×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [y alice]
Home >
y alice
Tutorial "Linked Data Query Processing" Part 3 "Source Selection Strategies" (WWW 2013 Ed.)
724 views
1 possessive adjectives
13.814 views
dc_lko
212 views
Foundations of Cryptography Lecture 2: One-way functions are essential for identification. Amplification: from weak to strong one-way function Lecturer:
216 views
Completeness in Two-Party Secure Computation – A Computational View Danny Harnik Moni Naor Omer Reingold Alon Rosen Weizmann Institute of Science AT&T.
217 views
Controlled Algebras and GII’s
30 views
Controlled Algebras and GII’s Ronald L. Rivest MIT CSAIL IPAM Workshop October 9, 2006.
215 views
Ecc
29 views