Fact-checked by Grok 2 weeks ago
References
-
[1]
What Is Theoretical Computer Science? - Communications of the ACMOct 7, 2024 · a subfield of computer science and mathematics that focuses on the abstract mathematical foundations of computation.
-
[2]
Theory - Computer Science - The University of ArizonaCS theory, or theoretical computer science, is the study of the mathematical foundations of computation.
-
[3]
IEEE Computer Society Technical Community on Mathematical ...Theoretical computer science uses mathematical tools to model and analyze the power, complexity, and design of computing devices, algorithms, and programs. It ...
-
[4]
Theoretical Computer Science | Dept of Math, Stat, & Comp SciTheoretical Computer Science provides the mathematical framework for rigorously analyzing various algorithmic problems and computational models.
-
[5]
Northwestern CS Theory Group: OverviewTheoretical computer science looks at fundamental questions about computation by creating formal models of computation and understanding the resources n...
-
[6]
[PDF] History and Contributions of Theoretical Computer Sciencesmith@cs.umd.edu. Abstract. We briefly review some of the major accomplishements of theoret- ical computer science. Results from theoretical computer science ...
-
[7]
Frege's Logic - Stanford Encyclopedia of PhilosophyFeb 7, 2023 · Friedrich Ludwig Gottlob Frege (b. 1848, d. 1925) is often credited with inventing modern quantificational logic in his Begriffsschrift.Introduction · The Logic of Begriffsschrift · The Logic of Grundgesetze
-
[8]
Russell's paradox - Stanford Encyclopedia of PhilosophyDec 18, 2024 · Russell's paradox is a contradiction—a logical impossibility—of concern to the foundations of set theory and logical reasoning generally.
-
[9]
Principia Mathematica - Stanford Encyclopedia of PhilosophyMay 21, 1996 · Principia Mathematica, the landmark work in formal logic written by Alfred North Whitehead and Bertrand Russell, was first published in three volumes in 1910, ...Overview · History of and Significance of... · Volume I · Volume III
-
[10]
Hilbert's Program - Stanford Encyclopedia of PhilosophyJul 31, 2003 · Gödel's incompleteness theorems showed that Hilbert's optimism was undue. In September 1930, Kurt Gödel announced his first incompleteness ...
-
[11]
The Church-Turing Thesis (Stanford Encyclopedia of Philosophy)Jan 8, 1997 · When Turing learned of Church's 1936 proposal to identify effectiveness with λ-definability (while preparing his own paper for publication), he ...
-
[12]
Gödel's incompleteness theoremsNov 11, 2013 · Gödel's two incompleteness theorems are among the most important results in modern logic, and have deep implications for various issues.
-
[13]
Kurt Gödel - Stanford Encyclopedia of PhilosophyFeb 13, 2007 · Gödel mentioned the possibility of the unsolvability of a question about the reals already in his 1929 thesis, in arguing against the formalist ...
-
[14]
Turing machines - Stanford Encyclopedia of PhilosophySep 24, 2018 · Entscheidungsproblem The problem to decide for every statement in first-order logic (the so-called restricted functional calculus, see the entry ...<|separator|>
-
[15]
[PDF] Computability and Incompleteness - andrew.cmu.edIt was exactly these two goals that Gödel shot down in 1931. His first in- completeness theorem shows that there is no complete, consistent, effectively.
-
[16]
[PDF] ON COMPUTABLE NUMBERS, WITH AN APPLICATION TO THE ...The "computable" numbers may be described briefly as the real numbers whose expressions as a decimal are calculable by finite means.
-
[17]
[PDF] A Logical Calculus of the Ideas Immanent in Nervous ActivityHe therefore attempted to record the behavior of complicated nets in the notation of the symbolic logic of propositions. The “all-or-none” law of nervous ...
-
[18]
[PDF] First draft report on the EDVAC by John von Neumann - MITAfter having influenced the first generation of digital computer engineers, the von Neumann report fell out of ... to the National Physical Laboratory, 1945.
-
[19]
[PDF] Origins of Recursive Function Theory - FIT CTU CoursesSo, under Church's thesis, there were now two exact mathematical characterizations of the intuitive notion of all effectively calculable functions, or all ...Missing: 1950s | Show results with:1950s
-
[20]
[PDF] A Proposal for the Dartmouth Summer Research Project on Artificial ...We propose that a 2 month, 10 man study of arti cial intelligence be carried out during the summer of 1956 at Dartmouth College in Hanover, New Hampshire.
-
[21]
Founded at the Dawn of the Computer Age - ACMSo much has changed since ACM's founding on September 15, 1947 at the dawn of the computer age. To mark the 75th anniversary of ACM, we'll celebrate pivotal ...
-
[22]
SIGACT - Special Interest Group on Algorithms & Computation TheoryAn international organization that fosters and promotes the discovery and dissemination of high quality research in theoretical computer science (TCS).Missing: founding | Show results with:founding
-
[23]
[PDF] Representation of Events in Nerve Nets and Finite Automata - RANDNerve Nets and Behavior: McCulloch and Pitts (1943) in their fundamental paper on the logical analysis of nervous activity formulated certain assumptions ...
-
[24]
[PDF] Regular Languages and Finite Automata - Computer ScienceSep 16, 2010 · Following up on the ideas of McCulloch and Pitts, Kleene [3] wrote the first paper on finite automata and regular expressions.
-
[25]
[PDF] Finite Automata and Their Decision Proble'ms#Using nondeterministic automata, a previously given construction of the direct product of automata (Defini- tion 7), and the mathematical characterization of ...
-
[26]
[PDF] The Complexity of Theorem-Proving Procedures - Computer Science1971. Summary. The Complexity of Theorem - Proving Procedures. Stephen A. Cook. University of Toronto. It is shown that any recognition problem solved by a ...Missing: NP- | Show results with:NP-
-
[27]
Algorithms for quantum computation: discrete logarithms and factoringThis paper gives Las Vegas algorithms for finding discrete logarithms and factoring integers on a quantum computer that take a number of steps which is ...
-
[28]
[quant-ph/9508027] Polynomial-Time Algorithms for Prime ... - arXivAug 30, 1995 · This paper considers factoring integers and finding discrete logarithms, two problems which are generally thought to be hard on a classical computer.
-
[29]
Molecular Computation of Solutions to Combinatorial ProblemsThe tools of molecular biology were used to solve an instance of the directed Hamiltonian path problem. A small graph was encoded in molecules of DNA.
-
[30]
[PDF] The Part-Time Parliament - Leslie LamportI present here a short history of the Paxos Parliament's protocol ... The first algorithm for implementing an arbitrary state machine appeared in. [Lamport 1978].
-
[31]
[PDF] Paxos Made Simple - Leslie LamportNov 1, 2001 · Abstract. The Paxos algorithm, when presented in plain English, is very simple. Page 3. Contents. 1 Introduction. 1. 2 The Consensus Algorithm.
-
[32]
The part-time parliament | ACM Transactions on Computer SystemsThe Paxon parliament's protocol provides a new way of implementing the state machine approach to the design of distributed systems. Formats available. You can ...<|separator|>
-
[33]
[1104.3913] Fairness Through Awareness - arXivApr 20, 2011 · The main conceptual contribution of this paper is a framework for fair classification comprising (1) a (hypothetical) task-specific metric for ...
-
[34]
Fairness through awareness | Proceedings of the 3rd Innovations in ...We study the problem of fair classification within the versatile framework of Dwork et al. ... This paper applies two argumentation schemes, argument from ...
-
[35]
Three models for the description of language - IEEE XploreThree models for the description of language. Abstract: We investigate several conceptions of linguistic structure to determine whether or not they can provide ...
-
[36]
[PDF] The CYK Algorithm - Computer Science | UC Davis EngineeringThe CYK Algorithm. • The membership problem: – Problem: • Given a context-free grammar G and a string w. – G = (V, ∑ ,P , S) where.Missing: pushdown 1960s original paper
-
[37]
[PDF] Introduction to Automata Theory, Languages, and ComputationThe "lexical analyzer” of a typical compiler, that is, the compiler com- ponent that breaks the input text into logical units, such as identifiers, keywords ...
-
[38]
[PDF] An Unsolvable Problem of Elementary Number Theory Alonzo ...Mar 3, 2008 · The purpose of the present paper is to propose a definition of effective calculability which is thought to correspond satisfactorily to the ...
- [39]
-
[40]
[PDF] The P versus NP problem - Clay Mathematics InstituteReturning to the historical treatment of complexity theory, in 1971 the present author [9] introduced a notion of NP-completeness as a polynomial-time analog of.
-
[41]
Relationships between nondeterministic and deterministic tape ...The amount of storage needed to simulate a nondeterministic tape bounded Turingmachine on a deterministic Turing machine is investigated.
-
[42]
[PDF] 3SUM and Related Problems in Fine-Grained Complexity - DROPSAbstract. 3SUM is a simple to state problem: given a set S of n numbers, determine whether S contains three a, b, c so that a + b + c = 0.
-
[43]
[PDF] THE THEORY OF DYNAMIC PROGRAMMING - Richard Bellmanstated above, the basic idea of the theory of dynamic programming is that of viewing an optimal policy as one deter- mining the decision required at each time ...
-
[44]
[PDF] DYNAMIC PROGRAMMING - GwernI ... using the functional equation approach of dynamic programming. § 6 ...
-
[45]
Matroids and the greedy algorithm* This paper was presented at the Princeton Symposium on Mathematical Programming, 1967, and intended for its Proceedings. With permission of the author it ...
-
[46]
[PDF] Amortized Computational Complexity - cs.PrincetonThe banker's view of amortization was used implicitly by Brown and Tarjan [8] in analyzing the amortized complexity of 2, 3 trees and was developed more fully ...
-
[47]
[PDF] Adversary Arguments [Fa'13] - Jeff EricksonTo prove a lower bound for this problem, we can use a combination of information theory and two adversary arguments. We use one adversary argument to prove the ...Missing: seminal paper
-
[48]
[PDF] An algorithm for the organization of information by GM Adel'son-Vel ...An algorithm for the organization of information by G. M. Adel'son-Vel'skii and E. M. Landis. Soviet Mathematics Doklady, 3, 1259-1263, 1962.
-
[49]
[PDF] A dichromatic framework for balanced trees - Robert SedgewickIn general, we shall consider families of trees which satisfy the following two conditions: 1. External nodes are black~ internal nodes may be red or black.
-
[50]
Efficiency of a Good But Not Linear Set Union AlgorithmEfficiency of a Good But Not Linear Set Union Algorithm. Author: Robert Endre Tarjan ... The algorithm executes an intermixed sequence of m union and find ...
-
[51]
A mathematical theory of communication | Nokia Bell Labs Journals ...A mathematical theory of communication ; Page(s): 379 - 423 ; Date of Publication: July 1948 ; ISSN Information: Print ISSN: 0005-8580 ; Persistent Link: https:// ...
-
[52]
[PDF] Shannon's Noisy Coding Theorem 1 Channel CodingMay 14, 2015 · What Shannon showed was that every channel has a capacity C. The channel capacity is generally expressed as bits per channel use—a channel use ...Missing: explanation | Show results with:explanation
- [53]
-
[54]
Three approaches to the quantitative definition of information(1968). Three approaches to the quantitative definition of information * . International Journal of Computer Mathematics: Vol. 2, No. 1-4, pp. 157-168.
- [55]
-
[56]
Polynomial Codes Over Certain Finite FieldsPolynomial Codes Over Certain Finite Fields. Authors: I. S. Reed and G. SolomonAuthors Info & Affiliations. https://doi.org/10.1137/0108018 · PDF · BibTeX.
-
[57]
(PDF) Reed-Solomon codes and the compact disc - ResearchGateOct 12, 2025 · They are Reed-Solomon error codes: the extremely powerful codes that provide critical error control for many different types of digital ...
-
[58]
Low-density parity-check codes | IEEE Journals & MagazineA low-density parity-check code is a code specified by a parity-check matrix with the following properties: each column contains a small fixed number j \geq 3 ...Missing: pdf | Show results with:pdf
-
[59]
[PDF] gs vernam. - secret signaling system. - Crypto MuseumGILBERT S. VERNAM, OF BROOKLYN, NEW YORK, ASSIGNOR TO AMERICAN TELEPHONE. AND TELEGRAPH COMPANY, A CORPORATION OF NEW YORK. SECRET SIGNALING SYSTEM.
-
[60]
[PDF] THE INDEX OF COINCIDENCE AND ITS APPLICATIONS IN ...Jun 1, 2014 · INTRODUCTION. Frc11ut'ney tables in tho annlysis and solution of ciphBrB have• commonly been employed to uinkc u~~umptions of 1>ln.in-toxt ...
-
[61]
[PDF] New Directions in Cryptography - Stanford Electrical EngineeringIn a paper intimately connected with the birth of information theory, Shannon. [3] showed that the one time pad system, which had been in use since the late ...
-
[62]
[PDF] A Method for Obtaining Digital Signatures and Public-Key ...We demonstrate in this paper how to build these capabilities into an electronic mail system. At the heart of our proposal is a new encryption method. This ...
-
[63]
A Design Principle for Hash Functions - SpringerLinkThe design principle is that if a collision-free function from m bits to t bits (m>t) exists, then a collision-free hash function from arbitrary polynomial ...
-
[64]
One Way Hash Functions and DES - SpringerLinkJul 6, 2001 · One way hash functions are a major tool in cryptography. DES is the best known and most widely used encryption function in the commercial world today.Missing: original | Show results with:original
-
[65]
NIST Post-Quantum Cryptography StandardizationNIST has initiated a process to solicit, evaluate, and standardize one or more quantum-resistant public-key cryptographic algorithms.Round 3 Submissions · Call for Proposals · Round 1 Submissions
-
[66]
[PDF] A ring-based public key cryptosystem - NTRUABSTRACT. We describe NTRU, a new public key cryptosystem. NTRU features reasonably short, easily created keys, high speed, and low memory requirements.
-
[67]
A fast quantum mechanical algorithm for database search - arXivNov 19, 1996 · This is an updated version of a paper that was originally presented at STOC 1996. The algorithm is the same; however, the proof has been ...
-
[68]
[quant-ph/9512032] Good Quantum Error-Correcting Codes ExistDec 30, 1995 · A quantum error-correcting code is defined to be a unitary mapping (encoding) of k qubits (2-state quantum systems) into a subspace of the quantum state space ...
-
[69]
Suppressing quantum errors by scaling a surface code logical qubitFeb 22, 2023 · Suppressing quantum errors by scaling a surface code logical qubit · Algorithmically relevant error rates. Even as known error sources are ...
-
[70]
Quantum Complexity Theory | SIAM Journal on ComputingIn this paper we study quantum computation from a complexity theoretic viewpoint. Our first ... (BQP) introduced by Bernstein and Vazirani [Proc. 25th ACM ...Missing: original | Show results with:original
-
[71]
Quantum supremacy using a programmable superconducting ...Oct 23, 2019 · ... Quantum supremacy is demonstrated using a programmable superconducting processor known as Sycamore, taking approximately 200 seconds to ...
-
[72]
A logical calculus of the ideas immanent in nervous activityA logical calculus of the ideas immanent in nervous activity ... Article PDF. Download to read the full article text. Similar content being viewed by others ...
-
[73]
Maze-solving by an amoeboid organism - NatureSep 28, 2000 · There were four possible routes (α1, α2, β1, β2) between the start and end points (Fig. 1a). Figure 1: Maze-solving by Physarum polycephalum.
-
[74]
A theory of the learnable | Communications of the ACMAspects of complexity of probabilistic learning under monotonicity constraints. Algorithmic learning theory.Missing: original | Show results with:original
-
[75]
A Decision-Theoretic Generalization of On-Line Learning and an ...In the first part of the paper we consider the problem of dynamically apportioning resources among a set of options in a worst-case on-line framework.
-
[76]
[PDF] Efficient, Safe, and Probably Approximately Complete Learning of ...Efficient, Safe, and Probably Approximately Complete Learning of Action Models. Roni Stern. Ben Gurion University of the Negev. Be'er Sheva, Israel roni.stern ...
-
[77]
Polynomial time approximation schemes for Euclidean traveling ...ARORA, S. 1996. Polynomial-time approximation schemes for Euclidean TSP and other geometric problem. In Proceedings of the 37th Annual IEEE Symposium on ...
-
[78]
[PDF] Monte-Carlo algorithms in graph isomorphism testingNote that every Las Vegas computation is Monte Carlo, but not con- versely. 0.2. In this paper we give (contrary to the title) Las Vegas algorithms to test.
-
[79]
[PDF] randomized rounding: a technique for provably good algorithms and ...We give a randomized algorithm for transforming an optimal solution of a relaxed problem into a provably good solution for the 0—1 problem. Our technique can be ...Missing: seminal | Show results with:seminal
-
[80]
Problems and results on 3-chromatic Hypergraphs and some related ...PDF | On Jan 1, 1974, Paul Erdős and others published Problems and results on 3-chromatic Hypergraphs and some related questions | Find, read and cite all ...
-
[81]
[PDF] An Improved Data Stream Summary: The Count-Min Sketch and its ...Dec 16, 2003 · We introduce a new sublinear space data structure—the Count-Min Sketch— for summa- rizing data streams. Our sketch allows fundamental ...
-
[82]
[PDF] Self-Testing/Correcting with Applications to Numerical ProblemsIn this paper, we assume that the program's answer on a particular input does not depend on previous inputs. 13, Blum Luby Rubinfeld] considers the case when ...
-
[83]
[PDF] An Optimal Convex Hull Algorithm in Any Fixed DimensionThis paper provides a simple algorithm for computing the convex hull of n points in d-space deterministically in optimal O(n4/25) time, for d> 3. This result ...
-
[84]
A sweepline algorithm for Voronoi diagrams - ACM Digital LibraryWe present a transformation that can be used to compute Voronoi diagrams with a sweepline technique. The transformation is used to obtain simple algorithms ...Missing: original paper
-
[85]
Multidimensional binary search trees used for associative searchingSep 1, 1975 · This paper develops the multidimensional binary search tree (or k-d tree, where k is the dimensionality of the search space) as a data ...
-
[86]
Euclidean shortest paths in the presence of rectilinear barriers - LeeIn this paper we address the problem of constructing a Euclidean shortest path between two specified points (source, destination) in the plane, which avoids ...
-
[87]
[PDF] Scalable Nearest Neighbor Algorithms for High Dimensional DataIn this paper we evaluate the most promising nearest- neighbor search algorithms in the literature, propose new algorithms and improvements to existing ones, ...Missing: seminal | Show results with:seminal
-
[88]
[PDF] PRIMES is in P - MicrosoftKayal and N. Saxena, Towards a deterministic polynomial-time test,. Technical report, IIT Kanpur, 2002; available at http://www.cse.Missing: original | Show results with:original
- [89]
-
[90]
[PDF] The number field sieve - Dartmouth MathematicsSince this function of t is a polynomial with integer coefficients, we can use a sieve, as described in §5, to locate rapidly those numbers t with t² - n smooth ...
-
[91]
[PDF] 10 Index calculus, smooth numbers, and factoring integersMar 24, 2021 · Having explored generic algorithms for the discrete logarithm problem in some detail, we now consider a non-generic algorithm based on index ...
-
[92]
[PDF] Factoring Integers with Elliptic Curves - HW Lenstra, Jr.Nov 6, 2001 · This paper is devoted to the description and analysis of a new algorithm to factor positive integers. It depends on the use of elliptic curves.Missing: ECM | Show results with:ECM
-
[93]
[PDF] A Historic Introduction to Gröbner Bases - RISCJul 9, 2005 · This paper will be copied and distributed. B. Buchberger. Gröbner-Bases: An Algorithmic Method in Polynomial Ideal Theory. Chapter 6 in: N.K..
-
[94]
A Machine-Oriented Logic Based on the Resolution PrincipleA Machine-Oriented Logic Based on the Resolution Principle. Author: J. A. Robinson ... This paper focuses on resolution-based automated reasoning theory in a ...
-
[95]
[1512.03547] Graph Isomorphism in Quasipolynomial Time - arXivDec 11, 2015 · Authors:László Babai. View a PDF of the paper titled Graph Isomorphism in Quasipolynomial Time, by L\'aszl\'o Babai. View PDF. Abstract:We show ...
-
[96]
[PDF] OUTLINE OF A MATHEMATICAL THEORY OF COMPUTATIONOUTLINE OF A MATHEMATICAL. THEORY OF COMPUTATION by. Dana Scott. Princeton University. The motivation for trying to formulate a mathematical theory of ...Missing: 1970 | Show results with:1970
-
[97]
(PDF) Towards a Mathematical Semantics for Computer LanguagesJul 8, 2015 · PDF | On Jan 1, 1971, D.S. Scott and others published Towards a Mathematical Semantics for Computer Languages | Find, read and cite all the ...
-
[98]
[PDF] A Structural Approach to Operational Semantics - People | MIT CSAILIt is the purpose of these notes to develop a simple and direct method for specifying the seman- tics of programming languages. Very little is required in ...
-
[99]
[PDF] A Formulation of the Simple Theory of Types Alonzo Church The ...Apr 2, 2007 · See, for example, Alonzo Church, Mathematical logic (mimeographed), Princeton,. N. J., 1936, and The calculi of lambda-conversion, forthcoming ...Missing: original | Show results with:original
-
[100]
[PDF] Essays on Combinatory Logic, Lambda Calculus and Formalism1980. ACADEMIC PRESS. A Subsidiary ofHarcourt Brace J ovanovich ... W.A. Howard. 479. Modified Realization and the Formulae-as-Types. Notion. Justus ...
-
[101]
The system F of variable types, fifteen years later - ScienceDirect.comThe semantic study of system F stumbles on the problem of variable types for which there was no convincing interpretation; we develop here a semantics based ...
-
[102]
[PDF] A Calculus of Mobile Processes, I - CIS UPennIn a companion paper (Milner, Parrow, and Walker, 1989) we treat the semantics of the n-calculus in depth. The present paper is devoted to a sequence of ...Missing: original | Show results with:original
-
[103]
Z3: An Efficient SMT Solver - SpringerLinkZ3 is a new and efficient SMT Solver freely available from Microsoft Research. It is used in various software verification and analysis applications.Missing: original | Show results with:original
-
[104]
Z3: an efficient SMT solver - Microsoft ResearchMar 28, 2008 · Z3 is a new and efficient SMT Solver freely available from Microsoft Research. It is used in various software verification and analysis applications.Missing: paper | Show results with:paper
-
[105]
ACM SIGACTSIGACT is an international organization that fosters and promotes the discovery and dissemination of high quality research in theoretical computer science (TCS) ...Missing: founded | Show results with:founded
-
[106]
About the AssociationEATCS is an international organization founded in 1972. Its aim is to facilitate the exchange of ideas and results among theoretical computer scientists.
-
[107]
European Association for Theoretical Computer ScienceThe journal Theoretical Computer Science, founded in 1975, is published by Elsevier Science Publishers. Its contents are mathematical and abstract in spirit.
-
[108]
A Brief History of the IEEE/CS Technical Committee on Mathematical ...A Brief History of the IEEE/CS Technical Committee on Mathematical. Foundations of Computing and its Annual Symposium on Foundations of Computer Science (FOCS).
-
[109]
Electronic Computer Project - Institute for Advanced StudyIn late 1945, the Institute for Advanced Study embarked on a project that departed from the realm of the purely theoretical. With no laboratory facilities, ...
-
[110]
Some milestones in the evolution of Theoretical Computer ScienceThe theory of algorithms was developed, with the fundamental focus on asymptotic and worst-case analysis. Numerous techniques, of increasing mathematical ...<|control11|><|separator|>
-
[111]
QED-C | Enabling the Quantum EcosystemThe Quantum Economic Development Consortium (QED-C®) is the world's premier association of pioneers in the quantum technology marketplace.Quantum Jobs · Quantum consortia QIC, QED... · Quantum Marketplace · About Us
-
[112]
JOURNAL OF THE ACM Home - ACM Digital LibraryThe Journal of the ACM (JACM) provides coverage of the most significant work on principles of computer science, broadly construed.About JACM · Preparation and Submission of... · History · Just Accepted
-
[113]
SIAM Journal on ComputingSIAM Journal on Computing (SICOMP) aims to provide coverage of the most significant work going on in the mathematical and formal aspects of computer science.
-
[114]
Theoretical Computer Science | Journal - ScienceDirect.comPapers published in Theoretical Computer Science are grouped in three sections according to their nature. The first section `Algorithms, automata, complexity ...View full editorial board · Articles in press · Special issues and article... · All issues
-
[115]
computational complexityJournal metrics. Journal Impact Factor: 1.0 (2024). 5-year Journal Impact Factor: 1.1 (2024). Downloads: 21.2k (2024). Latest articles. On a Hierarchy of ...
-
[116]
Quantum – the open journal for quantum scienceQuantum is an open-access peer-reviewed journal for quantum science and related fields. Quantum is non-profit and community-run: an effort by researchers ...For authors · Paper · About · Tools and open source
-
[117]
JOURNAL OF THE ACM Indexing | ACM Digital LibraryImpact Factor and Ranking ; 2024, 2.5, 60/128 (Q2) ; 2023, 2.3, 57/131 (Q2) ; 2022, 2.5, 52/108 (Q2) ; 2021, 2.269, 55/110 ...
-
[118]
JOURNAL OF THE ACM Other Information - ACM Digital LibraryThis page contains some information about the history of the Journal of the ACM. First issue. The very first issue of JACM appeared in January 1954.
-
[119]
Siam Journal on Computing Impact Factor IF 2025 - BioxbioYear, Impact Factor (IF), Total Articles, Total Cites. 2024 (2025 update), 1.6, -, 8375. 2023, 1.2, -, -. 2022, 1.6, -, 8198. 2021, 1.475, -, 7508.
-
[120]
Guide for authors - Theoretical Computer Science - ScienceDirect.comPapers published in Theoretical Computer Science are grouped in three sections according to their nature. The first section `Algorithms, automata, complexity ...
-
[121]
About - Quantum JournalQuantum is a non-profit and open access peer-reviewed journal that provides high visibility for quality research on quantum science and related fields.
-
[122]
Quantum - Impact Factor, Quartile, Ranking - WoS Journal InfoImpact Factor (JIF): 5.4, 5-year Impact Factor: 7.2, Best ranking: QUANTUM SCIENCE & TECHNOLOGY, Percentage rank: 84.2%, Open Access Support: Fully Open Access.
-
[123]
ACM STOC Conference: The ACM Symposium on Theory of ...It has been held annually since 1969, traditionally in May/June. STOC covers all areas of research within Algorithms and Computation Theory.STOC 2017 · STOC 2017- Proceedings of... · STOC 2024 · STOC 2020
-
[124]
IEEE Annual Symposium on Foundations of Computer Science ...... ACM SIGACT. History. FOCS was founded in 1960 as the Symposium on Switching Circuit Theory and Logical Design. The 1960 conference did not have a separate ...
-
[125]
STOC 2025 - 57th ACM Symposium on Theory of ComputingThe 57th ACM Symposium on Theory of Computing (STOC 2025) is sponsored by the ACM Special Interest Group on Algorithms and Computation Theory and will be held ...Accepted Papers · STOC Program · STOC Proceedings · Workshops
-
[126]
STOC 2025 - 57th ACM Symposium on Theory of Computing57th Annual ACM Symposium on Theory of Computing June 23-27, 2025 in Prague, Czech Republic. STOC 2025 Accepted Papers. On the Locality of the ...
-
[127]
EATCS International Colloquium on Automata, Languages and ...The International Colloquium on Automata, Languages and Programming (ICALP) is the flagship conference and annual meeting of the EATCS.
-
[128]
Future ICALPsThe International Colloquium on Automata, Languages and Programming (ICALP) is the main conference and annual meeting of the EATCS. This international ...
-
[129]
Computational Complexity ConferenceThe Computational Complexity Conference (CCC) is an annual conference on the inherent difficulty of computational problems in terms of the resources they ...CCC 2023 · CCC 2024 Local Arrangments · CCC'22 Local Arrangments
-
[130]
Announcements - Computational Complexity ConferenceWe are thrilled that Dieter van Melkebeek will receive the 2020 SIGACT Distinguished Service Award for his leadership in creating the Computational Complexity ...
-
[131]
FOCS 2025 - IEEE Computer SocietyThe 66th FOCS 2025 will be held in Sydney, Australia, December 14-17. Early registration deadline is November 21, 2025.
-
[132]
QIP ConferencesQIP is also the name of the largest annual conference in the field, with around 1000 attendees and 500 submissions (as of 2023). This is the permanent website ...Missing: 1998 | Show results with:1998
-
[133]
The world's largest flagship conference on quantum information ...Mar 1, 2024 · Since its inaugural event in 1998, held in Aarhus, Denmark, the conference has covered a wide range of topics, including quantum computer ...