


default search action
Journal of Computer and System Sciences, Volume 78
Volume 78, Number 1, January 2012
- Luigi Palopoli

:
Editorʼs foreword. 1
- Vincent Conitzer, Tuomas Sandholm:

Computing optimal outcomes under an expressive representation of settings with externalities. 2-14 - Shahar Dobzinski, Noam Nisan, Michael Schapira:

Truthful randomized mechanisms for combinatorial auctions. 15-25 - Diego Calvanese

, Giuseppe De Giacomo, Maurizio Lenzerini
, Riccardo Rosati
:
View-based query answering in Description Logics: Semantics and complexity. 26-46 - Thomas Eiter, Magdalena Ortiz

, Mantas Simkus
:
Conjunctive query answering in the description logic SH using knots. 47-85 - David Pearce, Agustín Valverde:

Synonymous theories and knowledge representations in answer set programming. 86-104 - Sivan Albagli, Rachel Ben-Eliyahu-Zohary, Solomon Eyal Shimony:

Markov network based ontology matching. 105-118 - Alessandro Armando

, Enrico Giunchiglia
, Marco Maratea, Serena Elisa Ponta:
An action-based approach to the formal specification and automatic analysis of business processes under authorization constraints. 119-141
- Marko Hölbl

, Tatjana Welzer, Bostjan Brumen
:
An improved two-party identity-based authenticated key agreement protocol using pairings. 142-150 - Gregory Z. Gutin, Leo van Iersel, Matthias Mnich

, Anders Yeo
:
Every ternary permutation constraint satisfaction problem parameterized above average has a kernel with a quadratic number of variables. 151-163 - Zhi-Zhong Chen, Bin Ma, Lusheng Wang

:
A three-string approach to the closest string problem. 164-178 - Luke Mathieson

, Stefan Szeider
:
Editing graphs to satisfy degree constraints: A parameterized approach. 179-191 - Franco P. Preparata:

Accurate and precise aggregation counting. 192-197 - Henrik Björklund, Wim Martens:

The tractability frontier for NFA minimization. 198-210 - Jianer Chen, Jie Meng:

A 2k kernel for the cluster editing problem. 211-220 - Florentin Ipate:

Learning finite cover automata from queries. 221-244 - Klaus Jansen, Hu Zhang:

Scheduling malleable tasks with precedence constraints. 245-259 - Vladimir Braverman, Rafail Ostrovsky

, Carlo Zaniolo:
Optimal sampling from sliding windows. 260-272 - Yung-Hsing Peng, Chang-Biau Yang, Chiou-Ting Tseng, Chiou-Yi Hor:

A new efficient indexing algorithm for one-dimensional real scaled patterns. 273-278 - Moran Feldman

, Guy Kortsarz, Zeev Nutov:
Improved approximation algorithms for Directed Steiner Forest. 279-292 - Jürgen Dassow, Tomás Masopust

:
On restricted context-free grammars. 293-304 - Serge Gaspers, Gregory B. Sorkin

:
A universally fastest algorithm for Max 2-Sat, Max 2-CSP, and everything in between. 305-335 - Matthijs Bomhoff, Walter Kern, Georg Still:

On bounded block decomposition problems for under-specified systems of equations. 336-347 - Jürg Kohlas, Marc Pouly

, Cesar Schneuwly:
Generic local computation. 348-369 - Amir Talaei-Khoei, Terje Solvoll, Pradeep Ray

, Nandan Parameswaran:
Maintaining awareness using policies; Enabling agents to identify relevance of information. 370-391
Volume 78, Number 2, March 2012
- Helmut Veith:

Special Issue: Games in Verification. 393 - Krishnendu Chatterjee

, Thomas A. Henzinger:
A survey of stochastic ω-regular games. 394-413 - Sharon Shoham

, Orna Grumberg:
Multi-valued model checking games. 414-429 - Keijo Heljanko

, Misa Keinänen, Martin Lange, Ilkka Niemelä:
Solving parity games by a reduction to SAT. 430-440 - Barbara Jobstmann, Stefan Staber, Andreas Griesmayer, Roderick Bloem

:
Finding and fixing faults. 441-460 - Markus Lohrey

:
Model-checking hierarchical structures. 461-490
- Emilio Di Giacomo

, Walter Didimo, Giuseppe Liotta
, Henk Meijer:
Drawing a tree as a minimum spanning tree approximation. 491-503 - Jing Tian, Xianzhong Zhao:

Representations of commutative asynchronous automata. 504-516 - Nicolas Bedon, Chloé Rispal:

Schützenberger and Eilenberg theorems for words on linear orderings. 517-536 - Christos A. Kapoutsis

, Richard Královic, Tobias Mömke:
Size complexity of rotating and sweeping automata. 537-558 - Mathias Weller, Christian Komusiewicz

, Rolf Niedermeier, Johannes Uhlmann:
On making directed graphs transitive. 559-574 - Pedro C. S. Lara, Fábio Borges

, Renato Portugal, Nadia Nedjah
:
Parallel modular exponentiation using load balancing without precomputation. 575-582 - Daniel Deutch, Tova Milo:

A structural/temporal query language for Business Processes. 583-609 - Zehui Shao

, Fei Deng
, Meilian Liang, Xiaodong Xu:
On sets without k-term arithmetic progression. 610-618 - Jesper Jansson

, Kunihiko Sadakane
, Wing-Kin Sung
:
Ultra-succinct representation of ordered trees with applications. 619-631 - Raphael Yuster:

Approximate shortest paths in weighted graphs. 632-637 - Andrei A. Bulatov, Víctor Dalmau

, Martin Grohe
, Dániel Marx
:
Enumerating homomorphisms. 638-650 - Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor:

Two-server password-only authenticated key exchange. 651-669 - Ken-ichi Kawarabayashi, Yusuke Kobayashi:

A linear time algorithm for the induced disjoint paths problem in planar graphs. 670-680 - Andrei A. Bulatov, Martin E. Dyer

, Leslie Ann Goldberg, Markus Jalsenius, Mark Jerrum, David Richerby
:
The complexity of weighted and unweighted #CSP. 681-688
Volume 78, Number 3, May 2012
- Minghui Jiang:

Approximability of constrained LCS. 689-697 - Fedor V. Fomin

, Daniel Lokshtanov, Venkatesh Raman, Saket Saurabh, B. V. Raghavendra Rao
:
Faster algorithms for finding and counting subgraphs. 698-706 - Michael R. Fellows

, Fedor V. Fomin
, Daniel Lokshtanov, Frances A. Rosamond
, Saket Saurabh, Yngve Villanger:
Local search: Is brute-force avoidable? 707-719 - Guohui Lin, Randy Goebel, Zhong Li, Lusheng Wang

:
An improved approximation algorithm for the complementary maximal strip recovery problem. 720-730 - Bruno Durand, Andrei E. Romashchenko

, Alexander Shen
:
Fixed-point tile sets and their applications. 731-764 - Samir Datta

, Raghav Kulkarni, Raghunath Tewari, N. V. Vinodchandran:
Space complexity of perfect matching in bounded genus bipartite graphs. 765-779 - Benedek Nagy, Friedrich Otto:

On CD-systems of stateless deterministic R-automata with window size one. 780-806 - Tianrong Lin

:
Another approach to the equivalence of measure-many one-way quantum finite automata and its application. 807-821
- Ahmed Bouajjani, David Harel, Lenore D. Zuck:

Editorʼs foreword. 822 - Krzysztof R. Apt, Frank S. de Boer, Ernst-Rüdiger Olderog, Stijn de Gouw

:
Verification of object-oriented programs: A transformational approach. 823-852 - Ittai Balaban, Amir Pnueli, Yaniv Sa'ar, Lenore D. Zuck:

Verification of multi-linked heaps. 853-876 - Albert Benveniste, Timothy Bourke, Benoît Caillaud, Marc Pouzet:

Non-standard semantics of hybrid systems modelers. 877-910 - Roderick Bloem

, Barbara Jobstmann, Nir Piterman
, Amir Pnueli, Yaniv Sa'ar:
Synthesis of Reactive(1) designs. 911-938 - Egon Börger, Antonio Cisternino

, Vincenzo Gervasi
:
Ambient Abstract State Machines with applications. 939-959 - Nissim Francez:

When are different type-logical semantic definitions defining equivalent meanings? 960-969 - David Harel, Itai Segall:

Synthesis from scenario-based specifications. 970-980 - Orna Kupferman, Amir Pnueli, Moshe Y. Vardi:

Once and for all. 981-996
Volume 78, Number 4, July 2012
- Chunfu Wei

, Zheng Pei, Huamin Li:
An induced OWA operator in coal mine safety evaluation. 997-1005 - Prakash Ramanan:

Rewriting XPath queries using materialized XPath views. 1006-1025 - Sebastian Link

:
Characterisations of multivalued dependency implication over undetermined universes. 1026-1044 - Millist W. Vincent, Jixue Liu

, Mukesh K. Mohania:
The implication problem for 'closest node' functional dependencies in complete XML documents. 1045-1098 - Xiaowen Lou, Daming Zhu:

A new approximation algorithm for cut-and-paste sorting of unsigned circular permutations. 1099-1114 - Anahí Gajardo

, Jarkko Kari
, Andrés Moreira:
On time-symmetry in cellular automata. 1115-1126 - Yicheng Wen, Asok Ray:

Vector space formulation of probabilistic finite state automata. 1127-1141 - Amos Beimel

, Yeow Meng Chee
, Huaxiong Wang, Liang Feng Zhang:
Communication-efficient distributed oblivious transfer. 1142-1157
- Rahat Iqbal

, Nazaraf Shah
:
Information Retrieval, Decision Making Process and User Needs. 1158-1159 - Jonathan Gemmell, Thomas Schimoler, Bamshad Mobasher

, Robin D. Burke
:
Resource recommendation in social annotation systems: A linear-weighted hybrid approach. 1160-1174 - Magdalini Eirinaki

, Shamita Pisal, Japinder Singh:
Feature-based opinion mining and ranking. 1175-1184 - Haifeng Shen, Mark D. Reilly:

Personalized multi-user view and content synchronization and retrieval in real-time mobile social software applications. 1185-1203 - Adam Grzywaczewski, Rahat Iqbal

:
Task-specific information retrieval systems for software engineers. 1204-1218 - Fazilatur Rahman, Jawed I. A. Siddiqi:

Semantic annotation of digital music. 1219-1231 - Giuseppe Fenza

, Domenico Furno
, Vincenzo Loia:
Hybrid approach for context-aware service discovery in healthcare domain. 1232-1247 - Pir Abdul Rasool Qureshi, Nasrullah Memon:

Hybrid model of content extraction. 1248-1257 - Kashif Iqbal, Michael O. Odetayo

, Anne E. James
:
Content-based image retrieval approach for biometric security using colour, texture and shape features controlled by fuzzy heuristics. 1258-1277
Volume 78, Number 5, September 2012
- Jinjun Chen, Lizhe Wang

:
Special Issue: Cloud Computing 2011. 1279 - Linlin Wu, Saurabh Kumar Garg

, Rajkumar Buyya:
SLA-based admission control for a Software-as-a-Service provider in Cloud computing environments. 1280-1299 - Rafael Tolosana-Calasanz

, José Ángel Bañares
, Congduc Pham, Omer F. Rana
:
Enforcing QoS in scientific workflow systems enacted over Cloud infrastructures. 1300-1315 - Lianyong Qi

, Wanchun Dou, Xuyun Zhang
, Jinjun Chen:
A QoS-aware composition method supporting cross-platform service invocation in cloud environment. 1316-1329 - David Villegas, Norman Bobroff, Ivan Rodero

, Javier Delgado, Yanbin Liu, Aditya Devarakonda
, Liana Fong, Seyed Masoud Sadjadi, Manish Parashar:
Cloud federation in a layered service model. 1330-1344 - Jing He

, Yanchun Zhang, Guangyan Huang, Yong Shi, Jie Cao
:
Distributed data possession checking for securing multiple replicas in geographically-dispersed clouds. 1345-1358 - David W. Chadwick

, Kaniz Fatema:
A privacy preserving authorisation system for the cloud. 1359-1373 - Gaofeng Zhang, Yun Yang, Jinjun Chen:

A historical probability based noise generation strategy for privacy protection in cloud computing. 1374-1381 - Fabrizio Marozzo

, Domenico Talia
, Paolo Trunfio
:
P2P-MapReduce: Parallel data processing in dynamic Cloud environments. 1382-1402
- Alexander Rakhlin:

Foreword. 1403 - Nicolò Cesa-Bianchi, Gábor Lugosi

:
Combinatorial bandits. 1404-1422 - Arnak S. Dalalyan, Alexandre B. Tsybakov:

Sparse regression learning by aggregation and Langevin Monte-Carlo. 1423-1443 - Vitaly Feldman

:
A complete characterization of statistical query learning with applications to evolvability. 1444-1459 - Daniel J. Hsu, Sham M. Kakade, Tong Zhang:

A spectral algorithm for learning Hidden Markov Models. 1460-1480 - Adam Tauman Kalai, Varun Kanade

, Yishay Mansour:
Reliable agnostic learning. 1481-1495 - Samory Kpotufe, Sanjoy Dasgupta:

A tree-based regressor that adapts to intrinsic dimension. 1496-1515 - Alessandro Lazaric, Rémi Munos:

Learning with stochastic inputs and adversarial outputs. 1516-1537 - Yisong Yue, Josef Broder, Robert Kleinberg

, Thorsten Joachims:
The K-armed dueling bandits problem. 1538-1556
- Charles Jordan, Thomas Zeugmann:

Testable and untestable classes of first-order formulae. 1557-1578 - Prasad Chebolu, Leslie Ann Goldberg, Russell Martin:

The complexity of approximately counting stable roommate assignments. 1579-1605 - Frederic Dorn, Fedor V. Fomin

, Dimitrios M. Thilikos:
Catalan structures and dynamic programming in H-minor-free graphs. 1606-1622 - Lorenzo Carlucci, Sanjay Jain, Frank Stephan

:
Learning with ordinal-bounded memory from positive data. 1623-1636 - Jianer Chen, Jia-Hao Fan, Iyad A. Kanj, Yang Liu, Fenghui Zhang:

Multicut in trees viewed through the eyes of vertex cover. 1637-1650 - Markus Lohrey

, Sebastian Maneth, Manfred Schmidt-Schauß:
Parameter reduction and automata evaluation for grammar-compressed trees. 1651-1669
Volume 78, Number 6, November 2012
- Qun Jin, Yufeng Wang:

Special Issue on Multidisciplinary Emerging Networks and Systems. 1671-1672 - Shinsuke Kajioka, Naoki Wakamiya, Masayuki Murata

:
Autonomous and adaptive resource allocation among multiple nodes and multiple applications in heterogeneous wireless networks. 1673-1685 - Chi Lin, Guowei Wu, Feng Xia

, Mingchu Li, Lin Yao, Zhongyi Pei:
Energy efficient ant colony algorithms for data aggregation in wireless sensor networks. 1686-1702 - Eitaro Kohno, Tomoya Okazaki, Mario Takeuchi, Tomoyuki Ohta, Yoshiaki Kakuda, Masaki Aida:

Improvement of assurance including security for wireless sensor networks using dispersed data transmission. 1703-1715 - Agustinus Borgy Waluyo, David Taniar

, J. Wenny Rahayu, Ailixier Aikebaier, Makoto Takizawa
, Bala Srinivasan:
Trustworthy-based efficient data broadcast model for P2P interaction in resource-constrained wireless environments. 1716-1736 - Xinxin Fan, Mingchu Li, Jianhua Ma, Yizhi Ren, Hui Zhao, Zhiyuan Su:

Behavior-based reputation management in P2P file-sharing networks. 1737-1750 - Tadashi Dohi

, Toshikazu Uemura:
An adaptive mode control algorithm of a scalable intrusion tolerant architecture. 1751-1774 - Hong Chen

, Xiaokang Zhou, Qun Jin:
Socialized ubiquitous personal study: Toward an individualized information portal. 1775-1792
- Henning Fernau

, Carlos Martín-Vide:
From the Guest Editors. 1793-1794 - Dag Hovland

:
The inclusion problem for regular expressions. 1795-1813 - Martin Kutrib

, Andreas Malcher
:
Reversible pushdown automata. 1814-1827 - Maxime Crochemore

, Costas S. Iliopoulos, Marcin Kubica, Jakub Radoszewski, Wojciech Rytter, Tomasz Walen
:
The maximal number of cubic runs in a word. 1828-1836 - Stefano Crespi-Reghizzi

, Dino Mandrioli:
Operator precedence and the visibly pushdown property. 1837-1867 - Alberto Policriti

, Alexandru I. Tomescu
, Francesco Vezzi:
A randomized Numerical Aligner (rNA). 1868-1882 - Pablo Arrighi, Jonathan Grattage

:
Intrinsically universal n-dimensional quantum cellular automata. 1883-1898 - Wojciech Buszkowski

, Zhe Lin, Katarzyna Moroz:
Pregroup grammars with letter promotions: Complexity and context-freeness. 1899-1909 - Sanjay Jain, Qinglong Luo, Frank Stephan

:
Learnability of automatic classes. 1910-1927

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














