Showing results 25 to 44 of 50
< previous
next >
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
Letters in Statistics and Probability Journal:The 64-bit universal random number generator | 2004 | 78 | ||
The Monty Python method for generating gamma variables Journal:Journal of Statistical Software | 1998 | 113 | ||
The Monty Python Method for Generating Random Variables Journal:ACM Transactions on Mathematical Software | 1998 | 139 | ||
A Note on the comparison of five heuristic optimization techniques of a certain class of decision trees Journal:Information Sciences | 1991 | |||
Optimal EREW parallel algorithm for parenthesis matching Proceeding/Conference:Proceedings of the International Conference on Parallel Processing | 1989 | 115 | ||
1989 | 132 | |||
Probabilistic Classification of Medical Images Using a Hybrid Neural Network Proceeding/Conference:Proceedings of the Joint Conference on Information Sciences | 1998 | |||
Probabilistic segmentation of volume data for visualization using SOM-PNN classifier Proceeding/Conference:IEEE Symposium on Volume Visualization | 1998 | |||
Processing Legal Documents in the Chinese-Speaking World: the Experience of HKLII Proceeding/Conference:Conference on Computerization of Law via the Internet | 2003 | 113 | ||
Public release of the software Strong Cryptographic Library version 2.0 which includes the world's strongest random number generator Book:Center of Information Security and Cryptography | 2000 | |||
Randomly generating triangulations of a simple polygon Proceeding/Conference:Lecture Notes in Computer Science | 2005 | 138 | ||
2002 | 138 | |||
Risk management of corporate confidential information in digital form Proceeding/Conference:Proceedings - International Computer Software and Applications Conference | 2004 | 119 | ||
Secure and Practical Tree-structure Signature Schemes Based on Discrete Logarithms Proceeding/Conference:Public Key Cryptography. PKC 2000 | 2000 | 285 | ||
Security of Tseng-Jan's group signature schemes Journal:Information Processing Letters | 2000 | 178 | ||
Security of Wang et al.'s group-oriented (t,n) threshold signature schemes with traceable signers Journal:Information Processing Letters | 2001 | 348 | ||
Separable and anonymous identity-based key issuing Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS | 2005 | 119 | ||
A simple method for generating gamma variables Journal:ACM Transactions on Mathematical Software | 2000 | 324 | ||
Some difficult-to-pass tests of randomness Journal:Journal of Statistical Software | 2002 | 120 | ||
Strong Cryptographic Library - Implementation and Applications Proceeding/Conference:Proceedings of the 9th Hong Kong computer Society Database Conference | 1999 | 109 |