Journals
Seminars
Books
Lecture notes
Theses
Authors
OFF
Journals
Seminars
Books
Lecture notes
Theses
Authors
All
All
Author
Title
References
Keywords
Full text
Search
NOT
Between
and
Author
All
Author
Title
Date
References
Keywords
Full text
RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications
Volume 50 (2016)
Issue no. 1
Table of Contents
Special issue dedicated to the 15th "Journées Montoises d'Informatique Théorique"
Foreword - Special issue dedicated to the fifteenth “Journées Montoises d’Informatique Théorique”
Jamet, Damien
p. 1
Reduction in non-(
k
+
1
)-power-free morphisms
Wlazinski, Francis
p. 3-20
An isolated point in the Heinis spectrum
Turki, Ramzi
p. 21-38
Decision algorithms for Fibonacci-automatic Words, I: Basic results
Mousavi, Hamoon
;
Schaeffer, Luke
;
Shallit, Jeffrey
p. 39-66
Digital semigroups
Brunotte, Horst
p. 67-79
Cross-bifix-free sets generation via Motzkin paths
Barcucci, Elena
;
Bilotta, Stefano
;
Pergola, Elisa
;
Pinzani, Renzo
;
Succi, Jonathan
p. 81-91
On digital blocks of polynomial values and extractions in the Rudin–Shapiro sequence
Stoll, Thomas
p. 93-99
A short proof that shuffle squares are 7-avoidable
Guégan, Guillaume
;
Ochem, Pascal
p. 101-103
Tilings by
1
×
1
and
2
×
2
Rolin, Nicolas
;
Ugolnikova, Alexandra
p. 105-116
Issue no. 2
Table of Contents
Computing Depths of Patterns
Blanchet-Sadri, F.
;
Lohr, Andrew
p. 117-133
The average lower reinforcement number of a graph
Turaci, Tufan
;
Aslan, Ersin
p. 135-144
Delay Games with WMSO
+
U Winning Conditions
Zimmermann, Martin
p. 145-165
Note on occurrences of factors in circular words
Arnoux, Pierre
p. 167-170
Advice complexity of disjoint path allocation
Kováčová, Ivana
p. 171-191
Issue no. 3
Table of Contents
Traceable Identity-Based Group Signature
Gu, Ke
;
Yang, Lihao
;
Wang, Yong
;
Wen, Sheng
p. 193-226
Parameterized exact and approximation algorithms for maximum
k
-set cover and related satisfiability problems
Bonnet, Édouard
;
Paschos, Vangelis Th.
;
Sikora, Florian
p. 227-240
A novel image encryption algorithm based on the extracted map of overlapping paths from the secret key
Fadhil Al-Husainy, Mohammed A.
p. 241-249
Kleene closure and state complexity
Palmovský, Matúš
p. 251-261
The average scattering number of graphs
Aslan, Ersin
;
Kilinç, Deniz
;
Yücalar, Fatih
;
Borandağ, Emin
p. 263-272
Issue no. 4
Table of Contents
7th Non-Classical Models of Automata and Applications (NCMA-2015)
Preface: Non-Classical Models of Automata and Applications VII
Holzer, Markus
;
Moreira, Nelma
;
Reis, Rogério
Holzer, Markus
;
Moreira, Nelma
;
Reis, Rogério
(eds.)
p. 273-274
Input- or output-unary sweeping transducers are weaker than their 2-way counterparts
Guillon, Bruno
p. 275-294
A pumping lemma for flip-pushdown languages
Kostolányi, Peter
p. 295-311
When input-driven pushdown automata meet reversiblity
Kutrib, Martin
;
Malcher, Andreas
;
Wendlandt, Matthias
p. 313-330
Two-way representations and weighted automata
Lombardy, Sylvain
p. 331-350
Some classes of rational functions for pictures
Mráz, František
;
Otto, Friedrich
;
Průša, Daniel
p. 351-369
Homing vector automata
Salehi, Özlem
;
Cem Say, A. C.
;
D’Alessandro, Flavio
p. 371-386