Table of contents for issues of Lecture Notes in Computer Science

Last update: Sat Oct 14 16:23:14 MDT 2017                Valid HTML 3.2!

Volume 7350, 2012
Volume 7351, 2012
Volume 7352, 2012
Volume 7353, 2012
Volume 7354, 2012
Volume 7355, 2012
Volume 7356, 2012
Volume 7357, 2012
Volume 7358, 2012
Volume 7359, 2012
Volume 7360, 2012
Volume 7361, 2012
Volume 7362, 2012
Volume 7363, 2012
Volume 7364, 2012
Volume 7365, 2012
Volume 7366, 2012
Volume 7367, 2012
Volume 7368, 2012
Volume 7369, 2012
Volume 7370, 2012
Volume 7371, 2012
Volume 7372, 2012
Volume 7373, 2012
Volume 7374, 2012
Volume 7375, 2012
Volume 7376, 2012
Volume 7377, 2012
Volume 7378, 2012
Volume 7379, 2012
Volume 7380, 2012
Volume 7381, 2012
Volume 7382, 2012
Volume 7383, 2012
Volume 7384, 2012
Volume 7385, 2012
Volume 7386, 2012
Volume 7387, 2012
Volume 7388, 2012
Volume 7389, 2012
Volume 7390, 2012
Volume 7391, 2012
Volume 7392, 2012
Volume 7393, 2012
Volume 7394, 2012
Volume 7395, 2012
Volume 7396, 2012
Volume 7397, 2012
Volume 7398, 2012
Volume 7399, 2012


Lecture Notes in Computer Science
Volume 7350, 2012

            Andreas Friesen and   
         Wolfgang Theilmann and   
              Markus Heller and   
                Jens Lemcke and   
                  Christof Momm   On Some Challenges in Business Systems
                                  Management and Engineering for the
                                  Networked Enterprise of the Future . . . 1--15
               Youakim Badr and   
                  Yong Peng and   
Frédérique Biennier   Digital Ecosystems for Business
                                  e-Services in Knowledge-Intensive Firms  16--31
           Birgit Hofreiter and   
           Christian Huemer and   
               Gerti Kappel and   
           Dieter Mayrhofer and   
                 Jan vom Brocke   Inter-organizational Reference Models
                                  --- May Inter-organizational Systems
                                  Profit from Reference Modeling?  . . . . 32--47
         Valeria Cardellini and   
       Emiliano Casalicchio and   
            Vincenzo Grassi and   
            Francesco Lo Presti   On Guaranteeing Global Dependability
                                  Properties in Collaborative Business
                                  Process Management . . . . . . . . . . . 48--70
                Eric Dubois and   
            Sylvain Kubicki and   
               Sophie Ramel and   
            André Rifaut   Capturing and Aligning Assurance
                                  Requirements for Business Services
                                  Systems  . . . . . . . . . . . . . . . . 71--92
             Marco Anisetti and   
         Claudio A. Ardagna and   
                Ernesto Damiani   Container-Level Security Certification
                                  of Services  . . . . . . . . . . . . . . 93--108
            Leszek A. Maciaszek   An Architectural Style for Trustworthy
                                  Adaptive Service Based Applications  . . 109--121
             Michael Parkin and   
             Mike P. Papazoglou   A Conceptual Architecture for
                                  Business-Aware Transaction Management    122--137
   Jörg Niemöller and   
              Eugen Freiter and   
      Konstantinos Vandikas and   
        Raphaël Quinet and   
              Roman Levenshteyn   Composition in Heterogeneous Service
                                  Networks: Requirements and Solutions . . 138--158
             Fabrizio Smith and   
          Michele Missikoff and   
              Maurizio Proietti   Ontology-Based Querying of Composite
                                  Services . . . . . . . . . . . . . . . . 159--180
 Ismael Bouassida Rodriguez and   
           Riadh Ben Halima and   
               Khalil Drira and   
             Christophe Chassot   A Graph Grammar-Based Dynamic
                                  Reconfiguration for Virtualized Web
                                  Service-Based Composite Architectures    181--196
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7351, 2012

                Alexander Clark   Logical Grammars, Logical Theories . . . 1--20
 Christophe Fouqueré and   
                Myriam Quatrini   Ludics and Natural Language: First
                                  Approaches . . . . . . . . . . . . . . . 21--44
                 Nicholas Asher   The Non Cooperative Basis of
                                  Implicatures . . . . . . . . . . . . . . 45--57
                    Thomas Graf   Movement-Generalized Minimalist Grammars 58--73
             Yuri Ishishita and   
                  Daisuke Bekki   Toward the Formulation of Presupposition
                                  by Illative Combinatory Logic  . . . . . 74--85
                   Boris Karlov   Abstract Automata and a Normal Form for
                                  Categorial Dependency Grammars . . . . . 86--102
              Gregory M. Kobele   Importing Montagovian Dynamics into
                                  Minimalism . . . . . . . . . . . . . . . 103--118
          Gregory M. Kobele and   
                 Jens Michaelis   CoTAGs and ACGs  . . . . . . . . . . . . 119--134
              Yusuke Kubota and   
                  Robert Levine   Gapping as Like-Category Coordination    135--150
               Stepan Kuznetsov   $L$-Completeness of the Lambek Calculus
                                  with the Reversal Operation  . . . . . . 151--160
                        Zhe Lin   Distributive Full Nonassociative Lambek
                                  Calculus with S4-Modalities Is
                                  Context-Free . . . . . . . . . . . . . . 161--172
                    Zhaohui Luo   Common Nouns as Types  . . . . . . . . . 173--185
               Hiroko Ozaki and   
                  Daisuke Bekki   Extractability as the Deduction Theorem
                                  in Subdirectional Combinatory Logic  . . 186--200
             Andrew Plummer and   
                   Carl Pollard   Agnostic Possible Worlds Semantics . . . 201--212
                  Kurt Ranalter   Abstract Machines for Argumentation  . . 213--228
                 Alexey Sorokin   On the Completeness of Lambek Calculus
                                  with Respect to Cofinite Language Models 229--233
                    Tao Xue and   
                    Zhaohui Luo   Dot-types and Their Implementation . . . 234--249
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7352, 2012

             Catherine Plaisant   Life on the Line: Interacting with
                                  Temporal Event Sequence Representations  1--2
        Dave Barker-Plummer and   
            John Etchemendy and   
             Michael Murray and   
                 Emma Pease and   
                    Nik Swoboda   Learning to Use the Openbox: a Framework
                                  for the Implementation of Heterogeneous
                                  Reasoning  . . . . . . . . . . . . . . . 3--3
              Peter Chapman and   
                 Luana Micallef   3rd International Workshop on Euler
                                  Diagrams . . . . . . . . . . . . . . . . 4--4
                Richard Cox and   
             Jonathan San Diego   Technology Enhanced Diagrams Research
                                  Workshop . . . . . . . . . . . . . . . . 5--5
              Cagatay Goncu and   
                   Kim Marriott   Accessible Graphics: Graphics for Vision
                                  Impaired People  . . . . . . . . . . . . 6--6
                   Lisa A. Best   Graduate Student Symposium of Diagrams
                                  2012 . . . . . . . . . . . . . . . . . . 7--7
              Richard Burns and   
            Sandra Carberry and   
            Stephanie Elzer and   
                 Daniel Chester   Automatically Recognizing Intended
                                  Messages in Grouped Bar Charts . . . . . 8--22
            Barbara Tversky and   
            James E. Corter and   
                   Lixiu Yu and   
             David L. Mason and   
           Jeffrey V. Nickerson   Representing Category and Continuum:
                                  Visualizing Thought  . . . . . . . . . . 23--34
            Emmanuel Manalo and   
                    Yuri Uesaka   Elucidating the Mechanism of Spontaneous
                                  Diagram Use in Explanations: How
                                  Cognitive Processing of Text and
                                  Diagrammatic Representations Are
                                  Influenced by Individual and
                                  Task-Related Factors . . . . . . . . . . 35--50
             Michael Wybrow and   
               Kim Marriott and   
               Peter J. Stuckey   Orthogonal Hyperedge Routing . . . . . . 51--64
      Lars Kristian Klauske and   
   Christoph Daniel Schulze and   
        Miro Spönemann and   
         Reinhard von Hanxleden   Improved Layout for Data Flow Diagrams
                                  with Port Constraints  . . . . . . . . . 65--79
     Christian Ernstbrunner and   
                  Josef Pichler   Aesthetic Layout of Wiring Diagrams  . . 80--94
           Cengiz Acartürk   Points, Lines and Arrows in Statistical
                                  Graphs . . . . . . . . . . . . . . . . . 95--101
              Michael Burch and   
            Michael Raschke and   
               Miriam Greis and   
                Daniel Weiskopf   Enriching Indented Pixel Tree Plots with
                                  Node-Oriented Quantitative, Categorical,
                                  Relational, and Time-Series Data . . . . 102--116
         Michael T. Bradley and   
               Andrew Brand and   
               A. Luke MacNeill   Interpreting Effect Size Estimates
                                  through Graphic Analysis of Raw Data
                                  Distributions  . . . . . . . . . . . . . 117--123
              Takeshi Sugio and   
          Atsushi Shimojima and   
              Yasuhiro Katagiri   Psychological Evidence of Mental
                                  Segmentation in Table Reading  . . . . . 124--131
                   Ryo Takemura   Proof-Theoretical Investigation of Venn
                                  Diagrams: a Logic Translation and Free
                                  Rides  . . . . . . . . . . . . . . . . . 132--147
              Paolo Bottoni and   
        Gennaro Costagliola and   
                    Andrew Fish   Euler Diagram Encodings  . . . . . . . . 148--162
                Matej Urbas and   
              Mateja Jamnik and   
              Gem Stapleton and   
                    Jean Flower   Speedith: a Diagrammatic Reasoner for
                                  Spider Diagrams  . . . . . . . . . . . . 163--177
              Peter C.-H. Cheng   Algebra Diagrams: a HANDi Introduction   178--192
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7353, 2012

              Vijay V. Vazirani   Can the Theory of Algorithms Ratify the
                                  ``Invisible Hand of the Market''?  . . . 1--5
              Maxim Babenko and   
               Ivan Pouzyrevsky   Resilient Quicksort and Selection  . . . 6--17
         Sebastian S. Bauer and   
             Uli Fahrenberg and   
                 Axel Legay and   
                   Claus Thrane   General Quantitative Specification
                                  Theories with Modalities . . . . . . . . 18--30
            Michael Blondin and   
                Pierre McKenzie   The Complexity of Intersecting Finite
                                  Automata Having Few Final States . . . . 31--42
          Bart\lomiej Bosek and   
             Stefan Felsner and   
               Kolja Knauer and   
               Grzegorz Matecki   News about Semiantichains and Unichain
                                  Coverings  . . . . . . . . . . . . . . . 43--51
            Dmitry V. Chistikov   Checking Tests for Read-Once Functions
                                  over Arbitrary Bases . . . . . . . . . . 52--63
             Nachshon Cohen and   
                     Zeev Nutov   Approximating Minimum Power
                                  Edge-Multi-Covers  . . . . . . . . . . . 64--75
                Evgeny Demenkov   A Lower Bound on Circuit Complexity of
                                  Vector Function in $U_2$ . . . . . . . . 76--80
            Evgeny Demenkov and   
       Alexander S. Kulikov and   
              Ivan Mihajlin and   
                Hiroki Morizumi   Computing All MOD-Functions
                                  Simultaneously . . . . . . . . . . . . . 81--88
             Volker Diekert and   
             Manfred Kufleitner   Bounded Synchronization Delay in
                                  Omega-Rational Expressions . . . . . . . 89--98
      Martin Dietzfelbinger and   
                   Michael Rink   Towards Optimal Degree-Distributions for
                                  Left-Perfect Matchings in Random
                                  Bipartite Graphs . . . . . . . . . . . . 99--111
              Stefan Dobrev and   
         Evangelos Kranakis and   
        Oscar Morales Ponce and   
           Milan Pl\vzík   Robust Sensor Range for Constructing
                                  Strongly Connected Spanning Digraphs in
                                  UDGs . . . . . . . . . . . . . . . . . . 112--124
                Amr Elmasry and   
               Jyrki Katajainen   Worst-Case Optimal Priority Queues via
                                  Extended Regular Counters  . . . . . . . 125--137
            Eli Fox-Epstein and   
                  Danny Krizanc   The Complexity of Minor-Ancestral Graph
                                  Properties with Forbidden Pairs  . . . . 138--147
             Andreas Goerdt and   
                     Lutz Falke   Satisfiability Thresholds beyond
                                  $k$-XORSAT . . . . . . . . . . . . . . . 148--159
           Petr A. Golovach and   
     Bernard Lidický and   
             Barnaby Martin and   
           Daniël Paulusma   Finding Vertex-Surjective Graph
                                  Homomorphisms  . . . . . . . . . . . . . 160--171
            Pinar Heggernes and   
          Sigve H. Sæther   Broadcast Domination on Block Graphs in
                                  Linear Time  . . . . . . . . . . . . . . 172--183
             Bernhard Heinemann   Characterizing Certain Topological
                                  Specifications . . . . . . . . . . . . . 184--195
 Galina Jirásková   Descriptional Complexity of Operations
                                  on Alternating and Boolean Automata  . . 196--204
               Timo Jolivet and   
                    Jarkko Kari   Consistency of Multidimensional
                                  Combinatorial Substitutions  . . . . . . 205--216
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7354, 2012

                     Ron Shamir   Gene Regulation, Protein Networks and
                                  Disease: a Computational Perspective . . 1--1
                Gonzalo Navarro   Wavelet Trees for All  . . . . . . . . . 2--26
          Maxime Crochemore and   
       Costas S. Iliopoulos and   
           Tomasz Kociumaka and   
                  Marcin Kubica   The Maximum Number of Squares in a Tree  27--40
         A\"\ida Ouangraoua and   
               Mathieu Raffinot   Faster and Simpler Minimal Conflicting
                                  Set Identification . . . . . . . . . . . 41--55
            Sharon Bruckner and   
          Falk Hüffner and   
      Christian Komusiewicz and   
           Rolf Niedermeier and   
                     Sven Thiel   Partitioning into Colorful Components by
                                  Minimum Edge Deletions . . . . . . . . . 56--69
                 Dima Blokh and   
                Danny Segev and   
                   Roded Sharan   Approximation Algorithms and Hardness
                                  Results for Shortest Path Based Graph
                                  Orientations . . . . . . . . . . . . . . 70--82
             Dany Breslauer and   
         Leszek G\kasieniec and   
                 Roberto Grossi   Constant-Time Word-Size String Matching  83--96
      Raphaël Clifford and   
           Markus Jalsenius and   
                  Ely Porat and   
                  Benjamin Sach   Pattern Matching in Multiple Streams . . 97--109
               Omar AitMous and   
Frédérique Bassino and   
                   Cyril Nicaud   An Efficient Linear Pseudo-minimization
                                  Algorithm for Aho--Corasick Automata . . 110--123
            Christian Hundt and   
               Florian Wendland   Efficient Two-Dimensional Pattern
                                  Matching with Scaling and Rotation and
                                  Higher-Order Interpolation . . . . . . . 124--137
             Guillaume Blin and   
            Laurent Bulteau and   
              Minghui Jiang and   
            Pedro J. Tejada and   
       Stéphane Vialette   Hardness of Longest Common Subsequence
                                  for Sequences with Bounded Run-Lengths   138--148
        Ferdinando Cicalese and   
              Eduardo Laber and   
               Oren Weimann and   
                 Raphael Yuster   Near Linear Time Construction of an
                                  Approximate Index for All Maximum
                                  Consecutive Sub-sums of a Sequence . . . 149--158
                Anne Condon and   
        Ján Ma\vnuch and   
                  Chris Thachuk   The Complexity of String Partitioning    159--172
               Wing-Kai Hon and   
                 Rahul Shah and   
           Sharma V. Thankachan   Towards an Optimal Space-and-Query-Time
                                  Index for Top- k Document Retrieval  . . 173--184
               Wing-Kai Hon and   
                 Rahul Shah and   
       Sharma V. Thankachan and   
           Jeffrey Scott Vitter   Document Listing for Queries with
                                  Excluded Pattern . . . . . . . . . . . . 185--195
           Gregory Kucherov and   
              Yakov Nekrich and   
          Tatiana Starikovskaya   Cross-Document Pattern Matching  . . . . 196--207
            Michael P. Ferguson   FEMTO: Fast Search of Large Sequence
                                  Collections  . . . . . . . . . . . . . . 208--219
               Keisuke Goto and   
               Hideo Bannai and   
           Shunsuke Inenaga and   
                Masayuki Takeda   Speeding Up $q$-Gram Mining on
                                  Grammar-Based Compressed Texts . . . . . 220--231
            Pawe\l Gawrychowski   Simple and Efficient LZW-Compressed
                                  Multiple Pattern Matching  . . . . . . . 232--242
             Enno Ohlebusch and   
                Timo Beller and   
          Mohamed I. Abouelhoda   Computing the Burrows--Wheeler Transform
                                  of a String and Its Reverse  . . . . . . 243--256
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7355, 2012

        Ioannis Caragiannis and   
             Christos Kalaitzis   Space Lower Bounds for Low-Stretch
                                  Greedy Embeddings  . . . . . . . . . . . 1--12
              Shiri Chechik and   
                    David Peleg   The Fault Tolerant Capacitated
                                  $k$-Center Problem . . . . . . . . . . . 13--24
                 Yuval Emek and   
          Pierre Fraigniaud and   
                    Amos Korman   Notions of Connectivity in Overlay
                                  Networks . . . . . . . . . . . . . . . . 25--35
              Amotz Bar-Noy and   
                 Ben Baumer and   
                    Dror Rawitz   Changing of the Guards: Strip Cover with
                                  Duty Cycling . . . . . . . . . . . . . . 36--47
           Henning Hasemann and   
                  Juho Hirvonen   Deterministic Local Algorithms, Unique
                                  Identifiers, and Fractional Graph
                                  Colouring  . . . . . . . . . . . . . . . 48--60
                Peter Kling and   
  Friedhelm Meyer auf der Heide   An Algorithm for Online Facility Leasing 61--72
               Martin Biely and   
             Peter Robinson and   
                  Ulrich Schmid   Agreement in Directed Dynamic Networks   73--84
           Majid Khabbazian and   
              Stephane Durocher   Bounding Interference in Wireless Ad Hoc
                                  Networks with Nodes in Random Position   85--98
    Mohsen Eftekhari Hesari and   
             Evangelos Kranakis   Strong Connectivity of Sensor Networks
                                  with Double Antennae . . . . . . . . . . 99--110
                Dongxiao Yu and   
            Qiang-Sheng Hua and   
                   Yuexuan Wang   Distributed Multiple-Message Broadcast
                                  in Wireless Ad-Hoc Networks under the
                                  SINR Model . . . . . . . . . . . . . . . 111--122
Eyjólfur Ingi Ásgeirsson   Wireless Network Stability in the SINR
                                  Model  . . . . . . . . . . . . . . . . . 123--134
              Heger Arfaoui and   
              Pierre Fraigniaud   What Can Be Computed without
                                  Communications?  . . . . . . . . . . . . 135--146
            Vittorio Bil\`o and   
               Michele Flammini   On Bidimensional Congestion Games  . . . 147--158
           Michele Flammini and   
                 Vasco Gallotti   Mobile Network Creation Games  . . . . . 159--170
     Carole Delporte-Gallet and   
              Hugues Fauconnier   Homonyms with Forgeable Identifiers  . . 171--182
       Xavier Vilaça and   
                Oksana Denysyuk   Asynchrony and Collusion in the
                                  $N$-party BAR Transfer Problem . . . . . 183--194
               Dan Alistarh and   
               Hagit Attiya and   
               Rachid Guerraoui   Early Deciding Synchronous Renaming in
                                  $O(\log f)$ Rounds or Less . . . . . . . 195--206
Jérémie Chalopin and   
           Yves Métivier   On Snapshots and Stable Properties
                                  Detection in Anonymous Fully Distributed
                                  Systems (Extended Abstract)  . . . . . . 207--218
            Andreas Larsson and   
               Philippas Tsigas   Self-stabilizing $(k,r)$-Clustering in
                                  Clock Rate-Limited Systems . . . . . . . 219--230
              Michel Raynal and   
                 Julien Stainer   Increasing the Power of the Iterated
                                  Immediate Snapshot Model with Failure
                                  Detectors  . . . . . . . . . . . . . . . 231--242
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7356, 2012

             Parvaz Mahdabi and   
                 Fabio Crestani   Learning-Based Pseudo-Relevance Feedback
                                  for Patent Retrieval . . . . . . . . . . 1--11
     Katharina Wäschle and   
                 Stefan Riezler   Analyzing Parallelism and Domain
                                  Similarities in the MAREC Patent Corpus  12--27
            Khanh-Ly Nguyen and   
               Sung-Hyon Myaeng   Query Enhancement for Patent
                                  Prior-Art-Search Based on Keyterm
                                  Dependency Relations and Semantic Tags   28--42
    Víctor M. Prieto and   
      Manuel Álvarez and   
Rafael López-García and   
                  Fidel Cacheda   Analysis and Detection of Web Spam by
                                  Means of Web Content . . . . . . . . . . 43--57
       Anastasia Moumtzidou and   
         Stefanos Vrochidis and   
               Sara Tonelli and   
           Ioannis Kompatsiaris   Discovery of Environmental Nodes in the
                                  Web  . . . . . . . . . . . . . . . . . . 58--72
            Pavlos Fafalios and   
             Ioannis Kitsos and   
          Yannis Marketakis and   
            Claudio Baldassarre   Web Searching with Entity Mining at
                                  Query Time . . . . . . . . . . . . . . . 73--88
            Tobias Schleser and   
            Doris Ipsmiller and   
          Roland Mörzinger   Patent and Norm Exploration with the m2n
                                  Knowledge Discovery Suite  . . . . . . . 89--93
          Juan Carlos Gomez and   
           Marie-Francine Moens   Hierarchical Classification of Web
                                  Documents by Stratified Discriminant
                                  Analysis . . . . . . . . . . . . . . . . 94--108
         Stefanos Vrochidis and   
       Anastasia Moumtzidou and   
                Gerard Ypma and   
           Ioannis Kompatsiaris   PatMedia: Augmenting Patent Search with
                                  Content-Based Image Retrieval  . . . . . 109--112
             Kimmo Kettunen and   
                   Paavo Arvola   Generating Variant Keyword Forms for a
                                  Morphologically Complex Language Leads
                                  to Successful Information Retrieval with
                                  Finnish  . . . . . . . . . . . . . . . . 113--126
         Wolfgang Tannebaum and   
                 Andreas Rauber   Analyzing Query Logs of USPTO Examiners
                                  to Identify Useful Query Terms in Patent
                                  Documents for Query Expansion in Patent
                                  Searching: a Preliminary Study . . . . . 127--136
      Luepol Pipanmaekaporn and   
                     Yuefeng Li   Discovering Relevant Features for
                                  Effective Query Formulation  . . . . . . 137--151
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7357, 2012

            Mohammad Ghodsi and   
            Anil Maheshwari and   
                  Mostafa Nouri   $\alpha$-Visibility  . . . . . . . . . . 1--12
           Jessica Sherette and   
                    Carola Wenk   Partial Matching between Surfaces Using
                                  Fréchet Distance  . . . . . . . . . . . . 13--23
               Takehiro Ito and   
           Shin-Ichi Nakano and   
             Yoshio Okamoto and   
                    Yota Otachi   A Polynomial-Time Approximation Scheme
                                  for the Geometric Unique Coverage
                                  Problem on Unit Squares  . . . . . . . . 24--35
          Adrian Dumitrescu and   
      Joseph S. B. Mitchell and   
            Pawe\l \.Zyli\'nski   Watchman Routes for Lines and Segments   36--47
          Mohammad Ali Abam and   
              Zahed Rahmati and   
                  Alireza Zarei   Kinetic Pie Delaunay Graph and Its
                                  Applications . . . . . . . . . . . . . . 48--58
              Andreas Gemsa and   
                  D. T. Lee and   
              Chih-Hung Liu and   
                Dorothea Wagner   Higher Order City Voronoi Diagrams . . . 59--70
               Babak Behsaz and   
       Mohammad R. Salavatipour   On Minimum Sum of Radii and Diameters
                                  Clustering . . . . . . . . . . . . . . . 71--82
                 Tomas Hruz and   
          Marcel Schöngens   A Simple Framework for the Generalized
                                  Nearest Neighbor Problem . . . . . . . . 83--94
                    Marek Cygan   Deterministic Parameterized Connected
                                  Vertex Cover . . . . . . . . . . . . . . 95--106
                 Esha Ghosh and   
             Sudeshna Kolay and   
               Mrinal Kumar and   
               Pranabendu Misra   Faster Parameterized Algorithms for
                                  Deletion to Split Graphs . . . . . . . . 107--118
               Eun Jung Kim and   
            Christophe Paul and   
             Geevarghese Philip   A Single-Exponential FPT Algorithm for
                                  the $K_4$-Minor Cover Problem  . . . . . 119--130
                  Yijie Han and   
                  Tadao Takaoka   An $O(n^3 \log \log n / \log^2 n)$ Time
                                  Algorithm for All Pairs Shortest Paths   131--141
             Aistis Atminas and   
             Vadim V. Lozin and   
                    Igor Razgon   Linear Time Algorithm for Computing a
                                  Small Biclique in Graphs without Long
                                  Induced Paths  . . . . . . . . . . . . . 142--152
           Petr A. Golovach and   
       Daniël Paulusma and   
           Erik Jan van Leeuwen   Induced Disjoint Paths in AT-Free Graphs 153--164
  Archontia C. Giannopoulou and   
                Iosif Salem and   
                 Dimitris Zoros   Effective Computation of Immersion
                                  Obstructions for Unions of Graph Classes 165--176
              Danny Z. Chen and   
                     Yan Gu and   
                    Jian Li and   
                    Haitao Wang   Algorithms on Minimizing the Maximum
                                  Sensor Movement for Barrier Coverage of
                                  a Linear Domain  . . . . . . . . . . . . 177--188
           Oleksiy Busaryev and   
             Sergio Cabello and   
                  Chao Chen and   
                   Tamal K. Dey   Annotating Simplices with a Homology
                                  Basis and Its Applications . . . . . . . 189--200
                Rom Aschner and   
            Matthew J. Katz and   
               Gila Morgenstern   Do Directional Antennas Facilitate in
                                  Reducing Interferences?  . . . . . . . . 201--212
          Adrian Dumitrescu and   
           Sariel Har-Peled and   
           Csaba D. Tóth   Minimum Convex Partitions and Maximum
                                  Empty Polytopes  . . . . . . . . . . . . 213--224
         Markus Bläser and   
         Konstatinos Panagiotou   A Probabilistic Analysis of
                                  Christofides' Algorithm  . . . . . . . . 225--236
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7358, 2012

                Wolfgang Thomas   Synthesis and Some of Its Challenges . . 1--1
                  David L. Dill   Model Checking Cell Biology  . . . . . . 2--2
            Rastislav Bodik and   
                   Emina Torlak   Synthesizing Programs with Constraint
                                  Solvers  . . . . . . . . . . . . . . . . 3--3
               Aaron R. Bradley   IC3 and beyond: Incremental, Inductive
                                  Verification . . . . . . . . . . . . . . 4--4
                 Chris J. Myers   Formal Verification of Genetic Circuits  5--5
                 Micha\l Moskal   From C to Infinity and Back: Unbounded
                                  Auto-active Verification with VCC  . . . 6--6
Jan K\vretínský and   
                 Javier Esparza   Deterministic Automata for the
                                  $(F,G)$-Fragment of LTL  . . . . . . . . 7--22
Tomá\vs Brázdil and   
      Krishnendu Chatterjee and   
    Antonín Ku\vcera and   
            Petr Novotný   Efficient Controller Synthesis for
                                  Consumption Games with Multiple Resource
                                  Types  . . . . . . . . . . . . . . . . . 23--38
            Rüdiger Ehlers   ACTL $\cap$ LTL Synthesis  . . . . . . . 39--54
               Yu-Fang Chen and   
                   Bow-Yaw Wang   Learning Boolean Functions Incrementally 55--70
               Rahul Sharma and   
             Aditya V. Nori and   
                     Alex Aiken   Interpolants as Classifiers  . . . . . . 71--87
                Wonchan Lee and   
               Bow-Yaw Wang and   
                   Kwangkeun Yi   Termination Analysis with Algorithmic
                                  Learning . . . . . . . . . . . . . . . . 88--104
          Marc Brockschmidt and   
             Richard Musiol and   
               Carsten Otto and   
              Jürgen Giesl   Automated Termination Proofs for Java
                                  Programs with Cyclic Data  . . . . . . . 105--122
             Javier Esparza and   
             Andreas Gaiser and   
                  Stefan Kiefer   Proving Termination of Probabilistic
                                  Programs Using Patterns  . . . . . . . . 123--138
                Arnaud J. Venet   The Gauge Domain: Scalable Analysis of
                                  Linear Inequality Invariants . . . . . . 139--154
               Josh Berdine and   
                  Arlen Cox and   
              Samin Ishtiaq and   
     Christoph M. Wintersteiger   Diagnosing Abstraction Failure for
                                  Separation Logic--Based Analyses . . . . 155--173
              Aditya Thakur and   
                    Thomas Reps   A Method for Symbolic Computation of
                                  Abstract Operations  . . . . . . . . . . 174--192
      Simone Fulvio Rollini and   
                Ondrej Sery and   
              Natasha Sharygina   Leveraging Interpolant Strength in Model
                                  Checking . . . . . . . . . . . . . . . . 193--209
        Mohamed Faouzi Atig and   
            Ahmed Bouajjani and   
               Michael Emmi and   
                      Akash Lal   Detecting Fair Non-termination in
                                  Multithreaded Programs . . . . . . . . . 210--226
              Vineet Kahlon and   
                      Chao Wang   Lock Removal for Concurrent Trace
                                  Programs . . . . . . . . . . . . . . . . 227--242
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7359, 2012

         Claire R. Donoghue and   
                   Anil Rao and   
         Anthony M. J. Bull and   
                Daniel Rueckert   Robust Global Registration through
                                  Geodesic Paths on an Empirical Manifold
                                  with Knee MRI from the Osteoarthritis
                                  Initiative (OAI) . . . . . . . . . . . . 1--10
                    Yi Hong and   
                  Yundi Shi and   
              Martin Styner and   
                Mar Sanchez and   
                Marc Niethammer   Simple Geodesic Regression for Image
                                  Time-Series  . . . . . . . . . . . . . . 11--20
            Ryan D. Datteri and   
            Beno\^\it M. Dawant   Automatic Detection of the Magnitude and
                                  Spatial Location of Error in Non-rigid
                                  Registration . . . . . . . . . . . . . . 21--30
       Nicholas J. Tustison and   
                Brian B. Avants   Diffeomorphic Directly Manipulated
                                  Free-Form Deformation Image Registration
                                  via Vector Field Flows . . . . . . . . . 31--39
            Daniel Forsberg and   
      Gunnar Farnebäck and   
              Hans Knutsson and   
            Carl-Fredrik Westin   Multi-modal Image Registration Using
                                  Polynomial Expansion and Mutual
                                  Information  . . . . . . . . . . . . . . 40--49
             Firdaus Janoos and   
             Petter Risholm and   
              William Wells III   Bayesian Characterization of Uncertainty
                                  in Multi-modal Image Registration  . . . 50--59
                    Wei Sun and   
            Wiro J. Niessen and   
                   Stefan Klein   Hierarchical vs. Simultaneous
                                  Multiresolution Strategies for Nonrigid
                                  Image Registration . . . . . . . . . . . 60--69
     David Thivierge-Gaulin and   
              Chen-Rui Chou and   
           Atilla P. Kiraly and   
         Christophe Chefd'Hotel   $3$D--$2$D Registration Based on
                                  Mesh-Derived Image Bisection . . . . . . 70--78
                 Marc Modat and   
           M. Jorge Cardoso and   
                Pankaj Daga and   
                 David Cash and   
                Nick C. Fox and   
      Sébastien Ourselin   Inverse-Consistent Symmetric Free Form
                                  Deformation  . . . . . . . . . . . . . . 79--88
             Fitsum A. Reda and   
              Jack H. Noble and   
          Robert F. Labadie and   
            Beno\^\it M. Dawant   Fully Automatic Surface-Based Pre- to
                                  Intra-operative CT Registration for
                                  Cochlear Implant . . . . . . . . . . . . 89--98
               Istvan Csapo and   
                 Brad Davis and   
                  Yundi Shi and   
                Mar Sanchez and   
              Martin Styner and   
                Marc Niethammer   Temporally-Dependent Image Similarity
                                  Measure for Longitudinal Analysis  . . . 99--109
           Beno\^\it Compte and   
             Adrien Bartoli and   
                 Daniel Pizarro   Constant Flow Sampling: a Method to
                                  Automatically Select the Regularization
                                  Parameter in Image Registration  . . . . 110--119
          Takanori Watanabe and   
                  Clayton Scott   Spatial Confidence Regions for
                                  Quantifying and Visualizing Registration
                                  Uncertainty  . . . . . . . . . . . . . . 120--130
       Diego D. B. Carvalho and   
               Stefan Klein and   
            Zeynettin Akkus and   
         Gerrit L. ten Kate and   
                       Hui Tang   Registration of Free-Hand Ultrasound and
                                  MRI of Carotid Arteries through
                                  Combination of Point-Based and
                                  Intensity-Based Algorithms . . . . . . . 131--140
             Amin Katouzian and   
       Athanasios Karamalis and   
         Jennifer Lisauskas and   
             Abouzar Eslami and   
                   Nassir Navab   IVUS-Histology Image Registration  . . . 141--149
          Boris N. Oreshkin and   
                      Tal Arbel   Optimization over Random and Gradient
                                  Probabilistic Pixel Sampling for Fast,
                                  Robust Multi-resolution Image
                                  Registration . . . . . . . . . . . . . . 150--159
           \vZiga \vSpiclin and   
            Bo\vstjan Likar and   
                Franjo Pernu\vs   Quad-tree Based Entropy Estimator for
                                  Fast and Robust Brain Image Registration 160--169
               Aditya Gupta and   
              Maria Escolar and   
            Cheryl Dietrich and   
               John Gilmore and   
                Guido Gerig and   
                  Martin Styner   $3$D Tensor Normalization for Improved
                                  Accuracy in DTI Tensor Registration
                                  Methods  . . . . . . . . . . . . . . . . 170--179
             Anand A. Joshi and   
          David W. Shattuck and   
               Richard M. Leahy   A Method for Automated Cortical Surface
                                  Registration and Labeling  . . . . . . . 180--189
              Lars Ruthotto and   
           Erlend Hodneland and   
                Jan Modersitzki   Registration of Dynamic Contrast
                                  Enhanced MRI with Local Rigidity
                                  Constraint . . . . . . . . . . . . . . . 190--198
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7360, 2012

             Trevor Bench-Capon   Marek Sergot: a Memoir . . . . . . . . . 1--3
               Steve Barker and   
         Andrew J. I. Jones and   
              Antonis Kakas and   
         Robert A. Kowalski and   
               Alessio Lomuscio   The Scientific Contribution of Marek
                                  Sergot . . . . . . . . . . . . . . . . . 4--11
         Robert A. Kowalski and   
                   Fariba Sadri   Teleo-Reactive Abductive Logic Programs  12--32
           Paolo Mancarella and   
                 Francesca Toni   Semi-negative Abductive Logic Programs
                                  with Implicative Integrity Constraints:
                                  Semantics and Properties . . . . . . . . 33--51
                  Dov M. Gabbay   What Is Negation as Failure? . . . . . . 52--78
         Dario Della Monica and   
           Angelo Montanari and   
                    Pietro Sala   The Importance of the Past in Interval
                                  Temporal Logics: The Case of
                                  Propositional Neighborhood Logic . . . . 79--102
     Evgenios Hadjisoteriou and   
                  Antonis Kakas   Argumentation and the Event Calculus . . 103--122
          Stefano Bragaglia and   
           Federico Chesani and   
                Paola Mello and   
              Marco Montali and   
                  Paolo Torroni   Reactive Event Calculus for Monitoring
                                  Global Computing Applications  . . . . . 123--146
              Justin Blount and   
                Michael Gelfond   Reasoning about the Intentions of Agents 147--171
           Alessio Lomuscio and   
               Wojciech Penczek   Symbolic Model Checking for
                                  Temporal-Epistemic Logic . . . . . . . . 172--195
           Koen V. Hindriks and   
         Wiebe van der Hoek and   
           John-Jules Ch. Meyer   GOAL Agents Instantiate Intention Logic  196--219
             Trevor Bench-Capon   Open Texture and Argumentation: What
                                  Makes an Argument Persuasive?  . . . . . 220--233
                  Paul E. Dunne   Irrationality in Persuasive
                                  Argumentation  . . . . . . . . . . . . . 234--248
                  Henry Prakken   Some Reflections on Two Current Trends
                                  in Formal Argumentation  . . . . . . . . 249--272
         Andrew J. I. Jones and   
            Steven O. Kimbrough   On the Representation of Normative
                                  Sentences in FOL . . . . . . . . . . . . 273--294
                  Xavier Parent   Why Be Afraid of Identity? . . . . . . . 295--307
              Marco Alberti and   
            Marco Gavanelli and   
                  Evelina Lamma   Deon$^+$: Abduction and Constraints for
                                  Normative Reasoning  . . . . . . . . . . 308--328
              Paolo Turrini and   
              Xavier Parent and   
     Leendert van der Torre and   
        Silvano Colombo Tosatto   Contrary-To-Duties in Games  . . . . . . 329--348
                   Steve Barker   Logical Approaches to Authorization
                                  Policies . . . . . . . . . . . . . . . . 349--373
              Naftaly H. Minsky   Decentralized Governance of Distributed
                                  Systems via Interaction Control  . . . . 374--400
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7361, 2012

            Melissa L. Hill and   
                   Kela Liu and   
         James G. Mainprize and   
          Ronald B. Levitin and   
                 Rushin Shojaii   Pre-clinical Evaluation of Tumour
                                  Angiogenesis with Contrast-Enhanced
                                  Breast Tomosynthesis . . . . . . . . . . 1--8
               Yue-Houng Hu and   
           David A. Scaduto and   
                       Wei Zhao   The Effect of Amorphous Selenium
                                  Thickness on Imaging Performance of
                                  Contrast Enhanced Digital Breast
                                  Tomosynthesis  . . . . . . . . . . . . . 9--16
    Juan-Pablo Cruz-Bastida and   
Iván Rosado-Méndez and   
Héctor Pérez-Ponce and   
      Yolanda Villaseñor   Contrast Optimization in Clinical
                                  Contrast-Enhanced Digital Mammography
                                  Images . . . . . . . . . . . . . . . . . 17--23
           David A. Scaduto and   
                       Wei Zhao   Determination of System Geometrical
                                  Parameters and Consistency between Scans
                                  for Contrast-Enhanced Digital Breast
                                  Tomosynthesis  . . . . . . . . . . . . . 24--31
             Sara Gavenonis and   
                Kristen Lau and   
          Roshan Karunamuni and   
               Yiheng Zhang and   
                 Baorui Ren and   
                     Chris Ruth   Initial Experience with Dual-Energy
                                  Contrast-Enhanced Digital Breast
                                  Tomosynthesis in the Characterization of
                                  Breast Cancer  . . . . . . . . . . . . . 32--39
                   Wenda He and   
         Erika R. E. Denton and   
               Reyer Zwiggelaar   Mammographic Segmentation and Risk
                                  Classification Using a Novel Binary
                                  Model Based Bayes Classifier . . . . . . 40--47
          Thomy Mertzanidou and   
            John H. Hipwell and   
               Lianghao Han and   
               Zeike Taylor and   
                Henkjan Huisman   Intensity-Based MRI to X-ray Mammography
                                  Registration with an Integrated Fast
                                  Biomechanical Transformation . . . . . . 48--55
              Diksha Sharma and   
                    Aldo Badano   Comparison of Experimental, mantis, and
                                  hybrid mantis X-ray Response for a
                                  Breast Imaging CsI Detector  . . . . . . 56--63
Fabián Narváez and   
                 Eduardo Romero   Breast Mass Classification Using
                                  Orthogonal Moments . . . . . . . . . . . 64--71
              Stefano Young and   
               Andreu Badal and   
              Kyle J. Myers and   
                     Subok Park   A Task-Specific Argument for
                                  Variable-Exposure Breast Tomosynthesis   72--79
              Tushita Patel and   
              Kelly Klanian and   
                Zongyi Gong and   
               Mark B. Williams   Detective Quantum Efficiency of a
                                  CsI-CMOS X-ray Detector for Breast
                                  Tomosynthesis Operating in High Dynamic
                                  Range and High Sensitivity Modes . . . . 80--87
             Jan M. Lesniak and   
            Guido van Schie and   
           Christine Tanner and   
                Bram Platel and   
                Henkjan Huisman   Multimodal Classification of Breast
                                  Masses in Mammography and MRI Using
                                  Unimodal Feature Selection and Decision
                                  Fusion . . . . . . . . . . . . . . . . . 88--95
               Jelena Bozek and   
         Michiel Kallenberg and   
               Mislav Grgic and   
              Nico Karssemeijer   Comparison of Lesion Size Using Area and
                                  Volume in Full Field Digital Mammograms  96--103
                Masami Ando and   
                Qingkai Huo and   
               Shu Ichihara and   
                Tokiko Endo and   
              Tetsuya Yuasa and   
                Naoki Sunaguchi   Very High Contrast and Very High Spatial
                                  Resolution $2$-D, $2.5$-D and $3$-D
                                  Breast Tissue Visualization under X-ray
                                  Dark Field Imaging . . . . . . . . . . . 104--110
            Alessandro Bria and   
           Claudio Marrocco and   
             Mario Molinara and   
           Francesco Tortorella   Detecting Clusters of
                                  Microcalcifications with a Cascade-Based
                                  Approach . . . . . . . . . . . . . . . . 111--118
           Nachiko Uchiyama and   
         Takayuki Kinoshita and   
               Takashi Hojo and   
                 Sota Asaga and   
                   Junko Suzuki   Diagnostic Impact of Adjunction of
                                  Digital Breast Tomosynthesis (DBT) to
                                  Full Field Digital Mammography (FFDM)
                                  and in Comparison with Full Field
                                  Digital Mammography (FFDM) . . . . . . . 119--126
               Sadaf Hashmi and   
          Jamie C. Sergeant and   
               Julie Morris and   
           Sigrid Whiteside and   
                Paula Stavrinos   Ethnic Variation in Volumetric Breast
                                  Density  . . . . . . . . . . . . . . . . 127--133
 Mariela A. Porras-Chaverri and   
             John R. Vetter and   
                  Ralph Highnam   Personalizing Mammographic Dosimetry
                                  Using Multilayered Anatomy-Based Breast
                                  Models . . . . . . . . . . . . . . . . . 134--140
              Ingrid Reiser and   
             Beverly A. Lau and   
        Robert M. Nishikawa and   
               Predrag R. Bakic   A Directional Small-Scale Tissue Model
                                  for an Anthropomorphic Breast Phantom    141--148
                 Feiyu Chen and   
          David D. Pokrajac and   
                 Xiquan Shi and   
               Fengshan Liu and   
          Andrew D. A. Maidment   Simulation of Three Material Partial
                                  Volume Averaging in a Software Breast
                                  Phantom  . . . . . . . . . . . . . . . . 149--156
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7362, 2012

                Jesse Alama and   
              Lionel Mamane and   
                    Josef Urban   Dependencies in Formal Mathematics:
                                  Applications and Extraction for Coq and
                                  Mizar  . . . . . . . . . . . . . . . . . 1--16
                 Andrea Asperti   Proof, Message and Certificate . . . . . 17--31
             Timothy Bourke and   
              Matthias Daum and   
               Gerwin Klein and   
                 Rafal Kolanski   Challenges and Experiences in Managing
                                  Large-Scale Proofs . . . . . . . . . . . 32--48
              Catalin David and   
       Constantin Jucovschi and   
            Andrea Kohlhase and   
               Michael Kohlhase   Semantic Alliance: a Framework for
                                  Semantic Allies  . . . . . . . . . . . . 49--64
              Fulya Horozal and   
           Michael Kohlhase and   
                   Florian Rabe   Extending MKM Formats at the Statement
                                  Level  . . . . . . . . . . . . . . . . . 65--80
                     Rui Hu and   
              Vadim Mazalov and   
                Stephen M. Watt   A Streaming Digital Ink Framework for
                                  Multi-party Collaboration  . . . . . . . 81--95
           Constantin Jucovschi   Cost-Effective Integration of MKM
                                  Semantic Services into Editing
                                  Environments . . . . . . . . . . . . . . 96--110
             Paul Libbrecht and   
             Sandra Rebholz and   
             Daniel Herding and   
       Wolfgang Müller and   
                Felix Tscheulin   Understanding the Learners' Actions when
                                  Using Mathematics Learning Tools . . . . 111--126
         Vesna Marinkovi\'c and   
            Predrag Jani\vci\'c   Towards Understanding Triangle
                                  Construction Problems  . . . . . . . . . 127--142
                   Florian Rabe   A Query Language for Formal Mathematical
                                  Libraries  . . . . . . . . . . . . . . . 143--158
                 Alan P. Sexton   Abramowitz and Stegun --- a Resource for
                                  Mathematical Document Analysis . . . . . 159--168
              Carst Tankink and   
            Christoph Lange and   
                    Josef Urban   Point-and-Write --- Documenting Formal
                                  Mathematics by Reference . . . . . . . . 169--185
             Iain Whiteside and   
             David Aspinall and   
                   Gudmund Grov   An Essence of SSReflect  . . . . . . . . 186--201
            Jacques Carette and   
               Russell O'Connor   Theory Presentation Combinators  . . . . 202--215
      Jónathan Heras and   
          María Poza and   
                    Julio Rubio   Verifying an Algorithm Computing
                                  Discrete Vector Fields for Digital
                                  Imaging  . . . . . . . . . . . . . . . . 216--230
      Muhammad Taimoor Khan and   
             Wolfgang Schreiner   Towards the Formal Specification and
                                  Verification of Maple Programs . . . . . 231--247
              Filip Mari\'c and   
       Miodrag \vZivkovi\'c and   
             Bojan Vu\vckovi\'c   Formalizing Frankl's Conjecture:
                                  FC-Families  . . . . . . . . . . . . . . 248--263
           Mladen Nikoli\'c and   
            Predrag Jani\vci\'c   CDCL-Based Abstract State Transition
                                  System for Coherent Logic  . . . . . . . 264--279
            David J. Wilson and   
        Russell J. Bradford and   
             James H. Davenport   Speeding Up Cylindrical Algebraic
                                  Decomposition by Gröbner Bases  . . . . . 280--294
               Gabriel Dos Reis   A System for Axiomatic Programming . . . 295--309
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7363, 2012

             Jacek Cicho\'n and   
              Jakub Lemiesz and   
                  Marcin Zawada   On Message Complexity of Extrema
                                  Propagation Techniques . . . . . . . . . 1--13
              Sang Hyuk Lee and   
                  Tomasz Radzik   Improved Approximation Bounds for
                                  Maximum Lifetime Problems in Wireless
                                  Ad-Hoc Network . . . . . . . . . . . . . 14--27
             Sabrina Merkel and   
            Sanaz Mostaghim and   
                Hartmut Schmeck   Distributed Geometric Distance
                                  Estimation in Ad Hoc Networks  . . . . . 28--41
        Alexandre Mouradian and   
      Isabelle Augé-Blum   $1$-D Coordinate Based on Local
                                  Information for MAC and Routing Issues
                                  in WSNs  . . . . . . . . . . . . . . . . 42--55
         Evangelos Kranakis and   
           Fraser MacQuarie and   
        Oscar Morales-Ponce and   
                  Jorge Urrutia   Uninterrupted Coverage of a Planar
                                  Region with Rotating Directional
                                  Antennae . . . . . . . . . . . . . . . . 56--68
          Radu Ioan Ciobanu and   
              Ciprian Dobre and   
               Valentin Cristea   Social Aspects to Support Opportunistic
                                  Networks in an Academic Environment  . . 69--82
             Mikael Asplund and   
            Simin Nadjm-Tehrani   Analysing Delay-Tolerant Networks with
                                  Correlated Mobility  . . . . . . . . . . 83--97
             Waldir Moreira and   
            Manuel de Souza and   
               Paulo Mendes and   
                Susana Sargento   Study on the Effect of Network Dynamics
                                  on Opportunistic Routing . . . . . . . . 98--111
         Micha\l Wódczak   Autonomic Cooperative Networking for
                                  Vehicular Communications . . . . . . . . 112--125
              Shikha Sarkar and   
             Lina Stankovic and   
                 Ivan Andonovic   Protocol Design for Farm Animal
                                  Monitoring Using Simulation  . . . . . . 126--138
                Guanyu Wang and   
            Qiang-Sheng Hua and   
                   Yuexuan Wang   Minimum Latency Aggregation Scheduling
                                  for Arbitrary Tree Topologies under the
                                  SINR Model . . . . . . . . . . . . . . . 139--152
            Jacques M. Bahi and   
           Abdallah Makhoul and   
                   Maguy Medlej   An Optimized In-Network Aggregation
                                  Scheme for Data Collection in Periodic
                                  Sensor Networks  . . . . . . . . . . . . 153--166
          Nicholas M. Boers and   
          Ioanis Nikolaidis and   
               Pawel Gburzynski   Impulsive Interference Avoidance in
                                  Dense Wireless Sensor Networks . . . . . 167--180
                    Wei Shi and   
                   Meng Yao and   
          Jean-Pierre Corriveau   Resilient Secure Localization and
                                  Detection of Colluding Attackers in WSNs 181--192
                    Dan Tao and   
               Shaojie Tang and   
                     Huadong Ma   Low Cost Data Gathering Using Mobile
                                  Hybrid Sensor Networks . . . . . . . . . 193--206
            Daniel Bimschas and   
              Oliver Kleine and   
               Dennis Pfisterer   Debugging the Internet of Things: a
                                  6LoWPAN/CoAP Testbed Infrastructure  . . 207--220
       Álvaro Torres and   
         Carlos T. Calafate and   
           Juan-Carlos Cano and   
                 Pietro Manzoni   Evaluating the Effectiveness of a QoS
                                  Framework for MANETs in a Real Testbed   221--234
             Thomas Scherer and   
          Clemens Lombriser and   
            Wolfgang Schott and   
           Hong Linh Truong and   
                     Beat Weiss   Wireless Sensor Network for Continuous
                                  Temperature Monitoring in Air-Cooled
                                  Data Centers: Applications and
                                  Measurement Results  . . . . . . . . . . 235--248
                 Tzu Hao Li and   
           Alexey Borisenko and   
                  Miodrag Bolic   Open Platform Semi-passive RFID Tag  . . 249--259
              Sandra Sendra and   
          Jose V. Lamparero and   
               Jaime Lloret and   
                   Miguel Ardid   Study of the Optimum Frequency at 2.4GHz
                                  ISM Band for Underwater Wireless Ad Hoc
                                  Communications . . . . . . . . . . . . . 260--273
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7364, 2012

         Nikolaj Bjòrner   Taking Satisfiability to the Next Level
                                  with Z3  . . . . . . . . . . . . . . . . 1--8
              Yuri Matiyasevich   Enlarging the Scope of Applicability of
                                  Successful Techniques for Automated
                                  Reasoning in Mathematics . . . . . . . . 9--9
             Robert Nieuwenhuis   SAT and SMT Are Still Resolution:
                                  Questions and Challenges . . . . . . . . 10--13
          Siva Anantharaman and   
             Serdar Erbatur and   
          Christopher Lynch and   
              Paliath Narendran   Unification Modulo Synchronous
                                  Distributivity . . . . . . . . . . . . . 14--29
               Franz Baader and   
           Stefan Borgwardt and   
               Barbara Morawska   SAT Encoding of Unification in
                                  $\mathcal{ELH}_{R^+}$ w.r.t.
                                  Cycle-Restricted Ontologies  . . . . . . 30--44
               Franz Baader and   
              Julian Mendez and   
               Barbara Morawska   UEL: Unification Solver for the
                                  Description Logic $\mathcal{EL}$ ---
                                  System Description . . . . . . . . . . . 45--51
              Matthias Baaz and   
                  Ori Lahav and   
                  Anna Zamansky   Effective Finite-Valued Semantics for
                                  Labelled Calculi . . . . . . . . . . . . 52--66
      François Bobot and   
            Sylvain Conchon and   
          Evelyne Contejean and   
        Mohamed Iguernelala and   
                 Assia Mahboubi   A Simplex-Based Extension of
                                  Fourier--Motzkin for Solving Linear
                                  Integer Arithmetic . . . . . . . . . . . 67--81
           Stefan Borgwardt and   
               Felix Distel and   
         Rafael Peñaloza   How Fuzzy Is My Fuzzy Description Logic? 82--96
       Taus Brock-Nannestad and   
         Carsten Schürmann   Truthful Monadic Abstractions  . . . . . 97--110
                  Chad E. Brown   Satallax: An Automatic Higher-Order
                                  Prover . . . . . . . . . . . . . . . . . 111--117
        Roberto Bruttomesso and   
            Silvio Ghilardi and   
                  Silvio Ranise   From Strong Amalgamability to Modularity
                                  of Quantifier-Free Interpolation . . . . 118--133
   Melisachew Wudage Chekol and   
Jérôme Euzenat and   
           Pierre Genev\`es and   
               Nabil Laya\"\ida   SPARQL Query Containment under RDFS
                                  Entailment Regime  . . . . . . . . . . . 134--148
              Frank de Boer and   
         Marcello Bonsangue and   
                   Jurriaan Rot   Automated Verification of Recursive
                                  Programs with Pointers . . . . . . . . . 149--163
   Stéphanie Delaune and   
               Steve Kremer and   
                 Daniel Pasaila   Security Protocols, Constraint Systems,
                                  and Group Theories . . . . . . . . . . . 164--178
      Stéphane Demri and   
            Amit Kumar Dhar and   
                Arnaud Sangnier   Taming Past LTL and Flat Counter Systems 179--193
             Mnacho Echenim and   
                Nicolas Peltier   A Calculus for Generating Ground
                                  Explanations . . . . . . . . . . . . . . 194--209
                Moshe Emmer and   
        Zurab Khasidashvili and   
         Konstantin Korovin and   
             Christoph Sticksel   EPR-Based Bounded Model Checking at Word
                                  Level  . . . . . . . . . . . . . . . . . 210--224
               Fabian Emmes and   
                  Tim Enger and   
              Jürgen Giesl   Proving Non-looping Non-termination
                                  Automatically  . . . . . . . . . . . . . 225--240
              Stephan Falke and   
                   Deepak Kapur   Rewriting Induction + Linear Arithmetic
                                  = Decision Procedure . . . . . . . . . . 241--255
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7365, 2012

                Wolfgang Reisig   A Fresh Look at Petri Net Extensions . . 1--9
            Karsten Gabriel and   
                  Hartmut Ehrig   Modelling of Communication Platforms
                                  Using Algebraic High-Level Nets and
                                  Their Processes  . . . . . . . . . . . . 10--25
                  Herbert Weber   Modeling Revisited . . . . . . . . . . . 26--35
           Marco Konersmann and   
               Michael Goedicke   A Conceptual Framework and Experimental
                                  Workbench for Architectures  . . . . . . 36--52
           Djamshid Tavangarian   Virtual Computing: The Emperor's New
                                  Clothes? . . . . . . . . . . . . . . . . 53--70
                  Frank Leymann   Linked Compute Units and Linked
                                  Experiments: Using Topology and
                                  Orchestration Technology for Flexible
                                  Support of Scientific Applications . . . 71--80
           Kristian Beckers and   
        Stephan Faßbender   Pattern-Based Context Establishment for
                                  Service-Oriented Architectures . . . . . 81--101
          Michael P. Papazoglou   Cloud Blueprints for Integrating and
                                  Managing Cloud Federations . . . . . . . 102--119
         Ingolf Krüger and   
                  Barry Demchak   Dynamic Service Composition and
                                  Deployment with OpenRichServices . . . . 120--146
            Kirill Mechitov and   
                       Gul Agha   An Architecture for Dynamic
                                  Service-Oriented Computing in Networked
                                  Embedded Systems . . . . . . . . . . . . 147--164
          Christoph Rensing and   
                 Stephan Tittel   Location-Based Services for Technology
                                  Enhanced Learning and Teaching . . . . . 165--179
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7366, 2012

               Daniel J. Olsher   COGPARSE: Brain-Inspired
                                  Knowledge-Driven Full Semantics Parsing  1--11
            Thomas Mazzocco and   
               Erik Cambria and   
               Amir Hussain and   
                  Qiu-Feng Wang   Sentic Neural Networks: a Novel
                                  Cognitive Model for Affective Common
                                  Sense Reasoning  . . . . . . . . . . . . 12--21
         Terry G. Rawlinson and   
                  Shulan Lu and   
                Patrick Coleman   Individual Differences in Working Memory
                                  Capacity and Presence in Virtual
                                  Environments . . . . . . . . . . . . . . 22--30
              Kamran Farooq and   
               Amir Hussain and   
             Stephen Leslie and   
                 Chris Eckl and   
               Calum MacRae and   
                   Warner Slack   An Ontology Driven and Bayesian Network
                                  Based Cardiovascular Decision Support
                                  Framework  . . . . . . . . . . . . . . . 31--41
              Kamran Farooq and   
               Amir Hussain and   
             Stephen Leslie and   
                 Chris Eckl and   
               Calum MacRae and   
                   Warner Slack   Semantically Inspired Electronic
                                  Healthcare Records . . . . . . . . . . . 42--51
                    Hui Wei and   
                     Zheng Dong   A CSP-Based Orientation Detection Model  52--61
Murat Perit Çakìr and   
Abdullah Murat \cSenyi\ugit and   
          Daryal Murat Akay and   
                 Hasan Ayaz and   
                Veysi \.I\csler   Evaluation of UAS Camera Operator
                                  Interfaces in a Simulated Task
                                  Environment: An Optical Brain Imaging
                                  Approach . . . . . . . . . . . . . . . . 62--71
               Chunguang Li and   
                     Lining Sun   Cerebral Activation Patterns in the
                                  Preparation and Movement Periods of
                                  Spontaneous and Evoked Movements . . . . 72--81
                  Erfu Yang and   
               Amir Hussain and   
                   Kevin Gurney   Neurobiologically-Inspired Soft
                                  Switching Control of Autonomous Vehicles 82--91
               Amir Hussain and   
            Rudwan Abdullah and   
                  Erfu Yang and   
                   Kevin Gurney   An Intelligent Multiple-Controller
                                  Framework for the Integrated Control of
                                  Autonomous Vehicles  . . . . . . . . . . 92--101
                   Derek Harter   Evolution of Small-World Properties in
                                  Embodied Networks  . . . . . . . . . . . 102--111
                  Yujuan Qi and   
              Yanjiang Wang and   
                   Tingting Xue   Brain Memory Inspired Template Updating
                                  Modeling for Robust Moving Object
                                  Tracking Using Particle Filter . . . . . 112--119
                   Juan Huo and   
                    Alan Murray   VLSI Implementation of Barn Owl Superior
                                  Colliculus Network for Visual and
                                  Auditory Integration . . . . . . . . . . 120--128
                 Fuluo Wang and   
               Yourui Huang and   
                   Ming Shi and   
                    Shanshan Wu   Membrane Computing Optimization Method
                                  Based on Catalytic Factor  . . . . . . . 129--137
              Murat Ozgoren and   
                Merve Tetik and   
         Kurtulus Izzetoglu and   
                 Adile Oniz and   
                    Banu Onaral   Effect of Body Position on NIRS Based
                                  Hemodynamic Measures from Prefrontal
                                  Cortex . . . . . . . . . . . . . . . . . 138--146
                 Hasan Ayaz and   
                Scott Bunce and   
          Patricia Shewokis and   
         Kurtulus Izzetoglu and   
                    Ben Willems   Using Brain Activity to Predict Task
                                  Performance and Operator Efficiency  . . 147--155
                Ligang Wang and   
                   Jie Kong and   
                   Jing Luo and   
                 Wenbin Gao and   
                     Xianju Guo   ``Arousal'' or ``Activation''
                                  Dysfunction in the Frontal Region of
                                  Children with
                                  Attention--Deficit/Hyperactivity
                                  Disorder: Evidence from an
                                  Electroencephalogram Study . . . . . . . 156--163
              Marco Fagiani and   
          Emanuele Principi and   
          Stefano Squartini and   
               Francesco Piazza   A New Italian Sign Language Database . . 164--173
           Gahangir Hossain and   
              Mark H. Myers and   
                   Robert Kozma   Study of Phase Relationships in ECoG
                                  Signals Using Hilbert--Huang Transforms  174--182
             Scott C. Bunce and   
         Kurtulus Izzetoglu and   
           Meltem Izzetoglu and   
                 Hasan Ayaz and   
              Kambiz Pourrezaei   Treatment Status Predicts Differential
                                  Prefrontal Cortical Responses to Alcohol
                                  and Natural Reinforcer Cues among
                                  Alcohol Dependent Individuals  . . . . . 183--191
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7367, 2012

        Alexander A. Frolov and   
       Du\vsan Húsek and   
             Pavel Yu. Polyakov   Attractor Neural Network Combined with
                                  Likelihood Maximization Algorithm for
                                  Boolean Factor Analysis  . . . . . . . . 1--10
               Zaiyong Tang and   
              Kallol Bagchi and   
                 Youqin Pan and   
                Gary J. Koehler   Pruning Feedforward Neural Network
                                  Search Space Using Local Lipschitz
                                  Constants  . . . . . . . . . . . . . . . 11--20
              Wook-Dong Kim and   
               Sung-Kwun Oh and   
                    Hyun-Ki Kim   Context FCM-Based Radial Basis Function
                                  Neural Networks with the Aid of Fuzzy
                                  Clustering . . . . . . . . . . . . . . . 21--28
                Li-Jie Zhao and   
                  Jian Tang and   
                  Tian-you Chai   Modeling Spectral Data Based on Mutual
                                  Information and Kernel Extreme Learning
                                  Machines . . . . . . . . . . . . . . . . 29--36
                  Jing Wang and   
                   Haibo He and   
                   Yuan Cao and   
                     Jin Xu and   
                   Dongbin Zhao   A Hierarchical Neural Network
                                  Architecture for Classification  . . . . 37--46
                  Zhende Ke and   
                 Yiwen Yang and   
                   Yunong Zhang   Discrete-Time ZNN Algorithms for
                                  Time-Varying Quadratic Programming
                                  Subject to Time-Varying Equality
                                  Constraint . . . . . . . . . . . . . . . 47--54
                  Xibin Zhu and   
      Frank-Michael Schleif and   
                 Barbara Hammer   Patch Processing for Relational Learning
                                  Vector Quantization  . . . . . . . . . . 55--63
                    Zheng Zhang   A Neural Network Model for Currency
                                  Arbitrage Detection  . . . . . . . . . . 64--71
                  Shuxia Lu and   
             Guiqiang Zhang and   
                    Xizhao Wang   A Rank Reduced Matrix Method in Extreme
                                  Learning Machine . . . . . . . . . . . . 72--79
                 Wentao Mao and   
                   Mei Tian and   
                Guirong Yan and   
                  Xianfang Wang   Research of Dynamic Load Identification
                                  Based on Extreme Learning Machine  . . . 80--89
                  Wei Huang and   
                   Sung-Kwun Oh   Fuzzy Relation-Based Polynomial Neural
                                  Networks Based on Hybrid Optimization    90--97
               Yunong Zhang and   
                 Yunjia Xie and   
                   Hongzhou Tan   Time-Varying Moore--Penrose Inverse
                                  Solving Shows Different Zhang Functions
                                  Leading to Different ZNN Models  . . . . 98--105
                  Kun Zhang and   
               Cuirong Wang and   
                    Baoyan Wang   A Multi-object Segmentation Algorithm
                                  Based on Background Modeling and Region
                                  Growing  . . . . . . . . . . . . . . . . 106--115
             Wei-Feng Zhang and   
                  Peng Yang and   
               Dao-Qing Dai and   
                   Arye Nehorai   Reflectance Estimation Using Local
                                  Regression Methods . . . . . . . . . . . 116--122
                         Lei Gu   Applying a Novel Decision Rule to the
                                  Semi-supervised Clustering Method Based
                                  on One-Class SVM . . . . . . . . . . . . 123--131
                   He Huang and   
                  Xiaoping Chen   State Estimation of Markovian Jump
                                  Neural Networks with Mixed Time Delays   132--139
                 Qiaojie Li and   
             Zhoushun Zheng and   
                Shuang Wang and   
                   Jiankang Liu   Lattice Boltzmann Model for Nonlinear
                                  Heat Equations . . . . . . . . . . . . . 140--148
                 Wenyu Yang and   
                   Jie Yang and   
                         Wei Wu   A Modified One-Layer Spiking Neural
                                  Network Involves Derivative of the State
                                  Function at Firing Time  . . . . . . . . 149--158
              Yingwei Zhang and   
                    Chuang Wang   Modeling and Monitoring of Multimodes
                                  Process  . . . . . . . . . . . . . . . . 159--168
              Yingwei Zhang and   
                  Hailong Zhang   Data-Based Modeling and Monitoring for
                                  Multimode Processes Using Local Tangent
                                  Space Alignment  . . . . . . . . . . . . 169--178
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7368, 2012

                 Dazhong Ma and   
                 Jinhai Liu and   
                  Zhanshan Wang   The Pattern Classification Based on
                                  Fuzzy Min-max Neural Network with New
                                  Algorithm  . . . . . . . . . . . . . . . 1--9
                Li-jie Zhao and   
              Tian-you Chai and   
              Xiao-kun Diao and   
                  De-cheng Yuan   Multi-class Classification with
                                  One-Against-One Using Probabilistic
                                  Extreme Learning Machine . . . . . . . . 10--19
              Shangfei Wang and   
                    Shan He and   
                        Hua Zhu   Similarity Measurement and Feature
                                  Selection Using Genetic Algorithm  . . . 20--29
                  Ting Wang and   
             Sheng-Uei Guan and   
                        Fei Liu   Entropic Feature Discrimination Ability
                                  for Pattern Classification Based on
                                  Neural IAL . . . . . . . . . . . . . . . 30--37
              Wook-Dong Kim and   
               Sung-Kwun Oh and   
                  Jeong-Tae Kim   Design of Optimized Radial Basis
                                  Function Neural Networks Classifier with
                                  the Aid of Fuzzy Clustering and Data
                                  Preprocessing Method . . . . . . . . . . 38--45
             Yongsheng Dong and   
                      Jinwen Ma   An Efficient Histogram-Based Texture
                                  Classification Method with Weighted
                                  Symmetrized Kullback--Leibler Divergence 46--55
               Qiaoge Zhang and   
                Zhigang Liu and   
                      Gang Chen   The Recognition Study of Impulse and
                                  Oscillation Transient Based on Spectral
                                  Kurtosis and Neural Network  . . . . . . 56--63
                    Min Han and   
                    Xiaoxin Liu   Forward Feature Selection Based on
                                  Approximate Markov Blanket . . . . . . . 64--72
                 Tianshu Wu and   
                Kunqing Xie and   
               Chengkai Nie and   
                    Guojie Song   An Adaption of Relief for Redundant
                                  Feature Elimination  . . . . . . . . . . 73--81
                  Jian Tang and   
                Li-Jie Zhao and   
                 Yi-miao Li and   
              Tian-you Chai and   
                     S. Joe Qin   Feature Selection of Frequency Spectrum
                                  for Modeling Difficulty to Measure
                                  Process Parameters . . . . . . . . . . . 82--91
                 Zunyi Tang and   
                    Shuxue Ding   Nonnegative Dictionary Learning by
                                  Nonnegative Matrix Factorization with a
                                  Sparsity Constraint  . . . . . . . . . . 92--101
               Dongyue Chen and   
               Zongwen Chen and   
                   Xiaosheng Yu   A New Method for Hand Detection Based on
                                  Hough Forest . . . . . . . . . . . . . . 102--109
                     Jia Li and   
              Changyong Niu and   
                       Ming Fan   Multi-scale Convolutional Neural
                                  Networks for Natural Scene License Plate
                                  Detection  . . . . . . . . . . . . . . . 110--119
                   Zhao Liu and   
                 Guiyu Feng and   
                       Dewen Hu   Robust Mean Shift Tracking with
                                  Background Information . . . . . . . . . 120--129
                 Lijuan Jia and   
                Dandan Song and   
                  Linmi Tao and   
                         Yao Lu   Heart Sounds Classification with a Fuzzy
                                  Neural Network Method with Structure
                                  Learning . . . . . . . . . . . . . . . . 130--140
                 Ting Zhang and   
              Guosheng Yang and   
                    Xinkai Kuai   On Cortex Mechanism Hierarchy Model for
                                  Facial Expression Recognition:
                                  Multi-database Evaluation Results  . . . 141--148
                  Mehreen Saeed   LEFT--Logical Expressions Feature
                                  Transformation: a Framework for
                                  Transformation of Symbolic Features  . . 149--158
               Songping Mai and   
                 Yixin Zhao and   
                 Chun Zhang and   
                    Zhihua Wang   A Time-Frequency Aware Cochlear Implant:
                                  Algorithm and System . . . . . . . . . . 159--168
               Xiaosheng Yu and   
               Chengdong Wu and   
               Dongyue Chen and   
                  Ting Zhou and   
                       Tong Jia   Gradient Vector Flow Based on
                                  Anisotropic Diffusion  . . . . . . . . . 169--178
                  Kai Huang and   
               Liqing Zhang and   
                        Yang Wu   ECG Classification Based on
                                  Non-cardiology Feature . . . . . . . . . 179--186
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7369, 2012

                   Florian Hess   Generalised Jacobians in Cryptography
                                  and Coding Theory  . . . . . . . . . . . 1--15
               Gerardo Vega and   
       Carlos A. Vázquez   The Weight Distribution of a Family of
                                  Reducible Cyclic Codes . . . . . . . . . 16--28
                  Olav Geil and   
             Stefano Martin and   
             Ryutaroh Matsumoto   A New Method for Constructing Small-Bias
                                  Spaces from Hermitian Codes  . . . . . . 29--44
        Pierre-Louis Cayrel and   
Sidi Mohamed El Yousfi Alaoui and   
           Gerhrad Hoffmann and   
            Pascal Véron   An Improved Threshold Ring Signature
                                  Scheme Based on Error Correcting Codes   45--63
             Alexander Pott and   
                    Qi Wang and   
                       Yue Zhou   Sequences and Functions Derived from
                                  Projective Planes and Their Difference
                                  Sets . . . . . . . . . . . . . . . . . . 64--80
                    Lin Sok and   
            Patrick Solé   On Formally Self-dual Boolean Functions
                                  in 2,4 and 6 Variables . . . . . . . . . 81--91
                  Boris Batteux   On the Algebraic Normal Form and Walsh
                                  Spectrum of Symmetric Functions over
                                  Finite Rings . . . . . . . . . . . . . . 92--107
            Lilya Budaghyan and   
            Oleksandr Kazymyrov   Verification of Restricted
                                  EA-Equivalence for Vectorial Boolean
                                  Functions  . . . . . . . . . . . . . . . 108--118
                Shay Gueron and   
                   Vlad Krasnov   Software Implementation of Modular
                                  Exponentiation, Using Advanced Vector
                                  Instructions Architectures . . . . . . . 119--135
            Nadia El Mrabet and   
                   Nicolas Gama   Efficient Multiplication over Extension
                                  Fields . . . . . . . . . . . . . . . . . 136--151
              Danuta Pamula and   
               Arnaud Tisserand   ${\rm GF}(2^m)$ Finite-Field Multipliers
                                  with Reduced Activity Variations . . . . 152--167
          Razvan Barbulescu and   
Jérémie Detrey and   
           Nicolas Estibals and   
                Paul Zimmermann   Finding Optimal Formulae for Bilinear
                                  Maps . . . . . . . . . . . . . . . . . . 168--186
          Benedikt Driessen and   
                  Christof Paar   Solving Binary Linear Equation Systems
                                  over the Rationals and Binaries  . . . . 187--195
                  Sami Omar and   
                 Raouf Ouni and   
                 Saber Bouanani   Hashing with Elliptic Curve
                                  $L$-Functions  . . . . . . . . . . . . . 196--207
          Emmanuel Thomé   Square Root Algorithms for the Number
                                  Field Sieve  . . . . . . . . . . . . . . 208--224
           Ryuichi Harasawa and   
            Yutaka Sueyoshi and   
                     Aichi Kudo   Improving the Berlekamp Algorithm for
                                  Binomials $x^n - a$  . . . . . . . . . . 225--235
             Sumanta Sarkar and   
      Srimanta Bhattacharya and   
Ayça Çe\csmelio\uglu   On Some Permutation Binomials of the
                                  Form $x^{\frac{2^n - 1}{k} + 1} + a x$
                                  over $\mathbb{F}_{2^n}$: Existence and
                                  Count  . . . . . . . . . . . . . . . . . 236--246
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7370, 2012

                      Anonymous   Front Matter . . . . . . . . . . . . . . 1--1
            Michael A. Langston   Fixed-Parameter Tractability, A
                                  Prehistory . . . . . . . . . . . . . . . 3--16
                     Rod Downey   The Birth and Early Years of
                                  Parameterized Complexity . . . . . . . . 17--38
                   Neal Koblitz   Crypto Galore! . . . . . . . . . . . . . 39--50
                   Todd Wareham   Flyby: Life Before, During, and After
                                  Graduate Studies with Mike Fellows . . . 51--55
                   Ulrike Stege   The Impact of Parameterized Complexity
                                  to Interdisciplinary Problem Solving . . 56--68
                Venkatesh Raman   Vertex Cover, Dominating Set and My
                                  Encounters with Parameterized Complexity
                                  and Mike Fellows . . . . . . . . . . . . 69--73
                 Jan Arne Telle   Mike Fellows: Weaving the Web of
                                  Mathematics and Adventure  . . . . . . . 74--79
               Frances Rosamond   Passion Plays: Melodramas about
                                  Mathematics  . . . . . . . . . . . . . . 80--87
                      Anonymous   Front Matter . . . . . . . . . . . . . . 89--89
                     Rod Downey   A Basic Parameterized Complexity Primer  91--128
          Daniel Lokshtanov and   
            Neeldhara Misra and   
                  Saket Saurabh   Kernelization --- Preprocessing with a
                                  Guarantee  . . . . . . . . . . . . . . . 129--161
                Jianer Chen and   
                   Iyad A. Kanj   Parameterized Complexity and
                                  Subexponential-Time Computability  . . . 162--195
             Hans L. Bodlaender   Fixed-Parameter Tractability of
                                  Treewidth and Pathwidth  . . . . . . . . 196--227
          Dimitrios M. Thilikos   Graph Minors and Parameterized Algorithm
                                  Design . . . . . . . . . . . . . . . . . 228--256
              Gregory Gutin and   
                     Anders Yeo   Constraint Satisfaction Problems
                                  Parameterized above or below Tight
                                  Bounds: a Survey . . . . . . . . . . . . 257--286
              Serge Gaspers and   
                 Stefan Szeider   Backdoors to Satisfaction  . . . . . . . 287--317
              Nadja Betzler and   
           Robert Bredereck and   
                Jiehua Chen and   
               Rolf Niedermeier   Studies in Computational Aspects of
                                  Voting . . . . . . . . . . . . . . . . . 318--363
                 Yijia Chen and   
                 Jörg Flum   A Parameterized Halting Problem  . . . . 364--397
                   Tim Bell and   
           Frances Rosamond and   
                    Nancy Casey   Computer Science Unplugged and Related
                                  Projects in Math and Computer Science
                                  Popularization . . . . . . . . . . . . . 398--456
             Fedor V. Fomin and   
             Dániel Marx   FPT Suspects and Tough Customers: Open
                                  Problems of Downey and Fellows . . . . . 457--468
             Dániel Marx   What's Next? Future Directions in
                                  Parameterized Complexity . . . . . . . . 469--496
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7371, 2012

         Leendert van der Torre   Logics for Security and Privacy  . . . . 1--7
                 Yuan Cheng and   
               Jaehong Park and   
                    Ravi Sandhu   A User-to-User Relationship-Based Access
                                  Control Model for Online Social Networks 8--24
         Alessandro Armando and   
                  Silvio Ranise   Automated and Efficient Analysis of
                                  Role-Based Access Control with
                                  Attributes . . . . . . . . . . . . . . . 25--40
                    Xin Jin and   
               Ram Krishnan and   
                    Ravi Sandhu   A Unified Attribute-Based Access Control
                                  Model Covering DAC, MAC and RBAC . . . . 41--55
             Joachim Biskup and   
              Sven Hartmann and   
             Sebastian Link and   
        Jan-Hendrik Lochner and   
             Torsten Schlotmann   Signature-Based Inference-Usability
                                  Confinement for Relational Databases
                                  under Functional and Join Dependencies   56--73
            Rosa Karimi Adl and   
                Mina Askari and   
                 Ken Barker and   
          Reihaneh Safavi-Naini   Privacy Consensus in Anonymization
                                  Systems via Game Theory  . . . . . . . . 74--89
              Gianluca Dini and   
                Pericle Perazzo   Uniform Obfuscation for Location Privacy 90--105
          Ravi Singh Pippal and   
              Jaidhar C. D. and   
             Shashikala Tapaswi   Security Vulnerabilities of User
                                  Authentication Scheme Using Smart Card   106--113
                  Ding Wang and   
              Chun-guang Ma and   
                        Peng Wu   Secure Password-Based Remote User
                                  Authentication Scheme with Non-tamper
                                  Resistant Smart Cards  . . . . . . . . . 114--121
      Tiana Razafindralambo and   
         Guillaume Bouffard and   
               Jean-Louis Lanet   A Friendly Framework for Hidding fault
                                  enabled virus for Java Based Smartcard   122--128
                 Robert Nix and   
         Murat Kantarcioglu and   
                 Keesook J. Han   Approximate Privacy-Preserving Data
                                  Mining on Vertically Partitioned Data    129--144
       Jonathan L. Dautrich and   
          Chinya V. Ravishankar   Security Limitations of Using Secret
                                  Sharing for Data Outsourcing . . . . . . 145--160
             Danish Mehmood and   
               Basit Shafiq and   
             Jaideep Vaidya and   
                  Yuan Hong and   
                     Nabil Adam   Privacy-Preserving Subgraph Discovery    161--176
             Simon N. Foley and   
          William M. Fitzgerald   Decentralized Semantic Threat Graphs . . 177--192
                Rami Sharon and   
                     Ehud Gudes   Code Type Revealing Using Experiments
                                  Framework  . . . . . . . . . . . . . . . 193--206
           Nikolay Yakovets and   
                 Jarek Gryz and   
        Stephanie Hazlewood and   
                   Paul van Run   From MDM to DB2: a Case Study of
                                  Security Enforcement Migration . . . . . 207--222
       Smitha Sundareswaran and   
       Anna Cinzia Squicciarini   XSS-Dec: a Hybrid Solution to Mitigate
                                  Cross-Site Scripting Attacks . . . . . . 223--238
           Abhijith Shastry and   
         Murat Kantarcioglu and   
                   Yan Zhou and   
          Bhavani Thuraisingham   Randomizing Smartphone Malware Profiles
                                  against Statistical Mining Techniques    239--254
       Hamed Saljooghinejad and   
             Wilson Naik Bhukya   Layered Security Architecture for
                                  Masquerade Attack Detection  . . . . . . 255--262
     Abbas Taheri Soodejani and   
        Mohammad Ali Hadavi and   
                  Rasool Jalili   $k$-Anonymity-Based Horizontal
                                  Fragmentation to Preserve Privacy in
                                  Data Outsourcing . . . . . . . . . . . . 263--273
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7372, 2012

                 Kaori Tosu and   
                Noboru Kunihiro   Optimal Bounds for Multi-Prime
                                  $\Phi$-Hiding Assumption . . . . . . . . 1--14
            Atsushi Fujioka and   
               Mark Manulis and   
            Koutarou Suzuki and   
             Berkant Ustao\uglu   Sufficient Condition for Ephemeral
                                  Key-Leakage Resilient Tripartite Key
                                  Exchange . . . . . . . . . . . . . . . . 15--28
                Haruna Higo and   
             Keisuke Tanaka and   
             Akihiro Yamada and   
                 Kenji Yasunaga   A Game-Theoretic Perspective on
                                  Oblivious Transfer . . . . . . . . . . . 29--42
             Yuji Nagashima and   
                Noboru Kunihiro   Faster Algorithm for Solving Hard
                                  Knapsacks for Moderate Message Length    43--56
                 Peter Lory and   
                  Manuel Liedel   Accelerating the Secure Distributed
                                  Computation of the Mean by a Chebyshev
                                  Expansion  . . . . . . . . . . . . . . . 57--70
             Takanori Isobe and   
                Kyoji Shibutani   Security Analysis of the Lightweight
                                  Block Ciphers XTEA, LED and Piccolo  . . 71--86
                  Yu Sasaki and   
                Sareh Emami and   
                Deukjo Hong and   
                   Ashish Kumar   Improved Known-Key Distinguishers on
                                  Feistel--SP Ciphers and Application to
                                  Camellia . . . . . . . . . . . . . . . . 87--100
                Jiazhe Chen and   
                       Leibo Li   Low Data Complexity Attack on Reduced
                                  Camellia-256 . . . . . . . . . . . . . . 101--114
              Xianmeng Meng and   
                   Xuexin Zheng   Cryptanalysis of RSA with a Small
                                  Parameter  . . . . . . . . . . . . . . . 115--123
                Jintai Ding and   
                 Yanbin Pan and   
                    Yingpu Deng   An Algebraic Broadcast Attack against
                                  NTRU . . . . . . . . . . . . . . . . . . 124--137
          Mufeed ALMashrafi and   
             Harry Bartlett and   
             Leonie Simpson and   
                  Ed Dawson and   
           Kenneth Koon-Ho Wong   Analysis of Indirect Message Injection
                                  for MAC Generation Using Stream Ciphers  138--151
           Ewan Fleischmann and   
           Christian Forler and   
               Stefan Lucks and   
                   Jakob Wenzel   Weimar-DM: a Highly Secure Double-Length
                                  Compression Function . . . . . . . . . . 152--165
          K. Preetha Mathew and   
              Sachin Vasant and   
         Sridhar Venkatesan and   
                C. Pandu Rangan   An Efficient IND-CCA2 Secure Variant of
                                  the Niederreiter Encryption Scheme in
                                  the Standard Model . . . . . . . . . . . 166--179
             Kirill Morozov and   
                Tsuyoshi Takagi   Zero-Knowledge Protocols for the
                                  McEliece Encryption  . . . . . . . . . . 180--193
            Jothi Rangasamy and   
            Douglas Stebila and   
                 Colin Boyd and   
Juan Manuel González-Nieto   Effort-Release Public-Key Encryption
                                  from Cryptographic Puzzles . . . . . . . 194--207
             Manh Ha Nguyen and   
             Keisuke Tanaka and   
                 Kenji Yasunaga   Leakage-Resilience of Stateless/Stateful
                                  Public-Key Encryption from Hash Proofs   208--222
                   Kun Peng and   
                Matt Henricksen   How to Fix Two RSA-Based PVSS Schemes---
                                  Exploration and Solution . . . . . . . . 223--234
             Kaoru Kurosawa and   
                 Ryo Nojima and   
                 Le Trieu Phong   Relation between Verifiable Random
                                  Functions and Convertible Undeniable
                                  Signatures, and New Constructions  . . . 235--246
                   Xiao Tan and   
                 Duncan S. Wong   Generalized First Pre-image Tractable
                                  Random Oracle Model and Signature
                                  Schemes  . . . . . . . . . . . . . . . . 247--260
                 Haibo Tian and   
              Xiaofeng Chen and   
                         Jin Li   A Short Non-delegatable Strong
                                  Designated Verifier Signature  . . . . . 261--279
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7373, 2012

                  Anu Gupta and   
             Subhrojyoti Sarkar   An Efficient High Frequency and Low
                                  Power Analog Multiplier in Current
                                  Domain . . . . . . . . . . . . . . . . . 1--9
             Biswajit Maity and   
                  Pradip Mandal   Design of Push-Pull Dynamic Leaker
                                  Circuit for a Low Power Embedded Voltage
                                  Regulator  . . . . . . . . . . . . . . . 10--18
         Priyanka Choudhury and   
            Sambhu Nath Pradhan   Power Modeling of Power Gated FSM and
                                  Its Low Power Realization by
                                  Simultaneous Partitioning and State
                                  Encoding Using Genetic Algorithm . . . . 19--29
             Rahul Shrestha and   
                      Roy Paily   Design and Implementation of a Linear
                                  Feedback Shift Register Interleaver for
                                  Turbo Decoding . . . . . . . . . . . . . 30--39
        Gunti Nagendra Babu and   
      Brajesh Kumar Kaushik and   
               Anand Bulusu and   
           Manoj Kumar Majumder   Low Complexity Encoder for Crosstalk
                                  Reduction in RLC Modeled Interconnects   40--45
             Ashutosh Nandi and   
            Ashok K. Saxena and   
                 Sudeb Dasgupta   Analog Performance Analysis of Dual-$k$
                                  Spacer Based Underlap FinFET . . . . . . 46--51
               R. Jayagowri and   
               K. S. Gurumurthy   Implementation of Gating Technique with
                                  Modified Scan Flip-Flop for Low Power
                                  Testing of VLSI Chips  . . . . . . . . . 52--58
          Surajit Kumar Roy and   
                   Dona Roy and   
               Chandan Giri and   
                Hafizur Rahaman   Post-bond Stack Testing for $3$D Stacked
                                  IC . . . . . . . . . . . . . . . . . . . 59--68
    Soumyadip Bandyopadhyay and   
             Kunal Banerjee and   
            Dipankar Sarkar and   
         Chittaranjan R. Mandal   Translation Validation for PRES+ Models
                                  of Parallel Behaviours via an FSMD
                                  Equivalence Checker  . . . . . . . . . . 69--78
                Prabir Saha and   
           Arindam Banerjee and   
              Anup Dandapat and   
           Partha Bhattacharyya   Design of High Speed Vedic Multiplier
                                  for Decimal Number System  . . . . . . . 79--88
               Mamata Dalui and   
               Biplab K. Sikdar   An Efficient Test Design for CMPs Cache
                                  Coherence Realizing MESI Protocol  . . . 89--98
         Debapriya Basu Roy and   
           Debdeep Mukhopadhyay   An Efficient High Speed Implementation
                                  of Flexible Characteristic-2 Multipliers
                                  on FPGAs . . . . . . . . . . . . . . . . 99--110
                Subrata Das and   
    Partha Sarathi Dasgupta and   
                 Samar Sensarma   Arithmetic Algorithms for Ternary Number
                                  System . . . . . . . . . . . . . . . . . 111--120
            Dushyant Juneja and   
                Sougata Kar and   
        Procheta Chatterjee and   
                 Siddhartha Sen   SOI MEMS Based Over-Sampling
                                  Accelerometer Design with $\Delta\Sigma$
                                  Output . . . . . . . . . . . . . . . . . 121--128
                Goutam Rana and   
         Samir Kumar Lahiri and   
        Chirasree Roy Chaudhuri   Design Optimization of a Wide Band MEMS
                                  Resonator for Efficient Energy
                                  Harvesting . . . . . . . . . . . . . . . 129--138
        Chandrabhan Kushwah and   
         Santosh K. Vishvakarma   Ultra-Low Power Sub-threshold SRAM Cell
                                  Design to Improve Read Static Noise
                                  Margin . . . . . . . . . . . . . . . . . 139--146
              Arun Dobriyal and   
         Rahul Gonnabattula and   
            Pallab Dasgupta and   
         Chittaranjan R. Mandal   Workload Driven Power Domain
                                  Partitioning . . . . . . . . . . . . . . 147--155
         Rituparna Dasgupta and   
              Dipankar Saha and   
          Jagannath Samanta and   
               Sayan Chatterjee   Implementation of a New Offset Generator
                                  Block for the Low-Voltage, Low-Power
                                  Self Biased Threshold Voltage Extractor
                                  Circuit  . . . . . . . . . . . . . . . . 156--165
           Manas Kumar Hati and   
      Tarun Kanti Bhattacharyya   A High Speed, Low Jitter and Fast
                                  Acquisition CMOS Phase Frequency
                                  Detector for Charge Pump PLL . . . . . . 166--171
         Jaynarayan T. Tudu and   
              Deepak Malani and   
                 Virendra Singh   ILP Based Approach for Input Vector
                                  Controlled (IVC) Toggle Maximization in
                                  Combinational Circuits . . . . . . . . . 172--179
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7374, 2012

          Sabyasachi Karati and   
                Abhijit Das and   
     Dipanwita Roychowdhury and   
                 Bhargav Bellur   Batch Verification of ECDSA Signatures   1--18
Sidi Mohamed El Yousfi Alaoui and   
   Özgür Dagdelen and   
        Pascal Véron and   
                  David Galindo   Extended Security Arguments for
                                  Signature Schemes  . . . . . . . . . . . 19--34
    Sébastien Canard and   
           Amandine Jambert and   
                  Roch Lescuyer   Sanitizable Signatures with Several
                                  Signers and Sanitizers . . . . . . . . . 35--52
              Jingjing Wang and   
                Xiangxue Li and   
                 Kefei Chen and   
                 Wenzheng Zhang   Attack Based on Direct Sum Decomposition
                                  against the Nonlinear Filter Generator   53--66
             Julien Bringer and   
      Hervé Chabanne and   
           Mélanie Favre   Fuzzy Vault for Multiple Users . . . . . 67--81
      Reihaneh Safavi-Naini and   
   Mohammed Ashraful Alam Tuhin   Bounds and Constructions for $1$-Round
                                  $(0, \delta)$-Secure Message
                                  Transmission against Generalized
                                  Adversary  . . . . . . . . . . . . . . . 82--98
           Mohammed Meziani and   
           Gerhard Hoffmann and   
            Pierre-Louis Cayrel   Improving the Performance of the SYND
                                  Stream Cipher  . . . . . . . . . . . . . 99--116
                Jiazhe Chen and   
                Meiqin Wang and   
                   Bart Preneel   Impossible Differential Cryptanalysis of
                                  the Lightweight Block Ciphers TEA, XTEA
                                  and HIGHT  . . . . . . . . . . . . . . . 117--137
                  Yu Sasaki and   
                   Lei Wang and   
             Yasuhide Sakai and   
             Kazuo Sakiyama and   
                     Kazuo Ohta   Three-Subset Meet-in-the-Middle Attack
                                  on Reduced XTEA  . . . . . . . . . . . . 138--154
                    Yue Sun and   
                Meiqin Wang and   
               Shujia Jiang and   
                     Qiumei Sun   Differential Cryptanalysis of
                                  Reduced-Round ICEBERG  . . . . . . . . . 155--171
          Thomas Eisenbarth and   
                 Zheng Gong and   
           Tim Güneysu and   
               Stefan Heyse and   
          Sebastiaan Indesteege   Compact Implementation and Performance
                                  Evaluation of Block Ciphers in ATtiny
                                  Devices  . . . . . . . . . . . . . . . . 172--187
              Enrico Thomae and   
               Christopher Wolf   Cryptanalysis of Enhanced TTS, STS and
                                  All Its Variants, or: Why Cross-Terms
                                  Are Important  . . . . . . . . . . . . . 188--202
           Augustin P. Sarr and   
        Philippe Elbaz--Vincent   A Complementary Analysis of the (s)YZ
                                  and DIKE Protocols . . . . . . . . . . . 203--220
             Abderrahmane Nitaj   A New Attack on RSA and CRT-RSA  . . . . 221--233
         Frederik Armknecht and   
       Stefan Katzenbeisser and   
                  Andreas Peter   Shift-Type Homomorphic Encryption and
                                  Its Application to Fully Homomorphic
                                  Encryption . . . . . . . . . . . . . . . 234--251
           Ewan Fleischmann and   
           Christian Forler and   
                   Stefan Lucks   The Collision Security of MDC-4  . . . . 252--269
                 Jiali Choy and   
                 Huihui Yap and   
            Khoongming Khoo and   
                   Jian Guo and   
              Thomas Peyrin and   
                 Axel Poschmann   SPN-Hash: Improving the Provable
                                  Resistance against Differential
                                  Collision Attacks  . . . . . . . . . . . 270--286
             Elena Andreeva and   
               Bart Mennink and   
               Bart Preneel and   
               Marjan \vSkrobot   Security Analysis and Comparison of the
                                  SHA-3 Finalists BLAKE, Gròstl, JH,
                                  Keccak, and Skein  . . . . . . . . . . . 287--305
          Thierry P. Berger and   
            Joffrey D'Hayer and   
              Kevin Marquet and   
              Marine Minier and   
               Gaël Thomas   The GLUON Family: a Lightweight Hash
                                  Function Family Based on FCSRs . . . . . 306--323
              Peter Schwabe and   
                Bo-Yin Yang and   
                  Shang-Yi Yang   SHA-3 on ARM11 Processors  . . . . . . . 324--341
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7375, 2012

               Joseph Ayers and   
            Daniel Blustein and   
               Anthony Westphal   A Conserved Biomimetic Control
                                  Architecture for Walking, Swimming and
                                  Flying Robots  . . . . . . . . . . . . . 1--12
                  Luis Bobo and   
              Ivan Herreros and   
        Paul F. M. J. Verschure   A Digital Neuromorphic Implementation of
                                  Cerebellar Associative Learning  . . . . 13--25
         Roberto Bortoletto and   
            Massimo Sartori and   
                   Fuben He and   
                 Enrico Pagello   Simulating an Elastic Bipedal Robot
                                  Based on Musculoskeletal Modeling  . . . 26--37
     Alexander S. Boxerbaum and   
        Kathryn A. Daltorio and   
            Hillel J. Chiel and   
                 Roger D. Quinn   A Soft-Body Controller with Ubiquitous
                                  Sensor Feedback  . . . . . . . . . . . . 38--49
Frédéric Boyer and   
              Vincent Lebastard   Exploration of Objects by an Underwater
                                  Robot with Electric Sense  . . . . . . . 50--61
             Ken Caluwaerts and   
 Antoine Favre-Félix and   
          Mariacarla Staffa and   
              Steve N'Guyen and   
               Christophe Grand   Neuro-inspired Navigation Strategies
                                  Shifting for Robots: Integration of a
                                  Multiple Landmark Taxon Strategy . . . . 62--73
             Federico Carpi and   
          Gabriele Frediani and   
                Danilo De Rossi   Bioinspired Tunable Lens Driven by
                                  Electroactive Polymer Artificial Muscles 74--82
            Eris Chinellato and   
           Marco Antontelli and   
             Angel P. del Pobil   A Pilot Study on Saccadic Adaptation
                                  Experiments with Robots  . . . . . . . . 83--94
             Sanjay Dastoor and   
                  Sam Weiss and   
              Hannah Stuart and   
                  Mark Cutkosky   Jumping Robot with a Tunable Suspension
                                  Based on Artificial Muscles  . . . . . . 95--106
                Naveed Ejaz and   
            Reiko J. Tanaka and   
                Holger G. Krapp   Static versus Adaptive Gain Control
                                  Strategy for Visuo-motor Stabilization   107--119
          Thierry Hoinville and   
        Rüdiger Wehner and   
                     Holk Cruse   Learning and Retrieval of Memory
                                  Elements in a Navigation Task  . . . . . 120--131
               Tim Landgraf and   
             Michael Oertel and   
            Andreas Kirbach and   
             Randolf Menzel and   
              Raúl Rojas   Imitation of the Honeybee Dance
                                  Communication System by Means of a
                                  Biomimetic Robot . . . . . . . . . . . . 132--143
     André Luvizotto and   
César Rennó-Costa and   
                 Paul Verschure   A Framework for Mobile Robot Navigation
                                  Using a Temporal Population Code . . . . 144--155
             Encarni Marcos and   
                 Armin Duff and   
Martí Sánchez-Fibla and   
        Paul F. M. J. Verschure   Generalization of Integrator Models to
                                  Foraging: a Robot Study Using the DAC9
                                  Model  . . . . . . . . . . . . . . . . . 156--167
             Ben Mitchinson and   
          Martin J. Pearson and   
            Anthony G. Pipe and   
               Tony J. Prescott   The Emergence of Action Sequences from
                                  Spatial Attention: Insight from
                                  Rodent-Like Robots . . . . . . . . . . . 168--179
         Vishwanathan Mohan and   
                 Pietro Morasso   How Past Experience, Imitation and
                                  Practice Can Be Combined to Swiftly
                                  Learn to Use Novel ``Tools'': Insights
                                  from Skill Learning Experiments with
                                  Baby Humanoids . . . . . . . . . . . . . 180--191
           Dimitri Ognibene and   
            Eris Chinellato and   
             Miguel Sarabia and   
                Yiannis Demiris   Towards Contextual Action Recognition
                                  and Target Localization with Active
                                  Allocation of Attention  . . . . . . . . 192--203
 Ana Brându\csa Pavel and   
       Cristian Ioan Vasile and   
                Ioan Dumitrache   Robot Localization Implemented with
                                  Enzymatic Numerical $P$ Systems  . . . . 204--215
         Andrew Philippides and   
              Bart Baddeley and   
            Philip Husbands and   
                    Paul Graham   How Can Embodiment Simplify the Problem
                                  of View-Based Navigation?  . . . . . . . 216--227
      Mikhail I. Rabinovich and   
                   Pablo Varona   The Dynamical Modeling of Cognitive
                                  Robot-Human Centered Interaction . . . . 228--237
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7376, 2012

               Pavel Turkov and   
            Olga Krasotkina and   
                    Vadim Mottl   Bayesian Approach to the Concept Drift
                                  in the Pattern Recognition Problems  . . 1--10
          Michelangelo Ceci and   
            Annalisa Appice and   
            Herna L. Viktor and   
             Donato Malerba and   
                    Eric Paquet   Transductive Relational Classification
                                  in the Co-training Paradigm  . . . . . . 11--25
                  Rong Yang and   
                  Zhenyuan Wang   Generalized Nonlinear Classification
                                  Model Based on Cross-Oriented Choquet
                                  Integral . . . . . . . . . . . . . . . . 26--39
           Hai Thanh Nguyen and   
                  Katrin Franke   A General $L_p$-norm Support Vector
                                  Machine via Mixed $0$--$1$ Programming   40--49
László Kovács   Reduction of Distance Computations in
                                  Selection of Pivot Elements for Balanced
                                  GHT Structure  . . . . . . . . . . . . . 50--62
    Dieter William Joenssen and   
                  Udo Bankhofer   Hot Deck Methods for Imputing Missing
                                  Data . . . . . . . . . . . . . . . . . . 63--75
             Saket Bharambe and   
              Harshit Dubey and   
                    Vikram Pudi   BINER  . . . . . . . . . . . . . . . . . 76--85
     Kartick Chandra Mondal and   
           Nicolas Pasquier and   
       Anirban Mukhopadhyay and   
                  Ujjwal Maulik   A New Approach for Association Rule
                                  Mining and Bi-clustering Using Formal
                                  Concept Analysis . . . . . . . . . . . . 86--101
                 Aixiang Li and   
           Makoto Haraguchi and   
                 Yoshiaki Okubo   Top-$N$ Minimization Approach for
                                  Indicative Correlation Change Mining . . 102--116
                  Rui Leite and   
              Pavel Brazdil and   
             Joaquin Vanschoren   Selecting Classification Algorithms with
                                  Active Testing . . . . . . . . . . . . . 117--131
                   Amit Thombre   Comparing Logistic Regression, Neural
                                  Networks, C5.0 and M5' Classification
                                  Techniques . . . . . . . . . . . . . . . 132--140
            Upendra Sapkota and   
          Barrett R. Bryant and   
                   Alan Sprague   Unsupervised Grammar Inference Using the
                                  Minimum Description Length Principle . . 141--153
        Thais Mayumi Oshiro and   
        Pedro Santoro Perez and   
José Augusto Baranauskas   How Many Trees in a Random Forest? . . . 154--168
                     Tao Xu and   
                 David Chiu and   
                    Iker Gondra   Constructing Target Concept in Multiple
                                  Instance Learning Using Maximum Partial
                                  Entropy  . . . . . . . . . . . . . . . . 169--182
              Heni Bouhamed and   
              Afif Masmoudi and   
             Thierry Lecroq and   
                 Ahmed Reba\"\i   A New Learning Structure Heuristic of
                                  Bayesian Networks from Data  . . . . . . 183--197
           Nikolaos Pitelis and   
               Anastasios Tefas   Discriminant Subspace Learning Based on
                                  Support Vectors Machines . . . . . . . . 198--212
               Nong Thi Hoa and   
                    Bui The Duy   A New Learning Strategy of General BAMs  213--221
      Godfried T. Toussaint and   
              Constantin Berzan   Proximity-Graph Instance-Based Learning,
                                  Support Vector Machines, and High
                                  Dimensionality: An Empirical Comparison  222--236
             Javid Ebrahimi and   
         Mohammad Saniee Abadeh   Semi Supervised Clustering: a Pareto
                                  Approach . . . . . . . . . . . . . . . . 237--251
              Andreia Silva and   
         Cláudia Antunes   Semi-supervised Clustering: a Case Study 252--263
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7377, 2012

             Rainer Schmidt and   
                Heike Weiss and   
                  Georg Fuellen   Application of Classification Algorithms
                                  on IDDM Rat Data . . . . . . . . . . . . 1--8
          Isabelle Bichindaritz   Research Themes in the Case-Based
                                  Reasoning in Health Sciences Core
                                  Literature . . . . . . . . . . . . . . . 9--23
            Arnis Kirshners and   
            Serge Parshutin and   
                    Marcis Leja   Research on Application of Data Mining
                                  Methods to Diagnosing Gastric Cancer . . 24--37
              Gabor I. Nagy and   
                 Krisztian Buza   SOHAC: Efficient Storage of Tick Data
                                  That Supports Search and Analysis  . . . 38--51
                Hongyan Liu and   
                Zhiyuan Yao and   
               Tomas Eklund and   
                    Barbro Back   Electricity Consumption Time Series
                                  Profiling: a Data Mining Application in
                                  Energy Industry  . . . . . . . . . . . . 52--66
               Pedro Santos and   
             Luisa F. Villa and   
Aníbal Reñones and   
     Andrés Bustillo and   
            Jesús Maudes   Wind Turbines Fault Diagnosis Using
                                  Ensemble Classifiers . . . . . . . . . . 67--76
 Luís Moreira-Matias and   
            Carlos Ferreira and   
           João Gama and   
     João Mendes-Moreira   Bus Bunching Detection by Mining
                                  Sequences of Headway Deviations  . . . . 77--91
               Ronnie Alves and   
             Pedro Ferreira and   
               Joel Ribeiro and   
                   Orlando Belo   Detecting Abnormal Patterns in Call
                                  Graphs Based on the Aggregation of
                                  Relevant Vertex Measures . . . . . . . . 92--102
           Andriy Ivannikov and   
             Mikko Jegoroff and   
     Tommi Kärkkäinen   Real-Time Mass Flow Estimation in
                                  Circulating Fluidized Bed  . . . . . . . 103--112
                  Ons Lejri and   
                  Moncef Tagina   Representation in Case-Based Reasoning
                                  Applied to Control Reconfiguration . . . 113--120
                Jef Vanlaer and   
     Pieter Van den Kerkhof and   
                 Geert Gins and   
             Jan F. M. Van Impe   The Influence of Input and Output
                                  Measurement Noise on Batch-End Quality
                                  Prediction with Partial Least Squares    121--135
                  Kaoru Shimada   An Evolving Associative Classifier for
                                  Incomplete Database  . . . . . . . . . . 136--150
              Laura Welcker and   
               Stephan Koch and   
                 Frank Dellmann   Improving Classifier Performance by
                                  Knowledge-Driven Data Preparation  . . . 151--165
             Eunkyoung Park and   
               Younghee Kim and   
                Ieejoon Kim and   
               Jaeyeol Yoon and   
                 Jiyeon Lim and   
                      Ungmo Kim   CWFM: Closed Contingency Weighted
                                  Frequent Itemsets Mining . . . . . . . . 166--177
             Leon Bobrowski and   
               Tomasz \Lukaszuk   Prognostic Modeling with High
                                  Dimensional and Censored Data  . . . . . 178--193
              Eya Ben Ahmed and   
                Ahlem Nabli and   
              Fa\"\iez Gargouri   $\mathcal{SHACUN}$: Semi-supervised
                                  Hierarchical Active Clustering Based on
                                  Ranking Constraints  . . . . . . . . . . 194--208
              Xiaochun Wang and   
                Xia Li Wang and   
                D. Mitch Wilkes   A Minimum Spanning Tree-Inspired
                                  Clustering-Based Outlier Detection
                                  Technique  . . . . . . . . . . . . . . . 209--223
   Samir A. Mohamed Elsayed and   
    Sanguthevar Rajasekaran and   
                  Reda A. Ammar   ML-DS: a Novel Deterministic Sampling
                                  Algorithm for Association Rules Mining   224--235
              Wies\law Paja and   
             Mariusz Wrzesie\'n   Decision Rules Development Using Set of
                                  Generic Operations Approach  . . . . . . 236--242
            Sebastian Klenk and   
         Jürgen Dippon and   
            Andre Burkovski and   
              Gunther Heidemann   Redundant Dictionary Spaces as a General
                                  Concept for the Analysis of
                                  Non-vectorial Data . . . . . . . . . . . 243--257
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7378, 2012

       Albert Clapés and   
               Miguel Reyes and   
                Sergio Escalera   User Identification and Object
                                  Recognition in Clutter Scenes Based on
                                  RGB-Depth Analysis . . . . . . . . . . . 1--11
             Margara Tejera and   
                  Adrian Hilton   Compression Techniques for $3$D Video
                                  Mesh Sequences . . . . . . . . . . . . . 12--25
       Sòren Hauberg and   
        Kim Steenstrup Pedersen   Spatial Measures between Human Poses for
                                  Classification and Understanding . . . . 26--36
        Rune Havnung Bakken and   
                  Adrian Hilton   Real-Time Pose Estimation Using
                                  Constrained Dynamics . . . . . . . . . . 37--46
               Junghyun Ahn and   
     Stéphane Gobron and   
                   David Garcia   An NVC Emotional Model for
                                  Conversational Virtual Humans in a $3$D
                                  Chatting Environment . . . . . . . . . . 47--57
     Stéphane Gobron and   
               Junghyun Ahn and   
                   David Garcia   An Event-Based Architecture to Manage
                                  Virtual Human Non-Verbal Communication
                                  in $3$D Chatting Environment . . . . . . 58--68
María del Puy Carretero and   
                  Aitor Ardanza   Improving Gestural Communication in
                                  Virtual Characters . . . . . . . . . . . 69--81
             Sergio Navarro and   
Adolfo López-Méndez   Multi-view Body Tracking with a
                                  Detector-Driven Hierarchical Particle
                                  Filter . . . . . . . . . . . . . . . . . 82--91
              Bogdan Kwolek and   
             Tomasz Krzeszowski   Real-Time Multi-view Human Motion
                                  Tracking Using Particle Swarm
                                  Optimization with Resampling . . . . . . 92--101
       Alexandros Neophytou and   
                  Adrian Hilton   A Comparative Study of Surface
                                  Representations Used in Statistical
                                  Human Models . . . . . . . . . . . . . . 102--113
                     Ran Xu and   
          Priyanshu Agarwal and   
                    Suren Kumar   Combining Skeletal Pose with Local
                                  Motion for Human Activity Recognition    114--123
          Claudio Loconsole and   
                   Nuno Barbosa   A New Marker-Less $3$D Kinect-Based
                                  System for Facial Anthropometric
                                  Measurements . . . . . . . . . . . . . . 124--133
           Kensuke Kitamura and   
            Noriko Takemura and   
                    Yoshio Iwai   Automatic Detection of Unconscious
                                  Reactions to Illuminance Changes in
                                  Illumination . . . . . . . . . . . . . . 134--143
             Stuart Bennett and   
                   Joan Lasenby   Deformation Measurement of a Human Chest
                                  Experiencing Global Motion . . . . . . . 144--152
              Thomas Jensen and   
               Henrik Rasmussen   Automatic Estimation of Movement
                                  Statistics of People . . . . . . . . . . 153--162
              Seth Holladay and   
                  Parris Egbert   Granular Material Deposition for
                                  Simulation and Texturing . . . . . . . . 163--172
              Nader Mahmoud and   
            Stephane A. Nicolau   Fast $3$D Structure From Motion with
                                  Missing Points from Registration of
                                  Partial Reconstructions  . . . . . . . . 173--183
               Xiangyang Ju and   
          Balvinder Khambay and   
                   Emer O'Leary   Evaluation of the Reproducibility of
                                  Non-verbal Facial Animations . . . . . . 184--193
            Francisco Ramos and   
             Oscar Ripolles and   
                  Miguel Chover   Continuous Level of Detail for Large
                                  Scale Rendering of $3$D Animated
                                  Polygonal Models . . . . . . . . . . . . 194--203
               Wenjuan Gong and   
               Jordi Gonz\`alez   A New Image Dataset on Human
                                  Interactions . . . . . . . . . . . . . . 204--209
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7379, 2012

           Shlomo Berkovsky and   
                Jill Freyne and   
                  Gregory Smith   Personalized Network Updates: Increasing
                                  Social Interactions and Contributions in
                                  Social Networks  . . . . . . . . . . . . 1--13
             Fabian Bohnert and   
            Ingrid Zukerman and   
              David W. Albrecht   Realistic Simulation of Museum Visitors'
                                  Movements as a Tool for Assessing
                                  Sensor-Based User Models . . . . . . . . 14--25
             Fabian Bohnert and   
            Ingrid Zukerman and   
                 Junaidy Laures   GECKOmmender: Personalised Theme and
                                  Tour Recommendations for Museums . . . . 26--37
              Federica Cena and   
             Silvia Likavec and   
              Francesco Osborne   Property-Based Interest Propagation in
                                  Ontology-Based User Model  . . . . . . . 38--50
Federico Cirett Galán and   
                 Carole R. Beal   EEG Estimates of Engagement and
                                  Cognitive Workload Predict Math Problem
                                  Solving Outcomes . . . . . . . . . . . . 51--62
  Maunendra Sankar Desarkar and   
              Roopam Saxena and   
                Sudeshna Sarkar   Preference Relation Based Matrix
                                  Factorization for Recommender Systems    63--75
               John Finnson and   
                  Jie Zhang and   
                Thomas Tran and   
         Umar Farooq Minhas and   
                    Robin Cohen   A Framework for Modeling Trustworthiness
                                  of Users in Mobile Vehicular Ad-Hoc
                                  Networks and Its Validation through
                                  Simulated Traffic Flow . . . . . . . . . 76--87
                     Qi Gao and   
                Fabian Abel and   
           Geert-Jan Houben and   
                        Yong Yu   A Comparative Study of Users'
                                  Microblogging Behavior on Sina Weibo and
                                  Twitter  . . . . . . . . . . . . . . . . 88--101
                   Yue Gong and   
             Joseph E. Beck and   
                  Carolina Ruiz   Modeling Multiple Distributions of
                                  Student Performances to Improve
                                  Predictive Accuracy  . . . . . . . . . . 102--113
                Guibing Guo and   
                  Jie Zhang and   
                Daniel Thalmann   A Simple But Effective Method to
                                  Incorporate Trusted Neighbors in
                                  Recommender Systems  . . . . . . . . . . 114--125
               Samad Kardan and   
                Cristina Conati   Exploring Gaze Data for Determining User
                                  Learning with an Interactive Simulation  126--138
            Melanie Larizza and   
            Ingrid Zukerman and   
             Fabian Bohnert and   
          R. Andrew Russell and   
                    Lucy Busija   Studies to Determine User Requirements
                                  Regarding In-Home Monitoring Systems . . 139--150
             Martin Leginus and   
                Peter Dolog and   
              Valdas \vZemaitis   Improving Tensor Based Recommenders with
                                  Clustering . . . . . . . . . . . . . . . 151--163
            Janette Lehmann and   
              Mounia Lalmas and   
               Elad Yom-Tov and   
                 Georges Dupret   Models of User Engagement  . . . . . . . 164--175
               Monika Mandl and   
            Alexander Felfernig   Improving the Performance of Unit
                                  Critiquing . . . . . . . . . . . . . . . 176--187
              Cataldo Musto and   
         Fedelucio Narducci and   
              Pasquale Lops and   
          Giovanni Semeraro and   
                Marco de Gemmis   Enhanced Semantic TV-Show Representation
                                  for Personalized Electronic Program
                                  Guides . . . . . . . . . . . . . . . . . 188--199
         Vidhya Navalpakkam and   
                 Ravi Kumar and   
                  Lihong Li and   
                   D. Sivakumar   Attention and Selection in Online Choice
                                  Tasks  . . . . . . . . . . . . . . . . . 200--211
               Ingrid Nunes and   
                Simon Miles and   
               Michael Luck and   
         Carlos J. P. de Lucena   Investigating Explanations to Justify
                                  Choice . . . . . . . . . . . . . . . . . 212--224
       Luiz Augusto Pizzato and   
            Joshua Akehurst and   
        Cameron Silvestrini and   
                   Kalina Yacef   The Effect of Suspicious Profiles on
                                  People Recommenders  . . . . . . . . . . 225--236
                  Alan Said and   
           Brijnesh J. Jain and   
                Sascha Narr and   
                  Till Plumbaum   Users and Noise: The Magic Barrier of
                                  Recommender Systems  . . . . . . . . . . 237--248
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7380, 2012

                    Lei Wei and   
              Alexei Sourin and   
                Zoran Najdovski   Function-Based Single and Dual Point
                                  Haptic Interaction in Cyberworlds  . . . 1--16
           Vladimir Aleshin and   
               Valery Afanasiev   Visual $3$D Perception of Motion
                                  Environment and Visibility Factors in
                                  Virtual Space  . . . . . . . . . . . . . 17--33
       Joëlle Tilmanne and   
                 Thierry Dutoit   Continuous Control of Style and Style
                                  Transitions through Linear Interpolation
                                  in Hidden Markov Model Based Walk
                                  Synthesis  . . . . . . . . . . . . . . . 34--54
        Vaisagh Viswanathan and   
                   Michael Lees   Modeling and Analyzing the Human
                                  Cognitive Limits for Perception in Crowd
                                  Simulation . . . . . . . . . . . . . . . 55--76
        Roman V. Yampolskiy and   
                   Gyuchoon Cho   Experiments in Artimetrics: Avatar Face
                                  Recognition  . . . . . . . . . . . . . . 77--94
               Kenji Ohmori and   
              Tosiyasu L. Kunii   Visualization of Joinery Using Homotopy
                                  Theory and Attaching Maps  . . . . . . . 95--114
              Toshio Kodama and   
                Yoichi Seki and   
              Tosiyasu L. Kunii   Example of Business Applications Using
                                  the Numerical Value and Exponential
                                  Calculation of the Cellular Data System  115--133
             Erika Harrison and   
              Ali Mahdavi-Amiri   Analysis of Inverse Snyder Optimizations 134--148
                  Yichen Li and   
              Mingqiang Wei and   
                   Jianhuang Wu   Error-Controllable Simplification of
                                  Point Cloud  . . . . . . . . . . . . . . 149--162
               Yang Wenzhen and   
                 Pan Zhigen and   
                    Chen Wenhua   Physically-Based Haptic Rendering for
                                  Virtual Hand Interaction . . . . . . . . 163--178
                  Gianluca Mura   The Advanced Open Metaplastic Platform
                                  for Cyber Art  . . . . . . . . . . . . . 179--190
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . I--XII


Lecture Notes in Computer Science
Volume 7381, 2012

                   Yuan Gao and   
                    Kai Salomaa   In Memoriam Sheng Yu . . . . . . . . . . 1--4
              Janusz Brzozowski   In Search of Most Complex Regular
                                  Languages  . . . . . . . . . . . . . . . 5--24
        Andrzej Ehrenfeucht and   
             Grzegorz Rozenberg   A Formal Framework for Processes
                                  Inspired by the Functioning of Living
                                  Cells  . . . . . . . . . . . . . . . . . 25--27
                Paul Gastin and   
               Benjamin Monmege   Adding Pebbles to Weighted Automata  . . 28--51
        José N. Oliveira   Typed Linear Algebra for Weigthed
                                  (Probabilistic) Automata . . . . . . . . 52--65
             Cyril Allauzen and   
                  Michael Riley   A Pushdown Transducer Extension for the
                                  OpenFst Library  . . . . . . . . . . . . 66--77
               Joshua Amavi and   
             Jacques Chabin and   
             Pierre Réty   Weak Inclusion for Recursive XML Types   78--89
           Mikhail V. Berlinkov   Synchronizing Automata on Quasi-Eulerian
                                  Digraph  . . . . . . . . . . . . . . . . 90--100
Tullio Ceccherini-Silberstein and   
           Michel Coornaert and   
         Francesca Fiorenzi and   
                Zoran \vSuni\'c   Cellular Automata on Regular Rooted
                                  Trees  . . . . . . . . . . . . . . . . . 101--112
    Stefano Crespi Reghizzi and   
        Pierluigi L. San Pietro   Strict Local Testability with Consensus
                                  Equals Regularity  . . . . . . . . . . . 113--124
           Pierpaolo Degano and   
         Gian-Luigi Ferrari and   
              Gianluca Mezzetti   Nominal Automata for Resource Usage
                                  Control  . . . . . . . . . . . . . . . . 125--137
             Manfred Droste and   
             Bundit Pibaljommee   Weighted Nested Word Automata and Logics
                                  over Strong Bimonoids  . . . . . . . . . 138--148
                Simone Faro and   
                 Thierry Lecroq   A Fast Suffix Automata Based Algorithm
                                  for Exact Online String Matching . . . . 149--158
             Fedor Fominykh and   
                 Mikhail Volkov   P(l)aying for Synchronization  . . . . . 159--170
              Vladimir V. Gusev   Synchronizing Automata of Bounded Rank   171--179
               Daniel Go\vc and   
              Dane Henshall and   
                Jeffrey Shallit   Automatic Theorem-Proving in
                                  Combinatorics on Words . . . . . . . . . 180--191
            Oscar H. Ibarra and   
               Nicholas Q. Tran   How to Synchronize the Heads of a
                                  Multitape Automaton  . . . . . . . . . . 192--204
                 Franz Jahn and   
         Manfred Kufleitner and   
               Alexander Lauser   Regular Ideal Languages and Their
                                  Boolean Combinations . . . . . . . . . . 205--216
                Artur Je\.z and   
                Andreas Maletti   Hyper-minimization for Deterministic
                                  Tree Automata  . . . . . . . . . . . . . 217--228
Galina Jirásková and   
        Tomá\vs Masopust   On the State and Computational
                                  Complexity of the Reverse of Acyclic
                                  Minimal DFAs . . . . . . . . . . . . . . 229--239
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7382, 2012

                Shizhi Chen and   
        D. Michael Quintian and   
                    YingLi Tian   Towards a Visual Speech Learning System
                                  for the Deaf by Matching Dynamic Lip
                                  Shapes . . . . . . . . . . . . . . . . . 1--9
           Makoto Kobayashi and   
              Takuya Suzuki and   
              Daisuke Wakatsuki   Teaching Support Software for Hearing
                                  Impaired Students Who Study Computer
                                  Operation  . . . . . . . . . . . . . . . 10--17
         Petr Hladík and   
      Tomá\vs G\ocircura   The Hybrid Book --- One Document for All
                                  in the Latest Development  . . . . . . . 18--24
                Andrea Petz and   
             Klaus Miesenberger   Dealing with Changes in Supporting
                                  Students with Disabilities in Higher
                                  Education  . . . . . . . . . . . . . . . 25--32
          Lisa Featherstone and   
                     Simon Ball   Putting the Disabled Student in Charge:
                                  Introduction to the Special Thematic
                                  Session  . . . . . . . . . . . . . . . . 33--35
   Lars Ballieu Christensen and   
                   Tanja Stevns   Biblus --- a Digital Library to Support
                                  Integration of Visually Impaired in
                                  Mainstream Education . . . . . . . . . . 36--42
          Alistair McNaught and   
              Lisa Featherstone   Alternative Approaches to Alternative
                                  Formats --- Changing Expectations by
                                  Challenging Myths  . . . . . . . . . . . 43--50
                  Mike Wald and   
              E. A. Draffan and   
             Russell Newman and   
            Sebastian Skuse and   
                 Chris Phethean   Access Toolkit for Education . . . . . . 51--58
         Poorna Kushalnagar and   
          Benjamin Williams and   
            Raja S. Kushalnagar   Community-Based Participatory Approach:
                                  Students as Partners in Educational
                                  Accessible Technology Research . . . . . 59--64
       Paloma Cantón and   
Ángel L. González and   
           Gonzalo Mariscal and   
                    Carlos Ruiz   Applying New Interaction Paradigms to
                                  the Education of Children with Special
                                  Educational Needs  . . . . . . . . . . . 65--72
                  Fern Faux and   
                David Finch and   
              Lisa Featherstone   InStep: a Video Database Assessment Tool 73--76
   Lars Ballieu Christensen and   
             Sean J. Keegan and   
                   Tanja Stevns   SCRIBE: a Model for Implementing
                                  Robobraille in a Higher Education
                                  Institution  . . . . . . . . . . . . . . 77--83
           Wiebke Köhlmann   Identifying Barriers to Collaborative
                                  Learning for the Blind . . . . . . . . . 84--91
        Raja S. Kushalnagar and   
         Poorna Kushalnagar and   
                Jeffrey B. Pelz   Deaf and Hearing Students' Eye Gaze
                                  Collaboration  . . . . . . . . . . . . . 92--99
 José Antonio Borges and   
            Dolores Tomé   The Musibraille Project --- Enabling the
                                  Inclusion of Blind Students in Music
                                  Courses  . . . . . . . . . . . . . . . . 100--107
                      Mike Wald   Important New Enhancements to Inclusive
                                  Learning Using Recorded Lectures . . . . 108--115
           Mamoru Fujiyoshi and   
             Akio Fujiyoshi and   
               Akiko Ohsawa and   
           Toshiaki Aomatsu and   
              Haruhiko Sawazaki   Development of New Auditory Testing
                                  Media with Invisible $2$-Dimensional
                                  Codes for Test-Takers with Print
                                  Disabilities . . . . . . . . . . . . . . 116--123
               John Gardner and   
           Courtney Christensen   More Accessible Math . . . . . . . . . . 124--129
        Katsuhito Yamaguchi and   
                Masakazu Suzuki   Accessible Authoring Tool for DAISY
                                  Ranging from Mathematics to Others . . . 130--137
Wanda Gonzúrová and   
            Pavel Hrabák   Blind Friendly LaTeX . . . . . . . . . . 138--141
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7383, 2012

          Lars Emil Knudsen and   
                  Harald Holone   A Multimodal Approach to Accessible Web
                                  Content on Smartphones . . . . . . . . . 1--8
               Roberto Manduchi   Mobile Vision as Assistive Technology
                                  for the Blind: An Experimental Study . . 9--16
               Shuihua Wang and   
                    Yingli Tian   Camera-Based Signage Detection and
                                  Recognition for Blind Persons  . . . . . 17--24
          James M. Coughlan and   
                   Huiying Shen   The Crosswatch Traffic Intersection
                                  Analyzer: a Roadmap for the Future . . . 25--28
              Jesus Zegarra and   
              René Farcy   GPS and Inertial Measurement Unit (IMU)
                                  as a Navigation System for the Visually
                                  Impaired . . . . . . . . . . . . . . . . 29--32
             Edgardo Molina and   
                Zhigang Zhu and   
                    Yingli Tian   Visual Nouns for Indoor/Outdoor
                                  Navigation . . . . . . . . . . . . . . . 33--40
               Huiying Shen and   
              James M. Coughlan   Towards a Real-Time System for Finding
                                  and Reading Signs for Visually Impaired
                                  Users  . . . . . . . . . . . . . . . . . 41--47
              Yoonjung Choi and   
                  Ki-Hyung Hong   User Requirements for Camera-Based
                                  Mobile Applications on Touch Screen
                                  Devices for Blind People . . . . . . . . 48--51
            Mehrez Boulares and   
                  Mohamed Jemni   A Route Planner Interpretation Service
                                  for Hard of Hearing People . . . . . . . 52--58
            Martin Spindler and   
              Michael Weber and   
            Denise Prescher and   
                   Mei Miao and   
                  Gerhard Weber   Translating Floor Plans into Directions  59--66
          Tracey J. Mehigan and   
                       Ian Pitt   Harnessing Wireless Technologies for
                                  Campus Navigation by Blind Students and
                                  Visitors . . . . . . . . . . . . . . . . 67--74
          Vladimir Kulyukin and   
               Tanwir Zaman and   
       Abhishek Andhavarapu and   
          Aliasgar Kutiyanawala   Eyesight Sharing in Blind Grocery
                                  Shopping: Remote P2P Caregiving through
                                  Cloud Computing  . . . . . . . . . . . . 75--82
               Stefan Almer and   
            Josef Kolbitsch and   
       Johannes Oberzaucher and   
                   Martin Ebner   Assessment Test Framework for Collecting
                                  and Evaluating Fall-Related Data Using
                                  Mobile Devices . . . . . . . . . . . . . 83--90
             Werner Bischof and   
               Elmar Krajnc and   
           Markus Dornhofer and   
                    Michael Ulm   NAVCOM--WLAN Communication between
                                  Public Transport Vehicles and Smart
                                  Phones to Support Visually Impaired and
                                  Blind People . . . . . . . . . . . . . . 91--98
            Shigeki Miyoshi and   
            Sumihiro Kawano and   
           Mayumi Shirasawa and   
                Kyoko Isoda and   
                Michiko Hasuike   Mobile-Type Remote Captioning System for
                                  Deaf or Hard-of-Hearing People and the
                                  Experience of Remote Supports after the
                                  Great East Japan Earthquake  . . . . . . 99--104
              Bogdan Zamfir and   
             Robert Tedesco and   
                  Brian Reichow   Handheld ``App'' Offering Visual Support
                                  to Students with Autism Spectrum
                                  Disorders (ASDs) . . . . . . . . . . . . 105--112
            Zdenek Bumbalek and   
                Jan Zelenka and   
                    Lukas Kencl   Cloud-Based Assistive
                                  Speech-Transcription Services  . . . . . 113--116
                 Yumi Hwang and   
                Daejin Shin and   
            Chang-Yeal Yang and   
             Seung-Yeun Lee and   
                    Jin Kim and   
                  Byunggoo Kong   Developing a Voice User Interface with
                                  Improved Usability for People with
                                  Dysarthria . . . . . . . . . . . . . . . 117--124
            Frank G. Palmer and   
                Zhigang Zhu and   
                        Tony Ro   Wearable Range-Vibrotactile Field:
                                  Design and Evaluation  . . . . . . . . . 125--132
            Adam Kupryjanow and   
            Piotr Suchomski and   
                 Piotr Odya and   
              Andrzej Czyzewski   System Supporting Speech Perception in
                                  Special Educational Needs Schoolchildren 133--136
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7384, 2012

        Claude Castelluccia and   
         Mohamed-Ali Kaafar and   
                 Minh-Dung Tran   Betrayed by Your Ads!  . . . . . . . . . 1--17
             George Danezis and   
          Markulf Kohlweiss and   
          Benjamin Livshits and   
                   Alfredo Rial   Private Client-Side Profiling with
                                  Random Forests and Hidden Markov Models  18--37
Fernando Pérez-González and   
               Carmela Troncoso   Understanding Statistical Disclosure: a
                                  Least Squares Approach . . . . . . . . . 38--57
                   Xun Gong and   
             Nikita Borisov and   
             Negar Kiyavash and   
                   Nabil Schear   Website Detection Using Remote Traffic
                                  Analysis . . . . . . . . . . . . . . . . 58--78
               Wen Ming Liu and   
                Lingyu Wang and   
                    Kui Ren and   
               Pengsu Cheng and   
                 Mourad Debbabi   $k$-Indistinguishable Traffic Padding in
                                  Web Applications . . . . . . . . . . . . 79--99
                Yossi Gilad and   
                  Amir Herzberg   Spying in the Dark: TCP and Tor Traffic
                                  Analysis . . . . . . . . . . . . . . . . 100--119
              Dima Alhadidi and   
             Noman Mohammed and   
        Benjamin C. M. Fung and   
                 Mourad Debbabi   Secure Distributed Framework for
                                  Achieving $\epsilon$-Differential
                                  Privacy  . . . . . . . . . . . . . . . . 120--139
          T.-H. Hubert Chan and   
                 Mingfei Li and   
                 Elaine Shi and   
                    Wenchang Xu   Differentially Private Continual
                                  Monitoring of Heavy Hitters from
                                  Distributed Streams  . . . . . . . . . . 140--159
             Chengfang Fang and   
                 Ee-Chien Chang   Adaptive Differentially Private
                                  Histogram of Low-Dimensional Data  . . . 160--179
          Erik-Oliver Blass and   
          Roberto Di Pietro and   
                Refik Molva and   
                Melek Önen   PRISM --- Privacy-Preserving Search in
                                  MapReduce  . . . . . . . . . . . . . . . 180--200
              Martin Pirker and   
            Daniel Slamanig and   
                Johannes Winter   Practical Privacy Preserving Cloud
                                  Resource-Payment for Constrained Clients 201--220
              Marek Jawurek and   
             Florian Kerschbaum   Fault-Tolerant Privacy-Preserving
                                  Statistics . . . . . . . . . . . . . . . 221--238
              David Fifield and   
              Nate Hardison and   
        Jonathan Ellithorpe and   
                Emily Stark and   
                      Dan Boneh   Evading Censorship with Browser-Based
                                  Proxies  . . . . . . . . . . . . . . . . 239--258
           Nick Nikiforakis and   
           Steven Van Acker and   
             Frank Piessens and   
                  Wouter Joosen   Exploring the Ecosystem of
                                  Referrer-Anonymizing Services  . . . . . 259--278
               Vaibhav Garg and   
               L. Jean Camp and   
         Katherine Connelly and   
            Lesa Lorenzen-Huber   Risk Communication Design: Video vs.
                                  Text . . . . . . . . . . . . . . . . . . 279--298
      Andrew W. E. McDonald and   
                Sadia Afroz and   
             Aylin Caliskan and   
            Ariel Stolerman and   
              Rachel Greenstadt   Use Fewer Instances of the Letter ``i'':
                                  Toward Writing Style Anonymization . . . 299--318
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7385, 2012

                Thomas Ball and   
     Nikolaj Bjòrner and   
          Leonardo de Moura and   
        Kenneth L. McMillan and   
                  Margus Veanes   Beyond First-Order Satisfaction: Fixed
                                  Points, Interpolants, Automata and
                                  Polynomials  . . . . . . . . . . . . . . 1--6
         Paul Dan Marinescu and   
                 Cristian Cadar   High-Coverage Symbolic Patch Testing . . 7--21
             Andrey Rybalchenko   Towards Automatic Synthesis of Software
                                  Verification Tools . . . . . . . . . . . 22--22
                 Andreas Zeller   Mining Models  . . . . . . . . . . . . . 23--23
                Stefan Leue and   
          Mitra Tabaei Befrouei   Counterexample Explanation by Anomaly
                                  Detection  . . . . . . . . . . . . . . . 24--42
           Sami Evangelista and   
        Lars Michael Kristensen   Combining the Sweep-Line Method with the
                                  Use of an External-Memory Priority Queue 43--61
                  Hao Zheng and   
         Emmanuel Rodriguez and   
             Yingying Zhang and   
                    Chris Myers   A Compositional Minimization Approach
                                  for Large Asynchronous Design
                                  Verification . . . . . . . . . . . . . . 62--79
           Alexander Ditter and   
            Milan \vCe\vska and   
            Gerald Lüttgen   On Parallel Software Verification Using
                                  Boolean Equation Systems . . . . . . . . 80--97
              Anton J. Wijs and   
            Dragan Bo\vsna\vcki   Improving GPU Sparse Matrix-Vector
                                  Multiplication for Probabilistic Model
                                  Checking . . . . . . . . . . . . . . . . 98--116
               Theo C. Ruys and   
                       Pim Kars   Gossiping Girls Are All Alike  . . . . . 117--136
          Shravan Garlapati and   
              Sandeep K. Shukla   Formal Verification of Hierarchically
                                  Distributed Agent Based Protection
                                  Scheme in Smart Grid . . . . . . . . . . 137--154
             Gerard J. Holzmann   Parallelizing the Spin Model Checker . . 155--171
                Ethan Burns and   
                      Rong Zhou   Parallel Model Checking Using
                                  Abstraction  . . . . . . . . . . . . . . 172--190
                  Reng Zeng and   
                   Zhuo Sun and   
                     Su Liu and   
                      Xudong He   McPatom: a Predictive Analysis Tool for
                                  Atomicity Violation Using Model Checking 191--207
              Divjyot Sethi and   
         Muralidhar Talupur and   
   Daniel Schwartz-Narbonne and   
                   Sharad Malik   Parameterized Model Checking of Fine
                                  Grained Concurrency  . . . . . . . . . . 208--226
           Jonathan Bogdoll and   
            Alexandre David and   
             Arnd Hartmanns and   
                Holger Hermanns   \tt mctau: Bridging the Gap between
                                  Modest and UPPAAL  . . . . . . . . . . . 227--233
               Heinz Riener and   
             Görschwin Fey   FAuST: a Framework for Formal
                                  Verification, Automated Debugging, and
                                  Software Test Generation . . . . . . . . 234--240
            Martin Sulzmann and   
                   Axel Zechner   Model Checking DSL-Generated C Source
                                  Code . . . . . . . . . . . . . . . . . . 241--247
         Jürgen Christ and   
            Jochen Hoenicke and   
                 Alexander Nutz   SMTInterpol: An Interpolating SMT Solver 248--254
                 Yong Jiang and   
                    Zongyan Qiu   S2N: Model Transformation from SPIN to
                                  NuSMV  . . . . . . . . . . . . . . . . . 255--260
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7386, 2012

      Jean-Baptiste Jeannin and   
                   Dexter Kozen   Computing with Capsules  . . . . . . . . 1--19
          Christos A. Kapoutsis   Minicomplexity . . . . . . . . . . . . . 20--42
           André Platzer   Logical Analysis of Hybrid Systems . . . 43--49
                 Pedro V. Silva   Groups and Automata: a Perfect Match . . 50--63
            Fernando Arroyo and   
           Juan Castellanos and   
                 Victor Mitrana   Uniform Distributed Pushdown Automata
                                  Systems  . . . . . . . . . . . . . . . . 64--75
Zuzana Bednárová and   
             Viliam Geffert and   
           Carlo Mereghetti and   
                Beatrice Palano   Removing Nondeterminism in Constant
                                  Height Pushdown Automata . . . . . . . . 76--88
        Maria Paola Bianchi and   
              Markus Holzer and   
           Sebastian Jakobi and   
            Giovanni Pighizzini   On Inverse Operations and Their
                                  Descriptional Complexity . . . . . . . . 89--102
    Francine Blanchet-Sadri and   
                   Sean Simmons   Deciding Representability of Sets of
                                  Words of Equal Length  . . . . . . . . . 103--116
          Janusz Brzozowski and   
                       Baiyu Li   Syntactic Complexities of Some Classes
                                  of Star-Free Languages . . . . . . . . . 117--129
           Cezar Câmpeanu   Randomness Behaviour in Blum Universal
                                  Static Complexity Spaces . . . . . . . . 130--140
         Jürgen Dassow and   
                  Ronny Harbich   Production Complexity of Some Operations
                                  on Context-Free Languages  . . . . . . . 141--154
                   Yuan Gao and   
                      Lila Kari   State Complexity of Star and Square of
                                  Union of k Regular Languages . . . . . . 155--168
              Markus Holzer and   
               Sebastian Jakobi   State Complexity of Chop Operations on
                                  Unary and Finite Languages . . . . . . . 169--182
                Artur Je\.z and   
              Alexander Okhotin   On the Number of Nonterminal Symbols in
                                  Unambiguous Conjunctive Grammars . . . . 183--195
Galina Jirásková and   
          Ond\vrej Klíma   Descriptional Complexity of Biautomata   196--208
            Andreas Malcher and   
               Katja Meckel and   
           Carlo Mereghetti and   
                Beatrice Palano   Descriptional Complexity of Pushdown
                                  Store Languages  . . . . . . . . . . . . 209--221
               Florin Manea and   
                  Bianca Truthe   On Internal Contextual Grammars with
                                  Subregular Selection Languages . . . . . 222--235
           Alexander Meduna and   
Luká\vs Vrábel and   
                     Petr Zemek   An Infinite Hierarchy of Language
                                  Families Resulting from Stateless
                                  Pushdown Automata with Limited Pushdown
                                  Alphabets  . . . . . . . . . . . . . . . 236--243
                 Friedrich Otto   Centralized PC Systems of Pushdown
                                  Automata versus Multi-head Pushdown
                                  Automata . . . . . . . . . . . . . . . . 244--251
     Alexandros Palioudakis and   
                Kai Salomaa and   
                   Selim G. Akl   State Complexity and Limited
                                  Nondeterminism . . . . . . . . . . . . . 252--265
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7387, 2012

          Matthias Heinrich and   
Franz Josef Grüneberger and   
            Thomas Springer and   
                  Martin Gaedke   Reusable Awareness Widgets for
                                  Collaborative Web Applications --- a
                                  Non-invasive Approach  . . . . . . . . . 1--15
                  Feng Xiao and   
                Tomoya Noro and   
                Takehiro Tokuda   News-Topic Oriented Hashtag
                                  Recommendation in Twitter Based on
                                  Characteristic Co-occurrence Word
                                  Detection  . . . . . . . . . . . . . . . 16--30
           Michael Nebeling and   
             Stefania Leone and   
                Moira C. Norrie   Crowdsourced Web Engineering and Design  31--45
               Damir Vandic and   
          Flavius Frasincar and   
             Frederik Hogenboom   Scaling Pair-Wise Similarity-Based
                                  Algorithms in Tagging Spaces . . . . . . 46--60
             Martin Leginus and   
                Peter Dolog and   
               Ricardo Lage and   
                Frederico Durao   Methodologies for Improved Tag Cloud
                                  Generation with Clustering . . . . . . . 61--75
            Devis Bianchini and   
      Valeria De Antonellis and   
              Michele Melchiori   Semantic Collaborative Tagging for Web
                                  APIs Sharing and Reuse . . . . . . . . . 76--90
  Cristóbal Arellano and   
          Oscar Díaz and   
                   Jon Iturrioz   Opening Personalization to Partners: An
                                  Architecture of Participation for
                                  Websites . . . . . . . . . . . . . . . . 91--105
            Mairon Belchior and   
             Daniel Schwabe and   
       Fernando Silva Parreiras   Role-Based Access Control for
                                  Model-Driven Web Applications  . . . . . 106--120
            Manar H. Alalfi and   
             James R. Cordy and   
                 Thomas R. Dean   Recovering Role-Based Access Control
                                  Security Models from Dynamic Web
                                  Applications . . . . . . . . . . . . . . 121--136
          Alessandro Bozzon and   
            Marco Brambilla and   
           Piero Fraternali and   
             Marco Tagliasacchi   Diversification for Multi-domain Result
                                  Sets . . . . . . . . . . . . . . . . . . 137--152
                     Ke Tao and   
                Fabian Abel and   
              Claudia Hauff and   
               Geert-Jan Houben   Twinder: a Search Engine for Twitter
                                  Streams  . . . . . . . . . . . . . . . . 153--168
                Elena Ilina and   
              Claudia Hauff and   
               Ilknur Celik and   
                Fabian Abel and   
               Geert-Jan Houben   Social Event Detection on Twitter  . . . 169--176
           Damien Leprovost and   
               Lylia Abrouk and   
              Nadine Cullot and   
            David Gross-Amblard   Temporal Semantic Centrality for the
                                  Analysis of Communication Networks . . . 177--184
              Manuel Wimmer and   
            Nathalie Moreno and   
             Antonio Vallecillo   Systematic Evolution of WebML Models by
                                  Coupled Transformations  . . . . . . . . 185--199
      Julián Grigera and   
José Matías Rivero and   
        Esteban Robles Luna and   
             Franco Giacosa and   
                  Gustavo Rossi   From Requirements to Web Applications in
                                  an Agile Model-Driven Approach . . . . . 200--214
                  Nora Koch and   
            Alexander Knapp and   
                Sergej Kozuruba   Assessment of Effort Reduction due to
                                  Model-to-Model Transformations in the
                                  Web Domain . . . . . . . . . . . . . . . 215--222
   Yulkeidi Martínez and   
           Cristina Cachero and   
          Santiago Meliá   Evaluating the Impact of a Model-Driven
                                  Web Engineering Approach on the
                                  Productivity and the Satisfaction of
                                  Software Development Teams . . . . . . . 223--237
        Shabnam Mirshokraie and   
                     Ali Mesbah   JSART: JavaScript Assertion-Based
                                  Regression Testing . . . . . . . . . . . 238--252
                 Sara Comai and   
               Davide Mazza and   
               Andrea Guarinoni   A Framework for the Development of
                                  Haptic-Enhanced Web Applications . . . . 253--267
           Sergio Firmenich and   
              Vincent Gaits and   
            Silvia Gordillo and   
              Gustavo Rossi and   
                 Marco Winckler   Supporting Users Tasks with Personal
                                  Information Management and Web Forms
                                  Augmentation . . . . . . . . . . . . . . 268--282
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7388, 2012

           Olaf Beyersdorff and   
                    Oliver Kutz   Proof Complexity of Non-classical Logics 1--54
               Jan Broersen and   
         Leendert van der Torre   Ten Problems of Deontic Logic and
                                  Normative Reasoning in Computer Science  55--88
                   Ugo Dal Lago   A Short Introduction to Implicit
                                  Computational Complexity . . . . . . . . 89--109
               Sujata Ghosh and   
                   R. Ramanujam   Strategies in Games: a Logic-Automata
                                  Study  . . . . . . . . . . . . . . . . . 110--159
              Davide Grossi and   
              Gabriella Pigozzi   Introduction to Judgment Aggregation . . 160--209
           Wojciech Jamroga and   
               Wojciech Penczek   Specification and Verification of
                                  Multi-Agent Systems  . . . . . . . . . . 210--263
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7389, 2012

                   Xia Hong and   
                     Sheng Chen   PSO Assisted NURB Neural Network
                                  Identification . . . . . . . . . . . . . 1--9
            Lukasz Cielecki and   
                  Olgierd Unold   $2$D Discontinuous Function
                                  Approximation with Real-Valued
                                  Grammar-Based Classifier System  . . . . 10--17
                Zhi-Zeng Li and   
               Xue-Yan Song and   
                Ji-Zhou Sun and   
                Zhao-Tong Huang   A Scatter Search Methodology for the
                                  Aircraft Conflict Resolution Problem . . 18--24
                 Datong Xie and   
                 Lixin Ding and   
               Shenwen Wang and   
                 Zhaolu Guo and   
                  Yurong Hu and   
                  Chengwang Xie   Self-adaptive Differential Evolution
                                  Based Multi-objective Optimization
                                  Incorporating Local Search and
                                  Indicator-Based Selection  . . . . . . . 25--33
                   Tianpei Zhou   Application of Data Mining in Coal Mine
                                  Safety Decision System Based on Rough
                                  Set  . . . . . . . . . . . . . . . . . . 34--41
                Xianghua Lu and   
                   Weijing Wang   Study on Web Text Feature Selection
                                  Based on Rough Set . . . . . . . . . . . 42--48
                   Luyi Bai and   
                     Zongmin Ma   A Generalized Approach for Determining
                                  Fuzzy Temporal Relations . . . . . . . . 49--56
               Hongyan Xing and   
                     Daowen Qiu   Applications on Information Flow and
                                  Biomedical Treatment of FDES Based on
                                  Fuzzy Sequential Machines Theory . . . . 57--64
                 Yabin Shao and   
                   Zengtai Gong   Discontinuous Fuzzy Systems and Henstock
                                  Integrals of Fuzzy Number Valued
                                  Functions  . . . . . . . . . . . . . . . 65--72
                 Haiping Yu and   
                  Fengying Yang   A Phased Adaptive PSO Algorithm for
                                  Multimodal Function Optimization . . . . 73--79
             Guoliang Huang and   
                Xinling Shi and   
                Zhenzhou An and   
                         He Sun   The Comparative Study of Different
                                  Number of Particles in Clustering Based
                                  on Three-Layer Particle Swarm
                                  Optimization . . . . . . . . . . . . . . 80--86
                  Yang Weon Lee   Implementation of Mutual Localization of
                                  Multi-robot Using Particle Filter  . . . 87--94
           Milad Malekzadeh and   
           Alireza Khosravi and   
             Saeed Alighale and   
                    Hamed Azami   Optimization of Orthogonal Poly Phase
                                  Coding Waveform Based on Bees Algorithm
                                  and Artificial Bee Colony for MIMO Radar 95--102
                 Yinli Dong and   
                 Shuisheng Zhou   SVM Regularizer Models on RKHS vs. on
                                  $R^m$  . . . . . . . . . . . . . . . . . 103--111
                     Xing Zhang   Research on Performance Comprehensive
                                  Evaluation of Thermal Power Plant under
                                  Low-Carbon Economy . . . . . . . . . . . 112--119
                  Hui Zhang and   
                   Qing Guo and   
           Costas S. Iliopoulos   Computing the Minimum $\lambda$-Cover in
                                  Weighted Sequences . . . . . . . . . . . 120--127
              Huantong Geng and   
                Haifeng Zhu and   
                   Rui Xing and   
                    Tingting Wu   A Novel Hybrid Evolutionary Algorithm
                                  for Solving Multi-Objective Optimization
                                  Problems . . . . . . . . . . . . . . . . 128--136
       Huynh Thi Thanh Binh and   
               Pham Vu Long and   
            Nguyen Ngoc Dat and   
              Nguyen Sy Thai Ha   Heuristic Algorithms for Solving
                                  Survivable Network Design Problem with
                                  Simultaneous Unicast and Anycast Flows   137--144
                 Xueling Li and   
                    Min Zhu and   
                 Xiaolai Li and   
            Hong-Qiang Wang and   
                    Shulin Wang   Protein-Protein Binding Affinity
                                  Prediction Based on an SVR Ensemble  . . 145--151
                 Xiaoli Wei and   
                    Xue Shi and   
                Seongho Kim and   
              Craig McClain and   
                    Xiang Zhang   A Novel Two-Stage Alignment Method for
                                  Liquid Chromatography Mass
                                  Spectrometry-Based Metabolomics  . . . . 152--159
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7390, 2012

               Xiaoming Liu and   
                      Bo Li and   
                    Jun Liu and   
                     Xin Xu and   
                    Zhilin Feng   Mass Diagnosis in Mammography with
                                  Mutual Information Based Feature
                                  Selection and Support Vector Machine . . 1--8
                 Xuyang Lou and   
                    Qian Ye and   
                     Ke Lou and   
                    Baotong Cui   Mean Square Exponential Stability of
                                  Hybrid Neural Networks with Uncertain
                                  Switching Probabilities  . . . . . . . . 9--17
                  Ming-xuan Sun   Time-Varying Neurocomputing: An
                                  Iterative Learning Perspective . . . . . 18--26
                  Hong Wang and   
                    Huijuan Shi   Knowledge Reduction Based on Evidence
                                  Reasoning Theory in Interval Ordered
                                  Information Systems  . . . . . . . . . . 27--34
            Yong-Heng Zhang and   
                     Feng Zhang   Research on New Algorithm of
                                  Topic-Oriented Crawler and Duplicated
                                  Web Pages Detection  . . . . . . . . . . 35--42
                Xiaochun Lv and   
                     Hanming Gu   Direct Search Simulated Annealing for
                                  Nonlinear Global Optimization of
                                  Rayleigh Waves . . . . . . . . . . . . . 43--50
                  Ke-Fan Yu and   
                    Ke-Han Zeng   Four-Quadrant Division with HNN for
                                  Euclidean TSP  . . . . . . . . . . . . . 51--58
                 Hai-Qin Xu and   
            Yong-Sheng Ding and   
                    Hao Liu and   
                     Xiao-Li Li   An Immune Genetic Algorithm with
                                  Orthogonal Initialization for Analog
                                  Circuit Design . . . . . . . . . . . . . 59--66
                Yi-Kui Zhai and   
                    Ying Xu and   
                   Jun-Ying Gan   A Novel Artificial Fish Swarm Algorithm
                                  Based on Multi-objective Optimization    67--73
           Pawe\l Skrobanek and   
         Henryk Maciejewski and   
         Maciej Dobrowolski and   
              Olgierd Unold and   
                  Ewa Walkowicz   Comparison of Data Exploration Methods
                                  and the BLUP Method in Application to
                                  the Animals Breeding . . . . . . . . . . 74--81
             Shan-Wen Zhang and   
                Chuan-Lei Zhang   Two-Dimensional Locality Discriminant
                                  Projection for Plant Leaf Classification 82--88
                Zhan-Li Sun and   
              Ting-Ting Sun and   
                       Yang Liu   An Eigengene-Based Classifier Committee
                                  Learning Algorithm for Tumor
                                  Classification . . . . . . . . . . . . . 89--94
     Vitoantonio Bevilacqua and   
         Maurizio Triggiani and   
                 Vito Gallo and   
               Isabella Cafagna   An Expert System for an Innovative
                                  Discrimination Tool of Commercial Table
                                  Grapes . . . . . . . . . . . . . . . . . 95--102
                 Zhaowen Li and   
                    Ninghua Gao   Soft Rough Sets and Topologies . . . . . 103--110
                    Peng Lu and   
                    Chi Liu and   
                Daoren Yuan and   
                      Yusong Li   Sudden-Target Search Algorithm of
                                  Monitor Area Based on Visual Information
                                  Processing Model . . . . . . . . . . . . 111--118
                     Jie Yu and   
               Haihong Zhao and   
                   Fangfang Liu   User Real-Time Interest Prediction Based
                                  on Collaborative Filtering and
                                  Interactive Computing for Academic
                                  Recommendation . . . . . . . . . . . . . 119--127
                     Lu Cao and   
        Yoshinori Kobayashi and   
                 Yoshinori Kuno   Spatial-Based Feature for Locating
                                  Objects  . . . . . . . . . . . . . . . . 128--137
               Jian-Fei Luo and   
                Bao-Yuan Wu and   
                Qiu-Shi Lin and   
                   Fei Shen and   
                 Zhong-Cheng Wu   A Novel $F$-Pad for Handwriting Force
                                  Information Acquisition  . . . . . . . . 138--144
                    Jia Liu and   
                   Hua Zhou and   
                    Kai-yu Tong   Stability of a Predator-Prey Model with
                                  Modified Holling-Type II Functional
                                  Response . . . . . . . . . . . . . . . . 145--150
              Qing-Hua Zhou and   
                   Jing Cui and   
                       Juan Xie   Using Multiple Objective Functions in
                                  the Dynamic Model of Metabolic Networks
                                  of \em Escherichia coli  . . . . . . . . 151--158
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7391, 2012

        Dimitris Achlioptas and   
        Ricardo Menchaca-Mendez   Unsatisfiability Bounds for Random CSPs
                                  from an Energetic Interpolation Method   1--12
                   Anil Ada and   
      Arkadev Chattopadhyay and   
                 Omar Fawzi and   
                  Phuong Nguyen   The NOF Multiparty Communication
                                  Complexity of Composed Functions . . . . 13--24
            Andris Ambainis and   
         Art\=urs Ba\vckurs and   
            Kaspars Balodis and   
       Dmitrijs Krav\vcenko and   
                   Raitis Ozols   Quantum Strategies Are Better Than
                                  Classical in Almost Any XOR Game . . . . 25--37
                 Yossi Azar and   
                    Iftah Gamzu   Efficient Submodular Function
                                  Maximization under Linear Packing
                                  Constraints  . . . . . . . . . . . . . . 38--50
 László Babai and   
            Paolo Codenotti and   
                   Youming Qiao   Polynomial-Time Isomorphism Test for
                                  Groups with No Abelian Normal Subgroups  51--62
       Maria Florina Balcan and   
                   Yingyu Liang   Clustering under Perturbation Resilience 63--74
           Siddharth Barman and   
                Seeun Umboh and   
              Shuchi Chawla and   
                    David Malec   Secretary Problems with Convex Costs . . 75--87
               Joshua Baron and   
           Rafail Ostrovsky and   
                  Ivan Visconti   Nearly Simultaneously Resettable
                                  Black-Box Zero Knowledge . . . . . . . . 88--99
                  Bruno Bauwens   Complexity of Complexity and Maximal
                                  Plain versus Prefix-Free Kolmogorov
                                  Complexity . . . . . . . . . . . . . . . 100--108
            Aditya Bhaskara and   
             Moses Charikar and   
         Rajsekar Manokaran and   
       Aravindan Vijayaraghavan   On Quadratic Programming with a Ratio
                                  Objective  . . . . . . . . . . . . . . . 109--120
             Prosenjit Bose and   
  Sébastien Collette and   
             Rolf Fagerberg and   
               Stefan Langerman   De-amortizing Binary Search Trees  . . . 121--132
             Karl Bringmann and   
        Konstantinos Panagiotou   Efficient Sampling Methods for Discrete
                                  Distributions  . . . . . . . . . . . . . 133--144
             Niv Buchbinder and   
        Joseph (Seffi) Naor and   
                    R. Ravi and   
                    Mohit Singh   Approximation Algorithms for Online
                                  Weighted Rank Function Maximization
                                  under Matroid Constraints  . . . . . . . 145--156
             Jaroslaw Byrka and   
                Bartosz Rybicki   Improved LP-Rounding Approximation
                                  Algorithm for $k$-level Uncapacitated
                                  Facility Location  . . . . . . . . . . . 157--169
      Deeparnab Chakrabarty and   
                    Zhiyi Huang   Testing Coverage Functions . . . . . . . 170--181
          T.-H. Hubert Chan and   
                 Mingfei Li and   
                        Li Ning   Sparse Fault-Tolerant Spanners for
                                  Doubling Metrics with Bounded
                                  Hop-Diameter or Degree . . . . . . . . . 182--193
             Moses Charikar and   
                         Shi Li   A Dependent LP-Rounding Approach for the
                                  $k$-Median Problem . . . . . . . . . . . 194--205
            Chandra Chekuri and   
                  Alina Ene and   
                   Ali Vakilian   Node-Weighted Network Design in Planar
                                  and Minor-Closed Families of Graphs  . . 206--217
              Danny Z. Chen and   
                    Haitao Wang   Computing the Visibility Polygon of an
                                  Island in a Polygonal Domain . . . . . . 218--229
             Rajesh Chitnis and   
                Marek Cygan and   
   Mohammadtaghi Hajiaghayi and   
             Dániel Marx   Directed Subset Feedback Vertex Set Is
                                  Fixed-Parameter Tractable  . . . . . . . 230--241
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7392, 2012

  Riccardo Colini-Baldeschi and   
           Monika Henzinger and   
           Stefano Leonardi and   
             Martin Starnberger   On Multiple Keyword Sponsored Search
                                  Auctions with Budgets  . . . . . . . . . 1--12
                   Gilles Dowek   A Theory Independent Curry--De
                                  Bruijn--Howard Correspondence  . . . . . 13--15
                    David Harel   Standing on the Shoulders of a Giant . . 16--22
                    Kohei Honda   Session Types and Distributed Computing  23--23
             Daniel A. Spielman   Algorithms, Graph Theory, and the
                                  Solution of Laplacian Linear Equations   24--26
          Berthold Vöcking   Randomized Mechanisms for Multi-unit
                                  Auctions . . . . . . . . . . . . . . . . 27--29
                 Luca Aceto and   
             Arnaud Carayol and   
  Zoltán Ésik and   
Anna Ingólfsdóttir   Algebraic Synchronization Trees and
                                  Processes  . . . . . . . . . . . . . . . 30--41
                Rajeev Alur and   
                 Loris D'Antoni   Streaming Tree Transducers . . . . . . . 42--53
              Pablo Arrighi and   
                   Gilles Dowek   Causal Graph Dynamics  . . . . . . . . . 54--66
            Albert Atserias and   
                     Anuj Dawar   Degree Lower Bounds of Tower-Type for
                                  Approximating Formulas with Parity
                                  Quantifiers  . . . . . . . . . . . . . . 67--78
           Michael Benedikt and   
             Pierre Bourhis and   
               Pierre Senellart   Monadic Datalog Containment  . . . . . . 79--91
       Miko\laj Boja\'nczyk and   
               S\lawomir Lasota   A Machine-Independent Characterization
                                  of Timed Languages . . . . . . . . . . . 92--103
       Miko\laj Boja\'nczyk and   
                   Thomas Place   Regular Languages of Infinite Trees That
                                  Are Boolean Combinations of Open Sets    104--115
       Miko\laj Boja\'nczyk and   
                   Thomas Place   Toward Model Theory with Data Values . . 116--127
            Patricia Bouyer and   
             Nicolas Markey and   
                    Ocan Sankur   Robust Reachability in Timed Automata: A
                                  Game-Based Approach  . . . . . . . . . . 128--140
Tomá\vs Brázdil and   
    Antonín Ku\vcera and   
        Petr Novotný and   
               Dominik Wojtczak   Minimizing Expected Termination Time in
                                  One-Counter Markov Decision Processes    141--152
          Christopher Broadbent   Prefix Rewriting for Nested-Words and
                                  Collapsible Pushdown Automata  . . . . . 153--164
            Chris Broadbent and   
             Arnaud Carayol and   
              Matthew Hague and   
                  Olivier Serre   A Saturation Method for Collapsible
                                  Pushdown Systems . . . . . . . . . . . . 165--176
             Volker Diekert and   
         Manfred Kufleitner and   
            Klaus Reinhardt and   
                  Tobias Walter   Regular Languages Are Church--Rosser
                                  Congruential . . . . . . . . . . . . . . 177--188
              John Fearnley and   
                    Sven Schewe   Time and Parallelizability Results for
                                  Parity Games with Bounded Treewidth  . . 189--200
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7393, 2012

               Robert Demolombe   Causality in the Context of Multiple
                                  Agents . . . . . . . . . . . . . . . . . 1--15
    Silvano Colombo Tosatto and   
                   Guido Boella   Visualizing Normative Systems: An
                                  Abstract Approach  . . . . . . . . . . . 16--30
                  Paolo Turrini   Agreements as Norms  . . . . . . . . . . 31--45
          Guido Governatori and   
            Antonino Rotolo and   
                  Erica Calardo   Possible World Semantics for Defeasible
                                  Deontic Logic  . . . . . . . . . . . . . 46--60
   Ricardo Gonçalves and   
José Júlio Alferes   An Embedding of Input-Output Logic in
                                  Deontic Logic Programs . . . . . . . . . 61--75
                Louwe B. Kuijer   Sanction Semantics and Contrary-to-Duty
                                  Obligations  . . . . . . . . . . . . . . 76--90
                     Dov Gabbay   Temporal Deontic Logic for the
                                  Generalised Chisholm Set of Contrary to
                                  Duty Obligations . . . . . . . . . . . . 91--107
                Emiliano Lorini   On the Logical Foundations of Moral
                                  Agency . . . . . . . . . . . . . . . . . 108--122
       Régis Riveret and   
            Antonino Rotolo and   
                Giovanni Sartor   Norms and Learning in Probabilistic
                                  Logic-Based Agents . . . . . . . . . . . 123--138
                Olivier Roy and   
    Albert J. J. Anglberger and   
                 Norbert Gratzl   The Logic of Obligation as Weakest
                                  Permission . . . . . . . . . . . . . . . 139--150
    Christian Straßer and   
               Mathieu Beirlaen   An Andersonian Deontic Logic with
                                  Contextualized Sanctions . . . . . . . . 151--169
             Andreas Herzig and   
              Tiago de Lima and   
                Emiliano Lorini   A Computationally Grounded Dynamic Logic
                                  of Agency, with an Application to Legal
                                  Actions  . . . . . . . . . . . . . . . . 170--183
              Piotr Kulicki and   
                  Robert Trypuz   A Deontic Action Logic with Sequential
                                  Composition of Actions . . . . . . . . . 184--198
               Jan Broersen and   
                 Dov Gabbay and   
         Leendert van der Torre   Discussion Paper: Changing Norms Is
                                  Changing Obligation Change . . . . . . . 199--214
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7394, 2012

                      Anonymous   Front Matter . . . . . . . . . . . . . . 1--1
          Hieu Cuong Nguyen and   
           Stefan Katzenbeisser   Robust Resampling Detection in Digital
                                  Images . . . . . . . . . . . . . . . . . 3--15
           Karl Kümmel and   
            Tobias Scheidat and   
            Claus Vielhauer and   
                  Jana Dittmann   Feature Selection on Handwriting
                                  Biometrics: Security Aspects of
                                  Artificial Forgeries . . . . . . . . . . 16--25
          Saloomeh Shariati and   
     François Koeune and   
François-Xavier Standaert   Security Analysis of Image-Based PUFs
                                  for Anti-counterfeiting  . . . . . . . . 26--38
        Mouhamadou L. Diong and   
                Patrick Bas and   
         Chloé Pelle and   
                   Wadih Sawaya   Document Authentication Using $2$D
                                  Codes: Maximizing the Decoding
                                  Performance Using Statistical Inference  39--54
             Patrik Bichsel and   
              Jan Camenisch and   
             Bart De Decker and   
                 Jorn Lapon and   
               Vincent Naessens   Data-Minimizing Authentication Goes
                                  Mobile . . . . . . . . . . . . . . . . . 55--71
                   Zhuo Wei and   
                 Xuhua Ding and   
         Robert Huijie Deng and   
                    Yongdong Wu   No Tradeoff between Confidentiality and
                                  Performance: An Analysis on H.264/SVC
                                  Partial Encryption . . . . . . . . . . . 72--86
                      Anonymous   Front Matter . . . . . . . . . . . . . . 87--87
           Andrey Makrushin and   
          Tobias Kiertscher and   
             Robert Fischer and   
               Stefan Gruhn and   
                Claus Vielhauer   Computer-Aided Contact-Less Localization
                                  of Latent Fingerprints in Low-Resolution
                                  CWL Scans  . . . . . . . . . . . . . . . 89--98
             Graeme Horsman and   
          Christopher Laing and   
                   Paul Vickers   A Method for Reducing the Risk of Errors
                                  in Digital Forensic Investigations . . . 99--106
            Tobias Scheidat and   
           Karl Kümmel and   
                Claus Vielhauer   Short Term Template Aging Effects on
                                  Biometric Dynamic Handwriting
                                  Authentication Performance . . . . . . . 107--116
             Roland Schmitz and   
                  Shujun Li and   
            Christos Grecos and   
                  Xinpeng Zhang   A New Approach to Commutative
                                  Watermarking-Encryption  . . . . . . . . 117--130
            Steffen Wendzel and   
               Jörg Keller   Systematic Engineering of Control
                                  Protocols for Covert Channels  . . . . . 131--144
                 Elke Franz and   
             Stefan Pfennig and   
           André Fischer   Efficiency of Secure Network Coding
                                  Schemes  . . . . . . . . . . . . . . . . 145--159
                      Amar Siad   A New Approach for Private Searches on
                                  Public-Key Encrypted Data  . . . . . . . 160--173
               M. Maachaoui and   
           A. Abou El Kalam and   
                 C. Fraboul and   
                 A. Ait Ouahman   Multi-level Authentication Based Single
                                  Sign-On for IMS Services . . . . . . . . 174--187
                      Anonymous   Front Matter . . . . . . . . . . . . . . 189--189
                Patrick Bas and   
                    Teddy Furon   Are 128 Bits Long Keys Possible in
                                  Watermarking?  . . . . . . . . . . . . . 191--191
            William Perrizo and   
                   Arjun G. Roy   Predicate-Tree Based Pretty Good Privacy
                                  of Data  . . . . . . . . . . . . . . . . 192--194
                  Hanno Langweg   OOXML File Analysis of the July 22nd
                                  Terrorist Manual . . . . . . . . . . . . 195--197
         Milica Milutinovic and   
           Vincent Naessens and   
                 Bart De Decker   Privacy-Preserving Scheduling Mechanism
                                  for eHealth Systems  . . . . . . . . . . 198--200
      Jürgen Fuß and   
             Wolfgang Kastl and   
           Robert Kolmhofer and   
     Georg Schönberger and   
                    Florian Wex   Cuteforce Analyzer: Implementing a
                                  Heterogeneous Bruteforce Cluster with
                                  Specialized Coprocessors . . . . . . . . 201--203
André Zúquete and   
              Pedro Correia and   
                   Miguel Rocha   A Framework for Enforcing User-Based
                                  Authorization Policies on Packet Filter
                                  Firewalls  . . . . . . . . . . . . . . . 204--206
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7395, 2012

                 Arno Bastenhof   Polarized Montagovian Semantics for the
                                  Lambek--Grishin Calculus . . . . . . . . 1--16
        Denis Béchet and   
         Alexander Dikovsky and   
                    Annie Foret   Two Models of Learning Iterated
                                  Dependencies . . . . . . . . . . . . . . 17--32
                 Jeroen Bransen   The Lambek--Grishin Calculus Is
                                  NP-Complete  . . . . . . . . . . . . . . 33--49
              Berthold Crysmann   Resumption and Island-Hood in Hausa  . . 50--65
           Michael Dekhtyar and   
         Alexander Dikovsky and   
                   Boris Karlov   Iterated Dependencies and Kleene
                                  Iteration  . . . . . . . . . . . . . . . 66--81
              Denys Duchier and   
          Thi-Bich-Hanh Dao and   
         Yannick Parmentier and   
                  Willy Lesaint   Property Grammar Parsing Seen as a
                                  Constraint Optimization Problem  . . . . 82--96
                    Thomas Graf   Reference-Set Constraints as Linear Tree
                                  Transductions via Controlled Optimality
                                  Systems  . . . . . . . . . . . . . . . . 97--113
               Scott Martin and   
                   Carl Pollard   Hyperintensional Dynamic Semantics . . . 114--129
        Vedrana Mihali\vcek and   
                   Carl Pollard   Distinguishing Phenogrammar from
                                  Tectogrammar Simplifies the Analysis of
                                  Interrogatives . . . . . . . . . . . . . 130--145
               Glyn Morrill and   
          Oriol Valentín   Generalized Discontinuity  . . . . . . . 146--161
          Sylvain Pogodalla and   
               Florent Pompigne   Controlling Extraction in Abstract
                                  Categorial Grammars  . . . . . . . . . . 162--177
                   Byeong-Uk Yi   Plural Quantifications and Generalized
                                  Quantifiers  . . . . . . . . . . . . . . 178--191
              Ryo Yoshinaka and   
                Alexander Clark   Polynomial Time Learning of Some
                                  Multiple Context-Free Languages with a
                                  Minimally Adequate Teacher . . . . . . . 192--207
                    Thomas Graf   Locality and the Complexity of
                                  Minimalist Derivation Tree Languages . . 208--227
                    Petr Homola   Building a Formal Grammar for a
                                  Polysynthetic Language . . . . . . . . . 228--242
           András Kornai   Eliminating Ditransitives  . . . . . . . 243--261
               Stepan Kuznetsov   Lambek Grammars with the Unit  . . . . . 262--266
                Hans Leiß   Resolving Plural Ambiguities by Type
                                  Reconstruction . . . . . . . . . . . . . 267--286
                   Scott Martin   Weak Familiarity and Anaphoric
                                  Accessibility in Dynamic Semantics . . . 287--306
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7396, 2012

            Barbara Pernici and   
           Cinzia Cappiello and   
        Maria Grazia Fugini and   
              Pierluigi Plebani   Setting Energy Efficiency Goals in Data
                                  Centers: The GAMES Approach  . . . . . . 1--12
             Sonja Klingert and   
               Andreas Berl and   
               Michael Beck and   
                Radu Serban and   
              Marco di Girolamo   Sustainable Energy Management in Data
                                  Centers through Collaboration  . . . . . 13--24
        Micha vor dem Berge and   
           Georges Da Costa and   
            Andreas Kopecki and   
                 Ariel Oleksiak   Modeling and Simulation of Data Center
                                  Energy-Efficiency in CoolEmAll . . . . . 25--36
               Wolfgang Ziegler   SLAs for Energy-Efficient Data Centres:
                                  The Standards-Based Approach of the
                                  OPTIMIS Project  . . . . . . . . . . . . 37--46
                Ywes Israel and   
                 Thomas Leitert   The GreenIT DC-Benchmarking Tool: From
                                  Scientific Theory to Real Life . . . . . 47--53
            Christian Bunse and   
             Sonja Klingert and   
                 Thomas Schulze   GreenSLAs: Supporting Energy-Efficiency
                                  through Contracts  . . . . . . . . . . . 54--68
     Vlasia Anagnostopoulou and   
              Susmit Biswas and   
            Heba Saadeldeen and   
          Ricardo Bianchini and   
                       Tao Yang   Power-Aware Resource Allocation for CPU-
                                  and Memory-Intense Internet Services . . 69--80
             Marco Guazzone and   
             Cosimo Anglano and   
               Massimo Canonico   Exploiting VM Migration for the
                                  Automated Power and Performance
                                  Management of Green Cloud Computing
                                  Systems  . . . . . . . . . . . . . . . . 81--92
             Drazen Lucanin and   
             Michael Maurer and   
              Toni Mastelic and   
                  Ivona Brandic   Energy Efficient Service Delivery in
                                  Clouds in Compliance with the Kyoto
                                  Protocol . . . . . . . . . . . . . . . . 93--104
         Mikko Pervilä and   
             Mikko Rantanen and   
              Jussi Kangasharju   Implementation and Evaluation of a Wired
                                  Data Center Sensor Network . . . . . . . 105--116
               Edward Curry and   
            Souleiman Hasan and   
                 Mark White and   
                    Hugh Melvin   An Environmental Chargeback for Data
                                  Center and Cloud Computing Consumers . . 117--128
             Dang Minh Quan and   
               Andrey Somov and   
                Corentin Dupont   Energy Usage and Carbon Emission
                                  Optimization Mechanism for Federated
                                  Data Centers . . . . . . . . . . . . . . 129--140
Ghislain Landry Tsafack Chetsa and   
            Laurent Lefevre and   
          Jean-Marc Pierson and   
                 Patricia Stolf   DNA-Inspired Scheme for Building the
                                  Energy Profile of HPC Systems  . . . . . 141--152
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7397, 2012

            Hyoungshick Kim and   
                  John Tang and   
                  Ross Anderson   Social Authentication: Harder Than It
                                  Looks  . . . . . . . . . . . . . . . . . 1--15
             Sonia Chiasson and   
                Chris Deschamps   The MVP Web-Based Authentication
                                  Framework  . . . . . . . . . . . . . . . 16--24
             Joseph Bonneau and   
       Sören Preibusch and   
                  Ross Anderson   A Birthday Present Every Eleven Wallets?
                                  The Security of Customer-Chosen Banking
                                  PINs . . . . . . . . . . . . . . . . . . 25--40
                Tyler Moore and   
                    Jie Han and   
                Richard Clayton   The Postmodern Ponzi Scheme: Empirical
                                  Analysis of High-Yield Investment
                                  Programs . . . . . . . . . . . . . . . . 41--56
               Dan Bogdanov and   
             Riivo Talviste and   
                  Jan Willemson   Deploying Secure Multi-Party Computation
                                  for Financial Data Analysis  . . . . . . 57--64
         Christopher Thorpe and   
               Steven R. Willis   Cryptographic Rule-Based Trading . . . . 65--72
                     Zi Lin and   
             Denis Foo Kune and   
                Nicholas Hopper   Efficient Private Proximity Testing with
                                  GSM Location Sketches  . . . . . . . . . 73--88
           Benjamin Johnson and   
                John Chuang and   
                Jens Grossklags   Metrics for Measuring ISP Badness: The
                                  Case of Spam . . . . . . . . . . . . . . 89--97
                   Tao Wang and   
                Kevin Bauer and   
                   Clara Forero   Congestion-Aware Path Selection for Tor  98--113
              Scott Wolchok and   
               Eric Wustrow and   
                    Dawn Isabel   Attacking the Washington, D.C. Internet
                                  Voting System  . . . . . . . . . . . . . 114--128
              Rainer Böhme   Security Audits Revisited  . . . . . . . 129--147
            Attila A. Yavuz and   
                  Peng Ning and   
              Michael K. Reiter   Efficient, Compromise Resilient and
                                  Append-Only Cryptographic Schemes for
                                  Secure Audit Logging . . . . . . . . . . 148--163
                Morten Dahl and   
                  Chao Ning and   
                     Tomas Toft   On Secure Two-Party Integer Division . . 164--178
            Rafik Chaabouni and   
              Helger Lipmaa and   
                Bingsheng Zhang   A Non-interactive Range Proof with
                                  Constant Communication . . . . . . . . . 179--199
          T.-H. Hubert Chan and   
                 Elaine Shi and   
                      Dawn Song   Privacy-Preserving Stream Aggregation
                                  with Fault Tolerance . . . . . . . . . . 200--214
                Daniel Slamanig   Dynamic Accumulator Based Discretionary
                                  Access Control for Outsourced Storage
                                  with Unlinkable Access . . . . . . . . . 215--222
            Mariana Raykova and   
                  Hang Zhao and   
             Steven M. Bellovin   Privacy Enhanced Access Control for
                                  Outsourced Data Sharing  . . . . . . . . 223--238
      Andres Molina-Markham and   
             George Danezis and   
                       Kevin Fu   Designing Privacy-Preserving Smart
                                  Meters with Low-Cost Microcontrollers    239--253
              Benjamin Mood and   
                 Lara Letaw and   
                   Kevin Butler   Memory-Efficient Garbled Circuit
                                  Generation for Mobile Devices  . . . . . 254--268
            Payman Mohassel and   
                Salman Niksefat   Oblivious Decision Programs from
                                  Oblivious Transfer: Efficient Reductions 269--284
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7398, 2012

             Joseph Bonneau and   
              Ekaterina Shutova   Linguistic Properties of Multi-word
                                  Passphrases  . . . . . . . . . . . . . . 1--12
             Marcelo Carlos and   
                  Geraint Price   Understanding the Weaknesses of
                                  Human-Protocol Interaction . . . . . . . 13--26
             Alexei Czeskis and   
                Jacob Appelbaum   High Stakes: Designing a Privacy
                                  Preserving Registry  . . . . . . . . . . 27--43
             Alexei Czeskis and   
                   Dirk Balfanz   Protected Login  . . . . . . . . . . . . 44--52
                     Zheng Dong   Enabling Users to Self-manage Networks:
                                  Collaborative Anomaly Detection in
                                  Wireless Personal Area Networks  . . . . 53--67
        Patrick Gage Kelley and   
             Sunny Consolvo and   
        Lorrie Faith Cranor and   
               Jaeyeon Jung and   
                   Norman Sadeh   A Conundrum of Permissions: Installing
                                  Applications on an Android Smartphone    68--79
Fanny Lalonde Lévesque and   
           Carlton R. Davis and   
   José M. Fernandez and   
                 Sonia Chiasson   Methodology for a Field Study of
                                  Anti-malware Software  . . . . . . . . . 80--85
               Sameer Patil and   
               Yann Le Gall and   
                Adam J. Lee and   
                    Apu Kapadia   My Privacy Policy: Exploring End-user
                                  Specification of Free-form Location
                                  Access Rules . . . . . . . . . . . . . . 86--97
             Andrew G. West and   
              Pedram Hayati and   
          Vidyasagar Potdar and   
                      Insup Lee   Spamming for Science: Active Measurement
                                  in Web 2.0 Abuse Research  . . . . . . . 98--111
             Michael Bailey and   
             Erin Kenneally and   
                 David Dittrich   A Refined Ethical Impact Assessment Tool
                                  and a Case Study of Its Application  . . 112--123
              Serge Egelman and   
             Joseph Bonneau and   
             Sonia Chiasson and   
             David Dittrich and   
               Stuart Schechter   It's Not Stealing If You Need It: a
                                  Panel on the Ethics of Performing
                                  Research Using Public Data of Illicit
                                  Origin . . . . . . . . . . . . . . . . . 124--132
                  Ross Anderson   Ethics Committees and IRBs: Boon, or
                                  Bane, or More Research Needed? . . . . . 133--135
   José M. Fernandez and   
          Andrew S. Patrick and   
                 Lenore D. Zuck   Ethical and Secure Data Sharing across
                                  Borders  . . . . . . . . . . . . . . . . 136--140
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 7399, 2012

            Samson Abramsky and   
               Jonathan Zvesper   From Lawvere to Brandenburger-Keisler:
                                  Interactive Forms of Diagonalization and
                                  Self-reference . . . . . . . . . . . . . 1--19
      Marcello M. Bonsangue and   
                 Jan Rutten and   
                   Joost Winter   Defining Context-Free Power Series
                                  Coalgebraically  . . . . . . . . . . . . 20--39
            Pawe\l Soboci\'nski   Relational Presheaves as Labelled
                                  Transition Systems . . . . . . . . . . . 40--50
Ji\vrí Adámek and   
              Stefan Milius and   
               Lawrence S. Moss   On Finitary Functors and Their
                                  Presentations  . . . . . . . . . . . . . 51--70
              Giorgio Bacci and   
                 Marino Miculan   Structural Operational Semantics for
                                  Continuous State Probabilistic Processes 71--89
           Vincenzo Ciancia and   
                     Yde Venema   Stream Automata Are Coalgebras . . . . . 90--108
                Bart Jacobs and   
            Alexandra Silva and   
                   Ana Sokolova   Trace Semantics via Determinization  . . 109--129
             Alexander Kurz and   
         Daniela Petri\csan and   
                   Paula Severi   An Alpha-Corecursion Principle for the
                                  Infinitary Lambda Calculus . . . . . . . 130--149
             Johannes Marti and   
                     Yde Venema   Lax Extensions of Coalgebra Functors . . 150--169
    Eleftherios Matsikoudis and   
                  Edward A. Lee   From Transitions to Executions . . . . . 170--190
                 Dusko Pavlovic   Tracing the Man in the Middle in
                                  Monoidal Categories  . . . . . . . . . . 191--217
               Celia Picard and   
                  Ralph Matthes   Permutations in Coinductive Graph
                                  Representation . . . . . . . . . . . . . 218--237
                 Toby Wilkinson   Internal Models for Coalgebraic Modal
                                  Logics . . . . . . . . . . . . . . . . . 238--258
                      Anonymous   Back Matter  . . . . . . . . . . . . . . ??
                      Anonymous   Front Matter . . . . . . . . . . . . . . ??