Search Result Save to File Save as CSV
Your search for 38832 returns 3854 document(s)
Degree optimized resilleint boolean functions from maiorna-McFarland Class, (LNCS-Lecture Notes in Computer Science 2898), Hal. 93-114
Author: Enes Pasalic; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
What can we learn from synchronous data-flow languages? ( invited presentation ) (LNCS-Lecture Notes in Computer Science 1201) Hal 255-258
Author: Paul Caspi; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient software implementation of LFSR and boolean function and its application in nonlinear combiner model, (LNCS-Lecture Notes in Computer Science 2576) Hal 387-402
Author: Sandeepan Chowdhury; Subhamoy Maitra; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On the covering radius of second order binary reed-muller code in set of resilliet boolean functions, (LNCS-Lecture Notes in Computer Science 2898), Hal. 82-92
Author: Yuri Borissov; An Braeken; Svetla Nikova; and Preneel; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Mind the gaps: a new splitting strategy for consis1tency techniques, (LNCS-Lecture Notes in Computer Science 3709) Hal 77-91
Author: Heikel Batnini; Claude Michel; Michel Rueher; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On solving soft temporal constraints using sat techniques, (LNCS-Lecture Notes in Computer Science 3709) Hal 607-621
Author: Hossein M. Sheini; Bart Peintner; Karem A. Sakallah; Martha E. Pollack; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Blocking techniques in numerical software, (LNCS-Lecture Notes in Computer Science 1557) Hal 127-139
Author: Wilfried N. Gansterer; Dieter F. Kvasnicka; Cristoph W. Ueberhuber; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Entity authentication and authenticated key transport protocols employing asymmetric techniques, (LNCS-Lecture Notes in Computer Science 1361) Hal 137-158
Author: Simon Blake-Wilson; Alfred Menezes; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Putting advanced reachability analysis techniques together: the ARA tool, (LNCS-Lecture Notes in Computer Science 670) Hal 597-616
Author: Antti Valmari; Jukka Kemppainen; Matthew Clegg; Mikko Levanto; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Query expansion techniques for the CLEF bilingual track, (LNCS-Lecture Notes in Computer Science, 2406), Hal. 177-184
Author: Fatiha Sadat; AKira Maeda, Masatoshi Yoshikawa; and Shunsuke Uemura; | Call Number: 025.04 Eva | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next