Items where Subject is "08 INFORMATION AND COMPUTING SCIENCES > 0802 Computation Theory and Mathematics > 080201 Analysis of Algorithms and Complexity"
|Up a level|
Litow, B. (2010) On sums of roots of unity. Lecture Notes in Computer Science, 6198. pp. 420-425.
Davida, George, Litow, Bruce, and Xu, Guanguu (2009) Fast arithmetics using Chinese remaindering. Information Processing Letters, 109 (13). pp. 660-662.
Litow, Bruce, and Konovalov, Dmitry (2008) Phenotype space and kinship assignment for the Simpson index. RAIRO - Theoretical Informatics and Applications, 42 (2). pp. 323-333.
Ghodosi, Hossein (2007) On insecurity of Naor–Pinkas’ distributed oblivious transfer. Information Processing Letters, 104 (5). pp. 179-182.
Litow, B. (2006) A special case of a unary regular language containment. Theory of Computing Systems, 39 (5). pp. 743-751.
Song, Insu, and Governatori, Guido (2005) Nested rules in defeasible logic. Lecture Notes in Computer Science, 3791. 204-208 .
Litow, Bruce, Deo, Narsingh, and Cami, Aurel (2004) Compression of vertex transitive graphs. Congressus Numerantium, 167. pp. 161-173.
Stephenson, Peter, and Litow, Bruce (2001) Running the line: Linedrawing using runs and runs of runs. Computers and Graphics, 25 (4). pp. 681-690.
Chiu, Andrew, Davida, George, and Litow, Bruce (2001) Division in logspace-uniform NC¹. RAIRO - Theoretical Informatics and Applications, 35 (3). pp. 259-275.
Litow, Bruce, and Stephenson, Peter (2000) Why step when you can run? Iterative line digitization algorithms based on hierarchies of runs. IEEE Computer Graphics and Applications, 20 (6). pp. 76-84.
Orumiehchi, Mohammad Ali, Mohebbipoor, S. Fahimeh, and Ghodosi, Hossein (2008) Cryptanalysis of MV 3 Stream Cipher. In: Franklin, Matthew K., Hui, Lucas Chi Kwong, and Wong, Duncan S., (eds.) Cryptology and Network Security. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 240-251.
Trevathan, Jarrod, and Read, Wayne (2008) Variable quantity market clearing algorithms. In: Filipe, Joaquim, and Obaidat, Mohammad S., (eds.) E-business and Telecommunications Networks. Communications in Computer and Information Science, 9 (1). Springer, Berlin, Germany, pp. 28-39.
Breitkreutz, David, and Casey, Kate (2008) Clusterers: a comparison of partitioning and density-based algorithms and a discussion of optimisations. Report. UNSPECIFIED, Townsville, Australia. (Unpublished)
Brotankova, Jana, Randall, Marcus, Lewis, Andrew, Pressey, Bob, and Wenger, Amelia (2015) A genetic algorithm solver for pest management control in island systems. In: Proceedings of the First Australasian Artificial Life and Computational Intelligence Conference (8955), pp. 273-285. From: ACALCI 2015: First Australasian Artificial Life and Computational Intelligence Conference, 5-7 February 2015, Newcastle, NSW, Australia.
Ghodosi, Hossein (2007) A general model for oblivious transfer. In: Proceedings of the Sixth International Workshop for Applied PKC, pp. 79-87. From: Sixth International Workshop for Applied PKC (IWAP2007), 3-4 DEC 2007, Perth, WA, Australia.
Ghodosi, Hossein, and Zaare-Nahandi, Rahim (2007) A non-interactive multiparty computation protocol. In: Proceedings of the Sixth International Workshop for Applied PKC, pp. 88-95. From: Sixth International Workshop for Applied PKC (IWAP2007), 3-4 DEC 2007, Perth, WA, Australia.
Cranefield, Stephen, and Song, Insu (2012) Agent Based Simulation for a Sustainable Society and Multi-Agent Smart Computing: international workshops, PRIMA 2011, Wollongong, Australia, November 14, 2011: revised selected papers. Lecture Notes in Artificial Intelligence, 7580 . Springer, Berlin, Germany.
Brown, Marianne Elizabeth (2003) Guiding linear deductions with semantics. Masters (Research) thesis, James Cook University.