Search results for: John A. Clark
Lecture Notes in Computer Science > Genetic and Evolutionary Computation — GECCO 2003 > Real World Applications > 2022-2033
Lecture Notes in Computer Science > Genetic and Evolutionary Computation – GECCO 2004 > Genetic Programming > 569-580
Lecture Notes in Computer Science > Search Based Software Engineering > Concurrency and Models > 97-111
Lecture Notes in Computer Science > Security in Pervasive Computing > Session 1: Smart Devices and Applications > 31-45
Lecture Notes in Computer Science > Progress in Cryptology — INDOCRYPT 2002 > Boolean Functions > 246-259
Lecture Notes in Computer Science > PRICAI 2008: Trends in Artificial Intelligence > Short Papers > 1053-1058
Lecture Notes in Computer Science > Artificial Immune Systems > Theory of Artificial Immune Systems (Conceptual Stream) > 204-216
Lecture Notes in Computer Science > Information and Communications Security > Authentication > 49-64
Lecture Notes in Computer Science > Advances in Information Security and Assurance > Firewall, IDS, Anti-virus, and Other Security Products > 250-259
Lecture Notes in Computer Science > Genetic Programming > Posters > 325-336
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT 2002 > Implementational Analysis > 181-196
Lecture Notes in Computer Science
Advances in Intelligent and Soft Computing > Computational Intelligence in Security for Information Systems > Network Security > 101-108
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Ad Hoc Networks > 1st ICST International Conference on Ad Hoc Networks > 224-239