nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A 1.75-approximation algorithm for unsigned translocation distance
|
Cui, Yun |
|
2007 |
|
7 |
p. 1045-1059 15 p. |
artikel |
2 |
A complete parameterized complexity analysis of bounded planning
|
Bäckström, Christer |
|
2015 |
|
7 |
p. 1311-1332 22 p. |
artikel |
3 |
Advanced orthogonal RAID based on virtual disks
|
Uehara, Minoru |
|
2013 |
|
7 |
p. 1077-1085 9 p. |
artikel |
4 |
A kernelization algorithm for d-Hitting Set
|
Abu-Khzam, Faisal N. |
|
2010 |
|
7 |
p. 524-531 8 p. |
artikel |
5 |
Algorithm for finding k-vertex out-trees and its application to k-internal out-branching problem
|
Cohen, Nathann |
|
2010 |
|
7 |
p. 650-662 13 p. |
artikel |
6 |
Algorithms and estimators for summarization of unaggregated data streams
|
Cohen, Edith |
|
2014 |
|
7 |
p. 1214-1244 31 p. |
artikel |
7 |
A linear kernel for the complementary maximal strip recovery problem
|
Jiang, Haitao |
|
2014 |
|
7 |
p. 1350-1358 9 p. |
artikel |
8 |
A method based on induced aggregation operators and distance measures to multiple attribute decision making under 2-tuple linguistic environment
|
Li, Chunguang |
|
2014 |
|
7 |
p. 1339-1349 11 p. |
artikel |
9 |
A methodology to develop awareness in computer supported collaborative work using policies
|
Talaei-Khoei, Amir |
|
2014 |
|
7 |
p. 1323-1338 16 p. |
artikel |
10 |
An analytical model for loss estimation in network traffic analysis systems
|
Ferro, Armando |
|
2006 |
|
7 |
p. 1121-1133 13 p. |
artikel |
11 |
An effective recommender system by unifying user and item trust information for B2B applications
|
Shambour, Qusai |
|
2015 |
|
7 |
p. 1110-1126 17 p. |
artikel |
12 |
An effective signal strength-based wireless location estimation system for tracking indoor mobile users
|
Ng, Joseph Kee-Yin |
|
2013 |
|
7 |
p. 1005-1016 12 p. |
artikel |
13 |
An innovative approach for automatically grading spelling in essays using rubric-based scoring
|
Fazal, Anhar |
|
2013 |
|
7 |
p. 1040-1056 17 p. |
artikel |
14 |
A novel design of 8-bit adder/subtractor by quantum-dot cellular automata
|
Kianpour, Moein |
|
2014 |
|
7 |
p. 1404-1414 11 p. |
artikel |
15 |
A taxonomy for nearest neighbour queries in spatial databases
|
Taniar, David |
|
2013 |
|
7 |
p. 1017-1039 23 p. |
artikel |
16 |
A tentative commit protocol for composite web services
|
Younas, Muhammad |
|
2006 |
|
7 |
p. 1226-1237 12 p. |
artikel |
17 |
Better spaced seeds using Quadratic Residues
|
Egidi, Lavinia |
|
2013 |
|
7 |
p. 1144-1155 12 p. |
artikel |
18 |
Beyond Max-Cut: λ-extendible properties parameterized above the Poljak–Turzík bound
|
Mnich, Matthias |
|
2014 |
|
7 |
p. 1384-1403 20 p. |
artikel |
19 |
Bounded Budget Connection (BBC) games or how to make friends and influence people, on a budget
|
Laoutaris, Nikolaos |
|
2014 |
|
7 |
p. 1266-1284 19 p. |
artikel |
20 |
Bounded-width QBF is PSPACE-complete
|
Atserias, Albert |
|
2014 |
|
7 |
p. 1415-1429 15 p. |
artikel |
21 |
Causal graphs and structurally restricted planning
|
Chen, Hubie |
|
2010 |
|
7 |
p. 579-592 14 p. |
artikel |
22 |
Clustering overhead and convergence time analysis of the mobility-based multi-hop clustering algorithm for mobile ad hoc networks
|
Er, Inn Inn |
|
2006 |
|
7 |
p. 1144-1155 12 p. |
artikel |
23 |
Combining decomposition and reduction for state space analysis of a self-stabilizing system
|
Müllner, Nils |
|
2013 |
|
7 |
p. 1113-1125 13 p. |
artikel |
24 |
Comparing trees via crossing minimization
|
Fernau, Henning |
|
2010 |
|
7 |
p. 593-608 16 p. |
artikel |
25 |
Consistency checking and querying in probabilistic databases under integrity constraints
|
Flesca, Sergio |
|
2014 |
|
7 |
p. 1448-1489 42 p. |
artikel |
26 |
Contents
|
|
|
2010 |
|
7 |
p. OBC- 1 p. |
artikel |
27 |
Contents
|
|
|
2009 |
|
7 |
p. OBC- 1 p. |
artikel |
28 |
Contents
|
|
|
2014 |
|
7 |
p. OBC- 1 p. |
artikel |
29 |
Contents
|
|
|
2006 |
|
7 |
p. CO4- 1 p. |
artikel |
30 |
Contents
|
|
|
2008 |
|
7 |
p. OBC- 1 p. |
artikel |
31 |
Contents
|
|
|
2007 |
|
7 |
p. OBC- 1 p. |
artikel |
32 |
Contents
|
|
|
2016 |
|
7 |
p. OBC- 1 p. |
artikel |
33 |
Contents
|
|
|
2015 |
|
7 |
p. OBC- 1 p. |
artikel |
34 |
Contents
|
|
|
2013 |
|
7 |
p. OBC- 1 p. |
artikel |
35 |
Contents
|
|
|
2013 |
|
7 |
p. IBC- 1 p. |
artikel |
36 |
Control of queueing delay in a buffer with time-varying arrival rate
|
Guan, L. |
|
2006 |
|
7 |
p. 1238-1248 11 p. |
artikel |
37 |
Corrigendum to “Another approach to the equivalence of measure-many one-way quantum infinite automata and its application” [J. Comput. Syst. Sci. 78 (3) (2012) 807–821]
|
Lin, Tianrong |
|
2015 |
|
7 |
p. 1413- 1 p. |
artikel |
38 |
Counting complexity of propositional abduction
|
Hermann, Miki |
|
2010 |
|
7 |
p. 634-649 16 p. |
artikel |
39 |
Cubic patterns with permutations
|
Manea, Florin |
|
2015 |
|
7 |
p. 1298-1310 13 p. |
artikel |
40 |
Determining model accuracy of network traces
|
Konrad, Almudena |
|
2006 |
|
7 |
p. 1156-1171 16 p. |
artikel |
41 |
Distributed agreement in dynamic peer-to-peer networks
|
Augustine, John |
|
2015 |
|
7 |
p. 1088-1109 22 p. |
artikel |
42 |
Editorial Board
|
|
|
2010 |
|
7 |
p. IFC- 1 p. |
artikel |
43 |
Editorial Board
|
|
|
2009 |
|
7 |
p. IFC- 1 p. |
artikel |
44 |
Editorial Board
|
|
|
2014 |
|
7 |
p. IFC- 1 p. |
artikel |
45 |
Editorial Board
|
|
|
2006 |
|
7 |
p. CO2- 1 p. |
artikel |
46 |
Editorial Board
|
|
|
2008 |
|
7 |
p. IFC- 1 p. |
artikel |
47 |
Editorial Board
|
|
|
2007 |
|
7 |
p. IFC- 1 p. |
artikel |
48 |
Editorial Board
|
|
|
2016 |
|
7 |
p. IFC- 1 p. |
artikel |
49 |
Editorial Board
|
|
|
2015 |
|
7 |
p. IFC- 1 p. |
artikel |
50 |
Editorial Board
|
|
|
2013 |
|
7 |
p. IFC- 1 p. |
artikel |
51 |
Efficient approximation of convex recolorings
|
Moran, Shlomo |
|
2007 |
|
7 |
p. 1078-1089 12 p. |
artikel |
52 |
Erratum to “Languages not recognizable in real time by one-dimensional cellular automata” [J. Comput. System Sci. 74 (7) (2008) 1095–1102]
|
Nakamura, Katsuhiko |
|
2009 |
|
7 |
p. 421- 1 p. |
artikel |
53 |
Evaluation of struggle strategy in Genetic Algorithms for ground stations scheduling problem
|
Xhafa, Fatos |
|
2013 |
|
7 |
p. 1086-1100 15 p. |
artikel |
54 |
Fault tolerance in cellular automata at low fault rates
|
McCann, Mark |
|
2013 |
|
7 |
p. 1126-1143 18 p. |
artikel |
55 |
Fuzzy relation equations and reduction of fuzzy automata
|
Ćirić, Miroslav |
|
2010 |
|
7 |
p. 609-633 25 p. |
artikel |
56 |
Generalized modal satisfiability
|
Hemaspaandra, Edith |
|
2010 |
|
7 |
p. 561-578 18 p. |
artikel |
57 |
Generalized Wong sequences and their applications to Edmonds' problems
|
Ivanyos, Gábor |
|
2015 |
|
7 |
p. 1373-1386 14 p. |
artikel |
58 |
Generating all maximal induced subgraphs for hereditary and connected-hereditary graph properties
|
Cohen, Sara |
|
2008 |
|
7 |
p. 1147-1159 13 p. |
artikel |
59 |
Geodesic stability for memoryless binary long-lived consensus
|
Fernandes, Cristina G. |
|
2015 |
|
7 |
p. 1210-1220 11 p. |
artikel |
60 |
HAMS: Scalable peer-to-peer multimedia streaming model in heterogeneous networks
|
Itaya, Satoshi |
|
2006 |
|
7 |
p. 1211-1225 15 p. |
artikel |
61 |
Hashing and canonicalizing Notation 3 graphs
|
Fisteus, Jesus Arias |
|
2010 |
|
7 |
p. 663-685 23 p. |
artikel |
62 |
Improved algorithms for feedback vertex set problems
|
Chen, Jianer |
|
2008 |
|
7 |
p. 1188-1198 11 p. |
artikel |
63 |
Improved conditions for bounded tardiness under EPDF Pfair multiprocessor scheduling
|
Devi, UmaMaheswari C. |
|
2009 |
|
7 |
p. 388-420 33 p. |
artikel |
64 |
Integer valued betting strategies and Turing degrees
|
Barmpalias, George |
|
2015 |
|
7 |
p. 1387-1412 26 p. |
artikel |
65 |
Interval-valued fuzzy permutation method and experimental analysis on cardinal and ordinal evaluations
|
Chen, Ting-Yu |
|
2009 |
|
7 |
p. 371-387 17 p. |
artikel |
66 |
Isomorphism and canonization of tournaments and hypertournaments
|
Arvind, V. |
|
2010 |
|
7 |
p. 509-523 15 p. |
artikel |
67 |
Languages not recognizable in real time by one-dimensional cellular automata
|
Nakamura, Katsuhiko |
|
2008 |
|
7 |
p. 1095-1102 8 p. |
artikel |
68 |
Leader election in ad hoc radio networks: A keen ear helps
|
Kowalski, Dariusz R. |
|
2013 |
|
7 |
p. 1164-1180 17 p. |
artikel |
69 |
Linking theorems for tree transducers
|
Fülöp, Zoltán |
|
2016 |
|
7 |
p. 1201-1222 22 p. |
artikel |
70 |
Lower bounds for the transition complexity of NFAs
|
Domaratzki, Michael |
|
2008 |
|
7 |
p. 1116-1130 15 p. |
artikel |
71 |
Maximum number of fixed points in AND–OR–NOT networks
|
Aracena, J. |
|
2014 |
|
7 |
p. 1175-1190 16 p. |
artikel |
72 |
MIX is a 2-MCFL and the word problem in Z 2 is captured by the IO and the OI hierarchies
|
Salvati, Sylvain |
|
2015 |
|
7 |
p. 1252-1277 26 p. |
artikel |
73 |
Model checking quantum Markov chains
|
Feng, Yuan |
|
2013 |
|
7 |
p. 1181-1198 18 p. |
artikel |
74 |
Monoidal functional dependencies
|
Vychodil, Vilem |
|
2015 |
|
7 |
p. 1357-1372 16 p. |
artikel |
75 |
Multi-dimensional criteria for testing web services transactions
|
Casado, Rubén |
|
2013 |
|
7 |
p. 1057-1076 20 p. |
artikel |
76 |
Multidimensional range queries on hierarchical Voronoi overlays
|
Ferrucci, L. |
|
2016 |
|
7 |
p. 1161-1179 19 p. |
artikel |
77 |
Nash equilibria in discrete routing games with convex latency functions
|
Gairing, Martin |
|
2008 |
|
7 |
p. 1199-1225 27 p. |
artikel |
78 |
New techniques and tighter bounds for local computation algorithms
|
Reingold, Omer |
|
2016 |
|
7 |
p. 1180-1200 21 p. |
artikel |
79 |
Normality in non-integer bases and polynomial time randomness
|
Almarza, Javier Ignacio |
|
2015 |
|
7 |
p. 1059-1087 29 p. |
artikel |
80 |
On hybrid models of quantum finite automata
|
Li, Lvzhou |
|
2015 |
|
7 |
p. 1144-1158 15 p. |
artikel |
81 |
On multi-processor speed scaling with migration
|
Albers, Susanne |
|
2015 |
|
7 |
p. 1194-1209 16 p. |
artikel |
82 |
On the complexity of the spaced seeds
|
Ma, Bin |
|
2007 |
|
7 |
p. 1024-1034 11 p. |
artikel |
83 |
On the minmax regret path median problem on trees
|
Ye, Jhih-Hong |
|
2015 |
|
7 |
p. 1159-1170 12 p. |
artikel |
84 |
Optimal spaced seeds for faster approximate string matching
|
Farach-Colton, Martin |
|
2007 |
|
7 |
p. 1035-1044 10 p. |
artikel |
85 |
Papers to appear in forthcoming issues
|
|
|
2006 |
|
7 |
p. 1249- 1 p. |
artikel |
86 |
Parameterized complexity of firefighting
|
Bazgan, Cristina |
|
2014 |
|
7 |
p. 1285-1297 13 p. |
artikel |
87 |
Perfect correspondences between dot-depth and polynomial-time hierarchies
|
Glaßer, Christian |
|
2014 |
|
7 |
p. 1359-1373 15 p. |
artikel |
88 |
Performance evaluation for self-healing distributed services and fault detection mechanisms
|
Grishikashvili Pereira, E. |
|
2006 |
|
7 |
p. 1172-1182 11 p. |
artikel |
89 |
Performance evaluation of an intelligent CAC and routing framework for multimedia applications in broadband networks
|
Ikeda, Makoto |
|
2006 |
|
7 |
p. 1183-1200 18 p. |
artikel |
90 |
Performance modelling and evaluation of computer systems
|
Awan, Irfan |
|
2006 |
|
7 |
p. 1119-1120 2 p. |
artikel |
91 |
Positive Dedalus programs tolerate non-causality
|
Ameloot, Tom J. |
|
2014 |
|
7 |
p. 1191-1213 23 p. |
artikel |
92 |
Precedence constrained scheduling in ( 2 − 7 3 p + 1 ) ⋅ optimal
|
Gangal, Devdatta |
|
2008 |
|
7 |
p. 1139-1146 8 p. |
artikel |
93 |
Prediction of short-lived TCP transfer latency on bandwidth asymmetric links
|
Tan, Guang |
|
2006 |
|
7 |
p. 1201-1210 10 p. |
artikel |
94 |
Prefix–suffix duplication
|
García López, Jesús |
|
2014 |
|
7 |
p. 1254-1265 12 p. |
artikel |
95 |
Range LCP
|
Amir, Amihood |
|
2014 |
|
7 |
p. 1245-1253 9 p. |
artikel |
96 |
Real object-oriented communication method for ad hoc networks
|
Koyama, Akio |
|
2013 |
|
7 |
p. 1101-1112 12 p. |
artikel |
97 |
Regular expressions for data words
|
Libkin, Leonid |
|
2015 |
|
7 |
p. 1278-1297 20 p. |
artikel |
98 |
Revisiting the complexity of and/or graph solution
|
Souza, Uéverton dos Santos |
|
2013 |
|
7 |
p. 1156-1163 8 p. |
artikel |
99 |
Searching for better fill-in
|
Fomin, Fedor V. |
|
2014 |
|
7 |
p. 1374-1383 10 p. |
artikel |
100 |
Simplified proof of the blocking theorem for free-choice Petri nets
|
Wehler, Joachim |
|
2010 |
|
7 |
p. 532-537 6 p. |
artikel |
101 |
Special issue on computational molecular biology
|
Karp, Richard |
|
2007 |
|
7 |
p. 1023- 1 p. |
artikel |
102 |
Special issue on intelligent and innovative information systems
|
Enokido, Tomoya |
|
2013 |
|
7 |
p. 1003-1004 2 p. |
artikel |
103 |
Stepwise refinement of sequence diagrams with soft real-time constraints
|
Refsdal, Atle |
|
2015 |
|
7 |
p. 1221-1251 31 p. |
artikel |
104 |
Structure identification of Boolean relations and plain bases for co-clones
|
Creignou, Nadia |
|
2008 |
|
7 |
p. 1103-1115 13 p. |
artikel |
105 |
Synchronous context-free grammars and optimal linear parsing strategies
|
Crescenzi, Pierluigi |
|
2015 |
|
7 |
p. 1333-1356 24 p. |
artikel |
106 |
Synthesis of succinct systems
|
Fearnley, John |
|
2015 |
|
7 |
p. 1171-1193 23 p. |
artikel |
107 |
Systematic performance modeling and characterization of heterogeneous IP networks
|
Botta, Alessio |
|
2006 |
|
7 |
p. 1134-1143 10 p. |
artikel |
108 |
The complexity of unions of disjoint sets
|
Glaßer, Christian |
|
2008 |
|
7 |
p. 1173-1187 15 p. |
artikel |
109 |
The equivalence problem of multidimensional multitape automata
|
Grigorian, Haik |
|
2008 |
|
7 |
p. 1131-1138 8 p. |
artikel |
110 |
The identification of positive clones in a general inhibitor model
|
Hwang, F.K. |
|
2007 |
|
7 |
p. 1090-1094 5 p. |
artikel |
111 |
The most probable annotation problem in HMMs and its application to bioinformatics
|
Brejová, Broňa |
|
2007 |
|
7 |
p. 1060-1077 18 p. |
artikel |
112 |
Thresholding random geometric graph properties motivated by ad hoc sensor networks
|
Muthukrishnan, S. |
|
2010 |
|
7 |
p. 686-696 11 p. |
artikel |
113 |
Tight bounds for parameterized complexity of Cluster Editing with a small number of clusters
|
Fomin, Fedor V. |
|
2014 |
|
7 |
p. 1430-1447 18 p. |
artikel |
114 |
Trajectory databases: Data models, uncertainty and complete query languages
|
Kuijpers, Bart |
|
2010 |
|
7 |
p. 538-560 23 p. |
artikel |
115 |
Two algorithms for LCS Consecutive Suffix Alignment
|
Landau, Gad M. |
|
2007 |
|
7 |
p. 1095-1117 23 p. |
artikel |
116 |
Two-factor mutual authentication based on smart cards and passwords
|
Yang, Guomin |
|
2008 |
|
7 |
p. 1160-1172 13 p. |
artikel |
117 |
Variable and value elimination in binary constraint satisfaction via forbidden patterns
|
Cohen, David A. |
|
2015 |
|
7 |
p. 1127-1143 17 p. |
artikel |
118 |
Verifying of interface assertions for infinite state Mealy machines
|
Broy, Manfred |
|
2014 |
|
7 |
p. 1298-1322 25 p. |
artikel |