University of Calgary

Published in: TO APPEAR. TO APPEAR SEPTEMBER 2003 OCTOBER 25, 2005 OCTOBER 25 2005 NOVEMBER 2006 NOVEMBER 2003 MARCH 2002 JUNE 2005 JULY 2006 JULY 02, 2003 DECEMBER 2006 AUGUST 5, 2005 AUGUST 4, 2004 AUGUST 2006 AUGUST 2005 APRIL 2004 2022 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000/01 2000 1999 1998 1997 1996 1995 1994 1993 1992 1991/92 1991 1990 1989 1988/89 1988 1987/88 1987 1986 1985 1984 1983 1982/83 1982 1981/82 1981 1980/81 1980 1979 1978 1977/80 1977 1976/77 1976 1975/76 1975 1974/75 1974 1973/74 1973 1972 1971 1970 1969 1968 1967 1966 1965 1964/1965 1964 1963 1962 1961 1960 1959 1958/1959 1958 1957 1956 1955 1954 1953 1952 1900

## A likelihood approach to estimating sensitivity and specificity for binocular diagnostic data: Application in ophthalmologyde Leon, Alexander, Guo, M, Rudnisky, CJ and Singh, G | |

## An affine model for the actions in an integrable system with monodromyBates, Larry and F. Fasso | |

## An explicit treatment of biquadratic function fieldsWu, Qingquan and Scheidler, Renate | |

## An Introduction to Cryptography--Second EditionMollin, RichardFrom the Preface: * Includes items of contemporary interest, such as electronic mail and Internet security, as well as cutting-edge applications, including network security, biometrics, and smart cards *Discusses symmetric and public-key cryptosystems, the digital signature standard, and DES (via S-DES) *Covers Internet security issues, including identity theft, fraud, and financial data theft *Examines the human side of cryptography with nearly sixty mini-biographies. Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that features all of the requisite background material on number theory and algorithmic complexity as well as a historical look at the field. With numerous additions and restructured material, this edition presents the ideas behind cryptography and the applications of the subject. The first chapter provides a thorough treatment of the mathematics necessary to understand cryptography, including number theory and complexity, while the second chapter discusses cryptographic fundamentals, such as ciphers, linear feedback shift registers, modes of operation, and attacks. The next several chapters discuss DES, AES, public-key cryptography, primality testing, and various factoring methods, from classical to elliptical curves. The final chapters are comprised of issues pertaining to the Internet, such as pretty good privacy (PGP), protocol layers, firewalls, and cookies. As well, it includes applications such as login and network security, viruses, smart cards, and biometrics. The book concludes with appendices on mathematical data, computer arithmetic, the Rijndael S-Box, knapsack ciphers, the Silver-Pohlig-Hellman algorithm, the SHA-1 algorithm, radix-64 encoding, and quantum cryptography. | |

## A normed space with the Beckman-Quarles propertyLing, Joseph | |

## A partial proof of the Erdos-Szekeres Conjecture for hexagonsDehnhardt, Knut, Harborth, Heiko and Langi, Zsolt | |

## A smooth invariant not a smooth function of the invariant polynomialsBates, Larry | |

## A stabilization criterion for matrices.Wu, J-W.,, Lian, K-Y., and Lancaster, Peter | |

## A universal Lipschitz extension property for Gromov hyperbolic spacesBrudnyi, Alex and Brudnyi, Yuri | |

## Ball-polyhedraBezdek, Karoly, Langi, Zsolt, Naszodi, Marton and Papez, Peter | |

## Binary space partition for orthogonal fat rectanglesToth, Csaba | |

## Block LU factors of generalized companion matrix pencilsAmiraslani, Amirhossein, Aruliah, Dhaivde and Corless, Rob | |

## Canonical structures for palindromic matrix polynomialsLancaster, Peter, Prells, U. and Rodman, L. | |

## Characterizations of conditional comonotonicityCheung, Ka Chun | |

## Class number approximation in cubic function fieldsScheidler, Renate and Stein, Andreas | |

## Class numbers of real quadratic orders, generalized Fermat numbers, and exponential Diophantine equationsMollin, Richard | |

## Cryptographic protocols on real hyperelliptic curvesJacobson, Michael J., Scheidler, Renate and Stein, Andreas | |

## Decompositions, partitions, and coverings with convex polygons and pseudo-trianglesAichholzer, Oswin, Huemer, Clemens, Kappes, Sarah, Speckmannm, Bettina and Toth, Csaba | |

## Detecting cuts in sensor networksShrivastava, Nisheeth, Suri, Subhash and Toth, Csaba | |

## Determinants of airborne concentrations of volatile organic compounds in rural areas of Western CanadaYou X, Senthilselvan A, Cherry N, Kim, Hyang Mi and Burstyn I | |

## Diophantine equations and congruencesMollin, Richard | |

## Divisibility of countable metric spacesDelhomme, Christian, Laflamme, Claude, Pouzet, Maurice and Sauer, Norbert | |

## Encompassing colored crossing-free geometric graphsHurtado, Ferran, Kano, Mikio, Rappaport, David and Toth, Csaba | |

## Entanglement transformations using separable operationsGheorghiu, Vlad and Robert B. Griffiths | |

## Estimation for location-scale models with censored DataLu, Xuewen, Singh, R.S. and Desmond, A.F. | |

## Fast arithmetic on hyperelliptic curves via continued fraction expansionsScheidler, Renate and Stein, Andreas in Shaska, T., Huffman, W. C. and Ustimenko, V.Advances in Coding Theory and Cryptology, Series on Coding Theory and Cryptology 3 | |

## Filtration Shrinkage by level-crossings of diffusionSezer, Deniz | |

## Fractional monodromy in the {$1:-2$} resonanceEfstathiou, K., Cushman, Richard and Sadovski{\'{\i}}, D. A. | |

## General mixed-data model: Extension of general location and grouped continuous modelsde Leon, Alexander and Carriere, KC | |

## Graphing Kendall's TauDavis, Matthew Kenneth and Chen, GemaiCorrelation is an important and widely used concept, and it is usually taught through word explanation or graphic description accompanied with a numeric measure if such a measure exists. In this note, we explore graphing one of the commonly used correlation measures, Kendall's ?, in such a way that we display how Kendall's ? is calculated and see how Kendall's ? is influenced by data features. | |

## Implementing UNITIS to Bridge Information GapsCerny, Jan and Wrubleski, Marc | |

## Improved convex upper bound via conditional comonotonicityCheung, Ka Chun | |

## Incenter iterations in the Plane and on the SphereBisztriczky, Ted and Bezdek, A. | |

## Industrial sources influence air concentrations of hydrogen sulfide and sulfur dioxide in rural areas of Western CanadaBurstyn Igor, Senthilselvan A, Kim, Hyang Mi, Pietroniro E, Waldner C and Cherry N | |

## Information Reduction by level-crossings in a credit risk modelSezer, Deniz, Jarrow, Robert and Protter, Philip | |

## Inverse electromagnetic problem for microstructured media, University of UtahZhang, Dali | |

## Inverse spectral problems for semi-simple damped vibrating systems.Lancaster, Peter | |

## Isospectral families of high-order systemsLancaster, Peter and Prells, U. | |

## Limit theorems for change-point detection in nonparametric regression modelsBurke, Murray | |

## Liouvillian perturbations of black holesCouch, W.E. and Holder,C.L. | |

## M-estimators of scale with minimum gross errors sensitivity.Szatmari-Voicu, D. and Collins, John | |

## Metric spaces with linear extensions preserving Lipschitz conditionBrudnyi, Alex and Brudnyi, Yuri | |

## New non-linear inequalities for flag-vectors of 4-polytopesLing, Joseph | |

## On a generalized Kaplansky conjectureMollin, Richard | |

## On an ODE Model for Development to AIDSAggarwala, Ben | |

## On A Question of Erdos and GrahamBauer, Mark and Bennet, M. | |

## On composite lognormal-Pareto modelsScollnik, David | |

## One-sample likelihood ratio tests for mixed datade Leon, Alexander | |

## On Estimating HIV in India-againAggarwala, Ben | |

## On Gale and braxial polytopesBisztriczky, Ted and Bayer, M. | |

## On holomorphic functions of slow growth on coverings of strongly pseudoconvex manifoldsBrudnyi, Alex | |

## On holomorphic L^2 functions on coverings of strongly pseudoconvex manifoldsBrudnyi, Alex | |

## On Inference for a Semiparametric Partially Linear Regression Model with Serially Correlated ErrorsYou, J and Chen, Gemai | |

## On the Bezdek-Pach Conjecture for Centrally Symmetric Convex BodiesLangi, Zsolt and Naszodi, Marton | |

## On the relative distances of seven points in a plane convex bodyLangi, Zsolt and Joós, Antal | |

## On the vertex index of convex bodiesBezdek, Karoly and Litvak, Alexander | |

## Optimal allocation of policy limits and deductiblesCheung, Ka Chun | |

## Optimal investment-consumption strategy in a discrete-time model with regime switchingCheung, Ka Chun and Hailiang Yang | |

## Pointed binary encompassing trees: simple and optimalHoffmann, Michael, Speckmann, Bettina and Toth, Csaba | |

## Pseudospectra of Matrix Polynomials that Are Expressed in Alternative BasesCorless, Rob, Rezvani, Nargol and Amiraslani, Amirhossein | |

## Quasi-morphic ringsCamillo, V.P. and Nicholson, W. Keith | |

## Recognizing primesMollin, Richard | |

## Remez type inequalities and Morrey-Campanato spaces on Ahlfors regular setsBrudnyi, Alex and Brudnyi, Yuri | |

## Scattering monodromy and the A1 singularityBates, Larry and R. Cushman | |

## Selfish load balancing and atomic congestion gamesSuri, Subhash, Toth, Csaba and Zhou, Yunhong | |

## Semiparametric Generalized Least Squares Estimation in Partially Linear Regression Models With Correlated ErrorsChen, Gemai and You, J. | |

## Some examples concerning left morphic elements in corner ringsNicholson, W. Keith and Diesl, A.J. | |

## Statistical Inference of Partially Linear Regression Models with Heteroscedastic ErrorsChen, Gemai, You, J and Zhou, Y | |

## The conjugate locus for the Euler top I. The axisymmetric caseBates, Larry and F. Fasso | |

## The Urysohn sphere is oscillation stableNguyen Van ThÃ©, Lionel and Sauer, Norbert | |

## The Urysohn sphere is oscillation stable (updated version).Nguyen Van ThÃ©, Lionel and Sauer, Norbert |

Powered by UNITIS. More features.