The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Assumption with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1958-1974 (17) 1975-1979 (16) 1980-1982 (19) 1983-1984 (23) 1985 (16) 1986 (17) 1987 (28) 1988 (47) 1989 (45) 1990 (52) 1991 (46) 1992 (59) 1993 (63) 1994 (66) 1995 (94) 1996 (83) 1997 (119) 1998 (118) 1999 (174) 2000 (252) 2001 (215) 2002 (353) 2003 (420) 2004 (584) 2005 (732) 2006 (936) 2007 (1016) 2008 (1065) 2009 (631) 2010 (121) 2011 (55) 2012 (56) 2013 (62) 2014 (57) 2015 (55) 2016 (70) 2017 (79) 2018 (90) 2019 (74) 2020 (78) 2021 (62) 2022 (71) 2023 (86) 2024 (15)
Publication types (Num. hits)
article(2177) incollection(27) inproceedings(6118) phdthesis(15)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7236 occurrences of 3979 keywords

Results
Found 8337 publication records. Showing 8337 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
56Achour Mostéfaoui, Michel Raynal, Corentin Travers Time-Free and Timer-Based Assumptions Can Be Combined to Obtain Eventual Leadership. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF time-free assumption, timer-based assumption, fault tolerance, distributed algorithm, Asynchronous system, leader election, process crash, hybrid protocol
51Nick Moffat, Michael Goldsmith Assumption-Commitment Support for CSP Model Checking. Search on Bibsonomy J. Autom. Reason. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Assumption-commitment, Model checking, Refinement, CSP, Compositional reasoning, Assume-guarantee
47Allison B. Lewko, Brent Waters Efficient pseudorandom functions from the decisional linear assumption and weaker variants. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF decisional linear assumption, pseudorandom functions
47Seungjoo Kim, Masahiro Mambo, Yuliang Zheng 0001 Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Kerckhoffs' assumption, provable security, chosen-ciphertext security
45Kaoru Kurosawa, Swee-Huay Heng Relations Among Security Notions for Undeniable Signature Schemes. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security notions, factoring assumption, composite decision Diffie-Hellman assumption, Undeniable signature
43Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya, Katsuhiro Tashiro On the pseudo-freeness and the CDH assumption. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CDH assumption, Pseudo-free group, Pseudo-free group with generalized exponential expressions, Weak pseudo-free group
43Christian Schridde, Bernd Freisleben On the Validity of the phi-Hiding Assumption in Cryptographic Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ?-Hiding assumption, Jacobi symbol, Euler’s totient function
42Atilla Elçi, Behnam Rahnama, Saman Kamran Defining a Strategy to Select Either of Closed/Open World Assumptions on Semantic Robots. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Open World Assumption, Semantic Robotics, Labyrinth, Ontology, Close World Assumption
38Roland Ducournau, Floréal Morandat, Jean Privat Empirical assessment of object-oriented implementations with multiple inheritance and static typing. Search on Bibsonomy OOPSLA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF binary tree dispatch, downcast, method tables, multiple subtyping, open-world assumption, single inheritance, subtype test, virtual function table, interfaces, coloring, multiple inheritance, perfect hashing, closed-world assumption, type analysis, late binding, dynamic loading
38Seiko Arita, Koji Tsurudome Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF threshold public-key encryption schemes, tag-based encryption schemes, the decisional bilinear Diffie-Hellman assumption, the decisional linear assumption
38Raylin Tso, Takeshi Okamoto, Eiji Okamoto Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF CDH assumption, DDH assumption, double discrete logarithm, one-way two-party authenticated key agreement, privacy, designated verifier signature
38Maria Luisa Bonet, Toniann Pitassi, Ran Raz No Feasible Interpolation for TC0-Frege Proofs. Search on Bibsonomy FOCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF TC/sup 0/-Frege proofs, feasible interpolation, complexity-theoretic assumption, hardness assumption, lower bounds, theorem proving, Chinese Remainder Theorem, proof systems
36Luigi Beghi, Elisabetta Xausa, Mario Zanforlin Modelling stereokinetic phenomena by a minimum relative motion assumption: the tilted disk, the ellipsoid and the tilted bar. Search on Bibsonomy Biol. Cybern. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Stereokinetic phenomena, Minimum relative motion assumption, Tilted disk, Tilted ellipsoid, Tilted bar
36Huafei Zhu Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Committed signatures, strong RSA assumption, fair exchange protocols
35Xin He, Eric C. Frey Three-Class ROC Analysis - The Equal Error Utility Assumption and the Optimality of Three-Class ROC Surface Using the Ideal Observer. Search on Bibsonomy IEEE Trans. Medical Imaging The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Antonio Fernández Anta, Michel Raynal From an Intermittent Rotating Star to a Leader. Search on Bibsonomy OPODIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Assumption coverage, Eventual t-source, Moving source, Timely link, Fault-tolerance, Distributed algorithm, System model, Asynchronous system, Failure detector, Process crash, Partial synchrony, Omega, Message pattern, Eventual leader
34Kaoru Kurosawa, Katja Schmidt-Samoa New Online/Offline Signature Schemes Without Random Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Online/offline signatures, trapdoor hash, division intractability, strong RSA assumption
33Ping Yu 0006, Stephen R. Tate An Online/Offline Signature Scheme Based on the Strong RSA Assumption. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Online/Offline Signing, Suitable Hash Function, Digital Signature, Random Oracle, Strong RSA Assumption
33Swarup Mohalik, Ramaswamy Ramanujam A Presentation of Regular Languages in the Assumption - Commitment Framework. Search on Bibsonomy ACSD The full citation details ... 1998 DBLP  DOI  BibTeX  RDF assumption-commitment, distributed systems, Regular languages
33Y. J. Jiang, Yongyuth Aramkulchai On the Relationship between Assumption-based Framework and Autoepistemic Logic. Search on Bibsonomy ISMIS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Assumption-based framework, Argumentation system, Reflexive Autoepistemic Logic, 3-valued AE logic, Abduction, Autoepistemic Logic
33Paritosh K. Pandya Some Comments on the Assumption-Commitment Framework for Compositional Verification of Distributed Programs. Search on Bibsonomy REX Workshop The full citation details ... 1989 DBLP  DOI  BibTeX  RDF Assumption Commitment Framework, Compositional Verification, Inductive Inference, Liveness properties
32Isamu Teranishi, Wakaha Ogata Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Statistical Plaintext Awareness, Cramer-Shoup Scheme, Standard Model
31Jin Li 0002, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong Generic Security-Amplifying Methods of Ordinary Digital Signatures. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Weak Chosen Message Attack, q-SDH Assumption, Signature, Strong-RSA Assumption, Strong Unforgeability
31Leonid Libkin, Cristina Sirangelo Data exchange and schema mappings in open and closed worlds. Search on Bibsonomy PODS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF open world assumption, data exchange, incomplete information, schema mappings, closed world assumption
31Michel Raynal Eventual Leader Service in Unreliable Asynchronous Systems: Why? How? Search on Bibsonomy NCA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Assumption coverage, Behavioral assumption, Eventual tsource, Eventual timely link, Fault-tolerance, Distributed algorithm, System model, Asynchronous system, Oracle, Failure detector, Process crash, Partial synchrony, Omega, Message pattern, Eventual leader
31Joachim Biskup A Foundation of Codd's Relational Maybe-Operations. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1983 DBLP  DOI  BibTeX  RDF maybe-tuple, open word assumption, relational database, redundancy, representation, relational algebra, information content, null value, closed world assumption, negative information
31Jean-Sébastien Coron, David Naccache Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Pham Ngoc Hung, Toshiaki Aoki, Takuya Katayama A Minimized Assumption Generation Method for Component-Based Software Verification. Search on Bibsonomy ICTAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF minimal assumption, model checking, learning algorithm, modular verification, assume-guarantee reasoning
28Ali Bagherzandi, Jung Hee Cheon, Stanislaw Jarecki Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF concurrent proofs of knowledge, equiocable homomorphic commitment, forking lemma, multisignatures
28Wei Gao 0007, Guilin Wang, Xueli Wang, Fei Li 0006 One-Round ID-Based Blind Signature Scheme without ROS Assumption. Search on Bibsonomy Pairing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Goichiro Hanaoka, Kaoru Kurosawa Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Francesca Toni Assumption-Based Argumentation for Closed and Consistent Defeasible Reasoning. Search on Bibsonomy JSAI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Umberto Straccia A Top-Down Query Answering Procedure for Normal Logic Programs Under the Any-World Assumption. Search on Bibsonomy ECSQARU The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Manfred Jaeger On Testing the Missing at Random Assumption. Search on Bibsonomy ECML The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Robert A. Lackman, David Tipper, John D. Spragins Sensitivity Analysis on the Assumption of Geometric Batch Arrivals for Real-Time Versus Non-Real-Time Scheduling in a Statistical Multiplexer. Search on Bibsonomy RTCSA The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
27Zhongqiang Wang, Li Zhu Intrinsic Image Decomposition with Local Smooth Assumption and Global Color Assumption. Search on Bibsonomy CVM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27Yoshikazu Hanatani, Hirofumi Muratani, Tomoko Yonemura Toward Compact Public Key Encryption Based on CDH Assumption via Extended Twin DH Assumption. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Tzu-Tsung Wong Alternative prior assumptions for improving the performance of naïve Bayesian classifiers. Search on Bibsonomy Data Min. Knowl. Discov. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Conjugate, Dirichlet assumption, Generalized Dirichlet distribution, Liouville distribution, Naïve Bayesian classifier
26Feng-Jen Yang Eliciting an overlooked aspect of Bayesian reasoning. Search on Bibsonomy ACM SIGCSE Bull. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Bayesian assumption, uncertainty management, Bayesian reasoning
26Toru Nakanishi 0001, Nobuo Funabiki A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF backward unlinkability, DLDH assumption, group signature, revocation, bilinear maps
26Gerth Stølting Brodal, Rolf Fagerberg On the limits of cache-obliviousness. Search on Bibsonomy STOC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Cache-oblivious model, tall cache assumption, lower bound, sorting, permuting
26Christian Cachin, Silvio Micali, Markus Stadler Computationally Private Information Retrieval with Polylogarithmic Communication. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Euler's function, hiding assumption, Private information retrieval, Integer factorization
25Fei Pu, Yan Zhang Localizing Program Errors via Slicing and Reasoning. Search on Bibsonomy HASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Victor Shoup Using Hash Functions as a Hedge against Chosen Ciphertext Attack. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Dan Boneh, Xavier Boyen Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Digital signatures, Bilinear pairings, Standard model, Strong unforgeability
24Chia-Cheng Hsu, Guu-chang Yang, Wing C. Kwong Hard-Limiting Performance Analysis of 2-D Optical Codes Under the Chip-Asynchronous Assumption. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Toru Nakanishi 0001, Nobuo Funabiki A short anonymously revocable group signature scheme from decision linear assumption. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anonymity, group signature, revocation
24Javier Villares, Gregori Vázquez The Gaussian Assumption in Second-Order Estimation Problems in Digital Communications. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Søren E. Jespersen, Torben Bach Pedersen, Jesper Thorhauge Evaluating the markov assumption for web usage mining. Search on Bibsonomy WIDM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF markov models, web usage mining, information quality
24Soyoung Kim, Yehia Massoud, S. Simon Wong On the Accuracy of Return Path Assumption for Loop Inductance Extraction for 0.1?m Technology and Beyond. Search on Bibsonomy ISQED The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Yun He, Hamid Krim Multiscale signal enhancement: beyond the normality and independence assumption. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Ronald Cramer, Victor Shoup Signature schemes based on the strong RSA assumption. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF digital signatures, RSA, provable security
24MaoLin Qiu Computing Optical Flow Based on the Mass-Conserving Assumption. Search on Bibsonomy ICPR The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Ronald Cramer, Victor Shoup Signature Schemes Based on the Strong RSA Assumption. Search on Bibsonomy CCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
24Alvin C. M. Kwan Validity of Normality Assumption in CSP Research. Search on Bibsonomy PRICAI The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
24Tomasz Imielinski, Nicolas Spyratos On Lossless Transformation of Database Schemes not Necessarily Satisfying Universal Instance Assumption. Search on Bibsonomy PODS The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
23Qingfeng Cheng, Chuangui Ma, Xuexian Hu A New Strongly Secure Authenticated Key Exchange Protocol. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Extended Canetti-Krawczyk model, Gap Diffie-Hellman assumption, Random oracle model, Authenticated key exchange
23Takato Hirano, Koichiro Wada, Keisuke Tanaka Public-Key Cryptosystems with Primitive Power Roots of Unity. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Paillier encryption scheme, factoring assumption, power roots of unity, homomorphism
23He Ge, Stephen R. Tate Efficient Authenticated Key-Exchange for Devices with a Trusted Manager. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Embedded Systems, Authentication, Key Exchange, Strong RSA Assumption
23Sujing Zhou, Dongdai Lin Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF LRSW Assumption, Verifier-Local Revocation, Group Signature, Bilinear Map
23Geoffrey I. Webb, Janice R. Boughton, Zhihai Wang Not So Naive Bayes: Aggregating One-Dependence Estimators. Search on Bibsonomy Mach. Learn. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF semi-naive Bayes, attribute independence assumption, naive Bayes, probabilistic prediction
23Shuhong Wang 0001, Feng Bao 0001, Robert H. Deng Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cryptanalysis, Provable security, Forward security, Blind signature, Strong RSA assumption
23Sanjeev Kumar Mishra, Palash Sarkar 0001 Symmetrically Private Information Retrieval. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Private Information retrieval (PIR), Symmetrically Private Information Retrieval (SPIR), Quadratic Residuacity Assumption (QRA), Cryptographic Protocols, Probabilistic Encryption
23Shaz Qadeer, Robert K. Brayton, Vigyan Singhal Latch Redundancy Removal Without Global Reset. Search on Bibsonomy ICCD The full citation details ... 1996 DBLP  DOI  BibTeX  RDF global reset assumption, latch redundancy, safe replacement, delayed replacement, Finite state machine, core, strongly connected components
22Peng Zhang 0001, Xingquan Zhu 0001, Yong Shi 0001, Xindong Wu 0001 An Aggregate Ensemble for Mining Concept Drifting Data Streams with Noise. Search on Bibsonomy PAKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Noisy Data Streams, Ensemble Learning, Concept Drifting
22Ronen Shaltiel, Christopher Umans Pseudorandomness for Approximate Counting and Sampling. Search on Bibsonomy CCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens, Sven Lachmund, Thomas Walter 0001 Breaking the memory secrecy assumption. Search on Bibsonomy EUROSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF buffer overread, probabilistic countermeasure, buffer overflow, systems security, bypass
21Muxin Zhou, Zhenfu Cao Spatial Encryption under Simpler Assumption. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Susan Hohenberger, Brent Waters Short and Stateless Signatures from the RSA Assumption. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Hans Georg Schaathun On the Assumption of Equal Contributions in Fingerprinting. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Francesca Toni Assumption-Based Argumentation for Epistemic and Practical Reasoning. Search on Bibsonomy Computable Models of the Law, Languages, Dialogues, Games, Ontologies The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Richard C. Hendriks, Jan S. Erkelens, Richard Heusdens Comparison of complex-DFT estimators with and without the independence assumption of real and imaginary parts. Search on Bibsonomy ICASSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Giovanni Di Crescenzo, Helger Lipmaa Succinct NP Proofs from an Extractability Assumption. Search on Bibsonomy CiE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Laurence Anthony F. Park, Kotagiri Ramamohanarao Query Expansion for the Language Modelling Framework Using the Naïve Bayes Assumption. Search on Bibsonomy PAKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF naïve Bayes, language model, query expansion
21Yvo Desmedt, Helger Lipmaa, Duong Hieu Phan Hybrid Damgård Is CCA1-Secure under the DDH Assumption. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CCA1-security, Damgård’s cryptosystem, DDH, hybrid cryptosystems
21Dorian Gaertner, Francesca Toni Computing Arguments and Attacks in Assumption-Based Argumentation. Search on Bibsonomy IEEE Intell. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF implemented systems, dialectical structure, argumentation
21Antonio Fernández 0001, Ernesto Jiménez, Michel Raynal, Gilles Trédan A Timing Assumption and a t-Resilient Protocol for Implementing an Eventual Leader Service in Asynchronous Shared Memory Systems. Search on Bibsonomy ISORC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Timer property, Timing assumptions, Fault-tolerance, Shared memory, System model, Asynchronous system, Process crash, Atomic register, Omega, Eventual leader
21Dorian Gaertner, Francesca Toni Preferences and Assumption-Based Argumentation for Conflict-Free Normative Agents. Search on Bibsonomy ArgMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF argumentation, norms, conflicts, BDI agents
21Yufei Tao 0001, Christos Faloutsos, Dimitris Papadias Spatial Query Estimation without the Local Uniformity Assumption. Search on Bibsonomy GeoInformatica The full citation details ... 2006 DBLP  DOI  BibTeX  RDF databases, estimation, selectivity, nearest neighbor, range queries
21Daniel Stamate Assumption based multi-valued semantics for extended logic programs. Search on Bibsonomy ISMVL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Andrew Burton-Jones, Geoffrey S. Hubona Individual differences and usage behavior: revisiting a technology acceptance model assumption. Search on Bibsonomy Data Base The full citation details ... 2005 DBLP  DOI  BibTeX  RDF IT usage behavior, user acceptance of IT, technology acceptance model, individual differences
21Sergey Tulyakov, Venu Govindaraju Using Independence Assumption to Improve Multimodal Biometric Fusion. Search on Bibsonomy Multiple Classifier Systems The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Alvaro Cortés-Calabuig, Marc Denecker, Ofer Arieli, Bert Van Nuffelen, Maurice Bruynooghe On the Local Closed-World Assumption of Data-Sources. Search on Bibsonomy LPNMR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern RSA-OAEP Is Secure under the RSA Assumption. Search on Bibsonomy J. Cryptol. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RSA, Provable security, Public-key encryption, OAEP
21Marie Duflot, Laurent Fribourg, Claudine Picaronny Randomized dining philosophers without fairness assumption. Search on Bibsonomy Distributed Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern RSA-OAEP Is Secure under the RSA Assumption. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
21Giorgio Marchetti Observation levels and units of time: A critical analysis of the main assumption of the theory of the artificial. Search on Bibsonomy AI Soc. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Category mistake, Knowledge production, Mental activity, Observation level, Theory of the artificial
21Zhouchen Lin, Heung-Yeung Shum On the Number of Samples Needed in Light Field Rendering with Constant-Depth Assumption. Search on Bibsonomy CVPR The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
21Ivan Damgård, Jesper Buus Nielsen Improved Non-committing Encryption Schemes Based on a General Complexity Assumption. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
21Qiwen Xu, Swarup Mohalik Compositional Reasoning Using the Assumption-Commitment Paradigm. Search on Bibsonomy COMPOS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
21Michael Kaminski, Johann A. Makowsky, Michael L. Tiomkin Extensions for Open Default Theories via the Domain Closure Assumption. Search on Bibsonomy JELIA The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
21Bengt Jonsson 0001, Yih-Kuen Tsay Assumption/Guarantee Specifications in Linear-Time Temporal Logic (Extended Abstract). Search on Bibsonomy TAPSOFT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
21Dietmar Seipel An Efficient Computation of Extended Generalized Closed World Assumption by Support-for-Negation Sets. Search on Bibsonomy LPAR The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
21Uri Abraham, Shai Ben-David, Shlomo Moran On the Limitation of the Global Time Assumption in Distributed Systems (Extended Abstract). Search on Bibsonomy WDAG The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
21Shin-ichi Wada, Yoshiyuki Koseki An assumption-based localization technique for switching system. Search on Bibsonomy IEA/AIE (1) The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
21Jack Minker On Indefinite Databases and the Closed World Assumption. Search on Bibsonomy CADE The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
19Jin Li 0002, Man Ho Au, Willy Susilo, Dongqing Xie, Kui Ren 0001 Attribute-based signature and its applications. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF attribute-based, computational Diffie-Hellman assumption, anonymity, signature, predicate
19Tao Lin, Sheqin Dong, Bei Yu 0001, Song Chen 0001, Satoshi Goto A revisit to voltage partitioning problem. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF quasiconvex assumption, voltage partition
19Rui Xue 0001, Ninghui Li, Jiangtao Li 0001 Algebraic Construction for Zero-Knowledge Sets. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF zero knowledge set, accumulator strong RSA assumption, random oracle, Merkle tree
Displaying result #1 - #100 of 8337 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license