Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
securing https » security https, security http, securing rtp
solving https » solving http, policing https, smoking https
problem » problems
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
securing https » security https, security http, securing rtp
solving https » solving http, policing https, smoking https
problem » problems
1
Published 2010
Table of Contents:
“... for the LeadingOnes Problem -- Mirrored Sampling and Sequential Selection for Evolution Strategies -- Optimisation...”View full text
Electronic
eBook
2
Published 2014
Table of Contents:
“... Sandwich Plates of Linearly Varying Thickness -- Solve Shortest Paths Problem by using Artificial Bee...”View full text
Electronic
eBook
3
Published 2015
Table of Contents:
“... Improvements in Glowworm Swarm Optimization can Solve Real Life Problems -- Cryptanalysis of Transposition...”View full text
Electronic
eBook
4
Published 2015
Table of Contents:
“...Solving the 0-1 Knapsack Problem Using Genetic Algorithm - Teaching Learning Based Optimization...”View full text
Electronic
eBook
5
Subjects:
“...Investments and Securities. https://scigraph.springernature.com/ontologies/product-market-codes...”
View full text
View full text
Electronic
eBook
6
Published 2010
Table of Contents:
“... Collisions and Hash Collisions -- Hash Functions -- On the Indifferentiability of the Grøstl Hash Function...”View full text
Electronic
eBook
7
Published 2006
Table of Contents:
“... -- A Robust and Secure RFID-Based Pedigree System (Short Paper) -- A Topological Condition for Solving...”View full text
Electronic
eBook
8
Published 2010
Table of Contents:
“... for Quadratic Field Based Cryptosystems -- Solving Generalized Small Inverse Problems -- Protocols -- One-Time...”View full text
Electronic
eBook
9
Published 2005
Table of Contents:
“...Invited Talk -- All Sail, No Anchor III: Risk Aggregation and Time’s Arrow -- Network Security...”View full text
Electronic
eBook
10
Published 2010
Table of Contents:
“...Invited Talks Abstracts -- Arcane Information, Solving Relations, and Church Censorship...”View full text
Electronic
eBook
11
Published 2014
Table of Contents:
“... of Adaptive Genetic Algorithms -- Use of Ant Colony System in Solving Vehicle Routing Problem with Time Window...”View full text
Electronic
eBook
12
Published 2012
Table of Contents:
“... Neighbourhoods for Solving Global Minimization Problems....”View full text
Electronic
eBook
13
Published 2013
Table of Contents:
“... Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic...”View full text
Electronic
eBook
14
Published 2015
Table of Contents:
“...-Preserving in Social Networks -- Securely Solving Classical Network Flow Problems -- Remote IP Protection...”View full text
Electronic
eBook
15
Published 2005
Table of Contents:
“... and Forecasting Regional Atmospheric Processes -- Numerical Forecast of Air Pollution — Advances and Problems...”View full text
Electronic
eBook
16
Published 2012
Table of Contents:
“... and Environmental Security: The Dietary Grape Polyphenol Concentrate Enoant as Functional Food in Prevention...”View full text
Electronic
eBook
17
Table of Contents:
“... Functions and Kernel Density Estimation -- 4. The BONUS Algorithm -- 5. Water Management under Weather...”
View full text
View full text
Electronic
eBook
18
Published 2014
Table of Contents:
“...The Realm of the Pairings -- A Three-Level Sieve Algorithm for the Shortest Vector Problem...”View full text
Electronic
eBook
19
Table of Contents:
“... -- Graphics, Multimedia, and Printing -- Database Access -- Networking and Remoting -- Security...”
View full text
View full text
Electronic
eBook
20
Table of Contents:
“... -- Multimedia -- Database Access -- Networking and Remoting -- Security and Cryptography -- Unmanaged Code...”
View full text
View full text
Electronic
eBook



