# Journal of the Association for Computing Machinery

@article{1961JournalOT,
title={Journal of the Association for Computing Machinery},
author={},
journal={Nature},
year={1961},
volume={190},
pages={864}
}
• Published 1961
• Nature
1,458 Citations
Complexity of Problems for Commutative Grammars
Using linear algebra and a branching analog of the classic Euler theorem, it is shown that, under an assumption that the terminal alphabet is fixed, the membership problem for regular grammars is P, and that the equivalence problem for context free grammARS is in $\mathrm{\Pi_2^P}$.
Non-standard approaches to integer programming
• Mathematics
Discret. Appl. Math.
• 2002
On the period length of pseudorandom number sequences
vi Acknowledgements vii
Improved approximation schemes for scheduling unrelated parallel machines
STOC '99
• 1999
We consider the problem of scheduling n independent jobs on m unrelated parallel machines where each job has to be processed by exactly one machine, processing job j on machine i requires pij time
A distance measure between plant architecture
• 2017
In many biological fields (e.g. horticulture, forestry, botany), a need exists to quantify different types of variability within a set of plants. In this paper, we propose a method to compare plant
Denominator Bounds for Systems of Recurrence Equations using $\Pi\Sigma$-Extensions
• Mathematics, Computer Science
• 2017
The goal is to find a denominator bound (also known as universal denominator) for the solutions of linear systems of recurrence equations whose coefficients are given in terms of indefinite nested sums and products covering, e.g., the harmonic numbers, hypergeometric products, q-hypergeometry products or their mixed versions.
Port based software architecture and its analysis
• Computer Science
2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)
• 2016
By defining port operations, the representation of an architecture with the proposed formulism is simpler comparing with those by other ADLs, and an architecture is a semigroup to the component operations: composing and nesting.
A Clustering-Based Unsupervised Approach to Anomaly Intrusion Detection
• Computer Science
• 2013
The presented method parses the set of training data, consisting of normal and anomaly data, and separates the data into two clusters, each cluster represented by its centroid - one of the normal observations, and the other - for the anomalies.