197 | -- | 226 | Simone Cirani, GianLuigi Ferrari, Luca Veltri. Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview |
227 | -- | 244 | Ruey-Maw Chen, Hsiao-Fang Shih. Solving University Course Timetabling Problems Using Constriction Particle Swarm Optimization with Local Search |
245 | -- | 277 | Wilfried Jakob, Sylvia Strack, Alexander Quinte, Günther Bengel, Karl-Uwe Stucky, Wolfgang Süß. Fast Rescheduling of Multiple Workflows to Constrained Heterogeneous Resources Using Multi-Criteria Memetic Computing |
278 | -- | 308 | Ioannis P. Solos, Ioannis X. Tassopoulos, Grigorios N. Beligiannis. A Generic Two-Phase Stochastic Variable Neighborhood Approach for Effectively Solving the Nurse Rostering Problem |
309 | -- | 318 | Tommaso Mazza, Stefano Castellana. Multi-Sided Compression Performance Assessment of ABI SOLiD WES Data |
319 | -- | 351 | Andrés Abeliuk, Rodrigo Cánovas, Gonzalo Navarro. Practical Compressed Suffix Trees |
352 | -- | 370 | Matteo Comin, Davide Verzotto. Filtering Degenerate Patterns with Application to Protein Sequence Analysis |
371 | -- | 382 | Takao Inoshita, Robert W. Irving, Kazuo Iwama, Shuichi Miyazaki, Takashi Nagase. Improving Man-Optimal Stable Matchings by Minimum Change of Preference Lists |