History
1
73


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 73 total

An optimal investment, consumption, leisure, and voluntary retirement problem with Cobb-Douglas utility: Dynamic programming approaches. (English)
Appl. Math. Lett.Appl. Math. Lett. 26, N0. 4, 481-486(2013)
WorldCat.org
1
Optimal Reference Vector Selection Algorithm in Subspace Interference Alignment to Maximize System Throughput. (English)
Wireless Personal CommunicationsWireless Personal Communications 71, N0. 2, 1085-1094(2013)
WorldCat.org
2
Simultaneous Color Camera and Depth Sensor Calibration with Correction of Triangulation Errors. (English)
ISVC (1), 301-311(2013)
WorldCat.org
3
A novel approach to visualize web anomaly attacks in pervasive computing environment. (English)
The Journal of SupercomputingThe Journal of Supercomputing 65, N0. 1, 301-316(2013)
WorldCat.org
4
Immersive virtual aquarium with real-walking navigation. (English)
VRCAI, 291-294(2013)
WorldCat.org
5
A Design of Low Latency Random Access Preamble Detector for LTE Uplink Receiver. (English)
IEICE TransactionsIEICE Transactions 96-B, N0. 5, 1089-1096(2013)
WorldCat.org
6
Biclique attack on the full HIGHT. (English)
Kim, Howon (ed.), Information security and cryptology ‒ ICISC 2011. 14th international conference, Seoul, Korea, November 30‒December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 365-374 (2012).
WorldCat.org
7
Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent. (English)
IEICE TransactionsIEICE Transactions 95-A, N0. 1, 372-380(2012)
WorldCat.org
8
MIMO Detection Techniques Based on Low Complexity Adaptive QR-Decomposition with M-Algorithm for 3GPP LTE Systems. (English)
Wireless Personal CommunicationsWireless Personal Communications 67, N0. 3, 505-523(2012)
WorldCat.org
9
Transmit beamforming with imperfect CSIT in spectrum leasing for physical-layer security. (English)
CCNC, 874-878(2012)
WorldCat.org
10
A fully integrated dual-mode CMOS power amplifier for WCDMA applications. (English)
ISSCC, 82-84(2012)
WorldCat.org
11
Interference Alignment with Cooperative Primary Receiver in Cognitive Networks. (English)
IEEE Communications LettersIEEE Communications Letters 16, N0. 7, 1072-1075(2012)
WorldCat.org
12
Related-key attack on the full HIGHT. (English)
Rhee, Kyung-Hyune (ed.) et al., Information security and cryptology ‒ ICISC 2010. 13th international conference, Seoul, Korea, December 1‒3, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-24208-3/pbk). Lecture Notes in Computer Science 6829, 49-67 (2011).
WorldCat.org
13
A novel low-power RF4CE-based communication framework for multimedia system control. (English)
Int. J. Communication SystemsInt. J. Communication Systems 24, N0. 10, 1340-1353(2011)
WorldCat.org
14
A Single Amplifier-Based 12-bit 100 MS/s 1 V 19 mW 0.13 {$μ$}m CMOS ADC with Various Power and Area Minimized Circuit Techniques. (English)
IEICE TransactionsIEICE Transactions 94-C, N0. 8, 1282-1288(2011)
WorldCat.org
15
Related-Key Boomerang Attack on Block Cipher SQUARE. (English)
IEICE TransactionsIEICE Transactions 94-A, N0. 1, 3-9(2011)
WorldCat.org
16
Novel approaches to enhance mobile WiMAX security. (English)
EURASIP J. Wirel. Commun. Netw. 2010, Article ID 926275, 11 p. (2010).
WorldCat.org
17
Improved preimage attack for 68-step HAS-160. (English)
Lee, Donghoon (ed.) et al., Information, security and cryptology ‒ ICISC 2009. 12th international conference, Seoul, Korea, December 2‒4, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14422-6/pbk). Lecture Notes in Computer Science 5984, 332-348 (2010).
WorldCat.org
18
Preimage attacks on reduced steps of ARIRANG and PKC98-hash. (English)
Lee, Donghoon (ed.) et al., Information, security and cryptology ‒ ICISC 2009. 12th international conference, Seoul, Korea, December 2‒4, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14422-6/pbk). Lecture Notes in Computer Science 5984, 315-331 (2010).
WorldCat.org
19
Impersonation attack on the strong identification based on a hard-on-average problem. (English)
Bull. Korean Math. Soc. 47, No. 1, 63-71 (2010).
WorldCat.org
20
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 73 total

Valid XHTML 1.0 Transitional Valid CSS!