Abstract is missing.
- XCCS Diagram to CCS Script Conversion AlgorithmKrzysztof Balicki. 1-12 [doi]
- A Classifier Based on a Decision Tree with Verifying CutsJan G. Bazan, Stanislawa Bazan-Socha, Sylwia Buregwa-Czuma, Lukasz Dydo, Wojciech Rzasa, Andrzej Skowron. 13-21 [doi]
- Classifiers for Behavioral Patterns Identification Induced from Huge Temporal DataJan G. Bazan, Marcin Szpyrka, Adam Szczur, Lukasz Dydo, Hubert Wojtowicz. 22-33 [doi]
- Programming Self-Assembly of DNA TilesMarco Bellia, M. Eugenia Occhiuto. 34-45 [doi]
- A Function Elimination Method for Checking Satisfiability of Arithmetical LogicsValentina Castiglioni, Ruggero Lanotte, Simone Tini. 46-57 [doi]
- Exploiting Order Dependencies on Primary Keys for OptimizationMichal Chromiak, Piotr Wisniewski, Krzysztof Stencel. 58-68 [doi]
- Distributed Termination Detection by Counting AgentNatalia Garanina, Evgeny Bodin. 69-79 [doi]
- Differential Privacy and SecurityDamas P. Gruska. 80-91 [doi]
- Verifying Strategies in Dialogue GamesMagdalena Kacprzak, Anna Sawicka, Katarzyna Budzynska, Marcin Dziubinski. 92-100 [doi]
- An Upper Bound for the Reachability Problem of Safe, Elementary HornetsMichael Köhler-Bußmeier, Frank Heitmann. 101-112 [doi]
- C-NBC: Neighborhood-Based Clustering with ConstraintsPiotr Lasek. 113-120 [doi]
- Relative Constraints as FeaturesPiotr Lasek, Krzysztof Lasek. 121-125 [doi]
- Controlling Petri Net Behavior Using Priorities for TransitionsIrina A. Lomazova, Louchka Popova-Zeugmann. 126-137 [doi]
- Incorporating BDI-Agent Concepts into Object-Oriented ProgrammingBerndt Müller, Jack Betts. 138-149 [doi]
- A Tractable Rule Language in the Modal and Description Logics that Combine CPDL with Regular Grammar LogicLinh Anh Nguyen. 150-163 [doi]
- New Inference Algorithms Based on Rules PartitionAgnieszka Nowak-Brzezinska, Roman Siminski. 164-175 [doi]
- Mining Real-Estate Listings Based on Decision Systems over Ontological GraphsKrzysztof Pancerz, Olga Mich. 176-179 [doi]
- Timed Transition System Models for Programming Physarum MachinesKrzysztof Pancerz, Andrew Schumann. 180-183 [doi]
- Multi-Agent Heterogeneous Intrusion Detection SystemMikulás Pataky, Damas P. Gruska. 184-195 [doi]
- Coordination Algorithm in Hierarchical Structure of the Learning Process of Artificial Neural NetworkStanislaw Placzek, Bijaya Adhikari. 196-207 [doi]
- Methods of Calculating the Strength of Coalition in a Dispersed Decision Support System with the Stage of Negotiations - a Study of Medical DataMalgorzata Przybyla-Kasperek, Alicja Wakulicz-Deja. 208-219 [doi]
- Fractional Genetic Programming with Probability Density DataArtur Rataj. 220-231 [doi]
- Cut Points in PEGRoman R. Redziejowski. 232-236 [doi]
- Inverted Fuzzy Implications in Approximate ReasoningZbigniew Suraj, Agnieszka Lasek, Piotr Lasek. 237-244 [doi]
- Methods of Translation of Petri Nets to NuSMV LanguageMarcin Szpyrka, Agnieszka Biernacka, Jerzy Biernacki. 245-256 [doi]
- Time Process Equivalences for Time Petri NetsDmitriy Bushin, Irina Virbitskaite. 257-268 [doi]
- Traffic-Related Knowledge Acquired by Interaction with ExpertsPiotr Wasilewski, Pawel Gora. 269-280 [doi]
- SAT-Based Bounded Model Checking for Weighted Deontic Interpreted Systems (Extended Abstract)Bozena Wozna-Szczesniak. 281-292 [doi]
- A Comparison of SAT-Based and SMT-Based Bounded Model Checking Methods for ECTLAgnieszka Zbrzezny, Andrzej Zbrzezny. 293-300 [doi]
- System Monitoring with Extended Message Sequence Chart (Extended Abstract)Agnieszka Zbrzezny, Andrzej Zbrzezny. 301-307 [doi]
- Granular Floor Plan Representation for Evacuation ModelingWojciech Swieboda, Van Mai Nguyen Thi, Hung Son Nguyen. 308-310 [doi]
- Two Problems with Distributed Systems: Data Access Control and Memory SheringLudwik Czaja. 311-319 [doi]