Jacek Witaszek A Practical Method for Finding the Optimum Postponement Transformation for LR(k) Parsers. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1988, v:27, n:2, pp:63-67 [Journal]
Mukesh Singhal, Yelena Yesha A Polynomial Algorithm for Computation of the Probability of Conflicts in a Database Under Arbitrary Data Access Distribution. [Citation Graph (2, 0)][DBLP] Inf. Process. Lett., 1988, v:27, n:2, pp:69-74 [Journal]
Ravi S. Sandhu Cryptographic Implementation of a Tree Hierarchy for Access Control. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1988, v:27, n:2, pp:95-98 [Journal]