


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 107 matches
- 2015
- Eun Jung Kim, Christophe Paul
, Geevarghese Philip:
A single-exponential FPT algorithm for the K4-minor cover problem. J. Comput. Syst. Sci. 81(1): 186-207 (2015) - Mohamed Amine Abid, Abdelfettah Belghith
, Khalil Drira:
SARP: A dynamically readjustable period size proactive routing protocol for MANETs. J. Comput. Syst. Sci. 81(3): 496-515 (2015) - Goodhead Tomvie Abraham, Anne E. James
, Norlaily Yaacob
:
Priority-grouping method for parallel multi-scheduling in Grid. J. Comput. Syst. Sci. 81(6): 943-957 (2015) - Samson Abramsky
, Jonathan A. Zvesper:
From Lawvere to Brandenburger-Keisler: Interactive forms of diagonalization and self-reference. J. Comput. Syst. Sci. 81(5): 799-812 (2015) - Jirí Adámek, Stefan Milius, Lawrence S. Moss, Henning Urbat:
On finitary functors and their presentations. J. Comput. Syst. Sci. 81(5): 813-833 (2015) - Hussain Al-Aqrabi
, Lu Liu
, Richard Hill
, Nick Antonopoulos:
Cloud BI: Future of business intelligence in the Cloud. J. Comput. Syst. Sci. 81(1): 85-96 (2015) - Ahmad A. Al-Daraiseh
, Eyas El-Qawasmeh, Nazaraf Shah
:
Multi-agent system for energy consumption optimisation in higher education institutions. J. Comput. Syst. Sci. 81(6): 958-965 (2015) - Susanne Albers, Antonios Antoniadis, Gero Greiner:
On multi-processor speed scaling with migration. J. Comput. Syst. Sci. 81(7): 1194-1209 (2015) - Tayseer Alkhdour
, Elhadi M. Shakshuki
, Uthman A. Baroudi
, Shokri Z. Selim
:
A cross layer optimization modeling for a periodic WSN application. J. Comput. Syst. Sci. 81(3): 516-532 (2015) - Javier Ignacio Almarza, Santiago Figueira:
Normality in non-integer bases and polynomial time randomness. J. Comput. Syst. Sci. 81(7): 1059-1087 (2015) - Noga Alon, Hagit Attiya
, Shlomi Dolev
, Swan Dubois
, Maria Potop-Butucaru, Sébastien Tixeuil:
Practically stabilizing SWMR atomic memory in message-passing systems. J. Comput. Syst. Sci. 81(4): 692-701 (2015) - John Augustine, Gopal Pandurangan
, Peter Robinson, Eli Upfal
:
Distributed agreement in dynamic peer-to-peer networks. J. Comput. Syst. Sci. 81(7): 1088-1109 (2015) - Giorgio Bacci
, Marino Miculan
:
Structural operational semantics for continuous state stochastic transition systems. J. Comput. Syst. Sci. 81(5): 834-858 (2015) - Christer Bäckström, Peter Jonsson, Sebastian Ordyniak
, Stefan Szeider
:
A complete parameterized complexity analysis of bounded planning. J. Comput. Syst. Sci. 81(7): 1311-1332 (2015) - Christel Baier
, Marcus Daum, Benjamin Engel, Hermann Härtig, Joachim Klein
, Sascha Klüppelholz
, Steffen Märcker, Hendrik Tews, Marcus Völp
:
Locks: Picking key methods for a scalable quantitative analysis. J. Comput. Syst. Sci. 81(1): 258-287 (2015) - Evangelos Bampas
, Davide Bilò
, Guido Drovandi
, Luciano Gualà
, Ralf Klasing, Guido Proietti
:
Network verification via routing table queries. J. Comput. Syst. Sci. 81(1): 234-248 (2015) - George Barmpalias
, Rodney G. Downey, Michael McInerney:
Integer valued betting strategies and Turing degrees. J. Comput. Syst. Sci. 81(7): 1387-1412 (2015) - Admir Barolli, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Vincenzo Loia:
Node placement for wireless mesh networks: Analysis of WMN-GA system simulation results for different parameters and distributions. J. Comput. Syst. Sci. 81(8): 1496-1507 (2015) - Verónica Becher
, Olivier Carton, Pablo Ariel Heiber:
Normality and automata. J. Comput. Syst. Sci. 81(8): 1592-1613 (2015) - Radim Belohlávek, Martin Trnecka
:
From-below approximations in Boolean matrix factorization: Geometry and new algorithm. J. Comput. Syst. Sci. 81(8): 1678-1697 (2015) - Petra Berenbrink, Colin Cooper, Tom Friedetzky
, Tobias Friedrich, Thomas Sauerwald:
Randomized diffusion for indivisible loads. J. Comput. Syst. Sci. 81(1): 159-185 (2015) - Laurent Bienvenu, Rodney G. Downey, André Nies
, Wolfgang Merkle
:
Solovay functions and their applications in algorithmic randomness. J. Comput. Syst. Sci. 81(8): 1575-1591 (2015) - Simone Bova, Hubie Chen:
The complexity of equivalence, entailment, and minimization in existential positive logic. J. Comput. Syst. Sci. 81(2): 443-457 (2015) - Laurent Boyer, Martin Delacourt, Victor Poupet, Mathieu Sablik, Guillaume Theyssier:
μ-Limit sets of cellular automata from a computational complexity perspective. J. Comput. Syst. Sci. 81(8): 1623-1647 (2015) - Tomás Brázdil, Stefan Kiefer, Antonín Kucera
, Ivana Hutarová Vareková:
Runtime analysis of probabilistic programs with unbounded recursion. J. Comput. Syst. Sci. 81(1): 288-310 (2015) - Robert Bredereck, Jiehua Chen, Sepp Hartung, Christian Komusiewicz, Rolf Niedermeier, Ondrej Suchý
:
On explaining integer vectors by few homogeneous segments. J. Comput. Syst. Sci. 81(4): 766-782 (2015) - Marcelo Luiz Brocardo, Issa Traoré, Isaac Woungang:
Authorship verification of e-mail and tweet messages applied for continuous authentication. J. Comput. Syst. Sci. 81(8): 1429-1440 (2015) - Waleed Bul'ajoul, Anne E. James
, Mandeep Pannu:
Improving network intrusion detection system performance through quality of service configuration and parallel technology. J. Comput. Syst. Sci. 81(6): 981-999 (2015) - Laurent Bulteau
, Guillaume Fertin
, Irena Rusu:
Pancake Flipping is hard. J. Comput. Syst. Sci. 81(8): 1556-1574 (2015) - Fran Casino
, Josep Domingo-Ferrer
, Constantinos Patsakis
, Domenec Puig, Agusti Solanas
:
A k-anonymous approach to privacy preserving collaborative filtering. J. Comput. Syst. Sci. 81(6): 1000-1011 (2015)
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-06-20 05:29 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
