History
1
263


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 263 total

A local adaptive Catmull-Rom to reduce numerical dissipation of semi-Lagrangian advection. (English)
Journal of Visualization and Computer AnimationJournal of Visualization and Computer Animation 26, N0. 2, 141-146(2015)
WorldCat.org
1
Pleco and Plectron - Two Provably Secure Password Hashing Algorithms. (English)
CODASPY, 127-129(2015)
WorldCat.org
2
Conference key establishment protocol using a multivariate polynomial and its applications. (English)
Security and Communication NetworksSecurity and Communication Networks 8, N0. 9, 1794-1800(2015)
WorldCat.org
3
Real-time load balancing scheduling algorithm for periodic simulation models. (English)
Simulation Modelling Practice and TheorySimulation Modelling Practice and Theory 52, 123-134(2015)
WorldCat.org
4
Reducing numerical dissipation in smoke simulation. (English)
Graphical ModelsGraphical Models 78, 10-25(2015)
WorldCat.org
5
An improved adaptive genetic algorithm based on Hamming distance. (Chinese)
J. Jiangsu Norm. Univ., Nat. Sci. 32, No. 4, 51-54 (2014).
WorldCat.org
6
Generating good span $n$ sequences using orthogonal functions in nonlinear feedback shift registers. (English)
Koç, Çetin Kaya (ed.), Open problems in mathematics and computational science. Based on the presentations at the conference, Istanbul, Turkey, September 18‒20, 2013. Cham: Springer (ISBN 978-3-319-10682-3/hbk; 978-3-319-10683-0/ebook). 127-162 (2014).
WorldCat.org
7
Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64. (English)
Cryptogr. Commun. 6, No. 4, 313-333 (2014).
WorldCat.org
8
Generation of TPMACA for pattern classification. (English)
W\c{a}s, Jarosław (ed.) et al., Cellular automata. 11th international conference on cellular automata for research and industry, ACRI 2014, Krakow, Poland, September 22‒25, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-11519-1/pbk). Lecture Notes in Computer Science 8751, 408-416 (2014).
WorldCat.org
9
Optimal parameters for the WG stream cipher family. (English)
Cryptogr. Commun. 6, No. 2, 117-135 (2014).
WorldCat.org
10
A unified method for finding impossible differentials of block cipher structures. (English)
Inf. Sci.Inf. Sci. 263, 211-220(2014)
WorldCat.org
11
Multi-agent based modeling and simulation of microscopic traffic in virtual reality system. (English)
Simulation Modelling Practice and TheorySimulation Modelling Practice and Theory 45, 62-79(2014)
WorldCat.org
12
A supportive architecture for CFD-based design optimisation. (English)
Enterprise ISEnterprise IS 8, N0. 2, 246-278(2014)
WorldCat.org
13
Inside Debt and the Design of Corporate Debt Contracts. (English)
Management ScienceManagement Science 60, N0. 5, 1260-1280(2014)
WorldCat.org
14
New binary sequences with good correlation based on high-order difference and interleaving techniques. (English)
ISIT, 1663-1666(2014)
WorldCat.org
15
A new efficient physical layer OFDM encryption scheme. (English)
INFOCOM, 1024-1032(2014)
WorldCat.org
16
Fault-Tolerant Energy Efficiency Computing Approach for Sparse Sampling Under Wireless Sensor Smart Grid. (English)
Wireless Personal CommunicationsWireless Personal Communications 79, N0. 3, 2041-2058(2014)
WorldCat.org
17
Loxin - A solution to password-less universal login. (English)
INFOCOM Workshops, 488-493(2014)
WorldCat.org
18
Evidence of positive selection on D-lactate dehydrogenases in Lactobacillus delbrueckii subsp. bulgaricus. (English)
BIBM, 31-38(2014)
WorldCat.org
19
New Implementations of the WG Stream Cipher. (English)
IEEE Trans. VLSI Syst.IEEE Trans. VLSI Syst. 22, N0. 9, 1865-1878(2014)
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 263 total

Valid XHTML 1.0 Transitional Valid CSS!