The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for resistance with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1951-1981 (17) 1982-1987 (15) 1988-1989 (16) 1990-1992 (24) 1993 (17) 1994 (25) 1995-1996 (41) 1997 (33) 1998 (47) 1999 (69) 2000 (70) 2001 (103) 2002 (133) 2003 (149) 2004 (174) 2005 (271) 2006 (323) 2007 (327) 2008 (332) 2009 (268) 2010 (156) 2011 (146) 2012 (174) 2013 (206) 2014 (190) 2015 (235) 2016 (244) 2017 (227) 2018 (253) 2019 (321) 2020 (327) 2021 (345) 2022 (334) 2023 (382) 2024 (105)
Publication types (Num. hits)
article(2894) data(9) incollection(31) inproceedings(3110) phdthesis(55)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1853 occurrences of 1182 keywords

Results
Found 6099 publication records. Showing 6099 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Ari Juels, Dario Catalano, Markus Jakobsson Coercion-resistant electronic elections. Search on Bibsonomy WPES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF electronic voting, mix networks, receipt-freeness, coercion-resistance
15Miha Ciglar Tastes like... Search on Bibsonomy ACM Multimedia The full citation details ... 2005 DBLP  DOI  BibTeX  RDF analogue oscillations, imperfection, interaction, transformation, feedback, conduction, resistance
15Christopher L. Salter, Sha Xin Wei Sponge: a case study in practice-based collaborative art research. Search on Bibsonomy Creativity & Cognition The full citation details ... 2005 DBLP  DOI  BibTeX  RDF art research, consensual domains, shared language, transdisciplinary, performance, interaction, gesture, communities of practice, embodied interaction, materiality, boundary objects, agency, resistance, responsive environments, communities of interest
15Matias Madou, Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere Hybrid static-dynamic attacks against software protection mechanisms. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF watermarking, attacks, intellectual property, obfuscation, software protection, tamper-resistance
15Aishwarya Dubey P/G Pad Placement Optimization: Problem Forumulation for Best IR Drop. Search on Bibsonomy ISQED The full citation details ... 2005 DBLP  DOI  BibTeX  RDF P/G (Power/Ground) pad placement, current sink, package resistance, package inductance, IR drop
15Offer Shai, Daniel Rubin Representing and analysing integrated engineering systems through combinatorial representations. Search on Bibsonomy Eng. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Abbreviations CR Combinatorial Representations, FCFS Flow Controlled Flow Source, FCPS Flow Controlled Potential difference Source, FGR Flow Graph Representation, MCA Multidisciplinary Combinatorial Approach, PCFS Potential difference Controlled Flow Source, PCPS Potential difference Controlled Potential difference Source, PGR Potential Graph Representation, RGR Resistance Graph Representation
15Srivaths Ravi 0001, Anand Raghunathan, Paul C. Kocher, Sunil Hattangady Security in embedded systems: Design challenges. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF processing requirements, security, Embedded systems, authentication, architecture, encryption, security protocols, hardware design, tamper resistance, decryption, cryptographic algorithms, security attacks, battery life
15Cheng-Lin Liu, Hiroshi Sako, Hiromichi Fujisawa Effects of Classifier Structures and Training Regimes on Integrated Segmentation and Recognition of Handwritten Numeral Strings. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF integrated segmentation and recognition, noncharacter resistance, character classification, neural classifiers, discriminative density models, support vector classifiers, Numeral string recognition
15Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao Zhang 0037 Attacks and risk analysis for hardware supported software copy protection systems. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF attack, tamper resistance, copy protection
15Srivaths Ravi 0001, Paul C. Kocher, Ruby B. Lee, Gary McGraw, Anand Raghunathan Security as a new dimension in embedded system design. Search on Bibsonomy DAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF software attacks, security, performance, design, embedded systems, architectures, cryptography, sensors, PDAs, design methodologies, security protocols, digital rights management, trusted computing, tamper resistance, viruses, battery life, security processing
15Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas Silicon physical random functions. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF physical random function, unclonability, identification, smartcard, tamper resistance, physical security
15Tao Zhang 0037, Santosh Pande, André L. M. dos Santos, Franz Josef Bruecklmayr Leakage-proof program partitioning. Search on Bibsonomy CASES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF multi-application smart card, mobile code, tamper-resistance, program partitioning
15José R. Sendra, Javier del Pino, Antonio Hernández, Javier Hernández, Jaime Aguilera, Andrés Garcia-Alonso, Antonio Núñez Integrated Inductors Modeling and Tools for Automatic Selection and Layout Generation. Search on Bibsonomy ISQED The full citation details ... 2002 DBLP  DOI  BibTeX  RDF parasitic effects, Eddy currents, magnetic flux, models, Integrated, inductance, resistance, spiral
15David Samyde, Sergei P. Skorobogatov, Ross J. Anderson, Jean-Jacques Quisquater On a New Way to Read Data from Memory. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF data remanence, electromagnetic security, semi-invasive attacks, optical probing, eddy current attack, Smartcards, tamper resistance
15Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor The architecture of robust publishing systems. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Censorship resistance, Web publishing
15Peter J. B. Lagendijk, Roel W. Schuring, Ton A. M. Spil Telecommunication as a Medicine for General Practitioners. Search on Bibsonomy HICSS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF healthcare chain, communication, information technology, healthcare, information flows, resistance
15Sung-Ming Yen, Marc Joye Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2000 DBLP  DOI  BibTeX  RDF fault-based cryptanalysis, interleaved modular multiplication, Cryptography, exponentiation, tamper resistance
15Shannon V. Morton On-Chip Inductance Issues in Multiconductor Systems. Search on Bibsonomy DAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF alpha microprocessor, cross-talk, interconnect, noise, inductance, transmission line, capacitance, resistance, buses, semiconductor, RLC
15Kylie Sayer, Linda Harvey Empowerment in business process reengineering: an ethnographic study of implementation discourses. Search on Bibsonomy ICIS The full citation details ... 1997 DBLP  BibTeX  RDF resistance to change, state government, ethnography, business process reengineering
15Jason Cong, Cheng-Kok Koh Interconnect layout optimization under higher-order RLC model. Search on Bibsonomy ICCAD The full citation details ... 1997 DBLP  DOI  BibTeX  RDF RATS trees, Steiner routings, bounded-radius Steiner trees, higher-order RLC model, incremental moment computation algorithm, interconnect layout optimization, nonmonotone signal response, required-arrival-time Steiner trees, resistance-inductance-capacitance circuits, routing area, routing cost, routing topologies, shortest-path Steiner trees, signal delay, signal settling time, voltage overshoot, waveform optimization, waveform quality evaluation, wire-sizing optimization, circuit optimisation, topology optimization, delay optimization
15Taekyoung Kwon 0002, JooSeok Song Security and efficiency in authentication protocols resistant to password guessing attack. Search on Bibsonomy LCN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF password guessing attack resistance, secret, user-chosen weak secret, security-oriented protocols, cipher operations, protocol steps, poorly-chosen weak secret protection, security, efficiency, cryptographic protocols, key exchange, message authentication, authentication protocols, secure communications, random numbers, dictionary attacks
15Hong Hao, Edward J. McCluskey Analysis of Gate Oxide Shorts in CMOS Circuits. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1993 DBLP  DOI  BibTeX  RDF resistance dependence, voltage dependence, pattern dependence, logic gate operation, p-channel transistors, n-channel transistors, CMOS integrated circuits, integrated logic circuits, CMOS circuits, logic gates, defect models, temperature dependence, gate oxide shorts, semiconductor device models
15Uriel Feige A Randomized Time-Space Tradeoff of \tildeO(m\tildeR) for USTCON Search on Bibsonomy FOCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF USTCON, virtual resistance, random walk, time-space tradeoff
15Patrick Constant, Stan Matwin, Franz Oppacher LEW: Learning by Watching. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF problem-solution pairs, noise resistance, question-answer pairs, learning by watching, LEW, machine learning system, QUIZ Advisor, block-world planning, near-miss metric, knowledge representation, knowledge based systems, expert systems, knowledge acquisition, knowledge acquisition, learning systems, inductive learning, background knowledge
13Michal Draminski, Marcin Kierczak, Jacek Koronacki, Henryk Jan Komorowski Monte Carlo Feature Selection and Interdependency Discovery in Supervised Classification. Search on Bibsonomy Advances in Machine Learning II The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
13Shinichi Yasuda, Tetsufumi Tanamoto, Kazutaka Ikegami, Atsuhiro Kinoshita, Keiko Abe, Hirotaka Nishino, Shinobu Fujita High-performance FPGA based on novel DSS-MOSFET and non-volatile configuration memory (abstract only). Search on Bibsonomy FPGA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF dopant-segregated schottky transistor, nonvolatile configurable memory
13Yongchan Ban, David Z. Pan Compact modeling and robust layout optimization for contacts in deep sub-wavelength lithography. Search on Bibsonomy DAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF optimization, VLSI, DFM, variation, lithography, contact
13Hyokyung Bahn, Soyoon Lee, Sam H. Noh P/PA-SPTF: Parallelism-aware request scheduling algorithms for MEMS-based storage devices. Search on Bibsonomy ACM Trans. Storage The full citation details ... 2009 DBLP  DOI  BibTeX  RDF seek time, scheduling, parallelism, starvation, MEMS-based storage
13Eugene Y. Vasserman, Rob Jansen, James Tyra, Nicholas Hopper, Yongdae Kim Membership-concealing overlay networks. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF membership concealment, security, privacy, peer-to-peer networks
13Ryan W. Gardner, Sujata Garera, Aviel D. Rubin Coercion Resistant End-to-end Voting. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF end-to-end voting, privacy, cryptography, coercion
13Fei Zhang 0002, Guangjun Liu, Lijin Fang Battery state estimation using Unscented Kalman Filter. Search on Bibsonomy ICRA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Moonsoo Sung, Keesam Jeong, Gilsoo Cho Establishing a Measurement System for Human Motions Using a Textile-Based Motion Sensor. Search on Bibsonomy HCI (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF human posture, textile-based motion sensor, measurement, human motion, electronic textile
13Lei Zhang 0025, Tongtong Li Spectrally Efficient Frequency Hopping System Design under Hostile Jamming. Search on Bibsonomy WASA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF physical layer security, message-driven frequency hopping, Anti-jamming
13Kristof Steurbaut, Sofie Van Hoecke, Kristof Taveirne, Kristof Lamont, Filip De Turck, Kirsten Colpaert, Pieter Depuydt, Dominique Benoit, Chris Danneels, Johan Decruyenaere Design of Software Services for Computer-Based Infection Control and Antibiotic Management in the Intensive Care Unit. Search on Bibsonomy eTELEMED The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, Xiang-Yang Li 0001, Yunhao Liu 0001 Randomizing RFID Private Authentication. Search on Bibsonomy PerCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Anja Lehmann, Stefano Tessaro A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Alexander Hoffmann, Daniel Spelmezan, Jan O. Borchers TypeRight: a keyboard with tactile error prevention. Search on Bibsonomy CHI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF adopting input device, haptic, text entry, tactile feedback, error prevention
13Ewan Fleischmann, Michael Gorski, Stefan Lucks On the Security of Tandem-DM. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF block cipher based, double-block length, Tandem-DM, Cryptographic hash function, ideal cipher model, proof of security
13Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu 0001 Enhanced Target Collision Resistant Hash Functions Revisited. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF TCR, eTCR, Hash Functions, CR, Domain Extension
13Julien Bringer, Hervé Chabanne, Thomas Icart On Physical Obfuscation of Cryptographic Algorithms. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF POK, stream ciphers, masking, RFID tags, PUF
13Marek A. Bawiec Resonant Tunnelling Diode-Based Circuits: Simulation and Synthesis. Search on Bibsonomy EUROCAST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Nanoelectronic Devices, NDR Modelling, Boolean Logic Synthesis, SPICE Simulation
13Nancy Ying Zhou, Rouwaida Kanj, Kanak Agarwal, Zhuo Li 0001, Rajiv V. Joshi, Sani R. Nassif, Weiping Shi The impact of BEOL lithography effects on the SRAM cell performance and yield. Search on Bibsonomy ISQED The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Yulei Zhang 0002, Ling Zhang, Alina Deutsch, George A. Katopis, Daniel M. Dreps, James F. Buckwalter, Ernest S. Kuh, Chung-Kuan Cheng Design methodology of high performance on-chip global interconnect using terminated transmission-line. Search on Bibsonomy ISQED The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Thomas Popp, Mario Kirschbaum, Stefan Mangard Practical Attacks on Masked Hardware. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DPA-Resistant Masked Logic Styles, MDPL, Prototype Chip, Hardware AES, PDF-Attack, PRNG
13Kazuo Sakiyama, Tatsuya Yagi, Kazuo Ohta Fault Analysis Attack against an AES Prototype Chip Using RSL. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Random Switching Logic, Clock-based Attack, AES, Fault Analysis
13Jaime Ramírez-Angulo, Ramón González Carvajal, Antonio J. López-Martín Techniques for the Design of Low Voltage Power Efficient Analog and Mixed Signal Circuits. Search on Bibsonomy VLSI Design The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Matthieu Rivain, Emmanuel Prouff, Julien Doget Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Minoru Saeki, Daisuke Suzuki, Koichi Shimizu, Akashi Satoh A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13J.-C. Guo, Y.-M. Lin A Compact RF CMOS Modeling for Accurate High-Frequency Noise Simulation in Sub-100-nm MOSFETs. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Prabir Barooah, João Pedro Hespanha Estimation From Relative Measurements: Electrical Analogy and Large Graphs. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Mattia Prosperi, Giovanni Ulivi Evolutionary Fuzzy Modelling for Drug Resistant HIV-1 Treatment Optimization. Search on Bibsonomy Engineering Evolutionary Intelligent Systems The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Sansiri Tanachutiwat, Wei Wang 0003 Exploring Multi-layer Graphene Nanoribbon Interconnects. Search on Bibsonomy NanoNet The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Graphene, Modeling, Interconnect, Conductance
13Shohei Fujino, Daisuke Sato 0002, Koyu Abe, Atsushi Konno, Masaru Uchiyama Displaying feeling of cutting by a micro-scissors type haptic device. Search on Bibsonomy ICRA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Chao Yang 0020, John W. Finch A Comparison of Induction Motor Speed Estimation Using Conventional MRAS and an AI-Based MRAS Parallel System. Search on Bibsonomy World Congress on Engineering (Selected Papers) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Dynamic reference model, Model Reference Adaptive System (MRAS), induction motor control, neural networks
13Emmanouil G. Sifakis, George I. Lambrou, Andriana Prentza, Dimitris Koutsouris, Fotini Tzortzatou-Stathopoulou cDNA microarray analysis of a glucocorticoid treated acute lymphoblastic leukemia cell line. Search on Bibsonomy BIBE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Michael Backes 0001, Catalin Hritcu, Matteo Maffei Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus. Search on Bibsonomy CSF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Electronic Voting Protocols, Language-based security, Applied Pi-calculus
13Ming-Chin Chuang, Jeng Farn Lee LMAM: A Lightweight Mutual Authentication Mechanism for Network Mobility in Vehicular Networks. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Zheng Chen, Dawn R. Hedgepeth, Xiaobo Tan A nonlinear, control-oriented model for ionic polymer-metal composite actuators. Search on Bibsonomy CDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Xiuyao Song, Chris Jermaine, Sanjay Ranka, John Gums A bayesian mixture model with linear regression mixing proportions. Search on Bibsonomy KDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF bayesian mixture model, mixing proportion, linear regression, gibbs sampler
13Minoru Kuribayashi, Naoyuki Akashi, Masakatu Morii On the systematic generation of Tardos's fingerprinting codes. Search on Bibsonomy MMSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Michael Backes 0001, Dominique Unruh Limits of Constructive Security Proofs. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Yoshihiro Mitani, Yuuki Sugimura, Yoshihiko Hamamoto A Method for Reading a Resistor by Image Processing Techniques. Search on Bibsonomy KES (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Gang Zhou, Soo Wohn Lee, Yubao Li Preparation and Microstructural Characterization of Al2O3/ZrO2 Nanocomposites to Use in the Femoral Head of Hip Replacement. Search on Bibsonomy BMEI (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Ioannis Savidis, Eby G. Friedman Electrical modeling and characterization of 3-D vias. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Mikhail Popovich, Eby G. Friedman Nanoscale on-chip decoupling capacitors. Search on Bibsonomy SoCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Hiroyuki Kataoka, Shigeho Noda, Hideo Yokota, Shu Takagi, Ryutaro Himeno, Shigenobu Okazawa Simulations of Needle Insertion by Using a Eulerian Hydrocode FEM and the Experimental Validations. Search on Bibsonomy MICCAI (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Eulerian hydrocode, friction, FEM, needle insertion, large deformation
13Michael Backes 0001, Boris Köpf Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Richard Matthew McCutchen The Least-Unpopularity-Factor and Least-Unpopularity-Margin Criteria for Matching Problems with One-Sided Preferences. Search on Bibsonomy LATIN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF one-sided preferences, popular matching, algorithms, matching, NP-hardness, voting
13Zuo Li, Wenjiang Wu Study on Stability of Electric Power Steering System. Search on Bibsonomy RAM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Jonathan Rosenfeld, Eby G. Friedman Design Methodology for Global Resonant H-Tree Clock Distribution Networks. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Givon Zirkind AFIS data compression: an example of how domain specific compression algorithms can produce very high compression ratios. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2007 DBLP  DOI  BibTeX  RDF AFIS, automated fingerprint identification systems, double compression, limits of compression, retrofitting, serial compression, software engineering, data integrity, compression, data compression, image compression, fingerprinting, graphics, portability, image quality, compatibility, data encryption
13Jung Hwan Choi, Aditya Bansal, Mesut Meterelliyoz, Jayathi Murthy, Kaushik Roy 0001 Self-Consistent Approach to Leakage Power and Temperature Estimation to Predict Thermal Runaway in FinFET Circuits. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Shan He 0002, Min Wu 0001 Collusion-Resistant Video Fingerprinting for Large User Group. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Xuxian Jiang, Xinyuan Wang 0005, Dongyan Xu Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF virtual machines, malware detection, rootkits
13Andriy Panchenko 0001, Lexi Pimenidis Using Trust to Resist Censorship in the Presence of Collusion. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Min Ni, Seda Ogrenci Memik Self-heating-aware optimal wire sizing under Elmore delay model. Search on Bibsonomy DATE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Patricia Buendia Reconstructing Mutational Pathways from Serial Evolutionary Trees. Search on Bibsonomy BIBE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Xiren Wang, Wenjian Yu, Zeyi Wang A New Boundary Element Method for Multiple-Frequency Parameter Extraction of Lossy Substrates. Search on Bibsonomy ASP-DAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Arthur Nieuwoudt, Mosin Mondal, Yehia Massoud Predicting the Performance and Reliability of Carbon Nanotube Bundles for On-Chip Interconnect. Search on Bibsonomy ASP-DAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Sheng Zhong 0002, Fan Wu On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks. Search on Bibsonomy MobiCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF routing, wireless ad hoc networks, collusion
13Kuei-Hsiang Chao, Meng-Hui Wang, Chia-Chang Hsu A Novel Residual Capacity Estimation Method Based on Extension Neural Network for Lead-Acid Batteries. Search on Bibsonomy ISNN (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Chin-Pao Hung, Kuei-Hsiang Chao CMAC Neural Network Application on Lead-Acid Batteries Residual Capacity Estimation. Search on Bibsonomy ICIC (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF neural network, batteries, CMAC, capacity estimation
13Lingyu Wang 0001, Anoop Singhal, Sushil Jajodia Measuring the Overall Security of Network Configurations Using Attack Graphs. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Mamoru Yoshida, Hirokazu Tatano Post-inspection payment plan for building inspection. Search on Bibsonomy SMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Olivier Billet, Matthew J. B. Robshaw, Thomas Peyrin On Building Hash Functions from Multivariate Quadratic Equations. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Sultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF filter function, stream ciphers, initialization, algebraic attacks, clock-control
13Shijun Xiang, Hyoung-Joong Kim Geometrically Invariant Image Watermarking in the DWT Domain. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Nicholas D. Sylvester, William R. Provancher Effects of Longitudinal Skin Stretch on the Perception of Friction. Search on Bibsonomy WHC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Hirotaka Koizumi, Kosuke Kurokawa Class DE Inverter with Asymmetric Shunt Capacitors. Search on Bibsonomy ISCAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Karim M. El Defrawy, Gene Tsudik ALARM: Anonymous Location-Aided Routing in Suspicious MANETs. Search on Bibsonomy ICNP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13King-Wei Hor, Denis Tran, Allaudin A. Kamani, Vickie Lessoway, Robert Rohling Instrumentation for Epidural Anesthesia. Search on Bibsonomy MICCAI (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Mustafa Altun, Hakan Kuntman High CMRR current mode operational amplifier with a novel class AB input stage. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF current-mode operational amplifier, current-mode circuits
13Anjela Yu. Matrosova, Ekaterina Loukovnikova, Sergei Ostanin, Alexandra Zinchuk, Ekaterina Nikolaeva Test Generation for Single and Multiple Stuck-at Faults of a Combinational Circuit Designed by Covering Shared ROBDD with CLBs. Search on Bibsonomy DFT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Santosh Shah, Arani Sinha, Li Song, Narain D. Arora On-Chip Inductance in X Architecture Enabled Design. Search on Bibsonomy ISQED The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Zhen-Ai Jin, Hyun-Ju Cho, Kee-Young Yoo An Efficient Authentication Protocol for Low-Cost RFID Systems. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, Authentication, RFID, location privacy, symmetric encryption
13Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang On Secure Multi-party Computation in Black-Box Groups. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Planar Graph, Graph Colouring, Black-Box, Multi-Party Computation, Non-Abelian Group
13Daniel O. Rice A Proposal for the Security of Peer-to-Peer (P2P) Networks: a pricing model inspired by the theory of complex networks. Search on Bibsonomy CISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Alberto Trevisani, Paolo Gallina, Robert L. Williams II Cable-Direct-Driven Robot (CDDR) with Passive SCARA Support: Theory and Simulation. Search on Bibsonomy J. Intell. Robotic Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF actuation redundancy, cable-direct-driven robots, dynamic minimum torque estimation, passive support
13Catherine H. Gebotys A table masking countermeasure for low-energy secure embedded systems. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Douglas R. Stinson Some Observations on the Theory of Cryptographic Hash Functions. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF AMS Classification 94A60
Displaying result #401 - #500 of 6099 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license