长垣产业园区科技文献服务平台

期刊


ISSN0304-3975
刊名Theoretical Computer Science
参考译名理论计算机科学
收藏年代2002~2024



全部

2002 2003 2004 2005 2006 2007
2008 2009 2010 2011 2012 2013
2014 2015 2016 2017 2018 2019
2020 2021 2022 2023 2024

2009, vol.410, no.1 2009, vol.410, no.11 2009, vol.410, no.12-13 2009, vol.410, no.14 2009, vol.410, no.15 2009, vol.410, no.16
2009, vol.410, no.17 2009, vol.410, no.18 2009, vol.410, no.19 2009, vol.410, no.20 2009, vol.410, no.21/23 2009, vol.410, no.2-3
2009, vol.410, no.24/25 2009, vol.410, no.26 2009, vol.410, no.27/29 2009, vol.410, no.30/32 2009, vol.410, no.33/34 2009, vol.410, no.35
2009, vol.410, no.36 2009, vol.410, no.37 2009, vol.410, no.38/40 2009, vol.410, no.41 2009, vol.410, no.42 2009, vol.410, no.43
2009, vol.410, no.44 2009, vol.410, no.45 2009, vol.410, no.4-5 2009, vol.410, no.46 2009, vol.410, no.47/49 2009, vol.410, no.50
2009, vol.410, no.51 2009, vol.410, no.52 2009, vol.410, no.6-7 2009, vol.410, no.8-10

题名作者出版年年卷期
Robust random number generation for peer-to-peer systemsBaruch Awerbuch; Christian Scheideler20092009, vol.410, no.6-7
Hop chains: Secure routing and the establishment of distinct identitiesRida A. Bazzi; Young-ri Choi; Mohamed G. Gouda20092009, vol.410, no.6-7
Gathering few fat mobile robots in the planeJurek Czyzowicz; Leszek Gasieniec; Andrzej Pelc20092009, vol.410, no.6-7
Towards a real-time distributed computing modelHeinrich Moser20092009, vol.410, no.6-7
Safe termination detection in an asynchronous distributed system when processes may crash and recoverNeeraj Mittal; Kuppahalli L. Phaneesh; Felix C. Freiling20092009, vol.410, no.6-7
Empire of colonies: Self-stabilizing and self-organizing distributed algorithmShlomi Dolev; Nir Tzachar20092009, vol.410, no.6-7
Computing on a partially eponymous ringMarios Mavronicolas; Loizos Michael; Paul Spirakis20092009, vol.410, no.6-7
On the cost of uniform protocols whose memory consumption is adaptive to interval contentionBurkhard Englert20092009, vol.410, no.6-7
Of malicious motes and suspicious sensors On the efficiency of malicious interference in wireless networksSeth Gilbert; Rachid Guerraoui; Calvin Newport20092009, vol.410, no.6-7
Robust self-stabilizing weight-based clustering algorithmColette Johnen; Le Huy Nguyen20092009, vol.410, no.6-7
12