1983 |
7 | EE | Kowtha Murthy,
John B. Kam,
M. S. Krishnamoorthy:
An Approximation Algorithm to the File Allocation Problem in Computer Networks.
PODS 1983: 258-266 |
1981 |
6 | EE | George I. Davida,
David L. Wells,
John B. Kam:
A Database Encryption System with Subkeys.
ACM Trans. Database Syst. 6(2): 312-328 (1981) |
1979 |
5 | | John B. Kam,
George I. Davida:
Structured Design of Substitution-Permutation Encryption Networks.
IEEE Trans. Computers 28(10): 747-753 (1979) |
1977 |
4 | EE | John B. Kam,
Jeffrey D. Ullman:
A Model of Statistical Databases and Their Security.
ACM Trans. Database Syst. 2(1): 1-10 (1977) |
3 | | John B. Kam,
Jeffrey D. Ullman:
Monotone Data Flow Analysis Frameworks
Acta Inf. 7: 305-317 (1977) |
1976 |
2 | EE | John B. Kam,
Jeffrey D. Ullman:
Global Data Flow Analysis and Iterative Algorithms.
J. ACM 23(1): 158-171 (1976) |
1975 |
1 | | Amelia C. Fong,
John B. Kam,
Jeffrey D. Ullman:
Application of Lattice Algebra to Loop Optimization.
POPL 1975: 1-9 |