default search action
Ramarathnam Venkatesan
Person information
- affiliation: Microsoft Research
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i20]S. Sree Vivek, S. Sharmila Deva Selvi, Ramarathnam Venkatesan, C. Pandu Rangan:
Compact Identity Based Encryption Based on n^{th} - Residuosity Assumption. IACR Cryptol. ePrint Arch. 2023: 931 (2023) - 2020
- [c80]Panagiotis Antonopoulos, Arvind Arasu, Kunal D. Singh, Ken Eguro, Nitish Gupta, Rajat Jain, Raghav Kaushik, Hanuma Kodavalla, Donald Kossmann, Nikolas Ogg, Ravi Ramamurthy, Jakub Szymaszek, Jeffrey Trimmer, Kapil Vaswani, Ramarathnam Venkatesan, Mike Zwilling:
Azure SQL Database Always Encrypted. SIGMOD Conference 2020: 1511-1525
2010 – 2019
- 2019
- [c79]Johannes Gehrke, Lindsay Allen, Panagiotis Antonopoulos, Arvind Arasu, Joachim Hammer, James Hunter, Raghav Kaushik, Donald Kossmann, Ravi Ramamurthy, Srinath T. V. Setty, Jakub Szymaszek, Alexander van Renen, Jonathan Lee, Ramarathnam Venkatesan:
Veritas: Shared Verifiable Databases and Tables in the Cloud. CIDR 2019 - 2018
- [j10]Leonid A. Levin, Ramarathnam Venkatesan:
An Average Case NP-complete Graph Colouring Problem. Comb. Probab. Comput. 27(5): 808-828 (2018) - 2017
- [c78]Raghu Ramakrishnan, Baskar Sridharan, John R. Douceur, Pavan Kasturi, Balaji Krishnamachari-Sampath, Karthick Krishnamoorthy, Peng Li, Mitica Manu, Spiro Michaylov, Rogério Ramos, Neil Sharman, Zee Xu, Youssef Barakat, Chris Douglas, Richard Draves, Shrikant S. Naidu, Shankar Shastry, Atul Sikaria, Simon Sun, Ramarathnam Venkatesan:
Azure Data Lake Store: A Hyperscale Distributed File Service for Big Data Analytics. SIGMOD Conference 2017: 51-63 - [i19]Stephen D. Miller, Bhargav Narayanan, Ramarathnam Venkatesan:
Coppersmith's lattices and "focus groups": an attack on small-exponent RSA. CoRR abs/1708.09445 (2017) - [i18]Stephen D. Miller, Bhargav Narayanan, Ramarathnam Venkatesan:
Coppersmith's lattices and "focus groups": an attack on small-exponent RSA. IACR Cryptol. ePrint Arch. 2017: 835 (2017) - 2016
- [i17]Kapil Vaswani, Ravi Ramamurthy, Ramarathnam Venkatesan:
Information Flows in Encrypted Databases. CoRR abs/1605.01092 (2016) - 2015
- [j9]Evgeni Begelfor, Stephen D. Miller, Ramarathnam Venkatesan:
Non-abelian analogs of lattice rounding. Groups Complex. Cryptol. 7(2): 117-133 (2015) - [i16]Evgeni Begelfor, Stephen D. Miller, Ramarathnam Venkatesan:
Non-Abelian Analogs of Lattice Rounding. CoRR abs/1501.03056 (2015) - [i15]Evgeni Begelfor, Stephen D. Miller, Ramarathnam Venkatesan:
Non-Abelian Analogs of Lattice Rounding. IACR Cryptol. ePrint Arch. 2015: 24 (2015) - 2014
- [c77]Tahmineh Sanamrad, Lucas Braun, Donald Kossmann, Ramarathnam Venkatesan:
Randomly Partitioned Encryption for Cloud Databases. DBSec 2014: 307-323 - 2013
- [c76]Arvind Arasu, Spyros Blanas, Ken Eguro, Raghav Kaushik, Donald Kossmann, Ravishankar Ramamurthy, Ramarathnam Venkatesan:
Orthogonal Security with Cipherbase. CIDR 2013 - [c75]Arvind Arasu, Ken Eguro, Raghav Kaushik, Donald Kossmann, Ravi Ramamurthy, Ramarathnam Venkatesan:
A secure coprocessor for database applications. FPL 2013: 1-8 - [c74]Suman Nath, Ramarathnam Venkatesan:
Publicly verifiable grouped aggregation queries on outsourced data streams. ICDE 2013: 517-528 - [c73]Rajalakshmi Nandakumar, Krishna Kant Chintalapudi, Venkata N. Padmanabhan, Ramarathnam Venkatesan:
Dhwani: secure peer-to-peer acoustic NFC. SIGCOMM 2013: 63-74 - [c72]Arvind Arasu, Spyros Blanas, Ken Eguro, Manas Joglekar, Raghav Kaushik, Donald Kossmann, Ravishankar Ramamurthy, Prasang Upadhyaya, Ramarathnam Venkatesan:
Secure database-as-a-service with Cipherbase. SIGMOD Conference 2013: 1033-1036 - [i14]Srivatsan Laxman, Sushil Mittal, Ramarathnam Venkatesan:
Error Correction in Learning using SVMs. CoRR abs/1301.2012 (2013) - 2012
- [j8]Arvind Arasu, Spyros Blanas, Ken Eguro, Manas Joglekar, Raghav Kaushik, Donald Kossmann, Ravishankar Ramamurthy, Prasang Upadhyaya, Ramarathnam Venkatesan:
Engineering Security and Performance with Cipherbase. IEEE Data Eng. Bull. 35(4): 65-72 (2012) - [j7]S. Sree Vivek, S. Sharmila Deva Selvi, Ramarathnam Venkatesan, C. Pandu Rangan:
A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(4): 46-60 (2012) - [c71]Ken Eguro, Ramarathnam Venkatesan:
FPGAs for trusted cloud computing. FPL 2012: 63-70 - 2011
- [c70]Sandeep Karanth, Srivatsan Laxman, Prasad Naldurg, Ramarathnam Venkatesan, John Lambert, Jinwook Shin:
ZDVUE: prioritization of javascript attacks to discover new vulnerabilities. AISec 2011: 31-42 - [c69]Sumit Gulwani, Susmit Jha, Ashish Tiwari, Ramarathnam Venkatesan:
Synthesis of loop-free programs. PLDI 2011: 62-73 - 2010
- [c68]Swarun Kumar, Shivank Agrawal, Ramarathnam Venkatesan, Satyanarayana V. Lokam, C. Pandu Rangan:
Threshold Discernible Ring Signatures. ICETE (Selected Papers) 2010: 259-273 - [c67]Swarun Kumar, Shivank Agrawal, Ramarathnam Venkatesan, Satyanarayana V. Lokam, C. Pandu Rangan:
Forcing Out a Confession - Threshold Discernible Ring Signatures. SECRYPT 2010: 379-388 - [c66]Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia:
Founding Cryptography on Tamper-Proof Hardware Tokens. TCC 2010: 308-326 - [i13]Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia:
Founding Cryptography on Tamper-Proof Hardware Tokens. IACR Cryptol. ePrint Arch. 2010: 153 (2010) - [i12]Mariusz H. Jakubowski, Ramarathnam Venkatesan, Yacov Yacobi:
Quantifying Trust. IACR Cryptol. ePrint Arch. 2010: 246 (2010)
2000 – 2009
- 2009
- [c65]Srivatsan Narayanan, Ananth Raghunathan, Ramarathnam Venkatesan:
Obfuscating straight line arithmetic programs. Digital Rights Management Workshop 2009: 47-58 - [c64]Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam Venkatesan:
Tamper-Tolerant Software: Modeling and Implementation. IWSEC 2009: 125-139 - [c63]Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam Venkatesan:
Iterated Transformations and Quantitative Metrics for Software Protection. SECRYPT 2009: 359-368 - [c62]Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Chit Wei Saw:
Runtime Protection via Dataflow Flattening. SECURWARE 2009: 242-248 - [c61]Sumit Gulwani, Saurabh Srivastava, Ramarathnam Venkatesan:
Constraint-Based Invariant Inference over Predicate Abstraction. VMCAI 2009: 120-135 - 2008
- [c60]Adi Akavia, Ramarathnam Venkatesan:
Perturbation codes. Allerton 2008: 1403-1409 - [c59]Dimitar Jetchev, Ramarathnam Venkatesan:
Bits Security of the Elliptic Curve Diffie-Hellman Secret Keys. CRYPTO 2008: 75-92 - [c58]Matthias Jacob, Mariusz H. Jakubowski, Prasad Naldurg, Chit Wei Saw, Ramarathnam Venkatesan:
The Superdiversifier: Peephole Individualization for Software Protection. IWSEC 2008: 100-120 - [c57]Matthew Cary, Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan:
The Long-Short-Key Primitive and Its Applications to Key Security. IWSEC 2008: 279-297 - [c56]Sumit Gulwani, Saurabh Srivastava, Ramarathnam Venkatesan:
Program analysis as constraint solving. PLDI 2008: 281-292 - [i11]Stephen D. Miller, Ramarathnam Venkatesan:
Non-degeneracy of Pollard Rho Collisions. CoRR abs/0808.0469 (2008) - [i10]Raghav Bhaskar, K. Chandrasekaran, Satyanarayana V. Lokam, Peter L. Montgomery, Ramarathnam Venkatesan, Yacov Yacobi:
On The Diffie-Hellman Assumption. IACR Cryptol. ePrint Arch. 2008: 525 (2008) - 2007
- [c55]Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan:
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers. CT-RSA 2007: 1-19 - [c54]Avinash V. Varadarajan, Ramarathnam Venkatesan, C. Pandu Rangan:
Data structures for limited oblivious execution of programs while preserving locality of reference. Digital Rights Management Workshop 2007: 63-69 - [c53]Mariusz H. Jakubowski, Ramarathnam Venkatesan:
Randomized radon transforms for biometric authentication via fingerprint hashing. Digital Rights Management Workshop 2007: 90-94 - [c52]Srivatsan Laxman, Prasad Naldurg, Raja Sripada, Ramarathnam Venkatesan:
Connections between Mining Frequent Itemsets and Learning Generative Models. ICDM 2007: 571-576 - [c51]Nenad Dedic, Mariusz H. Jakubowski, Ramarathnam Venkatesan:
A Graph Game Model for Software Tamper Protection. Information Hiding 2007: 80-95 - [c50]Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patankar, Ramarathnam Venkatesan:
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection. Information Hiding 2007: 96-111 - [c49]David Jao, Dimitar Jetchev, Ramarathnam Venkatesan:
On the Bits of Elliptic Curve Diffie-Hellman Keys. INDOCRYPT 2007: 33-47 - [c48]Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Koen De Bosschere:
Run-Time Randomization to Mitigate Tampering. IWSEC 2007: 153-168 - [c47]Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan:
Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. MM&Sec 2007: 129-140 - [c46]David Jao, S. Ramesh Raju, Ramarathnam Venkatesan:
Digit Set Randomization in Elliptic Curve Cryptography. SAGA 2007: 105-117 - [c45]Debapratim De, Abishek Kumarasubramanian, Ramarathnam Venkatesan:
Inversion Attacks on Secure Hash Functions Using satSolvers. SAT 2007: 377-382 - [c44]Raghav Bhaskar, K. Chandrasekaran, Satyanarayana V. Lokam, Peter L. Montgomery, Ramarathnam Venkatesan, Yacov Yacobi:
Vulnerabilities in Anonymous Credential Systems. STM@ESORICS 2007: 141-148 - 2006
- [c43]Stephen D. Miller, Ramarathnam Venkatesan:
Spectral Analysis of Pollard Rho Collisions. ANTS 2006: 573-581 - [c42]Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan:
Proteus: virtualization for diversified tamper-resistance. Digital Rights Management Workshop 2006: 47-58 - [c41]Ganesh Ananthanarayanan, Ramarathnam Venkatesan, Prasad Naldurg, Sean Olin Blagsvedt, Adithya Hemakumar:
SPACE: Secure Protocol for Address Book based Connection Establishment. HotNets 2006 - [i9]Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan:
MV3: A new word based stream cipher using rapid mixing and revolving buffers. CoRR abs/cs/0610048 (2006) - [i8]Stephen D. Miller, Ramarathnam Venkatesan:
Spectral Analysis of Pollard Rho Collisions. CoRR abs/math/0603727 (2006) - [i7]Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan:
MV3: A new word based stream cipher using rapid mixing and revolving buffers. IACR Cryptol. ePrint Arch. 2006: 341 (2006) - 2005
- [j6]Mustafa Kesal, Mehmet Kivanç Mihçak, Ramarathnam Venkatesan:
An improved attack analysis on a public-key spread spectrum watermarking. Multim. Syst. 11(2): 133-142 (2005) - [j5]Mehmet Kivanç Mihçak, Ramarathnam Venkatesan, Tie Liu:
Watermarking via optimization algorithms for quantizing randomized semi-global image statistics. Multim. Syst. 11(2): 185-200 (2005) - [c40]Michael Malkin, Ramarathnam Venkatesan:
Comparison of Texts Streams in the Presence of Mild Adversaries. ACSW 2005: 179-186 - [c39]David Jao, Stephen D. Miller, Ramarathnam Venkatesan:
Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log? ASIACRYPT 2005: 21-40 - [c38]Ramarathnam Venkatesan, Mariusz H. Jakubowski:
Randomized Detection For Spread-Spectrum Watermarking: Defending Against Sensitivity and Other Attacks. ICASSP (2) 2005: 9-12 - [c37]Mehmet Kucukgoz, Oztan Harmanci, Mehmet Kivanç Mihçak, Ramarathnam Venkatesan:
Robust video watermarking via optimization algorithm for quantization of pseudo-random semi-global statistics. Security, Steganography, and Watermarking of Multimedia Contents 2005: 363-369 - [e1]Subhamoy Maitra, C. E. Veni Madhavan, Ramarathnam Venkatesan:
Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings. Lecture Notes in Computer Science 3797, Springer 2005, ISBN 3-540-30805-9 [contents] - 2004
- [c36]Suleyman Serdar Kozat, Ramarathnam Venkatesan, Mehmet Kivanç Mihçak:
Robust perceptual image hashing via matrix invariants. ICIP 2004: 3443-3446 - [c35]Mustafa Kesal, Mehmet Kivanç Mihçak, Ramarathnam Venkatesan:
An improved attack analysis on a public-key spread spectrum watermarking. MM&Sec 2004: 41-45 - [c34]Tie Liu, Ramarathnam Venkatesan, Mehmet Kivanç Mihçak:
Scale-invariant image watermarking via optimization algorithms for quantizing randomized statistics. MM&Sec 2004: 124-132 - [i6]David Jao, Stephen D. Miller, Ramarathnam Venkatesan:
Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves. CoRR math.NT/0411378 (2004) - [i5]David Jao, Stephen D. Miller, Ramarathnam Venkatesan:
Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves. IACR Cryptol. ePrint Arch. 2004: 312 (2004) - 2003
- [c33]Matthew Cary, Ramarathnam Venkatesan:
A Message Authentication Code Based on Unimodular Matrix Groups. CRYPTO 2003: 500-512 - 2002
- [j4]Myung M. Bae, Ramarathnam Venkatesan, Bella Bose:
Data Rearrangement between Radix-k and Lee Distance Gray Codes in k-ary n-cubes. J. Parallel Distributed Comput. 62(1): 19-37 (2002) - [c32]Jeremy Horwitz, Ramarathnam Venkatesan:
Random Cayley Digraphs and the Discrete Logarithm. ANTS 2002: 416-430 - [c31]Mehmet Kivanç Mihçak, Ramarathnam Venkatesan:
Blind image watermarking via derivation and quantization of robust semi-global statistics. ICASSP 2002: 3453-3456 - [c30]Mehmet Kivanç Mihçak, Ramarathnam Venkatesan, Mustafa Kesal:
Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks. Information Hiding 2002: 226-246 - [c29]Yuqun Chen, Ramarathnam Venkatesan, Matthew Cary, Ruoming Pang, Saurabh Sinha, Mariusz H. Jakubowski:
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive. Information Hiding 2002: 400-414 - 2001
- [c28]Mehmet Kivanç Mihçak, Ramarathnam Venkatesan:
New Iterative Geometric Methods for Robust Perceptual Image Hashing. Digital Rights Management Workshop 2001: 13-21 - [c27]Mehmet Kivanç Mihçak, Ramarathnam Venkatesan:
A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding. Information Hiding 2001: 51-65 - [c26]Ramarathnam Venkatesan, Vijay V. Vazirani, Saurabh Sinha:
A Graph Theoretic Approach to Software Watermarking. Information Hiding 2001: 157-168 - [i4]Leonid A. Levin, Ramarathnam Venkatesan:
An Average Case NP-complete Graph Problem. CoRR cs.CC/0112001 (2001) - [i3]Amod Agashe, Kristin E. Lauter, Ramarathnam Venkatesan:
Constructing elliptic curves with a given number of points over a finite field. IACR Cryptol. ePrint Arch. 2001: 96 (2001) - 2000
- [c25]Ramarathnam Venkatesan, Mariusz H. Jakubowski:
Image Watermarking with Better Resilience. ICIP 2000: 403-406 - [c24]Ramarathnam Venkatesan, S.-M. Koon, Mariusz H. Jakubowski, Pierre Moulin:
Robust Image Hashing. ICIP 2000: 664-666
1990 – 1999
- 1999
- [c23]William Aiello, Sivaramakrishnan Rajagopalan, Ramarathnam Venkatesan:
High-Speed Pseudorandom Number Generation with Small Memory. FSE 1999: 290-304 - 1998
- [j3]William Aiello, Sivaramakrishnan Rajagopalan, Ramarathnam Venkatesan:
Design of Practical and Provably Good Random Number Generators. J. Algorithms 29(2): 358-389 (1998) - [j2]Moni Naor, Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung:
Perfect Zero-Knowledge Arguments for NP Using Any One-Way Permutation. J. Cryptol. 11(2): 87-108 (1998) - [c22]William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan:
Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers. CRYPTO 1998: 390-407 - [c21]Dan Boneh, Ramarathnam Venkatesan:
Breaking RSA May Not Be Equivalent to Factoring. EUROCRYPT 1998: 59-71 - [c20]Victor Boyko, Marcus Peinado, Ramarathnam Venkatesan:
Speeding up Discrete Log and Factoring Based Schemes via Precomputations. EUROCRYPT 1998: 221-235 - [c19]Mariusz H. Jakubowski, Ramarathnam Venkatesan:
The Chain & Sum Primitive and Its Applications to MACs and Stream Ciphers. EUROCRYPT 1998: 281-293 - [c18]William Aiello, Stuart Haber, Ramarathnam Venkatesan:
New Constructions for Secure Hash Functions. FSE 1998: 150-167 - [i2]William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan:
Security amplification by composition: The case of doubly-iterated ideal ciphers. CoRR cs.CR/9809031 (1998) - [i1]William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan:
Security amplification by composition: The case of doubly-iterated, ideal ciphers. IACR Cryptol. ePrint Arch. 1998: 23 (1998) - 1997
- [j1]Sulaiman Al-Bassam, Ramarathnam Venkatesan, Sultan Al-Muhammadi:
New single asymmetric error-correcting codes. IEEE Trans. Inf. Theory 43(5): 1619-1623 (1997) - [c17]Marcus Peinado, Ramarathnam Venkatesan:
Highly Parallel Cryptographic Attacks. PVM/MPI 1997: 367-374 - [c16]Dan Boneh, Ramarathnam Venkatesan:
Rounding in Lattices and its Cryptographic Applications. SODA 1997: 675-681 - 1996
- [c15]Dan Boneh, Ramarathnam Venkatesan:
Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes. CRYPTO 1996: 129-142 - [c14]William Aiello, Ramarathnam Venkatesan:
Foiling Birthday Attacks in Length-Doubling Transformations - Benes: A Non-Reversible Alternative to Feistel. EUROCRYPT 1996: 307-320 - 1995
- [c13]William Aiello, Sivaramakrishnan Rajagopalan, Ramarathnam Venkatesan:
Design of Practical and Provably Good Random Number Generators (Extended Abstract). SODA 1995: 1-9 - [c12]Dennis Grinberg, Sivaramakrishnan Rajagopalan, Ramarathnam Venkatesan, Victor K. Wei:
Splay Trees for Data Compression. SODA 1995: 522-530 - [c11]William Aiello, Mihir Bellare, Ramarathnam Venkatesan:
Knowledge on the average-perfect, statistical and logarithmic. STOC 1995: 469-478 - 1994
- [c10]William Aiello, Ramarathnam Venkatesan, Moti Yung:
Coins, Weights and Contention in Balancing Networks. PODC 1994: 193-205 - 1993
- [c9]Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung:
Interactive Hashing Simplifies Zero-Knowledge Protocol Design. EUROCRYPT 1993: 267-273 - 1992
- [c8]Moni Naor, Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung:
Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract). CRYPTO 1992: 196-214 - [c7]Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung:
Secure Commitment Against A Powerful Adversary. STACS 1992: 439-448 - [c6]Ramarathnam Venkatesan, Sivaramakrishnan Rajagopalan:
Average Case Intractability of Matrix and Diophantine Problems (Extended Abstract). STOC 1992: 632-642 - 1991
- [c5]Sulaiman Al-Bassam, Bella Bose, Ramarathnam Venkatesan:
Burst and Unidirectional Error Detecting Codes. FTCS 1991: 378-384 - 1990
- [c4]Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung:
Fair Games against an All-Powerful Adversary. Advances In Computational Complexity Theory 1990: 155-169 - [c3]Oded Goldreich, Russell Impagliazzo, Leonid A. Levin, Ramarathnam Venkatesan, David Zuckerman:
Security Preserving Amplification of Hardness. FOCS 1990: 318-326
1980 – 1989
- 1988
- [c2]Ramarathnam Venkatesan, Leonid A. Levin:
Random Instances of a Graph Coloring Problem Are Hard. STOC 1988: 217-222 - 1986
- [c1]Joyce Friedman, Ramarathnam Venkatesan:
Categorial and Non-Categorial Languages. ACL 1986: 75-77
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint