Help


[permalink] [id link]
+
Page "Digital signal processing" ¶ 87
from Wikipedia
Edit
Promote Demote Fragment Fix

Some Related Sentences

Springer-Verlag and Berlin
* K. Oura, V. G. Lifshits, A. ASaranin, A. V. Zotov and M. Katayama, Surface Science An Introduction, ( Springer-Verlag Berlin Heidelberg 2003 ).
Berlin ; New York: Springer-Verlag, 1971.
Berlin / Heidelberg: Springer-Verlag.
Berlin ; London: Springer-Verlag, 2003.
Springer-Verlag, Berlin 1990, ISBN 3-540-51206-3
* MARTZLOFF, J-C .: A history of Chinese Mathematics, Springer-Verlag, Berlin, 1997.
From Grey to Silver: Managing the Demographic Change Successfully, Springer-Verlag, Berlin Heidelberg, ISBN 978-3-642-15593-2
Estimating and choosing, Springer-Verlag, Berlin.
Article, Precision Agriculture, Springer-Verlag, Berlin, Heidelberg, New York.
Berlin ; New York: Springer-Verlag.
* Huang, Te-Ming ; Kecman, Vojislav ; and Kopriva, Ivica ( 2006 ); Kernel Based Algorithms for Mining Huge Data Sets, in Supervised, Semi-supervised, and Unsupervised Learning, Springer-Verlag, Berlin, Heidelberg, 260 pp. 96 illus., Hardcover, ISBN 3-540-31681-7
Berlin, Heidelberg, and New York: Springer-Verlag.
Springer-Verlag, Berlin, 1995. x + 422 pp. ISBN 3-540-58662-8
Springer-Verlag, Berlin, 2003. xx + 372 pp. ISBN 3-540-43583-2
Springer-Verlag, Berlin, 1999. iv + 222 pp. ISBN 3-540-65378-3
Springer-Verlag, Berlin.
Berlin, Heidelberg, and New York: Springer-Verlag.
G. Governatori and G. Sartor ( Berlin: Springer-Verlag, 2010 ).
Springer-Verlag Berlin Heidelberg, Germany.
K. Chandrasekharan, Hermann Weyl, 1885 1985, Centenary lectures delivered by C. N. Yang, R. Penrose, A. Borel, at the ETH Zürich Springer-Verlag, Berlin, Heidelberg, New York, London, Paris, Tokyo 1986, published for the Eidgenössische Technische Hochschule, Zürich.
Springer-Verlag Berlin / Heidelberg / New York ( 1965 )
Springer-Verlag Berlin / Heidelberg / New York ( 9.
Springer-Verlag, Berlin / Göttingen / Heidelberg 1957 ( Autobiographie )
* W. Pauli, letter to M. Fierz dated 10 August 1954, reprinted and translated in K. V. Laurikainen, Beyond the Atom: The Philosophical Thought of Wolfgang Pauli, Springer-Verlag, Berlin, 1988, p. 226.

Springer-Verlag and
* Serge Vaudenay, " On the weak keys of Blowfish ," Fast Software Encryption ( FSE ' 96 ), LNCS 1039, D. Gollmann, Ed., Springer-Verlag, 1996, pp. 27 32.
* Xuejia Lai and James L. Massey and S. Murphy, Markov ciphers and differential cryptanalysis, Advances in Cryptology — Eurocrypt ' 91, Springer-Verlag ( 1992 ), pp17 38.
* Ziegler, Günter M., Chapters 1 3 and 6 7 in Lectures on Polytopes, Springer-Verlag, New York, 1994.
* Uhlenberg P .( Editor ), ( 2009 ) International Handbook of the Demography of Aging, New York: Springer-Verlag, pp. 113 131.
* Goldstine, Herman and Adele Goldstine, The Electronic Numerical Integrator and Computer ( ENIAC ), 1946 ( reprinted in The Origins of Digital Computers: Selected Papers, Springer-Verlag, New York, 1982, pp. 359 373 )
Hermann Weyl's Raum Zeit Materie and a General Introduction to his Scientific Work ( Oberwolfach Seminars ) ( ISBN 3-7643-6476-9 ) Springer-Verlag New York, New York, N. Y.
): IFIP International Federation for Information Processing, Proceedings of the Sixth International Workshop on Self-Organizing Systems ( IWSOS 2012 ), pp. 90 95, Springer-Verlag ( 2012 ).
New York: Springer-Verlag, pp. 76 79, 1996.
* Introduction to RHEED, A. S. Arrot, Ultrathin Magnetic Structures I, Springer-Verlag, 1994, pp. 177 220
* A. Shimizu and S. Miyaguchi, Fast data encipherment algorithm FEAL, Advances in Cryptology — Eurocrypt ' 87, Springer-Verlag ( 1988 ), 267 280.
* Wenling Wu, Bao Li, Denguo Feng, Sihan Qing, " Cryptanalysis of some AES candidate algorithms ", Information and Communication Security-ICICS ' 99, LNCS 1726, pp 13 21, V Varadharajan ( ed ), Springer-Verlag 1999.
* Joe Kilian and Phillip Rogaway, How to protect DES against exhaustive key search ( PostScript ), Advances in Cryptology-Crypto ' 96, Springer-Verlag ( 1996 ), pp. 252 267.
* A. Biryukov and D. Wagner, Advanced Slide Attacks, Eurocrypt 2000, Springer-Verlag ( 2000 ), pp. 589 606.
* Eli Biham, " New Types of Cryptanalytic Attacks Using Related Keys ", Journal of Cryptology, vol 7 no 4, pp 229 246, Springer-Verlag, 1994.
* Eli Biham, Adi Shamir, " Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer ", in Advances in Cryptology-CRYPTO ' 91, LNCS 576, pp 156 171, J Feigenbaum ( ed ), Springer-Verlag, 1991.
* L. Brown, Josef Pieprzyk and Jennifer Seberry, " LOKI-A Cryptographic Primitive for Authentication and Secrecy Applications ", in Advances in Cryptology-Auscrypt ' 90, LNCS 453, pp229 236, J Seberry, J Pieprzyk ( eds ), Springer-Verlag, 1990.
* Lars R. Knudsen, " Cryptanalysis of LOKI91 ", in Advances in Cryptology-ASIACRYPT ' 92, LNCS 718, pp 196 208, J Seberry, Y Zheng ( eds ), Springer-Verlag, 1993.
* Lars R. Knudsen, " New Potentially ' Weak ' Keys for DES and LOKI ", in Advances in Cryptology-EUROCRYPT ' 94, LNCS 950, pp 419 424, Springer-Verlag, 1994.

0.080 seconds.