Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
24132
search results - page 25 / 4827
»
and 2009
Sort
relevance
views
votes
recent
update
View
thumb
title
62
click to vote
ICITS
2009
92
views
Security Privacy
»
more
ICITS 2009
»
A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes
14 years 7 months ago
Download
www.cacr.math.uwaterloo.ca
Stefan Dziembowski
claim paper
Read More »
65
Voted
ICITS
2009
51
views
Security Privacy
»
more
ICITS 2009
»
What Can Cryptography Do for Coding Theory?
14 years 7 months ago
Download
www.cse.psu.edu
Adam Smith
claim paper
Read More »
68
click to vote
ICUMT
2009
121
views
Communications
»
more
ICUMT 2009
»
Aequorin: Design of a system for reduction of the user's stress in one day
14 years 7 months ago
Download
www.dangkang.com
Satoru Tokuhisa
claim paper
Read More »
50
click to vote
CIIA
2009
160
views
Information Technology
»
more
CIIA 2009
»
Personal Identification by Fingerprints based on Gabor Filters
14 years 10 months ago
Download
sunsite.informatik.rwth-aachen.de
Youssef Elmir, Zakaria Elberrichi, Réda Adj...
claim paper
Read More »
50
click to vote
CIIA
2009
150
views
Information Technology
»
more
CIIA 2009
»
Un Caml Light Distribué
14 years 10 months ago
Download
sunsite.informatik.rwth-aachen.de
Elkamel Merah, Allaoua Chaoui
claim paper
Read More »
« Prev
« First
page 25 / 4827
Last »
Next »