Journal: Comput. J.

Volume 60, Issue 5

625 -- 635Xiang Xu, Shuming Zhou, Jinqiang Li. Reliability of Complete Cubic Networks under the Condition of g-Good-Neighbor
636 -- 656Ornela Dardha, Daniele Gorla, Daniele Varacca. Semantic Subtyping for Objects and Classes
657 -- 674Stefan Edelkamp, Amr Elmasry, Jyrki Katajainen. Heap Construction - 50 Years Later
675 -- 689Wang Lin, Min Wu, Zhengfeng Yang, Zhenbing Zeng. Verification for Non-polynomial Hybrid Systems Using Rational Invariants
690 -- 710Yu Yang, Hongbo Liu, Hua Wang, Ansheng Deng, Colton Magnant. On Algorithms for Enumerating Subtrees of Hexagonal and Phenylene Chains
711 -- 728Akinori Kawachi, Yoshio Okamoto, Keisuke Tanaka, Kenji Yasunaga. General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction
729 -- 750Wiktor B. Daszczuk. Communication and Resource Deadlock Analysis Using IMDS Formalism and Model Checking
751 -- 760Cheng Zhou, Zhonghai Yin, Youqian Feng. Events Algebra of Triggers
761 -- 775Seungbum Jo, Stelios Joannou, Daisuke Okanohara, Rajeev Raman, Srinivasa Rao Satti. Compressed Bit vectors Based on Variable-to-Fixed Encodings