language:
Find link is a tool written by Edward Betts.searching for Lecture Notes in Computer Science 417 found (3662 total)
alternate case: lecture Notes in Computer Science
Service (systems architecture)
(1,994 words)
[view diff]
exact match in snippet
view article
Amsterdam, The Netherlands, December 12-15, 2005, Proceedings. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg. ISBN 978-3-540-30817-1Provable security (2,181 words) [view diff] exact match in snippet view article find links to article
asymmetric encryption". Advances in Cryptology — EUROCRYPT'94. Lecture Notes in Computer Science. Vol. 950. pp. 92–111. doi:10.1007/BFb0053428. ISBN 978-3-540-60176-0Tiny Encryption Algorithm (1,189 words) [view diff] exact match in snippet view article find links to article
RC2, and TEA". Information and Communications Security. Lecture Notes in Computer Science. Vol. 1334. pp. 233–246. CiteSeerX 10.1.1.35.8112. doi:10XSL attack (1,834 words) [view diff] exact match in snippet view article find links to article
2003, Lund, Sweden, February 24-26, 2003, Revised Papers. Lecture Notes in Computer Science. Vol. 2887. Springer. pp. 274–289. doi:10.1007/978-3-540-39887-5_21International Data Encryption Algorithm (1,499 words) [view diff] exact match in snippet view article find links to article
on the IDEA Block Cipher". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 3006. pp. 117–129. doi:10.1007/978-3-540-24654-1_9.Bart Preneel (975 words) [view diff] exact match in snippet view article find links to article
algorithms based on block ciphers". Crytography and Coding. Lecture Notes in Computer Science. Vol. 1355. pp. 270–282. doi:10.1007/BFb0024473. ISBN 978-3-540-63927-5Join-pattern (6,432 words) [view diff] exact match in snippet view article find links to article
calculus of mobile agents". CONCUR '96: Concurrency Theory. Lecture Notes in Computer Science. Vol. 1119. Le Chesnay: Concurrency Theory. pp. 406–421. doi:10Satisfiability modulo theories (4,371 words) [view diff] exact match in snippet view article find links to article
Werner; Hermanns, Holger (eds.). Computer Aided Verification. Lecture Notes in Computer Science. Vol. 4590. Berlin, Heidelberg: Springer. pp. 547–560. doi:10Electromagnetic attack (3,404 words) [view diff] exact match in snippet view article find links to article
Transmission Using Electromagnetic Emanations". Information Hiding. Lecture Notes in Computer Science. Vol. 1525. pp. 124–142. CiteSeerX 10.1.1.64.6982. doi:10Extended Semantic Web Conference (867 words) [view diff] exact match in snippet view article find links to article
Skaf-Molli, Hala; Tamper, Minna (eds.). The Semantic Web. Lecture Notes in Computer Science. Vol. 13261. Cham: Springer International Publishing. pp. 200–216Choreographic programming (1,546 words) [view diff] exact match in snippet view article find links to article
Specifications". Logic, Rewriting, and Concurrency (PDF). Lecture Notes in Computer Science. Vol. 9200. pp. 427–450. doi:10.1007/978-3-319-23165-5_20Hash-based cryptography (2,329 words) [view diff] exact match in snippet view article find links to article
Minimal Security Assumptions". Post-Quantum Cryptography. Lecture Notes in Computer Science. Vol. 7071. pp. 117–129. CiteSeerX 10.1.1.400.6086. doi:10Computer Aided Verification (396 words) [view diff] exact match in snippet view article find links to article
"Counterexample-Guided Abstraction Refinement". Computer Aided Verification. Lecture Notes in Computer Science. Vol. 1855. pp. 154–169. doi:10.1007/10722167_15. ISBN 978-3-540-67770-3Linked timestamping (1,715 words) [view diff] exact match in snippet view article find links to article
Digital Signatures". Advances in Cryptology – EUROCRYPT '93. Lecture Notes in Computer Science. Vol. 765. p. 274. doi:10.1007/3-540-48285-7_24. ISBN 978-3-540-57600-6Kleptography (1,088 words) [view diff] exact match in snippet view article find links to article
Barbara, California, USA, August 18–22, 1996, Proceedings. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 89–103. ISBN 978-3-540-68697-2Kaisa Nyberg (325 words) [view diff] exact match in snippet view article find links to article
Tatsunokuchi, Ishikawa, Japan September 17ÔÇô19, 1997, Proceedings, Lecture Notes in Computer Science, vol. 1396, Springer, pp. 32–42, doi:10.1007/bfb0030406,Shlomi Dolev (2,398 words) [view diff] exact match in snippet view article find links to article
Joffroy; Delaët, Sylvie (2014). Networked Systems (PDF). Lecture Notes in Computer Science. Springer, Cham. pp. 99–121. doi:10.1007/978-3-319-09581-3_8E (theorem prover) (937 words) [view diff] exact match in snippet view article
(2004). "System Description: E 0.81". Automated Reasoning. Lecture Notes in Computer Science. Vol. 3097. pp. 223–228. doi:10.1007/978-3-540-25984-8_15Dmitry Khovratovich (1,347 words) [view diff] exact match in snippet view article find links to article
AES-192 and AES-256". Advances in Cryptology – ASIACRYPT 2009. Lecture Notes in Computer Science. Vol. 5912. Springer-Verlag. pp. 1–18. doi:10.1007/978-3-642-10366-7_1Brent Waters (559 words) [view diff] exact match in snippet view article find links to article
Identity-Based Encryption". Advances in Cryptology – EUROCRYPT 2005. Lecture Notes in Computer Science. Vol. 3494. pp. 457–473. doi:10.1007/11426639_27. ISBN 978-3-540-25910-7Mexican International Conference on Artificial Intelligence (1,007 words) [view diff] exact match in snippet view article find links to article
(2000). MICAI 2000: Advances in Artificial Intelligence. Lecture Notes in Computer Science. Vol. 1793. doi:10.1007/10720076. ISBN 978-3-540-67354-5.RDF query language (1,154 words) [view diff] exact match in snippet view article find links to article
Comparison of RDF Query Languages". The Semantic Web – ISWC 2004. Lecture Notes in Computer Science. Vol. 3298. pp. 502–517. CiteSeerX 10.1.1.105.8731. doi:10RIPEMD (869 words) [view diff] exact match in snippet view article find links to article
of RACE Integrity Primitives Evaluation (RIPE-RACE 1040). Lecture Notes in Computer Science. Vol. 1007. doi:10.1007/3-540-60640-8. ISBN 978-3-540-60640-6Moti Yung (1,628 words) [view diff] exact match in snippet view article find links to article
Cryptography, or: Should We Trust Capstone? CRYPTO 1996: 89-103, Lecture Notes in Computer Science, vol. 1109, p. 89, doi:10.1007/3-540-68697-5_8, ISBN 978-3-540-61512-5XTEA (969 words) [view diff] exact match in snippet view article find links to article
B.; Meier, W. (eds.). Fast Software Encryption. FSE 2004. Lecture Notes in Computer Science. Vol. 3017. Berlin, Heidelberg: Springer. pp. 299–316. doi:10Martin Wirsing (1,190 words) [view diff] exact match in snippet view article find links to article
): Software-Intensive Systems and New Computing Paradigms. Lecture Notes in Computer Science 5380, Springer-Verlag, 2008, 265 pages (ISBN 978-3-540-89436-0)Orr Dunkelman (772 words) [view diff] exact match in snippet view article find links to article
Cryptology – CRYPTO 2012. Advances in Cryptology – CRYPTO 2012. Lecture Notes in Computer Science. Vol. 7417. Springer. pp. 719–740. doi:10.1007/978-3-642-32009-5_42SecPAL (447 words) [view diff] exact match in snippet view article find links to article
Information Systems Security. ICISS 2010. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Vol. 6503. Berlin; Heidelberg: SpringerPragmaDev Studio (1,884 words) [view diff] exact match in snippet view article find links to article
Simulators". System Analysis and Modeling: About Models. Lecture Notes in Computer Science. Vol. 6598. Springer, Berlin, Heidelberg. pp. 144–155. doi:10FORK-256 (786 words) [view diff] exact match in snippet view article find links to article
in the Full SHA-1". Advances in Cryptology – CRYPTO 2005. Lecture Notes in Computer Science. Vol. 3621. pp. 17–36. doi:10.1007/11535218_2. ISBN 978-3-540-31870-5PragmaDev Studio (1,884 words) [view diff] exact match in snippet view article find links to article
Simulators". System Analysis and Modeling: About Models. Lecture Notes in Computer Science. Vol. 6598. Springer, Berlin, Heidelberg. pp. 144–155. doi:10T-function (713 words) [view diff] exact match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems - CHES 2002. Lecture Notes in Computer Science. Vol. 2523. Springer-Verlag. pp. 470–483. doi:10.1007/3-540-36400-5_34Lattice-based cryptography (2,852 words) [view diff] exact match in snippet view article find links to article
ring-based public key cryptosystem". Algorithmic Number Theory. Lecture Notes in Computer Science. Vol. 1423. pp. 267–288. CiteSeerX 10.1.1.25.8422. doi:10Post-quantum cryptography (6,408 words) [view diff] exact match in snippet view article find links to article
Ioannidis, John (ed.). Applied Cryptography and Network Security. Lecture Notes in Computer Science. Vol. 3531. pp. 64–175. doi:10.1007/11496137_12. ISBN 978-3-540-26223-7E0 (cipher) (802 words) [view diff] exact match in snippet view article
Combiner". Information Security and Cryptology - ICISC'99 (PDF). Lecture Notes in Computer Science. Vol. 1787. Helsinki, Finland: Nokia Research Centre. pp. 17–29Homomorphic encryption (4,692 words) [view diff] exact match in snippet view article find links to article
Encryption Scheme". Advances in Cryptology – EUROCRYPT 2011. Lecture Notes in Computer Science. Vol. 6632. pp. 129–148. doi:10.1007/978-3-642-20465-4_9.Feistel cipher (1,316 words) [view diff] exact match in snippet view article find links to article
Boneh, Dan (ed.), Advances in Cryptology - CRYPTO 2003 (PDF), Lecture Notes in Computer Science, vol. 2729, pp. 513–529, doi:10.1007/b11817, ISBN 978-3-540-40674-7Inductive logic programming (4,245 words) [view diff] case mismatch in snippet view article find links to article
Ronald de (1997). Foundations of inductive logic programming. Lecture notes in computer science Lecture notes in artificial intelligence. Berlin Heidelberg:OPTICS algorithm (2,133 words) [view diff] exact match in snippet view article find links to article
Outliers". Principles of Data Mining and Knowledge Discovery. Lecture Notes in Computer Science. Vol. 1704. Springer-Verlag. pp. 262–270. doi:10.1007/b72280Cognitive computing (1,602 words) [view diff] exact match in snippet view article find links to article
Cognitive Augmentation – A Case Study". Augmented Cognition. Lecture Notes in Computer Science. Vol. 11580. pp. 533–545. arXiv:2211.06479. doi:10.1007/978-3-030-22419-6_38Identity-based cryptography (868 words) [view diff] exact match in snippet view article find links to article
(eds.). Advances in Cryptology Proceedings of CRYPTO '84. Lecture Notes in Computer Science. Vol. 196 (1 ed.). Springer Berlin Heidelberg. pp. 47–53.Cryptographic hash function (6,299 words) [view diff] exact match in snippet view article find links to article
Other Primitives". Advances in Cryptology – EUROCRYPT 2005. Lecture Notes in Computer Science. Vol. 3494. pp. 96–113. doi:10.1007/11426639_6. ISBN 978-3-540-25910-7One-key MAC (919 words) [view diff] exact match in snippet view article find links to article
(2003-02-24). "OMAC: One-Key CBC MAC". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 2887. Springer, Berlin, Heidelberg. pp. 129–153. doi:10Multitier programming (2,772 words) [view diff] exact match in snippet view article find links to article
Without Tiers". Formal Methods for Components and Objects. Lecture Notes in Computer Science. Vol. 4709. pp. 266–296. doi:10.1007/978-3-540-74792-5_12Data Encryption Standard (6,714 words) [view diff] exact match in snippet view article find links to article
for DES Cipher". Advances in Cryptology — EUROCRYPT '93. Lecture Notes in Computer Science. Vol. 765. Springer, Berlin, Heidelberg. pp. 386–397. doi:10HyperNEAT (1,260 words) [view diff] exact match in snippet view article find links to article
Mouret, Jean-Baptiste (eds.). From Animals to Animats 11. Lecture Notes in Computer Science. Vol. 6226. Springer Berlin Heidelberg. pp. 533–543. CiteSeerX 10Coppersmith method (767 words) [view diff] exact match in snippet view article find links to article
Modular Equation". Advances in Cryptology — EUROCRYPT '96. Lecture Notes in Computer Science. Vol. 1070. pp. 155–165. doi:10.1007/3-540-68339-9_14.R-tree (2,965 words) [view diff] exact match in snippet view article find links to article
Geographic Data". Advances in Spatial and Temporal Databases. Lecture Notes in Computer Science. Vol. 8098. p. 146. doi:10.1007/978-3-642-40235-7_9. ISBN 978-3-642-40234-0Register allocation (5,066 words) [view diff] exact match in snippet view article find links to article
Programming". Languages and Compilers for Parallel Computing. Lecture Notes in Computer Science. Vol. 4382. pp. 267–282. CiteSeerX 10.1.1.75.6911. doi:10Symposium on Experimental Algorithms (731 words) [view diff] exact match in snippet view article find links to article
Kulikov, Alexander S., eds. (2016). Experimental Algorithms. Lecture Notes in Computer Science. Vol. 9685. doi:10.1007/978-3-319-38851-9. ISBN 978-3-319-38850-2Skipjack (cipher) (1,106 words) [view diff] exact match in snippet view article
Feistel Networks". Advances in Cryptology – CRYPTO 2010. Lecture Notes in Computer Science. Vol. 6223. Springer. pp. 613–630. CiteSeerX 10.1.1.185.3033CL-HTTP (631 words) [view diff] exact match in snippet view article find links to article
system on world wide web". Intelligent Tutoring Systems. Lecture Notes in Computer Science. Vol. 1086/1996. Springer. pp. 261–269. doi:10.1007/3-540-61327-7_123Fly algorithm (3,630 words) [view diff] exact match in snippet view article find links to article
Jean; Sapin, Emmanuel (2009). "Flies Open a Door to SLAM.". Lecture Notes in Computer Science. Applications of Evolutionary Computation (EvoApplicationsMD4 (871 words) [view diff] exact match in snippet view article find links to article
Software Encryption, 15th International Workshop, FSE 2008. Lecture Notes in Computer Science. 5086. Springer: 412–428. doi:10.1007/978-3-540-71039-4_26SAT solver (3,583 words) [view diff] exact match in snippet view article find links to article
Principles and Practice of Constraint Programming – CP 2007, Lecture Notes in Computer Science, vol. 4741, pp. 544–558, CiteSeerX 10.1.1.70.5471, doi:10DPLL(T) (434 words) [view diff] exact match in snippet view article
Rajeev; Peled, Doron A. (eds.). Computer Aided Verification. Lecture Notes in Computer Science. Vol. 3114. Springer Berlin Heidelberg. pp. 175–188. doi:10ProVerif (1,382 words) [view diff] exact match in snippet view article find links to article
WS-Security Protocols". Web Services and Formal Methods. Lecture Notes in Computer Science. Vol. 4184. Springer, Berlin, Heidelberg. pp. 88–106. CiteSeerX 10Rocq (1,918 words) [view diff] exact match in snippet view article find links to article
TPHOLs 2005, Oxford, UK, August 22–25, 2005, Proceedings. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. pp. 98–113. doi:10.1007/11541868_7StegFS (312 words) [view diff] exact match in snippet view article find links to article
Shamir, Adi (1998). The Steganographic File System (PDF). Lecture Notes in Computer Science. Vol. 1525. pp. 73–82. CiteSeerX 10.1.1.42.1676. doi:10.1007/3-540-49380-8_6Annotation (3,658 words) [view diff] exact match in snippet view article find links to article
Yannick (eds.). Knowledge Engineering and Knowledge Management. Lecture Notes in Computer Science. Vol. 11313. Cham: Springer International Publishing. pp. 19–33Queue number (2,715 words) [view diff] exact match in snippet view article find links to article
Germany, September 21–24, 2010, Revised Selected Papers, Lecture Notes in Computer Science, vol. 6502, Heidelberg: Springer, pp. 68–79, doi:10.1007/978-3-642-18469-7_7Queue number (2,715 words) [view diff] exact match in snippet view article find links to article
Germany, September 21–24, 2010, Revised Selected Papers, Lecture Notes in Computer Science, vol. 6502, Heidelberg: Springer, pp. 68–79, doi:10.1007/978-3-642-18469-7_7Go and mathematics (1,727 words) [view diff] exact match in snippet view article find links to article
problems". Mathematical Foundations of Computer Science 1984. Lecture Notes in Computer Science. Vol. 176. pp. 498–506. doi:10.1007/BFb0030333. ISBN 978-3-540-13372-8Bot prevention (1,033 words) [view diff] exact match in snippet view article find links to article
of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science. Vol. 12223. Cham: Springer International Publishing. pp. 135–159Computational Diffie–Hellman assumption (796 words) [view diff] exact match in snippet view article find links to article
Diffie–Hellman is as strong as discrete log for certain primes (PDF), Lecture Notes in Computer Science, vol. 403, pp. 530–539, doi:10.1007/0-387-34799-2_38, ISBN 978-0-387-97196-4Transaction malleability problem (638 words) [view diff] exact match in snippet view article find links to article
Rohloff, Kurt (eds.). Financial Cryptography and Data Security. Lecture Notes in Computer Science. Vol. 8976. Berlin, Heidelberg: Springer. pp. 1–18. doi:10Secure two-party computation (1,093 words) [view diff] exact match in snippet view article find links to article
Single-Execution Setting", Advances in Cryptology – EUROCRYPT 2017, Lecture Notes in Computer Science, vol. 10212, Cham: Springer International Publishing, pp. 399–424Elliptic curve point multiplication (4,325 words) [view diff] exact match in snippet view article find links to article
2006. Lecture Notes in Computer Science. Vol. 3958. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds) Public Key Cryptography - PKC 2006. Lecture NotesLargest empty rectangle (816 words) [view diff] exact match in snippet view article find links to article
the largest empty rectangle". STACS-1984, Lecture Notes in Computer Science. Lecture Notes in Computer Science. 166: 43–54. doi:10.1007/3-540-12920-0_4Deterministic encryption (853 words) [view diff] exact match in snippet view article find links to article
Keyword Search" (PDF). Advances in Cryptology - EUROCRYPT 2004. Lecture Notes in Computer Science. Vol. 3027. pp. 506–522. doi:10.1007/978-3-540-24676-3_30Adaptive sort (652 words) [view diff] exact match in snippet view article find links to article
Alistair Moffat (1992). A framework for adaptive sorting. Lecture Notes in Computer Science. Vol. 621. Berlin: Springer Berlin / Heidelberg. pp. 422–433Budget-additive valuation (850 words) [view diff] exact match in snippet view article find links to article
for Maximizing Ad-Auctions Revenue", Algorithms – ESA 2007, Lecture Notes in Computer Science, vol. 4698, Berlin, Heidelberg: Springer Berlin HeidelbergAdvanced Encryption Standard (5,675 words) [view diff] exact match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems - CHES 2002. Lecture Notes in Computer Science. Vol. 2523. pp. 159–171. doi:10.1007/3-540-36400-5_13.Broadcast encryption (802 words) [view diff] exact match in snippet view article find links to article
Advances in Cryptology — CRYPTO' 93 (Extended abstract). Lecture Notes in Computer Science. Vol. 773. pp. 480–491. doi:10.1007/3-540-48329-2_40. ISBN 978-3-540-57766-9Cardano (blockchain platform) (3,116 words) [view diff] exact match in snippet view article
Peter B.; Sala, Massimiliano (eds.). The Extended UTXO Model. Lecture Notes in Computer Science. Cham: Springer International Publishing. pp. 525–539. doi:10Zero-knowledge proof (7,668 words) [view diff] exact match in snippet view article find links to article
Children". Advances in Cryptology — CRYPTO' 89 Proceedings (PDF). Lecture Notes in Computer Science. Vol. 435. pp. 628–631. doi:10.1007/0-387-34805-0_60. ISBN 978-0-387-97317-3Petri net (7,238 words) [view diff] exact match in snippet view article find links to article
Lectures on Petri Nets I: Basic Models – Advances in Petri Nets. Lecture Notes in Computer Science. Vol. 1491. Springer. pp. 12–121. doi:10.1007/3-540-65306-6_14Fiat–Shamir heuristic (1,068 words) [view diff] exact match in snippet view article find links to article
Signature Problems". Advances in Cryptology — CRYPTO' 86. Lecture Notes in Computer Science. Vol. 263. Springer Berlin Heidelberg. pp. 186–194. doi:10Identity-based encryption (1,942 words) [view diff] exact match in snippet view article find links to article
Barbara, California, USA, August 19–22, 1984, Proceedings. Lecture Notes in Computer Science. Vol. 196. Springer. pp. 47–53. doi:10.1007/3-540-39568-7_5Bruce M. McLaren (4,006 words) [view diff] exact match in snippet view article find links to article
Toward Tutoring Help Seeking. Intelligent Tutoring Systems Lecture Notes in Computer Science, 227–239. Ashley, K.D. & McLaren, B.M. (1995). Reasoning withChristine Paulin-Mohring (497 words) [view diff] exact match in snippet view article find links to article
Machinery. She was elected to the Academia Europaea in 2014. Lecture Notes in Computer Science. Types for Proofs and Programs: International Workshop TYPES'96Alfred Menezes (816 words) [view diff] exact match in snippet view article find links to article
(with S. Chatterjee, N. Koblitz and P. Sarkar), Mycrypt 2016, Lecture Notes in Computer Science, 10311 (2017), 21–55. doi:10.1007/978-3-319-61273-7_3 "AnotherVenansius Baryamureeba (1,581 words) [view diff] exact match in snippet view article find links to article
for Linear Programming". Large-Scale Scientific Computing. Lecture Notes in Computer Science. Vol. 3743. pp. 629–637. doi:10.1007/11666806_72. ISBN 978-3-540-31994-8GNUnet (2,141 words) [view diff] exact match in snippet view article find links to article
Seberry, Jennifer (eds.). Efficient Sharing of Encrypted Data. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 107–120. CiteSeerX 10.1.1Artificial immune system (1,703 words) [view diff] exact match in snippet view article find links to article
of Degeneracy in a Lymph Node". Artificial Immune Systems. Lecture Notes in Computer Science. Vol. 4163. pp. 164–177. doi:10.1007/11823940_13. ISBN 978-3-540-37749-8Book embedding (8,167 words) [view diff] exact match in snippet view article find links to article
graphs have constant book thickness", Algorithms – ESA 2015, Lecture Notes in Computer Science, vol. 9294, Springer, pp. 130–141, doi:10.1007/978-3-662-48350-3_12Augmented cognition (1,758 words) [view diff] exact match in snippet view article find links to article
Schmorrow, Dylan D. (ed.). Foundations of Augmented Cognition. Lecture Notes in Computer Science. Vol. 4565. Springer Berlin Heidelberg. pp. 220–228. doi:10CADE ATP System Competition (378 words) [view diff] exact match in snippet view article find links to article
Theories Competition" (PDF). Computer Aided Verification. Lecture Notes in Computer Science. 3576. Springer: 20–23. doi:10.1007/11513988_4. ISBN 978-3-540-27231-1Infobox (1,380 words) [view diff] exact match in snippet view article find links to article
Vasudeva (June 2011). Multidisciplinary Information Retrieval. Lecture Notes in Computer Science. Vol. 6653. Springer Berlin Heidelberg. doi:10.1007/978-3-642-21353-3Galois/Counter Mode (3,051 words) [view diff] exact match in snippet view article find links to article
Systems - CHES 2007 . GCM-AES Architecture Optimized for FPGAs. Lecture Notes in Computer Science. Vol. 4727. Springer. pp. 227–238. doi:10.1007/978-3-540-74735-2_16Pairing-based cryptography (1,150 words) [view diff] exact match in snippet view article find links to article
cryptography at high security levels". Cryptography and Coding. Lecture Notes in Computer Science. Vol. 3796. pp. 13–36. doi:10.1007/11586821_2. ISBN 978-3-540-30276-6Threshold cryptosystem (868 words) [view diff] exact match in snippet view article find links to article
Gilles (ed.). Advances in Cryptology — CRYPTO' 89 Proceedings. Lecture Notes in Computer Science. Vol. 435. New York, NY: Springer. pp. 307–315. doi:10.1007/0-387-34805-0_28Levenshtein automaton (561 words) [view diff] exact match in snippet view article find links to article
Automata Theory and Applications. Lecture Notes in Computer Science. Vol. 9618. Lecture Notes in Computer Science. pp. 207–218. doi:10.1007/978-3-319-30000-9_16Alternating step generator (565 words) [view diff] exact match in snippet view article find links to article
Bruijn Sequences". Advances in Cryptology — EUROCRYPT '87. Lecture Notes in Computer Science. Vol. 304. Berlin, Heidelberg: Springer. pp. 5–14. doi:10Amit Sahai (1,154 words) [view diff] exact match in snippet view article find links to article
Challenges". Theory of Cryptography. Lecture Notes in Computer Science. Vol. 6597 (Lecture Notes in Computer Science). Springer Berlin Heidelberg. pp. 253–273Prince (cipher) (1,376 words) [view diff] exact match in snippet view article
Exhaustive Key Search". Advances in Cryptology – CRYPTO '96. Lecture Notes in Computer Science. Vol. 1109. pp. 252–267. doi:10.1007/3-540-68697-5_20.Larch Prover (1,558 words) [view diff] exact match in snippet view article find links to article
Proceedings of the Fourth International Conference CAV'92), Lecture Notes in Computer Science 663, Springer-Verlag, June 1992, pages 44–55. Urban EngbergAnne Canteaut (483 words) [view diff] exact match in snippet view article find links to article
Graz, Austria, March 15-17, 2006, Revised Selected Papers. Lecture Notes in Computer Science. Vol. 4047. Springer. pp. 30–40. CiteSeerX 10.1.1.59.9346ElGamal encryption (1,473 words) [view diff] exact match in snippet view article find links to article
Decision Diffie-Hellman problem". Algorithmic Number Theory. Lecture Notes in Computer Science. Vol. 1423. pp. 48–63. CiteSeerX 10.1.1.461.9971. doi:10.1007/BFb0054851Categorical quantum mechanics (2,203 words) [view diff] exact match in snippet view article find links to article
EACSL Annual Conference on Computer Science Logic (CSL). Lecture Notes in Computer Science. Vol. 6247. Springer. arXiv:1004.1598. doi:10.2168/LMCS-8(4:14)2012Speculative execution (978 words) [view diff] exact match in snippet view article find links to article
International Conference on Principles of Distributed Systems. Lecture Notes in Computer Science. Vol. 4305. Bordeaux, France: Springer. pp. 1–2. doi:10.1007/11945529_1Loop-invariant code motion (596 words) [view diff] exact match in snippet view article find links to article
Detection". Automated Technology for Verification and Analysis. Lecture Notes in Computer Science. Vol. 10482. pp. 91–108. doi:10.1007/978-3-319-68167-2_7.Wikidata (3,682 words) [view diff] exact match in snippet view article find links to article
Multilinguality, Multimodality, and Interaction. CLEF 2018. Lecture Notes in Computer Science. Vol. 11018. p. 129. doi:10.1007/978-3-319-98932-7_12.Ensemble learning (6,685 words) [view diff] exact match in snippet view article find links to article
Announcement)". Cyber Security Cryptography and Machine Learning. Lecture Notes in Computer Science. Vol. 11527. pp. 202–207. doi:10.1007/978-3-030-20951-3_18PRESENT (708 words) [view diff] exact match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems - CHES 2007. Lecture Notes in Computer Science. Vol. 4727. pp. 450–466. doi:10.1007/978-3-540-74735-2_31Merkle tree (1,790 words) [view diff] exact match in snippet view article find links to article
Encryption Function". Advances in Cryptology – CRYPTO '87. Lecture Notes in Computer Science. Vol. 293. pp. 369–378. doi:10.1007/3-540-48184-2_32. ISBN 978-3-540-18796-7Weak heap (2,127 words) [view diff] exact match in snippet view article find links to article
"On the performance of WEAK-HEAPSORT", Stacs 2000 (PDF), Lecture Notes in Computer Science, vol. 1770, Springer-Verlag, pp. 254–266, CiteSeerX 10.1.1A5/1 (2,725 words) [view diff] exact match in snippet view article find links to article
Cryptanalysis of A5/1 on a PC". Fast Software Encryption—FSE 2000. Lecture Notes in Computer Science. Vol. 1978. pp. 1–18. doi:10.1007/3-540-44706-7_1. ISBN 978-3-540-41728-6Model checking (2,788 words) [view diff] exact match in snippet view article find links to article
programs using fixpoints", Automata, Languages and Programming, Lecture Notes in Computer Science, vol. 85, pp. 169–181, doi:10.1007/3-540-10003-2_69, ISBN 978-3-540-10003-4Evolutionary algorithm (4,553 words) [view diff] exact match in snippet view article find links to article
Evolution of Evolutionary Algorithms". Genetic Programming. Lecture Notes in Computer Science. Vol. 3003. Springer. pp. 389–398. doi:10.1007/978-3-540-24650-3_37Therese Biedl (202 words) [view diff] exact match in snippet view article find links to article
Copenhagen, Denmark, July 8–11, 2014, Proceedings, Part I. Lecture Notes in Computer Science. Vol. 8572. Springer. pp. 198–210. doi:10.1007/978-3-662-43948-7_17Mean value analysis (1,587 words) [view diff] exact match in snippet view article find links to article
Performance Evaluation of Computer and Communication Systems. Lecture Notes in Computer Science. Vol. 729. p. 491. doi:10.1007/BFb0013865. ISBN 978-3-540-57297-8Fork–join queue (1,773 words) [view diff] exact match in snippet view article find links to article
Fork-Join Queueing Simulation". Computer Performance Engineering. Lecture Notes in Computer Science. Vol. 5652. pp. 16–29. CiteSeerX 10.1.1.158.7363. doi:10Contact graph (483 words) [view diff] exact match in snippet view article find links to article
2013, Lübeck, Germany, June 19-21, 2013, Revised Papers, Lecture Notes in Computer Science, vol. 8165, Springer, pp. 139–151, arXiv:1303.1279, doi:10Piling-up lemma (1,445 words) [view diff] exact match in snippet view article find links to article
for DES Cipher". Advances in Cryptology – EUROCRYPT '93. Lecture Notes in Computer Science. Vol. 765. pp. 386–397. doi:10.1007/3-540-48285-7_33. ISBN 978-3-540-57600-6Klaus-Robert Müller (988 words) [view diff] exact match in snippet view article find links to article
(2022). xxAI – Beyond Explainable Artificial Intelligence. Lecture Notes in Computer Science. Vol. 13200. Springer Cham. doi:10.1007/978-3-031-04083-2Accumulator (cryptography) (2,795 words) [view diff] exact match in snippet view article
Signatures" (PDF). Advances in Cryptology — EUROCRYPT '93. Lecture Notes in Computer Science. Vol. 765. pp. 274–285. doi:10.1007/3-540-48285-7_24. ISBN 978-3-540-57600-6Persuasive technology (4,408 words) [view diff] exact match in snippet view article find links to article
Health-Promoting Mobile Applications". Persuasive Technology. Lecture Notes in Computer Science. Vol. 6137. pp. 150–161. doi:10.1007/978-3-642-13226-1_16Exponential time hypothesis (3,061 words) [view diff] exact match in snippet view article find links to article
Ljubljana, Slovenia, September 12–14, 2012, Proceedings, Lecture Notes in Computer Science, vol. 7535, Springer, pp. 13–24, CiteSeerX 10.1.1.680.8401Tree stack automaton (876 words) [view diff] exact match in snippet view article find links to article
Mathematical Foundations of Computer Science (MFCS 1990). Lecture Notes in Computer Science, Vol. 452, pages 313–321, doi:10.1007/BFb0029624. Scott, DanaEuropean Joint Conferences on Theory and Practice of Software (554 words) [view diff] exact match in snippet view article find links to article
Robinet, Bernard; Wilhelm, Reinhard, eds. (1986). Esop 86. Lecture Notes in Computer Science. Vol. 213. doi:10.1007/3-540-16442-1. ISBN 978-3-540-16442-5Knowledge graph (2,342 words) [view diff] exact match in snippet view article find links to article
Integrated Knowledge Graph". The Semantic Web – ISWC 2020. Lecture Notes in Computer Science. Vol. 12507. pp. 430–446. doi:10.1007/978-3-030-62466-8_27Yacas (282 words) [view diff] exact match in snippet view article find links to article
Intelligence, Automated Reasoning, and Symbolic Computation, Lecture Notes in Computer Science, vol. 2385, Springer, pp. 332–336, doi:10.1007/3-540-45470-5_292-EXPTIME (960 words) [view diff] exact match in snippet view article find links to article
on Automata, Languages and Programming (ICALP 2003) (PDF), Lecture Notes in Computer Science, vol. 2719, Springer-Verlag, pp. 767–775, doi:10.1007/3-540-45061-0_60Free Haven Project (928 words) [view diff] exact match in snippet view article find links to article
Haven Project: Distributed Anonymous Storage Service" (PDF). Lecture Notes in Computer Science 2009. Proc. Workshop on Design Issues in Anonymity and UnobservabilityAlgorithmic skeleton (8,819 words) [view diff] exact match in snippet view article find links to article
Euro-Par Conference: Parallel Processing, volume 4641 of Lecture Notes in Computer Science, pages 72–81. Springer-Verlag, 2007. D. Caromel, L. HenrioElliptic-curve Diffie–Hellman (2,168 words) [view diff] exact match in snippet view article find links to article
2006. Lecture Notes in Computer Science. Vol. 3958. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds) Public Key Cryptography - PKC 2006. Lecture NotesNon-interactive zero-knowledge proof (2,465 words) [view diff] exact match in snippet view article find links to article
Garay, Juan A. (eds.). Advances in Cryptology – CRYPTO 2013. Lecture Notes in Computer Science. Vol. 8043. Berlin, Heidelberg: Springer. pp. 90–108. doi:10Knowledge extraction (4,413 words) [view diff] exact match in snippet view article find links to article
Acquisition Method for the Semantic Web", WAIM, volume 3739 of Lecture Notes in Computer Science, page 209-220. Springer. doi:10.1007/11563952_19 Tirmizi etIan Horrocks (1,058 words) [view diff] exact match in snippet view article find links to article
Reasoner: System Description" (PDF). Automated Reasoning. Lecture Notes in Computer Science. Vol. 4130. pp. 292–297. CiteSeerX 10.1.1.65.2672. doi:10Knowledge extraction (4,413 words) [view diff] exact match in snippet view article find links to article
Acquisition Method for the Semantic Web", WAIM, volume 3739 of Lecture Notes in Computer Science, page 209-220. Springer. doi:10.1007/11563952_19 Tirmizi etIan Horrocks (1,058 words) [view diff] exact match in snippet view article find links to article
Reasoner: System Description" (PDF). Automated Reasoning. Lecture Notes in Computer Science. Vol. 4130. pp. 292–297. CiteSeerX 10.1.1.65.2672. doi:10RC2 (423 words) [view diff] exact match in snippet view article find links to article
Qing, S. (eds.). Information and Communications Security. Lecture Notes in Computer Science. Vol. 1334. Springer, Berlin, Heidelberg. pp. 233–246. doi:10Datalog (4,901 words) [view diff] exact match in snippet view article find links to article
Georg; Furche, Tim; Sellers, Andrew (eds.). Datalog Reloaded. Lecture Notes in Computer Science. Vol. 6702. Berlin, Heidelberg: Springer. pp. 181–220. doi:10C. Pandu Rangan (1,223 words) [view diff] exact match in snippet view article find links to article
and Security (SETS), (2005-2007). Member, Editorial Board, Lecture Notes in Computer Science Series (LNCS Series), Springer-Verlag, Germany, (2005-2008)Pancake sorting (2,201 words) [view diff] exact match in snippet view article find links to article
Tighter Inapproximability Results". Proc. 26th ICALP (1999). Lecture Notes in Computer Science. 1644: 200–09. Berman, P.; Karpinski, M.; Hannenhalli, S.Özalp Babaoğlu (1,201 words) [view diff] exact match in snippet view article find links to article
Peer-to-Peer Applications", Engineering Self-Organising Systems, Lecture Notes in Computer Science, vol. 2977, Berlin, Heidelberg: Springer Berlin HeidelbergInductive programming (2,546 words) [view diff] exact match in snippet view article find links to article
Programming and Beyond; Essays in Honour of Robert A. Kowalski. Lecture Notes in Computer Science. Vol. LNAI 2407. pp. 310–346. doi:10.1007/3-540-45628-7_13Hartmut Ehrig (710 words) [view diff] exact match in snippet view article find links to article
Graph-Grammars and Their Application to Computer Science and Biology. Lecture Notes in Computer Science. Vol. 73. Heidelberg: Springer. doi:10.1007/BFb0025726.Memory-hard function (825 words) [view diff] exact match in snippet view article find links to article
In Boneh, Dan (ed.). Advances in Cryptology - CRYPTO 2003. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. pp. 426–444. doi:10.1007/978-3-540-45146-4_25Scale-space segmentation (1,199 words) [view diff] exact match in snippet view article find links to article
watershed segmentation" (PDF). Image Analysis and Processing. Lecture Notes in Computer Science. Vol. 1310. pp. 6–13. doi:10.1007/3-540-63507-6_178. ISBN 978-3-540-63507-9Orc (programming language) (483 words) [view diff] exact match in snippet view article
Orchestration and Its Semantic Properties. Concurrency Theory. Lecture Notes in Computer Science. Vol. 4137. Bonn, Germany: Springer. pp. 477–491. doi:10.1007/11817949_32Gennady Makanin (1,099 words) [view diff] exact match in snippet view article find links to article
equations in a free group". Word Equations and Related Topics. Lecture Notes in Computer Science. Vol. 572. pp. 1–11. doi:10.1007/3-540-55124-7_1. ISBN 978-3-540-55124-9Tatami (1,402 words) [view diff] exact match in snippet view article find links to article
2010, Nha Trang, Vietnam, July 19-21, 2010. Proceedings. Lecture Notes in Computer Science. Vol. 6196. Springer. pp. 288–297. arXiv:1103.3309. doi:10Semantic similarity (4,222 words) [view diff] exact match in snippet view article find links to article
International Conference on Geospatial Semantics (GEOS 2007). Lecture Notes in Computer Science. 2007. pp. 128–145. CiteSeerX 10.1.1.172.5544. "Geo-Net-PTTopincs (424 words) [view diff] exact match in snippet view article find links to article
For Topic Maps". Leveraging the Semantics of Topic Maps. Lecture Notes in Computer Science. Vol. 4438. Berlin Heidelberg: Springer. pp. 175–183. doi:10Infer Static Analyzer (780 words) [view diff] exact match in snippet view article find links to article
Verifier for Memory Safety of C Programs". NASA Formal Methods. Lecture Notes in Computer Science. Vol. 6617. Springer, Berlin, Heidelberg. pp. 459–465. CiteSeerX 10Strong RSA assumption (228 words) [view diff] exact match in snippet view article find links to article
(eds) Advances in Cryptology – EUROCRYPT ’97. EUROCRYPT 1997. Lecture Notes in Computer Science, vol 1233. Springer, Berlin, Heidelberg. doi:10.1007/3-540-69053-0_33Cryptographic multilinear map (1,027 words) [view diff] exact match in snippet view article find links to article
cryptography at high security levels". Cryptography and Coding. Lecture Notes in Computer Science. Vol. 3796. pp. 13–36. doi:10.1007/11586821_2. ISBN 978-3-540-30276-6Instrumental convergence (2,947 words) [view diff] exact match in snippet view article find links to article
and Intelligent Agents". Artificial General Intelligence. Lecture Notes in Computer Science. Vol. 6830. pp. 11–20. doi:10.1007/978-3-642-22887-2_2.Truthful job scheduling (1,748 words) [view diff] exact match in snippet view article find links to article
Machines". In Diekert, Volker; Habib, Michel (eds.). Stacs 2004. Lecture Notes in Computer Science. Vol. 2996. Berlin, Heidelberg: Springer. pp. 608–619. doi:10Key generator (213 words) [view diff] exact match in snippet view article find links to article
and Key Distribution". Advances in Cryptology — CRYPTO' 93. Lecture Notes in Computer Science. Vol. 773. pp. 232–249. CiteSeerX 10.1.1.62.3423. doi:10Massive Online Analysis (803 words) [view diff] exact match in snippet view article find links to article
Data Streams". Advanced Information Systems Engineering. Lecture Notes in Computer Science. Vol. 8188. pp. 480–492. CiteSeerX 10.1.1.638.5472. doi:10Computational hardness assumption (3,303 words) [view diff] exact match in snippet view article find links to article
Position Paper". Theory of Cryptography Conference (TCC) 2016. Lecture Notes in Computer Science. Vol. 9562. Springer. pp. 505–522. doi:10.1007/978-3-662-49096-9_21Program structure tree (1,164 words) [view diff] exact match in snippet view article find links to article
International Colloquium on Automata, Languages and Programming, Lecture Notes in Computer Science, vol. 443, Springer-Verlag, pp. 598–611, doi:10.1007/BFb0032061Proof of work (4,070 words) [view diff] exact match in snippet view article find links to article
Combatting Junk Mail". Advances in Cryptology — CRYPTO' 92. Lecture Notes in Computer Science. Vol. 740. Springer. pp. 139–147. doi:10.1007/3-540-48071-4_10Feature engineering (2,183 words) [view diff] exact match in snippet view article find links to article
(PDF). Principles of Data Mining and Knowledge Discovery. Lecture Notes in Computer Science. Vol. 1704. pp. 378–383. doi:10.1007/978-3-540-48247-5_46Flora-2 (786 words) [view diff] exact match in snippet view article find links to article
for Semantic Web, Formal Approaches to Agent-Based Systems, Lecture Notes in Computer Science v. 3228, Springer Verlag. A. D. Lattner , J. D. Gehrke , ITWINKLE (695 words) [view diff] exact match in snippet view article find links to article
Christof (eds.). Cryptographic Hardware and Embedded Systems. Lecture Notes in Computer Science. Vol. 1717. Berlin, Heidelberg: Springer. pp. 2–12. doi:10Aircrack-ng (5,018 words) [view diff] exact match in snippet view article find links to article
Attack on TKIP", Identity and Privacy in the Internet Age, Lecture Notes in Computer Science, vol. 5838, Berlin, Heidelberg: Springer Berlin HeidelbergServer-based signatures (1,187 words) [view diff] exact match in snippet view article find links to article
Signatures". Advances in Cryptology – CRYPTO' 89 Proceedings. Lecture Notes in Computer Science. Vol. 435. p. 263. doi:10.1007/0-387-34805-0_24. ISBN 978-0-387-97317-3Dense subgraph (1,897 words) [view diff] exact match in snippet view article find links to article
Saarbrücken, Germany, September 5-8, 2000, Proceedings, Lecture Notes in Computer Science, vol. 1913, Springer, pp. 84–95, doi:10.1007/3-540-44436-X_10UpStage (1,499 words) [view diff] exact match in snippet view article find links to article
Paolo; Urban, Bodo (eds.). Transactions on Edutainment X. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. pp. 146–160. doi:10.1007/978-3-642-37919-2_8Global Digital Mathematics Library (271 words) [view diff] exact match in snippet view article find links to article
CICM 2017, Edinburgh, UK, July 17-21, 2017, Proceedings, Lecture Notes in Computer Science, vol. 10383, Springer, pp. 56–69, doi:10.1007/978-3-319-62075-6_5Roland Carl Backhouse (757 words) [view diff] exact match in snippet view article find links to article
Programming (AFP 98),12–19 September 1998 Braga Portugal]. Lecture Notes in Computer Science. Vol. 1608. pp. 28–115. doi:10.1007/10704973_2. ISBN 978-3-540-66241-9Digital signage (2,497 words) [view diff] exact match in snippet view article find links to article
Campilho, Aurélio (eds.). Image Analysis and Recognition. Lecture Notes in Computer Science. Vol. 5627. Berlin, Heidelberg: Springer. pp. 347–358. doi:10McEliece cryptosystem (2,092 words) [view diff] exact match in snippet view article find links to article
Fourier sampling attacks. Advances in cryptology—CRYPTO 2011. Lecture Notes in Computer Science. Vol. 6841. Heidelberg: Springer. pp. 761–779. doi:10Information Processing in Medical Imaging (1,631 words) [view diff] exact match in snippet view article find links to article
Medical Imaging - 12th | Alan C.F. Colchester | Springer. Lecture Notes in Computer Science. Springer. 1991. ISBN 9783540542469. Barrett, Harrison H.Cooperating Validity Checker (1,994 words) [view diff] exact match in snippet view article find links to article
Kovács, Laura; Pattinson, Dirk (eds.). Automated Reasoning. Lecture Notes in Computer Science. Vol. 13385. Cham: Springer International Publishing. pp. 15–35Achterbahn (stream cipher) (532 words) [view diff] exact match in snippet view article
Encryption, 14th International Workshop. Revised Selected Papers, Lecture Notes in Computer Science. Vol. 4593. Luxembourg: Springer. pp. 73–86. ISBN 978-3-540-74617-1Table (information) (1,461 words) [view diff] exact match in snippet view article
Applications of Natural Language to Information Systems (NLDB 2016). Lecture Notes in Computer Science. 9612: 162–174. doi:10.1007/978-3-319-41754-7_14. ISBN 978-3-319-41753-0Urban informatics (3,295 words) [view diff] exact match in snippet view article find links to article
Cities Technologies, Experiences, and Future Perspectives. Lecture Notes in Computer Science. Vol. 1765. Berlin: Springer. doi:10.1007/3-540-46422-0.Apache Lucene (1,258 words) [view diff] exact match in snippet view article find links to article
Castells, Pablo (eds.), Advances in Information Retrieval, Lecture Notes in Computer Science, vol. 12036, Cham: Springer International Publishing, pp. 28–34Global Digital Mathematics Library (271 words) [view diff] exact match in snippet view article find links to article
CICM 2017, Edinburgh, UK, July 17-21, 2017, Proceedings, Lecture Notes in Computer Science, vol. 10383, Springer, pp. 56–69, doi:10.1007/978-3-319-62075-6_5Lattice problem (3,660 words) [view diff] exact match in snippet view article find links to article
Extreme Pruning". Advances in Cryptology – EUROCRYPT 2010. Lecture Notes in Computer Science. Vol. 6110. Springer, Berlin, Heidelberg. pp. 257–278. doi:10ESC/Java (925 words) [view diff] exact match in snippet view article find links to article
2001: Formal Methods for Increasing Software Productivity. Lecture Notes in Computer Science. Vol. 2021. pp. 500–517. doi:10.1007/3-540-45251-6_29. ISBN 3-540-41791-5Patricia Bouyer-Decitre (470 words) [view diff] exact match in snippet view article find links to article
Software Technology and Theoretical Computer Science (PDF), Lecture Notes in Computer Science, vol. 3328, Springer, pp. 148–160, doi:10.1007/978-3-540-30538-5_13Pseudotriangle (2,058 words) [view diff] exact match in snippet view article find links to article
of Software Technology and Theoretical Computer Science, Lecture Notes in Computer Science, vol. 3328, Springer-Verlag, pp. 299–310, arXiv:0705.3888Paulo S. L. M. Barreto (833 words) [view diff] exact match in snippet view article find links to article
Identity-Based Signatures and Signcryption from Bilinear Maps. Lecture Notes in Computer Science. Vol. 3788. pp. 515–532. doi:10.1007/11593447_28. ISBN 978-3-540-30684-9Random subspace method (974 words) [view diff] exact match in snippet view article find links to article
neighbors in random subspaces". Advances in Pattern Recognition. Lecture Notes in Computer Science. Vol. 1451. pp. 640–648. doi:10.1007/BFb0033288. ISBN 978-3-540-64858-1Proof of secure erasure (635 words) [view diff] exact match in snippet view article find links to article
Computable Self-erasing Functions". Theory of Cryptography. Lecture Notes in Computer Science. Vol. 6597. pp. 125–143. doi:10.1007/978-3-642-19571-6_9.Ron Rivest (1,543 words) [view diff] exact match in snippet view article find links to article
Theory, Reykjavík, Iceland, July 3–5, 1996, Proceedings. Lecture Notes in Computer Science. Vol. 1097. Springer. pp. 368–379. doi:10.1007/3-540-61422-2_146Semantics (computer science) (1,671 words) [view diff] exact match in snippet view article
computation". Category Theory Applied to Computation and Control. Lecture Notes in Computer Science. Vol. 25. Springer. pp. 151–163. doi:10.1007/3-540-07142-3_75Heavy-light decomposition (1,017 words) [view diff] exact match in snippet view article find links to article
trees", Algorithms and data structures (Ottawa, ON, 1991), Lecture Notes in Computer Science, vol. 519, Berlin: Springer, pp. 32–40, doi:10.1007/BFb0028247Linguistic Linked Open Data (3,694 words) [view diff] exact match in snippet view article find links to article
Conference, Sydney, NSW, Australia, October 21–25, 2013. Lecture Notes in Computer Science. Vol. 7908. Berlin, Heidelberg: Springer. pp. 98–113. doi:10SMP (computer algebra system) (593 words) [view diff] exact match in snippet view article
Jenks, "A Primer: 11 Keys to New Scratchpad", EUROSAM 84, Lecture Notes in Computer Science 174 ISBN 354013350X p. 123-142 J.H. Davenport, Y. Siret, EOsman Yaşar (445 words) [view diff] exact match in snippet view article find links to article
Workforce and Pedagogy to Improve Math and Science Education,” Lecture Notes in Computer Science, Vol. 3992 (2006), pp. 169–176. O. Yaşar, J. Maliekal, L.DES-X (533 words) [view diff] exact match in snippet view article find links to article
Attacks". Advances in Cryptology — EUROCRYPT 2000 (PDF). Lecture Notes in Computer Science. Vol. 1807. pp. 589–606. doi:10.1007/3-540-45539-6_41.Set packing (1,514 words) [view diff] exact match in snippet view article find links to article
International Colloquium on Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 1443. Springer-Verlag. pp. 176–185. Halldórsson, MagnusZooko Wilcox-O'Hearn (569 words) [view diff] exact match in snippet view article find links to article
as MD5" (PDF). Applied Cryptography and Network Security. Lecture Notes in Computer Science. Vol. 7954. IACR. pp. 119–135. doi:10.1007/978-3-642-38980-1_8Security level (1,332 words) [view diff] exact match in snippet view article find links to article
precomputation" (PDF). Advances in Cryptology - ASIACRYPT 2013. Lecture Notes in Computer Science. pp. 321–340. doi:10.1007/978-3-642-42045-0_17. ISBN 978-3-642-42044-3School timetable (1,074 words) [view diff] exact match in snippet view article find links to article
Programming, Artificial Intelligence, and Operations Research. Lecture Notes in Computer Science. Vol. 12296. Springer International Publishing. pp. 283–299Monadic second-order logic (1,308 words) [view diff] exact match in snippet view article find links to article
Are Computable with Linear Delay". Computer Science Logic. Lecture Notes in Computer Science. 4207. Springer Berlin Heidelberg: 167–181. doi:10.1007/11874683_11Mizar system (1,225 words) [view diff] exact match in snippet view article find links to article
TPHOLs 2009, Munich, Germany, August 17–20, 2009. Proceedings. Lecture Notes in Computer Science. Vol. 5674. Springer. pp. 67–72. doi:10.1007/978-3-642-03359-9_5Distributed key generation (1,191 words) [view diff] exact match in snippet view article find links to article
Identity-Based Cryptography". Security and Cryptography for Networks. Lecture Notes in Computer Science. Vol. 6280. pp. 436–453. CiteSeerX 10.1.1.389.4486. doi:10Philippe Baptiste (4,439 words) [view diff] exact match in snippet view article find links to article
Principles and Practice of Constraint Programming – CP 2009, Lecture Notes in Computer Science, vol. 5732, Berlin, Heidelberg: Springer Berlin HeidelbergSearchable symmetric encryption (2,431 words) [view diff] exact match in snippet view article find links to article
Moti (eds.). Applied Cryptography and Network Security. Lecture Notes in Computer Science. Vol. 3531. Berlin, Heidelberg: Springer. pp. 442–455. doi:10Moni Naor (681 words) [view diff] exact match in snippet view article find links to article
Advances in Cryptology — CRYPTO' 93 (Extended abstract). Lecture Notes in Computer Science. Vol. 773. pp. 480–491. doi:10.1007/3-540-48329-2_40. ISBN 978-3-540-57766-9Curve25519 (1,797 words) [view diff] exact match in snippet view article find links to article
Public Key Cryptography - PKC 2006. Public Key Cryptography. Lecture Notes in Computer Science. Vol. 3958. New York: Springer. pp. 207–228. doi:10.1007/11745853_14Markovian arrival process (1,008 words) [view diff] exact match in snippet view article find links to article
Performance Evaluation of Computer and Communication Systems. Lecture Notes in Computer Science. Vol. 729. pp. 330–358. doi:10.1007/BFb0013859. ISBN 3-540-57297-XSoftware diversity (818 words) [view diff] exact match in snippet view article find links to article
(2011), "Diversity", Dependable and Historic Computing, Lecture Notes in Computer Science, vol. 6875, Springer Berlin Heidelberg, pp. 298–312, doi:10GroupLens Research (3,181 words) [view diff] exact match in snippet view article find links to article
Development. Asia-Pacific Conference on Web Intelligence. Lecture Notes in Computer Science. Vol. 2198/2001. Springer Berlin/Heidelberg. pp. 438–442.Deepak Kapur (1,936 words) [view diff] exact match in snippet view article find links to article
specifications". 9th International Conference on Automated Deduction. Lecture Notes in Computer Science. Vol. 310. Springer, Berlin, Heidelberg. pp. 162–181. doi:10Congestion game (7,315 words) [view diff] exact match in snippet view article find links to article
Kontogiannis, Spyros (eds.). Internet and Network Economics. Lecture Notes in Computer Science. Vol. 4286. Berlin, Heidelberg: Springer. pp. 87–98. doi:10Ball tree (1,401 words) [view diff] exact match in snippet view article find links to article
Similar Patches in Images?". Computer Vision – ECCV 2008 (PDF). Lecture Notes in Computer Science. Vol. 5303. p. 364. CiteSeerX 10.1.1.360.7582. doi:10Mutilated chessboard problem (2,878 words) [view diff] exact match in snippet view article find links to article
2010, Nha Trang, Vietnam, July 19–21, 2010, Proceedings, Lecture Notes in Computer Science, vol. 6196, Springer, pp. 288–297, arXiv:1103.3309, doi:10Uniform-machines scheduling (1,767 words) [view diff] exact match in snippet view article find links to article
Machines". In Diekert, Volker; Habib, Michel (eds.). Stacs 2004. Lecture Notes in Computer Science. Vol. 2996. Berlin, Heidelberg: Springer. pp. 608–619. doi:10Ball tree (1,401 words) [view diff] exact match in snippet view article find links to article
Similar Patches in Images?". Computer Vision – ECCV 2008 (PDF). Lecture Notes in Computer Science. Vol. 5303. p. 364. CiteSeerX 10.1.1.360.7582. doi:10Congestion game (7,315 words) [view diff] exact match in snippet view article find links to article
Kontogiannis, Spyros (eds.). Internet and Network Economics. Lecture Notes in Computer Science. Vol. 4286. Berlin, Heidelberg: Springer. pp. 87–98. doi:10Envy-free pricing (2,559 words) [view diff] exact match in snippet view article find links to article
Walukiewicz, Igor (eds.). Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 5125. Springer Berlin Heidelberg. pp. 808–819. CiteSeerX 10Logic for Computable Functions (614 words) [view diff] exact match in snippet view article find links to article
(1979). Edinburgh LCF: A Mechanised Logic of Computation. Lecture Notes in Computer Science. Vol. 78. Berlin Heidelberg: Springer. doi:10.1007/3-540-09724-4Markus Jakobsson (1,236 words) [view diff] exact match in snippet view article find links to article
Trustworthy Elections: New Directions in Electronic Voting (Lecture Notes in Computer Science / Security and Cryptology), David Chaum, Markus JakobssonKlaus Pohl (computer scientist) (725 words) [view diff] exact match in snippet view article
1st European Conference ServiceWave 2008, Volume 5377 of Lecture Notes in Computer Science, Berlin, Heidelberg, Springer, 2008. Klaus Pohl, Patrick HeymansMutilated chessboard problem (2,878 words) [view diff] exact match in snippet view article find links to article
2010, Nha Trang, Vietnam, July 19–21, 2010, Proceedings, Lecture Notes in Computer Science, vol. 6196, Springer, pp. 288–297, arXiv:1103.3309, doi:10Product-form solution (1,817 words) [view diff] exact match in snippet view article find links to article
and Product Form". Applications and Theory of Petri Nets. Lecture Notes in Computer Science. Vol. 5606. p. 103. CiteSeerX 10.1.1.745.1585. doi:10Ring signature (1,942 words) [view diff] exact match in snippet view article find links to article
Leak a Secret". Advances in Cryptology — ASIACRYPT 2001. Lecture Notes in Computer Science. Vol. 2248. pp. 552–565. doi:10.1007/3-540-45682-1_32.HipNav (172 words) [view diff] exact match in snippet view article find links to article
Computing and Computer-Assisted Intervention – MICCAI 2000. Lecture Notes in Computer Science. Vol. 1935. pp. 1185–7. doi:10.1007/978-3-540-40899-4_126Key encapsulation mechanism (3,061 words) [view diff] exact match in snippet view article find links to article
Ciphertext Attack. Advances in Cryptology – EUROCRYPT 2000. Lecture Notes in Computer Science. Vol. 1807. Bruges, Belgium: Springer. pp. 275–288. doi:10SHA-2 (4,982 words) [view diff] exact match in snippet view article find links to article
(2008), New collision attacks against up to 24-step SHA-2, Lecture Notes in Computer Science, vol. 5365, Springer-Verlag, pp. 91–103, doi:10.1007/978-3-540-89754-5_8Ontology (information science) (6,194 words) [view diff] exact match in snippet view article
NSW, Australia, October 21–25, 2013, Proceedings, Part I. Lecture Notes in Computer Science. Vol. 8218. Berlin: Springer. pp. 117–134. doi:10.1007/978-3-642-41335-3_8NP-intermediate (1,534 words) [view diff] exact match in snippet view article find links to article
JELIA 2002, Cosenza, Italy, September, 23-26, Proceedings. Lecture Notes in Computer Science. Vol. 2424. Springer. pp. 549–564. doi:10.1007/3-540-45757-7_53Schnorr signature (1,248 words) [view diff] exact match in snippet view article find links to article
Application of Cryptographic Techniques. Proceedings of CRYPTO '86. Lecture Notes in Computer Science. Vol. 263. pp. 186–194. doi:10.1007/3-540-47721-7_12. ISBN 978-3-540-18047-0Inheritance (object-oriented programming) (3,814 words) [view diff] exact match in snippet view article
European Conference on Object-Oriented Programming (ECOOP). Lecture Notes in Computer Science. Vol. 1445. Springer. pp. 355–382. doi:10.1007/BFb0054099Belief–desire–intention software model (2,129 words) [view diff] exact match in snippet view article find links to article
Knowledge-Based Intelligent Information and Engineering Systems. Lecture Notes in Computer Science. Vol. 3683. pp. 282–288. doi:10.1007/11553939_41. ISBN 978-3-540-28896-1Matrix analytic method (912 words) [view diff] exact match in snippet view article find links to article
Performance Evaluation of Complex Systems: Techniques and Tools. Lecture Notes in Computer Science. Vol. 2459. pp. 36. doi:10.1007/3-540-45798-4_3. ISBN 978-3-540-44252-3Poly1305 (2,513 words) [view diff] exact match in snippet view article find links to article
Software Encryption: 12th international workshop. FSE 2005. Lecture Notes in Computer Science. Paris, France: Springer. doi:10.1007/11502760_3. ISBN 3-540-26541-4Romeo Model Checker (159 words) [view diff] exact match in snippet view article find links to article
Conference on Computer Aided Verification (CAV'05), volume 3576 of Lecture Notes in Computer Science, pages 418-423, Edinburgh, Scotland, UK, July 2005. SpringerProlog (8,098 words) [view diff] exact match in snippet view article find links to article
Programming". Constructing Logic Programs, (Ed. J.M.J. Jacquet). Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence: 27–140. CiteSeerX 10Doll fetish (220 words) [view diff] exact match in snippet view article find links to article
Li, Dongyu; Perez-Osorio, Jairo (eds.). Social Robotics. Lecture Notes in Computer Science. Vol. 13086. Cham: Springer International Publishing. pp. 130–141International Conference on Computational Intelligence Methods for Bioinformatics and Biostatistics (856 words) [view diff] exact match in snippet view article find links to article
Intelligence Methods for Bioinformatics and Biostatistics. Lecture Notes in Computer Science. Vol. 7548. Springer. pp. 238–252. doi:10.1007/978-3-642-35686-5_20Device fingerprint (3,942 words) [view diff] exact match in snippet view article find links to article
Atallah MJ, Hopper NJ (eds.). Privacy Enhancing Technologies. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 1–18. ISBN 978-3-642-14527-8Threefish (1,366 words) [view diff] exact match in snippet view article find links to article
Seoul, Korea, February 7–10, 2010, Revised Selected Papers. Lecture Notes in Computer Science. Vol. 6147. Springer. pp. 333–346. doi:10.1007/978-3-642-13858-4_19Constrained Horn clauses (593 words) [view diff] exact match in snippet view article find links to article
Constantin; Lal, Akash (eds.). Computer Aided Verification. Lecture Notes in Computer Science. Cham: Springer Nature Switzerland. pp. 209–223. doi:10Courcelle's theorem (3,146 words) [view diff] exact match in snippet view article find links to article
(eds.), Proc. 18th Annual European Symposium on Algorithms, Lecture Notes in Computer Science, vol. 6346, Springer, pp. 549–560, doi:10.1007/978-3-642-15775-2_47Area (graph drawing) (937 words) [view diff] exact match in snippet view article
2002, Irvine, CA, USA, August 26–28, 2002, Revised Papers, Lecture Notes in Computer Science, vol. 2528, Springer, pp. 54–65, doi:10.1007/3-540-36151-0_6Jutta Treviranus (5,359 words) [view diff] exact match in snippet view article find links to article
Interaction. Design and Development Methods for Universal Access. Lecture Notes in Computer Science. Vol. 8513. Springer International Publishing. pp. 191–202Cipher security summary (801 words) [view diff] exact match in snippet view article find links to article
"Attacking Triple Encryption". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 1372. Springer. pp. 239–253. doi:10.1007/3-540-69710-1_16Artificial psychology (710 words) [view diff] exact match in snippet view article find links to article
Psychology". In Smith, Michael J.; Salvendy, Gavriel (eds.). Lecture Notes in Computer Science. Vol. 4557. Springer Berlin Heidelberg. pp. 208–217. doi:10Feedback vertex set (1,805 words) [view diff] exact match in snippet view article find links to article
Number". In Kaplan, Haim (ed.). Algorithm Theory - SWAT 2010. Lecture Notes in Computer Science. Vol. 6139. Berlin, Heidelberg: Springer. pp. 81–92. Bibcode:2010LNCSNorman Paton (1,101 words) [view diff] exact match in snippet view article find links to article
Model database". Advances in Database Technology—EDBT '88. Lecture Notes in Computer Science. Vol. 303. p. 34. doi:10.1007/3-540-19074-0_46. ISBN 978-3-540-19074-5C Bounded Model Checker (740 words) [view diff] exact match in snippet view article find links to article
Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. pp. 168–176. doi:10.1007/978-3-540-24730-2_15Asiddhatva (1,594 words) [view diff] exact match in snippet view article find links to article
Model of Aṣṭādhyāyī". Sanskrit Computational Linguistics. Lecture Notes in Computer Science. Vol. 6465. p. 1. doi:10.1007/978-3-642-17528-2_18. ISBN 978-3-642-17527-5Evolvable hardware (799 words) [view diff] exact match in snippet view article find links to article
with physics". Evolvable Systems: From Biology to Hardware. Lecture Notes in Computer Science. Vol. 1259. pp. 390–405. CiteSeerX 10.1.1.50.9691. doi:10Shape analysis (program analysis) (1,034 words) [view diff] exact match in snippet view article
Analysis for Recursive Programs" (PDF). Compiler Construction. Lecture Notes in Computer Science. Vol. 2027. pp. 133–149. doi:10.1007/3-540-45306-7_10.Evolvable hardware (799 words) [view diff] exact match in snippet view article find links to article
with physics". Evolvable Systems: From Biology to Hardware. Lecture Notes in Computer Science. Vol. 1259. pp. 390–405. CiteSeerX 10.1.1.50.9691. doi:10Abstract interpretation (2,924 words) [view diff] exact match in snippet view article find links to article
Programming Language Implementation and Logic Programming (PLILP). Lecture Notes in Computer Science. Vol. 631. Springer. pp. 269–296. ISBN 978-0-387-55844-8.Uplift modelling (2,172 words) [view diff] exact match in snippet view article find links to article
Uplift Modeling". Advanced Information Systems Engineering. Lecture Notes in Computer Science. Vol. 8190. Prague. pp. 595–611. doi:10.1007/978-3-642-40994-3_38Mathias Payer (1,590 words) [view diff] exact match in snippet view article find links to article
of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science. Vol. 9148. pp. 144–164. doi:10.1007/978-3-319-20550-2_8.List of NP-complete problems (2,746 words) [view diff] exact match in snippet view article find links to article
complexity of upward and rectilinear planarity testing". Lecture Notes in Computer Science. Vol. 894/1995. pp. 286–297. doi:10.1007/3-540-58950-3_384Folksonomy (3,215 words) [view diff] exact match in snippet view article find links to article
R; Ausloos, M. (2005). Computational Science – ICCS 2006. Lecture Notes in Computer Science. Vol. 3993. pp. 1114–1117. arXiv:cs.DS/0512090. doi:10.1007/11758532_152Unicheck (760 words) [view diff] exact match in snippet view article find links to article
System". Natural Language Processing and Information Systems. Lecture Notes in Computer Science. Vol. 10260. Springer, Cham. pp. 227–231. doi:10.1007/978-3-319-59569-6_27Long short-term memory (5,788 words) [view diff] exact match in snippet view article find links to article
Structure of the Blues". Artificial Neural Networks — ICANN 2002. Lecture Notes in Computer Science. Vol. 2415. Springer, Berlin, Heidelberg. pp. 284–289. CiteSeerX 10Jon Lee (mathematician) (413 words) [view diff] exact match in snippet view article
2012), Integer Programming and Combinatorial Optimization (Lecture Notes in Computer Science, Vol. 8494; Springer, 2014), Special Issue: Integer ProgrammingRational monoid (633 words) [view diff] exact match in snippet view article find links to article
to Symeon Bozapalidis on the occasion of his retirement. Lecture Notes in Computer Science. Vol. 7020. Berlin: Springer-Verlag. pp. 228–256. ISBN 978-3-642-24896-2Group-based cryptography (355 words) [view diff] exact match in snippet view article find links to article
on the Word Problem". Advances in Cryptology—CRYPTO 1984. Lecture Notes in Computer Science. Vol. 196. Springer. pp. 19–36. doi:10.1007/3-540-39568-7_3Jayadev Misra (1,066 words) [view diff] exact match in snippet view article find links to article
Course. A Decade of Concurrency Reflections and Perspectives. Lecture Notes in Computer Science (LNCS). Vol. 803. Springer, Berlin, Heidelberg. p. 352. doi:10Böhm tree (1,874 words) [view diff] exact match in snippet view article find links to article
labelled λ-calculus". λ-Calculus and Computer Science Theory. Lecture Notes in Computer Science. Vol. 37. pp. 147–165. doi:10.1007/BFb0029523. ISBN 3-540-07416-3BLAST model checker (386 words) [view diff] exact match in snippet view article find links to article
Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science. Vol. 7214. Springer-Verlag. pp. 525–527. ISBN 978-3-642-28756-5Deterministic finite automaton (3,736 words) [view diff] exact match in snippet view article find links to article
Theoretical Results and Applications. ICGI 2010. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Vol. 6339. pp. 66–79. doi:10.1007/978-3-642-15488-1_7Arc diagram (2,597 words) [view diff] exact match in snippet view article find links to article
WA, USA, September 19–21, 2012, Revised Selected Papers, Lecture Notes in Computer Science, vol. 7704, Springer, pp. 150–161, doi:10.1007/978-3-642-36763-2_14Evolution strategy (2,053 words) [view diff] exact match in snippet view article find links to article
information". Parallel Problem Solving from Nature — PPSN III. Lecture Notes in Computer Science. Vol. 866. Springer. pp. 189–198. doi:10.1007/3-540-58484-6_263Genetic programming (3,313 words) [view diff] exact match in snippet view article find links to article
Discovery". Parallel Problem Solving from Nature PPSN VI. Lecture Notes in Computer Science. Vol. 1917. Springer. pp. 211–220. doi:10.1007/3-540-45356-3_21Quotient type (648 words) [view diff] exact match in snippet view article find links to article
Clarke, Edmund; Kozen, Dexter (eds.). Logics of Programs. Lecture Notes in Computer Science. Vol. 164. Berlin, Heidelberg: Springer. pp. 116–128. doi:10Neighbor joining (2,881 words) [view diff] exact match in snippet view article find links to article
reconstruction", pp. 101–110. In Jiang, T., and Lee, D., eds., Lecture Notes in Computer Science, 1276, Springer-Verlag, Berlin. COCOON '97. Mihaescu R, LevyData augmentation (1,772 words) [view diff] exact match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems – CHES 2017. Lecture Notes in Computer Science. Vol. 10529. Cham: Springer International Publishing. pp. 45–68Optical braille recognition (716 words) [view diff] exact match in snippet view article find links to article
Robust Braille Recognition System". Document Analysis Systems. Lecture Notes in Computer Science. Vol. VI. pp. 533–545. doi:10.1007/978-3-540-28640-0_50.Interactive computation (195 words) [view diff] exact match in snippet view article find links to article
Persistent Turing Machines as a model of interactive computation. Lecture Notes in Computer Science 1762, pp. 116-135. D. Goldin, S. Smolka, P. Attie, E. SondereggerBinary decision diagram (3,067 words) [view diff] exact match in snippet view article find links to article
Conference on Principles and Practice of Constraint Programming. Lecture Notes in Computer Science. Vol. 3258. Springer. p. 816. doi:10.1007/978-3-540-30201-8_94Dorothea Wagner (634 words) [view diff] exact match in snippet view article find links to article
Dorothea, eds. (2001), Drawing Graphs: Methods and Models, Lecture Notes in Computer Science, vol. 2025, Springer, doi:10.1007/3-540-44969-8, ISBN 9783540420620SMASH (hash) (314 words) [view diff] exact match in snippet view article
Design Strategy Called SMASH". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 3897. pp. 233–244. doi:10.1007/11693383_16. ISBN 978-3-540-33108-7Gad Landau (1,254 words) [view diff] exact match in snippet view article find links to article
on Trees and Tree-Like Structures". Algorithms – ESA 2013. Lecture Notes in Computer Science. Vol. 8125. pp. 517–528. arXiv:1301.6127. doi:10.1007/978-3-642-40450-4_44MilkyWay@home (2,638 words) [view diff] exact match in snippet view article find links to article
Grids". Distributed Applications and Interoperable Systems. Lecture Notes in Computer Science. Vol. 6115. pp. 29–41. doi:10.1007/978-3-642-13645-0_3.Cryptosystem (497 words) [view diff] exact match in snippet view article find links to article
Steinfeld, Ron (eds.). Information Security and Privacy. Lecture Notes in Computer Science. Vol. 9723. Cham: Springer International Publishing. pp. 73–86Rijnland Internet Election System (333 words) [view diff] exact match in snippet view article find links to article
Abolishment". Foundations of Security Analysis and Design V. Lecture Notes in Computer Science. Vol. 5705. p. 121. doi:10.1007/978-3-642-03829-7_4. ISBN 978-3-642-03828-0Language-oriented programming (485 words) [view diff] exact match in snippet view article find links to article
in Language Workbenches". Software Language Engineering. Lecture Notes in Computer Science. Vol. 8225. pp. 197–217. doi:10.1007/978-3-319-02654-1_11Semantic search (298 words) [view diff] exact match in snippet view article find links to article
Web". The Semantic Web: Research and Applications. Eswc2012. Lecture Notes in Computer Science. Vol. 7295. pp. 422–436. doi:10.1007/978-3-642-30284-8_35Microsoft SEAL (515 words) [view diff] exact match in snippet view article find links to article
Thomas (eds.). Advances in Cryptology – ASIACRYPT 2017. Lecture Notes in Computer Science. Vol. 10624. Cham: Springer International Publishing. pp. 409–437Differential cryptanalysis (1,677 words) [view diff] exact match in snippet view article find links to article
EnRUPT". In Dunkelman, Orr (ed.). Fast Software Encryption. Lecture Notes in Computer Science. Vol. 5665. Berlin, Heidelberg: Springer. pp. 246–259. doi:10Spaghetti code (1,611 words) [view diff] exact match in snippet view article find links to article
proper exception handling". Lecture Notes in Computer Science. Ada – Europe '93 (Proceedings). Lecture Notes in Computer Science. Vol. 688. Springer BerlinGraph reduction machine (324 words) [view diff] exact match in snippet view article find links to article
Functional Programming Languages and Computer Architecture. Lecture Notes in Computer Science. Vol. 274. Berlin, Heidelberg: Springer. pp. 98–112. doi:10Dynamic convex hull (769 words) [view diff] exact match in snippet view article find links to article
upper envelopes", Algorithms and Data Structures (WADS 2005), Lecture Notes in Computer Science, vol. 3608, Berlin: Springer, pp. 269–281, doi:10.1007/11534273_24Undeniable signature (912 words) [view diff] exact match in snippet view article find links to article
Signatures". Advances in Cryptology — CRYPTO' 89 Proceedings. Lecture Notes in Computer Science. Vol. 435. pp. 212–216. doi:10.1007/0-387-34805-0_20. ISBN 978-0-387-97317-3Data-flow analysis (3,561 words) [view diff] exact match in snippet view article find links to article
SAS'99, Venice, Italy, September 22–24, 1999, Proceedings. Lecture Notes in Computer Science. Vol. 1694 (illustrated ed.). Springer. pp. 232–247 [233]Thousands of Problems for Theorem Provers (208 words) [view diff] exact match in snippet view article find links to article
Theorem Proving". KI 2009: Advances in Artificial Intelligence. Lecture Notes in Computer Science. Vol. 5803. pp. 435–443. CiteSeerX 10.1.1.329.1809. doi:10Verifiable random function (1,501 words) [view diff] exact match in snippet view article find links to article
Palash (eds.). Advances in Cryptology - ASIACRYPT 2013. Lecture Notes in Computer Science. Vol. 8270. Berlin, Heidelberg: Springer. pp. 280–300. doi:10All-or-nothing transform (627 words) [view diff] exact match in snippet view article find links to article
All-or-Nothing Transform". Advances in Cryptology — CRYPTO' 99. Lecture Notes in Computer Science. Vol. 1666. pp. 503–518. doi:10.1007/3-540-48405-1_32.Arthur Zimek (572 words) [view diff] exact match in snippet view article find links to article
Dimensionality?". Scientific and Statistical Database Management. Lecture Notes in Computer Science. Vol. 6187. Springer, Berlin, Heidelberg. pp. 482–500. CiteSeerX 10Simultaneous embedding (1,651 words) [view diff] exact match in snippet view article find links to article
Sydney, Australia, September 24–26, 2007, Revised Papers, Lecture Notes in Computer Science, vol. 4875, Berlin: Springer, pp. 280–290, doi:10.1007/978-3-540-77537-9_28RACE (Europe) (120 words) [view diff] exact match in snippet view article
Cryptology – EUROCRYPT '91. EUROCRYPT 1991. Lecture Notes in Computer Science, vol 547. Lecture Notes in Computer Science. Vol. 547. Springer. pp. 547–551. doi:10Specification and Description Language (1,106 words) [view diff] exact match in snippet view article find links to article
Diagrams". SDL 2013: Model-Driven Dependability Engineering. Lecture Notes in Computer Science. Vol. 7916. Springer Berlin Heidelberg. pp. 258–274. doi:10Undeniable signature (912 words) [view diff] exact match in snippet view article find links to article
Signatures". Advances in Cryptology — CRYPTO' 89 Proceedings. Lecture Notes in Computer Science. Vol. 435. pp. 212–216. doi:10.1007/0-387-34805-0_20. ISBN 978-0-387-97317-3Diffie–Hellman key exchange (5,437 words) [view diff] exact match in snippet view article find links to article
Protocols and their Security Analysis", Crytography and Coding, Lecture Notes in Computer Science, vol. 1355, pp. 30–45, CiteSeerX 10.1.1.25.387, doi:10.1007/BFb0024447TLA+ (4,068 words) [view diff] exact match in snippet view article find links to article
Correct Hardware Design and Verification Methods (PDF). Lecture Notes in Computer Science. Vol. 1703. Springer-Verlag. pp. 54–66. doi:10.1007/3-540-48153-2_6350 nm process (208 words) [view diff] exact match in snippet view article find links to article
". Constructive Side-Channel Analysis and Secure Design. Lecture Notes in Computer Science. Vol. 10348. pp. 207–222. doi:10.1007/978-3-319-64647-3_13Ada Programming Support Environment (437 words) [view diff] exact match in snippet view article find links to article
in Long, Fred (ed.), Software Engineering Environments, Lecture Notes in Computer Science, vol. 467, Springer Berlin Heidelberg, pp. 179–193, doi:10Ring learning with errors signature (2,570 words) [view diff] exact match in snippet view article find links to article
Gilbert, Henri (ed.). Advances in Cryptology – EUROCRYPT 2010. Lecture Notes in Computer Science. Vol. 6110. pp. 1–23. CiteSeerX 10.1.1.297.6108. doi:10Keystroke-level model (2,749 words) [view diff] exact match in snippet view article find links to article
Jacko, Julie A (ed.). Human-Computer Interaction. New Trends. Lecture Notes in Computer Science. Vol. 5610. Berlin Heidelberg: Springer-Verlag. p. 355. doi:10Property Specification Language (1,412 words) [view diff] exact match in snippet view article find links to article
Logic on Truncated Paths" (PDF). Computer Aided Verification. Lecture Notes in Computer Science. Vol. 2725. p. 27. doi:10.1007/978-3-540-45069-6_3. ISBN 978-3-540-40524-5Separation logic (3,646 words) [view diff] exact match in snippet view article find links to article
Verification, Model Checking, and Abstract Interpretation (PDF). Lecture Notes in Computer Science. Vol. 5403. pp. 266–277. doi:10.1007/978-3-540-93900-9_3.Stathis Zachos (601 words) [view diff] exact match in snippet view article find links to article
of Software Technology and Theoretical Computer Science. Lecture Notes in Computer Science. Vol. 287. pp. 443–455. doi:10.1007/3-540-18625-5_67. ISBN 978-3-540-18625-0Table of metaheuristics (3,875 words) [view diff] exact match in snippet view article find links to article
Hailin (eds.). Computational Intelligence and Security. Lecture Notes in Computer Science. Vol. 4456. Berlin, Heidelberg: Springer. pp. 167–176. doi:10Evolutionary multimodal optimization (1,292 words) [view diff] exact match in snippet view article find links to article
Approach to Multimodal Optimization: Self-adaptive Approach " (Lecture Notes in Computer Science, 2010, Volume 6457/2010, 95–104) C. Stoean, M. Preuss, R.QuickCheck (1,115 words) [view diff] exact match in snippet view article find links to article
Symposium on Functional and Logic Programming (FLOPS 2014). Lecture Notes in Computer Science. Vol. 8475. pp. 1–17. doi:10.1007/978-3-319-07151-0_1.NorduGrid (942 words) [view diff] exact match in snippet view article find links to article
NorduGrid ARC Middleware". Advances in Grid Computing - EGC 2005. Lecture Notes in Computer Science. Vol. 3470. Berlin/Heidelberg: Springer. pp. 861–871. doi:10Cryptographic nonce (881 words) [view diff] exact match in snippet view article find links to article
Bimal Roy; Willi Meier (eds.). Fast Software Encryption. Lecture Notes in Computer Science. Vol. 3017. pp. 348–358. doi:10.1007/978-3-540-25937-4_22Stephen Muggleton (783 words) [view diff] exact match in snippet view article find links to article
"Learning from positive data". Inductive Logic Programming. Lecture Notes in Computer Science. Vol. 1314. pp. 358–376. doi:10.1007/3-540-63494-0_65.F-FCSR (121 words) [view diff] exact match in snippet view article find links to article
stream cipher in Real Time" (PDF). In Pieprzyk, Josef (ed.). Lecture Notes in Computer Science. ASIACRYPT 2008. Vol. 5350. Springer Berlin / Heidelberg.List of PSPACE-complete problems (1,807 words) [view diff] exact match in snippet view article find links to article
is PSPACE-Complete". Automata, Languages, and Programming. Lecture Notes in Computer Science. Vol. 7965. pp. 497–503. arXiv:1209.1750. doi:10.1007/978-3-642-39206-1_42Babel program (391 words) [view diff] exact match in snippet view article find links to article
Potapova R., Mporas I. (eds) Speech and Computer. SPECOM 2017. Lecture Notes in Computer Science, vol 10458. Springer, Cham. https://doi.org/10.1007/978-3-319-66429-3_1Collaborative search engine (2,013 words) [view diff] exact match in snippet view article find links to article
Transactions on Computational Collective Intelligence II. Lecture Notes in Computer Science. Vol. 2. pp. 46–69. Bibcode:2010LNCS.6450...46L. doi:10Minimum-weight triangulation (3,289 words) [view diff] exact match in snippet view article find links to article
"A study of the LMT-skeleton", Algorithms and Computation, Lecture Notes in Computer Science, vol. 1178, pp. 256–265, doi:10.1007/BFb0009502, ISBN 978-3-540-62048-8Dinic's algorithm (1,693 words) [view diff] exact match in snippet view article find links to article
Theoretical Computer Science: Essays in Memory of Shimon Even. Lecture Notes in Computer Science. Vol. 3895. Springer. pp. 218–240. doi:10.1007/11685654_10Skew-symmetric graph (2,318 words) [view diff] exact match in snippet view article find links to article
and structure", Computer Science – Theory and Applications, Lecture Notes in Computer Science, vol. 3967, Springer-Verlag, pp. 23–34, arXiv:math/0607547CLEFIA (208 words) [view diff] exact match in snippet view article find links to article
of Reduced-Round CLEFIA". Proceedings of INDOCRYPT, 2010. Lecture Notes in Computer Science. Springer-Verlag. Archived from the original on 2013-02-03Leontief utilities (815 words) [view diff] exact match in snippet view article find links to article
of Leontief Market Equilibria". Frontiers in Algorithmics. Lecture Notes in Computer Science. Vol. 4613. p. 96. doi:10.1007/978-3-540-73814-5_9. ISBN 978-3-540-73813-8Low-complexity art (1,013 words) [view diff] exact match in snippet view article find links to article
Fitness-Distance Analysis". Applications of Evolutionary Computation. Lecture Notes in Computer Science. Vol. 6624. pp. 294–303. doi:10.1007/978-3-642-20525-5_30LCP array (4,379 words) [view diff] exact match in snippet view article find links to article
12th Annual Symposium on Combinatorial Pattern Matching. Lecture Notes in Computer Science. Vol. 2089. pp. 181–192. doi:10.1007/3-540-48194-X_17.Nimbus (cipher) (165 words) [view diff] exact match in snippet view article
"Differential Cryptanalysis of Nimbus". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 2355. pp. 187–195. doi:10.1007/3-540-45473-X_16.Kai Salomaa (370 words) [view diff] exact match in snippet view article find links to article
transformation for finite languages". Automata Implementation. Lecture Notes in Computer Science. Vol. 1260. pp. 149–158. doi:10.1007/3-540-63174-7_12.GOST (block cipher) (1,455 words) [view diff] exact match in snippet view article
on the Full GOST Block Cipher". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 6733. pp. 290–305. doi:10.1007/978-3-642-21702-9_17Order statistic tree (487 words) [view diff] exact match in snippet view article find links to article
(2001). A new method for balancing binary search trees. ICALP. Lecture Notes in Computer Science. Vol. 2076. pp. 469–480. doi:10.1007/3-540-48224-5_39.HElib (212 words) [view diff] exact match in snippet view article find links to article
Gennaro, Rosario (eds.). Advances in Cryptology – CRYPTO 2014. Lecture Notes in Computer Science. Vol. 8616. Springer Berlin Heidelberg. pp. 554–571. doi:10Straight skeleton (2,179 words) [view diff] exact match in snippet view article find links to article
Ann. Int. Conf. Computing and Combinatorics (COCOON '96). Lecture Notes in Computer Science. Vol. 1090. Springer-Verlag. pp. 117–126. Peschka, GustavInfinite chess (841 words) [view diff] exact match in snippet view article find links to article
of Infinite Chess is Decidable". How the World Computes. Lecture Notes in Computer Science. Vol. 7318. Springer. pp. 78–88. arXiv:1201.5597. doi:10HiLog (601 words) [view diff] case mismatch in snippet view article find links to article
Prague, Czech Republic, January 11–13, 1995: proceedings. Lecture notes in computer science. Vol. 893. Springer. pp. 252–265. doi:10.1007/3-540-58907-4_20Indistinguishability obfuscation (2,298 words) [view diff] exact match in snippet view article find links to article
Obfuscation". In Vadhan, Salil P. (ed.). Theory of Cryptography. Lecture Notes in Computer Science. Vol. 4392. Berlin, Heidelberg: Springer. pp. 194–213. doi:10Alan Mycroft (472 words) [view diff] exact match in snippet view article find links to article
recursive definitions". International Symposium on Programming. Lecture Notes in Computer Science. Vol. 167. pp. 217–228. doi:10.1007/3-540-12925-1_41. ISBN 978-3-540-12925-7Computer security compromised by hardware failure (5,114 words) [view diff] exact match in snippet view article find links to article
Countermeasures: The Case of AES". Topics in Cryptology – CT-RSA 2006. Lecture Notes in Computer Science. Vol. 3860. San Jose, California, USA: Springer-Verlag BerlinAutomotive security (2,098 words) [view diff] exact match in snippet view article find links to article
of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science. Vol. 10327. Springer International Publishing. pp. 185–206E-graph (2,143 words) [view diff] exact match in snippet view article find links to article
Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science. Vol. 4963. Berlin, Heidelberg: Springer. pp. 337–340. doi:10Garbled circuit (2,917 words) [view diff] exact match in snippet view article find links to article
Gates and Applications". Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 5126. pp. 486–498. CiteSeerX 10.1.1.160.5268. doi:10Adversarial queueing network (198 words) [view diff] exact match in snippet view article find links to article
Combinatorial Optimization.. Algorithms and Techniques (PDF). Lecture Notes in Computer Science. Vol. 2764. p. 153. doi:10.1007/978-3-540-45198-3_14. ISBN 978-3-540-40770-6Supersingular isogeny key exchange (3,674 words) [view diff] exact match in snippet view article find links to article
2023. International Association for Cryptologic Research. Lecture Notes in Computer Science. Vol. 14008. Springer. pp. 423–447. doi:10.1007/978-3-031-30589-4_15Manifold regularization (3,872 words) [view diff] exact match in snippet view article find links to article
pointwise consistency of graph laplacians". Learning theory. Lecture Notes in Computer Science. Vol. 3559. Springer. pp. 470–485. CiteSeerX 10.1.1.103.82International Mathematical Knowledge Trust (180 words) [view diff] exact match in snippet view article find links to article
Mathematical Knowledge Trust". Intelligent Computer Mathematics. Lecture Notes in Computer Science. Vol. 10383. pp. 56–69. doi:10.1007/978-3-319-62075-6_5.Medical image computing (8,475 words) [view diff] exact match in snippet view article find links to article
Proceedings for this conference are published by Springer in the Lecture Notes in Computer Science series. In 2000, N. Ayache and J. Duncan reviewed the stateFrama-C (769 words) [view diff] exact match in snippet view article find links to article
of Code". Trusted Computing - Challenges and Applications. Lecture Notes in Computer Science. Vol. 4968/2008. pp. 133–142. doi:10.1007/978-3-540-68979-9_10Hans L. Bodlaender (446 words) [view diff] exact match in snippet view article find links to article
Hans L. Bodlaender on the Occasion of His 60th Birthday, Lecture Notes in Computer Science, vol. 12160, Springer International Publishing, doi:10Prêt à Voter (1,200 words) [view diff] exact match in snippet view article find links to article
Election Scheme", Computer Security – ESORICS 2005 (PDF), Lecture Notes in Computer Science, vol. 3679, pp. 118–139, doi:10.1007/11555827_8, ISBN 978-3-540-28963-0Boolean satisfiability problem (5,045 words) [view diff] exact match in snippet view article find links to article
Principles and Practice of Constraint Programming – CP 2007, Lecture Notes in Computer Science, vol. 4741, pp. 544–558, CiteSeerX 10.1.1.70.5471, doi:10Andrey Muchnik (514 words) [view diff] exact match in snippet view article find links to article
Czechoslovakia, September 3–7, 1984. Proceedings. Lecture Notes in Computer Science. Lecture Notes in Computer Science. 176. Berlin, Heidelberg: Springer: 162–175OpenNN (437 words) [view diff] exact match in snippet view article find links to article
Neural Networks". Adaptive and Natural Computing Algorithms. Lecture Notes in Computer Science. Vol. 6593. pp. 190–199. doi:10.1007/978-3-642-20282-7_20Negation as failure (1,318 words) [view diff] exact match in snippet view article find links to article
Semantic Web Reasoning. PPSW3 2003. Lecture Notes in Computer Science. Vol. 2901. Lecture Notes in Computer Science: Springer. pp. 33–50. doi:10.1007/978-3-540-24572-8_3Malleability (cryptography) (983 words) [view diff] exact match in snippet view article
among notions of security for public-key encryption schemes. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 26–45. doi:10.1007/bfb0055718Left-right planarity test (696 words) [view diff] exact match in snippet view article find links to article
WA, USA, September 19-21, 2012, Revised Selected Papers, Lecture Notes in Computer Science, vol. 7704, Berlin: Springer, pp. 557–558, doi:10.1007/978-3-642-36763-2_51Kyber (1,472 words) [view diff] exact match in snippet view article find links to article
Structured LWE, Revisited" (PDF), Theory of Cryptography, Lecture Notes in Computer Science (in German), vol. 11891, Cham: Springer International PublishingCircle graph (1,694 words) [view diff] exact match in snippet view article find links to article
Science, Bordeaux, France, February 11–13, 1988, Proceedings, Lecture Notes in Computer Science, vol. 294, Berlin: Springer, pp. 61–72, doi:10.1007/BFb0035832Newton Howard (1,456 words) [view diff] exact match in snippet view article find links to article
Computational Linguistics and Intelligent Text Processing. Lecture Notes in Computer Science, 8403, 113–127 Howard, N. (2013). The Twin Hypotheses: BrainContrail (software) (545 words) [view diff] exact match in snippet view article
in Federated Heterogeneous Clouds". The Future Internet. Lecture Notes in Computer Science. Vol. 7858. pp. 91–103. doi:10.1007/978-3-642-38082-2_8.Authenticated encryption (2,104 words) [view diff] exact match in snippet view article find links to article
(ed.). Fast Software Encryption (FSE): 2000 Proceedings. Lecture Notes in Computer Science. Vol. 1978. pp. 284–299. doi:10.1007/3-540-44706-7_20.Range query (computer science) (5,468 words) [view diff] exact match in snippet view article
Approximations for Range Mode". Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 6198. pp. 605–616. doi:10.1007/978-3-642-14165-2_51Michal Irani (466 words) [view diff] exact match in snippet view article find links to article
with Uncertainty". European Conference on Computer Vision. Lecture Notes in Computer Science. 1842: 539–553. doi:10.1007/3-540-45054-8_35. ISBN 978-3-540-67685-0Lambda-mu calculus (842 words) [view diff] exact match in snippet view article find links to article
algorithmic interpretation of classical natural deduction. Lecture Notes in Computer Science. Vol. 624. pp. 190–201. doi:10.1007/BFb0013061. ISBN 3-540-55727-XAlgorithm selection (1,836 words) [view diff] exact match in snippet view article find links to article
(ed.). Principles and Practice of Constraint Programming. Lecture Notes in Computer Science. Vol. 6876. pp. 454–469. CiteSeerX 10.1.1.211.1807. doi:10DRE-i with enhanced privacy (1,747 words) [view diff] exact match in snippet view article find links to article
Tallying Authorities" (PDF). Computer Security – ESORICS 2016. Lecture Notes in Computer Science. Vol. 9879. pp. 223–240. doi:10.1007/978-3-319-45741-3_12Geographical feature (2,354 words) [view diff] exact match in snippet view article find links to article
). Spatio-Temporal Databases: The Chorochronos Approach. Lecture Notes in Computer Science. Vol. V.2520. Springer-Verlag. pp. 9–77. doi:10.1007/978-3-540-45081-8_2David L. Dill (1,230 words) [view diff] exact match in snippet view article find links to article
pipelined microprocessor control". Computer Aided Verification. Lecture Notes in Computer Science. Vol. 818. pp. 68–80. doi:10.1007/3-540-58179-0_44. ISBN 978-3-540-58179-6Tarski's axiomatization of the reals (603 words) [view diff] exact match in snippet view article find links to article
Edinburgh, Scotland, UK, September 3–6, 2001, Proceedings. Lecture Notes in Computer Science. Vol. 2152. Berlin: Springer. pp. 43–58. doi:10.1007/3-540-44755-5_5Fast syndrome-based hash (2,941 words) [view diff] exact match in snippet view article find links to article
Based Hashes", Progress in Cryptology – INDOCRYPT 2007 (PDF), Lecture Notes in Computer Science, vol. 4859, pp. 1–9, doi:10.1007/978-3-540-77026-8_1, ISBN 978-3-540-77025-1Wikiquote (756 words) [view diff] exact match in snippet view article find links to article
International Workshop on Fuzzy Logic and Applications. Lecture Notes in Computer Science. doi:10.1007/978-3-540-73400-0_58. ISBN 978-3-540-73399-7Algebraic Eraser (1,622 words) [view diff] exact match in snippet view article find links to article
Algebraic Eraser". Advances in Cryptology – CRYPTO 2016. Lecture Notes in Computer Science. Vol. 9814. Springer. pp. 179–189. arXiv:1511.03870. CiteSeerX 10Abdigani Diriye (718 words) [view diff] exact match in snippet view article find links to article
Research and Advanced Technology for Digital Libraries. Lecture Notes in Computer Science. Vol. 8092. Springer Berlin Heidelberg. pp. 235–240. doi:10Polygon-circle graph (606 words) [view diff] exact match in snippet view article find links to article
2003 Perugia, Italy, September 21-24, 2003, Revised Papers, Lecture Notes in Computer Science, vol. 2912, Berlin: Springer, pp. 59–70, doi:10.1007/978-3-540-24595-7_6Reduction strategy (2,608 words) [view diff] exact match in snippet view article find links to article
and Acyclicity" (PDF). Rewriting, Computation and Proof. Lecture Notes in Computer Science. Vol. 4600. pp. 89–112. CiteSeerX 10.1.1.104.9139. doi:10Executable choreography (1,395 words) [view diff] exact match in snippet view article find links to article
the Move to Meaningful Internet Systems: OTM 2009 (PDF), Lecture Notes in Computer Science, vol. 5870, Springer Berlin Heidelberg, pp. 373–380, CiteSeerX 10Attention inequality (679 words) [view diff] exact match in snippet view article find links to article
Social Media Attention Among Non-profits". Social Informatics. Lecture Notes in Computer Science. Vol. 11185. Springer International Publishing. pp. 196–211Text corpus (858 words) [view diff] exact match in snippet view article find links to article
Plzeň, Czech Republic, September 14–17, 2015, Proceedings. Lecture Notes in Computer Science. Vol. 9302. Springer. pp. 32–40. arXiv:1509.08639. doi:10Hash chain (1,005 words) [view diff] exact match in snippet view article find links to article
Scheme" (PDF). Progress in Cryptology – AFRICACRYPT 2011. Lecture Notes in Computer Science. Vol. 6737. Springer Berlin Heidelberg. pp. 363–378. doi:10Zodiac (cipher) (238 words) [view diff] exact match in snippet view article
Zodiac Cipher". Information Security Practice and Experience. Lecture Notes in Computer Science. Vol. 4991. Springer. pp. 377–391. doi:10.1007/978-3-540-79104-1_27Victor Pan (759 words) [view diff] exact match in snippet view article find links to article
Matrices Faster: Gladwell, Ian (1986), Mathematical Reviews, Lecture Notes in Computer Science, 179, doi:10.1007/3-540-13866-8, ISBN 978-3-540-13866-2, MR 0765701Meurs Challenger (409 words) [view diff] exact match in snippet view article find links to article
The Netherlands, September 21–23, 2011, Revised Papers, Lecture Notes in Computer Science, vol. 7034, Springer-Verlag, pp. 447–448, doi:10.1007/978-3-642-25878-7DarwiinRemote (419 words) [view diff] exact match in snippet view article find links to article
Interaction Research". HCI in Work and Learning, Life and Leisure. Lecture Notes in Computer Science. Vol. 6389. Springer. pp. 305–317. doi:10.1007/978-3-642-16607-5_20Automated reasoning (1,398 words) [view diff] exact match in snippet view article find links to article
Paulin-Mohring, C.; Pichardie, D. (eds.), Interactive Theorem Proving, Lecture Notes in Computer Science, vol. 7998, pp. 163–179, CiteSeerX 10.1.1.651.7964, doi:10Scale space implementation (3,290 words) [view diff] exact match in snippet view article find links to article
in Computer Vision. Lecture Notes in Computer Science. Vol. 2695. Proc. Scale-Space'03, Springer Lecture Notes in Computer Science. pp. 148–163. doi:10Truecasing (458 words) [view diff] exact match in snippet view article find links to article
Information Retrieval Techniques for Speech Applications. Lecture Notes in Computer Science. Vol. 2273. pp. 11–22. doi:10.1007/3-540-45637-6_2. ISBN 978-3-540-43156-5Mildly context-sensitive grammar formalism (2,034 words) [view diff] exact match in snippet view article find links to article
Germany, June 30–July 3, 2009. Proceedings, volume 5583 of Lecture Notes in Computer Science, pages 312–325, 2009. Laura Kallmeyer. "On Mildly Context-SensitiveSubstring index (611 words) [view diff] exact match in snippet view article find links to article
Piscataway, New Jersey, USA, July 20–22, 1998, Proceedings, Lecture Notes in Computer Science, vol. 1448, Springer, pp. 65–79, doi:10.1007/BFB0030781,Neural gas (1,807 words) [view diff] exact match in snippet view article find links to article
CVBIA 2005, Beijing, China, October 21, 2005 : proceedings. Lecture Notes in Computer Science. Vol. 3765. Springer. p. 210. doi:10.1007/11569541_22.Toolchain (275 words) [view diff] exact match in snippet view article find links to article
Tool Chains in Agile ALM Environments: A Short Introduction. Lecture Notes in Computer Science. Vol. 9416. pp. 371–380. doi:10.1007/978-3-319-26138-6_40RoboCup 3D Soccer Simulation League (1,096 words) [view diff] exact match in snippet view article find links to article
Next Generation". RoboCup 2003: Robot Soccer World Cup VII. Lecture Notes in Computer Science. Vol. 3020. pp. 458–469. doi:10.1007/978-3-540-25940-4_40Forbidden graph characterization (1,224 words) [view diff] exact match in snippet view article find links to article
France, September 23-25, 2013, Revised Selected Papers, Lecture Notes in Computer Science, vol. 8242, pp. 107–118, doi:10.1007/978-3-319-03841-4_10Weak n-category (519 words) [view diff] exact match in snippet view article find links to article
introduction to n-categories". Category Theory and Computer Science. Lecture Notes in Computer Science. Vol. 1290. pp. 1–33. arXiv:q-alg/9705009. doi:10.1007/BFb0026978Vector clock (1,762 words) [view diff] exact match in snippet view article find links to article
Distributed Systems (PDF), Lecture Notes in Computer Science, vol. 5401, Springer-Verlag, Lecture Notes in Computer Science, pp. 259–274, Bibcode:2008LNCSAscalaph Designer (607 words) [view diff] exact match in snippet view article find links to article
Computing Large Scale Scientific and Industrial Problems. Lecture Notes in Computer Science. Vol. 1541. Heidelberg: Springer Berlin. pp. 296–303. doi:10Juan Pavón (3,091 words) [view diff] exact match in snippet view article find links to article
Müller, Jörg (eds.). Multi-Agent Systems and Applications III. Lecture Notes in Computer Science. Vol. 2691. Springer Berlin Heidelberg. pp. 394–403. doi:10Geospatial topology (1,620 words) [view diff] exact match in snippet view article find links to article
error correcting in GIS". Advances in Spatial Databases. Lecture Notes in Computer Science. Vol. 1262. pp. 281–297. doi:10.1007/3-540-63238-7_35.IEEE 802.15.6 (550 words) [view diff] exact match in snippet view article find links to article
15.6 Standard". Financial Cryptography and Data Security. Lecture Notes in Computer Science. Vol. 8976. pp. 245–260. arXiv:1501.02601. doi:10.1007/978-3-662-48051-9_18NodeXL (1,591 words) [view diff] exact match in snippet view article find links to article
Clustering, Grouping, and Simplification", Graph Drawing (PDF), Lecture Notes in Computer Science, vol. 7704, pp. 2–18, doi:10.1007/978-3-642-36763-2_2,Quantum sort (165 words) [view diff] exact match in snippet view article find links to article
International Colloquium on Automata, Languages, and Programming. Lecture Notes in Computer Science. Vol. 2076. pp. 62–73. arXiv:quant-ph/0102078. doi:10.1007/3-540-48224-5_29BlueJ (419 words) [view diff] exact match in snippet view article find links to article
Kölling, M. (eds.). Reflections on the Teaching of Programming. Lecture Notes in Computer Science. Vol. 4821. Springer. pp. 182–196. ISBN 978-3-540-77933-9Lesk algorithm (1,039 words) [view diff] exact match in snippet view article find links to article
Lesk Algorithm for Word Sense Disambiguation Using WordNet, Lecture Notes in Computer Science; Vol. 2276, Pages: 136 - 145, 2002. ISBN 3-540-43219-1 KilgarriffDigital Assets Repository (697 words) [view diff] exact match in snippet view article find links to article
Research and Advanced Technology for Digital Libraries. Lecture Notes in Computer Science. Vol. 3652. Springer Science + Business Media. pp. 116–127Alex Graves (computer scientist) (571 words) [view diff] exact match in snippet view article
Keyword Spotting". Artificial Neural Networks – ICANN 2007. Lecture Notes in Computer Science. Vol. 4669. pp. 220–229. doi:10.1007/978-3-540-74695-9_23Message Authenticator Algorithm (945 words) [view diff] exact match in snippet view article find links to article
Cryptographic Techniques (CRYPTO’84), Santa Barbara, CA, USA. Lecture Notes in Computer Science. Vol. 196. Springer. pp. 393–400. doi:10.1007/3-540-39568-7_30Size-change termination principle (640 words) [view diff] exact match in snippet view article find links to article
Functional Programs". Programming Languages and Systems. Lecture Notes in Computer Science. Vol. 3780. pp. 281–297. CiteSeerX 10.1.1.102.4934. doi:10Lenore Zuck (590 words) [view diff] exact match in snippet view article find links to article
College, New York, NY, USA, June 17-19, 1985, Proceedings, Lecture Notes in Computer Science, vol. 193, Springer, pp. 196–218, doi:10.1007/3-540-15648-8_16Phase-type distribution (2,368 words) [view diff] exact match in snippet view article find links to article
Analytical and Stochastic Modeling Techniques and Applications. Lecture Notes in Computer Science. Vol. 7314. p. 271. doi:10.1007/978-3-642-30782-9_19. ISBN 978-3-642-30781-2Rabin signature algorithm (2,011 words) [view diff] exact match in snippet view article find links to article
with RSA and Rabin. Advances in Cryptology – EUROCRYPT ’96. Lecture Notes in Computer Science. Vol. 1070. Saragossa, Spain: Springer. pp. 399–416. doi:10Call centre (3,925 words) [view diff] exact match in snippet view article find links to article
Virtual Call Center Implementation". Networking — ICN 2001. Lecture Notes in Computer Science. Vol. 2093. University of Novi Sad, Yugoslavia. pp. 75–84Generic group model (401 words) [view diff] exact match in snippet view article find links to article
bounds for discrete logarithms and related problems" (PDF). Lecture Notes in Computer Science. Advances in Cryptology – Eurocrypt ’97. Vol. 1233. Springer-VerlagPeter Buneman (1,067 words) [view diff] exact match in snippet view article find links to article
Characterization of Data Provenance". Database Theory — ICDT 2001. Lecture Notes in Computer Science. Vol. 1973. pp. 316. CiteSeerX 10.1.1.6.1848. doi:10.1007/3-540-44503-X_20Nervos Network (614 words) [view diff] exact match in snippet view article find links to article
Conference on Formal Engineering Methods, ICFEM 2020, Singapore. Lecture Notes in Computer Science. Vol. 12531. pp. 287–296. doi:10.1007/978-3-030-63406-3_17Runtime predictive analysis (1,499 words) [view diff] exact match in snippet view article find links to article
for Sequentially Consistent Systems". Runtime Verification. Lecture Notes in Computer Science. Vol. 7687. pp. 136–150. doi:10.1007/978-3-642-35632-2_16David Wheeler (computer scientist) (1,420 words) [view diff] exact match in snippet view article
a tiny encryption algorithm". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 1008. p. 363. doi:10.1007/3-540-60590-8_29. ISBN 978-3-540-60590-4Camellia (cipher) (1,805 words) [view diff] exact match in snippet view article
Conference Seoul, Korea, December 6–7, 2001, Proceedings. Lecture Notes in Computer Science. Vol. 2288. Springer. pp. 32–38. doi:10.1007/3-540-45861-1_3Multi-objective optimization (9,569 words) [view diff] exact match in snippet view article find links to article
Ajith (eds.). Transactions on Computational Science XXI. Lecture Notes in Computer Science. Vol. 8160. Springer Berlin Heidelberg. pp. 145–163. doi:10Morten Middelfart (1,106 words) [view diff] exact match in snippet view article find links to article
Conceptual Modeling. Recent Developments and New Directions. Lecture Notes in Computer Science. Vol. 6999. pp. 364–370. doi:10.1007/978-3-642-24574-9_52Lis (linear algebra library) (665 words) [view diff] exact match in snippet view article
Computational Science and Its Applications – ICCSA 2010. Lecture Notes in Computer Science 6017. Vol. 6017. Springer. pp. 87–98. doi:10.1007/978-3-642-12165-4_36Zvika Brakerski (287 words) [view diff] exact match in snippet view article find links to article
Canetti, Ran (eds.). Advances in Cryptology – CRYPTO 2012. Lecture Notes in Computer Science. Vol. 7417. Berlin, Heidelberg: Springer. pp. 868–886. doi:10XPDL (1,280 words) [view diff] exact match in snippet view article find links to article
Systems and Standards for Workflow Management", Springer Lecture Notes in Computer Science, Vol 3098/2004. Wil M.P. van der Aalst, "Patterns and XPDL:Unspent transaction output (1,271 words) [view diff] exact match in snippet view article find links to article
Bitcoin UTXO Set". Financial Cryptography and Data Security. Lecture Notes in Computer Science. Vol. 10958. Springer. pp. 78–91. doi:10.1007/978-3-662-58820-8_6Term indexing (873 words) [view diff] exact match in snippet view article find links to article
available under the CC BY 4.0 license. P. Graf, Term Indexing, Lecture Notes in Computer Science 1053, 1996 (slightly outdated overview) R. Sekar and I.V.Instruction-level parallelism (1,026 words) [view diff] exact match in snippet view article find links to article
Parallelism". Applied Parallel and Scientific Computing. Lecture Notes in Computer Science. Vol. 7133. pp. 270–281. doi:10.1007/978-3-642-28151-8_27Self-verifying finite automaton (468 words) [view diff] exact match in snippet view article find links to article
Complexity" (PDF). Descriptional Complexity of Formal Systems. Lecture Notes in Computer Science. Vol. 9777. pp. 29–44. doi:10.1007/978-3-319-41114-9_3.Constraint composite graph (711 words) [view diff] exact match in snippet view article find links to article
on Principles and Practice of Constraint Programming (CP). Lecture Notes in Computer Science book series. Vol. 5202. pp. 282–297. doi:10.1007/978-3-540-85958-1_19Decoding methods (1,867 words) [view diff] exact match in snippet view article find links to article
codewords of small weight". Coding Theory and Applications. Lecture Notes in Computer Science. Vol. 388. Springer-Verlag. pp. 106–113. doi:10.1007/BFb0019850Browser Helper Object (882 words) [view diff] exact match in snippet view article find links to article
Browser Helper Objects". Intelligence and Security Informatics. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer: 638–639. doi:10.1007/11427995_85