History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 241 total

Role of normalization in spectral clustering for stochastic blockmodels. (English)
Ann. Stat. 43, No. 3, 962-990 (2015).
WorldCat.org
1
GA driven integrated exploration of loop unrolling factor and datapath for optimal scheduling of CDFGs during high level synthesis. (English)
CCECE, 75-80(2015)
WorldCat.org
2
Semi Random Position Based Steganography for Resisting Statistical Steganalysis. (English)
I. J. Network SecurityI. J. Network Security 17, N0. 1, 57-65(2015)
WorldCat.org
3
A huffman code based image steganography technique. (English)
Gupta, Prosenjit (ed.) et al., Applied algorithms. First international conference, ICAA 2014, Kolkata, India, January 13‒15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04125-4/pbk). Lecture Notes in Computer Science 8321, 257-265 (2014).
WorldCat.org
4
Advances in cryptology ‒ ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7‒11, 2014. Proceedings, Part I. (English)
Lecture Notes in Computer Science 8873. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). xx, 574~p. EUR~77.04 (2014).
WorldCat.org
5
Advances in cryptology ‒ ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7‒11, 2014, Proceedings, Part II. (English)
Lecture Notes in Computer Science 8874. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). xxii, 528~p. EUR~77.04 (2014).
WorldCat.org
6
Nonparametric link prediction in large scale dynamic networks. (English)
Electron. J. Stat. 8, No. 2, 2022-2065, electronic only (2014).
WorldCat.org
7
Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector. (English)
Cryptogr. Commun. 6, No. 3, 189-231 (2014).
WorldCat.org
8
Getting Your Big Data Priorities Straight: A Demonstration of Priority-based QoS using Social-network-driven Stock Recommendation. (English)
PVLDBPVLDB 7, N0. 13, 1665-1668(2014)
WorldCat.org
9
Scaling Up Crowd-Sourcing to Very Large Datasets: A Case for Active Learning. (English)
PVLDBPVLDB 8, N0. 2, 125-136(2014)
WorldCat.org
10
Some Randomness Experiments on TRIVIUM. (English)
SPACE, 219-236(2014)
WorldCat.org
11
How Many Eyeballs Does a Bug Need? An Empirical Validation of Linus’ Law. (English)
XP, 242-250(2014)
WorldCat.org
12
Efficient (Anonymous) Compact HIBE from Standard Assumptions. (English)
ProvSec, 243-258(2014)
WorldCat.org
13
A Tutorial on Different Classification Techniques for Remotely Sensed Imagery Datasets. (English)
Smart CRSmart CR 4, 34-43(2014)
WorldCat.org
14
Location-Based Image Steganography. (English)
Smart CRSmart CR 4, 130-139(2014)
WorldCat.org
15
Developer involvement considered harmful?: an empirical examination of Android bug resolution times. (English)
SSE@SIGSOFT FSE, 45-48(2014)
WorldCat.org
16
A comprehensive fault diagnosis technique for reversible logic circuits. (English)
Computers & Electrical EngineeringComputers & Electrical Engineering 40, N0. 7, 2259-2272(2014)
WorldCat.org
17
An Approach to Continuous Pervasive Care of Remote Patients Based on Priority Based Assignment of Nurse. (English)
CISIM, 327-338(2014)
WorldCat.org
18
Designing prosody rule-set for converting neutral TTS speech to storytelling style speech for Indian languages: Bengali, Hindi and Telugu. (English)
IC3, 473-477(2014)
WorldCat.org
19
Towards a More Democratic Mining in Bitcoins. (English)
ICISS, 185-203(2014)
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 241 total

Valid XHTML 1.0 Transitional Valid CSS!