Your selections:
Leakage-resilient biometric-based remote user authentication with fuzzy extractors
- Tian, Yangguang, Li, Yingjiu, Sengupta, Binanda, Li, Nan, Su, Chunhua
The g-good-neighbor and g-extra diagnosability of networks
- Wang, Shiying, Wang, Mujiangshan
The many facets of upper domination
- Bazgan, Cristina, Brankovic, Ljiljana, Casel, Katrin, Fernau, Henning, Jansen, Klaus, Klein, Kim-Manuel, Lampis, Michael, Liedloff, Mathieu, Monnot, Jérôme, Paschos, Vangelis Th.
A linear algorithm for a perfect matching in polyomino graphs
Graph editing problems with extended regularity constraints
Separating sets of strings by finding matching patterns is almost always hard
- Lancia, Giuseppe, Mathieson, Luke, Moscato, Pablo
Linear-time superbubble identification algorithm for genome assembly
- Brankovic, Ljiljana, Iliopoulos, Costas S., Kundu, Ritu, Mohamed, Manal, Pissis, Solon P., Vayani, Fatima
- Wang, Mujiangshan, Lin, Yuqing, Wang, Shiying
Are you sure you would like to clear your session, including search history and login status?