22.12.2013 Views

Reference List of Indexed Articles

Reference List of Indexed Articles

Reference List of Indexed Articles

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

376 <strong>Reference</strong> <strong>List</strong> / Information Processing Letters 78 (2001) 337–448<br />

1532. R.S. Sandhu, Cryptographic implementation <strong>of</strong> a tree hierarchy for access control 27 (2) (1988) 95–98<br />

1533. N.J. Patterson and K.J. Supowit, Finding the vertices nearest to a point in a hypercube 27 (2) (1988)<br />

99–102<br />

1534. A.M. Frieze, On the random construction <strong>of</strong> heaps 27 (2) (1988) 103–109<br />

1535. L. Holenderski and A. Szalas, Propositional description <strong>of</strong> finite cause-effect structures 27 (3) (1988)<br />

111–117<br />

1536. D.S. Johnson, M. Yannakakis and C.H. Papadimitriou, On generating all maximal independent sets 27<br />

(3) (1988) 119–123<br />

1537. K. Mehlhorn, A faster approximation algorithm for the Steiner problem in graphs 27 (3) (1988) 125–128<br />

1538. S. Chandran and A. Rosenfeld, Order statistics on a hypercube 27 (3) (1988) 129–132<br />

1539. A.A. Bertossi, Parallel circle-cover algorithms 27 (3) (1988) 133–139<br />

1540. S.A. Cook and M. Luby, A simple parallel algorithm for finding a satisfying truth assignment to a 2-CNF<br />

formula 27 (3) (1988) 141–145<br />

1541. J. Berman and W.J. Blok, Positive Boolean dependencies 27 (3) (1988) 147–150<br />

1542. O. Watanabe, On hardness <strong>of</strong> one-way functions 27 (3) (1988) 151–157<br />

1543. J. Leszczylowski, S. Bonnier and J. Maluszyński, Logic programming with external procedures:<br />

Introducing S-unification 27 (3) (1988) 159–165<br />

1544. Y.H. Tsin, On handling vertex deletion in updating minimum spanning trees 27 (4) (1988) 167–168<br />

1545. K.V.S. Ramarao, R. Daley and R. Melhem, Message complexity <strong>of</strong> the set intersection problem 27 (4)<br />

(1988) 169–174<br />

1546. H. Rohnert, Time and space efficient algorithms for shortest paths between convex polygons 27 (4)<br />

(1988) 175–179<br />

1547. R. Koo and S. Toueg, Effects <strong>of</strong> message loss on the termination <strong>of</strong> distributed protocols 27 (4) (1988)<br />

181–188<br />

1548. U. Faigle and R. Schrader, On the convergence <strong>of</strong> stationary distributions in simulated annealing algorithms<br />

27 (4) (1988) 189–194<br />

1549. A.-H. Esfahanian and S.L. Hakimi, On computing a conditional edge-connectivity <strong>of</strong> a graph 27 (4)<br />

(1988) 195–199<br />

1550. A. Szepietowski, Remarks on languages acceptable in log log n space 27 (4) (1988) 201–203<br />

1551. D. Roelants van Baronaigien and F. Ruskey, Generating t-ary trees in A-order 27 (4) (1988) 205–213<br />

1552. K.M. Bugrara and P.W. Purdom, An exponential lower bound for the pure literal rule 27 (4) (1988) 215–<br />

219<br />

1553. C. Savage, Recognizing majority on a one-way mesh 27 (5) (1988) 221–225<br />

1554. H. Jung and K. Mehlhorn, Parallel algorithms for computing maximal independent sets in trees and for<br />

updating minimum spanning trees 27 (5) (1988) 227–236<br />

1555. T. Krishnaprasad, On the computability <strong>of</strong> circumscription 27 (5) (1988) 237–243<br />

1556. B.P. Weems, A study <strong>of</strong> page arrangements for extendible hashing 27 (5) (1988) 245–248<br />

1557. A. Kumar and V.M. Malhotra, A new computation rule for Prolog 27 (5) (1988) 249–252<br />

1558. K. Itano, Y. Sato, H. Hirai and T. Yamagata, An incremental pattern matching algorithm for the pipelined<br />

lexical scanner 27 (5) (1988) 253–258<br />

1559. H.N. Gabow and R.E. Tarjan, A linear-time algorithm for finding a minimum spanning pseud<strong>of</strong>orest 27<br />

(5) (1988) 259–263<br />

1560. M. Křivánek, The complexity <strong>of</strong> ultrametric partitions on graphs 27 (5) (1988) 265–270<br />

1561. G. Ramalingam and C. Pandu Rangan, A unified approach to domination problems on interval graphs 27<br />

(5) (1988) 271–274<br />

1562. J. Matoušek, Line arrangements and range search 27 (6) (1988) 275–280<br />

1563. A. De Luca and S. Varricchio, On the factors <strong>of</strong> the Thue–Morse word on three symbols 27 (6) (1988)<br />

281–285<br />

1564. H.L. Bodlaender, A better lower bound for distributed leader finding in bidirectional asynchronous rings<br />

<strong>of</strong> processors 27 (6) (1988) 287–290<br />

1565. M. Hsu and S.E. Madnick, Shifting timestamps for concurrency control in an information hierarchy 27<br />

(6) (1988) 291–297<br />

1566. S. Kutten, Optimal fault-tolerant distributed construction <strong>of</strong> a spanning forest 27 (6) (1988) 299–307<br />

1567. E. Orlowska, Pro<strong>of</strong> system for weakest prespecification 27 (6) (1988) 309–313<br />

1568. M.A. Sridhar, On the connectivity <strong>of</strong> the De Bruijn graph 27 (6) (1988) 315–318

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!