default search action
41. SOFSEM 2015: Pec pod Sněžkou, Czech Republic
- Giuseppe F. Italiano, Tiziana Margaria-Steffen, Jaroslav Pokorný, Jean-Jacques Quisquater, Roger Wattenhofer:
SOFSEM 2015: Theory and Practice of Computer Science - 41st International Conference on Current Trends in Theory and Practice of Computer Science, Pec pod Sněžkou, Czech Republic, January 24-29, 2015. Proceedings. Lecture Notes in Computer Science 8939, Springer 2015, ISBN 978-3-662-46077-1
Invited Talks
- Jirí Wiedermann, Jan van Leeuwen:
What is Computation: An Epistemic Approach. 1-13 - Magnús M. Halldórsson:
Progress (and Lack Thereof) for Graph Coloring Approximation Problems. 14-23 - Jared Saia, Mahdi Zamani:
Recent Results in Scalable Multi-Party Computation. 24-44 - Piotr Sankowski:
Online Bipartite Matching in Offline Time (Abstract). 45 - Jiri Barnat:
Quo Vadis Explicit-State Model Checking. 46-57 - Brian Fitzgerald, Klaas-Jan Stol:
The Dos and Dont's of Crowdsourcing Software Development. 58-64 - Barbara Catania, Giovanna Guerrini:
Adaptively Approximate Techniques in Distributed Architectures. 65-77 - Rainer Manthey:
Back to the Future - Should SQL Surrender to SPARQL? 78-101
Regular Papers
- Alessandro Aloisio, Alfredo Navarra:
Balancing Energy Consumption for the Establishment of Multi-interface Networks. 102-114 - Michael A. Bekos, Michael Kaufmann, Stephen G. Kobourov, Sankar Veeramoni:
The Maximum k-Differential Coloring Problem. 115-127 - Alberto Bertoni, Massimiliano Goldwurm, Jianyi Lin:
Exact Algorithms for 2-Clustering with Size Constraints in the Euclidean Plane. 128-139 - Prosenjit Bose, Stephane Durocher, Debajyoti Mondal, Maxime Peabody, Matthew Skala, Mohammad Abdul Wahid:
Local Routing in Convex Subdivisions. 140-151 - Ferenc Bujtor, Sascha Fendrich, Gerald Lüttgen, Walter Vogler:
Nondeterministic Modal Interfaces. 152-163 - Marek Chrobak, Leszek Gasieniec, Thomas Gorry, Russell Martin:
Group Search on the Line. 164-176 - Jérôme Dohrau:
Online Makespan Scheduling with Sublinear Advice. 177-188 - Ashley Farrugia, Leszek Gasieniec, Lukasz Kuszner, Eduardo Pacheco:
Deterministic Rendezvous in Restricted Graphs. 189-200 - Armin Fügenschuh, Konstanty Junosza-Szaniawski, Torsten Klug, Slawomir Kwasiborski, Thomas Schlechte:
Fastest, Average and Quantile Schedule. 201-216 - Ronald de Haan, Stefan Szeider:
Machine Characterizations for Parameterized Complexity Classes Beyond Para-NP. 217-229 - Allan van Hulst, Michel A. Reniers, Wan J. Fokkink:
Maximally Permissive Controlled System Synthesis for Modal Logic. 230-241 - Thomas Hume, Hayssam Soueidan, Macha Nikolski, Guillaume Blin:
Approximation Hardness of the Cross-Species Conserved Active Modules Detection Problem. 242-253 - Falk Hüffner, Christian Komusiewicz, Manuel Sorge:
Finding Highly Connected Subgraphs. 254-265 - Konstanty Junosza-Szaniawski, Mathieu Liedloff, Pawel Rzazewski:
Fixing Improper Colorings of Graphs. 266-276 - Shahin Kamali, Alejandro López-Ortiz:
Efficient Online Strategies for Renting Servers in the Cloud. 277-288 - Dmitry Kosolobov, Mikhail Rubinchik, Arseny M. Shur:
Pal k is Linear Recognizable Online. 289-301 - Peter Kostolányi:
Two Grammatical Equivalents of Flip-Pushdown Automata. 302-313 - Rihards Krislauks, Kaspars Balodis:
On the Hierarchy Classes of Finite Ultrametric Automata. 314-326 - Christian Laforest, Benjamin Momège:
Nash-Williams-type and Chvátal-type Conditions in One-Conflict Graphs. 327-338 - Nelma Moreira, Giovanni Pighizzini, Rogério Reis:
Optimal State Reductions of Automata with Partially Specified Behaviors. 339-351 - Masaki Nakanishi:
Quantum Pushdown Automata with a Garbage Tape. 352-363 - Ragnar Nevries, Christian Rosenke:
Towards a Characterization of Leaf Powers by Clique Arrangements. 364-376 - Hiroaki Ookawa, Taisuke Izumi:
Filling Logarithmic Gaps in Distributed Complexity for Global Problems. 377-388 - Friedrich Otto:
On Visibly Pushdown Trace Languages. 389-400 - Ralf Rothenberger, Sascha Grau, Michael Rossberg:
Dominating an s-t-Cut in a Network. 401-411 - Kei Uchizawa, Eiji Takimoto:
Lower Bounds for Linear Decision Trees with Bounded Weights. 412-422 - Valerio Cosentino, Massimo Tisi, Javier Luis Cánovas Izquierdo:
A Model-Driven Approach to Generate External DSLs from Object-Oriented APIs. 423-435 - Florian Himmler:
Function Based Requirements Engineering and Design -Towards Efficient and Transparent Plant Engineering. 436-448 - Martin Konopka, Mária Bieliková:
Software Developer Activity as a Source for Identifying Hidden Source Code Dependencies. 449-462 - Lotte B. Romijn, Breanndán Ó Nualláin, Leen Torenvliet:
Discovering Motifs in Real-World Social Networks. 463-474
Data, Information, and Knowledge Engineering
- Andreas Bögl, Michael Karlinger, Christoph G. Schütz, Michael Schrefl, Gustav Pomberger:
Exploiting Semantic Activity Labels to Facilitate Consistent Specialization of Abstract Process Activities. 475-485 - Nieves R. Brisaboa, Ana Cerdeira-Pena, Veronica Gil-Costa, Mauricio Marín, Oscar Pedreira:
Efficient Similarity Search by Combining Indexing and Caching Strategies. 486-497 - Vladimir Soares Catão, Marcus Costa Sampaio, Ulrich Schiel:
Retrieving Documents Related to Database Queries. 498-510 - Seyed Amin Mirlohi Falavarjani, Gholamreza Ghassem-Sani:
Advantages of Dependency Parsing for Free Word Order Natural Languages. 511-518 - Michal Holub, Ondrej Proksa, Mária Bieliková:
Detecting Identical Entities in the Semantic Web Data. 519-530 - Martin Labaj, Mária Bieliková:
Conducting a Web Browsing Behaviour Study - An Educational Scenario. 531-542 - Pavel Labath, Joachim Niehren:
A Uniform Programmning Language for Implementing XML Standards. 543-554 - Carlos Roberto Valêncio, Diogo Lemos Guimaraes, Geraldo F. D. Zafalon, Leandro Alves Neves, Angelo Cesar Colombini:
OntoSDM: An Approach to Improve Quality on Spatial Data Mining Algorithms. 555-565
Cryptography, Security, and Verification
- Máté Horváth:
Attribute-Based Encryption Optimized for Cloud Computing. 566-577 - Hamed Nemati, Roberto Guanciale, Mads Dam:
Trustworthy Virtualization of the ARMv7 Memory Subsystem. 578-589 - Maciej Skorski:
True Random Number Generators Secure in a Changing Environment: Improved Security Bounds. 590-602 - Maciej Zielenkiewicz, Jacek Chrzaszcz, Aleksy Schubert:
Java Loops Are Mainly Polynomial. 603-614
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.