nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Analyzing Residual Random Greedy for monotone submodular maximization
|
Bérczi, Kristóf |
|
|
180 |
C |
p. |
artikel |
2 |
Approximation algorithms for a virtual machine allocation problem with finite types
|
Guo, Lifeng |
|
|
180 |
C |
p. |
artikel |
3 |
Bicriteria scheduling on an unbounded parallel-batch machine for minimizing makespan and maximum cost
|
Li, Shuguang |
|
|
180 |
C |
p. |
artikel |
4 |
Cyclic generators and an improved linear kernel for the rooted subtree prune and regraft distance
|
Kelk, Steven |
|
|
180 |
C |
p. |
artikel |
5 |
Deciding origin equivalence of weakly self-nesting macro tree transducers
|
Maneth, Sebastian |
|
|
180 |
C |
p. |
artikel |
6 |
Editorial Board
|
|
|
|
180 |
C |
p. |
artikel |
7 |
Embedded edge connectivity of k-ary n-cubes
|
Yang, Yuxing |
|
|
180 |
C |
p. |
artikel |
8 |
Faster deterministic algorithm for Co-Path Set
|
Tsur, Dekel |
|
|
180 |
C |
p. |
artikel |
9 |
On the parameterized complexity of the Maximum Exposure Problem
|
Raman, Remi |
|
|
180 |
C |
p. |
artikel |
10 |
Order-preserving pattern matching with scaling
|
Kim, Youngho |
|
|
180 |
C |
p. |
artikel |
11 |
Packing batches of cubes into a single bin
|
Januszewski, Janusz |
|
|
180 |
C |
p. |
artikel |
12 |
Public-key encryption scheme with optimal continuous leakage resilience
|
Zhou, Yanwei |
|
|
180 |
C |
p. |
artikel |
13 |
Quantitative controller synthesis for consumption Markov decision processes
|
Fu, Jianling |
|
|
180 |
C |
p. |
artikel |
14 |
The loss of serving in the dark
|
Azar, Yossi |
|
|
180 |
C |
p. |
artikel |
15 |
Thou shalt covet the average of thy neighbors' cakes
|
Tucker-Foltz, Jamie |
|
|
180 |
C |
p. |
artikel |
16 |
Weakest preconditioned goto axiom
|
Chen, Wei |
|
|
180 |
C |
p. |
artikel |