default search action
Search dblp for Publications
export results for "toc:db/journals/tcs/tcs1000.bht:"
@article{DBLP:journals/tcs/BeheraR24, author = {Bishnu Charan Behera and Somindu C. Ramanna}, title = {Unbounded non-zero inner product encryption}, journal = {Theor. Comput. Sci.}, volume = {1000}, pages = {114548}, year = {2024}, url = {https://doi.org/10.1016/j.tcs.2024.114548}, doi = {10.1016/J.TCS.2024.114548}, timestamp = {Sat, 18 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/BeheraR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BonfanteD24, author = {Guillaume Bonfante and Florian L. Deloup}, title = {The genus of regular languages and directed graph emulators}, journal = {Theor. Comput. Sci.}, volume = {1000}, pages = {114579}, year = {2024}, url = {https://doi.org/10.1016/j.tcs.2024.114579}, doi = {10.1016/J.TCS.2024.114579}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/BonfanteD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/Brodal24, author = {Gerth St{\o}lting Brodal}, title = {Priority queues with decreasing keys}, journal = {Theor. Comput. Sci.}, volume = {1000}, pages = {114563}, year = {2024}, url = {https://doi.org/10.1016/j.tcs.2024.114563}, doi = {10.1016/J.TCS.2024.114563}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/Brodal24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/IchidaK24, author = {Hiroyuki Ichida and Keiichi Kaneko}, title = {Set-to-set disjoint paths in a folded hypercube}, journal = {Theor. Comput. Sci.}, volume = {1000}, pages = {114562}, year = {2024}, url = {https://doi.org/10.1016/j.tcs.2024.114562}, doi = {10.1016/J.TCS.2024.114562}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/IchidaK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/JiangLHG24, author = {Mingming Jiang and Shengli Liu and Shuai Han and Dawu Gu}, title = {Biometric-based two-factor authentication scheme under database leakage}, journal = {Theor. Comput. Sci.}, volume = {1000}, pages = {114552}, year = {2024}, url = {https://doi.org/10.1016/j.tcs.2024.114552}, doi = {10.1016/J.TCS.2024.114552}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/JiangLHG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/TaghikhaniBA24, author = {Sepideh Taghikhani and Fahimeh Baroughi and Behrooz Alizadeh}, title = {A hybrid modified {PSO} algorithm for the inverse p-median location problem in fuzzy random environment}, journal = {Theor. Comput. Sci.}, volume = {1000}, pages = {114574}, year = {2024}, url = {https://doi.org/10.1016/j.tcs.2024.114574}, doi = {10.1016/J.TCS.2024.114574}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/TaghikhaniBA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/WuZ24, author = {Ruina Wu and Yuzhen Zhao}, title = {Spiking neural {P} systems with structural plasticity and mute rules}, journal = {Theor. Comput. Sci.}, volume = {1000}, pages = {114554}, year = {2024}, url = {https://doi.org/10.1016/j.tcs.2024.114554}, doi = {10.1016/J.TCS.2024.114554}, timestamp = {Sat, 18 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/WuZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.