Your search for 37331 returns 124 document(s) |
Formal Languages and Complexity Theory: Time-Space Trade-Off Lower Bounds for Randomized Computation of Decision Problems, A Complete Problem for Statistical Zero Knowledge |
Author: P. Beame, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Exploiting unit propagation to compute lower bounds in branch and bound max-sat solvers, (LNCS-Lecture Notes in Computer Science 3709) Hal 403-414 |
Author: Chu Min Li; Felip Manya; Jordi Planes; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Reduksi ukuran popping pada implementasi algortima real-time optimally adapting meshes (Roam) dengan menggunakan perhitungan kesalahan berdasarkan nested world space bounds |
Author: Raufan Multahada Safari; | Call Number: SK-0929 (Softcopy SK-410) | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure routing in mobile ad hoc network: study and evaluation of different proposed schemes, HAL. 1054-1062 |
Author: Siddharth swaup Rautaray; Sanjeev Sharma; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Optimal quantization and energy allocation schemes in distributed estimation for wireles sensor networks, Hal. 57-61 |
Author: Eni Dwi Wardihani, Wirawan, Gamantyo Hendrantoro; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Equivocable and extractable commitment schemes, (LNCS-Lecture Notes in Computer Science 2576) Hal 74-87 |
Author: Giovanni Di Crescenzo; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secret sharing schemes on access structures with intersection number equal to one (LNCS-Lecture Notes in Computer Science 2576) 354 |
Author: Jaume Marti-Farre; Carles Padro; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the security of two threshold signature schemes with traceable signers, (LNCS-Lecture Notes in Computer Science 2576) Hal 111-122 |
Author: Guilin Wang; Xiaoxi Han; Bo Zhu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Generalized key-evolving signature schemes or how to foil an armed adversary, (LNCS-Lecture Notes in Computer Science 2576) Hal 151-168 |
Author: Gene Itkis; Peng Xie; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Receipt-free electronic voting schemes for large scale elections,(LNCS-Lecture Notes in Computer Science 1361) Hal 25-35 |
Author: Tatsuaki Okamoto; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|