# Linear bounded automaton

## Papers overview

Semantic Scholar uses AI to extract papers important to this topic.

Highly Cited

2013

Highly Cited

2013

- EUROCRYPT
- 2013

Masking is a well-known countermeasure to protect block cipher implementations against side-channel attacks. The principle is toâ€¦Â (More)

Is this relevant?

Highly Cited

2010

Highly Cited

2010

- SODA
- 2010

Bidimensionality theory appears to be a powerful framework in the development of meta-algorithmic techniques. It was introducedâ€¦Â (More)

Is this relevant?

Highly Cited

2009

Highly Cited

2009

- ALT
- 2009

We present a family of adaptive pairwise tournaments that are provably robust against large error fractions when used toâ€¦Â (More)

Is this relevant?

2007

2007

- Mathematical Structures in Computer Science
- 2007

Â

Is this relevant?

2007

2007

- 2007

In this paper, the problems of stochastic disturbance attenuation and asymptotic stabilization via output feedback areâ€¦Â (More)

Is this relevant?

2006

2006

- 2006

Abstract. The understanding of adaptive algorithms for SDEs is an open area where many issues related to both convergence andâ€¦Â (More)

Is this relevant?

2006

2006

- IEEE Transactions on Information Technology inâ€¦
- 2006

Optimization of a similarity metric is an essential component in intensity-based medical image registration. The increasingâ€¦Â (More)

Is this relevant?

Highly Cited

2005

Highly Cited

2005

- IEEE Transactions on Automatic Control
- 2005

We present stability results for unconstrained discrete-time nonlinear systems controlled using finite-horizon model predictiveâ€¦Â (More)

Is this relevant?

Highly Cited

1988

Highly Cited

1988

- POPL
- 1988

Most previous redundancy elilmination algorithms have been of two kinds. The lexical algorithms deal with the entire program, butâ€¦Â (More)

Is this relevant?

Highly Cited

1987

Highly Cited

1987

- 28th Annual Symposium on Foundations of Computerâ€¦
- 1987

This paper addresses the problem of how to adapt an algorithm designed for fixed topology networks to produce the intendedâ€¦Â (More)

Is this relevant?