default search action
Applicable Algebra in Engineering, Communication and Computing, Volume 16
Volume 16, Number 1, July 2005
- Carsten Schneider:
Degree Bounds to Find Polynomial Solutions of Parameterized Linear Difference Equations in Pi-Sigma-Fields. 1-32 - Jong Won Lee:
Isomorphism Classes of Picard Curves over Finite Fields. 33-44 - Maria Grazia Marinari, Luciana Ramella:
A characterization of stable and Borel ideals. 45-68
Volume 16, Number 2-3, August 2005
- Mirko Viroli, Andrea Omicini:
Process-algebraic approaches for multi-agent systems: an overview. 69-75 - David Kinny:
Algebraic specification of agent computation. 77-111 - Frank S. de Boer, Wieke de Vries, John-Jules Ch. Meyer, Rogier M. van Eijk, Wiebe van der Hoek:
Process algebra and constraint programming for modeling interactions in MAS. 113-150 - Andrea Omicini, Alessandro Ricci, Mirko Viroli:
An algebraic approach for modelling organisation, roles and contexts in MAS. 151-178 - Rune Gustavsson, Martin Fredriksson:
Process algebras as support for sustainable systems of services. 179-203
Volume 16, Number 4, September 2005
- Felix Ulmer:
Note on algebraic solutions of differential equations with known finite Galois group. 205-218 - Alev Topuzoglu, Arne Winterhof:
On the linear complexity profile of nonlinear congruential pseudorandom number generators of higher orders. 219-228 - René Thiemann, Jürgen Giesl:
The size-change principle and dependency pairs for termination of term rewriting. 229-270
Volume 16, Number 5, November 2005
- Elisabetta Fortuna, Patrizia M. Gianni, Domenico Luminati, Paola Parenti:
The adjacency graph of a real algebraic surface. 271-292 - Jonas Månsson, Patrik Nordbeck:
A generalized Ufnarovski graph. 293-306 - Igor E. Shparlinski, Arne Winterhof:
Noisy interpolation of sparse polynomials in finite fields. 307-317 - Frédéric Chyzak, Alban Quadrat, Daniel Robertz:
Effective algorithms for parametrizing linear control systems over Ore algebras. 319-376
Volume 16, Number 6, January 2006
- Thomas Beth, Willi Geiselmann, Rainer Steinwandt:
Mathematical Techniques in Cryptology-Editorial. 377-378 - Mihir Bellare, Adriana Palacio:
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold. 379-396 - Ian F. Blake, Theodoulos Garefalakis, Igor E. Shparlinski:
On the bit security of the Diffie-Hellman key. 397-404 - Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto:
Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. 405-438 - Alfred Menezes, Edlyn Teske:
Cryptographic implications of Hess' generalized GHS attack. 439-460 - James A. Muir, Douglas R. Stinson:
On the low hamming weight discrete logarithm problem for nonadjacent representations. 461-472
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.