History
1
254


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 254 total

Multidimensional zero-correlation linear cryptanalysis on 23-round lblock-s. (English)
Qing, Sihan (ed.) et al., Information and communications security. 17th international conference, ICICS 2015, Beijing, China, December 9‒11, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-29813-9/pbk; 978-3-319-29814-6/ebook). Lecture Notes in Computer Science 9543, 97-108 (2016).
WorldCat.org
1
Improved algorithms for joint optimization of facility locations and network connections. (English)
European Journal of Operational Research 250, N0. 3, 745-753(2016)
WorldCat.org
2
A fast transition of linear temporal logic formulae to transition-based Büchi automata. (English)
IJCAT 53, N0. 1, 62-70(2016)
WorldCat.org
3
A learning-based path relinking algorithm for the bandwidth coloring problem. (English)
Eng. Appl. of AI 52, 81-91(2016)
WorldCat.org
4
An interval-valued intuitionistic fuzzy MABAC approach for material selection with incomplete weight information. (English)
Appl. Soft Comput. 38, 703-713(2016)
WorldCat.org
5
Adaptive modelling of non-linear errors-in-variables systems. (English)
IJCAT 53, N0. 1, 71-81(2016)
WorldCat.org
6
Iterative Reweighted Minimax Phase Error Designs of IIR Digital Filters With Nearly Linear Phases. (English)
IEEE Trans. Signal Processing 64, N0. 9, 2416-2428(2016)
WorldCat.org
7
Calibration Technique for Maximum Power Harvest of Passive Wireless Microsystems. (English)
CSSP 35, N0. 7, 2283-2297(2016)
WorldCat.org
8
A tabu search based memetic algorithm for the max-mean dispersion problem. (English)
Computers & OR 72, 118-127(2016)
WorldCat.org
9
Application of maximum entropy method in reliability computation. (Chinese)
Chin. J. Comput. Mech. 32, No. 1, 41-47 (2015).
WorldCat.org
10
Capacity and data complexity in multidimensional linear attack. (English)
Gennaro, Rosario (ed.) et al., Advances in cryptology ‒ CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16‒20, 2015. Proceedings. Part I. Berlin, Heidelberg: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 141-160 (2015).
WorldCat.org
11
Attacks on a double length blockcipher-based hash proposal. (English)
Cryptogr. Commun. 7, No. 3, 289-295, electronic only (2015).
WorldCat.org
12
On the analysis of the $(1+1)$ evolutionary algorithm for the maximum leaf spanning tree problem. (English)
Int. J. Comput. Math. 92, No. 10, 2023-2035 (2015).
WorldCat.org
13
Optimal assignment schemes for general access structures based on linear programming. (English)
Des. Codes Cryptography 74, No. 3, 623-644 (2015).
WorldCat.org
14
Singularity-avoiding swing-up control for underactuated three-link gymnast robot using virtual coupling between control torques. (English)
Int. J. Robust Nonlinear Control 25, No. 2, 207-221 (2015).
WorldCat.org
15
Cooperative service model innovation and pilot application in the prevention and control on diabetic retinopathy with web-movable hand-hold fundus camera in regional health and medicine of digitization. (English)
BIBM, 1731-1733(2015)
WorldCat.org
16
Event-Driven Gait Recognition Method Based on Dynamic Temporal Segmentation. (English)
BWCCA, 522-527(2015)
WorldCat.org
17
Classification of Evoked Emotions Using an Artificial Neural Network Based on Single, Short-Term Physiological Signals. (English)
JACIII 19, N0. 1, 118-126(2015)
WorldCat.org
18
Stabilization of underactuated two-link gymnast robot by using trajectory tracking strategy. (English)
Applied Mathematics and Computation 253, 193-204(2015)
WorldCat.org
19
A matrix-based constrained minimax design of 2-D FIR filters with reduced group delay error. (English)
DSP, 24-28(2015)
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 254 total

Valid XHTML 1.0 Transitional Valid CSS!