1 | -- | 19 | Nazmun Naher, Tanzima Hashem. Think Ahead: Enabling Continuous Sharing of Location Data in Real-Time with Privacy Guarantee |
20 | -- | 29 | Shmuel T. Klein, Dana Shapira. Context Sensitive Rewriting Codes for Flash Memory† |
30 | -- | 41 | Zbynek Krivka, Jirí Kucera, Alexander Meduna. Jumping Pure Grammars |
42 | -- | 62 | Chengcheng Mou, Shaoping Chen, Yi-Cheng Tu. A Comparative Study of Dual-Tree Algorithms for Computing Spatial Distance Histograms |
63 | -- | 80 | Yuan Lin 0003, Zhongzhi Zhang. Non-Backtracking Centrality Based Random Walk on Networks |
81 | -- | 89 | Weiwei Liu, Chong Jiang, Ji-Bo Wang, Yuan-Yuan Lu. Single-machine scheduling with simultaneous considerations of resource allocation and deteriorating jobs |
90 | -- | 96 | Yu Ti, Ming Xu, Chong Jiang, Ji-Bo Wang, Xiao-yuan Wang. No-wait resource allocation flowshop scheduling with learning effect under limited cost availability |
97 | -- | 108 | Abel Cabrera Martínez, Frank A. Hernández Mira, José M. Sigarreta Almira, Ismael González Yero. On Computational and Combinatorial Properties of the Total Co-independent Domination Number of Graphs |
109 | -- | 129 | Vanderson Hafemann Fragal, Adenilso Simão, Mohammad Reza Mousavi, Uraz Cengiz Türker. Extending HSI Test Generation Method for Software Product Lines |
130 | -- | 143 | Dong-Yuh Yang, Yi-Chun Cho. Analysis of the N-policy GI/M/1/K Queueing Systems with Working Breakdowns and Repairs |
144 | -- | 149 | Shu-Li Zhao, Rong-Xia Hao. The Generalized Three-Connectivity of Two Kinds of Cayley Graphs |
150 | -- | 160 | Bing Zhu 0003, Kenneth W. Shum, Hui Li 0022. On the Duality and File Size Hierarchy of Fractional Repetition Codes |