File(s) under permanent embargo
Internet security applications of the Munn rings
journal contribution
posted on 2010-01-01, 00:00 authored by Andrei Kelarev, John YearwoodJohn Yearwood, P Watters, X Wu, Jemal AbawajyJemal Abawajy, Lei PanLei PanEffective multiple clustering systems, or clusterers, have important applications in information security. The aim of the present article is to introduce a new method of designing multiple clusterers based on theMunn rings and describe a class of optimal clusterers which can be obtained in this construction.
History
Journal
Semigroup forumVolume
81Issue
1Pagination
162 - 171Publisher
Springer New York LLCLocation
New York N.Y.Publisher DOI
ISSN
0037-1912eISSN
1432-2137Language
engNotes
Published online: 19 June 2010Publication classification
C1 Refereed article in a scholarly journalCopyright notice
2010, Springer Science+Business MediaUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorks
BibTeX
Ref. manager
Endnote
DataCite
NLM
DC