researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: SIGACT News
Home
Index
Info
Volume
Volume
15
, Issue
4
36
--
0
Barbara Simons
.
The reentry Computer Science Program at U.C. Berkeley
37
--
0
W. Richard Stark
.
Combinatory automaton
48
--
56
.
Abstracts
59
--
0
Jonathan S. Turner
.
On the general graph embedding problem with applications to circuit layout
60
--
0
S. Louis Hakimi
,
Oded Kariv
.
Midwest theory of computation symposium: on a generalization of edge-coloring in graphs
61
--
0
Ronald V. Book
.
Relativizations of complexity classes
62
--
0
John Franco
.
Duality, finite improvement and efficiently solved optimization problems
63
--
64
Eitan M. Gurari
,
Ten-Hwang Lai
.
Deadlock detection in communicating finite state machines
Volume
15
, Issue
3
24
--
35
Leona F. Fass
.
Learning context-free languages from their structured sentences
36
--
44
D. John Cooke
.
On non-hierachical systems of binary operators
45
--
71
Irène Guessarian
.
Survey on classes of interpretations and some of their applications
72
--
95
.
Abstracts and available technical reports
Volume
15
, Issue
2
32
--
44
Irène Guessarian
,
Francesco Parisi-Presicce
.
Iterative vs. regular factor algebras
45
--
52
Alistair Moffat
.
The effect of paged memory upon algorithm performance: short note
53
--
57
Cristian Calude
.
On a class of independent problems related to Rice theorem
58
--
62
Stanley Coren
.
The game of academe
63
--
74
.
Abstracts
76
--
0
Dan R. Olsen
,
Norman Badler
.
An expression model for graphical command languages
77
--
0
Nicholas V. Findler
,
Robert F. Cromp
.
An artificial intelligence technique to generate self-optimizing experimental designs
78
--
0
Nicholas V. Findler
,
Ron Lo
.
A note on the functional estimation of values of hidden variables: an extended module for expert systems
Volume
15
, Issue
1
18
--
19
Hamid R. Amirazizi
,
Martin E. Hellman
.
Time-memory-processor tradeoffs
20
--
22
Hamid R. Amirazizi
,
Ehud D. Karnin
,
Justin M. Reyneri
.
Compact knapsacks are polynomially solvable
23
--
27
Manuel Blum 0001
.
Coin flipping by telephone a protocol for solving impossible problems
28
--
33
Gilles Brassard
.
An optimally secure relativized cryptosystem
34
--
39
Shimon Even
.
A protocol for signing contracts
40
--
44
Martin E. Hellman
,
Ehud D. Karnin
,
Justin M. Reyneri
.
On the necessity of cryptanalytic exhaustive search
45
--
49
Ernst Henze
.
The solution of a general equation for the public key system
50
--
55
Tore Herlestam
.
On the feasibility of computing discrete logarithms using Adleman's subexponential algorithm
56
--
60
Ingemar Ingemarsson
.
Are all injective knapsacks partly solvable after multiplication modulo q?
61
--
66
John P. Jordan
.
A variant of a public key cryptosystem based on Goppa Codes
67
--
77
Don R. Morrison
.
Subtractive encryptors: alternatives to the DES
78
--
88
Stephen Wiesner
.
Conjugate coding
93
--
104
.
Abstracts computing research laboratory