311 – 320 of 523
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2008
-
Mark
Linear-time 3-approximation algorithm for the r-star covering problem
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
IP operations and management
- Book/Report › Conference proceeding (editor)
-
Mark
Reflections on 10 years of software process simulation modeling: a systematic review
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Path generation issues for survivable network design
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Low-latency parallel transport in anonymous peer-to-peer overlays
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Strata of intervenient concepts in normative systems
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Simulating worst case scenarios and analyzing their combined effect in operational release planning
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Efficient approximation algorithms for shortest cycles in undirected graphs
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
GENSIM 2.0: a customizable process simulation model for software process evaluation
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Breaking the F-FCSR-H stream cipher in real time
2008) ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security 5350. p.557-569(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding