|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 396 occurrences of 248 keywords
|
|
|
Results
Found 878 publication records. Showing 878 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
117 | Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò 0001 |
A Formalization of Off-Line Guessing for Security Protocol Analysis. |
LPAR |
2004 |
DBLP DOI BibTeX RDF |
|
93 | Sreekanth Malladi, Jim Alves-Foss |
What are Multi-Protocol Guessing Attacks and How to Prevent Them. |
WETICE |
2002 |
DBLP DOI BibTeX RDF |
Multi-protocol guessing attacks, weak secrets, mixed strand spaces, EKE |
82 | Li Gong |
Optimal authentication protocols resistant to password guessing attacks. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
optimal authentification protocols, user passwords, protocols, message authentication, password guessing attacks |
79 | John A. Trono |
Comments on "Tagged Semaphores". |
ACM SIGOPS Oper. Syst. Rev. |
2000 |
DBLP DOI BibTeX RDF |
|
77 | Stéphanie Delaune, Steve Kremer, Mark Ryan 0001 |
Composition of Password-Based Protocols. |
CSF |
2008 |
DBLP DOI BibTeX RDF |
composition, security protocols, guessing attacks |
71 | Taekyoung Kwon 0002, JooSeok Song |
Security and efficiency in authentication protocols resistant to password guessing attack. |
LCN |
1997 |
DBLP DOI BibTeX RDF |
password guessing attack resistance, secret, user-chosen weak secret, security-oriented protocols, cipher operations, protocol steps, poorly-chosen weak secret protection, security, efficiency, cryptographic protocols, key exchange, message authentication, authentication protocols, secure communications, random numbers, dictionary attacks |
66 | Eun-Jun Yoon, Kee-Young Yoo |
New Efficient Simple Authenticated Key Agreement Protocol. |
COCOON |
2005 |
DBLP DOI BibTeX RDF |
Modification attack, Elliptic curve discrete logarithm problem, Authenticated key agreement, Password guessing attack |
61 | Daniel E. O'Leary |
Intelligent Guessing. |
IEEE Intell. Syst. |
2006 |
DBLP DOI BibTeX RDF |
artificial intelligence, research and development |
61 | Darrin C. Edwards, Charles E. Metz, Robert M. Nishikawa |
The hypervolume under the ROC hypersurface of "Near-Guessing" and Near-Perfect" observers in N-class classification tasks. |
IEEE Trans. Medical Imaging |
2005 |
DBLP DOI BibTeX RDF |
|
60 | Wei-Chuen Yau, Swee-Huay Heng, Bok-Min Goi |
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
off-line keyword guessing attack, privacy, public key encryption, database security, Searching on encrypted data |
60 | Mathieu Baudet |
Deciding security of protocols against off-line guessing attacks. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
second-order e-unification, formal methods, security protocols, guessing attacks |
55 | Wei-Chi Ku, Min-Hung Chiang, Shen-Tien Chang |
Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme. |
ACM SIGOPS Oper. Syst. Rev. |
2005 |
DBLP DOI BibTeX RDF |
hash function, password authentication, guessing attack, denial-of-service attack, stolen-verifier attack |
50 | Marcel Fernandez, Miguel Soriano |
Protecting Intellectual Property by Guessing Secrets. |
EC-Web |
2003 |
DBLP DOI BibTeX RDF |
|
49 | Stephen Keung, Kai-Yeung Siu |
Efficient protocols secure against guessing and replay attacks. |
ICCCN |
1995 |
DBLP DOI BibTeX RDF |
password guessing, efficient protocols, password protection, nonces minimisation, protocols, multicast communications, secure communications, peer-to-peer communication, replay attacks |
48 | Persi Diaconis, Ronald L. Graham, Sam Spiro |
Guessing about Guessing: Practical Strategies for Card Guessing with Feedback. |
Am. Math. Mon. |
2022 |
DBLP DOI BibTeX RDF |
|
44 | Eun-Jun Yoon, Kee-Young Yoo |
New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
Authentication, Smart card, Password, Guessing attack |
44 | Sung-Woon Lee, Hyun-Sung Kim 0001, Kee-Young Yoo |
Cryptanalysis of a user authentication scheme using hash functions. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
authentication, cryptography, hash function, password, guessing attack |
44 | Wei-Chi Ku, Chien-Ming Chen 0001, Hui-Lung Lee |
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme. |
ACM SIGOPS Oper. Syst. Rev. |
2003 |
DBLP DOI BibTeX RDF |
hash function, password authentication, guessing attack, denial-of-service attack, stolen-verifier attack |
38 | Bogdan Groza, Marius Minea |
A Calculus to Detect Guessing Attacks. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Noga Alon, Venkatesan Guruswami, Tali Kaufman, Madhu Sudan 0001 |
Guessing secrets efficiently via list decoding. |
ACM Trans. Algorithms |
2007 |
DBLP DOI BibTeX RDF |
?-biased spaces, 20 questions, k-universal sets, error-correcting codes, decoding algorithms |
38 | Rajesh Sundaresan |
Guessing Under Source Uncertainty. |
IEEE Trans. Inf. Theory |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Jin Wook Byun, Hyun Suk Rhee, Hyun-A Park, Dong Hoon Lee 0001 |
Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data. |
Secure Data Management |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 |
Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Chin-Chen Chang 0001, Timothy K. Shih, Iuon-Chang Lin |
Guessing by neighbors: an efficient reconstruction method for transmitting image progressively. |
Vis. Comput. |
2003 |
DBLP DOI BibTeX RDF |
Bitmapped graphics, Web applications, Progressive image transmission |
38 | Noga Alon, Venkatesan Guruswami, Tali Kaufman, Madhu Sudan 0001 |
Guessing secrets efficiently via list decoding. |
SODA |
2002 |
DBLP BibTeX RDF |
|
38 | Erik Zenner |
On the Efficiency of theClock Control Guessing Attack. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
Block/Stream Ciphers, Cryptographic Primitives |
34 | Shin-Jia Hwang, Ming-Jhang Chai |
A New Authenticated Key Agreement Protocol for Wireless Mobile Networks. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Annie W. Y. Ng, Alan H. S. Chan |
Culture Issues in Traffic Sign Usability. |
HCI (10) |
2007 |
DBLP DOI BibTeX RDF |
sign concreteness, usability, culture, traffic sign |
34 | Joseph Chee Ming Teo, Chik How Tan |
Denial-of-service resilience password-based group key agreement for wireless networks. |
Q2SWinet |
2007 |
DBLP DOI BibTeX RDF |
denial-of-service, group key agreement, secure group communication, password-based authentication |
34 | Yoav Weiss, Elena Gabriela Barrantes |
Known/Chosen Key Attacks against Software Instruction Set Randomization. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Eun-Jun Yoon, Kee-Young Yoo |
New Multi-server Password Authentication Scheme Using Neural Networks. |
ICNC (2) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Ulrich Dorndorf, Erwin Pesch, Toàn Phan Huy |
Constraint Propagation and Problem Decomposition: A Preprocessing Procedure for the Job Shop Problem. |
Ann. Oper. Res. |
2002 |
DBLP DOI BibTeX RDF |
|
34 | David P. Jablon |
Password Authentication Using Multiple Servers. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Benny Chor, Oded Goldreich 0001, Shafi Goldwasser |
The Bit Security of Modular Squaring Given Partial Factorization of the Modulos. |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
|
33 | Youngsook Lee, Dongho Won |
Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment. |
ICCSA (2) |
2009 |
DBLP DOI BibTeX RDF |
multi-server environments, remote user authentication scheme, smart card, impersonation attack, password security, password guessing attack |
33 | Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo |
Secure PAP-Based RADIUS Protocol in Wireless Networks. |
ICIC (3) |
2007 |
DBLP DOI BibTeX RDF |
RADIUS protocol, Off-line password guessing attack, Wireless network, Cryptography, Replay attack |
33 | Jai-Boo Oh, Jun-Cheol Jeon, Kee-Young Yoo |
Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
Off-line guessing Attack, Authentication, Bilinear Pairing, Replay Attack, Forgery Attack |
33 | Ya-Fen Chang, Chin-Chen Chang 0001, Yu-Wei Su |
A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech. |
AINA (2) |
2006 |
DBLP DOI BibTeX RDF |
authentication, password, password guessing attack |
33 | Cheng-Chi Lee, Li-Hua Li, Min-Shiang Hwang |
A remote user authentication scheme using hash functions. |
ACM SIGOPS Oper. Syst. Rev. |
2002 |
DBLP DOI BibTeX RDF |
cryptography, hash function, password, guessing attack, digest |
33 | Sarvar Patel |
Number Theoretic Attacks on Secure Password Schemes. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
number theoretic attacks, secure password schemes, Encrypted Key Exchange, EKE, authenticated information exchange, insecure network, secret key cryptography, randomized confounders, RSA version, half encrypted versions, Direct Authentication Protocol, Secret Public Key Protocol versions, secure protocols, message authentication, dictionary attacks, active attacks, password guessing attacks |
32 | David Asperó |
Guessing and non-guessing of canonical functions. |
Ann. Pure Appl. Log. |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Nicholas B. Chang, Mingyan Liu |
Constrained Sequential Resource Allocation and Guessing Games. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Krister Lindén |
A Probabilistic Model for Guessing Base Forms of New Words by Analogy. |
CICLing |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Takayuki Osogami, Sei Kato |
Optimizing system configurations quickly by guessing at the performance. |
SIGMETRICS |
2007 |
DBLP DOI BibTeX RDF |
configuration parameters, regression, performance optimization, web system, ranking and selection |
27 | Bin Yan 0001, Zhe-Ming Lu, Sheng-He Sun |
Security of autoregressive speech watermarking model under guessing attack. |
IEEE Trans. Inf. Forensics Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Martín Abadi, Mathieu Baudet, Bogdan Warinschi |
Guessing Attacks and the Computational Soundness of Static Equivalence. |
FoSSaCS |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau |
Tracing Traitors by Guessing Secrets. The q-Ary Case. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Her-Tyan Yeh, Hung-Min Sun |
Simple authenticated key agreement protocol resistant to password guessing attacks. |
ACM SIGOPS Oper. Syst. Rev. |
2002 |
DBLP DOI BibTeX RDF |
cryptography, provable security, key agreement, key exchange, password authentication |
27 | Yun Ding, Patrick Horster |
Undetectable On-line Password Guessing Attacks. |
ACM SIGOPS Oper. Syst. Rev. |
1995 |
DBLP DOI BibTeX RDF |
|
22 | Tomasz Woloszynski, Marek Kurzynski |
On a New Measure of Classifier Competence Applied to the Design of Multiclassifier Systems. |
ICIAP |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Shai Halevi, Tal Rabin |
Degradation and Amplification of Computational Hardness. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Eun-Jun Yoon, Eun-Jung Lee, Kee-Young Yoo |
Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Cryptography, Cryptanalysis, Smart card, Password, Session key |
22 | Onur Aciiçmez, Werner Schindler |
A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
Instruction-Cache Attack, MicroArchitectural Analysis, RSA, Stochastic Process, Side Channel Analysis, Montgomery Multiplication |
22 | Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman |
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
MISTY1, Block cipher, Impossible differential cryptanalysis, Camellia |
22 | Amirali Salehi-Abari, Julie Thorpe, Paul C. van Oorschot |
On Purely Automated Attacks and Click-Based Graphical Passwords. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann |
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Hyunsoo Song, Taekyoung Kwon 0002 |
Security Analysis of Secure Password Authentication for Keystroke Dynamics. |
KES (1) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Hwa-Young Jeong |
Learner's Tailoring E-Learning System on the Item Revision Difficulty Using PetriNet. |
VSMM |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Peter D. Turney, Michael L. Littman |
Corpus-based Learning of Analogies and Semantic Relations. |
Mach. Learn. |
2005 |
DBLP DOI BibTeX RDF |
noun-modifier pairs, metaphor, analogy, vector space model, semantic relations, cosine similarity |
22 | Ertem Tuncel, Jayanth Nayak, Kenneth Rose |
On hierarchical type covering. |
IEEE Trans. Inf. Theory |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Bruno Martins 0001, Mário J. Silva |
Language identification in web pages. |
SAC |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Saeed Rajput, Jihong Chen, Sam Hsu |
State based authentication. |
ACM Southeast Regional Conference (2) |
2005 |
DBLP DOI BibTeX RDF |
rule-based attack, syllable attack, security, authentication, access control, attack, password, help-desk, vulnerabilities, dictionary attack, unauthorized access, password management |
22 | Michel Abdalla, Pierre-Alain Fouque, David Pointcheval |
Password-Based Authenticated Key Exchange in the Three-Party Setting. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Password, key distribution, authenticated key exchange, multi-party protocols |
22 | Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee |
A key authentication scheme with non-repudiation. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
non-repudiation security, authentication, certificate, discrete logarithm, public key |
22 | Marcel Fernandez, Miguel Soriano |
Efficient Recovery of Secrets. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Eun-Kyung Ryu, Kee-Won Kim, Kee-Young Yoo |
A Promising Key Agreement Protocol. |
ISAAC |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Günther Eibl, Karl Peter Pfeiffer |
How to Make AdaBoost.M1 Work for Weak Base Classifiers by Changing Only One Line of the Code. |
ECML |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Michel Raynal |
Quiescent Uniform Reliable Broadcast as an Introduction to Failure Detector Oracles. |
PaCT |
2001 |
DBLP DOI BibTeX RDF |
Fair Lossy Channels, Quiescent Protocol, Uniform Reliable Broadcast, Fault-Tolerance, Oracles, Failure Detectors, Asynchronous Distributed Systems, Process Crashes |
22 | Shai Halevi, Hugo Krawczyk |
Public-Key Cryptography and Password Protocols. |
ACM Trans. Inf. Syst. Secur. |
1999 |
DBLP DOI BibTeX RDF |
hand-held certificates, public passwords, public-key protocols, passwords, key exchange, dictionary attacks |
21 | Stephen Farrell |
Leaky or Guessable Session Identifiers. |
IEEE Internet Comput. |
2011 |
DBLP DOI BibTeX RDF |
session identifier security, brute-force, guessing, information leakage |
21 | Yanjiang Yang, Feng Bao 0001 |
Enabling Use of Single Password over Multiple Servers in Two-Server Model. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
two-server model, password authentication, guessing attacks |
21 | Tzong-Chen Wu, Hung-Yu Chien |
Comments on Gateway-Oriented Password-Based Authenticated Key Exchange Protocol. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
security, authentication, semantic security, password guessing attack |
21 | Marko Hölbl, Tatjana Welzer |
Cryptanalysis and Improvement of an "Improved Remote Authentication Scheme with Smart Card". |
ARES |
2008 |
DBLP DOI BibTeX RDF |
off-line password guessing attack, authentication, smart card, password |
21 | Eun-Jun Yoon, Kee-Young Yoo |
Improving the Generalized Password-Based Authenticated Key Agreement Protocol. |
GPC Workshops |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Cryptography, Password, Key agreement, Guessing attack |
21 | Chin-Chen Chang 0001, Jung-San Lee, Ting-Fang Cheng |
Security design for three-party encrypted key exchange protocol using smart cards. |
ICUIMC |
2008 |
DBLP DOI BibTeX RDF |
3PEKE, off-line password guessing attack, communications, smart cards |
21 | Hung-Yu Chien, Tzong-Chen Wu |
Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
authentication, key agreement, random oracle, impersonation attack, guessing attack |
16 | Markus Kuba, Alois Panholzer |
On card guessing games: Limit law for no feedback one-time riffle shuffle. |
Adv. Appl. Math. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Noé José Zapata, Gerardo Pérez, Lucas Bonilla, Pedro Núñez, Pilar Bachiller, Pablo Bustos |
Guessing human intentions to avoid dangerous situations in caregiving robots. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Xiao Ma |
Guessing What, Noise or Codeword? |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Zhiyuan Chang, Mingyang Li, Yi Liu, Junjie Wang, Qing Wang, Yang Liu |
Play Guessing Game with LLM: Indirect Jailbreak Attack with Implicit Clues. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Julien Béguinot, Olivier Rioul |
What can Information Guess? Guessing Advantage vs. Rényi Entropy for Small Leakages. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Aleksei Latyshev, Konstantin Kokhas |
Hat guessing number for the class of planar graphs is at least 22. |
Discret. Math. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Xiaoyu Ji 0001, Yushi Cheng, Wenyuan Xu 0001, Yuehan Chi, Hao Pan 0003, Zhuangdi Zhu, Chuang-Wen You, Yi-Chao Chen 0001, Lili Qiu |
No Seeing is Also Believing: Electromagnetic-Emission-Based Application Guessing Attacks via Smartphones. |
IEEE Trans. Mob. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Diogo Cruz, Francisco A. Monteiro, Bruno C. Coutinho |
Quantum Error Correction Via Noise Guessing Decoding. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Peiming Xu, Jiahui Chen 0002, Yiwei Yang 0006, Jianting Ning |
DuMSE: Toward Practical and Dynamic Multiuser Search Over Encrypted Cloud Data Against Keyword Guessing Attack. |
IEEE Internet Things J. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Andrea Ottolini, Stefan Steinerberger |
Guessing cards with complete feedback. |
Adv. Appl. Math. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Maike Jansen, Tobias Meisen, Christiane Plociennik, Holger Berg, André Pomp, Waldemar Windholz |
Stop Guessing in the Dark: Identified Requirements for Digital Product Passport Systems. |
Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Charlotte Knierim, Anders Martinsson, Raphael Steiner |
Hat Guessing Numbers of Strongly Degenerate Graphs. |
SIAM J. Discret. Math. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Thomas Van Hoey, Arthur L. Thompson, Youngah Do, Mark Dingemanse |
Iconicity in Ideophones: Guessing, Memorizing, and Reassessing. |
Cogn. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Omer Ben-Neria, Jing Zhang |
Compactness and guessing principles in the Radin extensions. |
J. Math. Log. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Muhammad Alfian, Umi Laili Yuhana, Eric Pardede, Akbar Noto Ponco Bimantoro |
Correction of Threshold Determination in Rapid-Guessing Behaviour Detection. |
Inf. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Qing Fan, Debiao He, Jianhua Chen 0002, Cong Peng 0005, Lianhai Wang |
Isoga: An Isogeny-Based Quantum-Resist Searchable Encryption Scheme Against Keyword Guessing Attacks. |
IEEE Syst. J. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Kefan Wang, Yuejun Wei, Zhenyuan Chen, Huarui Yin, Liping Li, Wenyi Zhang 0001 |
Reduced-search guessing random additive noise decoding of polar codes. |
Sci. China Inf. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | András Z. Salamon, Michael Wehar |
Effective Guessing Has Unlikely Consequences. |
Theory Comput. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Shota Saito |
Soft Guessing Under Log-Loss Distortion Allowing Errors. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Jan Kretínský, Tobias Meggendorfer, Maximilian Prokop, Sabine Rieder |
Guessing Winning Policies in LTL Synthesis by Semantic Learning. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Emanuele Francazi, Aurélien Lucchi, Marco Baity-Jesi |
Initial Guessing Bias: How Untrained Networks Favor Some Classes. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Jeremy Chizewer, Ian M. J. McInnis, Mehrdad Sohrabi, Shriya Kaistha |
The Hat Guessing Number of Cactus Graphs and Cycles. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Michael Cunanan, Michael Thielscher |
On Optimal Strategies for Wordle and General Guessing Games. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Jeffrey O. Shallit |
Proof of Irvine's Conjecture via Mechanized Guessing. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 878 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ >>] |
|