Search for persons
X
?
Post-Quantum Cryptography; Lecture Notes in Computer Science ,
1
Faulting Winternitz One-Time Signatures to Forge LMS, XMSS,..:
, In:
?
Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security ,
2
To Be, or Not to Be Stateful : Post-Quantum Secure Boot ..:
, In:
?
Theoretical Aspects of Computing – ICTAC 2021; Lecture Notes in Computer Science ,
3
Assessing Security of Cryptocurrencies with Attack-Defense ..:
, In:
?
IUTAM Laminar-Turbulent Transition; IUTAM Bookseries ,
4
Stability Analyses of Hypersonic, Conical Flows with Transp..:
, In:
?
Proceedings; Experten-Forum Powertrain: Simulation und Test 2019 ,
5
Untersuchung urformbedingter Fertigungsabweichung und Entwi..:
, In:
?
2019 Winter Simulation Conference (WSC) ,
6
Portfolio Optimization with Expectile and Omega Functions:
, In:
?
Proceedings of the Winter Simulation Conference ,
7
Portfolio optimization with expectile and omega functions:
, In:
?
Multikonferenz Wirtschaftsinformatik 2012 / [Hrsg.:] Dirk Christian Mattfeld; Susanne Robra-Bissantz
8
Supply Chain Management von Arzneimitteln und Medikalproduk..:
, In:
?
Proceedings of the 9th International Conference on Advances in Mobile Computing and Multimedia ,
9
Smart books : adding context-awareness and interaction t..:
, In:
?
Proceedings of the Genetic and Evolutionary Computation Conference Companion ,
12
An overview of LCS research from 2021 to 2022:
, In:
?
Proceedings of the Genetic and Evolutionary Computation Conference Companion ,
13
An overview of LCS research from 2020 to 2021:
, In:
?
Applications of Evolutionary Computation; Lecture Notes in Computer Science ,
14
On the Effects of Absumption for XCS with Continuous-Valued..:
, In:
?
Proceedings of the Genetic and Evolutionary Computation Conference Companion ,
15