History
1
447

Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 447 total

Automated analysis of performance and energy consumption for cloud applications. (English)
ICPE, 39-50(2014)
1
Topological density of lattice nets. (English)
Acta Crystallogr., Sect. A 69, No. 1, 119-121 (2013).
2
Word symmetric functions and the Redfield-Pólya theorem. (English)
Proceedings of the 25th international conference on formal power series and algebraic combinatorics, FPSAC 2013, Paris, France, June 24‒28, 2013. Nancy: The Association. Discrete Mathematics \& Theoretical Computer Science (DMTCS). Discrete Mathematics and Theoretical Computer Science. Proceedings, 563-574, electronic only (2013).
3
Deductive verification of state-space algorithms. (English)
Johnsen, Einar Broch (ed.) et al., Integrated formal methods. 10th international conference, IFM 2013, Turku, Finland, June 10‒14, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38612-1/pbk). Lecture Notes in Computer Science 7940, 124-138 (2013).
4
Editorial: Generation of combinatorial structures. (English)
Theor. Comput. Sci. 502, 1-3 (2013).
5
Caracterisation des classes de ($\leq 3$)-hypomorphie a l’aide d’interdits. (French)
Proyecciones 32, No. 2, 91-105 (2013).
6
Sparse approaches for the exact distribution of patterns in long state sequences generated by a Markov source. (English)
Theor. Comput. Sci. 479, 22-42 (2013).
7
Matrix powers algorithms for trust evaluation in public-key infrastructures. (English)
Jøsang, Audun (ed.) et al., Security and trust management. 8th international workshop, STM 2012, Pisa, Italy, September 13‒14, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-38003-7/pbk). Lecture Notes in Computer Science 7783, 129-144 (2013).
8
Brandt’s fully private auction protocol revisited. (English)
Youssef, Amr (ed.) et al., Progress in cryptology ‒ AFRICACRYPT 2013. 6th international conference on cryptology in Africa, Cairo, Egypt, June 22‒24, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38552-0/pbk). Lecture Notes in Computer Science 7918, 88-106 (2013).
9
Employing Creative Practice as a Research Method in the Field of Wearable and Interactive Technologies. (English)
HCI (28), 31-35(2013)
10
Enumerating Pseudo-Intents in a Partial Order. (English)
CLA, 45-56(2013)
11
Awesome!: conveying satisfaction on the app store. (English)
OZCHI, 229-232(2013)
12
Fast implementation of dense stereo vision algorithms on a highly parallel SIMD architecture. (English)
J. Real-Time Image ProcessingJ. Real-Time Image Processing 8, N0. 4, 421-435(2013)
13
Secure JTAG Implementation Using Schnorr Protocol. (English)
J. Electronic TestingJ. Electronic Testing 29, N0. 2, 193-209(2013)
14
Experimental analysis of task-based energy consumption in cloud computing systems. (English)
ICPE, 295-306(2013)
15
Simultaneous computation of the row and column rank profiles. (English)
ISSAC, 181-188(2013)
16
An algorithm for computing customized 3D printed implants with curvature constrained channels for enhancing intracavitary brachytherapy radiation delivery. (English)
CASE, 466-473(2013)
17
A simulation-and-regression approach for stochastic dynamic programs with endogenous state variables. (English)
Computers & ORComputers & OR 40, N0. 11, 2760-2769(2013)
18
Controllability and invariance of monotone systems for robust ventilation automation in buildings. (English)
CDC, 1289-1294(2013)
19
Studying the effectiveness of android application permissions requests. (English)
PerCom Workshops, 291-296(2013)
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 447 total