Information Technology Reference
In-Depth Information
25. Slissenko, A.: Minimizing entropy of knowledge representation. In Proc. of the 2nd
International Conf. on Computer Science and Information Technologies, August
17-22, 1999, Yerevan, Armenia . National Academy of Sciences of Armenia (1999)
2-6
26. Tel, G., editor: Introduction to Distributed Algorithms . Cambridge University Press,
2nd edition edition (2000)
27. Wagner, D., Foster, J.S., Brewer, E.A., and Aiken, A.: A first step towards auto-
mated detection of buffer overrun vulnerabilities. In Proceedings of the Symposium
on Network and Distributed Systems Security (NDSS '00) , San Diego, CA. Internet
Society (2000) 3-17
 
Search WWH ::




Custom Search