Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             118 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A 1.75-approximation algorithm for unsigned translocation distance Cui, Yun
2007
7 p. 1045-1059
15 p.
artikel
2 A complete parameterized complexity analysis of bounded planning Bäckström, Christer
2015
7 p. 1311-1332
22 p.
artikel
3 Advanced orthogonal RAID based on virtual disks Uehara, Minoru
2013
7 p. 1077-1085
9 p.
artikel
4 A kernelization algorithm for d-Hitting Set Abu-Khzam, Faisal N.
2010
7 p. 524-531
8 p.
artikel
5 Algorithm for finding k-vertex out-trees and its application to k-internal out-branching problem Cohen, Nathann
2010
7 p. 650-662
13 p.
artikel
6 Algorithms and estimators for summarization of unaggregated data streams Cohen, Edith
2014
7 p. 1214-1244
31 p.
artikel
7 A linear kernel for the complementary maximal strip recovery problem Jiang, Haitao
2014
7 p. 1350-1358
9 p.
artikel
8 A method based on induced aggregation operators and distance measures to multiple attribute decision making under 2-tuple linguistic environment Li, Chunguang
2014
7 p. 1339-1349
11 p.
artikel
9 A methodology to develop awareness in computer supported collaborative work using policies Talaei-Khoei, Amir
2014
7 p. 1323-1338
16 p.
artikel
10 An analytical model for loss estimation in network traffic analysis systems Ferro, Armando
2006
7 p. 1121-1133
13 p.
artikel
11 An effective recommender system by unifying user and item trust information for B2B applications Shambour, Qusai
2015
7 p. 1110-1126
17 p.
artikel
12 An effective signal strength-based wireless location estimation system for tracking indoor mobile users Ng, Joseph Kee-Yin
2013
7 p. 1005-1016
12 p.
artikel
13 An innovative approach for automatically grading spelling in essays using rubric-based scoring Fazal, Anhar
2013
7 p. 1040-1056
17 p.
artikel
14 A novel design of 8-bit adder/subtractor by quantum-dot cellular automata Kianpour, Moein
2014
7 p. 1404-1414
11 p.
artikel
15 A taxonomy for nearest neighbour queries in spatial databases Taniar, David
2013
7 p. 1017-1039
23 p.
artikel
16 A tentative commit protocol for composite web services Younas, Muhammad
2006
7 p. 1226-1237
12 p.
artikel
17 Better spaced seeds using Quadratic Residues Egidi, Lavinia
2013
7 p. 1144-1155
12 p.
artikel
18 Beyond Max-Cut: λ-extendible properties parameterized above the Poljak–Turzík bound Mnich, Matthias
2014
7 p. 1384-1403
20 p.
artikel
19 Bounded Budget Connection (BBC) games or how to make friends and influence people, on a budget Laoutaris, Nikolaos
2014
7 p. 1266-1284
19 p.
artikel
20 Bounded-width QBF is PSPACE-complete Atserias, Albert
2014
7 p. 1415-1429
15 p.
artikel
21 Causal graphs and structurally restricted planning Chen, Hubie
2010
7 p. 579-592
14 p.
artikel
22 Clustering overhead and convergence time analysis of the mobility-based multi-hop clustering algorithm for mobile ad hoc networks Er, Inn Inn
2006
7 p. 1144-1155
12 p.
artikel
23 Combining decomposition and reduction for state space analysis of a self-stabilizing system Müllner, Nils
2013
7 p. 1113-1125
13 p.
artikel
24 Comparing trees via crossing minimization Fernau, Henning
2010
7 p. 593-608
16 p.
artikel
25 Consistency checking and querying in probabilistic databases under integrity constraints Flesca, Sergio
2014
7 p. 1448-1489
42 p.
artikel
26 Contents 2010
7 p. OBC-
1 p.
artikel
27 Contents 2009
7 p. OBC-
1 p.
artikel
28 Contents 2014
7 p. OBC-
1 p.
artikel
29 Contents 2006
7 p. CO4-
1 p.
artikel
30 Contents 2008
7 p. OBC-
1 p.
artikel
31 Contents 2007
7 p. OBC-
1 p.
artikel
32 Contents 2016
7 p. OBC-
1 p.
artikel
33 Contents 2015
7 p. OBC-
1 p.
artikel
34 Contents 2013
7 p. OBC-
1 p.
artikel
35 Contents 2013
7 p. IBC-
1 p.
artikel
36 Control of queueing delay in a buffer with time-varying arrival rate Guan, L.
2006
7 p. 1238-1248
11 p.
artikel
37 Corrigendum to “Another approach to the equivalence of measure-many one-way quantum infinite automata and its application” [J. Comput. Syst. Sci. 78 (3) (2012) 807–821] Lin, Tianrong
2015
7 p. 1413-
1 p.
artikel
38 Counting complexity of propositional abduction Hermann, Miki
2010
7 p. 634-649
16 p.
artikel
39 Cubic patterns with permutations Manea, Florin
2015
7 p. 1298-1310
13 p.
artikel
40 Determining model accuracy of network traces Konrad, Almudena
2006
7 p. 1156-1171
16 p.
artikel
41 Distributed agreement in dynamic peer-to-peer networks Augustine, John
2015
7 p. 1088-1109
22 p.
artikel
42 Editorial Board 2010
7 p. IFC-
1 p.
artikel
43 Editorial Board 2009
7 p. IFC-
1 p.
artikel
44 Editorial Board 2014
7 p. IFC-
1 p.
artikel
45 Editorial Board 2006
7 p. CO2-
1 p.
artikel
46 Editorial Board 2008
7 p. IFC-
1 p.
artikel
47 Editorial Board 2007
7 p. IFC-
1 p.
artikel
48 Editorial Board 2016
7 p. IFC-
1 p.
artikel
49 Editorial Board 2015
7 p. IFC-
1 p.
artikel
50 Editorial Board 2013
7 p. IFC-
1 p.
artikel
51 Efficient approximation of convex recolorings Moran, Shlomo
2007
7 p. 1078-1089
12 p.
artikel
52 Erratum to “Languages not recognizable in real time by one-dimensional cellular automata” [J. Comput. System Sci. 74 (7) (2008) 1095–1102] Nakamura, Katsuhiko
2009
7 p. 421-
1 p.
artikel
53 Evaluation of struggle strategy in Genetic Algorithms for ground stations scheduling problem Xhafa, Fatos
2013
7 p. 1086-1100
15 p.
artikel
54 Fault tolerance in cellular automata at low fault rates McCann, Mark
2013
7 p. 1126-1143
18 p.
artikel
55 Fuzzy relation equations and reduction of fuzzy automata Ćirić, Miroslav
2010
7 p. 609-633
25 p.
artikel
56 Generalized modal satisfiability Hemaspaandra, Edith
2010
7 p. 561-578
18 p.
artikel
57 Generalized Wong sequences and their applications to Edmonds' problems Ivanyos, Gábor
2015
7 p. 1373-1386
14 p.
artikel
58 Generating all maximal induced subgraphs for hereditary and connected-hereditary graph properties Cohen, Sara
2008
7 p. 1147-1159
13 p.
artikel
59 Geodesic stability for memoryless binary long-lived consensus Fernandes, Cristina G.
2015
7 p. 1210-1220
11 p.
artikel
60 HAMS: Scalable peer-to-peer multimedia streaming model in heterogeneous networks Itaya, Satoshi
2006
7 p. 1211-1225
15 p.
artikel
61 Hashing and canonicalizing Notation 3 graphs Fisteus, Jesus Arias
2010
7 p. 663-685
23 p.
artikel
62 Improved algorithms for feedback vertex set problems Chen, Jianer
2008
7 p. 1188-1198
11 p.
artikel
63 Improved conditions for bounded tardiness under EPDF Pfair multiprocessor scheduling Devi, UmaMaheswari C.
2009
7 p. 388-420
33 p.
artikel
64 Integer valued betting strategies and Turing degrees Barmpalias, George
2015
7 p. 1387-1412
26 p.
artikel
65 Interval-valued fuzzy permutation method and experimental analysis on cardinal and ordinal evaluations Chen, Ting-Yu
2009
7 p. 371-387
17 p.
artikel
66 Isomorphism and canonization of tournaments and hypertournaments Arvind, V.
2010
7 p. 509-523
15 p.
artikel
67 Languages not recognizable in real time by one-dimensional cellular automata Nakamura, Katsuhiko
2008
7 p. 1095-1102
8 p.
artikel
68 Leader election in ad hoc radio networks: A keen ear helps Kowalski, Dariusz R.
2013
7 p. 1164-1180
17 p.
artikel
69 Linking theorems for tree transducers Fülöp, Zoltán
2016
7 p. 1201-1222
22 p.
artikel
70 Lower bounds for the transition complexity of NFAs Domaratzki, Michael
2008
7 p. 1116-1130
15 p.
artikel
71 Maximum number of fixed points in AND–OR–NOT networks Aracena, J.
2014
7 p. 1175-1190
16 p.
artikel
72 MIX is a 2-MCFL and the word problem in Z 2 is captured by the IO and the OI hierarchies Salvati, Sylvain
2015
7 p. 1252-1277
26 p.
artikel
73 Model checking quantum Markov chains Feng, Yuan
2013
7 p. 1181-1198
18 p.
artikel
74 Monoidal functional dependencies Vychodil, Vilem
2015
7 p. 1357-1372
16 p.
artikel
75 Multi-dimensional criteria for testing web services transactions Casado, Rubén
2013
7 p. 1057-1076
20 p.
artikel
76 Multidimensional range queries on hierarchical Voronoi overlays Ferrucci, L.
2016
7 p. 1161-1179
19 p.
artikel
77 Nash equilibria in discrete routing games with convex latency functions Gairing, Martin
2008
7 p. 1199-1225
27 p.
artikel
78 New techniques and tighter bounds for local computation algorithms Reingold, Omer
2016
7 p. 1180-1200
21 p.
artikel
79 Normality in non-integer bases and polynomial time randomness Almarza, Javier Ignacio
2015
7 p. 1059-1087
29 p.
artikel
80 On hybrid models of quantum finite automata Li, Lvzhou
2015
7 p. 1144-1158
15 p.
artikel
81 On multi-processor speed scaling with migration Albers, Susanne
2015
7 p. 1194-1209
16 p.
artikel
82 On the complexity of the spaced seeds Ma, Bin
2007
7 p. 1024-1034
11 p.
artikel
83 On the minmax regret path median problem on trees Ye, Jhih-Hong
2015
7 p. 1159-1170
12 p.
artikel
84 Optimal spaced seeds for faster approximate string matching Farach-Colton, Martin
2007
7 p. 1035-1044
10 p.
artikel
85 Papers to appear in forthcoming issues 2006
7 p. 1249-
1 p.
artikel
86 Parameterized complexity of firefighting Bazgan, Cristina
2014
7 p. 1285-1297
13 p.
artikel
87 Perfect correspondences between dot-depth and polynomial-time hierarchies Glaßer, Christian
2014
7 p. 1359-1373
15 p.
artikel
88 Performance evaluation for self-healing distributed services and fault detection mechanisms Grishikashvili Pereira, E.
2006
7 p. 1172-1182
11 p.
artikel
89 Performance evaluation of an intelligent CAC and routing framework for multimedia applications in broadband networks Ikeda, Makoto
2006
7 p. 1183-1200
18 p.
artikel
90 Performance modelling and evaluation of computer systems Awan, Irfan
2006
7 p. 1119-1120
2 p.
artikel
91 Positive Dedalus programs tolerate non-causality Ameloot, Tom J.
2014
7 p. 1191-1213
23 p.
artikel
92 Precedence constrained scheduling in ( 2 − 7 3 p + 1 ) ⋅ optimal Gangal, Devdatta
2008
7 p. 1139-1146
8 p.
artikel
93 Prediction of short-lived TCP transfer latency on bandwidth asymmetric links Tan, Guang
2006
7 p. 1201-1210
10 p.
artikel
94 Prefix–suffix duplication García López, Jesús
2014
7 p. 1254-1265
12 p.
artikel
95 Range LCP Amir, Amihood
2014
7 p. 1245-1253
9 p.
artikel
96 Real object-oriented communication method for ad hoc networks Koyama, Akio
2013
7 p. 1101-1112
12 p.
artikel
97 Regular expressions for data words Libkin, Leonid
2015
7 p. 1278-1297
20 p.
artikel
98 Revisiting the complexity of and/or graph solution Souza, Uéverton dos Santos
2013
7 p. 1156-1163
8 p.
artikel
99 Searching for better fill-in Fomin, Fedor V.
2014
7 p. 1374-1383
10 p.
artikel
100 Simplified proof of the blocking theorem for free-choice Petri nets Wehler, Joachim
2010
7 p. 532-537
6 p.
artikel
101 Special issue on computational molecular biology Karp, Richard
2007
7 p. 1023-
1 p.
artikel
102 Special issue on intelligent and innovative information systems Enokido, Tomoya
2013
7 p. 1003-1004
2 p.
artikel
103 Stepwise refinement of sequence diagrams with soft real-time constraints Refsdal, Atle
2015
7 p. 1221-1251
31 p.
artikel
104 Structure identification of Boolean relations and plain bases for co-clones Creignou, Nadia
2008
7 p. 1103-1115
13 p.
artikel
105 Synchronous context-free grammars and optimal linear parsing strategies Crescenzi, Pierluigi
2015
7 p. 1333-1356
24 p.
artikel
106 Synthesis of succinct systems Fearnley, John
2015
7 p. 1171-1193
23 p.
artikel
107 Systematic performance modeling and characterization of heterogeneous IP networks Botta, Alessio
2006
7 p. 1134-1143
10 p.
artikel
108 The complexity of unions of disjoint sets Glaßer, Christian
2008
7 p. 1173-1187
15 p.
artikel
109 The equivalence problem of multidimensional multitape automata Grigorian, Haik
2008
7 p. 1131-1138
8 p.
artikel
110 The identification of positive clones in a general inhibitor model Hwang, F.K.
2007
7 p. 1090-1094
5 p.
artikel
111 The most probable annotation problem in HMMs and its application to bioinformatics Brejová, Broňa
2007
7 p. 1060-1077
18 p.
artikel
112 Thresholding random geometric graph properties motivated by ad hoc sensor networks Muthukrishnan, S.
2010
7 p. 686-696
11 p.
artikel
113 Tight bounds for parameterized complexity of Cluster Editing with a small number of clusters Fomin, Fedor V.
2014
7 p. 1430-1447
18 p.
artikel
114 Trajectory databases: Data models, uncertainty and complete query languages Kuijpers, Bart
2010
7 p. 538-560
23 p.
artikel
115 Two algorithms for LCS Consecutive Suffix Alignment Landau, Gad M.
2007
7 p. 1095-1117
23 p.
artikel
116 Two-factor mutual authentication based on smart cards and passwords Yang, Guomin
2008
7 p. 1160-1172
13 p.
artikel
117 Variable and value elimination in binary constraint satisfaction via forbidden patterns Cohen, David A.
2015
7 p. 1127-1143
17 p.
artikel
118 Verifying of interface assertions for infinite state Mealy machines Broy, Manfred
2014
7 p. 1298-1322
25 p.
artikel
                             118 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland