22.12.2013 Views

Reference List of Indexed Articles

Reference List of Indexed Articles

Reference List of Indexed Articles

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

340 <strong>Reference</strong> <strong>List</strong> / Information Processing Letters 78 (2001) 337–448<br />

106. L.W. Jackson and S. Dasgupta, The identification <strong>of</strong> parallel micro-operations 2 (6) (1974) 180–184<br />

107. K.P. Lee and G. Rozenberg, The length sets <strong>of</strong> D0L languages are uniformly bounded 2 (6) (1974) 185–<br />

188<br />

108. J. Minker and G.J. VanderBrug, The Earley algorithm as a problem representation 3 (1) (1974) 1–7<br />

109. K. Noshita, Median selection <strong>of</strong> 9 elements in 14 comparisons 3 (1) (1974) 8–12<br />

110. R.E. Tarjan, A new algorithm for finding weak components 3 (1) (1974) 13–15<br />

111. L.W. Cooprider, F. Heymans, P.J. Courtois and D.L. Parnas, Information streams sharing a finite buffer:<br />

Other solutions 3 (1) (1974) 16–21<br />

112. J. van Leeuwen and C.H. Smith, An improved bound for detecting looping configurations in deterministic<br />

DPA’s 3 (1) (1974) 22–24<br />

113. O.H. Ibarra, A note on semilinear sets and bounded-reversal multihead pushdown automata 3 (1) (1974)<br />

25–28<br />

114. D.A. Fisher, Bounded workspace garbage collection in an address-order preserving list processing<br />

environment 3 (1) (1974) 29–32<br />

115. A.D. Jovanovich, Note on a modification <strong>of</strong> the fundamental cycles finding algorithm 3 (1) (1974) 33<br />

116. T. Takaoka, A note on the ambiguity <strong>of</strong> context-free grammars 3 (2) (1974) 35–36<br />

117. J.A. Campbell, Optimal use <strong>of</strong> storage in a simple model <strong>of</strong> garbage collection 3 (2) (1974) 37–38<br />

118. M.V. Zelkowitz, Structured operating system organization 3 (2) (1974) 39–42<br />

119. L.E. Deimel Jr., Remark on the computational power <strong>of</strong> a Turing machine variant 3 (2) (1974) 43–45<br />

120. S. Arnborg, Abstract computation model used for a production compiler 3 (2) (1974) 46–50<br />

121. R.E. Tarjan, A good algorithm for edge-disjoint branching 3 (2) (1974) 51–53<br />

122. K. Kobayashi, A note on extending equivalence theories <strong>of</strong> algorithms 3 (2) (1974) 54–56<br />

123. N.S. Sridharan, Computer generation <strong>of</strong> vertex graphs 3 (2) (1974) 57–63<br />

124. R.J. Lipton and R.W. Tuttle, A synchronization anomaly 3 (3) (1975) 65–66<br />

125. C. Hosono, On the cardinality <strong>of</strong> some lattices 3 (3) (1975) 67–68<br />

126. S.H. von Solms, On T0L languages over terminals 3 (3) (1975) 69–70<br />

127. S. Dasgupta and J. Tartar, On the minimization <strong>of</strong> control memories 3 (3) (1975) 71–74<br />

128. T. Kameda, On the vector representation <strong>of</strong> the reachability in planar directed graphs 3 (3) (1975) 75–77<br />

129. S. Crespi-Reghizzi and D. Mandrioli, A decidability theorem for a class <strong>of</strong> vector-addition systems 3 (3)<br />

(1975) 78–80<br />

130. P.M. Camerini and F. Maffioli, Bounds for 3-matroid intersection problems 3 (3) (1975) 81–83<br />

131. J.F. Reiser and D.E. Knuth, Evading the drift in floating-point addition 3 (3) (1975) 84–87<br />

132. I. Dal Bono, M. Diligenti, C. Mosca, A. Ricci and A. Villani, A simple FORTRAN support for computerassisted<br />

instruction 3 (3) (1975) 88–90<br />

133. K. Weihrauch, Program schemata with polynomial bounded counters 3 (3) (1975) 91–96<br />

134. S. Galand and G. Loncour, Structured implementation <strong>of</strong> symbolic execution: A first part in a program<br />

verifier 3 (4) (1975) 97–103<br />

135. J. Cohen, Interpretation <strong>of</strong> non-deterministic algorithms in higher-level languages 3 (4) (1975) 104–109<br />

136. F. Gavril, An algorithm for testing chordality <strong>of</strong> graphs 3 (4) (1975) 110–112<br />

137. G. Yuval, Finding near neighbours in K-dimensional space 3 (4) (1975) 113–114<br />

138. I. Cahit and R. Cahit, On the graceful numbering <strong>of</strong> spanning trees 3 (4) (1975) 115–118<br />

139. B. Wegbreit, Retrieval from context trees 3 (4) (1975) 119–120<br />

140. S. De Wolf and G. De Mey, Numerical methods for solving integral equations <strong>of</strong> potential problems 3<br />

(4) (1975) 121–124<br />

141. J.M. Robson, A simple solution to the interleaved memory bandwidth problem 3 (4) (1975) 125–126<br />

142. C. Lazos, A comparison <strong>of</strong> simulation results and a mathematical model <strong>of</strong> a multiprogramming system<br />

3 (5) (1975) 127–134<br />

143. J. Kittler, On the divergence and the Joshi dependence measure in feature selection 3 (5) (1975) 135–137<br />

144. J. van Leeuwen, The membership question for ET0L-languages is polynomially complete 3 (5) (1975)<br />

138–143<br />

145. F.P. Preparata and D.E. Muller, The time required to evaluate division-free arithmetic expressions 3 (5)<br />

(1975) 144–146<br />

146. H. Asai and S.C. Lee, Design <strong>of</strong> queuing buffer register size 3 (5) (1975) 147–152<br />

147. A. Stevens, An elementary computer algorithm for the calculation <strong>of</strong> the coefficient <strong>of</strong> inbreeding 3 (5)<br />

(1975) 153–163

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!