1. A Class of Globally Convergent Iterations for the Solution of Polynomial Equations Traub, Joseph F. 1966 Articles Iterative methods (Mathematics)Polynomials--Study and teachingComputer science
2. Computational Complexity of Iterative Processes Traub, Joseph F. 1972 Articles Iterative methods (Mathematics)MathematicsComputational complexityComputer science
3. Asymptotic behavior of vector recurrences with applications Feldstein, Alan; Traub, Joseph F. 1977 Articles Computer scienceVector analysis--Computer programsRecursive programmingIterative methods (Mathematics)Differential equations, Nonlinear--Asymptotic theory
4. Paraphrasing questions using given and new information McKeown, Kathleen 1983 Articles Computer science
5. Optimal Integration for Functions of Bounded Variation Traub, Joseph F.; Lee, D. 1985 Articles Computer science
6. Language generation: Applications, issues, and approaches McKeown, Kathleen 1986 Articles Computer science
7. PATHALIAS, or, The Care and Feeding of Relative Addresses Honeyman, Peter; Bellovin, Steven Michael 1986 Articles Computer science
9. Pseudo-Network Drivers and Virtual Networks Bellovin, Steven Michael 1990 Articles Computer science
10. Automating the generation of coordinated multimedia explanations McKeown, Kathleen; Feiner, Steven 1991 Articles Computer science
11. Limitations of the Kerberos Authentication System Bellovin, Steven Michael; Merritt, Michael 1991 Articles Computer science
13. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks Bellovin, Steven Michael; Merritt, Michael 1992 Articles Computer scienceComputer securityData encryption (Computer science)Public key cryptography
14. The Monte Carlo Algorithm With a Pseudorandom Generator Traub, Joseph F.; Wozniakowski, Henryk 1992 Articles Computer science
16. An Attack on the Interlock Protocol When Used for Authentication Bellovin, Steven Michael; Merritt, Michael 1993 Articles Computer science
17. Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise Bellovin, Steven Michael; Merritt, Michael 1993 Articles Computer science
19. A Programmable Plaintext Recognizer Wagner, David A.; Bellovin, Steven Michael 1994 Articles Computer science
20. CAD model acquisition using BSP trees Reed, Michael K.; Allen, Peter K.; Abrams, Steven 1995 Articles Computer science