Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Book Chapter
|
XXXArtists' SoHo: 49 Episodes of Intimate History, 2015, p.1742015 Richard Kostelanetz ;ISBN: 9780823262823 ;ISBN: 0823262820 ;EISBN: 9780823262854 ;EISBN: 0823262855Full text available |
|
2 |
Material Type: Book Chapter
|
Data Governance and Transparency for Collaborative SystemsLecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.199-216 [Peer Reviewed Journal]Attribution ;DOI: 10.1007/978-3-319-41483-6_15Digital Resources/Online E-Resources |
|
3 |
Material Type: Book Chapter
|
Practical Differentially Private Modeling of Human Movement DataLecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.170-178 [Peer Reviewed Journal]Attribution ;DOI: 10.1007/978-3-319-41483-6_13Digital Resources/Online E-Resources |
|
4 |
Material Type: Book Chapter
|
A Tour in Process Mining: From Practice to Algorithmic ChallengesLNCS Transactions on Petri Nets and Other Models of Concurrency, 2019 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1867-7193 ;DOI: 10.1007/978-3-662-60651-3_1Digital Resources/Online E-Resources |
|
5 |
Material Type: Book Chapter
|
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown AttacksLecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.295-312 [Peer Reviewed Journal]Attribution ;DOI: 10.1007/978-3-319-41483-6_21Digital Resources/Online E-Resources |
|
6 |
Material Type: Book Chapter
|
Counteracting Active Attacks in Social Network GraphsLecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.233-248 [Peer Reviewed Journal]Attribution ;DOI: 10.1007/978-3-319-41483-6_17Digital Resources/Online E-Resources |
|
7 |
Material Type: Book Chapter
|
Mining Hierarchical Temporal Roles with Multiple MetricsLecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.79-95 [Peer Reviewed Journal]Attribution ;DOI: 10.1007/978-3-319-41483-6_6Digital Resources/Online E-Resources |
|
8 |
Material Type: Book Chapter
|
Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software SystemsLecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.347-363 [Peer Reviewed Journal]Attribution ;DOI: 10.1007/978-3-319-41483-6_24Digital Resources/Online E-Resources |
|
9 |
Material Type: Book Chapter
|
Deciphering Text from Touchscreen Key TapsLecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.3-18 [Peer Reviewed Journal]Attribution ;DOI: 10.1007/978-3-319-41483-6_1Digital Resources/Online E-Resources |
|
10 |
Material Type: Book Chapter
|
CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the CloudLecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.285-294 [Peer Reviewed Journal]Attribution ;DOI: 10.1007/978-3-319-41483-6_20Digital Resources/Online E-Resources |
|
11 |
Material Type: Book Chapter
|
Formalizing Threat Models for Virtualized SystemsLecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.251-267 [Peer Reviewed Journal]Attribution ;DOI: 10.1007/978-3-319-41483-6_18Digital Resources/Online E-Resources |
|
12 |
Material Type: Book Chapter
|
Access Control for the Shuffle IndexLecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.130-147 [Peer Reviewed Journal]Attribution ;DOI: 10.1007/978-3-319-41483-6_10Digital Resources/Online E-Resources |
|
13 |
Material Type: Book Chapter
|
Reasoning About Firewall Policies Through Refinement and CompositionLecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.268-284 [Peer Reviewed Journal]Attribution ;DOI: 10.1007/978-3-319-41483-6_19Digital Resources/Online E-Resources |
|
14 |
Material Type: Book Chapter
|
A Practical Framework for Executing Complex Queries over Encrypted Multimedia DataLecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.179-195 [Peer Reviewed Journal]Attribution ;DOI: 10.1007/978-3-319-41483-6_14Digital Resources/Online E-Resources |
|
15 |
Material Type: Book Chapter
|
Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive HashesLecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.61-76 [Peer Reviewed Journal]Attribution ;DOI: 10.1007/978-3-319-41483-6_5Digital Resources/Online E-Resources |
|
16 |
Material Type: Book Chapter
|
Guaranteeing Correctness of Bulk Operations in Outsourced DatabasesLecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.37-51 [Peer Reviewed Journal]Attribution ;DOI: 10.1007/978-3-319-41483-6_3Digital Resources/Online E-Resources |
|
17 |
Material Type: Book Chapter
|
Towards Creating Believable Decoy Project Folders for Detecting Data TheftLecture Notes in Computer Science, 2016, Vol.LNCS-9766, p.161-169 [Peer Reviewed Journal]Attribution ;DOI: 10.1007/978-3-319-41483-6_12Digital Resources/Online E-Resources |
|
18 |
Material Type: Book Chapter
|
Computational Identification of -1 Frameshift SignalsComputational Science - ICCS 2004, p.334-341 [Peer Reviewed Journal]Springer-Verlag Berlin Heidelberg 2004 ;ISSN: 0302-9743 ;ISBN: 354022114X ;ISBN: 9783540221142 ;EISSN: 1611-3349 ;EISBN: 3540246851 ;EISBN: 9783540246855 ;DOI: 10.1007/978-3-540-24685-5_42Full text available |
|
19 |
Material Type: Book Chapter
|
On the reconstruction of finite lattice sets from their X-raysDiscrete Geometry for Computer Imagery, 2005, p.19-32 [Peer Reviewed Journal]Springer-Verlag Berlin Heidelberg 1997 ;1998 INIST-CNRS ;ISSN: 0302-9743 ;ISBN: 9783540638841 ;ISBN: 3540638849 ;EISSN: 1611-3349 ;EISBN: 9783540696605 ;EISBN: 3540696601 ;DOI: 10.1007/BFb0024827Full text available |
|
20 |
Material Type: Book Chapter
|
Classification based on homogeneous logical proportionsResearch and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013, The Thirty-third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence, 2013, p.53-60Distributed under a Creative Commons Attribution 4.0 International License ;ISBN: 3319026208 ;ISBN: 9783319026206 ;DOI: 10.1007/978-3-319-02621-3_4Digital Resources/Online E-Resources |