The SCEAS System
Navigation Menu

Journals in DBLP

J. ACM
2004, volume: 51, number: 2

  1. Ran Raz
    Resolution lower bounds for the weak pigeonhole principle. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2004, v:51, n:2, pp:115-138 [Journal]
  2. Pankaj K. Agarwal, Eran Nevo, János Pach, Rom Pinchasi, Micha Sharir, Shakhar Smorodinsky
    Lenses in arrangements of pseudo-circles and their applications. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2004, v:51, n:2, pp:139-186 [Journal]
  3. Johan Håstad, Mats Näslund
    The security of all RSA and discrete log bits. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2004, v:51, n:2, pp:187-230 [Journal]
  4. Moni Naor, Omer Reingold
    Number-theoretic constructions of efficient pseudo-random functions. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2004, v:51, n:2, pp:231-262 [Journal]
  5. Jon M. Kleinberg, Christos H. Papadimitriou, Prabhakar Raghavan
    Segmentation problems. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2004, v:51, n:2, pp:263-280 [Journal]
  6. Albert Atserias
    On sufficient conditions for unsatisfiability of random formulas. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2004, v:51, n:2, pp:281-311 [Journal]
  7. Georg Gottlob, Phokion G. Kolaitis, Thomas Schwentick
    Existential second-order logic over graphs: Charting the tractability frontier. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2004, v:51, n:2, pp:312-362 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002