The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Weak with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1955-1970 (15) 1971-1973 (16) 1974-1976 (16) 1977-1978 (19) 1979-1980 (21) 1981 (16) 1982-1983 (27) 1984 (28) 1985 (27) 1986 (23) 1987 (32) 1988 (34) 1989 (41) 1990 (56) 1991 (59) 1992 (73) 1993 (84) 1994 (89) 1995 (95) 1996 (119) 1997 (109) 1998 (139) 1999 (178) 2000 (192) 2001 (214) 2002 (286) 2003 (319) 2004 (427) 2005 (524) 2006 (593) 2007 (614) 2008 (683) 2009 (531) 2010 (248) 2011 (269) 2012 (302) 2013 (290) 2014 (280) 2015 (302) 2016 (324) 2017 (400) 2018 (505) 2019 (561) 2020 (624) 2021 (613) 2022 (675) 2023 (675) 2024 (182)
Publication types (Num. hits)
article(6043) book(4) data(1) incollection(49) inproceedings(5770) phdthesis(81) proceedings(1)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 4576 occurrences of 2854 keywords

Results
Found 11949 publication records. Showing 11949 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
66Cindy Eisner, Dana Fisman, John Havlicek A topological characterization of weakness. Search on Bibsonomy PODC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF safety component, semantically weak and strong formulas, syntactically weak and strong formulas, temporal weakness and strength, weak and strong components, safety, liveness
63Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle A Note on Weak Keys of PES, IDEA, and Some Extended Variants. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
61Alan Shuchat, Randy Shull, Ann N. Trenk Range of the Fractional Weak Discrepancy Function. Search on Bibsonomy Order The full citation details ... 2006 DBLP  DOI  BibTeX  RDF weak discrepancy, fractional weak discrepancy, weak orders, semiorders
58Kevin Donnelly, J. J. Hallett, Assaf J. Kfoury Formal semantics of weak references. Search on Bibsonomy ISMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF weak references, garbage collection, formal semantics
56Pascal Cuoq, Damien Doligez Hashconsing in an incrementally garbage-collected system: a story of weak pointers and hashconsing in ocaml 3.10.2. Search on Bibsonomy ML The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash-consing, maximal sharing, weak hashtables, weak pointers, weak references, garbage collection, ocaml
53Zhengyou Zhang, P. Anandan 0001, Heung-Yeung Shum What Can Be Determined from a Full and a Weak Perspective Image? Search on Bibsonomy ICCV The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Integration of Full and Weak Perspective Views, 3D Reconstruction, Motion Analysis, Epipolar Geometry, Multiresolution Modeling
49Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang 0001 The Second-Preimage Attack on MD4. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF collision differential path, weak message, Hash function, second-preimage
49Alex Biryukov, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle New Weak-Key Classes of IDEA. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF IDEA cipher, weak keys, NESSIE, boomerang attack
49A. Jefferson Offutt, Stephen D. Lee An Empirical Evaluation of Weak Mutation. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF weak mutation, fault-based technique, unit-level software testing, computational savings, software engineering, efficiency, program testing, effectiveness, mutation testing
48Issam S. Strub, Alexandre M. Bayen Mixed Initial-Boundary Value Problems for Scalar Conservation Laws: Application to the Modeling of Transportation Networks. Search on Bibsonomy HSCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Weak solution of scalar conservation laws, Weak hybrid boundary conditions, LWR PDE, Highway traffic modeling, Boundary control
48Thomas Vetterlein BL-algebras and effect algebras. Search on Bibsonomy Soft Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Weak effect algebra, D-poset, Weak D-poset, Effect algebra, BL-algebra
48Orna Kupferman, Moshe Y. Vardi Weak alternating automata are not that weak. Search on Bibsonomy ACM Trans. Comput. Log. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF weak alternating automata, complementation
45Felix Brandt 0001, Markus Brill, Felix A. Fischer, Jan Hoffmann 0002 The Computational Complexity of Weak Saddles. Search on Bibsonomy SAGT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
45Baoqing Jiang, Yang Xu, Qing Wei 0003, Kun Wu Weak ratio rules between nonnegative real-valued data in transactional database. Search on Bibsonomy GrC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Orhun Kara, Cevat Manap A New Class of Weak Keys for Blowfish. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Blowfish, key dependent S-Box, self similarity analysis, cryptanalysis, fixed point, weak key, reflection attack
44Klaus Ambos-Spies, Elvira Mayordomo, Xizhong Zheng A Comparison of Weak Completeness Notions. Search on Bibsonomy CCC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Weak Completeness, Measure, Genericity, Completeness
44Wolfgang K. Giloi, C. Hastedt, Friedrich Schön, Wolfgang Schröder-Preikschat A Distributed Implementation of Shared Virtual Memory with Strong and Weak Coherence. Search on Bibsonomy EDMCC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF virtual shared memory architecture, strong and weak data coherence, communication hardware, parallelizing compilers, Distributed memory architecture
43Paul J. Tanenbaum, Ann N. Trenk, Peter C. Fishburn Linear Discrepancy and Weak Discrepancy of Partially Ordered Sets. Search on Bibsonomy Order The full citation details ... 2001 DBLP  DOI  BibTeX  RDF linear discrepancy, weak discrepancy, weak extension, linear extension
43Alexander E. Andreev, Andrea E. F. Clementi, José D. P. Rolim, Luca Trevisan Weak Random Sources, Hitting Sets, and BPP Simulations. Search on Bibsonomy FOCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF BPP simulations, parallel classes, lower bound, sampling, polynomial time, randomised algorithms, hitting sets, weak random source, weak random sources, min-entropy
40Ronald W. Brower, Kenneth S. Stevens Congruent Weak Conformance, a Partial Order among Processes. Search on Bibsonomy FORTE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
40Boris Bukh, Jirí Matousek 0001, Gabriel Nivasch Lower bounds for weak epsilon-nets and stair-convexity. Search on Bibsonomy SCG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF inverse ackermann function, selection lemma, stair-convexity, weak epsilon-net
40Saurabh Ray, Nabil H. Mustafa Weak epsilon-nets have basis of size o(1/epsilon log (1/epsilon)) in any dimension. Search on Bibsonomy SCG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hitting convex sets, weak epsilon nets, discrete geometry, combinatorial geometry
40Eunjin Lee, Deukjo Hong, Donghoon Chang, Seokhie Hong, Jongin Lim 0001 A Weak Key Class of XTEA for a Related-Key Rectangle Attack. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF XTEA algorithm, weak key class of XTEA, related-key rectangle attack
40Jirí Adámek, Horst Herrlich, Jirí Rosický, Walter Tholen Weak Factorization Systems and Topological Functors. Search on Bibsonomy Appl. Categorical Struct. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF weak factorization systems, full functor, topological functor, cofibrantly generated, poset
40Philip Hawkes Differential-Linear Weak Key Classes of IDEA. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF differential-linear cryptanalysis, related-key cryptanalysis, IDEA, weak keys
39Paul Flondor, George Georgescu, Afrodita Iorgulescu Pseudo-t-norms and pseudo-BL algebras. Search on Bibsonomy Soft Comput. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Weak-BL algebra, Weak-pseudo-BL algebra, Pseudo- t -norm, Pseudo- t -conorm, Left continuity, Right continuity, MV algebra, t -norm, BL algebra, Pseudo-MV algebra, Pseudo-BL algebra, t -conorm
39Taekyoung Kwon 0002, JooSeok Song Security and efficiency in authentication protocols resistant to password guessing attack. Search on Bibsonomy LCN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF password guessing attack resistance, secret, user-chosen weak secret, security-oriented protocols, cipher operations, protocol steps, poorly-chosen weak secret protection, security, efficiency, cryptographic protocols, key exchange, message authentication, authentication protocols, secure communications, random numbers, dictionary attacks
36Krzysztof Pietrzak, Johan Sjödin Weak Pseudorandom Functions in Minicrypt. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Toufiq Parag, Fatih Porikli, Ahmed M. Elgammal Boosting adaptive linear weak classifiers for online learning and tracking. Search on Bibsonomy CVPR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Stéphane Devismes, Sébastien Tixeuil, Masafumi Yamashita Weak vs. Self vs. Probabilistic Stabilization. Search on Bibsonomy ICDCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Roland Martin, Karsten Weihe Weak Symmetries in Problem Formulations. Search on Bibsonomy CP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Jochen Renz, Gérard Ligozat Weak Composition for Qualitative Spatial and Temporal Reasoning. Search on Bibsonomy CP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Mario Bravetti, Roberto Gorrieri Deciding and axiomatizing weak ST bisimulation for a process algebra with recursion and action refinement. Search on Bibsonomy ACM Trans. Comput. Log. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF ST bisimulation, noninterleaving semantics, process algebra, axiomatization, Action refinement
36Cory J. Butz, Manon J. Sanscartier Properties of Weak Conditional Independence. Search on Bibsonomy Rough Sets and Current Trends in Computing The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
36Stefan Edelkamp, Ingo Wegener On the Performance of WEAK-HEAPSORT. Search on Bibsonomy STACS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
36Keren Censor-Hillel, Hadas Shachnai Partial information spreading with application to distributed maximum coverage. Search on Bibsonomy PODC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF maximum coverage, partial information spreading, weak conductance, approximation algorithms, distributed computing, randomized algorithms
36Gerard Ligozat When Tables Tell It All: Qualitative Spatial and Temporal Reasoning Based on Linear Orderings. Search on Bibsonomy COSIT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF weak representation, complete theory, relation algebra, temporal reasoning, spatial reasoning
35Orna Kupferman, Moshe Y. Vardi Weak Alternating Automata Are Not That Weak. Search on Bibsonomy ISTCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
35Linyuan Lu, Tao Zhou 0001 Role of weak ties in link prediction of complex networks. Search on Bibsonomy CIKM-CNIKM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF weak ties theory, complex networks, link prediction
35Noga Alon, Haim Kaplan, Gabriel Nivasch, Micha Sharir, Shakhar Smorodinsky Weak ε-nets and interval chains. Search on Bibsonomy J. ACM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Interval chain, inverse Ackermann function, moment curve, weak epsilon-net
35Utku Günay Acer, Shivkumar Kalyanaraman, Alhussein A. Abouzeid Weak state routing for large scale dynamic networks. Search on Bibsonomy MobiCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF unstructured distributed hashing, weak states, routing algorithms, dynamic networks
35Michael E. Saks, Lan Yu Weak monotonicity suffices for truthfulness on convex domains. Search on Bibsonomy EC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF strategyproof, weak monotonicity, mechanism design, truthful, dominant strategy
35Nathan Reading Lattice Congruences of the Weak Order. Search on Bibsonomy Order The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Cambrian lattice, congruence uniform, Coxeter group, parabolic subgroup, poset of regions, shard, simplicial hyperplane arrangement, Tamari lattice, weak order
35Jirí Matousek 0001 New constructions of weak epsilon-nets. Search on Bibsonomy SCG The full citation details ... 2003 DBLP  DOI  BibTeX  RDF weak epsilon-nets
35Arnold Beckmann A Note on Universal Measures for Weak Implicit Computational Complexity. Search on Bibsonomy LPAR The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Dynamic ordinals, Witness oracle TURING machines, Weak implicit computational complexity, Bounded arithmetic
35Radu Horaud, Fadi Dornaika, Bart Lamiroy Object Pose: The Link between Weak Perspective, Paraperspective, and Full Perspective. Search on Bibsonomy Int. J. Comput. Vis. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF perspective n-point problem, paraperspective, extrinsic camera parameters, camera calibration, weak perspective, object pose
34David Zuckerman Simulating BPP Using a General Weak Random Source Search on Bibsonomy FOCS The full citation details ... 1991 DBLP  DOI  BibTeX  RDF probe search, BPP simulation, general weak random source, R-bit string, approximation algorithms, polynomial time, maximum clique, weak random source
34Aviad Cohen 0001, Avi Wigderson Dispersers, Deterministic Amplification, and Weak Random Sources (Extended Abstract) Search on Bibsonomy FOCS The full citation details ... 1989 DBLP  DOI  BibTeX  RDF weak bit fixing sources, RP algorithm, BPP algorithm, deterministic amplification, bipartite multigraphs, probabilistic algorithms, dispersers, error probability, weak random sources
32Peng Ning, An Liu, Wenliang Du Mitigating DoS attacks against broadcast authentication in wireless sensor networks. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, Sensor networks, broadcast authentication, DoS attacks
32Alfred Menezes, Edlyn Teske Cryptographic implications of Hess' generalized GHS attack. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (1991) 94A60
32Stefan Edelkamp, Patrick Stiegeler Pushing the Limits in Sequential Sorting. Search on Bibsonomy WAE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
31Sri-Kaushik Pavani, David Delgado-Gómez, Alejandro F. Frangi Gaussian Weak Classifiers Based on Haar-Like Features with Four Rectangles for Real-time Face Detection. Search on Bibsonomy CAIP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Mamoru Kutami Von Neumann Regular Rings Satisfying Weak Comparability. Search on Bibsonomy Appl. Categorical Struct. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Mathematics Subject Classifications (2000) 16E50, 16D70
31Haiyan Chen More on Weak Bisimilarity of Normed Basic Parallel Processes. Search on Bibsonomy TAMC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Shaomin Wu, Min Xie 0001 Classifying Weak, and Strong Components Using ROC Analysis With Application to Burn-In. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Kui-Lam Kwok, Laszlo Grunfeld, Peter Deng Improving Weak Ad-Hoc Retrieval by Web Assistance and Data Fusion. Search on Bibsonomy AIRS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Andrew K. Lui, Reggie Kwan, Maria Poon, Yannie H. Y. Cheung Saving weak programming students: applying constructivism in a first programming course. Search on Bibsonomy ACM SIGCSE Bull. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF programming, computer science education, mental models, constructivism
31Christian Schindelhauer, Klaus Volbert, Martin Ziegler 0001 Spanners, Weak Spanners, and Power Spanners for Wireless Networks. Search on Bibsonomy ISAAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Andreas Opelt, Michael Fussenegger, Axel Pinz, Peter Auer Weak Hypotheses and Boosting for Generic Object Detection and Recognition. Search on Bibsonomy ECCV (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Shoichi Hirose Yet Another Definition of Weak Collision Resistance and Its Analysis. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Marcelo P. Fiore, Gian Luca Cattani, Glynn Winskel Weak Bisimulation and Open Maps. Search on Bibsonomy LICS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF semantics, Concurrency, denotational semantics, categorical models
31Bruno Marnette Generalized schema-mappings: from termination to tractability. Search on Bibsonomy PODS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF weak acyclicity, data exchange, core, universal solution
31Xuhui Wang, Falai Chen, Jiansong Deng Implicitization and parametrization of quadratic surfaces with one simple base point. Search on Bibsonomy ISSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF moving plane, weak u-basis, parametrization, implicitization
31Jasen Markovski, Erik P. de Vink Embedding Real Time in Stochastic Process Algebras. Search on Bibsonomy EPEW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Stochastic delay, weak choice, real-time and stochastic process algebra, race condition
31Christopher Doble, Jean-Paul Doignon, Jean-Claude Falmagne, Peter C. Fishburn Almost Connected Orders. Search on Bibsonomy Order The full citation details ... 2001 DBLP  DOI  BibTeX  RDF almost connected order, well graded family, upgradable family, downgradable family, weak order, semiorder
31Sarita V. Adve, Mark D. Hill A Unified Formalization of Four Shared-Memory Models. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF data-race-free-1, data-race-free-0, hazards and raceconditions, multiprocessors, shared memory systems, formalization, sequential consistency, weak ordering, shared-memory models, release consistency
31J. N. Alonso Álvarez, J. M. Fernández Vilaboa, R. González Rodríguez, A. B. Rodríguez Raposo Invertible Weak Entwining Structures and Weak C-cleft Extensions. Search on Bibsonomy Appl. Categorical Struct. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Mathematics Subject Classifications (2000) 18D10, 16W30
30Anna Gomolinska Rough Approximation Based on Weak q-RIFs. Search on Bibsonomy Trans. Rough Sets The full citation details ... 2009 DBLP  DOI  BibTeX  RDF weak quasi-rough inclusion, rough approximation space, rough inclusion
30Subhamoy Maitra, Santanu Sarkar 0001 Revisiting Wiener's Attack - New Weak Keys in RSA. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, RSA, Factorization, Weak Keys
30Hong Zhang 0018, Xiaolong Liu, Junwei Li, Zhu Zhenfu The Study of Detecting for IR Weak and Small Targets Based on Fractal Features. Search on Bibsonomy MMM (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Weak and small, Fractal model fit error, Multi-scale variance ratio of fractal surface, Fractal dimension
30Laurent Bienvenu, David Doty, Frank Stephan 0001 Constructive Dimension and Weak Truth-Table Degrees. Search on Bibsonomy CiE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF weak truth-table, randomness, extractor, degree, constructive dimension
30Keijo Heljanko, Tommi A. Junttila, Misa Keinänen, Martin Lange, Timo Latvala Bounded Model Checking for Weak Alternating Büchi Automata. Search on Bibsonomy CAV The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Weak Alternating Büchi Automata, Bounded Model Checking, PSL, NuSMV
30Heiko Stamer Completion Attacks and Weak Keys of Oleshchuk's Public Key Cryptosystem. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF completion attack, Knuth-Bendix completion, Cryptanalysis, weak keys, Church-Rosser property, string-rewriting systems
30Mark H. Carpenter, David I. Gottlieb, Chi-Wang Shu On the Conservation and Convergence to Weak Solutions of Global Schemes. Search on Bibsonomy J. Sci. Comput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF weak solutions, convergence, Conservation laws, conservation
30Sakaé Fuchino, Stefan Geschke, Lajos Soukup On the weak Freese-Nation property of ?(omega). Search on Bibsonomy Arch. Math. Log. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Weak Freese-Nation property, Cohen models, Cicho?'s diagram, Superatomic Boolean algebras
30Albert Atserias Improved Bounds on the Weak Pigeonhole Principle and Infinitely Many Primes from Weaker Axioms. Search on Bibsonomy MFCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Weak Pigeonhole Principle, Proof Complexity, Bounded Arithmetic
30Haiko Müller, Jean-Xavier Rampon Partial Orders on Weak Orders Convex Subsets. Search on Bibsonomy Order The full citation details ... 2000 DBLP  DOI  BibTeX  RDF visibility relation, partially ordered set, convex set, weak order
30Jean Ponce, Yakup Genc Epipolar Geometry and Linear Subspace Methods: A New Approach to Weak Calibration. Search on Bibsonomy Int. J. Comput. Vis. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF weak calibration, projective geometry, subspace methods
30Zine-El-Abidine Benaissa, Pierre Lescanne, Kristoffer Høgsbro Rose Modeling Sharing and Recursion for Weak Reduction Strategies Using Explicit Substitution. Search on Bibsonomy PLILP The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Implementation of functional programming, weak reduction, space leaks, recursion, sharing, lambda calculus, explicit substitution
30Jean Ponce, Yakup Genc Epipolar Geometry and Linear Subspace Methods: A New Approach to Weak Calibration. Search on Bibsonomy CVPR The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Weak calibration, epipolar geometry, projective geometry
30Stefano Soatto, Pietro Perona Dynamic Rigid Motion Estimation from Weak Perspective. Search on Bibsonomy ICCV The full citation details ... 1995 DBLP  DOI  BibTeX  RDF dynamic rigid motion estimation, simplified projection model, depth relief, rigid 3D motion, dynamic visual motion estimation, global observability, structure independent motion estimator, time evolution, measurement constraint, six dimensional state space, approximate estimator, reduced filter, synthetic image sequences, imaging process, computational geometry, motion estimation, image sequences, occlusions, dynamic models, state space, motion parameters, weak perspective, real image sequences, bas relief ambiguity
30Vijay K. Garg, Brian Waldecker Detection of Weak Unstable Predicates in Distributed Programs. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF programtesting, weak unstable predicates, weakconjunctive predicates, distributed debugger, testing, distributed algorithms, debugging, Unix, UNIX, communication complexity, distributed programs, distributed memory systems, program debugging, message complexity, Sun workstations, global predicates
30Jürg Wullschleger Oblivious-Transfer Amplification. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF oblivious-transfer amplification, universal oblivious transfer, weak oblivious transfer, computational weak oblivious transfer, distributed leftover hash lemma, hard-core lemma
27Haina Zhang, Lin Li, Xiaoyun Wang 0001 Fast correlation attack on stream cipher ABC v3. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ABC v3, cryptanalysis, stream cipher, fast correlation attack
27Luciano Caroprese, Ester Zumpano Modeling Cooperation in P2P Data Management Systems. Search on Bibsonomy ISMIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Junsong Yuan, Jiebo Luo, Ying Wu 0001 Mining compositional features for boosting. Search on Bibsonomy CVPR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Hongjun Wu 0001, Bart Preneel Cryptanalysis of the Stream Cipher ABC v2. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF key-dependent S-box, ABC v2, stream cipher, Fast correlation attack
27Vincent Conitzer, Tuomas Sandholm Complexity of (iterated) dominance. Search on Bibsonomy EC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF (iterated) dominance, game theory
27Léonard Kwuida When Is a Concept Algebra Boolean? Search on Bibsonomy ICFCA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Evaggelia Pitoura, Bharat K. Bhargava Data Consistency in Intermittently Connected Distributed Systems. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Mobile computing, adaptability, concurrency control, replication, consistency, disconnected operation, transaction management
27Qizhong Liu, Wanqing Song Detection Weak Period Signal Using Chaotic Oscillator. Search on Bibsonomy ICCSA (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Duffing-Homles system, the law of the golden section, Threshold for chaos, Lyapunov exponents
27Srikanth Sastry, Scott M. Pike, Jennifer L. Welch The weakest failure detector for wait-free dining under eventual weak exclusion. Search on Bibsonomy SPAA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mutual exclusion, failure detectors, wait-freedom, partial synchrony, dining philosophers
27Tamkeen M. Bhatti, F. A. Bhatti Charged based MOS transistor modeling in weak inversion. Search on Bibsonomy EIT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Ueli M. Maurer, Stefano Tessaro Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Min Chen, Niaoqing Hu, Guojun Qin, Y. M. Yang A Study on Additional-signal-enhanced Stochastic Resonance in Detecting Weak Signals. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Boting Yang, Yi Cao On the Monotonicity of Weak Searching. Search on Bibsonomy COCOON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Lida Torkzadeh, Mohammad Mehdi Zahedi, M. Abbasi (Weak) Dual hyper K -ideals. Search on Bibsonomy Soft Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Hyper K-algebra, Dual hyper K-ideal
27Yoshie Soutome Sagata, Masahiro Watanabe, Yoko Asano VoiceBlog for Blind and Weak-Eyed People. Search on Bibsonomy HCI (7) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF blog reading browser, cascading user interface, blog, Universal design, hierarchic structure, blind people
27Xinxin Liu, Haiyan Chen Deciding Weak Bisimilarity of Normed Context-Free Processes Using Tableau. Search on Bibsonomy ICTAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Andrew M. Childs, Aram W. Harrow, Pawel Wocjan Weak Fourier-Schur Sampling, the Hidden Subgroup Problem, and the Quantum Collision Problem. Search on Bibsonomy STACS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 11949 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license