default search action
Fundamenta Informaticae, Volume 84
Volume 84, Number 1, 2008
- Amihood Amir, Avivit Levy, Liron Reuveni:
The Practical Efficiency of Convolutions in Pattern Matching Algorithms. 1-15 - Kangho Roh, Maxime Crochemore, Costas S. Iliopoulos, Kunsoo Park:
External Memory Algorithms for String Problems. 17-32 - Hui Zhang, Qing Guo, Costas S. Iliopoulos:
Algorithms for Computing the lambda-regularities in Strings. 33-49 - Andrei V. Kelarev:
An Algorithm for BCH Codes Extended with Finite State Automata. 51-60 - Hongwei Luo, Kathy J. Horadam:
Simulation and Measurement of Complex Network Growth: the Interplay of Uniform and Preferential Attachment. 61-79 - Eunhui Park, Kunsoo Park:
An Improved Boolean Circuit for Maximum Matching in a Convex Bipartite Graph. 81-97 - James G. Lefevre, Diane M. Donovan, Ales Drápal:
Permutation Representation of 3 and 4-Homogenous Latin Bitrades. 99-110 - Orestes Bueno, Prabhu Manyem:
Polynomial-TimeMaximisation Classes: Syntactic Hierarchy. 111-133 - Jia F. Weng, James MacGregor Smith, Marcus Brazil, Doreen A. Thomas:
Equivalence, Indicators, Quasi-indicators and Optimal Steiner Topologies on Four Points in Space. 135-149
Volume 84, Number 2, 2008
- Nicholas Asher:
A Type Driven Theory of Predication with Complex Types. 151-183 - Corrado Biasi, Federico Aschieri:
A Term Assignment for Polarized Bi-intuitionistic Logic and its Strong Normalization. 185-205 - Paulo Oliva, Thomas Streicher:
On Krivine's Realizability Interpretation of Classical Second-Order Arithmetic. 207-220 - John Power, Miki Tanaka:
Category Theoretic Semantics for Typed Binding Signatures with Recursion. 221-240 - Christophe Raffalli, Frédéric Ruyer:
Realizability of the Axiom of Choice in HOL. (An Analysis of Krivine's Work). 241-258 - Graham White:
Davidson and Reiter on Actions. 259-289
Volume 84, Numbers 3-4, 2008
- Alexander Clark, Chris Watkins:
Some Alternatives to Parikh Matrices Using String Kernels. 291-303 - Manfred Droste, Werner Kuich, George Rahonis:
Multi-Valued MSO Logics OverWords and Trees. 305-327 - Ali Hamzeh, Adel Rahmani:
A New Architecture for Learning Classifier Systems to Solve POMDP Problems. 329-351 - Hui-Feng Huang, Chin-Chen Chang:
A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy. 353-361 - Tseren-Onolt Ishdorj, Remco Loos, Ion Petre:
Computational Efficiency of Intermolecular Gene Assembly. 363-373 - Alexandr Kazda:
The Chain Relation in Sofic Subshifts. 375-390 - Ching-Chiuan Lin, Nien-Lin Hsueh, Wen-Hsiang Shen:
Adaptively Embedding Binary Data in an Image. 391-402 - Yong Liu, Congfu Xu, Qiong Zhang, Yunhe Pan:
Rough Rule Extracting From Various Conditions: Incremental and Approximate Approaches for Inconsistent Data. 403-427 - Swarnajyoti Patra, Susmita Ghosh, Ashish Ghosh:
Change Detection of Remote Sensing Images with Semi-supervised Multilayer Perceptron. 429-442 - Kurt Ranalter:
A Semantic Analysis of a Logic for Pragmatics with Assertions, Obligations, and Causal Implication. 443-470 - Sriparna Saha, Sanghamitra Bandyopadhyay:
Fuzzy Symmetry Based Real-Coded Genetic Clustering Technique for Automatic Pixel Classification in Remote Sensing Imagery. 471-492
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.