Results: 7
Languages of Dot-Depth 3/2.
- Published in:
- Theory of Computing Systems, 2008, v. 42, n. 2, p. 256, doi. 10.1007/s00224-007-9002-0
- By:
- Publication type:
- Article
Efficient Algorithms for Anonymous Byzantine Agreement.
- Published in:
- Theory of Computing Systems, 2008, v. 42, n. 2, p. 222, doi. 10.1007/s00224-007-9006-9
- By:
- Publication type:
- Article
Partial Bi-immunity, Scaled Dimension, and NP-Completeness.
- Published in:
- Theory of Computing Systems, 2008, v. 42, n. 2, p. 131, doi. 10.1007/s00224-007-9000-2
- By:
- Publication type:
- Article
Complexity of Clausal Constraints Over Chains.
- Published in:
- Theory of Computing Systems, 2008, v. 42, n. 2, p. 239, doi. 10.1007/s00224-007-9003-z
- By:
- Publication type:
- Article
A Generalization of Magic Squares with Applications to Digital Halftoning.
- Published in:
- Theory of Computing Systems, 2008, v. 42, n. 2, p. 143, doi. 10.1007/s00224-007-9005-x
- By:
- Publication type:
- Article
Storage Products and Linear Control of Derivations.
- Published in:
- Theory of Computing Systems, 2008, v. 42, n. 2, p. 157, doi. 10.1007/s00224-007-9053-2
- By:
- Publication type:
- Article
A Revised Transformation Protocol for Unconditionally Secure Secret Key Exchange.
- Published in:
- Theory of Computing Systems, 2008, v. 42, n. 2, p. 187, doi. 10.1007/s00224-007-9052-3
- By:
- Publication type:
- Article