default search action
Theory of Computing Systems, Volume 35
Volume 35, Number 1, 2002
- Amir M. Ben-Amram, Holger Petersen:
Improved Bounds for Functions Related to Busy Beavers. 1-11 - Pierre B. A. Lecomte, Michel Rigo:
On the Representation of Real Numbers Using Regular Languages. 13-38 - Palash Sarkar, Subhamoy Maitra:
Cross-Correlation Analysis of Cryptographically Useful Boolean Functions and S-Boxes. 39-57 - Jung-Sheng Fu, Gen-Huey Chen:
Hamiltonicity of the Hierarchical Cubic Network. 59-79 - André Große, Jörg Rothe, Gerd Wechsung:
Computing Complete Graph Isomorphisms and Hamiltonian Cycles from Partial Ones. 81-93
Volume 35, Number 2, 2002
- Vijaya Ramachandran, Ramesh K. Sitaraman:
SPAA 1999 - Guest Editors' Foreword. 97 - Costas Busch, Maurice Herlihy:
Sorting and Counting Networks of Arbitrary Width and Small Depth. 99-128 - Bradley C. Kuszmaul, Dana S. Henry, Gabriel H. Loh:
A Comparison of Asymptotically Scalable Superscalar Processors. 129-150 - Girija J. Narlikar:
Scheduling Threads for Low Space Requirement and Good Locality. 151-187 - Rakesh D. Barve, Jeffrey Scott Vitter:
A Simple and Efficient Parallel Disk Mergesort. 189-215 - Christof Krick, Friedhelm Meyer auf der Heide, Harald Räcke, Berthold Vöcking, Matthias Westermann:
Data Management in Networks: Experimental Evaluation of a Provably Good Strategy. 217-245
Volume 35, Number 3, 2002
- Shang-Hua Teng:
Guest Editor's Foreward. 249 - Susanne Albers:
On Generalized Connection Caching. 251-267 - An-Chow Lai, Babak Falsafi:
Optimizing Traffic in DSM Clusters: Fine-Grain Memory Caching versus Page Migration/Replication. 269-287 - Michael A. Bender, Michael O. Rabin:
Online Scheduling of Parallel Programs on Heterogeneous Systems with Applications to Cilk. 289-304 - Robert Elsässer, Burkhard Monien, Robert Preis:
Diffusion Schemes for Load Balancing on Heterogeneous Networks. 305-320 - Umut A. Acar, Guy E. Blelloch, Robert D. Blumofe:
The Data Locality of Work Stealing. 321-347 - Ole Agesen, David Detlefs, Christine H. Flood, Alexander T. Garthwaite, Paul Alan Martin, Mark Moir, Nir Shavit, Guy L. Steele Jr.:
DCAS-Based Concurrent Deques. 349-386
Volume 35, Number 4, 2002
- Editorial Statement. 389
- Phillip B. Gibbons, John L. Bruno, Steven Phillips:
Black-Box Correctness Tests for Basic Parallel Data Structures. 391-432 - Olivier Bournez, Michael S. Branicky:
The Mortality Problem for Matrices of Low Dimensions. 433-448 - Shin Aida, Rainer Schuler, Tatsuie Tsukiji, Osamu Watanabe:
The Difference between Polynomial-Time Many-One and Truth-Table Reducibilities on Distributional Problems. 449-463 - Takashi Yokomori:
Corrigendum Learning Two-Type Automata from Queries and Counterexamples. 465-466
Volume 35, Number 5, 2002
- Mitsunori Ogihara, Anne Condon:
Guest Editors' Foreword. 469 - Andrei Paun:
P Systems with Global Rules. 471-481 - Julia Khodor, David K. Gifford:
Programmed Mutagenesis Is Universal. 483-500 - Andrzej Ehrenfeucht, Tero Harju, Ion Petre, Grzegorz Rozenberg:
Characterizing the Micronuclear Gene Patterns in Ciliates. 501-519 - Ioannis Caragiannis, Christos Kaklamanis, Evi Papaioannou:
Efficient On-Line Frequency Allocation and Call Control in Cellular Networks. 521-543 - Shimon Even, Roni Kupershtok:
Laying Out the Interconnection Network of the Transpose Bijection. 545-558 - Yingjie Liu:
The Fully Polynomial Approximation Algorithm for the 0-1 Knapsack Problem. 559-564
Volume 35, Number 6, October 2002
- Frank K. H. A. Dehne, Wolfgang Dittrich, David A. Hutchinson, Anil Maheshwari:
Bulk Synchronous Parallel Algorithms for the External Memory Model. 567-597 - Micah Adler, Arnold L. Rosenberg, Ramesh K. Sitaraman, Walter Unger:
Scheduling Time-Constrained Communication in Linear Networks. 599-623 - Grammati E. Pantziou, George P. Pentaris, Paul G. Spirakis:
Competitive Call Control in Mobile Networks. 625-639 - Johanne Cohen, Pierre Fraigniaud, Margarida Mitjana:
Polynomial-Time Algorithms for Minimum-Time Broadcast in Trees. 641-665 - Zvi Lotker, Boaz Patt-Shamir:
Average-Case Analysis of Greedy Packet Scheduling. 667-683
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.