default search action
Information Processing Letters, Volume 55
Volume 55, Number 1, 7 July 1995
- Chung-Ming Huang, Jenq-Muh Hsu, Shiun-Wei Lee:
ECFSM-Based Probabilistic Protocol Verification. 1-9 - Ton Kloks, Dieter Kratsch:
Computing a Perfect Edge Without Vertex Elimination Ordering of a Chordal Bipartite Graph. 11-16 - Dawei Hong, Joseph Y.-T. Leung:
Probabilistic Analysis of k-Dimensional Packing Algorithms. 17-24 - Ferruccio Barsi, Maria Cristina Pinotti:
A Fully Parallel Algorithm for Residue to Binary Conversion. 25-26 - Meena Mahajan, N. V. Vinodchandran:
A Note on Mod and Generalised Mod Classes. 27-31 - Walter Vogler:
Fairness and Partial Order Semantics. 33-39 - Alak Kumar Datta, Ranjan K. Sen:
1-Approximation Algorithm for Bottleneck Disjoint Path Matching. 41-44 - Hung-Yu Lin, Lein Harn:
Fair Reconstruction of a Secret. 45-47 - Fouad B. Chedid:
On the Generalized Twisted Cube. 49-52 - Paul Cull, Shawn M. Larson:
On Generalized Twisted Cubes. 53-55 - Gregory Butler:
Easy Verification of Behavioural Subtyping in Common Cases. 57-58
Volume 55, Number 2, 21 July 1995
- Jeffery R. Westbrook, Dicky C. K. Yan:
Linear Bounds for On-Line Steiner Problems. 59-63 - Steve Hill:
The Lazy Z-Buffer. 65-70 - Ramjee P. Swaminathan, D. Giriraj, D. K. Bhatia:
The Pagenumber of the Class of Bandwidth-k Graphs is k-1. 71-74 - Muhammad H. Alsuwaiyel, D. T. Lee:
Finding an Approximate Minimum-Link Visibility Path Inside a Simple Polygon. 75-79 - Jie Wang:
Some Results on Selectivity and Self-Reducibility. 81-87 - John D. Valois:
A 3-Valued Wakeup Protocol. 89-93 - Youssef Saab:
Iterative Improvement of Vertex Covers. 95-98 - Derek G. Corneil, Hiryoung Kim, Sridhar Natarajan, Stephan Olariu, Alan P. Sprague:
Simple Linear Time Recognition of Unit Interval Graphs. 99-104 - A. Dermouche:
A Fast Algorithm for String Matching with Mismatches. 105-110 - Tien Huynh, Kim Marriott:
Incremental Constraint Deletion in Systems of Linear Constraints. 111-115
Volume 55, Number 3, 11 August 1995
- Mukesh Singhal, Friedemann Mattern:
An Optimality Proof for Asynchronous Recovery Algorithms in Distributed Systems. 117-121 - Pranava K. Jha, Giora Slutzki:
A Scheme to Construct Distance Three Codes Using Latin Squares, with Applications to the n-Cube. 123-127 - Béatrice Bérard:
Untiming Timed Languages. 129-135 - Hongchi Shi, Gerhard X. Ritter, Joseph N. Wilson:
Simulations Between Two Reconfigurable Mesh Models. 137-142 - Borislav Nikolik:
Constraint Preservation Through Loops. 143-148 - Ortrud Oellermann, Jeremy P. Spinrad:
A Polynomial Algorithm for Testing Whether a Graph is 3-Steiner Distance Hereditary. 149-154 - Ee-Chien Chang, Chee-Keng Yap:
A Note on Improved Deterministic Time Simulation of Nondeterministic Space for Small Space. 155-157 - Lydia E. Kavraki, Mihail N. Kolountzakis:
Partitioning a Planar Assembly Into Two Connected Parts is NP-Complete. 159-165 - Li Gong:
Collisionful Keyed Hash Functions with Selectable Collisions. 167-170 - Walter Hower:
Constraint Satisfaction - Algorithms and Complexity Analysis. 171-178
Volume 55, Number 4, 25 August 1995
- Rainer Schuler:
Some Properties of Sets Tractable Under Every Polynomial-Time Computable Distribution. 179-184 - Nguyen Huong Lam:
A Note on Codes Having no Finite Completions. 185-188 - Carlo Blundo:
A Note on Dynamic Threshold Schemes. 189-193 - Jörg Keller, Thomas Walle:
A Note on Implementing Combining Networks. 195-200 - Simon Atkinson, David Scholefield:
Transformational vs Reactive Refinement in Real-Time Systems. 201-210 - K. Thirusangu, K. Rangarajan:
A Note on the Construction of Marked Graphs. 211-215 - Xavier Droubay:
Palindromes in the Fibonacci Word. 217-221 - Xuehou Tan, Xiaoyu Song:
Hexagonal Three-Layer Channel Routing. 223-228 - Young Park, Benjamin Goldberg:
Static Analysis for Optimizing Reference Counting. 229-234
Volume 55, Number 5, 15 September 1995
- Tatsuya Akutsu:
Approximate String Matching with don't Care Characters. 235-239 - J. Ramachandran:
Modulo Classes and Logarithmic Advice. 241-245 - Gwoboa Horng:
Password Authentication Without Using a Password Table. 247-250 - Kian-Lee Tan, Hongjun Lu:
Workload Scheduling for Multiple Query Processing. 251-257 - Lin Chen:
Solving the Shortest-Paths Problem on Bipartite Permutation Graphs Efficiently. 259-264 - Soojung Lee, Junguk L. Kim:
Resolving all Deadlocks in Distributed Systems. 265-271 - Tung-Shou Chen:
SIMPLE: An Optimal Disk System with Two Restricted Heads. 273-277 - Hing Leung, Desh Ranjan, Héctor J. Hernández, D. T. Tang, Agustin González:
A Simple Proof on the Decidability of Equivalence Between Recursive and Nonrecursive Datalog Programs. 279-282 - Ung Kyu Park, Hwang Kyu Choi, Tag Gon Kim:
Uniform Partitioning of Relations Using Histogram Equalization Framework: An Efficient Parallel Hash-Based Join. 283-289 - Serdar Boztas:
A Robust Multi-Priority Topology-Independent Transmission Schedule for Packet Radio Networks. 291-295
Volume 55, Number 6, 29 September 1995
- Martin Farach, Teresa M. Przytycka, Mikkel Thorup:
On the Agreement of Many Trees. 297-301 - Zhi-Zhong Chen:
A Fast and Efficient NC Algorithm for Maximal Matching. 303-307 - Jürg Nievergelt, Narsingh Deo:
Metric Graphs Elastically Embeddable in the Plane. 309-315 - Pallab Dasgupta, P. P. Chakrabarti, S. C. De Sarkar:
Utility of Pathmax in Partial Order Heuristic Search. 317-322 - Vasco Thudichum Vasconcelos:
Unification of Kinded Infinite Trees. 323-328 - Andrei Z. Broder, Alan M. Frieze, Carsten Lund, Steven J. Phillips, Nick Reingold:
Balanced Allocations for Tree-Like Inputs. 329-332 - Weifa Liang:
Fast Parallel Algorithms for the Approximate Edge-Coloring Problem. 333-338 - Amiya Nayak, Vincenzo Acciaro, Paolo Gissi:
A Note on Isomorphic Chordal Rings. 339-341 - Young Gil Park, Benjamin Goldberg:
Order-of-Demand Analysis for Lazy Languages. 343-348 - Gisela Pitsch:
LR(k)-Coupled-Context-Free Grammars. 349-358
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.