


default search action
JCSS, Volume 75
Volume 75, Number 1, January 2009
- Lisa Hellerstein, Hans Ulrich Simon

:
Special Issue: Learning Theory 2006. 1 - Adam R. Klivans, Alexander A. Sherstov:

Cryptographic hardness for learning intersections of halfspaces. 2-12 - Vitaly Feldman

:
Hardness of approximate two-level logic minimization and PAC learning with membership queries. 13-26 - Lance Fortnow, Adam R. Klivans:

Efficient learning algorithms yield circuit lower bounds. 27-36 - Benjamin I. P. Rubinstein

, Peter L. Bartlett
, J. Hyam Rubinstein
:
Shifting: One-inclusion mistake bounds and sample compression. 37-59 - Dana Angluin, James Aspnes, Jiang Chen, Yinghua Wu:

Learning a circuit by injecting values. 60-77 - Maria-Florina Balcan, Alina Beygelzimer, John Langford:

Agnostic active learning. 78-89
Volume 75, Number 2, February 2009
- Jonathan Katz, Chiu-Yuen Koo:

On expected constant-round protocols for Byzantine agreement. 91-112 - Lila Kari, Shinnosuke Seki:

On pseudoknot-bordered words and their properties. 113-121 - Leah Epstein

, Asaf Levin
:
Better bounds for minimizing SONET ADMs. 122-136 - Meena Mahajan, Venkatesh Raman, Somnath Sikdar:

Parameterizing above or below guaranteed values. 137-153
Volume 75, Number 3, May 2009
- Chaim Linhart, Ron Shamir

:
Faster pattern matching with character classes using prime number encoding. 155-162 - Felix Brandt, Felix A. Fischer, Markus Holzer

:
Symmetries and the complexity of pure Nash equilibrium. 163-177 - Cristian Martín, Mikel Larrea

, Ernesto Jiménez
:
Implementing the Omega failure detector in the crash-recovery failure model. 178-189 - Vincenzo Auletta

, Roberto De Prisco
, Paolo Penna, Giuseppe Persiano:
The power of verification for one-parameter agents. 190-211
Volume 75, Number 4, June 2009
- Andrea E. F. Clementi, Angelo Monti, Francesco Pasquale

, Riccardo Silvestri:
Broadcasting in dynamic radio networks. 213-230 - Hans L. Bodlaender

, Michael R. Fellows
, Dimitrios M. Thilikos:
Derivation of algorithms for cutwidth and related graph layout parameters. 231-244 - Eric Allender, Michael Bauland, Neil Immerman, Henning Schnoor, Heribert Vollmer

:
The complexity of satisfiability problems: Refining Schaefer's theorem. 245-254 - Harumichi Nishimura, Tomoyuki Yamakami:

An application of quantum finite automata to interactive proof systems. 255-269
Volume 75, Number 5, August 2009
- Joost Engelfriet, Sebastian Maneth, Helmut Seidl:

Deciding equivalence of top-down XML transformations in polynomial time. 271-286 - Mary V. Ashley, Tanya Y. Berger-Wolf

, Piotr Berman, Wanpracha Art Chaovalitwongse, Bhaskar DasGupta, Ming-Yang Kao:
On approximating four covering and packing problems. 287-302 - Sherif Sakr

:
XML compression techniques: A survey and comparison. 303-322
Volume 75, Number 6, September 2009
- Nader H. Bshouty, Yi Li, Philip M. Long:

Using the doubling dimension to analyze the generalization of learning algorithms. 323-335 - Bogdan Cautis, Serge Abiteboul, Tova Milo:

Reasoning about XML update constraints. 336-358 - Amihood Amir, Yonatan Aumann, Gary Benson, Avivit Levy, Ohad Lipsky, Ely Porat, Steven Skiena

, Uzi Vishne
:
Pattern matching with address errors: Rearrangement distances. 359-370
Volume 75, Number 7, November 2009
- Ting-Yu Chen

, Jih-Chang Wang:
Interval-valued fuzzy permutation method and experimental analysis on cardinal and ordinal evaluations. 371-387 - UmaMaheswari C. Devi, James H. Anderson:

Improved conditions for bounded tardiness under EPDF Pfair multiprocessor scheduling. 388-420
- Katsuhiko Nakamura:

Erratum to "Languages not recognizable in real time by one-dimensional cellular automata" [J. Comput. System Sci 74 (7) (2008) 1095-1102]. 421
Volume 75, Number 8, December 2009
- Hans L. Bodlaender

, Rodney G. Downey, Michael R. Fellows
, Danny Hermelin
:
On problems without polynomial kernels. 423-434 - Igor Razgon, Barry O'Sullivan

:
Almost 2-SAT is fixed-parameter tractable. 435-450 - Tzu-Chin Lin, Chung-Chin Kuo, Yong-Hsian Hsieh, Biing-Feng Wang:

Efficient algorithms for the inverse sorting problem with bound constraints under the l∞-norm and the Hamming distance. 451-464 - Prakash Ramanan:

Worst-case optimal algorithm for XPath evaluation over XML streams. 465-485

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














