335 | -- | 361 | Klaus Ambos-Spies, Levke Bentzien. Separating NP-Completeness Notions under Strong Hypotheses |
362 | -- | 399 | Mihir Bellare, Joe Kilian, Phillip Rogaway. The Security of the Cipher Block Chaining Message Authentication Code |
400 | -- | 427 | Francesco Quaglia, Roberto Baldoni, Bruno Ciciani. On the No-Z-Cycle Property in Distributed Executions |
428 | -- | 456 | Michael J. Kearns, Dana Ron. Testing Problems with Sublearning Sample Complexity |
457 | -- | 477 | Sheng-Tzong Cheng, Chia-Mei Chen, Satish K. Tripathi. A Fault-Tolerance Model for Multiprocessor Real-Time Systems |
478 | -- | 507 | Thomas Eiter, Toshihide Ibaraki, Kazuhisa Makino. On the Difference of Horn Theories |
508 | -- | 522 | Kim S. Larsen. AVL Trees with Relaxed Balance |
523 | -- | 557 | Jun-ichi Takeuchi, Naoki Abe, Shun-ichi Amari. The Lob-Pass Problem |
558 | -- | 579 | Beate Bollig, Ingo Wegener. Asymptotically Optimal Bounds for OBDDs and the Solution of Some Basic OBDD Problems |