History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 | next | last

Result 1 to 20 of 88 total

Canonizing Graphs of Bounded Tree Width in Logspace. (English)
STACS, 32:1-32:14(2016)
WorldCat.org
1
Detecting Similar Programs via The Weisfeiler-Leman Graph Kernel. (English)
ICSR, 315-330(2016)
WorldCat.org
2
Graphs identified by logics with counting. (English)
Italiano, F. (ed.) et al., Mathematical foundations of computer science 2015. 40th international symposium, MFCS 2015, Milan, Italy, August 24‒28, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48056-4/pbk; 978-3-662-48057-1/ebook). Lecture Notes in Computer Science 9234, 319-330 (2015).
WorldCat.org
3
A linear-time algorithm for testing outer-1-planarity. (English)
Algorithmica 72, No. 4, 1033-1054 (2015).
WorldCat.org
4
Computing with tangles. (English)
Proceedings of the 47th annual ACM symposium on theory of computing, STOC ’15, Portland, OR, USA, June 14‒17, 2015. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-3536-2). 683-692 (2015).
WorldCat.org
5
Performance analysis with a memory-bound Monte Carlo simulation on Xeon Phi. (English)
HPCS, 444-452(2015)
WorldCat.org
6
Harnessing aspect-oriented programming on GPU: application to warp-level parallelism. (English)
IJCAET 7, N0. 2, 158-175(2015)
WorldCat.org
7
Isomorphism Testing for Graphs of Bounded Rank Width. (English)
FOCS, 1010-1029(2015)
WorldCat.org
8
Towards an Isomorphism Dichotomy for Hereditary Graph Classes. (English)
STACS, 689-702(2015)
WorldCat.org
9
A probabilistic framework for security scenarios with dependent actions. (English)
Albert, Elvira (ed.) et al., Integrated formal methods. 11th international conference, IFM 2014, Bertinoro, Italy, September 9‒11, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-10180-4/pbk; 978-3-319-10181-1/ebook). Lecture Notes in Computer Science 8739, 256-271 (2014).
WorldCat.org
10
Depth-first search using $O(n)$ bits. (English)
Ahn, Hee-Kap (ed.) et al., Algorithms and computation. 25th international symposium, ISAAC 2014, Jeonju, Korea, December 15‒17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13074-3/pbk; 978-3-319-13075-0/ebook). Lecture Notes in Computer Science 8889, 553-564 (2014).
WorldCat.org
11
DAG-based attack and defense modeling: don’t miss the forest for the attack trees. (English)
Comput. Sci. Rev. 13-14, 1-38 (2014).
WorldCat.org
12
Reduction techniques for graph isomorphism in the context of width parameters. (English)
Ravi, R. (ed.) et al., Algorithm theory ‒ SWAT 2014. 14th Scandinavian symposium and workshops, Copenhagen, Denmark, July 2‒4, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08403-9/pbk). Lecture Notes in Computer Science 8503, 368-379 (2014).
WorldCat.org
13
Switching reconstruction of digraphs. (English)
J. Graph Theory 76, No. 4, 279-296 (2014).
WorldCat.org
14
Competition numbers, quasi-line graphs, and holes. (English)
SIAM J. Discrete Math. 28, No. 1, 77-91 (2014).
WorldCat.org
15
Attack-defense trees. (English)
J. Log. Comput. 24, No. 1, 55-87 (2014).
WorldCat.org
16
Inputs of aspect oriented programming for the profiling of C++ parallel applications on manycore platforms. (English)
HPCS, 793-802(2014)
WorldCat.org
17
Adtool: Security analysis with attack-defense trees. (English)
Joshi, Kaustubh (ed.) et al., Quantitative evaluation of systems. 10th international conference, QEST 2013, Buenos Aires, Argentina, August 27‒30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40195-4/pbk). Lecture Notes in Computer Science 8054, 173-176 (2013).
WorldCat.org
18
Iterated open neighborhood graphs and generalizations. (English)
Discrete Appl. Math. 161, No. 10-11, 1598-1609 (2013).
WorldCat.org
19
Paging and list update under bijective analysis. (English)
J. ACM 60, No. 2, Article No. 7, 18 p. (2013).
WorldCat.org
20
first | previous | 1 21 41 61 81 | next | last

Result 1 to 20 of 88 total

Valid XHTML 1.0 Transitional Valid CSS!