461 – 470 of 517
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2002
-
Mark
Construction of cryptographically important Boolean functions
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Polynomial-time approximation schemes for the Euclidean survivable network design problem
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Critical curves and surfaces for euclidean reconstruction
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Applet verification strategies for RAM-constrained devices
2002) Information Security and Cryptology - ICISC 2002. 5th International Conference. 2587. p.118-137(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Using CORBA middleware in finite element software
(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Approximate distance oracles revisited
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Adaptive algorithms for constructing convex hulls and triangulations of polygonal chains
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Widening the configuration management perspective
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Gossiping with bounded size messages in ad hoc radio networks (Extended abstract)
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Balanced Partition of Minimum Spanning Trees
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding