Search
Selected: K

Kernel-based Conditional Independence Test and Application in Causal Discovery

Computer Science – Learning
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Kernels for Below-Upper-Bound Parameterizations of the Hitting Set and Directed Dominating Set Problems

Computer Science – Data Structures and Algorithms
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Kernels for Feedback Arc Set In Tournaments

Computer Science – Data Structures and Algorithms
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Kernels for Global Constraints

Computer Science – Artificial Intelligence
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Kernels for linear time invariant system identification

Computer Science – Systems and Control
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Kerogen of Toarcian shales of the Paris Basin. A study of its maturation by flash pyrolysis techniques

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Kerr Black Hole in the Background of the Einstein Universe

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Kerr's Gravity as a Quantum Gravity on the Compton Level

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Keto-Acids in Carbonaceous Meteorites

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Key Agreement and Authentication Schemes Using Non-Commutative Semigroups

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Key Distillation and the Secret-Bit Fraction

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Key distribution in PKC through Quantas

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Key Distribution Scheme without Deployment Knowledge

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Key elements of high-speed WDM terrestrial free-space optical communications systems

Computer Science – Performance
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Key Factors for Information Dissemination on Communicating Products and Fixed Databases

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Key features of intense geospace storms—A comparative study of a solar maximum and a solar minimum storm

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Key Generation Using External Source Excitation: Capacity, Reliability, and Secrecy Exponent

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Key issues in space nuclear power challenges for the future

Computer Science – Performance
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.