Pascal and Francis Bibliographic Databases

Help

Search results

Your search

ct.\*:(%22Set theory%22)

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 986045

  • Page / 39442
Export

Selection :

  • and

Fairness versus reason in the Ultimatum gameNOWAK, Martin A; PAGE, Karen M; SIGMUND, Karl et al.Science (Washington, D.C.). 2000, Vol 289, Num 5485, pp 1773-1775, issn 0036-8075Article

Two extensions of the Shapley value for cooperative gamesDRIESSEN, T. S. H; PAULUSMA, D.Mathematical methods of operations research (Heidelberg). 2001, Vol 53, Num 1, pp 35-49, issn 1432-2994Article

Scaling behavior in the stable marriage problemOMERO, M.-J; DZIERZAWA, M; MARSILI, M et al.Journal de physique. I. 1997, Vol 7, Num 12, pp 1723-1732, issn 1155-4304Article

Contribution à l'optimisation d'implantation parallèle d'algorithmes itératifs récursifs. Application au filtrage adaptatif en traitement du signal = Parallel implementation and optimization of recursive algorithms. Application to adaptive filtering in signal processingSilva Castro, Jesus; Baylou, Pierre.1992, 144 p.Thesis

On the structure of the core of balanced games = Sur la structure du noyau des jeux équilibrésSTEFANESCU, Anton.Kybernetika. 2001, Vol 37, Num 1, pp 39-46, issn 0023-5954Article

Positive cones and Nash equilibriaCANNINGS, C; PIFF, M. J; VICKERS, G. T et al.Proceedings - Royal Society. Mathematical and physical sciences. 1994, Vol 444, Num 1922, pp 583-589, issn 0962-8444Article

On Best-Possible ObfuscationGOLDWASSER, Shafi; ROTHBLUM, Guy N.Journal of cryptology. 2014, Vol 27, Num 3, pp 480-505, issn 0933-2790, 26 p.Article

Unifying running-key approach and logistic map to generate enciphering sequences : Networked digital mediaVLAD, Adriana; ILYAS, Azeem; LUCA, Adrian et al.Annales des télécommunications. 2013, Vol 68, Num 3-4, pp 179-186, issn 0003-4347, 8 p.Article

On the Construction of Cryptographically Significant Boolean Functions Using Objects in Projective Geometry SpacesPASALIC, Enes; YONGZHUANG WEI.IEEE transactions on information theory. 2012, Vol 58, Num 10, pp 6681-6693, issn 0018-9448, 13 p.Article

Computation and Estimation of Generalized Entropy Rates for Denumerable Markov ChainsCIUPERCA, Gabriela; GIRARDIN, Valerie; LHOTE, Loïck et al.IEEE transactions on information theory. 2011, Vol 57, Num 7, pp 4026-4034, issn 0018-9448, 9 p.Article

Expected π-Adic Security Measures of SequencesKLAPPER, Andrew M.IEEE transactions on information theory. 2010, Vol 56, Num 5, pp 2486-2501, issn 0018-9448, 16 p.Article

INVARIANCE ENTROPY FOR CONTROL SYSTEMSCOLONIUS, Fritz; KAWAN, Christoph.SIAM journal on control and optimization. 2010, Vol 48, Num 3, pp 1701-1721, issn 0363-0129, 21 p.Article

The Cross-Correlation of Binary Sequences With Optimal AutocorrelationCUNSHENG DING; XIAOHU TANG.IEEE transactions on information theory. 2010, Vol 56, Num 4, pp 1694-1701, issn 0018-9448, 8 p.Article

One-Wayness Equivalent to General FactoringKUROSAWA, Kaoru; TAKAGI, Tsuyoshi.IEEE transactions on information theory. 2009, Vol 55, Num 9, pp 4249-4262, issn 0018-9448, 14 p.Article

The Capacity Region of a Class of Semideterministic Interference ChannelsCHONG, Hon-Fah; MOTANI, Mehul.IEEE transactions on information theory. 2009, Vol 55, Num 2, pp 598-603, issn 0018-9448, 6 p.Article

Efficient Tweakable Enciphering Schemes From (Block-Wise) Universal Hash FunctionsSARKAR, Palash.IEEE transactions on information theory. 2009, Vol 55, Num 10, pp 4749-4760, issn 0018-9448, 12 p.Article

A Combinatorial Approach to Deriving Lower Bounds for Perfectly Secure Oblivious Transfer ReductionsKUROSAWA, Kaoru; KISHIMOTO, Wataru; KOSHIBA, Takeshi et al.IEEE transactions on information theory. 2008, Vol 54, Num 6, pp 2566-2571, issn 0018-9448, 6 p.Article

On the Oblivious-Transfer Capacity of Noisy ResourcesNASCIMENTO, Anderson C. A; WINTER, Andreas.IEEE transactions on information theory. 2008, Vol 54, Num 6, pp 2572-2581, issn 0018-9448, 10 p.Article

Unconditionally Secure Steganography Against Active AttacksSHIKATA, Junji; MATSUMOTO, Tsutomu.IEEE transactions on information theory. 2008, Vol 54, Num 6, pp 2690-2705, issn 0018-9448, 16 p.Article

The Bare Bounded-Storage Model : The Tight Bound on the Storage Requirement for Key AgreementDZIEMBOWSKI, Stefan; MAURER, Ueli.IEEE transactions on information theory. 2008, Vol 54, Num 6, pp 2790-2792, issn 0018-9448, 3 p.Article

A new criterion for nonlinearity of block ciphersDUNKELMAN, Orr; KELLER, Nathan.IEEE transactions on information theory. 2007, Vol 53, Num 11, pp 3944-3957, issn 0018-9448, 14 p.Article

Bounds on key appearance equivocation for substitution ciphersBORISSOV, Yuri L; MOON HO LEE.IEEE transactions on information theory. 2007, Vol 53, Num 6, pp 2294-2296, issn 0018-9448, 3 p.Article

Search for boolean functions with excellent profiles in the rotation symmetric classKAVUT, Selcuk; MAITRA, Subhamoy; YÜCEL, Melek D et al.IEEE transactions on information theory. 2007, Vol 53, Num 5, pp 1743-1751, issn 0018-9448, 9 p.Article

Digital Media Asset Management: gérer et protéger les droits = Digital Media Asset Management : management and protection of rightsGOUYET, Jean-Noël.Techniques de l'ingénieur. Télécoms. 2006, Vol TEB2, Num TE5890, issn 1632-3823, TE5890.1-TE5890.24, Doc.TE5890.1-TE5890.7 [31 p.]Article

Unconditionally secure entity authenticationKUROSAWA, K.IEEE international symposium on information theory. 1998, isbn 0-7803-5000-6, p. 298Conference Paper

  • Page / 39442