Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Use of Symbolic Computation in Geometric Modelling., , , , and . IMA Conference on the Mathematics of Surfaces, page 199-206. Clarendon Press, (1988)Cryptographic Hash Functions: Recent Design Trends and Security Notions., , and . IACR Cryptology ePrint Archive, (2011)A Generic Root Operation for Exact Real Arithmetic., and . CCA, volume 2064 of Lecture Notes in Computer Science, page 82-87. Springer, (2000)Copyright Issues for MKM., and . MKM, volume 3119 of Lecture Notes in Computer Science, page 1-16. Springer, (2004)A Comparison of Equality in Computer Algebra and Correctness in Mathematical Pedagogy., , and . Calculemus/MKM, volume 5625 of Lecture Notes in Computer Science, page 75-89. Springer, (2009)Scratchpad's View of Algebra I: Basic Commutative Algebra., and . DISCO, volume 429 of Lecture Notes in Computer Science, page 40-54. Springer, (1990)Scratchpad's View of Algebra II: A Categorical View of Factorization., , and . ISSAC, page 32-38. ACM, (1991)A Comparison of Three Heuristics to Choose the Variable Ordering for Cylindrical Algebraic Decomposition., , , , and . ACM Commun. Comput. Algebra, 48 (3/4): 121-123 (2014)Branch cuts in maple 17., , , , and . ACM Commun. Comput. Algebra, 48 (1/2): 24-27 (2014)Using Machine Learning to Improve Cylindrical Algebraic Decomposition., , , , and . CoRR, (2018)