Small and Large Scale Behavior of the Poissonized Telecom Process Serge CohenMurad S. Taqqu OriginalPaper Pages: 363 - 379
Foster's Formulas via Probability and the Kirchhoff Index José Luis Palacios OriginalPaper Pages: 381 - 387
Multiple Window and Cluster Size Scan Procedures Joseph I. NausSylvan Wallenstein OriginalPaper Pages: 389 - 400
An Iterative Approach to Determining the Length of the Longest Common Subsequence of Two Strings Hilary S. BoothShevarl F. MacNamaraSusan R. Wilson OriginalPaper Pages: 401 - 421
A Robust Heuristic Estimator for the Period of a Poisson Intensity Function Mark BebbingtonRičardas Zitikis OriginalPaper Pages: 441 - 462