2007 |
19 | | Lizzie Coles-Kemp,
Richard E. Overill:
Triangulating the Views of Human and Non-Human Stakeholders in Information System Security Risk Assessment.
Security and Management 2007: 172-178 |
18 | EE | Lizzie Coles-Kemp,
Richard E. Overill:
On the role of the Facilitator in information security risk assessment.
Journal in Computer Virology 3(2): 143-148 (2007) |
2005 |
17 | EE | Richard E. Overill:
Review: Advances in Elliptic Curve Cryptography.
J. Log. Comput. 15(5): 815 (2005) |
2004 |
16 | EE | Richard E. Overill:
Review: From 0 to 1; an Authoritative History of Modern Computing.
J. Log. Comput. 14(2): 323 (2004) |
15 | EE | Richard E. Overill:
Review: Things a Computer Scientist Rarely Talks About.
J. Log. Comput. 14(2): 323-324 (2004) |
14 | EE | Richard E. Overill:
Review: A Dictionary of the Internet.
J. Log. Comput. 14(2): 324-325 (2004) |
13 | EE | Richard E. Overill:
Review: Views into the Chinese Room: New Essays on Searle and Artificial Intelligence.
J. Log. Comput. 14(2): 325-326 (2004) |
2003 |
12 | EE | Jungwon Kim,
Arlene Ong,
Richard E. Overill:
Design of an artificial immune system as a novel anomaly detector for combating financial fraud in the retail sector.
IEEE Congress on Evolutionary Computation (1) 2003: 405-412 |
2002 |
11 | EE | Richard E. Overill:
Codes and Ciphers: Julius Caesar, The Enigma, and the Internet.
J. Log. Comput. 12(3): 543 (2002) |
10 | | Richard E. Overill:
Foundations of Cryptography: Basic Tools.
J. Log. Comput. 12(3): 543-544 (2002) |
2001 |
9 | EE | Richard E. Overill:
Book Review: "Selected Papers on Analysis of Algorithms" by Donald E. Knuth.
J. Log. Comput. 11(2): 355 (2001) |
8 | | Richard E. Overill:
Book Review: "Parallel Processing and Parallel Algorithms: Theory and Computation" by Seyed H. Roosta.
J. Log. Comput. 11(2): 355-356 (2001) |
7 | EE | Richard E. Overill:
Book Review: "Time Warps, String Edits, and Macromolecules: the Theory and Practice of Sequence Comparison" by David Sankoff and Joseph Kruskal.
J. Log. Comput. 11(2): 356 (2001) |
6 | EE | Richard E. Overill:
Book Review: "Cryptography and Computational Number Theory" by K.-Y. Lam, I. Shparlinski, H. Wang and C. Xing.
J. Log. Comput. 11(6): 961 (2001) |
5 | | Richard E. Overill:
Book Review: "Artificial Immune Systems and their Applications" by D. Dasgupta.
J. Log. Comput. 11(6): 961-962 (2001) |
1997 |
4 | | Richard E. Overill,
Stephen Wilson:
Data Parallel Evaluation of Univariate Polynomials by the Knut-Eve Algorithm.
Parallel Computing 23(13): 2115-2127 (1997) |
1996 |
3 | | David Moncrieff,
Richard E. Overill,
Stephen Wilson:
Heterogeneous Computing Machines and Amdahl's Law.
Parallel Computing 22(3): 407-413 (1996) |
1995 |
2 | | David Moncrieff,
Richard E. Overill,
Stephen Wilson:
alphacritical for Parallel Processors.
Parallel Computing 21(3): 467-471 (1995) |
1994 |
1 | | Richard E. Overill,
Stephen Wilson:
Performance of Parallel Algorithms for the Evaluation of Power Series.
Parallel Computing 20(8): 1205-1213 (1994) |