The Comparison Approach to Multiprocessor Fault Diagnosis
IEEE Transactions on Computers
A lower bound on the path length of binary trees
ACM SIGACT News
Cost-bandwidth tradeoffs for communication networks
SPAA '89 Proceedings of the first annual ACM symposium on Parallel algorithms and architectures
Constructing trees in parallel
SPAA '89 Proceedings of the first annual ACM symposium on Parallel algorithms and architectures
A fast, highly reliable data compression chip and algorithm for storage systems
IBM Journal of Research and Development
Classification of temporal patterns in dynamic biological networks
Neural Computation
Information Retrieval
Evolution Strategies, Network Random Keys, and the One-Max Tree Problem
Proceedings of the Applications of Evolutionary Computing on EvoWorkshops 2002: EvoCOP, EvoIASP, EvoSTIM/EvoPLAN
Practical Free-Space Quantum Cryptography
QCQC '98 Selected papers from the First NASA International Conference on Quantum Computing and Quantum Communications
Computing Geographical Scopes of Web Resources
VLDB '00 Proceedings of the 26th International Conference on Very Large Data Bases
A Multi-Resolution Relational Data Model
VLDB '92 Proceedings of the 18th International Conference on Very Large Data Bases
Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Improving the Security of the McEliece Public-Key Cryptosystem
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Fuzzy Hamming Distance: A New Dissimilarity Measure
CPM '01 Proceedings of the 12th Annual Symposium on Combinatorial Pattern Matching
Edit Distance with Move Operations
CPM '02 Proceedings of the 13th Annual Symposium on Combinatorial Pattern Matching
A Puzzle to Challenge Genetic Programming
EuroGP '02 Proceedings of the 5th European Conference on Genetic Programming
Secret Sharing in Graph-Based Prohibited Structures
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
A splicing/decomposable encoding and its novel operators for genetic algorithms
Proceedings of the 8th annual conference on Genetic and evolutionary computation
Privacy-preserving mining by rotational data transformation
Proceedings of the 43rd annual Southeast regional conference - Volume 1
Discrete Applied Mathematics - Special issue: Coding and cryptography
Using Entropy Analysis to Find Encrypted and Packed Malware
IEEE Security and Privacy
Changing representations during search: A comparative study of delta coding
Evolutionary Computation
A minimal fuzzy entropy model for pattern recognition: evaluation in a SAR imagery application
AIKED'06 Proceedings of the 5th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering and Data Bases
A note on the construction of error detecting/correcting prefix codes
Information Processing Letters
Entropy metric for XML DTD documents
ACM SIGSOFT Software Engineering Notes
Mixed Key Management Using Hamming Distance for Mobile Ad-Hoc Networks
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part II
Redundancy versus video and audio human perception
WSEAS TRANSACTIONS on COMMUNICATIONS
Retrieving video features for language acquisition
Expert Systems with Applications: An International Journal
Exact and Experimental Algorithms for a Huffman-Based Error Detecting Code
TAMC '09 Proceedings of the 6th Annual Conference on Theory and Applications of Models of Computation
Video and audio compressions and human perception mechanism
ICCOM'08 Proceedings of the 12th WSEAS international conference on Communications
Objective functions for feature discrimination
IJCAI'89 Proceedings of the 11th international joint conference on Artificial intelligence - Volume 2
Adding aggressive error correction to a high-performance compressing flash file system
EMSOFT '09 Proceedings of the seventh ACM international conference on Embedded software
Discrete Applied Mathematics - Special issue: Coding and cryptography
Automation and Remote Control
A secure communication scheme for mobile wireless sensor networks using hamming distance
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Auto-adaptive interval selection algorithm for quantum key distribution
Quantum Information & Computation
Publishing anonymous survey rating data
Data Mining and Knowledge Discovery
Discovering consensus patterns in biological databases
VDMB'06 Proceedings of the First international conference on Data Mining and Bioinformatics
A new approach to determinisation using bit-parallelism
ICTAC'06 Proceedings of the Third international conference on Theoretical Aspects of Computing
Exact and approximation algorithms for error-detecting even codes
Theoretical Computer Science
On the identity anonymization of high-dimensional rating data
Concurrency and Computation: Practice & Experience
ESCAPE: entropy score analysis of packed executable
Proceedings of the Fifth International Conference on Security of Information and Networks
On compressing and indexing repetitive sequences
Theoretical Computer Science
Fidelity as a figure of merit in quantum error correction
Quantum Information & Computation
On the connection between Hamming codes, Heapsort and other methods
Information Processing Letters
Hi-index | 0.01 |