Personensuche
X
?
Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies ,
7
Generalized Noise Role Mining:
, In:
?
Graph-Theoretic Concepts in Computer Science; Lecture Notes in Computer Science ,
8
On the Lossy Kernelization for Connected Treedepth Deletion..:
, In:
?
Proceedings of the 26th ACM Symposium on Access Control Models and Technologies ,
11
Valued Authorization Policy Existence Problem:
, In:
?
Lecture Notes in Computer Science; Computing and Combinatorics ,
12
Constrained Hitting Set Problem with Intervals:
, In:
?
Fundamentals of Computation Theory; Lecture Notes in Computer Science ,
14