Search the dblp DataBase
E. S. Lee :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
John P. Nestor , E. S. Lee Prerequisite Confidentiality. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1994, pp:282-293 [Conf ] J. G. Lee , E. S. Lee VEMA: Multi-Agent System for Electronic Commerce on Internet. [Citation Graph (0, 0)][DBLP ] HCI (1), 1997, pp:19-22 [Conf ] Y. Tokuda , T. Murakami , Y. Tanaka , E. S. Lee A New Integrated Support Environment for Requirements Analysis of User Interface Development. [Citation Graph (0, 0)][DBLP ] HCI (1), 1999, pp:895-899 [Conf ] Wilf R. LaLonde , E. S. Lee , James J. Horning An LALR(k) Parser Generator. [Citation Graph (0, 0)][DBLP ] IFIP Congress (1), 1971, pp:513-518 [Conf ] W. G. Rosocha , E. S. Lee Performance Enhancement of SISD Processors. [Citation Graph (0, 0)][DBLP ] ISCA, 1979, pp:216-231 [Conf ] Andres Rudmik , E. S. Lee Compiler design for efficient code generation and program optimization. [Citation Graph (0, 0)][DBLP ] SIGPLAN Symposium on Compiler Construction, 1979, pp:127-138 [Conf ] C. J. M. Turnbull , E. S. Lee Generalized Deterministic Left To Right Parsing. [Citation Graph (0, 0)][DBLP ] Acta Inf., 1979, v:12, n:, pp:187-207 [Journal ] Norio Shiratori , Takuo Suganuma , Sigeki Sugiura , Goutam Chakraborty , Kenji Sugawara , Tetsuo Kinoshita , E. S. Lee Framework of a flexible computer communication network. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1996, v:19, n:14, pp:1268-1275 [Journal ] T. Aouam , S. I. Chang , E. S. Lee Fuzzy MADM: An outranking method. [Citation Graph (0, 0)][DBLP ] European Journal of Operational Research, 2003, v:145, n:2, pp:317-328 [Journal ] Search in 0.001secs, Finished in 0.002secs