How to contract an essentially 6-connected graph to a 5-connected graph Fulltext Access 17 Pages 2007
A general theory for dense near polygons with a nice chain of subpolygons Fulltext Access 17 Pages 2007
The affix array data structure and its applications to RNA secondary structure analysis Fulltext Access 17 Pages 2007
Randomized approximation algorithms for set multicover problems with applications to reverse engineering of protein and gene networks Fulltext Access 17 Pages 2007
Memory management optimization problems for integrated circuit simulators Fulltext Access 17 Pages 2007
A geometrical characterization of factors of multidimensional Billiard words and some applications Fulltext Access 18 Pages 2007
Equivalence of linear, free, liberal, structured program schemas is decidable in polynomial time Fulltext Access 18 Pages 2007
Extracting Program Logics From Abstract Interpretations Defined by Logical Relations Fulltext Access 18 Pages 2007
From Functional Programs to Interaction Nets via the Rewriting Calculus ⋆ Fulltext Access 18 Pages 2007
Towards Software Component Procurement Automation with Latent Semantic Analysis Fulltext Access 18 Pages 2007
Relational Parametricity for Control Considered as a Computational Effect Fulltext Access 18 Pages 2007
Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions 1 Fulltext Access 18 Pages 2007
A Fully Sound Goal Solving Calculus for the Cooperation of Solvers in the CFLP Scheme Fulltext Access 18 Pages 2007
Recognizing splicing languages: Syntactic monoids and simultaneous pumping Fulltext Access 18 Pages 2007
Randomized on-line algorithms and lower bounds for computing large independent sets in disk graphs Fulltext Access 18 Pages 2007
Polyhedral results and exact algorithms for the asymmetric travelling salesman problem with replenishment arcs Fulltext Access 18 Pages 2007
Finding large cliques in sparse semi-random graphs by simple randomized search heuristics Fulltext Access 18 Pages 2007
Partial Order Reduction for Rewriting Semantics of Programming Languages Fulltext Access 18 Pages 2007
Java+ITP: A Verification Tool Based on Hoare Logic and Algebraic Semantics 1 Fulltext Access 18 Pages 2007
General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting Fulltext Access 18 Pages 2007