Pascal and Francis Bibliographic Databases


Search results

Your search

kw.\*:("Evaluation fonction")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV


A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 316

  • Page / 13

Selection :

  • and

The realization and function evaluation of the LCAS technology in MSTP systemMIAO CAO; LIANG FENG; JIE ZHANG et al.Proceedings of SPIE, the International Society for Optical Engineering. 2005, pp 60222X.1-60222X.7, issn 0277-786X, isbn 0-8194-6053-2, 2VolConference Paper

An algorithm for parallel evaluation of functionsLOZINSKII, E. L.Journal of algorithms (Print). 1983, Vol 4, Num 3, pp 271-281, issn 0196-6774Article

The development of a security systems research and test laboratory at a universitySMITH, Clifton L.International Carnahan Conference on Security Technology. 2004, pp 111-115, isbn 0-7803-8506-3, 1Vol, 5 p.Conference Paper

Fast evaluation of functions at regularly-spaced pointsERCEGOVAC, M. D; MULLER, J.-M.SPIE proceedings series. 1998, pp 555-566, isbn 0-8194-2916-3Conference Paper

A refined evaluation function for the MinLA problemRODRIGUEZ-TELLO, Eduardo; HAO, Jin-Kao; TORRES-JIMENEZ, Jose et al.Lecture notes in computer science. 2006, pp 392-403, issn 0302-9743, isbn 3-540-49026-4, 1Vol, 12 p.Conference Paper

Parallel reducibility for information-theoretically secure computationDODIS, Y; MICALI, S.Lecture notes in computer science. 2000, pp 74-92, issn 0302-9743, isbn 3-540-67907-3Conference Paper

On the limitations of universally composable two-party computation without set-up assumptionsCANETTI, Ran; KUSHILEVITZ, Eyal; LINDELL, Yehuda et al.Lecture notes in computer science. 2003, pp 68-86, issn 0302-9743, isbn 3-540-14039-5, 19 p.Conference Paper

Fast evaluation of elementary mathematical functions with correctly rounded last bitZIV, A.ACM transactions on mathematical software. 1991, Vol 17, Num 3, pp 410-423, issn 0098-3500Article

Counting strings with given elementary symmetric function evaluations. I: Strings over Zp with p primeMIERS, C. R; RUSKEY, F.SIAM journal on discrete mathematics (Print). 2004, Vol 17, Num 4, pp 675-685, issn 0895-4801, 11 p.Article

Information theoretically secure oblivious polynomial evaluation: Model, bounds, and constructionsHANAOKA, Goichiro; IMAI, Hideki; MUELLER-QUADE, Joern et al.Lecture notes in computer science. 2004, pp 62-73, issn 0302-9743, isbn 3-540-22379-7, 12 p.Conference Paper

An algorithm, based on auto-correlation function evaluation, for the separation of partial discharge signalsCONTIN, Alfredo; PASTORE, Stefano.IEEE international sysposium [sic] on electrical insulation. 2004, pp 127-130, isbn 0-7803-8447-4, 1Vol, 4 p.Conference Paper

Measuring the searched space to guide efficiency: The principle and evidence on constraint satisfactionVAN HEMERT, Jano I; BÄCK, Thomas.Lecture notes in computer science. 2002, pp 23-32, issn 0302-9743, isbn 3-540-44139-5, 10 p.Conference Paper

EPL data conversion system EPLONKATO, Kokoro; NISHIZAWA, Kuninori; HARUKI, Tamae et al.SPIE proceedings series. 2002, pp 805-815, isbn 0-8194-4517-7, 11 p.Conference Paper

Utility assessment methodsFARQUHAR, P. H.Management science. 1984, Vol 30, Num 11, pp 1283-1300, issn 0025-1909Article

Towards the quality evaluation of functional aspects of operative Web applicationsABRAHAO, Silvia; OLSINA, Luis; PASTOR, Oscar et al.Lecture notes in computer science. 2003, pp 325-338, issn 0302-9743, isbn 3-540-20255-2, 14 p.Conference Paper

Unconditionally secure homomorphic pre-distributed bit commitment and secure two-party computationsNASCIMENTO, Anderson C. A; MUELLER-QUADE, Joern; OTSUKA, Akira et al.Lecture notes in computer science. 2003, pp 151-164, issn 0302-9743, isbn 3-540-20176-9, 14 p.Conference Paper

Distributed evaluation of commutative and associative functionsHSIEH, C. S.The Journal of systems and software. 1991, Vol 16, Num 1, pp 53-58, issn 0164-1212Article

Assessment response surface: investigating utility dependence on probabilityMCCORD, M. R; DE NEUFVILLE, R.Theory and decision. 1985, Vol 18, Num 3, pp 263-285, issn 0040-5833Article

Evaluation of chess position by modular neural network generated by genetic algorithmAUTONES, Mathieu; BECK, Ariel; CAMACHO, Philippe et al.Lecture notes in computer science. 2004, pp 1-10, issn 0302-9743, isbn 3-540-21346-5, 10 p.Conference Paper

Highly accurate and efficient evaluation of randomising set index functionsVANDIERENDONCK, Hans; DE BOSSCHERE, Koen.Journal of systems architecture. 2003, Vol 48, Num 13-15, pp 429-452, issn 1383-7621, 24 p.Article

Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert AdversariesHAZAY, Carmit; LINDELL, Yehuda.Journal of cryptology. 2010, Vol 23, Num 3, pp 422-456, issn 0933-2790, 35 p.Article

Generalized Embedded Landscape and Its Decomposed RepresentationSHUDE ZHOU; HECKENDORN, Robert B; ZENGQI SUN et al.Lecture notes in computer science. 2006, pp 9-17, issn 0302-9743, isbn 3-540-47331-9, 1Vol, 9 p.Conference Paper

Evaluation of functions, gradients, and jacobiansRALL, Louis B.Reliable computing. 2003, Vol 9, Num 2, pp 177-182, issn 1385-3139, 6 p.Conference Paper

Genetic programming for robot soccerCIESIELSKI, Vic; MAWHINNEY, Dylan; WILSON, Peter et al.Lecture notes in computer science. 2002, pp 319-324, issn 0302-9743, isbn 3-540-43912-9, 6 p.Conference Paper

From simple features to sophisticated evaluation functionsBURO, M.Lecture notes in computer science. 1999, pp 126-145, issn 0302-9743, isbn 3-540-65766-5Conference Paper

  • Page / 13