Abstract is missing.
- Non-black-box Techniques in CryptographyBoaz Barak. 1 [doi]
- Complexity of Polynomial Multiplication over Finite FieldsMichael Kaminski. 2 [doi]
- Synchronous Elastic CircuitsMichael Kishinevsky, Jordi Cortadella, Bill Grundmann, Sava Krstic, John O Leary. 3-5 [doi]
- SZK Proofs for Black-Box Group ProblemsVikraman Arvind, Bireswar Das. 6-17 [doi]
- Canonical Decomposition of a Regular Factorial LanguageSergey V. Avgustinovich, Anna E. Frid. 18-22 [doi]
- Acyclic Bidirected and Skew-Symmetric Graphs: Algorithms and StructureMaxim A. Babenko. 23-34 [doi]
- Inductive Type Schemas as FunctorsFreiric Barral, Sergei Soloviev. 35-45 [doi]
- Unfolding Synthesis of Asynchronous AutomataNicolas Baudru, Rémi Morin. 46-57 [doi]
- Conjugacy and Equivalence of Weighted Automata and Functional TransducersMarie-Pierre Béal, Sylvain Lombardy, Jacques Sakarovitch. 58-69 [doi]
- Applications of the Linear Matroid Parity Algorithm to Approximating Steiner TreesPiotr Berman, Martin Fürer, Alexander Zelikovsky. 70-79 [doi]
- Tuples of Disjoint NP-SetsOlaf Beyersdorff. 80-91 [doi]
- Constructive Equivalence Relations on Computable Probability MeasuresLaurent Bienvenu. 92-103 [doi]
- Planar Dimer TilingsOlivier Bodini, Thomas Fernique. 104-113 [doi]
- The Complexity of Equality Constraint LanguagesManuel Bodirsky, Jan Kára. 114-126 [doi]
- Window Subsequence Problems for Compressed TextsPatrick Cégielski, Irène Guessarian, Yury Lifshits, Yuri Matiyasevich. 127-136 [doi]
- Efficient Algorithms in Zero-Characteristic for a New Model of Representation of Algebraic VarietiesAlexander L. Chistov. 137-146 [doi]
- Relativisation Provides Natural Separations for Resolution-Based Proof SystemsStefan S. Dantchev. 147-158 [doi]
- Bounded-Degree Forbidden Patterns Problems Are Constraint Satisfaction ProblemsStefan S. Dantchev, Florent R. Madelaine. 159-170 [doi]
- Isolation and Reducibility Properties and the Collapse ResultSergey M. Dudakov. 171-177 [doi]
- Incremental Branching ProgramsAnna Gál, Michal Koucký, Pierre McKenzie. 178-190 [doi]
- Logic of Proofs for Bounded ArithmeticEvan Goris. 191-201 [doi]
- On a Maximal NFA Without Mergible StatesIgor Grunsky, Oleksiy Kurganskyy, Igor Potapov. 202-210 [doi]
- Expressiveness of Metric Modalities for Continuous TimeYoram Hirshfeld, Alexander Moshe Rabinovich. 211-220 [doi]
- Extending Dijkstra s Algorithm to Maximize the Shortest Path by Node-Wise Limited Arc InterdictionLeonid Khachiyan, Vladimir Gurvich, Jihui Zhao. 221-234 [doi]
- Weighted Logics for TracesIngmar Meinecke. 235-246 [doi]
- On Nonforgetting Restarting Automata That Are Deterministic and/or MonotoneHartmut Messerschmidt, Friedrich Otto. 247-258 [doi]
- Unwinding a Non-effective Cut Elimination ProofGrigori Mints. 259-269 [doi]
- Enumerate and Expand: Improved Algorithms for Connected Vertex Cover and Tree CoverDaniel Mölle, Stefan Richter, Peter Rossmanith. 270-280 [doi]
- Shannon Entropy vs. Kolmogorov ComplexityAndrei A. Muchnik, Nikolai K. Vereshchagin. 281-291 [doi]
- Language Equations with Symmetric DifferenceAlexander Okhotin. 292-303 [doi]
- On Primitive Recursive RealizabilitiesValery Plisko. 304-312 [doi]
- Evidence Reconstruction of Epistemic Modal Logic S5Natalia Rubtsova. 313-321 [doi]
- Linear Temporal Logic with Until and Before on Integer Numbers, Deciding AlgorithmsVladimir V. Rybakov. 322-333 [doi]
- On the Frequency of Letters in Morphic SequencesKalle Saari. 334-345 [doi]
- Functional Equations in Shostak TheoriesSergey P. Shlepakov. 346-351 [doi]
- All Semi-local Longest Common Subsequences in Subquadratic TimeAlexandre Tiskin. 352-363 [doi]
- Non-approximability of the Randomness Deficiency FunctionMichael A. Ustinov. 364-368 [doi]
- Multi-agent Explicit KnowledgeTatiana Yavorskaya. 369-380 [doi]
- Polarized Subtyping for Sized TypesAndreas Abel. 381-392 [doi]
- Neural-Network Based Physical Fields Modeling TechniquesKonstantin Bournayev. 393-402 [doi]
- Approximate Methods for Constrained Total Variation MinimizationXiaogang Dong, Ilya Pollak. 403-414 [doi]
- Dynamic Isoline Extraction for Visualization of Streaming DataDina Q. Goldin, Huayan Gao. 415-426 [doi]
- Improved Technique of IP Address Fragmentation Strategies for DoS Attack TracebackByung Ryong Kim, Ki-Chang Kim. 427-437 [doi]
- Performance Comparison Between Backpropagation, Neuro-Fuzzy Network, and SVMYong-Guk Kim, Min-Soo Jang, Kyoung-Sic Cho, Gwi-Tae Park. 438-446 [doi]
- Evolutionary Multi-objective Optimisation by Diversity ControlPasan Kulvanit, Theera Piroonratana, Nachol Chaiyaratana, Djitt Laowattana. 447-456 [doi]
- 3D Facial Recognition Using Eigenface and Cascade Fuzzy Neural Networks: Normalized Facial Image ApproachYeung-hak Lee, Chang-Wook Han. 457-465 [doi]
- A New Scaling Kernel-Based Fuzzy System with Low Computational ComplexityXiaojun Liu, Jie Yang, Hong-bin Shen, Xiangyang Wang. 466-474 [doi]
- Bulk Synchronous Parallel ML: Semantics and Implementation of the Parallel JuxtapositionFrédéric Loulergue, Radia Benheddi, Frédéric Gava, D. Louis-Régis. 475-486 [doi]
- A Shortest Path Algorithm Based on Limited Search HeuristicsFeng Lu, Poh-Chin Lai. 487-497 [doi]
- A New Hybrid Directory Scheme for Shared Memory Multi-processorsGuoteng Pan, Lunguo Xie, Qiang Dou, Erhua He. 498-504 [doi]
- Manipulator Path Planning in 3-Dimensional SpaceDmitry Pavlov. 505-513 [doi]
- Least Likely to Use: A New Page Replacement Strategy for Improving Database Management System Response TimeRodolfo A. Pazos Rangel, Joaquín Pérez Ortega, José A. Martínez Flores, Juan Javier González Barbosa, Mirna P. Ponce F.. 514-523 [doi]
- Nonlinear Visualization of Incomplete Data SetsSergiy Popov. 524-533 [doi]
- A Review of Race Detection MechanismsAoun Raza. 534-543 [doi]
- Fuzzy-Q Knowledge Sharing Techniques with Expertness Measures: Comparison and AnalysisPanrasee Ritthipravat, Thavida Maneewarn, Jeremy Wyatt, Djitt Laowattana. 544-554 [doi]
- Explaining Symbolic Trajectory Evaluation by Giving It a Faithful SemanticsJan-Willem Roorda, Koen Claessen. 555-566 [doi]
- Analytic Modeling of Channel Traffic in ::::n::::-CubesHamid Sarbazi-Azad, Hamid Mahini, Ahmad Patooghy. 567-579 [doi]
- Capturing an Intruder in the PyramidPooya Shareghi, Navid Imani, Hamid Sarbazi-Azad. 580-590 [doi]
- Speech Enhancement in Short-Wave Channel Based on Empirical Mode DecompositionLiran Shen, Qingbo Yin, Xueyao Li, Huiqiang Wang. 591-599 [doi]
- Extended Resolution Proofs for Conjoining BDDsCarsten Sinz, Armin Biere. 600-611 [doi]
- Optimal Difference Systems of Sets with MultipliersVladimir D. Tonchev, Hao Wang. 612-618 [doi]
- Authentication Mechanism Using One-Time Password for 802.11 Wireless LANBinod Vaidya, SangDuck Lee, Jae-Kyun Han, Seung Jo Han. 619-628 [doi]
- Optimizing Personalized Retrieval System Based on Web RankingHao-ming Wang, Ye Guo, Boqin Feng. 629-640 [doi]
- Instruction Selection for ARM/Thumb Processors Based on a Multi-objective Ant AlgorithmShengning Wu, Sikun Li. 641-651 [doi]
- A New Flow Control Algorithm for High Speed Computer NetworkHaoran Zhang, Peng Sun. 652-659 [doi]
- Nonlinear Systems Modeling and Control Using Support Vector Machine TechniqueHaoran Zhang, Xiaodong Wang. 660-669 [doi]
- Fast Motif Search in Protein Sequence DatabasesElena Zheleva, Abdullah N. Arslan. 670-681 [doi]