default search action
CoRR, October 2001
- Helen Nissenbaum, Batya Friedman, Edward W. Felten:
Computer Security: Competing Concepts. - Shalini Venturelli:
Inventing E-Regulation in the US, EU and East Asia: Conflicting Social Visions of the Internet & the Information Society. - Jerzy Tyszkiewicz, Arthur Ramer, Achim G. Hoffmann:
The temporal calculus of conditional objects and conditional events. - Jerzy Tyszkiewicz, Achim G. Hoffmann, Arthur Ramer:
Embedding conditional event algebras into temporal calculus of conditionals. - Tomohiro Yamasaki, Hirotada Kobayashi, Hiroshi Imai:
Two-way Quantum One-counter Automata. - Pedro Pereira, Cristina Mazón:
Electronic Commerce, Consumer Search and Retailing Cost Reduction. - Carlos Castro, Sebastian Manzano:
Variable and Value Ordering When Solving Balanced Academic Curriculum Problems. - Avi Goldfarb:
Analyzing Website Choice Using Clickstream Data. - Olivier Pelletier, André Weimerskirch:
Algorithmic Self-Assembly of DNA Tiles and its Application to Cryptanalysis. - Zhe Dang:
Pushdown Timed Automata: a Binary Reachability Characterization and Safety Verification. - David Eppstein, George S. Lueker:
The Minimum Expectation Selection Problem. - Krzysztof R. Apt, Roman Barták, Éric Monfroy, Francesca Rossi, Sebastian Brand:
Proceedings of the 6th Annual Workshop of the ERCIM Working Group on Constraints. - Scott Hazelhurst:
A Proposal for Dynamic Access Lists for TCP/IP Packet Filering. - Steven Bird, Gary Simons, Chu-Ren Huang:
The Open Language Archives Community and Asian Language Resources. - Ciprian Chelba, Peng Xu:
Richer Syntactic Dependencies for Structured Language Modeling. - Carolyn Gideon, L. Jean Camp:
Limits To Certainty in QoS Pricing and Bandwidth. - Harold Feld:
The Increased Need For FCC Merger Review In A Networked World. - Robert Cannon:
ENUM: The Collision of Telephony and DNS Policy. - Vladimir Gudkov, Joseph E. Johnson:
New approach for network monitoring and intrusion detection. - Nandlal L. Sarda:
Structuring Business Metadata in Data Warehouse Systems for Effective Business Support. - Mikhail S. Burtsev, Vladimir G. Red'ko, Roman V. Gusarev:
Alife Model of Evolutionary Emergence of Purposeful Adaptive Behavior. - Naren Ramakrishnan, Robert Capra, Manuel A. Pérez-Quiñones:
Mixed-Initiative Interaction = Mixed Computation. - Agostino Dovier, Enrico Pontelli, Gianfranco Rossi:
Set Unification. - Kazukuni Kobara, Hideki Imai:
Pretty-Simple Password-Authenticated Key-Exchange Protocol. - Edith Hemaspaandra, Jörg Rothe, Holger Spakowski:
Recognizing When Heuristics Can Approximate Minimum Vertex Covers Is Complete for Parallel Access to NP. - Andrei Lopatenko:
Information retrieval in Current Research Information Systems. - André Kempe:
Part-of-Speech Tagging with Two Sequential Transducers. - Robert Harper, Frank Pfenning:
On Equivalence and Canonical Forms in the LF Type Theory. - P. Czarapata, D. Hartill, S. Myers, S. Peggs, N. Phinney, M. Serio, N. Toge, F. Willeke, C. Zhang:
How to Commission, Operate and Maintain a Large Future Accelerator Complex from Far Remote. - Jeff Erickson:
Dense point sets have sparse Delaunay triangulations. - Jaikumar Radhakrishnan, Pranab Sen, Sundar Vishwanathan:
Depth-3 Arithmetic Circuits for S^2_n(X) and Extensions of the Graham-Pollack Theorem. - John Grant, Jack Minker:
A logic-based approach to data integration. - Tracy Cohen:
Between a Rock and a Hard Place: Domestic Policy and South Africa's Commitments under the WTO's Basic Telecommunications Agreement - Explaining the Apparent Inertia. - Alexander Serebrenik, Danny De Schreye:
Inference of termination conditions for numerical loops in Prolog. - Alexander Serebrenik, Danny De Schreye:
On termination of meta-programs. - Hendrik Blockeel, Jan Struyf:
Efficient algorithms for decision tree cross-validation. - Nancy Mazur, Peter Ross, Gerda Janssens, Maurice Bruynooghe:
Practical Aspects for a Working Compile Time Garbage Collection System for Mercury. - Joel I. Seiferas, Paul M. B. Vitányi:
Counting is Easy. - Tao Jiang, Joel I. Seiferas, Paul M. B. Vitányi:
Two heads are better than two tapes. - Ming Li, Paul M. B. Vitányi:
A New Approach to Formal Language Theory by Kolmogorov Complexity. - Sébastien Paquet:
Towards Solving the Interdisciplinary Language Barrier Problem. - G. Winfield Treese, Lawrence C. Stewart:
An Architecture for Security and Privacy in Mobile Communications. - Shireesh Reddy Annam:
An Overview of Computer security. - Sara Cohen, Yaron Kanza, Yakov A. Kogan, Werner Nutt, Yehoshua Sagiv, Alexander Serebrenik:
EquiX - A Search and Query Language for XML. - V. Brian Viard:
Do Switching Costs Make Markets More or Less Competitive?: The Case of 800-Number Portability. - Audrey N. Selian:
From 2G TO 3G - The Evolution of International Cellular Standards. - Lenwood S. Heath, Naren Ramakrishnan, Ronald R. Sederoff, Ross W. Whetten, Boris I. Chevone, Craig A. Struble, Vincent Y. Jouenne, Dawei Chen, Leonel van Zyl, Ruth G. Alscher:
The Expresso Microarray Experiment Management System: The Functional Genomics of Stress Responses in Loblolly Pine. - Mark Burgin, Walter J. Karplus, Damon Shing-Min Liu:
Multivariant Branching Prediction, Reflection, and Retrospection. - Frank Harary, Wolfgang Slany, Oleg Verbitsky:
A Symmetric Strategy in Graph Avoidance Games. - Rens Bod:
What is the minimal set of fragments that achieves maximal parse accuracy? - Rens Bod:
Combining semantic and syntactic structure for language modeling. - Nandlal L. Sarda, Ankur Jain:
Mragyati : A System for Keyword-based Searching in Databases. - Fabrizio Sebastiani:
Machine Learning in Automated Text Categorization. - Erik D. Demaine, David Eppstein, Jeff Erickson, George W. Hart, Joseph O'Rourke:
Vertex-Unfoldings of Simplicial Manifolds. - Wen Chen:
Analytical solution of transient scalar wave and diffusion problems of arbitrary dimensionality and geometry by RBF wavelet series. - Asa Ben-Hur, Joshua Feinberg, Shmuel Fishman, Hava T. Siegelmann:
Probabilistic analysis of a differential equation for linear programming. - Ion Androutsopoulos, Vassiliki Kokkinaki, Aggeliki Dimitromanolaki, Jonathan Calder, Jon Oberlander, Elena Not:
Generating Multilingual Personalized Descriptions of Museum Exhibits - The M-PIRO Project. - Yi Pan:
Teaching Parallel Programming Using Both High-Level and Low-Level Languages. - Melody Donoso, Joseph O'Rourke:
Nonorthogonal Polyhedra Built from Rectangles. - Serban E. Vlad:
Selected Topics in Asynchronous Automata. - Serban E. Vlad:
An Asynchronous Automata Approach to the Semantics of Temporal Logic. - Serban E. Vlad:
The Delay-Insensitivity, the Hazard-Freedom, the Semi-Modularity and the Technical Condition of Good Running of the Discrete Time Asynchronous Automata. - Zhe Dang:
The Existence of $\omega$-Chains for Transitive Mixed Linear Relations and Its Applications. - Serban E. Vlad:
Applications of the Differential Calculus in the Study of the Timed Automata: the Inertial Delay Buffer. - K.-U. Kasemir, L. R. Dalesio:
Interfacing the ControlLogix PLC over Ethernet/IP. - K.-U. Kasemir, L. R. Dalesio:
Overview of the Experimental Physics and Industrial Control System (EPICS) Channel Archiver. - Fedor S. Kilin:
Analysis of Investment Policy in Belarus. - Stefan Boettcher, Michelangelo Grigni:
Jamming Model for the Extremal Optimization Heuristic. - Paul M. B. Vitányi:
Randomness. - Hirotada Kobayashi, Keiji Matsumoto, Tomoyuki Yamakami:
Quantum Certificate Verification: Single versus Multiple Quantum Certificates. - Gavriel Segre:
Algorithmic Information Theoretic Issues in Quantum Mechanics. - F. C. Alcaraz, Constantino Tsallis:
Frontier between separability and quantum entanglement in a many spin system. - Tien D. Kieu:
Quantum Algorithm for Hilbert's Tenth Problem.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.