Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Sharing")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 14415

  • Page / 577
Export

Selection :

  • and

Entire functions that share a polynomial with their derivativesWANE, Jian-Ping.Journal of mathematical analysis and applications. 2006, Vol 320, Num 2, pp 703-717, issn 0022-247X, 15 p.Article

Sharing analysis based on type inferenceMINAMIDE, Y.Formal aspects of computing. 1994, Vol 6, Num 6, pp 659-675, issn 0934-5043Article

File Sharing and the History of Computing: Or, Why File Sharing is Called File SharingJOHN, Nicholas A.Critical studies in media communication. 2014, Vol 31, Num 3, pp 198-211, issn 1529-5036, 14 p.Article

A toolkit for capturing and sharing FuGE experimentsBELHAJJAME, Khalid; JONES, Andrew R; PATENT, Norman W et al.Bioinformatics (Oxford. Print). 2008, Vol 24, Num 22, pp 2647-2649, issn 1367-4803, 3 p.Article

How reinforcer type affects choice in economic gamesFANTINO, Edmund; GAITAN, Santino; KENNELLY, Art et al.Behavioural processes. 2007, Vol 75, Num 2, pp 107-114, issn 0376-6357, 8 p.Conference Paper

Ideal Hierarchical Secret Sharing SchemesFARRAS, Oriol; PADRO, Carles.IEEE transactions on information theory. 2012, Vol 58, Num 5, pp 3273-3286, issn 0018-9448, 14 p.Article

Incrementing visual cryptography using random gridsWANG, Ran-Zan; LAN, Yung-Ching; LEE, Yeuan-Kuen et al.Optics communications. 2010, Vol 283, Num 21, pp 4242-4249, issn 0030-4018, 8 p.Article

Natural Generalizations of Threshold Secret SharingFARRAS, Oriol; PADRO, Carles; CHAOPING XING et al.IEEE transactions on information theory. 2014, Vol 60, Num 3, pp 1652-1664, issn 0018-9448, 13 p.Conference Paper

Scalable secret image sharingWANG, Ran-Zan; SHYU, Shyong-Jian.Signal processing. Image communication. 2007, Vol 22, Num 4, pp 363-373, issn 0923-5965, 11 p.Article

Proof nets, garbage, and computationsGUERRINI, Stefano; MARTINI, Simone; MASINI, Andrea et al.Theoretical computer science. 2001, Vol 253, Num 2, pp 185-237, issn 0304-3975Article

Entire functions that share a small function with its derivativePING LI; WENJIE WANG.Journal of mathematical analysis and applications. 2007, Vol 328, Num 1, pp 743-751, issn 0022-247X, 9 p.Article

A new (t,n) multi-secret sharing scheme based on Shamir's secret sharingPANG, Liao-Jun; WANG, Yu-Min.Applied mathematics and computation. 2005, Vol 167, Num 2, pp 840-848, issn 0096-3003, 9 p.Article

Efficient and unconditionally secure verifiable threshold changeable schemeMAEDA, Ayako; MIYAJI, Atsuko; TADA, Mitsuru et al.Lecture notes in computer science. 2001, pp 403-416, issn 0302-9743, isbn 3-540-42300-1Conference Paper

Seeking balance in maintaining and sharing private health information: a New Zealand perspectiveSTRONGMAN, Luke.Communications law (Haywards Heath). 2014, Vol 19, Num 4, pp 121-126, issn 1746-7616, 6 p.Article

Context inference for static analysis of java card object sharingCAROMEL, Denis; HENRIO, Ludovic; SERPETTE, Bernard et al.Lecture notes in computer science. 2001, pp 43-57, issn 0302-9743, isbn 3-540-42610-8Conference Paper

HydroServer Lite as an open source solution for archiving and sharing environmental data for independent university labsCONNER, Lafe G; AMES, Daniel P; GILL, Richard A et al.Ecological informatics. 2013, Vol 18, pp 171-177, issn 1574-9541, 7 p.Article

Security analysis and improvement of two verifiable multi-secret sharing schemesJIA YU; RONG HAO; XIANGGUO CHENG et al.International journal of security and networks (Print). 2013, Vol 8, Num 4, pp 200-206, issn 1747-8405, 7 p.Article

Sharing Lessons Learned to Prevent Incorrect SurgeryNEILY, Julia; MILLS, Peter D; PAULL, Douglas E et al.The American surgeon. 2012, Vol 78, Num 11, pp 1276-1280, issn 0003-1348, 5 p.Article

The Conundrum of Sharing Research DataBORGMAN, Christine L.Journal of the American Society for Information Science and Technology (Print). 2012, Vol 63, Num 6, pp 1059-1078, issn 1532-2882, 20 p.Article

IBD sharing around the PPARG locus is not increased in dizygotic twins or their mothersDUFFY, David; MONTGOMERY, Grant; REED, Peter et al.Nature genetics. 2001, Vol 28, Num 4, issn 1061-4036, p. 315Article

Delegating of powersSUSLOVA, I. M.Naučnye i tehničeskie biblioteki SSSR. 1993, Num 11, pp 4-9, issn 0130-9765Article

Publishing and sharing your metadata application profile 2. SCHEMAS-workshop in BonnWESSEL, Carola.Bibliotheksdienst. 2001, Vol 35, Num 2, pp 189-192, issn 0006-1972Article

Research on the energy-saving and revenue sharing strategy of ESCOs under the uncertainty of the value of Energy Performance Contracting ProjectsDONG QIAN; JU'E GUO.Energy policy. 2014, Vol 73, pp 710-721, issn 0301-4215, 12 p.Article

partage de liens, le retour en force de l'humainDUTHEIL, Christophe.Archimag (Vincennes). 2014, Num 270, issn 0769-0975, p. 32Article

Listening to Music Together = Ecouter de la musique ensembleZANGWILL, Nick.British journal of aesthetics. 2012, Vol 52, Num 4, pp 379-389, issn 0007-0904, 11 p.Article

  • Page / 577