dblp.uni-trier.dewww.uni-trier.de

Richard E. Overill

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
19 Lizzie Coles-Kemp, Richard E. Overill: Triangulating the Views of Human and Non-Human Stakeholders in Information System Security Risk Assessment. Security and Management 2007: 172-178
18EELizzie Coles-Kemp, Richard E. Overill: On the role of the Facilitator in information security risk assessment. Journal in Computer Virology 3(2): 143-148 (2007)
2005
17EERichard E. Overill: Review: Advances in Elliptic Curve Cryptography. J. Log. Comput. 15(5): 815 (2005)
2004
16EERichard E. Overill: Review: From 0 to 1; an Authoritative History of Modern Computing. J. Log. Comput. 14(2): 323 (2004)
15EERichard E. Overill: Review: Things a Computer Scientist Rarely Talks About. J. Log. Comput. 14(2): 323-324 (2004)
14EERichard E. Overill: Review: A Dictionary of the Internet. J. Log. Comput. 14(2): 324-325 (2004)
13EERichard E. Overill: Review: Views into the Chinese Room: New Essays on Searle and Artificial Intelligence. J. Log. Comput. 14(2): 325-326 (2004)
2003
12EEJungwon Kim, Arlene Ong, Richard E. Overill: Design of an artificial immune system as a novel anomaly detector for combating financial fraud in the retail sector. IEEE Congress on Evolutionary Computation (1) 2003: 405-412
2002
11EERichard E. Overill: Codes and Ciphers: Julius Caesar, The Enigma, and the Internet. J. Log. Comput. 12(3): 543 (2002)
10 Richard E. Overill: Foundations of Cryptography: Basic Tools. J. Log. Comput. 12(3): 543-544 (2002)
2001
9EERichard E. Overill: Book Review: "Selected Papers on Analysis of Algorithms" by Donald E. Knuth. J. Log. Comput. 11(2): 355 (2001)
8 Richard E. Overill: Book Review: "Parallel Processing and Parallel Algorithms: Theory and Computation" by Seyed H. Roosta. J. Log. Comput. 11(2): 355-356 (2001)
7EERichard E. Overill: Book Review: "Time Warps, String Edits, and Macromolecules: the Theory and Practice of Sequence Comparison" by David Sankoff and Joseph Kruskal. J. Log. Comput. 11(2): 356 (2001)
6EERichard E. Overill: Book Review: "Cryptography and Computational Number Theory" by K.-Y. Lam, I. Shparlinski, H. Wang and C. Xing. J. Log. Comput. 11(6): 961 (2001)
5 Richard E. Overill: Book Review: "Artificial Immune Systems and their Applications" by D. Dasgupta. J. Log. Comput. 11(6): 961-962 (2001)
1997
4 Richard E. Overill, Stephen Wilson: Data Parallel Evaluation of Univariate Polynomials by the Knut-Eve Algorithm. Parallel Computing 23(13): 2115-2127 (1997)
1996
3 David Moncrieff, Richard E. Overill, Stephen Wilson: Heterogeneous Computing Machines and Amdahl's Law. Parallel Computing 22(3): 407-413 (1996)
1995
2 David Moncrieff, Richard E. Overill, Stephen Wilson: alphacritical for Parallel Processors. Parallel Computing 21(3): 467-471 (1995)
1994
1 Richard E. Overill, Stephen Wilson: Performance of Parallel Algorithms for the Evaluation of Power Series. Parallel Computing 20(8): 1205-1213 (1994)

Coauthor Index

1Lizzie Coles-Kemp [18] [19]
2Jungwon Kim [12]
3David Moncrieff [2] [3]
4Arlene Ong [12]
5Stephen Wilson [1] [2] [3] [4]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)