[Abrahamson et al., 1994] |
Abrahamson, K., Adler, A., Higham, L., and Kirkpatrick, D. (1994).
Tight lower bounds for probabilistic solitude verification on
anonymous rings.
Journal of the ACM, 41(2):277-310.
|
[Afek et al., 1993] |
Afek, Y., Attiya, H., Dolev, D., Gafni, E., Merritt, M., and Shavit, N. (1993).
Atomic snapshots of shared memory.
Journal of the ACM, 40(4):873-890.
|
[Afek et al., 1994] |
Afek, Y., Attiya, H., Fekete, A., Fischer, M., Lynch, N., Mansour, Y., Wang,
D.-W., and Zuck, L. (1994).
Reliable communication over unreliable channels.
Journal of the ACM, 41(6):1267-1297.
|
[Afek et al., 1996] |
Afek, Y., Awerbuch, B., Plotkin, S., and Saks, M. (1996).
Local management of a global resource in a communication network.
Journal of the ACM, 43(1):1-19.
|
[Afek et al., 1995] |
Afek, Y., Greenberg, D. S., Merritt, M., and Taubenfeld, G. (1995).
Computing with faulty shared ojects.
Journal of the ACM, 42(6):1231-1274.
|
[Afrati and Papadimitriou, 1993] |
Afrati, F. and Papadimitriou, C. H. (1993).
The parallel complexity of simple logic programs.
Journal of the ACM, 40(4):891-916.
|
[Alon and Megiddo, 1994] |
Alon, N. and Megiddo, N. (1994).
Parallel linear programming in fixed dimension almost surely in
constant time.
Journal of the ACM, 41(2):422-434.
|
[Alon et al., 1995] |
Alon, N., Yuster, R., and Zwick, U. (1995).
Color-coding.
Journal of the ACM, 42(4):844-856.
|
[Alur et al., 1996] |
Alur, R., Feder, T., and Henzinger, T. A. (1996).
The benefits of relaxing punctuality.
Journal of the ACM, 43(1):116-146.
|
[Alur and Henzinger, 1994] |
Alur, R. and Henzinger, T. A. (1994).
A really temporal logic.
Journal of the ACM, 41(1):181-204.
|
[Angluin et al., 1993] |
Angluin, D., Hellerstein, L., and Karpinski, M. (1993).
Learning read-once formulas with queries.
Journal of the ACM, 40(1):185-210.
|
[Arnborg et al., 1993] |
Arnborg, S., Courcelle, B., Proskurowski, A., and Seese, D. (1993).
An algebraic theory of graph reduction.
Journal of the ACM, 40(5):1134-1164.
|
[Aspnes et al., 1994] |
Aspnes, J., Herlihy, M., and Shavit, N. (1994).
Counting networks.
Journal of the ACM, 41(5):1020-1048.
|
[Atallah et al., 1994] |
Atallah, M. J., Goodrich, M. T., and Kosaraju, S. R. (1994).
Parallel algorithms for evaluating sequences of set-manipulation
operations.
Journal of the ACM, 41(6):1049-1088.
|
[Attiya et al., 1995] |
Attiya, H., Bar-Noy, A., and Dolev, D. (1995).
Sharing memory robustly in message-passing systems.
Journal of the ACM, 42(1):124-142.
|
[Attiya et al., 1994] |
Attiya, H., Dwork, C., Lynch, N., and Stockmeyer, L. (1994).
Bounds on the time to reach agreement in the presence of timing
uncertainty.
Journal of the ACM, 41(1):122-152.
|
[Awerbuch and Peleg, 1995] |
Awerbuch, B. and Peleg, D. (1995).
Online tracking of mobile users.
Journal of the ACM, 42(5):1021-1058.
|
[Baader, 1993] |
Baader, F. (1993).
Unification in commutative theories, Hilberts basis theorem and
Gröbner bases.
Journal of the ACM, 40(3):477-503.
|
[Baccelli et al., 1993] |
Baccelli, F., Liu, Z., and Towsley, D. (1993).
Extremal scheduling of parallel processing with and without real-time
constraints.
Journal of the ACM, 40(5):1209-1237.
|
[Bachmair and Dershowitz, 1994] |
Bachmair, L. and Dershowitz, N. (1994).
Equational inference, canonical proofs, and proof orderings.
Journal of the ACM, 41(2):236-276.
|
[Baeten et al., 1993] |
Baeten, J. C. M., Bergstra, J. A., and Klop, J. W. (1993).
Decidability of bisimulation equivalence for processes generating
context-free languages.
Journal of the ACM, 40(3):653-682.
|
[Baker, 1994] |
Baker, B. S. (1994).
Approximation algorithms for NP-complete problems on planar graphs.
Journal of the ACM, 41(1):153-180.
|
[Bay and Bilardi, 1995] |
Bay, P. and Bilardi, G. (1995).
Deterministic on-line routing on area-universal networks.
Journal of the ACM, 42(3):614-640.
|
[Bell and Witten, 1994] |
Bell, T. C. and Witten, I. H. (1994).
The relationship between greedy parsing and symbolwise text
compression.
Journal of the ACM, 41(4):708-724.
|
[Berger et al., 1995] |
Berger, B., Brady, M., Brown, D., and Leighton, T. (1995).
Nearly optimal algorithms and bounds for multilayer channel routing.
Journal of the ACM, 42(2):500-542.
|
[Bergstra and Tucker, 1995] |
Bergstra, J. A. and Tucker, J. V. (1995).
Equational specifications, complete term rewriting systems, and
computable and semicomputable algebras.
Journal of the ACM, 42(6):1194-1230.
|
[Bhatt and Cai, 1993] |
Bhatt, S. and Cai, J. (1993).
Taking random walks to grow trees in hypercubes.
Journal of the ACM, 40(3):741-764.
|
[Bhatt et al., 1996] |
Bhatt, S. N., Chung, F. R. K., Hong, J.-W., Leighton, F. T., Obrenic', B.,
Rosenberg, A. L., and Schwabe, E. J. (1996).
Optimal emulations by butterfly-like networks.
Journal of the ACM, 43(2):293-330.
|
[Birman et al., 1995] |
Birman, A., Gail, H. R., Hantler, S. L., Rosberg, Z., and Sidi, M. (1995).
An optimal service policy for buffer systems.
Journal of the ACM, 42(3):641-657.
|
[Bloom et al., 1995] |
Bloom, B., Istrail, S., and Meyer, A. R. (1995).
Bisimulation cant be traced.
Journal of the ACM, 42(1):232-268.
|
[Blum, 1994] |
Blum, A. (1994).
New approximation algorithms for graph coloring.
Journal of the ACM, 41(3):470-516.
|
[Blum et al., 1994] |
Blum, A., Jiang, T., Li, M., Tromp, J., and Yannakakis, M. (1994).
Linear approximation of shortest superstrings.
Journal of the ACM, 41(4):630-647.
|
[Blum and Kannan, 1995] |
Blum, M. and Kannan, S. (1995).
Designing programs that check their work.
Journal of the ACM, 42(1):269-291.
|
[Bol and Groote, 1996] |
Bol, R. and Groote, J. F. (1996).
The meaning of negative premises in transition system specifications.
Journal of the ACM, 43(5):863-914.
|
[Boyar et al., 1995] |
Boyar, J., Brassard, G., and Peralta, R. (1995).
Subquadratic zero-knowledge.
Journal of the ACM, 42(6):1169-1193.
|
[Boyer and Yu, 1996] |
Boyer, R. S. and Yu, Y. (1996).
Automated proofs of object code for a widely used microprocessor.
Journal of the ACM, 43(1):166-192.
|
[Bshouty, 1993] |
Bshouty, N. H. (1993).
On the complexity of functions for random access machines.
Journal of the ACM, 40(2):211-223.
|
[Bshouty and Tamon, 1996] |
Bshouty, N. H. and Tamon, C. (1996).
On the Fourier spectrum of monotone functions.
Journal of the ACM, 43(4):747-770.
|
[Buntine and Bürckert, 1994] |
Buntine, W. L. and Bürckert, H.-J. (1994).
On solving equations and disequations.
Journal of the ACM, 41(4):591-629.
|
[Busch and Mavronicolas, 1996] |
Busch, C. and Mavronicolas, M. (1996).
A combinatorial treatment of balancing networks.
Journal of the ACM, 43(5):794-839.
|
[Callahan and Kosaraju, 1995] |
Callahan, P. B. and Kosaraju, S. R. (1995).
A decomposition of multidimensional point sets with applications to
k-nearest-neighbors and n-body potential fields.
Journal of the ACM, 42(1):67-90.
|
[Chandra et al., 1996] |
Chandra, T. D., Hadzilacos, V., and Toueg, S. (1996).
The weakest failure detector for solving Consensus.
Journal of the ACM, 43(4):685-722.
|
[Chang and Nelson, 1995] |
Chang, C. S. and Nelson, R. (1995).
Bounds on the speedup and efficiency of partial synchronization in
parallel processing systems.
Journal of the ACM, 42(1):204-231.
|
[Chen and Warren, 1996] |
Chen, W. and Warren, D. S. (1996).
Tabled evaluation with delaying for general logic programs.
Journal of the ACM, 43(1):20-74.
|
[Cheng and Muntz, 1996] |
Cheng, W. C. and Muntz, R. R. (1996).
Bounding errors introduced by clustering of customers in closed
product-form queueing networks.
Journal of the ACM, 43(4):641-669.
|
[Chien and Kim, 1995] |
Chien, A. A. and Kim, J. H. (1995).
Planar-adaptive routing: Low-cost adaptive networks for
multiprocessors.
Journal of the ACM, 42(1):91-123.
|
[Choudhury et al., 1995] |
Choudhury, G. L., Leung, K. K., and Whitt, W. (1995).
Calculating normalization constants of closed queueing networks by
numerically inverting their generating functions.
Journal of the ACM, 42(5):935-970.
|
[Clarkson, 1995] |
Clarkson, K. L. (1995).
Las Vegas algorithms for linear and integer programming when the
dimension is small.
Journal of the ACM, 42(2):488-499.
|
[Coffman, Jr. and Garey, 1993] |
Coffman, Jr., E. G. and Garey, M. R. (1993).
Proof of the 4/3 conjecture for preemptive vs. nonpreemptive
two-processor scheduling.
Journal of the ACM, 40(5):991-1018.
|
[Cohen and Megiddo, 1993] |
Cohen, E. and Megiddo, N. (1993).
Strongly polynomial-time and NC algorithms for detecting cycles in
periodic graphs.
Journal of the ACM, 40(4):791-830.
|
[Compton and Ravishankar, 1995] |
Compton, K. J. and Ravishankar, C. (1995).
Expected deadlock time in a multiprocessing system.
Journal of the ACM, 42(3):562-583.
|
[Conforti and Cornuéjols, 1995] |
Conforti, M. and Cornuéjols, G. (1995).
A class of logic problems solvable by linear programming.
Journal of the ACM, 42(5):1107-1113.
|
[Conway et al., 1994] |
Conway, A. E., Pinsky, E., and Tridandapani, S. (1994).
Efficient decomposition methods for the analysis of multi-facility
blocking models.
Journal of the ACM, 41(4):648-675.
|
[Cosnard and Daoudi, 1994] |
Cosnard, M. and Daoudi, E. M. (1994).
Optimal algorithms for parallel givens factorization on a
coarse-grained PRAM.
Journal of the ACM, 41(2):399-421.
|
[Courcoubetis and Yannakakis, 1995] |
Courcoubetis, C. and Yannakakis, M. (1995).
The complexity of probabilistic verification.
Journal of the ACM, 42(4):857-907.
|
[Curien et al., 1996] |
Curien, P.-L., Hardin, T., and Lévy, J.-J. (1996).
Confluence properties of weak and strong calculi of explicit
substitutions.
Journal of the ACM, 43(2):362-397.
|
[Dallery et al., 1994] |
Dallery, Y., Liu, Z., and Towsley, D. (1994).
Equivalence, reversibility, symmetry and concavity properties in
fork-join queuing networks with blocking.
Journal of the ACM, 41(5):903-942.
|
[Dolev et al., 1993] |
Dolev, D., Dwork, C., Waarts, O., and Yung, M. (1993).
Perfectly secure message transmission.
Journal of the ACM, 40(1):17-47.
|
[Dolev et al., 1995] |
Dolev, D., Halpern, J. Y., Simons, B., and Strong, R. (1995).
Dynamic fault-tolerant clock synchronization.
Journal of the ACM, 42(1):143-185.
|
[Donald et al., 1993] |
Donald, B., Xavier, P., Canny, J., and Reif, J. (1993).
Kinodynamic motion planning.
Journal of the ACM, 40(5):1048-1066.
|
[Driscoll et al., 1994] |
Driscoll, J. R., Sleator, D. D. K., and Tarjan, R. E. (1994).
Fully persistent lists with catenation.
Journal of the ACM, 41(5):943-959.
|
[Drusinsky and Harel, 1994] |
Drusinsky, D. and Harel, D. (1994).
On the power of bounded concurrency I: Finite automata.
Journal of the ACM, 41(3):517-539.
|
[Dubiner et al., 1994] |
Dubiner, M., Galil, Z., and Magen, E. (1994).
Faster tree pattern matching.
Journal of the ACM, 41(2):205-213.
|
[Eiter and Gottlob, 1995] |
Eiter, T. and Gottlob, G. (1995).
The complexity of logic-based abduction.
Journal of the ACM, 42(1):3-42.
|
[Fagin and Halpern, 1994] |
Fagin, R. and Halpern, J. Y. (1994).
Reasoning about knowledge and probability.
Journal of the ACM, 41(2):340-367.
|
[Feige et al., 1996] |
Feige, U., Goldwasser, S., Lovász, L., Safra, S., and Szegedy, M. (1996).
Interactive proofs and the hardness of approximating cliques.
Journal of the ACM, 43(2):268-292.
|
[Fekete et al., 1993] |
Fekete, A., Lynch, N., Mansour, Y., and Spinelli, J. (1993).
The impossibility of implementing reliable communication in the face
of crashes.
Journal of the ACM, 40(5):1087-1107.
|
[Fischer and Paterson, 1994] |
Fischer, M. J. and Paterson, M. S. (1994).
Fishspear: A priority queue algorithm.
Journal of the ACM, 41(1):3-30.
|
[Fonlupt and Nachef, 1993] |
Fonlupt, J. and Nachef, A. (1993).
Dynamic programming and the graphical traveling salesman problem.
Journal of the ACM, 40(5):1165-1187.
|
[Freivalds et al., 1995] |
Freivalds, R., Kinber, E., and Smith, C. H. (1995).
On the impact of forgetting on learning machines.
Journal of the ACM, 42(6):1146-1168.
|
[Galil, 1995] |
Galil, Z. (1995).
A constant-time optimal parallel string-matching algorithm.
Journal of the ACM, 42(4):908-918.
|
[Gallier et al., 1993] |
Gallier, J., Narendran, P., Plaisted, D., Raatz, S., and Snyder, W. (1993).
An algorithm for finding canonical sets of ground rewrite rules in
polynomial time.
Journal of the ACM, 40(1):1-16.
|
[Gao and Kaufmann, 1994] |
Gao, S. and Kaufmann, M. (1994).
Channel routing of multiterminal nets.
Journal of the ACM, 41(4):791-818.
|
[Glass and Ni, 1994] |
Glass, C. J. and Ni, L. M. (1994).
The turn model for adaptive routing.
Journal of the ACM, 41(5):874-902.
|
[Goemans and Williamson, 1995] |
Goemans, M. X. and Williamson, D. P. (1995).
Improved approximation algorithms for maximum cut and satisfiability
problems using semidefinite programming.
Journal of the ACM, 42(6):1115-1145.
|
[Goldreich and Ostrovsky, 1996] |
Goldreich, O. and Ostrovsky, R. (1996).
Software protection and simulation on oblivious RAMs.
Journal of the ACM, 43(3):431-473.
|
[Golumbic and Shamir, 1993] |
Golumbic, M. C. and Shamir, R. (1993).
Complexity and algorithms for reasoning about time: A graph-theoretic
approach.
Journal of the ACM, 40(5):1108-1133.
|
[Goodrich and Kosaraju, 1996] |
Goodrich, M. T. and Kosaraju, S. R. (1996).
Sorting on a parallel pointer machine with applications to set
expression evaluation.
Journal of the ACM, 43(2):331-361.
|
[Gottlob, 1995a] |
Gottlob, G. (1995a).
NP trees and Carnaps modal logic.
Journal of the ACM, 42(2):421-457.
|
[Gottlob, 1995b] |
Gottlob, G. (1995b).
Translating default logic into standard autoepistemic logic.
Journal of the ACM, 42(4):711-740.
|
[Haldar and Vidyasankar, 1995] |
Haldar, S. and Vidyasankar, K. (1995).
Constructing 1-writer multireader multivalued atomic variable from
regular variables.
Journal of the ACM, 42(1):186-203.
|
[Halpern and Tuttle, 1993] |
Halpern, J. Y. and Tuttle, M. R. (1993).
Knowledge, probability, and adversaries.
Journal of the ACM, 40(4):917-962.
|
[Harper et al., 1993] |
Harper, R., Honsell, F., and Plotkin, G. (1993).
A framework for defining logics.
Journal of the ACM, 40(1):143-184.
|
[Hellerstein et al., 1996] |
Hellerstein, L., Pillaipakkamnatt, K., Raghavan, V., and Wilkins, D. (1996).
How many queries are needed to learn?
Journal of the ACM, 43(5):840-862.
|
[Hirst and Harel, 1994] |
Hirst, T. and Harel, D. (1994).
On the power of bounded concurrency II: Pushdown automata.
Journal of the ACM, 41(3):540-554.
|
[Hobby, 1993] |
Hobby, J. D. (1993).
Generating automatically tuned bitmaps from outlines.
Journal of the ACM, 40(1):48-94.
|
[Jean-Marie and Gün, 1993] |
Jean-Marie, A. and Gün, L. (1993).
Parallel queues with resequencing.
Journal of the ACM, 40(5):1188-1208.
|
[Johnson, 1993] |
Johnson, C. A. (1993).
Factorization and circuit in the connection method.
Journal of the ACM, 40(3):536-557.
|
[Joung and Smolka, 1996] |
Joung, Y.-J. and Smolka, S. A. (1996).
A comprehensive study of the complexity of multiparty interaction.
Journal of the ACM, 43(1):75-115.
|
[Kahale, 1995] |
Kahale, N. (1995).
Eigenvalues and expansion of regular graphs.
Journal of the ACM, 42(5):1091-1106.
|
[Karger et al., 1995] |
Karger, D. R., Klein, P. N., and Tarjan, R. E. (1995).
A randomized linear-time algorithm to find minimum spanning trees.
Journal of the ACM, 42(2):321-328.
|
[Karger and Stein, 1996] |
Karger, D. R. and Stein, C. (1996).
A new approach to the minimum cut problem.
Journal of the ACM, 43(4):601-640.
|
[Karloff and Raghavan, 1993] |
Karloff, H. J. and Raghavan, P. (1993).
Randomized algorithms and pseudorandom numbers.
Journal of the ACM, 40(3):454-476.
|
[Karp, 1994] |
Karp, R. M. (1994).
Probabilistic recurrence relations.
Journal of the ACM, 41(6):1136-1150.
|
[Karp and Zhang, 1993] |
Karp, R. M. and Zhang, Y. (1993).
Randomized parallel algorithms for backtrack search and
branch-and-bound computation.
Journal of the ACM, 40(3):765-789.
|
[Kearns and Valiant, 1994] |
Kearns, M. and Valiant, L. (1994).
Cryptographic limitations on learning Boolean formulae and finite
automata.
Journal of the ACM, 41(1):67-95.
|
[Kfoury et al., 1994] |
Kfoury, A. J., Tiuryn, J., and Urzyczyn, P. (1994).
An analysis of ML typability.
Journal of the ACM, 41(2):368-398.
|
[Khuller and Vishkin, 1994] |
Khuller, S. and Vishkin, U. (1994).
Biconnectivity approximations and graph carvings.
Journal of the ACM, 41(2):214-235.
|
[Kifer et al., 1995] |
Kifer, M., Lausen, G., and Wu, J. (1995).
Logical foundations of object-oriented and frame-based languages.
Journal of the ACM, 42(4):741-843.
|
[Knessl, 1993] |
Knessl, C. (1993).
On the sojourn time distribution in a finite capacity processor
shared queue.
Journal of the ACM, 40(5):1238-1301.
|
[Korilis and Lazar, 1995] |
Korilis, Y. A. and Lazar, A. A. (1995).
On the existence of equilibria in noncooperative optimal flow
control.
Journal of the ACM, 42(3):584-613.
|
[Kos'cielski and Pacholski, 1996] |
Kos'cielski, A. and Pacholski, L. (1996).
Complexity of Makanins algorithm.
Journal of the ACM, 43(4):670-684.
|
[Koutsoupias and Papadimitriou, 1995] |
Koutsoupias, E. and Papadimitriou, C. H. (1995).
On the k-server conjecture.
Journal of the ACM, 42(5):971-983.
|
[Kurtz et al., 1995] |
Kurtz, S. A., Mahaney, S. R., and Royer, J. S. (1995).
The isomorphism conjecture fails relative to a random oracle.
Journal of the ACM, 42(2):401-420.
|
[Ladkin and Maddux, 1994] |
Ladkin, P. B. and Maddux, R. D. (1994).
On binary constraint problems.
Journal of the ACM, 41(3):435-469.
|
[LaPaugh, 1993] |
LaPaugh, A. S. (1993).
Recontamination does not help to search a graph.
Journal of the ACM, 40(2):224-245.
|
[Lengauer and Wanke, 1993] |
Lengauer, T. and Wanke, E. (1993).
Efficient decision procedures for graph properties on context-free
graph languages.
Journal of the ACM, 40(2):368-393.
|
[Leung, 1993] |
Leung, K. K. (1993).
An execution/sleep scheduling policy for serving an additional job in
priority queueing systems.
Journal of the ACM, 40(2):394-417.
|
[Li et al., 1996] |
Li, M., Tromp, J., and Vitányi, P. M. B. (1996).
How to share concurrent wait-free variables.
Journal of the ACM, 43(4):723-746.
|
[Lin and Shoham, 1995] |
Lin, F. and Shoham, Y. (1995).
Provably correct theories of action.
Journal of the ACM, 42(2):293-320.
|
[Linial et al., 1993] |
Linial, N., Mansour, Y., and Nisan, N. (1993).
Constant depth circuits, Fourier transform and learnability.
Journal of the ACM, 40(3):607-620.
|
[Lui and Muntz, 1994] |
Lui, J. C. S. and Muntz, R. R. (1994).
Computing bounds on steady state availability of repairable computer
systems.
Journal of the ACM, 41(4):676-707.
|
[Lund and Yannakakis, 1994] |
Lund, C. and Yannakakis, M. (1994).
On the hardness of approximating minimization problems.
Journal of the ACM, 41(5):960-981.
|
[Luo and Tsitsiklis, 1993] |
Luo, Z. and Tsitsiklis, J. N. (1993).
On the communication complexity of distributed algebraic computation.
Journal of the ACM, 40(5):1019-1047.
|
[Marcus and Subrahmanian, 1996] |
Marcus, S. and Subrahmanian, V. S. (1996).
Foundations of multimedia database systems.
Journal of the ACM, 43(3):474-523.
|
[McAllester and Givan, 1993] |
McAllester, D. and Givan, R. (1993).
Taxonomic syntax for first order inference.
Journal of the ACM, 40(2):246-283.
|
[McAllester, 1993] |
McAllester, D. A. (1993).
Automatic recognition of tractability in inference relations.
Journal of the ACM, 40(2):284-303.
|
[Mehlhorn and Tsakalidis, 1993] |
Mehlhorn, K. and Tsakalidis, A. (1993).
Dynamic interpolation search.
Journal of the ACM, 40(3):621-634.
|
[Miltersen et al., 1996] |
Miltersen, P. B., Paterson, M., and Tarui, J. (1996).
The asymptotic complexity of merging networks.
Journal of the ACM, 43(1):147-165.
|
[Motwani, 1994] |
Motwani, R. (1994).
Average-case analysis of algorithms for matchings and related
problems.
Journal of the ACM, 41(6):1329-1356.
|
[Murray and Rosenthal, 1993] |
Murray, N. V. and Rosenthal, E. (1993).
Dissolution: Making paths vanish.
Journal of the ACM, 40(3):504-535.
|
[Naughton and Ramakrishnan, 1994] |
Naughton, J. F. and Ramakrishnan, R. (1994).
How to forget the past without repeating it.
Journal of the ACM, 41(6):1151-1177.
|
[Nebel and Bürckert, 1995] |
Nebel, B. and Bürckert, H.-J. (1995).
Reasoning about temporal relations: A maximal tractable subclass of
Allens interval algebra.
Journal of the ACM, 42(1):43-66.
|
[Nederhof and Bertsch, 1996] |
Nederhof, M.-J. and Bertsch, E. (1996).
Linear-time suffix parsing for deterministic languages.
Journal of the ACM, 43(3):524-554.
|
[Neiger and Toueg, 1993] |
Neiger, G. and Toueg, S. (1993).
Simulating synchronized clocks and common knowledge in distributed
systems.
Journal of the ACM, 40(2):334-367.
|
[Nelson and Towsley, 1993] |
Nelson, R. and Towsley, D. (1993).
A performance evaluation of several priority policies for parallel
processing systems.
Journal of the ACM, 40(3):714-740.
|
[Nicol, 1993] |
Nicol, D. M. (1993).
The cost of conservative synchronization in parallel discrete event
simulations.
Journal of the ACM, 40(2):304-333.
|
[Nicola and Vaandrager, 1995] |
Nicola, R. D. and Vaandrager, F. (1995).
Three logics for branching bisimulation.
Journal of the ACM, 42(2):458-487.
|
[Nodine and Vitter, 1995] |
Nodine, M. H. and Vitter, J. S. (1995).
Greed sort: Optimal deterministic sorting on parallel disks.
Journal of the ACM, 42(4):919-933.
|
[OHearn and Tennent, 1995] |
OHearn, P. W. and Tennent, R. D. (1995).
Parametricity and local variables.
Journal of the ACM, 42(3):658-709.
|
[Orponen et al., 1994] |
Orponen, P., Ko, K., Schöning, U., and Watanabe, O. (1994).
Instance complexity.
Journal of the ACM, 41(1):96-121.
|
[Pitt and Warmuth, 1993] |
Pitt, L. and Warmuth, M. K. (1993).
The minimum consistent DFA problem cannot be approximated within
any polynomial.
Journal of the ACM, 40(1):95-142.
|
[Rabin, 1994] |
Rabin, T. (1994).
Robust sharing of secrets when the dealer is honest or cheating.
Journal of the ACM, 41(6):1089-1109.
|
[Rathmann et al., 1994] |
Rathmann, P. K., Winslett, M., and Manasse, M. (1994).
Circumscription with homomorphisms: Solving the equality and
counterexample problems.
Journal of the ACM, 41(5):819-873.
|
[Reif and Sharir, 1994] |
Reif, J. and Sharir, M. (1994).
Motion planning in the presence of moving obstacles.
Journal of the ACM, 41(4):764-790.
|
[Reif and Storer, 1994] |
Reif, J. H. and Storer, J. A. (1994).
A single-exponential upper bounds for finding shortest paths in three
dimensions.
Journal of the ACM, 41(5):1013-1019.
|
[Rivest and Schapire, 1994] |
Rivest, R. L. and Schapire, R. E. (1994).
Diversity-based inference of finite automata.
Journal of the ACM, 41(3):555-589.
|
[Rockmore, 1994] |
Rockmore, D. N. (1994).
Efficient computation of Fourier inversion for finite groups.
Journal of the ACM, 41(1):31-66.
|
[Ross, 1994] |
Ross, K. A. (1994).
Modular stratification and magic sets for datalog programs with
negation.
Journal of the ACM, 41(6):1216-1266.
|
[Ross et al., 1994] |
Ross, K. W., Tsang, D. H. K., and Wang, J. (1994).
Monte Carlo summation and integration applied to multiclass queuing
networks.
Journal of the ACM, 41(6):1110-1135.
|
[Santos, 1996] |
Santos, Jr., E. (1996).
On linear potential functions for approximating Bayesian
computations.
Journal of the ACM, 43(3):399-430.
|
[Selman and Kautz, 1996] |
Selman, B. and Kautz, H. (1996).
Knowledge compilation and theory approximation.
Journal of the ACM, 43(2):193-224.
|
[Singh et al., 1994] |
Singh, A. K., Anderson, J. H., and Gouda, M. G. (1994).
The elusive atomic register.
Journal of the ACM, 41(2):311-339.
|
[Storer and Reif, 1994] |
Storer, J. A. and Reif, J. H. (1994).
Shortest paths in the plane with polygonal obstacles.
Journal of the ACM, 41(5):982-1012.
|
[Tay, 1993] |
Tay, Y. C. (1993).
On the optimality of strategies for multiple joins.
Journal of the ACM, 40(5):1067-1086.
|
[Tempero and Ladner, 1995] |
Tempero, E. D. and Ladner, R. E. (1995).
Recoverable sequence transmission protocols.
Journal of the ACM, 42(5):1059-1090.
|
[Toyama et al., 1995] |
Toyama, Y., Klop, J. W., and Barendregt, H. P. (1995).
Termination for direct sums of left-linear complete term rewriting
systems.
Journal of the ACM, 42(6):1275-1304.
|
[Tsitsiklis and Stamoulis, 1995] |
Tsitsiklis, J. N. and Stamoulis, G. D. (1995).
On the average communication complexity of asynchronous distributed
algorithms.
Journal of the ACM, 42(2):382-400.
|
[van Beek and Dechter, 1995] |
van Beek, P. and Dechter, R. (1995).
On the minimality and global consistency of row-convex constraint
networks.
Journal of the ACM, 42(3):543-561.
|
[van Glabbeek and Weijland, 1996] |
van Glabbeek, R. J. and Weijland, W. P. (1996).
Branching time and abstraction in bisimulation semantics.
Journal of the ACM, 43(3):555-600.
|
[van Kreveld and Overmars, 1993] |
van Kreveld, M. J. and Overmars, M. H. (1993).
Union-copy structures and dynamic segment trees.
Journal of the ACM, 40(3):635-652.
|
[Verma, 1995] |
Verma, R. M. (1995).
A theory of using history for equational systems with applications.
Journal of the ACM, 42(5):984-1020.
|
[Vitter and Krishnan, 1996] |
Vitter, J. S. and Krishnan, P. (1996).
Optimal prefetching via data compression.
Journal of the ACM, 43(5):771-793.
|
[Wang et al., 1995] |
Wang, K., Zhang, W., and Chau, S.-C. (1995).
Decomposition of magic rewriting.
Journal of the ACM, 42(2):329-381.
|
[Wang, 1993] |
Wang, T. (1993).
Z-module reasoning: An equality-oriented proving method with built-in
ring axioms.
Journal of the ACM, 40(3):558-606.
|
[Yu et al., 1993] |
Yu, P. S., Dias, D. M., and Lavenberg, S. S. (1993).
On the analytical modeling of database concurrency control.
Journal of the ACM, 40(4):831-872.
|