Results 81 to 90 of about 76,072 (189)

An O(n log n) Algorithm for Finding Minimal Perfect Hash Functions [PDF]

open access: green, 2013
Edward A. Fox, Lenwood S. Heath, Qi Chen
openalex  

Resilient cybersecurity in smart grid ICS communication using BLAKE3-driven dynamic key rotation and intrusion detection. [PDF]

open access: yesSci Rep
Dokku NS   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy