


default search action
SIGACT News (ACM), Volume 43
Volume 43, Number 1, March 2012
- William I. Gasarch:

The book review column. 7-9 - Abu Mohammad Omar Shehab Uddin Ayub:

Review of the Cryptoclub: using mathematics to make and break secret codes by Janet Beissinger and Vera Pless. 9-14 - Leo Irakliotis:

Review of cryptanalytic attacks on RSA by Song Y. Yan. 14-16 - Antoine Rojat:

Review of cryptanalysis of RSA and its variants by Jason Hinek. 16-18 - Jérémy Barbay:

Review of understanding and applying cryptography and data security by Adam J. Elbirt. 18-21 - Jonathan Katz:

Review of efficient secure two-party protocols: techniques and constructions by Carmit Hazay and Yehuda Lindell. 21-23 - Daniel Apon:

Review of theory of computation by Dexter C. Kozen. 23-27 - Robert J. Low:

Review of codes: an introduction to information communication and cryptography by Norman L Biggs. 27-29 - Jeffrey O. Shallit:

Review of finite fields and applications by Gary L. Mullen and Carl Mummert. 30-31 - Miklós Bóna:

Review of the life and times of the central limit theorem by William J. Adams. 32-33 - Robert Szarka

:
Review of pearls of discrete mathematics by Martin Erickson. 33-34 - Dimitris Papamichail:

Review of design theory by C. C. Lindner and C. A. Rodger. 35-37 - William I. Gasarch:

Review of an introduction to the history of algebra solving equations from Mesopotamian Times to the Renaissance by Jacques Sesiano. 39 - Dean F. Kelley:

Technical report column. 40-43
- Oded Goldreich:

On struggle and competition in scientic fields. 43-60
- Lane A. Hemaspaandra:

SIGACT news complexity theory column 73. 61 - Dana Moshkovitz:

Guest column: algebraic construction of projection PCPs. 62-81 - Joseph O'Rourke:

Computational geometry column 52. 82-85 - Idit Keidar:

Distributed computing column 45: what theory for transactional memory? 86 - Petr Kuznetsov, Srivatsan Ravi:

WTTM 2011: the third workshop on the theory of transactional memory. 87-92
Volume 43, Number 2, June 2012
- William I. Gasarch:

The book review column. 6-8 - Ville Hautamäki:

Review of a concise introduction to data compression by David Salomon. 9-10 - Mihai Pop:

Review of parallel algorithms by Henri Casanova, Arnaud Legrand, and Yves Robert. 11-14 - Akash Kumar:

Review of polynomia and related realms by Dan Kalman. 15-20 - Jeffrey O. Shallit:

Review of biscuits of number theory by Arthur T. Benjamin and Ezra Brown. 21-24 - Gabriel Istrate:

Review of handbook of large-scale random networks by Bela Bollobás, Robert Kozma and Deszö Miklós. 25-28 - Nick Papanikolaou:

Review of algorithms and theory of computation handbook by Mikhail J. Atallah and Marina Blanton. 29-32 - S. C. Coutinho:

Review of primality testing and integer factorization in public key cryptography by Song Y. Yan. 33-35 - Wesley Calvert

:
Review of process algebra: equational theories of communicating processes by J. C. M. Baeten, T. Basten, and M. A. Reniers. 36-38 - Kim-Kwang Raymond Choo:

Review of insider threats in cyber security by Probst, Hunker, Gollman, Bishop. 38-40 - Dean F. Kelley:

Technical report column. 41-44
- Oded Goldreich:

On intellectual and instrumental values in science. 45-50
- Lane A. Hemaspaandra:

SIGACT news complexity theory column 74. 51-52 - William I. Gasarch:

Guest Column: the second P =?NP poll. 53-77 - Adrian Dumitrescu:

Computational geometry column 53. 78-83 - Idit Keidar:

Distributed computing column 46: synthesizing distributed and concurrent programs. 84 - Borzoo Bonakdarpour, Sandeep S. Kulkarni:

Automated model repair for distributed programs. 85-107 - Michael Kuperstein, Martin T. Vechev, Eran Yahav:

Automatic inference of memory fences. 108-123 - Chong-Zhang Li:

Hilbert's formalistic method and its development in computer science. 124-126 - Rob van Stee:

SIGACT news online algorithms column 20: the power of harmony. 127-136
Volume 43, Number 3, September 2012
- William I. Gasarch:

The book review column. 15-18 - William I. Gasarch:

Review of combinatorial games: tic-tac-toe theory, by Jozsef Beck. 19-21 - Antonio E. Porreca:

Review of algorithmic adventures: from knowledge to magic, by Juraj Hromković. 22-24 - Yulai Xie:

Review of applied algebra: codes, ciphers and discrete algorithms, by Darel W. Hardy, Fred Richman, and Carol L. Walker. 25-27 - José de Oliveira Guimarães:

Review of models of computation: an introduction to computability theory, by Maribel Fernández. 28-31 - Michaël Cadilhac

:
Review of handbook of weighted automata, edited by Manfred Droste, Werner Kuich and Heiko Vogler. 32-37 - Haris Aziz

:
Review of matching theory, by László Lovász and Michael D. Plummer. 38-40 - Stephan Falke:

Review of introduction to mathematics of satisfiability, by Victor W. Marek. 41-44 - Shiva Kintali:

Review of elements of automata theory, by Jacques Sakarovitch, Translator (from French) Reuben Thomas. 45-47 - Anthony Labarre

:
Review of combinatorial pattern matching algorithms in computational biology using Perl and R, by Gabriel Valiente. 48-50 - Haris Aziz

:
Review of in pursuit of the traveling salesman, by William J. Cook. 51-53 - Karolina Soltys:

Review of permutation patterns, edited by Steve Linton, Nik Ruškuc, Vincent Vatter. 54-55 - Dean F. Kelley:

Technical report column. 56-59
- Nachum Dershowitz, Edward M. Reingold:

Modulo intervals: a proposed notation. 60-64
- Lane A. Hemaspaandra:

SIGACT news complexity theory column 75. 65-66 - Amir Yehudayoff:

Proving expansion in three steps. 67-84 - Michael Benedikt:

Report on PODS 2012. 85-86 - Idit Keidar:

Distributed computing column 47: distributed computability. 87 - Maurice Herlihy, Sergio Rajsbaum, Michel Raynal:

Computability in distributed computing: a Tutorial. 88-110
Volume 43, Number 4, December 2012
- William I. Gasarch:

The book review column. 10-12 - Alexandre Anzala-Yamajako:

Review of algorithmic cryptanalysis, by Antoine Joux. 13-16 - Aaron D. Sterling:

Review of algorithmic bioprocesses, edited by Condon, Harel, Kok, Salomaa, Winfree. 17-24 - Yu Wang:

Review of vehicular networks, from theory to practice, edited by Stephan Olariu and Michele C. Weigle. 25-29 - Francesco Silvestri

:
Review of graph theory and interconnection networks, by Lih-Hsing Hsu and Cheng-Kuan Lin. 30-34 - Stephan Falke:

Review of transitions and trees: an introduction to structural operational semantics, by Hans Hüttel. 34-37 - Haim Kilov:

Review of origins and foundations of computing, by Friedrich L. Bauer. 38-40 - Ben Fulton:

Review of introduction to scheduling, by Yves Robert and Frederic Vivien. 41-43 - Kyriakos N. Sgarbas:

Review of semantic techniques in quantum computation, edited by Simon Gay and Ian Mackie. 44-48 - Song Yan:

Review of modern computer arithmetic, by Richard Brent and Paul Zimmermann. 49-51 - Deeparnab Chakrabarty:

Review of design of approximation algorithms, by David P. Williamson and David B. Shmoys. 52-54 - Dean F. Kelley:

Technical report column. 55-56
- Samir Khuller:

Algorithms column: An overview of the recent progress on matrix multiplication by Virginia Vassilevska Williams. 57-59 - Lane A. Hemaspaandra

, Ryan Williams
:
SIGACT News Complexity Theory Column 76: an atypical survey of typical-case heuristic algorithms. 70-89 - Adrian Dumitrescu, Csaba D. Tóth:

Computational geometry column 54. 90-97 - Idit Keidar:

Distributed computing column 48: annual review 2012. 98-100 - Maurice Herlihy, Nir Shavit:

Transactional memory: beyond the first two decades. 101-103 - Siddhartha Sen:

Review of PODC 2012. 104-111 - Mika Göös:

Review of DISC 2012. 112-115 - Vincent Gramoli, Alessia Milani:

WTTM 2012, the fourth workshop on the theory of transactional memory. 116-122 - Rob van Stee:

SIGACT news online algorithms column 21: APPROX and ALGO. 123-129

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














