


default search action
Information Processing Letters, Volume 115
Volume 115, Number 1, January 2015
- Laurent Bulteau, Guillaume Fertin

, Romeo Rizzi, Stéphane Vialette:
Some algorithmic results for [2]-sumset covers. 1-5 - Hao Yang

, Keming Tang, Jianjiang Yu, Licai Zhu:
A practical information coverage approach in wireless sensor network. 6-10 - Taolue Chen

, Nengkun Yu
, Tingting Han:
Continuous-time orbit problems are decidable in polynomial-time. 11-14 - Razvan Diaconescu

:
On the existence of translations of structured specifications. 15-22 - Oliver Schaudt:

On disjoint maximal independent sets in graphs. 23-27 - Hirotsugu Kakugawa:

On the family of critical section problems. 28-32 - Wenchang Luo

, Min Ji
:
Scheduling a variable maintenance and linear deteriorating jobs on a single machine. 33-39 - Martin Rötteler

, Rainer Steinwandt:
A note on quantum related-key attacks. 40-44 - Wolfgang Aigner, Franz Aurenhammer, Bert Jüttler

:
On triangulation axes of polygons. 45-51 - Béatrice Bérard, Krishnendu Chatterjee

, Nathalie Sznajder:
Probabilistic opacity for Markov decision processes. 52-59 - Yerim Chung, Myoung-Ju Park

:
Notes on inverse bin-packing problems. 60-68 - Kilho Shin:

Tree Edit Distance and Maximum Agreement Subtree. 69-73
Volume 115, Number 2, February 2015
- Andrzej Indrzejczak

:
Eliminability of cut in hypersequent calculi for some modal logics of linear frames. 75-81 - Peter Floderus, Andrzej Lingas, Mia Persson, Dzmitry Sledneu:

Detecting monomials with k distinct variables. 82-86 - Salvador Lucas

:
Completeness of context-sensitive rewriting. 87-92 - Simina Brânzei:

A note on envy-free cake cutting with polynomial valuations. 93-95 - Jianhua Tu

:
A fixed-parameter algorithm for the vertex cover P3 problem. 96-99 - Ragesh Jaiswal

, Mehul Kumar, Pulkit Yadav:
Improved analysis of D2-sampling based PTAS for k-means and other clustering problems. 100-103 - Qiang Dong, Qian Zhao, Ya-Hui An:

The hamiltonicity of generalized honeycomb torus networks. 104-111 - Michal Feldman, Tami Tamir:

Convergence of best-response dynamics in games with conflicting congestion effects. 112-118 - Sílvia Maria Santana Mapa

, Sebastián Urrutia
:
On the maximum acyclic subgraph problem under disjunctive constraints. 119-124 - Tetsuya Ishiu

, Masashi Kikuchi:
The termination of the higher-dimensional tarai functions. 125-127 - Graham Enos, Yuliang Zheng

:
An ID-based signcryption scheme with compartmented secret sharing for unsigncryption. 128-133 - Joachim von zur Gathen, Igor E. Shparlinski

:
Circulant graphs and GCD and LCM of subsets. 134-138 - Enes Pasalic

:
A note on nonexistence of vectorial bent functions with binomial trace representation in the PS- class. 139-140 - K. Ashik Mathew, Patric R. J. Östergård:

On hypercube packings, blocking sets and a covering problem. 141-145 - Péricles Rafael Oliveira Alves, Raphael Ernani Rodrigues, Rafael Martins de Souza, Fernando Magno Quintão Pereira:

A case for a fast trip count predictor. 146-150 - Chang-Hsiung Tsai:

The pessimistic diagnosability of alternating group graphs under the PMC model. 151-154 - S. Akshay, Timos Antonopoulos, Joël Ouaknine

, James Worrell
:
Reachability problems for Markov chains. 155-158 - Enrique Gerstl

, Baruch Mor
, Gur Mosheiov:
A note: Maximizing the weighted number of just-in-time jobs on a proportionate flowshop. 159-162 - Yinfeng Xu, Hongmei Li:

Minimax regret 1-sink location problem in dynamic cycle networks. 163-169 - Jagadish M:

An approximation algorithm for the cutting-sticks problem. 170-174 - Strahil Ristov, Damir Korencic:

Using static suffix array in dynamic application: Case of text compression by longest first substitution. 175-181 - Fabrizio Grandoni

, Tomasz Kociumaka
, Michal Wlodarczyk:
An LP-rounding 2√2-approximation for restricted maximum acyclic subgraph. 182-185 - David A. Basin, Felix Klaedtke, Eugen Zalinescu:

Greedily computing associative aggregations on sliding windows. 186-192 - Michael Brand

:
Arbitrary sequence RAMs. 193-198 - Javier Marenco, Marcelo Mydlarz, Daniel E. Severín

:
Topological additive numbering of directed acyclic graphs. 199-202 - Yu-Liang Liu:

Routing and wavelength assignment for exchanged hypercubes in linear array optical networks. 203-208 - Min-Yun Lien, Jyhmin Kuo, Hung-Lin Fu:

On the decycling number of generalized Kautz digraphs. 209-211 - Luca Aceto, Eugen-Ioan Goriac, Anna Ingólfsdóttir:

A ground-complete axiomatization of stateless bisimilarity over Linda. 212-220 - Bo Ning

:
Notes on a conjecture of Manoussakis concerning Hamilton cycles in digraphs. 221-224 - Junqing Cai:

A sufficient condition involving implicit degree and neighborhood intersection for long cycles. 225-227 - Yanning Wang

, Yanyan Wang, Xuguang Zhang:
Note on property M(k) of some complete multipartite graphs. 228-231 - Robert Janczewski, Krzysztof Turowski

:
The computational complexity of the backbone coloring problem for bounded-degree graphs with connected backbones. 232-236 - Chetan Dugar, Anuj Jain

, Amit Rajawat, Swapan Bhattacharya:
Dynamic pricing of call rates: Bayesian approach. 237-242 - Therese Biedl, Martin Held, Stefan Huber

, Dominik Kaaser, Peter Palfrader:
A simple algorithm for computing positively weighted straight skeletons of monotone polygons. 243-247 - Yafei Song, Xiaodan Wang, Lei Lei, Yaqiong Xing:

Credibility decay model in temporal evidence combination. 248-252 - Baruch Mor

, Gur Mosheiov:
A note: Minimizing maximum earliness on a proportionate flowshop. 253-255 - Andreas Brandstädt, Pavel Ficur, Arne Leitert, Martin Milanic

:
Polynomial-time algorithms for weighted efficient domination problems in AT-free graphs and dually chordal graphs. 256-262 - Xiang'en Chen, Zepeng Li:

Adjacent-vertex-distinguishing proper edge colorings of planar bipartite graphs with Δ = 9, 10, or 11. 263-268 - Xue Zhou:

A new lower bound for the number of perfect matchings of line graph. 269-274 - Dimitri Watel, Marc-Antoine Weisser, Cédric Bentz, Dominique Barth:

An FPT algorithm in polynomial space for the Directed Steiner Tree problem with Limited number of Diffusing nodes. 275-279 - Shunichi Matsubara

:
An enumeration algorithm for all integers nonrepresentable by some positive integers. 280-284 - Tong Jia

, Yan Shi
, ZhongXuan Zhou, Dongyue Chen:
3D depth information extraction with omni-directional camera. 285-291 - Giovanni Agosta

, Alessandro Barenghi
, Gerardo Pelosi
, Michele Scandale:
Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software. 292-297 - Chaoyi Pang

, Junhu Wang
, Yu Cheng, Hao Lan Zhang
, Tongliang Li:
Topological sorts on DAGs. 298-301 - Zepeng Li

, Zehui Shao
, Enqiang Zhu, Jin Xu:
A note on local coloring of graphs. 302-305 - Thomas Lambert, Loris Marchal

, Bora Uçar
:
Comments on the hierarchically structured bin packing problem. 306-309 - Yasuaki Kobayashi

:
Computing the pathwidth of directed graphs with small vertex cover. 310-312 - Damianos Gavalas

, Charalampos Konstantopoulos
, Konstantinos Mastakas, Grammati E. Pantziou
, Nikolaos Vathis:
Approximation algorithms for the arc orienteering problem. 313-315 - Ali Dehghan

, Mohammad-Reza Sadeghi
:
The complexity of the zero-sum 3-flows. 316-320 - Naoyuki Kamiyama, Yasushi Kawase:

On packing arborescences in temporal networks. 321-325 - Michal Debski

, Jaroslaw Grytczuk
, Malgorzata Sleszynska-Nowak:
The strong chromatic index of sparse graphs. 326-330 - Zuosong Liang, Erfang Shan:

The clique-transversal set problem in claw-free graphs with degree at most 4. 331-335 - Reuven Cohen, Liran Katzir, Aviv Yehezkel:

A unified scheme for generalizing cardinality estimators to sum aggregation. 336-342 - Pranava K. Jha:

A comment on "The domination number of exchanged hypercubes". 343-344 - Andreas Brandstädt, Vassilis Giakoumakis:

Addendum to: Maximum Weight Independent Sets in hole- and co-chair-free graphs. 345-350 - Chandrashekhar Meshram:

An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem. 351-358 - Ferhat Karakoç

, Hüseyin Demirci
, A. Emre Harmanci:
AKF: A key alternating Feistel scheme for lightweight cipher designs. 359-367 - Allan Scott, Srinivasan Venkatesh, Ulrike Stege:

k-Attribute-Anonymity is hard even for k=2. 368-370 - Min-Sheng Lin, Chao-Chun Ting:

A polynomial-time algorithm for computing K-terminal residual reliability of d-trapezoid graphs. 371-376 - Yinglei Song

, Menghong Yu:
On finding the longest antisymmetric path in directed acyclic graphs. 377-381 - Divesh Aggarwal:

Affine-evasive sets modulo a prime. 382-385 - Jian Guo

, Chunhua Su, Wun-She Yap
:
An improved preimage attack against HAVAL-3. 386-393 - Wantao Ning, Xiaoli Feng

, Ling Wang:
The connectivity of exchanged crossed cube. 394-396 - Sukhyeun Cho, Joong Chae Na, Kunsoo Park, Jeong Seop Sim:

A fast algorithm for order-preserving pattern matching. 397-402
Volume 115, Number 3, March 2015
- Jing-Ming Guo, Chih-Hsien Hsia

, Chia-Hao Chang:
JPEG false contour reduction using error diffusion. 403-407 - Massimo Vecchio

, Roberto López-Valcarce
:
A greedy topology design to accelerate consensus in broadcast wireless sensor networks. 408-413 - Eleni Constantinou

, Athanasios Naskos, George Kakarontzas
, Ioannis Stamelos:
Extracting reusable components: A semi-automated approach for complex structures. 414-417 - Margus Veanes, Nikolaj S. Bjørner:

Symbolic tree automata. 418-424 - Domagoj Vrgoc:

Using variable automata for querying data graphs. 425-430 - Pradeesha Ashok

, Sathish Govindarajan:
On strong centerpoints. 431-434 - Jérôme Monnot:

A note on the traveling salesman reoptimization problem under vertex insertion. 435-438 - Gautam K. Das, Minati De

, Sudeshna Kolay, Subhas C. Nandy
, Susmita Sur-Kolay:
Approximation algorithms for maximum independent set of a unit disk graph. 439-446 - Pierre Courtieu, Lionel Rieg, Sébastien Tixeuil

, Xavier Urbain:
Impossibility of gathering, a certification. 447-452
Volume 115, Number 4, April 2015
- Stanislaw J. Piestrak

:
A note on RNS architectures for the implementation of the diagonal function. 453-457 - Malte Darnstädt:

The optimal PAC bound for intersection-closed concept classes. 458-461 - Miaomiao Tian:

Identity-based proxy re-signatures from lattices. 462-467 - Mengjun Li:

Automatic proving or disproving equality loop invariants based on finite difference techniques. 468-474 - Jianming Dong, Yiwei Jiang, An Zhang, Jueliang Hu, Hui Luo:

An approximation algorithm for proportionate scheduling in the two-stage hybrid flow shop. 475-480 - Saeedeh Momtazi

, Felix Naumann
:
Who wants a computer to be a millionaire? 481-485 - Zaiping Lu, Yingbin Ma:

Rainbow 2-Connection Numbers of Cayley Graphs. 486-491 - Xiaofang Gao, Jiye Liang

:
An improved incremental nonlinear dimensionality reduction for isometric data embedding. 492-501 - Jens Maßberg:

Generalized Huffman coding for binary trees with choosable edge lengths. 502-506 - Zoltán Király

, Erika R. Kovács
:
Randomized and deterministic algorithms for network coding problems in wireless networks. 507-511 - Lewis Tseng

, Nitin H. Vaidya, Vartika Bhandari:
Broadcast using certified propagation algorithm in presence of Byzantine faults. 512-514 - Prateek Karandikar, Manfred Kufleitner

, Philippe Schnoebelen:
On the index of Simon's congruence for piecewise testability. 515-519 - Enes Pasalic

:
Corrigendum to "A note on nonexistence of vectorial bent functions with binomial trace representation in the PS- class" [Information Processing Letters 115 (2) (2015) 139-140]. 520
Volume 115, Number 5, May 2015
- Hailiang Zhang

, Guanglong Yu, Shanlin Li:
Graphs with six distinct matching roots. 521-526 - Ivan Bliznets

, Marek Cygan
, Pawel Komosa, Lukás Mach:
Kernelization lower bound for Permutation Pattern Matching. 527-531 - Guy-Vincent Jourdan, Hasan Ural, Hüsnü Yenigün

:
Reduced checking sequences using unreliable reset. 532-535 - Marco Magirius, Martin Mundhenk, Raphaela Palenta:

The complexity of primal logic with disjunction. 536-542 - Golnaz Badkobeh, Maxime Crochemore

:
Infinite binary words containing repetitions of odd period. 543-547 - Jayadev Misra:

Mapping among the nodes of infinite trees: A variation of Kőnig's infinity lemma. 548-549
Volume 115, Numbers 6-8, June-August 2015
- Chun-Nan Hung, Eddie Cheng

, Tao-Ming Wang, Lih-Hsing Hsu:
On Hamiltonian properties of unidirectional hypercubes. 551-555 - Gabriela R. Argiroffo, Valeria A. Leoni, Pablo Daniel Torres

:
On the complexity of {k}-domination and k-tuple domination in graphs. 556-561 - Hirotsugu Kakugawa:

Self-stabilizing distributed algorithm for local mutual inclusion. 562-569 - Marco Bender, Clemens Thielen

, Stephan Westphal
:
Packing items into several bins facilitates approximating the separable assignment problem. 570-575 - Hervé Fournier, Anas Ismail

, Antoine Vigneron
:
Computing the Gromov hyperbolicity of a discrete metric space. 576-579 - Xue-Gang Chen

, Shinya Fujita:
Downhill domination problem in graphs. 580-581 - Andrei Braga, Cid C. de Souza

, Orlando Lee:
The Eternal Dominating Set problem for proper interval graphs. 582-587 - David Avis, Hans Raj Tiwary

:
A generalization of extension complexity that captures P. 588-593 - Aline Medeiros Saettler, Eduardo Sany Laber, Ferdinando Cicalese:

Approximating decision trees with value dependent testing costs. 594-599 - Flavia Bonomo

, Guillermo Durán, Amedeo Napoli, Mario Valencia-Pabon:
A one-to-one correspondence between potential solutions of the cluster deletion problem and the minimum sum coloring problem, and its application to {k}-sparse graphs. 600-603 - André B. Chassein, Marc Goerigk

:
Alternative formulations for the ordered weighted averaging objective. 604-608 - Olivier Finkel:

The exact complexity of the infinite Post Correspondence Problem. 609-611 - Salim Haddadi

, S. Chenche, Meryem Cheraitia
, F. Guessoum
:
Polynomial-time local-improvement algorithm for Consecutive Block Minimization. 612-617 - Ehsan Najafi Yazdi, Alireza Bagheri

, Zahra Moezkarimi, Hamidreza Keshavarz
:
An O(1)-approximation algorithm for the 2-dimensional geometric freeze-tag problem. 618-622 - Hoda Jannati

, Abolfazl Falahati
:
Analysis of false-reject probability in distance bounding protocols with mixed challenges over RFID noisy communication channel. 623-629 - Shigeyoshi Imai, Kaoru Kurosawa:

Improved reconstruction of RSA private-keys from their fraction. 630-632 - Vince Grolmusz

:
A note on the PageRank of undirected graphs. 633-634 - Michal Nánási

, Tomás Vinar
, Brona Brejová
:
Sequence annotation with HMMs: New problems and their complexity. 635-639 - Szymon Grabowski

:
A note on the longest common substring with k-mismatches problem. 640-642 - Tomás Flouri

, Emanuele Giaquinta
, Kassian Kobert, Esko Ukkonen
:
Longest common substrings with k mismatches. 643-647
Volume 115, Number 9, September 2015
- Sharareh Alipour, Mohammad Ghodsi, Alireza Zarei, Maryam Pourreza:

Visibility testing and counting. 649-654 - Yuto Nakashima, Tomohiro I, Shunsuke Inenaga, Hideo Bannai

, Masayuki Takeda:
Constructing LZ78 tries and position heaps in linear time for large alphabets. 655-659 - Céline Blondeau:

Impossible differential attack on 13-round Camellia-192. 660-666 - Min Chih Lin

, Saveliy Vasiliev:
Approximation algorithms for clique transversals on some graph classes. 667-670 - Henning Fernau

, Pinar Heggernes
, Pim van 't Hof
, Daniel Meister, Reza Saei
:
Computing the metric dimension for chain graphs. 671-676 - Shuhuan Zhao

, Zheng-ping Hu:
A modular weighted sparse representation based on Fisher discriminant and sparse residual for face recognition with occlusion. 677-683 - Martin Dietzfelbinger

, Raed Jaberi:
On testing single connectedness in directed graphs and some related problems. 684-688 - François Queyroi, Sergey Kirgizov:

Suppression distance computation for hierarchical clusterings. 689-693 - Jay Thakkar, Aditya Kanade:

Non-deterministic transducer models of retransmission protocols over noisy channels. 694-698 - Iiro S. Honkala, Olivier Hudry, Antoine Lobstein:

On the ensemble of optimal dominating and locating-dominating codes in a graph. 699-702 - Yunong Zhang

, Binbin Qiu, Long Jin, Dongsheng Guo, Zhi Yang:
Infinitely many Zhang functions resulting in various ZNN models for time-varying matrix inversion with link to Drazin inverse. 703-706 - Irena Hrastnik Ladinek

, Janez Zerovnik
:
Perfect codes in direct graph bundles. 707-711 - Barun Gorain, Partha Sarathi Mandal

:
Approximation algorithm for sweep coverage on graph. 712-718 - Yue-Feng Cen, Wanliang Wang, Xin-Wei Yao:

A fast CU depth decision mechanism for HEVC. 719-724 - Edward A. Hirsch, Dmitry Sokolov

:
On the probabilistic closure of the loose unambiguous hierarchy. 725-730
Volume 115, Number 10, October 2015
- Thaís Bardini Idalino

, Lucia Moura
, Ricardo Felipe Custódio, Daniel Panario
:
Locating modifications in signed data for partial data integrity. 731-737 - Nethanel Gelernter, Amir Herzberg

:
Gossip Latin square and the meet-all gossipers problem. 738-743 - René van Bevern

, Jiehua Chen, Falk Hüffner
, Stefan Kratsch, Nimrod Talmon
, Gerhard J. Woeginger:
Approximability and parameterized complexity of multicover by c-intervals. 744-749 - Dean Doron

, Amnon Ta-Shma
:
On the de-randomization of space-bounded approximate counting problems. 750-753 - Enqiang Zhu, Zepeng Li, Zehui Shao

, Jin Xu, Chanjuan Liu:
Tree-core and tree-coritivity of graphs. 754-759 - Laurent Gourvès:

Approximating the optimal sequence of acquisitions and sales with a capped budget. 760-764 - Alexander Chane Shiau, Tzong-Huei Shiau, Yue-Li Wang:

Incidence coloring of Cartesian product graphs. 765-768 - Amr Elmasry:

Counting inversions adaptively. 769-772 - Min-Sheng Lin, Chao-Chun Ting:

Computing the K-terminal reliability of directed path graphs. 773-778 - Mrinal Nandi

:
On commutativity of Discrete Fourier Transform. 779-785 - Houcine Boumediene Merouane, Mustapha Chellali:

On Secure Domination in Graphs. 786-790 - Jørgen Bang-Jensen

, Magnús M. Halldórsson
:
Vertex coloring edge-weighted digraphs. 791-796
Volume 115, Number 11, November 2015
- Chen Yuan

, Haibin Kan
:
A refined analysis on the jump number problem of interval orders. 797-800 - Joao M. M. Barguil

, Paulo S. L. M. Barreto:
Security issues in Sarkar's e-cash protocol. 801-803 - Guanqun Ni, Li Luo, Yin-Feng Xu, Jiuping Xu:

Optimal online markdown and markup pricing policies with demand uncertainty. 804-811 - Sheng Huang

, Dan Yang, Yongxin Ge, Xiaohong Zhang:
Combined supervised information with PCA via discriminative component selection. 812-816 - Yuxing Yang

, Shiying Wang, Jing Li:
Subnetwork preclusion for bubble-sort networks. 817-821 - Jing Chen

, Xiuping Wang:
Identification of Hammerstein systems with continuous nonlinearity. 822-827 - Alak Kumar Datta:

Approximate spanning cactus. 828-832 - Vahan Mkrtchyan

, K. Subramani
:
On the approximability of the Largest Sphere Rule Ensemble Classification problem. 833-837 - Yong Wu

, T. C. E. Cheng
, Min Ji
:
Inefficiency of the Nash equilibrium for selfish machine covering on two hierarchical uniform machines. 838-844 - Miriam Di Ianni, Luciano Gualà

, Gianluca Rossi
:
Reducing the diameter of a unit disk graph via node addition. 845-850 - Lein Harn, Ching-Fang Hsu:

Dynamic threshold secret reconstruction and its application to the threshold cryptography. 851-857 - Xianmeng Meng, Xuexin Zheng:

Cryptanalysis of RSA with a small parameter revisited. 858-862 - Cosmina Croitoru:

A note on quasi-kernels in digraphs. 863-865 - Tobias Mömke

:
An improved approximation algorithm for the traveling salesman problem with relaxed triangle inequality. 866-871 - Paulina Grzegorek, Janusz Januszewski

:
A note on one-space bounded square packing. 872-876 - Tomás Kaiser

, Maria Saumell
, Nico Van Cleemput:
10-Gabriel graphs are Hamiltonian. 877-881 - Fred Mesnard, Étienne Payet:

A second-order formulation of non-termination. 882-885 - Jarkko Peltomäki

:
Characterization of repetitions in Sturmian words: A new proof. 886-891 - Brahim Neggazi, Mohammed Haddad, Hamamache Kheddouci:

A new self-stabilizing algorithm for maximal p-star decomposition of general graphs. 892-898 - Thomas Eisenbarth

, Aaron Meyerowitz, Rainer Steinwandt:
On the security margin of MAC striping. 899-902 - Yan Zhang, Zhaohui Zhu, Jinjin Zhang:

On the greatest solution of equations in CLLR. 903-907 - Sandra Alves

, Sabine Broda
:
A short note on type-inhabitation: Formula-trees vs. game semantics. 908-911
Volume 115, Number 12, December 2015
- Min Chih Lin

, Francisco J. Soulignac
, Jayme Luiz Szwarcfiter:
A faster algorithm for the cluster editing problem on proper interval graphs. 913-916 - Chiou-Jiun Lin, Jia Jie Liu

, Yue-Li Wang:
Finding outer-connected dominating sets in interval graphs. 917-922 - Vladimir Braverman, Rafail Ostrovsky

, Gregory Vorsanger:
Weighted sampling without replacement from data streams. 923-926 - Marios Mavronicolas

, Burkhard Monien:
The complexity of pure equilibria in mix-weighted congestion games on parallel links. 927-931 - Annamária Kovács, Ulrich Meyer, Gabriel Moruz, Andrei Negoescu:

The optimal structure of algorithms for α-paging. 932-938 - Chuandong Xu, Shenggui Zhang, Yi Wang:

On the maximum arc-chromatic number of digraphs with bounded outdegrees or indegrees. 939-944 - Dongqin Cheng, Rong-Xia Hao

, Yan-Quan Feng
:
Embedding even cycles on folded hypercubes with conditional faulty edges. 945-949 - Huaming Xing, Moo Young Sohn:

Bounds on locating total domination number of the Cartesian product of cycles and paths. 950-956 - Zhi-Yi Shao

, Bo Yang:
On security against the server in designated tester public key encryption with keyword search. 957-961 - Daniel L. Lu

:
Planar lower envelope of monotone polygonal chains. 962-964 - Hans L. Bodlaender

, Marc J. van Kreveld
:
Google Scholar makes it hard - the complexity of organizing one's publications. 965-968 - Zhichao Geng, Jinjiang Yuan:

A note on unbounded parallel-batch scheduling. 969-974 - Moshe Milshtein

:
A new binary code of length 16 and minimum distance 3. 975-976 - Zhiwei Guo, Haixing Zhao, Yaping Mao:

The equitable vertex arboricity of complete tripartite graphs. 977-982 - Cosme Ernesto Santiesteban-Toca

, Jesús S. Aguilar-Ruiz
:
A new multiple classifier system for the prediction of protein's contacts map. 983-990

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














