Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality function » functionals function, functionaries function, functional functions
parallel function » parallel functional, parallel auction, parallel union
key functionality » new functionality, cell functionality, _ functionality
function https » functions https, fiction https
function key » functions key, function kim, function ko
functionality function » functionals function, functionaries function, functional functions
parallel function » parallel functional, parallel auction, parallel union
key functionality » new functionality, cell functionality, _ functionality
function https » functions https, fiction https
function key » functions key, function kim, function ko
1
Published 2003
Table of Contents:
“... -- Isolation of Polysomal RNA for Microarray Analysis -- Parallel Analysis of Gene Copy Number and Expression...”View full text
Electronic
eBook
2
Published 2014
Table of Contents:
“... Transcriptome using Directional Deep sequencing and Parallel Analysis of RNA Ends -- Measurement...”View full text
Electronic
eBook
3
Published 2014
Table of Contents:
“...-Specific Recombination -- Application of In-Fusion™ Cloning for the Parallel Construction of Escherichia...”View full text
Electronic
eBook
4
Published 2005
Table of Contents:
“... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...”View full text
Electronic
eBook
5
Published 2010
Table of Contents:
“... Analysis -- Bootstrap Tests of Hypotheses -- Generating Random Numbers -- Practically Trivial Parallel Data...”View full text
Electronic
eBook
6
Published 2010
Table of Contents:
“... in Distributed Environments by Simultaneous Fragmentation and Allocation -- Parallel Architectures -- Function...”View full text
Electronic
eBook
7
Published 2005
Table of Contents:
“... of Functionally Defined Objects on Distributed Systems -- Automated Digital Image Registration and its Parallel...”View full text
Electronic
eBook
8
Public Key Cryptography - PKC 2007 10th International Conference on Practice and Theory in Public...
Published 2007
Table of Contents:
“... of Group-Based Key Agreement Protocols Using Subgroup Distance Functions -- Cryptanalysis -- Length Based...”View full text
Electronic
eBook
9
Published 2006
Table of Contents:
“... -- Parallel Key-Insulated Public Key Encryption -- Provably Secure Steganography with Imperfect Sampling...”View full text
Electronic
eBook
10
Table of Contents:
“...Introducing Parallel Programming -- Task Programming Hibernate -- Sharing Data -- Coordinating...”
View full text
View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“...Workshop on Scheduling for Parallel Computing (SPC 2009) -- Fully Polynomial Time Approximation...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“... for Many-Objective Optimization -- pMODE-LD+SS: An Effective and Efficient Parallel Differential Evolution...”View full text
Electronic
eBook
13
Table of Contents:
“... -- Hypersurfaces of a sphere with parallel shape operator -- Codimension reduction of a submanifold -- CR...”
View full text
View full text
Electronic
eBook
14
Published 2006
Subjects:
“...Computer Communication Networks. https://scigraph.springernature.com/ontologies/product-market...”View full text
Electronic
eBook
15
Published 2008
Table of Contents:
“... of Trivium -- Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical...”View full text
Electronic
eBook
16
Table of Contents:
“.... Definition and Holders of Key Functions -- 8. Supervisory Review of Key Functions -- 9. ‘Senior Management...”
View full text
View full text
Electronic
eBook
17
Table of Contents:
“...What Is Enumeration? -- Generating Functions Count -- Working with Generating Functions...”
View full text
View full text
Electronic
eBook
18
Published 2010
Table of Contents:
“... Computation of Subgroup Keys -- Quantum Readout of Physical Unclonable Functions -- Ciphers and Hash Functions...”View full text
Electronic
eBook
19
Published 2010
Table of Contents:
“...Invited Talk -- The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition...”View full text
Electronic
eBook
20
Published 2014
Table of Contents:
“... -- Isogenies in Theory and Praxis -- Another Look at Security Theorems for 1-Key Nested MACs -- Non-extendable...”View full text
Electronic
eBook



