Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
Characterizations of the decidability of some problems for regular trace languagesAalbersberg, IJ. J. ; Hoogeboom, H. J.Mathematical Systems Theory, 1989-12, Vol.22 (1), p.1-19 [Periódico revisado por pares]Texto completo disponível |
2 |
Material Type: magazinearticle
|
![]() |
Trespass, nuisance, and spam: 11th century common law meets the internetAALBERTS, Robert J ; POON, Percy S ; THISTLE, Paul DCommunications of the ACM, 2007-12, Vol.50 (12), p.40-45New York, NY: Association for Computing MachineryTexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
Algorithms for Boolean function query propertiesAARONSON, ScottSIAM journal on computing, 2003-01, Vol.32 (5), p.1140-1157 [Periódico revisado por pares]Philadelphia, PA: Society for Industrial and Applied MathematicsTexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
Lower bounds for local search by quantum argumentsAARONSON, ScottSIAM journal on computing, 2006, Vol.35 (4), p.804-824 [Periódico revisado por pares]Philadelphia, PA: Society for Industrial and Applied MathematicsTexto completo disponível |
5 |
Material Type: magazinearticle
|
![]() |
Quantum MoneyAARONSON, Scott ; FARHI, Edward ; GOSSET, David ; HASSIDIM, Avinatan ; KELNER, Jonathan ; LUTOMIRSKI, AndrewCommunications of the ACM, 2012-08, Vol.55 (8), p.84-92New York, NY: Association for Computing MachineryTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
Nonclausal deduction in first-order temporal logicABADI, M ; MANNA, ZJournal of the ACM, 1990-04, Vol.37 (2), p.279-317 [Periódico revisado por pares]New York, NY: Association for Computing MachineryTexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
Analyzing security protocols with secrecy types and logic programsABADI, Martin ; BLANCHET, BrunoJournal of the ACM, 2005, Vol.52 (1), p.102-146 [Periódico revisado por pares]New York, NY: Association for Computing MachineryTexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
Security Analysis of Cryptographically Controlled Access to XML DocumentsABADI, Martin ; WARINSCHI, BogdanJournal of the ACM, 2008-05, Vol.55 (2), p.1-29 [Periódico revisado por pares]New York, NY: Association for Computing MachineryTexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
A Survey on Ear BiometricsABAZA, Ayman ; ROSS, Arun ; HEBERT, Christina ; HARRISON, Mary Ann F ; NIXON, Mark SACM computing surveys, 2013-02, Vol.45 (2), p.1-35 [Periódico revisado por pares]New York, NY: Association for Computing MachineryTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
A framework for establishing trust in Cloud provenanceAbbadi, Imad M.International journal of information security, 2013-04, Vol.12 (2), p.111-128 [Periódico revisado por pares]Berlin/Heidelberg: Springer-VerlagTexto completo disponível |