Find link

Lecture Notes in Computer Science not in Reversible computing

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Lecture Notes in Computer Science 412 found (3738 total)

alternate case: lecture Notes in Computer Science

Service (systems architecture) (1,994 words) [view diff] exact match in snippet view article

Amsterdam, The Netherlands, December 12-15, 2005, Proceedings. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg. ISBN 978-3-540-30817-1
Provable security (2,177 words) [view diff] exact match in snippet view article find links to article
asymmetric encryption". Advances in Cryptology — EUROCRYPT'94. Lecture Notes in Computer Science. Vol. 950. pp. 92–111. doi:10.1007/BFb0053428. ISBN 978-3-540-60176-0
Bart Preneel (983 words) [view diff] exact match in snippet view article find links to article
algorithms based on block ciphers". Crytography and Coding. Lecture Notes in Computer Science. Vol. 1355. pp. 270–282. doi:10.1007/BFb0024473. ISBN 978-3-540-63927-5
XSL attack (1,834 words) [view diff] exact match in snippet view article find links to article
2003, Lund, Sweden, February 24-26, 2003, Revised Papers. Lecture Notes in Computer Science. Vol. 2887. Springer. pp. 274–289. doi:10.1007/978-3-540-39887-5_21
Join-pattern (6,440 words) [view diff] exact match in snippet view article find links to article
calculus of mobile agents". CONCUR '96: Concurrency Theory. Lecture Notes in Computer Science. Vol. 1119. Le Chesnay: Concurrency Theory. pp. 406–421. doi:10
Tiny Encryption Algorithm (1,189 words) [view diff] exact match in snippet view article find links to article
RC2, and TEA". Information and Communications Security. Lecture Notes in Computer Science. Vol. 1334. pp. 233–246. CiteSeerX 10.1.1.35.8112. doi:10
Satisfiability modulo theories (4,371 words) [view diff] exact match in snippet view article find links to article
Werner; Hermanns, Holger (eds.). Computer Aided Verification. Lecture Notes in Computer Science. Vol. 4590. Berlin, Heidelberg: Springer. pp. 547–560. doi:10
International Data Encryption Algorithm (1,499 words) [view diff] exact match in snippet view article find links to article
on the IDEA Block Cipher". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 3006. pp. 117–129. doi:10.1007/978-3-540-24654-1_9.
Electromagnetic attack (3,404 words) [view diff] exact match in snippet view article find links to article
Transmission Using Electromagnetic Emanations". Information Hiding. Lecture Notes in Computer Science. Vol. 1525. pp. 124–142. CiteSeerX 10.1.1.64.6982. doi:10
Extended Semantic Web Conference (867 words) [view diff] exact match in snippet view article find links to article
Skaf-Molli, Hala; Tamper, Minna (eds.). The Semantic Web. Lecture Notes in Computer Science. Vol. 13261. Cham: Springer International Publishing. pp. 200–216
Choreographic programming (1,573 words) [view diff] exact match in snippet view article find links to article
Specifications". Logic, Rewriting, and Concurrency (PDF). Lecture Notes in Computer Science. Vol. 9200. pp. 427–450. doi:10.1007/978-3-319-23165-5_20
E0 (cipher) (810 words) [view diff] exact match in snippet view article
Combiner". Information Security and Cryptology - ICISC'99. Lecture Notes in Computer Science. Vol. 1787. pp. 17–29. CiteSeerX 10.1.1.40.9412. doi:10.1007/10719994_2
Computer Aided Verification (396 words) [view diff] exact match in snippet view article find links to article
"Counterexample-Guided Abstraction Refinement". Computer Aided Verification. Lecture Notes in Computer Science. Vol. 1855. pp. 154–169. doi:10.1007/10722167_15. ISBN 978-3-540-67770-3
Shlomi Dolev (2,390 words) [view diff] exact match in snippet view article find links to article
Joffroy; Delaët, Sylvie (2014). Networked Systems (PDF). Lecture Notes in Computer Science. Springer, Cham. pp. 99–121. doi:10.1007/978-3-319-09581-3_8
Linked timestamping (1,715 words) [view diff] exact match in snippet view article find links to article
Digital Signatures". Advances in Cryptology – EUROCRYPT '93. Lecture Notes in Computer Science. Vol. 765. p. 274. doi:10.1007/3-540-48285-7_24. ISBN 978-3-540-57600-6
Hash-based cryptography (2,355 words) [view diff] exact match in snippet view article find links to article
Minimal Security Assumptions". Post-Quantum Cryptography. Lecture Notes in Computer Science. Vol. 7071. pp. 117–129. CiteSeerX 10.1.1.400.6086. doi:10
Kleptography (1,140 words) [view diff] exact match in snippet view article find links to article
Barbara, California, USA, August 18–22, 1996, Proceedings. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 89–103. ISBN 978-3-540-68697-2
Kaisa Nyberg (325 words) [view diff] exact match in snippet view article find links to article
Tatsunokuchi, Ishikawa, Japan September 17ÔÇô19, 1997, Proceedings, Lecture Notes in Computer Science, vol. 1396, Springer, pp. 32–42, doi:10.1007/bfb0030406,
E (theorem prover) (937 words) [view diff] exact match in snippet view article
(2004). "System Description: E 0.81". Automated Reasoning. Lecture Notes in Computer Science. Vol. 3097. pp. 223–228. doi:10.1007/978-3-540-25984-8_15
Reversible computing (3,014 words) [view diff] exact match in snippet view article find links to article
Jarkko; Ulidowski, Irek (eds.). Reversible Computation. Lecture Notes in Computer Science. Vol. 11106. Cham: Springer International Publishing. pp. 3–33
Brent Waters (565 words) [view diff] exact match in snippet view article find links to article
Identity-Based Encryption". Advances in Cryptology – EUROCRYPT 2005. Lecture Notes in Computer Science. Vol. 3494. pp. 457–473. doi:10.1007/11426639_27. ISBN 978-3-540-25910-7
Dmitry Khovratovich (1,347 words) [view diff] exact match in snippet view article find links to article
AES-192 and AES-256". Advances in Cryptology – ASIACRYPT 2009. Lecture Notes in Computer Science. Vol. 5912. Springer-Verlag. pp. 1–18. doi:10.1007/978-3-642-10366-7_1
Mexican International Conference on Artificial Intelligence (1,007 words) [view diff] exact match in snippet view article find links to article
(2000). MICAI 2000: Advances in Artificial Intelligence. Lecture Notes in Computer Science. Vol. 1793. doi:10.1007/10720076. ISBN 978-3-540-67354-5.
RDF query language (1,154 words) [view diff] exact match in snippet view article find links to article
Comparison of RDF Query Languages". The Semantic Web – ISWC 2004. Lecture Notes in Computer Science. Vol. 3298. pp. 502–517. CiteSeerX 10.1.1.105.8731. doi:10
Moti Yung (1,630 words) [view diff] exact match in snippet view article find links to article
Cryptography, or: Should We Trust Capstone? CRYPTO 1996: 89-103, Lecture Notes in Computer Science, vol. 1109, p. 89, doi:10.1007/3-540-68697-5_8, ISBN 978-3-540-61512-5
Homomorphic encryption (4,688 words) [view diff] exact match in snippet view article find links to article
Encryption Scheme". Advances in Cryptology – EUROCRYPT 2011. Lecture Notes in Computer Science. Vol. 6632. pp. 129–148. doi:10.1007/978-3-642-20465-4_9.
Orr Dunkelman (791 words) [view diff] exact match in snippet view article find links to article
CRYPTO 2012. https://www.iacr.org/conferences/crypto2012/. Lecture Notes in Computer Science. Vol. 7417. Springer. pp. 719–740. doi:10.1007/978-3-642-32009-5_42
SecPAL (447 words) [view diff] exact match in snippet view article find links to article
Information Systems Security. ICISS 2010. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Vol. 6503. Berlin; Heidelberg: Springer
Post-quantum cryptography (6,987 words) [view diff] exact match in snippet view article find links to article
Cryptography for the Internet" (PDF), Post-Quantum Cryptography, Lecture Notes in Computer Science, vol. 8772, Cham: Springer International Publishing, pp. 197–219
PragmaDev Studio (1,884 words) [view diff] exact match in snippet view article find links to article
Simulators". System Analysis and Modeling: About Models. Lecture Notes in Computer Science. Vol. 6598. Springer, Berlin, Heidelberg. pp. 144–155. doi:10
Post-quantum cryptography (6,987 words) [view diff] exact match in snippet view article find links to article
Cryptography for the Internet" (PDF), Post-Quantum Cryptography, Lecture Notes in Computer Science, vol. 8772, Cham: Springer International Publishing, pp. 197–219
Deterministic encryption (897 words) [view diff] exact match in snippet view article find links to article
Keyword Search" (PDF). Advances in Cryptology - EUROCRYPT 2004. Lecture Notes in Computer Science. Vol. 3027. pp. 506–522. doi:10.1007/978-3-540-24676-3_30
FORK-256 (798 words) [view diff] exact match in snippet view article find links to article
in the Full SHA-1". Advances in Cryptology – CRYPTO 2005. Lecture Notes in Computer Science. Vol. 3621. pp. 17–36. doi:10.1007/11535218_2. ISBN 978-3-540-31870-5
Skipjack (cipher) (1,134 words) [view diff] exact match in snippet view article
Feistel Networks". Advances in Cryptology – CRYPTO 2010. Lecture Notes in Computer Science. Vol. 6223. Springer. pp. 613–630. CiteSeerX 10.1.1.185.3033
Lattice-based cryptography (2,872 words) [view diff] exact match in snippet view article find links to article
ring-based public key cryptosystem". Algorithmic Number Theory. Lecture Notes in Computer Science. Vol. 1423. pp. 267–288. CiteSeerX 10.1.1.25.8422. doi:10
Inductive logic programming (4,248 words) [view diff] case mismatch in snippet view article find links to article
Ronald de (1997). Foundations of inductive logic programming. Lecture notes in computer science Lecture notes in artificial intelligence. Berlin Heidelberg:
Feistel cipher (1,316 words) [view diff] exact match in snippet view article find links to article
Boneh, Dan (ed.), Advances in Cryptology - CRYPTO 2003 (PDF), Lecture Notes in Computer Science, vol. 2729, pp. 513–529, doi:10.1007/b11817, ISBN 978-3-540-40674-7
OPTICS algorithm (2,133 words) [view diff] exact match in snippet view article find links to article
Outliers". Principles of Data Mining and Knowledge Discovery. Lecture Notes in Computer Science. Vol. 1704. Springer-Verlag. pp. 262–270. doi:10.1007/b72280
Identity-based cryptography (868 words) [view diff] exact match in snippet view article find links to article
(eds.). Advances in Cryptology Proceedings of CRYPTO '84. Lecture Notes in Computer Science. Vol. 196 (1 ed.). Springer Berlin Heidelberg. pp. 47–53.
RIPEMD (884 words) [view diff] exact match in snippet view article find links to article
of RACE Integrity Primitives Evaluation (RIPE-RACE 1040). Lecture Notes in Computer Science. Vol. 1007. doi:10.1007/3-540-60640-8. ISBN 978-3-540-60640-6
XTEA (969 words) [view diff] exact match in snippet view article find links to article
B.; Meier, W. (eds.). Fast Software Encryption. FSE 2004. Lecture Notes in Computer Science. Vol. 3017. Berlin, Heidelberg: Springer. pp. 299–316. doi:10
Multitier programming (2,772 words) [view diff] exact match in snippet view article find links to article
Without Tiers". Formal Methods for Components and Objects. Lecture Notes in Computer Science. Vol. 4709. pp. 266–296. doi:10.1007/978-3-540-74792-5_12
HyperNEAT (1,263 words) [view diff] exact match in snippet view article find links to article
Mouret, Jean-Baptiste (eds.). From Animals to Animats 11. Lecture Notes in Computer Science. Vol. 6226. Springer Berlin Heidelberg. pp. 533–543. CiteSeerX 10
R-tree (2,966 words) [view diff] exact match in snippet view article find links to article
Geographic Data". Advances in Spatial and Temporal Databases. Lecture Notes in Computer Science. Vol. 8098. p. 146. doi:10.1007/978-3-642-40235-7_9. ISBN 978-3-642-40234-0
Merkle tree (1,785 words) [view diff] exact match in snippet view article find links to article
Encryption Function". Advances in Cryptology – CRYPTO '87. Lecture Notes in Computer Science. Vol. 293. pp. 369–378. doi:10.1007/3-540-48184-2_32. ISBN 978-3-540-18796-7
HC-256 (534 words) [view diff] exact match in snippet view article find links to article
New Stream Cipher HC-256" (PDF). Fast Software Encryption. Lecture Notes in Computer Science. Vol. 3017. pp. 226–244. doi:10.1007/978-3-540-25937-4_15
Randomness test (1,173 words) [view diff] exact match in snippet view article find links to article
Cellular Automata". Advances in Cryptology — EUROCRYPT '91. Lecture Notes in Computer Science. Vol. 547. pp. 186–199. doi:10.1007/3-540-46416-6_17. ISBN 978-3-540-54620-7
CL-HTTP (643 words) [view diff] exact match in snippet view article find links to article
system on world wide web". Intelligent Tutoring Systems. Lecture Notes in Computer Science. Vol. 1086/1996. Springer. pp. 261–269. doi:10.1007/3-540-61327-7_123
Coppersmith method (767 words) [view diff] exact match in snippet view article find links to article
Modular Equation". Advances in Cryptology — EUROCRYPT '96. Lecture Notes in Computer Science. Vol. 1070. pp. 155–165. doi:10.1007/3-540-68339-9_14.
Fly algorithm (3,630 words) [view diff] exact match in snippet view article find links to article
Jean; Sapin, Emmanuel (2009). "Flies Open a Door to SLAM.". Lecture Notes in Computer Science. Applications of Evolutionary Computation (EvoApplications
SAT solver (3,628 words) [view diff] exact match in snippet view article find links to article
Principles and Practice of Constraint Programming – CP 2007, Lecture Notes in Computer Science, vol. 4741, pp. 544–558, CiteSeerX 10.1.1.70.5471, doi:10
Data Encryption Standard (6,697 words) [view diff] exact match in snippet view article find links to article
for DES Cipher". Advances in Cryptology — EUROCRYPT '93. Lecture Notes in Computer Science. Vol. 765. Springer, Berlin, Heidelberg. pp. 386–397. doi:10
Rocq (1,882 words) [view diff] exact match in snippet view article find links to article
TPHOLs 2005, Oxford, UK, August 22–25, 2005, Proceedings. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. pp. 98–113. doi:10.1007/11541868_7
Cognitive computing (1,602 words) [view diff] exact match in snippet view article find links to article
Cognitive Augmentation – A Case Study". Augmented Cognition. Lecture Notes in Computer Science. Vol. 11580. pp. 533–545. arXiv:2211.06479. doi:10.1007/978-3-030-22419-6_38
DPLL(T) (434 words) [view diff] exact match in snippet view article
Rajeev; Peled, Doron A. (eds.). Computer Aided Verification. Lecture Notes in Computer Science. Vol. 3114. Springer Berlin Heidelberg. pp. 175–188. doi:10
Annotation (3,658 words) [view diff] exact match in snippet view article find links to article
Yannick (eds.). Knowledge Engineering and Knowledge Management. Lecture Notes in Computer Science. Vol. 11313. Cham: Springer International Publishing. pp. 19–33
Cryptographic hash function (6,288 words) [view diff] exact match in snippet view article find links to article
Other Primitives". Advances in Cryptology – EUROCRYPT 2005. Lecture Notes in Computer Science. Vol. 3494. pp. 96–113. doi:10.1007/11426639_6. ISBN 978-3-540-25910-7
Moni Naor (676 words) [view diff] exact match in snippet view article find links to article
"Broadcast Encryption". Advances in Cryptology — CRYPTO' 93. Lecture Notes in Computer Science. Vol. 773. pp. 480–491. doi:10.1007/3-540-48329-2_40. ISBN 978-3-540-57766-9
Symposium on Experimental Algorithms (731 words) [view diff] exact match in snippet view article find links to article
Kulikov, Alexander S., eds. (2016). Experimental Algorithms. Lecture Notes in Computer Science. Vol. 9685. doi:10.1007/978-3-319-38851-9. ISBN 978-3-319-38850-2
Queue number (2,736 words) [view diff] exact match in snippet view article find links to article
Germany, September 21–24, 2010, Revised Selected Papers, Lecture Notes in Computer Science, vol. 6502, Heidelberg: Springer, pp. 68–79, doi:10.1007/978-3-642-18469-7_7
ProVerif (1,382 words) [view diff] exact match in snippet view article find links to article
WS-Security Protocols". Web Services and Formal Methods. Lecture Notes in Computer Science. Vol. 4184. Springer, Berlin, Heidelberg. pp. 88–106. CiteSeerX 10
Queue number (2,736 words) [view diff] exact match in snippet view article find links to article
Germany, September 21–24, 2010, Revised Selected Papers, Lecture Notes in Computer Science, vol. 6502, Heidelberg: Springer, pp. 68–79, doi:10.1007/978-3-642-18469-7_7
ProVerif (1,382 words) [view diff] exact match in snippet view article find links to article
WS-Security Protocols". Web Services and Formal Methods. Lecture Notes in Computer Science. Vol. 4184. Springer, Berlin, Heidelberg. pp. 88–106. CiteSeerX 10
Go and mathematics (1,727 words) [view diff] exact match in snippet view article find links to article
problems". Mathematical Foundations of Computer Science 1984. Lecture Notes in Computer Science. Vol. 176. pp. 498–506. doi:10.1007/BFb0030333. ISBN 978-3-540-13372-8
Zero-knowledge proof (8,168 words) [view diff] exact match in snippet view article find links to article
Children". Advances in Cryptology — CRYPTO' 89 Proceedings (PDF). Lecture Notes in Computer Science. Vol. 435. pp. 628–631. doi:10.1007/0-387-34805-0_60. ISBN 978-0-387-97317-3
Secure two-party computation (1,093 words) [view diff] exact match in snippet view article find links to article
Single-Execution Setting", Advances in Cryptology – EUROCRYPT 2017, Lecture Notes in Computer Science, vol. 10212, Cham: Springer International Publishing, pp. 399–424
Computational Diffie–Hellman assumption (796 words) [view diff] exact match in snippet view article find links to article
Diffie–Hellman is as strong as discrete log for certain primes (PDF), Lecture Notes in Computer Science, vol. 403, pp. 530–539, doi:10.1007/0-387-34799-2_38, ISBN 978-0-387-97196-4
One-key MAC (919 words) [view diff] exact match in snippet view article find links to article
(2003-02-24). "OMAC: One-Key CBC MAC". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 2887. Springer, Berlin, Heidelberg. pp. 129–153. doi:10
Petri net (7,255 words) [view diff] exact match in snippet view article find links to article
Lectures on Petri Nets I: Basic Models – Advances in Petri Nets. Lecture Notes in Computer Science. Vol. 1491. Springer. pp. 12–121. doi:10.1007/3-540-65306-6_14
Largest empty rectangle (816 words) [view diff] exact match in snippet view article find links to article
the largest empty rectangle". STACS-1984, Lecture Notes in Computer Science. Lecture Notes in Computer Science. 166: 43–54. doi:10.1007/3-540-12920-0_4
Transaction malleability problem (638 words) [view diff] exact match in snippet view article find links to article
Rohloff, Kurt (eds.). Financial Cryptography and Data Security. Lecture Notes in Computer Science. Vol. 8976. Berlin, Heidelberg: Springer. pp. 1–18. doi:10
Adaptive sort (654 words) [view diff] exact match in snippet view article find links to article
Alistair Moffat (1992). A framework for adaptive sorting. Lecture Notes in Computer Science. Vol. 621. Berlin: Springer Berlin / Heidelberg. pp. 422–433
Broadcast encryption (802 words) [view diff] exact match in snippet view article find links to article
Advances in Cryptology — CRYPTO' 93 (Extended abstract). Lecture Notes in Computer Science. Vol. 773. pp. 480–491. doi:10.1007/3-540-48329-2_40. ISBN 978-3-540-57766-9
Bot prevention (1,141 words) [view diff] exact match in snippet view article find links to article
of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science. Vol. 12223. Cham: Springer International Publishing. pp. 135–159
T-function (713 words) [view diff] exact match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems - CHES 2002. Lecture Notes in Computer Science. Vol. 2523. Springer-Verlag. pp. 470–483. doi:10.1007/3-540-36400-5_34
Budget-additive valuation (850 words) [view diff] exact match in snippet view article find links to article
for Maximizing Ad-Auctions Revenue", Algorithms – ESA 2007, Lecture Notes in Computer Science, vol. 4698, Berlin, Heidelberg: Springer Berlin Heidelberg
Christine Paulin-Mohring (507 words) [view diff] exact match in snippet view article find links to article
Machinery. She was elected to the Academia Europaea in 2014. Lecture Notes in Computer Science. Types for Proofs and Programs: International Workshop TYPES'96
MD4 (879 words) [view diff] exact match in snippet view article find links to article
(2008-02-10). "MD4 is Not One-Way" (PDF). Fast Software Encryption. Lecture Notes in Computer Science. Vol. 5086. Springer. pp. 412–428. doi:10.1007/978-3-540-71039-4_26
GNUnet (2,143 words) [view diff] exact match in snippet view article find links to article
Seberry, Jennifer (eds.). Efficient Sharing of Encrypted Data. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 107–120. CiteSeerX 10.1.1
Fiat–Shamir heuristic (1,072 words) [view diff] exact match in snippet view article find links to article
Signature Problems". Advances in Cryptology — CRYPTO' 86. Lecture Notes in Computer Science. Vol. 263. Springer Berlin Heidelberg. pp. 186–194. doi:10
Book embedding (8,167 words) [view diff] exact match in snippet view article find links to article
graphs have constant book thickness", Algorithms – ESA 2015, Lecture Notes in Computer Science, vol. 9294, Springer, pp. 130–141, doi:10.1007/978-3-662-48350-3_12
Alfred Menezes (831 words) [view diff] exact match in snippet view article find links to article
(with S. Chatterjee, N. Koblitz and P. Sarkar), Mycrypt 2016, Lecture Notes in Computer Science, 10311 (2017), 21–55. doi:10.1007/978-3-319-61273-7_3 "Another
Bruce M. McLaren (4,006 words) [view diff] exact match in snippet view article find links to article
Toward Tutoring Help Seeking. Intelligent Tutoring Systems Lecture Notes in Computer Science, 227–239. Ashley, K.D. & McLaren, B.M. (1995). Reasoning with
Identity-based encryption (1,950 words) [view diff] exact match in snippet view article find links to article
Barbara, California, USA, August 19–22, 1984, Proceedings. Lecture Notes in Computer Science. Vol. 196. Springer. pp. 47–53. doi:10.1007/3-540-39568-7_5
Venansius Baryamureeba (1,592 words) [view diff] exact match in snippet view article find links to article
for Linear Programming". Large-Scale Scientific Computing. Lecture Notes in Computer Science. Vol. 3743. pp. 629–637. doi:10.1007/11666806_72. ISBN 978-3-540-31994-8
Artificial immune system (1,710 words) [view diff] exact match in snippet view article find links to article
of Degeneracy in a Lymph Node". Artificial Immune Systems. Lecture Notes in Computer Science. Vol. 4163. pp. 164–177. doi:10.1007/11823940_13. ISBN 978-3-540-37749-8
Augmented cognition (1,758 words) [view diff] exact match in snippet view article find links to article
Schmorrow, Dylan D. (ed.). Foundations of Augmented Cognition. Lecture Notes in Computer Science. Vol. 4565. Springer Berlin Heidelberg. pp. 220–228. doi:10
Infobox (1,380 words) [view diff] exact match in snippet view article find links to article
Vasudeva (June 2011). Multidisciplinary Information Retrieval. Lecture Notes in Computer Science. Vol. 6653. Springer Berlin Heidelberg. doi:10.1007/978-3-642-21353-3
Cardano (blockchain platform) (3,122 words) [view diff] exact match in snippet view article
Peter B.; Sala, Massimiliano (eds.). The Extended UTXO Model. Lecture Notes in Computer Science. Cham: Springer International Publishing. pp. 525–539. doi:10
Levenshtein automaton (561 words) [view diff] exact match in snippet view article find links to article
Automata Theory and Applications. Lecture Notes in Computer Science. Vol. 9618. Lecture Notes in Computer Science. pp. 207–218. doi:10.1007/978-3-319-30000-9_16
ElGamal encryption (1,467 words) [view diff] exact match in snippet view article find links to article
Decision Diffie-Hellman problem". Algorithmic Number Theory. Lecture Notes in Computer Science. Vol. 1423. pp. 48–63. CiteSeerX 10.1.1.461.9971. doi:10.1007/BFb0054851
Exponential time hypothesis (3,047 words) [view diff] exact match in snippet view article find links to article
Ljubljana, Slovenia, September 12–14, 2012, Proceedings, Lecture Notes in Computer Science, vol. 7535, Springer, pp. 13–24, CiteSeerX 10.1.1.680.8401
Model checking (2,788 words) [view diff] exact match in snippet view article find links to article
programs using fixpoints", Automata, Languages and Programming, Lecture Notes in Computer Science, vol. 85, pp. 169–181, doi:10.1007/3-540-10003-2_69, ISBN 978-3-540-10003-4
CADE ATP System Competition (378 words) [view diff] exact match in snippet view article find links to article
Theories Competition" (PDF). Computer Aided Verification. Lecture Notes in Computer Science. 3576. Springer: 20–23. doi:10.1007/11513988_4. ISBN 978-3-540-27231-1
Pairing-based cryptography (1,150 words) [view diff] exact match in snippet view article find links to article
cryptography at high security levels". Cryptography and Coding. Lecture Notes in Computer Science. Vol. 3796. pp. 13–36. doi:10.1007/11586821_2. ISBN 978-3-540-30276-6
Speculative execution (978 words) [view diff] exact match in snippet view article find links to article
International Conference on Principles of Distributed Systems. Lecture Notes in Computer Science. Vol. 4305. Bordeaux, France: Springer. pp. 1–2. doi:10.1007/11945529_1
Advanced Encryption Standard (5,694 words) [view diff] exact match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems - CHES 2002. Lecture Notes in Computer Science. Vol. 2523. pp. 159–171. doi:10.1007/3-540-36400-5_13.
Categorical quantum mechanics (2,203 words) [view diff] exact match in snippet view article find links to article
EACSL Annual Conference on Computer Science Logic (CSL). Lecture Notes in Computer Science. Vol. 6247. Springer. arXiv:1004.1598. doi:10.2168/LMCS-8(4:14)2012
Amit Sahai (1,154 words) [view diff] exact match in snippet view article find links to article
Challenges". Theory of Cryptography. Lecture Notes in Computer Science. Vol. 6597 (Lecture Notes in Computer Science). Springer Berlin Heidelberg. pp. 253–273
Loop-invariant code motion (596 words) [view diff] exact match in snippet view article find links to article
Detection". Automated Technology for Verification and Analysis. Lecture Notes in Computer Science. Vol. 10482. pp. 91–108. doi:10.1007/978-3-319-68167-2_7.
A5/1 (2,725 words) [view diff] exact match in snippet view article find links to article
Cryptanalysis of A5/1 on a PC". Fast Software Encryption—FSE 2000. Lecture Notes in Computer Science. Vol. 1978. pp. 1–18. doi:10.1007/3-540-44706-7_1. ISBN 978-3-540-41728-6
Larch Prover (1,558 words) [view diff] exact match in snippet view article find links to article
Proceedings of the Fourth International Conference CAV'92), Lecture Notes in Computer Science 663, Springer-Verlag, June 1992, pages 44–55. Urban Engberg
Manumation (345 words) [view diff] exact match in snippet view article find links to article
Through E-Government: Myth or Reality?". Electronic Government. Lecture Notes in Computer Science. Vol. 3591. Springer. pp. 1–11. doi:10.1007/11545156_1.
Persuasive technology (4,408 words) [view diff] exact match in snippet view article find links to article
Health-Promoting Mobile Applications". Persuasive Technology. Lecture Notes in Computer Science. Vol. 6137. pp. 150–161. doi:10.1007/978-3-642-13226-1_16
Fork–join queue (1,771 words) [view diff] exact match in snippet view article find links to article
Fork-Join Queueing Simulation". Computer Performance Engineering. Lecture Notes in Computer Science. Vol. 5652. pp. 16–29. CiteSeerX 10.1.1.158.7363. doi:10
Weak heap (2,127 words) [view diff] exact match in snippet view article find links to article
"On the performance of WEAK-HEAPSORT", Stacs 2000 (PDF), Lecture Notes in Computer Science, vol. 1770, Springer-Verlag, pp. 254–266, CiteSeerX 10.1.1
Algorithmic skeleton (8,819 words) [view diff] exact match in snippet view article find links to article
Euro-Par Conference: Parallel Processing, volume 4641 of Lecture Notes in Computer Science, pages 72–81. Springer-Verlag, 2007. D. Caromel, L. Henrio
Mean value analysis (1,586 words) [view diff] exact match in snippet view article find links to article
Performance Evaluation of Computer and Communication Systems. Lecture Notes in Computer Science. Vol. 729. p. 491. doi:10.1007/BFb0013865. ISBN 978-3-540-57297-8
Accumulator (cryptography) (2,799 words) [view diff] exact match in snippet view article
Signatures" (PDF). Advances in Cryptology — EUROCRYPT '93. Lecture Notes in Computer Science. Vol. 765. pp. 274–285. doi:10.1007/3-540-48285-7_24. ISBN 978-3-540-57600-6
Anne Canteaut (513 words) [view diff] exact match in snippet view article find links to article
Graz, Austria, March 15-17, 2006, Revised Selected Papers. Lecture Notes in Computer Science. Vol. 4047. Springer. pp. 30–40. CiteSeerX 10.1.1.59.9346
Tree stack automaton (876 words) [view diff] exact match in snippet view article find links to article
Mathematical Foundations of Computer Science (MFCS 1990). Lecture Notes in Computer Science, Vol. 452, pages 313–321, doi:10.1007/BFb0029624. Scott, Dana
Therese Biedl (202 words) [view diff] exact match in snippet view article find links to article
Copenhagen, Denmark, July 8–11, 2014, Proceedings, Part I. Lecture Notes in Computer Science. Vol. 8572. Springer. pp. 198–210. doi:10.1007/978-3-662-43948-7_17
Curry (programming language) (1,954 words) [view diff] exact match in snippet view article
Programming Logics - Essays in Memory of Harald Ganzinger. Lecture Notes in Computer Science. Vol. 7797. pp. 123–168. doi:10.1007/978-3-642-37651-1_6.
Datalog (4,894 words) [view diff] exact match in snippet view article find links to article
Georg; Furche, Tim; Sellers, Andrew (eds.). Datalog Reloaded. Lecture Notes in Computer Science. Vol. 6702. Berlin, Heidelberg: Springer. pp. 181–220. doi:10
2-EXPTIME (960 words) [view diff] exact match in snippet view article find links to article
on Automata, Languages and Programming (ICALP 2003) (PDF), Lecture Notes in Computer Science, vol. 2719, Springer-Verlag, pp. 767–775, doi:10.1007/3-540-45061-0_60
Free Haven Project (928 words) [view diff] exact match in snippet view article find links to article
Haven Project: Distributed Anonymous Storage Service" (PDF). Lecture Notes in Computer Science 2009. Proc. Workshop on Design Issues in Anonymity and Unobservability
Knowledge extraction (4,445 words) [view diff] exact match in snippet view article find links to article
Acquisition Method for the Semantic Web", WAIM, volume 3739 of Lecture Notes in Computer Science, page 209-220. Springer. doi:10.1007/11563952_19 Tirmizi et
Wikidata (3,683 words) [view diff] exact match in snippet view article find links to article
Multilinguality, Multimodality, and Interaction. CLEF 2018. Lecture Notes in Computer Science. Vol. 11018. p. 129. doi:10.1007/978-3-319-98932-7_12.
Pancake sorting (2,201 words) [view diff] exact match in snippet view article find links to article
Tighter Inapproximability Results". Proc. 26th ICALP (1999). Lecture Notes in Computer Science. 1644: 200–09. Berman, P.; Karpinski, M.; Hannenhalli, S.
Yacas (282 words) [view diff] exact match in snippet view article find links to article
Intelligence, Automated Reasoning, and Symbolic Computation, Lecture Notes in Computer Science, vol. 2385, Springer, pp. 332–336, doi:10.1007/3-540-45470-5_29
Instrumental convergence (2,947 words) [view diff] exact match in snippet view article find links to article
and Intelligent Agents". Artificial General Intelligence. Lecture Notes in Computer Science. Vol. 6830. pp. 11–20. doi:10.1007/978-3-642-22887-2_2.
Tatami (1,410 words) [view diff] exact match in snippet view article find links to article
2010, Nha Trang, Vietnam, July 19-21, 2010. Proceedings. Lecture Notes in Computer Science. Vol. 6196. Springer. pp. 288–297. arXiv:1103.3309. doi:10
Contact graph (483 words) [view diff] exact match in snippet view article find links to article
2013, Lübeck, Germany, June 19-21, 2013, Revised Papers, Lecture Notes in Computer Science, vol. 8165, Springer, pp. 139–151, arXiv:1303.1279, doi:10
Elliptic-curve Diffie–Hellman (2,168 words) [view diff] exact match in snippet view article find links to article
2006. Lecture Notes in Computer Science. Vol. 3958. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds) Public Key Cryptography - PKC 2006. Lecture Notes
Ian Horrocks (1,070 words) [view diff] exact match in snippet view article find links to article
Reasoner: System Description" (PDF). Automated Reasoning. Lecture Notes in Computer Science. Vol. 4130. pp. 292–297. CiteSeerX 10.1.1.65.2672. doi:10
Evolutionary algorithm (4,606 words) [view diff] exact match in snippet view article find links to article
Evolution of Evolutionary Algorithms". Genetic Programming. Lecture Notes in Computer Science. Vol. 3003. Springer. pp. 389–398. doi:10.1007/978-3-540-24650-3_37
Ideal lattice (6,061 words) [view diff] exact match in snippet view article find links to article
Active Attacks" (PDF). Public Key Cryptography – PKC 2008. Lecture Notes in Computer Science. Vol. 4939. pp. 162–179. doi:10.1007/978-3-540-78440-1_10
Non-interactive zero-knowledge proof (2,452 words) [view diff] exact match in snippet view article find links to article
Garay, Juan A. (eds.). Advances in Cryptology – CRYPTO 2013. Lecture Notes in Computer Science. Vol. 8043. Berlin, Heidelberg: Springer. pp. 90–108. doi:10
Ensemble learning (6,692 words) [view diff] exact match in snippet view article find links to article
Announcement)". Cyber Security Cryptography and Machine Learning. Lecture Notes in Computer Science. Vol. 11527. pp. 202–207. doi:10.1007/978-3-030-20951-3_18
Gennady Makanin (1,099 words) [view diff] exact match in snippet view article find links to article
equations in a free group". Word Equations and Related Topics. Lecture Notes in Computer Science. Vol. 572. pp. 1–11. doi:10.1007/3-540-55124-7_1. ISBN 978-3-540-55124-9
Key encapsulation mechanism (4,176 words) [view diff] exact match in snippet view article find links to article
Ciphertext Attack. Advances in Cryptology – EUROCRYPT 2000. Lecture Notes in Computer Science. Vol. 1807. Bruges, Belgium: Springer. pp. 275–288. doi:10
Klaus-Robert Müller (996 words) [view diff] exact match in snippet view article find links to article
(2022). xxAI – Beyond Explainable Artificial Intelligence. Lecture Notes in Computer Science. Vol. 13200. Springer Cham. doi:10.1007/978-3-031-04083-2
Scale-space segmentation (1,199 words) [view diff] exact match in snippet view article find links to article
watershed segmentation" (PDF). Image Analysis and Processing. Lecture Notes in Computer Science. Vol. 1310. pp. 6–13. doi:10.1007/3-540-63507-6_178. ISBN 978-3-540-63507-9
Computational hardness assumption (3,302 words) [view diff] exact match in snippet view article find links to article
Position Paper". Theory of Cryptography Conference (TCC) 2016. Lecture Notes in Computer Science. Vol. 9562. Springer. pp. 505–522. doi:10.1007/978-3-662-49096-9_21
Key generator (213 words) [view diff] exact match in snippet view article find links to article
and Key Distribution". Advances in Cryptology — CRYPTO' 93. Lecture Notes in Computer Science. Vol. 773. pp. 232–249. CiteSeerX 10.1.1.62.3423. doi:10
Topincs (424 words) [view diff] exact match in snippet view article find links to article
For Topic Maps". Leveraging the Semantics of Topic Maps. Lecture Notes in Computer Science. Vol. 4438. Berlin Heidelberg: Springer. pp. 175–183. doi:10
Strong RSA assumption (228 words) [view diff] exact match in snippet view article find links to article
(eds) Advances in Cryptology – EUROCRYPT ’97. EUROCRYPT 1997. Lecture Notes in Computer Science, vol 1233. Springer, Berlin, Heidelberg. doi:10.1007/3-540-69053-0_33
Orc (programming language) (483 words) [view diff] exact match in snippet view article
Orchestration and Its Semantic Properties. Concurrency Theory. Lecture Notes in Computer Science. Vol. 4137. Bonn, Germany: Springer. pp. 477–491. doi:10.1007/11817949_32
Truthful job scheduling (1,747 words) [view diff] exact match in snippet view article find links to article
Machines". In Diekert, Volker; Habib, Michel (eds.). Stacs 2004. Lecture Notes in Computer Science. Vol. 2996. Berlin, Heidelberg: Springer. pp. 608–619. doi:10
C. Pandu Rangan (1,223 words) [view diff] exact match in snippet view article find links to article
and Security (SETS), (2005-2007). Member, Editorial Board, Lecture Notes in Computer Science Series (LNCS Series), Springer-Verlag, Germany, (2005-2008)
Memory-hard function (825 words) [view diff] exact match in snippet view article find links to article
In Boneh, Dan (ed.). Advances in Cryptology - CRYPTO 2003. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. pp. 426–444. doi:10.1007/978-3-540-45146-4_25
Prince (cipher) (1,376 words) [view diff] exact match in snippet view article
Exhaustive Key Search". Advances in Cryptology – CRYPTO '96. Lecture Notes in Computer Science. Vol. 1109. pp. 252–267. doi:10.1007/3-540-68697-5_20.
Hartmut Ehrig (710 words) [view diff] exact match in snippet view article find links to article
Graph-Grammars and Their Application to Computer Science and Biology. Lecture Notes in Computer Science. Vol. 73. Heidelberg: Springer. doi:10.1007/BFb0025726.
Cryptographic multilinear map (1,027 words) [view diff] exact match in snippet view article find links to article
cryptography at high security levels". Cryptography and Coding. Lecture Notes in Computer Science. Vol. 3796. pp. 13–36. doi:10.1007/11586821_2. ISBN 978-3-540-30276-6
Alternating step generator (565 words) [view diff] exact match in snippet view article find links to article
Bruijn Sequences". Advances in Cryptology — EUROCRYPT '87. Lecture Notes in Computer Science. Vol. 304. Berlin, Heidelberg: Springer. pp. 5–14. doi:10
Flora-2 (786 words) [view diff] exact match in snippet view article find links to article
for Semantic Web, Formal Approaches to Agent-Based Systems, Lecture Notes in Computer Science v. 3228, Springer Verlag. A. D. Lattner , J. D. Gehrke , I
Galois/Counter Mode (3,051 words) [view diff] exact match in snippet view article find links to article
Systems - CHES 2007 . GCM-AES Architecture Optimized for FPGAs. Lecture Notes in Computer Science. Vol. 4727. Springer. pp. 227–238. doi:10.1007/978-3-540-74735-2_16
Massive Online Analysis (803 words) [view diff] exact match in snippet view article find links to article
Data Streams". Advanced Information Systems Engineering. Lecture Notes in Computer Science. Vol. 8188. pp. 480–492. CiteSeerX 10.1.1.638.5472. doi:10
Proof of work (4,073 words) [view diff] exact match in snippet view article find links to article
Combatting Junk Mail". Advances in Cryptology — CRYPTO' 92. Lecture Notes in Computer Science. Vol. 740. Springer. pp. 139–147. doi:10.1007/3-540-48071-4_10
Program structure tree (1,164 words) [view diff] exact match in snippet view article find links to article
International Colloquium on Automata, Languages and Programming, Lecture Notes in Computer Science, vol. 443, Springer-Verlag, pp. 598–611, doi:10.1007/BFb0032061
Digital signage (2,494 words) [view diff] exact match in snippet view article find links to article
Campilho, Aurélio (eds.). Image Analysis and Recognition. Lecture Notes in Computer Science. Vol. 5627. Berlin, Heidelberg: Springer. pp. 347–358. doi:10
Roland Carl Backhouse (757 words) [view diff] exact match in snippet view article find links to article
Programming (AFP 98),12–19 September 1998 Braga Portugal]. Lecture Notes in Computer Science. Vol. 1608. pp. 28–115. doi:10.1007/10704973_2. ISBN 978-3-540-66241-9
Table (information) (1,463 words) [view diff] exact match in snippet view article
Applications of Natural Language to Information Systems (NLDB 2016). Lecture Notes in Computer Science. Vol. 9612. pp. 162–174. doi:10.1007/978-3-319-41754-7_14
Fisher kernel (834 words) [view diff] exact match in snippet view article find links to article
Petros; Paragios, Nikos (eds.). Computer Vision – ECCV 2010. Lecture Notes in Computer Science. Vol. 6314. Berlin, Heidelberg: Springer. pp. 143–156. doi:10
Dense subgraph (1,897 words) [view diff] exact match in snippet view article find links to article
Saarbrücken, Germany, September 5-8, 2000, Proceedings, Lecture Notes in Computer Science, vol. 1913, Springer, pp. 84–95, doi:10.1007/3-540-44436-X_10
Inductive programming (2,549 words) [view diff] exact match in snippet view article find links to article
Programming and Beyond; Essays in Honour of Robert A. Kowalski. Lecture Notes in Computer Science. Vol. LNAI 2407. pp. 310–346. doi:10.1007/3-540-45628-7_13
Lattice problem (3,660 words) [view diff] exact match in snippet view article find links to article
Extreme Pruning". Advances in Cryptology – EUROCRYPT 2010. Lecture Notes in Computer Science. Vol. 6110. Springer, Berlin, Heidelberg. pp. 257–278. doi:10
Semantic similarity (4,236 words) [view diff] exact match in snippet view article find links to article
International Conference on Geospatial Semantics (GEOS 2007). Lecture Notes in Computer Science. 2007. pp. 128–145. CiteSeerX 10.1.1.172.5544. "Geo-Net-PT
Server-based signatures (1,187 words) [view diff] exact match in snippet view article find links to article
Signatures". Advances in Cryptology – CRYPTO' 89 Proceedings. Lecture Notes in Computer Science. Vol. 435. p. 263. doi:10.1007/0-387-34805-0_24. ISBN 978-0-387-97317-3
Pseudotriangle (2,058 words) [view diff] exact match in snippet view article find links to article
of Software Technology and Theoretical Computer Science, Lecture Notes in Computer Science, vol. 3328, Springer-Verlag, pp. 299–310, arXiv:0705.3888
Information Processing in Medical Imaging (1,631 words) [view diff] exact match in snippet view article find links to article
Medical Imaging - 12th | Alan C.F. Colchester | Springer. Lecture Notes in Computer Science. Springer. 1991. ISBN 9783540542469. Barrett, Harrison H.
Apache Lucene (1,251 words) [view diff] exact match in snippet view article find links to article
Castells, Pablo (eds.), Advances in Information Retrieval, Lecture Notes in Computer Science, vol. 12036, Cham: Springer International Publishing, pp. 28–34
Feature engineering (2,192 words) [view diff] exact match in snippet view article find links to article
(PDF). Principles of Data Mining and Knowledge Discovery. Lecture Notes in Computer Science. Vol. 1704. pp. 378–383. doi:10.1007/978-3-540-48247-5_46
Ron Rivest (1,545 words) [view diff] exact match in snippet view article find links to article
Theory, Reykjavík, Iceland, July 3–5, 1996, Proceedings. Lecture Notes in Computer Science. Vol. 1097. Springer. pp. 368–379. doi:10.1007/3-540-61422-2_146
Contrail (software) (566 words) [view diff] exact match in snippet view article
Contrail". Euro-Par 2011: Parallel Processing Workshops. Lecture Notes in Computer Science. Vol. 7155. pp. 159–168. doi:10.1007/978-3-642-29737-3_19
Cooperating Validity Checker (1,994 words) [view diff] exact match in snippet view article find links to article
Kovács, Laura; Pattinson, Dirk (eds.). Automated Reasoning. Lecture Notes in Computer Science. Vol. 13385. Cham: Springer International Publishing. pp. 15–35
Özalp Babaoğlu (1,240 words) [view diff] exact match in snippet view article find links to article
Peer-to-Peer Applications", Engineering Self-Organising Systems, Lecture Notes in Computer Science, vol. 2977, Berlin, Heidelberg: Springer Berlin Heidelberg
School timetable (1,074 words) [view diff] exact match in snippet view article find links to article
Programming, Artificial Intelligence, and Operations Research. Lecture Notes in Computer Science. Vol. 12296. Springer International Publishing. pp. 283–299
Semantics (computer science) (1,671 words) [view diff] exact match in snippet view article
computation". Category Theory Applied to Computation and Control. Lecture Notes in Computer Science. Vol. 25. Springer. pp. 151–163. doi:10.1007/3-540-07142-3_75
Mutilated chessboard problem (2,878 words) [view diff] exact match in snippet view article find links to article
2010, Nha Trang, Vietnam, July 19–21, 2010, Proceedings, Lecture Notes in Computer Science, vol. 6196, Springer, pp. 288–297, arXiv:1103.3309, doi:10
Paulo S. L. M. Barreto (833 words) [view diff] exact match in snippet view article find links to article
Identity-Based Signatures and Signcryption from Bilinear Maps. Lecture Notes in Computer Science. Vol. 3788. pp. 515–532. doi:10.1007/11593447_28. ISBN 978-3-540-30684-9
Linguistic Linked Open Data (3,697 words) [view diff] exact match in snippet view article find links to article
Conference, Sydney, NSW, Australia, October 21–25, 2013. Lecture Notes in Computer Science. Vol. 7908. Berlin, Heidelberg: Springer. pp. 98–113. doi:10
TWINKLE (695 words) [view diff] exact match in snippet view article find links to article
Christof (eds.). Cryptographic Hardware and Embedded Systems. Lecture Notes in Computer Science. Vol. 1717. Berlin, Heidelberg: Springer. pp. 2–12. doi:10
Knowledge graph (2,519 words) [view diff] exact match in snippet view article find links to article
Integrated Knowledge Graph". The Semantic Web – ISWC 2020. Lecture Notes in Computer Science. Vol. 12507. pp. 430–446. doi:10.1007/978-3-030-62466-8_27
Random subspace method (969 words) [view diff] exact match in snippet view article find links to article
neighbors in random subspaces". Advances in Pattern Recognition. Lecture Notes in Computer Science. Vol. 1451. pp. 640–648. doi:10.1007/BFb0033288. ISBN 978-3-540-64858-1
Threshold cryptosystem (868 words) [view diff] exact match in snippet view article find links to article
Gilles (ed.). Advances in Cryptology — CRYPTO' 89 Proceedings. Lecture Notes in Computer Science. Vol. 435. New York, NY: Springer. pp. 307–315. doi:10.1007/0-387-34805-0_28
Proof of secure erasure (635 words) [view diff] exact match in snippet view article find links to article
Computable Self-erasing Functions". Theory of Cryptography. Lecture Notes in Computer Science. Vol. 6597. pp. 125–143. doi:10.1007/978-3-642-19571-6_9.
Patricia Bouyer-Decitre (470 words) [view diff] exact match in snippet view article find links to article
Software Technology and Theoretical Computer Science (PDF), Lecture Notes in Computer Science, vol. 3328, Springer, pp. 148–160, doi:10.1007/978-3-540-30538-5_13
IEC 62682 (382 words) [view diff] exact match in snippet view article find links to article
Management of Information. Information and Knowledge in Context. Lecture Notes in Computer Science. Vol. 9173. Cham: Springer International Publishing. pp. 549–556
DES-X (533 words) [view diff] exact match in snippet view article find links to article
Attacks". Advances in Cryptology — EUROCRYPT 2000 (PDF). Lecture Notes in Computer Science. Vol. 1807. pp. 589–606. doi:10.1007/3-540-45539-6_41.
Set packing (1,514 words) [view diff] exact match in snippet view article find links to article
International Colloquium on Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 1443. Springer-Verlag. pp. 176–185. Halldórsson, Magnus
SMP (computer algebra system) (593 words) [view diff] exact match in snippet view article
Jenks, "A Primer: 11 Keys to New Scratchpad", EUROSAM 84, Lecture Notes in Computer Science 174 ISBN 354013350X p. 123-142 J.H. Davenport, Y. Siret, E
Global Digital Mathematics Library (274 words) [view diff] exact match in snippet view article find links to article
CICM 2017, Edinburgh, UK, July 17-21, 2017, Proceedings, Lecture Notes in Computer Science, vol. 10383, Springer, pp. 56–69, doi:10.1007/978-3-319-62075-6_5
Osman Yaşar (445 words) [view diff] exact match in snippet view article find links to article
Workforce and Pedagogy to Improve Math and Science Education,” Lecture Notes in Computer Science, Vol. 3992 (2006), pp. 169–176. O. Yaşar, J. Maliekal, L.
UpStage (1,499 words) [view diff] exact match in snippet view article find links to article
Paolo; Urban, Bodo (eds.). Transactions on Edutainment X. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. pp. 146–160. doi:10.1007/978-3-642-37919-2_8
Heavy-light decomposition (1,017 words) [view diff] exact match in snippet view article find links to article
trees", Algorithms and data structures (Ottawa, ON, 1991), Lecture Notes in Computer Science, vol. 519, Berlin: Springer, pp. 32–40, doi:10.1007/BFb0028247
Security level (1,332 words) [view diff] exact match in snippet view article find links to article
precomputation" (PDF). Advances in Cryptology - ASIACRYPT 2013. Lecture Notes in Computer Science. pp. 321–340. doi:10.1007/978-3-642-42045-0_17. ISBN 978-3-642-42044-3
PRESENT (708 words) [view diff] exact match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems - CHES 2007. Lecture Notes in Computer Science. Vol. 4727. pp. 450–466. doi:10.1007/978-3-540-74735-2_31
Philippe Baptiste (4,439 words) [view diff] exact match in snippet view article find links to article
Principles and Practice of Constraint Programming – CP 2009, Lecture Notes in Computer Science, vol. 5732, Berlin, Heidelberg: Springer Berlin Heidelberg
Piling-up lemma (1,445 words) [view diff] exact match in snippet view article find links to article
for DES Cipher". Advances in Cryptology – EUROCRYPT '93. Lecture Notes in Computer Science. Vol. 765. pp. 386–397. doi:10.1007/3-540-48285-7_33. ISBN 978-3-540-57600-6
Searchable symmetric encryption (2,441 words) [view diff] exact match in snippet view article find links to article
Moti (eds.). Applied Cryptography and Network Security. Lecture Notes in Computer Science. Vol. 3531. Berlin, Heidelberg: Springer. pp. 442–455. doi:10
Congestion game (7,355 words) [view diff] exact match in snippet view article find links to article
Kontogiannis, Spyros (eds.). Internet and Network Economics. Lecture Notes in Computer Science. Vol. 4286. Berlin, Heidelberg: Springer. pp. 87–98. doi:10
Urban informatics (3,295 words) [view diff] exact match in snippet view article find links to article
Cities Technologies, Experiences, and Future Perspectives. Lecture Notes in Computer Science. Vol. 1765. Berlin: Springer. doi:10.1007/3-540-46422-0.
McEliece cryptosystem (2,093 words) [view diff] exact match in snippet view article find links to article
Fourier sampling attacks. Advances in cryptology—CRYPTO 2011. Lecture Notes in Computer Science. Vol. 6841. Heidelberg: Springer. pp. 761–779. doi:10
Anomaly detection (4,426 words) [view diff] exact match in snippet view article find links to article
Spaces. Principles of Data Mining and Knowledge Discovery. Lecture Notes in Computer Science. Vol. 2431. p. 15. doi:10.1007/3-540-45681-3_2. ISBN 978-3-540-44037-6
Perfect matching (951 words) [view diff] exact match in snippet view article find links to article
Wegener, Ingo (eds.). Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 4051. Berlin, Heidelberg: Springer. pp. 453–464. doi:10
Markovian arrival process (1,008 words) [view diff] exact match in snippet view article find links to article
Performance Evaluation of Computer and Communication Systems. Lecture Notes in Computer Science. Vol. 729. pp. 330–358. doi:10.1007/BFb0013859. ISBN 3-540-57297-X
ESC/Java (928 words) [view diff] exact match in snippet view article find links to article
2001: Formal Methods for Increasing Software Productivity. Lecture Notes in Computer Science. Vol. 2021. pp. 500–517. doi:10.1007/3-540-45251-6_29. ISBN 3-540-41791-5
Ball tree (1,414 words) [view diff] exact match in snippet view article find links to article
Similar Patches in Images?". Computer Vision – ECCV 2008 (PDF). Lecture Notes in Computer Science. Vol. 5303. p. 364. CiteSeerX 10.1.1.360.7582. doi:10
Software diversity (818 words) [view diff] exact match in snippet view article find links to article
(2011), "Diversity", Dependable and Historic Computing, Lecture Notes in Computer Science, vol. 6875, Springer Berlin Heidelberg, pp. 298–312, doi:10
Envy-free pricing (2,559 words) [view diff] exact match in snippet view article find links to article
Walukiewicz, Igor (eds.). Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 5125. Springer Berlin Heidelberg. pp. 808–819. CiteSeerX 10
Deepak Kapur (1,936 words) [view diff] exact match in snippet view article find links to article
specifications". 9th International Conference on Automated Deduction. Lecture Notes in Computer Science. Vol. 310. Springer, Berlin, Heidelberg. pp. 162–181. doi:10
Prolog (8,096 words) [view diff] exact match in snippet view article find links to article
Programming". Constructing Logic Programs, (Ed. J.M.J. Jacquet). Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence: 27–140. CiteSeerX 10
Markus Jakobsson (1,247 words) [view diff] exact match in snippet view article find links to article
Trustworthy Elections: New Directions in Electronic Voting (Lecture Notes in Computer Science / Security and Cryptology), David Chaum, Markus Jakobsson
Markus Jakobsson (1,247 words) [view diff] exact match in snippet view article find links to article
Trustworthy Elections: New Directions in Electronic Voting (Lecture Notes in Computer Science / Security and Cryptology), David Chaum, Markus Jakobsson
Ring signature (1,950 words) [view diff] exact match in snippet view article find links to article
Leak a Secret". Advances in Cryptology — ASIACRYPT 2001. Lecture Notes in Computer Science. Vol. 2248. pp. 552–565. doi:10.1007/3-540-45682-1_32.
State complexity (3,375 words) [view diff] exact match in snippet view article find links to article
Automata". Mathematical Foundations of Computer Science 2005. Lecture Notes in Computer Science. Vol. 3618. pp. 544–555. doi:10.1007/11549345_47. ISBN 978-3-540-28702-5
RC2 (423 words) [view diff] exact match in snippet view article find links to article
Qing, S. (eds.). Information and Communications Security. Lecture Notes in Computer Science. Vol. 1334. Springer, Berlin, Heidelberg. pp. 233–246. doi:10
Uniform-machines scheduling (1,767 words) [view diff] exact match in snippet view article find links to article
Machines". In Diekert, Volker; Habib, Michel (eds.). Stacs 2004. Lecture Notes in Computer Science. Vol. 2996. Berlin, Heidelberg: Springer. pp. 608–619. doi:10
Achterbahn (stream cipher) (532 words) [view diff] exact match in snippet view article
Encryption, 14th International Workshop. Revised Selected Papers, Lecture Notes in Computer Science. Vol. 4593. Luxembourg: Springer. pp. 73–86. ISBN 978-3-540-74617-1
Mizar system (1,225 words) [view diff] exact match in snippet view article find links to article
TPHOLs 2009, Munich, Germany, August 17–20, 2009. Proceedings. Lecture Notes in Computer Science. Vol. 5674. Springer. pp. 67–72. doi:10.1007/978-3-642-03359-9_5
Product-form solution (1,817 words) [view diff] exact match in snippet view article find links to article
and Product Form". Applications and Theory of Petri Nets. Lecture Notes in Computer Science. Vol. 5606. p. 103. CiteSeerX 10.1.1.745.1585. doi:10
Logic for Computable Functions (614 words) [view diff] exact match in snippet view article find links to article
(1979). Edinburgh LCF: A Mechanised Logic of Computation. Lecture Notes in Computer Science. Vol. 78. Berlin Heidelberg: Springer. doi:10.1007/3-540-09724-4
Aircrack-ng (4,946 words) [view diff] exact match in snippet view article find links to article
Attack on TKIP", Identity and Privacy in the Internet Age, Lecture Notes in Computer Science, vol. 5838, Berlin, Heidelberg: Springer Berlin Heidelberg
Schnorr signature (1,248 words) [view diff] exact match in snippet view article find links to article
Application of Cryptographic Techniques. Proceedings of CRYPTO '86. Lecture Notes in Computer Science. Vol. 263. pp. 186–194. doi:10.1007/3-540-47721-7_12. ISBN 978-3-540-18047-0
Barrier resilience (1,083 words) [view diff] exact match in snippet view article find links to article
Rhodes, Greece, July 10-11, 2009, Revised Selected Papers, Lecture Notes in Computer Science, vol. 5804, Springer, pp. 29–40, Bibcode:2009LNCS.5304...29B
Device fingerprint (3,848 words) [view diff] exact match in snippet view article find links to article
Atallah MJ, Hopper NJ (eds.). Privacy Enhancing Technologies. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 1–18. ISBN 978-3-642-14527-8
Matrix analytic method (912 words) [view diff] exact match in snippet view article find links to article
Performance Evaluation of Complex Systems: Techniques and Tools. Lecture Notes in Computer Science. Vol. 2459. pp. 36. doi:10.1007/3-540-45798-4_3. ISBN 978-3-540-44252-3
Inheritance (object-oriented programming) (3,857 words) [view diff] exact match in snippet view article
European Conference on Object-Oriented Programming (ECOOP). Lecture Notes in Computer Science. Vol. 1445. Springer. pp. 355–382. doi:10.1007/BFb0054099
Poly1305 (2,537 words) [view diff] exact match in snippet view article find links to article
Software Encryption: 12th international workshop. FSE 2005. Lecture Notes in Computer Science. Paris, France: Springer. doi:10.1007/11502760_3. ISBN 3-540-26541-4
NP-intermediate (1,547 words) [view diff] exact match in snippet view article find links to article
JELIA 2002, Cosenza, Italy, September, 23-26, Proceedings. Lecture Notes in Computer Science. Vol. 2424. Springer. pp. 549–564. doi:10.1007/3-540-45757-7_53
Shape analysis (program analysis) (1,034 words) [view diff] exact match in snippet view article
Analysis for Recursive Programs" (PDF). Compiler Construction. Lecture Notes in Computer Science. Vol. 2027. pp. 133–149. doi:10.1007/3-540-45306-7_10.
HipNav (172 words) [view diff] exact match in snippet view article find links to article
Computing and Computer-Assisted Intervention – MICCAI 2000. Lecture Notes in Computer Science. Vol. 1935. pp. 1185–7. doi:10.1007/978-3-540-40899-4_126
Belief–desire–intention software model (2,132 words) [view diff] exact match in snippet view article find links to article
Knowledge-Based Intelligent Information and Engineering Systems. Lecture Notes in Computer Science. Vol. 3683. pp. 282–288. doi:10.1007/11553939_41. ISBN 978-3-540-28896-1
Klaus Pohl (computer scientist) (725 words) [view diff] exact match in snippet view article
1st European Conference ServiceWave 2008, Volume 5377 of Lecture Notes in Computer Science, Berlin, Heidelberg, Springer, 2008. Klaus Pohl, Patrick Heymans
IEEE 802.15.6 (506 words) [view diff] exact match in snippet view article find links to article
15.6 Standard". Financial Cryptography and Data Security. Lecture Notes in Computer Science. Vol. 8976. pp. 245–260. arXiv:1501.02601. doi:10.1007/978-3-662-48051-9_18
Zooko Wilcox-O'Hearn (682 words) [view diff] exact match in snippet view article find links to article
as MD5" (PDF). Applied Cryptography and Network Security. Lecture Notes in Computer Science. Vol. 7954. IACR. pp. 119–135. doi:10.1007/978-3-642-38980-1_8
Monadic second-order logic (1,308 words) [view diff] exact match in snippet view article find links to article
Are Computable with Linear Delay". Computer Science Logic. Lecture Notes in Computer Science. 4207. Springer Berlin Heidelberg: 167–181. doi:10.1007/11874683_11
Elliptic curve point multiplication (4,139 words) [view diff] exact match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems – CHES 2014. Lecture Notes in Computer Science. Vol. 8731. Springer. pp. 72–95. doi:10.1007/978-3-662-44709-3_5
Jutta Treviranus (5,359 words) [view diff] exact match in snippet view article find links to article
Interaction. Design and Development Methods for Universal Access. Lecture Notes in Computer Science. Vol. 8513. Springer International Publishing. pp. 191–202
International Conference on Computational Intelligence Methods for Bioinformatics and Biostatistics (856 words) [view diff] exact match in snippet view article find links to article
Intelligence Methods for Bioinformatics and Biostatistics. Lecture Notes in Computer Science. Vol. 7548. Springer. pp. 238–252. doi:10.1007/978-3-642-35686-5_20
Courcelle's theorem (3,146 words) [view diff] exact match in snippet view article find links to article
(eds.), Proc. 18th Annual European Symposium on Algorithms, Lecture Notes in Computer Science, vol. 6346, Springer, pp. 549–560, doi:10.1007/978-3-642-15775-2_47
Artificial psychology (710 words) [view diff] exact match in snippet view article find links to article
Psychology". In Smith, Michael J.; Salvendy, Gavriel (eds.). Lecture Notes in Computer Science. Vol. 4557. Springer Berlin Heidelberg. pp. 208–217. doi:10
Curve25519 (1,818 words) [view diff] exact match in snippet view article find links to article
Public Key Cryptography - PKC 2006. Public Key Cryptography. Lecture Notes in Computer Science. Vol. 3958. New York: Springer. pp. 207–228. doi:10.1007/11745853_14
Romeo Model Checker (159 words) [view diff] exact match in snippet view article find links to article
Conference on Computer Aided Verification (CAV'05), volume 3576 of Lecture Notes in Computer Science, pages 418-423, Edinburgh, Scotland, UK, July 2005. Springer
ETAPS International Joint Conferences on Theory and Practice of Software (767 words) [view diff] exact match in snippet view article find links to article
Robinet, Bernard; Wilhelm, Reinhard, eds. (1986). Esop 86. Lecture Notes in Computer Science. Vol. 213. doi:10.1007/3-540-16442-1. ISBN 978-3-540-16442-5
Feedback vertex set (1,805 words) [view diff] exact match in snippet view article find links to article
Number". In Kaplan, Haim (ed.). Algorithm Theory - SWAT 2010. Lecture Notes in Computer Science. Vol. 6139. Berlin, Heidelberg: Springer. pp. 81–92. Bibcode:2010LNCS
List of NP-complete problems (2,676 words) [view diff] exact match in snippet view article find links to article
complexity of upward and rectilinear planarity testing". Lecture Notes in Computer Science. Vol. 894/1995. pp. 286–297. doi:10.1007/3-540-58950-3_384
Folksonomy (3,215 words) [view diff] exact match in snippet view article find links to article
R; Ausloos, M. (2005). Computational Science – ICCS 2006. Lecture Notes in Computer Science. Vol. 3993. pp. 1114–1117. arXiv:cs.DS/0512090. doi:10.1007/11758532_152
Norman Paton (1,101 words) [view diff] exact match in snippet view article find links to article
Model database". Advances in Database Technology—EDBT '88. Lecture Notes in Computer Science. Vol. 303. p. 34. doi:10.1007/3-540-19074-0_46. ISBN 978-3-540-19074-5
Area (graph drawing) (937 words) [view diff] exact match in snippet view article
2002, Irvine, CA, USA, August 26–28, 2002, Revised Papers, Lecture Notes in Computer Science, vol. 2528, Springer, pp. 54–65, doi:10.1007/3-540-36151-0_6
GroupLens Research (3,183 words) [view diff] exact match in snippet view article find links to article
Development. Asia-Pacific Conference on Web Intelligence. Lecture Notes in Computer Science. Vol. 2198/2001. Springer Berlin/Heidelberg. pp. 438–442.
RSA cryptosystem (8,479 words) [view diff] exact match in snippet view article find links to article
with RSA and Rabin. Advances in Cryptology—EUROCRYPT ’96. Lecture Notes in Computer Science. Springer. pp. 399–416. doi:10.1007/3-540-68339-9_34. ISBN 978-3-540-61186-8
Genetic programming (3,543 words) [view diff] exact match in snippet view article find links to article
Discovery". Parallel Problem Solving from Nature PPSN VI. Lecture Notes in Computer Science. Vol. 1917. Springer. pp. 211–220. doi:10.1007/3-540-45356-3_21
Uplift modelling (2,172 words) [view diff] exact match in snippet view article find links to article
Uplift Modeling". Advanced Information Systems Engineering. Lecture Notes in Computer Science. Vol. 8190. Prague. pp. 595–611. doi:10.1007/978-3-642-40994-3_38
Distributed key generation (1,191 words) [view diff] exact match in snippet view article find links to article
Identity-Based Cryptography". Security and Cryptography for Networks. Lecture Notes in Computer Science. Vol. 6280. pp. 436–453. CiteSeerX 10.1.1.389.4486. doi:10
Neighbor joining (2,889 words) [view diff] exact match in snippet view article find links to article
reconstruction", pp. 101–110. In Jiang, T., and Lee, D., eds., Lecture Notes in Computer Science, 1276, Springer-Verlag, Berlin. COCOON '97. Mihaescu R, Levy
Evolvable hardware (799 words) [view diff] exact match in snippet view article find links to article
with physics". Evolvable Systems: From Biology to Hardware. Lecture Notes in Computer Science. Vol. 1259. pp. 390–405. CiteSeerX 10.1.1.50.9691. doi:10
Deterministic finite automaton (3,736 words) [view diff] exact match in snippet view article find links to article
Theoretical Results and Applications. ICGI 2010. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Vol. 6339. pp. 66–79. doi:10.1007/978-3-642-15488-1_7
Mathias Payer (1,590 words) [view diff] exact match in snippet view article find links to article
of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science. Vol. 9148. pp. 144–164. doi:10.1007/978-3-319-20550-2_8.
C Bounded Model Checker (740 words) [view diff] exact match in snippet view article find links to article
Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. pp. 168–176. doi:10.1007/978-3-540-24730-2_15
Data augmentation (1,838 words) [view diff] exact match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems – CHES 2017. Lecture Notes in Computer Science. Vol. 10529. Cham: Springer International Publishing. pp. 45–68
Unicheck (760 words) [view diff] exact match in snippet view article find links to article
System". Natural Language Processing and Information Systems. Lecture Notes in Computer Science. Vol. 10260. Springer, Cham. pp. 227–231. doi:10.1007/978-3-319-59569-6_27
Infer Static Analyzer (780 words) [view diff] exact match in snippet view article find links to article
Verifier for Memory Safety of C Programs". NASA Formal Methods. Lecture Notes in Computer Science. Vol. 6617. Springer, Berlin, Heidelberg. pp. 459–465. CiteSeerX 10
Budget-feasible mechanism (252 words) [view diff] exact match in snippet view article find links to article
Viola, Alfredo (eds.). LATIN 2014: Theoretical Informatics. Lecture Notes in Computer Science. Vol. 8392. Berlin, Heidelberg: Springer. pp. 719–730. arXiv:1302
Group-based cryptography (355 words) [view diff] exact match in snippet view article find links to article
on the Word Problem". Advances in Cryptology—CRYPTO 1984. Lecture Notes in Computer Science. Vol. 196. Springer. pp. 19–36. doi:10.1007/3-540-39568-7_3
Binary decision diagram (3,109 words) [view diff] exact match in snippet view article find links to article
Conference on Principles and Practice of Constraint Programming. Lecture Notes in Computer Science. Vol. 3258. Springer. p. 816. doi:10.1007/978-3-540-30201-8_94
Doll fetishism (220 words) [view diff] exact match in snippet view article find links to article
Li, Dongyu; Perez-Osorio, Jairo (eds.). Social Robotics. Lecture Notes in Computer Science. Vol. 13086. Cham: Springer International Publishing. pp. 130–141
Böhm tree (1,874 words) [view diff] exact match in snippet view article find links to article
labelled λ-calculus". λ-Calculus and Computer Science Theory. Lecture Notes in Computer Science. Vol. 37. pp. 147–165. doi:10.1007/BFb0029523. ISBN 3-540-07416-3
Constrained Horn clauses (611 words) [view diff] exact match in snippet view article find links to article
Constantin; Lal, Akash (eds.). Computer Aided Verification. Lecture Notes in Computer Science. Cham: Springer Nature Switzerland. pp. 209–223. doi:10
Abstract interpretation (2,924 words) [view diff] exact match in snippet view article find links to article
Programming Language Implementation and Logic Programming (PLILP). Lecture Notes in Computer Science. Vol. 631. Springer. pp. 269–296. ISBN 978-0-387-55844-8.
MilkyWay@home (2,639 words) [view diff] exact match in snippet view article find links to article
Grids". Distributed Applications and Interoperable Systems. Lecture Notes in Computer Science. Vol. 6115. pp. 29–41. doi:10.1007/978-3-642-13645-0_3.
BLAST model checker (386 words) [view diff] exact match in snippet view article find links to article
Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science. Vol. 7214. Springer-Verlag. pp. 525–527. ISBN 978-3-642-28756-5
Arc diagram (2,597 words) [view diff] exact match in snippet view article find links to article
WA, USA, September 19–21, 2012, Revised Selected Papers, Lecture Notes in Computer Science, vol. 7704, Springer, pp. 150–161, doi:10.1007/978-3-642-36763-2_14
Optical braille recognition (716 words) [view diff] exact match in snippet view article find links to article
Robust Braille Recognition System". Document Analysis Systems. Lecture Notes in Computer Science. Vol. VI. pp. 533–545. doi:10.1007/978-3-540-28640-0_50.
Data-flow analysis (3,562 words) [view diff] exact match in snippet view article find links to article
SAS'99, Venice, Italy, September 22–24, 1999, Proceedings. Lecture Notes in Computer Science. Vol. 1694 (illustrated ed.). Springer. pp. 232–247 [233]
Jayadev Misra (1,066 words) [view diff] exact match in snippet view article find links to article
Course. A Decade of Concurrency Reflections and Perspectives. Lecture Notes in Computer Science (LNCS). Vol. 803. Springer, Berlin, Heidelberg. p. 352. doi:10
Jon Lee (mathematician) (413 words) [view diff] exact match in snippet view article
2012), Integer Programming and Combinatorial Optimization (Lecture Notes in Computer Science, Vol. 8494; Springer, 2014), Special Issue: Integer Programming
SHA-2 (4,982 words) [view diff] exact match in snippet view article find links to article
(2008), New collision attacks against up to 24-step SHA-2, Lecture Notes in Computer Science, vol. 5365, Springer-Verlag, pp. 91–103, doi:10.1007/978-3-540-89754-5_8
Rational monoid (633 words) [view diff] exact match in snippet view article find links to article
to Symeon Bozapalidis on the occasion of his retirement. Lecture Notes in Computer Science. Vol. 7020. Berlin: Springer-Verlag. pp. 228–256. ISBN 978-3-642-24896-2
TLA+ (4,068 words) [view diff] exact match in snippet view article find links to article
Correct Hardware Design and Verification Methods (PDF). Lecture Notes in Computer Science. Vol. 1703. Springer-Verlag. pp. 54–66. doi:10.1007/3-540-48153-2_6
Dorothea Wagner (637 words) [view diff] exact match in snippet view article find links to article
Dorothea, eds. (2001), Drawing Graphs: Methods and Models, Lecture Notes in Computer Science, vol. 2025, Springer, doi:10.1007/3-540-44969-8, ISBN 9783540420620
Spaghetti code (1,611 words) [view diff] exact match in snippet view article find links to article
proper exception handling". Lecture Notes in Computer Science. Ada – Europe '93 (Proceedings). Lecture Notes in Computer Science. Vol. 688. Springer Berlin
Gad Landau (1,254 words) [view diff] exact match in snippet view article find links to article
on Trees and Tree-Like Structures". Algorithms – ESA 2013. Lecture Notes in Computer Science. Vol. 8125. pp. 517–528. arXiv:1301.6127. doi:10.1007/978-3-642-40450-4_44
Asiddhatva (1,594 words) [view diff] exact match in snippet view article find links to article
Model of Aṣṭādhyāyī". Sanskrit Computational Linguistics. Lecture Notes in Computer Science. Vol. 6465. p. 1. doi:10.1007/978-3-642-17528-2_18. ISBN 978-3-642-17527-5
Interactive computation (195 words) [view diff] exact match in snippet view article find links to article
Persistent Turing Machines as a model of interactive computation. Lecture Notes in Computer Science 1762, pp. 116-135. D. Goldin, S. Smolka, P. Attie, E. Sonderegger
Language-oriented programming (485 words) [view diff] exact match in snippet view article find links to article
in Language Workbenches". Software Language Engineering. Lecture Notes in Computer Science. Vol. 8225. pp. 197–217. doi:10.1007/978-3-319-02654-1_11
Microsoft SEAL (515 words) [view diff] exact match in snippet view article find links to article
Thomas (eds.). Advances in Cryptology – ASIACRYPT 2017. Lecture Notes in Computer Science. Vol. 10624. Cham: Springer International Publishing. pp. 409–437
SMASH (hash) (314 words) [view diff] exact match in snippet view article
Design Strategy Called SMASH". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 3897. pp. 233–244. doi:10.1007/11693383_16. ISBN 978-3-540-33108-7
Property Specification Language (1,412 words) [view diff] exact match in snippet view article find links to article
Logic on Truncated Paths" (PDF). Computer Aided Verification. Lecture Notes in Computer Science. Vol. 2725. p. 27. doi:10.1007/978-3-540-45069-6_3. ISBN 978-3-540-40524-5
Quotient type (648 words) [view diff] exact match in snippet view article find links to article
Clarke, Edmund; Kozen, Dexter (eds.). Logics of Programs. Lecture Notes in Computer Science. Vol. 164. Berlin, Heidelberg: Springer. pp. 116–128. doi:10
Separation logic (3,641 words) [view diff] exact match in snippet view article find links to article
Verification, Model Checking, and Abstract Interpretation (PDF). Lecture Notes in Computer Science. Vol. 5403. pp. 266–277. doi:10.1007/978-3-540-93900-9_3.
Property Specification Language (1,412 words) [view diff] exact match in snippet view article find links to article
Logic on Truncated Paths" (PDF). Computer Aided Verification. Lecture Notes in Computer Science. Vol. 2725. p. 27. doi:10.1007/978-3-540-45069-6_3. ISBN 978-3-540-40524-5
Graph reduction machine (324 words) [view diff] exact match in snippet view article find links to article
Functional Programming Languages and Computer Architecture. Lecture Notes in Computer Science. Vol. 274. Berlin, Heidelberg: Springer. pp. 98–112. doi:10
Simultaneous embedding (1,651 words) [view diff] exact match in snippet view article find links to article
Sydney, Australia, September 24–26, 2007, Revised Papers, Lecture Notes in Computer Science, vol. 4875, Berlin: Springer, pp. 280–290, doi:10.1007/978-3-540-77537-9_28
Specification and Description Language (1,106 words) [view diff] exact match in snippet view article find links to article
Diagrams". SDL 2013: Model-Driven Dependability Engineering. Lecture Notes in Computer Science. Vol. 7916. Springer Berlin Heidelberg. pp. 258–274. doi:10
All-or-nothing transform (627 words) [view diff] exact match in snippet view article find links to article
All-or-Nothing Transform". Advances in Cryptology — CRYPTO' 99. Lecture Notes in Computer Science. Vol. 1666. pp. 503–518. doi:10.1007/3-540-48405-1_32.
SLAM project (241 words) [view diff] exact match in snippet view article find links to article
Verifier: Technology Transfer of Formal Methods inside Microsoft; Lecture Notes in Computer Science (LNCS), Vol. 2999: Boiten, Eerke A.; Derrick, John; and Smith
Undeniable signature (912 words) [view diff] exact match in snippet view article find links to article
Signatures". Advances in Cryptology — CRYPTO' 89 Proceedings. Lecture Notes in Computer Science. Vol. 435. pp. 212–216. doi:10.1007/0-387-34805-0_20. ISBN 978-0-387-97317-3
Rijnland Internet Election System (333 words) [view diff] exact match in snippet view article find links to article
Abolishment". Foundations of Security Analysis and Design V. Lecture Notes in Computer Science. Vol. 5705. p. 121. doi:10.1007/978-3-642-03829-7_4. ISBN 978-3-642-03828-0
Keystroke-level model (2,803 words) [view diff] exact match in snippet view article find links to article
Jacko, Julie A (ed.). Human-Computer Interaction. New Trends. Lecture Notes in Computer Science. Vol. 5610. Berlin Heidelberg: Springer-Verlag. p. 355. doi:10
350 nm process (208 words) [view diff] exact match in snippet view article find links to article
". Constructive Side-Channel Analysis and Secure Design. Lecture Notes in Computer Science. Vol. 10348. pp. 207–222. doi:10.1007/978-3-319-64647-3_13
Dynamic convex hull (769 words) [view diff] exact match in snippet view article find links to article
upper envelopes", Algorithms and Data Structures (WADS 2005), Lecture Notes in Computer Science, vol. 3608, Berlin: Springer, pp. 269–281, doi:10.1007/11534273_24
Prêt à Voter (1,192 words) [view diff] exact match in snippet view article find links to article
Election Scheme", Computer Security – ESORICS 2005 (PDF), Lecture Notes in Computer Science, vol. 3679, pp. 118–139, doi:10.1007/11555827_8, ISBN 978-3-540-28963-0
Arthur Zimek (572 words) [view diff] exact match in snippet view article find links to article
Dimensionality?". Scientific and Statistical Database Management. Lecture Notes in Computer Science. Vol. 6187. Springer, Berlin, Heidelberg. pp. 482–500. CiteSeerX 10
Long short-term memory (5,822 words) [view diff] exact match in snippet view article find links to article
Structure of the Blues". Artificial Neural Networks — ICANN 2002. Lecture Notes in Computer Science. Vol. 2415. Springer, Berlin, Heidelberg. pp. 284–289. CiteSeerX 10
Infinite chess (805 words) [view diff] exact match in snippet view article find links to article
of Infinite Chess is Decidable". How the World Computes. Lecture Notes in Computer Science. Vol. 7318. Springer. pp. 78–88. arXiv:1201.5597. doi:10
Minimum-weight triangulation (3,289 words) [view diff] exact match in snippet view article find links to article
"A study of the LMT-skeleton", Algorithms and Computation, Lecture Notes in Computer Science, vol. 1178, pp. 256–265, doi:10.1007/BFb0009502, ISBN 978-3-540-62048-8
Evolutionary multimodal optimization (1,292 words) [view diff] exact match in snippet view article find links to article
Approach to Multimodal Optimization: Self-adaptive Approach " (Lecture Notes in Computer Science, 2010, Volume 6457/2010, 95–104) C. Stoean, M. Preuss, R.
Cryptographic nonce (881 words) [view diff] exact match in snippet view article find links to article
Bimal Roy; Willi Meier (eds.). Fast Software Encryption. Lecture Notes in Computer Science. Vol. 3017. pp. 348–358. doi:10.1007/978-3-540-25937-4_22
Spoofing attack (2,672 words) [view diff] exact match in snippet view article find links to article
Computer Security, Copenhagen, Denmark, September 26–30, 2022. Lecture Notes in Computer Science. Vol. 13556. pp. 535–553. doi:10.1007/978-3-031-17143-7_26
Table of metaheuristics (3,878 words) [view diff] exact match in snippet view article find links to article
Hailin (eds.). Computational Intelligence and Security. Lecture Notes in Computer Science. Vol. 4456. Berlin, Heidelberg: Springer. pp. 167–176. doi:10
Skew-symmetric graph (2,318 words) [view diff] exact match in snippet view article find links to article
and structure", Computer Science – Theory and Applications, Lecture Notes in Computer Science, vol. 3967, Springer-Verlag, pp. 23–34, arXiv:math/0607547
List of PSPACE-complete problems (1,807 words) [view diff] exact match in snippet view article find links to article
is PSPACE-Complete". Automata, Languages, and Programming. Lecture Notes in Computer Science. Vol. 7965. pp. 497–503. arXiv:1209.1750. doi:10.1007/978-3-642-39206-1_42
Evolution strategy (2,053 words) [view diff] exact match in snippet view article find links to article
information". Parallel Problem Solving from Nature — PPSN III. Lecture Notes in Computer Science. Vol. 866. Springer. pp. 189–198. doi:10.1007/3-540-58484-6_263
Stathis Zachos (601 words) [view diff] exact match in snippet view article find links to article
of Software Technology and Theoretical Computer Science. Lecture Notes in Computer Science. Vol. 287. pp. 443–455. doi:10.1007/3-540-18625-5_67. ISBN 978-3-540-18625-0
Stephen Muggleton (783 words) [view diff] exact match in snippet view article find links to article
"Learning from positive data". Inductive Logic Programming. Lecture Notes in Computer Science. Vol. 1314. pp. 358–376. doi:10.1007/3-540-63494-0_65.
Computer security compromised by hardware failure (5,114 words) [view diff] exact match in snippet view article find links to article
Countermeasures: The Case of AES". Topics in Cryptology – CT-RSA 2006. Lecture Notes in Computer Science. Vol. 3860. San Jose, California, USA: Springer-Verlag Berlin
Average-case complexity (3,057 words) [view diff] exact match in snippet view article find links to article
Miscellanea on the Interplay between Randomness and Computation, Lecture Notes in Computer Science, vol. 6650, Berlin, Heidelberg: Springer Berlin Heidelberg
Collaborative search engine (2,067 words) [view diff] exact match in snippet view article find links to article
Transactions on Computational Collective Intelligence II. Lecture Notes in Computer Science. Vol. 2. pp. 46–69. Bibcode:2010LNCS.6450...46L. doi:10
F-FCSR (121 words) [view diff] exact match in snippet view article find links to article
stream cipher in Real Time" (PDF). In Pieprzyk, Josef (ed.). Lecture Notes in Computer Science. ASIACRYPT 2008. Vol. 5350. Springer Berlin / Heidelberg.
Cryptosystem (497 words) [view diff] exact match in snippet view article find links to article
Steinfeld, Ron (eds.). Information Security and Privacy. Lecture Notes in Computer Science. Vol. 9723. Cham: Springer International Publishing. pp. 73–86
NorduGrid (942 words) [view diff] exact match in snippet view article find links to article
NorduGrid ARC Middleware". Advances in Grid Computing - EGC 2005. Lecture Notes in Computer Science. Vol. 3470. Berlin/Heidelberg: Springer. pp. 861–871. doi:10
Thousands of Problems for Theorem Provers (250 words) [view diff] exact match in snippet view article find links to article
Theorem Proving". KI 2009: Advances in Artificial Intelligence. Lecture Notes in Computer Science. Vol. 5803. pp. 435–443. CiteSeerX 10.1.1.329.1809. doi:10
LCP array (4,379 words) [view diff] exact match in snippet view article find links to article
12th Annual Symposium on Combinatorial Pattern Matching. Lecture Notes in Computer Science. Vol. 2089. pp. 181–192. doi:10.1007/3-540-48194-X_17.
RACE (Europe) (147 words) [view diff] exact match in snippet view article
Cryptology – EUROCRYPT '91. EUROCRYPT 1991. Lecture Notes in Computer Science, vol 547. Lecture Notes in Computer Science. Vol. 547. Springer. pp. 547–551. doi:10
Cipher security summary (801 words) [view diff] exact match in snippet view article find links to article
"Attacking Triple Encryption". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 1372. Springer. pp. 239–253. doi:10.1007/3-540-69710-1_16
Automotive security (2,101 words) [view diff] exact match in snippet view article find links to article
of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science. Vol. 10327. Springer International Publishing. pp. 185–206
Babel program (391 words) [view diff] exact match in snippet view article find links to article
Potapova R., Mporas I. (eds) Speech and Computer. SPECOM 2017. Lecture Notes in Computer Science, vol 10458. Springer, Cham. https://doi.org/10.1007/978-3-319-66429-3_1
Leontief utilities (815 words) [view diff] exact match in snippet view article find links to article
of Leontief Market Equilibria". Frontiers in Algorithmics. Lecture Notes in Computer Science. Vol. 4613. p. 96. doi:10.1007/978-3-540-73814-5_9. ISBN 978-3-540-73813-8
Garbled circuit (2,979 words) [view diff] exact match in snippet view article find links to article
Gates and Applications". Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 5126. pp. 486–498. CiteSeerX 10.1.1.160.5268. doi:10
Kai Salomaa (370 words) [view diff] exact match in snippet view article find links to article
transformation for finite languages". Automata Implementation. Lecture Notes in Computer Science. Vol. 1260. pp. 149–158. doi:10.1007/3-540-63174-7_12.
Wikiquote (756 words) [view diff] exact match in snippet view article find links to article
International Workshop on Fuzzy Logic and Applications. Lecture Notes in Computer Science. doi:10.1007/978-3-540-73400-0_58. ISBN 978-3-540-73399-7
Noisy-storage model (2,899 words) [view diff] exact match in snippet view article find links to article
memory-bounded adversaries". Advances in Cryptology — CRYPTO '97. Lecture Notes in Computer Science. Vol. 1294. pp. 292–306. doi:10.1007/BFb0052243. ISBN 978-3-540-63384-6
Medical image computing (8,477 words) [view diff] exact match in snippet view article find links to article
Proceedings for this conference are published by Springer in the Lecture Notes in Computer Science series. In 2000, N. Ayache and J. Duncan reviewed the state
Order statistic tree (487 words) [view diff] exact match in snippet view article find links to article
(2001). A new method for balancing binary search trees. ICALP. Lecture Notes in Computer Science. Vol. 2076. pp. 469–480. doi:10.1007/3-540-48224-5_39.
Indistinguishability obfuscation (2,301 words) [view diff] exact match in snippet view article find links to article
Obfuscation". In Vadhan, Salil P. (ed.). Theory of Cryptography. Lecture Notes in Computer Science. Vol. 4392. Berlin, Heidelberg: Springer. pp. 194–213. doi:10
Straight skeleton (2,179 words) [view diff] exact match in snippet view article find links to article
Ann. Int. Conf. Computing and Combinatorics (COCOON '96). Lecture Notes in Computer Science. Vol. 1090. Springer-Verlag. pp. 117–126. Peschka, Gustav
HiLog (601 words) [view diff] case mismatch in snippet view article find links to article
Prague, Czech Republic, January 11–13, 1995: proceedings. Lecture notes in computer science. Vol. 893. Springer. pp. 252–265. doi:10.1007/3-540-58907-4_20
Supersingular isogeny key exchange (3,674 words) [view diff] exact match in snippet view article find links to article
2023. International Association for Cryptologic Research. Lecture Notes in Computer Science. Vol. 14008. Springer. pp. 423–447. doi:10.1007/978-3-031-30589-4_15
Alan Mycroft (481 words) [view diff] exact match in snippet view article find links to article
recursive definitions". International Symposium on Programming. Lecture Notes in Computer Science. Vol. 167. pp. 217–228. doi:10.1007/3-540-12925-1_41. ISBN 978-3-540-12925-7
QuickCheck (1,129 words) [view diff] exact match in snippet view article find links to article
Symposium on Functional and Logic Programming (FLOPS 2014). Lecture Notes in Computer Science. Vol. 8475. pp. 1–17. doi:10.1007/978-3-319-07151-0_1.
Manifold regularization (3,893 words) [view diff] exact match in snippet view article find links to article
pointwise consistency of graph laplacians". Learning theory. Lecture Notes in Computer Science. Vol. 3559. Springer. pp. 470–485. CiteSeerX 10.1.1.103.82
Boolean satisfiability problem (4,824 words) [view diff] exact match in snippet view article find links to article
Principles and Practice of Constraint Programming – CP 2007, Lecture Notes in Computer Science, vol. 4741, pp. 544–558, CiteSeerX 10.1.1.70.5471, doi:10
HElib (212 words) [view diff] exact match in snippet view article find links to article
Gennaro, Rosario (eds.). Advances in Cryptology – CRYPTO 2014. Lecture Notes in Computer Science. Vol. 8616. Springer Berlin Heidelberg. pp. 554–571. doi:10
Rule 30 (1,619 words) [view diff] exact match in snippet view article find links to article
automata". Proceedings of Advances in Cryptology – CRYPTO '85. Lecture Notes in Computer Science 218, Springer-Verlag. p. 429. doi:10.1007/3-540-39799-X_32
Left-right planarity test (696 words) [view diff] exact match in snippet view article find links to article
WA, USA, September 19-21, 2012, Revised Selected Papers, Lecture Notes in Computer Science, vol. 7704, Berlin: Springer, pp. 557–558, doi:10.1007/978-3-642-36763-2_51
Negation as failure (1,331 words) [view diff] exact match in snippet view article find links to article
Semantic Web Reasoning. PPSW3 2003. Lecture Notes in Computer Science. Vol. 2901. Lecture Notes in Computer Science: Springer. pp. 33–50. doi:10.1007/978-3-540-24572-8_3
Geographical feature (2,366 words) [view diff] exact match in snippet view article find links to article
). Spatio-Temporal Databases: The Chorochronos Approach. Lecture Notes in Computer Science. Vol. V.2520. Springer-Verlag. pp. 9–77. doi:10.1007/978-3-540-45081-8_2
Andrey Muchnik (514 words) [view diff] exact match in snippet view article find links to article
Czechoslovakia, September 3–7, 1984. Proceedings. Lecture Notes in Computer Science. Lecture Notes in Computer Science. 176. Berlin, Heidelberg: Springer: 162–175
Circle graph (1,694 words) [view diff] exact match in snippet view article find links to article
Science, Bordeaux, France, February 11–13, 1988, Proceedings, Lecture Notes in Computer Science, vol. 294, Berlin: Springer, pp. 61–72, doi:10.1007/BFb0035832
Program Inversion, Interpretation, and Injectivization (4,485 words) [view diff] exact match in snippet view article find links to article
Transformation for Invertible Functions". Reversible Computation. Lecture Notes in Computer Science. Vol. 13960. pp. 73–88. arXiv:2302.10049. doi:10.1007/978-3-031-38100-3_6
Hans L. Bodlaender (446 words) [view diff] exact match in snippet view article find links to article
Hans L. Bodlaender on the Occasion of His 60th Birthday, Lecture Notes in Computer Science, vol. 12160, Springer International Publishing, doi:10
Malleability (cryptography) (983 words) [view diff] exact match in snippet view article
among notions of security for public-key encryption schemes. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 26–45. doi:10.1007/bfb0055718
Lambda-mu calculus (842 words) [view diff] exact match in snippet view article find links to article
algorithmic interpretation of classical natural deduction. Lecture Notes in Computer Science. Vol. 624. pp. 190–201. doi:10.1007/BFb0013061. ISBN 3-540-55727-X
International Mathematical Knowledge Trust (180 words) [view diff] exact match in snippet view article find links to article
Mathematical Knowledge Trust". Intelligent Computer Mathematics. Lecture Notes in Computer Science. Vol. 10383. pp. 56–69. doi:10.1007/978-3-319-62075-6_5.
Range query (computer science) (5,468 words) [view diff] exact match in snippet view article
Approximations for Range Mode". Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 6198. pp. 605–616. doi:10.1007/978-3-642-14165-2_51
Automated reasoning (1,420 words) [view diff] exact match in snippet view article find links to article
Paulin-Mohring, C.; Pichardie, D. (eds.), Interactive Theorem Proving, Lecture Notes in Computer Science, vol. 7998, pp. 163–179, CiteSeerX 10.1.1.651.7964, doi:10
Newton Howard (1,456 words) [view diff] exact match in snippet view article find links to article
Computational Linguistics and Intelligent Text Processing. Lecture Notes in Computer Science, 8403, 113–127 Howard, N. (2013). The Twin Hypotheses: Brain
Attention inequality (679 words) [view diff] exact match in snippet view article find links to article
Social Media Attention Among Non-profits". Social Informatics. Lecture Notes in Computer Science. Vol. 11185. Springer International Publishing. pp. 196–211
David L. Dill (1,230 words) [view diff] exact match in snippet view article find links to article
pipelined microprocessor control". Computer Aided Verification. Lecture Notes in Computer Science. Vol. 818. pp. 68–80. doi:10.1007/3-540-58179-0_44. ISBN 978-3-540-58179-6
Algorithm selection (1,836 words) [view diff] exact match in snippet view article find links to article
(ed.). Principles and Practice of Constraint Programming. Lecture Notes in Computer Science. Vol. 6876. pp. 454–469. CiteSeerX 10.1.1.211.1807. doi:10
Ada Programming Support Environment (439 words) [view diff] exact match in snippet view article find links to article
in Long, Fred (ed.), Software Engineering Environments, Lecture Notes in Computer Science, vol. 467, Springer Berlin Heidelberg, pp. 179–193, doi:10
Polygon-circle graph (606 words) [view diff] exact match in snippet view article find links to article
2003 Perugia, Italy, September 21-24, 2003, Revised Papers, Lecture Notes in Computer Science, vol. 2912, Berlin: Springer, pp. 59–70, doi:10.1007/978-3-540-24595-7_6
Ring learning with errors signature (2,570 words) [view diff] exact match in snippet view article find links to article
Gilbert, Henri (ed.). Advances in Cryptology – EUROCRYPT 2010. Lecture Notes in Computer Science. Vol. 6110. pp. 1–23. CiteSeerX 10.1.1.297.6108. doi:10
Meurs Challenger (409 words) [view diff] exact match in snippet view article find links to article
The Netherlands, September 21–23, 2011, Revised Papers, Lecture Notes in Computer Science, vol. 7034, Springer-Verlag, pp. 447–448, doi:10.1007/978-3-642-25878-7
Text corpus (858 words) [view diff] exact match in snippet view article find links to article
Plzeň, Czech Republic, September 14–17, 2015, Proceedings. Lecture Notes in Computer Science. Vol. 9302. Springer. pp. 32–40. arXiv:1509.08639. doi:10
Reduction strategy (2,608 words) [view diff] exact match in snippet view article find links to article
and Acyclicity" (PDF). Rewriting, Computation and Proof. Lecture Notes in Computer Science. Vol. 4600. pp. 89–112. CiteSeerX 10.1.1.104.9139. doi:10
Neural gas (1,807 words) [view diff] exact match in snippet view article find links to article
CVBIA 2005, Beijing, China, October 21, 2005 : proceedings. Lecture Notes in Computer Science. Vol. 3765. Springer. p. 210. doi:10.1007/11569541_22.
Michal Irani (466 words) [view diff] exact match in snippet view article find links to article
with Uncertainty". European Conference on Computer Vision. Lecture Notes in Computer Science. 1842: 539–553. doi:10.1007/3-540-45054-8_35. ISBN 978-3-540-67685-0
Victor Pan (759 words) [view diff] exact match in snippet view article find links to article
Matrices Faster: Gladwell, Ian (1986), Mathematical Reviews, Lecture Notes in Computer Science, 179, doi:10.1007/3-540-13866-8, ISBN 978-3-540-13866-2, MR 0765701
Scale space implementation (3,290 words) [view diff] exact match in snippet view article find links to article
in Computer Vision. Lecture Notes in Computer Science. Vol. 2695. Proc. Scale-Space'03, Springer Lecture Notes in Computer Science. pp. 148–163. doi:10
Abdigani Diriye (734 words) [view diff] exact match in snippet view article find links to article
Research and Advanced Technology for Digital Libraries. Lecture Notes in Computer Science. Vol. 8092. Springer Berlin Heidelberg. pp. 235–240. doi:10
Executable choreography (1,395 words) [view diff] exact match in snippet view article find links to article
the Move to Meaningful Internet Systems: OTM 2009 (PDF), Lecture Notes in Computer Science, vol. 5870, Springer Berlin Heidelberg, pp. 373–380, CiteSeerX 10
Diffie–Hellman key exchange (5,308 words) [view diff] exact match in snippet view article find links to article
Protocols and their Security Analysis", Crytography and Coding, Lecture Notes in Computer Science, vol. 1355, pp. 30–45, CiteSeerX 10.1.1.25.387, doi:10.1007/BFb0024447
Mildly context-sensitive grammar formalism (2,034 words) [view diff] exact match in snippet view article find links to article
Germany, June 30–July 3, 2009. Proceedings, volume 5583 of Lecture Notes in Computer Science, pages 312–325, 2009. Laura Kallmeyer. "On Mildly Context-Sensitive
Juan Pavón (3,094 words) [view diff] exact match in snippet view article find links to article
Müller, Jörg (eds.). Multi-Agent Systems and Applications III. Lecture Notes in Computer Science. Vol. 2691. Springer Berlin Heidelberg. pp. 394–403. doi:10
Substring index (611 words) [view diff] exact match in snippet view article find links to article
Piscataway, New Jersey, USA, July 20–22, 1998, Proceedings, Lecture Notes in Computer Science, vol. 1448, Springer, pp. 65–79, doi:10.1007/BFB0030781,
Juan Pavón (3,094 words) [view diff] exact match in snippet view article find links to article
Müller, Jörg (eds.). Multi-Agent Systems and Applications III. Lecture Notes in Computer Science. Vol. 2691. Springer Berlin Heidelberg. pp. 394–403. doi:10
Substring index (611 words) [view diff] exact match in snippet view article find links to article
Piscataway, New Jersey, USA, July 20–22, 1998, Proceedings, Lecture Notes in Computer Science, vol. 1448, Springer, pp. 65–79, doi:10.1007/BFB0030781,
OpenNN (449 words) [view diff] exact match in snippet view article find links to article
Neural Networks". Adaptive and Natural Computing Algorithms. Lecture Notes in Computer Science. Vol. 6593. pp. 190–199. doi:10.1007/978-3-642-20282-7_20
Vector clock (1,871 words) [view diff] exact match in snippet view article find links to article
Distributed Systems (PDF), Lecture Notes in Computer Science, vol. 5401, Springer-Verlag, Lecture Notes in Computer Science, pp. 259–274, Bibcode:2008LNCS
Toolchain (276 words) [view diff] exact match in snippet view article find links to article
Tool Chains in Agile ALM Environments: A Short Introduction. Lecture Notes in Computer Science. Vol. 9416. pp. 371–380. doi:10.1007/978-3-319-26138-6_40
Truecasing (458 words) [view diff] exact match in snippet view article find links to article
Information Retrieval Techniques for Speech Applications. Lecture Notes in Computer Science. Vol. 2273. pp. 11–22. doi:10.1007/3-540-45637-6_2. ISBN 978-3-540-43156-5
BlueJ (412 words) [view diff] exact match in snippet view article find links to article
Kölling, M. (eds.). Reflections on the Teaching of Programming. Lecture Notes in Computer Science. Vol. 4821. Springer. pp. 182–196. ISBN 978-3-540-77933-9
Adversarial queueing network (198 words) [view diff] exact match in snippet view article find links to article
Combinatorial Optimization.. Algorithms and Techniques (PDF). Lecture Notes in Computer Science. Vol. 2764. p. 153. doi:10.1007/978-3-540-45198-3_14. ISBN 978-3-540-40770-6
E-graph (2,146 words) [view diff] exact match in snippet view article find links to article
Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science. Vol. 4963. Berlin, Heidelberg: Springer. pp. 337–340. doi:10
Phase-type distribution (2,368 words) [view diff] exact match in snippet view article find links to article
Analytical and Stochastic Modeling Techniques and Applications. Lecture Notes in Computer Science. Vol. 7314. p. 271. doi:10.1007/978-3-642-30782-9_19. ISBN 978-3-642-30781-2
Ascalaph Designer (607 words) [view diff] exact match in snippet view article find links to article
Computing Large Scale Scientific and Industrial Problems. Lecture Notes in Computer Science. Vol. 1541. Heidelberg: Springer Berlin. pp. 296–303. doi:10
Geospatial topology (1,620 words) [view diff] exact match in snippet view article find links to article
error correcting in GIS". Advances in Spatial Databases. Lecture Notes in Computer Science. Vol. 1262. pp. 281–297. doi:10.1007/3-540-63238-7_35.
RoboCup 3D Soccer Simulation League (1,096 words) [view diff] exact match in snippet view article find links to article
Next Generation". RoboCup 2003: Robot Soccer World Cup VII. Lecture Notes in Computer Science. Vol. 3020. pp. 458–469. doi:10.1007/978-3-540-25940-4_40
Frama-C (776 words) [view diff] exact match in snippet view article find links to article
of Code". Trusted Computing - Challenges and Applications. Lecture Notes in Computer Science. Vol. 4968/2008. pp. 133–142. doi:10.1007/978-3-540-68979-9_10
Threefish (1,366 words) [view diff] exact match in snippet view article find links to article
Seoul, Korea, February 7–10, 2010, Revised Selected Papers. Lecture Notes in Computer Science. Vol. 6147. Springer. pp. 333–346. doi:10.1007/978-3-642-13858-4_19
JSON-LD (745 words) [view diff] exact match in snippet view article find links to article
IPAW 2016, McLean, VA, USA, June 7-8, 2016, Proceedings. Lecture Notes in Computer Science. Vol. 9672. Cham: Springer International Publishing. pp. 173–177
Peter Buneman (1,067 words) [view diff] exact match in snippet view article find links to article
Characterization of Data Provenance". Database Theory — ICDT 2001. Lecture Notes in Computer Science. Vol. 1973. pp. 316. CiteSeerX 10.1.1.6.1848. doi:10.1007/3-540-44503-X_20
David Wheeler (computer scientist) (1,426 words) [view diff] exact match in snippet view article
a tiny encryption algorithm". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 1008. p. 363. doi:10.1007/3-540-60590-8_29. ISBN 978-3-540-60590-4
Alex Graves (computer scientist) (571 words) [view diff] exact match in snippet view article
Keyword Spotting". Artificial Neural Networks – ICANN 2007. Lecture Notes in Computer Science. Vol. 4669. pp. 220–229. doi:10.1007/978-3-540-74695-9_23
Digital Assets Repository (697 words) [view diff] exact match in snippet view article find links to article
Research and Advanced Technology for Digital Libraries. Lecture Notes in Computer Science. Vol. 3652. Springer Science + Business Media. pp. 116–127
Decoding methods (1,875 words) [view diff] exact match in snippet view article find links to article
codewords of small weight". Coding Theory and Applications. Lecture Notes in Computer Science. Vol. 388. Springer-Verlag. pp. 106–113. doi:10.1007/BFb0019850
Runtime predictive analysis (1,499 words) [view diff] exact match in snippet view article find links to article
for Sequentially Consistent Systems". Runtime Verification. Lecture Notes in Computer Science. Vol. 7687. pp. 136–150. doi:10.1007/978-3-642-35632-2_16
Lesk algorithm (1,039 words) [view diff] exact match in snippet view article find links to article
Lesk Algorithm for Word Sense Disambiguation Using WordNet, Lecture Notes in Computer Science; Vol. 2276, Pages: 136 - 145, 2002. ISBN 3-540-43219-1 Kilgarriff
Size-change termination principle (640 words) [view diff] exact match in snippet view article find links to article
Functional Programs". Programming Languages and Systems. Lecture Notes in Computer Science. Vol. 3780. pp. 281–297. CiteSeerX 10.1.1.102.4934. doi:10
Generic group model (401 words) [view diff] exact match in snippet view article find links to article
bounds for discrete logarithms and related problems" (PDF). Lecture Notes in Computer Science. Advances in Cryptology – Eurocrypt ’97. Vol. 1233. Springer-Verlag
Unspent transaction output (1,271 words) [view diff] exact match in snippet view article find links to article
Bitcoin UTXO Set". Financial Cryptography and Data Security. Lecture Notes in Computer Science. Vol. 10958. Springer. pp. 78–91. doi:10.1007/978-3-662-58820-8_6
N-hash (213 words) [view diff] exact match in snippet view article find links to article
Techniques, Brighton, UK, April 8–11, 1991. Proceedings. Lecture Notes in Computer Science. Vol. 547. pp. 1–16. doi:10.1007/3-540-46416-6_1. ISBN 978-3-540-54620-7
Tarski's axiomatization of the reals (603 words) [view diff] exact match in snippet view article find links to article
Edinburgh, Scotland, UK, September 3–6, 2001, Proceedings. Lecture Notes in Computer Science. Vol. 2152. Berlin: Springer. pp. 43–58. doi:10.1007/3-540-44755-5_5
Zvika Brakerski (287 words) [view diff] exact match in snippet view article find links to article
Canetti, Ran (eds.). Advances in Cryptology – CRYPTO 2012. Lecture Notes in Computer Science. Vol. 7417. Berlin, Heidelberg: Springer. pp. 868–886. doi:10
Side-channel attack (3,669 words) [view diff] exact match in snippet view article find links to article
Koblitz, Neal (ed.). Advances in Cryptology — CRYPTO '96. Lecture Notes in Computer Science. Vol. 1109. Berlin, Heidelberg: Springer. pp. 104–113. doi:10
Lenore Zuck (614 words) [view diff] exact match in snippet view article find links to article
College, New York, NY, USA, June 17-19, 1985, Proceedings, Lecture Notes in Computer Science, vol. 193, Springer, pp. 196–218, doi:10.1007/3-540-15648-8_16
Lis (linear algebra library) (665 words) [view diff] exact match in snippet view article
Computational Science and Its Applications – ICCSA 2010. Lecture Notes in Computer Science 6017. Vol. 6017. Springer. pp. 87–98. doi:10.1007/978-3-642-12165-4_36
Hash chain (1,005 words) [view diff] exact match in snippet view article find links to article
Scheme" (PDF). Progress in Cryptology – AFRICACRYPT 2011. Lecture Notes in Computer Science. Vol. 6737. Springer Berlin Heidelberg. pp. 363–378. doi:10
Subset sum problem (3,750 words) [view diff] exact match in snippet view article find links to article
Gilbert, Henri (ed.). Advances in Cryptology – EUROCRYPT 2010. Lecture Notes in Computer Science. Vol. 6110. Berlin, Heidelberg: Springer. pp. 235–256. doi:10
Browser Helper Object (882 words) [view diff] exact match in snippet view article find links to article
Browser Helper Objects". Intelligence and Security Informatics. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer: 638–639. doi:10.1007/11427995_85
Memetic algorithm (4,064 words) [view diff] exact match in snippet view article find links to article
motion". Tasks and Methods in Applied Artificial Intelligence. Lecture Notes in Computer Science. Vol. 1416. Springer-Verlag. pp. 105–114. CiteSeerX 10.1.1
DRE-i with enhanced privacy (1,759 words) [view diff] exact match in snippet view article find links to article
Tallying Authorities" (PDF). Computer Security – ESORICS 2016. Lecture Notes in Computer Science. Vol. 9879. pp. 223–240. doi:10.1007/978-3-319-45741-3_12
Morten Middelfart (1,106 words) [view diff] exact match in snippet view article find links to article
Conceptual Modeling. Recent Developments and New Directions. Lecture Notes in Computer Science. Vol. 6999. pp. 364–370. doi:10.1007/978-3-642-24574-9_52
Studierfenster (1,511 words) [view diff] exact match in snippet view article find links to article
Computing and Computer Assisted Intervention – MICCAI 2019. Lecture Notes in Computer Science. Vol. 11768. Cham: Springer International Publishing. pp. 236–244
Random oracle (1,786 words) [view diff] exact match in snippet view article find links to article
quantum world". Advances in Cryptology – ASIACRYPT 2011. Lecture Notes in Computer Science. Vol. 7073. Springer. pp. 41–69. arXiv:1008.0931. doi:10
Self-organizing map (4,068 words) [view diff] exact match in snippet view article find links to article
(1995). "Kohonen Network" (PDF). Artificial Neural Networks. Lecture Notes in Computer Science. Vol. 931. University of Limburg, Maastricht. pp. 83–100.
Audio game (3,011 words) [view diff] exact match in snippet view article find links to article
Human–Computer Interaction. Designing Novel Interactions, Lecture Notes in Computer Science, vol. 10278, Cham: Springer International Publishing, pp. 242–259
Hyper-heuristic (2,557 words) [view diff] exact match in snippet view article find links to article
Hill Climbers and Mutational Heuristics in Hyperheuristics, Lecture Notes in Computer Science, Springer-Verlag, The 9th International Conference on Parallel
Term indexing (873 words) [view diff] exact match in snippet view article find links to article
available under the CC BY 4.0 license. P. Graf, Term Indexing, Lecture Notes in Computer Science 1053, 1996 (slightly outdated overview) R. Sekar and I.V.