Looking for results similar to:
Searching for:
Found 10,071 results
sorted by:
Pages: 1 2 3 ...
Ronald L. Rivest, Adi Shamir : How to Expose an Eavesdropper. Commun. ACM (CACM) 27(4):393-395 (1984)
Zohar Manna, Adi Shamir : The Optimal Approach to Recursive Programs. Commun. ACM (CACM) 20(11):824-831 (1977)
Mandalay Grems : Share Standard Flow Chart Symbols. Commun. ACM (CACM) 3(3):174-175 (1960)
Ronald L. Rivest, Adi Shamir, Leonard M. Adleman : A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM (CACM) 21(2):120-126 (1978)
Ronald L. Rivest, Adi Shamir, Leonard M. Adleman : A Method for Obtaining Digital Signatures and Public-Key Cryptosystems (Reprint). Commun. ACM (CACM) 26(1):96-99 (1983)
Howard Smith, Kevin Poulter : Share the Ontology in XML-based Trading Architectures. Commun. ACM (CACM) 42(3):110-111 (1999)
M. van der Nat : On Interpolation Search. Commun. ACM (CACM) 22(12):681 (1979)
Peter Friedland, Laurence H. Kedes : Discovering the Secrets of DNA. Commun. ACM (CACM) 28(11):1164-1186 (1985)
Robert W. Floyd : The Paradigms of Programming. Commun. ACM (CACM) 22(8):455-460 (1979)
(search: 0.004 sec. - facets: 0.031 sec.- similarity: 0.99 sec) (?)
Pages: 1 2 3 ...

Refine by VENUE:

show:

Refine by YEAR:

show:
[No canvas support]