Internet Security Applications of the Munn Rings

View/ Open
Author(s)
Kelarev, A.
earwood, J.
Watters, P.
Wu, X.
Abawajy, J.
Pan, L.
Griffith University Author(s)
Year published
2010
Metadata
Show full item recordAbstract
Effective multiple clustering systems, or clusterers, have important applications in information security. The aim of the present article is to introduce a new method of designing multiple clusterers based on theMunn rings and describe a class of optimal clusterers which can be obtained in this construction.Effective multiple clustering systems, or clusterers, have important applications in information security. The aim of the present article is to introduce a new method of designing multiple clusterers based on theMunn rings and describe a class of optimal clusterers which can be obtained in this construction.
View less >
View less >
Journal Title
Semigroup Forum
Volume
81
Issue
1
Copyright Statement
© 2010 Springer New York. This is an electronic version of an article published in Semigroup Forum, Vol. 81(1), pp. 162-171, 2010. Semigroup Forum is available online at: http://www.springerlink.com/ with the open URL of your article.
Subject
Pure Mathematics