nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A novel disparity transformation algorithm for road segmentation
|
Fan, Rui |
|
|
140 |
C |
p. 18-24 |
artikel |
2 |
Bitcoin private key locked transactions
|
Delgado-Segura, Sergi |
|
|
140 |
C |
p. 37-41 |
artikel |
3 |
Comments on “A secure anti-collusion data sharing scheme for dynamic groups in the cloud”
|
Wang, Qiang |
|
|
140 |
C |
p. 34-36 |
artikel |
4 |
Editorial Board
|
|
|
|
140 |
C |
p. ii |
artikel |
5 |
Improved approximation algorithms for k-connected m-dominating set problems
|
Nutov, Zeev |
|
|
140 |
C |
p. 30-33 |
artikel |
6 |
Long directed (s,t)-path: FPT algorithm
|
Fomin, Fedor V. |
|
|
140 |
C |
p. 8-12 |
artikel |
7 |
On deterministic weighted automata
|
Kostolányi, Peter |
|
|
140 |
C |
p. 42-47 |
artikel |
8 |
Polynomial-time algorithm for weighted efficient domination problem on diameter three planar graphs
|
Abrishami, G. |
|
|
140 |
C |
p. 25-29 |
artikel |
9 |
Reaching a target in the plane with no information
|
Pelc, Andrzej |
|
|
140 |
C |
p. 13-17 |
artikel |
10 |
Short proofs for some symmetric Quantified Boolean Formulas
|
Kauers, Manuel |
|
|
140 |
C |
p. 4-7 |
artikel |
11 |
The existence of perfect codes in a family of generalized Fibonacci cubes
|
Mollard, Michel |
|
|
140 |
C |
p. 1-3 |
artikel |