Journal: Comput. J.

Volume 58, Issue 5

1041 -- 1060Gabriel Ciobanu, Maciej Koutny. PerTiMo: A Model of Spatial Migration with Safe Access Permissions
1061 -- 1073Jie Lin, Yue Jiang, Don Adjeroh. Circular Pattern Discovery
1074 -- 1084Jia Jie Liu, Yue-Li Wang, Yu-shan Chiu. Constrained Longest Common Subsequences with Run-Length-Encoded Strings
1085 -- 1098Emilio Di Giacomo, Walter Didimo, Luca Grilli, Giuseppe Liotta, Salvatore Agostino Romeo. Heuristics for the Maximum 2-Layer RAC Subgraph Problem
1099 -- 1111Ahmad Sabri, Vincent Vajnovszki. Two Reflected Gray Code-Based Orders on Some Restricted Growth Sequences
1112 -- 1121Chia Shin Ou, Chin Lung Lu, Richard C. T. Lee. A Systematical and Parallel Approach to Solve Problems Involving Special Properties of Bit-Vectors
1122 -- 1139Amy Affleck, Aneesh Krishna, Narasimaha Achuthan. Non-Functional Requirements Framework: A Mathematical Programming Approach
1140 -- 1159Florentin Ipate, Alin Stefanescu, Ionut Dinca. Model Learning and Test Generation Using Cover Automata
1160 -- 1168Antonio Badia, Daniel Lemire. Functional Dependencies with null Markers
1169 -- 1185Petr Procházka, Jan Holub. Compression of a Set of Files with Natural Language Content
1186 -- 1198Joel Fuentes, Pablo Sáez, Gilberto Gutierrez, Isaac D. Scherson. A Method to Find Functional Dependencies Through Refutations and Duality of Hypergraphs
1199 -- 1213Chang-ai Sun, Yimeng Zai, Huai Liu. Evaluating and Comparing Fault-Based Testing Strategies for General Boolean Specifications: A Series of Experiments
1214 -- 1223Behrooz Parhami. Digital Arithmetic in Nature: Continuous-Digit RNS