no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A survey of state vectors
|
Maurer, Ward Douglas |
|
2008 |
13-14 |
1 |
p. 1-28 28 p. |
article |
2 |
A survey of the algorithmic aspects of modular decomposition
|
Habib, Michel |
|
2010 |
13-14 |
1 |
p. 41-59 19 p. |
article |
3 |
A survey on relay placement with runtime and approximation guarantees
|
Degener, Bastian |
|
2011 |
13-14 |
1 |
p. 57-68 12 p. |
article |
4 |
A survey on the structure of approximation classes
|
Escoffier, Bruno |
|
2010 |
13-14 |
1 |
p. 19-40 22 p. |
article |
5 |
Book review
|
Koucký, Michal |
|
2010 |
13-14 |
1 |
p. 61-63 3 p. |
article |
6 |
Combinatorial and computational aspects of graph packing and graph decomposition
|
Yuster, Raphael |
|
2007 |
13-14 |
1 |
p. 12-26 15 p. |
article |
7 |
Computational challenges in systems biology
|
Heath, Allison P. |
|
2009 |
13-14 |
1 |
p. 1-17 17 p. |
article |
8 |
Computational models for networks of tiny artifacts: A survey
|
Àlvarez, Carme |
|
2011 |
13-14 |
1 |
p. 7-25 19 p. |
article |
9 |
Distributed algorithm engineering for networks of tiny artifacts
|
Baumgartner, Tobias |
|
2011 |
13-14 |
1 |
p. 85-102 18 p. |
article |
10 |
Foundational research on networks of tiny artefacts
|
Hogenhout, Wide |
|
2011 |
13-14 |
1 |
p. 2-3 2 p. |
article |
11 |
Graph clustering
|
Schaeffer, Satu Elisa |
|
2007 |
13-14 |
1 |
p. 27-64 38 p. |
article |
12 |
Innovative approaches for security of small artefacts
|
Blundo, Carlo |
|
2011 |
13-14 |
1 |
p. 47-55 9 p. |
article |
13 |
Introduction
|
Díaz, J. |
|
2007 |
13-14 |
1 |
p. 1- 1 p. |
article |
14 |
Introduction
|
Díaz, J. |
|
2011 |
13-14 |
1 |
p. 1- 1 p. |
article |
15 |
Introduction to the special issue on foundations of adaptive networked societies of tiny artefacts
|
Chatzigiannakis, Ioannis |
|
2011 |
13-14 |
1 |
p. 4-6 3 p. |
article |
16 |
Multi-criterion Pareto based particle swarm optimized polynomial neural network for classification: A review and state-of-the-art
|
Dehuri, S. |
|
2009 |
13-14 |
1 |
p. 19-40 22 p. |
article |
17 |
[No title]
|
Spirakis, Paul G. |
|
2009 |
13-14 |
1 |
p. 41-46 6 p. |
article |
18 |
[No title]
|
Petit, Jordi |
|
2009 |
13-14 |
1 |
p. 47-51 5 p. |
article |
19 |
[No title]
|
Hirvensalo, Mika |
|
2007 |
13-14 |
1 |
p. 73-76 4 p. |
article |
20 |
[No title]
|
Atserias, Albert |
|
2008 |
13-14 |
1 |
p. 55-59 5 p. |
article |
21 |
Reminiscences related to graph theory
|
Fiedler, Miroslav |
|
2007 |
13-14 |
1 |
p. 65-66 2 p. |
article |
22 |
Review of “Introduction to clustering large and high-dimensional data” by J. Kogan
|
Mitsche, Dieter |
|
2008 |
13-14 |
1 |
p. 60-62 3 p. |
article |
23 |
Robust and scalable middleware for selfish-computer systems
|
Dolev, Shlomi |
|
2011 |
13-14 |
1 |
p. 69-84 16 p. |
article |
24 |
Sampling-based robot motion planning: Towards realistic applications
|
Tsianos, Konstantinos I. |
|
2007 |
13-14 |
1 |
p. 2-11 10 p. |
article |
25 |
Streaming techniques and data aggregation in networks of tiny artefacts
|
Becchetti, Luca |
|
2011 |
13-14 |
1 |
p. 27-46 20 p. |
article |
26 |
Subexponential parameterized algorithms
|
Dorn, Frederic |
|
2008 |
13-14 |
1 |
p. 29-39 11 p. |
article |
27 |
Subspace methods for face recognition
|
Ashok Rao, |
|
2010 |
13-14 |
1 |
p. 1-17 17 p. |
article |
28 |
Textual data compression in computational biology: Algorithmic techniques
|
Giancarlo, R. |
|
2012 |
13-14 |
1 |
p. 1-25 25 p. |
article |
29 |
The consequences of eliminating NP solutions
|
Faliszewski, Piotr |
|
2008 |
13-14 |
1 |
p. 40-54 15 p. |
article |
30 |
Understanding motion planning better: A comparative review of “Principles of Robot Motion: Theory, Algorithms, and Implementations”, by H. Choset et al.
|
Jiménez, Pablo |
|
2007 |
13-14 |
1 |
p. 67-72 6 p. |
article |
31 |
Urban pervasive applications: Challenges, scenarios and case studies
|
Chatzigiannakis, Ioannis |
|
2011 |
13-14 |
1 |
p. 103-118 16 p. |
article |
32 |
Which security policies are enforceable by runtime monitors? A survey
|
Khoury, Raphaël |
|
2012 |
13-14 |
1 |
p. 27-45 19 p. |
article |