Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             28 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Denial of Service attack against fair computations using Bitcoin deposits Beekman, Jethro G.
2016
116 2 p. 144-146
3 p.
artikel
2 A filtration method for order-preserving matching Chhabra, Tamanna
2016
116 2 p. 71-74
4 p.
artikel
3 A linear time algorithm for optimal k-hop dominating set of a tree Kundu, Sukhamay
2016
116 2 p. 197-202
6 p.
artikel
4 An improvement of a cryptanalysis algorithm Benamara, Oualid
2016
116 2 p. 192-196
5 p.
artikel
5 A novel edge based image steganography with 2 k correction and Huffman encoding Sun, Shuliang
2016
116 2 p. 93-99
7 p.
artikel
6 A simple proof of optimality for the MIN cache replacement policy Lee, Mun-Kyu
2016
116 2 p. 168-170
3 p.
artikel
7 Breaking an ID-based encryption based on discrete logarithm and factorization problems Tan, Chik How
2016
116 2 p. 116-119
4 p.
artikel
8 Characterizing redundant rigidity and redundant global rigidity of body-hinge graphs Kobayashi, Yuki
2016
116 2 p. 175-178
4 p.
artikel
9 Corrigendum to “Incidence coloring of Cartesian product graphs” [Inf. Process. Lett. 115 (2015) 765–768] Shiau, Alexander Chane
2016
116 2 p. 216-
1 p.
artikel
10 Editorial Board 2016
116 2 p. IFC-
1 p.
artikel
11 Efficient feature selection based on correlation measure between continuous and discrete features Jiang, Sheng-yi
2016
116 2 p. 203-215
13 p.
artikel
12 Extension of the edge tracing algorithm to disconnected Voronoi skeletons Manak, Martin
2016
116 2 p. 85-92
8 p.
artikel
13 Generalized MitM attacks on full TWINE Tolba, Mohamed
2016
116 2 p. 128-135
8 p.
artikel
14 Improved improbable differential attacks on ISO standard CLEFIA: Expansion technique revisited Tezcan, Cihangir
2016
116 2 p. 136-143
8 p.
artikel
15 Improving resolution width lower bounds for k-CNFs with applications to the Strong Exponential Time Hypothesis Bonacina, Ilario
2016
116 2 p. 120-124
5 p.
artikel
16 Mahonian STAT on words Kitaev, Sergey
2016
116 2 p. 157-162
6 p.
artikel
17 NP-hardness of two edge cover generalizations with applications to control and bribery for approval voting Bredereck, Robert
2016
116 2 p. 147-152
6 p.
artikel
18 On the efficiency of localized work stealing Suksompong, Warut
2016
116 2 p. 100-106
7 p.
artikel
19 On the semantics of Strategy Logic Bouyer, Patricia
2016
116 2 p. 75-79
5 p.
artikel
20 Paired 2-disjoint path covers of multidimensional torus networks with faulty edges Chen, Xie-Bin
2016
116 2 p. 107-110
4 p.
artikel
21 Signed digit data hiding scheme Kuo, Wen-Chung
2016
116 2 p. 183-191
9 p.
artikel
22 Sufficient conditions for triangle-free graphs to be super k-restricted edge-connected Yuan, Jun
2016
116 2 p. 163-167
5 p.
artikel
23 The complexity of the Kth largest subset problem and related problems Haase, Christoph
2016
116 2 p. 111-115
5 p.
artikel
24 The linear complexity of binary sequences of length 2p with optimal three-level autocorrelation Edemskiy, V.
2016
116 2 p. 153-156
4 p.
artikel
25 The super connectivity of exchanged crossed cube Ning, Wantao
2016
116 2 p. 80-84
5 p.
artikel
26 Two-dimensional range successor in optimal time and almost linear space Zhou, Gelin
2016
116 2 p. 171-174
4 p.
artikel
27 VNP = VP in the multilinear world Mahajan, Meena
2016
116 2 p. 179-182
4 p.
artikel
28 Weak containment for partial words is coNP-complete Parys, Paweł
2016
116 2 p. 125-127
3 p.
artikel
                             28 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland