2005 |
8 | EE | John Gordon:
Alice and Bob.
Security Protocols Workshop 2005: 344-345 |
7 | EE | Jens G. Jensen,
Tara Shah,
Owen Synge,
John Gordon,
Glen Johnson,
Regina Tam:
Enabling Grid Access to Mass Storage.
J. Grid Comput. 3(1-2): 101-112 (2005) |
2003 |
6 | | Frank Wang,
John Gordon,
Na Helian:
SQL Implementation of a ScanOnce Algorithm for Large Database Mining.
BNCOD Posters 2003: 43-45 |
5 | EE | Frank Wang,
Na Helian,
Yike Guo,
Steve Thompson,
John Gordon:
Prototype a Knowledge Discovery Infrastructure by Implementing Relational Grid Monitoring Architecture (R-GMA) on European Data Grid (EDG).
GCC (2) 2003: 811-814 |
4 | EE | Frank Wang,
Farhi Marir,
John Gordon,
Na Helian:
List Representation Applied to Sparse Datacubes for Data Warehousing and Data Mining.
IDEAL 2003: 871-875 |
3 | | Frank Wang,
Na Helian,
John Gordon:
Scanning Once a Large Database to Mine Association Rules by Growing a Prefix Tree for Each Transaction.
IKE 2003: 129-134 |
1984 |
2 | EE | John Gordon:
Strong Primes are Easy to Find.
EUROCRYPT 1984: 216-223 |
1982 |
1 | | Julius Smith,
John Gordon,
David A. Jaffe,
Bernard Mont-Reynaud,
Andrew Schloss,
Bill Schottstaedt,
Paul R. Wieneke:
Recent Research in Computer Music at CCRMA.
COMPCON 1982: 35-39 |