The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for MACs with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1990-1997 (17) 1998-2000 (16) 2001-2003 (21) 2004-2005 (44) 2006-2007 (32) 2008 (32) 2009 (22) 2010-2011 (18) 2012-2013 (23) 2014 (22) 2015-2016 (18) 2017-2018 (23) 2019 (17) 2020-2021 (22) 2022-2023 (25) 2024 (2)
Publication types (Num. hits)
article(127) incollection(1) inproceedings(225) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 194 occurrences of 134 keywords

Results
Found 355 publication records. Showing 354 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Sreejith Sreekumar, Sibi Raj B. Pillai, Bikash Kumar Dey On the adaptive capacity region of fading MACs with distributed CSI. Search on Bibsonomy ITW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Kanak Agarwal, Colin Dixon, Eric Rozner, John B. Carter Shadow MACs: scalable label-switching for commodity ethernet. Search on Bibsonomy HotSDN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Dario Catalano, Dario Fiore 0001, Rosario Gennaro, Luca Nizzardo Generalizing Homomorphic MACs for Arithmetic Circuits. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Tetsu Iwata, Lei Wang 0031 Impact of ANSI X9.24-1: 2009 Key Check Value on ISO/IEC 9797-1: 2011 MACs. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Thomas Peyrin, Lei Wang 0031 Generic Universal Forgery Attack on Iterative Hash-Based MACs. Search on Bibsonomy EUROCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Sebastian Bittl Attack Potential and Efficient Security Enhancement of Automotive Bus Networks Using Short MACs with Rapid Key Change. Search on Bibsonomy Nets4Cars/Nets4Trains/Nets4Aircraft The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Itai Dinur, Gaëtan Leurent Improved Generic Attacks against Hash-Based MACs and HAIFA. Search on Bibsonomy CRYPTO (1) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20A. Vishwanath, Katherine H. LaVail The role of attributional judgments when adopted computing technology fails: a comparison of Microsoft Windows PC user perceptions of Windows and Macs. Search on Bibsonomy Behav. Inf. Technol. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Rajai Nasser, Emre Telatar Polar Codes for Arbitrary DMCs and Arbitrary MACs. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
20Uzi Pereg, Ido Tal Channel Upgradation for Non-Binary Input Alphabets and MACs. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
20Minyu Fang, David Malone, Ken R. Duffy, Douglas J. Leith Decentralised learning MACs for collision-free access in WLANs. Search on Bibsonomy Wirel. Networks The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Kan Yang 0001, Xiaohua Jia, Kui Ren 0001, Bo Zhang 0036, Ruitao Xie DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Neal Koblitz, Alfred Menezes Another Look at Security Theorems for 1-Key Nested MACs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
20Sreejith Sreekumar, Bikash Kumar Dey, Sibi Raj B. Pillai On the adaptive sum-capacity of fading MACs with distributed CSI and non-identical links. Search on Bibsonomy ISIT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Moritz Wiese, Holger Boche On the weakest resource for coordination in AV-MACs with conferencing encoders. Search on Bibsonomy ITW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Gaëtan Leurent, Thomas Peyrin, Lei Wang 0031 New Generic Attacks against Hash-Based MACs. Search on Bibsonomy ASIACRYPT (2) The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Kan Yang 0001, Xiaohua Jia, Kui Ren 0001, Bo Zhang 0036 DAC-MACS: Effective data access control for multi-authority cloud storage systems. Search on Bibsonomy INFOCOM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Dario Catalano, Dario Fiore 0001 Practical Homomorphic MACs for Arithmetic Circuits. Search on Bibsonomy EUROCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Pierre Moulin A new metaconverse and outer region for finite-blocklength MACs. Search on Bibsonomy ITA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Mahesh K. Banavar, Anthony D. Smith, Cihan Tepedelenlioglu, Andreas Spanias On the Effectiveness of Multiple Antennas in Distributed Detection over Fading MACs. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Fulong Jiang, Hao Liu 0013, Longxing Shi Handling Deafness Problem of Scheduled Multi-Channel Polling MACs. Search on Bibsonomy IEICE Trans. Commun. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Takeshi Shimoto, Koichi Nakayama, Shuichi Matsuda, Yukihide Iwamoto Building of HD MACs Using Cell Processing Robot for Cartilage Regeneration. Search on Bibsonomy J. Robotics Mechatronics The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Sibi Raj B. Pillai, Bikash Kumar Dey, Yash Deshpande, Krishnamoorthy Iyer Power Controlled Adaptive Sum-Capacity of Fading MACs with Distributed CSI Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
20Massimiliano Vasile, Federico Zuiani MACS: An Agent-Based Memetic Multiobjective Optimization Algorithm Applied to Space Trajectory Design Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
20 DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
20Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar 0001 A Differential Fault Attack on Grain-128a using MACs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
20Yong-wei Zhang, Lei Wang 0006, Qidi Wu Modified Adaptive Cuckoo Search (MACS) algorithm and formal description for global optimisation. Search on Bibsonomy Int. J. Comput. Appl. Technol. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Ido Tal, Artyom Sharov, Alexander Vardy Constructing polar codes for non-binary alphabets and MACs. Search on Bibsonomy ISIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar 0001 A Differential Fault Attack on Grain-128a Using MACs. Search on Bibsonomy SPACE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Markku-Juhani Olavi Saarinen Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Sheng-Kuei Hsu, Shi-Jen Lin MACs: Mining API code snippets for code reuse. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Christophe Bortolaso, Cédric Bach, Emmanuel Dubois 0001 MACS: combination of a formal mixed interaction model with an informal creative session. Search on Bibsonomy EICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Yevgeniy Dodis, John P. Steinberger Domain Extension for MACs Beyond the Birthday Barrier. Search on Bibsonomy EUROCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Mónica Sara Santos, Jeremy Pitt MACS - Affective Conditioning System for Shared Working Environments. Search on Bibsonomy Web Intelligence/IAT Workshops The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Jevin D. West, Theodore C. Bergstrom, Carl T. Bergstrom Big Macs and Eigenfactor scores: Don't let correlation coefficients fool you. Search on Bibsonomy J. Assoc. Inf. Sci. Technol. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Jevin D. West, Theodore C. Bergstrom, Carl T. Bergstrom Response to "Big Macs and Eigenfactor scores: The correlation conundrum". Search on Bibsonomy J. Assoc. Inf. Sci. Technol. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Gangan Prathap Big Macs and Eigenfactor scores: The correlation conundrum. Search on Bibsonomy J. Assoc. Inf. Sci. Technol. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Minyu Fang, David Malone, Ken R. Duffy, Douglas J. Leith Decentralised Learning MACs for Collision-free Access in WLANs Search on Bibsonomy CoRR The full citation details ... 2010 DBLP  BibTeX  RDF
20Mahesh K. Banavar, Anthony D. Smith, Cihan Tepedelenlioglu, Andreas Spanias Distributed Detection over Fading MACs with Multiple Antennas at the Fusion Center Search on Bibsonomy CoRR The full citation details ... 2010 DBLP  BibTeX  RDF
20Mridul Nandi A Unified Method for Improving PRF Bounds for a Class of Blockcipher based MACs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
20Mahesh K. Banavar, Anthony D. Smith, Cihan Tepedelenlioglu, Andreas Spanias Distributed detection over fading macs with multiple antennas at the fusion center. Search on Bibsonomy ICASSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Mridul Nandi A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Kazuhiko Minematsu How to Thwart Birthday Attacks against MACs via Small Randomness. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Liting Zhang, Wenling Wu, Peng Wang 0009, Lei Zhang 0012, Shuang Wu 0004, Bo Liang Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Basel Alomair, Radha Poovendran $\mathcal{E}$ -MACs: Towards More Secure and More Efficient Constructions of Secure Channels. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Jan Meskens, Kris Luyten, Karin Coninx D-Macs: building multi-device user interfaces by demonstrating, sharing and replaying design actions. Search on Bibsonomy UIST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Kan Yasuda The Sum of CBC MACs Is a Secure PRF. Search on Bibsonomy CT-RSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Jevin D. West, Theodore C. Bergstrom, Carl T. Bergstrom Big Macs and Eigenfactor Scores: Don't Let Correlation Coefficients Fool You Search on Bibsonomy CoRR The full citation details ... 2009 DBLP  BibTeX  RDF
20Yuvraj Gajpal, Prakash L. Abad Multi-ant colony system (MACS) for a vehicle routing problem with backhauls. Search on Bibsonomy Eur. J. Oper. Res. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Hans-Peter Löb, Christian Sauer 0001 A Modular Reference Application for IEEE 802.11n Wireless LAN MACs. Search on Bibsonomy ICC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Michèle A. Wigger, Gerhard Kramer Three-user MIMO MACs with cooperation. Search on Bibsonomy ITW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Rohit Kumar, Ann Gordon-Ross Macs: A Minimal Adaptive routing circuit-switched architecture for scalable and parametric NoCs. Search on Bibsonomy FPL The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Bonnie Rubenstein-Montano, Victoria Y. Yoon, Kevin Drummey, Jay Liebowitz Agent learning in the multi-agent contracting system [MACS]. Search on Bibsonomy Decis. Support Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Katsuyuki Okeya Side Channel Attacks against Hash-Based MACs with PGV Compression Functions. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Keting Jia, Xiaoyun Wang 0001, Zheng Yuan, Guangwu Xu Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
20Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya A New Mode of Operation for Block Ciphers and Length-Preserving MACs. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Praveen Gauravaram, Katsuyuki Okeya Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash functions, side channel attacks, HMAC, Applied cryptography
20Kazuhiko Minematsu, Toshiyasu Matsushima Improved MACs from Differentially-Uniform Permutations. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Norbert Pramstaller, Mario Lamberger, Vincent Rijmen Second Preimages for Iterated Hash Functions and Their Implications on MACs. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF iterated hash functions, block-cipher based hash functions, differential cryptanalysis, second preimage, double block-length hash functions
20Praveen Gauravaram, Katsuyuki Okeya An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF M-NMAC, MDx-MAC, Side channel attacks, DPA, HMAC
20Maurizio Adriano Strangio Password-authenticated Key Exchange using Efficient MACs. Search on Bibsonomy J. Comput. The full citation details ... 2006 DBLP  BibTeX  RDF
20Erich Rome, Lucas Paletta, Erol Sahin, Georg Dorffner, Joachim Hertzberg, Ralph Breithaupt, Gerald Fritz, Jörg Irran, Florian Kintzler, Christopher Lörken, Stefan May, Emre Ugur The MACS Project: An Approach to Affordance-Inspired Robot Control. Search on Bibsonomy Towards Affordance-Based Robot Control The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Z. Pajouhi, Seid Mehdi Fakhraie A Novel Neural Network GA-Optimized Controller for QoS Support in Wireless MACs. Search on Bibsonomy APCCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20John Black, Phillip Rogaway CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions. Search on Bibsonomy J. Cryptol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Standards, Provable security, Message authentication codes, Modes of operation, CBC MAC
20Victoria Y. Yoon, Bonnie Rubenstein-Montano, Teresa Wilson, Stuart Lowry, Jay Liebowitz Natural language interface for multi-agent contracting system (MACS). Search on Bibsonomy Intell. Syst. Account. Finance Manag. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Frank Archer, Anatolij M. Shutko, Tommy L. Coleman, Alexander Haldin, Eugenij Pavlovich Novichikhin, Igor Sidorov 0002 Introduction, overview, and status of the Microwave Autonomous Copter System (MACS). Search on Bibsonomy IGARSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Jay Liebowitz, Monica Adya, Bonnie Rubenstein-Montano, Victoria Y. Yoon, J. Judah Buchwalter, Michael Imhoff, Seung Baek, Ching Y. Suen MACS: Multi-Agent COTR System for defense contracting. Search on Bibsonomy Knowl. Based Syst. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20John Black, Phillip Rogaway CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Oliver Brand, Werner Mahalek, Dirk Sturzebecher, Martina Zitterbart MACS - Eine modulare Kollaborationsumgebung. Search on Bibsonomy Prax. Inf.verarb. Kommun. The full citation details ... 1999 DBLP  BibTeX  RDF
20Oliver Brand, Werner Mahalek, Dirk Sturzebecher, Martina Zitterbart MACS - A Modular Collaboration Environment. Search on Bibsonomy IMSA The full citation details ... 1999 DBLP  BibTeX  RDF
20David L. R. Houston The Squeaky Clean Computer Lab: How to Maintain your MACs and PCs as Well as Your Sanity! Search on Bibsonomy SIGUCCS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
20Alex L. Hayzelden Telecommunications Multi-Agent Control System (Tele-MACS). Search on Bibsonomy ECAI The full citation details ... 1998 DBLP  BibTeX  RDF
20Mariusz H. Jakubowski, Ramarathnam Venkatesan The Chain & Sum Primitive and Its Applications to MACs and Stream Ciphers. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
20Moni Naor, Omer Reingold From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
20Bart Preneel MACs and hash functions: State of the art. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
20Jean-Paul Rolland, P. Bon, D. Thomas MACS: automatic counting of objects based on shape recognition. Search on Bibsonomy Comput. Appl. Biosci. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
20Paul G. Backes, Yoseph Bar-Cohen, Benjamin Joffe The multifunction automated crawling system (MACS). Search on Bibsonomy ICRA The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
20Mike W. Miller Managing Macs made painless: leveraging the right tools for the job. Search on Bibsonomy SIGUCCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
20Eric L. Boyd, Edward S. Davidson Hierarchical Performance Modeling with MACS: A Case Study of the Convex C-240. Search on Bibsonomy ISCA The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
20Mari Georges MACS: Maintenance assistance capability for software. Search on Bibsonomy J. Softw. Maintenance Res. Pract. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
20Christine Desclaux Capturing design and maintenance decisions with MACS. Search on Bibsonomy J. Softw. Maintenance Res. Pract. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
20Bryce Cogswell, Zary Segall MACS: A Predictable Architecture for Real Time Systems. Search on Bibsonomy RTSS The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
20Christine Desclaux, Michel Ribault MACS: maintenance assistance capability for software-a KADME. Search on Bibsonomy ICSM The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
20Christine Desclaux Capturing design and maintenance decisions with MACS. Search on Bibsonomy TAI The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
13Alessandro Cevrero, Panagiotis Athanasopoulos, Hadi Parandeh-Afshar, Ajay Kumar Verma, Seyed-Hosein Attarzadeh-Niaki, Chrysostomos Nicopoulos, Frank K. Gürkaynak, Philip Brisk, Yusuf Leblebici, Paolo Ienne Field Programmable Compressor Trees: Acceleration of Multi-Input Addition on FPGAs. Search on Bibsonomy ACM Trans. Reconfigurable Technol. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Field Programmable Compressor Tree (FPCT), compressor tree, Field Programmable Gate Array (FPGA)
13Zhenzhen Xu, Feng Xia 0001, Xianchao Zhang 0001 Multi-Robot Dynamic Task Allocation Using Modified Ant Colony System. Search on Bibsonomy AICI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MTSP, task allocation, multi-robot, ant colony
13Igor Dantas dos Santos Miranda, Ana Isabela Araújo Cunha ASIC design of a novel high performance neuroprocessor architecture for multi layered perceptron networks. Search on Bibsonomy SBCCI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF neural network arithmetic, neuroprocessor, ASIC
13Xiaoyun Wang 0001, Wei Wang 0035, Keting Jia, Meiqin Wang New Distinguishing Attack on MAC Using Secret-Prefix Method. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secret prefix method, MAC, distinguishing attack, SHA-1
13Shay Gueron Intel's New AES Instructions for Enhanced Performance and Security. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF new instructions set, computer architecture, Advanced Encryption Standard
13Affan A. Syed, Wei Ye 0003, John S. Heidemann Comparison and Evaluation of the T-Lohi MAC for Underwater Acoustic Sensor Networks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Lihua Weng, S. Sandeep Pradhan, Achilleas Anastasopoulos Error Exponent Regions for Gaussian Broadcast and Multiple-Access Channels. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Lifeng Lai, Hesham El Gamal The Water-Filling Game in Fading Multiple-Access Channels. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Maria del Puy Carretero, David Oyarzun, Amalia Ortiz, Iosu Arizkuren, Raul Navas, Alejandro García-Alonso Preserving Avatar Genuineness in Different Display Media. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF visualization and display, internet, mobile devices, avatar, human interface, television
13Olivier Sigaud, Martin V. Butz, Olga Kozlova, Christophe Meyer Anticipatory Learning Classifier Systems and Factored Reinforcement Learning. Search on Bibsonomy ABiALS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Sergiu Nedevschi, Rabin K. Patra, Sonesh Surana, Sylvia Ratnasamy, Lakshminarayanan Subramanian, Eric A. Brewer An adaptive, high performance mac for long-distance multihop wireless networks. Search on Bibsonomy MobiCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF long-distance point-to-point wireless, multihop wireless, mac protocols
13Charles G. Ahn Dual boot MacBook deployment project. Search on Bibsonomy SIGUCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intel-based Mac, VMware Fusion, boot camp, laptop lending, multi boot, multi-boot, wireless classroom, parallels, dual boot, dual-boot
13Michael Gorski, Stefan Lucks, Thomas Peyrin Slide Attacks on a Class of Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Grindahl, RadioGatún, sponge function, MAC, hash function, slide attacks
13Jiali Choy, Khoongming Khoo New Applications of Differential Bounds of the SDS Structure. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SPN, branch number, {0, 1}-matrices, differential, universal hash functions
13Affan A. Syed, Wei Ye 0003, John S. Heidemann T-Lohi: A New Class of MAC Protocols for Underwater Acoustic Sensor Networks. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Ioannis Kouretas, Charalambos Basetas, Vassilis Paliouras Low-power logarithmic number system addition/subtraction and their impact on digital filters. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 354 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license