{"title":"The verification of the protection mechanisms of high-level language machines","authors":"V. Gligor","doi":"10.1007/BF00991620","DOIUrl":"https://doi.org/10.1007/BF00991620","url":null,"abstract":"","PeriodicalId":250718,"journal":{"name":"International Journal of Computer & Information Sciences","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1984-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127128321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algorithms for the inverse and a generalization of the state space approach to finite automata","authors":"C. Yang, Houkuan Huang","doi":"10.1007/BF00989483","DOIUrl":"https://doi.org/10.1007/BF00989483","url":null,"abstract":"","PeriodicalId":250718,"journal":{"name":"International Journal of Computer & Information Sciences","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1984-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133035492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inferability of context-free programmed grammars","authors":"H. R. Lu, K. Fu","doi":"10.1007/BF00989482","DOIUrl":"https://doi.org/10.1007/BF00989482","url":null,"abstract":"","PeriodicalId":250718,"journal":{"name":"International Journal of Computer & Information Sciences","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1984-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114748993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An optimal time and minimal space algorithm for rectangle intersection problems","authors":"D. T. Lee","doi":"10.1007/BF00989481","DOIUrl":"https://doi.org/10.1007/BF00989481","url":null,"abstract":"","PeriodicalId":250718,"journal":{"name":"International Journal of Computer & Information Sciences","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1984-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126585668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Microcode compaction: Extending the boundaries","authors":"D. Landskov, J. A. Fisher, B. Shriver","doi":"10.1007/BF00989480","DOIUrl":"https://doi.org/10.1007/BF00989480","url":null,"abstract":"","PeriodicalId":250718,"journal":{"name":"International Journal of Computer & Information Sciences","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1984-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125691847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cellular topology and its applications in image processing","authors":"L. Ankeney, G. Ritter","doi":"10.1007/BF00977969","DOIUrl":"https://doi.org/10.1007/BF00977969","url":null,"abstract":"","PeriodicalId":250718,"journal":{"name":"International Journal of Computer & Information Sciences","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1983-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132811380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal restructuring functions for hierarchical data bases","authors":"T. Niemi","doi":"10.1007/BF00977967","DOIUrl":"https://doi.org/10.1007/BF00977967","url":null,"abstract":"","PeriodicalId":250718,"journal":{"name":"International Journal of Computer & Information Sciences","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1983-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133145742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On game graph structure and its influence on pathology","authors":"Dana S. Nau","doi":"10.1007/BF00977966","DOIUrl":"https://doi.org/10.1007/BF00977966","url":null,"abstract":"","PeriodicalId":250718,"journal":{"name":"International Journal of Computer & Information Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1983-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130705551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Safety in grammatical protection systems","authors":"T. Budd","doi":"10.1007/BF00977968","DOIUrl":"https://doi.org/10.1007/BF00977968","url":null,"abstract":"","PeriodicalId":250718,"journal":{"name":"International Journal of Computer & Information Sciences","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1983-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123956228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exponentiation modulo a polynomial for data security","authors":"S. Kak","doi":"10.1007/BF01008045","DOIUrl":"https://doi.org/10.1007/BF01008045","url":null,"abstract":"","PeriodicalId":250718,"journal":{"name":"International Journal of Computer & Information Sciences","volume":"115 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1983-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128358295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}