|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 10796 occurrences of 5606 keywords
|
|
|
Results
Found 18731 publication records. Showing 18607 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
56 | Amir Epstein, Michal Feldman, Yishay Mansour |
Strong equilibrium in cost sharing connection games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings 8th ACM Conference on Electronic Commerce (EC-2007), San Diego, California, USA, June 11-15, 2007, pp. 84-92, 2007, ACM, 978-1-59593-653-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cost sharing games, strong equilibrium, strong price of anarchy, game theory, Nash equilibrium, network design, price of anarchy, coalitions |
55 | Cindy Eisner, Dana Fisman, John Havlicek |
A topological characterization of weakness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, PODC 2005, Las Vegas, NV, USA, July 17-20, 2005, pp. 1-8, 2005, ACM, 1-58113-994-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
safety component, semantically weak and strong formulas, syntactically weak and strong formulas, temporal weakness and strength, weak and strong components, safety, liveness |
45 | Ola Rozenfeld, Moshe Tennenholtz |
Strong and Correlated Strong Equilibria in Monotone Congestion Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WINE ![In: Internet and Network Economics, Second International Workshop, WINE 2006, Patras, Greece, December 15-17, 2006, Proceedings, pp. 74-86, 2006, Springer, 3-540-68138-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Strong Equilibrium, Congestion Games |
44 | Hiroyuki Iwata, Tomokazu Yoneda, Satoshi Ohtake, Hideo Fujiwara |
A DFT Method for RTL Data Paths Based on Partially Strong Testability to Guarantee Complete Fault Efficiency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asian Test Symposium ![In: 14th Asian Test Symposium (ATS 2005), 18-21 December 2005, Calcutta, India, pp. 306-311, 2005, IEEE Computer Society, 0-7695-2481-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
strong testability, partially strong testability, complete fault efficiency, design-for-testability, data paths |
43 | Rebecca S. Lipner, Gary W. Strong, Karen E. O'Neill Strong |
The Relationship Between Task Structure and Choice of Navigational Aid in Human Computer Interface Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (1) ![In: Human-Computer Interaction: Applications and Case Studies, Proceedings of the Fifth International Conference on Human-Computer Interaction, (HCI International '93), Orlando, Florida, USA, August 8-13, 1993, Volume 1, pp. 522-527, 1993, Elsevier, 0-444-89540-X. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP BibTeX RDF |
|
43 | Gary W. Strong, Karen F. O'Neill Strong |
Visual Guidance for Information Navigation: A Computer-Human Interface Design Principle Derived from Cognitive Neuroscience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Interact. Comput. ![In: Interact. Comput. 3(2), pp. 217-231, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
43 | Florian T. Schneider, Vijay Menon 0002, Tatiana Shpeisman, Ali-Reza Adl-Tabatabai |
Dynamic optimization for efficient strong atomicity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA ![In: Proceedings of the 23rd Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2008, October 19-23, 2008, Nashville, TN, USA, pp. 181-194, 2008, ACM, 978-1-60558-215-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
virtual machines, code generation, transactional memory, compiler optimizations, dynamic optimizations, strong atomicity |
43 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang |
Short (Identity-Based) Strong Designated Verifier Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, pp. 214-225, 2006, Springer, 3-540-33052-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
strong designated verifier signature scheme, random oracle model, short signature, identity based, designated verifier signature |
41 | Lionel Paris, Richard Ostrowski, Pierre Siegel, Lakhdar Sais |
From Horn Strong Backdoor Sets to Ordered Strong Backdoor Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICAI ![In: MICAI 2007: Advances in Artificial Intelligence, 6th Mexican International Conference on Artificial Intelligence, Aguascalientes, Mexico, November 4-10, 2007, Proceedings, pp. 105-117, 2007, Springer, 978-3-540-76630-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Joffroy Beauquier, Sylvie Delaët, Sammy Haddad |
A 1-Strong Self-stabilizing Transformer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSS ![In: Stabilization, Safety, and Security of Distributed Systems, 8th International Symposium, SSS 2006, Dallas, TX, USA, November 17-19, 2006, Proceedings, pp. 95-109, 2006, Springer, 978-3-540-49018-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
k-strong, Transformer, Self-stabilization, Fault Containment |
40 | Wolfgang K. Giloi, C. Hastedt, Friedrich Schön, Wolfgang Schröder-Preikschat |
A Distributed Implementation of Shared Virtual Memory with Strong and Weak Coherence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDMCC ![In: Distributed Memory Computing, 2nd European Conference, EDMCC2, Munich, FRG, April 22-24, 1991, Proceedings, pp. 23-31, 1991, Springer, 3-540-53951-4. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
virtual shared memory architecture, strong and weak data coherence, communication hardware, parallelizing compilers, Distributed memory architecture |
38 | Hai-Yang Li, Sheng-Gang Li |
Congruences and ideals in pseudoeffect algebras. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 12(5), pp. 487-492, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Pseudoeffect algebras, Riesz ideals, Normal weak Riesz ideals, Strong congruences, Riesz strong congruences, Congruences, Ideals |
37 | V. Jeyakumar 0001 |
A note on strong duality in convex semidefinite optimization: necessary and sufficient conditions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Optim. Lett. ![In: Optim. Lett. 2(1), pp. 15-25, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Semidefinite optimization, Strong duality, Convex programming, Constraint qualifications |
37 | Soumaya Marzouk, Maher Ben Jemaa, Mohamed Jmaiel |
A serialization based approach for strong mobility of shared object. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPPJ ![In: Proceedings of the 5th International Symposium on Principles and Practice of Programming in Java, PPPJ 2007, Lisboa, Portugal, September 5-7, 2007, pp. 237-242, 2007, ACM, 978-1-59593-672-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Java thread, shared object migration, strong mobility, distributed applications, Java-RMI, serialization, source code transformation |
37 | Maria C. F. Ferreira, Delia Kesner, Laurence Puel |
lambda-Calculi with Explicit Substitutions Preserving Strong Normalization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Algebra Eng. Commun. Comput. ![In: Appl. Algebra Eng. Commun. Comput. 9(4), pp. 333-371, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Preservation of strong normalization, ?-Calculus, Explicit substitutions |
34 | Sigal Gottlieb, David I. Ketcheson, Chi-Wang Shu |
High Order Strong Stability Preserving Time Discretizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Sci. Comput. ![In: J. Sci. Comput. 38(3), pp. 251-289, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Multistep methods, Spectral deferred correction methods, Runge-Kutta methods, High order accuracy, Time discretization, Strong stability preserving |
34 | Martín Abadi, Tim Harris 0001, Mojtaba Mehrara |
Transactional memory with strong atomicity using off-the-shelf memory protection hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPoPP ![In: Proceedings of the 14th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, PPOPP 2009, Raleigh, NC, USA, February 14-18, 2009, pp. 185-196, 2009, ACM, 978-1-60558-397-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
transactional memory, stm, memory protection, strong atomicity |
34 | Emmanuel Bresson, Mark Manulis |
Securing group key exchange against strong corruptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 249-260, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authenticated group key exchange, strong corruptions, mutual authentication, contributiveness, insider attacks |
34 | Abdolmajid Mousavi, Behrouz Homayoun Far, Armin Eberlein, Behrouz Heidari |
Strong Safe Realizability of Message Sequence Chart Specifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSEN ![In: International Symposium on Fundamentals of Software Engineering, International Symposium, FSEN 2007, Tehran, Iran, April 17-19, 2007, Proceedings, pp. 334-349, 2007, Springer, 978-3-540-75697-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Strong safe realizability, stuck states, emergent scenarios |
34 | Raj Kumar Rajendran, Vishal Misra, Dan Rubenstein |
Brief announcement: strong detection of misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, PODC 2005, Las Vegas, NV, USA, July 17-20, 2005, pp. 40, 2005, ACM, 1-58113-994-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
strong detection, routing, anomaly detection, distance-vector, misconfiguration |
34 | Yuh-Jzer Joung, Scott A. Smolka |
Strong Interaction Fairness Via Randomization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 9(2), pp. 137-149, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
strong interaction fairness, weak interaction fairness, committee coordination, distributed algorithms, Randomized algorithms, multiparty interaction |
34 | Philip M. Johnson, Carleton A. Moore |
Investigating strong collaboration with the Annotated Egret Navigator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 4th Workshop on Enabling Technologies, Infrastructure for Collaborative Enterprises (WET-ICE'95), April 20-22, 1995, Berkeley Springs, West Virginia, USA, Proceedings, pp. 180-188, 1995, IEEE Computer Society, 0-8186-7019-3. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
strong collaboration, Annotated Egret Navigator, structured hypertext document, graduate seminar, indirect authoring mechanisms, direct authoring mechanisms, context-sensitive change information, intermediate work products, groupware, hypermedia, database integrity, agent-based architecture |
33 | Nir Andelman, Michal Feldman, Yishay Mansour |
Strong price of anarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SODA ![In: Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2007, New Orleans, Louisiana, USA, January 7-9, 2007, pp. 189-198, 2007, SIAM, 978-0-898716-24-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
33 | Mario Bravetti, Gianluigi Zavattaro |
A Theory for Strong Service Compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COORDINATION ![In: Coordination Models and Languages, 9th International Conference, COORDINATION 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings, pp. 96-112, 2007, Springer, 978-3-540-72793-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | V. Jeyakumar 0001 |
The strong conical hull intersection property for convex programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Math. Program. ![In: Math. Program. 106(1), pp. 81-92, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification 41A65, 90C30, 41A29 |
33 | Francis Y. L. Chin, Henry C. M. Leung, Siu-Ming Yiu, Tak Wah Lam, Roni Rosenfeld, Wai Wan Tsang, David K. Smith 0001, Y. Jiang |
Finding motifs for insufficient number of sequences with strong binding to transcription facto. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RECOMB ![In: Proceedings of the Eighth Annual International Conference on Computational Molecular Biology, 2004, San Diego, California, USA, March 27-31, 2004, pp. 125-132, 2004, ACM, 1-58113-755-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
binding energy, DNA microarray, transcription factor, motif finding |
32 | Seiki Akama |
Three-Valued Constructive Logic and Logic Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMVL ![In: 25th IEEE International Symposium on Multiple-Valued Logic, ISMVL 1995, Bloomington, Indiana, USA, May 23-25, 1995, Proceedings, pp. 276-283, 1995, IEEE Computer Society, 0-8186-7118-1. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
three-valued constructive logic, three valued constructive logic, strong negation 3N, N completion, intuitive semantics, N completion semantics, computational complexity, semantics, logic programming, logic programs, ternary logic, model theory, strong negation, negation as failure |
32 | Guo-Huang Hsu, Jimmy J. M. Tan |
A Local Diagnosability Measure for Multiprocessor Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 18(5), pp. 598-607, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
local diagnosability, strong local diagnosability property, PMC model |
31 | Amos Fiat, Haim Kaplan, Meital Levy, Svetlana Olonetsky |
Strong Price of Anarchy for Machine Load Balancing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 34th International Colloquium, ICALP 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings, pp. 583-594, 2007, Springer, 978-3-540-73419-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Strong Nash equilibria, Load balancing, Game theory, Price of Anarchy |
31 | Jin-Oh Jeon, Su-Bong Ryu, Sang-Jo Park, Min-Sup Kang |
Strong Authentication Protocol for RFID Tag Using SHA-1 Hash Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part I, pp. 634-643, 2007, Springer, 978-3-540-74468-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Strong authentication protocol, SHA-1 hash algorithm, Three-way challenge response, ISO/IEC 1800-3 standard, Digital Codec design, RFID Tag |
31 | Bing Yang, Huaping Hu, Xiangwen Duan, Shiyao Jin |
An Intelligent Network-Warning Model with Strong Survivability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings, pp. 133-145, 2007, Springer, 978-3-540-76968-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Strong Survivability, Network-Warning, Intelligence, Equality |
31 | M. Hossein Sheikh Attar, M. Tamer Özsu |
Alternative Architectures and Protocols for Providing Strong Consistency in Dynamic Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
World Wide Web ![In: World Wide Web 9(3), pp. 215-251, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
caching dynamic web, mid-tier database caching, web caching, strong consistency, database caching |
31 | Sigal Gottlieb, Steven J. Ruuth |
Optimal Strong-Stability-Preserving Time-Stepping Schemes with Fast Downwind Spatial Discretizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Sci. Comput. ![In: J. Sci. Comput. 27(1-3), pp. 289-303, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
total-variation-diminishing, linear multistep methods, Runge-Kutta methods, time discretization, Strong-stability-preserving |
31 | Norihiro Kamide |
Phase Semantics and Petri Net Interpretation for Resource-Sensitive Strong Negation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Log. Lang. Inf. ![In: J. Log. Lang. Inf. 15(4), pp. 371-401, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
electric circuit, linear logic with strong negation, Petri net with inhibitor arc, phase semantics, medical diagnosis |
31 | Debrup Chakraborty, Palash Sarkar 0001 |
A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers, pp. 293-309, 2006, Springer, 3-540-36597-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
tweakable encryption, strong pseudo-random permutation, mode of operation |
31 | Wei-Chi Ku |
A hash-based strong-password authentication scheme without using smart cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(1), pp. 29-34, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
password-file compromise attack, strong password, user authentication, replay attack, denial-of-service attack |
31 | Ya-Fen Chang, Chin-Chen Chang 0001 |
A secure and efficient strong-password authentication protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(3), pp. 79-90, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
strong password, smart card, password authentication, mutual authentication, denial-of-service attack, stolen-verifier attack |
31 | Venkata Duvvuri, Prashant J. Shenoy, Renu Tewari |
Adaptive Leases: A Strong Consistency Mechanism for the World Wide Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 15(5), pp. 1266-1276, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Web proxy servers, Web caching, cache consistency, leases, strong consistency |
31 | Rafael Ayala, Eladio Domínguez, Angel R. Francés, Antonio Quintero |
A Digital Lighting Function for Strong 26-Surfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DGCI ![In: Discrete Geometry for Computer Imagery, 8th International Conference, DCGI'99, Marne-la-Vallee, France, March 17-19, 1999, Proceedings, pp. 91-103, 1999, Springer, 3-540-65685-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Lighting function, strong 26-surface, digital surface |
31 | Ernst-Rüdiger Olderog |
Strong bisimilarity on nets: a new concept for comparing net semantics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
REX Workshop ![In: Linear Time, Branching Time and Partial Order in Logics and Models for Concurrency, School/Workshop, Noordwijkerhout, The Netherlands, May 30 - June 3, 1988, Proceedings, pp. 549-573, 1988, Springer, 3-540-51080-X. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
Strong bisimilarity, labelled place/transitions nets, causal nets, process terms, COSY, operational and compositional net semantics, CSP, CCS, safeness |
29 | Arthur W. Apter |
Diamond, square, and level by level equivalence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Arch. Math. Log. ![In: Arch. Math. Log. 44(3), pp. 387-395, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Supercompact cardinal, Strongly compact cardinal, Strong cardinal, Diamond, Level by level equivalence between strong compactness and supercompactness, Square |
29 | Jørgen Bang-Jensen, Anders Yeo |
Decomposing k-arc-Strong Tournaments Into Strong Spanning Subdigraphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comb. ![In: Comb. 24(3), pp. 331-349, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000): 05C20, 05C70, 05C38, 05C40 |
29 | Nathan Grasso Bronson, Christos Kozyrakis, Kunle Olukotun |
Feedback-directed barrier optimization in a strongly isolated STM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POPL ![In: Proceedings of the 36th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2009, Savannah, GA, USA, January 21-23, 2009, pp. 213-225, 2009, ACM, 978-1-60558-379-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
bytecode rewriting, deoptimization, strong isolation, weak isolation, transactional memory, hot swap |
29 | Ken Kaneiwa |
Description Logics with Contraries, Contradictories, and Subcontraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
New Gener. Comput. ![In: New Gener. Comput. 25(4), pp. 443-468, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Constructive Description Logic, Terminological Knowledge Representation, Strong Negation, Negative Information |
28 | Stephen Ponzio, Ray Strong |
Semisynchrony and Real-Time (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
WDAG ![In: Distributed Algorithms, 6th International Workshop, WDAG '92, Haifa, Israel, November 2-4, 1992, Proceedings, pp. 120-135, 1992, Springer, 3-540-56188-9. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
27 | ZuTao Zhang, Jiashu Zhang |
A novel strong tracking finite-difference extended Kalman filter for nonlinear eye tracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 52(4), pp. 688-694, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
strong tracking finite-difference extended Kalman filter (STFDEKF), extended Kalman filter (EKF), suboptimal fading factor, eye tracking |
27 | Bogdan Staruch |
HSP-type Characterization of Strong Equational Classes of Partial Algebras. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Stud Logica ![In: Stud Logica 93(1), pp. 41-65, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
strong equational class, equation, equational logic, partial algebra |
27 | Matthew Spinks, Robert Veroff |
Constructive Logic with Strong Negation is a Substructural Logic. II. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Stud Logica ![In: Stud Logica 89(3), pp. 401-425, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Nelson algebra, algebra, residuated lattice, substructural logic, strong negation, Constructive logic |
27 | Matthew Spinks, Robert Veroff |
Constructive Logic with Strong Negation is a Substructural Logic. I. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Stud Logica ![In: Stud Logica 88(3), pp. 325-348, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Nelson algebra, FL ew -algebra, residuated lattice, substructural logic, strong negation, Constructive logic |
27 | Gerard R. Renardel de Lavalette, Barteld P. Kooi, Rineke Verbrugge |
Strong Completeness and Limited Canonicity for PDL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Log. Lang. Inf. ![In: J. Log. Lang. Inf. 17(1), pp. 69-87, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Canonical model, Model disharmony, Propositional dynamic logic, Strong completeness |
27 | Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa |
An Efficient Strong Key-Insulated Signature Scheme and Its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 150-165, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
strong key-insulated signature, key leakage, DL assumption, random oracle model, adaptive security |
27 | Kai Xiong, Zhen Xiang, Jianhong Ge |
Evaluation of the Human Eye Glare after Strong Exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BMEI (1) ![In: Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, BMEI 2008, May 28-30, 2008, Sanya, Hainan, China - Volume 1, pp. 660-663, 2008, IEEE Computer Society, 978-0-7695-3118-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Glare, Glare evaluation, Recovery time, Strong exposure |
27 | Keiichirou Kusakari, Masahiko Sakai |
Enhancing dependency pair method using strong computability in simply-typed term rewriting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Algebra Eng. Commun. Comput. ![In: Appl. Algebra Eng. Commun. Comput. 18(5), pp. 407-431, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Simply-typed term rewriting system, Plain function- passing, Strong computability, Termination, Dependency pair |
27 | JaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd |
Low-Cost and Strong-Security RFID Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 795-807, 2007, Springer, 978-3-540-77089-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
strong-privacy, authentication, traceability, RFID system, indistinguishability |
27 | Soumaya Marzouk, Maher Ben Jemaa, Mohamed Jmaiel |
A Serialisation Based Approach for Processes Strong Mobility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAIS ![In: Distributed Applications and Interoperable Systems, 7th IFIP WG 6.1 International Conference, DAIS 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings, pp. 153-166, 2007, Springer, 978-3-540-72881-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Strong Mobility, Java Thread, Distributed systems, Source code transformation, Serialisation |
27 | Chi Cao Minh, Martin Trautmann, JaeWoong Chung, Austen McDonald, Nathan Grasso Bronson, Jared Casper, Christos Kozyrakis, Kunle Olukotun |
An effective hybrid transactional memory system with strong isolation guarantees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCA ![In: 34th International Symposium on Computer Architecture (ISCA 2007), June 9-13, 2007, San Diego, California, USA, pp. 69-80, 2007, ACM, 978-1-59593-706-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
strong isolation, parallel programming, transactional memory, multi-core architectures |
27 | Ziheng Zhou, Adam Prügel-Bennett, Robert I. Damper |
A Bayesian Framework for Extracting Human Gait Using Strong Prior Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 28(11), pp. 1738-1752, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
strong prior, hidden Markov model, Bayesian framework, articulated motion, human gait |
27 | Rudolf Ahlswede, Ning Cai 0001 |
A Strong Converse Theorem for Quantum Multiple Access Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GTIT-C ![In: General Theory of Information Transfer and Combinatorics, pp. 460-485, 2006, Springer, 3-540-46244-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
classical quantum multiple access channel, strong converse, wringing technique, non–stationary memoryless classical quantum channel |
27 | Hideyuki Ichihara, Tomoo Inoue, Naoki Okamoto, Toshinori Hosokawa, Hideo Fujiwara |
An Effective Design for Hierarchical Test Generation Based on Strong Testability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asian Test Symposium ![In: 14th Asian Test Symposium (ATS 2005), 18-21 December 2005, Calcutta, India, pp. 288-293, 2005, IEEE Computer Society, 0-7695-2481-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Hierarchical test generation, strong testability, datapath, test plan |
27 | Huafei Zhu |
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 101-114, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Committed signatures, strong RSA assumption, fair exchange protocols |
27 | Geir Agnarsson, Magnús M. Halldórsson |
Strong Colorings of Hypergraphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAOA ![In: Approximation and Online Algorithms, Second International Workshop, WAOA 2004, Bergen, Norway, September 14-16, 2004, Revised Selected Papers, pp. 253-266, 2004, Springer, 3-540-24574-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
strong coloring, composition width, approximation, hypergraph |
27 | Andrea Capotorti, L. Galli, Barbara Vantaggi |
Locally strong coherence and inference with lower-upper probabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 7(5), pp. 280-287, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Lower-upper probabilities, Locally strong coherence, Inference |
27 | Sigal Gottlieb, Lee-Ad Gottlieb |
Strong Stability Preserving Properties of Runge-Kutta Time Discretization Methods for Linear Constant Coefficient Operators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Sci. Comput. ![In: J. Sci. Comput. 18(1), pp. 83-109, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Runge-Kutta methods, high order accuracy, time discretization, Strong stability preserving |
27 | Robert W. Irving, David F. Manlove, Sandy Scott |
Strong Stability in the Hospitals/Residents Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STACS ![In: STACS 2003, 20th Annual Symposium on Theoretical Aspects of Computer Science, Berlin, Germany, February 27 - March 1, 2003, Proceedings, pp. 439-450, 2003, Springer, 3-540-00623-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
stable matching problem, hospitals/ residents problem, lower bound, NP-completeness, polynomial-time algorithm, strong stability |
27 | Li Yang, J. S. Yuan |
A decoupling technique for CMOS strong-coupled structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 13th ACM Great Lakes Symposium on VLSI 2003, Washington, DC, USA, April 28-29, 2003, pp. 128-131, 2003, ACM, 1-58113-677-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
fast-timing simulation, gate modeling, strong coupled components, waveform relaxation, decoupling, look-up table, feedback loop, hysteresis |
27 | Benjamin Grégoire, Xavier Leroy |
A compiled implementation of strong reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICFP ![In: Proceedings of the Seventh ACM SIGPLAN International Conference on Functional Programming (ICFP '02), Pittsburgh, Pennsylvania, USA, October 4-6, 2002., pp. 235-246, 2002, ACM, 1-58113-487-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
beta-equivalence, calculus of constructions, normalization by evaluation, strong reduction, virtual machine, abstract machine, Coq |
27 | Mehmet Hakan Karaata |
Self-Stabilizing Strong Fairness under Weak Fairness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 12(4), pp. 337-345, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
strong fairness, schedulers, Distributed systems, fairness, self-stabilization |
27 | Josep Maria Font, Ramon Jansana |
Leibniz filters and the strong version of a protoalgebraic logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Arch. Math. Log. ![In: Arch. Math. Log. 40(6), pp. 437-465, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Leibniz filter, Strong version, Leibniz operator, Transfer theorem, Modal logics, Many-valued logics, Algebraizable logic, Quantum logics, Abstract algebraic logic, Protoalgebraic logic |
27 | Byoungcheon Lee, Heesun Kim, Kwangjo Kim |
Secure Mobile Agent Using Strong Non-designated Proxy Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 474, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Secure mobile agent, strong non-designated proxy signature, multi-proxy signature |
27 | Jasmine Burguet, Rémy Malgouyres |
Strong Thinning and Polyhedrization of the Surface of a Voxel Object. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DGCI ![In: Discrete Geometry for Computer Imagery, 9th International Conference, DGCI 2000, Uppsala, Sweden, December 13-15, 2000, Proceedings, pp. 222-234, 2000, Springer, 3-540-41396-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
strong homotopy, polyhedrization, parallel algorithm, thinning, digital surface |
27 | Avishai Mandelbaum, William A. Massey, Martin I. Reiman |
Strong approximations for Markovian service networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Queueing Syst. Theory Appl. ![In: Queueing Syst. Theory Appl. 30(1-2), pp. 149-201, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
strong approximations, fluid approximations, queues with abandonment, queues with retrials, nonstationary queues, queueing networks, priority queues, diffusion approximations, Jackson networks, multiserver queues |
27 | Hanqin Zhang, Guang-Hui Hsu |
Strong approximations for priority queues; head-of-the-line-first discipline. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Queueing Syst. Theory Appl. ![In: Queueing Syst. Theory Appl. 10(3), pp. 213-233, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
strong approximation, Priority queue, Wiener process |
27 | Rupert Paget |
Strong Markov Random Field Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 26(3), pp. 408-413, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
contingency table analysis, texture, Markov processes, nonparametric statistics, model development |
27 | Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung |
Strong Key-Insulated Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, pp. 130-144, 2003, Springer, 3-540-00324-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Maria C. F. Ferreira, Delia Kesner, Laurence Puel |
Lambda-Calculi with Explicit Substitutions and Composition Which Preserve Beta-Strong Normalization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ALP ![In: Algebraic and Logic Programming, 5th International Conference, ALP'96, Aachen, Germany, September 25-27, 1996, Proceedings, pp. 284-298, 1996, Springer, 3-540-61735-3. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
26 | Jin Li 0002, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong |
Generic Security-Amplifying Methods of Ordinary Digital Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pp. 224-241, 2008, 978-3-540-68913-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Weak Chosen Message Attack, q-SDH Assumption, Signature, Strong-RSA Assumption, Strong Unforgeability |
26 | S. Karunanithi, Arthur D. Friedman |
Some New Types of Logical Completeness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 27(11), pp. 998-1005, 1978. The full citation details ...](Pics/full.jpeg) |
1978 |
DBLP DOI BibTeX RDF |
weak completeness, Combinational functions, complement completeness, dual completeness, logic primitives, necessary and sufficient conditions for c-completeness, strong c-completeness, weak c-completeness, strong completeness |
25 | Kaoru Kurosawa, Katja Schmidt-Samoa |
New Online/Offline Signature Schemes Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 330-346, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Online/offline signatures, trapdoor hash, division intractability, strong RSA assumption |
25 | Mustafa Demirci |
Constructions of fuzzy functions based on fuzzy equalities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 7(3), pp. 199-207, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Strong fuzzy function, Fuzzy equivalence, Fuzzy partition, Fuzzy equality, Fuzzy function |
25 | Ghajendran Poovanandran, Wen Chean Teh |
Strong (2 ⋅ t) and Strong (3 ⋅ t) Transformations for Strong M-Equivalence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Found. Comput. Sci. ![In: Int. J. Found. Comput. Sci. 30(5), pp. 719-733, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Ghajendran Poovanandran, Wen Chean Teh |
Strong 2.t and Strong 3.t Transformations for Strong M-equivalence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1702.03647, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
25 | Gildas Avoine, Xavier Carpent, Benjamin Martin 0002 |
Strong Authentication and Strong Integrity (SASI) Is Not That Strong. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFIDSec ![In: Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers, pp. 50-64, 2010, Springer, 978-3-642-16821-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Aleksander Wojdyga |
Short Proofs of Strong Normalization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MFCS ![In: Mathematical Foundations of Computer Science 2008, 33rd International Symposium, MFCS 2008, Torun, Poland, August 25-29, 2008, Proceedings, pp. 613-623, 2008, Springer, 978-3-540-85237-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
permutative reductions, lambda calculus, system F, CPS-translation, strong normalization |
24 | Ping Yu 0006, Stephen R. Tate |
An Online/Offline Signature Scheme Based on the Strong RSA Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 601-606, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Online/Offline Signing, Suitable Hash Function, Digital Signature, Random Oracle, Strong RSA Assumption |
24 | Stefan Blom, Simona Orzan |
A distributed algorithm for strong bisimulation reduction of state spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Softw. Tools Technol. Transf. ![In: Int. J. Softw. Tools Technol. Transf. 7(1), pp. 74-86, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Strong bisimulation, Distributed tools, Multirelational coarsest partition problem, Model checking, State space reduction |
24 | Norihiro Kamide |
Quantized Linear Logic, Involutive Quantales and Strong Negation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Stud Logica ![In: Stud Logica 77(3), pp. 355-384, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
involutive quantales, quantization principle, linear logic, strong negation |
24 | Inmaculada Higueras |
On Strong Stability Preserving Time Discretization Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Sci. Comput. ![In: J. Sci. Comput. 21(2), pp. 193-223, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
monotonicity, Runge-Kutta methods, strong-stability preserving, SSP |
24 | Wei-Chi Ku, Hao-Chuan Tsai, Shuai-Min Chen |
Two simple attacks on Lin-Shen-Hwang's strong-password authentication protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 37(4), pp. 26-31, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
strong password, password authentication, replay attack, denial-of-service attack, stolen-verifier attack |
24 | Steven J. Ruuth, Raymond J. Spiteri |
Two Barriers on Strong-Stability-Preserving Time Discretization Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Sci. Comput. ![In: J. Sci. Comput. 17(1-4), pp. 211-220, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
total variation diminishing, Runge-Kutta methods, high-order accuracy, time discretization, strong stability preserving |
24 | M. G. Charalambous |
Strong Nearness Frames Having Enough Cauchy Filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Categorical Struct. ![In: Appl. Categorical Struct. 8(4), pp. 639-648, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
sums and direct limits of frames, strong nearness frames, Cauchy filters, Cauchy points, uniform frames |
24 | Roberto Di Cosmo, Stefano Guerrini |
Strong Normalization of Proof Nets Modulo Structural Congruences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTA ![In: Rewriting Techniques and Applications, 10th International Conference, RTA-99, Trento, Italy, July 2-4, 1999, Proceedings, pp. 75-89, 1999, Springer, 3-540-66201-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Linear Logic, Proof Nets, Strong Normalization |
24 | Wolfgang Bibel, Elmar Eder |
Decomposition of tautologies into regular formulas and strong completeness of connection-graph resolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 44(2), pp. 320-344, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
connection-graph resolution, decomposition of unsatisfiable formulas, semantic trees, regular graphs, strong completeness |
24 | Steve Chien, Alistair Sinclair |
Strong and Pareto Price of Anarchy in Congestion Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP (1) ![In: Automata, Languages and Programming, 36th International Colloquium, ICALP 2009, Rhodes, Greece, July 5-12, 2009, Proceedings, Part I, pp. 279-291, 2009, Springer, 978-3-642-02926-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Scott C. Douglas, Jan Eriksson, Visa Koivunen |
Equivariant Algorithms for Estimating the Strong-Uncorrelating Transform in Complex Independent Component Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA ![In: Independent Component Analysis and Blind Signal Separation, 6th International Conference, ICA 2006, Charleston, SC, USA, March 5-8, 2006, Proceedings, pp. 57-65, 2006, Springer, 3-540-32630-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Yu-Tian Zhang, Qi Luo |
Oscillation and Strong Oscillation for Impulsive Neutral Parabolic Differential Systems with Delays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (2) ![In: Advances in Intelligent Computing, International Conference on Intelligent Computing, ICIC 2005, Hefei, China, August 23-26, 2005, Proceedings, Part II, pp. 472-481, 2005, Springer, 3-540-28227-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Jirí Srba |
Strong bisimilarity of simple process algebras: complexity lower bounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Acta Informatica ![In: Acta Informatica 39(6-7), pp. 469-499, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Ronen Shaltiel |
Towards Proving Strong Direct Product Theorems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCC ![In: Proceedings of the 16th Annual IEEE Conference on Computational Complexity, Chicago, Illinois, USA, June 18-21, 2001, pp. 107-117, 2001, IEEE Computer Society, 0-7695-1053-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Peter Triantafillou, Carl Neilson |
Achieving Strong Consistency in a Distributed File System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 23(1), pp. 35-55, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
consistency semantics, concurrency, caching, replication, Availability, recovery, distributed file systems |
24 | Phan Minh Dung |
On the strong completion of logic programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ALP ![In: Algebraic and Logic Programming, Second International Conference, Nancy, France, October 1-3, 1990, Proceedings, pp. 158-172, 1990, Springer, 3-540-53162-9. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
predicate completion, two-valued logic, Logic programming, negation, three-valued logic, stable models, circumscription, well-founded models |
23 | Denis Caromel |
Keynote 1 - Strong Programming Model for Strong Weak Mobility: The ProActive Parallel Suite. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MDM ![In: 9th International Conference on Mobile Data Management (MDM 2008), Beijing, China, April 27-30, 2008, 2008, IEEE, 978-0-7695-3154-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 18607 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|