491 – 500 of 518
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2000
-
Mark
Networking 2000 : broadband communications, high performance networking and performance of communication networks
Pujolle, Guy ; Perros, Harry ; Fdida, Serge ; Körner, Ulf LU and Stavrakakis, Ioannis (2000) In Lecture Notes in Computer Science 1815.
- Book/Report › Anthology (editor)
-
Mark
Technical requirements for the implementation of an experience base
2000) 11th International Conference on Software Engineering and Knowledge Engineering, SEKE 1999 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1756. p.87-102(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An evaluation of functional size methods and a bespoke estimation method for real-time systems
2000) 2nd International Conference on Product Focused Software Process Improvement, PROFES 2000 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1840. p.339-352(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1999
-
Mark
Fast correlation attacks based on turbo code techniques
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Further results on the relation between nonlinearity and resiliency of Boolean functions
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the theory of low-density convolutional codes
1999) International Symposium on Applied Algebra, Algebraic Algorithms and Error- Correcting Codes (AAECC) 1719. p.77-86(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improved fast correlation attacks on stream ciphers via convolutional codes
1999) International Conference on the Theory and Application of Cryptographic Techniques EUROCRYPT ’99 1592. p.347-362(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Incremental authentication of tree-structured documents
1999) 2nd International Conference on Information and Communication Security, ICICS 1999 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1726. p.275-283(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Segmentation of echocardiographic image sequences using spatio-temporal information
1999) 2nd International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 1999 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1679. p.410-419(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1998
-
Mark
Reduced complexity correlation attacks on two clock-controlled generators
1998) International Conference on the Theory and Application of Cryptology and Information Security ASIACRYPT’98 1514. p.342-356(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding