CS&P 2014
Concurrency, Specification and Programming

Proceedings of the 23th International Workshop on Concurrency, Specification and Programming

Chemnitz, Germany, September 29 - October 1, 2014.

Edited by

Louchka Popova-Zeugmann

Humboldt University of Berlin, Department of Informatics, Unter den Linden 6, 10099 Berlin, Germany

Table of Contents

  1. XCCS Diagram to CCS Script Conversion Algorithm 01-12
    Krzysztof Balicki
  2. A Classifier Based on a Decision Tree with Verifying Cuts 13-21
    Jan G. Bazan, Stanislawa Bazan-Socha, Sylwia Buregwa-Czuma, Lukasz Dydo, Wojciech Rzasa, Andrzej Skowron
  3. Classifiers for Behavioral Patterns Identification Induced from Huge Temporal Data 22-33
    Jan G. Bazan, Marcin Szpyrka, Adam Szczur, Łukas Dydo, Hubert Wojtowicz
  4. Programming Self-Assembly of DNA Tiles 34-45
    Marco Bellia, M. Eugenia Occhiuto
  5. A Function Elimination Method for Checking Satisfiability of Arithmetical Logics 46-57
    Valentina Castiglioni, Ruggero Lanotte, Simone Tini
  6. Exploiting Order Dependencies on Primary Keys for Optimization 58-68
    Michał Chromiak, Piotr Wiśniewski, Krzysztof Stencel
  7. Distributed Termination Detection by Counting Agent 69-79
    Natalia Garanina, Evgeny Bodyn
  8. Differential Privacy and Security 80-91
    Damas Gruska
  9. Verifying Strategies in Dialogue Games 92-100
    Magdalena Kacprzak, Anna Sawicka, Katarzyna Budzynska, Marcin Dziubiński
  10. An Upper Bound for the Reachability Problem of Safe, Elementary Hornets 101-112
    Michael Köhler-Bußmeier, Frank Heitmann
  11. C-NBC: Neighborhood-Based Clustering with Constraints 113-120
    Piotr Lasek
  12. Relative Constraints as Features 121-125
    Piotr Lasek, Krzysztof Lasek
  13. Controlling Petri Net Behavior Using Priorities for Transitions 126-137
    Irina Lomazova, Louchka Popova-Zeugmann
  14. Incorporating BDI-Agent Concepts into Object-Oriented Programming 138-149
    Berndt Müller, Jack Betts
  15. A Tractable Rule Language in the Modal and Description Logics that Combine CPDL with Regular Grammar Logic 150-163
    Linh Anh Nguyen
  16. New Inference Algorithms Based on Rules Partition 164-175
    Agnieszka Nowak - Brzezińska, Roman Simiński
  17. Mining Real-Estate Listings Based on Decision Systems over Ontological Graphs 176-179
    Krzysztof Pancerz, Olga Mich
  18. Timed Transition System Models for Programming Physarum Machines 180-183
    Krzysztof Pancerz, Andrew Schumann
  19. Multi-Agent Heterogeneous Intrusion Detection System 184-195
    Mikulás Pataky, Damas Gruska
  20. Coordination Algorithm in Hierarchical Structure of the Learning Process of Artificial Neural Network 196-207
    Stanislaw Placzek, Bijaya Adhikari
  21. Methods of Calculating the Strength of Coalition in a Dispersed Decision Support System with the Stage of Negotiations - a Study of Medical Data 208-219
    Małgorzata Przybyła-Kasperek, Alicja Wakulicz-Deja
  22. Fractional Genetic Programming with Probability Density Data 220-231
    Artur Rataj
  23. Cut Points in PEG 232-236
    Roman R. Redziejowski
  24. Inverted Fuzzy Implications in Approximate Reasoning 237-244
    Zbigniew Suraj, Agnieszka Lasek, Piotr Lasek
  25. Methods of Translation of Petri Nets to NuSMV Language 245-256
    Marcin Szpyrka, Agnieszka Biernacka, Jerzy Biernacki
  26. Time Process Equivalences for Time Petri Nets 257-268
    Dmitriy Bushin, Irina Virbitskaite
  27. Traffic-Related Knowledge Acquired by Interaction with Experts 269-280
    Piotr Wasilewski, Paweł Gora
  28. SAT-Based Bounded Model Checking for Weighted Deontic Interpreted Systems (Extended Abstract) 281-292
    Boźena Woźna-Szcześniak
  29. A Comparison of SAT-Based and SMT-Based Bounded Model Checking Methods for ECTL* 293-300
    Agnieszka Zbrzezny, Andrzej Zbrzezny
  30. System Monitoring with Extended Message Sequence Chart (Extended Abstract) 301-307
    Agnieszka Zbrzezny, Andrzej Zbrzezny
  31. Granular Floor Plan Representation for Evacuation Modeling 308-310
    Wojciech Świeboda, Van Mai Nguyen Thi, Hung Son Nguyen
  32. Two Problems with Distributed Systems: Data Access Control and Memory Shering 311-319
    Ludwik Czaja (invited speaker)

2014-10-21: submitted by Louchka Popova-Zeugmann, metadata incl. bibliographic data published under Creative Commons CC0
2014-10-21: published on CEUR-WS.org |valid HTML5|