A self paired Hopf algebra on double posets and a Littlewood–Richardson rule Fulltext Access 12 Pages 2011
Improved upper bounds for the information rates of the secret sharing schemes induced by the Vámos matroid Fulltext Access 12 Pages 2011
Computational Complexity in Non-Turing Models of Computation: The What, the Why and the How Fulltext Access 12 Pages 2011
Point sets that minimize (≤k)(≤k)-edges, 3-decomposable drawings, and the rectilinear crossing number of K30K30 Fulltext Access 12 Pages 2011
Determining which Fibonacci (p,r)(p,r)-cubes can be ZZ-transformation graphs Fulltext Access 12 Pages 2011
LocTrackJINQS: An Extensible Location-aware Simulation Tool for Multiclass Queueing Networks Fulltext Access 12 Pages 2011
The Descriptive Complexity of the Deterministic Exponential Time Hierarchy Fulltext Access 12 Pages 2011
Product Form Approximation of Transient Probabilities in Stochastic Reaction Networks Fulltext Access 12 Pages 2011
A Combined Process Algebraic and Stochastic Approach to Bone Remodeling Fulltext Access 12 Pages 2011
Analysis of Calcium Spiking in Plant Root Epidermis through CWC Modeling Fulltext Access 12 Pages 2011
On the Laplacian coefficients of unicyclic graphs with prescribed matching number Fulltext Access 13 Pages 2011
Existence of cyclic (3,λ)(3,λ)-GDD of type gvgv having prescribed number of short orbits Fulltext Access 13 Pages 2011
Linear and nonlinear constructions of DNA codes with Hamming distance dd and constant GCGC-content Fulltext Access 13 Pages 2011
Deciding the isomorphism problem in classes of unary automatic structures Fulltext Access 13 Pages 2011
Tradeoffs in process strategy games with application in the WDM reconfiguration problem Fulltext Access 13 Pages 2011
Exact algorithms for computing the tree edit distance between unordered trees Fulltext Access 13 Pages 2011
Nature-inspired framework for measuring visual image resemblance: A near rough set approach Fulltext Access 13 Pages 2011
Relating direct and predicate transformer partial correctness semantics for an imperative probabilistic-nondeterministic language Fulltext Access 13 Pages 2011
Searching for mobile intruders in circular corridors by two 1-searchers Fulltext Access 13 Pages 2011
Communication complexity in number-conserving and monotone cellular automata Fulltext Access 13 Pages 2011
Continuous valuations of temporal logic specifications with applications to parameter optimization and robustness measures Fulltext Access 13 Pages 2011
An extension of Christoffel duality to a subset of Sturm numbers and their characteristic words Fulltext Access 13 Pages 2011
Certificateless public key encryption: A new generic construction and two pairing-free schemes Fulltext Access 13 Pages 2011
Exact optimization for the ℓ1-Compressive Sensing problem using a modified Dantzig–Wolfe method Fulltext Access 13 Pages 2011