Search dblp for Publications

export results for "toc:db/journals/tcs/tcs539.bht:"

 download as .bib file

@article{DBLP:journals/tcs/BenediktPR14,
  author       = {Michael Benedikt and
                  Gabriele Puppis and
                  Cristian Riveros},
  title        = {The per-character cost of repairing word languages},
  journal      = {Theor. Comput. Sci.},
  volume       = {539},
  pages        = {38--67},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.tcs.2014.04.021},
  doi          = {10.1016/J.TCS.2014.04.021},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/BenediktPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Borzyszkowski14,
  author       = {Andrzej M. Borzyszkowski},
  title        = {Computing majority via multiple queries},
  journal      = {Theor. Comput. Sci.},
  volume       = {539},
  pages        = {106--111},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.tcs.2014.04.020},
  doi          = {10.1016/J.TCS.2014.04.020},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/Borzyszkowski14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BrzozowskiT14,
  author       = {Janusz A. Brzozowski and
                  Hellis Tamm},
  title        = {Theory of {\'{a}}tomata},
  journal      = {Theor. Comput. Sci.},
  volume       = {539},
  pages        = {13--27},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.tcs.2014.04.016},
  doi          = {10.1016/J.TCS.2014.04.016},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/BrzozowskiT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/DengGTZ14,
  author       = {Xiaotie Deng and
                  Paul W. Goldberg and
                  Bo Tang and
                  Jinshan Zhang},
  title        = {Revenue maximization in a Bayesian double auction market},
  journal      = {Theor. Comput. Sci.},
  volume       = {539},
  pages        = {1--12},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.tcs.2014.04.013},
  doi          = {10.1016/J.TCS.2014.04.013},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/DengGTZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/FotakisS14,
  author       = {Dimitris Fotakis and
                  Paris Siminelakis},
  title        = {On the efficiency of Influence-and-Exploit strategies for revenue
                  maximization under positive externalities},
  journal      = {Theor. Comput. Sci.},
  volume       = {539},
  pages        = {68--86},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.tcs.2014.04.026},
  doi          = {10.1016/J.TCS.2014.04.026},
  timestamp    = {Thu, 24 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/FotakisS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LiangCTWTZ14,
  author       = {Kaitai Liang and
                  Cheng{-}Kang Chu and
                  Xiao Tan and
                  Duncan S. Wong and
                  Chunming Tang and
                  Jianying Zhou},
  title        = {Chosen-ciphertext secure multi-hop identity-based conditional proxy
                  re-encryption with constant-size ciphertexts},
  journal      = {Theor. Comput. Sci.},
  volume       = {539},
  pages        = {87--105},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.tcs.2014.04.027},
  doi          = {10.1016/J.TCS.2014.04.027},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/LiangCTWTZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Seager14,
  author       = {Suzanne M. Seager},
  title        = {Locating a backtracking robber on a tree},
  journal      = {Theor. Comput. Sci.},
  volume       = {539},
  pages        = {28--37},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.tcs.2014.04.019},
  doi          = {10.1016/J.TCS.2014.04.019},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/Seager14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}