


default search action
CSR 2006: St. Petersburg, Russia
- Dima Grigoriev, John Harrison, Edward A. Hirsch:

Computer Science - Theory and Applications, First International Symposium on Computer Science in Russia, CSR 2006, St. Petersburg, Russia, June 8-12, 2006, Proceedings. Lecture Notes in Computer Science 3967, Springer 2006, ISBN 3-540-34166-8
Invited Papers
- Boaz Barak:

Non-black-box Techniques in Cryptography. 1 - Michael Kaminski:

Complexity of Polynomial Multiplication over Finite Fields. 2 - Michael Kishinevsky, Jordi Cortadella

, Bill Grundmann, Sava Krstic, John O'Leary:
Synchronous Elastic Circuits. 3-5
Theory Track
- Vikraman Arvind, Bireswar Das:

SZK Proofs for Black-Box Group Problems. 6-17 - Sergey V. Avgustinovich, Anna E. Frid:

Canonical Decomposition of a Regular Factorial Language. 18-22 - Maxim A. Babenko:

Acyclic Bidirected and Skew-Symmetric Graphs: Algorithms and Structure. 23-34 - Freiric Barral, Sergei Soloviev:

Inductive Type Schemas as Functors. 35-45 - Nicolas Baudru, Rémi Morin:

Unfolding Synthesis of Asynchronous Automata. 46-57 - Marie-Pierre Béal, Sylvain Lombardy, Jacques Sakarovitch:

Conjugacy and Equivalence of Weighted Automata and Functional Transducers. 58-69 - Piotr Berman, Martin Fürer

, Alexander Zelikovsky
:
Applications of the Linear Matroid Parity Algorithm to Approximating Steiner Trees. 70-79 - Olaf Beyersdorff

:
Tuples of Disjoint NP-Sets. 80-91 - Laurent Bienvenu:

Constructive Equivalence Relations on Computable Probability Measures. 92-103 - Olivier Bodini, Thomas Fernique:

Planar Dimer Tilings. 104-113 - Manuel Bodirsky, Jan Kára:

The Complexity of Equality Constraint Languages. 114-126 - Patrick Cégielski, Irène Guessarian, Yury Lifshits, Yuri V. Matiyasevich:

Window Subsequence Problems for Compressed Texts. 127-136 - Alexander L. Chistov:

Efficient Algorithms in Zero-Characteristic for a New Model of Representation of Algebraic Varieties. 137-146 - Stefan S. Dantchev:

Relativisation Provides Natural Separations for Resolution-Based Proof Systems. 147-158 - Stefan S. Dantchev, Florent R. Madelaine

:
Bounded-Degree Forbidden Patterns Problems Are Constraint Satisfaction Problems. 159-170 - Sergey M. Dudakov

:
Isolation and Reducibility Properties and the Collapse Result. 171-177 - Anna Gál, Michal Koucký, Pierre McKenzie:

Incremental Branching Programs. 178-190 - Evan Goris:

Logic of Proofs for Bounded Arithmetic. 191-201 - Igor Grunsky

, Oleksiy Kurganskyy
, Igor Potapov
:
On a Maximal NFA Without Mergible States. 202-210 - Yoram Hirshfeld, Alexander Moshe Rabinovich

:
Expressiveness of Metric Modalities for Continuous Time. 211-220 - Leonid Khachiyan, Vladimir Gurvich, Jihui Zhao:

Extending Dijkstra's Algorithm to Maximize the Shortest Path by Node-Wise Limited Arc Interdiction. 221-234 - Ingmar Meinecke:

Weighted Logics for Traces. 235-246 - Hartmut Messerschmidt, Friedrich Otto:

On Nonforgetting Restarting Automata That Are Deterministic and/or Monotone. 247-258 - Grigori Mints:

Unwinding a Non-effective Cut Elimination Proof. 259-269 - Daniel Mölle, Stefan Richter, Peter Rossmanith:

Enumerate and Expand: Improved Algorithms for Connected Vertex Cover and Tree Cover. 270-280 - Andrei A. Muchnik, Nikolai K. Vereshchagin

:
Shannon Entropy vs. Kolmogorov Complexity. 281-291 - Alexander Okhotin

:
Language Equations with Symmetric Difference. 292-303 - Valery Plisko:

On Primitive Recursive Realizabilities. 304-312 - Natalia Rubtsova:

Evidence Reconstruction of Epistemic Modal Logic S5. 313-321 - Vladimir V. Rybakov

:
Linear Temporal Logic with Until and Before on Integer Numbers, Deciding Algorithms. 322-333 - Kalle Saari:

On the Frequency of Letters in Morphic Sequences. 334-345 - Sergey P. Shlepakov:

Functional Equations in Shostak Theories. 346-351 - Alexandre Tiskin

:
All Semi-local Longest Common Subsequences in Subquadratic Time. 352-363 - Michael A. Ustinov:

Non-approximability of the Randomness Deficiency Function. 364-368 - Tatiana Yavorskaya:

Multi-agent Explicit Knowledge. 369-380
Applications and Technology Track
- Andreas Abel:

Polarized Subtyping for Sized Types. 381-392 - Konstantin Bournayev:

Neural-Network Based Physical Fields Modeling Techniques. 393-402 - Xiaogang Dong, Ilya Pollak:

Approximate Methods for Constrained Total Variation Minimization. 403-414 - Dina Q. Goldin, Huayan Gao:

Dynamic Isoline Extraction for Visualization of Streaming Data. 415-426 - Byung Ryong Kim, Ki-Chang Kim:

Improved Technique of IP Address Fragmentation Strategies for DoS Attack Traceback. 427-437 - Yong-Guk Kim, Min-Soo Jang, Kyoung-Sic Cho, Gwi-Tae Park:

Performance Comparison Between Backpropagation, Neuro-Fuzzy Network, and SVM. 438-446 - Pasan Kulvanit, Theera Piroonratana, Nachol Chaiyaratana

, Djitt Laowattana:
Evolutionary Multi-objective Optimisation by Diversity Control. 447-456 - Yeung-hak Lee, Chang-Wook Han:

3D Facial Recognition Using Eigenface and Cascade Fuzzy Neural Networks: Normalized Facial Image Approach. 457-465 - Xiaojun Liu, Jie Yang, Hong-Bin Shen, Xiangyang Wang:

A New Scaling Kernel-Based Fuzzy System with Low Computational Complexity. 466-474 - Frédéric Loulergue

, Radia Benheddi, Frédéric Gava
, D. Louis-Régis:
Bulk Synchronous Parallel ML: Semantics and Implementation of the Parallel Juxtaposition. 475-486 - Feng Lu, Poh-Chin Lai

:
A Shortest Path Algorithm Based on Limited Search Heuristics. 487-497 - Guoteng Pan, Lunguo Xie, Qiang Dou, Erhua He:

A New Hybrid Directory Scheme for Shared Memory Multi-processors. 498-504 - Dmitry Pavlov:

Manipulator Path Planning in 3-Dimensional Space. 505-513 - Rodolfo A. Pazos Rangel, Joaquín Pérez Ortega, José Antonio Martínez Flores, Juan Javier González Barbosa, Mirna P. Ponce F.:

Least Likely to Use: A New Page Replacement Strategy for Improving Database Management System Response Time. 514-523 - Sergiy Popov:

Nonlinear Visualization of Incomplete Data Sets. 524-533 - Aoun Raza:

A Review of Race Detection Mechanisms. 534-543 - Panrasee Ritthipravat, Thavida Maneewarn, Jeremy L. Wyatt

, Djitt Laowattana:
Fuzzy-Q Knowledge Sharing Techniques with Expertness Measures: Comparison and Analysis. 544-554 - Jan-Willem Roorda, Koen Claessen:

Explaining Symbolic Trajectory Evaluation by Giving It a Faithful Semantics. 555-566 - Hamid Sarbazi-Azad, Hamid Mahini, Ahmad Patooghy

:
Analytic Modeling of Channel Traffic in n-Cubes. 567-579 - Liran Shen, Qingbo Yin

, Xueyao Li, Huiqiang Wang:
Speech Enhancement in Short-Wave Channel Based on Empirical Mode Decomposition. 591-599 - Carsten Sinz, Armin Biere

:
Extended Resolution Proofs for Conjoining BDDs. 600-611 - Vladimir D. Tonchev

, Hao Wang:
Optimal Difference Systems of Sets with Multipliers. 612-618 - Binod Vaidya, SangDuck Lee, Jae-Kyun Han, Seung Jo Han:

Authentication Mechanism Using One-Time Password for 802.11 Wireless LAN. 619-628 - Hao-ming Wang, Ye Guo, Boqin Feng:

Optimizing Personalized Retrieval System Based on Web Ranking. 629-640 - Shengning Wu, Sikun Li:

Instruction Selection for ARM/Thumb Processors Based on a Multi-objective Ant Algorithm. 641-651 - Haoran Zhang, Peng Sun:

A New Flow Control Algorithm for High Speed Computer Network. 652-659 - Haoran Zhang, Xiaodong Wang:

Nonlinear Systems Modeling and Control Using Support Vector Machine Technique. 660-669 - Elena Zheleva, Abdullah N. Arslan:

Fast Motif Search in Protein Sequence Databases. 670-681

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














