Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 4,102,368
1.
  • Data Compression Data Compression
    Salomon, David 2007, 2006, 2007-03-30
    eBook

    "This book provides a comprehensive reference for the many different types and methods of compression. Included are a detailed and helpful taxonomy, analysis of most common methods, and discussions ...
Full text
Available for: FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
2.
  • Blockchain Basics Blockchain Basics
    Drescher, Daniel 2017, 2017-03-14T00:00:00, 2017-03-14, 2017.
    eBook

    In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, ...
Full text
Available for: CEKLJ, UPUK
3.
  • YOLOv7: Trainable Bag-of-Freebies Sets New State-of-the-Art for Real-Time Object Detectors
    Wang, Chien-Yao; Bochkovskiy, Alexey; Liao, Hong-Yuan Mark 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2023-June
    Conference Proceeding
    Open access

    Real-time object detection is one of the most important research topics in computer vision. As new approaches regarding architecture optimization and training optimization are continually being ...
Full text
Available for: IJS, NUK, UL, UM
4.
  • Power Analysis Attacks Power Analysis Attacks
    Mangard, Stefan; Oswald, Elisabeth; Popp, Thomas 2007
    eBook

    Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic ...
Full text
Available for: FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
5.
  • Data Clustering Data Clustering
    Aggarwal, Charu C; Reddy, Chandan K 2014, 2013, 2018-09-03, 2013-08-21, Volume: 31
    eBook

    In this book, top researchers from around the world cover the entire area of clustering, from basic methods to more refined and complex data clustering approaches. They pay special attention to ...
Full text
Available for: UPUK
6.
  • Chaos-based Cryptography Chaos-based Cryptography
    Kocarev, Ljupco; Lian, Shiguo 2011, Volume: 354
    eBook

    Chaos-based cryptography has attracted great interest in the past decade. This book gives a thorough description of chaos-based cryptography. Written by leading experts, it covers the basic theories, ...
Full text
Available for: FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
7.
Full text

PDF
8.
  • Reachability Problems Reachability Problems
    Schmitz, Sylvain; Potapov, Igor 2020, 2020-10-15, Volume: 12448
    eBook, Conference Proceeding
    Peer reviewed

    This book constitutes the refereed proceedings of the 14th International Conference on Reachability Problems, RP 2020, held in Paris, France in October 2020.The 8 full papers presented were carefully ...
Full text
Available for: FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
9.
  • Algebraic Cryptanalysis Algebraic Cryptanalysis
    Bard, Gregory V 2009, 20090727
    eBook

    Algebraic Cryptanalysis acts as a guide for advanced-level students and researchers/practitioners who wish to enter this new field. This text bridges the gap between a course in cryptography, and ...
Full text
Available for: FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
10.
  • Securing Wireless Communica... Securing Wireless Communications at the Physical Layer
    Liu, Ruoheng; Trappe, Wade 2010.
    eBook

    The book focuses on a recently emerging topic in security. Specifically, the book focuses on physical layer security. Whereas conventional security mechanisms involve cryptography that operates at ...
Full text
Available for: FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
1 2 3 4 5
hits: 4,102,368

Load filters