Personensuche
X
?
2023 Fifth International Conference on Transdisciplinary AI (TransAI) ,
1
Message from the General Chairs TransAI 2023:
, In:
?
Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies ,
2
Generalized Noise Role Mining:
, In:
?
Combinatorial Optimization and Applications; Lecture Notes in Computer Science ,
3
A LP-based Approximation Algorithm for generalized Travelin..:
, In:
?
Proceedings of the 26th ACM Symposium on Access Control Models and Technologies ,
4
Valued Authorization Policy Existence Problem:
, In:
?
Combinatorial Optimization and Applications; Lecture Notes in Computer Science ,
5
The Smallest Number of Vertices in a 2-Arc-Strong Digraph W..:
, In:
?
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies ,
6
Constraint Branching in Workflow Satisfiability Problem:
, In:
?
Lecture Notes in Computer Science; Computing and Combinatorics ,
7
Uniqueness of DP-Nash Subgraphs and D-sets in Weighted Grap..:
, In:
?
Lecture Notes in Computer Science; Computing and Combinatorics ,
8
Approximation Algorithms for General Cluster Routing Proble:
, In:
?
2019 First International Conference on Graph Computing (GC) ,
9
The Workflow Satisfiability Problem with User-Independent C..:
, In:
?
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies ,
10
Bounded and Approximate Strong Satisfiability in Workflows:
, In:
?
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms ,
11
On r-Simple k-Path and related problems parameterized by k/:
, In:
?
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy ,
12
The Authorization Policy Existence Problem:
, In:
?
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies ,
13
On the Satisfiability of Workflows with Release Points:
, In:
?
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies ,
14
Resiliency Policies in Access Control Revisited:
, In:
?
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies ,
15