nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A combined BIT and TIMESTAMP algorithm for the list update problem
|
Albers, Susanne |
|
1995 |
56 |
3 |
p. 135-139 5 p. |
artikel |
2 |
A linear-time algorithm for proper interval graph recognition
|
de Figueiredo, Celina M.Herrera |
|
1995 |
56 |
3 |
p. 179-184 6 p. |
artikel |
3 |
An attack on the Needham-Schroeder public-key authentication protocol
|
Lowe, Gavin |
|
1995 |
56 |
3 |
p. 131-133 3 p. |
artikel |
4 |
A type soundness proof for variables in LCF ML
|
Volpano, Dennis |
|
1995 |
56 |
3 |
p. 141-146 6 p. |
artikel |
5 |
Computing threshold functions by depth-3 threshold circuits with smaller thresholds of their gates
|
Jukna, Stasys |
|
1995 |
56 |
3 |
p. 147-150 4 p. |
artikel |
6 |
Edge domination on bipartite permutation graphs and cotriangulated graphs
|
Srinivasan, Anand |
|
1995 |
56 |
3 |
p. 165-171 7 p. |
artikel |
7 |
Incremental algorithms for finding the convex hulls of circles and the lower envelopes of parabolas
|
Devillers, Olivier |
|
1995 |
56 |
3 |
p. 157-164 8 p. |
artikel |
8 |
Lower bounds for two call control problems
|
Tomkins, Andrew |
|
1995 |
56 |
3 |
p. 173-178 6 p. |
artikel |
9 |
Multiple Quickselect — Hoare's Find algorithm for several elements
|
Prodinger, Helmut |
|
1995 |
56 |
3 |
p. 123-129 7 p. |
artikel |
10 |
On the security of recent protocols
|
Clark, John |
|
1995 |
56 |
3 |
p. 151-155 5 p. |
artikel |