The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Richard E. Overill: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Richard E. Overill
    Book Review: "Selected Papers on Analysis of Algorithms" by Donald E. Knuth. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 2001, v:11, n:2, pp:355- [Journal]
  2. Richard E. Overill
    Book Review: "Parallel Processing and Parallel Algorithms: Theory and Computation" by Seyed H. Roosta. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 2001, v:11, n:2, pp:355-356 [Journal]
  3. Richard E. Overill
    Book Review: "Time Warps, String Edits, and Macromolecules: the Theory and Practice of Sequence Comparison" by David Sankoff and Joseph Kruskal. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 2001, v:11, n:2, pp:356- [Journal]
  4. Richard E. Overill
    Book Review: "Cryptography and Computational Number Theory" by K.-Y. Lam, I. Shparlinski, H. Wang and C. Xing. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 2001, v:11, n:6, pp:961- [Journal]
  5. Richard E. Overill
    Book Review: "Artificial Immune Systems and their Applications" by D. Dasgupta. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 2001, v:11, n:6, pp:961-962 [Journal]
  6. Richard E. Overill
    Codes and Ciphers: Julius Caesar, The Enigma, and the Internet. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 2002, v:12, n:3, pp:543- [Journal]
  7. Richard E. Overill
    Foundations of Cryptography: Basic Tools. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 2002, v:12, n:3, pp:543-544 [Journal]
  8. Richard E. Overill
    Review: From 0 to 1; an Authoritative History of Modern Computing. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 2004, v:14, n:2, pp:323- [Journal]
  9. Richard E. Overill
    Review: Things a Computer Scientist Rarely Talks About. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 2004, v:14, n:2, pp:323-324 [Journal]
  10. Richard E. Overill
    Review: A Dictionary of the Internet. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 2004, v:14, n:2, pp:324-325 [Journal]
  11. Richard E. Overill
    Review: Views into the Chinese Room: New Essays on Searle and Artificial Intelligence. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 2004, v:14, n:2, pp:325-326 [Journal]
  12. Richard E. Overill
    Review: Advances in Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 2005, v:15, n:5, pp:815- [Journal]
  13. David Moncrieff, Richard E. Overill, Stephen Wilson
    alphacritical for Parallel Processors. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1995, v:21, n:3, pp:467-471 [Journal]
  14. David Moncrieff, Richard E. Overill, Stephen Wilson
    Heterogeneous Computing Machines and Amdahl's Law. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1996, v:22, n:3, pp:407-413 [Journal]
  15. Richard E. Overill, Stephen Wilson
    Performance of Parallel Algorithms for the Evaluation of Power Series. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1994, v:20, n:8, pp:1205-1213 [Journal]
  16. Richard E. Overill, Stephen Wilson
    Data Parallel Evaluation of Univariate Polynomials by the Knut-Eve Algorithm. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1997, v:23, n:13, pp:2115-2127 [Journal]
  17. Lizzie Coles-Kemp, Richard E. Overill
    On the role of the Facilitator in information security risk assessment. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:2, pp:143-148 [Journal]

  18. A Complexity Based Model for Quantifying Forensic Evidential Probabilities. [Citation Graph (, )][DBLP]


  19. Triangulating the Views of Human and Non-Human Stakeholders in Information System Security Risk Assessment. [Citation Graph (, )][DBLP]


  20. Design of an artificial immune system as a novel anomaly detector for combating financial fraud in the retail sector. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002