Archives - Page 6
-
PB-474 Strictness and Totality Analysis
No. 474 (1994) -
PB-473 Provable Security Against a Differential Attack
No. 473 (1994) -
PB-467 Bisimulations, Games and Logic
No. 467 (1994) -
PB-472 Practically Secure Feistel Ciphers
No. 472 (1994) -
PB-470 Verification of Pointers
No. 470 (1994) -
PB-471 Oasis: An Optimizing Action-based Compiler Generator
No. 471 (1994) -
PB-464 Efficient Training of Feed-Forward Neural Networks
No. 464 (1993) -
PB-456 Relationships between Models of Concurency
No. 456 (1993) -
PB-461 Rewriting Extended Regular Expressions
No. 461 (1993) -
PB-463 Models for Concurrency
No. 463 (1993) -
PB-462 Fibrations, Logical Predicates and Indeterminates
No. 462 (1993) -
PB-459 Designing Dexter-based Cooperative Hypermedia Systems
No. 459 (1993) -
PB-460 Determinizing Asynchronous Automata
No. 460 (1993) -
PB-458 Design Issues for a Dexter-based Hypermedia System
No. 458 (1993) -
PB-455 Complexity Results for 1-safe Nets
No. 455 (1993) -
PB-452 Communicative Action Notation with Shared Storage
No. 452 (1993) -
PB-453 Sharing of Computations
No. 453 (1993)