105 | -- | 110 | L. Sunil Chandran. Minimum cuts, girth and a spectral threshold |
111 | -- | 114 | Florian Hess. On the security of the verifiably-encrypted signature scheme of Boneh, Gentry, Lynn and Shacham |
115 | -- | 121 | Joo-Won Jung, Kyung-Yong Chwa. Labeling points with given rectangles |
123 | -- | 130 | Christel Baier, Holger Hermanns, Joost-Pieter Katoen. Probabilistic weak simulation is decidable in polynomial time |
131 | -- | 135 | Iordanis Kerenidis, Ashwin Nayak. Weak coin flipping with small bias |
137 | -- | 139 | Boaz Ben-Moshe, Paz Carmi, Matthew J. Katz. Computing all large sums-of-pairs in ::R:::n::::: and the discrete planar two-watchtower problem |
141 | -- | 149 | Thomas Perst, Helmut Seidl. Macro forest transducers |
151 | -- | 157 | Guilherme Dias da Fonseca, Celina M. Herrera de Figueiredo, Paulo Cezar Pinto Carvalho. Kinetic hanger |