Search results for: Daniel Pagé
BMC Public Health > 2019 > 19 > 1 > 1-12
Lecture Notes in Computer Science > Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication > Hardware Implementation > 160-174
Lecture Notes in Computer Science > Progress in Cryptology - VIETCRYPT 2006 > Hash Functions > 229-242
Lecture Notes in Computer Science > Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication > Keynote Speech > 1-21
Texts in Computer Science > Practical Introduction to Computer Architecture > Processor Design > 269-330
Texts in Computer Science > Practical Introduction to Computer Architecture > The Hardware/Software Interface > 451-493
Texts in Computer Science > Practical Introduction to Computer Architecture > Processor Design > 213-221
Texts in Computer Science > Practical Introduction to Computer Architecture > Tools and Techniques > 97-139
Texts in Computer Science > Practical Introduction to Computer Architecture > Processor Design > 331-393
Texts in Computer Science > Practical Introduction to Computer Architecture > Tools and Techniques > 43-95
Texts in Computer Science > Practical Introduction to Computer Architecture > The Hardware/Software Interface > 397-450
Texts in Computer Science > Practical Introduction to Computer Architecture > The Hardware/Software Interface > 495-534
Texts in Computer Science > Practical Introduction to Computer Architecture > The Hardware/Software Interface > 535-557
Texts in Computer Science > Practical Introduction to Computer Architecture > Processor Design > 223-267
Texts in Computer Science > Practical Introduction to Computer Architecture > Processor Design > 169-212
Texts in Computer Science > Practical Introduction to Computer Architecture > Processor Design > 143-167
Texts in Computer Science > Practical Introduction to Computer Architecture > Tools and Techniques > 3-42
Texts in Computer Science