Year |
Title |
Altmetric |
2016-12-01
|
K. Erciyes, Distributed and sequential algorithms for bioinformatics.
ACM Computing Reviews.
2016-12-01
|
|
2016-07-01
|
D. Gordon, B. Schmidt, A survey of the multiplier conjecture.
ACM Computing Reviews.
2016-07-01
|
|
2016-06-01
|
H. Delfs, H. Knebl, Introduction to cryptography: principles and applications.
ACM Computing Reviews.
2016-06-01
|
|
2016-03-01
|
M. Axelson-Fisk, Comparative gene finding : models, algorithms and implementation.
ACM Computing Reviews.
2016-03-01
|
|
2016-03-01
|
M. Herlihy, D. Kozlov, S. Rajsbaum, Distributed com puting through combinatorial topology.
ACM Computing Reviews.
2016-03-01
|
|
2015-10-01
|
O. Villar, Learning Blender : a hands-on guide to creating 3D animated characters.
ACM Computing Reviews.
2015-10-01
|
|
2015-07-01
|
X. Yi, R. Paulet, E. Bertino, Homomorphic encryption and applications.
ACM Computing Reviews.
2015-07-01
|
|
2015-04-01
|
T. Roeper, M. Speas, Recursion: complexity in cognition.
ACM Computing Reviews.
2015-04-01
|
|
2015-02-01
|
M. Ceberio, V. Kreinovich, Constraint programming and decision making.
ACM Computing Reviews.
2015-02-01
|
|
2015-01-01
|
S. Jajodia, K. Kant, P. Samarati, A. Singhal, V. Swarup, C. Wang, Secure cloud computing.
ACM Computing Reviews.
2015-01-01
|
|
2014-11-01
|
B. Applebaum, Cryptography in constant parallel time.
ACM Computing Reviews.
2014-11-01
|
|
2014-05-01
|
J. Berman, Principles of big data : preparing, sharing, and analyzing complex information.
ACM Computing Reviews.
2014-05-01
|
|
2014-03-01
|
N. lo, Y. Li, Radio frequency identification system security.
ACM Computing Reviews.
2014-03-01
|
|
2014-01-01
|
F. Angiulli, S. Basta, S. Lodi, C. Sartori, Distributed strategies for mining outliers in large data sets.
ACM Computing Reviews.
2014-01-01
|
|