default search action
Richard M. Low
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j26]Richard M. Low, Dan Roberts:
Constructing integer-magic graphs via the Combinatorial Nullstellensatz. Art Discret. Appl. Math. 5(2) (2022) - [j25]Richard M. Low, Ardak Kapbasov, Arman Kapbasov, Sergey Bereg:
Computation of new diagonal graph Ramsey numbers. Electron. J. Graph Theory Appl. 10(2): 575-588 (2022) - 2021
- [j24]Stephen J. Curran, Richard M. Low, Stephen C. Locke:
C_4-face-magic toroidal labelings on C_m × C_n. Art Discret. Appl. Math. 4(1) (2021) - [j23]Ugur Odabasi, Dan Roberts, Richard M. Low:
The integer-antimagic spectra of Hamiltonian graphs. Electron. J. Graph Theory Appl. 9(2): 301-308 (2021)
2010 – 2019
- 2019
- [j22]Sin-Min Lee, Richard M. Low, Ho-Kuen Ng, Y.-C. Wang:
On friendly index sets of k-galaxies. Electron. J. Graph Theory Appl. 7(1): 1-10 (2019) - [j21]Wai Chee Shiu, Richard M. Low:
Orthogonal embeddings of graphs in Euclidean space. Electron. J. Graph Theory Appl. 7(2): 373-381 (2019) - 2018
- [j20]Wai Chee Shiu, Richard M. Low:
The integer-magic spectra and null sets of the Cartesian product of trees. Australas. J Comb. 70: 157- (2018) - [j19]W. H. Chan, Richard M. Low, Stephen C. Locke, Irene O. L. Wong:
A map of the P-positions in 'Nim With a Pass' played on heap sizes of at most four. Discret. Appl. Math. 244: 44-55 (2018) - [j18]Elwyn R. Berlekamp, Richard M. Low:
Entrepreneurial Chess. Int. J. Game Theory 47(2): 379-415 (2018) - 2017
- [j17]Rohit Vobbilisetty, Fabio Di Troia, Richard M. Low, Corrado Aaron Visaggio, Mark Stamp:
Classic cryptanalysis using hidden Markov models. Cryptologia 41(1): 1-28 (2017) - [j16]Richard M. Low, Ardak Kapbasov:
Non-Attacking Bishop and King Positions on Regular and Cylindrical Chessboards. J. Integer Seq. 20(6): 17.6.1 (2017) - 2016
- [j15]Richard M. Low, W. H. Chan:
Notes on the combinatorial game: graph Nim. Electron. J. Graph Theory Appl. 4(2): 190-205 (2016) - 2015
- [j14]Richard M. Low, W. H. Chan:
An Atlas of N- and P-positions in 'Nim With a Pass'. Integers 15: G2 (2015) - 2014
- [j13]Aditya Oza, Kevin Ross, Richard M. Low, Mark Stamp:
HTTP attack detection using n-gram analysis. Comput. Secur. 45: 242-254 (2014) - [j12]Kelly Chang, Richard M. Low, Mark Stamp:
Cryptanalysis of Typex. Cryptologia 38(2): 116-132 (2014) - 2013
- [j11]Wai Chee Shiu, Richard M. Low:
Group-magic labelings and null sets of complete n-partite graphs with a deleted edge. Australas. J Comb. 57: 3-20 (2013) - [j10]Amrapali Dhavare, Richard M. Low, Mark Stamp:
Efficient Cryptanalysis of Homophonic Substitution Ciphers. Cryptologia 37(3): 250-281 (2013) - [j9]Gayathri Shanmugam, Richard M. Low, Mark Stamp:
Simple substitution distance and metamorphic detection. J. Comput. Virol. Hacking Tech. 9(3): 159-170 (2013) - [j8]Donabelle Baysa, Richard M. Low, Mark Stamp:
Structural entropy and metamorphic malware. J. Comput. Virol. Hacking Tech. 9(4): 179-192 (2013) - 2012
- [j7]Neha Runwal, Richard M. Low, Mark Stamp:
Opcode graph similarity and metamorphic detection. J. Comput. Virol. 8(1-2): 37-52 (2012)
2000 – 2009
- 2009
- [j6]Wai Chee Shiu, Richard M. Low:
ℤk-magic labellings of fans and wheels with magic value zero. Australas. J Comb. 45: 309- (2009) - 2008
- [j5]Wai Chee Shiu, Richard M. Low:
Ring-magic labelings of graphs. Australas. J Comb. 41: 147-158 (2008) - 2007
- [j4]Richard M. Low, Larry Sue:
Some new results on the integer-magic spectra of tessellation graphs. Australas. J Comb. 38: 255-266 (2007) - [j3]Wai Chee Shiu, Richard M. Low:
Integer-magic spectra of sun graphs. J. Comb. Optim. 14(2-3): 309-321 (2007) - 2006
- [j2]Richard M. Low, Sin-Min Lee:
On the products of group-magic graphs. Australas. J Comb. 34: 41-48 (2006) - [j1]Richard M. Low, Sin-Min Lee:
On the integer-magic spectra of tessellation graphs. Australas. J Comb. 34: 195-210 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint