Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             56 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A better list heuristic for vertex cover Delbot, François
2008
3-4 p. 125-127
3 p.
artikel
2 A conservative scheme for parallel interval narrowing Granvilliers, Laurent
2000
3-4 p. 141-146
6 p.
artikel
3 A fast cost scaling algorithm for submodular flow Iwata, Satoru
2000
3-4 p. 123-128
6 p.
artikel
4 A fast modular multiplication algorithm for calculating the product AB modulo N Chen, Chien-Yuan
1999
3-4 p. 77-81
5 p.
artikel
5 A general method to speed up fixed-parameter-tractable algorithms Niedermeier, Rolf
2000
3-4 p. 125-129
5 p.
artikel
6 A matched approximation bound for the sum of a greedy coloring Bar-Noy, Amotz
1999
3-4 p. 135-140
6 p.
artikel
7 Amplification of slight probabilistic advantage at absolutely no cost in space Macarie, Ioan I.
1999
3-4 p. 113-118
6 p.
artikel
8 A necessary condition for Constructive Negation in Constraint Logic Programming Dovier, Agostino
2000
3-4 p. 147-156
10 p.
artikel
9 An efficient method to generate feasible paths for basis path testing Yan, Jun
2008
3-4 p. 87-92
6 p.
artikel
10 An efficient upper bound of the rotation distance of binary trees Pallo, Jean
2000
3-4 p. 87-92
6 p.
artikel
11 An improved heuristic for “Ulam–Rényi game” Cicalese, Ferdinando
2000
3-4 p. 119-124
6 p.
artikel
12 An interesting way to partition a number Bhatt, P.C.P.
1999
3-4 p. 141-148
8 p.
artikel
13 An optimal layout of multigrid networks Calamoneri, Tiziana
1999
3-4 p. 137-141
5 p.
artikel
14 A note on cyclic-cubes Hwang, Shien-Ching
1999
3-4 p. 131-135
5 p.
artikel
15 An O(|V|2) algorithm for single connectedness Khuller, Samir
1999
3-4 p. 105-107
3 p.
artikel
16 A one-to-one correspondence between a class of leftist trees and binary trees Kemp, Rainer
1999
3-4 p. 97-105
9 p.
artikel
17 Approximating k-hop minimum spanning trees in Euclidean metrics Laue, Sören
2008
3-4 p. 96-101
6 p.
artikel
18 A PTAS for the Multiple Subset Sum Problem with different knapsack capacities Caprara, Alberto
2000
3-4 p. 111-118
8 p.
artikel
19 A relaxation of Havel's 3-color problem Montassier, Mickaël
2008
3-4 p. 107-109
3 p.
artikel
20 A simple bivalency proof that t-resilient consensus requires t+1 rounds Aguilera, Marcos Kawazoe
1999
3-4 p. 155-158
4 p.
artikel
21 Computing two penetration measures for curved 2D objects Sridharan, K.
1999
3-4 p. 143-148
6 p.
artikel
22 Conditional fault Hamiltonicity of the complete graph Fu, Jung-Sheng
2008
3-4 p. 110-113
4 p.
artikel
23 Confusion of memory Moss, Lawrence S.
2008
3-4 p. 114-119
6 p.
artikel
24 1 , 2 Conjecture—the multiplicative version Skowronek-Kaziów, Joanna
2008
3-4 p. 93-95
3 p.
artikel
25 Cryptanalysis of YCN key assignment scheme in a hierarchy Hwang, Min-Shiang
2000
3-4 p. 97-101
5 p.
artikel
26 Editorial Board 2008
3-4 p. IFC-
1 p.
artikel
27 Estimating the number of vertices of a polyhedron Avis, David
2000
3-4 p. 137-143
7 p.
artikel
28 Fast practical multi-pattern matching Crochemore, Maxime
1999
3-4 p. 107-113
7 p.
artikel
29 Fault-containing self-stabilization using priority scheduling Ghosh, Sukumar
2000
3-4 p. 145-151
7 p.
artikel
30 Finding and counting small induced subgraphs efficiently Kloks, Ton
2000
3-4 p. 115-121
7 p.
artikel
31 Generating all maximal models of a Boolean expression Kavvadias, Dimitris J.
2000
3-4 p. 157-162
6 p.
artikel
32 Hamming weights of correlation immune Boolean functions Maitra, Subhamoy
1999
3-4 p. 149-153
5 p.
artikel
33 Hierarchical broadcast and gossip networks Fertin, Guillaume
2000
3-4 p. 131-136
6 p.
artikel
34 Honeycomb tori are Hamiltonian Megson, G.M.
1999
3-4 p. 99-103
5 p.
artikel
35 How to prevent interaction of functional and inclusion dependencies Levene, Mark
1999
3-4 p. 115-125
11 p.
artikel
36 Minimum-perimeter enclosures Mitchell, Joseph S.B.
2008
3-4 p. 120-124
5 p.
artikel
37 On 3-choosability of planar graphs without certain cycles Zhang, Haihui
2008
3-4 p. 102-106
5 p.
artikel
38 On distribution properties of sequences with perfect linear complexity profile Schneider, Markus
2000
3-4 p. 175-182
8 p.
artikel
39 On finding medians of weighted discrete points Chung, Kuo-Liang
2000
3-4 p. 103-106
4 p.
artikel
40 On the computational structure of the connected components of a hard problem Matamala, Martin
1999
3-4 p. 83-90
8 p.
artikel
41 On the isomorphism of expressions Ramnath, Sarnath
2000
3-4 p. 97-102
6 p.
artikel
42 On the security of a convertible group signature scheme Saeednia, Shahrokh
2000
3-4 p. 93-96
4 p.
artikel
43 Patchworks and metablocks enumeration Ravelomanana, Vlady
2000
3-4 p. 77-86
10 p.
artikel
44 Path-based depth-first search for strong and biconnected components Gabow, Harold N.
2000
3-4 p. 107-114
8 p.
artikel
45 Random 2-SAT and unsatisfiability Verhoeven, Yann
1999
3-4 p. 119-123
5 p.
artikel
46 Recognizing cographs and threshold graphs through a classification of their edges Nikolopoulos, Stavros D.
2000
3-4 p. 129-139
11 p.
artikel
47 Restricted failure detectors: Definition and reduction protocols Raynal, Michel
1999
3-4 p. 91-97
7 p.
artikel
48 Statistical delay analysis on an ATM switch with self-similar input traffic Ng, Joseph Kee-Yin
2000
3-4 p. 163-173
11 p.
artikel
49 Task migration in 2D wormhole-routed mesh multicomputers Chen, Tzung-Shi
2000
3-4 p. 103-110
8 p.
artikel
50 The complexity of some complementation problems Plaisted, David A.
1999
3-4 p. 159-165
7 p.
artikel
51 The connection between two ways of reasoning about partial functions Fitzgerald, John S.
2008
3-4 p. 128-132
5 p.
artikel
52 The correct diameter of trivalent Cayley graphs Tsai, Chang-Hsiung
1999
3-4 p. 109-111
3 p.
artikel
53 The cost of graceful degradation for omission failures Jayanti, Prasad
1999
3-4 p. 167-172
6 p.
artikel
54 Tree precedence in scheduling: The strong–weak distinction Dror, M.
1999
3-4 p. 127-134
8 p.
artikel
55 Worst-case analysis of Weber's GCD algorithm Lavault, Christian
1999
3-4 p. 125-130
6 p.
artikel
56 Worst case examples for operations on OBDDs Wegener, Ingo
2000
3-4 p. 91-96
6 p.
artikel
                             56 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland