311 – 320 of 519
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2007
-
Mark
Inductive logic programming algorithm for estimating quality of partial plans
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A key recovery attack on Edon80
2007) ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security 4833. p.568-581(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Technology transfer and education – discussion and summary
(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Using a connected filter for structure estimation in perspective systems
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Two General Attacks on Pomaranch-like Keystream Generators
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A subgradient optimization approach to inter-domain routing in IP/MPLS networks
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Understanding prediction systems for HLA-binding peptides and T-cell epitope identification
(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Grids for scientific computing: Minisymposium abstract
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the problem of finding linear approximations and cryptanalysis of Pomaranch Version 2
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
SLA adaptation for service overlay networks
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding