![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Computer Science Review, Volume 22
Volume 22, November 2016
- Kurt Mehlhorn
, Sanjeev Saxena:
A still simpler way of introducing interior-point method for linear programming. 1-11 - Farzaneh Abed, Christian Forler, Stefan Lucks:
General classification of the authenticated encryption schemes for the CAESAR competition. 13-26 - Alban Rousset
, Bénédicte Herrmann, Christophe Lang, Laurent Philippe:
A survey on parallel and distributed multi-agent systems for high performance computing simulations. 27-46 - Alireza Alaei
, Partha Pratim Roy
, Umapada Pal:
Logo and seal based administrative document image retrieval: A survey. 47-63 - Neil Vaughan
, Bogdan Gabrys, Venketesh N. Dubey
:
An overview of self-adaptive technologies within virtual reality training. 65-87 - Dohan Kim
:
Sorting on graphs by adjacent swaps using permutation groups. 89-105 - Tanmoy Maitra
, Sarbani Roy
:
A comparative study on popular MAC protocols for mixed Wireless Sensor Networks: From implementation viewpoint. 107-134
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.