X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (89) 89
Conference Proceeding (87) 87
Book Chapter (23) 23
Book / eBook (17) 17
Web Resource (13) 13
Patent (8) 8
Publication (7) 7
Reference (1) 1
Report (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
computer science (59) 59
computer science, theory & methods (39) 39
algorithms (34) 34
algorithm analysis and problem complexity (23) 23
data encryption (21) 21
discrete mathematics in computer science (21) 21
computer communication networks (15) 15
computer security (14) 14
congresses (14) 14
cryptography (14) 14
electronic books (14) 14
kongress (13) 13
mathematics (13) 13
numeric computing (13) 13
data structures (12) 12
computational complexity (11) 11
computer software (11) 11
online algorithms (11) 11
theory of computation (11) 11
computer graphics (10) 10
computers and society (10) 10
management of computing and information systems (10) 10
mathematics, applied (10) 10
coding and information theory (9) 9
calculating (8) 8
coding theory (8) 8
computer science, information systems (8) 8
computers (8) 8
computing (8) 8
counting (8) 8
data structures, cryptology and information theory (8) 8
electric digital data processing (8) 8
physics (8) 8
software, computer (8) 8
electronic data processing (7) 7
game theory (7) 7
information systems applications (7) 7
mathematical optimization (7) 7
software engineering/programming and operating systems (7) 7
systems and data security (7) 7
algorism (6) 6
approximation (6) 6
complexity, computational (6) 6
computer networks (6) 6
computer science, software engineering (6) 6
management information systems (6) 6
online-algorithmus (6) 6
security measures (6) 6
studies (6) 6
verschlüsselung (6) 6
adp (5) 5
algorithmes en ligne (5) 5
algorithmus (5) 5
automatic data processing (5) 5
automatic drafting (5) 5
computational mathematics and numerical analysis (5) 5
computer communication systems (5) 5
computer systems organization and communication networks (5) 5
data processing (5) 5
edp (5) 5
graphic data processing (5) 5
graphics, computer (5) 5
idp (5) 5
informatics (5) 5
informatique (5) 5
integrated data processing (5) 5
multi-user (5) 5
numerical analysis (5) 5
online algorithms congresses (5) 5
optimisation mathématique (5) 5
theoretical computer science (5) 5
algoritmos (4) 4
bounds (4) 4
cryptology (4) 4
data structures (computer scienc (4) 4
electronic commerce/e-business (4) 4
markov processes (4) 4
operating systems (4) 4
software engineering (4) 4
algorithms congresses (3) 3
analysis (3) 3
approximation algorithms (3) 3
artificial intelligence (3) 3
cloud-storage (3) 3
complexity (3) 3
computation by abstract devices (3) 3
criptografía (3) 3
data encoding (3) 3
datensicherung (3) 3
e-commerce/e-business (3) 3
encryption (3) 3
encryption of data (3) 3
engineering & applied sciences (3) 3
information systems (3) 3
komplexitätstheorie (3) 3
kryptographie (3) 3
markov chains (3) 3
mathematical optimization congresses (3) 3
mathematics of computing (3) 3
mechanism design (3) 3
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, 11/2017, Volume 17, Issue 2, pp. 1 - 1
Package management systems play an essential role in pursuing systems dependability by ensuring that software is correctly installed and kept up-to-date... 
Protocols | Software packages | Package Management Systems | Dependency Enforcement | Secure Software Update | Cryptography | Servers
Journal Article
2003, Lecture notes in computer science, ISBN 9783540401766, Volume 2653., xi, 288
eBook
Theory of Computing Systems, ISSN 1432-4350, 4/2014, Volume 54, Issue 3, pp. 373 - 374
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2004, Volume 3027, pp. 506 - 522
We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice's... 
COMPUTER SCIENCE, THEORY & METHODS
Journal Article
Proceedings of the 2018 ACM SIGSAC Conference on computer and communications security, ISSN 1543-7221, 01/2018, pp. 1002 - 1019
Private information retrieval (PIR) is a fundamental tool for preserving query privacy when accessing outsourced data. All previous PIR constructions have... 
private information retrieval | cloud storage | cryptography | Private information retrieval | Cryptography | Cloud storage
Conference Proceeding
Leibniz International Proceedings in Informatics, LIPIcs, ISSN 1868-8969, 07/2018, Volume 107
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2012, Volume 7288, p. 2
Conference Proceeding
Theory of Computing Systems, ISSN 1432-4350, 1/2015, Volume 56, Issue 1, pp. 1 - 2
Journal Article
Theory of Computing Systems, ISSN 1432-4350, 1/2015, Volume 56, Issue 1, pp. 135 - 136
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2018, Volume 11099, pp. 207 - 227
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2016, Volume 9614, p. V
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2016, Volume 9615
Conference Proceeding
2013, LNCS sublibrary. SL 1, Theoretical computer science and general issues, ISBN 3642380158, Volume 7846, 308
This book constitutes the thoroughly refereed post workshop proceedings of the 10th International Workshop on Approximation and Online Algorithms, WAOA 2012,... 
Online algorithms-Congresses | Approximation algorithms-Congresses | Online algorithms
eBook
Proceedings of the twenty-third annual ACM symposium on parallelism in algorithms and architectures, 06/2011, pp. 197 - 206
We present the first general bounds on the mixing time of logit dynamics for wide classes of strategic games. The logit dynamics describes the behaviour of a... 
Markov chains | game theory | mixing time
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.