NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3 4 5
hits: 4,058,103
1.
  • Data Compression Data Compression
    Salomon, David 2007, 2006, 2007-03-30
    eBook

    "This book provides a comprehensive reference for the many different types and methods of compression. Included are a detailed and helpful taxonomy, analysis of most common methods, and discussions ...
Full text
2.
  • YOLOv7: Trainable Bag-of-Freebies Sets New State-of-the-Art for Real-Time Object Detectors
    Wang, Chien-Yao; Bochkovskiy, Alexey; Liao, Hong-Yuan Mark 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2023-June
    Conference Proceeding
    Open access

    Real-time object detection is one of the most important research topics in computer vision. As new approaches regarding architecture optimization and training optimization are continually being ...
Full text
3.
  • Power Analysis Attacks Power Analysis Attacks
    Mangard, Stefan; Oswald, Elisabeth; Popp, Thomas 2007
    eBook

    Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic ...
Full text
4.
  • Chaos-based Cryptography Chaos-based Cryptography
    Kocarev, Ljupco; Lian, Shiguo 2011, Volume: 354
    eBook

    Chaos-based cryptography has attracted great interest in the past decade. This book gives a thorough description of chaos-based cryptography. Written by leading experts, it covers the basic theories, ...
Full text
5.
Full text

PDF
6.
  • Algebraic Cryptanalysis Algebraic Cryptanalysis
    Bard, Gregory V 2009, 20090727
    eBook

    Algebraic Cryptanalysis acts as a guide for advanced-level students and researchers/practitioners who wish to enter this new field. This text bridges the gap between a course in cryptography, and ...
Full text
7.
  • Securing Wireless Communica... Securing Wireless Communications at the Physical Layer
    Liu, Ruoheng; Trappe, Wade 2010.
    eBook

    The book focuses on a recently emerging topic in security. Specifically, the book focuses on physical layer security. Whereas conventional security mechanisms involve cryptography that operates at ...
Full text
8.
  • Algorithms for Big Data Algorithms for Big Data
    Bast, Hannah; Korzen, Claudius; Meyer, Ulrich ... 2022, 2023, 2023-01-17, Volume: 13201
    eBook
    Open access

    This open access book surveys the progress in addressing selected challenges related to the growth of big data in combination with increasingly complicated hardware. It emerged from a research ...
Full text
9.
  • A survey of safety and trus... A survey of safety and trustworthiness of deep neural networks: Verification, testing, adversarial attack and defence, and interpretability
    Huang, Xiaowei; Kroening, Daniel; Ruan, Wenjie ... Computer science review, August 2020, 2020-08-00, Volume: 37
    Journal Article
    Open access

    In the past few years, significant progress has been made on deep neural networks (DNNs) in achieving human-level performance on several long-standing tasks. With the broader deployment of DNNs on ...
Full text

PDF
10.
  • Twin-width I: Tractable FO ... Twin-width I: Tractable FO Model Checking
    Bonnet, Édouard; Kim, Eun Jung; Thomassé, Stéphan ... Journal of the ACM, 02/2022, Volume: 69, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Inspired by a width invariant defined on permutations by Guillemot and Marx SODA’14, we introduce the notion of twin-width on graphs and on matrices. Proper minor-closed classes, bounded rank-width ...
Full text

PDF
1 2 3 4 5
hits: 4,058,103

Load filters