Lower bounds and new constructions on secure group communication schemes Fulltext Access 13 Pages 2008
Generating all permutations by context-free grammars in Greibach normal form Fulltext Access 13 Pages 2008
Adaptive initialization algorithm for ad hoc radio networks with carrier sensing Fulltext Access 13 Pages 2008
On the complexity of minimizing interference in ad-hoc and sensor networks Fulltext Access 13 Pages 2008
Algorithms for computing variants of the longest common subsequence problem Fulltext Access 13 Pages 2008
Computability and the morphological complexity of some dynamics on continuous domains Fulltext Access 13 Pages 2008
The heart of intersection type assignment: Normalisation proofs revisited Fulltext Access 13 Pages 2008
Complexity and approximation for precedence constrained scheduling problems with large communication delays Fulltext Access 13 Pages 2008
Approximation algorithms for forests augmentation ensuring two disjoint paths of bounded length Fulltext Access 13 Pages 2008
Approximating a vehicle scheduling problem with time windows and handling times Fulltext Access 14 Pages 2008
On the decidability and complexity of the structural congruence for beta-binders Fulltext Access 14 Pages 2008
Exponential lower bounds on the size of constant-depth threshold circuits with small energy complexity Fulltext Access 14 Pages 2008
Coinductive Characterisations Reveal Nice Relations Between Preorders and Equivalences Fulltext Access 14 Pages 2008
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules 1 Fulltext Access 14 Pages 2008
A Virtual Machine Based Information Flow Control System for Policy Enforcement 1 Fulltext Access 14 Pages 2008
Fast Lagrangian relaxation for constrained generation scheduling in a centralized electricity market Fulltext Access 14 Pages 2008
Day ahead price forecasting of electricity markets by a mixed data model and hybrid forecast method Fulltext Access 14 Pages 2008
A research agenda for query processing in large-scale peer data management systems Fulltext Access 14 Pages 2008
Aconitum and Delphinium sp. alkaloids as antagonist modulators of voltage-gated Na+ channels: AM1/DFT electronic structure investigations and QSAR studies Fulltext Access 14 Pages 2008
Computational complexity of determining which statements about causality hold in different space–time models Fulltext Access 14 Pages 2008
Evolving BlenX programs to simulate the evolution of biological networks Fulltext Access 14 Pages 2008
Bounded list injective homomorphism for comparative analysis of protein–protein interaction graphs Fulltext Access 14 Pages 2008
A 3-approximation algorithm for the subtree distance between phylogenies Fulltext Access 14 Pages 2008
Theoretical analysis of binding specificity of influenza viral hemagglutinin to avian and human receptors based on the fragment molecular orbital method Fulltext Access 14 Pages 2008
Efficient reuse of replicated parallel data segments in computational grids Fulltext Access 14 Pages 2008
An innovative workflow mapping mechanism for Grids in the frame of Quality of Service Fulltext Access 14 Pages 2008
SemreX: Efficient search in a semantic overlay for literature retrieval Fulltext Access 14 Pages 2008
An accurate mathematical performance model of adaptive routing in the star graph Fulltext Access 14 Pages 2008
Decidability of Innermost Termination and Context-Sensitive Termination for Semi-Constructor Term Rewriting Systems Fulltext Access 14 Pages 2008