Search

Your search keyword '"*SCHEME programming language"' showing total 346 results

Search Constraints

Start Over You searched for: Descriptor "*SCHEME programming language" Remove constraint Descriptor: "*SCHEME programming language" Publisher elsevier b.v. Remove constraint Publisher: elsevier b.v.
346 results on '"*SCHEME programming language"'

Search Results

1. Communication-efficient outsourced privacy-preserving classification service using trusted processor.

2. An efficient, secure and verifiable conjunctive keyword search scheme based on rank metric codes over encrypted outsourced cloud data.

3. Combination of multiple diagnosis systems in Self-Healing networks.

4. Online masquerade detection resistant to mimicry.

5. Security analysis of an image encryption algorithm based on paired interpermuting planes and a modified scheme.

6. Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys.

7. 3D holoscopic image coding scheme using HEVC with Gaussian process regression.

8. Fast watermarking scheme for real-time spatial scalable video coding.

9. Eliminating bandwidth estimation from adaptive video streaming in wireless networks.

10. A central scheme for advecting scalars by velocity fields obtained from Finite Volume multiphase incompressible solvers.

11. Fault detection and identification for a class of nonlinear systems with model uncertainty.

12. Implantation of the global dynamic routing scheme in scale-free networks under the shortest path strategy.

13. A novel disease severity prediction scheme via big pair-wise ranking and learning techniques using image-based personal clinical data.

14. Extended producer responsibility for lamps in Nordic countries: best practices and challenges in closing material loops.

15. Decentralized autonomous planning of cluster reconfiguration for fractionated spacecraft.

16. Evaluating the precision of eight spatial sampling schemes in estimating regional means of simulated yield for two crops.

17. Stator winding single-phase grounding faults protective scheme based on discriminant analysis for Powerformers with selectivity.

18. A new local backup scheme considering simultaneous faults of protection IEDs in an IEC 61850-based substation.

19. A fast time–frequency transform based differential relaying scheme for UPFC based double-circuit transmission line.

20. A low cost single phase grid connected reduced switch PV inverter based on Time Frame Switching Scheme.

21. Cost-sensitive meta-learning classifiers: MEPAR-miner and DIFACONN-miner.

22. Model-based fault detection, estimation, and prediction for a class of linear distributed parameter systems.

23. A robust extremum seeking scheme for dynamic systems with uncertainties and disturbances.

24. Enhancing the performance of the measurement-device-independent quantum key distribution with heralded pair-coherent sources.

25. Monkey King Evolution: A new memetic evolutionary algorithm and its application in vehicle fuel consumption optimization.

26. Comparison of femtosecond pulse dynamics in a PCF amplifier with backward and forward pump schemes.

27. High payload reversible data hiding scheme using weighted matrix.

28. A no-equilibrium hyperchaotic system with a cubic nonlinear term.

29. A simple strategy for defining polynomial spline spaces over hierarchical T-meshes.

30. A decade of progress on anisotropic mesh adaptation for computational fluid dynamics.

31. Output feedback control for uncertain nonlinear systems with input quantization.

32. Event-triggered zero-gradient-sum distributed consensus optimization over directed networks.

33. Efficiency enhancement scheme of cascaded multilevel grid-connected inverter and its improvement to eliminate effect of non-ideal grid conditions.

34. Revocable hierarchical identity-based encryption via history-free approach.

35. Low space-complexity and low power semi-systolic multiplier architectures over GF(2m) based on irreducible trinomial.

36. A minimum enclosing ball-based support vector machine approach for detection of phishing websites.

37. Crypt analysis of an image encryption algorithm and an enhanced scheme.

38. Echocardiographic image denoising using extreme total variation bilateral filter.

39. Inducing multipartite entanglement revival in dissipative environment by means of prior quantum uncollapsing measurements.

40. Static critical behavior of the [formula omitted]-states Potts model: High-resolution entropic study.

41. Double-image encryption scheme combining DWT-based compressive sensing with discrete fractional random transform.

42. Triple detection fiber differentiating interferometer based on low-coherence interferometer and its passive demodulation scheme.

43. Growing up with stability: How open-source relational databases evolve.

44. Fault detection with Conditional Gaussian Network.

45. The numerical simulations based on the NND finite difference scheme for shallow water wave equations including sediment concentration.

46. Receding horizon time-optimal control for a class of differentially flat systems.

47. A framework for non-interactive instance-dependent commitment schemes (NIC).

48. Robust statistical recognition and reconstruction scheme based on hierarchical Bayesian learning of HRR radar target signal.

49. Safe-triggering-region control scheme for suppressing cross current in static transfer switch.

50. Acceleration of boundary element method by explicit vectorization.

Catalog

Books, media, physical & digital resources