Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
anonymous functionality » anonymous functions
functionality function » functionals function, functionaries function, functional functions
computing anonymous » composing anonymous, cutting anonymous, computing amorphous
function https » functions https, fiction https
anonymous functionality » anonymous functions
functionality function » functionals function, functionaries function, functional functions
computing anonymous » composing anonymous, cutting anonymous, computing amorphous
function https » functions https, fiction https
1
Published 2005
Table of Contents:
“... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...”View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“... Linear Array -- Parallel Prefix Computation in the Recursive Dual-Net -- A Two-Phase Differential...”View full text
Electronic
eBook
3
Published 2010
Table of Contents:
“... Computation and Communication -- Session 1A. Approximation Algorithm I -- Faster Algorithms for Feedback Arc...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“... Discriminant Analysis and RBF Neural Network -- Parallel Enumeration Sort on OTIS-Hypercube -- A Robust Trust...”View full text
Electronic
eBook
5
Published 2014
Table of Contents:
“... and Chemical Networks -- Speed Faults in Computation by Chemical Reaction Networks -- Fault-Tolerant ANTS...”View full text
Electronic
eBook
6
Published 2007
Table of Contents:
“...Power Aware Computing -- Real-Time Loop Scheduling with Energy Optimization Via DVS and ABB...”View full text
Electronic
eBook
7
Published 2013
Table of Contents:
“... Industrial Robots -- A Combined Position Evaluation Function in Chinese Chess Computer Game -- Modeling...”View full text
Electronic
eBook
8
Published 2008
Table of Contents:
“... Level Parallelism and Register File Traffic -- Scalable Architecture for Prefix Preserving Anonymization...”View full text
Electronic
eBook
9
Published 2005
Table of Contents:
“... -- Computing Upward Planar Drawings Using Switch-Regularity Heuristics -- Serial and Parallel Multilevel Graph...”View full text
Electronic
eBook
10
Published 2007
Table of Contents:
“... Anonymous Attestation Scheme for Embedded Devices -- Anonymous Signatures Made Easy -- On the Generic...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“... -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor...”View full text
Electronic
eBook
12
Published 2006
Table of Contents:
“... of Discrete Logarithm -- Distributed Crypto-computing -- Efficient Polynomial Operations in the Shared...”View full text
Electronic
eBook
13
Published 2006
Table of Contents:
“... to Iterative Servers (Short Paper) -- An Independent Function-Parallel Firewall Architecture for High-Speed...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“...Invited Talk -- The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition...”View full text
Electronic
eBook
15
Published 2005
Table of Contents:
“... for Computing Fisher Equilibrium in the Absence of Gross Substitutability Property -- Click Fraud Resistant...”View full text
Electronic
eBook
16
Published 2005
Table of Contents:
“... on the Joint Linear Complexity Profile of Multisequences -- Period of Streamcipher Edon80 -- Boolean Function...”View full text
Electronic
eBook
17
Published 2007
Table of Contents:
“... -- A New Strategy for Finding a Differential Path of SHA-1 -- Preimage Attack on the Parallel FFT...”View full text
Electronic
eBook
18
Published 2012
Table of Contents:
“... on Reduced-Round MISTY1.- Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs...”View full text
Electronic
eBook
19
Published 2005
Table of Contents:
“...-Party Computation -- Parallel Multi-party Computation from Linear Multi-secret Sharing Schemes...”View full text
Electronic
eBook
20
Published 2015
Table of Contents:
“... in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature...”View full text
Electronic
eBook



