Fakultät für Informatik
-
Technische Universität München
Lehrstuhl für Effiziente Algorithmen
Die bibliographische Datenbank LEABib
Suchen
•
Liste der Journale
•
Liste der Serien
•
Liste der Konferenzen
•
Ausgewählte Publikationen
Hilfe
Suche: Journal=J. Comput.~Syst.~Sci. AND YEAR=2014
Als [
bib
] [
pdf
] [
ps
] [
dvi
] [
xml
] herunterladen.
Belief revision within fragments of propositional logic
Nadia Creignou
,
Odile Papini
,
Reinhard Pichler
,
Stefan Woltran
Journal of Computer and System Sciences
80
(2), 2014, pp. 427-449
Deciding unique decodability of bigram counts via finite automata
Aryeh Kontorovich
,
Ari Trachtenberg
Journal of Computer and System Sciences
80
(2), 2014, pp. 450-456
On the role of complementation in implicit language equations and relations
Adrian Ionescu
,
Ernst L. Leiss
Journal of Computer and System Sciences
80
(2), 2014, pp. 457-467
Preprocessing subgraph and minor problems: When does a small vertex cover help?
Fedor V. Fomin
,
Bart M.P. Jansen
,
Michaƚ Pilipczuk
Journal of Computer and System Sciences
80
(2), 2014, pp. 468-495
Corrigendum to ``Uniform constant-depth threshold circuits for division and iterated multiplication''
William Hesse
,
Eric Allender
,
David A. Mix Barrington
Journal of Computer and System Sciences
80
(2), 2014, pp. 496-497
Estimating the number of hosts corresponding to an intrusion alert while preserving privacy
Alif Wahid
,
Christopher Leckie
,
Chenfeng Zhou
Journal of Computer and System Sciences
80
(3), 2014, pp. 502-519
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks
Yifan Zhao
,
Swee-Won Lo
,
Robert H. Deng
,
Xuhua Ding
Journal of Computer and System Sciences
80
(3), 2014, pp. 520-532
Broadcast encryption based non-interactive key distribution in MANETs
Yang Yang
Journal of Computer and System Sciences
80
(3), 2014, pp. 533-545
A new definition of homomorphic signature for identity management in mobile cloud computing
Zhiwei Wang
,
Guozi Sun
,
Danwei Chen
Journal of Computer and System Sciences
80
(3), 2014, pp. 546-553
Algorithms for a distributed IDS in MANETs
P.M. Mafra
,
J.S. Fraga
,
A.O. Santin
Journal of Computer and System Sciences
80
(3), 2014, pp. 554-570
Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems
Manuel Gil Pérez
,
Félix Gómez Mármol
,
Gregorio Martínez Pérez
,
Antonio F. Skarmeta Gómez
Journal of Computer and System Sciences
80
(3), 2014, pp. 571-590
Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
Saeed Ur Rehman
,
Kevin W. Sowerby
,
Colin Coghill
Journal of Computer and System Sciences
80
(3), 2014, pp. 591-601
Management and applications of trust in Wireless Sensor Networks: A survey
Guangjie Han
,
Jinfang Jiang
,
Lei Shu
,
Jianwei Niu
,
Han-Chieh Chao
Journal of Computer and System Sciences
80
(3), 2014, pp. 602-617
LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks
Thanassis Giannetsos
,
Tassos Dimitriou
Journal of Computer and System Sciences
80
(3), 2014, pp. 618-643
Detection and mitigation of sinkhole attacks in wireless sensor networks
H. Shafiei
,
A. Khonsari
,
H. Derakhshi
,
P. Mousavi
Journal of Computer and System Sciences
80
(3), 2014, pp. 644-653
Clone wars: Distributed detection of clone attacks in mobile WSNs
M. Conti
,
R. Di Pietro
,
A. Spognardi
Journal of Computer and System Sciences
80
(3), 2014, pp. 654-669
Betweenness estimation in OLSR-based multi-hop networks for distributed filtering
Leonardo Maccari
,
Renato Lo Cigno
Journal of Computer and System Sciences
80
(3), 2014, pp. 670-685
Satisfying more than half of a system of linear equations over GF(2): A multivariate approach
R. Crowston
,
M. Fellows
,
G. Gutin
,
M. Jones
,
E.J. Kim
,
F. Rosamond
,
I.Z. Ruzsa
,
S. Thomassé
,
A. Yeo
Journal of Computer and System Sciences
80
(4), 2014, pp. 687-696
The complexity of online manipulation of sequential elections
Edith Hemaspaandra
,
Lane A. Hemaspaandra
,
Jörg Rothe
Journal of Computer and System Sciences
80
(4), 2014, pp. 697-710
On the structure of bispecial Sturmian words
Gabriele Fici
Journal of Computer and System Sciences
80
(4), 2014, pp. 711-719
Bisimulation equivalence and regularity for real-time one-counter automata
Stanislav Böhm
,
Stefan Göller
,
Petr Janc̑ar
Journal of Computer and System Sciences
80
(4), 2014, pp. 720-743
Infinite vs. finite size-bounded randomized computations
Richard Královic̑
Journal of Computer and System Sciences
80
(4), 2014, pp. 744-765
Unshuffling a square is NP-hard
Sam Buss
,
Michael Soltys
Journal of Computer and System Sciences
80
(4), 2014, pp. 766-776
Robust learning of automatic classes of languages
Sanjay Jain
,
Eric Martin
,
Frank Stephan
Journal of Computer and System Sciences
80
(4), 2014, pp. 777-795
Finding the smallest binarization of a CFG is NP-hard
Carlos Gómez-Rodríguez
Journal of Computer and System Sciences
80
(4), 2014, pp. 796-805
Seiten
<
1
2
3
4
>