default search action
Search dblp for Publications
export results for "toc:db/journals/sigact/sigact15.bht:"
@article{DBLP:journals/sigact/Book84a, author = {Ronald V. Book}, title = {Relativizations of complexity classes}, journal = {{SIGACT} News}, volume = {15}, number = {4}, pages = {61}, year = {1984}, url = {https://doi.org/10.1145/1008939.1008945}, doi = {10.1145/1008939.1008945}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/Book84a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/Franco84a, author = {John Franco}, title = {Duality, finite improvement and efficiently solved optimization problems}, journal = {{SIGACT} News}, volume = {15}, number = {4}, pages = {62}, year = {1984}, url = {https://doi.org/10.1145/1008939.1008946}, doi = {10.1145/1008939.1008946}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/Franco84a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/GurariL84a, author = {Eitan M. Gurari and Ten{-}Hwang Lai}, title = {Deadlock detection in communicating finite state machines}, journal = {{SIGACT} News}, volume = {15}, number = {4}, pages = {63--64}, year = {1984}, url = {https://doi.org/10.1145/1008939.1008947}, doi = {10.1145/1008939.1008947}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/GurariL84a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/HakimiK84a, author = {S. Louis Hakimi and Oded Kariv}, title = {Midwest theory of computation symposium: on a generalization of edge-coloring in graphs}, journal = {{SIGACT} News}, volume = {15}, number = {4}, pages = {60}, year = {1984}, url = {https://doi.org/10.1145/1008939.1008944}, doi = {10.1145/1008939.1008944}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/HakimiK84a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/Simons84a, author = {Barbara Simons}, title = {The reentry Computer Science Program at {U.C.} Berkeley}, journal = {{SIGACT} News}, volume = {15}, number = {4}, pages = {36}, year = {1984}, url = {https://doi.org/10.1145/1008939.1008940}, doi = {10.1145/1008939.1008940}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/Simons84a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/Stark84a, author = {W. Richard Stark}, title = {Combinatory automaton}, journal = {{SIGACT} News}, volume = {15}, number = {4}, pages = {37}, year = {1984}, url = {https://doi.org/10.1145/1008939.1008941}, doi = {10.1145/1008939.1008941}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/Stark84a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/Turner84a, author = {Jonathan S. Turner}, title = {On the general graph embedding problem with applications to circuit layout}, journal = {{SIGACT} News}, volume = {15}, number = {4}, pages = {59}, year = {1984}, url = {https://doi.org/10.1145/1008939.1008943}, doi = {10.1145/1008939.1008943}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/Turner84a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/X84b, title = {Abstracts}, journal = {{SIGACT} News}, volume = {15}, number = {4}, pages = {48--56}, year = {1984}, url = {https://doi.org/10.1145/1008939.1008942}, doi = {10.1145/1008939.1008942}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/X84b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/000183, author = {Manuel Blum}, title = {Coin flipping by telephone a protocol for solving impossible problems}, journal = {{SIGACT} News}, volume = {15}, number = {1}, pages = {23--27}, year = {1983}, url = {https://doi.org/10.1145/1008908.1008911}, doi = {10.1145/1008908.1008911}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/000183.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/AmiraziziH83, author = {Hamid R. Amirazizi and Martin E. Hellman}, title = {Time-memory-processor tradeoffs}, journal = {{SIGACT} News}, volume = {15}, number = {1}, pages = {18--19}, year = {1983}, url = {https://doi.org/10.1145/1008908.1008909}, doi = {10.1145/1008908.1008909}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/AmiraziziH83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/AmiraziziKR83, author = {Hamid R. Amirazizi and Ehud D. Karnin and Justin M. Reyneri}, title = {Compact knapsacks are polynomially solvable}, journal = {{SIGACT} News}, volume = {15}, number = {1}, pages = {20--22}, year = {1983}, url = {https://doi.org/10.1145/1008908.1008910}, doi = {10.1145/1008908.1008910}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/AmiraziziKR83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/Brassard83, author = {Gilles Brassard}, title = {An optimally secure relativized cryptosystem}, journal = {{SIGACT} News}, volume = {15}, number = {1}, pages = {28--33}, year = {1983}, url = {https://doi.org/10.1145/1008908.1008912}, doi = {10.1145/1008908.1008912}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/Brassard83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/Calude83, author = {Cristian Calude}, title = {On a class of independent problems related to Rice theorem}, journal = {{SIGACT} News}, volume = {15}, number = {2}, pages = {53--57}, year = {1983}, url = {https://doi.org/10.1145/1008923.1008926}, doi = {10.1145/1008923.1008926}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/Calude83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/Cooke83, author = {D. John Cooke}, title = {On non-hierachical systems of binary operators}, journal = {{SIGACT} News}, volume = {15}, number = {3}, pages = {36--44}, year = {1983}, url = {https://doi.org/10.1145/1008933.1008935}, doi = {10.1145/1008933.1008935}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/Cooke83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/Coren83, author = {Stanley Coren}, title = {The game of academe}, journal = {{SIGACT} News}, volume = {15}, number = {2}, pages = {58--62}, year = {1983}, url = {https://doi.org/10.1145/1008923.1008927}, doi = {10.1145/1008923.1008927}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/Coren83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/Even83, author = {Shimon Even}, title = {A protocol for signing contracts}, journal = {{SIGACT} News}, volume = {15}, number = {1}, pages = {34--39}, year = {1983}, url = {https://doi.org/10.1145/1008908.1008913}, doi = {10.1145/1008908.1008913}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/Even83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/Fass83, author = {Leona F. Fass}, title = {Learning context-free languages from their structured sentences}, journal = {{SIGACT} News}, volume = {15}, number = {3}, pages = {24--35}, year = {1983}, url = {https://doi.org/10.1145/1008933.1008934}, doi = {10.1145/1008933.1008934}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/Fass83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/FindlerC83, author = {Nicholas V. Findler and Robert F. Cromp}, title = {An artificial intelligence technique to generate self-optimizing experimental designs}, journal = {{SIGACT} News}, volume = {15}, number = {2}, pages = {77}, year = {1983}, url = {https://doi.org/10.1145/1008923.1008930}, doi = {10.1145/1008923.1008930}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/FindlerC83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/FindlerL83, author = {Nicholas V. Findler and Ron Lo}, title = {A note on the functional estimation of values of hidden variables: an extended module for expert systems}, journal = {{SIGACT} News}, volume = {15}, number = {2}, pages = {78}, year = {1983}, url = {https://doi.org/10.1145/1008923.1008931}, doi = {10.1145/1008923.1008931}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/FindlerL83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/Guessarian83, author = {Ir{\`{e}}ne Guessarian}, title = {Survey on classes of interpretations and some of their applications}, journal = {{SIGACT} News}, volume = {15}, number = {3}, pages = {45--71}, year = {1983}, url = {https://doi.org/10.1145/1008933.1008936}, doi = {10.1145/1008933.1008936}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/Guessarian83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/GuessarianP83, author = {Ir{\`{e}}ne Guessarian and Francesco Parisi{-}Presicce}, title = {Iterative vs. regular factor algebras}, journal = {{SIGACT} News}, volume = {15}, number = {2}, pages = {32--44}, year = {1983}, url = {https://doi.org/10.1145/1008923.1008924}, doi = {10.1145/1008923.1008924}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/GuessarianP83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/HellmanKR83, author = {Martin E. Hellman and Ehud D. Karnin and Justin M. Reyneri}, title = {On the necessity of cryptanalytic exhaustive search}, journal = {{SIGACT} News}, volume = {15}, number = {1}, pages = {40--44}, year = {1983}, url = {https://doi.org/10.1145/1008908.1008914}, doi = {10.1145/1008908.1008914}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/HellmanKR83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/Henze83, author = {Ernst Henze}, title = {The solution of a general equation for the public key system}, journal = {{SIGACT} News}, volume = {15}, number = {1}, pages = {45--49}, year = {1983}, url = {https://doi.org/10.1145/1008908.1008915}, doi = {10.1145/1008908.1008915}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/Henze83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/Herlestam83, author = {Tore Herlestam}, title = {On the feasibility of computing discrete logarithms using Adleman's subexponential algorithm}, journal = {{SIGACT} News}, volume = {15}, number = {1}, pages = {50--55}, year = {1983}, url = {https://doi.org/10.1145/1008908.1008916}, doi = {10.1145/1008908.1008916}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/Herlestam83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/Ingemarsson83, author = {Ingemar Ingemarsson}, title = {Are all injective knapsacks partly solvable after multiplication modulo q?}, journal = {{SIGACT} News}, volume = {15}, number = {1}, pages = {56--60}, year = {1983}, url = {https://doi.org/10.1145/1008908.1008917}, doi = {10.1145/1008908.1008917}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/Ingemarsson83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/Jordan83, author = {John P. Jordan}, title = {A variant of a public key cryptosystem based on Goppa Codes}, journal = {{SIGACT} News}, volume = {15}, number = {1}, pages = {61--66}, year = {1983}, url = {https://doi.org/10.1145/1008908.1008918}, doi = {10.1145/1008908.1008918}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/Jordan83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/Moffat83, author = {Alistair Moffat}, title = {The effect of paged memory upon algorithm performance: short note}, journal = {{SIGACT} News}, volume = {15}, number = {2}, pages = {45--52}, year = {1983}, url = {https://doi.org/10.1145/1008923.1008925}, doi = {10.1145/1008923.1008925}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/Moffat83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/Morrison83, author = {Don R. Morrison}, title = {Subtractive encryptors: alternatives to the {DES}}, journal = {{SIGACT} News}, volume = {15}, number = {1}, pages = {67--77}, year = {1983}, url = {https://doi.org/10.1145/1008908.1008919}, doi = {10.1145/1008908.1008919}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/Morrison83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/OlsenB83, author = {Dan R. Olsen and Norman I. Badler}, title = {An expression model for graphical command languages}, journal = {{SIGACT} News}, volume = {15}, number = {2}, pages = {76}, year = {1983}, url = {https://doi.org/10.1145/1008923.1008929}, doi = {10.1145/1008923.1008929}, timestamp = {Thu, 19 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/OlsenB83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/Wiesner83, author = {Stephen Wiesner}, title = {Conjugate coding}, journal = {{SIGACT} News}, volume = {15}, number = {1}, pages = {78--88}, year = {1983}, url = {https://doi.org/10.1145/1008908.1008920}, doi = {10.1145/1008908.1008920}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigact/Wiesner83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/X83, title = {Abstracts computing research laboratory}, journal = {{SIGACT} News}, volume = {15}, number = {1}, pages = {93--104}, year = {1983}, url = {https://doi.org/10.1145/1008908.1008921}, doi = {10.1145/1008908.1008921}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/X83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/X83a, title = {Abstracts}, journal = {{SIGACT} News}, volume = {15}, number = {2}, pages = {63--74}, year = {1983}, url = {https://doi.org/10.1145/1008923.1008928}, doi = {10.1145/1008923.1008928}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/X83a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/X83b, title = {Abstracts and available technical reports}, journal = {{SIGACT} News}, volume = {15}, number = {3}, pages = {72--95}, year = {1983}, url = {https://doi.org/10.1145/1008933.1008937}, doi = {10.1145/1008933.1008937}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/X83b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.