Yannick

Results: 336



#Item
101Replication of HVT-AI(HA) vector vaccine in different species of waterfowl Vilmos Palya, Edit Kovács, Tímea Tatár-Kis, Zalán Homonnay, Tamás Mató, Yannick Gardin Waterfowl plays a key role in the epidemiology of H5

Replication of HVT-AI(HA) vector vaccine in different species of waterfowl Vilmos Palya, Edit Kovács, Tímea Tatár-Kis, Zalán Homonnay, Tamás Mató, Yannick Gardin Waterfowl plays a key role in the epidemiology of H5

Add to Reading List

Source URL: www.vectormune.com

Language: English
    102© SudOuest - imprimer  Publié le à 06h00 Par yannick delneste:14

    © SudOuest - imprimer Publié le à 06h00 Par yannick delneste:14

    Add to Reading List

    Source URL: www.obs.u-bordeaux1.fr

    Language: French - Date: 2013-09-30 04:14:47
      103Long Term Persistence of Colonial Education?  A Discontinuity Analysis at the Border between French- and English-speaking Cameroon Yannick Dupraz, Paris School of Economics

      Long Term Persistence of Colonial Education? A Discontinuity Analysis at the Border between French- and English-speaking Cameroon Yannick Dupraz, Paris School of Economics

      Add to Reading List

      Source URL: www.wehc2015.org

      Language: English - Date: 2015-07-14 03:25:00
        104ENGINEERING CROWDSOURCED STREAM PROCESSING SYSTEMS  MUHAMMAD IMRAN1 , IOANNA LYKOURENTZOU2 , YANNICK NAUDET2 , CARLOS CASTILLO1 1 Qatar  arXiv:1310.5463v3 [cs.DB] 4 Aug 2014

        ENGINEERING CROWDSOURCED STREAM PROCESSING SYSTEMS MUHAMMAD IMRAN1 , IOANNA LYKOURENTZOU2 , YANNICK NAUDET2 , CARLOS CASTILLO1 1 Qatar arXiv:1310.5463v3 [cs.DB] 4 Aug 2014

        Add to Reading List

        Source URL: chato.cl

        Language: English - Date: 2015-07-09 04:34:07
        105An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher Rodolphe Lampe1 , Jacques Patarin1 , and Yannick Seurin2 1  University of Versailles, France

        An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher Rodolphe Lampe1 , Jacques Patarin1 , and Yannick Seurin2 1 University of Versailles, France

        Add to Reading List

        Source URL: www.prism.uvsq.fr

        Language: English - Date: 2015-04-03 07:32:23
          106PRIMITIVES ET PROTOCOLES CRYPTOGRAPHIQUES À SÉCURITÉ PROUVÉE Par Monsieur Yannick SEURIN Discipline : Cryptographie Laboratoire : PRISM Nous abordons deux aspects complémentaires de la sécurité prouvée en cryptog

          PRIMITIVES ET PROTOCOLES CRYPTOGRAPHIQUES À SÉCURITÉ PROUVÉE Par Monsieur Yannick SEURIN Discipline : Cryptographie Laboratoire : PRISM Nous abordons deux aspects complémentaires de la sécurité prouvée en cryptog

          Add to Reading List

          Source URL: www.prism.uvsq.fr

          Language: French - Date: 2015-04-13 04:46:48
            107TALN 2008, Avignon, 9–13 juinConvertir des grammaires d’arbres adjoints à composantes multiples avec tuples d’arbres (TT-MCTAG) en grammaires à concaténation d’intervalles (RCG) Laura Kallmeyer1 Yannick

            TALN 2008, Avignon, 9–13 juinConvertir des grammaires d’arbres adjoints à composantes multiples avec tuples d’arbres (TT-MCTAG) en grammaires à concaténation d’intervalles (RCG) Laura Kallmeyer1 Yannick

            Add to Reading List

            Source URL: user.phil-fak.uni-duesseldorf.de

            Language: French - Date: 2011-03-28 04:04:22
              108Incorporating Semi-supervised Features into Discontinuous Easy-first Constituent Parsing Yannick Versley Department of Computational Linguistics University of Heidelberg

              Incorporating Semi-supervised Features into Discontinuous Easy-first Constituent Parsing Yannick Versley Department of Computational Linguistics University of Heidelberg

              Add to Reading List

              Source URL: pauillac.inria.fr

              Language: English - Date: 2014-12-16 20:03:22
                109Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results? Benoit Cogliati?? , Jacques Patarin? ? ? , and Yannick Seurin† July 25, 2014 Abstract. Security amplification results for blo

                Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results? Benoit Cogliati?? , Jacques Patarin? ? ? , and Yannick Seurin† July 25, 2014 Abstract. Security amplification results for blo

                Add to Reading List

                Source URL: www.prism.uvsq.fr

                Language: English - Date: 2015-04-03 07:32:23