Fast Meldable Priority Queues
暂无分享,去创建一个
[1] Michael J. Fischer,et al. Fishspear: a priority queue algorithm , 1994, JACM.
[2] Rajeev Raman,et al. A Constant Update Time Finger Search Tree , 1990, Inf. Process. Lett..
[3] David A. Basin,et al. Hardware Verification using Monadic Second-Order Logic , 1995, CAV.
[4] Leonidas J. Guibas,et al. A new representation for linear lists , 1977, STOC '77.
[5] A. Ingólfsdóttir. A Semantic Theory for Value–Passing Processes Late Approach Part I: A Denotational Model and Its Complete Axiomatization , 1995 .
[6] Nicola Santoro,et al. Min-max heaps and generalized priority queues , 1986, CACM.
[7] Jean Vuillemin,et al. A data structure for manipulating priority queues , 1978, CACM.
[8] Peter Bro Miltersen,et al. Dynamic Algorithms for the Dyck Languages , 1995, WADS.
[9] Gerth Stølting Brodal. Fast Meldable Priority Queues , 1995 .
[10] Peter Høyer,et al. A general technique for implementation of efficient priority queues , 1995, Proceedings Third Israel Symposium on the Theory of Computing and Systems.
[11] Igor Walukiewicz. A Complete Deductive System for the-Calculus , 1995, LICS 1995.
[12] Robert E. Tarjan,et al. Relaxed heaps: an alternative to Fibonacci heaps with applications to parallel computation , 1988, CACM.
[13] Lars R. Knudsen. Partial and Higher Order Differentials and Applications to the DES , 1995 .
[14] L FredmanMichael,et al. Fibonacci heaps and their uses in improved network optimization algorithms , 1987 .
[15] Kim G. Larsen,et al. From Timed Automata to Logic - and Back , 1995, MFCS.
[16] J. Ian Munro,et al. An Implicit Binomial Queue with Constant Insertion Time , 1988, SWAT.
[17] Robert E. Tarjan,et al. Fibonacci heaps and their uses in improved network optimization algorithms , 1984, JACM.
[18] Alberto Apostolico,et al. An Optimal O(log log N)-Time Parallel Algorithm for Detecting All Squares in a String , 1996, SIAM J. Comput..
[19] R. Tarjan. Amortized Computational Complexity , 1985 .
[20] L. Aceto,et al. A Complete Equational Axiomatization for Prefix Iteration with Silent Steps , 1995 .
[21] Rajeev Raman,et al. A Constant Update Time Finger Search Tree , 1990, ICCI.
[22] Friedhelm Meyer auf der Heide,et al. Transforming Comparison Model Lower Bounds to the Parallel-Random-Access-Machine , 1997, Inf. Process. Lett..