“…In many cases the algorithms do not have enough detail that allows them to be reverse engineered, and contact with their authors did not resolve the issue. References used in tables (4.4, 4.5) are as follows, (1) = [Handl et al, 2003a], (2) = [Tan et al, 2011], (3) = [Boryczka, 2010], (4) = , (5) = [Martens et al, 2007], (6) = [Xiong et al, 2012], (7) = [Chaimontree et al, 2010], (8) = [Breaban and Luchian, 2011], (9) = [Monmarché et al, 1999a], (10) = [Niknam and Amiri, 2010], (11) = [Santos and Bazzan, 2009], (12) = [Chandrasekar and Srinivasan, 2007], (13) = [Cano et al, 2013], (14) = [Wan et al, 2012], (15) = [Tan et al, 2006], (16) = [Bougenière et al, 2009], (17) = [Wang et al, 2007], (18) = [Jebara, 2002], (19) = [Rami and Panchal, 2012], (20) = [Azzag et al, 2007], (21) = [Labroche et al, 2002a], (22) = [Guo et al, 2003], (23) = [Yang and Zhang, 2007], (24) = [Ingaramo et al, 2005], (25) = [Shukran et al, 2011].…”