default search action
Search dblp for Publications
export results for "toc:db/journals/tcs/tcs539.bht:"
@article{DBLP:journals/tcs/BenediktPR14, author = {Michael Benedikt and Gabriele Puppis and Cristian Riveros}, title = {The per-character cost of repairing word languages}, journal = {Theor. Comput. Sci.}, volume = {539}, pages = {38--67}, year = {2014}, url = {https://doi.org/10.1016/j.tcs.2014.04.021}, doi = {10.1016/J.TCS.2014.04.021}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/BenediktPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/Borzyszkowski14, author = {Andrzej M. Borzyszkowski}, title = {Computing majority via multiple queries}, journal = {Theor. Comput. Sci.}, volume = {539}, pages = {106--111}, year = {2014}, url = {https://doi.org/10.1016/j.tcs.2014.04.020}, doi = {10.1016/J.TCS.2014.04.020}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/Borzyszkowski14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BrzozowskiT14, author = {Janusz A. Brzozowski and Hellis Tamm}, title = {Theory of {\'{a}}tomata}, journal = {Theor. Comput. Sci.}, volume = {539}, pages = {13--27}, year = {2014}, url = {https://doi.org/10.1016/j.tcs.2014.04.016}, doi = {10.1016/J.TCS.2014.04.016}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/BrzozowskiT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/DengGTZ14, author = {Xiaotie Deng and Paul W. Goldberg and Bo Tang and Jinshan Zhang}, title = {Revenue maximization in a Bayesian double auction market}, journal = {Theor. Comput. Sci.}, volume = {539}, pages = {1--12}, year = {2014}, url = {https://doi.org/10.1016/j.tcs.2014.04.013}, doi = {10.1016/J.TCS.2014.04.013}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/DengGTZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/FotakisS14, author = {Dimitris Fotakis and Paris Siminelakis}, title = {On the efficiency of Influence-and-Exploit strategies for revenue maximization under positive externalities}, journal = {Theor. Comput. Sci.}, volume = {539}, pages = {68--86}, year = {2014}, url = {https://doi.org/10.1016/j.tcs.2014.04.026}, doi = {10.1016/J.TCS.2014.04.026}, timestamp = {Thu, 24 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/FotakisS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LiangCTWTZ14, author = {Kaitai Liang and Cheng{-}Kang Chu and Xiao Tan and Duncan S. Wong and Chunming Tang and Jianying Zhou}, title = {Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts}, journal = {Theor. Comput. Sci.}, volume = {539}, pages = {87--105}, year = {2014}, url = {https://doi.org/10.1016/j.tcs.2014.04.027}, doi = {10.1016/J.TCS.2014.04.027}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/LiangCTWTZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/Seager14, author = {Suzanne M. Seager}, title = {Locating a backtracking robber on a tree}, journal = {Theor. Comput. Sci.}, volume = {539}, pages = {28--37}, year = {2014}, url = {https://doi.org/10.1016/j.tcs.2014.04.019}, doi = {10.1016/J.TCS.2014.04.019}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/Seager14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.