Search

Showing total 65,294 results

Search Constraints

Start Over You searched for: Topic computer science Remove constraint Topic: computer science Publisher springer nature Remove constraint Publisher: springer nature
65,294 results

Search Results

1. Trends in Archaeological Simulation

2. Accurate prediction of machining feedrate and cycle times considering interpolator dynamics

3. Sentiment analysis using product review data

4. ON THE POSSIBILITY OF PATTERN RECOGNITION METHODS UTILIZATION IN SOCIOLOGICAL RESEARCH.

5. Towards a Systematic Screening Tool for Quality Assurance and Semiautomatic Fraud Detection for Images in the Life Sciences

6. Announcement.

7. Operating systems support for the finite element machine.

8. Automatic program restructuring for high-speed computation.

9. Language design approaches for parallel processors.

10. Reconciling data flow machines and conventional languages.

11. Generation of dataflow graphical object code for the lapse programming language.

12. Cellular algorithms and their verification.

13. Cellular algorithms for binary matrix operations.

14. Sauge: How to use the parallelism of sequential programs.

15. On synchronization and its specification.

16. Compiling in parallel.

17. Parallel algorithms for the convex hull problem in two dimensions.

18. Hierarchical discrete systems and realisation of parallel algorithms.

19. A parallel algorithm for solving band systems and matrix inversion.

20. Binary trees and parallel scheduling algorithms.

21. New variants of the quadrant interlocking factorisation (Q.I.F.) method.

22. Software structuring: A pragmatic approach.

23. Development methodologies for event and message based application systems.

24. Software development in LDM.

25. Espreso — A system for process control software specification.

26. Program design — A practical approach.

27. On implementation problems of shared abstract data types.

28. The profitability in the FTSE 100 Index: A new Markov Chain approach

29. Algebraical Structures of Cryptographic Transformations.

30. On the linear complexity of cascaded sequences.

31. Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme.

32. A New Trapdoor Knapsack Public Key Cryptosystem.

33. The Quadratic Sieve Factoring Algorithm.

34. Discrete logarithms in finite fields and their cryptographic significance.

35. User Functions for the Generation and Distribution of Encipherment Keys.

36. An Optimal Class of Symmetric Key Generation Systems.

37. On the Use of the Binary Multiplying Channel in a Private Communication System.

38. Secrecy and Privacy in a Local Area Network Environment.

39. The Subliminal Channel and Digital Signatures.

40. An Encryption and Authentification Procedure for Telesurveillance Systems.

41. A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques.

42. Sex Differences on the California Statewide Assessment of Computer Literacy.

43. Fostering Equitable Consequences from Computer Learning Environments.

44. Breaking the Ong-Schnorr-Shamir Signature Scheme for Quadratic Number Fields.

45. A Secure Subliminal Channel (?).

46. Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences.

47. Software Protection: Myth or Reality?

48. Fingerprinting Long Forgiving Messages.

49. Is DES a Pure Cipher? (Results of More Cycling Experiments on DES) (Preliminary Abstract).

50. A Layered Approach to the Design of Private Key Cryptosystems.