|
|
|
Quantum Random Walks -- New Method for Designing Quantum Algorithms |
|
|
1 | (4) |
|
|
Social Information Access: The Other Side of the Social Web |
|
|
5 | (18) |
|
|
Designing Adaptive Web Applications |
|
|
23 | (11) |
|
|
Best of Both: Using Semantic Web Technologies to Enrich User Interaction with the Web and Vice Versa |
|
|
34 | (16) |
|
|
On the Hardness of Reoptimization |
|
|
50 | (16) |
|
|
|
|
|
Describing Self-assembly of Nanostructures |
|
|
66 | (8) |
|
|
|
On the Undecidability of the Tiling Problem |
|
|
74 | (9) |
|
|
Remote Entrusting by Run-Time Software Authentication |
|
|
83 | (15) |
|
|
|
|
Trusted Computing---Special Aspects and Challenges |
|
|
98 | (20) |
|
|
Optimizing Winning Strategies in Regular Infinite Games |
|
|
118 | (6) |
|
|
Foundations of Computer Science |
|
|
|
Recursive Domain Equations of Filter Models |
|
|
124 | (12) |
|
|
|
Algorithmic Problems for Metrics on Permutation Groups |
|
|
136 | (12) |
|
|
|
Periodic and Infinite Traces in Matrix Semigroups |
|
|
148 | (14) |
|
|
|
From Asynchronous to Synchronous Specifications for Distributed Program Synthesis |
|
|
162 | (12) |
|
|
|
Exact OBDD Bounds for Some Fundamental Functions (Extended Abstract) |
|
|
174 | (12) |
|
|
|
|
Clustering-Based Similarity Search in Metric Spaces with Sparse Spatial Centers |
|
|
186 | (12) |
|
|
|
|
|
|
A Useful Bounded Resource Functional Language |
|
|
198 | (13) |
|
|
|
|
On Reachability Games of Ordinal Length |
|
|
211 | (11) |
|
|
|
An Algorithm for Computation of the Scene Geometry by the Log-Polar Area Matching Around Salient Points |
|
|
222 | (12) |
|
|
The Power of Tokens: Rendezvous and Symmetry Detection for Two Mobile Agents in a Ring |
|
|
234 | (13) |
|
|
|
|
|
How Much Information about the Future Is Needed? |
|
|
247 | (12) |
|
|
|
|
On Compiling Structured Interactive Programs with Registers and Voices |
|
|
259 | (12) |
|
|
|
Optimal Orientation On-Line |
|
|
271 | (9) |
|
|
|
Some Tractable Instances of Interval Data Minmax Regret Problems: Bounded Distance from Triviality |
|
|
280 | (12) |
|
|
|
|
Assisted Problem Solving and Decompositions of Finite Automata |
|
|
292 | (12) |
|
|
|
Energy-Efficient Windows Scheduling |
|
|
304 | (12) |
|
|
A New Model to Solve the Swap Matching Problem and Efficient Algorithms for Short Patterns |
|
|
316 | (12) |
|
|
|
Certification of Proving Termination of Term Rewriting by Matrix Interpretations |
|
|
328 | (12) |
|
|
|
Extension of Rescheduling Based on Minimal Graph Cut |
|
|
340 | (12) |
|
|
|
Deriving Complexity Results for Interaction Systems from 1-Safe Petri Nets |
|
|
352 | (12) |
|
|
|
Computing Longest Common Substring and All Palindromes from Compressed Strings |
|
|
364 | (12) |
|
|
|
|
|
|
|
Basic Sets in the Digital Plane |
|
|
376 | (12) |
|
|
|
Algebraic Optimization of Relational Queries with Various Kinds of Preferences |
|
|
388 | (12) |
|
|
Mortality Problem for 2 x 2 Integer Matrices |
|
|
400 | (6) |
|
|
|
Element Distinctness and Sorting on One-Tape Off-Line Turing Machines |
|
|
406 | (12) |
|
|
Improved Bounds for Range Mode and Range Median Queries |
|
|
418 | (6) |
|
|
An Automata Theoretic Approach to Rational Tree Relations |
|
|
424 | (12) |
|
|
Slicing Petri Nets with an Application to Workflow Verification |
|
|
436 | (12) |
|
|
Lower Bound for the Length of Synchronizing Words in Partially-Synchronizing Automata |
|
|
448 | (12) |
|
|
|
Verifying Parameterized taDOM+ Lock Managers |
|
|
460 | (13) |
|
|
|
Untangling a Planar Graph |
|
|
473 | (12) |
|
|
|
|
|
Quantum Walks with Multiple or Moving Marked Locations |
|
|
485 | (12) |
|
|
|
Parallel Immune System for Graph Coloring |
|
|
497 | (9) |
|
|
The Quantum Complexity of Group Testing |
|
|
506 | (13) |
|
|
|
Quantum Walks: A Markovian Perspective |
|
|
519 | (12) |
|
|
|
A Memetic Algorithm for Global Induction of Decision Trees |
|
|
531 | (10) |
|
|
Geometric Rates of Approximation by Neural Networks |
|
|
541 | (10) |
|
|
|
A Sensitive Metaheuristic for Solving a Large Optimization Problem |
|
|
551 | (9) |
|
|
|
|
|
Networks, Security, and Cryptography |
|
|
|
Domain Name System as a Memory and Communication Medium |
|
|
560 | (12) |
|
|
Strong Authentication over Lock-Keeper |
|
|
572 | (13) |
|
|
|
Short Ballot Assumption and Threeballot Voting Protocol |
|
|
585 | (14) |
|
|
|
|
Practical Deniable Encryption |
|
|
599 | (11) |
|
|
|
|
|
610 | (12) |
|
|
Classification, Formalization and Verification of Security Functional Requirements |
|
|
622 | (12) |
|
|
|
|
|
ONN the Use of Neural Networks for Data Privacy |
|
|
634 | (12) |
|
|
|
|
|
|
Threshold Privacy Preserving Keyword Searches |
|
|
646 | (13) |
|
|
|
|
|
|
3D_XML: A Three-Dimensional XML-Based Model |
|
|
659 | (13) |
|
|
|
Visual Exploration of RDF Data |
|
|
672 | (12) |
|
|
|
Creation, Population and Preprocessing of Experimental Data Sets for Evaluation of Applications for the Semantic Web |
|
|
684 | (12) |
|
|
|
|
|
|
|
Algorithm for Intelligent Prediction of Requests in Business Systems |
|
|
696 | (12) |
|
|
|
|
|
Mining Personal Social Features in the Community of Email Users |
|
|
708 | (12) |
|
|
|
Proofs of Communication and Its Application for Fighting Spam |
|
|
720 | (11) |
|
|
|
Web Pages Reordering and Clustering Based on Web Patterns |
|
|
731 | (12) |
|
|
|
|
|
|
Compression of Concatenated Web Pages Using XBW |
|
|
743 | (12) |
|
|
|
The Dynamic Web Presentations with a Generality Model on the News Domain |
|
|
755 | (11) |
|
|
|
|
A Highly Efficient XML Compression Scheme for the Web |
|
|
766 | (12) |
|
|
|
|
Improving Semantic Search Via Integrated Personalized Faceted and Visual Graph Navigation |
|
|
778 | (13) |
|
|
|
|
|
Author Index |
|
791 | |