The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Peter Schachte: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Amy Beth Corman, Scott Douglas, Peter Schachte, Vanessa Teague
    A Secure Event Agreement (SEA) protocol for peer-to-peer games. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:34-41 [Conf]
  2. Roberto Bagnara, Peter Schachte
    Factorizing Equivalent Variable Pairs in ROBDD-Based Implementations of Pos. [Citation Graph (0, 0)][DBLP]
    APPIA-GULP-PRODE, 1998, pp:227-240 [Conf]
  3. Amy Beth Corman, Peter Schachte, Vanessa Teague
    A Secure Group Agreement (SGA) Protocol for Peer-to-Peer Applications. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:24-29 [Conf]
  4. Roberto Bagnara, Peter Schachte
    Factorizing Equivalent Variable Pairs in ROBDD-Based Implementations of Pos. [Citation Graph (0, 0)][DBLP]
    AMAST, 1998, pp:471-485 [Conf]
  5. Michael Codish, Vitaly Lagoon, Peter Schachte, Peter J. Stuckey
    Size-Change Termination Analysis in k-Bits. [Citation Graph (0, 0)][DBLP]
    ESOP, 2006, pp:230-245 [Conf]
  6. Peter Schachte
    Global Variables in Logic Programming. [Citation Graph (0, 0)][DBLP]
    ICLP, 1997, pp:3-17 [Conf]
  7. Peter Schachte
    Sequence Quantification. [Citation Graph (0, 0)][DBLP]
    PADL, 2003, pp:128-144 [Conf]
  8. Tania Armstrong, Kim Marriott, Peter Schachte, Harald Søndergaard
    Boolean Functions for Dependency Analysis: Algebraic Properties and Efficient Representation. [Citation Graph (0, 0)][DBLP]
    SAS, 1994, pp:266-280 [Conf]
  9. Peter Schachte, Harald Søndergaard
    Closure Operators for ROBDDs. [Citation Graph (0, 0)][DBLP]
    VMCAI, 2006, pp:1-16 [Conf]
  10. Tania Armstrong, Kim Marriott, Peter Schachte, Harald Søndergaard
    Two Classes of Boolean Functions for Dependency Analysis. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 1998, v:31, n:1, pp:3-45 [Journal]
  11. Peter Schachte
    Precise Goal-Independent Abstract Interpretation of Constraint Logic Programs. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2001, v:42, n:, pp:- [Journal]
  12. Peter Schachte
    Precise goal-independent abstract interpretation of constraint logic programs. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2003, v:293, n:3, pp:557-577 [Journal]
  13. Peter Schachte, Harald Søndergaard
    Boolean Approximation Revisited. [Citation Graph (0, 0)][DBLP]
    SARA, 2007, pp:329-343 [Conf]

  14. QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks. [Citation Graph (, )][DBLP]


  15. ParaAJ: toward Reusable and Maintainable Aspect Oriented Programs. [Citation Graph (, )][DBLP]


  16. Suitability of Object and Aspect Oriented Languages for Software Maintenance. [Citation Graph (, )][DBLP]


  17. Boolean equation solving as graph traversal. [Citation Graph (, )][DBLP]


  18. Secure random number agreement for peer-to-peer applications. [Citation Graph (, )][DBLP]


  19. State Joining and Splitting for the Symbolic Execution of Binaries. [Citation Graph (, )][DBLP]


  20. Information loss in knowledge compilation: A comparison of Boolean envelopes. [Citation Graph (, )][DBLP]


  21. Binary Decision Diagrams for Affine Approximation [Citation Graph (, )][DBLP]


Search in 0.021secs, Finished in 0.023secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002