1495 | -- | 1529 | Viliam Simko, David Hauzar, Petr Hnetynka, Tomás Bures, Frantisek Plasil. Formal Verification of Annotated Textual Use-Cases |
1530 | -- | 1547 | Achal Kaushik, Deo Prakash Vidyarthi. A Green Energy Model for Resource Allocation in Computational Grid |
1548 | -- | 1565 | HamidReza Ahmadifar, Ghassem Jaberipur. q±1} |
1566 | -- | 1572 | Edem Kwedzo Bankas, Kazeem Alagbe Gbolagade. n+2 - 1} |
1573 | -- | 1584 | Qian Mao, K. Bharanitharan, Chin-Chen Chang. A Proxy User Authentication Protocol Using Source-Based Image Morphing |
1585 | -- | 1597 | Yi-Wen Zhang, Rui-feng Guo. Low-Power Scheduling Algorithms for Sporadic Task with Shared Resources in Hard Real-Time Systems |
1598 | -- | 1606 | Chao-Liang Liu, Wang-Jui Tsai, Ting Yi Chang, Chun-Cheng Peng, Peng-Shiang Wong. Meaningful Share Generation for (2, 2)-Multiple Visual Secret Sharing Scheme Without Pixel Expansion |
1607 | -- | 1627 | Abdelli Abdelkrim. Improving the State Space Computation of the Time Stream Petri Nets Model |
1628 | -- | 1644 | Yang Wang, Wei Shi. Dataflow-Based Scheduling for Scientific Workflows in HPC with Storage Constraints |
1645 | -- | 1655 | Murat Yesilyurt, Yildiray Yalman, Ahmet Turan Özcerit. A Robust Watermarking Method for Mpeg-4 Based on Kurtosis |
1656 | -- | 1672 | Alexandre Petrenko, Adenilso Simão. Generalizing the DS-Methods for Testing Non-Deterministic FSMs |
1673 | -- | 1686 | Niko Beerenwinkel, Stefano Beretta, Paola Bonizzoni, Riccardo Dondi, Yuri Pirola. Covering Pairs in Directed Acyclic Graphs |