Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
12183
search results - page 84 / 2437
»
Computers under Attacks!
Sort
relevance
views
votes
recent
update
View
thumb
title
108
click to vote
FOCS
1998
IEEE
72
views
Theoretical Computer Science
»
more
FOCS 1998
»
Randomness vs. Time: De-Randomization under a Uniform Assumption
15 years 8 months ago
Download
www.math.ias.edu
Russell Impagliazzo, Avi Wigderson
claim paper
Read More »
126
click to vote
IPPS
1997
IEEE
82
views
Distributed And Parallel Com...
»
more
IPPS 1997
»
Wide-Sense Nonblocking Clos Networks under Packing Strategy
15 years 8 months ago
Download
www.cse.buffalo.edu
Yuanyuan Yang, Jianchao Wang
claim paper
Read More »
133
click to vote
BIRTHDAY
1997
Springer
134
views
Applied Computing
»
more
BIRTHDAY 1997
»
Closure under Complementation of Logspace Complexity Classes - A Survey
15 years 8 months ago
Download
www.ccf.org.cn
Birgit Jenner
claim paper
Read More »
86
click to vote
DAC
1996
ACM
98
views
Computer Architecture
»
more
DAC 1996
»
Analysis of RC Interconnections Under Ramp Input
15 years 8 months ago
Download
vlsicad.ucsd.edu
Andrew B. Kahng, Sudhakar Muddu
claim paper
Read More »
110
click to vote
DAC
1992
ACM
105
views
Computer Architecture
»
more
DAC 1992
»
A Near Optimal Algorithm for Technology Mapping Minimizing Area under Delay Constraints
15 years 8 months ago
Download
www.cs.nthu.edu.tw
Kamal Chaudhary, Massoud Pedram
claim paper
Read More »
« Prev
« First
page 84 / 2437
Last »
Next »