Logic- or Process Algebra-Based Agent Programming Languages -- Jason and the Golden Fleece of Agent-Oriented Programming -- Programming Multi-Agent Systems in 3APL -- Impact: A Multi-Agent Framework with Declarative Semantics -- Claim and Sympa: A Programming Environment for Intelligent and Mobile Agents -- Java-Based Agent Programming Languages -- Jade — A Java Agent Development Framework --…
Invited Papers -- Semiperfect-Information Games -- Computational Complexity Since 1980 -- Developments in Data Structure Research During the First 25 Years of FSTTCS -- Inference Systems for Logical Algorithms -- From Logic to Games -- Proving Lower Bounds Via Pseudo-random Generators -- Erd?s Magic -- Contributed Papers -- No Coreset, No Cry: II -- Improved Bounds on the Union Complexity of Fa…
Testing of Finite State Machines -- I. Testing of Finite State Machines -- 1 Homing and Synchronizing Sequences -- 2 State Identification -- 3 State Verification -- 4 Conformance Testing -- II. Testing of Labeled Transition Systems -- Testing of Labeled Transition Systems -- 5 Preorder Relations -- 6 Test Generation Algorithms Based on Preorder Relations -- 7 I/O-automata Based Testing -- 8 Tes…
Keynote Address I -- Keynote Address I: Model Driven Development for Distributed Real-Time and Embedded Systems -- Process -- Activity Diagram Patterns for Modeling Quality Constraints in Business Processes -- UML4SPM: A UML2.0-Based Metamodel for Software Process Modelling -- Realizing Model Driven Security for Inter-organizational Workflows with WS-CDL and UML 2.0 -- Product Families, Reuse -…
Invited Talks/Papers -- Pushdown Model Checking for Security -- Execution Generated Test Cases: How to Make Systems Code Crash Itself -- Invited Tutorials -- Effective Bug Hunting with Spin and Modex -- The BLAST Software Verification System -- Model Checking Programs with Java PathFinder -- State Representation and Abstraction -- An Incremental Heap Canonicalization Algorithm -- Memory Efficie…
Securing Publish/Subscribe for Multi-domain Systems -- ABACUS: A Distributed Middleware for Privacy Preserving Data Sharing Across Private Data Warehouses -- Causeway: Support for Controlling and Analyzing the Execution of Multi-tier Applications -- MINERVA?: A Scalable Efficient Peer-to-Peer Search Engine -- An Optimal Overlay Topology for Routing Peer-to-Peer Searches -- Combining Flexibility…
Prediction, Analysis and Monitoring of System Architecture -- Performance Prediction of J2EE Applications Using Messaging Protocols -- EJBMemProf – A Memory Profiling Framework for Enterprise JavaBeans -- Model-Driven Safety Evaluation with State-Event-Based Component Failure Annotations -- Optimizing Resource Usage in Component-Based Real-Time Systems -- Evaluating Performance Attributes of …
Typing Haskell with an Attribute Grammar -- Programming with Arrows -- Epigram: Practical Programming with Dependent Types -- Combining Datatypes and Effects -- GEC: A Toolkit for Generic Rapid Prototyping of Type Safe Interactive Applications -- A Functional Shell That Operates on Typed and Compiled Applications -- Declarative Debugging with Buddha -- Server-Side Web Programming in WASH -- Ref…
Gödel Machines: Towards a Technical Justification of Consciousness -- Postext – A Mind for Society -- Comparing Resource Sharing with Information Exchange in Co-operative Agents, and the Role of Environment Structure -- Baselines for Joint-Action Reinforcement Learning of Coordination in Cooperative Multi-agent Systems -- SMART (Stochastic Model Acquisition with ReinforcemenT) Learning Agent…
Probabilistic guarded commands and their refinement logic -- to pGCL: Its logic and its model -- Probabilistic loops: Invariants and variants -- Case studies in termination: Choice coordination, the dining philosophers, and the random walk -- Probabilistic data refinement: The steam boiler -- Semantic structures -- Theory for the demonic model -- The geometry of probabilistic programs -- Proved…