Internet security applications of the Munn rings


Autoria(s): Kelarev, A. V.; Yearwood, J. L.; Watters, P.; Wu, X.; Abawajy, J. H.; Pan, L.
Data(s)

01/01/2010

Resumo

Effective multiple clustering systems, or clusterers, have important applications in information security. The aim of the present article is to introduce a new method of designing multiple clusterers based on theMunn rings and describe a class of optimal clusterers which can be obtained in this construction.<br />

Identificador

http://hdl.handle.net/10536/DRO/DU:30029404

Idioma(s)

eng

Publicador

Springer New York LLC

Relação

http://dro.deakin.edu.au/eserv/DU:30029404/abawajy-internetsecurity2-2010.pdf

http://dx.doi.org/10.1007/s00233-010-9242-1

Direitos

2010, Springer Science+Business Media

Palavras-Chave #Munn rings #Internet security applications
Tipo

Journal Article