Stepped surfaces and Rauzy fractals induced from automorphisms on the free group of rank 2 Fulltext Access 22 Pages 2014
A practical decision procedure for Propositional Projection Temporal Logic with infinite models Fulltext Access 22 Pages 2014
Security Testing Methodology for Vulnerabilities Detection of XSS in Web Services and WS-Security Fulltext Access 22 Pages 2014
A Compressed Suffix Tree Based Implementation With Low Peak Memory Usage Fulltext Access 22 Pages 2014
Improper coloring of sparse graphs with a given girth, I: (0,1)-colorings of triangle-free graphs Fulltext Access 23 Pages 2014
Markov Automata: Deciding weak bisimulation by means of non-naïvely vanishing states Fulltext Access 23 Pages 2014
Dual complementary polynomials of graphs and combinatorial–geometric interpretation on the values of Tutte polynomial at positive integers Fulltext Access 25 Pages 2014
Hyperspherical embedding of graphs and networks in communicability spaces Fulltext Access 25 Pages 2014
On the value set of small families of polynomials over a finite field, I Fulltext Access 25 Pages 2014
A formal proof of the deadline driven scheduler in PPTL axiomatic system Fulltext Access 25 Pages 2014
A generic security API for symmetric key management on cryptographic devices Fulltext Access 25 Pages 2014
TCTL-preserving translations from timed-arc Petri nets to networks of timed automata Fulltext Access 26 Pages 2014
Group divisible designs with block sizes from K1(3)K1(3) and Kirkman frames of type hum1hum1 Fulltext Access 27 Pages 2014
Formative processes with applications to the decision problem in set theory: II. Powerset and singleton operators, finiteness predicate Fulltext Access 28 Pages 2014
The stable set polytope of claw-free graphs with stability number at least four. II. Striped graphs are GG-perfect Fulltext Access 28 Pages 2014
a-tint: A polymake extension for algorithmic tropical intersection theory Fulltext Access 29 Pages 2014
The stable set polytope of claw-free graphs with stability number at least four. I. Fuzzy antihat graphs are WW-perfect Fulltext Access 31 Pages 2014
Logical Relations and Parametricity – A Reynolds Programme for Category Theory and Programming Languages Fulltext Access 32 Pages 2014
Tackling continuous state-space explosion in a Markovian process algebra Fulltext Access 33 Pages 2014
A resource semantics and abstract machine for Safe: A functional language with regions and explicit deallocation Fulltext Access 33 Pages 2014
Permutation patterns, Stanley symmetric functions, and generalized Specht modules Fulltext Access 36 Pages 2014
Forbidden minor characterizations for low-rank optimal solutions to semidefinite programs over the elliptope Fulltext Access 41 Pages 2014
Fault-free Hamiltonian cycles passing through a linear forest in ternary n-cubes with faulty edges Fulltext Access 5 Pages 2013
On the second neighborhood conjecture of Seymour for regular digraphs with almost optimal connectivity Fulltext Access 5 Pages 2013
A quadratic construction for Zielonka automata with acyclic communication structure Fulltext Access 6 Pages 2013
A bound on the values of independence polynomials at â1/k for k-degenerate graphs Fulltext Access 6 Pages 2013
Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles Fulltext Access 11 Pages 2013
Characterization of asymmetric CKI- and KP-digraphs with covering number at most 3 Fulltext Access 11 Pages 2013
Nonpositive eigenvalues of the adjacency matrix and lower bounds for Laplacian eigenvalues Fulltext Access 11 Pages 2013
A Hilton-Milner-type theorem and an intersection conjecture for signed sets Fulltext Access 11 Pages 2013