1
Published 2006
Table of Contents: ... Tight Bound for EMAC -- Constructing Single- and Multi-output Boolean Functions with Maximal Algebraic...
View full text
Electronic eBook
2
Published 2008
Table of Contents: ... -- Interacting Quantum Observables -- Perpetuality for Full and Safe Composition (in a Constructive Setting) -- A...
View full text
Electronic eBook
3
Published 2007
Table of Contents: ... Matching Problems -- Session A6 -- On the Complexity of Hard-Core Set Constructions -- Approximation by DNF...
View full text
Electronic eBook
4
Published 2006
Table of Contents: ... -- Constructing Camin-Sokal Phylogenies Via Answer Set Programming -- Automata for Positive Core XPath Queries...
View full text
Electronic eBook
5
Published 2005
Table of Contents: ... Programs -- Model Checking Abstract State Machines with Answer Set Programming -- Characterizing...
View full text
Electronic eBook
6
Published 2013
Table of Contents: ... Endpoints -- Estimating and Quantifying Uncertainties on Level Sets Using the Vorobev Expectation...
View full text
Electronic eBook
7
Published 2006
Table of Contents: ... from Constructive HOL Proofs Via IZF Set-Theoretic Semantics -- Towards Self-verification of HOL Light...
View full text
Electronic eBook
8
Published 2010
Table of Contents: ...: Efficient Constructions and Applications -- Estimating the Average of a Lipschitz-Continuous Function from...
View full text
Electronic eBook
9
Published 2006
Table of Contents: ... Closed Sets -- Deep Inference and Its Normal Form of Derivations -- Logspace Complexity of Functions...
View full text
Electronic eBook
10
Published 2012
Table of Contents: ....Paraconsistency -- 5. Quantified Intuitionist Logic -- 6. Quantified Logics of Constructible Negation -- 7...
View full text
Electronic eBook
11
Published 2007
Table of Contents: ... Constructive Homological Algebra in Type Theory -- What Might “Understand a Function” Mean? -- Biform Theories...
View full text
Electronic eBook
12
Published 2006
Table of Contents: ... and Systematic Construction of Two-Factor Authentication Scheme (Short Paper) -- Hierarchical Key Assignment...
View full text
Electronic eBook
13
Published 2014
Table of Contents: ... -- The Diagonal Reduction Algorithm Using Fast Givens -- Constructing Generalized Bent Functions from Trace Forms...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... Based on Particle Filter and Optical Flow -- Stitching of Microscopic Images for Quantifying Neuronal...
View full text
Electronic eBook
15
Published 2006
Table of Contents: ... -- Cryptographic Applications -- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? -- A Handy...
View full text
Electronic eBook
16
Published 2010
Table of Contents: ...-objective Programming Application for Time-Cost Trade-off of CPM in Project Management -- A Study on Two...
View full text
Electronic eBook