Journal: Inf. Process. Lett.

Volume 77, Issue 5-6

219 -- 224Xuandong Li, Johan Lilius. Efficient verification of a class of time Petri nets using linear programming
225 -- 229Gerhard J. Woeginger. The reconstruction of polyominoes from their orthogonal projections
231 -- 238Limin Xiang, Kazuo Ushijima, Changjie Tang. On generating k-ary trees in computer representation
239 -- 245Carlos Martín-Vide, Victor Mitrana. Some undecidable problems for parallel communicating finite automata systems
247 -- 253Paulo A. S. Veloso, Sheila R. M. Veloso. On local modularity variants and -institutions
255 -- 259Michelangelo Grigni. A Sperner lemma complete for PPA
261 -- 267Chinda Wongngamnit, Dana Angluin. Robot localization in a grid
269 -- 275Hiroyuki Kawai, Naohiro Fujikake, Yukio Shibata. Factorization of de Bruijn digraphs by cycle-rooted trees
277 -- 282Frank Harary, Vladik Kreinovich, Luc Longpré. A new graph characteristic and its application to numerical computability
283 -- 290Vicent Cholvi, Pablo Boronat. A minimal property for characterizing deadlock-free programs

Volume 77, Issue 2-4

49 -- 51Vicki L. Almstrum, David Gries. From the Editors of this special issue
53 -- 61Edsger W. Dijkstra. Under the spell of Leibniz s dream
63 -- 70James H. Anderson, Mark Moir, Srikanth Ramamurthy. A simple proof technique for priority-scheduled systems
71 -- 76Roland Carl Backhouse, Maarten M. Fokkinga. The associativity of equivalence and the Towers of Hanoi problem
77 -- 84Lex Bijlsma. Model-based specification
85 -- 87D. W. Braben. Bucking the trends
89 -- 96W. H. J. Feijen. The joy of formula manipulation
97 -- 108Cormac Flanagan, Rajeev Joshi, K. Rustan M. Leino. Annotation inference for modular checkers
109 -- 114Mohamed G. Gouda. Elements of security: Closure, convergence, and protection
115 -- 121Ted Herman, Toshimitsu Masuzawa. Available stabilizing heaps
123 -- 129C. A. R. Hoare. Legacy
131 -- 135H. Peter Hofstee, Jun Sawada. Derivation of a rotator circuit with homogeneous interconnect
137 -- 142Rob R. Hoogerwoord. Formality works
143 -- 150Jerry James, Ambuj K. Singh. Recovering distributed objects
151 -- 157Anne Kaldewaij, Laurens de Vries. Optimal real-time garbage collection for acyclic pointer structures
159 -- 167William Leal, Anish Arora. State-level and value-level simulations in data refinement
169 -- 171K. Rustan M. Leino. Real estate of names
173 -- 179Panagiotis Manolios, J. Strother Moore. On the desirability of mechanizing calculational proofs
181 -- 187Alain J. Martin. Towards an energy complexity of computation
189 -- 195M. Douglas McIlroy. The music of streams
197 -- 200Jayadev Misra. A walk over the shortest path: Dijkstra s Algorithm viewed as fixed-point computation
201 -- 208David A. Naumann. Calculating sharp adaptation rules
209 -- 212Josyula R. Rao. On the role of formal methods in security
213 -- 217Beverly A. Sanders. The shortest path in parallel

Volume 77, Issue 1

1 -- 7Clemens Gröpl, Hans Jürgen Prömel, Anand Srivastav. On the evolution of the worst-case OBDD size
9 -- 11Andris Ambainis. On learning formulas in the limit and with assurance
13 -- 16Esther M. Arkin, Refael Hassin, Maxim Sviridenko. Approximating the maximum quadratic assignment problem
17 -- 22Shyue-Ming Tang, Fu-Long Yeh, Yue-Li Wang. An efficient algorithm for solving the homogeneous set sandwich problem
23 -- 26Xuehou Tan. Shortest zookeeper s routes in simple polygons
27 -- 33Xuehou Tan. Fast computation of shortest watchman routes in simple polygons
35 -- 41Tseng-Kuei Li, Jimmy J. M. Tan, Lih-Hsing Hsu, Ting-Yi Sung. The shuffle-cubes and their generalization
43 -- 48Jean-Marie Le Bars. The 0-1 law fails for monadic existential second-order logic on undirected graphs