Abstract is missing.
- Automated Reasoning for Knot Semigroups and \pi π -orbifold Groups of KnotsAlexei Lisitsa, Alexei Vernitski. 3-18 [doi]
- Balancing Expression Dags for More Efficient Lazy Adaptive EvaluationMartin Wilhelm. 19-33 [doi]
- Certification Using Newton-Invariant SubspacesJonathan D. Hauenstein. 34-50 [doi]
- Decomposition of Low Rank Multi-symmetric TensorJouhayna Harmouch, Bernard Mourrain, Houssam Khalil. 51-66 [doi]
- Dimension Quasi-polynomials of Inversive Difference Field Extensions with Weighted TranslationsAlexander Levin. 67-80 [doi]
- Efficient Certification of Numeric Solutions to EigenproblemsJoris van der Hoeven, Bernard Mourrain. 81-94 [doi]
- Fast Chinese Remaindering in PracticeJoris van der Hoeven. 95-106 [doi]
- Homotopies for Connected Components of Algebraic Sets with Application to Computing Critical SetsDaniel J. Bates, Daniel A. Brake, Jonathan D. Hauenstein, Andrew J. Sommese, Charles W. Wampler. 107-120 [doi]
- Implementing Fast Carryless MultiplicationJoris van der Hoeven, Robin Larrieu, Grégoire Lecerf. 121-136 [doi]
- Improving Enclosure of Interval Scalar Projection OperationTomasz Dobrowolski. 137-146 [doi]
- Integrating Algebraic and SAT SolversJan Horácek, Jan Burchard, Bernd Becker 0001, Martin Kreuzer. 147-162 [doi]
- Isabelle Formalization of Set Theoretic Structures and Set ComprehensionsCezary Kaliszyk, Karol Pak. 163-178 [doi]
- Jordan Canonical Form with Parameters from Frobenius Form with ParametersRobert M. Corless, Marc Moreno Maza, Steven E. Thornton. 179-194 [doi]
- Knowledge-Based Interoperability for Mathematical Software SystemsMichael Kohlhase, Luca De Feo, Dennis Müller, Markus Pfeiffer, Florian Rabe, Nicolas M. Thiéry, Victor Vasilyev, Tom Wiesing. 195-210 [doi]
- On Interval Methods with Zero Rewriting and Exact Geometric ComputationStefan Schirra, Martin Wilhelm. 211-226 [doi]
- Sparse Rational Function Interpolation with Finitely Many Values for the CoefficientsQiao-Long Huang, Xiao-Shan Gao. 227-242 [doi]
- Virtual Theories - A Uniform Interface to Mathematical Knowledge BasesTom Wiesing, Michael Kohlhase, Florian Rabe. 243-257 [doi]
- On Real Roots Counting for Non-radical Parametric IdealsRyoya Fukasaku, Yosuke Sato. 258-263 [doi]
- On the Bit-Size of Non-radical Triangular SetsXavier Dahan. 264-269 [doi]
- Rapidly Convergent Integrals and Function EvaluationHeba al Kafri, David J. Jeffrey, Robert M. Corless. 270-274 [doi]
- Stirling Numbers, Lambert W and the Gamma FunctionDavid J. Jeffrey, Nick Murdoch. 275-279 [doi]
- The Potential and Challenges of CAD with Equational Constraints for SC-SquareJames H. Davenport, Matthew England. 280-285 [doi]
- New Small 4-Designs with Nonabelian Automorphism GroupsVedran Krcadinac, Mario-Osvin Pavcevic. 289-294 [doi]
- On Classifying Steiner Triple Systems by Their 3-RankDieter Jungnickel, Spyros S. Magliveras, Vladimir D. Tonchev, Alfred Wassermann. 295-305 [doi]
- Right-Justified Characterization for Generating Regular Pattern Avoiding PermutationsPhan-Thuan Do, Thi Thu Huong Tran, Vincent Vajnovszki. 306-319 [doi]
- Experimental Study of the Ehrhart Interpolation PolytopeVissarion Fisikopoulos, Zafeirakis Zafeirakopoulos. 320-324 [doi]
- On Testing Isomorphism of Graphs of Bounded Eigenvalue MultiplicityTakunari Miyazaki. 325-329 [doi]
- A Simple Streaming Bit-Parallel Algorithm for Swap Pattern MatchingVáclav Blazej, Ondrej Suchý, Tomás Valla. 333-348 [doi]
- Epidemic Intelligence Statistical Modelling for BiosurveillanceChristina Parpoula, Alex Karagrigoriou, Angeliki Lambrou. 349-363 [doi]
- Mining Acute Stroke Patients' Data Using Supervised Machine LearningRitu Kundu, Toktam Mahmoodi. 364-377 [doi]
- Parallel and Robust Empirical Risk Minimization via the Median TrickAlexander Kogler, Patrick Traxler. 378-391 [doi]
- Leakage-Resilient Riffle ShufflePawel Lorek, Michal Kulis, Filip Zagórski. 395-408 [doi]
- Ordinary Pairing-Friendly Genus 2 Hyperelliptic Curves with Absolutely Simple JacobiansGeorgios Fotiadis, Elisavet Konstantinou. 409-424 [doi]
- Statistical Testing of PRNG: Generalized Gambler's Ruin ProblemPawel Lorek, Marcin Slowik, Filip Zagórski. 425-437 [doi]
- Subtleties in Security Definitions for Predicate Encryption with Public IndexJohannes Blömer, Gennadij Liske. 438-453 [doi]
- Code-Based Key Encapsulation from McEliece's CryptosystemEdoardo Persichetti. 454-459 [doi]