Your selections:
An open problem : (4; g)-cages with odd g <= 5 are tightly connected
- Tang, Jianmin, Balbuena, Camino, Lin, Yuqing, Miller, Mirka
Cordial labelling of butterfly networks and mesh of trees
- Miller, Mirka, Rajan, Bharati, Rajasingh, Indra, Manuel, Paul
On graphs of maximum size with given girth and order
- Miller, Mirka, Lin, Yuqing, Brankovic, Ljiljana, Tang, Jianmin
Super edge-antimagicness for a class of disconnected graphs
- Dafik, Miller, Mirka, Ryan, Joe, Baca, Martin
Super edge-magic total labeling of spiked fans, hyper x-trees, dew drops and prisms
- Miller, Mirka, Rajasingh, Indra, Rajan, Bharati, Manuel, Paul
A survey on the connectivity of cages
An application of sum labeling for the access structure in a secret sharing scheme
- Miller, Mirka, Sugeng, Kiki Ariyanti, Slamet, Surjadi
Context-dependent security enforcement of statistical databases
- Ryan, Joe, Mishra, Vivek, Stranieri, Andrew, Miller, Mirka
Graph representation of access controls for managing privacy, trust and security requirements
- Miller, Mirka, Skinner, Geoff
Hybrid simulated annealing and genetic algorithm for degree/diameter problem
- Tang, Jianmin, Miller, Mirka, Lin, Yuqing
On large graphs with given degree and diameter
- Miller, Mirka, Villavicencio, Guillermo
On network security and internet vulnerability
- Miller, Mirka, Patel, Deval, Patel, Keyurkumar
Open problems in the construction of large directed graphs
- Dafik, Miller, Mirka, Ryan, Joe, Slamin,
Privacy and e-health in Australia
- Miller, Mirka, Le Marshall, Bruce
Properties of consecutive edge magic total graphs
- Miller, Mirka, Sugeng, Kiki Ariyanti
Repeats in graphs and digraphs
- Miller, Mirka, Nguyen, Minh Hoang, Simanjuntak, Rinovia
Further results in d-antimagic labelings of antiprisms
- Lin, Yuqing, Ahmad, Abeed, Miller, Mirka, Sugeng, Kiki Ariyanti, Baca, Martin
On the structure of (d,3)-digraphs containing selfrepeats
- Baskoro, Edy, Cholily, Yus Mochamad, Miller, Mirka
Security issues in statistical databases and implementation of audit expert
Shield privacy Hippocratic security method for virtual community
- Skinner, Geoff, Chang, E., McMahon, M., Aisbett, J., Miller, Mirka
Are you sure you would like to clear your session, including search history and login status?