Search for persons
X
?
Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies ,
1
Generalized Noise Role Mining:
, In:
?
Graph-Theoretic Concepts in Computer Science; Lecture Notes in Computer Science ,
2
On the Lossy Kernelization for Connected Treedepth Deletion..:
, In:
?
Proceedings of the 26th ACM Symposium on Access Control Models and Technologies ,
3
Valued Authorization Policy Existence Problem:
, In:
?
Lecture Notes in Computer Science; Computing and Combinatorics ,
4
Constrained Hitting Set Problem with Intervals:
, In:
?
Fundamentals of Computation Theory; Lecture Notes in Computer Science ,
5
Faster FPT Algorithms for Deletion to Pairs of Graph Classe:
, In:
?
Computer Science – Theory and Applications; Lecture Notes in Computer Science ,
6
Parameterized Complexity of Conflict-Free Set Cover:
, In:
?
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies ,
7