0 | -- | 0 | Ludwik Czaja, Wojciech Penczek, Krzysztof Stencel. Preface |
1 | -- | 18 | Jan G. Bazan, Stanislawa Bazan-Socha, Sylwia Buregwa-Czuma, Lukasz Dydo, Wojciech Rzasa, Andrzej Skowron. A Classifier Based on a Decision Tree with Verifying Cuts |
19 | -- | 34 | Jan G. Bazan, Adam Szczur, Lukasz Dydo, Hubert Wojtowicz, Marcin Szpyrka. Classifiers for Behavioral Patterns Identification Induced from Huge Temporal Data |
35 | -- | 49 | Marco Bellia, M. Eugenia Occhiuto. Programming Self-Assembly of DNA Tiles |
51 | -- | 71 | Valentina Castiglioni, Ruggero Lanotte, Simone Tini. A Function Elimination Method for Checking Satisfiability of Arithmetical Logics |
73 | -- | 87 | Damas P. Gruska. Differential Privacy and Security |
89 | -- | 100 | Michael Köhler-Bußmeier, Frank Heitmann. An Upper Bound for the Reachability Problem of Safe, Elementary Hornets |
101 | -- | 112 | Irina A. Lomazova, Louchka Popova-Zeugmann. Controlling Petri Net Behavior using Priorities for Transitions |
113 | -- | 139 | Linh Anh Nguyen. A Tractable Rule Language in the Modal and Description Logic that Combines CPDL with Regular Grammar Logic |
141 | -- | 149 | Roman R. Redziejowski. Cut Points in PEG |
151 | -- | 171 | Zbigniew Suraj, Agnieszka Lasek, Piotr Lasek. Inverted Fuzzy Implications in Approximate Reasoning |
173 | -- | 205 | Bozena Wozna-Szczesniak. SAT-based Bounded Model Checking for Weighted Deontic Interpreted Systems |