|
Journals in DBLP
- Yogish Sabharwal, Nishant Sharma, Sandeep Sen
Nearest neighbors search using point location in balls with applications to approximate Voronoi decompositions. [Citation Graph (0, 0)][DBLP] J. Comput. Syst. Sci., 2006, v:72, n:6, pp:955-977 [Journal]
- Mario Di Raimondo, Rosario Gennaro
Provably secure threshold password-authenticated key exchange. [Citation Graph (0, 0)][DBLP] J. Comput. Syst. Sci., 2006, v:72, n:6, pp:978-1001 [Journal]
- Hung-Min Sun, Her-Tyan Yeh
Password-based authentication and key distribution protocols with perfect forward secrecy. [Citation Graph (0, 0)][DBLP] J. Comput. Syst. Sci., 2006, v:72, n:6, pp:1002-1011 [Journal]
- Michal Parnas, Dana Ron, Ronitt Rubinfeld
Tolerant property testing and distance approximation. [Citation Graph (0, 0)][DBLP] J. Comput. Syst. Sci., 2006, v:72, n:6, pp:1012-1042 [Journal]
- Elmar Böhler, Christian Glaßer, Daniel Meister
Error-bounded probabilistic computations between MA and AM. [Citation Graph (0, 0)][DBLP] J. Comput. Syst. Sci., 2006, v:72, n:6, pp:1043-1076 [Journal]
- James Aspnes, Kevin L. Chang, Aleksandr Yampolskiy
Inoculation strategies for victims of viruses and the sum-of-squares partition problem. [Citation Graph (0, 0)][DBLP] J. Comput. Syst. Sci., 2006, v:72, n:6, pp:1077-1093 [Journal]
- Anand Srinivasan, James H. Anderson
Optimal rate-based scheduling on multiprocessors. [Citation Graph (0, 0)][DBLP] J. Comput. Syst. Sci., 2006, v:72, n:6, pp:1094-1117 [Journal]
|