The International Symposium on Experimental Algorithms (SEA), previously known as Workshop on Experimental Algorithms (WEA), is a computer science conference in the area of algorithm engineering.
Edition | Proceedings | Location | Chairs |
---|---|---|---|
21st | SEA 2023 [1] | Barcelona, Spain | Loukas Georgiadis |
20th | SEA 2022 [2] | Heidelberg, Germany | Christian Schulz |
19th | SEA 2021 [3] | Nice, France [4] | David Coudert, Emanuele Natale |
18th | SEA 2020 [5] | Catania, Italy [6] | Simone Faro, Domenico Cantone |
17th | SEA 2018 [7] | L'Aquila, Italy [8] | Gianlorenzo D'Angelo |
16th | SEA 2017 [9] | London, UK [10] | Costas S. Iliopoulos, Solon P. Pissis, Simon J. Puglisi, Rajeev Raman |
15th | SEA 2016 [11] | St. Petersburg, Russia [12] | Andrew V. Goldberg, Alexander S. Kulikov |
14th | SEA 2015 [13] | Paris, France | Evripidis Bampis |
13th | SEA 2014 [14] | Copenhagen, Denmark [15] | Joachim Gudmundsson, Jyrki Katajainen |
12th | SEA 2013 [16] | Rome, Italy [17] | Vincenzo Bonifaci, Camil Demetrescu, Alberto Marchetti-Spaccamela |
11th | SEA 2012 [18] | Bordeaux, France [19] | Ralf Klasing |
10th | SEA 2011 [20] | Kolimpari, Chania, Crete, Greece | Panos M. Pardalos, Steffen Rebennack |
9th | SEA 2010 [21] | Ischia Island, Naples, Italy | Paola Festa |
8th | SEA 2009 [22] | Dortmund, Germany [23] | Jan Vahrenhold |
7th | WEA 2008 [24] | Provincetown, MA, USA | Catherine C. McGeoch |
6th | WEA 2007 [25] | Rome, Italy | Camil Demetrescu |
5th | WEA 2006 [26] | Cala Galdana, Menorca Island, Spain | Carme Àlvarez, Maria J. Serna |
4th | WEA 2005 [27] | Santorini Island, Greece | Sotiris E. Nikoletseas |
3nd | WEA 2004 [28] | Angra dos Reis, Brazil | Celso C. Ribeiro, Simone L. Martins |
2nd | WEA 2003 [29] | Ascona, Switzerland | Klaus Jansen, Marian Margraf, Monaldo Mastrolilli, José D. P. Rolim |
In information science, formal concept analysis (FCA) is a principled way of deriving a concept hierarchy or formal ontology from a collection of objects and their properties. Each concept in the hierarchy represents the objects sharing some set of properties; and each sub-concept in the hierarchy represents a subset of the objects in the concepts above it. The term was introduced by Rudolf Wille in 1981, and builds on the mathematical theory of lattices and ordered sets that was developed by Garrett Birkhoff and others in the 1930s.
In compiler optimization, register allocation is the process of assigning local automatic variables and expression results to a limited number of processor registers.
Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic. Packages are released for Linux and Windows.
In computer science, the International Conference on Computer-Aided Verification (CAV) is an annual academic conference on the theory and practice of computer-aided formal analysis of software and hardware systems, broadly known as formal methods. Among the important results originally published in CAV are techniques in model checking, such as Counterexample-Guided Abstraction Refinement (CEGAR) and partial order reduction. It is often ranked among the top conferences in computer science.
In computer science and formal methods, a SAT solver is a computer program which aims to solve the Boolean satisfiability problem. On input a formula over Boolean variables, such as "(x or y) and (x or not y)", a SAT solver outputs whether the formula is satisfiable, meaning that there are possible values of x and y which make the formula true, or unsatisfiable, meaning that there are no such values of x and y. In this case, the formula is satisfiable when x is true, so the solver should return "satisfiable". Since the introduction of algorithms for SAT in the 1960s, modern SAT solvers have grown into complex software artifacts involving a large number of heuristics and program optimizations to work efficiently.
The European Joint Conferences on Theory and Practice of Software (ETAPS) is a confederation of (currently) four computer science conferences taking place annually at one conference site, usually end of March or April. Three of the four conferences are top ranked in software engineering and one (ESOP) is top ranked in programming languages.
WoLLIC, the Workshop on Logic, Language, Information and Computation is an academic conference in the field of pure and applied logic and theoretical computer science. WoLLIC has been organised annually since 1994, typically in June or July; the conference is scientifically sponsored by the Association for Logic, Language and Information, the Association for Symbolic Logic, the European Association for Theoretical Computer Science and the European Association for Computer Science Logic.
The International Semantic Web Conference (ISWC) is a series of academic conferences and the premier international forum for the Semantic Web, Linked Data and Knowledge Graph Community. Here, scientists, industry specialists, and practitioners meet to discuss the future of practical, scalable, user-friendly, and game changing solutions. Its proceedings are published in the Lecture Notes in Computer Science by Springer-Verlag.
Amos Fiat is an Israeli computer scientist, a professor of computer science at Tel Aviv University. He is known for his work in cryptography, online algorithms, and algorithmic game theory.
Peter Ružička was a Slovak computer scientist and mathematician who worked in the fields of distributed computing and computer networks. He was a professor at the Comenius University, Faculty of Mathematics, Physics and Informatics working in several research areas of theoretical computer science throughout his long career.
Massive Online Analysis (MOA) is a free open-source software project specific for data stream mining with concept drift. It is written in Java and developed at the University of Waikato, New Zealand.
Kai Tapani Salomaa is a Finnish Canadian theoretical computer scientist, known for his numerous contributions to the state complexity of finite automata. His highly cited 1994 joint paper with Yu and Zhuang laid the foundations of the area. He has published over 100 papers in scientific journals on various subjects in formal language theory. Salomaa is a full professor at Queen's University.
Esko Juhani Ukkonen is a Finnish theoretical computer scientist known for his contributions to string algorithms, and particularly for Ukkonen's algorithm for suffix tree construction. He is a professor emeritus of the University of Helsinki.
Maxime Crochemore is a French computer scientist known for his numerous contributions to algorithms on strings. He is currently a professor at King's College London.
Hash-based cryptography is the generic term for constructions of cryptographic primitives based on the security of hash functions. It is of interest as a type of post-quantum cryptography.
Dmitry Khovratovich is a Russian cryptographer, currently a Lead Cryptographer for the Dusk Network, researcher for the Ethereum Foundation, and member of the International Association for Cryptologic Research.
Klaus Peter Jantke is a German mathematician, computer scientist, university teacher and academic researcher focusing on Artificial intelligence, Educational technology, Game studies and gamification.
Runtime predictive analysis is a runtime verification technique in computer science for detecting property violations in program executions inferred from an observed execution. An important class of predictive analysis methods has been developed for detecting concurrency errors in concurrent programs, where a runtime monitor is used to predict errors which did not happen in the observed run, but can happen in an alternative execution of the same program. The predictive capability comes from the fact that the analysis is performed on an abstract model extracted online from the observed execution, which admits a class of executions beyond the observed one.
Deepak Kapur is a Distinguished Professor in the Department of Computer Science at the University of New Mexico.
In cryptography, a round or round function is a basic transformation that is repeated (iterated) multiple times inside the algorithm. Splitting a large algorithmic function into rounds simplifies both implementation and cryptanalysis.