Sciweavers

11065 search results - page 206 / 2213
» Education
Sort
View
CORR
2007
Springer
105views Education» more  CORR 2007»
15 years 4 months ago
Automatic Methods for Analyzing Non-Repudiation Protocols with an Active Intruder
Francis Klay, Judson Santiago, Laurent Vigneron
CORR
2007
Springer
76views Education» more  CORR 2007»
15 years 4 months ago
Universal coding for correlated sources with complementary delivery
Akisato Kimura, Tomohiko Uyematsu, Shigeaki Kuzuok...
CORR
2007
Springer
52views Education» more  CORR 2007»
15 years 4 months ago
A Constraint Network Based Approach to Memory Layout Optimization
G. Chen, Mahmut T. Kandemir, Mustafa Karaköy
CORR
2007
Springer
108views Education» more  CORR 2007»
15 years 4 months ago
Combining haplotypers
Matti Kääriäinen, Niels Landwehr, S...
CORR
2007
Springer
89views Education» more  CORR 2007»
15 years 4 months ago
Analog Chaos-based Secure Communications and Cryptanalysis: A Brief Survey
Shujun Li, Gonzalo Álvarez, Zhong Li, Wolfg...