Browse Publications

  1. 2016
  2. Publications content icon
    Published

    A systematic review of service level management in the cloud

    Rami Bahsoon, 1 Feb 2016, In: ACM Computing Surveys. 48, 3, 27 p., 43.

    Research output: Contribution to journalArticlepeer-review

  3. Publications content icon
    Published

    On investigation of interdependence between sub-problems of the Travelling Thief Problem

    Xin Yao, Jan 2016, In: Soft Computing. 20, 1, p. 157-172 16 p.

    Research output: Contribution to journalArticlepeer-review

  4. Publications content icon
    Published

    Limits to learning in reinforcement learning hyper-heuristics

    Per Kristian Lehre, 2016, Evolutionary Computation in Combinatorial Optimization - 16th European Conference, EvoCOP 2016, Proceedings. Springer Verlag, Vol. 9595. p. 170-185 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9595).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Publications content icon
    Published

    The fall of a tiny star

    Flavio Garcia & , 2016, The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Quisquater, J-J., Ryan, P. Y. A. & Naccache, D. (eds.). Springer Verlag, p. 69-87 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9100).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. 2015
  7. Publications content icon
    E-pub ahead of print

    Nadir point estimation for many-objective optimization problems based on emphasized critical regions

    Shan He & Xin Yao, 17 Nov 2015, (E-pub ahead of print) In: Soft Computing. p. 1-13 13 p.

    Research output: Contribution to journalArticlepeer-review

  8. Publications content icon
    Published

    A Growing Story [President's Message]

    Xin Yao, 12 Oct 2015, In: IEEE Computational Intelligence Magazine. 10, 4, p. 3-3 1 p., 7296714.

    Research output: Contribution to journalArticlepeer-review

  9. Publications content icon
    Published

    Lightweight coprocessor for koblitz curves: 283-bit ecc including scalar conversion with only 4300 gates

    Sujoy Sinha Roy, & , 13 Sep 2015, Cryptographic Hardware and Embedded Systems - CHES 2015: 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings. Güneysu, T. & Handschuh, H. (eds.). Springer Verlag, p. 102-122 (Lecture Notes in Computer Science ; vol. 9293).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Publications content icon
    Published

    On nested sequents for constructive modal logics

    Anupam Das & , 3 Sep 2015, In: Logical Methods in Computer Science. 11, 3, 33 p., 7.

    Research output: Contribution to journalArticlepeer-review

  11. Publications content icon
    Published

    A masked ring-LWE implementation

    Sujoy Sinha Roy, & , 1 Sep 2015, Cryptographic Hardware and Embedded Systems - CHES 2015: 17th International Workshop Saint-Malo, France, September 13–16, 2015 Proceedings. Güneysu, T. & Handschuh, H. (eds.). Springer Verlag, p. 683-702 (Lecture Notes in Computer Science ; vol. 9293).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Publications content icon
    Published

    Efficient ring-LWE encryption on 8-bit AVR processors

    Sujoy Sinha Roy, , & , 1 Sep 2015, Cryptographic Hardware and Embedded Systems - CHES 2015: 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings. Güneysu, T. & Handschuh, H. (eds.). Springer Verlag, p. 663-682 (Lecture Notes in Computer Science ; vol. 9293).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...4 5 6 7 8 9 10 11 ...25 Next