Your selections:
Further results in d-antimagic labelings of antiprisms
- Lin, Yuqing, Ahmad, Abeed, Miller, Mirka, Sugeng, Kiki Ariyanti, Baca, Martin
On d-antimagic labelings of prisms
- Lin, Yuqing, Slamin,, Baca, Martin, Miller, Mirka
On non-polynomiality of XOR over Zn2
- Grosek, Otokar, Miller, Mirka, Ryan, Joe
On the structure of (d,3)-digraphs containing selfrepeats
- Baskoro, Edy, Cholily, Yus Mochamad, Miller, Mirka
Security issues in statistical databases and implementation of audit expert
Shield privacy Hippocratic security method for virtual community
- Skinner, Geoff, Chang, E., McMahon, M., Aisbett, J., Miller, Mirka
Super vertex-magic total labelings of graphs
- MacDougall, James, Miller, Mirka, Sugeng, Kiki Ariyanti
(a,d)-edge-antimagic total labelings of caterpillars
- Miller, Mirka, Sugeng, Kiki Ariyanti, Slamin,, Baca, Martin
A survey on the connectivity of cages
All (k;g)-cages are k-edge-connected
- Lin, Yuqing, Miller, Mirka, Rodger, Chris
An application of sum labeling for the access structure in a secret sharing scheme
- Miller, Mirka, Sugeng, Kiki Ariyanti, Slamet, Surjadi
Antimagic valuations for the special class of plane graphs
- Baca, Martin, Baskoro, Edy, Miller, Mirka
Complete characterization of almost moore digraphs of degree three
- Baskoro, Edy, Miller, Mirka, Siran, Jozef, Sutton, Martin
Conjectures and open problems on face antimagic evaluations of graphs
- Miller, Mirka, Baca, Martin, Baskoro, Edy, Cholily, Yus Mochamad, Jendrol, Stanislav, Lin, Yuqing, Ryan, Joe, Simanjuntak, Rinovia, Slamin,, Sugeng, Kiki Ariyanti
Context-dependent security enforcement of statistical databases
- Ryan, Joe, Mishra, Vivek, Stranieri, Andrew, Miller, Mirka
Delta-optimum exclusive sum labeling of certain graphs with radius one
- Tuga, Mauritsius, Miller, Mirka
Exclusive sum labeling of graphs
- Miller, Mirka, Patel, Deval, Ryan, Joe, Sugeng, Kiki Ariyanti, Slamin,, Tuga, Mauritsius
Exclusive sum labelings of trees
- Miller, Mirka, Tuga, Mauritsius, Ryan, Joe, Ryjacek, Zdenek
Graph representation of access controls for managing privacy, trust and security requirements
- Miller, Mirka, Skinner, Geoff
Hybrid simulated annealing and genetic algorithm for degree/diameter problem
- Tang, Jianmin, Miller, Mirka, Lin, Yuqing
Are you sure you would like to clear your session, including search history and login status?