default search action
Computer Science Review, Volume 6
Volume 6, Number 1, January 2012
- Raffaele Giancarlo, Davide Scaturro, Filippo Utro:
Textual data compression in computational biology: Algorithmic techniques. 1-25 - Raphaël Khoury, Nadia Tawbi:
Which security policies are enforceable by runtime monitors? A survey. 27-45
Volume 6, Numbers 2-3, May 2012
- Eleni Koutrouli, Aphrodite Tsalgatidou:
Taxonomy of attacks and defense mechanisms in P2P reputation systems - Lessons for reputation system designers. 47-70 - Curtis Menton, Preetjot Singh:
Manipulation can be hard in tractable voting systems even for constant-sized coalitions. 71-87 - Marius Kaminskas, Francesco Ricci:
Contextual music information retrieval and recommendation: State of the art and challenges. 89-119
- Jhimli Adhikari:
Theophano Mitsa - Temporal Data Mining 1st Edition (2010) Chapman & Hall, CRC 373 ISBN: 9781420089769. 121-124
Volume 6, Number 4, July 2012
- Ibrahim Al-Bluwi, Thierry Siméon, Juan Cortés:
Motion planning algorithms for molecular simulations: A survey. 125-143 - Chithra Selvaraj, Sheila Anand:
A survey on Security Issues of Reputation Management Systems for Peer-to-Peer Networks. 145-160 - Iraklis A. Klampanos, Joemon M. Jose:
Searching in peer-to-peer networks. 161-183
- Josep Díaz:
Book Review: George Dyson "Turing's Cathedral: The Origins of the Digital Universe" (2012) Pantheon Books. 185-186
Volume 6, Numbers 5-6, November 2012
- Arseny M. Shur:
Growth properties of power-free languages. 187-208 - Simon Grinberg, Shlomo Weiss:
Architectural virtualization extensions: A systems perspective. 209-224 - Josep Díaz, Carme Torras:
A personal account of Turing's imprint on the development of computer science. 225-234
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.