Stop the war!
Остановите войну!
for scientists:
default search action
Transactions on Computational Science, Volume 17, 2013
- Marina L. Gavrilova, Chih Jeng Kenneth Tan:
Transactions on Computational Science XVII. Lecture Notes in Computer Science 7420, Springer 2013, ISBN 978-3-642-35839-5
Neural Networks and Cognitive Computing
- Madjid Maidi, Malik Mallem, Laredj Benchikh, Samir Otmane:
An Evaluation of Camera Pose Methods for an Augmented Reality System: Application to Teaching Industrial Robots. 3-30 - Yu-Lin He, Xizhao Wang, Tingting Fu:
A Combined Position Evaluation Function in Chinese Chess Computer Game. 31-50 - Vaisagh Viswanathan T., Michael Lees:
Modeling and Analyzing the Human Cognitive Limits for Perception in Crowd Simulation. 51-72 - Himanshu Thapliyal, H. V. Jayashree, A. N. Nagamani, Hamid R. Arabnia:
Progress in Reversible Processor Design: A Novel Methodology for Reversible Carry Look-Ahead Adder. 73-97
Wireless Sensor Networks Security
- Laxmi Shrivastava, Sarita S. Bhadauraia, Geetam Singh Tomar, Brijesh Kumar Chaurasia:
Secure Congestion Adaptive Routing Using Group Signature Scheme. 101-115 - Pradheepkumar Singaravelu, Shekhar Verma:
Practicability of HFE Scheme for Wireless Sensor Network. 116-132 - Brijesh Kumar Chaurasia, Shekhar Verma, Geetam Singh Tomar:
Intersection Attack on Anonymity in VANET. 133-149 - Ranjeet Singh Tomar, Shekhar Verma, Geetam Singh Tomar:
Cluster Based RSU Centric Channel Access for VANETs. 150-171 - Yongge Wang:
Efficient Identity-Based and Authenticated Key Agreement Protocol. 172-197
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.