|
Search the dblp DataBase
Peter Schachte:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Amy Beth Corman, Scott Douglas, Peter Schachte, Vanessa Teague
A Secure Event Agreement (SEA) protocol for peer-to-peer games. [Citation Graph (0, 0)][DBLP] ARES, 2006, pp:34-41 [Conf]
- Roberto Bagnara, Peter Schachte
Factorizing Equivalent Variable Pairs in ROBDD-Based Implementations of Pos. [Citation Graph (0, 0)][DBLP] APPIA-GULP-PRODE, 1998, pp:227-240 [Conf]
- Amy Beth Corman, Peter Schachte, Vanessa Teague
A Secure Group Agreement (SGA) Protocol for Peer-to-Peer Applications. [Citation Graph (0, 0)][DBLP] AINA Workshops (1), 2007, pp:24-29 [Conf]
- Roberto Bagnara, Peter Schachte
Factorizing Equivalent Variable Pairs in ROBDD-Based Implementations of Pos. [Citation Graph (0, 0)][DBLP] AMAST, 1998, pp:471-485 [Conf]
- Michael Codish, Vitaly Lagoon, Peter Schachte, Peter J. Stuckey
Size-Change Termination Analysis in k-Bits. [Citation Graph (0, 0)][DBLP] ESOP, 2006, pp:230-245 [Conf]
- Peter Schachte
Global Variables in Logic Programming. [Citation Graph (0, 0)][DBLP] ICLP, 1997, pp:3-17 [Conf]
- Peter Schachte
Sequence Quantification. [Citation Graph (0, 0)][DBLP] PADL, 2003, pp:128-144 [Conf]
- Tania Armstrong, Kim Marriott, Peter Schachte, Harald Søndergaard
Boolean Functions for Dependency Analysis: Algebraic Properties and Efficient Representation. [Citation Graph (0, 0)][DBLP] SAS, 1994, pp:266-280 [Conf]
- Peter Schachte, Harald Søndergaard
Closure Operators for ROBDDs. [Citation Graph (0, 0)][DBLP] VMCAI, 2006, pp:1-16 [Conf]
- Tania Armstrong, Kim Marriott, Peter Schachte, Harald Søndergaard
Two Classes of Boolean Functions for Dependency Analysis. [Citation Graph (0, 0)][DBLP] Sci. Comput. Program., 1998, v:31, n:1, pp:3-45 [Journal]
- Peter Schachte
Precise Goal-Independent Abstract Interpretation of Constraint Logic Programs. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2001, v:42, n:, pp:- [Journal]
- Peter Schachte
Precise goal-independent abstract interpretation of constraint logic programs. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2003, v:293, n:3, pp:557-577 [Journal]
- Peter Schachte, Harald Søndergaard
Boolean Approximation Revisited. [Citation Graph (0, 0)][DBLP] SARA, 2007, pp:329-343 [Conf]
QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks. [Citation Graph (, )][DBLP]
ParaAJ: toward Reusable and Maintainable Aspect Oriented Programs. [Citation Graph (, )][DBLP]
Suitability of Object and Aspect Oriented Languages for Software Maintenance. [Citation Graph (, )][DBLP]
Boolean equation solving as graph traversal. [Citation Graph (, )][DBLP]
Secure random number agreement for peer-to-peer applications. [Citation Graph (, )][DBLP]
State Joining and Splitting for the Symbolic Execution of Binaries. [Citation Graph (, )][DBLP]
Information loss in knowledge compilation: A comparison of Boolean envelopes. [Citation Graph (, )][DBLP]
Binary Decision Diagrams for Affine Approximation [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|