The SCEAS System
Navigation Menu

Journals in DBLP

Inf. Process. Lett.
2005, volume: 95, number: 5

  1. Bruno Blanchet
    Security protocols: from linear to classical logic by abstract interpretation. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2005, v:95, n:5, pp:473-479 [Journal]
  2. Kyung-Sub Min, Hyoung-Joo Kim
    A path-based node filtering method for efficient structural joins, . [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2005, v:95, n:5, pp:480-486 [Journal]
  3. Maurice H. ter Beek, Jetty Kleijn
    Modularity for teams of I/O automata. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2005, v:95, n:5, pp:487-495 [Journal]
  4. Ian F. Blake, V. Kumar Murty, Guangwu Xu
    A note on window tau-NAF algorithm. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2005, v:95, n:5, pp:496-502 [Journal]
  5. Kengo Katayama, Akihiro Hamamoto, Hiroyuki Narihisa
    An effective local search for the maximum clique problem. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2005, v:95, n:5, pp:503-511 [Journal]
  6. Abraham P. Punnen, Olena Chapovska
    The bottleneck k-MST. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2005, v:95, n:5, pp:512-517 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002