Search

Showing total 63 results
63 results

Search Results

1. On the Security of the Stream Ciphers RCR-64 and RCR-32.

2. Artificial Intelligence Surpassing Human Intelligence: Factual or Hoax.

3. Real-World Networks Are Not Always Fast Mixing.

4. Interpreting Deep Structures of Information Systems Security.

5. Science, Mathematics, Computer Science, Software Engineering†.

6. Signposting in Documents.

7. Designing Effective Policies for Minimal Agents.

8. Energy-Efficient Cloud Computing.

9. A Literature Review of Research in Bug Resolution: Tasks, Challenges and Future Directions.

10. Efficient Reversible Data Hiding Using Multiple Predictors.

11. The Optimization of Memory Access Congestion for MapReduce Applications on Manycore Systems.

12. An Auction-Based Approach for Group Task Allocation in an Open Network Environment.

13. A Comparative Study of Different Motif Occurrence Models Applied to a Hybrid Multiobjective Shuffle Frog Leaping Algorithm.

14. Markov-Based Distributed Approach for Mitigating Self-Coexistence Problem in IEEE 802.22 WRANs.

15. Fast Multi-Scale Detection of Relevant Communities in Large-Scale Networks.

16. Multi-Label Classification Using Dependent and Independent Dual Space Reduction.

17. Introduction to the Special Issue on Probability Models in Performance Analysis.

18. Efficient Linkable and/or Threshold Ring Signature Without Random Oracles.

19. Cryptanalysis of Loiss Stream Cipher.

20. An Optimal Algorithm for Untangling Binary Trees via Rotations.

21. Capsule Reviews.

22. Comparing the Service Component Architecture and Fractal Component Model.

23. Fast Generation of t-ary Trees.

24. Modal Logics are Coalgebraic1.

25. Efficient Semantic Information Exchange for Ambient Intelligence.

26. Convivial Ambient Technologies: Requirements, Ontology and Design.

27. Adaptive Random Re-Routing for Differentiated QoS in Sensor Networks.

28. Implementing a Thermal-Aware Scheduler in Linux Kernel on a Multi-Core Processor.

29. A Bandwidth-Based Power-Aware Routing Protocol with Low Route Discovery Overhead in Mobile Ad hoc Networks.

30. Side-Channel Attack Using Meet-in-the-Middle Technique.

31. Multicast Key Management without Rekeying Processes.

32. An ID-Based Mutual Authentication and Key Exchange Protocol for Low-Power Mobile Devices.

33. Edge-Orienting on Split, Planar and Treelike Graphs.

34. Special Issue on Discovery Science: Guest Editor's Introduction.

35. Capsule Reviews.

36. Capsule Reviews.

37. Capsule Reviews.

38. Capsule Reviews.

39. UK Performance Engineering Workshop 2010.

40. Affordance and Symmetry in User Interfaces.

41. The Effect of the Distributed Test Architecture on the Power of Testing.

42. Capsule Reviews.

43. Capsule Reviews.

44. Toward Effective and Reliable Digital Forensics.

45. Capsule Reviews.

46. Capsule Reviews.

47. Capsule Reviews.

48. A Survey of Coverage-Based Testing Tools.

49. Automated Worst-Case Execution Time Analysis Based on Program Modes.

50. Capsule Reviews.