|
Search the dblp DataBase
Scott Dexter:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Kevin J. Compton, Scott Dexter
Proof Techniques for Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] ICALP, 1999, pp:25-39 [Conf]
- Nick Parlante, Jeffrey L. Popyack, Stuart Reges, Stephen Weiss, Scott Dexter, Chaya Gurwitz, Joseph L. Zachary, Grant Braught
Nifty assignments. [Citation Graph (0, 0)][DBLP] SIGCSE, 2003, pp:353-354 [Conf]
- Scott Dexter, Patrick Doyle, Yuri Gurevich
Gurevich Abstract State Machines and Schoenhage Storage Modification Machines. [Citation Graph (0, 0)][DBLP] J. UCS, 1997, v:3, n:4, pp:279-303 [Journal]
Using open source software to engage students in computer science education. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.001secs
|