BibTeX records: Jason Teutsch

download as .bib file

@article{DBLP:journals/corr/abs-1908-02946,
  author       = {Jason Teutsch and
                  Sami M{\"{a}}kel{\"{a}} and
                  Surya Bakshi},
  title        = {Bootstrapping a stable computation token},
  journal      = {CoRR},
  volume       = {abs/1908.02946},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.02946},
  eprinttype    = {arXiv},
  eprint       = {1908.02946},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-02946.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-03999,
  author       = {Jason Teutsch and
                  Michael Straka and
                  Dan Boneh},
  title        = {Retrofitting a two-way peg between blockchains},
  journal      = {CoRR},
  volume       = {abs/1908.03999},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.03999},
  eprinttype    = {arXiv},
  eprint       = {1908.03999},
  timestamp    = {Mon, 19 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-03999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-04295,
  author       = {Jason Teutsch and
                  Vitalik Buterin and
                  Christopher Brown},
  title        = {Interactive coin offerings},
  journal      = {CoRR},
  volume       = {abs/1908.04295},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.04295},
  eprinttype    = {arXiv},
  eprint       = {1908.04295},
  timestamp    = {Mon, 19 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-04295.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-04756,
  author       = {Jason Teutsch and
                  Christian Reitwie{\ss}ner},
  title        = {A scalable verification solution for blockchains},
  journal      = {CoRR},
  volume       = {abs/1908.04756},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.04756},
  eprinttype    = {arXiv},
  eprint       = {1908.04756},
  timestamp    = {Mon, 19 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-04756.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-10694,
  author       = {Jason Teutsch},
  title        = {On decentralized oracles for data availability},
  journal      = {CoRR},
  volume       = {abs/1910.10694},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.10694},
  eprinttype    = {arXiv},
  eprint       = {1910.10694},
  timestamp    = {Fri, 25 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-10694.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computability/JainST17,
  author       = {Sanjay Jain and
                  Frank Stephan and
                  Jason Teutsch},
  title        = {Closed left-r.e. sets},
  journal      = {Comput.},
  volume       = {6},
  number       = {1},
  pages        = {1--21},
  year         = {2017},
  url          = {https://doi.org/10.3233/COM-160054},
  doi          = {10.3233/COM-160054},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computability/JainST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/JainT17,
  author       = {Sanjay Jain and
                  Jason Teutsch},
  title        = {Enumerations including laconic enumerators},
  journal      = {Theor. Comput. Sci.},
  volume       = {700},
  pages        = {89--95},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.tcs.2017.08.001},
  doi          = {10.1016/J.TCS.2017.08.001},
  timestamp    = {Wed, 16 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/JainT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/VelnerTL17,
  author       = {Yaron Velner and
                  Jason Teutsch and
                  Loi Luu},
  editor       = {Michael Brenner and
                  Kurt Rohloff and
                  Joseph Bonneau and
                  Andrew Miller and
                  Peter Y. A. Ryan and
                  Vanessa Teague and
                  Andrea Bracciali and
                  Massimiliano Sala and
                  Federico Pintore and
                  Markus Jakobsson},
  title        = {Smart Contracts Make Bitcoin Mining Pools Vulnerable},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2017 International
                  Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April
                  7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10323},
  pages        = {298--316},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70278-0\_19},
  doi          = {10.1007/978-3-319-70278-0\_19},
  timestamp    = {Tue, 16 Aug 2022 23:04:23 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/VelnerTL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LuuVTS17,
  author       = {Loi Luu and
                  Yaron Velner and
                  Jason Teutsch and
                  Prateek Saxena},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {SmartPool: Practical Decentralized Pooled Mining},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {1409--1426},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/luu},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LuuVTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuuVTS17,
  author       = {Loi Luu and
                  Yaron Velner and
                  Jason Teutsch and
                  Prateek Saxena},
  title        = {{SMART} {POOL} : Practical Decentralized Pooled Mining},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuuVTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VelnerTL17,
  author       = {Yaron Velner and
                  Jason Teutsch and
                  Loi Luu},
  title        = {Smart Contracts Make Bitcoin Mining Pools Vulnerable},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {230},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VelnerTL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/BarmpaliasLT16,
  author       = {George Barmpalias and
                  Andrew Lewis{-}Pye and
                  Jason Teutsch},
  title        = {Lower bounds on the redundancy in computations from random oracles
                  via betting strategies with restricted wagers},
  journal      = {Inf. Comput.},
  volume       = {251},
  pages        = {287--300},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ic.2016.09.010},
  doi          = {10.1016/J.IC.2016.09.010},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/BarmpaliasLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/TeutschZ16,
  author       = {Jason Teutsch and
                  Marius Zimand},
  title        = {A Brief on Short Descriptions},
  journal      = {{SIGACT} News},
  volume       = {47},
  number       = {1},
  pages        = {42--67},
  year         = {2016},
  url          = {https://doi.org/10.1145/2902945.2902957},
  doi          = {10.1145/2902945.2902957},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigact/TeutschZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/TeutschJS16,
  author       = {Jason Teutsch and
                  Sanjay Jain and
                  Prateek Saxena},
  editor       = {Jens Grossklags and
                  Bart Preneel},
  title        = {When Cryptocurrencies Mine Their Own Business},
  booktitle    = {Financial Cryptography and Data Security - 20th International Conference,
                  {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  pages        = {499--514},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-54970-4\_29},
  doi          = {10.1007/978-3-662-54970-4\_29},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/TeutschJS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BarmpaliasLT16,
  author       = {George Barmpalias and
                  Andrew Lewis{-}Pye and
                  Jason Teutsch},
  title        = {Lower bounds on the redundancy in computations from random oracles
                  via betting strategies with restricted wagers},
  journal      = {CoRR},
  volume       = {abs/1602.07113},
  year         = {2016},
  url          = {http://arxiv.org/abs/1602.07113},
  eprinttype    = {arXiv},
  eprint       = {1602.07113},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BarmpaliasLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JainSST16,
  author       = {Sanjay Jain and
                  Prateek Saxena and
                  Frank Stephan and
                  Jason Teutsch},
  title        = {How to verify computation with a rational network},
  journal      = {CoRR},
  volume       = {abs/1606.05917},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.05917},
  eprinttype    = {arXiv},
  eprint       = {1606.05917},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JainSST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/ClarkT15,
  author       = {Gregory Clark and
                  Jason Teutsch},
  title        = {Maximizing T-complexity},
  journal      = {Fundam. Informaticae},
  volume       = {139},
  number       = {1},
  pages        = {1--19},
  year         = {2015},
  url          = {https://doi.org/10.3233/FI-2015-1223},
  doi          = {10.3233/FI-2015-1223},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/ClarkT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toct/TeutschZ15,
  author       = {Jason Teutsch and
                  Marius Zimand},
  title        = {On Approximate Decidability of Minimal Programs},
  journal      = {{ACM} Trans. Comput. Theory},
  volume       = {7},
  number       = {4},
  pages        = {17:1--17:16},
  year         = {2015},
  url          = {https://doi.org/10.1145/2799561},
  doi          = {10.1145/2799561},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toct/TeutschZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuuTKS15,
  author       = {Loi Luu and
                  Jason Teutsch and
                  Raghav Kulkarni and
                  Prateek Saxena},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Demystifying Incentives in the Consensus Computer},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {706--719},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813659},
  doi          = {10.1145/2810103.2813659},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LuuTKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuuTKS15,
  author       = {Loi Luu and
                  Jason Teutsch and
                  Raghav Kulkarni and
                  Prateek Saxena},
  title        = {Demystifying incentives in the consensus computer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {702},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/702},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuuTKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cc/Teutsch14,
  author       = {Jason Teutsch},
  title        = {Short lists for shortest descriptions in short time},
  journal      = {Comput. Complex.},
  volume       = {23},
  number       = {4},
  pages        = {565--583},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00037-014-0090-3},
  doi          = {10.1007/S00037-014-0090-3},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cc/Teutsch14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/StephanT14,
  author       = {Frank Stephan and
                  Jason Teutsch},
  title        = {Things that can be made into themselves},
  journal      = {Inf. Comput.},
  volume       = {237},
  pages        = {174--186},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ic.2014.02.002},
  doi          = {10.1016/J.IC.2014.02.002},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/StephanT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijgt/Teutsch14,
  author       = {Jason Teutsch},
  title        = {A savings paradox for integer-valued gambling strategies},
  journal      = {Int. J. Game Theory},
  volume       = {43},
  number       = {1},
  pages        = {145--151},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00182-013-0377-7},
  doi          = {10.1007/S00182-013-0377-7},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijgt/Teutsch14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/TaleleTEJ14,
  author       = {Nirupama Talele and
                  Jason Teutsch and
                  Robert F. Erbacher and
                  Trent Jaeger},
  editor       = {Sylvia L. Osborn and
                  Mahesh V. Tripunitara and
                  Ian M. Molloy},
  title        = {Monitor placement for large-scale systems},
  booktitle    = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '14, London, ON, Canada - June 25 - 27, 2014},
  pages        = {29--40},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2613087.2613107},
  doi          = {10.1145/2613087.2613107},
  timestamp    = {Wed, 02 Jun 2021 09:13:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/TaleleTEJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ErbacherJTT14,
  author       = {Robert F. Erbacher and
                  Trent Jaeger and
                  Nirupama Talele and
                  Jason Teutsch},
  title        = {Directed Multicut with linearly ordered terminals},
  journal      = {CoRR},
  volume       = {abs/1407.7498},
  year         = {2014},
  url          = {http://arxiv.org/abs/1407.7498},
  eprinttype    = {arXiv},
  eprint       = {1407.7498},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ErbacherJTT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TeutschZ14,
  author       = {Jason Teutsch and
                  Marius Zimand},
  title        = {On approximate decidability of minimal programs},
  journal      = {CoRR},
  volume       = {abs/1409.0496},
  year         = {2014},
  url          = {http://arxiv.org/abs/1409.0496},
  eprinttype    = {arXiv},
  eprint       = {1409.0496},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/TeutschZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Teutsch13,
  author       = {Jason Teutsch},
  title        = {Review of Algorithmic Randomness and Complexity by Downey and Hirschfeldt},
  journal      = {{SIGACT} News},
  volume       = {44},
  number       = {1},
  pages        = {25--28},
  year         = {2013},
  url          = {https://doi.org/10.1145/2447712.2447721},
  doi          = {10.1145/2447712.2447721},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigact/Teutsch13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/TaleleTJE13,
  author       = {Nirupama Talele and
                  Jason Teutsch and
                  Trent Jaeger and
                  Robert F. Erbacher},
  editor       = {Jan J{\"{u}}rjens and
                  Benjamin Livshits and
                  Riccardo Scandariato},
  title        = {Using Security Policies to Automate Placement of Network Intrusion
                  Prevention},
  booktitle    = {Engineering Secure Software and Systems - 5th International Symposium,
                  ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7781},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36563-8\_2},
  doi          = {10.1007/978-3-642-36563-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/TaleleTJE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tamc/MerkleSTWY13,
  author       = {Wolfgang Merkle and
                  Frank Stephan and
                  Jason Teutsch and
                  Wei Wang and
                  Yue Yang},
  editor       = {T.{-}H. Hubert Chan and
                  Lap Chi Lau and
                  Luca Trevisan},
  title        = {Selection by Recursively Enumerable Sets},
  booktitle    = {Theory and Applications of Models of Computation, 10th International
                  Conference, {TAMC} 2013, Hong Kong, China, May 20-22, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7876},
  pages        = {144--155},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38236-9\_14},
  doi          = {10.1007/978-3-642-38236-9\_14},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tamc/MerkleSTWY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computability/MerkleT12,
  author       = {Wolfgang Merkle and
                  Jason Teutsch},
  title        = {Constant Compression and Random Weights},
  journal      = {Comput.},
  volume       = {1},
  number       = {2},
  pages        = {153--169},
  year         = {2012},
  url          = {https://doi.org/10.3233/COM-12011},
  doi          = {10.3233/COM-12011},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computability/MerkleT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/ChalcraftDFT12,
  author       = {Adam Chalcraft and
                  Randall Dougherty and
                  Christopher F. Freiling and
                  Jason Teutsch},
  title        = {How to build a probability-free casino},
  journal      = {Inf. Comput.},
  volume       = {211},
  pages        = {160--164},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ic.2011.12.004},
  doi          = {10.1016/J.IC.2011.12.004},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/ChalcraftDFT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsyml/StephanT12,
  author       = {Frank Stephan and
                  Jason Teutsch},
  title        = {An incomplete set of shortest descriptions},
  journal      = {J. Symb. Log.},
  volume       = {77},
  number       = {1},
  pages        = {291--307},
  year         = {2012},
  url          = {https://doi.org/10.2178/jsl/1327068704},
  doi          = {10.2178/JSL/1327068704},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsyml/StephanT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mst/BienvenuST12,
  author       = {Laurent Bienvenu and
                  Frank Stephan and
                  Jason Teutsch},
  title        = {How Powerful Are Integer-Valued Martingales?},
  journal      = {Theory Comput. Syst.},
  volume       = {51},
  number       = {3},
  pages        = {330--351},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00224-011-9362-3},
  doi          = {10.1007/S00224-011-9362-3},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mst/BienvenuST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocl/Kjos-HanssenST12,
  author       = {Bj{\o}rn Kjos{-}Hanssen and
                  Frank Stephan and
                  Jason Teutsch},
  title        = {Arithmetic complexity via effective names for random sequences},
  journal      = {{ACM} Trans. Comput. Log.},
  volume       = {13},
  number       = {3},
  pages        = {24:1--24:18},
  year         = {2012},
  url          = {https://doi.org/10.1145/2287718.2287724},
  doi          = {10.1145/2287718.2287724},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tocl/Kjos-HanssenST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MuthukumaranRTVTJ12,
  author       = {Divya Muthukumaran and
                  Sandra Julieta Rueda and
                  Nirupama Talele and
                  Hayawardh Vijayakumar and
                  Jason Teutsch and
                  Trent Jaeger},
  editor       = {Robert H'obbes' Zakon},
  title        = {Transforming commodity security policies to enforce Clark-Wilson integrity},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {269--278},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420991},
  doi          = {10.1145/2420950.2420991},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MuthukumaranRTVTJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/MerkleT12,
  author       = {Wolfgang Merkle and
                  Jason Teutsch},
  editor       = {Christoph D{\"{u}}rr and
                  Thomas Wilke},
  title        = {Constant compression and random weights},
  booktitle    = {29th International Symposium on Theoretical Aspects of Computer Science,
                  {STACS} 2012, February 29th - March 3rd, 2012, Paris, France},
  series       = {LIPIcs},
  volume       = {14},
  pages        = {172--181},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2012},
  url          = {https://doi.org/10.4230/LIPIcs.STACS.2012.172},
  doi          = {10.4230/LIPICS.STACS.2012.172},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/stacs/MerkleT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1205-4821,
  author       = {Randall Dougherty and
                  Jack H. Lutz and
                  R. Daniel Mauldin and
                  Jason Teutsch},
  title        = {Translating the Cantor set by a random},
  journal      = {CoRR},
  volume       = {abs/1205.4821},
  year         = {2012},
  url          = {http://arxiv.org/abs/1205.4821},
  eprinttype    = {arXiv},
  eprint       = {1205.4821},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1205-4821.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1208-0682,
  author       = {Frank Stephan and
                  Jason Teutsch},
  title        = {Things that can be made into themselves},
  journal      = {CoRR},
  volume       = {abs/1208.0682},
  year         = {2012},
  url          = {http://arxiv.org/abs/1208.0682},
  eprinttype    = {arXiv},
  eprint       = {1208.0682},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1208-0682.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1212-6104,
  author       = {Jason Teutsch},
  title        = {Short lists for shorter programs in short time},
  journal      = {CoRR},
  volume       = {abs/1212.6104},
  year         = {2012},
  url          = {http://arxiv.org/abs/1212.6104},
  eprinttype    = {arXiv},
  eprint       = {1212.6104},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1212-6104.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/JainST11,
  author       = {Sanjay Jain and
                  Frank Stephan and
                  Jason Teutsch},
  title        = {Index sets and universal numberings},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {77},
  number       = {4},
  pages        = {760--773},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.jcss.2010.07.001},
  doi          = {10.1016/J.JCSS.2010.07.001},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/JainST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tamc/JainST11,
  author       = {Sanjay Jain and
                  Frank Stephan and
                  Jason Teutsch},
  editor       = {Mitsunori Ogihara and
                  Jun Tarui},
  title        = {Closed Left-R.E. Sets},
  booktitle    = {Theory and Applications of Models of Computation - 8th Annual Conference,
                  {TAMC} 2011, Tokyo, Japan, May 23-25, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6648},
  pages        = {218--229},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20877-5\_23},
  doi          = {10.1007/978-3-642-20877-5\_23},
  timestamp    = {Sun, 25 Oct 2020 23:06:59 +0100},
  biburl       = {https://dblp.org/rec/conf/tamc/JainST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cie/BienvenuST10,
  author       = {Laurent Bienvenu and
                  Frank Stephan and
                  Jason Teutsch},
  editor       = {Fernando Ferreira and
                  Benedikt L{\"{o}}we and
                  Elvira Mayordomo and
                  Lu{\'{\i}}s Mendes Gomes},
  title        = {How Powerful Are Integer-Valued Martingales?},
  booktitle    = {Programs, Proofs, Processes, 6th Conference on Computability in Europe,
                  CiE 2010, Ponta Delgada, Azores, Portugal, June 30 - July 4, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6158},
  pages        = {59--68},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13962-8\_7},
  doi          = {10.1007/978-3-642-13962-8\_7},
  timestamp    = {Tue, 10 Dec 2019 15:37:25 +0100},
  biburl       = {https://dblp.org/rec/conf/cie/BienvenuST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1004-0838,
  author       = {Laurent Bienvenu and
                  Frank Stephan and
                  Jason Teutsch},
  title        = {How powerful are integer-valued martingales?},
  journal      = {CoRR},
  volume       = {abs/1004.0838},
  year         = {2010},
  url          = {http://arxiv.org/abs/1004.0838},
  eprinttype    = {arXiv},
  eprint       = {1004.0838},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1004-0838.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1008-4825,
  author       = {Bj{\o}rn Kjos{-}Hanssen and
                  Frank Stephan and
                  Jason Teutsch},
  title        = {Enumerating randoms},
  journal      = {CoRR},
  volume       = {abs/1008.4825},
  year         = {2010},
  url          = {http://arxiv.org/abs/1008.4825},
  eprinttype    = {arXiv},
  eprint       = {1008.4825},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1008-4825.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cie/JainST09,
  author       = {Sanjay Jain and
                  Frank Stephan and
                  Jason Teutsch},
  editor       = {Klaus Ambos{-}Spies and
                  Benedikt L{\"{o}}we and
                  Wolfgang Merkle},
  title        = {Index Sets and Universal Numberings},
  booktitle    = {Mathematical Theory and Computational Practice, 5th Conference on
                  Computability in Europe, CiE 2009, Heidelberg, Germany, July 19-24,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5635},
  pages        = {270--279},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03073-4\_28},
  doi          = {10.1007/978-3-642-03073-4\_28},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cie/JainST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ndjfl/StephanT08,
  author       = {Frank Stephan and
                  Jason Teutsch},
  title        = {Immunity and Hyperimmunity for Sets of Minimal Indices},
  journal      = {Notre Dame J. Formal Log.},
  volume       = {49},
  number       = {2},
  pages        = {107--125},
  year         = {2008},
  url          = {https://doi.org/10.1215/00294527-2008-001},
  doi          = {10.1215/00294527-2008-001},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ndjfl/StephanT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apal/Teutsch07,
  author       = {Jason Teutsch},
  title        = {On the Turing degrees of minimal index sets},
  journal      = {Ann. Pure Appl. Log.},
  volume       = {148},
  number       = {1-3},
  pages        = {63--80},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.apal.2007.07.003},
  doi          = {10.1016/J.APAL.2007.07.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/apal/Teutsch07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-math-0701904,
  author       = {Jason Teutsch},
  title        = {Noncomputable Spectral Sets},
  journal      = {CoRR},
  volume       = {abs/math/0701904},
  year         = {2007},
  url          = {http://arxiv.org/abs/math/0701904},
  eprinttype    = {arXiv},
  eprint       = {math/0701904},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-math-0701904.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/VontobelSKTV05,
  author       = {Pascal O. Vontobel and
                  Roxana Smarandache and
                  Negar Kiyavash and
                  Jason Teutsch and
                  Dejan Vukobratovic},
  title        = {On the minimal pseudo-codewords of codes from finite geometries},
  booktitle    = {Proceedings of the 2005 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September
                  2005},
  pages        = {980--984},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISIT.2005.1523484},
  doi          = {10.1109/ISIT.2005.1523484},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/VontobelSKTV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0508019,
  author       = {Pascal O. Vontobel and
                  Roxana Smarandache and
                  Negar Kiyavash and
                  Jason Teutsch and
                  Dejan Vukobratovic},
  title        = {On the Minimal Pseudo-Codewords of Codes from Finite Geometries},
  journal      = {CoRR},
  volume       = {abs/cs/0508019},
  year         = {2005},
  url          = {http://arxiv.org/abs/cs/0508019},
  eprinttype    = {arXiv},
  eprint       = {cs/0508019},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0508019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics