481 – 490 of 534
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2002
-
Mark
Applet verification strategies for RAM-constrained devices
2002) Information Security and Cryptology - ICISC 2002. 5th International Conference. 2587. p.118-137(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Using CORBA middleware in finite element software
(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Critical curves and surfaces for euclidean reconstruction
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Polynomial-time approximation schemes for the Euclidean survivable network design problem
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Construction of cryptographically important Boolean functions
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An overview of an architecture proposal for a high energy physics grid
(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
A geometric approach to Boolean matrix multiplication
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Gossiping with bounded size messages in ad hoc radio networks (Extended abstract)
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Approximate distance oracles revisited
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Detecting windows in city scenes
2002) Pattern Recognition with Support Vector Machines. First International Workshop, SVM 2002 2388. p.388-396(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding