Xxx and X. X. Xxxxxx
Xxx and X. Xxx, “A key recovery attack on discrete log-based schemes using a prime order subgroup,” In CRYPTO 97, pp.249-263, 1997.
Xxx and X. Xxxxxxx. Scheduling algorithms for multiprogramming in a hard-real-time environment. J. ACM, 20(1):46–61, 1973. [81] X. X. Xxxxx and T. Kanade. An iterative image registration technique with an application to stereo vision. In Proceedings of the 7th international joint conference on Artificial intelligence - Volume 2, IJCAI’81, pages 674–679, San Francisco, CA, USA, 1981. Xxxxxx Xxxxxxxx Publishers Inc. [82] X. Xxxx and X. Xxxxxx. Neurocomputing: foundations of research. chapter Cooperative computation of stereo disparity, pages 259–267. MIT Press, Cambridge, MA, USA, 1988. [83] X. Xxxxxxxx and X. Xxxx. Knapsack Problems: Algorithms and Computer Implementations. Xxxx Xxxxx & Sons, 1 edition, 1990. [84] X. Xxxxxxxx. Embedded System Design. Springer, 2 edition, 2006. [85] X. Xxxxxxxxxxx, X. Xxxxxxx, X. Xxxxxxxx, X. Xxxxxxx Mesa, and X. Xxxxxxx. Parallel scalability of video decoders. J. Signal Process. Syst., 57(2):173–194, Nov. 2009.
Xxx and X. Xxx, \A key recovery attack on discrete log-based schemes using a prime order subgroup," Crypto 97, pp.249-263, 1997 [25] X.Xxxxx, X.Xxxx, X.Xxxxxxx, and X.Xxxxxxx, \Reducing risks from poorly chosen keys," ACM Symposium on Operating System Principles, 1989, pp.14-18 [26] X.Xxxxx, \Open key exchange: how to defeat dictionary attacks without encrypting public keys," The Security Protocol Workshop '97, April 7-9, 1997 [27] X.XxxXxxxxx amd X.Xxxxxxxxxxx, \Secure network authentication with password iden- ti cation," Presented to IEEE P1363a, August 1999
Xxx and X. Xxxxxx. 2002. On issues of instance selec- tion. Data Mining and Knowledge Discovery, 6(2):115– 130. X. Xx, X. Xxx, X. Fu, L. Fan, and X. Xx. 2012. Phrase- based data selection for language model adaptation in spoken language translation. In 2012 8th International Symposium on Chinese Spoken Language Processing (ISCSLP), pages 193–196, Hong Kong, China.
J X. Xxxxxx-Lo´pez, J X. Xxxxxxxx-Xxxxx, J F. Mart´xxxx- Xxxxxxxx, and X. Xxxxxxx. 2010. A review of in- stance selection methods. Artificial Intelligence Review, 34(2):133–143. J. C Riquelme, J. S Xxxxxxx-Xxxx, and X. Xxxx. 2003. Find- ing representative patterns with ordered projections. Xxx- xxxx Recognition, 36(4):1009–1018.
Xxx and X. Xxxxx are with the Research School of Engineering, The Australian National University, ACT 0200,
Xxx and X. Xxxxxx. Projective rotations applied to a pan-tilt stereo head. In IEEE Xxx- xxxxxxx on Computer Vision and Pattern Recognition, pages 144–150, Fort Xxxxxxx, Colorado, June 1999. IEEE Computer Society Press.
Xxx and X. Xxx. TSync: a lightweight bidirectional time synchronization service for wireless sensor networks. Mobile Computing and Communications Review, 8(1):125–139, 2004. [16] D. E. Xxxxxxxx and X. X. Xxxxx. US Secure Hash Algorithm 1 (SHA1). http: //xxx.xxxx.xxx/xxx/xxx0000.xxx?xxxxxx=0000. [17] X. Xx-Xxxxxx and X. Xxxxxxxxxx. WiseMAC: An ultra low power MAC protocol for multi-hop wireless sensor networks. Algorithmic Aspects of Wireless Sensor Networks, pages 18–31.
Xxx and X. X. Kim, “Real-time broadcast algorithm for mobile computing”, The Journal of Systems and Software, vol. 69, no. 2, pp. 173-181, 2004.
Xxx and X. Xxxxxxxx. Fault Tolerance: Principles and Practice. Springer-Verlag New York, Inc., Secaucus, NJ, USA, 1990.