callback( { "result":{ "query":":facetid:toc:\"db/journals/fuin/fuin101.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"177.43" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"22", "@dc":"22", "@oc":"22", "@id":"43452088", "text":":facetid:toc:db/journals/fuin/fuin101.bht" } }, "hits":{ "@total":"22", "@computed":"22", "@sent":"22", "@first":"0", "hit":[{ "@score":"1", "@id":"4811461", "info":{"authors":{"author":[{"@pid":"18/4971","text":"Taku Aratsu"},{"@pid":"43/3671","text":"Kouichi Hirata"},{"@pid":"43/3007","text":"Tetsuji Kuboyama"}]},"title":"Approximating Tree Edit Distance through String Edit Distance for Binary Tree Codes.","venue":"Fundam. Informaticae","volume":"101","number":"3","pages":"157-171","year":"2010","type":"Journal Articles","access":"closed","key":"journals/fuin/AratsuHK10","doi":"10.3233/FI-2010-282","ee":"https://doi.org/10.3233/FI-2010-282","url":"https://dblp.org/rec/journals/fuin/AratsuHK10"}, "url":"URL#4811461" }, { "@score":"1", "@id":"4811488", "info":{"authors":{"author":[{"@pid":"c/MCrochemore","text":"Maxime Crochemore"},{"@pid":"80/6859","text":"Marcin Kubica"},{"@pid":"80/5679","text":"Tomasz Walen"},{"@pid":"i/CSIliopoulos","text":"Costas S. Iliopoulos"},{"@pid":"r/MohammadSohelRahman","text":"M. Sohel Rahman"}]},"title":"Finding Patterns In Given Intervals.","venue":"Fundam. Informaticae","volume":"101","number":"3","pages":"173-186","year":"2010","type":"Journal Articles","access":"closed","key":"journals/fuin/CrochemoreKWIR10","doi":"10.3233/FI-2010-283","ee":"https://doi.org/10.3233/FI-2010-283","url":"https://dblp.org/rec/journals/fuin/CrochemoreKWIR10"}, "url":"URL#4811488" }, { "@score":"1", "@id":"4811489", "info":{"authors":{"author":{"@pid":"22/6041","text":"Ludwik Czaja"}},"title":"Preface.","venue":"Fundam. Informaticae","volume":"101","number":"1-2","year":"2010","type":"Journal Articles","access":"closed","key":"journals/fuin/Czaja10","doi":"10.3233/FI-2010-270","ee":"https://doi.org/10.3233/FI-2010-270","url":"https://dblp.org/rec/journals/fuin/Czaja10"}, "url":"URL#4811489" }, { "@score":"1", "@id":"4811490", "info":{"authors":{"author":[{"@pid":"22/6041","text":"Ludwik Czaja"},{"@pid":"k/ManfredKudlek","text":"Manfred Kudlek"}]},"title":"Synthesis and Analysis of Net Structures and Transition Graphs with Inhibitor Relations.","venue":"Fundam. Informaticae","volume":"101","number":"1-2","pages":"1-7","year":"2010","type":"Journal Articles","access":"closed","key":"journals/fuin/CzajaK10","doi":"10.3233/FI-2010-271","ee":"https://doi.org/10.3233/FI-2010-271","url":"https://dblp.org/rec/journals/fuin/CzajaK10"}, "url":"URL#4811490" }, { "@score":"1", "@id":"4811517", "info":{"authors":{"author":{"@pid":"12/5816","text":"Piotr Honko"}},"title":"Similarity-Based Classification in Relational Databases.","venue":"Fundam. Informaticae","volume":"101","number":"3","pages":"187-213","year":"2010","type":"Journal Articles","access":"closed","key":"journals/fuin/Honko10","doi":"10.3233/FI-2010-284","ee":"https://doi.org/10.3233/FI-2010-284","url":"https://dblp.org/rec/journals/fuin/Honko10"}, "url":"URL#4811517" }, { "@score":"1", "@id":"4811525", "info":{"authors":{"author":[{"@pid":"k/LilaKari","text":"Lila Kari"},{"@pid":"70/1118","text":"Shinnosuke Seki"}]},"title":"An Improved Bound for an Extension of Fine and Wilf's Theorem and Its Optimality.","venue":"Fundam. Informaticae","volume":"101","number":"3","pages":"215-236","year":"2010","type":"Journal Articles","access":"closed","key":"journals/fuin/KariS10","doi":"10.3233/FI-2010-285","ee":"https://doi.org/10.3233/FI-2010-285","url":"https://dblp.org/rec/journals/fuin/KariS10"}, "url":"URL#4811525" }, { "@score":"1", "@id":"4811528", "info":{"authors":{"author":[{"@pid":"08/8621","text":"Michal Knapik"},{"@pid":"58/2583","text":"Wojciech Penczek"},{"@pid":"69/6183","text":"Maciej Szreter"},{"@pid":"10/5823","text":"Agata Pólrola"}]},"title":"Bounded Parametric Verification for Distributed Time Petri Nets with Discrete-Time Semantics.","venue":"Fundam. Informaticae","volume":"101","number":"1-2","pages":"9-27","year":"2010","type":"Journal Articles","access":"closed","key":"journals/fuin/KnapikPSP10","doi":"10.3233/FI-2010-272","ee":"https://doi.org/10.3233/FI-2010-272","url":"https://dblp.org/rec/journals/fuin/KnapikPSP10"}, "url":"URL#4811528" }, { "@score":"1", "@id":"4811529", "info":{"authors":{"author":[{"@pid":"k/MichaelKohlerB","text":"Michael Köhler-Bußmeier"},{"@pid":"17/7220","text":"Frank Heitmann"}]},"title":"Safeness for Object Nets.","venue":"Fundam. Informaticae","volume":"101","number":"1-2","pages":"29-43","year":"2010","type":"Journal Articles","access":"closed","key":"journals/fuin/Kohler-BussmeierH10","doi":"10.3233/FI-2010-273","ee":"https://doi.org/10.3233/FI-2010-273","url":"https://dblp.org/rec/journals/fuin/Kohler-BussmeierH10"}, "url":"URL#4811529" }, { "@score":"1", "@id":"4811530", "info":{"authors":{"author":[{"@pid":"k/StavrosKonstantinidis","text":"Stavros Konstantinidis"},{"@pid":"95/5592","text":"Pedro V. Silva"}]},"title":"Computing Maximal Error-detecting Capabilities and Distances of Regular Languages.","venue":"Fundam. Informaticae","volume":"101","number":"4","pages":"257-270","year":"2010","type":"Journal Articles","access":"closed","key":"journals/fuin/KonstantinidisS10","doi":"10.3233/FI-2010-287","ee":"https://doi.org/10.3233/FI-2010-287","url":"https://dblp.org/rec/journals/fuin/KonstantinidisS10"}, "url":"URL#4811530" }, { "@score":"1", "@id":"4811531", "info":{"authors":{"author":[{"@pid":"k/MaciejKoutny","text":"Maciej Koutny"},{"@pid":"03/4352","text":"Marta Pietkiewicz-Koutny"}]},"title":"Minimal Regions of ENL-Transition Systems.","venue":"Fundam. Informaticae","volume":"101","number":"1-2","pages":"45-58","year":"2010","type":"Journal Articles","access":"closed","key":"journals/fuin/KoutnyP10","doi":"10.3233/FI-2010-274","ee":"https://doi.org/10.3233/FI-2010-274","url":"https://dblp.org/rec/journals/fuin/KoutnyP10"}, "url":"URL#4811531" }, { "@score":"1", "@id":"4811534", "info":{"authors":{"author":[{"@pid":"22/7414","text":"Miron B. Kursa"},{"@pid":"93/8075","text":"Aleksander Jankowski"},{"@pid":"51/3111","text":"Witold R. Rudnicki"}]},"title":"Boruta - A System for Feature Selection.","venue":"Fundam. Informaticae","volume":"101","number":"4","pages":"271-285","year":"2010","type":"Journal Articles","access":"closed","key":"journals/fuin/KursaJR10","doi":"10.3233/FI-2010-288","ee":"https://doi.org/10.3233/FI-2010-288","url":"https://dblp.org/rec/journals/fuin/KursaJR10"}, "url":"URL#4811534" }, { "@score":"1", "@id":"4811540", "info":{"authors":{"author":[{"@pid":"98/6390","text":"Guohua Liu"},{"@pid":"y/JiaHuaiYou","text":"Jia-Huai You"}]},"title":"Level Mapping Induced Loop Formulas for Weight Constraint and Aggregate Logic Programs.","venue":"Fundam. Informaticae","volume":"101","number":"3","pages":"237-255","year":"2010","type":"Journal Articles","access":"closed","key":"journals/fuin/LiuY10","doi":"10.3233/FI-2010-286","ee":"https://doi.org/10.3233/FI-2010-286","url":"https://dblp.org/rec/journals/fuin/LiuY10"}, "url":"URL#4811540" }, { "@score":"1", "@id":"4811542", "info":{"authors":{"author":{"@pid":"65/480","text":"Irina A. Lomazova"}},"title":"Interacting Workflow Nets for Workflow Process Re-Engineering.","venue":"Fundam. Informaticae","volume":"101","number":"1-2","pages":"59-70","year":"2010","type":"Journal Articles","access":"closed","key":"journals/fuin/Lomazova10","doi":"10.3233/FI-2010-275","ee":"https://doi.org/10.3233/FI-2010-275","url":"https://dblp.org/rec/journals/fuin/Lomazova10"}, "url":"URL#4811542" }, { "@score":"1", "@id":"4811543", "info":{"authors":{"author":[{"@pid":"l/AlessioLomuscio","text":"Alessio Lomuscio"},{"@pid":"58/2583","text":"Wojciech Penczek"},{"@pid":"q/HongyangQu","text":"Hongyang Qu 0001"}]},"title":"Partial Order Reductions for Model Checking Temporal-epistemic Logics over Interleaved Multi-agent Systems.","venue":"Fundam. Informaticae","volume":"101","number":"1-2","pages":"71-90","year":"2010","type":"Journal Articles","access":"closed","key":"journals/fuin/LomuscioPQ10","doi":"10.3233/FI-2010-276","ee":"https://doi.org/10.3233/FI-2010-276","url":"https://dblp.org/rec/journals/fuin/LomuscioPQ10"}, "url":"URL#4811543" }, { "@score":"1", "@id":"4811553", "info":{"authors":{"author":[{"@pid":"93/3249","text":"Ujjwal Maulik"},{"@pid":"74/8622","text":"Debasis Chakraborty"}]},"title":"A Robust Multiple Classifier System for Pixel Classification of Remote Sensing Images.","venue":"Fundam. Informaticae","volume":"101","number":"4","pages":"286-304","year":"2010","type":"Journal Articles","access":"closed","key":"journals/fuin/MaulikC10","doi":"10.3233/FI-2010-289","ee":"https://doi.org/10.3233/FI-2010-289","url":"https://dblp.org/rec/journals/fuin/MaulikC10"}, "url":"URL#4811553" }, { "@score":"1", "@id":"4811573", "info":{"authors":{"author":[{"@pid":"99/8621","text":"Marek Palasinski"},{"@pid":"93/6308","text":"Krzysztof Pancerz"}]},"title":"On Computing Extensions and Restrictions of Information Systems Noting Some Order Properties.","venue":"Fundam. Informaticae","volume":"101","number":"1-2","pages":"91-103","year":"2010","type":"Journal Articles","access":"closed","key":"journals/fuin/PalasinskiP10","doi":"10.3233/FI-2010-277","ee":"https://doi.org/10.3233/FI-2010-277","url":"https://dblp.org/rec/journals/fuin/PalasinskiP10"}, "url":"URL#4811573" }, { "@score":"1", "@id":"4811578", "info":{"authors":{"author":{"@pid":"62/6651","text":"Roman R. Redziejowski"}},"title":"Infinite Product of Traces Represented by Projections.","venue":"Fundam. Informaticae","volume":"101","number":"1-2","pages":"105-113","year":"2010","type":"Journal Articles","access":"closed","key":"journals/fuin/Redziejowski10","doi":"10.3233/FI-2010-278","ee":"https://doi.org/10.3233/FI-2010-278","url":"https://dblp.org/rec/journals/fuin/Redziejowski10"}, "url":"URL#4811578" }, { "@score":"1", "@id":"4811584", "info":{"authors":{"author":[{"@pid":"01/8623","text":"N. R. Shanker"},{"@pid":"65/8621","text":"S. S. Ramakrishnan"}]},"title":"Enhancement of Multispectral Ikonos Satellite Image Using Quantum Information Processing.","venue":"Fundam. Informaticae","volume":"101","number":"4","pages":"305-320","year":"2010","type":"Journal Articles","access":"closed","key":"journals/fuin/ShankerR10","doi":"10.3233/FI-2010-290","ee":"https://doi.org/10.3233/FI-2010-290","url":"https://dblp.org/rec/journals/fuin/ShankerR10"}, "url":"URL#4811584" }, { "@score":"1", "@id":"4811590", "info":{"authors":{"author":[{"@pid":"08/6778","text":"Zbigniew Suraj"},{"@pid":"20/980","text":"Piotr Grochowalski"}]},"title":"Toward Intelligent Searching the Rough Set Database System (RSDS): an Ontological Approach.","venue":"Fundam. Informaticae","volume":"101","number":"1-2","pages":"115-123","year":"2010","type":"Journal Articles","access":"closed","key":"journals/fuin/SurajG10","doi":"10.3233/FI-2010-279","ee":"https://doi.org/10.3233/FI-2010-279","url":"https://dblp.org/rec/journals/fuin/SurajG10"}, "url":"URL#4811590" }, { "@score":"1", "@id":"4811603", "info":{"authors":{"author":[{"@pid":"43/4536","text":"Alicja Wakulicz-Deja"},{"@pid":"39/8622","text":"Malgorzata Przybyla-Kasperek"}]},"title":"Multi-Agent Decision Taking System.","venue":"Fundam. Informaticae","volume":"101","number":"1-2","pages":"125-141","year":"2010","type":"Journal Articles","access":"closed","key":"journals/fuin/Wakulicz-DejaP10","doi":"10.3233/FI-2010-280","ee":"https://doi.org/10.3233/FI-2010-280","url":"https://dblp.org/rec/journals/fuin/Wakulicz-DejaP10"}, "url":"URL#4811603" }, { "@score":"1", "@id":"4811608", "info":{"authors":{"author":{"@pid":"22/5666","text":"Marcin Wolski"}},"title":"Perception and Classification. A Note on Near Sets and Rough Sets.","venue":"Fundam. Informaticae","volume":"101","number":"1-2","pages":"143-155","year":"2010","type":"Journal Articles","access":"closed","key":"journals/fuin/Wolski10","doi":"10.3233/FI-2010-281","ee":"https://doi.org/10.3233/FI-2010-281","url":"https://dblp.org/rec/journals/fuin/Wolski10"}, "url":"URL#4811608" }, { "@score":"1", "@id":"4811610", "info":{"authors":{"author":{"@pid":"24/7376","text":"Guodong Ye"}},"title":"Another Constructed Chaotic Image Encryption Scheme Based on Toeplitz Matrix and Hankel Matrix.","venue":"Fundam. Informaticae","volume":"101","number":"4","pages":"321-333","year":"2010","type":"Journal Articles","access":"closed","key":"journals/fuin/Ye10","doi":"10.3233/FI-2010-291","ee":"https://doi.org/10.3233/FI-2010-291","url":"https://dblp.org/rec/journals/fuin/Ye10"}, "url":"URL#4811610" } ] } } } )