The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for assumptions with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1958-1973 (16) 1974-1977 (22) 1978-1980 (17) 1981-1983 (21) 1984-1985 (24) 1986-1987 (35) 1988 (39) 1989 (55) 1990 (56) 1991 (53) 1992 (63) 1993 (65) 1994 (80) 1995 (95) 1996 (93) 1997 (118) 1998 (144) 1999 (200) 2000 (314) 2001 (274) 2002 (333) 2003 (405) 2004 (535) 2005 (678) 2006 (744) 2007 (788) 2008 (796) 2009 (545) 2010 (94) 2011 (72) 2012 (67) 2013 (90) 2014 (62) 2015 (76) 2016 (90) 2017 (87) 2018 (91) 2019 (121) 2020 (135) 2021 (129) 2022 (126) 2023 (144) 2024 (38)
Publication types (Num. hits)
article(2380) incollection(42) inproceedings(5570) phdthesis(37) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7022 occurrences of 3995 keywords

Results
Found 8030 publication records. Showing 8030 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
16Moni Naor, Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
16David L. Dill Timing Assumptions and Verification of Finite-State Concurrent Systems. Search on Bibsonomy Automatic Verification Methods for Finite State Systems The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
15Su Chang, Thomas E. Daniels P2P botnet detection using behavior clustering & statistical tests. Search on Bibsonomy AISec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF machine learning, network security, anomaly detection
15Achour Mostéfaoui What Agreement Problems Owe Michel. Search on Bibsonomy DISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee Improved Non-committing Encryption with Applications to Adaptively Secure Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF adaptive corruption, non-committing encryption, public-key encryption, secure multi-party computation
15Yi Deng 0002, Giovanni Di Crescenzo, Dongdai Lin, Dengguo Feng Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model. Search on Bibsonomy CSR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Zurab Khasidashvili, Gavriel Gavrielov, Tom Melham Assume-guarantee validation for STE properties within an SVA environment. Search on Bibsonomy FMCAD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Emerson R. Murphy-Hill, Chris Parnin, Andrew P. Black How we refactor, and how we know it. Search on Bibsonomy ICSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Kosta Dosen, Zoran Petric Equality of proofs for linear equality. Search on Bibsonomy Arch. Math. Log. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 03F07, 03F52, 03G30, 18C05, 18A40, 18D10, 03F05
15Jun Sun 0001, Yang Liu 0003, Jin Song Dong, Hai H. Wang Specifying and Verifying Event-Based Fairness Enhanced Systems. Search on Bibsonomy ICFEM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Luca Benvenuti, Alberto Ferrari, Emanuele Mazzi, Alberto L. Sangiovanni-Vincentelli Contract-Based Design for Computation and Verification of a Closed-Loop Hybrid System. Search on Bibsonomy HSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Martin Feilkas, Daniel Ratiu Ensuring Well-Behaved Usage of APIs through Syntactic Constraints. Search on Bibsonomy ICPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Kritsada Sriphaew, Hiroya Takamura, Manabu Okumura Cool Blog Identi?cation Using Topic-Based Models. Search on Bibsonomy Web Intelligence The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Flora P. McMartin, Brandon Muramatsu Use vs. access: design and use in educational digital libraries. Search on Bibsonomy JCDL The full citation details ... 2007 DBLP  DOI  BibTeX  RDF digital libraries, collections, educational digital libraries, usage, NSDL
15Juan M. Huerta A model for contact center analysis and simulation. Search on Bibsonomy WSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Douglas L. Vail, Manuela M. Veloso, John D. Lafferty Conditional random fields for activity recognition. Search on Bibsonomy AAMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF conditional random fields (CRFs), hidden Markov models (HMMs), activity recognition
15Siri-on Setamanit, Wayne W. Wakeland, David Raffo Exploring the Impact of Task Allocation Strategies for Global Software Development Using Simulation. Search on Bibsonomy SPW/ProSim The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Carrie Gates, Carol Taylor Challenging the anomaly detection paradigm: a provocative discussion. Search on Bibsonomy NSPW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, intrusion detection
15Michael de Mare, Rebecca N. Wright Secure Set Membership Using 3Sat. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Daniel Große, Rolf Drechsler Acceleration of SAT-Based Iterative Property Checking. Search on Bibsonomy CHARME The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Rafael Pass Bounded-concurrent secure multi-party computation with a dishonest majority. Search on Bibsonomy STOC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF constant-round protocols, simulation-sound zero-knowledge, secure multi-party computation, concurrent composition
15Elena A. Erosheva, Stephen E. Fienberg Bayesian Mixed Membership Models for Soft Clustering and Classification. Search on Bibsonomy GfKl The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Sang Ho Lee, Kyu-Young Whang, Yang-Sae Moon, Wook-Shin Han, Il-Yeol Song Dynamic Buffer Allocation in Video-on-Demand Systems. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF VOD systems, dynamic buffer allocation, buffer scheduling methods, multimedia systems
15Andrew Rae, Daniel Jackson 0001, Prasad Ramanan, Jay Flanz, Didier Leyman Critical Feature Analysis of a Radiotherapy Machine. Search on Bibsonomy SAFECOMP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Boaz Barak, Yehuda Lindell, Salil P. Vadhan Lower Bounds for Non-Black-Box Zero Knowledge. Search on Bibsonomy FOCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Yann Loyer, Nicolas Spyratos Hypothesis-Founded Semantics for Datalog Programs with Negation. Search on Bibsonomy MFCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF semantics of logic programs, non-monotonic reasoning, hypothesis
15Fernando Pedone Boosting System Performance with Optimistic Distributed Protocols. Search on Bibsonomy Computer The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15Benjamin Geisler, Vu A. Ha, Peter Haddawy Modeling user preferences via theory refinement. Search on Bibsonomy IUI The full citation details ... 2001 DBLP  DOI  BibTeX  RDF neural networks, personalization, user modeling, decision theory
15Sang Ho Lee, Kyu-Young Whang, Yang-Sae Moon, Il-Yeol Song Dynamic Buffer Allocation in Video-on-Demand Systems. Search on Bibsonomy SIGMOD Conference The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15Rosario Gennaro, Shai Halevi, Tal Rabin Secure Hash-and-Sign Signatures Without the Random Oracle. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Hash and Sign, Smooth Numbers, Digital Signatures, RSA, Random Oracle, Chameleon Hashing
15John J. Kyaruzi, Jan van Katwijk Beyond Components-Connections-Constraints: Dealing with Software Architecture Difficulties. Search on Bibsonomy ASE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF ontology, software architecture, formal methods, ADL
15Radu Negulescu, Ad M. G. Peeters Verification of Speed-Dependences in Single-Rail Handshake Circuits. Search on Bibsonomy ASYNC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF single-rail, isochronic forks, verification, timing, asynchronous circuits, progress, speed-independent circuits, process spaces, handshake circuits
15Paul E. Black, Phillip J. Windley Autotically Synthesized Term Denotation Predicates: A Proof Aid. Search on Bibsonomy TPHOLs The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
15Mohamed G. Gouda, Sanjoy Paul A wireless link protocol: design by refinement. Search on Bibsonomy ICNP The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
15Daniel R. Ries, Michael Stonebraker Locking Granularity Revisited. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1979 DBLP  DOI  BibTeX  RDF locking granulaity, locking hierarchies, multiple updates, concurrency, database management
15Roger M. Firestone An analytic model for parallel computation. Search on Bibsonomy AFIPS National Computer Conference The full citation details ... 1977 DBLP  DOI  BibTeX  RDF
12Päivi Seppälä, Magdalena Malecka AI and discriminative decisions in recruitment: Challenging the core assumptions. Search on Bibsonomy Big Data Soc. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Mohsen Esmaeilbeigi, Meysam Cheraghi Hybrid kernel approach to improving the numerical stability of machine learning for parametric equations with Gaussian processes in the noisy and noise-free data assumptions. Search on Bibsonomy Eng. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Matthew Abate, Mark Mote, Mehregan Dor, Corbin Klett, Sean Phillips, Kendra Lang, Panagiotis Tsiotras, Eric Feron, Samuel Coogan 0001 Run Time Assurance for Spacecraft Attitude Control Under Nondeterministic Assumptions. Search on Bibsonomy IEEE Trans. Control. Syst. Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Yusu Hong, Junhong Lin Revisiting Convergence of AdaGrad with Relaxed Assumptions. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Yusu Hong, Junhong Lin On Convergence of Adam for Stochastic Optimization under Relaxed Assumptions. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Ilias Diakonikolas, Daniel Kane 0001, Lisheng Ren, Yuxin Sun SQ Lower Bounds for Non-Gaussian Component Analysis with Weaker Assumptions. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Thomas S. Richardson 0001, James M. Robins Assumptions and Bounds in the Instrumental Variable Model. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Eliad Tsfadia On Differentially Private Subspace Estimation Without Distributional Assumptions. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Chen Yang 0007, Peng Liang 0001, Zinan Ma An exploratory study on automatic identification of assumptions in the development of deep learning frameworks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Ashwin Daswani, Rohan Sawant, Najoung Kim Syn-QA2: Evaluating False Assumptions in Long-tail Questions with Synthetic QA Datasets. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Nilesh Vyas, Paulo Mendes 0001 Relaxing Trust Assumptions on Quantum Key Distribution Networks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Brandon C. Collins, Shouhuai Xu, Philip N. Brown SoK: Game-Theoretic Cybersecurity: Assumptions, Models, Gaps, and Bridges. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Kaihong Zhang, Heqi Yin, Feng Liang, Jingbo Liu Minimax Optimality of Score-based Diffusion Models: Beyond the Density Lower Bound Assumptions. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Quang Dao, Aayush Jain Lossy Cryptography from Code-Based Assumptions. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Aayush Jain, Huijia Lin, Amit Sahai Indistinguishability Obfuscation from Well-Founded Assumptions. Search on Bibsonomy Commun. ACM The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Mark Taylor, Helen Kennedy, Susan Oman Challenging assumptions about the relationship between awareness of and attitudes to data uses amongst the UK public. Search on Bibsonomy Inf. Soc. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Quang Dao, Aayush Jain Lossy Cryptography from Code-Based Assumptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
12Helger Lipmaa, Roberto Parisella, Janno Siim Constant-Size zk-SNARKs in ROM from Falsifiable Assumptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
12Intak Hwang, Jinyeong Seo, Yongsoo Song Concretely Efficient Lattice-based Polynomial Commitment from Standard Assumptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
12Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Roland Gröll, Maximilian Müller, Jörn Müller-Quade Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-Quantum Assumptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
12Jeroen van de Graaf, Arjen K. Lenstra Delphi: sharing assessments of cryptographic assumptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
12Sacha Servan-Schreiber Constrained Pseudorandom Functions for Inner-Product Predicates from Weaker Assumptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
12Rafaël Del Pino, Shuichi Katsumata, Mary Maller, Fabrice Mouhartem, Thomas Prest, Markku-Juhani O. Saarinen Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
12Aikaterini Mitrokotsa, Sayantan Mukherjee, Mahdi Sedaghat, Daniel Slamanig, Jenit Tomy Threshold Structure-Preserving Signatures: Strong and Adaptive Security under Standard Assumptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
12Jan Bobolz, Jesus Diaz, Markulf Kohlweiss Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
12Yilei Chen, Xinyu Mao Universal Computational Extractors from Lattice Assumptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
12Xin Wang, Li Lin, Yao Wang Stealth Address Schemes With Fast Retrievability Based On Subgroup Membership Assumptions Related To Factoring. Search on Bibsonomy Comput. J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Roberta Cimorelli Belfiore, Andrea De Cosmo, Anna Lisa Ferrara Identity-Based Matchmaking Encryption from Standard Lattice Assumptions. Search on Bibsonomy ACNS (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Xinhui Liu, Zhenghao Chen, Luping Zhou, Dong Xu 0001, Wei Xi, Gairui Bai, Yihan Zhao, Jizhong Zhao UFDA: Universal Federated Domain Adaptation with Practical Assumptions. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Roland Gröll, Maximilian Müller, Jörn Müller-Quade Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions. Search on Bibsonomy Public Key Cryptography (4) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Aikaterini Mitrokotsa, Sayantan Mukherjee, Mahdi Sedaghat, Daniel Slamanig, Jenit Tomy Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Balthazar Bauer, Georg Fuchsbauer, Fabian Regen On Proving Equivalence Class Signatures Secure from Non-interactive Assumptions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Romain Gay, Bogdan Ursu On Instantiating Unleveled Fully-Homomorphic Signatures from Falsifiable Assumptions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Helger Lipmaa, Roberto Parisella, Janno Siim Constant-Size zk-SNARKs in ROM from Falsifiable Assumptions. Search on Bibsonomy EUROCRYPT (6) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Martin R. Albrecht, Giacomo Fenzi, Oleksandra Lapiha, Ngoc Khanh Nguyen 0001 SLAP: Succinct Lattice-Based Polynomial Commitments from Standard Assumptions. Search on Bibsonomy EUROCRYPT (6) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Anne-Kathrin Schmuck, K. S. Thejaswini, Irmak Saglam, Satya Prakash Nayak Solving Two-Player Games Under Progress Assumptions. Search on Bibsonomy VMCAI (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Achille O. R. Nazaret, Claudia Shi, David M. Blei On the Misspecification of Linear Assumptions in Synthetic Controls. Search on Bibsonomy AISTATS The full citation details ... 2024 DBLP  BibTeX  RDF
12Iosif Apostolakis, Zeynep G. Saribatur, Johannes Peter Wallner Abstracting Assumptions in Structured Argumentation. Search on Bibsonomy AAMAS The full citation details ... 2024 DBLP  BibTeX  RDF
12Kuize Zhang Removing Two Fundamental Assumptions in Verifying Strong Periodic (D-)Detectability of Discrete-Event Systems. Search on Bibsonomy IEEE Control. Syst. Lett. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Jean-François Biasse, Xavier Bonnetain, Elena Kirshanova, André Schrottenloher, Fang Song 0001 Quantum algorithms for attacking hardness assumptions in classical and post-quantum cryptography. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Justin Grimmer, Dean Knox, Brandon M. Stewart Naive regression requires weaker assumptions than factor models to adjust for multiple cause confounding. Search on Bibsonomy J. Mach. Learn. Res. The full citation details ... 2023 DBLP  BibTeX  RDF
12Tetiana Gorbach, Xavier de Luna, Juha Karvanen, Ingeborg Waernbaum Contrasting Identifying Assumptions of Average Causal Effects: Robustness and Semiparametric Efficiency. Search on Bibsonomy J. Mach. Learn. Res. The full citation details ... 2023 DBLP  BibTeX  RDF
12Xiaoxi Jia, Christian Kanzow, Patrick Mehlitz Convergence Analysis of the Proximal Gradient Method in the Presence of the Kurdyka-Łojasiewicz Property Without Global Lipschitz Assumptions. Search on Bibsonomy SIAM J. Optim. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Liting Mai, Shuping Yang, Yu Wang, Rui Li 0028 Impacts of Shape Assumptions on Z-R Relationship and Satellite Remote Sensing Clouds Based on Model Simulations and GPM Observations. Search on Bibsonomy Remote. Sens. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Janaka Alawatugoda 0001 Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions. Search on Bibsonomy Cryptogr. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Gabriele Eichfelder, Lars Grüne, Lisa Krügel, Jonas Schießl Relaxed dissipativity assumptions and a simplified algorithm for multiobjective MPC. Search on Bibsonomy Comput. Optim. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Clay Carper, Stone Olguin, Jarek Brown, Caylie Charlton, Mike Borowczak Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis. Search on Bibsonomy J. Cybersecur. Priv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Francis Mujjuni, Thomas R. Betts, Richard E. Blanchard Evaluation of Power Systems Resilience to Extreme Weather Events: A Review of Methods and Assumptions. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Moslem Forouzesh, Farid Samsami Khodadad, Paeiz Azmi, Ali Kuhestani, Hossein Ahmadi Simultaneous Secure and Covert Transmissions Against Two Attacks Under Practical Assumptions. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Marshall Ball, Elette Boyle, Ran Cohen, Lisa Kohl, Tal Malkin, Pierre Meyer, Tal Moran Topology-Hiding Communication from Minimal Assumptions. Search on Bibsonomy J. Cryptol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Iqbal Shamsudheen, Christian Hennig Should We Test the Model Assumptions Before Running a Model-based Test? Search on Bibsonomy J. Data Sci. Stat. Vis. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Axel Theorell, Jörg Stelling Assumptions on decision making and environment can yield multiple steady states in microbial community models. Search on Bibsonomy BMC Bioinform. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Queralt Viladevall, Salvador Linares-Mustarós, Maria Antonia Huertas, Joan Carles Ferrer-Comalat Understanding the Axioms and Assumptions of Logical Mathematical Systems through Raster Images: Application to the Construction of a Likert Scale. Search on Bibsonomy Axioms The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Noel Carroll, Kieran Conboy, Nik Rushdi Hassan, Thomas Hess, Iris A. Junglas, Lorraine Morgan Problematizing Assumptions on Digital Transformation Research in the Information Systems Field. Search on Bibsonomy Commun. Assoc. Inf. Syst. The full citation details ... 2023 DBLP  BibTeX  RDF
12Wentao Cao, Yaling Li, Qingzhao Yu Sensitivity analysis for assumptions of general mediation analysis. Search on Bibsonomy Commun. Stat. Simul. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay Short attribute-based signatures for arbitrary Turing machines from standard assumptions. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Yanwei Zhou, Bo Yang 0003, Zirui Qiao, Zhe Xia, Mingwu Zhang, Yi Mu 0001 Leakage-resilient identity-based cryptography from minimal assumptions. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Maarten C. Vonk, Ninoslav Malekovic, Thomas Bäck, Anna V. Kononova Disentangling causality: assumptions in causal discovery and inference. Search on Bibsonomy Artif. Intell. Rev. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Leonid Barenboim, Harel Levin Secured distributed algorithms without hardness assumptions. Search on Bibsonomy J. Parallel Distributed Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Jiaxu Peng, Jungpil Hahn, Ke-Wei Huang Handling Missing Values in Information Systems Research: A Review of Methods and Assumptions. Search on Bibsonomy Inf. Syst. Res. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Dirk Tasche Invariance assumptions for class distribution estimation. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Amit Daniely, Nathan Srebro, Gal Vardi Efficiently Learning Neural Networks: What Assumptions May Suffice? Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Jihyo Kim, Jeonghyeon Kim, Sangheum Hwang Deep Active Learning with Contrastive Learning Under Realistic Data Pool Assumptions. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Daniel Barzilai, Ohad Shamir Generalization in Kernel Regression Under Realistic Assumptions. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 8030 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license