491 – 500 of 541
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2002
-
Mark
Distinguishing attacks on SOBER-t16 and t32
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Balanced Partition of Minimum Spanning Trees
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Implications of the view of programs as formal systems
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Widening the configuration management perspective
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Critical curves and surfaces for euclidean reconstruction
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Polynomial-time approximation schemes for the Euclidean survivable network design problem
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Applet verification strategies for RAM-constrained devices
(2002) Information Security and Cryptology - ICISC 2002. 5th International Conference. 2587. p.118-137
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Using CORBA middleware in finite element software
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Detecting windows in city scenes
(2002) Pattern Recognition with Support Vector Machines. First International Workshop, SVM 2002 2388. p.388-396
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A systems perspective on software process improvement
(2002) PROFES 2002 - 4th International Conference on Product Focused Software Process Improvement, December 09-11 2559. p.4-18
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
