History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 77 total

Harnessing aspect-oriented programming on GPU: application to warp-level parallelism. (English)
IJCAETIJCAET 7, N0. 2, 158-175(2015)
WorldCat.org
1
Towards an Isomorphism Dichotomy for Hereditary Graph Classes. (English)
STACS, 689-702(2015)
WorldCat.org
2
Computing with Tangles. (English)
STOC, 683-692(2015)
WorldCat.org
3
A Linear-Time Algorithm for Testing Outer-1-Planarity. (English)
AlgorithmicaAlgorithmica 72, N0. 4, 1033-1054(2015)
WorldCat.org
4
DAG-based attack and defense modeling: don’t miss the forest for the attack trees. (English)
Comput. Sci. Rev. 13-14, 1-38 (2014).
WorldCat.org
5
Reduction techniques for graph isomorphism in the context of width parameters. (English)
Ravi, R. (ed.) et al., Algorithm theory ‒ SWAT 2014. 14th Scandinavian symposium and workshops, Copenhagen, Denmark, July 2‒4, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08403-9/pbk). Lecture Notes in Computer Science 8503, 368-379 (2014).
WorldCat.org
6
Switching reconstruction of digraphs. (English)
J. Graph Theory 76, No. 4, 279-296 (2014).
WorldCat.org
7
Competition numbers, quasi-line graphs, and holes. (English)
SIAM J. Discrete Math. 28, No. 1, 77-91 (2014).
WorldCat.org
8
Attack-defense trees. (English)
J. Log. Comput. 24, No. 1, 55-87 (2014).
WorldCat.org
9
Inputs of aspect oriented programming for the profiling of C++ parallel applications on manycore platforms. (English)
HPCS, 793-802(2014)
WorldCat.org
10
A Probabilistic Framework for Security Scenarios with Dependent Actions. (English)
IFM, 256-271(2014)
WorldCat.org
12
Adtool: Security analysis with attack-defense trees. (English)
Joshi, Kaustubh (ed.) et al., Quantitative evaluation of systems. 10th international conference, QEST 2013, Buenos Aires, Argentina, August 27‒30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40195-4/pbk). Lecture Notes in Computer Science 8054, 173-176 (2013).
WorldCat.org
13
Iterated open neighborhood graphs and generalizations. (English)
Discrete Appl. Math. 161, No. 10-11, 1598-1609 (2013).
WorldCat.org
14
Paging and list update under bijective analysis. (English)
J. ACM 60, No. 2, Paper No. 1, 18 p. (2013).
WorldCat.org
15
On zero divisors with small support in group rings of torsion-free groups. (English)
J. Group Theory 16, No. 5, 667-693 (2013).
WorldCat.org
16
Isomorphism on subgraph-closed graph classes: a complexity dichotomy and intermediate graph classes. (English)
Cai, Leizhen (ed.) et al., Algorithms and computation. 24th international symposium, ISAAC 2013, Hong Kong, China, December 16‒18, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45029-7/pbk). Lecture Notes in Computer Science 8283, 111-118 (2013).
WorldCat.org
17
A linear time algorithm for testing maximal 1-planarity of graphs with a rotation system. (English)
Theor. Comput. Sci. 513, 65-76 (2013).
WorldCat.org
18
A linear-time algorithm for testing outer-1-planarity. (English)
Wismath, Stephen (ed.) et al., Graph drawing. 21st international symposium, GD 2013, Bordeaux, France, September 23‒25, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-319-03840-7/pbk). Lecture Notes in Computer Science 8242, 71-82 (2013).
WorldCat.org
19
A formal derivation of composite trust. (English)
Garcia-Alfaro, Joaquin (ed.) et al., Foundations and practice of security. 5th international symposium, FPS 2012, Montreal, QC, Canada, October 25‒26, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37118-9/pbk). Lecture Notes in Computer Science 7743, 132-148 (2013).
WorldCat.org
20
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 77 total

Valid XHTML 1.0 Transitional Valid CSS!