Abstract is missing.
- Theory of Multi Core Hypervisor VerificationErnie Cohen, Wolfgang J. Paul, Sabine Schmaltz. 1-27 [doi]
- Software Components in Computer Assisted Living?Frantisek Plasil, Tomás Bures. 28 [doi]
- Engineering Algorithms for Large Data SetsPeter Sanders. 29-32 [doi]
- Core Stability in Hedonic Coalition FormationGerhard J. Woeginger. 33-50 [doi]
- Software Production: A New Paradigm for Software Engineering ResearchSjaak Brinkkemper. 51 [doi]
- A Model of the Commit Size Distribution of Open SourceCarsten Kolassa, Dirk Riehle, Michel A. Salim. 52-66 [doi]
- ISICIL: Semantics and Social Networks for Business IntelligenceMichel Buffa, Nicolas Delaforge, Guillaume Erétéo, Fabien Gandon, Alain Giboin, Freddy Limpens. 67-85 [doi]
- n-ary RelationsAldo Gangemi, Valentina Presutti. 86-105 [doi]
- Cognition-Enabled Autonomous Robot Control for the Realization of Home Chore Task IntelligenceMichael Beetz. 106 [doi]
- Searching Things in Large Sets of ImagesArnold W. M. Smeulders. 107 [doi]
- SOS Rule Formats for Idempotent Terms and Idempotent Unary OperatorsLuca Aceto, Eugen-Ioan Goriac, Anna Ingólfsdóttir. 108-120 [doi]
- Worst Case Analysis of Non-local GamesAndris Ambainis, Arturs Backurs, Kaspars Balodis, Agnis Skuskovniks, Juris Smotrovs, Madars Virza. 121-132 [doi]
- Two-Dimensional Rational Automata: A Bridge Unifying One- and Two-Dimensional Language TheoryMarcella Anselmo, Dora Giammarresi, Maria Madonia. 133-145 [doi]
- Flow Decompositions in External MemoryMaxim A. Babenko. 146-156 [doi]
- Improved Approximations for Ordered TSP on Near-Metric Graphs, Hans-Joachim Böckenhauer, Monika Steinová. 157-168 [doi]
- Asymptotic Risk Analysis for Trust and Reputation SystemsMichele Boreale, Alessandro Celestini. 169-181 [doi]
- Being Caught between a Rock and a Hard Place in an Election - Voter Deterrence by Deletion of CandidatesBritta Dorn, Dominikus Krüger. 182-193 [doi]
- Collective Additive Tree Spanners of Bounded Tree-Breadth Graphs with Generalizations and ConsequencesFeodor F. Dragan, Muad Abu-Ata. 194-206 [doi]
- Weak Arithmetic Completeness of Object-Oriented First-Order Assertion NetworksStijn de Gouw, Frank S. de Boer, Wolfgang Ahrendt, Richard Bubel. 207-219 [doi]
- Generalising and Unifying SLUR and Unit-Refutation CompletenessMatthew Gwynne, Oliver Kullmann. 220-232 [doi]
- On Structural Parameterizations for the 2-Club ProblemSepp Hartung, Christian Komusiewicz, André Nichterlein. 233-243 [doi]
- On Languages of One-Dimensional Overlapping TilesDavid Janin. 244-256 [doi]
- An Exact Algorithm to Check the Existence of (Elementary) Paths and a Generalisation of the Cut Problem in Graphs with Forbidden TransitionsMamadou Moustapha Kanté, Christian Laforest, Benjamin Momège. 257-267 [doi]
- Polynomial Time Algorithms for Computing a Minimum Hull Set in Distance-Hereditary and Chordal GraphsMamadou Moustapha Kanté, Lhouari Nourine. 268-279 [doi]
- Permuted Pattern Matching on Multi-track StringsTakashi Katsura, Kazuyuki Narisawa, Ayumi Shinohara, Hideo Bannai, Shunsuke Inenaga. 280-291 [doi]
- Online and Quasi-online Colorings of Wedges and IntervalsBalázs Keszegh, Nathan Lemons, Dömötör Pálvölgyi. 292-306 [doi]
- Logic Characterization of Invisibly Structured Languages: The Case of Floyd LanguagesVioletta Lonati, Dino Mandrioli, Matteo Pradella. 307-318 [doi]
- Incomplete Transition Complexity of Some Basic OperationsEva Maia, Nelma Moreira, Rogério Reis. 319-331 [doi]
- Algorithms and Almost Tight Results for 3-Colorability of Small Diameter GraphsGeorge B. Mertzios, Paul G. Spirakis. 332-343 [doi]
- Approximating the k-Splittable Capacitated Network Design ProblemEhab Morsy. 344-355 [doi]
- Mixed Hypergraphs for Linear-Time Construction of Denser Hashing-Based Data StructuresMichael Rink. 356-368 [doi]
- Coalgebraic Bisimulation-Up-ToJurriaan Rot, Marcello M. Bonsangue, Jan J. M. M. Rutten. 369-381 [doi]
- A Model Transformation Language Based on Logic ProgrammingJesús Manuel Almendros-Jiménez, Luis Iribarne. 382-394 [doi]
- Hypermodelling Reporting: Towards Cockpits for Code StructureTim Frey, Matthias Gräf. 395-407 [doi]
- Search in Source Code Based on Identifying Popular FragmentsEduard Kuric, Mária Bieliková. 408-419 [doi]
- SimCo - Hybrid Simulator for Testing of Component Based ApplicationsRichard Lipka, Tomas Potuzak, Premek Brada, Pavel Herout. 420-431 [doi]
- Refinement Inference for Sequence DiagramsLunjin Lu, Dae-Kyoo Kim. 432-444 [doi]
- Improving Relevance of Keyword Extraction from the Web Utilizing Visual Style InformationMilan Lucanský, Marián Simko. 445-456 [doi]
- Utilizing Microblogs for Web Page Relevant Term AcquisitionTomás Uhercík, Marián Simko, Mária Bieliková. 457-468 [doi]
- State Coverage: An Empirical Analysis Based on a User StudyDries Vanoverberghe, Emma Eyckmans, Frank Piessens. 469-480 [doi]
- Surrogate Model for Mixed-Variables Evolutionary Optimization Based on GLM and RBF NetworksLukás Bajer, Martin Holena. 481-490 [doi]
- Computing Semantic Similarity Using Large Static CorporaAndrás Dobó, János Csirik. 491-502 [doi]
- The Orchestra of Multiple Model RepositoriesSergejs Kozlovics. 503-514 [doi]
- An Ontology-Driven Fuzzy Workflow SystemVáclav Slavícek. 515-527 [doi]
- Constructs Replacing and Complexity Downgrading via a Generic OWL Ontology Transformation FrameworkOndrej Sváb-Zamazal, Anne Schlicht, Heiner Stuckenschmidt, Vojtech Svátek. 528-539 [doi]
- Tempo Adaptation within Interactive Music Instruments in Mobile PhoneMarek Takác, Alena Kovárová. 540-551 [doi]
- Dynamic Voting Interface in Social Media: Does it Affect Individual Votes?Michail Tsikerdekis. 552-563 [doi]