Invited Talks -- T? ??? ?í ? ??í?? ? The Interaction Between Algorithms and Game Theory -- Using an Adaptive Memory Strategy to Improve a Multistart Heuristic for Sequencing by Hybridization -- High-Performance Algorithm Engineering for Large-Scale Graph Problems and Computational Biology -- Contributed Regular Papers -- The “Real” Approximation Factor of the MST Heuristic for the Minimum…
1 Introduction -- 1 Introduction -- 2 Preliminaries and Monograph Structure -- I Combinatorial Bounds -- 3 Johnson-Type Bounds and Applications to List Decoding -- 4 Limits to List Decodability -- 5 List Decodability Vs. Rate -- II Code Constructions and Algorithms -- 6 Reed-Solomon and Algebraic-Geometric Codes -- 7 A Unified Framework for List Decoding of Algebraic Codes -- 8 List Decoding of…
Genetic algorithms: a guide for absolute beginners -- Evolutionary algorithms and their theory -- Epistasis -- Examples -- Walsh transforms -- Multary epistasis -- Generalized Walsh transforms.
Cellular Networks: Where Are the Mobile Users? -- Distributed Data Structures: A Survey -- On Designing Truthful Mechanisms for Online Scheduling -- On Private Computation in Incomplete Networks -- Traffic Grooming on the Path -- Range Augmentation Problems in Static Ad-Hoc Wireless Networks -- On the Approximability of the L(h,k)-Labelling Problem on Bipartite Graphs (Extended Abstract) -- A T…
Invited Papers -- Patterns for the Pragmatic Web -- Conceptual Graphs for Semantic Web Applications -- Knowledge Representation and Reasoning in (Controlled) Natural Language -- What Is a Concept? -- Applications of Description Logics: State of the Art and Research Challenges -- Methodologies for the Reliable Construction of Ontological Knowledge -- Using Formal Concept Analysis and Information…
Invited Talks -- Sub-linear Queries Statistical Databases: Privacy with Power -- Malicious Cryptography: Kleptographic Aspects -- Cryptanalysis -- Resistance of SNOW 2.0 Against Algebraic Attacks -- A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes -- Hold Your Sessions: An Attack on Java Session-Id Generation -- Update on SHA-1 -- A Fast Correlation Attack on the Shrinkin…
Information Organization -- Automatic Word Clustering for Text Categorization Using Global Information -- Text Classification Using Web Corpora and EM Algorithms -- Applying CLIR Techniques to Event Tracking -- Document Clustering Using Linear Partitioning Hyperplanes and Reallocation -- Automatic Summarization -- Summary Generation Centered on Important Words -- Sentence Compression Learned by…
Invited Papers -- Lexicographic Breadth First Search – A Survey -- Wireless Networking: Graph Theory Unplugged -- Graph Algorithms: Trees -- Constant Time Generation of Trees with Specified Diameter -- Treelike Comparability Graphs: Characterization, Recognition, and Applications -- Elegant Distance Constrained Labelings of Trees -- Collective Tree Spanners and Routing in AT-free Related Grap…
Graph Transformation -- On the Concurrent Semantics of Algebraic Graph Grammars -- From Graph Transformation to Software Engineering and Back -- Flexible Interconnection of Graph Transformation Modules -- Simulating Algebraic High-Level Nets by Parallel Attributed Graph Transformation -- Graph Processes with Fusions: Concurrency by Colimits, Again -- Graph Transformation with Variables -- Graph…
Models and Software Development -- Building a Model in VDM++: An Overview -- VDM++ Tool Support -- Modelling Object-oriented Systems in VDM++ -- Defining Data -- Defining Functionality -- Modelling Unordered Collections -- Modelling Ordered Collections -- Modelling Relationships -- Modelling in Practice: Three Case Studies -- Model Structuring: The Enigma Cipher -- Combining Views: The CSLaM Sy…