Search dblp for Publications

export results for "toc:db/journals/sigact/sigact15.bht:"

 download as .bib file

@article{DBLP:journals/sigact/Book84a,
  author       = {Ronald V. Book},
  title        = {Relativizations of complexity classes},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {4},
  pages        = {61},
  year         = {1984},
  url          = {https://doi.org/10.1145/1008939.1008945},
  doi          = {10.1145/1008939.1008945},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/Book84a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Franco84a,
  author       = {John Franco},
  title        = {Duality, finite improvement and efficiently solved optimization problems},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {4},
  pages        = {62},
  year         = {1984},
  url          = {https://doi.org/10.1145/1008939.1008946},
  doi          = {10.1145/1008939.1008946},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/Franco84a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/GurariL84a,
  author       = {Eitan M. Gurari and
                  Ten{-}Hwang Lai},
  title        = {Deadlock detection in communicating finite state machines},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {4},
  pages        = {63--64},
  year         = {1984},
  url          = {https://doi.org/10.1145/1008939.1008947},
  doi          = {10.1145/1008939.1008947},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/GurariL84a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/HakimiK84a,
  author       = {S. Louis Hakimi and
                  Oded Kariv},
  title        = {Midwest theory of computation symposium: on a generalization of edge-coloring
                  in graphs},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {4},
  pages        = {60},
  year         = {1984},
  url          = {https://doi.org/10.1145/1008939.1008944},
  doi          = {10.1145/1008939.1008944},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/HakimiK84a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Simons84a,
  author       = {Barbara Simons},
  title        = {The reentry Computer Science Program at {U.C.} Berkeley},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {4},
  pages        = {36},
  year         = {1984},
  url          = {https://doi.org/10.1145/1008939.1008940},
  doi          = {10.1145/1008939.1008940},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/Simons84a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Stark84a,
  author       = {W. Richard Stark},
  title        = {Combinatory automaton},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {4},
  pages        = {37},
  year         = {1984},
  url          = {https://doi.org/10.1145/1008939.1008941},
  doi          = {10.1145/1008939.1008941},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/Stark84a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Turner84a,
  author       = {Jonathan S. Turner},
  title        = {On the general graph embedding problem with applications to circuit
                  layout},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {4},
  pages        = {59},
  year         = {1984},
  url          = {https://doi.org/10.1145/1008939.1008943},
  doi          = {10.1145/1008939.1008943},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/Turner84a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/X84b,
  title        = {Abstracts},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {4},
  pages        = {48--56},
  year         = {1984},
  url          = {https://doi.org/10.1145/1008939.1008942},
  doi          = {10.1145/1008939.1008942},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/X84b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/000183,
  author       = {Manuel Blum},
  title        = {Coin flipping by telephone a protocol for solving impossible problems},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {1},
  pages        = {23--27},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008908.1008911},
  doi          = {10.1145/1008908.1008911},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/000183.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/AmiraziziH83,
  author       = {Hamid R. Amirazizi and
                  Martin E. Hellman},
  title        = {Time-memory-processor tradeoffs},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {1},
  pages        = {18--19},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008908.1008909},
  doi          = {10.1145/1008908.1008909},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/AmiraziziH83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/AmiraziziKR83,
  author       = {Hamid R. Amirazizi and
                  Ehud D. Karnin and
                  Justin M. Reyneri},
  title        = {Compact knapsacks are polynomially solvable},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {1},
  pages        = {20--22},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008908.1008910},
  doi          = {10.1145/1008908.1008910},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/AmiraziziKR83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Brassard83,
  author       = {Gilles Brassard},
  title        = {An optimally secure relativized cryptosystem},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {1},
  pages        = {28--33},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008908.1008912},
  doi          = {10.1145/1008908.1008912},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/Brassard83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Calude83,
  author       = {Cristian Calude},
  title        = {On a class of independent problems related to Rice theorem},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {2},
  pages        = {53--57},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008923.1008926},
  doi          = {10.1145/1008923.1008926},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/Calude83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Cooke83,
  author       = {D. John Cooke},
  title        = {On non-hierachical systems of binary operators},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {3},
  pages        = {36--44},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008933.1008935},
  doi          = {10.1145/1008933.1008935},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/Cooke83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Coren83,
  author       = {Stanley Coren},
  title        = {The game of academe},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {2},
  pages        = {58--62},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008923.1008927},
  doi          = {10.1145/1008923.1008927},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/Coren83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Even83,
  author       = {Shimon Even},
  title        = {A protocol for signing contracts},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {1},
  pages        = {34--39},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008908.1008913},
  doi          = {10.1145/1008908.1008913},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/Even83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Fass83,
  author       = {Leona F. Fass},
  title        = {Learning context-free languages from their structured sentences},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {3},
  pages        = {24--35},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008933.1008934},
  doi          = {10.1145/1008933.1008934},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/Fass83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/FindlerC83,
  author       = {Nicholas V. Findler and
                  Robert F. Cromp},
  title        = {An artificial intelligence technique to generate self-optimizing experimental
                  designs},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {2},
  pages        = {77},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008923.1008930},
  doi          = {10.1145/1008923.1008930},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/FindlerC83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/FindlerL83,
  author       = {Nicholas V. Findler and
                  Ron Lo},
  title        = {A note on the functional estimation of values of hidden variables:
                  an extended module for expert systems},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {2},
  pages        = {78},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008923.1008931},
  doi          = {10.1145/1008923.1008931},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/FindlerL83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Guessarian83,
  author       = {Ir{\`{e}}ne Guessarian},
  title        = {Survey on classes of interpretations and some of their applications},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {3},
  pages        = {45--71},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008933.1008936},
  doi          = {10.1145/1008933.1008936},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/Guessarian83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/GuessarianP83,
  author       = {Ir{\`{e}}ne Guessarian and
                  Francesco Parisi{-}Presicce},
  title        = {Iterative vs. regular factor algebras},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {2},
  pages        = {32--44},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008923.1008924},
  doi          = {10.1145/1008923.1008924},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/GuessarianP83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/HellmanKR83,
  author       = {Martin E. Hellman and
                  Ehud D. Karnin and
                  Justin M. Reyneri},
  title        = {On the necessity of cryptanalytic exhaustive search},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {1},
  pages        = {40--44},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008908.1008914},
  doi          = {10.1145/1008908.1008914},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/HellmanKR83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Henze83,
  author       = {Ernst Henze},
  title        = {The solution of a general equation for the public key system},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {1},
  pages        = {45--49},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008908.1008915},
  doi          = {10.1145/1008908.1008915},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/Henze83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Herlestam83,
  author       = {Tore Herlestam},
  title        = {On the feasibility of computing discrete logarithms using Adleman's
                  subexponential algorithm},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {1},
  pages        = {50--55},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008908.1008916},
  doi          = {10.1145/1008908.1008916},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/Herlestam83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Ingemarsson83,
  author       = {Ingemar Ingemarsson},
  title        = {Are all injective knapsacks partly solvable after multiplication modulo
                  q?},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {1},
  pages        = {56--60},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008908.1008917},
  doi          = {10.1145/1008908.1008917},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/Ingemarsson83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Jordan83,
  author       = {John P. Jordan},
  title        = {A variant of a public key cryptosystem based on Goppa Codes},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {1},
  pages        = {61--66},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008908.1008918},
  doi          = {10.1145/1008908.1008918},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/Jordan83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Moffat83,
  author       = {Alistair Moffat},
  title        = {The effect of paged memory upon algorithm performance: short note},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {2},
  pages        = {45--52},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008923.1008925},
  doi          = {10.1145/1008923.1008925},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/Moffat83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Morrison83,
  author       = {Don R. Morrison},
  title        = {Subtractive encryptors: alternatives to the {DES}},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {1},
  pages        = {67--77},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008908.1008919},
  doi          = {10.1145/1008908.1008919},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/Morrison83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/OlsenB83,
  author       = {Dan R. Olsen and
                  Norman I. Badler},
  title        = {An expression model for graphical command languages},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {2},
  pages        = {76},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008923.1008929},
  doi          = {10.1145/1008923.1008929},
  timestamp    = {Thu, 19 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/OlsenB83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Wiesner83,
  author       = {Stephen Wiesner},
  title        = {Conjugate coding},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {1},
  pages        = {78--88},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008908.1008920},
  doi          = {10.1145/1008908.1008920},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigact/Wiesner83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/X83,
  title        = {Abstracts computing research laboratory},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {1},
  pages        = {93--104},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008908.1008921},
  doi          = {10.1145/1008908.1008921},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/X83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/X83a,
  title        = {Abstracts},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {2},
  pages        = {63--74},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008923.1008928},
  doi          = {10.1145/1008923.1008928},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/X83a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/X83b,
  title        = {Abstracts and available technical reports},
  journal      = {{SIGACT} News},
  volume       = {15},
  number       = {3},
  pages        = {72--95},
  year         = {1983},
  url          = {https://doi.org/10.1145/1008933.1008937},
  doi          = {10.1145/1008933.1008937},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/X83b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}