Cryptography, automata and learning theory
Saved in:
| Corporate Author: | National Conference on Cryptography, Automata and Learning Theory Madras Christian College |
|---|---|
| Other Authors: | Thomas, D. Gnanaraj, Jeyanthi, P. Abisha |
| Format: | Conference Proceeding Book |
| Language: | English |
| Published: |
New Delhi
Narosa Publishing House
2011
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Quantum cryptography and computing--theory and implementation
Published: (2010)
Published: (2010)
Cryptography protocols, design, and applications
Published: (2012)
Published: (2012)
Cryptography infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013)
by: Oriyano, Sean-Philip
Published: (2013)
Machine learning and statistics the interface
Published: (1996)
Published: (1996)
Understanding cryptography a textbook for students and practitioners
by: Paar, Christof, et al.
Published: (2010)
by: Paar, Christof, et al.
Published: (2010)
Identity-based cryptography
Published: (2009)
Published: (2009)
Mechanical Engineering design selected, peer reviewed papers from the first International Conference on Mechanical Engineering Design 2016 (ICMED 2016), April 25-26, 2016, Chennai, India
Published: (2016)
Published: (2016)
Machines and mechanisms
Published: (2012)
Published: (2012)
Enhancing cryptographic primitives with techniques from error correcting codes
Published: (2009)
Published: (2009)
Machine Learning and Data Science : Fundamentals and Applications /
Published: (2022)
Published: (2022)
Introduction to automata theory, languages, and computation
by: Hopcroft, John E. 1939-
Published: (2001)
by: Hopcroft, John E. 1939-
Published: (2001)
Information security, coding theory and related combinatorics information coding and combinatorics
Published: (2011)
Published: (2011)
Digital watermarking 6th International Workshop, IWDW 2007, Guanzhou, China, December 3-5, 2007 : proceedings
Published: (2008)
Published: (2008)
Identity, security and democracy the wider social and ethical implications of automated systems for human identification
Published: (2009)
Published: (2009)
Hands-on machine learning for cybersecurity safeguard your system by making your machines intelligent using the Python ecosystem
by: Halder, Soma, et al.
Published: (2018)
by: Halder, Soma, et al.
Published: (2018)
7A Security's official guide cryptography
by: Burnett
Published: (2001)
by: Burnett
Published: (2001)
Learning automata-based solution to target coverage problem for directional sensor networks with adjustable sensing ranges
by: Mohd. Norsyarizad Razali
by: Mohd. Norsyarizad Razali
Algorithm in applications
Published: (2010)
Published: (2010)
Neural networks and deep learning a textbook
by: Aggarwal, Charu C.
Published: (2018)
by: Aggarwal, Charu C.
Published: (2018)
Deep learning
by: Goodfellow, Ian, et al.
Published: (2016)
by: Goodfellow, Ian, et al.
Published: (2016)
Neural networks & deep Learning for beginners a visual introduction for beginners who want to make their own deep learning neural network
by: Nakamoto, Pat
Published: (2018)
by: Nakamoto, Pat
Published: (2018)
Quantum communications and cryptography
Published: (2006)
Published: (2006)
Introduction to machine learning
by: Alpaydin, Ethem
Published: (2010)
by: Alpaydin, Ethem
Published: (2010)
Machine Learning A First Course for Engineers and Scientists
by: Lindholm, Andreas, et al.
Published: (2022)
by: Lindholm, Andreas, et al.
Published: (2022)
Feature engineering for machine learning principles and techniques for data scientists
by: Zheng, Alice, et al.
Published: (2018)
by: Zheng, Alice, et al.
Published: (2018)
Machine learning in action
by: Harrington, Peter
Published: (2012)
by: Harrington, Peter
Published: (2012)
From number theory to physics
Published: (1992)
Published: (1992)
Cryptography theory and practice
by: Stinson, Douglas R. (Douglas Robert) 1956-
Published: (2006)
by: Stinson, Douglas R. (Douglas Robert) 1956-
Published: (2006)
Cryptography theory and practice
by: Stinson lhDouglas R.
by: Stinson lhDouglas R.
The theory of computation
Published: (1998)
Published: (1998)
Machine learning
by: Mitchell, Tom M. (Tom Michael) 1951-
Published: (1997)
by: Mitchell, Tom M. (Tom Michael) 1951-
Published: (1997)
Mathematical theory of control proceedings of the international conference
Published: (1993)
Published: (1993)
Database applications semantics proceedings of the IFIP WG 2.6 Working Conference on Database Applications Semantics (DS-6), Stone Mountain, Atlanta, Georgia, U.S.A., May 30-June 2, 1995
Published: (1997)
Published: (1997)
Cryptography and security services mechanisms and applications
by: Mogollon, Manuel
Published: (2007)
by: Mogollon, Manuel
Published: (2007)
Informatics in control, automation and robotics : selected papers from the International Conference on Informatics in Control, Automation and Robotics 2006 /
Published: (2008)
Published: (2008)
Machine Learning with R learn how to use R to apply powerful machine learning methods and gain an insight into real-world applications
by: Lantz, Brett
Published: (2013)
by: Lantz, Brett
Published: (2013)
Machine Learning an algorithmic perspective
by: Marsland, Stephen
Published: (2009)
by: Marsland, Stephen
Published: (2009)
Machine learning an algorithmic perspective
by: Marsland, Stephen
Published: (2015)
by: Marsland, Stephen
Published: (2015)
Machine learning and security protecting systems with data and algorithms
by: Chio, Clarence, et al.
Published: (2018)
by: Chio, Clarence, et al.
Published: (2018)
Information modelling and knowledge base XX
Published: (2009)
Published: (2009)
Similar Items
-
Quantum cryptography and computing--theory and implementation
Published: (2010) -
Cryptography protocols, design, and applications
Published: (2012) -
Cryptography infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013) -
Machine learning and statistics the interface
Published: (1996) -
Understanding cryptography a textbook for students and practitioners
by: Paar, Christof, et al.
Published: (2010)


