1 | -- | 11 | J. Busch. On the Optimality of the Binary Algorithm for the Jacobi Symbol |
13 | -- | 23 | Ya-Fen Chang, Chin-Chen Chang. Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy |
25 | -- | 37 | Chin-Chen Chang, Chang-Chu Chen. Full-Searching-Equivalent Vector Quantization Using Two-Bounds Triangle Inequality |
39 | -- | 57 | Chin-Chen Chang, Tzu-Chuen Lu, Jun-Bin Ya. VQ Codebook Searching Algorithm Based on Correlation Property |
59 | -- | 73 | ChunLin Li, Layuan Li. A Pricing Approach For Grid Resource Scheduling With QoS Guarantees |
75 | -- | 89 | Sabyasachi Dey, Bhargab B. Bhattacharya, Malay K. Kundu, Arijit Bishnu, Tinku Acharya. A Co-processor for Computing the Euler Number of a Binary Image using Divide-and-Conquer Strategy |
91 | -- | 112 | Enrico Formenti, Benoît Masson, Theophilos Pisokas. Advances in Symmetric Sandpiles |
113 | -- | 128 | Yo-Sub Han, Kai Salomaa, Derick Wood. Intercode Regular Languages |
129 | -- | 145 | Jouni Järvinen, Michiro Kondo, Jari Kortelainen. Modal-Like Operators in Boolean Lattices, Galois Connections and Fixed Points |
147 | -- | 170 | Ulrich Paquet, Andries Petrus Engelbrecht. Particle Swarms for Linearly Constrained Optimisation |
171 | -- | 187 | Suman Saha, C. A. Murthy, Sankar K. Pal. Rough set Based Ensemble Classifier forWeb Page Classification |
189 | -- | 218 | Igor V. Tarasyuk. Stochastic Petri Box Calculus with Discrete Time |