1 | -- | 10 | Xuemin Lin, Maria E. Orlowska. An Integer Linear Programming Approach to Data Allocation with the Minimum Total Communication Cost in Distributed Database Systems |
11 | -- | 27 | Dimitar Filev, Ronald R. Yager. Analytic Properties of Maximum Entropy OWA Operators |
29 | -- | 42 | Gerard J. M. Smit, Paul J. M. Havinga, Walter H. Tibboel. Virtual Lines, a Deadlock-Free and Real-Time Routing Mechanism for ATM Networks |
43 | -- | 61 | Müjdat Pakkan, Varol Akman. HYPERSOLVER: A Graphical Tool for Commonsense Set Theory |
63 | -- | 86 | Mohammed Ketel, Ludwik Kurz. Robust MIPA Array Processors with Bivariate and Markov Dependence |
87 | -- | 98 | . On Heuristics for Determining the Thickness of a Graph |
99 | -- | 104 | Jau-Liang Chen, Tzonelih Hwang. How to Thwart the Mafia Attack |
105 | -- | 111 | R. Ahmad. On Characterization of a Generalized Information Improvement Due to N Revisions |
113 | -- | 125 | Arshad Hussain, Ludwik Kurz. Robust m-Interval Detection Procedures for Strong Mixing Noise |
127 | -- | 146 | Ki-Hong Park, Jun-Ichi Aoe, Masami Shishibori, Yoshitaka Hayashi. An Automatic Selection Method and Its Application to Key Search Algorithms |
147 | -- | 173 | Chia-Shang James Chu. Time Series Segmentation: A Sliding Window Approach |
175 | -- | 184 | B. Pradeep, C. Siva Ram Murthy. A Constant Time Algorithm for Theorem Proving in Propositional Logic on Reconfigurable Meshes |
185 | -- | 198 | Hideki Mima, Kazuaki Ando, Jun-Ichi Aoe. A Robust Method for Understanding NL Interface Commands in the ICI Intelligent Command Interpreter |