Search

Your search keyword '"Duffy, Ken"' showing total 425 results

Search Constraints

Start Over You searched for: Author "Duffy, Ken" Remove constraint Author: "Duffy, Ken"
425 results on '"Duffy, Ken"'

Search Results

51. Site-specific recombinatorics: in situ cellular barcoding with the Cre Lox system

52. Estimating large deviation rate functions

54. A Perspective on Future Research Directions in Information Theory

55. Inferring average generation via division-linked labeling

56. Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security

57. Optimization-Based Linear Network Coding for General Connections of Continuous Flows

58. A Linear Network Code Construction for General Integer Connections Based on the Constraint Satisfaction Problem

63. Multi-user guesswork and brute force security

64. Manipulating niche composition limits damage to haematopoietic stem cells during Plasmodium infection

65. Guessing a password over a wireless channel (on the effect of noise non-uniformity)

66. Bounds on inference

68. Brute force searching, the typical set and Guesswork

69. Lists that are smaller than their parts: A coding approach to tunable secrecy

70. Guesswork, large deviations and Shannon entropy

71. Tail asymptotics for busy periods

72. Log-Convexity of Rate Region in 802.11e WLANs

73. Decentralised Learning MACs for Collision-free Access in WLANs

74. Estimating Loynes' exponent

75. Most likely paths to error when estimating the mean of a reflected random walk

91. 3051 – NON-GENETIC HERITABILITY OF CELL DIVISION SHAPES HUMAN HEMATOPOIESIS

Catalog

Books, media, physical & digital resources