Cited By
View all- Markatou EFalzon FTamassia RSchor WKim YKim JVigna GShi E(2021)Reconstructing with Less: Leakage Abuse Attacks in Two DimensionsProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3484552(2243-2261)Online publication date: 12-Nov-2021
- Calder J(2017)Numerical schemes and rates of convergence for the Hamilton---Jacobi equation continuum limit of nondominated sortingNumerische Mathematik10.1007/s00211-017-0895-5137:4(819-856)Online publication date: 1-Dec-2017
- Moonen LSpieksma F(2006)Exact Algorithms for a Loading Problem with Bounded Clique WidthINFORMS Journal on Computing10.1287/ijoc.1040.012418:4(455-465)Online publication date: 1-Jan-2006
- Show More Cited By