Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

S-Expressions. Network Working Group, (November 1997)Learning binary relations and total orders, , and . SIAM Journal of Computing, 22 (5): 1006-1034 (1993)SPKI Certificate Theory, , , , , and . RFC 2693 (Experimental), (September 1999)Training a 3-node neural network is NP-complete, and . Neural Networks, (1992)Introduction to Algorithms, , and . (2001)Introduction to Algorithms, , and . MIT Press, (1990)Handbook of Applied Cryptography, , , and . (1997)Introduction to Algorithms, , and . MIT-Press, Cambridge, Massachusetts, (1989)The RC5 encryption algorithm. CryptoBytes, (Spring 1995)Inferring decision trees using the minimum description length principle, and . Technical Memo, MIT/LCS/TM-339. Massachusetts Institute of Technology, Laboratory for Computer Science, (September 1987)