


default search action
Fundamenta Informaticae, Volume 84
Volume 84, Number 1, 2008
- Amihood Amir, Avivit Levy, Liron Reuveni:

The Practical Efficiency of Convolutions in Pattern Matching Algorithms. 1-15 - Kangho Roh, Maxime Crochemore, Costas S. Iliopoulos, Kunsoo Park:

External Memory Algorithms for String Problems. 17-32 - Hui Zhang, Qing Guo, Costas S. Iliopoulos:

Algorithms for Computing the lambda-regularities in Strings. 33-49 - Andrei V. Kelarev:

An Algorithm for BCH Codes Extended with Finite State Automata. 51-60 - Hongwei Luo, Kathy J. Horadam:

Simulation and Measurement of Complex Network Growth: the Interplay of Uniform and Preferential Attachment. 61-79 - Eunhui Park, Kunsoo Park:

An Improved Boolean Circuit for Maximum Matching in a Convex Bipartite Graph. 81-97 - James G. Lefevre, Diane M. Donovan, Ales Drápal:

Permutation Representation of 3 and 4-Homogenous Latin Bitrades. 99-110 - Orestes Bueno, Prabhu Manyem:

Polynomial-TimeMaximisation Classes: Syntactic Hierarchy. 111-133 - Jia F. Weng, James MacGregor Smith, Marcus Brazil, Doreen A. Thomas:

Equivalence, Indicators, Quasi-indicators and Optimal Steiner Topologies on Four Points in Space. 135-149
Volume 84, Number 2, 2008
- Nicholas Asher:

A Type Driven Theory of Predication with Complex Types. 151-183 - Corrado Biasi, Federico Aschieri:

A Term Assignment for Polarized Bi-intuitionistic Logic and its Strong Normalization. 185-205 - Paulo Oliva, Thomas Streicher:

On Krivine's Realizability Interpretation of Classical Second-Order Arithmetic. 207-220 - John Power, Miki Tanaka:

Category Theoretic Semantics for Typed Binding Signatures with Recursion. 221-240 - Christophe Raffalli, Frédéric Ruyer:

Realizability of the Axiom of Choice in HOL. (An Analysis of Krivine's Work). 241-258 - Graham White:

Davidson and Reiter on Actions. 259-289
Volume 84, Numbers 3-4, 2008
- Alexander Clark, Chris Watkins:

Some Alternatives to Parikh Matrices Using String Kernels. 291-303 - Manfred Droste, Werner Kuich, George Rahonis

:
Multi-Valued MSO Logics OverWords and Trees. 305-327 - Ali Hamzeh, Adel Rahmani:

A New Architecture for Learning Classifier Systems to Solve POMDP Problems. 329-351 - Hui-Feng Huang, Chin-Chen Chang:

A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy. 353-361 - Tseren-Onolt Ishdorj, Remco Loos, Ion Petre:

Computational Efficiency of Intermolecular Gene Assembly. 363-373 - Alexandr Kazda:

The Chain Relation in Sofic Subshifts. 375-390 - Ching-Chiuan Lin, Nien-Lin Hsueh, Wen-Hsiang Shen:

Adaptively Embedding Binary Data in an Image. 391-402 - Yong Liu, Congfu Xu, Qiong Zhang, Yunhe Pan:

Rough Rule Extracting From Various Conditions: Incremental and Approximate Approaches for Inconsistent Data. 403-427 - Swarnajyoti Patra, Susmita Ghosh, Ashish Ghosh:

Change Detection of Remote Sensing Images with Semi-supervised Multilayer Perceptron. 429-442 - Kurt Ranalter:

A Semantic Analysis of a Logic for Pragmatics with Assertions, Obligations, and Causal Implication. 443-470 - Sriparna Saha, Sanghamitra Bandyopadhyay:

Fuzzy Symmetry Based Real-Coded Genetic Clustering Technique for Automatic Pixel Classification in Remote Sensing Imagery. 471-492

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














