Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "different assumption"
@article{DBLP:journals/corr/abs-2402-06465, author = {Eliad Tsfadia}, title = {On Differentially Private Subspace Estimation Without Distributional Assumptions}, journal = {CoRR}, volume = {abs/2402.06465}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.06465}, doi = {10.48550/ARXIV.2402.06465}, eprinttype = {arXiv}, eprint = {2402.06465}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-06465.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/candie/IssaaPT23, author = {Samer Ben Issaa and Raymond A. Patterson and Yiliu Tu}, title = {Solving resource-constrained project scheduling problems under different activity assumptions}, journal = {Comput. Ind. Eng.}, volume = {180}, pages = {109170}, year = {2023}, url = {https://doi.org/10.1016/j.cie.2023.109170}, doi = {10.1016/J.CIE.2023.109170}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/candie/IssaaPT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/meditcom/AlNahhasNKC23, author = {Bayan Al{-}Nahhas and Qurrat{-}Ul{-}Ain Nadeem and Aryan Kaushik and Anas Chaaban}, title = {Reconfigurable Intelligent Surfaces Assisted Communication Under Different {CSI} Assumptions}, booktitle = {{IEEE} International Mediterranean Conference on Communications and Networking, MeditCom 2023, Dubrovnik, Croatia, September 4-7, 2023}, pages = {18--23}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/MeditCom58224.2023.10266636}, doi = {10.1109/MEDITCOM58224.2023.10266636}, timestamp = {Tue, 17 Oct 2023 15:36:58 +0200}, biburl = {https://dblp.org/rec/conf/meditcom/AlNahhasNKC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-00104, author = {Badih Ghazi and Rahul Ilango and Pritish Kamath and Ravi Kumar and Pasin Manurangsi}, title = {Separating Computational and Statistical Differential Privacy (Under Plausible Assumptions)}, journal = {CoRR}, volume = {abs/2301.00104}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.00104}, doi = {10.48550/ARXIV.2301.00104}, eprinttype = {arXiv}, eprint = {2301.00104}, timestamp = {Tue, 10 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-00104.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/MainR22, author = {James C. A. Main and Mickael Randour}, editor = {Bartek Klin and Slawomir Lasota and Anca Muscholl}, title = {Different Strokes in Randomised Strategies: Revisiting Kuhn's Theorem Under Finite-Memory Assumptions}, booktitle = {33rd International Conference on Concurrency Theory, {CONCUR} 2022, September 12-16, 2022, Warsaw, Poland}, series = {LIPIcs}, volume = {243}, pages = {22:1--22:18}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.CONCUR.2022.22}, doi = {10.4230/LIPICS.CONCUR.2022.22}, timestamp = {Mon, 26 Sep 2022 16:25:34 +0200}, biburl = {https://dblp.org/rec/conf/concur/MainR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-10825, author = {James C. A. Main and Mickael Randour}, title = {Different strokes in randomised strategies: Revisiting Kuhn's theorem under finite-memory assumptions}, journal = {CoRR}, volume = {abs/2201.10825}, year = {2022}, url = {https://arxiv.org/abs/2201.10825}, eprinttype = {arXiv}, eprint = {2201.10825}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-10825.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuLJWM22, author = {Zheng Xu and Yongqiang Li and Lin Jiao and Mingsheng Wang and Willi Meier}, title = {Do {NOT} Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in {ARX} Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {135}, year = {2022}, url = {https://eprint.iacr.org/2022/135}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/XuLJWM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eor/MehdiloozadP21, author = {Mahmood Mehdiloozad and Victor V. Podinovski}, title = {Strong, weak and Farrell efficient frontiers of technologies satisfying different production assumptions}, journal = {Eur. J. Oper. Res.}, volume = {294}, number = {1}, pages = {295--311}, year = {2021}, url = {https://doi.org/10.1016/j.ejor.2021.01.022}, doi = {10.1016/J.EJOR.2021.01.022}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eor/MehdiloozadP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvcg/ZhangZW21, author = {Aijia Zhang and Yan Zhao and Shigang Wang}, title = {An Improved Augmented-Reality Framework for Differential Rendering Beyond the Lambertian-World Assumption}, journal = {{IEEE} Trans. Vis. Comput. Graph.}, volume = {27}, number = {12}, pages = {4374--4386}, year = {2021}, url = {https://doi.org/10.1109/TVCG.2020.3004195}, doi = {10.1109/TVCG.2020.3004195}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvcg/ZhangZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-12959, author = {Moshe Shechner}, title = {Differentially Private Algorithms for Clustering with Stability Assumptions}, journal = {CoRR}, volume = {abs/2106.12959}, year = {2021}, url = {https://arxiv.org/abs/2106.12959}, eprinttype = {arXiv}, eprint = {2106.12959}, timestamp = {Wed, 30 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-12959.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/i-jep/SantosXSS20, author = {Leandro Brito Santos and Paulo Henrique Farias Xavier and Jos{\'{e}} Vicente Cardoso Santos and Renelson Ribeiro Sampaio}, title = {Teaching of Ordinary Differential Equations Using the Assumptions of the {PBL} Method}, journal = {Int. J. Eng. Pedagog.}, volume = {10}, number = {3}, pages = {7--20}, year = {2020}, url = {https://doi.org/10.3991/ijep.v10i3.12015}, doi = {10.3991/IJEP.V10I3.12015}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/i-jep/SantosXSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/OkumuraOS20, author = {Naomi Okumura and Kazuhiro Ogata and Yoichi Shinoda}, title = {Formal analysis of {RFC} 8120 authentication protocol for {HTTP} under different assumptions}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102529}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102529}, doi = {10.1016/J.JISA.2020.102529}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/OkumuraOS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcam/LiuLY19, author = {Fang Liu and Zongqi Liang and Yubin Yan}, title = {Optimal convergence rates for semidiscrete finite element approximations of linear space-fractional partial differential equations under minimal regularity assumptions}, journal = {J. Comput. Appl. Math.}, volume = {352}, pages = {409--425}, year = {2019}, url = {https://doi.org/10.1016/j.cam.2018.12.004}, doi = {10.1016/J.CAM.2018.12.004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcam/LiuLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jors/HenriquesN19, author = {Carla Oliveira Henriques and Maria Elisabete Duarte Neves}, title = {A multiobjective interval portfolio framework for supporting investor's preferences under different risk assumptions}, journal = {J. Oper. Res. Soc.}, volume = {70}, number = {10}, pages = {1639--1661}, year = {2019}, url = {https://doi.org/10.1080/01605682.2019.1571004}, doi = {10.1080/01605682.2019.1571004}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jors/HenriquesN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdsci/JiangF19, author = {Weimin Jiang and Jin Fan}, editor = {Jing He and Philip S. Yu and Yong Shi and Xingsen Li and Zhijun Xie and Guangyan Huang and Jie Cao and Fu Xiao}, title = {Study on Production Possibility Frontier Under Different Production Function Assumptions}, booktitle = {Data Science - 6th International Conference, {ICDS} 2019, Ningbo, China, May 15-20, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1179}, pages = {121--131}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-2810-1\_13}, doi = {10.1007/978-981-15-2810-1\_13}, timestamp = {Fri, 04 Feb 2022 08:01:41 +0100}, biburl = {https://dblp.org/rec/conf/icdsci/JiangF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GeraultB19, author = {David G{\'{e}}rault and Ioana Boureanu}, title = {Distance bounding under different assumptions: opinion}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {245--248}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3319729}, doi = {10.1145/3317549.3319729}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/GeraultB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/anor/KerstensW18, author = {Kristiaan Kerstens and Ignace Van de Woestyne}, title = {Enumeration algorithms for {FDH} directional distance functions under different returns to scale assumptions}, journal = {Ann. Oper. Res.}, volume = {271}, number = {2}, pages = {1067--1078}, year = {2018}, url = {https://doi.org/10.1007/s10479-018-2791-5}, doi = {10.1007/S10479-018-2791-5}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/anor/KerstensW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qre/ChaF18, author = {Ji Hwan Cha and Maxim Finkelstein}, title = {On preventive maintenance under different assumptions on the failure/repair processes}, journal = {Qual. Reliab. Eng. Int.}, volume = {34}, number = {1}, pages = {66--77}, year = {2018}, url = {https://doi.org/10.1002/qre.2237}, doi = {10.1002/QRE.2237}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qre/ChaF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/FisusiGM17, author = {Abimbola Fisusi and David Grace and Paul D. Mitchell}, title = {Energy saving in a 5G separation architecture under different power model assumptions}, journal = {Comput. Commun.}, volume = {105}, pages = {89--104}, year = {2017}, url = {https://doi.org/10.1016/j.comcom.2017.01.010}, doi = {10.1016/J.COMCOM.2017.01.010}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/FisusiGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamjo/Salzo17, author = {Saverio Salzo}, title = {The Variable Metric Forward-Backward Splitting Algorithm Under Mild Differentiability Assumptions}, journal = {{SIAM} J. Optim.}, volume = {27}, number = {4}, pages = {2153--2181}, year = {2017}, url = {https://doi.org/10.1137/16M1073741}, doi = {10.1137/16M1073741}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamjo/Salzo17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/RussellKLS17, author = {Chris Russell and Matt J. Kusner and Joshua R. Loftus and Ricardo Silva}, editor = {Isabelle Guyon and Ulrike von Luxburg and Samy Bengio and Hanna M. Wallach and Rob Fergus and S. V. N. Vishwanathan and Roman Garnett}, title = {When Worlds Collide: Integrating Different Counterfactual Assumptions in Fairness}, booktitle = {Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4-9, 2017, Long Beach, CA, {USA}}, pages = {6414--6423}, year = {2017}, url = {https://proceedings.neurips.cc/paper/2017/hash/1271a7029c9df08643b631b02cf9e116-Abstract.html}, timestamp = {Thu, 21 Jan 2021 13:58:27 +0100}, biburl = {https://dblp.org/rec/conf/nips/RussellKLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssdbm/NaghizadeBKT17, author = {Elham Naghizade and James Bailey and Lars Kulik and Egemen Tanin}, title = {Challenges of Differentially Private Release of Data Under an Open-world Assumption}, booktitle = {Proceedings of the 29th International Conference on Scientific and Statistical Database Management, Chicago, IL, USA, June 27-29, 2017}, pages = {27:1--27:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3085504.3085531}, doi = {10.1145/3085504.3085531}, timestamp = {Tue, 16 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssdbm/NaghizadeBKT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecra/DangHL15, author = {Chuangyin Dang and Qiying Hu and John Liu}, title = {Bidding strategies in online auctions with different ending rules and value assumptions}, journal = {Electron. Commer. Res. Appl.}, volume = {14}, number = {2}, pages = {104--111}, year = {2015}, url = {https://doi.org/10.1016/j.elerap.2014.12.002}, doi = {10.1016/J.ELERAP.2014.12.002}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ecra/DangHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamco/Sturm15, author = {Kevin Sturm}, title = {Minimax Lagrangian Approach to the Differentiability of Nonlinear {PDE} Constrained Shape Functions Without Saddle Point Assumption}, journal = {{SIAM} J. Control. Optim.}, volume = {53}, number = {4}, pages = {2017--2039}, year = {2015}, url = {https://doi.org/10.1137/130930807}, doi = {10.1137/130930807}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamco/Sturm15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/SarkarBM15, author = {Santanu Sarkar and Subhadeep Banik and Subhamoy Maitra}, title = {Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions}, journal = {{IEEE} Trans. Computers}, volume = {64}, number = {6}, pages = {1647--1657}, year = {2015}, url = {https://doi.org/10.1109/TC.2014.2339854}, doi = {10.1109/TC.2014.2339854}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/SarkarBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeyCAM14a, author = {Prakash Dey and Abhishek Chakraborty and Avishek Adhikari and Debdeep Mukhopadhyay}, title = {Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {654}, year = {2014}, url = {http://eprint.iacr.org/2014/654}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DeyCAM14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijaom/ShenHQ13, author = {Lixin Shen and Jianjun He and Shuang Qiao}, title = {A probabilistic kernel approach for solving the multi-instance learning problems with different assumptions}, journal = {Int. J. Adv. Oper. Manag.}, volume = {5}, number = {3}, pages = {282--298}, year = {2013}, url = {https://doi.org/10.1504/IJAOM.2013.055881}, doi = {10.1504/IJAOM.2013.055881}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijaom/ShenHQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChabanneCP13, author = {Herv{\'{e}} Chabanne and G{\'{e}}rard D. Cohen and Alain Patey}, editor = {Pierangela Samarati}, title = {Public-key Cryptography from Different Assumptions - {A} Multi-bit Version}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {561--567}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223216/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ChabanneCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SarkarBM13, author = {Santanu Sarkar and Subhadeep Banik and Subhamoy Maitra}, title = {Differential Fault Attack against Grain family with very few faults and minimal assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {494}, year = {2013}, url = {http://eprint.iacr.org/2013/494}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SarkarBM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jam/WangM12a, author = {Lianwen Wang and Rhonda McKee}, title = {Nonoscillatory Solutions of Second-Order Differential Equations without Monotonicity Assumptions}, journal = {J. Appl. Math.}, volume = {2012}, pages = {313725:1--313725:14}, year = {2012}, url = {https://doi.org/10.1155/2012/313725}, doi = {10.1155/2012/313725}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jam/WangM12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BanikMS12, author = {Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar}, editor = {Steven D. Galbraith and Mridul Nandi}, title = {A Differential Fault Attack on the Grain Family under Reasonable Assumptions}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7668}, pages = {191--208}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34931-7\_12}, doi = {10.1007/978-3-642-34931-7\_12}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BanikMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/MinervinidF12, author = {Pasquale Minervini and Claudia d'Amato and Nicola Fanizzi}, editor = {Sascha Ossowski and Paola Lecca}, title = {Learning probabilistic Description logic concepts: under different Assumptions on missing knowledge}, booktitle = {Proceedings of the {ACM} Symposium on Applied Computing, {SAC} 2012, Riva, Trento, Italy, March 26-30, 2012}, pages = {378--383}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2245276.2245349}, doi = {10.1145/2245276.2245349}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/MinervinidF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/Lin11a, author = {Qian Lin}, title = {Backward doubly stochastic differential equations with weak assumptions on the coefficients}, journal = {Appl. Math. Comput.}, volume = {217}, number = {22}, pages = {9322--9333}, year = {2011}, url = {https://doi.org/10.1016/j.amc.2011.04.016}, doi = {10.1016/J.AMC.2011.04.016}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/Lin11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/semweb/MinervinidF11, author = {Pasquale Minervini and Claudia d'Amato and Nicola Fanizzi}, editor = {Fernando Bobillo and Rommel N. Carvalho and Paulo Cesar G. da Costa and Claudia d'Amato and Nicola Fanizzi and Kathryn B. Laskey and Thomas Lukasiewicz and Trevor Martin and Matthias Nickles}, title = {Learning Terminological Naive Bayesian Classifiers under Different Assumptions on Missing Knowledge}, booktitle = {Proceedings of the 7th International Workshop on Uncertainty Reasoning for the Semantic Web {(URSW} 2011), Bonn, Germany, October 23, 2011}, series = {{CEUR} Workshop Proceedings}, volume = {778}, pages = {63--74}, publisher = {CEUR-WS.org}, year = {2011}, url = {https://ceur-ws.org/Vol-778/paper6.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:05 +0100}, biburl = {https://dblp.org/rec/conf/semweb/MinervinidF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cssc/ManssonSK10, author = {Kristofer M{\aa}nsson and Ghazi Shukur and B. M. Golam Kibria}, title = {A Simulation Study of Some Ridge Regression Estimators under Different Distributional Assumptions}, journal = {Commun. Stat. Simul. Comput.}, volume = {39}, number = {8}, pages = {1639--1670}, year = {2010}, url = {https://doi.org/10.1080/03610918.2010.508862}, doi = {10.1080/03610918.2010.508862}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cssc/ManssonSK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/ApplebaumBW10, author = {Benny Applebaum and Boaz Barak and Avi Wigderson}, editor = {Leonard J. Schulman}, title = {Public-key cryptography from different assumptions}, booktitle = {Proceedings of the 42nd {ACM} Symposium on Theory of Computing, {STOC} 2010, Cambridge, Massachusetts, USA, 5-8 June 2010}, pages = {171--180}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1806689.1806715}, doi = {10.1145/1806689.1806715}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/ApplebaumBW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csda/PoundsR09, author = {Stanley Pounds and Shesh N. Rai}, title = {Assumption adequacy averaging as a concept for developing more robust methods for differential gene expression analysis}, journal = {Comput. Stat. Data Anal.}, volume = {53}, number = {5}, pages = {1604--1612}, year = {2009}, url = {https://doi.org/10.1016/j.csda.2008.05.010}, doi = {10.1016/J.CSDA.2008.05.010}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csda/PoundsR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jet/Rincon-ZapateroS09, author = {Juan Pablo Rinc{\'{o}}n{-}Zapatero and Manuel S. Santos}, title = {Differentiability of the value function without interiority assumptions}, journal = {J. Econ. Theory}, volume = {144}, number = {5}, pages = {1948--1964}, year = {2009}, url = {https://doi.org/10.1016/j.jet.2009.02.006}, doi = {10.1016/J.JET.2009.02.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jet/Rincon-ZapateroS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/FuchsBP09, author = {Ludwig Fuchs and Christian Broser and G{\"{u}}nther Pernul}, title = {Different Approaches to In-House Identity Management - Justification of an Assumption}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {122--129}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.154}, doi = {10.1109/ARES.2009.154}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/FuchsBP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangZ09, author = {Fengjiao Wang and Yuqing Zhang}, editor = {Feng Bao and Moti Yung and Dongdai Lin and Jiwu Jing}, title = {Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption}, booktitle = {Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6151}, pages = {124--133}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-16342-5\_9}, doi = {10.1007/978-3-642-16342-5\_9}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakW08, author = {Boaz Barak and Avi Wigderson}, title = {Public Key Cryptography from Different Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {335}, year = {2008}, url = {http://eprint.iacr.org/2008/335}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/OwenDC06, author = {David Owen and Dejan Desovski and Bojan Cukic}, title = {Effectively Combining Software Verification Strategies: Understanding Different Assumptions}, booktitle = {17th International Symposium on Software Reliability Engineering {(ISSRE} 2006), 7-10 November 2006, Raleigh, North Carolina, {USA}}, pages = {321--330}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ISSRE.2006.24}, doi = {10.1109/ISSRE.2006.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/OwenDC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/Backes05, author = {Michael Backes}, title = {Unifying simulatability definitions in cryptographic systems under different timing assumptions}, journal = {J. Log. Algebraic Methods Program.}, volume = {64}, number = {2}, pages = {157--188}, year = {2005}, url = {https://doi.org/10.1016/j.jlap.2004.09.002}, doi = {10.1016/J.JLAP.2004.09.002}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/Backes05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cce/HangosST04, author = {Katalin M. Hangos and G{\'{a}}bor Szederk{\'{e}}nyi and Zsolt Tuza}, title = {The effect of model simplification assumptions on the differential index of lumped process models}, journal = {Comput. Chem. Eng.}, volume = {28}, number = {1-2}, pages = {129--137}, year = {2004}, url = {https://doi.org/10.1016/S0098-1354(03)00166-2}, doi = {10.1016/S0098-1354(03)00166-2}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cce/HangosST04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/Backes03, author = {Michael Backes}, editor = {Roberto M. Amadio and Denis Lugiez}, title = {Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions}, booktitle = {{CONCUR} 2003 - Concurrency Theory, 14th International Conference, Marseille, France, September 3-5, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2761}, pages = {346--360}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45187-7\_23}, doi = {10.1007/978-3-540-45187-7\_23}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/concur/Backes03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Backes03, author = {Michael Backes}, title = {Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {114}, year = {2003}, url = {http://eprint.iacr.org/2003/114}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Backes03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jet/SafraS02, author = {Zvi Safra and Uzi Segal}, title = {On the Economic Meaning of Machina's Fr{\'{e}}chet Differentiability Assumption}, journal = {J. Econ. Theory}, volume = {104}, number = {2}, pages = {450--461}, year = {2002}, url = {https://doi.org/10.1006/jeth.2002.2926}, doi = {10.1006/JETH.2002.2926}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jet/SafraS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/etfa/BauerKP01, author = {G{\"{u}}nther Bauer and Hermann Kopetz and Peter P. Puschner}, title = {Assumption coverage under different failure modes in the time-triggered architecture}, booktitle = {Proceedings of 8th {IEEE} International Conference on Emerging Technologies and Factory Automation, {ETFA} 2001, October 15-18, 2001, Antibes/Juan les Pins, France - Volume 1}, pages = {333--341}, publisher = {{IEEE}}, year = {2001}, url = {https://doi.org/10.1109/ETFA.2001.996386}, doi = {10.1109/ETFA.2001.996386}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/etfa/BauerKP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamco/Ye00a, author = {Jane J. Ye}, title = {Multiplier Rules Under Mixed Assumptions of Differentiability and Lipschitz Continuity}, journal = {{SIAM} J. Control. Optim.}, volume = {39}, number = {5}, pages = {1441--1460}, year = {2000}, url = {https://doi.org/10.1137/S0363012999358476}, doi = {10.1137/S0363012999358476}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamco/Ye00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interspeech/LiDI00, author = {Gongjun Li and Na Dong and Toshiro Ishikawa}, title = {Combination of different n-grams based on their different assumptions}, booktitle = {Sixth International Conference on Spoken Language Processing, {ICSLP} 2000 / {INTERSPEECH} 2000, Beijing, China, October 16-20, 2000}, pages = {358--361}, publisher = {{ISCA}}, year = {2000}, url = {https://doi.org/10.21437/ICSLP.2000-550}, doi = {10.21437/ICSLP.2000-550}, timestamp = {Thu, 22 Jun 2023 16:42:19 +0200}, biburl = {https://dblp.org/rec/conf/interspeech/LiDI00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/EleftheriouM99, author = {Maria Eleftheriou and Marios Mavronicolas}, editor = {Prasad Jayanti}, title = {Linearizability in the Presence of Drifting Clocks and Under Different Delay Assumptions}, booktitle = {Distributed Computing, 13th International Symposium, Bratislava, Slovak Republic, September 27-29, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1693}, pages = {327--341}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48169-9\_23}, doi = {10.1007/3-540-48169-9\_23}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wdag/EleftheriouM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/AttiyaHR96, author = {Hagit Attiya and Amir Herzberg and Sergio Rajsbaum}, title = {Optimal Clock Synchronization under Different Delay Assumptions}, journal = {{SIAM} J. Comput.}, volume = {25}, number = {2}, pages = {369--389}, year = {1996}, url = {https://doi.org/10.1137/S0097539794266328}, doi = {10.1137/S0097539794266328}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/AttiyaHR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/Higueras95, author = {Inmaculada Higueras}, title = {On Simplifying Assumptions of Runge-Kutta Methods for Index 2 Differential Algebraic Problems}, journal = {Computing}, volume = {54}, number = {2}, pages = {185--190}, year = {1995}, url = {https://doi.org/10.1007/BF02238131}, doi = {10.1007/BF02238131}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/Higueras95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kgc/Benevides93, author = {Mario R. F. Benevides}, editor = {Georg Gottlob and Alexander Leitsch and Daniele Mundici}, title = {Differentiating Assumptions from Extra-Logical Axioms in Natural Deduction}, booktitle = {Computational Logic and Proof Theory, Third Kurt G{\"{o}}del Colloquium, KGC'93, Brno, Czech Republic, August 24-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {713}, pages = {120--131}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/BFb0022560}, doi = {10.1007/BFB0022560}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kgc/Benevides93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/AttiyaHR92, author = {Hagit Attiya and Amir Herzberg and Sergio Rajsbaum}, editor = {Jim Anderson and Sam Toueg}, title = {Optimal Clock Synchronization under Different Delay Assumptions (Preliminary Version)}, booktitle = {Proceedings of the Twelth Annual {ACM} Symposium on Principles of Distributed Computing, Ithaca, New York, USA, August 15-18, 1993}, pages = {109--120}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/164051.164067}, doi = {10.1145/164051.164067}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/AttiyaHR92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Langdon68, author = {Glen G. Langdon Jr.}, title = {Analysis of Asynchronous Circuits Under Different Delay Assumptions}, journal = {{IEEE} Trans. Computers}, volume = {17}, number = {12}, pages = {1131--1143}, year = {1968}, url = {https://doi.org/10.1109/TC.1968.226879}, doi = {10.1109/TC.1968.226879}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Langdon68.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.