language:
Find link is a tool written by Edward Betts.searching for Lecture Notes in Computer Science 414 found (3755 total)
alternate case: lecture Notes in Computer Science
Service (systems architecture)
(1,994 words)
[view diff]
exact match in snippet
view article
Amsterdam, The Netherlands, December 12-15, 2005, Proceedings. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg. ISBN 978-3-540-30817-1Provable security (2,177 words) [view diff] exact match in snippet view article find links to article
asymmetric encryption". Advances in Cryptology — EUROCRYPT'94. Lecture Notes in Computer Science. Vol. 950. pp. 92–111. doi:10.1007/BFb0053428. ISBN 978-3-540-60176-0XSL attack (1,834 words) [view diff] exact match in snippet view article find links to article
2003, Lund, Sweden, February 24-26, 2003, Revised Papers. Lecture Notes in Computer Science. Vol. 2887. Springer. pp. 274–289. doi:10.1007/978-3-540-39887-5_21Join-pattern (6,440 words) [view diff] exact match in snippet view article find links to article
calculus of mobile agents". CONCUR '96: Concurrency Theory. Lecture Notes in Computer Science. Vol. 1119. Le Chesnay: Concurrency Theory. pp. 406–421. doi:10Bart Preneel (983 words) [view diff] exact match in snippet view article find links to article
algorithms based on block ciphers". Crytography and Coding. Lecture Notes in Computer Science. Vol. 1355. pp. 270–282. doi:10.1007/BFb0024473. ISBN 978-3-540-63927-5Tiny Encryption Algorithm (1,189 words) [view diff] exact match in snippet view article find links to article
RC2, and TEA". Information and Communications Security. Lecture Notes in Computer Science. Vol. 1334. pp. 233–246. CiteSeerX 10.1.1.35.8112. doi:10International Data Encryption Algorithm (1,499 words) [view diff] exact match in snippet view article find links to article
on the IDEA Block Cipher". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 3006. pp. 117–129. doi:10.1007/978-3-540-24654-1_9.Satisfiability modulo theories (4,371 words) [view diff] exact match in snippet view article find links to article
Werner; Hermanns, Holger (eds.). Computer Aided Verification. Lecture Notes in Computer Science. Vol. 4590. Berlin, Heidelberg: Springer. pp. 547–560. doi:10Electromagnetic attack (3,408 words) [view diff] exact match in snippet view article find links to article
Transmission Using Electromagnetic Emanations". Information Hiding. Lecture Notes in Computer Science. Vol. 1525. pp. 124–142. CiteSeerX 10.1.1.64.6982. doi:10Choreographic programming (1,574 words) [view diff] exact match in snippet view article find links to article
Specifications". Logic, Rewriting, and Concurrency (PDF). Lecture Notes in Computer Science. Vol. 9200. pp. 427–450. doi:10.1007/978-3-319-23165-5_20Extended Semantic Web Conference (867 words) [view diff] exact match in snippet view article find links to article
Skaf-Molli, Hala; Tamper, Minna (eds.). The Semantic Web. Lecture Notes in Computer Science. Vol. 13261. Cham: Springer International Publishing. pp. 200–216Computer Aided Verification (396 words) [view diff] exact match in snippet view article find links to article
"Counterexample-Guided Abstraction Refinement". Computer Aided Verification. Lecture Notes in Computer Science. Vol. 1855. pp. 154–169. doi:10.1007/10722167_15. ISBN 978-3-540-67770-3Kleptography (1,140 words) [view diff] exact match in snippet view article find links to article
Barbara, California, USA, August 18–22, 1996, Proceedings. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 89–103. ISBN 978-3-540-68697-2Hash-based cryptography (2,355 words) [view diff] exact match in snippet view article find links to article
Minimal Security Assumptions". Post-Quantum Cryptography. Lecture Notes in Computer Science. Vol. 7071. pp. 117–129. CiteSeerX 10.1.1.400.6086. doi:10Linked timestamping (1,715 words) [view diff] exact match in snippet view article find links to article
Digital Signatures". Advances in Cryptology – EUROCRYPT '93. Lecture Notes in Computer Science. Vol. 765. p. 274. doi:10.1007/3-540-48285-7_24. ISBN 978-3-540-57600-6Shlomi Dolev (2,400 words) [view diff] exact match in snippet view article find links to article
Joffroy; Delaët, Sylvie (2014). Networked Systems (PDF). Lecture Notes in Computer Science. Springer, Cham. pp. 99–121. doi:10.1007/978-3-319-09581-3_8Kaisa Nyberg (325 words) [view diff] exact match in snippet view article find links to article
Tatsunokuchi, Ishikawa, Japan September 17ÔÇô19, 1997, Proceedings, Lecture Notes in Computer Science, vol. 1396, Springer, pp. 32–42, doi:10.1007/bfb0030406,Reversible computing (3,038 words) [view diff] exact match in snippet view article find links to article
Jarkko; Ulidowski, Irek (eds.). Reversible Computation. Lecture Notes in Computer Science. Vol. 11106. Cham: Springer International Publishing. pp. 3–33E (theorem prover) (937 words) [view diff] exact match in snippet view article
(2004). "System Description: E 0.81". Automated Reasoning. Lecture Notes in Computer Science. Vol. 3097. pp. 223–228. doi:10.1007/978-3-540-25984-8_15E0 (cipher) (810 words) [view diff] exact match in snippet view article
Combiner". Information Security and Cryptology - ICISC'99. Lecture Notes in Computer Science. Vol. 1787. pp. 17–29. CiteSeerX 10.1.1.40.9412. doi:10.1007/10719994_2Dmitry Khovratovich (1,347 words) [view diff] exact match in snippet view article find links to article
AES-192 and AES-256". Advances in Cryptology – ASIACRYPT 2009. Lecture Notes in Computer Science. Vol. 5912. Springer-Verlag. pp. 1–18. doi:10.1007/978-3-642-10366-7_1Brent Waters (565 words) [view diff] exact match in snippet view article find links to article
Identity-Based Encryption". Advances in Cryptology – EUROCRYPT 2005. Lecture Notes in Computer Science. Vol. 3494. pp. 457–473. doi:10.1007/11426639_27. ISBN 978-3-540-25910-7Mexican International Conference on Artificial Intelligence (1,007 words) [view diff] exact match in snippet view article find links to article
(2000). MICAI 2000: Advances in Artificial Intelligence. Lecture Notes in Computer Science. Vol. 1793. doi:10.1007/10720076. ISBN 978-3-540-67354-5.RIPEMD (884 words) [view diff] exact match in snippet view article find links to article
of RACE Integrity Primitives Evaluation (RIPE-RACE 1040). Lecture Notes in Computer Science. Vol. 1007. doi:10.1007/3-540-60640-8. ISBN 978-3-540-60640-6RDF query language (1,154 words) [view diff] exact match in snippet view article find links to article
Comparison of RDF Query Languages". The Semantic Web – ISWC 2004. Lecture Notes in Computer Science. Vol. 3298. pp. 502–517. CiteSeerX 10.1.1.105.8731. doi:10Homomorphic encryption (4,688 words) [view diff] exact match in snippet view article find links to article
Encryption Scheme". Advances in Cryptology – EUROCRYPT 2011. Lecture Notes in Computer Science. Vol. 6632. pp. 129–148. doi:10.1007/978-3-642-20465-4_9.Moti Yung (1,653 words) [view diff] exact match in snippet view article find links to article
Cryptography, or: Should We Trust Capstone? CRYPTO 1996: 89-103, Lecture Notes in Computer Science, vol. 1109, p. 89, doi:10.1007/3-540-68697-5_8, ISBN 978-3-540-61512-5Skipjack (cipher) (1,134 words) [view diff] exact match in snippet view article
Feistel Networks". Advances in Cryptology – CRYPTO 2010. Lecture Notes in Computer Science. Vol. 6223. Springer. pp. 613–630. CiteSeerX 10.1.1.185.3033FORK-256 (798 words) [view diff] exact match in snippet view article find links to article
in the Full SHA-1". Advances in Cryptology – CRYPTO 2005. Lecture Notes in Computer Science. Vol. 3621. pp. 17–36. doi:10.1007/11535218_2. ISBN 978-3-540-31870-5Post-quantum cryptography (7,064 words) [view diff] exact match in snippet view article find links to article
Cryptography for the Internet" (PDF), Post-Quantum Cryptography, Lecture Notes in Computer Science, vol. 8772, Cham: Springer International Publishing, pp. 197–219Lattice-based cryptography (2,872 words) [view diff] exact match in snippet view article find links to article
ring-based public key cryptosystem". Algorithmic Number Theory. Lecture Notes in Computer Science. Vol. 1423. pp. 267–288. CiteSeerX 10.1.1.25.8422. doi:10Post-quantum cryptography (7,064 words) [view diff] exact match in snippet view article find links to article
Cryptography for the Internet" (PDF), Post-Quantum Cryptography, Lecture Notes in Computer Science, vol. 8772, Cham: Springer International Publishing, pp. 197–219FORK-256 (798 words) [view diff] exact match in snippet view article find links to article
in the Full SHA-1". Advances in Cryptology – CRYPTO 2005. Lecture Notes in Computer Science. Vol. 3621. pp. 17–36. doi:10.1007/11535218_2. ISBN 978-3-540-31870-5Inductive logic programming (4,220 words) [view diff] case mismatch in snippet view article find links to article
Ronald de (1997). Foundations of inductive logic programming. Lecture notes in computer science Lecture notes in artificial intelligence. Berlin Heidelberg:Martin Wirsing (1,311 words) [view diff] exact match in snippet view article find links to article
): Software-Intensive Systems and New Computing Paradigms. Lecture Notes in Computer Science 5380, Springer-Verlag, 2008, 265 pages (ISBN 978-3-540-89436-0)Orr Dunkelman (794 words) [view diff] exact match in snippet view article find links to article
CRYPTO 2012. https://www.iacr.org/conferences/crypto2012/. Lecture Notes in Computer Science. Vol. 7417. Springer. pp. 719–740. doi:10.1007/978-3-642-32009-5_42Deterministic encryption (897 words) [view diff] exact match in snippet view article find links to article
Keyword Search" (PDF). Advances in Cryptology - EUROCRYPT 2004. Lecture Notes in Computer Science. Vol. 3027. pp. 506–522. doi:10.1007/978-3-540-24676-3_30XTEA (969 words) [view diff] exact match in snippet view article find links to article
B.; Meier, W. (eds.). Fast Software Encryption. FSE 2004. Lecture Notes in Computer Science. Vol. 3017. Berlin, Heidelberg: Springer. pp. 299–316. doi:10OPTICS algorithm (2,141 words) [view diff] exact match in snippet view article find links to article
Outliers". Principles of Data Mining and Knowledge Discovery. Lecture Notes in Computer Science. Vol. 1704. Springer-Verlag. pp. 262–270. doi:10.1007/b72280Multitier programming (2,772 words) [view diff] exact match in snippet view article find links to article
Without Tiers". Formal Methods for Components and Objects. Lecture Notes in Computer Science. Vol. 4709. pp. 266–296. doi:10.1007/978-3-540-74792-5_12HC-256 (534 words) [view diff] exact match in snippet view article find links to article
New Stream Cipher HC-256" (PDF). Fast Software Encryption. Lecture Notes in Computer Science. Vol. 3017. pp. 226–244. doi:10.1007/978-3-540-25937-4_15R-tree (2,966 words) [view diff] exact match in snippet view article find links to article
Geographic Data". Advances in Spatial and Temporal Databases. Lecture Notes in Computer Science. Vol. 8098. p. 146. doi:10.1007/978-3-642-40235-7_9. ISBN 978-3-642-40234-0HyperNEAT (1,263 words) [view diff] exact match in snippet view article find links to article
Mouret, Jean-Baptiste (eds.). From Animals to Animats 11. Lecture Notes in Computer Science. Vol. 6226. Springer Berlin Heidelberg. pp. 533–543. CiteSeerX 10Randomness test (1,173 words) [view diff] exact match in snippet view article find links to article
Cellular Automata". Advances in Cryptology — EUROCRYPT '91. Lecture Notes in Computer Science. Vol. 547. pp. 186–199. doi:10.1007/3-540-46416-6_17. ISBN 978-3-540-54620-7CL-HTTP (643 words) [view diff] exact match in snippet view article find links to article
system on world wide web". Intelligent Tutoring Systems. Lecture Notes in Computer Science. Vol. 1086/1996. Springer. pp. 261–269. doi:10.1007/3-540-61327-7_123Data Encryption Standard (6,661 words) [view diff] exact match in snippet view article find links to article
for DES Cipher". Advances in Cryptology — EUROCRYPT '93. Lecture Notes in Computer Science. Vol. 765. Springer, Berlin, Heidelberg. pp. 386–397. doi:10Cryptographic hash function (6,288 words) [view diff] exact match in snippet view article find links to article
Other Primitives". Advances in Cryptology – EUROCRYPT 2005. Lecture Notes in Computer Science. Vol. 3494. pp. 96–113. doi:10.1007/11426639_6. ISBN 978-3-540-25910-7Fly algorithm (3,630 words) [view diff] exact match in snippet view article find links to article
Jean; Sapin, Emmanuel (2009). "Flies Open a Door to SLAM.". Lecture Notes in Computer Science. Applications of Evolutionary Computation (EvoApplicationsCoppersmith method (767 words) [view diff] exact match in snippet view article find links to article
Modular Equation". Advances in Cryptology — EUROCRYPT '96. Lecture Notes in Computer Science. Vol. 1070. pp. 155–165. doi:10.1007/3-540-68339-9_14.Register allocation (5,159 words) [view diff] exact match in snippet view article find links to article
Programming". Languages and Compilers for Parallel Computing. Lecture Notes in Computer Science. Vol. 4382. pp. 267–282. CiteSeerX 10.1.1.75.6911. doi:10Symposium on Experimental Algorithms (731 words) [view diff] exact match in snippet view article find links to article
Kulikov, Alexander S., eds. (2016). Experimental Algorithms. Lecture Notes in Computer Science. Vol. 9685. doi:10.1007/978-3-319-38851-9. ISBN 978-3-319-38850-2Rocq (1,895 words) [view diff] exact match in snippet view article find links to article
TPHOLs 2005, Oxford, UK, August 22–25, 2005, Proceedings. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. pp. 98–113. doi:10.1007/11541868_7Merkle tree (1,795 words) [view diff] exact match in snippet view article find links to article
Encryption Function". Advances in Cryptology – CRYPTO '87. Lecture Notes in Computer Science. Vol. 293. pp. 369–378. doi:10.1007/3-540-48184-2_32. ISBN 978-3-540-18796-7Moni Naor (683 words) [view diff] exact match in snippet view article find links to article
"Broadcast Encryption". Advances in Cryptology — CRYPTO' 93. Lecture Notes in Computer Science. Vol. 773. pp. 480–491. doi:10.1007/3-540-48329-2_40. ISBN 978-3-540-57766-9Feistel cipher (1,314 words) [view diff] exact match in snippet view article find links to article
Boneh, Dan (ed.), Advances in Cryptology - CRYPTO 2003 (PDF), Lecture Notes in Computer Science, vol. 2729, pp. 513–529, doi:10.1007/b11817, ISBN 978-3-540-40674-7Go and mathematics (1,727 words) [view diff] exact match in snippet view article find links to article
problems". Mathematical Foundations of Computer Science 1984. Lecture Notes in Computer Science. Vol. 176. pp. 498–506. doi:10.1007/BFb0030333. ISBN 978-3-540-13372-8Identity-based cryptography (856 words) [view diff] exact match in snippet view article find links to article
(eds.). Advances in Cryptology Proceedings of CRYPTO '84. Lecture Notes in Computer Science. Vol. 196 (1 ed.). Springer Berlin Heidelberg. pp. 47–53.ProVerif (1,382 words) [view diff] exact match in snippet view article find links to article
WS-Security Protocols". Web Services and Formal Methods. Lecture Notes in Computer Science. Vol. 4184. Springer, Berlin, Heidelberg. pp. 88–106. CiteSeerX 10DPLL(T) (434 words) [view diff] exact match in snippet view article
Rajeev; Peled, Doron A. (eds.). Computer Aided Verification. Lecture Notes in Computer Science. Vol. 3114. Springer Berlin Heidelberg. pp. 175–188. doi:10Queue number (2,736 words) [view diff] exact match in snippet view article find links to article
Germany, September 21–24, 2010, Revised Selected Papers, Lecture Notes in Computer Science, vol. 6502, Heidelberg: Springer, pp. 68–79, doi:10.1007/978-3-642-18469-7_7One-key MAC (919 words) [view diff] exact match in snippet view article find links to article
(2003-02-24). "OMAC: One-Key CBC MAC". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 2887. Springer, Berlin, Heidelberg. pp. 129–153. doi:10StegFS (312 words) [view diff] exact match in snippet view article find links to article
Shamir, Adi (1998). The Steganographic File System (PDF). Lecture Notes in Computer Science. Vol. 1525. pp. 73–82. CiteSeerX 10.1.1.42.1676. doi:10.1007/3-540-49380-8_6Secure two-party computation (1,093 words) [view diff] exact match in snippet view article find links to article
Single-Execution Setting", Advances in Cryptology – EUROCRYPT 2017, Lecture Notes in Computer Science, vol. 10212, Cham: Springer International Publishing, pp. 399–424Petri net (7,265 words) [view diff] exact match in snippet view article find links to article
Lectures on Petri Nets I: Basic Models – Advances in Petri Nets. Lecture Notes in Computer Science. Vol. 1491. Springer. pp. 12–121. doi:10.1007/3-540-65306-6_14Computational Diffie–Hellman assumption (796 words) [view diff] exact match in snippet view article find links to article
Diffie–Hellman is as strong as discrete log for certain primes (PDF), Lecture Notes in Computer Science, vol. 403, pp. 530–539, doi:10.1007/0-387-34799-2_38, ISBN 978-0-387-97196-4Adaptive sort (654 words) [view diff] exact match in snippet view article find links to article
Alistair Moffat (1992). A framework for adaptive sorting. Lecture Notes in Computer Science. Vol. 621. Berlin: Springer Berlin / Heidelberg. pp. 422–433SAT solver (3,632 words) [view diff] exact match in snippet view article find links to article
Principles and Practice of Constraint Programming – CP 2007, Lecture Notes in Computer Science, vol. 4741, pp. 544–558, CiteSeerX 10.1.1.70.5471, doi:10Annotation (3,790 words) [view diff] exact match in snippet view article find links to article
Yannick (eds.). Knowledge Engineering and Knowledge Management. Lecture Notes in Computer Science. Vol. 11313. Cham: Springer International Publishing. pp. 19–33Largest empty rectangle (816 words) [view diff] exact match in snippet view article find links to article
the largest empty rectangle". STACS-1984, Lecture Notes in Computer Science. Lecture Notes in Computer Science. 166: 43–54. doi:10.1007/3-540-12920-0_4Cognitive computing (1,602 words) [view diff] exact match in snippet view article find links to article
Cognitive Augmentation – A Case Study". Augmented Cognition. Lecture Notes in Computer Science. Vol. 11580. pp. 533–545. arXiv:2211.06479. doi:10.1007/978-3-030-22419-6_38T-function (713 words) [view diff] exact match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems - CHES 2002. Lecture Notes in Computer Science. Vol. 2523. Springer-Verlag. pp. 470–483. doi:10.1007/3-540-36400-5_34MD4 (879 words) [view diff] exact match in snippet view article find links to article
(2008-02-10). "MD4 is Not One-Way" (PDF). Fast Software Encryption. Lecture Notes in Computer Science. Vol. 5086. Springer. pp. 412–428. doi:10.1007/978-3-540-71039-4_26Budget-additive valuation (853 words) [view diff] exact match in snippet view article find links to article
for Maximizing Ad-Auctions Revenue", Algorithms – ESA 2007, Lecture Notes in Computer Science, vol. 4698, Berlin, Heidelberg: Springer Berlin HeidelbergGNUnet (2,144 words) [view diff] exact match in snippet view article find links to article
Seberry, Jennifer (eds.). Efficient Sharing of Encrypted Data. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 107–120. CiteSeerX 10.1.1Fiat–Shamir heuristic (1,072 words) [view diff] exact match in snippet view article find links to article
Signature Problems". Advances in Cryptology — CRYPTO' 86. Lecture Notes in Computer Science. Vol. 263. Springer Berlin Heidelberg. pp. 186–194. doi:10Broadcast encryption (802 words) [view diff] exact match in snippet view article find links to article
Advances in Cryptology — CRYPTO' 93 (Extended abstract). Lecture Notes in Computer Science. Vol. 773. pp. 480–491. doi:10.1007/3-540-48329-2_40. ISBN 978-3-540-57766-9Transaction malleability problem (638 words) [view diff] exact match in snippet view article find links to article
Rohloff, Kurt (eds.). Financial Cryptography and Data Security. Lecture Notes in Computer Science. Vol. 8976. Berlin, Heidelberg: Springer. pp. 1–18. doi:10Bot prevention (1,141 words) [view diff] exact match in snippet view article find links to article
of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science. Vol. 12223. Cham: Springer International Publishing. pp. 135–159Christine Paulin-Mohring (507 words) [view diff] exact match in snippet view article find links to article
Machinery. She was elected to the Academia Europaea in 2014. Lecture Notes in Computer Science. Types for Proofs and Programs: International Workshop TYPES'96Identity-based encryption (1,950 words) [view diff] exact match in snippet view article find links to article
Barbara, California, USA, August 19–22, 1984, Proceedings. Lecture Notes in Computer Science. Vol. 196. Springer. pp. 47–53. doi:10.1007/3-540-39568-7_5Book embedding (8,167 words) [view diff] exact match in snippet view article find links to article
graphs have constant book thickness", Algorithms – ESA 2015, Lecture Notes in Computer Science, vol. 9294, Springer, pp. 130–141, doi:10.1007/978-3-662-48350-3_12Alfred Menezes (831 words) [view diff] exact match in snippet view article find links to article
(with S. Chatterjee, N. Koblitz and P. Sarkar), Mycrypt 2016, Lecture Notes in Computer Science, 10311 (2017), 21–55. doi:10.1007/978-3-319-61273-7_3 "AnotherInfobox (1,384 words) [view diff] exact match in snippet view article find links to article
Vasudeva (June 2011). Multidisciplinary Information Retrieval. Lecture Notes in Computer Science. Vol. 6653. Springer Berlin Heidelberg. doi:10.1007/978-3-642-21353-3Wikidata (3,710 words) [view diff] exact match in snippet view article find links to article
Multilinguality, Multimodality, and Interaction. CLEF 2018. Lecture Notes in Computer Science. Vol. 11018. p. 129. doi:10.1007/978-3-319-98932-7_12.Artificial immune system (1,710 words) [view diff] exact match in snippet view article find links to article
of Degeneracy in a Lymph Node". Artificial Immune Systems. Lecture Notes in Computer Science. Vol. 4163. pp. 164–177. doi:10.1007/11823940_13. ISBN 978-3-540-37749-8Venansius Baryamureeba (1,592 words) [view diff] exact match in snippet view article find links to article
for Linear Programming". Large-Scale Scientific Computing. Lecture Notes in Computer Science. Vol. 3743. pp. 629–637. doi:10.1007/11666806_72. ISBN 978-3-540-31994-8Augmented cognition (1,768 words) [view diff] exact match in snippet view article find links to article
Schmorrow, Dylan D. (ed.). Foundations of Augmented Cognition. Lecture Notes in Computer Science. Vol. 4565. Springer Berlin Heidelberg. pp. 220–228. doi:10Zero-knowledge proof (8,198 words) [view diff] exact match in snippet view article find links to article
Children". Advances in Cryptology — CRYPTO' 89 Proceedings (PDF). Lecture Notes in Computer Science. Vol. 435. pp. 628–631. doi:10.1007/0-387-34805-0_60. ISBN 978-0-387-97317-3Levenshtein automaton (561 words) [view diff] exact match in snippet view article find links to article
Automata Theory and Applications. Lecture Notes in Computer Science. Vol. 9618. Lecture Notes in Computer Science. pp. 207–218. doi:10.1007/978-3-319-30000-9_16Model checking (2,788 words) [view diff] exact match in snippet view article find links to article
programs using fixpoints", Automata, Languages and Programming, Lecture Notes in Computer Science, vol. 85, pp. 169–181, doi:10.1007/3-540-10003-2_69, ISBN 978-3-540-10003-4Exponential time hypothesis (3,047 words) [view diff] exact match in snippet view article find links to article
Ljubljana, Slovenia, September 12–14, 2012, Proceedings, Lecture Notes in Computer Science, vol. 7535, Springer, pp. 13–24, CiteSeerX 10.1.1.680.8401Speculative execution (974 words) [view diff] exact match in snippet view article find links to article
International Conference on Principles of Distributed Systems. Lecture Notes in Computer Science. Vol. 4305. Bordeaux, France: Springer. pp. 1–2. doi:10.1007/11945529_1Pairing-based cryptography (1,150 words) [view diff] exact match in snippet view article find links to article
cryptography at high security levels". Cryptography and Coding. Lecture Notes in Computer Science. Vol. 3796. pp. 13–36. doi:10.1007/11586821_2. ISBN 978-3-540-30276-6Amit Sahai (1,154 words) [view diff] exact match in snippet view article find links to article
Challenges". Theory of Cryptography. Lecture Notes in Computer Science. Vol. 6597 (Lecture Notes in Computer Science). Springer Berlin Heidelberg. pp. 253–273Cardano (blockchain platform) (3,122 words) [view diff] exact match in snippet view article
Peter B.; Sala, Massimiliano (eds.). The Extended UTXO Model. Lecture Notes in Computer Science. Cham: Springer International Publishing. pp. 525–539. doi:10Speculative execution (974 words) [view diff] exact match in snippet view article find links to article
International Conference on Principles of Distributed Systems. Lecture Notes in Computer Science. Vol. 4305. Bordeaux, France: Springer. pp. 1–2. doi:10.1007/11945529_1Bruce M. McLaren (2,053 words) [view diff] exact match in snippet view article find links to article
Digital Learning Game". Artificial Intelligence in Education. Lecture Notes in Computer Science. Vol. 12163. pp. 255–268. doi:10.1007/978-3-030-52237-7_21Weak heap (2,127 words) [view diff] exact match in snippet view article find links to article
"On the performance of WEAK-HEAPSORT", Stacs 2000 (PDF), Lecture Notes in Computer Science, vol. 1770, Springer-Verlag, pp. 254–266, CiteSeerX 10.1.1Loop-invariant code motion (593 words) [view diff] exact match in snippet view article find links to article
Detection". Automated Technology for Verification and Analysis. Lecture Notes in Computer Science. Vol. 10482. pp. 91–108. doi:10.1007/978-3-319-68167-2_7.Larch Prover (1,558 words) [view diff] exact match in snippet view article find links to article
Proceedings of the Fourth International Conference CAV'92), Lecture Notes in Computer Science 663, Springer-Verlag, June 1992, pages 44–55. Urban EngbergCADE ATP System Competition (378 words) [view diff] exact match in snippet view article find links to article
Theories Competition" (PDF). Computer Aided Verification. Lecture Notes in Computer Science. 3576. Springer: 20–23. doi:10.1007/11513988_4. ISBN 978-3-540-27231-1Algorithmic skeleton (8,846 words) [view diff] exact match in snippet view article find links to article
Euro-Par Conference: Parallel Processing, volume 4641 of Lecture Notes in Computer Science, pages 72–81. Springer-Verlag, 2007. D. Caromel, L. HenrioManumation (345 words) [view diff] exact match in snippet view article find links to article
Through E-Government: Myth or Reality?". Electronic Government. Lecture Notes in Computer Science. Vol. 3591. Springer. pp. 1–11. doi:10.1007/11545156_1.Fork–join queue (1,771 words) [view diff] exact match in snippet view article find links to article
Fork-Join Queueing Simulation". Computer Performance Engineering. Lecture Notes in Computer Science. Vol. 5652. pp. 16–29. CiteSeerX 10.1.1.158.7363. doi:10Mean value analysis (1,586 words) [view diff] exact match in snippet view article find links to article
Performance Evaluation of Computer and Communication Systems. Lecture Notes in Computer Science. Vol. 729. p. 491. doi:10.1007/BFb0013865. ISBN 978-3-540-57297-8Free Haven Project (928 words) [view diff] exact match in snippet view article find links to article
Haven Project: Distributed Anonymous Storage Service" (PDF). Lecture Notes in Computer Science 2009. Proc. Workshop on Design Issues in Anonymity and UnobservabilityEvolutionary algorithm (4,653 words) [view diff] exact match in snippet view article find links to article
Evolution of Evolutionary Algorithms". Genetic Programming. Lecture Notes in Computer Science. Vol. 3003. Springer. pp. 389–398. doi:10.1007/978-3-540-24650-3_37Therese Biedl (202 words) [view diff] exact match in snippet view article find links to article
Copenhagen, Denmark, July 8–11, 2014, Proceedings, Part I. Lecture Notes in Computer Science. Vol. 8572. Springer. pp. 198–210. doi:10.1007/978-3-662-43948-7_17Knowledge extraction (4,445 words) [view diff] exact match in snippet view article find links to article
Acquisition Method for the Semantic Web", WAIM, volume 3739 of Lecture Notes in Computer Science, page 209-220. Springer. doi:10.1007/11563952_19 Tirmizi etPancake sorting (2,201 words) [view diff] exact match in snippet view article find links to article
Tighter Inapproximability Results". Proc. 26th ICALP (1999). Lecture Notes in Computer Science. 1644: 200–09. Berman, P.; Karpinski, M.; Hannenhalli, S.Curry (programming language) (1,962 words) [view diff] exact match in snippet view article
Programming Logics - Essays in Memory of Harald Ganzinger. Lecture Notes in Computer Science. Vol. 7797. pp. 123–168. doi:10.1007/978-3-642-37651-1_6.Anne Canteaut (513 words) [view diff] exact match in snippet view article find links to article
Graz, Austria, March 15-17, 2006, Revised Selected Papers. Lecture Notes in Computer Science. Vol. 4047. Springer. pp. 30–40. CiteSeerX 10.1.1.59.9346Accumulator (cryptography) (2,807 words) [view diff] exact match in snippet view article
Signatures" (PDF). Advances in Cryptology — EUROCRYPT '93. Lecture Notes in Computer Science. Vol. 765. pp. 274–285. doi:10.1007/3-540-48285-7_24. ISBN 978-3-540-57600-6Datalog (4,894 words) [view diff] exact match in snippet view article find links to article
Georg; Furche, Tim; Sellers, Andrew (eds.). Datalog Reloaded. Lecture Notes in Computer Science. Vol. 6702. Berlin, Heidelberg: Springer. pp. 181–220. doi:10Tree stack automaton (876 words) [view diff] exact match in snippet view article find links to article
Mathematical Foundations of Computer Science (MFCS 1990). Lecture Notes in Computer Science, Vol. 452, pages 313–321, doi:10.1007/BFb0029624. Scott, DanaContact graph (483 words) [view diff] exact match in snippet view article find links to article
2013, Lübeck, Germany, June 19-21, 2013, Revised Papers, Lecture Notes in Computer Science, vol. 8165, Springer, pp. 139–151, arXiv:1303.1279, doi:10Yacas (282 words) [view diff] exact match in snippet view article find links to article
Intelligence, Automated Reasoning, and Symbolic Computation, Lecture Notes in Computer Science, vol. 2385, Springer, pp. 332–336, doi:10.1007/3-540-45470-5_292-EXPTIME (960 words) [view diff] exact match in snippet view article find links to article
on Automata, Languages and Programming (ICALP 2003) (PDF), Lecture Notes in Computer Science, vol. 2719, Springer-Verlag, pp. 767–775, doi:10.1007/3-540-45061-0_60Ian Horrocks (1,070 words) [view diff] exact match in snippet view article find links to article
Reasoner: System Description" (PDF). Automated Reasoning. Lecture Notes in Computer Science. Vol. 4130. pp. 292–297. CiteSeerX 10.1.1.65.2672. doi:10Tatami (1,410 words) [view diff] exact match in snippet view article find links to article
2010, Nha Trang, Vietnam, July 19-21, 2010. Proceedings. Lecture Notes in Computer Science. Vol. 6196. Springer. pp. 288–297. arXiv:1103.3309. doi:10Categorical quantum mechanics (2,223 words) [view diff] exact match in snippet view article find links to article
EACSL Annual Conference on Computer Science Logic (CSL). Lecture Notes in Computer Science. Vol. 6247. Springer. arXiv:1004.1598. doi:10.2168/LMCS-8(4:14)2012Ideal lattice (6,061 words) [view diff] exact match in snippet view article find links to article
Active Attacks" (PDF). Public Key Cryptography – PKC 2008. Lecture Notes in Computer Science. Vol. 4939. pp. 162–179. doi:10.1007/978-3-540-78440-1_10Persuasive technology (4,418 words) [view diff] exact match in snippet view article find links to article
Health-Promoting Mobile Applications". Persuasive Technology. Lecture Notes in Computer Science. Vol. 6137. pp. 150–161. doi:10.1007/978-3-642-13226-1_16Key generator (213 words) [view diff] exact match in snippet view article find links to article
and Key Distribution". Advances in Cryptology — CRYPTO' 93. Lecture Notes in Computer Science. Vol. 773. pp. 232–249. CiteSeerX 10.1.1.62.3423. doi:10Non-interactive zero-knowledge proof (2,462 words) [view diff] exact match in snippet view article find links to article
Garay, Juan A. (eds.). Advances in Cryptology – CRYPTO 2013. Lecture Notes in Computer Science. Vol. 8043. Berlin, Heidelberg: Springer. pp. 90–108. doi:10Instrumental convergence (2,949 words) [view diff] exact match in snippet view article find links to article
and Intelligent Agents". Artificial General Intelligence. Lecture Notes in Computer Science. Vol. 6830. pp. 11–20. doi:10.1007/978-3-642-22887-2_2.Klaus-Robert Müller (996 words) [view diff] exact match in snippet view article find links to article
(2022). xxAI – Beyond Explainable Artificial Intelligence. Lecture Notes in Computer Science. Vol. 13200. Springer Cham. doi:10.1007/978-3-031-04083-2Gennady Makanin (1,107 words) [view diff] exact match in snippet view article find links to article
equations in a free group". Word Equations and Related Topics. Lecture Notes in Computer Science. Vol. 572. pp. 1–11. doi:10.1007/3-540-55124-7_1. ISBN 978-3-540-55124-9Gennady Makanin (1,107 words) [view diff] exact match in snippet view article find links to article
equations in a free group". Word Equations and Related Topics. Lecture Notes in Computer Science. Vol. 572. pp. 1–11. doi:10.1007/3-540-55124-7_1. ISBN 978-3-540-55124-9ElGamal encryption (1,467 words) [view diff] exact match in snippet view article find links to article
Decision Diffie-Hellman problem". Algorithmic Number Theory. Lecture Notes in Computer Science. Vol. 1423. pp. 48–63. CiteSeerX 10.1.1.461.9971. doi:10.1007/BFb0054851C. Pandu Rangan (1,223 words) [view diff] exact match in snippet view article find links to article
and Security (SETS), (2005-2007). Member, Editorial Board, Lecture Notes in Computer Science Series (LNCS Series), Springer-Verlag, Germany, (2005-2008)A5/1 (2,725 words) [view diff] exact match in snippet view article find links to article
Cryptanalysis of A5/1 on a PC". Fast Software Encryption—FSE 2000. Lecture Notes in Computer Science. Vol. 1978. pp. 1–18. doi:10.1007/3-540-44706-7_1. ISBN 978-3-540-41728-6Scale-space segmentation (1,199 words) [view diff] exact match in snippet view article find links to article
watershed segmentation" (PDF). Image Analysis and Processing. Lecture Notes in Computer Science. Vol. 1310. pp. 6–13. doi:10.1007/3-540-63507-6_178. ISBN 978-3-540-63507-9Prince (cipher) (1,376 words) [view diff] exact match in snippet view article
Exhaustive Key Search". Advances in Cryptology – CRYPTO '96. Lecture Notes in Computer Science. Vol. 1109. pp. 252–267. doi:10.1007/3-540-68697-5_20.Key encapsulation mechanism (4,176 words) [view diff] exact match in snippet view article find links to article
Ciphertext Attack. Advances in Cryptology – EUROCRYPT 2000. Lecture Notes in Computer Science. Vol. 1807. Bruges, Belgium: Springer. pp. 275–288. doi:10Computational hardness assumption (3,302 words) [view diff] exact match in snippet view article find links to article
Position Paper". Theory of Cryptography Conference (TCC) 2016. Lecture Notes in Computer Science. Vol. 9562. Springer. pp. 505–522. doi:10.1007/978-3-662-49096-9_21Topincs (424 words) [view diff] exact match in snippet view article find links to article
For Topic Maps". Leveraging the Semantics of Topic Maps. Lecture Notes in Computer Science. Vol. 4438. Berlin Heidelberg: Springer. pp. 175–183. doi:10Truthful job scheduling (1,747 words) [view diff] exact match in snippet view article find links to article
Machines". In Diekert, Volker; Habib, Michel (eds.). Stacs 2004. Lecture Notes in Computer Science. Vol. 2996. Berlin, Heidelberg: Springer. pp. 608–619. doi:10Table (information) (1,463 words) [view diff] exact match in snippet view article
Applications of Natural Language to Information Systems (NLDB 2016). Lecture Notes in Computer Science. Vol. 9612. pp. 162–174. doi:10.1007/978-3-319-41754-7_14Massive Online Analysis (803 words) [view diff] exact match in snippet view article find links to article
Data Streams". Advanced Information Systems Engineering. Lecture Notes in Computer Science. Vol. 8188. pp. 480–492. CiteSeerX 10.1.1.638.5472. doi:10Memory-hard function (825 words) [view diff] exact match in snippet view article find links to article
In Boneh, Dan (ed.). Advances in Cryptology - CRYPTO 2003. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. pp. 426–444. doi:10.1007/978-3-540-45146-4_25Alternating step generator (565 words) [view diff] exact match in snippet view article find links to article
Bruijn Sequences". Advances in Cryptology — EUROCRYPT '87. Lecture Notes in Computer Science. Vol. 304. Berlin, Heidelberg: Springer. pp. 5–14. doi:10Orc (programming language) (483 words) [view diff] exact match in snippet view article
Orchestration and Its Semantic Properties. Concurrency Theory. Lecture Notes in Computer Science. Vol. 4137. Bonn, Germany: Springer. pp. 477–491. doi:10.1007/11817949_32Program structure tree (1,164 words) [view diff] exact match in snippet view article find links to article
International Colloquium on Automata, Languages and Programming, Lecture Notes in Computer Science, vol. 443, Springer-Verlag, pp. 598–611, doi:10.1007/BFb0032061Cryptographic multilinear map (1,027 words) [view diff] exact match in snippet view article find links to article
cryptography at high security levels". Cryptography and Coding. Lecture Notes in Computer Science. Vol. 3796. pp. 13–36. doi:10.1007/11586821_2. ISBN 978-3-540-30276-6Galois/Counter Mode (3,101 words) [view diff] exact match in snippet view article find links to article
Systems - CHES 2007 . GCM-AES Architecture Optimized for FPGAs. Lecture Notes in Computer Science. Vol. 4727. Springer. pp. 227–238. doi:10.1007/978-3-540-74735-2_16Flora-2 (786 words) [view diff] exact match in snippet view article find links to article
for Semantic Web, Formal Approaches to Agent-Based Systems, Lecture Notes in Computer Science v. 3228, Springer Verlag. A. D. Lattner , J. D. Gehrke , IKeY (1,928 words) [view diff] exact match in snippet view article find links to article
(2016). Deductive Software Verification – the KeY Book. Lecture Notes in Computer Science. Vol. 10001. doi:10.1007/978-3-319-49812-6. ISBN 978-3-319-49811-9Digital signage (2,517 words) [view diff] exact match in snippet view article find links to article
Campilho, Aurélio (eds.). Image Analysis and Recognition. Lecture Notes in Computer Science. Vol. 5627. Berlin, Heidelberg: Springer. pp. 347–358. doi:10Proof of work (4,099 words) [view diff] exact match in snippet view article find links to article
Combatting Junk Mail". Advances in Cryptology — CRYPTO' 92. Lecture Notes in Computer Science. Vol. 740. Springer. pp. 139–147. doi:10.1007/3-540-48071-4_10Semantics (computer science) (1,672 words) [view diff] exact match in snippet view article
computation". Category Theory Applied to Computation and Control. Lecture Notes in Computer Science. Vol. 25. Springer. pp. 151–163. doi:10.1007/3-540-07142-3_75Inductive programming (2,557 words) [view diff] exact match in snippet view article find links to article
Programming and Beyond; Essays in Honour of Robert A. Kowalski. Lecture Notes in Computer Science. Vol. LNAI 2407. pp. 310–346. doi:10.1007/3-540-45628-7_13Pseudotriangle (2,058 words) [view diff] exact match in snippet view article find links to article
of Software Technology and Theoretical Computer Science, Lecture Notes in Computer Science, vol. 3328, Springer-Verlag, pp. 299–310, arXiv:0705.3888Dense subgraph (1,897 words) [view diff] exact match in snippet view article find links to article
Saarbrücken, Germany, September 5-8, 2000, Proceedings, Lecture Notes in Computer Science, vol. 1913, Springer, pp. 84–95, doi:10.1007/3-540-44436-X_10Apache Lucene (1,251 words) [view diff] exact match in snippet view article find links to article
Castells, Pablo (eds.), Advances in Information Retrieval, Lecture Notes in Computer Science, vol. 12036, Cham: Springer International Publishing, pp. 28–34Ron Rivest (1,545 words) [view diff] exact match in snippet view article find links to article
Theory, Reykjavík, Iceland, July 3–5, 1996, Proceedings. Lecture Notes in Computer Science. Vol. 1097. Springer. pp. 368–379. doi:10.1007/3-540-61422-2_146Server-based signatures (1,187 words) [view diff] exact match in snippet view article find links to article
Signatures". Advances in Cryptology – CRYPTO' 89 Proceedings. Lecture Notes in Computer Science. Vol. 435. p. 263. doi:10.1007/0-387-34805-0_24. ISBN 978-0-387-97317-3Lattice problem (3,660 words) [view diff] exact match in snippet view article find links to article
Extreme Pruning". Advances in Cryptology – EUROCRYPT 2010. Lecture Notes in Computer Science. Vol. 6110. Springer, Berlin, Heidelberg. pp. 257–278. doi:10Özalp Babaoğlu (1,240 words) [view diff] exact match in snippet view article find links to article
Peer-to-Peer Applications", Engineering Self-Organising Systems, Lecture Notes in Computer Science, vol. 2977, Berlin, Heidelberg: Springer Berlin HeidelbergSemantic similarity (4,246 words) [view diff] exact match in snippet view article find links to article
International Conference on Geospatial Semantics (GEOS 2007). Lecture Notes in Computer Science. 2007. pp. 128–145. CiteSeerX 10.1.1.172.5544. "Geo-Net-PTFeature engineering (2,202 words) [view diff] exact match in snippet view article find links to article
(PDF). Principles of Data Mining and Knowledge Discovery. Lecture Notes in Computer Science. Vol. 1704. pp. 378–383. doi:10.1007/978-3-540-48247-5_46TWINKLE (695 words) [view diff] exact match in snippet view article find links to article
Christof (eds.). Cryptographic Hardware and Embedded Systems. Lecture Notes in Computer Science. Vol. 1717. Berlin, Heidelberg: Springer. pp. 2–12. doi:10Threshold cryptosystem (868 words) [view diff] exact match in snippet view article find links to article
Gilles (ed.). Advances in Cryptology — CRYPTO' 89 Proceedings. Lecture Notes in Computer Science. Vol. 435. New York, NY: Springer. pp. 307–315. doi:10.1007/0-387-34805-0_28Contrail (software) (566 words) [view diff] exact match in snippet view article
Contrail". Euro-Par 2011: Parallel Processing Workshops. Lecture Notes in Computer Science. Vol. 7155. pp. 159–168. doi:10.1007/978-3-642-29737-3_19Linguistic Linked Open Data (3,697 words) [view diff] exact match in snippet view article find links to article
Conference, Sydney, NSW, Australia, October 21–25, 2013. Lecture Notes in Computer Science. Vol. 7908. Berlin, Heidelberg: Springer. pp. 98–113. doi:10Contrail (software) (566 words) [view diff] exact match in snippet view article
Contrail". Euro-Par 2011: Parallel Processing Workshops. Lecture Notes in Computer Science. Vol. 7155. pp. 159–168. doi:10.1007/978-3-642-29737-3_19Random subspace method (969 words) [view diff] exact match in snippet view article find links to article
neighbors in random subspaces". Advances in Pattern Recognition. Lecture Notes in Computer Science. Vol. 1451. pp. 640–648. doi:10.1007/BFb0033288. ISBN 978-3-540-64858-1Paulo S. L. M. Barreto (833 words) [view diff] exact match in snippet view article find links to article
Identity-Based Signatures and Signcryption from Bilinear Maps. Lecture Notes in Computer Science. Vol. 3788. pp. 515–532. doi:10.1007/11593447_28. ISBN 978-3-540-30684-9School timetable (1,074 words) [view diff] exact match in snippet view article find links to article
Programming, Artificial Intelligence, and Operations Research. Lecture Notes in Computer Science. Vol. 12296. Springer International Publishing. pp. 283–299Knowledge graph (2,499 words) [view diff] exact match in snippet view article find links to article
Integrated Knowledge Graph". The Semantic Web – ISWC 2020. Lecture Notes in Computer Science. Vol. 12507. pp. 430–446. doi:10.1007/978-3-030-62466-8_27Hartmut Ehrig (721 words) [view diff] exact match in snippet view article find links to article
Graph-Grammars and Their Application to Computer Science and Biology. Lecture Notes in Computer Science. Vol. 73. Heidelberg: Springer. pp. 270–283. doi:10.1007/BFb0025726Elliptic-curve Diffie–Hellman (2,168 words) [view diff] exact match in snippet view article find links to article
2006. Lecture Notes in Computer Science. Vol. 3958. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds) Public Key Cryptography - PKC 2006. Lecture NotesRoland Carl Backhouse (757 words) [view diff] exact match in snippet view article find links to article
Programming (AFP 98),12–19 September 1998 Braga Portugal]. Lecture Notes in Computer Science. Vol. 1608. pp. 28–115. doi:10.1007/10704973_2. ISBN 978-3-540-66241-9IEC 62682 (382 words) [view diff] exact match in snippet view article find links to article
Management of Information. Information and Knowledge in Context. Lecture Notes in Computer Science. Vol. 9173. Cham: Springer International Publishing. pp. 549–556Piling-up lemma (1,445 words) [view diff] exact match in snippet view article find links to article
for DES Cipher". Advances in Cryptology – EUROCRYPT '93. Lecture Notes in Computer Science. Vol. 765. pp. 386–397. doi:10.1007/3-540-48285-7_33. ISBN 978-3-540-57600-6Proof of secure erasure (632 words) [view diff] exact match in snippet view article find links to article
Computable Self-erasing Functions". Theory of Cryptography. Lecture Notes in Computer Science. Vol. 6597. pp. 125–143. doi:10.1007/978-3-642-19571-6_9.Patricia Bouyer-Decitre (470 words) [view diff] exact match in snippet view article find links to article
Software Technology and Theoretical Computer Science (PDF), Lecture Notes in Computer Science, vol. 3328, Springer, pp. 148–160, doi:10.1007/978-3-540-30538-5_13SMP (computer algebra system) (593 words) [view diff] exact match in snippet view article
Jenks, "A Primer: 11 Keys to New Scratchpad", EUROSAM 84, Lecture Notes in Computer Science 174 ISBN 354013350X p. 123-142 J.H. Davenport, Y. Siret, ECooperating Validity Checker (2,006 words) [view diff] exact match in snippet view article find links to article
Kovács, Laura; Pattinson, Dirk (eds.). Automated Reasoning. Lecture Notes in Computer Science. Vol. 13385. Cham: Springer International Publishing. pp. 15–35PRESENT (708 words) [view diff] exact match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems - CHES 2007. Lecture Notes in Computer Science. Vol. 4727. pp. 450–466. doi:10.1007/978-3-540-74735-2_31Heavy-light decomposition (1,017 words) [view diff] exact match in snippet view article find links to article
trees", Algorithms and data structures (Ottawa, ON, 1991), Lecture Notes in Computer Science, vol. 519, Berlin: Springer, pp. 32–40, doi:10.1007/BFb0028247Osman Yaşar (445 words) [view diff] exact match in snippet view article find links to article
Workforce and Pedagogy to Improve Math and Science Education,” Lecture Notes in Computer Science, Vol. 3992 (2006), pp. 169–176. O. Yaşar, J. Maliekal, L.UpStage (1,499 words) [view diff] exact match in snippet view article find links to article
Paolo; Urban, Bodo (eds.). Transactions on Edutainment X. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. pp. 146–160. doi:10.1007/978-3-642-37919-2_8Set packing (1,514 words) [view diff] exact match in snippet view article find links to article
International Colloquium on Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 1443. Springer-Verlag. pp. 176–185. Halldórsson, MagnusFisher kernel (852 words) [view diff] exact match in snippet view article find links to article
Petros; Paragios, Nikos (eds.). Computer Vision – ECCV 2010. Lecture Notes in Computer Science. Vol. 6314. Berlin, Heidelberg: Springer. pp. 143–156. doi:10Global Digital Mathematics Library (274 words) [view diff] exact match in snippet view article find links to article
CICM 2017, Edinburgh, UK, July 17-21, 2017, Proceedings, Lecture Notes in Computer Science, vol. 10383, Springer, pp. 56–69, doi:10.1007/978-3-319-62075-6_5Philippe Baptiste (4,439 words) [view diff] exact match in snippet view article find links to article
Principles and Practice of Constraint Programming – CP 2009, Lecture Notes in Computer Science, vol. 5732, Berlin, Heidelberg: Springer Berlin HeidelbergInformation Processing in Medical Imaging (1,634 words) [view diff] exact match in snippet view article find links to article
Medical Imaging - 12th | Alan C.F. Colchester | Springer. Lecture Notes in Computer Science. Springer. 1991. ISBN 9783540542469. Barrett, Harrison H.McEliece cryptosystem (2,093 words) [view diff] exact match in snippet view article find links to article
Fourier sampling attacks. Advances in cryptology—CRYPTO 2011. Lecture Notes in Computer Science. Vol. 6841. Heidelberg: Springer. pp. 761–779. doi:10ESC/Java (928 words) [view diff] exact match in snippet view article find links to article
2001: Formal Methods for Increasing Software Productivity. Lecture Notes in Computer Science. Vol. 2021. pp. 500–517. doi:10.1007/3-540-45251-6_29. ISBN 3-540-41791-5Prolog (8,156 words) [view diff] exact match in snippet view article find links to article
Contexts". Declarative Programming for Knowledge Management. Lecture Notes in Computer Science. Vol. 4369. pp. 38–47. doi:10.1007/11963578_4. ISBN 978-3-540-69233-1Urban informatics (3,303 words) [view diff] exact match in snippet view article find links to article
Cities Technologies, Experiences, and Future Perspectives. Lecture Notes in Computer Science. Vol. 1765. Berlin: Springer. doi:10.1007/3-540-46422-0.Searchable symmetric encryption (2,441 words) [view diff] exact match in snippet view article find links to article
Moti (eds.). Applied Cryptography and Network Security. Lecture Notes in Computer Science. Vol. 3531. Berlin, Heidelberg: Springer. pp. 442–455. doi:10Markovian arrival process (1,008 words) [view diff] exact match in snippet view article find links to article
Performance Evaluation of Computer and Communication Systems. Lecture Notes in Computer Science. Vol. 729. pp. 330–358. doi:10.1007/BFb0013859. ISBN 3-540-57297-XCongestion game (7,359 words) [view diff] exact match in snippet view article find links to article
Kontogiannis, Spyros (eds.). Internet and Network Economics. Lecture Notes in Computer Science. Vol. 4286. Berlin, Heidelberg: Springer. pp. 87–98. doi:10Inheritance (object-oriented programming) (3,857 words) [view diff] exact match in snippet view article
European Conference on Object-Oriented Programming (ECOOP). Lecture Notes in Computer Science. Vol. 1445. Springer. pp. 355–382. doi:10.1007/BFb0054099RC2 (438 words) [view diff] exact match in snippet view article find links to article
Qing, S. (eds.). Information and Communications Security. Lecture Notes in Computer Science. Vol. 1334. Springer, Berlin, Heidelberg. pp. 233–246. doi:10Anomaly detection (4,439 words) [view diff] exact match in snippet view article find links to article
Spaces. Principles of Data Mining and Knowledge Discovery. Lecture Notes in Computer Science. Vol. 2431. p. 15. doi:10.1007/3-540-45681-3_2. ISBN 978-3-540-44037-6Ontology (information science) (6,237 words) [view diff] exact match in snippet view article
NSW, Australia, October 21–25, 2013, Proceedings, Part I. Lecture Notes in Computer Science. Vol. 8218. Berlin: Springer. pp. 117–134. doi:10.1007/978-3-642-41335-3_8SHA-2 (4,937 words) [view diff] exact match in snippet view article find links to article
(2008), New collision attacks against up to 24-step SHA-2, Lecture Notes in Computer Science, vol. 5365, Springer-Verlag, pp. 91–103, doi:10.1007/978-3-540-89754-5_8Perfect matching (951 words) [view diff] exact match in snippet view article find links to article
Wegener, Ingo (eds.). Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 4051. Berlin, Heidelberg: Springer. pp. 453–464. doi:10Ball tree (1,414 words) [view diff] exact match in snippet view article find links to article
Similar Patches in Images?". Computer Vision – ECCV 2008 (PDF). Lecture Notes in Computer Science. Vol. 5303. p. 364. CiteSeerX 10.1.1.360.7582. doi:10Envy-free pricing (2,559 words) [view diff] exact match in snippet view article find links to article
Walukiewicz, Igor (eds.). Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 5125. Springer Berlin Heidelberg. pp. 808–819. CiteSeerX 10Deepak Kapur (1,936 words) [view diff] exact match in snippet view article find links to article
specifications". 9th International Conference on Automated Deduction. Lecture Notes in Computer Science. Vol. 310. Springer, Berlin, Heidelberg. pp. 162–181. doi:10Mutilated chessboard problem (2,887 words) [view diff] exact match in snippet view article find links to article
2010, Nha Trang, Vietnam, July 19–21, 2010, Proceedings, Lecture Notes in Computer Science, vol. 6196, Springer, pp. 288–297, arXiv:1103.3309, doi:10Aircrack-ng (4,956 words) [view diff] exact match in snippet view article find links to article
Attack on TKIP", Identity and Privacy in the Internet Age, Lecture Notes in Computer Science, vol. 5838, Berlin, Heidelberg: Springer Berlin HeidelbergAircrack-ng (4,956 words) [view diff] exact match in snippet view article find links to article
Attack on TKIP", Identity and Privacy in the Internet Age, Lecture Notes in Computer Science, vol. 5838, Berlin, Heidelberg: Springer Berlin HeidelbergSoftware diversity (818 words) [view diff] exact match in snippet view article find links to article
(2011), "Diversity", Dependable and Historic Computing, Lecture Notes in Computer Science, vol. 6875, Springer Berlin Heidelberg, pp. 298–312, doi:10Uniform-machines scheduling (1,767 words) [view diff] exact match in snippet view article find links to article
Machines". In Diekert, Volker; Habib, Michel (eds.). Stacs 2004. Lecture Notes in Computer Science. Vol. 2996. Berlin, Heidelberg: Springer. pp. 608–619. doi:10State complexity (3,392 words) [view diff] exact match in snippet view article find links to article
Automata". Mathematical Foundations of Computer Science 2005. Lecture Notes in Computer Science. Vol. 3618. pp. 544–555. doi:10.1007/11549345_47. ISBN 978-3-540-28702-5Achterbahn (stream cipher) (532 words) [view diff] exact match in snippet view article
Encryption, 14th International Workshop. Revised Selected Papers, Lecture Notes in Computer Science. Vol. 4593. Luxembourg: Springer. pp. 73–86. ISBN 978-3-540-74617-1Product-form solution (1,817 words) [view diff] exact match in snippet view article find links to article
and Product Form". Applications and Theory of Petri Nets. Lecture Notes in Computer Science. Vol. 5606. p. 103. CiteSeerX 10.1.1.745.1585. doi:10Markus Jakobsson (1,247 words) [view diff] exact match in snippet view article find links to article
Trustworthy Elections: New Directions in Electronic Voting (Lecture Notes in Computer Science / Security and Cryptology), David Chaum, Markus JakobssonNP-intermediate (1,547 words) [view diff] exact match in snippet view article find links to article
JELIA 2002, Cosenza, Italy, September, 23-26, Proceedings. Lecture Notes in Computer Science. Vol. 2424. Springer. pp. 549–564. doi:10.1007/3-540-45757-7_53Ring signature (1,950 words) [view diff] exact match in snippet view article find links to article
Leak a Secret". Advances in Cryptology — ASIACRYPT 2001. Lecture Notes in Computer Science. Vol. 2248. pp. 552–565. doi:10.1007/3-540-45682-1_32.Security level (1,626 words) [view diff] exact match in snippet view article find links to article
precomputation" (PDF). Advances in Cryptology - ASIACRYPT 2013. Lecture Notes in Computer Science. pp. 321–340. doi:10.1007/978-3-642-42045-0_17. ISBN 978-3-642-42044-3Device fingerprint (3,907 words) [view diff] exact match in snippet view article find links to article
Atallah MJ, Hopper NJ (eds.). Privacy Enhancing Technologies. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 1–18. ISBN 978-3-642-14527-8Belief–desire–intention software model (2,132 words) [view diff] exact match in snippet view article find links to article
Knowledge-Based Intelligent Information and Engineering Systems. Lecture Notes in Computer Science. Vol. 3683. pp. 282–288. doi:10.1007/11553939_41. ISBN 978-3-540-28896-1Matrix analytic method (912 words) [view diff] exact match in snippet view article find links to article
Performance Evaluation of Complex Systems: Techniques and Tools. Lecture Notes in Computer Science. Vol. 2459. pp. 36. doi:10.1007/3-540-45798-4_3. ISBN 978-3-540-44252-3Zooko Wilcox-O'Hearn (737 words) [view diff] exact match in snippet view article find links to article
as MD5" (PDF). Applied Cryptography and Network Security. Lecture Notes in Computer Science. Vol. 7954. IACR. pp. 119–135. doi:10.1007/978-3-642-38980-1_8Shape analysis (program analysis) (1,034 words) [view diff] exact match in snippet view article
Analysis for Recursive Programs" (PDF). Compiler Construction. Lecture Notes in Computer Science. Vol. 2027. pp. 133–149. doi:10.1007/3-540-45306-7_10.Monadic second-order logic (1,308 words) [view diff] exact match in snippet view article find links to article
Are Computable with Linear Delay". Computer Science Logic. Lecture Notes in Computer Science. 4207. Springer Berlin Heidelberg: 167–181. doi:10.1007/11874683_11HipNav (172 words) [view diff] exact match in snippet view article find links to article
Computing and Computer-Assisted Intervention – MICCAI 2000. Lecture Notes in Computer Science. Vol. 1935. pp. 1185–7. doi:10.1007/978-3-540-40899-4_126SecPAL (440 words) [view diff] exact match in snippet view article find links to article
Mathuria (eds.). Information Systems Security. ICISS 2010. Lecture Notes in Computer Science. Vol. 6503. Berlin; Heidelberg: Springer. pp. 125–139. doi:10Barrier resilience (1,083 words) [view diff] exact match in snippet view article find links to article
Rhodes, Greece, July 10-11, 2009, Revised Selected Papers, Lecture Notes in Computer Science, vol. 5804, Springer, pp. 29–40, Bibcode:2009LNCS.5304...29BJutta Treviranus (5,359 words) [view diff] exact match in snippet view article find links to article
Interaction. Design and Development Methods for Universal Access. Lecture Notes in Computer Science. Vol. 8513. Springer International Publishing. pp. 191–202Klaus Pohl (computer scientist) (725 words) [view diff] exact match in snippet view article
1st European Conference ServiceWave 2008, Volume 5377 of Lecture Notes in Computer Science, Berlin, Heidelberg, Springer, 2008. Klaus Pohl, Patrick HeymansElliptic curve point multiplication (4,039 words) [view diff] exact match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems – CHES 2014. Lecture Notes in Computer Science. Vol. 8731. Springer. pp. 72–95. doi:10.1007/978-3-662-44709-3_5Feedback vertex set (1,805 words) [view diff] exact match in snippet view article find links to article
Number". In Kaplan, Haim (ed.). Algorithm Theory - SWAT 2010. Lecture Notes in Computer Science. Vol. 6139. Berlin, Heidelberg: Springer. pp. 81–92. Bibcode:2010LNCSCourcelle's theorem (3,146 words) [view diff] exact match in snippet view article find links to article
(eds.), Proc. 18th Annual European Symposium on Algorithms, Lecture Notes in Computer Science, vol. 6346, Springer, pp. 549–560, doi:10.1007/978-3-642-15775-2_47ETAPS International Joint Conferences on Theory and Practice of Software (767 words) [view diff] exact match in snippet view article find links to article
Robinet, Bernard; Wilhelm, Reinhard, eds. (1986). Esop 86. Lecture Notes in Computer Science. Vol. 213. doi:10.1007/3-540-16442-1. ISBN 978-3-540-16442-5Curve25519 (1,824 words) [view diff] exact match in snippet view article find links to article
Public Key Cryptography - PKC 2006. Public Key Cryptography. Lecture Notes in Computer Science. Vol. 3958. New York: Springer. pp. 207–228. doi:10.1007/11745853_14RSA cryptosystem (8,481 words) [view diff] exact match in snippet view article find links to article
with RSA and Rabin. Advances in Cryptology—EUROCRYPT ’96. Lecture Notes in Computer Science. Springer. pp. 399–416. doi:10.1007/3-540-68339-9_34. ISBN 978-3-540-61186-8Area (graph drawing) (937 words) [view diff] exact match in snippet view article
2002, Irvine, CA, USA, August 26–28, 2002, Revised Papers, Lecture Notes in Computer Science, vol. 2528, Springer, pp. 54–65, doi:10.1007/3-540-36151-0_6Deterministic finite automaton (3,736 words) [view diff] exact match in snippet view article find links to article
Theoretical Results and Applications. ICGI 2010. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Vol. 6339. pp. 66–79. doi:10.1007/978-3-642-15488-1_7Neighbor joining (2,889 words) [view diff] exact match in snippet view article find links to article
reconstruction", pp. 101–110. In Jiang, T., and Lee, D., eds., Lecture Notes in Computer Science, 1276, Springer-Verlag, Berlin. COCOON '97. Mihaescu R, LevyNorman Paton (1,101 words) [view diff] exact match in snippet view article find links to article
Model database". Advances in Database Technology—EDBT '88. Lecture Notes in Computer Science. Vol. 303. p. 34. doi:10.1007/3-540-19074-0_46. ISBN 978-3-540-19074-5Evolvable hardware (799 words) [view diff] exact match in snippet view article find links to article
with physics". Evolvable Systems: From Biology to Hardware. Lecture Notes in Computer Science. Vol. 1259. pp. 390–405. CiteSeerX 10.1.1.50.9691. doi:10GroupLens Research (3,183 words) [view diff] exact match in snippet view article find links to article
Development. Asia-Pacific Conference on Web Intelligence. Lecture Notes in Computer Science. Vol. 2198/2001. Springer Berlin/Heidelberg. pp. 438–442.Genetic programming (3,547 words) [view diff] exact match in snippet view article find links to article
Discovery". Parallel Problem Solving from Nature PPSN VI. Lecture Notes in Computer Science. Vol. 1917. Springer. pp. 211–220. doi:10.1007/3-540-45356-3_21Strong RSA assumption (228 words) [view diff] exact match in snippet view article find links to article
(eds) Advances in Cryptology – EUROCRYPT ’97. EUROCRYPT 1997. Lecture Notes in Computer Science, vol 1233. Springer, Berlin, Heidelberg. doi:10.1007/3-540-69053-0_33Area (graph drawing) (937 words) [view diff] exact match in snippet view article
2002, Irvine, CA, USA, August 26–28, 2002, Revised Papers, Lecture Notes in Computer Science, vol. 2528, Springer, pp. 54–65, doi:10.1007/3-540-36151-0_6Strong RSA assumption (228 words) [view diff] exact match in snippet view article find links to article
(eds) Advances in Cryptology – EUROCRYPT ’97. EUROCRYPT 1997. Lecture Notes in Computer Science, vol 1233. Springer, Berlin, Heidelberg. doi:10.1007/3-540-69053-0_33International Conference on Computational Intelligence Methods for Bioinformatics and Biostatistics (927 words) [view diff] exact match in snippet view article find links to article
Intelligence Methods for Bioinformatics and Biostatistics. Lecture Notes in Computer Science. Vol. 7548. Springer. pp. 238–252. doi:10.1007/978-3-642-35686-5_20Mathias Payer (1,605 words) [view diff] exact match in snippet view article find links to article
of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science. Vol. 9148. pp. 144–164. doi:10.1007/978-3-319-20550-2_8.Uplift modelling (2,172 words) [view diff] exact match in snippet view article find links to article
Uplift Modeling". Advanced Information Systems Engineering. Lecture Notes in Computer Science. Vol. 8190. Prague. pp. 595–611. doi:10.1007/978-3-642-40994-3_38Abstract interpretation (2,924 words) [view diff] exact match in snippet view article find links to article
Programming Language Implementation and Logic Programming (PLILP). Lecture Notes in Computer Science. Vol. 631. Springer. pp. 269–296. ISBN 978-0-387-55844-8.Binary decision diagram (3,108 words) [view diff] exact match in snippet view article find links to article
Conference on Principles and Practice of Constraint Programming. Lecture Notes in Computer Science. Vol. 3258. Springer. p. 816. doi:10.1007/978-3-540-30201-8_94Unicheck (760 words) [view diff] exact match in snippet view article find links to article
System". Natural Language Processing and Information Systems. Lecture Notes in Computer Science. Vol. 10260. Springer, Cham. pp. 227–231. doi:10.1007/978-3-319-59569-6_27Romeo Model Checker (159 words) [view diff] exact match in snippet view article find links to article
Conference on Computer Aided Verification (CAV'05), volume 3576 of Lecture Notes in Computer Science, pages 418-423, Edinburgh, Scotland, UK, July 2005. SpringerDoll fetishism (220 words) [view diff] exact match in snippet view article find links to article
Li, Dongyu; Perez-Osorio, Jairo (eds.). Social Robotics. Lecture Notes in Computer Science. Vol. 13086. Cham: Springer International Publishing. pp. 130–141Data augmentation (1,838 words) [view diff] exact match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems – CHES 2017. Lecture Notes in Computer Science. Vol. 10529. Cham: Springer International Publishing. pp. 45–68Data-flow analysis (3,562 words) [view diff] exact match in snippet view article find links to article
SAS'99, Venice, Italy, September 22–24, 1999, Proceedings. Lecture Notes in Computer Science. Vol. 1694 (illustrated ed.). Springer. pp. 232–247 [233]MilkyWay@home (2,639 words) [view diff] exact match in snippet view article find links to article
Grids". Distributed Applications and Interoperable Systems. Lecture Notes in Computer Science. Vol. 6115. pp. 29–41. doi:10.1007/978-3-642-13645-0_3.Böhm tree (1,874 words) [view diff] exact match in snippet view article find links to article
labelled λ-calculus". λ-Calculus and Computer Science Theory. Lecture Notes in Computer Science. Vol. 37. pp. 147–165. doi:10.1007/BFb0029523. ISBN 3-540-07416-3Optical braille recognition (716 words) [view diff] exact match in snippet view article find links to article
Robust Braille Recognition System". Document Analysis Systems. Lecture Notes in Computer Science. Vol. VI. pp. 533–545. doi:10.1007/978-3-540-28640-0_50.Constrained Horn clauses (611 words) [view diff] exact match in snippet view article find links to article
Constantin; Lal, Akash (eds.). Computer Aided Verification. Lecture Notes in Computer Science. Cham: Springer Nature Switzerland. pp. 209–223. doi:10Marijn Heule (635 words) [view diff] exact match in snippet view article find links to article
Conference, Bordeaux, France, July 5-8, 2016, Proceedings. Lecture Notes in Computer Science. Vol. 9710. pp. 228–245. arXiv:1605.00723. doi:10.1007/978-3-319-40970-2_15Jayadev Misra (1,066 words) [view diff] exact match in snippet view article find links to article
Course. A Decade of Concurrency Reflections and Perspectives. Lecture Notes in Computer Science (LNCS). Vol. 803. Springer, Berlin, Heidelberg. p. 352. doi:10BLAST model checker (386 words) [view diff] exact match in snippet view article find links to article
Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science. Vol. 7214. Springer-Verlag. pp. 525–527. ISBN 978-3-642-28756-5Budget-feasible mechanism (252 words) [view diff] exact match in snippet view article find links to article
Viola, Alfredo (eds.). LATIN 2014: Theoretical Informatics. Lecture Notes in Computer Science. Vol. 8392. Berlin, Heidelberg: Springer. pp. 719–730. arXiv:1302Artificial psychology (710 words) [view diff] exact match in snippet view article find links to article
Psychology". In Smith, Michael J.; Salvendy, Gavriel (eds.). Lecture Notes in Computer Science. Vol. 4557. Springer Berlin Heidelberg. pp. 208–217. doi:10Keystroke-level model (2,803 words) [view diff] exact match in snippet view article find links to article
Jacko, Julie A (ed.). Human-Computer Interaction. New Trends. Lecture Notes in Computer Science. Vol. 5610. Berlin Heidelberg: Springer-Verlag. p. 355. doi:10Arc diagram (2,597 words) [view diff] exact match in snippet view article find links to article
WA, USA, September 19–21, 2012, Revised Selected Papers, Lecture Notes in Computer Science, vol. 7704, Springer, pp. 150–161, doi:10.1007/978-3-642-36763-2_14Rational monoid (633 words) [view diff] exact match in snippet view article find links to article
to Symeon Bozapalidis on the occasion of his retirement. Lecture Notes in Computer Science. Vol. 7020. Berlin: Springer-Verlag. pp. 228–256. ISBN 978-3-642-24896-2C Bounded Model Checker (744 words) [view diff] exact match in snippet view article find links to article
Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. pp. 168–176. doi:10.1007/978-3-540-24730-2_15Language-oriented programming (485 words) [view diff] exact match in snippet view article find links to article
in Language Workbenches". Software Language Engineering. Lecture Notes in Computer Science. Vol. 8225. pp. 197–217. doi:10.1007/978-3-319-02654-1_11Asiddhatva (1,594 words) [view diff] exact match in snippet view article find links to article
Model of Aṣṭādhyāyī". Sanskrit Computational Linguistics. Lecture Notes in Computer Science. Vol. 6465. p. 1. doi:10.1007/978-3-642-17528-2_18. ISBN 978-3-642-17527-5TLA+ (4,068 words) [view diff] exact match in snippet view article find links to article
Correct Hardware Design and Verification Methods (PDF). Lecture Notes in Computer Science. Vol. 1703. Springer-Verlag. pp. 54–66. doi:10.1007/3-540-48153-2_6Property Specification Language (1,412 words) [view diff] exact match in snippet view article find links to article
Logic on Truncated Paths" (PDF). Computer Aided Verification. Lecture Notes in Computer Science. Vol. 2725. p. 27. doi:10.1007/978-3-540-45069-6_3. ISBN 978-3-540-40524-5Jon Lee (mathematician) (413 words) [view diff] exact match in snippet view article
2012), Integer Programming and Combinatorial Optimization (Lecture Notes in Computer Science, Vol. 8494; Springer, 2014), Special Issue: Integer ProgrammingDorothea Wagner (641 words) [view diff] exact match in snippet view article find links to article
Dorothea, eds. (2001), Drawing Graphs: Methods and Models, Lecture Notes in Computer Science, vol. 2025, Springer, doi:10.1007/3-540-44969-8, ISBN 9783540420620Boolean satisfiability problem (4,820 words) [view diff] exact match in snippet view article find links to article
Principles and Practice of Constraint Programming – CP 2007, Lecture Notes in Computer Science, vol. 4741, pp. 544–558, CiteSeerX 10.1.1.70.5471, doi:10Poly1305 (2,532 words) [view diff] exact match in snippet view article find links to article
Software Encryption: 12th international workshop. FSE 2005. Lecture Notes in Computer Science. Paris, France: Springer. doi:10.1007/11502760_3. ISBN 3-540-26541-4Interactive computation (195 words) [view diff] exact match in snippet view article find links to article
Persistent Turing Machines as a model of interactive computation. Lecture Notes in Computer Science 1762, pp. 116-135. D. Goldin, S. Smolka, P. Attie, E. SondereggerGad Landau (1,254 words) [view diff] exact match in snippet view article find links to article
on Trees and Tree-Like Structures". Algorithms – ESA 2013. Lecture Notes in Computer Science. Vol. 8125. pp. 517–528. arXiv:1301.6127. doi:10.1007/978-3-642-40450-4_44Quotient type (656 words) [view diff] exact match in snippet view article find links to article
Clarke, Edmund; Kozen, Dexter (eds.). Logics of Programs. Lecture Notes in Computer Science. Vol. 164. Berlin, Heidelberg: Springer. pp. 116–128. doi:10Microsoft SEAL (515 words) [view diff] exact match in snippet view article find links to article
Thomas (eds.). Advances in Cryptology – ASIACRYPT 2017. Lecture Notes in Computer Science. Vol. 10624. Cham: Springer International Publishing. pp. 409–437Verifiable random function (1,501 words) [view diff] exact match in snippet view article find links to article
Palash (eds.). Advances in Cryptology - ASIACRYPT 2013. Lecture Notes in Computer Science. Vol. 8270. Berlin, Heidelberg: Springer. pp. 280–300. doi:10Folksonomy (3,215 words) [view diff] exact match in snippet view article find links to article
R; Ausloos, M. (2005). Computational Science – ICCS 2006. Lecture Notes in Computer Science. Vol. 3993. pp. 1114–1117. arXiv:cs.DS/0512090. doi:10.1007/11758532_152Specification and Description Language (1,106 words) [view diff] exact match in snippet view article find links to article
Diagrams". SDL 2013: Model-Driven Dependability Engineering. Lecture Notes in Computer Science. Vol. 7916. Springer Berlin Heidelberg. pp. 258–274. doi:10Spoofing attack (2,672 words) [view diff] exact match in snippet view article find links to article
Computer Security, Copenhagen, Denmark, September 26–30, 2022. Lecture Notes in Computer Science. Vol. 13556. pp. 535–553. doi:10.1007/978-3-031-17143-7_26All-or-nothing transform (627 words) [view diff] exact match in snippet view article find links to article
All-or-Nothing Transform". Advances in Cryptology — CRYPTO' 99. Lecture Notes in Computer Science. Vol. 1666. pp. 503–518. doi:10.1007/3-540-48405-1_32.Long short-term memory (5,856 words) [view diff] exact match in snippet view article find links to article
Structure of the Blues". Artificial Neural Networks — ICANN 2002. Lecture Notes in Computer Science. Vol. 2415. Springer, Berlin, Heidelberg. pp. 284–289. CiteSeerX 10All-or-nothing transform (627 words) [view diff] exact match in snippet view article find links to article
All-or-Nothing Transform". Advances in Cryptology — CRYPTO' 99. Lecture Notes in Computer Science. Vol. 1666. pp. 503–518. doi:10.1007/3-540-48405-1_32.Dynamic convex hull (769 words) [view diff] exact match in snippet view article find links to article
upper envelopes", Algorithms and Data Structures (WADS 2005), Lecture Notes in Computer Science, vol. 3608, Berlin: Springer, pp. 269–281, doi:10.1007/11534273_24Group-based cryptography (355 words) [view diff] exact match in snippet view article find links to article
on the Word Problem". Advances in Cryptology—CRYPTO 1984. Lecture Notes in Computer Science. Vol. 196. Springer. pp. 19–36. doi:10.1007/3-540-39568-7_3Undeniable signature (912 words) [view diff] exact match in snippet view article find links to article
Signatures". Advances in Cryptology — CRYPTO' 89 Proceedings. Lecture Notes in Computer Science. Vol. 435. pp. 212–216. doi:10.1007/0-387-34805-0_20. ISBN 978-0-387-97317-3Prêt à Voter (1,192 words) [view diff] exact match in snippet view article find links to article
Election Scheme", Computer Security – ESORICS 2005 (PDF), Lecture Notes in Computer Science, vol. 3679, pp. 118–139, doi:10.1007/11555827_8, ISBN 978-3-540-28963-0Rijnland Internet Election System (333 words) [view diff] exact match in snippet view article find links to article
Abolishment". Foundations of Security Analysis and Design V. Lecture Notes in Computer Science. Vol. 5705. p. 121. doi:10.1007/978-3-642-03829-7_4. ISBN 978-3-642-03828-0Graph reduction machine (324 words) [view diff] exact match in snippet view article find links to article
Functional Programming Languages and Computer Architecture. Lecture Notes in Computer Science. Vol. 274. Berlin, Heidelberg: Springer. pp. 98–112. doi:10Arthur Zimek (572 words) [view diff] exact match in snippet view article find links to article
Dimensionality?". Scientific and Statistical Database Management. Lecture Notes in Computer Science. Vol. 6187. Springer, Berlin, Heidelberg. pp. 482–500. CiteSeerX 10Cryptosystem (497 words) [view diff] exact match in snippet view article find links to article
Steinfeld, Ron (eds.). Information Security and Privacy. Lecture Notes in Computer Science. Vol. 9723. Cham: Springer International Publishing. pp. 73–86Infinite chess (805 words) [view diff] exact match in snippet view article find links to article
of Infinite Chess is Decidable". How the World Computes. Lecture Notes in Computer Science. Vol. 7318. Springer. pp. 78–88. arXiv:1201.5597. doi:10Evolution strategy (2,057 words) [view diff] exact match in snippet view article find links to article
information". Parallel Problem Solving from Nature — PPSN III. Lecture Notes in Computer Science. Vol. 866. Springer. pp. 189–198. doi:10.1007/3-540-58484-6_263Infer Static Analyzer (783 words) [view diff] exact match in snippet view article find links to article
Verifier for Memory Safety of C Programs". NASA Formal Methods. Lecture Notes in Computer Science. Vol. 6617. Springer, Berlin, Heidelberg. pp. 459–465. CiteSeerX 10Long short-term memory (5,856 words) [view diff] exact match in snippet view article find links to article
Structure of the Blues". Artificial Neural Networks — ICANN 2002. Lecture Notes in Computer Science. Vol. 2415. Springer, Berlin, Heidelberg. pp. 284–289. CiteSeerX 10Cryptographic nonce (881 words) [view diff] exact match in snippet view article find links to article
Bimal Roy; Willi Meier (eds.). Fast Software Encryption. Lecture Notes in Computer Science. Vol. 3017. pp. 348–358. doi:10.1007/978-3-540-25937-4_22Minimum-weight triangulation (3,289 words) [view diff] exact match in snippet view article find links to article
"A study of the LMT-skeleton", Algorithms and Computation, Lecture Notes in Computer Science, vol. 1178, pp. 256–265, doi:10.1007/BFb0009502, ISBN 978-3-540-62048-8DES-X (533 words) [view diff] exact match in snippet view article find links to article
Attacks". Advances in Cryptology — EUROCRYPT 2000 (PDF). Lecture Notes in Computer Science. Vol. 1807. pp. 589–606. doi:10.1007/3-540-45539-6_41.Skew-symmetric graph (2,318 words) [view diff] exact match in snippet view article find links to article
and structure", Computer Science – Theory and Applications, Lecture Notes in Computer Science, vol. 3967, Springer-Verlag, pp. 23–34, arXiv:math/0607547Computer security compromised by hardware failure (5,114 words) [view diff] exact match in snippet view article find links to article
Countermeasures: The Case of AES". Topics in Cryptology – CT-RSA 2006. Lecture Notes in Computer Science. Vol. 3860. San Jose, California, USA: Springer-Verlag BerlinList of PSPACE-complete problems (1,820 words) [view diff] exact match in snippet view article find links to article
is PSPACE-Complete". Automata, Languages, and Programming. Lecture Notes in Computer Science. Vol. 7965. pp. 497–503. arXiv:1209.1750. doi:10.1007/978-3-642-39206-1_42Cipher security summary (801 words) [view diff] exact match in snippet view article find links to article
"Attacking Triple Encryption". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 1372. Springer. pp. 239–253. doi:10.1007/3-540-69710-1_16Collaborative search engine (2,067 words) [view diff] exact match in snippet view article find links to article
Transactions on Computational Collective Intelligence II. Lecture Notes in Computer Science. Vol. 2. pp. 46–69. Bibcode:2010LNCS.6450...46L. doi:10Average-case complexity (3,057 words) [view diff] exact match in snippet view article find links to article
Miscellanea on the Interplay between Randomness and Computation, Lecture Notes in Computer Science, vol. 6650, Berlin, Heidelberg: Springer Berlin HeidelbergStathis Zachos (601 words) [view diff] exact match in snippet view article find links to article
of Software Technology and Theoretical Computer Science. Lecture Notes in Computer Science. Vol. 287. pp. 443–455. doi:10.1007/3-540-18625-5_67. ISBN 978-3-540-18625-0Schnorr signature (1,248 words) [view diff] exact match in snippet view article find links to article
Application of Cryptographic Techniques. Proceedings of CRYPTO '86. Lecture Notes in Computer Science. Vol. 263. pp. 186–194. doi:10.1007/3-540-47721-7_12. ISBN 978-3-540-18047-0Thousands of Problems for Theorem Provers (250 words) [view diff] exact match in snippet view article find links to article
Theorem Proving". KI 2009: Advances in Artificial Intelligence. Lecture Notes in Computer Science. Vol. 5803. pp. 435–443. CiteSeerX 10.1.1.329.1809. doi:10NorduGrid (942 words) [view diff] exact match in snippet view article find links to article
NorduGrid ARC Middleware". Advances in Grid Computing - EGC 2005. Lecture Notes in Computer Science. Vol. 3470. Berlin/Heidelberg: Springer. pp. 861–871. doi:10Automotive security (2,101 words) [view diff] exact match in snippet view article find links to article
of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science. Vol. 10327. Springer International Publishing. pp. 185–206LCP array (4,379 words) [view diff] exact match in snippet view article find links to article
12th Annual Symposium on Combinatorial Pattern Matching. Lecture Notes in Computer Science. Vol. 2089. pp. 181–192. doi:10.1007/3-540-48194-X_17.RACE (Europe) (147 words) [view diff] exact match in snippet view article
Cryptology – EUROCRYPT '91. EUROCRYPT 1991. Lecture Notes in Computer Science, vol 547. Lecture Notes in Computer Science. Vol. 547. Springer. pp. 547–551. doi:10Garbled circuit (2,979 words) [view diff] exact match in snippet view article find links to article
Gates and Applications". Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 5126. pp. 486–498. CiteSeerX 10.1.1.160.5268. doi:10350 nm process (222 words) [view diff] exact match in snippet view article find links to article
". Constructive Side-Channel Analysis and Secure Design. Lecture Notes in Computer Science. Vol. 10348. pp. 207–222. doi:10.1007/978-3-319-64647-3_13Leontief utilities (815 words) [view diff] exact match in snippet view article find links to article
of Leontief Market Equilibria". Frontiers in Algorithmics. Lecture Notes in Computer Science. Vol. 4613. p. 96. doi:10.1007/978-3-540-73814-5_9. ISBN 978-3-540-73813-8IEEE 802.15.6 (506 words) [view diff] exact match in snippet view article find links to article
15.6 Standard". Financial Cryptography and Data Security. Lecture Notes in Computer Science. Vol. 8976. pp. 245–260. arXiv:1501.02601. doi:10.1007/978-3-662-48051-9_18Indistinguishability obfuscation (2,277 words) [view diff] exact match in snippet view article find links to article
Obfuscation". In Vadhan, Salil P. (ed.). Theory of Cryptography. Lecture Notes in Computer Science. Vol. 4392. Berlin, Heidelberg: Springer. pp. 194–213. doi:10Order statistic tree (504 words) [view diff] exact match in snippet view article find links to article
(2001). A new method for balancing binary search trees. ICALP. Lecture Notes in Computer Science. Vol. 2076. pp. 469–480. doi:10.1007/3-540-48224-5_39.Semantic search (442 words) [view diff] exact match in snippet view article find links to article
Web". The Semantic Web: Research and Applications. Eswc2012. Lecture Notes in Computer Science. Vol. 7295. pp. 422–436. doi:10.1007/978-3-642-30284-8_35Leontief utilities (815 words) [view diff] exact match in snippet view article find links to article
of Leontief Market Equilibria". Frontiers in Algorithmics. Lecture Notes in Computer Science. Vol. 4613. p. 96. doi:10.1007/978-3-540-73814-5_9. ISBN 978-3-540-73813-8HiLog (601 words) [view diff] case mismatch in snippet view article find links to article
Prague, Czech Republic, January 11–13, 1995: proceedings. Lecture notes in computer science. Vol. 893. Springer. pp. 252–265. doi:10.1007/3-540-58907-4_20Straight skeleton (2,179 words) [view diff] exact match in snippet view article find links to article
Ann. Int. Conf. Computing and Combinatorics (COCOON '96). Lecture Notes in Computer Science. Vol. 1090. Springer-Verlag. pp. 117–126. Peschka, GustavSupersingular isogeny key exchange (3,600 words) [view diff] exact match in snippet view article find links to article
2023. International Association for Cryptologic Research. Lecture Notes in Computer Science. Vol. 14008. Springer. pp. 423–447. doi:10.1007/978-3-031-30589-4_15Semantic search (442 words) [view diff] exact match in snippet view article find links to article
Web". The Semantic Web: Research and Applications. Eswc2012. Lecture Notes in Computer Science. Vol. 7295. pp. 422–436. doi:10.1007/978-3-642-30284-8_35Thomas G. Dietterich (2,803 words) [view diff] exact match in snippet view article find links to article
Structural, Syntactic, and Statistical Pattern Recognition; Lecture Notes in Computer Science, Vol. 2396. (pp. 15–30). Springer-Verlag Dietterich, T. GManifold regularization (3,897 words) [view diff] exact match in snippet view article find links to article
pointwise consistency of graph laplacians". Learning theory. Lecture Notes in Computer Science. Vol. 3559. Springer. pp. 470–485. CiteSeerX 10.1.1.103.82Geographical feature (2,366 words) [view diff] exact match in snippet view article find links to article
). Spatio-Temporal Databases: The Chorochronos Approach. Lecture Notes in Computer Science. Vol. V.2520. Springer-Verlag. pp. 9–77. doi:10.1007/978-3-540-45081-8_2HElib (212 words) [view diff] exact match in snippet view article find links to article
Gennaro, Rosario (eds.). Advances in Cryptology – CRYPTO 2014. Lecture Notes in Computer Science. Vol. 8616. Springer Berlin Heidelberg. pp. 554–571. doi:10QuickCheck (1,134 words) [view diff] exact match in snippet view article find links to article
Symposium on Functional and Logic Programming (FLOPS 2014). Lecture Notes in Computer Science. Vol. 8475. pp. 1–17. doi:10.1007/978-3-319-07151-0_1.Kai Salomaa (370 words) [view diff] exact match in snippet view article find links to article
transformation for finite languages". Automata Implementation. Lecture Notes in Computer Science. Vol. 1260. pp. 149–158. doi:10.1007/3-540-63174-7_12.Circle graph (1,694 words) [view diff] exact match in snippet view article find links to article
Science, Bordeaux, France, February 11–13, 1988, Proceedings, Lecture Notes in Computer Science, vol. 294, Berlin: Springer, pp. 61–72, doi:10.1007/BFb0035832Wikiquote (756 words) [view diff] exact match in snippet view article find links to article
International Workshop on Fuzzy Logic and Applications. Lecture Notes in Computer Science. doi:10.1007/978-3-540-73400-0_58. ISBN 978-3-540-73399-7Negation as failure (1,331 words) [view diff] exact match in snippet view article find links to article
Semantic Web Reasoning. PPSW3 2003. Lecture Notes in Computer Science. Vol. 2901. Lecture Notes in Computer Science: Springer. pp. 33–50. doi:10.1007/978-3-540-24572-8_3Malleability (cryptography) (983 words) [view diff] exact match in snippet view article
among notions of security for public-key encryption schemes. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 26–45. doi:10.1007/bfb0055718Stephen Muggleton (783 words) [view diff] exact match in snippet view article find links to article
"Learning from positive data". Inductive Logic Programming. Lecture Notes in Computer Science. Vol. 1314. pp. 358–376. doi:10.1007/3-540-63494-0_65.Hans L. Bodlaender (446 words) [view diff] exact match in snippet view article find links to article
Hans L. Bodlaender on the Occasion of His 60th Birthday, Lecture Notes in Computer Science, vol. 12160, Springer International Publishing, doi:10Andrey Muchnik (514 words) [view diff] exact match in snippet view article find links to article
Czechoslovakia, September 3–7, 1984. Proceedings. Lecture Notes in Computer Science. Lecture Notes in Computer Science. 176. Berlin, Heidelberg: Springer: 162–175International Mathematical Knowledge Trust (180 words) [view diff] exact match in snippet view article find links to article
Mathematical Knowledge Trust". Intelligent Computer Mathematics. Lecture Notes in Computer Science. Vol. 10383. pp. 56–69. doi:10.1007/978-3-319-62075-6_5.Single program, multiple data (2,061 words) [view diff] exact match in snippet view article find links to article
in Parallel Virtual Machine and Message Passing Interface. Lecture Notes in Computer Science. Vol. 2131. p. 1. doi:10.1007/3-540-45417-9_1. ISBN 978-3-540-42609-7Left-right planarity test (696 words) [view diff] exact match in snippet view article find links to article
WA, USA, September 19-21, 2012, Revised Selected Papers, Lecture Notes in Computer Science, vol. 7704, Berlin: Springer, pp. 557–558, doi:10.1007/978-3-642-36763-2_51Ada Programming Support Environment (439 words) [view diff] exact match in snippet view article find links to article
in Long, Fred (ed.), Software Engineering Environments, Lecture Notes in Computer Science, vol. 467, Springer Berlin Heidelberg, pp. 179–193, doi:10Attention inequality (679 words) [view diff] exact match in snippet view article find links to article
Social Media Attention Among Non-profits". Social Informatics. Lecture Notes in Computer Science. Vol. 11185. Springer International Publishing. pp. 196–211Algorithm selection (1,836 words) [view diff] exact match in snippet view article find links to article
(ed.). Principles and Practice of Constraint Programming. Lecture Notes in Computer Science. Vol. 6876. pp. 454–469. CiteSeerX 10.1.1.211.1807. doi:10Range query (computer science) (5,468 words) [view diff] exact match in snippet view article
Approximations for Range Mode". Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 6198. pp. 605–616. doi:10.1007/978-3-642-14165-2_51Reduction strategy (2,616 words) [view diff] exact match in snippet view article find links to article
and Acyclicity" (PDF). Rewriting, Computation and Proof. Lecture Notes in Computer Science. Vol. 4600. pp. 89–112. CiteSeerX 10.1.1.104.9139. doi:10Text corpus (866 words) [view diff] exact match in snippet view article find links to article
Plzeň, Czech Republic, September 14–17, 2015, Proceedings. Lecture Notes in Computer Science. Vol. 9302. Springer. pp. 32–40. arXiv:1509.08639. doi:10Lambda-mu calculus (842 words) [view diff] exact match in snippet view article find links to article
algorithmic interpretation of classical natural deduction. Lecture Notes in Computer Science. Vol. 624. pp. 190–201. doi:10.1007/BFb0013061. ISBN 3-540-55727-XAutomated reasoning (1,420 words) [view diff] exact match in snippet view article find links to article
Paulin-Mohring, C.; Pichardie, D. (eds.), Interactive Theorem Proving, Lecture Notes in Computer Science, vol. 7998, pp. 163–179, CiteSeerX 10.1.1.651.7964, doi:10Ring learning with errors signature (2,571 words) [view diff] exact match in snippet view article find links to article
Gilbert, Henri (ed.). Advances in Cryptology – EUROCRYPT 2010. Lecture Notes in Computer Science. Vol. 6110. pp. 1–23. CiteSeerX 10.1.1.297.6108. doi:10David L. Dill (1,230 words) [view diff] exact match in snippet view article find links to article
pipelined microprocessor control". Computer Aided Verification. Lecture Notes in Computer Science. Vol. 818. pp. 68–80. doi:10.1007/3-540-58179-0_44. ISBN 978-3-540-58179-6Diffie–Hellman key exchange (5,308 words) [view diff] exact match in snippet view article find links to article
Protocols and their Security Analysis", Crytography and Coding, Lecture Notes in Computer Science, vol. 1355, pp. 30–45, CiteSeerX 10.1.1.25.387, doi:10.1007/BFb0024447Newton Howard (1,456 words) [view diff] exact match in snippet view article find links to article
Computational Linguistics and Intelligent Text Processing. Lecture Notes in Computer Science, 8403, 113–127 Howard, N. (2013). The Twin Hypotheses: BrainCall centre (3,912 words) [view diff] exact match in snippet view article find links to article
Virtual Call Center Implementation". Networking — ICN 2001. Lecture Notes in Computer Science. Vol. 2093. University of Novi Sad, Yugoslavia. pp. 75–84Michal Irani (461 words) [view diff] exact match in snippet view article find links to article
with Uncertainty". European Conference on Computer Vision. Lecture Notes in Computer Science. Vol. 1842. pp. 539–553. doi:10.1007/3-540-45054-8_35.Meurs Challenger (409 words) [view diff] exact match in snippet view article find links to article
The Netherlands, September 21–23, 2011, Revised Papers, Lecture Notes in Computer Science, vol. 7034, Springer-Verlag, pp. 447–448, doi:10.1007/978-3-642-25878-7Scale space implementation (3,290 words) [view diff] exact match in snippet view article find links to article
in Computer Vision. Lecture Notes in Computer Science. Vol. 2695. Proc. Scale-Space'03, Springer Lecture Notes in Computer Science. pp. 148–163. doi:10Abdigani Diriye (734 words) [view diff] exact match in snippet view article find links to article
Research and Advanced Technology for Digital Libraries. Lecture Notes in Computer Science. Vol. 8092. Springer Berlin Heidelberg. pp. 235–240. doi:10Toolchain (276 words) [view diff] exact match in snippet view article find links to article
Tool Chains in Agile ALM Environments: A Short Introduction. Lecture Notes in Computer Science. Vol. 9416. pp. 371–380. doi:10.1007/978-3-319-26138-6_40Mildly context-sensitive grammar formalism (2,034 words) [view diff] exact match in snippet view article find links to article
Germany, June 30–July 3, 2009. Proceedings, volume 5583 of Lecture Notes in Computer Science, pages 312–325, 2009. Laura Kallmeyer. "On Mildly Context-SensitiveThreefish (1,366 words) [view diff] exact match in snippet view article find links to article
Seoul, Korea, February 7–10, 2010, Revised Selected Papers. Lecture Notes in Computer Science. Vol. 6147. Springer. pp. 333–346. doi:10.1007/978-3-642-13858-4_19Victor Pan (759 words) [view diff] exact match in snippet view article find links to article
Matrices Faster: Gladwell, Ian (1986), Mathematical Reviews, Lecture Notes in Computer Science, 179, doi:10.1007/3-540-13866-8, ISBN 978-3-540-13866-2, MR 0765701Noisy-storage model (2,949 words) [view diff] exact match in snippet view article find links to article
memory-bounded adversaries". Advances in Cryptology — CRYPTO '97. Lecture Notes in Computer Science. Vol. 1294. pp. 292–306. doi:10.1007/BFb0052243. ISBN 978-3-540-63384-6BlueJ (412 words) [view diff] exact match in snippet view article find links to article
Kölling, M. (eds.). Reflections on the Teaching of Programming. Lecture Notes in Computer Science. Vol. 4821. Springer. pp. 182–196. ISBN 978-3-540-77933-9Neural gas (1,807 words) [view diff] exact match in snippet view article find links to article
CVBIA 2005, Beijing, China, October 21, 2005 : proceedings. Lecture Notes in Computer Science. Vol. 3765. Springer. p. 210. doi:10.1007/11569541_22.Table of metaheuristics (4,289 words) [view diff] exact match in snippet view article find links to article
Hailin (eds.). Computational Intelligence and Security. Lecture Notes in Computer Science. Vol. 4456. Berlin, Heidelberg: Springer. pp. 167–176. doi:10Decoding methods (1,875 words) [view diff] exact match in snippet view article find links to article
codewords of small weight". Coding Theory and Applications. Lecture Notes in Computer Science. Vol. 388. Springer-Verlag. pp. 106–113. doi:10.1007/BFb0019850Polygon-circle graph (606 words) [view diff] exact match in snippet view article find links to article
2003 Perugia, Italy, September 21-24, 2003, Revised Papers, Lecture Notes in Computer Science, vol. 2912, Berlin: Springer, pp. 59–70, doi:10.1007/978-3-540-24595-7_6Loop dependence analysis (2,016 words) [view diff] exact match in snippet view article find links to article
Detection". Automated Technology for Verification and Analysis. Lecture Notes in Computer Science. Vol. 10482. pp. 91–108. doi:10.1007/978-3-319-68167-2_7.Ascalaph Designer (607 words) [view diff] exact match in snippet view article find links to article
Computing Large Scale Scientific and Industrial Problems. Lecture Notes in Computer Science. Vol. 1541. Heidelberg: Springer Berlin. pp. 296–303. doi:10Table of metaheuristics (4,289 words) [view diff] exact match in snippet view article find links to article
Hailin (eds.). Computational Intelligence and Security. Lecture Notes in Computer Science. Vol. 4456. Berlin, Heidelberg: Springer. pp. 167–176. doi:10E-graph (2,146 words) [view diff] exact match in snippet view article find links to article
Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science. Vol. 4963. Berlin, Heidelberg: Springer. pp. 337–340. doi:10David Wheeler (computer scientist) (1,426 words) [view diff] exact match in snippet view article
a tiny encryption algorithm". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 1008. p. 363. doi:10.1007/3-540-60590-8_29. ISBN 978-3-540-60590-4Geospatial topology (1,628 words) [view diff] exact match in snippet view article find links to article
error correcting in GIS". Advances in Spatial Databases. Lecture Notes in Computer Science. Vol. 1262. pp. 281–297. doi:10.1007/3-540-63238-7_35.RoboCup 3D Soccer Simulation League (1,096 words) [view diff] exact match in snippet view article find links to article
Next Generation". RoboCup 2003: Robot Soccer World Cup VII. Lecture Notes in Computer Science. Vol. 3020. pp. 458–469. doi:10.1007/978-3-540-25940-4_40Frama-C (776 words) [view diff] exact match in snippet view article find links to article
of Code". Trusted Computing - Challenges and Applications. Lecture Notes in Computer Science. Vol. 4968/2008. pp. 133–142. doi:10.1007/978-3-540-68979-9_10Truecasing (458 words) [view diff] exact match in snippet view article find links to article
Information Retrieval Techniques for Speech Applications. Lecture Notes in Computer Science. Vol. 2273. pp. 11–22. doi:10.1007/3-540-45637-6_2. ISBN 978-3-540-43156-5Abdigani Diriye (734 words) [view diff] exact match in snippet view article find links to article
Research and Advanced Technology for Digital Libraries. Lecture Notes in Computer Science. Vol. 8092. Springer Berlin Heidelberg. pp. 235–240. doi:10Adversarial queueing network (198 words) [view diff] exact match in snippet view article find links to article
Combinatorial Optimization.. Algorithms and Techniques (PDF). Lecture Notes in Computer Science. Vol. 2764. p. 153. doi:10.1007/978-3-540-45198-3_14. ISBN 978-3-540-40770-6Alan Mycroft (481 words) [view diff] exact match in snippet view article find links to article
recursive definitions". International Symposium on Programming. Lecture Notes in Computer Science. Vol. 167. pp. 217–228. doi:10.1007/3-540-12925-1_41. ISBN 978-3-540-12925-7JSON-LD (745 words) [view diff] exact match in snippet view article find links to article
IPAW 2016, McLean, VA, USA, June 7-8, 2016, Proceedings. Lecture Notes in Computer Science. Vol. 9672. Cham: Springer International Publishing. pp. 173–177Juan Pavón (3,094 words) [view diff] exact match in snippet view article find links to article
Müller, Jörg (eds.). Multi-Agent Systems and Applications III. Lecture Notes in Computer Science. Vol. 2691. Springer Berlin Heidelberg. pp. 394–403. doi:10Substring index (611 words) [view diff] exact match in snippet view article find links to article
Piscataway, New Jersey, USA, July 20–22, 1998, Proceedings, Lecture Notes in Computer Science, vol. 1448, Springer, pp. 65–79, doi:10.1007/BFB0030781,Self-organizing map (4,068 words) [view diff] exact match in snippet view article find links to article
(1995). "Kohonen Network" (PDF). Artificial Neural Networks. Lecture Notes in Computer Science. Vol. 931. University of Limburg, Maastricht. pp. 83–100.OpenNN (449 words) [view diff] exact match in snippet view article find links to article
Neural Networks". Adaptive and Natural Computing Algorithms. Lecture Notes in Computer Science. Vol. 6593. pp. 190–199. doi:10.1007/978-3-642-20282-7_20Phase-type distribution (2,368 words) [view diff] exact match in snippet view article find links to article
Analytical and Stochastic Modeling Techniques and Applications. Lecture Notes in Computer Science. Vol. 7314. p. 271. doi:10.1007/978-3-642-30782-9_19. ISBN 978-3-642-30781-2Peter Buneman (1,067 words) [view diff] exact match in snippet view article find links to article
Characterization of Data Provenance". Database Theory — ICDT 2001. Lecture Notes in Computer Science. Vol. 1973. pp. 316. CiteSeerX 10.1.1.6.1848. doi:10.1007/3-540-44503-X_20Digital Assets Repository (697 words) [view diff] exact match in snippet view article find links to article
Research and Advanced Technology for Digital Libraries. Lecture Notes in Computer Science. Vol. 3652. Springer Science + Business Media. pp. 116–127Alex Graves (computer scientist) (618 words) [view diff] exact match in snippet view article
Keyword Spotting". Artificial Neural Networks – ICANN 2007. Lecture Notes in Computer Science. Vol. 4669. pp. 220–229. doi:10.1007/978-3-540-74695-9_23Digital signature (4,945 words) [view diff] exact match in snippet view article find links to article
Signature" (PDF). Advances in Cryptology — CRYPTO' 89 Proceedings. Lecture Notes in Computer Science. Vol. 435. pp. 218–238. doi:10.1007/0-387-34805-0_21. ISBN 978-0-387-97317-3Lesk algorithm (1,039 words) [view diff] exact match in snippet view article find links to article
Lesk Algorithm for Word Sense Disambiguation Using WordNet, Lecture Notes in Computer Science; Vol. 2276, Pages: 136 - 145, 2002. ISBN 3-540-43219-1 KilgarriffRandom oracle (1,786 words) [view diff] exact match in snippet view article find links to article
quantum world". Advances in Cryptology – ASIACRYPT 2011. Lecture Notes in Computer Science. Vol. 7073. Springer. pp. 41–69. arXiv:1008.0931. doi:10Audio game (3,011 words) [view diff] exact match in snippet view article find links to article
Human–Computer Interaction. Designing Novel Interactions, Lecture Notes in Computer Science, vol. 10278, Cham: Springer International Publishing, pp. 242–259Side-channel attack (3,681 words) [view diff] exact match in snippet view article find links to article
Koblitz, Neal (ed.). Advances in Cryptology — CRYPTO '96. Lecture Notes in Computer Science. Vol. 1109. Berlin, Heidelberg: Springer. pp. 104–113. doi:10Unspent transaction output (1,271 words) [view diff] exact match in snippet view article find links to article
Bitcoin UTXO Set". Financial Cryptography and Data Security. Lecture Notes in Computer Science. Vol. 10958. Springer. pp. 78–91. doi:10.1007/978-3-662-58820-8_6Tarski's axiomatization of the reals (603 words) [view diff] exact match in snippet view article find links to article
Edinburgh, Scotland, UK, September 3–6, 2001, Proceedings. Lecture Notes in Computer Science. Vol. 2152. Berlin: Springer. pp. 43–58. doi:10.1007/3-540-44755-5_5Runtime predictive analysis (1,499 words) [view diff] exact match in snippet view article find links to article
for Sequentially Consistent Systems". Runtime Verification. Lecture Notes in Computer Science. Vol. 7687. pp. 136–150. doi:10.1007/978-3-642-35632-2_16Memetic algorithm (4,061 words) [view diff] exact match in snippet view article find links to article
motion". Tasks and Methods in Applied Artificial Intelligence. Lecture Notes in Computer Science. Vol. 1416. Springer-Verlag. pp. 105–114. CiteSeerX 10.1.1Browser Helper Object (882 words) [view diff] exact match in snippet view article find links to article
Browser Helper Objects". Intelligence and Security Informatics. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer: 638–639. doi:10.1007/11427995_85Hash chain (1,005 words) [view diff] exact match in snippet view article find links to article
Scheme" (PDF). Progress in Cryptology – AFRICACRYPT 2011. Lecture Notes in Computer Science. Vol. 6737. Springer Berlin Heidelberg. pp. 363–378. doi:10Generic group model (401 words) [view diff] exact match in snippet view article find links to article
bounds for discrete logarithms and related problems" (PDF). Lecture Notes in Computer Science. Advances in Cryptology – Eurocrypt ’97. Vol. 1233. Springer-VerlagSize-change termination principle (640 words) [view diff] exact match in snippet view article find links to article
Functional Programs". Programming Languages and Systems. Lecture Notes in Computer Science. Vol. 3780. pp. 281–297. CiteSeerX 10.1.1.102.4934. doi:10Differential cryptanalysis (1,675 words) [view diff] exact match in snippet view article find links to article
EnRUPT". In Dunkelman, Orr (ed.). Fast Software Encryption. Lecture Notes in Computer Science. Vol. 5665. Berlin, Heidelberg: Springer. pp. 246–259. doi:10Instruction-level parallelism (1,039 words) [view diff] exact match in snippet view article find links to article
Parallelism". Applied Parallel and Scientific Computing. Lecture Notes in Computer Science. Vol. 7133. pp. 270–281. doi:10.1007/978-3-642-28151-8_27Zvika Brakerski (287 words) [view diff] exact match in snippet view article find links to article
Canetti, Ran (eds.). Advances in Cryptology – CRYPTO 2012. Lecture Notes in Computer Science. Vol. 7417. Berlin, Heidelberg: Springer. pp. 868–886. doi:10Spaghetti code (1,794 words) [view diff] exact match in snippet view article find links to article
proper exception handling". Lecture Notes in Computer Science. Ada – Europe '93 (Proceedings). Lecture Notes in Computer Science. Vol. 688. Springer BerlinKyber (1,473 words) [view diff] exact match in snippet view article find links to article
Structured LWE, Revisited" (PDF), Theory of Cryptography, Lecture Notes in Computer Science (in German), vol. 11891, Cham: Springer International PublishingDinic's algorithm (1,693 words) [view diff] exact match in snippet view article find links to article
Theoretical Computer Science: Essays in Memory of Shimon Even. Lecture Notes in Computer Science. Vol. 3895. Springer. pp. 218–240. doi:10.1007/11685654_10DarwiinRemote (429 words) [view diff] exact match in snippet view article find links to article
Interaction Research". HCI in Work and Learning, Life and Leisure. Lecture Notes in Computer Science. Vol. 6389. Springer. pp. 305–317. doi:10.1007/978-3-642-16607-5_20Lis (linear algebra library) (665 words) [view diff] exact match in snippet view article
Computational Science and Its Applications – ICCSA 2010. Lecture Notes in Computer Science 6017. Vol. 6017. Springer. pp. 87–98. doi:10.1007/978-3-642-12165-4_36Consensus (computer science) (4,769 words) [view diff] exact match in snippet view article
Consensus Research: Misunderstandings and Issues". Replication. Lecture Notes in Computer Science. Vol. 5959. pp. 59–72. doi:10.1007/978-3-642-11294-2_4.Studierfenster (1,521 words) [view diff] exact match in snippet view article find links to article
Computing and Computer Assisted Intervention – MICCAI 2019. Lecture Notes in Computer Science. Vol. 11768. Cham: Springer International Publishing. pp. 236–244DRE-i with enhanced privacy (1,759 words) [view diff] exact match in snippet view article find links to article
Tallying Authorities" (PDF). Computer Security – ESORICS 2016. Lecture Notes in Computer Science. Vol. 9879. pp. 223–240. doi:10.1007/978-3-319-45741-3_12Subgraph isomorphism problem (1,857 words) [view diff] exact match in snippet view article find links to article
GbRPR 2019, Tours, France, June 19-21, 2019, Proceedings, Lecture Notes in Computer Science, vol. 11510, Springer, pp. 1–13, doi:10.1007/978-3-030-20081-7_1