1041 | -- | 1060 | Gabriel Ciobanu, Maciej Koutny. PerTiMo: A Model of Spatial Migration with Safe Access Permissions |
1061 | -- | 1073 | Jie Lin, Yue Jiang, Don Adjeroh. Circular Pattern Discovery |
1074 | -- | 1084 | Jia Jie Liu, Yue-Li Wang, Yu-shan Chiu. Constrained Longest Common Subsequences with Run-Length-Encoded Strings |
1085 | -- | 1098 | Emilio Di Giacomo, Walter Didimo, Luca Grilli, Giuseppe Liotta, Salvatore Agostino Romeo. Heuristics for the Maximum 2-Layer RAC Subgraph Problem |
1099 | -- | 1111 | Ahmad Sabri, Vincent Vajnovszki. Two Reflected Gray Code-Based Orders on Some Restricted Growth Sequences |
1112 | -- | 1121 | Chia Shin Ou, Chin Lung Lu, Richard C. T. Lee. A Systematical and Parallel Approach to Solve Problems Involving Special Properties of Bit-Vectors |
1122 | -- | 1139 | Amy Affleck, Aneesh Krishna, Narasimaha Achuthan. Non-Functional Requirements Framework: A Mathematical Programming Approach |
1140 | -- | 1159 | Florentin Ipate, Alin Stefanescu, Ionut Dinca. Model Learning and Test Generation Using Cover Automata |
1160 | -- | 1168 | Antonio Badia, Daniel Lemire. Functional Dependencies with null Markers |
1169 | -- | 1185 | Petr Procházka, Jan Holub. Compression of a Set of Files with Natural Language Content |
1186 | -- | 1198 | Joel Fuentes, Pablo Sáez, Gilberto Gutierrez, Isaac D. Scherson. A Method to Find Functional Dependencies Through Refutations and Duality of Hypergraphs |
1199 | -- | 1213 | Chang-ai Sun, Yimeng Zai, Huai Liu. Evaluating and Comparing Fault-Based Testing Strategies for General Boolean Specifications: A Series of Experiments |
1214 | -- | 1223 | Behrooz Parhami. Digital Arithmetic in Nature: Continuous-Digit RNS |