A channel access scheme for large dense packet radio networks
Conference proceedings on Applications, technologies, architectures, and protocols for computer communications
XMill: an efficient compressor for XML data
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Creating a computer science canon: a course of "classic" readings in computer science
SIGCSE '03 Proceedings of the 34th SIGCSE technical symposium on Computer science education
Scaling of Knowledge in Random Conceptual Networks
ICCS '01 Proceedings of the International Conference on Computational Science-Part II
Formal engineering design synthesis
Affective Learning — A Manifesto
BT Technology Journal
Encyclopedia of Computer Science
Encyclopedia of Computer Science
Predictability, Complexity, and Learning
Neural Computation
Analysis of user attitude and behaviour in evaluating a personalized search engine
Proceedings of the 13th Eurpoean conference on Cognitive ergonomics: trust and control in complex socio-technical systems
Foundations and Trends® in Networking
A survey of linguistic structures for application-level fault tolerance
ACM Computing Surveys (CSUR)
Exact combinational logic synthesis and non-standard circuit design
Proceedings of the 5th conference on Computing frontiers
Topics in Multi-User Information Theory
Foundations and Trends in Communications and Information Theory
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Design of Decision-Making Organizations
Management Science
Dial C for cipher: le chiffrement était presque parfait
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Security implications of selective encryption
Proceedings of the 6th International Workshop on Security Measurements and Metrics
Capacity regions and sum-rate capacities of vector Gaussian interference channels
IEEE Transactions on Information Theory
Entropy of selectively encrypted strings
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
User effect in evaluating personalized information retrieval systems
EC-TEL'06 Proceedings of the First European conference on Technology Enhanced Learning: innovative Approaches for Learning and Knowledge Sharing
Haptic rendering of juggling with encountered type interfaces
Presence: Teleoperators and Virtual Environments
Symbolic modeling of a universal reconfigurable logic gate and its applications to circuit synthesis
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Hi-index | 0.06 |