1 | -- | 16 | Jean-Marc Champarnaud, Faissal Ouardi, Djelloul Ziadi. An Efficient Computation of the Equation K-automaton of a Regular K-expression |
17 | -- | 26 | Chin-Chen Chang, Yung-Chen Chou. A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes |
27 | -- | 41 | Janis Cirulis. Rough Set Algebras as Description Domains |
43 | -- | 66 | Stefano Ferilli, Teresa Maria Altomare Basile, Marenglen Biba, Nicola Di Mauro, Floriana Esposito. A General Similarity Framework for Horn Clause Logic |
67 | -- | 72 | Joachim Giesen, Eva Schuberth, Milos Stojakovic. Approximate Sorting |
73 | -- | 86 | Marcin Gorawski, Adam Dyga. Indexing of Spatio-Temporal Telemetric Data Based on Adaptive Multi-Dimensional Bucket Index |
87 | -- | 92 | RadomÃr Halas. A Note on Axiom System for SBL-algebras |
93 | -- | 106 | Yo-Sub Han, Kai Salomaa, Derick Wood. Nondeterministic State Complexity of Basic Operations for Prefix-Free Regular Languages |
107 | -- | 123 | Sriparna Saha, Sanghamitra Bandyopadhyay. Some Symmetry Based Classifiers |
125 | -- | 155 | Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan. NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns |
157 | -- | 169 | Xia Wang, Wenxiu Zhang. Concept Lattices of Subcontexts of a Context |
171 | -- | 190 | Chih-Chia Yao, Pao-Ta Yu, Ruo-Wei Hung. Extractive Support Vector Algorithm on Support Vector Machines for Image Restoration |
191 | -- | 201 | Leyou Zhang, Yupu Hu, Qing Wu. New Construction of Short Hierarchical ID-Based Signature in the Standard Model |