期刊


ISSN0304-3975
刊名Theoretical Computer Science
参考译名理论计算机科学
收藏年代2002~2024



全部

2002 2003 2004 2005 2006 2007
2008 2009 2010 2011 2012 2013
2014 2015 2016 2017 2018 2019
2020 2021 2022 2023 2024

2016, vol.609, no.Pt.1 2016, vol.609, no.Pt.2 2016, vol.609, no.Pt.3 2016, vol.610, no.Pt.A 2016, vol.610, no.Pt.B 2016, vol.611
2016, vol.612 2016, vol.613 2016, vol.614 2016, vol.615 2016, vol.616 2016, vol.617
2016, vol.618 2016, vol.619 2016, vol.620 2016, vol.621 2016, vol.622 2016, vol.623
2016, vol.624 2016, vol.625 2016, vol.626 2016, vol.627 2016, vol.628 2016, vol.629
2016, vol.630 2016, vol.631 2016, vol.632 2016, vol.633 2016, vol.634 2016, vol.635
2016, vol.636 2016, vol.637 2016, vol.638 2016, vol.639 2016, vol.640 2016, vol.641
2016, vol.642 2016, vol.643 2016, vol.644 2016, vol.645 2016, vol.646 2016, vol.647
2016, vol.648 2016, vol.649 2016, vol.650 2016, vol.651 2016, vol.652 2016, vol.653
2016, vol.654 2016, vol.655, no.Pt.A 2016, vol.655, no.Pt.B 2016, vol.656, no.Pt.A 2016, vol.656, no.Pt.B

题名作者出版年年卷期
Complexity and monotonicity results for domination gamesKreutzer, Stephan; Ordyniak, Sebastian20162016, vol.628
On a conjecture about Parikh matricesTeh, Wen Chean; Atanasiu, Adrian20162016, vol.628
Comparison-based interactive collaborative filteringCarmel, Yuval; Patt-Shamir, Boaz20162016, vol.628
PULL and PUSHPULL are PSPACE-completePereira, Andre G.; Ritt, Marcus; Buriol, Luciana S.20162016, vol.628
Simple dynamics on graphsGadouleau, Maximilien; Richard, Adrien20162016, vol.628
Relations between robustness and RKA security under public-key encryptionCui, Hui; Mu, Yi; Au, Man Ho20162016, vol.628
The 2-good-neighbor diagnosability of Cayley graphs generated by transposition trees under the PMC model and MM* modelWang, Mujiangshan; Lin, Yuqing; Wang, Shiying20162016, vol.628
On the optimality of Bellman-Ford-Moore shortest path algorithmJukna, Stasys; Schnitger, Georg20162016, vol.628
On finding rainbow and colorful pathsKowalik, Lukasz; Lauri, Juho20162016, vol.628