Work-time-optimal parallel algorithms for string problems
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
A possibilistic approach to intrusion detection under imperfect logging protocol
Proceedings of the 6th International Conference on Security of Information and Networks
Hi-index | 0.00 |