- Approximate Kinodynamic Planning Using L2-norm Dynamic John H. Reif
- The University of North Carolina at Greensboro Handout 2 CSC 490: Senior Project January 20, 2008
- Searching in an Unknown Environment: An Optimal Randomized Algorithm for the Cow-Path Problem
- General-Purpose Spatial Decomposition Algorithms: Experimental Results
- University of North Carolina at Greensboro Handout 7 CSC 330: Advanced Data Structures October 5, 2009
- The University of North Carolina at Greensboro Handout 2 CSC 490: Senior Project January 19, 2010
- Cryptography Basics An overview of cryptography used in trusted computing
- ON THRESHOLD CIRCUITS AND POLYNOMIAL COMPUTATION JOHN H. REIF AND STEPHEN R. TATE
- Dynamic Parallel Tree Contraction (Extended Abstract)
- Stable Computation of the Complex Roots of Unity Stephen R. Tate \Lambday
- The University of North Carolina at Greensboro Handout 1 CSC 330: Advanced Data Structures August 24, 2009
- The University of North Carolina at Greensboro Handout 7 CSC 580: Cryptography and Security in Computing October 24, 2007
- The University of North Carolina at Greensboro Handout 1 CSC 653: Advanced Theory of Computation August 26, 2008
- The University of North Carolina at Greensboro Handout 3 CSC 680: Trusted Computing September 20, 2010
- Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules
- The University of North Carolina at Greensboro Handout 8 CSC 653: Advanced Theory of Computation October 16, 2008
- The University of North Carolina at Greensboro Handout 11 CSC 653: Advanced Theory of Computation November 20, 2008
- University of North Carolina at Greensboro Handout 2 CSC 330: Advanced Data Structures August 26, 2009
- Band Ordering in Lossless Compression of Multispectral Images
- The University of North Carolina at Greensboro Handout 1 CSC 589: Trusted Computing and Security Models January 17, 2008
- The University of North Carolina at Greensboro Handout 1 CSC 680: Advanced Topics in Computer Security August 24, 2009
- University of North Carolina at Greensboro Handout 5 CSC 330: Advanced Data Structures September 16, 2009
- The University of North Carolina at Greensboro Handout 1 CSC 490: Senior Project January 11, 2011
- The University of North Carolina at Greensboro Handout 12 CSC 653: Advanced Theory of Computation December 2, 2008
- Introduction to the Trusted Platform Module Design Goals and Capabilities
- Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols using
- The Risk Profile Problem for Stock Portfolio Optimization Ming-Yang Kao
- The University of North Carolina at Greensboro Handout 4 CSC 589: Trusted Computing and Security Models February 23, 2008
- Traceable Signature: Better Efficiency and Beyond and Stephen R. Tate2
- Designing Proxies for Stock Market Indices is Computationally Hard
- The University of North Carolina at Greensboro Handout 5 CSC 580: Cryptography and Security in Computing October 1, 2007
- Lossless Compression of Region Edge Maps Stephen R. Tate
- The University of North Carolina at Greensboro Handout 2 CSC 680: Advanced Topics in Computer Security October 7, 2009
- The University of North Carolina at Greensboro Handout 1 CSC 490: Senior Project January 19, 2010
- The University of North Carolina at Greensboro Handout 1 CSC 495/680: Trusted Computing August 23, 2010
- STEPHEN R. TATE Curriculum Vitae
- The University of North Carolina at Greensboro Handout 2 CSC 589: Trusted Computing and Security Models January 24, 2008
- Arithmetic Circuit Complexity and Motion Planning Stephen R. Tate
- ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention
- Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications
- Online Matching with Blocked Input Ming-Yang Kao
- On Dynamic Algorithms for Algebraic Problems John H. Reif
- SIAM J. DISCRETE MATH. c 1998 Society for Industrial and Applied Mathematics Vol. 0, No. 0, pp. 000000
- OPTIMAL SIZE INTEGER DIVISION CIRCUITS JOHN H. REIF AND STEPHEN R. TATE
- Fundamental Parallel Algebraic Algorithms
- The University of North Carolina at Greensboro Handout 2 CSC 495/680: Trusted Computing September 20, 2010
- The University of North Carolina at Greensboro Handout 3 CSC 495/680: Trusted Computing October 4, 2010
- The University of North Carolina at Greensboro Handout 5 CSC 495/680: Trusted Computing November 1, 2010
- The University of North Carolina at Greensboro Handout 6 CSC 680: Trusted Computing November 10, 2010
- The University of North Carolina at Greensboro Handout 7 CSC 495/680: Trusted Computing November 22, 2010
- The University of North Carolina at Greensboro Handout 3 CSC 490: Senior Project January 26, 2010
- University of North Texas Handout 3 CSC 330: Advanced Data Structures August 26, 2009
- University of North Carolina at Greensboro Handout 4 CSC 330: Advanced Data Structures September 2, 2009
- University of North Carolina at Greensboro Handout 11 CSC 330: Advanced Data Structures November 23, 2009
- The University of North Carolina at Greensboro Handout 1 CSC 490: Senior Project January 20, 2008
- The University of North Carolina at Greensboro Handout 3 CSC 653: Advanced Theory of Computation September 2, 2008
- The University of North Carolina at Greensboro Handout 6 CSC 653: Advanced Theory of Computation September 30, 2008
- The University of North Carolina at Greensboro Handout 9 CSC 653: Advanced Theory of Computation October 30, 2008
- The University of North Carolina at Greensboro Handout 10 CSC 653: Advanced Theory of Computation November 13, 2008
- The University of North Carolina at Greensboro Handout 3 CSC 589: Trusted Computing and Security Models February 21, 2008
- The University of North Carolina at Greensboro Handout 6 CSC 589: Trusted Computing and Security Models March 26, 2008
- The University of North Carolina at Greensboro Handout 1 CSC 580: Cryptography and Security in Computing August 20, 2007
- The University of North Carolina at Greensboro Handout 6 CSC 580: Cryptography and Security in Computing October 5, 2007
- Internet/Networking Overview Notes for CSC 580
- University of North Carolina at Greensboro Handout 9 CSC 330: Advanced Data Structures October 26, 2009
- The University of North Carolina at Greensboro Handout 8 CSC 330: Advanced Data Structures October 19, 2009
- The University of North Carolina at Greensboro Handout 2 CSC 653: Advanced Theory of Computation August 26, 2008
- The University of North Carolina at Greensboro Handout 2 CSC 490: Senior Project January 11, 2011
- The University of North Carolina at Greensboro Handout 7 CSC 589: Trusted Computing and Security Models April 17, 2008
- Higher Compression from the Burrows-Wheeler Transform by Modified Sorting
- The University of North Carolina at Greensboro Handout 3 CSC 580: Cryptography and Security in Computing October 7, 2011
- Internet/Networking Overview Basics, Filtering, and Monitoring
- The University of North Carolina at Greensboro Handout 4 CSC 580: Cryptography and Security in Computing November 4, 2011
- CSC 495 Problem Set 7 Due Tuesday, February 28 Problem 7.R1: Star Census
- The University of North Carolina at Greensboro Handout 5 CSC 495/680: Trusted Computing November 1, 2010
- The University of North Carolina at Greensboro Handout 7 CSC 495/680: Trusted Computing November 22, 2010
- CSC 495 Problem Set 2 Due Tuesday, January 24 Problem 2.R1: The Biggest N
- The University of North Carolina at Greensboro Handout 1 CSC 495/680: Trusted Computing August 23, 2010
- Introduction to the Trusted Platform Module Design Goals and Capabilities
- CSC 495 Problem Set 6 Due Tuesday, 21 Problem 6.R1: The Value of Cache
- The University of North Carolina at Greensboro Handout 3 CSC 495/680: Trusted Computing October 4, 2010
- CSC 495 Problem Set 3 Due Tuesday, January 31 Problem 3.R1: Day of the Week
- CSC 495 Problem Set 5 Due Tuesday, February 14 Problem 5.R1: Do Right By Dudley
- The University of North Carolina at Greensboro Handout 2 CSC 495/680: Trusted Computing September 20, 2010
- CSC 495 Problem Set 4 Due Tuesday, February 7 Problem 4.R1: Best Range
- The University of North Carolina at Greensboro Handout 1 CSC 495: Problem Solving and Programming January 10, 2012
- The University of North Carolina at Greensboro Handout 3 CSC 680: Trusted Computing September 20, 2010
- The University of North Carolina at Greensboro Handout 6 CSC 680: Trusted Computing November 10, 2010
- CSC 495 Problem Set 1 Due Tuesday, January 17 Problem 1.R1: How Many Bits?
- Cryptography Basics An overview of cryptography used in trusted computing