


default search action
Information Processing Letters, Volume 115
Volume 115, Number 1, January 2015
- Laurent Bulteau, Guillaume Fertin
, Romeo Rizzi, Stéphane Vialette:
Some algorithmic results for [2]-sumset covers. 1-5 - Hao Yang
, Keming Tang, Jianjiang Yu, Licai Zhu:
A practical information coverage approach in wireless sensor network. 6-10 - Taolue Chen
, Nengkun Yu
, Tingting Han:
Continuous-time orbit problems are decidable in polynomial-time. 11-14 - Razvan Diaconescu
:
On the existence of translations of structured specifications. 15-22 - Oliver Schaudt:
On disjoint maximal independent sets in graphs. 23-27 - Hirotsugu Kakugawa:
On the family of critical section problems. 28-32 - Wenchang Luo
, Min Ji
:
Scheduling a variable maintenance and linear deteriorating jobs on a single machine. 33-39 - Martin Rötteler
, Rainer Steinwandt:
A note on quantum related-key attacks. 40-44 - Wolfgang Aigner, Franz Aurenhammer, Bert Jüttler
:
On triangulation axes of polygons. 45-51 - Béatrice Bérard, Krishnendu Chatterjee
, Nathalie Sznajder:
Probabilistic opacity for Markov decision processes. 52-59 - Yerim Chung, Myoung-Ju Park
:
Notes on inverse bin-packing problems. 60-68 - Kilho Shin:
Tree Edit Distance and Maximum Agreement Subtree. 69-73
Volume 115, Number 2, February 2015
- Andrzej Indrzejczak
:
Eliminability of cut in hypersequent calculi for some modal logics of linear frames. 75-81 - Peter Floderus, Andrzej Lingas, Mia Persson, Dzmitry Sledneu:
Detecting monomials with k distinct variables. 82-86 - Salvador Lucas
:
Completeness of context-sensitive rewriting. 87-92 - Simina Brânzei:
A note on envy-free cake cutting with polynomial valuations. 93-95 - Jianhua Tu
:
A fixed-parameter algorithm for the vertex cover P3 problem. 96-99 - Ragesh Jaiswal
, Mehul Kumar, Pulkit Yadav:
Improved analysis of D2-sampling based PTAS for k-means and other clustering problems. 100-103 - Qiang Dong, Qian Zhao, Ya-Hui An:
The hamiltonicity of generalized honeycomb torus networks. 104-111 - Michal Feldman, Tami Tamir:
Convergence of best-response dynamics in games with conflicting congestion effects. 112-118 - Sílvia Maria Santana Mapa
, Sebastián Urrutia
:
On the maximum acyclic subgraph problem under disjunctive constraints. 119-124 - Tetsuya Ishiu
, Masashi Kikuchi:
The termination of the higher-dimensional tarai functions. 125-127 - Graham Enos, Yuliang Zheng
:
An ID-based signcryption scheme with compartmented secret sharing for unsigncryption. 128-133 - Joachim von zur Gathen, Igor E. Shparlinski
:
Circulant graphs and GCD and LCM of subsets. 134-138 - Enes Pasalic
:
A note on nonexistence of vectorial bent functions with binomial trace representation in the PS- class. 139-140 - K. Ashik Mathew, Patric R. J. Östergård:
On hypercube packings, blocking sets and a covering problem. 141-145 - Péricles Rafael Oliveira Alves, Raphael Ernani Rodrigues, Rafael Martins de Souza, Fernando Magno Quintão Pereira:
A case for a fast trip count predictor. 146-150 - Chang-Hsiung Tsai:
The pessimistic diagnosability of alternating group graphs under the PMC model. 151-154 - S. Akshay, Timos Antonopoulos, Joël Ouaknine
, James Worrell
:
Reachability problems for Markov chains. 155-158 - Enrique Gerstl
, Baruch Mor
, Gur Mosheiov:
A note: Maximizing the weighted number of just-in-time jobs on a proportionate flowshop. 159-162 - Yinfeng Xu, Hongmei Li:
Minimax regret 1-sink location problem in dynamic cycle networks. 163-169 - Jagadish M:
An approximation algorithm for the cutting-sticks problem. 170-174 - Strahil Ristov, Damir Korencic:
Using static suffix array in dynamic application: Case of text compression by longest first substitution. 175-181 - Fabrizio Grandoni
, Tomasz Kociumaka
, Michal Wlodarczyk:
An LP-rounding 2√2-approximation for restricted maximum acyclic subgraph. 182-185 - David A. Basin, Felix Klaedtke, Eugen Zalinescu:
Greedily computing associative aggregations on sliding windows. 186-192 - Michael Brand
:
Arbitrary sequence RAMs. 193-198 - Javier Marenco, Marcelo Mydlarz, Daniel E. Severín
:
Topological additive numbering of directed acyclic graphs. 199-202 - Yu-Liang Liu:
Routing and wavelength assignment for exchanged hypercubes in linear array optical networks. 203-208 - Min-Yun Lien, Jyhmin Kuo, Hung-Lin Fu:
On the decycling number of generalized Kautz digraphs. 209-211 - Luca Aceto, Eugen-Ioan Goriac, Anna Ingólfsdóttir:
A ground-complete axiomatization of stateless bisimilarity over Linda. 212-220 - Bo Ning
:
Notes on a conjecture of Manoussakis concerning Hamilton cycles in digraphs. 221-224 - Junqing Cai:
A sufficient condition involving implicit degree and neighborhood intersection for long cycles. 225-227 - Yanning Wang
, Yanyan Wang, Xuguang Zhang:
Note on property M(k) of some complete multipartite graphs. 228-231 - Robert Janczewski, Krzysztof Turowski
:
The computational complexity of the backbone coloring problem for bounded-degree graphs with connected backbones. 232-236 - Chetan Dugar, Anuj Jain
, Amit Rajawat, Swapan Bhattacharya:
Dynamic pricing of call rates: Bayesian approach. 237-242 - Therese Biedl, Martin Held, Stefan Huber
, Dominik Kaaser, Peter Palfrader:
A simple algorithm for computing positively weighted straight skeletons of monotone polygons. 243-247 - Yafei Song, Xiaodan Wang, Lei Lei, Yaqiong Xing:
Credibility decay model in temporal evidence combination. 248-252 - Baruch Mor
, Gur Mosheiov:
A note: Minimizing maximum earliness on a proportionate flowshop. 253-255 - Andreas Brandstädt, Pavel Ficur, Arne Leitert, Martin Milanic
:
Polynomial-time algorithms for weighted efficient domination problems in AT-free graphs and dually chordal graphs. 256-262 - Xiang'en Chen, Zepeng Li:
Adjacent-vertex-distinguishing proper edge colorings of planar bipartite graphs with Δ = 9, 10, or 11. 263-268 - Xue Zhou:
A new lower bound for the number of perfect matchings of line graph. 269-274 - Dimitri Watel, Marc-Antoine Weisser, Cédric Bentz, Dominique Barth:
An FPT algorithm in polynomial space for the Directed Steiner Tree problem with Limited number of Diffusing nodes. 275-279 - Shunichi Matsubara
:
An enumeration algorithm for all integers nonrepresentable by some positive integers. 280-284 - Tong Jia
, Yan Shi
, ZhongXuan Zhou, Dongyue Chen:
3D depth information extraction with omni-directional camera. 285-291 - Giovanni Agosta
, Alessandro Barenghi
, Gerardo Pelosi
, Michele Scandale:
Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software. 292-297 - Chaoyi Pang
, Junhu Wang
, Yu Cheng, Hao Lan Zhang
, Tongliang Li:
Topological sorts on DAGs. 298-301 - Zepeng Li
, Zehui Shao
, Enqiang Zhu, Jin Xu:
A note on local coloring of graphs. 302-305 - Thomas Lambert, Loris Marchal
, Bora Uçar
:
Comments on the hierarchically structured bin packing problem. 306-309 - Yasuaki Kobayashi
:
Computing the pathwidth of directed graphs with small vertex cover. 310-312 - Damianos Gavalas
, Charalampos Konstantopoulos
, Konstantinos Mastakas, Grammati E. Pantziou
, Nikolaos Vathis:
Approximation algorithms for the arc orienteering problem. 313-315 - Ali Dehghan
, Mohammad-Reza Sadeghi
:
The complexity of the zero-sum 3-flows. 316-320 - Naoyuki Kamiyama, Yasushi Kawase:
On packing arborescences in temporal networks. 321-325 - Michal Debski
, Jaroslaw Grytczuk
, Malgorzata Sleszynska-Nowak:
The strong chromatic index of sparse graphs. 326-330 - Zuosong Liang, Erfang Shan:
The clique-transversal set problem in claw-free graphs with degree at most 4. 331-335 - Reuven Cohen, Liran Katzir, Aviv Yehezkel:
A unified scheme for generalizing cardinality estimators to sum aggregation. 336-342 - Pranava K. Jha:
A comment on "The domination number of exchanged hypercubes". 343-344 - Andreas Brandstädt, Vassilis Giakoumakis:
Addendum to: Maximum Weight Independent Sets in hole- and co-chair-free graphs. 345-350 - Chandrashekhar Meshram:
An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem. 351-358 - Ferhat Karakoç
, Hüseyin Demirci
, A. Emre Harmanci:
AKF: A key alternating Feistel scheme for lightweight cipher designs. 359-367 - Allan Scott, Srinivasan Venkatesh, Ulrike Stege:
k-Attribute-Anonymity is hard even for k=2. 368-370 - Min-Sheng Lin, Chao-Chun Ting:
A polynomial-time algorithm for computing K-terminal residual reliability of d-trapezoid graphs. 371-376 - Yinglei Song
, Menghong Yu:
On finding the longest antisymmetric path in directed acyclic graphs. 377-381 - Divesh Aggarwal:
Affine-evasive sets modulo a prime. 382-385 - Jian Guo
, Chunhua Su, Wun-She Yap
:
An improved preimage attack against HAVAL-3. 386-393 - Wantao Ning, Xiaoli Feng
, Ling Wang:
The connectivity of exchanged crossed cube. 394-396 - Sukhyeun Cho, Joong Chae Na, Kunsoo Park, Jeong Seop Sim:
A fast algorithm for order-preserving pattern matching. 397-402
Volume 115, Number 3, March 2015
- Jing-Ming Guo, Chih-Hsien Hsia
, Chia-Hao Chang:
JPEG false contour reduction using error diffusion. 403-407 - Massimo Vecchio
, Roberto López-Valcarce
:
A greedy topology design to accelerate consensus in broadcast wireless sensor networks. 408-413 - Eleni Constantinou
, Athanasios Naskos, George Kakarontzas
, Ioannis Stamelos:
Extracting reusable components: A semi-automated approach for complex structures. 414-417 - Margus Veanes, Nikolaj S. Bjørner:
Symbolic tree automata. 418-424 - Domagoj Vrgoc:
Using variable automata for querying data graphs. 425-430 - Pradeesha Ashok
, Sathish Govindarajan:
On strong centerpoints. 431-434 - Jérôme Monnot:
A note on the traveling salesman reoptimization problem under vertex insertion. 435-438 - Gautam K. Das, Minati De
, Sudeshna Kolay, Subhas C. Nandy
, Susmita Sur-Kolay:
Approximation algorithms for maximum independent set of a unit disk graph. 439-446 - Pierre Courtieu, Lionel Rieg, Sébastien Tixeuil
, Xavier Urbain:
Impossibility of gathering, a certification. 447-452
Volume 115, Number 4, April 2015
- Stanislaw J. Piestrak
:
A note on RNS architectures for the implementation of the diagonal function. 453-457 - Malte Darnstädt:
The optimal PAC bound for intersection-closed concept classes. 458-461 - Miaomiao Tian:
Identity-based proxy re-signatures from lattices. 462-467 - Mengjun Li:
Automatic proving or disproving equality loop invariants based on finite difference techniques. 468-474 - Jianming Dong, Yiwei Jiang, An Zhang, Jueliang Hu, Hui Luo:
An approximation algorithm for proportionate scheduling in the two-stage hybrid flow shop. 475-480 - Saeedeh Momtazi
, Felix Naumann
:
Who wants a computer to be a millionaire? 481-485 - Zaiping Lu, Yingbin Ma:
Rainbow 2-Connection Numbers of Cayley Graphs. 486-491 - Xiaofang Gao, Jiye Liang
:
An improved incremental nonlinear dimensionality reduction for isometric data embedding. 492-501 - Jens Maßberg:
Generalized Huffman coding for binary trees with choosable edge lengths. 502-506 - Zoltán Király
, Erika R. Kovács
:
Randomized and deterministic algorithms for network coding problems in wireless networks. 507-511 - Lewis Tseng
, Nitin H. Vaidya, Vartika Bhandari:
Broadcast using certified propagation algorithm in presence of Byzantine faults. 512-514 - Prateek Karandikar, Manfred Kufleitner
, Philippe Schnoebelen:
On the index of Simon's congruence for piecewise testability. 515-519 - Enes Pasalic
:
Corrigendum to "A note on nonexistence of vectorial bent functions with binomial trace representation in the PS- class" [Information Processing Letters 115 (2) (2015) 139-140]. 520
Volume 115, Number 5, May 2015
- Hailiang Zhang
, Guanglong Yu, Shanlin Li:
Graphs with six distinct matching roots. 521-526 - Ivan Bliznets
, Marek Cygan
, Pawel Komosa, Lukás Mach:
Kernelization lower bound for Permutation Pattern Matching. 527-531 - Guy-Vincent Jourdan, Hasan Ural, Hüsnü Yenigün
:
Reduced checking sequences using unreliable reset. 532-535 - Marco Magirius, Martin Mundhenk, Raphaela Palenta:
The complexity of primal logic with disjunction. 536-542 - Golnaz Badkobeh, Maxime Crochemore
:
Infinite binary words containing repetitions of odd period. 543-547 - Jayadev Misra:
Mapping among the nodes of infinite trees: A variation of Kőnig's infinity lemma. 548-549
Volume 115, Numbers 6-8, June-August 2015
- Chun-Nan Hung, Eddie Cheng
, Tao-Ming Wang, Lih-Hsing Hsu:
On Hamiltonian properties of unidirectional hypercubes. 551-555 - Gabriela R. Argiroffo, Valeria A. Leoni, Pablo Daniel Torres:
On the complexity of {k}-domination and k-tuple domination in graphs. 556-561 - Hirotsugu Kakugawa:
Self-stabilizing distributed algorithm for local mutual inclusion. 562-569 - Marco Bender, Clemens Thielen
, Stephan Westphal
:
Packing items into several bins facilitates approximating the separable assignment problem. 570-575 - Hervé Fournier, Anas Ismail
, Antoine Vigneron
:
Computing the Gromov hyperbolicity of a discrete metric space. 576-579 - Xue-Gang Chen
, Shinya Fujita:
Downhill domination problem in graphs. 580-581 - Andrei Braga, Cid C. de Souza
, Orlando Lee:
The Eternal Dominating Set problem for proper interval graphs. 582-587 - David Avis, Hans Raj Tiwary
:
A generalization of extension complexity that captures P. 588-593 - Aline Medeiros Saettler, Eduardo Sany Laber, Ferdinando Cicalese:
Approximating decision trees with value dependent testing costs. 594-599 - Flavia Bonomo
, Guillermo Durán, Amedeo Napoli, Mario Valencia-Pabon:
A one-to-one correspondence between potential solutions of the cluster deletion problem and the minimum sum coloring problem, and its application to {k}-sparse graphs. 600-603 - André B. Chassein, Marc Goerigk
:
Alternative formulations for the ordered weighted averaging objective. 604-608 - Olivier Finkel:
The exact complexity of the infinite Post Correspondence Problem. 609-611 - Salim Haddadi
, S. Chenche, Meryem Cheraitia
, F. Guessoum
:
Polynomial-time local-improvement algorithm for Consecutive Block Minimization. 612-617 - Ehsan Najafi Yazdi, Alireza Bagheri
, Zahra Moezkarimi, Hamidreza Keshavarz
:
An O(1)-approximation algorithm for the 2-dimensional geometric freeze-tag problem. 618-622 - Hoda Jannati
, Abolfazl Falahati
:
Analysis of false-reject probability in distance bounding protocols with mixed challenges over RFID noisy communication channel. 623-629 - Shigeyoshi Imai, Kaoru Kurosawa:
Improved reconstruction of RSA private-keys from their fraction. 630-632 - Vince Grolmusz
:
A note on the PageRank of undirected graphs. 633-634 - Michal Nánási
, Tomás Vinar
, Brona Brejová
:
Sequence annotation with HMMs: New problems and their complexity. 635-639 - Szymon Grabowski
:
A note on the longest common substring with k-mismatches problem. 640-642 - Tomás Flouri
, Emanuele Giaquinta
, Kassian Kobert, Esko Ukkonen
:
Longest common substrings with k mismatches. 643-647
Volume 115, Number 9, September 2015
- Sharareh Alipour, Mohammad Ghodsi, Alireza Zarei, Maryam Pourreza:
Visibility testing and counting. 649-654 - Yuto Nakashima, Tomohiro I, Shunsuke Inenaga, Hideo Bannai
, Masayuki Takeda:
Constructing LZ78 tries and position heaps in linear time for large alphabets. 655-659 - Céline Blondeau:
Impossible differential attack on 13-round Camellia-192. 660-666 - Min Chih Lin
, Saveliy Vasiliev:
Approximation algorithms for clique transversals on some graph classes. 667-670 - Henning Fernau
, Pinar Heggernes
, Pim van 't Hof
, Daniel Meister, Reza Saei
:
Computing the metric dimension for chain graphs. 671-676 - Shuhuan Zhao
, Zheng-ping Hu:
A modular weighted sparse representation based on Fisher discriminant and sparse residual for face recognition with occlusion. 677-683 - Martin Dietzfelbinger
, Raed Jaberi:
On testing single connectedness in directed graphs and some related problems. 684-688 - François Queyroi, Sergey Kirgizov:
Suppression distance computation for hierarchical clusterings. 689-693 - Jay Thakkar, Aditya Kanade:
Non-deterministic transducer models of retransmission protocols over noisy channels. 694-698 - Iiro S. Honkala, Olivier Hudry, Antoine Lobstein:
On the ensemble of optimal dominating and locating-dominating codes in a graph. 699-702 - Yunong Zhang
, Binbin Qiu, Long Jin, Dongsheng Guo, Zhi Yang:
Infinitely many Zhang functions resulting in various ZNN models for time-varying matrix inversion with link to Drazin inverse. 703-706 - Irena Hrastnik Ladinek
, Janez Zerovnik
:
Perfect codes in direct graph bundles. 707-711 - Barun Gorain, Partha Sarathi Mandal
:
Approximation algorithm for sweep coverage on graph. 712-718 - Yue-Feng Cen, Wanliang Wang, Xin-Wei Yao:
A fast CU depth decision mechanism for HEVC. 719-724 - Edward A. Hirsch, Dmitry Sokolov
:
On the probabilistic closure of the loose unambiguous hierarchy. 725-730
Volume 115, Number 10, October 2015
- Thaís Bardini Idalino
, Lucia Moura, Ricardo Felipe Custódio, Daniel Panario
:
Locating modifications in signed data for partial data integrity. 731-737 - Nethanel Gelernter, Amir Herzberg
:
Gossip Latin square and the meet-all gossipers problem. 738-743 - René van Bevern
, Jiehua Chen, Falk Hüffner
, Stefan Kratsch, Nimrod Talmon
, Gerhard J. Woeginger:
Approximability and parameterized complexity of multicover by c-intervals. 744-749 - Dean Doron
, Amnon Ta-Shma
:
On the de-randomization of space-bounded approximate counting problems. 750-753 - Enqiang Zhu, Zepeng Li, Zehui Shao
, Jin Xu, Chanjuan Liu:
Tree-core and tree-coritivity of graphs. 754-759 - Laurent Gourvès:
Approximating the optimal sequence of acquisitions and sales with a capped budget. 760-764 - Alexander Chane Shiau, Tzong-Huei Shiau, Yue-Li Wang:
Incidence coloring of Cartesian product graphs. 765-768 - Amr Elmasry:
Counting inversions adaptively. 769-772 - Min-Sheng Lin, Chao-Chun Ting:
Computing the K-terminal reliability of directed path graphs. 773-778 - Mrinal Nandi
:
On commutativity of Discrete Fourier Transform. 779-785 - Houcine Boumediene Merouane, Mustapha Chellali:
On Secure Domination in Graphs. 786-790 - Jørgen Bang-Jensen
, Magnús M. Halldórsson
:
Vertex coloring edge-weighted digraphs. 791-796
Volume 115, Number 11, November 2015
- Chen Yuan
, Haibin Kan
:
A refined analysis on the jump number problem of interval orders. 797-800 - Joao M. M. Barguil
, Paulo S. L. M. Barreto:
Security issues in Sarkar's e-cash protocol. 801-803 - Guanqun Ni, Li Luo, Yin-Feng Xu, Jiuping Xu:
Optimal online markdown and markup pricing policies with demand uncertainty. 804-811 - Sheng Huang
, Dan Yang, Yongxin Ge, Xiaohong Zhang:
Combined supervised information with PCA via discriminative component selection. 812-816 - Yuxing Yang
, Shiying Wang, Jing Li:
Subnetwork preclusion for bubble-sort networks. 817-821 - Jing Chen
, Xiuping Wang:
Identification of Hammerstein systems with continuous nonlinearity. 822-827 - Alak Kumar Datta:
Approximate spanning cactus. 828-832 - Vahan Mkrtchyan
, K. Subramani
:
On the approximability of the Largest Sphere Rule Ensemble Classification problem. 833-837 - Yong Wu
, T. C. E. Cheng
, Min Ji
:
Inefficiency of the Nash equilibrium for selfish machine covering on two hierarchical uniform machines. 838-844 - Miriam Di Ianni, Luciano Gualà
, Gianluca Rossi
:
Reducing the diameter of a unit disk graph via node addition. 845-850 - Lein Harn, Ching-Fang Hsu:
Dynamic threshold secret reconstruction and its application to the threshold cryptography. 851-857 - Xianmeng Meng, Xuexin Zheng:
Cryptanalysis of RSA with a small parameter revisited. 858-862 - Cosmina Croitoru:
A note on quasi-kernels in digraphs. 863-865 - Tobias Mömke
:
An improved approximation algorithm for the traveling salesman problem with relaxed triangle inequality. 866-871 - Paulina Grzegorek, Janusz Januszewski
:
A note on one-space bounded square packing. 872-876 - Tomás Kaiser
, Maria Saumell
, Nico Van Cleemput:
10-Gabriel graphs are Hamiltonian. 877-881 - Fred Mesnard, Étienne Payet:
A second-order formulation of non-termination. 882-885 - Jarkko Peltomäki
:
Characterization of repetitions in Sturmian words: A new proof. 886-891 - Brahim Neggazi, Mohammed Haddad, Hamamache Kheddouci:
A new self-stabilizing algorithm for maximal p-star decomposition of general graphs. 892-898 - Thomas Eisenbarth
, Aaron Meyerowitz, Rainer Steinwandt:
On the security margin of MAC striping. 899-902 - Yan Zhang, Zhaohui Zhu, Jinjin Zhang:
On the greatest solution of equations in CLLR. 903-907 - Sandra Alves
, Sabine Broda
:
A short note on type-inhabitation: Formula-trees vs. game semantics. 908-911
Volume 115, Number 12, December 2015
- Min Chih Lin
, Francisco J. Soulignac
, Jayme Luiz Szwarcfiter:
A faster algorithm for the cluster editing problem on proper interval graphs. 913-916 - Chiou-Jiun Lin, Jia Jie Liu
, Yue-Li Wang:
Finding outer-connected dominating sets in interval graphs. 917-922 - Vladimir Braverman, Rafail Ostrovsky
, Gregory Vorsanger:
Weighted sampling without replacement from data streams. 923-926 - Marios Mavronicolas
, Burkhard Monien:
The complexity of pure equilibria in mix-weighted congestion games on parallel links. 927-931 - Annamária Kovács, Ulrich Meyer, Gabriel Moruz, Andrei Negoescu:
The optimal structure of algorithms for α-paging. 932-938 - Chuandong Xu, Shenggui Zhang, Yi Wang:
On the maximum arc-chromatic number of digraphs with bounded outdegrees or indegrees. 939-944 - Dongqin Cheng, Rong-Xia Hao
, Yan-Quan Feng
:
Embedding even cycles on folded hypercubes with conditional faulty edges. 945-949 - Huaming Xing, Moo Young Sohn:
Bounds on locating total domination number of the Cartesian product of cycles and paths. 950-956 - Zhi-Yi Shao
, Bo Yang:
On security against the server in designated tester public key encryption with keyword search. 957-961 - Daniel L. Lu
:
Planar lower envelope of monotone polygonal chains. 962-964 - Hans L. Bodlaender
, Marc J. van Kreveld
:
Google Scholar makes it hard - the complexity of organizing one's publications. 965-968 - Zhichao Geng, Jinjiang Yuan:
A note on unbounded parallel-batch scheduling. 969-974 - Moshe Milshtein
:
A new binary code of length 16 and minimum distance 3. 975-976 - Zhiwei Guo, Haixing Zhao, Yaping Mao:
The equitable vertex arboricity of complete tripartite graphs. 977-982 - Cosme Ernesto Santiesteban-Toca
, Jesús S. Aguilar-Ruiz
:
A new multiple classifier system for the prediction of protein's contacts map. 983-990

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.