Found: 4
Select item for more details and to access through your institution.
Offline/online attribute-based encryption with verifiable outsourced decryption.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 7, p. n/a, doi. 10.1002/cpe.3915
- By:
- Publication type:
- Article
MetaCluster 5.0: a two-round binning approach for metagenomic data for low-abundance species in a noisy sample.
- Published in:
- Bioinformatics, 2012, v. 28, n. 18, p. i356, doi. 10.1093/bioinformatics/bts397
- By:
- Publication type:
- Article
Content Engineering Agent: A TBL-Based E-Course Development Tool with TQM.
- Published in:
- International Journal of Distance Education Technologies, 2003, v. 1, n. 2, p. 57, doi. 10.4018/jdet.2003040104
- By:
- Publication type:
- Article
A generalized fortress problem using k-consecutive vertex guards<AUG><AU>S. M.<SNM>Yiu<ORF RID="A1"><AFF TYPE="ORG"><OID ID="A1"><OAD>Department of Computer Science and Information Systems, The University of Hong Kong, Pokfulam Road, Hong Kong,...
- Published in:
- Journal of Geometry, 2001, v. 72, n. 1/2, p. 188, doi. 10.1007/s00022-001-8580-2
- By:
- Publication type:
- Article