2 %%% Do NOT edit. File created by BibTeX with style
\r
3 %%% ACM-Reference-Format-Journals [18-Jan-2012].
\r
5 \begin{thebibliography}{00}
\r
7 %%% ====================================================================
\r
8 %%% NOTE TO THE USER: you can override these defaults by providing
\r
9 %%% customized versions of any of these macros before the \bibliography
\r
10 %%% command. Each of them MUST provide its own final punctuation,
\r
11 %%% except for \shownote{}, \showDOI{}, and \showURL{}. The latter two
\r
12 %%% do not use final punctuation, in order to avoid confusing it with
\r
13 %%% the Web address.
\r
15 %%% To suppress output of a particular field, define its macro to expand
\r
16 %%% to an empty string, or better, \unskip, like this:
\r
18 %%% \newcommand{\showDOI}[1]{\unskip} % LaTeX syntax
\r
20 %%% \def \showDOI #1{\unskip} % plain TeX syntax
\r
22 %%% ====================================================================
\r
24 \ifx \showCODEN \undefined \def \showCODEN #1{\unskip} \fi
\r
25 \ifx \showDOI \undefined \def \showDOI #1{{\tt DOI:}\penalty0{#1}\ }
\r
27 \ifx \showISBNx \undefined \def \showISBNx #1{\unskip} \fi
\r
28 \ifx \showISBNxiii \undefined \def \showISBNxiii #1{\unskip} \fi
\r
29 \ifx \showISSN \undefined \def \showISSN #1{\unskip} \fi
\r
30 \ifx \showLCCN \undefined \def \showLCCN #1{\unskip} \fi
\r
31 \ifx \shownote \undefined \def \shownote #1{#1} \fi
\r
32 \ifx \showarticletitle \undefined \def \showarticletitle #1{#1} \fi
\r
33 \ifx \showURL \undefined \def \showURL #1{#1} \fi
\r
35 \bibitem[\protect\citeauthoryear{Ablamowicz and Fauser}{Ablamowicz and
\r
38 {Rafal Ablamowicz} {and} {Bertfried Fauser}. 2007.
\r
39 \newblock CLIFFORD: a Maple 11 Package for Clifford Algebra Computations,
\r
44 Retrieved February 28, 2008 from
\r
45 \url{http://math.tntech.edu/rafal/cliff11/index.html}}
\r
48 \bibitem[\protect\citeauthoryear{Abril and Plant}{Abril and Plant}{2007}]%
\r
50 {Patricia~S. Abril} {and} {Robert Plant}. 2007.
\r
51 \newblock \showarticletitle{The patent holder's dilemma: Buy, sell, or troll?}
\r
52 \newblock {\it Commun. ACM} {50}, 1 (Jan. 2007), 36--44.
\r
55 \url{http://dx.doi.org/10.1145/1188913.1188915}}
\r
58 \bibitem[\protect\citeauthoryear{Andler}{Andler}{1979}]%
\r
60 {Sten Andler}. 1979.
\r
61 \newblock \showarticletitle{Predicate Path expressions}. In {\em Proceedings of
\r
62 the 6th. ACM SIGACT-SIGPLAN symposium on Principles of Programming Languages}
\r
63 {\em (POPL '79)}. ACM Press, New York, NY, 226--236.
\r
66 \url{http://dx.doi.org/10.1145/567752.567774}}
\r
69 \bibitem[\protect\citeauthoryear{Anisi}{Anisi}{2003}]%
\r
71 {David~A. Anisi}. 2003.
\r
72 \newblock {\em Optimal Motion Control of a Ground Vehicle}.
\r
73 \newblock Master's\ thesis. Royal Institute of Technology (KTH), Stockholm,
\r
78 \bibitem[\protect\citeauthoryear{Clarkson}{Clarkson}{1985}]%
\r
80 {Kenneth~L. Clarkson}. 1985.
\r
81 \newblock {\em Algorithms for Closest-Point Problems (Computational Geometry)}.
\r
82 \newblock Ph.D. Dissertation. Stanford University, Palo Alto, CA.
\r
85 \shownote{UMI Order Number: AAT 8506171.}
\r
88 \bibitem[\protect\citeauthoryear{Cohen}{Cohen}{1996}]%
\r
90 {Jacques Cohen} (Ed.). 1996.
\r
91 \newblock \showarticletitle{Special Issue: Digital Libraries}.
\r
92 \newblock {\em Commun. {ACM}\/} {39}, 11 (Nov. 1996).
\r
96 \bibitem[\protect\citeauthoryear{Cohen, Nutt, and Sagic}{Cohen
\r
97 et~al\mbox{.}}{2007}]%
\r
99 {Sarah Cohen}, {Werner Nutt}, {and} {Yehoshua Sagic}. 2007.
\r
100 \newblock \showarticletitle{Deciding equivalances among conjunctive aggregate
\r
102 \newblock {\em J. ACM\/} {54}, 2, Article 5 (April 2007), 50 pages.
\r
105 \url{http://dx.doi.org/10.1145/1219092.1219093}}
\r
108 \bibitem[\protect\citeauthoryear{Douglass, Harel, and Trakhtenbrot}{Douglass
\r
109 et~al\mbox{.}}{1998}]%
\r
111 {Bruce~P. Douglass}, {David Harel}, {and} {Mark~B. Trakhtenbrot}. 1998.
\r
112 \newblock \showarticletitle{Statecarts in use: structured analysis and
\r
113 object-orientation}.
\r
114 \newblock In {\em Lectures on Embedded Systems}, {Grzegorz Rozenberg} {and}
\r
115 {Frits~W. Vaandrager} (Eds.). Lecture Notes in Computer Science, Vol. 1494.
\r
116 Springer-Verlag, London, 368--394.
\r
119 \url{http://dx.doi.org/10.1007/3-540-65193-4_29}}
\r
122 \bibitem[\protect\citeauthoryear{Editor}{Editor}{2007}]%
\r
124 {Ian Editor} (Ed.). 2007.
\r
125 \newblock {\em The title of book one\/} (1st. ed.). The name of the series one,
\r
127 \newblock University of Chicago Press, Chicago.
\r
130 \url{http://dx.doi.org/10.1007/3-540-09237-4}}
\r
133 \bibitem[\protect\citeauthoryear{Editor}{Editor}{2008}]%
\r
135 {Ian Editor} (Ed.). 2008.
\r
136 \newblock {\em The title of book two\/} (2nd. ed.).
\r
137 \newblock University of Chicago Press, Chicago, Chapter 100.
\r
140 \url{http://dx.doi.org/10.1007/3-540-09237-4}}
\r
143 \bibitem[\protect\citeauthoryear{Gundy, Balzarotti, and Vigna}{Gundy
\r
144 et~al\mbox{.}}{2007}]%
\r
146 {Matthew~Van Gundy}, {Davide Balzarotti}, {and} {Giovanni Vigna}. 2007.
\r
147 \newblock \showarticletitle{Catch me, if you can: Evading network signatures
\r
148 with web-based polymorphic worms}. In {\em Proceedings of the first USENIX
\r
149 workshop on Offensive Technologies} {\em (WOOT '07)}. USENIX Association,
\r
150 Berkley, CA, Article 7, 9 pages.
\r
154 \bibitem[\protect\citeauthoryear{Harel}{Harel}{1978}]%
\r
156 {David Harel}. 1978.
\r
157 \newblock {\em LOGICS of Programs: AXIOMATICS and DESCRIPTIVE POWER}.
\r
158 \newblock MIT Research Lab Technical Report TR-200. Massachusetts Institute of
\r
159 Technology, Cambridge, MA.
\r
163 \bibitem[\protect\citeauthoryear{Harel}{Harel}{1979}]%
\r
165 {David Harel}. 1979.
\r
166 \newblock {\em First-Order Dynamic Logic}. Lecture Notes in Computer Science,
\r
168 \newblock Springer-Verlag, New York, NY.
\r
171 \url{http://dx.doi.org/10.1007/3-540-09237-4}}
\r
174 \bibitem[\protect\citeauthoryear{H{\"o}rmander}{H{\"o}rmander}{1985a}]%
\r
176 {Lars H{\"o}rmander}. 1985a.
\r
177 \newblock {\em The analysis of linear partial differential operators. {III}}.
\r
178 Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of
\r
179 Mathematical Sciences], Vol. 275.
\r
180 \newblock Springer-Verlag, Berlin, Germany. viii+525 pages.
\r
182 \showISBNx{3-540-13828-5}
\r
184 \shownote{Pseudodifferential operators.}
\r
187 \bibitem[\protect\citeauthoryear{H{\"o}rmander}{H{\"o}rmander}{1985b}]%
\r
189 {Lars H{\"o}rmander}. 1985b.
\r
190 \newblock {\em The analysis of linear partial differential operators. {IV}}.
\r
191 Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of
\r
192 Mathematical Sciences], Vol. 275.
\r
193 \newblock Springer-Verlag, Berlin, Germany. vii+352 pages.
\r
195 \showISBNx{3-540-13829-3}
\r
197 \shownote{Fourier integral operators.}
\r
200 \bibitem[\protect\citeauthoryear{Kirschmer and Voight}{Kirschmer and
\r
202 {Kirschmer:2010:AEI:1958016.1958018}
\r
203 {Markus Kirschmer} {and} {John Voight}. 2010.
\r
204 \newblock \showarticletitle{Algorithmic Enumeration of Ideal Classes for
\r
205 Quaternion Orders}.
\r
206 \newblock {\em SIAM J. Comput.\/} {39}, 5 (Jan. 2010), 1714--1747.
\r
208 \showISSN{0097-5397}
\r
210 \url{http://dx.doi.org/10.1137/080734467}}
\r
213 \bibitem[\protect\citeauthoryear{Knuth}{Knuth}{1997}]%
\r
215 {Donald~E. Knuth}. 1997.
\r
216 \newblock {\em The Art of Computer Programming, Vol. 1: Fundamental Algorithms
\r
218 \newblock Addison Wesley Longman Publishing Co., Inc.
\r
222 \bibitem[\protect\citeauthoryear{Kosiur}{Kosiur}{2001}]%
\r
224 {David Kosiur}. 2001.
\r
225 \newblock {\em Understanding Policy-Based Networking\/} (2nd. ed.).
\r
226 \newblock Wiley, New York, NY.
\r
230 \bibitem[\protect\citeauthoryear{Lee}{Lee}{2005}]%
\r
232 {Newton Lee}. 2005.
\r
233 \newblock \showarticletitle{Interview with Bill Kinder: January 13, 2005}.
\r
234 \newblock Video, {\em Comput. Entertain.\/} {3}, 1, Article 4 (Jan.-March
\r
238 \url{http://dx.doi.org/10.1145/1057270.1057278}}
\r
241 \bibitem[\protect\citeauthoryear{Novak}{Novak}{2003}]%
\r
243 {Dave Novak}. 2003.
\r
244 \newblock \showarticletitle{Solder man}. Video. In {\em ACM SIGGRAPH 2003 Video
\r
245 Review on Animation theater Program: Part I - Vol. 145 (July 27--27, 2003)}.
\r
246 ACM Press, New York, NY, 4.
\r
249 \url{http://dx.doi.org/99.9999/woot07-S422}}
\r
252 \bibitem[\protect\citeauthoryear{Obama}{Obama}{2008}]%
\r
254 {Barack Obama}. 2008.
\r
255 \newblock A more perfect union.
\r
256 \newblock Video. (5 March 2008).
\r
259 Retrieved March 21, 2008 from
\r
260 \url{http://video.google.com/videoplay?docid=6528042696351994555}}
\r
263 \bibitem[\protect\citeauthoryear{Poker-Edge.Com}{Poker-Edge.Com}{2006}]%
\r
265 {Poker-Edge.Com}. 2006.
\r
266 \newblock Stats and Analysis.
\r
267 \newblock (March 2006).
\r
270 Retrieved June 7, 2006 from \url{http://www.poker-edge.com/stats.php}}
\r
273 \bibitem[\protect\citeauthoryear{Rous}{Rous}{2008}]%
\r
275 {Bernard Rous}. 2008.
\r
276 \newblock \showarticletitle{The Enabling of Digital Libraries}.
\r
277 \newblock {\em Digital Libraries\/} {12}, 3, Article 5 (July 2008).
\r
280 \shownote{To appear.}
\r
283 \bibitem[\protect\citeauthoryear{Saeedi, Zamani, and Sedighi}{Saeedi
\r
284 et~al\mbox{.}}{2010a}]%
\r
286 {Mehdi Saeedi}, {Morteza~Saheb Zamani}, {and} {Mehdi Sedighi}. 2010a.
\r
287 \newblock \showarticletitle{A library-based synthesis methodology for
\r
289 \newblock {\em Microelectron. J.\/} {41}, 4 (April 2010), 185--194.
\r
293 \bibitem[\protect\citeauthoryear{Saeedi, Zamani, Sedighi, and Sasanian}{Saeedi
\r
294 et~al\mbox{.}}{2010b}]%
\r
296 {Mehdi Saeedi}, {Morteza~Saheb Zamani}, {Mehdi Sedighi}, {and} {Zahra
\r
298 \newblock \showarticletitle{Synthesis of Reversible Circuit Using Cycle-Based
\r
300 \newblock {\em J. Emerg. Technol. Comput. Syst.\/} {6}, 4 (Dec. 2010).
\r
304 \bibitem[\protect\citeauthoryear{Scientist}{Scientist}{2009}]%
\r
306 {Joseph Scientist}. 2009.
\r
307 \newblock The fountain of youth.
\r
308 \newblock (Aug. 2009).
\r
311 \shownote{Patent No. 12345, Filed July 1st., 2008, Issued Aug. 9th., 2009.}
\r
314 \bibitem[\protect\citeauthoryear{Smith}{Smith}{2010}]%
\r
316 {Stan~W. Smith}. 2010.
\r
317 \newblock \showarticletitle{An experiment in bibliographic mark-up: Parsing
\r
318 metadata for XML export}. In {\em Proceedings of the 3rd. annual workshop on
\r
319 Librarians and Computers} {\em (LAC '10)}, {Reginald~N. Smythe} {and}
\r
320 {Alexander Noble} (Eds.), Vol.~3. Paparazzi Press, Milan Italy, 422--431.
\r
323 \url{http://dx.doi.org/99.9999/woot07-S422}}
\r
326 \bibitem[\protect\citeauthoryear{Spector}{Spector}{1990}]%
\r
328 {Asad~Z. Spector}. 1990.
\r
329 \newblock \showarticletitle{Achieving application requirements}.
\r
330 \newblock In {\em Distributed Systems} (2nd. ed.), {Sape Mullender} (Ed.). ACM
\r
331 Press, New York, NY, 19--33.
\r
334 \url{http://dx.doi.org/10.1145/90417.90738}}
\r
337 \bibitem[\protect\citeauthoryear{Thornburg}{Thornburg}{2001}]%
\r
339 {Harry Thornburg}. 2001.
\r
340 \newblock Introduction to Bayesian Statistics.
\r
341 \newblock (March 2001).
\r
344 Retrieved March 2, 2005 from
\r
345 \url{http://ccrma.stanford.edu/~jos/bayes/bayes.html}}
\r
348 \end{thebibliography}
\r