_id,doi,title
1162,10.1103/PhysRevB.95.024506,Universal properties of high temperature superconductors from real space pairing t-J-U model and its quantitative comparison with experiment
1163,10.1088/1361-648X/aa532f,"Unconventional superconductivity in generalized Hubbard model role of electron–hole symmetry breaking terms"
11633,10.48550/arXiv.1711.02890,FliPer: Checking the reliability of global seismic parameters from automatic pipelines
11651,,Capacity releasing diffusion for speed and locality
11665,10.1145/3146550,Sublinear-time maintenance of breadth-first spanning trees in partially dynamic networks
11676,10.1007/s00453-015-0066-y,Maximizing a submodular function with viability constraints
1168,10.1007/s10260-016-0375-6,D inf s optimality in copula models
1169,10.1534/genetics.116.193946,Spatial gene frequency waves under genotype dependent dispersal
1173,10.1007/s00493-016-3308-y,The Voronoi functional is maximized by the Delaunay triangulation in the plane
1174,10.4230/LIPIcs.STACS.2017.57,Lower bounds on key derivation for square-friendly applications
1175,10.4230/LIPIcs.ITCS.2017.38,Cumulative space in black-white pebbling and resolution
1176,10.1109/EuroSP.2017.47,Towards practical attacks on Argon2i and balloon hashing
11772,10.1007/978-3-319-73117-9_3,The state of the art in dynamic graph algorithms
1178,10.1007/978-3-662-53641-4_7,"Simulating auxiliary inputs, revisited"
787,doi.org/10.1137/1.9781611974782.169,Time-space trade-offs in population protocols
788,10.1007/978-3-319-66799-7_11,Robust detection in leak-prone population protocols
789,10.1145/3064176.3064214,Forkscan: Conservative memory reclamation for modern operating systems
790,10.1109/FCCM.2017.39,FPGA-accelerated dense linear machine learning: A precision-convergence trade-off
791,10.1145/3087801.3087810,The power of choice in priority scheduling
792,10.1017/jfm.2017.699,Relative periodic orbits form the backbone of turbulent pipe flow
