Adaptive cascade
From MaRDI portal
Publication:3562812
DOI10.1007/978-3-642-04831-9_4zbMATH Open1189.81040OpenAlexW4231375064MaRDI QIDQ3562812FDOQ3562812
Authors: Stefan Rass, Christian Kollmitzer
Publication date: 28 May 2010
Published in: Applied Quantum Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-04831-9_4
Recommendations
Cites Work
- Sequential Monte Carlo Methods in Practice
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Extending the linear model with R. Generalized linear, mixed effects and nonparametric regression models.
- Statistical Analysis and Modelling of Spatial Point Patterns
- ARCH models and financial applications
- Learning Bayesian networks: The combination of knowledge and statistical data
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Adjustment of an Inverse Matrix Corresponding to a Change in One Element of a Given Matrix
- On the consistency of Bayes estimates
- Title not available (Why is that?)
- Title not available (Why is that?)
- Probabilistic Networks and Expert Systems
- Title not available (Why is that?)
- Doubly stochastic Poisson processes
- Experimental quantum cryptography.
- Title not available (Why is that?)
- The consistency of posterior distributions in nonparametric problems
- Dependency networks for inference, collaborative filtering, and data visualization
- Approximating probabilistic inference in Bayesian belief networks is NP- hard
- Generalized Least Squares
- Handbook of econometrics. Vol. 4
- Title not available (Why is that?)
- The computational complexity of probabilistic inference using Bayesian belief networks
- Graphical models. Methods for data analysis and mining
- Applying Generalized Linear Models
- Title not available (Why is that?)
Cited In (7)
- Adaptive succinctness
- Various matching keys for asymmetric topology encryption
- Key distribution versus key enhancement in quantum cryptography
- Using quantum key distribution for cryptographic purposes: a survey
- The case for quantum key distribution
- Distribution of secret keys in a quantum network with trusted intermediate nodes;Распределение секретных ключей в квантовой сети с доверенными промежуточными узлами
- Trusted quantum back bone leveraging secure communication
This page was built for publication: Adaptive cascade
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3562812)