Improvement and Efficient Implementation of a Lattice-Based Signature Scheme. | 16 | 0.54 | 2013 |
An advanced method for joint scalar multiplications on memory constraint devices | 3 | 0.50 | 2005 |
Decision And Risk Analysis For Process Evolution | 0 | 0.34 | 2001 |
Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders | 5 | 0.54 | 2000 |
Takeover Times and Probabilities of Non-Generational Selection Rules | 2 | 0.44 | 2000 |
Higher Order Multi-Valued Resolution | 0 | 0.34 | 1999 |
A Common Access Structure for Standard Attributes and Document Representations in Vector Space | 1 | 0.37 | 1997 |
Research Issues in Data Warehousing | 37 | 3.80 | 1997 |
A Uniform Proof Procedure for Classical and Non-Classical Logics | 26 | 1.52 | 1996 |
High-Precision Localization of Circular Landmarks in Aerial Images | 3 | 0.94 | 1995 |
Massively parallel simulated annealing and its relation to evolutionary algorithms | 14 | 1.22 | 1993 |
An Information Retrieval View of Environmental Information Systems | 0 | 0.34 | 1991 |
A dynamic programming approach to the power supply net sizing problem | 3 | 0.60 | 1990 |
Parameter-Reduction of Higher Level Grammars (Extended Abstract) | 0 | 0.34 | 1988 |
Mastering Contextsensitivity in Programming Languages | 1 | 0.39 | 1978 |
Topologies on Formal Languages | 2 | 0.41 | 1975 |