| 2005 |
| 8 | EE | John Gordon:
Alice and Bob.
Security Protocols Workshop 2005: 344-345 |
| 7 | EE | Jens G. Jensen,
Tara Shah,
Owen Synge,
John Gordon,
Glen Johnson,
Regina Tam:
Enabling Grid Access to Mass Storage.
J. Grid Comput. 3(1-2): 101-112 (2005) |
| 2003 |
| 6 | | Frank Wang,
John Gordon,
Na Helian:
SQL Implementation of a ScanOnce Algorithm for Large Database Mining.
BNCOD Posters 2003: 43-45 |
| 5 | EE | Frank Wang,
Na Helian,
Yike Guo,
Steve Thompson,
John Gordon:
Prototype a Knowledge Discovery Infrastructure by Implementing Relational Grid Monitoring Architecture (R-GMA) on European Data Grid (EDG).
GCC (2) 2003: 811-814 |
| 4 | EE | Frank Wang,
Farhi Marir,
John Gordon,
Na Helian:
List Representation Applied to Sparse Datacubes for Data Warehousing and Data Mining.
IDEAL 2003: 871-875 |
| 3 | | Frank Wang,
Na Helian,
John Gordon:
Scanning Once a Large Database to Mine Association Rules by Growing a Prefix Tree for Each Transaction.
IKE 2003: 129-134 |
| 1984 |
| 2 | EE | John Gordon:
Strong Primes are Easy to Find.
EUROCRYPT 1984: 216-223 |
| 1982 |
| 1 | | Julius Smith,
John Gordon,
David A. Jaffe,
Bernard Mont-Reynaud,
Andrew Schloss,
Bill Schottstaedt,
Paul R. Wieneke:
Recent Research in Computer Music at CCRMA.
COMPCON 1982: 35-39 |