Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality security » functionality securing, functional security, functionality usability
problems functionality » protein functionality, problem functional, problem functionals
parallel optimization » parameter optimization, parameters optimization, parallel simulation
https » http
functionality security » functionality securing, functional security, functionality usability
problems functionality » protein functionality, problem functional, problem functionals
parallel optimization » parameter optimization, parameters optimization, parallel simulation
https » http
1
Published 2010
Table of Contents:
“... and Generalisation: Footprints in Instance Space -- Adaptive Drift Analysis -- Optimizing Monotone Functions Can...”View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“... Optical Networks -- A Parallel O(n27n/8) Time-Memory-Processor Tradeoff for Knapsack-Like Problems...”View full text
Electronic
eBook
3
Published 2010
Table of Contents:
“... Framework for Blade-Based Data Center -- Query Optimization over Parallel Relational Data Warehouses...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“... for the Parallel Solution of Symmetric Tridiagonal Eigenvalue Problems -- A Parallel Solution of Large-Scale Heat...”View full text
Electronic
eBook
5
Published 2015
Table of Contents:
“... Security Policies Based on OrBAC -- Optimal Proximity Proofs -- Simpler CCA-Secure Public Key Encryption...”View full text
Electronic
eBook
6
Published 2007
Table of Contents:
“...Stream Ciphers -- An Analysis of the Hermes8 Stream Ciphers -- On the Security of the LILI Family...”View full text
Electronic
eBook
7
Published 2013
Table of Contents:
“... Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic...”View full text
Electronic
eBook
8
Published 2010
Table of Contents:
“... Salesman Problem -- Improved Inapproximability for Submodular Maximization -- Approximation Algorithms...”View full text
Electronic
eBook
9
Published 2008
Table of Contents:
“... and Solving Approaches -- Employing “Particle Swarm Optimization” and “Fuzzy Ranking Functions” for Direct...”View full text
Electronic
eBook
10
Published 2015
Table of Contents:
“... Improvements in Glowworm Swarm Optimization can Solve Real Life Problems -- Cryptanalysis of Transposition...”View full text
Electronic
eBook
11
Published 2005
Table of Contents:
“... Density Attacks to Low-Weight Knapsacks -- Efficient and Secure Elliptic Curve Point Multiplication Using...”View full text
Electronic
eBook
12
Published 2014
Table of Contents:
“... -- On the Fekete-Szegö Problem for Certain Subclass of Analytic Functions -- Bi-Objective Scheduling on Parallel...”View full text
Electronic
eBook
13
Published 2010
Table of Contents:
“... Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience -- Elliptic Curves...”View full text
Electronic
eBook
14
Published 2012
Table of Contents:
“...-malleability of the Fiat-Shamir Transform -- Another Look at Symmetric Incoherent Optimal Eavesdropping against...”View full text
Electronic
eBook
15
Published 2006
Table of Contents:
“... Application to Security Evaluation of the HB Protocols for RFID Authentication -- Hash Functions -- Update...”View full text
Electronic
eBook
16
Published 2010
Table of Contents:
“... for Heterogeneous Web Servers -- A Choice of Optimal Packet Dropping Function for Active Queue Management -- A...”View full text
Electronic
eBook
17
Published 2005
Table of Contents:
“... of Order r -- Towards Optimal Double-Length Hash Functions -- Design Principles -- Near Optimal Algorithms...”View full text
Electronic
eBook
18
Published 2006
Table of Contents:
“... -- Round-Optimal and Efficient Verifiable Secret Sharing -- Universally-Composible Security -- Generalized...”View full text
Electronic
eBook
19
Published 2014
Table of Contents:
“... -- Task Allocation in Ant Colonies -- Agreement Problems -- Communication-Efficient Randomized Consensus...”View full text
Electronic
eBook
20
Published 2006
Table of Contents:
“...Cryptanalysis -- Security Analysis of the Strong Diffie-Hellman Problem -- Cryptography in Theory...”View full text
Electronic
eBook



