• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Theoretical Computer Science Journas Latest Articles

Theoretical Computer Science Research Articles

An introduction to periodical discrete sets from a tomographical perspective
Fulltext Access 23 Pages 2005
Provably Correct Code Generation: A Case Study
Fulltext Access 23 Pages 2005
The Polymorphic Rewriting-calculus
Fulltext Access 23 Pages 2005
Metareasoning about Security Protocols using Distributed Temporal Logic
Fulltext Access 23 Pages 2005
An Isomorph-Free SEM-Like Enumeration of Models
Fulltext Access 23 Pages 2005
Performance Evaluation of Security Protocols Specified in LySa
Fulltext Access 23 Pages 2005
A Proof Search Specification of the π-Calculus
Fulltext Access 23 Pages 2005
Transitivity in coercive subtyping
Fulltext Access 23 Pages 2005
Efficiently computing succinct trade-off curves
Fulltext Access 23 Pages 2005
A Tool for the Syntactic Detection of Zeno-timelocks in Timed Automata
Fulltext Access 23 Pages 2005
Fuzzy context-free languages-Part 2: Recognition and parsing algorithms
Fulltext Access 23 Pages 2005
Quantitative μ-calculus and CTL Based on Constraint Semirings
Fulltext Access 23 Pages 2005
A sufficient condition for non-uniqueness in binary tomography with absorption
Fulltext Access 23 Pages 2005
The dual of concatenation
Fulltext Access 23 Pages 2005
A mathematical model for the TCP Tragedy of the Commons
Fulltext Access 23 Pages 2005
Modelling the GSM Handover Protocol in CommUnity
Fulltext Access 23 Pages 2005
A survey on tree edit distance and related problems
Fulltext Access 23 Pages 2005
A logic for secure memory access of abstract state machines
Fulltext Access 23 Pages 2005
Quantum versus deterministic counter automata
Fulltext Access 23 Pages 2005
An extension of the Erdős-Ginzburg-Ziv Theorem to hypergraphs
Fulltext Access 23 Pages 2005
Three-player partizan games
Fulltext Access 23 Pages 2005
Weak bisimilarity and regularity of context-free processes is EXPTIME-hard
Fulltext Access 23 Pages 2005
Sieve methods in combinatorics
Fulltext Access 23 Pages 2005
The embedding in AG(3,q) of (0,2)-geometries with no planar nets
Fulltext Access 23 Pages 2005
Hamilton paths in toroidal graphs
Fulltext Access 23 Pages 2005
On reasoning about structural equality in XML: a description logic approach
Fulltext Access 23 Pages 2005
Extracting a data flow analyser in constructive logic
Fulltext Access 23 Pages 2005
More efficient on-the-fly LTL verification with Tarjan's algorithm
Fulltext Access 23 Pages 2005
Selecting evaluation functions in Opponent-Model search
Fulltext Access 23 Pages 2005
Merging Scenarios
Fulltext Access 23 Pages 2005
Protocol Performance Analysis Using a Timed Extension for an Object Oriented Petri Net Language
Fulltext Access 23 Pages 2005
The Topological Tverberg Theorem and winding numbers
Fulltext Access 23 Pages 2005
Early Verification of Computer Systems Temporal Properties
Fulltext Access 23 Pages 2005
Completions in measure of languages and related combinatorial problems
Fulltext Access 23 Pages 2005
On 0-1 matrices and small excluded submatrices
Fulltext Access 23 Pages 2005
Toward Reasoning about Security Protocols: A Semantic Approach
Fulltext Access 23 Pages 2005
Competing provers yield improved Karp-Lipton collapse results
Fulltext Access 23 Pages 2005
Algorithms for pattern matching and discovery in RNA secondary structure
Fulltext Access 23 Pages 2005
Some degree bounds for the circumference of graphs
Fulltext Access 24 Pages 2005
From hypertrees to arboreal quasi-ultrametrics
Fulltext Access 24 Pages 2005
Embeddings of k-connected graphs of pathwidth k
Fulltext Access 24 Pages 2005
A hypocoloring model for batch scheduling
Fulltext Access 24 Pages 2005
On-line construction of compact directed acyclic word graphs
Fulltext Access 24 Pages 2005
The Design of Monty: a Programming/Scripting Language
Fulltext Access 24 Pages 2005
Decidable containment of recursive queries
Fulltext Access 24 Pages 2005
Relating SPO and DPO graph rewriting with Petri nets having read, inhibitor and reset arcs
Fulltext Access 24 Pages 2005
New operations and regular expressions for two-dimensional languages over one-letter alphabet
Fulltext Access 24 Pages 2005
A functional correspondence between monadic evaluators and abstract machines for languages with computational effects
Fulltext Access 24 Pages 2005
Scenarios and Covert Channels: Another Game...
Fulltext Access 24 Pages 2005
Name-passing style GUI programming in the π-calculus-based language Nepi
Fulltext Access 24 Pages 2005
Tagged Systems: A Framework for the Specification of History-dependent Properties
Fulltext Access 24 Pages 2005
Failure Reasoning in Multiple-Strategy Proof Planning
Fulltext Access 24 Pages 2005
A structural approach to reversible computation
Fulltext Access 24 Pages 2005
Performance aspects of distributed caches using TTL-based consistency
Fulltext Access 24 Pages 2005
Lower bounds on systolic gossip
Fulltext Access 24 Pages 2005
Modular Rewriting Semantics in Practice
Fulltext Access 24 Pages 2005
Loops, matchings and alternating-sign matrices
Fulltext Access 24 Pages 2005
One-point suspensions and wreath products of polytopes and spheres
Fulltext Access 24 Pages 2005
1-homogeneous, pseudo-1-homogeneous, and 1-thin distance-regular graphs
Fulltext Access 24 Pages 2005
Watersheds, mosaics, and the emergence paradigm
Fulltext Access 24 Pages 2005
Measuring and Reducing Clutter in Euler Diagrams
Fulltext Access 24 Pages 2005
Modeling and Model Checking Web Services
Fulltext Access 24 Pages 2005
Iterative Algebras for a Base
Fulltext Access 24 Pages 2005
A Coordination-based Methodology for Security Protocol Verification
Fulltext Access 24 Pages 2005
ProTest: An Automatic Test Environment for B Specifications
Fulltext Access 24 Pages 2005
Multi-paradigm Models as Source for Automated Test Construction
Fulltext Access 24 Pages 2005
Fuzzy context-free languages-Part 1: Generalized fuzzy context-free grammars
Fulltext Access 24 Pages 2005
Verification of cryptographic protocols: tagging enforces termination
Fulltext Access 24 Pages 2005
Greedy expansions and sets with deleted digits
Fulltext Access 24 Pages 2005
A decreasing rearrangement for functions on homogeneous trees
Fulltext Access 25 Pages 2005
A Survey of Reasoning Systems Based on Euler Diagrams
Fulltext Access 25 Pages 2005
Efficient computation of time-bounded reachability probabilities in uniform continuous-time Markov decision processes
Fulltext Access 25 Pages 2005
Optimal parallel machines scheduling with availability constraints
Fulltext Access 25 Pages 2005
Containers: Constructing strictly positive types
Fulltext Access 25 Pages 2005
Abstractions of Euler Diagrams
Fulltext Access 25 Pages 2005
Weak linearization of the lambda calculus
Fulltext Access 25 Pages 2005
Intersection and Union Types for X
Fulltext Access 25 Pages 2005
A theory for execution-time derivation in real-time programs
Fulltext Access 25 Pages 2005
Bruhat order on classical Weyl groups: minimal chains and covering relation
Fulltext Access 25 Pages 2005
A computational interpretation of Dolev-Yao adversaries
Fulltext Access 25 Pages 2005
Weakening the perfect encryption assumption in Dolev-Yao adversaries
Fulltext Access 25 Pages 2005
Partial words and the critical factorization theorem
Fulltext Access 25 Pages 2005
Decision problems for semi-Thue systems with a few rules
Fulltext Access 25 Pages 2005
Property-preserving subnet reductions for designing manufacturing systems with shared resources
Fulltext Access 25 Pages 2005
PSPACE-completeness of sliding-block puzzles and other problems through the nondeterministic constraint logic model of computation
Fulltext Access 25 Pages 2005
Formal description and analysis of a distributed location service for mobile ad hoc networks
Fulltext Access 25 Pages 2005
Explicit fusions
Fulltext Access 25 Pages 2005
Verification of programs with half-duplex communication
Fulltext Access 25 Pages 2005
Verification of probabilistic systems with faulty communication
Fulltext Access 25 Pages 2005
Representing the MSR Cryptoprotocol Specification Language in an Extension of Rewriting Logic with Dependent Types
Fulltext Access 25 Pages 2005
Elimination of spatial connectives in static spatial logics
Fulltext Access 25 Pages 2005
Towards a Strategy Language for Maude
Fulltext Access 25 Pages 2005
Radiocoloring in planar graphs: Complexity and approximations
Fulltext Access 25 Pages 2005
Structure and complexity of extreme Nash equilibria
Fulltext Access 25 Pages 2005
A randomized satisfiability procedure for arithmetic and uninterpreted function symbols
Fulltext Access 25 Pages 2005
Efficient instance retrieval with standard and relational path indexing
Fulltext Access 25 Pages 2005
Inconsistency Management and View Updates
Fulltext Access 25 Pages 2005
On Floyd and Rivest's SELECT algorithm
Fulltext Access 25 Pages 2005
A reducibility for the dot-depth hierarchy
Fulltext Access 25 Pages 2005
Implementing X
Fulltext Access 25 Pages 2005
<< < 240 241 242 243 244 > >>
Related Topics
Fuzzy logic Articles
2743 Papers
Earthquakes Articles
770 Papers
Information theory Articles
762 Papers
Laplace transform Articles
639 Papers
Algebra and Number Theory Articles
Analysis Articles
Applied Mathematics Articles
Computational Mathematics Articles
Control and Optimization Articles
Discrete Mathematics and Combinatorics Articles
Geometry and Topology Articles
Logic Articles
Mathematical Physics Articles
Mathematics (General) Articles
Modelling and Simulation Articles
Numerical Analysis Articles
Statistics and Probability Articles
Theoretical Computer Science Articles
All Topics
Related Journals
Algebra and Number Theory Journals
Analysis Journals
Applied Mathematics Journals
Computational Mathematics Journals
Control and Optimization Journals
Discrete Mathematics and Combinatorics Journals
Geometry and Topology Journals
Logic Journals
Mathematical Physics Journals
Mathematics (General) Journals
Modelling and Simulation Journals
Numerical Analysis Journals
Statistics and Probability Journals
Theoretical Computer Science Journals
Discrete Applied Mathematics Journal
Electronic Notes in Theoretical Computer Science Journal
Information and Computation Journal
Theoretical Computer Science Journal
Journal of the Nigerian Mathematical Society Journal
AKCE International Journal of Graphs and Combinatorics Journal
Discrete Mathematics Journal
European Journal of Combinatorics Journal
Journal of Combinatorial Theory, Series A Journal
Journal of Combinatorial Theory, Series B Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities