
                                  Ad-Hoc Multi-hop Cognitive Radio
                                  Scenarios  . . . . . . . . . . . . . . . 186--197
            Adetola Oredope and   
        Guilherme Frassetto and   
                    Barry Evans   An Evaluation of Vertical Handovers in
                                  LTE Networks . . . . . . . . . . . . . . 198--207
              Michal Vondra and   
                  Zdenek Becvar   Connection Cost Based Handover Decision
                                  for Offloading Macrocells by Femtocells  208--219
                Chung-Hsien Hsu   Direct Link Assignment Approach for IEEE
                                  802.16 Networks  . . . . . . . . . . . . 220--231
                Dongxiao Yu and   
            Qiang-Sheng Hua and   
                 Weiguo Dai and   
               Yuexuan Wang and   
              Francis C. M. Lau   Dynamic Contention Resolution in
                                  Multiple-Access Channels . . . . . . . . 232--243
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7278, 2012

                  Hsinchun Chen   Dark Web: Exploring and Mining the Dark
                                  Side of the Web  . . . . . . . . . . . . 1--1
                   Luc De Raedt   Declarative Modeling for Machine
                                  Learning and Data Mining . . . . . . . . 2--2
                   Paul Elzinga   Can Concepts Reveal Criminals? . . . . . 3--3
                  Bart Goethals   Cartification: From Similarities to
                                  Itemset Frequencies  . . . . . . . . . . 4--4
              Ir. Edward Peters   Processes Are Concepts, Aren't They? . . 5--5
             Dominik \'Sl\kezak   Rough Sets and FCA --- Scalability
                                  Challenges . . . . . . . . . . . . . . . 6--6
           Mikhail A. Babin and   
            Sergei O. Kuznetsov   Approximating Concept Stability  . . . . 7--15
               Eduard Bartl and   
                  Michal Krupka   Logical Analysis of Concept Lattices by
                                  Factorization  . . . . . . . . . . . . . 16--27
           Radim Belohlavek and   
                 Martin Trnecka   Basic Level of Concepts in Formal
                                  Concept Analysis . . . . . . . . . . . . 28--44
                 Anne Berry and   
                 Alain Sigayret   A Peep through the Looking Glass:
                                  Articulation Points in Lattices  . . . . 45--60
   Stéphanie Chollet and   
          Vincent Lestideau and   
               Yoann Maurel and   
          Etienne Gandrille and   
               Philippe Lalanda   Practical Use of Formal Concept Analysis
                                  in Service-Oriented Computing  . . . . . 61--76
            Stephan Doerfel and   
        Robert Jäschke and   
                    Gerd Stumme   Publication Analysis of the Formal
                                  Concept Analysis Community . . . . . . . 77--95
             Dominik Endres and   
                  Ruth Adam and   
            Martin A. Giese and   
                   Uta Noppeney   Understanding the Semantic Structure of
                                  Human fMRI Brain Recordings with Formal
                                  Concept Analysis . . . . . . . . . . . . 96--111
Sébastien Ferré and   
              Pierre Allard and   
                 Olivier Ridoux   Cubes of Concepts: Multi-dimensional
                                  Exploration of Multi-valued Contexts . . 112--127
            Bernhard Ganter and   
          Cynthia Vera Glodeanu   Ordinal Factor Analysis  . . . . . . . . 128--139
              Tim B. Kaiser and   
              Stefan E. Schmidt   A Macroscopic Approach to FCA and Its
                                  Various Fuzzifications . . . . . . . . . 140--147
             Sebastian Kerkhoff   A Connection between Clone Theory and
                                  FCA Provided by Duality Theory . . . . . 148--163
           Markus Kirchberg and   
             Erwin Leonardi and   
              Yu Shyang Tan and   
             Sebastian Link and   
                  Ryan K. L. Ko   Formal Concept Discovery in Semantic Web
                                  Data . . . . . . . . . . . . . . . . . . 164--179
              Michal Krupka and   
                 Jan Lastovicka   Concept Lattices of Incomplete Data  . . 180--194
                    Juraj Macko   Formal Concept Analysis as a Framework
                                  for Business Intelligence Technologies   195--210
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7279, 2012

                  Corrado Leita   Challenges in Critical Infrastructure
                                  Security . . . . . . . . . . . . . . . . 1--1
               Niels Bouten and   
           Anna Hristoskova and   
              Femke Ongenae and   
                Jelle Nelis and   
                 Filip De Turck   Ontology-Driven Dynamic Discovery and
                                  Distributed Coordination of a Robot
                                  Swarm  . . . . . . . . . . . . . . . . . 2--13
              Andrei Vancea and   
    Guilherme Sperb Machado and   
           Laurent d'Orazio and   
               Burkhard Stiller   Cooperative Database Caching within
                                  Cloud Environments . . . . . . . . . . . 14--25
       Stylianos Georgoulas and   
             Klaus Moessner and   
             Alexis Mansour and   
            Menelaos Pissarides   A Fuzzy Reinforcement Learning Approach
                                  for Pre-Congestion Notification Based
                                  Admission Control  . . . . . . . . . . . 26--37
        Julius Rückert and   
                 David Hausheer   Bridging the Gap: Towards an Adaptive
                                  Video Streaming Approach Supporting
                                  Transitions  . . . . . . . . . . . . . . 38--41
               Teemu Rautio and   
         Jukka Mäkelä   A Multiaccess Enabled Load Balancing in
                                  Cognitive Networks . . . . . . . . . . . 42--45
                   Viktor Pu\vs   Hardware Acceleration for Measurements
                                  in 100 Gb/s Networks . . . . . . . . . . 46--49
        Kevin Dominik Korte and   
                Anuj Sehgal and   
Jürgen Schönwälder   A Study of the RPL Repair Process Using
                                  ContikiRPL . . . . . . . . . . . . . . . 50--61
      Radek Krej\vcí and   
             Pavel \vCeleda and   
        Jakub Dobrovolný   Traffic Measurement and Analysis of
                                  Building Automation and Control Networks 62--73
                Tobias Jung and   
             Sylvain Martin and   
               Damien Ernst and   
                      Guy Leduc   SPRT for SPIT: Using the Sequential
                                  Probability Ratio Test for Spam in VoIP
                                  Prevention . . . . . . . . . . . . . . . 74--85
          Laurens Hellemons and   
              Luuk Hendriks and   
              Rick Hofstede and   
              Anna Sperotto and   
                Ramin Sadre and   
                      Aiko Pras   SSHCure: a Flow-Based SSH Intrusion
                                  Detection System . . . . . . . . . . . . 86--97
              Thorsten Ries and   
                 Radu State and   
                   Thomas Engel   Instant Degradation of Anonymity in
                                  Low-Latency Anonymisation Systems  . . . 98--108
              Rick Hofstede and   
                      Aiko Pras   Real-Time and Resilient Intrusion
                                  Detection: a Flow-Based Approach . . . . 109--112
               Karel Bartos and   
                   Martin Rehak   Distributed Self-organized Collaboration
                                  of Autonomous IDS Sensors  . . . . . . . 113--117
     Václav Barto\vs and   
  Martin \vZádník   Network Anomaly Detection: Comparison
                                  and Real-Time Issues . . . . . . . . . . 118--121
             Cynthia Wagner and   
                   Thomas Engel   Detecting Anomalies in Netflow Record
                                  Time Series by Using a Kernel Function   122--125
           Ji\vrí Tobola   How to Build an IT Spin-Off Company  . . 126--126
      Ricardo de O. Schmidt and   
              Anna Sperotto and   
                Ramin Sadre and   
                      Aiko Pras   Towards Bandwidth Estimation Using
                                  Flow-Level Measurements  . . . . . . . . 127--138
             Vaibhav Bajpai and   
           Nikolay Melnikov and   
                Anuj Sehgal and   
Jürgen Schönwälder   Flow-Based Identification of Failures
                                  Caused by IPv6 Transition Mechanisms . . 139--150
             Samuel Marchal and   
                   Thomas Engel   Large Scale DNS Analysis . . . . . . . . 151--154
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7280, 2012

                  Yang Yang and   
                 Guang Gong and   
                    Xiaohu Tang   Odd Perfect Sequences and Sets of
                                  Spreading Sequences with Zero or Low Odd
                                  Periodic Correlation Zone  . . . . . . . 1--12
        Ferruh Özbudak and   
               O\uguz Yayla and   
C. Cengiz Yìldìrìm   Nonexistence of Certain Almost $p$-ary
                                  Perfect Sequences  . . . . . . . . . . . 13--24
                    Yin Tan and   
               Longjiang Qu and   
               Chik How Tan and   
                        Chao Li   New Families of Differentially
                                  $4$-Uniform Permutations over ${\mathbb
                                  F}_{2^{2k}}$ . . . . . . . . . . . . . . 25--39
          Jean-Pierre Flori and   
                 Sihem Mesnager   Dickson Polynomials, Hyperelliptic
                                  Curves and Hyper-bent Functions  . . . . 40--52
              Jonathan Lutz and   
        Charles J. Colbourn and   
             Violet R. Syrotiuk   Variable Weight Sequences for Adaptive
                                  Scheduled Access in MANETs . . . . . . . 53--64
                 Andrew Klapper   Arithmetic Walsh Transform of Quadratic
                                  Boolean Functions  . . . . . . . . . . . 65--76
                 Sumanta Sarkar   Characterizing Negabent Boolean
                                  Functions over Finite Fields . . . . . . 77--88
Ça\ugda\cs Çalìk and   
               Ali Do\uganaksoy   Computing the Weight of a Boolean
                                  Function from Its Algebraic Normal Form  89--100
            Gottlieb Pirsic and   
                 Arne Winterhof   Boolean Functions Derived from
                                  Pseudorandom Binary Sequences  . . . . . 101--109
              Solomon W. Golomb   Infinite Sequences with Finite
                                  Cross-Correlation-II . . . . . . . . . . 110--116
           Thomas J. Dorsey and   
                Alfred W. Hales   Irreducible Coefficient Relations  . . . 117--125
            Jonathan Jedwab and   
                 Jane Wodlinger   Wavelength Isolation Sequence Pairs  . . 126--135
           Ana S\ual\uagean and   
              David Gardner and   
                   Raphael Phan   Index Tables of Finite Fields and
                                  Modular Golomb Rulers  . . . . . . . . . 136--147
             Zhengchun Zhou and   
                Xiaohu Tang and   
                  Yang Yang and   
               Udaya Parampalli   On the Aperiodic Hamming Correlation of
                                  Frequency-Hopping Sequences from Norm
                                  Functions  . . . . . . . . . . . . . . . 148--158
   Santiago Barrera Acevedo and   
                 Thomas E. Hall   Perfect Sequences of Unbounded Lengths
                                  over the Basic Quaternions . . . . . . . 159--167
          Michael Vielhaber and   
Mónica del Pilar Canales Chacón   The Linear Complexity Deviation of
                                  Multisequences: Formulae for Finite
                                  Lengths and Asymptotic Distributions . . 168--180
              Zhixiong Chen and   
Domingo Gómez-Pérez   Linear Complexity of Binary Sequences
                                  Derived from Polynomial Quotients  . . . 181--189
            Sartaj Ul Hasan and   
             Daniel Panario and   
                     Qiang Wang   Word-Oriented Transformation Shift
                                  Registers and Their Linear Complexity    190--201
               Jin-Ho Chung and   
               Kyeongcheol Yang   Low-Hit-Zone Frequency-Hopping Sequence
                                  Sets with New Parameters . . . . . . . . 202--211
               Oscar Moreno and   
                  Andrew Tirkel   New Optimal Low Correlation Sequences
                                  for Wireless Communications  . . . . . . 212--223
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7281, 2012

            Nick Wainwright and   
              Nick Papanikolaou   Introduction: The FIA Research Roadmap,
                                  Priorities for Future Internet Research  1--5
     Alexandros Kostopoulos and   
            Ioanna Papafili and   
           Costas Kalogiros and   
            Tapio Levä and   
                      Nan Zhang   A Tussle Analysis for
                                  Information-Centric Networking
                                  Architectures  . . . . . . . . . . . . . 6--17
              Bernard Sales and   
           Emmanuel Darmois and   
      Dimitri Papadimitriou and   
                  Didier Bourse   A Systematic Approach for Closing the
                                  Research to Standardization Gap  . . . . 18--29
               Kevin Doolin and   
            Ioanna Roussaki and   
                 Mark Roddy and   
             Nikos Kalatzis and   
         Elizabeth Papadopoulou   SOCIETIES: Where Pervasive Meets Social  30--41
        Anne-Marie Oostveen and   
                Isis Hjorth and   
            Brian Pickering and   
           Michael Boniface and   
                  Eric T. Meyer   Cross-Disciplinary Lessons for the
                                  Future Internet  . . . . . . . . . . . . 42--54
      Dimitri Papadimitriou and   
        Theodore Zahariadis and   
       Pedro Martinez-Julia and   
                Ioanna Papafili   Design Principles for the Future
                                  Internet Architecture  . . . . . . . . . 55--67
      Dimitri Papadimitriou and   
              Bernard Sales and   
             Piet Demeester and   
            Theodore Zahariadis   From Internet Architecture Research to
                                  Standards  . . . . . . . . . . . . . . . 68--80
           Amira Ben Hamida and   
                  Fabio Kon and   
      Gustavo Ansaldi Oliva and   
Carlos Eduardo Moreira Dos Santos   An Integrated Development and Runtime
                                  Environment for the Future Internet  . . 81--92
                James Davey and   
           Florian Mansmann and   
       Jörn Kohlhammer and   
                    Daniel Keim   Visual Analytics: Towards Intelligent
                                  Interactive Internet and Security
                                  Solutions  . . . . . . . . . . . . . . . 93--104
         Francesco Di Cerbo and   
              Michele Bezzi and   
       Samuel Paul Kaluvuri and   
               Antonino Sabetta   Towards a Trustworthy Service
                                  Marketplace for the Future Internet  . . 105--116
        Athanasios Antoniou and   
      Evangelos Theodoridis and   
    Ioannis Chatzigiannakis and   
               Georgios Mylonas   Using Future Internet Infrastructure and
                                  Smartphones for Mobility Trace
                                  Acquisition and Social Interactions
                                  Monitoring . . . . . . . . . . . . . . . 117--129
      Apostolos Axenopoulos and   
               Petros Daras and   
        Sotiris Malassiotis and   
                 Vincenzo Croce   I-SEARCH: a Unified Framework for
                                  Multimodal Search and Retrieval  . . . . 130--141
Flávio de Oliveira Silva and   
                  Alex Dias and   
 Caio César Ferreira and   
        Eduardo De Souza Santos   Semantically Enriched Services to
                                  Understand the Need of Entities  . . . . 142--153
         Pawe\l \'Swi\katek and   
      Krzysztof Juszczyszyn and   
      Krzysztof Brzostowski and   
             Jaros\law Drapa\la   Supporting Content, Context and User
                                  Awareness in Future Internet
                                  Applications . . . . . . . . . . . . . . 154--165
            Lara Srivastava and   
                  Athena Vakali   Towards a Narrative-Aware Design
                                  Framework for Smart Urban Environments   166--177
    Leonidas G. Anthopoulos and   
                  Athena Vakali   Urban Planning and Smart Cities:
                                  Interrelations and Reciprocities . . . . 178--189
            Roberto Gimenez and   
              Diego Fuentes and   
              Emilio Martin and   
              Diego Gimenez and   
                 Judith Pertejo   The Safety Transformation in the Future
                                  Internet Domain  . . . . . . . . . . . . 190--200
          Christos Tranoris and   
                 Spyros Denazis   FSToolkit: Adopting Software Engineering
                                  Practices for Enabling Definitions of
                                  Federated Resource Infrastructures . . . 201--212
     Leonidas Lymberopoulos and   
           Mary Grammatikou and   
               Martin Potts and   
               Paola Grosso and   
                  Attila Fekete   NOVI Tools and Algorithms for Federating
                                  Virtualized Infrastructures  . . . . . . 213--224
             Ioannis Tomkos and   
           Marianna Angelou and   
Ramón J. Durán Barroso and   
              Ignacio de Miguel   Next Generation Flexible and Cognitive
                                  Heterogeneous Optical Networks . . . . . 225--236
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7282, 2012

          Ferran Argelaguet and   
David Antonio Gómez Jáuregui and   
               Maud Marchal and   
         Anatole Lécuyer   A Novel Approach for Pseudo-haptic
                                  Textures Based on Curvature Information  1--12
       Christopher T. Asque and   
                Andy M. Day and   
             Stephen D. Laycock   Cursor Navigation Using Haptics for
                                  Motion-Impaired Computer Users . . . . . 13--24
                   Yuki Ban and   
           Takashi Kajinami and   
              Takuji Narumi and   
          Tomohiro Tanikawa and   
               Michitaka Hirose   Modifying an Identified Angle of Edged
                                  Shapes Using Pseudo-haptic Effects . . . 25--36
                Ozgur Baser and   
        E. Ilhan Konukseven and   
                  Hakan Gurocak   Transparency Improvement in Haptic
                                  Devices with a Torque Compensator Using
                                  Motor Current  . . . . . . . . . . . . . 37--46
               Buket Baylan and   
              Ugur Aridogan and   
               Cagatay Basdogan   Finite Element Modeling of a Vibrating
                                  Touch Screen Actuated by Piezo Patches
                                  for Haptic Feedback  . . . . . . . . . . 47--57
             Valeria Bellan and   
            Carlo Reverberi and   
                Alberto Gallace   Evidence for `Visual Enhancement of
                                  Touch' Mediated by Visual Displays and
                                  Its Relationship with Body Ownership . . 58--66
            Fernanda Brandi and   
              Burak Cizmeci and   
             Eckehard Steinbach   On the Perceptual Artifacts Introduced
                                  by Packet Losses on the Forward Channel
                                  of Haptic Telemanipulation Sessions  . . 67--78
Gwénaël Changeon and   
            Delphine Graeff and   
      Margarita Anastassova and   
             José Lozada   Tactile Emotions: a Vibrotactile Tactile
                                  Gamepad for Transmitting Emotional
                                  Messages to Children with Autism . . . . 79--90
        George H. Van Doorn and   
             Vladimir Dubaj and   
        Dianne B. Wuillemin and   
            Barry L. Richardson   Cognitive Load Can Explain Differences
                                  in Active and Passive Touch  . . . . . . 91--102
               Satoshi Endo and   
               Geoff Pegman and   
                Mark Burgin and   
                Tarek Toumi and   
                   Alan M. Wing   Haptics in Between-Person Object
                                  Transfer . . . . . . . . . . . . . . . . 103--111
            Ignacio Galiana and   
        Jose Breñosa and   
               Jorge Barrio and   
                   Manuel Ferre   New Control Architecture Based on PXI
                                  for a $3$-Finger Haptic Device Applied
                                  to Virtual Manipulation  . . . . . . . . 112--123
             Laurent George and   
               Maud Marchal and   
               Loeiz Glondu and   
         Anatole Lécuyer   Combining Brain-Computer Interfaces and
                                  Haptics: Detecting Mental Workload to
                                  Adapt Haptic Assistance  . . . . . . . . 124--135
       Christos Giachritsis and   
               Gary Randall and   
                Samuel Roselier   Development of Intuitive Tactile
                                  Navigational Patterns  . . . . . . . . . 136--147
                 Luca Greci and   
                Marco Sacco and   
                 Nicola Cau and   
                Flavia Buonanno   FootGlove: a Haptic Device Supporting
                                  the Customer in the Choice of the Best
                                  Fitting Shoes  . . . . . . . . . . . . . 148--159
               Netta Gurari and   
              Jason Wheeler and   
                Amy Shelton and   
             Allison M. Okamura   Discrimination of Springs with Vision,
                                  Proprioception, and Artificial Skin
                                  Stretch Cues . . . . . . . . . . . . . . 160--172
               Taku Hachisu and   
                 Michi Sato and   
            Shogo Fukushima and   
              Hiroyuki Kajimoto   Augmentation of Material Property by
                                  Modulating Vibration Resulting from
                                  Tapping  . . . . . . . . . . . . . . . . 173--180
         Felix G. Hamza-Lup and   
               William H. Baird   Feel the Static and Kinetic Friction . . 181--192
         Christian Hatzfeld and   
      Roland Werthschützky   Mechanical Impedance as Coupling
                                  Parameter of Force and Deflection
                                  Perception: Experimental Evaluation  . . 193--204
              Koichi Hirota and   
               Kazuyoshi Tagawa   Acquisition of Elastically Deformable
                                  Object Model Based on Measurement  . . . 205--217
              Charles Hudin and   
         José Lozada and   
        Michael Wiertlewski and   
                Vincent Hayward   Tradeoffs in the Application of
                                  Time-Reversed Acoustics to Tactile
                                  Stimulation  . . . . . . . . . . . . . . 218--226
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7283, 2012

                 Jalal Awed and   
             Imad H. Elhajj and   
             Nadiya Slobodenyuk   Haptic Force Perception in Bimanual
                                  Manipulation . . . . . . . . . . . . . . 1--6
   Wouter M. Bergmann Tiest and   
             Connie Lyklema and   
           Astrid M. L. Kappers   Investigating the Effect of Area of
                                  Stimulation on Cutaneous and
                                  Proprioceptive Weight Perception . . . . 7--12
              Sandra Coelho and   
              Miguel V. Correia   Rediscovering the Haptic Sense through
                                  Crossroads of Art and Design Research    13--18
           Nienke B. Debats and   
              Idsart Kingma and   
              Peter J. Beek and   
            Jeroen B. J. Smeets   The Precision of ``Haptic'' Rod Length
                                  Perception Is Reduced by Lack of Visual
                                  Precision  . . . . . . . . . . . . . . . 19--24
        George H. Van Doorn and   
        Barry L. Richardson and   
            Mark A. Symmons and   
               Jacqui L. Howell   Cutaneous Inputs Yield Judgments of Line
                                  Length That Are Equal to, or Better
                                  Than, Those Based on Kinesthetic Inputs  25--30
Marieke C. W. van der Graaff and   
                Eli Brenner and   
            Jeroen B. J. Smeets   Is the Curvature in Hand Movements to
                                  Haptic Targets in the Mid Sagittal Plane
                                  Caused by a Misjudgment in Direction?    31--36
   Florimond Guéniat and   
              Yoren Gaffary and   
                 Luc Pastur and   
                     Ammi Mehdi   Haptic Stimulus for the Discrimination
                                  between Intrinsic Properties of Dynamic
                                  Systems  . . . . . . . . . . . . . . . . 37--42
         Christian Hatzfeld and   
      Roland Werthschützky   Just Noticeable Differences of
                                  Low-Intensity Vibrotactile Forces at the
                                  Fingertip  . . . . . . . . . . . . . . . 43--48
                  Kiuk Gwak and   
             Jun-Cheol Park and   
                   Dae-Shik Kim   A Novel Stimulation Method Based on a
                                  Neuromorphic Mechanoreceptor Model for
                                  Haptic Illusion  . . . . . . . . . . . . 49--54
           Jacqui L. Howell and   
            Mark A. Symmons and   
            George H. Van Doorn   The Misperception of Length in Vision,
                                  Haptics and Audition . . . . . . . . . . 55--60
               Inwook Hwang and   
                 Seungmoon Choi   Effect of Mechanical Ground on the
                                  Vibrotactile Perceived Intensity of a
                                  Handheld Object  . . . . . . . . . . . . 61--66
              Hiroyuki Kajimoto   Design of Cylindrical Whole-Hand Haptic
                                  Interface Using Electrocutaneous Display 67--72
             Tuuli Keskinen and   
             Markku Turunen and   
              Roope Raisamo and   
           Grigori Evreinov and   
               Eemeli Haverinen   Utilizing Haptic Feedback in Drill Rigs  73--78
              Scinob Kuroki and   
             Junji Watanabe and   
                Shin'ya Nishida   Dissociation of Vibrotactile Frequency
                                  Discrimination Performances for
                                  Supra-Threshold and Near-Threshold
                                  Vibrations . . . . . . . . . . . . . . . 79--84
              Chang-Gyu Lee and   
                 Ian Oakley and   
                       Jeha Ryu   Exploring the Impact of Visual-Haptic
                                  Registration Accuracy in Augmented
                                  Reality  . . . . . . . . . . . . . . . . 85--90
                Jong-uk Lee and   
             Jeong-Mook Lim and   
               Heesook Shin and   
                    Ki-Uk Kyung   SHIFT: Interactive Smartphone Bumper
                                  Case . . . . . . . . . . . . . . . . . . 91--96
              Takuya Nakano and   
                 Shota Saji and   
              Yasuyuki Yanagida   Indicating Wind Direction Using a
                                  Fan-Based Wind Display . . . . . . . . . 97--102
              Ryuta Okazaki and   
          Hiroyuki Kajimoto and   
                Vincent Hayward   Vibrotactile Stimulation Can Affect
                                  Auditory Loudness: a Pilot Study . . . . 103--108
Frederik Wilhelm Jozef Olierook and   
                   Mathias Funk   Hands Reaching Out of Dreamland: a
                                  Haptic Peripheral Alarm Clock  . . . . . 109--114
             Kensuke Oshima and   
               Shigeru Ichihara   How Finger Movement Speed Affects
                                  Braille Pattern Recognition  . . . . . . 115--120
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7284, 2012

               Noreen Kamal and   
                    Sidney Fels   Determining the Determinants of Health
                                  Behaviour Change through an Online
                                  Social Network . . . . . . . . . . . . . 1--12
           Winslow Burleson and   
               Naomi Newman and   
                   Ryan Brotman   Empowering Independent Living for People
                                  with Autism: Designing Supportive,
                                  Low-Cost, Interactive E-Health
                                  Environments . . . . . . . . . . . . . . 13--30
           Samir Chatterjee and   
                   Jongbok Byun   Persuasive Sensing: a Novel In-Home
                                  Monitoring Technology to Assist Elderly
                                  Adult Diabetic Patients  . . . . . . . . 31--42
              Luca Chittaro and   
                 Riccardo Sioni   Turning the Classic Snake Mobile Game
                                  into a Location--Based Exergame that
                                  Encourages Walking . . . . . . . . . . . 43--54
    Matthijs Jan Zwinderman and   
                 Azadeh Shirzad   Phone Row: a Smartphone Game Designed to
                                  Persuade People to Engage in
                                  Moderate-Intensity Physical Activity . . 55--66
             Morten Aagaard and   
   Peter Òhrstròm   Developing Persuasive Technology for ASD
                                  Challenged Teenagers . . . . . . . . . . 67--78
             Sandy Schumann and   
              Olivier Klein and   
                  Karen Douglas   Talk to Act: How Internet Use Empowers
                                  Users to Participate in Collective
                                  Actions Offline  . . . . . . . . . . . . 79--89
                Cees Midden and   
                       Jaap Ham   The Illusion of Agency: The Influence of
                                  the Agency of an Artificial Agent on Its
                                  Persuasive Power . . . . . . . . . . . . 90--99
          Luciano Gamberini and   
                 Anna Spagnolli   Tailoring Feedback to Users' Actions in
                                  a Persuasive Game for Household
                                  Electricity Conservation . . . . . . . . 100--111
            S. Shyam Sundar and   
              Saraswathi Bellur   Motivational Technologies: a Theoretical
                                  Framework for Designing Preventive
                                  Health Applications  . . . . . . . . . . 112--122
                   Jilles Smids   The Voluntariness of Persuasive
                                  Technology . . . . . . . . . . . . . . . 123--132
           Lars Müller and   
  Verónica Rivera-Pelayo   Persuasion and Reflective Learning:
                                  Closing the Feedback Loop  . . . . . . . 133--144
          Thijs Waardenburg and   
                 Robbert Winkel   Normative Social Influence in Persuasive
                                  Technology: Intensity versus
                                  Effectiveness  . . . . . . . . . . . . . 145--156
                Filip Drozd and   
                   Tuomas Lehto   Exploring Perceived Persuasiveness of a
                                  Behavior Change Support System: a
                                  Structural Model . . . . . . . . . . . . 157--168
            Nupur Bhatnagar and   
                 Abhishek Sinha   Biometric Monitoring as a Persuasive
                                  Technology: Ensuring Patients Visit
                                  Health Centers in India's Slums  . . . . 169--180
              Susan Ferebee and   
                    James Davis   The Neural Persuasion Model: Aligning
                                  Neural Readiness, Perceived Need, and
                                  Intervention Strategies  . . . . . . . . 181--192
                Isaac Wiafe and   
               Muna M. Alhammad   Analyzing the Persuasion Context of the
                                  Persuasive Systems Design Model with the
                                  $3$D-RAB Model . . . . . . . . . . . . . 193--202
                  Rita Orji and   
               Regan L. Mandryk   Towards a Data-Driven Approach to
                                  Intervention Design: a Predictive Path
                                  Model of Healthy Eating Determinants . . 203--214
                  Luca Chittaro   Passengers' Safety in Aircraft
                                  Evacuations: Employing Serious Games to
                                  Educate and Persuade . . . . . . . . . . 215--226
                Ingo Pribik and   
            Alexander Felfernig   Towards Persuasive Technology for
                                  Software Development Environments: An
                                  Empirical Study  . . . . . . . . . . . . 227--238
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7285, 2012

                       Bryan He   Optimal Binary Representation of Mosaic
                                  Floorplans and Baxter Permutations . . . 1--12
              Jiun-Jie Wang and   
                         Xin He   Succinct Strictly Convex Greedy Drawing
                                  of $3$-Connected Plane Graphs  . . . . . 13--25
              Longcheng Liu and   
                  Yong Chen and   
                    Biao Wu and   
                       Enyu Yao   Weighted Inverse Minimum Cut Problem
                                  under the Sum-Type Hamming Distance  . . 26--35
               Chenglin Fan and   
                    Jun Luo and   
                  Wencheng Wang   Voronoi Diagram with Visual Restriction  36--46
                 Xuehou Tan and   
                       Bo Jiang   Minimization of the Maximum Distance
                                  between the Two Guards Patrolling a
                                  Polygonal Region . . . . . . . . . . . . 47--57
                  Minghui Jiang   On Covering Points with Minimum Turns    58--69
                        Xia Hua   On Envy-Free Pareto Efficient Pricing    70--81
                 Yong Zhang and   
             Francis Y. L. Chin   Online Pricing for Multi-type of Items   82--92
                Yiwei Jiang and   
                 Zewei Weng and   
                    Jueliang Hu   Algorithms with Limited Number of
                                  Preemptions for Scheduling on Parallel
                                  Machines . . . . . . . . . . . . . . . . 93--104
              Danny Z. Chen and   
                Xiaomin Liu and   
                    Haitao Wang   Computing Maximum Non-crossing Matching
                                  in Convex Bipartite Graphs . . . . . . . 105--116
         Kazuhide Nishikawa and   
                Takao Nishizeki   Algorithms for Bandwidth Consecutive
                                  Multicolorings of Graphs . . . . . . . . 117--128
                    Yu Song and   
                   Tian Liu and   
                          Ke Xu   Independent Domination on Tree Convex
                                  Bipartite Graphs . . . . . . . . . . . . 129--138
                   Deshi Ye and   
                       Lili Mei   On-Line Scheduling of Parallel Jobs in
                                  Heterogeneous Multiple Clusters  . . . . 139--148
           Evripidis Bampis and   
              Dimitrios Letsios   On Multiprocessor Temperature-Aware
                                  Scheduling Problems  . . . . . . . . . . 149--160
                    Yan Lan and   
                   Xin Chen and   
                  Ning Ding and   
        György Dósa   Online Minimum Makespan Scheduling with
                                  a Buffer . . . . . . . . . . . . . . . . 161--171
             Richard Beigel and   
                         Bin Fu   A Dense Hierarchy of Sublinear Time
                                  Approximation Schemes for Bin Packing    172--181
                         Bin Fu   Multivariate Polynomial Integration and
                                  Differentiation Are Polynomial Time
                                  Inapproximable Unless P=NP . . . . . . . 182--191
                 Bangsheng Tang   Some Remarks on the Incompressibility of
                                  Width-Parameterized SAT Instances  . . . 192--198
                Jianer Chen and   
             Henning Fernau and   
                     Peter Shaw   Kernels for Packing and Covering
                                  Problems . . . . . . . . . . . . . . . . 199--211
               Junping Zhou and   
                    Minghao Yin   The Worst-Case Upper Bound for Exact
                                  $3$-Satisfiability with the Number of
                                  Clauses as the Parameter . . . . . . . . 212--223
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7286, 2012

               Dmytro Babik and   
            Lakshmi S. Iyer and   
                   Eric W. Ford   Towards a Comprehensive Online Peer
                                  Assessment System  . . . . . . . . . . . 1--8
         Anders Hjalmarsson and   
                 Daniel Rudmark   Designing Digital Innovation Contests    9--27
                  Bala Iyer and   
                   George Wyner   Evaluating APIs: a Call for Design
                                  Science Research . . . . . . . . . . . . 28--35
         Arvind Karunakaran and   
                  Sandeep Purao   Designing for Recombination: Process
                                  Design through Template Combination  . . 36--51
            Heikki Lempinen and   
                Matti Rossi and   
      Virpi Kristiina Tuunainen   Design Principles for
                                  Inter-Organizational Systems Development
                                  --- Case Hansel  . . . . . . . . . . . . 52--65
            Lysanne Lessard and   
                        Eric Yu   Using Design Science Research to Develop
                                  a Modeling Technique for Service Design  66--77
               Amy Van Looy and   
             Manu De Backer and   
                    Geert Poels   Towards a Decision Tool for Choosing a
                                  Business Process Maturity Model  . . . . 78--87
                Wendy Lucas and   
                 Tamara Babaian   Implementing Design Principles for
                                  Collaborative ERP Systems  . . . . . . . 88--107
               Martin Meyer and   
             Markus Helfert and   
            Brian Donnellan and   
                  Jim Kenneally   Applying Design Science Research for
                                  Enterprise Architecture Business Value
                                  Assessments  . . . . . . . . . . . . . . 108--121
              Sandeep Purao and   
          Narasimha Bolloju and   
                  Chuan Hoo Tan   Designing-in-the-Large: Combining Local
                                  Perspectives to Generate Enterprise-Wide
                                  Integration Solutions  . . . . . . . . . 122--138
              Rohit Valecha and   
                Raj Sharman and   
                 Raghav Rao and   
              Shambhu Upadhyaya   Emergency Response System Design: An
                                  Examination of Emergency Communication
                                  Messages . . . . . . . . . . . . . . . . 139--146
                 Upkar Varshney   An Approach for Smart Artifacts for
                                  Mobile Advertising . . . . . . . . . . . 147--151
             Matthias Voigt and   
        Björn Niehaves and   
               Jörg Becker   Towards a Unified Design Theory for
                                  Creativity Support Systems . . . . . . . 152--173
                M. Lisa Yeo and   
                     Ofer Arazy   What Makes Corporate Wikis Work? Wiki
                                  Affordances and Their Suitability for
                                  Corporate Knowledge Work . . . . . . . . 174--190
              Andreas Drechsler   Design Science as Design of Social
                                  Systems --- Implications for Information
                                  Systems Research . . . . . . . . . . . . 191--205
             Wolfgang Maass and   
                  Sabine Janzen   Towards Design Engineering of Ubiquitous
                                  Information Systems  . . . . . . . . . . 206--219
              Roel Wieringa and   
           Ay\cse Moralì   Technical Action Research as a
                                  Validation Method in Information Systems
                                  Design Science . . . . . . . . . . . . . 220--238
                 Arjan Knol and   
                   Henk Sol and   
              Johan van Wamelen   Decision Enhancement for Sourcing with
                                  Shared Service Centres in the Dutch
                                  Government . . . . . . . . . . . . . . . 239--255
             Jan Pries-Heje and   
                Lene Pries-Heje   Designing a Framework for Virtual
                                  Management and Team Building . . . . . . 256--270
  António Rito Silva and   
               Michael Rosemann   Integrating Organisational Design with
                                  IT Design  . . . . . . . . . . . . . . . 271--286
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7287, 2012

                  John Hopcroft   On the Impact of Turing Machines . . . . 1--2
                S. Barry Cooper   From Turing Machine to Morphogenesis:
                                  Forming and Informing Computation  . . . 3--10
                Richard M. Karp   Theory of Computation as an Enabling
                                  Tool for the Sciences  . . . . . . . . . 11--11
                    Deyi Li and   
                    Liwei Huang   Interaction and Collective Intelligence
                                  on the Internet  . . . . . . . . . . . . 12--22
                 Butler Lampson   What Computers Do: Model, Connect,
                                  Engage . . . . . . . . . . . . . . . . . 23--26
                         Wei Li   R-Calculus: a Logical Inference System
                                  for Scientific Discovery . . . . . . . . 27--27
            Andrew Chi-Chih Yao   Quantum Computing: a Great Science in
                                  the Making . . . . . . . . . . . . . . . 28--28
                  Jon Kleinberg   The Convergence of Social and
                                  Technological Networks . . . . . . . . . 29--29
                    Yicheng Pan   Principles of Network Computing  . . . . 30--39
                       Pan Peng   The Small Community Phenomenon in
                                  Networks: Models, Algorithms and
                                  Applications . . . . . . . . . . . . . . 40--49
                  A. Bonato and   
                 D. Mitsche and   
                     P. Pra\lat   Vertex-Pursuit in Hierarchical Social
                                  Networks . . . . . . . . . . . . . . . . 50--60
               Zipeng Zhang and   
                 Xinyu Feng and   
                    Ming Fu and   
                 Zhong Shao and   
                        Yong Li   A Structural Approach to Prophecy
                                  Variables  . . . . . . . . . . . . . . . 61--71
               Shuling Wang and   
                Naijun Zhan and   
                 Dimitar Guelev   An Assume/Guarantee Based Compositional
                                  Calculus for Hybrid CSP  . . . . . . . . 72--83
     Ernst-Rüdiger Olderog   Automatic Verification of Real-Time
                                  Systems with Rich Data: An Overview  . . 84--93
                   Deepak Kapur   Program Analysis Using
                                  Quantifier-Elimination Heuristics  . . . 94--108
         Albert F. Lawrence and   
       Séastien Phan and   
                  Mark Ellisman   Electron Tomography and Multiscale
                                  Biology  . . . . . . . . . . . . . . . . 109--130
                   Hiro Ito and   
           Susumu Kiyoshima and   
                 Yuichi Yoshida   Constant-Time Approximation Algorithms
                                  for the Knapsack Problem . . . . . . . . 131--142
                 Jingguo Bi and   
                       Qi Cheng   Lower Bounds of Shortest Vector Lengths
                                  in Random NTRU Lattices  . . . . . . . . 143--155
      Michal \vCerný and   
                  Miroslav Rada   Polynomial Time Construction of
                                  Ellipsoidal Approximations of Zonotopes
                                  Given by Generator Descriptions  . . . . 156--163
             Alexandru Popa and   
        Prudence W. H. Wong and   
              Fencol C. C. Yung   Hardness and Approximation of the
                                  Asynchronous Border Minimization Problem 164--176
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7288, 2012

                Paola Flocchini   Distributed Algorithms by Forgetful
                                  Mobile Robots  . . . . . . . . . . . . . 1--1
              Giuseppe Persiano   Stability and Metastability of the Logit
                                  Dynamics of Strategic Games  . . . . . . 2--2
                  Jorge Urrutia   Art Galleries, $k$-modems, and
                                  $k$-convexity  . . . . . . . . . . . . . 3--3
             Terry Anderson and   
                  Therese Biedl   The Vulcan Game of Kal-Toh: Finding or
                                  Making Triconnected Planar Subgraphs . . 4--15
            Esther M. Arkin and   
                 Alon Efrat and   
                George Hart and   
               Irina Kostitsyna   Scandinavian Thins on Top of Cake: On
                                  the Smallest One-Size-Fits-All Box . . . 16--27
          Michael A. Bender and   
                Ritwik Bose and   
           Rezaul Chowdhury and   
                Samuel McCauley   The Kissing Problem: How to End a
                                  Gathering When Everyone Kisses Everyone
                                  Else Goodbye . . . . . . . . . . . . . . 28--39
           Till Bruckdorfer and   
               Michael Kaufmann   Mad at Edge Crossings? Break the Edges!  40--50
             Leo Brueggeman and   
            Michael Fellows and   
           Rudolf Fleischer and   
                 Martin Lackner   Train Marshalling Is Fixed Parameter
                                  Tractable  . . . . . . . . . . . . . . . 51--56
               Sarah Cannon and   
           Mashhood Ishaque and   
           Csaba D. Tóth   Conflict-Free Graph Orientations with
                                  Parity Constraints . . . . . . . . . . . 57--68
            Ferdinando Cicalese   The Multi-interval Ulam--Rényi Game . . . 69--80
            Erik D. Demaine and   
          Martin L. Demaine and   
                 Yair N. Minsky   Picture-Hanging Puzzles  . . . . . . . . 81--93
              Stefan Dobrev and   
             Lata Narayanan and   
               Jaroslav Opatrny   Optimal Sensor Networks for Area
                                  Monitoring Using Rotating and Beam
                                  Sensors  . . . . . . . . . . . . . . . . 94--106
                Swan Dubois and   
   Sébastien Tixeuil and   
                       Nini Zhu   The Byzantine Brides Problem . . . . . . 107--118
                Amr Elmasry and   
               Jyrki Katajainen   Lean Programs, Branch Mispredictions,
                                  and Sorting  . . . . . . . . . . . . . . 119--130
                Jakob Engel and   
              Markus Holzer and   
               Oliver Ruepp and   
                   Frank Sehnke   On Computer Integrated Rationalized
                                  Crossword Puzzle Manufacturing . . . . . 131--141
                 David Eppstein   Solving Single-Digit Sudoku Subproblems  142--153
            Paola Flocchini and   
            Matthew Kellett and   
             Peter C. Mason and   
                 Nicola Santoro   Finding Good Coffee in Paris . . . . . . 154--165
             Fedor V. Fomin and   
Frédéric Giroire and   
           Alain Jean-Marie and   
                Dorian Mazauric   To Satisfy Impatient Web Surfers Is Hard 166--176
             Fedor V. Fomin and   
            Pinar Heggernes and   
           Erik Jan van Leeuwen   Making Life Easier for Firefighters  . . 177--188
              Martin Fürer   Counting Perfect Matchings in Graphs of
                                  Degree 3 . . . . . . . . . . . . . . . . 189--197
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7289, 2012

               HyunYong Lee and   
                  Akihiro Nakao   Efficient User-Assisted Content
                                  Distribution over Information-Centric
                                  Network  . . . . . . . . . . . . . . . . 1--12
   Konstantinos V. Katsaros and   
               Nikos Fotiou and   
          Xenofon Vasilakos and   
      Christopher N. Ververidis   On Inter-Domain Name Resolution for
                                  Information-Centric Networks . . . . . . 13--26
             Wei Koong Chai and   
                 Diliang He and   
             Ioannis Psaras and   
                  George Pavlou   Cache ``Less for More'' in
                                  Information-Centric Networks . . . . . . 27--40
                   Shuo Guo and   
                Haiyong Xie and   
                    Guangyu Shi   Collaborative Forwarding and Caching in
                                  Content Centric Networks . . . . . . . . 41--55
              Norbert Blenn and   
            Christian Doerr and   
             Bas Van Kester and   
               Piet Van Mieghem   Crawling and Detecting Community
                                  Structure in Online Social Networks
                                  Using Local Information  . . . . . . . . 56--67
                  Jin Jiang and   
             Claudio E. Casetti   Distributed Content Backup and Sharing
                                  Using Social Information . . . . . . . . 68--81
       Nuno Apolónia and   
             Paulo Ferreira and   
              Luís Veiga   Trans-Social Networks for Distributed
                                  Processing . . . . . . . . . . . . . . . 82--96
              Norbert Blenn and   
    Kassandra Charalampidou and   
                Christian Doerr   Context-Sensitive Sentiment
                                  Classification of Short Colloquial Text  97--108
     Marcelo F. Vasconcelos and   
              Ronaldo M. Salles   Resilience in Computer Network
                                  Management . . . . . . . . . . . . . . . 109--120
          Béla Genge and   
             Christos Siaterlis   An Experimental Study on the Impact of
                                  Network Segmentation to the Resilience
                                  of Physical Processes  . . . . . . . . . 121--134
              Udi Ben-Porat and   
          Anat Bremler-Barr and   
                Hanoch Levy and   
              Bernhard Plattner   On the Vulnerability of Hardware Hash
                                  Tables to Sophisticated Attacks  . . . . 135--148
                    Cong Li and   
               Huijuan Wang and   
               Piet Van Mieghem   Degree and Principal Eigenvectors in
                                  Complex Networks . . . . . . . . . . . . 149--160
           Isil Burcu Barla and   
         Dominic A. Schupke and   
                    Georg Carle   Resilient Virtual Network Design for
                                  End-to-End Cloud Services  . . . . . . . 161--174
              Nico Janssens and   
                   Xueli An and   
                Koen Daenen and   
              Claudio Forlivesi   Dynamic Scaling of Call-Stateful SIP
                                  Services in the Cloud  . . . . . . . . . 175--189
                 Vijay Mann and   
             Akanksha Gupta and   
               Partha Dutta and   
          Anilkumar Vishnoi and   
         Parantapa Bhattacharya   Remedy: Network-Aware Steady State VM
                                  Management for Data Centers  . . . . . . 190--204
                 Junjie Liu and   
                 Yingke Xie and   
                Gaogang Xie and   
                 Layong Luo and   
               Fuxing Zhang and   
                    Xiaolong Wu   Building a Flexible and Scalable Virtual
                                  Hardware Data Plane  . . . . . . . . . . 205--216
               Hung Quoc Vo and   
                 Olav Lysne and   
                 Amund Kvalbein   Permutation Routing for Increased
                                  Robustness in IP Networks  . . . . . . . 217--231
                  Meng Shen and   
               Hongying Liu and   
                      Ke Xu and   
                  Ning Wang and   
                   Yifeng Zhong   Routing On Demand: Toward the
                                  Energy-Aware Traffic Engineering with
                                  OSPF . . . . . . . . . . . . . . . . . . 232--246
Frédéric Giroire and   
           Joanna Moulierac and   
           Truong Khoa Phan and   
 Frédéric Roudaut   Minimization of Network Power
                                  Consumption with Redundancy Elimination  247--258
                 Yang Xiang and   
              Zhiliang Wang and   
                Jianping Wu and   
                Xingang Shi and   
                        Xia Yin   Sign What You Really Care about ---
                                  Secure BGP AS Paths Efficiently  . . . . 259--273
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7290, 2012

        Julius Rückert and   
               Osama Abboud and   
              Thomas Zinner and   
             Ralf Steinmetz and   
                 David Hausheer   Quality Adaptation in P2P Video
                                  Streaming Based on Objective QoE Metrics 1--14
             Fabio V. Hecht and   
               Thomas Bocek and   
Flávio Roberto Santos and   
               Burkhard Stiller   Playback Policies for Live and On-Demand
                                  P2P Video Streaming  . . . . . . . . . . 15--28
            Roberto Roverso and   
            Sameh El-Ansary and   
                    Seif Haridi   SmoothCache: HTTP-Live Streaming Goes
                                  Peer-to-Peer . . . . . . . . . . . . . . 29--43
                K.-W. Hwang and   
               D. Applegate and   
                  A. Archer and   
          V. Gopalakrishnan and   
                     S. Lee and   
                       V. Misra   Leveraging Video Viewing Patterns for
                                  Optimal Content Placement  . . . . . . . 44--58
               Haiyang Wang and   
                  Feng Wang and   
             Jiangchuan Liu and   
                          Ke Xu   Enhancing Traffic Locality in BitTorrent
                                  via Shared Trackers  . . . . . . . . . . 59--70
                  Yong Zhao and   
               Zhibin Zhang and   
                    Ting He and   
                Alex X. Liu and   
                     Li Guo and   
                   Binxing Fang   A Task-Based Model for the Lifespan of
                                  Peer-to-Peer Swarms  . . . . . . . . . . 71--83
Glauber D. Gonçalves and   
      Anna Guimarães and   
         Alex Borges Vieira and   
             Ítalo Cunha   Using Centrality Metrics to Predict Peer
                                  Cooperation in Live Streaming
                                  Applications . . . . . . . . . . . . . . 84--96
               Seungbae Kim and   
               Jinyoung Han and   
             Taejoong Chung and   
              Hyun-chul Kim and   
         Ted ``Taekyoung'' Kwon   Content Publishing and Downloading
                                  Practice in BitTorrent . . . . . . . . . 97--110
              Jakub Mikians and   
            Amogh Dhamdhere and   
       Constantine Dovrolis and   
                Pere Barlet-Ros   Towards a Statistical Characterization
                                  of the Interdomain Traffic Matrix  . . . 111--123
                 Yujing Liu and   
                  Xiapu Luo and   
          Rocky K. C. Chang and   
                      Jinshu Su   Characterizing Inter-domain Rerouting
                                  after Japan Earthquake . . . . . . . . . 124--135
            Amogh Dhamdhere and   
        Himalatha Cherukuru and   
       Constantine Dovrolis and   
                      Kc Claffy   Measuring the Evolution of Internet
                                  Peering Agreements . . . . . . . . . . . 136--148
                 Syed Hasan and   
                Sergey Gorinsky   Obscure Giants: Detecting the
                                  Provider-Free ASes . . . . . . . . . . . 149--160
              Stefan Hommes and   
                 Radu State and   
                   Thomas Engel   Detecting Stealthy Backdoors with
                                  Association Rule Mining  . . . . . . . . 161--171
                Zichao Yang and   
                 John C. S. Lui   Security Adoption in Heterogeneous
                                  Networks: the Influence of
                                  Cyber-Insurance Market . . . . . . . . . 172--183
         Yves Igor Jerschow and   
                   Martin Mauve   Secure Client Puzzles Based on Random
                                  Beacons  . . . . . . . . . . . . . . . . 184--197
           Mentari Djatmiko and   
             Mathieu Cunche and   
             Roksana Boreli and   
              Aruna Seneviratne   Heterogeneous Secure Multi-Party
                                  Computation  . . . . . . . . . . . . . . 198--210
       Tania Jiménez and   
             Yezekael Hayel and   
                   Eitan Altman   Competition in Access to Content . . . . 211--222
                 Raul Landa and   
            Eleni Mykoniati and   
           Richard G. Clegg and   
              David Griffin and   
                     Miguel Rio   Modelling the Tradeoffs in Overlay-ISP
                                  Cooperation  . . . . . . . . . . . . . . 223--237
             Dimitra Gkorou and   
  Tamás Vinkó and   
              Nitin Chiluka and   
             Johan Pouwelse and   
                     Dick Epema   Reducing the History in Decentralized
                                  Interaction-Based Reputation Systems . . 238--251
               Isabel Amigo and   
            Pablo Belzarena and   
                 Sandrine Vaton   On the Problem of Revenue Sharing in
                                  Multi-domain Federations . . . . . . . . 252--264
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7291, 2012

               Huaizhou Shi and   
       R. Venkatesha Prasad and   
               Vijay S. Rao and   
         I. G. M. M. Niemegeers   A Fairness Model for Resource Allocation
                                  in Wireless Networks . . . . . . . . . . 1--9
       Vincenzo Ciancaglini and   
              Luigi Liquori and   
            Giang Ngo Hoang and   
             Petar Maksimovi\'c   An Extension and Cooperation Mechanism
                                  for Heterogeneous Overlay Networks . . . 10--18
                  Yong Xiao and   
                Luiz A. DaSilva   Dynamic Pricing Coalitional Game for
                                  Cognitive Radio Networks . . . . . . . . 19--26
              Dario Sabella and   
              Marco Caretti and   
          William Tomaselli and   
          Valerio Palestini and   
            Bruno Cendón   Evaluation of ON-OFF Schemes and Linear
                                  Prediction Methods for Increasing Energy
                                  Efficiency in Mobile Broadband Networks  27--34
Javier Martín-Hernández and   
            Christian Doerr and   
          Johannes Lessmann and   
           Marcus Schöller   Challenge-Aware Traffic Protection in
                                  Wireless Mobile Backhaul Networks  . . . 35--42
           Mohtasim Abbassi and   
               Shahbaz Khan and   
                      M. Rahman   A Distributed Signaling Fast Mobile IPv6
                                  Scheme for Next Generation Heterogeneous
                                  IP Networks  . . . . . . . . . . . . . . 43--51
    António Serrador and   
         Luís M. Correia   Energy Efficiency Gains Using VHOs in
                                  Heterogeneous Networks . . . . . . . . . 52--62
             Xavier Misseri and   
              Ivan Gojmerac and   
             Jean-Louis Rougier   Inter-Domain Route Diversity for the
                                  Internet . . . . . . . . . . . . . . . . 63--71
                 Antonio Ghezzi   A Proposal of Business Model Design
                                  Parameters for Future Internet Carriers  72--79
      Mohamed Lamine Lamali and   
            Dominique Barth and   
                  Johanne Cohen   Reputation-Aware Learning for SLA
                                  Negotiation  . . . . . . . . . . . . . . 80--88
              Andreas Sackl and   
             Patrick Zwickl and   
                   Peter Reichl   From Quality of Experience to
                                  Willingness to Pay for Interconnection
                                  Service Quality  . . . . . . . . . . . . 89--96
             Patrick Zwickl and   
                   Peter Reichl   An Instance-Based Approach for the
                                  Quantitative Assessment of Key Value
                                  Network Dependencies . . . . . . . . . . 97--104
                 Anand Raju and   
Vânia Gonçalves and   
              Sven Lindmark and   
                  Pieter Ballon   Evaluating Impacts of Oversubscription
                                  on Future Internet Business Models . . . 105--112
           Eleni Agiatzidou and   
        Costas Courcoubetis and   
             Olivier Dugeon and   
             Finn-Tore Johansen   Inter-domain Coordination Models . . . . 113--120
                   Eitan Altman   In Which Content to Specialize? A Game
                                  Theoretic Analysis . . . . . . . . . . . 121--125
                Till Wollenberg   Estimation of Expectable Network Quality
                                  in Wireless Mesh Networks  . . . . . . . 126--132
                 Ondrej Krejcar   Development of Localization Module for
                                  Various Smart Devices Platforms  . . . . 133--138
              Marek Dvorsky and   
             Libor Michalek and   
              Pavel Moravec and   
                  Roman Sebesta   Improved GSM-Based Localization by
                                  Incorporating Secondary Network
                                  Characteristics  . . . . . . . . . . . . 139--144
               Ivan Zelinka and   
            Donald Davendra and   
               Lenka Skanderova   Visualization of Complex Networks
                                  Dynamics: Case Study . . . . . . . . . . 145--150
               Hakan Kavlak and   
                      Hakki Ilk   PCI Planning Strategies for Long Term
                                  Evolution Networks . . . . . . . . . . . 151--156
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7292, 2012

            Isra Al-Turaiki and   
                 Ghada Badr and   
                Hassan Mathkour   Trie-based Apriori Motif Discovery
                                  Approach . . . . . . . . . . . . . . . . 1--12
            Laurent Bulteau and   
                  Minghui Jiang   Inapproximability of (1,2)-Exemplar
                                  Distance . . . . . . . . . . . . . . . . 13--23
          Daniele Catanzaro and   
           Martine Labbé   A Mixed Integer Programming Model for
                                  the Parsimonious Loss of Heterozygosity
                                  Problem  . . . . . . . . . . . . . . . . 24--35
                    Xi Chen and   
                  Chen Wang and   
             Ayesha N. Shajahan   Reconstruction of Transcription
                                  Regulatory Networks by Stability-Based
                                  Network Component Analysis . . . . . . . 36--47
            Yann Christinat and   
            Bernard M. E. Moret   A Transcript Perspective on Evolution    48--59
            Ralph W. Crosby and   
            Tiffani L. Williams   A Fast Algorithm for Computing the
                                  Quartet Distance for Large Sets of
                                  Evolutionary Trees . . . . . . . . . . . 60--71
            Peter Damaschke and   
                 Leonid Molokov   Error Propagation in Sparse Linear
                                  Systems with Peptide-Protein Incidence
                                  Matrices . . . . . . . . . . . . . . . . 72--83
               Bhaskar DasGupta   Models and Algorithmic Tools for
                                  Computational Processes in Cellular
                                  Biology: Recent Developments and Future
                                  Directions . . . . . . . . . . . . . . . 84--86
              Akshay Deepak and   
                  Jianrong Dong   Identifying Rogue Taxa through Reduced
                                  Consensus: NP-Hardness and Exact
                                  Algorithms . . . . . . . . . . . . . . . 87--98
               Cynthia J. Gibas   Analytics Approaches for the Era of
                                  10,000* Genomes *and Counting  . . . . . 99--101
      Pawe\l Górecki and   
             J. Gordon Burleigh   GTP Supertrees from Unrooted Gene Trees:
                                  Linear Time Algorithms for NNI Based
                                  Local Searches . . . . . . . . . . . . . 102--114
      Pawe\l Górecki and   
              Oliver Eulenstein   A Robinson--Foulds Measure to Compare
                                  Unrooted Trees with Rooted Trees . . . . 115--126
                    Fei Guo and   
             Shuai Cheng Li and   
                   Lusheng Wang   P-Binder: a System for the
                                  Protein-Protein Binding Sites
                                  Identification . . . . . . . . . . . . . 127--138
             Bonnie Kirkpatrick   Non-identifiable Pedigrees and a
                                  Bayesian Solution  . . . . . . . . . . . 139--152
                  Juntao Li and   
                  Kwok Pui Choi   Iterative Piecewise Linear Regression to
                                  Accurately Assess Statistical
                                  Significance in Batch Confounded
                                  Differential Expression Analysis . . . . 153--164
                      Si Li and   
              Kwok Pui Choi and   
                 Taoyang Wu and   
                   Louxin Zhang   Reconstruction of Network Evolutionary
                                  History from Extant Network Topology and
                                  Duplication History  . . . . . . . . . . 165--176
           Victor Missirian and   
             Isabelle Henry and   
                     Luca Comai   POPE: Pipeline of Parentally-Biased
                                  Expression . . . . . . . . . . . . . . . 177--188
 Ji\vrí Novák and   
               David Hoksza and   
                  Jakub Loko\vc   On Optimizing the Non-metric Similarity
                                  Search in Tandem Mass Spectra by
                                  Clustering . . . . . . . . . . . . . . . 189--200
         A\"\ida Ouangraoua and   
             Krister M. Swenson   On the Comparison of Sets of Alternative
                                  Transcripts  . . . . . . . . . . . . . . 201--212
             Hyun Jung Park and   
                   Luay Nakhleh   MURPAR: a Fast Heuristic for Inferring
                                  Parsimonious Phylogenetic Networks from
                                  Multiple Gene Trees  . . . . . . . . . . 213--224
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7294, 2012

                 Michael Codish   Programming with Boolean Satisfaction    1--1
                Tachio Terauchi   Automated Verification of Higher-Order
                                  Functional Programs  . . . . . . . . . . 2--2
              Stephanie Weirich   Dependently-Typed Programming in GHC . . 3--3
        Beniamino Accattoli and   
                   Luca Paolini   Call-by-Value Solvability, Revisited . . 4--16
               Sergio Antoy and   
                  Arthur Peters   Compiling a Functional Logic Language:
                                  The Basic Scheme . . . . . . . . . . . . 17--31
             Zena M. Ariola and   
                Paul Downen and   
                  Hugo Herbelin   Classical Call-by-Need Sequent Calculi:
                                  The Unity of Semantic Artifacts  . . . . 32--46
          Dariusz Biernacki and   
             Sergue\"\i Lenglet   Normal Form Bisimulations for
                                  Delimited-Control Operators  . . . . . . 47--61
                   Gerlof Bouma   Real-Time Persistent Queues and Deques
                                  with Logic Variables (Declarative Pearl) 62--72
           Rafael Caballero and   
     Yolanda García-Ruiz   Declarative Debugging of Wrong and
                                  Missing Answers for SQL Views  . . . . . 73--87
 Ignacio Castiñeiras and   
Fernando Sáenz-Pérez   Improving the Performance of FD
                                  Constraint Solving in a CFLP System  . . 88--103
Pablo Chico de Guzmán and   
                   Manuel Carro   A General Implementation Framework for
                                  Tabled CLP . . . . . . . . . . . . . . . 104--119
Sonia Estévez-Martín and   
Jesús Correas Fernández   Extending the $\mathcal{TOY}$ System
                                  with the ECL$^i$PS$^e$ Solver over Sets
                                  of Integers  . . . . . . . . . . . . . . 120--135
                  Makoto Hamana   Correct Looping Arrows from Cyclic Terms 136--150
                   Yoichi Hirai   A Lambda Calculus for Gödel--Dummett
                                  Logic Capturing Waitfreedom  . . . . . . 151--165
                  Oleg Kiselyov   Iteratees  . . . . . . . . . . . . . . . 166--181
               Jael Kriener and   
                      Andy King   Mutual Exclusion by Interpolation  . . . 182--196
                  Oleg Lobachev   Parallel Computation Skeletons with
                                  Premature Termination Property . . . . . 197--212
               Akimasa Morihata   Calculational Developments of New
                                  Parallel Algorithms for Size-Constrained
                                  Maximum-Sum Segment Problems . . . . . . 213--227
         Kristoffer H. Rose and   
             Lionel Villard and   
                     Naoto Sato   A Data Flow Language for Hybrid Query
                                  and Programming Languages  . . . . . . . 228--242
             Neda Saeedloei and   
                    Gopal Gupta   Coinductive Constraint Logic Programming 243--259
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7295, 2012

              Abraham Bernstein   Semantic Web/LD at a Crossroads: Into
                                  the Garbage Can or To Theory?  . . . . . 1--1
           Jeroen van Grondelle   New Audiences for Ontologies: Dealing
                                  with Complexity in Business Processes    2--2
                    Alon Halevy   Bringing (Web) Databases to the Masses   3--3
              Aleksander Ko\lcz   Large Scale Learning at Twitter  . . . . 4--4
                  Monica S. Lam   Musubi: a Decentralized Mobile Social
                                  Web  . . . . . . . . . . . . . . . . . . 5--5
   Márta Nagy-Rothengass   Data Value Chain in Europe . . . . . . . 6--6
             Julius van de Laar   Cutting through the Noise: How to Shape
                                  Public Perception, Frame the Debate and
                                  Effectively Engage Your Audience in the
                                  Digital Age  . . . . . . . . . . . . . . 7--7
                    Olaf Hartig   SPARQL for a Web of Linked Data:
                                  Semantics and Computability  . . . . . . 8--23
         Danica Damljanovic and   
            Milan Stankovic and   
               Philippe Laublet   Linked Data-Based Concept
                                  Recommendation: Comparison of Different
                                  Methods in Open Innovation Scenario  . . 24--38
            Milan Stankovic and   
               Matthew Rowe and   
               Philippe Laublet   Finding Co-solvers on Twitter, with a
                                  Little Help from Linked Data . . . . . . 39--55
             Andreas Wagner and   
             Thanh Tran Duc and   
         Günter Ladwig and   
              Andreas Harth and   
                    Rudi Studer   Top- k Linked Data Query Processing  . . 56--71
               Audun Stolpe and   
     Martin G. Skjæveland   Preserving Information Content in RDF
                                  Using Bounded Homomorphisms  . . . . . . 72--86
   Christophe Guéret and   
                 Paul Groth and   
              Claus Stadler and   
                   Jens Lehmann   Assessing Linked Data Mappings Using
                                  Network Measures . . . . . . . . . . . . 87--102
                 Melike Sah and   
                   Vincent Wade   A Novel Concept-Based Search for the Web
                                  of Data Using UMBEL and a Fuzzy
                                  Retrieval Model  . . . . . . . . . . . . 103--118
             Andriy Nikolov and   
            Mathieu d'Aquin and   
                   Enrico Motta   Unsupervised Learning of Link Discovery
                                  Configuration  . . . . . . . . . . . . . 119--133
             Uta Lösch and   
          Stephan Bloehdorn and   
                Achim Rettinger   Graph Kernels for RDF Data . . . . . . . 134--148
  Axel-Cyrille Ngonga Ngomo and   
                     Klaus Lyko   EAGLE: Efficient Active Learning of Link
                                  Specifications Using Genetic Programming 149--163
               Xueyan Jiang and   
                   Yi Huang and   
          Maximilian Nickel and   
                   Volker Tresp   Combining Information Extraction,
                                  Deductive Reasoning and Machine Learning
                                  for Relation Prediction  . . . . . . . . 164--178
             Isabel F. Cruz and   
            Alessio Fabiani and   
             Federico Caimi and   
               Cosmin Stroe and   
               Matteo Palmonari   Automatic Configuration Selection Using
                                  Ontology Matching Task Profiling . . . . 179--194
             Emilio Rubiera and   
                  Luis Polo and   
             Diego Berrueta and   
                  Adil El Ghali   TELIX: An RDF-Based Model for Linguistic
                                  Annotation . . . . . . . . . . . . . . . 195--209
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7296, 2012

    Thepparit Banditwattanawong   From Web Cache to Cloud Cache  . . . . . 1--15
              Jianzong Wang and   
                Yanjun Chen and   
               Daniel Gmach and   
             Changsheng Xie and   
                Jiguang Wan and   
                        Rui Hua   pCloud: An Adaptive I/O Resource
                                  Allocation Algorithm with Revenue
                                  Consideration over Public Clouds . . . . 16--30
               JongBeom Lim and   
            Kwang-Sik Chung and   
               Sung-Ho Chin and   
                  Heon-Chang Yu   A Gossip-Based Mutual Exclusion
                                  Algorithm for Cloud Environments . . . . 31--45
                Zhuoran Qin and   
               Jixian Zhang and   
                   Xuejie Zhang   An Effective Partition Approach for
                                  Elastic Application Development on
                                  Mobile Cloud Computing . . . . . . . . . 46--53
                    Li Ruan and   
              Huixiang Wang and   
                 Limin Xiao and   
                 Mingfa Zhu and   
                       Feibo Li   Memory Virtualization for MIPS Processor
                                  Based Cloud Server . . . . . . . . . . . 54--63
             Chao-Tung Yang and   
             Wen-Chung Shih and   
                 Chih-Lin Huang   Implementation of a Distributed Data
                                  Storage System with Resource Monitoring
                                  on Cloud Computing . . . . . . . . . . . 64--73
                Leila Abidi and   
    Christophe Cérin and   
                      Kais Klai   Design, Verification and Prototyping the
                                  Next Generation of Desktop Grid
                                  Middleware . . . . . . . . . . . . . . . 74--88
                  Pingli Gu and   
               Yanlei Shang and   
              Junliang Chen and   
                   Bo Cheng and   
                      Yan Jiang   A Request Multiplexing Method Based on
                                  Multiple Tenants in SaaS . . . . . . . . 89--97
      Vishnuvardhan Mannava and   
                      T. Ramesh   An Adaptive Design Pattern for Genetic
                                  Algorithm-Based Composition of Web
                                  Services in Autonomic Computing Systems
                                  Using SOA  . . . . . . . . . . . . . . . 98--108
                 Weisen Pan and   
               Shizhan Chen and   
                   Zhiyong Feng   Service-Oriented Ontology and Its
                                  Evolution  . . . . . . . . . . . . . . . 109--121
                Yunji Liang and   
               Xingshe Zhou and   
                  Zhiwen Yu and   
                    Bin Guo and   
                       Yue Yang   Energy Efficient Activity Recognition
                                  Based on Low Resolution Accelerometer in
                                  Smart Phones . . . . . . . . . . . . . . 122--136
                   Jian Cao and   
                   Yihua Wu and   
                      Minglu Li   Energy Efficient Allocation of Virtual
                                  Machines in Cloud Computing Environments
                                  Based on Demand Forecast . . . . . . . . 137--151
         Ashok Chandrasekar and   
       Karthik Chandrasekar and   
       Harini Ramasatagopan and   
             Rafica Abdul Rahim   Energy Conservative Mobile Cloud
                                  Infrastructure . . . . . . . . . . . . . 152--161
               Junghoon Lee and   
            Gyung-Leen Park and   
              Ho-Young Kwak and   
                    Jikwang Han   Power-Constrained Actuator Coordination
                                  for Agricultural Sensor Networks . . . . 162--171
                   Jennifer Kim   Design and Evaluation of Mobile
                                  Applications with Full and Partial
                                  Offloadings  . . . . . . . . . . . . . . 172--182
              Fu-Quan Zhang and   
                     Inwhee Joe   A Cross-Layer Scheme to Improve TCP
                                  Performance in Wireless Multi-hop
                                  Networks . . . . . . . . . . . . . . . . 183--197
                Jianxin Xue and   
                    Xiaoju Dong   A Fully Abstract View for Local Cause
                                  Semantics  . . . . . . . . . . . . . . . 198--209
             Jignesh Kakkad and   
            Nandan Parameswaran   Efficiency Considerations in Policy
                                  Based Management in Resource Constrained
                                  Devices  . . . . . . . . . . . . . . . . 210--220
                   Di Zheng and   
                   Jun Wang and   
                    Ke-rong Ben   Agent Based Quality Management
                                  Middleware for Context-Aware Pervasive
                                  Applications . . . . . . . . . . . . . . 221--230
                 Yabing Cui and   
                Chunming Hu and   
                  Tianyu Wo and   
                    Hanwen Wang   A Virtual File System for Streaming
                                  Loading of Virtual Software on Windows
                                  NT . . . . . . . . . . . . . . . . . . . 231--243
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7297, 2012

             Wan-Shiou Yang and   
                   Shi-Xin Weng   Application of the Ant Colony
                                  Optimization Algorithm to Competitive
                                  Viral Marketing  . . . . . . . . . . . . 1--8
          Nikolaos Pothitos and   
           George Kastrinis and   
       Panagiotis Stamatopoulos   Constraint Propagation as the Core of
                                  Local Search . . . . . . . . . . . . . . 9--16
             Ilianna Kollia and   
         Kostas Rapantzikos and   
             Giorgos Stamou and   
           Andreas Stafylopatis   Semantic Query Answering in Digital
                                  Libraries  . . . . . . . . . . . . . . . 17--24
          Spyridon Revithis and   
             Georgios Tagalakis   A SOM-Based Validation Approach to a
                                  Neural Circuit Theory of Autism  . . . . 25--32
      Vicky Panagiotopoulou and   
           Iraklis Varlamis and   
        Ion Androutsopoulos and   
             George Tsatsaronis   Word Sense Disambiguation as an Integer
                                  Linear Programming Problem . . . . . . . 33--40
           Yiannis Kokkinos and   
        Konstantinos Margaritis   Parallelism, Localization and Chain
                                  Gradient Tuning Combinations for Fast
                                  Scalable Probabilistic Neural Networks
                                  in Data Mining Applications  . . . . . . 41--48
            Emmanouil Rigas and   
         Georgios Meditskos and   
               Nick Bassiliades   SWRL2COOL: Object-Oriented
                                  Transformation of SWRL in the CLIPS
                                  Production Rule Engine . . . . . . . . . 49--56
          Elias Zouboulidis and   
             Sotiris Kotsiantis   Forecasting Fraudulent Financial
                                  Statements with Committee of
                                  Cost-Sensitive Decision Tree Classifiers 57--64
         Despina Deligianni and   
             Sotiris Kotsiantis   Forecasting Corporate Bankruptcy with an
                                  Ensemble of Classifiers  . . . . . . . . 65--72
         Grigorios Tzortzis and   
                Aristidis Likas   Greedy Unsupervised Multiple Kernel
                                  Learning . . . . . . . . . . . . . . . . 73--80
              Angelos Mimis and   
            Antonis Rovolis and   
               Marianthi Stamou   An AZP-ACO Method for Region-Building    81--89
      Vasileios Gavriilidis and   
               Anastasios Tefas   Exploiting Quadratic Mutual Information
                                  for Discriminant Analysis  . . . . . . . 90--97
            Dimitris Kalles and   
        Vassiliki Mperoukli and   
           Andreas Papandreadis   Emerge-Sort: Swarm Intelligence Sorting  98--105
Vassileios-Marios Anastassiou and   
  Panagiotis Diamantopoulos and   
                 Stavros Vassos   iThink: a Library for Classical Planning
                                  in Video-Games . . . . . . . . . . . . . 106--113
      George Giannakopoulos and   
       Vangelis Karkaletsis and   
               George A. Vouros   Detecting Human Features in Summaries
                                  --- Symbol Sequence Statistical
                                  Regularity . . . . . . . . . . . . . . . 114--123
            Vincenzo Lagani and   
        Ioannis Tsamardinos and   
            Sofia Triantafillou   Learning from Mixture of Experimental
                                  Data: a Constraint--Based Approach . . . 124--131
               George A. Vouros   Information Sharing and Searching via
                                  Collaborative Reinforcement Learning . . 132--140
    George M. Santipantakis and   
               George A. Vouros   Distributed Instance Retrieval in
                                  $E^{DDL}_{HQ^+} \mathcal{SHIQ}$
                                  Representation Framework . . . . . . . . 141--148
      Damianos Galanopoulos and   
      Christos Athanasiadis and   
               Anastasios Tefas   Evolutionary Optimization of a Neural
                                  Network Controller for Car Racing
                                  Simulation . . . . . . . . . . . . . . . 149--156
   Elpiniki I. Papageorgiou and   
       Panagiotis Oikonomou and   
                Arthi Kannappan   Bagged Nonlinear Hebbian Learning
                                  Algorithm for Fuzzy Cognitive Maps
                                  Working on Classification Tasks  . . . . 157--164
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7298, 2012

              Ignacio Araya and   
             Gilles Trombettoni   A Contractor Based on Convex Interval
                                  Taylor . . . . . . . . . . . . . . . . . 1--16
    Sébastien Bardin and   
                 Arnaud Gotlieb   \tt fdcc: a Combined Approach for
                                  Solving Constraints over Finite Domains
                                  and Arrays . . . . . . . . . . . . . . . 17--33
              David Bergman and   
                  Andre A. Cire   Variable Ordering for the Application of
                                  BDDs to the Maximum Independent Set
                                  Problem  . . . . . . . . . . . . . . . . 34--49
              David Bergman and   
                 John N. Hooker   Graph Coloring Facets from All-Different
                                  Systems  . . . . . . . . . . . . . . . . 50--65
       Jean-Charles Billaut and   
               Emmanuel Hebrard   Complete Characterization of
                                  Near-Optimal Sequences for the
                                  Two-Machine Flow Shop Scheduling Problem 66--80
          Alessio Bonfietti and   
               Michele Lombardi   Global Cyclic Cumulative Constraint  . . 81--96
          Hadrien Cambazard and   
                   Deepak Mehta   A Computational Geometry-Based Local
                                  Search Algorithm for Planar Location
                                  Problems . . . . . . . . . . . . . . . . 97--112
             Gilles Chabert and   
                Sophie Demassey   The Conjunction of Interval A mong
                                  Constraints  . . . . . . . . . . . . . . 113--128
              Andre A. Cire and   
                    Elvin Coban   Flow-Based Combinatorial Chance
                                  Constraints  . . . . . . . . . . . . . . 129--145
           Nicholas Downing and   
                  Thibaut Feydy   Explaining Flow-Based Propagation  . . . 146--162
           Tommy Färnqvist   Constraint Optimization Problems and
                                  Bounded Tree-Width Revisited . . . . . . 163--179
            Daniel Fontaine and   
                 Laurent Michel   A High Level Language for Solver
                                  Independent Model Manipulation and
                                  Generation of Hybrid Solvers . . . . . . 180--194
               Graeme Gange and   
               Peter J. Stuckey   Explaining Propagators for $s$-DNNF
                                  Circuits . . . . . . . . . . . . . . . . 195--210
               Stefan Heinz and   
            J. Christopher Beck   Reconsidering Mixed Integer Programming
                                  and MIP-Based Hybrids for Scheduling . . 211--227
             Laurent Michel and   
          Pascal Van Hentenryck   Activity-Based Search for Black-Box
                                  Constraint Programming Solvers . . . . . 228--243
              Yuri Malitsky and   
               Meinolf Sellmann   Instance-Specific Algorithm
                                  Configuration as a Method for
                                  Non-Model-Based Portfolio Generation . . 244--259
            Florence Massen and   
                   Yves Deville   Pheromone-Based Heuristic Column
                                  Generation for Vehicle Routing Problems
                                  with Black Box Feasibility . . . . . . . 260--274
              Renaud Masson and   
Fabien Lehuédé and   
           Olivier Péton   Simple Temporal Problems in Route
                                  Scheduling for the Dial-a-Ride Problem
                                  with Transfers . . . . . . . . . . . . . 275--291
            Quang Dung Pham and   
                   Yves Deville   Solving the Longest Simple Path Problem
                                  with Constraint-Based Techniques . . . . 292--306
        Aníbal Ponte and   
        Luís Paquete and   
        José R. Figueira   On Beam Search for Multicriteria
                                  Combinatorial Optimization Problems  . . 307--321
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7299, 2012

      Bhavani Thuraisingham and   
          Vaibhav Khadilkar and   
        Jyothsna Rachapalli and   
               Tyrone Cadenhead   Cloud-Centric Assured Information
                                  Sharing  . . . . . . . . . . . . . . . . 1--26
                Zahri Yunos and   
               Rabiah Ahmad and   
            Syahrir Mat Ali and   
          Solahuddin Shamsuddin   Illicit Activities and Terrorism in
                                  Cyberspace: An Exploratory Study in the
                                  Southeast Asian Region . . . . . . . . . 27--35
              Weiping Chang and   
               Yungchang Ku and   
                   Sinru Wu and   
                 Chaochang Chiu   CybercrimeIR --- a Technological
                                  Perspective to Fight Cybercrime  . . . . 36--44
                    Xin Xia and   
                Xiaohu Yang and   
                    Chao Wu and   
                Shanping Li and   
                    Linfeng Bao   Information Credibility on Twitter in
                                  Emergency Situation  . . . . . . . . . . 45--59
                    Chao Li and   
                    Jun Luo and   
        Joshua Zhexue Huang and   
                   Jianping Fan   Multi-Layer Network for Influence
                                  Propagation over Microblog . . . . . . . 60--72
               Tim M. H. Li and   
               Michael Chau and   
            Paul W. C. Wong and   
                 Paul S. F. Yip   A Hybrid System for Online Detection of
                                  Emotional Distress . . . . . . . . . . . 73--80
              Viet H. Huynh and   
                    An N. T. Le   Process Mining and Security:
                                  Visualization in Database Intrusion
                                  Detection  . . . . . . . . . . . . . . . 81--95
        Mustafa Amir Faisal and   
                 Zeyar Aung and   
           John R. Williams and   
                   Abel Sanchez   Securing Advanced Metering
                                  Infrastructure Using Intrusion Detection
                                  System with Data Stream Mining . . . . . 96--111
               Dan Bogdanov and   
       Roman Jagomägis and   
                      Sven Laur   A Universal Toolkit for
                                  Cryptographically Secure
                                  Privacy-Preserving Data Mining . . . . . 112--126
               Jakub Valcik and   
            Jan Sedmidubsky and   
             Michal Balazia and   
                   Pavel Zezula   Identifying Walk Cycles for Human
                                  Recognition  . . . . . . . . . . . . . . 127--135
                Yajuan Ling and   
                  Jing Yang and   
                       Liang He   Chinese Organization Name Recognition
                                  Based on Multiple Features . . . . . . . 136--144
             Ameera Jadalla and   
                 Ashraf Elnagar   A Plagiarism Detection System for Arabic
                                  Text-Based Documents . . . . . . . . . . 145--153
    Nurfadhlina Mohd Sharef and   
         Khairul Azhar Kasmiran   Examining Text Categorization Methods
                                  for Incidents Analysis . . . . . . . . . 154--161
                 Weiwei Sun and   
                    Bo Yang and   
                Qiong Huang and   
                     Sha Ma and   
                      Ximing Li   Multi-Committer Threshold Commitment
                                  Scheme from Lattice  . . . . . . . . . . 162--175
               Zhenhua Chen and   
                Chunying Wu and   
               Daoshun Wang and   
                    Shundong Li   Conjunctive Keywords Searchable
                                  Encryption with Efficient Pairing,
                                  Constant Ciphertext and Short Trapdoor   176--189
                     Jia Yu and   
              Shuguang Wang and   
                Huawei Zhao and   
                Minglei Shu and   
                Jialiang Lv and   
                      Qiang Guo   A Simultaneous Members Enrollment and
                                  Revocation Protocol for Secret Sharing
                                  Schemes  . . . . . . . . . . . . . . . . 190--197
                 Biao Jiang and   
                 Eul Gyu Im and   
                      Yunmo Koo   SaaS-Driven Botnets  . . . . . . . . . . 198--206
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??