DIKUL - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1 2 3 4 5
hits: 4,101,697
1.
  • Data Compression Data Compression
    Salomon, David 2007, 2006, 2007-03-30
    eBook

    "This book provides a comprehensive reference for the many different types and methods of compression. Included are a detailed and helpful taxonomy, analysis of most common methods, and discussions ...
Full text
Available for: UL
2.
  • Blockchain Basics Blockchain Basics
    Drescher, Daniel 2017, 2017-03-14T00:00:00, 2017-03-14, 2017.
    eBook

    In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, ...
Full text
Available for: CEKLJ
3.
  • YOLOv7: Trainable Bag-of-Freebies Sets New State-of-the-Art for Real-Time Object Detectors
    Wang, Chien-Yao; Bochkovskiy, Alexey; Liao, Hong-Yuan Mark 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2023-June
    Conference Proceeding
    Open access

    Real-time object detection is one of the most important research topics in computer vision. As new approaches regarding architecture optimization and training optimization are continually being ...
Full text
Available for: UL
4.
  • Power Analysis Attacks Power Analysis Attacks
    Mangard, Stefan; Oswald, Elisabeth; Popp, Thomas 2007
    eBook

    Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic ...
Full text
Available for: UL
5.
  • Chaos-based Cryptography Chaos-based Cryptography
    Kocarev, Ljupco; Lian, Shiguo 2011, Volume: 354
    eBook

    Chaos-based cryptography has attracted great interest in the past decade. This book gives a thorough description of chaos-based cryptography. Written by leading experts, it covers the basic theories, ...
Full text
Available for: UL
6.
Full text

PDF
7.
  • Algebraic Cryptanalysis Algebraic Cryptanalysis
    Bard, Gregory V 2009, 20090727
    eBook

    Algebraic Cryptanalysis acts as a guide for advanced-level students and researchers/practitioners who wish to enter this new field. This text bridges the gap between a course in cryptography, and ...
Full text
Available for: UL
8.
  • Securing Wireless Communica... Securing Wireless Communications at the Physical Layer
    Liu, Ruoheng; Trappe, Wade 2010.
    eBook

    The book focuses on a recently emerging topic in security. Specifically, the book focuses on physical layer security. Whereas conventional security mechanisms involve cryptography that operates at ...
Full text
Available for: UL
9.
  • Algorithms for Big Data Algorithms for Big Data
    Bast, Hannah; Korzen, Claudius; Meyer, Ulrich ... 2022, 2023, 2023-01-17, Volume: 13201
    eBook
    Open access

    This open access book surveys the progress in addressing selected challenges related to the growth of big data in combination with increasingly complicated hardware. It emerged from a research ...
Full text
Available for: UL
10.
  • A survey of safety and trus... A survey of safety and trustworthiness of deep neural networks: Verification, testing, adversarial attack and defence, and interpretability
    Huang, Xiaowei; Kroening, Daniel; Ruan, Wenjie ... Computer science review, August 2020, 2020-08-00, Volume: 37
    Journal Article
    Open access

    In the past few years, significant progress has been made on deep neural networks (DNNs) in achieving human-level performance on several long-standing tasks. With the broader deployment of DNNs on ...
Full text
Available for: UL

PDF
1 2 3 4 5
hits: 4,101,697

Load filters