Decidability of strong equivalence for subschemas of a class of linear, free, near-liberal program schemas Fulltext Access 21 Pages 2011
Controlled Perturbation of sets of line segments in R2 with smart processing order Fulltext Access 21 Pages 2011
From Bidirectional Associative Memory to a noise-tolerant, robust Protein Processor Associative Memory Fulltext Access 21 Pages 2011
ARCHITECT: A layered framework for classifying technologies of event-based systems Fulltext Access 21 Pages 2011
Semantics and complexity of recursive aggregates in answer set programming Fulltext Access 21 Pages 2011
Hybrid reliable load balancing with MOSIX as middleware and its formal verification using process algebra Fulltext Access 21 Pages 2011
Sound and Complete Axiomatization of Trace Semantics for Probabilistic Systems Fulltext Access 21 Pages 2011
Bounded budget betweenness centrality game for strategic network formations Fulltext Access 22 Pages 2011
Logical classification of distributed algorithms (Bakery algorithms as an example) Fulltext Access 22 Pages 2011
Simplification of a complex signal transduction model using invariants and flow equivalent servers Fulltext Access 22 Pages 2011
Formalisation and implementation of an algorithm for bytecode verification of @NonNull types Fulltext Access 22 Pages 2011
Metric and trigonometric pruning for clustering of uncertain data in 2D geometric space Fulltext Access 22 Pages 2011
A quad-tree based multiresolution approach for two-dimensional summary data Fulltext Access 22 Pages 2011
ASAP: Eliminating algorithm-based disclosure in privacy-preserving data publishing Fulltext Access 22 Pages 2011
Some New Approaches in Functional Programming Using Algebras and Coalgebras Fulltext Access 22 Pages 2011
Two linear-time algorithms for computing the minimum length polygon of a digital contour Fulltext Access 22 Pages 2011
Testing Data Consistency of Data-Intensive Applications Using QuickCheck Fulltext Access 22 Pages 2011
Practical simulation and estimation for Gibbs Delaunay–Voronoi tessellations with geometric hardcore interaction Fulltext Access 22 Pages 2011
A general approach to the analysis of controlled perturbation algorithms Fulltext Access 22 Pages 2011
QoS-enabled and self-adaptive connectors for Web Services composition and coordination Fulltext Access 22 Pages 2011
Corrective classification: Learning from data imperfections with aggressive and diverse classifier ensembling Fulltext Access 23 Pages 2011
On the resolution-based family of abstract argumentation semantics and its grounded instance Fulltext Access 23 Pages 2011
Computing minimum distortion embeddings into a path for bipartite permutation graphs and threshold graphs Fulltext Access 23 Pages 2011
A semantic characterization of a useful fragment of the situation calculus with knowledge Fulltext Access 23 Pages 2011
An efficient certifying algorithm for the Hamiltonian cycle problem on circular-arc graphs Fulltext Access 23 Pages 2011
Contact, closure, topology, and the linking of row and column types of relations Fulltext Access 23 Pages 2011
Privacy Preserving OLAP over Distributed XML Data: A Theoretically-Sound Secure-Multiparty-Computation Approach Fulltext Access 23 Pages 2011
Platform-Variant Applications from Platform-Independent Models via Templates Fulltext Access 23 Pages 2011
On the finite controllability of conjunctive query answering in databases under open-world assumption Fulltext Access 23 Pages 2011
From individuals to populations: A mean field semantics for process algebra Fulltext Access 24 Pages 2011
A universal cellular automaton on the heptagrid of the hyperbolic plane with four states Fulltext Access 24 Pages 2011
Computing rank dependent utility in graphical models for sequential decision problems Fulltext Access 24 Pages 2011
Multilinear formulas, maximal-partition discrepancy and mixed-sources extractors Fulltext Access 24 Pages 2011
Changing system interfaces consistently: A new refinement strategy for CSP∥B Fulltext Access 24 Pages 2011
Transformation of structure-shy programs with application to XPath queries and strategic functions Fulltext Access 24 Pages 2011