Counting and representing intersections among triangles in three dimensions Fulltext Access 20 Pages 2005
Subroutine Inlining and Bytecode Abstraction to Simplify Static and Dynamic Analysis Fulltext Access 20 Pages 2005
A CPS Encoding of Name-Passing in Higher-Order Mobile Embedded Resources Fulltext Access 20 Pages 2005
Formalizing and Analyzing the Needham-Schroeder Symmetric-Key Protocol by Rewriting Fulltext Access 20 Pages 2005
Probabilistic Model Checking of the CSMA/CD Protocol Using PRISM and APMC Fulltext Access 20 Pages 2005
Reconstruction of 8-connected but not 4-connected hv-convex discrete sets Fulltext Access 20 Pages 2005
Computing the minimum DNF representation of Boolean functions defined by intervals Fulltext Access 20 Pages 2005
Semi-online scheduling jobs with tightly-grouped processing times on three identical machines Fulltext Access 20 Pages 2005
Modeling Fault-tolerant Distributed Systems for Discrete Controller Synthesis Fulltext Access 20 Pages 2005
Integration of Reliability and Performance Analyses for Active Network Services Fulltext Access 20 Pages 2005
Congruence of Bisimulation in a Non-Deterministic Call-By-Need Lambda Calculus Fulltext Access 21 Pages 2005
Explicit test sets for iterated morphisms in free monoids and metabelian groups Fulltext Access 21 Pages 2005
Computing on large-scale distributed systems: XtremWeb architecture, programming models, security, tests and convergence with grid Fulltext Access 21 Pages 2005
An efficient query learning algorithm for ordered binary decision diagrams Fulltext Access 21 Pages 2005
Estimating all pairs shortest paths in restricted graph families: a unified approach Fulltext Access 21 Pages 2005
Extracting the workflow critical path from the extended well-formed workflow schema Fulltext Access 21 Pages 2005
A 1.5-approximation algorithm for sorting by transpositions and transreversals Fulltext Access 21 Pages 2005
On two-way nondeterministic finite automata with one reversal-bounded counter Fulltext Access 21 Pages 2005
Estimating Non-functional Properties of Component-based Software Based on Resource Consumption Fulltext Access 21 Pages 2005
Algon: From Interchangeable Distributed Algorithms to Interchangeable Middleware Fulltext Access 21 Pages 2005
Testing Conformance of Real-Time Applications by Automatic Generation of Observers Fulltext Access 21 Pages 2005
Simulation of Simultaneous Events in Regular Expressions for Run-Time Verification Fulltext Access 21 Pages 2005
Superposition with equivalence reasoning and delayed clause normal form transformation Fulltext Access 21 Pages 2005
The Church-Rosser languages are the deterministic variants of the growing context-sensitive languages Fulltext Access 21 Pages 2005
Compositionality and locality for improving model checking in the selective mu-calculus Fulltext Access 21 Pages 2005
Mutable strings in Java: design, implementation and lightweight text-search algorithms Fulltext Access 21 Pages 2005
Completeness in standard and differential approximation classes: Poly-(D)APX- and (D)PTAS-completeness Fulltext Access 21 Pages 2005
Statistical methods and software for risk assessment: applications to a neurophysiological data set Fulltext Access 21 Pages 2005
Regression of a data matrix on descriptors of both its rows and of its columns via latent variables: L-PLSR Fulltext Access 21 Pages 2005
Including long- and short-term data in blinded sample size recalculation for binary endpoints Fulltext Access 21 Pages 2005