625 | -- | 635 | Xiang Xu, Shuming Zhou, Jinqiang Li. Reliability of Complete Cubic Networks under the Condition of g-Good-Neighbor |
636 | -- | 656 | Ornela Dardha, Daniele Gorla, Daniele Varacca. Semantic Subtyping for Objects and Classes |
657 | -- | 674 | Stefan Edelkamp, Amr Elmasry, Jyrki Katajainen. Heap Construction - 50 Years Later |
675 | -- | 689 | Wang Lin, Min Wu, Zhengfeng Yang, Zhenbing Zeng. Verification for Non-polynomial Hybrid Systems Using Rational Invariants |
690 | -- | 710 | Yu Yang, Hongbo Liu, Hua Wang, Ansheng Deng, Colton Magnant. On Algorithms for Enumerating Subtrees of Hexagonal and Phenylene Chains |
711 | -- | 728 | Akinori Kawachi, Yoshio Okamoto, Keisuke Tanaka, Kenji Yasunaga. General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction |
729 | -- | 750 | Wiktor B. Daszczuk. Communication and Resource Deadlock Analysis Using IMDS Formalism and Model Checking |
751 | -- | 760 | Cheng Zhou, Zhonghai Yin, Youqian Feng. Events Algebra of Triggers |
761 | -- | 775 | Seungbum Jo, Stelios Joannou, Daisuke Okanohara, Rajeev Raman, Srinivasa Rao Satti. Compressed Bit vectors Based on Variable-to-Fixed Encodings |