1999 |
9 | EE | E. Kolev,
R. Hill:
An improved lower bound on the covering number K2(9, 1).
Discrete Mathematics 197-198: 483-489 (1999) |
1998 |
8 | EE | B. Srinivasan,
S. Pather,
R. Hill,
F. Ansari,
Douglas Niehaus:
A Firm Real-Time System Implementation using Commercial Off-the-Shelf Hardware and Free Software.
IEEE Real Time Technology and Applications Symposium 1998: 112- |
1994 |
7 | | G. Cruz,
R. Hill:
Capturing and Playing Multimedia Events with STREAMS.
ACM Multimedia 1994: 193-200 |
6 | | Marijn van Eupen,
R. Hill:
An Optimal Ternary [69, 5, 45] Code and Related Codes.
Des. Codes Cryptography 4(3): 271-282 (1994) |
5 | EE | P. P. Greenough,
R. Hill:
Optimal linear codes over GF(4).
Discrete Mathematics 125(1-3): 187-199 (1994) |
1992 |
4 | | P. P. Greenough,
R. Hill:
Optimal Ternary Quasi-Cyclic Codes.
Des. Codes Cryptography 2(1): 81-91 (1992) |
3 | | R. Hill,
D. E. Newton:
Optimal Ternary Linear Codes.
Des. Codes Cryptography 2(2): 137-157 (1992) |
1989 |
2 | | M. Herrmann,
R. Hill:
Abstraction and Declarativness in User Interface Development. The Methological Basis of the Composite Object Architecture.
IFIP Congress 1989: 253-258 |
1978 |
1 | | Gordon Bell,
A. Kotok,
Thomas N. Hastings,
R. Hill:
The Evolution of the DECsystem 10.
Commun. ACM 21(1): 44-63 (1978) |