default search action
SIGACT News (ACM), Volume 43
Volume 43, Number 1, March 2012
- William I. Gasarch:
The book review column. 7-9 - Abu Mohammad Omar Shehab Uddin Ayub:
Review of the Cryptoclub: using mathematics to make and break secret codes by Janet Beissinger and Vera Pless. 9-14 - Leo Irakliotis:
Review of cryptanalytic attacks on RSA by Song Y. Yan. 14-16 - Antoine Rojat:
Review of cryptanalysis of RSA and its variants by Jason Hinek. 16-18 - Jérémy Barbay:
Review of understanding and applying cryptography and data security by Adam J. Elbirt. 18-21 - Jonathan Katz:
Review of efficient secure two-party protocols: techniques and constructions by Carmit Hazay and Yehuda Lindell. 21-23 - Daniel Apon:
Review of theory of computation by Dexter C. Kozen. 23-27 - Robert J. Low:
Review of codes: an introduction to information communication and cryptography by Norman L Biggs. 27-29 - Jeffrey O. Shallit:
Review of finite fields and applications by Gary L. Mullen and Carl Mummert. 30-31 - Miklós Bóna:
Review of the life and times of the central limit theorem by William J. Adams. 32-33 - Robert Szarka:
Review of pearls of discrete mathematics by Martin Erickson. 33-34 - Dimitris Papamichail:
Review of design theory by C. C. Lindner and C. A. Rodger. 35-37 - William I. Gasarch:
Review of an introduction to the history of algebra solving equations from Mesopotamian Times to the Renaissance by Jacques Sesiano. 39 - Dean F. Kelley:
Technical report column. 40-43
- Oded Goldreich:
On struggle and competition in scientic fields. 43-60
- Lane A. Hemaspaandra:
SIGACT news complexity theory column 73. 61 - Dana Moshkovitz:
Guest column: algebraic construction of projection PCPs. 62-81 - Joseph O'Rourke:
Computational geometry column 52. 82-85 - Idit Keidar:
Distributed computing column 45: what theory for transactional memory? 86 - Petr Kuznetsov, Srivatsan Ravi:
WTTM 2011: the third workshop on the theory of transactional memory. 87-92
Volume 43, Number 2, June 2012
- William I. Gasarch:
The book review column. 6-8 - Ville Hautamäki:
Review of a concise introduction to data compression by David Salomon. 9-10 - Mihai Pop:
Review of parallel algorithms by Henri Casanova, Arnaud Legrand, and Yves Robert. 11-14 - Akash Kumar:
Review of polynomia and related realms by Dan Kalman. 15-20 - Jeffrey O. Shallit:
Review of biscuits of number theory by Arthur T. Benjamin and Ezra Brown. 21-24 - Gabriel Istrate:
Review of handbook of large-scale random networks by Bela Bollobás, Robert Kozma and Deszö Miklós. 25-28 - Nick Papanikolaou:
Review of algorithms and theory of computation handbook by Mikhail J. Atallah and Marina Blanton. 29-32 - S. C. Coutinho:
Review of primality testing and integer factorization in public key cryptography by Song Y. Yan. 33-35 - Wesley Calvert:
Review of process algebra: equational theories of communicating processes by J. C. M. Baeten, T. Basten, and M. A. Reniers. 36-38 - Kim-Kwang Raymond Choo:
Review of insider threats in cyber security by Probst, Hunker, Gollman, Bishop. 38-40 - Dean F. Kelley:
Technical report column. 41-44
- Oded Goldreich:
On intellectual and instrumental values in science. 45-50
- Lane A. Hemaspaandra:
SIGACT news complexity theory column 74. 51-52 - William I. Gasarch:
Guest Column: the second P =?NP poll. 53-77 - Adrian Dumitrescu:
Computational geometry column 53. 78-83 - Idit Keidar:
Distributed computing column 46: synthesizing distributed and concurrent programs. 84 - Borzoo Bonakdarpour, Sandeep S. Kulkarni:
Automated model repair for distributed programs. 85-107 - Michael Kuperstein, Martin T. Vechev, Eran Yahav:
Automatic inference of memory fences. 108-123 - Chong-Zhang Li:
Hilbert's formalistic method and its development in computer science. 124-126 - Rob van Stee:
SIGACT news online algorithms column 20: the power of harmony. 127-136
Volume 43, Number 3, September 2012
- William I. Gasarch:
The book review column. 15-18 - William I. Gasarch:
Review of combinatorial games: tic-tac-toe theory, by Jozsef Beck. 19-21 - Antonio E. Porreca:
Review of algorithmic adventures: from knowledge to magic, by Juraj Hromković. 22-24 - Yulai Xie:
Review of applied algebra: codes, ciphers and discrete algorithms, by Darel W. Hardy, Fred Richman, and Carol L. Walker. 25-27 - José de Oliveira Guimarães:
Review of models of computation: an introduction to computability theory, by Maribel Fernández. 28-31 - Michaël Cadilhac:
Review of handbook of weighted automata, edited by Manfred Droste, Werner Kuich and Heiko Vogler. 32-37 - Haris Aziz:
Review of matching theory, by László Lovász and Michael D. Plummer. 38-40 - Stephan Falke:
Review of introduction to mathematics of satisfiability, by Victor W. Marek. 41-44 - Shiva Kintali:
Review of elements of automata theory, by Jacques Sakarovitch, Translator (from French) Reuben Thomas. 45-47 - Anthony Labarre:
Review of combinatorial pattern matching algorithms in computational biology using Perl and R, by Gabriel Valiente. 48-50 - Haris Aziz:
Review of in pursuit of the traveling salesman, by William J. Cook. 51-53 - Karolina Soltys:
Review of permutation patterns, edited by Steve Linton, Nik Ruškuc, Vincent Vatter. 54-55 - Dean F. Kelley:
Technical report column. 56-59
- Nachum Dershowitz, Edward M. Reingold:
Modulo intervals: a proposed notation. 60-64
- Lane A. Hemaspaandra:
SIGACT news complexity theory column 75. 65-66 - Amir Yehudayoff:
Proving expansion in three steps. 67-84 - Michael Benedikt:
Report on PODS 2012. 85-86 - Idit Keidar:
Distributed computing column 47: distributed computability. 87 - Maurice Herlihy, Sergio Rajsbaum, Michel Raynal:
Computability in distributed computing: a Tutorial. 88-110
Volume 43, Number 4, December 2012
- William I. Gasarch:
The book review column. 10-12 - Alexandre Anzala-Yamajako:
Review of algorithmic cryptanalysis, by Antoine Joux. 13-16 - Aaron D. Sterling:
Review of algorithmic bioprocesses, edited by Condon, Harel, Kok, Salomaa, Winfree. 17-24 - Yu Wang:
Review of vehicular networks, from theory to practice, edited by Stephan Olariu and Michele C. Weigle. 25-29 - Francesco Silvestri:
Review of graph theory and interconnection networks, by Lih-Hsing Hsu and Cheng-Kuan Lin. 30-34 - Stephan Falke:
Review of transitions and trees: an introduction to structural operational semantics, by Hans Hüttel. 34-37 - Haim Kilov:
Review of origins and foundations of computing, by Friedrich L. Bauer. 38-40 - Ben Fulton:
Review of introduction to scheduling, by Yves Robert and Frederic Vivien. 41-43 - Kyriakos N. Sgarbas:
Review of semantic techniques in quantum computation, edited by Simon Gay and Ian Mackie. 44-48 - Song Yan:
Review of modern computer arithmetic, by Richard Brent and Paul Zimmermann. 49-51 - Deeparnab Chakrabarty:
Review of design of approximation algorithms, by David P. Williamson and David B. Shmoys. 52-54 - Dean F. Kelley:
Technical report column. 55-56
- Samir Khuller:
Algorithms column: An overview of the recent progress on matrix multiplication by Virginia Vassilevska Williams. 57-59 - Lane A. Hemaspaandra, Ryan Williams:
SIGACT News Complexity Theory Column 76: an atypical survey of typical-case heuristic algorithms. 70-89 - Adrian Dumitrescu, Csaba D. Tóth:
Computational geometry column 54. 90-97 - Idit Keidar:
Distributed computing column 48: annual review 2012. 98-100 - Maurice Herlihy, Nir Shavit:
Transactional memory: beyond the first two decades. 101-103 - Siddhartha Sen:
Review of PODC 2012. 104-111 - Mika Göös:
Review of DISC 2012. 112-115 - Vincent Gramoli, Alessia Milani:
WTTM 2012, the fourth workshop on the theory of transactional memory. 116-122 - Rob van Stee:
SIGACT news online algorithms column 21: APPROX and ALGO. 123-129
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.