Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Lecture Notes in Computer Science 416 found (3680 total)

alternate case: lecture Notes in Computer Science

Service (systems architecture) (1,994 words) [view diff] exact match in snippet view article

Amsterdam, The Netherlands, December 12-15, 2005, Proceedings. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg. ISBN 978-3-540-30817-1
Provable security (2,181 words) [view diff] exact match in snippet view article find links to article
asymmetric encryption". Advances in Cryptology — EUROCRYPT'94. Lecture Notes in Computer Science. Vol. 950. pp. 92–111. doi:10.1007/BFb0053428. ISBN 978-3-540-60176-0
Tiny Encryption Algorithm (1,189 words) [view diff] exact match in snippet view article find links to article
RC2, and TEA". Information and Communications Security. Lecture Notes in Computer Science. Vol. 1334. pp. 233–246. CiteSeerX 10.1.1.35.8112. doi:10
XSL attack (1,834 words) [view diff] exact match in snippet view article find links to article
2003, Lund, Sweden, February 24-26, 2003, Revised Papers. Lecture Notes in Computer Science. Vol. 2887. Springer. pp. 274–289. doi:10.1007/978-3-540-39887-5_21
International Data Encryption Algorithm (1,499 words) [view diff] exact match in snippet view article find links to article
on the IDEA Block Cipher". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 3006. pp. 117–129. doi:10.1007/978-3-540-24654-1_9.
Bart Preneel (975 words) [view diff] exact match in snippet view article find links to article
algorithms based on block ciphers". Crytography and Coding. Lecture Notes in Computer Science. Vol. 1355. pp. 270–282. doi:10.1007/BFb0024473. ISBN 978-3-540-63927-5
Join-pattern (6,440 words) [view diff] exact match in snippet view article find links to article
calculus of mobile agents". CONCUR '96: Concurrency Theory. Lecture Notes in Computer Science. Vol. 1119. Le Chesnay: Concurrency Theory. pp. 406–421. doi:10
Electromagnetic attack (3,404 words) [view diff] exact match in snippet view article find links to article
Transmission Using Electromagnetic Emanations". Information Hiding. Lecture Notes in Computer Science. Vol. 1525. pp. 124–142. CiteSeerX 10.1.1.64.6982. doi:10
Satisfiability modulo theories (4,371 words) [view diff] exact match in snippet view article find links to article
Werner; Hermanns, Holger (eds.). Computer Aided Verification. Lecture Notes in Computer Science. Vol. 4590. Berlin, Heidelberg: Springer. pp. 547–560. doi:10
Choreographic programming (1,548 words) [view diff] exact match in snippet view article find links to article
Specifications". Logic, Rewriting, and Concurrency (PDF). Lecture Notes in Computer Science. Vol. 9200. pp. 427–450. doi:10.1007/978-3-319-23165-5_20
Hash-based cryptography (2,329 words) [view diff] exact match in snippet view article find links to article
Minimal Security Assumptions". Post-Quantum Cryptography. Lecture Notes in Computer Science. Vol. 7071. pp. 117–129. CiteSeerX 10.1.1.400.6086. doi:10
Extended Semantic Web Conference (867 words) [view diff] exact match in snippet view article find links to article
Skaf-Molli, Hala; Tamper, Minna (eds.). The Semantic Web. Lecture Notes in Computer Science. Vol. 13261. Cham: Springer International Publishing. pp. 200–216
Kleptography (1,088 words) [view diff] exact match in snippet view article find links to article
Barbara, California, USA, August 18–22, 1996, Proceedings. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 89–103. ISBN 978-3-540-68697-2
Computer Aided Verification (396 words) [view diff] exact match in snippet view article find links to article
"Counterexample-Guided Abstraction Refinement". Computer Aided Verification. Lecture Notes in Computer Science. Vol. 1855. pp. 154–169. doi:10.1007/10722167_15. ISBN 978-3-540-67770-3
Linked timestamping (1,715 words) [view diff] exact match in snippet view article find links to article
Digital Signatures". Advances in Cryptology – EUROCRYPT '93. Lecture Notes in Computer Science. Vol. 765. p. 274. doi:10.1007/3-540-48285-7_24. ISBN 978-3-540-57600-6
Shlomi Dolev (2,398 words) [view diff] exact match in snippet view article find links to article
Joffroy; Delaët, Sylvie (2014). Networked Systems (PDF). Lecture Notes in Computer Science. Springer, Cham. pp. 99–121. doi:10.1007/978-3-319-09581-3_8
Reversible computing (3,032 words) [view diff] exact match in snippet view article find links to article
Jarkko; Ulidowski, Irek (eds.). Reversible Computation. Lecture Notes in Computer Science. Vol. 11106. Cham: Springer International Publishing. pp. 3–33
E (theorem prover) (937 words) [view diff] exact match in snippet view article
(2004). "System Description: E 0.81". Automated Reasoning. Lecture Notes in Computer Science. Vol. 3097. pp. 223–228. doi:10.1007/978-3-540-25984-8_15
Kaisa Nyberg (325 words) [view diff] exact match in snippet view article find links to article
Tatsunokuchi, Ishikawa, Japan September 17ÔÇô19, 1997, Proceedings, Lecture Notes in Computer Science, vol. 1396, Springer, pp. 32–42, doi:10.1007/bfb0030406,
RIPEMD (869 words) [view diff] exact match in snippet view article find links to article
of RACE Integrity Primitives Evaluation (RIPE-RACE 1040). Lecture Notes in Computer Science. Vol. 1007. doi:10.1007/3-540-60640-8. ISBN 978-3-540-60640-6
Dmitry Khovratovich (1,347 words) [view diff] exact match in snippet view article find links to article
AES-192 and AES-256". Advances in Cryptology – ASIACRYPT 2009. Lecture Notes in Computer Science. Vol. 5912. Springer-Verlag. pp. 1–18. doi:10.1007/978-3-642-10366-7_1
RDF query language (1,154 words) [view diff] exact match in snippet view article find links to article
Comparison of RDF Query Languages". The Semantic Web – ISWC 2004. Lecture Notes in Computer Science. Vol. 3298. pp. 502–517. CiteSeerX 10.1.1.105.8731. doi:10
XTEA (969 words) [view diff] exact match in snippet view article find links to article
B.; Meier, W. (eds.). Fast Software Encryption. FSE 2004. Lecture Notes in Computer Science. Vol. 3017. Berlin, Heidelberg: Springer. pp. 299–316. doi:10
Moti Yung (1,630 words) [view diff] exact match in snippet view article find links to article
Cryptography, or: Should We Trust Capstone? CRYPTO 1996: 89-103, Lecture Notes in Computer Science, vol. 1109, p. 89, doi:10.1007/3-540-68697-5_8, ISBN 978-3-540-61512-5
SecPAL (447 words) [view diff] exact match in snippet view article find links to article
Information Systems Security. ICISS 2010. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Vol. 6503. Berlin; Heidelberg: Springer
Brent Waters (559 words) [view diff] exact match in snippet view article find links to article
Identity-Based Encryption". Advances in Cryptology – EUROCRYPT 2005. Lecture Notes in Computer Science. Vol. 3494. pp. 457–473. doi:10.1007/11426639_27. ISBN 978-3-540-25910-7
HC-256 (534 words) [view diff] exact match in snippet view article find links to article
New Stream Cipher HC-256" (PDF). Fast Software Encryption. Lecture Notes in Computer Science. Vol. 3017. pp. 226–244. doi:10.1007/978-3-540-25937-4_15
Mexican International Conference on Artificial Intelligence (1,007 words) [view diff] exact match in snippet view article find links to article
(2000). MICAI 2000: Advances in Artificial Intelligence. Lecture Notes in Computer Science. Vol. 1793. doi:10.1007/10720076. ISBN 978-3-540-67354-5.
Post-quantum cryptography (6,408 words) [view diff] exact match in snippet view article find links to article
Ioannidis, John (ed.). Applied Cryptography and Network Security. Lecture Notes in Computer Science. Vol. 3531. pp. 64–175. doi:10.1007/11496137_12. ISBN 978-3-540-26223-7
Orr Dunkelman (772 words) [view diff] exact match in snippet view article find links to article
Cryptology – CRYPTO 2012. Advances in Cryptology – CRYPTO 2012. Lecture Notes in Computer Science. Vol. 7417. Springer. pp. 719–740. doi:10.1007/978-3-642-32009-5_42
T-function (713 words) [view diff] exact match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems - CHES 2002. Lecture Notes in Computer Science. Vol. 2523. Springer-Verlag. pp. 470–483. doi:10.1007/3-540-36400-5_34
Martin Wirsing (1,190 words) [view diff] exact match in snippet view article find links to article
): Software-Intensive Systems and New Computing Paradigms. Lecture Notes in Computer Science 5380, Springer-Verlag, 2008, 265 pages (ISBN 978-3-540-89436-0)
Lattice-based cryptography (2,853 words) [view diff] exact match in snippet view article find links to article
ring-based public key cryptosystem". Algorithmic Number Theory. Lecture Notes in Computer Science. Vol. 1423. pp. 267–288. CiteSeerX 10.1.1.25.8422. doi:10
FORK-256 (786 words) [view diff] exact match in snippet view article find links to article
in the Full SHA-1". Advances in Cryptology – CRYPTO 2005. Lecture Notes in Computer Science. Vol. 3621. pp. 17–36. doi:10.1007/11535218_2. ISBN 978-3-540-31870-5
Inductive logic programming (4,248 words) [view diff] case mismatch in snippet view article find links to article
Ronald de (1997). Foundations of inductive logic programming. Lecture notes in computer science Lecture notes in artificial intelligence. Berlin Heidelberg:
PragmaDev Studio (1,884 words) [view diff] exact match in snippet view article find links to article
Simulators". System Analysis and Modeling: About Models. Lecture Notes in Computer Science. Vol. 6598. Springer, Berlin, Heidelberg. pp. 144–155. doi:10
E0 (cipher) (802 words) [view diff] exact match in snippet view article
Combiner". Information Security and Cryptology - ICISC'99 (PDF). Lecture Notes in Computer Science. Vol. 1787. Helsinki, Finland: Nokia Research Centre. pp. 17–29
Feistel cipher (1,316 words) [view diff] exact match in snippet view article find links to article
Boneh, Dan (ed.), Advances in Cryptology - CRYPTO 2003 (PDF), Lecture Notes in Computer Science, vol. 2729, pp. 513–529, doi:10.1007/b11817, ISBN 978-3-540-40674-7
Homomorphic encryption (4,692 words) [view diff] exact match in snippet view article find links to article
Encryption Scheme". Advances in Cryptology – EUROCRYPT 2011. Lecture Notes in Computer Science. Vol. 6632. pp. 129–148. doi:10.1007/978-3-642-20465-4_9.
OPTICS algorithm (2,133 words) [view diff] exact match in snippet view article find links to article
Outliers". Principles of Data Mining and Knowledge Discovery. Lecture Notes in Computer Science. Vol. 1704. Springer-Verlag. pp. 262–270. doi:10.1007/b72280
Cryptographic hash function (6,299 words) [view diff] exact match in snippet view article find links to article
Other Primitives". Advances in Cryptology – EUROCRYPT 2005. Lecture Notes in Computer Science. Vol. 3494. pp. 96–113. doi:10.1007/11426639_6. ISBN 978-3-540-25910-7
Identity-based cryptography (868 words) [view diff] exact match in snippet view article find links to article
(eds.). Advances in Cryptology Proceedings of CRYPTO '84. Lecture Notes in Computer Science. Vol. 196 (1 ed.). Springer Berlin Heidelberg. pp. 47–53.
Data Encryption Standard (6,717 words) [view diff] exact match in snippet view article find links to article
for DES Cipher". Advances in Cryptology — EUROCRYPT '93. Lecture Notes in Computer Science. Vol. 765. Springer, Berlin, Heidelberg. pp. 386–397. doi:10
One-key MAC (919 words) [view diff] exact match in snippet view article find links to article
(2003-02-24). "OMAC: One-Key CBC MAC". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 2887. Springer, Berlin, Heidelberg. pp. 129–153. doi:10
Register allocation (5,066 words) [view diff] exact match in snippet view article find links to article
Programming". Languages and Compilers for Parallel Computing. Lecture Notes in Computer Science. Vol. 4382. pp. 267–282. CiteSeerX 10.1.1.75.6911. doi:10
R-tree (2,965 words) [view diff] exact match in snippet view article find links to article
Geographic Data". Advances in Spatial and Temporal Databases. Lecture Notes in Computer Science. Vol. 8098. p. 146. doi:10.1007/978-3-642-40235-7_9. ISBN 978-3-642-40234-0
Randomness test (1,173 words) [view diff] exact match in snippet view article find links to article
Cellular Automata". Advances in Cryptology — EUROCRYPT '91. Lecture Notes in Computer Science. Vol. 547. pp. 186–199. doi:10.1007/3-540-46416-6_17. ISBN 978-3-540-54620-7
Multitier programming (2,772 words) [view diff] exact match in snippet view article find links to article
Without Tiers". Formal Methods for Components and Objects. Lecture Notes in Computer Science. Vol. 4709. pp. 266–296. doi:10.1007/978-3-540-74792-5_12
HyperNEAT (1,260 words) [view diff] exact match in snippet view article find links to article
Mouret, Jean-Baptiste (eds.). From Animals to Animats 11. Lecture Notes in Computer Science. Vol. 6226. Springer Berlin Heidelberg. pp. 533–543. CiteSeerX 10
Skipjack (cipher) (1,106 words) [view diff] exact match in snippet view article
Feistel Networks". Advances in Cryptology – CRYPTO 2010. Lecture Notes in Computer Science. Vol. 6223. Springer. pp. 613–630. CiteSeerX 10.1.1.185.3033
CL-HTTP (631 words) [view diff] exact match in snippet view article find links to article
system on world wide web". Intelligent Tutoring Systems. Lecture Notes in Computer Science. Vol. 1086/1996. Springer. pp. 261–269. doi:10.1007/3-540-61327-7_123
MD4 (871 words) [view diff] exact match in snippet view article find links to article
Software Encryption, 15th International Workshop, FSE 2008. Lecture Notes in Computer Science. 5086. Springer: 412–428. doi:10.1007/978-3-540-71039-4_26
Cognitive computing (1,602 words) [view diff] exact match in snippet view article find links to article
Cognitive Augmentation – A Case Study". Augmented Cognition. Lecture Notes in Computer Science. Vol. 11580. pp. 533–545. arXiv:2211.06479. doi:10.1007/978-3-030-22419-6_38
Annotation (3,658 words) [view diff] exact match in snippet view article find links to article
Yannick (eds.). Knowledge Engineering and Knowledge Management. Lecture Notes in Computer Science. Vol. 11313. Cham: Springer International Publishing. pp. 19–33
Fly algorithm (3,630 words) [view diff] exact match in snippet view article find links to article
Jean; Sapin, Emmanuel (2009). "Flies Open a Door to SLAM.". Lecture Notes in Computer Science. Applications of Evolutionary Computation (EvoApplications
SAT solver (3,583 words) [view diff] exact match in snippet view article find links to article
Principles and Practice of Constraint Programming – CP 2007, Lecture Notes in Computer Science, vol. 4741, pp. 544–558, CiteSeerX 10.1.1.70.5471, doi:10
Coppersmith method (767 words) [view diff] exact match in snippet view article find links to article
Modular Equation". Advances in Cryptology — EUROCRYPT '96. Lecture Notes in Computer Science. Vol. 1070. pp. 155–165. doi:10.1007/3-540-68339-9_14.
Rocq (1,921 words) [view diff] exact match in snippet view article find links to article
TPHOLs 2005, Oxford, UK, August 22–25, 2005, Proceedings. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. pp. 98–113. doi:10.1007/11541868_7
DPLL(T) (434 words) [view diff] exact match in snippet view article
Rajeev; Peled, Doron A. (eds.). Computer Aided Verification. Lecture Notes in Computer Science. Vol. 3114. Springer Berlin Heidelberg. pp. 175–188. doi:10
Go and mathematics (1,727 words) [view diff] exact match in snippet view article find links to article
problems". Mathematical Foundations of Computer Science 1984. Lecture Notes in Computer Science. Vol. 176. pp. 498–506. doi:10.1007/BFb0030333. ISBN 978-3-540-13372-8
Queue number (2,715 words) [view diff] exact match in snippet view article find links to article
Germany, September 21–24, 2010, Revised Selected Papers, Lecture Notes in Computer Science, vol. 6502, Heidelberg: Springer, pp. 68–79, doi:10.1007/978-3-642-18469-7_7
StegFS (312 words) [view diff] exact match in snippet view article find links to article
Shamir, Adi (1998). The Steganographic File System (PDF). Lecture Notes in Computer Science. Vol. 1525. pp. 73–82. CiteSeerX 10.1.1.42.1676. doi:10.1007/3-540-49380-8_6
DPLL(T) (434 words) [view diff] exact match in snippet view article
Rajeev; Peled, Doron A. (eds.). Computer Aided Verification. Lecture Notes in Computer Science. Vol. 3114. Springer Berlin Heidelberg. pp. 175–188. doi:10
Go and mathematics (1,727 words) [view diff] exact match in snippet view article find links to article
problems". Mathematical Foundations of Computer Science 1984. Lecture Notes in Computer Science. Vol. 176. pp. 498–506. doi:10.1007/BFb0030333. ISBN 978-3-540-13372-8
Bot prevention (1,033 words) [view diff] exact match in snippet view article find links to article
of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science. Vol. 12223. Cham: Springer International Publishing. pp. 135–159
Zero-knowledge proof (7,982 words) [view diff] exact match in snippet view article find links to article
Children". Advances in Cryptology — CRYPTO' 89 Proceedings (PDF). Lecture Notes in Computer Science. Vol. 435. pp. 628–631. doi:10.1007/0-387-34805-0_60. ISBN 978-0-387-97317-3
Deterministic encryption (853 words) [view diff] exact match in snippet view article find links to article
Keyword Search" (PDF). Advances in Cryptology - EUROCRYPT 2004. Lecture Notes in Computer Science. Vol. 3027. pp. 506–522. doi:10.1007/978-3-540-24676-3_30
ProVerif (1,382 words) [view diff] exact match in snippet view article find links to article
WS-Security Protocols". Web Services and Formal Methods. Lecture Notes in Computer Science. Vol. 4184. Springer, Berlin, Heidelberg. pp. 88–106. CiteSeerX 10
Petri net (7,238 words) [view diff] exact match in snippet view article find links to article
Lectures on Petri Nets I: Basic Models – Advances in Petri Nets. Lecture Notes in Computer Science. Vol. 1491. Springer. pp. 12–121. doi:10.1007/3-540-65306-6_14
Secure two-party computation (1,093 words) [view diff] exact match in snippet view article find links to article
Single-Execution Setting", Advances in Cryptology – EUROCRYPT 2017, Lecture Notes in Computer Science, vol. 10212, Cham: Springer International Publishing, pp. 399–424
Computational Diffie–Hellman assumption (796 words) [view diff] exact match in snippet view article find links to article
Diffie–Hellman is as strong as discrete log for certain primes (PDF), Lecture Notes in Computer Science, vol. 403, pp. 530–539, doi:10.1007/0-387-34799-2_38, ISBN 978-0-387-97196-4
Cardano (blockchain platform) (3,116 words) [view diff] exact match in snippet view article
Peter B.; Sala, Massimiliano (eds.). The Extended UTXO Model. Lecture Notes in Computer Science. Cham: Springer International Publishing. pp. 525–539. doi:10
Advanced Encryption Standard (5,678 words) [view diff] exact match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems - CHES 2002. Lecture Notes in Computer Science. Vol. 2523. pp. 159–171. doi:10.1007/3-540-36400-5_13.
Largest empty rectangle (816 words) [view diff] exact match in snippet view article find links to article
the largest empty rectangle". STACS-1984, Lecture Notes in Computer Science. Lecture Notes in Computer Science. 166: 43–54. doi:10.1007/3-540-12920-0_4
Budget-additive valuation (850 words) [view diff] exact match in snippet view article find links to article
for Maximizing Ad-Auctions Revenue", Algorithms – ESA 2007, Lecture Notes in Computer Science, vol. 4698, Berlin, Heidelberg: Springer Berlin Heidelberg
Broadcast encryption (802 words) [view diff] exact match in snippet view article find links to article
Advances in Cryptology — CRYPTO' 93 (Extended abstract). Lecture Notes in Computer Science. Vol. 773. pp. 480–491. doi:10.1007/3-540-48329-2_40. ISBN 978-3-540-57766-9
Elliptic curve point multiplication (4,325 words) [view diff] exact match in snippet view article find links to article
2006. Lecture Notes in Computer Science. Vol. 3958. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds) Public Key Cryptography - PKC 2006. Lecture Notes
Adaptive sort (652 words) [view diff] exact match in snippet view article find links to article
Alistair Moffat (1992). A framework for adaptive sorting. Lecture Notes in Computer Science. Vol. 621. Berlin: Springer Berlin / Heidelberg. pp. 422–433
Transaction malleability problem (638 words) [view diff] exact match in snippet view article find links to article
Rohloff, Kurt (eds.). Financial Cryptography and Data Security. Lecture Notes in Computer Science. Vol. 8976. Berlin, Heidelberg: Springer. pp. 1–18. doi:10
GNUnet (2,141 words) [view diff] exact match in snippet view article find links to article
Seberry, Jennifer (eds.). Efficient Sharing of Encrypted Data. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 107–120. CiteSeerX 10.1.1
Fiat–Shamir heuristic (1,068 words) [view diff] exact match in snippet view article find links to article
Signature Problems". Advances in Cryptology — CRYPTO' 86. Lecture Notes in Computer Science. Vol. 263. Springer Berlin Heidelberg. pp. 186–194. doi:10
Book embedding (8,167 words) [view diff] exact match in snippet view article find links to article
graphs have constant book thickness", Algorithms – ESA 2015, Lecture Notes in Computer Science, vol. 9294, Springer, pp. 130–141, doi:10.1007/978-3-662-48350-3_12
Bruce M. McLaren (4,006 words) [view diff] exact match in snippet view article find links to article
Toward Tutoring Help Seeking. Intelligent Tutoring Systems Lecture Notes in Computer Science, 227–239. Ashley, K.D. & McLaren, B.M. (1995). Reasoning with
Artificial immune system (1,710 words) [view diff] exact match in snippet view article find links to article
of Degeneracy in a Lymph Node". Artificial Immune Systems. Lecture Notes in Computer Science. Vol. 4163. pp. 164–177. doi:10.1007/11823940_13. ISBN 978-3-540-37749-8
Identity-based encryption (1,942 words) [view diff] exact match in snippet view article find links to article
Barbara, California, USA, August 19–22, 1984, Proceedings. Lecture Notes in Computer Science. Vol. 196. Springer. pp. 47–53. doi:10.1007/3-540-39568-7_5
Augmented cognition (1,758 words) [view diff] exact match in snippet view article find links to article
Schmorrow, Dylan D. (ed.). Foundations of Augmented Cognition. Lecture Notes in Computer Science. Vol. 4565. Springer Berlin Heidelberg. pp. 220–228. doi:10
Infobox (1,380 words) [view diff] exact match in snippet view article find links to article
Vasudeva (June 2011). Multidisciplinary Information Retrieval. Lecture Notes in Computer Science. Vol. 6653. Springer Berlin Heidelberg. doi:10.1007/978-3-642-21353-3
Alfred Menezes (816 words) [view diff] exact match in snippet view article find links to article
(with S. Chatterjee, N. Koblitz and P. Sarkar), Mycrypt 2016, Lecture Notes in Computer Science, 10311 (2017), 21–55. doi:10.1007/978-3-319-61273-7_3 "Another
Prince (cipher) (1,376 words) [view diff] exact match in snippet view article
Exhaustive Key Search". Advances in Cryptology – CRYPTO '96. Lecture Notes in Computer Science. Vol. 1109. pp. 252–267. doi:10.1007/3-540-68697-5_20.
Wikidata (3,679 words) [view diff] exact match in snippet view article find links to article
Multilinguality, Multimodality, and Interaction. CLEF 2018. Lecture Notes in Computer Science. Vol. 11018. p. 129. doi:10.1007/978-3-319-98932-7_12.
Venansius Baryamureeba (1,581 words) [view diff] exact match in snippet view article find links to article
for Linear Programming". Large-Scale Scientific Computing. Lecture Notes in Computer Science. Vol. 3743. pp. 629–637. doi:10.1007/11666806_72. ISBN 978-3-540-31994-8
Galois/Counter Mode (3,051 words) [view diff] exact match in snippet view article find links to article
Systems - CHES 2007 . GCM-AES Architecture Optimized for FPGAs. Lecture Notes in Computer Science. Vol. 4727. Springer. pp. 227–238. doi:10.1007/978-3-540-74735-2_16
Christine Paulin-Mohring (497 words) [view diff] exact match in snippet view article find links to article
Machinery. She was elected to the Academia Europaea in 2014. Lecture Notes in Computer Science. Types for Proofs and Programs: International Workshop TYPES'96
ElGamal encryption (1,473 words) [view diff] exact match in snippet view article find links to article
Decision Diffie-Hellman problem". Algorithmic Number Theory. Lecture Notes in Computer Science. Vol. 1423. pp. 48–63. CiteSeerX 10.1.1.461.9971. doi:10.1007/BFb0054851
Levenshtein automaton (561 words) [view diff] exact match in snippet view article find links to article
Automata Theory and Applications. Lecture Notes in Computer Science. Vol. 9618. Lecture Notes in Computer Science. pp. 207–218. doi:10.1007/978-3-319-30000-9_16
Evolutionary algorithm (4,553 words) [view diff] exact match in snippet view article find links to article
Evolution of Evolutionary Algorithms". Genetic Programming. Lecture Notes in Computer Science. Vol. 3003. Springer. pp. 389–398. doi:10.1007/978-3-540-24650-3_37
Merkle tree (1,804 words) [view diff] exact match in snippet view article find links to article
Encryption Function". Advances in Cryptology – CRYPTO '87. Lecture Notes in Computer Science. Vol. 293. pp. 369–378. doi:10.1007/3-540-48184-2_32. ISBN 978-3-540-18796-7
Loop-invariant code motion (596 words) [view diff] exact match in snippet view article find links to article
Detection". Automated Technology for Verification and Analysis. Lecture Notes in Computer Science. Vol. 10482. pp. 91–108. doi:10.1007/978-3-319-68167-2_7.
Categorical quantum mechanics (2,203 words) [view diff] exact match in snippet view article find links to article
EACSL Annual Conference on Computer Science Logic (CSL). Lecture Notes in Computer Science. Vol. 6247. Springer. arXiv:1004.1598. doi:10.2168/LMCS-8(4:14)2012
Anne Canteaut (485 words) [view diff] exact match in snippet view article find links to article
Graz, Austria, March 15-17, 2006, Revised Selected Papers. Lecture Notes in Computer Science. Vol. 4047. Springer. pp. 30–40. CiteSeerX 10.1.1.59.9346
Speculative execution (978 words) [view diff] exact match in snippet view article find links to article
International Conference on Principles of Distributed Systems. Lecture Notes in Computer Science. Vol. 4305. Bordeaux, France: Springer. pp. 1–2. doi:10.1007/11945529_1
A5/1 (2,725 words) [view diff] exact match in snippet view article find links to article
Cryptanalysis of A5/1 on a PC". Fast Software Encryption—FSE 2000. Lecture Notes in Computer Science. Vol. 1978. pp. 1–18. doi:10.1007/3-540-44706-7_1. ISBN 978-3-540-41728-6
Weak heap (2,127 words) [view diff] exact match in snippet view article find links to article
"On the performance of WEAK-HEAPSORT", Stacs 2000 (PDF), Lecture Notes in Computer Science, vol. 1770, Springer-Verlag, pp. 254–266, CiteSeerX 10.1.1
Model checking (2,788 words) [view diff] exact match in snippet view article find links to article
programs using fixpoints", Automata, Languages and Programming, Lecture Notes in Computer Science, vol. 85, pp. 169–181, doi:10.1007/3-540-10003-2_69, ISBN 978-3-540-10003-4
Ensemble learning (6,689 words) [view diff] exact match in snippet view article find links to article
Announcement)". Cyber Security Cryptography and Machine Learning. Lecture Notes in Computer Science. Vol. 11527. pp. 202–207. doi:10.1007/978-3-030-20951-3_18
Alternating step generator (565 words) [view diff] exact match in snippet view article find links to article
Bruijn Sequences". Advances in Cryptology — EUROCRYPT '87. Lecture Notes in Computer Science. Vol. 304. Berlin, Heidelberg: Springer. pp. 5–14. doi:10
PRESENT (708 words) [view diff] exact match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems - CHES 2007. Lecture Notes in Computer Science. Vol. 4727. pp. 450–466. doi:10.1007/978-3-540-74735-2_31
Pairing-based cryptography (1,150 words) [view diff] exact match in snippet view article find links to article
cryptography at high security levels". Cryptography and Coding. Lecture Notes in Computer Science. Vol. 3796. pp. 13–36. doi:10.1007/11586821_2. ISBN 978-3-540-30276-6
CADE ATP System Competition (378 words) [view diff] exact match in snippet view article find links to article
Theories Competition" (PDF). Computer Aided Verification. Lecture Notes in Computer Science. 3576. Springer: 20–23. doi:10.1007/11513988_4. ISBN 978-3-540-27231-1
Exponential time hypothesis (3,061 words) [view diff] exact match in snippet view article find links to article
Ljubljana, Slovenia, September 12–14, 2012, Proceedings, Lecture Notes in Computer Science, vol. 7535, Springer, pp. 13–24, CiteSeerX 10.1.1.680.8401
Threshold cryptosystem (868 words) [view diff] exact match in snippet view article find links to article
Gilles (ed.). Advances in Cryptology — CRYPTO' 89 Proceedings. Lecture Notes in Computer Science. Vol. 435. New York, NY: Springer. pp. 307–315. doi:10.1007/0-387-34805-0_28
Persuasive technology (4,408 words) [view diff] exact match in snippet view article find links to article
Health-Promoting Mobile Applications". Persuasive Technology. Lecture Notes in Computer Science. Vol. 6137. pp. 150–161. doi:10.1007/978-3-642-13226-1_16
Piling-up lemma (1,445 words) [view diff] exact match in snippet view article find links to article
for DES Cipher". Advances in Cryptology – EUROCRYPT '93. Lecture Notes in Computer Science. Vol. 765. pp. 386–397. doi:10.1007/3-540-48285-7_33. ISBN 978-3-540-57600-6
Tree stack automaton (876 words) [view diff] exact match in snippet view article find links to article
Mathematical Foundations of Computer Science (MFCS 1990). Lecture Notes in Computer Science, Vol. 452, pages 313–321, doi:10.1007/BFb0029624. Scott, Dana
Amit Sahai (1,154 words) [view diff] exact match in snippet view article find links to article
Challenges". Theory of Cryptography. Lecture Notes in Computer Science. Vol. 6597 (Lecture Notes in Computer Science). Springer Berlin Heidelberg. pp. 253–273
Accumulator (cryptography) (2,795 words) [view diff] exact match in snippet view article
Signatures" (PDF). Advances in Cryptology — EUROCRYPT '93. Lecture Notes in Computer Science. Vol. 765. pp. 274–285. doi:10.1007/3-540-48285-7_24. ISBN 978-3-540-57600-6
Fork–join queue (1,773 words) [view diff] exact match in snippet view article find links to article
Fork-Join Queueing Simulation". Computer Performance Engineering. Lecture Notes in Computer Science. Vol. 5652. pp. 16–29. CiteSeerX 10.1.1.158.7363. doi:10
Mean value analysis (1,587 words) [view diff] exact match in snippet view article find links to article
Performance Evaluation of Computer and Communication Systems. Lecture Notes in Computer Science. Vol. 729. p. 491. doi:10.1007/BFb0013865. ISBN 978-3-540-57297-8
Tatami (1,402 words) [view diff] exact match in snippet view article find links to article
2010, Nha Trang, Vietnam, July 19-21, 2010. Proceedings. Lecture Notes in Computer Science. Vol. 6196. Springer. pp. 288–297. arXiv:1103.3309. doi:10
Datalog (4,901 words) [view diff] exact match in snippet view article find links to article
Georg; Furche, Tim; Sellers, Andrew (eds.). Datalog Reloaded. Lecture Notes in Computer Science. Vol. 6702. Berlin, Heidelberg: Springer. pp. 181–220. doi:10
Larch Prover (1,558 words) [view diff] exact match in snippet view article find links to article
Proceedings of the Fourth International Conference CAV'92), Lecture Notes in Computer Science 663, Springer-Verlag, June 1992, pages 44–55. Urban Engberg
Knowledge extraction (4,413 words) [view diff] exact match in snippet view article find links to article
Acquisition Method for the Semantic Web", WAIM, volume 3739 of Lecture Notes in Computer Science, page 209-220. Springer. doi:10.1007/11563952_19 Tirmizi et
Free Haven Project (928 words) [view diff] exact match in snippet view article find links to article
Haven Project: Distributed Anonymous Storage Service" (PDF). Lecture Notes in Computer Science 2009. Proc. Workshop on Design Issues in Anonymity and Unobservability
Inductive programming (2,546 words) [view diff] exact match in snippet view article find links to article
Programming and Beyond; Essays in Honour of Robert A. Kowalski. Lecture Notes in Computer Science. Vol. LNAI 2407. pp. 310–346. doi:10.1007/3-540-45628-7_13
European Joint Conferences on Theory and Practice of Software (554 words) [view diff] exact match in snippet view article find links to article
Robinet, Bernard; Wilhelm, Reinhard, eds. (1986). Esop 86. Lecture Notes in Computer Science. Vol. 213. doi:10.1007/3-540-16442-1. ISBN 978-3-540-16442-5
2-EXPTIME (960 words) [view diff] exact match in snippet view article find links to article
on Automata, Languages and Programming (ICALP 2003) (PDF), Lecture Notes in Computer Science, vol. 2719, Springer-Verlag, pp. 767–775, doi:10.1007/3-540-45061-0_60
Proof of work (4,073 words) [view diff] exact match in snippet view article find links to article
Combatting Junk Mail". Advances in Cryptology — CRYPTO' 92. Lecture Notes in Computer Science. Vol. 740. Springer. pp. 139–147. doi:10.1007/3-540-48071-4_10
Pancake sorting (2,201 words) [view diff] exact match in snippet view article find links to article
Tighter Inapproximability Results". Proc. 26th ICALP (1999). Lecture Notes in Computer Science. 1644: 200–09. Berman, P.; Karpinski, M.; Hannenhalli, S.
Algorithmic skeleton (8,819 words) [view diff] exact match in snippet view article find links to article
Euro-Par Conference: Parallel Processing, volume 4641 of Lecture Notes in Computer Science, pages 72–81. Springer-Verlag, 2007. D. Caromel, L. Henrio
RC2 (423 words) [view diff] exact match in snippet view article find links to article
Qing, S. (eds.). Information and Communications Security. Lecture Notes in Computer Science. Vol. 1334. Springer, Berlin, Heidelberg. pp. 233–246. doi:10
2-EXPTIME (960 words) [view diff] exact match in snippet view article find links to article
on Automata, Languages and Programming (ICALP 2003) (PDF), Lecture Notes in Computer Science, vol. 2719, Springer-Verlag, pp. 767–775, doi:10.1007/3-540-45061-0_60
Pancake sorting (2,201 words) [view diff] exact match in snippet view article find links to article
Tighter Inapproximability Results". Proc. 26th ICALP (1999). Lecture Notes in Computer Science. 1644: 200–09. Berman, P.; Karpinski, M.; Hannenhalli, S.
Proof of work (4,073 words) [view diff] exact match in snippet view article find links to article
Combatting Junk Mail". Advances in Cryptology — CRYPTO' 92. Lecture Notes in Computer Science. Vol. 740. Springer. pp. 139–147. doi:10.1007/3-540-48071-4_10
Ian Horrocks (1,058 words) [view diff] exact match in snippet view article find links to article
Reasoner: System Description" (PDF). Automated Reasoning. Lecture Notes in Computer Science. Vol. 4130. pp. 292–297. CiteSeerX 10.1.1.65.2672. doi:10
RC2 (423 words) [view diff] exact match in snippet view article find links to article
Qing, S. (eds.). Information and Communications Security. Lecture Notes in Computer Science. Vol. 1334. Springer, Berlin, Heidelberg. pp. 233–246. doi:10
Contact graph (483 words) [view diff] exact match in snippet view article find links to article
2013, Lübeck, Germany, June 19-21, 2013, Revised Papers, Lecture Notes in Computer Science, vol. 8165, Springer, pp. 139–151, arXiv:1303.1279, doi:10
Semantic similarity (4,222 words) [view diff] exact match in snippet view article find links to article
International Conference on Geospatial Semantics (GEOS 2007). Lecture Notes in Computer Science. 2007. pp. 128–145. CiteSeerX 10.1.1.172.5544. "Geo-Net-PT
Instrumental convergence (2,948 words) [view diff] exact match in snippet view article find links to article
and Intelligent Agents". Artificial General Intelligence. Lecture Notes in Computer Science. Vol. 6830. pp. 11–20. doi:10.1007/978-3-642-22887-2_2.
Ideal lattice (6,061 words) [view diff] exact match in snippet view article find links to article
Active Attacks" (PDF). Public Key Cryptography – PKC 2008. Lecture Notes in Computer Science. Vol. 4939. pp. 162–179. doi:10.1007/978-3-540-78440-1_10
Özalp Babaoğlu (1,201 words) [view diff] exact match in snippet view article find links to article
Peer-to-Peer Applications", Engineering Self-Organising Systems, Lecture Notes in Computer Science, vol. 2977, Berlin, Heidelberg: Springer Berlin Heidelberg
Non-interactive zero-knowledge proof (2,465 words) [view diff] exact match in snippet view article find links to article
Garay, Juan A. (eds.). Advances in Cryptology – CRYPTO 2013. Lecture Notes in Computer Science. Vol. 8043. Berlin, Heidelberg: Springer. pp. 90–108. doi:10
Key generator (213 words) [view diff] exact match in snippet view article find links to article
and Key Distribution". Advances in Cryptology — CRYPTO' 93. Lecture Notes in Computer Science. Vol. 773. pp. 232–249. CiteSeerX 10.1.1.62.3423. doi:10
Infer Static Analyzer (780 words) [view diff] exact match in snippet view article find links to article
Verifier for Memory Safety of C Programs". NASA Formal Methods. Lecture Notes in Computer Science. Vol. 6617. Springer, Berlin, Heidelberg. pp. 459–465. CiteSeerX 10
Gennady Makanin (1,099 words) [view diff] exact match in snippet view article find links to article
equations in a free group". Word Equations and Related Topics. Lecture Notes in Computer Science. Vol. 572. pp. 1–11. doi:10.1007/3-540-55124-7_1. ISBN 978-3-540-55124-9
Computational hardness assumption (3,303 words) [view diff] exact match in snippet view article find links to article
Position Paper". Theory of Cryptography Conference (TCC) 2016. Lecture Notes in Computer Science. Vol. 9562. Springer. pp. 505–522. doi:10.1007/978-3-662-49096-9_21
Topincs (424 words) [view diff] exact match in snippet view article find links to article
For Topic Maps". Leveraging the Semantics of Topic Maps. Lecture Notes in Computer Science. Vol. 4438. Berlin Heidelberg: Springer. pp. 175–183. doi:10
Scale-space segmentation (1,199 words) [view diff] exact match in snippet view article find links to article
watershed segmentation" (PDF). Image Analysis and Processing. Lecture Notes in Computer Science. Vol. 1310. pp. 6–13. doi:10.1007/3-540-63507-6_178. ISBN 978-3-540-63507-9
Feature engineering (2,183 words) [view diff] exact match in snippet view article find links to article
(PDF). Principles of Data Mining and Knowledge Discovery. Lecture Notes in Computer Science. Vol. 1704. pp. 378–383. doi:10.1007/978-3-540-48247-5_46
Knowledge graph (2,342 words) [view diff] exact match in snippet view article find links to article
Integrated Knowledge Graph". The Semantic Web – ISWC 2020. Lecture Notes in Computer Science. Vol. 12507. pp. 430–446. doi:10.1007/978-3-030-62466-8_27
Truthful job scheduling (1,748 words) [view diff] exact match in snippet view article find links to article
Machines". In Diekert, Volker; Habib, Michel (eds.). Stacs 2004. Lecture Notes in Computer Science. Vol. 2996. Berlin, Heidelberg: Springer. pp. 608–619. doi:10
Strong RSA assumption (228 words) [view diff] exact match in snippet view article find links to article
(eds) Advances in Cryptology – EUROCRYPT ’97. EUROCRYPT 1997. Lecture Notes in Computer Science, vol 1233. Springer, Berlin, Heidelberg. doi:10.1007/3-540-69053-0_33
C. Pandu Rangan (1,223 words) [view diff] exact match in snippet view article find links to article
and Security (SETS), (2005-2007). Member, Editorial Board, Lecture Notes in Computer Science Series (LNCS Series), Springer-Verlag, Germany, (2005-2008)
Memory-hard function (825 words) [view diff] exact match in snippet view article find links to article
In Boneh, Dan (ed.). Advances in Cryptology - CRYPTO 2003. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. pp. 426–444. doi:10.1007/978-3-540-45146-4_25
Aircrack-ng (5,018 words) [view diff] exact match in snippet view article find links to article
Attack on TKIP", Identity and Privacy in the Internet Age, Lecture Notes in Computer Science, vol. 5838, Berlin, Heidelberg: Springer Berlin Heidelberg
Table (information) (1,461 words) [view diff] exact match in snippet view article
Applications of Natural Language to Information Systems (NLDB 2016). Lecture Notes in Computer Science. 9612: 162–174. doi:10.1007/978-3-319-41754-7_14. ISBN 978-3-319-41753-0
McEliece cryptosystem (2,092 words) [view diff] exact match in snippet view article find links to article
Fourier sampling attacks. Advances in cryptology—CRYPTO 2011. Lecture Notes in Computer Science. Vol. 6841. Heidelberg: Springer. pp. 761–779. doi:10
Cryptographic multilinear map (1,027 words) [view diff] exact match in snippet view article find links to article
cryptography at high security levels". Cryptography and Coding. Lecture Notes in Computer Science. Vol. 3796. pp. 13–36. doi:10.1007/11586821_2. ISBN 978-3-540-30276-6
Digital signage (2,497 words) [view diff] exact match in snippet view article find links to article
Campilho, Aurélio (eds.). Image Analysis and Recognition. Lecture Notes in Computer Science. Vol. 5627. Berlin, Heidelberg: Springer. pp. 347–358. doi:10
Massive Online Analysis (803 words) [view diff] exact match in snippet view article find links to article
Data Streams". Advanced Information Systems Engineering. Lecture Notes in Computer Science. Vol. 8188. pp. 480–492. CiteSeerX 10.1.1.638.5472. doi:10
Orc (programming language) (483 words) [view diff] exact match in snippet view article
Orchestration and Its Semantic Properties. Concurrency Theory. Lecture Notes in Computer Science. Vol. 4137. Bonn, Germany: Springer. pp. 477–491. doi:10.1007/11817949_32
TWINKLE (695 words) [view diff] exact match in snippet view article find links to article
Christof (eds.). Cryptographic Hardware and Embedded Systems. Lecture Notes in Computer Science. Vol. 1717. Berlin, Heidelberg: Springer. pp. 2–12. doi:10
Roland Carl Backhouse (757 words) [view diff] exact match in snippet view article find links to article
Programming (AFP 98),12–19 September 1998 Braga Portugal]. Lecture Notes in Computer Science. Vol. 1608. pp. 28–115. doi:10.1007/10704973_2. ISBN 978-3-540-66241-9
Dense subgraph (1,897 words) [view diff] exact match in snippet view article find links to article
Saarbrücken, Germany, September 5-8, 2000, Proceedings, Lecture Notes in Computer Science, vol. 1913, Springer, pp. 84–95, doi:10.1007/3-540-44436-X_10
Achterbahn (stream cipher) (532 words) [view diff] exact match in snippet view article
Encryption, 14th International Workshop. Revised Selected Papers, Lecture Notes in Computer Science. Vol. 4593. Luxembourg: Springer. pp. 73–86. ISBN 978-3-540-74617-1
Apache Lucene (1,258 words) [view diff] exact match in snippet view article find links to article
Castells, Pablo (eds.), Advances in Information Retrieval, Lecture Notes in Computer Science, vol. 12036, Cham: Springer International Publishing, pp. 28–34
Lattice problem (3,660 words) [view diff] exact match in snippet view article find links to article
Extreme Pruning". Advances in Cryptology – EUROCRYPT 2010. Lecture Notes in Computer Science. Vol. 6110. Springer, Berlin, Heidelberg. pp. 257–278. doi:10
Hartmut Ehrig (710 words) [view diff] exact match in snippet view article find links to article
Graph-Grammars and Their Application to Computer Science and Biology. Lecture Notes in Computer Science. Vol. 73. Heidelberg: Springer. doi:10.1007/BFb0025726.
Pseudotriangle (2,058 words) [view diff] exact match in snippet view article find links to article
of Software Technology and Theoretical Computer Science, Lecture Notes in Computer Science, vol. 3328, Springer-Verlag, pp. 299–310, arXiv:0705.3888
Flora-2 (786 words) [view diff] exact match in snippet view article find links to article
for Semantic Web, Formal Approaches to Agent-Based Systems, Lecture Notes in Computer Science v. 3228, Springer Verlag. A. D. Lattner , J. D. Gehrke , I
Urban informatics (3,295 words) [view diff] exact match in snippet view article find links to article
Cities Technologies, Experiences, and Future Perspectives. Lecture Notes in Computer Science. Vol. 1765. Berlin: Springer. doi:10.1007/3-540-46422-0.
Program structure tree (1,164 words) [view diff] exact match in snippet view article find links to article
International Colloquium on Automata, Languages and Programming, Lecture Notes in Computer Science, vol. 443, Springer-Verlag, pp. 598–611, doi:10.1007/BFb0032061
Semantics (computer science) (1,671 words) [view diff] exact match in snippet view article
computation". Category Theory Applied to Computation and Control. Lecture Notes in Computer Science. Vol. 25. Springer. pp. 151–163. doi:10.1007/3-540-07142-3_75
Server-based signatures (1,187 words) [view diff] exact match in snippet view article find links to article
Signatures". Advances in Cryptology – CRYPTO' 89 Proceedings. Lecture Notes in Computer Science. Vol. 435. p. 263. doi:10.1007/0-387-34805-0_24. ISBN 978-0-387-97317-3
Ron Rivest (1,543 words) [view diff] exact match in snippet view article find links to article
Theory, Reykjavík, Iceland, July 3–5, 1996, Proceedings. Lecture Notes in Computer Science. Vol. 1097. Springer. pp. 368–379. doi:10.1007/3-540-61422-2_146
ESC/Java (925 words) [view diff] exact match in snippet view article find links to article
2001: Formal Methods for Increasing Software Productivity. Lecture Notes in Computer Science. Vol. 2021. pp. 500–517. doi:10.1007/3-540-45251-6_29. ISBN 3-540-41791-5
Information Processing in Medical Imaging (1,631 words) [view diff] exact match in snippet view article find links to article
Medical Imaging - 12th | Alan C.F. Colchester | Springer. Lecture Notes in Computer Science. Springer. 1991. ISBN 9783540542469. Barrett, Harrison H.
UpStage (1,499 words) [view diff] exact match in snippet view article find links to article
Paolo; Urban, Bodo (eds.). Transactions on Edutainment X. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. pp. 146–160. doi:10.1007/978-3-642-37919-2_8
Linguistic Linked Open Data (3,694 words) [view diff] exact match in snippet view article find links to article
Conference, Sydney, NSW, Australia, October 21–25, 2013. Lecture Notes in Computer Science. Vol. 7908. Berlin, Heidelberg: Springer. pp. 98–113. doi:10
Random subspace method (969 words) [view diff] exact match in snippet view article find links to article
neighbors in random subspaces". Advances in Pattern Recognition. Lecture Notes in Computer Science. Vol. 1451. pp. 640–648. doi:10.1007/BFb0033288. ISBN 978-3-540-64858-1
Paulo S. L. M. Barreto (833 words) [view diff] exact match in snippet view article find links to article
Identity-Based Signatures and Signcryption from Bilinear Maps. Lecture Notes in Computer Science. Vol. 3788. pp. 515–532. doi:10.1007/11593447_28. ISBN 978-3-540-30684-9
Monadic second-order logic (1,308 words) [view diff] exact match in snippet view article find links to article
Are Computable with Linear Delay". Computer Science Logic. Lecture Notes in Computer Science. 4207. Springer Berlin Heidelberg: 167–181. doi:10.1007/11874683_11
Contrail (software) (566 words) [view diff] exact match in snippet view article
Contrail". Euro-Par 2011: Parallel Processing Workshops. Lecture Notes in Computer Science. Vol. 7155. pp. 159–168. doi:10.1007/978-3-642-29737-3_19
Security level (1,332 words) [view diff] exact match in snippet view article find links to article
precomputation" (PDF). Advances in Cryptology - ASIACRYPT 2013. Lecture Notes in Computer Science. pp. 321–340. doi:10.1007/978-3-642-42045-0_17. ISBN 978-3-642-42044-3
Proof of secure erasure (635 words) [view diff] exact match in snippet view article find links to article
Computable Self-erasing Functions". Theory of Cryptography. Lecture Notes in Computer Science. Vol. 6597. pp. 125–143. doi:10.1007/978-3-642-19571-6_9.
Set packing (1,514 words) [view diff] exact match in snippet view article find links to article
International Colloquium on Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 1443. Springer-Verlag. pp. 176–185. Halldórsson, Magnus
Global Digital Mathematics Library (271 words) [view diff] exact match in snippet view article find links to article
CICM 2017, Edinburgh, UK, July 17-21, 2017, Proceedings, Lecture Notes in Computer Science, vol. 10383, Springer, pp. 56–69, doi:10.1007/978-3-319-62075-6_5
DES-X (533 words) [view diff] exact match in snippet view article find links to article
Attacks". Advances in Cryptology — EUROCRYPT 2000 (PDF). Lecture Notes in Computer Science. Vol. 1807. pp. 589–606. doi:10.1007/3-540-45539-6_41.
SMP (computer algebra system) (593 words) [view diff] exact match in snippet view article
Jenks, "A Primer: 11 Keys to New Scratchpad", EUROSAM 84, Lecture Notes in Computer Science 174 ISBN 354013350X p. 123-142 J.H. Davenport, Y. Siret, E
School timetable (1,074 words) [view diff] exact match in snippet view article find links to article
Programming, Artificial Intelligence, and Operations Research. Lecture Notes in Computer Science. Vol. 12296. Springer International Publishing. pp. 283–299
GroupLens Research (3,181 words) [view diff] exact match in snippet view article find links to article
Development. Asia-Pacific Conference on Web Intelligence. Lecture Notes in Computer Science. Vol. 2198/2001. Springer Berlin/Heidelberg. pp. 438–442.
Cooperating Validity Checker (1,994 words) [view diff] exact match in snippet view article find links to article
Kovács, Laura; Pattinson, Dirk (eds.). Automated Reasoning. Lecture Notes in Computer Science. Vol. 13385. Cham: Springer International Publishing. pp. 15–35
Osman Yaşar (445 words) [view diff] exact match in snippet view article find links to article
Workforce and Pedagogy to Improve Math and Science Education,” Lecture Notes in Computer Science, Vol. 3992 (2006), pp. 169–176. O. Yaşar, J. Maliekal, L.
Heavy-light decomposition (1,017 words) [view diff] exact match in snippet view article find links to article
trees", Algorithms and data structures (Ottawa, ON, 1991), Lecture Notes in Computer Science, vol. 519, Berlin: Springer, pp. 32–40, doi:10.1007/BFb0028247
Patricia Bouyer-Decitre (470 words) [view diff] exact match in snippet view article find links to article
Software Technology and Theoretical Computer Science (PDF), Lecture Notes in Computer Science, vol. 3328, Springer, pp. 148–160, doi:10.1007/978-3-540-30538-5_13
Mizar system (1,225 words) [view diff] exact match in snippet view article find links to article
TPHOLs 2009, Munich, Germany, August 17–20, 2009. Proceedings. Lecture Notes in Computer Science. Vol. 5674. Springer. pp. 67–72. doi:10.1007/978-3-642-03359-9_5
Ball tree (1,401 words) [view diff] exact match in snippet view article find links to article
Similar Patches in Images?". Computer Vision – ECCV 2008 (PDF). Lecture Notes in Computer Science. Vol. 5303. p. 364. CiteSeerX 10.1.1.360.7582. doi:10
Moni Naor (681 words) [view diff] exact match in snippet view article find links to article
Advances in Cryptology — CRYPTO' 93 (Extended abstract). Lecture Notes in Computer Science. Vol. 773. pp. 480–491. doi:10.1007/3-540-48329-2_40. ISBN 978-3-540-57766-9
Congestion game (7,315 words) [view diff] exact match in snippet view article find links to article
Kontogiannis, Spyros (eds.). Internet and Network Economics. Lecture Notes in Computer Science. Vol. 4286. Berlin, Heidelberg: Springer. pp. 87–98. doi:10
Zooko Wilcox-O'Hearn (569 words) [view diff] exact match in snippet view article find links to article
as MD5" (PDF). Applied Cryptography and Network Security. Lecture Notes in Computer Science. Vol. 7954. IACR. pp. 119–135. doi:10.1007/978-3-642-38980-1_8
Anomaly detection (4,419 words) [view diff] exact match in snippet view article find links to article
Spaces. Principles of Data Mining and Knowledge Discovery. Lecture Notes in Computer Science. Vol. 2431. p. 15. doi:10.1007/3-540-45681-3_2. ISBN 978-3-540-44037-6
Philippe Baptiste (4,439 words) [view diff] exact match in snippet view article find links to article
Principles and Practice of Constraint Programming – CP 2009, Lecture Notes in Computer Science, vol. 5732, Berlin, Heidelberg: Springer Berlin Heidelberg
Markovian arrival process (1,008 words) [view diff] exact match in snippet view article find links to article
Performance Evaluation of Computer and Communication Systems. Lecture Notes in Computer Science. Vol. 729. pp. 330–358. doi:10.1007/BFb0013859. ISBN 3-540-57297-X
Searchable symmetric encryption (2,431 words) [view diff] exact match in snippet view article find links to article
Moti (eds.). Applied Cryptography and Network Security. Lecture Notes in Computer Science. Vol. 3531. Berlin, Heidelberg: Springer. pp. 442–455. doi:10
SHA-2 (4,982 words) [view diff] exact match in snippet view article find links to article
(2008), New collision attacks against up to 24-step SHA-2, Lecture Notes in Computer Science, vol. 5365, Springer-Verlag, pp. 91–103, doi:10.1007/978-3-540-89754-5_8
Ontology (information science) (6,194 words) [view diff] exact match in snippet view article
NSW, Australia, October 21–25, 2013, Proceedings, Part I. Lecture Notes in Computer Science. Vol. 8218. Berlin: Springer. pp. 117–134. doi:10.1007/978-3-642-41335-3_8
Distributed key generation (1,191 words) [view diff] exact match in snippet view article find links to article
Identity-Based Cryptography". Security and Cryptography for Networks. Lecture Notes in Computer Science. Vol. 6280. pp. 436–453. CiteSeerX 10.1.1.389.4486. doi:10
Prolog (8,098 words) [view diff] exact match in snippet view article find links to article
Programming". Constructing Logic Programs, (Ed. J.M.J. Jacquet). Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence: 27–140. CiteSeerX 10
Envy-free pricing (2,559 words) [view diff] exact match in snippet view article find links to article
Walukiewicz, Igor (eds.). Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 5125. Springer Berlin Heidelberg. pp. 808–819. CiteSeerX 10
Markovian arrival process (1,008 words) [view diff] exact match in snippet view article find links to article
Performance Evaluation of Computer and Communication Systems. Lecture Notes in Computer Science. Vol. 729. pp. 330–358. doi:10.1007/BFb0013859. ISBN 3-540-57297-X
Software diversity (818 words) [view diff] exact match in snippet view article find links to article
(2011), "Diversity", Dependable and Historic Computing, Lecture Notes in Computer Science, vol. 6875, Springer Berlin Heidelberg, pp. 298–312, doi:10
Product-form solution (1,817 words) [view diff] exact match in snippet view article find links to article
and Product Form". Applications and Theory of Petri Nets. Lecture Notes in Computer Science. Vol. 5606. p. 103. CiteSeerX 10.1.1.745.1585. doi:10
Deepak Kapur (1,936 words) [view diff] exact match in snippet view article find links to article
specifications". 9th International Conference on Automated Deduction. Lecture Notes in Computer Science. Vol. 310. Springer, Berlin, Heidelberg. pp. 162–181. doi:10
Perfect matching (949 words) [view diff] exact match in snippet view article find links to article
Wegener, Ingo (eds.). Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 4051. Berlin, Heidelberg: Springer. pp. 453–464. doi:10
Schnorr signature (1,255 words) [view diff] exact match in snippet view article find links to article
Application of Cryptographic Techniques. Proceedings of CRYPTO '86. Lecture Notes in Computer Science. Vol. 263. pp. 186–194. doi:10.1007/3-540-47721-7_12. ISBN 978-3-540-18047-0
Mutilated chessboard problem (2,878 words) [view diff] exact match in snippet view article find links to article
2010, Nha Trang, Vietnam, July 19–21, 2010, Proceedings, Lecture Notes in Computer Science, vol. 6196, Springer, pp. 288–297, arXiv:1103.3309, doi:10
Markus Jakobsson (1,236 words) [view diff] exact match in snippet view article find links to article
Trustworthy Elections: New Directions in Electronic Voting (Lecture Notes in Computer Science / Security and Cryptology), David Chaum, Markus Jakobsson
NP-intermediate (1,534 words) [view diff] exact match in snippet view article find links to article
JELIA 2002, Cosenza, Italy, September, 23-26, Proceedings. Lecture Notes in Computer Science. Vol. 2424. Springer. pp. 549–564. doi:10.1007/3-540-45757-7_53
Uniform-machines scheduling (1,767 words) [view diff] exact match in snippet view article find links to article
Machines". In Diekert, Volker; Habib, Michel (eds.). Stacs 2004. Lecture Notes in Computer Science. Vol. 2996. Berlin, Heidelberg: Springer. pp. 608–619. doi:10
Device fingerprint (3,940 words) [view diff] exact match in snippet view article find links to article
Atallah MJ, Hopper NJ (eds.). Privacy Enhancing Technologies. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 1–18. ISBN 978-3-642-14527-8
State complexity (3,375 words) [view diff] exact match in snippet view article find links to article
Automata". Mathematical Foundations of Computer Science 2005. Lecture Notes in Computer Science. Vol. 3618. pp. 544–555. doi:10.1007/11549345_47. ISBN 978-3-540-28702-5
Logic for Computable Functions (614 words) [view diff] exact match in snippet view article find links to article
(1979). Edinburgh LCF: A Mechanised Logic of Computation. Lecture Notes in Computer Science. Vol. 78. Berlin Heidelberg: Springer. doi:10.1007/3-540-09724-4
Matrix analytic method (912 words) [view diff] exact match in snippet view article find links to article
Performance Evaluation of Complex Systems: Techniques and Tools. Lecture Notes in Computer Science. Vol. 2459. pp. 36. doi:10.1007/3-540-45798-4_3. ISBN 978-3-540-44252-3
Poly1305 (2,513 words) [view diff] exact match in snippet view article find links to article
Software Encryption: 12th international workshop. FSE 2005. Lecture Notes in Computer Science. Paris, France: Springer. doi:10.1007/11502760_3. ISBN 3-540-26541-4
Belief–desire–intention software model (2,129 words) [view diff] exact match in snippet view article find links to article
Knowledge-Based Intelligent Information and Engineering Systems. Lecture Notes in Computer Science. Vol. 3683. pp. 282–288. doi:10.1007/11553939_41. ISBN 978-3-540-28896-1
Ring signature (1,942 words) [view diff] exact match in snippet view article find links to article
Leak a Secret". Advances in Cryptology — ASIACRYPT 2001. Lecture Notes in Computer Science. Vol. 2248. pp. 552–565. doi:10.1007/3-540-45682-1_32.
Key encapsulation mechanism (3,061 words) [view diff] exact match in snippet view article find links to article
Ciphertext Attack. Advances in Cryptology – EUROCRYPT 2000. Lecture Notes in Computer Science. Vol. 1807. Bruges, Belgium: Springer. pp. 275–288. doi:10
Cipher security summary (801 words) [view diff] exact match in snippet view article find links to article
"Attacking Triple Encryption". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 1372. Springer. pp. 239–253. doi:10.1007/3-540-69710-1_16
HipNav (172 words) [view diff] exact match in snippet view article find links to article
Computing and Computer-Assisted Intervention – MICCAI 2000. Lecture Notes in Computer Science. Vol. 1935. pp. 1185–7. doi:10.1007/978-3-540-40899-4_126
Barrier resilience (1,083 words) [view diff] exact match in snippet view article find links to article
Rhodes, Greece, July 10-11, 2009, Revised Selected Papers, Lecture Notes in Computer Science, vol. 5804, Springer, pp. 29–40, Bibcode:2009LNCS.5304...29B
Threefish (1,366 words) [view diff] exact match in snippet view article find links to article
Seoul, Korea, February 7–10, 2010, Revised Selected Papers. Lecture Notes in Computer Science. Vol. 6147. Springer. pp. 333–346. doi:10.1007/978-3-642-13858-4_19
International Conference on Computational Intelligence Methods for Bioinformatics and Biostatistics (856 words) [view diff] exact match in snippet view article find links to article
Intelligence Methods for Bioinformatics and Biostatistics. Lecture Notes in Computer Science. Vol. 7548. Springer. pp. 238–252. doi:10.1007/978-3-642-35686-5_20
Romeo Model Checker (159 words) [view diff] exact match in snippet view article find links to article
Conference on Computer Aided Verification (CAV'05), volume 3576 of Lecture Notes in Computer Science, pages 418-423, Edinburgh, Scotland, UK, July 2005. Springer
Jutta Treviranus (5,359 words) [view diff] exact match in snippet view article find links to article
Interaction. Design and Development Methods for Universal Access. Lecture Notes in Computer Science. Vol. 8513. Springer International Publishing. pp. 191–202
Klaus Pohl (computer scientist) (725 words) [view diff] exact match in snippet view article
1st European Conference ServiceWave 2008, Volume 5377 of Lecture Notes in Computer Science, Berlin, Heidelberg, Springer, 2008. Klaus Pohl, Patrick Heymans
Curve25519 (1,803 words) [view diff] exact match in snippet view article find links to article
Public Key Cryptography - PKC 2006. Public Key Cryptography. Lecture Notes in Computer Science. Vol. 3958. New York: Springer. pp. 207–228. doi:10.1007/11745853_14
Artificial psychology (710 words) [view diff] exact match in snippet view article find links to article
Psychology". In Smith, Michael J.; Salvendy, Gavriel (eds.). Lecture Notes in Computer Science. Vol. 4557. Springer Berlin Heidelberg. pp. 208–217. doi:10
Courcelle's theorem (3,146 words) [view diff] exact match in snippet view article find links to article
(eds.), Proc. 18th Annual European Symposium on Algorithms, Lecture Notes in Computer Science, vol. 6346, Springer, pp. 549–560, doi:10.1007/978-3-642-15775-2_47
Genetic programming (3,543 words) [view diff] exact match in snippet view article find links to article
Discovery". Parallel Problem Solving from Nature PPSN VI. Lecture Notes in Computer Science. Vol. 1917. Springer. pp. 211–220. doi:10.1007/3-540-45356-3_21
Norman Paton (1,101 words) [view diff] exact match in snippet view article find links to article
Model database". Advances in Database Technology—EDBT '88. Lecture Notes in Computer Science. Vol. 303. p. 34. doi:10.1007/3-540-19074-0_46. ISBN 978-3-540-19074-5
Deterministic finite automaton (3,736 words) [view diff] exact match in snippet view article find links to article
Theoretical Results and Applications. ICGI 2010. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Vol. 6339. pp. 66–79. doi:10.1007/978-3-642-15488-1_7
Folksonomy (3,215 words) [view diff] exact match in snippet view article find links to article
R; Ausloos, M. (2005). Computational Science – ICCS 2006. Lecture Notes in Computer Science. Vol. 3993. pp. 1114–1117. arXiv:cs.DS/0512090. doi:10.1007/11758532_152
Feedback vertex set (1,805 words) [view diff] exact match in snippet view article find links to article
Number". In Kaplan, Haim (ed.). Algorithm Theory - SWAT 2010. Lecture Notes in Computer Science. Vol. 6139. Berlin, Heidelberg: Springer. pp. 81–92. Bibcode:2010LNCS
Shape analysis (program analysis) (1,034 words) [view diff] exact match in snippet view article
Analysis for Recursive Programs" (PDF). Compiler Construction. Lecture Notes in Computer Science. Vol. 2027. pp. 133–149. doi:10.1007/3-540-45306-7_10.
Binary decision diagram (3,067 words) [view diff] exact match in snippet view article find links to article
Conference on Principles and Practice of Constraint Programming. Lecture Notes in Computer Science. Vol. 3258. Springer. p. 816. doi:10.1007/978-3-540-30201-8_94
Norman Paton (1,101 words) [view diff] exact match in snippet view article find links to article
Model database". Advances in Database Technology—EDBT '88. Lecture Notes in Computer Science. Vol. 303. p. 34. doi:10.1007/3-540-19074-0_46. ISBN 978-3-540-19074-5
Mathias Payer (1,590 words) [view diff] exact match in snippet view article find links to article
of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science. Vol. 9148. pp. 144–164. doi:10.1007/978-3-319-20550-2_8.
Constrained Horn clauses (593 words) [view diff] exact match in snippet view article find links to article
Constantin; Lal, Akash (eds.). Computer Aided Verification. Lecture Notes in Computer Science. Cham: Springer Nature Switzerland. pp. 209–223. doi:10
Romeo Model Checker (159 words) [view diff] exact match in snippet view article find links to article
Conference on Computer Aided Verification (CAV'05), volume 3576 of Lecture Notes in Computer Science, pages 418-423, Edinburgh, Scotland, UK, July 2005. Springer
Neighbor joining (2,881 words) [view diff] exact match in snippet view article find links to article
reconstruction", pp. 101–110. In Jiang, T., and Lee, D., eds., Lecture Notes in Computer Science, 1276, Springer-Verlag, Berlin. COCOON '97. Mihaescu R, Levy
Area (graph drawing) (937 words) [view diff] exact match in snippet view article
2002, Irvine, CA, USA, August 26–28, 2002, Revised Papers, Lecture Notes in Computer Science, vol. 2528, Springer, pp. 54–65, doi:10.1007/3-540-36151-0_6
List of NP-complete problems (2,746 words) [view diff] exact match in snippet view article find links to article
complexity of upward and rectilinear planarity testing". Lecture Notes in Computer Science. Vol. 894/1995. pp. 286–297. doi:10.1007/3-540-58950-3_384
Abstract interpretation (2,924 words) [view diff] exact match in snippet view article find links to article
Programming Language Implementation and Logic Programming (PLILP). Lecture Notes in Computer Science. Vol. 631. Springer. pp. 269–296. ISBN 978-0-387-55844-8.
Unicheck (760 words) [view diff] exact match in snippet view article find links to article
System". Natural Language Processing and Information Systems. Lecture Notes in Computer Science. Vol. 10260. Springer, Cham. pp. 227–231. doi:10.1007/978-3-319-59569-6_27
Evolvable hardware (799 words) [view diff] exact match in snippet view article find links to article
with physics". Evolvable Systems: From Biology to Hardware. Lecture Notes in Computer Science. Vol. 1259. pp. 390–405. CiteSeerX 10.1.1.50.9691. doi:10
Uplift modelling (2,172 words) [view diff] exact match in snippet view article find links to article
Uplift Modeling". Advanced Information Systems Engineering. Lecture Notes in Computer Science. Vol. 8190. Prague. pp. 595–611. doi:10.1007/978-3-642-40994-3_38
Long short-term memory (5,817 words) [view diff] exact match in snippet view article find links to article
Structure of the Blues". Artificial Neural Networks — ICANN 2002. Lecture Notes in Computer Science. Vol. 2415. Springer, Berlin, Heidelberg. pp. 284–289. CiteSeerX 10
Doll fetishism (220 words) [view diff] exact match in snippet view article find links to article
Li, Dongyu; Perez-Osorio, Jairo (eds.). Social Robotics. Lecture Notes in Computer Science. Vol. 13086. Cham: Springer International Publishing. pp. 130–141
Data augmentation (1,772 words) [view diff] exact match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems – CHES 2017. Lecture Notes in Computer Science. Vol. 10529. Cham: Springer International Publishing. pp. 45–68
Böhm tree (1,874 words) [view diff] exact match in snippet view article find links to article
labelled λ-calculus". λ-Calculus and Computer Science Theory. Lecture Notes in Computer Science. Vol. 37. pp. 147–165. doi:10.1007/BFb0029523. ISBN 3-540-07416-3
Optical braille recognition (716 words) [view diff] exact match in snippet view article find links to article
Robust Braille Recognition System". Document Analysis Systems. Lecture Notes in Computer Science. Vol. VI. pp. 533–545. doi:10.1007/978-3-540-28640-0_50.
Arc diagram (2,597 words) [view diff] exact match in snippet view article find links to article
WA, USA, September 19–21, 2012, Revised Selected Papers, Lecture Notes in Computer Science, vol. 7704, Springer, pp. 150–161, doi:10.1007/978-3-642-36763-2_14
Budget-feasible mechanism (252 words) [view diff] exact match in snippet view article find links to article
Viola, Alfredo (eds.). LATIN 2014: Theoretical Informatics. Lecture Notes in Computer Science. Vol. 8392. Berlin, Heidelberg: Springer. pp. 719–730. arXiv:1302
MilkyWay@home (2,639 words) [view diff] exact match in snippet view article find links to article
Grids". Distributed Applications and Interoperable Systems. Lecture Notes in Computer Science. Vol. 6115. pp. 29–41. doi:10.1007/978-3-642-13645-0_3.
Differential cryptanalysis (1,677 words) [view diff] exact match in snippet view article find links to article
EnRUPT". In Dunkelman, Orr (ed.). Fast Software Encryption. Lecture Notes in Computer Science. Vol. 5665. Berlin, Heidelberg: Springer. pp. 246–259. doi:10
Data-flow analysis (3,561 words) [view diff] exact match in snippet view article find links to article
SAS'99, Venice, Italy, September 22–24, 1999, Proceedings. Lecture Notes in Computer Science. Vol. 1694 (illustrated ed.). Springer. pp. 232–247 [233]
Group-based cryptography (355 words) [view diff] exact match in snippet view article find links to article
on the Word Problem". Advances in Cryptology—CRYPTO 1984. Lecture Notes in Computer Science. Vol. 196. Springer. pp. 19–36. doi:10.1007/3-540-39568-7_3
C Bounded Model Checker (740 words) [view diff] exact match in snippet view article find links to article
Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. pp. 168–176. doi:10.1007/978-3-540-24730-2_15
Jayadev Misra (1,066 words) [view diff] exact match in snippet view article find links to article
Course. A Decade of Concurrency Reflections and Perspectives. Lecture Notes in Computer Science (LNCS). Vol. 803. Springer, Berlin, Heidelberg. p. 352. doi:10
Rational monoid (633 words) [view diff] exact match in snippet view article find links to article
to Symeon Bozapalidis on the occasion of his retirement. Lecture Notes in Computer Science. Vol. 7020. Berlin: Springer-Verlag. pp. 228–256. ISBN 978-3-642-24896-2
Cryptosystem (497 words) [view diff] exact match in snippet view article find links to article
Steinfeld, Ron (eds.). Information Security and Privacy. Lecture Notes in Computer Science. Vol. 9723. Cham: Springer International Publishing. pp. 73–86
Asiddhatva (1,594 words) [view diff] exact match in snippet view article find links to article
Model of Aṣṭādhyāyī". Sanskrit Computational Linguistics. Lecture Notes in Computer Science. Vol. 6465. p. 1. doi:10.1007/978-3-642-17528-2_18. ISBN 978-3-642-17527-5
Spaghetti code (1,611 words) [view diff] exact match in snippet view article find links to article
proper exception handling". Lecture Notes in Computer Science. Ada – Europe '93 (Proceedings). Lecture Notes in Computer Science. Vol. 688. Springer Berlin
TLA+ (4,068 words) [view diff] exact match in snippet view article find links to article
Correct Hardware Design and Verification Methods (PDF). Lecture Notes in Computer Science. Vol. 1703. Springer-Verlag. pp. 54–66. doi:10.1007/3-540-48153-2_6
BLAST model checker (386 words) [view diff] exact match in snippet view article find links to article
Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science. Vol. 7214. Springer-Verlag. pp. 525–527. ISBN 978-3-642-28756-5
Diffie–Hellman key exchange (5,437 words) [view diff] exact match in snippet view article find links to article
Protocols and their Security Analysis", Crytography and Coding, Lecture Notes in Computer Science, vol. 1355, pp. 30–45, CiteSeerX 10.1.1.25.387, doi:10.1007/BFb0024447
Dorothea Wagner (637 words) [view diff] exact match in snippet view article find links to article
Dorothea, eds. (2001), Drawing Graphs: Methods and Models, Lecture Notes in Computer Science, vol. 2025, Springer, doi:10.1007/3-540-44969-8, ISBN 9783540420620
Gad Landau (1,254 words) [view diff] exact match in snippet view article find links to article
on Trees and Tree-Like Structures". Algorithms – ESA 2013. Lecture Notes in Computer Science. Vol. 8125. pp. 517–528. arXiv:1301.6127. doi:10.1007/978-3-642-40450-4_44
Language-oriented programming (485 words) [view diff] exact match in snippet view article find links to article
in Language Workbenches". Software Language Engineering. Lecture Notes in Computer Science. Vol. 8225. pp. 197–217. doi:10.1007/978-3-319-02654-1_11
Verifiable random function (1,501 words) [view diff] exact match in snippet view article find links to article
Palash (eds.). Advances in Cryptology - ASIACRYPT 2013. Lecture Notes in Computer Science. Vol. 8270. Berlin, Heidelberg: Springer. pp. 280–300. doi:10
Microsoft SEAL (515 words) [view diff] exact match in snippet view article find links to article
Thomas (eds.). Advances in Cryptology – ASIACRYPT 2017. Lecture Notes in Computer Science. Vol. 10624. Cham: Springer International Publishing. pp. 409–437
Jon Lee (mathematician) (413 words) [view diff] exact match in snippet view article
2012), Integer Programming and Combinatorial Optimization (Lecture Notes in Computer Science, Vol. 8494; Springer, 2014), Special Issue: Integer Programming
Property Specification Language (1,412 words) [view diff] exact match in snippet view article find links to article
Logic on Truncated Paths" (PDF). Computer Aided Verification. Lecture Notes in Computer Science. Vol. 2725. p. 27. doi:10.1007/978-3-540-45069-6_3. ISBN 978-3-540-40524-5
Ring learning with errors signature (2,570 words) [view diff] exact match in snippet view article find links to article
Gilbert, Henri (ed.). Advances in Cryptology – EUROCRYPT 2010. Lecture Notes in Computer Science. Vol. 6110. pp. 1–23. CiteSeerX 10.1.1.297.6108. doi:10
All-or-nothing transform (627 words) [view diff] exact match in snippet view article find links to article
All-or-Nothing Transform". Advances in Cryptology — CRYPTO' 99. Lecture Notes in Computer Science. Vol. 1666. pp. 503–518. doi:10.1007/3-540-48405-1_32.
Interactive computation (195 words) [view diff] exact match in snippet view article find links to article
Persistent Turing Machines as a model of interactive computation. Lecture Notes in Computer Science 1762, pp. 116-135. D. Goldin, S. Smolka, P. Attie, E. Sonderegger
Specification and Description Language (1,106 words) [view diff] exact match in snippet view article find links to article
Diagrams". SDL 2013: Model-Driven Dependability Engineering. Lecture Notes in Computer Science. Vol. 7916. Springer Berlin Heidelberg. pp. 258–274. doi:10
Verifiable random function (1,501 words) [view diff] exact match in snippet view article find links to article
Palash (eds.). Advances in Cryptology - ASIACRYPT 2013. Lecture Notes in Computer Science. Vol. 8270. Berlin, Heidelberg: Springer. pp. 280–300. doi:10
Simultaneous embedding (1,651 words) [view diff] exact match in snippet view article find links to article
Sydney, Australia, September 24–26, 2007, Revised Papers, Lecture Notes in Computer Science, vol. 4875, Berlin: Springer, pp. 280–290, doi:10.1007/978-3-540-77537-9_28
Separation logic (3,646 words) [view diff] exact match in snippet view article find links to article
Verification, Model Checking, and Abstract Interpretation (PDF). Lecture Notes in Computer Science. Vol. 5403. pp. 266–277. doi:10.1007/978-3-540-93900-9_3.
SLAM project (241 words) [view diff] exact match in snippet view article find links to article
Verifier: Technology Transfer of Formal Methods inside Microsoft; Lecture Notes in Computer Science (LNCS), Vol. 2999: Boiten, Eerke A.; Derrick, John; and Smith
350 nm process (208 words) [view diff] exact match in snippet view article find links to article
". Constructive Side-Channel Analysis and Secure Design. Lecture Notes in Computer Science. Vol. 10348. pp. 207–222. doi:10.1007/978-3-319-64647-3_13
Cryptographic nonce (881 words) [view diff] exact match in snippet view article find links to article
Bimal Roy; Willi Meier (eds.). Fast Software Encryption. Lecture Notes in Computer Science. Vol. 3017. pp. 348–358. doi:10.1007/978-3-540-25937-4_22
Quotient type (648 words) [view diff] exact match in snippet view article find links to article
Clarke, Edmund; Kozen, Dexter (eds.). Logics of Programs. Lecture Notes in Computer Science. Vol. 164. Berlin, Heidelberg: Springer. pp. 116–128. doi:10
Keystroke-level model (2,749 words) [view diff] exact match in snippet view article find links to article
Jacko, Julie A (ed.). Human-Computer Interaction. New Trends. Lecture Notes in Computer Science. Vol. 5610. Berlin Heidelberg: Springer-Verlag. p. 355. doi:10
SMASH (hash) (314 words) [view diff] exact match in snippet view article
Design Strategy Called SMASH". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 3897. pp. 233–244. doi:10.1007/11693383_16. ISBN 978-3-540-33108-7
Dinic's algorithm (1,693 words) [view diff] exact match in snippet view article find links to article
Theoretical Computer Science: Essays in Memory of Shimon Even. Lecture Notes in Computer Science. Vol. 3895. Springer. pp. 218–240. doi:10.1007/11685654_10
Evolutionary multimodal optimization (1,292 words) [view diff] exact match in snippet view article find links to article
Approach to Multimodal Optimization: Self-adaptive Approach " (Lecture Notes in Computer Science, 2010, Volume 6457/2010, 95–104) C. Stoean, M. Preuss, R.
Undeniable signature (912 words) [view diff] exact match in snippet view article find links to article
Signatures". Advances in Cryptology — CRYPTO' 89 Proceedings. Lecture Notes in Computer Science. Vol. 435. pp. 212–216. doi:10.1007/0-387-34805-0_20. ISBN 978-0-387-97317-3
Ada Programming Support Environment (437 words) [view diff] exact match in snippet view article find links to article
in Long, Fred (ed.), Software Engineering Environments, Lecture Notes in Computer Science, vol. 467, Springer Berlin Heidelberg, pp. 179–193, doi:10
Dynamic convex hull (769 words) [view diff] exact match in snippet view article find links to article
upper envelopes", Algorithms and Data Structures (WADS 2005), Lecture Notes in Computer Science, vol. 3608, Berlin: Springer, pp. 269–281, doi:10.1007/11534273_24
Arthur Zimek (572 words) [view diff] exact match in snippet view article find links to article
Dimensionality?". Scientific and Statistical Database Management. Lecture Notes in Computer Science. Vol. 6187. Springer, Berlin, Heidelberg. pp. 482–500. CiteSeerX 10
Evolution strategy (2,053 words) [view diff] exact match in snippet view article find links to article
information". Parallel Problem Solving from Nature — PPSN III. Lecture Notes in Computer Science. Vol. 866. Springer. pp. 189–198. doi:10.1007/3-540-58484-6_263
Graph reduction machine (324 words) [view diff] exact match in snippet view article find links to article
Functional Programming Languages and Computer Architecture. Lecture Notes in Computer Science. Vol. 274. Berlin, Heidelberg: Springer. pp. 98–112. doi:10
Computer security compromised by hardware failure (5,114 words) [view diff] exact match in snippet view article find links to article
Countermeasures: The Case of AES". Topics in Cryptology – CT-RSA 2006. Lecture Notes in Computer Science. Vol. 3860. San Jose, California, USA: Springer-Verlag Berlin
Table of metaheuristics (3,875 words) [view diff] exact match in snippet view article find links to article
Hailin (eds.). Computational Intelligence and Security. Lecture Notes in Computer Science. Vol. 4456. Berlin, Heidelberg: Springer. pp. 167–176. doi:10
Skew-symmetric graph (2,318 words) [view diff] exact match in snippet view article find links to article
and structure", Computer Science – Theory and Applications, Lecture Notes in Computer Science, vol. 3967, Springer-Verlag, pp. 23–34, arXiv:math/0607547
RACE (Europe) (120 words) [view diff] exact match in snippet view article
Cryptology – EUROCRYPT '91. EUROCRYPT 1991. Lecture Notes in Computer Science, vol 547. Lecture Notes in Computer Science. Vol. 547. Springer. pp. 547–551. doi:10
Minimum-weight triangulation (3,289 words) [view diff] exact match in snippet view article find links to article
"A study of the LMT-skeleton", Algorithms and Computation, Lecture Notes in Computer Science, vol. 1178, pp. 256–265, doi:10.1007/BFb0009502, ISBN 978-3-540-62048-8
CLEFIA (208 words) [view diff] exact match in snippet view article find links to article
of Reduced-Round CLEFIA". Proceedings of INDOCRYPT, 2010. Lecture Notes in Computer Science. Springer-Verlag. Archived from the original on 2013-02-03
List of PSPACE-complete problems (1,807 words) [view diff] exact match in snippet view article find links to article
is PSPACE-Complete". Automata, Languages, and Programming. Lecture Notes in Computer Science. Vol. 7965. pp. 497–503. arXiv:1209.1750. doi:10.1007/978-3-642-39206-1_42
GOST (block cipher) (1,455 words) [view diff] exact match in snippet view article
on the Full GOST Block Cipher". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 6733. pp. 290–305. doi:10.1007/978-3-642-21702-9_17
Stephen Muggleton (783 words) [view diff] exact match in snippet view article find links to article
"Learning from positive data". Inductive Logic Programming. Lecture Notes in Computer Science. Vol. 1314. pp. 358–376. doi:10.1007/3-540-63494-0_65.
Stathis Zachos (601 words) [view diff] exact match in snippet view article find links to article
of Software Technology and Theoretical Computer Science. Lecture Notes in Computer Science. Vol. 287. pp. 443–455. doi:10.1007/3-540-18625-5_67. ISBN 978-3-540-18625-0
Nimbus (cipher) (165 words) [view diff] exact match in snippet view article
"Differential Cryptanalysis of Nimbus". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 2355. pp. 187–195. doi:10.1007/3-540-45473-X_16.
Order statistic tree (487 words) [view diff] exact match in snippet view article find links to article
(2001). A new method for balancing binary search trees. ICALP. Lecture Notes in Computer Science. Vol. 2076. pp. 469–480. doi:10.1007/3-540-48224-5_39.
QuickCheck (1,115 words) [view diff] exact match in snippet view article find links to article
Symposium on Functional and Logic Programming (FLOPS 2014). Lecture Notes in Computer Science. Vol. 8475. pp. 1–17. doi:10.1007/978-3-319-07151-0_1.
Collaborative search engine (2,013 words) [view diff] exact match in snippet view article find links to article
Transactions on Computational Collective Intelligence II. Lecture Notes in Computer Science. Vol. 2. pp. 46–69. Bibcode:2010LNCS.6450...46L. doi:10
Medical image computing (8,487 words) [view diff] exact match in snippet view article find links to article
Proceedings for this conference are published by Springer in the Lecture Notes in Computer Science series. In 2000, N. Ayache and J. Duncan reviewed the state
Boolean satisfiability problem (5,112 words) [view diff] exact match in snippet view article find links to article
Principles and Practice of Constraint Programming – CP 2007, Lecture Notes in Computer Science, vol. 4741, pp. 544–558, CiteSeerX 10.1.1.70.5471, doi:10
F-FCSR (121 words) [view diff] exact match in snippet view article find links to article
stream cipher in Real Time" (PDF). In Pieprzyk, Josef (ed.). Lecture Notes in Computer Science. ASIACRYPT 2008. Vol. 5350. Springer Berlin / Heidelberg.
Automotive security (2,176 words) [view diff] exact match in snippet view article find links to article
of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science. Vol. 10327. Springer International Publishing. pp. 185–206
Leontief utilities (815 words) [view diff] exact match in snippet view article find links to article
of Leontief Market Equilibria". Frontiers in Algorithmics. Lecture Notes in Computer Science. Vol. 4613. p. 96. doi:10.1007/978-3-540-73814-5_9. ISBN 978-3-540-73813-8
Wikiquote (756 words) [view diff] exact match in snippet view article find links to article
International Workshop on Fuzzy Logic and Applications. Lecture Notes in Computer Science. doi:10.1007/978-3-540-73400-0_58. ISBN 978-3-540-73399-7
NorduGrid (942 words) [view diff] exact match in snippet view article find links to article
NorduGrid ARC Middleware". Advances in Grid Computing - EGC 2005. Lecture Notes in Computer Science. Vol. 3470. Berlin/Heidelberg: Springer. pp. 861–871. doi:10
Thousands of Problems for Theorem Provers (250 words) [view diff] exact match in snippet view article find links to article
Theorem Proving". KI 2009: Advances in Artificial Intelligence. Lecture Notes in Computer Science. Vol. 5803. pp. 435–443. CiteSeerX 10.1.1.329.1809. doi:10
LCP array (4,379 words) [view diff] exact match in snippet view article find links to article
12th Annual Symposium on Combinatorial Pattern Matching. Lecture Notes in Computer Science. Vol. 2089. pp. 181–192. doi:10.1007/3-540-48194-X_17.
Straight skeleton (2,179 words) [view diff] exact match in snippet view article find links to article
Ann. Int. Conf. Computing and Combinatorics (COCOON '96). Lecture Notes in Computer Science. Vol. 1090. Springer-Verlag. pp. 117–126. Peschka, Gustav
Garbled circuit (2,917 words) [view diff] exact match in snippet view article find links to article
Gates and Applications". Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 5126. pp. 486–498. CiteSeerX 10.1.1.160.5268. doi:10
Babel program (391 words) [view diff] exact match in snippet view article find links to article
Potapova R., Mporas I. (eds) Speech and Computer. SPECOM 2017. Lecture Notes in Computer Science, vol 10458. Springer, Cham. https://doi.org/10.1007/978-3-319-66429-3_1
Authenticated encryption (2,104 words) [view diff] exact match in snippet view article find links to article
(ed.). Fast Software Encryption (FSE): 2000 Proceedings. Lecture Notes in Computer Science. Vol. 1978. pp. 284–299. doi:10.1007/3-540-44706-7_20.
Supersingular isogeny key exchange (3,674 words) [view diff] exact match in snippet view article find links to article
2023. International Association for Cryptologic Research. Lecture Notes in Computer Science. Vol. 14008. Springer. pp. 423–447. doi:10.1007/978-3-031-30589-4_15
RACE (Europe) (120 words) [view diff] exact match in snippet view article
Cryptology – EUROCRYPT '91. EUROCRYPT 1991. Lecture Notes in Computer Science, vol 547. Lecture Notes in Computer Science. Vol. 547. Springer. pp. 547–551. doi:10
Indistinguishability obfuscation (2,298 words) [view diff] exact match in snippet view article find links to article
Obfuscation". In Vadhan, Salil P. (ed.). Theory of Cryptography. Lecture Notes in Computer Science. Vol. 4392. Berlin, Heidelberg: Springer. pp. 194–213. doi:10
Infinite chess (841 words) [view diff] exact match in snippet view article find links to article
of Infinite Chess is Decidable". How the World Computes. Lecture Notes in Computer Science. Vol. 7318. Springer. pp. 78–88. arXiv:1201.5597. doi:10
HiLog (601 words) [view diff] case mismatch in snippet view article find links to article
Prague, Czech Republic, January 11–13, 1995: proceedings. Lecture notes in computer science. Vol. 893. Springer. pp. 252–265. doi:10.1007/3-540-58907-4_20
E-graph (2,143 words) [view diff] exact match in snippet view article find links to article
Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science. Vol. 4963. Berlin, Heidelberg: Springer. pp. 337–340. doi:10
Kyber (1,472 words) [view diff] exact match in snippet view article find links to article
Structured LWE, Revisited" (PDF), Theory of Cryptography, Lecture Notes in Computer Science (in German), vol. 11891, Cham: Springer International Publishing
Kai Salomaa (370 words) [view diff] exact match in snippet view article find links to article
transformation for finite languages". Automata Implementation. Lecture Notes in Computer Science. Vol. 1260. pp. 149–158. doi:10.1007/3-540-63174-7_12.
Negation as failure (1,318 words) [view diff] exact match in snippet view article find links to article
Semantic Web Reasoning. PPSW3 2003. Lecture Notes in Computer Science. Vol. 2901. Lecture Notes in Computer Science: Springer. pp. 33–50. doi:10.1007/978-3-540-24572-8_3
Frama-C (771 words) [view diff] exact match in snippet view article find links to article
of Code". Trusted Computing - Challenges and Applications. Lecture Notes in Computer Science. Vol. 4968/2008. pp. 133–142. doi:10.1007/978-3-540-68979-9_10
Alan Mycroft (472 words) [view diff] exact match in snippet view article find links to article
recursive definitions". International Symposium on Programming. Lecture Notes in Computer Science. Vol. 167. pp. 217–228. doi:10.1007/3-540-12925-1_41. ISBN 978-3-540-12925-7
Range query (computer science) (5,468 words) [view diff] exact match in snippet view article
Approximations for Range Mode". Automata, Languages and Programming. Lecture Notes in Computer Science. Vol. 6198. pp. 605–616. doi:10.1007/978-3-642-14165-2_51
Algebraic Eraser (1,622 words) [view diff] exact match in snippet view article find links to article
Algebraic Eraser". Advances in Cryptology – CRYPTO 2016. Lecture Notes in Computer Science. Vol. 9814. Springer. pp. 179–189. arXiv:1511.03870. CiteSeerX 10
Prêt à Voter (1,200 words) [view diff] exact match in snippet view article find links to article
Election Scheme", Computer Security – ESORICS 2005 (PDF), Lecture Notes in Computer Science, vol. 3679, pp. 118–139, doi:10.1007/11555827_8, ISBN 978-3-540-28963-0
Automated reasoning (1,399 words) [view diff] exact match in snippet view article find links to article
Paulin-Mohring, C.; Pichardie, D. (eds.), Interactive Theorem Proving, Lecture Notes in Computer Science, vol. 7998, pp. 163–179, CiteSeerX 10.1.1.651.7964, doi:10
Malleability (cryptography) (983 words) [view diff] exact match in snippet view article
among notions of security for public-key encryption schemes. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 26–45. doi:10.1007/bfb0055718
International Mathematical Knowledge Trust (180 words) [view diff] exact match in snippet view article find links to article
Mathematical Knowledge Trust". Intelligent Computer Mathematics. Lecture Notes in Computer Science. Vol. 10383. pp. 56–69. doi:10.1007/978-3-319-62075-6_5.
Average-case complexity (3,058 words) [view diff] exact match in snippet view article find links to article
Miscellanea on the Interplay between Randomness and Computation, Lecture Notes in Computer Science, vol. 6650, Berlin, Heidelberg: Springer Berlin Heidelberg
Manifold regularization (3,872 words) [view diff] exact match in snippet view article find links to article
pointwise consistency of graph laplacians". Learning theory. Lecture Notes in Computer Science. Vol. 3559. Springer. pp. 470–485. CiteSeerX 10.1.1.103.82
Circle graph (1,694 words) [view diff] exact match in snippet view article find links to article
Science, Bordeaux, France, February 11–13, 1988, Proceedings, Lecture Notes in Computer Science, vol. 294, Berlin: Springer, pp. 61–72, doi:10.1007/BFb0035832
Fast syndrome-based hash (2,941 words) [view diff] exact match in snippet view article find links to article
Based Hashes", Progress in Cryptology – INDOCRYPT 2007 (PDF), Lecture Notes in Computer Science, vol. 4859, pp. 1–9, doi:10.1007/978-3-540-77026-8_1, ISBN 978-3-540-77025-1
Left-right planarity test (696 words) [view diff] exact match in snippet view article find links to article
WA, USA, September 19-21, 2012, Revised Selected Papers, Lecture Notes in Computer Science, vol. 7704, Berlin: Springer, pp. 557–558, doi:10.1007/978-3-642-36763-2_51
Hans L. Bodlaender (446 words) [view diff] exact match in snippet view article find links to article
Hans L. Bodlaender on the Occasion of His 60th Birthday, Lecture Notes in Computer Science, vol. 12160, Springer International Publishing, doi:10
Adversarial queueing network (198 words) [view diff] exact match in snippet view article find links to article
Combinatorial Optimization.. Algorithms and Techniques (PDF). Lecture Notes in Computer Science. Vol. 2764. p. 153. doi:10.1007/978-3-540-45198-3_14. ISBN 978-3-540-40770-6
Attention inequality (679 words) [view diff] exact match in snippet view article find links to article
Social Media Attention Among Non-profits". Social Informatics. Lecture Notes in Computer Science. Vol. 11185. Springer International Publishing. pp. 196–211
Andrey Muchnik (514 words) [view diff] exact match in snippet view article find links to article
Czechoslovakia, September 3–7, 1984. Proceedings. Lecture Notes in Computer Science. Lecture Notes in Computer Science. 176. Berlin, Heidelberg: Springer: 162–175
OpenNN (437 words) [view diff] exact match in snippet view article find links to article
Neural Networks". Adaptive and Natural Computing Algorithms. Lecture Notes in Computer Science. Vol. 6593. pp. 190–199. doi:10.1007/978-3-642-20282-7_20
Text corpus (858 words) [view diff] exact match in snippet view article find links to article
Plzeň, Czech Republic, September 14–17, 2015, Proceedings. Lecture Notes in Computer Science. Vol. 9302. Springer. pp. 32–40. arXiv:1509.08639. doi:10
Algorithm selection (1,836 words) [view diff] exact match in snippet view article find links to article
(ed.). Principles and Practice of Constraint Programming. Lecture Notes in Computer Science. Vol. 6876. pp. 454–469. CiteSeerX 10.1.1.211.1807. doi:10
HElib (212 words) [view diff] exact match in snippet view article find links to article
Gennaro, Rosario (eds.). Advances in Cryptology – CRYPTO 2014. Lecture Notes in Computer Science. Vol. 8616. Springer Berlin Heidelberg. pp. 554–571. doi:10
Forbidden graph characterization (1,224 words) [view diff] exact match in snippet view article find links to article
France, September 23-25, 2013, Revised Selected Papers, Lecture Notes in Computer Science, vol. 8242, pp. 107–118, doi:10.1007/978-3-319-03841-4_10
Reduction strategy (2,608 words) [view diff] exact match in snippet view article find links to article
and Acyclicity" (PDF). Rewriting, Computation and Proof. Lecture Notes in Computer Science. Vol. 4600. pp. 89–112. CiteSeerX 10.1.1.104.9139. doi:10
Newton Howard (1,456 words) [view diff] exact match in snippet view article find links to article
Computational Linguistics and Intelligent Text Processing. Lecture Notes in Computer Science, 8403, 113–127 Howard, N. (2013). The Twin Hypotheses: Brain
Lambda-mu calculus (842 words) [view diff] exact match in snippet view article find links to article
algorithmic interpretation of classical natural deduction. Lecture Notes in Computer Science. Vol. 624. pp. 190–201. doi:10.1007/BFb0013061. ISBN 3-540-55727-X
Scale space implementation (3,290 words) [view diff] exact match in snippet view article find links to article
in Computer Vision. Lecture Notes in Computer Science. Vol. 2695. Proc. Scale-Space'03, Springer Lecture Notes in Computer Science. pp. 148–163. doi:10
David L. Dill (1,230 words) [view diff] exact match in snippet view article find links to article
pipelined microprocessor control". Computer Aided Verification. Lecture Notes in Computer Science. Vol. 818. pp. 68–80. doi:10.1007/3-540-58179-0_44. ISBN 978-3-540-58179-6
DRE-i with enhanced privacy (1,747 words) [view diff] exact match in snippet view article find links to article
Tallying Authorities" (PDF). Computer Security – ESORICS 2016. Lecture Notes in Computer Science. Vol. 9879. pp. 223–240. doi:10.1007/978-3-319-45741-3_12
Zodiac (cipher) (238 words) [view diff] exact match in snippet view article
Zodiac Cipher". Information Security Practice and Experience. Lecture Notes in Computer Science. Vol. 4991. Springer. pp. 377–391. doi:10.1007/978-3-540-79104-1_27
Toolchain (275 words) [view diff] exact match in snippet view article find links to article
Tool Chains in Agile ALM Environments: A Short Introduction. Lecture Notes in Computer Science. Vol. 9416. pp. 371–380. doi:10.1007/978-3-319-26138-6_40
Hash chain (1,005 words) [view diff] exact match in snippet view article find links to article
Scheme" (PDF). Progress in Cryptology – AFRICACRYPT 2011. Lecture Notes in Computer Science. Vol. 6737. Springer Berlin Heidelberg. pp. 363–378. doi:10
Neural gas (1,807 words) [view diff] exact match in snippet view article find links to article
CVBIA 2005, Beijing, China, October 21, 2005 : proceedings. Lecture Notes in Computer Science. Vol. 3765. Springer. p. 210. doi:10.1007/11569541_22.
Victor Pan (759 words) [view diff] exact match in snippet view article find links to article
Matrices Faster: Gladwell, Ian (1986), Mathematical Reviews, Lecture Notes in Computer Science, 179, doi:10.1007/3-540-13866-8, ISBN 978-3-540-13866-2, MR 0765701
Michal Irani (466 words) [view diff] exact match in snippet view article find links to article
with Uncertainty". European Conference on Computer Vision. Lecture Notes in Computer Science. 1842: 539–553. doi:10.1007/3-540-45054-8_35. ISBN 978-3-540-67685-0
Call centre (3,925 words) [view diff] exact match in snippet view article find links to article
Virtual Call Center Implementation". Networking — ICN 2001. Lecture Notes in Computer Science. Vol. 2093. University of Novi Sad, Yugoslavia. pp. 75–84
Call centre (3,925 words) [view diff] exact match in snippet view article find links to article
Virtual Call Center Implementation". Networking — ICN 2001. Lecture Notes in Computer Science. Vol. 2093. University of Novi Sad, Yugoslavia. pp. 75–84
BlueJ (419 words) [view diff] exact match in snippet view article find links to article
Kölling, M. (eds.). Reflections on the Teaching of Programming. Lecture Notes in Computer Science. Vol. 4821. Springer. pp. 182–196. ISBN 978-3-540-77933-9
Geospatial topology (1,620 words) [view diff] exact match in snippet view article find links to article
error correcting in GIS". Advances in Spatial Databases. Lecture Notes in Computer Science. Vol. 1262. pp. 281–297. doi:10.1007/3-540-63238-7_35.
Neural gas (1,807 words) [view diff] exact match in snippet view article find links to article
CVBIA 2005, Beijing, China, October 21, 2005 : proceedings. Lecture Notes in Computer Science. Vol. 3765. Springer. p. 210. doi:10.1007/11569541_22.
DarwiinRemote (419 words) [view diff] exact match in snippet view article find links to article
Interaction Research". HCI in Work and Learning, Life and Leisure. Lecture Notes in Computer Science. Vol. 6389. Springer. pp. 305–317. doi:10.1007/978-3-642-16607-5_20
Ascalaph Designer (607 words) [view diff] exact match in snippet view article find links to article
Computing Large Scale Scientific and Industrial Problems. Lecture Notes in Computer Science. Vol. 1541. Heidelberg: Springer Berlin. pp. 296–303. doi:10
NodeXL (1,591 words) [view diff] exact match in snippet view article find links to article
Clustering, Grouping, and Simplification", Graph Drawing (PDF), Lecture Notes in Computer Science, vol. 7704, pp. 2–18, doi:10.1007/978-3-642-36763-2_2,
Michal Irani (466 words) [view diff] exact match in snippet view article find links to article
with Uncertainty". European Conference on Computer Vision. Lecture Notes in Computer Science. 1842: 539–553. doi:10.1007/3-540-45054-8_35. ISBN 978-3-540-67685-0
Phase-type distribution (2,368 words) [view diff] exact match in snippet view article find links to article
Analytical and Stochastic Modeling Techniques and Applications. Lecture Notes in Computer Science. Vol. 7314. p. 271. doi:10.1007/978-3-642-30782-9_19. ISBN 978-3-642-30781-2
Executable choreography (1,395 words) [view diff] exact match in snippet view article find links to article
the Move to Meaningful Internet Systems: OTM 2009 (PDF), Lecture Notes in Computer Science, vol. 5870, Springer Berlin Heidelberg, pp. 373–380, CiteSeerX 10
Polygon-circle graph (606 words) [view diff] exact match in snippet view article find links to article
2003 Perugia, Italy, September 21-24, 2003, Revised Papers, Lecture Notes in Computer Science, vol. 2912, Berlin: Springer, pp. 59–70, doi:10.1007/978-3-540-24595-7_6
Vector clock (1,862 words) [view diff] exact match in snippet view article find links to article
Distributed Systems (PDF), Lecture Notes in Computer Science, vol. 5401, Springer-Verlag, Lecture Notes in Computer Science, pp. 259–274, Bibcode:2008LNCS
Camellia (cipher) (1,805 words) [view diff] exact match in snippet view article
Conference Seoul, Korea, December 6–7, 2001, Proceedings. Lecture Notes in Computer Science. Vol. 2288. Springer. pp. 32–38. doi:10.1007/3-540-45861-1_3
IEEE 802.15.6 (550 words) [view diff] exact match in snippet view article find links to article
15.6 Standard". Financial Cryptography and Data Security. Lecture Notes in Computer Science. Vol. 8976. pp. 245–260. arXiv:1501.02601. doi:10.1007/978-3-662-48051-9_18
Juan Pavón (3,091 words) [view diff] exact match in snippet view article find links to article
Müller, Jörg (eds.). Multi-Agent Systems and Applications III. Lecture Notes in Computer Science. Vol. 2691. Springer Berlin Heidelberg. pp. 394–403. doi:10
Multi-objective optimization (9,569 words) [view diff] exact match in snippet view article find links to article
Ajith (eds.). Transactions on Computational Science XXI. Lecture Notes in Computer Science. Vol. 8160. Springer Berlin Heidelberg. pp. 145–163. doi:10
Abdigani Diriye (718 words) [view diff] exact match in snippet view article find links to article
Research and Advanced Technology for Digital Libraries. Lecture Notes in Computer Science. Vol. 8092. Springer Berlin Heidelberg. pp. 235–240. doi:10
David Wheeler (computer scientist) (1,420 words) [view diff] exact match in snippet view article
a tiny encryption algorithm". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 1008. p. 363. doi:10.1007/3-540-60590-8_29. ISBN 978-3-540-60590-4
RoboCup 3D Soccer Simulation League (1,096 words) [view diff] exact match in snippet view article find links to article
Next Generation". RoboCup 2003: Robot Soccer World Cup VII. Lecture Notes in Computer Science. Vol. 3020. pp. 458–469. doi:10.1007/978-3-540-25940-4_40
Rabin signature algorithm (2,011 words) [view diff] exact match in snippet view article find links to article
with RSA and Rabin. Advances in Cryptology – EUROCRYPT ’96. Lecture Notes in Computer Science. Vol. 1070. Saragossa, Spain: Springer. pp. 399–416. doi:10
Nervos Network (614 words) [view diff] exact match in snippet view article find links to article
Conference on Formal Engineering Methods, ICFEM 2020, Singapore. Lecture Notes in Computer Science. Vol. 12531. pp. 287–296. doi:10.1007/978-3-030-63406-3_17
Quantum sort (165 words) [view diff] exact match in snippet view article find links to article
International Colloquium on Automata, Languages, and Programming. Lecture Notes in Computer Science. Vol. 2076. pp. 62–73. arXiv:quant-ph/0102078. doi:10.1007/3-540-48224-5_29
Lesk algorithm (1,039 words) [view diff] exact match in snippet view article find links to article
Lesk Algorithm for Word Sense Disambiguation Using WordNet, Lecture Notes in Computer Science; Vol. 2276, Pages: 136 - 145, 2002. ISBN 3-540-43219-1 Kilgarriff
Peter Buneman (1,067 words) [view diff] exact match in snippet view article find links to article
Characterization of Data Provenance". Database Theory — ICDT 2001. Lecture Notes in Computer Science. Vol. 1973. pp. 316. CiteSeerX 10.1.1.6.1848. doi:10.1007/3-540-44503-X_20
Digital Assets Repository (697 words) [view diff] exact match in snippet view article find links to article
Research and Advanced Technology for Digital Libraries. Lecture Notes in Computer Science. Vol. 3652. Springer Science + Business Media. pp. 116–127
Substring index (611 words) [view diff] exact match in snippet view article find links to article
Piscataway, New Jersey, USA, July 20–22, 1998, Proceedings, Lecture Notes in Computer Science, vol. 1448, Springer, pp. 65–79, doi:10.1007/BFB0030781,
Random oracle (1,785 words) [view diff] exact match in snippet view article find links to article
quantum world". Advances in Cryptology – ASIACRYPT 2011. Lecture Notes in Computer Science. Vol. 7073. Springer. pp. 41–69. arXiv:1008.0931. doi:10
Instruction-level parallelism (1,026 words) [view diff] exact match in snippet view article find links to article
Parallelism". Applied Parallel and Scientific Computing. Lecture Notes in Computer Science. Vol. 7133. pp. 270–281. doi:10.1007/978-3-642-28151-8_27
Decoding methods (1,867 words) [view diff] exact match in snippet view article find links to article
codewords of small weight". Coding Theory and Applications. Lecture Notes in Computer Science. Vol. 388. Springer-Verlag. pp. 106–113. doi:10.1007/BFb0019850
Meurs Challenger (409 words) [view diff] exact match in snippet view article find links to article
The Netherlands, September 21–23, 2011, Revised Papers, Lecture Notes in Computer Science, vol. 7034, Springer-Verlag, pp. 447–448, doi:10.1007/978-3-642-25878-7
Alex Graves (computer scientist) (571 words) [view diff] exact match in snippet view article
Keyword Spotting". Artificial Neural Networks – ICANN 2007. Lecture Notes in Computer Science. Vol. 4669. pp. 220–229. doi:10.1007/978-3-540-74695-9_23
Tarski's axiomatization of the reals (603 words) [view diff] exact match in snippet view article find links to article
Edinburgh, Scotland, UK, September 3–6, 2001, Proceedings. Lecture Notes in Computer Science. Vol. 2152. Berlin: Springer. pp. 43–58. doi:10.1007/3-540-44755-5_5
Zvika Brakerski (287 words) [view diff] exact match in snippet view article find links to article
Canetti, Ran (eds.). Advances in Cryptology – CRYPTO 2012. Lecture Notes in Computer Science. Vol. 7417. Berlin, Heidelberg: Springer. pp. 868–886. doi:10
Unspent transaction output (1,271 words) [view diff] exact match in snippet view article find links to article
Bitcoin UTXO Set". Financial Cryptography and Data Security. Lecture Notes in Computer Science. Vol. 10958. Springer. pp. 78–91. doi:10.1007/978-3-662-58820-8_6
Self-organizing map (4,068 words) [view diff] exact match in snippet view article find links to article
(1995). "Kohonen Network" (PDF). Artificial Neural Networks. Lecture Notes in Computer Science. Vol. 931. University of Limburg, Maastricht. pp. 83–100.
Browser Helper Object (882 words) [view diff] exact match in snippet view article find links to article
Browser Helper Objects". Intelligence and Security Informatics. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer: 638–639. doi:10.1007/11427995_85
Memetic algorithm (4,064 words) [view diff] exact match in snippet view article find links to article
motion". Tasks and Methods in Applied Artificial Intelligence. Lecture Notes in Computer Science. Vol. 1416. Springer-Verlag. pp. 105–114. CiteSeerX 10.1.1
XPDL (1,280 words) [view diff] exact match in snippet view article find links to article
Systems and Standards for Workflow Management", Springer Lecture Notes in Computer Science, Vol 3098/2004. Wil M.P. van der Aalst, "Patterns and XPDL:
Physical unclonable function (4,103 words) [view diff] exact match in snippet view article find links to article
Hardware and Embedded Systems -- CHES 2015. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Vol. 9293. pp. 535–555. doi:10.1007/978-3-662-48324-4_27
N-hash (213 words) [view diff] exact match in snippet view article find links to article
Techniques, Brighton, UK, April 8–11, 1991. Proceedings. Lecture Notes in Computer Science. Vol. 547. pp. 1–16. doi:10.1007/3-540-46416-6_1. ISBN 978-3-540-54620-7
Lis (linear algebra library) (665 words) [view diff] exact match in snippet view article
Computational Science and Its Applications – ICCSA 2010. Lecture Notes in Computer Science 6017. Vol. 6017. Springer. pp. 87–98. doi:10.1007/978-3-642-12165-4_36
Information leakage (524 words) [view diff] exact match in snippet view article find links to article
Information Leakage of Plaintext". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 2365. pp. 263–276. doi:10.1007/3-540-45661-9_21.