Revues
Séminaires
Livres
Notes de cours
Thèses
Auteurs
OFF
Revues
Séminaires
Livres
Notes de cours
Thèses
Auteurs
Tout
Tout
Auteur
Titre
Bibliographie
Mots clés
Plein texte
Rechercher
NOT
Entre
et
Auteur
Tout
Auteur
Titre
Date
Bibliographie
Mots clés
Plein texte
RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications
Tome 50 (2016)
Sommaire du
Fascicule no. 1
Special issue dedicated to the 15th "Journées Montoises d'Informatique Théorique"
Foreword - Special issue dedicated to the fifteenth “Journées Montoises d’Informatique Théorique”
Jamet, Damien
p. 1
Reduction in non-(
k
+
1
)-power-free morphisms
Wlazinski, Francis
p. 3-20
An isolated point in the Heinis spectrum
Turki, Ramzi
p. 21-38
Decision algorithms for Fibonacci-automatic Words, I: Basic results
Mousavi, Hamoon
;
Schaeffer, Luke
;
Shallit, Jeffrey
p. 39-66
Digital semigroups
Brunotte, Horst
p. 67-79
Cross-bifix-free sets generation via Motzkin paths
Barcucci, Elena
;
Bilotta, Stefano
;
Pergola, Elisa
;
Pinzani, Renzo
;
Succi, Jonathan
p. 81-91
On digital blocks of polynomial values and extractions in the Rudin–Shapiro sequence
Stoll, Thomas
p. 93-99
A short proof that shuffle squares are 7-avoidable
Guégan, Guillaume
;
Ochem, Pascal
p. 101-103
Tilings by
1
×
1
and
2
×
2
Rolin, Nicolas
;
Ugolnikova, Alexandra
p. 105-116
Sommaire du
Fascicule no. 2
Computing Depths of Patterns
Blanchet-Sadri, F.
;
Lohr, Andrew
p. 117-133
The average lower reinforcement number of a graph
Turaci, Tufan
;
Aslan, Ersin
p. 135-144
Delay Games with WMSO
+
U Winning Conditions
Zimmermann, Martin
p. 145-165
Note on occurrences of factors in circular words
Arnoux, Pierre
p. 167-170
Advice complexity of disjoint path allocation
Kováčová, Ivana
p. 171-191
Sommaire du
Fascicule no. 3
Traceable Identity-Based Group Signature
Gu, Ke
;
Yang, Lihao
;
Wang, Yong
;
Wen, Sheng
p. 193-226
Parameterized exact and approximation algorithms for maximum
k
-set cover and related satisfiability problems
Bonnet, Édouard
;
Paschos, Vangelis Th.
;
Sikora, Florian
p. 227-240
A novel image encryption algorithm based on the extracted map of overlapping paths from the secret key
Fadhil Al-Husainy, Mohammed A.
p. 241-249
Kleene closure and state complexity
Palmovský, Matúš
p. 251-261
The average scattering number of graphs
Aslan, Ersin
;
Kilinç, Deniz
;
Yücalar, Fatih
;
Borandağ, Emin
p. 263-272
Sommaire du
Fascicule no. 4
7th Non-Classical Models of Automata and Applications (NCMA-2015)
Preface: Non-Classical Models of Automata and Applications VII
Holzer, Markus
;
Moreira, Nelma
;
Reis, Rogério
Holzer, Markus
;
Moreira, Nelma
;
Reis, Rogério
(éd.)
p. 273-274
Input- or output-unary sweeping transducers are weaker than their 2-way counterparts
Guillon, Bruno
p. 275-294
A pumping lemma for flip-pushdown languages
Kostolányi, Peter
p. 295-311
When input-driven pushdown automata meet reversiblity
Kutrib, Martin
;
Malcher, Andreas
;
Wendlandt, Matthias
p. 313-330
Two-way representations and weighted automata
Lombardy, Sylvain
p. 331-350
Some classes of rational functions for pictures
Mráz, František
;
Otto, Friedrich
;
Průša, Daniel
p. 351-369
Homing vector automata
Salehi, Özlem
;
Cem Say, A. C.
;
D’Alessandro, Flavio
p. 371-386