Fakultät für Informatik
-
Technische Universität München
Lehrstuhl für Effiziente Algorithmen
Die bibliographische Datenbank LEABib
Suchen
•
Liste der Journale
•
Liste der Serien
•
Liste der Konferenzen
•
Ausgewählte Publikationen
Hilfe
Suche: Journal=Theor.~Comput.~Sci. AND Volume=283
Als [
bib
] [
pdf
] [
ps
] [
dvi
] [
xml
] herunterladen.
Topological adjacency relations on
Z^n
T.Y. Kong
Theoretical Computer Science
283
(1), 2002, pp. 3-28
Weak lighting functions and strong 26-surfaces
R. Ayala
,
E. Domínguez
,
A.R. Francés
,
A. Quintero
Theoretical Computer Science
283
(1), 2002, pp. 29-66
On the computational complexity of reachability in 2D binary images and some basic problems of 2D digital topology
Rémy Malgouyres
,
Malika More
Theoretical Computer Science
283
(1), 2002, pp. 67-108
Intersection number and topology preservation within digital surfaces
Sébastien Fourey
,
Rémy Malgouyres
Theoretical Computer Science
283
(1), 2002, pp. 109-150
Graceful planes and lines
Valentin E. Brimkov
,
Reneta P. Barneva
Theoretical Computer Science
283
(1), 2002, pp. 151-170
Periodic graphs and connectivity of the rational digital hyperplanes
Yan Gérard
Theoretical Computer Science
283
(1), 2002, pp. 171-182
About local configurations in arithmetic planes
Marie-Andrée Jacob-Da Col
Theoretical Computer Science
283
(1), 2002, pp. 183-201
Rounding Voronoi diagram
Olivier Devillers
,
Pierre-Marie Gandoin
Theoretical Computer Science
283
(1), 2002, pp. 203-221
Reconstruction of convex 2D discrete sets in polynomial time
Attila Kuba
,
Emese Balogh
Theoretical Computer Science
283
(1), 2002, pp. 223-242
Topological properties of Hausdorff discretization, and comparison to other discretization schemes
Mohamed Tajine
,
Christian Ronse
Theoretical Computer Science
283
(1), 2002, pp. 243-268
Primitives for authentication in process algebras
Chiara Bodei
,
Pierpaolo Degano
,
Riccardo Focardi
,
Corrado Priami
Theoretical Computer Science
283
(2), 2002, pp. 271-304
Correctness of Java Card method lookup via logical relations
Ewen Denney
,
Thomas Jensen
Theoretical Computer Science
283
(2), 2002, pp. 305-331
Authentication tests and the structure of bundles
Joshua D. Guttman
,
F. Javier Thayer
Theoretical Computer Science
283
(2), 2002, pp. 333-380
Validating firewalls using flow logics
Flemming Nielson
,
Hanne Riis Nielson
,
René Rydhof Hansen
Theoretical Computer Science
283
(2), 2002, pp. 381-418
Finite-state analysis of two constract signing protocols
Vitaly Shmatikov
,
John C. Mitchell
Theoretical Computer Science
283
(2), 2002, pp. 419-450