-
1
-
-
0005053214
-
-
Red Book NCSC-TG-005, Library No. S228, 526, Version 1, National Computer Security Center, USA
-
National Computer Security Center, Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria, Red Book NCSC-TG-005, Library No. S228, 526, Version 1, National Computer Security Center, USA, 1987.
-
(1987)
Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria
-
-
-
3
-
-
0347409919
-
The Cascade problem: Graph Theory can help
-
National Computer Security Centre, Baltimore, MD
-
J.A. Fitch III, L.J. Hoffman, The Cascade problem: Graph Theory can help, Proceedings of the 14th National Computer Security Conference, 1991, National Computer Security Centre, Baltimore, MD pp. 88-100.
-
(1991)
Proceedings of the 14th National Computer Security Conference
, pp. 88-100
-
-
Fitch J.A. III1
Hoffman, L.J.2
-
5
-
-
0024124830
-
The Cascading problem for interconnected networks
-
National Computer Security Centre, Baltimore, MD
-
J.K. Millen, M.W. Schwartz, The Cascading problem for interconnected networks, Proceedings of the Fourth Aerospace Computer Security Applications Conference, 1988, National Computer Security Centre, Baltimore, MD pp. 269-273.
-
(1988)
Proceedings of the Fourth Aerospace Computer Security Applications Conference
, pp. 269-273
-
-
Millen, J.K.1
Schwartz, M.W.2
-
7
-
-
0024665569
-
Statistical models of trust: TCBs vs. People
-
IEEE Computer Society Press, Los Alamitos, CA, 1989
-
T.M.P. Lee, Statistical models of trust: TCBs vs. People, Proceedings of the IEEE Symposium on Security and Privacy, 1989, IEEE Computer Society Press, Los Alamitos, CA, 1989, pp. 10-19.
-
(1989)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 10-19
-
-
Lee, T.M.P.1
-
8
-
-
0003415652
-
-
Addison-Wesley, Reading, Massachusetts
-
A. Aho, J. Hopcroft, J. Ullman, The Design and Analysis of Computer Algorithms, Addison-Wesley, Reading, Massachusetts, 1974.
-
(1974)
The Design and Analysis of Computer Algorithms
-
-
Aho, A.1
Hopcroft, J.2
Ullman, J.3
-
9
-
-
84974751467
-
The Cascade Vulnerability Problem
-
J.D. Horton, R.H. Cooper, W.F. Hyslop, B.G. Nickerson, O.K. Ward, R. Harland, E. Ashby, W.M. Stewart, The Cascade Vulnerability Problem, Journal of Computer Security 2 (4) (1993) 279-290.
-
(1993)
Journal of Computer Security
, vol.2
, Issue.4
, pp. 279-290
-
-
Horton, J.D.1
Cooper, R.H.2
Hyslop, W.F.3
Nickerson, B.G.4
Ward, O.K.5
Harland, R.6
Ashby, E.7
Stewart, W.M.8
-
10
-
-
84911288683
-
Algorithm for the Cascading problem
-
J.P. Anderson (Ed.), June 25, 1990, IEEE Cipher Forum on dockmaster.ncsc.mil
-
J.K. Millen, Algorithm for the Cascading problem, in: J.P. Anderson (Ed.), Internet IEEE Cipher News Group, June 25, 1990, IEEE Cipher Forum on dockmaster.ncsc.mil.
-
Internet IEEE Cipher News Group
-
-
Millen, J.K.1
-
11
-
-
5744249209
-
Equation of state calculation by fast computing machines
-
M. Metropolis, A.N. Rosenbluth, M.N. Rosenbluth, A.H. Teller, E. Teller, Equation of state calculation by fast computing machines, Journal of Chemical Physics 21 (6) (1953) 1087-1092.
-
(1953)
Journal of Chemical Physics
, vol.21
, Issue.6
, pp. 1087-1092
-
-
Metropolis, M.1
Rosenbluth, A.N.2
Rosenbluth, M.N.3
Teller, A.H.4
Teller, E.5
-
12
-
-
26444479778
-
Optimization by simulated annealing
-
S. Kirkpatrick, C. Gelatt, P. Vecchi, Optimization by simulated annealing, Science 220 (1983) 671-679.
-
(1983)
Science
, vol.220
, pp. 671-679
-
-
Kirkpatrick, S.1
Gelatt, C.2
Vecchi, P.3
-
13
-
-
0021819411
-
Thermodynamical approach to the travelling salesman problem: An efficient simulation algorithm
-
V. Cerny, Thermodynamical approach to the travelling salesman problem: an efficient simulation algorithm, Journal of Optimization Theory and Applications 45 (1985) 41-51.
-
(1985)
Journal of Optimization Theory and Applications
, vol.45
, pp. 41-51
-
-
Cerny, V.1
-
16
-
-
0028401440
-
On randomization in sequential and distributed algorithms
-
R. Gupta, S.A. Smolka, S. Bhaskar, On randomization in sequential and distributed algorithms, ACM Computing Surveys 26 (1) (1994) 7-86.
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.1
, pp. 7-86
-
-
Gupta, R.1
Smolka, S.A.2
Bhaskar, S.3
-
17
-
-
0003533473
-
-
Kluwer, Reider Publishers Dordrecht, The Netherlands
-
P.J. Van Laarhoven, E.H.L. Aarts, Simulated Annealing: Theory and Applications, Kluwer, Reider Publishers Dordrecht, The Netherlands, 1987.
-
(1987)
Simulated Annealing: Theory and Applications
-
-
Van Laarhoven, P.J.1
Aarts, E.H.L.2
-
18
-
-
0003474751
-
-
Cambridge University Press, London
-
W.H. Press, B.P. Flannery, S.A. Teukolsky, W.T. Vetterling, Numerical Recipes in C, Cambridge University Press, London, 1988, pp. 343-352.
-
(1988)
Numerical Recipes in C
, pp. 343-352
-
-
Press, W.H.1
Flannery, B.P.2
Teukolsky, S.A.3
Vetterling, W.T.4
|