Competitive analysis of most-request-first for scheduling broadcasts with start-up delay Fulltext Access 12 Pages 2008
Fault-free Hamiltonian cycles in twisted cubes with conditional link faults Fulltext Access 12 Pages 2008
Reconstruction of binary matrices under fixed size neighborhood constraints Fulltext Access 12 Pages 2008
Decision problems in membrane systems with peripheral proteins, transport and evolution Fulltext Access 12 Pages 2008
A uniform family of tissue P systems with cell division solving 3-COL in a linear time Fulltext Access 12 Pages 2008
Maintaining Coherence Between Models With Distributed Rules: From Theory to Eclipse Fulltext Access 12 Pages 2008
Implementing an EJB3-Specific Graph Transformation Plugin by Using Database Independent Queries Fulltext Access 12 Pages 2008
Translation of Restricted OCL Constraints into Graph Constraints for Generating Meta Model Instances by Graph Grammars Fulltext Access 12 Pages 2008
fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol Fulltext Access 12 Pages 2008
A Calculus for Interaction Nets Based on the Linear Chemical Abstract Machine Fulltext Access 12 Pages 2008
The Interpretation of Intuitionistic Type Theory in Locally Cartesian Closed Categories – an Intuitionistic Perspective Fulltext Access 12 Pages 2008
On the complexity of sequential rectangle placement in IEEE 802.16/WiMAX systems Fulltext Access 12 Pages 2008
An Effective Tietze-Urysohn Theorem for QCB-Spaces: (Extended Abstract) Fulltext Access 12 Pages 2008
Approximation hardness of dominating set problems in bounded degree graphs Fulltext Access 12 Pages 2008
Effective Computability of Solutions of Ordinary Differential Equations The Thousand Monkeys Approach Fulltext Access 12 Pages 2008
Unsolvable block transitive automorphism groups of 2-(v,k,1)(k=6,7,8,9) designs Fulltext Access 13 Pages 2008
Heavy cycles in k-connected weighted graphs with large weighted degree sums Fulltext Access 13 Pages 2008
Combinatorial properties of a general domination problem with parity constraints Fulltext Access 13 Pages 2008
On decomposability of 4-ary distance 2 MDS codes, double-codes, and nn-quasigroups of order 4 Fulltext Access 13 Pages 2008
Independent sets and non-augmentable paths in generalizations of tournaments Fulltext Access 13 Pages 2008
The heart of intersection type assignment: Normalisation proofs revisited Fulltext Access 13 Pages 2008
Computability and the morphological complexity of some dynamics on continuous domains Fulltext Access 13 Pages 2008
Generating all permutations by context-free grammars in Greibach normal form Fulltext Access 13 Pages 2008
Lower bounds and new constructions on secure group communication schemes Fulltext Access 13 Pages 2008
Adaptive initialization algorithm for ad hoc radio networks with carrier sensing Fulltext Access 13 Pages 2008
On the complexity of minimizing interference in ad-hoc and sensor networks Fulltext Access 13 Pages 2008