Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

QuickTime

Known as: Quick Time, QuickTime 7.6.6, QT 
QuickTime is an extensible multimedia framework developed by Apple Inc., capable of handling various formats of digital video, picture, sound… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Abstract The imputeTS package specializes on univariate time series imputation. It offers multiple state-of-the-art imputation… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • figure 1
Highly Cited
2011
Highly Cited
2011
This brief studies distributed containment control for double-integrator dynamics in the presence of both stationary and dynamic… Expand
  • figure 1
  • figure 2
  • figure 5
  • figure 3
  • figure 4
Highly Cited
2008
Highly Cited
2008
June 2005). 4. R. M. Alexander, J. Exp. Biol. 160, 55 (1991). 5. G. A. Cavagna, N. C. Heglund, C. R. Taylor, Am. J. Physiol. 233… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Highly Cited
2007
Highly Cited
2007
MDPL has been proposed as a masked logic style that counteracts DPA attacks. Recently, it has been shown that the so-called… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Highly Cited
2004
Highly Cited
2004
We introduce MASON, a fast, easily extendable, discreteevent multi-agent simulation toolkit in Java. MASON was designed to serve… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2004
Review
2004
Abstract We introduce a short signature scheme based on the Computational Diffie–Hellman assumption on certain elliptic and… Expand
  • table 1
Highly Cited
2001
Highly Cited
2001
Elliptic curve cryptosystems([19],[25]) are based on the elliptic curve discrete logarithm problem(ECDLP). If elliptic curve… Expand
  • table 2
  • table 1
  • table 3
  • figure 1
Highly Cited
1998
Highly Cited
1998
Abstract. The security of elliptic curve cryptosystems is based on the presumed intractability of the discrete logarithm problem… Expand
Highly Cited
1997
Highly Cited
1997
Power is becoming a critical constraint for designing embedded applications. Current power analysis techniques based on circuit… Expand
Highly Cited
1987
Highly Cited
1987
We discuss analogs based on elliptic curves over finite fields of public key cryptosystems which use the multiplicative group of… Expand
  • table 4.1
  • figure 4.4
  • table 4.2