default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 33 matches
- 1984
- Ronald V. Book:
Relativizations of complexity classes. SIGACT News 15(4): 61 (1984) - John Franco:
Duality, finite improvement and efficiently solved optimization problems. SIGACT News 15(4): 62 (1984) - Eitan M. Gurari, Ten-Hwang Lai:
Deadlock detection in communicating finite state machines. SIGACT News 15(4): 63-64 (1984) - S. Louis Hakimi, Oded Kariv:
Midwest theory of computation symposium: on a generalization of edge-coloring in graphs. SIGACT News 15(4): 60 (1984) - Barbara Simons:
The reentry Computer Science Program at U.C. Berkeley. SIGACT News 15(4): 36 (1984) - W. Richard Stark:
Combinatory automaton. SIGACT News 15(4): 37 (1984) - Jonathan S. Turner:
On the general graph embedding problem with applications to circuit layout. SIGACT News 15(4): 59 (1984) - Abstracts. SIGACT News 15(4): 48-56 (1984)
- 1983
- Manuel Blum:
Coin flipping by telephone a protocol for solving impossible problems. SIGACT News 15(1): 23-27 (1983) - Hamid R. Amirazizi, Martin E. Hellman:
Time-memory-processor tradeoffs. SIGACT News 15(1): 18-19 (1983) - Hamid R. Amirazizi, Ehud D. Karnin, Justin M. Reyneri:
Compact knapsacks are polynomially solvable. SIGACT News 15(1): 20-22 (1983) - Gilles Brassard:
An optimally secure relativized cryptosystem. SIGACT News 15(1): 28-33 (1983) - Cristian Calude:
On a class of independent problems related to Rice theorem. SIGACT News 15(2): 53-57 (1983) - D. John Cooke:
On non-hierachical systems of binary operators. SIGACT News 15(3): 36-44 (1983) - Stanley Coren:
The game of academe. SIGACT News 15(2): 58-62 (1983) - Shimon Even:
A protocol for signing contracts. SIGACT News 15(1): 34-39 (1983) - Leona F. Fass:
Learning context-free languages from their structured sentences. SIGACT News 15(3): 24-35 (1983) - Nicholas V. Findler, Robert F. Cromp:
An artificial intelligence technique to generate self-optimizing experimental designs. SIGACT News 15(2): 77 (1983) - Nicholas V. Findler, Ron Lo:
A note on the functional estimation of values of hidden variables: an extended module for expert systems. SIGACT News 15(2): 78 (1983) - Irène Guessarian:
Survey on classes of interpretations and some of their applications. SIGACT News 15(3): 45-71 (1983) - Irène Guessarian, Francesco Parisi-Presicce:
Iterative vs. regular factor algebras. SIGACT News 15(2): 32-44 (1983) - Martin E. Hellman, Ehud D. Karnin, Justin M. Reyneri:
On the necessity of cryptanalytic exhaustive search. SIGACT News 15(1): 40-44 (1983) - Ernst Henze:
The solution of a general equation for the public key system. SIGACT News 15(1): 45-49 (1983) - Tore Herlestam:
On the feasibility of computing discrete logarithms using Adleman's subexponential algorithm. SIGACT News 15(1): 50-55 (1983) - Ingemar Ingemarsson:
Are all injective knapsacks partly solvable after multiplication modulo q? SIGACT News 15(1): 56-60 (1983) - John P. Jordan:
A variant of a public key cryptosystem based on Goppa Codes. SIGACT News 15(1): 61-66 (1983) - Alistair Moffat:
The effect of paged memory upon algorithm performance: short note. SIGACT News 15(2): 45-52 (1983) - Don R. Morrison:
Subtractive encryptors: alternatives to the DES. SIGACT News 15(1): 67-77 (1983) - Dan R. Olsen, Norman I. Badler:
An expression model for graphical command languages. SIGACT News 15(2): 76 (1983) - Stephen Wiesner:
Conjugate coding. SIGACT News 15(1): 78-88 (1983)
skipping 3 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-11 15:57 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint