Reconstruction of cracks in an inhomogeneous anisotropic medium using point sources Fulltext Access 25 Pages 2005
Generalized triangulations and diagonal-free subsets of stack polyominoes Fulltext Access 26 Pages 2005
Polymorphic Systems with Arrays, 2-Counter Machines and Multiset Rewriting Fulltext Access 26 Pages 2005
View Transformation in Visual Environments applied to Algebraic High-Level Nets Fulltext Access 26 Pages 2005
A Formal Approach for the Evaluation of Network Security Mechanisms Based on RBAC Policies Fulltext Access 26 Pages 2005
Hardness results for the center and median string problems under the weighted and unweighted edit distances Fulltext Access 26 Pages 2005
Harmonic analysis of the space of SaÃSbÃSc-invariant vectors in the irreducible representations of the symmetric group Fulltext Access 26 Pages 2005
Recognition and computation of minimal triangulations for AT-free claw-free and co-comparability graphs Fulltext Access 26 Pages 2005
Testing from Structured Algebraic Specifications: The Veritas Case Study Fulltext Access 27 Pages 2005
Enumeration of solid 2-trees according to edge number and edge degree distribution Fulltext Access 27 Pages 2005
On the equations relating a three-dimensional object and its two-dimensional images Fulltext Access 27 Pages 2005
Interactive Computation: Stepping Stone in the Pathway From Classical to Developmental Computation Fulltext Access 27 Pages 2005
What Level of Mathematical Reasoning can Computer Science Demand of a Software Implementer? Fulltext Access 28 Pages 2005
The Terwilliger algebra of an almost-bipartite P- and Q-polynomial association scheme Fulltext Access 28 Pages 2005
Geometric quadrisection in linear time, with application to VLSI placement Fulltext Access 29 Pages 2005
A novel giant-subgraph phase-transition in sparse random k-partite graphs Fulltext Access 29 Pages 2005
Expansion: the Crucial Mechanism for Type Inference with Intersection Types: A Survey and Explanation Fulltext Access 30 Pages 2005
Symbolic Reachability Analysis Using Narrowing and its Application to Verification of Cryptographic Protocols Fulltext Access 30 Pages 2005
Simple and optimal output-sensitive construction of contour trees using monotone paths Fulltext Access 31 Pages 2005
Chebyshev polynomials and spanning tree formulas for circulant and related graphs Fulltext Access 31 Pages 2005
Issues in the Analysis of Proof-Search Strategies in Sequential Presentations of Logics Fulltext Access 33 Pages 2005
Typical case complexity of Satisfiability Algorithms and the threshold phenomenon Fulltext Access 35 Pages 2005
Heterogeneous Reasoning with Euler/Venn Diagrams Containing Named Constants and FOL Fulltext Access 35 Pages 2005
A duality based algorithm for multileaf collimator field segmentation with interleaf collision constraint Fulltext Access 37 Pages 2005
Theory of computation of multidimensional entropy with an application to the monomer-dimer problem Fulltext Access 37 Pages 2005