Fast fixed-parameter tractable algorithms for nontrivial generalizations of vertex cover Fulltext Access 17 Pages 2005
Object and image indexing based on region connection calculus and oriented matroid theory Fulltext Access 17 Pages 2005
A Program Result Checker for the Lexical Analysis of the GNU C Compiler Fulltext Access 17 Pages 2005
Resolution complexity of random constraint satisfaction problems: Another half of the story Fulltext Access 17 Pages 2005
Decidability of Reachability for Polymorphic Systems with Arrays: A Complete Classification Fulltext Access 17 Pages 2005
Finding Symmetry in Models of Concurrent Systems by Static Channel Diagram Analysis Fulltext Access 17 Pages 2005
Exploiting Target Enlargement and Dynamic Abstraction within Mixed BDD and SAT Invariant Checking Fulltext Access 17 Pages 2005
Towards Graph Transformation Based Generation of Visual Editors Using Eclipse Fulltext Access 17 Pages 2005
Subtractive reductions and complete problems for counting complexity classes Fulltext Access 18 Pages 2005
On the computational power of probabilistic and quantum branching program Fulltext Access 18 Pages 2005
Context-free languages can be accepted with absolutely no space overhead Fulltext Access 18 Pages 2005
On the influence of the variable ordering for algorithmic learning using OBDDs Fulltext Access 18 Pages 2005
Static analysis based on formal models and incremental computation in Go programming Fulltext Access 18 Pages 2005
Resolvable optimal strong partially balanced designs with block size four Fulltext Access 18 Pages 2005
The many benefits of putting stack filters into disjunctive or conjunctive normal form Fulltext Access 18 Pages 2005
Aztec diamonds and digraphs, and Hankel determinants of Schröder numbers Fulltext Access 18 Pages 2005
Some equitably 3-colourable cycle decompositions of complete equipartite graphs Fulltext Access 18 Pages 2005
On the existence of a convex point subset containing one triangle in the plane Fulltext Access 18 Pages 2005
The alternating greedy expansion and applications to computing digit expansions from left-to-right in cryptography Fulltext Access 18 Pages 2005
Reconciling a gene tree to a species tree under the duplication cost model Fulltext Access 18 Pages 2005
Elementarily computable functions over the real numbers and R-sub-recursive functions Fulltext Access 18 Pages 2005
Towards Composition Management for Component-based Peer-to-Peer Architectures Fulltext Access 18 Pages 2005
A Run-Time Environment for Concurrent Objects With Asynchronous Method Calls Fulltext Access 18 Pages 2005
A Denotational Approach to the Static Analysis of Cryptographic Processes Fulltext Access 18 Pages 2005
Coherently Explaining UML Statechart and Collaboration Diagrams by Graph Transformations Fulltext Access 18 Pages 2005
Testing for the Conformance of Real-time Protocols Implemented by Operating Systems Fulltext Access 18 Pages 2005