Journal: Inf. Process. Lett.

Volume 88, Issue 6

259 -- 270Gad M. Landau, Baruch Schieber, Michal Ziv-Ukelson. Sparse LCS Common Substring Alignment
271 -- 278Jau-Der Shih. A fault-tolerant wormhole routing scheme for torus networks with nonconvex faults
279 -- 285Yong-Jin Choi, Ho-Hyun Park, Chin-Wan Chung. Estimating the result size of a query to velocity skewed moving objects
287 -- 292Toru Araki. Edge-pancyclicity of recursive circulants
293 -- 298Seong-Hun Paeng. On the security of cryptosystem using automorphism groups
299 -- 304Pantelimon Stanica, Subhamoy Maitra. A constructive count of rotation symmetric functions
305 -- 310Jean-Marie Vanherpe. Some optimization problems on weak-bisplit graphs

Volume 88, Issue 5

203 -- 212Liang Chen, Naoyuki Tokuda, Akira Nagai. A new differential LSI space-based probabilistic document classifier
213 -- 218Lars Kristiansen, Paul J. Voda. Complexity classes and fragments of C
219 -- 223Sándor P. Fekete, Martin Skutella, Gerhard J. Woeginger. The complexity of economic equilibria for house allocation markets
225 -- 229Wim H. Hesselink. Salembier s Min-tree algorithm turned into breadth first search
231 -- 236Michael Okun, Amnon Barak. A new approach for approximating node deletion problems
237 -- 243Keren Horowitz, Dahlia Malkhi. Estimating network size from local information
245 -- 250Cristian Calude, Solomon Marcus, Ludwig Staiger. A topological characterization of random sequences
251 -- 256Sean Cleary, Jennifer Taback. Bounding restricted rotation distance
257 -- 0Anna Gál, Pavel Pudlák. Erratum to: A note on monotone complexity and the rank of matrices : [Information Processing Letters 87 (2003) 321-326]

Volume 88, Issue 4

143 -- 147Milind Dawande. A notion of cross-perfect bipartite graphs
149 -- 154Ming-Chien Yang, Tseng-Kuei Li, Jimmy J. M. Tan, Lih-Hsing Hsu. Fault-tolerant cycle-embedding of crossed cubes
155 -- 159Giulia Galbiati. On finding cycle bases and fundamental cycle bases with a shortest maximal cycle
161 -- 165T. C. Edwin Cheng, Zhaohui Liu. 3/2-approximation for two-machine no-wait flowshop scheduling with availability constraints
167 -- 171Vadim V. Lozin, Dieter Rautenbach. Some results on graphs without long induced paths
173 -- 176Yin-Te Tsai. The constrained longest common subsequence problem
177 -- 182Jean-Jacques Hébrard, Bruno Zanuttini. An efficient algorithm for Horn description
183 -- 186Tzong-Sun Wu, Chien-Lung Hsu, Han-Yu Lin, Po-Sheng Huang. Improvement of the Miyazaki-Takaragi threshold digital signature scheme
187 -- 194Saurabh Srivastava, R. K. Ghosh. Distributed algorithms for finding and maintaining a k-tree core in a dynamic network
195 -- 200Jianjun Zhou, Martin Müller 0003. Depth-First Discovery Algorithm for incremental topological sorting of directed acyclic graphs
201 -- 202Taekyoung Kwon. Erratum to: Digital signature algorithm for securing digital identities : [Information Processing Letters 82 (2002) 247-252]

Volume 88, Issue 3

89 -- 94Kiyoaki Yoshida, Yasumasa Sujaku, Tohru Kohda. Number of mutual connections in neighborhoods and its application to self-diagnosable systems
95 -- 100Alexandros V. Gerbessiotis, Constantinos J. Siniolakis. Randomized selection in n+C+o(n) comparisons
101 -- 105Petr Kolman. A note on the greedy algorithm for the unsplittable flow problem
107 -- 110Noga Alon, Oded Goldreich, Yishay Mansour. Almost k-wise independence versus k-wise independence
111 -- 117Thorsten Bernholt, Roland Fried. Computing the update of the repeated median regression line in linear time
119 -- 120Marc Joye. Cryptanalysis of a pay-as-you-watch system
121 -- 131Darin Goldstein. Determination of the topology of a directed network
133 -- 141Hasan Ural, David Whittier. Distributed testing without encountering controllability and observability problems

Volume 88, Issue 1-2

1 -- 2José Luiz Fiadeiro, Jan Madey, Andrzej Tarlecki. Foreword
3 -- 6Jan Madey. WMT - from a personal perspective
7 -- 12Wladyslaw M. Turski. It was fun
13 -- 25Michael Jackson. Why software writing is difficult and will remain so
27 -- 32Cliff B. Jones. Operational semantics: Concepts and their expression
33 -- 44Meir M. Lehman, Juan F. Ramil. Software evolution - Background, theory, practice
45 -- 51T. S. E. Maibaum. On what exactly goes on when software is developed step-by-step, II: The sequel
53 -- 58David Lorge Parnas. Structured programming: A minor part of software engineering
59 -- 65Michel Sintzoff. On the design of correct and optimal dynamical systems and games
67 -- 72Krzysztof Walczak, Wojciech Cellary. Modeling virtual worlds in databases
73 -- 81Józef Winkowski. An algebraic characterization of independence of Petri net processes
83 -- 87Niklaus Wirth. Hardware/software co-design then and now