callback( { "result":{ "query":":facetid:toc:\"db/conf/csp/csp2012.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"196.18" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"40", "@dc":"40", "@oc":"40", "@id":"43387559", "text":":facetid:toc:db/conf/csp/csp2012.bht" } }, "hits":{ "@total":"40", "@computed":"40", "@sent":"40", "@first":"0", "hit":[{ "@score":"1", "@id":"4398414", "info":{"authors":{"author":[{"@pid":"118/8444","text":"Talha Amin"},{"@pid":"97/130","text":"Igor Chikalov"},{"@pid":"m/MJMoshkov","text":"Mikhail Moshkov"},{"@pid":"31/5835","text":"Beata Zielosko"}]},"title":"Relationships Between Length and Coverage of Exact Decision Rules.","venue":"CS&P","pages":"1-12","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/AminCMZ12","ee":"https://ceur-ws.org/Vol-928/0001.pdf","url":"https://dblp.org/rec/conf/csp/AminCMZ12"}, "url":"URL#4398414" }, { "@score":"1", "@id":"4398415", "info":{"authors":{"author":[{"@pid":"120/2979","text":"Mohammad Azad"},{"@pid":"97/130","text":"Igor Chikalov"},{"@pid":"m/MJMoshkov","text":"Mikhail Moshkov"},{"@pid":"31/5835","text":"Beata Zielosko"}]},"title":"Greedy Algorithm for Construction of Decision Trees for Tables with Many-Valued Decisions.","venue":"CS&P","pages":"13-24","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/AzadCMZ12","ee":"https://ceur-ws.org/Vol-928/0013.pdf","url":"https://dblp.org/rec/conf/csp/AzadCMZ12"}, "url":"URL#4398415" }, { "@score":"1", "@id":"4398416", "info":{"authors":{"author":{"@pid":"13/4095","text":"Vladimir A. Bashkin"}},"title":"One-counter Circuits.","venue":"CS&P","pages":"25-36","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/Bashkin12","ee":"https://ceur-ws.org/Vol-928/0025.pdf","url":"https://dblp.org/rec/conf/csp/Bashkin12"}, "url":"URL#4398416" }, { "@score":"1", "@id":"4398417", "info":{"authors":{"author":[{"@pid":"90/4467","text":"Marek A. Bednarczyk"},{"@pid":"120/8708","text":"Piotr Józwiak"},{"@pid":"46/6751","text":"Wieslaw Pawlowski"}]},"title":"A Class of Hypernets with Token Creation and Decidable Reachability Problem.","venue":"CS&P","pages":"37-48","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/BednarczykJP12","ee":"https://ceur-ws.org/Vol-928/0037.pdf","url":"https://dblp.org/rec/conf/csp/BednarczykJP12"}, "url":"URL#4398417" }, { "@score":"1", "@id":"4398418", "info":{"authors":{"author":[{"@pid":"73/4054","text":"Marco Bellia"},{"@pid":"o/MEOcchiuto","text":"M. Eugenia Occhiuto"}]},"title":"Inference, Targeting and Compatibility in a Type System for Java with SAM Typed Closures.","venue":"CS&P","pages":"49-60","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/BelliaO12","ee":"https://ceur-ws.org/Vol-928/0049.pdf","url":"https://dblp.org/rec/conf/csp/BelliaO12"}, "url":"URL#4398418" }, { "@score":"1", "@id":"4398419", "info":{"authors":{"author":[{"@pid":"97/130","text":"Igor Chikalov"},{"@pid":"60/7385-4","text":"Shahid Hussain 0004"},{"@pid":"m/MJMoshkov","text":"Mikhail Moshkov"}]},"title":"Average Depth and Number of Misclassifications for Decision Trees.","venue":"CS&P","pages":"160-169","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/ChikalovHM12","ee":"https://ceur-ws.org/Vol-928/0160.pdf","url":"https://dblp.org/rec/conf/csp/ChikalovHM12"}, "url":"URL#4398419" }, { "@score":"1", "@id":"4398420", "info":{"authors":{"author":{"@pid":"22/6041","text":"Ludwik Czaja"}},"title":"Equations for Asynchronous Message Passing.","venue":"CS&P","pages":"61-72","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/Czaja12","ee":"https://ceur-ws.org/Vol-928/0061.pdf","url":"https://dblp.org/rec/conf/csp/Czaja12"}, "url":"URL#4398420" }, { "@score":"1", "@id":"4398421", "info":{"authors":{"author":[{"@pid":"120/8795","text":"Marta Czyzewska"},{"@pid":"15/8611","text":"Jaroslaw Szkola"},{"@pid":"93/6308","text":"Krzysztof Pancerz"}]},"title":"Self-Organizing Feature Maps in Correlating Groups of Time Series: Experiments with Indicators Describing Entrepreneurship.","venue":"CS&P","pages":"73-78","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/CzyzewskaSP12","ee":"https://ceur-ws.org/Vol-928/0073.pdf","url":"https://dblp.org/rec/conf/csp/CzyzewskaSP12"}, "url":"URL#4398421" }, { "@score":"1", "@id":"4398422", "info":{"authors":{"author":[{"@pid":"82/3774","text":"Robert Dabrowski"},{"@pid":"s/KrzysztofStencel","text":"Krzysztof Stencel"},{"@pid":"20/9365","text":"Grzegorz Timoszuk"}]},"title":"One Graph to Rule Them All - Software Measurment and Management.","venue":"CS&P","pages":"79-90","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/DabrowskiST12","ee":"https://ceur-ws.org/Vol-928/0079.pdf","url":"https://dblp.org/rec/conf/csp/DabrowskiST12"}, "url":"URL#4398422" }, { "@score":"1", "@id":"4398423", "info":{"authors":{"author":[{"@pid":"117/1519","text":"Nils Erik Flick"},{"@pid":"k/ManfredKudlek","text":"Manfred Kudlek"}]},"title":"Properties of Languages with Catenation and Shuffle.","venue":"CS&P","pages":"91-102","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/FlickK12","ee":"https://ceur-ws.org/Vol-928/0091.pdf","url":"https://dblp.org/rec/conf/csp/FlickK12"}, "url":"URL#4398423" }, { "@score":"1", "@id":"4398424", "info":{"authors":{"author":[{"@pid":"117/1519","text":"Nils Erik Flick"},{"@pid":"k/ManfredKudlek","text":"Manfred Kudlek"}]},"title":"A Hierarchy of Languages with Catenation and Shuffle.","venue":"CS&P","pages":"103-114","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/FlickK12a","ee":"https://ceur-ws.org/Vol-928/0103.pdf","url":"https://dblp.org/rec/conf/csp/FlickK12a"}, "url":"URL#4398424" }, { "@score":"1", "@id":"4398425", "info":{"authors":{"author":{"@pid":"02/997","text":"Adam Grabowski"}},"title":"Computer-Driven Searching for Axiomatization of Rough Sets.","venue":"CS&P","pages":"115-122","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/Grabowski12","ee":"https://ceur-ws.org/Vol-928/0115.pdf","url":"https://dblp.org/rec/conf/csp/Grabowski12"}, "url":"URL#4398425" }, { "@score":"1", "@id":"4398426", "info":{"authors":{"author":{"@pid":"38/1824","text":"Damas P. Gruska"}},"title":"Information Flow and Concurrent Imperative Languages.","venue":"CS&P","pages":"123-134","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/Gruska12","ee":"https://ceur-ws.org/Vol-928/0123.pdf","url":"https://dblp.org/rec/conf/csp/Gruska12"}, "url":"URL#4398426" }, { "@score":"1", "@id":"4398427", "info":{"authors":{"author":{"@pid":"38/1824","text":"Damas P. Gruska"}},"title":"Test Based Security.","venue":"CS&P","pages":"135-146","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/Gruska12a","ee":"https://ceur-ws.org/Vol-928/0135.pdf","url":"https://dblp.org/rec/conf/csp/Gruska12a"}, "url":"URL#4398427" }, { "@score":"1", "@id":"4398428", "info":{"authors":{"author":[{"@pid":"32/11488","text":"Mostafa Herajy"},{"@pid":"92/3962","text":"Monika Heiner"}]},"title":"Towards a Computational Steering and Petri Nets Framework for the Modelling of Biochemical Reaction Networks.","venue":"CS&P","pages":"147-159","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/HerajyH12","ee":"https://ceur-ws.org/Vol-928/0147.pdf","url":"https://dblp.org/rec/conf/csp/HerajyH12"}, "url":"URL#4398428" }, { "@score":"1", "@id":"4398429", "info":{"authors":{"author":{"@pid":"120/8973","text":"Grzegorz Jaskiewicz"}},"title":"Prolog-Based Reasoning Layer for Counter-Strike Agents.","venue":"CS&P","pages":"170-181","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/Jaskiewicz12","ee":"https://ceur-ws.org/Vol-928/0170.pdf","url":"https://dblp.org/rec/conf/csp/Jaskiewicz12"}, "url":"URL#4398429" }, { "@score":"1", "@id":"4398430", "info":{"authors":{"author":{"@pid":"k/MichaelKohlerB","text":"Michael Köhler-Bußmeier"}},"title":"On the Complexity of Safe, Elementary Hornets.","venue":"CS&P","pages":"203-214","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/Kohler-Bussmeier12","ee":"https://ceur-ws.org/Vol-928/0203.pdf","url":"https://dblp.org/rec/conf/csp/Kohler-Bussmeier12"}, "url":"URL#4398430" }, { "@score":"1", "@id":"4398431", "info":{"authors":{"author":{"@pid":"k/MichaelKohlerB","text":"Michael Köhler-Bußmeier"}},"title":"Negotiating Inter-Organisational Processes.","venue":"CS&P","pages":"215-226","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/Kohler-Bussmeier12a","ee":"https://ceur-ws.org/Vol-928/0215.pdf","url":"https://dblp.org/rec/conf/csp/Kohler-Bussmeier12a"}, "url":"URL#4398431" }, { "@score":"1", "@id":"4398432", "info":{"authors":{"author":[{"@pid":"117/3289","text":"Adam Krasuski"},{"@pid":"97/7029","text":"Marcin S. Szczuka"}]},"title":"Knowledge Driven Query Sharding.","venue":"CS&P","pages":"182-190","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/KrasuskiS12","ee":"https://ceur-ws.org/Vol-928/0182.pdf","url":"https://dblp.org/rec/conf/csp/KrasuskiS12"}, "url":"URL#4398432" }, { "@score":"1", "@id":"4398433", "info":{"authors":{"author":[{"@pid":"94/6720","text":"Didier Lime"},{"@pid":"r/OlivierHRoux","text":"Olivier H. Roux"},{"@pid":"01/2700","text":"Claude Jard"}]},"title":"Clock Transition Systems.","venue":"CS&P","pages":"227-238","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/LimeRJ12","ee":"https://ceur-ws.org/Vol-928/0227.pdf","url":"https://dblp.org/rec/conf/csp/LimeRJ12"}, "url":"URL#4398433" }, { "@score":"1", "@id":"4398434", "info":{"authors":{"author":[{"@pid":"65/480","text":"Irina A. Lomazova"},{"@pid":"120/8714","text":"Ivan V. Romanov"}]},"title":"Analyzing Web Service Resource Compatibility.","venue":"CS&P","pages":"239-250","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/LomasovaR12","ee":"https://ceur-ws.org/Vol-928/0239.pdf","url":"https://dblp.org/rec/conf/csp/LomasovaR12"}, "url":"URL#4398434" }, { "@score":"1", "@id":"4398435", "info":{"authors":{"author":[{"@pid":"31/5210","text":"Hung Son Nguyen"},{"@pid":"43/10493","text":"Wojciech Swieboda"}]},"title":"Rough Set Methods and Submodular Functions.","venue":"CS&P","pages":"251-260","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/NguyenS12","ee":"https://ceur-ws.org/Vol-928/0251.pdf","url":"https://dblp.org/rec/conf/csp/NguyenS12"}, "url":"URL#4398435" }, { "@score":"1", "@id":"4398436", "info":{"authors":{"author":[{"@pid":"120/8742","text":"Matthias Niemann"},{"@pid":"67/3548","text":"Danilo Schmidt"},{"@pid":"48/6957","text":"Gabriela Lindemann von Trzebiatowski"},{"@pid":"41/11039","text":"Carl Hinrichs"}]},"title":"First Steps towards a Frequent Pattern Mining with Nephrology Data in the Medical Domain.","venue":"CS&P","pages":"261-268","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/NiemannSTH12","ee":"https://ceur-ws.org/Vol-928/0261.pdf","url":"https://dblp.org/rec/conf/csp/NiemannSTH12"}, "url":"URL#4398436" }, { "@score":"1", "@id":"4398437", "info":{"authors":{"author":[{"@pid":"93/6308","text":"Krzysztof Pancerz"},{"@pid":"79/8612","text":"Arkadiusz Lewicki"},{"@pid":"41/3234","text":"Ryszard Tadeusiewicz"},{"@pid":"13/8979","text":"Jan Warchol"}]},"title":"Rough Set Flow Graphs and Ant Based Clustering in Classification of Disturbed Periodic Biosignals.","venue":"CS&P","pages":"269-279","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/PancerzLTW12","ee":"https://ceur-ws.org/Vol-928/0269.pdf","url":"https://dblp.org/rec/conf/csp/PancerzLTW12"}, "url":"URL#4398437" }, { "@score":"1", "@id":"4398438", "info":{"authors":{"author":[{"@pid":"93/6308","text":"Krzysztof Pancerz"},{"@pid":"88/428","text":"Wieslaw Paja"},{"@pid":"41/711","text":"Mariusz Wrzesien"},{"@pid":"13/8979","text":"Jan Warchol"}]},"title":"Classification of Voice Signals through Mining Unique Episodes in Temporal Information Systems: A Rough Set Approach.","venue":"CS&P","pages":"280-291","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/PancerzPWW12","ee":"https://ceur-ws.org/Vol-928/0280.pdf","url":"https://dblp.org/rec/conf/csp/PancerzPWW12"}, "url":"URL#4398438" }, { "@score":"1", "@id":"4398439", "info":{"authors":{"author":[{"@pid":"12/6268","text":"James F. Peters"},{"@pid":"s/AndrzejSkowron","text":"Andrzej Skowron"},{"@pid":"84/302","text":"Jaroslaw Stepaniuk"}]},"title":"Nearness of Objects. Approximation Space Model Revisited.","venue":"CS&P","pages":"292-302","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/PetersSS12","ee":"https://ceur-ws.org/Vol-928/0292.pdf","url":"https://dblp.org/rec/conf/csp/PetersSS12"}, "url":"URL#4398439" }, { "@score":"1", "@id":"4398440", "info":{"authors":{"author":[{"@pid":"p/LechPolkowski","text":"Lech Polkowski"},{"@pid":"44/4441","text":"Maria Semeniuk-Polkowska"}]},"title":"On a Notion of Extensionality for Artifacts.","venue":"CS&P","pages":"303-311","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/PolkowskiS12","ee":"https://ceur-ws.org/Vol-928/0303.pdf","url":"https://dblp.org/rec/conf/csp/PolkowskiS12"}, "url":"URL#4398440" }, { "@score":"1", "@id":"4398441", "info":{"authors":{"author":{"@pid":"88/9992","text":"Lukasz Pulawski"}},"title":"Automatic Forecasting of Design Anti-patterns in Software Source Code.","venue":"CS&P","pages":"312-323","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/Pulawski12","ee":"https://ceur-ws.org/Vol-928/0312.pdf","url":"https://dblp.org/rec/conf/csp/Pulawski12"}, "url":"URL#4398441" }, { "@score":"1", "@id":"4398442", "info":{"authors":{"author":{"@pid":"62/6651","text":"Roman R. Redziejowski"}},"title":"From EBNF to PEG.","venue":"CS&P","pages":"324-335","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/Redziejowski12","ee":"https://ceur-ws.org/Vol-928/0324.pdf","url":"https://dblp.org/rec/conf/csp/Redziejowski12"}, "url":"URL#4398442" }, { "@score":"1", "@id":"4398443", "info":{"authors":{"author":[{"@pid":"120/8874","text":"Martin C. Schneider"},{"@pid":"b/HDBurkhard","text":"Hans-Dieter Burkhard"}]},"title":"Creating driving behavior for artificial agents in a social augmented micro-world.","venue":"CS&P","pages":"336-342","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/SchneiderB12","ee":"https://ceur-ws.org/Vol-928/0336.pdf","url":"https://dblp.org/rec/conf/csp/SchneiderB12"}, "url":"URL#4398443" }, { "@score":"1", "@id":"4398444", "info":{"authors":{"author":{"@pid":"07/2016","text":"Martin Schwarick"}},"title":"Symbolic Model Checking of Stochastic Reward Nets.","venue":"CS&P","pages":"343-357","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/Schwarick12","ee":"https://ceur-ws.org/Vol-928/0343.pdf","url":"https://dblp.org/rec/conf/csp/Schwarick12"}, "url":"URL#4398444" }, { "@score":"1", "@id":"4398445", "info":{"authors":{"author":[{"@pid":"50/11187","text":"Olga Siedlecka-Lamch"},{"@pid":"10/5124","text":"Miroslaw Kurkowski"},{"@pid":"53/1642","text":"Henryk Piech"}]},"title":"A New Effective Approach for Modelling and Verification of Security Protocols.","venue":"CS&P","pages":"191-202","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/Siedlecka-LamchKP12","ee":"https://ceur-ws.org/Vol-928/0191.pdf","url":"https://dblp.org/rec/conf/csp/Siedlecka-LamchKP12"}, "url":"URL#4398445" }, { "@score":"1", "@id":"4398446", "info":{"authors":{"author":[{"@pid":"s/AndrzejSkowron","text":"Andrzej Skowron"},{"@pid":"01/6261","text":"Andrzej Jankowski"},{"@pid":"09/1634","text":"Piotr Wasilewski"}]},"title":"Interactive Computational Systems: Rough Granular Approach.","venue":"CS&P","pages":"358-369","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/SkowronJW12","ee":"https://ceur-ws.org/Vol-928/0358.pdf","url":"https://dblp.org/rec/conf/csp/SkowronJW12"}, "url":"URL#4398446" }, { "@score":"1", "@id":"4398447", "info":{"authors":{"author":{"@pid":"08/6778","text":"Zbigniew Suraj"}},"title":"Generalised Fuzzy Petri Nets for Approximate Reasoning in Decision Support Systems.","venue":"CS&P","pages":"370-381","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/Suraj12","ee":"https://ceur-ws.org/Vol-928/0370.pdf","url":"https://dblp.org/rec/conf/csp/Suraj12"}, "url":"URL#4398447" }, { "@score":"1", "@id":"4398448", "info":{"authors":{"author":[{"@pid":"w/AnnegretWagler","text":"Annegret Wagler"},{"@pid":"18/7219","text":"Jan-Thierry Wegener"}]},"title":"On Minimality and Equivalence of Petri Nets.","venue":"CS&P","pages":"382-393","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/WaglerW12","ee":"https://ceur-ws.org/Vol-928/0382.pdf","url":"https://dblp.org/rec/conf/csp/WaglerW12"}, "url":"URL#4398448" }, { "@score":"1", "@id":"4398449", "info":{"authors":{"author":[{"@pid":"37/7238","text":"Piotr Wisniewski 0001"},{"@pid":"s/KrzysztofStencel","text":"Krzysztof Stencel"}]},"title":"Universal Query Language.","venue":"CS&P","pages":"394-403","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/WisniewskiS12","ee":"https://ceur-ws.org/Vol-928/0394.pdf","url":"https://dblp.org/rec/conf/csp/WisniewskiS12"}, "url":"URL#4398449" }, { "@score":"1", "@id":"4398450", "info":{"authors":{"author":[{"@pid":"22/5666","text":"Marcin Wolski"},{"@pid":"53/1905","text":"Anna Gomolinska"}]},"title":"Elements of Representation Theory for Pawlak Information Systems.","venue":"CS&P","pages":"404-415","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/WolskiG12","ee":"https://ceur-ws.org/Vol-928/0404.pdf","url":"https://dblp.org/rec/conf/csp/WolskiG12"}, "url":"URL#4398450" }, { "@score":"1", "@id":"4398451", "info":{"authors":{"author":[{"@pid":"120/3693","text":"Olena Yaskorska"},{"@pid":"14/6827","text":"Magdalena Kacprzak"},{"@pid":"89/6999","text":"Katarzyna Budzynska"}]},"title":"Rules for Formal and Natural Dialogues in Agent Communication.","venue":"CS&P","pages":"416-427","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/YaskorskaKB12","ee":"https://ceur-ws.org/Vol-928/0416.pdf","url":"https://dblp.org/rec/conf/csp/YaskorskaKB12"}, "url":"URL#4398451" }, { "@score":"1", "@id":"4398452", "info":{"authors":{"author":{"@pid":"88/7220","text":"Olena Yatsenko"}},"title":"On Parameter-Driven Generation of Algorithm Schemes.","venue":"CS&P","pages":"428-438","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/csp/Yatsenko12","ee":"https://ceur-ws.org/Vol-928/0428.pdf","url":"https://dblp.org/rec/conf/csp/Yatsenko12"}, "url":"URL#4398452" }, { "@score":"1", "@id":"4515252", "info":{"authors":{"author":{"@pid":"12/3724","text":"Louchka Popova-Zeugmann"}},"title":"Proceedings of the 21th International Workshop on Concurrency, Specification and Programming, Berlin, Germany, September 26-28, 2012","venue":["CS&P","CEUR Workshop Proceedings"],"volume":"928","publisher":"CEUR-WS.org","year":"2012","type":"Editorship","access":"open","key":"conf/csp/2012","ee":"https://ceur-ws.org/Vol-928","url":"https://dblp.org/rec/conf/csp/2012"}, "url":"URL#4515252" } ] } } } )