Nature-inspired framework for measuring visual image resemblance: A near rough set approach Fulltext Access 13 Pages 2011
Deciding the isomorphism problem in classes of unary automatic structures Fulltext Access 13 Pages 2011
Tradeoffs in process strategy games with application in the WDM reconfiguration problem Fulltext Access 13 Pages 2011
From versatility to auto-adaptation of the medium access control in wireless sensor networks Fulltext Access 13 Pages 2011
Exact optimization for the ℓ1-Compressive Sensing problem using a modified Dantzig–Wolfe method Fulltext Access 13 Pages 2011
Upper and lower bounds for finding connected motifs in vertex-colored graphs Fulltext Access 13 Pages 2011
A new and practical influence measure for subsets of covariance matrix sample principal components with applications to high dimensional datasets Fulltext Access 13 Pages 2011
Continuous valuations of temporal logic specifications with applications to parameter optimization and robustness measures Fulltext Access 13 Pages 2011
Viral conductance: Quantifying the robustness of networks with respect to spread of epidemics Fulltext Access 13 Pages 2011
An extension of Christoffel duality to a subset of Sturm numbers and their characteristic words Fulltext Access 13 Pages 2011
Communication complexity in number-conserving and monotone cellular automata Fulltext Access 13 Pages 2011
Certificateless public key encryption: A new generic construction and two pairing-free schemes Fulltext Access 13 Pages 2011
Propositional Dynamic Logic with Storing, Recovering and Parallel Composition Fulltext Access 13 Pages 2011
Implementing a Language with Flow-Sensitive and Structural Typing on the JVM Fulltext Access 13 Pages 2011
Treegraph-based Instruction Scheduling for Stack-based Virtual Machines Fulltext Access 13 Pages 2011
On nn-facility median problem with facilities subject to failure facing uniform demand Fulltext Access 13 Pages 2011
An integer LL-shaped algorithm for the Dial-a-Ride Problem with stochastic customer delays Fulltext Access 13 Pages 2011
Searching for mobile intruders in circular corridors by two 1-searchers Fulltext Access 13 Pages 2011
Supervised multidimensional scaling for visualization, classification, and bipartite ranking Fulltext Access 13 Pages 2011
Constructive linear-time temporal logic: Proof systems and Kripke semantics Fulltext Access 13 Pages 2011
Sharp lower bounds on the extractable randomness from non-uniform sources Fulltext Access 13 Pages 2011
On the approximability of the minimum strictly fundamental cycle basis problem Fulltext Access 14 Pages 2011
The ring-star problem: A new integer programming formulation and a branch-and-cut algorithm Fulltext Access 14 Pages 2011
Expressive Completeness for LTL With Modulo Counting and Group Quantifiers Fulltext Access 14 Pages 2011
On the expressive power of CNF formulas of bounded tree- and clique-width Fulltext Access 14 Pages 2011
Static Resource Analysis for Java Bytecode Using Amortisation and Separation Logic Fulltext Access 14 Pages 2011
Complete and Platform-Independent Calling Context Profiling for the Java Virtual Machine Fulltext Access 14 Pages 2011
A Flexible Framework for Visualisation of Computational Properties of General Explicit Substitutions Calculi Fulltext Access 14 Pages 2011