Aalto-1

Results: 104



#Item
31

Knowledge Management Framework to Enable Effective Curriculum Development and Self-determined Learning Vincent Kuo1, Tapio Auvinen2, Juha Hartikainen3, Juha Paavola4 1, 3, 4 Aalto University, Department of Civil and Str

Add to Reading List

Source URL: conference.pixel-online.net

Language: English - Date: 2016-03-01 09:03:05
    32

    A Gaussian processes model for survival analysis with time dependent covariates and interval censoring Aki Vehtari1 and Heikki Joensuu2 1 Department of Biomedical Engineering and Computational Science (BECS), Aalto Unive

    Add to Reading List

    Source URL: users.aalto.fi

    Language: English - Date: 2015-04-30 08:15:37
      33

      International Journal of Computer Science in Sport – VolumeEdition 1 www.iacss.org Empowering the Exercise: a Body-Controlled Trampoline Training Game

      Add to Reading List

      Source URL: mediatech.aalto.fi

      Language: English - Date: 2014-08-21 05:30:07
        34

        SEDA: Scalable Embedded Device Attestation N. Asokan1 , Ferdinand Brasser2 , Ahmad Ibrahim2 , Ahmad-Reza Sadeghi2 , Matthias Schunter3 , Gene Tsudik4 , and Christian Wachsmann2 1 Aalto University and University of Helsi

        Add to Reading List

        Source URL: schunter.org

        Language: English - Date: 2015-08-25 04:44:45
          35

          Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method C´eline Blondeau1 and Marine Minier2 1

          Add to Reading List

          Source URL: users.ics.aalto.fi

          Language: English - Date: 2015-03-31 03:25:05
            36

            Differential-Linear Cryptanalysis Revisited C´eline Blondeau1 and Gregor Leander2 and Kaisa Nyberg1 1 2

            Add to Reading List

            Source URL: users.ics.aalto.fi

            Language: English - Date: 2014-03-13 03:39:21
              37

              Retrieval of Experiments by Efficient Comparison of Marginal Likelihoods Sohan Seth1 , John Shawe-Taylor2 , Samuel Kaski1 1 Helsinki Institute for Information Technology, HIIT Aalto University and University of Helsinki,

              Add to Reading List

              Source URL: www.complacs.org

              Language: English - Date: 2014-08-06 06:50:36
                38

                Reflection Cryptanalysis of PRINCE-like Ciphers Hadi Soleimany1 , C´eline Blondeau1 , Xiaoli Yu2,3 , Wenling Wu2 , Kaisa Nyberg1 , Huiling Zhang2 , Lei Zhang2 , and Yanfeng Wang2 1

                Add to Reading List

                Source URL: research.ics.aalto.fi

                Language: English - Date: 2014-12-19 14:51:35
                  39

                  Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation C´eline Blondeau1 , Aslı Bay, and Serge Vaudenay2 1

                  Add to Reading List

                  Source URL: users.ics.aalto.fi

                  Language: English - Date: 2015-03-17 05:06:08
                    40

                    Microsoft Word - FLOODSTAND D5.1 DRAFTdoc

                    Add to Reading List

                    Source URL: floodstand.aalto.fi

                    Language: English - Date: 2010-04-28 02:57:22
                      UPDATE