Works matching Communication complexity (Information theory)
1
- Japanese Journal of Mathematics, 2019, v. 14, n. 1, p. 27, doi. 10.1007/s11537-018-1727-9
- Article
2
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00304-x
- Zhou, Zibo;
- Zhang, Zongyang;
- Liu, Jianwei;
- Qian, Haifeng
- Article
3
- Scientific Reports, 2014, p. 1, doi. 10.1038/srep04476
- Huai-Xin Lu;
- Lian-Zhen Cao;
- Jia-Qiang Zhao;
- Ying-De Li;
- Xiao-Qin Wang
- Article
4
- Albanian Journal of Mathematics, 2013, v. 7, n. 2, p. 77
- TEMİIZ, FAİIH;
- ŞİAP, VEDAT
- Article
5
- GeoInformatica, 2013, v. 17, n. 4, p. 669, doi. 10.1007/s10707-012-0174-7
- Jeong, Myeong-Hun;
- Duckham, Matt
- Article
6
- Computer Assisted Language Learning, 2016, v. 29, n. 5, p. 1050, doi. 10.1080/09588221.2016.1170040
- Article
7
- Computer Assisted Language Learning, 2016, v. 29, n. 5, p. 968, doi. 10.1080/09588221.2015.1113185
- Article
8
- Nonlinear Dynamics, 2018, v. 93, n. 3, p. 1287, doi. 10.1007/s11071-018-4259-1
- Komareji, M.;
- Shang, Y.;
- Bouffanais, R.
- Article
9
- Discrete Mathematics & Applications, 2017, v. 27, n. 1, p. 15, doi. 10.1515/dma-2017-0003
- Article
10
- Peer-to-Peer Networking & Applications, 2017, v. 10, n. 5, p. 1257, doi. 10.1007/s12083-016-0478-8
- Meng, Xianfu;
- Meng, Hongxi;
- Li, Tianjiao
- Article
11
- Peer-to-Peer Networking & Applications, 2015, v. 8, n. 1, p. 111, doi. 10.1007/s12083-013-0238-y
- Article
12
- Mathematical Programming, 2017, v. 162, n. 1/2, p. 495, doi. 10.1007/s10107-016-1052-0
- Lee, Troy;
- Wei, Zhaohui;
- Wolf, Ronald
- Article
13
- Mathematical Programming, 2016, v. 158, n. 1/2, p. 417, doi. 10.1007/s10107-015-0937-7
- Fawzi, Hamza;
- Parrilo, Pablo
- Article
14
- Circuits, Systems & Signal Processing, 2018, v. 37, n. 10, p. 4384, doi. 10.1007/s00034-018-0770-3
- Ul Haque, Mubin;
- Sworna, Zarrin Tasnim;
- Hasan Babu, Hafiz Md.;
- Biswas, Ashis Kumer
- Article
15
- Journal of Cryptology, 2017, v. 30, n. 4, p. 961, doi. 10.1007/s00145-016-9239-3
- Applebaum, Benny;
- Raykov, Pavel
- Article
16
- Journal of Cryptology, 2017, v. 30, n. 3, p. 805, doi. 10.1007/s00145-016-9236-6
- Asharov, Gilad;
- Lindell, Yehuda;
- Schneider, Thomas;
- Zohner, Michael
- Article
17
- Journal of Cryptology, 2015, v. 28, n. 1, p. 49, doi. 10.1007/s00145-013-9172-7
- Patra, Arpita;
- Choudhury, Ashish;
- Pandu Rangan, C.
- Article
18
- Journal of Cryptology, 2015, v. 28, n. 1, p. 161, doi. 10.1007/s00145-014-9180-2
- Baumeler, Ämin;
- Broadbent, Anne
- Article
19
- Journal of Cryptology, 2014, v. 27, n. 4, p. 636, doi. 10.1007/s00145-013-9157-6
- Amir, Yair;
- Bunn, Paul;
- Ostrovsky, Rafail
- Article
20
- International Journal of Modern Physics C: Computational Physics & Physical Computation, 2016, v. 27, n. 3, p. -1, doi. 10.1142/S0129183116500297
- Alba, Alfonso;
- Mendez, Martin O.;
- Rubio-Rincon, Miguel E.;
- Arce-Santana, Edgar R.
- Article
21
- KSII Transactions on Internet & Information Systems, 2012, v. 6, n. 10, p. 2601, doi. 10.3837/tiis.2012.10.09
- Zhengmin Kong;
- Yanjun Fang;
- Yuxuan Zhang;
- Shixin Peng;
- Guangxi Zhu
- Article
22
- Robotica, 2015, v. 33, n. 1, p. 157, doi. 10.1017/S0263574714000058
- Couceiro, Micael S.;
- Fernandes, Amadeu;
- Rocha, Rui P.;
- Ferreira, Nuno M. F.
- Article
23
- Human Communication Research, 1983, v. 9, n. 2, p. 158, doi. 10.1111/j.1468-2958.1983.tb00690.x
- Article
24
- Human Communication Research, 1982, v. 9, n. 1, p. 59, doi. 10.1111/j.1468-2958.1982.tb00683.x
- Article
25
- Transactions on Emerging Telecommunications Technologies, 2017, v. 28, n. 12, p. n/a, doi. 10.1002/ett.3250
- Marinello Filho, José Carlos;
- Panazio, Cristiano Magalhães;
- Abrão, Taufik
- Article
26
- Transactions on Emerging Telecommunications Technologies, 2017, v. 28, n. 12, p. n/a, doi. 10.1002/ett.3200
- Chandrakar, Preeti;
- Om, Hari
- Article
27
- Nature Photonics, 2014, v. 8, n. 12, p. 958, doi. 10.1038/nphoton.2014.252
- De Palma, G.;
- Mari, A.;
- Giovannetti, V.
- Article
28
- Theory of Computing Systems, 2014, v. 54, n. 1, p. 13, doi. 10.1007/s00224-013-9476-x
- Article
29
- Numerical Linear Algebra with Applications, 2014, v. 21, n. 2, p. 275, doi. 10.1002/nla.1928
- Vassilevski, Panayot S.;
- Yang, Ulrike Meier
- Article
30
- Distributed Computing, 2017, v. 30, n. 5, p. 309, doi. 10.1007/s00446-014-0218-3
- Woodruff, David;
- Zhang, Qin
- Article
31
- Distributed Computing, 2014, v. 27, n. 2, p. 111, doi. 10.1007/s00446-013-0200-5
- Patra, Arpita;
- Choudhury, Ashish;
- Rangan, C.
- Article
32
- IET Generation, Transmission & Distribution (Wiley-Blackwell), 2021, v. 15, n. 12, p. 1884, doi. 10.1049/gtd2.12142
- Kou, Yu;
- Wang, Yinghui;
- Bie, Zhaohong;
- Wang, Xu;
- Ding, Tao
- Article
33
- Theory of Computing Systems, 2017, v. 60, n. 3, p. 378, doi. 10.1007/s00224-016-9738-5
- Gavinsky, Dmitry;
- Pudlák, Pavel
- Article
34
- Theory of Computing Systems, 2016, v. 59, n. 3, p. 517, doi. 10.1007/s00224-015-9661-1
- Antunes, Luís;
- Buhrman, Harry;
- Matos, Armando;
- Souto, André;
- Teixeira, Andreia
- Article
35
- Entropy, 2025, v. 27, n. 4, p. 339, doi. 10.3390/e27040339
- Article
36
- Entropy, 2019, v. 21, n. 2, p. 171, doi. 10.3390/e21020171
- Zambrini Cruzeiro, Emmanuel;
- Gisin, Nicolas
- Article
37
- Entropy, 2019, v. 21, n. 2, p. 104, doi. 10.3390/e21020104
- Montina, Alberto;
- Wolf, Stefan
- Article
38
- Entropy, 2017, v. 19, n. 10, p. 545, doi. 10.3390/e19100545
- Article
39
- Quantum Information Processing, 2017, v. 16, n. 1, p. 1, doi. 10.1007/s11128-016-1476-8
- Shi, Run-hua;
- Mu, Yi;
- Zhong, Hong;
- Cui, Jie;
- Zhang, Shun
- Article
40
- Quantum Information Processing, 2016, v. 15, n. 9, p. 3833, doi. 10.1007/s11128-016-1367-z
- Yang, Yu-Guang;
- Liu, Zhi-Chao;
- Chen, Xiu-Bo;
- Cao, Wei-Feng;
- Zhou, Yi-Hua;
- Shi, Wei-Min
- Article
41
- Wireless Personal Communications, 2014, v. 79, n. 3, p. 2227, doi. 10.1007/s11277-014-1982-x
- Zhao, Hongzhi;
- Ma, Song;
- Liu, Fengwei;
- Tang, Youxi
- Article
42
- Electronics Letters (Wiley-Blackwell), 2014, v. 50, n. 19, p. 1345, doi. 10.1049/el.2014.1493
- Kang, D.;
- Kang, Y.;
- Lee, E.;
- Hong, Y.
- Article
43
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00076-8
- Article
44
- Modern Physics Letters A, 2015, v. 30, n. 1, p. -1, doi. 10.1142/S0217732315300013
- Article
45
- Discrete & Computational Geometry, 2019, v. 61, n. 3, p. 653, doi. 10.1007/s00454-018-9988-x
- Article
46
- Discrete & Computational Geometry, 2015, v. 53, n. 2, p. 397, doi. 10.1007/s00454-014-9655-9
- Kaibel, Volker;
- Weltge, Stefan
- Article
47
- IET Communications (Wiley-Blackwell), 2017, v. 11, n. 11, p. 1719, doi. 10.1049/iet-com.2016.1048
- Chengwei Zhou;
- Yujie Gu;
- Yimin D. Zhang;
- Zhiguo Shi;
- Tao Jin;
- Xidong Wu
- Article
48
- IET Communications (Wiley-Blackwell), 2015, v. 9, n. 5, p. 728, doi. 10.1049/iet-com.2014.0396
- Jingxian Wu;
- Longbao Wang;
- Chengshan Xiao
- Article
49
- Iraqi Journal of Science, 2021, p. 267, doi. 10.24996/ijs.2021.SI.1.37
- Hasan, Sami;
- Amer, Abdulhakeem
- Article
50
- International Journal of Aerospace Engineering, 2018, p. 1, doi. 10.1155/2018/2857674
- Sun, Hui-yu;
- Song, Guang-ming;
- Wei, Zhong;
- Zhang, Ying
- Article