skip to main content
Skip header Section
Introduction to the Theory of ComputationDecember 1996
Publisher:
  • International Thomson Publishing
ISBN:978-0-534-94728-6
Published:01 December 1996
Pages:
396
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

From the Publisher:

Michael Sipser's philosophy in writing this book is simple: make the subject interesting and relevant, and the students will learn. His emphasis on unifying computer science theory - rather than offering a collection of low-level details - sets the book apart, as do his intuitive explanations. Throughout the book, Sipser - a noted authority on the theory of computation - builds students' knowledge of conceptual tools used in computer science, the aesthetic sense they need to create elegant systems, and the ability to think through problems on their own. INTRODUCTION TO THE THEORY OF COMPUTATION provides a mathematical treatment of computation theory grounded in theorems and proofs. Proofs are presented with a "proof idea" component to reveal the concepts underpinning the formalism. Algorithms are presented using prose instead of pseudocode to focus attention on the algorithms themselves, rather than on specific computational models. Topic coverage, terminology, and order of presentation are traditional for an upper-level course in computer science theory. Users of the Preliminary Edition (now out of print) will be interested to note several new chapters on complexity theory: Chapter 8 on space complexity; Chapter 9 on provable intractability, and Chapter 10 on advanced topics, including approximation algorithms, alternation, interactive proof systems, cryptography, and parallel computing.

Cited By

  1. ACM
    Li W (2024). Optimizing with Attractor: A Tutorial, ACM Computing Surveys, 56:9, (1-41), Online publication date: 31-Oct-2024.
  2. ACM
    Grewal K, Godfrey P and Hsu J Expressive Policies For Microservice Networks Proceedings of the 22nd ACM Workshop on Hot Topics in Networks, (280-286)
  3. Dey P, Amin M, Sinha B and Badkoobehi H (2023). A Teaching Strategy for Undecidable Problems, Journal of Computing Sciences in Colleges, 39:4, (107-108), Online publication date: 1-Oct-2023.
  4. Haak A, Meier A, Prakash O and Rao B (2023). Parameterised Counting in Logspace, Algorithmica, 85:10, (2923-2961), Online publication date: 1-Oct-2023.
  5. Hospodár M and Olejár V (2023). Nondeterministic operational complexity in subregular languages, Theoretical Computer Science, 972:C, Online publication date: 13-Sep-2023.
  6. Hospodár M and Olejár V (2023). The cut operation in subclasses of convex languages, Theoretical Computer Science, 969:C, Online publication date: 21-Aug-2023.
  7. Fortin M, Konev B, Ryzhikov V, Savateev Y, Wolter F and Zakharyaschev M Reverse engineering of temporal queries mediated by LTL ontologies Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, (3230-3238)
  8. ACM
    Müller P, Wonka P, Haegler S, Ulmer A and Van Gool L Procedural Modeling of Buildings Seminal Graphics Papers: Pushing the Boundaries, Volume 2, (229-238)
  9. ACM
    Mahmood Y, Meier A and Schmidt J (2023). Parameterized Complexity of Logic-based Argumentation in Schaefer’s Framework, ACM Transactions on Computational Logic, 24:3, (1-25), Online publication date: 31-Jul-2023.
  10. ACM
    Ilango R, Li J and Williams R Indistinguishability Obfuscation, Range Avoidance, and Bounded Arithmetic Proceedings of the 55th Annual ACM Symposium on Theory of Computing, (1076-1089)
  11. Dinneen M, Henderson A and Nicolescu R (2023). Sublinear P system solutions to NP-complete problems, Theoretical Computer Science, 958:C, Online publication date: 22-May-2023.
  12. Chakraborty S, Grossi R, Sadakane K and Satti S (2023). Succinct representation for (non)deterministic finite automata, Journal of Computer and System Sciences, 131:C, (1-12), Online publication date: 1-Feb-2023.
  13. Persiau F, De Bock J and de Cooman G (2022). On the (dis)similarities between stationary imprecise and non-stationary precise uncertainty models in algorithmic randomness, International Journal of Approximate Reasoning, 151:C, (272-291), Online publication date: 1-Dec-2022.
  14. Perez-Salazar S, Singh M and Toriello A (2022). Adaptive Bin Packing with Overflow, Mathematics of Operations Research, 47:4, (3317-3356), Online publication date: 1-Nov-2022.
  15. ACM
    Lin W, Su C and Jiang J Language Equation Solving via Boolean Automata Manipulation Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, (1-9)
  16. Bhatt B and Furia C (2022). Automated repair of resource leaks in Android applications, Journal of Systems and Software, 192:C, Online publication date: 1-Oct-2022.
  17. Skapinakis E and Costa J (2022). Machines that perform measurements, Theoretical Computer Science, 924:C, (68-93), Online publication date: 30-Jul-2022.
  18. Nanongkai D and Scquizzato M (2022). Equivalence classes and conditional hardness in massively parallel computations, Distributed Computing, 35:2, (165-183), Online publication date: 1-Apr-2022.
  19. Nakano K (2022). Time-symmetric Turing machines for computable involutions, Science of Computer Programming, 215:C, Online publication date: 1-Mar-2022.
  20. Kristiansen L (2022). Reversible computing and implicit computational complexity, Science of Computer Programming, 213:C, Online publication date: 1-Jan-2022.
  21. Rubtsov A and Vyalyi M (2022). On computational complexity of set automata, Information and Computation, 281:C, Online publication date: 1-Dec-2021.
  22. ACM
    Atserias A, Dawar A and Ochremiak J (2021). On the Power of Symmetric Linear Programs, Journal of the ACM, 68:4, (1-35), Online publication date: 1-Aug-2021.
  23. ACM
    Chen C, Peng R, Ying L and Tong H (2021). Fast Connectivity Minimization on Large-Scale Networks, ACM Transactions on Knowledge Discovery from Data, 15:3, (1-25), Online publication date: 30-Jun-2021.
  24. Stan D and Lin A Regular Model Checking Approach to Knowledge Reasoning over Parameterized Systems Proceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems, (1254-1262)
  25. Wei L, Huang G, Wasti S, Hussain M and Jiang Y (2021). Generalized fuzzy automata with semantic computing, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 25:7, (5775-5789), Online publication date: 1-Apr-2021.
  26. Charrier T, Queffelec A, Sankur O and Schwarzentruber F (2020). Complexity of planning for connected agents, Autonomous Agents and Multi-Agent Systems, 34:2, Online publication date: 12-Oct-2020.
  27. Kristiansen L Reversible Programming Languages Capturing Complexity Classes Reversible Computation, (111-127)
  28. Nakano K Involutory Turing Machines Reversible Computation, (54-70)
  29. Jakobsen S and Simonsen J Liouville Numbers and the Computational Complexity of Changing Bases Beyond the Horizon of Computability, (50-62)
  30. Pinchinat S, Schwarzentruber F and Lê Cong S Library-Based Attack Tree Synthesis Graphical Models for Security, (24-44)
  31. Branco P, Mateus P, Salema C and Souto A (2020). Using Low-Density Parity-Check codes to improve the McEliece cryptosystem, Information Sciences: an International Journal, 510:C, (243-255), Online publication date: 1-Feb-2020.
  32. Hospodár M, Jirásková G and Mlynárčik P (2019). Nondeterministic complexity in subclasses of convex languages, Theoretical Computer Science, 787:C, (89-110), Online publication date: 1-Oct-2019.
  33. Marchioni E and Wooldridge M (2019). Łukasiewicz logics for cooperative games, Artificial Intelligence, 275:C, (252-278), Online publication date: 1-Oct-2019.
  34. ACM
    Davis J Rethinking Regex engines to address ReDoS Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (1256-1258)
  35. ACM
    Davis J, Michael IV L, Coghlan C, Servant F and Lee D Why aren’t regular expressions a lingua franca? an empirical study on the re-use and portability of regular expressions Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (443-454)
  36. Charrier T, Queffelec A, Sankur O and Schwarzentruber F Reachability and coverage planning for connected agents Proceedings of the 28th International Joint Conference on Artificial Intelligence, (144-150)
  37. ACM
    Lai Z, Luo Q and Xie X Efficient Data-Parallel Primitives on Heterogeneous Systems Proceedings of the 48th International Conference on Parallel Processing, (1-10)
  38. Drucker N, Ho H, Ouaknine J, Penn M and Strichman O (2019). Cyclic-routing of Unmanned Aerial Vehicles, Journal of Computer and System Sciences, 103:C, (18-45), Online publication date: 1-Aug-2019.
  39. ACM
    Chee Y, Chrisnata J, Kiah H and Nguyen T (2019). Deciding the Confusability of Words under Tandem Repeats in Linear Time, ACM Transactions on Algorithms, 15:3, (1-22), Online publication date: 31-Jul-2019.
  40. Kuznetsov S The logic of action lattices is undecidable Proceedings of the 34th Annual ACM/IEEE Symposium on Logic in Computer Science, (1-9)
  41. ACM
    Deutsch A, Li Y and Vianu V (2019). Verification of Hierarchical Artifact Systems, ACM Transactions on Database Systems, 44:3, (1-68), Online publication date: 19-Jun-2019.
  42. Samadani M, Berenjkoob M and Blanton M (2019). Secure pattern matching based on bit parallelism, International Journal of Information Security, 18:3, (371-391), Online publication date: 1-Jun-2019.
  43. Le X, Bao L, Lo D, Xia X, Li S and Pasareanu C On reliability of patch correctness assessment Proceedings of the 41st International Conference on Software Engineering, (524-535)
  44. ACM
    Casias M, Angstadt K, Tracy II T, Skadron K and Weimer W Debugging Support for Pattern-Matching Languages and Accelerators Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, (1073-1086)
  45. Zhang S, Zhang H, Di B and Song L (2019). Cellular UAV-to-X Communications, IEEE Transactions on Wireless Communications, 18:2, (1346-1359), Online publication date: 1-Feb-2019.
  46. Law M, Russo A, Bertino E, Broda K and Lobo J Representing and learning grammars in answer set programming Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence and Thirty-First Innovative Applications of Artificial Intelligence Conference and Ninth AAAI Symposium on Educational Advances in Artificial Intelligence, (2919-2928)
  47. Anderson P, Gould S and Johnson M Partially-supervised image captioning Proceedings of the 32nd International Conference on Neural Information Processing Systems, (1879-1890)
  48. Majumdar D, Raman V and Saurabh S (2018). Polynomial Kernels for Vertex Cover Parameterized by Small Degree Modulators, Theory of Computing Systems, 62:8, (1910-1951), Online publication date: 1-Nov-2018.
  49. Liu H, Ibrahim M, Kayiran O, Pai S and Jog A Architectural support for efficient large-scale automata processing Proceedings of the 51st Annual IEEE/ACM International Symposium on Microarchitecture, (908-920)
  50. ACM
    Situ L, Wang L, Liu Y, Mao B and Li X Vanguard Proceedings of the 10th Asia-Pacific Symposium on Internetware, (1-10)
  51. Polyvyanyy A, Sürmeli J and Weidlich M (2018). Interleaving isotactics – An equivalence notion on behaviour abstractions, Theoretical Computer Science, 737:C, (1-18), Online publication date: 15-Aug-2018.
  52. ACM
    Chen C, Peng R, Ying L and Tong H Network Connectivity Optimization Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (1167-1176)
  53. ACM
    Satoh S, Takahashi Y and Yamakawa H Accelerated Equivalence Structure Extraction via Pairwise Incremental Search Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (2160-2169)
  54. de Jong M, Zhang K, Roth A, Rhodes T, Schmucker R, Zhou C, Ferreira S, Cartucho J and Veloso M Towards a Robust Interactive and Learning Social Robot Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, (883-891)
  55. Arajo J, Kinyon M, Konieczny J and Malheiro A (2018). Decidability and independence of conjugacy problems in finitely presented monoids, Theoretical Computer Science, 731:C, (88-98), Online publication date: 30-Jun-2018.
  56. ACM
    Gao Y, Huang S and Parameswaran A Navigating the Data Lake with DATAMARAN Proceedings of the 2018 International Conference on Management of Data, (943-958)
  57. Knight J and Saraph V (2018). Scott sentences for certain groups, Archive for Mathematical Logic, 57:3-4, (453-472), Online publication date: 1-May-2018.
  58. Liao C, Lee S, Chiou Y, Lee C and Lee C (2018). Power consumption minimization by distributive particle swarm optimization for luminance control and its parallel implementations, Expert Systems with Applications: An International Journal, 96:C, (479-491), Online publication date: 15-Apr-2018.
  59. ACM
    Chaignon P, Lazri K, François J, Delmas T and Festor O Oko Proceedings of the Symposium on SDN Research, (1-13)
  60. Oueida S, Kotb Y, Kadry S, Ionescu S and Amancio D (2018). Healthcare Operation Improvement Based on Simulation of Cooperative Resource Preservation Nets for None-Consumable Resources, Complexity, 2018, Online publication date: 1-Jan-2018.
  61. Malloy B and Power J Quantifying the transition from python 2 to 3 Proceedings of the 11th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, (314-323)
  62. Belovs A, Ivanyos G, Qiao Y, Santha M and Yang S On the polynomial parity argument complexity of the combinatorial Nullstellensatz Proceedings of the 32nd Computational Complexity Conference, (1-24)
  63. (2017). First-cycle games, Information and Computation, 254:P2, (195-216), Online publication date: 1-Jun-2017.
  64. Rodrguez I, Rabanal P and Rubio F (2017). How to make a best-seller, Applied Soft Computing, 55:C, (178-196), Online publication date: 1-Jun-2017.
  65. ACM
    Angiuli C, Harper R and Wilson T (2017). Computational higher-dimensional type theory, ACM SIGPLAN Notices, 52:1, (680-693), Online publication date: 11-May-2017.
  66. Chu H, Chung C, Jeong W and Cho K (2017). Predicting epileptic seizures from scalp EEG based on attractor state analysis, Computer Methods and Programs in Biomedicine, 143:C, (75-87), Online publication date: 1-May-2017.
  67. Kop C and Simonsen J The Power of Non-determinism in Higher-Order Implicit Complexity Programming Languages and Systems, (668-695)
  68. Ivanyos G and Santha M (2017). Solving systems of diagonal polynomial equations over finite fields, Theoretical Computer Science, 657:PA, (73-85), Online publication date: 2-Jan-2017.
  69. ACM
    Angiuli C, Harper R and Wilson T Computational higher-dimensional type theory Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, (680-693)
  70. Carmantini G, beim Graben P, Desroches M and Rodrigues S (2017). A modular architecture for transparent computation in recurrent neural networks, Neural Networks, 85:C, (85-105), Online publication date: 1-Jan-2017.
  71. Jung H, Yoo S, Kim D and Park S (2016). A grammar based approach to introduce the Semantic Web to novice users, Multimedia Tools and Applications, 75:23, (15587-15600), Online publication date: 1-Dec-2016.
  72. ACM
    Argyros G, Stais I, Jana S, Keromytis A and Kiayias A SFADiff Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (1690-1701)
  73. Gogte V, Kolli A, Cafarella M, D'Antoni L and Wenisch T HARE The 49th Annual IEEE/ACM International Symposium on Microarchitecture, (1-12)
  74. Antunes L, Buhrman H, Matos A, Souto A and Teixeira A (2016). Distinguishing Two Probability Ensembles with One Sample from each Ensemble, Theory of Computing Systems, 59:3, (517-531), Online publication date: 1-Oct-2016.
  75. Jirásek J, Jirásková G and Šebej J Operations on Unambiguous Finite Automata Proceedings of the 20th International Conference on Developments in Language Theory - Volume 9840, (243-255)
  76. Jirásek J Non-regular Maximal Prefix-Free Subsets of Regular Languages Proceedings of the 20th International Conference on Developments in Language Theory - Volume 9840, (229-242)
  77. ACM
    Deutsch A, Li Y and Vianu V Verification of Hierarchical Artifact Systems Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (179-194)
  78. ACM
    Lin A and Barceló P (2016). String solving with word equations and transducers: towards a logic for analysing mutation XSS, ACM SIGPLAN Notices, 51:1, (123-136), Online publication date: 8-Apr-2016.
  79. ACM
    Esparza J, Ganty P and Majumdar R (2016). Parameterized Verification of Asynchronous Shared-Memory Systems, Journal of the ACM, 63:1, (1-48), Online publication date: 30-Mar-2016.
  80. ACM
    Lin A and Barceló P String solving with word equations and transducers: towards a logic for analysing mutation XSS Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, (123-136)
  81. Jirásek J, Jirásková G, Krausová M, Mlynárčik P and Šebej J (2016). Prefix-free languages, Theoretical Computer Science, 610:PA, (78-90), Online publication date: 11-Jan-2016.
  82. Garrabrant S and Pak I Permutation patterns are hard to count Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (923-936)
  83. Sharma K, Banerjee K and Mandal C Establishing Equivalence of Expressions Proceedings of the Third International Conference on Mining Intelligence and Knowledge Exploration - Volume 9468, (415-423)
  84. Healy C (2015). The parse machine, Journal of Computing Sciences in Colleges, 31:2, (219-226), Online publication date: 1-Dec-2015.
  85. Libkin L, Tan T and Vrgoč D (2015). Regular expressions for data words, Journal of Computer and System Sciences, 81:7, (1278-1297), Online publication date: 1-Nov-2015.
  86. Gajser D (2015). Verifying time complexity of Turing machines, Theoretical Computer Science, 600:C, (86-97), Online publication date: 4-Oct-2015.
  87. Qiu Z, Prez J and Harrison P (2015). Beyond the mean in fork-join queues, Performance Evaluation, 91:C, (99-116), Online publication date: 1-Sep-2015.
  88. Brun Y, Jae Young Bang , Edwards G and Medvidovic N (2015). Self-Adapting Reliability in Distributed Software Systems, IEEE Transactions on Software Engineering, 41:8, (764-780), Online publication date: 1-Aug-2015.
  89. ACM
    Mariani G, Anghel A, Jongerius R and Dittmann G Scaling application properties to exascale Proceedings of the 12th ACM International Conference on Computing Frontiers, (1-8)
  90. ACM
    Fiorini S, Massar S, Pokutta S, Tiwary H and de Wolf R (2015). Exponential Lower Bounds for Polytopes in Combinatorial Optimization, Journal of the ACM, 62:2, (1-23), Online publication date: 6-May-2015.
  91. Jirásek J and Jirásková G (2015). On the boundary of regular languages, Theoretical Computer Science, 578:C, (42-57), Online publication date: 3-May-2015.
  92. ACM
    Xu J, Guo P, Zhao M, Erbacher R, Zhu M and Liu P Comparing Different Moving Target Defense Techniques Proceedings of the First ACM Workshop on Moving Target Defense, (97-107)
  93. ACM
    Luchaup D, Shrimpton T, Ristenpart T and Jha S Formatted Encryption Beyond Regular Languages Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, (1292-1303)
  94. Bresolin D, Muñoz-Velasco E and Sciavicco G Sub-propositional Fragments of the Interval Temporal Logic of Allen's Relations Proceedings of the 14th European Conference on Logics in Artificial Intelligence - Volume 8761, (122-136)
  95. Boer F and Gouw S Combining Monitoring with Run-Time Assertion Checking Advanced Lectures of the 14th International School on Formal Methods for Executable Software Models - Volume 8483, (217-262)
  96. Gasquet O, Goranko V and Schwarzentruber F Big brother logic Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, (325-332)
  97. ACM
    Schreyer B and Kosinski K Finite Automata In Software Modeling With Semaphores And Deadlock Potential Proceedings of the Western Canadian Conference on Computing Education, (1-5)
  98. ACM
    Zhang L, Tiropanis T, Hall W and Myaeng S Introducing the omega-machine Proceedings of the 23rd International Conference on World Wide Web, (905-908)
  99. ACM
    Sun S and Zhong N (2014). On Effective Convergence of Numerical Solutions for Differential Equations, ACM Transactions on Computation Theory, 6:1, (1-25), Online publication date: 1-Mar-2014.
  100. Faliszewski P, Hemaspaandra E and Hemaspaandra L (2014). The complexity of manipulative attacks in nearly single-peaked electorates, Artificial Intelligence, 207:C, (69-99), Online publication date: 1-Feb-2014.
  101. ACM
    Bouajjani A and Emmi M (2013). Analysis of Recursively Parallel Programs, ACM Transactions on Programming Languages and Systems, 35:3, (1-49), Online publication date: 1-Nov-2013.
  102. ACM
    Ortega F, Hernandez F, Barreto A, Rishe N, Adjouadi M and Liu S Exploring modeling language for multi-touch systems using petri nets Proceedings of the 2013 ACM international conference on Interactive tabletops and surfaces, (361-364)
  103. Wen Y, Ray A and Phoha S (2013). Hilbert space formulation of symbolic systems for signal representation and analysis, Signal Processing, 93:9, (2594-2611), Online publication date: 1-Sep-2013.
  104. Jirásek J and Jirásková G On the boundary of regular languages Proceedings of the 18th international conference on Implementation and Application of Automata, (208-219)
  105. ACM
    Crescenzi P, Enström E and Kann V From theory to practice Proceedings of the 18th ACM conference on Innovation and technology in computer science education, (16-21)
  106. Erickson J and Nayyeri A (2013). Tracing Compressed Curves in Triangulated Surfaces, Discrete & Computational Geometry, 49:4, (823-863), Online publication date: 1-Jun-2013.
  107. Shin S, Balasubramanian H, Brun Y, Henneman P and Osterweil L Resource scheduling through resource-aware simulation of emergency departments Proceedings of the 5th International Workshop on Software Engineering in Health Care, (64-70)
  108. Adcock M, Høyer P and Sanders B (2013). Gaussian quantum computation with oracle-decision problems, Quantum Information Processing, 12:4, (1759-1779), Online publication date: 1-Apr-2013.
  109. Hwang S and Lee C (2013). Reliable Web service selection in choreographed environments, Decision Support Systems, 54:3, (1463-1476), Online publication date: 1-Feb-2013.
  110. Tarrataca L and Wichert A (2013). Intricacies of quantum computational paths, Quantum Information Processing, 12:2, (1365-1378), Online publication date: 1-Feb-2013.
  111. Liang S and Kifer M Terminyzer Proceedings of the 15th International Symposium on Practical Aspects of Declarative Languages - Volume 7752, (173-189)
  112. Weaver G and Smith S XUTools Proceedings of the 26th international conference on Large Installation System Administration: strategies, tools, and techniques, (83-100)
  113. Jirásková G and Masopust T On properties and state complexity of deterministic state-partition automata Proceedings of the 7th IFIP TC 1/WG 202 international conference on Theoretical Computer Science, (164-178)
  114. Liang S Non-termination analysis and cost-based query optimization of logic programs Proceedings of the 6th international conference on Web Reasoning and Rule Systems, (284-290)
  115. Beneš N, KřEtíNský J, Larsen K and Srba J (2012). EXPTIME-completeness of thorough refinement on modal transition systems, Information and Computation, 218, (54-68), Online publication date: 1-Sep-2012.
  116. Cockett R, DíAz-BoïLs J, Gallagher J and Hrubeš P (2012). Timed Sets, Functional Complexity, and Computability, Electronic Notes in Theoretical Computer Science (ENTCS), 286, (117-137), Online publication date: 1-Sep-2012.
  117. Jirásková G and Shallit J The state complexity of star-complement-star Proceedings of the 16th international conference on Developments in Language Theory, (380-391)
  118. Miltzow T Tron, a combinatorial game on abstract graphs Proceedings of the 6th international conference on Fun with Algorithms, (293-304)
  119. ACM
    Kin K, Hartmann B, DeRose T and Agrawala M Proton Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (2885-2894)
  120. Dey P, Amin M, Romney G, Sinha B, Gonzales R, Farahani A and Badkoobehi H (2012). Relating automata to other fields, Journal of Computing Sciences in Colleges, 27:4, (168-173), Online publication date: 1-Apr-2012.
  121. ACM
    Victoria J, von Stryk O, Policella N, Gallant M, Donati A and Gao Y Metrics for planetary rover planning & scheduling algorithms Proceedings of the Workshop on Performance Metrics for Intelligent Systems, (47-52)
  122. Libkin L and Vrgoč D Regular expressions for data words Proceedings of the 18th international conference on Logic for Programming, Artificial Intelligence, and Reasoning, (274-288)
  123. ACM
    Jain R, Ji Z, Upadhyay S and Watrous J (2011). QIP = PSPACE, Journal of the ACM, 58:6, (1-27), Online publication date: 1-Dec-2011.
  124. Cmorik R and Jir$#225;skov$#225; G Basic operations on binary suffix-free languages Proceedings of the 7th international conference on Mathematical and Engineering Methods in Computer Science, (94-102)
  125. Krausov$#225; M Prefix-Free regular languages Proceedings of the 7th international conference on Mathematical and Engineering Methods in Computer Science, (114-122)
  126. Marini C, Simi G, Sorbi A and Sorrentino M (2011). A note on algebras of languages, Theoretical Computer Science, 412:46, (6531-6536), Online publication date: 1-Oct-2011.
  127. Dinculescu M, Hundt C, Panangaden P, Pineau J and Precup D The duality of state and observation in probabilistic transition systems Proceedings of the 9th international conference on Logic, Language, and Computation, (206-230)
  128. van der Merwe B, van Zijl L and Geldenhuys J Ambiguity of unary symmetric difference NFAs Proceedings of the 8th international conference on Theoretical aspects of computing, (256-266)
  129. Jirásková G and Šebej J Note on reversal of binary regular languages Proceedings of the 13th international conference on Descriptional complexity of formal systems, (212-221)
  130. Jirásková G and Masopust T State complexity of projected languages Proceedings of the 13th international conference on Descriptional complexity of formal systems, (198-211)
  131. Hague M and Lin A Model checking recursive programs with numeric data types Proceedings of the 23rd international conference on Computer aided verification, (743-759)
  132. Héam P and Masson C A random testing approach using pushdown automata Proceedings of the 5th international conference on Tests and proofs, (119-133)
  133. Díaz J, Colmenar J, Risco-Martín J, Ayala J and Garnica O Quantifying the impact of dynamic memory managers into memory-intensive applications Proceedings of the 2011 Summer Computer Simulation Conference, (160-167)
  134. Cabello A and Joosten J Hidden variables simulating quantum contextuality increasingly violate the Holevo bound Proceedings of the 10th international conference on Unconventional computation, (64-76)
  135. Leblanc L, Houle J and Poulin P Component-based modeling of complete buildings Proceedings of Graphics Interface 2011, (87-94)
  136. Das Sarma A, Lipton R and Nanongkai D (2011). Best-order streaming model, Theoretical Computer Science, 412:23, (2544-2555), Online publication date: 20-May-2011.
  137. Herrmann C and Hammond K Counter automata for parameterised timing analysis of box-based systems Proceedings of the Second international conference on Foundational and Practical Aspects of Resource Analysis, (126-141)
  138. Hernane S, Gustedt J and Benyettou M Modeling and experimental validation of the data handover API Proceedings of the 6th international conference on Advances in grid and pervasive computing, (117-126)
  139. ACM
    Ottoni G, Hartin T, Weaver C, Brandt J, Kuttanna B and Wang H Harmonia Proceedings of the 8th ACM International Conference on Computing Frontiers, (1-10)
  140. Gairing M and Savani R Computing stable outcomes in hedonic games with voting-based deviations The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, (559-566)
  141. Zhang M, Ogata K and Nakamura M Specification translation of state machines from equational theories into rewrite theories Proceedings of the 12th international conference on Formal engineering methods and software engineering, (678-693)
  142. Gairing M and Savani R Computing stable outcomes in hedonic games Proceedings of the Third international conference on Algorithmic game theory, (174-185)
  143. Risco-Martín J, Atienza D, Manuel Colmenar J and Garnica O (2010). A parallel evolutionary algorithm to optimize dynamic memory managers in embedded systems, Parallel Computing, 36:10-11, (572-590), Online publication date: 1-Oct-2010.
  144. Jirásková G and Masopust T Complexity in union-free regular languages Proceedings of the 14th international conference on Developments in language theory, (255-266)
  145. Epek O (2010). Book review, Computer Science Review, 4:3, (185-187), Online publication date: 1-Aug-2010.
  146. ACM
    Colmenar J, Risco-Martín J, Atienza D, Garnica O, Hidalgo J and Lanchares J Improving reliability of embedded systems through dynamic memory manager optimization using grammatical evolution Proceedings of the 12th annual conference on Genetic and evolutionary computation, (1227-1234)
  147. Stütz T and Uhl A Efficient format-compliant encryption of regular languages Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security, (81-92)
  148. Hsieh S, Van Nelson C and Sampath L (2010). Resistor network-based algorithms for enumerating rational numbers, Journal of Computing Sciences in Colleges, 25:5, (287-293), Online publication date: 1-May-2010.
  149. Carbone A (2010). A new mapping between combinatorial proofs and sequent calculus proofs read out from logical flow graphs, Information and Computation, 208:5, (500-509), Online publication date: 1-May-2010.
  150. Xu K, Tang C, Li C, Jiang Y and Tang R An MDL approach to efficiently discover communities in bipartite network Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part I, (595-611)
  151. Fischer E Process model based incremental project planning Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part II, (285-300)
  152. ACM
    Neff N Problem-directed discrete structures course Proceedings of the 41st ACM technical symposium on Computer science education, (148-151)
  153. Jiang T, Li M, Ravikumar B and Regan K Computability Algorithms and theory of computation handbook, (21-21)
  154. Jiang T, Li M and Ravikumar B Basic notions in computational complexity Algorithms and theory of computation handbook, (19-19)
  155. Donnelly K, Kfoury A and Lapets A (2010). The Complexity of Restricted Variants of the Stable Paths Problem, Fundamenta Informaticae, 103:1-4, (69-87), Online publication date: 1-Jan-2010.
  156. Simonsen J (2009). On the computational complexity of the languages of general symbolic dynamical systems and beta-shifts, Theoretical Computer Science, 410:47-49, (4878-4891), Online publication date: 1-Nov-2009.
  157. Ishdorj T, Leporati A, Pan L and Wang J Solving NP-Complete problems by spiking neural p systems with budding rules Proceedings of the 10th international conference on Membrane Computing, (335-353)
  158. Melissen M The generative capacity of the lambek-grishin calculus Proceedings of the 14th international conference on Formal grammar, (118-132)
  159. ACM
    Kiezun A, Ganesh V, Guo P, Hooimeijer P and Ernst M HAMPI Proceedings of the eighteenth international symposium on Software testing and analysis, (105-116)
  160. ACM
    Risco-Martín J, Atienza D, Gonzalo R and Hidalgo J Optimization of dynamic memory managers for embedded systems using grammatical evolution Proceedings of the 11th Annual conference on Genetic and evolutionary computation, (1609-1616)
  161. Antonik A, Huth M, Larsen K, Nyman U and Wąsowski A (2009). EXPTIME-complete Decision Problems for Modal and Mixed Specifications, Electronic Notes in Theoretical Computer Science (ENTCS), 242:1, (19-33), Online publication date: 1-Jul-2009.
  162. ACM
    Armoni M and Ben-Ari M (2009). The concept of nondeterminism, ACM SIGCSE Bulletin, 41:2, (141-160), Online publication date: 25-Jun-2009.
  163. ACM
    Brun Y and Medvidovic N Crystal-growth-inspired algorithms for computational grids Proceedings of the 2009 workshop on Bio-inspired algorithms for distributed systems, (19-26)
  164. ACM
    Weise T and Zapf M Evolving distributed algorithms with genetic programming Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation, (577-584)
  165. Park K, Park H, Jeun W and Ha S (2009). Boolean circuit programming, Journal of Discrete Algorithms, 7:2, (267-277), Online publication date: 1-Jun-2009.
  166. Shiloni A, Agmon N and Kaminka G Of robot ants and elephants Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 1, (81-88)
  167. Wang C, Kulkarni S and Poor H (2009). Finding all small error-prone substructures in LDPC codes, IEEE Transactions on Information Theory, 55:5, (1976-1999), Online publication date: 1-May-2009.
  168. Sigarreta J, Bermudo S and Fernau H (2009). On the complement graph and defensive k-alliances, Discrete Applied Mathematics, 157:8, (1687-1695), Online publication date: 1-Apr-2009.
  169. ACM
    McMaster K, Rague B and Hadfield S (2009). Two mathematical gestalts for computer theory, ACM SIGCSE Bulletin, 41:1, (251-255), Online publication date: 4-Mar-2009.
  170. ACM
    McMaster K, Rague B and Hadfield S Two mathematical gestalts for computer theory Proceedings of the 40th ACM technical symposium on Computer science education, (251-255)
  171. Haegler S, Müller P and Van Gool L (2009). Procedural modeling for digital cultural heritage, Journal on Image and Video Processing, 2009, (4-4), Online publication date: 1-Feb-2009.
  172. Blakey E (2009). Factorizing RSA Keys, An Improved Analogue Solution, New Generation Computing, 27:2, (159-176), Online publication date: 1-Feb-2009.
  173. Zafar N, Sabir N and Ali A Semantics transformation of NFA to Z notation by constructing union of regular languages Proceedings of the 8th conference on Applied computer scince, (70-75)
  174. ACM
    Dinaburg A, Royal P, Sharif M and Lee W Ether Proceedings of the 15th ACM conference on Computer and communications security, (51-62)
  175. Park E and Park K (2008). An Improved Boolean Circuit for Maximum Matching in a Convex Bipartite Graph, Fundamenta Informaticae, 84:1, (81-97), Online publication date: 1-Sep-2008.
  176. ACM
    Caesar M and Rexford J Building bug-tolerant routers with virtualization Proceedings of the ACM workshop on Programmable routers for extensible services of tomorrow, (51-56)
  177. Deutch D and Milo T (2008). Type inference and type checking for queries on execution traces, Proceedings of the VLDB Endowment, 1:1, (352-363), Online publication date: 1-Aug-2008.
  178. ACM
    Lopez A (2008). Statistical machine translation, ACM Computing Surveys, 40:3, (1-49), Online publication date: 1-Aug-2008.
  179. Tarasov S and Vyalyi M (2008). Semidefinite programming and arithmetic circuit evaluation, Discrete Applied Mathematics, 156:11, (2070-2078), Online publication date: 1-Jun-2008.
  180. Nassu B and Nanya T Interaction faults caused by third-party external systems Proceedings of the 5th international conference on Service availability, (59-74)
  181. Shieh M and Tsai S (2008). Jug measuring, Theoretical Computer Science, 396:1-3, (50-62), Online publication date: 1-May-2008.
  182. ACM
    Lucas J and Jarvis J Incorporating transformations into jflap for enhanced understanding of automata Proceedings of the 39th SIGCSE technical symposium on Computer science education, (14-18)
  183. ACM
    Polycarpou I, Pasztor A and Adjouadi M A conceptual approach to teaching induction for computer science Proceedings of the 39th SIGCSE technical symposium on Computer science education, (9-13)
  184. Goldin D and Wegner P (2008). The Interactive Nature of Computing, Minds and Machines, 18:1, (17-38), Online publication date: 1-Mar-2008.
  185. ACM
    Lucas J and Jarvis J (2008). Incorporating transformations into jflap for enhanced understanding of automata, ACM SIGCSE Bulletin, 40:1, (14-18), Online publication date: 29-Feb-2008.
  186. ACM
    Polycarpou I, Pasztor A and Adjouadi M (2008). A conceptual approach to teaching induction for computer science, ACM SIGCSE Bulletin, 40:1, (9-13), Online publication date: 29-Feb-2008.
  187. ACM
    Jančar P and Srba J (2008). Undecidability of bisimilarity by defender's forcing, Journal of the ACM, 55:1, (1-26), Online publication date: 1-Feb-2008.
  188. Park E and Park K (2008). An Improved Boolean Circuit for Maximum Matching in a Convex Bipartite Graph, Fundamenta Informaticae, 84:1, (81-97), Online publication date: 1-Jan-2008.
  189. Vadhan S The complexity of zero knowledge Proceedings of the 27th international conference on Foundations of software technology and theoretical computer science, (52-70)
  190. ACM
    Blanco Arbe J, Ortega A and Mártinez-Conde J (2007). Formal languages through web forms and regular expressions, ACM SIGCSE Bulletin, 39:4, (100-104), Online publication date: 1-Dec-2007.
  191. Trevisan L and Vadhan S (2007). Pseudorandomness and Average-Case Complexity Via Uniform Reductions, Computational Complexity, 16:4, (331-364), Online publication date: 1-Dec-2007.
  192. ACM
    Majumdar R and Xu R Directed test generation using symbolic grammars Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering, (134-143)
  193. Hsieh M and Tsai S (2007). On the fairness and complexity of generalized k-in-a-row games, Theoretical Computer Science, 385:1-3, (88-100), Online publication date: 1-Oct-2007.
  194. Belovs A, Rosmanis A and Smotrovs J Multi-letter reversible and quantum finite automata Proceedings of the 11th international conference on Developments in language theory, (60-71)
  195. Brun Y and Medvidovic N An Architectural Style for Solving Computationally Intensive Problems on Large Networks Proceedings of the 2007 International Workshop on Software Engineering for Adaptive and Self-Managing Systems
  196. Ouimet M and Lundqvist K Incorporating Time in the Modeling of Hardware and Software Systems Proceedings of the International Workshop on Modeling in Software Engineering
  197. Brun Y A Discreet, Fault-Tolerant, and Scalable Software Architectural Style for Internet-Sized Networks Companion to the proceedings of the 29th International Conference on Software Engineering, (83-84)
  198. Hayashi S and Tada M (2007). New NP-Complete Problems Associated with Lattices, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E90-A:5, (941-948), Online publication date: 1-May-2007.
  199. Snae C and Pongcharoen P Automatic rule-based expert system for English to Thai transcription Proceedings of the third conference on IASTED International Conference: Advances in Computer Science and Technology, (342-347)
  200. Tran Q (2007). Interactive symbolic software for teaching formal languages, automata and beyond, Journal of Computing Sciences in Colleges, 22:4, (129-136), Online publication date: 1-Apr-2007.
  201. ACM
    Nash A, Bernstein P and Melnik S (2007). Composition of mappings given by embedded dependencies, ACM Transactions on Database Systems, 32:1, (4-es), Online publication date: 1-Mar-2007.
  202. Ilczuk G and Wakulicz-Deja A Data preparation for data mining in medical data sets Transactions on rough sets VI, (83-93)
  203. Mok W, Palvia P and Paper D (2006). On the computability of agent-based workflows, Decision Support Systems, 42:3, (1239-1253), Online publication date: 1-Dec-2006.
  204. ACM
    Gordon M, Thies W and Amarasinghe S (2006). Exploiting coarse-grained task, data, and pipeline parallelism in stream programs, ACM SIGPLAN Notices, 41:11, (151-162), Online publication date: 1-Nov-2006.
  205. ACM
    Gordon M, Thies W and Amarasinghe S Exploiting coarse-grained task, data, and pipeline parallelism in stream programs Proceedings of the 12th international conference on Architectural support for programming languages and operating systems, (151-162)
  206. ACM
    Gordon M, Thies W and Amarasinghe S (2006). Exploiting coarse-grained task, data, and pipeline parallelism in stream programs, ACM SIGARCH Computer Architecture News, 34:5, (151-162), Online publication date: 20-Oct-2006.
  207. ACM
    Gordon M, Thies W and Amarasinghe S (2006). Exploiting coarse-grained task, data, and pipeline parallelism in stream programs, ACM SIGOPS Operating Systems Review, 40:5, (151-162), Online publication date: 20-Oct-2006.
  208. Neary T and Woods D (2006). Small fast universal turing machines, Theoretical Computer Science, 362:1, (171-195), Online publication date: 11-Oct-2006.
  209. Tran Q (2006). Interactive computer algebra software for teaching and helping students to study foundations of computer science, Journal of Computing Sciences in Colleges, 22:1, (131-143), Online publication date: 1-Oct-2006.
  210. ACM
    Bozic V (2006). Application of finite state automata to the bakery algorithm in critical section modeling, ACM SIGCSE Bulletin, 38:3, (362-362), Online publication date: 26-Sep-2006.
  211. ACM
    Schreyer B and Wawrzynski W (2006). Finite automata models for CS problem with binary semaphore, ACM SIGCSE Bulletin, 38:3, (330-330), Online publication date: 26-Sep-2006.
  212. ACM
    Wirth A and Bertolacci M (2006). New algorithms research for first year students, ACM SIGCSE Bulletin, 38:3, (128-132), Online publication date: 26-Sep-2006.
  213. ACM
    Müller P, Wonka P, Haegler S, Ulmer A and Van Gool L Procedural modeling of buildings ACM SIGGRAPH 2006 Papers, (614-623)
  214. ACM
    Müller P, Wonka P, Haegler S, Ulmer A and Van Gool L (2006). Procedural modeling of buildings, ACM Transactions on Graphics, 25:3, (614-623), Online publication date: 1-Jul-2006.
  215. Pashalidis A and Meyer B Linking anonymous transactions Proceedings of the 6th international conference on Privacy Enhancing Technologies, (384-392)
  216. ACM
    Bozic V Application of finite state automata to the bakery algorithm in critical section modeling Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education, (362-362)
  217. ACM
    Schreyer B and Wawrzynski W Finite automata models for CS problem with binary semaphore Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education, (330-330)
  218. ACM
    Wirth A and Bertolacci M New algorithms research for first year students Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education, (128-132)
  219. ACM
    Keshavarzian A, Lee H and Venkatraman L Wakeup scheduling in wireless sensor networks Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing, (322-333)
  220. Chor B and Tuller T Biological networks Proceedings of the 10th annual international conference on Research in Computational Molecular Biology, (30-44)
  221. ACM
    Purewal T Revisiting a limit on efficient quantum computation Proceedings of the 44th annual Southeast regional conference, (239-243)
  222. Rosenberg A State Theoretical Computer Science, (375-398)
  223. Fisher D, Lam F, Shui W and Wong R Dynamic labeling schemes for ordered XML based on type information Proceedings of the 17th Australasian Database Conference - Volume 49, (59-68)
  224. ACM
    Verma R (2005). A visual and interactive automata theory course emphasizing breadth of automata, ACM SIGCSE Bulletin, 37:3, (325-329), Online publication date: 1-Sep-2005.
  225. Palem K (2005). Energy Aware Computing through Probabilistic Switching, IEEE Transactions on Computers, 54:9, (1123-1137), Online publication date: 1-Sep-2005.
  226. Chiang J and Yu H (2005). Literature Extraction of Protein Functions Using Sentence Pattern Mining, IEEE Transactions on Knowledge and Data Engineering, 17:8, (1088-1098), Online publication date: 1-Aug-2005.
  227. ACM
    Verma R A visual and interactive automata theory course emphasizing breadth of automata Proceedings of the 10th annual SIGCSE conference on Innovation and technology in computer science education, (325-329)
  228. ACM
    Nash A, Bernstein P and Melnik S Composition of mappings given by embedded dependencies Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (172-183)
  229. Elder M (2005). A context-free and a 1-counter geodesic language for a Baumslag-Solitar group, Theoretical Computer Science, 339:2, (344-371), Online publication date: 12-Jun-2005.
  230. Goldin D and Wegner P The church-turing thesis Proceedings of the First international conference on Computability in Europe: new Computational Paradigms, (152-168)
  231. ACM
    Francel M and John D Constructing an even grammar from a 2-element sample Proceedings of the 43rd annual Southeast regional conference - Volume 1, (69-74)
  232. Jirásková G (2005). State complexity of some operations on binary regular languages, Theoretical Computer Science, 330:2, (287-298), Online publication date: 2-Feb-2005.
  233. Hawkins W and Healy C (2004). Introducing practical applications into a computational theory class, Journal of Computing Sciences in Colleges, 20:2, (219-225), Online publication date: 1-Dec-2004.
  234. van Zijl L (2004). On binary ⊕-NFAs and succinct descriptions of regular languages, Theoretical Computer Science, 328:1-2, (161-170), Online publication date: 29-Nov-2004.
  235. ACM
    van Zijl L and Raitt L Implementation experience with collision avoidance in signing avatars Proceedings of the 3rd international conference on Computer graphics, virtual reality, visualisation and interaction in Africa, (55-59)
  236. Zhao X, Dai Y and Feng D A generalized method for constructing and proving zero-knowledge watermark proof systems Proceedings of the Third international conference on Digital Watermarking, (204-217)
  237. Van Zijl L and Müller G Minimization of unary symmetric difference NFAs Proceedings of the 2004 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries, (125-134)
  238. Hayward R and Shamir R (2004). A note on tolerance graph recognition, Discrete Applied Mathematics, 143:1-3, (307-311), Online publication date: 30-Sep-2004.
  239. Colmerauer A On the complexity of universal programs Proceedings of the 4th international conference on Machines, Computations, and Universality, (18-35)
  240. ACM
    Paxton J and Heredia K (2004). Providing curricular assistance to a third world university computer science department, ACM SIGCSE Bulletin, 36:3, (199-202), Online publication date: 1-Sep-2004.
  241. Alexeev B (2004). Minimal DFA for testing divisibility, Journal of Computer and System Sciences, 69:2, (235-243), Online publication date: 1-Sep-2004.
  242. Jirásek J, Jirásková G and Szabari A State complexity of concatenation and complementation of regular languages Proceedings of the 9th international conference on Implementation and Application of Automata, (178-189)
  243. ACM
    Paxton J and Heredia K Providing curricular assistance to a third world university computer science department Proceedings of the 9th annual SIGCSE conference on Innovation and technology in computer science education, (199-202)
  244. Hsieh S (2004). An efficient parallel strategy for the two-fixed-endpoint Hamiltonian path problem on distance-hereditary graphs, Journal of Parallel and Distributed Computing, 64:5, (662-685), Online publication date: 1-May-2004.
  245. ACM
    Tosic P A perspective on the future of massively parallel computing Proceedings of the 1st conference on Computing frontiers, (488-502)
  246. ACM
    Francel M and John D An algorithm for constructing an even grammar from a language sample Proceedings of the 42nd annual Southeast regional conference, (240-245)
  247. Koch C (2004). Query rewriting with symmetric constraints, AI Communications, 17:2, (41-55), Online publication date: 1-Apr-2004.
  248. Durgin N, Lincoln P, Mitchell J and Scedrov A (2004). Multiset rewriting and the complexity of bounded security protocols, Journal of Computer Security, 12:2, (247-311), Online publication date: 1-Apr-2004.
  249. van Zijl L Succinct descriptions of regular languages with binary ⊕-NFAs Proceedings of the 8th international conference on Implementation and application of automata, (72-82)
  250. Pak I (2003). Tile invariants, Theoretical Computer Science, 303:2-3, (303-331), Online publication date: 15-Jul-2003.
  251. Kuncak V and Rinard M Existential heap abstraction entailment is undecidable Proceedings of the 10th international conference on Static analysis, (418-438)
  252. ACM
    Grahne G and Thomo A Query containment and rewriting using views for regular path queries under constraints Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (111-122)
  253. Dui D and Emmerich W Compatibility of XML language versions Proceedings of the 2001 ICSE Workshops on SCM 2001, and SCM 2003 conference on Software configuration management, (148-162)
  254. Alhazov A, Martín-Vide C and Pan L (2003). Solving a PSPACE-complete problem by recognizing P systems with restricted active membranes, Fundamenta Informaticae, 58:2, (67-77), Online publication date: 1-Apr-2003.
  255. Alhazov A, Martín-Vide C and Pan L (2003). Solving a PSPACE-Complete Problem by Recognizing P Systems with Restricted Active Membranes, Fundamenta Informaticae, 58:2, (67-77), Online publication date: 1-Apr-2003.
  256. Grahne G and Thomo A (2003). Algebraic rewritings for optimizing regular path queries, Theoretical Computer Science, 296:3, (453-471), Online publication date: 14-Mar-2003.
  257. Gotts N, Polhill J and Law A (2003). Agent-Based Simulation in the Study of Social Dilemmas, Artificial Intelligence Review, 19:1, (3-92), Online publication date: 1-Mar-2003.
  258. van Zijl L Nondeterminism and succinctly representable regular languages Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology, (212-223)
  259. Hammel L and Patel J Searching on the secondary structure of protein sequences Proceedings of the 28th international conference on Very Large Data Bases, (634-645)
  260. ACM
    McDonald J (2002). Interactive Pushdown Automata Animation, ACM SIGCSE Bulletin, 34:1, (376-380), Online publication date: 1-Mar-2002.
  261. ACM
    McDonald J Interactive Pushdown Automata Animation Proceedings of the 33rd SIGCSE technical symposium on Computer science education, (376-380)
  262. Bergman C and Slutzki G (2002). Computational complexity of some problems involving congruences on algebras, Theoretical Computer Science, 270:1-2, (591-608), Online publication date: 6-Jan-2002.
  263. Ravi S and Jha N Fast Test Generation for Circuits with RTL and Gate-Level Views Proceedings of the 2001 IEEE International Test Conference
  264. Pargellis A (2000). Digital life behavior in the amoeba world, Artificial Life, 7:1, (63-75), Online publication date: 1-Dec-2000.
  265. Ross B (2000). Probabilistic Pattern Matching and the Evolution of Stochastic Regular Expressions, Applied Intelligence, 13:3, (285-300), Online publication date: 29-Nov-2000.
  266. Ravi S, Lakshminarayana G and Jha N Reducing Test Application Time in High-Level Test Generation Proceedings of the 2000 IEEE International Test Conference
  267. Bergman C and Slutzki G Computational Complexity of Some Problems Involving Congruences on Algebras Proceedings of the 15th Annual IEEE Symposium on Logic in Computer Science
  268. ACM
    Volpano D and Smith G Verifying secrets and relative secrecy Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (268-276)
  269. Ravi S, Lakshminarayana G and Jha N A framework for testing core-based systems-on-a-chip Proceedings of the 1999 IEEE/ACM international conference on Computer-aided design, (385-390)
  270. Cervesato I, Durgin N, Lincoln P, Mitchell J and Scedrov A A Meta-Notation for Protocol Analysis Proceedings of the 12th IEEE workshop on Computer Security Foundations
  271. ACM
    Gupta S (1998). Book Review: Theories of Computability by Nicholas Pippenger (Cambridge University Press 1997), ACM SIGACT News, 29:4, (5-10), Online publication date: 1-Dec-1998.
  272. Ravi S, Lakshminarayana G and Jha N TAO Proceedings of the 1998 IEEE International Test Conference, (331-340)
Contributors
  • Massachusetts Institute of Technology

Recommendations