Days: Monday, September 21st Tuesday, September 22nd Wednesday, September 23rd Thursday, September 24th
View this program: with abstractssession overviewtalk overviewside by side with other conferences
Ruzica Piskac- From Decision Procedures to Synthesis Procedures
09:20 | From Decision Procedures to Synthesis Procedures ( abstract ) |
10:30 | Lambda Calculus with Regular Types ( abstract ) |
10:50 | n Type Inference, Generation and Normalization of SK-combinator Trees ( abstract ) |
11:10 | vanHelsing: A Fast Theorem Prover for Debuggable Compiler Verification ( abstract ) |
11:30 | Properties of Multiset Orders by Minimal and Maximal Submultisets ( abstract ) |
Manuel Kauers – Creative Telescoping via Hermite Reduction
13:30 | Creative Telescoping via Hermite Reduction ( abstract ) |
14:40 | A Rigorous Generic Branch and Bound Solver for Nonlinear Problems ( abstract ) |
15:00 | Identifiability and noise robustness for l1-analysis regularizations in compressive sensing ( abstract ) |
15:20 | Numerical investigations of equilibriums in a flight with high angle of attack ( abstract ) |
15:40 | The Arithmetic of Even-Odd Trees ( abstract ) |
16:00 | Space and execution efficient formats for modern processor architectures ( abstract ) |
16:40 | OPTIMAL WINDOW AND LATTICE IN GABOR TRANSFORM. APPLICATION TO AUDIO ANALYSIS ( abstract ) |
17:00 | THE FLOW IN A VISCOUS FLUID OVER AN UNSTEADY STRETCHING SURFACE ( abstract ) |
17:20 | Variant Implementations of SCBiCG Method for Linear Equations with Complex Symmetric Matrices ( abstract ) |
17:40 | GPU solver for systems of linear equations with infinite precision ( abstract ) |
View this program: with abstractssession overviewtalk overviewside by side with other conferences
Arie Gurfinkel. Interpolation and Verification
09:00 | Algorithmic Logic-Based Verification with SeaHorn ( abstract ) |
10:50 | Combinatorial Techniques for Proof--based Synthesis of Sorting Algorithms ( abstract ) |
11:10 | An Improved Upper-bound Algorithm for Non-preemptive Task Scheduling ( abstract ) |
11:30 | A matter of trust: smart home system relying on logic, BCI and sensor agents ( abstract ) |
11:50 | Simple Venn Diagrams for Finite Multisets ( abstract ) |
David Sands - Getting Personal with Differential Privacy
13:10 | Getting Personal with Differential Privacy ( abstract ) |
Daniel Hedin - Web app security using JSFlow
14:20 | Web application security using JSFlow ( abstract ) |
16:10 | Automatic definition of optimal default parameters of models ( abstract ) |
16:30 | Forecasting Techniques for Time Series from Sensor Data ( abstract ) |
16:50 | An Energy Efficient Intelligent Wireless Body Area Network for Real-time Vital Signs Monitoring ( abstract ) |
View this program: with abstractssession overviewtalk overviewside by side with other conferences
Peter Bentley - Building a Nature-Inspired Computer
09:00 | Building a Nature-Inspired Computer ( abstract ) |
10:10 | A Surrogate-Based Strategy for Multi-Objective Tolerance Analysis in Electrical Machine Design ( abstract ) |
10:30 | Lie Algebra-Valued Hopfield Neural Networks ( abstract ) |
10:50 | Feature creation using genetic programming with application in malware detection ( abstract ) |
11:10 | High Probability Mutation and Error Thresholds in Genetic Algorithms ( abstract ) |
11:30 | A Study on Techniques for Proactively Identifying Malicious URLs ( abstract ) |
11:50 | Stock Market Trading Strategies - Applying Risk and Decision Analysis Models for Detecting Financial Turbulence ( abstract ) |
Stefan Woltran - Dynamic Programming on Tree Decomposition in Practice. Some Lessons Learned
13:10 | Dynamic Programming on Tree Decompositions in Practice -- Some Lessons Learned ( abstract ) |
14:20 | Symbolic Derivation of Mean-Field PDEs from Lattice-Based Models ( abstract ) |
14:40 | Computation of GCD of Sparse Multivariate Polynomial by Extended Hensel Construction ( abstract ) |
15:00 | Lagrange Inversion and series for Lambert W ( abstract ) |
15:20 | Towards an automatic tool for multi-scale model derivation illustrated with a micro-mirror array ( abstract ) |
16:00 | Computation of Stirling numbers and generalizations ( abstract ) |
16:20 | Solving SAT by an Iterative Version of the Inclusion-Exclusion Principle ( abstract ) |
17:20 | Automatic Language Identification for Romance Languages using Stop Words and Diacritics ( abstract ) |
17:40 | Improving malware detection response time with behavior-based statistical analysis techniques ( abstract ) |
18:00 | Business reviews classification using sentiment analysis ( abstract ) |
18:20 | Comparative Analysis of Existing Architectures for General Game Agents ( abstract ) |
View this program: with abstractssession overviewtalk overviewside by side with other conferences
Stephen M. Watt – Generalized Inclusion-Exclusion: Reducing complexity by borrowing
09:00 | Generalized Inclusion-Exclusion: Reducing complexity by borrowing ( abstract ) |
Andrei Voronkov – EasyChair
10:10 | EasyChair ( abstract ) |
11:20 | General Sum-Connectivity Index with $\alpha\geq 1$ for Trees and Unicyclic Graphs with $k$ Pendants ( abstract ) |
11:40 | Static Analysis in Finitely Supported Mathematics ( abstract ) |
12:00 | On the existence of 1-bounded bi-ideals with the WELLDOC property. ( abstract ) |
13:20 | Continuation Semantics for Dynamic Hierarchical Systems ( abstract ) |
13:40 | Scalable and fault tolerant monitoring of security parameters in the cloud ( abstract ) |
14:00 | Adaptations of the k-means algorithm to community detection in parallel environments ( abstract ) |
14:20 | An Algebraic Petri Nets Emulator ( abstract ) |