1
Published 2013
Table of Contents: ... are Parallel Connections better than Series Connections -- Optimization of Carrier Harvest in Meg Based Hybrid...
View full text
Electronic eBook
2
Published 2012
Table of Contents: ...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...
View full text
Electronic eBook
3
Published 2005
Table of Contents: ... -- Computing Upward Planar Drawings Using Switch-Regularity Heuristics -- Serial and Parallel Multilevel Graph...
View full text
Electronic eBook
4
Published 2008
Table of Contents: ... Encryption -- Taming of Pict -- Classification, Formalization and Verification of Security Functional...
View full text
Electronic eBook
5
Published 2007
Table of Contents: ... 1-Branching Programs of Width 3 -- Formal Translation Directed by Parallel LLP Parsing -- Self...
View full text
Electronic eBook
6
Published 2008
Table of Contents: ... of Trivium -- Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical...
View full text
Electronic eBook
7
Published 2005
Table of Contents: ...Keynote Talk -- Exploiting Multiple Levels of Parallelism in Scientific Computing -- Distributed...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ... and Limiting Ratio of Boolean Functions over Implication -- Succinctness of Regular Expressions...
View full text
Electronic eBook
9
Published 2011
Table of Contents: ... Recognition System -- Study on Architecture and Performances of Dual Track SAW Device -- Adaptive Function...
View full text
Electronic eBook
10
Published 2008
Table of Contents: ... Propositional Theories -- Abstract Answer Set Solvers -- Partial Functions and Equality in Answer Set...
View full text
Electronic eBook
11
Published 2008
Table of Contents: ... in General-Purpose Computations on Current Graphics Processors -- Optimised Computational Functional Imaging...
View full text
Electronic eBook
12
Published 2014
Table of Contents: ... and Operational States of Wind Turbines -- The Parallel Approach to the Conjugate Gradient Learning Algorithm...
View full text
Electronic eBook
13
Published 2015
Table of Contents: ... Transfer -- Security Breach Possibility with RSS-Based Localization of Smart Meters Incorporating Maximum...
View full text
Electronic eBook
14
Published 2013
Table of Contents: ...Customized Opinion Mining using Intelligent Algorithms -- Information Security Measurement Roles...
View full text
Electronic eBook
15
Published 2015
Table of Contents: ... Rehabilitation Process; S.Salim, et al -- A Security Protocol based-on Mutual Authentication Application toward...
View full text
Electronic eBook
16
Published 2007
Table of Contents: ...-Biology -- Speedup Analysis for Parallel Implementation of Model of Response Accuracy and Response Time...
View full text
Electronic eBook
17
Published 2014
Table of Contents: ...Image and Template Security for Palmprint -- Extending Network Lifetime by Time Constrained Data...
View full text
Electronic eBook
18
Published 2014
Table of Contents: ... -- Studies on Quasi-Z-Source-Based Isolated DC/DC Converter for Distributed Power Generation -- Security...
View full text
Electronic eBook
19
Published 2015
Table of Contents: ... Requirements in Function-Centered Engineering of Embedded Systems -- Estimating the Implementation Risk...
View full text
Electronic eBook
20
Published 2015
Table of Contents: ... for Generating RWG Function -- Internal AC Fault of Converter Station Based on Modular Multilevel Converter High...
View full text
Electronic eBook