From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Original-To: caml-list@sympa.inria.fr Delivered-To: caml-list@sympa.inria.fr Received: from mail3-relais-sop.national.inria.fr (mail3-relais-sop.national.inria.fr [192.134.164.104]) by sympa.inria.fr (Postfix) with ESMTPS id 0F3887FA57 for ; Thu, 24 Jul 2014 22:44:35 +0200 (CEST) Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of maurizio.proietti@iasi.cnr.it) identity=pra; client-ip=209.85.160.176; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="maurizio.proietti@iasi.cnr.it"; x-sender="maurizio.proietti@iasi.cnr.it"; x-conformance=sidf_compatible Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of maurizio.proietti@iasi.cnr.it) identity=mailfrom; client-ip=209.85.160.176; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="maurizio.proietti@iasi.cnr.it"; x-sender="maurizio.proietti@iasi.cnr.it"; x-conformance=sidf_compatible Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of postmaster@mail-yk0-f176.google.com) identity=helo; client-ip=209.85.160.176; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="maurizio.proietti@iasi.cnr.it"; x-sender="postmaster@mail-yk0-f176.google.com"; x-conformance=sidf_compatible X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: An0EALxv0VPRVaCwm2dsb2JhbABYg2BXBIJ0r3gBlkmITQgWEAEBAQEBBgsLCRQphBwLBm8NBzACJBIBBQEOFBMiiCANizcVjQiDFWqLKZc7FwqMEoYugU4FmzaLZ4ZsGCmEezsvAQE X-IPAS-Result: An0EALxv0VPRVaCwm2dsb2JhbABYg2BXBIJ0r3gBlkmITQgWEAEBAQEBBgsLCRQphBwLBm8NBzACJBIBBQEOFBMiiCANizcVjQiDFWqLKZc7FwqMEoYugU4FmzaLZ4ZsGCmEezsvAQE X-IronPort-AV: E=Sophos;i="5.01,726,1400018400"; d="scan'208";a="72725736" Received: from mail-yk0-f176.google.com ([209.85.160.176]) by mail3-smtp-sop.national.inria.fr with ESMTP/TLS/RC4-SHA; 24 Jul 2014 22:44:31 +0200 Received: by mail-yk0-f176.google.com with SMTP id 19so2174033ykq.21 for ; Thu, 24 Jul 2014 13:44:30 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:date:message-id:subject:from:to :content-type; bh=Id2FpnGi/KHjOCZSEbQdJCoB3d4y2guWwo0QizpLSto=; b=QHvt3EyZ5BQizY+zRs8rWFpEiuVu+TDq9qzbflkZBXQMBPg6UgHDsub/seuB0uKlzB BWYN9c2wt5WhKQhe6FqMPLrWLgA4KeYLx0nQ9h4Gmw7x6+S0/7Ud+YsY/F0puQYUwHAd Pwe/qKI56GeVkHqUUn3zyWZ+YauzC7WdqSQ3naJylF9qa8ENlGI/BUGy+el4hrnPFc9V tUKzrsF/KgnSNs2ecMhBc15DBHCfzgc3bTHFFbOM8kDqMTBX7RGAMcS9ydE5vU61P1ta /pXtooCzZWzBty82YS8lU7YxNHV/KGbU9tI0kbSLCthDJ63qCIXqW38XcFrb8uJHGqSI +19A== X-Gm-Message-State: ALoCoQnG4xszx4OPnv4BXMVJUHEmhEfloj+MLFvkAQfZxuRryFKRJtknreTBQPWuDRnoIKnTjQNN MIME-Version: 1.0 X-Received: by 10.236.51.228 with SMTP id b64mr15865876yhc.93.1406234670367; Thu, 24 Jul 2014 13:44:30 -0700 (PDT) Received: by 10.170.205.194 with HTTP; Thu, 24 Jul 2014 13:44:30 -0700 (PDT) Date: Thu, 24 Jul 2014 22:44:30 +0200 Message-ID: From: Maurizio Proietti To: Emanuele De Angelis Content-Type: multipart/alternative; boundary=089e013a1ca2ffa01d04fef685d5 X-Validation-by: maurizio.proietti@iasi.cnr.it Subject: [Caml-list] LOPSTR 2014: Call for Participation --089e013a1ca2ffa01d04fef685d5 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D CALL FOR P= ARTICIPATION =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D 24th International Symposium on Logic-Based Program Synthesis and Transformation LOPSTR 2014 http://www.iasi.cnr.it/events/lopstr14/ University of Kent, Canterbury, UK, September 9-11, 2014 Co-located with the 16th International ACM SIGPLAN Symposium on Principles and Practice of Declarative Programming (PPDP 2014) =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D Early registration by August 8, 2014 http://www.cs.kent.ac.uk/events/2014/ppdp-lopstr-14/registration.html Invited Speakers: Roberto Giacobazzi (University of Verona, Italy) "Obscuring Code -- Unveiling and Veiling Information in Programs" Viktor Kuncak (EPFL, Switzerland) Title to be announced Accepted papers - Nikita Danilenko Functional Kleene Closures - Amer Tahat and Ali Ebnenasir A Hybrid Method for the Verification and Synthesis of Parameterized Self-Stabilizing Protocols - German Vidal Concolic Execution and Test-Case Generation in Prolog - Henning Christiansen and Maja Kirkeby Confluence Modulo Equivalence in Constraint Handling Rules - Remis Balaniuk Drill & Join: A method for inductive program synthesis - Minoru Kinoshita, Kohei Suenaga and Atsushi Igarashi Automatic Synthesis of Combiners in the MapReduce Framework - An Approach with Right Inverse - Daniel De Schreye, Vincent Nys and Colin Nicholson Analysing and Compiling Coroutines with Abstract Conjunctive Partial Deduction - Daniel Gall and Thom Fr=C3=BChwirth A Formal Semantics for the Cognitive Architecture ACT-R - J. Robert M. Cornish, Graeme Gange, Jorge A. Navas, Peter Schachte, Harald S=C3=B8ndergaard and Peter J. Stuckey Analyzing array manipulating programs by program transformation - Nada Sharaf, Slim Abdennadher and Thom Fr=C3=BChwirth A Visualization Tool for Constraint Handling Rules - Salvador Lucas, Jose Meseguer and Ra=C3=BAl Guti=C3=A9rrez Extending the 2D DP Framework for CTRSs - Ahmed Nagah, Amira Zaki and Slim Abdennadher Exhaustive Execution of CHR through Source-to-Source Transformation - Sandra Alves, Anatoli Degtyarev and Maribel Fernandez Access control and obligations in the category-based metamodel: A rewrite-based semantics - James Lipton, Emilio Jes=C3=BAs Gallego Arias and Julio Mari=C3=B1o A Declarative Compilation of Constraint Logic Programming - Jose F. Morales and Manuel V. Hermenegildo Pre-indexed Terms for Prolog - Norbert Preining, Kokichi Futatsugi and Kazuhiro Ogata Liveness properties in CafeOBJ - a case study for meta-level specifications - Wlodzimierz Drabent On completeness of logic programs - Ranjeet Singh and Andy King Partial Evaluation for Java Malware Detection - Raul Gutierrez and Salvador Lucas Below Frozen Positions - Md Solimul Chowdhury, Jia-Huai You, Wu Chen, Arash Karimi and Fangfang Liu Polynomial Approximation to Well-Founded Semantics for Logic Programs with Generalized Atoms: Case Studies =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D Program Co-Chairs: Maurizio Proietti, IASI-CNR, Italy (maurizio.proietti@iasi.cnr.it) Hirohisa Seki, Nagoya Institute of Technology, Japan (seki@nitech.ac.jp ) Symposium Co-Chairs: Olaf Chitil and Andy King School of Computing, University of Kent, UK ({O.Chitil,A.M.King}@kent.ac.uk) Organizing Committee: Emanuele De Angelis, University of Chieti-Pescara and IASI-CNR, Italy Fabrizio Smith, IASI-CNR, Italy --089e013a1ca2ffa01d04fef685d5 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D CALL F= OR PARTICIPATION =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

=C2=A0 =C2=A0 =C2= =A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 = =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2= =A024th International Symposium on
=C2=A0 =C2=A0 =C2=A0 =C2=A0 = =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2= =A0 =C2=A0Logic-Based Program Synthesis and Transformation
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 = =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2= =A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0LO= PSTR 2014

=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2= =A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 = =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0http://www.iasi.cnr.it/events/lopstr14/
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 = =C2=A0 =C2=A0 =C2=A0 University of Kent, Canterbury, UK, September 9-11, 20= 14

=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2= =A0 =C2=A0 =C2=A0 Co-located with the 16th International ACM SIGPLAN Sympos= ium on=C2=A0
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2= =A0 =C2=A0 =C2=A0 Principles and Practice of Declarative Programming (PPDP = 2014)

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D
Early registration by August 8, 2014
=C2=A0 =C2=A0 =C2=A0http://www.cs.kent.ac.uk/events/2014/ppdp-lopst= r-14/registration.html

Invited Speakers:
=C2=A0 =C2=A0 =C2=A0Roberto= Giacobazzi (University of Verona, Italy)
"Obscuring Code -- Unveiling and Veiling= Information in Programs"
=C2=A0 = =C2=A0 =C2=A0Viktor Kuncak (EPFL, Switzerland)
Title to be announced

Accepted papers
- Nikita Danilenko<= span class=3D"" style=3D"white-space:pre">
Functional Kleene Closures
- Amer Tahat and Al= i Ebnenasir
A Hybrid Method for the V= erification and Synthesis of=C2=A0Parameterized Self-Stabilizing Protocols<= span class=3D"" style=3D"white-space:pre">
- German Vidal
Concolic Execution and Test-Case Generati= on in Prolog
- Henning Christian= sen and Maja Kirkeby
Confluence Modu= lo Equivalence in Constraint Handling Rules
- Remis Balaniuk
Drill & Joi= n: A method for inductive program synthesis
- Minoru Kinoshita,= Kohei Suenaga and Atsushi Igarashi
Automatic Synthesis of Combiners in the MapReduce Fr= amework -=C2=A0An Approach with Right Inverse
- Daniel De Schreye= , Vincent Nys and Colin Nicholson
Ana= lysing and Compiling Coroutines with Abstract Conjunctive=C2=A0Partial Deduction
- Daniel Gall and T= hom Fr=C3=BChwirth
=
A Formal Semantics= for the Cognitive Architecture ACT-R
- J. Robert M. Corn= ish, Graeme Gange, Jorge A. Navas, Peter Schachte,=C2=A0Harald S=C3=B8nderg= aard and Peter J. Stuckey
Analyzing = array manipulating programs by program transformation
- Nada Sharaf, Slim= Abdennadher and Thom Fr=C3=BChwirth
= A Visualization Tool for Constraint Handling Rules
- Salvador Lucas, J= ose Meseguer and Ra=C3=BAl Guti=C3=A9rrez
Extending the 2D DP Framework for CTRSs
- Ahmed Nagah, Amir= a Zaki and Slim Abdennadher
Exhaustiv= e Execution of CHR through Source-to-Source Transformation
- Sandra Alves, Ana= toli Degtyarev and Maribel Fernandez
= Access control and obligations in the category-based metamodel:=C2=A0A rewr= ite-based semantics
- James Lipton, Emi= lio Jes=C3=BAs Gallego Arias and Julio Mari=C3=B1o
A Declarative Compilation of Constraint Logic Programming
- Jose F. Morales a= nd Manuel V. Hermenegildo
Pre-indexed= Terms for Prolog
- Norbert Preining,= Kokichi Futatsugi and Kazuhiro Ogata
Liveness properties in CafeOBJ - a case study for meta-level specification= s
- Wlodzimierz Drabe= nt
On completeness of logic programs<= span class=3D"" style=3D"white-space:pre">
- Ranjeet Singh and= Andy King
Partial Evaluation for Jav= a Malware Detection
- Raul Gutierrez an= d Salvador Lucas
Below Frozen Positio= ns
- Md Solimul Chowdh= ury, Jia-Huai You, Wu Chen, Arash Karimi and=C2=A0Fangfang Liu
Polynomial Approximation to Well-Founded Sema= ntics for Logic Programs with Generalized Atoms: Case Studies
=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=

Program Co-Chairs:
=C2=A0 =C2=A0 =C2=A0= Maurizio Proietti, IASI-CNR, Italy (maurizio.proietti@iasi.cnr.it)
=C2=A0 =C2=A0 =C2=A0Hirohisa Seki, Nagoya Institute of Technology, Jap= an (seki@nitech.ac.jp)
<= br>
Symposium Co-Chairs:
=C2=A0 =C2=A0 =C2=A0Olaf Chiti= l and Andy King
=C2=A0 =C2=A0 =C2=A0School of Computing, Universi= ty of Kent, UK=C2=A0

=
Organizing Committee:
=C2=A0 =C2=A0 =C2=A0Emanuele De = Angelis, University of Chieti-Pescara and IASI-CNR, Italy=C2=A0
=C2=A0 =C2=A0 =C2=A0Fabrizio Smith, IASI-CNR, Italy
--089e013a1ca2ffa01d04fef685d5--