Tampere University of Technology

TUTCRIS Research Portal

Publications

  1. 2003
  2. Users' preferences for ubiquitous computing applications at home

    Rentto, K., Korhonen, I., Väätänen, A., Pekkarinen, L., Tuomisto, T., Cluitmans, L. & Lappalainen, R., 2003, Lecture Notes in Computer Science: Ambient Intelligence. First European Symposium, EUSAI 2003. Springer Netherlands, Vol. 2875. p. 384-393 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  3. 2005
  4. A neurobiologically motivated model for self-organized learning

    Emmert-Streib, F., 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Gelbukh, A., DeAlbornoz, A. & TerashimaMarin, H. (eds.). Springer-Verlag, Berlin, Vol. 3789 LNAI. p. 415-424 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3789 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  5. 2006
  6. A novel stochastic learning rule for neural networks

    Emmert-Streib, F., 2006, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 3971 LNCS. p. 414-423 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3971 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  7. Left-to-right signed-bit τ -adic representations of n integers

    Brumley, B. B., 1 Jan 2006, Information and Communications Security - 8th International Conference, ICICS 2006, Proceedings. Springer Verlag, p. 469-478 10 p. (Lecture Notes in Computer Science; vol. 4307).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  8. 2007
  9. Optimization procedure for predicting nonlinear time series based on a non-Gaussian noise model

    Emmert-Streib, F. & Dehmer, M., 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4827 LNAI. p. 540-549 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4827 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  10. Differential properties of elliptic curves and blind signatures

    Brumley, B. B. & Nyberg, K., 1 Dec 2007, Information Security - 10th International Conference, ISC 2007, Proceedings. p. 376-389 14 p. (Lecture Notes in Computer Science; vol. 4779).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  11. Koblitz curves and integer equivalents of frobenius expansions

    Brumley, B. B. & Järvinen, K., 1 Dec 2007, Selected Areas in Cryptography - 14th International Workshop, SAC 2007, Revised Selected Papers. p. 126-137 12 p. (Lecture Notes in Computer Science; vol. 4876).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  12. 2008
  13. Fast point decompression for standard elliptic curves

    Brumley, B. B. & Järvinen, K. U., 1 Jul 2008, Public Key Infrastructure - 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Proceedings. p. 134-149 16 p. (Lecture Notes in Computer Science; vol. 5057).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  14. 2009
  15. On modular decomposition of integers

    Brumley, B. B. & Nyberg, K., 9 Nov 2009, Progress in Cryptology - AFRICACRYPT 2009 - Second International Conference on Cryptology in Africa, Proceedings. p. 386-402 17 p. (Lecture Notes in Computer Science; vol. 5580).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  16. Cache-timing template attacks

    Brumley, B. B. & Hakala, R. M., 28 Dec 2009, Advances in Cryptology - ASIACRYPT 2009 - 15th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 667-684 18 p. (Lecture Notes in Computer Science; vol. 5912).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Previous 1 2 3 4 5 6 7 8 ...24 Next