History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 240 total

Semi Random Position Based Steganography for Resisting Statistical Steganalysis. (English)
I. J. Network SecurityI. J. Network Security 17, N0. 1, 57-65(2015)
WorldCat.org
1
GA driven integrated exploration of loop unrolling factor and datapath for optimal scheduling of CDFGs during high level synthesis. (English)
CCECE, 75-80(2015)
WorldCat.org
2
A huffman code based image steganography technique. (English)
Gupta, Prosenjit (ed.) et al., Applied algorithms. First international conference, ICAA 2014, Kolkata, India, January 13‒15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04125-4/pbk). Lecture Notes in Computer Science 8321, 257-265 (2014).
WorldCat.org
3
Advances in cryptology ‒ ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7‒11, 2014. Proceedings, Part I. (English)
Lecture Notes in Computer Science 8873. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). xx, 574~p. EUR~77.04 (2014).
WorldCat.org
4
Advances in cryptology ‒ ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7‒11, 2014, Proceedings, Part II. (English)
Lecture Notes in Computer Science 8874. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). xxii, 528~p. EUR~77.04 (2014).
WorldCat.org
5
Nonparametric link prediction in large scale dynamic networks. (English)
Electron. J. Stat. 8, No. 2, 2022-2065, electronic only (2014).
WorldCat.org
6
Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector. (English)
Cryptogr. Commun. 6, No. 3, 189-231 (2014).
WorldCat.org
7
Towards a More Democratic Mining in Bitcoins. (English)
ICISS, 185-203(2014)
WorldCat.org
8
A Tutorial on Different Classification Techniques for Remotely Sensed Imagery Datasets. (English)
Smart CRSmart CR 4, 34-43(2014)
WorldCat.org
9
A comprehensive fault diagnosis technique for reversible logic circuits. (English)
Computers & Electrical EngineeringComputers & Electrical Engineering 40, N0. 7, 2259-2272(2014)
WorldCat.org
10
Designing prosody rule-set for converting neutral TTS speech to storytelling style speech for Indian languages: Bengali, Hindi and Telugu. (English)
IC3, 473-477(2014)
WorldCat.org
11
Some Randomness Experiments on TRIVIUM. (English)
SPACE, 219-236(2014)
WorldCat.org
12
Getting Your Big Data Priorities Straight: A Demonstration of Priority-based QoS using Social-network-driven Stock Recommendation. (English)
PVLDBPVLDB 7, N0. 13, 1665-1668(2014)
WorldCat.org
14
Scaling Up Crowd-Sourcing to Very Large Datasets: A Case for Active Learning. (English)
PVLDBPVLDB 8, N0. 2, 125-136(2014)
WorldCat.org
15
Efficient (Anonymous) Compact HIBE from Standard Assumptions. (English)
ProvSec, 243-258(2014)
WorldCat.org
16
Developer involvement considered harmful?: an empirical examination of Android bug resolution times. (English)
SSE@SIGSOFT FSE, 45-48(2014)
WorldCat.org
17
Concrete Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme. (English)
IEEE Trans. ComputersIEEE Trans. Computers 63, N0. 7, 1709-1722(2014)
WorldCat.org
18
An Approach to Continuous Pervasive Care of Remote Patients Based on Priority Based Assignment of Nurse. (English)
CISIM, 327-338(2014)
WorldCat.org
19
How Many Eyeballs Does a Bug Need? An Empirical Validation of Linus’ Law. (English)
XP, 242-250(2014)
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 240 total

Valid XHTML 1.0 Transitional Valid CSS!