Author:
Fotakis Dimitris,Gritzalis Stefanos
Subject
Computer Networks and Communications
Reference22 articles.
1. The Design and Analysis of Computer Algorithms;Aho,1974
2. A linear-time approximation algorithm for the weighted vertex cover problem;Bar-Yehuda;Journal of Algorithms,1981
3. S. Bistarelli, S.N. Foley, B. O’Sullivan, Detecting and eliminating the cascade vulnerability problem from multi-level security networks using soft constraints, in: Proceedings of 19th AAAI and 16th IAAI, 2004, pp. 808–813.
4. S. Bistarelli, S.N. Foley, B. O’Sullivan, Modelling and Detecting the Cascade Vulnerability Problem using Soft Constraints, in: Proceedings of 2004 ACM Symposium on Applied Computing, 2004, pp. 383–390.
5. Semiring-based constrained solving and optimization;Bistarelli;Journal of the ACM,1997