22.12.2013 Views

Reference List of Indexed Articles

Reference List of Indexed Articles

Reference List of Indexed Articles

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

364 <strong>Reference</strong> <strong>List</strong> / Information Processing Letters 78 (2001) 337–448<br />

1066. M. Chrobak and B.S. Chlebus, Probabilistic Turing machines and recursively enumerable Dedekind cuts<br />

19 (4) (1984) 167–171<br />

1067. Ph. Darondeau and L. Kott, Towards a formal pro<strong>of</strong> system for ω-rational expressions 19 (4) (1984)<br />

173–177<br />

1068. M. Chrobak, A note on bounded-reversal multipushdown machines 19 (4) (1984) 179–180<br />

1069. D. Grune, How to produce all sentences from a two-level grammar 19 (4) (1984) 181–185<br />

1070. A. Carpi, On the centers <strong>of</strong> the set <strong>of</strong> weakly square-free words on a two letter alphabet 19 (4) (1984)<br />

187–190<br />

1071. J. Král, On s<strong>of</strong>tware equations 19 (4) (1984) 191–196<br />

1072. M. Kallay, The complexity <strong>of</strong> incremental convex hull algorithms in R d 19 (4) (1984) 197<br />

1073. C.H.C. Leung, Approximate storage utilisation <strong>of</strong> B-trees: A simple derivation and generalisations 19 (4)<br />

(1984) 199–201<br />

1074. T.R. Walsh, How evenly should one divide to conquer quickly? 19 (4) (1984) 203–208<br />

1075. L.W. Dowdy, D.L. Eager, K.D. Gordon and L.V. Saxton, Throughput concavity and response time<br />

convexity 19 (4) (1984) 209–212<br />

1076. J. Karhumäki and D. Wood, Inverse morphic equivalence on languages 19 (5) (1984) 213–218<br />

1077. G.N. Frederickson, On linear-time algorithms for five-coloring planar graphs 19 (5) (1984) 219–224<br />

1078. E. Mäkinen, On derivation preservation 19 (5) (1984) 225–228<br />

1079. D. Wood, The contour problem for rectilinear polygons 19 (5) (1984) 229–236<br />

1080. P. Bourret, How to estimate the sizes <strong>of</strong> domains 19 (5) (1984) 237–243<br />

1081. G. Tourlakis, An inductive number-theoretic characterization <strong>of</strong> NP 19 (5) (1984) 245–247<br />

1082. J. Vyskoč, A note on Boolean matrix multiplication 19 (5) (1984) 249–251<br />

1083. P. McKenzie, Permutations <strong>of</strong> bounded degree generate groups <strong>of</strong> polynomial diameter 19 (5) (1984)<br />

253–254<br />

1084. G. Gursel and P. Scheuermann, Asserting the optimality <strong>of</strong> serial SJRPs processing simple queries in chain<br />

networks 19 (5) (1984) 255–260<br />

1085. C. Duboc, Some properties <strong>of</strong> commutation in free partially commutative monoids 20 (1) (1985) 1–4<br />

1086. R.V. Book and F. Otto, Cancellation rules and extended word problems 20 (1) (1985) 5–11<br />

1087. A. Mirzaian and E. Arjomandi, Selection in X + Y and matrices with sorted rows and columns 20 (1)<br />

(1985) 13–17<br />

1088. E. Mäkinen, A note on undercover relation 20 (1) (1985) 19–21<br />

1089. G.P. McKeown, A special purpose MIMD parallel processor 20 (1) (1985) 23–27<br />

1090. S. Upendra Rao and A.K. Majumdar, An algorithm for local compaction <strong>of</strong> horizontal microprograms 20<br />

(1) (1985) 29–33<br />

1091. S. Passy and T. Tinchev, PDL with data constants 20 (1) (1985) 35–41<br />

1092. S.L. Meira, A linear applicative solution for the Set Union Problem 20 (1) (1985) 43–45<br />

1093. A.C. Bounas, Direct determination <strong>of</strong> a ‘seed’ binary matrix 20 (1) (1985) 47–50<br />

1094. S. Jajodia, On equivalence <strong>of</strong> relational and network database models 20 (1) (1985) 51–54<br />

1095. G. Bilardi and F.P. Preparata, The VLSI optimality <strong>of</strong> the AKS sorting network 20 (2) (1985) 55–59<br />

1096. D.A. Plaisted, The undecidability <strong>of</strong> self-embedding for term rewriting systems 20 (2) (1985) 61–64<br />

1097. J.L.A. van de Snepscheut, Evaluating expressions with a queue 20 (2) (1985) 65–66<br />

1098. J. McLean, A comment on the ‘Basic Security Theorem’ <strong>of</strong> Bell and LaPadula 20 (2) (1985) 67–70<br />

1099. K. Noshita, Translation <strong>of</strong> turner combinators in O(n log n) space 20 (2) (1985) 71–74<br />

1100. P. Widmayer and C.K. Wong, An optimal algorithm for the maximum alignment <strong>of</strong> terminals 20 (2)<br />

(1985) 75–82<br />

1101. S.R. Thatte, On the correspondence between two classes <strong>of</strong> reduction systems 20 (2) (1985) 83–85<br />

1102. D. Harel and D. Peleg, More on looping vs. repeating in dynamic logic 20 (2) (1985) 87–90<br />

1103. A.J. Auzins and E.B. Kinber, On separation <strong>of</strong> the emptiness and equivalence problems for program<br />

schemes 20 (2) (1985) 91–93<br />

1104. D. Beauquier and D. Perrin, Codeterministic automata on infinite words 20 (2) (1985) 95–98<br />

1105. E. Ukkonen, Upper bounds on the size <strong>of</strong> LR(k) parsers 20 (2) (1985) 99–103<br />

1106. M.G. Main, An infinite square-free co-CFL 20 (2) (1985) 105–107<br />

1107. S.C. Kak, How to detect tampering <strong>of</strong> data 20 (2) (1985) 109–110<br />

1108. E.C. Njau, Details <strong>of</strong> distortions in the computed Fourier transforms <strong>of</strong> signals. Part I: Short periodic<br />

signals 20 (3) (1985) 111–113

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!