Your selections:
Internet security applications of Grobner-Shirvov bases
- Kelarev, Andrei, Yearwood, John, Watters, Paul
A Grobner-Shirshov Algorithm for Applications in Internet Security
- Kelarev, Andrei, Yearwood, John, Watters, Paul, Wu, Xinwen, Ma, Liping, Abawajy, Jemal, Pan, L.
Determining the influence of visual training on EEG activity patterns using association rule mining
- Yan, Fangang, Watters, Paul, Wang, Wei
Fake file detection in P2P networks by consensus and reputation
- Watters, Paul, Layton, Robert
Are you sure you would like to clear your session, including search history and login status?