يعرض 1 - 20 نتائج من 81 نتيجة بحث عن '"Horel, Thibaut"', وقت الاستعلام: 0.63s تنقيح النتائج
  1. 1
    Report

    المؤلفون: Horel, Thibaut, Singer, Yaron

    المصدر: Advances in Neural Information Processing Systems 29, NeurIPS 2016, pp. 3045-3053

  2. 2
    Report
  3. 3
    Report
  4. 4
    Report
  5. 5
    Report

    المصدر: Journal of Economic Theory, vol. 216, March 2024, 105779

  6. 6
    Report

    المصدر: IEEE Transactions on Information Theory, 68 (8), 2022, pp. 4949-4963

  7. 7
    Report
  8. 8
    Report

    المصدر: Games and Economic Behavior, vol. 148 (Nov. 2024), pp. 323-356

  9. 9
    Report
  10. 10
    Report

    المصدر: Advances in Cryptology - Crypto 2019, Lecture Notes in Computer Science 11693, 2019, pp. 831-858

  11. 11
    Report
  12. 12
    Report

    المصدر: Journal of the Royal Statistical Society Series B, vol. 83(1), Feb. 2021, pp. 188-212

  13. 13
    Report

    المؤلفون: Pouget-Abadie, Jean, Horel, Thibaut

    المصدر: Proceedings of the 32nd International Conference on Machine Learning, 2015, pp. 977-986

  14. 14
    Report

    المؤلفون: Horel, Thibaut, Singer, Yaron

    المصدر: Proceedings of the 24th International Conference on World Wide Web, 2015, pp. 441-451

  15. 15
    Report

    المصدر: LATIN 2014: Theoretical Informatics. Lecture Notes in Computer Science Volume 8392, 2014, pp 719-730

    URL الوصول: http://arxiv.org/abs/1302.5724

  16. 16
    Academic Journal

    المساهمون: Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science

    المصدر: arXiv

    وصف الملف: application/octet-stream

    Relation: Proceedings of the Annual ACM Symposium on Theory of Computing; https://hdl.handle.net/1721.1/137337.2; 2021. "Data structures meet cryptography: 3SUM with preprocessing." Proceedings of the Annual ACM Symposium on Theory of Computing.

  17. 17
    Academic Journal

    المساهمون: Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science

    المصدر: DROPS

    وصف الملف: application/octet-stream

    Relation: Leibniz International Proceedings in Informatics, LIPIcs; https://hdl.handle.net/1721.1/137343.2; 2019. "How to subvert backdoored encryption: Security against adversaries that decrypt all ciphertexts." Leibniz International Proceedings in Informatics, LIPIcs, 124.

  18. 18
    Academic Journal
  19. 19
    Electronic Resource
  20. 20
    Academic Journal

    المصدر: IEEE Transactions on Information Theory; Aug2022, Vol. 68 Issue 8, p4949-4963, 15p