255 | -- | 257 | Fairouz Kamareddine. Capsule Reviews |
258 | -- | 267 | Mehmet Savsar, Fawaz S. Al-Anzi. Reliability of Data Allocation on a Centralized Service Configuration with Distributed Servers |
268 | -- | 280 | Alain Cournier, Stéphane Devismes, Franck Petit, Vincent Villain. Snap-Stabilizing Depth-First Search on Arbitrary Networks |
281 | -- | 296 | Apostolos N. Papadopoulos, Alexandros Nanopoulos, Yannis Manolopoulos. Processing Distance Join Queries with Constraints |
297 | -- | 309 | Moses Reuven, Yair Wiseman. Medium-Term Scheduler as a Solution for the Thrashing Effect |
310 | -- | 321 | Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai. Unconditionally Secure Anonymous Encryption and Group Authentication |
322 | -- | 330 | Javier Herranz. Deterministic Identity-Based Signatures for Partial Aggregation |
331 | -- | 344 | Karnig Derderian, Robert M. Hierons, Mark Harman, Qiang Guo. Automated Unique Input Output Sequence Generation for Conformance Testing of FSMs |
345 | -- | 350 | Per Martin-Löf. 100 years of Zermelo s axiom of choice: what was the problem with it? |
351 | -- | 357 | James F. Korsh. Skarbek s Algorithm for ::::t::::-Ary Trees |
358 | -- | 374 | Sung Eun Bae, Tadao Takaoka. Improved Algorithms for the ::::K::::-Maximum Subarray Problem |