Time | Room: SE 3.5 | Room: SE 3.7 |
---|---|---|
09:00-10:30 | Registration | |
10:00-11:00 | Opening (Audimax) |
|
11:00-12:30 | Keynote Lecture: (Audimax) |
- Swift Logics for Big Data|
12:30-14:30 | Lunch | |
14:30-16:00 | Invited Lecture: (Audimax) |
- On Architecture Specification|
16:00-16:30 | Coffee Break | |
16:30-18:00 | Session 1: The Parameterized Complexity of Centrality Improvement in Networks (TU Berlin), (TU Berlin / Ben-Gurion U Beer Sheva) Local Structure Theorems for Erdős–Rényi Graphs and their Algorithmic Applications (RWTH Aachen), (North Bangkok) Target Set Selection Parameterized by Clique-Width and Maximum Threshold (RWTH Aachen) |
Session 2: Combining Versioning and Metamodel Evolution in the ChronoSphere Model Repository (Uni Innsbruck), (Txture GmbH) Automated Change Propagation from Source Code to Sequence Diagrams (Slovak U of Technology, Bratislava) Multi-Paradigm Architecture Constraint Specification & Configuration Based on Graphs and Feature Models (LIRMM,CNRS, U Montpellier), (ReDCAD, Univ Sfax, Tunisia) |
18:30 | Welcome Reception at Danube University Krems |
Time | Room: SE 3.5 | Room: SE 3.7 |
---|---|---|
09:00-10:30 | Invited Lecture: (Audimax) |
- The Quest for Effective Modeling of Software Design|
10:30-11:00 | Break | |
11:00-12:30 | Session 3: Lower Bounds and Hierarchies for Quantum Memoryless Communication Protocols and Quantum Ordered Binary Decision Diagrams with Repeated Test (Kazan), (Riga), (Riga and Kazan) Computational Complexity of Atomic Chemical Reaction Networks (UC Davis), (U Maryland) Conjugacy of One-dimensional One-sided Cellular Automata is Undecidable (Turku) |
Session 4: Formal Verification and Safety Assessment of a Hemodialysis Machine (SEECS, NUST), (Software Competence Center Hagenberg) Automatic Decomposition of Java Open Source Pull Requests: a Replication Study (UFCG, Brazil) Transformation of OWL2 Property Axioms to Groovy (Wroclaw) |
12:30-14:30 | Lunch | |
14:30-16:00 | Invited Lecture: (Audimax) |
- The State of the Art in Dynamic Graph Algorithms|
16:00-16:30 | Break | |
16:30-18:00 | Session 5: Simple Paths and Cycles Avoiding Forbidden Paths (Inria Lille) External Memory Algorithms for Finding Disjoint Paths in Undirected Graphs (Moscow, and YandexLLC) On Range and Edge Capacity in the Congested Clique (Wroclaw) |
Session 4: Global vs. Local Semantics of BPMN 2.0 OR-Join (Camerino) AODVv2: Performance vs. Loop Freedom (Abo Akademi, Turku), (Verona) Multivendor Deployment Integration for Future Mobile Networks (Nokia Bell Labs), (Eötvös Loránd University) |
18:30 | Guided Tour – City Walk with a night watchman (Krems a./d.Donau) Meeting Point at the registration of the conference venue |
Time | Room: SE 3.5 | Room: SE 3.7 |
---|---|---|
09:00-10:30 | Invited Lecture: (Audimax) |
- Self-Managing Internet of Things|
10:30-11:00 | Break | |
11:00-12:30 | Session 7: Patrolling a Path Connecting Set of Points with Unbalanced Frequencies of Visits (Toronto), (UQO Gatineau), (Liverpool), (Wroclaw), (Carleton, Ottawa) Exploring Graphs with Time Constraints by Unreliable Collections of Mobile Robots (UQO Gatineau), (Carleton, Ottawa), (LIF Marseille and CNRS), (U Thessaly) The k-Server Problem with Advice in d Dimensions and on the Sphere (ETH Zürich), (Lugano) |
Session 8: Deciding Universality of ptNFAs is PSpace-Complete (Brno), (TU Dresden) Theoretical Aspects of Symbolic Automata (Tallinn), (Microsoft Research) Complete algorithms for algebraic strongest postconditions and weakest preconditions in polynomial ODE‘s |
12:30-15:00 | Lunch | |
15:00-18:30 | Wine Tasting: Visit of the winery Sandgrube 13 with wine tasting Meeting Point at the registration of the conference venue, bus transfer to winery and from there to the conference dinner |
|
18:30 | Conference Dinner (Römerhalle) and OCG Incentive Award FH 2017 Bus transfer back to Donau Universität Krems/conference venue: 21:30 and 22:30 |
Time | Room: SE 3.5 | Room: SE 3.7 |
---|---|---|
09:00-10:30 | Invited Lecture: (Audimax) |
- LARS: A Logic-based Framework for Analytic Reasoning over Streams|
10:30-10:35 | Announcement SOFSEM 2019 (Audimax) |
|
10:35-11:00 | Break | |
11:00-12:30 | Session 9: Influence of Body Postures on Biometric User Authentication on Mobile Devices (STUBA, Slovakia) Michiko: Poem Models used in Automated Haiku Poetry Generation (TUKE, Slovakia) |
Session 10: House Allocation Problems with Existing Tenants and Priorities for Teacher Recruitment (Porto) Runtime Distributions and Criteria for Restarts (Ulm) Inversions from Sorting with Distancebased Errors (ETH Zürich) |
12:30-14:30 | Lunch | |
14:30-15:15 | (Audimax) Parameterized Algorithms for Conflict-free Colorings of Graphs (IIT Gandhinagar) Implementation of the algorithm for testing an automaton for synchronization in linear expected time (Ural Federal University) Static closures for functional languages (Charles University, Prague) Lambda Calculus as a Tool for Metaprogramming in C++ (Charles University Prague) Criticality of Components in Service-Oriented Distributed Systems (Zalando SE, Germany), (TU Berlin) Confident Iterative Learning in Computational Learning Theory (TU Wien) Attacking Quantum Hashing. Protocols and their Cryptanalysis (Kazan Federal University) |
|
15:15-16:00 | Break | |
16:00-17:30 | Session 11: An Optimization Problem Related to Bloom Filters with Bit Patterns (Chalmers U) Nivat‘s Conjecture Holds for Sums of Two Periodic Configurations (Turku) Encoding pictures with maximal codes of pictures (Salerno), (Roma), (Catania) |
Session 12: ARCID: A New Approach to Deal with Imbalanced Datasets Classification (University of Tunis El Manar), (TELECOM SudParis, France) Fake Review Detection via Exploitation of Spam Indicators and Reviewer Behavior Characteristics (Aristotle University of Thessaloniki), (CapriTech Limited, UK) Spatial Gradual Patterns: Application to the Measurement of Potentially Avoidable Hospitalizations (USTH, Vietnam), (CHU Montpellier, France), (LIRMM, France) |
Time | Room: SE 3.5 | Room: SE 0.2 |
---|---|---|
9:00-10:30 | Session 13: New Variants of Pattern Matching with Constants and Variables (Tohoku University, Sendai) Duel and Sweep Algorithm for Order-Preserving Pattern Matching (Tohoku University, Sendai) Longest Common Prefixes with k-Mismatches & Applications (King’s College, London) |
Session 14: Managing Data Reduction in Data Warehouses (IRIT, Toulouse) UML2PROV: Automating Provenance Capture in Software Engineering (Universidad de La Rioja), (University of Southampton), (King‘s College London) Validating Data from Semantic Web Providers (University of Orleans), (Université François Rabelais Tours) |
10:30-10:50 | Break | |
10:50-11:00 | Awards | |
11:00-12:30 | Keynote Lecture: (Audimax) |
- Network Analysis on the Science of Science|
12:30-12:45 | Closing A Min Tjoa |