A refinement of a compression-oriented addressing scheme Chin-Chen ChangHuey-Cheue KowngTzong-Chen Wu Part I Computer Science Pages: 529 - 535
A general performance analysis method for uniform memory architectures Jong-Jeng ChenChiau-Shin WangChing-Roung Chou Part I Computer Science Pages: 536 - 560
Optimal dynamic multi-attribute hashing for range queries Evan P. HarrisKotagiri Ramamohanarao Part I Computer Science Pages: 561 - 579
The complexity of detecting crossingfree configurations in the plane Klaus JansenGerhard J. Woeginger Part I Computer Science Pages: 580 - 595
The equational part of proofs by structural induction Olav Lysne Part I Computer Science Pages: 596 - 618
Optimal order diagonally implicit Runge-Kutta methods A. H. Al-Rabeh Part II Numerical Mathematics Pages: 619 - 633
Fourier analysis of schwarz alternating methods for piecewise hermite bicubic orthogonal spline collocation Bernard BialeckiD. Scott Dillery Part II Numerical Mathematics Pages: 634 - 646
Results on the relative perturbation of the singular values of a matrix G. di LenaR. I. PelusoG. Piazza Part II Numerical Mathematics Pages: 647 - 653
Convergence and stability of implicit runge-kutta methods for systems with multiplicative noise Diego Bricio HernandezRenato Spigler Part II Numerical Mathematics Pages: 654 - 669
Convergence results for general linear methods on singular perturbation problems Stefan Schneider Part II Numerical Mathematics Pages: 670 - 686
Perturbation analysis of the orthogonal procrustes problem Inge Söderkvist Part II Numerical Mathematics Pages: 687 - 694
A stability analysis of the jacobi matrix inverse eigenvalue problem Shu-Fang Xu Part II Numerical Mathematics Pages: 695 - 702