413 | -- | 422 | T. Tamizh Chelvam, T. Asir. n |
423 | -- | 432 | Jin-Yi Liu. A Randomized Algorithm for Weighted Approximation of Points by a Step Function |
433 | -- | 442 | Qinghai Liu, Zhao Zhang, Zhihua Yu. Cyclic Connectivity of Star Graph |
443 | -- | 456 | Tomoshi Otsuki, Hideyuki Aisu, Toshiaki Tanaka. A Search-Based Approach to Railway Rolling Stock Allocation Problems |
457 | -- | 472 | Balasingham Balamohan, Paola Flocchini, Ali Miri, Nicola Santoro. Time Optimal Algorithms for Black Hole Search in Rings |
473 | -- | 490 | Hai Du, Weili Wu, Zaixin Lu, Yinfeng Xu. On the Steiner Ratio in |
491 | -- | 502 | Wei Ding, Guohui Lin, Guoliang Xue. Diameter-Constrained Steiner Trees |
503 | -- | 516 | Wei Ding, Guoliang Xue. A Divide-and-Conquer Algorithm for Finding a Most Reliable Source on a Ring-Embedded Tree Network with Unreliable Edges |
517 | -- | 536 | Peter Damaschke, Azam Sheikh Muhammad. Bounds for Nonadaptive Group Tests to estimate the Amount of Defectives |
537 | -- | 552 | Gregory Karagiorgos, Dimitrios Poulakis. Efficient Algorithms for the Basis of Finite Abelian Groups |
553 | -- | 586 | Marin Bougeret, Pierre-François Dutot, Klaus Jansen, Christina Robenek, Denis Trystram. Approximation Algorithms for Multiple Strip Packing and Scheduling Parallel Jobs in Platforms |
587 | -- | 608 | Reihaneh Safavi-Naini, Dongvu Tonien. Fuzzy Universal Hashing and Approximate Authentication |