Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jason Teutsch
@article{DBLP:journals/corr/abs-1908-02946, author = {Jason Teutsch and Sami M{\"{a}}kel{\"{a}} and Surya Bakshi}, title = {Bootstrapping a stable computation token}, journal = {CoRR}, volume = {abs/1908.02946}, year = {2019}, url = {http://arxiv.org/abs/1908.02946}, eprinttype = {arXiv}, eprint = {1908.02946}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-02946.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-03999, author = {Jason Teutsch and Michael Straka and Dan Boneh}, title = {Retrofitting a two-way peg between blockchains}, journal = {CoRR}, volume = {abs/1908.03999}, year = {2019}, url = {http://arxiv.org/abs/1908.03999}, eprinttype = {arXiv}, eprint = {1908.03999}, timestamp = {Mon, 19 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-03999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-04295, author = {Jason Teutsch and Vitalik Buterin and Christopher Brown}, title = {Interactive coin offerings}, journal = {CoRR}, volume = {abs/1908.04295}, year = {2019}, url = {http://arxiv.org/abs/1908.04295}, eprinttype = {arXiv}, eprint = {1908.04295}, timestamp = {Mon, 19 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-04295.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-04756, author = {Jason Teutsch and Christian Reitwie{\ss}ner}, title = {A scalable verification solution for blockchains}, journal = {CoRR}, volume = {abs/1908.04756}, year = {2019}, url = {http://arxiv.org/abs/1908.04756}, eprinttype = {arXiv}, eprint = {1908.04756}, timestamp = {Mon, 19 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-04756.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-10694, author = {Jason Teutsch}, title = {On decentralized oracles for data availability}, journal = {CoRR}, volume = {abs/1910.10694}, year = {2019}, url = {http://arxiv.org/abs/1910.10694}, eprinttype = {arXiv}, eprint = {1910.10694}, timestamp = {Fri, 25 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-10694.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computability/JainST17, author = {Sanjay Jain and Frank Stephan and Jason Teutsch}, title = {Closed left-r.e. sets}, journal = {Comput.}, volume = {6}, number = {1}, pages = {1--21}, year = {2017}, url = {https://doi.org/10.3233/COM-160054}, doi = {10.3233/COM-160054}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computability/JainST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/JainT17, author = {Sanjay Jain and Jason Teutsch}, title = {Enumerations including laconic enumerators}, journal = {Theor. Comput. Sci.}, volume = {700}, pages = {89--95}, year = {2017}, url = {https://doi.org/10.1016/j.tcs.2017.08.001}, doi = {10.1016/J.TCS.2017.08.001}, timestamp = {Wed, 16 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/JainT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/VelnerTL17, author = {Yaron Velner and Jason Teutsch and Loi Luu}, editor = {Michael Brenner and Kurt Rohloff and Joseph Bonneau and Andrew Miller and Peter Y. A. Ryan and Vanessa Teague and Andrea Bracciali and Massimiliano Sala and Federico Pintore and Markus Jakobsson}, title = {Smart Contracts Make Bitcoin Mining Pools Vulnerable}, booktitle = {Financial Cryptography and Data Security - {FC} 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10323}, pages = {298--316}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70278-0\_19}, doi = {10.1007/978-3-319-70278-0\_19}, timestamp = {Tue, 16 Aug 2022 23:04:23 +0200}, biburl = {https://dblp.org/rec/conf/fc/VelnerTL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LuuVTS17, author = {Loi Luu and Yaron Velner and Jason Teutsch and Prateek Saxena}, editor = {Engin Kirda and Thomas Ristenpart}, title = {SmartPool: Practical Decentralized Pooled Mining}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {1409--1426}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/luu}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/LuuVTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuuVTS17, author = {Loi Luu and Yaron Velner and Jason Teutsch and Prateek Saxena}, title = {{SMART} {POOL} : Practical Decentralized Pooled Mining}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2017}, url = {http://eprint.iacr.org/2017/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuuVTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VelnerTL17, author = {Yaron Velner and Jason Teutsch and Loi Luu}, title = {Smart Contracts Make Bitcoin Mining Pools Vulnerable}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {230}, year = {2017}, url = {http://eprint.iacr.org/2017/230}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VelnerTL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/BarmpaliasLT16, author = {George Barmpalias and Andrew Lewis{-}Pye and Jason Teutsch}, title = {Lower bounds on the redundancy in computations from random oracles via betting strategies with restricted wagers}, journal = {Inf. Comput.}, volume = {251}, pages = {287--300}, year = {2016}, url = {https://doi.org/10.1016/j.ic.2016.09.010}, doi = {10.1016/J.IC.2016.09.010}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/BarmpaliasLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/TeutschZ16, author = {Jason Teutsch and Marius Zimand}, title = {A Brief on Short Descriptions}, journal = {{SIGACT} News}, volume = {47}, number = {1}, pages = {42--67}, year = {2016}, url = {https://doi.org/10.1145/2902945.2902957}, doi = {10.1145/2902945.2902957}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigact/TeutschZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/TeutschJS16, author = {Jason Teutsch and Sanjay Jain and Prateek Saxena}, editor = {Jens Grossklags and Bart Preneel}, title = {When Cryptocurrencies Mine Their Own Business}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {499--514}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_29}, doi = {10.1007/978-3-662-54970-4\_29}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/TeutschJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BarmpaliasLT16, author = {George Barmpalias and Andrew Lewis{-}Pye and Jason Teutsch}, title = {Lower bounds on the redundancy in computations from random oracles via betting strategies with restricted wagers}, journal = {CoRR}, volume = {abs/1602.07113}, year = {2016}, url = {http://arxiv.org/abs/1602.07113}, eprinttype = {arXiv}, eprint = {1602.07113}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BarmpaliasLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JainSST16, author = {Sanjay Jain and Prateek Saxena and Frank Stephan and Jason Teutsch}, title = {How to verify computation with a rational network}, journal = {CoRR}, volume = {abs/1606.05917}, year = {2016}, url = {http://arxiv.org/abs/1606.05917}, eprinttype = {arXiv}, eprint = {1606.05917}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JainSST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/ClarkT15, author = {Gregory Clark and Jason Teutsch}, title = {Maximizing T-complexity}, journal = {Fundam. Informaticae}, volume = {139}, number = {1}, pages = {1--19}, year = {2015}, url = {https://doi.org/10.3233/FI-2015-1223}, doi = {10.3233/FI-2015-1223}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/ClarkT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toct/TeutschZ15, author = {Jason Teutsch and Marius Zimand}, title = {On Approximate Decidability of Minimal Programs}, journal = {{ACM} Trans. Comput. Theory}, volume = {7}, number = {4}, pages = {17:1--17:16}, year = {2015}, url = {https://doi.org/10.1145/2799561}, doi = {10.1145/2799561}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toct/TeutschZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuuTKS15, author = {Loi Luu and Jason Teutsch and Raghav Kulkarni and Prateek Saxena}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Demystifying Incentives in the Consensus Computer}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {706--719}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813659}, doi = {10.1145/2810103.2813659}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuuTKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuuTKS15, author = {Loi Luu and Jason Teutsch and Raghav Kulkarni and Prateek Saxena}, title = {Demystifying incentives in the consensus computer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {702}, year = {2015}, url = {http://eprint.iacr.org/2015/702}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuuTKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cc/Teutsch14, author = {Jason Teutsch}, title = {Short lists for shortest descriptions in short time}, journal = {Comput. Complex.}, volume = {23}, number = {4}, pages = {565--583}, year = {2014}, url = {https://doi.org/10.1007/s00037-014-0090-3}, doi = {10.1007/S00037-014-0090-3}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cc/Teutsch14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/StephanT14, author = {Frank Stephan and Jason Teutsch}, title = {Things that can be made into themselves}, journal = {Inf. Comput.}, volume = {237}, pages = {174--186}, year = {2014}, url = {https://doi.org/10.1016/j.ic.2014.02.002}, doi = {10.1016/J.IC.2014.02.002}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/StephanT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijgt/Teutsch14, author = {Jason Teutsch}, title = {A savings paradox for integer-valued gambling strategies}, journal = {Int. J. Game Theory}, volume = {43}, number = {1}, pages = {145--151}, year = {2014}, url = {https://doi.org/10.1007/s00182-013-0377-7}, doi = {10.1007/S00182-013-0377-7}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijgt/Teutsch14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/TaleleTEJ14, author = {Nirupama Talele and Jason Teutsch and Robert F. Erbacher and Trent Jaeger}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Monitor placement for large-scale systems}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {29--40}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613107}, doi = {10.1145/2613087.2613107}, timestamp = {Wed, 02 Jun 2021 09:13:31 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/TaleleTEJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ErbacherJTT14, author = {Robert F. Erbacher and Trent Jaeger and Nirupama Talele and Jason Teutsch}, title = {Directed Multicut with linearly ordered terminals}, journal = {CoRR}, volume = {abs/1407.7498}, year = {2014}, url = {http://arxiv.org/abs/1407.7498}, eprinttype = {arXiv}, eprint = {1407.7498}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ErbacherJTT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/TeutschZ14, author = {Jason Teutsch and Marius Zimand}, title = {On approximate decidability of minimal programs}, journal = {CoRR}, volume = {abs/1409.0496}, year = {2014}, url = {http://arxiv.org/abs/1409.0496}, eprinttype = {arXiv}, eprint = {1409.0496}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/TeutschZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/Teutsch13, author = {Jason Teutsch}, title = {Review of Algorithmic Randomness and Complexity by Downey and Hirschfeldt}, journal = {{SIGACT} News}, volume = {44}, number = {1}, pages = {25--28}, year = {2013}, url = {https://doi.org/10.1145/2447712.2447721}, doi = {10.1145/2447712.2447721}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigact/Teutsch13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/TaleleTJE13, author = {Nirupama Talele and Jason Teutsch and Trent Jaeger and Robert F. Erbacher}, editor = {Jan J{\"{u}}rjens and Benjamin Livshits and Riccardo Scandariato}, title = {Using Security Policies to Automate Placement of Network Intrusion Prevention}, booktitle = {Engineering Secure Software and Systems - 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7781}, pages = {17--32}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36563-8\_2}, doi = {10.1007/978-3-642-36563-8\_2}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/essos/TaleleTJE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tamc/MerkleSTWY13, author = {Wolfgang Merkle and Frank Stephan and Jason Teutsch and Wei Wang and Yue Yang}, editor = {T.{-}H. Hubert Chan and Lap Chi Lau and Luca Trevisan}, title = {Selection by Recursively Enumerable Sets}, booktitle = {Theory and Applications of Models of Computation, 10th International Conference, {TAMC} 2013, Hong Kong, China, May 20-22, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7876}, pages = {144--155}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38236-9\_14}, doi = {10.1007/978-3-642-38236-9\_14}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tamc/MerkleSTWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computability/MerkleT12, author = {Wolfgang Merkle and Jason Teutsch}, title = {Constant Compression and Random Weights}, journal = {Comput.}, volume = {1}, number = {2}, pages = {153--169}, year = {2012}, url = {https://doi.org/10.3233/COM-12011}, doi = {10.3233/COM-12011}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computability/MerkleT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/ChalcraftDFT12, author = {Adam Chalcraft and Randall Dougherty and Christopher F. Freiling and Jason Teutsch}, title = {How to build a probability-free casino}, journal = {Inf. Comput.}, volume = {211}, pages = {160--164}, year = {2012}, url = {https://doi.org/10.1016/j.ic.2011.12.004}, doi = {10.1016/J.IC.2011.12.004}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/ChalcraftDFT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsyml/StephanT12, author = {Frank Stephan and Jason Teutsch}, title = {An incomplete set of shortest descriptions}, journal = {J. Symb. Log.}, volume = {77}, number = {1}, pages = {291--307}, year = {2012}, url = {https://doi.org/10.2178/jsl/1327068704}, doi = {10.2178/JSL/1327068704}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsyml/StephanT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mst/BienvenuST12, author = {Laurent Bienvenu and Frank Stephan and Jason Teutsch}, title = {How Powerful Are Integer-Valued Martingales?}, journal = {Theory Comput. Syst.}, volume = {51}, number = {3}, pages = {330--351}, year = {2012}, url = {https://doi.org/10.1007/s00224-011-9362-3}, doi = {10.1007/S00224-011-9362-3}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mst/BienvenuST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocl/Kjos-HanssenST12, author = {Bj{\o}rn Kjos{-}Hanssen and Frank Stephan and Jason Teutsch}, title = {Arithmetic complexity via effective names for random sequences}, journal = {{ACM} Trans. Comput. Log.}, volume = {13}, number = {3}, pages = {24:1--24:18}, year = {2012}, url = {https://doi.org/10.1145/2287718.2287724}, doi = {10.1145/2287718.2287724}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tocl/Kjos-HanssenST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MuthukumaranRTVTJ12, author = {Divya Muthukumaran and Sandra Julieta Rueda and Nirupama Talele and Hayawardh Vijayakumar and Jason Teutsch and Trent Jaeger}, editor = {Robert H'obbes' Zakon}, title = {Transforming commodity security policies to enforce Clark-Wilson integrity}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {269--278}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420991}, doi = {10.1145/2420950.2420991}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MuthukumaranRTVTJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/MerkleT12, author = {Wolfgang Merkle and Jason Teutsch}, editor = {Christoph D{\"{u}}rr and Thomas Wilke}, title = {Constant compression and random weights}, booktitle = {29th International Symposium on Theoretical Aspects of Computer Science, {STACS} 2012, February 29th - March 3rd, 2012, Paris, France}, series = {LIPIcs}, volume = {14}, pages = {172--181}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2012}, url = {https://doi.org/10.4230/LIPIcs.STACS.2012.172}, doi = {10.4230/LIPICS.STACS.2012.172}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/stacs/MerkleT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1205-4821, author = {Randall Dougherty and Jack H. Lutz and R. Daniel Mauldin and Jason Teutsch}, title = {Translating the Cantor set by a random}, journal = {CoRR}, volume = {abs/1205.4821}, year = {2012}, url = {http://arxiv.org/abs/1205.4821}, eprinttype = {arXiv}, eprint = {1205.4821}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1205-4821.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1208-0682, author = {Frank Stephan and Jason Teutsch}, title = {Things that can be made into themselves}, journal = {CoRR}, volume = {abs/1208.0682}, year = {2012}, url = {http://arxiv.org/abs/1208.0682}, eprinttype = {arXiv}, eprint = {1208.0682}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1208-0682.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1212-6104, author = {Jason Teutsch}, title = {Short lists for shorter programs in short time}, journal = {CoRR}, volume = {abs/1212.6104}, year = {2012}, url = {http://arxiv.org/abs/1212.6104}, eprinttype = {arXiv}, eprint = {1212.6104}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1212-6104.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/JainST11, author = {Sanjay Jain and Frank Stephan and Jason Teutsch}, title = {Index sets and universal numberings}, journal = {J. Comput. Syst. Sci.}, volume = {77}, number = {4}, pages = {760--773}, year = {2011}, url = {https://doi.org/10.1016/j.jcss.2010.07.001}, doi = {10.1016/J.JCSS.2010.07.001}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/JainST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tamc/JainST11, author = {Sanjay Jain and Frank Stephan and Jason Teutsch}, editor = {Mitsunori Ogihara and Jun Tarui}, title = {Closed Left-R.E. Sets}, booktitle = {Theory and Applications of Models of Computation - 8th Annual Conference, {TAMC} 2011, Tokyo, Japan, May 23-25, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6648}, pages = {218--229}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20877-5\_23}, doi = {10.1007/978-3-642-20877-5\_23}, timestamp = {Sun, 25 Oct 2020 23:06:59 +0100}, biburl = {https://dblp.org/rec/conf/tamc/JainST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cie/BienvenuST10, author = {Laurent Bienvenu and Frank Stephan and Jason Teutsch}, editor = {Fernando Ferreira and Benedikt L{\"{o}}we and Elvira Mayordomo and Lu{\'{\i}}s Mendes Gomes}, title = {How Powerful Are Integer-Valued Martingales?}, booktitle = {Programs, Proofs, Processes, 6th Conference on Computability in Europe, CiE 2010, Ponta Delgada, Azores, Portugal, June 30 - July 4, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6158}, pages = {59--68}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13962-8\_7}, doi = {10.1007/978-3-642-13962-8\_7}, timestamp = {Tue, 10 Dec 2019 15:37:25 +0100}, biburl = {https://dblp.org/rec/conf/cie/BienvenuST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1004-0838, author = {Laurent Bienvenu and Frank Stephan and Jason Teutsch}, title = {How powerful are integer-valued martingales?}, journal = {CoRR}, volume = {abs/1004.0838}, year = {2010}, url = {http://arxiv.org/abs/1004.0838}, eprinttype = {arXiv}, eprint = {1004.0838}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1004-0838.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1008-4825, author = {Bj{\o}rn Kjos{-}Hanssen and Frank Stephan and Jason Teutsch}, title = {Enumerating randoms}, journal = {CoRR}, volume = {abs/1008.4825}, year = {2010}, url = {http://arxiv.org/abs/1008.4825}, eprinttype = {arXiv}, eprint = {1008.4825}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1008-4825.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cie/JainST09, author = {Sanjay Jain and Frank Stephan and Jason Teutsch}, editor = {Klaus Ambos{-}Spies and Benedikt L{\"{o}}we and Wolfgang Merkle}, title = {Index Sets and Universal Numberings}, booktitle = {Mathematical Theory and Computational Practice, 5th Conference on Computability in Europe, CiE 2009, Heidelberg, Germany, July 19-24, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5635}, pages = {270--279}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03073-4\_28}, doi = {10.1007/978-3-642-03073-4\_28}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cie/JainST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ndjfl/StephanT08, author = {Frank Stephan and Jason Teutsch}, title = {Immunity and Hyperimmunity for Sets of Minimal Indices}, journal = {Notre Dame J. Formal Log.}, volume = {49}, number = {2}, pages = {107--125}, year = {2008}, url = {https://doi.org/10.1215/00294527-2008-001}, doi = {10.1215/00294527-2008-001}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ndjfl/StephanT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apal/Teutsch07, author = {Jason Teutsch}, title = {On the Turing degrees of minimal index sets}, journal = {Ann. Pure Appl. Log.}, volume = {148}, number = {1-3}, pages = {63--80}, year = {2007}, url = {https://doi.org/10.1016/j.apal.2007.07.003}, doi = {10.1016/J.APAL.2007.07.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/apal/Teutsch07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-math-0701904, author = {Jason Teutsch}, title = {Noncomputable Spectral Sets}, journal = {CoRR}, volume = {abs/math/0701904}, year = {2007}, url = {http://arxiv.org/abs/math/0701904}, eprinttype = {arXiv}, eprint = {math/0701904}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-math-0701904.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/VontobelSKTV05, author = {Pascal O. Vontobel and Roxana Smarandache and Negar Kiyavash and Jason Teutsch and Dejan Vukobratovic}, title = {On the minimal pseudo-codewords of codes from finite geometries}, booktitle = {Proceedings of the 2005 {IEEE} International Symposium on Information Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September 2005}, pages = {980--984}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ISIT.2005.1523484}, doi = {10.1109/ISIT.2005.1523484}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/VontobelSKTV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0508019, author = {Pascal O. Vontobel and Roxana Smarandache and Negar Kiyavash and Jason Teutsch and Dejan Vukobratovic}, title = {On the Minimal Pseudo-Codewords of Codes from Finite Geometries}, journal = {CoRR}, volume = {abs/cs/0508019}, year = {2005}, url = {http://arxiv.org/abs/cs/0508019}, eprinttype = {arXiv}, eprint = {cs/0508019}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0508019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.