Search for persons
X
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
2
Analysis and Prevention of Averaging Attacks Against Obfusc..:
, In:
?
Fundamentals of Computation Theory; Lecture Notes in Computer Science ,
5
From Symmetry to Asymmetry: Generalizing TSP Approximations..:
, In:
?
Neural Information Processing; Lecture Notes in Computer Science ,
7
Memetic Genetic Algorithms for Time Series Compression by P..:
, In:
?
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
8
Privacy-Preserving Public Verification of Ethical Cobalt So..:
, In:
?
Parallel Problem Solving from Nature – PPSN XV; Lecture Notes in Computer Science ,
12
Destructiveness of Lexicographic Parsimony Pressure and All..:
, In:
?
Proceedings of the Genetic and Evolutionary Computation Conference ,
13
Bounding bloat in genetic programming:
, In:
?
Proceedings of the 14th ACM/SIGEVO Conference on Foundations of Genetic Algorithms ,
14