nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Denial of Service attack against fair computations using Bitcoin deposits
|
Beekman, Jethro G. |
|
2016 |
116 |
2 |
p. 144-146 3 p. |
artikel |
2 |
A filtration method for order-preserving matching
|
Chhabra, Tamanna |
|
2016 |
116 |
2 |
p. 71-74 4 p. |
artikel |
3 |
A linear time algorithm for optimal k-hop dominating set of a tree
|
Kundu, Sukhamay |
|
2016 |
116 |
2 |
p. 197-202 6 p. |
artikel |
4 |
An improvement of a cryptanalysis algorithm
|
Benamara, Oualid |
|
2016 |
116 |
2 |
p. 192-196 5 p. |
artikel |
5 |
A novel edge based image steganography with 2 k correction and Huffman encoding
|
Sun, Shuliang |
|
2016 |
116 |
2 |
p. 93-99 7 p. |
artikel |
6 |
A simple proof of optimality for the MIN cache replacement policy
|
Lee, Mun-Kyu |
|
2016 |
116 |
2 |
p. 168-170 3 p. |
artikel |
7 |
Breaking an ID-based encryption based on discrete logarithm and factorization problems
|
Tan, Chik How |
|
2016 |
116 |
2 |
p. 116-119 4 p. |
artikel |
8 |
Characterizing redundant rigidity and redundant global rigidity of body-hinge graphs
|
Kobayashi, Yuki |
|
2016 |
116 |
2 |
p. 175-178 4 p. |
artikel |
9 |
Corrigendum to “Incidence coloring of Cartesian product graphs” [Inf. Process. Lett. 115 (2015) 765–768]
|
Shiau, Alexander Chane |
|
2016 |
116 |
2 |
p. 216- 1 p. |
artikel |
10 |
Editorial Board
|
|
|
2016 |
116 |
2 |
p. IFC- 1 p. |
artikel |
11 |
Efficient feature selection based on correlation measure between continuous and discrete features
|
Jiang, Sheng-yi |
|
2016 |
116 |
2 |
p. 203-215 13 p. |
artikel |
12 |
Extension of the edge tracing algorithm to disconnected Voronoi skeletons
|
Manak, Martin |
|
2016 |
116 |
2 |
p. 85-92 8 p. |
artikel |
13 |
Generalized MitM attacks on full TWINE
|
Tolba, Mohamed |
|
2016 |
116 |
2 |
p. 128-135 8 p. |
artikel |
14 |
Improved improbable differential attacks on ISO standard CLEFIA: Expansion technique revisited
|
Tezcan, Cihangir |
|
2016 |
116 |
2 |
p. 136-143 8 p. |
artikel |
15 |
Improving resolution width lower bounds for k-CNFs with applications to the Strong Exponential Time Hypothesis
|
Bonacina, Ilario |
|
2016 |
116 |
2 |
p. 120-124 5 p. |
artikel |
16 |
Mahonian STAT on words
|
Kitaev, Sergey |
|
2016 |
116 |
2 |
p. 157-162 6 p. |
artikel |
17 |
NP-hardness of two edge cover generalizations with applications to control and bribery for approval voting
|
Bredereck, Robert |
|
2016 |
116 |
2 |
p. 147-152 6 p. |
artikel |
18 |
On the efficiency of localized work stealing
|
Suksompong, Warut |
|
2016 |
116 |
2 |
p. 100-106 7 p. |
artikel |
19 |
On the semantics of Strategy Logic
|
Bouyer, Patricia |
|
2016 |
116 |
2 |
p. 75-79 5 p. |
artikel |
20 |
Paired 2-disjoint path covers of multidimensional torus networks with faulty edges
|
Chen, Xie-Bin |
|
2016 |
116 |
2 |
p. 107-110 4 p. |
artikel |
21 |
Signed digit data hiding scheme
|
Kuo, Wen-Chung |
|
2016 |
116 |
2 |
p. 183-191 9 p. |
artikel |
22 |
Sufficient conditions for triangle-free graphs to be super k-restricted edge-connected
|
Yuan, Jun |
|
2016 |
116 |
2 |
p. 163-167 5 p. |
artikel |
23 |
The complexity of the Kth largest subset problem and related problems
|
Haase, Christoph |
|
2016 |
116 |
2 |
p. 111-115 5 p. |
artikel |
24 |
The linear complexity of binary sequences of length 2p with optimal three-level autocorrelation
|
Edemskiy, V. |
|
2016 |
116 |
2 |
p. 153-156 4 p. |
artikel |
25 |
The super connectivity of exchanged crossed cube
|
Ning, Wantao |
|
2016 |
116 |
2 |
p. 80-84 5 p. |
artikel |
26 |
Two-dimensional range successor in optimal time and almost linear space
|
Zhou, Gelin |
|
2016 |
116 |
2 |
p. 171-174 4 p. |
artikel |
27 |
VNP = VP in the multilinear world
|
Mahajan, Meena |
|
2016 |
116 |
2 |
p. 179-182 4 p. |
artikel |
28 |
Weak containment for partial words is coNP-complete
|
Parys, Paweł |
|
2016 |
116 |
2 |
p. 125-127 3 p. |
artikel |