Showing
1 - 5
results of
5
for search '
COMMUNICATION ENGINEERING FUNDAMENTALS
'
Skip to content
Home
High Impact Articles
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
Jawi Collection
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Reset Filters
Author:
Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Reset Filters
Show filters (1)
Author:
Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Search Results - COMMUNICATION ENGINEERING FUNDAMENTALS
Showing
1 - 5
results of
5
for search '
COMMUNICATION ENGINEERING FUNDAMENTALS
'
, query time: 0.90s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Keys under doormats: mandating insecurity by requiring government access to all data and
communications
by
Abelson, Harold
,
Anderson, Ross
,
Bellovin, Steven M.
,
Benaloh, Josh
,
Blaze, Matt
,
Diffie, Whitfield
,
Gilmore, John
,
Green, Matthew
,
Landau, Susan
,
Neumann, Peter G.
,
Rivest, Ronald L
,
Schiller, Jeffrey I
,
Schneier, Bruce
,
Specter, Michael
,
Weitzner, Daniel J
Published 2020
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
2
Computational Complexity and an Integer Programming Model of Shakashaka
by
Demaine, Erik D.
,
Okamoto, Yoshio
,
Uehara, Ryuhei
,
Uno, Yushi
Published 2015
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
3
Compression without a common prior: An information-theoretic justification for ambiguity in language
by
Juba, Brendan Andrew
,
Kalai, Adam Tauman
,
Khanna, Sanjeev
,
Sudan, Madhu
Published 2011
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
4
Bounds on inference
by
Medard, Muriel
,
Christiansen, Mark M.
,
Duffy, Ken R.
,
Tessaro, Stefano
,
Calmon, Flavio du Pin
,
Varia, Mayank H.
Published 2014
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
5
How to Run Turing Machines on Encrypted Data
by
Goldwasser, Shafi
,
Kalai, Yael Tauman
,
Popa, Raluca Ada
,
Vaikuntanathan, Vinod
,
Zeldovich, Nickolai
Published 2014
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
Search Tools:
Get RSS Feed
—
Email this Search
Back
Narrow Search
Format
Article
5
Sources
MIT IR
5
Collections
Institutional Repositories
5
Author
Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
5
Abelson, Harold
1
Anderson, Ross
1
Bellovin, Steven M.
1
Benaloh, Josh
1
Blaze, Matt
1
Calmon, Flavio du Pin
1
Christiansen, Mark M.
1
Demaine, Erik D.
1
Diffie, Whitfield
1
Duffy, Ken R.
1
Gilmore, John
1
Goldwasser, Shafi
1
Green, Matthew
1
Juba, Brendan Andrew
1
Kalai, Adam Tauman
1
Kalai, Yael Tauman
1
Khanna, Sanjeev
1
Landau, Susan
1
Lincoln Laboratory
1
Massachusetts Institute of Technology. Information Services and Technology
1
Massachusetts Institute of Technology. Research Laboratory of Electronics
1
Medard, Muriel
1
Neumann, Peter G.
1
Okamoto, Yoshio
1
Popa, Raluca Ada
1
Rivest, Ronald L
1
Schiller, Jeffrey I
1
Schneier, Bruce
1
see all ...
Language
English
5
Genre
Article
5
Year of Publication
From:
To:
Loading...