


default search action
Theoretical Computer Science, Volume 807
Volume 807, February 2020
- Giorgio Ausiello, Lila Kari, Grzegorz Rozenberg, Donald Sannella

, Paul G. Spirakis, Pierre-Louis Curien:
Preface. 1-2 - Samson Abramsky

:
Whither semantics? 3-14 - Rajeev Alur, Dana Fisman, Konstantinos Mamouras, Mukund Raghothaman

, Caleb Stanford
:
Streamable regular transductions. 15-41 - Guy Avni, Thomas A. Henzinger, Orna Kupferman:

Dynamic resource allocation games. 42-55 - Amotz Bar-Noy, David Peleg, Dror Rawitz:

Vertex-weighted realizations of graphs. 56-72 - Andreas Blass, Yuri Gurevich:

Braided distributivity. 73-94 - Roberto Bruni, Hernán C. Melgratti, Ugo Montanari:

Bayesian network semantics for Petri nets. 95-113 - Cristian S. Calude, Sanjay Jain

, Wolfgang Merkle, Frank Stephan
:
Searching for shortest and least programs. 114-127 - Ilaria Castellani

, Mariangiola Dezani-Ciancaglini
, Paola Giannini
, Ross Horne
:
Global types with internal delegation. 128-153 - Adrien Durier, Daniel Hirschkoff, Davide Sangiorgi:

Towards 'up to context' reasoning about higher-order processes. 154-168 - Thomas Ehrhard, Jean Krivine, Ying Jiang:

A calculus of branching processes. 169-184 - Loukas Georgiadis

, Giuseppe F. Italiano, Aikaterini Karanasiou:
Approximating the smallest 2-vertex connected spanning subgraph of a directed graph. 185-200 - Kazuo Iwama, Junichi Teruyama:

Improved average complexity for comparison-based sorting. 201-219 - Dexter Kozen

, Alexandra Silva:
Left-handed completeness. 220-233 - Pierre Leone, Kasun Samarasinghe, José D. P. Rolim:

Every Schnyder drawing is a greedy embedding. 234-244 - Kalpana Mahalingam

, Palak Pandoh
, Kamala Krithivasan:
On the least number of palindromes in two-dimensional words. 245-256 - Yuri V. Matijasevic

:
The Riemann Hypothesis in computer science. 257-265 - Marios Mavronicolas

, Burkhard Monien:
Conditional Value-at-Risk: Structure and complexity of equilibria. 266-283 - Michael W. Mislove

:
Domains and stochastic processes. 284-297 - Min Wu, Matthew Wicker, Wenjie Ruan

, Xiaowei Huang
, Marta Kwiatkowska:
A game-based approximate verification of deep neural networks with provable guarantees. 298-329 - Fang Yu, Daowen Qiu, Xiaoming Wang, Qin Li

, Lvzhou Li, Jozef Gruska:
Security improvements of several basic quantum private query protocols with O(log N) communication complexity. 330-340

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














