Frobenius circulant graphs of valency six, Eisenstein–Jacobi networks, and hexagonal meshes Fulltext Access 18 Pages 2014
A constant factor approximation algorithm for boxicity of circular arc graphs Fulltext Access 18 Pages 2014
New extremal binary self-dual codes of length 68 from quadratic residue codes over F2+uF2+u2F2F2+uF2+u2F2 Fulltext Access 18 Pages 2014
A combinatorial proof of the Kronecker–Weber Theorem in positive characteristic Fulltext Access 18 Pages 2014
Maxwell-independence: a new rank estimate for the 3-dimensional generic rigidity matroid Fulltext Access 18 Pages 2014
Diagonal forms of incidence matrices associated with t-uniform hypergraphs Fulltext Access 19 Pages 2014
Towards a Quantum Domain Theory: Order-enrichment and Fixpoints in W*-algebras Fulltext Access 19 Pages 2014
Modeling and Verification of CAN Bus with Application Layer using UPPAAL Fulltext Access 19 Pages 2014
On terminal forms for topological polynomials for ribbon graphs: The NN-petal flower Fulltext Access 19 Pages 2014
On the analogue of the concavity of entropy power in the Brunn–Minkowski theory Fulltext Access 20 Pages 2014
On the number of realizations of certain Henneberg graphs arising in protein conformation Fulltext Access 20 Pages 2014
Approximating geodesic distances on 2-manifolds in R3R3: The weighted case Fulltext Access 20 Pages 2014
Hybrid GRASP Heuristics to Solve an Unrelated Parallel Machine Scheduling Problem with Earliness and Tardiness Penalties Fulltext Access 20 Pages 2014
Edge-colorings of graphs avoiding fixed monochromatic subgraphs with linear Turán number Fulltext Access 20 Pages 2014
A generalization of the quadrangulation relation to constellations and hypermaps Fulltext Access 21 Pages 2014
Weight distributions of cyclic codes with respect to pairwise coprime order elements Fulltext Access 21 Pages 2014
Finding normal bases over finite fields with prescribed trace self-orthogonal relations Fulltext Access 21 Pages 2014
A Compressed Suffix Tree Based Implementation With Low Peak Memory Usage Fulltext Access 22 Pages 2014
Security Testing Methodology for Vulnerabilities Detection of XSS in Web Services and WS-Security Fulltext Access 22 Pages 2014
Towards a splitter theorem for internally 4-connected binary matroids V Fulltext Access 22 Pages 2014
Improper coloring of sparse graphs with a given girth, I: (0,1)-colorings of triangle-free graphs Fulltext Access 23 Pages 2014
On the value set of small families of polynomials over a finite field, I Fulltext Access 25 Pages 2014
Dual complementary polynomials of graphs and combinatorial–geometric interpretation on the values of Tutte polynomial at positive integers Fulltext Access 25 Pages 2014
Hyperspherical embedding of graphs and networks in communicability spaces Fulltext Access 25 Pages 2014
Group divisible designs with block sizes from K1(3)K1(3) and Kirkman frames of type hum1hum1 Fulltext Access 27 Pages 2014
The stable set polytope of claw-free graphs with stability number at least four. II. Striped graphs are GG-perfect Fulltext Access 28 Pages 2014
a-tint: A polymake extension for algorithmic tropical intersection theory Fulltext Access 29 Pages 2014
The stable set polytope of claw-free graphs with stability number at least four. I. Fuzzy antihat graphs are WW-perfect Fulltext Access 31 Pages 2014
Logical Relations and Parametricity – A Reynolds Programme for Category Theory and Programming Languages Fulltext Access 32 Pages 2014
Permutation patterns, Stanley symmetric functions, and generalized Specht modules Fulltext Access 36 Pages 2014