22.12.2013 Views

Reference List of Indexed Articles

Reference List of Indexed Articles

Reference List of Indexed Articles

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

346 <strong>Reference</strong> <strong>List</strong> / Information Processing Letters 78 (2001) 337–448<br />

350. M.R. Garey, D.S. Johnson, F.P. Preparata and R.E. Tarjan, Triangulating a simple polygon 7 (4) (1978)<br />

175–179<br />

351. G. Schachtel, A noncommutative algorithm for multiplying 5 × 5 matrices using 103 multiplications 7<br />

(4) (1978) 180–182<br />

352. G. Bongiovanni and F. Luccio, On Cahit’s result on graceful permutations 7 (4) (1978) 183–184<br />

353. R.J. Lipton and R.E. Miller, A batching method for coloring planar graphs 7 (4) (1978) 185–188<br />

354. D.T. Lee and F.P. Preparata, The all nearest-neighbor problem for convex polygons 7 (4) (1978) 189–192<br />

355. R.A. Demillo and R.J. Lipton, A probabilistic remark on algebraic program testing 7 (4) (1978) 193–195<br />

356. J. Jaffe, Counting productions in context-free derivations 7 (4) (1978) 196–200<br />

357. C.E. Hughes, The equivalence <strong>of</strong> vector addition systems to a subclass <strong>of</strong> post canonical systems 7 (4)<br />

(1978) 201–204<br />

358. W. Burton, Comments on: Sorting by distributive partitioning 7 (4) (1978) 205<br />

359. W. Dobosiewicz, Author’s reply to Warren Burton’s comments on distributive partitioning sorting 7 (4)<br />

(1978) 206<br />

360. M. Boari and A. Natali, Multiple access to a tree in the context <strong>of</strong> readers and writers problem (Erratum)<br />

7 (4) (1978) 207<br />

361. K. Ruohonen, A note on language equations involving morphisms 7 (5) (1978) 209–212<br />

362. I.H. Sudborough, A note on weak operator precedence grammars 7 (5) (1978) 213–218<br />

363. S.G. Akl and G.T. Toussaint, A fast convex hull algorithm 7 (5) (1978) 219–222<br />

364. I. Bratko, Proving correctness <strong>of</strong> strategies in the AL1 assertional language 7 (5) (1978) 223–230<br />

365. M.R. Brown, A storage scheme for height-balanced trees 7 (5) (1978) 231–232<br />

366. R.K. Arora and R.K. Subramanian, Exploiting the optimal paging algorithms 7 (5) (1978) 233–236<br />

367. K. Noshita, E. Masuda and H. Machida, On the expected behaviors <strong>of</strong> the Dijkstra’s shortest path algorithm<br />

for complete graphs 7 (5) (1978) 237–243<br />

368. L. Czaja, Implementation approach to parallel systems 7 (5) (1978) 244–249<br />

369. T.H. Merrett, QT logic: Simpler and more expressive than predicate calculus 7 (6) (1978) 251–255<br />

370. V.M. Glushkov, G.E. Tseytlin and E.L. Yushchenko, Certain problems <strong>of</strong> the theory <strong>of</strong> structured programs<br />

schemes 7 (6) (1978) 256–260<br />

371. K.S. Natarajan and L.J. White, Optimum domination in weighted trees 7 (6) (1978) 261–265<br />

372. J. Demetrovics, On the number <strong>of</strong> candidate keys 7 (6) (1978) 266–269<br />

373. M. Ajtai, J. Komlós and E. Szemerédi, There is no fast single hashing algorithm 7 (6) (1978) 270–273<br />

374. M.R. Garey and R.E. Tarjan, A linear-time algorithm for finding all feedback vertices 7 (6) (1978) 274–<br />

276<br />

375. V.M. Malhotra, M.P. Kumar and S.N. Maheshwari, An O(|V | 3 ) algorithm for finding maximum flows in<br />

networks 7 (6) (1978) 277–278<br />

376. R. Giegerich and R. Wilhelm, Counter-one-pass features in one-pass compilation: A formalization using<br />

attribute grammars 7 (6) (1978) 279–284<br />

377. G. Yuval, A simple pro<strong>of</strong> <strong>of</strong> Strassen’s result 7 (6) (1978) 285–286<br />

378. E.P. Friedman and S.A. Greibach, On equivalence and subclass containment problems for deterministic<br />

context-free languages 7 (6) (1978) 287–290<br />

379. L. Czaja, Parallel implementation <strong>of</strong> path expressions 7 (6) (1978) 291–295<br />

380. A. Bykat, Convex hull <strong>of</strong> a finite set <strong>of</strong> points in two dimensions 7 (6) (1978) 296–298<br />

381. J. Shortt, An interative program to calculate Fibonacci numbers in O(log n) arithmetic operations 7 (6)<br />

(1978) 299–303<br />

382. M. Jakobsson, Huffman coding in bit-vector compression 7 (6) (1978) 304–307<br />

383. J. Teuhola, A compression method for clustered bit-vectors 7 (6) (1978) 308–311<br />

384. D.W. Clark and C.C. Green, A note on shared list structure in LISP 7 (6) (1978) 312–314<br />

385. C.H. Papadimitriou, Efficient search for rationals 8 (1) (1979) 1–4<br />

386. K. Culik II, Some decidability results about regular and pushdown translations 8 (1) (1979) 5–8<br />

387. A.S. Fraenkel, Paired sequential lists in a memory interval 8 (1) (1979) 9–10<br />

388. S.L. Osborn, Testing for existence <strong>of</strong> a covering Boyce–Codd normal form 8 (1) (1979) 11–14<br />

389. K. Inoue and I. Takanami, A note on cyclic closure operations 8 (1) (1979) 15–16<br />

390. D. Angluin, A note on a construction <strong>of</strong> Margulis 8 (1) (1979) 17–19<br />

391. S. Fortune and J. Hopcr<strong>of</strong>t, A note on Rabin’s nearest-neighbor algorithm 8 (1) (1979) 20–23<br />

392. Y. Shiloach, Edge-disjoint branching in directed multigraphs 8 (1) (1978) 24–27

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!