Your search for 38226 returns 3313 document(s) |
Performance analysis and derived parallelization strategy for a SCF program at the hartree fock level, (LNCS-Lecture Notes in Computer Science 1557) Hal 163-172 |
Author: Siegfried Hofinger; Othmar Steinhauser; Peter Zinterhof; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Generalized linear complementarity problems and the analysis of continuously variable systems and discrete event systems,(LNCS-Lecture Notes in Computer Science 1201) Hal 409-414 |
Author: Bart De Schutter; Bart De Moor; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An improved reachability analysis method for strongly linear hybrid systems (extended abstract),(LNCS-Lecture Notes in Computer Science 1254) Hal 167-178 |
Author: Bernard Boigelot; Louis Bronne; Stephane Rassart; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using formal verification/analysis methods on the critical path in system design: a case study, (LNCS-Lecture Notes in Computer Science 939) Hal 367-380 |
Author: Asgeir Th. Eiriksson; Ken L. McMillan; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Vector-based semantic analysis using random indexing for cross-lingual query expansion, (LNCS-Lecture Notes in Computer Science, 2406), 169-170 |
Author: Magnus Sahigren; Jussi Karigren; | Call Number: 025.04 Eva | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Some application of polynomials for the design of cryptographic protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 1-13 |
Author: Eyal Kushilevitz; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure multi-party computation made simple, (LNCS-Lecture Notes in Computer Science 2576) Hal 14-28 |
Author: Ueli Maurer; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Forward secrecy in password-only key exchange protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 29-44 |
Author: Jonathan Katz; Rafail Ostrovsky; Moti Yung; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Weak forward security in mediated RSA, (LNCS-Lecture Notes in Computer Science 2576) Hal 45-54 |
Author: Gene Tsudik; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the power of claw-free permulations, (LNCS-Lecture Notes in Computer Science 2576) Hal 55-73 |
Author: Yevgeniy Dodis; Leonid Reyzin; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|