nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Algorithmic construction of Hamiltonians in pyramids
|
Sarbazi-Azad, H. |
|
2001 |
80 |
2 |
p. 75-79 5 p. |
artikel |
2 |
A probabilistic cryptanalytic method for a time-variant permutation generator ☆ ☆ This paper was presented at ACISP 2000, Brisbane, Australia, July 2000.
|
Golić, Jovan Dj. |
|
2001 |
80 |
2 |
p. 67-73 7 p. |
artikel |
3 |
Convexifying polygons with simple projections
|
Calvo, Jorge Alberto |
|
2001 |
80 |
2 |
p. 81-86 6 p. |
artikel |
4 |
Cryptanalysis of Chang–Wu's group-oriented authentication and key exchange protocols
|
Chien, Hung-Yu |
|
2001 |
80 |
2 |
p. 113-117 5 p. |
artikel |
5 |
Impossibility of scalar clock-based communication-induced checkpointing protocols ensuring the RDT property
|
Baldoni, Roberto |
|
2001 |
80 |
2 |
p. 105-111 7 p. |
artikel |
6 |
On the effective clustering of multidimensional data sequences
|
Lee, Seok-Lyong |
|
2001 |
80 |
2 |
p. 87-95 9 p. |
artikel |
7 |
Scheduling periodic tasks on uniform multiprocessors ☆ ☆ Supported in part by the National Science Foundation (NSF CCR-9972105).
|
Baruah, Sanjoy |
|
2001 |
80 |
2 |
p. 97-104 8 p. |
artikel |