

Stop the war!
Остановите войну!
for scientists:


default search action
Applicable Algebra in Engineering, Communication and Computing, Volume 16
Volume 16, Number 1, July 2005
- Carsten Schneider

:
Degree Bounds to Find Polynomial Solutions of Parameterized Linear Difference Equations in Pi-Sigma-Fields. 1-32
- Jong Won Lee:

Isomorphism Classes of Picard Curves over Finite Fields. 33-44
- Maria Grazia Marinari, Luciana Ramella:

A characterization of stable and Borel ideals. 45-68
Volume 16, Number 2-3, August 2005
- Mirko Viroli

, Andrea Omicini
:
Process-algebraic approaches for multi-agent systems: an overview. 69-75
- David Kinny:

Algebraic specification of agent computation. 77-111
- Frank S. de Boer, Wieke de Vries, John-Jules Ch. Meyer, Rogier M. van Eijk, Wiebe van der Hoek:

Process algebra and constraint programming for modeling interactions in MAS. 113-150
- Andrea Omicini

, Alessandro Ricci
, Mirko Viroli
:
An algebraic approach for modelling organisation, roles and contexts in MAS. 151-178
- Rune Gustavsson, Martin Fredriksson:

Process algebras as support for sustainable systems of services. 179-203
Volume 16, Number 4, September 2005
- Felix Ulmer:

Note on algebraic solutions of differential equations with known finite Galois group. 205-218
- Alev Topuzoglu, Arne Winterhof

:
On the linear complexity profile of nonlinear congruential pseudorandom number generators of higher orders. 219-228
- René Thiemann

, Jürgen Giesl
:
The size-change principle and dependency pairs for termination of term rewriting. 229-270
Volume 16, Number 5, November 2005
- Elisabetta Fortuna, Patrizia M. Gianni, Domenico Luminati, Paola Parenti:

The adjacency graph of a real algebraic surface. 271-292
- Jonas Månsson, Patrik Nordbeck:

A generalized Ufnarovski graph. 293-306
- Igor E. Shparlinski

, Arne Winterhof
:
Noisy interpolation of sparse polynomials in finite fields. 307-317
- Frédéric Chyzak, Alban Quadrat, Daniel Robertz:

Effective algorithms for parametrizing linear control systems over Ore algebras. 319-376
Volume 16, Number 6, January 2006
- Thomas Beth, Willi Geiselmann, Rainer Steinwandt:

Mathematical Techniques in Cryptology-Editorial. 377-378
- Mihir Bellare, Adriana Palacio:

Protecting against key-exposure: strongly key-insulated encryption with optimal threshold. 379-396
- Ian F. Blake, Theodoulos Garefalakis, Igor E. Shparlinski

:
On the bit security of the Diffie-Hellman key. 397-404
- Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto:

Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. 405-438
- Alfred Menezes, Edlyn Teske:

Cryptographic implications of Hess' generalized GHS attack. 439-460
- James A. Muir, Douglas R. Stinson:

On the low hamming weight discrete logarithm problem for nonadjacent representations. 461-472

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.

Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID
















