|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 4576 occurrences of 2854 keywords
|
|
|
Results
Found 11949 publication records. Showing 11949 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
66 | Cindy Eisner, Dana Fisman, John Havlicek |
A topological characterization of weakness. |
PODC |
2005 |
DBLP DOI BibTeX RDF |
safety component, semantically weak and strong formulas, syntactically weak and strong formulas, temporal weakness and strength, weak and strong components, safety, liveness |
63 | Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle |
A Note on Weak Keys of PES, IDEA, and Some Extended Variants. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
61 | Alan Shuchat, Randy Shull, Ann N. Trenk |
Range of the Fractional Weak Discrepancy Function. |
Order |
2006 |
DBLP DOI BibTeX RDF |
weak discrepancy, fractional weak discrepancy, weak orders, semiorders |
58 | Kevin Donnelly, J. J. Hallett, Assaf J. Kfoury |
Formal semantics of weak references. |
ISMM |
2006 |
DBLP DOI BibTeX RDF |
weak references, garbage collection, formal semantics |
56 | Pascal Cuoq, Damien Doligez |
Hashconsing in an incrementally garbage-collected system: a story of weak pointers and hashconsing in ocaml 3.10.2. |
ML |
2008 |
DBLP DOI BibTeX RDF |
hash-consing, maximal sharing, weak hashtables, weak pointers, weak references, garbage collection, ocaml |
53 | Zhengyou Zhang, P. Anandan 0001, Heung-Yeung Shum |
What Can Be Determined from a Full and a Weak Perspective Image? |
ICCV |
1999 |
DBLP DOI BibTeX RDF |
Integration of Full and Weak Perspective Views, 3D Reconstruction, Motion Analysis, Epipolar Geometry, Multiresolution Modeling |
49 | Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang 0001 |
The Second-Preimage Attack on MD4. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
collision differential path, weak message, Hash function, second-preimage |
49 | Alex Biryukov, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle |
New Weak-Key Classes of IDEA. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
IDEA cipher, weak keys, NESSIE, boomerang attack |
49 | A. Jefferson Offutt, Stephen D. Lee |
An Empirical Evaluation of Weak Mutation. |
IEEE Trans. Software Eng. |
1994 |
DBLP DOI BibTeX RDF |
weak mutation, fault-based technique, unit-level software testing, computational savings, software engineering, efficiency, program testing, effectiveness, mutation testing |
48 | Issam S. Strub, Alexandre M. Bayen |
Mixed Initial-Boundary Value Problems for Scalar Conservation Laws: Application to the Modeling of Transportation Networks. |
HSCC |
2006 |
DBLP DOI BibTeX RDF |
Weak solution of scalar conservation laws, Weak hybrid boundary conditions, LWR PDE, Highway traffic modeling, Boundary control |
48 | Thomas Vetterlein |
BL-algebras and effect algebras. |
Soft Comput. |
2005 |
DBLP DOI BibTeX RDF |
Weak effect algebra, D-poset, Weak D-poset, Effect algebra, BL-algebra |
48 | Orna Kupferman, Moshe Y. Vardi |
Weak alternating automata are not that weak. |
ACM Trans. Comput. Log. |
2001 |
DBLP DOI BibTeX RDF |
weak alternating automata, complementation |
45 | Felix Brandt 0001, Markus Brill, Felix A. Fischer, Jan Hoffmann 0002 |
The Computational Complexity of Weak Saddles. |
SAGT |
2009 |
DBLP DOI BibTeX RDF |
|
45 | Baoqing Jiang, Yang Xu, Qing Wei 0003, Kun Wu |
Weak ratio rules between nonnegative real-valued data in transactional database. |
GrC |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Orhun Kara, Cevat Manap |
A New Class of Weak Keys for Blowfish. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Blowfish, key dependent S-Box, self similarity analysis, cryptanalysis, fixed point, weak key, reflection attack |
44 | Klaus Ambos-Spies, Elvira Mayordomo, Xizhong Zheng |
A Comparison of Weak Completeness Notions. |
CCC |
1996 |
DBLP DOI BibTeX RDF |
Weak Completeness, Measure, Genericity, Completeness |
44 | Wolfgang K. Giloi, C. Hastedt, Friedrich Schön, Wolfgang Schröder-Preikschat |
A Distributed Implementation of Shared Virtual Memory with Strong and Weak Coherence. |
EDMCC |
1991 |
DBLP DOI BibTeX RDF |
virtual shared memory architecture, strong and weak data coherence, communication hardware, parallelizing compilers, Distributed memory architecture |
43 | Paul J. Tanenbaum, Ann N. Trenk, Peter C. Fishburn |
Linear Discrepancy and Weak Discrepancy of Partially Ordered Sets. |
Order |
2001 |
DBLP DOI BibTeX RDF |
linear discrepancy, weak discrepancy, weak extension, linear extension |
43 | Alexander E. Andreev, Andrea E. F. Clementi, José D. P. Rolim, Luca Trevisan |
Weak Random Sources, Hitting Sets, and BPP Simulations. |
FOCS |
1997 |
DBLP DOI BibTeX RDF |
BPP simulations, parallel classes, lower bound, sampling, polynomial time, randomised algorithms, hitting sets, weak random source, weak random sources, min-entropy |
40 | Ronald W. Brower, Kenneth S. Stevens |
Congruent Weak Conformance, a Partial Order among Processes. |
FORTE |
2002 |
DBLP DOI BibTeX RDF |
|
40 | Boris Bukh, Jirí Matousek 0001, Gabriel Nivasch |
Lower bounds for weak epsilon-nets and stair-convexity. |
SCG |
2009 |
DBLP DOI BibTeX RDF |
inverse ackermann function, selection lemma, stair-convexity, weak epsilon-net |
40 | Saurabh Ray, Nabil H. Mustafa |
Weak epsilon-nets have basis of size o(1/epsilon log (1/epsilon)) in any dimension. |
SCG |
2007 |
DBLP DOI BibTeX RDF |
hitting convex sets, weak epsilon nets, discrete geometry, combinatorial geometry |
40 | Eunjin Lee, Deukjo Hong, Donghoon Chang, Seokhie Hong, Jongin Lim 0001 |
A Weak Key Class of XTEA for a Related-Key Rectangle Attack. |
VIETCRYPT |
2006 |
DBLP DOI BibTeX RDF |
XTEA algorithm, weak key class of XTEA, related-key rectangle attack |
40 | Jirí Adámek, Horst Herrlich, Jirí Rosický, Walter Tholen |
Weak Factorization Systems and Topological Functors. |
Appl. Categorical Struct. |
2002 |
DBLP DOI BibTeX RDF |
weak factorization systems, full functor, topological functor, cofibrantly generated, poset |
40 | Philip Hawkes |
Differential-Linear Weak Key Classes of IDEA. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
differential-linear cryptanalysis, related-key cryptanalysis, IDEA, weak keys |
39 | Paul Flondor, George Georgescu, Afrodita Iorgulescu |
Pseudo-t-norms and pseudo-BL algebras. |
Soft Comput. |
2001 |
DBLP DOI BibTeX RDF |
Weak-BL algebra, Weak-pseudo-BL algebra, Pseudo- t -norm, Pseudo- t -conorm, Left continuity, Right continuity, MV algebra, t -norm, BL algebra, Pseudo-MV algebra, Pseudo-BL algebra, t -conorm |
39 | Taekyoung Kwon 0002, JooSeok Song |
Security and efficiency in authentication protocols resistant to password guessing attack. |
LCN |
1997 |
DBLP DOI BibTeX RDF |
password guessing attack resistance, secret, user-chosen weak secret, security-oriented protocols, cipher operations, protocol steps, poorly-chosen weak secret protection, security, efficiency, cryptographic protocols, key exchange, message authentication, authentication protocols, secure communications, random numbers, dictionary attacks |
36 | Krzysztof Pietrzak, Johan Sjödin |
Weak Pseudorandom Functions in Minicrypt. |
ICALP (2) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Toufiq Parag, Fatih Porikli, Ahmed M. Elgammal |
Boosting adaptive linear weak classifiers for online learning and tracking. |
CVPR |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Stéphane Devismes, Sébastien Tixeuil, Masafumi Yamashita |
Weak vs. Self vs. Probabilistic Stabilization. |
ICDCS |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Roland Martin, Karsten Weihe |
Weak Symmetries in Problem Formulations. |
CP |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Jochen Renz, Gérard Ligozat |
Weak Composition for Qualitative Spatial and Temporal Reasoning. |
CP |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Mario Bravetti, Roberto Gorrieri |
Deciding and axiomatizing weak ST bisimulation for a process algebra with recursion and action refinement. |
ACM Trans. Comput. Log. |
2002 |
DBLP DOI BibTeX RDF |
ST bisimulation, noninterleaving semantics, process algebra, axiomatization, Action refinement |
36 | Cory J. Butz, Manon J. Sanscartier |
Properties of Weak Conditional Independence. |
Rough Sets and Current Trends in Computing |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Stefan Edelkamp, Ingo Wegener |
On the Performance of WEAK-HEAPSORT. |
STACS |
2000 |
DBLP DOI BibTeX RDF |
|
36 | Keren Censor-Hillel, Hadas Shachnai |
Partial information spreading with application to distributed maximum coverage. |
PODC |
2010 |
DBLP DOI BibTeX RDF |
maximum coverage, partial information spreading, weak conductance, approximation algorithms, distributed computing, randomized algorithms |
36 | Gerard Ligozat |
When Tables Tell It All: Qualitative Spatial and Temporal Reasoning Based on Linear Orderings. |
COSIT |
2001 |
DBLP DOI BibTeX RDF |
weak representation, complete theory, relation algebra, temporal reasoning, spatial reasoning |
35 | Orna Kupferman, Moshe Y. Vardi |
Weak Alternating Automata Are Not That Weak. |
ISTCS |
1997 |
DBLP DOI BibTeX RDF |
|
35 | Linyuan Lu, Tao Zhou 0001 |
Role of weak ties in link prediction of complex networks. |
CIKM-CNIKM |
2009 |
DBLP DOI BibTeX RDF |
weak ties theory, complex networks, link prediction |
35 | Noga Alon, Haim Kaplan, Gabriel Nivasch, Micha Sharir, Shakhar Smorodinsky |
Weak ε-nets and interval chains. |
J. ACM |
2008 |
DBLP DOI BibTeX RDF |
Interval chain, inverse Ackermann function, moment curve, weak epsilon-net |
35 | Utku Günay Acer, Shivkumar Kalyanaraman, Alhussein A. Abouzeid |
Weak state routing for large scale dynamic networks. |
MobiCom |
2007 |
DBLP DOI BibTeX RDF |
unstructured distributed hashing, weak states, routing algorithms, dynamic networks |
35 | Michael E. Saks, Lan Yu |
Weak monotonicity suffices for truthfulness on convex domains. |
EC |
2005 |
DBLP DOI BibTeX RDF |
strategyproof, weak monotonicity, mechanism design, truthful, dominant strategy |
35 | Nathan Reading |
Lattice Congruences of the Weak Order. |
Order |
2004 |
DBLP DOI BibTeX RDF |
Cambrian lattice, congruence uniform, Coxeter group, parabolic subgroup, poset of regions, shard, simplicial hyperplane arrangement, Tamari lattice, weak order |
35 | Jirí Matousek 0001 |
New constructions of weak epsilon-nets. |
SCG |
2003 |
DBLP DOI BibTeX RDF |
weak epsilon-nets |
35 | Arnold Beckmann |
A Note on Universal Measures for Weak Implicit Computational Complexity. |
LPAR |
2002 |
DBLP DOI BibTeX RDF |
Dynamic ordinals, Witness oracle TURING machines, Weak implicit computational complexity, Bounded arithmetic |
35 | Radu Horaud, Fadi Dornaika, Bart Lamiroy |
Object Pose: The Link between Weak Perspective, Paraperspective, and Full Perspective. |
Int. J. Comput. Vis. |
1997 |
DBLP DOI BibTeX RDF |
perspective n-point problem, paraperspective, extrinsic camera parameters, camera calibration, weak perspective, object pose |
34 | David Zuckerman |
Simulating BPP Using a General Weak Random Source |
FOCS |
1991 |
DBLP DOI BibTeX RDF |
probe search, BPP simulation, general weak random source, R-bit string, approximation algorithms, polynomial time, maximum clique, weak random source |
34 | Aviad Cohen 0001, Avi Wigderson |
Dispersers, Deterministic Amplification, and Weak Random Sources (Extended Abstract) |
FOCS |
1989 |
DBLP DOI BibTeX RDF |
weak bit fixing sources, RP algorithm, BPP algorithm, deterministic amplification, bipartite multigraphs, probabilistic algorithms, dispersers, error probability, weak random sources |
32 | Peng Ning, An Liu, Wenliang Du |
Mitigating DoS attacks against broadcast authentication in wireless sensor networks. |
ACM Trans. Sens. Networks |
2008 |
DBLP DOI BibTeX RDF |
security, Sensor networks, broadcast authentication, DoS attacks |
32 | Alfred Menezes, Edlyn Teske |
Cryptographic implications of Hess' generalized GHS attack. |
Appl. Algebra Eng. Commun. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (1991) 94A60 |
32 | Stefan Edelkamp, Patrick Stiegeler |
Pushing the Limits in Sequential Sorting. |
WAE |
2000 |
DBLP DOI BibTeX RDF |
|
31 | Sri-Kaushik Pavani, David Delgado-Gómez, Alejandro F. Frangi |
Gaussian Weak Classifiers Based on Haar-Like Features with Four Rectangles for Real-time Face Detection. |
CAIP |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Mamoru Kutami |
Von Neumann Regular Rings Satisfying Weak Comparability. |
Appl. Categorical Struct. |
2008 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classifications (2000) 16E50, 16D70 |
31 | Haiyan Chen |
More on Weak Bisimilarity of Normed Basic Parallel Processes. |
TAMC |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Shaomin Wu, Min Xie 0001 |
Classifying Weak, and Strong Components Using ROC Analysis With Application to Burn-In. |
IEEE Trans. Reliab. |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Kui-Lam Kwok, Laszlo Grunfeld, Peter Deng |
Improving Weak Ad-Hoc Retrieval by Web Assistance and Data Fusion. |
AIRS |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Andrew K. Lui, Reggie Kwan, Maria Poon, Yannie H. Y. Cheung |
Saving weak programming students: applying constructivism in a first programming course. |
ACM SIGCSE Bull. |
2004 |
DBLP DOI BibTeX RDF |
programming, computer science education, mental models, constructivism |
31 | Christian Schindelhauer, Klaus Volbert, Martin Ziegler 0001 |
Spanners, Weak Spanners, and Power Spanners for Wireless Networks. |
ISAAC |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Andreas Opelt, Michael Fussenegger, Axel Pinz, Peter Auer |
Weak Hypotheses and Boosting for Generic Object Detection and Recognition. |
ECCV (2) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Shoichi Hirose |
Yet Another Definition of Weak Collision Resistance and Its Analysis. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Marcelo P. Fiore, Gian Luca Cattani, Glynn Winskel |
Weak Bisimulation and Open Maps. |
LICS |
1999 |
DBLP DOI BibTeX RDF |
semantics, Concurrency, denotational semantics, categorical models |
31 | Bruno Marnette |
Generalized schema-mappings: from termination to tractability. |
PODS |
2009 |
DBLP DOI BibTeX RDF |
weak acyclicity, data exchange, core, universal solution |
31 | Xuhui Wang, Falai Chen, Jiansong Deng |
Implicitization and parametrization of quadratic surfaces with one simple base point. |
ISSAC |
2008 |
DBLP DOI BibTeX RDF |
moving plane, weak u-basis, parametrization, implicitization |
31 | Jasen Markovski, Erik P. de Vink |
Embedding Real Time in Stochastic Process Algebras. |
EPEW |
2006 |
DBLP DOI BibTeX RDF |
Stochastic delay, weak choice, real-time and stochastic process algebra, race condition |
31 | Christopher Doble, Jean-Paul Doignon, Jean-Claude Falmagne, Peter C. Fishburn |
Almost Connected Orders. |
Order |
2001 |
DBLP DOI BibTeX RDF |
almost connected order, well graded family, upgradable family, downgradable family, weak order, semiorder |
31 | Sarita V. Adve, Mark D. Hill |
A Unified Formalization of Four Shared-Memory Models. |
IEEE Trans. Parallel Distributed Syst. |
1993 |
DBLP DOI BibTeX RDF |
data-race-free-1, data-race-free-0, hazards and raceconditions, multiprocessors, shared memory systems, formalization, sequential consistency, weak ordering, shared-memory models, release consistency |
31 | J. N. Alonso Álvarez, J. M. Fernández Vilaboa, R. González Rodríguez, A. B. Rodríguez Raposo |
Invertible Weak Entwining Structures and Weak C-cleft Extensions. |
Appl. Categorical Struct. |
2006 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classifications (2000) 18D10, 16W30 |
30 | Anna Gomolinska |
Rough Approximation Based on Weak q-RIFs. |
Trans. Rough Sets |
2009 |
DBLP DOI BibTeX RDF |
weak quasi-rough inclusion, rough approximation space, rough inclusion |
30 | Subhamoy Maitra, Santanu Sarkar 0001 |
Revisiting Wiener's Attack - New Weak Keys in RSA. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, RSA, Factorization, Weak Keys |
30 | Hong Zhang 0018, Xiaolong Liu, Junwei Li, Zhu Zhenfu |
The Study of Detecting for IR Weak and Small Targets Based on Fractal Features. |
MMM (2) |
2007 |
DBLP DOI BibTeX RDF |
Weak and small, Fractal model fit error, Multi-scale variance ratio of fractal surface, Fractal dimension |
30 | Laurent Bienvenu, David Doty, Frank Stephan 0001 |
Constructive Dimension and Weak Truth-Table Degrees. |
CiE |
2007 |
DBLP DOI BibTeX RDF |
weak truth-table, randomness, extractor, degree, constructive dimension |
30 | Keijo Heljanko, Tommi A. Junttila, Misa Keinänen, Martin Lange, Timo Latvala |
Bounded Model Checking for Weak Alternating Büchi Automata. |
CAV |
2006 |
DBLP DOI BibTeX RDF |
Weak Alternating Büchi Automata, Bounded Model Checking, PSL, NuSMV |
30 | Heiko Stamer |
Completion Attacks and Weak Keys of Oleshchuk's Public Key Cryptosystem. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
completion attack, Knuth-Bendix completion, Cryptanalysis, weak keys, Church-Rosser property, string-rewriting systems |
30 | Mark H. Carpenter, David I. Gottlieb, Chi-Wang Shu |
On the Conservation and Convergence to Weak Solutions of Global Schemes. |
J. Sci. Comput. |
2003 |
DBLP DOI BibTeX RDF |
weak solutions, convergence, Conservation laws, conservation |
30 | Sakaé Fuchino, Stefan Geschke, Lajos Soukup |
On the weak Freese-Nation property of ?(omega). |
Arch. Math. Log. |
2001 |
DBLP DOI BibTeX RDF |
Weak Freese-Nation property, Cohen models, Cicho?'s diagram, Superatomic Boolean algebras |
30 | Albert Atserias |
Improved Bounds on the Weak Pigeonhole Principle and Infinitely Many Primes from Weaker Axioms. |
MFCS |
2001 |
DBLP DOI BibTeX RDF |
Weak Pigeonhole Principle, Proof Complexity, Bounded Arithmetic |
30 | Haiko Müller, Jean-Xavier Rampon |
Partial Orders on Weak Orders Convex Subsets. |
Order |
2000 |
DBLP DOI BibTeX RDF |
visibility relation, partially ordered set, convex set, weak order |
30 | Jean Ponce, Yakup Genc |
Epipolar Geometry and Linear Subspace Methods: A New Approach to Weak Calibration. |
Int. J. Comput. Vis. |
1998 |
DBLP DOI BibTeX RDF |
weak calibration, projective geometry, subspace methods |
30 | Zine-El-Abidine Benaissa, Pierre Lescanne, Kristoffer Høgsbro Rose |
Modeling Sharing and Recursion for Weak Reduction Strategies Using Explicit Substitution. |
PLILP |
1996 |
DBLP DOI BibTeX RDF |
Implementation of functional programming, weak reduction, space leaks, recursion, sharing, lambda calculus, explicit substitution |
30 | Jean Ponce, Yakup Genc |
Epipolar Geometry and Linear Subspace Methods: A New Approach to Weak Calibration. |
CVPR |
1996 |
DBLP DOI BibTeX RDF |
Weak calibration, epipolar geometry, projective geometry |
30 | Stefano Soatto, Pietro Perona |
Dynamic Rigid Motion Estimation from Weak Perspective. |
ICCV |
1995 |
DBLP DOI BibTeX RDF |
dynamic rigid motion estimation, simplified projection model, depth relief, rigid 3D motion, dynamic visual motion estimation, global observability, structure independent motion estimator, time evolution, measurement constraint, six dimensional state space, approximate estimator, reduced filter, synthetic image sequences, imaging process, computational geometry, motion estimation, image sequences, occlusions, dynamic models, state space, motion parameters, weak perspective, real image sequences, bas relief ambiguity |
30 | Vijay K. Garg, Brian Waldecker |
Detection of Weak Unstable Predicates in Distributed Programs. |
IEEE Trans. Parallel Distributed Syst. |
1994 |
DBLP DOI BibTeX RDF |
programtesting, weak unstable predicates, weakconjunctive predicates, distributed debugger, testing, distributed algorithms, debugging, Unix, UNIX, communication complexity, distributed programs, distributed memory systems, program debugging, message complexity, Sun workstations, global predicates |
30 | Jürg Wullschleger |
Oblivious-Transfer Amplification. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
oblivious-transfer amplification, universal oblivious transfer, weak oblivious transfer, computational weak oblivious transfer, distributed leftover hash lemma, hard-core lemma |
27 | Haina Zhang, Lin Li, Xiaoyun Wang 0001 |
Fast correlation attack on stream cipher ABC v3. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
ABC v3, cryptanalysis, stream cipher, fast correlation attack |
27 | Luciano Caroprese, Ester Zumpano |
Modeling Cooperation in P2P Data Management Systems. |
ISMIS |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Junsong Yuan, Jiebo Luo, Ying Wu 0001 |
Mining compositional features for boosting. |
CVPR |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Hongjun Wu 0001, Bart Preneel |
Cryptanalysis of the Stream Cipher ABC v2. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
key-dependent S-box, ABC v2, stream cipher, Fast correlation attack |
27 | Vincent Conitzer, Tuomas Sandholm |
Complexity of (iterated) dominance. |
EC |
2005 |
DBLP DOI BibTeX RDF |
(iterated) dominance, game theory |
27 | Léonard Kwuida |
When Is a Concept Algebra Boolean? |
ICFCA |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Evaggelia Pitoura, Bharat K. Bhargava |
Data Consistency in Intermittently Connected Distributed Systems. |
IEEE Trans. Knowl. Data Eng. |
1999 |
DBLP DOI BibTeX RDF |
Mobile computing, adaptability, concurrency control, replication, consistency, disconnected operation, transaction management |
27 | Qizhong Liu, Wanqing Song |
Detection Weak Period Signal Using Chaotic Oscillator. |
ICCSA (1) |
2009 |
DBLP DOI BibTeX RDF |
Duffing-Homles system, the law of the golden section, Threshold for chaos, Lyapunov exponents |
27 | Srikanth Sastry, Scott M. Pike, Jennifer L. Welch |
The weakest failure detector for wait-free dining under eventual weak exclusion. |
SPAA |
2009 |
DBLP DOI BibTeX RDF |
mutual exclusion, failure detectors, wait-freedom, partial synchrony, dining philosophers |
27 | Tamkeen M. Bhatti, F. A. Bhatti |
Charged based MOS transistor modeling in weak inversion. |
EIT |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Ueli M. Maurer, Stefano Tessaro |
Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Min Chen, Niaoqing Hu, Guojun Qin, Y. M. Yang |
A Study on Additional-signal-enhanced Stochastic Resonance in Detecting Weak Signals. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Boting Yang, Yi Cao |
On the Monotonicity of Weak Searching. |
COCOON |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Lida Torkzadeh, Mohammad Mehdi Zahedi, M. Abbasi |
(Weak) Dual hyper K -ideals. |
Soft Comput. |
2007 |
DBLP DOI BibTeX RDF |
Hyper K-algebra, Dual hyper K-ideal |
27 | Yoshie Soutome Sagata, Masahiro Watanabe, Yoko Asano |
VoiceBlog for Blind and Weak-Eyed People. |
HCI (7) |
2007 |
DBLP DOI BibTeX RDF |
blog reading browser, cascading user interface, blog, Universal design, hierarchic structure, blind people |
27 | Xinxin Liu, Haiyan Chen |
Deciding Weak Bisimilarity of Normed Context-Free Processes Using Tableau. |
ICTAC |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Andrew M. Childs, Aram W. Harrow, Pawel Wocjan |
Weak Fourier-Schur Sampling, the Hidden Subgroup Problem, and the Quantum Collision Problem. |
STACS |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 11949 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|