Reference List of Indexed Articles
Reference List of Indexed Articles
Reference List of Indexed Articles
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
340 <strong>Reference</strong> <strong>List</strong> / Information Processing Letters 78 (2001) 337–448<br />
106. L.W. Jackson and S. Dasgupta, The identification <strong>of</strong> parallel micro-operations 2 (6) (1974) 180–184<br />
107. K.P. Lee and G. Rozenberg, The length sets <strong>of</strong> D0L languages are uniformly bounded 2 (6) (1974) 185–<br />
188<br />
108. J. Minker and G.J. VanderBrug, The Earley algorithm as a problem representation 3 (1) (1974) 1–7<br />
109. K. Noshita, Median selection <strong>of</strong> 9 elements in 14 comparisons 3 (1) (1974) 8–12<br />
110. R.E. Tarjan, A new algorithm for finding weak components 3 (1) (1974) 13–15<br />
111. L.W. Cooprider, F. Heymans, P.J. Courtois and D.L. Parnas, Information streams sharing a finite buffer:<br />
Other solutions 3 (1) (1974) 16–21<br />
112. J. van Leeuwen and C.H. Smith, An improved bound for detecting looping configurations in deterministic<br />
DPA’s 3 (1) (1974) 22–24<br />
113. O.H. Ibarra, A note on semilinear sets and bounded-reversal multihead pushdown automata 3 (1) (1974)<br />
25–28<br />
114. D.A. Fisher, Bounded workspace garbage collection in an address-order preserving list processing<br />
environment 3 (1) (1974) 29–32<br />
115. A.D. Jovanovich, Note on a modification <strong>of</strong> the fundamental cycles finding algorithm 3 (1) (1974) 33<br />
116. T. Takaoka, A note on the ambiguity <strong>of</strong> context-free grammars 3 (2) (1974) 35–36<br />
117. J.A. Campbell, Optimal use <strong>of</strong> storage in a simple model <strong>of</strong> garbage collection 3 (2) (1974) 37–38<br />
118. M.V. Zelkowitz, Structured operating system organization 3 (2) (1974) 39–42<br />
119. L.E. Deimel Jr., Remark on the computational power <strong>of</strong> a Turing machine variant 3 (2) (1974) 43–45<br />
120. S. Arnborg, Abstract computation model used for a production compiler 3 (2) (1974) 46–50<br />
121. R.E. Tarjan, A good algorithm for edge-disjoint branching 3 (2) (1974) 51–53<br />
122. K. Kobayashi, A note on extending equivalence theories <strong>of</strong> algorithms 3 (2) (1974) 54–56<br />
123. N.S. Sridharan, Computer generation <strong>of</strong> vertex graphs 3 (2) (1974) 57–63<br />
124. R.J. Lipton and R.W. Tuttle, A synchronization anomaly 3 (3) (1975) 65–66<br />
125. C. Hosono, On the cardinality <strong>of</strong> some lattices 3 (3) (1975) 67–68<br />
126. S.H. von Solms, On T0L languages over terminals 3 (3) (1975) 69–70<br />
127. S. Dasgupta and J. Tartar, On the minimization <strong>of</strong> control memories 3 (3) (1975) 71–74<br />
128. T. Kameda, On the vector representation <strong>of</strong> the reachability in planar directed graphs 3 (3) (1975) 75–77<br />
129. S. Crespi-Reghizzi and D. Mandrioli, A decidability theorem for a class <strong>of</strong> vector-addition systems 3 (3)<br />
(1975) 78–80<br />
130. P.M. Camerini and F. Maffioli, Bounds for 3-matroid intersection problems 3 (3) (1975) 81–83<br />
131. J.F. Reiser and D.E. Knuth, Evading the drift in floating-point addition 3 (3) (1975) 84–87<br />
132. I. Dal Bono, M. Diligenti, C. Mosca, A. Ricci and A. Villani, A simple FORTRAN support for computerassisted<br />
instruction 3 (3) (1975) 88–90<br />
133. K. Weihrauch, Program schemata with polynomial bounded counters 3 (3) (1975) 91–96<br />
134. S. Galand and G. Loncour, Structured implementation <strong>of</strong> symbolic execution: A first part in a program<br />
verifier 3 (4) (1975) 97–103<br />
135. J. Cohen, Interpretation <strong>of</strong> non-deterministic algorithms in higher-level languages 3 (4) (1975) 104–109<br />
136. F. Gavril, An algorithm for testing chordality <strong>of</strong> graphs 3 (4) (1975) 110–112<br />
137. G. Yuval, Finding near neighbours in K-dimensional space 3 (4) (1975) 113–114<br />
138. I. Cahit and R. Cahit, On the graceful numbering <strong>of</strong> spanning trees 3 (4) (1975) 115–118<br />
139. B. Wegbreit, Retrieval from context trees 3 (4) (1975) 119–120<br />
140. S. De Wolf and G. De Mey, Numerical methods for solving integral equations <strong>of</strong> potential problems 3<br />
(4) (1975) 121–124<br />
141. J.M. Robson, A simple solution to the interleaved memory bandwidth problem 3 (4) (1975) 125–126<br />
142. C. Lazos, A comparison <strong>of</strong> simulation results and a mathematical model <strong>of</strong> a multiprogramming system<br />
3 (5) (1975) 127–134<br />
143. J. Kittler, On the divergence and the Joshi dependence measure in feature selection 3 (5) (1975) 135–137<br />
144. J. van Leeuwen, The membership question for ET0L-languages is polynomially complete 3 (5) (1975)<br />
138–143<br />
145. F.P. Preparata and D.E. Muller, The time required to evaluate division-free arithmetic expressions 3 (5)<br />
(1975) 144–146<br />
146. H. Asai and S.C. Lee, Design <strong>of</strong> queuing buffer register size 3 (5) (1975) 147–152<br />
147. A. Stevens, An elementary computer algorithm for the calculation <strong>of</strong> the coefficient <strong>of</strong> inbreeding 3 (5)<br />
(1975) 153–163