Abstract is missing.
- An Automatic Algorithm Selection Approach for PlanningMauro Vallati, Lukás Chrpa, Diane E. Kitchin. 1-8 [doi]
- Modulo Based CNF Encoding of Cardinality Constraints and Its Application to MaxSAT SolversToru Ogawa, Yangyang Liu, Ryuzo Hasegawa, Miyuki Koshimura, Hiroshi Fujita. 9-17 [doi]
- Learnability of Specific Structural Patterns of Planning ProblemsLukás Chrpa, Mauro Vallati, Hugh Osborne. 18-23 [doi]
- HNNP - A Hybrid Neural Network Plait for Improving Image Classification with Additional Side InformationRuth Janning, Carlotta Schatten, Lars Schmidt-Thieme. 24-29 [doi]
- On Finding Approximate Solutions of Qualitative Constraint NetworksJason Jingshi Li, Sanjiang Li. 30-37 [doi]
- Three-Valued Possibilistic Networks: Semantics & InferenceSalem Benferhat, Jerome Delobelle, Karim Tabia. 38-45 [doi]
- On the Propagation Strength of SAT Encodings for Qualitative Temporal ReasoningMatthias Westphal, Julien Hué, Stefan Wölfl. 46-54 [doi]
- Part-Whole Relations as Products of Metric SpacesSandro Rama Fiorini, Mara Abel. 55-62 [doi]
- ICAMF: Improved Context-Aware Matrix Factorization for Collaborative FilteringJiyun Li, Pengcheng Feng, Juntao Lv. 63-70 [doi]
- Optimized Deep Learning Architectures with Fast Matrix Operation Kernels on Parallel PlatformYing Zhang, Saizheng Zhang. 71-78 [doi]
- Error Allowing Minimax: Getting over IndifferenceFlorian Wisser. 79-86 [doi]
- Fast Strong Planning for FOND Problems with Multi-root Directed Acyclic GraphsJicheng Fu, Andres Calderon Jaramillo, Vincent Ng, Farokh B. Bastani, I-Ling Yen. 87-94 [doi]
- A Parallel Bottom-Up Resolution Algorithm Using CilkReza Basseda, Rezaul Alam Chowdhury. 95-100 [doi]
- Characterization of Extended and Simplified Intelligent Water Drop (SIWD) Approaches and Their Comparison to the Intelligent Water Drop (IWD) ApproachJeremy Straub, Eunjin Kim. 101-107 [doi]
- A Spin-Glass Model Based Local Community Detection Method in Social NetworksLei Pan, Chongjun Wang, Junyuan Xie. 108-115 [doi]
- Study and Development of Support Tool with Blinks for Physically Handicapped ChildrenIppei Torii, Kaoruko Ohtani, Takahito Niwa, Naohiro Ishii. 116-122 [doi]
- Detecting Impolite Crawler by Using Time Series AnalysisZhiqian Chen, Wenya Feng. 123-126 [doi]
- Migration Cost-Sensitive Load Balancing for Social Networked Multiagent Systems with CommunitiesWanyuan Wang, Yichuan Jiang. 127-134 [doi]
- Which Users Reply to and Interact with Twitter Social Bots?Randall Wald, Taghi M. Khoshgoftaar, Amri Napolitano, Chris Sumner. 135-144 [doi]
- A Computer-Aided Spectroscopic System for Early Diagnosis of MelanomaLin Li, Qizhi Zhang, Yihua Ding, Huabei Jiang, Bruce T. Thiers, James Z. Wang. 145-150 [doi]
- Learning Occupancy in Single Person Offices with Mixtures of Multi-lag Markov ChainsCarlo Manna, Damien Fay, Kenneth N. Brown, Nic Wilson. 151-158 [doi]
- An Intelligent System for Prediction of School Dropout Risk Group in Higher Education Classroom Based on Artificial Neural NetworksValquiria Ribeiro De Carvalho Martinho, Clodoaldo Nunes, Carlos R. Minussi. 159-166 [doi]
- Dynamic Constraint Reasoning in Smart EnvironmentsViktoriya Degeler, Alexander Lazovik. 167-174 [doi]
- Symbolic Anomaly Detection and Assessment Using Growing Neural GasMatthew Paisner, Michael T. Cox, Don Perlis. 175-181 [doi]
- Improving the Statistical Arbitrage Strategy in Intraday Trading by Combining Extreme Learning Machine and Support Vector Regression with Linear Regression ModelsJarley Palmeira Nobrega, Adriano Lorena Inácio de Oliveira. 182-188 [doi]
- Visual Interpretation of Events in Petroleum GeologyJoel Luis Carbonera, Mara Abel, Claiton M. S. Scherer, Ariane Kravczyk Bernardes. 189-194 [doi]
- Predicting the Next Scenic Spot a User Will Browse on a Tourism Website Based on Markov Prediction ModelYifan Shi, Yimin Wen, Zhigang Fan, YuQing Miao. 195-200 [doi]
- Particle Swarm Optimization Approach with Parameter-Wise Hill-Climbing Heuristic for Task Allocation of Workflow Applications on the CloudSimone A. Ludwig. 201-206 [doi]
- Expert System Simulation of HardwareLawrence Leinweber, Bhanu Singh, Christos A. Papachristou. 207-212 [doi]
- A Planning Tool Supporting the Deployment of Cloud ApplicationsTudor A. Lascu, Jacopo Mauro, Gianluigi Zavattaro. 213-220 [doi]
- An Empirical Study of Robustness of Network Centrality Scores in Various Networks and ConditionsMatthew Herland, Pablo Pastran, Xingquan Zhu. 221-228 [doi]
- On the Influence of the Number of Objectives in Evolutionary Autonomous Software Agent TestingSabrine Kalboussi, Slim Bechikh, Marouane Kessentini, Lamjed Ben Said. 229-234 [doi]
- A Shape Recognition Method Based on Graph- and Line-ContextsHui Wei, Jinwen Xiao. 235-241 [doi]
- Finding Distinctive Shape Features for Automatic Hematoma Classification in Head CT Images from Traumatic Brain InjuriesTianxia Gong, Nengli Lim, Li Cheng, Hwee Kuan Lee, Bolan Su, Chew Lim Tan, Shimiao Li, C. C. Tchoyoson Lim, Boon Chuan Pang, Cheng Kiang Lee. 242-249 [doi]
- A Line-Context Based Object Recognition MethodHui Wei, Lei Wu. 250-255 [doi]
- Contextual Image Segmentation Based on the Potts ModelNara M. Portela, George D. C. Cavalcanti, Tsang Ing Ren. 256-261 [doi]
- Visual Scenes Categorization Using a Flexible Hierarchical Mixture Model Supporting Users OntologyTaoufik Bdiri, Nizar Bouguila, Djemel Ziou. 262-267 [doi]
- A Generic Framework for Behavior Recognition of Complex Activities in RoboticsKai Häussermann, Oliver Zweigle, Paul Levi. 268-275 [doi]
- A Framework for Bean-Shape Contour ExtractionQi Li. 276-283 [doi]
- Using MaxSAT to Correct Errors in AES Key Schedule ImagesXiaojuan Liao, Hui Zhang, Miyuki Koshimura, Hiroshi Fujita, Ryuzo Hasegawa. 284-291 [doi]
- A GA-Based Solution for the Combination Optimization in the Contour FormationHui Wei, Hang Liu, Fuyu Tang. 292-299 [doi]
- Machine Learning for Android Malware Detection Using Permission and API CallsNaser Peiravian, Xingquan Zhu. 300-305 [doi]
- Controller Synthesis for Safety Critical PlanningAndrea Orlandini, Marco Suriano, Amedeo Cesta, Alberto Finzi. 306-313 [doi]
- Rectangular Shape Detection with an Application to License Plate DetectionQi Li, Yongyi Gong. 314-321 [doi]
- Fully-Automated Instance Decomposition and Subplan Synthesis for Parallel ExecutionAmol Dattatraya Mali, Ravi Puthiyattil. 322-329 [doi]
- Explanations and Relaxations for Policy Conflicts in Physical Access ControlFatih Turkmen, Simon N. Foley, Barry O'Sullivan, William M. Fitzgerald, Tarik Hadzic, Stylianos Basagiannis, Menouer Boubekeur. 330-336 [doi]
- NEFCIS: Neuro-fuzzy Concept Based Inference System for Specification MiningArunprasath Shankar, Bhanu Pratap Singh, Francis G. Wolff, Christos A. Papachristou. 337-343 [doi]
- A Dynamic Multiobjective Evolutionary Algorithm for Multicast Routing ProblemMarcos L. P. Bueno, Gina M. B. Oliveira. 344-350 [doi]
- A Rule-Based Hybrid Method for Anomaly Detection in Online-Social-Network GraphsReza Hassanzadeh, Richi Nayak. 351-357 [doi]
- Imbalanced Hypergraph Partitioning and Improvements for Consensus ClusteringJohn Robert Yaros, Tomasz Imielinski. 358-365 [doi]
- Aspect-Based Twitter Sentiment ClassificationHsiang Hui Lek, Danny C. C. Poo. 366-373 [doi]
- Stability of Filter- and Wrapper-Based Feature Subset SelectionRandall Wald, Taghi M. Khoshgoftaar, Amri Napolitano. 374-380 [doi]
- A Review of Ensemble Classification for DNA Microarrays DataTaghi M. Khoshgoftaar, David J. Dittman, Randall Wald, Wael Awada. 381-389 [doi]
- Classifying Documents within Multiple Hierarchical Datasets Using Multi-task LearningAzad Naik, Anveshi Charuvaka, Huzefa Rangwala. 390-397 [doi]
- Evolutionary Distance Metric Learning Approach to Semi-supervised Clustering with Neighbor RelationsKen-ichi Fukui, Satoshi Ono, Taishi Megano, Masayuki Numao. 398-403 [doi]
- Factorized Decision Trees for Active Learning in Recommender SystemsRasoul Karimi, Martin Wistuba, Alexandros Nanopoulos, Lars Schmidt-Thieme. 404-411 [doi]
- An Intelligent Anomaly Detection and Reasoning Scheme for VM Live Migration via Cloud Data MiningQiannan Zhang, Yafei Wu, Tian Huang, Yongxin Zhu. 412-419 [doi]
- Clustering and Selection Using Grouping Genetic Algorithms for Blockmodeling to Construct Neural Network EnsemblesEvandro Jose Da Rocha E. Silva, Teresa Bernarda Ludermir, Leandro Maciel Almeida. 420-425 [doi]
- How the Choice of Wrapper Learner and Performance Metric Affects Subset EvaluationRandall Wald, Taghi M. Khoshgoftaar, Amri Napolitano. 426-432 [doi]
- Hybrid Feature Selection and Weighting Method Based on Binary Particle Swarm OptimizationDiogo da Silva Severo, Everson Verissimo, George D. C. Cavalcanti, Tsang Ing Ren. 433-438 [doi]
- Should the Same Learners Be Used Both within Wrapper Feature Selection and for Building Classification Models?Randall Wald, Taghi M. Khoshgoftaar, Amri Napolitano. 439-445 [doi]
- Flexible Pattern Matching with Gap-Length and One-Off ConditionsDan Guo, Taining Xiang, Xuegang Hu, Xindong Wu. 446-453 [doi]
- Maximizing Classification Performance for Patient Response DatasetsDavid J. Dittman, Taghi M. Khoshgoftaar, Randall Wald, Amri Napolitano. 454-462 [doi]
- A Novel Combination of Reasoners for Ontology ClassificationChanglong Wang, Zhiyong Feng. 463-468 [doi]
- A Genetic Algorithm for Optimizing the Label Ordering in Multi-label Classifier ChainsEduardo Corréa Gonçalves, Alexandre Plastino, Alex Alves Freitas. 469-476 [doi]
- Developments in Partitioning XML Documents by Content and Structure Based on Combining Multiple ClusteringsGianni Costa, Riccardo Ortale. 477-482 [doi]
- Symmetry-Based Pruning in Itemset MiningSaïd Jabbour, Mehdi Khiari, Lakhdar Sais, Yakoub Salhi, Karim Tabia. 483-490 [doi]
- Accelerating One-Pass Clustering by Cluster Selection RacingNicolas Labroche, Marcin Detyniecki, Thomas Bärecke. 491-498 [doi]
- Pairwise Optimization of Bayesian Classifiers for Multi-class Cost-Sensitive LearningClement Charnay, Nicolas Lachiche, Agnès Braud. 499-505 [doi]
- A Parallel Algorithm for Bayesian Network Parameter Learning Based on Factor GraphYue Zhao, Jungang Xu, Yunjun Gao. 506-511 [doi]
- Sampled Bayesian Network Classifiers for Class-Imbalance and Cost-Sensitive LearningLiangxiao Jiang, Chaoqun Li, Zhihua Cai, Harry Zhang. 512-517 [doi]
- Events Extraction and Aggregation for Open Source Intelligence: From Text to KnowledgeLaurie Serrano, Maroua Bouzid, Thierry Charnois, Stephan Brunessaux, Bruno Grilheres. 518-523 [doi]
- An Algorithm for Mining Top K Influential Community Based Evolutionary Outliers in Temporal DatasetYun Hu, Junyuan Xie, Chongjun Wang, Zuojian Zhou. 524-531 [doi]
- Active Preference Learning for Ranking PatternsVladimir Dzyuba, Matthijs van Leeuwen, Siegfried Nijssen, Luc De Raedt. 532-539 [doi]
- From Robots to Reinforcement LearningTongchun Du, Michael T. Cox, Don Perlis, Jared Shamwell, Tim Oates. 540-545 [doi]
- Optimizing Dynamic Ensemble Selection Procedure by Evolutionary Extreme Learning Machines and a Noise Reduction FilterTiago Pessoa Ferreira de Lima, Teresa Bernarda Ludermir. 546-552 [doi]
- Learning Markov Networks with Context-Specific IndependencesAlejandro Edera, Federico Schlüter, Facundo Bromberg. 553-560 [doi]
- A Temporal Difference GNG-Based Approach for the State Space Quantization in Reinforcement Learning EnvironmentsDavi Carnauba De Lima Vieira, Paulo Jorge Leitao Adeodato, Paulo M. Goncalves. 561-568 [doi]
- Enhancing Classification Accuracy with the Help of Feature Maximization MetricJean-Charles Lamirel. 569-574 [doi]
- Attribute Weighted Value Difference MetricChaoqun Li, Liangxiao Jiang, Hongwei Li, Shasha Wang. 575-580 [doi]
- Design Pattern Recognition by Using Adaptive Neuro Fuzzy Inference SystemSultan Alhusain, Simon Coupland, Robert John, Maria Kavanagh. 581-587 [doi]
- From Preferences over Arguments to Preferences over Attacks in Abstract Argumentation: A Comparative StudyClaudette Cayrol, Marie-Christine Lagasquie-Schiex. 588-595 [doi]
- Implementing Tabled Hypothetical DatalogFernando Sáenz-Pérez. 596-601 [doi]
- Encoding Local Correspondence in Topic ModelsRochd El Mehdi, Quafafou Mohamed, Aznag Mustapha. 602-609 [doi]
- Goal-Driven Changes in Argumentation: A Theoretical Framework and a ToolPierre Bisquert, Claudette Cayrol, Florence Dupin de Saint-Cyr, Marie-Christine Lagasquie-Schiex. 610-617 [doi]
- An Axiomatic Approach for Persuasion DialogsLeila Amgoud, Florence Dupin de Saint-Cyr. 618-625 [doi]
- Adaptive and Personalised Robots - Learning from Users' FeedbackAbir-Beatrice Karami, Karim Sehaba, Benoît Encelle. 626-632 [doi]
- A Probabilistic Query Suggestion Approach without Using Query LogsMeher T. Shaikh, Maria Soledad Pera, Yiu-Kai Ng. 633-639 [doi]
- Network Layer-Oriented Task Allocation for Multiagent Systems in Undependable Multiplex NetworksYichuan Jiang, Yifeng Zhou, Yunpeng Li. 640-647 [doi]
- Recognizing User Preferences Based on Layered Activity Recognition and First-Order LogicMichael Glodek, Thomas Geier, Susanne Biundo, Friedhelm Schwenker, Günther Palm. 648-653 [doi]
- Enhancing Dynamic Recommender Selection Using Multiple Rules for Trust and Reputation Models in MANETsAntesar M. Shabut, Keshav Dahal, Irfan Awan. 654-660 [doi]
- On the Relationship between PQCL Preference Formalism and Value-Based AFSedki Karima. 661-666 [doi]
- Qualitative Analysis of Interorganizational WorkFlow Nets Using Linear Logic: Soundness VerificationLigia Maria Soares Passos, Stéphane Julia. 667-673 [doi]
- On Delete Relaxation in Partial-Order Causal-Link PlanningPascal Bercher, Thomas Geier, Felix Richter, Susanne Biundo. 674-681 [doi]
- Modified Conversational Agent ArchitectureTomás Nestorovic, Vaclav Matouek. 682-689 [doi]
- Knowledge Extraction from Web Services RepositoriesVasileios Kiouftis, Evangelos Theodoridis, Athanasios K. Tsakalidis. 690-697 [doi]
- Assessing Procedural Knowledge in Free-Text Answers through a Hybrid Semantic Web ApproachEric Snow, Chadia Moghrabi, Philippe Fournier-Viger. 698-706 [doi]
- A Natural Language Processing and Semantic-Based System for Contract AnalysisDan Yang, Christina Leber, Luis Tari, Aravind Chandramouli, Andrew Crapo, Richard Messmer, Steven Gustafson. 707-712 [doi]
- Abstract DebatesCosmina Croitoru. 713-718 [doi]
- Generating Memoryless Policies Faster Using Automatic Temporal Abstractions for Reinforcement Learning with Hidden StateErkin Çilden, Faruk Polat. 719-726 [doi]
- Semi-automatic Dictionary Curation for Domain-Specific OntologiesAshish Kulkarni, Chetana Gavankar, Ganesh Ramakrishnan, Sriram Raghavan. 727-734 [doi]
- TM-Gen: A Topic Map Generator from Text DocumentsAngel Luis Garrido, Maria G. Buey, Sandra Escudero, Sergio Ilarri, Eduardo Mena, Sara B. Silveira. 735-740 [doi]
- Information Extraction from the Web: An Ontology-Based Method Using Inductive Logic ProgrammingRinaldo Lima, Bernard Espinasse, Hilário Oliveira, Laura Pentagrossa, Fred Freitas. 741-748 [doi]
- Knowledge-Guided Methodology for Specification AnalysisBhanu Singh, Arunprasath Shankar, Yuriy Shiyanovskii, Francis G. Wolff, Christos A. Papachristou, Daniel J. Weyer, Steve Clay, Jim Morrison. 749-754 [doi]
- From Natural Language Requirements to Formal Specification Using an OntologyDriss Sadoun, Catherine Dubois, Yacine Ghamri-Doudane, Brigitte Grau. 755-760 [doi]
- Ontology Learning from Incomplete Semantic Web Data by BelNetMan Zhu, Zhiqiang Gao, Jeff Z. Pan, Yuting Zhao, Ying Xu, Zhibin Quan. 761-768 [doi]
- ESmodels: An Inference Engine of Epistemic SpecificationsZhizheng Zhang, Kaikai Zhao, Rongcun Cui. 769-774 [doi]
- A Reusable Methodology for the Instantiation of Social Recommender SystemsLara Quijano Sánchez, Juan A. Recio-García, Belén Díaz-Agudo. 775-782 [doi]
- Improving Music Recommendation in Session-Based Collaborative Filtering by Using Temporal ContextRicardo Dias, Manuel J. Fonseca. 783-788 [doi]
- Markov Decision Process for Traffic Control at an Isolated IntersectionBiao Yin, Mahjoub Dridi, Abdellah El Moudni. 789-794 [doi]
- Tikhonov or Lasso Regularization: Which Is Better and WhenFei Wang, Sanjay Chawla, Wei Liu. 795-802 [doi]
- Learning Useful Macro-actions for Planning with N-GramsAdrien Dulac, Damien Pellier, Humbert Fiorino, David Janiszek. 803-810 [doi]
- On the Development of Voter Transition Models for Social Choice Markov Decision ProcessesDavid Garcia, Anton Riedl. 811-817 [doi]
- Kaczmarz Algorithm with Soft Constraints for User Interface LayoutNoreen Jamil, Deanna Needell, Johannes Müller, Christof Lutteroth, Gerald Weber. 818-824 [doi]
- Optimization of Traffic Lights Timing Based on Multiple Neural NetworksMichel B. W. De Oliveira, Areolino de Almeida Neto. 825-832 [doi]
- Using Evolution Strategies to Reduce Emergency Services Arrival Time in Case of AccidentJavier Barrachina, Piedad Garrido, Manuel Fogue, Francisco J. Martinez, Juan-Carlos Cano, Carlos Miguel Tavares Calafate, Pietro Manzoni. 833-840 [doi]
- Motion-Driven Action-Based PlanningBrandon Ellenberger, Amol Dattatraya Mali. 841-848 [doi]
- CPP-SNS: A Solution to Influence Maximization Problem under Cost ControlQianyi Zhan, Hongchao Yang, Chongjun Wang, Junyuan Xie. 849-856 [doi]
- A Versatile Graph-Based Approach to Package RecommendationRoberto Interdonato, Salvatore Romeo, Andrea Tagarelli, George Karypis. 857-864 [doi]
- Relaxing the Relaxed Exist-Step Parallel Planning SemanticsTomas Balyo. 865-871 [doi]
- Perpetual Learning through Overcoming InconsistenciesDu Zhang. 872-879 [doi]
- Change Your Belief about Belief ChangeÉric Grégoire. 880 [doi]
- Comparison of Two Frameworks for Measuring the Stability of Gene-Selection Techniques on Noisy Class-Imbalanced DataRandall Wald, Taghi M. Khoshgoftaar, Ahmad Abu Shanab. 881-888 [doi]
- Modeling Natural Language Sentences into SPN GraphsM. Mills, Adamantia Psarologou, Nikolaos G. Bourbakis. 889-896 [doi]
- Capturing Structure in Hard Combinatorial ProblemsStefan Szeider. 897-898 [doi]
- Constraint Programming in Compiler Optimization: Lessons LearnedPeter van Beek. 899 [doi]
- Adaptive Constructive Interval DisjunctionBertrand Neveu, Gilles Trombettoni. 900-906 [doi]
- Conflict Analysis and Branching Heuristics in the Search for Graph AutomorphismsPaolo Codenotti, Hadi Katebi, Karem A. Sakallah, Igor L. Markov. 907-914 [doi]
- Solving WCSP by Extraction of Minimal Unsatisfiable CoresChristophe Lecoutre, Nicolas Paris, Olivier Roussel, Sébastien Tabary. 915-922 [doi]
- Questioning the Importance of WCORE-Like Minimization Steps in MUC-Finding AlgorithmsÉric Grégoire, Jean-Marie Lagniez, Bertrand Mazure. 923-930 [doi]
- Model-Guided Approaches for MaxSAT SolvingAntónio Morgado, Federico Heras, Joao Marques-Silva. 931-938 [doi]
- Combining MaxSAT Reasoning and Incremental Upper Bound for the Maximum Clique ProblemChu Min Li, Zhiwen Fang, Ke Xu. 939-946 [doi]
- A Hybrid Tractable Class for Non-binary CSPsAchref El Mouelhi, Philippe Jégou, Cyril Terrioux. 947-954 [doi]
- Solving E-Squaro through SAT-CodingÉric Grégoire, Atef Hasni, Bertrand Mazure, Cédric Piette. 955-962 [doi]
- Constraint Games: Framework and Local Search SolverThi-Van-Anh Nguyen, Arnaud Lallouet, Lucas Bordeaux. 963-970 [doi]
- Variable Objective Large Neighborhood Search: A Practical Approach to Solve Over-Constrained ProblemsPierre Schaus. 971-978 [doi]
- A General Privacy Loss Aggregation Framework for Distributed Constraint ReasoningJimmy Ho-Man Lee, Terrence W. K. Mak, Yuxiang Shi. 979-986 [doi]
- On-the-Fly Lazy Clause Simplification Based on Binary ResolventsHidetomo Nabeshima, Koji Iwanuma, Katsumi Inoue. 987-995 [doi]
- Declarative Heuristics in Constraint SatisfactionErich Christian Teppan, Gerhard Friedrich. 996-1003 [doi]
- More Smear-Based Variable Selection Heuristics for NCSPsIgnacio Araya, Víctor Reyes, Cristian Oreallana. 1004-1011 [doi]
- Lazy Branching for Constraint SatisfactionDeepak Mehta, Barry O'Sullivan, Lars Kotthoff, Yuri Malitsky. 1012-1019 [doi]
- Compiling Pseudo-Boolean Constraints to SAT with Order EncodingNaoyuki Tamura, Mutsunori Banbara, Takehide Soh. 1020-1027 [doi]
- Application of Hierarchical Hybrid Encodings to Efficient Translation of CSPs to SATVan-Hau Nguyen, Miroslav N. Velev, Pedro Barahona. 1028-1035 [doi]
- Bounded Strings for Constraint ProgrammingJoseph D. Scott, Pierre Flener, Justin Pearson. 1036-1043 [doi]
- A CSP Approach for Metamodel InstantiationAdel Ferdjoukh, Anne-Elisabeth Baert, Annie Chateau, Remi Coletta, Clémentine Nebut. 1044-1051 [doi]
- A Constraint Programming Approach to the Additional Relay Placement Problem in Wireless Sensor NetworksLuis Quesada, Kenneth N. Brown, Barry O'Sullivan, Lanny Sitanayah, Cormac J. Sreenan. 1052-1059 [doi]
- A Filtering Algorithm for Constrained Clustering with Within-Cluster Sum of Dissimilarities CriterionThi-Bich-Hanh Dao, Khanh-Chuong Duong, Christel Vrain. 1060-1067 [doi]
- Model Expansion in the Presence of Function Symbols Using Constraint ProgrammingBroes de Cat, Bart Bogaerts, Jo Devriendt, Marc Denecker. 1068-1075 [doi]
- Generation of Implied Constraints for Automaton-Induced DecompositionsMaria Andreina Francisco Rodriguez, Pierre Flener, Justin Pearson. 1076-1083 [doi]