language:
Find link is a tool written by Edward Betts.searching for Lecture Notes in Computer Science 414 found (3721 total)
alternate case: lecture Notes in Computer Science
Service (systems architecture)
(1,994 words)
[view diff]
exact match in snippet
view article
Amsterdam, The Netherlands, December 12-15, 2005, Proceedings. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg. ISBN 978-3-540-30817-1Provable security (2,181 words) [view diff] exact match in snippet view article find links to article
asymmetric encryption". Advances in Cryptology — EUROCRYPT'94. Lecture Notes in Computer Science. Vol. 950. pp. 92–111. doi:10.1007/BFb0053428. ISBN 978-3-540-60176-0Tiny Encryption Algorithm (1,189 words) [view diff] exact match in snippet view article find links to article
RC2, and TEA". Information and Communications Security. Lecture Notes in Computer Science. Vol. 1334. pp. 233–246. CiteSeerX 10.1.1.35.8112. doi:10XSL attack (1,834 words) [view diff] exact match in snippet view article find links to article
2003, Lund, Sweden, February 24-26, 2003, Revised Papers. Lecture Notes in Computer Science. Vol. 2887. Springer. pp. 274–289. doi:10.1007/978-3-540-39887-5_21Bart Preneel (975 words) [view diff] exact match in snippet view article find links to article
algorithms based on block ciphers". Crytography and Coding. Lecture Notes in Computer Science. Vol. 1355. pp. 270–282. doi:10.1007/BFb0024473. ISBN 978-3-540-63927-5International Data Encryption Algorithm (1,499 words) [view diff] exact match in snippet view article find links to article
on the IDEA Block Cipher". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 3006. pp. 117–129. doi:10.1007/978-3-540-24654-1_9.Join-pattern (6,440 words) [view diff] exact match in snippet view article find links to article
calculus of mobile agents". CONCUR '96: Concurrency Theory. Lecture Notes in Computer Science. Vol. 1119. Le Chesnay: Concurrency Theory. pp. 406–421. doi:10Satisfiability modulo theories (4,371 words) [view diff] exact match in snippet view article find links to article
Werner; Hermanns, Holger (eds.). Computer Aided Verification. Lecture Notes in Computer Science. Vol. 4590. Berlin, Heidelberg: Springer. pp. 547–560. doi:10Electromagnetic attack (3,404 words) [view diff] exact match in snippet view article find links to article
Transmission Using Electromagnetic Emanations". Information Hiding. Lecture Notes in Computer Science. Vol. 1525. pp. 124–142. CiteSeerX 10.1.1.64.6982. doi:10Extended Semantic Web Conference (867 words) [view diff] exact match in snippet view article find links to article
Skaf-Molli, Hala; Tamper, Minna (eds.). The Semantic Web. Lecture Notes in Computer Science. Vol. 13261. Cham: Springer International Publishing. pp. 200–216Choreographic programming (1,548 words) [view diff] exact match in snippet view article find links to article
Specifications". Logic, Rewriting, and Concurrency (PDF). Lecture Notes in Computer Science. Vol. 9200. pp. 427–450. doi:10.1007/978-3-319-23165-5_20Hash-based cryptography (2,329 words) [view diff] exact match in snippet view article find links to article
Minimal Security Assumptions". Post-Quantum Cryptography. Lecture Notes in Computer Science. Vol. 7071. pp. 117–129. CiteSeerX 10.1.1.400.6086. doi:10E0 (cipher) (810 words) [view diff] exact match in snippet view article
Combiner". Information Security and Cryptology - ICISC'99. Lecture Notes in Computer Science. Vol. 1787. pp. 17–29. CiteSeerX 10.1.1.40.9412. doi:10.1007/10719994_2Linked timestamping (1,715 words) [view diff] exact match in snippet view article find links to article
Digital Signatures". Advances in Cryptology – EUROCRYPT '93. Lecture Notes in Computer Science. Vol. 765. p. 274. doi:10.1007/3-540-48285-7_24. ISBN 978-3-540-57600-6Computer Aided Verification (396 words) [view diff] exact match in snippet view article find links to article
"Counterexample-Guided Abstraction Refinement". Computer Aided Verification. Lecture Notes in Computer Science. Vol. 1855. pp. 154–169. doi:10.1007/10722167_15. ISBN 978-3-540-67770-3Shlomi Dolev (2,390 words) [view diff] exact match in snippet view article find links to article
Joffroy; Delaët, Sylvie (2014). Networked Systems (PDF). Lecture Notes in Computer Science. Springer, Cham. pp. 99–121. doi:10.1007/978-3-319-09581-3_8Kaisa Nyberg (325 words) [view diff] exact match in snippet view article find links to article
Tatsunokuchi, Ishikawa, Japan September 17ÔÇô19, 1997, Proceedings, Lecture Notes in Computer Science, vol. 1396, Springer, pp. 32–42, doi:10.1007/bfb0030406,Kleptography (1,088 words) [view diff] exact match in snippet view article find links to article
Barbara, California, USA, August 18–22, 1996, Proceedings. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 89–103. ISBN 978-3-540-68697-2Skipjack (cipher) (1,134 words) [view diff] exact match in snippet view article
Feistel Networks". Advances in Cryptology – CRYPTO 2010. Lecture Notes in Computer Science. Vol. 6223. Springer. pp. 613–630. CiteSeerX 10.1.1.185.3033E (theorem prover) (937 words) [view diff] exact match in snippet view article
(2004). "System Description: E 0.81". Automated Reasoning. Lecture Notes in Computer Science. Vol. 3097. pp. 223–228. doi:10.1007/978-3-540-25984-8_15Dmitry Khovratovich (1,347 words) [view diff] exact match in snippet view article find links to article
AES-192 and AES-256". Advances in Cryptology – ASIACRYPT 2009. Lecture Notes in Computer Science. Vol. 5912. Springer-Verlag. pp. 1–18. doi:10.1007/978-3-642-10366-7_1Mexican International Conference on Artificial Intelligence (1,007 words) [view diff] exact match in snippet view article find links to article
(2000). MICAI 2000: Advances in Artificial Intelligence. Lecture Notes in Computer Science. Vol. 1793. doi:10.1007/10720076. ISBN 978-3-540-67354-5.Brent Waters (559 words) [view diff] exact match in snippet view article find links to article
Identity-Based Encryption". Advances in Cryptology – EUROCRYPT 2005. Lecture Notes in Computer Science. Vol. 3494. pp. 457–473. doi:10.1007/11426639_27. ISBN 978-3-540-25910-7HC-256 (534 words) [view diff] exact match in snippet view article find links to article
New Stream Cipher HC-256" (PDF). Fast Software Encryption. Lecture Notes in Computer Science. Vol. 3017. pp. 226–244. doi:10.1007/978-3-540-25937-4_15Post-quantum cryptography (6,769 words) [view diff] exact match in snippet view article find links to article
Cryptography for the Internet" (PDF), Post-Quantum Cryptography, Lecture Notes in Computer Science, vol. 8772, Cham: Springer International Publishing, pp. 197–219Reversible computing (3,014 words) [view diff] exact match in snippet view article find links to article
Jarkko; Ulidowski, Irek (eds.). Reversible Computation. Lecture Notes in Computer Science. Vol. 11106. Cham: Springer International Publishing. pp. 3–33RDF query language (1,154 words) [view diff] exact match in snippet view article find links to article
Comparison of RDF Query Languages". The Semantic Web – ISWC 2004. Lecture Notes in Computer Science. Vol. 3298. pp. 502–517. CiteSeerX 10.1.1.105.8731. doi:10RIPEMD (884 words) [view diff] exact match in snippet view article find links to article
of RACE Integrity Primitives Evaluation (RIPE-RACE 1040). Lecture Notes in Computer Science. Vol. 1007. doi:10.1007/3-540-60640-8. ISBN 978-3-540-60640-6XTEA (969 words) [view diff] exact match in snippet view article find links to article
B.; Meier, W. (eds.). Fast Software Encryption. FSE 2004. Lecture Notes in Computer Science. Vol. 3017. Berlin, Heidelberg: Springer. pp. 299–316. doi:10Moti Yung (1,630 words) [view diff] exact match in snippet view article find links to article
Cryptography, or: Should We Trust Capstone? CRYPTO 1996: 89-103, Lecture Notes in Computer Science, vol. 1109, p. 89, doi:10.1007/3-540-68697-5_8, ISBN 978-3-540-61512-5Martin Wirsing (1,190 words) [view diff] exact match in snippet view article find links to article
): Software-Intensive Systems and New Computing Paradigms. Lecture Notes in Computer Science 5380, Springer-Verlag, 2008, 265 pages (ISBN 978-3-540-89436-0)SecPAL (447 words) [view diff] exact match in snippet view article find links to article
Information Systems Security. ICISS 2010. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Vol. 6503. Berlin; Heidelberg: SpringerOrr Dunkelman (791 words) [view diff] exact match in snippet view article find links to article
CRYPTO 2012. https://www.iacr.org/conferences/crypto2012/. Lecture Notes in Computer Science. Vol. 7417. Springer. pp. 719–740. doi:10.1007/978-3-642-32009-5_42FORK-256 (798 words) [view diff] exact match in snippet view article find links to article
in the Full SHA-1". Advances in Cryptology – CRYPTO 2005. Lecture Notes in Computer Science. Vol. 3621. pp. 17–36. doi:10.1007/11535218_2. ISBN 978-3-540-31870-5Deterministic encryption (897 words) [view diff] exact match in snippet view article find links to article
Keyword Search" (PDF). Advances in Cryptology - EUROCRYPT 2004. Lecture Notes in Computer Science. Vol. 3027. pp. 506–522. doi:10.1007/978-3-540-24676-3_30PragmaDev Studio (1,884 words) [view diff] exact match in snippet view article find links to article
Simulators". System Analysis and Modeling: About Models. Lecture Notes in Computer Science. Vol. 6598. Springer, Berlin, Heidelberg. pp. 144–155. doi:10T-function (713 words) [view diff] exact match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems - CHES 2002. Lecture Notes in Computer Science. Vol. 2523. Springer-Verlag. pp. 470–483. doi:10.1007/3-540-36400-5_34Lattice-based cryptography (2,872 words) [view diff] exact match in snippet view article find links to article
ring-based public key cryptosystem". Algorithmic Number Theory. Lecture Notes in Computer Science. Vol. 1423. pp. 267–288. CiteSeerX 10.1.1.25.8422. doi:10Homomorphic encryption (4,692 words) [view diff] exact match in snippet view article find links to article
Encryption Scheme". Advances in Cryptology – EUROCRYPT 2011. Lecture Notes in Computer Science. Vol. 6632. pp. 129–148. doi:10.1007/978-3-642-20465-4_9.Feistel cipher (1,316 words) [view diff] exact match in snippet view article find links to article
Boneh, Dan (ed.), Advances in Cryptology - CRYPTO 2003 (PDF), Lecture Notes in Computer Science, vol. 2729, pp. 513–529, doi:10.1007/b11817, ISBN 978-3-540-40674-7Inductive logic programming (4,248 words) [view diff] case mismatch in snippet view article find links to article
Ronald de (1997). Foundations of inductive logic programming. Lecture notes in computer science Lecture notes in artificial intelligence. Berlin Heidelberg:OPTICS algorithm (2,133 words) [view diff] exact match in snippet view article find links to article
Outliers". Principles of Data Mining and Knowledge Discovery. Lecture Notes in Computer Science. Vol. 1704. Springer-Verlag. pp. 262–270. doi:10.1007/b72280Merkle tree (1,787 words) [view diff] exact match in snippet view article find links to article
Encryption Function". Advances in Cryptology – CRYPTO '87. Lecture Notes in Computer Science. Vol. 293. pp. 369–378. doi:10.1007/3-540-48184-2_32. ISBN 978-3-540-18796-7Identity-based cryptography (868 words) [view diff] exact match in snippet view article find links to article
(eds.). Advances in Cryptology Proceedings of CRYPTO '84. Lecture Notes in Computer Science. Vol. 196 (1 ed.). Springer Berlin Heidelberg. pp. 47–53.One-key MAC (919 words) [view diff] exact match in snippet view article find links to article
(2003-02-24). "OMAC: One-Key CBC MAC". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 2887. Springer, Berlin, Heidelberg. pp. 129–153. doi:10HyperNEAT (1,263 words) [view diff] exact match in snippet view article find links to article
Mouret, Jean-Baptiste (eds.). From Animals to Animats 11. Lecture Notes in Computer Science. Vol. 6226. Springer Berlin Heidelberg. pp. 533–543. CiteSeerX 10Coppersmith method (767 words) [view diff] exact match in snippet view article find links to article
Modular Equation". Advances in Cryptology — EUROCRYPT '96. Lecture Notes in Computer Science. Vol. 1070. pp. 155–165. doi:10.1007/3-540-68339-9_14.Multitier programming (2,772 words) [view diff] exact match in snippet view article find links to article
Without Tiers". Formal Methods for Components and Objects. Lecture Notes in Computer Science. Vol. 4709. pp. 266–296. doi:10.1007/978-3-540-74792-5_12Symposium on Experimental Algorithms (731 words) [view diff] exact match in snippet view article find links to article
Kulikov, Alexander S., eds. (2016). Experimental Algorithms. Lecture Notes in Computer Science. Vol. 9685. doi:10.1007/978-3-319-38851-9. ISBN 978-3-319-38850-2Randomness test (1,173 words) [view diff] exact match in snippet view article find links to article
Cellular Automata". Advances in Cryptology — EUROCRYPT '91. Lecture Notes in Computer Science. Vol. 547. pp. 186–199. doi:10.1007/3-540-46416-6_17. ISBN 978-3-540-54620-7Data Encryption Standard (6,717 words) [view diff] exact match in snippet view article find links to article
for DES Cipher". Advances in Cryptology — EUROCRYPT '93. Lecture Notes in Computer Science. Vol. 765. Springer, Berlin, Heidelberg. pp. 386–397. doi:10DPLL(T) (434 words) [view diff] exact match in snippet view article
Rajeev; Peled, Doron A. (eds.). Computer Aided Verification. Lecture Notes in Computer Science. Vol. 3114. Springer Berlin Heidelberg. pp. 175–188. doi:10CL-HTTP (643 words) [view diff] exact match in snippet view article find links to article
system on world wide web". Intelligent Tutoring Systems. Lecture Notes in Computer Science. Vol. 1086/1996. Springer. pp. 261–269. doi:10.1007/3-540-61327-7_123Fly algorithm (3,630 words) [view diff] exact match in snippet view article find links to article
Jean; Sapin, Emmanuel (2009). "Flies Open a Door to SLAM.". Lecture Notes in Computer Science. Applications of Evolutionary Computation (EvoApplicationsR-tree (2,966 words) [view diff] exact match in snippet view article find links to article
Geographic Data". Advances in Spatial and Temporal Databases. Lecture Notes in Computer Science. Vol. 8098. p. 146. doi:10.1007/978-3-642-40235-7_9. ISBN 978-3-642-40234-0Register allocation (5,143 words) [view diff] exact match in snippet view article find links to article
Programming". Languages and Compilers for Parallel Computing. Lecture Notes in Computer Science. Vol. 4382. pp. 267–282. CiteSeerX 10.1.1.75.6911. doi:10MD4 (879 words) [view diff] exact match in snippet view article find links to article
(2008-02-10). "MD4 is Not One-Way" (PDF). Fast Software Encryption. Lecture Notes in Computer Science. Vol. 5086. Springer. pp. 412–428. doi:10.1007/978-3-540-71039-4_26SAT solver (3,628 words) [view diff] exact match in snippet view article find links to article
Principles and Practice of Constraint Programming – CP 2007, Lecture Notes in Computer Science, vol. 4741, pp. 544–558, CiteSeerX 10.1.1.70.5471, doi:10StegFS (312 words) [view diff] exact match in snippet view article find links to article
Shamir, Adi (1998). The Steganographic File System (PDF). Lecture Notes in Computer Science. Vol. 1525. pp. 73–82. CiteSeerX 10.1.1.42.1676. doi:10.1007/3-540-49380-8_6ProVerif (1,382 words) [view diff] exact match in snippet view article find links to article
WS-Security Protocols". Web Services and Formal Methods. Lecture Notes in Computer Science. Vol. 4184. Springer, Berlin, Heidelberg. pp. 88–106. CiteSeerX 10Moni Naor (673 words) [view diff] exact match in snippet view article find links to article
"Broadcast Encryption". Advances in Cryptology — CRYPTO' 93. Lecture Notes in Computer Science. Vol. 773. pp. 480–491. doi:10.1007/3-540-48329-2_40. ISBN 978-3-540-57766-9Queue number (2,715 words) [view diff] exact match in snippet view article find links to article
Germany, September 21–24, 2010, Revised Selected Papers, Lecture Notes in Computer Science, vol. 6502, Heidelberg: Springer, pp. 68–79, doi:10.1007/978-3-642-18469-7_7Cognitive computing (1,602 words) [view diff] exact match in snippet view article find links to article
Cognitive Augmentation – A Case Study". Augmented Cognition. Lecture Notes in Computer Science. Vol. 11580. pp. 533–545. arXiv:2211.06479. doi:10.1007/978-3-030-22419-6_38Rocq (1,882 words) [view diff] exact match in snippet view article find links to article
TPHOLs 2005, Oxford, UK, August 22–25, 2005, Proceedings. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. pp. 98–113. doi:10.1007/11541868_7Annotation (3,658 words) [view diff] exact match in snippet view article find links to article
Yannick (eds.). Knowledge Engineering and Knowledge Management. Lecture Notes in Computer Science. Vol. 11313. Cham: Springer International Publishing. pp. 19–33Secure two-party computation (1,093 words) [view diff] exact match in snippet view article find links to article
Single-Execution Setting", Advances in Cryptology – EUROCRYPT 2017, Lecture Notes in Computer Science, vol. 10212, Cham: Springer International Publishing, pp. 399–424Bot prevention (1,033 words) [view diff] exact match in snippet view article find links to article
of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science. Vol. 12223. Cham: Springer International Publishing. pp. 135–159Computational Diffie–Hellman assumption (796 words) [view diff] exact match in snippet view article find links to article
Diffie–Hellman is as strong as discrete log for certain primes (PDF), Lecture Notes in Computer Science, vol. 403, pp. 530–539, doi:10.1007/0-387-34799-2_38, ISBN 978-0-387-97196-4Transaction malleability problem (638 words) [view diff] exact match in snippet view article find links to article
Rohloff, Kurt (eds.). Financial Cryptography and Data Security. Lecture Notes in Computer Science. Vol. 8976. Berlin, Heidelberg: Springer. pp. 1–18. doi:10Cryptographic hash function (6,300 words) [view diff] exact match in snippet view article find links to article
Other Primitives". Advances in Cryptology – EUROCRYPT 2005. Lecture Notes in Computer Science. Vol. 3494. pp. 96–113. doi:10.1007/11426639_6. ISBN 978-3-540-25910-7Go and mathematics (1,727 words) [view diff] exact match in snippet view article find links to article
problems". Mathematical Foundations of Computer Science 1984. Lecture Notes in Computer Science. Vol. 176. pp. 498–506. doi:10.1007/BFb0030333. ISBN 978-3-540-13372-8Largest empty rectangle (816 words) [view diff] exact match in snippet view article find links to article
the largest empty rectangle". STACS-1984, Lecture Notes in Computer Science. Lecture Notes in Computer Science. 166: 43–54. doi:10.1007/3-540-12920-0_4Budget-additive valuation (850 words) [view diff] exact match in snippet view article find links to article
for Maximizing Ad-Auctions Revenue", Algorithms – ESA 2007, Lecture Notes in Computer Science, vol. 4698, Berlin, Heidelberg: Springer Berlin HeidelbergAdaptive sort (652 words) [view diff] exact match in snippet view article find links to article
Alistair Moffat (1992). A framework for adaptive sorting. Lecture Notes in Computer Science. Vol. 621. Berlin: Springer Berlin / Heidelberg. pp. 422–433Zero-knowledge proof (7,955 words) [view diff] exact match in snippet view article find links to article
Children". Advances in Cryptology — CRYPTO' 89 Proceedings (PDF). Lecture Notes in Computer Science. Vol. 435. pp. 628–631. doi:10.1007/0-387-34805-0_60. ISBN 978-0-387-97317-3Cardano (blockchain platform) (3,122 words) [view diff] exact match in snippet view article
Peter B.; Sala, Massimiliano (eds.). The Extended UTXO Model. Lecture Notes in Computer Science. Cham: Springer International Publishing. pp. 525–539. doi:10Christine Paulin-Mohring (507 words) [view diff] exact match in snippet view article find links to article
Machinery. She was elected to the Academia Europaea in 2014. Lecture Notes in Computer Science. Types for Proofs and Programs: International Workshop TYPES'96Broadcast encryption (802 words) [view diff] exact match in snippet view article find links to article
Advances in Cryptology — CRYPTO' 93 (Extended abstract). Lecture Notes in Computer Science. Vol. 773. pp. 480–491. doi:10.1007/3-540-48329-2_40. ISBN 978-3-540-57766-9Petri net (7,255 words) [view diff] exact match in snippet view article find links to article
Lectures on Petri Nets I: Basic Models – Advances in Petri Nets. Lecture Notes in Computer Science. Vol. 1491. Springer. pp. 12–121. doi:10.1007/3-540-65306-6_14Fiat–Shamir heuristic (1,068 words) [view diff] exact match in snippet view article find links to article
Signature Problems". Advances in Cryptology — CRYPTO' 86. Lecture Notes in Computer Science. Vol. 263. Springer Berlin Heidelberg. pp. 186–194. doi:10Bruce M. McLaren (4,006 words) [view diff] exact match in snippet view article find links to article
Toward Tutoring Help Seeking. Intelligent Tutoring Systems Lecture Notes in Computer Science, 227–239. Ashley, K.D. & McLaren, B.M. (1995). Reasoning withAlfred Menezes (832 words) [view diff] exact match in snippet view article find links to article
(with S. Chatterjee, N. Koblitz and P. Sarkar), Mycrypt 2016, Lecture Notes in Computer Science, 10311 (2017), 21–55. doi:10.1007/978-3-319-61273-7_3 "AnotherVenansius Baryamureeba (1,584 words) [view diff] exact match in snippet view article find links to article
for Linear Programming". Large-Scale Scientific Computing. Lecture Notes in Computer Science. Vol. 3743. pp. 629–637. doi:10.1007/11666806_72. ISBN 978-3-540-31994-8Identity-based encryption (1,942 words) [view diff] exact match in snippet view article find links to article
Barbara, California, USA, August 19–22, 1984, Proceedings. Lecture Notes in Computer Science. Vol. 196. Springer. pp. 47–53. doi:10.1007/3-540-39568-7_5Advanced Encryption Standard (5,679 words) [view diff] exact match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems - CHES 2002. Lecture Notes in Computer Science. Vol. 2523. pp. 159–171. doi:10.1007/3-540-36400-5_13.GNUnet (2,141 words) [view diff] exact match in snippet view article find links to article
Seberry, Jennifer (eds.). Efficient Sharing of Encrypted Data. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 107–120. CiteSeerX 10.1.1Book embedding (8,167 words) [view diff] exact match in snippet view article find links to article
graphs have constant book thickness", Algorithms – ESA 2015, Lecture Notes in Computer Science, vol. 9294, Springer, pp. 130–141, doi:10.1007/978-3-662-48350-3_12Artificial immune system (1,710 words) [view diff] exact match in snippet view article find links to article
of Degeneracy in a Lymph Node". Artificial Immune Systems. Lecture Notes in Computer Science. Vol. 4163. pp. 164–177. doi:10.1007/11823940_13. ISBN 978-3-540-37749-8Augmented cognition (1,758 words) [view diff] exact match in snippet view article find links to article
Schmorrow, Dylan D. (ed.). Foundations of Augmented Cognition. Lecture Notes in Computer Science. Vol. 4565. Springer Berlin Heidelberg. pp. 220–228. doi:10Infobox (1,380 words) [view diff] exact match in snippet view article find links to article
Vasudeva (June 2011). Multidisciplinary Information Retrieval. Lecture Notes in Computer Science. Vol. 6653. Springer Berlin Heidelberg. doi:10.1007/978-3-642-21353-3Pairing-based cryptography (1,150 words) [view diff] exact match in snippet view article find links to article
cryptography at high security levels". Cryptography and Coding. Lecture Notes in Computer Science. Vol. 3796. pp. 13–36. doi:10.1007/11586821_2. ISBN 978-3-540-30276-6CADE ATP System Competition (378 words) [view diff] exact match in snippet view article find links to article
Theories Competition" (PDF). Computer Aided Verification. Lecture Notes in Computer Science. 3576. Springer: 20–23. doi:10.1007/11513988_4. ISBN 978-3-540-27231-1CADE ATP System Competition (378 words) [view diff] exact match in snippet view article find links to article
Theories Competition" (PDF). Computer Aided Verification. Lecture Notes in Computer Science. 3576. Springer: 20–23. doi:10.1007/11513988_4. ISBN 978-3-540-27231-1Levenshtein automaton (561 words) [view diff] exact match in snippet view article find links to article
Automata Theory and Applications. Lecture Notes in Computer Science. Vol. 9618. Lecture Notes in Computer Science. pp. 207–218. doi:10.1007/978-3-319-30000-9_16Threshold cryptosystem (868 words) [view diff] exact match in snippet view article find links to article
Gilles (ed.). Advances in Cryptology — CRYPTO' 89 Proceedings. Lecture Notes in Computer Science. Vol. 435. New York, NY: Springer. pp. 307–315. doi:10.1007/0-387-34805-0_28Prince (cipher) (1,376 words) [view diff] exact match in snippet view article
Exhaustive Key Search". Advances in Cryptology – CRYPTO '96. Lecture Notes in Computer Science. Vol. 1109. pp. 252–267. doi:10.1007/3-540-68697-5_20.Amit Sahai (1,154 words) [view diff] exact match in snippet view article find links to article
Challenges". Theory of Cryptography. Lecture Notes in Computer Science. Vol. 6597 (Lecture Notes in Computer Science). Springer Berlin Heidelberg. pp. 253–273Larch Prover (1,558 words) [view diff] exact match in snippet view article find links to article
Proceedings of the Fourth International Conference CAV'92), Lecture Notes in Computer Science 663, Springer-Verlag, June 1992, pages 44–55. Urban EngbergExponential time hypothesis (3,047 words) [view diff] exact match in snippet view article find links to article
Ljubljana, Slovenia, September 12–14, 2012, Proceedings, Lecture Notes in Computer Science, vol. 7535, Springer, pp. 13–24, CiteSeerX 10.1.1.680.8401Alternating step generator (565 words) [view diff] exact match in snippet view article find links to article
Bruijn Sequences". Advances in Cryptology — EUROCRYPT '87. Lecture Notes in Computer Science. Vol. 304. Berlin, Heidelberg: Springer. pp. 5–14. doi:10Categorical quantum mechanics (2,203 words) [view diff] exact match in snippet view article find links to article
EACSL Annual Conference on Computer Science Logic (CSL). Lecture Notes in Computer Science. Vol. 6247. Springer. arXiv:1004.1598. doi:10.2168/LMCS-8(4:14)2012ElGamal encryption (1,467 words) [view diff] exact match in snippet view article find links to article
Decision Diffie-Hellman problem". Algorithmic Number Theory. Lecture Notes in Computer Science. Vol. 1423. pp. 48–63. CiteSeerX 10.1.1.461.9971. doi:10.1007/BFb0054851Loop-invariant code motion (596 words) [view diff] exact match in snippet view article find links to article
Detection". Automated Technology for Verification and Analysis. Lecture Notes in Computer Science. Vol. 10482. pp. 91–108. doi:10.1007/978-3-319-68167-2_7.Galois/Counter Mode (3,051 words) [view diff] exact match in snippet view article find links to article
Systems - CHES 2007 . GCM-AES Architecture Optimized for FPGAs. Lecture Notes in Computer Science. Vol. 4727. Springer. pp. 227–238. doi:10.1007/978-3-540-74735-2_16Manumation (345 words) [view diff] exact match in snippet view article find links to article
Through E-Government: Myth or Reality?". Electronic Government. Lecture Notes in Computer Science. Vol. 3591. Springer. pp. 1–11. doi:10.1007/11545156_1.Anne Canteaut (513 words) [view diff] exact match in snippet view article find links to article
Graz, Austria, March 15-17, 2006, Revised Selected Papers. Lecture Notes in Computer Science. Vol. 4047. Springer. pp. 30–40. CiteSeerX 10.1.1.59.9346Fork–join queue (1,773 words) [view diff] exact match in snippet view article find links to article
Fork-Join Queueing Simulation". Computer Performance Engineering. Lecture Notes in Computer Science. Vol. 5652. pp. 16–29. CiteSeerX 10.1.1.158.7363. doi:10PRESENT (708 words) [view diff] exact match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems - CHES 2007. Lecture Notes in Computer Science. Vol. 4727. pp. 450–466. doi:10.1007/978-3-540-74735-2_31Model checking (2,788 words) [view diff] exact match in snippet view article find links to article
programs using fixpoints", Automata, Languages and Programming, Lecture Notes in Computer Science, vol. 85, pp. 169–181, doi:10.1007/3-540-10003-2_69, ISBN 978-3-540-10003-4Therese Biedl (202 words) [view diff] exact match in snippet view article find links to article
Copenhagen, Denmark, July 8–11, 2014, Proceedings, Part I. Lecture Notes in Computer Science. Vol. 8572. Springer. pp. 198–210. doi:10.1007/978-3-662-43948-7_17Speculative execution (978 words) [view diff] exact match in snippet view article find links to article
International Conference on Principles of Distributed Systems. Lecture Notes in Computer Science. Vol. 4305. Bordeaux, France: Springer. pp. 1–2. doi:10.1007/11945529_1Weak heap (2,127 words) [view diff] exact match in snippet view article find links to article
"On the performance of WEAK-HEAPSORT", Stacs 2000 (PDF), Lecture Notes in Computer Science, vol. 1770, Springer-Verlag, pp. 254–266, CiteSeerX 10.1.1Evolutionary algorithm (4,543 words) [view diff] exact match in snippet view article find links to article
Evolution of Evolutionary Algorithms". Genetic Programming. Lecture Notes in Computer Science. Vol. 3003. Springer. pp. 389–398. doi:10.1007/978-3-540-24650-3_37A5/1 (2,725 words) [view diff] exact match in snippet view article find links to article
Cryptanalysis of A5/1 on a PC". Fast Software Encryption—FSE 2000. Lecture Notes in Computer Science. Vol. 1978. pp. 1–18. doi:10.1007/3-540-44706-7_1. ISBN 978-3-540-41728-6Wikidata (3,682 words) [view diff] exact match in snippet view article find links to article
Multilinguality, Multimodality, and Interaction. CLEF 2018. Lecture Notes in Computer Science. Vol. 11018. p. 129. doi:10.1007/978-3-319-98932-7_12.Accumulator (cryptography) (2,795 words) [view diff] exact match in snippet view article
Signatures" (PDF). Advances in Cryptology — EUROCRYPT '93. Lecture Notes in Computer Science. Vol. 765. pp. 274–285. doi:10.1007/3-540-48285-7_24. ISBN 978-3-540-57600-6Contact graph (483 words) [view diff] exact match in snippet view article find links to article
2013, Lübeck, Germany, June 19-21, 2013, Revised Papers, Lecture Notes in Computer Science, vol. 8165, Springer, pp. 139–151, arXiv:1303.1279, doi:10Mean value analysis (1,587 words) [view diff] exact match in snippet view article find links to article
Performance Evaluation of Computer and Communication Systems. Lecture Notes in Computer Science. Vol. 729. p. 491. doi:10.1007/BFb0013865. ISBN 978-3-540-57297-8Persuasive technology (4,408 words) [view diff] exact match in snippet view article find links to article
Health-Promoting Mobile Applications". Persuasive Technology. Lecture Notes in Computer Science. Vol. 6137. pp. 150–161. doi:10.1007/978-3-642-13226-1_16Tree stack automaton (876 words) [view diff] exact match in snippet view article find links to article
Mathematical Foundations of Computer Science (MFCS 1990). Lecture Notes in Computer Science, Vol. 452, pages 313–321, doi:10.1007/BFb0029624. Scott, DanaAlgorithmic skeleton (8,819 words) [view diff] exact match in snippet view article find links to article
Euro-Par Conference: Parallel Processing, volume 4641 of Lecture Notes in Computer Science, pages 72–81. Springer-Verlag, 2007. D. Caromel, L. HenrioPiling-up lemma (1,445 words) [view diff] exact match in snippet view article find links to article
for DES Cipher". Advances in Cryptology – EUROCRYPT '93. Lecture Notes in Computer Science. Vol. 765. pp. 386–397. doi:10.1007/3-540-48285-7_33. ISBN 978-3-540-57600-6Yacas (282 words) [view diff] exact match in snippet view article find links to article
Intelligence, Automated Reasoning, and Symbolic Computation, Lecture Notes in Computer Science, vol. 2385, Springer, pp. 332–336, doi:10.1007/3-540-45470-5_29Free Haven Project (928 words) [view diff] exact match in snippet view article find links to article
Haven Project: Distributed Anonymous Storage Service" (PDF). Lecture Notes in Computer Science 2009. Proc. Workshop on Design Issues in Anonymity and Unobservability2-EXPTIME (960 words) [view diff] exact match in snippet view article find links to article
on Automata, Languages and Programming (ICALP 2003) (PDF), Lecture Notes in Computer Science, vol. 2719, Springer-Verlag, pp. 767–775, doi:10.1007/3-540-45061-0_60Curry (programming language) (1,954 words) [view diff] exact match in snippet view article
Programming Logics - Essays in Memory of Harald Ganzinger. Lecture Notes in Computer Science. Vol. 7797. pp. 123–168. doi:10.1007/978-3-642-37651-1_6.Elliptic-curve Diffie–Hellman (2,168 words) [view diff] exact match in snippet view article find links to article
2006. Lecture Notes in Computer Science. Vol. 3958. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds) Public Key Cryptography - PKC 2006. Lecture NotesIan Horrocks (1,058 words) [view diff] exact match in snippet view article find links to article
Reasoner: System Description" (PDF). Automated Reasoning. Lecture Notes in Computer Science. Vol. 4130. pp. 292–297. CiteSeerX 10.1.1.65.2672. doi:10RC2 (423 words) [view diff] exact match in snippet view article find links to article
Qing, S. (eds.). Information and Communications Security. Lecture Notes in Computer Science. Vol. 1334. Springer, Berlin, Heidelberg. pp. 233–246. doi:10Knowledge extraction (4,445 words) [view diff] exact match in snippet view article find links to article
Acquisition Method for the Semantic Web", WAIM, volume 3739 of Lecture Notes in Computer Science, page 209-220. Springer. doi:10.1007/11563952_19 Tirmizi etC. Pandu Rangan (1,223 words) [view diff] exact match in snippet view article find links to article
and Security (SETS), (2005-2007). Member, Editorial Board, Lecture Notes in Computer Science Series (LNCS Series), Springer-Verlag, Germany, (2005-2008)Gennady Makanin (1,099 words) [view diff] exact match in snippet view article find links to article
equations in a free group". Word Equations and Related Topics. Lecture Notes in Computer Science. Vol. 572. pp. 1–11. doi:10.1007/3-540-55124-7_1. ISBN 978-3-540-55124-9Orc (programming language) (483 words) [view diff] exact match in snippet view article
Orchestration and Its Semantic Properties. Concurrency Theory. Lecture Notes in Computer Science. Vol. 4137. Bonn, Germany: Springer. pp. 477–491. doi:10.1007/11817949_32Datalog (4,894 words) [view diff] exact match in snippet view article find links to article
Georg; Furche, Tim; Sellers, Andrew (eds.). Datalog Reloaded. Lecture Notes in Computer Science. Vol. 6702. Berlin, Heidelberg: Springer. pp. 181–220. doi:10Tatami (1,402 words) [view diff] exact match in snippet view article find links to article
2010, Nha Trang, Vietnam, July 19-21, 2010. Proceedings. Lecture Notes in Computer Science. Vol. 6196. Springer. pp. 288–297. arXiv:1103.3309. doi:10Pancake sorting (2,201 words) [view diff] exact match in snippet view article find links to article
Tighter Inapproximability Results". Proc. 26th ICALP (1999). Lecture Notes in Computer Science. 1644: 200–09. Berman, P.; Karpinski, M.; Hannenhalli, S.Özalp Babaoğlu (1,201 words) [view diff] exact match in snippet view article find links to article
Peer-to-Peer Applications", Engineering Self-Organising Systems, Lecture Notes in Computer Science, vol. 2977, Berlin, Heidelberg: Springer Berlin HeidelbergKlaus-Robert Müller (996 words) [view diff] exact match in snippet view article find links to article
(2022). xxAI – Beyond Explainable Artificial Intelligence. Lecture Notes in Computer Science. Vol. 13200. Springer Cham. doi:10.1007/978-3-031-04083-2Ideal lattice (6,061 words) [view diff] exact match in snippet view article find links to article
Active Attacks" (PDF). Public Key Cryptography – PKC 2008. Lecture Notes in Computer Science. Vol. 4939. pp. 162–179. doi:10.1007/978-3-540-78440-1_10Strong RSA assumption (228 words) [view diff] exact match in snippet view article find links to article
(eds) Advances in Cryptology – EUROCRYPT ’97. EUROCRYPT 1997. Lecture Notes in Computer Science, vol 1233. Springer, Berlin, Heidelberg. doi:10.1007/3-540-69053-0_33Scale-space segmentation (1,199 words) [view diff] exact match in snippet view article find links to article
watershed segmentation" (PDF). Image Analysis and Processing. Lecture Notes in Computer Science. Vol. 1310. pp. 6–13. doi:10.1007/3-540-63507-6_178. ISBN 978-3-540-63507-9Memory-hard function (825 words) [view diff] exact match in snippet view article find links to article
In Boneh, Dan (ed.). Advances in Cryptology - CRYPTO 2003. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. pp. 426–444. doi:10.1007/978-3-540-45146-4_25Non-interactive zero-knowledge proof (2,465 words) [view diff] exact match in snippet view article find links to article
Garay, Juan A. (eds.). Advances in Cryptology – CRYPTO 2013. Lecture Notes in Computer Science. Vol. 8043. Berlin, Heidelberg: Springer. pp. 90–108. doi:10Topincs (424 words) [view diff] exact match in snippet view article find links to article
For Topic Maps". Leveraging the Semantics of Topic Maps. Lecture Notes in Computer Science. Vol. 4438. Berlin Heidelberg: Springer. pp. 175–183. doi:10Proof of work (4,181 words) [view diff] exact match in snippet view article find links to article
Combatting Junk Mail". Advances in Cryptology — CRYPTO' 92. Lecture Notes in Computer Science. Vol. 740. Springer. pp. 139–147. doi:10.1007/3-540-48071-4_10Hartmut Ehrig (710 words) [view diff] exact match in snippet view article find links to article
Graph-Grammars and Their Application to Computer Science and Biology. Lecture Notes in Computer Science. Vol. 73. Heidelberg: Springer. doi:10.1007/BFb0025726.Instrumental convergence (2,947 words) [view diff] exact match in snippet view article find links to article
and Intelligent Agents". Artificial General Intelligence. Lecture Notes in Computer Science. Vol. 6830. pp. 11–20. doi:10.1007/978-3-642-22887-2_2.Key generator (213 words) [view diff] exact match in snippet view article find links to article
and Key Distribution". Advances in Cryptology — CRYPTO' 93. Lecture Notes in Computer Science. Vol. 773. pp. 232–249. CiteSeerX 10.1.1.62.3423. doi:10Semantic similarity (4,222 words) [view diff] exact match in snippet view article find links to article
International Conference on Geospatial Semantics (GEOS 2007). Lecture Notes in Computer Science. 2007. pp. 128–145. CiteSeerX 10.1.1.172.5544. "Geo-Net-PTCryptographic multilinear map (1,027 words) [view diff] exact match in snippet view article find links to article
cryptography at high security levels". Cryptography and Coding. Lecture Notes in Computer Science. Vol. 3796. pp. 13–36. doi:10.1007/11586821_2. ISBN 978-3-540-30276-6Infer Static Analyzer (780 words) [view diff] exact match in snippet view article find links to article
Verifier for Memory Safety of C Programs". NASA Formal Methods. Lecture Notes in Computer Science. Vol. 6617. Springer, Berlin, Heidelberg. pp. 459–465. CiteSeerX 10Truthful job scheduling (1,748 words) [view diff] exact match in snippet view article find links to article
Machines". In Diekert, Volker; Habib, Michel (eds.). Stacs 2004. Lecture Notes in Computer Science. Vol. 2996. Berlin, Heidelberg: Springer. pp. 608–619. doi:10Program structure tree (1,164 words) [view diff] exact match in snippet view article find links to article
International Colloquium on Automata, Languages and Programming, Lecture Notes in Computer Science, vol. 443, Springer-Verlag, pp. 598–611, doi:10.1007/BFb0032061Massive Online Analysis (803 words) [view diff] exact match in snippet view article find links to article
Data Streams". Advanced Information Systems Engineering. Lecture Notes in Computer Science. Vol. 8188. pp. 480–492. CiteSeerX 10.1.1.638.5472. doi:10Flora-2 (786 words) [view diff] exact match in snippet view article find links to article
for Semantic Web, Formal Approaches to Agent-Based Systems, Lecture Notes in Computer Science v. 3228, Springer Verlag. A. D. Lattner , J. D. Gehrke , IComputational hardness assumption (3,302 words) [view diff] exact match in snippet view article find links to article
Position Paper". Theory of Cryptography Conference (TCC) 2016. Lecture Notes in Computer Science. Vol. 9562. Springer. pp. 505–522. doi:10.1007/978-3-662-49096-9_21TWINKLE (695 words) [view diff] exact match in snippet view article find links to article
Christof (eds.). Cryptographic Hardware and Embedded Systems. Lecture Notes in Computer Science. Vol. 1717. Berlin, Heidelberg: Springer. pp. 2–12. doi:10Ensemble learning (6,692 words) [view diff] exact match in snippet view article find links to article
Announcement)". Cyber Security Cryptography and Machine Learning. Lecture Notes in Computer Science. Vol. 11527. pp. 202–207. doi:10.1007/978-3-030-20951-3_18Knowledge graph (2,341 words) [view diff] exact match in snippet view article find links to article
Integrated Knowledge Graph". The Semantic Web – ISWC 2020. Lecture Notes in Computer Science. Vol. 12507. pp. 430–446. doi:10.1007/978-3-030-62466-8_27Dense subgraph (1,897 words) [view diff] exact match in snippet view article find links to article
Saarbrücken, Germany, September 5-8, 2000, Proceedings, Lecture Notes in Computer Science, vol. 1913, Springer, pp. 84–95, doi:10.1007/3-540-44436-X_10UpStage (1,499 words) [view diff] exact match in snippet view article find links to article
Paolo; Urban, Bodo (eds.). Transactions on Edutainment X. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. pp. 146–160. doi:10.1007/978-3-642-37919-2_8Server-based signatures (1,187 words) [view diff] exact match in snippet view article find links to article
Signatures". Advances in Cryptology – CRYPTO' 89 Proceedings. Lecture Notes in Computer Science. Vol. 435. p. 263. doi:10.1007/0-387-34805-0_24. ISBN 978-0-387-97317-3Cooperating Validity Checker (1,994 words) [view diff] exact match in snippet view article find links to article
Kovács, Laura; Pattinson, Dirk (eds.). Automated Reasoning. Lecture Notes in Computer Science. Vol. 13385. Cham: Springer International Publishing. pp. 15–35Fisher kernel (834 words) [view diff] exact match in snippet view article find links to article
Petros; Paragios, Nikos (eds.). Computer Vision – ECCV 2010. Lecture Notes in Computer Science. Vol. 6314. Berlin, Heidelberg: Springer. pp. 143–156. doi:10Paulo S. L. M. Barreto (833 words) [view diff] exact match in snippet view article find links to article
Identity-Based Signatures and Signcryption from Bilinear Maps. Lecture Notes in Computer Science. Vol. 3788. pp. 515–532. doi:10.1007/11593447_28. ISBN 978-3-540-30684-9Roland Carl Backhouse (757 words) [view diff] exact match in snippet view article find links to article
Programming (AFP 98),12–19 September 1998 Braga Portugal]. Lecture Notes in Computer Science. Vol. 1608. pp. 28–115. doi:10.1007/10704973_2. ISBN 978-3-540-66241-9Contrail (software) (566 words) [view diff] exact match in snippet view article
Contrail". Euro-Par 2011: Parallel Processing Workshops. Lecture Notes in Computer Science. Vol. 7155. pp. 159–168. doi:10.1007/978-3-642-29737-3_19Information Processing in Medical Imaging (1,631 words) [view diff] exact match in snippet view article find links to article
Medical Imaging - 12th | Alan C.F. Colchester | Springer. Lecture Notes in Computer Science. Springer. 1991. ISBN 9783540542469. Barrett, Harrison H.Achterbahn (stream cipher) (532 words) [view diff] exact match in snippet view article
Encryption, 14th International Workshop. Revised Selected Papers, Lecture Notes in Computer Science. Vol. 4593. Luxembourg: Springer. pp. 73–86. ISBN 978-3-540-74617-1Global Digital Mathematics Library (271 words) [view diff] exact match in snippet view article find links to article
CICM 2017, Edinburgh, UK, July 17-21, 2017, Proceedings, Lecture Notes in Computer Science, vol. 10383, Springer, pp. 56–69, doi:10.1007/978-3-319-62075-6_5McEliece cryptosystem (2,093 words) [view diff] exact match in snippet view article find links to article
Fourier sampling attacks. Advances in cryptology—CRYPTO 2011. Lecture Notes in Computer Science. Vol. 6841. Heidelberg: Springer. pp. 761–779. doi:10Lattice problem (3,660 words) [view diff] exact match in snippet view article find links to article
Extreme Pruning". Advances in Cryptology – EUROCRYPT 2010. Lecture Notes in Computer Science. Vol. 6110. Springer, Berlin, Heidelberg. pp. 257–278. doi:10Table (information) (1,463 words) [view diff] exact match in snippet view article
Applications of Natural Language to Information Systems (NLDB 2016). Lecture Notes in Computer Science. Vol. 9612. pp. 162–174. doi:10.1007/978-3-319-41754-7_14Proof of secure erasure (635 words) [view diff] exact match in snippet view article find links to article
Computable Self-erasing Functions". Theory of Cryptography. Lecture Notes in Computer Science. Vol. 6597. pp. 125–143. doi:10.1007/978-3-642-19571-6_9.Urban informatics (3,295 words) [view diff] exact match in snippet view article find links to article
Cities Technologies, Experiences, and Future Perspectives. Lecture Notes in Computer Science. Vol. 1765. Berlin: Springer. doi:10.1007/3-540-46422-0.Inductive programming (2,549 words) [view diff] exact match in snippet view article find links to article
Programming and Beyond; Essays in Honour of Robert A. Kowalski. Lecture Notes in Computer Science. Vol. LNAI 2407. pp. 310–346. doi:10.1007/3-540-45628-7_13IEC 62682 (382 words) [view diff] exact match in snippet view article find links to article
Management of Information. Information and Knowledge in Context. Lecture Notes in Computer Science. Vol. 9173. Cham: Springer International Publishing. pp. 549–556School timetable (1,074 words) [view diff] exact match in snippet view article find links to article
Programming, Artificial Intelligence, and Operations Research. Lecture Notes in Computer Science. Vol. 12296. Springer International Publishing. pp. 283–299Apache Lucene (1,251 words) [view diff] exact match in snippet view article find links to article
Castells, Pablo (eds.), Advances in Information Retrieval, Lecture Notes in Computer Science, vol. 12036, Cham: Springer International Publishing, pp. 28–34Patricia Bouyer-Decitre (470 words) [view diff] exact match in snippet view article find links to article
Software Technology and Theoretical Computer Science (PDF), Lecture Notes in Computer Science, vol. 3328, Springer, pp. 148–160, doi:10.1007/978-3-540-30538-5_13Pseudotriangle (2,058 words) [view diff] exact match in snippet view article find links to article
of Software Technology and Theoretical Computer Science, Lecture Notes in Computer Science, vol. 3328, Springer-Verlag, pp. 299–310, arXiv:0705.3888Osman Yaşar (445 words) [view diff] exact match in snippet view article find links to article
Workforce and Pedagogy to Improve Math and Science Education,” Lecture Notes in Computer Science, Vol. 3992 (2006), pp. 169–176. O. Yaşar, J. Maliekal, L.Digital signage (2,494 words) [view diff] exact match in snippet view article find links to article
Campilho, Aurélio (eds.). Image Analysis and Recognition. Lecture Notes in Computer Science. Vol. 5627. Berlin, Heidelberg: Springer. pp. 347–358. doi:10Random subspace method (969 words) [view diff] exact match in snippet view article find links to article
neighbors in random subspaces". Advances in Pattern Recognition. Lecture Notes in Computer Science. Vol. 1451. pp. 640–648. doi:10.1007/BFb0033288. ISBN 978-3-540-64858-1Heavy-light decomposition (1,017 words) [view diff] exact match in snippet view article find links to article
trees", Algorithms and data structures (Ottawa, ON, 1991), Lecture Notes in Computer Science, vol. 519, Berlin: Springer, pp. 32–40, doi:10.1007/BFb0028247Linguistic Linked Open Data (3,697 words) [view diff] exact match in snippet view article find links to article
Conference, Sydney, NSW, Australia, October 21–25, 2013. Lecture Notes in Computer Science. Vol. 7908. Berlin, Heidelberg: Springer. pp. 98–113. doi:10SMP (computer algebra system) (593 words) [view diff] exact match in snippet view article
Jenks, "A Primer: 11 Keys to New Scratchpad", EUROSAM 84, Lecture Notes in Computer Science 174 ISBN 354013350X p. 123-142 J.H. Davenport, Y. Siret, ESecurity level (1,332 words) [view diff] exact match in snippet view article find links to article
precomputation" (PDF). Advances in Cryptology - ASIACRYPT 2013. Lecture Notes in Computer Science. pp. 321–340. doi:10.1007/978-3-642-42045-0_17. ISBN 978-3-642-42044-3Feature engineering (2,184 words) [view diff] exact match in snippet view article find links to article
(PDF). Principles of Data Mining and Knowledge Discovery. Lecture Notes in Computer Science. Vol. 1704. pp. 378–383. doi:10.1007/978-3-540-48247-5_46Mutilated chessboard problem (2,878 words) [view diff] exact match in snippet view article find links to article
2010, Nha Trang, Vietnam, July 19–21, 2010, Proceedings, Lecture Notes in Computer Science, vol. 6196, Springer, pp. 288–297, arXiv:1103.3309, doi:10Ron Rivest (1,543 words) [view diff] exact match in snippet view article find links to article
Theory, Reykjavík, Iceland, July 3–5, 1996, Proceedings. Lecture Notes in Computer Science. Vol. 1097. Springer. pp. 368–379. doi:10.1007/3-540-61422-2_146Distributed key generation (1,191 words) [view diff] exact match in snippet view article find links to article
Identity-Based Cryptography". Security and Cryptography for Networks. Lecture Notes in Computer Science. Vol. 6280. pp. 436–453. CiteSeerX 10.1.1.389.4486. doi:10Semantics (computer science) (1,671 words) [view diff] exact match in snippet view article
computation". Category Theory Applied to Computation and Control. Lecture Notes in Computer Science. Vol. 25. Springer. pp. 151–163. doi:10.1007/3-540-07142-3_75Set packing (1,514 words) [view diff] exact match in snippet view article find links to article
International Colloquium on Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 1443. Springer-Verlag. pp. 176–185. Halldórsson, MagnusDES-X (533 words) [view diff] exact match in snippet view article find links to article
Attacks". Advances in Cryptology — EUROCRYPT 2000 (PDF). Lecture Notes in Computer Science. Vol. 1807. pp. 589–606. doi:10.1007/3-540-45539-6_41.Monadic second-order logic (1,308 words) [view diff] exact match in snippet view article find links to article
Are Computable with Linear Delay". Computer Science Logic. Lecture Notes in Computer Science. 4207. Springer Berlin Heidelberg: 167–181. doi:10.1007/11874683_11Philippe Baptiste (4,439 words) [view diff] exact match in snippet view article find links to article
Principles and Practice of Constraint Programming – CP 2009, Lecture Notes in Computer Science, vol. 5732, Berlin, Heidelberg: Springer Berlin HeidelbergSearchable symmetric encryption (2,441 words) [view diff] exact match in snippet view article find links to article
Moti (eds.). Applied Cryptography and Network Security. Lecture Notes in Computer Science. Vol. 3531. Berlin, Heidelberg: Springer. pp. 442–455. doi:10ESC/Java (928 words) [view diff] exact match in snippet view article find links to article
2001: Formal Methods for Increasing Software Productivity. Lecture Notes in Computer Science. Vol. 2021. pp. 500–517. doi:10.1007/3-540-45251-6_29. ISBN 3-540-41791-5Software diversity (818 words) [view diff] exact match in snippet view article find links to article
(2011), "Diversity", Dependable and Historic Computing, Lecture Notes in Computer Science, vol. 6875, Springer Berlin Heidelberg, pp. 298–312, doi:10Markovian arrival process (1,008 words) [view diff] exact match in snippet view article find links to article
Performance Evaluation of Computer and Communication Systems. Lecture Notes in Computer Science. Vol. 729. pp. 330–358. doi:10.1007/BFb0013859. ISBN 3-540-57297-XGroupLens Research (3,181 words) [view diff] exact match in snippet view article find links to article
Development. Asia-Pacific Conference on Web Intelligence. Lecture Notes in Computer Science. Vol. 2198/2001. Springer Berlin/Heidelberg. pp. 438–442.Klaus Pohl (computer scientist) (725 words) [view diff] exact match in snippet view article
1st European Conference ServiceWave 2008, Volume 5377 of Lecture Notes in Computer Science, Berlin, Heidelberg, Springer, 2008. Klaus Pohl, Patrick HeymansDeepak Kapur (1,936 words) [view diff] exact match in snippet view article find links to article
specifications". 9th International Conference on Automated Deduction. Lecture Notes in Computer Science. Vol. 310. Springer, Berlin, Heidelberg. pp. 162–181. doi:10Barrier resilience (1,083 words) [view diff] exact match in snippet view article find links to article
Rhodes, Greece, July 10-11, 2009, Revised Selected Papers, Lecture Notes in Computer Science, vol. 5804, Springer, pp. 29–40, Bibcode:2009LNCS.5304...29BState complexity (3,375 words) [view diff] exact match in snippet view article find links to article
Automata". Mathematical Foundations of Computer Science 2005. Lecture Notes in Computer Science. Vol. 3618. pp. 544–555. doi:10.1007/11549345_47. ISBN 978-3-540-28702-5Markus Jakobsson (1,247 words) [view diff] exact match in snippet view article find links to article
Trustworthy Elections: New Directions in Electronic Voting (Lecture Notes in Computer Science / Security and Cryptology), David Chaum, Markus JakobssonEnvy-free pricing (2,559 words) [view diff] exact match in snippet view article find links to article
Walukiewicz, Igor (eds.). Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 5125. Springer Berlin Heidelberg. pp. 808–819. CiteSeerX 10Ball tree (1,401 words) [view diff] exact match in snippet view article find links to article
Similar Patches in Images?". Computer Vision – ECCV 2008 (PDF). Lecture Notes in Computer Science. Vol. 5303. p. 364. CiteSeerX 10.1.1.360.7582. doi:10Logic for Computable Functions (614 words) [view diff] exact match in snippet view article find links to article
(1979). Edinburgh LCF: A Mechanised Logic of Computation. Lecture Notes in Computer Science. Vol. 78. Berlin Heidelberg: Springer. doi:10.1007/3-540-09724-4HipNav (172 words) [view diff] exact match in snippet view article find links to article
Computing and Computer-Assisted Intervention – MICCAI 2000. Lecture Notes in Computer Science. Vol. 1935. pp. 1185–7. doi:10.1007/978-3-540-40899-4_126Uniform-machines scheduling (1,767 words) [view diff] exact match in snippet view article find links to article
Machines". In Diekert, Volker; Habib, Michel (eds.). Stacs 2004. Lecture Notes in Computer Science. Vol. 2996. Berlin, Heidelberg: Springer. pp. 608–619. doi:10Perfect matching (951 words) [view diff] exact match in snippet view article find links to article
Wegener, Ingo (eds.). Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 4051. Berlin, Heidelberg: Springer. pp. 453–464. doi:10Congestion game (7,315 words) [view diff] exact match in snippet view article find links to article
Kontogiannis, Spyros (eds.). Internet and Network Economics. Lecture Notes in Computer Science. Vol. 4286. Berlin, Heidelberg: Springer. pp. 87–98. doi:10Ring signature (1,947 words) [view diff] exact match in snippet view article find links to article
Leak a Secret". Advances in Cryptology — ASIACRYPT 2001. Lecture Notes in Computer Science. Vol. 2248. pp. 552–565. doi:10.1007/3-540-45682-1_32.Zooko Wilcox-O'Hearn (682 words) [view diff] exact match in snippet view article find links to article
as MD5" (PDF). Applied Cryptography and Network Security. Lecture Notes in Computer Science. Vol. 7954. IACR. pp. 119–135. doi:10.1007/978-3-642-38980-1_8Anomaly detection (4,426 words) [view diff] exact match in snippet view article find links to article
Spaces. Principles of Data Mining and Knowledge Discovery. Lecture Notes in Computer Science. Vol. 2431. p. 15. doi:10.1007/3-540-45681-3_2. ISBN 978-3-540-44037-6Product-form solution (1,817 words) [view diff] exact match in snippet view article find links to article
and Product Form". Applications and Theory of Petri Nets. Lecture Notes in Computer Science. Vol. 5606. p. 103. CiteSeerX 10.1.1.745.1585. doi:10Mizar system (1,225 words) [view diff] exact match in snippet view article find links to article
TPHOLs 2009, Munich, Germany, August 17–20, 2009. Proceedings. Lecture Notes in Computer Science. Vol. 5674. Springer. pp. 67–72. doi:10.1007/978-3-642-03359-9_5Constrained Horn clauses (593 words) [view diff] exact match in snippet view article find links to article
Constantin; Lal, Akash (eds.). Computer Aided Verification. Lecture Notes in Computer Science. Cham: Springer Nature Switzerland. pp. 209–223. doi:10Matrix analytic method (912 words) [view diff] exact match in snippet view article find links to article
Performance Evaluation of Complex Systems: Techniques and Tools. Lecture Notes in Computer Science. Vol. 2459. pp. 36. doi:10.1007/3-540-45798-4_3. ISBN 978-3-540-44252-3Romeo Model Checker (159 words) [view diff] exact match in snippet view article find links to article
Conference on Computer Aided Verification (CAV'05), volume 3576 of Lecture Notes in Computer Science, pages 418-423, Edinburgh, Scotland, UK, July 2005. SpringerSchnorr signature (1,248 words) [view diff] exact match in snippet view article find links to article
Application of Cryptographic Techniques. Proceedings of CRYPTO '86. Lecture Notes in Computer Science. Vol. 263. pp. 186–194. doi:10.1007/3-540-47721-7_12. ISBN 978-3-540-18047-0Shape analysis (program analysis) (1,034 words) [view diff] exact match in snippet view article
Analysis for Recursive Programs" (PDF). Compiler Construction. Lecture Notes in Computer Science. Vol. 2027. pp. 133–149. doi:10.1007/3-540-45306-7_10.Aircrack-ng (4,946 words) [view diff] exact match in snippet view article find links to article
Attack on TKIP", Identity and Privacy in the Internet Age, Lecture Notes in Computer Science, vol. 5838, Berlin, Heidelberg: Springer Berlin HeidelbergNP-intermediate (1,547 words) [view diff] exact match in snippet view article find links to article
JELIA 2002, Cosenza, Italy, September, 23-26, Proceedings. Lecture Notes in Computer Science. Vol. 2424. Springer. pp. 549–564. doi:10.1007/3-540-45757-7_53Prolog (8,098 words) [view diff] exact match in snippet view article find links to article
Programming". Constructing Logic Programs, (Ed. J.M.J. Jacquet). Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence: 27–140. CiteSeerX 10Key encapsulation mechanism (3,061 words) [view diff] exact match in snippet view article find links to article
Ciphertext Attack. Advances in Cryptology – EUROCRYPT 2000. Lecture Notes in Computer Science. Vol. 1807. Bruges, Belgium: Springer. pp. 275–288. doi:10Poly1305 (2,537 words) [view diff] exact match in snippet view article find links to article
Software Encryption: 12th international workshop. FSE 2005. Lecture Notes in Computer Science. Paris, France: Springer. doi:10.1007/11502760_3. ISBN 3-540-26541-4Belief–desire–intention software model (2,132 words) [view diff] exact match in snippet view article find links to article
Knowledge-Based Intelligent Information and Engineering Systems. Lecture Notes in Computer Science. Vol. 3683. pp. 282–288. doi:10.1007/11553939_41. ISBN 978-3-540-28896-1Device fingerprint (3,953 words) [view diff] exact match in snippet view article find links to article
Atallah MJ, Hopper NJ (eds.). Privacy Enhancing Technologies. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 1–18. ISBN 978-3-642-14527-8Elliptic curve point multiplication (4,145 words) [view diff] exact match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems – CHES 2014. Lecture Notes in Computer Science. Vol. 8731. Springer. pp. 72–95. doi:10.1007/978-3-662-44709-3_5Ontology (information science) (6,195 words) [view diff] exact match in snippet view article
NSW, Australia, October 21–25, 2013, Proceedings, Part I. Lecture Notes in Computer Science. Vol. 8218. Berlin: Springer. pp. 117–134. doi:10.1007/978-3-642-41335-3_8Jutta Treviranus (5,359 words) [view diff] exact match in snippet view article find links to article
Interaction. Design and Development Methods for Universal Access. Lecture Notes in Computer Science. Vol. 8513. Springer International Publishing. pp. 191–202SHA-2 (4,982 words) [view diff] exact match in snippet view article find links to article
(2008), New collision attacks against up to 24-step SHA-2, Lecture Notes in Computer Science, vol. 5365, Springer-Verlag, pp. 91–103, doi:10.1007/978-3-540-89754-5_8C Bounded Model Checker (740 words) [view diff] exact match in snippet view article find links to article
Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. pp. 168–176. doi:10.1007/978-3-540-24730-2_15Norman Paton (1,101 words) [view diff] exact match in snippet view article find links to article
Model database". Advances in Database Technology—EDBT '88. Lecture Notes in Computer Science. Vol. 303. p. 34. doi:10.1007/3-540-19074-0_46. ISBN 978-3-540-19074-5Feedback vertex set (1,805 words) [view diff] exact match in snippet view article find links to article
Number". In Kaplan, Haim (ed.). Algorithm Theory - SWAT 2010. Lecture Notes in Computer Science. Vol. 6139. Berlin, Heidelberg: Springer. pp. 81–92. Bibcode:2010LNCSCipher security summary (801 words) [view diff] exact match in snippet view article find links to article
"Attacking Triple Encryption". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 1372. Springer. pp. 239–253. doi:10.1007/3-540-69710-1_16Inheritance (object-oriented programming) (3,819 words) [view diff] exact match in snippet view article
European Conference on Object-Oriented Programming (ECOOP). Lecture Notes in Computer Science. Vol. 1445. Springer. pp. 355–382. doi:10.1007/BFb0054099Artificial psychology (710 words) [view diff] exact match in snippet view article find links to article
Psychology". In Smith, Michael J.; Salvendy, Gavriel (eds.). Lecture Notes in Computer Science. Vol. 4557. Springer Berlin Heidelberg. pp. 208–217. doi:10International Conference on Computational Intelligence Methods for Bioinformatics and Biostatistics (856 words) [view diff] exact match in snippet view article find links to article
Intelligence Methods for Bioinformatics and Biostatistics. Lecture Notes in Computer Science. Vol. 7548. Springer. pp. 238–252. doi:10.1007/978-3-642-35686-5_20Courcelle's theorem (3,146 words) [view diff] exact match in snippet view article find links to article
(eds.), Proc. 18th Annual European Symposium on Algorithms, Lecture Notes in Computer Science, vol. 6346, Springer, pp. 549–560, doi:10.1007/978-3-642-15775-2_47Area (graph drawing) (937 words) [view diff] exact match in snippet view article
2002, Irvine, CA, USA, August 26–28, 2002, Revised Papers, Lecture Notes in Computer Science, vol. 2528, Springer, pp. 54–65, doi:10.1007/3-540-36151-0_6Threefish (1,366 words) [view diff] exact match in snippet view article find links to article
Seoul, Korea, February 7–10, 2010, Revised Selected Papers. Lecture Notes in Computer Science. Vol. 6147. Springer. pp. 333–346. doi:10.1007/978-3-642-13858-4_19Budget-feasible mechanism (252 words) [view diff] exact match in snippet view article find links to article
Viola, Alfredo (eds.). LATIN 2014: Theoretical Informatics. Lecture Notes in Computer Science. Vol. 8392. Berlin, Heidelberg: Springer. pp. 719–730. arXiv:1302ETAPS International Joint Conferences on Theory and Practice of Software (767 words) [view diff] exact match in snippet view article find links to article
Robinet, Bernard; Wilhelm, Reinhard, eds. (1986). Esop 86. Lecture Notes in Computer Science. Vol. 213. doi:10.1007/3-540-16442-1. ISBN 978-3-540-16442-5Curve25519 (1,818 words) [view diff] exact match in snippet view article find links to article
Public Key Cryptography - PKC 2006. Public Key Cryptography. Lecture Notes in Computer Science. Vol. 3958. New York: Springer. pp. 207–228. doi:10.1007/11745853_14Evolvable hardware (799 words) [view diff] exact match in snippet view article find links to article
with physics". Evolvable Systems: From Biology to Hardware. Lecture Notes in Computer Science. Vol. 1259. pp. 390–405. CiteSeerX 10.1.1.50.9691. doi:10Group-based cryptography (355 words) [view diff] exact match in snippet view article find links to article
on the Word Problem". Advances in Cryptology—CRYPTO 1984. Lecture Notes in Computer Science. Vol. 196. Springer. pp. 19–36. doi:10.1007/3-540-39568-7_3Uplift modelling (2,172 words) [view diff] exact match in snippet view article find links to article
Uplift Modeling". Advanced Information Systems Engineering. Lecture Notes in Computer Science. Vol. 8190. Prague. pp. 595–611. doi:10.1007/978-3-642-40994-3_38Doll fetishism (220 words) [view diff] exact match in snippet view article find links to article
Li, Dongyu; Perez-Osorio, Jairo (eds.). Social Robotics. Lecture Notes in Computer Science. Vol. 13086. Cham: Springer International Publishing. pp. 130–141Unicheck (760 words) [view diff] exact match in snippet view article find links to article
System". Natural Language Processing and Information Systems. Lecture Notes in Computer Science. Vol. 10260. Springer, Cham. pp. 227–231. doi:10.1007/978-3-319-59569-6_27Mathias Payer (1,590 words) [view diff] exact match in snippet view article find links to article
of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science. Vol. 9148. pp. 144–164. doi:10.1007/978-3-319-20550-2_8.Rational monoid (633 words) [view diff] exact match in snippet view article find links to article
to Symeon Bozapalidis on the occasion of his retirement. Lecture Notes in Computer Science. Vol. 7020. Berlin: Springer-Verlag. pp. 228–256. ISBN 978-3-642-24896-2Folksonomy (3,215 words) [view diff] exact match in snippet view article find links to article
R; Ausloos, M. (2005). Computational Science – ICCS 2006. Lecture Notes in Computer Science. Vol. 3993. pp. 1114–1117. arXiv:cs.DS/0512090. doi:10.1007/11758532_152Jayadev Misra (1,066 words) [view diff] exact match in snippet view article find links to article
Course. A Decade of Concurrency Reflections and Perspectives. Lecture Notes in Computer Science (LNCS). Vol. 803. Springer, Berlin, Heidelberg. p. 352. doi:10List of NP-complete problems (2,746 words) [view diff] exact match in snippet view article find links to article
complexity of upward and rectilinear planarity testing". Lecture Notes in Computer Science. Vol. 894/1995. pp. 286–297. doi:10.1007/3-540-58950-3_384Data augmentation (1,838 words) [view diff] exact match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems – CHES 2017. Lecture Notes in Computer Science. Vol. 10529. Cham: Springer International Publishing. pp. 45–68BLAST model checker (386 words) [view diff] exact match in snippet view article find links to article
Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science. Vol. 7214. Springer-Verlag. pp. 525–527. ISBN 978-3-642-28756-5Jon Lee (mathematician) (413 words) [view diff] exact match in snippet view article
2012), Integer Programming and Combinatorial Optimization (Lecture Notes in Computer Science, Vol. 8494; Springer, 2014), Special Issue: Integer ProgrammingBöhm tree (1,874 words) [view diff] exact match in snippet view article find links to article
labelled λ-calculus". λ-Calculus and Computer Science Theory. Lecture Notes in Computer Science. Vol. 37. pp. 147–165. doi:10.1007/BFb0029523. ISBN 3-540-07416-3Quotient type (648 words) [view diff] exact match in snippet view article find links to article
Clarke, Edmund; Kozen, Dexter (eds.). Logics of Programs. Lecture Notes in Computer Science. Vol. 164. Berlin, Heidelberg: Springer. pp. 116–128. doi:10Arc diagram (2,597 words) [view diff] exact match in snippet view article find links to article
WA, USA, September 19–21, 2012, Revised Selected Papers, Lecture Notes in Computer Science, vol. 7704, Springer, pp. 150–161, doi:10.1007/978-3-642-36763-2_14Interactive computation (195 words) [view diff] exact match in snippet view article find links to article
Persistent Turing Machines as a model of interactive computation. Lecture Notes in Computer Science 1762, pp. 116-135. D. Goldin, S. Smolka, P. Attie, E. SondereggerNeighbor joining (2,881 words) [view diff] exact match in snippet view article find links to article
reconstruction", pp. 101–110. In Jiang, T., and Lee, D., eds., Lecture Notes in Computer Science, 1276, Springer-Verlag, Berlin. COCOON '97. Mihaescu R, LevyGraph reduction machine (324 words) [view diff] exact match in snippet view article find links to article
Functional Programming Languages and Computer Architecture. Lecture Notes in Computer Science. Vol. 274. Berlin, Heidelberg: Springer. pp. 98–112. doi:10Binary decision diagram (3,109 words) [view diff] exact match in snippet view article find links to article
Conference on Principles and Practice of Constraint Programming. Lecture Notes in Computer Science. Vol. 3258. Springer. p. 816. doi:10.1007/978-3-540-30201-8_94Abstract interpretation (2,924 words) [view diff] exact match in snippet view article find links to article
Programming Language Implementation and Logic Programming (PLILP). Lecture Notes in Computer Science. Vol. 631. Springer. pp. 269–296. ISBN 978-0-387-55844-8.SMASH (hash) (314 words) [view diff] exact match in snippet view article
Design Strategy Called SMASH". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 3897. pp. 233–244. doi:10.1007/11693383_16. ISBN 978-3-540-33108-7Dorothea Wagner (637 words) [view diff] exact match in snippet view article find links to article
Dorothea, eds. (2001), Drawing Graphs: Methods and Models, Lecture Notes in Computer Science, vol. 2025, Springer, doi:10.1007/3-540-44969-8, ISBN 9783540420620Gad Landau (1,254 words) [view diff] exact match in snippet view article find links to article
on Trees and Tree-Like Structures". Algorithms – ESA 2013. Lecture Notes in Computer Science. Vol. 8125. pp. 517–528. arXiv:1301.6127. doi:10.1007/978-3-642-40450-4_44Rijnland Internet Election System (333 words) [view diff] exact match in snippet view article find links to article
Abolishment". Foundations of Security Analysis and Design V. Lecture Notes in Computer Science. Vol. 5705. p. 121. doi:10.1007/978-3-642-03829-7_4. ISBN 978-3-642-03828-0Optical braille recognition (716 words) [view diff] exact match in snippet view article find links to article
Robust Braille Recognition System". Document Analysis Systems. Lecture Notes in Computer Science. Vol. VI. pp. 533–545. doi:10.1007/978-3-540-28640-0_50.Long short-term memory (5,822 words) [view diff] exact match in snippet view article find links to article
Structure of the Blues". Artificial Neural Networks — ICANN 2002. Lecture Notes in Computer Science. Vol. 2415. Springer, Berlin, Heidelberg. pp. 284–289. CiteSeerX 10Genetic programming (3,543 words) [view diff] exact match in snippet view article find links to article
Discovery". Parallel Problem Solving from Nature PPSN VI. Lecture Notes in Computer Science. Vol. 1917. Springer. pp. 211–220. doi:10.1007/3-540-45356-3_21MilkyWay@home (2,639 words) [view diff] exact match in snippet view article find links to article
Grids". Distributed Applications and Interoperable Systems. Lecture Notes in Computer Science. Vol. 6115. pp. 29–41. doi:10.1007/978-3-642-13645-0_3.Deterministic finite automaton (3,736 words) [view diff] exact match in snippet view article find links to article
Theoretical Results and Applications. ICGI 2010. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Vol. 6339. pp. 66–79. doi:10.1007/978-3-642-15488-1_7Microsoft SEAL (515 words) [view diff] exact match in snippet view article find links to article
Thomas (eds.). Advances in Cryptology – ASIACRYPT 2017. Lecture Notes in Computer Science. Vol. 10624. Cham: Springer International Publishing. pp. 409–437Language-oriented programming (485 words) [view diff] exact match in snippet view article find links to article
in Language Workbenches". Software Language Engineering. Lecture Notes in Computer Science. Vol. 8225. pp. 197–217. doi:10.1007/978-3-319-02654-1_11Data-flow analysis (3,562 words) [view diff] exact match in snippet view article find links to article
SAS'99, Venice, Italy, September 22–24, 1999, Proceedings. Lecture Notes in Computer Science. Vol. 1694 (illustrated ed.). Springer. pp. 232–247 [233]Simultaneous embedding (1,651 words) [view diff] exact match in snippet view article find links to article
Sydney, Australia, September 24–26, 2007, Revised Papers, Lecture Notes in Computer Science, vol. 4875, Berlin: Springer, pp. 280–290, doi:10.1007/978-3-540-77537-9_28All-or-nothing transform (627 words) [view diff] exact match in snippet view article find links to article
All-or-Nothing Transform". Advances in Cryptology — CRYPTO' 99. Lecture Notes in Computer Science. Vol. 1666. pp. 503–518. doi:10.1007/3-540-48405-1_32.350 nm process (208 words) [view diff] exact match in snippet view article find links to article
". Constructive Side-Channel Analysis and Secure Design. Lecture Notes in Computer Science. Vol. 10348. pp. 207–222. doi:10.1007/978-3-319-64647-3_13Cryptosystem (497 words) [view diff] exact match in snippet view article find links to article
Steinfeld, Ron (eds.). Information Security and Privacy. Lecture Notes in Computer Science. Vol. 9723. Cham: Springer International Publishing. pp. 73–86Undeniable signature (912 words) [view diff] exact match in snippet view article find links to article
Signatures". Advances in Cryptology — CRYPTO' 89 Proceedings. Lecture Notes in Computer Science. Vol. 435. pp. 212–216. doi:10.1007/0-387-34805-0_20. ISBN 978-0-387-97317-3Dynamic convex hull (769 words) [view diff] exact match in snippet view article find links to article
upper envelopes", Algorithms and Data Structures (WADS 2005), Lecture Notes in Computer Science, vol. 3608, Berlin: Springer, pp. 269–281, doi:10.1007/11534273_24SLAM project (241 words) [view diff] exact match in snippet view article find links to article
Verifier: Technology Transfer of Formal Methods inside Microsoft; Lecture Notes in Computer Science (LNCS), Vol. 2999: Boiten, Eerke A.; Derrick, John; and SmithVerifiable random function (1,501 words) [view diff] exact match in snippet view article find links to article
Palash (eds.). Advances in Cryptology - ASIACRYPT 2013. Lecture Notes in Computer Science. Vol. 8270. Berlin, Heidelberg: Springer. pp. 280–300. doi:10Asiddhatva (1,594 words) [view diff] exact match in snippet view article find links to article
Model of Aṣṭādhyāyī". Sanskrit Computational Linguistics. Lecture Notes in Computer Science. Vol. 6465. p. 1. doi:10.1007/978-3-642-17528-2_18. ISBN 978-3-642-17527-5Spaghetti code (1,611 words) [view diff] exact match in snippet view article find links to article
proper exception handling". Lecture Notes in Computer Science. Ada – Europe '93 (Proceedings). Lecture Notes in Computer Science. Vol. 688. Springer BerlinRACE (Europe) (147 words) [view diff] exact match in snippet view article
Cryptology – EUROCRYPT '91. EUROCRYPT 1991. Lecture Notes in Computer Science, vol 547. Lecture Notes in Computer Science. Vol. 547. Springer. pp. 547–551. doi:10Differential cryptanalysis (1,677 words) [view diff] exact match in snippet view article find links to article
EnRUPT". In Dunkelman, Orr (ed.). Fast Software Encryption. Lecture Notes in Computer Science. Vol. 5665. Berlin, Heidelberg: Springer. pp. 246–259. doi:10Separation logic (3,646 words) [view diff] exact match in snippet view article find links to article
Verification, Model Checking, and Abstract Interpretation (PDF). Lecture Notes in Computer Science. Vol. 5403. pp. 266–277. doi:10.1007/978-3-540-93900-9_3.TLA+ (4,068 words) [view diff] exact match in snippet view article find links to article
Correct Hardware Design and Verification Methods (PDF). Lecture Notes in Computer Science. Vol. 1703. Springer-Verlag. pp. 54–66. doi:10.1007/3-540-48153-2_6Specification and Description Language (1,106 words) [view diff] exact match in snippet view article find links to article
Diagrams". SDL 2013: Model-Driven Dependability Engineering. Lecture Notes in Computer Science. Vol. 7916. Springer Berlin Heidelberg. pp. 258–274. doi:10Stephen Muggleton (783 words) [view diff] exact match in snippet view article find links to article
"Learning from positive data". Inductive Logic Programming. Lecture Notes in Computer Science. Vol. 1314. pp. 358–376. doi:10.1007/3-540-63494-0_65.Arthur Zimek (572 words) [view diff] exact match in snippet view article find links to article
Dimensionality?". Scientific and Statistical Database Management. Lecture Notes in Computer Science. Vol. 6187. Springer, Berlin, Heidelberg. pp. 482–500. CiteSeerX 10Property Specification Language (1,412 words) [view diff] exact match in snippet view article find links to article
Logic on Truncated Paths" (PDF). Computer Aided Verification. Lecture Notes in Computer Science. Vol. 2725. p. 27. doi:10.1007/978-3-540-45069-6_3. ISBN 978-3-540-40524-5Prêt à Voter (1,192 words) [view diff] exact match in snippet view article find links to article
Election Scheme", Computer Security – ESORICS 2005 (PDF), Lecture Notes in Computer Science, vol. 3679, pp. 118–139, doi:10.1007/11555827_8, ISBN 978-3-540-28963-0Kyber (1,473 words) [view diff] exact match in snippet view article find links to article
Structured LWE, Revisited" (PDF), Theory of Cryptography, Lecture Notes in Computer Science (in German), vol. 11891, Cham: Springer International PublishingKeystroke-level model (2,803 words) [view diff] exact match in snippet view article find links to article
Jacko, Julie A (ed.). Human-Computer Interaction. New Trends. Lecture Notes in Computer Science. Vol. 5610. Berlin Heidelberg: Springer-Verlag. p. 355. doi:10Ring learning with errors signature (2,570 words) [view diff] exact match in snippet view article find links to article
Gilbert, Henri (ed.). Advances in Cryptology – EUROCRYPT 2010. Lecture Notes in Computer Science. Vol. 6110. pp. 1–23. CiteSeerX 10.1.1.297.6108. doi:10Infinite chess (805 words) [view diff] exact match in snippet view article find links to article
of Infinite Chess is Decidable". How the World Computes. Lecture Notes in Computer Science. Vol. 7318. Springer. pp. 78–88. arXiv:1201.5597. doi:10Thousands of Problems for Theorem Provers (250 words) [view diff] exact match in snippet view article find links to article
Theorem Proving". KI 2009: Advances in Artificial Intelligence. Lecture Notes in Computer Science. Vol. 5803. pp. 435–443. CiteSeerX 10.1.1.329.1809. doi:10Evolutionary multimodal optimization (1,292 words) [view diff] exact match in snippet view article find links to article
Approach to Multimodal Optimization: Self-adaptive Approach " (Lecture Notes in Computer Science, 2010, Volume 6457/2010, 95–104) C. Stoean, M. Preuss, R.QuickCheck (1,115 words) [view diff] exact match in snippet view article find links to article
Symposium on Functional and Logic Programming (FLOPS 2014). Lecture Notes in Computer Science. Vol. 8475. pp. 1–17. doi:10.1007/978-3-319-07151-0_1.Kai Salomaa (370 words) [view diff] exact match in snippet view article find links to article
transformation for finite languages". Automata Implementation. Lecture Notes in Computer Science. Vol. 1260. pp. 149–158. doi:10.1007/3-540-63174-7_12.Minimum-weight triangulation (3,289 words) [view diff] exact match in snippet view article find links to article
"A study of the LMT-skeleton", Algorithms and Computation, Lecture Notes in Computer Science, vol. 1178, pp. 256–265, doi:10.1007/BFb0009502, ISBN 978-3-540-62048-8Stathis Zachos (601 words) [view diff] exact match in snippet view article find links to article
of Software Technology and Theoretical Computer Science. Lecture Notes in Computer Science. Vol. 287. pp. 443–455. doi:10.1007/3-540-18625-5_67. ISBN 978-3-540-18625-0F-FCSR (121 words) [view diff] exact match in snippet view article find links to article
stream cipher in Real Time" (PDF). In Pieprzyk, Josef (ed.). Lecture Notes in Computer Science. ASIACRYPT 2008. Vol. 5350. Springer Berlin / Heidelberg.Ada Programming Support Environment (436 words) [view diff] exact match in snippet view article find links to article
in Long, Fred (ed.), Software Engineering Environments, Lecture Notes in Computer Science, vol. 467, Springer Berlin Heidelberg, pp. 179–193, doi:10Babel program (391 words) [view diff] exact match in snippet view article find links to article
Potapova R., Mporas I. (eds) Speech and Computer. SPECOM 2017. Lecture Notes in Computer Science, vol 10458. Springer, Cham. https://doi.org/10.1007/978-3-319-66429-3_1Table of metaheuristics (3,878 words) [view diff] exact match in snippet view article find links to article
Hailin (eds.). Computational Intelligence and Security. Lecture Notes in Computer Science. Vol. 4456. Berlin, Heidelberg: Springer. pp. 167–176. doi:10List of PSPACE-complete problems (1,807 words) [view diff] exact match in snippet view article find links to article
is PSPACE-Complete". Automata, Languages, and Programming. Lecture Notes in Computer Science. Vol. 7965. pp. 497–503. arXiv:1209.1750. doi:10.1007/978-3-642-39206-1_42Diffie–Hellman key exchange (5,306 words) [view diff] exact match in snippet view article find links to article
Protocols and their Security Analysis", Crytography and Coding, Lecture Notes in Computer Science, vol. 1355, pp. 30–45, CiteSeerX 10.1.1.25.387, doi:10.1007/BFb0024447NorduGrid (942 words) [view diff] exact match in snippet view article find links to article
NorduGrid ARC Middleware". Advances in Grid Computing - EGC 2005. Lecture Notes in Computer Science. Vol. 3470. Berlin/Heidelberg: Springer. pp. 861–871. doi:10Cryptographic nonce (881 words) [view diff] exact match in snippet view article find links to article
Bimal Roy; Willi Meier (eds.). Fast Software Encryption. Lecture Notes in Computer Science. Vol. 3017. pp. 348–358. doi:10.1007/978-3-540-25937-4_22Skew-symmetric graph (2,318 words) [view diff] exact match in snippet view article find links to article
and structure", Computer Science – Theory and Applications, Lecture Notes in Computer Science, vol. 3967, Springer-Verlag, pp. 23–34, arXiv:math/0607547CLEFIA (208 words) [view diff] exact match in snippet view article find links to article
of Reduced-Round CLEFIA". Proceedings of INDOCRYPT, 2010. Lecture Notes in Computer Science. Springer-Verlag. Archived from the original on 2013-02-03Nimbus (cipher) (165 words) [view diff] exact match in snippet view article
"Differential Cryptanalysis of Nimbus". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 2355. pp. 187–195. doi:10.1007/3-540-45473-X_16.Dinic's algorithm (1,693 words) [view diff] exact match in snippet view article find links to article
Theoretical Computer Science: Essays in Memory of Shimon Even. Lecture Notes in Computer Science. Vol. 3895. Springer. pp. 218–240. doi:10.1007/11685654_10Order statistic tree (487 words) [view diff] exact match in snippet view article find links to article
(2001). A new method for balancing binary search trees. ICALP. Lecture Notes in Computer Science. Vol. 2076. pp. 469–480. doi:10.1007/3-540-48224-5_39.Spoofing attack (2,664 words) [view diff] exact match in snippet view article find links to article
Computer Security, Copenhagen, Denmark, September 26–30, 2022. Lecture Notes in Computer Science. Vol. 13556. pp. 535–553. doi:10.1007/978-3-031-17143-7_26Leontief utilities (815 words) [view diff] exact match in snippet view article find links to article
of Leontief Market Equilibria". Frontiers in Algorithmics. Lecture Notes in Computer Science. Vol. 4613. p. 96. doi:10.1007/978-3-540-73814-5_9. ISBN 978-3-540-73813-8GOST (block cipher) (1,469 words) [view diff] exact match in snippet view article
on the Full GOST Block Cipher". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 6733. pp. 290–305. doi:10.1007/978-3-642-21702-9_17Collaborative search engine (2,067 words) [view diff] exact match in snippet view article find links to article
Transactions on Computational Collective Intelligence II. Lecture Notes in Computer Science. Vol. 2. pp. 46–69. Bibcode:2010LNCS.6450...46L. doi:10LCP array (4,379 words) [view diff] exact match in snippet view article find links to article
12th Annual Symposium on Combinatorial Pattern Matching. Lecture Notes in Computer Science. Vol. 2089. pp. 181–192. doi:10.1007/3-540-48194-X_17.Evolution strategy (2,053 words) [view diff] exact match in snippet view article find links to article
information". Parallel Problem Solving from Nature — PPSN III. Lecture Notes in Computer Science. Vol. 866. Springer. pp. 189–198. doi:10.1007/3-540-58484-6_263Boolean satisfiability problem (4,824 words) [view diff] exact match in snippet view article find links to article
Principles and Practice of Constraint Programming – CP 2007, Lecture Notes in Computer Science, vol. 4741, pp. 544–558, CiteSeerX 10.1.1.70.5471, doi:10Alan Mycroft (481 words) [view diff] exact match in snippet view article find links to article
recursive definitions". International Symposium on Programming. Lecture Notes in Computer Science. Vol. 167. pp. 217–228. doi:10.1007/3-540-12925-1_41. ISBN 978-3-540-12925-7HElib (212 words) [view diff] exact match in snippet view article find links to article
Gennaro, Rosario (eds.). Advances in Cryptology – CRYPTO 2014. Lecture Notes in Computer Science. Vol. 8616. Springer Berlin Heidelberg. pp. 554–571. doi:10HiLog (601 words) [view diff] case mismatch in snippet view article find links to article
Prague, Czech Republic, January 11–13, 1995: proceedings. Lecture notes in computer science. Vol. 893. Springer. pp. 252–265. doi:10.1007/3-540-58907-4_20Computer security compromised by hardware failure (5,114 words) [view diff] exact match in snippet view article find links to article
Countermeasures: The Case of AES". Topics in Cryptology – CT-RSA 2006. Lecture Notes in Computer Science. Vol. 3860. San Jose, California, USA: Springer-Verlag BerlinStraight skeleton (2,179 words) [view diff] exact match in snippet view article find links to article
Ann. Int. Conf. Computing and Combinatorics (COCOON '96). Lecture Notes in Computer Science. Vol. 1090. Springer-Verlag. pp. 117–126. Peschka, GustavNoisy-storage model (2,899 words) [view diff] exact match in snippet view article find links to article
memory-bounded adversaries". Advances in Cryptology — CRYPTO '97. Lecture Notes in Computer Science. Vol. 1294. pp. 292–306. doi:10.1007/BFb0052243. ISBN 978-3-540-63384-6E-graph (2,143 words) [view diff] exact match in snippet view article find links to article
Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science. Vol. 4963. Berlin, Heidelberg: Springer. pp. 337–340. doi:10Garbled circuit (2,979 words) [view diff] exact match in snippet view article find links to article
Gates and Applications". Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 5126. pp. 486–498. CiteSeerX 10.1.1.160.5268. doi:10International Mathematical Knowledge Trust (180 words) [view diff] exact match in snippet view article find links to article
Mathematical Knowledge Trust". Intelligent Computer Mathematics. Lecture Notes in Computer Science. Vol. 10383. pp. 56–69. doi:10.1007/978-3-319-62075-6_5.Indistinguishability obfuscation (2,301 words) [view diff] exact match in snippet view article find links to article
Obfuscation". In Vadhan, Salil P. (ed.). Theory of Cryptography. Lecture Notes in Computer Science. Vol. 4392. Berlin, Heidelberg: Springer. pp. 194–213. doi:10Adversarial queueing network (198 words) [view diff] exact match in snippet view article find links to article
Combinatorial Optimization.. Algorithms and Techniques (PDF). Lecture Notes in Computer Science. Vol. 2764. p. 153. doi:10.1007/978-3-540-45198-3_14. ISBN 978-3-540-40770-6Automotive security (2,101 words) [view diff] exact match in snippet view article find links to article
of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science. Vol. 10327. Springer International Publishing. pp. 185–206Wikiquote (756 words) [view diff] exact match in snippet view article find links to article
International Workshop on Fuzzy Logic and Applications. Lecture Notes in Computer Science. doi:10.1007/978-3-540-73400-0_58. ISBN 978-3-540-73399-7Andrey Muchnik (514 words) [view diff] exact match in snippet view article find links to article
Czechoslovakia, September 3–7, 1984. Proceedings. Lecture Notes in Computer Science. Lecture Notes in Computer Science. 176. Berlin, Heidelberg: Springer: 162–175OpenNN (437 words) [view diff] exact match in snippet view article find links to article
Neural Networks". Adaptive and Natural Computing Algorithms. Lecture Notes in Computer Science. Vol. 6593. pp. 190–199. doi:10.1007/978-3-642-20282-7_20Left-right planarity test (696 words) [view diff] exact match in snippet view article find links to article
WA, USA, September 19-21, 2012, Revised Selected Papers, Lecture Notes in Computer Science, vol. 7704, Berlin: Springer, pp. 557–558, doi:10.1007/978-3-642-36763-2_51Frama-C (771 words) [view diff] exact match in snippet view article find links to article
of Code". Trusted Computing - Challenges and Applications. Lecture Notes in Computer Science. Vol. 4968/2008. pp. 133–142. doi:10.1007/978-3-540-68979-9_10Supersingular isogeny key exchange (3,674 words) [view diff] exact match in snippet view article find links to article
2023. International Association for Cryptologic Research. Lecture Notes in Computer Science. Vol. 14008. Springer. pp. 423–447. doi:10.1007/978-3-031-30589-4_15Hans L. Bodlaender (446 words) [view diff] exact match in snippet view article find links to article
Hans L. Bodlaender on the Occasion of His 60th Birthday, Lecture Notes in Computer Science, vol. 12160, Springer International Publishing, doi:10Manifold regularization (3,875 words) [view diff] exact match in snippet view article find links to article
pointwise consistency of graph laplacians". Learning theory. Lecture Notes in Computer Science. Vol. 3559. Springer. pp. 470–485. CiteSeerX 10.1.1.103.82Negation as failure (1,318 words) [view diff] exact match in snippet view article find links to article
Semantic Web Reasoning. PPSW3 2003. Lecture Notes in Computer Science. Vol. 2901. Lecture Notes in Computer Science: Springer. pp. 33–50. doi:10.1007/978-3-540-24572-8_3Malleability (cryptography) (983 words) [view diff] exact match in snippet view article
among notions of security for public-key encryption schemes. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 26–45. doi:10.1007/bfb0055718Newton Howard (1,456 words) [view diff] exact match in snippet view article find links to article
Computational Linguistics and Intelligent Text Processing. Lecture Notes in Computer Science, 8403, 113–127 Howard, N. (2013). The Twin Hypotheses: BrainMedical image computing (8,477 words) [view diff] exact match in snippet view article find links to article
Proceedings for this conference are published by Springer in the Lecture Notes in Computer Science series. In 2000, N. Ayache and J. Duncan reviewed the stateLambda-mu calculus (842 words) [view diff] exact match in snippet view article find links to article
algorithmic interpretation of classical natural deduction. Lecture Notes in Computer Science. Vol. 624. pp. 190–201. doi:10.1007/BFb0013061. ISBN 3-540-55727-XCircle graph (1,694 words) [view diff] exact match in snippet view article find links to article
Science, Bordeaux, France, February 11–13, 1988, Proceedings, Lecture Notes in Computer Science, vol. 294, Berlin: Springer, pp. 61–72, doi:10.1007/BFb0035832David L. Dill (1,230 words) [view diff] exact match in snippet view article find links to article
pipelined microprocessor control". Computer Aided Verification. Lecture Notes in Computer Science. Vol. 818. pp. 68–80. doi:10.1007/3-540-58179-0_44. ISBN 978-3-540-58179-6Algorithm selection (1,836 words) [view diff] exact match in snippet view article find links to article
(ed.). Principles and Practice of Constraint Programming. Lecture Notes in Computer Science. Vol. 6876. pp. 454–469. CiteSeerX 10.1.1.211.1807. doi:10Polygon-circle graph (606 words) [view diff] exact match in snippet view article find links to article
2003 Perugia, Italy, September 21-24, 2003, Revised Papers, Lecture Notes in Computer Science, vol. 2912, Berlin: Springer, pp. 59–70, doi:10.1007/978-3-540-24595-7_6Michal Irani (466 words) [view diff] exact match in snippet view article find links to article
with Uncertainty". European Conference on Computer Vision. Lecture Notes in Computer Science. 1842: 539–553. doi:10.1007/3-540-45054-8_35. ISBN 978-3-540-67685-0Range query (computer science) (5,468 words) [view diff] exact match in snippet view article
Approximations for Range Mode". Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 6198. pp. 605–616. doi:10.1007/978-3-642-14165-2_51Geographical feature (2,354 words) [view diff] exact match in snippet view article find links to article
). Spatio-Temporal Databases: The Chorochronos Approach. Lecture Notes in Computer Science. Vol. V.2520. Springer-Verlag. pp. 9–77. doi:10.1007/978-3-540-45081-8_2Fast syndrome-based hash (2,941 words) [view diff] exact match in snippet view article find links to article
Based Hashes", Progress in Cryptology – INDOCRYPT 2007 (PDF), Lecture Notes in Computer Science, vol. 4859, pp. 1–9, doi:10.1007/978-3-540-77026-8_1, ISBN 978-3-540-77025-1Abdigani Diriye (718 words) [view diff] exact match in snippet view article find links to article
Research and Advanced Technology for Digital Libraries. Lecture Notes in Computer Science. Vol. 8092. Springer Berlin Heidelberg. pp. 235–240. doi:10Attention inequality (679 words) [view diff] exact match in snippet view article find links to article
Social Media Attention Among Non-profits". Social Informatics. Lecture Notes in Computer Science. Vol. 11185. Springer International Publishing. pp. 196–211Executable choreography (1,395 words) [view diff] exact match in snippet view article find links to article
the Move to Meaningful Internet Systems: OTM 2009 (PDF), Lecture Notes in Computer Science, vol. 5870, Springer Berlin Heidelberg, pp. 373–380, CiteSeerX 10Meurs Challenger (409 words) [view diff] exact match in snippet view article find links to article
The Netherlands, September 21–23, 2011, Revised Papers, Lecture Notes in Computer Science, vol. 7034, Springer-Verlag, pp. 447–448, doi:10.1007/978-3-642-25878-7Reduction strategy (2,608 words) [view diff] exact match in snippet view article find links to article
and Acyclicity" (PDF). Rewriting, Computation and Proof. Lecture Notes in Computer Science. Vol. 4600. pp. 89–112. CiteSeerX 10.1.1.104.9139. doi:10Hash chain (1,005 words) [view diff] exact match in snippet view article find links to article
Scheme" (PDF). Progress in Cryptology – AFRICACRYPT 2011. Lecture Notes in Computer Science. Vol. 6737. Springer Berlin Heidelberg. pp. 363–378. doi:10Substring index (611 words) [view diff] exact match in snippet view article find links to article
Piscataway, New Jersey, USA, July 20–22, 1998, Proceedings, Lecture Notes in Computer Science, vol. 1448, Springer, pp. 65–79, doi:10.1007/BFB0030781,DarwiinRemote (419 words) [view diff] exact match in snippet view article find links to article
Interaction Research". HCI in Work and Learning, Life and Leisure. Lecture Notes in Computer Science. Vol. 6389. Springer. pp. 305–317. doi:10.1007/978-3-642-16607-5_20Average-case complexity (3,058 words) [view diff] exact match in snippet view article find links to article
Miscellanea on the Interplay between Randomness and Computation, Lecture Notes in Computer Science, vol. 6650, Berlin, Heidelberg: Springer Berlin HeidelbergVictor Pan (759 words) [view diff] exact match in snippet view article find links to article
Matrices Faster: Gladwell, Ian (1986), Mathematical Reviews, Lecture Notes in Computer Science, 179, doi:10.1007/3-540-13866-8, ISBN 978-3-540-13866-2, MR 0765701Message Authenticator Algorithm (954 words) [view diff] exact match in snippet view article find links to article
Cryptographic Techniques (CRYPTO’84), Santa Barbara, CA, USA. Lecture Notes in Computer Science. Vol. 196. Springer. pp. 393–400. doi:10.1007/3-540-39568-7_30Size-change termination principle (640 words) [view diff] exact match in snippet view article find links to article
Functional Programs". Programming Languages and Systems. Lecture Notes in Computer Science. Vol. 3780. pp. 281–297. CiteSeerX 10.1.1.102.4934. doi:10Text corpus (858 words) [view diff] exact match in snippet view article find links to article
Plzeň, Czech Republic, September 14–17, 2015, Proceedings. Lecture Notes in Computer Science. Vol. 9302. Springer. pp. 32–40. arXiv:1509.08639. doi:10BlueJ (412 words) [view diff] exact match in snippet view article find links to article
Kölling, M. (eds.). Reflections on the Teaching of Programming. Lecture Notes in Computer Science. Vol. 4821. Springer. pp. 182–196. ISBN 978-3-540-77933-9Zodiac (cipher) (238 words) [view diff] exact match in snippet view article
Zodiac Cipher". Information Security Practice and Experience. Lecture Notes in Computer Science. Vol. 4991. Springer. pp. 377–391. doi:10.1007/978-3-540-79104-1_27Truecasing (458 words) [view diff] exact match in snippet view article find links to article
Information Retrieval Techniques for Speech Applications. Lecture Notes in Computer Science. Vol. 2273. pp. 11–22. doi:10.1007/3-540-45637-6_2. ISBN 978-3-540-43156-5RoboCup 3D Soccer Simulation League (1,096 words) [view diff] exact match in snippet view article find links to article
Next Generation". RoboCup 2003: Robot Soccer World Cup VII. Lecture Notes in Computer Science. Vol. 3020. pp. 458–469. doi:10.1007/978-3-540-25940-4_40Automated reasoning (1,399 words) [view diff] exact match in snippet view article find links to article
Paulin-Mohring, C.; Pichardie, D. (eds.), Interactive Theorem Proving, Lecture Notes in Computer Science, vol. 7998, pp. 163–179, CiteSeerX 10.1.1.651.7964, doi:10Mildly context-sensitive grammar formalism (2,034 words) [view diff] exact match in snippet view article find links to article
Germany, June 30–July 3, 2009. Proceedings, volume 5583 of Lecture Notes in Computer Science, pages 312–325, 2009. Laura Kallmeyer. "On Mildly Context-SensitiveToolchain (275 words) [view diff] exact match in snippet view article find links to article
Tool Chains in Agile ALM Environments: A Short Introduction. Lecture Notes in Computer Science. Vol. 9416. pp. 371–380. doi:10.1007/978-3-319-26138-6_40Scale space implementation (3,290 words) [view diff] exact match in snippet view article find links to article
in Computer Vision. Lecture Notes in Computer Science. Vol. 2695. Proc. Scale-Space'03, Springer Lecture Notes in Computer Science. pp. 148–163. doi:10Neural gas (1,807 words) [view diff] exact match in snippet view article find links to article
CVBIA 2005, Beijing, China, October 21, 2005 : proceedings. Lecture Notes in Computer Science. Vol. 3765. Springer. p. 210. doi:10.1007/11569541_22.Ascalaph Designer (607 words) [view diff] exact match in snippet view article find links to article
Computing Large Scale Scientific and Industrial Problems. Lecture Notes in Computer Science. Vol. 1541. Heidelberg: Springer Berlin. pp. 296–303. doi:10Lenore Zuck (614 words) [view diff] exact match in snippet view article find links to article
College, New York, NY, USA, June 17-19, 1985, Proceedings, Lecture Notes in Computer Science, vol. 193, Springer, pp. 196–218, doi:10.1007/3-540-15648-8_16Runtime predictive analysis (1,499 words) [view diff] exact match in snippet view article find links to article
for Sequentially Consistent Systems". Runtime Verification. Lecture Notes in Computer Science. Vol. 7687. pp. 136–150. doi:10.1007/978-3-642-35632-2_16Digital Assets Repository (697 words) [view diff] exact match in snippet view article find links to article
Research and Advanced Technology for Digital Libraries. Lecture Notes in Computer Science. Vol. 3652. Springer Science + Business Media. pp. 116–127Quantum sort (165 words) [view diff] exact match in snippet view article find links to article
International Colloquium on Automata, Languages, and Programming. Lecture Notes in Computer Science. Vol. 2076. pp. 62–73. arXiv:quant-ph/0102078. doi:10.1007/3-540-48224-5_29IEEE 802.15.6 (550 words) [view diff] exact match in snippet view article find links to article
15.6 Standard". Financial Cryptography and Data Security. Lecture Notes in Computer Science. Vol. 8976. pp. 245–260. arXiv:1501.02601. doi:10.1007/978-3-662-48051-9_18Vector clock (1,862 words) [view diff] exact match in snippet view article find links to article
Distributed Systems (PDF), Lecture Notes in Computer Science, vol. 5401, Springer-Verlag, Lecture Notes in Computer Science, pp. 259–274, Bibcode:2008LNCSNodeXL (1,591 words) [view diff] exact match in snippet view article find links to article
Clustering, Grouping, and Simplification", Graph Drawing (PDF), Lecture Notes in Computer Science, vol. 7704, pp. 2–18, doi:10.1007/978-3-642-36763-2_2,Juan Pavón (3,094 words) [view diff] exact match in snippet view article find links to article
Müller, Jörg (eds.). Multi-Agent Systems and Applications III. Lecture Notes in Computer Science. Vol. 2691. Springer Berlin Heidelberg. pp. 394–403. doi:10Geospatial topology (1,620 words) [view diff] exact match in snippet view article find links to article
error correcting in GIS". Advances in Spatial Databases. Lecture Notes in Computer Science. Vol. 1262. pp. 281–297. doi:10.1007/3-540-63238-7_35.Rabin signature algorithm (2,011 words) [view diff] exact match in snippet view article find links to article
with RSA and Rabin. Advances in Cryptology – EUROCRYPT ’96. Lecture Notes in Computer Science. Vol. 1070. Saragossa, Spain: Springer. pp. 399–416. doi:10Browser Helper Object (882 words) [view diff] exact match in snippet view article find links to article
Browser Helper Objects". Intelligence and Security Informatics. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer: 638–639. doi:10.1007/11427995_85Alex Graves (computer scientist) (571 words) [view diff] exact match in snippet view article
Keyword Spotting". Artificial Neural Networks – ICANN 2007. Lecture Notes in Computer Science. Vol. 4669. pp. 220–229. doi:10.1007/978-3-540-74695-9_23Generic group model (401 words) [view diff] exact match in snippet view article find links to article
bounds for discrete logarithms and related problems" (PDF). Lecture Notes in Computer Science. Advances in Cryptology – Eurocrypt ’97. Vol. 1233. Springer-VerlagCall centre (3,905 words) [view diff] exact match in snippet view article find links to article
Virtual Call Center Implementation". Networking — ICN 2001. Lecture Notes in Computer Science. Vol. 2093. University of Novi Sad, Yugoslavia. pp. 75–84Lesk algorithm (1,039 words) [view diff] exact match in snippet view article find links to article
Lesk Algorithm for Word Sense Disambiguation Using WordNet, Lecture Notes in Computer Science; Vol. 2276, Pages: 136 - 145, 2002. ISBN 3-540-43219-1 KilgarriffPeter Buneman (1,067 words) [view diff] exact match in snippet view article find links to article
Characterization of Data Provenance". Database Theory — ICDT 2001. Lecture Notes in Computer Science. Vol. 1973. pp. 316. CiteSeerX 10.1.1.6.1848. doi:10.1007/3-540-44503-X_20JSON-LD (745 words) [view diff] exact match in snippet view article find links to article
IPAW 2016, McLean, VA, USA, June 7-8, 2016, Proceedings. Lecture Notes in Computer Science. Vol. 9672. Cham: Springer International Publishing. pp. 173–177Lis (linear algebra library) (665 words) [view diff] exact match in snippet view article
Computational Science and Its Applications – ICCSA 2010. Lecture Notes in Computer Science 6017. Vol. 6017. Springer. pp. 87–98. doi:10.1007/978-3-642-12165-4_36Digital signature (4,918 words) [view diff] exact match in snippet view article find links to article
Brassard, ed., Advances in Cryptology – CRYPTO '89, vol. 435 of Lecture Notes in Computer Science, pp. 218–238, Spring Verlag, 1990. "Digitalized signaturesZvika Brakerski (287 words) [view diff] exact match in snippet view article find links to article
Canetti, Ran (eds.). Advances in Cryptology – CRYPTO 2012. Lecture Notes in Computer Science. Vol. 7417. Berlin, Heidelberg: Springer. pp. 868–886. doi:10Phase-type distribution (2,368 words) [view diff] exact match in snippet view article find links to article
Analytical and Stochastic Modeling Techniques and Applications. Lecture Notes in Computer Science. Vol. 7314. p. 271. doi:10.1007/978-3-642-30782-9_19. ISBN 978-3-642-30781-2Camellia (cipher) (1,805 words) [view diff] exact match in snippet view article
Conference Seoul, Korea, December 6–7, 2001, Proceedings. Lecture Notes in Computer Science. Vol. 2288. Springer. pp. 32–38. doi:10.1007/3-540-45861-1_3David Wheeler (computer scientist) (1,420 words) [view diff] exact match in snippet view article
a tiny encryption algorithm". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 1008. p. 363. doi:10.1007/3-540-60590-8_29. ISBN 978-3-540-60590-4Unspent transaction output (1,271 words) [view diff] exact match in snippet view article find links to article
Bitcoin UTXO Set". Financial Cryptography and Data Security. Lecture Notes in Computer Science. Vol. 10958. Springer. pp. 78–91. doi:10.1007/978-3-662-58820-8_6Self-verifying finite automaton (468 words) [view diff] exact match in snippet view article find links to article
Complexity" (PDF). Descriptional Complexity of Formal Systems. Lecture Notes in Computer Science. Vol. 9777. pp. 29–44. doi:10.1007/978-3-319-41114-9_3.Term indexing (873 words) [view diff] exact match in snippet view article find links to article
available under the CC BY 4.0 license. P. Graf, Term Indexing, Lecture Notes in Computer Science 1053, 1996 (slightly outdated overview) R. Sekar and I.V.N-hash (213 words) [view diff] exact match in snippet view article find links to article
Techniques, Brighton, UK, April 8–11, 1991. Proceedings. Lecture Notes in Computer Science. Vol. 547. pp. 1–16. doi:10.1007/3-540-46416-6_1. ISBN 978-3-540-54620-7Morten Middelfart (1,106 words) [view diff] exact match in snippet view article find links to article
Conceptual Modeling. Recent Developments and New Directions. Lecture Notes in Computer Science. Vol. 6999. pp. 364–370. doi:10.1007/978-3-642-24574-9_52