Search alternatives:
program computing » program comparing, programs compiling, problem computing
https functions » status functions, its functions, sets functions
functions weak » functions what, functions work, functions why
weak https » work https, weak heaps
1
Published 2008
Table of Contents: ... Model -- On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak...
View full text
Electronic eBook
2
Published 2007
Table of Contents: ... -- Computations in Modules over Commutative Domains -- Advances on the Continued Fractions Method Using Better...
View full text
Electronic eBook
3
Published 2014
Table of Contents: ... Software with Recursive Functions (Invited Contribution) -- Track A: Algorithms, Complexity, and Games Weak...
View full text
Electronic eBook
4
Published 2015
Table of Contents: ... Automata -- Analysis of Probabilistic Systems via Generating Functions and Padé Approximation...
View full text
Electronic eBook
5
Published 2010
Table of Contents: ... Computation Models -- The Ordinal of Skolem + Tetration Is ? 0 -- Proofs, Programs, Processes -- Ergodic-Type...
View full text
Electronic eBook
6
by Kluge, Werner., Kluge, Werner.
Published 2005
Table of Contents: ...Algorithms and Programs -- An Algorithmic Language -- The ?-Calculus -- The se(m)cd Machine...
View full text
Electronic eBook
7
Published 2010
Table of Contents: ... Computation -- Propositional Interpolation and Abstract Interpretation -- Functional Programming in Sublinear...
View full text
Electronic eBook
8
Published 2010
Table of Contents: ...: Efficient Verification via Secure Computation -- Session 3-Track A1. Data Structures -- Mergeable...
View full text
Electronic eBook
9
by Liu, G.R., Liu, G.R., Gu, Y.T.
Published 2005
Table of Contents: ...Fundamentals -- Overview of Meshfree Methods -- Meshfree Shape Function Construction -- Meshfree...
View full text
Electronic eBook
10
Published 2013
Table of Contents: ... -- This Java: An Extension of Java with Exact Types -- Semantics of Probabilistic Programs: A Weak Limit...
View full text
Electronic eBook
11
Published 2013
Table of Contents: ... Verification for Weak Memory via Program Transformation -- Checking and Enforcing Robustness against TSO...
View full text
Electronic eBook
12
Published 2010
Table of Contents: ... -- Nonlocal Quantum XOR Games for Large Number of Players -- Nontriviality for Exponential Time w.r.t. Weak...
View full text
Electronic eBook
13
Published 2005
Table of Contents: ... and Intensionality in a Type-1 Framework for Computable Analysis -- Computing with Sequences, Weak Topologies...
View full text
Electronic eBook
14
Published 2006
Table of Contents: ... Runs of Automata -- The Power of Linear Functions -- Logical Omniscience Via Proof Complexity...
View full text
Electronic eBook
15
Published 2010
Table of Contents: ... of Room at the Bottom: Analyzing and Verifying Machine Code -- Constraint Solving for Program Verification...
View full text
Electronic eBook
16
Published 2008
Table of Contents: ...Invited Lecture -- Back to the Complexity of Universal Programs -- Applications Track Long Papers...
View full text
Electronic eBook
17
Published 2005
Table of Contents: ... Problems with Accumulative Weight Functions -- Applied Logics and Computing Theory -- Toward an Abstract...
View full text
Electronic eBook
18
Published 2007
Table of Contents: ... Models -- Discovering Non-linear Ranking Functions by Solving Semi-algebraic Systems -- Mobile Ambients...
View full text
Electronic eBook
19
Published 2012
Table of Contents: ... Algorithms of Computational -- Geometry Blending Functions for Hermite Interpolation by Beta-Function B...
View full text
Electronic eBook
20
Published 2005
Table of Contents: ...Invited Papers -- Semiperfect-Information Games -- Computational Complexity Since 1980...
View full text
Electronic eBook