Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications in Computational Theory
Random-Player Maker-Breaker Games
Electronic Journal of Combinatorics
Combinatorics
Applied Mathematics
Mathematics
Geometry
Discrete Mathematics
Computational Theory
Topology
Theoretical Computer Science
The Maximal Length of a Gap Between $R$-Graph Turán Densities
Electronic Journal of Combinatorics
Combinatorics
Applied Mathematics
Mathematics
Geometry
Discrete Mathematics
Computational Theory
Topology
Theoretical Computer Science
Integer Codes Correcting Sparse Byte Errors
Cryptography and Communications
Computational Theory
Communications
Computer Networks
Applied Mathematics
Mathematics
Spectral Harmonic Analysis and Synthesis of Earth’s Crust Gravity Field
Computational Geosciences
Computational Theory
Computer Science Applications
Computers in Earth Sciences
Computational Mathematics
Mathematics
Espresso: A Stream Cipher for 5G Wireless Communication Systems
Cryptography and Communications
Computational Theory
Communications
Computer Networks
Applied Mathematics
Mathematics
Robust Localization and Identification of African Clawed Frogs in Digital Images
Ecological Informatics
Evolution
Ecology
Applied Mathematics
Systematics
Simulation
Mathematics
Computer Science Applications
Behavior
Modeling
Computational Theory
Ecological Modeling
A Simulation Workflow for Large-Scale CO2 Storage in the Norwegian North Sea
Computational Geosciences
Computational Theory
Computer Science Applications
Computers in Earth Sciences
Computational Mathematics
Mathematics
TLP Volume 16 Issue 5-6 Cover and Back Matter
Theory and Practice of Logic Programming
Hardware
Architecture
Mathematics
Computational Theory
Theoretical Computer Science
Artificial Intelligence
Software
TLP Volume 11 Issue 2-3 Cover and Back Matter
Theory and Practice of Logic Programming
Hardware
Architecture
Mathematics
Computational Theory
Theoretical Computer Science
Artificial Intelligence
Software
Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?
Cryptography and Communications
Computational Theory
Communications
Computer Networks
Applied Mathematics
Mathematics
‹
147
148
149
150
151
152
153
›