History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 | next | last

Result 1 to 20 of 96 total

Computing with tangles. (English)
SIAM J. Discrete Math. 30, No. 2, 1213-1247 (2016).
WorldCat.org
1
Probabilistic reasoning with graphical security models. (English)
Inf. Sci. 342, 111-131(2016)
WorldCat.org
2
Canonizing Graphs of Bounded Tree Width in Logspace. (English)
STACS, 32:1-32:14(2016)
WorldCat.org
3
Detecting Similar Programs via The Weisfeiler-Leman Graph Kernel. (English)
ICSR, 315-330(2016)
WorldCat.org
4
Graphs identified by logics with counting. (English)
Italiano, F. (ed.) et al., Mathematical foundations of computer science 2015. 40th international symposium, MFCS 2015, Milan, Italy, August 24‒28, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48056-4/pbk; 978-3-662-48057-1/ebook). Lecture Notes in Computer Science 9234, 319-330 (2015).
WorldCat.org
5
A linear-time algorithm for testing outer-1-planarity. (English)
Algorithmica 72, No. 4, 1033-1054 (2015).
WorldCat.org
6
Computing with tangles. (English)
Proceedings of the 47th annual ACM symposium on theory of computing, STOC ’15, Portland, OR, USA, June 14‒17, 2015. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-3536-2). 683-692 (2015).
WorldCat.org
7
Performance analysis with a memory-bound Monte Carlo simulation on Xeon Phi. (English)
HPCS, 444-452(2015)
WorldCat.org
8
Harnessing aspect-oriented programming on GPU: application to warp-level parallelism. (English)
IJCAET 7, N0. 2, 158-175(2015)
WorldCat.org
9
Induced Minor Free Graphs: Isomorphism and Clique-width. (English)
WG, 299-311(2015)
WorldCat.org
10
Isomorphism Testing for Graphs of Bounded Rank Width. (English)
FOCS, 1010-1029(2015)
WorldCat.org
11
Towards an Isomorphism Dichotomy for Hereditary Graph Classes. (English)
STACS, 689-702(2015)
WorldCat.org
12
A probabilistic framework for security scenarios with dependent actions. (English)
Albert, Elvira (ed.) et al., Integrated formal methods. 11th international conference, IFM 2014, Bertinoro, Italy, September 9‒11, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-10180-4/pbk; 978-3-319-10181-1/ebook). Lecture Notes in Computer Science 8739, 256-271 (2014).
WorldCat.org
13
Depth-first search using $O(n)$ bits. (English)
Ahn, Hee-Kap (ed.) et al., Algorithms and computation. 25th international symposium, ISAAC 2014, Jeonju, Korea, December 15‒17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13074-3/pbk; 978-3-319-13075-0/ebook). Lecture Notes in Computer Science 8889, 553-564 (2014).
WorldCat.org
14
DAG-based attack and defense modeling: don’t miss the forest for the attack trees. (English)
Comput. Sci. Rev. 13-14, 1-38 (2014).
WorldCat.org
15
Reduction techniques for graph isomorphism in the context of width parameters. (English)
Ravi, R. (ed.) et al., Algorithm theory ‒ SWAT 2014. 14th Scandinavian symposium and workshops, Copenhagen, Denmark, July 2‒4, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08403-9/pbk). Lecture Notes in Computer Science 8503, 368-379 (2014).
WorldCat.org
16
Switching reconstruction of digraphs. (English)
J. Graph Theory 76, No. 4, 279-296 (2014).
WorldCat.org
17
Competition numbers, quasi-line graphs, and holes. (English)
SIAM J. Discrete Math. 28, No. 1, 77-91 (2014).
WorldCat.org
18
Attack-defense trees. (English)
J. Log. Comput. 24, No. 1, 55-87 (2014).
WorldCat.org
19
Inputs of aspect oriented programming for the profiling of C++ parallel applications on manycore platforms. (English)
HPCS, 793-802(2014)
WorldCat.org
20
first | previous | 1 21 41 61 81 | next | last

Result 1 to 20 of 96 total

Valid XHTML 1.0 Transitional Valid CSS!