Abstract is missing.
- Swift Logic for Big Data and Knowledge Graphs - Overview of Requirements, Language, and SystemLuigi Bellomarini, Georg Gottlob, Andreas Pieris, Emanuel Sallinger. 3-16 [doi]
- On Architecture SpecificationManfred Broy. 19-39 [doi]
- The State of the Art in Dynamic Graph AlgorithmsMonika Henzinger. 40-44 [doi]
- Diversity in UML Modeling Explained: Observations, Classifications and TheorizationsMichel R. V. Chaudron, Ana Fernandes-Saez, Regina Hebig, Truong Ho-Quang, Rodi Jolak. 47-66 [doi]
- Self-managing Internet of ThingsDanny Weyns, Gowri Sankar Ramachandran, Ritesh Kumar Singh. 67-84 [doi]
- LARS: A Logic-Based Framework for Analytic Reasoning over Streams - (Extended Abstract)Harald Beck, Minh Dao-Tran, Thomas Eiter. 87-93 [doi]
- Network Analysis of the Science of Science: A Case Study in SOFSEM ConferenceAntonia Gogoglou, Theodora Tsikrika, Yannis Manolopoulos. 94-108 [doi]
- The Parameterized Complexity of Centrality Improvement in NetworksClemens Hoffmann 0002, Hendrik Molter, Manuel Sorge. 111-124 [doi]
- Local Structure Theorems for Erdős-Rényi Graphs and Their Algorithmic ApplicationsJan Dreier, Philipp Kuinke, Ba Le Xuan, Peter Rossmanith. 125-136 [doi]
- Target Set Selection Parameterized by Clique-Width and Maximum ThresholdTim A. Hartmann. 137-149 [doi]
- Combining Versioning and Metamodel Evolution in the ChronoSphere Model RepositoryMartin Haeusler, Thomas Trojer, Johannes Kessler, Matthias Farwick, Emmanuel Nowakowski, Ruth Breu. 153-167 [doi]
- Automated Change Propagation from Source Code to Sequence DiagramsKarol Rástocný, Andrej Mlyncár. 168-179 [doi]
- Multi-paradigm Architecture Constraint Specification and Configuration Based on Graphs and Feature ModelsSahar Kallel, Chouki Tibermacine, Ahmed Hadj Kacem, Christophe Dony. 180-193 [doi]
- Lower Bounds and Hierarchies for Quantum Memoryless Communication Protocols and Quantum Ordered Binary Decision Diagrams with Repeated TestFarid M. Ablayev, Andris Ambainis, Kamil Khadiev, Aliya Khadieva. 197-211 [doi]
- Computational Complexity of Atomic Chemical Reaction NetworksDavid Doty, Shaopeng Zhu. 212-226 [doi]
- Conjugacy of One-Dimensional One-Sided Cellular Automata is UndecidableJoonatan Jalonen, Jarkko Kari. 227-238 [doi]
- Formal Verification and Safety Assessment of a Hemodialysis MachineShahid Khan, Osman Hasan, Atif Mashkoor. 241-254 [doi]
- Automatic Decomposition of Java Open Source Pull Requests: A Replication StudyVictor da C. Luna Freire, João Brunet, Jorge C. A. de Figueiredo. 255-268 [doi]
- Transformation of OWL2 Property Axioms to GroovyBogumila Hnatkowska, Pawel Woroniecki. 269-282 [doi]
- Simple Paths and Cycles Avoiding Forbidden PathsBenjamin Momège. 285-294 [doi]
- External Memory Algorithms for Finding Disjoint Paths in Undirected GraphsMaxim A. Babenko, Ignat I. Kolesnichenko. 295-304 [doi]
- On Range and Edge Capacity in the Congested CliqueTomasz Jurdzinski, Krzysztof Nowicki 0002. 305-318 [doi]
- Global vs. Local Semantics of BPMN 2.0 OR-JoinFlavio Corradini, Chiara Muzi, Barbara Re 0001, Lorenzo Rossi 0001, Francesco Tiezzi. 321-336 [doi]
- AODVv2: Performance vs. Loop FreedomMojgan Kamali, Massimo Merro, Alice Dal Corso. 337-350 [doi]
- Multivendor Deployment Integration for Future Mobile NetworksManuel Perez Martinez, Tímea László, Norbert Pataki, Csaba Rotter, Csaba Szalai. 351-364 [doi]
- Patrolling a Path Connecting a Set of Points with Unbalanced Frequencies of VisitsHuda Chuangpishit, Jurek Czyzowicz, Leszek Gasieniec, Konstantinos Georgiou, Tomasz Jurdzinski, Evangelos Kranakis. 367-380 [doi]
- Exploring Graphs with Time Constraints by Unreliable Collections of Mobile RobotsJurek Czyzowicz, Maxime Godon, Evangelos Kranakis, Arnaud Labourel, Euripides Markou. 381-395 [doi]
- The k-Server Problem with Advice in d Dimensions and on the SphereElisabet Burjons, Dennis Komm, Marcel Schöngens. 396-409 [doi]
- Deciding Universality of ptNFAs is PSpace-CompleteTomás Masopust, Markus Krötzsch. 413-427 [doi]
- Theoretical Aspects of Symbolic AutomataHellis Tamm, Margus Veanes. 428-441 [doi]
- Complete Algorithms for Algebraic Strongest Postconditions and Weakest Preconditions in Polynomial ODE'SMichele Boreale. 442-455 [doi]
- Influence of Body Postures on Touch-Based Biometric User AuthenticationKamil Burda, Daniela Chudá. 459-468 [doi]
- Michiko: Poem Models used in Automated Haiku Poetry GenerationMiroslava Hresková, Kristína Machová. 469-476 [doi]
- House Allocation Problems with Existing Tenants and Priorities for Teacher RecruitmentAna Paula Tomás. 479-492 [doi]
- Runtime Distributions and Criteria for RestartsJan-Hendrik Lorenz. 493-507 [doi]
- Inversions from Sorting with Distance-Based ErrorsBarbara Geissmann, Paolo Penna. 508-522 [doi]
- An Optimization Problem Related to Bloom Filters with Bit PatternsPeter Damaschke, Alexander Schliep. 525-538 [doi]
- Nivat's Conjecture Holds for Sums of Two Periodic ConfigurationsMichal Szabados. 539-551 [doi]
- Encoding Pictures with Maximal Codes of PicturesMarcella Anselmo, Dora Giammarresi, Maria Madonia. 552-565 [doi]
- ARCID: A New Approach to Deal with Imbalanced Datasets ClassificationSafa Abdellatif, Mohamed Ali Ben Hassine, Sadok Ben Yahia, Amel Bouzeghoub. 569-580 [doi]
- Fake Review Detection via Exploitation of Spam Indicators and Reviewer Behavior CharacteristicsIoannis Dematis, Eirini D. Karapistoli, Athena Vakali. 581-595 [doi]
- Mining Spatial Gradual Patterns: Application to Measurement of Potentially Avoidable HospitalizationsTu Ngo, Vera Georgescu, Anne Laurent, Thérèse Libourel, Grégoire Mercier. 596-608 [doi]
- New Variants of Pattern Matching with Constants and VariablesYuki Igarashi, Diptarama, Ryo Yoshinaka, Ayumi Shinohara. 611-623 [doi]
- Duel and Sweep Algorithm for Order-Preserving Pattern MatchingDavaajav Jargalsaikhan, Diptarama, Yohei Ueki, Ryo Yoshinaka, Ayumi Shinohara. 624-635 [doi]
- Longest Common Prefixes with k-Mismatches and ApplicationsHayam Alamro, Lorraine A. K. Ayad, Panagiotis Charalampopoulos, Costas S. Iliopoulos, Solon P. Pissis. 636-649 [doi]
- Managing Reduction in Multidimensional DatabasesFranck Ravat, Jiefu Song, Olivier Teste. 653-666 [doi]
- UML2PROV: Automating Provenance Capture in Software EngineeringCarlos Sáenz-Adán, Beatriz Pérez, Trung Dong Huynh, Luc Moreau. 667-681 [doi]
- Validating Data from Semantic Web ProvidersJacques Chabin, Mírian Halfeld Ferrari, Béatrice Markhoff, Thanh Binh Nguyen 0006. 682-695 [doi]