default search action
JCSS, Volume 72
Volume 72, Number 1, February 2006
- Daniel R. Dooly, Sally A. Goldman, Stephen Kwek:
Real-valued multiple-instance learning with queries. 1-15 - Rajiv Gandhi, Eran Halperin, Samir Khuller, Guy Kortsarz, Aravind Srinivasan:
An improved approximation algorithm for vertex cover with hard capacities. 16-33 - Jörg Flum, Martin Grohe, Mark Weyer:
Bounded fixed-parameter tractability and log2n nondeterministic bits. 34-71 - Roni Khardon, Marta Arias:
The subsumption lattice and query learning. 72-94 - Marcus Hutter:
Sequential predictions based on algorithmic complexity. 95-117 - Matthew Andrews, Lisa Zhang:
Minimizing maximum fiber requirement in optical networks. 118-131 - Leah Epstein, Tamir Tassa:
Optimal preemptive scheduling for general target functions. 132-162 - Pierre McKenzie, Thomas Schwentick, Denis Thérien, Heribert Vollmer:
The many faces of a translation. 163-179 - Gilles Geeraerts, Jean-François Raskin, Laurent Van Begin:
Expand, Enlarge and Check: New algorithms for the coverability problem of WSTS. 180-203
Volume 72, Number 2, March 2006
- Chandra Chekuri, Daniele Micciancio:
Special Issue: FOCS 2003. 205 - Subhash Khot:
Hardness of approximating the Shortest Vector Problem in high lp norms. 206-219 - Andris Ambainis:
Polynomial degree vs. quantum query complexity. 220-238 - Milena Mihail, Christos H. Papadimitriou, Amin Saberi:
On certain connectivity properties of the internet topology. 239-251 - Nayantara Bhatnagar, Parikshit Gopalan, Richard J. Lipton:
Symmetric polynomials over Zm and simultaneous communication protocols. 252-285 - Russell Impagliazzo, Bruce M. Kapron:
Logics for reasoning about cryptographic constructions. 286-320 - Boaz Barak, Yehuda Lindell, Salil P. Vadhan:
Lower bounds for non-black-box zero knowledge. 321-391 - László Lovász, Santosh S. Vempala:
Simulated annealing in convex bodies and an O*(n4) volume algorithm. 392-417
Volume 72, Number 3, May 2006
- Fan Chung Graham:
Foreword. 419 - Fan Chung Graham:
A brief overview of network algorithms. 420-424 - C. Greg Plaxton:
Approximation algorithms for hierarchical location problems. 425-443 - Richard Cole, Yevgeniy Dodis, Tim Roughgarden:
How much can taxes help selfish routing? 444-467 - Jiangzhuo Chen, Rajmohan Rajaraman, Ravi Sundaram:
Meet and merge: Approximation algorithms for confluent flows. 468-489 - Robert Elsässer, Leszek Gasieniec:
Radio communication in random graphs. 490-506
Volume 72, Number 4, June 2006
- Lars Engebretsen, Marek Karpinski:
TSP with bounded metrics. 509-546 - Stéphane Demri, François Laroussinie, Philippe Schnoebelen:
A parametric analysis of the state-explosion problem in model checking. 547-575 - David Gross-Amblard, Michel de Rougemont:
Uniform generation in spatial constraint databases and applications. 576-591 - Yehuda Hassin, David Peleg:
Average probe complexity in quorum systems. 592-616 - Blaise Genest, Anca Muscholl, Helmut Seidl, Marc Zeitoun:
Infinite-state high-level MSCs: Model-checking and realizability. 617-647 - Michael Elkin, Guy Kortsarz:
Sublogarithmic approximation for telephone multicast. 648-659 - Holger Spakowski, Rahul Tripathi:
LWPP and WPP are not uniformly gap-definable. 660-689 - Zuhua Shao:
Security of the design of time-stamped signatures. 690-705 - Chunlin Li, Layuan Li:
A distributed multiple dimensional QoS constrained resource scheduling optimization policy in computational grid. 706-726 - I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang:
A password authentication scheme over insecure networks. 727-740 - Hui-Cheng Xia, Deng-Feng Li, Ji-Yan Zhou, Jian-Ming Wang:
Fuzzy LINMAP method for multiattribute decision making under fuzzy environments. 741-759 - John M. Hitchcock, N. V. Vinodchandran:
Dimension, entropy rates, and compression. 760-782
- Birgit Jenner, Johannes Köbler, Pierre McKenzie, Jacobo Torán:
Corrigendum to "Completeness results for graph isomorphism" [J. Comput. System Sci. 66(2003) 549-566]. 783
Volume 72, Number 5, August 2006
- Moses Charikar:
Guest editor's foreword. 785 - Amnon Ta-Shma, David Zuckerman, Shmuel Safra:
Extractors from Reed-Muller codes. 786-812 - Camil Demetrescu, Giuseppe F. Italiano:
Fully dynamic all pairs shortest paths with real edge weights. 813-837 - Lisa Fleischer, Kamal Jain, David P. Williamson:
Iterative rounding 2-approximation algorithms for minimum-cost vertex connectivity problems. 838-867 - Jittat Fakcharoenphol, Satish Rao:
Planar graphs, negative weight edges, shortest paths, and near linear time. 868-889 - Yair Bartal, Béla Bollobás, Manor Mendel:
Ramsey-type theorems for metric spaces with applications to online problems. 890-921 - Tim Roughgarden:
On the severity of Braess's Paradox: Designing networks for selfish users is hard. 922-953
Volume 72, Number 6, September 2006
- Yogish Sabharwal, Nishant Sharma, Sandeep Sen:
Nearest neighbors search using point location in balls with applications to approximate Voronoi decompositions. 955-977 - Mario Di Raimondo, Rosario Gennaro:
Provably secure threshold password-authenticated key exchange. 978-1001 - Hung-Min Sun, Her-Tyan Yeh:
Password-based authentication and key distribution protocols with perfect forward secrecy. 1002-1011 - Michal Parnas, Dana Ron, Ronitt Rubinfeld:
Tolerant property testing and distance approximation. 1012-1042 - Elmar Böhler, Christian Glaßer, Daniel Meister:
Error-bounded probabilistic computations between MA and AM. 1043-1076 - James Aspnes, Kevin L. Chang, Aleksandr Yampolskiy:
Inoculation strategies for victims of viruses and the sum-of-squares partition problem. 1077-1093 - Anand Srinivasan, James H. Anderson:
Optimal rate-based scheduling on multiprocessors. 1094-1117
Volume 72, Number 7, November 2006
- Irfan Awan:
Performance modelling and evaluation of computer systems. 1119-1120 - Armando Ferro, Igor Delgado, Alejandro Muñoz, Fidel Liberal:
An analytical model for loss estimation in network traffic analysis systems. 1121-1133 - Alessio Botta, Donato Emma, Antonio Pescapè, Giorgio Ventre:
Systematic performance modeling and characterization of heterogeneous IP networks. 1134-1143 - Inn Inn Er, Winston Khoon Guan Seah:
Clustering overhead and convergence time analysis of the mobility-based multi-hop clustering algorithm for mobile ad hoc networks. 1144-1155 - Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph:
Determining model accuracy of network traces. 1156-1171 - Ella Grishikashvili Pereira, Rubem Pereira, A. Taleb-Bendiab:
Performance evaluation for self-healing distributed services and fault detection mechanisms. 1172-1182 - Makoto Ikeda, Leonard Barolli, Akio Koyama, Arjan Durresi, Giuseppe De Marco, Jiro Iwashige:
Performance evaluation of an intelligent CAC and routing framework for multimedia applications in broadband networks. 1183-1200 - Guang Tan, Stephen A. Jarvis:
Prediction of short-lived TCP transfer latency on bandwidth asymmetric links. 1201-1210 - Satoshi Itaya, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa:
HAMS: Scalable peer-to-peer multimedia streaming model in heterogeneous networks. 1211-1225 - Muhammad Younas, Kuo-Ming Chao:
A tentative commit protocol for composite web services. 1226-1237 - Lin Guan, Michael E. Woodward, Irfan-Ullah Awan:
Control of queueing delay in a buffer with time-varying arrival rate. 1238-1248
Volume 72, Number 8, December 2006
- Jon Grov, Ragnar Normann:
Technical note: Replication graphs revisited. 1251-1261
- Bogdan S. Chlebus, Dariusz R. Kowalski:
Robust gossiping with an application to consensus. 1262-1281 - Michael Elkin:
A faster distributed protocol for constructing a minimum spanning tree. 1282-1308 - Fan R. K. Chung, Ronald L. Graham, Ranjita Bhagwan, Stefan Savage, Geoffrey M. Voelker:
Maximizing data locality in distributed systems. 1309-1316 - Christopher L. Barrett, Harry B. Hunt III, Madhav V. Marathe, S. S. Ravi, Daniel J. Rosenkrantz, Richard Edwin Stearns:
Complexity of reachability problems for finite discrete dynamical systems. 1317-1345 - Jianer Chen, Xiuzhen Huang, Iyad A. Kanj, Ge Xia:
Strong computational lower bounds via parameterized complexity. 1346-1367 - Yousuke Takada, Teijiro Isokawa, Ferdinand Peper, Nobuyuki Matsui:
Construction universality in purely asynchronous cellular automata. 1368-1385 - Jiong Guo, Jens Gramm, Falk Hüffner, Rolf Niedermeier, Sebastian Wernicke:
Compression-based fixed-parameter algorithms for feedback vertex set and edge bipartization. 1386-1396 - Sara Gradara, Antonella Santone, Maria Luisa Villani:
DELFIN+: An efficient deadlock detection tool for CCS processes. 1397-1412
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.